This Article 
 Bibliographic References 
 Add to: 
Information Dissemination between Mobile Nodes for Collaborative Context Awareness
December 2011 (vol. 10 no. 12)
pp. 1710-1725
Christos Anagnostopoulos, University of Athens, Athens
Stathes Hadjiefthymiades, University of Athens, Athens
Evangelos Zervas, TEI of Athens, Athens
In our everyday life, we frequently experience cases where persons group together. In those cases, context-aware systems capture and process identical context. Therefore, the need to collaboratively address Context Awareness (CA) emerges. In the considered setting, ad hoc networking between mobile nodes enables the exchange of information, thus, CA is facilitated. The synergy between mobile nodes materializes the Collaborative CA (CCA) paradigm. We advance the general CCA concept by performing communication between nodes probabilistically in a way similar to virus (epidemic) spreading. Nodes feature a hierarchical information model, which can be exploited by an information diffusion process. Multiple pieces of information, exchanged as epidemics, can complete the information present at a certain node, which in turn infers and spreads new information. We study this novel scheme extensively through an information model for context and an analytical framework (Markov process) with simulations. Our findings show that the information spreading large benefits from the mobility of nodes and semantic processing of the information model.

[1] B. Schilit and M. Theimer, “Disseminating Active Map Information to Mobile Hosts,” IEEE Network, vol. 8, no. 5, pp. 22-32, Sept. 1994.
[2] A.-M. Kermarrec, L. Massoulie, and A. Ganesh, “Probabilistic Reliable Dissemination in Large-Scale Systems,” IEEE Trans. Parallel and Distributed Systems, vol. 14, no. 3, pp. 248-258, Mar. 2003.
[3] C. Zesheng and J. Chuanyi, “Spatial-Temporal Modeling of Malware Propagation in Networks,” IEEE Trans. Neural Networks, vol. 16, no. 5, pp. 1291-1303, Sept. 2005.
[4] J. Kephart and S. White, “Directed-Graph Epidemiological Models of Computer Viruses,” Proc. IEEE Research in Security and Privacy pp. 343-359, 1991.
[5] A. Dey, “Understanding and Using Context,” Personal and Ubiquitous Computing J., vol. 5, no. 1, pp. 4-7, 2001.
[6] A. Datta, S. Quarteroni, and K. Aberer, “Autonomous Gossiping: A Self-Organizing Epidemic Algorithm for Selective Information Dissemination in Wireless Mobile Ad-Hoc Networks,” Proc. Int'l Conf. Semantics of a Networked World, pp. 126-143, 2004.
[7] D. Kempe, J. Kleinberg, and A. Demers, “Spatial Gossip and Resource Location Protocols,” J. ACM, vol. 51, no. 6, pp. 943-967, Nov. 2004.
[8] A. Küpper, Location-Based Services: Fundamentals and Operation. John Wiley & Sons, Oct. 2005.
[9] V. Papataxiarhis, V. Riga, V. Nomikos, O. Sekkas, K. Kolomvatsos, V. Tsetsos, P. Papageorgas, S. Vourakis, S. Hadjiefthymiades, and G. Kouroupetroglou, “MNISIKLIS: Indoor Location Based Services for All,” Proc. Fifth Int'l Symp. Location Based Services and TeleCartography, Nov. 2008.
[10] P. Brezillon, “Individual and Team Contexts in a Design Process,” Proc. IEEE Int'l Conf. System Sciences, 2003.
[11] M. Borges, P. Brezillon, J. Pino, and J. Pomerol, “Groupware System Design and the Context Concept,” Proc. Computer Supported Cooperative Work in Design (CSCWD '05), pp. 45-54, 2005.
[12] C. Anagnostopoulos, A. Tsounis, and S. Hadjiefthymiades, “Context Awareness in Mobile Computing Environments,” Wireless Personal Comm. J., vol. 2, no. 3, pp. 454-464, Aug. 2007.
[13] P. Brezillon and J. Pomerol, “Contextual Knowledge Sharing and Cooperation in Intelligent Assistant Systems,” Le Travail Humain, vol. 62, no. 3, pp. 223-246, 1999.
[14] C. Anagnostopoulos, P. Passias, and S. Hadjiefthymiades, “A Framework for Imprecise Context Reasoning,” Proc. IEEE Int'l Conf. Pervasive Services, pp. 181-184, 2007.
[15] S. Hamed, G. Bianconi, and M. Marsili, “Scale-Free Networks with an Exponent Less than Two,” Physical Rev., vol. E 73, p. 046113, 2006.
[16] C. Anagnostopoulos, E. Zervas, and S. Hadjiefthymiades, “An Epidemiological Model for Semantics Dissemination,” Proc. Third ACM Int'l Conf. Mobile Multimedia Comm. (MobiMedia '07), vol. 329, 2007.
[17] J. Mickens and B. Noble, “Modeling Epidemic Spreading in Mobile Environments,” Proc. ACM Wireless Security, pp. 77-86, 2005.
