skip to main content
10.1145/3508396acmconferencesBook PagePublication PageshotmobileConference Proceedingsconference-collections
HotMobile '22: Proceedings of the 23rd Annual International Workshop on Mobile Computing Systems and Applications
ACM2022 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
HotMobile '22: The 23rd International Workshop on Mobile Computing Systems and Applications Tempe Arizona March 9 - 10, 2022
ISBN:
978-1-4503-9218-1
Published:
09 March 2022
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN
Next Conference
Reflects downloads up to 27 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the twenty-third edition of the International Workshop on Mobile Computing Systems and Applications --- HotMobile 2022. This year continues the tradition of selective, highly interactive workshops that discuss the latest ideas in mobile systems and applications, along with new breakthroughs in underlying technologies. HotMobile's small workshop format makes it ideal for presenting and discussing new directions or controversial approaches.

Our technical program includes two keynotes by Daniel Schumacher, the Director of Digital Innovation at Komatsu and David Chu, the VP Engineering of Magic Leap, 18 technical papers, and a Demo & Poster session. The Program Committee of 18 scholars selected the 18 full papers out of 43 submissions, resulting in an acceptance rate of 42%. All submissions received at least four reviews, and some received five. A full-day PC meeting was held online to make the final decisions. Each accepted paper was shepherded by a PC member to help the authors improve their final paper. The PC members demonstrated a strong commitment to the selection process by submitting high-quality reviews and engaging in the discussions as well as the shepherding process, and we sincerely thank them for their valuable efforts. Accompanying the full papers are a set of posters and demonstrations of exciting early stage research from the community. Collectively, our program spans a range of interesting and important topics, which reflects the breadth and the quality of the research activities in the mobile computing field.

Skip Table Of Content Section
SESSION: Deep learning for computer vision/crowdsourcing
short-paper
Towards efficient vision transformer inference: a first study of transformers on mobile devices

Convolution neural networks (CNNs) have long been dominating the model choice in on-device intelligent mobile applications. Recently, we are witnessing the fast development of vision transformers, which are notable for the use of the self-attention ...

short-paper
Public Access
Understanding the potential of server-driven edge video analytics

The proliferation of edge video analytics applications has given rise to a new breed of streaming protocols which stream aggressively compressed videos to remote servers for compute-intensive DNN inference. One popular design paradigm of such protocols ...

short-paper
Open Access
A neural-based bandit approach to mobile crowdsourcing

Mobile crowdsourcing has long promised to utilize the power of mobile crowds to reduce the time and monetary cost required to perform large-scale location-dependent tasks, e.g., environmental sensing. Assigning the right tasks to the right users, ...

SESSION: Battery-free sensors/earables
short-paper
Logic-based intelligence for batteryless sensors

The emergence of embedded machine learning has enabled the migration of intelligence from the cloud to the edge and to the sensors. To explore the practicalities of wide-spread deployments of these intelligent sensors, we look beyond traditional ...

short-paper
Towards battery-free machine learning and inference in underwater environments

This paper is motivated by a simple question: Can we design and build battery-free devices capable of machine learning and inference in underwater environments? An affirmative answer to this question would have significant implications for a new ...

short-paper
Open Access
EarWalk: towards walking posture identification using earables

Stress on the knee --- caused by various factors including injuries, aging, and overweight --- is a major contributor to orthopedic disorders such as knee osteoarthritis (OA), a severe illness that can even lead to decreased ability to walk. One ...

SESSION: Physical and cyber security
short-paper
IntruSense: an enhanced physical security system using UWB

A wireless signal travels through various paths and reaches a receiver multiple times. These paths remain fairly stable in an undisturbed environment if nothing is moving in the space. However, if humans are present in such a space, reflections from ...

short-paper
A seamless second-factor verification as a mobility-service for future commute stations

Mass mobility services that facilitate simultaneous movement of several passengers by means of a bus or shared cabs, are becoming commonplace in several countries today. The main challenge faced by companies offering such services is the verification of ...

short-paper
Open Access
Malicious mmWave reconfigurable surface: eavesdropping through harmonic steering

The use of reconfigurable surfaces is emerging as a promising solution to tackle the blockage and coverage challenges in mmWave networks. However, if such a surface is controlled by an adversary, it could make the wireless network vulnerable to a ...

