SlideShare uma empresa Scribd logo
1 de 64
MOBISYS: PERVASIVE COMPUTING
           ucl/birkbeck research oct. 14 2008

          format: 4 slides/minutes per person

                          speakers:




•   Mohamed Ahmed                 •   Dikaios Papadogkonas
•   Ettore Ferranti               •   Panagiotis Papakos
•   Tom Hewer                     •   Elisa Rondini
•   Eli Katsiri                   •   Jenson Taylor
•   Ilias Leontiadis              •   Michael Zoumboulakis
•   Liam McNamara


                       • Stephen Hailes
                       • George Roussos
liam mcnamara

                [next up: panagiotis]
Content sharing in Urban Environments




              Liam McNamara <l.mcnamara@cs.ucl.ac.uk>
Who to download from?


Short-range wireless networks can have
huge churn.

We need to choose someone with matching
tastes that will be colocated long-
enough to transfer a file.

Thus, we need to predict neighbours
colocation length.

'Bad' sources need to be avoided.
What to download from them?


If files can be successfully
transferred, which ones should be
shared first?
                                              Pop
                                              Jazz
                                              Classical

      Rock
                                 Daniel
      Blues
      Country   Carol




                         Alice       Rock?
       Pop                           Metal?
       Rock     Bob                  Blues?
Future Work




    File percolation through network.


    Improve Symbian sharing application.


    Deployment (with your help!)


    Thesis :/
panagiotis papakos

                     [next up: jenson]
[problem]: Adaptive Service Discovery in Mobile Systems


     Web Service discovery in mobile systems using a broker.
                    Service
                    Request               Query
          Mobile                                       Service
                               Broker
          Device                                     Repository
                    Service              Matching
                    Binding              Services

     Factors that may affect web service requirements in
     Mobile Systems
     •Context : Network Coverage, Other Local Devices, User
     Preferences etc.
     •   Resources : Battery Level, Memory Usage, CPU load etc

     The broker cannot assess such variables.



                                                    Panagiotis Papakos
[proposal] : A middleware approach


Problem
 The web service requirements (QoS requirements,
functionality etc) of a mobile device may change due to
changes in the context or the resources of the mobile
device.


Proposal
A middleware that :
•   Monitors the Resources of the Device
•   Monitors the Context of the Device
•   Adapts the web service Request appropriately
Proposed Architecture

               Context and                      Adapted
              Resource data                 Service Request
                               Middleware                              Query
    Mobile
             Service Request                                  Broker
    Device
                                                                       Matching
                              Service Binding                          Services


Use of States to indicate status of the device (Low Power,
Low Connection, Emergency, Meeting etc)

Adapt the Web Service Request according to the State of the
device:
•   QoS Requirements
•   Functional Requirements
•   Trust
[future work]


Work in Conjunction with the Dino Project by Arun Mukhija
(SENSORIA).

Future Work:
•   Further Development
•   Prototype Implementation
•   Case Studies

Expand To Include :
•   Adapt requirements according to broker feedback
•   Interaction between devices using this middleware
•   Reconfiguration of the device according to state
jenson taylor

                [next up: mo]
[problem] : How can we make efficient use of social
links for routing messages in delay tolerant networks?



   
       How often (and how long) different individuals meet. (e.g. two friends are likely to
       meet at least once a week)
   
       How often (and how long) different individuals spend within the proximity of a certain
       geographical location. (e.g. two individuals working in the same building)
   
       What time are individuals likely to be in certain locations. (e.g. people working
       together are likely to be in the same location during working hours, and only on
       certain days of the week)




                                                                            [Jenson Taylor]
[Snout]


    Participatory sensing
    
      Users act as mobile nodes
    
      In theory it seamlessly fits into everyday life
-
    Snout platform
    -
      sensors - co,co2,sound & organic solvents
    -
      GPS
-
    Geocentric visualisation of sensor readings
routing in “social delay tolerant networks”


        Efficient routing in delay tolerant mobile networks
        
              Network characteristics:
            
               Nodes are at one with users
            
               Nodes don’t have permanent connection to network
            
               No logical addresses
            
               Communication is asynchronous
            
               Packet loss is tolerated
        
              Efficiency definition:
            
               Resource usage, Overhead/replication/
            
               Message delivery speed (time)
            
               Message delivery number of hops

    
            Using influence maps to determine the next hop in the
            delivery route
mohamed ahmed

                [next up: elisa]
[Problems]


  Tools for supporting the development
of control software [With: ARAGORN,
CHAT]


  Control of cross-layer optimisation
in wireless network [With: ARAGORN]


  Information and Reputation [With:
Steve]

                                Mohamed Ahmed
[complications or proposals]:Plenty   of both!




  
    Components based software and policy
  languages for real-time and fast
  executing systems

  
    ML and control architectures for
  management and adaptation

  
    The limits and bounds of reputation
  based analysis
[future work]:

  
    Can we make these systems work?   How
  well? What are the compromises?
  
      Development of systems

  
    Experimentation with learning and
  control architectures
elisa rondini

                [next up: michael]
[Problem]: How do bandwidth constraints impact
the distribution of intensive jobs in WSNs?


1.   Computationally intensive applications.
     Resource-constrained devices.




8.   Limited available bandwidth.
     Radio communication interferences.




                                               [Elisa Rondini]
[Proposal]: Bandwidth-Aware Task Scheduling
(BATS) scheme for Distributed Wireless Ad hoc
Grids (DWAG) in WSNs.
 •   Distributed Wireless Ad hoc Grids (DWAG)
     to implement distributed algorithms in WSNs
     formed by resource-constrained devices.




 •   Bandwidth-Aware Task Scheduling (BATS)
     to load share location computing tasks among
     sensors by assessing both node computational
     capabilities and local network conditions.
Homogeneous Tasks: application of DWAG with
BATS for Collaborative Node Localisation (i.e.
CCA-MAP*).




