Pervasive Computing Revisited

Total Page:16

File Type:pdf, Size:1020Kb

Pervasive Computing Revisited GUEST EDITORS’ INTRODUCTION Pervasive Computing Revisited n 2001, Mahadev Satyanarayanan Bahl, Gaetano Borriello, Nigel Davies, Hans (Satya) published a paper, “Pervasive Gellersen, Jason Hong, Liviu Iftode, Anupam Computing: Vision and Challenges,” Joshi, David Kotz, James Landay, Marc Lang- in IEEE Personal Communications.1 heinrich, Dejan Milojicic, and Dan Siewiorek. This was the first paper to substantively It has also inspired at least nine papers with Iexplore the implications of Mark Weiser’s 1991 more than 500 citations each (see the “Inspiring vision for a real-world systems infrastructure.2 Others: Related Work” sidebar). It provided the conceptual foundations for what Looking back at the vision Satya outlined much of the computing indus- and comparing it to today’s reality, we see that try now calls the Internet of our community has made progress, but we still Maria R. Ebling Things (IoT). It also developed have a long way to go. For example, in two sce- IBM T.J. Watson Research Center a taxonomy showing the deep narios he outlines, we can see aspects of every- Roy Want relationships between distrib- day pervasive computing—we use cloud storage Google uted systems, mobile comput- services that automatically sync our electronic ing, and pervasive computing documents between devices, and we identify (IoT). You might not realize which documents to maintain on each of our it, but the paper also inspired devices. But many aspects of his scenarios are the creation of our own publication, IEEE Per- more distant. For example, my smartphone has vasive Computing, with Satya serving as the never told me to move to a different area to get founding Editor in Chief. better network service. Last year, the IEEE Pervasive Computing A Look Back editorial board decided that after slightly more Satya’s paper has earned almost 3,000 cita- than 15 years, this would be a good time to look tions and has inspired many well-known au- back at Satya’s vision, review the challenges thors whose names are synonymous with the he laid out for our community, and evaluate pervasive computing field, including Victor what has been achieved in making the vision a Published by the IEEE CS n 1536-1268/17/$33.00 © 2017 IEEE PERVASIVE computing 17 GUEST EDITORS’ INTRODUCTION Inspiring Others: Related Work he following important works were all inspired by Satya’s • J.I. Hong and J.A. Landay, “An Architecture for Privacy- T 2001 paper, “Pervasive Computing: Vision and Sensitive Ubiquitous Computing,” Proc. 2nd Int’l Conf. Mobile Challenges,” in IEEE Personal Communication: Systems, Applications, and Services (MobiSys), 2004, pp. 177– 189; http://dl.acm.org/citation.cfm?id5990 087. • D.S. Milojicic et al., Peer-to-Peer Computing, tech. report • D. Cook and S.K. Das, Smart Environments: Technology, Proto- HPL-2002-57 (R.1), HP Labs, 2002; www.hpl.hp.com/techre- cols and Applications, John Wiley & Sons, 2004. ports/2002/HPL-2002-57R1.pdf. • L. Kagal, T. Finin, and A. Joshi, “A Policy Language for a Per- • D. Garlan et al., “Project Aura: Toward Distraction-Free vasive Computing Environment,” Proc. IEEE 4th Int’l Workshop Pervasive Computing,” IEEE Pervasive Computing, vol. 1, no. Policies for Distributed Systems and Networks, 2003; http:// 2, 2002, pp. 22–31; http://ieeexplore.ieee.org/abstract/ ieeexplore.ieee.org/abstract/document/1206958/. document/1012334. • D.J. Cook and S.K. Das, “How Smart Are Our Environments? • D. Saha and A. Mukherjee, “Pervasive Computing: A Paradigm An Updated Look at the State of the Art,” Pervasive and Mo- for the 21st Century,” Computer, vol. 36, no. 3, 2003, pp. 25–31; bile Computing, vol. 3, no. 2, 2007; https://doi.org/10.1016/j. http://ieeexplore.ieee.org/abstract/document/1185214. pmcj.2006.12.001 • M. Pantic and L.J.M. Rothkrantz, “Toward an Affect-Sensitive • E. Aarts, J. Korst, and