|
|
SESSION: Vehicular systems and apps |
|
|
|
|
AMC: verifying user interface properties for vehicular applications |
| |
Kyungmin Lee,
Jason Flinn,
T.J. Giuli,
Brian Noble,
Christopher Peplin
|
|
Pages: 1-12 |
|
doi>10.1145/2462456.2464459 |
|
Full text: PDF
|
|
Vehicular environments require continuous awareness of the road ahead. It is critical that mobile applications used in such environments (e.g., GPS route planners and location-based search) do not distract drivers from the primary task of operating the ...
Vehicular environments require continuous awareness of the road ahead. It is critical that mobile applications used in such environments (e.g., GPS route planners and location-based search) do not distract drivers from the primary task of operating the vehicle. Fortunately, a large body of research on vehicular interfaces provides best practices that mobile application developers can follow. However, when we studied the most popular vehicular applications in the Android marketplace, no application followed these guidelines. In fact, vehicular applications were not substantially better at meeting best practice guidelines than non-vehicular applications. To remedy this problem, we have developed a tool called AMC that uses model checking to automatically explore the graphical user interface (GUI) of Android applications and detect violations of vehicular design guidelines. AMC is designed to give developers early feedback on their application GUI and reduce the amount of time required by a human expert to assess an application's suitability for vehicular usage. We have evaluated AMC by comparing the violations that it reports with those reported by an industry expert for 12 applications. AMC generated a definitive assessment for 85% of the guidelines checked; for these cases, it had no false positives and a false negative rate of under 2%. For the remaining 15% of cases, AMC reduced the number of application screens that required manual verification by 95%. expand
|
|
|
CarSafe app: alerting drowsy and distracted drivers using dual cameras on smartphones |
| |
Chuang-Wen You,
Nicholas D. Lane,
Fanglin Chen,
Rui Wang,
Zhenyu Chen,
Thomas J. Bao,
Martha Montes-de-Oca,
Yuting Cheng,
Mu Lin,
Lorenzo Torresani,
Andrew T. Campbell
|
|
Pages: 13-26 |
|
doi>10.1145/2462456.2465428 |
|
Full text: PDF
|
|
We present CarSafe, a new driver safety app for Android phones that detects and alerts drivers to dangerous driving conditions and behavior. It uses computer vision and machine learning algorithms on the phone to monitor and detect whether the driver ...
We present CarSafe, a new driver safety app for Android phones that detects and alerts drivers to dangerous driving conditions and behavior. It uses computer vision and machine learning algorithms on the phone to monitor and detect whether the driver is tired or distracted using the front-facing camera while at the same time tracking road conditions using the rear-facing camera. Today's smartphones do not, however, have the capability to process video streams from both the front and rear cameras simultaneously. In response, CarSafe uses acontext-aware algorithm that switches between the two cameras while processing the data in real-time with the goal of minimizing missed events inside (e.g., drowsy driving) and outside of the car (e.g., tailgating). Camera switching means that CarSafe technically has a "blind spot" in the front or rear at any given time. To address this, CarSafe uses other embedded sensors on the phone (i.e., inertial sensors) to generate soft hints regarding potential blind spot dangers. We present the design and implementation of CarSafe and discuss its evaluation using results from a 12-driver field trial. Results from the CarSafe deployment are promising -- CarSafe can infer a common set of dangerous driving behaviors and road conditions with an overall precision and recall of 83% and 75%, respectively. CarSafe is the first dual-camera sensing app for smartphones and represents a new disruptive technology because it provides similar advanced safety features otherwise only found in expensive top-end cars. expand
|
|
|
CrowdAtlas: self-updating maps for cloud and personal use |
| |
Yin Wang,
Xuemei Liu,
Hong Wei,
George Forman,
Chao Chen,
Yanmin Zhu
|
|
Pages: 27-40 |
|
doi>10.1145/2462456.2464441 |
|
Full text: PDF
|
|
The inaccuracy of manually created digital road maps is a persistent problem, despite their high economic value. We present CrowdAtlas, which automates map update based on people's travels, either individually or crowdsourced. Its mobile navigation app ...
The inaccuracy of manually created digital road maps is a persistent problem, despite their high economic value. We present CrowdAtlas, which automates map update based on people's travels, either individually or crowdsourced. Its mobile navigation app detects significant portions of GPS traces that do not conform to the existing map, as determined by state-of-the-art Viterbi map matching. When there is sufficient evidence collected, map inference algorithms can automatically update the map. The CrowdAtlas server aggregates exceptional traces from users with the navigation app as well as from other, large-scale data sources. From these it automatically generates high quality map updates, which can be propagated to its navigation app and other interested applications. Using CrowdAtlas app, we mapped out a 4.5 km^2 street block in Shanghai in less than half an hour and built a walking/cycling map of the SJTU campus. Using taxi traces collected from Beijing, we contributed completely computer-generated roads for this large, 61 km of missing roads to OpenStreetMap, the first set of open-source map community. expand
|
|
|
Sensing vehicle dynamics for determining driver phone use |
| |
Yan Wang,
Jie Yang,
Hongbo Liu,
Yingying Chen,
Marco Gruteser,
Richard P. Martin
|
|
Pages: 41-54 |
|
doi>10.1145/2462456.2464447 |
|
Full text: PDF
|
|
This paper utilizes smartphone sensing of vehicle dynamics to determine driver phone use, which can facilitate many traffic safety applications. Our system uses embedded sensors in smartphones, i.e., accelerometers and gyroscopes, to capture differences ...
This paper utilizes smartphone sensing of vehicle dynamics to determine driver phone use, which can facilitate many traffic safety applications. Our system uses embedded sensors in smartphones, i.e., accelerometers and gyroscopes, to capture differences in centripetal acceleration due to vehicle dynamics. These differences combined with angular speed can determine whether the phone is on the left or right side of the vehicle. Our low infrastructure approach is flexible with different turn sizes and driving speeds. Extensive experiments conducted with two vehicles in two different cities demonstrate that our system is robust to real driving environments. Despite noisy sensor readings from smartphones, our approach can achieve a classification accuracy of over $90\%$ with a false positive rate of a few percent. We also find that by combining sensing results in a few turns, we can achieve better accuracy (e.g., $95\%$) with a lower false positive rate. expand
|
|
|
SESSION: Energy, privacy and security |
|
|
|
|
Optimizing background email sync on smartphones |
| |
Fengyuan Xu,
Yunxin Liu,
Thomas Moscibroda,
Ranveer Chandra,
Long Jin,
Yongguang Zhang,
Qun Li
|
|
Pages: 55-68 |
|
doi>10.1145/2462456.2464444 |
|
Full text: PDF
|
|
Email is a key application used on smartphones. Even when the phone is in stand-by mode, users expect the phone to continue syncing with an email server to receive new mes-sages. Each such sync operation wakes up the smartphone for data reception and ...
Email is a key application used on smartphones. Even when the phone is in stand-by mode, users expect the phone to continue syncing with an email server to receive new mes-sages. Each such sync operation wakes up the smartphone for data reception and processing. In this paper, we show that this "cost of email sync" in stand-by mode constitutes a significant source of energy consumption, and thus reduces battery life. We quantify the power performance of different existing email clients on two smartphone platforms, An-droid and Windows Phone, and study the impact of system parameters such as email size, inbox size, and pull vs. push. Our results show that existing email clients do not handle email sync in an energy efficient way. This is because the underlying protocols and architectures are not designed for the specific needs of operating in stand-by mode. Based on our findings, we derive general design principles for energy-efficient event handling on smartphones, and apply these principles to the case of email sync and implement our techniques on commercial smartphones. Experimental results show that our techniques are able to significantly reduce energy cost of email sync by 49.9% on average with our experiment settings. expand
|
|
|
Energy characterization and optimization of image sensing toward continuous mobile vision |
| |
Robert LiKamWa,
Bodhi Priyantha,
Matthai Philipose,
Lin Zhong,
Paramvir Bahl
|
|
Pages: 69-82 |
|
doi>10.1145/2462456.2464448 |
|
Full text: PDF
|
|
A major hurdle to frequently performing mobile computer vision tasks is the high power consumption of image sensing. In this work, we report the first publicly known experimental and analytical characterization of CMOS image sensors. We find that modern ...
A major hurdle to frequently performing mobile computer vision tasks is the high power consumption of image sensing. In this work, we report the first publicly known experimental and analytical characterization of CMOS image sensors. We find that modern image sensors are not energy-proportional: energy per pixel is in fact inversely proportional to frame rate and resolution of image capture, and thus image sensor systems fail to provide an important principle of energy-aware system design: trading quality for energy efficiency. We reveal two energy-proportional mechanisms, supported by current image sensors but unused by mobile systems: (i) using an optimal clock frequency reduces the power up to 50% or 30% for low-quality single frame (photo) and sequential frame (video) capturing, respectively; (ii) by entering low-power standby mode between frames, an image sensor achieves almost constant energy per pixel for video capture at low frame rates, resulting in an additional 40% power reduction. We also propose architectural modifications to the image sensor that would further improve operational efficiency. Finally, we use computer vision benchmarks to show the performance and efficiency tradeoffs that can be achieved with existing image sensors. For image registration, a key primitive for image mosaicking and depth estimation, we can achieve a 96% success rate at 3 FPS and 0.1 MP resolution. At these quality metrics, an optimal clock frequency reduces image sensor power consumption by 36% and aggressive standby mode reduces power consumption by 95%. expand
|
|
|
Leveraging graphical models to improve accuracy and reduce privacy risks of mobile sensing |
| |
Abhinav Parate,
Meng-Chieh Chiu,
Deepak Ganesan,
Benjamin M. Marlin
|
|
Pages: 83-96 |
|
doi>10.1145/2462456.2464457 |
|
Full text: PDF
|
|
The proliferation of sensors on mobile phones and wearables has led to a plethora of context classifiers designed to sense the individual's context. We argue that a key missing piece in mobile inference is a layer that fuses the outputs of several classifiers ...
The proliferation of sensors on mobile phones and wearables has led to a plethora of context classifiers designed to sense the individual's context. We argue that a key missing piece in mobile inference is a layer that fuses the outputs of several classifiers to learn deeper insights into an individual's habitual patterns and associated correlations between contexts, thereby enabling new systems optimizations and opportunities. In this paper, we design CQue, a dynamic bayesian network that operates over classifiers for individual contexts, observes relations across these outputs across time, and identifies opportunities for improving energy-efficiency and accuracy by taking advantage of relations. In addition, such a layer provides insights into privacy leakage that might occur when seemingly innocuous user context revealed to different applications on a phone may be combined to reveal more information than originally intended. In terms of system architecture, our key contribution is a clean separation between the detection layer and the fusion layer, enabling classifiers to solely focus on detecting the context, and leverage temporal smoothing and fusion mechanisms to further boost performance by just connecting to our higher-level inference engine. To applications and users, CQue provides a query interface, allowing a) applications to obtain more accurate context results while remaining agnostic of what classifiers/sensors are used and when, and b) users to specify what contexts they wish to keep private, and only allow information that has low leakage with the private context to be revealed. We implemented CQue in Android, and our results show that CQue can i) improve activity classification accuracy up to 42%, ii) reduce energy consumption in classifying social, location and activity contexts with high accuracy(>90%) by reducing the number of required classifiers by at least 33%, and iii) effectively detect and suppress contexts that reveal private information. expand
|
|
|
ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing |
| |
Yuvraj Agarwal,
Malcolm Hall
|
|
Pages: 97-110 |
|
doi>10.1145/2462456.2464460 |
|
Full text: PDF
|
|
In this paper we present the design and implementation of ProtectMyPrivacy (PMP), a system for iOS devices to detect access to private data and protect users by substituting anonymized data in its place if users decide. We developed a novel crowdsourced ...
