ahmed helmy computer and information science and engineering (cise) department

56
Ahmed Helmy Computer and Information Science and Engineering (CISE) Department University of Florida [email protected] , http://www.cise.ufl.edu/~helmy Founder & Director: Wireless Mobile Networking Lab http://nile.cise.ufl.edu Data-driven Modeling and Design of Networked Mobile Societies: A Paradigm Shift for Future Social Networking Funded by:

Upload: rhys

Post on 20-Jan-2016

29 views

Category:

Documents


0 download

DESCRIPTION

Data-driven Modeling and Design of Networked Mobile Societies: A Paradigm Shift for Future Social Networking. Ahmed Helmy Computer and Information Science and Engineering (CISE) Department University of Florida [email protected] , http://www.cise.ufl.edu/~helmy - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Ahmed HelmyComputer and Information Science and Engineering (CISE) Department

University of Florida

[email protected] , http://www.cise.ufl.edu/~helmy

Founder & Director: Wireless Mobile Networking Lab http://nile.cise.ufl.edu

Data-driven Modeling and Design of Networked Mobile Societies:

A Paradigm Shift for Future Social Networking

Funded by:

Page 2: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Networked Mobile Societies Everywhere, Anytime

Mobile Ad hoc, Sensor and Delay Tolerant Networks

Disaster & Emergency alerts

Transportation/Vehicular Networks Sensor Networks

Page 3: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Emerging Behavior-Aware Services

• Tight coupling between users, devices– Devices can infer user preferences, behavior– Capabilities: comm, comp, storage, sensing

• New generation of behavior-aware protocols– Behavior: mobility, interest, trust, friendship,… – Apps: interest-cast, participatory sensing, crowd

sourcing, mobile social nets, alert systems, …

New paradigms of communication?!

Page 4: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Paradigm Shift in Protocol Design

– May end up with suboptimal performance or failures due to lack of context in the design

Design general purpose protocols

Evaluate using models

(random mobility, traffic, …)

Deployment context: Modify to improve performance and failures for specific context

Analyze, model deployment context

Design ‘application class’-specific parameterized protocols

Utilize insights from context analysis to fine-tune protocol parameters

Used to:

Propose to:

Page 5: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Problem Statement• How to gain insight into deployment context?• How to utilize insight to design future services?

Approach• Extensive trace-based analysis to identify dominant

trends & characteristics• Analyze user behavioral patterns

– Individual user behavior and mobility

– Collective user behavior: grouping, encounters

• Integrate findings in modeling and protocol design– I. User mobility modeling – II. Behavioral grouping

– III. Information dissemination in mobile societies, profile-cast

Page 6: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

The TRACE framework

Analyze

Employ(Modeling, Protocol Design)

Characterize, Cluster

Represent

x1,1 L x1,n

M O M

x t,1 L x t ,n

Trace

MobiLib

Page 7: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Community-wide Wireless/Mobility Library• Library of

– Measurements from Universities, vehicular networks

– Realistic models of behavior (mobility, traffic, encounters)

– Simulation benchmarks - Tools for trace data mining• Available libraries:

– CRAWDAD (Dartmouth, ‘05-) crawdad.cs.dartmouth.edu MobiLib (USC & UFL, ’04-) nile.cise.ufl.edu/MobiLib

• 60+ Traces from: USC, Dartmouth, MIT, UCSD, UCSB, UNC, UMass, GATech, Cambridge, UFL, …

• Tools for mobility modeling (IMPORTANT, TVC), data mining

• Types of traces:– Campuses (WLANs), Conference AP and encounter traces– Municipal (off-campus) wireless APs, Bus & vehicular

Trace

Page 8: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

IMPACT: Investigation of Mobile-user Patterns Across University Campuses using WLAN Trace Analysis*

* W. Hsu, A. Helmy, “IMPACT: Investigation of Mobile-user Patterns Across University Campuses using WLAN Trace Analysis”, two papers at IEEE Wireless Networks Measurements (WiNMee), April 2006 and IEEE Transactions on Mobile Computing, 2010 (To appear).