SESSION: Architectures for computer vision
short-paper
Open Access
Hybrid mobile vision for emerging applications

While mobile applications have greatly benefited from 2D computer vision algorithms such as object detection and classification, there is limited research on exploring 3D vision that is enabled by the increasing availability of depth cameras and LiDAR ...

short-paper
Open Access
Incremental perception on real time 3D data

Perception based on 3D data in autonomous vehicles (AV) pursues high accuracy at a high computational cost. It delays the downstream modules in an AV pipeline --- planning, prediction, and control. This prolongs the AV's time-to-decision and ultimately ...

short-paper
Public Access
A quantitative analysis of system bottlenecks in visual SLAM

Visual SLAM systems are concurrent, performance-critical systems that respond to real-time environmental conditions and are frequently deployed on resource-constrained hardware. Previous SLAM frameworks have primarily focused on algorithmic advances and ...

SESSION: Privacy/web browsing
short-paper
Open Access
Balancing privacy and serendipity in cyberspace

Unplanned encounters or casual collisions between colleagues have long been recognized as catalysts for creativity and innovation. The absence of such encounters has been a negative side effect of COVID-enforced remote work. However, there have also ...

short-paper
Implementing GDPR for mobile and ubiquitous computing

The General Data Protection Regulation (GDPR) presents directives to give data subjects control over their personal data. These directives impose data-collecting and processing organizations to take concrete actions for privacy preservation of users and ...

short-paper
Open Access
Reining in mobile web performance with document and permission policies

The quality of mobile web experience remains poor, partially as a result of complex websites and design choices that worsen performance, particularly for users on suboptimal networks or with low-end devices. Prior proposed solutions have seen limited ...

SESSION: mmWave/IoT
short-paper
Open Access
Networked beamforming in dense mmWave WLANs

Densely deployed base stations/access points (APs) are becoming increasingly common in mmWave networks with the need to provide high capacity and reliability to clients. However, frequent beamforming between clients and APs incurs an unacceptable ...

short-paper
Open Access
The internet of things still has a gateway problem

As the Internet of Things (IoT) has grown more prevalent, the gateway has become a critical linchpin of IoT network architectures. To bring constrained embedded devices online, Bluetooth Low Energy (BLE) has proven to be particularly popular for the low ...

short-paper
Open Access
5G in the sky: the future of high-speed internet via unmanned aerial vehicles

millimeter-wave (mmWave) technology provides new opportunities to support high throughput wireless applications by utilizing the high-frequency spectrum. However, due to the short wavelength and narrow beamwidth of mmWave signal, mmWave networks are ...

poster
Public Access
MilliCloud: beyond vision PCD generation using millimeter-wave

Existing 3D Point Cloud Data (PCD) generation systems based on RGB-D and LiDAR sensors require robust lighting and unobstructed field of views of target scenes. So, they cannot work properly under challenging environmental conditions. Recently, ...

poster
Public Access
MilliDrone: a drone platform to facilitate scalable survey of outdoor millimeter-wave signal propagation

Millimeter-Wave (mmWave) networks rely on small, short-range base-stations called “picocells,” which should be placed optimally to be effective. So, extensive surveying must be done in order to ensure there is no significant capacity loss. Existing ...

poster
Who is using the phone within the car?: blind device localization in a car with unimodal acoustic signature

The rapid usage of smartphones while driving is a significant concern leading to distracted driving behavior, causing severe accidents, as listed out by the US National Highway Traffic Safety Administration. Assessing the smartphone’s location inside ...

poster
Public Access
Establishing trust in vehicle-to-vehicle coordination: a sensor fusion approach

As we add more autonomous and semi-autonomous vehicles (AVs) to our roads, their effects on passenger and pedestrian safety are becoming more important. Despite extensive testing before deployment, AV systems are not perfect at identifying hazards in ...

poster
A universally composable bit generation scheme for zero involvement authentication

Context-based zero-involvement authentication and pairing (ZIA and ZIP) is a set of techniques that allow nearby devices to form self-organizing networks using authentication tokens derived from ambient environmental noise like electromagnetic radiation,...

Contributors
  • Arizona State University
  • University of Waterloo
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

Overall Acceptance Rate 96 of 345 submissions, 28%
YearSubmittedAcceptedRate
HotMobile '18651929%
HotMobile '16551833%
HotMobile '15852327%
HotMobile '14722231%
HotMobile '12681421%
Overall3459628%