E-Shadow: Lubricating Social Interaction using Mobile Phones Jin TengPh.D. Advisor: Dr. Dong Xuan Joint Work with Boying Zhang, Xinfeng Li, Xiaole Bai.

Slides:



Advertisements
Similar presentations
Mobile and ubiquitous computing Chapter 16 Distributed systems, concepts and design, 4th edition, 2005, Coulouris et al Ylva-Li Lindh Gabriella Hammarin.
Advertisements

Interactive Classroom Goals Overview of the User Experience Demo Applying Lessons from Classroom Presenter Discussion.
Robot Sensor Networks. Introduction For the current sensor network the topography and stability of the environment is uncertain and of course time is.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Wearable Badge for Indoor Location Estimation of Mobile Users MAS 961 Developing Applications for Sensor Networks Daniel Olguin Olguin MIT Media Lab.
GRS: The Green, Reliability, and Security of Emerging Machine to Machine Communications Rongxing Lu, Xu Li, Xiaohui Liang, Xuemin (Sherman) Shen, and Xiaodong.
Knowledge Fusion Research Workshop St. Michaels, Maryland October 19-22, 2004 KMCOE Surveillance Imagery Over An Agent-Based Platform Dr. Willie Thompson,
Locating in fingerprint space: wireless indoor localization with little human intervention. Proceedings of the 18th annual international conference on.
Design and Implementation of Smartphone-based Systems and Networking
VISIT: Virtual Intelligent System for Informing Tourists Kevin Meehan Intelligent Systems Research Centre Supervisors: Dr. Kevin Curran, Dr. Tom Lunney,
BuZZone for Trade Shows: Searching for New Partners and Efficiently Exchanging Information The product is developed by Bacup IT.
1 ENERGY: THE ROOT OF ALL PERVASIVENESS Anthony Ephremides University of Maryland April 29, 2004.
Towards Security and Privacy for Pervasive Computing Author : Roy Campbell,Jalal Al-Muhtadi, Prasad Naldurg,Geetanjali Sampemane M. Dennis Mickunas.(2002)
Crossroads Copenhagen Project A Wireless 3D Positioning Wireless 3D Positioning Outdoor Positioning using GPS or GPS or Operator driven telephone networks.
I Am the Antenna: Accurate Outdoor AP Location using Smartphones
Mobile and Pervasive Computing Overview Material taken from: “Fundamental Challenges in Mobile Computing” and “Pervasive Computing: Vision and Challenges”
New Technologies Are Surfacing Everyday. l Some will have a dramatic affect on the business environment. l Others will totally change the way you live.
Wang, Z., et al. Presented by: Kayla Henneman October 27, 2014 WHO IS HERE: LOCATION AWARE FACE RECOGNITION.
I AM THE ANTENNA: ACCURATE OUTDOOR AP LOCATION USING SMARTPHONES ZENGBIN ZHANG, XIA ZHOU, WEILE ZHANG, YUANYANG ZHANG GANG WANG, BEN Y. ZHAO, HAITAO ZHENG.
Presented by: Z.G. Huang May 04, 2011 Did You See Bob? Human Localization using Mobile Phones Romit Roy Choudhury Duke University Durham, NC, USA Ionut.
A Vehicular Ad Hoc Networks Intrusion Detection System Based on BUSNet.
1 CSCE 5013: Hot Topics in Mobile and Pervasive Computing Nilanjan Banerjee Hot Topic in Mobile and Pervasive Computing University of Arkansas Fayetteville,
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
Introduction Kinect for Xbox 360, referred to as Kinect, is developed by Microsoft, used in Xbox 360 video game console and Windows PCs peripheral equipment.
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANS) Submission Title: [THALES Coms motivation in IEEE a] Date Submitted:
May 2011 doc.: IEEE wng0 SubmissionSamsung Electronics, SNU Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
Groupware: Facilitation, Cooperation, & Collaboration Kristin Davis i385q/KMS November 10, 2005.
