{"id":277482,"date":"2016-08-16T12:13:54","date_gmt":"2016-08-16T19:13:54","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-event&#038;p=277482"},"modified":"2022-08-31T13:37:00","modified_gmt":"2022-08-31T20:37:00","slug":"seventh-annual-microsoft-research-networking-summit","status":"publish","type":"msr-event","link":"https:\/\/www.microsoft.com\/en-us\/research\/event\/seventh-annual-microsoft-research-networking-summit\/","title":{"rendered":"Seventh Annual Microsoft Research Networking Summit"},"content":{"rendered":"\n\n\n\n\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-277572\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/mobile_plus_cloud_banner.png\" alt=\"mobile_plus_cloud_banner\" width=\"538\" height=\"98\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/mobile_plus_cloud_banner.png 538w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/mobile_plus_cloud_banner-300x55.png 300w\" sizes=\"auto, (max-width: 538px) 100vw, 538px\"><\/p>\n<p>Microsoft Research\u2019s Seventh Annual Networking Summit will bring together researchers from academia and industry to discuss the new challenges in building mobile + cloud applications. The cross-disciplinary agenda of this summit will include presentations and discussions on creating the \u201cnewest and hottest\u201d applications and more.<\/p>\n<p>Wireless technologies, such as LTE, LTE Advanced, HSPA+, EVDO-RevB, WiMAX, and high-speed Wi-Fi, are enabling anytime, anywhere Internet connectivity. In addition, large-scale cloud infrastructure from Microsoft, Yahoo, Amazon and Google, provide abundant computational and storage resources with low programming and management overheads. These two developments compel us to rethink the current end-to-end design of mobile applications, ranging from software stacks on mobile devices to back-end services in the cloud. The cross-disciplinary agenda of this summit will include presentations and discussions on creating the \u201cnewest and hottest\u201d applications, overcoming the fundamental limitations in energy and physical capabilities, optimizing OS and networking stack, protecting the security of user data, and identifying proof-of-concept demonstrations. The objective is to take a critical and deep look at the nascent field, and to prioritize research problems to realize next-generation mobile applications.<\/p>\n\n\n\n\n\n<div class=\"js-accordion\" data-accordion-prefix-classes=\"msr-accordion\" data-accordion-expandall=\"true\">\n<h4 class=\"js-accordion__header\">\n\t\t\t\tWednesday, June 2, 2010\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><strong>8:00am \u2013 8:30am<\/strong><\/p>\n<p><strong>Breakfast<\/strong><\/p>\n<p><strong>8:30am \u2013 8:45am<\/strong><\/p>\n<p><strong>Welcome & Round Table Introductions<\/strong><\/p>\n<p><strong>8:45am \u2013 10:05am <\/strong><\/p>\n<p><strong>Exploiting Context<\/strong> (Chair: Ming Zhang, MSR Redmond)<\/p>\n<ol>\n<li><strong>A framework for context-aware applications,<\/strong> Ashok Agarwala, University of Maryland. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/aa1.pptx\">slides 1<\/a>) (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/aa2.pdf\">slides 2<\/a>)<\/li>\n<li><strong>Context-awareness, cloudlets and the case for AP-embedded, anonymous computing, <\/strong>Anthony LaMarca, Intel Research Seattle. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/anthony.ppt\">slides<\/a>)<\/li>\n<li><strong>Towards context-aware computing via the mobile social cloud, <\/strong>Rick Han, University of Colorado. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/msr_net_summit_rhan4.pptx\">slides<\/a>)<\/li>\n<li><strong>Intentional Networking<\/strong>, Brian Noble, University of Michigan. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/noble.pptx\">slides<\/a>)<\/li>\n<\/ol>\n<p><strong>10:05am \u2013 10:15am <\/strong><\/p>\n<p><strong>Break<\/strong><\/p>\n<p><strong>10:15am \u2013 11:35am <\/strong><\/p>\n<p><strong>Partitioning & Offloading<\/strong> (Chair: Jitu Padhye, Microsoft Research)<\/p>\n<ol>\n<li><strong>Leveraging fast VM fork for next generation mobile perception, <\/strong>Eyal de Lara, University of Toronto. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/eyal.pptx\">slides<\/a>)<\/li>\n<li><strong>The role of cloudlets in mobile computing, <\/strong>Mahadev Satyanarayanan, Carnegie Mellon University. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/satya.ppt\">slides<\/a>)<\/li>\n<li><strong>Programming smartphones as distributed systems with extreme heterogeneity, <\/strong>Lin Zhong, Rice University. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/lin.pptx\">slides<\/a>)<\/li>\n<li><strong>Resource-intensive mobile computing (Project MAUI), <\/strong>Alec Wolman, MSR Redmond. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/alec.pptx\">slides<\/a>)<\/li>\n<\/ol>\n<p><strong>11:35am \u2013 11:45am<\/strong><\/p>\n<p><strong>Break<\/strong><\/p>\n<p><strong>11:45am \u2013 12:30pm<\/strong><\/p>\n<p><strong>Round Table Discussion: My favorite mobile computing research paper from last three years (not my own)<\/strong><\/p>\n<p><strong>12:30pm \u2013 1:20pm<\/strong><\/p>\n<p><strong>Mingling & Lunch<\/strong><\/p>\n<p><strong>1:20pm \u2013 3:00pm <\/strong><\/p>\n<p><strong>Novel Scenarios<\/strong> (Chair: Ratul Mahajan, MSR Redmond)<\/p>\n<ol>\n<li><strong>Remembering what matters,<\/strong> Romit Roy Choudhury, Duke University (<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/synrg.ee.duke.edu\/ppts\/MoVi-MSR-Summit.ppt\">slides<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>)<\/li>\n<li><strong>Cloudlets on phones,<\/strong> Gaetano Borriello, University of Washington (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/borriello-msr.pdf\">slides<\/a>)<\/li>\n<li><strong>Experiences with a vehicular cloud computing platform,<\/strong> Jason Flinn, University of Michigan (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/jason.ppt\">slides<\/a>)<\/li>\n<li><strong>Cloudy with a chance of mobile social computing,<\/strong> Maria Ebling, IBM Research (slides)<strong>Understanding the behavior of a large-scale, multi-player, mobile game in the wild, <\/strong>Suman Banerjee, University of Wisconsin (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/suman.pdf\">slides<\/a>)<\/li>\n<\/ol>\n<p><strong>3:00pm \u2013 3:10pm<\/strong><\/p>\n<p><strong>Bio Break<\/strong><\/p>\n<p><strong>3:10pm \u2013 3:50pm <\/strong><\/p>\n<p><strong>Security & Privacy<\/strong> (Chair: Srikanth Kandula, Microsoft Research)<\/p>\n<ol>\n<li><strong>Vanish: self-destructing digital data, <\/strong>Yoshi Kohno, University of Washington<\/li>\n<li><strong>Improving the Security of Commodity Hypervisors for Cloud Computing, <\/strong>Stefan Saroiu, MSR Redmond (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/saroiu_networking_summit_2010.pdf\">slides<\/a>)<\/li>\n<\/ol>\n<p><strong>3:50pm \u2013 5:10pm <\/strong><\/p>\n<p><strong>Social Event<\/strong><\/p>\n<p>Fun times at <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.bowlluckystrike.com\/\">Lucky Strike Lane & Lounge<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p>Group photos & mingling<\/p>\n<p><strong>5:10pm \u2013 6:30pm <\/strong><\/p>\n<p><strong>Cloud Infrastructure<\/strong> (Chair: Sharad Agarwal, MSR Redmond)<\/p>\n<ol>\n<li><strong>Centralize what you can, distribute what you must: a telco\u2019s view to the cloud,<\/strong> Pablo Rodriguez, Telefonica Research. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/pablo.pdf\">slides<\/a>)<\/li>\n<li><strong>Networking as a service: cloud centric networking in a federated network environment,<\/strong> Raj Jain, Washington University in St. Louis. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/raj.pdf\">slides<\/a>)<\/li>\n<li><strong>Educational support infrastructure for mobile + cloud computing (Project HAWAII), <\/strong>Jitendra Padhye, MSR Redmond. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/padhye.pptx\">slides<\/a>)<\/li>\n<li><strong>Future challenges from FAWN, <\/strong>Dave Andersen, CMU. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/david.pdf\">slides<\/a>)<\/li>\n<\/ol>\n<p><strong>7:00pm <\/strong><\/p>\n<p><strong>Cocktails & Dinner Banquet<\/strong> at <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.thepurplecafe.com\/\">Purple Cafe<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p>Host: <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/malvar\/\">Rico Malvar<\/a>, Distinguished Engineer and Managing Director, MSR Redmond<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tThursday, June 3, 2010\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><strong>8:30am \u2013 9:00am <\/strong><\/p>\n<p><strong>Breakfast<\/strong><\/p>\n<p><strong>9:00am \u2013 9:50am <\/strong><\/p>\n<p><strong>Round Table Discussion: My five year research agenda in mobile computing<\/strong><\/p>\n<p><strong>9:50am \u2013 10:00am<\/strong><\/p>\n<p><strong>Break<\/strong><\/p>\n<p><strong>10:00am \u2013 11:20pm <\/strong><\/p>\n<p><strong>Research Showcase (Demos & Posters)<\/strong><\/p>\n<ul>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/dimitrios.pdf\">A Mobile Search and Advertisement Cache Architecture<\/a> <\/em>(Dimitrios Lymberopoulos, MSR)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/falaki.pdf\">Diversity in Smartphone Usage<\/a> <\/em>(Hossein Falaki, Ratul Mahajan, Deborah Estrin, UCLA & MSR)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/ramesh.pdf\">Trends in Mobile and Cloud Computing<\/a> <\/em>(Joongheon Kim, Bin Liu, Nilesh Mishra, Luis Pedrosa, University of Southern California)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/bodhi.pdf\">Continuous Sensing on Mobile Phones<\/a> <\/em>(Bodhi Priyantha, Dimitrios Lymberopoulos, Jie Liu, MSR Redmond)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/yangfan.pdf\">A Platform for Mobile-Cloud Computing in Streams<\/a> <\/em>(Fan Yang, MSR Asia)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/xu.pdf\">Anatomizing Application Performance Differences on Smartphones<\/a> <\/em>(Junxian Huang, Qiang Xu, Birjodh Tiwana, Z. Morley Mao, Ming Zhang, Victor Bahl, Michigan & MSR)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/azarias.pdf\">Network solutions for challenged