English
 
User Manual Privacy Policy Disclaimer Contact us
  Advanced SearchBrowse

Item

ITEM ACTIONSEXPORT

Released

Conference Paper

Exploiting Social Interactions in Mobile Systems

MPS-Authors
/persons/resource/persons144524

Gummadi,  Krishna P.
Group K. Gummadi, Max Planck Institute for Software Systems, Max Planck Society;

External Ressource
No external resources are shared
Fulltext (public)
There are no public fulltexts stored in PuRe
Supplementary Material (public)
There is no public supplementary material available
Citation

Miklas, A. G., Gollu, K. K., Chan, K. K. W., Saroiu, S., Gummadi, K. P., & de Lara, E. (2007). Exploiting Social Interactions in Mobile Systems. In J. Krumm, G. D. Abowd, A. Seneviratne, & T. Strang (Eds.), UbiComp 2007: 9th International Conference, UbiComp 2007 (pp. 409-428). Berlin, Germany: Springer.


Cite as: http://hdl.handle.net/11858/00-001M-0000-0028-8C70-3
Abstract
The popularity of handheld devices has created a flurry of research activity into new protocols and applications that can handle and exploit the defining characteristic of this new environment – user mobility. In addition to mobility, another defining characteristic of mobile systems is user social interaction. This paper investigates how mobile systems could exploit people’s social interactions to improve these systems’ performance and query hit rate. For this, we build a trace-driven simulator that enables us to re-create the behavior of mobile systems in a social environment. We use our simulator to study three diverse mobile systems: DTN routing protocols, firewalls preventing a worm infection, and a mobile P2P file-sharing system. In each of these three cases, we find that mobile systems can benefit substantially from exploiting social information.