Mingliang Li, Hao Lin, Cai Liu, Zhenhua Li, Feng Qian, Yunhao Liu, N. Sun, Tianyi Xu
In the past decade, numerous efforts, from both academia and industry, have been made to make batteries in mobile devices last longer on a single charge. Our own research identified a new class of software bugs called energy bugs [1-4] that cause mobile software to quickly drain battery. We built and released numerous tools to detect and mitigate these bugs [2,4,5]. We also suggested energy optimizations in the OS; for instance, OS can suppress activities of background apps that are not being opened by the user [6].
{"title":"EXPERIENCE","authors":"Mingliang Li, Hao Lin, Cai Liu, Zhenhua Li, Feng Qian, Yunhao Liu, N. Sun, Tianyi Xu","doi":"10.1145/3568113.3568115","DOIUrl":"https://doi.org/10.1145/3568113.3568115","url":null,"abstract":"In the past decade, numerous efforts, from both academia and industry, have been made to make batteries in mobile devices last longer on a single charge. Our own research identified a new class of software bugs called energy bugs [1-4] that cause mobile software to quickly drain battery. We built and released numerous tools to detect and mitigate these bugs [2,4,5]. We also suggested energy optimizations in the OS; for instance, OS can suppress activities of background apps that are not being opened by the user [6].","PeriodicalId":29918,"journal":{"name":"GetMobile-Mobile Computing & Communications Review","volume":"16 1","pages":"5 - 8"},"PeriodicalIF":1.0,"publicationDate":"2020-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79847264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The recipient of the 2019 SIGMOBILE RockStar Award is Xia Zhou, an associate professor of computer science at Dartmouth College. With this award, the awards committee recognizes the depth, impact and novelty of Zhou's outstanding early-career contributions and impact to the field of mobile computing and wireless networks.
{"title":"2019 ACM SIGMOBILE Rockstar Award","authors":"Xia Zhou","doi":"10.1145/3379092.3379096","DOIUrl":"https://doi.org/10.1145/3379092.3379096","url":null,"abstract":"The recipient of the 2019 SIGMOBILE RockStar Award is Xia Zhou, an associate professor of computer science at Dartmouth College. With this award, the awards committee recognizes the depth, impact and novelty of Zhou's outstanding early-career contributions and impact to the field of mobile computing and wireless networks.","PeriodicalId":29918,"journal":{"name":"GetMobile-Mobile Computing & Communications Review","volume":"36 1","pages":"9 - 9"},"PeriodicalIF":1.0,"publicationDate":"2020-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90575126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Passive ultra-high frequency (UHF) radio frequency identification (RFID) technology has been widely adopted by retail and other industries for serialized item-level identification and data sharing. This article introduces the standards that support and define all procedures in various passive UHF RFID applications. Electronic Product Code (EPC) Radio-Frequency Identity Protocols Generation-2 UHF RFID Standard, or C1G2, is a foundational standard that defines the format, encoding, and procedures within the air interfaces of RFID systems. Low Level Reader Protocol provides a standard and portable interface between different applications and RFID readers from different vendors. The format and encoding of the EPC information are defined by the EPC Tag Data Standard, which enables each tag to be uniquely identified (e.g., item-level identity of many goods in a warehouse). Additional protocols, such as Discovery, Configuration and Initialization and Reader Management, specify and clarify more processes (e.g., the management of many readers) that can be deployed in various business applications. We provide a general introduction of passive UHF RFID technology standards and review each protocol's features and procedures.
{"title":"Standards for Passive UHF RFID","authors":"Jian Zhang, S. Periaswamy, S. Mao, J. Patton","doi":"10.1145/3379092.3379098","DOIUrl":"https://doi.org/10.1145/3379092.3379098","url":null,"abstract":"Passive ultra-high frequency (UHF) radio frequency identification (RFID) technology has been widely adopted by retail and other industries for serialized item-level identification and data sharing. This article introduces the standards that support and define all procedures in various passive UHF RFID applications. Electronic Product Code (EPC) Radio-Frequency Identity Protocols Generation-2 UHF RFID Standard, or C1G2, is a foundational standard that defines the format, encoding, and procedures within the air interfaces of RFID systems. Low Level Reader Protocol provides a standard and portable interface between different applications and RFID readers from different vendors. The format and encoding of the EPC information are defined by the EPC Tag Data Standard, which enables each tag to be uniquely identified (e.g., item-level identity of many goods in a warehouse). Additional protocols, such as Discovery, Configuration and Initialization and Reader Management, specify and clarify more processes (e.g., the management of many readers) that can be deployed in various business applications. We provide a general introduction of passive UHF RFID technology standards and review each protocol's features and procedures.","PeriodicalId":29918,"journal":{"name":"GetMobile-Mobile Computing & Communications Review","volume":"26 1","pages":"10 - 15"},"PeriodicalIF":1.0,"publicationDate":"2020-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81084928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With great power comes - besides great responsibility - big energy drain, especially where Internet of Things (IoT) devices are considered. Indeed, despite significant improvements in design and manufacturing, energy efficiency remains a critical design consideration for IoT, particularly for devices operating continuous sensing. The energy footprint of these devices has traditionally been measured using hardware power monitors (such as Monsoon power meter), which provide an accurate view of instantaneous power use. However, power meters require direct connection with the device's power source (such as battery) and hence can be used to measure energy drain only on devices with detachable power sources.
