Souvik Sen, Romit Roy Choudhury, Srihari Nelakuditi
The rapid growth of location-based applications has spurred extensive research on localization. Nonetheless, indoor localization remains an elusive problem mostly because the accurate techniques come at the expense of cumbersome war-driving or additional infrastructure. Towards a solution that is easier to adopt, we propose SpinLoc that is free from these requirements. Instead, SpinLoc levies a little bit of the localization burden on the humans, expecting them to rotate around once to estimate their locations. Our main observation is that wireless signals attenuate differently, based on how the human body is blocking the signal. We find that this attenuation can reveal the directions of the APs in indoor environments, ultimately leading to localization. This paper studies the feasibility of SpinLoc in real-world indoor environments using off-the-shelf WiFi hardware. Our preliminary evaluation demonstrates accuracies comparable toschemes that rely on expensive war-driving.
{"title":"SpinLoc: spin once to know your location","authors":"Souvik Sen, Romit Roy Choudhury, Srihari Nelakuditi","doi":"10.1145/2162081.2162099","DOIUrl":"https://doi.org/10.1145/2162081.2162099","url":null,"abstract":"The rapid growth of location-based applications has spurred extensive research on localization. Nonetheless, indoor localization remains an elusive problem mostly because the accurate techniques come at the expense of cumbersome war-driving or additional infrastructure. Towards a solution that is easier to adopt, we propose SpinLoc that is free from these requirements. Instead, SpinLoc levies a little bit of the localization burden on the humans, expecting them to rotate around once to estimate their locations. Our main observation is that wireless signals attenuate differently, based on how the human body is blocking the signal. We find that this attenuation can reveal the directions of the APs in indoor environments, ultimately leading to localization. This paper studies the feasibility of SpinLoc in real-world indoor environments using off-the-shelf WiFi hardware. Our preliminary evaluation demonstrates accuracies comparable toschemes that rely on expensive war-driving.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"16 1","pages":"12"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89635833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we present Celleration, a novel gateway-to-mobile Traffic Redundancy Elimination (TRE) system, designed for the new generation of data-intensive cellular networks. Cellular TRE needs to account for the mobile device's limited battery power and the characteristics of the cellular network such as users' mobility, high packet-loss and long round-trip delays. Celleration is based on a novel TRE technique, in which the cellular gateway observes the forwarded chunks to identify the beginning of a previously observed chunk chain, which in turn is used as a reliable predictor to multiple future chunks. These predictions establish an ad-hoc gateway-to-mobile TRE learning mechanism that leverages the gateway's history records and the user mobile device's cached content for an efficient TRE operation for both the backhaul and the wireless last-mile. We present a data analysis of captured cellular traffic from 130 cellular sites and a long-term study of a social network. Finally, we analyze Celleration redundancy elimination and performance under high packet loss.
{"title":"Celleration: loss-resilient traffic redundancy elimination for cellular data","authors":"Eyal Zohar, I. Cidon, O. Mokryn","doi":"10.1145/2162081.2162096","DOIUrl":"https://doi.org/10.1145/2162081.2162096","url":null,"abstract":"In this paper we present Celleration, a novel gateway-to-mobile Traffic Redundancy Elimination (TRE) system, designed for the new generation of data-intensive cellular networks.\u0000 Cellular TRE needs to account for the mobile device's limited battery power and the characteristics of the cellular network such as users' mobility, high packet-loss and long round-trip delays.\u0000 Celleration is based on a novel TRE technique, in which the cellular gateway observes the forwarded chunks to identify the beginning of a previously observed chunk chain, which in turn is used as a reliable predictor to multiple future chunks. These predictions establish an ad-hoc gateway-to-mobile TRE learning mechanism that leverages the gateway's history records and the user mobile device's cached content for an efficient TRE operation for both the backhaul and the wireless last-mile.\u0000 We present a data analysis of captured cellular traffic from 130 cellular sites and a long-term study of a social network. Finally, we analyze Celleration redundancy elimination and performance under high packet loss.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"2674 1","pages":"10"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85267864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The recent surge in the use of mobile devices have opened up new avenues for communication. While most existing applications designed to exploit this potential are infrastructure based, there is a growing trend to leverage physical proximity between end-users to enable direct peer-to-peer communication. However, the success of these applications relies on the ability to efficiently detect contact opportunities, Devices that participate in such opportunistic communication often come equipped with multiple radios. For an individual node, performing neighbor discovery can be too expensive with a high-power, long-range radio (e.g., Wi-Fi). On the other hand, relying only on a low-power, short-range radio for detecting neighbors results in significantly fewer available contacts. To mitigate this problem, we have developed CQuest, a novel scheme for more efficient long-range neighbor discovery that leverages the clustering of nodes as well as the radio heterogeneity of mobile devices. The basic idea is that coordination over a low-power, short-range radio can help clustered nodes distribute the load of high-power, long-range scanning. We present results from extensive simulation that shows CQuest discovers significantly more contacts than a low-power only scheme but without incurring the high energy cost usually associated with long-range discovery. We also present results and experience from a successful implementation of the protocol on a testbed of Android G1/G2 phones that shows the feasibility of the protocol in a real network.
