Mobile Systems Interest Group Seminars
Past Seminars (pre 2006):
12 December 2005 12 noon
Room 4.02
Reading Group
Title: CarTel: A Distributed Mobile Sensor Computing System
We will discuss the paper "Socially Aware Computation and Communication" (Computer, vol. 38, no. 3, pp. 33-40, March, 2005) by Alex Pentland.
You can download the paper here
5 December 2005 12 noon
Room 4.02
Speaker: Ilias Leontiadis
Title: Cache Updates in a Peer-to-Peer Network of Mobile Agents
Abstract:
In open multi-agent systems, agents need resources provided by other
agents but they are not aware of which agents provide articular
resources. We consider a peer-to-peer approach, in which each agent
maintains a local cache with information about k resources, that is
for each of the k resources, an agent that provides it. However, when
an agent or a resource moves, cache entries become obsolete. We
propose a suite of cache update policies that combine pull-based
invalidation that is initiated by the agent that maintains
the cache with push-based invalidation that is initiated
by the agent that moves. We study and compare variations
of oblivious flooding-based push/pull along with an
informed push approach where each agent maintains a list
of the agents that have it cached. Our experimental results
indicate that a novel variation of flooding for push where
a moving agent propagates its new location to agents in its
old neighborhood achieves good cache consistency with a
small message overhead. The proposed policies are suitable
for any peer-to-peer system where peers cache information
about other peers and this information becomes obsolete.
14th November 2pm Room 6.12
Speaker: Asher Hoskins (Imperial College London)
Title: Tesserae - A Dynamic Component Based Language for Ubiquitous Systems
Abstract:
Components, encapsulated pieces of code with standard interfaces,
are a convenient abstraction when writing software for embedded or
ubiquitous systems. Tesserae is an architectural description
language that allows the design of dynamic component systems,
where
the connections between components can be changed at runtime in a
safe manner. It attempts to do this efficiently so that the
generated code can be run on small, low power, ubiquitous
systems of
the sort that will populate our environment in the years to come.
In this talk I will discuss why dynamic component languages are
useful, how Tesserae works, and where we're heading in the future.
Monday 24th October at 2pm Room 4.02
Speaker: David M. Jackson (QinetiQ)
Title: Moving FORWARD – Challenges for the Validation of Ubiquitous Computing
Abstract:
If the potential of ambient computing environments is to be fully
realised, they must support applications with significant real-
world impact. If this is to happen, the technologies on which they
depend must be trusted. The FORWARD (a future of reliable wireless
ad hoc networks of roaming devices) project researched the use of
rigorous tools and techniques to develop trustworthy wireless ad-
hoc networks for future pervasive computing environments.
The talk will discuss the results of the FORWARD project, and
identify some future challenges for the establishment of trust in
ambient computing environments. The main focus of the talk will be
to outline successes in the following research areas:
Spontaneous security
Understanding the concept of trust in pervasive computing is a very
important current issue in computer security. Our ideas of
empirical engagement, practical threat models, and the protocols
that arise from it make a major contribution to this debate;
Bluetooth performance analysis
Performance analysis can quickly become intractable for problems of
realistic size. We have developed a probabilistic model-checking
technique and applied it to characterise important Quality of
Service timing and power consumption properties of Bluetooth
pairing, considering detailed aspects of the Bluetooth specification.
Protocol synthesis
It is notoriously difficult to design correct security protocols.
We have adapted a formal approach for developing correct programs
to the synthesis of protocols. The method is based on the use of
protocol annotations, abstract messages and message refinement. It
is capable of explaining even subtle weaknesses of protocols, and
has been illustrated using small examples. There is real potential
for tool support.
Quality of Service
QoS is a major concern for distributed systems. QoS includes
whether the system functions correctly, and how well it performs in
terms of time/power. In each case QoS can characterise how well the
system copes with communications faults or device faults.
We developed methodologies for assessing correctness of routing and
replication in pervasive computing, and a methodology for assessing
performance.
FORWARD was a collaboration between QinetiQ, the universities of
Birmingham and Oxford, and Formal Systems (Europe) Ltd, funded by
the DTI Next Wave programme.
