Location-Based Services Petteri Nurmi, Ella Peltonen

Samankaltaiset tiedostot
Location-Based Services Petteri Nurmi

Capacity Utilization

TIEKE Verkottaja Service Tools for electronic data interchange utilizers. Heikki Laaksamo

7.4 Variability management

Efficiency change over time

The CCR Model and Production Correspondence

Network to Get Work. Tehtäviä opiskelijoille Assignments for students.

AYYE 9/ HOUSING POLICY

Uusi Ajatus Löytyy Luonnosta 4 (käsikirja) (Finnish Edition)

On instrument costs in decentralized macroeconomic decision making (Helsingin Kauppakorkeakoulun julkaisuja ; D-31)

On instrument costs in decentralized macroeconomic decision making (Helsingin Kauppakorkeakoulun julkaisuja ; D-31)

Innovative and responsible public procurement Urban Agenda kumppanuusryhmä. public-procurement

Information on preparing Presentation

LYTH-CONS CONSISTENCY TRANSMITTER

Other approaches to restrict multipliers

toukokuu 2011: Lukion kokeiden kehittämistyöryhmien suunnittelukokous

DIGITAL MARKETING LANDSCAPE. Maatalous-metsätieteellinen tiedekunta

Infrastruktuurin asemoituminen kansalliseen ja kansainväliseen kenttään Outi Ala-Honkola Tiedeasiantuntija

Augmented Reality (AR) in media applications

Results on the new polydrug use questions in the Finnish TDI data

HITSAUKSEN TUOTTAVUUSRATKAISUT

On instrument costs in decentralized macroeconomic decision making (Helsingin Kauppakorkeakoulun julkaisuja ; D-31)

Returns to Scale II. S ysteemianalyysin. Laboratorio. Esitelmä 8 Timo Salminen. Teknillinen korkeakoulu

7. Product-line architectures

Helsinki Metropolitan Area Council

Sisällysluettelo Table of contents

WAMS 2010,Ylivieska Monitoring service of energy efficiency in housing Jan Nyman,

MEETING PEOPLE COMMUNICATIVE QUESTIONS

WITNESS SUPPORT THE FINNISH EXPERIENCE

The role of 3dr sector in rural -community based- tourism - potentials, challenges

Choose Finland-Helsinki Valitse Finland-Helsinki

Data protection template

JA CHALLENGE Anna-Mari Sopenlehto Central Administration The City Development Group Business Developement and Competence

Mobile Sensing II Energy-Efficiency Petteri Nurmi Spring 2015

Microsoft Lync 2010 Attendee

LANSEERAUS LÄHESTYY AIKATAULU OMINAISUUDET. Sähköinen jäsenkortti. Yksinkertainen tapa lähettää viestejä jäsenille

Skene. Games Refueled. Muokkaa perustyyl. for Health, Kuopio

Welcome to. Finland Lahti Wellamo Community College. 11 December 2007

Miten koulut voivat? Peruskoulujen eriytyminen ja tuki Helsingin metropolialueella

Sähköjärjestelmän käyttövarmuus & teknologia Käyttövarmuuspäivä

Guidebook for Multicultural TUT Users

Perusoikeusbarometri. Panu Artemjeff Erityisasiantuntija

Land-Use Model for the Helsinki Metropolitan Area

Constructive Alignment in Specialisation Studies in Industrial Pharmacy in Finland

Tarua vai totta: sähkön vähittäismarkkina ei toimi? Satu Viljainen Professori, sähkömarkkinat

1. SIT. The handler and dog stop with the dog sitting at heel. When the dog is sitting, the handler cues the dog to heel forward.

Office 2013 ja SQL Server 2012 SP1 uudet BI toiminnallisuudet Marko Somppi/Invenco Oy

FinFamily PostgreSQL installation ( ) FinFamily PostgreSQL

A new model of regional development work in habilitation of children - Good habilitation in functional networks

IFAGG WORLD CUP I, CHALLENGE CUP I and GIRLS OPEN INTERNATIONAL COMPETITION 1 st 2 nd April 2011, Vantaa Finland

Sulautettu tietotekniikka Kimmo Ahola

16. Allocation Models

Informaatioteknologia vaikuttaa ihmisten käyttäytymiseen ja asenteisiin

ProAgria. Opportunities For Success

Data Quality Master Data Management

AKKREDITOITU TESTAUSLABORATORIO ACCREDITED TESTING LABORATORY VERKOTAN OY VERKOTAN LTD.

