Proceedings. IEEE Workshop on Mobile Computing Systems and Applications最新文献

筛选
英文 中文
Polaris: getting accurate indoor orientations for mobile devices using ubiquitous visual patterns on ceilings 北极星:利用天花板上无处不在的视觉图案,为移动设备获得准确的室内方位
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2012-02-28 DOI: 10.1145/2162081.2162101
Zheng Sun, Aveek Purohit, Shijia Pan, Frank Mokaya, R. Bose, Pei Zhang
{"title":"Polaris: getting accurate indoor orientations for mobile devices using ubiquitous visual patterns on ceilings","authors":"Zheng Sun, Aveek Purohit, Shijia Pan, Frank Mokaya, R. Bose, Pei Zhang","doi":"10.1145/2162081.2162101","DOIUrl":"https://doi.org/10.1145/2162081.2162101","url":null,"abstract":"Ubiquitous computing applications commonly use digital compass sensors to obtain orientation of a device relative to the magnetic north of the earth. However, these compass readings are always prone to significant errors in indoor environments due to presence of metallic objects in close proximity. Such errors can adversely affect the performance and quality of user experience of the applications utilizing digital compass sensors.\u0000 In this paper, we propose Polaris, a novel approach to provide reliable orientation information for mobile devices in indoor environments. Polaris achieves this by aggregating pictures of the ceiling of an indoor environment and applies computer vision based pattern matching techniques to utilize them as orientation references for correcting digital compass readings. To show the feasibility of the Polaris system, we implemented the Polaris system on mobile devices, and field tested the system in multiple office buildings. Our results show that Polaris achieves 4.5° average orientation accuracy, which is about 3.5 times better than what can be achieved through sole use of raw digital compass readings.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"7 1","pages":"14"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90733625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Celleration: loss-resilient traffic redundancy elimination for cellular data 蜂窝:蜂窝数据的损失弹性流量冗余消除
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2012-02-28 DOI: 10.1145/2162081.2162096
Eyal Zohar, I. Cidon, O. Mokryn
{"title":"Celleration: loss-resilient traffic redundancy elimination for cellular data","authors":"Eyal Zohar, I. Cidon, O. Mokryn","doi":"10.1145/2162081.2162096","DOIUrl":"https://doi.org/10.1145/2162081.2162096","url":null,"abstract":"In this paper we present Celleration, a novel gateway-to-mobile Traffic Redundancy Elimination (TRE) system, designed for the new generation of data-intensive cellular networks.\u0000 Cellular TRE needs to account for the mobile device's limited battery power and the characteristics of the cellular network such as users' mobility, high packet-loss and long round-trip delays.\u0000 Celleration is based on a novel TRE technique, in which the cellular gateway observes the forwarded chunks to identify the beginning of a previously observed chunk chain, which in turn is used as a reliable predictor to multiple future chunks. These predictions establish an ad-hoc gateway-to-mobile TRE learning mechanism that leverages the gateway's history records and the user mobile device's cached content for an efficient TRE operation for both the backhaul and the wireless last-mile.\u0000 We present a data analysis of captured cellular traffic from 130 cellular sites and a long-term study of a social network. Finally, we analyze Celleration redundancy elimination and performance under high packet loss.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"2674 1","pages":"10"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85267864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
United we find: enabling mobile devices to cooperate for efficient neighbor discovery 联合我们发现:使移动设备能够合作,有效地发现邻居
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2012-02-28 DOI: 10.1145/2162081.2162097
Mehedi Bakht, John Carlson, A. Loeb, R. Kravets
{"title":"United we find: enabling mobile devices to cooperate for efficient neighbor discovery","authors":"Mehedi Bakht, John Carlson, A. Loeb, R. Kravets","doi":"10.1145/2162081.2162097","DOIUrl":"https://doi.org/10.1145/2162081.2162097","url":null,"abstract":"The recent surge in the use of mobile devices have opened up new avenues for communication. While most existing applications designed to exploit this potential are infrastructure based, there is a growing trend to leverage physical proximity between end-users to enable direct peer-to-peer communication. However, the success of these applications relies on the ability to efficiently detect contact opportunities, Devices that participate in such opportunistic communication often come equipped with multiple radios. For an individual node, performing neighbor discovery can be too expensive with a high-power, long-range radio (e.g., Wi-Fi). On the other hand, relying only on a low-power, short-range radio for detecting neighbors results in significantly fewer available contacts. To mitigate this problem, we have developed CQuest, a novel scheme for more efficient long-range neighbor discovery that leverages the clustering of nodes as well as the radio heterogeneity of mobile devices. The basic idea is that coordination over a low-power, short-range radio can help clustered nodes distribute the load of high-power, long-range scanning. We present results from extensive simulation that shows CQuest discovers significantly more contacts than a low-power only scheme but without incurring the high energy cost usually associated with long-range discovery. We also present results and experience from a successful implementation of the protocol on a testbed of Android G1/G2 phones that shows the feasibility of the protocol in a real network.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"15 1","pages":"11"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84554573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
An amulet for trustworthy wearable mHealth 值得信赖的可穿戴移动医疗护身符
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2012-02-28 DOI: 10.1145/2162081.2162092
Jacob M. Sorber, Minho Shin, Ronald A. Peterson, Cory Cornelius, Shrirang Mare, Aarathi Prasad, Zachary Marois, Emma Smithayer, D. Kotz
