3,526 research outputs found
JALAD: Joint Accuracy- and Latency-Aware Deep Structure Decoupling for Edge-Cloud Execution
Recent years have witnessed a rapid growth of deep-network based services and
applications. A practical and critical problem thus has emerged: how to
effectively deploy the deep neural network models such that they can be
executed efficiently. Conventional cloud-based approaches usually run the deep
models in data center servers, causing large latency because a significant
amount of data has to be transferred from the edge of network to the data
center. In this paper, we propose JALAD, a joint accuracy- and latency-aware
execution framework, which decouples a deep neural network so that a part of it
will run at edge devices and the other part inside the conventional cloud,
while only a minimum amount of data has to be transferred between them. Though
the idea seems straightforward, we are facing challenges including i) how to
find the best partition of a deep structure; ii) how to deploy the component at
an edge device that only has limited computation power; and iii) how to
minimize the overall execution latency. Our answers to these questions are a
set of strategies in JALAD, including 1) A normalization based in-layer data
compression strategy by jointly considering compression rate and model
accuracy; 2) A latency-aware deep decoupling strategy to minimize the overall
execution latency; and 3) An edge-cloud structure adaptation strategy that
dynamically changes the decoupling for different network conditions.
Experiments demonstrate that our solution can significantly reduce the
execution latency: it speeds up the overall inference execution with a
guaranteed model accuracy loss.Comment: conference, copyright transfered to IEE
Anticipatory Mobile Computing: A Survey of the State of the Art and Research Challenges
Today's mobile phones are far from mere communication devices they were ten
years ago. Equipped with sophisticated sensors and advanced computing hardware,
phones can be used to infer users' location, activity, social setting and more.
As devices become increasingly intelligent, their capabilities evolve beyond
inferring context to predicting it, and then reasoning and acting upon the
predicted context. This article provides an overview of the current state of
the art in mobile sensing and context prediction paving the way for
full-fledged anticipatory mobile computing. We present a survey of phenomena
that mobile phones can infer and predict, and offer a description of machine
learning techniques used for such predictions. We then discuss proactive
decision making and decision delivery via the user-device feedback loop.
Finally, we discuss the challenges and opportunities of anticipatory mobile
computing.Comment: 29 pages, 5 figure
Multiverse: Mobility pattern understanding improves localization accuracy
Department of Computer Science and EngineeringThis paper presents the design and implementation of Multiverse, a practical indoor localization system that can be deployed on top of already existing WiFi infrastructure. Although the existing WiFi-based positioning techniques achieve acceptable accuracy levels, we find that existing solutions are not practical for use in buildings due to a requirement of installing sophisticated access point (AP) hardware or special application on client devices to aid the system with extra information. Multiverse achieves sub-room precision estimates, while utilizing only received signal strength indication (RSSI) readings available to most of today's buildings through their installed APs, along with the assumption that most users would walk at the normal speed. This level of simplicity would promote ubiquity of indoor localization in the era of smartphones.ope
A Robust Zero-Calibration RF-based Localization System for Realistic Environments
Due to the noisy indoor radio propagation channel, Radio Frequency (RF)-based
location determination systems usually require a tedious calibration phase to
construct an RF fingerprint of the area of interest. This fingerprint varies
with the used mobile device, changes of the transmit power of smart access
points (APs), and dynamic changes in the environment; requiring re-calibration
of the area of interest; which reduces the technology ease of use. In this
paper, we present IncVoronoi: a novel system that can provide zero-calibration
accurate RF-based indoor localization that works in realistic environments. The
basic idea is that the relative relation between the received signal strength
from two APs at a certain location reflects the relative distance from this
location to the respective APs. Building on this, IncVoronoi incrementally
reduces the user ambiguity region based on refining the Voronoi tessellation of
the area of interest. IncVoronoi also includes a number of modules to
efficiently run in realtime as well as to handle practical deployment issues
including the noisy wireless environment, obstacles in the environment,
heterogeneous devices hardware, and smart APs. We have deployed IncVoronoi on
different Android phones using the iBeacons technology in a university campus.
Evaluation of IncVoronoi with a side-by-side comparison with traditional
fingerprinting techniques shows that it can achieve a consistent median
accuracy of 2.8m under different scenarios with a low beacon density of one
beacon every 44m2. Compared to fingerprinting techniques, whose accuracy
degrades by at least 156%, this accuracy comes with no training overhead and is
robust to the different user devices, different transmit powers, and over
temporal changes in the environment. This highlights the promise of IncVoronoi
as a next generation indoor localization system.Comment: 9 pages, 13 figures, published in SECON 201
ReCon: Revealing and Controlling PII Leaks in Mobile Network Traffic
It is well known that apps running on mobile devices extensively track and
leak users' personally identifiable information (PII); however, these users
have little visibility into PII leaked through the network traffic generated by
their devices, and have poor control over how, when and where that traffic is
sent and handled by third parties. In this paper, we present the design,
implementation, and evaluation of ReCon: a cross-platform system that reveals
PII leaks and gives users control over them without requiring any special
privileges or custom OSes. ReCon leverages machine learning to reveal potential
PII leaks by inspecting network traffic, and provides a visualization tool to
empower users with the ability to control these leaks via blocking or
substitution of PII. We evaluate ReCon's effectiveness with measurements from
controlled experiments using leaks from the 100 most popular iOS, Android, and
Windows Phone apps, and via an IRB-approved user study with 92 participants. We
show that ReCon is accurate, efficient, and identifies a wider range of PII
than previous approaches.Comment: Please use MobiSys version when referencing this work:
http://dl.acm.org/citation.cfm?id=2906392. 18 pages, recon.meddle.mob
- …