Ad-Hoc Data Transfer for Android Devices
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Intel Threading Building Blocks
Praise for Intel Threading Building Blocks “The Age of Serial Computing is over. With the advent of multi-core processors, parallel- computing technology that was once relegated to universities and research labs is now emerging as mainstream. Intel Threading Building Blocks updates and greatly expands the ‘work-stealing’ technology pioneered by the MIT Cilk system of 15 years ago, providing a modern industrial-strength C++ library for concurrent programming. “Not only does this book offer an excellent introduction to the library, it furnishes novices and experts alike with a clear and accessible discussion of the complexities of concurrency.” — Charles E. Leiserson, MIT Computer Science and Artificial Intelligence Laboratory “We used to say make it right, then make it fast. We can’t do that anymore. TBB lets us design for correctness and speed up front for Maya. This book shows you how to extract the most benefit from using TBB in your code.” — Martin Watt, Senior Software Engineer, Autodesk “TBB promises to change how parallel programming is done in C++. This book will be extremely useful to any C++ programmer. With this book, James achieves two important goals: • Presents an excellent introduction to parallel programming, illustrating the most com- mon parallel programming patterns and the forces governing their use. • Documents the Threading Building Blocks C++ library—a library that provides generic algorithms for these patterns. “TBB incorporates many of the best ideas that researchers in object-oriented parallel computing developed in the last two decades.” — Marc Snir, Head of the Computer Science Department, University of Illinois at Urbana-Champaign “This book was my first introduction to Intel Threading Building Blocks. -
Overview in May of 2011, the United Nations Declared Internet Access a Basic Human Right
Overview In May of 2011, the United Nations declared internet access a basic human right. While we have made great strides, 53% of the global population still lacks access [1]. This is an amazing proliferation, up from the 1% of the population that had connectivity back in 1995, but there are still 4 billion unconnected people. While 75% of people aged 15-24 have access to the internet [1], there are huge disparities in access. Regions with highest offline population are Africa (75%), the Arab States (58%) and Asia-Pacific (58%). The exclusion rate in those regions is worse for the female, rural, poor, illiterate and elderly populations [2]. Several reasons determine the absence of the service, but the largest challenge on the supply side is the infrastructure required. On the demand side digital literacy, the gender gap and affordability remain significant hurdles. In this article, we explore diverse trends, projects, technologies and initiatives with focus on expanding and enabling access with a cost-effective approach. What is Broadband? The first thing we need to discuss is the definition of internet access. What services and speeds constitute access? Much of the recent increase in access in lower and middle income countries, hereafter LMICs, is due to the rapid adoption of mobile phones. Network access is continuing to expand as well as costs for both the mobile hardware and data plans are continuing to drop. This has led to a 30-50% growth rate in mobile broadband subscriptions in LMICs over the last five years [1]. In 2015, the Pew Research Center found that smartphone ownership in LMICs had reached 37% [3]. -
Secure Device-To-Device Communication for Emergency Response, Dissertation, Technische Universität Darmstadt, 2020
SECUREDEVICE-TO-DEVICECOMMUNICATIONFOR EMERGENCYRESPONSE Vom Fachbereich Informatik der Technische Universität Darmstadt genehmigte dissertation zur Erlangung des akademischen Grades Doktor-Ingenieurin (Dr.-Ing.) von flor maría álvarez zurita, m. sc. Erstreferent: Prof. Dr.