首页 > 最新文献

Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media最新文献

英文 中文
Modeling the semantic content of the socio-tagged images based on the extended conceptual graphs formalism 基于扩展概念图形式主义的社会标签图像语义内容建模
Mariam Bouchakwa, Yassine Ayadi, Ikram Amous
With the emergence of Web 2.0, the volume of multimedia documents, particularly the socio-tagged images, has become very considerable. This has made it the annotation and interrogation process of this type of documents a consuming and elusive task. A promising solution is to design methods allowing to model the semantic content of socio-tagged images in order to facilitate their annotation and the research process. Thus, we present in this paper a conceptual modeling approach of the semantic content of these images. First, our idea consists in expanding the conceptual graphs formalism in order to represent the relationships between the concepts and those that are between the concepts and their properties. Second, we use the extended graph to model the semantic content of the socio-tagged images. Experimental studies are conducted on a collection of 25.000 socio-tagged images shared in Flickr. The results demonstrate the effectiveness of our proposed approach.
随着Web 2.0的出现,多媒体文档的数量,特别是社会标记的图像,已经变得非常可观。这使得这类文档的注释和查询过程成为一项耗时且难以捉摸的任务。一个很有前途的解决方案是设计允许对社会标记图像的语义内容建模的方法,以促进它们的注释和研究过程。因此,我们在本文中提出了这些图像语义内容的概念建模方法。首先,我们的想法是扩展概念图的形式主义,以表示概念之间的关系以及概念与其属性之间的关系。其次,我们使用扩展图来建模社会标签图像的语义内容。实验研究是在Flickr上共享的25000张社会标签图片上进行的。结果证明了我们所提出的方法的有效性。
{"title":"Modeling the semantic content of the socio-tagged images based on the extended conceptual graphs formalism","authors":"Mariam Bouchakwa, Yassine Ayadi, Ikram Amous","doi":"10.1145/3007120.3007160","DOIUrl":"https://doi.org/10.1145/3007120.3007160","url":null,"abstract":"With the emergence of Web 2.0, the volume of multimedia documents, particularly the socio-tagged images, has become very considerable. This has made it the annotation and interrogation process of this type of documents a consuming and elusive task. A promising solution is to design methods allowing to model the semantic content of socio-tagged images in order to facilitate their annotation and the research process. Thus, we present in this paper a conceptual modeling approach of the semantic content of these images. First, our idea consists in expanding the conceptual graphs formalism in order to represent the relationships between the concepts and those that are between the concepts and their properties. Second, we use the extended graph to model the semantic content of the socio-tagged images. Experimental studies are conducted on a collection of 25.000 socio-tagged images shared in Flickr. The results demonstrate the effectiveness of our proposed approach.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115407341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Systematic Exploration of Android Apps' Events for Automated Testing Android应用程序事件的自动化测试系统探索
I. Salihu, R. Ibrahim
The popularity of mobile devices is ever increasing which led to rapid increase in the development of mobile applications. GUI testing has been an effective means of validating Android apps. However, it still suffers a strong challenge about how to explore event sequence in the GUIs. This paper proposes a hybrid approach for systematic exploration of mobile apps which exploit the capabilities of both static and dynamic approaches while trying to improve app's state exploration. Our approach is based static analysis on app's bytecode to extract events supported by an app. The generated events are used to dynamically explore an app at run-time. The experimental results show that our approach can explore significant number of app's state for the generation of high quality test case.
