Contact The DL Team Contact Us | Switch to tabbed view

top of pageABSTRACT

We study the problem of how to recognize a new human activity when we have never seen any training example of that activity before. Recognizing human activities is an essential element for user-centric and context-aware applications. Previous studies showed promising results using various machine learning algorithms. However, most existing methods can only recognize the activities that were previously seen in the training data. A previously unseen activity class cannot be recognized if there were no training samples in the dataset. Even if all of the activities can be enumerated in advance, labeled samples are often time consuming and expensive to get, as they require huge effort from human annotators or experts. In this paper, we present NuActiv, an activity recognition system that can recognize a human activity even when there are no training data for that activity class. Firstly, we designed a new representation of activities using semantic attributes, where each attribute is a human readable term that describes a basic element or an inherent characteristic of an activity. Secondly, based on this representation, a two-layer zero-shot learning algorithm is developed for activity recognition. Finally, to reinforce recognition accuracy using minimal user feedback, we developed an active learning algorithm for activity recognition. Our approach is evaluated on two datasets, including a 10-exercise-activity dataset we collected, and a public dataset of 34 daily life activities. Experimental results show that using semantic attribute-based learning, NuActiv can generalize knowledge to recognize unseen new activities. Our approach achieved up to 79% accuracy in unseen activity recognition.

Advertisements



top of pageAUTHORS



Author image not provided  Heng-Tze Cheng

No contact information provided yet.

Bibliometrics: publication history
Publication years2013-2013
Publication count3
Citation Count8
Available for download2
Downloads (6 Weeks)17
Downloads (12 Months)198
Downloads (cumulative)1,097
Average downloads per article548.50
Average citations per article2.67
View colleagues of Heng-Tze Cheng


Author image not provided  Feng-Tso Sun

No contact information provided yet.

Bibliometrics: publication history
Publication years2010-2013
Publication count2
Citation Count5
Available for download2
Downloads (6 Weeks)4
Downloads (12 Months)73
Downloads (cumulative)590
Average downloads per article295.00
Average citations per article2.50
View colleagues of Feng-Tso Sun


Author image not provided  Martin Griss

No contact information provided yet.

Bibliometrics: publication history
Publication years1974-2013
Publication count73
Citation Count704
Available for download39
Downloads (6 Weeks)25
Downloads (12 Months)354
Downloads (cumulative)12,279
Average downloads per article314.85
Average citations per article9.64
View colleagues of Martin Griss


Author image not provided  Paul Davis

No contact information provided yet.

Bibliometrics: publication history
Publication years2013-2013
Publication count2
Citation Count8
Available for download2
Downloads (6 Weeks)17
Downloads (12 Months)198
Downloads (cumulative)1,097
Average downloads per article548.50
Average citations per article4.00
View colleagues of Paul Davis


Author image not provided  Jianguo Li

No contact information provided yet.

Bibliometrics: publication history
Publication years2013-2013
Publication count2
Citation Count8
Available for download2
Downloads (6 Weeks)17
Downloads (12 Months)198
Downloads (cumulative)1,097
Average downloads per article548.50
Average citations per article4.00
View colleagues of Jianguo Li


Author image not provided  Di You

No contact information provided yet.

Bibliometrics: publication history
Publication years2011-2013
Publication count3
Citation Count21
Available for download2
Downloads (6 Weeks)17
Downloads (12 Months)198
Downloads (cumulative)1,097
Average downloads per article548.50
Average citations per article7.00
View colleagues of Di You

top of pageREFERENCES

Note: OCR errors may be found in this Reference List extracted from the full text article. ACM has opted to expose the complete List rather than only correct and linked references.

1
 
2
L. Bao and S. S. Intille. Activity recognition from user-annotated acceleration data. In Proceedings of The International Conference on Pervasive Computing, pages 1--17. Springer, 2004.
3
 
4
 
5
U. Blanke and B. Schiele. Remember and transfer what you have learned - recognizing composite activities based on activity spotting. In International Symposium on Wearable Computers (ISWC), pages 1--8, Oct. 2010.
6
 
7
 
8
Google Inc. Google Glass, Apr. 2013. http://www.google.com/glass/.
9
10
 
11
S. Kang, Y. Lee, C. Min, Y. Ju, T. Park, J. Lee, Y. Rhee, and J. Song. Orchestrator: An active resource orchestration framework for mobile context monitoring in sensor-rich mobile environments. In International Conference on Pervasive Computing and Communications (PerCom), pages 135--144, 2010.
 
12
 
13
C. H. Lampert, H. Nickisch, and S. Harmeling. Learning to detect unseen object classes by between-class attribute transfer. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 951--958, 2009.
 
14
 
15
 
16
 
17
R. Liu, T. Chen, and L. Huang. Research on human activity recognition based on active learning. In International Conference on Machine Learning and Cybernetics (ICMLC), volume 1, pages 285--290, 2010.
 
18
 
19
B. Longstaff, S. Reddy, and D. Estrin. Improving activity classification for health applications on mobile devices using active and semi-supervised learning. In International Conference on Pervasive Computing Technologies for Healthcare, PervasiveHealth'10, pages 1--7, 2010.
20
21
 
22
M. Mahdaviani and T. Choudhury. Fast and scalable training of semi-supervised CRFs with application to activity recognition. In J. C. Platt, D. Koller, Y. Singer, and S. Roweis, editors, Advances in Neural Information Processing Systems, pages 977--984. MIT Press, Cambridge, MA, 2007.
 