-Ing. Matthias Hollick Korreferent: Prof. Dr. Andreas Mauthe Darmstadt 2020 Hochschulkennziffer D17 Flor María Álvarez Zurita, Secure Device-to-Device Communication for Emergency Response, Dissertation, Technische Universität Darmstadt, 2020. Fachgebiet Sichere Mobile Netze Fachbereich Informatik Technische Universität Darmstadt Jahr der Veröffentlichung: 2020 Tag der mündlichen Prüfung: 21. Februar 2020 URN: urn:nbn:de:tuda-tuprints-114864 Veröffentlicht unter CC BY-SA 4.0 International (Namensnennung - Weitergabe unter gleichen Bedingungen) https://creativecommons.org/licenses/by-sa/4.0/deed.de Licensed under CC BY-SA 4.0 International (Attribution - ShareAlike) https://creativecommons.org/licenses/by-sa/4.0/deed.en “It is impossible to live without failing at something. Unless you live so cautiously that you might as well not have lived at all, in which case, you fail by default.” – J.K. Rowling. Dedicated to the loving memory of my parents. Although they are no longer in this world, I still feel their presence in every step I follow. I also want to dedicate this work to my family and friends in Ecuador. The distance and time have not diminished the love and appreciation I have for all of you. Especialmente dedicado a Jonilu y Tobi. ABSTRACT Mobile devices have the potential to make a significant impact during disasters. However, their practical impact is severely limited by the loss of access to mobile communication infrastructure: Precisely, when there is a surge in demand for communications from people in a disaster zone, this capacity for communications is severely curtailed. -
Native Implementation of Mutable Value Semantics ICOOOLPS ’21, July 13, 2021, Online
Native Implementation of Mutable Value Semantics Dimitri Racordon Denys Shabalin Daniel Zheng [email protected] [email protected] [email protected] Faculty of Science Google Google University of Geneva Switzerland United States Switzerland Dave Abrahams Brennan Saeta [email protected] [email protected] Google Google United States United States ABSTRACT 1 INTRODUCTION Unrestricted mutation of shared state is a source of many well- Software development continuously grows in complexity, as ap- known problems. The predominant safe solutions are pure func- plications get larger and hardware more sophisticated. One well- tional programming, which bans mutation outright, and flow sen- established principle to tackle this challenge is local reasoning, de- sitive type systems, which depend on sophisticated typing rules. scrbibed by O’Hearn et al. [4] as follows: Mutable value semantics is a third approach that bans sharing in- To understand how a program works, it should be pos- stead of mutation, thereby supporting part-wise in-place mutation sible for reasoning and specification to be confined to and local reasoning, while maintaining a simple type system. In the cells that the program actually accesses. The value the purest form of mutable value semantics, references are second- of any other cell will automatically remain unchanged. class: they are only created implicitly, at function boundaries, and cannot be stored in variables or object fields. Hence, variables can There are two common ways to uphold local reasoning. One never share mutable state. takes inspiration from pure functional languages and immutability. Because references are often regarded as an indispensable tool Unfortunately, this paradigm may fail to capture the programmer’s to write efficient programs, it is legitimate to wonder whether such mental model, or prove ill-suited to express and optimize some al- a discipline can compete other approaches. -
Experimentation with Manets of Smartphones
Experimentation with MANETs of Smartphones Eduardo Soares∗, Pedro Brandão∗, Rui Prior∗, Ana Aguiary ∗Instituto de Telecomunicações and Faculdade de Ciências da Universidade do Porto {esoares, pbrandao, rprior}@dcc.fc.up.pt yInstituto de Telecomunicações and Faculdade de Engenharia da Universidade do Porto [email protected] Abstract—Mobile AdHoc NETworks (MANETs) have been Application Programming Interfaces (APIs). IP-level multi-hop identified as a key emerging technology for scenarios in which networking makes the difference in scenarios where latency IEEE 802.11 or cellular communications are either infeasible, is critical, and where communication with other IP enabled inefficient, or cost-ineffective. Smartphones are the most adequate devices like laptops or PCs is wanted. Moreover, it is completely network nodes in many of these scenarios, but it is not straight- transparent to applications, which just use the sockets API. forward to build a network with them. We extensively survey existing possibilities to build applications on top of ad-hoc smart- In this paper, we review work on MANETs of smartphones, phone