Demo: O’BTW- An Opportunistic, Similarity-based Mobile Recommendation System ∗

Mai ElSherief† ∗, Tamer ElBatt† ∗, Ahmed Zahran† ∗, Ahmed Helmy‡ †

Wireless Intelligent Networks Center (WINC), Nile University, Giza, Egypt ∗Faculty of Engineering, Cairo University, Giza, Egypt ‡Dept. of Computer and Information Science and Engineering, University of Florida, Gainesville, USA

Categories and Subject Descriptors C.2 [COMPUTER-COMMUNICATION NETWORKS]: Miscellaneous; K.4 [ COMPUTERS AND SOCIETY]: Miscellaneous

Keywords Mobile users, Opportunistic apps, temporal, Profiles, Similarity metrics, Proximity based Apps, Matrix vectorization

1.

INTRODUCTION

Motivation and Objective: Earlier social studies, e.g., Homophily [Lazarsfeld and Merton (1954)], have shown that people tend to have similarities with others in close proximity. In our demo, coined O’BTW, we exploit the ubiquity of mobile phones and resource-rich users’ social structure to develop opportunistic similarity-based mobile social networking applications. O’BTW exploits these key social insights to define new peer-to-peer networking regimes. O’BTW creates endless possibilities for highly personalized apps based on phone-to-phone communications, e.g., location-based services, targeted ads, dating and social networking apps and establishing trust. System Overview: O’BTW demo hosts three major research components: I. Introducing generalized mobile user profile structures that capture relevant factors in assessing user similarity. In O’BTW, we employ a general profile that incorporates different facets, like digital (e.g. visited websites) and physical footprints (physically visited sites), ratings, tips, etc. Additionally, our profile incorporates a temporal dimension that enriches the profile and improves the similarity assessment. II. Developing novel similarity assessment tools that feature both high accuracy and low complexity. In O’BTW, we introduce Vectorized Cosine similarity metric for temporal profiles. This metric enjoys the computational simplicity of non-temporal similarity assessment for non-temporal profiles, e.g, Cosine similarity chosen for its superior performance and the richness brought in by incorporating the temporal dimension into the user profile, e.g., SVD-based similarity [1]. III. Designing DTN profile dissemination policies that compromise the tradeoff between forwarding overhead and de∗ This work was funded in part by a Google Faculty Research Award.

Copyright is held by the author/owner(s). MobiSys’13, June 25–28, 2013, Taipei, Taiwan. ACM 978-1-4503-1672-9/13/06.

lay. The optimal policy would maximize the informationtheoretic “knowledge gain” metric (under investigation). Other Apps that exploit the opportunistic encounters are iTrust and Shield. Highlight and Sonar are apps that connect people in proximity and share information, however, these apps reveal the complete identity of the users.

2.

O’BTW DEMO

The O’BTW demo is implemented using the Android SDK. The demo exhibits a “research-focused” use case in which user profiles are built on the spot through a friendly GUI where physical footprints are represented as the technical conferences attended over the past three years. O’BTW first establishes connection between devices in proximity using Bluetooth. Afterwards, it assesses pair-wise, temporal profile similarity using our Vectorized Cosine metric. In case of similarity, O’BTW exchanges the pre-stored tips representing this user’s knowledge base. Privacy is a major issue in profile-based communication systems that we are currently tackling via profile anonymization techniques as a first line of defense and is a major topic of a more comprehensive analysis and investigation. O’BTW is proof-of-concept mobile app by which mobile users can readily, and anonymously, exchange knowledge, ratings and recommendations with others who are “alike” and happen to meet opportunistically. This, in turn, expands our knowledge base from the “legacy” O’BTW limited to “people we know and meet” to the digital O’BTW which leverages “people we encounter and do not know” and ultimately, with DTN forwarding to “people we do not know and have never encountered”.

3.

REFERENCES

[1] W. Hsu, D. Dutta, and A. Helmy. CSI: A paradigm for behavior-oriented profile-cast services in mobile networks. Ad Hoc Networks, 10:1586–1602, 2012.

Demo: O'BTW- An Opportunistic, Similarity-based ...

Other Apps that exploit the opportunistic encounters are. iTrust and Shield. Highlight and Sonar are apps that con- nect people in proximity and share information, however, these apps reveal the complete identity of the users. 2. O'BTW DEMO. The O'BTW demo is implemented using the Android SDK. The demo exhibits a ...

428KB Sizes 1 Downloads 112 Views

Recommend Documents

CREST: An Opportunistic Forwarding Protocol Based ...
that CREST has a lower end-to-end delay compared to protocols ... especially when nodes are mobile, is to determine exactly ... leaders in the business division, department managers, sys- ...... Due to the page limit, we plan to present these.