16 June 2005 12 noon
Room 103
Stefanos
Zachariadis
Title: Q-CAD: QoS and Context Aware Discovery Framework for Mobile
Systems
Abstract: Pervasive computing environments are populated by a large
number of heterogeneous and dynamic resources, encompassing devices,
services and information sources. This number is set to radically
increase in the future; as a result, a mobile device will be able to
contact a large number of service providers and sensors that will
enable it to perform any task at hand. Moreover, interaction with these
services and sensors will be made possible by means of various
components, some located on the mobile device, some available for
download from remote hosts. We refer to services, sensors and
components as resources. In this talk we present Q-CAD, a resource
discovery framework that enables pervasive
computing applications to discover and select the resource(s) best
satisfying the user needs, taking the current execution context and
quality-of-service (QoS) requirements into account. The available
resources are screened, so that only those suitable to the current
execution context of the application will be considered; the
shortlisted resources are then evaluated against the QoS needs of the
application,
and a binding is established to the best available. We illustrate how
we encode context and QoS information, give details of the Q-CAD model
and of its mapping onto a component-based architecture and finally
reports on the implementation and experimental results.
link to (extended) paper:
http://www.cs.ucl.ac.uk/staff/l.capra/publications/icps05ex.pdf
link to published paper (short version):
http://www.cs.ucl.ac.uk/staff/l.capra/publications/icps05.pdf
2 June 2005 12 noon
Room 6.12a
Mirco
Musolesi (CS-UCL)
Title: Probabilistic Communication Primitives Based on Models of Epidemics Spreading in Networks
Abstract: Gossip-based communication and epidemic-style routing
algorithms have been proposed to achieve scalability in distributed
systems and to support probabilistic communication when the application
of the classic deterministic algorithms and protocols is impossible or
unsuitable.
In this talk, we will discuss the design of a middleware for
probabilistic communication that relies on optimised epidemic-style
information dissemination techniques for distributed systems, based on
recent results of complex networks theory. The novelty of our approach
resides in the evaluation and the exploitation of the structure of the
underlying network for the automatic tuning of the dissemination
process. We will show that protocols that statistically ensure the
desired reliability level can be designed by exploting models of
epidemics spreading in networks.
5 May 2005 12 Room 6.12a
Mohamed Ahmed (CS-UCL)
Title: Statistical Matching Approach to Detect Privacy Violation for
Trust-Based Collaborations
Abstract
Distributed trust and reputation management mechanisms are often
proposed as a means of providing assurance in dynamic and open
environments by enabling principals to building up knowledge of the
entities with which they interact. However, there is a tension between
the preservation of privacy (which would suggest a refusal to release
information) and the controlled release of information that is
necessary
both in order to accomplish tasks and to provide a foundation for the
assessment of trustworthiness. However, reputation-based systems are
to be used in assessing the risks of privacy violation, it is necessary
both to discover when sensitive information has been released, and then
to be able to evaluate the likelihood that each of the set of
principals
that knew that information was involved in its release.
In this paper, we argue that statistical traceability can act as a
basis for reaching a
proper balance between privacy and trust. To enable this, we assume
that
interacting principals negotiate service level agreements that are
intended to constrain the ways in which personal information may be
used, and then monitor violations, ascribing likelihoods of involvement
in release using an approach based on statistical disclosure control.
Even though our approach cannot guarantee perfect privacy protection
for
personal information, it provides a framework using which detected
privacy violation can be mapped onto a measure of accountability,which
is useful in deterring such violation.
28 April 2005 12 noon Room 111 Foster Court
Vladimir
Dyo (CS-UCL)
Title: Adaptive Distributed Indexing for Spatial Queries in Sensor
Networks
Abstract
Sensor networks have opened new horizons and opportunities for
a variety of environmental monitoring, surveillance and healthcare
applications. One of the major tasks of sensor networks is the
distributed collection and processing of sensor readings over extended
periods of time. We propose an energy efficient hierarchical indexing
approach for spatial data in sensor networks. Our indexing technique
allows roaming users to navigate through sensor networks distributed
over large geographical areas and to pose spatial queries about the
location of the data in the network. The major challenge in designing
such indexes is the minimization of the total amount of traffic
needed to create and maintain the indexes, which is a function of
region activity and the actual query rates. Given the dynamic character
of the
setting, these parameters might in fact change during the network
operation, calling for a very adaptive solution.
