Yusuf Sarwar Uddin

Yusuf Sarwar Uddin
University of Missouri - Kansas City | UMKC · Department of Computer Science and Electrical Engineering

PhD

About

62
Publications
6,481
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
797
Citations
Citations since 2016
31 Research Items
542 Citations
2016201720182019202020212022020406080100
2016201720182019202020212022020406080100
2016201720182019202020212022020406080100
2016201720182019202020212022020406080100
Introduction
Skills and Expertise
Additional affiliations
October 2016 - present
University of California, Irvine
Position
  • PhD Student
September 2014 - present
Bangladesh University of Engineering and Technology
Position
  • Professor
October 2011 - January 2012
Raytheon BBN Technologies
Position
  • Research Intern

Publications

Publications (62)
Article
The ongoing COVID-19 pandemic has created significant public health concerns that led the public and private sectors to impose stay-at-home and work-from-home policies. Although working from home has been a conventional albeit infrequent behavior, the prevalence of this option was significantly and rapidly accelerated during the pandemic. This stud...
Chapter
Collaborative inference enables resource-constrained edge devices to make inferences by uploading inputs (e.g., images) to a server (i.e., cloud) where the heavy deep learning models run. While this setup works cost-effectively for successful inferences, it severely underperforms when the model faces input samples on which the model was not trained...
Conference Paper
In this paper, we propose a transfer-learning based model construction technique for the aerial scene classification problem. The core of our technique is a layer selection strategy, named ReLU-Based Feature Fusion (RBFF), that extracts feature maps from a pretrained CNN-based single-object image classification model, namely MobileNetV2, and constr...
Conference Paper
Collaborative inference enables resource-constrained edge devices to make inferences by uploading inputs (e.g., images) to a server (i.e., cloud) where the heavy deep learning models run. While this setup works cost-effectively for successful inferences, it severely underperforms when the model faces input samples on which the model was not trained...
Article
Full-text available
Virtually, all of today’s Big Data systems are passive in nature, responding to queries posted by their users. Instead, we are working to shift Big Data platforms from passive to active. In our view, a Big Active Data (BAD) system should continuously and reliably capture Big Data while enabling timely and automatic delivery of relevant information...
Preprint
Virtually all of today's Big Data systems are passive in nature, responding to queries posted by their users. Instead, we are working to shift Big Data platforms from passive to active. In our view, a Big Active Data (BAD) system should continuously and reliably capture Big Data while enabling timely and automatic delivery of relevant information t...
Conference Paper
In this panel talk, we present our experiences regarding the development and deployment of an Internet of Things (IoT) based air quality monitoring system for developing cities. We consider the areas where widespread free WiFi is not prevalent; instead, the platform needs to rely on expensive and metered cellular data connections with limited data...
Conference Paper
Full-text available
In this paper, we address issues in the design and operation of a Big Active Data Publish Subscribe (BAD Pub/Sub) systems to enable the next generation of enriched notification systems that can scale to societal levels. The proposed BAD Pub/Sub system will aim to ingest massive amounts of data from heterogeneous publishers and sources and deliver c...
Article
The IoT revolution has provided a promising opportunity to build powerful perpetual awareness systems. Perpetual awareness systems are sensing systems characterized by continuous monitoring and ubiquitous sensing; they are essential to many safety and mission-critical applications, e.g. assisted living, healthcare and public safety. In this paper,...
Article
In this paper, we design and implement an Internet-of-Things (IoT) based platform for developing cities using environmental sensing as a driving application. Since ubiquitous and free WiFi access is not available in most developing cities, IoT deployments must leverage 3G cellular connections that are metered and expensive. In order to best utilize...
Article
In this paper, we propose techniques for dynamically adjusting heartbeat or keep-alive interval of long-lived TCP connections, particularly the ones that are used in push notification service in mobile platforms. When a device connects to a server using TCP, often times the connection is established through some sort of middle-box, such as NAT, pro...
Conference Paper
Full-text available
In this paper, we design and implement an Internet-of-Things (IoT) based platform for developing cities using environmental sensing as driving application with a set of air quality sensors that periodically upload sensor data to the cloud. Ubiquitous and free WiFi access is unavailable in most developing cities; IoT deployments must leverage 3G cel...
Article
The Internet of Things has enabled new services to communities in many domains, e.g. smart healthcare, environmental awareness, and public safety. These services require timely and accurate event delivery, but such in-situ deployments are often limited by the coverage of sensing/communication infrastructures. In this paper we develop effective, sca...
Article
Nearly all of today's Big Data systems are passive in nature. We demonstrate our Big Active Data ("BAD") system, a scalable system that continuously and reliably captures Big Data and facilitates the timely and automatic delivery of new information to a large population of interested users as well as supporting analyses of historical information. W...