* L. Li and T. Kunz, “Cooperative Node Localization for Tactical Wireless Sensor Networks”, in Proc. of the IEEE/Boeing MILCOM, October
2007.
* L. Li and T. Kunz, “Cooperative Node Localization Using Non-Linear Data Projection”, in ACM Transactions on Sensor Networks, 2008.
[Future work]: What happens if we deal with
more heterogeneous tasks?




               Need to combine nodes’ computational
               capabilities and local network conditions
               (external characteristics) with tasks’ CPU
               and Bandwidth profile characterizations.
michael zoumboulakis

                       [next up: ettore]
Efficient Pattern Detection in WSNs




  [text or images here]

   Complex Events:
   
       Wildfire detection,
   
       Flash flood prediction, etc.

                             Michael Zoumboulakis
Efficient Pattern Detection


  Patterns that are extremely difficult
or impossible to capture using
thresholds.

  May not be known in advance.

  Symbolic Conversion is a successful
technique for mining time-series.

  We have adapted a SC algorithm for
efficient real-time mining in WSNs.
Efficient Pattern Detection


  Multiple-pattern detection using
Suffix Arrays; Advantage: scalability.

  Approximate pattern matching;
Advantage: flexibility.

  Unknown pattern matching; Advantage:
efficiency through dynamically
adjusting the sampling frequency.

  Light-weight implementation optimised
using integer arithmetic.
Current & Future Work




       [text or images here]
   
     Design a framework that
   caters for Detection of
   Spatial Events.
   
     Use a few readings to infer
   the nature and
   characteristics of the event.
ettore ferranti

                  [next up: dikaios]
[Problem]: How To Explore Unknown Areas




                            [Ettore Ferranti]
[Proposal]: Team of Mobile Agents





  No prior knowledge of the area’s map. (which can change after a disaster).

  Lack of exact knowledge of agents’ positions.

  Long-range Agent-to-Agent communication is unreliable.
Give Us Algorithms!




           (Agent-to-Tag):
           Multiple D epth First
           S earch
           B rick&Mortar
           (Tag-to-Tag):
           HybridE xploration
Now Make It Real!
dikaios papadogkonas

                       [next up: tom]
Pervasive Navigation


    Pervasive computing systems
    record user interactions with
    physical and digital resources

    Common Tasks
    −   Usage Analysis
    −   Prediction
    −   Pattern Recognition

    No unified methodology exists
    to deal with common problems
Proposal

    A probabilistic model for the
    representation of user interaction with
    the pervasive computing space

    Trail based analysis
    −   Landmarks, significant objects in
        space
    −   Trails, series of landmark
        interactions

    Use of different metrics
    −   Time, Space, Orientation

    Use for different pervasive systems
    −   Reality Mining, Dartmouth, Cityware
Trail Extraction
Prediction
tom hewer

            [next up: ilias]
[large-scale simulation of
  vehicular networks]
Current network simulation tools
available require many CPU hours
to run even small simulations on
   a single-processor machine


                     collision avoidance
                  adaptive vehicle routing
                 information dissemination
                    charging/toll systems
               intelligent transport systems



                        Given the applications required
                              of vehicular network
                          simulations, the results are
                              often time-dependent
                                               [tom hewer]
[computational expense]


   complexity of the network and mobility models

   tight-coupling such that models interoperate

the granularity of models for locale can be changed

 N-squared and N-log(N) problems as a function of
                   connectivity




                                           42
[challenges of HPC]
     how to decompose the simulation?
 Domain and task farming algorithms for vehicular simulations
             require much boundary communication
   Component decomposition allows us to keep this boundary
   communication low but still keep the simulation free of
              causality/synchronisation problems


          Technique:
  split the nodes into lists
  (per processor available)
  create a global simulation
object on each processor and
  perform all processing for
     each node on its home
           processor
then update the global object
[future work]

efficiency of decomposition algorithm
      hierarchical binning method to split nodes

          adaptive binning and live movement

    parameter search simulations
    explore the parameter space and compare results

      node aggregation and processing efficiency

    visualisation and processing
                live view and steering

    validation of scenarios and
            applications
               reference to live studies

        accurate and sound analysis/statistics
ilias leontiadis

                   [next up: eli]
Information Dissemination
   in Vehicular Networks
• Growing number of vehicles with Navigation Systems
• Add short-range radio (e.g. wifi)

• Applications of vehicular networks
  –   traffic information dissemination
  –   safe navigation (warnings)
  –   urban sensing (monitor traffic, vehicles as sensors)
  –   parking slots (fine grained information)
  –   gas stations fuel prices
  –   advertising
  –   ...
• Push-based
  – e.g., notify me on all traffic
    jams on my route
• Pull-based
  – e.g., how is the traffic on M11 ?


                                                    Ilias Leontiadis, Cecilia Mascolo
The role of the Navigation System




   –   Suggested routes           M o bility pa tterns predic ta ble
       –   Route/Disseminate information in specific areas

   –   Suggested routes           I nteres ts (e.g. receive warnings on my
       route)

   –   Map information            L o c a tio n a s c o ntex t (flexible
       topics/matching)
       –   Describe warnings/affected areas flexibly
       –   Describe interests
Push based notifications
(e.g. traffic warnings/accidents)


  Navigation system now provides automatic
   subscription to events about vehicle’s route

– Use infrastructure (if available)
– Vehicle-to-Vehicle communication when:
  • No infrastructure is available
  • Local information
  • Fine grained information (e.g. parking spots)


– We use the Navigation System to:
  • Geographically route information in affected areas.
  • Keep disseminating information in affected areas
  • Inform only affected vehicles (given by the suggested route)
Pull based notifications
 (e.g. how is the traffic on M11 )


• Opportunistic routing to forward
  requests to the nearest infostations

• Issue: how to deliver the reply back ?
  – target is moving

• Solution
  – We use the Navigation System to Route the
    reply back on the suggested route of the
    requested vehicle
Future work
 
