This demo presents how phone functionality can be offloaded from a smartphone over wireless link to a PhoneLet by sharing one SIM card across multiple devices. This can lead to significant cost and network load reductions by decreasing the number of simultaneously connected mobile clients. Furthermore, it can save energy for the mobile user when connected to a powered PhoneLet by offloading phone functionality. It absorbs the energy cost of online presence and inefficient mobile applications' communication patterns, instead providing connectivity for the user over a WiFi link.
{"title":"Demo: PhoneLets: offloading the phone off your phone for energy, cost and network load optimization","authors":"Andrius Aucinas, J. Crowcroft","doi":"10.1145/2639108.2641744","DOIUrl":"https://doi.org/10.1145/2639108.2641744","url":null,"abstract":"This demo presents how phone functionality can be offloaded from a smartphone over wireless link to a PhoneLet by sharing one SIM card across multiple devices. This can lead to significant cost and network load reductions by decreasing the number of simultaneously connected mobile clients. Furthermore, it can save energy for the mobile user when connected to a powered PhoneLet by offloading phone functionality. It absorbs the energy cost of online presence and inefficient mobile applications' communication patterns, instead providing connectivity for the user over a WiFi link.","PeriodicalId":331897,"journal":{"name":"Proceedings of the 20th annual international conference on Mobile computing and networking","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126668901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anran Wang, Shuai Ma, Chunming Hu, J. Huai, Chunyi Peng, G. Shen
Visible light communication (VLC) over screen-camera links emerges as a novel form of near-field communication, and it offers a user-friendly, infrastructure-less and secure communication, which is highly competitive for one-time file transfer [1 - 4]. However, the limitations of smart devices and the uncertainty of user behaviors seriously impair the transmission reliability and hinder its applicability. Worse still, existing approaches [1, 2, 4]mostly focus on improving the transmission speed and ignore the transmission reliability. Hence, RDCode is proposed to boost the throughput over screen-camera links, by making use of a novel barcode design and several effective techniques to enhance the transmission reliability. In this demo, we show that our RDCode prototype system addresses many practical challenges. A short video on our prototype system is accessible from http://mashuai.buaa.edu.cn/demo/RDCode.mp4.
{"title":"Demo: a robust barcode system for data transmissions over screen-camera links","authors":"Anran Wang, Shuai Ma, Chunming Hu, J. Huai, Chunyi Peng, G. Shen","doi":"10.1145/2639108.2641741","DOIUrl":"https://doi.org/10.1145/2639108.2641741","url":null,"abstract":"Visible light communication (VLC) over screen-camera links emerges as a novel form of near-field communication, and it offers a user-friendly, infrastructure-less and secure communication, which is highly competitive for one-time file transfer [1 - 4]. However, the limitations of smart devices and the uncertainty of user behaviors seriously impair the transmission reliability and hinder its applicability. Worse still, existing approaches [1, 2, 4]mostly focus on improving the transmission speed and ignore the transmission reliability. Hence, RDCode is proposed to boost the throughput over screen-camera links, by making use of a novel barcode design and several effective techniques to enhance the transmission reliability. In this demo, we show that our RDCode prototype system addresses many practical challenges. A short video on our prototype system is accessible from http://mashuai.buaa.edu.cn/demo/RDCode.mp4.","PeriodicalId":331897,"journal":{"name":"Proceedings of the 20th annual international conference on Mobile computing and networking","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125613345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In 2006, John Bicket and Sanjit Biswas took a leave from their graduate research at MIT to start a networking company called Meraki, which eventually grew to a fast-growing, profitable company acquired by Cisco in 2012 for $1.2 billion. In this talk, Sanjit will recount the history of Meraki, from the Roofnet project at MIT CSAIL, to bootstrapping the business from the sales of their first product, to scaling up to over 500 employees. He will also share some of the lessons learned along the way, and will discuss some similarities between building computer systems as Ph.D. students and building a company.
