- Opportunistic and Delay-Tolerant Networks
- Distributed and Parallel Computing Systems
- IoT and Edge/Fog Computing
- Caching and Content Delivery
- Cloud Computing and Resource Management
- Context-Aware Activity Recognition Systems
- Mobile Ad Hoc Networks
- Distributed systems and fault tolerance
- Peer-to-Peer Network Technologies
- Human Mobility and Location-Based Analysis
- Parallel Computing and Optimization Techniques
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Data Storage Technologies
- Service-Oriented Architecture and Web Services
- Mobile Crowdsensing and Crowdsourcing
- Scientific Computing and Data Management
- Simulation Techniques and Applications
- Energy Efficient Wireless Sensor Networks
- Privacy-Preserving Technologies in Data
- Technology Use by Older Adults
- Software System Performance and Reliability
- ICT in Developing Communities
- Blockchain Technology Applications and Security
- Traffic Prediction and Management Techniques
- Indoor and Outdoor Localization Technologies
Universitatea Națională de Știință și Tehnologie Politehnica București
2015-2024
Transylvania University of Brașov
2024
University of Science and Technology
2024
National Institute for Research and Development in Informatics - ICI Bucharest
2017-2023
University of Bucharest
2007-2023
HES-SO University of Applied Sciences and Arts Western Switzerland
2023
University of Geneva
2023
Franche-Comté Électronique Mécanique Thermique et Optique - Sciences et Technologies
2023
Centre National de la Recherche Scientifique
2023
University of Nicosia
2023
Because the number of elderly people is predicted to increase quickly in upcoming years, “aging place” (which refers living at home regardless age and other factors) becoming an important topic area ambient assisted living. Therefore, this paper, we propose a human physical activity recognition system based on data collected from smartphone sensors. The proposed approach implies developing classifier using three sensors available smartphone: accelerometer, gyroscope, gravity sensor. We have...
A disruptive technology often used in finance, Internet of Things (IoT) and healthcare, blockchain can reach consensus within a decentralised network-potentially composed large amounts unreliable nodes-and to permanently irreversibly store data tamper-proof manner. In this paper, we present reputation system for Intelligent Transportation Systems (ITS). It considers the users interested traffic information as main actors architecture. They securely share their which are collectively...
Abstract Background Quality of life (QOL) is a complex concept known for being influenced by socio-demographic characteristics, individual needs, perceptions and expectations. The study investigates influences such heterogeneous variables aims to identify describe subgroups older patients who share similar response patterns the four domains (physical health, psychological social relationships environment) World Health Organization Life instrument, Short Form (WHOQOL-BREF). Methods sample...
Ubiquitous computing paradigms, empowered by the fifth-generation networking and emerging smart ambient intelligence environments, could play a crucial role in creating better living environments for activity-challenged individuals, such as disabled or elderly people requiring constant care. Cloud has been an empowering force this endeavor, although it raises several ethical, security, user experience issues. This article presents virtualized fog-based infrastructure harvesting managing...
Blockchain is a technology that offers the ability to create new business models and solves trust issues in more efficient way. It can lead many research opportunities innovations. Academia industry proposed blockchain based software solutions within wide range of domains. In this paper we present system design where be used healthcare system, vital information regarding medical analyses are shared between hospitals, clinics institutes on access policies defined by patients. order protect...
Opportunistic networks are mobile that rely on the store-carry-and-forward paradigm, using contacts between nodes to opportunistically transfer data. For this reason, traditional routing mechanisms no longer suitable. To increase probability of successfull message delivery, we propose SPRINT, an opportunistic algorithm introduces additional criterion: online social information about nodes. Furthermore, previous results show that, for particular environments, devices in highly predictable....
Data dissemination in opportunistic networks poses a series of challenges, since there is no central entity aware all the nodes' subscriptions. Each individual node only its own interests and those that it contact with, if any. Thus, generally performed using epidemic algorithms flood network, but they have disadvantage network overhead congestion are very high. In this paper, we propose ONSIDE, an algorithm leverages node's online social connections (i.e. friends on such as Facebook or...
Summary Machine learning has recently entered the area of network traffic classification as an alternative to deep packet inspection technique. It provides both unsupervised and supervised algorithms that are capable put aside similar types or recognize Internet protocols based on some training, pre‐labeled samples. The current work proposes a new approach in using machine learning. First, we extract unidirectional bidirectional flows from capture. A flow is collection packets share sender...
Biometric and password-based two-factor authentication has received attention from the community over past decades because of its simplicity, portability, robustness. In wireless body area networks (WBANs), dozens key agreement schemes have been proposed. Despite well-studied security issues, preserving user privacy in these is still challenging. this work, we propose biometric-based (BAKA), a scheme based on fuzzy extractor for WBAN, where novel biometric algorithm proposed by using to...
In particular types of Delay-Tolerant Networks (DTN) such as Opportunistic Mobile Networks, node connectivity is transient. For this reason, traditional routing mechanisms are no longer suitable. New approaches use social relations between mobile users a criterion for the process. We argue that in an approach, nodes with high popularity may quickly deplete their energy resources - and, therefore, might be unwilling to participate show social-based algorithms BUBBLE Rap prone behavior, and...
Recent endeavors in mobile computing concentration analyzing the predictability of human behavior by means mobility models synthesized from real user traces. Currently, main focus such studies is physic allocation: discovering travel patterns, estimating movements and anticipating whereabouts dynamics individuals. In this paper, we propose to widen analyzed context as take into account a more natural activity inhuman behavior, namely interaction. As such, explore synergy based on tracing...
The high proliferation of on-line gaming along with the demands availability network resources, created need for development Cloudified services that will augment computation capabilities mobile devices. To this end, work elaborates on design, and comparative evaluation other similar models, as well real-time comparisons through emulators, a process-offloading scheme is based opportunistic cloud computing approach. According to proposed approach, each device access interactive -delay...
Crowd Monitoring is receiving much attention. An increasingly popular technique to scan for mobile devices, notably smartphones. We take a look at scanning such devices by recording WiFi packets. Although research on capturing crowd patterns using detections has been done, there are not many published results when it comes tracking movements. This surprising realizing that the data provided scanners susceptible seemingly erroneous and missed detections, caused use of randomized network...