About
241
Publications
113,993
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
49,035
Citations
Introduction
I am a professor in the ECE Department at the University of Rochester. I hold a secondary appointment in the CS Department at Rochester. I am also currently the Dean of Graduate Studies for Arts, Sciences & Engineering. I received a BS degree in EE from Cornell University in 1995 and MS and PhD degrees in EECS from MIT in 1997 and 2000, respectively. I am a member of N^2Women and SWE, a Distinguished Scientist of ACM Sigmobile, and a Senior Member of the IEEE ComSoc and the IEEE SPS.
Additional affiliations
September 1995 - June 2000
January 2001 - present
Education
August 1995 - February 1997
August 1995 - June 2000
August 1991 - May 1995
Publications
Publications (241)
This paper presents an overview of passive Radio Frequency (RF) energy reception and power harvesting circuits for isolated communications and computing systems lacking access to primary power sources. A unified understanding of the energy harvesting alternatives is provided, followed by an elaborate study of RF energy harvesting within the context...
Due to recent technological advancements in the area of unmanned aerial systems, equipping an unmanned aerial vehicle (UAV) with a base station (BS) has been proposed to augment terrestrial base stations and to enhance the performance of 5G and beyond-5G networks. At the same time, advances in multi-hop ad hoc networks have made these networks feas...
Mobile devices have become the most popular way to access the Internet and are designed to leverage the availability of different wireless technologies, like cellular and WiFi. When multiple wireless networks are available at the same time, it is essential to obtain the best connection, whether this is a direct path through infrastructure networks...
With the increasing number of wireless networks available, and mobile devices with access to the Internet, it is essential to obtain the best connection, whether this is a direct path through Wi-Fi or cellular or an indirect path via one or multiple peer to peer devices. As an example, multihop ad hoc networks are essential in areas where infrastru...
As the number of mobile devices that natively support ad hoc communication protocols increase, large ad hoc networks can be created not only to facilitate communication among the mobile devices, but also to assist devices that are executing computationally intensive applications. Prior work has developed computation offloading systems for mobile de...
With the continuous development of wireless networks, energy conservation and energy efficiency are becoming key factors in improving the network lifetime. In multi-antenna wireless networks, the energy conservation problem can be addressed using the trade-off between the transmit power and the circuit energy consumption. In this paper, we propose...
Wireless Sensor Networks (WSNs) are crucial in supporting continuous environmental monitoring, where sensor nodes are deployed and must remain operational to collect and transfer data from the environment to a base-station. However, sensor nodes have limited energy in their primary power storage unit, and this energy may be quickly drained if the s...
Wireless animal tracking represents the process of using battery operated wireless collars or tags to monitor and track animals in the wild. Given that it is particularly difficult to tag some species, communication protocols must be designed to be energy efficient, while still ensuring a high packet delivery ratio and low delay. In this paper, we...
Commercial speaker verification systems are an important component in security services for various domains, such as law enforcement, government, and finance. These systems are sensitive to noise present in the input signal, which leads to inaccurate verification results and hence security breaches. Traditional speech enhancement (SE) methods have...
Wildlife monitoring is vital in areas where humans and animals share the same living area. For instance, in Sri Lanka there are a high number of deaths among elephants and people due to the human-elephant conflict. A possible solution to reduce the number of deaths is to monitor the elephants’ locations in real-time, and to promptly intervene when...
Energy harvesting wireless nodes provide much longer lifetime and higher energy efficiency for wireless networks compared to battery operated systems. In this paper, we study a MIMO wireless communication link in which the nodes are equipped with energy harvesters and rechargeable batteries that are continuously charging from a renewable energy sou...
Networking Networking Women (N2Women) celebrated its 10-year anniversary at the fifth N2Women Workshop co-located with MobiCom 2016. Founded in 2006 by Tracy Camp and Wendi Heinzelman, N2Women is a discipline-specific community for researchers in the communications and networking field. The main goal of N2Women is to foster connections among the un...
As an essential approach to understanding human interactions, emotion classification is a vital component of behavioral studies as well as being important in the design of context-aware systems. Recent studies have shown that speech contains rich information about emotion, and numerous speech-based emotion classification methods have been proposed....
Water is essential for human survival. Although approximately 71% of the world is covered in water, only 2.5% of this is fresh water; hence, fresh water is a valuable resource that must be carefully monitored and maintained. In developing countries, 80% of people are without access to potable water. Cholera is still reported in more than 50 countri...
