{"title":"HotMobile '22: The 23rd International Workshop on Mobile Computing Systems and Applications, Tempe, Arizona, USA, March 9 - 10, 2022","authors":"","doi":"10.1145/3508396","DOIUrl":"https://doi.org/10.1145/3508396","url":null,"abstract":"","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91150633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xuan Bao, Mahanth K. Gowda, Ratul Mahajan, Romit Roy Choudhury
This paper envisions a new research direction that we call psychological computing. The key observation is that, even though computing systems are missioned to satisfy human needs, there has been little attempt to bring understandings of human need/psychology into core system design. This paper makes the case that percolating psychological insights deeper into the computing layers is valuable, even essential. Through examples from content caching, vehicular systems, and network scheduling, we argue that psychological awareness can not only offer performance gains to known technological problems, but also spawn new kinds of systems that are difficult to conceive otherwise.
{"title":"The case for psychological computing","authors":"Xuan Bao, Mahanth K. Gowda, Ratul Mahajan, Romit Roy Choudhury","doi":"10.1145/2444776.2444785","DOIUrl":"https://doi.org/10.1145/2444776.2444785","url":null,"abstract":"This paper envisions a new research direction that we call psychological computing. The key observation is that, even though computing systems are missioned to satisfy human needs, there has been little attempt to bring understandings of human need/psychology into core system design. This paper makes the case that percolating psychological insights deeper into the computing layers is valuable, even essential. Through examples from content caching, vehicular systems, and network scheduling, we argue that psychological awareness can not only offer performance gains to known technological problems, but also spawn new kinds of systems that are difficult to conceive otherwise.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"100 1","pages":"6"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79343412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Younghwan Go, Denis Foo Kune, S. Woo, KyoungSoo Park, Yongdae Kim
The current architecture supporting data services to mobile devices is built below the network layer (IP) and users receive the payload at the application layer. Between them is the transport layer that can cause data consumption inflation due to the retransmission mechanism that provides reliable delivery. In this paper, we examine the accounting policies of five large cellular ISPs in the U.S. and South Korea. We look at their policies regarding the transport layer reliability mechanism with TCP's retransmission and show that the current implementation of accounting policies either fails to meet the billing fairness or is vulnerable to charge evasions. Three of the ISPs surveyed charge for all IP packets regardless of retransmission, allowing attackers to inflate a victim's bill by intentionally retransmitting packets. The other two ISPs deduct the retransmitted amount from the user's bill thus allowing tunneling through TCP retransmissions. We show that a "free-riding" attack is viable with these ISPs and discuss some of the mitigation techniques.
{"title":"Towards accurate accounting of cellular data for TCP retransmission","authors":"Younghwan Go, Denis Foo Kune, S. Woo, KyoungSoo Park, Yongdae Kim","doi":"10.1145/2444776.2444779","DOIUrl":"https://doi.org/10.1145/2444776.2444779","url":null,"abstract":"The current architecture supporting data services to mobile devices is built below the network layer (IP) and users receive the payload at the application layer. Between them is the transport layer that can cause data consumption inflation due to the retransmission mechanism that provides reliable delivery. In this paper, we examine the accounting policies of five large cellular ISPs in the U.S. and South Korea. We look at their policies regarding the transport layer reliability mechanism with TCP's retransmission and show that the current implementation of accounting policies either fails to meet the billing fairness or is vulnerable to charge evasions. Three of the ISPs surveyed charge for all IP packets regardless of retransmission, allowing attackers to inflate a victim's bill by intentionally retransmitting packets. The other two ISPs deduct the retransmitted amount from the user's bill thus allowing tunneling through TCP retransmissions. We show that a \"free-riding\" attack is viable with these ISPs and discuss some of the mitigation techniques.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"33 1","pages":"2"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81413678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wenjie Sha, Daehan Kwak, B. R. Badrinath, L. Iftode
In this paper, we propose a Social Vehicle Navigation system that integrates driver-provided information into a vehicle navigation system in order to calculate personalized routing. Our approach allows drivers registered into certain vehicle social network groups to share driving experiences with other drivers using voice tweets. These tweets are automatically aggregated into tweet digests for each social group based on location and destination. While listening to the tweet digests, a driver can instruct the social navigator to avoid or choose certain road segments in order to calculate a personalized route. We present our initial design along with a simple prototype implemented for the Android platform.