- 4 major campuses – 30 day traces studied from 2+ years of traces- Total users > 12,000 users - Total Access Points > 1,300

Trace source

Trace duration

User type

Environment Collection method

Analyzed part

MIT 7/20/02 – 8/17/02

Generic 3 corporate buildings

Polling Whole trace

Dartmouth 4/01/01 – 6/30/04

Generic

w/ subgroup

University campus

Event-based July ’03

April ’04

UCSD 9/22/02 – 12/8/02

PDA only University campus

Polling 09/22/02- 10/21/02

USC 4/20/05 – 3/31/06

Generic University campus

Event-based

(Bldg)

04/20/05-05/19/05

Page 9: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Case study I – Individual MobilityT races

Ind iv idua luser m ob ility

O bserva tion

A pp lica tion

U ser g roupsin the

popu la tion

E ncoun terpa tte rns in

the ne tw ork

M obilitym odel

P ro file -castp ro toco l

S m allW orld -based

m essaged issem ination

M icroscop icbehav io r

M acroscop icbehav io r

Page 10: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Classification of Mobility Models

* F. Bai, A. Helmy, "A Survey of Mobility Modeling and Analysis in Wireles Adhoc Networks", Book Chapter in the book "Wireless Ad Hoc and Sensor Networks”, Kluwer Academic Publishers, June 2004.

Geographic Restriction

Spatial CorrelationTemporal

Correlation

Mobility Space

Page 11: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Spatio-temporal Mobility in WLANs

• Simple existing modelsare very differentfrom the spatio-temporal characteristics in WLANs

Characterize

Pro

b.(o

nlin

e ti

me

frac

tion

> x

)

On/off activity pattern

Periodic re-appearance

95% on-line time at 5 most visited APs

Periodic repetition peaks daily/weekly

Skewed location preference

Page 12: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

The TVC Model: Reproducing Mobility Characteristics

* Model-simplified: single community per node. Model-complex: multiple communities** Similar matches achieved for USC and Dartmouth traces

1 .E -0 6

1 .E -0 5

1 .E -0 4

1 .E -0 3

1 .E -0 2

1 .E -0 1

1 .E + 0 0

1 11 2 1 3 1 4 1 5 1 6 1 7 1 8 1 9 1AP sorted by to tal am ou n t o f tim e associated w ith it

M IT

M odel-sim plified

M odel-com plex

Ave

rage

frac

tion

of o

nlin

e tim

eas

soci

ated

with

the

AP

T im e g ap (d ay s)

Prob

.(Nod

e re

-app

ear a

t the

sam

eA

P af

ter t

he ti

me

gap)

0

0 .0 5

0 .1

0 .1 5

0 .2

0 .2 5

0 .3

0 2 4 6 8

M IT

M odel-sim plified

M odel-com plex

Skewed location visiting preference

Periodic re-appearance

CCDF

Time-Variant Community (TVC) Model:1- Assigns communities (locations) to users to re-produce location visiting preference2- Varies temporal assignment of communities to re-produce the periodic re-appearance

IEEE INFOCOM 2007IEEE/ACM Trans. on Networking 2009

Page 13: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

T races

Ind iv idua luser m ob ility

O bserva tion

A pp lica tion

U ser g roupsin the

popu la tion

E ncoun terpa tte rns in

the ne tw ork

M obilitym odel

P ro file -castp ro toco l

S m allW orld -based

m essaged issem ination

M icroscop icbehav io r

M acroscop icbehav io r

Case study II – Encounter Patterns

Page 14: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Case Study II: Goal

• Understand inter-node encounter patterns from a global perspective – How do we represent encounter patterns?– How do the encounter patterns influence network

connectivity and communication protocols?