{"title":"From grad school, to startup to acquisition","authors":"S. Biswas","doi":"10.1145/2639108.2639416","DOIUrl":"https://doi.org/10.1145/2639108.2639416","url":null,"abstract":"In 2006, John Bicket and Sanjit Biswas took a leave from their graduate research at MIT to start a networking company called Meraki, which eventually grew to a fast-growing, profitable company acquired by Cisco in 2012 for $1.2 billion. In this talk, Sanjit will recount the history of Meraki, from the Roofnet project at MIT CSAIL, to bootstrapping the business from the sales of their first product, to scaling up to over 500 employees. He will also share some of the lessons learned along the way, and will discuss some similarities between building computer systems as Ph.D. students and building a company.","PeriodicalId":331897,"journal":{"name":"Proceedings of the 20th annual international conference on Mobile computing and networking","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133814475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In wireless networks, location distinction aims to detect location changes or facilitate authentication of wireless users. To achieve location distinction, recent research has been focused on investigating the spatial uncorrelation property of wireless channels. Specifically, the differences of wireless channel characteristics are used to distinguish locations or identify location changes. However, we discover a new attack against all existing location distinction approaches that are built on the spatial uncorrelation property of wireless channels. In such an attack, the adversary can easily hide her location changes or impersonate movements by injecting fake wireless channel characteristics into a target receiver. Experimental results on our USRP-based prototype show that the discovered attack can craft any desired channel characteristic with a successful probability of 95.0% to defeat spatial uncorrelation based location distinction schemes. To defend against this attack, we propose a detection technique that utilizes an auxiliary receiver or antenna to identify these fake channel characteristics. Experiments demonstrate that our novel detection method achieves a detection rate higher than 91.2% while maintaining a very low false alarm rate.
{"title":"Where are you from?: confusing location distinction using virtual multipath camouflage","authors":"Song Fang, Yao Liu, Wenbo Shen, Haojin Zhu","doi":"10.1145/2639108.2639117","DOIUrl":"https://doi.org/10.1145/2639108.2639117","url":null,"abstract":"In wireless networks, location distinction aims to detect location changes or facilitate authentication of wireless users. To achieve location distinction, recent research has been focused on investigating the spatial uncorrelation property of wireless channels. Specifically, the differences of wireless channel characteristics are used to distinguish locations or identify location changes. However, we discover a new attack against all existing location distinction approaches that are built on the spatial uncorrelation property of wireless channels. In such an attack, the adversary can easily hide her location changes or impersonate movements by injecting fake wireless channel characteristics into a target receiver. Experimental results on our USRP-based prototype show that the discovered attack can craft any desired channel characteristic with a successful probability of 95.0% to defeat spatial uncorrelation based location distinction schemes. To defend against this attack, we propose a detection technique that utilizes an auxiliary receiver or antenna to identify these fake channel characteristics. Experiments demonstrate that our novel detection method achieves a detection rate higher than 91.2% while maintaining a very low false alarm rate.","PeriodicalId":331897,"journal":{"name":"Proceedings of the 20th annual international conference on Mobile computing and networking","volume":"4 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132467555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Rosen, Haokun Luo, Qi Alfred Chen, Z. Morley Mao, J. Hui, Aaron Drake, Kevin Lau
To conserve power while ensuring good performance on resource-constrained mobile devices, devices transition between different Radio Resource Control (RRC) states in response to network traffic and according to parameters specific to network operators. As RRC states significantly affect application power consumption and performance, it is important to understand how RRC state timers interact with network traffic patterns. In this paper, we show that the impact of RRC states on performance is significantly more complex and diverse than found in previous work. To do so, we introduce an open-source tool that allows the impact of RRC states on network and application performance to be measured in a robust and accurate manner on unmodified user devices, and deploy the tool in 23 countries around the world to test a broad range of cellular network technologies. We detect previously unknown performance problems which increase network latencies by up to several seconds and for LTE, can increase packet losses by an order of magnitude. Through an in-depth cross-layer analysis of several carriers, we examine the lower-layer causes of these problems. We determine that the highly complex state transitions of certain carriers, and in particular poor interactions between state demotions and network traffic, can lead to substantial, unexpected latencies.