In this paper we present the design and implementation of ProtectMyPrivacy (PMP), a system for iOS devices to detect access to private data and protect users by substituting anonymized data in its place if users decide. We developed a novel crowdsourced recommendation engine driven by users who contribute their protection decisions, which provides app specific privacy recommendations. PMP has been in use for over nine months by 90,621 real users, and we present a detailed evaluation based on the data we collected for 225,685 unique apps. We show that access to the device identifer (48.4% of apps), location (13.2% of apps), address book (6.2% of apps) and music library (1.6% of apps) is indeed widespread in iOS. We show that based on the protection decisions contributed by our users we can recommend protection settings for over 97.1% of the 10,000 most popular apps. We show the effectiveness of our recommendation engine with users accepting 67.1% of all recommendations provide to them, thereby helping them make informed privacy choices. Finally, we show that as few as 1% of our users, classified as experts, make enough decisions to drive our crowdsourced privacy recommendation engine. expand
|
|
|
SESSION: Advertisements and search |
|
|
|
|
SmartAds: bringing contextual ads to mobile apps |
| |
Suman Nath,
Felix Xiaozhu Lin,
Lenin Ravindranath,
Jitendra Padhye
|
|
Pages: 111-124 |
|
doi>10.1145/2462456.2464452 |
|
Full text: PDF
|
|
A recent study showed that while US consumers spent 30% more time on mobile apps than on traditional web, advertisers spent 1600% less money on mobile ads. One key reason is that unlike most web ad providers, today's mobile ads are not contextual---they ...
A recent study showed that while US consumers spent 30% more time on mobile apps than on traditional web, advertisers spent 1600% less money on mobile ads. One key reason is that unlike most web ad providers, today's mobile ads are not contextual---they do not take into account the content of the page they are displayed on. Thus, most mobile ads are irrelevant to what the user is interested in. For example, it is not uncommon to see gambling ads being displayed in a Bible app. This irrelevance results in low clickthrough rates, and hence advertisers shy away from the mobile platform. Using data from top 1200 apps in Windows Phone marketplace, and a one-week trace of ad keywords from Microsoft's ad network, we show that content displayed by mobile apps is a potential goldmine of keywords that advertisers are interested in. However, unlike web pages, which can be crawled and indexed offline for contextual advertising, content shown on mobile apps is often either generated dynamically, or is embedded in the apps themselves; and hence cannot be crawled. The only solution is to scrape the content at runtime, extract keywords and fetch contextually relevant ads. The challenge is to do this without excessive overhead and without violating user privacy. In this paper, we describe a system called SmartAds to address this challenge. We have built a prototype of SmartAds for Windows Phone apps. In a large user study with over 5000 ad impressions, we found that SmartAds nearly doubles the relevance score, while consuming minimal additional resources and preserving user privacy. expand
|
|
|
CAMEO: a middleware for mobile advertisement delivery |
| |
Azeem J. Khan,
Kasthuri Jayarajah,
Dongsu Han,
Archan Misra,
Rajesh Balan,
Srinivasan Seshan
|
|
Pages: 125-138 |
|
doi>10.1145/2462456.2464436 |
|
Full text: PDF
|
|
Advertisements are the de-facto currency of the Internet with many popular applications (e.g. Angry Birds) and online services (e.g., YouTube) relying on advertisement generated revenue. However, the current economic models and mechanisms for mobile ...
Advertisements are the de-facto currency of the Internet with many popular applications (e.g. Angry Birds) and online services (e.g., YouTube) relying on advertisement generated revenue. However, the current economic models and mechanisms for mobile advertising are fundamentally not sustainable and far from ideal. In particular, as we show, applications which use mobile advertising are capable of using significant amounts of a mobile users' critical resources without being controlled or held accountable. This paper seeks to redress this situation by enabling advertisement supported applications to become significantly more ``user-friendly''. To this end, we present the design and implementation of CAMEO, a new framework for mobile advertising that 1) employs intelligent and proactive retrieval of advertisements, using context prediction, to significantly reduce the bandwidth and energy overheads of advertising, and 2) provides a negotiation protocol and framework that empowers applications to subsidize their data traffic costs by ``bartering'' their advertisement rights for access bandwidth from mobile ISPs. Our evaluation, that uses real mobile advertising data collected from around the globe, demonstrates that CAMEO effectively reduces the resource consumption caused by mobile advertising. expand
|
|
|
Scalable crowd-sourcing of video from mobile devices |
| |
Pieter Simoens,
Yu Xiao,
Padmanabhan Pillai,
Zhuo Chen,
Kiryong Ha,
Mahadev Satyanarayanan
|
|
Pages: 139-152 |
|
doi>10.1145/2462456.2464440 |
|
Full text: PDF
|
|
We propose a scalable Internet system for continuous collection of crowd-sourced video from devices such as Google Glass. Our hybrid cloud architecture, GigaSight, is effectively a Content Delivery Network (CDN) in reverse. It achieves scalability by ...
We propose a scalable Internet system for continuous collection of crowd-sourced video from devices such as Google Glass. Our hybrid cloud architecture, GigaSight, is effectively a Content Delivery Network (CDN) in reverse. It achieves scalability by decentralizing the collection infrastructure using cloudlets based on virtual machines~(VMs). Based on time, location, and content, privacy sensitive information is automatically removed from the video. This process, which we refer to as denaturing, is executed in a user-specific VM on the cloudlet. Users can perform content-based searches on the total catalog of denatured videos. Our experiments reveal the bottlenecks for video upload, denaturing, indexing, and content-based search. They also provide insight on how parameters such as frame rate and resolution impact scalability. expand
|
|
|
SESSION: OS, software, and virtualization |
|
|
|
|
Just-in-time provisioning for cyber foraging |
| |
Kiryong Ha,
Padmanabhan Pillai,
Wolfgang Richter,
Yoshihisa Abe,
Mahadev Satyanarayanan
|
|
Pages: 153-166 |
|
doi>10.1145/2462456.2464451 |
|
Full text: PDF
|
|
Cloud offload is an important technique in mobile computing. VM-based cloudlets have been proposed as offload sites for the resource-intensive and latency-sensitive computations typically associated with mobile multimedia applications. Since cloud offload ...
Cloud offload is an important technique in mobile computing. VM-based cloudlets have been proposed as offload sites for the resource-intensive and latency-sensitive computations typically associated with mobile multimedia applications. Since cloud offload relies on precisely-configured back-end software, it is difficult to support at global scale across cloudlets in multiple domains. To address this problem, we describe just-in-time (JIT) provisioning of cloudlets under the control of an associated mobile device. Using a suite of five representative mobile applications, we demonstrate a prototype system that is capable of provisioning a cloudlet with a non-trivial VM image in 10 seconds. This speed is achieved through dynamic VM synthesis and a series of optimizations to aggressively reduce transfer costs and startup latency. expand
|
|
|
SIF: a selective instrumentation framework for mobile applications |
| |
Shuai Hao,
Ding Li,
William G.J. Halfond,
Ramesh Govindan
|
|
Pages: 167-180 |
|
doi>10.1145/2462456.2465430 |
|
Full text: PDF
|
|
Mobile app ecosystems have experienced tremendous growth in the last five years. As researchers and developers turn their attention to understanding the ecosystem and its different apps, instrumentation of mobile apps is a much needed emerging capability. ...
Mobile app ecosystems have experienced tremendous growth in the last five years. As researchers and developers turn their attention to understanding the ecosystem and its different apps, instrumentation of mobile apps is a much needed emerging capability. In this paper, we explore a selective instrumentation capability that allows users to express instrumentation specifications at a high level of abstraction; these specifications are then used to automatically insert instrumentation into binaries. The challenge in our work is to develop expressive abstractions for instrumentation that can also be implemented efficiently. Designed using requirements derived from recent research that has used instrumented apps, our selective instrumentation framework, SIF, contains abstractions that allow users to compactly express precisely which parts of the app need to be instrumented. It also contains a novel path inspection capability, and provides users feedback on the approximate overhead of the instrumentation specification. Using experiments on our SIF implementation for Android, we show that SIF can be used to compactly (in 20-30 lines of code in most cases) specify instrumentation tasks previously reported in the literature. SIF's overhead is under 2% in most cases, and its instrumentation overhead feedback is within 15% in many cases. As such, we expect that SIF can accelerate studies of the mobile app ecosystem. expand
|
|
|
RetroSkeleton: retrofitting android apps |
| |
Benjamin Davis,
Hao Chen
|
|
Pages: 181-192 |
|
doi>10.1145/2462456.2464462 |
|
Full text: PDF
|
|
An obvious asset of the Android platform is the tremendous number and variety of available apps. There is a less obvious, but potentially even more important, benefit to the fact that nearly all apps are developed using a common platform. We can leverage ...
An obvious asset of the Android platform is the tremendous number and variety of available apps. There is a less obvious, but potentially even more important, benefit to the fact that nearly all apps are developed using a common platform. We can leverage the relatively uniform nature of Android apps to allow users to tweak applications for improved security, usability, and functionality with relative ease (compared to desktop applications). We design and implement an Android app rewriting framework for customizing behavior of existing applications without requiring source code or app-specific guidance. Following app-agnostic transformation policies, our system rewrites applications to insert, remove, or modify behavior. The rewritten application can run on any unmodified Android device, without requiring rooting or other custom software. This paper describes RetroSkeleton, our app rewriting framework, including static and dynamic interception of method invocations, and creating policies that integrate with each target app. We show that our system is capable of supporting a variety of useful policies, including providing flexible fine-grained network access control, building HTTPS-Everywhere functionality into apps, implementing automatic app localization, informing users of hidden behavior in apps, and updating apps depending on outdated APIs. We evaluate these policies by rewriting and testing more than one thousand real-world apps from Google Play. expand
|
|
|
SmartSynth: synthesizing smartphone automation scripts from natural language |
| |
Vu Le,
Sumit Gulwani,
Zhendong Su
|
|
Pages: 193-206 |
|
doi>10.1145/2462456.2464443 |
|
Full text: PDF
|
|
This paper presents SmartSynth, a novel end-to-end programming system for synthesizing smartphone automation scripts from natural language descriptions. Our approach is unique in two key aspects. First, it involves a carefully designed domain-specific ...
This paper presents SmartSynth, a novel end-to-end programming system for synthesizing smartphone automation scripts from natural language descriptions. Our approach is unique in two key aspects. First, it involves a carefully designed domain-specific language that incorporates standard constructs from smartphone programming platforms to balance its expressivity and the ability to synthesize scripts from natural language. Second, our synthesis algorithm integrates techniques from two research areas: (1) It infers the set of components and their partial dataflow relations from the natural language description using techniques from the Natural Language Processing community; and (2) It uses techniques from the Program Synthesis community to infer missing dataflow relations via type-based synthesis and constructs scripts in a process akin to reverse parsing. SmartSynth also performs conversational interactions with the user when multiple top-ranked scripts exist or it cannot map part of the description to any component. Evaluated on 50 tasks collected from smartphone help forums, our system produces the intended scripts in real time for over 90% of the 640 natural language descriptions obtained from a user study for those tasks. SmartSynth has also been adapted to TouchDevelop, an end user-targeted programming environment on mobile platforms, with very promising results (see http://www.cs.ucdavis.edu/~su/smartsynth.mp4 for a video demo). We believe that SmartSynth is a step toward fully personalized use of smartphones' increasingly rich functionalities. expand
|
|
|
SESSION: Location, indoors and outdoors |
|
|
|
|
FM-based indoor localization via automatic fingerprint DB construction and matching |
| |
Sungro Yoon,
Kyunghan Lee,
Injong Rhee
|
|
Pages: 207-220 |
|
doi>10.1145/2462456.2464445 |
|
Full text: PDF
|
|
We present ACMI, an FM-based indoor localization that does not require proactive site profiling. ACMI constructs the fingerprint database based on the pure estimation of indoor RSS distribution, where the signals transmitted from commercial FM radio ...
We present ACMI, an FM-based indoor localization that does not require proactive site profiling. ACMI constructs the fingerprint database based on the pure estimation of indoor RSS distribution, where the signals transmitted from commercial FM radio stations are used. For this, ACMI makes use of our signal model harnessing public transmission information of FM stations in a combination with a floorplan of a building. Using the fingerprint database as the knowledge base, ACMI actively performs multi-level online signal matching to infer the current location of a mobile user. ACMI achieves good indoor localization accuracy even without site profiling efforts. We evaluate ACMI with extensive indoor experiments in 7 different locations with over 1,100 indoor spots. The results show that ACMI achieves up to 89% room identification and accuracy of 6m localization error on average using 8 FM broadcast signals. expand
|
|
|
High-accuracy differential tracking of low-cost GPS receivers |
| |
Will Hedgecock,
Miklos Maroti,
Janos Sallai,
Peter Volgyesi,
Akos Ledeczi
|
|
Pages: 221-234 |
|
doi>10.1145/2462456.2464456 |
|
Full text: PDF
|
|
In many mobile wireless applications such as the automated driving of cars, formation flying of unmanned air vehicles, and source localization or target tracking with wireless sensor networks, it is more important to know the precise relative locations ...