{"title":"United we find: enabling mobile devices to cooperate for efficient neighbor discovery","authors":"Mehedi Bakht, John Carlson, A. Loeb, R. Kravets","doi":"10.1145/2162081.2162097","DOIUrl":"https://doi.org/10.1145/2162081.2162097","url":null,"abstract":"The recent surge in the use of mobile devices have opened up new avenues for communication. While most existing applications designed to exploit this potential are infrastructure based, there is a growing trend to leverage physical proximity between end-users to enable direct peer-to-peer communication. However, the success of these applications relies on the ability to efficiently detect contact opportunities, Devices that participate in such opportunistic communication often come equipped with multiple radios. For an individual node, performing neighbor discovery can be too expensive with a high-power, long-range radio (e.g., Wi-Fi). On the other hand, relying only on a low-power, short-range radio for detecting neighbors results in significantly fewer available contacts. To mitigate this problem, we have developed CQuest, a novel scheme for more efficient long-range neighbor discovery that leverages the clustering of nodes as well as the radio heterogeneity of mobile devices. The basic idea is that coordination over a low-power, short-range radio can help clustered nodes distribute the load of high-power, long-range scanning. We present results from extensive simulation that shows CQuest discovers significantly more contacts than a low-power only scheme but without incurring the high energy cost usually associated with long-range discovery. We also present results and experience from a successful implementation of the protocol on a testbed of Android G1/G2 phones that shows the feasibility of the protocol in a real network.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"15 1","pages":"11"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84554573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jacob M. Sorber, Minho Shin, Ronald A. Peterson, Cory Cornelius, Shrirang Mare, Aarathi Prasad, Zachary Marois, Emma Smithayer, D. Kotz
Mobile technology has significant potential to help revolutionize personal wellness and the delivery of healthcare. Mobile phones, wearable sensors, and home-based tele-medicine devices can help caregivers and individuals themselves better monitor and manage their health. While the potential benefits of this "mHealth" technology include better health, more effective healthcare, and reduced cost, this technology also poses significant security and privacy challenges. In this paper we propose Amulet, an mHealth architecture that provides strong security and privacy guarantees while remaining easy to use, and outline the research and engineering challenges required to realize the Amulet vision.
{"title":"An amulet for trustworthy wearable mHealth","authors":"Jacob M. Sorber, Minho Shin, Ronald A. Peterson, Cory Cornelius, Shrirang Mare, Aarathi Prasad, Zachary Marois, Emma Smithayer, D. Kotz","doi":"10.1145/2162081.2162092","DOIUrl":"https://doi.org/10.1145/2162081.2162092","url":null,"abstract":"Mobile technology has significant potential to help revolutionize personal wellness and the delivery of healthcare. Mobile phones, wearable sensors, and home-based tele-medicine devices can help caregivers and individuals themselves better monitor and manage their health. While the potential benefits of this \"mHealth\" technology include better health, more effective healthcare, and reduced cost, this technology also poses significant security and privacy challenges. In this paper we propose Amulet, an mHealth architecture that provides strong security and privacy guarantees while remaining easy to use, and outline the research and engineering challenges required to realize the Amulet vision.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"4 1","pages":"7"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89849912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Azeem J. Khan, Vigneshwaran Subbaraju, Archan Misra, S. Seshan
The dominant, "ad-supported free application" model for consumer-oriented mobile computing is seemingly imperiled by the growing global adoption of metered data pricing plans by mobile operators. In this paper, we explore the opportunities for addressing this emerging conflict by enabling more intelligent ad delivery to such mobile devices. One especially promising path is leveraging the increasing availability of heterogeneous wireless access technologies (e.g., WiFi, femtocells) that offer less restrictive and more energy-efficient transport substrates for such data traffic. To understand the possibilities that exist, we first profile the advertisement traffic characteristics for some of the most popular advertisement-supported consumer applications, and then analyze the key features of mobile advertisement delivery. We then outline the principles of CAMEO, a middleware that uses predictive profiling of a user's {device, network and usage} context to anticipate the advertisements that need to be served, and then modulates their delivery mechanism to enable effective mobile advertising, but at considerably lower costs.
