Proceedings of the sixteenth annual international conference on Mobile computing and networking最新文献

筛选
英文 中文
Did you see Bob?: human localization using mobile phones 你看到鲍勃了吗?:利用手机进行人的定位
I. Constandache, Xuan Bao, Martin Azizyan, Romit Roy Choudhury
{"title":"Did you see Bob?: human localization using mobile phones","authors":"I. Constandache, Xuan Bao, Martin Azizyan, Romit Roy Choudhury","doi":"10.1145/1859995.1860013","DOIUrl":"https://doi.org/10.1145/1859995.1860013","url":null,"abstract":"Finding a person in a public place, such as in a library, conference hotel, or shopping mall, can be difficult. The difficulty arises from not knowing where the person may be at that time; even if known, navigating through an unfamiliar place may be frustrating. Maps and floor plans help in some occasions, but such maps may not be always handy. In a small scale poll, 80% of users responded that the ideal solution would be \"to have an escort walk me to the desired person\". This paper identifies the possibility of using mobile phone sensors and opportunistic user-intersections to develop an electronic escort service. By periodically learning the walking trails of different individuals, as well as how they encounter each other in space-time, a route can be computed between any pair of persons. The problem bears resemblance to routing packets in delay tolerant networks, however, its application in the context of human localization raises distinct research challenges. We design and implement Escort, a system that guides a user to the vicinity of a desired person in a public place. We only use an audio beacon, randomly placed in the building, to enable a reference frame. We do not rely on GPS, WiFi, or war-driving to locate a person - the Escort user only needs to follow an arrow displayed on the phone. Evaluation results from experiments in parking lots and university buildings show that, on average, the user is brought to within 8m of the destination. We believe this is an encouraging result, opening new possibilities in mobile, social localization.","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131954047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 223
Inferring and mitigating a link's hindering transmissions in managed 802.11 wireless networks 在受管理的802.11无线网络中推断和减轻链路对传输的阻碍
Eugenio Magistretti, Omer Gurewitz, E. Knightly
{"title":"Inferring and mitigating a link's hindering transmissions in managed 802.11 wireless networks","authors":"Eugenio Magistretti, Omer Gurewitz, E. Knightly","doi":"10.1145/1859995.1860030","DOIUrl":"https://doi.org/10.1145/1859995.1860030","url":null,"abstract":"In 802.11 managed wireless networks, the manager can address under-served links by rate-limiting the conflicting nodes. In order to determine to what extent each conflicting node is responsible for the poor performance, the manager needs to understand the coordination among conflicting nodes' transmissions. In this paper, we present a management framework called MIDAS (Management, Inference, and Diagnostics using Activity Share). We introduce the concept of Activity Share which characterizes the coordination among any set of network nodes in terms of the time they spend transmitting simultaneously. Unfortunately, the Activity Share cannot be locally measured by the nodes. Thus, MIDAS comprises an inference tool which, based on a combined physical, protocol, and statistical approach, infers the Activity Share by using a small set of passively collected, time-aggregate local channel measurements reported by the nodes. MIDAS uses the estimated Activity Share as the input of a simple model that predicts how limiting the transmission rate of any conflicting node would benefit the throughput of the under-served link. The model is based on the current network conditions, thus representing the first throughput model using online measurements. We implemented our tool on real hardware and deployed it on an indoor testbed. Our extensive validation combines testbed experiments and simulations. The results show that MIDAS infers the Activity Share with an average normalized relative error below 12% in all testbed experiments.","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115851306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Indoor localization without the pain 室内定位无痛
Krishna Chintalapudi, A. Iyer, V. Padmanabhan