{"title":"Social vehicle navigation: integrating shared driving experience into vehicle navigation","authors":"Wenjie Sha, Daehan Kwak, B. R. Badrinath, L. Iftode","doi":"10.1145/2444776.2444798","DOIUrl":"https://doi.org/10.1145/2444776.2444798","url":null,"abstract":"In this paper, we propose a Social Vehicle Navigation system that integrates driver-provided information into a vehicle navigation system in order to calculate personalized routing. Our approach allows drivers registered into certain vehicle social network groups to share driving experiences with other drivers using voice tweets. These tweets are automatically aggregated into tweet digests for each social group based on location and destination. While listening to the tweet digests, a driver can instruct the social navigator to avoid or choose certain road segments in order to calculate a personalized route. We present our initial design along with a simple prototype implemented for the Android platform.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"78 1","pages":"16"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85830067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We explore the use of TV whitespaces based communication systems for providing robust connectivity to vehicles. We envision a setup where whitespaces base stations mounted by roadside that communicate with whitespaces gateway nodes placed on vehicles. A key challenge in this setup is the asymmetry in transmission power limits -- the fixed base station is allowed to communicate at up to 4W, while the mobile gateways on vehicles are limite to 100mW. This paper presents a specific network design called Scout to deal with this asymmetry in which whitespaces transceivers are used in the downlink direction while a more traditional cellular path is used in the uplink one. As the key component of this system, we describe a novel channel probing mechanism that sends a forward radio to look ahead and identify the best channel parameters to be used when the rear radio eventually reaches the forward post. We report various challenges and experience in this design and our on going plans to use it for providing Internet access to public city buses. Our initial results indicate a 4× coverage improvement and 1.4X throughput gain achieved by Scout.
{"title":"Scout: an asymmetric vehicular network design over TV whitespaces","authors":"Tan Zhang, Sayandeep Sen, Suman Banerjee","doi":"10.1145/2444776.2444797","DOIUrl":"https://doi.org/10.1145/2444776.2444797","url":null,"abstract":"We explore the use of TV whitespaces based communication systems for providing robust connectivity to vehicles. We envision a setup where whitespaces base stations mounted by roadside that communicate with whitespaces gateway nodes placed on vehicles. A key challenge in this setup is the asymmetry in transmission power limits -- the fixed base station is allowed to communicate at up to 4W, while the mobile gateways on vehicles are limite to 100mW. This paper presents a specific network design called Scout to deal with this asymmetry in which whitespaces transceivers are used in the downlink direction while a more traditional cellular path is used in the uplink one. As the key component of this system, we describe a novel channel probing mechanism that sends a forward radio to look ahead and identify the best channel parameters to be used when the rear radio eventually reaches the forward post. We report various challenges and experience in this design and our on going plans to use it for providing Internet access to public city buses. Our initial results indicate a 4× coverage improvement and 1.4X throughput gain achieved by Scout.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"1 1","pages":"15"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82105004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wi-Fi is the most prominent wireless network interface in current smart devices. Due to its high power consumption, Power Saving Mode (PSM) schemes have been proposed to reduce power consumption. We show how the current popular PSM schemes implemented in nowadays smart devices are inefficient. In this paper, we propose A2PSM: an audio channel assisted power saving scheme for the Wi-Fi interface, which address the inefficiency of the existing power saving schemes in smart devices. In this scheme, we leverage the low power consumption of the audio interfaces (mic/speaker) to reduce the wakeup events of the Wi-Fi interface when it is in Power Saving Mode. In this paper, we develop a small-scale prototype testbed on real smartphones to evaluate the proposed A2PSM scheme. Experiments show that A2PSM could save up to more than 25% more power than the existing schemes. To the best of our knowledge, this is the first work to utilize the audio channel in optimizing the power consumption of Wi-Fi networks.
