Cristian Chilipirea

Cristian Chilipirea
Polytechnic University of Bucharest | UPB · Department of Computers

PhD

About

25
Publications
7,870
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
263
Citations
Additional affiliations
October 2014 - present
Polytechnic University of Bucharest
Position
  • Research Assistant

Publications

Publications (25)
Article
When mobile devices involved in a communication process are unable to establish a direct connection, or when communication should be offloaded to cope with large throughputs, mobile collaboration can be used to enable communication through opportunistic networks. These types of networks are formed when mobile devices communicate only using short-ra...
Chapter
Full-text available
Vehicular Data includes different facts and measurements made over a set of moving vehicles. Most of us use cars or public transportation for our work commute, daily routines and leisure. But, except of our destination, possible time of arrival and what is directly around us, we know very little about the traffic conditions in the city as a whole....
Chapter
Full-text available
Disaster and emergency management refers to a range of activities designed to maintain control over crisis situations, providing the rescue and assistance equipment with a framework for helping victims and reducing its impact. The range of activities include prevention, advance warning, early detection, analysis of the problem and assessment of sco...
Article
Full-text available
There are multiple methods for tracking individuals, but the classical ones such as using GPS or video surveillance systems do not scale or have large costs. The need for large-scale tracking, for thousands or even millions of individuals, over large areas such as cities, requires the use of alternative techniques. WiFi tracking is a scalable solut...
Chapter
Full-text available
Tracking pedestrian behavior is receiving increasingly more attention. Various techniques have been used so far, yet tracking through WiFi seems to be the most popular one. This popularity comes from the ubiquity of modern smartphones, of which it is known that most have their WiFi enabled all the time. In this chapter we concentrate exclusively on...
Article
Data processing for Smart Cities become more challenging, facing with different handling steps: data collection from different heterogeneous sources, processing sometimes in real-time and then delivered to high level services or applications used in Smart Cities. Applications used for intelligent transportation systems, crowd management, water reso...
Chapter
There are currently many trends in computer science, like Smart Cities, Internet of Things, and Wireless Sensor Networks. Many of these systems require or could dramatically benefit from having information about crowds. First of all, many of the systems are built to improve the life of people, and they require information about them to know when to...
Conference Paper
Environmental scientists, city planners, park administrators, and similar others, need to base their decisions on up-to-date, accurate and high resolution measurement data. However, acquiring such data by hand or by deploying sensor networks is expensive and time consuming. People without proper scientific training want to take part in the scientif...
Conference Paper
Full-text available
Internet of Things (IoT) represents a new paradigm in computing in which devices are connected to the internet and directly communicate with each other. Because these devices are generally thought to be wireless, small and cheap, in other words not very reliable, it is vital that we address the robustness problems in IoT.
Conference Paper
Full-text available
Cloud computing systems have become not only popular, but extensively used. They are supported and exploited by both industry and academia. Cloud providers have diversified and so did the software offered by their systems. Infrastructure as a Service (IaaS) clouds are now available from single virtual machine use cases, such as a personal server, t...
Conference Paper
Full-text available
Monitoring crowds is receiving much attention. An increasingly popular technique is to scan mobile devices, notably smartphones. We take a look at scanning such devices based on transmitted WiFi messages. Although research on capturing crowd patterns using WiFi detections has been done, there are not many published results when it comes to tracking...
Article
Full-text available
When mobile devices are unable to establish direct communication, or when communication should be offloaded to cope with large throughputs, mobile collaboration can be used to facilitate communication through opportunistic networks. These types of networks are formed when mobile devices communicate only using short-range transmission protocols, usu...
Article
Full-text available
Mobile clouds are an ongoing research topic that has yet to become ubiquitous as the now popular cloud paradigm. This is because of a number of issues with mobile clouds that still need to be addressed such as: incentives, security, privacy, context, data management, usability, and cost benefits. Out of these issues, the most important one that nee...
Conference Paper
Recent research in communications and computer science has been considered to advance the performances of monitoring water environments. However, constrains produced by the water environments, caused by the specific channel propagation and harsh operating conditions must be taken into account. The purpose of this paper is to define and describe a m...
Article
Full-text available
MANIAC Challenge raises a problem of game theory, different players strategies intertwine and the success of any player is dependent on the actions of all players in the system. A truly fair scenario is when all the strategies are identical, all the nodes co-operate and they all equally share the rewards and risks that come with every transfer. A s...
Article
Full-text available
In particular types of delay-tolerant networks (DTN) such as opportunistic mobile networks, node connectivity is transient. For this reason, traditional routing mechanisms are no longer suitable. New approaches use social relations between mobile users as a criterion for the routing process. We argue that in such an approach, nodes with high social...
Conference Paper
Full-text available
In particular types of Delay-Tolerant Networks (DTN) such as Opportunistic Mobile Networks, node connectivity is transient, and connections are sparse and small in length. For this reason, traditional routing mechanisms are no longer suitable. Routing algorithms designed for such networks try to maximize the probability of successful message delive...
Conference Paper
Full-text available
In particular types of Delay-Tolerant Networks (DTN) such as Opportunistic Mobile Networks, node connectivity is transient. For this reason, traditional routing mechanisms are no longer suitable. New approaches use social relations between mobile users as a criterion for the routing process. We argue that in such an approach, nodes with high social...
Conference Paper
Full-text available
When one pays for a Cloud Service he wants the Service to be compliant with standards and to respect his needs (respect the Service Level Agreement). When manipulating big-data (like picture collections, satellite images or digital libraries), transfers must be optimized. The Cloud Infrastructure itself utilizes big-data transfers while migrating V...

Network

Cited By