Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey
|
|
- Shannon Smith
- 5 years ago
- Views:
Transcription
1 Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey N. Kayastha,D. Niyato, P. Wang and E. Hossain, Proceedings of the IEEEVol. 99, No. 12, Dec Sabita Maharjan Simula Research Laboratory University of Oslo Sep. 2012
2 This talk presents an overview of mobile social networks, architectures and protocol design issues Overview Protocol Design and Challenges
3 A Mobile Social Network (MSN) provides data delivery services exploring the social among mobile users
4 A social network is a structure of en@@es that are connected to each other through interdependencies Interdependencies Shared values, Physical contacts, Financial exchanges, Commodity trades, Group par@cipa@ons Knowledge about the structures among the users of a social network <- > efficiency and effec@veness of network services.
5 MSNs is an emerging, cross- disciplinary field, that combines the concepts from the social networks and mobile Social networks Mobile networks + = Mobile social networks (MSNs)
6 A MSN is a mobile communica@ons system which involves the social rela@onship of the users The knowledge of social behavior and structure can be used for designing and providing efficient and effec@ve data communica@ons services Rou@ng and data dissemina@on Bandwidth and compu@ng capacity alloca@on Storage and power consump@on.. Content publishing Data exchange Sharing Delivery services..
7 Mobility aspect is the major difference between the MSN service and a classical social network service Mobile users not only transmit data but also provide constant feedback to improve the services This feedback is basically the social rela@onship among mobile users Mobility can be used as addi@onal informa@on to analyze the social rela@onship among mobile users
8 Mobile Social Network : Types and Components
9 Types of MSNs Types of MSN with web- based through internet is based on contacts Eg., iphone facebook app, Whozthat, Google la5tude,.. Web based MSN Decentralized MSN Eg. EyeVibe Use simple wireless protocols to transfer users and bind it with contextual Centralized structure Wireless technologies such as Bluetooth, WiFi, are used to exchange and share to a centralized server is not needed
10 Components of MSNs Content providers (CPs) - fixed dedicated server - injects contents/data to users Mobile users/devices - mobile devices - have different wireless interfaces Network infrastructure - used for data transfer - centralized and opportunis@c network architectures
11 Mobile Social Network : Applica@ons
12 of Mobile Social Networks (1) Online Social Networking to Mobile Social Networking Services Key Knowing people and making friends through online social networks MSNs add freedom of movement ease of use and seamless Advanced services in mobile phones such as GPS, accelerometers, touch technology etc. are the key facilitators Issues Usability, availability, privacy and security
13 of Mobile Social Networks (2) Healthcare services Key Helping people with various physical and mental illness Free web- based social networking CaringBridge, mcare, MSNs can provide easy access to required data during emergencies Special and strong support to people with severe mental illness and life altering diseases - eg., to locate them when they are lost or confused about their loca@ons (GPS, LBS)
14 of Mobile Social Networks (3) Based Services Provides specific to a loca@on using GPS or signal triangula@on of cellular towers Loca@on based informa@on + social network contextual services, eg., loca@ng friends, the nearest ATM,.. Some popular MSN- ing applica@ons: Google la@tude, Loopt, Gypsii, Whrrl, Mobiluck, Foursquare,.. Issues: privacy
15 of Mobile Social Networks (4) Wearable services A wearable network consists of mobile devices which can be used for - behavioral modeling - health monotoring - entertainment Can augment real and virtual world social interac@ons Applica@ons: Hug Shirt, Patches, iband, Anything that can be worn on body and that provides a sense of closeness, is a mobile device
16 Mobile Social Network : Architectures
17 MSN: Architectures (1) Hybrid Mobile users contact the CP when the centralized network structure is available, and data can be exchanged/shared/ delivered based on (re)encounters A centralized server is used to exchange data between CP and mobile users MSN Architectures Mobile users communicate directly - opportunis@c contacts - based on common interests, mobility paherns Centralized Distributed
18 MSN: Architectures (2): Centralized Architecture Almost all web based which depend on CPs updates. Eg., Facebook Typical middlewares: MobiSoc, Roadspeak (virtual chat groups for vehicular social networks) Advantages: - simplicity of implementa@on, - high efficiency Issues: - a single point of failure - conges@on (bohleneck)
