This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
|
class:gradmc2012f:reading_list [2012/09/26 01:36] mhshin [Reading list] |
class:gradmc2012f:reading_list [2025/10/13 12:45] (current) |
||
|---|---|---|---|
| Line 38: | Line 38: | ||
| * Mobile Computing: The Next Decade (ACM DL: Free for Members). M. Satyanarayanan. 2010. Proceedings of the ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond (MCS), ACM, 2010. DOI=10.1145/1810931.1810936. | * Mobile Computing: The Next Decade (ACM DL: Free for Members). M. Satyanarayanan. 2010. Proceedings of the ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond (MCS), ACM, 2010. DOI=10.1145/1810931.1810936. | ||
| - | ==== MOBILE APPLICATIONS AND MIDDLEWARE ==== | + | ==== CONTEXT-AWARE COMPUTING ==== |
| - | + | ||
| - | === CONTEXT-AWARE COMPUTING === | + | |
| Context-aware computing enables a computer to modify its behavior based on its local context such as location, time of day, who is nearby, and state of motion. As a result, computer applications can provide an improved user experience by customizing their behavior to better support a user task. This kind of adaptation is particularly useful when designing mobile applications that will be placed in continuously changing contexts. There are two key components required for creating context-awareness: first, the ability to capture a wide-variety of sensor data (both hardware sensors and software sensors); and second, to infer activities based on that data. The following articles provide an overview of the research in this area: | Context-aware computing enables a computer to modify its behavior based on its local context such as location, time of day, who is nearby, and state of motion. As a result, computer applications can provide an improved user experience by customizing their behavior to better support a user task. This kind of adaptation is particularly useful when designing mobile applications that will be placed in continuously changing contexts. There are two key components required for creating context-awareness: first, the ability to capture a wide-variety of sensor data (both hardware sensors and software sensors); and second, to infer activities based on that data. The following articles provide an overview of the research in this area: | ||
| Line 57: | Line 55: | ||
| - | === MOBILE AD HOC NETWORKS === | + | ==== MOBILE AD HOC NETWORKS ==== |
| Mobile routing in the context of ad-hoc networks has received lots of attention from the research community. Below, we include a few representative articles in this area, such as the key original ones that defined a new ad-hoc protocol, and a survey that compares them. We also provide a reference for the theoretic analysis of the capacity of such a network, and an article that examines the critical model required to make a simulation accurate. An excellent quite comprehensive list of ad hoc routing protocols along with their references can also be found on Wikipedia at the link included: | Mobile routing in the context of ad-hoc networks has received lots of attention from the research community. Below, we include a few representative articles in this area, such as the key original ones that defined a new ad-hoc protocol, and a survey that compares them. We also provide a reference for the theoretic analysis of the capacity of such a network, and an article that examines the critical model required to make a simulation accurate. An excellent quite comprehensive list of ad hoc routing protocols along with their references can also be found on Wikipedia at the link included: | ||
| Line 74: | Line 72: | ||
| - | === SENSOR NETWORKS === | + | ==== SENSOR NETWORKS ==== |
| With the advent of small form-factor devices capable of sensing, processing, and communication, it became possible to conceive of large numbers of small battery-operated wirelessly-connected sensor nodes, which could enable more fine-grain observation of physical phenomena, and man-made structures, than previously possible. An important challenge in networked sensing is managing the energy cost of communication This challenge inspired a whole field devoted to exploring energy-aware network architectures and algorithms, as well as novel applications of sensor networks. | With the advent of small form-factor devices capable of sensing, processing, and communication, it became possible to conceive of large numbers of small battery-operated wirelessly-connected sensor nodes, which could enable more fine-grain observation of physical phenomena, and man-made structures, than previously possible. An important challenge in networked sensing is managing the energy cost of communication This challenge inspired a whole field devoted to exploring energy-aware network architectures and algorithms, as well as novel applications of sensor networks. | ||
| Line 90: | Line 88: | ||
| * [General] The Tenet Architecture for Tiered Sensor Networks (ACM DL: Free for Members). Jeongyeup Paek, Ben Greenstein, Omprakash Gnawali, Ki-Young Jang, August Joki, Marcos Vieira, John Hicks, Deborah Estrin, Ramesh Govindan, and Eddie Kohler. ACM Transactions on Sensor Networks, vol. 6, issue 4, (July 2010), 44 pp. DOI=10.1145/1777406.1777413. Summary: Many articles in the field also explore high-level programming abstractions and middleware for sensor networks. This article describes an approach that architecturally constrains the placement of functionality in the network to ensure reusable components, and a data-flow application programming language and associated run-time system. | * [General] The Tenet Architecture for Tiered Sensor Networks (ACM DL: Free for Members). Jeongyeup Paek, Ben Greenstein, Omprakash Gnawali, Ki-Young Jang, August Joki, Marcos Vieira, John Hicks, Deborah Estrin, Ramesh Govindan, and Eddie Kohler. ACM Transactions on Sensor Networks, vol. 6, issue 4, (July 2010), 44 pp. DOI=10.1145/1777406.1777413. Summary: Many articles in the field also explore high-level programming abstractions and middleware for sensor networks. This article describes an approach that architecturally constrains the placement of functionality in the network to ensure reusable components, and a data-flow application programming language and associated run-time system. | ||