networks for experimentation purposes, and introduce a and proceed to extensively survey solutions that claim to taxonomy to classify them. We present AdHocDroid, an Android provide ad-hoc connectivity for smartphones (section II) We package that creates an IP-level MANET of (rooted) Android then introduce AdHocDroid to turn smartphones into nodes smartphones, and make it publicly available to the community. AdHocDroid supports standard TCP/IP applications, providing of an IP-level mobile ad-hoc network. A MANET of Android real smartphone IEEE 802.11 MANET and the capability to smartphones enables simplified instantiation of a test-bed for easily change the routing protocol. -
Mesh Networking: in Disaster Situations, Real Apps Can Do What Zello Cannot Do
Mesh Networking: In Disaster Situations, Real Apps Can Do What Zello Cannot Do Virally widespread misinformation claims that Zello is an app that can be installed on smart phones and tablets as backup in case the cellular network goes down in a natural disaster such as a hurricane, but this is emphatically false. While Zello is a very useful app – I’ve been a fan for years – it depends upon internet connectivity – snopes.com/zello-work-without-internet – obtained either from the cellular network or a WiFi access point and therefore is not the first-choice for disaster communication. To their credit, the makers of Zello have tried to dispel the wrong information circulated by others about their product. There are, however, real apps that provide “mesh networking” – en.wikipedia.org/wiki/Mesh_networking – that can do precisely what Zello cannot: create peer-to-peer ad hoc networks using Bluetooth or WiFi that are independent of any central server. Of these, the Serval Project – en.wikipedia.org/wiki/Serval_Project – is the most ambitious, seeking to form a mesh network as an extension of existing networks. There is an Android app – play.google.com/store/apps/details?id=org.servalproject&hl=en – also linked – servalproject.org – from the project website. It has modules that allow connecting to discontiguous mesh networks, such as the HSMM system – hsmm-mesh.org – that is explicitly designed for amateur (ham) radio to be used in natural disasters, which otherwise would not be available to the general public. Serval is funded by the non-profit Shuttleworth Foundation associated with Mark Shuttleworth, the man behind Ubuntu Linux. -
Mesh Messaging in Large-Scale Protests: Breaking Bridgefy (Abridged∗ Version)
Mesh Messaging in Large-scale Protests: Breaking Bridgefy (Abridged∗ version) Martin R. Albrecht Jorge Blasco Royal Holloway, University of London Royal Holloway, University of London [email protected] [email protected] Rikke Bjerg Jensen Lenka Marekova Royal Holloway, University of London Royal Holloway, University of London [email protected] [email protected] Abstract 3685%” [55] in reference to an increase in downloads of a mesh messaging application, Bridgefy [30], in Hong Kong. Mesh messaging applications allow users in relative prox- Bridgefy is both an application and a platform for developers imity to communicate without the Internet. The most viable to create their own mesh network applications.1 It uses BLE or offering in this space, Bridgefy, has recently seen increased Bluetooth Classic and is designed for use cases such as “music uptake in areas experiencing large-scale protests (Hong Kong, festivals, sports stadiums, rural communities, natural disasters, India, Iran, US, Zimbabwe, Belarus, Thailand), suggesting traveling abroad”, as given by its Google Play store descrip- its use in these protests. It is also being promoted as a com- tion [31]. Other use cases mentioned on its webpage are ad munication tool for use in such situations by its developers distribution (including “before/during/after natural disasters” and others. In this work, we perform a security analysis of to “capitalize on those markets before anybody else” [30]) Bridgefy. Our results show that Bridgefy permits its users to and turn-based games. The Bridgefy application has crossed be tracked, offers no authenticity, no effective confidentiality 1.7 million downloads as of August 2020 [67]. -
Static Analysis of Unbounded Structures in Object-Oriented Programs Issue Date: 2012-12-19 Static Analysis of Unbounded Structures in Object-Oriented Programs
