{"title":"MadApp: A Middleware for Opportunistic Data in Mobile Web Applications","authors":"V. Srinivasan, C. Julien","doi":"10.1109/MDM.2014.27","DOIUrl":"https://doi.org/10.1109/MDM.2014.27","url":null,"abstract":"Mobile computing increasingly often entails applications that embody opportunistic or delay-tolerant communication, and while much work has focused on refining and optimizing the technical underpinnings for providing delay-tolerant communication constructs, there is almost a complete lack of support for integrating opportunistic communication functionality at the application level. This paper introduces MadApp, an application-level development framework that provides tailored abstractions and support infrastructure for creating dynamic web pages that can incorporate received content from various opportunistic communication channels on-the-fly. We describe multiple application scenarios in which these constructs can seamlessly apply, and provide a complete conceptual and concrete architecture and implementation for MadApp. We evaluate MadApp's support for opportunistic mobile computing web applications using two different mobility trace data sets collected from the real-world. This paper demonstrates that MadApp enables opportunistic mobile computing applications to begin to leverage the significant advances in delay-tolerant communication research, opening doors for even more dynamic and adaptive applications.","PeriodicalId":322071,"journal":{"name":"2014 IEEE 15th International Conference on Mobile Data Management","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117225906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SimMiner: A Tool for Discovering User Similarity by Mining Geospatial Trajectories","authors":"Naveen Nandan, David Sinjaya","doi":"10.1109/MDM.2014.53","DOIUrl":"https://doi.org/10.1109/MDM.2014.53","url":null,"abstract":"This paper describes a tool called SimMiner that can model, analyze and visualize geospatial location information and discover similarity patterns from trajectory databases. The location data is modeled as a grid with cell transitions, which not only helps in mining and retrieving the similarity pattern between users, but also reduces the complexity for storage of such location information which is normally modeled as trajectories in moving object databases. The system also showcases an interactive browser-based visualization component that demonstrates the results of each step - modeling the grid, extraction of cell transition sequence and user similarity mining.","PeriodicalId":322071,"journal":{"name":"2014 IEEE 15th International Conference on Mobile Data Management","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115685171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of the Privacy Management Platform","authors":"Christoph Stach, B. Mitschang","doi":"10.1109/MDM.2014.14","DOIUrl":"https://doi.org/10.1109/MDM.2014.14","url":null,"abstract":"Nowadays, mobile platform vendors have to concern themselves increasingly about how to protect their users' privacy. As Google is less restrictive than their competitors regarding their terms of use for app developers, it is hardly surprising that malware spreads even in Google Play. To make matters worse, in Android every user is responsible for his or her private data and s/he is frequently overwhelmed with this burden because of the fragile Android permission mechanism. Thus, the calls for a customizable, fine-grained, context-based, crash-proof, and intuitive privacy management system are growing louder. To cope with these requests, we introduce the Privacy Management Platform (PMP) and we discuss three alternative implementation strategies for such a system.","PeriodicalId":322071,"journal":{"name":"2014 IEEE 15th International Conference on Mobile Data Management","volume":"348 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122169464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding Sustainable Mobility: The Potential of Electric Vehicles","authors":"Michelle Scott, D. Hopkins, J. Stephenson","doi":"10.1109/MDM.2014.63","DOIUrl":"https://doi.org/10.1109/MDM.2014.63","url":null,"abstract":"Rising awareness of the environmental impacts of dominant mobility practices lead to the development of the sustainable mobility paradigm. This paradigm advocates three features of a mobility system: 1. A reduced need to travel, 2. Modal shift towards more sustainable options, and 3. Reduced vehicle kilometres travelled. In this paper, two sets of data are presented to explore the potential of electric vehicles to contribute to a more sustainable mobility system. First, data from an international Delphi of transport experts shows how a sustainable future can be characterised by different features: efficient internal combustion engine vehicles, electric vehicles, and reduced personal car ownership. Thus electric vehicles are presented as both an opportunity and a threat in relation to sustainable mobility. A second body of empirical material is drawn from interviews with electric vehicle owners, and discusses the drivers and barriers to ownership. Interestingly, participants suggest changing mobility practices associated with electric vehicle ownership, evidenced by decreasing kilometres travelled. The paper concludes by suggesting that there may be potential for electric vehicles to contribute to a sustainable mobility future through modified mobility practices and renewable energy sources in New Zealand.","PeriodicalId":322071,"journal":{"name":"2014 IEEE 15th International Conference on Mobile