Conference Paper
Safe Community Awareness and Alerting Network (SCALE) is a community government/academic/industry partnership effort that aims to deploy, actuate and evaluate techniques to support multiple heterogeneous IoT technologies in real world communities. SCALE2, an extension of SCALE, engages a multi-tier and multi-network approach to drive data flow from...
Conference Paper
In this paper, we develop effective solutions for enabling mobile sensing/data collection in community IoT deployments where sensing/communication coverage is intermittent and varying. Specifically, we address the optimized upload planning problem, i.e. determine optimal schedules for upload of gathered information to enable timely data collection...
Conference Paper
In this paper we propose resource optimization for subscription based media content crowdsourcing. In this form of crowdsourcing, interested entities (referred to as Campaigners) announce their interests expressing what media content they want to receive from users whereas users subscribe to those interests to serve content satisfying the interests...
Article
In this paper we propose resource optimization for subscription based media content crowdsourcing. In this form of crowdsourcing, interested entities (we refer to them as Campaigners) announce their 'interests' expressing what media content (such as pictures, audio, and videos) they want to receive from participant users whereas mobile users subscr...
Article
This paper proposes a distributed peer-to-peer data lookup technique on DHTs in order to serve range queries over multiple attributes. The scheme, MARQUES, uses space filling curves to map multi-attribute data points to a one-dimensional key space and thus effectively converts multi-attribute range queries into a consecutive series of one-dimension...
Article
Ad Hoc Network is a decentralized type of network where wireless devices are allowed to discover each other and communicate in peer to peer fashion without involving central access points. In most ad hoc networks, nodes compete for access to shared wireless medium, often resulting in collision (interference). IEEE 802.11, a well-known standard, use...
Conference Paper
Full-text available
In this paper we propose a novel searchable P2P content storage for storing mobile apps. In the growing need of storing and distributing huge number mobile apps across large number of users, it has been deemed necessary to think of a storage that leverages enormous amount of content space that common people can share these days. In our proposal, we...
Conference Paper
Mobile phones are used these days to capture photos almost everyday everywhere. When photos are taken and shared among peers through social network sites or photo sharing portals, sometimes they pose threats to personal privacy of persons who appear in those photos, particularly when the person being photographed has reservation about sharing the s...
Conference Paper
The Remote Procedure Call (RPC) is a powerful technique for constructing distributed, client-server based applications. In traditional RPC systems, when a remote procedure call fails to return result to the client because of communication failure, client stub usually reinvokes the remote method for expected output if the method is idempotent. This...
Conference Paper
This paper explores the design of in-network caching policies for non-independent spot reporting content. The problem is motivated by autonomous sensor devices, such as soldier mounted cameras, that collect and store correlated data from the physical world. Physical states exhibit correlations in space and in time that need to be considered in cach...
Article
This paper presents a novel multicopy routing protocol for disruption-tolerant networks whose objective is to minimize energy expended on communication. The protocol is designed for disaster-response applications, where power and infrastructure resources are disrupted. Unlike other delay-tolerant networks, energy is a vital resource in post disaste...
Conference Paper
Full-text available
In this paper, we introduce Minerva; an information-centric programming paradigm and toolkit for social sensing. The toolkit is geared for smartphone applications whose main objective is to collect and share information about the physical world. Information-centric programming refers to a publish-subscribe paradigm that maximizes the amount of info...
Conference Paper
Named data networking has emerged as a new architectural paradigm that replaces host-based addressing in today's networks with content-centric addressing. Rather than assigning IP addresses to hosts, it assigns names to data objects and supports hierarchical name spaces. This paper explores the benefits of naming data for the design of information-...
Conference Paper
Full-text available
This paper develops algorithms for improved source selection in social sensing applications that exploit social networks (such as Twitter, Flickr, or other mass dissemination networks) for reporting. The collection point in these applications would simply be authorized to view relevant information from participating clients (either by explicit clie...
Conference Paper
Full-text available
At CPSWeek 2011, the authors presented a demonstration of Apollo, a fact-finder for participatory sensing that ranks archived human-centric and sensor data by credibility. The current demonstration significantly extends our previous work by allowing Apollo to operate on live streaming data; in this case, live Twitter feeds. As the role of humans as...
Conference Paper
