{"title":"Ikarus: large-scale participatory sensing at high altitudes","authors":"M. V. Kaenel, P. Sommer, Roger Wattenhofer","doi":"10.1145/2184489.2184503","DOIUrl":"https://doi.org/10.1145/2184489.2184503","url":null,"abstract":"Sensor networks proved to be a useful research tool in the field of environmental monitoring. While first sensor deployments consisted of a relatively small number of static nodes, mobile sensor devices have attracted growing interest for large-scale sensing applications in recent years. In this paper, we present Ikarus, a novel participatory sensing application having orders of magnitude more users than existing approaches. The Ikarus system exploits sensor data collected during cross-country flights by paraglider pilots to study thermal effects in the atmosphere. Based on first experiences gained from this approach, we identify three key aspects that are crucial for the success of participatory sensing applications: incentives for participation, the ability to deal with faulty data, and concise data representation.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"13 1","pages":"63-68"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77265065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Why are web browsers slow on smartphones?","authors":"Zhen Wang, F. Lin, Lin Zhong, M. Chishtie","doi":"10.1145/2184489.2184508","DOIUrl":"https://doi.org/10.1145/2184489.2184508","url":null,"abstract":"We report the first work that examines the internals of web browsers on smartphones, using the WebKit codebase, two generations of Android smartphones, and webpages visited by 25 smart-phone users over three months. We make many surprising findings. First, over half of the webpages visited by smartphone users are not optimized for mobile devices. This highlights the importance of client-based optimization and the limitation of prior work that only studies mobile webpages. Second, while prior work suggests that several compute-intensive operations should be the focus of optimization, our measurement and analysis show that their improvement will only lead to marginal performance gain with existing webpages. Furthermore, we find that resource loading, ignored by all except one prior work, contributes most to the browser delay. While our results agree with a recent network study showing that network round-trip time is a major problem, we further demonstrate how the internals of the browser and operating system contribute to the browser delay and therefore reveal new opportunities for optimization.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"5 1","pages":"91-96"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76315616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stephen Smaldone, Chetan Tonde, Vancheswaran K. Ananthanarayanan, A. Elgammal, L. Iftode
{"title":"The cyber-physical bike: a step towards safer green transportation","authors":"Stephen Smaldone, Chetan Tonde, Vancheswaran K. Ananthanarayanan, A. Elgammal, L. Iftode","doi":"10.1145/2184489.2184502","DOIUrl":"https://doi.org/10.1145/2184489.2184502","url":null,"abstract":"To improve road cycling safety, we present an approach that augments bicycles with video processing and computational capabilities. This Cyber-Physical bicycle system continuously monitors the environment behind the biker, automatically detects rear-approaching vehicles, and alerts the biker prior to the approach. In this paper, we (i) identify biker safety as a problem that can be addressed using mobile video sensing and processing, (ii) present the design of a Cyber-Physical bicycle system, which applies video processing techniques to perform automated vehicle detection, and (iii) demonstrate the feasibility of this system through the evaluation of our prototype implementation. Early results show that our approach operates with good accuracy at normal frame rates, and can perform detection in real time with reduced frame rates.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"10 1","pages":"56-61"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87708673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Undistracted driving: a mobile phone that doesn't distract","authors":"J. Lindqvist, Jason I. Hong","doi":"10.1145/2184489.2184504","DOIUrl":"https://doi.org/10.1145/2184489.2184504","url":null,"abstract":"Distracted driving is a major problem that leads to unnecessary accidents and human casualties everywhere in the world. The ubiquity of mobile phones is one cause of distracted driving. In United States alone, operating mobile phones while driving has been cited as a factor in crashes that have led to 995 deaths and 24,000 injuries in 2009. To mitigate the problem of distracted driving caused by mobile phones, we propose using context-awareness to implement burden-shifting, time-shifting, and activity-based sharing. Although the first two concepts have been introduced before in the research literature and the latter two are novel, none of these concepts have yet been explored in the context of mobile phones and driving. We present our initial interaction designs for these concepts on the Android platform.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"4 1","pages":"70-75"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90098503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xuan Bao, Trevor Narayan, A. A. Sani, Wolfgang Richter, Romit Roy Choudhury, Lin Zhong, M. Satyanarayanan
{"title":"The case for context-aware compression","authors":"Xuan Bao, Trevor Narayan, A. A. Sani, Wolfgang Richter, Romit Roy Choudhury, Lin Zhong, M. Satyanarayanan","doi":"10.1145/2184489.2184506","DOIUrl":"https://doi.org/10.1145/2184489.2184506","url":null,"abstract":"The proliferation of pictures and videos in the Internet is imposing heavy demands on mobile data networks. This demand is expected to grow rapidly and a one-fit-all solution is unforeseeable. While researchers are approaching the problem from different directions, we identify a human-centric opportunity to reduce content size. Our intuition is that humans exhibit unequal interest towards different parts of a content, and parts that are less important may be traded off for price/performance benefits. For instance, a picture with the Statue of Liberty against a blue sky may be partitioned into two categories -- the semantically important statue, and the less important blue sky. When the need to minimize bandwidth/energy is acute, only the picture of the statue may be downloaded, along with a meta tag \"background: blue sky\". Once downloaded, an arbitrary \"blue sky\" may be suitably inserted behind the statue, reconstructing an approximation of the original picture. As long as the essence of the picture is retained from the human's perspective, such an approximation may be acceptable. This paper attempts to explore the scope and usefulness of this idea, and develop a broader research theme that we call context-aware compression.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"15 1","pages":"77-82"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72704892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christo Wilson, T. Steinbauer, G. Wang, A. Sala, Haitao Zheng, Ben Y. Zhao
