Philipp H. Kindt
YOU?
Author Swipe
View article: How reliable is smartphone-based electronic contact tracing for COVID-19?
How reliable is smartphone-based electronic contact tracing for COVID-19? Open
A look through the lens of neighbor discovery protocols reveals significant potential to improve electronic contact-tracing accuracy.
View article: Performance Limits of Neighbor Discovery in Wireless Networks
Performance Limits of Neighbor Discovery in Wireless Networks Open
Neighbor Discovery (ND) is the procedure employed by wireless devices to establish a first contact. All ND protocols involve devices sending beacons, and also listening for them. Protocols differ in terms of how the beacon transmissions an…
View article: A Comprehensive Review of Automated Data Annotation Techniques in Human Activity Recognition
A Comprehensive Review of Automated Data Annotation Techniques in Human Activity Recognition Open
Human Activity Recognition (HAR) has become one of the leading research topics of the last decade. As sensing technologies have matured and their economic costs have declined, a host of novel applications, e.g., in healthcare, industry, sp…
View article: A Low-Cost Wireless Body Area Network for Human Activity Recognition in Healthy Life and Medical Applications
A Low-Cost Wireless Body Area Network for Human Activity Recognition in Healthy Life and Medical Applications Open
Moved by the necessity, also related to the ongoing COVID-19 pandemic, of the design of innovative solutions in the context of digital health, and digital medicine, Wireless Body Area Networks (WBANs) are more and more emerging as a centra…
View article: A Dataset on CSI-based Activity Recognition in Real-World Environments
A Dataset on CSI-based Activity Recognition in Real-World Environments Open
Activity recognition, e.g., identifying individuals, recognizing their physical activities, or estimating their number in a room, based on WiFi's Channel State Information (CSI) has been studied intensively in the last decade. While most …
View article: A Dataset on CSI-based Activity Recognition in Real-World Environments
A Dataset on CSI-based Activity Recognition in Real-World Environments Open
Activity recognition, e.g., identifying individuals, recognizing their physical activities, or estimating their number in a room, based on WiFi's Channel State Information (CSI) has been studied intensively in the last decade. While most …
View article: WiFiEye -- Seeing over WiFi Made Accessible
WiFiEye -- Seeing over WiFi Made Accessible Open
While commonly used for communication purposes, an increasing number of recent studies consider WiFi for sensing. In particular, wireless signals are altered (e.g., reflected and attenuated) by the human body and objects in the environment…
View article: Identifying the BLE Advertising Channel for Reliable Distance Estimation on Smartphones
Identifying the BLE Advertising Channel for Reliable Distance Estimation on Smartphones Open
Estimating the distance between two smartphones plays an important role in a host of applications. For this purpose, smartphones emit and scan for Bluetooth Low Energy (BLE) signals. When a device is detected, the distance is estimated by …
View article: How reliable is smartphone-based electronic contact tracing for COVID-19?
How reliable is smartphone-based electronic contact tracing for COVID-19? Open
A look through the lens of neighbor discovery protocols reveals significant potential to improve electronic contact-tracing accuracy.
View article: Estimating Indoor Occupancy Through Low-Cost BLE Devices
Estimating Indoor Occupancy Through Low-Cost BLE Devices Open
Detecting the presence of persons and estimating their quantity in an indoor environment has grown in importance recently. For example, the information if a room is unoccupied can be used for automatically switching off the light, air cond…
View article: Performance Limits of Neighbor Discovery in Wireless Networks
Performance Limits of Neighbor Discovery in Wireless Networks Open
Neighbor Discovery (ND) is the process employed by two wireless devices to discover each other. There are many different ND protocols, both in the scientific literature and also those employed in practice. All ND protocols involve devices …
View article: Optimizing BLE-Like Neighbor Discovery
Optimizing BLE-Like Neighbor Discovery Open
Neighbor discovery (ND) protocols are used for establishing a first contact between multiple wireless devices. The energy consumption and discovery latency of this procedure are determined by the parametrization of the protocol. In most ex…
View article: Digital Contact Tracing Service: An improved decentralized design for privacy and effectiveness
Digital Contact Tracing Service: An improved decentralized design for privacy and effectiveness Open
We propose a decentralized digital contact tracing service that preserves the users' privacy by design while complying to the highest security standards. Our approach is based on Bluetooth and measures actual encounters of people, the cont…
View article: Identifying the BLE Advertising Channel for Reliable Distance Estimation on Smartphones
Identifying the BLE Advertising Channel for Reliable Distance Estimation on Smartphones Open
As a response to the global COVID-19 surge in 2020, many countries have implemented lockdown or stay-at-home policies. If, however, the contact persons of every infected patient could be identified, the number of virus transmissions could …
View article: Configuring loosely time-triggered wireless control software
Configuring loosely time-triggered wireless control software Open
In many wireless control networks, sensor data and controller data are exchanged periodically, which requires periodic packet transmissions between the physical plant and the controller. As an alternative, event-triggered control paradigms…
View article: Power-aware Reliable Communication for the IoT
Power-aware Reliable Communication for the IoT Open
Wireless devices are becoming increasingly pervasive in our everyday life and hence, robust wireless connectivity is a crucial requirement for a host of applications. In particular, with the IoT becoming a reality, an increasing number of …
View article: Fast Collision Simulation for Cyclic Wireless Protocols
Fast Collision Simulation for Cyclic Wireless Protocols Open
With most modern smartphones supporting wireless protocols such as Bluetooth Low Energy (BLE) or ANT+, the number of networks are growing rapidly. Therefore, collisions among multiple networks need to be considered for choosing the appropr…
View article: Understanding slotless neighbor discovery
Understanding slotless neighbor discovery Open
The process of two wireless devices meeting over-the-air for the first time is referred to as neighbor discovery. In mobile ad-hoc networks, battery powered devices duty-cycle their radios during neighbor discovery. As a result, they trans…
View article: Griassdi
Griassdi Open
Recent results show that slotless, purely-interval based neighbor discovery protocols, in which time is assumed to be continuous, achieve significantly lower worst-case discovery latencies than time-slotted protocols. In slotted protocols,…
View article: Dynamic Stabilization of Simple Fractures With Active Plates Delivers Stronger Healing Than Conventional Compression Plating
Dynamic Stabilization of Simple Fractures With Active Plates Delivers Stronger Healing Than Conventional Compression Plating Open
Objectives: Active plates dynamize a fracture by elastic suspension of screw holes within the plate. We hypothesized that dynamic stabilization with active plates delivers stronger healing relative to standard compression plating. Methods:…
View article: Slotless Protocols for Fast and Energy-Efficient Neighbor Discovery
Slotless Protocols for Fast and Energy-Efficient Neighbor Discovery Open
In mobile ad-hoc networks, neighbor discovery protocols are used to find surrounding devices and to establish a first contact between them. Since the clocks of the devices are not synchronized and their energy-budgets are limited, usually …