environments<\/a> <\/em>(Azarias Reda, Univeristy of Michigan)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/brett.pdf\">Intentional Networking<\/a> <\/em>(Brett Higgins, Brian Noble, University of Michigan)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/ratul.pdf\">Augmenting Mobile 3G using Wi-Fi<\/a> <\/em>(Aruna Balasubramanian, Ratul Mahajan, Arun Venkataramani, UMASS & MSR)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/ashish.pdf\">The Anatomy of a Large Mobile Massively Multiplayer Online Game<\/a> <\/em>(Ashish Patro, Suman Banerjee, University of Wisconsin)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/aaron.pdf\">Anonymous APIs = Anonymous Cloud Services<\/a> <\/em>(Aaron Beach, Colorado)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/cem.pdf\">Using Multiple Wearable Sensors Dynamically to Facilitate Activity Recognition<\/a> <\/em>(Cem Onyuksel, Carnegie Mellon University)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/stefan.pdf\">Trusted Sensors<\/a> <\/em>(Stefan Saroiu, Alec Wolman, MSR Redmond)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/sharad.pdf\">Virtual Compass: relative positioning to enable mobile social interactions<\/a> <\/em>(Sharad Agarwal, Victor Bahl, Nilanjan Banerjee, Ranveer Chandra, Alec Wolman, Mark Corner, UMASS & MSR)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/sierra.pdf\">Sierra: practical power-proportionality for data center storage<\/a> <\/em>(Eno Thereska, Austin Donnelly, Dushyanth Narayanan, MSR Cambridge)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/rohit.pdf\">FoneAstra: Making Mobile Phones Smarter<\/a> <\/em>(Rohit Chaudhri, Kentaro Toyama, Bill Thies, University of Washington & MSR India)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/yunxin.pdf\">Energy Efficient Mobile Computing Through Cloud Offloading<\/a> <\/em>(Yunxin Liu, Yongqiang Xiong, Microsoft Research Asia)<\/li>\n<\/ul>\n<p><strong>11:20am \u2013 12:30pm <\/strong><\/p>\n<p><strong>Panel: \u201cSmartphone: is this it?\u201d<\/strong><\/p>\n<p>Moderator: <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/bahl\/\">Victor Bahl<\/a>, MSR Redmond<\/p>\n<p>Panelists:<\/p>\n<ul>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/susiewee\">Susie Wee<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, CTO, Client Cloud Services, Hewett Packard<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.infosys.com\/about\/management-profiles\/Pages\/subrahmanyam-goparaju.aspx\">Subrahmanyam Goparaju<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, Vice President and Head, SETLabs, Infosys<\/li>\n<li>Keith Rowe, Director of Hardware, KIN, Microsoft Corporation<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.cs.cmu.edu\/~dps\/\">Dan P. Siewiorek<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, Director of HCI Institute, Carnegie Mellon University<\/li>\n<\/ul>\n<p><strong>12:30pm \u2013 12:40pm<\/strong><\/p>\n<p><strong>Set up Working Groups<\/strong><\/p>\n<p><strong>12:40pm \u2013 1:30pm <\/strong><\/p>\n<p><strong>Mingling & Lunch<\/strong><\/p>\n<p><strong>1:30pm \u2013 3:30pm <\/strong><\/p>\n<p><strong>Brainstorming<\/strong><\/p>\n<p><strong>WG1: Cloud services for mobile<\/strong><\/p>\n<ul>\n<li>Discussion lead: <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/cseweb.ucsd.edu\/~snoeren\/\">Alex C. Snoeren<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, UCSD<\/li>\n<\/ul>\n<p><strong>WG2: Smartphone 2020 & disruptive hardware capabilities<\/strong><\/p>\n<ul>\n<li>Discussion lead: <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/dburger\/\">Doug Burger<\/a>, eXtreme Computing Group, MSR<\/li>\n<\/ul>\n<p><strong>WG3: Sleep well \u2013 designing for security & privacy<\/strong><\/p>\n<ul>\n<li>Discussion lead: <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.cs.ucl.ac.uk\/staff\/b.karp\/\">Brad Karp<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, University College London.<\/li>\n<\/ul>\n<p><strong>WG4: Game changing platform & applications<\/strong><\/p>\n<ul>\n<li>Discussion lead: <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/people.ee.duke.edu\/~romit\/\">Romit Roy Choudhury<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, Duke University.<\/li>\n<\/ul>\n<p><strong>3:30pm \u2013 4:30pm<\/strong><\/p>\n<p><strong>Working Group Presentations<\/strong><\/p>\n<p><strong>4:30pm \u2013 5:30pm<\/strong><\/p>\n<p><strong>Round Table Impressions & Wrap-up<\/strong><\/p>\n<p><strong>6:00pm<\/strong><\/p>\n<p><strong>Plated Dinner<\/strong> at <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.starwoodhotels.com\/pub\/media\/1555\/na1555lo5_tn.jpg\">Westin Hotel in the GrandBall Room-C<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p><\/p><\/div>\n<p><\/p><\/div>\n\n\n\n\n\n<div class=\"js-accordion\" data-accordion-prefix-classes=\"msr-accordion\" data-accordion-expandall=\"true\">\n<h4 class=\"js-accordion__header\">\n\t\t\t\tRover: A Framework for Context-Aware Applications\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-277503\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/aa.jpg\" alt=\"aa\" width=\"150\" height=\"180\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.cs.umd.edu\/~agrawala\" target=\"_blank\" rel=\"noopener noreferrer\">Ashok Agarwala<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> | University of Maryland<\/p>\n<p>Rover is a framework for integration of context-aware applications in which a number and variety of client devices such a smart phones, PDAs etc. may connect to its server using communication channels such as 2G, 3G, WiFi, WiMAX, etc., and obtain information and services appropriate for their context. The context for each client is maintained and managed by the server and is used to customize the information and services provided. MyeVyu is an application suite that has been implemented to show the capabilities of this framework for use by a campus community. This system can location a client anywhere on campus, indoors or outdoors, with an accuracy of 10\u2019 or better. MyeVyu applications include: Campus and class information (Class schedule, Campus events, Assignments and exams, Grades, Campus Alerts), Weather, Transportation (Real time information about Washington Metro Trains, Washington Metro Buses, Campus Shuttle Buses, Parking location), Social Networking, Campus building and directory, Public Safety Access.<\/p>\n<p>The public safety application, called V911, not only provides the identity of the client and the location to the Public Safety Answering Point (PSAP) but also opens an audio and a video stream from the client device so that the dispatcher can hear and see the incident scene. If there are any PTZ cameras in the area the video feeds from them are also provided to the dispatcher who can forward one or more of the feeds to a responder assigned to handle the situation. This way the responder has up to the minute information about the incident. Rover is a flexible integration platform on which a number of additional applications are being developed.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tContext-awareness, Cloudlets and the Case for AP-embedded, Anonymous Computing\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-277506\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/al.jpg\" alt=\"al\" width=\"150\" height=\"161\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" title=\"\" href=\"http:\/\/seattle.intel-research.net\/people\/lamarca\/\" target=\"_blank\" rel=\"noopener noreferrer\">Anthony LaMarca<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>&nbsp;| Intel Research, Seattle<\/p>\n<p>Context-awareness and the ability of our computing devices to sense where we are, who we are with, and what we are doing is driving a new class of high-value, always-on applications and services. As the need for coverage, accuracy and detail increases, context-aware devices will increasingly rely on computationally intense vision-based approaches to inferring context. A promising solution to the efficient implementation of mobile context-awareness is the \u201ccloudlet\u201d model proposed by Satyanarayanan et al. I will outline why I think the trend towards vision-based context-awareness will drive demand for cloudlets and some of the challenges and market opportunities it will enable.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tTowards Context-Aware Computing Via the Mobile Social Cloud\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-277539\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/rh.jpg\" alt=\"rh\" width=\"110\" height=\"164\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.cs.colorado.edu\/~rhan\/\" target=\"_blank\" rel=\"noopener noreferrer\">Rick Han<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>&nbsp;| University of Colorado<\/p>\n<p>The combination of mobile smartphones with social networks enables a new era of context-aware computing, which stimulates new thinking about what kind of cloud services and infrastructure are needed to support smart mobile-aware spaces. We will describe our initial research focused on creating context-aware applications using mobile social networks, namely our SocialFusion project. Some of the interesting issues addressed by SocialFusion so far include group-based context awareness, as well as privacy and anonymity concerns introduced by mobile social networks. We will describe some of our initial thinking on what kinds of common services and framework may be needed to enable context awareness via the mobile social cloud.