ConferenceQA

- friends
1 link karma
91 comment karma
send messagemember for
what's this?

TROPHY CASE

papers

subscribe8 readers

Welcome to the public review site of papers appearing in MobiSys 2012. Here you can find the public review written by a PC member for each paper and the authors' rebuttal to it. You can comment on any of them or add your own opinion. Finally you can vote to "like" or "dislike" a paper by clicking the up or down arrows next to its title.

CiAO/IP: A Highly Configurable Aspect-Oriented IP Stack by ChristophBorchertin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (Dartmouth) How will the debugging process be impacted?

A: No there is no support. Not needed. There is a direct source to source port. You may debug the generated inter-medium code.

CiAO/IP: A Highly Configurable Aspect-Oriented IP Stack by ChristophBorchertin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (MIT) Originally is it that bad for a standard c programmer to modify the files? And you may have to do it for portability anyway. A: You always need to remember this specific structure.

CiAO/IP: A Highly Configurable Aspect-Oriented IP Stack by ChristophBorchertin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: How does this work affect cpu overhead. This is important especially in sensor networks with limited resources. Any numbers?

A: There is no overhead. The work is done in compile time. You are just using the new stack

CiAO/IP: A Highly Configurable Aspect-Oriented IP Stack by ChristophBorchertin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (Stefan, MSR) TCP aspect. Counter code: aspect implement the counter Different code file than tcp class.

A: Yes.

Q: What does it take to make changes to tcp transmission? Say change to send 2 packets for ACK. Then the developer needs to go to another file and change it. How to keep track of what code needs to be changed in this case.

A: Relying on the file ID.

DozyAP: Power-Efficient Wi-Fi Tethering by YunxinLiuin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: Is the buffer around 300 ms?

A: Around 10 seconds

Q: So it’s not real-time interacting streaming but more of downloading video streaming. Also the use of request/respond may not be efficient for multiple clients. (yes)

DozyAP: Power-Efficient Wi-Fi Tethering by YunxinLiuin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: You were using 802.11 adhoc mode. How about Wi-Fi direct which implements a Wi-Fi ap sleep mode?

A: We experimented with Wi-Fi direct. But it’s a separate mode by itself. So we cannot use it for tethering and as a normal client. And the energy consumption is slightly higher than tethering.

Q: That’s because vendors didn’t implement the sleep mode correctly.

DozyAP: Power-Efficient Wi-Fi Tethering by YunxinLiuin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (Michelle Gong, Intel) Is the energy saving you showed for real time streaming?

A: Yes.

Q: If the rate is 30 frames per second, how can the system goes sleep?

A: We were surprised by this result at first. In the end, we found that video streaming usually holds a buffer and fetch the content aggressively. When the buffer is full, the download stops. Only when the buffered content is lower than a threshold, the client will fetch again. That’s why we have this gain.

WIISARD: A Measurement Study of Network Properties and Protocol Reliability during an Emergency Response by octavchiparain papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (Stefan Saroiu, MSR) What effects does fire have on the propagation of Wi-Fi signals?

A: Dartmouth has done this experiment with Wi-Fi adhoc network using motes in fire. Details can be found in that paper.

WIISARD: A Measurement Study of Network Properties and Protocol Reliability during an Emergency Response by octavchiparain papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (MSR) What is the mode of the message going out? Broadcast or something else. What is the way to let message reach everyone?

A: We are using Wi-Fi.

Q: What is the form of message, voice, text, …

A: We are using a data structure capturing situations including patient information, how critical the situation is, etc. This can be viewed as a distributed database.

Q: What is the latency?

A: Responders can respond using mobile phones and use RFID to tag the patient. The user interface is easy to understand. On average, it takes around 20 seconds to input data

Beyond Deployments and Testbeds: Experiences with Public Usage on Vehicular WiFi Hotspots by JoshuaHarein papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (Alec Wolman, MSR) When you develop a system to provide network access to physical vehicles, what kind of functionalities do you want to see implemented?