随着移动设备的日益普及,移动应用程序的开发也在快速增长。GUI测试已经成为验证Android应用程序的有效手段。然而,它仍然面临着如何在gui中探索事件序列的巨大挑战。本文提出了一种用于系统探索移动应用程序的混合方法,该方法利用静态和动态方法的能力,同时试图改进应用程序的状态探索。我们的方法是基于应用程序字节码的静态分析来提取应用程序支持的事件。生成的事件用于在运行时动态探索应用程序。实验结果表明,我们的方法可以探索大量的应用状态,从而生成高质量的测试用例。
{"title":"Systematic Exploration of Android Apps' Events for Automated Testing","authors":"I. Salihu, R. Ibrahim","doi":"10.1145/3007120.3011072","DOIUrl":"https://doi.org/10.1145/3007120.3011072","url":null,"abstract":"The popularity of mobile devices is ever increasing which led to rapid increase in the development of mobile applications. GUI testing has been an effective means of validating Android apps. However, it still suffers a strong challenge about how to explore event sequence in the GUIs. This paper proposes a hybrid approach for systematic exploration of mobile apps which exploit the capabilities of both static and dynamic approaches while trying to improve app's state exploration. Our approach is based static analysis on app's bytecode to extract events supported by an app. The generated events are used to dynamically explore an app at run-time. The experimental results show that our approach can explore significant number of app's state for the generation of high quality test case.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128226262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Dancing Computer: Computer Literacy though Dance 计算机舞蹈:通过舞蹈来掌握计算机知识
C. Owen, L. Dillon, Alison Dobbins, Noah Keppers, Madeline Levinson, Matthew Rhodes
The Dancing Computer project is developing a system that aims to increase computer literacy in elementary-aged children by teaching them first to read code before they write it. The main objective is to educate children on basic concepts of Computer Science. Children are given tablet computers that present a simple program line-by-line that they execute as they pretend to be a computer. The programs are acted out on a portable dance floor consisting of colored tiles and the program statements instruct the child to move, turn, and act out dance poses and terminology. This is a unique and different approach - the norm being to start students off writing code in some language. This project has the potential to increase the level of Computer Literacy for thousands of children. This project's goal is to increase understanding of what a computer does, what a program does, and the step-by-step nature of computer programs.
舞蹈电脑项目正在开发一个系统,旨在通过教小学年龄的孩子先读代码再写代码来提高他们的计算机素养。主要目的是教育孩子们计算机科学的基本概念。孩子们被发给平板电脑,平板电脑会逐行呈现一个简单的程序,当他们假装是一台电脑时,他们会执行这些程序。节目在一个由彩色瓷砖组成的便携式舞池上表演,节目语句指导孩子移动,转身,表演舞蹈姿势和术语。这是一种独特而不同的方法——通常是让学生开始用某种语言编写代码。这个项目有可能提高成千上万儿童的计算机知识水平。这个项目的目标是增加对计算机做什么、程序做什么以及计算机程序的逐步本质的理解。
{"title":"Dancing Computer: Computer Literacy though Dance","authors":"C. Owen, L. Dillon, Alison Dobbins, Noah Keppers, Madeline Levinson, Matthew Rhodes","doi":"10.1145/3007120.3007131","DOIUrl":"https://doi.org/10.1145/3007120.3007131","url":null,"abstract":"The Dancing Computer project is developing a system that aims to increase computer literacy in elementary-aged children by teaching them first to read code before they write it. The main objective is to educate children on basic concepts of Computer Science. Children are given tablet computers that present a simple program line-by-line that they execute as they pretend to be a computer. The programs are acted out on a portable dance floor consisting of colored tiles and the program statements instruct the child to move, turn, and act out dance poses and terminology. This is a unique and different approach - the norm being to start students off writing code in some language. This project has the potential to increase the level of Computer Literacy for thousands of children. This project's goal is to increase understanding of what a computer does, what a program does, and the step-by-step nature of computer programs.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124108686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Searching Method for Bichromatic Reverse k-Nearest Neighbor with Network Voronoi Diagram 基于网络Voronoi图的双色逆k近邻搜索方法
Y. Gotoh, Chiori Okubo
Due to the recent popularization of Geographic Information System (GIS), spatial network environments that can display the changes of spatial axes in mobile phones have received much attention. Many searching methods have proposed reverse k-nearest neighbor (RkNN) searching methods that consider the inverse direction with the position between the query and target objects. In this paper, we propose and evaluate a searching method for a bichromatic reverse k-nearest neighbor (BRkNN) that has objects and queries in spatial networks. In our proposed method, we search for the BRkNN of the query using an influence zone for each object with a Network Voronoi Diagram.
