Yohan Chon, Suyeon Kim, Seungwoo Lee, Dongwon Kim, Yungeun Kim, H. Cha
Mobile sensing systems employ various sensors in smartphones to extract human-related information. As the demand for sensing systems increases, a more effective mechanism is required to sense information about human life. In this paper, we present a systematic study on the feasibility and gaining properties of a crowdsensing system that primarily concerns sensing WiFi packets in the air. We propose that this method is effective for estimating urban mobility by using only a small number of participants. During a seven-week deployment, we collected smartphone sensor data, including approximately four million WiFi packets from more than 130,000 unique devices in a city. Our analysis of this dataset examines core issues in urban mobility monitoring, including feasibility, spatio-temporal coverage, scalability, and threats to privacy. Collectively, our findings provide valuable insights to guide the development of new mobile sensing systems for urban life monitoring.
{"title":"Sensing WiFi packets in the air: practicality and implications in urban mobility monitoring","authors":"Yohan Chon, Suyeon Kim, Seungwoo Lee, Dongwon Kim, Yungeun Kim, H. Cha","doi":"10.1145/2632048.2636066","DOIUrl":"https://doi.org/10.1145/2632048.2636066","url":null,"abstract":"Mobile sensing systems employ various sensors in smartphones to extract human-related information. As the demand for sensing systems increases, a more effective mechanism is required to sense information about human life. In this paper, we present a systematic study on the feasibility and gaining properties of a crowdsensing system that primarily concerns sensing WiFi packets in the air. We propose that this method is effective for estimating urban mobility by using only a small number of participants. During a seven-week deployment, we collected smartphone sensor data, including approximately four million WiFi packets from more than 130,000 unique devices in a city. Our analysis of this dataset examines core issues in urban mobility monitoring, including feasibility, spatio-temporal coverage, scalability, and threats to privacy. Collectively, our findings provide valuable insights to guide the development of new mobile sensing systems for urban life monitoring.","PeriodicalId":20496,"journal":{"name":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91310243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuuki Fukuzaki, N. Nishio, M. Mochizuki, Kazuya Murao
The authors have been developing the system, which analyzes pedestrian flow using Wi-Fi packet sensors. The sensors collect Wi-Fi packet called probe request packet, which is transmitted from a smartphone to search Wi-Fi access points. In addition, the cloud storage server is running to manage observed packets centrally and to compute pedestrian flow in real time. Additionally, user movement history is vitally important and we have to pay close attention to handling that kind of data. Therefore, the system runs with an anonymization method and a cryptographic function. Some kinds of demonstration experiments were held in real environment. As a result, it was confirmed that we can analyze the rough tendency of pedestrian flow using the present system and simple analysis methods.
{"title":"A pedestrian flow analysis system using Wi-Fi packet sensors to a real environment","authors":"Yuuki Fukuzaki, N. Nishio, M. Mochizuki, Kazuya Murao","doi":"10.1145/2638728.2641312","DOIUrl":"https://doi.org/10.1145/2638728.2641312","url":null,"abstract":"The authors have been developing the system, which analyzes pedestrian flow using Wi-Fi packet sensors. The sensors collect Wi-Fi packet called probe request packet, which is transmitted from a smartphone to search Wi-Fi access points. In addition, the cloud storage server is running to manage observed packets centrally and to compute pedestrian flow in real time. Additionally, user movement history is vitally important and we have to pay close attention to handling that kind of data. Therefore, the system runs with an anonymization method and a cryptographic function. Some kinds of demonstration experiments were held in real environment. As a result, it was confirmed that we can analyze the rough tendency of pedestrian flow using the present system and simple analysis methods.","PeriodicalId":20496,"journal":{"name":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87150368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sharing personal informatics data to social networking sites is a common and well-studied practice in both research and commercial applications, but there have been substantial mistakes and failures within this space that offer important lessons to application developers. We discuss three common types of failures salient in our own work, other research, and popular press stories. These failures surface important open questions to the field of personal informatics.
