-
Automatic Extraction of Urban Outdoor Perception from Geolocated Free-Texts
Authors:
Frances Santos,
Thiago H Silva,
Antonio A F Loureiro,
Leandro Villas
Abstract:
The automatic extraction of urban perception shared by people on location-based social networks (LBSNs) is an important multidisciplinary research goal. One of the reasons is because it facilitates the understanding of the intrinsic characteristics of urban areas in a scalable way, hel** to leverage new services. However, content shared on LBSNs is diverse, encompassing several topics, such as p…
▽ More
The automatic extraction of urban perception shared by people on location-based social networks (LBSNs) is an important multidisciplinary research goal. One of the reasons is because it facilitates the understanding of the intrinsic characteristics of urban areas in a scalable way, hel** to leverage new services. However, content shared on LBSNs is diverse, encompassing several topics, such as politics, sports, culture, religion, and urban perceptions, making the task of content extraction regarding a particular topic very challenging. Considering free-text messages shared on LBSNs, we propose an automatic and generic approach to extract people's perceptions. For that, our approach explores opinions that are spatial-temporal and semantically similar. We exemplify our approach in the context of urban outdoor areas in Chicago, New York City and London. Studying those areas, we found evidence that LBSN data brings valuable information about urban regions. To analyze and validate our outcomes, we conducted a temporal analysis to measure the results' robustness over time. We show that our approach can be helpful to better understand urban areas considering different perspectives. We also conducted a comparative analysis based on a public dataset, which contains volunteers' perceptions regarding urban areas expressed in a controlled experiment. We observe that both results yield a very similar level of agreement.
△ Less
Submitted 13 October, 2020;
originally announced October 2020.
-
Leveraging the Self-Transition Probability of Ordinal Pattern Transition Graph for Transportation Mode Classification
Authors:
I. Cardoso-Pereira,
J. B. Borges,
P. H. Barros,
A. F. Loureiro,
O. A. Rosso,
H. S. Ramos
Abstract:
The analysis of GPS trajectories is a well-studied problem in Urban Computing and has been used to track people. Analyzing people mobility and identifying the transportation mode used by them is essential for cities that want to reduce traffic jams and travel time between their points, thus hel** to improve the quality of life of citizens. The trajectory data of a moving object is represented by…
▽ More
The analysis of GPS trajectories is a well-studied problem in Urban Computing and has been used to track people. Analyzing people mobility and identifying the transportation mode used by them is essential for cities that want to reduce traffic jams and travel time between their points, thus hel** to improve the quality of life of citizens. The trajectory data of a moving object is represented by a discrete collection of points through time, i.e., a time series. Regarding its interdisciplinary and broad scope of real-world applications, it is evident the need of extracting knowledge from time series data. Mining this type of data, however, faces several complexities due to its unique properties. Different representations of data may overcome this. In this work, we propose the use of a feature retained from the Ordinal Pattern Transition Graph, called the probability of self-transition for transportation mode classification. The proposed feature presents better accuracy results than Permutation Entropy and Statistical Complexity, even when these two are combined. This is the first work, to the best of our knowledge, that uses Information Theory quantifiers to transportation mode classification, showing that it is a feasible approach to this kind of problem.
△ Less
Submitted 16 July, 2020;
originally announced July 2020.
-
Uncovering Spatiotemporal and Semantic Aspects of Tourists Mobility Using Social Sensing
Authors:
Ana P G Ferreira,
Thiago H Silva,
Antonio A F Loureiro
Abstract:
Tourism favors more economic activities, employment, revenues and plays a significant role in development; thus, the improvement of this activity is a strategic task. In this work, we show how social sensing can be used to understand the key characteristics of the behavior of tourists and residents. We observe distinct behavioral patterns in those classes, considering the spatial and temporal dime…
▽ More
Tourism favors more economic activities, employment, revenues and plays a significant role in development; thus, the improvement of this activity is a strategic task. In this work, we show how social sensing can be used to understand the key characteristics of the behavior of tourists and residents. We observe distinct behavioral patterns in those classes, considering the spatial and temporal dimensions, where cultural and regional aspects might play an important role. Besides, we investigate how tourists move and the factors that influence their movements in London, New York, Rio de Janeiro and Tokyo. In addition, we propose a new approach based on a topic model that enables the automatic identification of mobility pattern themes, ultimately leading to a better understanding of users' profiles. The applicability of our results is broad, hel** to provide better applications and services in the tourism segment.