In many mobile wireless applications such as the automated driving of cars, formation flying of unmanned air vehicles, and source localization or target tracking with wireless sensor networks, it is more important to know the precise relative locations of nodes than their absolute coordinates. GPS, the most ubiquitous localization system available, generally provides only absolute coordinates. Furthermore, low-cost receivers can exhibit tens of meters of error or worse in challenging RF environments. This paper presents an approach that uses GPS to derive relative location information for multiple receivers. Nodes in a network share their raw satellite measurements and use this data to track the relative motions of neighboring nodes as opposed to computing their own absolute coordinates. The system has been implemented using a network of Android phones equipped with a custom Bluetooth headset and integrated GPS chip to provide raw measurement data. Our evaluation shows that centimeter-scale tracking accuracy at an update rate of 1 Hz is possible under various conditions with the presented technique. This is more than an order of magnitude more accurate than simply taking the difference of reported absolute node coordinates or other simplistic approaches due to the presence of uncorrelated measurement errors. expand
|
|
|
Guoguo: enabling fine-grained indoor localization via smartphone |
| |
Kaikai Liu,
Xinxin Liu,
Xiaolin Li
|
|
Pages: 235-248 |
|
doi>10.1145/2462456.2464450 |
|
Full text: PDF
|
|
Using smartphones for accurate indoor localization opens a new frontier of mobile services, offering enormous opportunities to enhance users' experiences in indoor environments. Despite significant efforts on indoor localization in both academia and ...
Using smartphones for accurate indoor localization opens a new frontier of mobile services, offering enormous opportunities to enhance users' experiences in indoor environments. Despite significant efforts on indoor localization in both academia and industry in the past two decades, highly accurate and practical smartphone-based indoor localization remains an open problem. To enable indoor location-based services (ILBS), there are several stringent requirements for an indoor localization system: highly accurate that can differentiate massive users' locations (foot-level); no additional hardware components or extensions on users' smartphones; scalable to massive concurrent users. Current GPS, Radio RSS (e.g. WiFi, Bluetooth, ZigBee), or Fingerprinting based solutions can only achieve meter-level or room-level accuracy. In this paper, we propose a practical and accurate solution that fills the long-lasting gap of smartphone-based indoor localization. Specifically, we design and implement an indoor localization ecosystem Guoguo. Guoguo consists of an anchor network with a coordination protocol to transmit modulated localization beacons using high-band acoustic signals, a realtime processing app in a smartphone, and a backend server for indoor contexts and location-based services. We further propose approaches to improve its coverage, accuracy, and location update rate with low-power consumption. Our prototype shows centimeter-level localization accuracy in an office and classroom environment. Such precise indoor localization is expected to have high impact in the future ILBS and our daily activities. expand
|
|
|
Avoiding multipath to revive inbuilding WiFi localization |
| |
Souvik Sen,
Jeongkeun Lee,
Kyu-Han Kim,
Paul Congdon
|
|
Pages: 249-262 |
|
doi>10.1145/2462456.2464463 |
|
Full text: PDF
|
|
Despite of several years of innovative research, indoor localization is still not mainstream. Existing techniques either employ cumbersome fingerprinting, or rely upon the deployment of additional infrastructure. Towards a solution that is easier to ...
Despite of several years of innovative research, indoor localization is still not mainstream. Existing techniques either employ cumbersome fingerprinting, or rely upon the deployment of additional infrastructure. Towards a solution that is easier to adopt, we propose CUPID, which is free from these restrictions, yet is comparable in accuracy. While existing WiFi based solutions are highly susceptible to indoor multipath, CUPID utilizes physical layer (PHY) information to extract the signal strength and the angle of only the direct path, successfully avoiding the effect of multipath reflections. Our main observation is that natural human mobility, when combined with PHY layer information, can help in accurately estimating the angle and distance of a mobile device from an wireless access point (AP). Real-world indoor experiments using off-the-shelf wireless chipsets confirm the feasibility of CUPID. In addition, while previous approaches rely on multiple APs, CUPID is able to localize a device when only a single AP is present. When a few more APs are available, CUPID can improve the median localization error to 2.7m, which is comparable to schemes that rely on expensive fingerprinting or additional infrastructure. expand
|
|
|
SESSION: Interface design |
|
|
|
|
Spartacus: spatially-aware interaction for mobile devices through energy-efficient audio sensing |
| |
Zheng Sun,
Aveek Purohit,
Raja Bose,
Pei Zhang
|
|
Pages: 263-276 |
|
doi>10.1145/2462456.2464437 |
|
Full text: PDF
|
|
Recent developments in ubiquitous computing enable applications that leverage personal mobile devices, such as smartphones, as a means to interact with other devices in their close proximity. In this paper, we propose Spartacus, a mobile system that ...
Recent developments in ubiquitous computing enable applications that leverage personal mobile devices, such as smartphones, as a means to interact with other devices in their close proximity. In this paper, we propose Spartacus, a mobile system that enables spatially-aware neighboring device interactions with zero prior configuration. Using built-in microphones and speakers on commodity mobile devices, Spartacus uses a novel acoustic technique based on the Doppler effect to enable users to accurately initiate an interaction with a neighboring device through a pointing gesture. To enable truly spontaneous interactions on energy-constrained mobile devices, Spartacus uses a continuous audio-based lower-power listening mechanism to trigger the gesture detection service. This eliminates the need for any manual action by the user. Experimental results show that Spartacus achieves an average 90% device selection accuracy within 3m for most interaction scenarios. Our energy consumption evaluations show that, Spartacus achieves about 4X lower energy consumption than WiFi Direct and 5.5X lower than the latest Bluetooth 4.0 protocols. expand
|
|
|
ViRi: view it right |
| |
Pan Hu,
Guobin Shen,
Liqun Li,
Donghuan Lu
|
|
Pages: 277-290 |
|
doi>10.1145/2462456.2464454 |
|
Full text: PDF
|
|
We present ViRi -- an intriguing system that enables a user to enjoy a frontal view experience even when the user is actually at a slanted viewing angle. ViRi tries to restore the front-view effect by enhancing the normal content rendering process with ...
We present ViRi -- an intriguing system that enables a user to enjoy a frontal view experience even when the user is actually at a slanted viewing angle. ViRi tries to restore the front-view effect by enhancing the normal content rendering process with an additional geometry correction stage. The necessary prerequisite is effectively and accurately estimating the actual viewing angle under natural viewing situations and under the constraints of the device's computational power and limited battery deposit. We tackle the problem with face detection and augment the phone camera with a fisheye lens to expand its field of view so that the device can recognize its user even the phone is placed casually. We propose effective pre-processing techniques to ensure the applicability of face detection tools onto highly distorted fisheye images. To save energy, we leverage information from system states, employ multiple low power sensors to rule out unlikely viewing situations, and aggressively seek additional opportunities to maximally skip the face detection. For situations in which face detection is unavoidable, we design efficient prediction techniques to further speed up the face detection. The effectiveness of the proposed techniques have been confirmed through thorough evaluations. We have also built a straw man application to allow users to experience the intriguing effects of ViRi. expand
|
|
|
ScreenPass: secure password entry on touchscreen devices |
| |
Dongtao Liu,
Eduardo Cuervo,
Valentin Pistol,
Ryan Scudellari,
Landon P. Cox
|
|
Pages: 291-304 |
|
doi>10.1145/2462456.2465425 |
|
Full text: PDF
|
|
Users routinely access cloud services through third-party apps on smartphones by giving apps login credentials (i.e., a username and password). Unfortunately, users have no assurance that their apps will properly handle this sensitive information. In ...
Users routinely access cloud services through third-party apps on smartphones by giving apps login credentials (i.e., a username and password). Unfortunately, users have no assurance that their apps will properly handle this sensitive information. In this paper, we describe the design and implementation of ScreenPass, which significantly improves the security of passwords on touchscreen devices. ScreenPass secures passwords by ensuring that they are entered securely, and uses taint-tracking to monitor where apps send password data. The primary technical challenge addressed by ScreenPass is guaranteeing that trusted code is always aware of when a user is entering a password. ScreenPass provides this guarantee through two techniques. First, ScreenPass includes a trusted software keyboard that encourages users to specify their passwords' domains as they are entered (i.e., to tag their passwords). Second, ScreenPass performs optical character recognition (OCR) on a device's screenbuffer to ensure that passwords are entered only through the trusted software keyboard. We have evaluated ScreenPass through experiments with a prototype implementation, two in-situ user studies, and a small app study. Our prototype detected a wide range of dynamic and static keyboard-spoofing attacks and generated zero false positives. As long as a screen is off, not updated, or not tapped, our prototype consumes zero additional energy; in the worst case, when a highly interactive app rapidly updates the screen, our prototype under a typical configuration introduces only 12% energy overhead. Participants in our user studies tagged their passwords at a high rate and reported that tagging imposed no additional burden. Finally, a study of malicious and non-malicious apps running under ScreenPass revealed several cases of password mishandling. expand
|
|
|
SESSION: Cellular and WiFi |
|
|
|
|
Accounting for roaming users on mobile data access: issues and root causes |
| |
Guan-Hua Tu,
Chunyi Peng,
Chi-Yu Li,
Xingyu Ma,
Hongyi Wang,
Tao Wang,
Songwu Lu
|
|
Pages: 305-318 |
|
doi>10.1145/2462456.2464439 |
|
Full text: PDF
|
|
In this paper, we study how mobility affects mobile data accounting, which records the usage volume for each roaming user. We find out that, current 2G/3G/4G systems have well-tested mobility support solutions and generally work well. However, under ...
In this paper, we study how mobility affects mobile data accounting, which records the usage volume for each roaming user. We find out that, current 2G/3G/4G systems have well-tested mobility support solutions and generally work well. However, under certain biased, less common yet possible scenarios, accounting gap between the operator's log and the user's observation indeed exists. The gap can be as large as 69.6% in our road tests. We further discover that the root causes are diversified. In addition to the no-signal case reported in the prior work [23], they also include handoffs, as well as insufficient coverage of hybrid 2G/3G/4G systems. Inter-system handoffs (that migrate user devices between radio access technologies of 2G, 3G, and 4G) may incur non-negligible accounting discrepancy. expand
|
|
|
Comparison of caching strategies in modern cellular backhaul networks |
| |
Shinae Woo,
Eunyoung Jeong,
Shinjo Park,
Jongmin Lee,
Sunghwan Ihm,
KyoungSoo Park
|
|
Pages: 319-332 |
|
doi>10.1145/2462456.2464442 |
|
Full text: PDF
|
|
Recent popularity of smartphones drives rapid growth in the demand for cellular network bandwidth. Unfortunately, due to the centralized architecture of cellular networks, increasing the physical backhaul bandwidth is challenging. While content ...