     Currently Implementing the system
     −   Testing with small fleet of bicycles and limited
         number of vehicles


 
     Working on traffic information dissemination
     −   Every vehicle collects traffic information and
         “Publish” this information to the affected vehicles.
     −   Vehicles that receive information
          
              estimate traffic conditions on parts of their route
          
              select paths that will minimise TIME
eli katsiri

              [next up: kones]
[secure autonomy in pervasive healthcare]

The Nurse SMC loads a Mission (a set of policies) onto a SMC that belongs
to the patient role. E.g. LoadMission(ReadTemp);
The Mission requires the Patient to:   Two authorisation policies are needed:
take a temperature reading
•
                                       3.A nurse SMC is the subject of an
•
 send the data to the Nurse           authorization policy that grants the nurse
                                      role permission to load missions on
    if their temperature is abnormal.
                                      members of the patient role.
Mission ReadTemp{
                                      4.The patient SMC needs to be granted


Patient.Temp.read(): Temp             permission to execute any remote
                                      invocations on the nurse interfaces are
if Temp>40C                           specified as part of the mission.
    Nurse.Notify(Temp)
}
                                                                [Eli Katsiri]
[common representation]
if (type==PKT_CMD)
  //remote invocation
   {
     //Access Control Module
     if
(AC.authorise(srcid,oid,cmd)==TRUE)
  execute(msg);
     }
       else {
         //event
         //Policy Service
           call EventInterface( msg);
       }
}




Publications BSN2008, invited book chapter JCKSBE08
[A ECA policy interpreter]




                              55




Publications AMUSE, BSN2007
[first-order logic model]



    1.   Model based knowledge representation and
         reasoning.

    3.   First-order logic: expressiveness closer to user
         intuition

    5.   Other security/trust mechanisms that are
         applicable to BSN.

Publications JKBSE08, invited book chapter JKBSE08
kones saranavamutu

                     [next up: george]
[How trustworthy are my friends?]



     Does regularity in social behavior imply trustworthiness?


     How does the degree of regularity affect trustworthiness?


     How can we detect/evaluate regularity?


8.   Summary of the social interaction in two real world datasets.
9.   Analysis of complex social-spatial-temporal context
10.  Recognising social patterns in daily user activity and relationships
11.  Identifying socially significant locations
12.  applications which will be of significant value to e-business.
                                                  [Kones Saravanamutu]
N. Eagle and A. Pentland (2007), quot;Eigenbehaviors: Identifying Structure in Routinequot;, Behavioral Ecology and Sociobiology



    [What’s the story with my MIT mates?]




N. Eagle and A. Pentland (2007), quot;Eigenbehaviors: Identifying Structure in Routinequot;,
Behavioral Ecology and Sociobiology
[What about my ENRON colleagues?]




P.S. Keila and D.B. Skillicorn(2005),quot;Structure in the Enron Email Datasetquot;,
Retrieved on June,2008. http://research.cs.queensu.ca/~skill/enron.pdf
[Next Steps]




    [text or images here]


•
    Apply image processing techniques such as
    Eigenbehaviors and PCA to bitmaps that are
    derived from the visualisation.

•
    N. H. Minsky. “Regularity-based trust in
    Cyberspace”. In proceedings of 1st Int, Conf. on
george roussos

                 [next up: steve]
steve hailes

               [next up: discussion]
projects @ UCL mobisys


                            Digital economy - privacy

            CARDyAL
                         Utiforo
      TOUMAZ                   Security and Trust
                        MARS
       NIRS
          Wireless & sensorIU-ATC           CLEF
              SystemsCHAT RUNES          SEINIT
    ARAGORN
                      Divergent GRID
                     U2010 Networking and
                  SESAME Distributed systems
                  SUAAVE           HEN
              6WINIT
                                    EIFFEL

                                                        64

Mais conteúdo relacionado

Mais procurados

FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+PlatformFYP%3A+Peer-to-Peer+Communication+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+PlatformTianwei_liu
 
WebSocket - Enabling Technology for Dynamic Web Applications
WebSocket - Enabling Technology for Dynamic Web ApplicationsWebSocket - Enabling Technology for Dynamic Web Applications
WebSocket - Enabling Technology for Dynamic Web ApplicationsBergmans Mechatronics LLC
 
Cisco Presentation 1
Cisco Presentation 1Cisco Presentation 1
Cisco Presentation 1changcai
 
Experimental Applications of Mapping Services in Wireless Sensor Networks
Experimental Applications of Mapping Services in Wireless Sensor NetworksExperimental Applications of Mapping Services in Wireless Sensor Networks
Experimental Applications of Mapping Services in Wireless Sensor NetworksM H
 

Mais procurados (7)

135 139
135 139135 139
135 139
 
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+PlatformFYP%3A+Peer-to-Peer+Communication+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+Platform
 
WebSocket - Enabling Technology for Dynamic Web Applications
WebSocket - Enabling Technology for Dynamic Web ApplicationsWebSocket - Enabling Technology for Dynamic Web Applications
WebSocket - Enabling Technology for Dynamic Web Applications
 
Cisco Presentation 1
Cisco Presentation 1Cisco Presentation 1
Cisco Presentation 1
 
E-commerce
E-commerceE-commerce
E-commerce
 
Experimental Applications of Mapping Services in Wireless Sensor Networks
Experimental Applications of Mapping Services in Wireless Sensor NetworksExperimental Applications of Mapping Services in Wireless Sensor Networks
Experimental Applications of Mapping Services in Wireless Sensor Networks
 
Sdn03
Sdn03Sdn03
Sdn03
 

Destaque (7)

Amistad
AmistadAmistad
Amistad
 
Autos Electricos David Trumbull
Autos Electricos David TrumbullAutos Electricos David Trumbull
Autos Electricos David Trumbull
 