Cover Page The handle http://hdl.handle.net/1887/20325 holds various files of this Leiden University dissertation. Author: Grabe, Immo Title: Static analysis of unbounded structures in object-oriented programs Issue Date: 2012-12-19 Static Analysis of Unbounded Structures in Object-Oriented Programs Proefschrift ter verkrijging van de graad van Doctor aan de Universiteit Leiden op gezag van Rector Magnificus prof. mr. P.F. van der Heijden, volgens besluit van het College voor Promoties te verdedigen op woensdag 19 december 2012 klokke 10:00 uur door Immo Grabe geboren te Kiel, Duitsland, in 1979 Promotiecommissie Promotoren: Prof. Dr. F.S. de Boer Universiteit Leiden Prof. Dr. M. Steffen Universitetet i Oslo Overige Leden: Prof. Dr. E. Broch Johnsen Universitetet i Oslo Prof. Dr. F. Arbab Universiteit Leiden Prof. Dr. J.N. Kok Universiteit Leiden Dr. M. Bonsangue Universiteit Leiden The work in this thesis has been carried out at the Christian-Albrechts- -Universit¨at zu Kiel, the Centrum Wiskunde & Informatica (CWI), and the Universiteit Leiden. The research was partially funded by the EU-project IST- 33826 Credo: Modeling and analysis of evolutionary structures for distributed services, the EU-project FP7-231620 HATS: Highly Adaptable and Trustwor- thy Software using Formal Methods, and the German-Norwegian DAAD-NWO exchange project Avabi (Automated validation for behavioral interfaces of asynchronous active objects). Copyright c 2012 by Immo Grabe Cover design by Immo Grabe. Printed by: Proefschriftmaken.nl || Uitgeverij BOXPress Published by: Uitgeverij BOXPress, Oisterwijk ISBN: 978-90-8891-154-75 Contents 1 Introduction 1 I Object Creation 5 2 Abstract Object Creation 7 2.1 Introduction............................ -
Braceforce: a Middleware to Enable Sensing Integration in Mobile Applications for Novice Programmers
BraceForce: A Middleware to Enable Sensing Integration in Mobile Applications for Novice Programmers Xi Zheng, Dewayne E. Perry, Christine Julien The Center for Advanced Research in Software Engineering Mobile and Pervasive Computing Lab The University of Texas at Austin [email protected],[email protected],[email protected] ABSTRACT demonstrating the feasibility of applications, the develop- Even as the use of sensor networks to support mobile ap- ment of support services such as routing protocols or energy- plications grows, our ability to seamlessly and efficiently in- saving algorithms, or on advancement of hardware platforms corporate sensor network capabilities into our mobile ap- and operating systems. Little focus has been applied to ef- plications remains astoundingly difficult. Today, accessing fective development support for applications that integrate remote sensing data and integrating this data into the adap- the capabilities of networked sensing platforms in easy to use tive behavior of a dynamic user-facing mobile application re- and extensible ways. In addition to the variety of data for- quires interacting with multiple platforms, languages, data mats, communication technologies, and programming plat- formats, and communication paradigms. We present Brace- forms a developer must tackle, mobile applications also re- Force, an open and extensible middleware that allows de- quire handling network dynamics and energy constraints. velopers to access the myriad remote sensing capabilities This paper introduces BraceForce, a middleware for mo- inherent to today's mobile computing spaces (where mo- bile application development that simplifies the development, bile devices and sensors are closely integrated) using very deployment, and debugging of mobile applications. -
A Middleware Enabling Novice Programmers to Integrate Sensing in CPS Applications
BraceForce: A Middleware Enabling Novice Programmers to Integrate Sensing in CPS Applications Xi Zheng, Dewayne E. Perry, Christine Julien ([email protected], [email protected], [email protected]) The Center for Advanced Research in Software Engineering Mobile and Pervasive Computing Lab, Electrical and Computer Engineering The University of Texas at Austin TR-ARiSE-2013-003 © Copyright 2013 The University of Texas at Austin BraceForce: A Middleware Enabling Novice Programmers to Integrate Sensing in CPS Applications Xi Zheng, Dewayne E. Perry, Christine Julien The Center for Advanced Research in Software Engineering Mobile and Pervasive Computing Lab The University of Texas at Austin [email protected],[email