Help Privacy Policy Disclaimer
  Advanced SearchBrowse




Conference Paper

Exploiting Social Interactions in Mobile Systems


Gummadi,  Krishna P.
Group K. Gummadi, Max Planck Institute for Software Systems, Max Planck Society;

External Resource
No external resources are shared
Fulltext (restricted access)
There are currently no full texts shared for your IP range.
Fulltext (public)
There are no public fulltexts stored in PuRe
Supplementary Material (public)
There is no public supplementary material available

Miklas, A. G., Gollu, K. K., Chan, K. K. W., Saroiu, S., Gummadi, K. P., & de Lara, E. (2007). Exploiting Social Interactions in Mobile Systems. In J. Krumm, G. D. Abowd, A. Seneviratne, & T. Strang (Eds.), UbiComp 2007: 9th International Conference, UbiComp 2007 (pp. 409-428). Berlin, Germany: Springer.

Cite as: https://hdl.handle.net/11858/00-001M-0000-0028-8C70-3
The popularity of handheld devices has created a flurry of research activity into new protocols and applications that can handle and exploit the defining characteristic of this new environment – user mobility. In addition to mobility, another defining characteristic of mobile systems is user social interaction. This paper investigates how mobile systems could exploit people’s social interactions to improve these systems’ performance and query hit rate. For this, we build a trace-driven simulator that enables us to re-create the behavior of mobile systems in a social environment. We use our simulator to study three diverse mobile systems: DTN routing protocols, firewalls preventing a worm infection, and a mobile P2P file-sharing system. In each of these three cases, we find that mobile systems can benefit substantially from exploiting social information.