Valuation of Asian Quanto- Basket Options

Fighting diffuse nutrient load: Multifunctional water management concept in natural reed beds

Olet vastuussa osaamisestasi

Business Opening. Arvoisa Herra Presidentti Very formal, recipient has a special title that must be used in place of their name

xbox pelit need for speed underground 2 half life 2 luettelo xbox peleista grand theft auto san andreas run like hell max payne

dupol.eu - smart home product comparison

ReFuel 70 % Emission Reduction Using Renewable High Cetane Number Paraffinic Diesel Fuel. Kalle Lehto, Aalto-yliopisto 5.5.

Use of spatial data in the new production environment and in a data warehouse

Additions, deletions and changes to courses for the academic year Mitä vanhoja kursseja uusi korvaa / kommentit

BLOCKCHAINS AND ODR: SMART CONTRACTS AS AN ALTERNATIVE TO ENFORCEMENT

Alternative DEA Models

Smart specialisation for regions and international collaboration Smart Pilots Seminar

Co-Design Yhteissuunnittelu

Improving advisory services through technology. Challenges for agricultural advisory after 2020 Jussi Juhola Warsaw,

The Viking Battle - Part Version: Finnish

CASE POSTI: KEHITYKSEN KÄRJESSÄ TALOUDEN SUUNNITTELUSSA KETTERÄSTI PALA KERRALLAAN

MUSEOT KULTTUURIPALVELUINA

Exercise 1. (session: )

Paikkatiedon semanttinen mallinnus, integrointi ja julkaiseminen Case Suomalainen ajallinen paikkaontologia SAPO

Miksi Suomi on Suomi (Finnish Edition)

National Building Code of Finland, Part D1, Building Water Supply and Sewerage Systems, Regulations and guidelines 2007

Making diversity manageable. Miradore. Käytännön kokemuksia rahoituksen hakemisesta. Tiistai Technopolis Vapaudenaukio / Lappeenranta

The Finnish healthcare service grid and access in rural Finland

Voice Over LTE (VoLTE) By Miikka Poikselkä;Harri Holma;Jukka Hongisto

Särmäystyökalut kuvasto Press brake tools catalogue

KONEISTUSKOKOONPANON TEKEMINEN NX10-YMPÄRISTÖSSÄ

Indoor Environment

Kilpailutoiminta. Klo Kilpailutoiminnan turvallisuuskoulutus Timo Mustakallio Klo Kahvitauko. Kilpailutapahtumatrekisteri, koulutus

C++11 seminaari, kevät Johannes Koskinen

The BaltCICA Project Climate Change: Impacts, Costs and Adaptation in the Baltic Sea Region

computer are not up to the challenges of tomorrow. home desktop computer obselete.

FPGA-piirien käyttökohteet nyt ja tulevaisuudessa Tomi Norolampi

Erasmus Charter for Higher Education Hakukierros kevät 2013 Anne Siltala, CIMO

Scanfil Kannattavaa kasvua

General studies: Art and theory studies and language studies

Travel Getting Around

Increase of opioid use in Finland when is there enough key indicator data to state a trend?

JABRA. Juha Pieviläinen Channel Account Manager - Finland

Toimisto (5) HUOM. Komiteoiden ja seurantaryhmien kokoonpanot on esitetty SESKOn komitealuettelossa

F-SECURE TOTAL. Pysy turvassa verkossa. Suojaa yksityisyytesi. Tietoturva ja VPN kaikille laitteille. f-secure.com/total

Making use of BIM in energy management

Tietorakenteet ja algoritmit

Miehittämätön meriliikenne

Transport and Infrastructure what about the future? Professor Jorma Mäntynen Tampere University of Technology

Transkriptio:

Location-Based Services Petteri Nurmi, Ella Peltonen 3.11.2016 1

Questions How location-based services (LBS) operate and what kind of services there are currently available? What are the main challenges for LBS? What is an inference attack and what kind of countermeasures are available against it? What are duty cycling and sensor management? 3.11.2016 2

Location-Based Services (LBS) Computer applications that deliver information depending on the location of the device and user Local or global: works in a specific environment (e.g., campus) vs. everywhere (e.g., GPS navigation) Personal or collaborative: designed for single user (e.g., mobile maps) or multiple persons (e.g., participatory sensing) Typically require network access and infrastructure for measuring location information Location determination topic later during the course 3.11.2016 3

Architecture of LBS - Stakeholders Mobile client Runs the application/service on a mobile device Location system Responsible for determining the location of the device Position can be determined on the client or by infrastructure Service provider Provides the application/service E.g., advertising service Content provider Provides content within the application/service E.g., company that provides advertisements 3.11.2016 4