Recent popularity of smartphones drives rapid growth in the demand for cellular network bandwidth. Unfortunately, due to the centralized architecture of cellular networks, increasing the physical backhaul bandwidth is challenging. While content caching in the cellular network could be beneficial, relatively few characteristics of the cellular traffic is known to come up with a highly-effetive caching strategy. In this work, we provide insight into flow and content-level characteristics of modern 3G traffic at a large cellular ISP in South Korea. We first develop a scalable deep flow inspection (DFI) system that can manage hundreds of thousands of concurrent TCP flows on a commodity multicore server. Our DFI system collects various HTTP/TCP-level statistics and produces logs for analyzing the effectiveness of conventional Web caching, prefix-based Web caching, and TCP-level redundancy elimination (RE) without a single packet drop at a 10~Gbps link. Our week-long measurements of over 370 TBs of the 3G traffic reveal that standard Web caching can reduce download bandwidth consumption up to 27.1% while simple TCP-level RE can save the bandwidth consumption up to 42.0% with a cache of 512~GB of RAM. We also find that applying TCP-level RE on the largest 9.4% flows eliminates 68.4% of the total redundancy. Most of the redundancy (52.1%~58.9%) comes from serving the same HTTP objects while the contribution by aliased URLs is up to 38.9%. expand
|
|
|
LEAD: leveraging protocol signatures for improving wireless link performance |
| |
Jun Huang,
Yu Wang,
Guoliang Xing
|
|
Pages: 333-346 |
|
doi>10.1145/2462456.2465429 |
|
Full text: PDF
|
|
Error correction is a fundamental problem in wireless system design as wireless links often suffer high bit error rate due to the effects of signal attenuation, multipath fading and interference. This paper presents a new cross-layer solution called ...
Error correction is a fundamental problem in wireless system design as wireless links often suffer high bit error rate due to the effects of signal attenuation, multipath fading and interference. This paper presents a new cross-layer solution called LEAD to improve the performance of existing channel decoders. While the traditional wisdom of cross-layer design is to exploit physical layer information at upper-layers, LEAD represents a paradigm shift in that it leverages upper-layer protocol signatures to improve the performance of physical layer channel decoding. The approach of LEAD is motivated by two key insights. First, channel codes can correct more errors when the values of some bits, which we refer to as {\em pilots}, are known before decoding. Second, some header fields of upper-layer protocols are often fixed or highly biased toward certain values. These distinctive bit pattern signatures can thus be exploited as pilots to assist channel decoding. To realize this idea, we first characterize bit bias in real-life network traffic, and develop an efficient algorithm to extract pilot bits with assured prediction accuracy. We then propose a decoding framework to allow existing channel decoders to effectively exploit extracted pilots. We implement LEAD on GNURadio/USRP platform and evaluate its performance by replaying real-life packet traces on a testbed of 12 USRP links. Our results show that LEAD significantly improve wireless link performance, while incurring very low overhead. Specifically, LEAD reduces more than 90\% bit errors for 48.9\% packets, and improves the end-to-end link throughput by 1.43x to 1.93x over existing error correction schemes. expand
|
|
|
PROTEUS: network performance forecast for real-time, interactive mobile applications |
| |
Qiang Xu,
Sanjeev Mehrotra,
Zhuoqing Mao,
Jin Li
|
|
Pages: 347-360 |
|
doi>10.1145/2462456.2464453 |
|
Full text: PDF
|
|
Real-time communication (RTC) applications such as VoIP, video conferencing, and online gaming are flourishing. To adapt and deliver good performance, these applications require accurate estimations of short-term network performance metrics, e.g., loss ...
Real-time communication (RTC) applications such as VoIP, video conferencing, and online gaming are flourishing. To adapt and deliver good performance, these applications require accurate estimations of short-term network performance metrics, e.g., loss rate, one-way delay, and throughput. However, the wide variation in mobile cellular network performance makes running RTC applications on these networks problematic. To address this issue, various performance adaptation techniques have been proposed, but one common problem of such techniques is that they only adjust application behavior reactively after performance degradation is visible. Thus, proactive adaptation based on accurate short-term, fine-grained network performance prediction can be a preferred alternative that benefits RTC applications. In this study, we show that forecasting the short-term performance in cellular networks is possible in part due to the channel estimation scheme on the device and the radio resource scheduling algorithm at the base station. We develop a system interface called PROTEUS, which passively collects current network performance, such as throughput, loss, and one-way delay, and then uses regression trees to forecast future network performance. PROTEUS successfully predicts the occurrence of packet loss within a 0.5s time window for 98% of the time windows and the occurrence of long one-way delay for 97% of the time windows. We also demonstrate how PROTEUS can be integrated with RTC applications to significantly improve the perceptual quality. In particular, we increase the peak signal-to-noise ratio of a video conferencing application by up to 15dB and reduce the perceptual delay in a gaming application by up to 4s. expand
|
|
|
SESSION: Behavior and activity recognition |
|
|
|
|
NuActiv: recognizing unseen new activities using semantic attribute-based learning |
| |
Heng-Tze Cheng,
Feng-Tso Sun,
Martin Griss,
Paul Davis,
Jianguo Li,
Di You
|
|
Pages: 361-374 |
|
doi>10.1145/2462456.2464438 |
|
Full text: PDF
|
|
We study the problem of how to recognize a new human activity when we have never seen any training example of that activity before. Recognizing human activities is an essential element for user-centric and context-aware applications. Previous studies ...
We study the problem of how to recognize a new human activity when we have never seen any training example of that activity before. Recognizing human activities is an essential element for user-centric and context-aware applications. Previous studies showed promising results using various machine learning algorithms. However, most existing methods can only recognize the activities that were previously seen in the training data. A previously unseen activity class cannot be recognized if there were no training samples in the dataset. Even if all of the activities can be enumerated in advance, labeled samples are often time consuming and expensive to get, as they require huge effort from human annotators or experts. In this paper, we present NuActiv, an activity recognition system that can recognize a human activity even when there are no training data for that activity class. Firstly, we designed a new representation of activities using semantic attributes, where each attribute is a human readable term that describes a basic element or an inherent characteristic of an activity. Secondly, based on this representation, a two-layer zero-shot learning algorithm is developed for activity recognition. Finally, to reinforce recognition accuracy using minimal user feedback, we developed an active learning algorithm for activity recognition. Our approach is evaluated on two datasets, including a 10-exercise-activity dataset we collected, and a public dataset of 34 daily life activities. Experimental results show that using semantic attribute-based learning, NuActiv can generalize knowledge to recognize unseen new activities. Our approach achieved up to 79% accuracy in unseen activity recognition. expand
|
|
|
SocioPhone: everyday face-to-face interaction monitoring platform using multi-phone sensor fusion |
| |
Youngki Lee,
Chulhong Min,
Chanyou Hwang,
Jaeung Lee,
Inseok Hwang,
Younghyun Ju,
Chungkuk Yoo,
Miri Moon,
Uichin Lee,
Junehwa Song
|
|
Pages: 375-388 |
|
doi>10.1145/2462456.2465426 |
|
Full text: PDF
|
|
In this paper, we propose SocioPhone, a novel initiative to build a mobile platform for face-to-face interaction monitoring. Face-to-face interaction, especially conversation, is a fundamental part of everyday life. Interaction-aware applications aimed ...
In this paper, we propose SocioPhone, a novel initiative to build a mobile platform for face-to-face interaction monitoring. Face-to-face interaction, especially conversation, is a fundamental part of everyday life. Interaction-aware applications aimed at facilitating group conversations have been proposed, but have not proliferated yet. Useful contexts to capture and support face-to-face interactions need to be explored more deeply. More important, recognizing delicate conversational contexts with commodity mobile devices requires solving a number of technical challenges. As a first step to address such challenges, we identify useful meta-linguistic contexts of conversation, such as turn-takings, prosodic features, a dominant participant, and pace. These serve as cornerstones for building a variety of interaction-aware applications. SocioPhone abstracts such useful meta-linguistic contexts as a set of intuitive APIs. Its runtime efficiently monitors registered contexts during in-progress conversations and notifies applications on-the-fly. Importantly, we have noticed that online turn monitoring is the basic building block for extracting diverse meta-linguistic contexts, and have devised a novel volume-topography-based method. We show the usefulness of SocioPhone with several interesting applications: SocioTherapist, SocioDigest, and Tug-of-War. Also, we show that our turn-monitoring technique is highly accurate and energy-efficient under diverse real-life situations. expand
|
|
|
MoodScope: building a mood sensor from smartphone usage patterns |
| |
Robert LiKamWa,
Yunxin Liu,
Nicholas D. Lane,
Lin Zhong
|
|
Pages: 389-402 |
|
doi>10.1145/2462456.2464449 |
|
Full text: PDF
|
|
We report a first-of-its-kind smartphone software system, MoodScope, which infers the mood of its user based on how the smartphone is used. Compared to smartphone sensors that measure acceleration, light, and other physical properties, MoodScope is a ...
We report a first-of-its-kind smartphone software system, MoodScope, which infers the mood of its user based on how the smartphone is used. Compared to smartphone sensors that measure acceleration, light, and other physical properties, MoodScope is a "sensor" that measures the mental state of the user and provides mood as an important input to context-aware computing. We run a formative statistical mood study with smartphone-logged data collected from 32 participants over two months. Through the study, we find that by analyzing communication history and application usage patterns, we can statistically infer a user's daily mood average with an initial accuracy of 66%, which gradu-ally improves to an accuracy of 93% after a two-month personal-ized training period. Motivated by these results, we build a service, MoodScope, which analyzes usage history to act as a sensor of the user's mood. We provide a MoodScope API for developers to use our system to create mood-enabled applications. We further create and deploy a mood-sharing social application. expand
|
|
|
Auditeur: a mobile-cloud service platform for acoustic event detection on smartphones |
| |
Shahriar Nirjon,
Robert F. Dickerson,
Philip Asare,
Qiang Li,
Dezhi Hong,
John A. Stankovic,
Pan Hu,
Guobin Shen,
Xiaofan Jiang
|
|
Pages: 403-416 |
|
doi>10.1145/2462456.2464446 |
|
Full text: PDF
|
|
Auditeur is a general-purpose, energy-efficient, and context-aware acoustic event detection platform for smartphones. It enables app developers to have their app register for and get notified on a wide variety of acoustic events. Auditeur is backed by ...
Auditeur is a general-purpose, energy-efficient, and context-aware acoustic event detection platform for smartphones. It enables app developers to have their app register for and get notified on a wide variety of acoustic events. Auditeur is backed by a cloud service to store user contributed sound clips and to generate an energy-efficient and context-aware classification plan for the phone. When an acoustic event type has been registered, the smartphone instantiates the necessary acoustic processing modules and wires them together to execute the plan. The phone then captures, processes, and classifies acoustic events locally and efficiently. Our analysis on user-contributed empirical data shows that Auditeur's energy-aware acoustic feature selection algorithm is capable of increasing the device lifetime by 33.4%, sacrificing less than 2% of the maximum achievable accuracy. We implement seven apps with Auditeur, and deploy them in real-world scenarios to demonstrate that Auditeur is versatile, 11.04% - 441.42% less power hungry, and 10.71% - 13.86% more accurate in detecting acoustic events, compared to state-of-the-art techniques. We present a user study to demonstrate that novice programmers can implement the core logic of interesting apps with Auditeur in less than 30 minutes, using only 15 - 20 lines of Java code. expand
|
|
|
SESSION: Assorted topics |
|
|
|
|
Kwiizya: local cellular network services in remote areas |
| |
Mariya Zheleva,
Arghyadip Paul,
David L. Johnson,
Elizabeth Belding
|
|
Pages: 417-430 |
|
doi>10.1145/2462456.2464458 |
|
Full text: PDF
|
|
Cellular networks have revolutionized the way people communicate in rural areas. At the same time, deployment of commercial-grade cellular networks in areas with low population density, such as in rural sub-Saharan Africa, is prohibitively expensive ...
Cellular networks have revolutionized the way people communicate in rural areas. At the same time, deployment of commercial-grade cellular networks in areas with low population density, such as in rural sub-Saharan Africa, is prohibitively expensive relative to the return of investment. As a result, 48\% of the rural population in Africa remains disconnected. To address this problem, we design a local cellular network architecture, Kwiizya, that provides basic voice and text messaging services in rural areas. Our system features an interface for development of text message based applications that can be leveraged for improved health care, education and support of local businesses. We deployed an instance of Kwiizya in the rural village of Macha in Zambia. Our deployment utilizes the existing long distance Wi-Fi network in the village for inter-base station communication to provide high quality services with minimal infrastructure requirements. In this paper we evaluate Kwiizya in-situ in Macha and show that the network maintains low delay and jitter (20ms and 3ms, respectively) for voice call traffic, while providing high call Mean Opinion Score of 3.46, which is the theoretical maximum supported by our system. expand
|
|
|
AdRob: examining the landscape and impact of android application plagiarism |
| |
Clint Gibler,
Ryan Stevens,
Jonathan Crussell,
Hao Chen,
Hui Zang,
Heesook Choi
|
|
Pages: 431-444 |
|
doi>10.1145/2462456.2464461 |
|
Full text: PDF
|
|
Malicious activities involving Android applications are rising rapidly. As prior work on cyber-crimes suggests, we need to understand the economic incentives of the criminals to design the most effective defenses. In this paper, we investigate application ...
