Pub Date : 2015-03-16DOI: 10.1109/ICMU.2015.7061031
Hazleen Aris
Continual increase in household items prices has prompted the need to have a mechanism that enables comparison of prices to be made between different stores. Through the comparison, consumers are able to find stores that sell items at lower prices, hence helping them to save on their household expenditures. The success of this mechanism strongly relies on the timeliness and comprehensiveness of the prices information. Due to the large number of stores available and the nature of items prices that keep changing from time to time, ensuring the timeliness and comprehensiveness of the information is very challenging. Mobile crowdsourcing was therefore identified as the most suitable method to be used in addressing the challenge, because in mobile crowdsourcing, the information will be contributed by the consumers through their mobile devices. Hence, the sources of information are unlimited, both temporally and spatially. A critical success factor of this mechanism, which also holds true in any crowdsourcing-based application, is the volume of participating crowd, in this case, the consumers. Without their participation, the objective of any crowdsourcing activities cannot be achieved. Therefore, in this paper, an adhesive architecture for mobile crowdsourcing is proposed, which took into consideration the elements that can help in attracting consistent participation from the crowd.
{"title":"An architecture for adhesive mobile crowdsourcing application","authors":"Hazleen Aris","doi":"10.1109/ICMU.2015.7061031","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061031","url":null,"abstract":"Continual increase in household items prices has prompted the need to have a mechanism that enables comparison of prices to be made between different stores. Through the comparison, consumers are able to find stores that sell items at lower prices, hence helping them to save on their household expenditures. The success of this mechanism strongly relies on the timeliness and comprehensiveness of the prices information. Due to the large number of stores available and the nature of items prices that keep changing from time to time, ensuring the timeliness and comprehensiveness of the information is very challenging. Mobile crowdsourcing was therefore identified as the most suitable method to be used in addressing the challenge, because in mobile crowdsourcing, the information will be contributed by the consumers through their mobile devices. Hence, the sources of information are unlimited, both temporally and spatially. A critical success factor of this mechanism, which also holds true in any crowdsourcing-based application, is the volume of participating crowd, in this case, the consumers. Without their participation, the objective of any crowdsourcing activities cannot be achieved. Therefore, in this paper, an adhesive architecture for mobile crowdsourcing is proposed, which took into consideration the elements that can help in attracting consistent participation from the crowd.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129381935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-16DOI: 10.1109/ICMU.2015.7061034
J. T. B. Fajardo, K. Yasumoto, Hiroyuki Seki
For the past decade, there has been an increase in the frequency and impact of natural disasters. Information and communications technology (ICT) can be used to minimize the impact of disasters in many ways. However, before deployment, disaster-related ICT systems need to be tested and validated using the appropriate modeling and simulation tools. In this study, we propose a post-disaster mobility model at the community level based on real-world data during the aftermath of Typhoon Haiyan. The construction of an appropriate model is challenging because of the large amount of heterogeneous data collected. Nevertheless, a mobility model from these disaster big data will be useful in evaluating the effectiveness of different ICT-based disaster application systems.
{"title":"A post-haiyan community level mobility model","authors":"J. T. B. Fajardo, K. Yasumoto, Hiroyuki Seki","doi":"10.1109/ICMU.2015.7061034","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061034","url":null,"abstract":"For the past decade, there has been an increase in the frequency and impact of natural disasters. Information and communications technology (ICT) can be used to minimize the impact of disasters in many ways. However, before deployment, disaster-related ICT systems need to be tested and validated using the appropriate modeling and simulation tools. In this study, we propose a post-disaster mobility model at the community level based on real-world data during the aftermath of Typhoon Haiyan. The construction of an appropriate model is challenging because of the large amount of heterogeneous data collected. Nevertheless, a mobility model from these disaster big data will be useful in evaluating the effectiveness of different ICT-based disaster application systems.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131402279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-16DOI: 10.1109/ICMU.2015.7061056
Jinxiao Zhu, Yin Chen, Yoshitaka Nakamura, Xiaohong Jiang, O. Takahashi, N. Shiratori
Recently, there has been a growing interest in applying multiple antennas to achieve information-theoretic security in wireless communication networks. In this paper, we consider the transmission of common confidential data from a single-antenna transmitter to multiple multi-antenna receivers in the presence of multiple multi-antenna eavesdroppers. Both the receivers and eavesdroppers employ maximal-ratio combining (MRC) to combine the signals received at multiple antennas. For the considered system, we derive its connection outage probability and secrecy outage probability to characterize the reliability level and the security level, respectively. Numerical results are also provided to analyze the tradeoff among the reliability and security performances and the number of antennas (or nodes) of either receivers or eavesdroppers.
