Ahmad Rahmati, Lin Zhong, V. Vasudevan, Jehan Wickramasuriya, D. Stewart
Many existing electronic devices lack data connectivity but carry an FM radio receiver. Such devices include media players, vehicular audio systems, low-end mobile phones, and mobile phones whose owners cannot afford data plans. We observe that the highly available FM radio data system (RDS) provides a low-rate digital broadcast channel that is specific to the radio station an FM receiver tunes to. While RDS is mainly intended for delivering simple information about the station and current program, we argue that it can be employed to enable a broad range of new applications and enhance existing ones. In this position paper, we discuss a number of applications that can be enabled or enhanced by RDS, and analyze the challenges evolved. We then present RDS-Link, a protocol to efficiently transfer broadcast data over RDS, and characterize its performance under real-life settings.
{"title":"Enabling pervasive mobile applications with the FM radio broadcast data system","authors":"Ahmad Rahmati, Lin Zhong, V. Vasudevan, Jehan Wickramasuriya, D. Stewart","doi":"10.1145/1734583.1734603","DOIUrl":"https://doi.org/10.1145/1734583.1734603","url":null,"abstract":"Many existing electronic devices lack data connectivity but carry an FM radio receiver. Such devices include media players, vehicular audio systems, low-end mobile phones, and mobile phones whose owners cannot afford data plans. We observe that the highly available FM radio data system (RDS) provides a low-rate digital broadcast channel that is specific to the radio station an FM receiver tunes to. While RDS is mainly intended for delivering simple information about the station and current program, we argue that it can be employed to enable a broad range of new applications and enhance existing ones. In this position paper, we discuss a number of applications that can be enabled or enhanced by RDS, and analyze the challenges evolved. We then present RDS-Link, a protocol to efficiently transfer broadcast data over RDS, and characterize its performance under real-life settings.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"1 1","pages":"78-83"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75393785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sibren Isaacman, R. A. Becker, R. Cáceres, S. Kobourov, James R. Rowland, A. Varshavsky
An improved understanding of human mobility patterns would yield insights into a variety of important societal issues such as the environmental impact of daily commutes. Location information from cellular wireless networks has great potential as a tool for studying these patterns. In this work, we use anonymous and aggregate statistics of the approximate locations of hundreds of thousands of cell phones in Los Angeles and New York City to demonstrate different mobility patterns in the two cities. For example, we show that Angelenos have median daily travel distances two times greater than New Yorkers, but that the most mobile 25% of New Yorkers travel six times farther than their Los Angeles counterparts.
{"title":"A tale of two cities","authors":"Sibren Isaacman, R. A. Becker, R. Cáceres, S. Kobourov, James R. Rowland, A. Varshavsky","doi":"10.1145/1734583.1734589","DOIUrl":"https://doi.org/10.1145/1734583.1734589","url":null,"abstract":"An improved understanding of human mobility patterns would yield insights into a variety of important societal issues such as the environmental impact of daily commutes. Location information from cellular wireless networks has great potential as a tool for studying these patterns. In this work, we use anonymous and aggregate statistics of the approximate locations of hundreds of thousands of cell phones in Los Angeles and New York City to demonstrate different mobility patterns in the two cities. For example, we show that Angelenos have median daily travel distances two times greater than New Yorkers, but that the most mobile 25% of New Yorkers travel six times farther than their Los Angeles counterparts.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"70 1","pages":"19-24"},"PeriodicalIF":0.0,"publicationDate":"2010-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80388260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tamara Denning, Adrienne Andrew, Rohit Chaudhri, Carl Hartung, Jonathan Lester, Gaetano Borriello, Glen Duncan
Technology offers the potential to objectively monitor people's eating and activity behaviors and encourage healthier lifestyles. BALANCE is a mobile phone-based system for long term wellness management. The BALANCE system automatically detects the user's caloric expenditure via sensor data from a Mobile Sensing Platform unit worn on the hip. Users manually enter information on foods eaten via an interface on an N95 mobile phone. Initial validation experiments measuring oxygen consumption during treadmill walking and jogging show that the system's estimate of caloric output is within 87% of the actual value. Future work will refine and continue to evaluate the system's efficacy and develop more robust data input and activity inference methods.
