{"title":"AVANET Services, Autonomous Vehicles and the Mobile Cloud","authors":"M. Gerla","doi":"10.1145/2811587.2811633","DOIUrl":"https://doi.org/10.1145/2811587.2811633","url":null,"abstract":"As vehicles will soon become network connected, new vehicle applications are emerging, from navigation safety to location aware content distribution, urban surveillance and intelligent transport. Autonomous vehicles stand out as important players, with plenty of sensors, memory and processing power. The richness of on-board resources and the diversity of applications set the Vehicular ad Hoc Network(VANET) apart from conventional MANETs and introduce new challenges in the services they provide. First, it becomes apparent that safe navigation in a future with autonomous car platoons, say, will demand efficient, low latency V2V. Moreover, other applications (eg, surveillance, traffic management, etc) will require a degree of coordination not possible with the conventional Internet Cloud. To this end, low latency cooperation can be best supported by a Mobile Computing Cloud (MCC), where vehicles use V2V to propagate computation results, share resources and provide mobile services. This talk will revisit VANET applications and will propose a Vehicular Cloud platform along with representative mobile service examples.","PeriodicalId":371317,"journal":{"name":"Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132439312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Game-theoretic Analysis of Computation Offloading for Cloudlet-based Mobile Cloud Computing","authors":"Xiao Ma, Chuang Lin, Xudong Xiang, Congjie Chen","doi":"10.1145/2811587.2811598","DOIUrl":"https://doi.org/10.1145/2811587.2811598","url":null,"abstract":"Mobile cloud computing (MC2) is emerging as a promising computing paradigm which helps alleviate the conflict between resource-constrained mobile devices and resource-consuming mobile applications through computation offloading. In this paper, we analyze the computation offloading problem in cloudlet-based mobile cloud computing. Different from most of the previous works which are either from the perspective of a single user or under the setting of a single wireless access point (AP), we research the computation offloading strategy of multiple users via multiple wireless APs. With the widespread deployment of WLAN, offloading via multiple wireless APs will obtain extensive application. Taking energy consumption and delay (including computing and transmission delay) into account, we present a game-theoretic analysis of the computation offloading problem while mimicking the selfish nature of the individuals. In the case of homogeneous mobile users, conditions of Nash equilibrium are analyzed, and an algorithm that admits a Nash equilibrium is proposed. For heterogeneous users, we prove the existence of Nash equilibrium by introducing the definition of exact potential game and design a distributed computation offloading algorithm to help mobile users choose proper offloading strategies. Numerical extensive simulations have been conducted and results demonstrate that the proposed algorithm can achieve desired system performance.","PeriodicalId":371317,"journal":{"name":"Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"10 8 Suppl 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123693135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building a Large Dataset for Model-based QoE Prediction in the Mobile Environment","authors":"Lamine Amour, Sami Souihi, S. Hoceini, A. Mellouk","doi":"10.1145/2811587.2811631","DOIUrl":"https://doi.org/10.1145/2811587.2811631","url":null,"abstract":"The tremendous growth in video services, specially in the context of mobile usage, creates new challenges for network service providers: How to enhance the user's Quality of Experience (QoE) in dynamic wireless networks (UMTS, HSPA, LTE/LTE-A). The network operators use different methods to predict the user's QoE. Generally to predict the user's QoE, methods are based on collecting subjective QoE scores given by users. Basically, these approaches need a large dataset to predict a good perceived quality of the service. In this paper, we setup an experimental test based on crowdsourcing approach and we build a large dataset in order to predict the user's QoE in mobile environment in term of Mean Opinion Score (MOS). The main objective of this study is to measure the individual/global impact of QoE Influence Factors (QoE IFs) in a real environment. Based on the collective dataset, we perform 5 testing scenarios to compare 2 estimation methods (SVM and ANFIS) to study the impact of the number of the considered parameters on the estimation. It became clear that using more parameters without any weighing mechanisms can produce bad results.","PeriodicalId":371317,"journal":{"name":"Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128397211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Evaluation of an RPL-based Multi-Sink