ASM Mahfujur Rahman Bridging Virtual to Real: A New Approach to Annotation, 2D/3D Representation and Interaction with Ambient.
The MobiSoC Middleware for Mobile Social Computing Cristian Borcea, Ankur Gupta, Achir Kalra, Quentin Jones, Liviu Iftode* Department of Computer Science.
TurfCast: A Service for Controlling Information Dissemination in Wireless Networks Xinfeng Li, Jin Teng, Boying Zhang, Adam Champion and Dong Xuan IEEE.
Extending the control of remote laboratories using domotic devices Ricardo Costa
Dynamic Fine-Grained Localization in Ad-Hoc Networks of Sensors Weikuan Yu Dept. of Computer and Info. Sci. The Ohio State University.
Online and Hybrid Course Design. Define Terms Traditional course Web Enhanced course Hybrid course Online course.
SECURITY SCHEMES FOR AMI Jincheol Kim et al. – Korea – Distribution business and impact of regulation – 0845 Jincheol Kim, Seongji Ahn, Youngeok Kim Jongman.
Wireless Networking Nandakumar.P. Web Resource
RADAR: an In-building RF-based user location and tracking system
Chapter 6 Relaxation (1) CDS in unit disk graph
2017/4/25 INDOOR LOCALIZATION SYSTEM USING RSSI MEASUREMENT OF WIRELESS SENSOR NETWORK BASED ON ZIGBEE STANDARD Authors:Masashi Sugano, Tomonori Kawazoe,
1 Mobile Computing and Wireless Networking CS 851 Seminar 2002 Fall University of Virginia.
Human Tracking System Using DFP in Wireless Environment 3 rd - Review Batch-09 Project Guide Project Members Mrs.G.Sharmila V.Karunya ( ) AP/CSE.
Ultra High Density WLAN
Performance Study of Localization Techniques in Zigbee Wireless Sensor Networks Ray Holguin Electrical Engineering Major Dr. Hong Huang Advisor.
Fault Tolerant WSN Routing Dong Han Advisor: Dr. Omprakash Gnawali Networked Systems Laboratory University of Houston 1.
1.Research Motivation 2.Existing Techniques 3.Proposed Technique 4.Limitations 5.Conclusion.
Providing User Context for Mobile and Social Networking Applications A. C. Santos et al., Pervasive and Mobile Computing, vol. 6, no. 1, pp , 2010.
Ashley White.  Computing that is made to be found anywhere and everywhere.  A high degree of communication among devices and sensors through a ubiquitous.
Pervasive Gaming with Mobile Devices Prepared By: Karnung Liang Project Supervisor: Dr Brett Wilkinson.
P 3 -Coupon: A Probabilistic System for Prompt and Privacy-Preserving Electronic Coupon Distribution Boying ZhangPh.D. Advisor: Dr. Dong Xuan Joint Work.
ROVER TECHNOLOGY PRESENTED BY Gaurav Dhuppar Final Year I.T. GUIDED BY Ms. Kavita Bhatt Lecturer I.T.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Jin Yan Embedded and Pervasive Computing Center
May 2011 doc.: IEEE wng0 SubmissionSamsung Electronics, SNU Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
TIU Tracking System Requirements Asset tag’s size: 1” x 1” x 1” Low power consumption Accurate Web application as user interface 2D map display Scalable.
Name Of The College & Dept
Localized Low-Power Topology Control Algorithms in IEEE based Sensor Networks Jian Ma *, Min Gao *, Qian Zhang +, L. M. Ni *, and Wenwu Zhu +
1 Architecture and Behavioral Model for Future Cognitive Heterogeneous Networks Advisor: Wei-Yeh Chen Student: Long-Chong Hung G. Chen, Y. Zhang, M. Song,
Student Study Software Tool and Teaching Assistant
ANONYMOUS STORAGE AND RETRIEVAL OF INFORMATION Olufemi Odegbile.