Data Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128178968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective Mobile Context Pattern Discovery via Adapted Hierarchical Dirichlet Processes","authors":"Jiangchuan Zheng, Siyuan Liu, L. Ni","doi":"10.1109/MDM.2014.24","DOIUrl":"https://doi.org/10.1109/MDM.2014.24","url":null,"abstract":"The extraction of macroscopic mobile context reflecting users' personal and social behavior patterns from smartphone sensor data (e.g., GPS/Bluetooth signals) is crucial in building intelligent pervasive systems. Hierarchical Dirichlet Processes (HDP), a well known Bayesian nonparametrics model for grouped data, is a promising option to achieve this objective due to its ability of discovering high-level semantics behind raw signals and establishing connections between individuals. However, applying HDP in a straightforward manner may not work as it does not take certain unique characteristics in mobile context into account. Particularly, while traditional HDP typically models a single aspect (e.g., Word), the characterization of a mobile context normally involves multiple heterogeneous aspects (e.g., Time, location, Bluetooth proximity). In addition, the presence of multiple aspects dictates a flexible way of clustering users and organizing mobile contexts in a hierarchical manner in serving different pervasive applications, a feature that traditional HDP lacks. Therefore, in this paper, we propose several extensions on traditional HDP to adapt it to the task of mobile context discovery. The key features in our extensions are: i) fusing multiple aspects naturally in HDP to achieve effective extraction of complex mobile context, ii) treating different aspects heterogeneously (globally or personally) in HDP to enable flexible user behavior clustering at various granularities in accordance with applications' needs, and iii) organizing mobile contexts in a hierarchical manner for natural behavior representation and overcoming data sparsity. Based on the experiments in a popular real-world mobile data set, we illustrate the ability of the framework in extracting useful mobile contexts such as characterizing personal life routines, discovering dominant temporal habits in a population, and inferring social group patterns, as well as its potential in improving individual mobility prediction under data sparsity.","PeriodicalId":322071,"journal":{"name":"2014 IEEE 15th International Conference on Mobile Data Management","volume":"6 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131451261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PopTour: Discovering Journey Group T-Patterns from Instagram Trajectories to Recommend Hot Travel Routes","authors":"Shuangyu Yu, Yaxin Yu, Yulong Li, Xin Liu","doi":"10.1109/MDM.2014.56","DOIUrl":"https://doi.org/10.1109/MDM.2014.56","url":null,"abstract":"Instagram is an popular photo-sharing smart phone application of social network and is widely used among tourists to record their journey information such as location, time and content. Consequently, huge volume of spatio-temporal data are generated in the form of trajectories. Discovering useful patterns from these trajectories can reveal valuable knowledge to a variety of critical applications. In this light, we propose a novel concept, called Journey Group (JG), which is a group trajectory pattern reflecting a large number of users who walk through a common trajectory and depart from the trajectory for several times allowed. In this paper, we focus on data generated by Instagram to discover the JG Trajectory Patterns i.e., JG T-Patterns, from travel trajectories. Previous researches on T-Patterns mining concentrate on GPS-based data, which is different from Instagram data, a kind of UGC-based (User Generated Content based) data. GPS-based data is dense because it is often generated automatically by moving devices in a certain pace, while UGC-based data is sparse because data is generated randomly by the uploading of users. Aiming at this, a novel JG T-Patterns mining strategy from UGC-based data is also proposed. Finally, a demo for discovering hot travel routes based on JG T-Patterns from Instagram trajectories, named Pop Tour, is implemented and experimental results show that Pop Tour is an effective system.","PeriodicalId":322071,"journal":{"name":"2014 IEEE 15th International Conference on Mobile Data Management","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132961939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Keyword Based Semantic Search for Mobile Data","authors":"Jihoon Ko, Sangjin Shin, Sungkwang Eom, Minjae Song, Jooik Jung, Donghoon Shin, Kyong-Ho Lee, Yongil Jang","doi":"10.1109/MDM.2014.36","DOIUrl":"https://doi.org/10.1109/MDM.2014.36","url":null,"abstract":"Most of the mobile platforms provide a keyword based full text search (FTS) for users to find what they want. However, FTS has difficulties in dealing with the cases where a user cannot remember the exact keywords about target data or the number of search results is too many. To overcome these limitations of FTS, we propose a semantically enhanced method of searching for data on mobile devices along with mobile ontology. Experimental results of the proposed method show that our method provides accurate search results and is suitable for a mobile environment.","PeriodicalId":322071,"journal":{"name":"2014 IEEE 15th International Conference on Mobile Data Management","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133879258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient and Secure Code Dissemination in Sensor Clouds","authors":"Vimal