{"title":"Estimating Energy Footprint Using Thermal Imaging","authors":"Huber Flores, Jonatan Hamberg, Xin Li, Titti Malmivirta, Agustin Zuniga, Eemil Lagerspetz, P. Nurmi","doi":"10.1145/3379092.3379094","DOIUrl":"https://doi.org/10.1145/3379092.3379094","url":null,"abstract":"With great power comes - besides great responsibility - big energy drain, especially where Internet of Things (IoT) devices are considered. Indeed, despite significant improvements in design and manufacturing, energy efficiency remains a critical design consideration for IoT, particularly for devices operating continuous sensing. The energy footprint of these devices has traditionally been measured using hardware power monitors (such as Monsoon power meter), which provide an accurate view of instantaneous power use. However, power meters require direct connection with the device's power source (such as battery) and hence can be used to measure energy drain only on devices with detachable power sources.","PeriodicalId":29918,"journal":{"name":"GetMobile-Mobile Computing & Communications Review","volume":"36 1","pages":"5 - 8"},"PeriodicalIF":1.0,"publicationDate":"2020-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73425544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Sano, Tauhidur Rahman, Mi Zhang, Deepak Ganesan, Tanzeem Choudhury
Human biology is deeply rooted in the daily 24-hour temporal period. Our biochemistry varies significantly and idiosyncratically over the course of a day. Staying out of sync with one's circadian rhythm can lead to many complications over time, including a higher likelihood for cardiovascular disease, cancer, obesity, and mental health problems [1]. Constant changes in daily rhythm due to shift work has been shown to increase risk factors for cancer, obesity, and Type 2 diabetes. Moreover, the advent of technology and the resultant always-on ethos can cause rhythm disruption on personal and societal levels for about 70% of the population [2]. Circadian disruption can also cause a serious deficit in cognitive performance. In particular, alertness - a key biological process underlying our cognitive performance - reflects circadian rhythms [3]. Sleep deprivation and circadian disruption can result in poor alertness and reaction time [3]. The decline in cognitive performance after 20 to 25 hours of wakefulness is equivalent to a Blood Alcohol Concentration (BAC) of 0.10% [4]. To compare, in New York State, a BAC of more than 0.05% is considered "impaired" and 0.08% is considered "intoxicated" [5]. In other words, the effects of sustained sleep deprivation and circadian disruption on cognitive performance is similar (or worse) to being intoxicated.
{"title":"Mobile Sensing of Alertness, Sleep and Circadian Rhythm","authors":"A. Sano, Tauhidur Rahman, Mi Zhang, Deepak Ganesan, Tanzeem Choudhury","doi":"10.1145/3379092.3379100","DOIUrl":"https://doi.org/10.1145/3379092.3379100","url":null,"abstract":"Human biology is deeply rooted in the daily 24-hour temporal period. Our biochemistry varies significantly and idiosyncratically over the course of a day. Staying out of sync with one's circadian rhythm can lead to many complications over time, including a higher likelihood for cardiovascular disease, cancer, obesity, and mental health problems [1]. Constant changes in daily rhythm due to shift work has been shown to increase risk factors for cancer, obesity, and Type 2 diabetes. Moreover, the advent of technology and the resultant always-on ethos can cause rhythm disruption on personal and societal levels for about 70% of the population [2]. Circadian disruption can also cause a serious deficit in cognitive performance. In particular, alertness - a key biological process underlying our cognitive performance - reflects circadian rhythms [3]. Sleep deprivation and circadian disruption can result in poor alertness and reaction time [3]. The decline in cognitive performance after 20 to 25 hours of wakefulness is equivalent to a Blood Alcohol Concentration (BAC) of 0.10% [4]. To compare, in New York State, a BAC of more than 0.05% is considered \"impaired\" and 0.08% is considered \"intoxicated\" [5]. In other words, the effects of sustained sleep deprivation and circadian disruption on cognitive performance is similar (or worse) to being intoxicated.","PeriodicalId":29918,"journal":{"name":"GetMobile-Mobile Computing & Communications Review","volume":"62 1","pages":"16 - 22"},"PeriodicalIF":1.0,"publicationDate":"2020-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80308066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nivedita Arora, Jin Yu, Hyun-Man Oh, Thad Starner, G. Abowd
SATURN is a thin and flexible multi-layer material that can sense sound and other mechanical vibrations in the environment without any external power source. It is constructed of inexpensive materials (paper, copper, and plastic), so that it can be attached to a variety of objects and surfaces. When flat, SATURN's frequency response below 5000Hz is comparable to a powered microphone. When bent, SATURN has a comparable frequency response up to 3000Hz. As a sound power harvester, SATURN can harvest 7 microWatts, which allows the detection of loud sound events. We explore the space of potential applications for SATURN as part of self-sustaining interactive systems.