17 March 2005 12 noon Room
6.12 CS Building
Reading Group
The next MobiSys Reading Group will be on Thursday 17th March at 12
noon (room 6.12 CS Building). Daniele Quercia will present the
paper "Trusting in Agent Societies Competition Game Rules".
3 March 2005 1pm Room 6.12
Costin
Raiciu (CS-UCL)
Title: Biased Geographical Routing and Applications
Abstract
This paper addresses the issue of multipath geographical routing in
wireless sensor networks with location information. We propose a cheap
and effective way for achieving multiple paths with a high level of
distinctiveness called Biased Geographical Routing. We also select two
interesting applications of this scheme. First, we study multipath
routing as a way to provide reliability in the face of malicious nodes.
We devise and analyze end to end reliable algorithms that take into
account different goals in point to point reliable communication such
as minimizing delay, minimizing energy consumption or maximizing
reliability. As expected, measurements show that these goals cannot be
concurrently achieved, so we must trade off increased costs for faster,
more reliable communication.Second, we employ multipath routing to
achieve throughput in sensor networks. Building on previous work, we
propose ways to circumvent congested areas by using our BGR algorithm.
31 January 2005 1pm
Athanassios Boulis (National ICT Australia)
Wireless Sensor Networks: Overview and Challenges
Abstract
If you are in the EE/CS/ECE areas it is very likely you have heard
the term "sensor networks". This booming research field was first
made visible only 6-7 years ago, bringing visions of unprecedented
monitoring of the physical environment in term of accuracy, time-scale,
and cost. Promising applications involve many areas in science,
military and the industry.
What are Wireless Sensor Networks? What is the vision they create?
What are the major problems? What has been done during these past
years to tackle them? Is the increasing interest by the research
community a hype or a genuine need? Why haven't we seen more
real systems addressing real needs? What are the challenges?
We will try to answer these questions in the confines of a seminar
talk.
Bio
Athanassios Boulis is a researcher at the Networks and Pervasive
program at National ICT Australia. He received his Ph.D.
and M.S. degrees in Electrical Engineering at UCLA in December 2003
and 1999 respectively. He received his BS degree from the Technical
University of Crete, Greece, in 1997.
During his graduate studies he was a member of
the NSF Center for Embedded Networked Sensing and the Networked
Embedded Systems Laboratory. His PhD dissertation tackled several
problems in the sensor network area: 1) dynamic programmability
2)energy management in the presence of multiple applications,
and 3) design of efficient distributed estimation applications. Dr
Boulis' current research interests include macroprogramming
models for Network Embedded Systems as well as design methodologies for
robust distributed algorithms for such systems.
21 January 2005 1pm
Ibiso Wokoma (EE, UCL)
Title: A Biologically-Inspired Clustering Algorithm Dependent on Spatial Data in Sensor Networks
Abstract
Sensor networks in environmental monitoring applications aim to provide
scientists with a useful spatio-temporal representation of the
observed phenomena. This helps to deepen their understanding of the
environmental signals that cover large geographic areas. In this paper,
the spatial aspect of this data handling requirement is met by creating
clusters in a sensor network based on the rate of change of an
oceanographic signal with respect to space. Inspiration was drawn from
quorum sensing, a biological process that is carried out within
communities of bacterial cells. In this system, global behaviour
emerges from small-scale local events and this is an ideal
characteristic of sensor networks. A spatial data model that showed the
variation of water height as waves flow from the sea to the shore was
used with real temporal data to test the algorithm. The paper
demonstrates the control the user has over the sensitivity of the
algorithm to the data variation and the energy consumption of the nodes
while they run the algorithm.
