ACM Distinguished Speakers Porgram:  talks by and with technology leaders and innovators

Computing Topic:
Mobile Computing

Encompasses the mobility of systems, users, data and computing; wireless networks; and nomadic computing. See ACM's Special Interest Group on Mobile Computing, SIGMOBILE.


Available Speakers on this Topic


Available Lectures

  • A Secure Data Aggregation based Trust Management Approach for Dealing with Untrustworthy Motes in Sensor Network:
    Efficient power management is vital for increasing the life of wireless sensor networks (WSN). The main reason is that the radio transmission consumes energy approximately three times comparing to other operations. Thus, techniques such as data aggre...
  • A Secure Data Sharing and Query Processing Framework via Federation of Cloud Computing :
    Due to cost-efficiency and less hands-on management, data owners are outsourcing their data to the cloud which can provide access to the data as a service. However, by outsourcing their data to the cloud, the data owners lose control over their data ...
  • A Transaction Model and Multiversion Concurrency Control For Mobile:
    Transaction management on Mobile Database Systems (MDS) has to cope with a number of constraints such as limited bandwidth, low processing power, unreliable communication, and mobility etc. As a result of these constraints, traditional concurre...
  • A Wireless Sensor Network Based Closed-loop System for Subsurface Contaminant Monitoring:
    Toxic chemicals and biological agents are released into the subsurface as a result of accidental spills, improper disposal, or intentional damage. These releases cause migrating plumes with concentrations that are spatially distributed and transient....
  • Adaptive Voice Streaming over Low-power Wireless Networks:
    Low power wireless networks have become increasingly popular for mission-critical applications such as security surveillance and disaster response.  In particular, emerging low power wireless audio platforms provide an economical solution for ad...
  • An Overview of The Toilers: An Ad Hoc Networks Research Group:

    The Toilers are a unique group of staff, graduate students, and undergraduates who research ad hoc networks, specifically wireless sensor networks (WSNs) and mobile ad hoc networks (MANETs). These types of networks are defined by ...

  • Biologically-inspired and Nano-scale Communication and Networking:
    The developments in communication technologies have yielded many existing and envisioned information network architectures such as cognitive radio networks, sensor and actor networks, quantum communication networks, terrestrial next generation Intern...
  • Challenges for the development of digitally-enhanced ubiquitous environments.:
    Ubiquitous Computing is considered as an extension of physical environment capabilities, allowing a computational infrastructure to be present everywhere in the form of networked processing devices, distributed at all scales throughout everyday setti...
  • Design and Adaptation for Cross-Device, Context-dependent User Interfaces:
    This course  aims to help user interface designers and developers to understand the issues involved in multi-device, context-dependent interactive applications, which can be accessed through wearable, mobile and stationary devices even exploitin...
  • Designing for Somaesthetics:
    In designing for bodily experiences, there has been a lack of theories that can provide the underpinnings we need to understand and deepen our design thinking. Despite all the work we have seen on designing for embodiment, the actual corporeal, pulsa...
  • Designing new user interfaces for cars:

    In-car interactions are undergoing major changes as traditional physical buttons, dials and switchgear are replaced by touchscreens and touch-sensing surfaces.  Drivers are becoming passengers as autonomous vehicl...

  • Detection and Tracking of Dynamic Amorphous Events in Wireless Sensor Networks:
    In recent years, wireless sensor networks (WSNs) have been deployed for various applications such as environmental monitoring, structural health monitoring, and emergency responses.  Using WSNs to detect and track interesting events has been a c...
  • Device-free Localization: The future for Ubiquitous Sensing:
    WLAN Device-free Passive (DfP) localization is an emerging field in location determination enabling the localization of entities that neither carry any devices nor participate actively in the localization process using the alread...
  • Distant pointing in ubiquitous environment :
    Pointing to targets is an elementary task universally present in interfaces.  In an ubiquitous environment, the need for distant pointing is frequent in several domains including public displays, interactive TV, augmented objects, augment...
  • Dynamic Data Management in Mobile P2P Networks:
    ynamic Data management has become a necessity in emerging networks (e.g., mobile ad hoc networks and mobile P2P networks) to address fragile wireless connections and devices with very limited capacity.  Moreover, traditional methods of da...
  • Dynamic Data Replication Using Aperidoc Updates in MANET:
    Traditional replication schemes are passive in nature, and rarely
    consider the characteristics of mobile ad hoc network environment. In
    this talk, I will present three dynamic data replication schemes for
    mobile ad-hoc netw...
  • Dynamic Group Monitoring in Proximity-based Mobile Social Networks:
    Various forms of groups exist in social interactions.  In recent years, due to the increasing popularity of mobile devices such as smartphones, these dynamic groups can be monitored by exploiting the collaborative capabilities of these mobile de...
  • Economic Models for Data Management in Mobile P2P Computing:

    Data Management in Mobile Peer to Peer (M-P2P) systems needs dynamic data management due to mobility and fragile wireless connection connecting resource constraint devices. Traditional methods of data management and services in mobile P2P...