Lifecycle of LBS 1.Client requests the service for location sensitive information 2.Location system determines the location of the client (or uses latest estimate) 3.Request for information and current location sent to service provider that returns relevant information Typically data connectivity needed Optionally some information could be cached/stored on the client directly 3.11.2016 5

Categories of LBS - Emergency Services E911 (Enhanced 9-1-1) Locate where a call to an emergency number originates Strict guidelines regarding positioning accuracy and consistency: 50/100 meters 67% of times (handset/network-based) 150/300 meters 90% of times (handset/networkbased) E112 European equivalent of E911 No strict positioning requirements best effort with respect to technological possibilities of infrastructure 3.11.2016 6

Categories of LBS - Mobile Advertising Mobile marketing/advertising One of the most popular domains for LBS currently Push-based: advertisements delivered to the client terminal automatically Permission-based: require user s consent Pull-based: client requests for advertisements Different location-sensitive advertising approaches: Proximity-based: user s within close proximity pushed advertisement Profile-based: Routines detected by mining user s location history Coupons: discount vouchers delivered on the mobile device based on locations/shops visited (and profile) 3.11.2016 7

Categories of LBS - Mobile Advertising Foursquare (video 2010): https://youtu.be/qygymjpwblo 3.11.2016 8

Categories of LBS - Location-Based Games Game where the game play varies or evolves according to user s location Geocaching User searches for boxes that other users have hidden Treasure-hunt kind of game Boxes specified by coordinates Serious games Games that aim to achieve some desirable objective E.g., learning or achieving behavior change Example: Savannah, a location-based game that teaches children behavior of lions 3.11.2016 9

Categories of LBS - Location-Based Games Mixed reality games Games that consists of a virtual and physical reality Actions in the physical world affect the state of the game in virtual reality Example: PacLan / Pac-Manhattan: real-world versions of Pacman Example: Pokémon GO: catching pokemons in the wild Urban games Games that use the urban environment for gameplay 3.11.2016 10

Categories of LBS - Location-Based Games Real-world Pacman (2006): https://youtu.be/kjqxc9fbscy Pokémon GO (2016): https://youtu.be/3kvy5kyfhts 3.11.2016 11

Categories of LBS - Mobile Augmented Reality Live, direct or indirect view of a physical real-world environment that is augmented with virtual content Common example: see-through lens + virtual content Location needed for two purposes: Tracking the orientation and pose of the device (viewport that is being augmented) Tracking the location of the client for delivering suitable information Wide range of examples especially for outdoors: Tourist guides Interactions at a distance (e.g., architecture) 3.11.2016 12

Categories of LBS - Mobile Augmented Reality Augmented museum app (2013): https://youtu.be/nwgffytmodo Simple architecture example (2014): https://youtu.be/whug6ozdgly 3.11.2016 13

Categories of LBS - Navigation Systems System that assists people in the movement from one place to another Indoors: supermarkets, malls, airports, campus or office environments Outdoors: pedestrian navigation in cities or within large tourist sights Various ways to present route instructions Mobile maps (2D or 3D) Landmarks (verbal, auditory, visual, multimodal) Generally considered most effective way to present navigation instructions for pedestrian purposes 3.11.2016 14

Categories of LBS - Navigation Systems Hyondai navigator and driving guide (2015): https://youtu.be/izg89ov75qq 3.11.2016 15

Categories of LBS - Mobile Tourist Guides Mobile systems that provide assistance to tourists visiting a particular city or other location Cyberguide and Guide are examples of early prototypes of these systems Common functionalities include Map with information about interesting locations Navigation support Location-sensitive recommendations Also other variations: E.g., restaurant or other point-of-interest (POI) finders 3.11.2016 16

Categories of LBS - Mobile Tourist Guides Florance travel guide (2012): https://youtu.be/a90ddqzmgj4 3.11.2016 17

Categories of LBS - Participatory Sensing The concept of communities contributing sensory information to form a body of knowledge Mapping prices at different gas stations Nericell: mapping road conditions in India Active research area currently, examples of topics: Providing suitable incentives to participate in data collection Security and privacy Determining which users to ask to contribute to data collection 3.11.2016 18

Categories of LBS - Participatory Sensing GasBuddy (2016): https://youtu.be/ycroz0eq78e 3.11.2016 19