{"title":"An amulet for trustworthy wearable mHealth","authors":"Jacob M. Sorber, Minho Shin, Ronald A. Peterson, Cory Cornelius, Shrirang Mare, Aarathi Prasad, Zachary Marois, Emma Smithayer, D. Kotz","doi":"10.1145/2162081.2162092","DOIUrl":"https://doi.org/10.1145/2162081.2162092","url":null,"abstract":"Mobile technology has significant potential to help revolutionize personal wellness and the delivery of healthcare. Mobile phones, wearable sensors, and home-based tele-medicine devices can help caregivers and individuals themselves better monitor and manage their health. While the potential benefits of this \"mHealth\" technology include better health, more effective healthcare, and reduced cost, this technology also poses significant security and privacy challenges. In this paper we propose Amulet, an mHealth architecture that provides strong security and privacy guarantees while remaining easy to use, and outline the research and engineering challenges required to realize the Amulet vision.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"4 1","pages":"7"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89849912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
Mitigating the true cost of advertisement-supported "free" mobile applications 降低广告支持的“免费”移动应用的实际成本
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2012-02-28 DOI: 10.1145/2162081.2162083
Azeem J. Khan, Vigneshwaran Subbaraju, Archan Misra, S. Seshan
{"title":"Mitigating the true cost of advertisement-supported \"free\" mobile applications","authors":"Azeem J. Khan, Vigneshwaran Subbaraju, Archan Misra, S. Seshan","doi":"10.1145/2162081.2162083","DOIUrl":"https://doi.org/10.1145/2162081.2162083","url":null,"abstract":"The dominant, \"ad-supported free application\" model for consumer-oriented mobile computing is seemingly imperiled by the growing global adoption of metered data pricing plans by mobile operators. In this paper, we explore the opportunities for addressing this emerging conflict by enabling more intelligent ad delivery to such mobile devices. One especially promising path is leveraging the increasing availability of heterogeneous wireless access technologies (e.g., WiFi, femtocells) that offer less restrictive and more energy-efficient transport substrates for such data traffic. To understand the possibilities that exist, we first profile the advertisement traffic characteristics for some of the most popular advertisement-supported consumer applications, and then analyze the key features of mobile advertisement delivery. We then outline the principles of CAMEO, a middleware that uses predictive profiling of a user's {device, network and usage} context to anticipate the advertisements that need to be served, and then modulates their delivery mechanism to enable effective mobile advertising, but at considerably lower costs.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"89 1","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85720293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Towards fine-grained radio-based indoor location 朝着基于无线电的细粒度室内定位方向发展
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2012-02-28 DOI: 10.1145/2162081.2162100
Jie Xiong, K. Jamieson
{"title":"Towards fine-grained radio-based indoor location","authors":"Jie Xiong, K. Jamieson","doi":"10.1145/2162081.2162100","DOIUrl":"https://doi.org/10.1145/2162081.2162100","url":null,"abstract":"Location systems are key to a rich experience for mobile users. When they roam outdoors, mobiles can usually count on a clear GPS signal for an accurate location, but indoors, GPS usually fades, and so up until recently, mobiles have had to rely mainly on rather coarse-grained signal strength readings for location. What has changed this status quo is the recent trend of dramatically increasing numbers of antennas at the indoor AP, mainly to bolster capacity and coverage with multiple-input, multiple-output (MIMO) techniques. In the near future, the number of antennas at the access point will increase several-fold, to meet increasing demands for wireless capacity with MIMO links, spatial division multiplexing, and interference management. We thus observe an opportunity to revisit the important problem of localization with a fresh perspective. This paper presents the design and experimental evaluation of ArrayTrack, an indoor location system that uses MIMO-based techniques to track wireless clients in real time as they roam about a building. We prototype ArrayTrack on a WARP platform, emulating the capabilities of an inexpensive 802.11 wireless access point. Our results show that ArrayTrack can pinpoint 33 clients spread out over an indoor office environment to within a 36 cm location accuracy.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"1 1","pages":"13"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76843230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Don't kill my ads!: balancing privacy in an ad-supported mobile application market 别毁了我的广告!在广告支持的手机应用市场中平衡隐私
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2012-02-28 DOI: 10.1145/2162081.2162084
Ilias Leontiadis, Christos Efstratiou, Marco Picone, C. Mascolo
{"title":"Don't kill my ads!: balancing privacy in an ad-supported mobile application market","authors":"Ilias Leontiadis, Christos Efstratiou, Marco Picone, C. Mascolo","doi":"10.1145/2162081.2162084","DOIUrl":"https://doi.org/10.1145/2162081.2162084","url":null,"abstract":"Application markets have revolutionized the software download model of mobile phones: third-party application developers offer software on the market that users can effortlessly install on their phones. This great step forward, however, also imposes some threats to user privacy: applications often ask for permissions that reveal private information such as the user's location, contacts and messages. While some mechanisms to prevent leaks of user privacy to applications have been proposed by the research community, these solutions fail to consider that application markets are primarily driven by advertisements that rely on accurately profiling the user. In this paper we take into account that there are two parties with conflicting interests: the user, interested in maintaining their privacy and the developer who would like to maximize their advertisement revenue through user profiling. We have conducted an extensive analysis of more than 250,000 applications in the Android market. Our results indicate that the current privacy protection mechanisms are not effective as developers and advert companies are not deterred. Therefore, we designed and implemented a market-aware privacy protection framework that aims to achieve an equilibrium between the developer's revenue and the user's privacy. The proposed framework is based on the establishment of a feedback control loop that adjusts the level of privacy protection on mobile phones, in response to advertisement generated revenue.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"516 1","pages":"2"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77109538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 173
