D. V. Le, Jacob W. Kamminga, H. Scholten, P. Havinga
{"title":"A Framework to Measure Reliance of Acoustic Latency on Smartphone Status","authors":"D. V. Le, Jacob W. Kamminga, H. Scholten, P. Havinga","doi":"10.1109/PERCOMW.2018.8480354","DOIUrl":"https://doi.org/10.1109/PERCOMW.2018.8480354","url":null,"abstract":"Audio latency, defined as the time duration when an audio signal travels from the microphone to an app or from an app to the speakers, significantly influences the performance of many mobile sensing applications including acoustic based localization and speech recognition. It is well known within the mobile app development community that audio latencies can be significant (up to hundreds of milliseconds) and vary from smartphone to smartphone and from time to time. Therefore, it is essential to study the causes and effects of the audio latency in smartphones. To the best of our knowledge, there exist mobile apps that can measure audio latency but not the corresponding status of smartphones such as available RAM, CPU loads, battery level, and number of files and folders. In this paper, we are the first to propose a framework that can simultaneously log both the audio latency and the status of smartphones. The proposed framework does not require time synchronization or firmware reprogramming and can run on a standalone device. Since the framework is designed to study the latency causality, the status of smartphones are deliberately and randomly varied as maximum as possible. To evaluate the framework, we present a case study with Android devices. We design and implement a latency app that simultaneously measures the latency and the status of smartphones. The preliminary results show that the latency values have large means (50 – 150 ms) and variances (4–40 ms). The effect of latency can be considerably reduced by just simply subtracting the offset. In order to achieve improved latency prediction that can cope with the variances an advanced regression model would be preferred.","PeriodicalId":190096,"journal":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131470277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Damien Dupré, Nicole Andelic, Gawain Morrison, G. McKeown
{"title":"Accuracy of three commercial automatic emotion recognition systems across different individuals and their facial expressions","authors":"Damien Dupré, Nicole Andelic, Gawain Morrison, G. McKeown","doi":"10.1109/PERCOMW.2018.8480127","DOIUrl":"https://doi.org/10.1109/PERCOMW.2018.8480127","url":null,"abstract":"Automatic facial expression recognition systems can provide information about our emotions and how they change over time. However, based on different statistical methods the results of automatic systems have not yet been compared. In the current paper we evaluate the emotion detection between three different commercial systems (i.e. Affectiva, Kairos and Microsoft) when detecting dynamic and spontaneous facial expressions. Even if the study was performed on a limited sample of videos, the results show significant differences between the systems for the same video and per system across comparable facial expressions. Finally, we reflect on the implications according the generalization of the results provided by automatic emotion detection.","PeriodicalId":190096,"journal":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132347146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Personalized Online Training for Physical Activity monitoring using weak labels","authors":"F. Cruciani, I. Cleland, K. Synnes, J. Hallberg","doi":"10.1109/PERCOMW.2018.8480292","DOIUrl":"https://doi.org/10.1109/PERCOMW.2018.8480292","url":null,"abstract":"The use of smartphones for activity recognition is becoming common practice. Most approaches use a single pretrained classifier to recognize activities for all users. Research studies, however, have highlighted how a personalized trained classifier could provide better accuracy. Data labeling for ground truth generation, however, is a time-consuming process. The challenge is further exacerbated when opting for a personalized approach that requires user specific datasets to be labeled, making conventional supervised approaches unfeasible. In this work, we present early results on the investigation into a weakly supervised approach for online personalized activity recognition. This paper describes: (i) a heuristic to generate weak labels used for personalized training, (ii) a comparison of accuracy obtained using a weakly supervised classifier against a conventional ground truth trained classifier. Preliminary results show an overall accuracy of 87% of a fully supervised approach against a 74% with the proposed weakly supervised approach.","PeriodicalId":190096,"journal":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"685 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116110519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Context Aware Prototype Application for University Students and Lecturers","authors":"Sabiha Nuzhat, Talal Shaikh, Salih Ismail","doi":"10.1109/PERCOMW.2018.8480167","DOIUrl":"https://doi.org/10.1109/PERCOMW.2018.8480167","url":null,"abstract":"The rise of mobile phone usage across the world has given rise to many context aware applications. To study the effects of context-aware application we have created a prototype application for the main demographics in a University. The prototype provides location based context-awareness in two facets: outside the university campus (outdoor) and inside the university campus (indoor). We have used Wi-Fi fingerprinting technology to achieve indoor positioning. Furthermore, the prototype is connected to Moodle, an online e-learning service via web services to provide course materials to the student based on the user, location (classroom) and time. The students can further interact with their peers spatially for discussions, as their location data is securely shared with their group mates. Our research evaluates the effect of context-awareness for two user groups; the students and the lecturers. The usage of both indoor and outdoor positioning within a single prototype, to provide the location aspect of context in our research, shows 94% acceptance rate between both the user groups.","PeriodicalId":190096,"journal":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132915567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Context-based Pairing for Unprecedented Devices","authors":"Ngu Nguyen, S. Sigg","doi":"10.1109/PERCOMW.2018.8480126","DOIUrl":"https://doi.org/10.1109/PERCOMW.2018.8480126","url":null,"abstract":"We introduce context-based pairing protocols that integrate into common distributed device encryption schemes for device management and access control. In particular, we suggest three pairing protocols that integrate implicit proximity-based device pairing to increase convenience and security. From these protocols, we implemented a secure device pairing approach conditioned on natural, unconstrained