Hybrid Indoor Positioning with Wi-Fi and Bluetooth: Architecture and Performance IEEE Mobile Data Management 2013 Artur Baniukevic†, Christian S. Jensen‡,
Accurate WiFi Packet Delivery Rate Estimation and Applications Owais Khan and Lili Qiu. The University of Texas at Austin 1 Infocom 2016, San Francisco.
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 1 Sriram Chellappan, Xiaole Bai, Bin Ma ‡ and Dong Xuan Presented by Sriram.
I Am the Antenna: Accurate Outdoor AP Location using Smartphones
Energy Efficiency in HEW
Algorithms for Big Data Delivery over the Internet of Things
PERFORMANCE ANALYSIS OF SPECTRUM SENSING USING COGNITIVE RADIO
Cloud Security 李芮,蒋希坤,崔男 2018年4月.
Reducing Total Network Power Consumption
Optimizing Energy Consumption in Wireless Sensor
Team North Star + Lockheed Martin
Presentation transcript:

E-Shadow: Lubricating Social Interaction using Mobile Phones Jin TengPh.D. Advisor: Dr. Dong Xuan Joint Work with Boying Zhang, Xinfeng Li, Xiaole Bai Motivation Design Goals and Challenges Our Solution Human Direction-Driven Localization Implementation Evaluation Future Work  Importance of Face-to-Face Interaction  Prevalence of mobile phones  Layered publishing  Attracts more people by unobtrusively publishing different content at different distances  Saves energy using hybrid wireless communication technologies  Human direction-driven localization  Auxiliary support for mutually interested people to approach each other Layered Publishing  Localization in local social networking  Traditional localization techniques are either unavailable or imprecise  Direction is more important than distance  A new range-free localization technique  RSSI comparison: Less prone to errors  Space partitioning: Tailored for direction decision  Walking routes design  Triangular route: A→B→C in (a)  Semi-octagonal route: A→B→C→D→E in (c)  Design Goals  Far-reaching and unobtrusive  Auxiliary support for further interactions  Broad adoption  Challenges  Lack of communication support  Non-pervasive localization service  Power and computation limitations  E-Shadow attends its owner like a shadow  Local profile as a personal social descriptor  Mobile phone based local social interaction tools: E-Shadow publishing and E-Shadow localization  Working Scenario Concept  Features of mainstream wireless communication technologies  E-Shadow collection time and power consumption  E-Shadow localization accuracy Outdoor: Open Campus Indoor: Large Classroom  Enhance information publishing capability in crowded areas  Provide more accurate and feasible matching algorithm  Increase user capability to control privacy and security  Design more tools that can further increase user capabilities in face-to-face social networking Publication: Jin Teng, Boying Zhang, Xinfeng Li, Xiaole Bai and Dong Xuan. “E-Shadow: Lubricating Social Interaction using Mobile Phones”, to appear in Proc. of IEEE International Conference on Distributed Computing Systems (ICDCS) ’11. Unobtrusive Publishing Approach Effective RangeAllowable Message Size Power Consumption Wi-FiSSID40-50 meters32 bytesHigh BluetoothDevice Name20 meters2k bytesLow Service Name10 meters1k bytesLow  Our methodology  Uses three layers to publish different information for the same person  Uses different wireless communication technologies at each layer  Implemented on HTC Touch Diamond2, Windows Mobile 6.1 Related Work  Mobile social networking applications Ref. N. Eagle and A. Pentland, “Social Serendipity: Mobilizing Social Software”. In IEEE Pervasive Computing,  Localization techniques for mobile phones Ref. N. Banerjee, S. Agarwal, P. Bahl, et al., “Virtual compass: relative positioning to sense mobile social interactions”. In Pervasive,  Limitations  Unable to capture the dynamics of surroundings  No mapping between electronic IDs and human faces  Localization techniques either not pervasive or inaccurate at long range