Middleware for social computing: a roadmap

Open Access
SI: FOME - The Future of Middleware

Abstract

Social computing broadly refers to supporting social behaviours using computational systems. In the last decade, the advent of Web 2.0 and its social networking services, wikis, blogs, and social bookmarking has revolutionised social computing, creating new online contexts within which people interact socially (social networking). With the pervasiveness of mobile devices and embedded sensors, we stand at the brink of another major revolution, where the boundary between online and offline social behaviours blurs, providing opportunities for (re)defining social conventions and contexts once again. But opportunities come with challenges: can middleware foster the engineering of social software? We identify three societal grand challenges that are likely to drive future research in social computing and elaborate on how the middleware community can help address them.

Keywords

Social computing Middleware Ubiquitous computing 

References

  1. 1.
    Azizyan M, Constandache I, Choudhury RR (2009) Surroundsense: mobile phone localization via ambience fingerprinting. In: Shin KG, Zhang Y-g, Bagrodia R, Govindan R (eds) Proc of the 15th annual intl conference on mobile computing and networking, Beijing, China. ACM, New York, pp 261–272CrossRefGoogle Scholar
  2. 2.
    Bawa-Cavia A (2011) Sensing the urban: using location-based social network data in urban analysis. In: The 1st workshop on pervasive urban applications (PURBA), June 2011Google Scholar
  3. 3.
    Bertier M, Frey D, Guerraoui R, Kermarrec A-M, Leroy V (2010) The gossple anonymous social network. In: Proc of ACM/IFIP/USENIX 11th intl middleware conference, Bangalore, India, pp 191–211Google Scholar
  4. 4.
    Bettencourt L, West G (2010) A unified theory of urban living. Nature 467(7318):912–913CrossRefGoogle Scholar
  5. 5.
    Boyd D (2010) The future of privacy: how privacy norms can inform regulation. In: 32nd intl conference of data protection and privacy commissioners, October 2010Google Scholar
  6. 6.
    Boyd D (2011) Designing for social norms (or how not to create angry mobs). http://www.zephoria.org/thoughts/archives/2011/08/05/design-social-norms.html, August 2011
  7. 7.
    Chen Q, Hsu M (2010) Data stream analytics as cloud service for mobile applications. In: Meersman R, Dillon TS, Herrero P (eds) OTM conferences (2). Lecture notes in computer science, vol 6427. Springer, Berlin, pp 709–726Google Scholar
  8. 8.
    Cornelius C, Kapadia A, Kotz D, Peebles D, Shin M, Triandopoulos N (2008) Anonysense: privacy-aware people-centric sensing. In: Proc of the 6th intl conference on mobile systems, applications, and services, Breckenridge, CO, USA, pp 211–224Google Scholar
  9. 9.
    Crandall DJ, Backstrom L, Cosley D, Suri S, Huttenlocher D, Kleinberg J (2010) Inferring social ties from geographic coincidences. Proc Natl Acad Sci 107Google Scholar
  10. 10.
    Crowcroft J, Madhavapeddy A, Schwarzkopf M, Hong T, Mortier R (2011) Unclouded vision. In: 12th intl conference on distributed computing and networking (ICDCN), January 2011Google Scholar
  11. 11.
    De Capitani di Vimercati S, Foresti S, Paraboschi S, Pelosi G, Samarati P (2011) Efficient and private access to outsourced data. In: Proc of the 31th IEEE intl conference on distributed computing systems (ICDCS), Minneapolis, USA, June 2011Google Scholar
  12. 12.
    De Cristofaro E, Durussel A, Aad I (2011) Reclaiming privacy for smartphone applications. In: Proc of 9th annual IEEE intl conference on pervasive computing and communications (PerCom), Seattle, WA, USA, pp 84–92Google Scholar
  13. 13.
    Dobbs R, Remes J (2011) What’s the biggest limit on city growth? (hint: it’s not steel or cement). McKinsey: What Matters, February 2011Google Scholar
  14. 14.
    Falaki H, Mahajan R, Kandula S, Lymberopoulos D, Govindan R, Estrin D (2010) Diversity in smartphone usage. In: Proc of the 8th intl conference on mobile systems, applications, and services (MobiSys), pp 179–194Google Scholar
  15. 15.