{"title":"SATURN","authors":"Nivedita Arora, Jin Yu, Hyun-Man Oh, Thad Starner, G. Abowd","doi":"10.1145/3379092.3379103","DOIUrl":"https://doi.org/10.1145/3379092.3379103","url":null,"abstract":"SATURN is a thin and flexible multi-layer material that can sense sound and other mechanical vibrations in the environment without any external power source. It is constructed of inexpensive materials (paper, copper, and plastic), so that it can be attached to a variety of objects and surfaces. When flat, SATURN's frequency response below 5000Hz is comparable to a powered microphone. When bent, SATURN has a comparable frequency response up to 3000Hz. As a sound power harvester, SATURN can harvest 7 microWatts, which allows the detection of loud sound events. We explore the space of potential applications for SATURN as part of self-sustaining interactive systems.","PeriodicalId":29918,"journal":{"name":"GetMobile-Mobile Computing & Communications Review","volume":"34 1","pages":"28 - 33"},"PeriodicalIF":1.0,"publicationDate":"2020-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77364665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recent years have seen significant advances in wireless localization [1,2]. However, existing solutions do not meet the requirements for size-constrained IoT applications. The battery life of common radio technologies, such as BLE, LoRa, ultra-wideband (UWB) and Wi-Fi, is less than 5 months when run with small coin and button cell batteries. This shorter battery life limits the adoption of tracking solutions based on these radio technologies by making them inconvenient for consumer applications and infeasible for large scale commercial deployments. Requiring large batteries, on the other hand, prevents scaling down the size of IoT devices. While RFID tags are attractive from a power and size perspective, they have a limited range and do not work consistently through walls and other barriers. Consumers often deploy devices in rooms throughout homes and, similarly, commercial deployments in settings like hospitals require covering multiple patient rooms with a variety of obstructions and walls. Achieving localization in these scenarios would therefore require readers in every room, which significantly increases deployment cost.
{"title":"3D Localization for Sub-Centimeter Sized Devices","authors":"R. Nandakumar, Vikram Iyer, Shyamnath Gollakota","doi":"10.1145/3379092.3379105","DOIUrl":"https://doi.org/10.1145/3379092.3379105","url":null,"abstract":"Recent years have seen significant advances in wireless localization [1,2]. However, existing solutions do not meet the requirements for size-constrained IoT applications. The battery life of common radio technologies, such as BLE, LoRa, ultra-wideband (UWB) and Wi-Fi, is less than 5 months when run with small coin and button cell batteries. This shorter battery life limits the adoption of tracking solutions based on these radio technologies by making them inconvenient for consumer applications and infeasible for large scale commercial deployments. Requiring large batteries, on the other hand, prevents scaling down the size of IoT devices. While RFID tags are attractive from a power and size perspective, they have a limited range and do not work consistently through walls and other barriers. Consumers often deploy devices in rooms throughout homes and, similarly, commercial deployments in settings like hospitals require covering multiple patient rooms with a variety of obstructions and walls. Achieving localization in these scenarios would therefore require readers in every room, which significantly increases deployment cost.","PeriodicalId":29918,"journal":{"name":"GetMobile-Mobile Computing & Communications Review","volume":"1 1","pages":"39 - 42"},"PeriodicalIF":1.0,"publicationDate":"2020-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89265887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Mazaheri, A. Abedi, Soroush Ameli, Omid Salehi-Abari
With the advent of the Internet of Things (IoT), billions of new connected devices will come online, placing a huge strain on today's Wi-Fi and cellular spectrum. This problem will be further exacerbated by the fact that many of these IoT devices are low-power devices that use low-rate modulation schemes and therefore do not use the spectrum efficiently. Millimeter wave (mmWave) technology promises to revolutionize wireless networks and solve the spectrum shortage problem through the usage of massive chunks of high-frequency spectrum. However, existing mmWave networks are power-hungry and expensive, which make them unsuitable for low-power, low-cost IoT devices. In this paper, we present mmX, a system which significantly reduces cost and power consumption of a mmWave network, enabling its use in IoT applications.