{"title":"BALANCE: Towards a Usable Pervasive Wellness Application with Accurate Activity Inference.","authors":"Tamara Denning, Adrienne Andrew, Rohit Chaudhri, Carl Hartung, Jonathan Lester, Gaetano Borriello, Glen Duncan","doi":"10.1145/1514411.1514416","DOIUrl":"https://doi.org/10.1145/1514411.1514416","url":null,"abstract":"<p><p>Technology offers the potential to objectively monitor people's eating and activity behaviors and encourage healthier lifestyles. BALANCE is a mobile phone-based system for long term wellness management. The BALANCE system automatically detects the user's caloric expenditure via sensor data from a Mobile Sensing Platform unit worn on the hip. Users manually enter information on foods eaten via an interface on an N95 mobile phone. Initial validation experiments measuring oxygen consumption during treadmill walking and jogging show that the system's estimate of caloric output is within 87% of the actual value. Future work will refine and continue to evaluate the system's efficacy and develop more robust data input and activity inference methods.</p>","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"2009 ","pages":"5"},"PeriodicalIF":0.0,"publicationDate":"2009-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/1514411.1514416","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"28968183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arunesh Mishra, Shravan K. Rayanchu, Dheeraj Agrawal, Suman Banerjee
Continuous mobility scenarios are those in which applications continue to use the radio interface while on the move. With the emergence of Voice-over-WiFi phones, WiFi-enabled music players, and many other such gadgets, continuous mobility is becoming a prevalent mode of operation for WiFi standards. We contend that the existing packetization structures employed in WiFi devices, is not the most suitable for these emerging class of continuous mobility applications. Therefore, in this paper, we suggest a new software-level, standards-compliant extension to the WiFi packetization techniques that provides greater agility and improved performance. In particular, we propose the notion of a multi-rate wireless packet, in which different segments of the same Protocol Data Unit (PDU) are modulated at different physical transmission rates. This is a departure from conventional modulation mechanisms in which the entire PDU is modulated using a single rate. In this paper, we (i) discuss some uses of such a packetization structure for continuous mobility applications, (ii) describe a practical approach to implementing multi-rate wireless packetization in the 802.11 context as a software-only modification that directly leverages current PHY and MAC layer implementations, and (iii) demonstrate the benefits of such an approach with some simple evaluation. We conclude by discussing some of the next steps needed to realize the full potential of this notion.
{"title":"Supporting continuous mobility through multi-rate wireless packetization","authors":"Arunesh Mishra, Shravan K. Rayanchu, Dheeraj Agrawal, Suman Banerjee","doi":"10.1145/1411759.1411769","DOIUrl":"https://doi.org/10.1145/1411759.1411769","url":null,"abstract":"Continuous mobility scenarios are those in which applications continue to use the radio interface while on the move. With the emergence of Voice-over-WiFi phones, WiFi-enabled music players, and many other such gadgets, continuous mobility is becoming a prevalent mode of operation for WiFi standards. We contend that the existing packetization structures employed in WiFi devices, is not the most suitable for these emerging class of continuous mobility applications. Therefore, in this paper, we suggest a new software-level, standards-compliant extension to the WiFi packetization techniques that provides greater agility and improved performance. In particular, we propose the notion of a multi-rate wireless packet, in which different segments of the same Protocol Data Unit (PDU) are modulated at different physical transmission rates. This is a departure from conventional modulation mechanisms in which the entire PDU is modulated using a single rate. In this paper, we (i) discuss some uses of such a packetization structure for continuous mobility applications, (ii) describe a practical approach to implementing multi-rate wireless packetization in the 802.11 context as a software-only modification that directly leverages current PHY and MAC layer implementations, and (iii) demonstrate the benefits of such an approach with some simple evaluation. We conclude by discussing some of the next steps needed to realize the full potential of this notion.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"50 3","pages":"33-37"},"PeriodicalIF":0.0,"publicationDate":"2008-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/1411759.1411769","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72457228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Narayanaswami, D. Coffman, M. C. Lee, Y. Moon, J. Han, H. Jang, S. McFaddin, Y. S. Paik, J. Kim, J. K. Lee, J. Park, D. Soroker
The proliferation of powerful mobile devices and the deployment of large displays in public spaces give rise to new and exciting opportunities in personalized and targeted advertising. Advertising in such public spaces also raises interesting questions in several areas such as capturing and aggregating user context, tailoring of ads, measuring advertisement efficacy, capturing user attention, charging model and monetization, user privacy, and the roles of parties in the ecosystem among others. In this paper, we introduce the opportunities and challenges in delivering advertisements to ambient displays utilizing information pertaining to users near the display. We then discuss some ways to address them and describe our first prototype. Though many traditional challenges concerning the design, usability, connectivity, and applications of mobile systems are still important, we believe that applications and challenges resulting from symbiosis between mobile systems and surrounding devices, such as the subject of this paper, are a rich area for further exploration by the mobile computing community.