A: Diagnostic/monitoring/logging functionalities. If something goes wrong, for example, sometimes, the hardware isn’t functioning. Ideally we should be able to look into system logs. Now the only way is through analyzing usage statistics.

How Long to Wait?: Predicting Bus Arrival Time with Mobile Phone based Participatory Sensing by PengfeiZhouin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (...) How much does your data capture the variability of traffic at different times of the day or days of the week?

A: There is variability, we are working on figuring out how much data is needed in order to make the application more accurate.

How Long to Wait?: Predicting Bus Arrival Time with Mobile Phone based Participatory Sensing by PengfeiZhouin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (...) Do the phones need to keep accelerometer and mic always on?

A: The mic is always on and rump up accelerometer sampling rate only when beep detected.

How Long to Wait?: Predicting Bus Arrival Time with Mobile Phone based Participatory Sensing by PengfeiZhouin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (MSRA) Bus is noisy, can it happen that the system isn't able to detect beeps?

A: The results are robust to noise according to our experiments.

How Long to Wait?: Predicting Bus Arrival Time with Mobile Phone based Participatory Sensing by PengfeiZhouin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (MIT) Do you tell users in advance when to get to the bus stop in time to catch the bus?

A: We are working on it.

How Long to Wait?: Predicting Bus Arrival Time with Mobile Phone based Participatory Sensing by PengfeiZhouin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (MSR) In some places there are already buses with GPS and providing real time info to users. Can you comment on the utility of your system?

A: GPS might incur cost, and even if buses are equipped with GPS, the companies running the bus system might not want to provide GPS traces to users.

How Long to Wait?: Predicting Bus Arrival Time with Mobile Phone based Participatory Sensing by PengfeiZhouin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (Kaist) Is your system energy efficient compared to GPS since you need to do a lot of señor data processing?

A: GPS consumes a lot of energy energy (battery lasts only few hours). In our case we do only accelerometer and fft processing, so much less energy is needed doubling the phone's life time.

Software Abstractions for Trusted Sensors by HeLiuin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (Byung-Gon Chun, Yahoo! Research) About location based authentication, what sensors are you using?

A: Only GPS.

Software Abstractions for Trusted Sensors by HeLiuin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (Byung-Gon Chun, Yahoo! Research) But GPS might not be very accurate and is not fine grained.

A: You might use other sensors, WiFi for example.

Software Abstractions for Trusted Sensors by HeLiuin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (David Kotz, Dartmouth) How expressive is you policy language? Also, you let code run inside the TCP? It is very risky.

A: We use python, so any policy can be implemented. And yes, code runs inside TPC but it's in a sandboxed environment.

Open Data Kit Sensors: A Sensor Integration Framework for Android at the Application-Level by WaylonBrunettein papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (Stefan Saroiu, MSR) Why not providing phones too beyond just the sensing platform?

A: We can't support everybody. Some prefer personal phones, in some case the organizations themselves decide to provide the devices. We envision a wide range of deployment model.

Open Data Kit Sensors: A Sensor Integration Framework for Android at the Application-Level by WaylonBrunettein papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (Stefan Saroiu, MSR) Is the model about providing a bridge between phones and sensors?

A: Yes. If you want to access a certain sensor through our platform, you ask for it and the system handles it for you.

Medusa: A Programming Framework for Crowd-Sensing Applications by MooryongRain papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (Guoliang Xing, Michigan State University) Sensor data needs to be often processed locally, bandwidth is limited, how do you deal with it?

A: We do preprocessing on the phone to reduce bandwidth use and limit the data over the air.

Medusa: A Programming Framework for Crowd-Sensing Applications by MooryongRain papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (Dave Kotz, Dartmouth) What are the privacy features of your system with respect to sensor data?

A: The user makes the final decision as to what sensor data can be eventually uploaded.

TapPrints: Your Finger Taps Have Fingerprints by EmilianoMiluzzoin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: How do you detect it? i.e., how can you detect that tap-capture and inference is being done so we can highlight this?

A: This is the challenge. We don’t have a clear answer - seeing if vendors embrace idea and can change this ..

