{"title":"A Coordinated Group Decision for Vertical Handovers in Heterogeneous Wireless Networks","authors":"M. Pink, Michael Sprejz, H. König","doi":"10.1109/Mobilware.2013.20","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.20","url":null,"abstract":"Cooperation and interactions of mobile users is a characteristic feature of mobile collaborative applications. The users are located in different mobile communication networks or move in or among them, respectively. This requires horizontal and vertical handovers. The latter is required when the networks use different network technologies. Usually each mobile device independently chooses the most appropriate network for its purposes to switch to. In group-oriented applications this may lead to an uncoordinated network selection and as consequence to increased energy consumption. In this paper, we present a distributed vertical handover decision algorithm that coordinates the selection of the network among the mobile devices in order to ensure an optimal quality of service for the collaborative application and a low energy consumption of the involved mobile devices. The network selection is based on the calculation of a group benefit for each alternative network using the Simple Additive Weighting (SAW) algorithm. The feasibility of the algorithm is evaluated regarding varying group sizes and resource requirements.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128788665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Manzoor, C. Patsakis, Jessica McCarthy, Gabriel Mullarkey, S. Clarke, V. Cahill, Mélanie Bouroche
{"title":"Data Sensing and Dissemination Framework for Smart Cities","authors":"A. Manzoor, C. Patsakis, Jessica McCarthy, Gabriel Mullarkey, S. Clarke, V. Cahill, Mélanie Bouroche","doi":"10.1109/Mobilware.2013.19","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.19","url":null,"abstract":"Participatory sensing, which enables citizens to collect and share data, can be helpful to design and develop useful applications in the domain of environmental monitoring, transportation, and health-care. However, the data collection process for such applications involves dealing with a variety of data sources, ranging from fixed environmental sensors to mobile human sensors, generating and presenting data in different formats. The citizens' engagement in sensing campaigns creates additional requirements to take care of their privacy concerns and motivate them to share data. Applications also need to compute the trustworthiness of the source of information to ensure the high quality of the collected data. Consequently, successfully dealing with these issues and deploying an application in an urban environment becomes a challenging task. In this paper we present a framework that uses fixed and participatory sensing to collect data from heterogeneous sources and presents a uniform interface to disseminate data to concerned applications according to their data requirements. We used our framework to develop a participatory sensing based smart phone application enabling and motivating the citizens to report positive and negative urban environmental behaviours. We report the results of our ongoing field trial. One of our findings is that different users contribute information about different environmental issues with different intensity. Moreover, we find that the current user participation to collect and share data follows the power law.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126884066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Content Dissemination on Location-Based Communities: A Comparative Analysis","authors":"E. Pagani, G. P. Rossi","doi":"10.1109/Mobilware.2013.13","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.13","url":null,"abstract":"This paper focuses on content dissemination in location-centered communities and provides the first comparative analysis of two forwarding algorithms on real scenario, namely, ProfileCast - which has been on purposely designed for this environment - and InterestCast - which by contrast addresses more general settings. The paper provides quantitative evaluation of relevant metrics (i.e. community coverage, delivery delay, energy/message efficiency) to be considered whenever attempting to spread contents to the persons that are used to visit the same location. Moreover, the experiment allows to give an insight on the problems arising when deploying these protocols on real settings and an empirical evaluation of two different approaches. ProfileCast leverages mechanisms to automatically extract the intrinsic characteristics of the users from their behavior pattern; a content generated by a node is implicitly addressed to users with similar behavior as the source. InterestCast matches content tags against interests explicitly expressed by the users.