Xinlei Wang, Jin-Hee Cho, Kevin S. Chan, Moonjeong Chang, A. Swami, P. Mohapatra
{"title":"Trust and independence aware decision fusion in distributed networks","authors":"Xinlei Wang, Jin-Hee Cho, Kevin S. Chan, Moonjeong Chang, A. Swami, P. Mohapatra","doi":"10.1109/PerComW.2013.6529545","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529545","url":null,"abstract":"In distributed network environments, decisions must often be made based on incomplete or uncertain evidence whose sources may be dependent. Properly fusing potentially unreliable and dependent information from multiple sources is critical to effective decision making. The Transferable Belief Model (TBM), an extension of Dempster-Shafer Theory (DST), is a well known information fusion framework that can cope with conflicting evidences. However, neither DST nor TBM deals with misbehaving data sources and dependence of fusion data, which are often observed in dynamic multi-hop network environments. In this work, we propose a decision fusion framework that considers multi-dimensional trust and independence of information using a provenance technique, to enhance fusion reliability. We consider three information trust dimensions: correctness, completeness, and timeliness. Our simulation results show that the proposed framework yields a higher correct decision ratio, compared with the baseline counterparts.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"848 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126961037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christian Haas, Stephan Munz, J. Wilke, A. Hergenröder
{"title":"Evaluating energy-efficiency of hardware-based security mechanisms","authors":"Christian Haas, Stephan Munz, J. Wilke, A. Hergenröder","doi":"10.1109/PerComW.2013.6529559","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529559","url":null,"abstract":"Security in Wireless Sensor Networks (WSNs) is an omnipresent topic. In many application scenarios, like the surveillance of critical areas or infrastructures, security mechanisms have to be used to build reliable and secure applications. Up to now, most of the used cryptographic algorithms have been implemented in software despite the resource constraints in terms of processing power, memory and energy. In the past few years, the usage of special hardware accelerated security modules has been proposed as a viable alternative to software implementations. However, the energy-efficiency has not yet been evaluated in-depth. In this paper, we analyze the VaultIC420 security module and present an evaluation of its energy-efficiency. We compare the performance and energy-efficiency of the hardware module to common software implementations like TinyECC. For the energy measurements, we use IRIS sensor nodes in the SANDbed testbed at the Karlsruhe Institute of Technology. Our evaluation shows, that the VaultIC420 can save up to 76% of energy using different MAC layer protocols. It also shows, that the current draw of the VaultIC420 requires a duty-cycling mechanisms to achieve any savings compared to the software implementation.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114959504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User independent, multi-modal spotting of subtle arm actions with minimal training data","authors":"Gerald Bauer, Ulf Blanke, P. Lukowicz, B. Schiele","doi":"10.1109/PerComW.2013.6529448","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529448","url":null,"abstract":"We address a specific, particularly difficult class of activity recognition problems defined by (1) subtle, and hardly discriminative hand motions such as a short press or pull, (2) large, ill defined NULL class (any other hand motion a person may express during normal life), and (3) difficulty of collecting sufficient training data, that generalizes well from one to multiple users. In essence we intend to spot activities such as opening a cupboard, pressing a button, or taking an object from a shelve in a large data stream that contains typical every day activity. We focus on body-worn sensors without instrumenting objects, we exploit available infrastructure information, and we perform a one-to-many-users training scheme for minimal training effort. We demonstrate that a state of the art motion sensors based approach performs poorly under such conditions (Equal Error Rate of 18% in our experiments). We present and evaluate a new multi modal system based on a combination of indoor location with a wrist mounted proximity sensor, camera and inertial sensor that raises the EER to 79%.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117095308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tomotaka Okuno, A. Utsumi, Masatsugu Ichino, H. Yoshiura, I. Echizen