{"title":"A2PSM: audio assisted wi-fi power saving mechanism for smart devices","authors":"M. Uddin, T. Nadeem","doi":"10.1145/2444776.2444782","DOIUrl":"https://doi.org/10.1145/2444776.2444782","url":null,"abstract":"Wi-Fi is the most prominent wireless network interface in current smart devices. Due to its high power consumption, Power Saving Mode (PSM) schemes have been proposed to reduce power consumption. We show how the current popular PSM schemes implemented in nowadays smart devices are inefficient. In this paper, we propose A2PSM: an audio channel assisted power saving scheme for the Wi-Fi interface, which address the inefficiency of the existing power saving schemes in smart devices. In this scheme, we leverage the low power consumption of the audio interfaces (mic/speaker) to reduce the wakeup events of the Wi-Fi interface when it is in Power Saving Mode. In this paper, we develop a small-scale prototype testbed on real smartphones to evaluate the proposed A2PSM scheme. Experiments show that A2PSM could save up to more than 25% more power than the existing schemes. To the best of our knowledge, this is the first work to utilize the audio channel in optimizing the power consumption of Wi-Fi networks.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"93 1","pages":"4"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83867845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Waylon Brunette, Mitchell Sundt, Nicola Dell, R. Chaudhri, N. Breit, G. Borriello
Open Data Kit (ODK) is an open-source, modular toolkit that enables organizations to build application-specific information services for use in resource-constrained environments. ODK is one of the leading data collection solutions available and has been deployed by a wide variety of organizations in dozens of countries around the world. This paper discusses how recent feedback from users and developers led us to redesign the ODK system architecture. Specifically, the design principles for ODK 2.0 focus on: 1) favoring runtime languages over compile time languages to make customizations easier for individuals with limited programming experience; 2) implementing basic data structures as single rows within a table of data; 3) storing that data in a database that is accessible across applications and client devices; and 4) increasing the diversity of input types by enabling new data input methods from sensors. We discuss how these principles have led to the refinement of the existing ODK tools, and the creation of several new tools that aim to improve the toolkit, expand its range of applications, and make it more customizable by users.
{"title":"Open data kit 2.0: expanding and refining information services for developing regions","authors":"Waylon Brunette, Mitchell Sundt, Nicola Dell, R. Chaudhri, N. Breit, G. Borriello","doi":"10.1145/2444776.2444790","DOIUrl":"https://doi.org/10.1145/2444776.2444790","url":null,"abstract":"Open Data Kit (ODK) is an open-source, modular toolkit that enables organizations to build application-specific information services for use in resource-constrained environments. ODK is one of the leading data collection solutions available and has been deployed by a wide variety of organizations in dozens of countries around the world. This paper discusses how recent feedback from users and developers led us to redesign the ODK system architecture. Specifically, the design principles for ODK 2.0 focus on: 1) favoring runtime languages over compile time languages to make customizations easier for individuals with limited programming experience; 2) implementing basic data structures as single rows within a table of data; 3) storing that data in a database that is accessible across applications and client devices; and 4) increasing the diversity of input types by enabling new data input methods from sensors. We discuss how these principles have led to the refinement of the existing ODK tools, and the creation of several new tools that aim to improve the toolkit, expand its range of applications, and make it more customizable by users.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"28 1","pages":"10"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88904799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The scarcity of mobile broadband spectrum is a problem hurting all stakeholders in the mobile landscape -- mobile operators (MOs), content providers, and mobile users. Building additional capacity is expensive, and MOs are reluctant to make such investments without a clear way of recouping their costs. This paper presents the idea of split billing: allowing content providers to pay for the traffic generated by mobile users visiting their websites or using their services. This creates an additional revenue stream for MOs and builds more pressure for updating their networks' capacities. End users also benefit because they can afford more expensive data plans and enjoy new applications and scenarios that make use of faster mobile networks. To implement split billing securely on a mobile platform, we develop the SIMlet, a new trustworthy computing abstraction. A SIMlet can be bound to a network socket to monitor and account all the traffic exchanged over the network socket. SIMlets provide trustworthy proofs of a device's mobile traffic, and such proofs can be redeemed at a content provider involved in split billing.
{"title":"Splitting the bill for mobile data with SIMlets","authors":"Himanshu Raj, S. Saroiu, A. Wolman, J. Padhye","doi":"10.1145/2444776.2444778","DOIUrl":"https://doi.org/10.1145/2444776.2444778","url":null,"abstract":"The scarcity of mobile broadband spectrum is a problem hurting all stakeholders in the mobile landscape -- mobile operators (MOs), content providers, and mobile users. Building additional capacity is expensive, and MOs are reluctant to make such investments without a clear way of recouping their costs. This paper presents the idea of split billing: allowing content providers to pay for the traffic generated by mobile users visiting their websites or using their services. This creates an additional revenue stream for MOs and builds more pressure for updating their networks' capacities. End users also benefit because they can afford more expensive data plans and enjoy new applications and scenarios that make use of faster mobile networks.\u0000 To implement split billing securely on a mobile platform, we develop the SIMlet, a new trustworthy computing abstraction. A SIMlet can be bound to a network socket to monitor and account all the traffic exchanged over the network socket. SIMlets provide trustworthy proofs of a device's mobile traffic, and such proofs can be redeemed at a content provider involved in split billing.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"124 1","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74291430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
He Wang, Xuan Bao, Romit Roy Choudhury, Srihari Nelakuditi
Wearable cameras and displays, such as the Google Glass, are around the corner. This paper explores techniques that jointly leverage camera-enabled glasses and smartphones to recognize individuals in the visual surrounding. While face recognition would be one approach to this problem, we believe that it may not be always possible to see a person's face. Our technique is complementary to face recognition, and exploits the intuition that colors of clothes, decorations, and even human motion patterns, can together make up a "fingerprint". When leveraged systematically, it may be feasible to recognize individuals with reasonable consistency. This paper reports on our attempts, with early results from a prototype built on Android Galaxy phones and PivotHead's camera-enabled glasses. We call our system InSight.
