CSCE 576

Mobile Computing and Applications

Spring 2018

[CSCE 576 Home Page] 


Week

Dates 

Topics

Assigned Papers
(See course bibliography)

Slides

1

Jan 15 - 19

Intro to Mobile Systems and Platforms


Pervasive Computing: Vision and Challenges[PDF]
Satyanarayanan et al., IEEE Personal Communications, 2001. 

Revisiting Satya's Vision and Challenges[PDF]
Maria R. Ebling, IBM T.J. Watson Research Center, Pervasive Computing, 2016. 

Lecture 1

2

Jan 22 - 26

No class on M. L. King Day 

Mobile platforms

Mobile Platforms and Development Environments[PDF]
Helal et al., Synthesis Lectures on Mobile and Pervasive Computing, Morgan & Claypool Publishers 

A comparison of two programming models for pervasive computing[PDF]
Yang et al., SAINT-W, 2006 

Lecture 2

3

Jan 29 - Feb 3

Mobile Sensing

Route Planning with Real-Time Traffic Predictions[PDF]
Liebig et al., Information Systems, 2017 

Invisible Sensing of Vehicle Steering with Smartphones[PDF]
Chen et al., MobiSys 2015. 

Opportunistic and Context-aware Affect Sensing on Smartphones: The Concept, Challenges and Opportunities [PDF]
Rana et al., Pervasive Computing, 2016

GeoServ: A Distributed Urban Sensing Platform[PDF]
Ahnn et al., CCGrid 2011

TaskMe: Multi-Task Allocation in Mobile Crowd Sensing[PDF]
Liu et al., 2016 

Lecture 3

 

4

Feb 5 -  Feb 9

Virtualization and VM migration

VMWare. Virtualization Overview[PDF]
White paper, 2006

Just-in-Time Provisioning for Cyber Foraging[PDF]
Ha et al., MobiSys 2013.

SnowFlock: Virtual Machine Cloning as a First-Class Cloud Primitive[PDF]
Lagar-Cavilla et al., ACM Trans. Comput. Syst., 2011. 

The Case for VM-Based Cloudlets in Mobile Computing[PDF]
Satyanarayanan et al., IEEE Pervasive Computing, 2009.

Lecture 4

5

Feb 12 - Feb 16

Mardi Gras- no classes

Have Fun!


6

Feb 19 - 23

Ubiquitous data access

Ubiquitous data accessing method in IoT-based information system for emergency medical services[PDF]
Xu et al., IEEE Transactions on Industrial Informatics, 2014.

Improving Cloud Storage Usage Experience for Mobile Applications[PDF]
Bai et al., ACM SIGOPS, 2016. 

Data Staging on Untrusted Surrogates[PDF]
Flinn et al., f FAST 2003.

Disconnected Operation in the Coda File System[PDF]
James J. Kistler, M. Satyanarayanan, Mobile Computing, 1996.

7

Feb 26 - Mar 2

Internet of Things (IoT)

Internet-of-Things-Based Smart Environments: State of the Art, Taxonomy, and Open Research Challenges [PDF]
Ahmed et al., IEEE Wireless Communications, 2016.

Internet of Things: Objectives and Scientific Challenges [PDF]
Ma et al., Journal of Computer Science and Technology, 2011.

Internet of Things: A Review of Surveys Based on Context Aware Intelligent Services [PDF]
Gil et al., Sensors 2016.

Lecture 5

8

Mar 5 - 9

Project Checkpoint-1 Presentations

 


9

Mar 12 - 16

Discovery & lookup, Geolocation

Privacy, Discovery, and Authentication for the Internet of Things[PDF]
Wu et al., Springer, 2016.

Resource Discovery in Internet of Things: Current Trends and Future Standardization Aspects [PDF]
Datta et al., WF-IOT 2015.

Constrained Application Protocol for Internet of Things [PDF]
Xi Chen, 2014.



10

Mar 19 - 23

Context-awareness and localization

Location Systems: An Introduction to the Technology Behind Location Awareness[PDF]
Anthony LaMarca and Eyal de Lara, Synthesis Lectures on Mobile and Pervasive Computing, 2008. 

Context Aware Computing for The Internet of Things: A Survey[PDF]
Perera et al., IEEE COMMUNICATIONS SURVEYS & TUTORIALS, 2013. 

Survey of Wireless Geolocation Techniques [PDF]
Roxin et al., 2010. 



11

Mar 26 - 30

Security and Privacy

Privacy Management for Mobile Platforms -- A Review of Concepts and Approaches[PDF]
Stach et al., MdM 2013.

A Privacy Awareness System for Ubiquitous Computing Environments[PDF]
Marc Langheinrich, Ubicomp 2002.

Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT) [PDF]
Babar et al., Recent Trends in Network Security and Applications, 2010.



12

Apr 2 - 6

Easter/Spring Break - no classes

 



13

Apr 9 - 13

Authorization & Access Control

Context-Aware Authentication for the Internet of Things[PDF]
Habib et al., ICAS 2015.

CBDAC: Context-Based Dynamic Access Control Model Using Intuitive 5W1H for Ubiquitous Sensor Network [PDF]
Son et al. IJDSN 2015.

Novel Evaluation Criteria to Cloud Based Access Control Models[PDF]
Younis et al., IIT, 2015.


14

Apr 16 - 20

Cloud and Edge Computing

Advancing the State of Mobile Cloud Computing[PDF]
Bahl et al., MCS 2012.

MAUI: making smartphones last longer with code offload [PDF]
Eduardo Cuervo et al., MobiSys, 2010.

CloneCloud: Elastic Execution between Mobile Device and Cloud [PDF]
Byung-Gon Chun et al., EuroSys 2011.



15

Apr 23 - 27

Final Project Demonstrations and Poster

 




[ CMIX Home Page] 

School of Computing and Informatics, University of Louisiana at Lafayette

All contents copyright © 2018, Khalid Elgazzar.
All rights reserved.