| - | === VEHICULAR NETWORKS === | + | ==== VEHICULAR NETWORKS ==== |
| Vehicular networks have emerged from the strong desire to communicate on the move. Car manufacturers all over the world are developing industry standards and prototypes for vehicular networks. The design of vehicular networks involves theoretical, network, system, and security issues. | Vehicular networks have emerged from the strong desire to communicate on the move. Car manufacturers all over the world are developing industry standards and prototypes for vehicular networks. The design of vehicular networks involves theoretical, network, system, and security issues. | ||
| Line 105: | Line 103: | ||
| - | === DEPLOYMENTS AND USER TRIALS === | + | ==== DEPLOYMENTS AND USER TRIALS ==== |
| In this section we single out projects that capture results, perform user evaluations, and record experiences from real-world deployments and user trials. These projects are notable for the design considerations that need to be taken into account for use in the real world, making them more complicated than if deployed in a lab environment or as a theoretical study. As such, these articles inform researchers about real issues that should be taken into account when designing a system for everyday use. | In this section we single out projects that capture results, perform user evaluations, and record experiences from real-world deployments and user trials. These projects are notable for the design considerations that need to be taken into account for use in the real world, making them more complicated than if deployed in a lab environment or as a theoretical study. As such, these articles inform researchers about real issues that should be taken into account when designing a system for everyday use. | ||
| Line 121: | Line 119: | ||
| * [Experience] Experience with Adaptive Mobile Applications in Odyssey (ACM DL: Free for Members). B. D. Noble and M. Satyanarayanan. Mobile Networks and Applications, vol. 4, no. 4 (1999). DOI=10.1023/A:1019159101405. Summary: This article presents experiences with application-aware adaptation in the context of Odyssey, a platform for mobile data access. Three applications modified to run on Odyssey are described: a video player, a Web browser, and a speech recognition system. The article indicates that it is relatively simple to incorporate applications into Odyssey, and that application source code is not always essential. The work also exposes important areas of future work. Specifically, it reveals the difficulty of balancing agility with stability in adaptation, and emphasizes the need for controlled exposure of internal Odyssey state to users. | * [Experience] Experience with Adaptive Mobile Applications in Odyssey (ACM DL: Free for Members). B. D. Noble and M. Satyanarayanan. Mobile Networks and Applications, vol. 4, no. 4 (1999). DOI=10.1023/A:1019159101405. Summary: This article presents experiences with application-aware adaptation in the context of Odyssey, a platform for mobile data access. Three applications modified to run on Odyssey are described: a video player, a Web browser, and a speech recognition system. The article indicates that it is relatively simple to incorporate applications into Odyssey, and that application source code is not always essential. The work also exposes important areas of future work. Specifically, it reveals the difficulty of balancing agility with stability in adaptation, and emphasizes the need for controlled exposure of internal Odyssey state to users. | ||
| - | === WIRELESS AND MOBILE TECHNOLOGIES === | + | ==== WIRELESS AND MOBILE TECHNOLOGIES ==== |
| SHORT RANGE WIRELESS: RFID, NFC, BLUETOOTH, BANs, and PANs | SHORT RANGE WIRELESS: RFID, NFC, BLUETOOTH, BANs, and PANs | ||
| Line 136: | Line 134: | ||
| * [Overview] Personal Area Networks: Near-Field Intrabody Communication. T.G. Zimmerman. IBM Systems Journal, vol. 35, issue 3/4 (1996), pp. 609-612. DOI=10.1147/sj.353.0609. Also available at http://dspace.mit.edu/bitstream/handle/1721.1/29101/34289663.pdf. Summary: A Master's thesis presenting an intriguing piece of research that shows the potential for building a body area network (BAN) using near-field electrostatic communication to exchange digital information between electronic devices on and near the human body. Because there are no free-space propagated electromagnetic waves, the sensed data also remains on a person, which is desirable for security and medical applications. | * [Overview] Personal Area Networks: Near-Field Intrabody Communication. T.G. Zimmerman. IBM Systems Journal, vol. 35, issue 3/4 (1996), pp. 609-612. DOI=10.1147/sj.353.0609. Also available at http://dspace.mit.edu/bitstream/handle/1721.1/29101/34289663.pdf. Summary: A Master's thesis presenting an intriguing piece of research that shows the potential for building a body area network (BAN) using near-field electrostatic communication to exchange digital information between electronic devices on and near the human body. Because there are no free-space propagated electromagnetic waves, the sensed data also remains on a person, which is desirable for security and medical applications. | ||
| - | === WIRELESS LOCAL AREA NETWORK (WLAN) TECHNOLOGY === | + | ==== WIRELESS LOCAL AREA NETWORK (WLAN) TECHNOLOGY ==== |
