636 research outputs found
Opportunistic social dissemination of micro-blogs
Through web sites such as Twitter, micro-blogging has shown a remarkable growth, demonstrating the human desire to share and consume information and knowledge. At the same time, the capabilities of mobile devices such as smart phones has considerably increased, opening up new ways to communicate and share content. In particular it is becoming feasible that mobile devices can directly share content such as micro-blogs without Internet infrastructure. This offers advantages in terms of scalability, and for micro-blogs in particular, it offers the potential to provide content relevant to the end user without explicit subscriptions. To facilitate this, we propose a totally decentralised push-based scheme for intelligent micro-blogging from mobile devices based on opportunistic networking. This is achieved through mobile devices building interest profiles relevant to communities induced by frequent social interactions. These interest profiles allow the devices to prioritise forwarding the micro-blog payloads that maximise the utility received by others. Detailed simulation studies determine the parameters that affect system performance and demonstrate that the proposed scheme outperforms basic dissemination strategies in terms of the relevance of the received information
Architecting Time-Critical Big-Data Systems
Current infrastructures for developing big-data applications are able to process –via big-data analytics- huge amounts of data, using clusters of machines that collaborate to perform parallel computations. However, current infrastructures were not designed to work with the requirements of time-critical applications; they are more focused on general-purpose applications rather than time-critical ones. Addressing this issue from the perspective of the real-time systems community, this paper considers time-critical big-data. It deals with the definition of a time-critical big-data system from the point of view of requirements, analyzing the specific characteristics of some popular big-data applications. This analysis is complemented by the challenges stemmed from the infrastructures that support the applications, proposing an architecture and offering initial performance patterns that connect application costs with infrastructure performance
Exploiting user interest similarity and social links for micro-blog forwarding in mobile opportunistic networks
Micro-blogging services have recently been experiencing increasing success among Web users. Differ- ent to traditional online social applications, micro-blogs are lightweight, require small cognitive effort and help share real-time information about personal activities and interests. In this article we explore scalable pushing protocols that are particularly suited to the delivery of this type of service in a mobile pervasive environment. Here, micro-blog updates are generated and carried by mobile (smart-phone type) devices and are exchanged through opportunistic encounters. We enhance primitive push mechanisms using social information concerning the interests of network nodes as well as the frequency of encounters with them. This information is collected and shared dynamically, as nodes initially encounter each other and exchange their preferences, and directs the forwarding of micro-blog updates across the network. Also incorporated is the spatiotemporal scope of the updates, which is only partially considered in current Internet services. We introduce several new protocol variants that differentiate the forwarding strategy towards interest- similar and frequently encountered nodes, as well as the amount of updates forwarded upon each encounter. In all cases, the proposed scheme outperforms the basic flooding dissemination mechanism in delivering high numbers of micro-blog updates to the nodes interested in them. Our extensive evaluation highlights how use can be made of different amounts of social information to trade performance with complexity and computational effort. However, hard performance bounds appear to be set by the level of coincidence between interest-similar node communities and meeting groups emerging due to the mobility patterns of the nodes
Recommended from our members
Social network support for data delivery infrastructures
Network infrastructures often need to stage content so that it is accessible to consumers. The standard solution, deploying the content on a centralised server, can be inadequate in several situations.
Our thesis is that information encoded in social networks can be used to tailor content staging decisions to the user base and thereby build better data delivery infrastructures. This claim is supported by two case studies, which apply social information in challenging situations where traditional content staging is infeasible. Our approach works by examining empirical traces to identify relevant social properties, and then exploits them.
The first study looks at cost-effectively serving the ``Long Tail'' of rich-media user-generated content, which need to be staged close to viewers to control latency and jitter. Our traces show that a preference for the unpopular tail items often spreads virally and is localised to some part of the social network. Exploiting this, we propose Buzztraq, which decreases replication costs by selectively copying items to locations favoured by viral spread. We also design SpinThrift, which separates popular and unpopular content based on the relative proportion of viral accesses, and opportunistically spins down disks containing unpopular content, thereby saving energy.
The second study examines whether human face-to-face contacts can efficiently create paths over time between arbitrary users. Here, content is staged by spreading it through intermediate users until the destination is reached. Flooding every node minimises delivery times but is not scalable. We show that the human contact network is resilient to individual path failures, and for unicast paths, can efficiently approximate flooding in delivery time distribution simply by randomly sampling a handful of paths found by it. Multicast by contained flooding within a community is also efficient. However, connectivity relies on rare contacts and frequent contacts are often not useful for data delivery.