14 January 2005 1pm
Niki Trigoni (Birkbeck
College, University of London)
Title: Energy-efficient data management for sensor networks
Abstract
A powerful paradigm in sensor network design has emerged recently in which clients "program" the sensors
through queries in a high level declarative language (such as a variant
of SQL). Considering that sensors have strong constraints on their
energy usage, this database approach to sensor networks calls for
energy-efficient query processing and data dissemination techniques. A
significant amount of energy can be preserved by (1) designing
efficient plans for query execution and (2) by carefully coordinating
data and query transmissions across the network.
The first part of my talk describes work on opportunities for
multi-query optimization in sensor networks. Firstly, by devising
distributed algorithms that exploit query commonalities we can
significantly reduce the communication cost of processing multiple
queries in the network. Secondly, given a query and sensor update
workload, result encoding techniques that allow nodes to propagate
deltas of query results can further reduce the traffic load. Finally, a
hybrid pull-push model for query evaluation will be presented, in which
certain nodes proactively "push" their readings to intermediate storage
nodes, from where data is "pulled" on-demand when queries are injected
into the network.
The second part of my talk focuses on scheduling nodes and coordinating
their transmissions such that data flows quickly from event sources to
storage (or query initiation) nodes while avoiding collisions at the
MAC layer. Since all nodes adhere to the schedule, most nodes can be
turned off and only wake up during well-defined time intervals,
resulting in significant energy savings. Routing protocols can be
modified to interact symbiotically with the scheduling decisions, resulting in significant energy savings at the cost of higher latency.
10
December 2004 1pm
Wenjun Hu (Computer Lab, Cambridge University)
Title: Towards An Integrated Approach to Modelling Ad
Hoc Networks
Abstract
For sometime, the simulation models used in mobile ad hoc network
research have been under attack for their lack of realism. This
deficiency emcompasses over-simplification and lack of extensibility.
Criticisms have targeted radio propagation models and mobility models
respectively. In this work, we take an integrated approach to modelling
the real world that underlies a mobile ad hoc network. While pointing
out the correlations between the space, radio propagation and mobility
models, we use mobility as a focal point to propose a framework for
these models. We give a formulation of a detailed model and present
simulation results that reflect topology properties of networks
synthesised.
3 December 2005 1pm
Luca Negri (Politecnico
di Milano (Italy), ALARI (Switzerland)
Title: Power Modeling and Optimization for Wireless Networks
Abstract: Battery-powered mobile devices featuring wireless
connectivity are becoming part of everyday life. In a functional
breakdown of their power budget, communication accounts for a steadily
increasing share of the total power; this is pushing research on power
management for such devices. The key to effective power management is
power modeling. However, very often simplistic models based on a few
power figures are employed in power optimization of wireless networks.
We present a statecharts-based power modeling methodology featuring
variable granularity and low computational burden, which can be applied
to any (wireless) protocol. In particular, we present its application
to different Bluetooth and 802.11 devices, along with the outcoming
power models and selected scenarios for which we have optimized power
consumption. Finally, we present StateC, an automatic framework we are
designing to automatically build a SystemC power simulator starting
from the statechart power model of a generic protocol.
Friday
19 November 2004
1pm
The next MobiSys event will be on
Friday 19th November 1pm in room 203.
Gareth Morgan (from Orange) will present on Orange's mobile data
solutions from a technical standpoint and look at how these compare to
other wireless technologies.
Friday 5
November 2004 1pm
Anthony
Steed, Dept of Computer Science, UCL
29 October 2004 1 pm
Reading group
Michael Rogers, Dept. of Computer Science
15th October
2004 1pm (room
203)
Stefanos
Zachariadis will present his paper "SATIN: A Component
Model
for Mobile Self-Organisation" accepted at DOA'04
.
:
Abstract: We have recently witnessed a growing interest in self organising
systems, both in research and in practice. These systems re-organise in
response to new or changing conditions in the environment. The
need for self organisation is often found in mobile applications; these
applications are typically hosted in resource-constrained environments
and may have to dynamically reorganise in response to changes of user
needs, to heterogeneity and connectivity challenges, as well as to
changes in the execution context and physical environment. We argue
that physically mobile applications benefit from the use of self
organisation primitives. We show that a component model that
incorporates code mobility primitives assists in building self
organising mobile systems. We present SATIN, a lightweight component
model, which represents a mobile system as a set of interoperable local
components. The model supports reconfiguration, by offering code
migration services. We discuss an implementation of the SATIN
middleware, based on the component model and evaluate our work by
adapting existing open source software as SATIN components and by
building and testing a system that manages the dynamic update of
components on mobile hosts.
