Proceedings of the sixteenth annual international conference on Mobile computing and networking最新文献

筛选
英文 中文
PixNet: interference-free wireless links using LCD-camera pairs PixNet:使用液晶相机对的无干扰无线链接
S. Perli, N. Ahmed, D. Katabi
{"title":"PixNet: interference-free wireless links using LCD-camera pairs","authors":"S. Perli, N. Ahmed, D. Katabi","doi":"10.1145/1859995.1860012","DOIUrl":"https://doi.org/10.1145/1859995.1860012","url":null,"abstract":"Given the abundance of cameras and LCDs in today's environment, there exists an untapped opportunity for using these devices for communication. Specifically, cameras can tune to nearby LCDs and use them for network access. The key feature of these LCD-camera links is that they are highly directional and hence enable a form of interference-free wireless communication. This makes them an attractive technology for dense, high contention scenarios. The main challenge however, to enable such LCD-camera links is to maximize coverage, that is to deliver multiple Mb/s over multi-meter distances, independent of the view angle. To do so, these links need to address unique types of channel distortions, such as perspective distortion and blur. This paper explores this novel communication medium and presents PixNet, a system for transmitting information over LCD-camera links. PixNet generalizes the popular OFDM transmission algorithms to address the unique characteristics of the LCD-camera link which include perspective distortion, blur, and sensitivity to ambient light. We have built a prototype of PixNet using off-the-shelf LCDs and cameras. An extensive evaluation shows that a single PixNet link delivers data rates of up to 12 Mb/s at a distance of 10 meters, and works with view angles as wide as 120 degree°.","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"231 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114057792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 213
Profiling users in a 3g network using hourglass co-clustering 使用沙漏共聚类分析3g网络中的用户
Ram Keralapura, A. Nucci, Zhi-Li Zhang, Lixin Gao
{"title":"Profiling users in a 3g network using hourglass co-clustering","authors":"Ram Keralapura, A. Nucci, Zhi-Li Zhang, Lixin Gao","doi":"10.1145/1859995.1860034","DOIUrl":"https://doi.org/10.1145/1859995.1860034","url":null,"abstract":"With widespread popularity of smart phones, more and more users are accessing the Internet on the go. Understanding mobile user browsing behavior is of great significance for several reasons. For example, it can help cellular (data) service providers (CSPs) to improve service performance, thus increasing user satisfaction. It can also provide valuable insights about how to enhance mobile user experience by providing dynamic content personalization and recommendation, or location-aware services. In this paper, we try to understand mobile user browsing behavior by investigating whether there exists distinct \"behavior patterns\" among mobile users. Our study is based on real mobile network data collected from a large 3G CSP in North America. We formulate this user behavior profiling problem as a \"co-clustering\" problem, i.e., we group both users (who share similar browsing behavior), and browsing profiles (of like-minded users) simultaneously. We propose and develop a scalable co-clustering methodology, Phantom, using a novel hourglass model. The proposed hourglass model first reduces the dimensions of the input data and performs divisive hierarchical co-clustering on the lower dimensional data; it then carries out an expansion step that restores the original dimensions. Applying Phantom to the mobile network data, we find that there exists a number of prevalent and distinct behavior patterns that persist over time, suggesting that user browsing behavior in 3G cellular networks can be captured using a small number of co-clusters. For instance, behavior of most users can be classified as either homogeneous (users with very limited set of browsing interests) or heterogeneous (users with very diverse browsing interests), and such behavior profiles do not change significantly at either short (30-min) or long (6 hour) time scales.","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121053914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 103
Retransmission ≠ repeat: simple retransmission permutation can resolve overlapping channel collisions 重传≠重复:简单的重传排列可以解决重叠的信道冲突
Erran L. Li, Junliang Liu, Kun Tan, H. Viswanathan, Y. Yang
{"title":"Retransmission ≠ repeat: simple retransmission permutation can resolve overlapping channel collisions","authors":"Erran L. Li, Junliang Liu, Kun Tan, H. Viswanathan, Y. Yang","doi":"10.1145/1859995.1860028","DOIUrl":"https://doi.org/10.1145/1859995.1860028","url":null,"abstract":"Collisions in overlapping channels can be a major problem in the deployment of high-speed OFDM networks. In this paper, we present Remap, a simple, novel paradigm for handling collisions in overlapping OFDM channels. Remap introduces a novel concept of retransmission permutation that permutes the bit-to-subcarrier assignment after each transmission, departing from the traditional, simply-repeat paradigm. Remap is simple to implement and able to exploit collision-free subcarriers to decode frames despite successive collisions in overlapping channels. We apply Remap to 802.11g to demonstrate that the diversity created by remapped frames can substantially improve decoding efficiency and improve wireless throughput. We implement our technique in software radio and demonstrate that it has potential to be deployed with simple software and firmware updates.","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115419298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Physical-layer identification of UHF RFID tags 超高频RFID标签的物理层识别