| Wireless LANs are one of the most widely used network technologies. However, understanding its performance and predicting its behavior under various conditions pose significant research challenges. These challenges motivate researchers to develop models to predict behavior under different usage scenarios, design techniques to optimize WLAN performance, diagnose problems when things go wrong, and measure/analyze how well WLANs work in reality. (See also the section on measurement, below.) | Wireless LANs are one of the most widely used network technologies. However, understanding its performance and predicting its behavior under various conditions pose significant research challenges. These challenges motivate researchers to develop models to predict behavior under different usage scenarios, design techniques to optimize WLAN performance, diagnose problems when things go wrong, and measure/analyze how well WLANs work in reality. (See also the section on measurement, below.) | ||
| Line 151: | Line 149: | ||
| - | === CELLULAR TECHNOLOGIES === | + | ==== CELLULAR TECHNOLOGIES ==== |
| Although largely developed in the communication's industry, cellular networks are a key component of any mobile system that requires metropolitan- or national-scale connectivity. Analog (1G) was the base technology of the first cell phones. The first digital systems were called 2nd generation (2G), primarily GSM & Cellular Data Packet Data (CDPD), which operated with low bandwidth (9.6kbps). They were of limited value for mobile computing compared to what was available over a wireless LAN at that time (10Mbps). However, as the various standards have progressed from 2G to 2.5G (GPRS at 48Kbps), to 3G, which provides 384Kbps moving and 2Mbps stationary, and now 4G (long-term evolution (LTE), with the eventual goal of 100Mbps for mobile operation and 1Gbps for stationary), these data rates are now comparable to those available on today's WLANs. Thus, mobile applications that had only been imagined in the early days of mobile systems will soon be possible almost anywhere. The following references provide an overview of cellular technology developments, along with their strengths and weaknesses: | Although largely developed in the communication's industry, cellular networks are a key component of any mobile system that requires metropolitan- or national-scale connectivity. Analog (1G) was the base technology of the first cell phones. The first digital systems were called 2nd generation (2G), primarily GSM & Cellular Data Packet Data (CDPD), which operated with low bandwidth (9.6kbps). They were of limited value for mobile computing compared to what was available over a wireless LAN at that time (10Mbps). However, as the various standards have progressed from 2G to 2.5G (GPRS at 48Kbps), to 3G, which provides 384Kbps moving and 2Mbps stationary, and now 4G (long-term evolution (LTE), with the eventual goal of 100Mbps for mobile operation and 1Gbps for stationary), these data rates are now comparable to those available on today's WLANs. Thus, mobile applications that had only been imagined in the early days of mobile systems will soon be possible almost anywhere. The following references provide an overview of cellular technology developments, along with their strengths and weaknesses: | ||
| Line 166: | Line 164: | ||
| * [System] Augmenting Mobile 3G Using WiFi (ACM DL: Free for Members). Aruna Balasubramanian, Ratul Mahajan, and Arun Venkataramani. Proceedings of the ACM International Conference on Mobile Systems and Applications, ACM, 2010. DOI=10.1145/1814433.1814456. Summary: This article describes a system, called Wiffler, that exploits the current availability of 3G (87%) and WiFi (11%) for mobile devices in a city. Wiffler switches between these radios to reduce 3G traffic where possible, thus reducing costs and aggregate channel utilization. However, if VOIP or other time-sensitive protocols (or applications) are in use, or WiFi becomes unavailable, it rapidly switches back to 3G. | * [System] Augmenting Mobile 3G Using WiFi (ACM DL: Free for Members). Aruna Balasubramanian, Ratul Mahajan, and Arun Venkataramani. Proceedings of the ACM International Conference on Mobile Systems and Applications, ACM, 2010. DOI=10.1145/1814433.1814456. Summary: This article describes a system, called Wiffler, that exploits the current availability of 3G (87%) and WiFi (11%) for mobile devices in a city. Wiffler switches between these radios to reduce 3G traffic where possible, thus reducing costs and aggregate channel utilization. However, if VOIP or other time-sensitive protocols (or applications) are in use, or WiFi becomes unavailable, it rapidly switches back to 3G. | ||
| - | === LOCALIZATION === | + | ==== LOCALIZATION ==== |
| Localization, is the ability of a mobile or stationary device to ascertain its own position; this is a crucial capability for ubiquitous computing as well as mobile and wireless systems. It enables context-aware applications on handheld and portable devices, and is also critical metadata that provides context for data gathered by wireless devices. Location is easily obtained outdoors using GPS, although this may incur a significant energy cost. Work in this area has explored indoor localization systems, or methods to localize nodes and objects when GPS may be unavailable or too expensive to use. | Localization, is the ability of a mobile or stationary device to ascertain its own position; this is a crucial capability for ubiquitous computing as well as mobile and wireless systems. It enables context-aware applications on handheld and portable devices, and is also critical metadata that provides context for data gathered by wireless devices. Location is easily obtained outdoors using GPS, although this may incur a significant energy cost. Work in this area has explored indoor localization systems, or methods to localize nodes and objects when GPS may be unavailable or too expensive to use. | ||