BMW0862127
BMW0862127BMW0862127
BMW0862127
 
Ball
BallBall
Ball
 
Urgenteeeeee
UrgenteeeeeeUrgenteeeeee
Urgenteeeeee
 
Yahoo Mobile Widgets
Yahoo Mobile WidgetsYahoo Mobile Widgets
Yahoo Mobile Widgets
 
Objetivos
ObjetivosObjetivos
Objetivos
 

Semelhante a MobiSys Group Presentation

(R)evolution of the computing continuum - A few challenges
(R)evolution of the computing continuum  - A few challenges(R)evolution of the computing continuum  - A few challenges
(R)evolution of the computing continuum - A few challengesFrederic Desprez
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOpenStorageSummit
 
Skeuomorphs, Databases, and Mobile Performance
Skeuomorphs, Databases, and Mobile PerformanceSkeuomorphs, Databases, and Mobile Performance
Skeuomorphs, Databases, and Mobile PerformanceSam Ramji
 
Skeuomorphs, Databases, and Mobile Performance
Skeuomorphs, Databases, and Mobile PerformanceSkeuomorphs, Databases, and Mobile Performance
Skeuomorphs, Databases, and Mobile PerformanceApigee | Google Cloud
 
Bringing Wireless Sensing to its full potential
Bringing Wireless Sensing to its full potentialBringing Wireless Sensing to its full potential
Bringing Wireless Sensing to its full potentialAdrian Hornsby
 
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...PARC, a Xerox company
 
Data management issues
Data management issuesData management issues
Data management issuesNeha Bansal
 
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?Gabriele Bozzi
 
CloudCamp Milan 2009: Telecom Italia
CloudCamp Milan 2009: Telecom ItaliaCloudCamp Milan 2009: Telecom Italia
CloudCamp Milan 2009: Telecom ItaliaGabriele Bozzi
 
STPCon fall 2012: The Testing Renaissance Has Arrived
STPCon fall 2012: The Testing Renaissance Has ArrivedSTPCon fall 2012: The Testing Renaissance Has Arrived
STPCon fall 2012: The Testing Renaissance Has ArrivedSOASTA
 
Internet Scale Architecture
Internet Scale ArchitectureInternet Scale Architecture
Internet Scale ArchitectureRightScale
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...DellNMS
 
Hardware virtualized flexible network for wireless data center optical interc...
Hardware virtualized flexible network for wireless data center optical interc...Hardware virtualized flexible network for wireless data center optical interc...
Hardware virtualized flexible network for wireless data center optical interc...ieeepondy
 
Understanding mobile service usage and user behavior pattern for mec resource...
Understanding mobile service usage and user behavior pattern for mec resource...Understanding mobile service usage and user behavior pattern for mec resource...
Understanding mobile service usage and user behavior pattern for mec resource...Sabidur Rahman
 
Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Mobile Applications on an Elastic and Scalable 2-Tier Cloud ArchitectureMobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Mobile Applications on an Elastic and Scalable 2-Tier Cloud ArchitectureReza Rahimi
 
Mobile IoT Middleware Interoperability & QoS Analysis - Eclipse IoT Day Paris...
Mobile IoT Middleware Interoperability & QoS Analysis - Eclipse IoT Day Paris...Mobile IoT Middleware Interoperability & QoS Analysis - Eclipse IoT Day Paris...
Mobile IoT Middleware Interoperability & QoS Analysis - Eclipse IoT Day Paris...Nikolaos Georgantas
 
Chapter 7 - Multimedia Networking Issues
Chapter 7 - Multimedia Networking IssuesChapter 7 - Multimedia Networking Issues
Chapter 7 - Multimedia Networking IssuesPratik Pradhan
 

Semelhante a MobiSys Group Presentation (20)

Networked 3-D Virtual Collaboration in Science and Education: Towards 'Web 3....
Networked 3-D Virtual Collaboration in Science and Education: Towards 'Web 3....Networked 3-D Virtual Collaboration in Science and Education: Towards 'Web 3....
Networked 3-D Virtual Collaboration in Science and Education: Towards 'Web 3....
 
(R)evolution of the computing continuum - A few challenges
(R)evolution of the computing continuum  - A few challenges(R)evolution of the computing continuum  - A few challenges
(R)evolution of the computing continuum - A few challenges
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal Stern
 
Skeuomorphs, Databases, and Mobile Performance
Skeuomorphs, Databases, and Mobile PerformanceSkeuomorphs, Databases, and Mobile Performance
Skeuomorphs, Databases, and Mobile Performance
 
Skeuomorphs, Databases, and Mobile Performance
Skeuomorphs, Databases, and Mobile PerformanceSkeuomorphs, Databases, and Mobile Performance
Skeuomorphs, Databases, and Mobile Performance
 
Bringing Wireless Sensing to its full potential
Bringing Wireless Sensing to its full potentialBringing Wireless Sensing to its full potential
Bringing Wireless Sensing to its full potential
 
presentation_SB_v01
presentation_SB_v01presentation_SB_v01
presentation_SB_v01
 
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...
CCNxCon2012: Session 2: A Content-Centric Approach for Requesting and Dissemi...
 
Data management issues
Data management issuesData management issues
Data management issues
 
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
Cloud Camp Milan 2K9 Telecom Italia: Where P2P?
 
CloudCamp Milan 2009: Telecom Italia
CloudCamp Milan 2009: Telecom ItaliaCloudCamp Milan 2009: Telecom Italia
CloudCamp Milan 2009: Telecom Italia
 
STPCon fall 2012: The Testing Renaissance Has Arrived
STPCon fall 2012: The Testing Renaissance Has ArrivedSTPCon fall 2012: The Testing Renaissance Has Arrived
STPCon fall 2012: The Testing Renaissance Has Arrived
 
Internet Scale Architecture
Internet Scale ArchitectureInternet Scale Architecture
Internet Scale Architecture
 
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...Visualizing Your Network Health -  Driving Visibility in Increasingly Complex...
Visualizing Your Network Health - Driving Visibility in Increasingly Complex...
 
