skip to main content
10.1145/1085777.1085815acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobilehciConference Proceedingsconference-collections
Article

Three applications for mobile epidemic algorithms

Published: 19 September 2005 Publication History

Abstract

This paper presents a framework for the pervasive sharing of data using wireless networks. 'FarCry' uses the mobility of users to carry files between separated networks. Through a mix of ad-hoc and infrastructure-based wireless networking, files are transferred between users without their direct involvement. As users move to different locations, files are then transmitted on to other users, spreading and sharing information. We examine three applications of this framework. Each of these exploits the physically proximate nature of social gatherings. As people group together in, for example, business meetings and cafés, this can be taken as an indication of similar interests, e.g. in the same presentation or in a type of music. MediaNet affords sharing of media files between strangers or friends, MeetingNet shares business documents in meetings, and NewsNet shares RSS feeds between mobile users. NewsNet also develops the use of pre-emptive caching: collecting information from others not for oneself, but for the predicted later sharing with others. We offer observations on developing this system for a mobile, multi-user, multi-device environment.

References

[1]
Boden, D., and Molotch, H. L. (1994). The Compulsion of Proximity. pp. 257--286 in NowHere: space, time and modernity, edited by R. Friedland, & Boden, D, London & Berkeley CA: University of California Press.]]
[2]
A. Beaufour, M. Leopold, and P. Bonnet (2002) Smart-tag based data dissemination. In Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications (WSNA-02), pp. 68--77, New York, Sept. 28 2002. ACM Press.]]
[3]
Brown, B. Geelhoed, E., and Sellen A. (2001) Music Sharing as a Computer Supported Collaborative Application, In Proc. of ECSCW'01, pp. 179--198, Bonn, Germany, Kluwer Academic Publishers.]]
[4]
A. Demers, D. Greene, C. Houser, W. Irish, J. Larson, S. Shenker, H. Sturgis, D. Swinehart and D. Terry, Epidemic Algorithms for Replicated Database Maintenance, ACM SIGOPS Operating Systems Review, 22 (1988), pp. 8--32, ACM Press.]]
[5]
Esbjörnsson M., Juhlin O. and Östergren M. (2003) Motorbikers Using Hocman - Field Trials on Mobile Interaction. In Proceedings of the 5th International Mobile HCI 2003 Conference, Udine, Italy, Springer-Verlag.]]
[6]
A. Hayes and D. Wilson (2004) Peer-to-Peer Information Sharing in a Mobile Ad Hoc Environment, In Proceeding s of the Sixth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'04), pp. 154--162, Lake District National Park, United Kingdom, IEEE Computer Society.]]
[7]
S. Goel, M. Singh, D. Xu and B. Li, (2002) Efficient Peer-to-Peer Data Dissemination in Mobile Ad-Hoc Networks, 2002 International Conference on Parallel Processing Workshops (ICPPW'02), IEEE Computer Society, Vancouver, B.C., Canada, p. 152.]]
[8]
A. Khelil, C. Becker, J. Tian and K. Rothermel (2002) An epidemic model for information diffusion in MANETs, Proceedings of the 5th ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 54--60, September 2002, Atlanta, Georgia, USA, ACM Press.]]
[9]
E. Paulos and E. Goodman. (2004) The familiar stranger: anxiety, comfort, and play in public places. In Proceedings of the 2004 Conference on Human Factors in Computing Systems, pp. 223--230. ACM Press.]]
[10]
D. Sandler, A. Mislove, A. Post, P. Druschel (2005) FeedTree: Sharing Web micronews with peer-to-peer event notification, to appear in 4th International Workshop on Peer-To-Peer Systems, Ithaca, New York.]]
[11]
Dave Snowdon, Natalie Glance (1999) Pollen: Virtual Networks that use people as carriers, In Proceedings of Handheld and Ubiquitous Computing (HUC'99), pp 362--364, 27-29th September 1999, Karlsruhe, Germany.]]
[12]
J. Su, A. Chin, A. Popivanova, A. Goel and E. de Lar (2004), User Mobility for Opportunistic Ad-Hoc Networking, In Proceedings of the Sixth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'04), pp 41--50, Lake District National Park, United Kingdom, IEEE Computer Society.]]
[13]
A. Voida, R. Grinter, N. Ducheneaut, K. Edwards and M. Newman, Listening in: practices surrounding iTunes music sharing, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM Press, Portland, Oregon, USA, 2005, pp. 191--200.]]
[14]
Anonymous, Cachelogic (2005), The true picture of peer-to-peer filesharing, presentation available online at: http://www.cachelogic.com/research/index.php]]

Cited By

View all
  • (2017)A new routing algorithm based on opportunistic networksInternational Journal of Information and Communication Technology10.1504/IJICT.2017.08546311:1(81-93)Online publication date: 1-Jan-2017
  • (2011)An analytical model for multi-epidemic information disseminationJournal of Parallel and Distributed Computing10.1016/j.jpdc.2010.08.01071:1(87-104)Online publication date: 1-Jan-2011
  • (2010)Designing for crowdsProceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries10.1145/1868914.1868960(393-402)Online publication date: 16-Oct-2010
  • Show More Cited By

Index Terms

  1. Three applications for mobile epidemic algorithms

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    MobileHCI '05: Proceedings of the 7th international conference on Human computer interaction with mobile devices & services
    September 2005
    400 pages
    ISBN:1595930892
    DOI:10.1145/1085777
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 September 2005

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. ad-hoc networking
    2. file sharing
    3. peer-to-peer networks
    4. proximity-based sharing
    5. sociable sharing
    6. wireless

    Qualifiers

    • Article

    Conference

    MobileHCI05

    Acceptance Rates

    Overall Acceptance Rate 202 of 906 submissions, 22%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2017)A new routing algorithm based on opportunistic networksInternational Journal of Information and Communication Technology10.1504/IJICT.2017.08546311:1(81-93)Online publication date: 1-Jan-2017
    • (2011)An analytical model for multi-epidemic information disseminationJournal of Parallel and Distributed Computing10.1016/j.jpdc.2010.08.01071:1(87-104)Online publication date: 1-Jan-2011
    • (2010)Designing for crowdsProceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries10.1145/1868914.1868960(393-402)Online publication date: 16-Oct-2010
    • (2009)On the application of epidemical spreading in collaborative context-aware computingACM SIGMOBILE Mobile Computing and Communications Review10.1145/1508285.150829112:4(43-55)Online publication date: 20-Feb-2009
    • (2007)An epidemiological model for semantics disseminationProceedings of the 3rd international conference on Mobile multimedia communications10.5555/1385289.1385301(1-6)Online publication date: 27-Aug-2007
    • (2007)The performance impact of traffic patterns on routing protocols in mobile ad hoc networksComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2007.02.00951:12(3595-3616)Online publication date: 1-Aug-2007
    • (2006)Time to meet face-to-face and device-to-deviceProceedings of the 8th conference on Human-computer interaction with mobile devices and services10.1145/1152215.1152231(77-80)Online publication date: 12-Sep-2006

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media