{"title":"Outage performance of secure multicasting in the presence of multiple eavesdroppers","authors":"Jinxiao Zhu, Yin Chen, Yoshitaka Nakamura, Xiaohong Jiang, O. Takahashi, N. Shiratori","doi":"10.1109/ICMU.2015.7061056","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061056","url":null,"abstract":"Recently, there has been a growing interest in applying multiple antennas to achieve information-theoretic security in wireless communication networks. In this paper, we consider the transmission of common confidential data from a single-antenna transmitter to multiple multi-antenna receivers in the presence of multiple multi-antenna eavesdroppers. Both the receivers and eavesdroppers employ maximal-ratio combining (MRC) to combine the signals received at multiple antennas. For the considered system, we derive its connection outage probability and secrecy outage probability to characterize the reliability level and the security level, respectively. Numerical results are also provided to analyze the tradeoff among the reliability and security performances and the number of antennas (or nodes) of either receivers or eavesdroppers.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134136566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-16DOI: 10.1109/ICMU.2015.7061028
Je-ho Oh, Uichin Lee
The Quantified Self is a movement that promotes the use of technology for self-tracking various kinds of personal information, such as physical activities and energy consumption. In this paper, we study the user reviews of quantified self tools, as reported on a quantified self community website. We perform a content analysis to categorize tracking tools, and to explore user experience (UX) issues related to quantified self technologies. From this analysis, we find various tracking categories, including body state (e.g., physical and physiological), psychological state and traits, activities (e.g., exercise, eating, sleep), social interactions, and environmental and property states. Furthermore, we find the key UX issues associated with quantified self technologies, which include data controllability, data integration, data accuracy, data visualization, input complexity, sharing/privacy, design/aesthetics, and engagement. The UX issues reported in this paper have significant implications for the design of quantified self technologies.
{"title":"Exploring UX issues in Quantified Self technologies","authors":"Je-ho Oh, Uichin Lee","doi":"10.1109/ICMU.2015.7061028","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061028","url":null,"abstract":"The Quantified Self is a movement that promotes the use of technology for self-tracking various kinds of personal information, such as physical activities and energy consumption. In this paper, we study the user reviews of quantified self tools, as reported on a quantified self community website. We perform a content analysis to categorize tracking tools, and to explore user experience (UX) issues related to quantified self technologies. From this analysis, we find various tracking categories, including body state (e.g., physical and physiological), psychological state and traits, activities (e.g., exercise, eating, sleep), social interactions, and environmental and property states. Furthermore, we find the key UX issues associated with quantified self technologies, which include data controllability, data integration, data accuracy, data visualization, input complexity, sharing/privacy, design/aesthetics, and engagement. The UX issues reported in this paper have significant implications for the design of quantified self technologies.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114555361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-16DOI: 10.1109/ICMU.2015.7061033
B. T. Nukala, N. Shibuya, Amanda Rodriguez, J. Tsay, Tam Q. Nguyen, S. Zupancic, D. Lie
A comprehensive and quantified gait analysis is warranted for patients with balance disorders to prevent injury such as falls. We report here a custom-designed wireless-gait-analysis-sensor (WGAS) to perform functional gait analysis targeted for clinically evaluating balance disorders. We report here our first efforts to determine the optimal placements of the WGAS in normal subjects for movement differentiation, while minimizing outliers and data artifacts with improved sensor technology. Normal subjects performed a gold-standard Dynamic Gait Index (DGI) tests for fall risk assessment, while the WGAS was adhered to either the T4 or the nape area. Our WGAS consists of a 3-axis linear accelerometer and gyroscopes, and the real-time gait data was transmitted wirelessly to a nearby PC and statistical analysis was done on each of the 7 DGI test on 3 volunteers repeated five times for either placement. The data suggests T4 is the preferred WGAS placement for gait analysis.
{"title":"Comparing nape vs. T4 placement for a mobile Wireless Gait Analysis sensor using the Dynamic Gait Index test","authors":"B. T. Nukala, N. Shibuya, Amanda Rodriguez, J. Tsay, Tam Q. Nguyen, S. Zupancic, D. Lie","doi":"10.1109/ICMU.2015.7061033","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061033","url":null,"abstract":"A comprehensive and quantified gait analysis is warranted for patients with balance disorders to prevent injury such as falls. We report here a custom-designed wireless-gait-analysis-sensor (WGAS) to perform functional gait analysis targeted for clinically evaluating balance disorders. We report here our first efforts to determine the optimal placements of the WGAS in normal subjects for movement differentiation, while minimizing outliers and data artifacts with improved sensor technology. Normal subjects performed a gold-standard Dynamic Gait Index (DGI) tests for fall risk assessment, while the WGAS was adhered to either the T4 or the nape area. Our WGAS consists of a 3-axis linear accelerometer and gyroscopes, and the real-time gait data was transmitted wirelessly to a nearby PC and statistical analysis was done on each of the 7 DGI test on 3 volunteers repeated five times for either placement. The data suggests T4 is the preferred WGAS placement for gait analysis.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128627566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-16DOI: 10.1109/ICMU.2015.7061052
Motoi Okada, H. Aida, H. Ichikawa, M. Miki
A wireless sensor network is a technology that aims to collect real world information by wireless communication which connects many computer to network, and it is expected its practical realization. On the other hand, research on the office environment also has attracted a great deal of attention in recent years. It has been reported that light environment affects the productivity of user. In this paper, we propose wireless sensor network-driven intelligent lighting system (WSN-ILS below). WSN-ILS provides a light environment to each user by innetwork processing in wireless sensor network. WSN-ILS achieves energy-efficient light environment by performing an individual control to each lighting from sensor node. WSN-ILS has two schemes to control lighting from the sensor node. We will examine effectiveness of the WSN-ILS on an existing equipment.
{"title":"Design and implementation of an energy-efficient lighting system driven by wireless sensor networks","authors":"Motoi Okada, H. Aida, H. Ichikawa, M. Miki","doi":"10.1109/ICMU.2015.7061052","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061052","url":null,"abstract":"A wireless sensor network is a technology that aims to collect real world information by wireless communication which connects many computer to network, and it is expected its practical realization. On the other hand, research on the office environment also has attracted a great deal of attention in recent years. It has been reported that light environment affects the productivity of user. In this paper, we propose wireless sensor network-driven intelligent lighting system (WSN-ILS below). WSN-ILS provides a light environment to each user by innetwork processing in wireless sensor network. WSN-ILS achieves energy-efficient light environment by performing an individual control to each lighting from sensor node. WSN-ILS has two schemes to control lighting from the sensor node. We will examine effectiveness of the WSN-ILS on an existing equipment.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126892213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-13DOI: 10.1109/ICMU.2015.7061057
Sayaka Umeda, Sonoko Takeda, H. Shigeno
In mobile ad-hoc networks (MANETs), there are selfish nodes, which drop the received data packets, because nodes have limits of their resources. Secure routing protocols are developed as one of security mechanisms. In secure routing, each node can detect selfish nodes and decide secure paths by consulting trust values. Here, trust values express reliability for nodes or paths. In these existing routing protocols, all nodes are assumed to keep the same behavior in order to obtain the stable trust values. However, there are selfish nodes with behavior changes because resources for these mobile nodes decrease as time passes. Therefore, as it is hard to calculate accurate trusts in nodes with behavior change in real time, there are two problems. One is to make a mistake in judgment of selfish nodes and the other is not to be able to select the secure paths. In this paper, we propose TEAB, which is a trust evaluation method adapted to node behavior. We introduce the adaptive time window which is the time period for evaluating a trust value. Each node uses a variable time window for each neighbor and reduces the undesirable effects of past behaviors. In this way, each node calculates trust values correctly in the environment including nodes with behavior change. Moreover, in secure routing protocols using TEAB, each node can select the secure communication path composed of only cooperative nodes. The results of simulation show that each node can detect the selfish nodes correctly and start to communicate through the secure path by using TEAB.
{"title":"Trust evaluation method adapted to node behavior for secure routing in mobile ad hoc networks","authors":"Sayaka Umeda, Sonoko Takeda, H. Shigeno","doi":"10.1109/ICMU.2015.7061057","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061057","url":null,"abstract":"In mobile ad-hoc networks (MANETs), there are selfish nodes, which drop the received data packets, because nodes have limits of their resources. Secure routing protocols are developed as one of security mechanisms. In secure routing, each node can detect selfish nodes and decide secure paths by consulting trust values. Here, trust values express reliability for nodes or paths. In these existing routing protocols, all nodes are assumed to keep the same behavior in order to obtain the stable trust values. However, there are selfish nodes with behavior changes because resources for these mobile nodes decrease as time passes. Therefore, as it is hard to calculate accurate trusts in nodes with behavior change in real time, there are two problems. One is to make a mistake in judgment of selfish nodes and the other is not to be able to select the secure paths. In this paper, we propose TEAB, which is a trust evaluation method adapted to node behavior. We introduce the adaptive time window which is the time period for evaluating a trust value. Each node uses a variable time window for each neighbor and reduces the undesirable effects of past behaviors. In this way, each node calculates trust values correctly in the environment including nodes with behavior change. Moreover, in secure routing protocols using TEAB, each node can select the secure communication path composed of only cooperative nodes. The results of simulation show that each node can detect the selfish nodes correctly and start to communicate through the secure path by using TEAB.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129244515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-13DOI: 10.1109/ICMU.2015.7061059
Takuro Yonezawa, J. Nakazawa, H. Tokuda
According to the spread of smart devices such as smartphones and smart tablets, opportunities to communicate between them will be more increased. Though we usually use WiFi and Bluetooth, it is still burden task for end-users. Many previous techniques to collaborate devices easily has been also proposed, they are not always best solution in some situations. This paper proposes a new interaction method called Vinteracion, which leverages combination of vibrator and accelerometer to send information from smart device to the other smart device. Vinteraction enables users to use touch interaction like Near Field Communication, which provides easy and intuitive way. We present an algorithm and implementation of vibration-based communication that can be adapted to any combination of smart devices. We also present several applications which leverages Vinteraction effectively. Through an evaluation by using popular six products, we confirmed that Vinteraction is easy to use transfer method with current products with reasonable performance.