  • End-User Development: an Emerging Field for Empowering People:
    End-User Development is a set of methods, techniques, and tools that allow users of software systems, who are acting as non-professional software developers, at some point to create, modify or extend a software artefact  The purpose of this talk...
  • Evaluation of Video Quality of Service in Wireless Networks:
    Computer simulation is the research tool of choice for a majority of the wired and wireless network research community and these days most of research works on the network adopt computer simulation to verify novel ideas. The presentation introduces a...
  • Handheld Augmented Reality: Touch Interaction:
    Handheld Augmented Reality (AR), one type of mobile AR, relies on the spatial coupling between the real world and the on-screen augmented reality outputs. Such spatial coupling introduces new design challenges for interaction and in particular...
  • Image Processing and Computer Vision in iOS:
    This lecture provides directions for developers and researchers interested in developing iOS applications with image processing and computer vision capabilities. It is divided into three main parts: (1) motivation for developing intelligent visual ap...
  • Improving Mindfulness and Personal Resilience through Technology:
    Different activities that can be potentially embraced by almost any person such as physical exercise, deep and slow breathing or relaxation training have been shown to have beneficial effects on health, wellbeing, and personal resilience. Mindfulness...
  • Incentive-based Dynamic Content Management in Mobile Crowdsourcing for Smart City Applications:
    Ever-increasing prevalence of social networking using mobile devices has catalyzed the growth of interesting and innovative new-age mobile crowdsourcing applications, which work at the intersection of human-centric computation (e.g., economic ...
  • Indoor Geographic Information Systems: Challenges and Opportunities:
    Traditional Geographic Information Systems (GIS) focus on capturing and analyzing outdoor geographical data. However, there is no corresponding effort for indoor data and indoor GISs remain an open territory for exploration and innovation.&nbs...
  • Internet-based Indoor Navigation Services:
    This talk presents the fundamental mobile data management concepts behind the realization of innovative indoor information services that deal with all aspects of handling indoor data as a valuable resource, including data modeling, data acquis...
  • Is the future mobile networking?:
    In the last decades, mobile ad hoc networking has been suggested as a technology for realizing the ubiquitous computing vision. However, after more than ten years of research in this field, this promising technology has not yet entered the mass marke...
  • MANET Simulation Studies: The Incredibles:

    Simulation is the research tool of choice for a majority of the mobile ad hoc network (MANET) community; however, while the use of simulation has increased, the credibility of the simulation resul...

  • Mobile Computing in a Connected World:
    Mobile computers connected to the Internet allow users anywhere to create, share, and retrieve information. Despite the convenience, mobile computers have one critical disadvantage: the limited energy from batteries.  Many solutions have ...
  • Mobile Persuasion for Health and Safety Promotion:
    Mobile apps are a very promising tool to promote attitude and behavior change in users. However, creating effective and successful mobile apps for health and safety promotion requires a wealth of multidisciplinary knowledge that includes usability an...
  • Multimodal Interaction :
    Multimodal interaction supports multiple interaction techniques, which may be used sequentially or concurrently, and independently or combined synergistically. Specific interaction aspects must be considered, such as the fusion and fission of ...
  • Network Flow Security Analytics for IoT and Mobile Devices:

    Given that security threats and privacy breaches are commonplace today, it is an important problem for one to know whether their device(s) are in a "good state of security", or is there a set of high-risk vulnerabilit...

  • New Paradigms for Location Determination Technologies:
    In this talk, we explore two recent developments in localization systems: Device-free localization and and ubiquitous indoor localization. In the first part of the talk, we present the device-free localization problem (DfP) where the tracked e...
  • Pervasive Computing Systems Research: An Application-driven Approach:
    Pervasive and mobile computing is an emerging field of research that brings in revolutionary paradigms for computing models in the 21st century.  The goal of pervasive computing is to create ambient intelligence where network devices embedded in...
  • Power Management- A System View:
    Reducing power consumption is important for electronic systems due to many reasons.  Battery-powered mobile systems and embedded systems are widely used today.  Energy cost has become a significant portion in computers' to...
  • Privacy Preserving Service Discovery In Mobile P2P Networks:

    In mobile peer-to-peer networks, proposed service discovery protocols disregard the exposure of the participating peers' privacy details (privileged information).  In these methods, the participating peers must provide their identities ...