Hardware virtualized flexible network for wireless data center optical interc...
Hardware virtualized flexible network for wireless data center optical interc...Hardware virtualized flexible network for wireless data center optical interc...
Hardware virtualized flexible network for wireless data center optical interc...
 
PhD_Thesis
PhD_ThesisPhD_Thesis
PhD_Thesis
 
Understanding mobile service usage and user behavior pattern for mec resource...
Understanding mobile service usage and user behavior pattern for mec resource...Understanding mobile service usage and user behavior pattern for mec resource...
Understanding mobile service usage and user behavior pattern for mec resource...
 
Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Mobile Applications on an Elastic and Scalable 2-Tier Cloud ArchitectureMobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
 
Mobile IoT Middleware Interoperability & QoS Analysis - Eclipse IoT Day Paris...
Mobile IoT Middleware Interoperability & QoS Analysis - Eclipse IoT Day Paris...Mobile IoT Middleware Interoperability & QoS Analysis - Eclipse IoT Day Paris...
Mobile IoT Middleware Interoperability & QoS Analysis - Eclipse IoT Day Paris...
 
Chapter 7 - Multimedia Networking Issues
Chapter 7 - Multimedia Networking IssuesChapter 7 - Multimedia Networking Issues
Chapter 7 - Multimedia Networking Issues
 

Mais de Neal Lathia

Everything around the NLP (London.AI Feb 2021)
Everything around the NLP (London.AI Feb 2021)Everything around the NLP (London.AI Feb 2021)
Everything around the NLP (London.AI Feb 2021)Neal Lathia
 
Using machine learning for customer service (Data Talks Club)
Using machine learning for customer service (Data Talks Club)Using machine learning for customer service (Data Talks Club)
Using machine learning for customer service (Data Talks Club)Neal Lathia
 
Using language models to supercharge Monzo’s customer support
 Using language models to supercharge Monzo’s customer support Using language models to supercharge Monzo’s customer support
Using language models to supercharge Monzo’s customer supportNeal Lathia
 
Making Better Decisions Faster
Making Better Decisions FasterMaking Better Decisions Faster
Making Better Decisions FasterNeal Lathia
 
Machine Learning, Faster
Machine Learning, FasterMachine Learning, Faster
Machine Learning, FasterNeal Lathia
 
AI & Personalised Experiences
AI & Personalised ExperiencesAI & Personalised Experiences
AI & Personalised ExperiencesNeal Lathia
 
Opportunities & Challenges in Personalised Travel
Opportunities & Challenges in Personalised TravelOpportunities & Challenges in Personalised Travel
Opportunities & Challenges in Personalised TravelNeal Lathia
 
Bootstrapping a Destination Recommendation Engine
Bootstrapping a Destination Recommendation EngineBootstrapping a Destination Recommendation Engine
Bootstrapping a Destination Recommendation EngineNeal Lathia
 
Machine Learning for Product Managers
Machine Learning for Product ManagersMachine Learning for Product Managers
Machine Learning for Product ManagersNeal Lathia
 
Mining Smartphone Data (with Python)
Mining Smartphone Data (with Python)Mining Smartphone Data (with Python)
Mining Smartphone Data (with Python)Neal Lathia
 
Happier and Healthier with Smartphone Data
Happier and Healthier with Smartphone DataHappier and Healthier with Smartphone Data
Happier and Healthier with Smartphone DataNeal Lathia
 
Data Science in Digital Health
Data Science in Digital HealthData Science in Digital Health
Data Science in Digital HealthNeal Lathia
 
Using Smartphones to Measure (and Intervene in) Daily Life
Using Smartphones to Measure (and Intervene in) Daily LifeUsing Smartphones to Measure (and Intervene in) Daily Life
Using Smartphones to Measure (and Intervene in) Daily LifeNeal Lathia
 
Analysing Daily Behaviours with Large-Scale Smartphone Data
Analysing Daily Behaviours with Large-Scale Smartphone DataAnalysing Daily Behaviours with Large-Scale Smartphone Data
Analysing Daily Behaviours with Large-Scale Smartphone DataNeal Lathia
 
Cambridge Quantified Self Meetup
Cambridge Quantified Self MeetupCambridge Quantified Self Meetup
Cambridge Quantified Self MeetupNeal Lathia
 
Data Science in #mHealth
Data Science in #mHealthData Science in #mHealth
Data Science in #mHealthNeal Lathia
 
Tube Star: Crowd-Sourced Experiences on Public Transport
Tube Star: Crowd-Sourced Experiences on Public Transport Tube Star: Crowd-Sourced Experiences on Public Transport
Tube Star: Crowd-Sourced Experiences on Public Transport Neal Lathia
 
Emotion Sense: From Design to Deployment
Emotion Sense: From Design to DeploymentEmotion Sense: From Design to Deployment
Emotion Sense: From Design to DeploymentNeal Lathia
 
Opportunities and Challenges of Using Smartphones for Health Monitoring and I...
Opportunities and Challenges of Using Smartphones for Health Monitoring and I...Opportunities and Challenges of Using Smartphones for Health Monitoring and I...
Opportunities and Challenges of Using Smartphones for Health Monitoring and I...Neal Lathia
 
Using Smartphones to Research Daily Life
Using Smartphones to Research Daily LifeUsing Smartphones to Research Daily Life
Using Smartphones to Research Daily LifeNeal Lathia
 

Mais de Neal Lathia (20)

Everything around the NLP (London.AI Feb 2021)
Everything around the NLP (London.AI Feb 2021)Everything around the NLP (London.AI Feb 2021)
Everything around the NLP (London.AI Feb 2021)
 