{"title":"Pervasive symbiotic advertising","authors":"C. Narayanaswami, D. Coffman, M. C. Lee, Y. Moon, J. Han, H. Jang, S. McFaddin, Y. S. Paik, J. Kim, J. K. Lee, J. Park, D. Soroker","doi":"10.1145/1411759.1411781","DOIUrl":"https://doi.org/10.1145/1411759.1411781","url":null,"abstract":"The proliferation of powerful mobile devices and the deployment of large displays in public spaces give rise to new and exciting opportunities in personalized and targeted advertising. Advertising in such public spaces also raises interesting questions in several areas such as capturing and aggregating user context, tailoring of ads, measuring advertisement efficacy, capturing user attention, charging model and monetization, user privacy, and the roles of parties in the ecosystem among others. In this paper, we introduce the opportunities and challenges in delivering advertisements to ambient displays utilizing information pertaining to users near the display. We then discuss some ways to address them and describe our first prototype. Though many traditional challenges concerning the design, usability, connectivity, and applications of mobile systems are still important, we believe that applications and challenges resulting from symbiosis between mobile systems and surrounding devices, such as the subject of this paper, are a rich area for further exploration by the mobile computing community.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"19 1","pages":"80-85"},"PeriodicalIF":0.0,"publicationDate":"2008-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87984726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ajay Surie, H. A. Lagar-Cavilla, E. D. Lara, M. Satyanarayanan
Virtual machine (VM) migration has been proposed as a building block for mobile computing. An important challenge for VM migration is to optimize the transfer of large amounts of disk and memory state. We propose a solution based on the opportunistic replay of user interactions with applications at the GUI level. Whereas this approach results in very small replay logs that economize network utilization, replay of user interactions on a VM at the migration target site can result in divergent VM state. Cryptographic hashing techniques are used to identify and transmit only the differences. We discuss the implementation challenges of this approach, and present encouraging results from an early prototype that show savings of up to 80.5% of bytes transferred.
{"title":"Low-bandwidth VM migration via opportunistic replay","authors":"Ajay Surie, H. A. Lagar-Cavilla, E. D. Lara, M. Satyanarayanan","doi":"10.1145/1411759.1411779","DOIUrl":"https://doi.org/10.1145/1411759.1411779","url":null,"abstract":"Virtual machine (VM) migration has been proposed as a building block for mobile computing. An important challenge for VM migration is to optimize the transfer of large amounts of disk and memory state. We propose a solution based on the opportunistic replay of user interactions with applications at the GUI level. Whereas this approach results in very small replay logs that economize network utilization, replay of user interactions on a VM at the migration target site can result in divergent VM state. Cryptographic hashing techniques are used to identify and transmit only the differences. We discuss the implementation challenges of this approach, and present encouraging results from an early prototype that show savings of up to 80.5% of bytes transferred.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"12 1","pages":"74-79"},"PeriodicalIF":0.0,"publicationDate":"2008-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91385143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Current methods of conceiving, engineering and using mobile technology typically embody a single integrated design philosophy. This integrated design approach seeks to combine as many features and functions into a single device as possible. In this manner it can be said that it hides the complexity of the system from the user. However, this design philosophy is by no means ubiquitous. In fact, it is the antithesis of one of the major design philosophies that characterizes modern thinking and underlies other areas of computing: modularity. The modular design approach attempts to create simplicity, not by combining multiple functions into one integrated whole, but by separating them out into distinct functional units. This work examines aspects of modular design that are relevant to computing in general, and what they might offer to the design and use of mobile systems.
{"title":"Getting mod: a look at modularity in mobile systems","authors":"Evan Barba","doi":"10.1145/1411759.1411766","DOIUrl":"https://doi.org/10.1145/1411759.1411766","url":null,"abstract":"Current methods of conceiving, engineering and using mobile technology typically embody a single integrated design philosophy. This integrated design approach seeks to combine as many features and functions into a single device as possible. In this manner it can be said that it hides the complexity of the system from the user. However, this design philosophy is by no means ubiquitous. In fact, it is the antithesis of one of the major design philosophies that characterizes modern thinking and underlies other areas of computing: modularity. The modular design approach attempts to create simplicity, not by combining multiple functions into one integrated whole, but by separating them out into distinct functional units. This work examines aspects of modular design that are relevant to computing in general, and what they might offer to the design and use of mobile systems.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"270 1","pages":"22-26"},"PeriodicalIF":0.0,"publicationDate":"2008-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82795209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We present 'Screen codes' - a space- and time-efficient, aesthetically compelling method for transferring data from a display to a camera-equipped mobile device. Screen codes encode data as a grid of luminosity fluctuations within an arbitrary image, displayed on the video screen and decoded on a mobile device. These 'twinkling' images are a form of 'visual hyperlink', by which users can move dynamically generated content to and from their mobile devices. They help bridge the 'content divide' between mobile and fixed computing.