W.F.J. Verhaegh, “Algorithms Multimodal Human-Computer Interaction,” Proc. IEEE, vol. in Ambient Intelligence,” Phillips Research Book Se- 91, no. 9, 2003, pp. 1370–1390; http://ieeexplore.ieee.org/ ries, vol. 2, Springer, 2004; https://link.springer.com/ abstract/document/1230215. chapter/10.1007/978-94-017-0703-9_1. reality. This special issue is a retrospec- how cyber-foraging systems might In this article, he categorizes pervasive tive on that vision. reach mainstream deployment. devices into three tiers: the top tier (tab- In “Powering Pervasive Comput- lets, smartphones, and so on), middle In This Issue ing Systems,” Shwetak Patel and tier (TVs, refrigerators, thermostats, We open with an interview with Satya Joshua Smith examine the progress and so on), and bottom tier (including in which he looks back at the challenges made in power delivery and manage- RFID tags; sensors; and heating, ven- he identified in 2001, noting what he ment over the past 15 years, discuss- tilation, and air conditioning systems). missed and highlighting what has been ing today’s trends in advancing this He then describes six types of privacy more difficult than expected. The inter- important area. They examine power- concerns: the ease with which people view touches on privacy, smart spaces, harvesting approaches as well as power are aware of what is being sensed, the and user distraction and intent. It also transfer through both near-field and time scope of the sensing, the number explores the relationship between per- far-field mechanisms. They also point of input and output capabilities the vasive computing and both IoT and out the need to architect pervasive sensing technology can use to interact cloud computing. We think you will computing systems that recognize and with users, the amount of software find Satya’s observations insightful. embrace the power limitations of dif- that can run on the device, the exis- One of the key ideas identified in Satya’s ferent technologies while minimizing tence of third-party software that can seminal paper is cyber foraging—he the need for power at the most energy- be installed and can run on the device, argued that future mobile devices constrained layers of the system. They and the amount of support manufac- would have to acquire the resources also point out that we have biological turers provide in terms of fixing bugs they need from the environment examples of systems that are millions and upgrading software. Hong then around them. In “Cyber Foraging: of times more energy efficient than cur- considers each of these dimensions Fifteen Years Later,” Rajesh Krishna rent technologies, so they’re optimistic across each device tier, giving readers Balan and Jason Flinn examine the about the outlook for continued ad- a good sense of the range of concerns progress that has been made in this vances in energy efficiency. that must be considered when build- area. In particular, they discuss seam- Jason Hong shares his thoughts ing a new device or installing a device less cyber foraging and look at what about privacy in pervasive computing in a home. technical challenges remain, how those systems in his article, “The Privacy Finally, in “Pervasive Data Science,” gaps hamper adoption, and when and Landscape of Pervasive Computing.” Nigel Davies and Sarah Clinch make 18 PERVASIVE computing www.computer.org/pervasive the AUTHORS the case that the intersection between Maria R. Ebling is a director at the IBM T.J. Watson Research Center. Her pervasive computing and data science research interests include pervasive computing, context-aware computing, entails some unique challenges that must mobile computing, distributed systems, privacy, and human-computer inter- action. Ebling received her PhD in computer science from Carnegie Mellon be addressed. Examples of applications University. Contact her at [email protected]. at this intersection, which they discuss, include augmented cognition to improve human