Kumar, S. Madria","doi":"10.1109/MDM.2014.19","DOIUrl":"https://doi.org/10.1109/MDM.2014.19","url":null,"abstract":"In this paper, we present an efficient and secure code dissemination technique aimed at sensor clouds. Previous code dissemination techniques were geared toward traditional wireless sensor networks. They did not take into account, the dynamic nature of a sensor cloud, where the applications running on the motes may not just be updated but changed completely in successive code disseminations. The technique presented in this paper is based upon the observation that a large amount of code is common between applications in wireless sensor networks. Our technique first discovers the code common across various wireless sensor applications. It then distributes this code in the form of functions a priori into the network. During code dissemination, these common functions are picked up by the sensors from the network. Only a part of the code needs to be transmitted from the base station. This reduces the overall transmitted code and hence the energy consumption. Since, security is important in sensor clouds, we further present a security scheme based on proxy reencryption to provide confidentiality and integrity of the code. We have implemented our scheme using two different proxy reencryption algorithms, on Mica2 and TelosB mote platforms to measure its energy consumption. We have also evaluated our scheme in terms of disseminated code size and bandwidth usage to illustrate its efficiency compared to a popular secure code dissemination technique, Seluge.","PeriodicalId":322071,"journal":{"name":"2014 IEEE 15th International Conference on Mobile Data Management","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132221587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"edPAS: Event-Based Dynamic Parking Allocation System in Vehicular Networks","authors":"Kshama Raichura, Nilesh Padhariya","doi":"10.1109/MDM.2014.72","DOIUrl":"https://doi.org/10.1109/MDM.2014.72","url":null,"abstract":"This work proposes the edPAS system for the efficient processing and handling of dynamic parking allocation requests in vehicular networks. In edPAS, base-station and communicators collaboratively provide the effective event-based parking allocation process for vehicles. Edpas offers the best available parking-lot to vehicle, which is relevant to its event-place. Furthermore, edPAS tracks the vehicles through communicators for providing runtime changes in allotted parking-lot, if any, to the vehicles, thereby optimizing the parking-lot utilization. The main contributions of edPAS are three-fold. First, it proposes the architecture of edPAS with static and dynamic-allocation processes. Second, it proposes two parking-lot allocation schemes, FCFS and PR, using first-come-first-serve and priority algorithms respectively, for parking-queue mechanism. Third, our performance evaluation shows that our schemes are indeed effective for improving the edPAS functionality in terms of maximizing parking-lot utilization and reducing overall time at low communication cost.","PeriodicalId":322071,"journal":{"name":"2014 IEEE 15th International Conference on Mobile Data Management","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134550721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pattern-Wise Trust Assessment of Sensor Data","authors":"Robert Gwadera, Mehdi Riahi, K. Aberer","doi":"10.1109/MDM.2014.22","DOIUrl":"https://doi.org/10.1109/MDM.2014.22","url":null,"abstract":"One of the most important tasks of a sensor network (SN) is to detect occurrences of interesting events in the monitored environment. However, data measured by SN is often affected by errors. We investigate the problem of assessing trustworthiness (trust) of a sensor value (tested value) in the presence of events and errors. A usual approach is to express the trust as a deviation of the tested value from a reference value (a normal value). State of the art approaches aim at defining the reference value in terms of a context consisting of values of spatially proximate sensors that are correlated with the tested value. However, they trade accuracy for simplicity and use a fixed context consisting of values of a fixed neighborhood (e.g., All values within a circular neighborhood of radius r). Therefore, such a fixed context fails in most practical cases by under or overestimating the reference values. We present the first pattern-wise method (PW) for trust assessment of sensor data that addresses the limitations of the state of the art approaches by departing from the idea of the fixed neighborhood. We consider a variable neighborhood that consists of an arbitrary subset of the spatially proximate sensors. We define the context as a frequent spatial pattern consisting of values of the variable neighborhood that frequently co-occurs with the tested value in the stream of sensor values. We define the trust as a belief (probability) that the tested value is correct given selected features of a frequent pattern consisting of the context and the tested value. We compute trust as the output of the logistic regression, where the input variables consist of the following features of the pattern: (I) the relative frequency, (II) the conditional probability of the tested value given the context and (III) the size of the variable neighborhood. Experimental results confirmed superiority of the proposed method over the state of the art method.","PeriodicalId":322071,"journal":{"name":"2014 IEEE 15th International Conference on Mobile Data Management","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133497029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}