Learn More
he mobile social networking revolution is upon us and could have as profound an effect in enriching local social interaction as the Internet has had in enriching online information access and discourse. The key observation in this article is that the explosive phenomenon of online social networks can be harnessed using mobile devices to answer the(More)
Group recommendation, which makes recommendations to a group of users instead of individuals, has become increasingly important in both the workspace and people's social activities, such as brainstorming sessions for coworkers and social TV for family members or friends. Group recommendation is a challenging problem due to the dynamics of group memberships(More)
—Social network information is now being used in ways for which it may have not been originally intended. In particular, increased use of smartphones capable of running applications which access social network information enable applications to be aware of a user's location and preferences. However, current models for exchange of this information require(More)
Social network information is now being used in ways for which it may have not been originally intended. In particular , increased use of smartphones capable of running applications which access social network information enable applications to be aware of a user's position and preferences. However, current models for exchange of this information require(More)
Traffic anomalies and distributed attacks are commonplace in today's networks. Single point detection is often insufficient to determine the causes, patterns and prevalence of such events. Most existing distributed intrusion detection systems (DIDS) rely on centralized fusion, or distributed fusion with unscalable communication mechanisms. In this paper, we(More)
The bacteriophage population is large, dynamic, ancient, and genetically diverse. Limited genomic information shows that phage genomes are mosaic, and the genetic architecture of phage populations remains ill-defined. To understand the population structure of phages infecting a single host strain, we isolated, sequenced, and compared 627 phages of(More)
This paper presents a vision of mobile-cloud computing systems which looks beyond simply moving data processing from mobile to cloud computing systems and considers a larger vision in which services within the cloud are aggre-gated and automatically integrated in real-time, based on context, to satisfy the intentions of mobile computing applications. We(More)
—Our experiences deploying a wide area wireless sensor network (WSN) in the wildfires of Idaho motivate the need for a software middleware system capable of remotely managing many sensor nodes deployed in widely disparate geographic regions. This requirement is unlike the localized focus of many traditional WSN middleware systems, which manage a group of(More)
—Traditional approaches to K-anonymity provide privacy guarantees over publicly released data sets with specified quasi-identifiers. However, the most common public releases of personal data are now done through social networks and their APIs, which do not fit the previous research-centric data set release model, nor do they allow for clear assumptions(More)
In this paper, we identify mobile social networks as an important new direction of research in mobile computing, and show how an expanded definition of mobile social networks that includes sensor networks can enable exciting new context-aware applications, such as context-aware video screens, music jukeboxes, and mobile health applications. We offer(More)