Routing Protocol for Low-Power and Lossy Networks","authors":"Kevin Andrea, R. Simon","doi":"10.1145/2811587.2811614","DOIUrl":"https://doi.org/10.1145/2811587.2811614","url":null,"abstract":"Due to the energy and resource constraints of the embedded Wireless Sensor Networking (WSN) devices that form Low-Power and Lossy Networks (LLNs), efficient support for mobile data sinks is essential. Further, such support should be fully compatible with the broad class of networking mechanisms now defined for LLN support, such as the routing protocol RPL. This paper describes the Hierarchical network of Observable devices with Itinerant Sinks Transporting data (HOIST) protocol. HOIST is designed to service LLNs using an RPL-friendly three-tier hybrid cluster-tree architecture to support sensor nodes deployed over geographically segregated areas. The mobile aspects of HOIST allow for collection from such remote fields without the need for long-distance wireless transfers, which would result in a higher level of energy drain. HOIST supports both real-time data capture and collected data retrieval. We have implemented and field-tested HOIST in a working physical system, as well as in simulation, with results indicating viability for both sparse and dense deployments of nodes under multiple, geographically constrained, uncontrolled mobility models.","PeriodicalId":371317,"journal":{"name":"Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124610424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unleashing the True Power of Mobile Systems: Big Data and Analytics","authors":"Pablo Vidales","doi":"10.1145/2811587.2823534","DOIUrl":"https://doi.org/10.1145/2811587.2823534","url":null,"abstract":"Mobile systems have continuously evolved in the last years. However, user demand really smart phones that will assist them in daily activities. The new developments in processing and analyzing data are a new chance to make a quantum jump in mobile systems. Every two years the available data duplicates and in combination with existing machine learning and unstructured data analysis closed doors have been open. Today we can really personalized mobile applications to meet the specific needs of each customer, we have more than enough data to develop true context aware mobile solutions; it is just a matter of connecting the dots. This keynote will explore the challenge and opportunities that Big Data and Advanced Analytics are facing, and will present some examples of how we can combine the power of processing and analyzing unstructured and structure data to unleash the true power of mobile systems.","PeriodicalId":371317,"journal":{"name":"Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124498200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two Hops or More: On Hop-Limited Search in Opportunistic Networks","authors":"S. Bayhan, Esa Hyytiä, J. Kangasharju, J. Ott","doi":"10.1145/2811587.2811592","DOIUrl":"https://doi.org/10.1145/2811587.2811592","url":null,"abstract":"While there is a drastic shift from host-centric networking to content-centric networking, how to locate and retrieve the relevant content efficiently, especially in a mobile network, is still an open question. Mobile devices host increasing volume of data which could be shared with the nearby nodes in a multi-hop fashion. However, searching for content in this resource-restricted setting is not trivial due to the lack of a content index, as well as, desire for keeping the search cost low. In this paper, we analyze a lightweight search scheme, hop-limited search, that forwards the search messages only till a maximum number of hops, and requires no prior knowledge about the network. We highlight the effect of the hop limit on both search performance (i.e., success ratio and delay) and associated cost along with the interplay between content availability, tolerated waiting time, network density, and mobility. Our analysis, using the real mobility traces, as well as synthetic models, shows that the most substantial benefit is achieved at the first few hops and that after several hops the extra gain diminishes as a function of content availability and tolerated delay. We also observe that the return path taken by a response is on average longer than the forward path of the query and that the search cost increases only marginally after several hops due to the small network diameter.","PeriodicalId":371317,"journal":{"name":"Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"2211 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127468930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Sanchez-Hernandez, R. Menchaca-Méndez, Ricardo Menchaca-Méndez, Jesús García-Díaz, M. E. Rivero-Angeles, J. Garcia-Luna-Aceves
