Elena Agapie, Gang Chen, D. Houston, E. Howard, Ji-Hoon Kim, Min Y. Mun, A. Mondschein, S. Reddy, R. Rosario, Jason Ryder, Ami Steiner, J. Burke, E. Estrin, Mark H. Hansen, Mohammad H. Rahimi
Each of us has a complex and reciprocal relationship with our environment. Based on limited knowledge of this interwoven set of influences and consequences, we constantly make choices: where to live, how to go to work, what brands to buy, what to do with our leisure time. These choices evolve into patterns, and these patterns become driving functions of our relationship with the world around us. With increasing ease, devices we carry can sense, process, and transmit data on these patterns for our own use or to share, carefully, with others. In particular, here we will focus on location time series, gathered from GPS-enabled personal mobile devices. From this capacity emerges a new class of hybrid mobile-web applications that, first, enable personal exploration of our own patterns and, second, use the same data to index our life into other available datasets about the world around us. Such applications, revealing the previously unobservable about our own lives, offer an opportunity to employ mobile technology to illuminate the ramifications of our choices on others and the effects of the "microenvironments" we move through on us [1, 10].
{"title":"Seeing our signals: combining location traces and web-based models for personal discovery","authors":"Elena Agapie, Gang Chen, D. Houston, E. Howard, Ji-Hoon Kim, Min Y. Mun, A. Mondschein, S. Reddy, R. Rosario, Jason Ryder, Ami Steiner, J. Burke, E. Estrin, Mark H. Hansen, Mohammad H. Rahimi","doi":"10.1145/1411759.1411762","DOIUrl":"https://doi.org/10.1145/1411759.1411762","url":null,"abstract":"Each of us has a complex and reciprocal relationship with our environment. Based on limited knowledge of this interwoven set of influences and consequences, we constantly make choices: where to live, how to go to work, what brands to buy, what to do with our leisure time. These choices evolve into patterns, and these patterns become driving functions of our relationship with the world around us. With increasing ease, devices we carry can sense, process, and transmit data on these patterns for our own use or to share, carefully, with others. In particular, here we will focus on location time series, gathered from GPS-enabled personal mobile devices. From this capacity emerges a new class of hybrid mobile-web applications that, first, enable personal exploration of our own patterns and, second, use the same data to index our life into other available datasets about the world around us. Such applications, revealing the previously unobservable about our own lives, offer an opportunity to employ mobile technology to illuminate the ramifications of our choices on others and the effects of the \"microenvironments\" we move through on us [1, 10].","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"77 1","pages":"6-10"},"PeriodicalIF":0.0,"publicationDate":"2008-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77675232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang, M. Martonosi
The recent explosion in shared media content and sensed data produced by mobile end-users is challenging well-established principles and assumptions in data trust models. A fundamental issue we address in this paper is how to establish some trust level in the authenticity of content created by untrusted mobile users. We advocate a secure localization and certification service that allows content producers to tag their content with with a spatial times-tamp indicating its physical location. At the same time, however, our approach preserves the privacy of producers by not exposing their identity to the potential content consumers. We provide a list of existing and possible applications that would profit from such a secure localization service and sketch possible implementations of the service, highlighting advantages and drawbacks.
{"title":"Location-based trust for mobile user-generated content: applications, challenges and implementations","authors":"Vincent Lenders, Emmanouil Koukoumidis, Pei Zhang, M. Martonosi","doi":"10.1145/1411759.1411775","DOIUrl":"https://doi.org/10.1145/1411759.1411775","url":null,"abstract":"The recent explosion in shared media content and sensed data produced by mobile end-users is challenging well-established principles and assumptions in data trust models. A fundamental issue we address in this paper is how to establish some trust level in the authenticity of content created by untrusted mobile users. We advocate a secure localization and certification service that allows content producers to tag their content with with a spatial times-tamp indicating its physical location. At the same time, however, our approach preserves the privacy of producers by not exposing their identity to the potential content consumers. We provide a list of existing and possible applications that would profit from such a secure localization service and sketch possible implementations of the service, highlighting advantages and drawbacks.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"239 1","pages":"60-64"},"PeriodicalIF":0.0,"publicationDate":"2008-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80984309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kan Cai, Junfang Wang, Reza Lotun, M. Feeley, Michael Blackstock, C. Krasic
As mobile computing becomes ubiquitous and airspace more congested, it is increasingly important to fairly distribute bandwidth between competing wireless devices in order to ensure predictable and satisfactory performance for end users. In prior work, we have proposed a cross-layer approach called Shaper [3, 4] that uses TCP and a central router rather than the 802.11 protocol to decide the outcome of bandwidth allocation. The key idea is to avoid airspace congestion from happening in the first place. Shaper is effective and also easy to deploy. However, its implementation faces many fundamentally difficult challenges. This paper details these challenges and possible solutions.
