636 research outputs found

    Opportunistic social dissemination of micro-blogs

    Get PDF
    Through web sites such as Twitter, micro-blogging has shown a remarkable growth, demonstrating the human desire to share and consume information and knowledge. At the same time, the capabilities of mobile devices such as smart phones has considerably increased, opening up new ways to communicate and share content. In particular it is becoming feasible that mobile devices can directly share content such as micro-blogs without Internet infrastructure. This offers advantages in terms of scalability, and for micro-blogs in particular, it offers the potential to provide content relevant to the end user without explicit subscriptions. To facilitate this, we propose a totally decentralised push-based scheme for intelligent micro-blogging from mobile devices based on opportunistic networking. This is achieved through mobile devices building interest profiles relevant to communities induced by frequent social interactions. These interest profiles allow the devices to prioritise forwarding the micro-blog payloads that maximise the utility received by others. Detailed simulation studies determine the parameters that affect system performance and demonstrate that the proposed scheme outperforms basic dissemination strategies in terms of the relevance of the received information

    Architecting Time-Critical Big-Data Systems

    Get PDF
    Current infrastructures for developing big-data applications are able to process –via big-data analytics- huge amounts of data, using clusters of machines that collaborate to perform parallel computations. However, current infrastructures were not designed to work with the requirements of time-critical applications; they are more focused on general-purpose applications rather than time-critical ones. Addressing this issue from the perspective of the real-time systems community, this paper considers time-critical big-data. It deals with the definition of a time-critical big-data system from the point of view of requirements, analyzing the specific characteristics of some popular big-data applications. This analysis is complemented by the challenges stemmed from the infrastructures that support the applications, proposing an architecture and offering initial performance patterns that connect application costs with infrastructure performance

    Exploiting user interest similarity and social links for micro-blog forwarding in mobile opportunistic networks

    Get PDF
    Micro-blogging services have recently been experiencing increasing success among Web users. Differ- ent to traditional online social applications, micro-blogs are lightweight, require small cognitive effort and help share real-time information about personal activities and interests. In this article we explore scalable pushing protocols that are particularly suited to the delivery of this type of service in a mobile pervasive environment. Here, micro-blog updates are generated and carried by mobile (smart-phone type) devices and are exchanged through opportunistic encounters. We enhance primitive push mechanisms using social information concerning the interests of network nodes as well as the frequency of encounters with them. This information is collected and shared dynamically, as nodes initially encounter each other and exchange their preferences, and directs the forwarding of micro-blog updates across the network. Also incorporated is the spatiotemporal scope of the updates, which is only partially considered in current Internet services. We introduce several new protocol variants that differentiate the forwarding strategy towards interest- similar and frequently encountered nodes, as well as the amount of updates forwarded upon each encounter. In all cases, the proposed scheme outperforms the basic flooding dissemination mechanism in delivering high numbers of micro-blog updates to the nodes interested in them. Our extensive evaluation highlights how use can be made of different amounts of social information to trade performance with complexity and computational effort. However, hard performance bounds appear to be set by the level of coincidence between interest-similar node communities and meeting groups emerging due to the mobility patterns of the nodes

    Application aware delay tolerant network protocol

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    Tagging amongst friends: an exploration of social media exchange on mobile devices

    Get PDF
    Mobile social software tools have great potential in transforming the way users communicate on the move, by augmenting their everyday environment with pertinent information from their online social networks. A fundamental aspect to the success of these tools is in developing an understanding of their emergent real-world use and also the aspirations of users; this thesis focuses on investigating one facet of this: the exchange of social media. To facilitate this investigation, three mobile social tools have been developed for use on locationaware smartphone handsets. The first is an exploratory social game, 'Gophers' that utilises task oriented gameplay, social agents and GSM cell positioning to create an engaging ecosystem in which users create and exchange geotagged social media. Supplementing this is a pair of social awareness and tagging services that integrate with a user's existing online social network; the 'ItchyFeet' service uses GPS positioning to allow the user and their social network peers to collaboratively build a landscape of socially important geotagged locations, which are used as indicators of a user's context on their Facebook profile; likewise 'MobiClouds' revisits this concept by exploring the novel concept of Bluetooth 'people tagging' to facilitate the creation of tags that are more indicative of users' social surroundings. The thesis reports on findings from formal trials of these technologies, using groups of volunteer social network users based around the city of Lincoln, UK, where the incorporation of daily diaries, interviews and automated logging precisely monitored application use. Through analysis of trial data, a guide for designers of future mobile social tools has been devised and the factors that typically influence users when creating tags are identified. The thesis makes a number of further contributions to the area. Firstly, it identifies the natural desire of users to update their status whilst mobile; a practice recently popularised by commercial 'check in' services. It also explores the overarching narratives that developed over time, which formed an integral part of the tagging process and augmented social media with a higher level meaning. Finally, it reveals how social media is affected by the tag positioning method selected and also by personal circumstances, such as the proximity of social peers

    Research allocation in mobile volunteer computing system: Taxonomy, challenges and future work

    Get PDF
    The rise of mobile devices and the Internet of Things has generated vast data which require efficient processing methods. Volunteer Computing (VC) is a distributed network that utilises idle resources from diverse devices for task completion. VC offers a cost-effective and scalable solution for computation resources. Mobile Volunteer Computing (MVC) capitalises on the abundance of mobile devices as participants. However, managing a large number of participants in the network presents a challenge in scheduling resources. Various resource allocation algorithms and MVC platforms have been developed, but there is a lack of survey papers summarising these systems and algorithms. This paper aims to bridge the gap by delivering a comprehensive survey of MVC, including related technologies, MVC architecture, and major finding in taxonomy of resource allocation in MVC

    Secure Communication in Disaster Scenarios

    Get PDF
    Während Naturkatastrophen oder terroristischer Anschläge ist die bestehende Kommunikationsinfrastruktur häufig überlastet oder fällt komplett aus. In diesen Situationen können mobile Geräte mithilfe von drahtloser ad-hoc- und unterbrechungstoleranter Vernetzung miteinander verbunden werden, um ein Notfall-Kommunikationssystem für Zivilisten und Rettungsdienste einzurichten. Falls verfügbar, kann eine Verbindung zu Cloud-Diensten im Internet eine wertvolle Hilfe im Krisen- und Katastrophenmanagement sein. Solche Kommunikationssysteme bergen jedoch ernsthafte Sicherheitsrisiken, da Angreifer versuchen könnten, vertrauliche Daten zu stehlen, gefälschte Benachrichtigungen von Notfalldiensten einzuspeisen oder Denial-of-Service (DoS) Angriffe durchzuführen. Diese Dissertation schlägt neue Ansätze zur Kommunikation in Notfallnetzen von mobilen Geräten vor, die von der Kommunikation zwischen Mobilfunkgeräten bis zu Cloud-Diensten auf Servern im Internet reichen. Durch die Nutzung dieser Ansätze werden die Sicherheit der Geräte-zu-Geräte-Kommunikation, die Sicherheit von Notfall-Apps auf mobilen Geräten und die Sicherheit von Server-Systemen für Cloud-Dienste verbessert
    corecore