Davide Zanetti, Boris Danev, Srdjan Capkun
{"title":"Physical-layer identification of UHF RFID tags","authors":"Davide Zanetti, Boris Danev, Srdjan Capkun","doi":"10.1145/1859995.1860035","DOIUrl":"https://doi.org/10.1145/1859995.1860035","url":null,"abstract":"In this work, we study physical-layer identification of passive UHF RFID tags. We collect signals from a population of 70 tags using a purpose-built reader and we analyze time domain and spectral features of the collected signals. We show that, based on timing features of the signals, UHF RFID tags can be classified, independently of the location and distance to the reader (evaluated up to 6 meters), with an accuracy of approx. 71% (within our population). Additionally, we show that is possible to uniquely identify a maximum of approx. 26 UHF RFID tags independently of the population size. We analyze the implications of these results on tag holder privacy. We further show that, in controlled environments, UHF RFID tags can be uniquely identified based on their signal spectral features with an Equal Error Rate of 0% (within our population); we discuss the application of those techniques to cloning detection in RFID-enabled supply chains.","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116833981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 151
Sybot: an adaptive and mobile spectrum survey system for wifi networks Sybot:用于wifi网络的自适应移动频谱测量系统
Kyu-Han Kim, Alexander W. Min, K. Shin
{"title":"Sybot: an adaptive and mobile spectrum survey system for wifi networks","authors":"Kyu-Han Kim, Alexander W. Min, K. Shin","doi":"10.1145/1859995.1860029","DOIUrl":"https://doi.org/10.1145/1859995.1860029","url":null,"abstract":"Information on site-specific spectrum characteristics is essential to evaluate and improve the performance of wireless networks. However, it is usually very costly to obtain accurate spectrum-condition information in heterogeneous wireless environments. This paper presents a novel spectrum-survey system, called Sybot (Spectrum survey robot), that guides network engineers to efficiently monitor the spectrum condition (e.g., RSS) of WiFi networks. Sybot effectively controls mobility and employs three disparate monitoring techniques - complete, selective, and diagnostic - that help produce and maintain an accurate spectrum-condition map for challenging indoor WiFi networks. By adaptively triggering the most suitable of the three techniques, Sybot captures spatio-temporal changes in spectrum condition. Moreover, based on the monitoring results, Sybot automatically determines several key survey parameters, such as site-specific measurement time and space granularities. Sybot has been prototyped with a commodity IEEE 802.11 router and Linux OS, and experimentally evaluated, demonstrating its ability to generate accurate spectrum-condition maps while reducing the measurement effort (space, time) by more than 56%.","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114972487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Toward understanding characteristics of dedicated short range communications (DSRC) from a perspective of vehicular network engineers 从车载网络工程师的角度理解专用短程通信(DSRC)的特点
F. Bai, D. Stancil, H. Krishnan
{"title":"Toward understanding characteristics of dedicated short range communications (DSRC) from a perspective of vehicular network engineers","authors":"F. Bai, D. Stancil, H. Krishnan","doi":"10.1145/1859995.1860033","DOIUrl":"https://doi.org/10.1145/1859995.1860033","url":null,"abstract":"IEEE 802.11p-based Dedicated Short Range Communications (DSRC) is considered a promising wireless technology for enhancing transportation safety and improving highway efficiency. Here, using a large set of empirical measurement data taken in a rich variety of realistic driving environments, we attempt to characterize communication properties of DSRC as well as to analyze the causes of communication loss. Specifically, from a perspective of vehicular network engineers, the fundamental characteristic of DSRC communications is Packet Delivery Ratio (PDR). We investigate the impact of both uncontrollable environmental factors and controllable radio parameters on DSRC characteristics. Moreover, we also examine temporal correlation, spatial correlation and symmetric correlation of DSRC characteristics under realistic vehicular environments.","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115122871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 291
The κ factor: inferring protocol performance using inter-link reception correlation κ因子:利用链路间接收相关性推断协议性能
K. Srinivasan, Mayank Jain, J. Choi, T. Azim, Edward S. Kim, P. Levis, B. Krishnamachari
{"title":"The κ factor: inferring protocol performance using inter-link reception correlation","authors":"K. Srinivasan, Mayank Jain, J. Choi, T. Azim, Edward S. Kim, P. Levis, B. Krishnamachari","doi":"10.1145/1859995.1860032","DOIUrl":"https://doi.org/10.1145/1859995.1860032","url":null,"abstract":"This paper explores metrics that capture to what degree packet reception on different links is correlated. Specifically, it explores metrics that shed light on when and why opportunistic routing and network coding protocols perform well (or badly). It presents a new metric, κ that, unlike existing widely used metrics, has no bias based on the packet reception ratios of links. This lack of bias makes κ a better predictor of performance of opportunistic routing and network coding protocols. Comparing Deluge and Rateless Deluge, Deluge's network coding counterpart, we find that κ can predict which of the two is best suited for a given environment. For example, irrespective of the packet reception ratios of the links, if the average κ of the link pairs is very high (close to 1.0), then using a protocol that does not code works better than using a network coding protocol. Measuring κ on several 802.15.4 and 802.11 testbeds, we find that it varies significantly across network topologies and link layers. κ can be a metric for quantifying what kind of a network is present and help decide which protocols to use for that network.","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134200887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 147