protected],[email protected] ABSTRACT forms with little potential for portability to other plat- Even as the use of sensor networks to support CPS forms or integration with other sensors. Debugging CPS applications grows, our ability to seamlessly and effi- applications that inherently integrate with a physical ciently incorporate sensor network capabilities remains environment requires not only the aforementioned in- astoundingly difficult. Today, accessing remote sensing tegration of the application with sensing but also the data and integrating this data into the adaptive behav- use of a testing harness that, at debugging time, ac- ior of a dynamic user-facing CPS application requires in- cesses sensed data about the physical environment for teracting with multiple sensor platform languages, data the purposes of validating the actions of the applica- formats, and communication channels and paradigms. tion. Integrating sensing for application and debugging We present BraceForce, an open and extensible middle- support in a way that is easy, flexible, and portable is ware that allows developers to access the myriad remote essential for supporting CPS application development. -
Distributed Sensor Logging: As Easy As a Mesh of Yoyos*
Int. J. Communications, Network and System Sciences, 2013, 6, 309-315 http://dx.doi.org/10.4236/ijcns.2013.66033 Published Online June 2013 (http://www.scirp.org/journal/ijcns) Distributed Sensor Logging: As Easy as a Mesh of Yoyos* Corey Wallis1, Alison Hutton2, Steve Brown1,3, Romana Challans1, Paul Gardner-Stephen1 1School of Computer Science, Engineering and Mathematics, Flinders University, Adelaide, Australia 2School of Nursing and Midwifery, Flinders University, Adelaide, Australia 3Tourism Department, School of Humanities, Flinders University, Adelaide, Australia Email: [email protected], [email protected], [email protected], [email protected], [email protected] Received April 16, 2013; revised May 20, 2013; accepted June 14, 2013 Copyright © 2013 Corey Wallis et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. ABSTRACT The Mass Gathering Data Acquisition and Analysis (MaGDAA) project involved the development of hardware and software solutions to facilitate the rapid and effective collection of autonomous and survey based data during mass gathering events. The aim of the project was the development and trial of a purpose-built Open Hardware based envi- ronment monitoring sensor prototypes using IOIO (pronounced “yoyo”) boards. Data from these sensors, and other de- vices, was collected using Open Source software running on Android powered mobile phones, tablets and other open hardware based platforms. Data was shared using a Wi-Fi mesh network based on an Open Source project called The Serval Project. -
Learning Object-Oriented Programming, Design and TDD with Pharo
Learning Object-Oriented Programming, Design and TDD with Pharo Stéphane Ducasse with Damien Pollet September 29, 2017 master @ 86ac50a © 2017 by Stéphane Ducasse with Damien Pollet. This work is licensed under a Creative Commons “Attribution- NonCommercial-NoDerivatives 4.0 International” license. This is a human-readable summary of (and not a substitute for) the license: https://creativecommons.org/licenses/by-nc-nd/4.0/deed.en You are free to: s Share Copy and redistribute the material in any medium or format. The licensor cannot revoke these freedoms as long as you follow the license terms. Under the following terms: b Attribution You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. n NonCommercial You may not use the material for commercial purposes. d NoDerivatives If you remix, transform, or build upon the material, you may not distribute the modified material. No additional restrictions You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits. Layout and typography based on the sbabook LATEX class by Damien Pollet. Contents Illustrations viii 1 About this book 1 1.1 A word of presentation ............................ 1 1.2 Structure of the book ............................. 1 1.3 What you will learn .............................. 3 1.4 Typographic conventions ........................... 4 1.5 Videos ..................................... 5 1.6 Thanks ..................................... 5 I Getting in touch with Pharo 2 Pharo syntax in a nutshell 9 2.1 Simplicity and elegance of messages ....................