| Line 184: | Line 182: | ||
| * [General] Surroundsense: Mobile Phone Localization via Ambience Fingerprinting (ACM DL: Free for Members). Martin Azizyan, Ionut Constandache, and Romit Roy Choudhury. Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom), ACM, 2009. DOI=10.1145/1614320.1614350. Summary: Beyond physical location, determining logical location (e.g., the room you are in) is often an important capability for mobile devices; this article explores a method of using fingerprints of ambient sound and light information to achieve this capability. | * [General] Surroundsense: Mobile Phone Localization via Ambience Fingerprinting (ACM DL: Free for Members). Martin Azizyan, Ionut Constandache, and Romit Roy Choudhury. Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCom), ACM, 2009. DOI=10.1145/1614320.1614350. Summary: Beyond physical location, determining logical location (e.g., the room you are in) is often an important capability for mobile devices; this article explores a method of using fingerprints of ambient sound and light information to achieve this capability. | ||
| - | === TIME SYNCHRONIZATION === | + | ==== TIME SYNCHRONIZATION ==== |
| For some classes of wireless networks, especially sensor networks, data acquisition can be improved by placing synchronized clocks at every node in the network. Often, time synchronization is achieved by explicit message exchanges to communication clock offsets between neighboring nodes, and then algorithmically adjusting those offsets over time to compensate for clock drifts. The following articles describe important additional time synchronization techniques in some detail. | For some classes of wireless networks, especially sensor networks, data acquisition can be improved by placing synchronized clocks at every node in the network. Often, time synchronization is achieved by explicit message exchanges to communication clock offsets between neighboring nodes, and then algorithmically adjusting those offsets over time to compensate for clock drifts. The following articles describe important additional time synchronization techniques in some detail. | ||
| Line 194: | Line 192: | ||
| * [System] Recovering Temporal Integrity with Data Driven Time Synchronization (ACM DL: Free for Members). Martin Lukac, Paul Davis, Robert Clayton, and Deborah Estrin. Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN), IEEE, 2009. Summary: This work takes a qualitatively different approach, using the events seen in the data itself to adjust timestamps at different nodes. | * [System] Recovering Temporal Integrity with Data Driven Time Synchronization (ACM DL: Free for Members). Martin Lukac, Paul Davis, Robert Clayton, and Deborah Estrin. Proceedings of the International Conference on Information Processing in Sensor Networks (IPSN), IEEE, 2009. Summary: This work takes a qualitatively different approach, using the events seen in the data itself to adjust timestamps at different nodes. | ||
| - | === MOBILE HCI—TEXT INPUT WHILE MOBILE === | + | ==== MOBILE HCI—TEXT INPUT WHILE MOBILE ==== |
| One of the HCI challenges for mobile computing is providing users with the ability to have an effective mobile user experience while using a small handheld computer such as a smart phone. The scope of this topic is very large, but here we limit it to mobile input, and provide a set of references that cover the research behind stylus and soft keyboard solutions for text input on a mobile handset (smart phone or PDA): | One of the HCI challenges for mobile computing is providing users with the ability to have an effective mobile user experience while using a small handheld computer such as a smart phone. The scope of this topic is very large, but here we limit it to mobile input, and provide a set of references that cover the research behind stylus and soft keyboard solutions for text input on a mobile handset (smart phone or PDA): | ||
| Line 208: | Line 206: | ||
| * [General/Theory] Performance optimization of virtual keyboards. S. Zhai, M. Hunter and B. A. Smith. Human-Computer Interaction, vol. 17, issue 2/3 (2002), pp. 89-129. Also available at CiteSeer. Summary: This article is the most complete and rigorous treatment of soft keyboard optimization, a topic that produced many papers. However, to date, keyboard optimization has not been adopted by the phone market. | * [General/Theory] Performance optimization of virtual keyboards. S. Zhai, M. Hunter and B. A. Smith. Human-Computer Interaction, vol. 17, issue 2/3 (2002), pp. 89-129. Also available at CiteSeer. Summary: This article is the most complete and rigorous treatment of soft keyboard optimization, a topic that produced many papers. However, to date, keyboard optimization has not been adopted by the phone market. | ||
| - | === LOW-POWER OPERATION === | + | ==== LOW-POWER OPERATION ==== |
| One of the constraints that distinguishes mobile systems from desktop, or server, systems is their reliance on battery technology. This means that energy is limited for a mobile computer, and needs to be used sparingly. As a result, low-power operation has always been a core research area for mobile computing and encompasses the design of hardware, wireless protocols, architecture, operating systems, and user interaction mechanisms. As the world has become more concerned about total energy usage and the green movement has gained momentum, many of the techniques developed for mobile computing are now also being applied to desktop and server systems in order to save energy in both the home and corporate environments. The following articles provide some insight into the creative ways the energy footprint of mobile systems has been reduced by redesigning applications, languages, and devices and by building hybrid wireless technologies and employing energy-scavenging techniques. | One of the constraints