11 research outputs found

    A business simulator for reality mining

    Get PDF
    The paper invites interested teachers, researchers and practitioners to share insights and suggestions for development of a data generator/business simulator for reality mining data, to be used in e.g. ERP, BI and DW classes. The proposed setting for the simulation is a shopping mall, a facility known to most students. Using Bloom’s revised taxonomy as a framework for ensuring that student learning outcomes also are considered, the finished “package” will both contain the simulator, an initial set of exercises for student engagement, and academic discussion forums on further development of application and teaching cases. Building on results from a 2014 prototype, student interview data supports the many positive effects of business simulation in IT education found in literature. A new, very basic prototype will be built in 2015, constructed with great flexibility to embrace community input. As with any emergent research project, much in initial specifications may be changed underway. AMCIS TV LINK: https://youtu.be/VqnakfLK6x

    Evaluation of a framework for measuring efficency in opportunistic ad-hoc networks

    Get PDF
    Opportunistic networks are the manifestation of wireless ad-hoc networks where there is no continuous end-to-end path. The forwarding of messages takes place via any nodes that are encountered, and therefore the measurement of message passing efficiency between nodes becomes challenging if a number of different protocols are to be compared and evaluated. Prior work has identified an evaluation framework that addresses this challenge. This article describes the construction of a simulation tool to assist the assessment of efficiency in opportunistic networks, and by way of an exemplar case study, a set of experimental results are discussed and evaluated. From this we conclude that Spray and Focus may be the way forward in this case

    Contact surround in opportunistic networks

    Full text link
    International audienceIs the temporal dimension alone sufficient to characterize contacts in opportunistic networks? Several studies analyze the temporal aspect of contacts with significant results concerning contact and inter-contact distributions. Nevertheless, only the temporal dimension does not give a complete overview of contact characterization. In this paper, we propose the surround indicator as a metric to exhibit the contact's surrounding environment in opportunistic networks. We evaluate the surround indicator on two existing datasets and show that contacts have too heterogeneous and too unstable surrounds to be considered only in terms of duration. Besides a large variability of the surrounding environment within the duration of a single contact, it is frequent to observe contacts of identical duration that exhibit differences in their surrounds of more than a hundred times

    On the integration of interest and power awareness in social-aware opportunistic forwarding algorithms

    Get PDF
    Social-aware Opportunistic forwarding algorithms are much needed in environments which lack network infrastructure or in those that are susceptible to frequent disruptions. However, most of these algorithms are oblivious to both the user’s interest in the forwarded content and the limited power resources of the available mobile nodes. This paper proposes PI-SOFA, a framework for integrating the awareness of both interest and power capability of a candidate node within the forwarding decision process. Furthermore, the framework adapts its forwarding decisions to the expected contact duration between message carriers and candidate nodes. The proposed framework is applied to three state-of-the-art social-aware opportunistic forwarding algorithms that target mobile opportunistic message delivery. A simulation-based performance evaluation demonstrates the improved effectiveness, efficiency, reduction of power consumption, and fair utilization of the proposed versions in comparison to those of the original algorithms. The results show more than 500% extra f-measure, mainly by disregarding uninterested nodes while focusing on the potentially interested ones. Moreover, power awareness preserves up to 8% power with 41% less cost to attain higher utilization fairness by focusing on power-capable interested nodes. Finally, this paper analyzes the proposed algorithms’ performance across various environments. These findings can benefit message delivery in opportunistic mobile networks

    Runtime Verification with Controllable Time Predictability and Memory Utilization

    Get PDF
    The goal of runtime verifi cation is to inspect the well-being of a system by employing a monitor during its execution. Such monitoring imposes cost in terms of resource utilization. Memory usage and predictability of monitor invocations are the key indicators of the quality of a monitoring solution, especially in the context of embedded systems. In this work, we propose a novel control-theoretic approach for coordinating time predictability and memory utilization in runtime monitoring of real-time embedded systems. In particular, we design a PID controller and four fuzzy controllers with di erent optimization control objectives. Our approach controls the frequency of monitor invocations by incorporating a bounded memory bu er that stores events which need to be monitored. The controllers attempt to improve time predictability, and maximize memory utilization, while ensuring the soundness of the monitor. Unlike existing approaches based on static analysis, our approach is scalable and well-suited for reactive systems that are required to react to stimuli from the environment in a timely fashion. Our experiments using two case studies (a laser beam stabilizer for aircraft tracking, and a Bluetooth mobile payment system) demonstrate the advantages of using controllers to achieve low variation in the frequency of monitor invocations, while maintaining maximum memory utilization in highly non-linear environments. In addition to this problem, the thesis presents a brief overview of our preceding work on runtime verifi cation

