{"title":"Controlling the Spreads of Infectious Disease and Scare via Utilizing Location and Social Networking Information","authors":"Wei Cheng, F. Chen, Xiuzhen Cheng","doi":"10.1145/2757384.2757386","DOIUrl":"https://doi.org/10.1145/2757384.2757386","url":null,"abstract":"Americans were anxious over infectious disease such as Ebola. According to Voice of America's report, more than four in 10 were worried, even though there had only been a few confirmed. People are usually thinking they may have already had an indirect/direct contact with a suspected/confirmed patient because of visiting same places. The scare, therefore, spreads among general public as (i) they suspect the administrative agencies' infection controls are not sufficiently proper, and (ii) there is still no customized model to convince them that their infection probabilities are very low. To address these issues, we propose to utilize location and social networking information to jointly control the spread of infectious disease and the scare among people. This work-in-progress paper specifically introduces our model and research directions.","PeriodicalId":330286,"journal":{"name":"Proceedings of the 2015 Workshop on Mobile Big Data","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126112689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Mobile Cloud Computing Middleware for Low Latency Offloading of Big Data","authors":"Bo Yin, Wenlong Shen, L. Cai, Y. Cheng","doi":"10.1145/2757384.2757390","DOIUrl":"https://doi.org/10.1145/2757384.2757390","url":null,"abstract":"Recent years have witnessed an explosive growth of mobile applications. Thanks to improved network connectivity, it becomes a promising enabling solution to offload computation-intensive applications to the resource abundant public cloud to further augment the capacity of resource-constrained devices. As mobile applications usually have QoS requirements, it is critical to provide low latency services to the mobile users while maintain low leasing cost of cloud resources. However, the resources offered by cloud vendors are usually charged based on a time quanta while the offloading demand for heavy-lifting computation may occur infrequently on mobile devices. This mismatch would demotivate users to resort to public cloud for computation offloading. In this paper, we design a computation offloading middleware which bridges the aforementioned gap between cloud vendors and mobile clients, providing offloading service to multiple users with low cost and delay. The proposed middleware has two key components: Task Scheduler and Instance Manager. The Task Scheduler dispatches the received offloading tasks to execute in the instances reserved by the Instance Manager. Based on the arrival pattern of offloading tasks, the Instance Manager dynamically changes the number of instances to ensure certain service grade of mobile users. Our proposed mechanisms are validated through numerical results. It is shown that a lower average delay can be achieved through proposed scheduling heuristic, and the number of reserved instances well adapts to the offloading demands.","PeriodicalId":330286,"journal":{"name":"Proceedings of the 2015 Workshop on Mobile Big Data","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124104971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Fog Computing: Concepts, Applications and Issues","authors":"Shanhe Yi, Cheng Li, Qun A. Li","doi":"10.1145/2757384.2757397","DOIUrl":"https://doi.org/10.1145/2757384.2757397","url":null,"abstract":"Despite the increasing usage of cloud computing, there are still issues unsolved due to inherent problems of cloud computing such as unreliable latency, lack of mobility support and location-awareness. Fog computing can address those problems by providing elastic resources and services to end users at the edge of network, while cloud computing are more about providing resources distributed in the core network. This survey discusses the definition of fog computing and similar concepts, introduces representative application scenarios, and identifies various aspects of issues we may encounter when designing and implementing fog computing systems. It also highlights some opportunities and challenges, as direction of potential future work, in related techniques that need to be considered in the context of fog computing.","PeriodicalId":330286,"journal":{"name":"Proceedings of the 2015 Workshop on Mobile Big Data","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129358807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Social Networks, Sensor Networks, and Smartphone Systems","authors":"John Wang","doi":"10.1145/3260492","DOIUrl":"https://doi.org/10.1145/3260492","url":null,"abstract":"","PeriodicalId":330286,"journal":{"name":"Proceedings of the 2015 Workshop on Mobile Big Data","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129212971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Feng Wang, Cong Wang, Z. Wang, Xueying Zhang, Chao Shang