{"title":"Mitigating the true cost of advertisement-supported \"free\" mobile applications","authors":"Azeem J. Khan, Vigneshwaran Subbaraju, Archan Misra, S. Seshan","doi":"10.1145/2162081.2162083","DOIUrl":"https://doi.org/10.1145/2162081.2162083","url":null,"abstract":"The dominant, \"ad-supported free application\" model for consumer-oriented mobile computing is seemingly imperiled by the growing global adoption of metered data pricing plans by mobile operators. In this paper, we explore the opportunities for addressing this emerging conflict by enabling more intelligent ad delivery to such mobile devices. One especially promising path is leveraging the increasing availability of heterogeneous wireless access technologies (e.g., WiFi, femtocells) that offer less restrictive and more energy-efficient transport substrates for such data traffic. To understand the possibilities that exist, we first profile the advertisement traffic characteristics for some of the most popular advertisement-supported consumer applications, and then analyze the key features of mobile advertisement delivery. We then outline the principles of CAMEO, a middleware that uses predictive profiling of a user's {device, network and usage} context to anticipate the advertisements that need to be served, and then modulates their delivery mechanism to enable effective mobile advertising, but at considerably lower costs.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"89 1","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85720293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Location systems are key to a rich experience for mobile users. When they roam outdoors, mobiles can usually count on a clear GPS signal for an accurate location, but indoors, GPS usually fades, and so up until recently, mobiles have had to rely mainly on rather coarse-grained signal strength readings for location. What has changed this status quo is the recent trend of dramatically increasing numbers of antennas at the indoor AP, mainly to bolster capacity and coverage with multiple-input, multiple-output (MIMO) techniques. In the near future, the number of antennas at the access point will increase several-fold, to meet increasing demands for wireless capacity with MIMO links, spatial division multiplexing, and interference management. We thus observe an opportunity to revisit the important problem of localization with a fresh perspective. This paper presents the design and experimental evaluation of ArrayTrack, an indoor location system that uses MIMO-based techniques to track wireless clients in real time as they roam about a building. We prototype ArrayTrack on a WARP platform, emulating the capabilities of an inexpensive 802.11 wireless access point. Our results show that ArrayTrack can pinpoint 33 clients spread out over an indoor office environment to within a 36 cm location accuracy.
{"title":"Towards fine-grained radio-based indoor location","authors":"Jie Xiong, K. Jamieson","doi":"10.1145/2162081.2162100","DOIUrl":"https://doi.org/10.1145/2162081.2162100","url":null,"abstract":"Location systems are key to a rich experience for mobile users. When they roam outdoors, mobiles can usually count on a clear GPS signal for an accurate location, but indoors, GPS usually fades, and so up until recently, mobiles have had to rely mainly on rather coarse-grained signal strength readings for location. What has changed this status quo is the recent trend of dramatically increasing numbers of antennas at the indoor AP, mainly to bolster capacity and coverage with multiple-input, multiple-output (MIMO) techniques. In the near future, the number of antennas at the access point will increase several-fold, to meet increasing demands for wireless capacity with MIMO links, spatial division multiplexing, and interference management. We thus observe an opportunity to revisit the important problem of localization with a fresh perspective. This paper presents the design and experimental evaluation of ArrayTrack, an indoor location system that uses MIMO-based techniques to track wireless clients in real time as they roam about a building. We prototype ArrayTrack on a WARP platform, emulating the capabilities of an inexpensive 802.11 wireless access point. Our results show that ArrayTrack can pinpoint 33 clients spread out over an indoor office environment to within a 36 cm location accuracy.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"1 1","pages":"13"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76843230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ilias Leontiadis, Christos Efstratiou, Marco Picone, C. Mascolo
Application markets have revolutionized the software download model of mobile phones: third-party application developers offer software on the market that users can effortlessly install on their phones. This great step forward, however, also imposes some threats to user privacy: applications often ask for permissions that reveal private information such as the user's location, contacts and messages. While some mechanisms to prevent leaks of user privacy to applications have been proposed by the research community, these solutions fail to consider that application markets are primarily driven by advertisements that rely on accurately profiling the user. In this paper we take into account that there are two parties with conflicting interests: the user, interested in maintaining their privacy and the developer who would like to maximize their advertisement revenue through user profiling. We have conducted an extensive analysis of more than 250,000 applications in the Android market. Our results indicate that the current privacy protection mechanisms are not effective as developers and advert companies are not deterred. Therefore, we designed and implemented a market-aware privacy protection framework that aims to achieve an equilibrium between the developer's revenue and the user's privacy. The proposed framework is based on the establishment of a feedback control loop that adjusts the level of privacy protection on mobile phones, in response to advertisement generated revenue.