You can find the paper at this URL:
http://www.cs.ucl.ac.uk/staff/S.Zachariadis/papers/doa04.pdf
2 October 2004 1pm (room 203)
Rae Harbird will present her paper "Adaptive Resource Discovery for
Ubiquitous Computing" accepted at MPAC'04.
Abstract
The terms pervasive and ubiquitous computing are used to describe a
smart space populated by hundreds of intelligent devices that are
embedded in their surroundings. Characteristically, ubiquitous
computing devices must blend into the background, unobtrusively
collaborating to provide value-added services for users. Services are
thus essential to the success of this technology and, as a result, both
service discovery and service management will play a vital role in
generating the revenue stream that is a prerequisite for sustainable
ubiquitous deployment. On the one hand, the services provided should be
evident by their richness and variety and on the other, the complexity
inherent in the environment must be hidden from users. In this paper,
we describe RUBI, a resource discovery framework for ubiquitous
computing. RUBI represents a novel approach to resource discovery,
because the primacy of the need for adaptive autonomic behaviour is
established within its design.
You can find the paper at this URL:
http://www.cs.ucl.ac.uk/staff/c.mascolo/www/mpacrae.pdf
After Rae's seminar, Mirco Musolesi will present his paper "Adapting
Asynchronous Messaging Middleware to Ad Hoc Networking" accepted at
MPAC'04.
Abstract
The characteristics of mobile environments, with the possibility of
frequent disconnections and fluctuating bandwith, have forced a rethink
of traditional middleware. In particular, the synchronous communication
paradigms often employed in standard middleware do not appear
particularly suited to ad hoc environments, in which not even the
intermittent availability of a backbone network can be assumed.
Instead, asynchronous communication seems to be a generally more
suitable paradigm for such environments. Message oriented middleware
for traditional systems has been developed and used to provide an
asynchronous paradigm for distributed systems, and, recently, also for
some specific mobile computing systems.
In this paper, we present our experience in designing, implementing,
evaluating EMMA (Epidemic Messaging Middleware for Ad hoc networks), an
adaptation of Java Message Service (JMS) for mobile ad hoc
environments. We discuss in detail the design challenges and some
possible solutions, showing a concrete example of feasibility and
suitability of the application of the asynchronous paradigm in this
setting and outlining a research roadmap for the coming years.
You can find the paper at this URL:
http://www.cs.ucl.ac.uk/staff/m.musolesi/papers/MPAC04.pdf
Friday 17th Septembef 2004 (room 203)
Mirco Musolesi presents his paper "A Mobility Model Founded on Social
Network Theory" that has been accepted at MSWIM'04.
You can find the paper at the following address:
www.cs.ucl.ac.uk/staff/M.Musolesi/papers/mswim04.pdf
Past events 2003-2004
Eiko Yoneki's seminar
Eiko Yoneki from the Opera Group of
the Computer Laboratory at the
University of Cambridge will be visiting our department.
She will give a seminar on Monday
26 July 3-4 pm in room 209.
Title: Event Brokering over Distributed Mobile
Peer-to-Peer environments
Abstract: The goal of my research is to create an event-based
middleware over mixed peer-to-peer networks in a multi-event broker
model to support the event flow, especially to adapt to mobile
computing environments. Events reflect the flow of information around
the system from business definition to components interaction.
I will report on an experimental project to integrate publish/subscribe
semantics with on-demand based multicast routing in mobile peer-to-peer
environments. The proposed approach aggregates content-based
subscriptions in a compact data format (Bloom filters), and on-demand
multicast protocol uses this information to construct an optimised
dissemination mesh. Dynamic multicast groups are created by aggregated
subscriptions over the network. Composite events and event correlation
are the next focus, and the current brokers provide a basic event
correlation service. I will also discuss on-going research issues in
the event brokering project.
