Paper Digest: MOBICOM 2013 Highlights
International Conference on Mobile Computing and Networking (MobiCom) is one of the top conferences on mobile computing and wireless and mobile networking.
To help the community quickly catch up on the work presented in this conference, Paper Digest Team processed all accepted papers, and generated one highlight sentence (typically the main topic) for each paper. Readers are encouraged to read these machine generated highlights / summaries to quickly get the main idea of each paper.
If you do not want to miss any interesting academic paper, you are welcome to sign up our free daily paper digest service to get updates on new papers published in your area every day. You are also welcome to follow us on Twitter and Linkedin to get updated with new conference digests.
Paper Digest Team
team@paperdigest.org
TABLE 1: MOBICOM 2013 Papers
Title | Authors | Highlight | |
---|---|---|---|
1 | The evolution of mobility and wireless technologies in the age of the internet of things | Flavio Bonomi | We will describe the ICT Infrastructure developments needed to support these new requirements, and identify broad open mobility and wireless research topics, which may help catalyze innovation affecting our industry. |
2 | RF-compass: robot object manipulation using RFIDs | Jue Wang, Fadel Adib, Ross Knepper, Dina Katabi, Daniela Rus | This paper presents RF-Compass, an RFID-based system for robot navigation and object manipulation. |
3 | LightSync: unsynchronized visual communication over screen-camera links | Wenjun Hu, Hao Gu, Qifan Pu | We achieve frame synchronization with LightSync, which features in-frame color tracking to decode imperfect frames and a linear erasure code across frames to recover lost frames. |
4 | Whole-home gesture recognition using wireless signals | Qifan Pu, Sidhant Gupta, Shyamnath Gollakota, Shwetak Patel | This paper presents WiSee, a novel gesture recognition system that leverages wireless signals (e.g., Wi-Fi) to enable whole-home sensing and recognition of human gestures. |
5 | Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it | Muhammad Shahzad, Alex X. Liu, Arjmand Samuel | In this paper, we propose GEAT, a gesture based user authentication scheme for the secure unlocking of touch screen devices. |
6 | CorLayer: a transparent link correlation layer for energy efficient broadcast | Shuai Wang, Song Min Kim, Yunhuai Liu, Guang Tan, Tian He | In this paper, we show how link correlation can significantly impact broadcast. |
7 | Coordinating cellular background transfers using loadsense | Abhijnan Chakraborty, Vishnu Navda, Venkata N. Padmanabhan, Ramachandran Ramjee | In this paper, we address the above dilemma by making the following contributions. |
8 | ParkSense: a smartphone based sensing system for on-street parking | Sarfraz Nawaz, Christos Efstratiou, Cecilia Mascolo | In this paper, we present ParkSense, a smartphone based sensing system that detects if a driver has vacated a parking spot. |
9 | How voice calls affect data in operational LTE networks | Guan-Hua Tu, Chunyi Peng, Hongyi Wang, Chi-Yu Li, Songwu Lu | In this work, we study the inter-play of voice and data in operational LTE networks. |
10 | FluidNet: a flexible cloud-based radio access network for small cells | Karthikeyan Sundaresan, Mustafa Y. Arslan, Shailendra Singh, Sampath Rangarajan, Srikanth V. Krishnamurthy | In this work, we argue that the intelligent configuration of the front-haul network between the BBUs and RRHs, is essential in delivering the performance and energy benefits to the RAN and the BBU pool, respectively. |
11 | Last call for the buffet: economics of cellular networks | Jeremy Blackburn, Rade Stanojevic, Vijay Erramilli, Adriana Iamnitchi, Konstantina Papagiannaki | We develop a framework that incorporates both the individual and social user behavior for studying how volume caps influence the revenues and the traffic costs. |