19 MSN: Architectures (3) : Distributed Architecture Dedicated middlewares provide func@onali@es such as - storing the interests - iden@fying other users - sharing data Typical middleware: Mobiclique Advantages: - No need of a central server - scalability Issues: - Community detec@on - rou@ng - content distribu@on - delivery delays
20 MSN: Architectures (4) : Hybrid Architecture Mul@mode devices facilitate hybrid architecture - cellular network can guarantee the performance of data delivery - ad hoc network can reduce the cost Typical eg.,: A hybrid middleware plaiorm based on Jini Surrogate Architecture (JSA) - uses lookup service to register different services - centralized - upon registra@on, interac@on with device service: decentralized Advantages: - Benefits of both architectures Issues: - Network switching
21 Access Infrastructure for Mobile Social Networks
22 and Networking, the key components, can be achieved using different network infrastructures - seamless connec@on - most popular for web based MSN Cellular and WiFi N/w - history of call records <- > iden@fying social rela@onship to build the MSN - prolonged disconnec@on, par@@ons and unpredictable and unstable topologies - mapping to human characteris@cs - Issue: packet rou@ng and forwarding Opportunis@c N/w Access Infrastructure - Low cost, flexibility, - user- centric <- > collect user behavior - Contexual informa@on - Actuators eg., wearable services - Issue: data interpreta@on Wireless Sensor and Actuator N/w
23 Protocol Design for Mobile Social Networks: Issues and Related Approaches
24 The networking protocols can be modified by the mobility pahern and social to improve the performance of data delivery services in MSNs Community Different MSN Aspects for Protocol Design Context Aware Data Transmission Mobility Modeling
25 Protocol Design for MSNs (1) Community discovers unknown clusters or groups sharing the same social behavior or interests Metrics - Degree centrality - Betweenness centrality - Closeness centrality Content Distribu@on: Find appropriate forwarding nodes/links to reduce delay and increase delivery efficiency Important factors - bandwidth u@liza@on - mobility - dura@on of encounter - message duplica@on, Algorithms based on - Heuris@c Measures - Influence maximiza@on Approaches based on - Social Measures - Mobility pahern and control - Op@miza@on
26 Protocol Design for MSNs (2) Context awareness means having the knowledge of the in which a device is being used Provides intelligent reasoning and understanding, which are helpful for user discovery, managing processing, rou@ng, privacy protec@on Eg., whozthat, CenceMe, Privacy implementa@on in MSN- ing applica@ons is very challenging - context aware privacy protec@on <- > real mobility models - Context aware algorithms in social rou@ng: futher research needed - LBS most security sensi@ve - Proximity detec@on algorithms without disclosing exact loca@ons Realis@c mobility models that represent every- day movements and behavior, are required - Mobility models for ad hoc networks - real scenario traces Data training for simula@ons to develop effec@ve rou@ng and dissemina@on protocols Virtual Social Simulated Environment is the closest state driven simula@on model that uses Second Life
27 Open Issues and Future Research Usage and Es5ma5on of Social Network Metrics Radio Resource Management for Wireless Access and QoS Support Resource Efficient Protocols Cross- layer Design of Protocols Radio Techniques Mobile Peer- to- Peer Networks Standard Interface
28 Summary The of mobile social networks are beyond playing games and listening to favourite music. MSNs can help elderlies and sick people, can ease life with services such LBS The mobility of users adds challenges to the design of appropriate architectures, protocols and efficient algorithm However, many mobilty models can be The MSN can be built on top of most of the heterogeneous wireless networks
Applications, Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey
CONTRIBUTED P A P E R Applications, Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey Mobile social networks that can define behavior of people, devices, and systems are surveyed
More informationCCW Workshop Technical Session on Mobile Cloud Compu<ng
CCW Workshop Technical Session on Mobile Cloud Compu
More informationWireless Mul*hop Ad Hoc Networks
Wireless Mul*hop Guevara Noubir noubir@ccs.neu.edu Some slides are from Nitin Vaidya s tutorial. Infrastructure vs. Ad Hoc Wireless Networks Infrastructure networks: One or several Access- Points (AP)
More informationhashfs Applying Hashing to Op2mize File Systems for Small File Reads
