This document provides an agenda for the MOBISYS seminar, listing the speakers and their topics. It includes snippets of conversations between the speakers as they introduce themselves and their topics. The document discusses research related to pervasive computing, wireless networks, and mobile systems.
David Ward's keynote from JavaOne 2011 on how networks are now programmable & intuitive, allowing application developers to access real-time data, geo-loc, and more information from the network through APIs and new protocols.
Presentation delivered by David Ward at the Open Networking Summit in October 2011.
Details of OpenFlow, New Applications, and how to deliver it to your business. Network engineer & developer focused.
David Ward's keynote from JavaOne 2011 on how networks are now programmable & intuitive, allowing application developers to access real-time data, geo-loc, and more information from the network through APIs and new protocols.
Presentation delivered by David Ward at the Open Networking Summit in October 2011.
Details of OpenFlow, New Applications, and how to deliver it to your business. Network engineer & developer focused.
WebSocket is a standardized interface for continuous, bi-directional and low-overhead communication between Web browser clients and back-end servers.
This presentation provides an overview of the WebSocket interface and descriptions of four WebSocket demonstration applications: i) a multi-user Facebook game; ii) a cloud server monitor; iii) a browser-based interface to LabVIEW; and iv) an interface to a MySQL database.
Presented Jan 26, 2011 at the HTML5 & CSS3 LA User Group Meetup, Los Angeles, CA
Experimental Applications of Mapping Services in Wireless Sensor NetworksM H
Wireless sensor networks typically gather data at a number of locations. However, it is desirable to be able to design applications and reason about the data in more abstract forms than points of data. This paper examines one way in which this can be done. By bestowing the ability to predict inter-node values upon the network, it is proposed that it will become possible to build applications that are unaware of the concrete reality of sparse data. This interpolation capability is realised as a service of the network. We present an implementation of this service and discuss its merits and shortcomings. Additionally, we present an initial application of the service in the form of isopleth generation. That is, the delineation of contours of constant parameter value. Finally, we discuss the improvements required to create more sophisticated applications and services and examine the benefits these improvements would bring.
Yahoo widgets are written in blueprint, a new xforms based language that allows you to write your mobile app once and get the best possible experience in any device.
Professor Michael Devetsikiotis gave a lecture on "Networked 3-D Virtual Collaboration in Science and Education: Towards 'Web 3.0' (A Modeling Perspective) " in the Distinguished Lecturer Series - Leon The Mathematician.
More Information available at:
http://goo.gl/U5nGq
(R)evolution of the computing continuum - A few challengesFrederic Desprez
Initially proposed to interconnect computers worldwide, the Internet has significantly evolved to become in two decades a key element in almost all our activities. This (r)evolution mainly relies on the progress that has been achieved in computation and communication fields and that has led to the well-known and widely spread Cloud Computing paradigm.
With the emergence of the Internet of Things (IoT), stakeholders expect a new revolution that will push, once again, the limits of the Internet, in particular by favouring the convergence between physical and virtual worlds. This convergence is about to be made possible thanks to the development of minimalist sensors as well as complex industrial physical machines that can be connected to the Internet through edge computing infrastructures.
Among the obstacles to this new generation of Internet services is the development of a convenient and powerful framework that should allow operators, and devops, to manage the life-cycle of both the digital infrastructures and the applications deployed on top of these infrastructures, throughout the cloud to IoT continuum.
In this keynote, Frédéric Desprez and his colleague Adrien Lebre presented research issues and provide preliminary answers to identify whether the challenges brought by this new paradigm is an evolution or a revolution for our community.
WebSocket is a standardized interface for continuous, bi-directional and low-overhead communication between Web browser clients and back-end servers.
This presentation provides an overview of the WebSocket interface and descriptions of four WebSocket demonstration applications: i) a multi-user Facebook game; ii) a cloud server monitor; iii) a browser-based interface to LabVIEW; and iv) an interface to a MySQL database.
Presented Jan 26, 2011 at the HTML5 & CSS3 LA User Group Meetup, Los Angeles, CA
Experimental Applications of Mapping Services in Wireless Sensor NetworksM H
Wireless sensor networks typically gather data at a number of locations. However, it is desirable to be able to design applications and reason about the data in more abstract forms than points of data. This paper examines one way in which this can be done. By bestowing the ability to predict inter-node values upon the network, it is proposed that it will become possible to build applications that are unaware of the concrete reality of sparse data. This interpolation capability is realised as a service of the network. We present an implementation of this service and discuss its merits and shortcomings. Additionally, we present an initial application of the service in the form of isopleth generation. That is, the delineation of contours of constant parameter value. Finally, we discuss the improvements required to create more sophisticated applications and services and examine the benefits these improvements would bring.