△ Less
Submitted 18 May, 2020;
originally announced May 2020.
-
Computação Urbana da Teoria à Prática: Fundamentos, Aplicações e Desafios
Authors:
Diego O. Rodrigues,
Frances A. Santos,
Geraldo P. Rocha Filho,
Ademar T. Akabane,
Raquel Cabral,
Roger Immich,
Wellington L. Junior,
Felipe D. Cunha,
Daniel L. Guidoni,
Thiago H. Silva,
Denis Rosário,
Eduardo Cerqueira,
Antonio A. F. Loureiro,
Leandro A. Villas
Abstract:
The growing of cities has resulted in innumerable technical and managerial challenges for public administrators such as energy consumption, pollution, urban mobility and even supervision of private and public spaces in an appropriate way. Urban Computing emerges as a promising paradigm to solve such challenges, through the extraction of knowledge, from a large amount of heterogeneous data existing…
▽ More
The growing of cities has resulted in innumerable technical and managerial challenges for public administrators such as energy consumption, pollution, urban mobility and even supervision of private and public spaces in an appropriate way. Urban Computing emerges as a promising paradigm to solve such challenges, through the extraction of knowledge, from a large amount of heterogeneous data existing in urban space. Moreover, Urban Computing correlates urban sensing, data management, and analysis to provide services that have the potential to improve the quality of life of the citizens of large urban centers. Consider this context, this chapter aims to present the fundamentals of Urban Computing and the steps necessary to develop an application in this area. To achieve this goal, the following questions will be investigated, namely: (i) What are the main research problems of Urban Computing?; (ii) What are the technological challenges for the implementation of services in Urban Computing?; (iii) What are the main methodologies used for the development of services in Urban Computing?; and (iv) What are the representative applications in this field?
△ Less
Submitted 2 December, 2019;
originally announced December 2019.
-
Challenges and Directions for Authentication in Pervasive Computing
Authors:
Artur Souza,
Antônio A. F. Loureiro,
Leonardo B. Oliveira
Abstract:
We quickly approach a "pervasive future" where pervasive computing is the norm. In this scenario, humans are surrounded by a multitude of heterogeneous devices that assist them in almost every aspect of their daily routines. The realization of this future demands strong authentication guarantees to ensure that these devices are not abused and that their users are not endangered. However, providing…
▽ More
We quickly approach a "pervasive future" where pervasive computing is the norm. In this scenario, humans are surrounded by a multitude of heterogeneous devices that assist them in almost every aspect of their daily routines. The realization of this future demands strong authentication guarantees to ensure that these devices are not abused and that their users are not endangered. However, providing authentication for these systems is a challenging task due to the high heterogeneity of pervasive computing applications. This heterogeneity makes it unfeasible to propose a single authentication solution for all of the pervasive computing applications. In this paper, we review several pervasive application scenarios and promising authentication methods for each. To do this, we first identify the key characteristics of each pervasive application scenario. Then, we review the strengths and weaknesses of prominent authentication methods from the literature. Finally, we identify which authentication methods are well suited for each application scenario based on the identified characteristics. Our goal is to provide promising directions to be explored for authentication in each of these scenarios.
△ Less
Submitted 11 July, 2019;
originally announced July 2019.
