MEmoIt: From Lifelogging Application to Research Platform

In the recent years, smartphones became part of everyday life for most people. Their computational power and their sensing capabilities unlocked a new universe of possibilities for mobile developers. However, mobile development is still a young field and various pitfalls need to be avoided. In this chapter, the authors present several aspects of mobile development that need to be considered carefully. More specifically, this chapter covers topics like energy efficient sensing, smart computing, trade-off between accuracy and simplicity, data storage and cloud integration. These aspects are illustrated based on the authors’ experience building a lifelogging application for the past two years.

[1]  Xing Xie,et al.  Mining Individual Life Pattern Based on Location History , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.

[2]  Bernd Ludwig,et al.  Context-Aware Places of Interest Recommendations for Mobile Users , 2011, HCI.

[3]  Zhifeng Xiao,et al.  Security and Privacy in Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.

[4]  Karl Aberer,et al.  MemorySense: Reconstructing and ranking user memories on mobile devices , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).

[5]  Hong Zhao,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[6]  Hans-Peter Kriegel,et al.  A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.

[7]  Erez Shmueli,et al.  openPDS: Protecting the Privacy of Metadata through SafeAnswers , 2014, PloS one.

[8]  Arbee L. P. Chen,et al.  An Efficient Approach for Incremental Association Rule Mining , 1999, PAKDD.

[9]  Imad Aad,et al.  The Mobile Data Challenge: Big Data for Mobile Computing Research , 2012 .

[10]  Dino Pedreschi,et al.  Trajectory pattern mining , 2007, KDD '07.

[11]  Aaron Roth,et al.  The Algorithmic Foundations of Differential Privacy , 2014, Found. Trends Theor. Comput. Sci..

[12]  Karl Aberer,et al.  RoutineSense: A Mobile Sensing Framework for the Reconstruction of User Routines , 2015, EAI Endorsed Trans. Ambient Syst..

[13]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[14]  Daniel Gatica-Perez,et al.  Discovering human places of interest from multimodal mobile phone data , 2010, MUM.

[15]  Shen Furao,et al.  An enhanced self-organizing incremental neural network for online unsupervised learning , 2007, Neural Networks.