Proceedings. IEEE Workshop on Mobile Computing Systems and Applications最新文献

筛选
英文 中文
EyeGuardian: a framework of eye tracking and blink detection for mobile device users EyeGuardian:一个针对移动设备用户的眼球追踪和眨眼检测框架
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2012-02-28 DOI: 10.1145/2162081.2162090
Seongwon Han, Sungwon Yang, Jihyoung Kim, M. Gerla
{"title":"EyeGuardian: a framework of eye tracking and blink detection for mobile device users","authors":"Seongwon Han, Sungwon Yang, Jihyoung Kim, M. Gerla","doi":"10.1145/2162081.2162090","DOIUrl":"https://doi.org/10.1145/2162081.2162090","url":null,"abstract":"Computer Vision Syndrome (CVS) is a common problem in the \"Information Age\", and it is becoming more serious as mobile devices (e.g. smartphones and tablet PCs) with small, low-resolution screens are outnumbering the home computers. The simplest way to avoid CVS is to blink frequently. However, most people do not realize that they blink less and some do not blink at all in front of the screen. In this paper, we present a mobile application that keeps track of the reader's blink rate and prods the user to blink if an exceptionally low blink rate is detected. The proposed eye detection and tracking algorithm is designed for mobile devices and can keep track of the eyes in spite of camera motion. The main idea is to predict the eye position in the camera frame using the feedback from the built-in accelerometer. The eye tracking system was built on a commercial Tablet PC. The experimental results consistently show that the scheme can withstand very aggressive mobility scenarios.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"19 1","pages":"6"},"PeriodicalIF":0.0,"publicationDate":"2012-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76774702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Can deterministic replay be an enabling tool for mobile computing? 确定性重放能成为移动计算的一种启用工具吗?
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2011-03-01 DOI: 10.1145/2184489.2184507
J. Flinn, Z. Morley Mao
{"title":"Can deterministic replay be an enabling tool for mobile computing?","authors":"J. Flinn, Z. Morley Mao","doi":"10.1145/2184489.2184507","DOIUrl":"https://doi.org/10.1145/2184489.2184507","url":null,"abstract":"Deterministic record and replay is fast becoming a vital technology in desktop and server computing environments. Yet, the applicability of this technology to computation run on small, mobile devices such as cell phones has not yet been explored. We argue that there are several potential uses of replay that are especially beneficial when applied to mobile phones: dual execution on cloud or cloudlet computers to reduce latency and possibly phone energy use, operation shipping for file synchronization, and offloading of expensive security and reliability checks to remote servers. In this paper, we explore these potential uses, as well as some of the unique challenges posed by implementing replay on phones.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"64 1","pages":"84-89"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88313836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
AdNext: a visit-pattern-aware mobile advertising system for urban commercial complexes AdNext:针对城市商业综合体的基于访问模式的移动广告系统
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2011-03-01 DOI: 10.1145/2184489.2184492
Byoungjip Kim, J. Ha, Sang Jeong Lee, Seungwoo Kang, Youngki Lee, Yunseok Rhee, L. Nachman, Junehwa Song
{"title":"AdNext: a visit-pattern-aware mobile advertising system for urban commercial complexes","authors":"Byoungjip Kim, J. Ha, Sang Jeong Lee, Seungwoo Kang, Youngki Lee, Yunseok Rhee, L. Nachman, Junehwa Song","doi":"10.1145/2184489.2184492","DOIUrl":"https://doi.org/10.1145/2184489.2184492","url":null,"abstract":"As smartphones have become prevalent, mobile advertising is getting significant attention as being not only a killer application in future mobile commerce, but also as an important business model of emerging mobile applications to monetize them. In this paper, we present AdNext, a visit-pattern-aware mobile advertising system for urban commercial complexes. AdNext can provide highly relevant ads to users by predicting places that the users will next visit. AdNext predicts the next visit place by learning the sequential visit patterns of commercial complex users in a collective manner. As one of the key enabling techniques for AdNext, we develop a probabilistic prediction model that predicts users' next visit place from their place visit history. To automatically collect the users' place visit history by smartphones, we utilize Wi-Fi-based indoor localization. We demonstrate the feasibility of AdNext by evaluating the accuracy of the prediction model. For the evaluation, we used a dataset collected from COEX Mall, the largest commercial complex in South Korea. Also, we implemented an initial prototype of AdNext with the latest smartphones, and deployed it in COEX Mall.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"13 1","pages":"7-12"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81994050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Towards end-to-end security in branchless banking 迈向无分支银行的端到端安全
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2011-03-01 DOI: 10.1145/2184489.2184496
S. Panjwani
{"title":"Towards end-to-end security in branchless banking","authors":"S. Panjwani","doi":"10.1145/2184489.2184496","DOIUrl":"https://doi.org/10.1145/2184489.2184496","url":null,"abstract":"Mobile-based branchless banking has become one of the key mechanisms for extending financial services to low-income populations in the world's developing regions. One shortcoming of today's branchless banking systems is that they rely largely on network-layer services for securing transactions and do not implement any application-layer security. Recent results show that several of these systems are, in fact, not end-to-end secure.\u0000 In this paper, we make the case for designing mobile-based branchless banking systems which build security into the application layer and guarantee end-to-end security to system users. We present a threat model which captures the goals of authenticated transactions in these systems and then provide recommendations for solution design based on our model's requirements.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"64 1","pages":"28-33"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83242537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
SMSAssassin: crowdsourcing driven mobile-based system for SMS spam filtering SMSAssassin:众包驱动的基于手机的SMS垃圾邮件过滤系统
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2011-03-01 DOI: 10.1145/2184489.2184491
Kuldeep Yadav, P. Kumaraguru, A. Goyal, Ashish Gupta, Vinayak Naik
{"title":"SMSAssassin: crowdsourcing driven mobile-based system for SMS spam filtering","authors":"Kuldeep Yadav, P. Kumaraguru, A. Goyal, Ashish Gupta, Vinayak Naik","doi":"10.1145/2184489.2184491","DOIUrl":"https://doi.org/10.1145/2184489.2184491","url":null,"abstract":"Due to increase in use of Short Message Service (SMS) over mobile phones in developing countries, there has been a burst of spam SMSes. Content-based machine learning approaches were effective in filtering email spams. Researchers have used topical and stylistic features of the SMS to classify spam and ham. SMS spam filtering can be largely influenced by the presence of regional words, abbreviations and idioms. We have tested the feasibility of applying Bayesian learning and Support Vector Machine(SVM) based machine learning techniques which were reported to be most effective in email spam filtering on a India centric dataset. In our ongoing research, as an exploratory step, we have developed a mobile-based system SMSAssassin that can filter SMS spam messages based on bayesian learning and sender blacklisting mechanism. Since the spam SMS keywords and patterns keep on changing, SMSAssassin uses crowd sourcing to keep itself updated. Using a dataset that we are collecting from users in the real-world, we evaluated our approaches and found some interesting results.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"84 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86206356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 108
Mobile token-based authentication on a budget 基于预算的移动令牌身份验证
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2011-03-01 DOI: 10.1145/2184489.2184494
Hristo Bojinov, D. Boneh
{"title":"Mobile token-based authentication on a budget","authors":"Hristo Bojinov, D. Boneh","doi":"10.1145/2184489.2184494","DOIUrl":"https://doi.org/10.1145/2184489.2184494","url":null,"abstract":"We propose a light-weight, cheap authentication device for unlocking a user's smartphone. The device can be carried on a key chain and automatically unlocks the smartphone whenever its owner wants to use it. Our goal is to build a device that works with existing smartphones, requires no recharging or maintenance, and is always available. We propose two approaches: one based on magnetic fields detected by the smartphone's compass and the other based on an acoustic transmitter that generates a signal picked up by the handset's microphone. We experiment with both approaches and report on their effectiveness. These devices may find applications beyond smartphones, such as unlocking laptops, cars, and homes. These designs show that contactless authentication can offer a convenient and secure alternative to PIN-based unlocking.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"46 1","pages":"14-19"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85698283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
MockDroid: trading privacy for application functionality on smartphones MockDroid:用隐私换取智能手机上的应用功能
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2011-03-01 DOI: 10.1145/2184489.2184500
A. Beresford, A. Rice, Nicholas Skehin, R. Sohan
{"title":"MockDroid: trading privacy for application functionality on smartphones","authors":"A. Beresford, A. Rice, Nicholas Skehin, R. Sohan","doi":"10.1145/2184489.2184500","DOIUrl":"https://doi.org/10.1145/2184489.2184500","url":null,"abstract":"MockDroid is a modified version of the Android operating system which allows a user to 'mock' an application's access to a resource. This resource is subsequently reported as empty or unavailable whenever the application requests access. This approach allows users to revoke access to particular resources at run-time, encouraging users to consider the trade-off between functionality and the disclosure of personal information whilst they use an application. Existing applications continue to work on MockDroid, possibly with reduced functionality, since existing applications are already written to tolerate resource failure, such as network unavailability or lack of a GPS signal. We demonstrate the practicality of our approach by successfully running a random sample of twenty-three popular applications from the Android Market.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"108 1","pages":"49-54"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79207505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 477