• Encounter definition:– In WLAN: When two mobile nodes access the same

AP at the same time they have an ‘encounter’– In DTN: When two mobile nodes move within

communication range they have an ‘encounter’

Page 15: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

0.0001

0.001

0.01

0.1

1

0 0.2 0.4 0.6 0.8 1Fraction of user population (x)

Dart-03

Dart-04

USC

MITUCSD

Cambridge

Pro

b. (

uniq

ue e

ncou

nter

fra

ctio

n >

x)

Pro

b. (

tota

l enc

ount

er e

vent

s >

x)

CCDF of unique encounter count CCDF of total encounter count

•In all the traces, the MNs encounter a small fraction of the user population.

• A user encounters 1.8%-6% on average of the user population

•The number of total encounters for the users follows a BiPareto distribution.

Observations: Nodal Encounters

W. Hsu, A. Helmy, “On Nodal Encounter Patterns in Wireless LAN Traces”, IEEE Transactions on Mobile Computing (TMC), To appear

Page 16: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

The Encounter graph• Vertices: mobile nodes, Edges: node encounters

Represent

ntt

n

xx

xx

,1,

,11,1

Daily encounter graphs for MIT trace

Page 17: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Av. Path Length

Clustering Coefficient (CC)

Small Worlds of Encounters

Nor

mal

ized

CC

an

d P

L

• The encounter graph is a Small World graph (high CC, low PL)

• Even for short time period (1 day) its metrics (CC, PL) almost saturate

• Encounter graph: nodes as vertices and edges link all vertices that encounter

Small World

Random graph

Regular graph

Page 18: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Information Diffusion in DTNs via Encounters

• Epidemic routing (spatio-temporal broadcast) achieves almost complete delivery

Unr

each

able

rat

io

(Fig: USC)

Robust to selfish nodes (up to ~40%)

Trace duration = 15 days

Robust to the removal of short encounters

Page 19: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

•Top-ranked friends form cliques and low-ranked friends are key to provide random links (short cuts) to reduce the degree of separation in encounter graph.

Encounter-graphs using Friends• Distribution for friendship index FI is exponential for all the traces

• Friendship between MNs is highly asymmetric

• Among all node pairs: < 5% with FI > 0.01, and <1% with FI > 0.4

Page 20: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

T races

Ind iv idua luser m ob ility

O bserva tion

A pp lica tion

U ser g roupsin the

popu la tion

E ncoun terpa tte rns in

the ne tw ork

M obilitym odel

P ro file -castp ro toco l

S m allW orld -based

m essaged issem ination

M icroscop icbehav io r

M acroscop icbehav io r

Case study III – Groups in WLAN

Page 21: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Case Study III: Goal

• Identify similar users (in terms of long run mobility preferences) from the diverse WLAN user population– Understand the constituents of the population

– Identify potential groups for group-aware service

• Classify users based on their mobility trends and location-visiting preferences– Traces studied: semester-long USC trace (spring 2006,

94days) and quarter-long Dartmouth trace (spring 2004, 61 days)

Page 22: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Representation of User Association Patterns

• Summarize user association per day by a vector– a = {aj : fraction of online time user i spends at APj on day d}

• Sum long-run mobility in “association matrix”

Represent

ntt

n

xx

xx

,1,

,11,1

-Office, 10AM -12PM-Library, 3PM – 4PM-Class, 6PM – 8PM

Association vector: (library, office, class) =(0.2, 0.4, 0.4)

W. Hsu, D. Dutta, A. Helmy, “Mining Behavioral Groups in WLANs”, ACM MobiCom ‘07

OfficeDorm

ntt

ji

xx

x

x

,1,

,

1,2

1.04.05.0

Each row represents thepercentage of time spent at

each location for a day

Each column corresponds to a location

An entry represents the percentage ofonline time during time day i at location j

Example association matrix to describe a given user’s location visiting preference

Page 23: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Eigen-behaviors & Behavioral Similarity Distance

• Eigen-behaviors (EB): Vectors describing maximum remaining power in assoc. matrix M (through SVD):

- Get Eigen-vectors:

- Get relative importance:

• Eigen-behavior Distance weighted inner products of EBs–

• Assoc. patterns can be re-constructed with low rank & error• For over 99% of users, < 7 vectors capture > 90% of M’s power

ji

jiji vuwwVUSim,

),(

- Get Eigen-values:

Page 24: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Similarity-based User Classification• Hierarchical clustering of similar behavioral groups• High quality clustering:

– Inter-group vs. intra-group distance

– Significance vs. random groups • 0.93 v.s. 0.46 (USC), 0.91 v.s. 0.42 (Dart)

– Unique groups based on Eigen Behaviors

0

0 .2

0 .4

0 .6

0 .8

1

0 0 .2 0 .4 0 .6 0 .8 1

In ter-g roupIn tra-g roupS eries3S eries4

D istan ce b e tw een u sers

CDF

A M V D E ig en -b eh av io rd is tan ce

Dartmouth

*AMVD = Average Minimum Vector Distance

Significance score of top eigen-behavior for

USC Dartmouth

Its own group 0.779 0.727

Other groups 0.005 0.004

Page 25: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

User Groups in WLAN - Observations• Identified hundreds of distinct groups of similar users• Skewed group size distribution –

– the largest 10 groups account for more than 30% of population on campus

– Power-law distributed of group sizes

• Most groups can be described by a list of locations with a clear ordering of importance

• Some groups visit multiple locations with similar importance –– taking the most important location for each user is not sufficient

U ser g roup size rank

Gro

up si

ze

1

1 0

1 0 0

1 0 0 0

1 1 0 1 0 0 1 0 0 0

D artm ou th5 4 0 *x^-0 .6 7U SC5 0 0 *x^-0 .7 5

Videos

Page 26: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

ModelsTraces

ModelsTraces

ModelsTraces

Behavioral Similarity: The Missing Link

Existing models produce behaviorally homogeneous users and lack the richnessof behavioral structure in real traces. Richer models are needed !

Page 27: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Behavioral Similarity Graphs

G. Thakur, A. Helmy, W. Hsu, “Similarity analysis and modeling of similarity in mobile societies: The missing link”, UF Tech Report, Jun 2010

Random and community models produce fully connected similarity graphs

Page 28: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Profile-cast: A New Communication ParadigmW. Hsu, D. Dutta, A. Helmy, ACM Mobicom 2007, WCNC 2008, Trans. Networking To appear

• Sending messages to others with similar behavior, without knowing their identity– Announcements to users with specific behavioral profile V

– Interest-based ads, similarity resource discovery

• For Delay Tolerant Networks (DTNs)

A

B

E

C

Is B similar to V?Is E similar to V? D?

Is C/D similar to V?

Payload Dest Address Payload Target Profile

Page 29: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Profile-cast Use Cases• Mobility-based profile-cast (Target mode)

– Targeting group of users who move in a particular pattern (lost-and-found, context-aware messages, moviegoers)

– Approach: use “similarity metric” between users

• Mobility-independent profile-cast (Dissemination mode)– Targeting people with a certain characteristics independent of mobility (classic music

lovers)– Approach: use “Small World” encounter patterns

Mobility space

S

DD

Scoped message spread in the mobility space

S

D

N

N

N

N

Forward??

Page 30: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Profile-cast Operation

2. Forwarding decision

S N

N

NN

1. profiling• Determining user similarity

– S sends Eigen behaviors for the virtual profile to N

– N evaluated the similarity by weighted inner products of Eigen-behaviors

– Message forwarded if Sim(U,V) is high (the goal is to deliver messages to nodes with similar profile)

– Privacy conserving: N and S do not send information about their own behavior

ji

jiji vuwwVUSim,

),(

Page 31: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Profile-cast CSI protocol: Target-mode

S Sim (BP(A), P(T)) = similarity of node’s behavioral profile to the target profile

Page 32: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

S

Mobility Profile-cast (intra-group)Goal

S

Epidemic

S

Group-spread

S

Single long random walk

S

Multiple short random walks

Page 33: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Mobility Profile-cast (inter-group)

S

T.P.

S

T.P.

Goal Epidemic

S

T.P.

