Exploiting social interactions in mobile systems

  • Authors:
  • Andrew G. Miklas;Kiran K. Gollu;Kelvin K. W. Chan;Stefan Saroiu;Krishna P. Gummadi;Eyal De Lara

  • Affiliations:
  • University of Toronto;University of Toronto;Google;University of Toronto;MPI for Software Systems;University of Toronto

  • Venue:
  • UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The popularity of handheld devices has created a flurry of research activity into new protocols and applications that can handle and exploit the defining characteristic of this new environment - user mobility. In addition to mobility, another defining characteristic of mobile systems is user social interaction. This paper investigates how mobile systems could exploit people's social interactions to improve these systems' performance and query hit rate. For this, we build a trace-driven simulator that enables us to re-create the behavior of mobile systems in a social environment. We use our simulator to study three diverse mobile systems: DTN routing protocols, firewalls preventing a worm infection, and a mobile P2P file-sharing system. In each of these three cases, we find that mobile systems can benefit substantially from exploiting social information.