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129256049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time Video Quality Control For Multimedia Network","authors":"Biao Jiang, T. Saadawi","doi":"10.1109/Mobilware.2013.25","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.25","url":null,"abstract":"In this paper, we propose a new approach for video quality control for multimedia networks. Our new approach is based on video quality measure that combines both the network quality of service (QoS) as well as the user quality of experience (QoE). The proposed approach improves the end-to-end traditional video quality control for multimedia network by including the human perception of video data, which is major concern for the video client, along with the network quality of service (QoS) measurements. We will show that the proposed QoS-QoE based video quality control algorithm can reflect both the condition of the network environment and the human perception of the received networked video data stream. According to both QoS and QoE parameters, rather than using only QoS parameter, video quality control action will satisfy the user needs more than relying only on the network conditions. Since our proposed QoE parameter Self-Reference Complex Wavelet Video Structural Similarity Index (SRCW-VSSIM) can be obtained with no reference (NF) video data, it satisfies the requirement of real-time video transmission.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130992205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Enhanced Density-Based Clustering Algorithm for the Autonomous Indoor Localization","authors":"Yaqian Xu, Rico Kusber, K. David","doi":"10.1109/Mobilware.2013.24","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.24","url":null,"abstract":"Indoor localization applications are expected to become increasingly popular on smart phones. Meanwhile, the development of such applications on smart phones has brought in a new set of potential issues (e.g., high time complexity) while processing large datasets. The study in this paper provides an enhanced density-based cluster learning algorithm for the autonomous indoor localization algorithm DCCLA (Density-based Clustering Combined Localization Algorithm). In the enhanced algorithm, the density-based clustering process is optimized by \"skipping unnecessary density checks\" and \"grouping similar points\". We conducted a theoretical analysis of the time complexity of the original and enhanced algorithm. More specifically, the run times of the original algorithm and the enhanced algorithm are compared on a PC (personal computer) and a smart phone, identifying the more efficient density-based clustering algorithm that allows the system to enable autonomous Wi-Fi fingerprint learning from large Wi-Fi datasets. The results show significant improvements of run time on both a PC and a smart phone.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126965148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sebastian Göndör, A. Uzun, Till Rohrmann, Julian Tan, Robin Henniges
{"title":"Predicting User Mobility in Mobile Radio Networks to Proactively Anticipate Traffic Hotspots","authors":"Sebastian Göndör, A. Uzun, Till Rohrmann, Julian Tan, Robin Henniges","doi":"10.1109/Mobilware.2013.14","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.14","url":null,"abstract":"With approx. 6 million macro cells worldwide and a gross energy consumption of approx. 100 TWh per year as of 2013, mobile networks are one of the major energy consumers in the ICT sector. As trends, such as cloud-based services and other traffic-intensive mobile applications, fuel the growth of mobile traffic demands, operators of mobile telephony networks are forced to continuously extend the capacity of the existing infrastructure by both implementing new technologies as well as by installing new cell towers to provide more bandwidth for mobile users and improve the network's coverage. In order to implement energy-efficient reconfiguration mechanisms in mobile telephony networks as proposed by the project Communicate Green, it is essential to anticipate traffic hotspots, so that a network's configuration can be adjusted in time accordingly. Hence, predicting the movement of mobile users on a cellular level of the mobile network is a crucial task. In this paper, we propose a Movement Prediction System based on the algorithm of Yavas et al. that allows to determine the future movement of a user on a cellular level using precomputed movement patterns. We extended the algorithm to be capable of preselecting patterns based on time and contextual data in order to improve prediction accuracy. The performance of the algorithm is evaluated based on real and live user movement data from the OpenMobileNetwork, which is a platform providing estimated mobile network topology data. We found that the algorithm's prediction quality is sufficient, but requires an extensive amount of recorded user movements to perform well.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114763506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Steven Bohez, Joeri De Turck, Tim Verbelen, P. Simoens, B. Dhoedt
{"title":"Mobile, Collaborative Augmented Reality Using Cloudlets","authors":"Steven Bohez, Joeri De Turck, Tim Verbelen, P. Simoens, B. Dhoedt","doi":"10.1109/Mobilware.2013.15","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.15","url":null,"abstract":"The evolution in mobile applications to support advanced interactivity and demanding multimedia features is still ongoing. Novel application concepts (e.g. mobile Augmented Reality (AR)) are however hindered by the inherently limited resources available on mobile platforms (not withstanding the dramatic performance increases of mobile hardware). Offloading resource intensive application components to the cloud, also known as ”cyber foraging”, has proven to be a valuable solution in a variety of scenarios. However, also for collaborative scenarios, in which data together with its processing are shared between multiple users, this offloading concept is highly promising. In this paper, we investigate the challenges posed by offloading collaborative mobile applications. We present a middleware platform capable of autonomously deploying software components to minimize average CPU load, while guaranteeing smooth collaboration. As a use case, we present and evaluate a collaborative AR application, offering interaction between users, the physical environment as well as with the virtual objects superimposed on this physical environment.