hashfs Applying Hashing to Op2mize File Systems for Small File Reads Paul Lensing, Dirk Meister, André Brinkmann Paderborn Center for Parallel Compu2ng University of Paderborn Mo2va2on and Problem Design
More informationFrom Connected Cars to Smart Ci9es: Novel Applica9ons for Wireless Communica9on
Distributed Embedded Systems University of Paderborn From Connected Cars to Smart Ci9es: Novel Applica9ons for Wireless Communica9on Falko Dressler dressler@ccs-labs.org Science Brunch, Zurich From Connected
More informationSense & Sensibility for Wireless Networks. Hari Balakrishnan Department of EECS and CSAIL M.I.T. nms.csail.mit.edu/~hari
Sense & Sensibility for Wireless Networks Hari Balakrishnan Department of EECS and CSAIL M.I.T. nms.csail.mit.edu/~hari The Era of Truly Mobile Computing 2000 Internet Users (Millions) 1600 1200 800 400
More informationDeveloping an IDE4L Grid
Developing an IDE4L Grid Presenter: Antonino Riccobono, Ph.D. RWTH Aachen University Project Coordinator: Prof. Sami Repo Tampere University of Technology 5 th November 2014 SLIDE 2 Contents Overview of
More informationCellular Networks and Mobile Compu5ng COMS , Spring 2012
Cellular Networks and Mobile Compu5ng COMS 6998-8, Spring 2012 Instructor: Li Erran Li (lierranli@cs.columbia.edu) hkp://www.cs.columbia.edu/~coms6998-8/ 3/26/2012: Cellular Network and Traffic Characteriza5on
More informationAutonomic Mul,- Agents Security System for mul,- layered distributed architectures. Chris,an Contreras
Autonomic Mul,- s Security System for mul,- layered distributed architectures Chris,an Contreras Agenda Introduc,on Mul,- layered distributed architecture Autonomic compu,ng system Mul,- System (MAS) Autonomic
More informationHuman Factors in Anonymous Mobile Communications
Human Factors in Anonymous Mobile Communications Svenja Schröder Research Group, University of Vienna Talk at the PhD School at the Android Security Symposium, September 9 th, 2015 in Vienna Svenja Schröder,
More informationTerraSwarm. A Machine Learning and Op0miza0on Toolkit for the Swarm. Ilge Akkaya, Shuhei Emoto, Edward A. Lee. University of California, Berkeley
TerraSwarm A Machine Learning and Op0miza0on Toolkit for the Swarm Ilge Akkaya, Shuhei Emoto, Edward A. Lee University of California, Berkeley TerraSwarm Tools Telecon 17 November 2014 Sponsored by the
More informationCellular Networks and Mobile Compu5ng COMS , Spring 2012
Cellular Networks and Mobile Compu5ng COMS 6998-8, Spring 2012 Instructor: Li Erran Li (lierranli@cs.columbia.edu) hkp://www.cs.columbia.edu/~coms6998-8/ 2/27/2012: Radio Resource Usage Profiling and Op5miza5on
More informationCIP- OSN Online Social Networks as Graphs. Dr. Thanassis Tiropanis -
CIP- OSN Online Social Networks as Graphs Dr. Thanassis Tiropanis - tt2@ecs http://vimeo.com/58729247 http://socialnetworks.soton.ac.uk The narra9ve Web Evolu9on and Online Social Networks Web Evolu9on
More informationThe Meter-ON project. Marco Baron Enel Distribuzione. Steering the implementation of smart metering solutions throughout Europe
Steering the implementa.on of smart metering solu.ons throughout Europe The Meter-ON project Steering the implementation of smart metering solutions throughout Europe Session 47: Operational challenges
More informationProAc&ve Rou&ng In Scalable Data Centers with PARIS
ProAc&ve Rou&ng In Scalable Data Centers with PARIS Theophilus Benson Duke University Joint work with Dushyant Arora + and Jennifer Rexford* + Arista Networks *Princeton University Data Center Networks
More informationMFTP: a Clean- Slate Transport Protocol for the Informa8on Centric MobilityFirst Network
MFTP: a Clean- Slate Transport Protocol for the Informa8on Centric MobilityFirst Network Kai Su (presen8ng), Francesco Bronzino, K. K. Ramakrishnan*, and Dipankar Raychaudhuri WINLAB, Rutgers University
More informationNASPInet 2.0 The Evolu4on of Synchrophasor Networks
NASPInet 2.0 The Evolu4on of Synchrophasor Networks NASPI Working Group Mee4ng San Mateo, California March 24, 2015 Dick Willson and Dan LuKer Allied Partners LLC 1 Agenda Future Synchrophasor Networks
More informationToday s Objec2ves. Kerberos. Kerberos Peer To Peer Overlay Networks Final Projects
Today s Objec2ves Kerberos Peer To Peer Overlay Networks Final Projects Nov 27, 2017 Sprenkle - CSCI325 1 Kerberos Trusted third party, runs by default on port 88 Security objects: Ø Ticket: token, verifying
More informationInterna'onal Community for Open and Interoperable AR content and experiences
where professionals get the latest information about standards for AR Interna'onal Community for Open and Interoperable AR content and experiences Summary Report of Fourth Mee'ng Oct 24-25 2011 At- a-
More informationWireless and Mobile Networks
Wireless and Mobile Networks Reading: Sec7ons 2.8 and 4.2.5 COS 461: Computer Networks Spring 2010 (MW 3:00 4:20 in COS 105) Mike Freedman hkp://www.cs.princeton.edu/courses/archive/spring10/cos461/ 1