{"title":"Indoor localization without the pain","authors":"Krishna Chintalapudi, A. Iyer, V. Padmanabhan","doi":"10.1145/1859995.1860016","DOIUrl":"https://doi.org/10.1145/1859995.1860016","url":null,"abstract":"While WiFi-based indoor localization is attractive, the need for a significant degree of pre-deployment effort is a key challenge. In this paper, we ask the question: can we perform indoor localization with no pre-deployment effort? Our setting is an indoor space, such as an office building or a mall, with WiFi coverage but where we do not assume knowledge of the physical layout, including the placement of the APs. Users carrying WiFi-enabled devices such as smartphones traverse this space in normal course. The mobile devices record Received Signal Strength (RSS) measurements corresponding to APs in their view at various (unknown) locations and report these to a localization server. Occasionally, a mobile device will also obtain and report a location fix, say by obtaining a GPS lock at the entrance or near a window. The centerpiece of our work is the EZ Localization algorithm, which runs on the localization server. The key intuition is that all of the observations reported to the server, even the many from unknown locations, are constrained by the physics of wireless propagation. EZ models these constraints and then uses a genetic algorithm to solve them. The results from our deployment in two different buildings are promising. Despite the absence of any explicit pre-deployment calibration, EZ yields a median localization error of 2m and 7m, respectively, in a small building and a large building, which is only somewhat worse than the 0.7m and 4m yielded by the best-performing but calibration-intensive Horus scheme [29] from prior work.","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131690649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1013
Challenge: towards distributed RFID sensing with software-defined radio 挑战:采用软件定义无线电实现分布式RFID传感
Danilo De Donno, F. Ricciato, L. Catarinucci, A. Coluccia, L. Tarricone
{"title":"Challenge: towards distributed RFID sensing with software-defined radio","authors":"Danilo De Donno, F. Ricciato, L. Catarinucci, A. Coluccia, L. Tarricone","doi":"10.1145/1859995.1860007","DOIUrl":"https://doi.org/10.1145/1859995.1860007","url":null,"abstract":"Current Radio-Frequency Identification (RFID) technology involves two types of physical devices: tags and reader. The reader combines in a single physical device transmission (to the tags) and reception (from the tags) functions. In this paper we discuss an alternative approach, where receive functions are performed by a separate device called \"RFID listener\". This allows distributed tag-sensing schemes where one transmitter coexists with multiple listeners. We discuss pros and cons of both approaches and present our implementation of a passive RFID listener on GNU Radio. Our implementation is a basis for experimenting with future distributed listener-based systems, but it can be also used as a cheap and flexible protocol analyzer for currently available commercial RFID readers.","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"276 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127549124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Fair WLAN backhaul aggregation 公平的WLAN回程聚合
D. Giustiniano, Eduard Goma Llairo, Alberto López Toledo, Ian Dangerfield, Julián David Morillo-Pozo, P. Rodriguez
{"title":"Fair WLAN backhaul aggregation","authors":"D. Giustiniano, Eduard Goma Llairo, Alberto López Toledo, Ian Dangerfield, Julián David Morillo-Pozo, P. Rodriguez","doi":"10.1145/1859995.1860026","DOIUrl":"https://doi.org/10.1145/1859995.1860026","url":null,"abstract":"Aggregating multiple 802.11 Access Point (AP) backhauls using a single-radio WLAN card has been considered as a way of bypassing the backhaul capacity limit. However, current AP aggregation solutions greedily maximize the individual station throughput without taking fairness into account. This can lead to grossly unfair throughput distributions, which can discourage user participation and severely limit commercial deployability. Motivated by this problem, we present THEMIS, a single-radio station that performs multi-AP backhaul aggregation in a fair and distributed way, without requiring any change in the network. We implement THEMIS on commodity hardware, evaluate it extensively through controlled experimental tests, and validate it in a deployment spanning 3 floors of a multistory building. THEMIS is being used in a commercial trial by a major broadband provider to its customers.","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127968953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
ZiFi: wireless LAN discovery via ZigBee interference signatures ZiFi:无线局域网发现通过ZigBee干扰签名
Ruogu Zhou, Yongping Xiong, G. Xing, Limin Sun, Jian Ma
