2016 17th IEEE International Conference on Mobile Data Management (MDM)

13-16 June 2016

Go

Filter Results

Displaying Results 1 - 25 of 33
  • [Front cover - Vol 2]

    Publication Year: 2016, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (18210 KB)
    Freely Available from IEEE
  • [Title page i - Vol 2]

    Publication Year: 2016, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • [Title page iii - Vol 2]

    Publication Year: 2016, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Message from the Advanced Seminar Co-Chairs

    Publication Year: 2016, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • Message from the Doctoral Colloquium Co-Chairs

    Publication Year: 2016, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Message from the Workshop Co-Chairs

    Publication Year: 2016, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (132 KB)
    Freely Available from IEEE
  • Message from the MobDM Workshop Co-Chairs

    Publication Year: 2016, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • Message from the ECAAS Workshop Co-Chairs

    Publication Year: 2016, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (134 KB)
    Freely Available from IEEE
  • Workshop Organization

    Publication Year: 2016, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Geometric Aspects and Auxiliary Features to Top-k Processing

    Publication Year: 2016, Page(s):1 - 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    Top-k processing is a well-studied problem with numerous applications that is becoming increasingly relevant with the growing availability of recommendation systems and decision making software on PCs, PDAs and smart-phones. The objective of this seminar is twofold. First, we will delve into the geometric aspects of top-k processing. Second, we will cover complementary features to top-k queries th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compression of Spatio-temporal Data

    Publication Year: 2016, Page(s):4 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (213 KB) | HTML iconHTML

    This paper presents an overview of the topics discussed in the advanced seminar on compressing spatio-temporal data. After a brief introduction and motivation, the first focused part of the seminar will address the fundamental techniques for spatio-temporal data compression and their impact on the error in the answers to different queries. Subsequently, a gentle expansion of the scope will address... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Computing, Internet of Things, and Big Data for Urban Informatics

    Publication Year: 2016, Page(s):8 - 11
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    Urban informatics is emerging as a new discipline for cities and governments to improve the lives of citizens using information technology. In this advanced seminar, we introduce the key challenges and opportunities in urban informatics, discuss topics in mobile computing, Internet of Things (IoT) and big data analytics, to advance the state-of-the-art in urban informatics and provide interesting ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social Influence Analysis Using Mobile Phone Dataset

    Publication Year: 2016, Page(s):12 - 17
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    In this paper, we perform social influence analysis using a massive mobile phone dataset with two applications that are salient to the success of Mobile Network Operators (MNO). More specifically, we identify the role of social influence in subscriber churn and smartphone adoption, by applying robust identification strategies to separate social influence from confounding factors such as homophily.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Event Detection: Monitoring and Tracking the Dynamics of Social Networks Communities

    Publication Year: 2016, Page(s):18 - 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (438 KB) | HTML iconHTML

    This paper presents research done towards a robust real-time social network text stream event detection system that combines text stream mining and network analysis methods. It presents the current state-of-the-art systems, algorithms, and methodologies to perform event detection in streaming environments: If from the point of view of a natural language processing, text mining, and unsupervised le... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social Network Analysis of Mobile Streaming Networks

    Publication Year: 2016, Page(s):20 - 25
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1021 KB) | HTML iconHTML

    Call data generated from mobile phones reflect a social network structure. Analyzing the topology, behavior and dynamics of such networks is one of the prevailing interests in network science. We propose to analyze call networks as a spatio-temporal evolutionary stream. Initially, we explored some of the dynamics of call activity in evolving call networks. To overcome the space and time limitation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal Task Assignment in Sensor Networks

    Publication Year: 2016, Page(s):26 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    Typical wireless sensor networks are based on resource constrained devices with certain limitations in terms of available energy, data processing capabilities and sensing. In order to maximize their potential to support the execution of complex tasks efficiently, algorithmic solutions that minimize the total energy spent are needed. In this paper, we are dealing with the important problem of minim... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Use of Autonomous UAVs to Improve Pesticide Application in Crop Fields

    Publication Year: 2016, Page(s):32 - 33
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3110 KB) | HTML iconHTML

    The population growth, increase of need for healthy food and concerns regarding wildlife protection put a strong demand in the improvement of agriculture productivity, reduction of the presence of pesticides in fruits and vegetables and of wildlife contamination. Agriculture production needs the application of pesticides to keep the necessary productivity levels. The use of autonomous aircrafts in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Framework for Chainsaw Detection Using One-Class Kernel and Wireless Acoustic Sensor Networks into the Amazon Rainforest

    Publication Year: 2016, Page(s):34 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    In this work we present a framework for automatic acoustic detection of chainsaw sounds to detect illegal wood extraction in the Amazon Rainforest. Our approach was developed to be embedded into the sensor nodes of a Wireless Acoustic Sensor Network (WASN) to monitor the environment. First, we represent each sound by a set of Mel-Frequency Cepstral Coefficients (MFCCs) and, after that, we fit a Pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Active Learning for On-Line Partial Discharge Monitoring in Noisy Environments

    Publication Year: 2016, Page(s):37 - 42
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (398 KB) | HTML iconHTML

    Partial discharge (PD) results from deterioration to the insulation of high voltage equipment in power grids, such as transformers, switch gears, and cable terminals. PD monitoring is a promising approach that ensures the reliable performance of electrical assets through condition based maintenance. Machine learning techniques have been successfully used to discover features and specific patterns ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolving Centralities in Temporal Graphs: A Twitter Network Analysis

    Publication Year: 2016, Page(s):43 - 48
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (421 KB) | HTML iconHTML

    In online social media systems users are not only posting, consuming, and sharing content, but also creating new and destroying existing connections in the underlying social network. This behavior lead us to investigate how user structural position reacts with the evolution of the underlying social network structure. While centrality metrics have been studied in the past, much less is known about ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mining the Twitter Stream: Unravel Events, Interactions, and Communities in Real-Time

    Publication Year: 2016, Page(s):49 - 54
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (634 KB) | HTML iconHTML

    Under the topic of event detection, this paper reviews and discuss different mining and visualization techniques that could provide good insights about how to detect real life events in the twitter stream: a lightweight event detection using wavelet signal analysis of hash tag occurrences in the twitter public stream, description of detected events using a Latent Dirichlet Allocation topic inferen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sampling Evolving Ego-Networks with forgetting Factor

    Publication Year: 2016, Page(s):55 - 59
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (468 KB) | HTML iconHTML

    Dynamically evolving networks get humongous in no time. Usually, sampling techniques are used to create representative specimens of such large scale socio-centric temporal networks. Likewise, the size of ego networks gets larger over a period of evolution. Which is why, there is a need to sample ego-centric networks while maintaining the importance and efficiency of the ego. In this paper, we pres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Challenges and Research Trend in Activity Recognition

    Publication Year: 2016, Page(s): 60
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB)

    Summary form only given. Recognising high-level human activities from low-level sensor data is a crucial driver for pervasive systems that wish to provide seamless and distraction-free support for users engaged in normal activities. Research in this area has grown alongside advances in sensing and communications, and experiments have yielded sensor traces coupled with ground truth annotations abou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.