- Sponsor:
- sigmobile
It is our great pleasure to welcome you to the twenty-third edition of the International Workshop on Mobile Computing Systems and Applications --- HotMobile 2022. This year continues the tradition of selective, highly interactive workshops that discuss the latest ideas in mobile systems and applications, along with new breakthroughs in underlying technologies. HotMobile's small workshop format makes it ideal for presenting and discussing new directions or controversial approaches.
Our technical program includes two keynotes by Daniel Schumacher, the Director of Digital Innovation at Komatsu and David Chu, the VP Engineering of Magic Leap, 18 technical papers, and a Demo & Poster session. The Program Committee of 18 scholars selected the 18 full papers out of 43 submissions, resulting in an acceptance rate of 42%. All submissions received at least four reviews, and some received five. A full-day PC meeting was held online to make the final decisions. Each accepted paper was shepherded by a PC member to help the authors improve their final paper. The PC members demonstrated a strong commitment to the selection process by submitting high-quality reviews and engaging in the discussions as well as the shepherding process, and we sincerely thank them for their valuable efforts. Accompanying the full papers are a set of posters and demonstrations of exciting early stage research from the community. Collectively, our program spans a range of interesting and important topics, which reflects the breadth and the quality of the research activities in the mobile computing field.
Proceeding Downloads
Towards efficient vision transformer inference: a first study of transformers on mobile devices
Convolution neural networks (CNNs) have long been dominating the model choice in on-device intelligent mobile applications. Recently, we are witnessing the fast development of vision transformers, which are notable for the use of the self-attention ...
Understanding the potential of server-driven edge video analytics
The proliferation of edge video analytics applications has given rise to a new breed of streaming protocols which stream aggressively compressed videos to remote servers for compute-intensive DNN inference. One popular design paradigm of such protocols ...
A neural-based bandit approach to mobile crowdsourcing
Mobile crowdsourcing has long promised to utilize the power of mobile crowds to reduce the time and monetary cost required to perform large-scale location-dependent tasks, e.g., environmental sensing. Assigning the right tasks to the right users, ...
Logic-based intelligence for batteryless sensors
The emergence of embedded machine learning has enabled the migration of intelligence from the cloud to the edge and to the sensors. To explore the practicalities of wide-spread deployments of these intelligent sensors, we look beyond traditional ...
Towards battery-free machine learning and inference in underwater environments
- Yuchen Zhao,
- Sayed Saad Afzal,
- Waleed Akbar,
- Osvy Rodriguez,
- Fan Mo,
- David Boyle,
- Fadel Adib,
- Hamed Haddadi
This paper is motivated by a simple question: Can we design and build battery-free devices capable of machine learning and inference in underwater environments? An affirmative answer to this question would have significant implications for a new ...
EarWalk: towards walking posture identification using earables
Stress on the knee --- caused by various factors including injuries, aging, and overweight --- is a major contributor to orthopedic disorders such as knee osteoarthritis (OA), a severe illness that can even lead to decreased ability to walk. One ...
IntruSense: an enhanced physical security system using UWB
A wireless signal travels through various paths and reaches a receiver multiple times. These paths remain fairly stable in an undisturbed environment if nothing is moving in the space. However, if humans are present in such a space, reflections from ...
A seamless second-factor verification as a mobility-service for future commute stations
Mass mobility services that facilitate simultaneous movement of several passengers by means of a bus or shared cabs, are becoming commonplace in several countries today. The main challenge faced by companies offering such services is the verification of ...
Malicious mmWave reconfigurable surface: eavesdropping through harmonic steering
The use of reconfigurable surfaces is emerging as a promising solution to tackle the blockage and coverage challenges in mmWave networks. However, if such a surface is controlled by an adversary, it could make the wireless network vulnerable to a ...
Hybrid mobile vision for emerging applications
While mobile applications have greatly benefited from 2D computer vision algorithms such as object detection and classification, there is limited research on exploring 3D vision that is enabled by the increasing availability of depth cameras and LiDAR ...