{"title":"A wired router can eliminate 802.11 unfairness, but it's hard","authors":"Kan Cai, Junfang Wang, Reza Lotun, M. Feeley, Michael Blackstock, C. Krasic","doi":"10.1145/1411759.1411773","DOIUrl":"https://doi.org/10.1145/1411759.1411773","url":null,"abstract":"As mobile computing becomes ubiquitous and airspace more congested, it is increasingly important to fairly distribute bandwidth between competing wireless devices in order to ensure predictable and satisfactory performance for end users. In prior work, we have proposed a cross-layer approach called Shaper [3, 4] that uses TCP and a central router rather than the 802.11 protocol to decide the outcome of bandwidth allocation. The key idea is to avoid airspace congestion from happening in the first place. Shaper is effective and also easy to deploy. However, its implementation faces many fundamentally difficult challenges. This paper details these challenges and possible solutions.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"22 3 1","pages":"49-54"},"PeriodicalIF":0.0,"publicationDate":"2008-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82546734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Richard Chow, P. Golle, M. Jakobsson, Lusha Wang, Xiaofeng Wang
We show how to convert regular keyboard-entry CAPTCHAs into clickable CAPTCHAs. The goal of this conversion is to simplify and speed-up the entry of the CAPTCHA solution, to minimize user frustration and permit the use of CAPTCHAs on devices where they would otherwise be unsuitable. We propose a technique for producing secure clickable CAPTCHAs that are well suited for use on cell phones and other mobile devices. We support the practical viability of our approach by results from a user study, and an analysis of its security guarantees.
{"title":"Making CAPTCHAs clickable","authors":"Richard Chow, P. Golle, M. Jakobsson, Lusha Wang, Xiaofeng Wang","doi":"10.1145/1411759.1411783","DOIUrl":"https://doi.org/10.1145/1411759.1411783","url":null,"abstract":"We show how to convert regular keyboard-entry CAPTCHAs into clickable CAPTCHAs. The goal of this conversion is to simplify and speed-up the entry of the CAPTCHA solution, to minimize user frustration and permit the use of CAPTCHAs on devices where they would otherwise be unsuitable. We propose a technique for producing secure clickable CAPTCHAs that are well suited for use on cell phones and other mobile devices. We support the practical viability of our approach by results from a user study, and an analysis of its security guarantees.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"69 1","pages":"91-94"},"PeriodicalIF":0.0,"publicationDate":"2008-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85696281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Epidemic quorum systems enable highly available agreement even when a quorum is not simultaneously connected, and are therefore very interesting for mobile networks. Although recent work has proposed epidemic quorum algorithms, their properties and trade-offs are not well studied. This paper sheds some light on less known aspects of epidemic quorum systems. With simple counter-examples and combinatorial exercises, we contradict common misbeliefs that are often associated with epidemic quorum systems. Our claims advocate the need for a deeper study of these promising systems.
