[{"title":"( 42 个子文件 160.81MB ) MOBICOM 2018 All Papers","children":[{"title":"2018","children":[{"title":"RAVEN: Improving Interactive Latency for the Connected Car.pdf <span style='color:#111;'> 1.80MB </span>","children":null,"spread":false},{"title":"DeepCache: Principled Cache for Mobile Deep Vision.pdf <span style='color:#111;'> 4.00MB </span>","children":null,"spread":false},{"title":"Flare: Practical Viewport-Adaptive 360-Degree Video Streaming for Mobile Devices.pdf <span style='color:#111;'> 1.19MB </span>","children":null,"spread":false},{"title":"CrossSense: Towards Cross-Site and Large-Scale WiFi Sensing.pdf <span style='color:#111;'> 8.01MB </span>","children":null,"spread":false},{"title":"Towards Scalable and Ubiquitous Millimeter-Wave Wireless Networks.pdf <span style='color:#111;'> 9.64MB </span>","children":null,"spread":false},{"title":"Battery-Free Eye Tracker on Glasses.pdf <span style='color:#111;'> 5.89MB </span>","children":null,"spread":false},{"title":"Adaptive Codebook Optimization for Beam Training on Off-the-Shelf IEEE 802.11ad Devices.pdf <span style='color:#111;'> 8.93MB </span>","children":null,"spread":false},{"title":"One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol.pdf <span style='color:#111;'> 2.04MB </span>","children":null,"spread":false},{"title":"Surface MIMO: Using Conductive Surfaces For MIMO Between Small Devices.pdf <span style='color:#111;'> 2.14MB </span>","children":null,"spread":false},{"title":"GPF: A GPU-based Design to Achieve ~100 μs Scheduling for 5G NR.pdf <span style='color:#111;'> 2.81MB </span>","children":null,"spread":false},{"title":"Closing the Gaps in Inertial Motion Tracking.pdf <span style='color:#111;'> 2.89MB </span>","children":null,"spread":false},{"title":"Resolving Policy Conflicts in Multi-Carrier Cellular Access.pdf <span style='color:#111;'> 1.95MB </span>","children":null,"spread":false},{"title":"Simultaneous Localization and Mapping with Power Network Electromagnetic Field.pdf <span style='color:#111;'> 4.19MB </span>","children":null,"spread":false},{"title":"Ghostbuster: Detecting the Presence of Hidden Eavesdroppers.pdf <span style='color:#111;'> 1.79MB </span>","children":null,"spread":false},{"title":"SkyCore: Moving Core to the Edge for Untethered and Reliable UAV-based LTE Networks.pdf <span style='color:#111;'> 9.52MB </span>","children":null,"spread":false},{"title":"ChromaCode: A Fully Imperceptible Screen-Camera Communication System.pdf <span style='color:#111;'> 7.57MB </span>","children":null,"spread":false},{"title":"Parallel Backscatter in the Wild: When Burstiness and Randomness Play with You.pdf <span style='color:#111;'> 5.40MB </span>","children":null,"spread":false},{"title":"Experience: Android Resists Liberation from Its Primary Use Case.pdf <span style='color:#111;'> 4.66MB </span>","children":null,"spread":false},{"title":"Mitigating the Latency-Accuracy Trade-off in Mobile Data Analytics Systems.pdf <span style='color:#111;'> 1.59MB </span>","children":null,"spread":false},{"title":"RainbowLight: Towards Low Cost Ambient Light Positioning with Mobile Phones.pdf <span style='color:#111;'> 1.34MB </span>","children":null,"spread":false},{"title":"Conductive Inkjet Printed Passive 2D TrackPad for VR Interaction.pdf <span style='color:#111;'> 4.11MB </span>","children":null,"spread":false},{"title":"FoggyCache: Cross-Device Approximate Computation Reuse.pdf <span style='color:#111;'> 1.93MB </span>","children":null,"spread":false},{"title":"How Should I Slice My Network?: A Multi-Service Empirical Evaluation of Resource Sharing Efficiency.pdf <span style='color:#111;'> 6.90MB </span>","children":null,"spread":false},{"title":"Proximity-Proof: Secure and Usable Mobile Two-Factor Authentication.pdf <span style='color:#111;'> 901.68KB </span>","children":null,"spread":false},{"title":"NestDNN: Resource-Aware Multi-Tenant On-Device Deep Learning for Continuous Mobile Vision.pdf <span style='color:#111;'> 2.76MB </span>","children":null,"spread":false},{"title":"SWAN: Stitched Wi-Fi ANtennas.pdf <span style='color:#111;'> 1.25MB </span>","children":null,"spread":false},{"title":"X-Tandem: Towards Multi-hop Backscatter Communication with Commodity WiFi.pdf <span style='color:#111;'> 10.65MB </span>","children":null,"spread":false},{"title":"Achieving Receiver-Side Cross-Technology Communication with Cross-Decoding.pdf <span style='color:#111;'> 3.30MB </span>","children":null,"spread":false},{"title":"Experience: Cross-Technology Radio Respiratory Monitoring Performance Study.pdf <span style='color:#111;'> 1.39MB </span>","children":null,"spread":false},{"title":"Body-Guided Communications: A Low-power, Highly-Confined Primitive to Track and Secure Every Touch.pdf <span style='color:#111;'> 4.13MB </span>","children":null,"spread":false},{"title":"Towards Environment Independent Device Free Human Activity Recognition.pdf <span style='color:#111;'> 4.09MB </span>","children":null,"spread":false},{"title":"ECHO: A Reliable Distributed Cellular Core Network for Hyper-scale Public Clouds.pdf <span style='color:#111;'> 1.88MB </span>","children":null,"spread":false},{"title":"Cross-Frequency Communication: Near-Field Identification of UHF RFIDs with WiFi!.pdf <span style='color:#111;'> 1.13MB </span>","children":null,"spread":false},{"title":"VSkin: Sensing Touch Gestures on Surfaces of Mobile Devices Using Acoustic Signals.pdf <span style='color:#111;'> 5.54MB </span>","children":null,"spread":false},{"title":"Multi-Stream Beam-Training for mmWave MIMO Networks.pdf <span style='color:#111;'> 5.49MB </span>","children":null,"spread":false},{"title":"CEIVE: Combating Caller ID Spoofing on 4G Mobile Phones Via Callee-Only Inference and Verification.pdf <span style='color:#111;'> 6.01MB </span>","children":null,"spread":false},{"title":"Towards Replay-resilient RFID Authentication.pdf <span style='color:#111;'> 3.29MB </span>","children":null,"spread":false},{"title":"Experience: Implications of Roaming in Europe.pdf <span style='color:#111;'> 1.58MB </span>","children":null,"spread":false},{"title":"EchoPrint: Two-factor Authentication using Acoustics and Vision on Smartphones.pdf <span style='color:#111;'> 1.91MB </span>","children":null,"spread":false},{"title":"Challenge: RFID Hacking for Fun and Profit.pdf <span style='color:#111;'> 3.09MB </span>","children":null,"spread":false},{"title":"Verification: Accuracy Evaluation of WiFi Fine Time Measurements on an Open Platform.pdf <span style='color:#111;'> 5.09MB </span>","children":null,"spread":false},{"title":"LiSteer: mmWave Beam Acquisition and Steering by Tracking Indicator LEDs on Wireless APs.pdf <span style='color:#111;'> 4.98MB </span>","children":null,"spread":false}],"spread":false}],"spread":true}]