{"title":"Failures in sharing personal data on social networking sites","authors":"Daniel A. Epstein, J. Fogarty, Sean A Munson","doi":"10.1145/2638728.2641317","DOIUrl":"https://doi.org/10.1145/2638728.2641317","url":null,"abstract":"Sharing personal informatics data to social networking sites is a common and well-studied practice in both research and commercial applications, but there have been substantial mistakes and failures within this space that offer important lessons to application developers. We discuss three common types of failures salient in our own work, other research, and popular press stories. These failures surface important open questions to the field of personal informatics.","PeriodicalId":20496,"journal":{"name":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87280950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: In the home","authors":"Shwetak N. Patel","doi":"10.1145/3255099","DOIUrl":"https://doi.org/10.1145/3255099","url":null,"abstract":"","PeriodicalId":20496,"journal":{"name":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","volume":"88 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73553228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christa Simon, Ramyar Saeedi, Chris Cain, M. Schmitter-Edgecombe, Shervin Hajiamini, D. Cook
Prompting technology can help individuals with cognitive impairments complete independent activities of daily living (IADL). Although the prompt delivery is an effective way to remind an adult to record a completed activity, this potential benefit may not be sufficient to motivate the adult to comply with the prompt on a consistent basis. In this work we extend activity-aware prompting techniques to utilize alternative reward structures. Our reward mechanism will allow adults to observe game progress as a result of their decisions to comply with the prompts. In our study with volunteer participants, the activity-aware reward-based prompting method increased the compliance rate compared to activity-aware prompting without rewarding the adults.
{"title":"Digital memory notebook: experimental evaluation of motivational reward strategies","authors":"Christa Simon, Ramyar Saeedi, Chris Cain, M. Schmitter-Edgecombe, Shervin Hajiamini, D. Cook","doi":"10.1145/2638728.2638808","DOIUrl":"https://doi.org/10.1145/2638728.2638808","url":null,"abstract":"Prompting technology can help individuals with cognitive impairments complete independent activities of daily living (IADL). Although the prompt delivery is an effective way to remind an adult to record a completed activity, this potential benefit may not be sufficient to motivate the adult to comply with the prompt on a consistent basis. In this work we extend activity-aware prompting techniques to utilize alternative reward structures. Our reward mechanism will allow adults to observe game progress as a result of their decisions to comply with the prompts. In our study with volunteer participants, the activity-aware reward-based prompting method increased the compliance rate compared to activity-aware prompting without rewarding the adults.","PeriodicalId":20496,"journal":{"name":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88869983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Body signals","authors":"A. Sample","doi":"10.1145/3255113","DOIUrl":"https://doi.org/10.1145/3255113","url":null,"abstract":"","PeriodicalId":20496,"journal":{"name":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90569957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Public displays & interactions","authors":"J. Kay","doi":"10.1145/3255109","DOIUrl":"https://doi.org/10.1145/3255109","url":null,"abstract":"","PeriodicalId":20496,"journal":{"name":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","volume":"70 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90606420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. D'Hondt, Jesse Zaman, Eline Philips, E. G. Boix, W. Meuter
In this paper we argue the need for orchestration support for participatory campaigns to achieve campaign quality, and automatisation of said support to achieve scalability, both issues contributing to stakeholder usability. This goes further than providing support for defining campaigns, an issue tackled in prior work. We provide a formal definition for a campaign by extracting commonalities from the state of the art and expertise in organising noise mapping campaigns. Next, we formalise how to ensure campaigns end successfully, and translate this formal notion into an operational recipe for dynamic orchestration. We then present a framework for automatising campaign definition, monitoring and orchestration which relies on workflow technology. The framework is validated by re-enacting several campaigns previously run through manual orchestration and quantifying the increased efficiency.