23
24
25
 
26
D. Minnen, T. Starner, I. Essa, and C. Isbell. Discovering characteristic actions from on-body sensor data. In In Proc. International Symposium On Wearable Computing, pages 11--18, 2006.
 
27
Motorola Mobility. MotoACTV, Apr. 2013. https://motoactv.com/.
 
28
29
 
30
M. Palatucci, D. Pomerleau, G. E. Hinton, and T. M. Mitchell. Zero-shot learning with semantic output codes. In Proceedings of the Neural Information Processing Systems (NIPS), pages 1410--1418, 2009.
 
31
 
32
 
33
 
34
 
35
B. Settles. Active Learning. Morgan & Claypool, 2012.
 
36
 
37
 
38
U.S. Bureau of Labor Statistics. American time use survey activity lexicon. American Time Use Survey, 2011.
 
39
40
41

top of pageCITED BY

top of pageINDEX TERMS

The ACM Computing Classification System (CCS rev.2012)

Note: Larger/Darker text within each node indicates a higher relevance of the materials to the taxonomic classification.

top of pagePUBLICATION

Title MobiSys '13 Proceeding of the 11th annual international conference on Mobile systems, applications, and services table of contents
General Chairs Hao-Hua Chu National Taiwan University
Polly Huang National Taiwan University
Program Chairs Romit Roy Choudhury Duke University
Feng Zhao Microsoft Research
Pages 361-374
Publication Date2013-06-26 (yyyy-mm-dd)
Sponsors SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing
In-Cooperations SIGOPS ACM Special Interest Group on Operating Systems
PublisherACM New York, NY, USA ©2013
ISBN: 978-1-4503-1672-9 Order Number: 104138 doi>10.1145/2462456.2464438
Conference MobiSysMobile Systems, Applications, and Services MobiSys logo
Paper Acceptance Rate 33 of 211 submissions, 16%
Overall Acceptance Rate 354 of 2,138 submissions, 17%
Year Submitted Accepted Rate
MobiSys '03 153 23 15%
MobiSys '04 162 22 14%
MobiSys '05 83 20 24%
MobiSys '06 123 19 15%
MobiSys '07 105 22 21%
MobiSys '08 123 22 18%
MobiSys '09 128 26 20%
MobiSys '10 126 25 20%
MobiSys '11 141 25 18%
MobiSys '12 182 32 18%
MobiSys '13 211 33 16%
MobiSys '14 185 25 14%
MobiSys '15 219 29 13%
MobiSys '16 197 31 16%
Overall 2,138 354 17%

APPEARS IN
Hardware Design
Applications
Networking

top of pageREVIEWS


Reviews are not available for this item
Computing Reviews logo

top of pageCOMMENTS

Be the first to comment To Post a comment please sign in or create a free Web account

top of pageTable of Contents

Proceeding of the 11th annual international conference on Mobile systems, applications, and services
Table of Contents
SESSION: Vehicular systems and apps
AMC: verifying user interface properties for vehicular applications
Kyungmin Lee, Jason Flinn, T.J. Giuli, Brian Noble, Christopher Peplin
Pages: 1-12
doi>10.1145/2462456.2464459
Full text: PDFPDF

Vehicular environments require continuous awareness of the road ahead. It is critical that mobile applications used in such environments (e.g., GPS route planners and location-based search) do not distract drivers from the primary task of operating the ...
expand
CarSafe app: alerting drowsy and distracted drivers using dual cameras on smartphones
Chuang-Wen You, Nicholas D. Lane, Fanglin Chen, Rui Wang, Zhenyu Chen, Thomas J. Bao, Martha Montes-de-Oca, Yuting Cheng, Mu Lin, Lorenzo Torresani, Andrew T. Campbell
Pages: 13-26
doi>10.1145/2462456.2465428
Full text: PDFPDF

We present CarSafe, a new driver safety app for Android phones that detects and alerts drivers to dangerous driving conditions and behavior. It uses computer vision and machine learning algorithms on the phone to monitor and detect whether the driver ...
expand
CrowdAtlas: self-updating maps for cloud and personal use
Yin Wang, Xuemei Liu, Hong Wei, George Forman, Chao Chen, Yanmin Zhu
Pages: 27-40
doi>10.1145/2462456.2464441
Full text: PDFPDF

The inaccuracy of manually created digital road maps is a persistent problem, despite their high economic value. We present CrowdAtlas, which automates map update based on people's travels, either individually or crowdsourced. Its mobile navigation app ...
expand
Sensing vehicle dynamics for determining driver phone use
Yan Wang, Jie Yang, Hongbo Liu, Yingying Chen, Marco Gruteser, Richard P. Martin
Pages: 41-54
doi>10.1145/2462456.2464447
Full text: PDFPDF

This paper utilizes smartphone sensing of vehicle dynamics to determine driver phone use, which can facilitate many traffic safety applications. Our system uses embedded sensors in smartphones, i.e., accelerometers and gyroscopes, to capture differences ...
expand
SESSION: Energy, privacy and security
Optimizing background email sync on smartphones
Fengyuan Xu, Yunxin Liu, Thomas Moscibroda, Ranveer Chandra, Long Jin, Yongguang Zhang, Qun Li
Pages: 55-68
doi>10.1145/2462456.2464444
Full text: PDFPDF