{"title":"A Millimeter Wave Network for Billions of Things","authors":"M. Mazaheri, A. Abedi, Soroush Ameli, Omid Salehi-Abari","doi":"10.1145/3379092.3379104","DOIUrl":"https://doi.org/10.1145/3379092.3379104","url":null,"abstract":"With the advent of the Internet of Things (IoT), billions of new connected devices will come online, placing a huge strain on today's Wi-Fi and cellular spectrum. This problem will be further exacerbated by the fact that many of these IoT devices are low-power devices that use low-rate modulation schemes and therefore do not use the spectrum efficiently. Millimeter wave (mmWave) technology promises to revolutionize wireless networks and solve the spectrum shortage problem through the usage of massive chunks of high-frequency spectrum. However, existing mmWave networks are power-hungry and expensive, which make them unsuitable for low-power, low-cost IoT devices. In this paper, we present mmX, a system which significantly reduces cost and power consumption of a mmWave network, enabling its use in IoT applications.","PeriodicalId":29918,"journal":{"name":"GetMobile-Mobile Computing & Communications Review","volume":"294 1","pages":"34 - 38"},"PeriodicalIF":1.0,"publicationDate":"2020-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77173192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akarsh Prabhakara, Vaibhav Singh, Swarun Kumar, Anthony G. Rowe
Tire wear is a leading cause of accidents. Tire wear is measured either manually, or by embedding sensors in tires, or using off-tire sensors. Manual sensing is extremely tedious. Sensors embedded in tire treads are challenging to design and expensive to embed. Off-tire sensors like laser range finders are prone to debris that may settle in grooves. To overcome these shortcomings, we propose a mmWave radar based tire wear sensor, which is easy to install, and continuously provides accurate and robust tire wear measurements even in the presence of debris.
{"title":"OSPREY","authors":"Akarsh Prabhakara, Vaibhav Singh, Swarun Kumar, Anthony G. Rowe","doi":"10.1145/3457356.3457366","DOIUrl":"https://doi.org/10.1145/3457356.3457366","url":null,"abstract":"Tire wear is a leading cause of accidents. Tire wear is measured either manually, or by embedding sensors in tires, or using off-tire sensors. Manual sensing is extremely tedious. Sensors embedded in tire treads are challenging to design and expensive to embed. Off-tire sensors like laser range finders are prone to debris that may settle in grooves. To overcome these shortcomings, we propose a mmWave radar based tire wear sensor, which is easy to install, and continuously provides accurate and robust tire wear measurements even in the presence of debris.","PeriodicalId":29918,"journal":{"name":"GetMobile-Mobile Computing & Communications Review","volume":"15 1","pages":"28 - 31"},"PeriodicalIF":1.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79774024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anish Athalye, A. Belay, M. Kaashoek, R. Morris, N. Zeldovich
Notary is a new design for a hardware wallet, a device that is used to perform sensitive transactional operations like cryptocurrency transfers. Notary aims to be more secure than past hardware wallets by eliminating classes of bugs by design and by formally proving the correctness of the key operation used in its implementation. We built a physical prototype of Notary and showed that it achieves functionality similar to existing hardware wallets while avoiding many bugs that affect them.
{"title":"Notary","authors":"Anish Athalye, A. Belay, M. Kaashoek, R. Morris, N. Zeldovich","doi":"10.1145/3427384.3427395","DOIUrl":"https://doi.org/10.1145/3427384.3427395","url":null,"abstract":"Notary is a new design for a hardware wallet, a device that is used to perform sensitive transactional operations like cryptocurrency transfers. Notary aims to be more secure than past hardware wallets by eliminating classes of bugs by design and by formally proving the correctness of the key operation used in its implementation. We built a physical prototype of Notary and showed that it achieves functionality similar to existing hardware wallets while avoiding many bugs that affect them.","PeriodicalId":29918,"journal":{"name":"GetMobile-Mobile Computing & Communications Review","volume":"30 1","pages":"34 - 38"},"PeriodicalIF":1.0,"publicationDate":"2019-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76425572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}