abilities, autonomous vehicles to transform our transportation infra- Roy Want is a research scientist at Google. His research interests include mo- structure, and smart spaces to improve bile and ubiquitous computing. Want received his PhD from Cambridge Uni- our physical environment. They out- versity. He is an ACM and IEEE Fellow. Contact him at [email protected]. line five challenges specific to pervasive data and cover the entire data pipeline. These challenges, like those of pervasive computing more broadly, will require an interdisciplinary approach. The article walks readers through two use cases demonstrating the end-to-end challenges technologies converge with research REFERENCES of pervasive data science. Ultimately, progress on the many fundamental Davies and Clinch argue that pervasive problems discussed in this paper,” was 1. M. Satyanarayanan, “Pervasive Com- puting: Vision and Challenges,” IEEE data science will transform our ability to most certainly true. We are well into Personal Comm., vol. 8, no. 4, 2001, pp. achieve the goals of ubiquitous comput- the second decade of the 21st century, 10 –17. ing outlined by Weiser. Readers looking and we continue to see many research 2. M. Weiser, “The Computer for the 21st Cen- for a thesis topic should find the chal- initiatives designed to solve the chal- tury,” Scientific Am., Sept. 1991, pp. 66–75. lenges presented in this paper inspiring. lenges that Satya laid out for us in this one, short article. It’s always amazing to atya’s prediction that the “early see how Satya can keep so many people Read your subscriptions decades of the 21st century busy solving difficult and meaty prob- through the myCS will be a period of excitement lems, but he seems to do it again and publications portal at http://mycs.computer.org. S and ferment, as new hardware again! Call for Articles IEEE Pervasive Computing seeks accessible, useful papers on the latest peer-reviewed developments in pervasive, mobile, and ubiquitous computing. Topics include hardware technology, software infrastructure, real-world sensing and Author guidelines: interaction, human-computer interaction, www.computer.org/mc/ and systems considerations, including pervasive/author.htm deployment, scalability, security, and privacy.
Recommended publications
  • Building Blocks for Tomorrow's Mobile App Store
    Building Blocks for Tomorrow’s Mobile App Store by Justin G. Manweiler Department of Computer Science Duke University Date: Approved: Romit Roy Choudhury, Supervisor Jeffrey S. Chase Landon P. Cox Victor Bahl Dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of Duke University 2012 Abstract (0984) Building Blocks for Tomorrow’s Mobile App Store by Justin G. Manweiler Department of Computer Science Duke University Date: Approved: Romit Roy Choudhury, Supervisor Jeffrey S. Chase Landon P. Cox Victor Bahl An abstract of a dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of Duke University 2012 Copyright c 2012 by Justin G. Manweiler All rights reserved Abstract In our homes and in the enterprise, in our leisure and in our professions, mobile computing is no longer merely “exciting;” it is becoming an essential, ubiquitous tool of the modern world. New and innovative mobile applications continue to inform, entertain, and surprise users. But, to make the daily use of mobile technologies more gratifying and worthwhile, we must move forward with new levels of sophistication. The Mobile App Stores of the future must be built on stronger foundations. This dissertation considers a broad view of the challenges and intuitions behind a diverse selection of such new primitives. Some of these primitives will mitigate exist- ing and fundamental challenges of mobile computing, especially relating to wireless communication. Others will take an application-driven approach, being designed to serve a novel purpose, and be adapted to the unique and varied challenges from their disparate domains.