Email is a key application used on smartphones. Even when the phone is in stand-by mode, users expect the phone to continue syncing with an email server to receive new mes-sages. Each such sync operation wakes up the smartphone for data reception and ...
expand
Energy characterization and optimization of image sensing toward continuous mobile vision
Robert LiKamWa, Bodhi Priyantha, Matthai Philipose, Lin Zhong, Paramvir Bahl
Pages: 69-82
doi>10.1145/2462456.2464448
Full text: PDFPDF

A major hurdle to frequently performing mobile computer vision tasks is the high power consumption of image sensing. In this work, we report the first publicly known experimental and analytical characterization of CMOS image sensors. We find that modern ...
expand
Leveraging graphical models to improve accuracy and reduce privacy risks of mobile sensing
Abhinav Parate, Meng-Chieh Chiu, Deepak Ganesan, Benjamin M. Marlin
Pages: 83-96
doi>10.1145/2462456.2464457
Full text: PDFPDF

The proliferation of sensors on mobile phones and wearables has led to a plethora of context classifiers designed to sense the individual's context. We argue that a key missing piece in mobile inference is a layer that fuses the outputs of several classifiers ...
expand
ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing
Yuvraj Agarwal, Malcolm Hall
Pages: 97-110
doi>10.1145/2462456.2464460
Full text: PDFPDF

In this paper we present the design and implementation of ProtectMyPrivacy (PMP), a system for iOS devices to detect access to private data and protect users by substituting anonymized data in its place if users decide. We developed a novel crowdsourced ...
expand
SESSION: Advertisements and search
SmartAds: bringing contextual ads to mobile apps
Suman Nath, Felix Xiaozhu Lin, Lenin Ravindranath, Jitendra Padhye
Pages: 111-124
doi>10.1145/2462456.2464452
Full text: PDFPDF

A recent study showed that while US consumers spent 30% more time on mobile apps than on traditional web, advertisers spent 1600% less money on mobile ads. One key reason is that unlike most web ad providers, today's mobile ads are not contextual---they ...
expand
CAMEO: a middleware for mobile advertisement delivery
Azeem J. Khan, Kasthuri Jayarajah, Dongsu Han, Archan Misra, Rajesh Balan, Srinivasan Seshan
Pages: 125-138
doi>10.1145/2462456.2464436
Full text: PDFPDF

Advertisements are the de-facto currency of the Internet with many popular applications (e.g. Angry Birds) and online services (e.g., YouTube) relying on advertisement generated revenue. However, the current economic models and mechanisms for mobile ...
expand
Scalable crowd-sourcing of video from mobile devices
Pieter Simoens, Yu Xiao, Padmanabhan Pillai, Zhuo Chen, Kiryong Ha, Mahadev Satyanarayanan
Pages: 139-152
doi>10.1145/2462456.2464440
Full text: PDFPDF

We propose a scalable Internet system for continuous collection of crowd-sourced video from devices such as Google Glass. Our hybrid cloud architecture, GigaSight, is effectively a Content Delivery Network (CDN) in reverse. It achieves scalability by ...
expand
SESSION: OS, software, and virtualization
Just-in-time provisioning for cyber foraging
Kiryong Ha, Padmanabhan Pillai, Wolfgang Richter, Yoshihisa Abe, Mahadev Satyanarayanan
Pages: 153-166
doi>10.1145/2462456.2464451
Full text: PDFPDF

Cloud offload is an important technique in mobile computing. VM-based cloudlets have been proposed as offload sites for the resource-intensive and latency-sensitive computations typically associated with mobile multimedia applications. Since cloud offload ...
expand
SIF: a selective instrumentation framework for mobile applications
Shuai Hao, Ding Li, William G.J. Halfond, Ramesh Govindan
Pages: 167-180
doi>10.1145/2462456.2465430
Full text: PDFPDF

Mobile app ecosystems have experienced tremendous growth in the last five years. As researchers and developers turn their attention to understanding the ecosystem and its different apps, instrumentation of mobile apps is a much needed emerging capability. ...
expand
RetroSkeleton: retrofitting android apps
Benjamin Davis, Hao Chen
Pages: 181-192
doi>10.1145/2462456.2464462
Full text: PDFPDF

An obvious asset of the Android platform is the tremendous number and variety of available apps. There is a less obvious, but potentially even more important, benefit to the fact that nearly all apps are developed using a common platform. We can leverage ...
expand
SmartSynth: synthesizing smartphone automation scripts from natural language
Vu Le, Sumit Gulwani, Zhendong Su
Pages: 193-206
doi>10.1145/2462456.2464443
Full text: PDFPDF

This paper presents SmartSynth, a novel end-to-end programming system for synthesizing smartphone automation scripts from natural language descriptions. Our approach is unique in two key aspects. First, it involves a carefully designed domain-specific ...
expand
SESSION: Location, indoors and outdoors
FM-based indoor localization via automatic fingerprint DB construction and matching
Sungro Yoon, Kyunghan Lee, Injong Rhee
Pages: 207-220
doi>10.1145/2462456.2464445
Full text: PDFPDF