{"title":"Don't kill my ads!: balancing privacy in an ad-supported mobile application market","authors":"Ilias Leontiadis, Christos Efstratiou, Marco Picone, C. Mascolo","doi":"10.1145/2162081.2162084","DOIUrl":"https://doi.org/10.1145/2162081.2162084","url":null,"abstract":"Application markets have revolutionized the software download model of mobile phones: third-party application developers offer software on the market that users can effortlessly install on their phones. This great step forward, however, also imposes some threats to user privacy: applications often ask for permissions that reveal private information such as the user's location, contacts and messages. While some mechanisms to prevent leaks of user privacy to applications have been proposed by the research community, these solutions fail to consider that application markets are primarily driven by advertisements that rely on accurately profiling the user. In this paper we take into account that there are two parties with conflicting interests: the user, interested in maintaining their privacy and the developer who would like to maximize their advertisement revenue through user profiling. We have conducted an extensive analysis of more than 250,000 applications in the Android market. Our results indicate that the current privacy protection mechanisms are not effective as developers and advert companies are not deterred. Therefore, we designed and implemented a market-aware privacy protection framework that aims to achieve an equilibrium between the developer's revenue and the user's privacy. The proposed framework is based on the establishment of a feedback control loop that adjusts the level of privacy protection on mobile phones, in response to advertisement generated revenue.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"516 1","pages":"2"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77109538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A number of novel wireless networked services, ranging from participatory sensing to social networking, leverage the increasing capabilities of mobile devices and the movements of the individuals carrying them. For many of these systems, their effectiveness fundamentally depends on coverage and the particular mobility patterns of the participants. Given the strong spatial and temporal regularity of human mobility, the needed coverage can typically only be attained through a large participant base. In this paper we explore an alternative approach to attain coverage without scale -- (soft) controlling the movement of participants. We present Crowd Soft Control (CSC), an approach to exert limited control over the temporal and spatial movements of mobile users by leveraging the built-in incentives of location-based gaming and social applications. By pairing network services with these location-based apps, CSC allows researchers to use an application's incentives (e.g. game objectives) to control the movement of participating users, increasing the effectiveness and efficiency of the associated network service. After outlining the case for Crowd Soft Control, we present an initial prototype of our ideas and discuss potential benefits and costs in the context of two case studies.
{"title":"Crowd (soft) control: moving beyond the opportunistic","authors":"John P. Rula, F. Bustamante","doi":"10.1145/2162081.2162086","DOIUrl":"https://doi.org/10.1145/2162081.2162086","url":null,"abstract":"A number of novel wireless networked services, ranging from participatory sensing to social networking, leverage the increasing capabilities of mobile devices and the movements of the individuals carrying them. For many of these systems, their effectiveness fundamentally depends on coverage and the particular mobility patterns of the participants. Given the strong spatial and temporal regularity of human mobility, the needed coverage can typically only be attained through a large participant base.\u0000 In this paper we explore an alternative approach to attain coverage without scale -- (soft) controlling the movement of participants. We present Crowd Soft Control (CSC), an approach to exert limited control over the temporal and spatial movements of mobile users by leveraging the built-in incentives of location-based gaming and social applications. By pairing network services with these location-based apps, CSC allows researchers to use an application's incentives (e.g. game objectives) to control the movement of participating users, increasing the effectiveness and efficiency of the associated network service. After outlining the case for Crowd Soft Control, we present an initial prototype of our ideas and discuss potential benefits and costs in the context of two case studies.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"472 1","pages":"3"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81877791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Emmanuel Owusu, Jun Han, Sauvik Das, A. Perrig, J. Zhang
We show that accelerometer readings are a powerful side channel that can be used to extract entire sequences of entered text on a smart-phone touchscreen keyboard. This possibility is a concern for two main reasons. First, unauthorized access to one's keystrokes is a serious invasion of privacy as consumers increasingly use smartphones for sensitive transactions. Second, unlike many other sensors found on smartphones, the accelerometer does not require special privileges to access on current smartphone OSes. We show that accelerometer measurements can be used to extract 6-character passwords in as few as 4.5 trials (median).