More informationComparison of Cloud Middleware Protocols and Subscrip7on Network Topologies using CReST, the Cloud Research Simula7on Toolkit
Comparison of Cloud Middleware Protocols and Subscrip7on Network Topologies using CReST, the Cloud Research Simula7on Toolkit John Cartlidge & Dave Cliff University of Bristol, UK 1 Outline 1. Frame the
More informationMobile Ad Hoc Networks: Basic Concepts and Research Issues
Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full
More informationA MAC protocol for Reliable Broadcast Communica7ons in Wireless Network- on- Chip
A MAC protocol for Reliable Broadcast Communica7ons in Wireless Network- on- Chip Sergi Abadal (abadal@ac.upc.edu) Albert Mestres, Josep Torrellas, Eduard Alarcón, and Albert Cabellos- Aparicio UPC and
More informationDecentralized K-Means Clustering with Emergent Computing
Decentralized K-Means Clustering with Emergent Computing Ryan McCune & Greg Madey University of Notre Dame, Computer Science & Engineering Spring Simula?on Mul?- Conference 2014, Tampa, FL Student Colloquium
More informationHow to live with IP forever
How to live with IP forever (or at least for quite some 5me) IPv6 to the rescue! Solves all problems with IPv4 Standardized during the 1990 s Final RFC in 1999 IPv4 vs IPv6 32- bit addresses IPSec op5onal
More informationECE 1160/2160 Embedded Systems Design. Projects and Demos. Wei Gao. ECE 1160/2160 Embedded Systems Design
ECE 1160/2160 Embedded Systems Design Projects and Demos Wei Gao ECE 1160/2160 Embedded Systems Design 1 Project Group project 45% Proposal presentation 5% Midterm presentation/demo 10% Final presentation/demo
More informationOp#mizing MapReduce for Highly- Distributed Environments
Op#mizing MapReduce for Highly- Distributed Environments Abhishek Chandra Associate Professor Department of Computer Science and Engineering University of Minnesota hep://www.cs.umn.edu/~chandra 1 Big
More informationA Model-Driven Approach to Situations: Situation Modeling and Rule-Based Situation Detection
A Model-Driven Approach to Situations: Situation Modeling and Rule-Based Situation Detection Patrícia Dockhorn Costa Izon Thomas Mielke Isaac Pereira João Paulo A. Almeida jpalmeida@ieee.org http://nemo.inf.ufes.br
More informationA Survey of Context-Aware Mobile Computing Research
A Survey of Context-Aware Mobile Computing Research Guanling Chen and David Kotz 2005.11. 14 Cho Jaekyu jkcho@mmlab.snu.ac.kr Contents 1 2 3 4 5 6 7 8 Introduction Definition of Context Context-Aware Computing
More informationSwarm at the Edge of the Cloud. John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013
Slide 1 John Kubiatowicz UC Berkeley Swarm Lab September 29 th, 2013 Disclaimer: I m not talking about the run- of- the- mill Internet of Things When people talk about the IoT, they often seem to be talking
More informationNext hop in rou-ng Summary of Future Internet WP1 work. Hannu Flinck
Next hop in rou-ng Summary of Future Internet WP1 work Hannu Flinck Original focus on Rou-ng Scalability Mo$va$on: Internet Architecture Board stated (in RFC 4984): rou-ng scalability is the most important
More informationEmerging Trends and Opportunities
Emerging Trends and Opportunities Smart Homes & End User Engagement track_ TEF. Digital 06.11.2014 Emilio Martinez Head of Utilities & Building Energy Efficiency Telefonica M2M Global Unit 1 Wireless Connectivity
More informationActive source routing for ad-hoc network: seamless integration of wireless environment
Active source routing for ad-hoc network: seamless integration of wireless environment 1. Introduction Active networking is the emerging technology that will provide new network environment where lots
More informationUNIT 12A The Internet: Fundamentals
UNIT 12A The Internet: Fundamentals 1 What is the Internet? The Internet is a system to deliver data (bits) from one computa?onal device to another. No one en?ty controls/owns the Internet. The Internet
More informationIP-Layer Handover Transport Layer Mobility
IP-Layer Handover Transport Layer Mobility h"p://www.cs.unibo.it./difelice/sm/ Mobile Systems Prof. Marco Di Felice Department of Computer Science and Engineering University of Bologna q IP-Layer handover
More informationSEDA An architecture for Well Condi6oned, scalable Internet Services
SEDA An architecture for Well Condi6oned, scalable Internet Services Ma= Welsh, David Culler, and Eric Brewer University of California, Berkeley Symposium on Operating Systems Principles (SOSP), October
More informationAn Introduction to Cyber-Physical Systems INF5910/INF9910
An Introduction to Cyber-Physical Systems INF5910/INF9910 1 Outline What is Cyber Physical Systems (CPS)? Applications Challenges Cyber Physical CPS 2 Cyber Systems Cyber is More than just software More