Malicious activities involving Android applications are rising rapidly. As prior work on cyber-crimes suggests, we need to understand the economic incentives of the criminals to design the most effective defenses. In this paper, we investigate application plagiarism on Android markets at a large scale. We take the first step to characterize plagiarized applications and estimate their impact on the original application developers. We first crawled 265,359 free applications from 17 Android markets around the world and ran a tool to identify similar applications ("clones"). Based on the data, we examined properties of the cloned applications, including their distribution across different markets, application categories, and ad libraries. Next, we examined how cloned applications affect the original developers. We captured HTTP advertising traffic generated by mobile applications at a tier-1 US cellular carrier for 12 days. To associate each Android application with its advertising traffic, we extracted a unique advertising identifier (called the client ID) from both the applications and the network traces. We estimate a lower bound on the advertising revenue that cloned applications siphon from the original developers, and the user base that cloned applications divert from the original applications. To the best of our knowledge, this is the first large scale study on the characteristics of cloned mobile applications and their impact on the original developers. expand
|
|
|
EnGarde: protecting the mobile phone from malicious NFC interactions |
| |
Jeremy J. Gummeson,
Bodhi Priyantha,
Deepak Ganesan,
Derek Thrasher,
Pengyu Zhang
|
|
Pages: 445-458 |
|
doi>10.1145/2462456.2464455 |
|
Full text: PDF
|
|
Near Field Communication (NFC) on mobile phones presents new opportunities and threats. While NFC is radically changing how we pay for merchandise, it opens a pandora's box of ways in which it may be misused by unscrupulous individuals. This could include ...
Near Field Communication (NFC) on mobile phones presents new opportunities and threats. While NFC is radically changing how we pay for merchandise, it opens a pandora's box of ways in which it may be misused by unscrupulous individuals. This could include malicious NFC tags that seek to compromise a mobile phone, malicious readers that try to generate fake mobile payment transactions or steal valuable financial information, and others. In this work, we look at how to protect mobile phones from these threats while not being vulnerable to them. We design a small form-factor "patch", EnGarde, that can be stuck on the back of a phone to provide the capability to jam malicious interactions. EnGarde is entirely passive and harvests power through the same NFC source that it guards, which makes our hardware design minimalist, and facilitates eventual integration with a phone. We tackle key technical challenges in this design including operating across a range of NFC protocols, jamming at extremely low power, harvesting sufficient power for perpetual operation while having minimal impact on the phone's battery, designing an intelligent jammer that blocks only when specific blacklisted behavior is detected, and importantly, the ability to do all this without compromising user experience when the phone interacts with a legitimate external NFC device. expand
|
|
|
SESSION: Videos |
|
|
|
|
AdRob: examining the landscape and impact of android application plagiarism |
| |
Clint Gibler,
Ryan Stevens,
Jonathan Crussell,
Hao Chen,
Hui Zang,
Heesook Choi
|
|
Pages: 459-460 |
|
doi>10.1145/2462456.2466709 |
|
Full text: PDF
|
|
Malicious activities involving Android applications are rising rapidly. As prior work on cyber-crimes suggests, we need to understand the economic incentives of the criminals to design the most effective defenses. In this paper, we investigate application ...
Malicious activities involving Android applications are rising rapidly. As prior work on cyber-crimes suggests, we need to understand the economic incentives of the criminals to design the most effective defenses. In this paper, we investigate application plagiarism on Android markets at a large scale. We take the first step to characterize plagiarized applications and estimate their impact on the original application developers. We first crawled 265,359 free applications from 17 Android markets around the world and ran a tool to identify similar applications ("clones"). Based on the data, we examined properties of the cloned applications, including their distribution across different markets, application categories, and ad libraries. Next, we examined how cloned applications affect the original developers. We captured HTTP advertising traffic generated by mobile applications at a tier-1 US cellular carrier for 12 days. To associate each Android application with its advertising traffic, we extracted a unique advertising identifier (called the client ID) from both the applications and the network traces. We estimate a lower bound on the advertising revenue that cloned applications siphon from the original developers, and the user base that cloned applications divert from the original applications. To the best of our knowledge, this is the first large scale study on the characteristics of cloned mobile applications and their impact on the original developers. expand
|
|
|
CarSafe app: alerting drowsy and distracted drivers using dual cameras on smartphones |
| |
Chuang-Wen You,
Nicholas D. Lane,
Fanglin Chen,
Rui Wang,
Zhenyu Chen,
Thomas J. Bao,
Martha Montes-de-Oca,
Yuting Cheng,
Mu Lin,
Lorenzo Torresani,
Andrew T. Campbell
|
|
Pages: 461-462 |
|
doi>10.1145/2462456.2466711 |
|
Full text: PDF
|
|
We present CarSafe, the first driver safety application that uses dual cameras on smartphones to detect and alert drivers to dangerous driving conditions. CarSafe fuses events detected from cameras and readings from embedded sensors on the phone -- such ...
We present CarSafe, the first driver safety application that uses dual cameras on smartphones to detect and alert drivers to dangerous driving conditions. CarSafe fuses events detected from cameras and readings from embedded sensors on the phone -- such as the GPS, accelerometer and gyroscope -- to detect and alert the driver of dangerous driving behavior in and outside of the car. Results from a 12-driver field trial show CarSafe can infer five of the most commonly occurring dangerous driving conditions with an overall precision and recall of 83% and 75%, respectively. expand
|
|
|
Keyword programming for TouchDevelop |
| |
Vu Le,
Jonathan de Halleux,
Sumit Gulwani,
Zhendong Su
|
|
Pages: 463-464 |
|
doi>10.1145/2462456.2465729 |
|
Full text: PDF
|
|
This video demo features a new keyword programming environment for TouchDevelop, a popular touch-centric system for scripting mobile devices. The new environment allows users to simply enter a set of keywords, and its internal program synthesis engine ...
This video demo features a new keyword programming environment for TouchDevelop, a popular touch-centric system for scripting mobile devices. The new environment allows users to simply enter a set of keywords, and its internal program synthesis engine automatically generates script snippets that most likely reflect the users' intent. Because the synthesis engine can be triggered anywhere in a script, it also exploits various contextual information, such as which variables/functions are in-scope, to guide the generation of snippets. Our new environment benefit both novice and experienced TouchDevelop users. It helps novice users to synthesize script snippets from keywords and explore unfamiliar TouchDevelop features. It also improves experienced users' productivity because they need to worry about fewer coding details and enter less code. The demoed feature has been released and deployed since TouchDevelop version 2.10. expand
|
|
|
MoodScope: building a mood sensor from smartphone usage patterns |
| |
Robert LiKamWa,
Yunxin Liu,
Nicholas D. Lane,
Lin Zhong
|
|
Pages: 465-466 |
|
doi>10.1145/2462456.2483967 |
|
Full text: PDF
|
|
We present MoodScope, a software system which infers the mood of its user based on how the smartphone is used. Similar to smartphone sensors that measure acceleration, light, and other physical properties, MoodScope is a "sensor" that measures the mental ...
We present MoodScope, a software system which infers the mood of its user based on how the smartphone is used. Similar to smartphone sensors that measure acceleration, light, and other physical properties, MoodScope is a "sensor" that measures the mental state of the user and provides mood as an important input to context-aware computing. We run a formative statistical study with smartphone-logged data collected from 32 participants over two months. Through the study, we find that by analyzing communication history and application usage patterns, we can statistically infer a user's daily mood average with an accuracy of 93% after a two-month training period. Motivated by these results, we build a service, MoodScope, which analyzes usage history to act as a sensor of the user's mood. expand
|
|
|
Energy proportional image sensors for continuous mobile vision |
| |
Robert LiKamWa,
Bodhi Priyantha,
Matthai Philipose,
Lin Zhong,
Paramvir Bahl
|
|
Pages: 467-468 |
|
doi>10.1145/2462456.2483968 |
|
Full text: PDF
|
|
A hurdle to frequently performing mobile computer vision tasks is the high energy cost of image sensing. In particular, modern image sensors are not energy proportional; for low resolution and low frame rate capture, the image sensor consumes almost ...
A hurdle to frequently performing mobile computer vision tasks is the high energy cost of image sensing. In particular, modern image sensors are not energy proportional; for low resolution and low frame rate capture, the image sensor consumes almost the same amount of energy as it does at high resolutions and high frame rates. We reveal two system-level energy proportional mechanisms: (i) using an optimal pixel clock frequency; (ii) entering low power standby mode between frames. These techniques can be implemented by the image sensor driver with minimal hardware adjustment. Further improvements can be made by designing sensors with heterogeneous hardware architectures. With energy proportionality, computer vision frameworks can be optimized for power consumption, continuously requesting low resolution frames with low energy while only occasionally using high energy to request high resolution frames. This will in turn enable low power continuous mobile vision applications. expand
|
|
|
CrowdAtlas: self-updating maps for cloud and personal use |
| |
Yin Wang,
Xuemei Liu,
Hong Wei,
George Forman,
Yanmin Zhu
|
|
Pages: 469-470 |
|
doi>10.1145/2462456.2465730 |
|
Full text: PDF
|
|
Digital road maps have become essential to many aspects of our lives. Unfortunately, they have persistent quality issues, both in developing countries as well as in developed countries, evidenced by the recent Apple-Google map war. A survey of British ...
Digital road maps have become essential to many aspects of our lives. Unfortunately, they have persistent quality issues, both in developing countries as well as in developed countries, evidenced by the recent Apple-Google map war. A survey of British drivers showed 26% have been directed by their GPS to go into no-entry areas, and the news periodically reports car accidents caused by or related to digital maps. In addition to correcting existing errors, maps need to be frequently updated to reflect the latest constructions, closures, and reconfigurations. TomTom estimates that roads change by as much as 15% each year. There are also growing demands for other types of maps, including off-road driving, cycling, hiking, and skiing maps. There are services for people to share GPS traces, but none creates navigable maps. Getting maps up to date and maintaining them involves a great deal of effort and delay. Today's maps are built by expensive geological surveys, supplemented by manual editing work from aerial imagery or corrections submitted by aggravated map users. NavTeq (now Nokia) employs more than 7,000 employees worldwide in its Location Content team to update maps. We present the CrowdAtlas system, which updates digital maps using the increasingly abundant GPS traces available as byproducts from a variety of sources: fleet management systems, telematics systems, and smartphone apps (e.g., navigation and location based services). We modified state-of-the-art map matching algorithms to accommodate the possibility that the existing map is incomplete. It uses the traces that match the map to monitor for road closures and fix road geometry. It uses tight clusters of trace segments from many vehicles that do not match the map in order to infer missing roads that connect to existing roads. The existing roads provide good segmentation of the traces to produce high quality clusters, enabling the automated (and even unsupervised) addition of missing roads. Using one week of traces from 70 taxis in Beijing, CrowdAtlas inferred 61km of new roads, which we uploaded to OpenStreetMap and became its first set of computer generated roads. To enable personalized maps, we also developed CrowdAtlas app based on OSMAnd, an open source navigation app. When acting as a GPS data source to CrowdAtlas server, it contributes data better optimized for map update with less communication. When acting in standalone-mode, it can add missing roads to its onboard navigation map. Instead of aggregating multiple GPS traces for high confidence, this app can add each new road immediately after the user traverses it, given user confirmation. We used our CrowdAtlas app in standalone-mode to map out major roads in a 4.5km^2 area of Shanghai Pudong in less than 30 minutes and build the walking map of the SJTU campus in less than a day. CrowdAtlas could fundamentally change the way people create and update maps. Together with incubating technologies that extract road metadata from street views and aerial imagery, modern cartography could be revolutionized, reducing or eliminating the expensive and slow manual mapping process used today. The high-definition version of our video presentation is available at vimeo.com/62912005, and our accompanying full-length paper describes the technical details of CrowdAtlas. expand
|
|
|
Video streaming using whitespace spectrum for vehicular applications |
| |
Tan Zhang,
Sayandeep Sen,
Suman Banerjee
|
|
Pages: 471-472 |
|
doi>10.1145/2462456.2465731 |
|
Full text: PDF
|
|
We present Scout, a communication system leveraging TV whitespaces to support robust and high-speed streaming services. Scout uses two key techniques to improve video performance. First, it extends network coverage through an asymmetric network architecture ...