    Delay tolerant networking in a shopping mall environment

    Get PDF
    The increasing popularity of computing devices with short-range wireless offers new communication service opportunities. These devices are small and may be mobile or embedded in almost any type of object imaginable, including cars, tools, appliances, clothing and various consumer goods. The majority of them can store data and transmit it when a wireless, or wired, transmitting medium is available. The mobility of the individuals carrying such short-range wireless devices is important because varying distances creates connection opportunities and disconnections. It is likely that successful forwarding algorithms will be based, at least in part, on the patterns of mobility that are seen in real settings. For this reason, studying human mobility in different environments for extended periods of time is essential. Thus we need to use measurements from realistic settings to drive the development and evaluation of appropriate forwarding algorithms. Recently, several significant efforts have been made to collect data reflecting human mobility. However, these traces are from specific scenarios and their validity is difficult to generalize. In this thesis we contribute to this effort by studying human mobility in shopping malls. We ran a field trial to collect real-world Bluetooth contact data from shop employees and clerks in a shopping mall over six days. This data will allow the informed design of forwarding policies and algorithms for such settings and scenarios, and determine the effects of users' mobility patterns on the prevalence of networking opportunities. Using this data set we have analysed human mobility and interaction patterns in this shopping mall environment. We present evidence of distinct classes of mobility in this situation and characterize them in terms of power law coefficients which approximate inter-contact time distributions. These results are quite different from previous studies in other environments. We have developed a software tool which implements a mobility model for "structured" scenarios such as shopping malls, trade fairs, music festivals, stadiums and museums. In this thesis we define as structured environment, a scenario having definite and highly organised structure, where people are organised by characteristic patterns of relationship and mobility. We analysed the contact traces collected on the field to guide the design of this mobility model. We show that our synthetic mobility model produces inter-contact time and contact duration distributions which approximate well to those of the real traces. Our scenario generator also implements several random mobility models. We compared our Shopping Mall mobility model to three other random mobility models by comparing the performances of two benchmark delay tolerant routing protocols, Epidemic and Prophet, when simulated with movement traces from each model. Thus, we demonstrate that the choice of a mobility model is a significant consideration when designing and evaluating delay-tolerant mobile ad-hoc network protocols. Finally, we have also conducted an initial study to evaluate the effect of delivering messages in shopping mall environments by exclusively forwarding them to customers or sellers, each of which has distinctive mobility patterns

    Delay tolerant networking in a shopping mall environment

    Get PDF
    The increasing popularity of computing devices with short-range wireless offers new communication service opportunities. These devices are small and may be mobile or embedded in almost any type of object imaginable, including cars, tools, appliances, clothing and various consumer goods. The majority of them can store data and transmit it when a wireless, or wired, transmitting medium is available. The mobility of the individuals carrying such short-range wireless devices is important because varying distances creates connection opportunities and disconnections. It is likely that successful forwarding algorithms will be based, at least in part, on the patterns of mobility that are seen in real settings. For this reason, studying human mobility in different environments for extended periods of time is essential. Thus we need to use measurements from realistic settings to drive the development and evaluation of appropriate forwarding algorithms. Recently, several significant efforts have been made to collect data reflecting human mobility. However, these traces are from specific scenarios and their validity is difficult to generalize. In this thesis we contribute to this effort by studying human mobility in shopping malls. We ran a field trial to collect real-world Bluetooth contact data from shop employees and clerks in a shopping mall over six days. This data will allow the informed design of forwarding policies and algorithms for such settings and scenarios, and determine the effects of users' mobility patterns on the prevalence of networking opportunities. Using this data set we have analysed human mobility and interaction patterns in this shopping mall environment. We present evidence of distinct classes of mobility in this situation and characterize them in terms of power law coefficients which approximate inter-contact time distributions. These results are quite different from previous studies in other environments. We have developed a software tool which implements a mobility model for "structured" scenarios such as shopping malls, trade fairs, music festivals, stadiums and museums. In this thesis we define as structured environment, a scenario having definite and highly organised structure, where people are organised by characteristic patterns of relationship and mobility. We analysed the contact traces collected on the field to guide the design of this mobility model. We show that our synthetic mobility model produces inter-contact time and contact duration distributions which approximate well to those of the real traces. Our scenario generator also implements several random mobility models. We compared our Shopping Mall mobility model to three other random mobility models by comparing the performances of two benchmark delay tolerant routing protocols, Epidemic and Prophet, when simulated with movement traces from each model. Thus, we demonstrate that the choice of a mobility model is a significant consideration when designing and evaluating delay-tolerant mobile ad-hoc network protocols. Finally, we have also conducted an initial study to evaluate the effect of delivering messages in shopping mall environments by exclusively forwarding them to customers or sellers, each of which has distinctive mobility patterns
    corecore