Gradient-ascend

S

T.P.

Single long random walk

S

T.P.

Multiple short random walks

S

T.P.

Group-spread

Page 34: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Profile-cast Evaluation

* Results presented as the ratio to epidemic routing

- Over 96% delivery ratio – Over 98% reduction in overhead w.r.t. Epidemic- RW < 45% delivery - Strikes a near optimal balance between delivery, overhead and delay- Other variants (e.g., multi-copy, simulated annealing) under investigation

Video

Page 35: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Extending Interest, Behavior Beyond Mobility

• In addition to mobility, user’s web access and traffic patterns, applications used (among others) represent other dimensions of interest and behavior

• Further analysis of network measurements (e.g., Netflow) can reveal behavioral characteristics in these dimensions

• Netflow traces are 3 orders of magnitude larger than WLANs (WLANs: dozens of millions, Netflows: dozens of billions)

• New challenges in mining ‘big data’ to get information

Page 36: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

S. Moghaddam, A. Helmy, S. Ranka, M. Somaya, “Data-driven Co-clustering Model of Internet Usage in Large Mobile Societies”, UF Tech Report, May 2010

Page 37: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Web-usage Spatio-temporal multi-D Clustering

Clustering of Locations based on web access(similar locations coded with same color)

- Users can be consistently modeled using few (~10) clusters with disjoint profiles. - Access patterns from multiple locations show clustered distinct behavior.

Page 38: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

visitorsvisitorsMales Females

University Campus

FraternitySorority

tracestraces

Gender-based feature analysis in Campus-wide WLANsU. Kumar, N. Yadav, A. Helmy, Mobicom 2007, Crawdad 2007

- Able to classify users by gender using knowledge of campus map-Users exhibit distinct on-line behavior, preference of device and mobility based on gender-On-going Work

-How much more can we know? -What is the “information-privacy trade-off”?

Page 39: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Future Directions (Applications)

• Behavior aware push/caching services (targeted ads, events of interest, announcements)

• Caching based on behavioral prediction• Detecting abnormal user behavior & access patterns

based on previous profiles• Can we extend this paradigm to include social

aspects (trust, friendship, cooperation)?• Privacy issues and mobile k-anonymity• Participatory sensing, deputizing the community

Page 40: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

sensor

sensorsensor

sensor

sensor

sensor

sensorsensor

sensor

sensor

sensor

sensorsensor

sensor

sensor

sensor

sensorsensor

sensor

sensor

Disaster Relief (Self-Configuring) Networks

Page 41: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

On-going and Future Directions Utilizing mobility

– Controlled mobility scenarios• DakNet, Message Ferries, Info Station

– Mobility-Assisted protocols• Mobility-assisted information diffusion:

EASE, FRESH, DTN, $100 laptop

– Context-aware Networking• Mobility-aware protocols: self-configuring,

mobility-adaptive protocols

• Socially-aware protocols: security, trust, friendship, associations, small worlds

– On-going Projects• Next Generation (Boundless) Classroom

• Disaster Relief Self-configuring Survivable Networks

Page 42: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Real world group experiments (structural health monitoring)

sensor

sensorsensor

sensor

sensor

sensor

sensor sensor

sensor

sensor

sensorsensor

sensor

sensor

Instructor

WLAN/adhoc

WLAN/adhoc

sensor-adhoc

sensor-adhoc

sensor-adhoc

Multi-party conferenceTele-collaboration tools

WLAN/adhoc

Embedded sensor network

The Next Generation (Boundless) ClassroomStudents

-Integration of wired Internet, WLANs, Adhoc Mobile and Sensor Networks-Will this paradigm provide better learning experience for the students?

Challenges

Page 43: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Emerging Wireless & Multimedia Technologies

Protocols,Applications,

Services

Human Behavior

Mobility, Load

Dynamics

Future Directions: Technology-Human Interaction

The Next Generation Classroom

Page 44: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Human Behavior

Mobility, Load

Dynamics

Protocols,Applications,

Services

Emerging Wireless & Multimedia Technologies

Human Computer Interaction (HCI) & User Interface

Educational/Learning

Experience

Education

Psycology

CognitiveSciences

Mobility Models

Traffic Models

Protocol Design

Context-awareNetworking

Engineering

Application Development

Service Provisioning

Multi-Disciplinary Research

MeasurementsHow to Evaluate?