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tLeveraging Fast VM Fork for Next Generation Mobile Perception\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-277518\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/edl.jpg\" alt=\"edl\" width=\"150\" height=\"226\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.cs.toronto.edu\/~delara\/\" target=\"_blank\" rel=\"noopener noreferrer\">Eyal de Lara<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>&nbsp;| University of Toranto<\/p>\n<p>Cloudlets, consisting of infrastructure accessible via a wireless LAN, are poised to enable a new generation of mobile applications that opportunistically leverage nearby computationally resources to augment human perception. We anticipate that cloudlets could be implemented as networks of computational enabled access points that lend their resources to nearby mobile users. The speed and local setting is necessary since most of the next generation perception (ESP) use cases require low latencies for responsiveness to human interaction. In this talk, I will describe early research that leverages fast virtual machine (VM) fork to migrate computation between a mobile device and a nearby cloudlet, and once on the cloudlet to enable parallel computation. VM fork is a novel abstraction that enables fast (hundreds of milliseconds) instantiation of computing elements in a cloud environment. While VM fork is conceptually a simple idea, the large size of VM memory images (which reaches hundreds of megabytes or even gigabytes) makes an efficient implementation challenging. Our VM fork implementation addresses this challenge with three key mechanisms: Lazy State Replication, which allows for extremely fast instantiation of VM clones by initially copying only metadata necessary to resume a VM, and transmitting the parent\u2019s state that the clone actually accesses on demand; Avoidance Heuristics, which eliminate superfluous memory transfers for the common case of clones allocating new private state; and Multicast Distribution, a technique that provides scalability and pre-fetching by multicasting replies to memory page requests.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tThe Role of Cloudlets in Mobile Computing\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-277548\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/satya.jpg\" alt=\"satya\" width=\"150\" height=\"195\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.cs.cmu.edu\/~satya\/\" target=\"_blank\" rel=\"noopener noreferrer\">Mahadev Satyanarayanan<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>&nbsp;| Carnegie Mellon University<\/p>\n<p>Imagine Wi-Fi points augmented with computing, memory and storage resources that can be used by nearby mobile devices. How could the widespread deployment of such infrastructure fundamentally change mobile computing? Rather than relying on a distant cloud, a mobile user could rapidly instantiate and use a customized \u201ccloudlet\u201d that is just one wireless hop away. Crisp interactive response for immersive applications that augment human cognition is then much easier to achieve because the proximity of the cloudlet ensures low latency and jitter. A critical aspect of this vision, namely rapid customization of cloudlet infrastructure, is achievable through dynamic VM synthesis.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tProgramming Smartphones as Distributed Systems with Extreme Heterogeneity\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-277527\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/lz.jpg\" alt=\"lz\" width=\"150\" height=\"200\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.ruf.rice.edu\/~lzhong\/\" target=\"_blank\" rel=\"noopener noreferrer\">Lin Zhong<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>&nbsp;| Rice University<\/p>\n<p>To enable creative services on smartphones-like mobile systems, researchers have sought help from two very different computing platforms. On one hand, sensors, either built in device or wireless body-worn, have been studied to enhance the \u201csense\u201d of smartphones so that the latter can better infer about the user and their context. On the other extreme, the powerful cloud has been leveraged to enhance the \u201cbrain\u201d of smartphones so that the latter can benefit sophisticated applications of pattern recognition, data mining, and artificial intelligence. As a result, the smartphone increasingly appears to be a distributed system with the cloud at one end and sensors at the other from the perspective of application developers. To help developers cope with such extreme heterogeneity, we have been studying programming and operating system support so that they can code applications for smartphones in a platform transparent way yet still benefit from the power and efficiency of programmable execution in the cloud and in the sensor. We will be able to share some early results from our Reflex project along this direction.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tFuture Challenges from FAWN\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-277515\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/da.jpg\" alt=\"da\" width=\"150\" height=\"156\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.cs.cmu.edu\/~dga\/\" target=\"_blank\" rel=\"noopener noreferrer\">David Andersen<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>&nbsp;| Carnegie Mellon University<\/p>\n<p>This talk will briefly describe our experiences building an energy-efficient cluster architecture for data-intensive computing, called FAWN: A Fast Array of Wimpy Nodes. FAWN makes use of an array of low-power, energy efficient nodes instead of more traditional high-performance computers. In the process, it drastically reduces power consumption, particularly for I\/O bound workloads, but the constrained CPU and DRAM, and the performance quirks of flash memory impose substantial systems engineering challenges. I will overview the solutions we developed, and then discuss the ongoing systems and algorithmic challenges that sit between the fundamental efficiency of the architecture and its practical realization. I will conclude with a brief mention of a future, radically constrained, hardware platform that is guiding our upcoming research.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tCentralize What You Can, Distribute What You Must: a Telco&#8217;s View to the Cloud\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-277536\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/pr.jpg\" alt=\"pr\" width=\"150\" height=\"208\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.rodriguezrodriguez.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pablo Rodriguez<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>&nbsp;| Telefonica<\/p>\n<p>Over the last years, most networking research has focused on the \u201cdivide and conquer principle\u201d, with more and more distributed architectures where the goal was to achieve better scalability and reliability. However, with more distributed architectures also come higher operational costs (configuration, management, support, upgrades, etc). In fact, operational costs are often orders of magnitude higher than the costs of the infrastructure itself. As a result one may want to centralized most equipment to reduce operational costs, and distribute only those elements required for scalability and efficiency. In wireless, new smartphone devices are causing a number of operational costs in the network infrastructure that cause constant upgrades and expensive maintenance. In this talk, i will describe some of these problems, and delve into some potential solutions.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tNetworking as a Service: Cloud Centric Networking in a Federated Network Environment\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-277542\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/rj.jpg\" alt=\"rj\" width=\"150\" height=\"225\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.cse.wustl.edu\/~jain\/\" target=\"_blank\" rel=\"noopener noreferrer\">Raj Jain<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>&nbsp;| Washington University<\/p>\n<p>While cloud computing technology allows efficient sharing of compute resources, dynamically provisioning wide-area QoS links, interconnecting distributed application instances deployed over resources leased from multiple cloud providers, is still static and non-trivial. Therefore, customers are limited either to a single cloud service provider or to static links that cannot be easily allocated and de-allocated on demand. Here we are not talking about simple cloud service such as document sharing that can be easily be done using best effort low speed connections over the public Internet. We are concerned about applications requiring significant network bandwidth such as data intensive computing.<\/p>\n<p>Elastic Pipes \u2013 an extension of our NSF funded Internet 3.0 architecture \u2013 extend the cloud computing concepts to networking and allow telecommunication service providers to advertise their transport capabilities. Clients can establish high-speed connections with desired quality of service by dynamically combining transport service objects from various carriers. This will allow cloud computing to grow into a \u201cCloud Market\u201d where the clients can choose cloud computing resources from \u201cNetwork as a service (NaaS)\u201d offerings from different providers and interconnect them via elastic pipes using different telecommunication carriers.<\/p>\n<p>This is somewhat of a \u201cparadigm shift\u201d from current practice but is inevitable given the current success of \u201csoftware as a service (SaaS)\u201d and \u201cInfrastructure as a Service(IaaS)\u201d service offerings of commercial cloud platforms that is expected to enable feasible deployment of high end distributed applications and services.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tVanish: Self Destructing Digital Data\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-277554\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/yk.jpg\" alt=\"yk\" width=\"150\" height=\"203\"><\/p>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.cs.washington.edu\/homes\/yoshi\/\" target=\"_blank\" rel=\"noopener noreferrer\">Yoshi Kohno<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>&nbsp;| University of Washington<\/p>\n<p>Computing and communicating through the web make it virtually impossible to leave the past behind. College Facebook posts or pictures can resurface during a job interview; a lost or stolen laptop can expose personal photos or messages; or a legal investigation can subpoena the entire contents of a home or work computer, uncovering incriminating or just embarrassing details from the past.