We present ACMI, an FM-based indoor localization that does not require proactive site profiling. ACMI constructs the fingerprint database based on the pure estimation of indoor RSS distribution, where the signals transmitted from commercial FM radio ...
expand
High-accuracy differential tracking of low-cost GPS receivers
Will Hedgecock, Miklos Maroti, Janos Sallai, Peter Volgyesi, Akos Ledeczi
Pages: 221-234
doi>10.1145/2462456.2464456
Full text: PDFPDF

In many mobile wireless applications such as the automated driving of cars, formation flying of unmanned air vehicles, and source localization or target tracking with wireless sensor networks, it is more important to know the precise relative locations ...
expand
Guoguo: enabling fine-grained indoor localization via smartphone
Kaikai Liu, Xinxin Liu, Xiaolin Li
Pages: 235-248
doi>10.1145/2462456.2464450
Full text: PDFPDF

Using smartphones for accurate indoor localization opens a new frontier of mobile services, offering enormous opportunities to enhance users' experiences in indoor environments. Despite significant efforts on indoor localization in both academia and ...
expand
Avoiding multipath to revive inbuilding WiFi localization
Souvik Sen, Jeongkeun Lee, Kyu-Han Kim, Paul Congdon
Pages: 249-262
doi>10.1145/2462456.2464463
Full text: PDFPDF

Despite of several years of innovative research, indoor localization is still not mainstream. Existing techniques either employ cumbersome fingerprinting, or rely upon the deployment of additional infrastructure. Towards a solution that is easier to ...
expand
SESSION: Interface design
Spartacus: spatially-aware interaction for mobile devices through energy-efficient audio sensing
Zheng Sun, Aveek Purohit, Raja Bose, Pei Zhang
Pages: 263-276
doi>10.1145/2462456.2464437
Full text: PDFPDF

Recent developments in ubiquitous computing enable applications that leverage personal mobile devices, such as smartphones, as a means to interact with other devices in their close proximity. In this paper, we propose Spartacus, a mobile system that ...
expand
ViRi: view it right
Pan Hu, Guobin Shen, Liqun Li, Donghuan Lu
Pages: 277-290
doi>10.1145/2462456.2464454
Full text: PDFPDF

We present ViRi -- an intriguing system that enables a user to enjoy a frontal view experience even when the user is actually at a slanted viewing angle. ViRi tries to restore the front-view effect by enhancing the normal content rendering process with ...
expand
ScreenPass: secure password entry on touchscreen devices
Dongtao Liu, Eduardo Cuervo, Valentin Pistol, Ryan Scudellari, Landon P. Cox
Pages: 291-304
doi>10.1145/2462456.2465425
Full text: PDFPDF

Users routinely access cloud services through third-party apps on smartphones by giving apps login credentials (i.e., a username and password). Unfortunately, users have no assurance that their apps will properly handle this sensitive information. In ...
expand
SESSION: Cellular and WiFi
Accounting for roaming users on mobile data access: issues and root causes
Guan-Hua Tu, Chunyi Peng, Chi-Yu Li, Xingyu Ma, Hongyi Wang, Tao Wang, Songwu Lu
Pages: 305-318
doi>10.1145/2462456.2464439
Full text: PDFPDF

In this paper, we study how mobility affects mobile data accounting, which records the usage volume for each roaming user. We find out that, current 2G/3G/4G systems have well-tested mobility support solutions and generally work well. However, under ...
expand
Comparison of caching strategies in modern cellular backhaul networks
Shinae Woo, Eunyoung Jeong, Shinjo Park, Jongmin Lee, Sunghwan Ihm, KyoungSoo Park
Pages: 319-332
doi>10.1145/2462456.2464442
Full text: PDFPDF

Recent popularity of smartphones drives rapid growth in the demand for cellular network bandwidth. Unfortunately, due to the centralized architecture of cellular networks, increasing the physical backhaul bandwidth is challenging. While content ...
expand
LEAD: leveraging protocol signatures for improving wireless link performance
Jun Huang, Yu Wang, Guoliang Xing
Pages: 333-346
doi>10.1145/2462456.2465429
Full text: PDFPDF

Error correction is a fundamental problem in wireless system design as wireless links often suffer high bit error rate due to the effects of signal attenuation, multipath fading and interference. This paper presents a new cross-layer solution called ...
expand
PROTEUS: network performance forecast for real-time, interactive mobile applications
Qiang Xu, Sanjeev Mehrotra, Zhuoqing Mao, Jin Li
Pages: 347-360
doi>10.1145/2462456.2464453
Full text: PDFPDF

Real-time communication (RTC) applications such as VoIP, video conferencing, and online gaming are flourishing. To adapt and deliver good performance, these applications require accurate estimations of short-term network performance metrics, e.g., loss ...
expand
SESSION: Behavior and activity recognition
NuActiv: recognizing unseen new activities using semantic attribute-based learning
Heng-Tze Cheng, Feng-Tso Sun, Martin Griss, Paul Davis, Jianguo Li, Di You
Pages: 361-374
doi>10.1145/2462456.2464438
Full text: PDFPDF

We study the problem of how to recognize a new human activity when we have never seen any training example of that activity before. Recognizing human activities is an essential element for user-centric and context-aware applications. Previous studies ...
expand
SocioPhone: everyday face-to-face interaction monitoring platform using multi-phone sensor fusion
Youngki Lee, Chulhong Min, Chanyou Hwang, Jaeung Lee, Inseok Hwang, Younghyun Ju, Chungkuk Yoo, Miri Moon, Uichin Lee, Junehwa Song
Pages: 375-388
doi>10.1145/2462456.2465426
Full text: PDFPDF