{"title":"Discovering fine-grained RRC state dynamics and performance impacts in cellular networks","authors":"S. Rosen, Haokun Luo, Qi Alfred Chen, Z. Morley Mao, J. Hui, Aaron Drake, Kevin Lau","doi":"10.1145/2639108.2639115","DOIUrl":"https://doi.org/10.1145/2639108.2639115","url":null,"abstract":"To conserve power while ensuring good performance on resource-constrained mobile devices, devices transition between different Radio Resource Control (RRC) states in response to network traffic and according to parameters specific to network operators. As RRC states significantly affect application power consumption and performance, it is important to understand how RRC state timers interact with network traffic patterns. In this paper, we show that the impact of RRC states on performance is significantly more complex and diverse than found in previous work. To do so, we introduce an open-source tool that allows the impact of RRC states on network and application performance to be measured in a robust and accurate manner on unmodified user devices, and deploy the tool in 23 countries around the world to test a broad range of cellular network technologies. We detect previously unknown performance problems which increase network latencies by up to several seconds and for LTE, can increase packet losses by an order of magnitude. Through an in-depth cross-layer analysis of several carriers, we examine the lower-layer causes of these problems. We determine that the highly complex state transitions of certain carriers, and in particular poor interactions between state demotions and network traffic, can lead to substantial, unexpected latencies.","PeriodicalId":331897,"journal":{"name":"Proceedings of the 20th annual international conference on Mobile computing and networking","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129533299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The continuously increasing number of smartphones and tablets allow the users to access Wireless LANs (WLANs) while undergoing different types of mobility, posing new challenges to wireless protocols. Current history-based WLAN protocols do not work well in mobile settings where wireless conditions change rapidly. Thus, today's WLANs need to be able to determine the type of the client's mobility and employ appropriate strategies in order to sustain high performance. While previous work tried to detect mobility using hints from sensors available in mobile devices, in this work, we demonstrate how different mobility modes can be distinguished by using physical layer information - Channel State Information (CSI) and Time-of-Flight (ToF) - available at commodity APs, with no modifications on the client side. Our testbed experiments show that our mobility classification algorithm achieves more than 92% accuracy in a variety of scenarios. In addition, we demonstrate how fine-grained mobility determination can be exploited to greatly improve performance of client roaming and MIMO beamforming.
{"title":"Poster: detecting client mobility in WLANs using PHY layer information","authors":"Li Sun, Souvik Sen, Dimitrios Koutsonikolas","doi":"10.1145/2639108.2642892","DOIUrl":"https://doi.org/10.1145/2639108.2642892","url":null,"abstract":"The continuously increasing number of smartphones and tablets allow the users to access Wireless LANs (WLANs) while undergoing different types of mobility, posing new challenges to wireless protocols. Current history-based WLAN protocols do not work well in mobile settings where wireless conditions change rapidly. Thus, today's WLANs need to be able to determine the type of the client's mobility and employ appropriate strategies in order to sustain high performance. While previous work tried to detect mobility using hints from sensors available in mobile devices, in this work, we demonstrate how different mobility modes can be distinguished by using physical layer information - Channel State Information (CSI) and Time-of-Flight (ToF) - available at commodity APs, with no modifications on the client side. Our testbed experiments show that our mobility classification algorithm achieves more than 92% accuracy in a variety of scenarios. In addition, we demonstrate how fine-grained mobility determination can be exploited to greatly improve performance of client roaming and MIMO beamforming.","PeriodicalId":331897,"journal":{"name":"Proceedings of the 20th annual international conference on Mobile computing and networking","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124832678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Mahindra, H. Viswanathan, K. Sundaresan, Mustafa Y. Arslan, S. Rangarajan
Mobile operators are leveraging WiFi to relieve the pressure posed on their networks by the surging bandwidth demand of applications. However, operators often lack intelligent mechanisms to control the way users access their WiFi networks. This lack of sophisticated control creates poor network utilization, which in turn degrades the quality of experience (QoE). To meet user traffic demands, it is evident that operators need solutions that optimally balance user traffic across cellular and WiFi networks. Motivated by the lack of practical solutions in this space, we design and implement ATOM - an end-to-end system for adaptive traffic offloading for WiFi-LTE deployments. ATOM has two novel components: (i) A network interface selection algorithm that maps user traffic across WiFi and LTE to optimize user QoE and (ii) an interface switching service that seamlessly re-directs ongoing user sessions in a cost-effective and standards-compatible manner. Our evaluations on a real LTE-WiFi testbed using YouTube traffic reveals that ATOM reduces video stalls by 3-4 times compared to naive solutions.