Using machine learning for customer service (Data Talks Club)
Using machine learning for customer service (Data Talks Club)Using machine learning for customer service (Data Talks Club)
Using machine learning for customer service (Data Talks Club)
 
Using language models to supercharge Monzo’s customer support
 Using language models to supercharge Monzo’s customer support Using language models to supercharge Monzo’s customer support
Using language models to supercharge Monzo’s customer support
 
Making Better Decisions Faster
Making Better Decisions FasterMaking Better Decisions Faster
Making Better Decisions Faster
 
Machine Learning, Faster
Machine Learning, FasterMachine Learning, Faster
Machine Learning, Faster
 
AI & Personalised Experiences
AI & Personalised ExperiencesAI & Personalised Experiences
AI & Personalised Experiences
 
Opportunities & Challenges in Personalised Travel
Opportunities & Challenges in Personalised TravelOpportunities & Challenges in Personalised Travel
Opportunities & Challenges in Personalised Travel
 
Bootstrapping a Destination Recommendation Engine
Bootstrapping a Destination Recommendation EngineBootstrapping a Destination Recommendation Engine
Bootstrapping a Destination Recommendation Engine
 
Machine Learning for Product Managers
Machine Learning for Product ManagersMachine Learning for Product Managers
Machine Learning for Product Managers
 
Mining Smartphone Data (with Python)
Mining Smartphone Data (with Python)Mining Smartphone Data (with Python)
Mining Smartphone Data (with Python)
 
Happier and Healthier with Smartphone Data
Happier and Healthier with Smartphone DataHappier and Healthier with Smartphone Data
Happier and Healthier with Smartphone Data
 
Data Science in Digital Health
Data Science in Digital HealthData Science in Digital Health
Data Science in Digital Health
 
Using Smartphones to Measure (and Intervene in) Daily Life
Using Smartphones to Measure (and Intervene in) Daily LifeUsing Smartphones to Measure (and Intervene in) Daily Life
Using Smartphones to Measure (and Intervene in) Daily Life
 
Analysing Daily Behaviours with Large-Scale Smartphone Data
Analysing Daily Behaviours with Large-Scale Smartphone DataAnalysing Daily Behaviours with Large-Scale Smartphone Data
Analysing Daily Behaviours with Large-Scale Smartphone Data
 
Cambridge Quantified Self Meetup
Cambridge Quantified Self MeetupCambridge Quantified Self Meetup
Cambridge Quantified Self Meetup
 
Data Science in #mHealth
Data Science in #mHealthData Science in #mHealth
Data Science in #mHealth
 
Tube Star: Crowd-Sourced Experiences on Public Transport
Tube Star: Crowd-Sourced Experiences on Public Transport Tube Star: Crowd-Sourced Experiences on Public Transport
Tube Star: Crowd-Sourced Experiences on Public Transport
 
Emotion Sense: From Design to Deployment
Emotion Sense: From Design to DeploymentEmotion Sense: From Design to Deployment
Emotion Sense: From Design to Deployment
 
Opportunities and Challenges of Using Smartphones for Health Monitoring and I...
Opportunities and Challenges of Using Smartphones for Health Monitoring and I...Opportunities and Challenges of Using Smartphones for Health Monitoring and I...
Opportunities and Challenges of Using Smartphones for Health Monitoring and I...
 
Using Smartphones to Research Daily Life
Using Smartphones to Research Daily LifeUsing Smartphones to Research Daily Life
Using Smartphones to Research Daily Life
 

Último

Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 

Último (20)

Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 

MobiSys Group Presentation

  • 1. MOBISYS: PERVASIVE COMPUTING ucl/birkbeck research oct. 14 2008 format: 4 slides/minutes per person speakers: • Mohamed Ahmed • Dikaios Papadogkonas • Ettore Ferranti • Panagiotis Papakos • Tom Hewer • Elisa Rondini • Eli Katsiri • Jenson Taylor • Ilias Leontiadis • Michael Zoumboulakis • Liam McNamara • Stephen Hailes • George Roussos
  • 2. liam mcnamara [next up: panagiotis]
  • 3. Content sharing in Urban Environments Liam McNamara <l.mcnamara@cs.ucl.ac.uk>
  • 4. Who to download from? Short-range wireless networks can have huge churn. We need to choose someone with matching tastes that will be colocated long- enough to transfer a file. Thus, we need to predict neighbours colocation length. 'Bad' sources need to be avoided.
  • 5. What to download from them? If files can be successfully transferred, which ones should be shared first? Pop Jazz Classical Rock Daniel Blues Country Carol Alice Rock? Pop Metal? Rock Bob Blues?
  • 6. Future Work  File percolation through network.  Improve Symbian sharing application.  Deployment (with your help!)  Thesis :/
  • 7. panagiotis papakos [next up: jenson]
  • 8. [problem]: Adaptive Service Discovery in Mobile Systems Web Service discovery in mobile systems using a broker. Service Request Query Mobile Service Broker Device Repository Service Matching Binding Services Factors that may affect web service requirements in Mobile Systems •Context : Network Coverage, Other Local Devices, User Preferences etc. • Resources : Battery Level, Memory Usage, CPU load etc The broker cannot assess such variables. Panagiotis Papakos
  • 9. [proposal] : A middleware approach Problem The web service requirements (QoS requirements, functionality etc) of a mobile device may change due to changes in the context or the resources of the mobile device. Proposal A middleware that : • Monitors the Resources of the Device • Monitors the Context of the Device • Adapts the web service Request appropriately
  • 10. Proposed Architecture Context and Adapted Resource data Service Request Middleware Query Mobile Service Request Broker Device Matching Service Binding Services Use of States to indicate status of the device (Low Power, Low Connection, Emergency, Meeting etc) Adapt the Web Service Request according to the State of the device: • QoS Requirements • Functional Requirements • Trust
  • 11. [future work] Work in Conjunction with the Dino Project by Arun Mukhija (SENSORIA). Future Work: • Further Development • Prototype Implementation • Case Studies Expand To Include : • Adapt requirements according to broker feedback • Interaction between devices using this middleware • Reconfiguration of the device according to state
  • 12. jenson taylor [next up: mo]
  • 13. [problem] : How can we make efficient use of social links for routing messages in delay tolerant networks?  How often (and how long) different individuals meet. (e.g. two friends are likely to meet at least once a week)  How often (and how long) different individuals spend within the proximity of a certain geographical location. (e.g. two individuals working in the same building)  What time are individuals likely to be in certain locations. (e.g. people working together are likely to be in the same location during working hours, and only on certain days of the week) [Jenson Taylor]
  • 14. [Snout]  Participatory sensing  Users act as mobile nodes  In theory it seamlessly fits into everyday life - Snout platform - sensors - co,co2,sound & organic solvents - GPS - Geocentric visualisation of sensor readings
  • 15. routing in “social delay tolerant networks”  Efficient routing in delay tolerant mobile networks  Network characteristics:  Nodes are at one with users  Nodes don’t have permanent connection to network  No logical addresses  Communication is asynchronous  Packet loss is tolerated  Efficiency definition:  Resource usage, Overhead/replication/  Message delivery speed (time)  Message delivery number of hops  Using influence maps to determine the next hop in the delivery route
  • 16. mohamed ahmed [next up: elisa]
  • 17. [Problems]  Tools for supporting the development of control software [With: ARAGORN, CHAT]  Control of cross-layer optimisation in wireless network [With: ARAGORN]  Information and Reputation [With: Steve] Mohamed Ahmed
  • 18. [complications or proposals]:Plenty of both!  Components based software and policy languages for real-time and fast executing systems  ML and control architectures for management and adaptation  The limits and bounds of reputation based analysis
  • 19. [future work]:  Can we make these systems work? How well? What are the compromises?  Development of systems  Experimentation with learning and control architectures
  • 20. elisa rondini [next up: michael]
  • 21. [Problem]: How do bandwidth constraints impact the distribution of intensive jobs in WSNs? 1. Computationally intensive applications. Resource-constrained devices. 8. Limited available bandwidth. Radio communication interferences. [Elisa Rondini]
  • 22. [Proposal]: Bandwidth-Aware Task Scheduling (BATS) scheme for Distributed Wireless Ad hoc Grids (DWAG) in WSNs. • Distributed Wireless Ad hoc Grids (DWAG) to implement distributed algorithms in WSNs formed by resource-constrained devices. • Bandwidth-Aware Task Scheduling (BATS) to load share location computing tasks among sensors by assessing both node computational capabilities and local network conditions.
  • 23. Homogeneous Tasks: application of DWAG with BATS for Collaborative Node Localisation (i.e. CCA-MAP*). * L. Li and T. Kunz, “Cooperative Node Localization for Tactical Wireless Sensor Networks”, in Proc. of the IEEE/Boeing MILCOM, October 2007. * L. Li and T. Kunz, “Cooperative Node Localization Using Non-Linear Data Projection”, in ACM Transactions on Sensor Networks, 2008.
  • 24. [Future work]: What happens if we deal with more heterogeneous tasks? Need to combine nodes’ computational capabilities and local network conditions (external characteristics) with tasks’ CPU and Bandwidth profile characterizations.
  • 25. michael zoumboulakis [next up: ettore]
  • 26. Efficient Pattern Detection in WSNs [text or images here] Complex Events:  Wildfire detection,  Flash flood prediction, etc. Michael Zoumboulakis
  • 27. Efficient Pattern Detection  Patterns that are extremely difficult or impossible to capture using thresholds.  May not be known in advance.  Symbolic Conversion is a successful technique for mining time-series.  We have adapted a SC algorithm for efficient real-time mining in WSNs.
  • 28. Efficient Pattern Detection  Multiple-pattern detection using Suffix Arrays; Advantage: scalability.  Approximate pattern matching; Advantage: flexibility.  Unknown pattern matching; Advantage: efficiency through dynamically adjusting the sampling frequency.  Light-weight implementation optimised using integer arithmetic.
  • 29. Current & Future Work [text or images here]  Design a framework that caters for Detection of Spatial Events.  Use a few readings to infer the nature and characteristics of the event.
  • 30. ettore ferranti [next up: dikaios]
  • 31. [Problem]: How To Explore Unknown Areas [Ettore Ferranti]
  • 32. [Proposal]: Team of Mobile Agents  No prior knowledge of the area’s map. (which can change after a disaster).  Lack of exact knowledge of agents’ positions.  Long-range Agent-to-Agent communication is unreliable.
  • 33. Give Us Algorithms! (Agent-to-Tag): Multiple D epth First S earch B rick&Mortar (Tag-to-Tag): HybridE xploration
