An Investigation into Guest Movement in the Smart Party Jason Stoops Faculty advisor: Dr. Peter Reiher.

Slides:



Advertisements
Similar presentations
Slides 13a: Introduction; Qualitative Models MGS3100 Chapter 13 Forecasting.
Advertisements

Chapter 11 Optimal Portfolio Choice
Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet Presented by Eric Arnaud Makita
Urban Encounters: The game of real life Eamonn O’Neill University of Bath Department of Computer Science Vassilis Kostakos University of Madeira / Carnegie.
COLLABORATIVE FILTERING Mustafa Cavdar Neslihan Bulut.
Computer Science 1 CSC 774 Advanced Network Security Enhancing Source-Location Privacy in Sensor Network Routing (ICDCS ’05) Brian Rogers Nov. 21, 2005.
Source-Location Privacy Protection in Wireless Sensor Network Presented by: Yufei Xu Xin Wu Da Teng.
Copyright 2007, Information Builders. Slide 1 Workload Distribution for the Enterprise Mark Nesson, Vashti Ragoonath June, 2008.
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
Matrix Multiplication on Two Interconnected Processors Brett A. Becker and Alexey Lastovetsky Heterogeneous Computing Laboratory School of Computer Science.
The Smart Party A Personalized Location-Aware Multimedia Experience Kevin EusticeNam Nguyen V. Ramakrishna Dr. Leonard Kleinrock Dr. Peter Reiher Location-Driven.
The Smart Party: A Personalized Location-aware Multimedia Experience Kevin Eustice, V. Ramakrishna, Nam Nguyen, and Peter Reiher CCNC January 11, 2008.
A Trust Based Assess Control Framework for P2P File-Sharing System Speaker : Jia-Hui Huang Adviser : Kai-Wei Ke Date : 2004 / 3 / 15.
Establishment of Conference Keys in Heterogeneous Networks Wade Trappe, Yuke Wang, K. J. Ray Liu ICC IEEE International Conference.
Mobile Peer-to-Peer Network Architectures Matt Monroe 4/7/11.
6/25/2015Page 1 Process Scheduling B.Ramamurthy. 6/25/2015Page 2 Introduction An important aspect of multiprogramming is scheduling. The resources that.
Securing Nomads: The Case For Quarantine, Examination, Decontamination Kevin Eustice, Shane Markstrum, V. Ramakrishna, Dr. Peter Reiher, Dr. Leonard Kleinrock,
Random Early Detection Gateways for Congestion Avoidance
Cliff Rhyne and Jerry Fu June 5, 2007 Parallel Image Segmenter CSE 262 Spring 2007 Project Final Presentation.
1 Real Time, Online Detection of Abandoned Objects in Public Areas Proceedings of the 2006 IEEE International Conference on Robotics and Automation Authors.
1 APPLICATION OF DDDAS FOR TRUSTED COMMUNICATION IN MOBILE NETWORKS. Onolaja Olufunmilola Supervisors: Dr Rami Bahsoon, Dr Georgios Theodoropoulos.
Smooth Priorities for Make-to-Stock Inventory Control Carlos F. G. Bispo Instituto de Sistemas e Robótica – Instituto Superior Técnico Technical Univ.
Smart Party: Song Selection Kevin F. Eustice, Jason Stoops, Peter Reiher, Venkatraman Ramakrishna, Nam Nguyen UCLA.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Advanced Computer Networks : RED 1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking,
A Collaborative Music DJ for Ad Hoc Networks Ursula Wolz Mike Massimi Eric Tarn Department of Computer Science The College of New Jersey.
11 Active Botnet Probing to Identify Obscure Command and Control Channels G Gu, V Yegneswaran, P Porras, J Stoll, and W Lee - on Annual Computer Security.
1 SOUTHERN TAIWAN UNIVERSITY ELECTRICAL ENGINEERING DEPARTMENT Gain Scheduler Middleware: A Methodology to Enable Existing Controllers for Networked Control.
Statistical Quality Control/Statistical Process Control
Self-Organizing Agents for Grid Load Balancing Junwei Cao Fifth IEEE/ACM International Workshop on Grid Computing (GRID'04)