Yahoo widgets are written in blueprint, a new xforms based language that allows you to write your mobile app once and get the best possible experience in any device.
Professor Michael Devetsikiotis gave a lecture on "Networked 3-D Virtual Collaboration in Science and Education: Towards 'Web 3.0' (A Modeling Perspective) " in the Distinguished Lecturer Series - Leon The Mathematician.
More Information available at:
http://goo.gl/U5nGq
(R)evolution of the computing continuum - A few challengesFrederic Desprez
Initially proposed to interconnect computers worldwide, the Internet has significantly evolved to become in two decades a key element in almost all our activities. This (r)evolution mainly relies on the progress that has been achieved in computation and communication fields and that has led to the well-known and widely spread Cloud Computing paradigm.
With the emergence of the Internet of Things (IoT), stakeholders expect a new revolution that will push, once again, the limits of the Internet, in particular by favouring the convergence between physical and virtual worlds. This convergence is about to be made possible thanks to the development of minimalist sensors as well as complex industrial physical machines that can be connected to the Internet through edge computing infrastructures.
Among the obstacles to this new generation of Internet services is the development of a convenient and powerful framework that should allow operators, and devops, to manage the life-cycle of both the digital infrastructures and the applications deployed on top of these infrastructures, throughout the cloud to IoT continuum.
In this keynote, Frédéric Desprez and his colleague Adrien Lebre presented research issues and provide preliminary answers to identify whether the challenges brought by this new paradigm is an evolution or a revolution for our community.
STPCon fall 2012: The Testing Renaissance Has ArrivedSOASTA
This session shares how you can catapult your career with cloud-based test automation and mobile testing techniques that are as exciting to learn and use as they are impactful to your end results and personal success!
1) Become a cloud testing expert
2) Build and articulate a distributed mobile testing strategy
3) Champion a new approach to realistic, repeatable web and mobile performance testing
4) Establish yourself as an agile testing expert with Continuous Testing
5) Defend “Test” in a world heading toward “DevOps”
Cloud Computing is a proven advantage for testers and mobile app testing is a veritable testing green field for those willing to charge ahead.
Learn the new “arts” - embrace this new world – and become a Renaissance Tester!
Cloud computing revolutionized application design, and changed the way people think about infrastructure. The rise of cloud computing coincided with a new generation of applications and services that required scale. New architecture and design had to take into account low latency network connectivity, geographic distribution, large real-time data stores, the ability to meet demand (while not knowing exactly how much demand to handle), and so much more. We refer to this as Internet Scale.
Yet most discussion of scale and cloud revolves around compute as virtualized instances, which have defined configurations and constrained options. Delivering on the promise of Internet Scale involves substantial upfront design, and a comprehensive understanding of the entire architecture - from the underlying hardware, to the operating system, the application stack, services, and deployment. And, it involves choice - choices you should make based on your requirements. Join us for a discussion on the many facets of Internet Scale, and how it can apply to your applications and services.
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...DellNMS
Dell Performance Monitoring Network Management solutions can provide your IT department with the affordable, in-depth visibility and actionable monitoring needed to manage network infrastructure complexity.
Join our webcast to learn how:
• Dynamic discovery of equipment provides the ability to map current location, configuration and interdependencies.
• Real-time visibility across network infrastructures can help ensure availability and performance.
• Actionable information about network health, faults, bandwidth hogs and performance issues reduces the mean-time-to-resolution.
• Proactive analysis can pinpoint the root cause of intermittent, hard to find problems.
Visualizing and optimizing your network is easier than you think
Understanding mobile service usage and user behavior pattern for mec resource...Sabidur Rahman
Zettabytes of data is collected every minute (which qualifies as Big Data) on mobile service usage and network status from all over the network. But the data was not actionable because Network being static hardware and lack of proper orchestration/management . With the moving trend towards Virtualization of Network and Mobile Edge Computing, we see a future where collected data can lead to actionable Resource Management.