TapPrints: Your Finger Taps Have Fingerprints by EmilianoMiluzzoin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (Msft) Can you move the sensor? Does it affect accuracy?

A: Yes, it does affect accuracy. We don’t know where the sensors are positioned so need to look at per-device.

TapPrints: Your Finger Taps Have Fingerprints by EmilianoMiluzzoin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (Singapore) Do your numbers change for different volunteers (male vs. female etc.)?

A: Tried with 1 left-handed, male and female mixed. Looked pretty good across all users

TapPrints: Your Finger Taps Have Fingerprints by EmilianoMiluzzoin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (Max Planck) Nice sidechannel attack -- did you try swipe input, or the Swype app?

A: We haven’t yet but it’s in the pipeline

TapPrints: Your Finger Taps Have Fingerprints by EmilianoMiluzzoin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (MIT) Noticed you had orientation - why not 2-thumbs portrait, which is the common way to use it?

A: We overlooked it. May not provide a big difference. We can explore it.

Q: How about different screens? e.g., Shift key + key

A: Yes - larger number of labels. We haven’t done it - but we can infer it.

TapPrints: Your Finger Taps Have Fingerprints by EmilianoMiluzzoin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (Yahoo!) What are the important features among them? You used several ML techniques - which worked better?

A: 1st order derivative was the best feature (clearly captures shape) SVM, Random forest

Plug-n-Trust: Practical Trusted Sensing for mHealth by JacobSorberin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: In my experience, processing needs lead time. Where is the time source in your system? Sensor? SmartCard?

A: From the sensor. Requirement is that sensor should have a trustworthy time source. Would be great to have a second time source but malicious code could cut access to the phone.

Plug-n-Trust: Practical Trusted Sensing for mHealth by JacobSorberin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (Alec Wolman, MSFT) Love the work. Had a question about the deisgn you chose. The processing language used for the data -- instructions are hosted on the untrusted environment. Seems a minor design change would allow you to keep the code confidential as well. Did you consider that design choice and discard it or not consider at all?

A: Looked at options like garbled circuits (talk offline more) but we just haven’t gotten that far. Clear shortcoming - we hide what the data values are but not the processing. E.g., if the processing is specific to HIV, it could reveal something about the data by mistake. So yes, we need to look into it.

Plug-n-Trust: Practical Trusted Sensing for mHealth by JacobSorberin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (Korea) When you use smartphones, that is because you want computing power etc. where JavaCards are less resourceful. Why use it in the phone?

A: If i have sensors sending data, sensor designers want to keep their sensors very simple and works well and consistently. On phones with application-specific logic, allows sensors to stay simple. If processing is always the same, and always with the same sensor, then push it into the sensor. But if it will change, then it makes sense to push to the phone (firmware updates to sensors is hard) Also if you want to fuse sensor data, then it makes sense to use the phone as a place to do the fusion

Opaak: Using Mobile Phones to Limit Anonymous Identities Online by GabrielMaganisin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (David Chu, MSFT) Does your system fall apart if the attacker has access to personal information e.g., via botnet, get access to a bag of IMEI numbers etc.

A: Yes, attacker can assume a million*k (the limit for anonymous identities allowed at AIP) but this is too expensive. That was our goal - to make it expensive for such hacks.

Opaak: Using Mobile Phones to Limit Anonymous Identities Online by GabrielMaganisin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: Can you comment on why you have to use this vs. other anonymous web based identities?

A: Key differentiation is the rate limiting. Most existing k-anonymous scheme require range proofs. Our architecture is simpler and more efficient. They have very broad goals -- we focus on just simpler problems.

Opaak: Using Mobile Phones to Limit Anonymous Identities Online by GabrielMaganisin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: I don’t think cellular provider can verify IMEI. SMS spammers often fake this. It also seems to me .. that system is based on the fact that user has a phone number. How about others -- e.g., credit card numbers? Banks can’t use IMEI and phone numbers come and go

A: Sure. Credit card numbers is a good example, but they can be fake too. It depends on the AIP to verify.