that distinguishes mobile systems from desktop, or server, systems is their reliance on battery technology. This means that energy is limited for a mobile computer, and needs to be used sparingly. As a result, low-power operation has always been a core research area for mobile computing and encompasses the design of hardware, wireless protocols, architecture, operating systems, and user interaction mechanisms. As the world has become more concerned about total energy usage and the green movement has gained momentum, many of the techniques developed for mobile computing are now also being applied to desktop and server systems in order to save energy in both the home and corporate environments. The following articles provide some insight into the creative ways the energy footprint of mobile systems has been reduced by redesigning applications, languages, and devices and by building hybrid wireless technologies and employing energy-scavenging techniques. | ||
| Line 226: | Line 224: | ||
| * [System (protocol)] X-MAC: A Short Preamble MAC Protocol for Duty-Cycled Wireless Sensor Networks (ACM DL: Free for Members). M. Buettner, G.V.Yee, E. Anderson, and Richard Han. Proceedings of the International Conference on Embedded Networked Sensor Systems, 2006, ACM. DOI=10.1145/1182807.1182838. | * [System (protocol)] X-MAC: A Short Preamble MAC Protocol for Duty-Cycled Wireless Sensor Networks (ACM DL: Free for Members). M. Buettner, G.V.Yee, E. Anderson, and Richard Han. Proceedings of the International Conference on Embedded Networked Sensor Systems, 2006, ACM. DOI=10.1145/1182807.1182838. | ||
| - | === SECURITY AND PRIVACY === | + | ==== SECURITY AND PRIVACY ==== |
| Security and privacy pose unique challenges in mobile computing, because device mobility and personalized usage make it possible to infer personal information from the system's location, or usage patterns. In this section we highlight a few of the many interesting articles in this field, providing examples of security attacks that highlight some of the risks. This article provides an overview of privacy challenges in mobile and ubiquitous computing. | Security and privacy pose unique challenges in mobile computing, because device mobility and personalized usage make it possible to infer personal information from the system's location, or usage patterns. In this section we highlight a few of the many interesting articles in this field, providing examples of security attacks that highlight some of the risks. This article provides an overview of privacy challenges in mobile and ubiquitous computing. | ||
| Line 237: | Line 235: | ||
| * [Evaluation] Behavioral Detection of Malware on Mobile Handsets (ACM DL: Free for Members). A. Bose, X. Hu, K.G. Shin, and T. Park. Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), ACM, 2008. DOI=10.1145/1378600.1378626. Summary: This article proposes a novel behavioral detection framework for mobile worms, viruses, and Trojans based on classifiers that demonstrate more than 96% accuracy. The techniques employed have low overhead for computation time and resources, and are therefore very suitable for use with mobile computers. | * [Evaluation] Behavioral Detection of Malware on Mobile Handsets (ACM DL: Free for Members). A. Bose, X. Hu, K.G. Shin, and T. Park. Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), ACM, 2008. DOI=10.1145/1378600.1378626. Summary: This article proposes a novel behavioral detection framework for mobile worms, viruses, and Trojans based on classifiers that demonstrate more than 96% accuracy. The techniques employed have low overhead for computation time and resources, and are therefore very suitable for use with mobile computers. | ||
| - | [General] Cracking the Bluetooth PIN (ACM DL: Free for Members). Yaniv Shaked and Avishai Wool. Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), ACM, 2005. DOI=10.1145/1067170.1067176. Summary: This article describes a passive attack on Bluetooth to find the PIN used during the pairing process. The authors show that a 4-digit PIN can be cracked in less 0.06 sec on a 3GHz Pentium IV computer. The research shows that the underlying SAFER algorithm, which is based on a 128-bit key, is quite secure, but its realization as a 4-digit human readable PIN makes it vulnerable. | ||
| - | === MOBILE DATA ACCESS WHILE INTERMITTENTLY DISCONNECTED === | + | * [General] Cracking the Bluetooth PIN (ACM DL: Free for Members). Yaniv Shaked and Avishai Wool. Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), ACM, 2005. DOI=10.1145/1067170.1067176. Summary: This article describes a passive attack on Bluetooth to find the PIN used during the pairing process. The authors show that a 4-digit PIN can be cracked in less 0.06 sec on a 3GHz Pentium IV computer. The research shows that the underlying SAFER algorithm, which is based on a 128-bit key, is quite secure, but its realization as a 4-digit human readable PIN makes it vulnerable. |
| + | |||
| + | ==== MOBILE DATA ACCESS WHILE INTERMITTENTLY DISCONNECTED ==== | ||
| This section includes research that spans disconnected operation, weak connectivity, and conflict resolution. Note this is different from delay tolerant networks (DTNs), as, in this scenario, computers are sometimes directly plugged into a high-bandwidth network connections, but in other situations a computer may intermittently have no connection at all. The articles below describe how mobile systems can usefully continue their work despite these varying conditions: | This section includes research that spans disconnected operation, weak connectivity, and conflict resolution. Note this is different from delay tolerant networks (DTNs), as, in this scenario, computers are sometimes directly plugged into a high-bandwidth network connections, but in other situations a computer may intermittently have no connection at all. The articles below describe how mobile systems can usefully continue their work despite these varying conditions: | ||