<\/p>\n<p class=\"smallText\">Our research seeks to protect the privacy of past, archived data \u2014 such as copies of emails maintained by an email provider \u2014 against accidental, malicious, and legal attacks. Specifically, we wish to ensure that all copies of certain data become unreadable after a user-specified time, without any specific action on the part of a user, without needing to trust any single third party to perform the deletion, and even if an attacker obtains both a cached copy of that data and the user\u2019s cryptographic keys and passwords.<\/p>\n<p class=\"smallText\">\n<\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tIntentional Networking\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-277512\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/bn.jpg\" alt=\"bn\" width=\"110\" height=\"142\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.eecs.umich.edu\/~bnoble\/\" target=\"_blank\" rel=\"noopener noreferrer\">Brian Noble<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>&nbsp;| University of Michigan<\/p>\n<p>Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This talk introduces Intentional Networking, a simple but powerful mechanism for handling network diversity. Applications supply a declarative label for network transmissions, and the system matches transmissions to the most appropriate network. The system may also defer and re-order opportunistic transmissions subject to application-supplied mutual exclusion and ordering constraints. We have modified three applications to use Intentional Networking: BlueFS, a distributed file system for pervasive computing, Mozilla\u2019s Thunderbird e-mail client, and a vehicular participatory sensing application. Compared to an idealized solution that makes optimal use of all aggregated available networks but without knowledge of application intent, Intentional Networking improves the latency of interactive messages from 42% to 13x, while adding only 1-8% throughput overhead.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tCloudlets on Phones\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p style=\"text-align: left\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-277521\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/gb.jpg\" alt=\"gb\" width=\"150\" height=\"218\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.cs.washington.edu\/homes\/gaetano\/\" target=\"_blank\" rel=\"noopener noreferrer\">Gaetano Borriello<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>&nbsp;| University of Washington<\/p>\n<p>Entrepreneurial people in developing regions have many ideas for mobile applications that will provide useful services in their local context. However, they are faced with a large barrier to developing and deploying those applications because they usually require external experts to help them harness cloud services. From our experiences in this space, we have reached the conclusion that a series of stepping stones are needed that allow applications to progress from simple implementations running on a user\u2019s own phone to full-fledged cloud-hosted applications. Communication constraints are quite different than the developed world, for example, data plans are very uncommon and most communication is through voice and SMS with specific costs associated with each call or message, often paid via pay-as-you-go plans. Applications must be built on simple communication technology with a clear migration path as GPRS and Internet connectivity become more available in the developing world.<\/p>\n<p>In this talk, we propose a set of steps for both the development and deployment of mobile applications that we believe are applicable in many parts of the world, especially given the increasing availability of high-end phones that can serve as hosting sites themselves. We highlight the challenges given some simple mechanisms on which many applications can be built. Our ultimate goal is to make it easy for entrepreneurs in developing regions to enable their ideas for mobile applications, generate their own content, and have the pride of ownership that will sustain their efforts.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tExperiences with a Vehicular Cloud Computing Platform\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-277524\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/jf.jpg\" alt=\"jf\" width=\"150\" height=\"194\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.eecs.umich.edu\/~jflinn\/\" target=\"_blank\" rel=\"noopener noreferrer\">Jason Flinn<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>&nbsp;| University of Michigan<\/p>\n<p>In this talk, I\u2019ll describe the experiences and lessons learned from teaching a class called \u201cCloud Computing in the Commute\u201d with Brian Noble and TJ Giuli at the University of Michigan last semester. In this project-based course, student teams designed, built, and demonstrated applications that leveraged an in-vehicle mobile sensing platform connected via wireless networks with cloud services. During the semester, students road-tested their applications on a computing platform built into a Ford Fiesta. At the end of the semester, a contest was held in which students demoed their applications; the winning team drove their project to Maker Faire in California. While our focus in this class was educational in nature, our experiences nevertheless illuminated several important research issues to consider in the design of mobile\/cloud applications, especially those intended for vehicular environments.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tCloudy with a Chance of Mobile Social Computing\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-277530\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/me.jpg\" alt=\"me\" width=\"110\" height=\"165\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" title=\"\" href=\"http:\/\/domino.research.ibm.com\/comm\/research_people.nsf\/pages\/ebling.index.html\" target=\"_blank\" rel=\"noopener noreferrer\">Maria Ebling<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>&nbsp;| IBM Research<\/p>\n<p>How does one bring information technology to people living on the margins of contemporary society? Whether in the U.S. or in the developing world, can a lack of computer access be overcome instead with inexpensive mobile phones? How might one go about addressing this need? In this talk, I will present some work we have been doing to support the homeless here in the U.S. and farmers in developing nations. One project, MobiSMD (aka PictureTalk), supports asynchronous conversations anchored by pictures. Another, CRM (joint with Chris Le Dantec of GaTech), focuses on supporting homeless clients and their case workers through mobile messaging and information dissemination. I will present an overview of the scenarios and discuss the requirements such applications place on a cloud infrastructure.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tUnderstanding the Behavior of a Large-Scale, Multi-Player, Mobile Game in the Wild\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/pages.cs.wisc.edu\/~suman\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-277551\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/sb.jpg\" alt=\"sb\" width=\"193\" height=\"204\"><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p style=\"text-align: left\" align=\"right\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/pages.cs.wisc.edu\/~suman\/\" target=\"_blank\" rel=\"noopener noreferrer\">Suman Banerjee<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>&nbsp;| University of Wisconsin<\/p>\n<p>This talk describes a large-scale, long-term measurement study of a popular mobile Massively Multiplayer Online Role Playing Game (MMORPG), called Parallel Kingdom, with over 100,000 users distributed across 70 countries. Our study covers various aspects of the game including (i) characteristics of its players population, (ii) player behavior, (iii) network-level characteristics observed between game servers and player devices that connect through WiFi and cellular networks world-wide, (iv) money spending behavior of players and how network phenomenon affects such behavior, and (v) player mobility patterns. Our measurement study spans almost the entire life of the game staring from its inception on October 31, 2008 to until May 8, 2010 (555 days in total).<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tRemembering What Matters\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p style=\"text-align: left\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-277545\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/romit.jpg\" alt=\"romit\" width=\"153\" height=\"167\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/romit.jpg 530w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/romit-274x300.jpg 274w\" sizes=\"auto, (max-width: 153px) 100vw, 153px\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/pages.cs.wisc.edu\/~suman\/\" target=\"_blank\" rel=\"noopener noreferrer\">Romit Roy Choudhury<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>&nbsp;| Duke University<\/p>\n<p>Sensor networks have been conventionally defined as a network of sensor motes that collaboratively detect important events from their surroundings. We make an attempt to extend this notion to the social context by using mobile phones as a replacement for motes. We envision a system in which mobile phones collaboratively sense their ambience, recognize socially \u201cinteresting\u201d events, and record short video clips of those events. At the end of the day, the video clips from different phones are \u201cstitched\u201d together, thereby creating an automatic video highlights of the occasion. We have built in early (offline) prototype of such a system using Nokia phones and iPod Nanos, and have experimented in real-life social gatherings. Results show that automatically generated video highlights are quite similar to those created manually, (i.e., by painstakingly editing the entire video of the occasion). In that sense, our system may be viewed as a collaborative information-distillation tool, capable of \u201cremembering what matters\u201d.