Opaak: Using Mobile Phones to Limit Anonymous Identities Online by GabrielMaganisin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: (Parijat from Max Planck) - what does it take to verify an IMEI number and what is overhead

A: IMEI is just one example - cellular carrier can verify it easily. You can verify phone numbers easily (as another example). One way is that we can push SMS verification to the AIP. Instead of Craigslist doing it every time, we do it only once with the AIP.

Q: is AIP a trusted all-powerful component>?

A: Use it to trust that user owns the resource

RiskRanker: Scalable and Accurate Zero-day Android Malware Detection by xuxianjiangin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Q: Your analysis based on family signatures. How would you cope with “new” families. Is there any feature set that you could use to discover exploits not known already?

A:No. For now, we focus only on known exploits. Future work.

RiskRanker: Scalable and Accurate Zero-day Android Malware Detection by xuxianjiangin papers

[–]ConferenceQA 0 points1 point ago* 

sorry, this has been archived and can no longer be voted on

Q: UC Berkeley: How much of the malware was found via Google Play?

A: 50%

Q: Reachability analysis -- users schedule things for later e.g., server sending a message later. How will you deal with this?

A: Let's take this offline.

RiskRanker: Scalable and Accurate Zero-day Android Malware Detection by xuxianjiangin papers

[–]ConferenceQA 0 points1 point ago* 

sorry, this has been archived and can no longer be voted on

Q: (David Chu, Msft) You mentioned false positive analysis but did you do false negative analysis? Can you say more about this … how did you know that you didn’t miss malicious apps?

A: We verified manually for 3% of the apps we analyzed. (did not address the question directly)

RiskRanker: Scalable and Accurate Zero-day Android Malware Detection by xuxianjiangin papers

[–]ConferenceQA 0 points1 point ago* 

sorry, this has been archived and can no longer be voted on

Q: MSFT - Given experience, and could fix 1 problem with a magic and, what would that be?

A: There are still many malware in PC world. Look there for inspiration?

What is keeping my phone awake? Characterizing and Detecting No-Sleep Energy Bugs in Smartphone Apps by AbhilashJindalin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Question: My impression is that these energy bugs are more subtle than other types of bugs. It's not clear that the user would find out.

Answer: In most cases, the user does not know which app has the bug, he/she only sees that the battery has been drained.

Question: Great application of program analysis. I just want to get more details of the program analysis. How do you handle multiple processor, Android libraries, etc.

Answer: It's a conservative analysis, but this can introduce errors.

Human Mobility Modeling at Metropolitan Scales by RamonCaceresin papers

[–]ConferenceQA 0 points1 point ago

sorry, this has been archived and can no longer be voted on

Question: Dave Johnson, Rice University: As a designer of the Random Waypoint Model, I feel the need to defend it. It was never intended to model aggregate mobility at large scales [it was intended to model the motion of individual nodes].

Answer: [Agrees with limitations of proposed model in regard to tracking an individual node, proposal hybridized model that can enable tracking of individual nodes, as Waypoint was intended for]

Follow up: [Suggests considering work from MANET]

Question: What happens if you have a sparse city [how will less-dense regions be captured].

Answer: The model will pick work locations [that are not only in locations of highest density].

Question: New York tends to have lots of closure on mass transits, etc. Do you look for anomalies?

Answer: We can do "what-if" scenarios ...

Question: Based on CDR records, based on calls made or received, but not location of phones. You wouldn't necessarily find locations where people do not make calls.

Answer: Over large populations, and confirmed in ground-truth studies, we have show to capture statistics such as daily range against ground truth.

Question: Regarding future work on differential privacy, what does that mean, can you elaborate?

Answer: The idea in differential privacy, if you have a raw data set with real individuals and a synthetic set that you want to release, you want to prove that the synthetic data carries very little information [from an information theoretic perspective] regarding the real people.

Question: I was wondering, when you identified the home and work locations, did you use the call graph or just location? Do you think it would help to use the call graph?

Answer: We did not, we only used the CDR locations.