随着地理信息系统(Geographic Information System, GIS)的普及,能够在手机上显示空间轴变化的空间网络环境备受关注。许多搜索方法都提出了逆k近邻(RkNN)搜索方法,该方法考虑查询与目标对象之间位置的反向方向。本文提出并评价了空间网络中具有对象和查询的双色逆k近邻(BRkNN)的搜索方法。在我们提出的方法中,我们使用网络Voronoi图对每个对象使用影响区域来搜索查询的BRkNN。
{"title":"A Searching Method for Bichromatic Reverse k-Nearest Neighbor with Network Voronoi Diagram","authors":"Y. Gotoh, Chiori Okubo","doi":"10.1145/3007120.3007133","DOIUrl":"https://doi.org/10.1145/3007120.3007133","url":null,"abstract":"Due to the recent popularization of Geographic Information System (GIS), spatial network environments that can display the changes of spatial axes in mobile phones have received much attention. Many searching methods have proposed reverse k-nearest neighbor (RkNN) searching methods that consider the inverse direction with the position between the query and target objects. In this paper, we propose and evaluate a searching method for a bichromatic reverse k-nearest neighbor (BRkNN) that has objects and queries in spatial networks. In our proposed method, we search for the BRkNN of the query using an influence zone for each object with a Network Voronoi Diagram.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127582920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Snapscreen: Linking Traditional TV and the Internet Snapscreen:连接传统电视和互联网
Sabine Lösch, Thomas Willomitzer, Gabriele Anderst-Kotsis
We present "Snapscreen", a prototype second-screen app. Snapscreen is a platform that allows content providers (TV channels, broadcasters) to offer transparently content-related information and services to users watching TV. Users need only install the app on their mobile devices and can then take a snapshot of TV content they are currently watching. The resulting "snap" image is processed by the app to generate an identification key that is sent to the Snapscreen server, where it is matched to TV content in real time. Once a specific program/TV station has been identified, information and services related to this content are sent back to the user for interaction. Thus, Snapscreen can bridge television and Internet intuitively by using the television content detected to form the basis of an Internet query. An advantage of Snapscreen (over most state-of-the-art apps) is that this single app can offer access to a variety of interactive services and can link to a wide range of content offered by any television channel (station, broadcaster).
我们介绍了“Snapscreen”,一个原型的第二屏幕应用程序。Snapscreen是一个平台,允许内容提供商(电视频道,广播公司)向观看电视的用户提供透明的内容相关信息和服务。用户只需要在他们的移动设备上安装应用程序,然后就可以对他们正在观看的电视内容进行快照。由此产生的“快照”图像由应用程序处理,生成一个识别密钥,发送到Snapscreen服务器,在那里它与电视内容实时匹配。一旦确定了特定的节目/电视台,与该内容相关的信息和服务将被发送回用户进行交互。因此,Snapscreen可以通过使用检测到的电视内容来形成互联网查询的基础,直观地架起电视和互联网的桥梁。Snapscreen的一个优势(与大多数最先进的应用程序相比)是,这个单一的应用程序可以提供对各种互动服务的访问,并且可以链接到任何电视频道(电视台、广播公司)提供的广泛内容。
{"title":"Snapscreen: Linking Traditional TV and the Internet","authors":"Sabine Lösch, Thomas Willomitzer, Gabriele Anderst-Kotsis","doi":"10.1145/3007120.3007139","DOIUrl":"https://doi.org/10.1145/3007120.3007139","url":null,"abstract":"We present \"Snapscreen\", a prototype second-screen app. Snapscreen is a platform that allows content providers (TV channels, broadcasters) to offer transparently content-related information and services to users watching TV. Users need only install the app on their mobile devices and can then take a snapshot of TV content they are currently watching. The resulting \"snap\" image is processed by the app to generate an identification key that is sent to the Snapscreen server, where it is matched to TV content in real time. Once a specific program/TV station has been identified, information and services related to this content are sent back to the user for interaction. Thus, Snapscreen can bridge television and Internet intuitively by using the television content detected to form the basis of an Internet query. An advantage of Snapscreen (over most state-of-the-art apps) is that this single app can offer access to a variety of interactive services and can link to a wide range of content offered by any television channel (station, broadcaster).","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131247289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Sampling-based Boundary Detection Method with Consideration of Boundary Shape in Dense Mobile Wireless Sensor Networks 密集移动无线传感器网络中考虑边界形状的基于采样的边界检测方法
K. Matsuo, Keisuke Goto, A. Kanzaki, T. Hara
In this paper, we propose a method which efficiently detects the geographical boundaries of sensor readings in mobile wireless sensor networks, in situations where sensor data must be gathered within a short period. Typically, it is enough for detecting the boundaries to gather sensor data only from nodes near the boundaries. However, when the number of such nodes is large, it becomes impossible to gather sensor data from all these nodes within a short period, due to the frequent occurrence of packet collisions. To solve this problem, our proposed method reduces the number of sensor data to be gathered, by taking samples of nodes. When taking samples, our proposed method considers the target boundary shape, in order to suppress the deterioration in the accuracy of the boundaries estimated from the gathered sensor data.