Credit-Based Incentive Data Dissemination in Mobile Social Networks Guoliang Liu, Shouling Ji, Zhipeng Cai Georgia State University Georgia Institute of.
Introduction Due to the recent advances in smart grid as well as the increasing dissemination of smart meters, the electricity usage of every moment in.
Multimedia and Mobile communications Laboratory Augmenting Mobile 3G Using WiFi Aruna Balasubramanian, Ratul Mahajan, Arun Venkataramani Jimin.
Sensor Positioning in Wireless Ad-hoc Sensor Networks Using Multidimensional Scaling Xiang Ji and Hongyuan Zha Dept. of Computer Science and Engineering,
Tutor: Prof. A. Taleb-Bendiab Contact: Telephone: +44 (0) CMPDLLM002 Research Methods Lecture 8: Quantitative.
CSE 6590 Fall 2010 Routing Metrics for Wireless Mesh Networks 1 4 October, 2015.
Extending the control of remote laboratories using domotic devices Ricardo Costa
MINING FREQUENT ITEMSETS IN A STREAM TOON CALDERS, NELE DEXTERS, BART GOETHALS ICDM2007 Date: 5 June 2008 Speaker: Li, Huei-Jyun Advisor: Dr. Koh, Jia-Ling.
Chengjie Sun,Lei Lin, Yuan Chen, Bingquan Liu Harbin Institute of Technology School of Computer Science and Technology 1 19/11/ :09 PM.
ACN: RED paper1 Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson, IEEE Transactions on Networking, Vol.1, No. 4, (Aug.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Aemen Lodhi (Georgia Tech) Amogh Dhamdhere (CAIDA)
1 User Interfaces for Pervasive Computing Devices Prof. James A. Landay January 7, 1999
Wireless communications and mobile computing conference, p.p , July 2011.
College of Engineering Anchor Nodes Placement for Effective Passive Localization Karthikeyan Pasupathy Major Advisor: Dr. Robert Akl Department of Computer.
Statistical Quality Control/Statistical Process Control
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
Comparison of Tarry’s Algorithm and Awerbuch’s Algorithm Mike Yuan CS 6/73201 Advanced Operating Systems Fall 2007 Dr. Nesterenko.
Ashley White.  Computing that is made to be found anywhere and everywhere.  A high degree of communication among devices and sensors through a ubiquitous.
Security Vulnerabilities in A Virtual Environment
M IST : An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis Colin D. Walter formerly: (Manchester, UK)
M IST : An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis Colin D. Walter (Manchester, UK)
Cooperative Location- Sensing for Wireless Networks Authors : Haris Fretzagias Maria Papadopouli Presented by cychen IEEE International Conference on Pervasive.
Power Guru: Implementing Smart Power Management on the Android Platform Written by Raef Mchaymech.
Fair and Efficient multihop Scheduling Algorithm for IEEE BWA Systems Daehyon Kim and Aura Ganz International Conference on Broadband Networks 2005.
An Energy-Efficient Approach for Real-Time Tracking of Moving Objects in Multi-Level Sensor Networks Vincent S. Tseng, Eric H. C. Lu, & Kawuu W. Lin Institute.
Cooperative Location-Sensing for Wireless Networks Charalampos Fretzagias and Maria Papadopouli Department of Computer Science University of North Carolina.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
The ECTS grading table 2015 Maria Sticchi Damiani
Mobile &Wireless Computing
Supporting Fault-Tolerance in Streaming Grid Applications
Process Scheduling B.Ramamurthy 11/18/2018.
The Smart Party.
Process Scheduling B.Ramamurthy 12/5/2018.
Process Scheduling B.Ramamurthy 2/23/2019.
Dynamic Facet Ordering for Faceted Product Search Engines*
Process Scheduling B.Ramamurthy 4/11/2019.
Process Scheduling B.Ramamurthy 4/7/2019.
CSE 4340/5349 Mobile Systems Engineering
Presentation transcript:

An Investigation into Guest Movement in the Smart Party Jason Stoops Faculty advisor: Dr. Peter Reiher

Outline Project Introduction Key metrics and values Mobility Models, Methods of Testing Results Analysis

What is the Smart Party? Ubiquitous computing application Someone hosts a gathering Guests bring wireless-enabled devices Devices in the same room cooperate to select and supply media to be played Songs played in a room represent tastes of guests present in that room

Project Motivation Are there ways to move between rooms in the party that can lead to greater satisfaction in terms of music heard? Can we ultimately recommend a room for the user? What other interesting tidbits about the Smart Party can we come up with along the way?

Smart Party Simulation Program Basis for evaluating mobility models (rules of movement). Real preference data from Last.FM is used. Random subsets of users and songs chosen  Many parties with same conditions are run with different subsets to gather statistics about the party. Initial challenge: extend existing simulation to support multiple rooms.

Metrics Satisfaction: based on 0-5 “star” rating  Rating determined by play count  Exponential scale: k-star rating = 2 k satisfaction  0-star rating = 0 satisfaction (song unknown) Fairness: distribution of satisfaction  Gini Coefficient – usually used for measuring distribution of wealth in a population.  In Smart Party, wealth = satisfaction.  Ratio between 0 to 1, lower is more fair.

Key values History Length  Number of previously heard songs the user device will track.  Used to evaluate satisfaction with current room Satisfaction Threshold  Used as a guide for when guest should consider moving.  If average satisfaction over last history-length songs falls below sat-threshold, guest considers moving.

Mobility Models Tested No movement Random movement Threshold-based random movement Threshold-based to least crowded room Threshold-based, population weighted Threshold-based, highest satisfaction

Test Procedure Round 1: Broad testing to find good values for history length and satisfaction threshold for each model. (25 iterations) Round 2: In-depth evaluation of model performance using values found above. (150 iterations) Ratio of six guests per room maintained

Round 1 Results ModelHistory LengthThreshold No Movementn/a Randomn/a Threshold Random41 Threshold Least Crowded 41 Threshold Random, Population Weighted 50.5 Threshold Highest Satisfaction 22.25

Round 2: Satisfaction Overview

Round 2: Fairness Overview

Topics for Analysis Moving is better than not moving Party stabilization? Initial room seeking Population-based models perform poorly Satisfaction-based model performs well

Moving Versus Not Moving Movement “stirs” party, making previously unavailable songs accessible Songs users have in common changes with movement, depleted slower.

Party stabilization? Do users find “ideal rooms” and stop moving? No! Some movement is always occurring. Cause: Preferences are not static, they evolve over time.

Initial room seeking 90% of guests move after round 1 Guests have some information to go on after one song plays. Guests that like the first song in a room likely have other songs in common.

Initial room seeking, cont. In satisfaction-based model, peak is in round 2 All other models peak in round 1.

Population-based models Worse than choosing a room at random! Weighted model performed better as weighting approached being truly random. However, still better than not moving at all.

Satisfaction based model Informed movement better than random movement. Greater advantage as more rooms are added. Short history length (two songs) used since history goes “stale”.

Conclusion Room recommendations are a feasible addition to the Smart Party User Device Application. Recommendations based on songs played are more valuable than those based on room populations. Movement is a key part of the Smart Party.

Acknowledgements At the UCLA Laboratory for Advanced Systems Research:  Dr. Peter Reiher  Kevin Eustice  Venkatraman Ramakrishna  Nam Nguyen For putting together the UCLA CS Undergraduate Research Program  Dr. Amit Sahai  Vipul Goyal

References Eustice, Kevin; Ramakrishna, V.; Nguyen, Nam; Reiher, Peter, "The Smart Party: A Personalized Location-Aware Multimedia Experience," Consumer Communications and Networking Conference, CCNC th IEEE, vol., no., pp , Jan Kevin Eustice, Leonard Kleinrock, Shane Markstrum, Gerald Popek, Venkatraman Ramakrishna, Peter Reiher. Enabling Secure Ubiquitous Interactions, In the proceedings of the 1st International Workshop on Middleware for Pervasive and Ad-Hoc Computing (Co-located with Middleware 2003), 17 June 2003 in Rio de Janeiro, Brazil. Gini, Corrado (1912). "Variabilità e mutabilità" Reprinted in Memorie di metodologica statistica (Ed. Pizetti E, Salvemini, T). Rome: Libreria Eredi Virgilio Veschi (1955). Audioscrobbler. Web Services described at