With the increasing availability of mobile devices that natively support ad hoc communication protocols, we are presented with a unique opportunity to realize large scale ad hoc wireless networks. Recently, a novel ad hoc protocol named WiFi Direct has been proposed and standardized by the WiFi Alliance with the objective of facilitating the interc...
In areas where the habitats of elephants and humans are rapidly encroaching on each other, real-time monitoring of the elephants' locations has the potential to drastically improve the coexistence of elephants and humans, resulting in reduced deaths in both groups. However, as tagging (using GPS collars) elephants to obtain such location informatio...
The existing passive wake-up receivers (WuRxs) are radio frequency identification (RFID) tag based, which incur high cost and complexity. In this paper, we study cost-effective and long-range WuRx solutions for range-based wake-up (RW) as well as directed wake-up (DW). In particular, we consider the case of an RF energy harvesting wireless sensor n...
The ability to classify emotions from speech is ben- eficial in a number of domains, including the study of human relationships. However, manual classifi- cation of emotions from speech is time consuming. Current technology supports the automatic classifi- cation of emotions from speech, but these systems have some limitations. In particular, exist...
Given the increasing availability and accessibility of mobile devices, there is enormous potential to transform how healthcare is administered through the creation of highly customized smartphone-based applications for effective medical condition management. Such platforms can offer improvements for both patients and healthcare systems. For patient...
With the increasing availability of mobile devices that natively support
Device-to-Device (D2D) communication protocols, we are presented with a unique
opportunity to realize large scale ad hoc wireless networks. Recently, a novel
D2D protocol named WiFi Direct has been proposed and standardized by the WiFi
Alliance with the objective of facilitati...
A wireless sensor network that employs passive radio wake-up of the sensor nodes can reduce the energy cost for unnecessary idle listening and communication overhead, extending the network lifetime. A passive wake-up radio is powered by the electromagnetic waves transmitted by a wake-up transmitter rather than a battery on the sensor node. However,...
A mobile-cloud architecture provides a practical platform for performing face recognition on a mobile device. However, using a mobile-cloud architecture to perform real-time face recognition presents several challenges including resource limitations and long network delays. In this paper, we determine three approaches for accelerating the execution...
Wake-up receivers (WuRxs) can improve the lifetime of a wireless sensor network by reducing energy consumption from undesirable idle listening. The amplitude level of the incoming RF signal is used by a WuRx to generate an interrupt and wake up the radio of a sleeping sensor node. Existing passive WuRx designs are generally based on RFID tags that...
The fact that emotions play a vital role in social interactions, along with
the demand for novel human-computer interaction applications, have led to the
development of a number of automatic emotion classification systems. However,
it is still debatable whether the performance of such systems can compare with
human coders. To address this issue, in...
Power and energy consumption are the most important factors in extending the lifetime of Wireless Sensor Networks (WSN). Many energy efficiency techniques, that consider both the transmission and circuit power consumption have been proposed for the case of Single-Input Single-Output (SISO) WSNs. However, the power consumption of the receiver should...
Mobile ad hoc networks (MANETs) are becoming increasingly common, and typical network loads considered for MANETs are increasing as applications evolve. This, in turn, increases the importance of bandwidth efficiency while maintaining tight requirements on energy consumption, delay and jitter. Coordinated channel access protocols have been shown to...
RF energy harvesting (RFH) is emerging as a potential method for the proactive energy replenishment of next generation wireless networks. Unlike other harvesting techniques that depend on the environment, RFH can be predictable or on demand, and as such it is better suited for supporting quality-of-service-based applications. However, RFH efficienc...
Different forms of parallel computing have been proposed to address the high computational requirements of many applications. Building on advances in parallel computing, volunteer computing has been shown to be an efficient way to exploit the computational resources of under utilized devices that are available around the world. The idea of includin...
For military communication systems, it is important to achieve robust and energy efficient real-time communication among a group of mobile users without the support of a pre-existing infrastructure. Furthermore, these communication systems must support multiple communication modes, such as unicast, multicast, and network-wide broadcast, to serve th...
With the recent advances in cloud computing and the capabilities of mobile devices, the state-of-the-art of mobile computing is at an inflection point, where compute-intensive applications can now run on today’s mobile devices with limited computational capabilities. This is achieved by using the communications capabilities of mobile devices to est...