{"title":"A practical traffic management system for integrated LTE-WiFi networks","authors":"R. Mahindra, H. Viswanathan, K. Sundaresan, Mustafa Y. Arslan, S. Rangarajan","doi":"10.1145/2639108.2639120","DOIUrl":"https://doi.org/10.1145/2639108.2639120","url":null,"abstract":"Mobile operators are leveraging WiFi to relieve the pressure posed on their networks by the surging bandwidth demand of applications. However, operators often lack intelligent mechanisms to control the way users access their WiFi networks. This lack of sophisticated control creates poor network utilization, which in turn degrades the quality of experience (QoE). To meet user traffic demands, it is evident that operators need solutions that optimally balance user traffic across cellular and WiFi networks. Motivated by the lack of practical solutions in this space, we design and implement ATOM - an end-to-end system for adaptive traffic offloading for WiFi-LTE deployments. ATOM has two novel components: (i) A network interface selection algorithm that maps user traffic across WiFi and LTE to optimize user QoE and (ii) an interface switching service that seamlessly re-directs ongoing user sessions in a cost-effective and standards-compatible manner. Our evaluations on a real LTE-WiFi testbed using YouTube traffic reveals that ATOM reduces video stalls by 3-4 times compared to naive solutions.","PeriodicalId":331897,"journal":{"name":"Proceedings of the 20th annual international conference on Mobile computing and networking","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127471062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This poster proposes an adaptive flow control scheme for reliable packet delivery of Universal Serial Bus (USB) services when they are transmitted through wireless medium. In the future, USB can be utilized with the Wi-Fi technology to provide Wi-Fi USB (WSB). However, the data transmission of Wi-Fi and USB are asynchronous due to their different Medium Access Control (MAC) characteristics, which may result in buffer overflow. To prevent buffer overflow, we propose an adaptive flow control scheme that can select between the various transmission speeds of USB to match with the bandwidth provided by the Wi-Fi layer. Preliminary results of the proposed scheme evaluated via the NS-3 shows that the packet delivery ratio of USB data can be substantially increased, thus providing better USB reliability.
这张海报提出了一种自适应流量控制方案,用于通用串行总线(USB)服务在无线介质上传输时的可靠分组传输。未来,USB可以与Wi-Fi技术结合,提供Wi-Fi USB (WSB)。但是,由于Wi-Fi和USB的MAC (Medium Access Control)特性不同,数据传输是异步的,这可能会导致缓冲区溢出。为了防止缓冲区溢出,我们提出了一种自适应流量控制方案,可以在USB的各种传输速度之间进行选择,以匹配Wi-Fi层提供的带宽。通过NS-3对所提出方案的初步结果进行了评估,结果表明USB数据的分组传输率可以大幅提高,从而提供更好的USB可靠性。
{"title":"Poster: adaptive flow control for wireless serial bus using wi-fi transmission opportunity","authors":"W. Jung, K. Lim, Young-Bae Ko","doi":"10.1145/2639108.2642900","DOIUrl":"https://doi.org/10.1145/2639108.2642900","url":null,"abstract":"This poster proposes an adaptive flow control scheme for reliable packet delivery of Universal Serial Bus (USB) services when they are transmitted through wireless medium. In the future, USB can be utilized with the Wi-Fi technology to provide Wi-Fi USB (WSB). However, the data transmission of Wi-Fi and USB are asynchronous due to their different Medium Access Control (MAC) characteristics, which may result in buffer overflow. To prevent buffer overflow, we propose an adaptive flow control scheme that can select between the various transmission speeds of USB to match with the bandwidth provided by the Wi-Fi layer. Preliminary results of the proposed scheme evaluated via the NS-3 shows that the packet delivery ratio of USB data can be substantially increased, thus providing better USB reliability.","PeriodicalId":331897,"journal":{"name":"Proceedings of the 20th annual international conference on Mobile computing and networking","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128152864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The phone attitude is an essential input to many smartphone applications, which has been known very difficult to accurately estimate especially over long time. Based on in-depth understanding of the nature of the MEMS gyroscope and other IMU sensors commonly equipped on smartphones, we propose A3 - an accurate and automatic attitude detector for commodity smartphones. A3 primarily leverages the gyroscope, but intelligently incorporates the accelerometer and magnetometer to select the best sensing capabilities and derive the most accurate attitude estimation. Extensive experimental evaluation on various types of Android smartphones confirms the outstanding performance of A3. Compared with other existing solutions, A3 provides 3x improvement on the accuracy of attitude estimation.