More informationDistributed Systems. Communica3on and models. Rik Sarkar Spring University of Edinburgh
Distributed Systems Communica3on and models Rik Sarkar Spring 2018 University of Edinburgh Models Expecta3ons/assump3ons about things Every idea or ac3on anywhere is based on a model Determines what can
More informationLink Layer. w/ much credit to Cisco CCNA and Rick Graziani (Cabrillo)
Link Layer w/ much credit to Cisco CCNA and Rick Graziani (Cabrillo) Administra>via How are the labs going? Telnet- ing into Linux as root In /etc/pam.d/remote comment out line auth required pam_securely.so
More informationDASH7 Alliance Protocol
DASH7 Alliance Protocol D7A Meeting Paris June 16 th, 2014 Yordan Tabakov PAG Chair yordan@wizzilab.com ORIGINES The DASH7 Alliance Protocol originates from ISO/IEC 18000-7 ISO/IEC 18000 is an interna@onal
More informationDistributed Systems. Communica3on and models. Rik Sarkar 2015/2016. University of Edinburgh
Distributed Systems Communica3on and models Rik Sarkar 2015/2016 University of Edinburgh Models Expecta3ons/assump3ons about things Every idea or ac3on anywhere is based on a model Determines what can
More informationDistributed Systems - Mertz & McCarthy
Design Issues in Distributed Mobile Applications Association Sensing and Context Awareness Security and Privacy Adaptation Devices Appear and disappear from the space. Do so unpredictably May be totally
More informationDistributed Systems INF Michael Welzl
Distributed Systems INF 3190 Michael Welzl What is a distributed system (DS)? Many defini8ons [Coulouris & Emmerich] A distributed system consists of hardware and sodware components located in a network
More informationToward Wireless Clinical Monitoring
Toward Wireless Clinical Monitoring Chenyang Lu Department of Computer Science and Engineering Outline Clinical event detec9on Wireless clinical monitoring for general hospital units Wireless structural
More informationMODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS
MODIFIED VERTICAL HANDOFF DECISION ALGORITHM FOR IMPROVING QOS METRICS IN HETEROGENEOUS NETWORKS 1 V.VINOTH, 2 M.LAKSHMI 1 Research Scholar, Faculty of Computing, Department of IT, Sathyabama University,
More informationIP CREW. Cogni,ve Radio Experimenta,on World
IP CREW Cogni,ve Radio Experimenta,on World 1st open call - informa,on session Ingrid Moerman Brussels, September 14, 2011 The research leading to these results has received funding from the European Union's
More informationWhat makes an applica/on a good applica/on? How is so'ware experienced by end- users? Chris7an Campo EclipseCon 2012
What makes an applica/on a good applica/on? How is so'ware experienced by end- users? Chris7an Campo EclipseCon 2012 Who are we? Chris/an Campo How is so:ware experienced by end- users? What is Usability?
More informationProtection Against DDOS Using Secure Code Propagation In The VANETs
Protection Against DDOS Using Secure Code Propagation In The VANETs Mandeep Kaur, Manish Mahajan Mandeepcheema6@gmail.com,cgccoe.hodcse@gmail.com ABSTRACT--VANETs are the vehicular networks used to connect
More informationOverview of IPTV Forum Japan s Hybridcast Technical SpecificaAon
The fourth Web and TV Workshop Overview of IPTV Forum Japan s Hybridcast Technical SpecificaAon Kinji Matsumura, NHK 1 What is Technology pladorm for broadcast and broadband hybrid service that uses HTML5
More informationChallenges for Future Networked Embedded Systems
Challenges for Future Networked Embedded Systems I.G. Niemegeers Centre for Wireless and Personal Communication (CWPC) Delft University of Technology PROGRESS Workshop 2006 Networks and Connected Systems
More informationLink Layer. w/ credit to Rick Graziani (Cabrillo) for some of the anima<ons
Link Layer w/ credit to Rick Graziani (Cabrillo) for some of the anima
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationCloud Computing WSU Dr. Bahman Javadi. School of Computing, Engineering and Mathematics
Cloud Computing Research @ WSU Dr. Bahman Javadi School of Computing, Engineering and Mathematics Research Team and Research Interests Team 4 Academic Staff 5 PhD Students 1 Master Student Resource Scheduling
More informationCORPORATE PRESENTATION
CORPORATE PRESENTATION Background on device detec/on (1/2) Identifying the capabilities of a device accessing web contents has been an extensively explored issue in the past years, in particular in the
More informationCoupled Conges,on Control for RTP Media. Safiqul Islam, Michael Welzl, Stein Gjessing and Naeem Khademi Department of Informa,cs University of Oslo
Coupled Conges,on Control for RTP Media Safiqul Islam, Michael Welzl, Stein Gjessing and Naeem Khademi Department of Informa,cs University of Oslo Problem statement Each Flow has its own Conges@on Control
More informationBlue Hill, Maine! FORWARD!