{"title":"Orchestration support for participatory sensing campaigns","authors":"E. D'Hondt, Jesse Zaman, Eline Philips, E. G. Boix, W. Meuter","doi":"10.1145/2632048.2632105","DOIUrl":"https://doi.org/10.1145/2632048.2632105","url":null,"abstract":"In this paper we argue the need for orchestration support for participatory campaigns to achieve campaign quality, and automatisation of said support to achieve scalability, both issues contributing to stakeholder usability. This goes further than providing support for defining campaigns, an issue tackled in prior work. We provide a formal definition for a campaign by extracting commonalities from the state of the art and expertise in organising noise mapping campaigns. Next, we formalise how to ensure campaigns end successfully, and translate this formal notion into an operational recipe for dynamic orchestration. We then present a framework for automatising campaign definition, monitoring and orchestration which relies on workflow technology. The framework is validated by re-enacting several campaigns previously run through manual orchestration and quantifying the increased efficiency.","PeriodicalId":20496,"journal":{"name":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","volume":"78 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89424802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Quality improvement in mobile applications should be based on the consideration of several factors, such as users' diversity in spatio-temporal usage, as well as the device's resource usage, including battery life. Although application tuning should consider this practical issue, it is difficult to ensure the success of this process during the development stage due to the lack of information about application usage. This paper proposes a user interaction-based profiling system to overcome the limitations of development-level application debugging. In our system, the analysis of both device behavior and energy consumption is possible with fine-grained process-level application monitoring. By providing fine-grained information, including user interaction, system behavior, and power consumption, our system provides meaningful analysis for application tuning. The proposed method does not require the source code of the application and uses a web-based framework so that users can easily provide their usage data. Our case study with a few popular applications demonstrates that the proposed system is practical and useful for application tuning.
{"title":"User interaction-based profiling system for Android application tuning","authors":"Seokjun Lee, Chanmin Yoon, H. Cha","doi":"10.1145/2632048.2636091","DOIUrl":"https://doi.org/10.1145/2632048.2636091","url":null,"abstract":"Quality improvement in mobile applications should be based on the consideration of several factors, such as users' diversity in spatio-temporal usage, as well as the device's resource usage, including battery life. Although application tuning should consider this practical issue, it is difficult to ensure the success of this process during the development stage due to the lack of information about application usage. This paper proposes a user interaction-based profiling system to overcome the limitations of development-level application debugging. In our system, the analysis of both device behavior and energy consumption is possible with fine-grained process-level application monitoring. By providing fine-grained information, including user interaction, system behavior, and power consumption, our system provides meaningful analysis for application tuning. The proposed method does not require the source code of the application and uses a web-based framework so that users can easily provide their usage data. Our case study with a few popular applications demonstrates that the proposed system is practical and useful for application tuning.","PeriodicalId":20496,"journal":{"name":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87999127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Tei, Kazuya Aizawa, S. Suenaga, R. Takahashi, Shun Lee, Y. Fukazawa
Home cleaning robots have become popular. Most of the home cleaning robots are based on ground vehicles. While the cleaning robots based on ground vehicles can vacuum or wash floors robustly and efficiently, but they only clean on floors, not on stairs or furnitures. In this demo, we show a new concept of cleaning robot, called HoppingDuster. HoppingDuster is based on an aerial vehicle, which can y to stairs or furnitures to be cleaned, and hop or hover to wipe or blow down dust on them toward the floor so that the ground cleaning robot can vacuum the dust. HoppingDuster adapts its behavior to finish it cleaning within designated time and battery capacity.
{"title":"HoppingDuster: self-adaptive cleaning robot based on aerial vehicle","authors":"K. Tei, Kazuya Aizawa, S. Suenaga, R. Takahashi, Shun Lee, Y. Fukazawa","doi":"10.1145/2638728.2638767","DOIUrl":"https://doi.org/10.1145/2638728.2638767","url":null,"abstract":"Home cleaning robots have become popular. Most of the home cleaning robots are based on ground vehicles. While the cleaning robots based on ground vehicles can vacuum or wash floors robustly and efficiently, but they only clean on floors, not on stairs or furnitures. In this demo, we show a new concept of cleaning robot, called HoppingDuster. HoppingDuster is based on an aerial vehicle, which can y to stairs or furnitures to be cleaned, and hop or hover to wipe or blow down dust on them toward the floor so that the ground cleaning robot can vacuum the dust. HoppingDuster adapts its behavior to finish it cleaning within designated time and battery capacity.","PeriodicalId":20496,"journal":{"name":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2014-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86678180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}