{"title":"Use it free: instantly knowing your phone attitude","authors":"Pengfei Zhou, Mo Li, G. Shen","doi":"10.1145/2639108.2639110","DOIUrl":"https://doi.org/10.1145/2639108.2639110","url":null,"abstract":"The phone attitude is an essential input to many smartphone applications, which has been known very difficult to accurately estimate especially over long time. Based on in-depth understanding of the nature of the MEMS gyroscope and other IMU sensors commonly equipped on smartphones, we propose A3 - an accurate and automatic attitude detector for commodity smartphones. A3 primarily leverages the gyroscope, but intelligently incorporates the accelerometer and magnetometer to select the best sensing capabilities and derive the most accurate attitude estimation. Extensive experimental evaluation on various types of Android smartphones confirms the outstanding performance of A3. Compared with other existing solutions, A3 provides 3x improvement on the accuracy of attitude estimation.","PeriodicalId":331897,"journal":{"name":"Proceedings of the 20th annual international conference on Mobile computing and networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129731215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Camera communication (CamCom) is a form of visible light communication (VLC) that makes use of a camera as the receiver. One very important advantage of CamCom is that the acquired images during the receiving process provide a means to visually associate the physical object with the transmitted information, since the receiver has the knowledge of which pixels in the images are transmitting. Figure 1 shows a simple example. A user points her smartphone camera at multiple lights, touches the screen to select one, and uses the virtual switch that appears on the screen to adjust the lighting level. In this scenario, the lights simply periodically transmit simple identifiers, such as IP addresses, to the smartphone. The system is able to directly associate what the user sees (the image pixels corresponding to the light selected by the user) to the transmitted information (the identifier of the light). An out-of-band channel, such as WiFi, can then be used to send the actual command to the selected light to adjust the setting. Compared to the conventional approach of identifying a particular set of visual features unique to the object with computer vision techniques, this approach is simpler, more intuitive, and more accurate.
{"title":"Demo: rollinglight - universal camera communications for single led","authors":"Hsin-Mu Tsai, Hao-Min Lin, Hui-Yu Lee","doi":"10.1145/2639108.2641748","DOIUrl":"https://doi.org/10.1145/2639108.2641748","url":null,"abstract":"Camera communication (CamCom) is a form of visible light communication (VLC) that makes use of a camera as the receiver. One very important advantage of CamCom is that the acquired images during the receiving process provide a means to visually associate the physical object with the transmitted information, since the receiver has the knowledge of which pixels in the images are transmitting. Figure 1 shows a simple example. A user points her smartphone camera at multiple lights, touches the screen to select one, and uses the virtual switch that appears on the screen to adjust the lighting level. In this scenario, the lights simply periodically transmit simple identifiers, such as IP addresses, to the smartphone. The system is able to directly associate what the user sees (the image pixels corresponding to the light selected by the user) to the transmitted information (the identifier of the light). An out-of-band channel, such as WiFi, can then be used to send the actual command to the selected light to adjust the setting. Compared to the conventional approach of identifying a particular set of visual features unique to the object with computer vision techniques, this approach is simpler, more intuitive, and more accurate.","PeriodicalId":331897,"journal":{"name":"Proceedings of the 20th annual international conference on Mobile computing and networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131207493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}