We propose PhotoNet, a picture delivery service for camera sensor networks. PhotoNet is motivated by the needs of disaster-response applications, where a group of survivors and first responders may survey damage and send images to a rescue center in the absence of a functional communication infrastructure. The protocol runs on mobile devices, handl...
Conference Paper
In this paper, we propose countermeasures to mit- igate damage caused by spoofing attacks in Delay-Tolerant Networks (DTNs). In our model, an attacker spoofs someone else's address (the victim's) to absorb packets from the network intended for that victim. Address spoofing is arguably a very severe attack in DTNs, compared to other known attacks, s...
Article
Full-text available
This paper develops a framework to analyze the latency and delay composition of workflows in a real-time networked aggregation system. These workflows are charac- terized by different sensor inputs that are processed along parallel branches that eventually merge or fuse to compute the aggregation result. The results for each flow must be produced w...
Conference Paper
This paper computes end-to-end delay bounds for prioritized data flows in disruption-tolerant networks (DTNs). DTNs suffer intermittent connectivity among nodes due to node mobility. When deployed in mission-critical applications, such as disaster response, an interesting question becomes to quantify end-to-end packet delays under assumptions on no...
Conference Paper
In this paper, we develop a cooperative mechanism, RELICS, to combat selfishness in DTNs. In DTNs, nodes belong to self-interested individuals. A node may be selfish in expending resources, such as energy, on forwarding messages from others, unless offered incentives. We devise a rewarding scheme that provides incentives to nodes in a physically re...
Conference Paper
The proliferation of sensors in devices of frequent use, such as mobile phones, offers unprecedented opportunities for forming self-selected communities around shared sensory data pools that enable community specific applications of mutual interest. Such applications have recently been termed participatory sensing. An important category of particip...
Conference Paper
Full-text available
Delay Tolerant Networking (DTN) considers how to provide communication in contexts where it is unreasonable to assume end-to-end connectivity. Network devices exchange buffered messages when they come into communication range; messages may be buffered and carried physically several times before ultimately being received. Service characteristics of...
Article
Full-text available
Due to energy and other relevant constraints, addressing of nodes and data routing techniques in sensor networks differ significantly from other networks. In this article, we present an energy-efficient addressing and stateless routing paradigm for wireless sensor networks. We propose a dynamic and globally unique address allocation scheme for sens...
Conference Paper
Full-text available
This paper presents a novel multi-copy routing protocol for disruption-tolerant networks whose objective is to minimize energy expended on communication. The protocol is designed for disaster-response applications, where power and infrastructure resources are disrupted. Unlike other delay-tolerant networks, energy is a vital resource in post-disast...
Conference Paper
Full-text available
Users and administrators of large distributed systems are frequently in need of monitoring and management of its various components, data items and resources. Though there exist several distributed query and aggregation systems, the clustered structure of tele-immersive interactive frameworks and their time-sensitive nature and application requirem...
Conference Paper
This paper introduces the abstraction of energy reserves for sensor networks that virtualizes energy sources. It giv es each of several applications sharing a platform the illusio n of having its own private energy source. Energy virtualiza- tion is the next logical step in embedded systems after virtu - alizing communication links and CPU capacity...
Conference Paper
Wireless sensor networks consist of many small nodes with sensing, computation and communication capabilities. Being organized into a network, sensors perform some distributed sensing operation in a target area. Addressing problem focuses on dynamic allocation of addresses to sensor nodes. In this paper, the authors present a short survey of the st...
Conference Paper
In this paper, we propose a novel approach towards parametrically controlled artificial terrain generation. Our proposed method focuses on generation of terrains having mountains of prespecified height and spread of base region and peak nearly at a prespecified location. Means of performing advanced tuning on the terrain to produce unusual artifact...
Conference Paper
Full-text available
Transmitting TV programs over the Internet has always been a great issue in multimedia service. With the ad-vent of broadband internet connectivity, real time video and audio delivery on the Internet is getting popular day by day. Although the industry is making great and highly publicized plans for future (inter)national video on demand, there is...
Article
Full-text available
This paper addresses the problem of collection and delivery of a representative subset of pictures, in participatory camera networks, to maximize coverage when a significant portion of the pictures may be redundant or irrelevant. Consider, for example, a rescue mission where volunteers and survivors of a large-scale disaster scout a wide area to ca...
Article
Disruption-tolerant network (DTN) is an intermittently connected network where the traditional end-to-end data communication between a source-destination pair is hardly possible. Instead, nodes opportunistically replicate the same packet several times and try to deliver them through multiple paths. Due to this multi-copy forwarding scheme, denial o...

Network

Cited By

Projects

Projects (3)