12 | Network coding for content-based intermittently connected emergency networks | Joshua Joy, Yu-Ting Yu, Mario Gerla, Samuel Wood, James Mathewson, Mark-Oliver Stehr | In this demo, we present a network architecture that exploits partial caches by utilizing network coding to deliver large files (e.g. images) to first responders. |
13 | Adaptive video streaming for device-to-device mobile platforms | Joongheon Kim, Feiyu Meng, Peiyao Chen, Hilmi E. Egilmez, Dilip Bethanabhotla, Andreas F. Molisch, Michael J. Neely, Giuseppe Caire, Antonio Ortega | This demo abstract describes an initial design of a new adaptive video streaming protocol for device-to-device WiFi-based mobile platforms and its software implementation. |
14 | A lane-level cooperative collision avoidance system based on vehicular sensor networks | Lien-Wu Chen, Po-Chun Chou | In this paper, we design and implement a lane-level cooperative collision avoidance (LCCA) system using vehicle-to-vehicle communications. |
15 | Secure M2M cloud testbed | Heikki Mahkonen, Teemu Rinta-aho, Tero Kauppinen, Mohit Sethi, Jimmy Kjällman, Patrik Salmela, Tony Jokikyyny | Secure M2M cloud testbed |
16 | PiCode: 2D barcode with embedded picture and ViCode: 3D barcode with embedded video | Wenjian Huang, Wai Ho Mow | PiCode: 2D barcode with embedded picture and ViCode: 3D barcode with embedded video |
17 | Flexible array of inexpensive radios | Jiansong Zhang, Kun Tan | In this demo, we propose to use multiple inexpensive off-the-shelf radios to build the FAIR system that can be flexibly configured to realize (1) non-contiguous spectrum access (2) MIMO and beamforming (3) constructing wider-band radio. |
18 | OverDrive: an overlay-based geocast service for smart traffic applications | Martin Florian, Simeon Andreev, Ingmar Baumgart | Here, we present an interactive demonstrator of the OverDrive protocol that visualizes OverDrive’s neighborhood structures and routing approach in a realistic and highly mobile traffic scenario. |
19 | v(t) CSMA: a link scheduling algorithm in wireless networks with improved delay characteristics | Ahmed Elbagoury, Moustafa Youssef, Dongyue Xue, Eylem Ekici | In this demo we demonstrate the operation of the v(t)-regulated CSMA algorithm that mitigates these two problems while provably retaining throughput optimality. |
20 | Mobile network performance evaluation using the radio frequency network channel emulation simulation tool(RFnest™) | Justin Yackoski, Babak Azimi-Sadjadi, Ali Namazi, Alexey Bogaevskiy, Jason Li, Yalin Sagduyu, Renato Levy | In this demonstration, we present new capabilities of Intelligent Automation Inc. (IAI) Radio Frequency Network Emulation Simulation Tool (RFnestTM) (www.i-a-i.com/rfnest). |
21 | Decoding IEEE 802.11a/g/p OFDM in software using GNU radio | Bastian Bloessl, Michele Segata, Christoph Sommer, Falko Dressler | Decoding IEEE 802.11a/g/p OFDM in software using GNU radio |
22 | ArgosV2: a flexible many-antenna research platform | Clayton Shepard, Hang Yu, Lin Zhong | Leveraging our experience building Argos, a 64-antenna base station prototype, we have designed and built ArgosV2, a compact, powerful, and scalable many-antenna research platform based on WARP. |
23 | Online evaluation of sensing characteristics for radio platforms in the CREW federated testbed | Virgilios Passas, Kostas Chounos, Stratos Keranidis, Wei Liu, Lieven Hollevoet, Thanasis Korakis, Iordanis Koutsopoulos, Ingrid Moerman, Leandros Tassiulas | In this work, we consider two factors that are rather important for evaluation of cognitive platforms, namely sensing delay and energy efficiency. |
24 | NTMobile: new end-to-end communication architecture in IPv4 and IPv6 networks | Hidekazu Suzuki, Katsuhiro Naito, Kazuma Kamienoo, Tatsuya Hirose, Akira Watanabe | In this demo, we will show that Android smartphones can make free communication with each other without any constraint such as an NAT traversal problem in IPv4 networks and incompatibility between IPv4 and IPv6 architectures. |
25 | BEEINFO: data forwarding based on interest and swarm intelligence for socially-aware networking | Jie Li, Li Liu, Feng Xia | In this paper, we give a brief introduction of an interest-based scheme called BEEINFO. |