{"title":"ZiFi: wireless LAN discovery via ZigBee interference signatures","authors":"Ruogu Zhou, Yongping Xiong, G. Xing, Limin Sun, Jian Ma","doi":"10.1145/1859995.1860002","DOIUrl":"https://doi.org/10.1145/1859995.1860002","url":null,"abstract":"WiFi networks have enjoyed an unprecedent penetration rate in recent years. However, due to the limited coverage, existing WiFi infrastructure only provides intermittent connectivity for mobile users. Once leaving the current network coverage, WiFi clients must actively discover new WiFi access points (APs), which wastes the precious energy of mobile devices. Although several solutions have been proposed to address this issue, they either require significant modifications to existing network infrastructures or rely on context information that is not available in unknown environments. In this work, we develop a system called ZiFi that utilizes ZigBee radios to identify the existence of WiFi networks through unique interference signatures generated by WiFi beacons. We develop a new digital signal processing algorithm called Common Multiple Folding (CMF) that accurately amplifies periodic beacons in WiFi interference signals. ZiFi also adopts a constant false alarm rate (CFAR) detector that can minimize the false negative (FN) rate of WiFi beacon detection while satisfying the user-specified upper bound on false positive (FP) rate. We have implemented ZiFi on two platforms, a Linux netbook integrating a TelosB mote through the USB interface, and a Nokia N73 smartphone integrating a ZigBee card through the miniSD interface. Our experiments show that, under typical settings, ZiFi can detect WiFi APs with high accuracy (<5% total FP and FN rate), short delay (~780 ms), and little computation overhead","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123723892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 181
Proceedings of the sixteenth annual international conference on Mobile computing and networking 第十六届移动计算与网络国际年会论文集
N. Vaidya, Suman Banerjee, D. Katabi
{"title":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","authors":"N. Vaidya, Suman Banerjee, D. Katabi","doi":"10.1145/1859995","DOIUrl":"https://doi.org/10.1145/1859995","url":null,"abstract":"On behalf of the organizing committee, I welcome you to the 2010 ACM MobiCom and MobiHoc. These two conferences were brought together for the first time in 2007 in Montreal. The 2010 edition is the sixteenth in its series for MobiCom and eleventh for MobiHoc. Over the years, both conferences have established themselves as premier forums for presentation of research on mobile computing and wireless networking. I hope that you will attend the exciting paper presentations at both the conferences, which are being scheduled as parallel tracks this year. \u0000 \u0000The papers included in the conference proceedings reflect the outstanding research performed by our authors, and also the conscientious and dedicated efforts of the two technical program committees, ably led by Suman Banerjee and Dina Katabi for ACM MobiCom, and Christoph Lindemann and Jitendra Padhye for ACM MobiHoc. The program committee chairs devoted substantial effort, working with the respective program committees, to ensure that the review process resulted in fair and timely decisions. In addition to the refereed papers, this year's program also includes poster and demo sessions. I am sure that you will enjoy the diversity of research being presented in these sessions. We also have several workshops scheduled this year on a wide range of emerging topics of interest to the conference attendees.","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126452246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
CTRL: a self-organizing femtocell management architecture for co-channel deployment CTRL:用于同信道部署的自组织移动基站管理架构
Ji-Hoon Yun, K. Shin
{"title":"CTRL: a self-organizing femtocell management architecture for co-channel deployment","authors":"Ji-Hoon Yun, K. Shin","doi":"10.1145/1859995.1860003","DOIUrl":"https://doi.org/10.1145/1859995.1860003","url":null,"abstract":"Femtocell technology has been drawing considerable attention as a cost-effective means of improving cellular coverage and capacity. However, under co-channel deployment, femtocells may incur high uplink interference to existing macrocells, and vice versa. To alleviate this interference, we propose a distributed and self-organizing femtocell management architecture, called CTRL Complementary TRi-control Loops), that consists of three control loops. First, for protection of macrocell users' uplink communications, CTRL controls the maximum TX power of femtocell users based on the fedback macrocell's load margin so as to keep, on average, the macrocell load below a certain threshold. Second, CTRL determines the target SINRs of femtocell users, conditioned on the maximum TX power, to reach a Nash equilibrium based on their utility functions, thus achieving efficient coordination of uplink usage among femtocells. Third, for protection of femtocell users' uplink communications, the instantaneous TX power of each femtocell user is controlled to achieve the target SINR against bursty interference from nearby macrocell or femtocell users. Our in-depth evaluation has shown CTRL to successfully preserve the macrocell users' service quality from femtocells' interference and converge to an optimal point under highly dynamic user TX conditions. CTRL is also shown to limit the effects of the estimation errors of channel gains and feedback delay.","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134546702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 77