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tMAUI: enabling fine-grained code offload for resource-intensive applications\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-277509\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/alecw.jpg\" alt=\"alecw\" width=\"75\" height=\"75\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/alecw\/\" target=\"_self\" rel=\"noopener\">Alec Wolman<\/a>&nbsp;| Microsoft Research<\/p>\n<p>MAUI is a system that enables \ufb01ne-grained energy-aware of\ufb02oad of mobile code to the infrastructure. Previous approaches to these problems either relied heavily on programmer support to partition an application, or they were coarse-grained requiring full process (or full VM) migration. MAUI uses the bene\ufb01ts of a managed code environment to offer the best of both worlds: it supports \ufb01ne-grained code of\ufb02oad to maximize energy savings with minimal burden on the programmer. MAUI decides at run-time which methods should be remotely executed, driven by an optimization engine that achieves the best energy savings possible under the mobile device\u2019s current connectivity constrains. Using MAUI, we have developed: 1) a resource-intensive face recognition application that consumes an order of magnitude less energy, 2) a latency-sensitive arcade game application that doubles its refresh rate, and 3) a voice-based language translation application that bypasses the limitations of the smartphone environment by executing unsupported components remotely.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tTrusted Sensors\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-277533\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/me_2010.jpg\" alt=\"me_2010\" width=\"155\" height=\"235\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/me_2010.jpg 243w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/me_2010-198x300.jpg 198w\" sizes=\"auto, (max-width: 155px) 100vw, 155px\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/ssaroiu\/\" target=\"_self\" rel=\"noopener\">Stefan Saroiu<\/a>&nbsp;| Microsoft Research<\/p>\n<p>Despite the popularity of adding sensors to mobile devices, the readings provided by these sensors cannot be trusted. Users can fabricate sensor readings with relatively little effort. This lack of trust discourages the emergence of applications where users have an incentive to lie about their sensor readings, such as falsifying a location or altering a photo taken by the camera. In this talk, we will present a broad range of applications that would benefit from the deployment of trusted sensors, from participatory sensing to monitoring energy consumption. We describe two design alternatives for making sensor readings trustworthy. Although both designs rely on the presence of a trusted platform module (TPM), they trade-off security guarantees for hardware requirements. While our first design is less secure, it requires no additional hardware beyond a TPM, unlike our second design. Finally, we present the privacy issues arising from the deployment of trusted sensors and we discuss protocols that can overcome them.<\/p>\n<p><\/p><\/div>\n<p><\/p><\/div>\n\n\n\n\n\n<h2>Non-Microsoft Particpants<\/h2>\n<ul>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.cs.umd.edu\/~agrawala\/\">Ashok Agarwala<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, University of Maryland<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.cs.cmu.edu\/~dga\/\">Dave Andersen, <span class=\"sr-only\"> (opens in new tab)<\/span><\/a>Carnegie Mellon University<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/pages.cs.wisc.edu\/~suman\/\">Suman Banerjee, <span class=\"sr-only\"> (opens in new tab)<\/span><\/a>University of Wisconsin<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.cs.washington.edu\/homes\/gaetano\/\">Gaetano Borriello<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, University of Washington<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/people.ee.duke.edu\/~romit\/\">Romit Roy Choudhury<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, Duke University<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/domino.research.ibm.com\/comm\/research_people.nsf\/pages\/ebling.index.html\">Maria Ebling<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, IBM<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.eecs.umich.edu\/~jflinn\/\">Jason Flinn<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, University of Michigan<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.infosys.com\/about\/management-profiles\/Pages\/subrahmanyam-goparaju.aspx\">Subrahmanyam Goparaju<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, Infosys<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.cs.colorado.edu\/~rhan\/\">Rick Han<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, University of Colorado<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.cs.ucl.ac.uk\/staff\/B.Karp\/\">Brad Karp<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, University College London<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.cs.washington.edu\/homes\/yoshi\/\">Yoshi Kohno<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, University of Washington<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.cs.toronto.edu\/~delara\/\">Eyal de Lara<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, University of Toronto<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/seattleweb.intel-research.net\/people\/lamarca\/Publications.html\">Anthony LaMarca<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, Intel<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.eecs.umich.edu\/~bnoble\/\">Brian Noble<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, University of Michigan<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/rodriguezrodriguez.com\/\">Pablo Rodriguez<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, Telefonica<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.cs.cmu.edu\/~satya\/\">Mahadev Satyanarayanan<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, Carnegie Mellon University<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.cs.cmu.edu\/~dps\/\">Daniel P. Siewiorek, <span class=\"sr-only\"> (opens in new tab)<\/span><\/a>Carnegie Mellon University<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/cseweb.ucsd.edu\/~snoeren\/\">Alex C. Snoeren<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, University of California San Diego<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.communities.hp.com\/online\/blogs\/wee\/default.aspx\">Susie Wee<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, Hewett Packard<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.ruf.rice.edu\/~lzhong\/\">Lin Zhong<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, Rice University<\/li>\n<\/ul>\n<h2>Students<\/h2>\n<ul>\n<li>Sara Alspaugh,&nbsp;University of California Berkeley<\/li>\n<li>Aaron Beach, University of Colorado<\/li>\n<li>Rohit Chaudhri, University of Washington<\/li>\n<li>Hossein Falaki, University of California Los Angeles<\/li>\n<li>Brett Higgins, University of Michigan<\/li>\n<li>Cem Onyuksel, Carnegie Mellon university<\/li>\n<li>Ashish Patro, University of Wisconsin<\/li>\n<li>Azarias Reda, University of Michigan<\/li>\n<li>Qiang Xu, University of Michigan<\/li>\n<\/ul>\n\n\n\n\n\n<p>The MSR Networking Summit is an annual event organized by the <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/group\/networking-research-group\/\">Networking Research Group<\/a>&nbsp;at Microsoft Research, Redmond. Previous summits have focused on home networks, cognitive wireless networks and high speed TCP, among others.<\/p>\n<ul>\n<li>2009: <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"http:\/\/www.cs.washington.edu\/mssi\/2009\/index.html\">Unraveling the Technological Knot in Homes<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<li>2008: Cognitive Wireless Networking<\/li>\n<li>2007: High Speed TCP<\/li>\n<li>2006: Life at the Edge: Research and Practice in Corporate\/Campus Networks<\/li>\n<li>2005: Self-Managing Networks<\/li>\n<li>2004: Mesh Networking<\/li>\n<\/ul>\n<p>This year, the summit is on Mobile and Cloud Services, and is organized by Ming Zhang, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/padhye\/\">Jitendra Padhye<\/a>&nbsp;and <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/bahl\/\">Victor Bahl<\/a>.<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Microsoft Research\u2019s Seventh Annual Networking Summit will bring together researchers from academia and industry to discuss the new challenges in building mobile + cloud applications. The cross-disciplinary agenda of this summit will include presentations and discussions on creating the \u201cnewest and hottest\u201d applications and more. Wireless technologies, such as LTE, LTE Advanced, HSPA+, EVDO-RevB, WiMAX, [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_startdate":"2010-06-02","msr_enddate":"2010-06-03","msr_location":"Bellevue, WA","msr_expirationdate":"","msr_event_recording_link":"","msr_event_link":"","msr_event_link_redirect":false,"msr_event_time":"","msr_hide_region":false,"msr_private_event":true,"msr_hide_image_in_river":0,"footnotes":""},"research-area":[13547],"msr-region":[],"msr-event-type":[],"msr-video-type":[],"msr-locale":[268875],"msr-program-audience":[],"msr-post-option":[],"msr-impact-theme":[],"class_list":["post-277482","msr-event","type-msr-event","status-publish","hentry","msr-research-area-systems-and-networking","msr-locale-en_us"],"msr_about":"<!-- wp:msr\/event-details {\"title\":\"Seventh Annual Microsoft Research Networking Summit\",\"backgroundColor\":\"catalina-blue\"} \/-->\n\n<!-- wp:msr\/content-tabs -->\n<!-- wp:msr\/content-tab {\"title\":\"Home\"} -->\n<!-- wp:freeform -->\n<p><img loading=\"lazy\" class=\"alignnone size-full wp-image-277572\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/mobile_plus_cloud_banner.png\" alt=\"mobile_plus_cloud_banner\" width=\"538\" height=\"98\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/mobile_plus_cloud_banner.png 538w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/mobile_plus_cloud_banner-300x55.png 300w\" sizes=\"(max-width: 538px) 100vw, 538px\"><\/p>\n<p>Microsoft Research\u2019s Seventh Annual Networking Summit will bring together researchers from academia and industry to discuss the new challenges in building mobile + cloud applications. The cross-disciplinary agenda of this summit will include presentations and discussions on creating the \u201cnewest and hottest\u201d applications and more.