{"title":"Research on 3D Localization Algorithm of Wireless Sensor Networks in Underground Coal Mine","authors":"Feng Wang, Cong Wang, Z. Wang, Xueying Zhang, Chao Shang","doi":"10.1145/2757384.2757393","DOIUrl":"https://doi.org/10.1145/2757384.2757393","url":null,"abstract":"Most of the existing algorithms for Wireless Sensor Networks (WSN) localization in underground coal mine are exposed such problems as unreasonable node model, low accuracy and unsteady. This paper presents a new method of nodes layout in coal mine roadway, and builds positioning model underground. Compared with traditional model, this model can reduce the number of sensor nodes when meets positioning requirement. Then the non-ranging positioning algorithm of TDOA/AOA hybrid algorithm, currently used as three-dimensional positioning algorithm, is introduced to the model. Simulation results show that: this algorithm has better positioning performance than the traditional algorithms, fitting into underground coal mine.","PeriodicalId":330286,"journal":{"name":"Proceedings of the 2015 Workshop on Mobile Big Data","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127443345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Measurement-based Study on Application Popularity in Android and iOS App Stores","authors":"Wei Liu, Ge Zhang, Jun Chen, Y. Zou, Wenchao Ding","doi":"10.1145/2757384.2757392","DOIUrl":"https://doi.org/10.1145/2757384.2757392","url":null,"abstract":"Mobile application stores (appstores) are emerging digital distribution platforms with explosive growth. Although there have been some observations on the mobile application (app) popularity in Android appstores, there is no report on the app popularity in iOS appstores. What's more, the details about user downloads and app popularity, such as the composition of downloads traffic and the migration of user interests, are untouched yet. In this paper, we unreel these issues based on five-month measurements of four third-party appstores (two for Android and two for iOS respectively). Our main results include: 1) The app popularity distributions of third-party Android appstores are different from those of iOS third-party appstores. There is an exponential cut-off observed besides the Zipf-like distribution in the app popularity distribution of Android appstores. 2) In both Android and iOS families of appstores, the major part of downloads traffic is contributed by the large-size apps, counting 80% or more in the volume of total downloads traffic. 3) There is less rank variance of the most popular apps in the iOS appstores than those in the Android appstores. About 52% of the top 100 iOS apps observed in one month are still in the rank of top 100 in the following four months.","PeriodicalId":330286,"journal":{"name":"Proceedings of the 2015 Workshop on Mobile Big Data","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130325721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Other Applications","authors":"Yu Cheng","doi":"10.1145/3260495","DOIUrl":"https://doi.org/10.1145/3260495","url":null,"abstract":"","PeriodicalId":330286,"journal":{"name":"Proceedings of the 2015 Workshop on Mobile Big Data","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114454087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of multiple orthogonal window spectrum estimation in speaker recognition","authors":"Bai Jing, Zhang Yiran, Yin Cong","doi":"10.1145/2757384.2757394","DOIUrl":"https://doi.org/10.1145/2757384.2757394","url":null,"abstract":"For speaker recognition systems, short-time spectrum of speech signal is obtained by using windowed discrete Fourier transform (DFT) in feature extraction. Although windowed DFT can reduces spectral leakage, variance of the spectrum estimation remains high, which reduces the stability of spectrum estimation. Multiple orthogonal window spectrum estimation(referred Multitapering) method, which can not only reduces spectral leakage but also reduces the variance of the spectrum estimation, has more stable performance of spectrum estimate, is utilized in this paper. After how number of windows affects performance of spectrum estimation is studied, the performance of speaker recognition system is also tested in noisy environment. The results show that multiple orthogonal spectrum estimation method has more stable performance and better noise robustness than Hamming windowed DFT.","PeriodicalId":330286,"journal":{"name":"Proceedings of the 2015 Workshop on Mobile Big Data","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125959116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qiang Liu, E. Ngai, Xiping Hu, Zhengguo Sheng, Victor C. M. Leung, Jianping Yin
{"title":"SH-CRAN: Hierarchical Framework to Support Mobile Big Data Computing in a Secure Manner","authors":"Qiang Liu, E. Ngai, Xiping Hu, Zhengguo Sheng, Victor C. M. Leung, Jianping Yin","doi":"10.1145/2757384.2757388","DOIUrl":"https://doi.org/10.1145/2757384.2757388","url":null,"abstract":"The heterogeneous cloud radio access network (H-CRAN) has been emerging as a cost-effective solution supporting huge volumes of mobile traffic in the big data era. This paper investigates potential security challenges on H-CRAN and analyzes their likelihoods and difficulty levels. Typically, the security threats in H-CRAN can be categorized into three groups, i.e., security threats towards remote radio heads (RRHs), those towards the radio cloud infrastructure and towards backhaul networks. To overcome challenges made by the security threats, we propose a hierarchical security framework called Secure H-CRAN (SH-CRAN) to protect the H-CRAN system against the potential threats. Specifically, the architecture of SH-CRAN contains three logically independent secure domains (SDs), which are the SDs of radio cloud infrastructure, RRHs and backhauls. The notable merits of SH-CRAN include two aspects: (i) the proposed framework is able to provide security assurance for the evolving H-CRAN system, and (ii) the impacts of any failure are limited in one specific component of H-CRAN. The proposed SH-CRAN can be regarded as the basis of the future security mechanisms of mobile bag data computing.","PeriodicalId":330286,"journal":{"name":"Proceedings of the 2015 Workshop on Mobile Big Data","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131006822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Cloud and Fog Computing","authors":"Wei Cheng","doi":"10.1145/3260494","DOIUrl":"https://doi.org/10.1145/3260494","url":null,"abstract":"","PeriodicalId":330286,"journal":{"name":"Proceedings of the 2015 Workshop on Mobile Big Data","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124209141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}