Different forms of parallel computing have been proposed to address the high computational requirements of many applications. Building on advances in parallel computing, volunteer computing has been shown to be an efficient way to exploit the computational resources of under utilized devices that are available around the world. The idea of includin...
Wireless transfer of energy through directed radio frequency waves has the potential to realize perennially operating sensor nodes by replenishing the energy contained in the limited on-board battery. However, the high power energy transfer from energy transmitters (ETs) interferes with data communication, limiting the coexistence of these function...
Volunteer computing provides a practical and low cost solution to the increasing computational demands of many applications. Recent advancements in mobile device processing capabilities, combined with the energy efficiency of the mobile devices, make their inclusion in a distributed computing architecture particularly appealing. However, the intrin...
Fundamental frequency (F0) is one of the essential features in many acoustic related applications. Although numerous F0 detection algorithms have been developed, the detection accuracy in noisy environments still needs improvement. We present a hybrid noise resilient F0 detection algorithm named BaNa that combines the approaches of harmonic ratios...
Sensors have limited resources such as energy, computational power and bandwidth, and thus they require protocols and techniques that are resource aware and energy efficient. As energy waste through idle listening, retransmissions and overhearing are some of the primary causes of reduced lifetime in wireless sensor networks, sensor sleeping is crit...
The problem of designing and simulating optimal communication protocols for energy harvesting wireless networks has recently received considerable attention, thus requiring an accurate modeling of the energy harvesting process and a consequent redesign of the simulation framework to include this. While the current ns-3 energy framework allows the d...
Harvesting energy from radio frequency (RF) waves brings us closer to achieving the goal for perpetual operation of a wireless sensor network (WSN) by replenishing the batteries of the sensor nodes. However, due to restrictions on the maximum transmitted power, path loss, and receiver sensitivity, only a small amount of energy can be harvested. Whi...
Energy transfer through radio frequency (RF) waves enables battery-free operation for wireless sensor networks , while adversely impacting data communication. Thus, extending the lifetime for RF powered sensors comes at a cost of interference and reduced data throughput. This paper undertakes a systematic experimental study for both indoor and outd...
As servers are placed in diverse locations in networked services today, it becomes vital to direct a client's request to the best server(s) to achieve both high performance and reliability. In this distributed setting, non-negligible latency and server availability become two major concerns, especially for highly-interactive applications. Profiling...
The problem of designing and simulating optimal transmission protocols for
energy harvesting wireless networks has recently received considerable
attention, thus requiring for an accurate modeling of the energy harvesting
process and a consequent redesign of the simulation framework to include it.
While the current ns-3 energy framework allows the...
As an essential approach to understanding human interactions, emotion classification is a vital component in the design of human-computer interaction (HCI) systems. Speech contains rich information about emotion, but the impact of noise on the classification performance is still not well studied, especially for applications used in noisy mobile env...
Various applications of wireless sensor networks require multihop data transmission over error-prone wireless links, hence multipath routing can be used to meet the application's reliability requirement. On the other hand, wireless sensors are usually battery powered, and thus it is very important to save energy in order to prolong the network life...
Energy efficiency is one of the most important criteria in the design of a wireless sensor network. Sensor nodes are usually battery-powered and thus have very limited lifetime. In this paper, we introduce a novel passive wake-up radio device named WISP-Mote that uses a passive RFID tag as a wake-up receiver for a traditional sensor node. We charac...
With the recent advances in cloud computing and the capabilities of mobile devices, the state-of-the-art of mobile computing is at an inflection point, where compute-intensive applications can now run on today’s mobile devices with limited computational capabilities. This is achieved by using the communications capabilities of mobile devices to est...
Batteries of field nodes in a wireless sensor network pose an upper limit on the network lifetime. Energy harvesting and harvesting aware medium access control protocols have the potential to provide uninterrupted network operation, as they aim to replenish the lost energy so that energy neutral operation of the energy harvesting nodes can be achie...
Nodes in wireless sensor networks (WSNs) are battery powered and oftentimes deployed in remote and hostile locations. Energy conservation is, therefore, one of the primary goals of MAC protocols designed for these networks. Contention-based protocols employ static or variable duty cycles to minimize energy dissipated in idle listening. TDMA-based p...