<\/p>\n<p>Wireless technologies, such as LTE, LTE Advanced, HSPA+, EVDO-RevB, WiMAX, and high-speed Wi-Fi, are enabling anytime, anywhere Internet connectivity. In addition, large-scale cloud infrastructure from Microsoft, Yahoo, Amazon and Google, provide abundant computational and storage resources with low programming and management overheads. These two developments compel us to rethink the current end-to-end design of mobile applications, ranging from software stacks on mobile devices to back-end services in the cloud. The cross-disciplinary agenda of this summit will include presentations and discussions on creating the \u201cnewest and hottest\u201d applications, overcoming the fundamental limitations in energy and physical capabilities, optimizing OS and networking stack, protecting the security of user data, and identifying proof-of-concept demonstrations. The objective is to take a critical and deep look at the nascent field, and to prioritize research problems to realize next-generation mobile applications.<\/p>\n<!-- \/wp:freeform -->\n<!-- \/wp:msr\/content-tab -->\n\n<!-- wp:msr\/content-tab {\"title\":\"Program\"} -->\n<!-- wp:freeform -->\n<div class=\"js-accordion\" data-accordion-prefix-classes=\"msr-accordion\" data-accordion-expandall=\"true\">\n<h4 class=\"js-accordion__header\">\n\t\t\t\tWednesday, June 2, 2010\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><strong>8:00am \u2013 8:30am<\/strong><\/p>\n<p><strong>Breakfast<\/strong><\/p>\n<p><strong>8:30am \u2013 8:45am<\/strong><\/p>\n<p><strong>Welcome &amp; Round Table Introductions<\/strong><\/p>\n<p><strong>8:45am \u2013 10:05am <\/strong><\/p>\n<p><strong>Exploiting Context<\/strong> (Chair: Ming Zhang, MSR Redmond)<\/p>\n<ol>\n<li><strong>A framework for context-aware applications,<\/strong> Ashok Agarwala, University of Maryland. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/aa1.pptx\">slides 1<\/a>) (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/aa2.pdf\">slides 2<\/a>)<\/li>\n<li><strong>Context-awareness, cloudlets and the case for AP-embedded, anonymous computing, <\/strong>Anthony LaMarca, Intel Research Seattle. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/anthony.ppt\">slides<\/a>)<\/li>\n<li><strong>Towards context-aware computing via the mobile social cloud, <\/strong>Rick Han, University of Colorado. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/msr_net_summit_rhan4.pptx\">slides<\/a>)<\/li>\n<li><strong>Intentional Networking<\/strong>, Brian Noble, University of Michigan. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/noble.pptx\">slides<\/a>)<\/li>\n<\/ol>\n<p><strong>10:05am \u2013 10:15am <\/strong><\/p>\n<p><strong>Break<\/strong><\/p>\n<p><strong>10:15am \u2013 11:35am <\/strong><\/p>\n<p><strong>Partitioning &amp; Offloading<\/strong> (Chair: Jitu Padhye, Microsoft Research)<\/p>\n<ol>\n<li><strong>Leveraging fast VM fork for next generation mobile perception, <\/strong>Eyal de Lara, University of Toronto. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/eyal.pptx\">slides<\/a>)<\/li>\n<li><strong>The role of cloudlets in mobile computing, <\/strong>Mahadev Satyanarayanan, Carnegie Mellon University. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/satya.ppt\">slides<\/a>)<\/li>\n<li><strong>Programming smartphones as distributed systems with extreme heterogeneity, <\/strong>Lin Zhong, Rice University. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/lin.pptx\">slides<\/a>)<\/li>\n<li><strong>Resource-intensive mobile computing (Project MAUI), <\/strong>Alec Wolman, MSR Redmond. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/alec.pptx\">slides<\/a>)<\/li>\n<\/ol>\n<p><strong>11:35am \u2013 11:45am<\/strong><\/p>\n<p><strong>Break<\/strong><\/p>\n<p><strong>11:45am \u2013 12:30pm<\/strong><\/p>\n<p><strong>Round Table Discussion: My favorite mobile computing research paper from last three years (not my own)<\/strong><\/p>\n<p><strong>12:30pm \u2013 1:20pm<\/strong><\/p>\n<p><strong>Mingling &amp; Lunch<\/strong><\/p>\n<p><strong>1:20pm \u2013 3:00pm <\/strong><\/p>\n<p><strong>Novel Scenarios<\/strong> (Chair: Ratul Mahajan, MSR Redmond)<\/p>\n<ol>\n<li><strong>Remembering what matters,<\/strong> Romit Roy Choudhury, Duke University (<a href=\"http:\/\/synrg.ee.duke.edu\/ppts\/MoVi-MSR-Summit.ppt\">slides<\/a>)<\/li>\n<li><strong>Cloudlets on phones,<\/strong> Gaetano Borriello, University of Washington (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/borriello-msr.pdf\">slides<\/a>)<\/li>\n<li><strong>Experiences with a vehicular cloud computing platform,<\/strong> Jason Flinn, University of Michigan (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/jason.ppt\">slides<\/a>)<\/li>\n<li><strong>Cloudy with a chance of mobile social computing,<\/strong> Maria Ebling, IBM Research (slides)<strong>Understanding the behavior of a large-scale, multi-player, mobile game in the wild, <\/strong>Suman Banerjee, University of Wisconsin (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/suman.pdf\">slides<\/a>)<\/li>\n<\/ol>\n<p><strong>3:00pm \u2013 3:10pm<\/strong><\/p>\n<p><strong>Bio Break<\/strong><\/p>\n<p><strong>3:10pm \u2013 3:50pm <\/strong><\/p>\n<p><strong>Security &amp; Privacy<\/strong> (Chair: Srikanth Kandula, Microsoft Research)<\/p>\n<ol>\n<li><strong>Vanish: self-destructing digital data, <\/strong>Yoshi Kohno, University of Washington<\/li>\n<li><strong>Improving the Security of Commodity Hypervisors for Cloud Computing, <\/strong>Stefan Saroiu, MSR Redmond (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/saroiu_networking_summit_2010.pdf\">slides<\/a>)<\/li>\n<\/ol>\n<p><strong>3:50pm \u2013 5:10pm <\/strong><\/p>\n<p><strong>Social Event<\/strong><\/p>\n<p>Fun times at <a href=\"http:\/\/www.bowlluckystrike.com\/\">Lucky Strike Lane &amp; Lounge<\/a><\/p>\n<p>Group photos &amp; mingling<\/p>\n<p><strong>5:10pm \u2013 6:30pm <\/strong><\/p>\n<p><strong>Cloud Infrastructure<\/strong> (Chair: Sharad Agarwal, MSR Redmond)<\/p>\n<ol>\n<li><strong>Centralize what you can, distribute what you must: a telco\u2019s view to the cloud,<\/strong> Pablo Rodriguez, Telefonica Research. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/pablo.pdf\">slides<\/a>)<\/li>\n<li><strong>Networking as a service: cloud centric networking in a federated network environment,<\/strong> Raj Jain, Washington University in St. Louis. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/raj.pdf\">slides<\/a>)<\/li>\n<li><strong>Educational support infrastructure for mobile + cloud computing (Project HAWAII), <\/strong>Jitendra Padhye, MSR Redmond. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/padhye.pptx\">slides<\/a>)<\/li>\n<li><strong>Future challenges from FAWN, <\/strong>Dave Andersen, CMU. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/david.pdf\">slides<\/a>)<\/li>\n<\/ol>\n<p><strong>7:00pm <\/strong><\/p>\n<p><strong>Cocktails &amp; Dinner Banquet<\/strong> at <a href=\"http:\/\/www.thepurplecafe.com\/\">Purple Cafe<\/a><\/p>\n<p>Host: <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/malvar\/\">Rico Malvar<\/a>, Distinguished Engineer and Managing Director, MSR Redmond<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tThursday, June 3, 2010\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><strong>8:30am \u2013 9:00am <\/strong><\/p>\n<p><strong>Breakfast<\/strong><\/p>\n<p><strong>9:00am \u2013 9:50am <\/strong><\/p>\n<p><strong>Round Table Discussion: My five year research agenda in mobile computing<\/strong><\/p>\n<p><strong>9:50am \u2013 10:00am<\/strong><\/p>\n<p><strong>Break<\/strong><\/p>\n<p><strong>10:00am \u2013 11:20pm <\/strong><\/p>\n<p><strong>Research Showcase (Demos &amp; Posters)<\/strong><\/p>\n<ul>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/dimitrios.pdf\">A Mobile Search and Advertisement Cache Architecture<\/a> <\/em>(Dimitrios Lymberopoulos, MSR)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/falaki.pdf\">Diversity in Smartphone Usage<\/a> <\/em>(Hossein Falaki, Ratul Mahajan, Deborah Estrin, UCLA &amp; MSR)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/ramesh.pdf\">Trends in Mobile and Cloud Computing<\/a> <\/em>(Joongheon Kim, Bin Liu, Nilesh Mishra, Luis Pedrosa, University of Southern California)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/bodhi.pdf\">Continuous Sensing on Mobile Phones<\/a> <\/em>(Bodhi Priyantha, Dimitrios Lymberopoulos, Jie Liu, MSR Redmond)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/yangfan.pdf\">A Platform for Mobile-Cloud Computing in Streams<\/a> <\/em>(Fan Yang, MSR Asia)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/xu.pdf\">Anatomizing Application Performance Differences on Smartphones<\/a> <\/em>(Junxian Huang, Qiang Xu, Birjodh Tiwana, Z. Morley Mao, Ming Zhang, Victor Bahl, Michigan &amp; MSR)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/azarias.pdf\">Network solutions for challenged environments<\/a> <\/em>(Azarias Reda, Univeristy of Michigan)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/brett.pdf\">Intentional Networking<\/a> <\/em>(Brett Higgins, Brian Noble, University of Michigan)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/ratul.pdf\">Augmenting Mobile 3G using Wi-Fi<\/a> <\/em>(Aruna Balasubramanian, Ratul Mahajan, Arun Venkataramani, UMASS &amp; MSR)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/ashish.pdf\">The Anatomy of a Large Mobile Massively Multiplayer Online Game<\/a> <\/em>(Ashish Patro, Suman Banerjee, University of Wisconsin)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/aaron.pdf\">Anonymous APIs = Anonymous Cloud Services<\/a> <\/em>(Aaron Beach, Colorado)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/cem.pdf\">Using Multiple Wearable Sensors Dynamically to Facilitate Activity Recognition<\/a> <\/em>(Cem Onyuksel, Carnegie Mellon University)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/stefan.pdf\">Trusted Sensors<\/a> <\/em>(Stefan Saroiu, Alec Wolman, MSR Redmond)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/sharad.pdf\">Virtual Compass: relative positioning to enable mobile social interactions<\/a> <\/em>(Sharad Agarwal, Victor Bahl, Nilanjan Banerjee, Ranveer Chandra, Alec Wolman, Mark Corner, UMASS &amp; MSR)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/sierra.pdf\">Sierra: practical power-proportionality for data center storage<\/a> <\/em>(Eno Thereska, Austin Donnelly, Dushyanth Narayanan, MSR Cambridge)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/rohit.pdf\">FoneAstra: Making Mobile Phones Smarter<\/a> <\/em>(Rohit Chaudhri, Kentaro Toyama, Bill Thies, University of Washington &amp; MSR India)<\/li>\n<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/yunxin.pdf\">Energy Efficient Mobile Computing Through Cloud Offloading<\/a> <\/em>(Yunxin Liu, Yongqiang Xiong, Microsoft Research Asia)<\/li>\n<\/ul>\n<p><strong>11:20am \u2013 12:30pm <\/strong><\/p>\n<p><strong>Panel: \u201cSmartphone: is this it?