{"title":"Vinteraction: Vibration-based information transfer for smart devices","authors":"Takuro Yonezawa, J. Nakazawa, H. Tokuda","doi":"10.1109/ICMU.2015.7061059","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061059","url":null,"abstract":"According to the spread of smart devices such as smartphones and smart tablets, opportunities to communicate between them will be more increased. Though we usually use WiFi and Bluetooth, it is still burden task for end-users. Many previous techniques to collaborate devices easily has been also proposed, they are not always best solution in some situations. This paper proposes a new interaction method called Vinteracion, which leverages combination of vibrator and accelerometer to send information from smart device to the other smart device. Vinteraction enables users to use touch interaction like Near Field Communication, which provides easy and intuitive way. We present an algorithm and implementation of vibration-based communication that can be adapted to any combination of smart devices. We also present several applications which leverages Vinteraction effectively. Through an evaluation by using popular six products, we confirmed that Vinteraction is easy to use transfer method with current products with reasonable performance.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121539777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICMU.2015.7061050
M. Katoh, I. Sato, Ken-ichi Fukuda
We show that a layered architecture distributing M2M application to multiple processing entities in the M2M network is applicable for ubiquitous era. This paper firstly introduces a layered architecture of M2M system, where we put layers for the decomposition of application and the association of de-composited subroutines. Next, we categorize the association of subroutines into two patterns (sequential and random order), and model schemes on state managements (centralization and distribution). Then, we clarify the condition that the performance can be improved by distributed management in terms of processing time for two association patterns. Next, the deployment of de-composited subroutines on processing entities is discussed, where we show basic rules to reduce carried traffic. Finally, we address the requirements of messaging between two processing entities in M2M network to provide QoS such as time limitation.
{"title":"Applicability of a layered architecture adopting distributed data processing to M2M communications","authors":"M. Katoh, I. Sato, Ken-ichi Fukuda","doi":"10.1109/ICMU.2015.7061050","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061050","url":null,"abstract":"We show that a layered architecture distributing M2M application to multiple processing entities in the M2M network is applicable for ubiquitous era. This paper firstly introduces a layered architecture of M2M system, where we put layers for the decomposition of application and the association of de-composited subroutines. Next, we categorize the association of subroutines into two patterns (sequential and random order), and model schemes on state managements (centralization and distribution). Then, we clarify the condition that the performance can be improved by distributed management in terms of processing time for two association patterns. Next, the deployment of de-composited subroutines on processing entities is discussed, where we show basic rules to reduce carried traffic. Finally, we address the requirements of messaging between two processing entities in M2M network to provide QoS such as time limitation.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117048762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ICMU.2015.7061047
Yuya Niimi, S. Ishihara
In this paper, we described the design of Demand map-based data distribution scheme and preliminary simulation results. The soft-state sketch is used for the data structure of elements of Dmap information to make the size of Dmap on memory small and the system scalable. We are working on developing detailed design of the Dmap and Dmap-based data dissemination.
{"title":"Demand map-based data dissemination scheme for location dependent data in VANETs","authors":"Yuya Niimi, S. Ishihara","doi":"10.1109/ICMU.2015.7061047","DOIUrl":"https://doi.org/10.1109/ICMU.2015.7061047","url":null,"abstract":"In this paper, we described the design of Demand map-based data distribution scheme and preliminary simulation results. The soft-state sketch is used for the data structure of elements of Dmap information to make the size of Dmap on memory small and the system scalable. We are working on developing detailed design of the Dmap and Dmap-based data dissemination.","PeriodicalId":251023,"journal":{"name":"2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICMU)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122521979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}