Justin Manweiler Predicting Length of Stay at WiFi Hotspots INFOCOM 2013, Wireless Networks 3 April 18, 2013 IBM T. J. Watson Research Formerly: Duke University.

Slides:



Advertisements
Similar presentations
Multi-hop wireless networks Fact or fiction? Injong Rhee Department of Computer Science North Carolina State University.
Advertisements

Outline Activity recognition applications
Successive Interference Cancellation: A Back of the Envelope Perspective Souvik Sen, Naveen Santhapuri, Romit Roy Choudhury, Srihari Nelakuditi.
Ruckus Smart Wi-Fi for Retail
Speech Enhancement through Noise Reduction By Yating & Kundan.
VTrack: Accurate, Energy-Aware Road Traffic Delay Estimation Using Mobile Phones Arvind Thiagarajan, Lenin Ravindranath, Katrina LaCurts, Sivan Toledo,
Managing Redundant Content in Bandwidth Constrained Wireless Networks Tuan Dao, Amit K. Roy- Chowdhury, Srikanth V. Krishnamurthy U.C. Riverside Harsha.
XCP: Congestion Control for High Bandwidth-Delay Product Network Dina Katabi, Mark Handley and Charlie Rohrs Presented by Ao-Jan Su.
TRADING OFF PREDICTION ACCURACY AND POWER CONSUMPTION FOR CONTEXT- AWARE WEARABLE COMPUTING Presented By: Jeff Khoshgozaran.
University of Athens, Greece Pervasive Computing Research Group Predicting the Location of Mobile Users: A Machine Learning Approach 1 University of Athens,
University of Athens, Greece Pervasive Computing Research Group An Online Adaptive Model for Location Prediction University of Athens, Department of Informatics.
1. 2 Enterprise WLAN setting 2 Vivek Shrivastava Wireless controller Access Point Clients Internet NSDI 2011.
Avoiding the Rush Hours: WiFi Energy Management via Traffic Isolation
Yung-Chih Chen Jim Kurose and Don Towsley Computer Science Department University of Massachusetts Amherst A Mixed Queueing Network Model of Mobility in.
OverLay: Practical Mobile Augmented Reality
Ubiquitous Advertising: the Killer Application for the 21st Century Author: John Krumm Presenter: Anh P. Nguyen
Network Planète Chadi Barakat
Presented by: Z.G. Huang May 04, 2011 Did You See Bob? Human Localization using Mobile Phones Romit Roy Choudhury Duke University Durham, NC, USA Ionut.
BreadCrumbs: Forecasting Mobile Connectivity Presented by Hao He Slides adapted from Dhruv Kshatriya Anthony J. Nicholson and Brian D. Noble.
Ambulation : a tool for monitoring mobility over time using mobile phones Computational Science and Engineering, CSE '09. International Conference.
Signatures As Threats to Privacy Brian Neil Levine Assistant Professor Dept. of Computer Science UMass Amherst.
Satellites in Our Pockets: An Object Positioning System using Smartphones Justin Manweiler, Puneet Jain, Romit Roy Choudhury TsungYun
1 Predicting Download Directories for Web Resources George ValkanasDimitrios Gunopulos 4 th International Conference on Web Intelligence, Mining and Semantics.
Carnegie MellonCarnegie Mellon PMA: A Mobile Context-Aware Personal Messaging Assistant Senaka Buthpitiya Deepthi Madamanchi Sumalatha Kommaraju Martin.
Snooping based privacy attacks based on transmission timing and wireless fingerprinting Master’s project presentation Vijay Srinivasan University of Virginia.
SurroundSense: Mobile Phone Localization via Ambience Fingerprinting Martin Azizyan, Ionut Constandache, Romit Roy Choudhury Mobicom 2009.
1 SurroundSense: Mobile Phone Localization via Ambience Fingerprinting Ionut Constandache Co-authors: Martin Azizyan and Romit Roy Choudhury.
Enhancing the Security of Corporate Wi-Fi Networks using DAIR PRESENTED BY SRAVANI KAMBAM 1.
Innovation Council June "Innovation distinguishes between a leader and a follower." -Steve Jobs, 2001.
System Management for Virtualization and Automation in a Dynamic Data Center SVM’08 Munich Karsten Beins, Sen. Director Infrastructure Technology.
Converged Service A Dartmouth Perspective Bob Johnson.