26 | CRESCENT: a modular cost-efficient open-access testbed for cognitive radio networks routing protocols | Abdelrahman Asal, Ahmad Mamdouh, Ahmed Salama, Moamen Elgendy, Moamen Mokhtar, Muhammed Elsayed, Moustafa Youssef | We propose CRESCENT: a modular framework for testing CRNs routing protocols with cost-efficient and large-scale deployability. |
27 | OpenRoutes: augmenting backhaul network survivability with reduced redundancy- a topology based analysis | Daniel Philip Venmani, Yvon Gourhant, Djamal Zeghlache | In this article we illustrate that, management of network resources can yield notably different performances leading to different restoration behaviors — for different network topologies. |
28 | SilentSense: silent user identification via touch and movement behavioral biometrics | Cheng Bo, Lan Zhang, Xiang-Yang Li, Qiuyuan Huang, Yu Wang | In this work, we present SilentSense, a framework to authenticate users silently and transparently by exploiting the user touch behavior biometrics and leveraging the integrated sensors to capture the micro-movement of the device caused by user’s screen-touch actions. |
29 | Participant recruitment and data collection framework for opportunistic sensing: a comparative analysis | Guliz S. Tuncay, Giacomo Benincasa, Ahmed Helmy | In this work, we propose a novel framework for fully distributed, opportunistic sensing which coherently integrates two main components that operate in DTN mode: i. participant recruitment and ii. |
30 | SmartLoc: push the limit of the inertial sensor based metropolitan localization using smartphone | Cheng Bo, Xiang-Yang Li, Taeho Jung, Xufei Mao, Yue Tao, Lan Yao | We present SmartLoc, a localization system to estimate the location and the traveling distance by leveraging the lower-power inertial sensors embedded in smartphones as a supplementary to GPS. |
31 | You’re driving and texting: detecting drivers using personal smart phones by leveraging inertial sensors | Cheng Bo, Xuesi Jian, Xiang-Yang Li, Xufei Mao, Yu Wang, Fan Li | In this work, we address a critical task of detecting the user behavior of driving and texting simultaneously using smartphones. |
32 | Making the case for computational offloading in mobile device clouds | Afnan Fahim, Abderrahmen Mtibaa, Khaled A. Harras | In this paper, we consider an environment in which computational offoading is adopted amongst mobile devices. |
33 | Toward preserving privacy and functionality in geosocial networks | Mahmudur Rahman, Jaime Ballesteros, Bogdan Carbunar, Naphtali Rishe, Athanasios V. Vasilakos | Toward preserving privacy and functionality in geosocial networks |
34 | Spaceify: a client-edge-server ecosystem for mobile computing in smart spaces | Petri Savolainen, Sumi Helal, Jukka Reitmaa, Kai Kuikkaniemi, Giulio Jacucci, Mikko Rinne, Marko Turpeinen, Sasu Tarkoma | Spaceify: a client-edge-server ecosystem for mobile computing in smart spaces |
35 | Reducing power consumption of IEEE802.11 stations in flexible multicast services | Yuta Morisawa, Yoshihiro Kawahara, Tohru Asami | In this paper, we prove that the FMS strategy is not optimal and a little extension on FMS will achieve great improvement in power efficiency without throughput or delay penalties. |
36 | Demand-based location dependent data dissemination in VANETs | Susumu Ishihara, Nobuhiro Nakamura, Yuya Niimi | We propose a framework for efficiently disseminating large data items associated to locations where they are produced by vehicles and desired by drivers of different vehicles in a VANET. |
37 | SpyLoc: a light weight localization system for smartphones | Mostafa Uddin, Tamer Nadeem | In this paper, we propose and addresses the challenge of designing a light-weight high-accuracy indoor/outdoor localization system (SpyLoc) for off-the-shelf smartphones. |
38 | Concurrent-MAC: increasing concurrent transmissions in multi-AP wireless lans | Ghazale Hosseinabadi, Nitin Vaidya | This paper presents the design and performance evaluation of Concurrent-MAC, a MAC protocol for increasing concurrent transmissions in multi-AP wireless LANs. |