Reading
groups
29th June 2-3pm
Room 122
Licia Capra presented her current work on trust management issues in mobile
environments.
Details of her seminar
can be found below.
Title: Engineering Human
Trust in Mobile System Collaborations
Abstract:
Rapid advances in
wireless networking technologies have enabled mobile devices to be
connected anywhere and anytime. While roaming, applications on these
devices dynamically discover hosts and services with whom interactions
can be started. However, the fear of exposure to risky transactions
with potentially unknown entities may seriously hinder collaboration.
To minimise this risk, an engineering approach to the development of
trust-based collaborations is necessary.
In the first part of the
talk we introduce hTrust, a human trust management model and framework
that facilitates the construction of trust-aware mobile systems and
applications. In particular, hTrust supports: reasoning about trust
(trust formation), dissemination of trust information in the network
(trust dissemination), and derivation of new trust relationships from
previously formed ones (trust evolution). The framework views each
mobile host as a self-contained unit, carrying along a portfolio of
credentials that are used to prove its trustworthiness to other hosts
in an ad-hoc mobile environment. Customising functions are defined to
capture the natural disposition to trust of the user of the device
inside our trust management framework.
In the second part of
the talk, we focus on a number of unsolved problems in the area; we
discuss the benefits and drawbacks of a number of potential approaches
to deal with these issues, and hopefully engage in a fruitful
discussion about future directions of research.
For more details
(paper): http://www.cs.ucl.ac.uk/staff/l.capra/publications/fse04.pdf
1 June 2004 2-3pm
Room 122
Paper: SPINS: Security Protocols for Sensor Networks
by Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar
Department of Electrical Engineering and Computer Sciences
University of California, Berkeley
Abstract
As sensor networks edge closer towards wide-spread deployment, security
issues become a central concern. So far, much research has focused on
making sensor networks feasible and useful, and has not concentrated on
security.
We present a suite of security building blocks optimized for resource
constrained environments and wireless communication. SPINS has two
secure building blocks: SNEP and microTESLA. SNEP provides the
following important baseline security primitives: Data confidentiality,
two-party data authentication, and data freshness. A particularly hard
problem is to provide efficient broadcast authentication, which is an
important mechanism for sensor networks.
microTESLA is a new protocol which provides authenticated broadcast for
severely resource-constrained environments. We implemented the above
protocols, and show that they are practical even on minimal hardware:
the performance of the protocol suite easily matches the data rate of
our network. Additionally, we demonstrate that the suite can be used
for building higher level protocols.
The paper can be found at the following address:
http://www.ece.cmu.edu/~adrian/projects/mc2001/mc2001.pdf
The paper was introduced by Daniele
Quercia.
MobileSys Reading Group - 30 April 2004 1 pm Room 122
Paper: Modelling
Interactions in Ubiquitious Environments
Abstract: In all computer systems, interactions between
parties require the establishment of a level of trust that is
determined to be sufficient to permit the requested action to take
place. Traditionally, such trust has been policed centrally by having
authorities that determine whether or not an individual is trustworthy
(cf Equifax etc.). To make this work, several premises must hold: (1)
there is widespread trust in such authorities (2) the penalties that
the central authorities can impose by withdrawing their sanction are
sufficiently severe as to discourage bad behaviour (3) it is not
possible for individuals to easily change their identity to avoid such
penalties. It is questionable whether these premises are met in
existing networks; however, in ubiquitous computing environments, they
are highly unreasonable as general assumptions (which is
not the same
thing as saying that such central authorities can never exist or be
useful). Thus, in order to build truly ubiquitous systems, it is
necessary to develop decentralised security mechanisms that give useful
information about trustworthiness in the absence of a central point of
reference or control.
This paper present the first part of our approach to addressing this
concern. We present a simple game-theoretic inspired model for
studying the interaction between principals and trustees; expressing
the process as a utility maximisation function.
The paper was introduced by Mohamed Ahmed.
This page was last modified
25/06/07
|