{"title":"Privacy, availability and economics in the Polaris mobile social network","authors":"Christo Wilson, T. Steinbauer, G. Wang, A. Sala, Haitao Zheng, Ben Y. Zhao","doi":"10.1145/2184489.2184499","DOIUrl":"https://doi.org/10.1145/2184489.2184499","url":null,"abstract":"While highly successful, today's online social networks (OSNs) have made a conscious decision to sacrifice privacy for availability and centralized control. Unfortunately, tradeoffs in this \"walled garden\" architecture naturally pit the economic interests of OSN providers against the privacy goals of OSN users, a battle that users cannot win. While some alternative OSN designs preserve user control over data, they do so by de-prioritizing issues of economic incentives and sustainability. In contrast, we believe any practical alternative to today's centralized architecture must consider incentives for providers as a key goal. In this paper, we propose a distributed OSN architecture that significantly improves user privacy while preserving economic incentives for OSN providers. We do so by using a standardized API to create a competitive provider marketplace for different components of the OSN, thus allowing users to perform their own tradeoffs between cost, performance, and privacy. We describe Polaris, a system where users leverage smartphones as a highly available identity provider and access control manager, and use application prototypes to show how it allows data monetization while limiting the visibility of any single party to users' private data.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"26 1","pages":"42-47"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87768696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trusted language runtime (TLR): enabling trusted applications on smartphones","authors":"Nuno Santos, Himanshu Raj, S. Saroiu, A. Wolman","doi":"10.1145/2184489.2184495","DOIUrl":"https://doi.org/10.1145/2184489.2184495","url":null,"abstract":"Despite their popularity, today's smartphones do not yet offer environments for building and running trusted applications. At the same time, current systems designed for traditional desktop or server machines to enable trusted applications are either too heavyweight for smartphones or too difficult to program. This paper presents the Trusted Language Runtime (TLR), a system for developing and running trusted applications on a smartphone. The TLR is lightweight because 1) it makes use of ARM TrustZone, hardware support that offers rich trusted computing primitives, and 2) it leverages the .NET MicroFramework, a language runtime for embedded and resource-constrained devices. The TLR is easy to program because .NET offers the productivity benefits of modern high-level languages, such as strong typing and garbage collection, to application developers.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"73 1","pages":"21-26"},"PeriodicalIF":0.0,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84316987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"When mobile is harder than fixed (and vice versa): demystifying security challenges in mobile environments","authors":"Jon Oberheide, F. Jahanian","doi":"10.1145/1734583.1734595","DOIUrl":"https://doi.org/10.1145/1734583.1734595","url":null,"abstract":"Sophisticated consumer mobile devices continue to approach the capabilities and extensibility of traditional computing environments. Unfortunately, these new capabilities and applications make mobile devices an enticing target for attackers and malicious software. Due to such threats, the domain of mobile security has been getting a considerable amount of attention. However, current approaches have failed to consider key differences and their practical impact on the security of modern platforms when adopting techniques from non-mobile (or \"fixed\") environments. To help demystify mobile security and guide future research, we examine the unique challenges of mobile environments ranging from hardware to software to usability, delve in the diverse security models of current mobile platforms, and present our five commandments of mobile security research.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"26 1","pages":"43-48"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89221721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring urban characteristics using movement history of mass mobile microbloggers","authors":"Tatsuya Fujisaka, Ryong Lee, K. Sumiya","doi":"10.1145/1734583.1734588","DOIUrl":"https://doi.org/10.1145/1734583.1734588","url":null,"abstract":"The explosive growth of the smartphones market and social network sites such as the Twitter has enabled to share numerous short messages reflecting our daily lives and social events from outside their homes or offices. Compared to conventional blogging sites, micro-blogging sites through mobile network enable us to easily write and share their daily logs without any spatial or temporal restrictions. Such mass geo-tagged and time-stamped micro-blogs can inform us about social patterns, regardless of their scale, time, or significance. We investigate characteristic patterns in urban areas such as populated areas from the movement histories of mass mobile micro-bloggers. In particular, some interesting movement patterns can be frequently observed in urban areas using our two measures such as aggregation and dispersion. We also present experimental results in determining urban characteristics from actual micro-blog dataset from the Twitter.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"124 2 1","pages":"13-18"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91056735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aaron Beach, Mike Gartrell, Xinyu Xing, Richard O. Han, Q. Lv, Shivakant Mishra, K. Seada
{"title":"Fusing mobile, sensor, and social data to fully enable context-aware computing","authors":"Aaron Beach, Mike Gartrell, Xinyu Xing, Richard O. Han, Q. Lv, Shivakant Mishra, K. Seada","doi":"10.1145/1734583.1734599","DOIUrl":"https://doi.org/10.1145/1734583.1734599","url":null,"abstract":"In this paper, we identify mobile social networks as an important new direction of research in mobile computing, and show how an expanded definition of mobile social networks that includes sensor networks can enable exciting new context-aware applications, such as context-aware video screens, music jukeboxes, and mobile health applications. We offer SocialFusion as a system capable of systematically integrating such diverse mobile, social, and sensing input streams and effectuating the appropriate context-aware output action. We explain some of the major challenges that SocialFusion must overcome. We describe some preliminary results that we have obtained in implementing the SocialFusion vision.","PeriodicalId":88972,"journal":{"name":"Proceedings. IEEE Workshop on Mobile Computing Systems and Applications","volume":"5 1","pages":"60-65"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85683237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}