Incremental perception on real time 3D data
Perception based on 3D data in autonomous vehicles (AV) pursues high accuracy at a high computational cost. It delays the downstream modules in an AV pipeline --- planning, prediction, and control. This prolongs the AV's time-to-decision and ultimately ...
A quantitative analysis of system bottlenecks in visual SLAM
Visual SLAM systems are concurrent, performance-critical systems that respond to real-time environmental conditions and are frequently deployed on resource-constrained hardware. Previous SLAM frameworks have primarily focused on algorithmic advances and ...
Balancing privacy and serendipity in cyberspace
Unplanned encounters or casual collisions between colleagues have long been recognized as catalysts for creativity and innovation. The absence of such encounters has been a negative side effect of COVID-enforced remote work. However, there have also ...
Implementing GDPR for mobile and ubiquitous computing
The General Data Protection Regulation (GDPR) presents directives to give data subjects control over their personal data. These directives impose data-collecting and processing organizations to take concrete actions for privacy preservation of users and ...
Reining in mobile web performance with document and permission policies
The quality of mobile web experience remains poor, partially as a result of complex websites and design choices that worsen performance, particularly for users on suboptimal networks or with low-end devices. Prior proposed solutions have seen limited ...
Networked beamforming in dense mmWave WLANs
Densely deployed base stations/access points (APs) are becoming increasingly common in mmWave networks with the need to provide high capacity and reliability to clients. However, frequent beamforming between clients and APs incurs an unacceptable ...
The internet of things still has a gateway problem
As the Internet of Things (IoT) has grown more prevalent, the gateway has become a critical linchpin of IoT network architectures. To bring constrained embedded devices online, Bluetooth Low Energy (BLE) has proven to be particularly popular for the low ...
5G in the sky: the future of high-speed internet via unmanned aerial vehicles
millimeter-wave (mmWave) technology provides new opportunities to support high throughput wireless applications by utilizing the high-frequency spectrum. However, due to the short wavelength and narrow beamwidth of mmWave signal, mmWave networks are ...
MilliCloud: beyond vision PCD generation using millimeter-wave
Existing 3D Point Cloud Data (PCD) generation systems based on RGB-D and LiDAR sensors require robust lighting and unobstructed field of views of target scenes. So, they cannot work properly under challenging environmental conditions. Recently, ...
MilliDrone: a drone platform to facilitate scalable survey of outdoor millimeter-wave signal propagation
Millimeter-Wave (mmWave) networks rely on small, short-range base-stations called “picocells,” which should be placed optimally to be effective. So, extensive surveying must be done in order to ensure there is no significant capacity loss. Existing ...
Who is using the phone within the car?: blind device localization in a car with unimodal acoustic signature
The rapid usage of smartphones while driving is a significant concern leading to distracted driving behavior, causing severe accidents, as listed out by the US National Highway Traffic Safety Administration. Assessing the smartphone’s location inside ...
Establishing trust in vehicle-to-vehicle coordination: a sensor fusion approach
- Jakob Veselsky,
- Jack West,
- Isaac Ahlgren,
- George K. Thiruvathukal,
- Neil Klingensmith,
- Abhinav Goel,
- Wenxin Jiang,
- James C. Davis,
- Kyuin Lee,
- Younghyun Kim
As we add more autonomous and semi-autonomous vehicles (AVs) to our roads, their effects on passenger and pedestrian safety are becoming more important. Despite extensive testing before deployment, AV systems are not perfect at identifying hazards in ...
A universally composable bit generation scheme for zero involvement authentication
Context-based zero-involvement authentication and pairing (ZIA and ZIP) is a set of techniques that allow nearby devices to form self-organizing networks using authentication tokens derived from ambient environmental noise like electromagnetic radiation,...
Index Terms
- Proceedings of the 23rd Annual International Workshop on Mobile Computing Systems and Applications
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
HotMobile '18 | 65 | 19 | 29% |
HotMobile '16 | 55 | 18 | 33% |
HotMobile '15 | 85 | 23 | 27% |
HotMobile '14 | 72 | 22 | 31% |
HotMobile '12 | 68 | 14 | 21% |
Overall | 345 | 96 | 28% |