[18] S. Wasserman and K. Faust, Social Network Analysis. Cambridge Univ., 1994.
[19] D. Watts, Small Worlds: The Dynamics of Networks between Order and Randomness. Princeton Univ., 1999.
[20] M. Newman, “The Structure of Scientific Collaboration Networks,” Proc. Nat'l Academy of Sciences of USA, vol. 98, no. 2, pp. 404-409, 2001.
[21] M. Boguna, R. Pastor-Satorras, and A. Vespignani, “Epidemic Spreading in Complex Networks with Degree Correlations,” Proc. SITGES Conf. Statistical Mechanics of Complex Networks, pp. 127-147, 2003.
[22] Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos, “Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint,” Proc. 22nd Int'l Symp. Reliable Distributed Computing, pp. 25-34, 2003.
[23] M. Akdere, C. Cagatay, O. Gerdaneri, I. Korpeoglu, O. Ulusoy, and U. Cetintemel, “A Comparison of Epidemic Algorithms in Wireless Sensor Networks,” Elsevier Computer Comm. J., vol. 29, no. 13, pp. 2450-2557, Apr. 2006.
[24] A. Khelil, C. Becker, J. Tian, and K. Rothermel, “An Epidemic Model for Information Diffusion in MANETs,” Proc. ACM Workshop Modeling Analysis and Simulation of Wireless and Mobile Systems, pp. 54-60, 2002.
[25] M. Faloutsos, P. Faloutsos, and C. Faloutsos, “On Power-Law Relationships of the Internet Topology,” Proc. SIGCOMM, pp. 251-262, 1999.
[26] J. Mantyjarvi, P. Huuskonen, and J. Himberg, “Collaborative Context Determination to Support Mobile Terminal Applications,” IEEE Wireless Comm. Magazine, vol. 9, no. 5, pp. 39-45, Oct. 2002.
[27] A. Ganesh, L. Massoulie, and D. Towsley, “The Effect of Network Topology on the Spread of Epidemics,” Proc. IEEE INFOCOM, pp. 1455-1466, 2005.
[28] C. Anagnostopoulos and S. Hadjiefthymiades, “Enhancing Situation-Aware Systems through Imprecise Reasoning,” IEEE Trans. Mobile Computing, vol. 7, no. 10, pp. 1153-1168, Oct. 2008.
[29] V. Tsetsos and S. Hadjiefthymiades, “An Innovative Architecture for Context Foraging,” Proc. Int'l ACM Workshop Data Eng. for Wireless and Mobile Access (MobiDE in conjunction with SIGMOD/PODS '09), 2009.
[30] M. Musolesi and C. Mascolo, “Controlled Epidemic-Style Dissemination Middleware for Mobile Ad Hoc Networks,” Proc. Third Ann. Int'l Conf. Mobile and Ubiquitous Systems, 2006.
[31] G. Chen and D. Kotz, “Policy-Driven Data Dissemination for Context-Aware Applications,” Proc. Third IEEE Int'l Conf. Pervasive Computing and Comm., pp. 283-289, 2005.
[32] D. Ejigu, M. Scuturici, and L. Brunie, “CoCA: A Collaborative Context-Aware Service Platform for Pervasive Computing,” Proc. Fourth Int'l Conf. Information Technology (ITNG '07), pp. 297-302, 2007.
[33] A. Salkham, R. Cunningham, A. Senart, and V. Cahill, “A Taxonomy of Collaborative Context-Aware Systems,” Proc. CAISE Workshop Ubiquitous Mobile Information and Collaboration Systems (UMICS '06), pp. 899-911, 2006.
[34] R. Albert and A-L. Barabási, “Statistical Mechanics of Complex Networks,” Rev. of Modern Physics, vol. 74, no. 1, pp. 47-94, Jan. 2002, doi:10.1103/RevModPhys.74.47.
[35] U. Feige, D. Peleg, P. Raghavan, and E. Upfal, “Randomized Broadcast in Networks,” Proc. Int'l Symp. Algorithms, pp. 128-137, 1990.
[36] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, “Randomized Gossip Algorithms,” IEEE Trans. Information Theory, vol. 52, no. 6, pp. 2508-2530, June 2006.
[37] L. Xiao, S. Boyd, and S. Lall, “A Space-Time Diffusion Scheme for Peer-to-Peer Least-Squares Estimation,” Proc. Fifth Int'l Symp. Information Processing in Sensor Networks, pp. 168-176, 2006.

Index Terms:
Mobile computing, mobile applications, pervasive computing.
Christos Anagnostopoulos, Stathes Hadjiefthymiades, Evangelos Zervas, "Information Dissemination between Mobile Nodes for Collaborative Context Awareness," IEEE Transactions on Mobile Computing, vol. 10, no. 12, pp. 1710-1725, Dec. 2011, doi:10.1109/TMC.2011.19
Usage of this product signifies your acceptance of the Terms of Use.