{"title":"ACCessory: password inference using accelerometers on smartphones","authors":"Emmanuel Owusu, Jun Han, Sauvik Das, A. Perrig, J. Zhang","doi":"10.1145/2162081.2162095","DOIUrl":"https://doi.org/10.1145/2162081.2162095","url":null,"abstract":"We show that accelerometer readings are a powerful side channel that can be used to extract entire sequences of entered text on a smart-phone touchscreen keyboard. This possibility is a concern for two main reasons. First, unauthorized access to one's keystrokes is a serious invasion of privacy as consumers increasingly use smartphones for sensitive transactions. Second, unlike many other sensors found on smartphones, the accelerometer does not require special privileges to access on current smartphone OSes. We show that accelerometer measurements can be used to extract 6-character passwords in as few as 4.5 trials (median).","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"1 1","pages":"9"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89743603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lenin Ravindranath, Arvind Thiagarajan, H. Balakrishnan, S. Madden
A growing class of smartphone applications are tasking applications that run continuously, process data from sensors to determine the user's context (such as location) and activity, and optionally trigger certain actions when the right conditions occur. Many such tasking applications also involve coordination between multiple users or devices. Example tasking applications include location-based reminders, changing the ring-mode of a phone automatically depending on location, notifying when friends are nearby, disabling WiFi in favor of cellular data when moving at more than a certain speed outdoors, automatically tracking and storing movement tracks when driving, and inferring the number of steps walked each day. Today, these applications are non-trivial to develop, although they are often trivial for end users to state. Additionally, simple implementations can consume excessive amounts of energy. This paper proposes Code in the Air (CITA), a system which simplifies the rapid development of tasking applications. It enables non-expert end users to easily express simple tasks on their phone, and more sophisticated developers to write code for complex tasks by writing purely server-side scripts. CITA provides a task execution framework to automatically distribute and coordinate tasks, energy-efficient modules to infer user activities and compose them, and a push communication service for mobile devices that overcomes some shortcomings in existing push services.
越来越多的智能手机应用程序都是连续运行的任务应用程序,处理来自传感器的数据以确定用户的上下文(如位置)和活动,并在适当的情况下选择性地触发某些操作。许多这样的任务应用程序还涉及多个用户或设备之间的协调。任务处理应用的例子包括基于位置的提醒、根据位置自动改变手机的铃声模式、朋友在附近时发出通知、在户外以超过一定速度移动时禁用WiFi以支持蜂窝数据、驾驶时自动跟踪和存储运动轨迹,以及推断每天行走的步数。今天,这些应用程序的开发是非常重要的,尽管它们对于最终用户来说通常是微不足道的。此外,简单的实现可能会消耗过多的能量。本文提出了空中代码(Code in the Air, CITA)系统,它简化了任务应用程序的快速开发。它使非专业的最终用户可以轻松地在手机上表达简单的任务,而更成熟的开发人员可以通过编写纯粹的服务器端脚本来编写复杂任务的代码。CITA提供了一个任务执行框架来自动分配和协调任务,提供了高能效的模块来推断和组合用户活动,提供了一个针对移动设备的推送通信服务,克服了现有推送服务的一些不足。
{"title":"Code in the air: simplifying sensing and coordination tasks on smartphones","authors":"Lenin Ravindranath, Arvind Thiagarajan, H. Balakrishnan, S. Madden","doi":"10.1145/2162081.2162087","DOIUrl":"https://doi.org/10.1145/2162081.2162087","url":null,"abstract":"A growing class of smartphone applications are tasking applications that run continuously, process data from sensors to determine the user's context (such as location) and activity, and optionally trigger certain actions when the right conditions occur. Many such tasking applications also involve coordination between multiple users or devices. Example tasking applications include location-based reminders, changing the ring-mode of a phone automatically depending on location, notifying when friends are nearby, disabling WiFi in favor of cellular data when moving at more than a certain speed outdoors, automatically tracking and storing movement tracks when driving, and inferring the number of steps walked each day. Today, these applications are non-trivial to develop, although they are often trivial for end users to state. Additionally, simple implementations can consume excessive amounts of energy. This paper proposes Code in the Air (CITA), a system which simplifies the rapid development of tasking applications. It enables non-expert end users to easily express simple tasks on their phone, and more sophisticated developers to write code for complex tasks by writing purely server-side scripts. CITA provides a task execution framework to automatically distribute and coordinate tasks, energy-efficient modules to infer user activities and compose them, and a push communication service for mobile devices that overcomes some shortcomings in existing push services.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"136 1","pages":"4"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78180079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}