| Line 253: | Line 252: | ||
| * [Experience] Exploiting Weak Connectivity for Mobile File Access (ACM DL: Free for Members). Lily B. Mummert, Maria Ebling, Mahadev Satyanarayanan. Proceedings of the ACM Symposium on Operating System Principles (SOSP), ACM, 1995. DOI=10.1145/224056.224068. Summary: This article describes how the Coda file system has evolved to exploit weak connectivity in the form of intermittent, low-bandwidth, and sometimes expensive plans by a service provider. This has been the environment for mobile computing for many years, although recently with 3G, and now 4G, this is improving. The key ideas presented here to enable mobile file access are cache validation, update propagation, and cache handling. | * [Experience] Exploiting Weak Connectivity for Mobile File Access (ACM DL: Free for Members). Lily B. Mummert, Maria Ebling, Mahadev Satyanarayanan. Proceedings of the ACM Symposium on Operating System Principles (SOSP), ACM, 1995. DOI=10.1145/224056.224068. Summary: This article describes how the Coda file system has evolved to exploit weak connectivity in the form of intermittent, low-bandwidth, and sometimes expensive plans by a service provider. This has been the environment for mobile computing for many years, although recently with 3G, and now 4G, this is improving. The key ideas presented here to enable mobile file access are cache validation, update propagation, and cache handling. | ||
| - | === MOBILE ROUTING: MESH NETWORKS AND MOBILE IP === | + | ==== MOBILE ROUTING: MESH NETWORKS AND MOBILE IP ==== |
| Wireless mesh networks are becoming a new attractive communication paradigm. Many cities have deployed, or are planning to deploy, them to provide Internet access to homes and businesses. In order to compete with wire-line access technology, routing in wireless mesh network should provide high throughput and reliable performance. This goal has inspired lots of research into developing effective routing protocols for wireless mesh networks. We also include an article on routing using Mobile IP that is representative of the key ideas described in several articles on this subject. | Wireless mesh networks are becoming a new attractive communication paradigm. Many cities have deployed, or are planning to deploy, them to provide Internet access to homes and businesses. In order to compete with wire-line access technology, routing in wireless mesh network should provide high throughput and reliable performance. This goal has inspired lots of research into developing effective routing protocols for wireless mesh networks. We also include an article on routing using Mobile IP that is representative of the key ideas described in several articles on this subject. | ||
| Line 267: | Line 266: | ||
| * [Theory] Impact of Interference on Multi-hop Wireless Network Performance (ACM DL: Free for Members). Kamal Jain, Jitendra Padhye, Venkata N. Padmanabhan, and Lili Qiu. Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCo), ACM, 2003. DOI=10.1145/938985.938993. Summary: This article models wireless interference using a conflict graph and develops methods for computing the upper and lower bounds of the optimal wireless network throughput for a given network topology and specific traffic demands. | * [Theory] Impact of Interference on Multi-hop Wireless Network Performance (ACM DL: Free for Members). Kamal Jain, Jitendra Padhye, Venkata N. Padmanabhan, and Lili Qiu. Proceedings of the Annual International Conference on Mobile Computing and Networking (MobiCo), ACM, 2003. DOI=10.1145/938985.938993. Summary: This article models wireless interference using a conflict graph and develops methods for computing the upper and lower bounds of the optimal wireless network throughput for a given network topology and specific traffic demands. | ||
| - | === MEASUREMENT AND PROFILING === | + | ==== MEASUREMENT AND PROFILING ==== |
| Mobile measurement and profiling is a topic of growing importance in the mobile community because significant insights can be obtained by performing measurements at various network locations and on various platforms. This provides visibility into mobile user behavior, mobile traffic characteristics, and mobile application operation. Measurement and profiling research efforts can be roughly categorized on the basis of the vantage point and objectives. Tools deployed on end-hosts, or mobile devices, offer direct insight into user-perceived performance and energy efficiency. Measurement studies based on data collected inside the network can provide aggregate resource usage as well as global traffic patterns. Beyond studies done for 802.11 wireless networks, there is also growing interest in investigating cellular data networks. | Mobile measurement and profiling is a topic of growing importance in the mobile community because significant insights can be obtained by performing measurements at various network locations and on various platforms. This provides visibility into mobile user behavior, mobile traffic characteristics, and mobile application operation. Measurement and profiling research efforts can be roughly categorized on the basis of the vantage point and objectives. Tools deployed on end-hosts, or mobile devices, offer direct insight into user-perceived performance and energy efficiency. Measurement studies based on data collected inside the network can provide aggregate resource usage as well as global traffic patterns. Beyond studies done for 802.11 wireless networks, there is also growing interest in investigating cellular data networks. | ||
| Line 283: | Line 282: | ||