1 Energy-efficient Localization Via Personal Mobility Profiling Ionut Constandache Co-authors: Shravan Gaonkar, Matt Sayler, Romit Roy Choudhury and Landon.
Man vs. Machine: Adversarial Detection of Malicious Crowdsourcing Workers Gang Wang, Tianyi Wang, Haitao Zheng, Ben Y. Zhao, UC Santa Barbara, Usenix Security.
Infrastructure Mobility: A What-If Analysis Mahanth Gowda Nirupam Roy Romit Roy Choudhury.
TapPrints: Your Finger Taps Have Fingerprints Emiliano Miluzzo*, Alex Varshavsky*, Suhrid Balakrishnan*, Romit R. Choudhury + * at&t Labs – Research, USA.
Who Is Peeping at Your Passwords at Starbucks? To Catch an Evil Twin Access Point DSN 2010 Yimin Song, Texas A&M University Chao Yang, Texas A&M University.
Just-in-Time Social Cloud: Computational Social Platform to Guide People’s Just-in-Time Decisions Author:Kwan Hong Lee, Andrew Lippman, Alex S. Pentland,
Mobile and Location-Based Services Jason I. Hong Product Design and Usability April
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
CSpy: Finding the Best Quality Channel without Probing Souvik Sen, Bozidar Radunovic, Jeongkeun Lee, Kyn-Han Kim MobiCom’13 1.
Wireless Trace Analysis. Project Goals Summary of project goals: First goal: analyze wireless access patterns Second goal: implement Markov predictor.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
Network Community Behavior to Infer Human Activities.
PROTEUS: Network Performance Forecast for Real- Time, Interactive Mobile Applications Qiang Xu* Sanjeev Mehrotra# Z. Morley Mao* Jin Li# *University of.
© 2014 IBM Corporation Does your Cloud have a Silver Lining ? The adoption of Cloud in Grid Operations of Electric Distribution Utilities Kieran McLoughlin.
Adaptive Sleep Scheduling for Energy-efficient Movement-predicted Wireless Communication David K. Y. Yau Purdue University Department of Computer Science.
IM Power Project Summer 2007 Raye Gomez April Wensel Heather Tomko Jen Mankoff (mentor) Anind Dey.
Contents Introduction What are Location-based services Working of Location-based services Location Tracking Technologies Power profiling a mobile phone.
OIT and IT providers across campus are launching an awareness campaign to provide tips and resources to help you stay safe online and protect AU resources.
Denial of Convenience Attack to Smartphones Using a Fake Wi-Fi Access Point Erich Dondyk, Cliff C. Zou University of Central Florida.
Munix Overview Customer Profiling, Frequency Analysis, Location Mapping, Movement Analysis, VIP recognition, Time Analysis, and much more …. Internet Gateway.
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Warren Yeu When CSI Meets Public Wifi.
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals Adekemi Adedokun May 2, 2017.
iPhones and iPads and iTunes, Oh My!
Business Intelligence
Munix Overview Customer Profiling, Frequency Analysis, Location Mapping, Movement Analysis, VIP recognition, Time Analysis, and much more …. Internet Gateway.
Munix for Education Content Filter, Bandwidth Control, Location Mapping, Movement Analysis, User Self Management Portal, Time Analysis, and much more ….
Wireless Communication and Networks
COMP61011 : Machine Learning Ensemble Models
 Printer not found  Unable to find the printer  No devices found  Your printer could not be found on your wireless network.
Slobodan Milanko Manweiler, J., Franklin, P., & Choudhury, R. R. (2012, March). RxIP: Monitoring the health of home wireless networks. In INFOCOM, 2012.
Internet of Things A Process Calculus Approach
SpinLoc: Indoor localization
DSA Standby Player App Digital Signage for Android Phones and Tablets
Xin Qi, Matthew Keally, Gang Zhou, Yantao Li, Zhen Ren
No Time to Countdown: Backing Off in Frequency Domain
E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks
Sofia Pediaditaki and Mahesh Marina University of Edinburgh
When Machine Learning Meets Security – Secure ML or Use ML to Secure sth.? ECE 693.
Presentation transcript:

Justin Manweiler Predicting Length of Stay at WiFi Hotspots INFOCOM 2013, Wireless Networks 3 April 18, 2013 IBM T. J. Watson Research Formerly: Duke University Romit Roy Choudhury Duke University Naveen Santhapuri Bloomberg, Formerly: U. South Carolina, Duke Srihari Nelakuditi Univ. of South Carolina

Mobile Devices are a pervasive link between networks and humans

Human Behavior is not random, predictable through pattern recognition

Behavior-aware Networking Device Sensing + Context Awareness + Network Adaptation

A first attempt… Length-of-stay (dwell time) prediction Matchmaking mobile multiplayer games Content Prefetching Targeted, Timely Marketing

Time A 50/50 allocation Is normally fair.. Bandwidth Time Bandwidth By prioritizing short-dwell, can equalize service. Time … but unfair here, short- dwell devices leave earlier Bandwidth Customer depart… Carry-over to 3G/4G

Lots of other applications… 10€ off 100€! (stay and browse) 10€ off 100€! (stay and browse) 50% off Espresso (on your way to work) 50% off Espresso (on your way to work)

ToGo dwell prediction BytesToGo traffic shaping Network Management Context Awareness

Large dwell variation in a real café (opportunity to provide differentiated service) Large dwell variation in a real café (opportunity to provide differentiated service)

Still large performance advantage at hotspots

Behavioral patterns emerge … …but, weak signal/noise

Simplifying Insight 1 Don’t predict absolute length of stay, predict logarithmic length of stay class Don’t predict absolute length of stay, predict logarithmic length of stay class E.g., at our campus McDonald’s: (1-2)walking past the restaurant (2-3)buying food to-go (4)eating-in (4-5) studying in the dining area

Simplifying Insight 2 Ground truth learned as devices associate/disassociate from WiFi Don’t build a generic classifier, build a system for learning on-the-fly Don’t build a generic classifier, build a system for learning on-the-fly

Machine Learning on Cloud/let

Meta-predictor selects best feature-predictors Meta-predictor selects best feature-predictors Sequence Predictor learns how the Meta-predictor guesses with time Sequence Predictor learns how the Meta-predictor guesses with time ToGo learns how well a sequence of sensor classifications correlates to the dwell classification ToGo learns how well a sequence of sensor classifications correlates to the dwell classification

Comparative Schemes NoFeedback (RSSI only) Basic Basic+Compass Basic+Compass+Light “Naïve” predict based on current dwell duration Hindsight How much sensing is enough?

ToGo/BytesToGo Protype Nexus One phones (client devices) – Custom Android app to report sensor readings Linux laptop (AP) – hostapd: provide standard n AP services – Click Modular Router: record RSSI, receive sensor data – libsvm: C++ library used for realtime SVM training/prediction

“Real” users, good results … but bias from experimental process? “Real” users, good results … but bias from experimental process?

Observing/Replaying Human Mobility (capturing mobility without impacting it) 8:00pm 8:10pm 8:12pm 8:14pm 8:13pm

More Feedback = Faster Convergence (not shown) more users = greater precision

Live Experiment Customer arrivals/departures Performance boost for short-dwell Minimal impact for long-dwell

ToGo finds ~2/3 of available 3G/4G carryover reduction

Natural questions

RSSI alone is a strong predictor … possible to sanity-check against other sensory inputs Energy overheads? Greedy users faking sensor readings? Saving 3G/LTE can make up battery life; longer-dwell clients can reduce/eliminate sensor reports Multi-AP Hotspots? Even better … leverage EWLAN to apply machine learning at a central controller, improve accuracy What if user delays turning on phone? Location at which the phone is turned on is likely itself a strong discriminating feature for a quick prediction

Conclusion Human behavior is far from random, inferable Behavior awareness can enhance network systems BytesToGo is initial attempts towards behavior-aware networking – Sensing – Automatic ML training at WiFi APs – Predict length of stay – Auto-optimize network based on behavior prediction

Thank you Justin Manweiler Research Staff Member Thomas J. Watson Research Center Justin Manweiler Research Staff Member Thomas J. Watson Research Center SyNRG Research Duke synrg.ee.duke.edu SyNRG Research Duke synrg.ee.duke.edu Quick plug… Come visit IBM Watson (talk, intern, fellowships, etc.) Quick plug… Come visit IBM Watson (talk, intern, fellowships, etc.)