{"title":"Screen codes: visual hyperlinks for displays","authors":"J. Collomosse, T. Kindberg","doi":"10.1145/1411759.1411782","DOIUrl":"https://doi.org/10.1145/1411759.1411782","url":null,"abstract":"We present 'Screen codes' - a space- and time-efficient, aesthetically compelling method for transferring data from a display to a camera-equipped mobile device. Screen codes encode data as a grid of luminosity fluctuations within an arbitrary image, displayed on the video screen and decoded on a mobile device. These 'twinkling' images are a form of 'visual hyperlink', by which users can move dynamically generated content to and from their mobile devices. They help bridge the 'content divide' between mobile and fixed computing.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"34 1","pages":"86-90"},"PeriodicalIF":0.0,"publicationDate":"2008-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78516273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cost is one of the key challenges facing the deployment of wireless networks. Though 802.11-based networks have shown that costly, licensed spectrum is not always necessary, the costs of other components especially backhaul and network equipment continue to impede the growth of mobile wireless networks. In this paper, we provide some insights into how such costs can be reduced by designing a novel, low-cost authentication infrastructure for wireless networks. Our authentication scheme relies on base stations to collectively store authentication information. Thus, it eliminates the need to maintain costly infrastructure required by the traditional centralized scheme. Moreover, our scheme is optimized for mobility-induced handover "re-authentication" and, hence, reduces the authentication overhead.
{"title":"Distributed authentication for low-cost wireless networks","authors":"S. Machiraju, Hao Chen, J. Bolot","doi":"10.1145/1411759.1411774","DOIUrl":"https://doi.org/10.1145/1411759.1411774","url":null,"abstract":"Cost is one of the key challenges facing the deployment of wireless networks. Though 802.11-based networks have shown that costly, licensed spectrum is not always necessary, the costs of other components especially backhaul and network equipment continue to impede the growth of mobile wireless networks. In this paper, we provide some insights into how such costs can be reduced by designing a novel, low-cost authentication infrastructure for wireless networks. Our authentication scheme relies on base stations to collectively store authentication information. Thus, it eliminates the need to maintain costly infrastructure required by the traditional centralized scheme. Moreover, our scheme is optimized for mobility-induced handover \"re-authentication\" and, hence, reduces the authentication overhead.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"36 1","pages":"55-59"},"PeriodicalIF":0.0,"publicationDate":"2008-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82816271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Thompson, P. Zerfos, Robert Sombrutzki, J. Redlich, Haiyun Luo
A new model for developing cellular-like networks is emerging in the market in which end users own and install part of the infrastructure and share it with other customers. The network grows "organically" as more end users join and contribute to its expansion. To drastically reduce the cost of these customer-installed networks, self-managed service designs are needed that implement all the services and their management functionality with minimal support from a core network or central planning entity. In this paper, we describe the design and implementation of two basic cellular network services, authentication, and location registration, from which we learn some important insights into the design of future services. We also highlight challenges that need to be solved in order for organic networks to prove a viable alternative to centrally managed cellular infrastructures.
{"title":"100% organic: design and implementation of self-sustaining cellular networks","authors":"N. Thompson, P. Zerfos, Robert Sombrutzki, J. Redlich, Haiyun Luo","doi":"10.1145/1411759.1411768","DOIUrl":"https://doi.org/10.1145/1411759.1411768","url":null,"abstract":"A new model for developing cellular-like networks is emerging in the market in which end users own and install part of the infrastructure and share it with other customers. The network grows \"organically\" as more end users join and contribute to its expansion. To drastically reduce the cost of these customer-installed networks, self-managed service designs are needed that implement all the services and their management functionality with minimal support from a core network or central planning entity. In this paper, we describe the design and implementation of two basic cellular network services, authentication, and location registration, from which we learn some important insights into the design of future services. We also highlight challenges that need to be solved in order for organic networks to prove a viable alternative to centrally managed cellular infrastructures.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"16 1","pages":"27-32"},"PeriodicalIF":0.0,"publicationDate":"2008-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81731059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}