We present Scout, a communication system leveraging TV whitespaces to support robust and high-speed streaming services. Scout uses two key techniques to improve video performance. First, it extends network coverage through an asymmetric network architecture where whitespace transceivers are used for the downlink direction while a cellular path is used for the uplink. Scout further leverages some unique opportunities that arise in vehicular systems. In particular, it sends a front radio to lookahead and identify the best channel parameters when the rear radio eventually reaches the forward post. We demonstrate the performance of Scout by using a single base station to stream a high-quality video to a vehicle driving along a 1.3km road stretch. expand
|
|
|
Sensing device co-location through patterns of silence |
| |
Wai-Tian Tan,
Mary Baker,
Bowon Lee,
Ramin Samadani
|
|
Pages: 473-474 |
|
doi>10.1145/2462456.2465732 |
|
Full text: PDF
|
|
This document describes the technology behind the accompanying video, which gives a demonstration of determining the dynamic group membership of a meeting by matching patterns of relative audio silence, or "silence signatures," sensed by mobile devices.
This document describes the technology behind the accompanying video, which gives a demonstration of determining the dynamic group membership of a meeting by matching patterns of relative audio silence, or "silence signatures," sensed by mobile devices. expand
|
|
|
RegTrack: a differential relative gps tracking solution |
| |
Will Hedgecock,
Miklos Maroti,
Janos Sallai,
Peter Volgyesi,
Akos Ledeczi
|
|
Pages: 475-476 |
|
doi>10.1145/2462456.2465733 |
|
Full text: PDF
|
|
In many mobile wireless applications such as the automated driving of cars, formation flying of unmanned air vehicles, and source localization or target tracking with wireless sensor networks, it is more important to know the precise relative locations ...
In many mobile wireless applications such as the automated driving of cars, formation flying of unmanned air vehicles, and source localization or target tracking with wireless sensor networks, it is more important to know the precise relative locations of nodes than their absolute coordinates. GPS, the most ubiquitous localization system available, generally provides only absolute coordinates. Furthermore, low-cost receivers can exhibit tens of meters of error or worse in challenging RF environments. This video demonstration presents an approach that uses GPS to derive relative location information for multiple receivers. Cooperating nodes in a network share their raw satellite measurements and use this data to track the relative motions of neighboring nodes as opposed to computing their own absolute coordinates. This is achieved via creation of a new error model that incorporates GPS localization errors specific to the multiple-receiver case, development of a new, highly accurate observation model that allows for the change in range between a single satellite and two receivers to be mapped through time, and the synthesis of these two models into a novel 3D pairwise tracking algorithm that uses the local GPS node as its own reference and requires only an approximate estimate of its own absolute position to achieve centimeter-scale relative tracking precision. The system just described was implemented on a network of Android smartphones equipped with a Bluetooth-enabled, custom GPS node to provide raw measurement data. Several experiments were carried out to test our proof of concept in various GPS environments and under different types of dynamic conditions. Our evaluation shows that centimeter-scale tracking accuracy at an update rate of 1 Hz is possible under various conditions with the presented technique. This is more than an order of magnitude more accurate than simply taking the difference of reported absolute node coordinates or other simplistic approaches due to uncorrelated measurement errors. The demo shown in this video represents one of the high-dynamic test cases in which we placed a stationary GPS receiver on a tripod in the middle of a parking lot and three additional nodes on top of an automobile. We proceeded to drive the automobile through various environments, including a multipath-rich alleyway, moderately benign suburban roads, and at high speeds on an interstate highway. The total length of the experiment was 15 minutes, spanning 12.2 km of terrain, with the baseline vector between the stationary node in the parking lot and the roving nodes on the automobile ranging from 0 to 3.5 km at any given time. The visualization of the experimental results is taken from the point of view of the stationary node, enabling us to map the relative tracks of the roving nodes in an absolute coordinate space using Google Earth. The results of this experiment showed centimeter-scale tracking accuracy - a level of precision that enables clear distinction of driving features such as lane shifts and velocity changes - under various driving conditions, with only one problematic loss of satellite locks due to signal obstruction by a wide overpass while the vehicle was changing directions. This momentary loss of lock caused the tracking algorithm to resume after approximately 2 meters of error had already been accrued, and this error remained present and constant throughout the remainder of the experiment. Future work involves solving for initialization and re-calibration of the tracking algorithm on the fly, such that losses of lock and visibility obstructions do not degrade the accuracy of the system in the long run. In its present form, RegTrack already provides an order of magnitude better precision than complementary methods using low-cost, single-frequency commercial receivers, and the stage is set for further research to increase its robustness and utility for high-precision, low-cost applications. expand
|
|
|
Pointer wizard: a remote interaction user interface |
| |
Jenq-Shiou Leu,
Kuan-Wu Su,
Tien-Yu Chu,
Chen-Hsin Hsieh,
Yu-Shan Athena Chen,
Jui-Ping Ma
|
|
Pages: 477-478 |
|
doi>10.1145/2462456.2465734 |
|
Full text: PDF
|
|
In this video demonstration, we present a remote interaction user interface prototype -- Pointer Wizard, to provide mixed reality experience with intuitive interaction afar. By identifying finger gestures and voice commands, it allows users to interact ...
In this video demonstration, we present a remote interaction user interface prototype -- Pointer Wizard, to provide mixed reality experience with intuitive interaction afar. By identifying finger gestures and voice commands, it allows users to interact with appliances remotely, without the need of close proximity or even physical contact. It also brings information from the virtual world out into the real surrounding, thus creating the mixed reality experience. Due to the rapid improvement and development of smartphone and smart devices, we can now integrate the readily available hardware with micro-projection technology and quickly create prototypes that can be deployed rapidly. We designed image and speech recognition apps for smart devices in order to identify the figure gestures and target appliances, and through wireless transmission not only sending control signals to control relays for the appliances and receiving feedback information, but also gathering related information from the Internet,. The prompt control commands and related information are then projected out via portable light-weight projecting mechanism in real-time, hence users are seemingly able to operate and interact with the target from a distance. Through realizing this project, we hope to provide a more convenient way of life, and a more intuitive way of obtaining information or manipulating home appliances, like performing magic as wizards in a fantasy. expand
|
|
|
Kwiizya: local cellular network services in remote areas |
| |
Mariya Zheleva,
Abigail Hinsman,
Lisa Parks,
Elizabeth Belding
|
|
Pages: 479-480 |
|
doi>10.1145/2462456.2465736 |
|
Full text: PDF
|
|
Cellular networks have revolutionized the way people communicate in rural areas. At the same time, deployment of commercial-grade cellular networks in areas with low population density, such as in rural sub-Saharan Africa, is prohibitively expensive ...
Cellular networks have revolutionized the way people communicate in rural areas. At the same time, deployment of commercial-grade cellular networks in areas with low population density, such as in rural sub-Saharan Africa, is prohibitively expensive relative to the return of investment. As a result, 48% of the rural population in Africa remains disconnected. To address this problem, we design a local cellular network architecture, Kwiizya, that provides basic voice and text messaging services in rural areas. We deployed an instance of Kwiizya in the rural village of Macha in Zambia. In this video we present interviews with people from the Macha community talking about their use of cellphones. We also present footage from the installation of Kwiizya in Macha. expand
|
|
|
Multi-screen social TV over cloud-centric media platform |
| |
Xiang Li,
Tian Xie,
Yonggang Wen
|
|
Pages: 481-482 |
|
doi>10.1145/2462456.2465737 |
|
Full text: PDF
|
|
Multi-screen social TV is an innovative application for transforming the traditional "laid-back" video watching behavior with the emerging "lean-forward" social network experience. In this video, we demonstrate a set of use cases in which the multi-screen ...
Multi-screen social TV is an innovative application for transforming the traditional "laid-back" video watching behavior with the emerging "lean-forward" social network experience. In this video, we demonstrate a set of use cases in which the multi-screen social TV, developed over our patent-pending cloud-centric media platform, is leveraged to change the way we work, study and play in future. expand
|
|
|
Rewriting an Android app using RetroSkeleton |
| |
Patrick John Sheehan,
Benjamin Davis,
Hao Chen
|
|
Pages: 483-484 |
|
doi>10.1145/2462456.2465738 |
|
Full text: PDF
|
|
This video demonstrates one potential application of RetroSkeleton, which is a system for specifying and applying transformations to Android apps via bytecode rewriting. These transformation policies are app-agnostic and can be applied to Android apps ...
This video demonstrates one potential application of RetroSkeleton, which is a system for specifying and applying transformations to Android apps via bytecode rewriting. These transformation policies are app-agnostic and can be applied to Android apps without any manual guidance. In this video, we show how RetroSkeleton can be used to automatically add custom fine-grained network access controls into an existing app, giving users more control over their apps. We also show the use of the RetroSkeleton web interface, available at http://retroskeleton.com. expand
|
|
|
Participatory sensing and crowd management in public spaces |
| |
Tobias Franke,
Paul Lukowicz,
Martin Wirz,
Eve Mitleton-Kelly
|
|
Pages: 485-486 |
|
doi>10.1145/2462456.2465739 |
|
Full text: PDF
|
|
|
|
|
DEMONSTRATION SESSION: Demonstrations |
|
|
|
|
An anonymous matching system based on mobile numbers |
| |
Jen-Hai Chou,
Mi-Yen Yeh
|
|
Pages: 487-488 |
|
doi>10.1145/2462456.2465696 |
|
Full text: PDF
|
|
Many matchmaking applications help people find Mr./Ms. Right from people they might never meet. However, people usually tend to have a crush on someone in their daily life, such as classmates or colleagues. A big problem is: How to express love to your ...
Many matchmaking applications help people find Mr./Ms. Right from people they might never meet. However, people usually tend to have a crush on someone in their daily life, such as classmates or colleagues. A big problem is: How to express love to your crush without hurting your original friendship? In response, we develop a mobile application, CrushList, to help people create a loving relationship with those around them based on an anonymous matching mechanism using mobile numbers as the user IDs. This is effective and efficient because mobile numbers are easy to access from one's mobile phone and the mobile contacts are usually those already known or met in one's daily life. The CrushList users can manage a crush-list by adding the mobile numbers of their crushes. Only when two users are in the crush-list of each other the system will notify both of them. Otherwise, a user always keeps anonymous to his/her crush. expand
|
|
|
Floodcasting, a data dissemination service supporting real-time actuation and control |
| |
Ye-sheng Kuo,
Pat Pannuto,
Prabal Dutta
|
|
Pages: 489-490 |
|
doi>10.1145/2462456.2465697 |
|
Full text: PDF
|
|
Packet collisions have gone from something to be avoided to something that can be embraced. We build upon recent results that employ intentional packet collisions for synchronized flooding to show how multi-hop wireless networks can support real-time ...
Packet collisions have gone from something to be avoided to something that can be embraced. We build upon recent results that employ intentional packet collisions for synchronized flooding to show how multi-hop wireless networks can support real-time actuation and control. First, we show how a network of nodes can synchronize their LED transmissions to extend the range of a visual light communication (VLC) system. Second, we show how buffer-free, streaming audio is possible over a multi-hop wireless mesh network. expand
|
|
|
Low-cost personal air-quality monitor |
| |
Xiaofan Jiang,
Ji Jia,
Gansha Wu,
Jesse Z. Fang
|
|
Pages: 491-492 |
|
doi>10.1145/2462456.2465698 |
|
Full text: PDF
|
|
We present the design, implementation, and preliminary results of PAM - a low-cost and portable personal air quality monitor that provides real-time air quality measurements for the user's immediate environment. PAM consists of a PAM client and a cloud-side ...