Blue Hill, Maine! FORWARD! Internet & Broadband Access What we have and what are our op/ons? Presented by Butler Smythe January 26, 2017 Disclaimer: The Informa=on provided is in no way is intended to
More informationEffect of Router Buffers on Stability of Internet Conges8on Control Algorithms
Effect of Router Buffers on Stability of Internet Conges8on Control Algorithms Somayeh Sojoudi Steven Low John Doyle Oct 27, 2011 1 Resource alloca+on problem Objec8ve Fair assignment of rates to the users
More informationCrowdsourcing the Acquisi3on and Analysis of Mobile Videos for Disaster Response
IEEE Big Data 2015, October 31, 2015 Crowdsourcing the Acquisi3on and Analysis of Mobile Videos for Disaster Response Presented by Hien To Dr. Seon Ho Kim Integrated Media Systems Center University of
More informationTOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM
TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD
More informationAdDroid Privilege Separa,on for Applica,ons and Adver,sers in Android
AdDroid Privilege Separa,on for Applica,ons and Adver,sers in Android Paul Pearce 1, Adrienne Porter Felt 1, Gabriel Nunez 2, David Wagner 1 1 University of California, Berkeley 2 Sandia Na,onal Laboratory
More informationTools zur Op+mierung eingebe2eter Mul+core- Systeme. Bernhard Bauer
Tools zur Op+mierung eingebe2eter Mul+core- Systeme Bernhard Bauer Agenda Mo+va+on So.ware Engineering & Mul5core Think Parallel Models Added Value Tooling Quo Vadis? The Mul5core Era Moore s Law: The
More informationComponent diagrams. Components Components are model elements that represent independent, interchangeable parts of a system.
Component diagrams Components Components are model elements that represent independent, interchangeable parts of a system. Components are more abstract than classes and can be considered to be stand- alone
More informationArchitecture of So-ware Systems Massively Distributed Architectures Reliability, Failover and failures. Mar>n Rehák
Architecture of So-ware Systems Massively Distributed Architectures Reliability, Failover and failures Mar>n Rehák Mo>va>on Internet- based business models imposed new requirements on computa>onal architectures
More informationMobile and Ubiquitous Computing: Mobile Sensing
Mobile and Ubiquitous Computing: Mobile Sensing Master studies, Winter 2015/2016 Dr Veljko Pejović Veljko.Pejovic@fri.uni-lj.si Based on: Mobile and Ubiquitous Computing Mirco Musolesi, University of Birmingham,
More informationCooperative Wireless Communications. Ashutosh Sabharwal
Cooperative Wireless Communications Ashutosh Sabharwal Outline Growing presence of wireless Why do we need a new paradigm Cooperative communication basics Future directions In Numbers Global cellular phone
More informationSai Praveen Sadhu George Mason University Fall 2014, ECE 646
Sai Praveen Sadhu George Mason University Fall 2014, ECE 646 VoIP - > Voice over IP Technology to send voice and mul9media over Internet Protocol. Skype is a good example of VoIP. Skype was developed in
More informationRethinking Path Valida/on. Russ White
Rethinking Path Valida/on Russ White Reality Check Right now there is no US Government mandate to do anything A mandate in the origin authen9ca9on area is probably immanent A mandate in the path valida9on
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. ZigBee Revealed
Politecnico di Milano Advanced Network Technologies Laboratory ZigBee Revealed Zigbee: Communica4on Stack APPLICATIONS Customer APPLICATION INTERFACE SECURITY NETWORK LAYER Star/Cluster/Mesh ZigBee Alliance
More informationCLOUD SERVICES. Cloud Value Assessment.
