Results 1 - 10
of
718
BUBBLE Rap: Social-based forwarding in delay tolerant networks
- in Proc. ACM MobiHoc
, 2008
"... In this paper we seek to improve our understanding of human mobility in terms of social structures, and to use these structures in the design of forwarding algorithms for Pocket Switched Networks (PSNs). Taking human mobility traces from the real world, we discover that human interaction is heteroge ..."
Abstract
-
Cited by 284 (31 self)
- Add to MetaCart
(Show Context)
In this paper we seek to improve our understanding of human mobility in terms of social structures, and to use these structures in the design of forwarding algorithms for Pocket Switched Networks (PSNs). Taking human mobility traces from the real world, we discover that human interaction is heterogeneous both in terms of hubs (popular individuals) and groups or communities. We propose a social based forwarding algorithm, BUBBLE, which is shown empirically to improve the forwarding efficiency significantly compared to oblivious forwarding schemes and to PROPHET algorithm. We also show how this algorithm can be implemented in a distributed way, which demonstrates that it is applicable in the decentralised environment of PSNs.
Social Network Analysis for Routing in Disconnected Delay-tolerant MANETs
, 2007
"... Message delivery in sparse Mobile Ad hoc Networks (MANETs) is difficult due to the fact that the network graph is rarely (if ever) connected. A key challenge is to find a route that can provide good delivery performance and low end-to-end delay in a disconnected network graph where nodes may move fr ..."
Abstract
-
Cited by 276 (1 self)
- Add to MetaCart
Message delivery in sparse Mobile Ad hoc Networks (MANETs) is difficult due to the fact that the network graph is rarely (if ever) connected. A key challenge is to find a route that can provide good delivery performance and low end-to-end delay in a disconnected network graph where nodes may move freely. This paper presents a multidisciplinary solution based on the consideration of the socalled small world dynamics which have been proposed for economy and social studies and have recently revealed to be a successful approach to be exploited for characterising information propagation in wireless networks. To this purpose, some bridge nodes are identified based on their centrality characteristics, i.e., on their capability to broker information exchange among otherwise disconnected nodes. Due to the complexity of the centrality metrics in populated networks the concept of ego networks is exploited where nodes are not required to exchange information about the entire network topology, but only locally available information is considered. Then SimBet Routing is proposed which exploits the exchange of pre-estimated ‘betweenness’ centrality metrics and locally determined social ‘similarity’ to the destination node. We present simulations using real trace data to demonstrate that SimBet Routing results in delivery performance close to Epidemic Routing but with significantly reduced overhead. Additionally, we show that Sim-Bet Routing outperforms PRoPHET Routing, particularly when the sending and receiving nodes have low connectivity.
Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application
- in Proceedings of the International Conference on Embedded Networked Sensor Systems (SenSys
, 2008
"... We present the design, implementation, evaluation, and user experiences of the CenceMe application, which represents the first system that combines the inference of the presence of individuals using off-the-shelf, sensor-enabled mobile phones with sharing of this information through social networkin ..."
Abstract
-
Cited by 252 (19 self)
- Add to MetaCart
(Show Context)
We present the design, implementation, evaluation, and user experiences of the CenceMe application, which represents the first system that combines the inference of the presence of individuals using off-the-shelf, sensor-enabled mobile phones with sharing of this information through social networking applications such as Facebook and MySpace. We discuss the system challenges for the development of software on the Nokia N95 mobile phone. We present the design and tradeoffs of split-level classification, whereby personal sensing presence (e.g., walking, in conversation, at the gym) is derived from classifiers which execute in part on the phones and in part on the backend servers to achieve scalable inference. We report performance measurements that characterize the computational requirements of the software and the energy consumption of the CenceMe phone client. We validate the system through a user study where twenty two people, including undergraduates, graduates and faculty, used CenceMe continuously over a three week period in a campus town. From this user study we learn how the system performs in a production environment and what uses people find for a personal sensing system.
Impact of human mobility on opportunistic forwarding algorithms
- IEEE Trans. Mob. Comp
, 2007
"... Abstract — We study data transfer opportunities between wireless devices carried by humans. We observe that the distribution of the inter-contact time (the time gap separating two contacts between the same pair of devices) may be well approximated by a power law over the range [10 minutes; 1 day]. T ..."
Abstract
-
Cited by 232 (21 self)
- Add to MetaCart
Abstract — We study data transfer opportunities between wireless devices carried by humans. We observe that the distribution of the inter-contact time (the time gap separating two contacts between the same pair of devices) may be well approximated by a power law over the range [10 minutes; 1 day]. This observation is confirmed using eight distinct experimental data sets. It is at odds with the exponential decay implied by the most commonly used mobility models. In this paper, we study how this newly uncovered characteristic of human mobility impacts one class of forwarding algorithms previously proposed. We use a simplified model based on the renewal theory to study how the parameters of the distribution impact the performance in terms of the delivery delay of these algorithms. We make recommendations for the design of well founded opportunistic forwarding algorithms, in the context of human carried devices. I.
Power law and exponential decay of inter contact times between mobile devices
, 2007
"... We examine the fundamental properties that determine the basic performance metrics for opportunistic communications. We first consider the distribution of inter-contact times between mobile devices. Using a diverse set of measured mobility traces, we find as an invariant property that there is a cha ..."