在本文中,我们提出了一种有效检测移动无线传感器网络中传感器读数地理边界的方法,用于必须在短时间内收集传感器数据的情况。通常,仅从边界附近的节点收集传感器数据就足以检测边界。然而,当这类节点数量较大时,由于频繁发生数据包冲突,不可能在短时间内收集到所有这些节点的传感器数据。为了解决这一问题,我们提出的方法通过对节点进行采样来减少需要收集的传感器数据的数量。在采样时,我们提出的方法考虑了目标边界形状,以抑制从采集的传感器数据估计的边界精度的下降。
{"title":"A Sampling-based Boundary Detection Method with Consideration of Boundary Shape in Dense Mobile Wireless Sensor Networks","authors":"K. Matsuo, Keisuke Goto, A. Kanzaki, T. Hara","doi":"10.1145/3007120.3007126","DOIUrl":"https://doi.org/10.1145/3007120.3007126","url":null,"abstract":"In this paper, we propose a method which efficiently detects the geographical boundaries of sensor readings in mobile wireless sensor networks, in situations where sensor data must be gathered within a short period. Typically, it is enough for detecting the boundaries to gather sensor data only from nodes near the boundaries. However, when the number of such nodes is large, it becomes impossible to gather sensor data from all these nodes within a short period, due to the frequent occurrence of packet collisions. To solve this problem, our proposed method reduces the number of sensor data to be gathered, by taking samples of nodes. When taking samples, our proposed method considers the target boundary shape, in order to suppress the deterioration in the accuracy of the boundaries estimated from the gathered sensor data.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117125921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach To A Graph-Based Active Cyber Defense Model 一种基于图形的主动网络防御模型
Yosra Lakhdhar, S. Rekhis, N. Boudriga
Securing cyber system is a major concern as security attacks become more and more sophisticated. We develop in this paper a novel graph-based Active Cyber Defense (ACD) model to proactively respond to cyber attacks. The proposed model is based on the use of a semantically rich graph to describe cyber systems, types of used interconnection between them, and security related data useful to develop active defense strategies. The developed model takes into consideration the probabilistic nature of cyber attacks, and their degree of complexity. In this context, analytics are provided to proactively test the impact of vulnerabilities/threats increase on the system, analyze the consequent behavior of cyber systems and security solution, and decide about the security state of the whole cyber system. Our model integrates in the same framework decisions made by cyber defenders based on their expertise and knowledge, and decisions that are automatically generated using security analytic rules.