Also, periods of similar duration could achieve different levels of connectivity; we devise a test to identify good periods. We finish by discussing how these properties influence routing algorithms.This work was supported by a St. John's College Benefactor's Scholarship and a Research Studentship from the Cambridge Philosophical Society
Tagging amongst friends: an exploration of social media exchange on mobile devices
Mobile social software tools have great potential in transforming the way users communicate
on the move, by augmenting their everyday environment with pertinent information from
their online social networks. A fundamental aspect to the success of these tools is in
developing an understanding of their emergent real-world use and also the aspirations of
users; this thesis focuses on investigating one facet of this: the exchange of social media. To
facilitate this investigation, three mobile social tools have been developed for use on locationaware
smartphone handsets. The first is an exploratory social game, 'Gophers' that utilises
task oriented gameplay, social agents and GSM cell positioning to create an engaging
ecosystem in which users create and exchange geotagged social media. Supplementing this is
a pair of social awareness and tagging services that integrate with a user's existing online
social network; the 'ItchyFeet' service uses GPS positioning to allow the user and their social
network peers to collaboratively build a landscape of socially important geotagged locations,
which are used as indicators of a user's context on their Facebook profile; likewise
'MobiClouds' revisits this concept by exploring the novel concept of Bluetooth 'people
tagging' to facilitate the creation of tags that are more indicative of users' social surroundings.
The thesis reports on findings from formal trials of these technologies, using groups of
volunteer social network users based around the city of Lincoln, UK, where the incorporation
of daily diaries, interviews and automated logging precisely monitored application use.
Through analysis of trial data, a guide for designers of future mobile social tools has been
devised and the factors that typically influence users when creating tags are identified. The
thesis makes a number of further contributions to the area. Firstly, it identifies the natural
desire of users to update their status whilst mobile; a practice recently popularised by
commercial 'check in' services. It also explores the overarching narratives that developed over
time, which formed an integral part of the tagging process and augmented social media with a
higher level meaning. Finally, it reveals how social media is affected by the tag positioning
method selected and also by personal circumstances, such as the proximity of social peers
Research allocation in mobile volunteer computing system: Taxonomy, challenges and future work
The rise of mobile devices and the Internet of Things has generated vast data which require efficient processing methods. Volunteer Computing (VC) is a distributed network that utilises idle resources from diverse devices for task completion. VC offers a cost-effective and scalable solution for computation resources. Mobile Volunteer Computing (MVC) capitalises on the abundance of mobile devices as participants. However, managing a large number of participants in the network presents a challenge in scheduling resources. Various resource allocation algorithms and MVC platforms have been developed, but there is a lack of survey papers summarising these systems and algorithms. This paper aims to bridge the gap by delivering a comprehensive survey of MVC, including related technologies, MVC architecture, and major finding in taxonomy of resource allocation in MVC
Secure Communication in Disaster Scenarios
Während Naturkatastrophen oder terroristischer Anschläge ist die bestehende Kommunikationsinfrastruktur häufig überlastet oder fällt komplett aus. In diesen Situationen können mobile Geräte mithilfe von drahtloser ad-hoc- und unterbrechungstoleranter Vernetzung miteinander verbunden werden, um ein Notfall-Kommunikationssystem für Zivilisten und Rettungsdienste einzurichten. Falls verfügbar, kann eine Verbindung zu Cloud-Diensten im Internet eine wertvolle Hilfe im Krisen- und Katastrophenmanagement sein.
Solche Kommunikationssysteme bergen jedoch ernsthafte Sicherheitsrisiken, da Angreifer versuchen könnten, vertrauliche Daten zu stehlen, gefälschte Benachrichtigungen von Notfalldiensten einzuspeisen oder Denial-of-Service (DoS) Angriffe durchzuführen. Diese Dissertation schlägt neue Ansätze zur Kommunikation in Notfallnetzen von mobilen Geräten vor, die von der Kommunikation zwischen Mobilfunkgeräten bis zu Cloud-Diensten auf Servern im Internet reichen. Durch die Nutzung dieser Ansätze werden die Sicherheit der Geräte-zu-Geräte-Kommunikation, die Sicherheit von Notfall-Apps auf mobilen Geräten und die Sicherheit von Server-Systemen für Cloud-Dienste verbessert
- …