We present the design, implementation, and preliminary results of PAM - a low-cost and portable personal air quality monitor that provides real-time air quality measurements for the user's immediate environment. PAM consists of a PAM client and a cloud-side PAM service. The PAM client utilizes two inexpensive dust sensors to obtain raw particulate concentration measurement, and two Arduino boards for local filtering, web services, and communication with PAM service. The cloud-side PAM service constructs a statistical model of air quality and provides PAM clients with context-dependent calibration curves. Together, PAM is able to approximate PM2.5, PM10, and AQI measurement for users in-situ and at low cost. expand
|
|
|
Power management using game state detection on android smartphones |
| |
Benedikt Dietrich,
Samarjit Chakraborty
|
|
Pages: 493-494 |
|
doi>10.1145/2462456.2465699 |
|
Full text: PDF
|
|
Compute intensive games currently represent the class of most popular and at the same time most power consuming applications on mobile phones. To reduce the power consumption of games we have developed a game state specific power management technique. ...
Compute intensive games currently represent the class of most popular and at the same time most power consuming applications on mobile phones. To reduce the power consumption of games we have developed a game state specific power management technique. Games typically consist of several states such as the game loading, main menu, in-game menu and gaming state. Each of these states has its specific processing requirements, e.g., the game loading state is likely to be memory bound and menu scenes are less interactive than gaming states and hence do not require high frame rates to satisfy the user's perception. Our game state specific governor (i) recognizes these game states by intercepting and analyzing calls made by the game application to the graphics library, and (ii) exploits these state-specific characteristics to enable power management strategies targeted to these individual states at runtime. Thereby, we achieve significant power savings of up to 50.8% compared to Android's default interactive governor. expand
|
|
|
Location-based authentication system using space dependent information |
| |
Tatsuro Hachiya,
Masaki Bandai
|
|
Pages: 495-496 |
|
doi>10.1145/2462456.2465700 |
|
Full text: PDF
|
|
|
|
|
Compass fusion: high precision indoor people localization and identification |
| |
Wei-Chih Lin,
Shih-Wei Sun,
Wen-Huang Cheng,
Ya-Ting Chang,
Yu-Cong Lan
|
|
Pages: 497-498 |
|
doi>10.1145/2462456.2465701 |
|
Full text: PDF
|
|
Indoor localization has attracted more and more attention with the growth of emerging location-based services (LBS), e.g. microblogging, location-based content sharing, and interactive indoor multimedia display. In the literature, wireless-based indoor ...
Indoor localization has attracted more and more attention with the growth of emerging location-based services (LBS), e.g. microblogging, location-based content sharing, and interactive indoor multimedia display. In the literature, wireless-based indoor positioning for hand-held mobile devices is in meter-level precision, including WLAN (Wi-Fi), Bluetooth, and GSM-based approaches. A smartphone-based LBS fusing various sensors, such as accelerometer, digital compass, Wi-Fi, and GPS, can achieve the localization at a better room-level accuracy. In addition, the scanned Wi-Fi access point can determine the room-level identification for a mobile user. However, when multiple human subjects locating in the same coverage area for the same Wi-Fi access points, e.g. in the same room, the individuals often cannot be identified from each other. Therefore, in order to achieve a high precision in a centimeter level for the indoor localization, we extended our head detection scheme of detecting people from depth camera, with an average estimation accuracy of 98.72%, and an average distortion of 2.06 cm. That is, because the compass of a mobile device can provide the orientation of how a human subject holds the mobile device, we proposed to fuse the orientation information analyzed according to the trajectory of a human subject obtained from depth cameras, for enhancing both the indoor localization and people identification accuracies to a centimeter level. expand
|
|
|
SocioPhone: everyday face-to-face interaction monitoring platform using multi-phone sensor fusion |
| |
Youngki Lee,
Chulhong Min,
Chanyou Hwang,
Jaeung Lee,
Inseok Hwang,
Younghyun Ju,
Chungkuk Yoo,
Miri Moon,
Uichin Lee,
Junehwa Song
|
|
Pages: 499-500 |
|
doi>10.1145/2462456.2465702 |
|
Full text: PDF
|
|
|
|
|
A mobile live TV system for Taiwan high-speed rail |
| |
Hsin-Ta Chiao,
Shih-Ying Chang,
Yi-Ting Kuo,
Ming Jing Li,
Ming-Chien Tseng
|
|
Pages: 501-502 |
|
doi>10.1145/2462456.2465703 |
|
Full text: PDF
|
|
In Taiwan, because of the Doppler effects and tunnel shading, it is difficult to smoothly receive a live DVB-T channel inside a high-speed train by a laptop equipped with an ordinary DVB-T USB dongle. For providing live TV services inside a high-speed ...
In Taiwan, because of the Doppler effects and tunnel shading, it is difficult to smoothly receive a live DVB-T channel inside a high-speed train by a laptop equipped with an ordinary DVB-T USB dongle. For providing live TV services inside a high-speed train, we develop a mobile live TV system for Taiwan High-speed Rail (THSR). The proposed system delivers live TV programs to a high-speed train through the mobile WiMAX network deployed along the THSR railway by the WiMAX operator VeeTime. Then, the received live TV programs are delivered to the terminal devices of high-speed rail passengers through Wi-Fi multicast. Using Wi-Fi multicast inside a high-speed train is necessary since there may be several hundreds of concurrent users on the same high-speed train. However, conventionally to provide a scalable Wi-Fi multicast streaming system is difficult because no extra reliability control mechanisms such as ARQ (Automatic Repeat-reQuest) are available for Wi-Fi multicast. Instead we overcome the difficulty of scalable Wi-Fi multicast streaming by using AL-FEC (Application Layer -- Forward Error Correction). Hence, in the demo session of MobiSys 2013, we plan to show the whole mobile live TV system with a live TV input, especially focused on its capability of scalable Wi-Fi multicast streaming over a multi-hop Wi-Fi network that can emulate the real multi-hop Wi-Fi network inside a high-speed train. expand
|
|
|
Indoor geolocation on multi-sensor smartphones |
| |
Chin-Lung Li,
Christos Laoudias,
George Larkou,
Yu-Kuen Tsai,
Demetrios Zeinalipour-Yazti,
Christos G. Panayiotou
|
|
Pages: 503-504 |
|
doi>10.1145/2462456.2465704 |
|
Full text: PDF
|
|
In this demo, we present an efficient hybrid indoor positioning solution that uses multi-sensory location-oriented observations, including WiFi, accelerometer, gyroscope and digital compass data, that are widely available on Android smartphones.
In this demo, we present an efficient hybrid indoor positioning solution that uses multi-sensory location-oriented observations, including WiFi, accelerometer, gyroscope and digital compass data, that are widely available on Android smartphones. expand
|
|
|
Yes, right there!: a self-portrait application with sensor-assisted guiding for smartphones |
| |
Chi-Chung Lo,
Sz-Pin Huang,
Yi Ren,
Yu-Chee Tseng
|
|
Pages: 505-506 |
|
doi>10.1145/2462456.2465705 |
|
Full text: PDF
|
|
|
|
|
BiFocus: using radio-optical beacons for an augmented reality search application |
| |
Ashwin Ashok,
Chenren Xu,
Tam Vu,
Marco Gruteser,
Richard Howard,
Yanyong Zhang,
Narayan Mandayam,
Wenjia Yuan,
Kristin Dana
|
|
Pages: 507-508 |
|
doi>10.1145/2462456.2465706 |
|
Full text: PDF
|
|
Augmented Reality (AR) applications benefit from accurate detection of the objects that are within a person's view. Typically, it is not only desirable to identify what is currently within view, but also to navigate the users view to the item of interest ...
Augmented Reality (AR) applications benefit from accurate detection of the objects that are within a person's view. Typically, it is not only desirable to identify what is currently within view, but also to navigate the users view to the item of interest - for example, finding a misplaced object. In this paper we demonstrate a low-power hybrid radio-optical beaconing system, where objects of interest are tagged with battery-powered RFID-like tags equipped with infrared light emitting diodes (LED) that emit periodic infrared beacons. These beacons are used for accurately estimating the angle and distance from the object to the receiver so as to locate it. The beacons are synchronized using the radio link that is also used to convey the object's unique ID. expand
|
|
|
Visible light communications for scooter safety |
| |
Shun-Hsiang You,
Shih-Hao Chang,
Hao-Min Lin,
Hsin-Mu Tsai
|
|
Pages: 509-510 |
|
doi>10.1145/2462456.2465707 |
|
Full text: PDF
|
|
Scooters are commonly used in many countries due to their low sale price, better fuel economy, and the ability to easily navigate through heavy traffic congestions. Today in Taiwan, approximately 70% of the registered vehicles are scooters. However, ...
Scooters are commonly used in many countries due to their low sale price, better fuel economy, and the ability to easily navigate through heavy traffic congestions. Today in Taiwan, approximately 70% of the registered vehicles are scooters. However, due to the low cost nature of the scooters, many safety technologies developed for cars cannot be adopted by them; statistics show that accidents involving scooters contribute to more than 80% of fatalities in traffic accidents in Taiwan, resulting in more than 2,000 deaths annually. It is therefore crucial to develop a new low-cost safety system that can be used by scooters. The enabling concept in this new safety system is cooperation between vehicles: scooters and cars sharing their current status and their observation of the neighboring environment via Vehicle-to-Vehicle (V2V) communications. However, how to implement this cost efficiently remains an open issue. Visible Light Communications (VLC) uses modulated visible light sources, i.e., changing the intensity of the light sent by the source, to transmit digital information, and Light Emitting Diodes (LEDs) are usually used as the transmission source. As LEDs become commonly used in automotive lighting, VLC appears as an attractive and cost-effective solution to implement V2V communications [1,2]: no extra cost is needed for the main transmission component and the additional processing circuits have very low complexity. expand
|
|
|
O'BTW: an opportunistic, similarity-based mobile recommendation system |
| |
Mai ElSherief,
Tamer ElBatt,
Ahmed Zahran,
Ahmed Helmy
|
|
Pages: 511-512 |
|
doi>10.1145/2462456.2465708 |
|
Full text: PDF
|
|
|
|
|
Embedded NFC protection and forensics for mobile phones with EnGarde |
| |
Jeremy Gummeson,
Bodhi Priyantha,
Deepak Ganesan,
Derek Thrasher,
Pengyu Zhang
|
|
Pages: 513-514 |
|
doi>10.1145/2462456.2465709 |
|
Full text: PDF
|
|
Near Field Communication (NFC) on mobile phones presents new opportunities and threats. While NFC is radically changing how we pay for merchandise, it opens a pandora's box of ways in which it may be misused by unscrupulous individuals. This could include ...
Near Field Communication (NFC) on mobile phones presents new opportunities and threats. While NFC is radically changing how we pay for merchandise, it opens a pandora's box of ways in which it may be misused by unscrupulous individuals. This could include malicious NFC tags that seek to compromise a mobile phone, malicious readers that try to generate fake mobile payment transactions or steal valuable financial information, and others. In this demo, we show the capabilities of our hardware solution, EnGarde, that protects a mobile phone from these vulnerabilities. expand
|
|
|
PAUL: proactive automated mobile user-centric content deLivery |
| |
Mohamed A. Abd ElMohsen,
Omar K. Shoukry,
Hesham El Gamal,
Tamer ElBatt,
Nayer M. Wanas,
Mohamed Abdel Raouf,
Mostafa A. Zakaria,
Ahmed I. Abdelkader,
Hakem M. Zaied
|
|
Pages: 515-516 |
|
doi>10.1145/2462456.2465710 |
|
Full text: PDF
|
|
|
|
|
POSTER SESSION: Posters |
|
|
|
|
Smartphone sensing for large data set collection of potholes |
| |
Saswat Raj,
Ayush Jain,
Rajiv Misra
|
|
Pages: 517-518 |
|
doi>10.1145/2462456.2465711 |
|
Full text: PDF
|
|
Smartphone sensing for large data set collection of potholes is useful for monitoring transportation system intelligently. Collecting large data set of different information sources such as frequency of taking brakes, honks, potholes,black-spots etc ...