\u201d<\/strong><\/p>\n<p>Moderator: <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/bahl\/\">Victor Bahl<\/a>, MSR Redmond<\/p>\n<p>Panelists:<\/p>\n<ul>\n<li><a href=\"http:\/\/www.linkedin.com\/in\/susiewee\">Susie Wee<\/a>, CTO, Client Cloud Services, Hewett Packard<\/li>\n<li><a href=\"http:\/\/www.infosys.com\/about\/management-profiles\/Pages\/subrahmanyam-goparaju.aspx\">Subrahmanyam Goparaju<\/a>, Vice President and Head, SETLabs, Infosys<\/li>\n<li>Keith Rowe, Director of Hardware, KIN, Microsoft Corporation<\/li>\n<li><a href=\"http:\/\/www.cs.cmu.edu\/~dps\/\">Dan P. Siewiorek<\/a>, Director of HCI Institute, Carnegie Mellon University<\/li>\n<\/ul>\n<p><strong>12:30pm \u2013 12:40pm<\/strong><\/p>\n<p><strong>Set up Working Groups<\/strong><\/p>\n<p><strong>12:40pm \u2013 1:30pm <\/strong><\/p>\n<p><strong>Mingling &amp; Lunch<\/strong><\/p>\n<p><strong>1:30pm \u2013 3:30pm <\/strong><\/p>\n<p><strong>Brainstorming<\/strong><\/p>\n<p><strong>WG1: Cloud services for mobile<\/strong><\/p>\n<ul>\n<li>Discussion lead: <a href=\"http:\/\/cseweb.ucsd.edu\/~snoeren\/\">Alex C. Snoeren<\/a>, UCSD<\/li>\n<\/ul>\n<p><strong>WG2: Smartphone 2020 &amp; disruptive hardware capabilities<\/strong><\/p>\n<ul>\n<li>Discussion lead: <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/dburger\/\">Doug Burger<\/a>, eXtreme Computing Group, MSR<\/li>\n<\/ul>\n<p><strong>WG3: Sleep well \u2013 designing for security &amp; privacy<\/strong><\/p>\n<ul>\n<li>Discussion lead: <a href=\"http:\/\/www.cs.ucl.ac.uk\/staff\/b.karp\/\">Brad Karp<\/a>, University College London.<\/li>\n<\/ul>\n<p><strong>WG4: Game changing platform &amp; applications<\/strong><\/p>\n<ul>\n<li>Discussion lead: <a href=\"http:\/\/people.ee.duke.edu\/~romit\/\">Romit Roy Choudhury<\/a>, Duke University.<\/li>\n<\/ul>\n<p><strong>3:30pm \u2013 4:30pm<\/strong><\/p>\n<p><strong>Working Group Presentations<\/strong><\/p>\n<p><strong>4:30pm \u2013 5:30pm<\/strong><\/p>\n<p><strong>Round Table Impressions &amp; Wrap-up<\/strong><\/p>\n<p><strong>6:00pm<\/strong><\/p>\n<p><strong>Plated Dinner<\/strong> at <a href=\"http:\/\/www.starwoodhotels.com\/pub\/media\/1555\/na1555lo5_tn.jpg\">Westin Hotel in the GrandBall Room-C<\/a><\/p>\n<p><\/p><\/div>\n<p><\/p><\/div>\n<!-- \/wp:freeform -->\n<!-- \/wp:msr\/content-tab -->\n\n<!-- wp:msr\/content-tab {\"title\":\"Abstracts\"} -->\n<!-- wp:freeform -->\n<div class=\"js-accordion\" data-accordion-prefix-classes=\"msr-accordion\" data-accordion-expandall=\"true\">\n<h4 class=\"js-accordion__header\">\n\t\t\t\tRover: A Framework for Context-Aware Applications\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img loading=\"lazy\" class=\"alignnone size-full wp-image-277503\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/aa.jpg\" alt=\"aa\" width=\"150\" height=\"180\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.cs.umd.edu\/~agrawala\" target=\"_new\" rel=\"noopener\">Ashok Agarwala<\/a> | University of Maryland<\/p>\n<p>Rover is a framework for integration of context-aware applications in which a number and variety of client devices such a smart phones, PDAs etc. may connect to its server using communication channels such as 2G, 3G, WiFi, WiMAX, etc., and obtain information and services appropriate for their context. The context for each client is maintained and managed by the server and is used to customize the information and services provided. MyeVyu is an application suite that has been implemented to show the capabilities of this framework for use by a campus community. This system can location a client anywhere on campus, indoors or outdoors, with an accuracy of 10\u2019 or better. MyeVyu applications include: Campus and class information (Class schedule, Campus events, Assignments and exams, Grades, Campus Alerts), Weather, Transportation (Real time information about Washington Metro Trains, Washington Metro Buses, Campus Shuttle Buses, Parking location), Social Networking, Campus building and directory, Public Safety Access.<\/p>\n<p>The public safety application, called V911, not only provides the identity of the client and the location to the Public Safety Answering Point (PSAP) but also opens an audio and a video stream from the client device so that the dispatcher can hear and see the incident scene. If there are any PTZ cameras in the area the video feeds from them are also provided to the dispatcher who can forward one or more of the feeds to a responder assigned to handle the situation. This way the responder has up to the minute information about the incident. Rover is a flexible integration platform on which a number of additional applications are being developed.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tContext-awareness, Cloudlets and the Case for AP-embedded, Anonymous Computing\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img loading=\"lazy\" class=\"alignnone size-full wp-image-277506\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/al.jpg\" alt=\"al\" width=\"150\" height=\"161\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a title=\"\" href=\"http:\/\/seattle.intel-research.net\/people\/lamarca\/\" target=\"_new\" rel=\"noopener\">Anthony LaMarca<\/a>&nbsp;| Intel Research, Seattle<\/p>\n<p>Context-awareness and the ability of our computing devices to sense where we are, who we are with, and what we are doing is driving a new class of high-value, always-on applications and services. As the need for coverage, accuracy and detail increases, context-aware devices will increasingly rely on computationally intense vision-based approaches to inferring context. A promising solution to the efficient implementation of mobile context-awareness is the \u201ccloudlet\u201d model proposed by Satyanarayanan et al. I will outline why I think the trend towards vision-based context-awareness will drive demand for cloudlets and some of the challenges and market opportunities it will enable.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tTowards Context-Aware Computing Via the Mobile Social Cloud\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img loading=\"lazy\" class=\"alignnone size-full wp-image-277539\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/rh.jpg\" alt=\"rh\" width=\"110\" height=\"164\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.cs.colorado.edu\/~rhan\/\" target=\"_self\" rel=\"noopener\">Rick Han<\/a>&nbsp;| University of Colorado<\/p>\n<p>The combination of mobile smartphones with social networks enables a new era of context-aware computing, which stimulates new thinking about what kind of cloud services and infrastructure are needed to support smart mobile-aware spaces. We will describe our initial research focused on creating context-aware applications using mobile social networks, namely our SocialFusion project. Some of the interesting issues addressed by SocialFusion so far include group-based context awareness, as well as privacy and anonymity concerns introduced by mobile social networks. We will describe some of our initial thinking on what kinds of common services and framework may be needed to enable context awareness via the mobile social cloud.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tLeveraging Fast VM Fork for Next Generation Mobile Perception\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img loading=\"lazy\" class=\"alignnone size-full wp-image-277518\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/edl.jpg\" alt=\"edl\" width=\"150\" height=\"226\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.cs.toronto.edu\/~delara\/\" target=\"_self\" rel=\"noopener\">Eyal de Lara<\/a>&nbsp;| University of Toranto<\/p>\n<p>Cloudlets, consisting of infrastructure accessible via a wireless LAN, are poised to enable a new generation of mobile applications that opportunistically leverage nearby computationally resources to augment human perception. We anticipate that cloudlets could be implemented as networks of computational enabled access points that lend their resources to nearby mobile users. The speed and local setting is necessary since most of the next generation perception (ESP) use cases require low latencies for responsiveness to human interaction. In this talk, I will describe early research that leverages fast virtual machine (VM) fork to migrate computation between a mobile device and a nearby cloudlet, and once on the cloudlet to enable parallel computation. VM fork is a novel abstraction that enables fast (hundreds of milliseconds) instantiation of computing elements in a cloud environment. While VM fork is conceptually a simple idea, the large size of VM memory images (which reaches hundreds of megabytes or even gigabytes) makes an efficient implementation challenging. Our VM fork implementation addresses this challenge with three key mechanisms: Lazy State Replication, which allows for extremely fast instantiation of VM clones by initially copying only metadata necessary to resume a VM, and transmitting the parent\u2019s state that the clone actually accesses on demand; Avoidance Heuristics, which eliminate superfluous memory transfers for the common case of clones allocating new private state; and Multicast Distribution, a technique that provides scalability and pre-fetching by multicasting replies to memory page requests.