-
MPTCP Linux Kernel Congestion Controls
Authors:
Bruno Yuji Lino Kimura,
Antonio Alfredo Frederico Loureiro
Abstract:
MultiPath TCP (MPTCP) is a promising protocol which brings new light to the TCP/IP protocol stack ossification problem by means of an impactful innovation of the transport layer. A MPTCP connection consists of a set of one or more subflows, where each subflow offers an alternative path to reach a target remote end-system. However, simply applying the standard TCP congestion control on each subflow…
▽ More
MultiPath TCP (MPTCP) is a promising protocol which brings new light to the TCP/IP protocol stack ossification problem by means of an impactful innovation of the transport layer. A MPTCP connection consists of a set of one or more subflows, where each subflow offers an alternative path to reach a target remote end-system. However, simply applying the standard TCP congestion control on each subflow would give an unfair resource sharing. Various subflows of a connection would dispute bottleneck links with regular single-path TCP connections, leading them to starvation conditions. To deal with this concern, a multipath congestion control algorithm adjusts the sending operation of all subflows in a coupled fashion in order to achieve various objectives, e.g., friendliness, responsiveness, throughput improvement, and congestion balance. In this report, we describe the four coupled congestion control algorithms deployed in the MPTCP Linux kernel implementation, namely: LIA, OLIA, BALIA, and wVegas. We provide a concise material with technical details of each algorithm, while summarizing all of them together from a single notation.
△ Less
Submitted 7 December, 2018;
originally announced December 2018.
-
GRM: Group Regularity Mobility Model
Authors:
Ivan O. Nunes,
Clayson Celes,
Michael D. Silva,
Pedro O. S. Vaz de Melo,
Antonio A. F. Loureiro
Abstract:
In this work we propose, implement, and evaluate GRM, a novel mobility model that accounts for the role of group meeting dynamics and regularity in human mobility. Specifically, we show that existing mobility models for humans do not capture the regularity of human group meetings which is present in real mobility traces. Next, we characterize the statistical properties of such group meetings in re…
▽ More
In this work we propose, implement, and evaluate GRM, a novel mobility model that accounts for the role of group meeting dynamics and regularity in human mobility. Specifically, we show that existing mobility models for humans do not capture the regularity of human group meetings which is present in real mobility traces. Next, we characterize the statistical properties of such group meetings in real mobility traces and design GRM accordingly. We show that GRM maintains the typical pairwise contact properties of real traces, such as contact duration and inter-contact time distributions. In addition, GRM accounts for the role of group mobility, presenting group meetings regularity and social communities' structure. Finally, we evaluate state-of-art social-aware protocols for opportunistic routing using a synthetic contact trace generated by our model. The results show that the behavior of such protocols in our model is similar to their behavior in real mobility traces.
△ Less
Submitted 24 June, 2017;
originally announced June 2017.
-
Gender Matters! Analyzing Global Cultural Gender Preferences for Venues Using Social Sensing
Authors:
Willi Mueller,
Thiago H Silva,
Jussara M Almeida,
Antonio A F Loureiro
Abstract:
Gender differences is a phenomenon around the world actively researched by social scientists. Traditionally, the data used to support such studies is manually obtained, often through surveys with volunteers. However, due to their inherent high costs because of manual steps, such traditional methods do not quickly scale to large-size studies. We here investigate a particular aspect of gender differ…
▽ More
Gender differences is a phenomenon around the world actively researched by social scientists. Traditionally, the data used to support such studies is manually obtained, often through surveys with volunteers. However, due to their inherent high costs because of manual steps, such traditional methods do not quickly scale to large-size studies. We here investigate a particular aspect of gender differences: preferences for venues. To that end we explore the use of check-in data collected from Foursquare to estimate cultural gender preferences for venues in the physical world. For that, we first demonstrate that by analyzing the check-in data in various regions of the world we can find significant differences in preferences for specific venues between gender groups. Some of these significant differences reflect well-known cultural patterns. Moreover, we also gathered evidence that our methodology offers useful information about gender preference for venues in a given region in the real world. This suggests that gender and venue preferences observed may not be independent. Our results suggests that our proposed methodology could be a promising tool to support studies on gender preferences for venues at different spatial granularities around the world, being faster and cheaper than traditional methods, besides quickly capturing changes in the real world.
△ Less
Submitted 18 March, 2017;
originally announced March 2017.