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134578839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"3rd Party Geolocation Messaging: A Positioning Enabler Middleware for Realizing Context-Aware Polling","authors":"Mohamed Salem, B. Deva","doi":"10.1109/Mobilware.2013.12","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.12","url":null,"abstract":"Next generation Location-based Services (LBSs) are coined by a proactive user-interaction as well as a crossreferencing target relationship. In a proactive user-interaction, a service continuously keeps track of a user's locations and performs arbitrary actions upon entry or exit of a certain region. A cross-referencing target relationship implies that the LBS user and the target are not identical, which is the case, for instance, when a 3rd party subscribes for certain location events on behalf of the tracked user, i.e. in a Location-based Advertising scenario. In order to efficiently realize sophisticated proactive, cross-referencing LBSs, a number of challenges need to be surmounted. Unfortunately, existing research within this respect is still rudimentary and a huge potential still remains untapped. Proactive LBSs involve continuous background tracking to know the location whereabouts of a user as well as process it in order to detect useful information in the vicinity. However, this results in severe battery drainage, hence shaping the main barrier for the realization of such services. Moreover, continuously tracking a user's location raises major privacy concerns, especially in case of cross-referencing LBSs. In this paper, we present the Positioning Enabler service middleware platform which provides a set of functionalities and APIs for enabling battery-efficient background tracking of single and multi-targets in a proactive manner, enabling the realization of sophisticated LBSs based on continuous background tracking and geofencing. Furthermore, it supports 3rd party Geolocation Messaging while implementing certain location privacy measures for not invading user's privacy. The service middleware is used in the implementation of a Context-aware Polling mobile application for smart cities, FlashPoll.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"367 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130962237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"TagPix: Automatic Real-Time Landscape Photo Tagging for Smartphones","authors":"Hillol Debnath, C. Borcea","doi":"10.1109/Mobilware.2013.11","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.11","url":null,"abstract":"This paper presents TagPix, a lightweight smartphone photo tagging app that provides good tagging accuracy, works in real-time, and protects user privacy. The main novelty of TagPix consists in leveraging the phone sensors and a placetag database to tag landscape photos which include landmarks. GPS location is used to identify landmark tags in a given region. Then, TagPix computes the angular distance for the object in the camera focus using the orientation sensors. This allows the app to select a small subset of landmark tags for the photo. For further tag accuracy, we devised new usable methods to estimate the Euclidean distance between the user and the landmark in the camera focus. These methods employ simple user actions and lightweight trigonometric calculations. TagPix is implemented and tested using several Android phones and Google Places API. The app was tested in 8 cities across USA. Using only angular distance, TagPix achieves 86% tagging accuracy. Adding Euclidean distance estimation leads to 93% accuracy.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128636587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maximization of Multi-Round Network Survivability under Considerations of the Defender's Defensive Messaging Strategies","authors":"Pei-Yu Chen, I-Ju Shih, F. Lin","doi":"10.1109/Mobilware.2013.27","DOIUrl":"https://doi.org/10.1109/Mobilware.2013.27","url":null,"abstract":"Nowadays, enterprises face many challenges of cyber security. How to efficiently allocate defensive resources to reduce damages which are caused by cyber attackers and evaluate system survivability to keeping services operating became important issues. Hence, we develop a scenario of that both cyber attacker and network defender are with incompletely understanding the information about each other is considered. We conduct a mathematical model for analyze this problem for the decision makers to resolve these dilemmas. The Average DOD is then applied to evaluate damage degree of network to estimate all possible strategies which both cyber attacker and network defender would take. Moreover, network defender could release message which might be doing nothing at all, truth, secrecy or deception to confuse cyber attacker to achieve better defense efficiency. In the process of problem solving, the \"gradient method\" and \"game theory\" would be used to obtain the optimal resource allocation strategies for both cyber attacker and network defender.","PeriodicalId":117163,"journal":{"name":"2013 International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126577416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}