  • 34. Now Make It Real!
  • 35. dikaios papadogkonas [next up: tom]
  • 36. Pervasive Navigation  Pervasive computing systems record user interactions with physical and digital resources  Common Tasks − Usage Analysis − Prediction − Pattern Recognition  No unified methodology exists to deal with common problems
  • 37. Proposal  A probabilistic model for the representation of user interaction with the pervasive computing space  Trail based analysis − Landmarks, significant objects in space − Trails, series of landmark interactions  Use of different metrics − Time, Space, Orientation  Use for different pervasive systems − Reality Mining, Dartmouth, Cityware
  • 40. tom hewer [next up: ilias]
  • 41. [large-scale simulation of vehicular networks] Current network simulation tools available require many CPU hours to run even small simulations on a single-processor machine collision avoidance adaptive vehicle routing information dissemination charging/toll systems intelligent transport systems Given the applications required of vehicular network simulations, the results are often time-dependent [tom hewer]
  • 42. [computational expense] complexity of the network and mobility models tight-coupling such that models interoperate the granularity of models for locale can be changed N-squared and N-log(N) problems as a function of connectivity 42
  • 43. [challenges of HPC] how to decompose the simulation? Domain and task farming algorithms for vehicular simulations require much boundary communication Component decomposition allows us to keep this boundary communication low but still keep the simulation free of causality/synchronisation problems Technique: split the nodes into lists (per processor available) create a global simulation object on each processor and perform all processing for each node on its home processor then update the global object
  • 44. [future work] efficiency of decomposition algorithm hierarchical binning method to split nodes adaptive binning and live movement parameter search simulations explore the parameter space and compare results node aggregation and processing efficiency visualisation and processing live view and steering validation of scenarios and applications reference to live studies accurate and sound analysis/statistics
  • 45. ilias leontiadis [next up: eli]
  • 46. Information Dissemination in Vehicular Networks • Growing number of vehicles with Navigation Systems • Add short-range radio (e.g. wifi) • Applications of vehicular networks – traffic information dissemination – safe navigation (warnings) – urban sensing (monitor traffic, vehicles as sensors) – parking slots (fine grained information) – gas stations fuel prices – advertising – ... • Push-based – e.g., notify me on all traffic jams on my route • Pull-based – e.g., how is the traffic on M11 ? Ilias Leontiadis, Cecilia Mascolo
  • 47. The role of the Navigation System – Suggested routes  M o bility pa tterns predic ta ble – Route/Disseminate information in specific areas – Suggested routes  I nteres ts (e.g. receive warnings on my route) – Map information  L o c a tio n a s c o ntex t (flexible topics/matching) – Describe warnings/affected areas flexibly – Describe interests
  • 48. Push based notifications (e.g. traffic warnings/accidents) Navigation system now provides automatic subscription to events about vehicle’s route – Use infrastructure (if available) – Vehicle-to-Vehicle communication when: • No infrastructure is available • Local information • Fine grained information (e.g. parking spots) – We use the Navigation System to: • Geographically route information in affected areas. • Keep disseminating information in affected areas • Inform only affected vehicles (given by the suggested route)
  • 49. Pull based notifications (e.g. how is the traffic on M11 ) • Opportunistic routing to forward requests to the nearest infostations • Issue: how to deliver the reply back ? – target is moving • Solution – We use the Navigation System to Route the reply back on the suggested route of the requested vehicle
  • 50. Future work  Currently Implementing the system − Testing with small fleet of bicycles and limited number of vehicles  Working on traffic information dissemination − Every vehicle collects traffic information and “Publish” this information to the affected vehicles. − Vehicles that receive information  estimate traffic conditions on parts of their route  select paths that will minimise TIME
  • 51. eli katsiri [next up: kones]
  • 52. [secure autonomy in pervasive healthcare] The Nurse SMC loads a Mission (a set of policies) onto a SMC that belongs to the patient role. E.g. LoadMission(ReadTemp); The Mission requires the Patient to: Two authorisation policies are needed: take a temperature reading • 3.A nurse SMC is the subject of an • send the data to the Nurse authorization policy that grants the nurse role permission to load missions on if their temperature is abnormal. members of the patient role. Mission ReadTemp{ 4.The patient SMC needs to be granted Patient.Temp.read(): Temp permission to execute any remote invocations on the nurse interfaces are if Temp>40C specified as part of the mission. Nurse.Notify(Temp) } [Eli Katsiri]
  • 53. [common representation] if (type==PKT_CMD) //remote invocation { //Access Control Module if (AC.authorise(srcid,oid,cmd)==TRUE) execute(msg); } else { //event //Policy Service call EventInterface( msg); } } Publications BSN2008, invited book chapter JCKSBE08
  • 54. [A ECA policy interpreter] 55 Publications AMUSE, BSN2007
  • 55. [first-order logic model] 1. Model based knowledge representation and reasoning. 3. First-order logic: expressiveness closer to user intuition 5. Other security/trust mechanisms that are applicable to BSN. Publications JKBSE08, invited book chapter JKBSE08
  • 56. kones saranavamutu [next up: george]
  • 57. [How trustworthy are my friends?]  Does regularity in social behavior imply trustworthiness?  How does the degree of regularity affect trustworthiness?  How can we detect/evaluate regularity? 8. Summary of the social interaction in two real world datasets. 9. Analysis of complex social-spatial-temporal context 10. Recognising social patterns in daily user activity and relationships 11. Identifying socially significant locations 12. applications which will be of significant value to e-business. [Kones Saravanamutu]
  • 58. N. Eagle and A. Pentland (2007), quot;Eigenbehaviors: Identifying Structure in Routinequot;, Behavioral Ecology and Sociobiology [What’s the story with my MIT mates?] N. Eagle and A. Pentland (2007), quot;Eigenbehaviors: Identifying Structure in Routinequot;, Behavioral Ecology and Sociobiology
  • 59. [What about my ENRON colleagues?] P.S. Keila and D.B. Skillicorn(2005),quot;Structure in the Enron Email Datasetquot;, Retrieved on June,2008. http://research.cs.queensu.ca/~skill/enron.pdf
  • 60. [Next Steps] [text or images here] • Apply image processing techniques such as Eigenbehaviors and PCA to bitmaps that are derived from the visualisation. • N. H. Minsky. “Regularity-based trust in Cyberspace”. In proceedings of 1st Int, Conf. on
  • 61. george roussos [next up: steve]
  • 62.
  • 63. steve hailes [next up: discussion]
  • 64. projects @ UCL mobisys Digital economy - privacy CARDyAL Utiforo TOUMAZ Security and Trust MARS NIRS Wireless & sensorIU-ATC CLEF SystemsCHAT RUNES SEINIT ARAGORN Divergent GRID U2010 Networking and SESAME Distributed systems SUAAVE HEN 6WINIT EIFFEL 64