Mobile IoT Middleware Interoperability & QoS Analysis - Eclipse IoT Day Paris...Nikolaos Georgantas
Research results by the Inria Paris MiMove Team on Mobile IoT Middleware Interoperability & QoS Analysis. Presentation at Eclipse IoT Day Paris Saclay 2019
This is the subject slides for the module MMS2401 - Multimedia System and Communication taught in Shepherd College of Media Technology, Affiliated with Purbanchal University.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
3. Content sharing in Urban Environments
Liam McNamara <l.mcnamara@cs.ucl.ac.uk>
4. Who to download from?
Short-range wireless networks can have
huge churn.
We need to choose someone with matching
tastes that will be colocated long-
enough to transfer a file.
Thus, we need to predict neighbours
colocation length.
'Bad' sources need to be avoided.
5. What to download from them?
If files can be successfully
transferred, which ones should be
shared first?
Pop
Jazz
Classical
Rock
Daniel
Blues
Country Carol
Alice Rock?
Pop Metal?
Rock Bob Blues?
6. Future Work
File percolation through network.
Improve Symbian sharing application.
Deployment (with your help!)
Thesis :/
8. [problem]: Adaptive Service Discovery in Mobile Systems
Web Service discovery in mobile systems using a broker.
Service
Request Query
Mobile Service
Broker
Device Repository
Service Matching
Binding Services
Factors that may affect web service requirements in
Mobile Systems
•Context : Network Coverage, Other Local Devices, User
Preferences etc.
• Resources : Battery Level, Memory Usage, CPU load etc
The broker cannot assess such variables.
Panagiotis Papakos
9. [proposal] : A middleware approach
Problem
The web service requirements (QoS requirements,
functionality etc) of a mobile device may change due to
changes in the context or the resources of the mobile
device.
Proposal
A middleware that :
• Monitors the Resources of the Device
• Monitors the Context of the Device
• Adapts the web service Request appropriately
10. Proposed Architecture
Context and Adapted
Resource data Service Request
Middleware Query
Mobile
Service Request Broker
Device
Matching
Service Binding Services
Use of States to indicate status of the device (Low Power,
Low Connection, Emergency, Meeting etc)
Adapt the Web Service Request according to the State of the
device:
• QoS Requirements
• Functional Requirements
• Trust
11. [future work]
Work in Conjunction with the Dino Project by Arun Mukhija
(SENSORIA).
Future Work:
• Further Development
• Prototype Implementation
• Case Studies
Expand To Include :
• Adapt requirements according to broker feedback
• Interaction between devices using this middleware
• Reconfiguration of the device according to state
13. [problem] : How can we make efficient use of social
links for routing messages in delay tolerant networks?
How often (and how long) different individuals meet. (e.g. two friends are likely to
meet at least once a week)
How often (and how long) different individuals spend within the proximity of a certain
geographical location. (e.g. two individuals working in the same building)
What time are individuals likely to be in certain locations. (e.g. people working
together are likely to be in the same location during working hours, and only on
certain days of the week)
[Jenson Taylor]
14. [Snout]
Participatory sensing
Users act as mobile nodes
In theory it seamlessly fits into everyday life
-
Snout platform
-
sensors - co,co2,sound & organic solvents
-
GPS
-
Geocentric visualisation of sensor readings
15. routing in “social delay tolerant networks”
Efficient routing in delay tolerant mobile networks
Network characteristics:
Nodes are at one with users
Nodes don’t have permanent connection to network
No logical addresses
Communication is asynchronous
Packet loss is tolerated
Efficiency definition:
Resource usage, Overhead/replication/
Message delivery speed (time)
Message delivery number of hops
Using influence maps to determine the next hop in the
delivery route
17. [Problems]
Tools for supporting the development
of control software [With: ARAGORN,
CHAT]
Control of cross-layer optimisation
in wireless network [With: ARAGORN]
Information and Reputation [With:
Steve]
Mohamed Ahmed
18. [complications or proposals]:Plenty of both!
Components based software and policy
languages for real-time and fast
executing systems
ML and control architectures for
management and adaptation
The limits and bounds of reputation
based analysis
19. [future work]:
Can we make these systems work? How
well? What are the compromises?
Development of systems
Experimentation with learning and
control architectures
21. [Problem]: How do bandwidth constraints impact
the distribution of intensive jobs in WSNs?
1. Computationally intensive applications.
Resource-constrained devices.
8. Limited available bandwidth.
Radio communication interferences.