ACCessory: password inference using accelerometers on smartphones 附件:使用智能手机上的加速度计进行密码推断
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2012-02-28 DOI: 10.1145/2162081.2162095
Emmanuel Owusu, Jun Han, Sauvik Das, A. Perrig, J. Zhang
{"title":"ACCessory: password inference using accelerometers on smartphones","authors":"Emmanuel Owusu, Jun Han, Sauvik Das, A. Perrig, J. Zhang","doi":"10.1145/2162081.2162095","DOIUrl":"https://doi.org/10.1145/2162081.2162095","url":null,"abstract":"We show that accelerometer readings are a powerful side channel that can be used to extract entire sequences of entered text on a smart-phone touchscreen keyboard. This possibility is a concern for two main reasons. First, unauthorized access to one's keystrokes is a serious invasion of privacy as consumers increasingly use smartphones for sensitive transactions. Second, unlike many other sensors found on smartphones, the accelerometer does not require special privileges to access on current smartphone OSes. We show that accelerometer measurements can be used to extract 6-character passwords in as few as 4.5 trials (median).","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"1 1","pages":"9"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89743603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 395
Crowd (soft) control: moving beyond the opportunistic 群体(软)控制:超越机会主义者
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2012-02-28 DOI: 10.1145/2162081.2162086
John P. Rula, F. Bustamante
{"title":"Crowd (soft) control: moving beyond the opportunistic","authors":"John P. Rula, F. Bustamante","doi":"10.1145/2162081.2162086","DOIUrl":"https://doi.org/10.1145/2162081.2162086","url":null,"abstract":"A number of novel wireless networked services, ranging from participatory sensing to social networking, leverage the increasing capabilities of mobile devices and the movements of the individuals carrying them. For many of these systems, their effectiveness fundamentally depends on coverage and the particular mobility patterns of the participants. Given the strong spatial and temporal regularity of human mobility, the needed coverage can typically only be attained through a large participant base.\u0000 In this paper we explore an alternative approach to attain coverage without scale -- (soft) controlling the movement of participants. We present Crowd Soft Control (CSC), an approach to exert limited control over the temporal and spatial movements of mobile users by leveraging the built-in incentives of location-based gaming and social applications. By pairing network services with these location-based apps, CSC allows researchers to use an application's incentives (e.g. game objectives) to control the movement of participating users, increasing the effectiveness and efficiency of the associated network service. After outlining the case for Crowd Soft Control, we present an initial prototype of our ideas and discuss potential benefits and costs in the context of two case studies.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"472 1","pages":"3"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81877791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Code in the air: simplifying sensing and coordination tasks on smartphones 空中代码:简化智能手机上的感知和协调任务
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2012-02-28 DOI: 10.1145/2162081.2162087
Lenin Ravindranath, Arvind Thiagarajan, H. Balakrishnan, S. Madden
{"title":"Code in the air: simplifying sensing and coordination tasks on smartphones","authors":"Lenin Ravindranath, Arvind Thiagarajan, H. Balakrishnan, S. Madden","doi":"10.1145/2162081.2162087","DOIUrl":"https://doi.org/10.1145/2162081.2162087","url":null,"abstract":"A growing class of smartphone applications are tasking applications that run continuously, process data from sensors to determine the user's context (such as location) and activity, and optionally trigger certain actions when the right conditions occur. Many such tasking applications also involve coordination between multiple users or devices. Example tasking applications include location-based reminders, changing the ring-mode of a phone automatically depending on location, notifying when friends are nearby, disabling WiFi in favor of cellular data when moving at more than a certain speed outdoors, automatically tracking and storing movement tracks when driving, and inferring the number of steps walked each day. Today, these applications are non-trivial to develop, although they are often trivial for end users to state. Additionally, simple implementations can consume excessive amounts of energy. This paper proposes Code in the Air (CITA), a system which simplifies the rapid development of tasking applications. It enables non-expert end users to easily express simple tasks on their phone, and more sophisticated developers to write code for complex tasks by writing purely server-side scripts. CITA provides a task execution framework to automatically distribute and coordinate tasks, energy-efficient modules to infer user activities and compose them, and a push communication service for mobile devices that overcomes some shortcomings in existing push services.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"136 1","pages":"4"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78180079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信