{"title":"The obscure nature of epidemic quorum systems","authors":"J. Barreto, P. Ferreira","doi":"10.1145/1411759.1411778","DOIUrl":"https://doi.org/10.1145/1411759.1411778","url":null,"abstract":"Epidemic quorum systems enable highly available agreement even when a quorum is not simultaneously connected, and are therefore very interesting for mobile networks. Although recent work has proposed epidemic quorum algorithms, their properties and trade-offs are not well studied. This paper sheds some light on less known aspects of epidemic quorum systems. With simple counter-examples and combinatorial exercises, we contradict common misbeliefs that are often associated with epidemic quorum systems. Our claims advocate the need for a deeper study of these promising systems.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"77 1","pages":"69-73"},"PeriodicalIF":0.0,"publicationDate":"2008-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77543125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Lane, S. Eisenman, Mirco Musolesi, E. Miluzzo, A. Campbell
The development of sensing systems for urban deployments is still in its infancy. An interesting unresolved issue is the precise role assumed by people within such systems. This issue has significant implications as to where the complexity and the main challenges in building urban sensing systems will reside. This issue will also impact the scale and diversity of applications that are able to be supported. We contrast two end-points of the spectrum of conscious human involvement, namely participatory sensing, and opportunistic sensing. We develop an evaluation model and argue that opportunistic sensing more easily supports larger scale applications and broader diversity within such applications. In this paper, we provide preliminary analysis which supports this conjecture, and outline techniques we are developing in support of opportunistic sensing systems.
{"title":"Urban sensing systems: opportunistic or participatory?","authors":"N. Lane, S. Eisenman, Mirco Musolesi, E. Miluzzo, A. Campbell","doi":"10.1145/1411759.1411763","DOIUrl":"https://doi.org/10.1145/1411759.1411763","url":null,"abstract":"The development of sensing systems for urban deployments is still in its infancy. An interesting unresolved issue is the precise role assumed by people within such systems. This issue has significant implications as to where the complexity and the main challenges in building urban sensing systems will reside. This issue will also impact the scale and diversity of applications that are able to be supported. We contrast two end-points of the spectrum of conscious human involvement, namely participatory sensing, and opportunistic sensing. We develop an evaluation model and argue that opportunistic sensing more easily supports larger scale applications and broader diversity within such applications. In this paper, we provide preliminary analysis which supports this conjecture, and outline techniques we are developing in support of opportunistic sensing systems.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"13 1","pages":"11-16"},"PeriodicalIF":0.0,"publicationDate":"2008-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/1411759.1411763","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72502227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Cahill, A. Senart, D. Schmidt, S. Weber, A. Harrington, B. Hughes
Air pollution, traffic congestion, stress and accidents are common features of today's road transportation experience. New approaches to improving the efficiency and safety of transportation systems are therefore required. Existing work on safe high-speed motorway driving, however, either assumes that vehicles are driverless and/or is limited to local decision making or to one-lane-only reservation systems. This paper describes a novel approach to vehicle scheduling based on real-time hierarchical scheduling, local real-time coordination and real-time inter-vehicle communication. We describe a new model in which road users reserve variable-size slots on motorway lanes, which enables enforcement of timeliness guarantees and adaptive scheduling based on a combination of local and global decisions. We present the research challenges that must be tackled to ensure that this vision of managed motorways becomes a reality.
{"title":"The managed motorway: real-time vehicle scheduling: a research agenda","authors":"V. Cahill, A. Senart, D. Schmidt, S. Weber, A. Harrington, B. Hughes","doi":"10.1145/1411759.1411771","DOIUrl":"https://doi.org/10.1145/1411759.1411771","url":null,"abstract":"Air pollution, traffic congestion, stress and accidents are common features of today's road transportation experience. New approaches to improving the efficiency and safety of transportation systems are therefore required. Existing work on safe high-speed motorway driving, however, either assumes that vehicles are driverless and/or is limited to local decision making or to one-lane-only reservation systems. This paper describes a novel approach to vehicle scheduling based on real-time hierarchical scheduling, local real-time coordination and real-time inter-vehicle communication. We describe a new model in which road users reserve variable-size slots on motorway lanes, which enables enforcement of timeliness guarantees and adaptive scheduling based on a combination of local and global decisions. We present the research challenges that must be tackled to ensure that this vision of managed motorways becomes a reality.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"13 1","pages":"43-48"},"PeriodicalIF":0.0,"publicationDate":"2008-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85010071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the last 10 years, personal computing has evolved from being primarily a desktop activity to a highly mobile one: the laptop computer, despite its large size and significant weight, has been the most popular mobile platform to date. While smart phones and MIDs (Mobile Internet Devices) have made in-roads into general computing applications, their use is limited to a few key tasks (e.g., calendar, rolodex, mp3 player) that are suited to the small size of their keypad and screen. However, given ever increasing processing and storage capabilities, the potential of these devices far exceeds the computational needs of these applications, and a significant problem facing the mobile industry is how to give users access to a full personal computing experience [9] with the mobility afforded by a smart phone or MID.