[Elisa Rondini]
22. [Proposal]: Bandwidth-Aware Task Scheduling
(BATS) scheme for Distributed Wireless Ad hoc
Grids (DWAG) in WSNs.
• Distributed Wireless Ad hoc Grids (DWAG)
to implement distributed algorithms in WSNs
formed by resource-constrained devices.
• Bandwidth-Aware Task Scheduling (BATS)
to load share location computing tasks among
sensors by assessing both node computational
capabilities and local network conditions.
23. Homogeneous Tasks: application of DWAG with
BATS for Collaborative Node Localisation (i.e.
CCA-MAP*).
* L. Li and T. Kunz, “Cooperative Node Localization for Tactical Wireless Sensor Networks”, in Proc. of the IEEE/Boeing MILCOM, October
2007.
* L. Li and T. Kunz, “Cooperative Node Localization Using Non-Linear Data Projection”, in ACM Transactions on Sensor Networks, 2008.
24. [Future work]: What happens if we deal with
more heterogeneous tasks?
Need to combine nodes’ computational
capabilities and local network conditions
(external characteristics) with tasks’ CPU
and Bandwidth profile characterizations.
26. Efficient Pattern Detection in WSNs
[text or images here]
Complex Events:
Wildfire detection,
Flash flood prediction, etc.
Michael Zoumboulakis
27. Efficient Pattern Detection
Patterns that are extremely difficult
or impossible to capture using
thresholds.
May not be known in advance.
Symbolic Conversion is a successful
technique for mining time-series.
We have adapted a SC algorithm for
efficient real-time mining in WSNs.
28. Efficient Pattern Detection
Multiple-pattern detection using
Suffix Arrays; Advantage: scalability.
Approximate pattern matching;
Advantage: flexibility.
Unknown pattern matching; Advantage:
efficiency through dynamically
adjusting the sampling frequency.
Light-weight implementation optimised
using integer arithmetic.
29. Current & Future Work
[text or images here]
Design a framework that
caters for Detection of
Spatial Events.
Use a few readings to infer
the nature and
characteristics of the event.
32. [Proposal]: Team of Mobile Agents
No prior knowledge of the area’s map. (which can change after a disaster).
Lack of exact knowledge of agents’ positions.
Long-range Agent-to-Agent communication is unreliable.
33. Give Us Algorithms!
(Agent-to-Tag):
Multiple D epth First
S earch
B rick&Mortar
(Tag-to-Tag):
HybridE xploration
36. Pervasive Navigation
Pervasive computing systems
record user interactions with
physical and digital resources
Common Tasks
− Usage Analysis
− Prediction
− Pattern Recognition
No unified methodology exists
to deal with common problems
37. Proposal
A probabilistic model for the
representation of user interaction with
the pervasive computing space
Trail based analysis
− Landmarks, significant objects in
space
− Trails, series of landmark
interactions
Use of different metrics
− Time, Space, Orientation
Use for different pervasive systems
− Reality Mining, Dartmouth, Cityware
41. [large-scale simulation of
vehicular networks]
Current network simulation tools
available require many CPU hours
to run even small simulations on
a single-processor machine
collision avoidance
adaptive vehicle routing
information dissemination
charging/toll systems
intelligent transport systems
Given the applications required
of vehicular network
simulations, the results are
often time-dependent
[tom hewer]
42. [computational expense]
complexity of the network and mobility models
tight-coupling such that models interoperate
the granularity of models for locale can be changed
N-squared and N-log(N) problems as a function of
connectivity
42
43. [challenges of HPC]
how to decompose the simulation?
Domain and task farming algorithms for vehicular simulations
require much boundary communication
Component decomposition allows us to keep this boundary
communication low but still keep the simulation free of
causality/synchronisation problems
Technique:
split the nodes into lists
(per processor available)
create a global simulation
object on each processor and
perform all processing for
each node on its home
processor
then update the global object
44. [future work]
efficiency of decomposition algorithm
hierarchical binning method to split nodes
adaptive binning and live movement
parameter search simulations
explore the parameter space and compare results
node aggregation and processing efficiency
visualisation and processing
live view and steering
validation of scenarios and
applications
reference to live studies
accurate and sound analysis/statistics
46. Information Dissemination
in Vehicular Networks
• Growing number of vehicles with Navigation Systems
• Add short-range radio (e.g. wifi)
• Applications of vehicular networks
– traffic information dissemination
– safe navigation (warnings)
– urban sensing (monitor traffic, vehicles as sensors)
– parking slots (fine grained information)
– gas stations fuel prices
– advertising
– ...