Opportunistic Interference Mitigation
Then, their performance is analyzed in terms of degrees- of-freedom (DoFs). ..... For user j in the i-th cell, the user scheduling metric Li j is finally given by (2), ...

Delaunay Triangulation Demo - GitHub
by Liu jiaqi & Qiao Xin & Wang Pengshuai. 1 Introduction. Delaunay triangulation for a set P of points in a plane is a triangulation DT(P) such that no point in P is ...

Sum Rate Enhancement by Maximizing SGINR in an Opportunistic ...
metric and its sum-rate performance can be improved by modifying the scheduling criterion. In this paper, we consider the OIA scheme in an interference-limited ...

Demo CIC.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu.

Opportunistic Interference Mitigation
user interference channel with time-varying channel coeffi- cients. Since then, interference management schemes based on IA have been further developed and analyzed in various wireless network environments: multiple-input multiple-output. (MIMO) inte

JAIIB- ACCOUNTS-DEMO STUDY MATERIAL.pdf
What is Accounting? Accounting, as an information system is the process of identifying, measuring and. communicating the financial information of an ...

Demo: Ball and Plate Wireless Control - EWSN
now targeting control applications in many domains such as industries ... monitoring systems. Despite ... antee, at the application level, the state of the system.

Opportunistic Interference Alignment for Interference ...
This work was supported by the Industrial Strategic Technology Develop- ... [10033822, Operation framework development of large-scale intelligent and.

Opportunistic Underlay Transmission in Multi-carrier ... - CiteSeerX
KAIST Institute for Information Technology Convergence ... Several spectrum-sensing tech- ..... correlation in frequency domain reduces the degree of freedom.

Opportunistic Interference Alignment for Interference ...
Simulation results show that the proposed scheme provides significant improvement in ... Section IV shows simulation results under the OIA scheme. Finally, we summarize the paper with some ..... [1] V. R. Cadambe and S. A. Jafar, “Interference alig

Opportunistic Downlink Interference Alignment - IEEE Xplore
Computer Science and Engineering, Dankook University, Yongin, 448-701, Korea. 3 ... This research was supported by the Basic Science Research Program.

Opportunistic Downlink Interference Alignment - IEEE Xplore
Electrical and Computer Engineering, UNIST, Ulsan 689-798, Korea. 2. Computer Science and Engineering, Dankook University, Yongin, 448-701, Korea. 3.

Throughput Maximization for Opportunistic Spectrum ... - IEEE Xplore
Abstract—In this paper, we propose a novel transmission probability scheduling scheme for opportunistic spectrum access in cognitive radio networks. With the ...

Performance Evaluation of Parallel Opportunistic Multihop ... - CiteSeerX
of the IEEE International Conference on Communications, Seattle,. WA, pp. 331-335 ... From August 2008 to April 2009, he was with Lumicomm Inc.,. Daejeon ...

Energy-Efficient Opportunistic Interference Alignment - IEEE Xplore
Abstract—We introduce an energy-efficient distributed op- portunistic interference alignment (OIA) scheme that greatly improves the sum-rates in multiple-cell ...

Opportunistic Interference Alignment for MIMO ...
1School of ECE, UNIST, Ulsan, Korea, E-mail: [email protected]. 2Dept. of CSE .... user feeds back the effective channel vector and quantity of inter-cell.

MobiShare: Cloud-enabled Opportunistic Content Sharing among ...
MobiShare: Cloud-enabled Opportunistic Content Sharing among Mobile Peers. Kuldeep Yadav, Vinayak Naik, Amarjeet Singh. Indraprastha Institute of ...

Network Coordinated Opportunistic Beamforming in Downlink Cellular ...
Apr 4, 2012 - forming (NC-OBF) protocol for downlink K-cell networks with M-antenna .... MSs per cell and the received signal-to-noise ratio (SNR).

Opportunistic Interference Alignment for Random ... - IEEE Xplore
Dec 14, 2015 - the new standardization called IEEE 802.11 high-efficiency wireless ... Short Range Wireless Transmission Technology with Robustness to ...

JAIIB- ACCOUNTS-DEMO STUDY MATERIAL.pdf
... one must understand what the. underlying concepts currently are. The different aspects are :—. 1. Business Entity Concept. 2. Money Measurement Concept.

iron man 2 demo free.pdf
Iron man 2 demo free. Page 1 of 1. iron man 2 demo free.pdf. iron man 2 demo free.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying iron man 2 ...