    Friedman R, Kogan A (2009) Power aware management middleware for multiple radio interfaces. In: Proc of 10th intl middleware conference, Urbana, IL, USA, pp 288–307Google Scholar
  16. 16.
    Geambasu R, Kohno T, Levy A, Levy HM (2009) Vanish: increasing data privacy with self-destructing data. In: 18th USENIX security symposium, August 2009Google Scholar
  17. 17.
    Giurgiu I, Riva O, Juric D, Krivulev I, Alonso G (2009) Calling the cloud: enabling mobile phones as interfaces to cloud applications. In: Proc of 10th intl middleware conference, Urbana, IL, USA, pp 83–102Google Scholar
  18. 18.
    Haridasan M, Mohomed I, Terry D, Thekkath CA, Zhang L (2010) StarTrack next generation: a scalable infrastructure for track-based applications. In: Proc of OSDI 2010, October 2010Google Scholar
  19. 19.
    Kim DH, Kim Y, Estrin D, Srivastava MB (2010) Sensloc: sensing everyday places and paths using less energy. In: Proc of the 8th intl conference on embedded networked sensor systems (SenSys), pp 43–56Google Scholar
  20. 20.
    Kourtellis N, Finnis J, Anderson P, Blackburn J, Borcea C, Iamnitchi A (2010) Prometheus: user-controlled p2p social data management for socially-aware applications. In: Proc of ACM/IFIP/USENIX 11th intl middleware conference, Bangalore, India, pp 212–231Google Scholar
  21. 21.
    Krohn M, Yip A, Brodsky M, Morris R, Walfish M (2007) A World Wide Web without walls. In: 6th ACM workshop on hot topics in networking (Hotnets), Atlanta, GA, November 2007Google Scholar
  22. 22.
    Lindsay G, Kasarda JD (2011) At home in the aerotropolis. McKinsey: What Matters, February 2011Google Scholar
  23. 23.
    Lu H, Yang J, Liu Z, Lane ND, Choudhury T, Campbell AT (2010) The jigsaw continuous sensing engine for mobile phone applications. In: Proc of the 8th intl conference on embedded networked sensor systems (SenSys), pp 71–84Google Scholar
  24. 24.
    Mancini C, Thomas K, Rogers Y, Price BA, Jedrzejczyk L, Bandara AK, Joinson AN, Nuseibeh B (2009) From spaces to places: emerging contexts in mobile privacy. In: Helal S, Gellersen H, Consolvo S (eds) UbiComp, ACM intl conference proceeding series. ACM, New York, pp 1–10Google Scholar
  25. 25.
    Manyika J, Chui M, Brown B, Bughin J, Dobbs R, Roxburgh C, Byers AH (2011) Big data: the next frontier for innovation, competition, and productivity. Technical report, McKinsey Global InstituteGoogle Scholar
  26. 26.
    Massaguer D, Hore B, Diallo MH, Mehrotra S, Venkatasubramanian N (2009) Middleware for pervasive spaces: balancing privacy and utility. In: Proc of 10th intl middleware conference, Urbana, IL, USA, pp 247–267Google Scholar
  27. 27.
    Mayer-Schönberger V (2009) Delete: the virtue of forgetting in the digital age. Princeton University Press, PrincetonGoogle Scholar
  28. 28.
    Miluzzo E et al. (2010) Darwin phones: the evolution of sensing and inference on mobile phones. In: Proc of the 8th intl conference on mobile systems, applications, and services (MobiSys), San Francisco, California, USA, pp 5–20Google Scholar
  29. 29.
    Miluzzo E et al. (2008) Sensing meets mobile social networks: the design, implementation and evaluation of the cenceme application. In: Proc of the 6th intl conference on embedded networked sensor systems, Raleigh, NC, USA. ACM, New York, pp 337–350Google Scholar
  30. 30.
    Moraveji N, Akasaka R, Pea R, Fogg BJ (2011) The role of commitment devices and self-shaping in persuasive technology. In: Proc of the ACM conference extended abstracts on human factors in computing systems (CHI), May 2011, pp 1591–1596Google Scholar
  31. 31.
    Mortier R, Greenhalgh C, McAuley D, Spence A, Madhavapeddy A, Crowcroft J, Hand S (2010) Personal containers or, your life in bits. In: Digital futures workshop, October 2010Google Scholar
  32. 32.
    Murray DG, Schwarzkopf M, Smowton C, Smith S, Madhavapeddy A, Hand S (2011) Ciel: a universal execution engine for distributed data-flow computing. In: 9th USENIX symposium on networked systems design and implementation (NSDI)Google Scholar
  33. 33.
    Nguyen NP, Dinh TN, Xuan Y, Thai MT (2011) Adaptive algorithms for detecting community structure in dynamic social networks. In: INFOCOM. IEEE, New York, pp 2282–2290Google Scholar
  34. 34.
