skip to main content
10.1145/2184489acmconferencesBook PagePublication PageshotmobileConference Proceedingsconference-collections
HotMobile '11: Proceedings of the 12th Workshop on Mobile Computing Systems and Applications
ACM2011 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
HotMobile '11: 12th Workshop on Mobile Computing Systems and Applications Phoenix Arizona March 1 - 2, 2011
ISBN:
978-1-4503-0649-2
Published:
01 March 2011
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the Twelfth International Workshop on Mobile Computing Systems and Applications --- HotMobile '11. This year's workshop continues the tradition of previous year's workshops of being a highly-selective venue for mobile-computing research. HotMobile's mission is to provide a forum for discussing the future of mobile computing through presentations of new ideas, preliminary research results, and experience reports.

The call for papers attracted 49 submissions from Asia, Europe, and North America. The program committee accepted 16 papers that cover a variety of topics, including privacy and security, sensing, and novel user interfaces. The program also includes a keynote speech by Betsy Masiello on the role of mobile computing in communication, information gathering, and human organization as well as a poster and demo session. HotMobile has traditionally included a Doctoral Consortium in which students can receive feedback on their work from a broad range of researchers. We have upheld this tradition, but changed the format. Instead of holding a separate session with several long presentations, this year's Doctoral Consortium participants will give brief overviews of their work at the beginning of each technical session.

Skip Table Of Content Section
SESSION: Advertising
research-article
SMSAssassin: crowdsourcing driven mobile-based system for SMS spam filtering

Due to increase in use of Short Message Service (SMS) over mobile phones in developing countries, there has been a burst of spam SMSes. Content-based machine learning approaches were effective in filtering email spams. Researchers have used topical and ...

research-article
AdNext: a visit-pattern-aware mobile advertising system for urban commercial complexes

As smartphones have become prevalent, mobile advertising is getting significant attention as being not only a killer application in future mobile commerce, but also as an important business model of emerging mobile applications to monetize them. In this ...

SESSION: Security
research-article
Mobile token-based authentication on a budget

We propose a light-weight, cheap authentication device for unlocking a user's smartphone. The device can be carried on a key chain and automatically unlocks the smartphone whenever its owner wants to use it. Our goal is to build a device that works with ...

research-article
Trusted language runtime (TLR): enabling trusted applications on smartphones

Despite their popularity, today's smartphones do not yet offer environments for building and running trusted applications. At the same time, current systems designed for traditional desktop or server machines to enable trusted applications are either ...

research-article
Towards end-to-end security in branchless banking

Mobile-based branchless banking has become one of the key mechanisms for extending financial services to low-income populations in the world's developing regions. One shortcoming of today's branchless banking systems is that they rely largely on network-...

SESSION: Privacy
research-article
User controllable security and privacy for mobile mashups

A new paradigm in the domain of mobile applications is 'mobile mashups', where Web content rendered on a mobile browser is amalgamated with data and features available on the device, such as user location, calendar information and camera. Although a ...

research-article
Privacy, availability and economics in the Polaris mobile social network

While highly successful, today's online social networks (OSNs) have made a conscious decision to sacrifice privacy for availability and centralized control. Unfortunately, tradeoffs in this "walled garden" architecture naturally pit the economic ...

research-article
MockDroid: trading privacy for application functionality on smartphones

MockDroid is a modified version of the Android operating system which allows a user to 'mock' an application's access to a resource. This resource is subsequently reported as empty or unavailable whenever the application requests access. This approach ...

SESSION: Transportation
research-article
The cyber-physical bike: a step towards safer green transportation

To improve road cycling safety, we present an approach that augments bicycles with video processing and computational capabilities. This Cyber-Physical bicycle system continuously monitors the environment behind the biker, automatically detects rear-...

research-article
Ikarus: large-scale participatory sensing at high altitudes

Sensor networks proved to be a useful research tool in the field of environmental monitoring. While first sensor deployments consisted of a relatively small number of static nodes, mobile sensor devices have attracted growing interest for large-scale ...

research-article
Undistracted driving: a mobile phone that doesn't distract

Distracted driving is a major problem that leads to unnecessary accidents and human casualties everywhere in the world. The ubiquity of mobile phones is one cause of distracted driving. In United States alone, operating mobile phones while driving has ...

SESSION: Resource scarcity
research-article
The case for context-aware compression

The proliferation of pictures and videos in the Internet is imposing heavy demands on mobile data networks. This demand is expected to grow rapidly and a one-fit-all solution is unforeseeable. While researchers are approaching the problem from different ...

research-article
Can deterministic replay be an enabling tool for mobile computing?

Deterministic record and replay is fast becoming a vital technology in desktop and server computing environments. Yet, the applicability of this technology to computation run on small, mobile devices such as cell phones has not yet been explored. We ...

research-article
Why are web browsers slow on smartphones?

We report the first work that examines the internals of web browsers on smartphones, using the WebKit codebase, two generations of Android smartphones, and webpages visited by 25 smart-phone users over three months. We make many surprising findings. ...

SESSION: Sensor privacy
research-article
Sensor tricorder: what does that sensor know about me?

As rich sensing applications become pervasive, people increasingly find themselves with limited ability to determine what sensor data the applications are collecting about them and how the applications are using the sensor data. Openness and ...

research-article
FollowMe: enhancing mobile applications with open infrastructure sensing

Despite context-rich smartphone applications being adopted at an unprecedented rate, few use the data produced by the numerous cameras and microphones on walls and other fixed infrastructure. We present a system design called FollowMe aimed at letting ...

Contributors
  • Intel Corporation
  • Microsoft Research

Recommendations

Acceptance Rates

Overall Acceptance Rate96of345submissions,28%
YearSubmittedAcceptedRate
HotMobile '18651929%
HotMobile '16551833%
HotMobile '15852327%
HotMobile '14722231%
HotMobile '12681421%
Overall3459628%