spoken interaction in a smart environment. In particular, our approach exploits speech recognition to identify devices to pair from free-form spoken interaction and restricts the pairing to the right device in proximity by generating secure keys from audio fingerprints of the same spoken interaction.","PeriodicalId":190096,"journal":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115926312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Local emotions - using social media to understand human-environment interaction in cities","authors":"Niklas Strengell, S. Sigg","doi":"10.1109/PERCOMW.2018.8480364","DOIUrl":"https://doi.org/10.1109/PERCOMW.2018.8480364","url":null,"abstract":"Cities have become the most common living environment for humans. With this rising urbanization, urban design has become vital for these growing cities. While measuring objective data like traffic congestion or air quality is important, it does not tell the whole story of how people live in the cities or how cities should be developed to make them more livable. In future for a true smart city a more humane component is needed to understand how the population of cities actually interact with and feel about their surroundings. Surveys are a great and a necessary tool for this and they are already being used in the design process. However, they require effort and and a lot of silent information can be missed. The surveying process also doesn't happen in real time. We suggest that social media data could be used to gather more information about human- environment interaction in cities and compliment the surveys. We show a working prototype of a tool that creates an emotional map of a city by mining social media data for sentiments and heatmapping them. This kind of method could prove to be an useful tool for urban designers, who could take advantage of the visual intuition of humans and see instantly where and how emotional hotspots arise. It could also be of interest for emotion researchers, who could get data on what it really means to be happy for a human being - for example eating an ice cream at the beach - instead of only linking conceptual words (such as happy) to external stimuli (such as smiling).","PeriodicalId":190096,"journal":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134329295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Representation Learning for Sensor-based Device Pairing","authors":"Ngu Nguyen, Nico Jähne-Raden, U. Kulau, S. Sigg","doi":"10.1109/PERCOMW.2018.8480412","DOIUrl":"https://doi.org/10.1109/PERCOMW.2018.8480412","url":null,"abstract":"The emergence of on-body gadgets has introduced a novel research direction: unobtrusive and continuous device pairing. Existing approaches leveraged contextual information collected by sensors to generate secure communication keys. The secret information is represented throught hand-engineered features. In this paper, we propose a learning method based on Siamese neural networks to extract features that signify on-body context while separating off-body devices.","PeriodicalId":190096,"journal":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123432407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mamadou H. Diallo, Nisha Panwar, S. Mehrotra, A. A. Sani
{"title":"Trustworthy Sensing in an Untrusted IoT Environment","authors":"Mamadou H. Diallo, Nisha Panwar, S. Mehrotra, A. A. Sani","doi":"10.1109/PERCOMW.2018.8480384","DOIUrl":"https://doi.org/10.1109/PERCOMW.2018.8480384","url":null,"abstract":"Contemporary IoT environments, such as smart buildings, require end-users to trust data collection policies published by the systems. There are several reason why such a trust is misplaced - IoT systems may not be honest, may inadvertently collect data without user’s knowledge, or may fall victim to cyberattacks that hijack IoT devices transferring user data to a malicious third-party leading to the loss of individual’s privacy. To address such concerns, we are developing IoTtrust, a framework to ensure trust and confidence in IoT systems (and applications). textbfIoTtrust includes a simple yet powerful policy language, contracts between subjects and IoT space, and mechanisms to empower each party to undeniably attest the contract validity.","PeriodicalId":190096,"journal":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"5 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124992354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Edge, Dominic Mussack, Matthias Böhmer, Paul Schrater
{"title":"Predicting Contextual Influences on App Usage from a Rational Model of Time Allocation","authors":"R. Edge, Dominic Mussack, Matthias Böhmer, Paul Schrater","doi":"10.1109/PERCOMW.2018.8480308","DOIUrl":"https://doi.org/10.1109/PERCOMW.2018.8480308","url":null,"abstract":"Mobile devices have proven to be transformative tools that help users perform a variety of everyday tasks. However, they also have tremendous potential to disrupt productive and desired time allocation, facilitating time-squandering through self interruptions of workflow and undesired task switching through distracting apps. Existing research has identified a variety of context variables which help predict the next app selected, but seldom give treatment to the pattern of app usage durations essential to understanding time allocation. Here we take a psychological computing approach to identify the key environmental factors that increase risk of early termination through unwanted switching. Using a task foraging model for time allocation, we construct an integrated measure of the background factors increasing switching temptation, and show that these can be converted into a computable measure of decision context that strongly impacts app duration. The foraging model gives new insight into the structural factors that promote task persistence and predict switch temptations, and suggests new ways to design productive environments.","PeriodicalId":190096,"journal":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114666542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"User Authentication based on Personal Image Experiences","authors":"Ngu Nguyen, S. Sigg","doi":"10.1109/PERCOMW.2018.8480087","DOIUrl":"https://doi.org/10.1109/PERCOMW.2018.8480087","url":null,"abstract":"Building upon the concept of collective computing [1], which combines cloud, crowd and shroud technologies, we propose a further application domain for the fourth generation of computing: Usable Security. Combining the three constituent technologies enables novel, stronger and personalized authentication mechanisms. In particular, we combine implicit memory of people (the crowd), obtained from wearable camera devices (the shroud) and supported by edge and cloud facility (the cloud) in order to generate image-based authentication challenges which are transient and personalized.","PeriodicalId":190096,"journal":{"name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115484483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}