We study the problem of joint optimization of Slepian-Wolf (SW) source coding and transmission rates over a Gaussian multiple access channel with the considerations of circuit power consumption and average transmit power constraint. The goal is to maximize the sample rate at the source nodes. We first derive a criterion to determine the optimality...
Cloud computing provides an approach to accessing shared computing resources. However, a traditional cloud is composed of powerful but energy-hungry workstations. The growth of the population of mobile devices such as smart phones and tablets provides huge amount of idling computing power. In this paper, we describe the design and implementation of...
Recent devices developed for emerging wireless networks, such as 4G cellular networks, wireless mesh networks, and mobile ad hoc networks, support multiple communication substrates and require execution of multiple protocols within a layer, which cannot be supported efficiently by traditional, layered protocol stack approaches. While cross-layer ap...
This article describes the history of the Wireless Identification and Sensing Platform (WISP) program. It describes the research motivating the creation of the WISP, its development process, the decision to open source its design, and the creation of the WISP Challenge, a program to make WISPs available to univer-sity researchers. The article then...
Coverage area is an important performance metric for RFID systems, especially those used for inventory management. As such, there are a range of methods being developed to try to increase the coverage area of RFID systems without requiring additional costly and power hungry RFID readers. Most existing approaches to increase coverage employ RFID rea...
An important aspect of the MAC layer design for mobile ad hoc networks (MANETs) is the ability to adapt to spatially non-uniform traffic load distributions. While coordinated channel access protocols have been shown to be well suited for highly loaded MANETs, these protocols are in general not as well suited for non-uniform load distributions as un...
Emotion classification is essential for understanding human interactions and hence is a vital component of behavioral studies. Although numerous algorithms have been developed, the emotion classification accuracy is still short of what is desired for the algorithms to be used in real systems. In this paper, we evaluate an approach where basic acous...
Wake-up radios present a promising alternative to traditional duty-cycle approaches, by reducing overhearing and by eliminating idle listening completely. However, energy-efficient operation of the wake-up mechanism is required for the success of such systems. In particular, addressing is an important component of the wake-up procedure that can con...
Intelligent systems like automatic highway traffic management, area surveillance, and geological activity mon-itoring require substantial data collection and processing in the field. Energy self-sustainability is a critical foundation for successful field systems that are away from the power grid infrastructure. Instead of the conventional battery-...
Wireless image transmission is critical in many applications, such as surveillance and environment monitoring. In order to make the best use of the limited energy of the battery-operated cameras, while satisfying the application-level image quality constraints, cross-layer design is critical. In this paper, we develop an image transmission model th...
Pitch is one of the essential features in many speech related applications. Although numerous pitch detection algo-rithms have been developed, as shown in this paper, the detection ratio in noisy environments still needs improvement. In this paper, we present a hybrid noise resilient pitch detection algorithm named BaNa that combines the approaches...
Face recognition applications for airport security and surveillance can benefit from the collaborative coupling of mobile and cloud computing as they become widely avail-able today. This paper discusses our work with the design and implementation of face recognition applications using our mobile-cloudlet-cloud architecture named MOCHA and its initi...
Wireless sensor networks are often battery-powered, and hence extending the network lifetime is one of the primary concerns in the ubiquitous deployment of wireless sensor networks. One approach to efficiently utilize the limited energy supplies of the sensors is to have the medium access control (MAC) protocol duty-cycle the sensors, periodically...
In this paper, we formalize the problem of minimizing the energy dissipated to successfully transmit a single information bit over a link, considering circuit power consumption, packetization and retransmission overhead, bit/packet error probability, and the duty cycle of the transceiver. We optimize the packet length and transmit power as a functi...
The amount of data processed annually over the Internet has crossed the zetabyte boundary, yet this Big Data cannot be efficiently processed or stored using today's mobile devices. Parallel to this explosive growth in data, a substantial increase in mobile compute-capability and the advances in cloud computing have brought the state-of-the-art in m...
We consider an energy constrained wireless sensor network, with arbitrary number of nodes, where source nodes utilize Slepian-Wolf (SW) coding before transmission to a joint decoder. We investigate optimal and near-optimal SW coding rates, transmit powers, and transmit durations that maximize the number of collected samples during the network lifet...
Multicast routing protocols typically rely on the a priori creation of a multicast tree (or mesh), which requires the individual nodes to maintain state information. In dynamic networks with bursty traffic, where long periods of silence are expected between the bursts of data, this multicast state maintenance adds a large amount of communication, p...