In this paper, we propose SocioPhone, a novel initiative to build a mobile platform for face-to-face interaction monitoring. Face-to-face interaction, especially conversation, is a fundamental part of everyday life. Interaction-aware applications aimed ...
expand
MoodScope: building a mood sensor from smartphone usage patterns
Robert LiKamWa, Yunxin Liu, Nicholas D. Lane, Lin Zhong
Pages: 389-402
doi>10.1145/2462456.2464449
Full text: PDFPDF

We report a first-of-its-kind smartphone software system, MoodScope, which infers the mood of its user based on how the smartphone is used. Compared to smartphone sensors that measure acceleration, light, and other physical properties, MoodScope is a ...
expand
Auditeur: a mobile-cloud service platform for acoustic event detection on smartphones
Shahriar Nirjon, Robert F. Dickerson, Philip Asare, Qiang Li, Dezhi Hong, John A. Stankovic, Pan Hu, Guobin Shen, Xiaofan Jiang
Pages: 403-416
doi>10.1145/2462456.2464446
Full text: PDFPDF

Auditeur is a general-purpose, energy-efficient, and context-aware acoustic event detection platform for smartphones. It enables app developers to have their app register for and get notified on a wide variety of acoustic events. Auditeur is backed by ...
expand
SESSION: Assorted topics
Kwiizya: local cellular network services in remote areas
Mariya Zheleva, Arghyadip Paul, David L. Johnson, Elizabeth Belding
Pages: 417-430
doi>10.1145/2462456.2464458
Full text: PDFPDF

Cellular networks have revolutionized the way people communicate in rural areas. At the same time, deployment of commercial-grade cellular networks in areas with low population density, such as in rural sub-Saharan Africa, is prohibitively expensive ...
expand
AdRob: examining the landscape and impact of android application plagiarism
Clint Gibler, Ryan Stevens, Jonathan Crussell, Hao Chen, Hui Zang, Heesook Choi
Pages: 431-444
doi>10.1145/2462456.2464461
Full text: PDFPDF

Malicious activities involving Android applications are rising rapidly. As prior work on cyber-crimes suggests, we need to understand the economic incentives of the criminals to design the most effective defenses. In this paper, we investigate application ...
expand
EnGarde: protecting the mobile phone from malicious NFC interactions
Jeremy J. Gummeson, Bodhi Priyantha, Deepak Ganesan, Derek Thrasher, Pengyu Zhang
Pages: 445-458
doi>10.1145/2462456.2464455
Full text: PDFPDF

Near Field Communication (NFC) on mobile phones presents new opportunities and threats. While NFC is radically changing how we pay for merchandise, it opens a pandora's box of ways in which it may be misused by unscrupulous individuals. This could include ...
expand
SESSION: Videos
AdRob: examining the landscape and impact of android application plagiarism
Clint Gibler, Ryan Stevens, Jonathan Crussell, Hao Chen, Hui Zang, Heesook Choi
Pages: 459-460
doi>10.1145/2462456.2466709
Full text: PDFPDF

Malicious activities involving Android applications are rising rapidly. As prior work on cyber-crimes suggests, we need to understand the economic incentives of the criminals to design the most effective defenses. In this paper, we investigate application ...
expand
CarSafe app: alerting drowsy and distracted drivers using dual cameras on smartphones
Chuang-Wen You, Nicholas D. Lane, Fanglin Chen, Rui Wang, Zhenyu Chen, Thomas J. Bao, Martha Montes-de-Oca, Yuting Cheng, Mu Lin, Lorenzo Torresani, Andrew T. Campbell
Pages: 461-462
doi>10.1145/2462456.2466711
Full text: PDFPDF

We present CarSafe, the first driver safety application that uses dual cameras on smartphones to detect and alert drivers to dangerous driving conditions. CarSafe fuses events detected from cameras and readings from embedded sensors on the phone -- such ...
expand
Keyword programming for TouchDevelop
Vu Le, Jonathan de Halleux, Sumit Gulwani, Zhendong Su
Pages: 463-464
doi>10.1145/2462456.2465729
Full text: PDFPDF

This video demo features a new keyword programming environment for TouchDevelop, a popular touch-centric system for scripting mobile devices. The new environment allows users to simply enter a set of keywords, and its internal program synthesis engine ...
expand
MoodScope: building a mood sensor from smartphone usage patterns
Robert LiKamWa, Yunxin Liu, Nicholas D. Lane, Lin Zhong
Pages: 465-466
doi>10.1145/2462456.2483967
Full text: PDFPDF

We present MoodScope, a software system which infers the mood of its user based on how the smartphone is used. Similar to smartphone sensors that measure acceleration, light, and other physical properties, MoodScope is a "sensor" that measures the mental ...
expand
Energy proportional image sensors for continuous mobile vision
Robert LiKamWa, Bodhi Priyantha, Matthai Philipose, Lin Zhong, Paramvir Bahl
Pages: 467-468
doi>10.1145/2462456.2483968
Full text: PDFPDF