Challenges in LBS Lack of standards Phone manufacturers have different APIs Location-sensitive databases have different formats Positioning Tradeoff between power consumption and accuracy Lack of widely available indoor positioning solution Power consumption Sensing (including positioning), camera and Internet connectivity have high power consumption Privacy Possibility to deduce sensitive personal information 3.11.2016 21

Location Privacy Ability to prevent other parties from learning one s current or past location Beresford & Stajano, 2003 Special type of information privacy which concerns the claim of individuals to determine for themselves when, how and to what extent location information about them is communicated to others Duckham & Kulik, 2006 3.11.2016 22

Location Privacy Inference Attack An approach that aims to discover sensitive private information from location data Detect patterns in location data Cross-correlate patterns with other data sources Home and workplace detection Place detection (discussed later on the course) can be used to identify places where person stays regularly Correlations with time can be used to determine home and workplace for over 80% of individuals Home address detection also examined in the context of GPS traces from drivers 3.11.2016 23

Location Privacy Inference Attack Gruteser and Hoh: completely anonymized GPS data from multiple (3 and later 5) users Clustering can be used to reconstruct original traces of each user with high accuracy despite anonymization Wilson and Atkeson: Presence sensors within a smart home (motion detectors, pressure mats, ) Observations from any single sensor not sufficient for detecting identity Patterns in sensor triggering sequences could be used to determine who in the house was where (around 85% accuracy) 3.11.2016 24

Location Privacy Countermeasures 1.Regulatory strategies: governmental rules on the use of personal information 2.Privacy policies: trust-based agreements between individuals 3.Anonymity: use a pseudonym or create ambiguity by grouping people together 4.Obfuscation: reduce the quality of location information First two are manual enforcement techniques Last two are computational privacy measures 3.11.2016 25

Location Privacy Anonymity Basic idea to replace associated name with a pseudonym or other untraceable identifier Naïve approach: change pseudonyms regularly to reduce risk of learning about habits Clustering can be used to detect which pseudonyms belong together, at least when data from only few individuals K-Anonymity: instead of reporting the location of a person, report a region containing k-1 people Additional information, such as patterns in service requests, could be used to break k-anonymity Historical k-anonymity : inject ambiguity into additional information as well 3.11.2016 26

Location Privacy K-Anonymity The protection provided by k-anonymity sensitive to Choice of the value of k The positions of the entities K-anonymity can be extended to protect the identify of the person who initiated location request 3.11.2016 27

Location Privacy Mix Zones Application zones: Areas where location-based services are used User s location reported Mix zones Areas between the application zones User given a new, unused pseudonym when transferring from application zone to mix zone 3.11.2016 28

Location Privacy Spatial and Temporal Degradation Alternative countermeasure is to degrade the quality of location measurements Adding white noise to measurements Random samples from a zero-mean Gaussian Standard deviation determines extent of noise 3.11.2016 29

Location Privacy Spatial and Temporal Degradation Temporal degradation: Increasing time between location reports Cloaking Removing data from certain locations (spatial) and/or from certain times (temporal) 3.11.2016 30

Location Sensing Nowadays most location-based services (apps) operate in a continuous (and sustained) mode I.e., location data continually collected and analyzed Resource-efficiency a critical constraint High CPU or I/O load can hinder other applications Location sensing drain battery, forcing users to charge the phone more often Usability concerns Consistency of the application performance Accuracy, particularly when the user interface is adapted based on them 3.11.2016 31

Energy-Efficiency Continuous location sensing and reporting consumes significant amounts of energy Approaches for location sensing vary significantly in terms of power consumption Typically: GPS > WiFi > Inertial > Accelerometer > GSM Main ways to reduce power consumption: Duty cycling: reduce sensing frequency Sensor management: use low-power sensors whenever possible Intelligent uploading: reducing reporting (data connectivity) frequency Offloading: perform (parts of) computations elsewhere 3.11.2016 32

Energy-Efficiency for Location Sensing Savings in power consumption often come at the expense of location accuracy Potential solution is to optimize energy consumption for a given error threshold E Reduce power consumption as much as possible Guarantee that location accuracy never (or seldom) exceeds the error threshold E Monitoring of location related information referred to as tracking 3.11.2016 33

Energy-Efficiency Location Tracking Position tracking: Estimate and report new position only when position error cannot guaranteed to be within error threshold Can be understood as a circle of uncertainty around the last reported location Trajectory tracking: Report information about the user s trajectory when error of the trajectory exceeds a threshold Error corridor around actual trajectory Buddy tracking: Report entrance/departure of a friend from close proximity 3.11.2016 34