Privacy vulnerability of published anonymous mobility traces 发布的匿名移动痕迹的隐私漏洞
Chris Y. T. Ma, David K. Y. Yau, N. Yip, N. Rao
{"title":"Privacy vulnerability of published anonymous mobility traces","authors":"Chris Y. T. Ma, David K. Y. Yau, N. Yip, N. Rao","doi":"10.1145/1859995.1860017","DOIUrl":"https://doi.org/10.1145/1859995.1860017","url":null,"abstract":"Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobilee networks, such as large-scale urban sensing networks. Although the published traces are often made anonymous in that the true identities of nodes are replaced by random identifiers, the privacy concern remains. This is because in real life, nodes are open to observations in public spaces, or they may voluntarily or inadvertently disclose partial knowledge of their whereabouts. Thus, snapshots of nodes' location information can be learned by interested third parties, e.g., directly through chance/engineered meetings between the nodes and their observers, or indirectly through casual conversations or other information sources about people. In this paper, we investigate how an adversary, when equipped with a small amount of the snapshot information termed as side information, can infer an extended view of the whereabouts of a victim node appearing in an anonymous trace. Our results quantify the loss of victim nodes' privacy as a function of the nodal mobility (captured in both real and synthetic traces), the inference strategies of adversaries, and any noise that may appear in the trace or the side information. Generally, our results indicate that the privacy concern is significant in that a relatively small amount of side information is sufficient for the adversary to infer the true identity (either uniquely or with high probability) of a victim in a set of anonymous traces.","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127931097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 213
Achieving single channel, full duplex wireless communication 实现单通道、全双工无线通信
J. Choi, Mayank Jain, K. Srinivasan, P. Levis, S. Katti
{"title":"Achieving single channel, full duplex wireless communication","authors":"J. Choi, Mayank Jain, K. Srinivasan, P. Levis, S. Katti","doi":"10.1145/1859995.1859997","DOIUrl":"https://doi.org/10.1145/1859995.1859997","url":null,"abstract":"This paper discusses the design of a single channel full-duplex wireless transceiver. The design uses a combination of RF and baseband techniques to achieve full-duplexing with minimal effect on link reliability. Experiments on real nodes show the full-duplex prototype achieves median performance that is within 8% of an ideal full-duplexing system. This paper presents Antenna Cancellation, a novel technique for self-interference cancellation. In conjunction with existing RF interference cancellation and digital baseband interference cancellation, antenna cancellation achieves the amount of self-interference cancellation required for full-duplex operation. The paper also discusses potential MAC and network gains with full-duplexing. It suggests ways in which a full-duplex system can solve some important problems with existing wireless systems including hidden terminals, loss of throughput due to congestion, and large end-to-end delays.","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130212424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1493
SMS-based web search for low-end mobile devices 基于短信的低端移动设备网络搜索
Jay Chen, L. Subramanian, E. Brewer
{"title":"SMS-based web search for low-end mobile devices","authors":"Jay Chen, L. Subramanian, E. Brewer","doi":"10.1145/1859995.1860011","DOIUrl":"https://doi.org/10.1145/1859995.1860011","url":null,"abstract":"Short Messaging Service (SMS) based mobile information services have become increasingly common around the world, especially in emerging regions among users with low-end mobile devices. This paper presents the design and implementation of SMSFind, an SMS-based search system that enables users to obtain extremely concise (one SMS) message of 140 bytes) and appropriate search responses for queries across arbitrary topics in one round of interaction. SMSFind is designed to complement existing SMS-based search services that are either limited in the topics they recognize or involve a human in the loop. Given an unstructured search query, SMSFind, uses a conventional search engine as a back-end to elicit several search responses and uses a combination of information retrieval techniques to extract the most appropriate 140-byte snippet as the final SMS search response. We show that SMSFind returns appropriate responses for 57.3% of ChaCha search queries in our test set; this accuracy rate is high given that ChaCha employs a human to answer the same questions. We have also deployed a pilot version of SMSFind for use with a small focus group in Kenya to explore the interaction issues of such a system and share our experience.","PeriodicalId":229719,"journal":{"name":"Proceedings of the sixteenth annual international conference on Mobile computing and networking","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132429275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信