    [Show full text]
  • Toward Building a Safe, Secure, and Easy-To-Use Internet of Things
    IOT CONNECTION Toward Building a Safe, Secure, and Easy-to-Use Sal glances at the display near her office door and sees that her next meeting is in 10 Internet of Things minutes. One participant is out of town and the other two people are running late, but the meeting room is still occupied Infrastructure by several people. The display also suggests it might be a Yuvraj Agarwal and Anind K. Dey, Carnegie Mellon University good time to get coffee because the lines are short at the cafe downstairs. Her good friend Joe Carnegie Mellon University is leading a happens to be at the cafe, too. multi-institutional effort to build an open Sal checks an app she recently built and sees that the coffee is infrastructure to support the Internet of Things. freshly brewed. “That simplifies things,” she thinks to herself as she heads toward the cafe. safe and secure world enabled by the Inter- This is the unique promise of a successful IoT, and is net of Things (IoT) promises to lead to truly what we are aiming for with GIoTTO, the IoT program connected environments, where people and at Carnegie Mellon University (CMU) named after the things collaborate to improve the overall famous Renaissance painter. qualityA of life. The IoT will give us actionable informa- tion at our fingertips, without us having to ask for it or NEED FOR AN OPEN INFRASTRUCTURE even recognizing that it might be needed. Consider this Although numerous commercial and academic programs example that combines many simple uses of the IoT to cu- focus on building IoT systems, it’s clear that for any IoT mulatively form an omnipotent assistant: stack to be widely adopted, it must be open—without a 40 COMPUTER PUBLISHED BY THE IEEE COMPUTER SOCIETY 0018-9162/16/$33.00 © 2016 IEEE EDITOR ROY WANT Google; [email protected] singular organization claiming own- ership.
    [Show full text]
  • Passing the Torch
    From the Editor in Chief Editor in Chief: M. Satyanarayanan ■ Carnegie Mellon University ■ [email protected] Passing the Torch M. Satyanarayanan his issue marks the end of my sec- a highly portable information appliance LOOKING BACK, T ond two-year term as editor in that transforms nearby displays and LOOKING FORWARD chief. I am delighted to introduce my input devices into a transient personal- In August 2001, 10 years after the successor, Roy Want of Intel Research, computing environment. Roy has pub- publication of Mark Weiser’s seminal who will begin his term on 1 January lished extensively over his research career paper introducing the concept of ubiq- 2006. I will continue to serve as active and has over 50 patents to his credit. uitous computing,1 I summarized the editor in chief until that time and will It is hard to imagine a person more field’s progress and reflected on the work closely with Roy to ensure a qualified than Roy to be the next editor challenges ahead in a paper entitled smooth and efficient transition. My in chief of IEEE Pervasive Computing. “Pervasive Computing: Vision and involvement with this publication will In 2001, he was part of the founding edi- Challenges.”2 Looking back, it is grat- continue even after I step down, as I will torial board that created this publication ifying to see how much progress has remain on the editorial board. occurred in just four short years. Many forces have converged to make IN GOOD HANDS It is hard to this progress possible, one of which was Roy received his PhD from Cambridge imagine a substantial industry investment in prod- University in 1988, under the supervision person more uct development relevant to mobile and of Roger Needham.
    [Show full text]
  • Curriculum Vitae: Roy Want
    Curriculum Vitae: Roy Want E-mail: roywant AT google.com ; roywant AT acm.org Google Inc, Mail-Stop: US-MTV-B43 1600 Amphitheatre Parkway Mountain View, CA 94043, USA Office/Cell: (650) 691 3600 Date: January, 2019 Up-to-date CV: http://www.roywant.com/cv/vita.htm Research Interests Mobile & ubiquitous computing, location & context-aware systems, electronic tagging(RFID/NFC/BLE), hardware design, electronic commerce, smart cards, distributed systems, multimedia systems, cellular automata, novel UI, and MEMS. Professional ACM Fellow: 2005, and ACM (Association of Computer Machinery) member since 1996. IEEE Fellow: 2005 and IEEE (Institute for Electrical and Electronic Engineers) member since 1991. Lillian Gilbreth lectureship, National Academy of Engineering (NAE), Washington DC, Oct 12th, 2003 Education Ph.D. Cambridge University UK, Churchill College, Computer Science, Advisor: Roger Needham, 1983-88 o Thesis title: "Reliable Management of Voice in a Distributed System" BA hons. Cambridge University UK, Churchill College, Nat. Science/Computer Science, Tutor: Frank King, 1980-83 o Dissertation title: “A Local Area Network (LAN) Based on the Domestic Mains Supply” High School: William Ellis Grammar School, London UK, 1972-79 Experience Google Inc. (2011-present) o Senior Research Scientist: Google Research and Android Location & Context Team Intel Corporation (2001-2011) o Senior Principal Engineer (SPE) 2008-2011 -Assoc. Director: ILSC (2009-10) & Director (NPL) 2010-11 o Principal Engineer (PE) 2000-2007 Xerox - Palo Alto Research Center (PARC). Computer Science Laboratory (CSL). 1991 - 2001 (reporting to Mark Weiser, Laboratory Manager for CSL; CTO) o Principal Scientist 2000-2001 o Area Manager for Embedded Systems Area 1992-1999 o Member of Research Staff II 1991-1992.