| * [General] CRAWDAD.org: A community resource for archiving wireless data at Dartmouth. Tristan Henderson and David Kotz. Summary: CRAWDAD makes dozens of wireless and mobility traces available to researchers. It also links to an extensive collection of wireless-measurement papers. | * [General] CRAWDAD.org: A community resource for archiving wireless data at Dartmouth. Tristan Henderson and David Kotz. Summary: CRAWDAD makes dozens of wireless and mobility traces available to researchers. It also links to an extensive collection of wireless-measurement papers. | ||
| - | === VIRTUAL MACHINES IN SUPPORT OF MOBILITY === | + | ==== VIRTUAL MACHINES IN SUPPORT OF MOBILITY ==== |
| For many years, virtual machines have been used in data centers to move services between sets of physical machines to provide processor load balancing, while at the same time ensuring secure isolation between services running on the same machine. However, in recent years research has shown the benefit of using virtual machines to support mobile computing. The idea is that a computation can be migrated from a local computer to a remote computer while the user travels between them, thus removing the need to actually carry a computer. Alternatively, computation can be moved from a powerful desktop computer to a mobile smart phone, and then back to a desktop, thus providing seamless access to the same computation environment on the best available hardware at hand. The following articles present various systems that exploit this idea. | For many years, virtual machines have been used in data centers to move services between sets of physical machines to provide processor load balancing, while at the same time ensuring secure isolation between services running on the same machine. However, in recent years research has shown the benefit of using virtual machines to support mobile computing. The idea is that a computation can be migrated from a local computer to a remote computer while the user travels between them, thus removing the need to actually carry a computer. Alternatively, computation can be moved from a powerful desktop computer to a mobile smart phone, and then back to a desktop, thus providing seamless access to the same computation environment on the best available hardware at hand. The following articles present various systems that exploit this idea. | ||
| Line 294: | Line 293: | ||
| * [Theory] The Case for VM-Based Cloudlets in Mobile Computing. Mahadev Satyanarayanan, Paramvir Bahl, Ramón Cáceres, and Nigel Davies. IEEE Pervasive Computing, vol.8, issue 4 (Oct./Dec. 2009), pp. 14-23. DOI=10.1109/MPRV.2009.64. Also available at http://research.microsoft.com/pubs/102364/cloudlets09.pdf. Summary: This article presents a new vision of computing that liberates mobile devices from severe resource constraints by enabling resource-intensive applications to leverage cloud computing, but free of WAN delays, jitter, congestion, and network failures. This is achieved through high-bandwidth wireless access to servers provisioned near to a mobile device in active use. | * [Theory] The Case for VM-Based Cloudlets in Mobile Computing. Mahadev Satyanarayanan, Paramvir Bahl, Ramón Cáceres, and Nigel Davies. IEEE Pervasive Computing, vol.8, issue 4 (Oct./Dec. 2009), pp. 14-23. DOI=10.1109/MPRV.2009.64. Also available at http://research.microsoft.com/pubs/102364/cloudlets09.pdf. Summary: This article presents a new vision of computing that liberates mobile devices from severe resource constraints by enabling resource-intensive applications to leverage cloud computing, but free of WAN delays, jitter, congestion, and network failures. This is achieved through high-bandwidth wireless access to servers provisioned near to a mobile device in active use. | ||
| + | |||
| + | ==== Resources ==== | ||
| === KEY CONFERENCES === | === KEY CONFERENCES === | ||
| - | ▪ MobiSys: www.sigmobile.org/mobisys/ | + | * MobiSys: www.sigmobile.org/mobisys/ |
| - | ▪ MobiCom: www.sigmobile.org/mobicom/ | + | * MobiCom: www.sigmobile.org/mobicom/ |
| - | ▪ MobiHoc: www.sigmobile.org/mobihoc/ | + | * MobiHoc: www.sigmobile.org/mobihoc/ |
| - | ▪ SenSys: www.sigmobile.org/sensys/ | + | * SenSys: www.sigmobile.org/sensys/ |
| - | ▪ UbiComp: www.ubicomp.org | + | * UbiComp: www.ubicomp.org |
| - | ▪ Pervasive: www.pervasiveconference.org | + | * Pervasive: www.pervasiveconference.org |
| - | ▪ HotMobile: www.hotmobile.org | + | * HotMobile: www.hotmobile.org |
| - | ▪ Mobile HCI: www.mobilehci.org | + | * Mobile HCI: www.mobilehci.org |
| - | ▪ PerCom: www.percom.org | + | * PerCom: www.percom.org |
| In addition, conferences such as ACM CHI and UIST have mobile computing sessions; see ACM SIGCHI (CHI is the premier conference) at www.sigchi.org; see ACM UISTwww.uist.org. | In addition, conferences such as ACM CHI and UIST have mobile computing sessions; see ACM SIGCHI (CHI is the premier conference) at www.sigchi.org; see ACM UISTwww.uist.org. | ||
| Line 311: | Line 312: | ||
| === PERIODICALS AND JOURNALS === | === PERIODICALS AND JOURNALS === | ||
| - | ▪ ACM Mobile Computing and Communication Review (MC2R). www.sigmobile.org | + | * ACM Mobile Computing and Communication Review (MC2R). www.sigmobile.org |
| - | ▪ IEEE Transactions on Mobile Computing (TMC). www.computer.org/tmc/ | + | * IEEE Transactions on Mobile Computing (TMC). www.computer.org/tmc/ |
| - | ▪ IEEE Pervasive Computing Magazine. www.computer.org/pervasive/ | + | * IEEE Pervasive Computing Magazine. www.computer.org/pervasive/ |
| - | ▪ IEEE Wireless Communication Magazine. dl.comsoc.org/wireless/ | + | * IEEE Wireless Communication Magazine. dl.comsoc.org/wireless/ |
| - | ▪ Personal and Ubiquitous Computing, Springer, London. | + | * Personal and Ubiquitous Computing, Springer, London. |
| - | ▪ Pervasive and Mobile Computing, Elsevler, Amsterdam. | + | * Pervasive and Mobile Computing, Elsevler, Amsterdam. |
| - | + | ||
| - | BOOKS | + | |