FollowMe: enhancing mobile applications with open infrastructure sensing FollowMe:通过开放基础设施感知增强移动应用
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2011-03-01 DOI: 10.1145/2184489.2184511
Ben Greenstein, B. Longstaff
{"title":"FollowMe: enhancing mobile applications with open infrastructure sensing","authors":"Ben Greenstein, B. Longstaff","doi":"10.1145/2184489.2184511","DOIUrl":"https://doi.org/10.1145/2184489.2184511","url":null,"abstract":"Despite context-rich smartphone applications being adopted at an unprecedented rate, few use the data produced by the numerous cameras and microphones on walls and other fixed infrastructure. We present a system design called FollowMe aimed at letting mobile applications use these sensors for richer context and better applications. We discuss the benefits of such a system and the new applications it can support. We then describe the key challenges, including establishing relationships between users and sensors that meet the privacy and security requirements of different settings (e.g., a bedroom vs. a public park) with minimal setup overhead, and improving awareness of and control over how data about a person is used by other people.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"104 1","pages":"105-110"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76028343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Sensor tricorder: what does that sensor know about me? 传感器三录仪:这个传感器知道我什么?
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2011-03-01 DOI: 10.1145/2184489.2184510
Gabriel Y. Maganis, Jaeyeon Jung, Tadayoshi Kohno, Anmol Sheth, D. Wetherall
{"title":"Sensor tricorder: what does that sensor know about me?","authors":"Gabriel Y. Maganis, Jaeyeon Jung, Tadayoshi Kohno, Anmol Sheth, D. Wetherall","doi":"10.1145/2184489.2184510","DOIUrl":"https://doi.org/10.1145/2184489.2184510","url":null,"abstract":"As rich sensing applications become pervasive, people increasingly find themselves with limited ability to determine what sensor data the applications are collecting about them and how the applications are using the sensor data. Openness and transparency serve as our guiding principles in designing the Sensor Tricorder, a system that enables people to query third party sensors with their smartphones in order to learn about the data collection activities and privacy policies of the applications using the sensors. We leverage the increasing ubiquity of QR Codes in mobile applications and utilize them in a novel way. Our prototype system uses active QR Codes to visually communicate dynamic data such as the sensor activities and application privacy policies to smartphone users. Based on our experiences in building this prototype, we identify the key properties that sensor platforms must provide to support transparency and openness and highlight the main challenges involved in realizing these properties.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"13 1","pages":"98-103"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82453118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
User controllable security and privacy for mobile mashups 移动mashup的用户可控安全性和隐私性
Proceedings. IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2011-03-01 DOI: 10.1145/2184489.2184498
Shruthi Adappa, Vikas Agarwal, Sunil Goyal, P. Kumaraguru, S. Mittal
{"title":"User controllable security and privacy for mobile mashups","authors":"Shruthi Adappa, Vikas Agarwal, Sunil Goyal, P. Kumaraguru, S. Mittal","doi":"10.1145/2184489.2184498","DOIUrl":"https://doi.org/10.1145/2184489.2184498","url":null,"abstract":"A new paradigm in the domain of mobile applications is 'mobile mashups', where Web content rendered on a mobile browser is amalgamated with data and features available on the device, such as user location, calendar information and camera. Although a number of frameworks exist that enable creation and execution of mobile mashups, they fail to address a very important issue of handling security and privacy considerations of a mobile user. In this paper, we characterize the nature of access control required for utilizing device features in a mashup setting; design a security and privacy middleware based on the well known XACML policy language; and describe how the middleware enables a user to easily control usage of device features. Implementation-wise, we realize our middleware on Android platform (but easily generalizable to other platforms), integrate it with an existing mashup framework, and demonstrate its utility through an e-commerce mobile mashup.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"25 1","pages":"35-40"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80191251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信