{"title":"Dynamic composable computing","authors":"R. Want, T. Pering, Shivani Sud, Barbara Rosario","doi":"10.1145/1411759.1411765","DOIUrl":"https://doi.org/10.1145/1411759.1411765","url":null,"abstract":"In the last 10 years, personal computing has evolved from being primarily a desktop activity to a highly mobile one: the laptop computer, despite its large size and significant weight, has been the most popular mobile platform to date. While smart phones and MIDs (Mobile Internet Devices) have made in-roads into general computing applications, their use is limited to a few key tasks (e.g., calendar, rolodex, mp3 player) that are suited to the small size of their keypad and screen. However, given ever increasing processing and storage capabilities, the potential of these devices far exceeds the computational needs of these applications, and a significant problem facing the mobile industry is how to give users access to a full personal computing experience [9] with the mobility afforded by a smart phone or MID.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"42 1","pages":"17-21"},"PeriodicalIF":0.0,"publicationDate":"2008-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74656236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Several applications require physically nearby Wi-Fi clients to communicate with each other. In this paper, we present a new group communication paradigm, called Neighborcast, that forms a multicast group among all nearby clients, even when they are on different frequency channels or associated to different Access Points. We describe three ways in which neighborcast can be implemented, and present three applications that will benefit from this new group communication paradigm.
{"title":"Wi-Fi neighborcast: enabling communication among nearby clients","authors":"Ranveer Chandra, J. Padhye, Lenin Ravindranath","doi":"10.1145/1411759.1411770","DOIUrl":"https://doi.org/10.1145/1411759.1411770","url":null,"abstract":"Several applications require physically nearby Wi-Fi clients to communicate with each other. In this paper, we present a new group communication paradigm, called Neighborcast, that forms a multicast group among all nearby clients, even when they are on different frequency channels or associated to different Access Points. We describe three ways in which neighborcast can be implemented, and present three applications that will benefit from this new group communication paradigm.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"7 1","pages":"38-42"},"PeriodicalIF":0.0,"publicationDate":"2008-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86752333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. P. Stuntebeck, J. S. Davis, G. Abowd, M. Blount
Remote patient monitoring generates much more data than healthcare professionals are able to manually interpret. Automated detection of events of interest is therefore critical so that these points in the data can be marked for later review. However, for some important chronic health conditions, such as pain and depression, automated detection is only partially achievable. To assist with this problem we developed HealthSense, a framework for real-time tagging of health-related sensor data. HealthSense transmits sensor data from the patient to a server for analysis via machine learning techniques. The system uses patient input to assist with classification of interesting events (e.g., pain or itching). Due to variations between patients, sensors, and condition types, we presume that our initial classification is imperfect and accommodate this by incorporating user feedback into the machine learning process. This is done by occasionally asking the patient whether they are experiencing the condition being monitored. Their response is used to confirm or reject the classification made by the server and continually improve the accuracy of the classifier's decisions on what data is of interest to the health-care provider.
{"title":"HealthSense: classification of health-related sensor data through user-assisted machine learning","authors":"E. P. Stuntebeck, J. S. Davis, G. Abowd, M. Blount","doi":"10.1145/1411759.1411761","DOIUrl":"https://doi.org/10.1145/1411759.1411761","url":null,"abstract":"Remote patient monitoring generates much more data than healthcare professionals are able to manually interpret. Automated detection of events of interest is therefore critical so that these points in the data can be marked for later review. However, for some important chronic health conditions, such as pain and depression, automated detection is only partially achievable. To assist with this problem we developed HealthSense, a framework for real-time tagging of health-related sensor data. HealthSense transmits sensor data from the patient to a server for analysis via machine learning techniques. The system uses patient input to assist with classification of interesting events (e.g., pain or itching). Due to variations between patients, sensors, and condition types, we presume that our initial classification is imperfect and accommodate this by incorporating user feedback into the machine learning process. This is done by occasionally asking the patient whether they are experiencing the condition being monitored. Their response is used to confirm or reject the classification made by the server and continually improve the accuracy of the classifier's decisions on what data is of interest to the health-care provider.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"113 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2008-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79772822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}