A hurdle to frequently performing mobile computer vision tasks is the high energy cost of image sensing. In particular, modern image sensors are not energy proportional; for low resolution and low frame rate capture, the image sensor consumes almost ...
expand
CrowdAtlas: self-updating maps for cloud and personal use
Yin Wang, Xuemei Liu, Hong Wei, George Forman, Yanmin Zhu
Pages: 469-470
doi>10.1145/2462456.2465730
Full text: PDFPDF

Digital road maps have become essential to many aspects of our lives. Unfortunately, they have persistent quality issues, both in developing countries as well as in developed countries, evidenced by the recent Apple-Google map war. A survey of British ...
expand
Video streaming using whitespace spectrum for vehicular applications
Tan Zhang, Sayandeep Sen, Suman Banerjee
Pages: 471-472
doi>10.1145/2462456.2465731
Full text: PDFPDF

We present Scout, a communication system leveraging TV whitespaces to support robust and high-speed streaming services. Scout uses two key techniques to improve video performance. First, it extends network coverage through an asymmetric network architecture ...
expand
Sensing device co-location through patterns of silence
Wai-Tian Tan, Mary Baker, Bowon Lee, Ramin Samadani
Pages: 473-474
doi>10.1145/2462456.2465732
Full text: PDFPDF

This document describes the technology behind the accompanying video, which gives a demonstration of determining the dynamic group membership of a meeting by matching patterns of relative audio silence, or "silence signatures," sensed by mobile devices.
expand
RegTrack: a differential relative gps tracking solution
Will Hedgecock, Miklos Maroti, Janos Sallai, Peter Volgyesi, Akos Ledeczi
Pages: 475-476
doi>10.1145/2462456.2465733
Full text: PDFPDF

In many mobile wireless applications such as the automated driving of cars, formation flying of unmanned air vehicles, and source localization or target tracking with wireless sensor networks, it is more important to know the precise relative locations ...
expand
Pointer wizard: a remote interaction user interface
Jenq-Shiou Leu, Kuan-Wu Su, Tien-Yu Chu, Chen-Hsin Hsieh, Yu-Shan Athena Chen, Jui-Ping Ma
Pages: 477-478
doi>10.1145/2462456.2465734
Full text: PDFPDF

In this video demonstration, we present a remote interaction user interface prototype -- Pointer Wizard, to provide mixed reality experience with intuitive interaction afar. By identifying finger gestures and voice commands, it allows users to interact ...
expand
Kwiizya: local cellular network services in remote areas
Mariya Zheleva, Abigail Hinsman, Lisa Parks, Elizabeth Belding
Pages: 479-480
doi>10.1145/2462456.2465736
Full text: PDFPDF

Cellular networks have revolutionized the way people communicate in rural areas. At the same time, deployment of commercial-grade cellular networks in areas with low population density, such as in rural sub-Saharan Africa, is prohibitively expensive ...
expand
Multi-screen social TV over cloud-centric media platform
Xiang Li, Tian Xie, Yonggang Wen
Pages: 481-482
doi>10.1145/2462456.2465737
Full text: PDFPDF

Multi-screen social TV is an innovative application for transforming the traditional "laid-back" video watching behavior with the emerging "lean-forward" social network experience. In this video, we demonstrate a set of use cases in which the multi-screen ...
expand
Rewriting an Android app using RetroSkeleton
Patrick John Sheehan, Benjamin Davis, Hao Chen
Pages: 483-484
doi>10.1145/2462456.2465738
Full text: PDFPDF

This video demonstrates one potential application of RetroSkeleton, which is a system for specifying and applying transformations to Android apps via bytecode rewriting. These transformation policies are app-agnostic and can be applied to Android apps ...
expand
Participatory sensing and crowd management in public spaces
Tobias Franke, Paul Lukowicz, Martin Wirz, Eve Mitleton-Kelly
Pages: 485-486
doi>10.1145/2462456.2465739
Full text: PDFPDF
DEMONSTRATION SESSION: Demonstrations
An anonymous matching system based on mobile numbers
Jen-Hai Chou, Mi-Yen Yeh
Pages: 487-488
doi>10.1145/2462456.2465696
Full text: PDFPDF

Many matchmaking applications help people find Mr./Ms. Right from people they might never meet. However, people usually tend to have a crush on someone in their daily life, such as classmates or colleagues. A big problem is: How to express love to your ...
expand
Floodcasting, a data dissemination service supporting real-time actuation and control
Ye-sheng Kuo, Pat Pannuto, Prabal Dutta
Pages: 489-490
doi>10.1145/2462456.2465697
Full text: PDFPDF

Packet collisions have gone from something to be avoided to something that can be embraced. We build upon recent results that employ intentional packet collisions for synchronized flooding to show how multi-hop wireless networks can support real-time ...
expand
Low-cost personal air-quality monitor
Xiaofan Jiang, Ji Jia, Gansha Wu, Jesse Z. Fang
Pages: 491-492
doi>10.1145/2462456.2465698
Full text: PDFPDF

We present the design, implementation, and preliminary results of PAM - a low-cost and portable personal air quality monitor that provides real-time air quality measurements for the user's immediate environment. PAM consists of a PAM client and a cloud-side ...
expand
Power management using game state detection on android smartphones
Benedikt Dietrich, Samarjit Chakraborty
Pages: 493-494
doi>10.1145/2462456.2465699
Full text: PDFPDF

