skip to main content
10.1145/2184489.2184511acmconferencesArticle/Chapter ViewAbstractPublication PageshotmobileConference Proceedingsconference-collections
research-article

FollowMe: enhancing mobile applications with open infrastructure sensing

Published: 01 March 2011 Publication History

Abstract

Despite context-rich smartphone applications being adopted at an unprecedented rate, few use the data produced by the numerous cameras and microphones on walls and other fixed infrastructure. We present a system design called FollowMe aimed at letting mobile applications use these sensors for richer context and better applications. We discuss the benefits of such a system and the new applications it can support. We then describe the key challenges, including establishing relationships between users and sensors that meet the privacy and security requirements of different settings (e.g., a bedroom vs. a public park) with minimal setup overhead, and improving awareness of and control over how data about a person is used by other people.

References

[1]
Chicago links police, private cameras to solve crimes. http://abclocal.go.com/wls/story?section=news/local&id=7370352.
[2]
Ge security. http://www.gesecurity.com/.
[3]
Lower merion district's laptop saga ends with $610k settlement. http://www.philly.com/philly/news/homepage/20101012_Lower_Merion_district_s_laptop_saga_ends_with_610_000_settlement.html.
[4]
Motion capture systems from vicon. http://www.vicon.com.
[5]
Primesense natural interaction. http://www.primesense.com.
[6]
D. Abadi, Y. Ahmad, M. Balazinska, Cetintemel, et al. The design of the borealis stream processing engine. In CIDR, 2005.
[7]
K. Aberer and Z. Despotovic. Managing trust in a peer-2-peer information system. In Information and knowledge management, 2001.
[8]
D. Balfanz, G. Durfee, R. Grinter, D. Smetters, and P. Stewart. Network-in-a-box: How to set up a secure wireless network in under a minute. In USENIX Security, page 15, 2004.
[9]
R. Brunelli and T. Poggio. Face recognition: Features versus templates. IEEE Trans. on Pattern Analysis and Machine Intelligence, 15(10):1042--1052, 2002.
[10]
T. Choudhury and S. Basu. Modeling conversational dynamics as a mixed memory markov process. In NIPS, 2004.
[11]
A. Czeskis, I. Dermendjieva, H. Yapit, A. Borning, B. Friedman, B. Gill, and T. Kohno. Parenting from the pocket: Value tensions and technical directions for secure and private parent-teen mobile safety, 2010.
[12]
A. K. Dey, G. D. Abowd, and D. Salber. A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications. HCI, 16(2):97--166, 2001.
[13]
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, et al. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In OSDI, 2010.
[14]
A. Flores and S. Belongie. Removing pedestrians from google street view images. 2010.
[15]
S. Gaonkar, J. Li, R. Choudhury, L. Cox, and A. Schmidt. Micro-blog: sharing and querying content through mobile phones and social participation. In Mobisys, 2008.
[16]
A. Goh and D. Ngo. Computation of cryptographic keys from face biometrics. In Communications and Multimedia Security, pages 1--13. Springer, 2003.
[17]
B. Greenstein, D. McCoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall. Improving wireless privacy with an identifier-free link layer protocol. In MobiSys, June 2008.
[18]
A. Gupta, A. Kembhavi, and L. Davis. Observing human-object interactions: Using spatial and functional compatibility for recognition. IEEE Trans. on Pattern Analysis and Machine Intelligence, 31(10):1775--1789, oct. 2009.
[19]
J. Hicks, N. Ramanathan, D. Kim, M. Monibi, et al. AndWellness: An Open Mobile System for Activity and Experience Sampling. In Proc. of Wireless Health 2010, 2010.
[20]
A. Jain, R. Bolle, and S. Pankanti. Biometrics: personal identification in networked society. Kluwer, 1999.
[21]
J. Manweiler, R. Scudellari, and L. P. Cox. Smile: encounter-based trust for mobile social services. In CCS, 2009.
[22]
S. Reddy, A. Parker, J. Hyman, J. Burke, D. Estrin, and M. Hansen. Image browsing, processing, and clustering for participatory sensing: Lessons from a dietsense prototype. In Workshop on Embedded networked sensors, 2007.
[23]
P. Saint-Andre. Streaming XML with Jabber/XMPP. IEEE Internet Computing, pages 82--89, 2005.
[24]
A. Sarela, I. Korhonen, J. Lotjonen, M. Sola, and M. Myllymaki. IST Vivago®-an intelligent social and remote wellness monitoring system for the elderly. In IEEE Information Technology Applications in Biomedicine, 2003.
[25]
S. Saroiu and A. Wolman. I am a sensor, and i approve this message. In HotMobile, 2010.
[26]
M. Satyanarayanan, V. Bahl, R. Caceres, and N. Davies. The case for vm-based cloudlets in mobile computing. IEEE Pervasive Computing, 2009.
[27]
N. Saxena, J. Ekberg, K. Kostiainen, and N. Asokan. Secure device pairing based on a visual channel. In Security and Privacy, 2006 IEEE Symposium on, pages 6--313. IEEE, 2006.
[28]
V. Srinivasan, J. Stankovic, and K. Whitehouse. Using height sensors for biometric identification in multi-resident homes. In Pervasive Computing, volume 6030 of Lecture Notes in Computer Science, pages 337--354. 2010.
[29]
T. Teixeira, D. Jung, G. Dublon, and A. Savvides. Identifying people in camera networks using wearable accelerometers. In Pervasive Tech. Related to Assistive Environments, 2009.
[30]
G. Valenzise, L. Gerosa, M. Tagliasacchi, F. Antonacci, and A. Sarti. Scream and gunshot detection and localization for audio-surveillance systems. In IEEE Advanced Video and Signal Based Surveillance, pages 21--26, 2008.

Cited By

View all
  • (2022)Image Based Multi Objects' Trajectories Estimation through Reduced Order Observer2022 14th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS)10.1109/MACS56771.2022.10023115(1-6)Online publication date: 12-Nov-2022
  • (2013)Energy efficient and accuracy aware (E2A2) location services via crowdsourcing2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)10.1109/WiMOB.2013.6673396(436-443)Online publication date: Oct-2013
  • (2013)METIS: Exploring mobile phone sensing offloading for efficiently supporting social sensing applications2013 IEEE International Conference on Pervasive Computing and Communications (PerCom)10.1109/PerCom.2013.6526718(85-93)Online publication date: Mar-2013

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HotMobile '11: Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
March 2011
103 pages
ISBN:9781450306492
DOI:10.1145/2184489
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 March 2011

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

HotMobile '11
Sponsor:

Acceptance Rates

Overall Acceptance Rate 96 of 345 submissions, 28%

Upcoming Conference

HOTMOBILE '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Image Based Multi Objects' Trajectories Estimation through Reduced Order Observer2022 14th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics (MACS)10.1109/MACS56771.2022.10023115(1-6)Online publication date: 12-Nov-2022
  • (2013)Energy efficient and accuracy aware (E2A2) location services via crowdsourcing2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)10.1109/WiMOB.2013.6673396(436-443)Online publication date: Oct-2013
  • (2013)METIS: Exploring mobile phone sensing offloading for efficiently supporting social sensing applications2013 IEEE International Conference on Pervasive Computing and Communications (PerCom)10.1109/PerCom.2013.6526718(85-93)Online publication date: Mar-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media