39 | How long are you staying?: predicting residence time from human mobility traces | Paul Baumann, Wilhelm Kleiminger, Silvia Santini | We show that these predictors tend to underestimate the time a user will spend at her relevant places. |
40 | Measuring human queues using WiFi signals | Yan Wang, Jie Yang, Hongbo Liu, Yingying Chen, Marco Gruteser, Richard P. Martin | We take a minimum infrastructure approach and thus utilize a single monitor placed close to the service area along with transmitting phones. |
41 | T-Mobile QoE lab: making mobile browsing faster and open research problems | Jie Hui, Kevin Lau | On the contrary, we intend to use three practical examples to unveil the mystery behind the mobile network black box and illustrate it is actually the end-to-tend (E2E) latency which impacts the QoE of one of the most commonly used data services — mobile browsing. |
42 | Comparing wireless network usage: laptop vs smart-phones | Udayan Kumar, Jeeyoung Kim, Ahmed Helmy | Comparing wireless network usage: laptop vs smart-phones |
43 | Radio environment mapping with mobile devices in the TV white space | Ayon Chakraborty, Samir R. Das, Milind Buddhikot | In this paper, we envision a scenario where mobile devices perform at least part-time spectrum sensing in a collaborative fashion under the control of a central server. |
44 | V-scope: an opportunistic wardriving approach to augmenting TV whitespace databases | Tan Zhang, Suman Banerjee | In this paper, we propose V-Scope – a vehicular sensing framework aimed to collect wide-area spectrum measurements for evaluating the accuracy of these databases. |
45 | Exploring indoor white spaces in metropolises | Xuhang Ying, Jincheng Zhang, Lichao Yan, Guanglin Zhang, Minghua Chen, Ranveer Chandra | To fill in this gap, we propose the first system WISER (for White-space Indoor Spectrum EnhanceR), to identify and track indoor white spaces in a building, without requiring user devices to sense the spectrum. |
46 | CSpy: finding the best quality channel without probing | Souvik Sen, Bozidar Radunovic, Jeongkeun Lee, Kyu-Han Kim | The key contribution of this paper is a discovery of previously unobserved properties of the wireless channel that makes it possible to predict the the strongest of a set of channels from the measurements collected only on a single channel. |
47 | Interference alignment by motion | Fadel Adib, Swarun Kumar, Omid Aryan, Shyamnath Gollakota, Dina Katabi | In this paper, we show, for the first time, that interference alignment can be achieved via motion, and works even for single-antenna transmitters. |
48 | Understanding RFID counting protocols | Binbin Chen, Ziling Zhou, Haifeng Yu | This paper aims to gain deeper and fundamental insights in this subject to facilitate future research on this topic. |
49 | Optimal throughput and delay in delay-tolerant networks with ballistic mobility | Federica Bogo, Enoch Peserico | Our contribution is twofold. |
50 | Exploring the potential in practice for opportunistic networks amongst smart mobile devices | Shu Liu, Aaron D. Striegel | In this paper, we propose a framework dubbed PSR (Prevalence, Stability, Reciprocity) to capture key aspects that characterize the net potential for opportunistic networks which we feel merit significantly increased attention. |
51 | Fine-grained spectrum adaptation in WiFi networks | Sangki Yun, Daehyeok Kim, Lili Qiu | In this paper, we propose an approach to adapt the spectrum on a per-frame basis. |
52 | Observing home wireless experience through WiFi APs | Ashish Patro, Srinivas Govindan, Suman Banerjee | We present a measurement study of wireless experience in a diverse set of home environments by deploying an infrastructure, we call WiSe. |
53 | Symphony: cooperative packet recovery over the wired backbone in enterprise WLANs | Tarun Bansal, Bo Chen, Prasun Sinha, Kannan Srinivasan | In this paper, we propose Symphony, a packet recovery architecture that encourages collisions among transmitters, and utilizes the unused capacity in the backbone to transmit recovered data packets and coordinate the efficient recovery of collided packets. |