    [Show full text]
  • Annual Report
    ANNUAL REPORT 2019FISCAL YEAR ACM, the Association for Computing Machinery, is an international scientific and educational organization dedicated to advancing the arts, sciences, and applications of information technology. Letter from the President It’s been quite an eventful year and challenges posed by evolving technology. for ACM. While this annual Education has always been at the foundation of exercise allows us a moment ACM, as reflected in two recent curriculum efforts. First, “ACM’s mission to celebrate some of the many the ACM Task Force on Data Science issued “Comput- hinges on successes and achievements ing Competencies for Undergraduate Data Science Cur- creating a the Association has realized ricula.” The guidelines lay out the computing-specific over the past year, it is also an competencies that should be included when other community that opportunity to focus on new academic departments offer programs in data science encompasses and innovative ways to ensure at the undergraduate level. Second, building on the all who work in ACM remains a vibrant global success of our recent guidelines for 4-year cybersecu- the computing resource for the computing community. rity curricula, the ACM Committee for Computing Edu- ACM’s mission hinges on creating a community cation in Community Colleges created a related cur- and technology that encompasses all who work in the computing and riculum targeted at two-year programs, “Cybersecurity arena” technology arena. This year, ACM established a new Di- Curricular Guidance for Associate-Degree Programs.” versity and Inclusion Council to identify ways to create The following pages offer a sampling of the many environments that are welcoming to new perspectives ACM events and accomplishments that occurred over and will attract an even broader membership from the past fiscal year, none of which would have been around the world.
    [Show full text]
  • SOUL: an Edge-Cloud System for Mobile Applications in a Sensor-Rich World
    2016 IEEE/ACM Symposium on Edge Computing SOUL: An Edge-cloud System for Mobile Applications in a Sensor-rich World Minsung Jang∗, HyunJong Lee†, Karsten Schwan‡, Ketan Bhardwaj‡ ∗AT&T Labs - Research, [email protected] †University of Michigan, [email protected] ‡Georgia Institute of Technology, {karsten, ketanbj}@gatech.edu Abstract—With the Internet of Things, sensors are becoming In order for such apps to efficiently interact with and ever more ubiquitous, but interacting with them continues manage the dynamic sets of currently accessible sensors with to present numerous challenges, particularly for applications the associated actuators and software services, SOUL (Sensors running on resource-constrained devices like smartphones. The Of Ubiquitous Life) SOUL abstractions in this paper address two issues faced • by such applications: (1) access to sensors with the levels of externalizes sensor & actuator interactions and process- convenience needed for their ubiquitous, dynamic use, and only ing from the resource-constrained device to edge- and by parties authorized to do so, and (2) scalability in sensor remote-cloud resources, to leverage their computational and access, given today’s multitude of sensors. Toward this end, storage abilities for running the complex sensor processing SOUL, first, introduces a new abstraction for the applications to functionality; transparently and uniformly access both on-device and ambient • sensors with associated actuators. Second, potentially expensive automates reconfiguration of these interactions when sensor-related processing needs not just occur on smartphones, better-matched sensors and actuators become physically but can also leverage edge- and remote-cloud resources. Finally, available; SOUL provides access control methods that permit users to easily • supports existing sensor-based applications allowing define access permissions for sensors, which leverages users’ social ties and captures the context in which access requests them to use SOUL’s capabilities without requiring modi- are made.