    Paek J, Kim J, Govindan R (2010) Energy-efficient rate-adaptive gps-based positioning for smartphones. In: Proc of the 8th intl conference on mobile systems, applications, and services (MobiSys), San Francisco, California, USA, pp 299–314Google Scholar
  35. 35.
    Qian F, Wang Z, Gerber A, Mao ZM, Sen S, Spatscheck O (2011) Profiling resource usage for mobile applications: a cross-layer approach. In: Proc of the 9th intl conference on mobile systems, applications, and services, Bethesda, MD, USA, pp 321–334Google Scholar
  36. 36.
    Quercia D, Kosinski M, Stillwell D, Crowcroft J (2011) Our Twitter profiles, our selves: predicting personality with Twitter. In: 3rd IEEE conference of social computing (Socialcom), October 2011Google Scholar
  37. 37.
    Rachuri KK, Musolesi M, Mascolo C, Rentfrow PJ, Longworth C, Aucinas A (2010) Emotionsense: a mobile phones based adaptive platform for experimental social psychology research. In: Proc 12th intl conference on ubiquitous computing, Copenhagen, Denmark, pp 281–290CrossRefGoogle Scholar
  38. 38.
    Ranganathan A, Al-Muhtadi J, Chetan S, Campbell RH, Mickunas MD (2004) Middlewhere: a middleware for location awareness in ubiquitous computing applications. In: Jacobsen H-A (ed) Middleware. Lecture notes in computer science, vol 3231. Springer, Berlin, pp 397–416Google Scholar
  39. 39.
    Rice AC, Hay S (2010) Decomposing power measurements for mobile devices. In: PerCom. IEEE Computer Society, Los Alamitos, pp 70–78Google Scholar
  40. 40.
    Riva O (2006) Contory: a middleware for the provisioning of context information on smart phones. In: Proc of intl conference on middleware, pp 219–239Google Scholar
  41. 41.
    Roy N, Misra A, Julien C, Das SK, Biswas J (2011) An energy-efficient quality adaptive framework for multi-modal sensor context recognition. In: Proc of 9th annual IEEE intl conference on pervasive computing and communications (PerCom), Seattle, WA, USA, pp 63–73Google Scholar
  42. 42.
    Salber D, Dey AK, Abowd GD (1999) The context toolkit: aiding the development of context-enabled applications. In: Proc of the SIGCHI conference on human factors in computing systems, pp 434–441Google Scholar
  43. 43.
    Sassen S (2011) Talking back to your intelligent city. McKinsey: What Matters, February 2011Google Scholar
  44. 44.
    Schiavoni V, Riviere E, Felber P (2011) Whisper: middleware for confidential communication in large-scale networks. In: Proc of the 31th IEEE intl conference on distributed computing systems (ICDCS), Minneapolis, USA, June 2011Google Scholar
  45. 45.
    Searls D (2010) Eof: now data gets personal. Linux J, January 2010Google Scholar
  46. 46.
    Swan M (2009) Emerging patient-driven health care models: an examination of health social networks, consumer personalized medicine and quantified self-tracking. Intl J Environ Res Publ Health 492–525Google Scholar
  47. 47.
    Tang KP, Lin J, Hong JI, Siewiorek DP, Sadeh NM (2010) Rethinking location sharing: exploring the implications of social-driven vs purpose-driven location sharing. In: Proc 12th intl conference on ubiquitous computing, Copenhagen, Denmark, pp 85–94CrossRefGoogle Scholar
  48. 48.
    Teng J, Zhang B, Li X, Bai X, Xuan D (2011) E-Shadow: lubricating social interaction using mobile phones. In: Proc of the 31th IEEE intl conference on distributed computing systems (ICDCS), Minneapolis, USA, June 2011Google Scholar
  49. 49.
    Toch E, Cranshaw J, Drielsma PH, Tsai JY, Kelley PG, Springfield J, Cranor LF, Hong JI, Sadeh NM (2010) Empirical models of privacy in location sharing. In: Proc 12th intl conference on ubiquitous computing, Copenhagen, Denmark, pp 129–138CrossRefGoogle Scholar
  50. 50.
    Wilkinson R, Pickett K (2009) The spirit level: why greater equality makes societies stronger. Bloomsbury Press, New YorkGoogle Scholar
  51. 51.
    Wolf G (2010) The data-drive life. The New York Times, April 2010Google Scholar

Copyright information

© The Brazilian Computer Society 2011

Authors and Affiliations

  1. 1.Dept. of Computer ScienceUniversity College LondonLondonUK
  2. 2.Computer LaboratoryUniversity of CambridgeCambridgeUK

Personalised recommendations