CLOUD SERVICES Cloud Value Assessment www.cloudcomrade.com Comrade a companion who shares one's ac8vi8es or is a fellow member of an organiza8on 2 Today s Agenda! Why Companies Should Consider Moving Business
More informationNetwork Measurement. COS 461 Recita8on. h:p://
Network Measurement COS 461 Recita8on h:p://www.cs.princeton.edu/courses/archive/spr14/cos461/ 2! Why Measure the Network? Scien8fic discovery Characterizing traffic, topology, performance Understanding
More informationRouteBricks: Exploi2ng Parallelism to Scale So9ware Routers
RouteBricks: Exploi2ng Parallelism to Scale So9ware Routers Mihai Dobrescu and etc. SOSP 2009 Presented by Shuyi Chen Mo2va2on Router design Performance Extensibility They are compe2ng goals Hardware approach
More informationWeVe: When Smart Wearables Meet Intelligent Vehicles
WeVe: When Smart Wearables Meet Intelligent Vehicles Jiajia Liu School of Cyber Engineering, Xidian University, Xi an, China Smart wearables and intelligent vehicles constitute indispensable parts of Internet
More informationAd Hoc Routing Protocols and Issues
Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed
More informationBuilding social services: Social TV case study
Building social services: Social TV case study CFP All-Members Meeting May 14, 2009 Venice, Italy Natalie Klym nklym@cfp.mit.edu The Social TV study combines two research streams The future of television
More informationDigital Learning at MBBC: Setting up Parental Restrictions
Digital Learning at MBBC: Setting up Parental Restrictions Page 1 Parental Restric-ons Using an ipad, iphone, or ipod touch can provide your student with access to a wealth of informa9on. However, at 9mes
More informationAd Hoc Networks - Applications and System Design
Ad Hoc Networks - Applications and System Design Prof Sanjay Srivastava DA-IICT, Gandhinagar Modelling and Analysis Group of NeTworks (MAGNeT) Two day workshop on Ad Hoc Networks: Design, Applications,
More informationVision: Towards an Extensible App Ecosystem for Home Automa;on through Cloud- Offload
Vision: Towards an Extensible App Ecosystem for Home Automa;on through Cloud- Offload Yuichi Igarashi Hitachi Ltd., Yokohama Research Laboratory Kaustubh Joshi MaL Hiltunen Richard Schlich;ng AT&T Shannon
More informationOverview. Background. Intelligence at the Edge. Learning at the Edge: Challenges and Brainstorming. Amazon Alexa Smart Home!
Overview Background Intelligence at the Edge Samsung Research Learning at the Edge: Challenges and Brainstorming Amazon Alexa Smart Home! Background Ph.D. at UW CSE RFID, Mobile, Sensors, Data Nokia Research
More informationNSF EAGER Collabora/ve Research Project: Towards a Unified Wireless Network Involving Reconfigurable Devices. Project Overview and Status
NSF EAGER Collabora/ve Research Project: Towards a Unified Wireless Network Involving Reconfigurable Devices Project Overview and Status Last update: 5/6/2010 Principal Investigators Dr James Martin School
More informationMobile Middleware Course. Mobile Platforms and Middleware. Sasu Tarkoma
Mobile Middleware Course Mobile Platforms and Middleware Sasu Tarkoma Role of Software and Algorithms Software has an increasingly important role in mobile devices Increase in device capabilities Interaction
More informationOpen Mobile Platforms. EE 392I, Lecture-6 May 4 th, 2010
Open Mobile Platforms EE 392I, Lecture-6 May 4 th, 2010 Open Mobile Platforms The Android Initiative T-Mobile s ongoing focus on Android based devices in US and EU markets In Nov 2007, Google announced
More informationA Security Punctua.on Framework for Enforcing Access Control on Streaming Data. Rimma V. Nehme, Elke A. Rundensteinerr, Elisa Ber.
A Security Punctua.on Framework for Enforcing Access Control on Streaming Data Rimma V. Nehme, Elke A. Rundensteinerr, Elisa Ber.no Presented by Thao Pham Mo.va.on Mobile devices make available personal
More informationOntology engineering. Valen.na Tamma. Based on slides by A. Gomez Perez, N. Noy, D. McGuinness, E. Kendal, A. Rector and O. Corcho
Ontology engineering Valen.na Tamma Based on slides by A. Gomez Perez, N. Noy, D. McGuinness, E. Kendal, A. Rector and O. Corcho Summary Background on ontology; Ontology and ontological commitment; Logic
More informationDecision making for autonomous naviga2on. Anoop Aroor Advisor: Susan Epstein CUNY Graduate Center, Computer science
Decision making for autonomous naviga2on Anoop Aroor Advisor: Susan Epstein CUNY Graduate Center, Computer science Overview Naviga2on and Mobile robots Decision- making techniques for naviga2on Building
More informationOpen Data Kit. A set of open source tools to help organiza3ons collect, aggregate and visualize their rich data.