54 | Power and thermal challenges in mobile devices | Krishna Sekar | Specifically, this paper discusses challenges in three areas: process-variability-aware power management, thermally aware power management and thermal management for mobile devices. |
55 | Towards a virtual cellular network with variable grade spectrum: challenges and opportunities | Milind Madhav Buddhikot | In this paper, we make a case for future wireless networks that will seamlessly exploit many variable grade spectrum bands. |
56 | Indoor localization: ready for primetime? | Marco Gruteser | Indoor localization: ready for primetime? |
57 | Panel: the evolution of wireless video – technology and applications | Thyagarajan Nandagopal | Panel: the evolution of wireless video – technology and applications |
58 | Indexing the real world: sensing, big data and mobility | Henry Tirri | In this presentation, Dr. Henry Tirri, EVP & CTO of Nokia and UC Berkeley will discuss insights into the social and scientific implications of the technology trends being driven by the rise of large scale multi-device cloud-based computing. |
59 | SafeSlinger: easy-to-use and secure public-key exchange | Michael Farb, Yue-Hsun Lin, Tiffany Hyun-Jin Kim, Jonathan McCune, Adrian Perrig | To establish a secure basis for online communication, we propose SafeSlinger, a system leveraging the proliferation of smartphones to enable people to securely and privately exchange their public keys. |
60 | Creating secrets out of erasures | Katerina Argyraki, Suhas Diggavi, Melissa Duarte, Christina Fragouli, Marios Gatzianas, Panagiotis Kostopoulos | We present a system that leverages this opportunity to enable n wireless nodes to create a shared secret S, in a way that an eavesdropper, Eve, obtains very little information on S. |
61 | SecureArray: improving wifi security with fine-grained physical-layer information | Jie Xiong, Kyle Jamieson | To mitigate this ongoing problem, we propose SecureArray, a system designed to operate alongside existing wireless security protocols, adding defense in depth against active attacks. |
62 | NEMOx: scalable network MIMO for wireless networks | Xinyu Zhang, Karthikeyan Sundaresan, Mohammad A. (Amir) Khojastepour, Sampath Rangarajan, Kang G. Shin | To remedy this limitation, we propose a novel system, NEMOx, that realizes netMIMO downlink transmission for large-scale wireless networks. |
63 | ZIMO: building cross-technology MIMO to harmonize zigbee smog with WiFi flash without intervention | Yan Yubo, Yang Panlong, Li Xiangyang, Tao Yue, Zhang Lan, You Lizhao | In this work we investigate the WiFi and ZigBee coexistence when ZigBee is the interested signal.Mitigating short duration WiFi interference (called flash) in long duration ZigBee data (called smog) is challenging, especially when we cannot modify the WiFi APs and the massively deployed sensor nodes. |
64 | Adaptive feedback compression for MIMO networks | Xiufeng Xie, Xinyu Zhang, Karthikeyan Sundaresan | In this paper, we address this fundamental tradeoff with Adaptive Feedback Compression (AFC). |
65 | Using crowd-sourced viewing statistics to save energy in wireless video streaming | Mohammad Ashraful Hoque, Matti Siekkinen, Jukka K. Nurminen | To remedy this, we propose a novel download scheduling algorithm based on crowd-sourced video viewing statistics. |
66 | A scheduling framework for adaptive video delivery over cellular networks | Jiasi Chen, Rajesh Mahindra, Mohammad Amir Khojastepour, Sampath Rangarajan, Mung Chiang | To overcome these problems, we design an in-network resource management framework, AVIS, that schedules HTTP-based adaptive video flows on cellular networks. |
67 | An information-aware QoE-centric mobile video cache | Shan-Hsiang Shen, Aditya Akella | In this paper, we present the design of a mobile video-centric proxy cache, named iProxy, that offers improved performance in terms of both hit rates and streaming quality. |