Challenge: mobile optical networks through visual MIMO 挑战:移动光网络通过视觉MIMO
A. Ashok, M. Gruteser, N. Mandayam, Jayant Silva, Michael Varga, Kristin J. Dana
{"title":"Challenge: mobile optical networks through visual MIMO","authors":"A. Ashok, M. Gruteser, N. Mandayam, Jayant Silva, Michael Varga, Kristin J. Dana","doi":"10.1145/1859995.1860008","DOIUrl":"https://doi.org/10.1145/1859995.1860008","url":null,"abstract":"Mobile optical communications has so far largely been limited to short ranges of about ten meters, since the highly directional nature of optical transmissions would require costly mechanical steering mechanisms. Advances in CCD and CMOS imaging technology along with the advent of visible and infrared (IR) light sources such as (light emitting diode) LED arrays presents an exciting and challenging concept which we call as visual-MIMO (multiple-input multiple-output) where optical transmissions by multiple transmitter elements are received by an array of photodiode elements (e.g. pixels in a camera). Visual-MIMO opens a new vista of research challenges in PHY, MAC and Network layer research and this paper brings together the networking, communications and computer vision fields to discuss the feasibility of this as well as the underlying opportunities and challenges. Example applications range from household/factory robotic to tactical to vehicular networks as well pervasive computing, where RF communications can be interference-limited and prone to eavesdropping and security lapses while the less observable nature of highly directional optical transmissions can be beneficial. The impact of the characteristics of such technologies on the medium access and network layers has so far received little consideration. Example characteristics are a strong reliance on computer vision algorithms for tracking, a form of interference cancellation that allows successfully receiving packets from multiple transmitters simultaneously, and the absence of fast fading but a high susceptibility to outages due to line-of-sight interruptions. These characteristics lead to significant challenges and opportunities for mobile networking research","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116218644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 124
NVS: a virtualization substrate for WiMAX networks 用于WiMAX网络的虚拟化基板
Ravi Kokku, R. Mahindra, Honghai Zhang, S. Rangarajan
{"title":"NVS: a virtualization substrate for WiMAX networks","authors":"Ravi Kokku, R. Mahindra, Honghai Zhang, S. Rangarajan","doi":"10.1145/1859995.1860023","DOIUrl":"https://doi.org/10.1145/1859995.1860023","url":null,"abstract":"This paper describes the design and implementation of a network virtualization substrate NVS) for effective virtualization of wireless resources in WiMAX networks. Virtualization fosters the realization of several interesting deployment scenarios such as customized virtual networks, virtual services and wide-area corporate networks, with diverse performance objectives. In virtualizing a basestation's uplink and downlink resources into slices, NVS meets three key requirements - isolation, customization, and efficient resource utilization - using two novel features: (1) NVS introduces a provably-optimal slice scheduler that allows existence of slices with bandwidth-based and resource-based reservations simultaneously, and (2) NVS includes a generic framework for efficiently enabling customized flow scheduling within the basestation on a per-slice basis. Through a prototype implementation and detailed evaluation on a WiMAX testbed, we demonstrate the efficacy of NVS. For instance, we show for both downlink and uplink directions that NVS can run different flow schedulers in different slices, run different slices simultaneously with different types of reservations, and perform slice-specific application optimizations for providing customized services.","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116418010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 67
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信