Question: [Regarding difference between LA, NY, and other cities, can you comment on the differences]

Answer: We also looked at San Francisco and other places as well.

Question: Would it make sense to compare data to IP based data? What if you had information regarding IP addresses of customers?

Answer: I very much hope that we can used the call detail records [mobile phones]. If we could use the data for IP communications, we would have, it would have added more information and improved our accuracy, I'm convinced.

A Close Examination of Performance and Power Characteristics of 4G LTE Networks by JunxianHuangin papers

[–]ConferenceQA 1 point2 points ago

sorry, this has been archived and can no longer be voted on

Question from Rajarshi Gupta, Qualcomm (moderator): When you compare LTE with WIFI, how about that WiFI communicates across a room versus LTE across a city? [Wouldn't that account for part of the power difference?].

Answer: [Agrees] Transmitting power for LTE must be higher than for WiFi. Here trying to compare and see how much difference there is. In the future, it should be possible to make LTE more power efficient. We don't expect LTE to be more efficient than WiFi, but more efficient than it currently is.

A Close Examination of Performance and Power Characteristics of 4G LTE Networks by JunxianHuangin papers

[–]ConferenceQA 1 point2 points ago

sorry, this has been archived and can no longer be voted on

Question from Clay Shepard, Rice University: ... We were under the impression that the DRX mode is not currently implemented... [asks regarding experimental setup].

Answer: [Shows graph] These clear spikes demonstrates the DRX mode must be enabled.

Follow up: What phone did you use?

Answer: Thunderbolt

Follow up: [Ask regarding trace based analysis]

Answer: The same trace was appiled to different communication modes.

Informed Mobile Prefetching by BrettHigginsin papers

[–]ConferenceQA 1 point2 points ago* 

sorry, this has been archived and can no longer be voted on

Nitya, Motorola: Can the app provide hints about the chunkability of the data?

Answer: Since the prefetching logic is provided by app as a callback, it can chunk however it wants.

Is there a notion of collaboration across apps? Can two apps prefetch twitter feeds, etc?

Answer: We haven’t considered this explicitly yet.

Informed Mobile Prefetching by BrettHigginsin papers

[–]ConferenceQA 1 point2 points ago

sorry, this has been archived and can no longer be voted on

Thomas Moscibroda, MSRA: Question about accuracy prediction, which is based on feedback from app itself. Isn’t this easily game-able? Couldn’t an app say that prefetch is always successful to increase prefetching.

Answer: Yes, but we are targeting apps that want to be good citizens.

Informed Mobile Prefetching by BrettHigginsin papers

[–]ConferenceQA 1 point2 points ago

sorry, this has been archived and can no longer be voted on

Jie Liu, MSR: Are there any privacy implications if this is a system service? Can an application snoop on the prefetch of other apps?

Answer: We haven’t considered that explicitly.

Mobius: Unified Messaging and Data Serving for Mobile Apps by bgchunin papers

[–]ConferenceQA 1 point2 points ago

sorry, this has been archived and can no longer be voted on

Rajesh, Singapore: How did you convince Yahoo that this is easier for application developers to use?

Answer: We haven’t done that test yet. API similar to yql (Yahoo query language).

So, you did and np-complete reduction to a yahoo product?

Answer: Yes, no user study yet.

Mobius: Unified Messaging and Data Serving for Mobile Apps by bgchunin papers

[–]ConferenceQA 1 point2 points ago

sorry, this has been archived and can no longer be voted on

Jitu, MSR: What is the impact of continuous reads on power consumption?

Once read is issued, sets up soft state in backend server. Whenever writes match predicates, clients are notified. In moving to product, leveraging Yahoo infrastructure. Can use MPNS, etc.

Mobius: Unified Messaging and Data Serving for Mobile Apps by bgchunin papers

[–]ConferenceQA 1 point2 points ago

sorry, this has been archived and can no longer be voted on

Nicolas, MSRA: So you get one policy for everybody?

Answer: Yes, but we can partition the decision tree per user.

How would it work on a per person basis?

Good question. We haven’t done it yet, but are exploring different policies.

view more: next