Compute intensive games currently represent the class of most popular and at the same time most power consuming applications on mobile phones. To reduce the power consumption of games we have developed a game state specific power management technique. ...
expand
Location-based authentication system using space dependent information
Tatsuro Hachiya, Masaki Bandai
Pages: 495-496
doi>10.1145/2462456.2465700
Full text: PDFPDF
Compass fusion: high precision indoor people localization and identification
Wei-Chih Lin, Shih-Wei Sun, Wen-Huang Cheng, Ya-Ting Chang, Yu-Cong Lan
Pages: 497-498
doi>10.1145/2462456.2465701
Full text: PDFPDF

Indoor localization has attracted more and more attention with the growth of emerging location-based services (LBS), e.g. microblogging, location-based content sharing, and interactive indoor multimedia display. In the literature, wireless-based indoor ...
expand
SocioPhone: everyday face-to-face interaction monitoring platform using multi-phone sensor fusion
Youngki Lee, Chulhong Min, Chanyou Hwang, Jaeung Lee, Inseok Hwang, Younghyun Ju, Chungkuk Yoo, Miri Moon, Uichin Lee, Junehwa Song
Pages: 499-500
doi>10.1145/2462456.2465702
Full text: PDFPDF
A mobile live TV system for Taiwan high-speed rail
Hsin-Ta Chiao, Shih-Ying Chang, Yi-Ting Kuo, Ming Jing Li, Ming-Chien Tseng
Pages: 501-502
doi>10.1145/2462456.2465703
Full text: PDFPDF

In Taiwan, because of the Doppler effects and tunnel shading, it is difficult to smoothly receive a live DVB-T channel inside a high-speed train by a laptop equipped with an ordinary DVB-T USB dongle. For providing live TV services inside a high-speed ...
expand
Indoor geolocation on multi-sensor smartphones
Chin-Lung Li, Christos Laoudias, George Larkou, Yu-Kuen Tsai, Demetrios Zeinalipour-Yazti, Christos G. Panayiotou
Pages: 503-504
doi>10.1145/2462456.2465704
Full text: PDFPDF

In this demo, we present an efficient hybrid indoor positioning solution that uses multi-sensory location-oriented observations, including WiFi, accelerometer, gyroscope and digital compass data, that are widely available on Android smartphones.
expand
Yes, right there!: a self-portrait application with sensor-assisted guiding for smartphones
Chi-Chung Lo, Sz-Pin Huang, Yi Ren, Yu-Chee Tseng
Pages: 505-506
doi>10.1145/2462456.2465705
Full text: PDFPDF
BiFocus: using radio-optical beacons for an augmented reality search application
Ashwin Ashok, Chenren Xu, Tam Vu, Marco Gruteser, Richard Howard, Yanyong Zhang, Narayan Mandayam, Wenjia Yuan, Kristin Dana
Pages: 507-508
doi>10.1145/2462456.2465706
Full text: PDFPDF

Augmented Reality (AR) applications benefit from accurate detection of the objects that are within a person's view. Typically, it is not only desirable to identify what is currently within view, but also to navigate the users view to the item of interest ...
expand
Visible light communications for scooter safety
Shun-Hsiang You, Shih-Hao Chang, Hao-Min Lin, Hsin-Mu Tsai
Pages: 509-510
doi>10.1145/2462456.2465707
Full text: PDFPDF

Scooters are commonly used in many countries due to their low sale price, better fuel economy, and the ability to easily navigate through heavy traffic congestions. Today in Taiwan, approximately 70% of the registered vehicles are scooters. However, ...
expand
O'BTW: an opportunistic, similarity-based mobile recommendation system
Mai ElSherief, Tamer ElBatt, Ahmed Zahran, Ahmed Helmy
Pages: 511-512
doi>10.1145/2462456.2465708
Full text: PDFPDF
Embedded NFC protection and forensics for mobile phones with EnGarde
Jeremy Gummeson, Bodhi Priyantha, Deepak Ganesan, Derek Thrasher, Pengyu Zhang
Pages: 513-514
doi>10.1145/2462456.2465709
Full text: PDFPDF

Near Field Communication (NFC) on mobile phones presents new opportunities and threats. While NFC is radically changing how we pay for merchandise, it opens a pandora's box of ways in which it may be misused by unscrupulous individuals. This could include ...
expand
PAUL: proactive automated mobile user-centric content deLivery
Mohamed A. Abd ElMohsen, Omar K. Shoukry, Hesham El Gamal, Tamer ElBatt, Nayer M. Wanas, Mohamed Abdel Raouf, Mostafa A. Zakaria, Ahmed I. Abdelkader, Hakem M. Zaied
Pages: 515-516
doi>10.1145/2462456.2465710
Full text: PDFPDF
POSTER SESSION: Posters
Smartphone sensing for large data set collection of potholes
Saswat Raj, Ayush Jain, Rajiv Misra
Pages: 517-518
doi>10.1145/2462456.2465711
Full text: PDFPDF