Duty Cycling Duty cycling reduces sampling by alternating between idle and active states of the sensor Duty cycle = percentage of period where a signal is active D = T / P * 100% where T is active time and P is the period of the signal Sampling sensor for one minute each five minutes thus corresponds to a 20% duty cycle Need to be carefully designed Going from lower sampling state to higher typically has an additional activation cost Moving from a high state to a lower state often has delay - need sufficiently long inactive states to save energy 3.11.2016 35

Duty Cycling Example Motion Tracking Duty cycling schemes can be rather sophisticated Example: GPS duty cycling for location reporting Assume location needs to be reported every 100m Given current speed of user v m/s (from last GPS), the next time GPS needs to be sampled (latest) is 100 / v Can also incorporate errors, e.g., if GPS error is E m, the next sample should be within (100 E) / v Error threshold Estimated error since last position update Estimated speed of the user 3.11.2016 36

Sensor Substitution / Replacement Often multiple sensors can be used to measure the same phenomena WiFi/GPS/GSM all provide location information Accelerometer and GPS can be used to estimate speed Energy-accuracy trade-off The more accurate information is required, the more energy heavy sensor (usually) needs to be used Sensor substitution/replacement a generic technique whereby a sensor is replaced with another (less power hungry) one 3.11.2016 37

Active / Inactive State Detection Users tend to spend the majority of times within few locations ( 50+% of time at either home or work) During these periods users mainly stationary - can let sensors sleep until something happens Activity spotting: determine if any activity (of interest) is taking place Most common strategy is to consider the variance of accelerometer magnitude Another example is monitoring the stability of WiFi / audio environment Special case of sensor substitution 3.11.2016 38

Active / Inactive State Detection: Example Example data from a walking segment Blue line: accelerometer magnitude, i.e., i x i Stationary periods clearly distinguishable as periods of low variance 3.11.2016 39

Sensor Substitution Example Heading-Aware Tracking Compass heading can be used to reduce need for GPS when user is moving along a straight line Assume constant velocity Position estimated using accumulated orthogonal distance (discussed later during the course) Position update triggered when error estimate exceeds the tracking threshold 3.11.2016 40

Intelligent Uploading Duty cycling network transmissions Reduce frequency of data transmissions from the mobile client Basic uploading strategies Continuous: send data all the time (only realistic for ondemand sensing with low sampling rates) Periodic: schedule uploads at regular intervals Interval determines sampling frequency of reporting Event-based: upload when a given event occurs Error-based: upload when an error threshold exceeded Position tracking: use position error as measure Trajectory tracking: use trajectory reconstruction error 3.11.2016 41

Energy-Efficiency for Buddy Tracking Trigger update (or alert) whenever another user (or friend) comes (or leaves) the vicinity of an user Strips algorithm 1.Exchange location messages between devices 2.For each pair of devices (a,b), determine a strip S(a,b) along which all points are equally far from a and b 3.If a or b violate the strip S(a,b), they exchange location information If within close vicinity, trigger entrance If not within close vicinity, redefine the strip S(a,b) 3.11.2016 42

Energy-Efficiency Buddy Tracking 3.11.2016 43

Summary Location-based services Computer applications that deliver information depending on the location of the user and/or device Require access and to network and location information Client, location system, service provider, content provider Location privacy Privacy that concerns ability to determine when, how, and to which extent location information is communicated Location Inference attack Computational approach that attempts to discover sensitive personal data from location traces 3.11.2016 44

Summary Computational countermeasures Anonymity: k-anonymity, mixed zones Obfuscation: cloaking, noising, temporal degradation Energy-efficiency Duty cycling: reducing sampling rate Sensor management: using low power sensors when possible Uploading policies: reduce time span when location reported Tracking: position, trajectory and buddy tracking 3.11.2016 45

Literature Location-Based Services Raper, J.; Gartner, G.; Karimi, H. & Rizos, C., A critical evaluation of location based services and their potential, Journal of location based services, 2007, 1, 5-45 Capin, T.; Pulli, K. & Akenine-Möller, T., The State of the Art in Mobile Graphics Research, IEEE Comput. Graph. Appl., IEEE Computer Society Press, 2008, 28, 74-84 Takacs, G.; Chandrasekhar, V.; Gelfand, N.; Xiong, Y.; Chen, W.-C.; Bismpigiannis, T.; Grzeszczuk, R.; Pulli, K. & Girod, B., Outdoors augmented reality on mobile phone using loxel-based visual feature organization, MIR '08: Proc. of the 1st ACM international conference on Multimedia information retrieval, ACM, 2008, 427-434 Benford, S.; Crabtree, A.; Flintham, M.; Drozd, A.; Anastasi, R.; Paxton, M.; Tandavanitj, N.; Adams, M. & Row-Farr, J., Can You See Me Now? ACM Transactions on Computer-Human Interaction, 2006, 13, 100-133 Aalto, L.; Göthlin, N.; Korhonen, J. & Ojala, T. Bluetooth and WAP Push Based Location-Aware Mobile Advertising System Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys), ACM, 2004 3.11.2016 46