随着安全攻击变得越来越复杂,确保网络系统的安全是一个主要问题。本文提出了一种新的基于图形的主动网络防御(ACD)模型来主动响应网络攻击。所提出的模型是基于使用语义丰富的图来描述网络系统,它们之间使用的互连类型以及有助于制定主动防御策略的安全相关数据。所开发的模型考虑了网络攻击的概率性质及其复杂程度。在此背景下,分析可以主动测试漏洞/威胁增加对系统的影响,分析网络系统的后续行为和安全解决方案,判断整个网络系统的安全状态。我们的模型在同一个框架中集成了网络防御者根据其专业知识和知识做出的决策,以及使用安全分析规则自动生成的决策。
{"title":"An Approach To A Graph-Based Active Cyber Defense Model","authors":"Yosra Lakhdhar, S. Rekhis, N. Boudriga","doi":"10.1145/3007120.3007142","DOIUrl":"https://doi.org/10.1145/3007120.3007142","url":null,"abstract":"Securing cyber system is a major concern as security attacks become more and more sophisticated. We develop in this paper a novel graph-based Active Cyber Defense (ACD) model to proactively respond to cyber attacks. The proposed model is based on the use of a semantically rich graph to describe cyber systems, types of used interconnection between them, and security related data useful to develop active defense strategies. The developed model takes into consideration the probabilistic nature of cyber attacks, and their degree of complexity. In this context, analytics are provided to proactively test the impact of vulnerabilities/threats increase on the system, analyze the consequent behavior of cyber systems and security solution, and decide about the security state of the whole cyber system. Our model integrates in the same framework decisions made by cyber defenders based on their expertise and knowledge, and decisions that are automatically generated using security analytic rules.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128332157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Agent-Based Model of Crowd Evacuation Integrating Agent Perception and Proximity Pressure 基于智能体感知和邻近压力的人群疏散模型
Muzna Zafar, K. Zia, Arshad Muhammad, A. Ferscha
Many crowd evacuation models have been developed in isolation with respect to the aspects of interest. In this paper, we propose an agent-based model of crowd evacuation, pertaining to symmetric utilization of resources in terms of exit usage and evacuation time. The model is based on a game-theoretic decision support, resolving the consequences of proximity pressure on agents of two types; emotional and rational. This model is combined with the model of routing decision, in the presence of two possible information dispersion modalities; without and with inter-agent information sharing; to update agents' perception map. An agent-based simulation using a hypothetical space is performed to evaluate the performance of the model. The simulation results reveal that panic is minimal when agents adopt nearest exit strategy, a mechanized strategy with no human aspects and interactions. However, it takes more time and results in uneven distribution of agents across the exits. In spite of utilizing human aspects, the strategies involving information sharing between agents results in even distribution of agents across the exits with acceptable population panic.
许多人群疏散模型都是孤立地针对感兴趣的方面开发的。在本文中,我们提出了一个基于智能体的人群疏散模型,该模型涉及在出口使用和疏散时间方面资源的对称利用。该模型基于博弈论的决策支持,解决了邻近压力对两类代理的影响;感性和理性。该模型与路由决策模型相结合,存在两种可能的信息分散模式;有无agent间信息共享;更新智能体的感知图。使用假设空间进行基于代理的仿真来评估模型的性能。仿真结果表明,当agent采用最近出口策略(一种没有人为因素和交互的机械化策略)时,恐慌最小。然而,这需要花费更多的时间,并且导致代理在各个出口的分布不均匀。尽管利用了人的方面,但涉及agent之间信息共享的策略导致agent在可接受的总体恐慌下均匀分布在各个出口。
{"title":"An Agent-Based Model of Crowd Evacuation Integrating Agent Perception and Proximity Pressure","authors":"Muzna Zafar, K. Zia, Arshad Muhammad, A. Ferscha","doi":"10.1145/3007120.3007143","DOIUrl":"https://doi.org/10.1145/3007120.3007143","url":null,"abstract":"Many crowd evacuation models have been developed in isolation with respect to the aspects of interest. In this paper, we propose an agent-based model of crowd evacuation, pertaining to symmetric utilization of resources in terms of exit usage and evacuation time. The model is based on a game-theoretic decision support, resolving the consequences of proximity pressure on agents of two types; emotional and rational. This model is combined with the model of routing decision, in the presence of two possible information dispersion modalities; without and with inter-agent information sharing; to update agents' perception map. An agent-based simulation using a hypothetical space is performed to evaluate the performance of the model. The simulation results reveal that panic is minimal when agents adopt nearest exit strategy, a mechanized strategy with no human aspects and interactions. However, it takes more time and results in uneven distribution of agents across the exits. In spite of utilizing human aspects, the strategies involving information sharing between agents results in even distribution of agents across the exits with acceptable population panic.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127377795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Location-based Crowdsourcing in Disaster Response 基于位置的灾难响应众包
Christopher J. Ernst, Andreas Mladenow, C. Strauss
This paper discusses approaches to identify location-dependent information for emergency managers, in order to make quick but solid decisions, and improve the coordination of activities performed by crowdsourcees during disaster response. In this regard, the idea of considering location as a driver for flexibility in the design of business processes is prepared, and the meaning of location-dependent tasks for volunteers is investigated. In terms of emergency management, the paper sheds light on what may have to be considered by emergency managers when coordinating activities performed by volunteers, followed by an illustration of how they can be aware of location-based information using crowdsourcing, as well as how visualization of this information can support decision-making.