Smartphone sensing for large data set collection of potholes is useful for monitoring transportation system intelligently. Collecting large data set of different information sources such as frequency of taking brakes, honks, potholes,black-spots etc ...
expand
Authenticating and tracing biological anonym of VANET based on KMC decentralization and two-factor
Fei Wang, Yongjun Xu, Lin Wu, Dan Liu, Liehuang Zhu
Pages: 519-520
doi>10.1145/2462456.2465712
Full text: PDFPDF
Carrying my environment with me in iot-enhanced smart buildings
Dawei Pan, Abraham Hang-yat Lam, Dan Wang
Pages: 521-522
doi>10.1145/2462456.2465713
Full text: PDFPDF
Mobile user clustering in large time-scale data transfer scheduling
Ting-An Lin, Yichuan Wang, Cheng-Hsin Hsu, Xin Liu
Pages: 523-524
doi>10.1145/2462456.2465714
Full text: PDFPDF
Fusing prefetch and delay-tolerant transfer for mobile videos
Shu-Ting Wang, Ting-An Lin, Yichuan Wang, Cheng-Hsin Hsu, Xin Liu
Pages: 525-526
doi>10.1145/2462456.2465715
Full text: PDFPDF
WhereAmI: image-based positioning in dense urban areas
Quoc Duy Vo, Klaus Mueller, Pradipta De
Pages: 527-528
doi>10.1145/2462456.2465716
Full text: PDFPDF
A black-box based android GUI testing system
Chao-Chun Yeh, Shih-Kun Huang, Sung-Yen Chang
Pages: 529-530
doi>10.1145/2462456.2465717
Full text: PDFPDF

In Android system, black box testing has risen to three key issues: S1: There is no source code and for tester to know the internal logic of the testing App. S2: There is no testing criterion for tester to know the correct behavior and testing scope ...
expand
An approximation algorithm of orienteering problems for mobile computing
Chen-Chih Liao, Cheng-Hsin Hsu
Pages: 531-532
doi>10.1145/2462456.2465718
Full text: PDFPDF
Artistic eye: recognizing key viewing points of popular sites
Chih-Hsiang Hsu, I-Chao Shen, Wen-Huang Cheng, Shih-Wei Sun
Pages: 533-534
doi>10.1145/2462456.2465719
Full text: PDFPDF
Instrumenting Thailand's coastline: mobile devices for environmental and disaster monitoring
Mikhail Nekrasov, Sirilak Chumkiew, Peter Shinn
Pages: 535-536
doi>10.1145/2462456.2465720
Full text: PDFPDF

This poster outlines ongoing work using mobile devices for communication and computation for environmental sensor networks in Thailand. This work is funded by a Fulbright scholarship spanning January to September 2013. The work is a partnership between ...
expand
CEGF: corner extraction by GPS filtering for power-efficient location uploading
Shih-Yung Juan, Yi-Fan Chung, Chung-Ta King, Cheng-Hsin Hsu
Pages: 537-538
doi>10.1145/2462456.2465721
Full text: PDFPDF

Over the past few years, personal sensing applications, such as travel path sharing and location recording, have been more and more popular. These applications use GPS sensors to record track points on smartphones and upload the track points to clouds ...
expand
Mobile code offloading: should it be a local decision or global inference?
Huber Flores, Satish Srirama
Pages: 539-540
doi>10.1145/2462456.2465722
Full text: PDFPDF
Framework for automated power estimation of android applications
Jemin Lee, Hyungshin Kim
Pages: 541-542
doi>10.1145/2462456.2465723
Full text: PDFPDF

In spite of the incredible market penetration of smartphones and rapid growth of App markets, their utility has been restricted by their battery capacity. Smartphone users are frustrated by applications consuming too much power. To avoid this experience, ...
expand
Solving network isolation problem in duty-cycled wireless sensor networks
Haiming Zhang, Lei Shu, Joel J.P.C. Rodrigues, Han-chieh Chao
Pages: 543-544
doi>10.1145/2462456.2465724
Full text: PDFPDF
An integrated system for indoor and outdoor location-based services (MapBiquitous): mobisys'13 poster abstract
Thomas Springer, Tenshi Hara, Gerd Bombach, Sina Grunau
Pages: 545-546
doi>10.1145/2462456.2465725
Full text: PDFPDF
How to harmonize wi-fi and bluetooth in a mobile device?
Wonhong Jeon, Byeong-Moon Cho, Kyung-Joon Park
Pages: 547-548
doi>10.1145/2462456.2465726
Full text: PDFPDF
Odometer in the pocket
Lin Wu, YongJun Xu, ZhuLin An, ChaoNong Xu, Fei Wang
Pages: 549-550
doi>10.1145/2462456.2465727
Full text: PDFPDF

Some previous work has shown the feasibility of Pedestrian Dead Reckoning (PDR) using a mobile phone, but the estimation of length walked is still a big challenge. In this paper, we propose a formula for estimating walking velocity, which can be integrated ...
expand
HyCloud: a hybrid approach toward offloading cellular content through opportunistic communication
Abouzar Noori, Domenico Giustiniano
Pages: 551-552
doi>10.1145/2462456.2465728
Full text: PDFPDF

The rapid proliferation of smartphones and the urge to offload mobile data is paving the way to blend the communication capabilities of cellular and opportunistic networks for delivering content. By exploiting the locality of users interested in the ...
expand

Powered by The ACM Guide to Computing Literature


The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2016 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us

Useful downloads: Adobe Reader    QuickTime    Windows Media Player    Real Player
Did you know the ACM DL App is now available?
Did you know your Organization can subscribe to the ACM Digital Library?
The ACM Guide to Computing Literature
All Tags
Export Formats
 
 
Save to Binder