Suman Nath Microsoft Research. Contextual Computing Make computing context-aware Context: location, activity, preference, history A lot of progresses.

Slides:



Advertisements
Similar presentations
How Carriers Can Win the Application Wars with Location Based Services? Michael Grossi, Director Altman Vilandrie & Co.
Advertisements

I don't mind being logged, but want to remain in control: a field study of mobile activity and context logging Tuula Kärkkäinen, Tuomas Vaittinen, Kaisa.
The Cricket Compass for Context-Aware Mobile Applications Nissanka B. Priyantha.
Social Media and Other Investigative Tools Presented by: Lawrence Morales II The Morales Firm, P.C. San Antonio, Texas.
310KM M-Commerce Application - Lab/Tutorial 7 Part 3 Team Assignment and Presentation.
Green Computing Energy in Location-Based Mobile Value-Added Services Maziar Goudarzi.
1 3M Privacy Filters Justification Toolkit: How to Use The following presentation is meant to provide you with the most impactful data points to help you.
ACE: Exploiting Correlation for Energy-Efficient and Continuous Context Sensing Suman Nath Microsoft Research MobiSys 2012 Presenter: Jeffrey.
Tracking & Login Data persistence User tracking.
Sensors. Point your phone at the sky, and Google Sky Map tells you which stars you’re looking at. Tilt your phone, and you can control the game you’re.
Energy-Efficient Rate-Adaptive GPS-based Positioning for Smartphones Jeongyeup Paek, Joongheon Kim, Ramesh Govindan CENS Talk April 30, 2010.
Academic Research Collaboration with Microsoft Pusheng Zhang Microsoft Virtual Earth/Local Search
Charles Mak Tsz Chung Kobe Chau Yip Kwan Pan Yip Hon Pan 310KM Mobile Commerce Applications 310KM Mobile Commerce Applications.
Tuomo Vierros, Dream Broker Topic H: Video sharing app for iOS / Android / WP7.
Moquan Chen & Stian Kilaas.  Context-aware communication: the way a user is contacted depends on his/her context  This article examines projects and.
What is the … Rapidly growing collection of wireless devices all around us Mostly not yet connected to the internet. Referred to as the I O T.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Click to edit Present’s Name Trends in Location-based Services Muhammad Aamir Cheema.
Ubiquitous Advertising: the Killer Application for the 21st Century Author: John Krumm Presenter: Anh P. Nguyen
Serving Sociologists | Advancing Sociology | Promoting Sociology to Society Geolocation.
Topic: Security / Privacy “Your Apps Are Watching You” Source: The Wall Street Journal Online Presented By: Corey Campbell.
Tina Dimiza Online Products. U ‘ll Never Walk Alone Mobile Augmented Reality vs “Never looked for it before” syndrome Correlate Reality to World Knowledge.
Opportunities for Mobile Enhanced Library Services and Collections Tito Sierra, NCSU Libraries JHU Libraries Assembly May 21, 2010.
THE “MY PLATE” APP CALORIE TRACKER TO HELP USERS GAIN OR LOSE WEIGHT EFFICIENTLY AND EFFECTIVELY.
Intro to Context-Aware Computing Jason I. Hong. Context-Aware Computing Shift from explicit to implicit interaction Use this implicit input to adapt systems.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Privacy-Aware Personalization for Mobile Advertising
Location meets social networking Larry Magid co-director, ConnectSafely.org founder, SafeKids.com
Lecture 17 Page 1 CS 236 Online Network Privacy Mostly issues of preserving privacy of data flowing through network Start with encryption –With good encryption,
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
By Michael Fuhrman. Mission Statement To organize the world's information and make it universally accessible and useful.
Stanford University, Fall 2006 Persuasive Technology & Ribbit Murad, Brian, Dahwun, Yeong Slide #1 Ribbit A conceptual.
ACOMP 2011 A Novel Framework for LBS Privacy Preservation in Dynamic Context Environment.
1 CENS is comprised mostly of Computer Science and Electrical Engineering faculty and graduate students, collaboratively developing: Technologies (hardware.
Mobile and Location-Based Services Jason I. Hong Product Design and Usability April
Chatter Box Daniel Dunham Mike Nelson Nick Noack.
CrowdSearch: Exploiting Crowds for Accurate Real-Time Image Search on Mobile Phones Original work by Tingxin Yan, Vikas Kumar, Deepak Ganesan Presented.
How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots N. Vratonjic, K. Huguenin, V. Bindschaedler, and J.-P. Hubaux PETS.
How they know where you are GPS Privacy/Surveillance: OK Performance: Um… 1500 = too damned long.
Suman Nath, Microsoft Research Felix Xiaozhu Lin, Rice University Lenin Ravindranath, MIT Jitu Padhye, Microsoft Research.
Mobile Location Sensing Tutorial Jie Liu, Dimitrios Lymberopoulos, Bodhi Priyantha, Jacky Shen Microsoft Research.
CS 5150 Software Engineering Lecture 20 Reliability 1 (and a little Privacy)
Kim Dushinski.  The Big Picture  A few campaign examples to get your mind going with possibilities  Solid strategy you can follow  Straight talk about.
The risks behind Location-Based Service Julie Wang.
What’s a mobile app? A mobile app is a software program you can download and access directly using your phone or another mobile device, like a tablet.
1 Privacy Aware Incentive Mechanism to Collect Mobile Data While Preventing Duplication Junggab Son*, Donghyun Kim*, Rasheed Hussain**, Sung-Sik Kwon*,
Montana Brown, Caroline Hallett, Abby Jessup, & Kara Malone COOL SOLAR WINDOW CHARGER.
FriendFinder Location-aware social networking on mobile phones.
Once, Only Once, and In the Right Place: Gathering Location Data for the 2020 Census Jennifer Hunter Childs Center for Survey Measurement Research and.
Personal Training Assistant – Sprint#1 Group Gamma.
Patrol Live The #1 Guard Tour App is now available on Android. All-in-one real-time guard tour app combines GPS geotag scanning, voice notes, photos, live.
Is Context-Aware Computing Taking Control Away from the User? Three Levels of Interactivity Examined Louise Barkhuus and Anind Dey The IT University of.
Dude, Where's My Car? And Other Questions in Context-Awareness Jason I. Hong James A. Landay Group for User Interface Research University of California.
© 2015 albert-learning.com Role of Mobile Phone Apps Role of mobile Phone Apps.
Ideas for using Online Media for Marketing Scenic Byways Adeel Ahmed
HOW TO HACK SOMEONES CELL PHONE CAMERA. Today, mobile phone is one of the most recent things you carry with you everywhere all day dragon. It’s not just.
SARAH FRYE CEO Today, mobile phone is one of the most recent things you carry with you everywhere all day dragon. It’s not just for communication purpose.
Field Consultation Associate The Basics. To provide opportunities to children and adults with diverse challenges to maximize their potential. Our Core.
Location-Sensing and Location Systems 1. A positioning system provides the means to determine location and leaves it to the user device to calculate its.
THE NISSAN LEAF PRESENTATION BY JOSH TIDESWELL. OVERVIEW OF THE L.E.A.F ‘ LEADING ENVIRONMENTALLY FRIENDLY, AFFORDABLE FAMILY CAR’ The first car with.
Geolocation.
Technology: Mobile, Wifi, and Facial Recognition
Using the Computer Responsibly
Technology: Mobile, Wifi, and Facial Recognition
Smart healthy livings using GIS
Mobile Industry Analysis
Averages This half term we will be analysing data – and working out different averages for each form. Averages tell you a typical value for a set of.
Summary AutoMap™ is an innovative vehicle tracking and reporting system that ensures the vehicle’s location and status. Reduces Cost Removes all routine.
Current State of Security and Privacy
Presentation transcript:

Suman Nath Microsoft Research

Contextual Computing Make computing context-aware Context: location, activity, preference, history A lot of progresses in location-aware services

Not enough … Need to use other signals o Do I like Italian restaurant? o Am I walking? Do I drive 10 miles to eat? o Is it lunch time or dinner time? o Alone with family? o Queue time ? How do we get them? o Ask users to release more contextual information o Rely on crowdsourcing Challenges to address: o Energy: partially solved o Privacy: mostly unsolved Personal preference/history User’s context Real-time status

Energy Many services require continuous sensing Acquiring context is expensive Many optimizations proposed o Not sufficient for continuous sensing o Phone will die in a few hours Challenge: continuous sensing for a day without charging Needs innovation: Efficient “Assisted” GPS

Low Power Assisted GPS Not regular GPS replacement Location-based services (e.g. mobile search) Batched location estimation (e.g. path prediction) Delay-tolerance positioning (e.g. geo- tagging photos) Crowdsourcing  code phase NMS 1ms Requires a few ms Takes 1s to minutes Same for ~150KM Mobile phone sends to server: Code phases Cell tower ID Time stamp Server: Computes NMS Computes mobile location LEAP: A Low Energy Assisted GPS for Trajectory-Based Services, Ramos et al. Ubicomp 2011

Privacy: do we care? News: iPhone keeps record of everywhere you go

Do people care? 52% said they were "very or extremely concerned" about loss of privacy from using location-sharing applications Are you worried about geolocation privacy? 48% seriously concerned, 32% little worried 48%

Why is the stake high? Apple fined 1M won ($932) by South Korea over iPhone tracking allegations The suit now counts 26,691 plaintiffs => $26 million Lawmakers Demand Apple Clarify iPhone Tracking Capability Facebook fights new California privacy bill 'Do Not Track Me Online' privacy bill introduced by California Rep. Jackie Speier

PER Theorem Impossible to maximize all three Trivial to maximize any two Privacy Revenue/ Relevance Efficiency Server-side Client-side No-result Michaela Goetz and Suman Nath, Privacy-Aware Personalization for Mobile Advertising, no. MSR-TR , August 2011

My wishlist My context-aware service knows what is relevant Without affecting my phone battery much Without me telling it much about my private context Even if I release limited private information o My privacy is preserved (even with strong adversaries) o In future I can revoke my data o (Only) I can decide how my data is used and shared