skip to main content
10.1145/2342509.2342512acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free Access

SCAMPI: service platform for social aware mobile and pervasive computing

Published:17 August 2012Publication History

ABSTRACT

Allowing mobile users to find and access resources available in the surrounding environment opportunistically via their smart devices could enable them to create and use a rich set of services. Such services can go well beyond what is possible for a mobile phone acting alone. In essense, access to diverse resources such as raw computational power, social networking relationships, or sensor readings across a set of different devices calls for distributed task execution. In this paper, we discuss the SCAMPI architecture designed to support distributed task execution in opportunistic pervasive networks. The key elements of the architecture include leveraging human social behavior for efficient opportunistic interaction between a variety of sensors, personal communication devices and resources embedded in the local environment. The SCAMPI architecture abstracts resources as service components following a service-oriented model. This enables composing rich applications that utilize a collection of service components available in the environment.

References

  1. Boincoid project, http://boincoid.sourceforge.net.Google ScholarGoogle Scholar
  2. V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall, and H.Weiss. Delay-Tolerant Network Architecture. RFC 4838, April 2007.Google ScholarGoogle Scholar
  3. M. Conti, S. Giordano, M. May, and A. Passarella. From opportunistic networks to opportunistic computing. Comm. Mag., 48(9):126--139, Sept. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Conti and M. Kumar. Opportunities in opportunistic computing. Computer, 43(1):42--50, jan. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. T. Hossmann, F. Legendre, G. Nomikos, and T. Spyropoulos. Stumbl: Using facebook to collect rich datasets for opportunistic networking research. In Proceedings of IEEE WoWMoM'11, June 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. T. Hossmann, T. Spyropoulos, and F. Legendre. Putting contacts into context: mobility modeling beyond inter-contact times. In Proceedings of Mobihoc '11. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. P. Hui, A. Chaintreau, J. Scott, R. Gass, J. Crowcroft, and C. Diot. Pocket switched networks and human mobility in conference environments. In Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking, WDTN '05, pages 244--251, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Isaacman, S. Ioannidis, A. Chaintreau, and M. Martonosi. Distributed rating prediction in user generated content streams. In Proc. ACM RecSys, Oct 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Keränen, M. Pitkänen, M. Vuori, and J. Ott. Effect of non-cooperative nodes in mobile DTNs. In Proceedings of the Fifth IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC). IEEE, June 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. N. D. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A. T. Campbell. A survey of mobile phone sensing. Comm. Mag., 48(9):140--150, Sept. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Passarella and M. Conti. Characterising aggregate inter-contact times in heterogeneous opportunistic networks. In Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part II, NETWORKING'11, pages 301--313, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Passarella, M. Kumar, M. Conti, and E. Borgia. Minimum-delay service provisioning in opportunistic networks. IEEE Transactions on Parallel and Distributed Systems, 22:1267--1275, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Pitkanen, K. T., and J. Ott. Mobility and service discovery in opportunistic networks. In Proceedings of Permoby 2012, March 2012.Google ScholarGoogle ScholarCross RefCross Ref
  14. D. Puccinelli, O. Gnawali, S. Yoon, S. Santini, U. Colesanti, S. Giordano, and L. Guibas. The impact of network topology on collection performance. In Proceedings of the 8th European conference on Wireless sensor networks, EWSN'11, pages 17--32, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. K. K. Rachuri, C. Mascolo, M. Musolesi, and P. J. Rentfrow. SociableSense: Exploring the trade-offs of adaptive sampling and computation offloading for social sensing. In Proc. ACM MobiCom, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. U. Sadiq, M. Kumar, A. Passarella, and M. Conti. Modeling and simulation of service composition in opportunistic networks. In Proceedings of the 14th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems, MSWiM '11, pages 159--168, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. P. Shankar, W. Huang, P. Castro, B. Nath, and I. L. Crowds replace experts: Building better location-based services using mobile social network interactions. In IEEE Percom 2012, March 2012.Google ScholarGoogle ScholarCross RefCross Ref
  18. Z. Zhou and D. Huang. Efficient and secure data storage operations for mobile cloud computing. IACR Cryptology ePrint Archive, 2011:185, 2011.Google ScholarGoogle Scholar
  19. G. Zyba, G. M. Voelker, S. Ioannidis, and C. Diot. Dissemination in opportunistic mobile ad-hoc networks: The power of the crowd. In INFOCOM, pages 1179--1187. IEEE, 2011.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. SCAMPI: service platform for social aware mobile and pervasive computing

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MCC '12: Proceedings of the first edition of the MCC workshop on Mobile cloud computing
      August 2012
      72 pages
      ISBN:9781450315197
      DOI:10.1145/2342509

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 August 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate10of24submissions,42%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader