Coverart for item
The Resource Mobile Crowdsensing

Mobile Crowdsensing

Label
Mobile Crowdsensing
Title
Mobile Crowdsensing
Creator
Contributor
Subject
Language
eng
Cataloging source
MiAaPQ
Literary form
non fiction
Nature of contents
dictionaries
Mobile Crowdsensing
Label
Mobile Crowdsensing
Link
http://libproxy.rpi.edu/login?url=https://ebookcentral.proquest.com/lib/rpi/detail.action?docID=4755937
Publication
Copyright
Related Contributor
Related Location
Related Agents
Related Authorities
Related Subjects
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Cover -- Half Title -- Title Page -- Copyright Page -- Contents -- Preface -- List of Figures -- List of Tables -- 1 Introduction -- 1.1 Evolution of Sensing -- 1.2 Bridging the Sensing Gap with Mobile Crowdsensing -- 1.3 Organization of the Book -- 2 Mobile Sensing -- 2.1 Introduction -- 2.2 How Did We Get Here? -- 2.2.1 Static Wireless Sensor Networks -- 2.2.2 The Opportunity of Mobile People-Centric Sensing -- 2.2.3 Mobile Sensing Background -- 2.2.4 Crucial Components that Enable Mobile Sensing -- 2.2.4.1 Apps -- 2.2.4.2 Sensors -- 2.2.4.3 Software APIs -- 2.3 Where Are We? -- 2.3.1 Current Uses -- 2.3.2 Known Hurdles -- 2.4 Conclusion -- 3 Crowdsourcing -- 3.1 Introduction -- 3.2 Applications -- 3.3 Crowdsourcing Platforms -- 3.4 Open Problems -- 3.5 Conclusion -- 4 What Is Mobile Crowdsensing? -- 4.1 Introduction -- 4.2 Advantages of Collective Sensing -- 4.2.1 Environmental -- 4.2.2 Infrastructure -- 4.2.3 Social -- 4.3 How Can Crowdsourcing be Transformed into a Fun Activity for Participants? -- 4.4 Evolution of Mobile Crowdsensing -- 4.4.1 Emerging Application Domains -- 4.4.2 Crowdsensing in Smart Cities -- 4.5 Classification of Sensing Types -- 4.5.1 Participatory Manual Sensing -- 4.5.2 Opportunistic Automatic Sensing -- 4.6 Conclusion -- 5 Systems and Platforms -- 5.1 Introduction -- 5.2 The McSense System -- 5.2.1 Architecture of McSense -- 5.2.2 Tasks Developed for McSense -- 5.2.3 Field Study -- 5.3 The Medusa System -- 5.3.1 Architecture of Medusa -- 5.3.2 Execution of Sensing Tasks in Medusa -- 5.3.3 Scalability and Robustness -- 5.4 The Vita System -- 5.4.1 Architecture of Vita -- 5.4.2 Application Example of Vita -- 5.4.3 Performance and Reliability -- 5.5 Other Systems -- 5.6 Conclusion -- 6 General Design Principles and Example of Prototype -- 6.1 Introduction -- 6.2 General Architecture -- 6.2.1 Current Architecture
  • 6.2.2 Implementation Principles -- 6.3 Prototype Implementation and Observations -- 6.3.1 Task Assignment Policies -- 6.3.2 User Survey Results and Observations -- 6.3.3 Battery Consumption -- 6.4 Resource Management -- 6.5 Conclusion -- 7 Incentive Mechanisms for Participants -- 7.1 Introduction -- 7.2 Social Incentives -- 7.3 Monetary Incentives -- 7.4 Mobile Game Incentives -- 7.4.1 Alien vs. Mobile User Game -- 7.4.2 Design and Implementation -- 7.4.3 User Study -- 7.5 Comparison of Incentives -- 7.5.1 Sensing Task Duration -- 7.5.2 Sensing Task Type -- 7.5.3 Incentive Quality or Value -- 7.5.4 Sensing Data Reliability -- 7.5.5 Mobile Resource Consumption -- 7.5.6 How General Are These Insights? -- 7.6 Conclusion -- 8 Security Issues and Solutions -- 8.1 Introduction -- 8.2 Sensed Data Reliability Issues -- 8.2.1 Correlation of User Earnings and Fake Photos -- 8.2.2 Correlation of Location and Fake Photos -- 8.2.3 Malicious User: Menace or Nuisance? -- 8.3 Proposed Solutions for Data Reliability -- 8.3.1 The ILR Validation Scheme over Collected Data -- 8.3.1.1 An Example of ILR in Action -- 8.3.1.2 The ILR Phases -- 8.3.1.3 Security Analysis -- 8.3.1.4 Experimental Evaluation: Field Study -- 8.3.1.5 ILR Simulations -- 8.3.2 The LINK Scheme for Real-time Location Data Validation -- 8.3.2.1 Protocol Design -- 8.3.2.2 LCA Decision Process -- 8.3.2.3 Security Analysis -- 8.3.2.4 Simulations -- 8.3.2.5 Implementation -- 8.3.2.6 Experimental Evaluation -- 8.3.3 The SHIELD Scheme for Data Verification in Partici- patory Sensing Systems -- 8.3.4 Data Liveness Validation -- 8.3.5 Truth Discovery -- 8.4 Conclusion -- 9 Privacy Concerns and Solutions -- 9.1 Introduction -- 9.2 Participant Privacy Issues -- 9.2.1 Anonymization -- 9.2.2 Encryption -- 9.2.3 Data Perturbation -- 9.3 Privacy-Preserving Architectures -- 9.3.1 Hybrid Privacy-Preserving Mechanism
  • 9.3.1.1 System and Threat Model -- 9.3.1.2 Proposed Privacy Mechanism -- 9.3.2 SPPEAR Architecture -- 9.3.2.1 System Model -- 9.3.2.2 System Overview -- 9.3.3 Privacy-Preserving Truth Discovery -- 9.3.4 Other Solutions -- 9.4 Privacy-Aware Incentives -- 9.4.1 Privacy-Aware Incentive Schemes -- 9.4.2 Other Schemes -- 9.5 Location and Context Privacy -- 9.5.1 Solutions Based on K-Anonymity -- 9.5.2 Other Solutions -- 9.5.3 Application: Trace-Hiding Map Generation -- 9.5.4 Context Privacy -- 9.6 Anonymous Reputation and Trust -- 9.7 Conclusion -- 10 Conclusions and Future Directions -- 10.1 Conclusions -- 10.2 Future Directions -- Index
http://library.link/vocab/cover_art
https://contentcafe2.btol.com/ContentCafe/Jacket.aspx?Return=1&Type=S&Value=9781498738453&userID=ebsco-test&password=ebsco-test
Dimensions
unknown
http://library.link/vocab/discovery_link
{'f': 'http://opac.lib.rpi.edu/record=b4386791'}
Extent
1 online resource (184 pages)
Form of item
online
Isbn
9781498738453
Media category
computer
Media MARC source
rdamedia
Media type code
c
Sound
unknown sound
Specific material designation
remote

Library Locations

    • Folsom LibraryBorrow it
      110 8th St, Troy, NY, 12180, US
      42.729766 -73.682577
Processing Feedback ...