    [Show full text]
  • Getmobile MOBILE COMPUTING & COMMUNICATIONS REVIEW
    GetMobile MOBILE COMPUTING & COMMUNICATIONS REVIEW Volume 21, Issue 2 • June 2017 CONTENTS 3 Message from the Editor-in-Chief 16 22 (ALMOST) UNPUBLISHABLE HIGHLIGHTS 5 RESULTS 22 EmotionCheck: A Wearable Device 16 Experiences Deploying an to Regulate Anxiety through False EXPERIMENTAL METHODS Always-On Farm Network Heart Rate Feedback 5 How Do You Know If 85% Accuracy Is Good Enough for Your Application? 26 9 31 26 HemaApp: Noninvasive Blood Screening of Hemoglobin Using Smartphone Cameras MOBILE PLATFORMS 9 Beyond Reality: Head-Mounted 31 Who Are the Smartphone Users? Displays for Mobile Systems Identifying User Groups with Researchers Apps Usage Behaviors 35 Interpretable Machine Learning for Mobile Notification Management: An Overview of PrefMiner 35 2 GetMobile June 2017 | Volume 21, Issue 2 MESSAGE FROM THE EDITOR-IN-CHIEF CONTRIBUTORS EDITOR-IN-CHIEF IN THIS ISSUE, we highlight four papers Eyal de Lara, University of Toronto from ACM UbiComp 2016. MANAGING EDITOR Donna Paris “EmotionCheck: A Wearable Device DESIGNER JoAnn McHardy to Regulate Anxiety through False Heart SENIOR ADVISORS (Past Editors-in-Chief) Rate Feedback,” by Jean Costa, Alexander Paramvir Bahl, Microsoft Research T. Adams, Malte F. Jung, François Suman Banerjee, University of Wisconsin, Madison Guimbretière, and Tanzeem Choudhury, Srikanth Krishnamurthy, University of California, Riverside describes a device that generates subtle Jason Redi, BBN Technologies vibrations on the wrist to resemble a pulse, Mani Srivastava, University of California, Los Angeles which helps users regulate their anxiety Eyal de Lara Nitin Vaidya, University of Illinois, Urbana-Champaign through false feedback of a slow heart rate. SECTION EDITORS In “HemaApp: Noninvasive Blood Screening of Hemoglobin Ardalan Amiri Sami, University of California, Irvine Using Smartphone Cameras,” Edward Jay Wang, William Li, Doug Aruna Balasubramanian, Stony Brook University Nilanjan Banerjee, University of Maryland, Hawkins, Terry Gernsheimer, Colette Norby-Slycord, and Shwetak N.
    [Show full text]
  • Activating the Internet of Things
    COVER FEATURE ACTIVATING THE INTERNET OF THINGS Activating the Internet of Things Roy Want, Google Schahram Dustdar, TU Wien 16 COMPUTER PUBLISHED BY THE IEEE COMPUTER SOCIETY 0018-9162/15/$31.00 © 2015 IEEE Now is the time to tune in, turn on, and plug in— the Internet of Things ushers in a whole new paradigm in our relationship with technology. he Internet of Things (IoT) turn uses an LTE cellular service is a term now widely used to connect to the Internet and ulti- in scholarly technical pub- mately to a cloud service. How- lications and mainstream ever, the common factor for all IoT Tmedia. CEOs of major tech compa- devices—from low-end sensors to nies center their keynote addresses high-end appliances—is that they around this term at top industry will have some form of Internet shows—as illustrated by Samsung connectivity and embedded pro- Activating CEO BK Yoon’s address at this year’s cessing to make use of it. Consumer Electronics Show. Analysts have predicted the What is so exciting about the IoT to be the “next big thing” for IoT? What does it really mean and several years. Gartner recently why should we care? The IoT vision, estimated that there would be the Internet simply put, is that almost any elec- about 5 billion devices connected tronic device can be augmented by a to the Internet in 2015, rising to connection to the Internet, enabling 25 billion by 2020.3 Others see the an ordinary standalone device to IoT as just another overhyped tech of Things become a smart networked device.1 story feeding headlines and giving For example, a garden sprinkler consumers inflated expectations.