How to Capture?

How to Design?

Social Sciences

Page 45: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Thank you!

Ahmed Helmy [email protected]: www.cise.ufl.edu/~helmy

MobiLib: nile.cise.ufl.edu/MobiLib

Page 46: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Outline

• Ad Hoc, Sensor Networks & DTNs– The paradigm shift: trace-driven design

• The TRACE framework

• Small worlds of encounters

• Mining the mobile society: Similarity analysis

• Profile-cast

• Future directions

Page 47: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Background: Delay Tolerant Networks (DTN)

• DTNs are mobile networks with sparse, intermittent nodal connectivity

• Encounter events provide the communication opportunities among nodes

• Messages are stored and moved across the network with nodal mobility

A B

C

Page 48: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Regular Graph- High path length- High clustering

Random Graph - Low path length, - Low clustering

Small World Graph: Low path length, High clustering

0

0.2

0.4

0.6

0.8

1

0.0001 0.001 0.01 0.1 1

probability of re-wiring (p)

Clustering

Path Length

- In Small Worlds, a few short cuts contract the diameter (i.e., path length) of a regular graph to resemble diameter of a random graph without affecting the graph structure (i.e., clustering)

Graphs , Path Length and Clustering

[Helmy’03]

Page 49: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Markov O(2) Predictor Accuracy VoIP User Prediction Accuracy

-VoIP users are highly mobile and exhibit dramatic difference in behavior than WLAN users-Prediction accuracy drops from ave ~62% for WLAN users to below 25% for VoIP users

On Mobility & Predictability of VoIP & WLAN UsersJ. Kim, Y. Du, M. Chen, A. Helmy, Crawdad 2007

Work in-progress

Motivates-Revisiting mobility modeling-Revisiting mobility prediction

Page 50: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

– Singular value decomposition provides a summary of the matrix (A few eigen-behavior vectors are sufficient, e.g. for 99% of users at most 7 vectors describe 90% of power in the association matrix)

ntt

ji

n

xx

x

x

xxx

,1,

,

1,2

,12,11,1

Profile-cast Operation

• Profiling user mobility– The mobility of a node

is represented by an association matrix

S N

N

NN

1. profiling

Each row represents an association vector for a time slot

An entry represents the percentage of online time during time slot i at location j

Sum. vectors

Page 51: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Mobility Independent Profile-cast

S

SS

S S

Goal Flooding SmallWorld-based

Single long random walk Multiple short random walks

Page 52: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Thank you!

Ahmed Helmy [email protected]: www.cise.ufl.edu/~helmy

MobiLib: nile.cise.ufl.edu/MobiLib

Page 53: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Implementation Details (in progress)

Page 54: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Future Work– N-copy-per-clique in the “mobility space”

– We expect this to work because similarity in mobility leads to frequent encounters

S S

S

In terest sp ace M ob ility space P hysica l space

- D ifferen t legends rep resen t nodesw ith d iffe ren t m ob ility trends-W hite nodes d eno te the ta rge trec ip ien ts

0

0 .1

0 .2

0 .3

0 .4

0 .5

0 .6

0 .7

0 0 .2 0 .4 0 .6 0 .8 1U ser pa ir s im ila rity

Enco

unte

r Rat

io

Page 55: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Future Work– N-copy-per-clique in the “mobility space”

– Challenge: From mobility to interest and other classifications

S S

S

In terest sp ace M ob ility space P hysica l space

- D ifferen t legends rep resen t nodesw ith d iffe ren t m ob ility trends-W hite nodes d eno te the ta rge trec ip ien ts

Page 56: Ahmed Helmy Computer and Information Science and Engineering (CISE) Department

Netflow Trace Sample