• Push-based
– e.g., notify me on all traffic
jams on my route
• Pull-based
– e.g., how is the traffic on M11 ?
Ilias Leontiadis, Cecilia Mascolo
47. The role of the Navigation System
– Suggested routes M o bility pa tterns predic ta ble
– Route/Disseminate information in specific areas
– Suggested routes I nteres ts (e.g. receive warnings on my
route)
– Map information L o c a tio n a s c o ntex t (flexible
topics/matching)
– Describe warnings/affected areas flexibly
– Describe interests
48. Push based notifications
(e.g. traffic warnings/accidents)
Navigation system now provides automatic
subscription to events about vehicle’s route
– Use infrastructure (if available)
– Vehicle-to-Vehicle communication when:
• No infrastructure is available
• Local information
• Fine grained information (e.g. parking spots)
– We use the Navigation System to:
• Geographically route information in affected areas.
• Keep disseminating information in affected areas
• Inform only affected vehicles (given by the suggested route)
49. Pull based notifications
(e.g. how is the traffic on M11 )
• Opportunistic routing to forward
requests to the nearest infostations
• Issue: how to deliver the reply back ?
– target is moving
• Solution
– We use the Navigation System to Route the
reply back on the suggested route of the
requested vehicle
50. Future work
Currently Implementing the system
− Testing with small fleet of bicycles and limited
number of vehicles
Working on traffic information dissemination
− Every vehicle collects traffic information and
“Publish” this information to the affected vehicles.
− Vehicles that receive information
estimate traffic conditions on parts of their route
select paths that will minimise TIME
52. [secure autonomy in pervasive healthcare]
The Nurse SMC loads a Mission (a set of policies) onto a SMC that belongs
to the patient role. E.g. LoadMission(ReadTemp);
The Mission requires the Patient to: Two authorisation policies are needed:
take a temperature reading
•
3.A nurse SMC is the subject of an
•
send the data to the Nurse authorization policy that grants the nurse
role permission to load missions on
if their temperature is abnormal.
members of the patient role.
Mission ReadTemp{
4.The patient SMC needs to be granted
Patient.Temp.read(): Temp permission to execute any remote
invocations on the nurse interfaces are
if Temp>40C specified as part of the mission.
Nurse.Notify(Temp)
}
[Eli Katsiri]
53. [common representation]
if (type==PKT_CMD)
//remote invocation
{
//Access Control Module
if
(AC.authorise(srcid,oid,cmd)==TRUE)
execute(msg);
}
else {
//event
//Policy Service
call EventInterface( msg);
}
}
Publications BSN2008, invited book chapter JCKSBE08
55. [first-order logic model]
1. Model based knowledge representation and
reasoning.
3. First-order logic: expressiveness closer to user
intuition
5. Other security/trust mechanisms that are
applicable to BSN.
Publications JKBSE08, invited book chapter JKBSE08
57. [How trustworthy are my friends?]
Does regularity in social behavior imply trustworthiness?
How does the degree of regularity affect trustworthiness?
How can we detect/evaluate regularity?
8. Summary of the social interaction in two real world datasets.
9. Analysis of complex social-spatial-temporal context
10. Recognising social patterns in daily user activity and relationships
11. Identifying socially significant locations
12. applications which will be of significant value to e-business.
[Kones Saravanamutu]
58. N. Eagle and A. Pentland (2007), quot;Eigenbehaviors: Identifying Structure in Routinequot;, Behavioral Ecology and Sociobiology
[What’s the story with my MIT mates?]
N. Eagle and A. Pentland (2007), quot;Eigenbehaviors: Identifying Structure in Routinequot;,
Behavioral Ecology and Sociobiology
59. [What about my ENRON colleagues?]
P.S. Keila and D.B. Skillicorn(2005),quot;Structure in the Enron Email Datasetquot;,
Retrieved on June,2008. http://research.cs.queensu.ca/~skill/enron.pdf
60. [Next Steps]
[text or images here]
•
Apply image processing techniques such as
Eigenbehaviors and PCA to bitmaps that are
derived from the visualisation.
•
N. H. Minsky. “Regularity-based trust in
Cyberspace”. In proceedings of 1st Int, Conf. on