    [Show full text]
  • Victor Bahl Microsoft Corporation
    Victor Bahl Microsoft Corporation SIGCOMM MobiArch 2007, August 2007 Source: Victoria Poncini, MS IT ~7, 000 Access Points ~65,000 XP & Vista Clients December 2006 ~40,000 connections/day ~35,000 handheld devices 100% 80% 39,6% 37,3% 42,2% 45,8% 47,1% 60% 40% 39,8% 39,7% 34,2% 44,2% 35,3% 20% 18,1% 20,1% 16,2% 17,6% 22,9% 0% Worldwide Americas w/o PS Puget Sound EMEA APJ Very SfSatisfied SSfSomewhat Satisfied SfSomewhat Dissatisfied or Very Dissati fied 2 Victor Bahl Microsoft’s IT Dept. logs several hundred complaints / month 70% calls are about client connectivity issues (e. g. ping-ponging between APs) 30% (and growing) are about performance problems due to interference End-users complain about Lack of RF coverage, performance & reliability Connectivity & authentication problems Network administrators worry about Providing adequate coverage, performance Security and unauthorized access Corporations spend lots of $$ on WLAN infrastructure WLAN hardware business to reach $2.6 billion in 2007. (Forester 2006) Heavy VC funding in this area (e.g. AirTight $36M in the last 16 months) 3 Victor Bahl 4 Victor Bahl FY05 Cost Element View Functional View Breakdown People 72% Applications 60% Data & Voice 16% App Development (29%) App Support (31%) Hardware 5% Facilities 5% Infrastructure 40% Software* 2% Network (14%) * 5% If MS software were included Data Center (7%) Employee Services (5%) Voice (5%) 30% Helpdesk (5%) New Increases Security (3%) Capability value 45% New 70% Capability Sustaining & Running Decreases Existing maintenance 55% Capability delivery Existing Capability 5 Victor Bahl Timeline HotNets’05 , MobiSys’ 06, NSDI ‘07 ACM CCR ’ 06 MobiCom’ 04 MobiSys’ 06 6 Victor Bahl Heterogeneous world Multiple technologies: 802.
    [Show full text]
  • (Cloudlets/Edges) for Mobile Computing
    emergence of micro datacenter (cloudlets/edges) for mobile computing Victor Bahl Wednesday, May 13, 2015 what if our computers could see? Microsoft’s’s HoloLens who? where? what? Video credits: Matthai Philipose Microsoft Research seeing is for real MSR’s Glimpse project vision is demanding recognition using deep neural networks face1 [1] scene [2] object2[3] memory (floats) 103M 76M 138M compute 1.00 GFLOPs 2.54 GFLOPs 30.9 GFLOPs accuracy 97% 51% 94% (top 5) 1: 4000 people; 2: 1000 objects from ImageNet, top 5: one of your top 5 matches human-level accuracy, heavy resource demands … offloading computation is highly desirable [1] Y. Taigman et al. DeepFace: Closing the Gap to Human-Level Performance in Face Verification. In CVPR 2014. (Facebook) [2] B. Zhou et al. Learning deep features for scene recognition using places database. In NIPS, 2014. [MIT, Princeton, ..] [3] K. Simonyan & A. Zisserman. Very deep convolutional networks for large-scale image recognition. 2014 [Google, Oxford] under review recognition: server versus mobile road sign recognition1 stage Mobile server Spedup (Samsung Galaxy Nexus) (i7, 3.6GHz, 4-core) (server:mobile) detection 2353 +/- 242.4 ms 110 +/- 32.1 ms ~15-16X feature extraction 1327.7 +/- 102.4 ms 69 +/- 15.2 ms ~18X recognition2 162.1 +/- 73.2 ms 11 +/- 1.6 ms ~14X Energy used 11.32 Joules 0.54 Joules ~21X 1convolution neural networks 2classifying 1000 objects with 4096 features using a linear SVM how long does it take to reach the cloud? 3g networks 4g-lte networks T-Mobile 450ms AT&T 350ms MobiSys 2010
    [Show full text]
  • Internet of Things a Survey About Thoughts and Knowledge