Smartphone sensing for large data set collection of potholes is useful for monitoring transportation system intelligently. Collecting large data set of different information sources such as frequency of taking brakes, honks, potholes,black-spots etc becomes gigantic task by manual method. We have developed smartphone sensing based method which uses crowdsourcing to collect real large data set of pothole data from the field. In this work the method to locate and sense potholes using sensors in smartphones is discussed along with its implimentation results.We have shown how we have used crowdsourcing techniques to collect large data set on potholes efficiently using sensors available in smartphones and processing the data obtained as required for our purpose. expand
|
|
|
Authenticating and tracing biological anonym of VANET based on KMC decentralization and two-factor |
| |
Fei Wang,
Yongjun Xu,
Lin Wu,
Dan Liu,
Liehuang Zhu
|
|
Pages: 519-520 |
|
doi>10.1145/2462456.2465712 |
|
Full text: PDF
|
|
|
|
|
Carrying my environment with me in iot-enhanced smart buildings |
| |
Dawei Pan,
Abraham Hang-yat Lam,
Dan Wang
|
|
Pages: 521-522 |
|
doi>10.1145/2462456.2465713 |
|
Full text: PDF
|
|
|
|
|
Mobile user clustering in large time-scale data transfer scheduling |
| |
Ting-An Lin,
Yichuan Wang,
Cheng-Hsin Hsu,
Xin Liu
|
|
Pages: 523-524 |
|
doi>10.1145/2462456.2465714 |
|
Full text: PDF
|
|
|
|
|
Fusing prefetch and delay-tolerant transfer for mobile videos |
| |
Shu-Ting Wang,
Ting-An Lin,
Yichuan Wang,
Cheng-Hsin Hsu,
Xin Liu
|
|
Pages: 525-526 |
|
doi>10.1145/2462456.2465715 |
|
Full text: PDF
|
|
|
|
|
WhereAmI: image-based positioning in dense urban areas |
| |
Quoc Duy Vo,
Klaus Mueller,
Pradipta De
|
|
Pages: 527-528 |
|
doi>10.1145/2462456.2465716 |
|
Full text: PDF
|
|
|
|
|
A black-box based android GUI testing system |
| |
Chao-Chun Yeh,
Shih-Kun Huang,
Sung-Yen Chang
|
|
Pages: 529-530 |
|
doi>10.1145/2462456.2465717 |
|
Full text: PDF
|
|
In Android system, black box testing has risen to three key issues: S1: There is no source code and for tester to know the internal logic of the testing App. S2: There is no testing criterion for tester to know the correct behavior and testing scope ...
In Android system, black box testing has risen to three key issues: S1: There is no source code and for tester to know the internal logic of the testing App. S2: There is no testing criterion for tester to know the correct behavior and testing scope of the testing App. S3: It is difficult to measure the testing coverage without instrumentation the testing App. In this paper, we provide a approach to analyze the GUI model during the testing process, implement the a black-box based android GUI testing system and select 7 Apps for evaluation. Finally we compare our result of our system with the monkey tool and discuss the inner App's properties that influence on the testing result. expand
|
|
|
An approximation algorithm of orienteering problems for mobile computing |
| |
Chen-Chih Liao,
Cheng-Hsin Hsu
|
|
Pages: 531-532 |
|
doi>10.1145/2462456.2465718 |
|
Full text: PDF
|
|
|
|
|
Artistic eye: recognizing key viewing points of popular sites |
| |
Chih-Hsiang Hsu,
I-Chao Shen,
Wen-Huang Cheng,
Shih-Wei Sun
|
|
Pages: 533-534 |
|
doi>10.1145/2462456.2465719 |
|
Full text: PDF
|
|
|
|
|
Instrumenting Thailand's coastline: mobile devices for environmental and disaster monitoring |
| |
Mikhail Nekrasov,
Sirilak Chumkiew,
Peter Shinn
|
|
Pages: 535-536 |
|
doi>10.1145/2462456.2465720 |
|
Full text: PDF
|
|
This poster outlines ongoing work using mobile devices for communication and computation for environmental sensor networks in Thailand. This work is funded by a Fulbright scholarship spanning January to September 2013. The work is a partnership between ...
This poster outlines ongoing work using mobile devices for communication and computation for environmental sensor networks in Thailand. This work is funded by a Fulbright scholarship spanning January to September 2013. The work is a partnership between the Center of Excellence for Ecoinformatics at Walailak University, the University of California Santa Barbara, and the University of California San Diego. It brings computer scientists and biologists together for the development of technology aimed at studying Thailand's costal ecosystems. Bandon Bay, Surathani province, is home to mussel, cockle, oyster, and shrimp farmers. In March 2011, severe rainfall in the southern region of Thailand caused an influx of freshwater and sediment into the bay. Cockle and oysters were suffocated by a thick layer of sediment. The surge of water forced shrimp out into the open ocean. As a result, the aquaculture industry suffered immensely, with losses upwards of eight hundred million Baht. The aim of this project is to provide a valuable service to the region by giving farmers and locals a resource for assessing the water quality in Bandon Bay, as well as providing a warning system against possibly treacherous environmental patterns. The system utilizes a Galaxy Nexus Android phone for real-time data collection and processing. The data is streamed to an Amazon EC2 server where it undergoes event-detection and archived for later study by ecologists. The system is deployed in the Gulf of Thailand, one mile off the coast. For power, the system uses a 40W solar panel. The data is transmitted using the phone's built in cellular modem. The system utilizes a SparkFun Electronics IOIO for interfacing to external sensors and power. The phone currently interfaces with a Vaisala WXT 520 meteorological station, with plans to extend the sensor suite to include water sensors for conductivity, dissolved oxygen, and pH. The environmental conditions in the bay require a low power device that is capable of wireless communication. While there are industry devices capable of this, like the Campbell Scientific sensor suites, they are prohibitively expensive for developing nations and are heavily proprietary, impeding expansion and development. In contrast, a mobile device running open source software is a perfect candidate, as it is inherently capable of cellular communication, has a backup battery for intermittent power loss, and has the computing power necessary for data ingestion and onboard processing from a multitude of meteorological and aquatic sensors. The system utilizes the Open Source Data Turbine streaming middleware [1] for real-time buffered data streaming and visualization. It builds upon the SensorPod [2] software stack developed at UCSD for interfacing with environmental sensors. For event detection, the system utilizes Esper for complex event processing. The mobile device collects and streams the data, which is captured by the cloud server and is run through a real-time event detection engine. Both the original data and the derived analysis are then made publically accessible and mirrored to universities in Thailand in real-time, using the DataTurbine middleware. Interested parties can visualize both the data and the derived analysis in real-time. In the event of connectivity interruptions, the mobile device buffers the data and retransmits when a connection is re-established. Currently, the system is deployed in the bay, and we are in the process of writing the event detection logic. Once the system is determined to be stable, we will add water sensors necessary for flood detection. We are investigating transitioning some of the event detection logic onto the mobile device itself, but we are hesitant to use the Android compatible version of Esper, as it does not have ongoing support. If this project proves successful, we are considering mirroring the technology for use in coral observation and detection of coral bleaching. expand
|
|
|
CEGF: corner extraction by GPS filtering for power-efficient location uploading |
| |
Shih-Yung Juan,
Yi-Fan Chung,
Chung-Ta King,
Cheng-Hsin Hsu
|
|
Pages: 537-538 |
|
doi>10.1145/2462456.2465721 |
|
Full text: PDF
|
|
Over the past few years, personal sensing applications, such as travel path sharing and location recording, have been more and more popular. These applications use GPS sensors to record track points on smartphones and upload the track points to clouds ...
Over the past few years, personal sensing applications, such as travel path sharing and location recording, have been more and more popular. These applications use GPS sensors to record track points on smartphones and upload the track points to clouds in real time for information sharing. However, uploading a lot of GPS points may lead to heavy network traffic and much higher power consumption. To address the problem, we present corner extraction by GPS filtering (CEGF) that extracts corner feature GPS points (CFGPs) from GPS track points (GTPs). Applications only need to upload the CFGPs to save the uploading energy on smartphones. CFGPs can be regarded as characteristic points of corners to represent the corresponding roads. To reduce the number of uploaded points, we use CEGF to filter out the CFGPs from a large amount of GTPs. expand
|
|
|
Mobile code offloading: should it be a local decision or global inference? |
| |
Huber Flores,
Satish Srirama
|
|
Pages: 539-540 |
|
doi>10.1145/2462456.2465722 |
|
Full text: PDF
|
|
|
|
|
Framework for automated power estimation of android applications |
| |
Jemin Lee,
Hyungshin Kim
|
|
Pages: 541-542 |
|
doi>10.1145/2462456.2465723 |
|
Full text: PDF
|
|
In spite of the incredible market penetration of smartphones and rapid growth of App markets, their utility has been restricted by their battery capacity. Smartphone users are frustrated by applications consuming too much power. To avoid this experience, ...
In spite of the incredible market penetration of smartphones and rapid growth of App markets, their utility has been restricted by their battery capacity. Smartphone users are frustrated by applications consuming too much power. To avoid this experience, they may have to profile energy consumption on the phone. However, it is difficult for a user to analyze energy consumption of his phone because the process requires deep understanding of the interaction between the hardware and software. Therefore, market curators need to examine applications for providing power consumption data before accepting them into App market. Unfortunately, current App markets mainly employ basic functional tests and checking policy on the submitted applications. Moreover, considering the exponentially increasing daily amount of new Apps posted on the App market, it is not feasible to perform the process manually. Therefore, if we can provide an automated energy estimation tool for App market curators, users can have energy consumption data in addition to the current functional description. In this poster, we propose a framework for automated power estimation of android apps. expand
|
|
|
Solving network isolation problem in duty-cycled wireless sensor networks |
| |
Haiming Zhang,
Lei Shu,
Joel J.P.C. Rodrigues,
Han-chieh Chao
|
|
Pages: 543-544 |
|
doi>10.1145/2462456.2465724 |
|
Full text: PDF
|
|
|
|
|
An integrated system for indoor and outdoor location-based services (MapBiquitous): mobisys'13 poster abstract |
| |
Thomas Springer,
Tenshi Hara,
Gerd Bombach,
Sina Grunau
|
|
Pages: 545-546 |
|
doi>10.1145/2462456.2465725 |
|
Full text: PDF
|
|
|
|
|
How to harmonize wi-fi and bluetooth in a mobile device? |
| |
Wonhong Jeon,
Byeong-Moon Cho,
Kyung-Joon Park
|
|
Pages: 547-548 |
|
doi>10.1145/2462456.2465726 |
|
Full text: PDF
|
|
|
|
|
Odometer in the pocket |
| |
Lin Wu,
YongJun Xu,
ZhuLin An,
ChaoNong Xu,
Fei Wang
|
|
Pages: 549-550 |
|
doi>10.1145/2462456.2465727 |
|
Full text: PDF
|
|
Some previous work has shown the feasibility of Pedestrian Dead Reckoning (PDR) using a mobile phone, but the estimation of length walked is still a big challenge. In this paper, we propose a formula for estimating walking velocity, which can be integrated ...
Some previous work has shown the feasibility of Pedestrian Dead Reckoning (PDR) using a mobile phone, but the estimation of length walked is still a big challenge. In this paper, we propose a formula for estimating walking velocity, which can be integrated to get distance. expand
|
|
|
HyCloud: a hybrid approach toward offloading cellular content through opportunistic communication |
| |
Abouzar Noori,
Domenico Giustiniano
|
|
Pages: 551-552 |
|
doi>10.1145/2462456.2465728 |
|
Full text: PDF
|
|
The rapid proliferation of smartphones and the urge to offload mobile data is paving the way to blend the communication capabilities of cellular and opportunistic networks for delivering content. By exploiting the locality of users interested in the ...
The rapid proliferation of smartphones and the urge to offload mobile data is paving the way to blend the communication capabilities of cellular and opportunistic networks for delivering content. By exploiting the locality of users interested in the same content, the vision of HyCloud project is to design and implement a hybrid architecture where content dissemination through opportunistic communication among several clients is controlled by the online cloud. Based on the foundation of our key theoretical findings, we are implementing a prototype architecture running on Windows Phone 8 mobile devices, taking advantage of the Windows Azure cloud platform. expand
|