| - | ▪ Ubiquitous Computing Fundamentals. John Krumm (ed.), CRC Press, 2010. ISBN: 978-1-4200-9360-5. | + | |
| - | ▪ Mobile, Wireless and Sensor Networks: Technology, Applications and Future Directions. Rajeev Shorey et al. (eds.), Wiley Online Library, 2006. DOI=10.1002/0471755591. | + | |
| - | ▪ Morgan and Claypool Synthesis Lecture Series on Pervasive Computing | + | |
| - | The Landscape of Pervasive Computing Standards. Sumi Helal, June 2010. Abstract | PDF (3398 KB) | PDF Plus (1460 KB). | + | |
| - | A Practical Guide to Testing Wireless Smartphone Applications. Julian Harty, 2009. Abstract | PDF (4229 KB) | PDF Plus (1485 KB). | + | |
| - | Location Systems: An Introduction to the Technology Behind Location Awareness. Anthony LaMarca, Eyal de Lara, 2008. Abstract | PDF (9651 KB) | PDF Plus (3103KB). | + | |
| - | Replicated Data Management for Mobile Computing. Douglas B. Terry, 2008, Abstract | PDF (1619 KB) | PDF Plus (959 KB). | + | |
| - | Application Design for Wearable Computing. Dan Siewiorek, Asim Smailagic, Thad Starner, 2008, Abstract | PDF (4260 KB) | PDF Plus (1313 KB). | + | |
| - | Controlling Energy Demand in Mobile Computing Systems. Carla Schlatter Ellis, 2007, Abstract | PDF (1588 KB) | PDF Plus (983 KB). | + | |
| - | RFID Explained: A Primer on Radio Frequency Identification Technologies. Roy Want, 2006, Abstract | PDF (11087 KB) | PDF Plus (2064 KB). | + | |
| - | + | ||
| - | === NEWSLETTERS === | + | |
| - | ▪ Fierce Wireless: The wireless industry's daily monitor. Sign-up for newsletter athttp://www.fiercewireless.com/. | + | |
| - | ▪ Mobile Industry Review: Provides a mix of news, original content, and opinion across the mobile and wireless industries. Sign-up for newsletter at http://www.mobileindustryreview.com/. | + | |
| - | ▪ Mobile Gazette: Information on the mobile industy's smartphones and tablets (newsletter sign-up available). | + | |
| - | ▪ The Mobile-Phone Directory: News, smartphone specs, advice center, technology, glossary. | + | |
| - | ▪ MobileBurn: Mobile industry news, and the latest products. | + | |
| - | BLOGS | + | === BOOKS === |
| - | ▪ Chetansharma: (Consultancy) mobile computing blog. | + | * Ubiquitous Computing Fundamentals. John Krumm (ed.), CRC Press, 2010. ISBN: 978-1-4200-9360-5. |
| - | ▪ The Mobile Technology Weblog. | + | * Mobile, Wireless and Sensor Networks: Technology, Applications and Future Directions. Rajeev Shorey et al. (eds.), Wiley Online Library, 2006. DOI=10.1002/0471755591. |
| - | ▪ Android Developers Blog. | + | * Morgan and Claypool Synthesis Lecture Series on Pervasive Computing |
| - | ▪ iPhone Blog. | + | * The Landscape of Pervasive Computing Standards. Sumi Helal, June 2010. Abstract | PDF (3398 KB) | PDF Plus (1460 KB). |
| - | ▪ iOS Blog at MacRumors website. | + | * A Practical Guide to Testing Wireless Smartphone Applications. Julian Harty, 2009. Abstract | PDF (4229 KB) | PDF Plus (1485 KB). |
| - | ▪ Don's Mobile Blog: Java ME development. | + | * Location Systems: An Introduction to the Technology Behind Location Awareness. Anthony LaMarca, Eyal de Lara, 2008. Abstract | PDF (9651 KB) | PDF Plus (3103KB). |
| + | * Replicated Data Management for Mobile Computing. Douglas B. Terry, 2008, Abstract | PDF (1619 KB) | PDF Plus (959 KB). | ||
| + | * Application Design for Wearable Computing. Dan Siewiorek, Asim Smailagic, Thad Starner, 2008, Abstract | PDF (4260 KB) | PDF Plus (1313 KB). | ||
| + | * Controlling Energy Demand in Mobile Computing Systems. Carla Schlatter Ellis, 2007, Abstract | PDF (1588 KB) | PDF Plus (983 KB). | ||
| + | * RFID Explained: A Primer on Radio Frequency Identification Technologies. Roy Want, 2006, Abstract | PDF (11087 KB) | PDF Plus (2064 KB). | ||
| - | VIDEOS | ||
| - | ▪ Smartphone, Tablet and eBook Technologies | ||
| - | Apple iPhone 4 Official Video | ||
| - | What is an Android phone? | ||
| - | Windows Mobile 7—An Introduction | ||
| - | Introducing the iPad 2 (Tablet) | ||
| - | Samsung Galaxy 10.1 Tablet Review (Android Tablet) | ||
| - | The Amazon Kindle (eBook) | ||
| - | ▪ Mobile plus Cloud Technologies | ||
| - | Google Educational Webcast on Mobile Part 1 | ||
| - | ▪ Visions of the Mobile Future | ||
| - | Internet of things. Productivity Future Vision, Microsoft | ||
| - | The Future of Screen Technology | ||
| - | Metro Future Store—Shopping in the Future (w/ RFID) | ||
| - | Prada Store Retail Experience (including RFID and Magic Mirror) | ||
| - | ▪ Mobile HCI Innovation | ||
| - | SixthSense—A Wearable Gestural Interface. MIT Media Lab | ||
| - | Microsoft Surface Video (+ integration with mobile phones) | ||
| - | Qualcomm Augmented Reality Apps | ||
| - | Abracadabra (UIST 2009): A new input technique for mobile devices using magnetic-sensing. | ||
| - | Wearable Computing: The next generation of the ’borg. Thad Starner, April 2011 | ||
| - | Microsoft Skinput: Mobile Interaction through your skin | ||
| - | Pick and Drop (UIST 1997). J. Rekimoto et al. | ||
| - | Sensing Techniques for Mobile Interaction (UIST 2000). K. Kinckley et al. | ||
| - | Connectables: Dynamic coupling of displays for the flexible creation of shared workspaces(UIST 2001): Shows concepts useful for tablets. P. Tandler et al. | ||
| - | TiltType: Accelerometer-supported text entry for very small devices (UIST 2002). Partridge et al. | ||
| - | Collapse-to-zoom (UIST 2004). P. Baudisch et al. | ||
| - | Haptic Pen: A tactile feedback stylus for touch screens (UIST 2004). J.C. Lee et al. | ||
| - | A Gesture Based Authentication Scheme for Public Terminals (UIST 2004). S. Patel et al. | ||
| - | Lash-ups: A toolkit for location-aware mash-ups (UIST 2006). Brandt et al. | ||
| - | MapTop: Behavior as context in a digital exhibition guide (UIST 2006). A. Kodama et al. | ||
| - | | ||
| ===== Mobility-aware Networking ===== | ===== Mobility-aware Networking ===== | ||