本文讨论了为应急管理人员识别位置相关信息的方法,以便做出快速而可靠的决策,并改善在灾害响应期间由众包执行的活动的协调。在这方面,考虑位置作为业务流程设计灵活性的驱动因素的想法是准备的,并对志愿者的位置依赖任务的意义进行了调查。在应急管理方面,本文阐明了应急管理人员在协调志愿者开展的活动时可能需要考虑的问题,随后说明了他们如何利用众包了解基于位置的信息,以及这些信息的可视化如何支持决策。
{"title":"Location-based Crowdsourcing in Disaster Response","authors":"Christopher J. Ernst, Andreas Mladenow, C. Strauss","doi":"10.1145/3007120.3011076","DOIUrl":"https://doi.org/10.1145/3007120.3011076","url":null,"abstract":"This paper discusses approaches to identify location-dependent information for emergency managers, in order to make quick but solid decisions, and improve the coordination of activities performed by crowdsourcees during disaster response. In this regard, the idea of considering location as a driver for flexibility in the design of business processes is prepared, and the meaning of location-dependent tasks for volunteers is investigated. In terms of emergency management, the paper sheds light on what may have to be considered by emergency managers when coordinating activities performed by volunteers, followed by an illustration of how they can be aware of location-based information using crowdsourcing, as well as how visualization of this information can support decision-making.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130796890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Open Source Based Privacy-Proxy to Restrain Connectivity of Mobile Apps 基于开源的隐私代理限制移动应用的连通性
A. Mense, Sabrina Steger, Dragan Jukic-Sunaric, András Mészáros, Matthias Sulek
Mobile Devices are part of our lives and we store a lot of private information on it as well as use services that handle sensitive information (e.g. mobile health apps). Whenever users install an application on their smartphones they have to decide whether to trust the applications and share private and sensitive data with at least the developer-owned services. But almost all modern apps not only transmit data to the developer owned servers but also send information to advertising-, analyzing and tracking partners. This paper presents an approach for a "privacy- proxy" which enables to filter unwanted data traffic to third party services without installing additional applications on the smartphone. It is based on a firewall using a black list of tracking- and analyzing networks which is automatically updated on a daily basis. The proof of concept has been implemented with open source components on a Raspberry Pi.
移动设备是我们生活的一部分,我们在其中存储了大量私人信息,并使用处理敏感信息的服务(例如移动健康应用程序)。当用户在智能手机上安装应用程序时,他们必须决定是否信任该应用程序,并至少与开发者拥有的服务共享私人和敏感数据。但几乎所有现代应用程序不仅向开发者拥有的服务器传输数据,还向广告、分析和跟踪合作伙伴发送信息。本文提出了一种“隐私代理”方法,它可以过滤不需要的数据流量到第三方服务,而无需在智能手机上安装额外的应用程序。它基于防火墙,使用跟踪和分析网络的黑名单,该黑名单每天自动更新。概念验证已经在Raspberry Pi上使用开源组件实现。
{"title":"Open Source Based Privacy-Proxy to Restrain Connectivity of Mobile Apps","authors":"A. Mense, Sabrina Steger, Dragan Jukic-Sunaric, András Mészáros, Matthias Sulek","doi":"10.1145/3007120.3007163","DOIUrl":"https://doi.org/10.1145/3007120.3007163","url":null,"abstract":"Mobile Devices are part of our lives and we store a lot of private information on it as well as use services that handle sensitive information (e.g. mobile health apps). Whenever users install an application on their smartphones they have to decide whether to trust the applications and share private and sensitive data with at least the developer-owned services. But almost all modern apps not only transmit data to the developer owned servers but also send information to advertising-, analyzing and tracking partners. This paper presents an approach for a \"privacy- proxy\" which enables to filter unwanted data traffic to third party services without installing additional applications on the smartphone. It is based on a firewall using a black list of tracking- and analyzing networks which is automatically updated on a daily basis. The proof of concept has been implemented with open source components on a Raspberry Pi.","PeriodicalId":394387,"journal":{"name":"Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129289062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the 14th International Conference on Advances in Mobile Computing and Multi Media
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1