Open Data Kit h8p://code.google.com/p/open- data- kit A set of open source tools to help organiza3ons collect, aggregate and visualize their rich data. Organiza.ons in developing regions inefficiently
More information5G vision and D2D communications
5G vision and D2D communications Aleksandr Ometov aleksandr.ometov@tut.fi ELT Department What is 5G? The fifth generation of mobile technology (5G) is positioned to address the demands and business contexts
More informationEthernet and WiFi. h-p://xkcd.com/466/
Ethernet and WiFi h-p://xkcd.com/466/ CSCI 466: Networks Keith Vertanen Fall 2011 Overview Mul?ple access networks Ethernet Long history Dominant wired technology 802.11 Dominant wireless technology 2
More informationA Smartphone Based Real Time Ac5vity Monitoring System
A Smartphone Based Real Time Ac5vity Monitoring System By: Shumei Zhang, Paul McCullagh, Jing Zhang, Tiezhong Yu Presented by: Jane Henderson A Smartphone Based-Real Time Daily Ac5vity Monitoring System
More informationTerraSwarm. A Machine Learning and Op0miza0on Toolkit for the Swarm. Ilge Akkaya, Shuhei Emoto, Edward A. Lee. University of California, Berkeley
TerraSwarm A Machine Learning and Op0miza0on Toolkit for the Swarm Ilge Akkaya, Shuhei Emoto, Edward A. Lee University of California, Berkeley TerraSwarm Tools Telecon 17 November 2014 Sponsored by the
More informationOrigin- des*na*on Flow Measurement in High- Speed Networks
IEEE INFOCOM, 2012 Origin- des*na*on Flow Measurement in High- Speed Networks Tao Li Shigang Chen Yan Qiao Introduc*on (Defini*ons) Origin- des+na+on flow between two routers is the set of packets that
More informationSeaCat: an SDN End- to- end Applica4on Containment ArchitecTure
: an SDN End- to- end Applica4on Containment ArchitecTure Enabling Secure Role Based Access To Sensi5ve Healthcare Data Junguk Cho, David Johnson, Makito Kano, Kobus Van der Merwe and Brent Elieson Mo4va4on
More informationEfficient Memory and Bandwidth Management for Industrial Strength Kirchhoff Migra<on
Efficient Memory and Bandwidth Management for Industrial Strength Kirchhoff Migra
More informationUrb- IoT Developing a RESTful Communica>on Protocol and an Energy Op>miza>on Algorithm for a Connected Sustainable Home
Urb- IoT 2014 Developing a RESTful Communica>on Protocol and an Energy Op>miza>on Algorithm for a Connected Sustainable Home So$rios D. Kotsopoulos, Federico Casalegno, Wesley Graybill, Adrià Recasens
More informationQuan'fying QoS Requirements of Network Services: A Cheat- Proof Framework
Quan'fying QoS Requirements of Network Services: A Cheat- Proof Framework Kuan- Ta Chen Academia Sinica Chen- Chi Wu Na3onal Taiwan University Yu- Chun Chang Na3onal Taiwan University Chin- Laung Lei Na3onal
More informationNetworking Cyber-physical Applications in a Data-centric World
Networking Cyber-physical Applications in a Data-centric World Jie Wu Dept. of Computer and Information Sciences Temple University ICCCN 2015 Panel Computers weaving themselves into the fabric of everyday
More informationPoten&al Denial- of- Service Threat Assessment for Cogni&ve Radios
oten&al Denial- of- Service Threat Assessment for Cogni&ve Radios Timothy X Brown*, Amita Sethi + *, + Interdisciplinary Telecommunica&ons *Electrical, Computer, and Energy Engineering University of Colorado,
More informationJason Polakis, Marco Lancini, Georgios Kontaxis, Federico Maggi, So5ris Ioannidis, Angelos Keromy5s, Stefano Zanero.
Jason Polakis, Marco Lancini, Georgios Kontaxis, Federico Maggi, So5ris Ioannidis, Angelos Keromy5s, Stefano Zanero polakis@ics.forth.gr Annual Computer Security Applica5ons Conference (ACSAC) 2012 Introduc5on
More informationKing Fahd University of Petroleum & Minerals Computer Engineering g Dept
King Fahd University of Petroleum & Minerals Computer Engineering g Dept COE 540 Computer Networks Term 121 Dr. Ashraf S. Hasan Mahmoud Rm 22-420 Ext. 1724 Email: ashraf@kfupm.edu.sa 9/1/2012 Dr. Ashraf
More informationVertical Handover in Vehicular Ad-hoc Networks A Survey
Vertical Handover in Vehicular Ad-hoc Networks A Survey U. Kumaran Department of computer Applications Noorul Islam Center for Higher Education, Kumaracoil,Tamilnadu, India. Abstract- Vehicular Ad-hoc
More informationTowards the Vehicular Cloud: From Connected Cars to Smart Ci?es
Distributed Embedded Systems University of Paderborn Towards the Vehicular Cloud: From Connected Cars to Smart Ci?es Falko Dressler dressler@ieee.org GLOBECOM 2015 Falko Dressler, University of Paderborn
More information