{"title":"Ineluctable background checking on social networks: Linking job seeker's résumé and posts","authors":"Tomotaka Okuno, A. Utsumi, Masatsugu Ichino, H. Yoshiura, I. Echizen","doi":"10.1109/PerComW.2013.6529494","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529494","url":null,"abstract":"A growing source of concern is that the privacy of individuals can be violated by linking information from multiple sources. For example, the linking of a person's anonymized information with other information about that person can lead to de-anonymization of the person. To investigate the social risks of such linking, we investigated the use of social networks for background checking, which is the process of evaluating the qualifications of job seekers, and evaluated the risk posed by the linking of information the employer already has with information on social networks. After clarifying the risk, we developed a system that links information from different sources: information extracted from a job seeker's résumé and anonymous posts on social networks. The system automatically calculates the similarity between information in the résumé and in the posts, and identifies the job seeker's social network accounts even though the profiles may have been anonymized. As a part of our system, we developed a novel method for quantifying the implications of terms in a résumé by using the posts on social networks. In an evaluation using the résumés of two job seekers and the tweets of 100 users, the system identified the accounts of both job seekers with reasonably good accuracy (true positive rate of 0.941 and true negative rate of 0.999). These findings reveal the real social threat of linking information from different sources. Our research should thus form the basis for further study of the relationship between privacy in social networks and the freedom to express opinions.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129772122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Feese, B. Arnrich, M. Rossi, G. Tröster, M. Burtscher, Bertolt Meyer, K. Jonas
{"title":"Towards monitoring firefighting teams with the smartphone","authors":"S. Feese, B. Arnrich, M. Rossi, G. Tröster, M. Burtscher, Bertolt Meyer, K. Jonas","doi":"10.1109/PerComW.2013.6529521","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529521","url":null,"abstract":"Two important aspects for efficient and safe firefighting operations are team communication behavior and physical activity coordination. In close cooperation with a firefighting brigade we investigate the potential of modern smartphones to acquire objective data on team communication and physical activity in an automatic way. We envision that such a monitoring is helpful for improving post incident feedback to enhance the efficiency and safety of firefighting operations. In this contribution we present our findings of a feasibility study in which two firefighting teams had to extinguish a kitchen fire. We present the obtained measures of speech and physical activity levels and show how the difference in performance between the two teams can be explained by the smartphone measures.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128743610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jie Yuan, Ted Ward, Sam Honarvar, Tingting Chen, Johnson P. Thomas
{"title":"HMM-driven Smart White-space-aware Frame Control Protocol for coexistence of ZigBee and WiFi","authors":"Jie Yuan, Ted Ward, Sam Honarvar, Tingting Chen, Johnson P. Thomas","doi":"10.1109/PerComW.2013.6529513","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529513","url":null,"abstract":"ZigBee has been used more and more extensively in various applications such as wireless patient monitoring, herds monitoring, smart control in home networking and game remote controllers, etc. Most of these applications are performance-sensitive so the throughput and packet delivery ratio should be guaranteed for ZigBee system to work properly. However, since both WiFi and ZigBee are operated in unlicensed ISM spectrum, the interferences from WiFi hotspots make the coexistence of ZigBee and WiFi a big challenge. WiFi traffic contains quite a lot of white spaces between frame clusters in the time domain which could be taken advantage of to improve the performance of the systems with the coexistence of ZigBee and WiFi. Most existing mechanisms dealing with the coexistence of heterogeneous wireless systems neglects this important fact. In this paper, we propose a novel approach that ensures high performance of ZigBee in spite of the presence of strong interference from WiFi, and at the same time keep the WiFi performance almost unaffected. Our approach is to learn a Hidden Markov Model (HMM) based on traces of WiFi white-spaces in the current network. With such a HMM model we can accurately characterize the dynamic distribution of the durations of white spaces in different times. Based on the HMM model of white spaces and the analysis of system performance we develop a novel ZigBee frame control protocol called HMM-driven Smart White-space-aware Frame Control Protocol which can allow ZigBee networks to coexist with WiFi networks with desired link throughput and packet delivery ratio. Some initial experimental results have shown the effectiveness of our protocol.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130634159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Kalatzis, N. Liampotis, I. Roussaki, Pavlos Kosmides, Ioannis V. Papaioannou, S. Xynogalas