{"title":"A Bloom Filter-Based Algorithm for Routing in Intermittently Connected Mobile Networks","authors":"J. Sanchez-Hernandez, R. Menchaca-Méndez, Ricardo Menchaca-Méndez, Jesús García-Díaz, M. E. Rivero-Angeles, J. Garcia-Luna-Aceves","doi":"10.1145/2811587.2811609","DOIUrl":"https://doi.org/10.1145/2811587.2811609","url":null,"abstract":"In this paper, we present a new protocol for routing in intermittently connected mobile networks that, by periodically exchanging constant-size Counting Bloom filters, assigns to every node in the network probabilities of reaching any destination. The gradients defined by these probabilities are further used to forward data packets towards any node in the network. The proposed protocol is based on two novel operations defined over the Bloom filters, namely, the unary degradation operation that models the loss of topological information as it gets stale or as it is propagated away from the place where it was generated; and the binary addition operation that is used to acquire topological information from other nodes. These two operations are used to implement a probabilistic form of soft state that is defined in terms of the content of the Counting Bloom filters. We present a series of experimental results based on extensive detailed simulations that show that the proposed protocol outperforms the Epidemic routing protocol by delivering more data packets with less delay, while inducing less total overhead in both MANET and VANET scenarios.","PeriodicalId":371317,"journal":{"name":"Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130096336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carlos Adrian Gutierrez Diaz de Leon, J. T. Gutierrez-Mena, J. M. Luna-Rivera, D. U. Campos‐Delgado
{"title":"The Geometry-Based Statistical Modeling of MIMO Mobile-to-Mobile Channels Revisited","authors":"Carlos Adrian Gutierrez Diaz de Leon, J. T. Gutierrez-Mena, J. M. Luna-Rivera, D. U. Campos‐Delgado","doi":"10.1145/2811587.2811615","DOIUrl":"https://doi.org/10.1145/2811587.2811615","url":null,"abstract":"In this paper, we discuss a problem in the formulation of geometry-based statistical models for multiple-input multi-ple-output (MIMO) mobile-to-mobile (M2M) fading channels that have been proposed under the plane wave propagation (PWP) assumption. The problem is caused by an oversimplification of the PWP model in the characterization of the channel complex envelope (CCE). This modeling imprecision has led to impose an unnecessary restriction on the size of the antenna arrays to warrant the mathematical tractability of the geometrical PWP channel models. The results presented in previous papers for relevant channel statistics, such as the space-time cross-correlation function (ST-CCF), are not invalidated if the problem is corrected. On the contrary, a thorough description of the physical process of PWP reduces the number of approximations required to obtain such results, extending in consequence their validity to a wider range of propagation scenarios.","PeriodicalId":371317,"journal":{"name":"Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122972393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two-way Communications in Cognitive Personal Area Networks","authors":"M. M. Rahman, J. Misic, V. Mišić","doi":"10.1145/2811587.2811617","DOIUrl":"https://doi.org/10.1145/2811587.2811617","url":null,"abstract":"We describe a low-overhead two-way bridging scheme for cognitive personal area networks (CPANs) and analyze its performance through probabilistic analysis and renewal theory. We show that the CPANs are indeed decoupled in terms of synchronization, but the performance of both local and non-local traffic in either CPAN depends on the traffic intensity in both CPANs, as well as on the portion of traffic targeting non-local destinations.","PeriodicalId":371317,"journal":{"name":"Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116614397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Giustiniano, Theodoros Bourchas, M. Bednarek, Vincent Lenders
{"title":"Deep Inspection of the Noise in WiFi Time-of-Flight Echo Techniques","authors":"D. Giustiniano, Theodoros Bourchas, M. Bednarek, Vincent Lenders","doi":"10.1145/2811587.2811621","DOIUrl":"https://doi.org/10.1145/2811587.2811621","url":null,"abstract":"Time-of-flight (ToF) echo techniques have been proposed to estimate the distance between a local and a target station using regular WiFi radio devices. As of today, there is little understanding of the noise sources from ToF measurements. We conduct extensive experimental tests based on a customized WiFi echo technique implementation residing in the core of the 802.11 MAC processor and a high-resolution signal analysis of the WiFi traffic captured with a wideband oscilloscope. We discern the root of the error components in WiFi echo technique measurements and statistically characterize the offset noise added by the target station. Our measurements provide key insights to model the sources of noise and guidance for the design of robust distance estimators.","PeriodicalId":371317,"journal":{"name":"Proceedings of the 18th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128600451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}