Literature Location-Based Services Barwise, P. & Strong, C., Permission-Based Mobile Advertising Journal of Interactive Marketing, 2002, 16, 14-24 Baus, J.; Krüger, A. & Wahlster, W., A resource-adaptive mobile navigation system Proceedings of the 7th international conference on Intelligent user interfaces (IUI), ACM, 2002, 15-22 Krüger, A.; Baus, J.; Heckmann, D.; Kruppa, M. & Wasinger, R., Brusilovsky, P.; Adaptive Mobile Guides, The Adaptive Web, Springer, 2007, 4321, 521-549 Abdelzaher, T.; Anokwa, Y.; Boda, P.; Burke, J.; Estrin, D.; Guibas, L.; Kansal, A.; Madden, S. & Reich, J., Mobiscopes for Human Spaces, IEEE Pervasive Computing, 2007, 6, 20-29 Miller, B. N.; Konstan, J. A. & Riedl, J., PocketLens: Towards a Personal Recommender System, ACM Transactions on Information Systems, 2004, 22, 437-476 Nurmi, P.; Salovaara, A.; Bhattacharya, S.; Pulkkinen, T. & Kahl, G., Influence of Landmark-Based Navigation Instructions on User Attention in Indoor Smart Spaces Proceedings of the 15th International Conference on Intelligent User Interfaces (IUI), ACM Press, 2011, 96-105 3.11.2016 47

Literature Computational Location Privacy Krumm, J., A survey of computational location privacy, Personal and Ubiquitous Computing, 2009, 13, 391-399 Gruteser, M. & Hoh, B., On the Anonymity of Periodic Location Samples Proceedings of the 2nd International Conference on Security in Pervasive Computing (SPC), 2005 Hoh, B. & Gruteser, M., Protecting Location Privacy Through Path Confusion, Proc. of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm), IEEE, 2005, 194-205 Krumm, J., Inference Attacks on Location Traces, Proceedings of the 5th International Conference on Pervasive Computing (PERVASIVE), Springer, 2007 Hoh, B.; Gruteser, M.; Xiong, H. & Alrabady, A. Preserving privacy in GPS traces via uncertainty-aware path cloaking Proceedings of the 14th ACM conference on Computer and communications security (CCS), ACM, 2007, 161-171 Wilson, D. & Atkeson, C., Simultaneous Tracking and Activity Recognition (STAR) Using Many Anonymous, Binary Sensors, Proceedings of the 3rd International Conference on Pervasive Computing (PERVASIVE), Springer, 2005, 3468 3.11.2016 48

Literature Energy-Efficiency Kjærgaard, M. B.; Bhattacharya, S.; Blunck, H. & Nurmi, P., Energy-efficient Trajectory Tracking for Mobile Devices, Proceedings of the 9th International Conference on Mobile Systems, Applications and Services (MobiSys), 2011 Amir, A.; Efrat, A.; Myllymaki, J.; Palaniappan, L. & Wampler, K. Buddy tracking an efficient proximity detection among mobile friends Pervasive and Mobile Computing, 2007, 3, 489-511 Wang, Y.; Lin, J.; Annavaram, M.; Jacobson, Q. A.; Hong, J.; Krishnamachari, B. & Sadeh, N., A framework of energy efficient mobile sensing for automatic user state recognition, Proceedings of the 7th international conference on Mobile systems, applications, and services (MobiSys'09), 2009, 179-192 Kjærgaard, M. B.; Langdal, J.; Godsk, T. & Toftkjær, T., EnTracked: energy-efficient robust position tracking for mobile devices. Proc. of the 7th international conference on Mobile systems, applications, and services (MobiSys'09), 2009, 221-234 Paek, J.; Kim, J. & Govindan, R., Energy-efficient rate-adaptive GPS-based positioning for smartphones. Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services (MobiSys 2010), 2010, 299-314 3.11.2016 49