-
GROUPS-NET: Group Meetings Aware Routing in Multi-Hop D2D Networks
Authors:
Ivan O. Nunes,
Clayson Celes,
Pedro O. S. Vaz de Melo,
Antonio A. F. Loureiro
Abstract:
In the next generation cellular networks, device-to-device (D2D) communication is already considered a fundamental feature. A problem of multi-hop D2D networks is on how to define forwarding algorithms that achieve, at the same time, high delivery ratio and low network overhead. In this paper we aim to understand group meetings' properties by looking at their structure and regularity with the fina…
▽ More
In the next generation cellular networks, device-to-device (D2D) communication is already considered a fundamental feature. A problem of multi-hop D2D networks is on how to define forwarding algorithms that achieve, at the same time, high delivery ratio and low network overhead. In this paper we aim to understand group meetings' properties by looking at their structure and regularity with the final goal of applying such knowledge in the design of a forwarding algorithm for D2D multi-hop networks. We introduce a forwarding protocol, namely GROUPS-NET, which is aware of social group meetings and their evolution over time. Our algorithm is parameter-calibration free and does not require any knowledge about the social network structure of the system. In particular, different from the state of the art algorithms, GROUPS-NET does not need communities detection, which is a complex and expensive task. We validate our algorithm using different publicly available data-sources. In real large scale scenarios, our algorithm achieves approximately the same delivery ratio of the state-of-art solution with up to 40% less network overhead.
△ Less
Submitted 14 August, 2017; v1 submitted 24 May, 2016;
originally announced May 2016.
-
Group Mobility: Detection, Tracking and Characterization
Authors:
Ivan Oliveira Nunes,
Pedro O. S. Vaz de Melo,
Antonio A. F. Loureiro
Abstract:
In the era of mobile computing, understanding human mobility patterns is crucial in order to better design protocols and applications. Many studies focus on different aspects of human mobility such as people's points of interests, routes, traffic, individual mobility patterns, among others. In this work, we propose to look at human mobility through a social perspective, i.e., analyze the impact of…
▽ More
In the era of mobile computing, understanding human mobility patterns is crucial in order to better design protocols and applications. Many studies focus on different aspects of human mobility such as people's points of interests, routes, traffic, individual mobility patterns, among others. In this work, we propose to look at human mobility through a social perspective, i.e., analyze the impact of social groups in mobility patterns. We use the MIT Reality Mining proximity trace to detect, track and investigate group's evolution throughout time. Our results show that group meetings happen in a periodical fashion and present daily and weekly periodicity. We analyze how groups' dynamics change over day hours and find that group meetings lasting longer are those with less changes in members composition and with members having stronger social bonds with each other. Our findings can be used to propose meeting prediction algorithms, opportunistic routing and information diffusion protocols, taking advantage of those revealed properties.
△ Less
Submitted 15 December, 2015;
originally announced December 2015.
-
Universal and Distinct Properties of Communication Dynamics: How to Generate Realistic Inter-event Times
Authors:
Pedro O. S. Vaz de Melo,
Christos Faloutsos,
Renato Assunção,
Rodrigo Alves,
Antonio A. F. Loureiro
Abstract:
With the advancement of information systems, means of communications are becoming cheaper, faster and more available. Today, millions of people carrying smart-phones or tablets are able to communicate at practically any time and anywhere they want. Among others, they can access their e-mails, comment on weblogs, watch and post comments on videos, make phone calls or text messages almost ubiquitous…
▽ More
With the advancement of information systems, means of communications are becoming cheaper, faster and more available. Today, millions of people carrying smart-phones or tablets are able to communicate at practically any time and anywhere they want. Among others, they can access their e-mails, comment on weblogs, watch and post comments on videos, make phone calls or text messages almost ubiquitously. Given this scenario, in this paper we tackle a fundamental aspect of this new era of communication: how the time intervals between communication events behave for different technologies and means of communications? Are there universal patterns for the inter-event time distribution (IED)? In which ways inter-event times behave differently among particular technologies? To answer these questions, we analyze eight different datasets from real and modern communication data and we found four well defined patterns that are seen in all the eight datasets. Moreover, we propose the use of the Self-Feeding Process (SFP) to generate inter-event times between communications. The SFP is extremely parsimonious point process that requires at most two parameters and is able to generate inter-event times with all the universal properties we observed in the data. We show the potential application of SFP by proposing a framework to generate a synthetic dataset containing realistic communication events of any one of the analyzed means of communications (e.g. phone calls, e-mails, comments on blogs) and an algorithm to detect anomalies.
△ Less
Submitted 19 March, 2014;
originally announced March 2014.