{"title":"InSight: recognizing humans without face recognition","authors":"He Wang, Xuan Bao, Romit Roy Choudhury, Srihari Nelakuditi","doi":"10.1145/2444776.2444786","DOIUrl":"https://doi.org/10.1145/2444776.2444786","url":null,"abstract":"Wearable cameras and displays, such as the Google Glass, are around the corner. This paper explores techniques that jointly leverage camera-enabled glasses and smartphones to recognize individuals in the visual surrounding. While face recognition would be one approach to this problem, we believe that it may not be always possible to see a person's face. Our technique is complementary to face recognition, and exploits the intuition that colors of clothes, decorations, and even human motion patterns, can together make up a \"fingerprint\". When leveraged systematically, it may be feasible to recognize individuals with reasonable consistency. This paper reports on our attempts, with early results from a prototype built on Android Galaxy phones and PivotHead's camera-enabled glasses. We call our system InSight.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"18 1","pages":"7"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90724462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Achieving perfect power proportionality in current mobile devices is not enough to prevent users from running out of battery. Given a limited power budget, we need to control active power usage, and there needs to be a prioritization of activities. In the late 1990s, Flinn and Satyanarayanan showed significant energy savings using a concept of data fidelity to drive mobile application adaptation, informed by the battery lifetime desired by the user and the OS's evaluation of energy supply and demand. In this paper we revisit and expand this approach, recognizing that with current hardware there are even higher potential savings, and that increased diversity in applications, devices, and user preferences requires a new way to involve the user to maximize their utility. We propose Application Modes, a new abstraction and a narrow interface between applications and the OS that allows for a separation of concerns between the application, the OS, and the user. Application Modes are well suited to eliciting user preferences when these depend on multiple dimensions, and can vary between users, time, and context. Applications declare modes - bundles of functionality for graceful degradation when resource-limited. The OS uses these modes as the granularity at which to profile and predict energy usage, without having to understand their semantics. It can combine these predictions with application-provided descriptions, exposing to the user only the high-level trade-offs that they need to know about, between battery lifetime and functionality.
{"title":"Application modes: a narrow interface for end-user power management in mobile devices","authors":"Marcelo Martins, Rodrigo Fonseca","doi":"10.1145/2444776.2444783","DOIUrl":"https://doi.org/10.1145/2444776.2444783","url":null,"abstract":"Achieving perfect power proportionality in current mobile devices is not enough to prevent users from running out of battery. Given a limited power budget, we need to control active power usage, and there needs to be a prioritization of activities. In the late 1990s, Flinn and Satyanarayanan showed significant energy savings using a concept of data fidelity to drive mobile application adaptation, informed by the battery lifetime desired by the user and the OS's evaluation of energy supply and demand. In this paper we revisit and expand this approach, recognizing that with current hardware there are even higher potential savings, and that increased diversity in applications, devices, and user preferences requires a new way to involve the user to maximize their utility. We propose Application Modes, a new abstraction and a narrow interface between applications and the OS that allows for a separation of concerns between the application, the OS, and the user. Application Modes are well suited to eliciting user preferences when these depend on multiple dimensions, and can vary between users, time, and context. Applications declare modes - bundles of functionality for graceful degradation when resource-limited. The OS uses these modes as the granularity at which to profile and predict energy usage, without having to understand their semantics. It can combine these predictions with application-provided descriptions, exposing to the user only the high-level trade-offs that they need to know about, between battery lifetime and functionality.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"1 1","pages":"5"},"PeriodicalIF":0.0,"publicationDate":"2013-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82184915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}