    Thesis no: URI: urn:nbn:se:bth-16304 Internet of Things A survey about thoughts and knowledge Eric Nilsson and David Andersson Faculty of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden This thesis is submitted to the Faculty of Computing at Blekinge Institute of Technology in partial fulfillment of the requirements for the bachelor degree in Software Engineering. The thesis is equivalent to 10 weeks of full time studies. Contact Information: Author(s): David Andersson E-mail: [email protected] Eric Nilsson E-mail: [email protected] University advisor: Huseyin Kusetogullari Department of Computer Science and Engineering Faculty of Computing Internet : www.bth.se Blekinge Institute of Technology Phone : +46 455 38 50 00 SE-371 79 Karlskrona, Sweden Fax : +46 455 38 50 57 ii ABSTRACT In this paper we introduce our readers to Internet of Things, what it is, how it works and providing statistics on society knowledge and thoughts about this subject. Data gathered for our statistics will be collected through a survey. From the literature review of this thesis we provide information about how IoT works and how a general architecture behind an IoT product looks like. since IoT comes in all different shapes we want to find out the high-level architecture behind it. With our survey we will first focus on getting the raw knowledge of the society on IoT and these answers will be compared between IT-persons and non-IT persons, then we will get everyone's answers regarding their thoughts on IoT after we have provided information on IoT to get everyone on the same page.
    [Show full text]
  • Building Aggressively Duty-Cycled Platforms to Achieve Energy Efficiency
    UNIVERSITY OF CALIFORNIA, SAN DIEGO Building Aggressively Duty-Cycled Platforms to Achieve Energy Efficiency A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Computer Science (Computer Engineering) by Yuvraj Agarwal Committee in charge: Rajesh Gupta, Chair Paramvir Bahl William Hodgkiss Stefan Savage Alex Snoeren Geoff Voelker 2009 Copyright Yuvraj Agarwal, 2009 All rights reserved. The dissertation of Yuvraj Agarwal is approved, and it is acceptable in quality and form for publication on mi- crofilm and electronically: Chair University of California, San Diego 2009 iii DEDICATION To Dadi, Shyam Babaji, Papa and Ma. iv TABLE OF CONTENTS Signature Page .................................. iii Dedication ..................................... iv Table of Contents ................................. v List of Figures .................................. ix List of Tables ................................... xi Acknowledgements ................................ xii Vita and Publications .............................. xv Abstract of the Dissertation ........................... xvi Chapter 1 Introduction ............................ 1 1.1 Reducing the Energy Consumption of Computing Devices 3 1.2 Using Collaboration to Aggressively Duty-Cycle Platforms 5 1.3 Contributions ........................ 7 1.4 Organization ......................... 8 Chapter 2 Background and Related Work .................. 9 2.1 Mobile Platforms ...................... 9 2.2 Power and Energy ...................... 12 2.2.1 Measuring Power and Energy Consumption .... 13 2.3 Related Work ........................ 14 2.3.1 Power Management in Mobile Devices ....... 14 2.3.2 Power Management in Laptops and Desktop PCs 17 Chapter 3 Radio Collaboration - Cellular and LAN Data Radios ..... 20 3.1 Overview of a VoIP Deployment .............. 23 3.2 Alternatives to VoIP over Wi-Fi Radios .......... 24 3.2.1 Cellular Data vs. Wi-Fi .............. 25 3.2.2 Smartphone Power Measurements ......... 28 3.3 Cell2Notify Architecture .................
    [Show full text]