It is our great pleasure to welcome you to the Twelfth International Workshop on Mobile Computing Systems and Applications --- HotMobile '11. This year's workshop continues the tradition of previous year's workshops of being a highly-selective venue for mobile-computing research. HotMobile's mission is to provide a forum for discussing the future of mobile computing through presentations of new ideas, preliminary research results, and experience reports.
The call for papers attracted 49 submissions from Asia, Europe, and North America. The program committee accepted 16 papers that cover a variety of topics, including privacy and security, sensing, and novel user interfaces. The program also includes a keynote speech by Betsy Masiello on the role of mobile computing in communication, information gathering, and human organization as well as a poster and demo session. HotMobile has traditionally included a Doctoral Consortium in which students can receive feedback on their work from a broad range of researchers. We have upheld this tradition, but changed the format. Instead of holding a separate session with several long presentations, this year's Doctoral Consortium participants will give brief overviews of their work at the beginning of each technical session.
Proceeding Downloads
SMSAssassin: crowdsourcing driven mobile-based system for SMS spam filtering
Due to increase in use of Short Message Service (SMS) over mobile phones in developing countries, there has been a burst of spam SMSes. Content-based machine learning approaches were effective in filtering email spams. Researchers have used topical and ...
AdNext: a visit-pattern-aware mobile advertising system for urban commercial complexes
- Byoungjip Kim,
- Jin-Young Ha,
- SangJeong Lee,
- Seungwoo Kang,
- Youngki Lee,
- Yunseok Rhee,
- Lama Nachman,
- Junehwa Song
As smartphones have become prevalent, mobile advertising is getting significant attention as being not only a killer application in future mobile commerce, but also as an important business model of emerging mobile applications to monetize them. In this ...
Mobile token-based authentication on a budget
We propose a light-weight, cheap authentication device for unlocking a user's smartphone. The device can be carried on a key chain and automatically unlocks the smartphone whenever its owner wants to use it. Our goal is to build a device that works with ...
Trusted language runtime (TLR): enabling trusted applications on smartphones
Despite their popularity, today's smartphones do not yet offer environments for building and running trusted applications. At the same time, current systems designed for traditional desktop or server machines to enable trusted applications are either ...
Towards end-to-end security in branchless banking
Mobile-based branchless banking has become one of the key mechanisms for extending financial services to low-income populations in the world's developing regions. One shortcoming of today's branchless banking systems is that they rely largely on network-...
User controllable security and privacy for mobile mashups
A new paradigm in the domain of mobile applications is 'mobile mashups', where Web content rendered on a mobile browser is amalgamated with data and features available on the device, such as user location, calendar information and camera. Although a ...
Privacy, availability and economics in the Polaris mobile social network
While highly successful, today's online social networks (OSNs) have made a conscious decision to sacrifice privacy for availability and centralized control. Unfortunately, tradeoffs in this "walled garden" architecture naturally pit the economic ...
MockDroid: trading privacy for application functionality on smartphones
MockDroid is a modified version of the Android operating system which allows a user to 'mock' an application's access to a resource. This resource is subsequently reported as empty or unavailable whenever the application requests access. This approach ...
The cyber-physical bike: a step towards safer green transportation
To improve road cycling safety, we present an approach that augments bicycles with video processing and computational capabilities. This Cyber-Physical bicycle system continuously monitors the environment behind the biker, automatically detects rear-...
Ikarus: large-scale participatory sensing at high altitudes
Sensor networks proved to be a useful research tool in the field of environmental monitoring. While first sensor deployments consisted of a relatively small number of static nodes, mobile sensor devices have attracted growing interest for large-scale ...
Undistracted driving: a mobile phone that doesn't distract
Distracted driving is a major problem that leads to unnecessary accidents and human casualties everywhere in the world. The ubiquity of mobile phones is one cause of distracted driving. In United States alone, operating mobile phones while driving has ...
The case for context-aware compression
- Xuan Bao,
- Trevor Narayan,
- Ardalan Amiri Sani,
- Wolfgang Richter,
- Romit Roy Choudhury,
- Lin Zhong,
- Mahadev Satyanarayanan
The proliferation of pictures and videos in the Internet is imposing heavy demands on mobile data networks. This demand is expected to grow rapidly and a one-fit-all solution is unforeseeable. While researchers are approaching the problem from different ...
Can deterministic replay be an enabling tool for mobile computing?
Deterministic record and replay is fast becoming a vital technology in desktop and server computing environments. Yet, the applicability of this technology to computation run on small, mobile devices such as cell phones has not yet been explored. We ...
Why are web browsers slow on smartphones?
We report the first work that examines the internals of web browsers on smartphones, using the WebKit codebase, two generations of Android smartphones, and webpages visited by 25 smart-phone users over three months. We make many surprising findings. ...
Sensor tricorder: what does that sensor know about me?
As rich sensing applications become pervasive, people increasingly find themselves with limited ability to determine what sensor data the applications are collecting about them and how the applications are using the sensor data. Openness and ...
FollowMe: enhancing mobile applications with open infrastructure sensing
Despite context-rich smartphone applications being adopted at an unprecedented rate, few use the data produced by the numerous cameras and microphones on walls and other fixed infrastructure. We present a system design called FollowMe aimed at letting ...
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
HotMobile '18 | 65 | 19 | 29% |
HotMobile '16 | 55 | 18 | 33% |
HotMobile '15 | 85 | 23 | 27% |
HotMobile '14 | 72 | 22 | 31% |
HotMobile '12 | 68 | 14 | 21% |
Overall | 345 | 96 | 28% |