Abstract
-
Cited by 195 (2 self)
- Add to MetaCart
(Show Context)
We examine the fundamental properties that determine the basic performance metrics for opportunistic communications. We first consider the distribution of inter-contact times between mobile devices. Using a diverse set of measured mobility traces, we find as an invariant property that there is a characteristic time, order of half a day, beyond which the distribution decays exponentially. Up to this value, the distribution in many cases follows a power law, as shown in recent work. This power law finding was previously used to support the hypothesis that inter-contact time has a power law tail, and that common mobility models are not adequate. However, we observe that the time scale of interest for opportunistic forwarding may be of the same order as the characteristic time, and thus the exponential tail is important. We further show that already simple models such as random walk and random waypoint can exhibit the same dichotomy in the distribution of inter-contact time asc in empirical traces. Finally, we perform an extensive analysis of several properties of human mobility patterns across several dimensions, and we present empirical evidence that the return time of a mobile device to its favorite location site may already explain the observed dichotomy. Our findings suggest that existing results on the performance of forwarding schemes based on power-law tails might be overly pessimistic.
Social Serendipity: Mobilizing Social Software
, 2005
"... A new mobile-phone–based system uses Bluetooth hardware addresses and a database of user profiles to cue informal, face-to-face interactions between nearby users who don’t know each other, but probably should. Mobile phones have been adopted faster than any technology in human history and are now a ..."
Abstract
-
Cited by 156 (5 self)
- Add to MetaCart
A new mobile-phone–based system uses Bluetooth hardware addresses and a database of user profiles to cue informal, face-to-face interactions between nearby users who don’t know each other, but probably should. Mobile phones have been adopted faster than any technology in human history and are now available to the majority of people on Earth who earn more than US$5 a day. More than 600 million phones were sold in 2004, many times more than the number of personal computers sold that year.
The ONE Simulator for DTN Protocol Evaluation
- In Proceedings of the 2nd International Conference on Simulation Tools and Techniques (SIMUtools
, 2009
"... Delay-tolerant Networking (DTN) enables communication in sparse mobile ad-hoc networks and other challenged environments where traditional networking fails and new routing and application protocols are required. Past experience with DTN routing and application protocols has shown that their performa ..."
Abstract
-
Cited by 156 (13 self)
- Add to MetaCart
(Show Context)
Delay-tolerant Networking (DTN) enables communication in sparse mobile ad-hoc networks and other challenged environments where traditional networking fails and new routing and application protocols are required. Past experience with DTN routing and application protocols has shown that their performance is highly dependent on the underlying mobility and node characteristics. Evaluating DTN protocols across many scenarios requires suitable simulation tools. This paper presents the Opportunistic Networking Environment (ONE) simulator specifically designed for evaluating DTN routing and application protocols. It allows users to create scenarios based upon different synthetic movement models and real-world traces and offers a framework for implementing routing and application protocols (already including six well-known routing protocols). Interactive visualization and post-processing tools support evaluating experiments and an emulation mode allows the ONE simulator to become part of a real-world DTN testbed. We show sample simulations to demonstrate the simulator’s flexible support for DTN protocol evaluation.
Eigenbehaviors: Identifying Structure in Routine
- IN PROC. OF UBICOMP’06
, 2006
"... In this work we identify the structure inherent in daily human behavior with models that can accurately analyze, predict and cluster multimodal data from individuals and groups. We represent this structure by the principal components of the complete behavioral dataset, a set of characteristic vecto ..."
Abstract
-
Cited by 144 (7 self)
- Add to MetaCart
In this work we identify the structure inherent in daily human behavior with models that can accurately analyze, predict and cluster multimodal data from individuals and groups. We represent this structure by the principal components of the complete behavioral dataset, a set of characteristic vectors we have termed eigenbehaviors. In our model, an individual’s behavior over a specific day can be approximated by a weighted sum of his or her primary eigenbehaviors. When these weights are calculated halfway through a day, they can be used to predict the day’s remaining behaviors with a 79 % accuracy for our test subjects. Additionally, we show that users of a similar demographic can be clustered into a “behavior space ” spanned by a set of their aggregate eigenbehaviors. These behavior spaces make it possible to determine the behavioral similarity between both individuals and groups, enabling 96 % classification accuracy of group affiliations. This approach capitalizes on the large amount of rich data previously captured during the Reality Mining study from mobile phones continuously logging location, proximate people, and communication of 100 subjects at MIT over the course of nine months.
Distributed community detection in delay tolerant networks,”
- Proc. ACM Conf. 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture (MobiArch ’07),
, 2007
"... ABSTRACT Community is an important attribute of Pocket Switched Networks (PSN), because mobile devices are carried by people who tend to belong to communities. We analysed community structure from mobility traces and used for forwarding algorithms ..."
Abstract
-
Cited by 98 (10 self)
- Add to MetaCart
(Show Context)
ABSTRACT Community is an important attribute of Pocket Switched Networks (PSN), because mobile devices are carried by people who tend to belong to communities. We analysed community structure from mobility traces and used for forwarding algorithms
Discovery of activity patterns using topic models
- In Proc. Ubiquitous computing
, 2008
"... In this work we propose a novel method to recognize daily routines as a probabilistic combination of activity patterns. The use of topic models enables the automatic discovery of such patterns in a user’s daily routine. We report experimental results that show the ability of the approach to model an ..."
Abstract
-
Cited by 95 (2 self)
- Add to MetaCart
(Show Context)
In this work we propose a novel method to recognize daily routines as a probabilistic combination of activity patterns. The use of topic models enables the automatic discovery of such patterns in a user’s daily routine. We report experimental results that show the ability of the approach to model and recognize daily routines without user annotation. ACM Classification Keywords