  • Replicated Data Integrity Verification in Cloud:
    Cloud computing is an emerging model in which computing infrastructure resources are provided as a service over the Internet. Data owners can outsource their data by remotely storing them in the cloud and enjoy on- demand high quality applicat...
  • SMOOTH: A Simple and Realistic Way to Model Human Mobility :
    Simulation is the research tool of choice for a majority of the mobile ad hoc network (MANET) community; however, while the use of simulation has increased, the credibility of the simulation results has decreased. Since mobility patterns can signific...
  • Secure Data Aggregation in Sensor Networks:
    Data aggregation is a technique used to conserve battery power in wireless sensor networks (WSN). When securing such a network, it is important that we minimize the number of computationally expensive security operations without compromising on the s...
  • Sensor Networks: From Theory to Tracking Bats in the Wild:
    With the development of new generations of micro controllers, the advances in miniaturization, and the increasing use of networked embedded systems, new research challenges emerged in several domains of computer science. This especially includ...
  • Sensor-based Personalized Wellness Applications:
    The cost of health care is expected to grow enormously in the coming years. To keep these costs limited, we need better technological tools for self-monitoring and independent aging, and to put a stronger emphasis on wellness, defined as a bal...
  • Small group modeling in cultural heritage - modeling automatic detection of social behavior of museum visitor pairs:
    In many cases, visitors come to a museum in small groups. In these cases, the visitors’ social context has an impact on their museum visit experience. Knowing the social context may allow a system to provide socially-aware services to the visit...
  • Social Applications and Sensible Societies:
    In this lecture, we will entice the audience to think of mobile media technologies as a tool to address urban social issues. The explanation will explore the potential of mobile devices, social networks, and collective thinking to generate dir...
  • Taming the Uncertainty in Supporting Distributed Sensor Applications:
    With the advances in computational, communication, and sensing capabilities, large-scale sensor-based distributed environments are becoming a reality. However, the dynamic nature of wireless sensor networks causes many uncertainties in supporting app...
  • Teaching and Learning Programming and Software Engineering via Interactive Gaming :
    Pex4Fun (http://www.pex4fun.com/) and Code Hunt (https://www.codehunt.com/), released by Microsoft Research, offer a web-based educational gaming platform for teaching and learning programming and software engineering. Such platform can be used to te...
  • Text Analytics for Mobile App Security and Beyond :
    Mobile apps are accompanied by a rich amount of natural language text: app descriptions, app user reviews, update/release notes, etc. Such natural language text is essential in conveying important information about the apps (such as expected function...
  • The Artificiality of Natural User Interfaces - Toward user-defined gestural interfaces.:
    The road to natural interfaces is still long and we are now witnessing an artificial naturality. These interfaces are natural, in the sense they employ hand gestures, but they are also artificial, because the system designer imposes the set of gestur...
  • The GPS Challengers: New trends in Outdoor Localization:
    Location-based services (LBS) have become an integral part of our daily life with applications including car navigation, location-based social networks, and context-aware predication and advertisement. Different LBS require different localizat...
  • The Mobile Life? An enjoyment society:
    The Mobile Life Centre, started in 2007, has grown to be about 45 researchers, exploring experiential, leisure and playful mobile and ubiquitous interactions. We do serious research on what we might normally portray as “unserious” activit...
  • The Spoken Web:
    The WWW enabled quick and easy information dissemination and brought about fundamental changes to various aspects of our lives. However, a very large number of people, mostly in developing regions, are still untouched by this revolution. Compa...
  • The museum as a "living lab" exploring the potential contribution of novel technology in an instrumented cultural heritage site:
    In the framework of the PIL project, which I have directed at the University of Haifa as part of a long lasting set of Israeli-Italian collaboration projects, a “Living Lab” has been developed – The Hecht museum, at the unive...
  • Towards the Vehicular Cloud: From Connected Cars to Smart Cities:
    From an industry point of view, vehicular networking serves as one of the most important enabling technologies required to implement a myriad of applications related to vehicles, vehicle traffic, drivers, passengers and pedestrians. In this le...
  • Trajectories Through The User Experience:
    The idea of designing the ‘user journey’ is familiar to User Experience designers. However, the emergence of mobile interaction, followed by augmented reality and now the Internet of Things challenges us to extend our view of such ...
  • Ubiquitous Indoor Localization: The Indoor Equivalent of GPS:
    Although GPS has been considered a ubiquitous outdoor localization technology, we are still far from a similar technology for indoor environments. While a number of technologies have been proposed for indoor localization, they are isolated eff...
  • Uncomfortable User Experience:
    This is a provocative lecture that confronts our current thinking about how we design interactions with computers and instead makes a case for the deliberate engineering of discomfort as part of more enlightening, entertaining and socially bon...
  • Vehicular Networking:
    Looking back at the last decade, one can observe enormous progress in the domain of vehicular networking. In this growing community, many ongoing activities focus on the design of communication protocols to support safety applications, intelli...
  • Virtualize Everything  a Path to the Convergence of Cloud, Mobile and IoT Computing:
    With the rapid development of Cloud Computing, Mobile Computing and IoT Computing, there is an increasing need for an efficient and effective way to enable the collaborations between cloud, mobile devices and IoT devices to bring new and compe...
  • Wireless Sensor Networks: Security, Protocols and Countermeasures:
    Wireless Sensor Networks are increasingly being deployed in hazardous and hostile environments for numerous civil and military applications such as sensing the environment, biosensors, etc. They pose unique security challenges because of their inhere...
Featured Speaker


Keith Cheverst
Lancaster University

Get Involved!
Help improve the DSP by nominating a speaker or providing feedback to ACM.