{"title":"Community context management research and challenges in pervasive and social computing","authors":"N. Kalatzis, N. Liampotis, I. Roussaki, Pavlos Kosmides, Ioannis V. Papaioannou, S. Xynogalas","doi":"10.1109/PerComW.2013.6529466","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529466","url":null,"abstract":"Context-awareness is one of the main aspects of pervasive computing environments. Recently, some social networking systems have also started to exploit context information. These two paradigms serve different purposes. Pervasive computing systems have been designed mainly to address the needs of individual users, thus neglecting the social nature of humans. On the other hand, social computing focuses on exploiting the social relations between users, on promoting their interactions and on supporting the sharing of digital resources among them. However, the recent development and popularity of social networking systems has happened in isolation from the developments in pervasive computing. This paper elaborates on the role of context in both pervasive and social computing environments and introduces the approach of the SOCIETIES project that integrates full scale pervasive functionality in social networking systems to develop the next generation of social media systems. Finally, it discusses the new research challenges that emerge in pervasive social media regarding community context-awareness and the respective benefits that the end users may experience.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124018886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Vasudevan, Jehan Wickramasuriya, Siqi Zhao, Lin Zhong
{"title":"Is Twitter a good enough social sensor for sports TV?","authors":"V. Vasudevan, Jehan Wickramasuriya, Siqi Zhao, Lin Zhong","doi":"10.1109/PerComW.2013.6529478","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529478","url":null,"abstract":"The globalization of TV programming (especially in the Sports and Reality segments) is leading to a bewildering amount of choice for TV watchers. The social currency around knowing what's happening in these programs as they happen combined with notable undulations in the interestingness of these programs leads to a navigation problem for the TV watcher. The pervasive use of Twitter in conjunction with TV watching makes it a potential sensor for real-time TV, and therefore a building block in solving the user problem of interstitially navigating to the most interesting program at any point in time. Given that users have to tune into shows with peak moments as soon as those peak moments happen, interstitial navigation has to be high enough performance to enable TV event detection and user tune in within tens of seconds of the event. The question being addressed in this paper is - Do Twitter's social sensing capabilities have sufficient precision and timeliness to cater to the `extreme' navigation needs of sports fans? And if so - how can we design a TV event detection framework that can be extended to multiple sports, and beyond sports. We focus on navigation for sports programming in the narrative, as an extremely demanding TV application that also has high market attractiveness. However, we anticipate that the ideas and architecture proposed herein apply to any TV programming that lends itself to interstitial viewing, and elicits a high level of real-time user participation in social networks.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123627428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving energy efficiency through activity-aware control of office appliances using proximity sensing - A real-life study","authors":"Paola Jaramillo, O. Amft","doi":"10.1109/PerComW.2013.6529576","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529576","url":null,"abstract":"Energy efficiency is a key operational characteristic of today's office environments. In this paper, we present a system architecture to control desk appliances such as computer screens based on recognised desk and computer work activities. In a real-life intervention study at seven desks, we use screen-attached ultrasound sensors and explore a proximity-based activity recognition approach for saving energy by automatically turing computer screens off when not using them. We analyse online performance of our approach regarding recognition rate and screen resume delay. Furthermore, we present a comparative analysis of our proximity-controlled approach against the computer-controlled power management and a non-controlled baseline to quantify energy saving benefits. Our results show energy savings of up to 43% and 55% for proximity-controlled computer screens compared to computer-controlled and non-controlled scenarios respectively.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123690207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Studying the effectiveness of android application permissions requests","authors":"Kevin Benton, L. Camp, Vaibhav Garg","doi":"10.1109/PerComW.2013.6529497","DOIUrl":"https://doi.org/10.1109/PerComW.2013.6529497","url":null,"abstract":"Popular platforms including Android and Facebook have adopted a permissions-based model. Under this model applications (apps) are required to declare specific access to user information required for functionality. We conducted two user studies on Amazon's Mechanical Turk to test the efficacy of these permissions requests on the Android platform. We found permissions were ineffective, even with the addition of an additional text warning. Conversely, we found that an app's download count had a strong effect on app installations. In order to determine if it was a failure of our text-based warning, we ran a second experiment with a previously proven visual indicator.","PeriodicalId":101502,"journal":{"name":"2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127644676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}