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tThe Role of Cloudlets in Mobile Computing\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img loading=\"lazy\" class=\"alignnone size-full wp-image-277548\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/satya.jpg\" alt=\"satya\" width=\"150\" height=\"195\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.cs.cmu.edu\/~satya\/\" target=\"_self\" rel=\"noopener\">Mahadev Satyanarayanan<\/a>&nbsp;| Carnegie Mellon University<\/p>\n<p>Imagine Wi-Fi points augmented with computing, memory and storage resources that can be used by nearby mobile devices. How could the widespread deployment of such infrastructure fundamentally change mobile computing? Rather than relying on a distant cloud, a mobile user could rapidly instantiate and use a customized \u201ccloudlet\u201d that is just one wireless hop away. Crisp interactive response for immersive applications that augment human cognition is then much easier to achieve because the proximity of the cloudlet ensures low latency and jitter. A critical aspect of this vision, namely rapid customization of cloudlet infrastructure, is achievable through dynamic VM synthesis.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tProgramming Smartphones as Distributed Systems with Extreme Heterogeneity\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img loading=\"lazy\" class=\"alignnone size-full wp-image-277527\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/lz.jpg\" alt=\"lz\" width=\"150\" height=\"200\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.ruf.rice.edu\/~lzhong\/\" target=\"_new\" rel=\"noopener\">Lin Zhong<\/a>&nbsp;| Rice University<\/p>\n<p>To enable creative services on smartphones-like mobile systems, researchers have sought help from two very different computing platforms. On one hand, sensors, either built in device or wireless body-worn, have been studied to enhance the \u201csense\u201d of smartphones so that the latter can better infer about the user and their context. On the other extreme, the powerful cloud has been leveraged to enhance the \u201cbrain\u201d of smartphones so that the latter can benefit sophisticated applications of pattern recognition, data mining, and artificial intelligence. As a result, the smartphone increasingly appears to be a distributed system with the cloud at one end and sensors at the other from the perspective of application developers. To help developers cope with such extreme heterogeneity, we have been studying programming and operating system support so that they can code applications for smartphones in a platform transparent way yet still benefit from the power and efficiency of programmable execution in the cloud and in the sensor. We will be able to share some early results from our Reflex project along this direction.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tFuture Challenges from FAWN\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img loading=\"lazy\" class=\"alignnone size-full wp-image-277515\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/da.jpg\" alt=\"da\" width=\"150\" height=\"156\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.cs.cmu.edu\/~dga\/\" target=\"_new\" rel=\"noopener\">David Andersen<\/a>&nbsp;| Carnegie Mellon University<\/p>\n<p>This talk will briefly describe our experiences building an energy-efficient cluster architecture for data-intensive computing, called FAWN: A Fast Array of Wimpy Nodes. FAWN makes use of an array of low-power, energy efficient nodes instead of more traditional high-performance computers. In the process, it drastically reduces power consumption, particularly for I\/O bound workloads, but the constrained CPU and DRAM, and the performance quirks of flash memory impose substantial systems engineering challenges. I will overview the solutions we developed, and then discuss the ongoing systems and algorithmic challenges that sit between the fundamental efficiency of the architecture and its practical realization. I will conclude with a brief mention of a future, radically constrained, hardware platform that is guiding our upcoming research.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tCentralize What You Can, Distribute What You Must: a Telco's View to the Cloud\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img loading=\"lazy\" class=\"alignnone size-full wp-image-277536\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/pr.jpg\" alt=\"pr\" width=\"150\" height=\"208\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.rodriguezrodriguez.com\/\" target=\"_new\" rel=\"noopener\">Pablo Rodriguez<\/a>&nbsp;| Telefonica<\/p>\n<p>Over the last years, most networking research has focused on the \u201cdivide and conquer principle\u201d, with more and more distributed architectures where the goal was to achieve better scalability and reliability. However, with more distributed architectures also come higher operational costs (configuration, management, support, upgrades, etc). In fact, operational costs are often orders of magnitude higher than the costs of the infrastructure itself. As a result one may want to centralized most equipment to reduce operational costs, and distribute only those elements required for scalability and efficiency. In wireless, new smartphone devices are causing a number of operational costs in the network infrastructure that cause constant upgrades and expensive maintenance. In this talk, i will describe some of these problems, and delve into some potential solutions.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tNetworking as a Service: Cloud Centric Networking in a Federated Network Environment\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img loading=\"lazy\" class=\"alignnone size-full wp-image-277542\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/rj.jpg\" alt=\"rj\" width=\"150\" height=\"225\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.cse.wustl.edu\/~jain\/\" target=\"_new\" rel=\"noopener\">Raj Jain<\/a>&nbsp;| Washington University<\/p>\n<p>While cloud computing technology allows efficient sharing of compute resources, dynamically provisioning wide-area QoS links, interconnecting distributed application instances deployed over resources leased from multiple cloud providers, is still static and non-trivial. Therefore, customers are limited either to a single cloud service provider or to static links that cannot be easily allocated and de-allocated on demand. Here we are not talking about simple cloud service such as document sharing that can be easily be done using best effort low speed connections over the public Internet. We are concerned about applications requiring significant network bandwidth such as data intensive computing.<\/p>\n<p>Elastic Pipes \u2013 an extension of our NSF funded Internet 3.0 architecture \u2013 extend the cloud computing concepts to networking and allow telecommunication service providers to advertise their transport capabilities. Clients can establish high-speed connections with desired quality of service by dynamically combining transport service objects from various carriers. This will allow cloud computing to grow into a \u201cCloud Market\u201d where the clients can choose cloud computing resources from \u201cNetwork as a service (NaaS)\u201d offerings from different providers and interconnect them via elastic pipes using different telecommunication carriers.<\/p>\n<p>This is somewhat of a \u201cparadigm shift\u201d from current practice but is inevitable given the current success of \u201csoftware as a service (SaaS)\u201d and \u201cInfrastructure as a Service(IaaS)\u201d service offerings of commercial cloud platforms that is expected to enable feasible deployment of high end distributed applications and services.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tVanish: Self Destructing Digital Data\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img loading=\"lazy\" class=\"alignnone size-full wp-image-277554\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/yk.jpg\" alt=\"yk\" width=\"150\" height=\"203\"><\/p>\n<p><a href=\"http:\/\/www.cs.washington.edu\/homes\/yoshi\/\" target=\"_new\" rel=\"noopener\">Yoshi Kohno<\/a>&nbsp;| University of Washington<\/p>\n<p>Computing and communicating through the web make it virtually impossible to leave the past behind. College Facebook posts or pictures can resurface during a job interview; a lost or stolen laptop can expose personal photos or messages; or a legal investigation can subpoena the entire contents of a home or work computer, uncovering incriminating or just embarrassing details from the past.<\/p>\n<p class=\"smallText\">Our research seeks to protect the privacy of past, archived data \u2014 such as copies of emails maintained by an email provider \u2014 against accidental, malicious, and legal attacks. Specifically, we wish to ensure that all copies of certain data become unreadable after a user-specified time, without any specific action on the part of a user, without needing to trust any single third party to perform the deletion, and even if an attacker obtains both a cached copy of that data and the user\u2019s cryptographic keys and passwords.<\/p>\n<p class=\"smallText\">\n<\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tIntentional Networking\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img loading=\"lazy\" class=\"alignnone size-full wp-image-277512\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/bn.jpg\" alt=\"bn\" width=\"110\" height=\"142\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.eecs.umich.edu\/~bnoble\/\" target=\"_new\" rel=\"noopener\">Brian Noble<\/a>&nbsp;| University of Michigan<\/p>\n<p>Mobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This talk introduces Intentional Networking, a simple but powerful mechanism for handling network diversity. Applications supply a declarative label for network transmissions, and the system matches transmissions to the most appropriate network. The system may also defer and re-order opportunistic transmissions subject to application-supplied mutual exclusion and ordering constraints. We have modified three applications to use Intentional Networking: BlueFS, a distributed file system for pervasive computing, Mozilla\u2019s Thunderbird e-mail client, and a vehicular participatory sensing application. Compared to an idealized solution that makes optimal use of all aggregated available networks but without knowledge of application intent, Intentional Networking improves the latency of interactive messages from 42% to 13x, while adding only 1-8% throughput overhead.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tCloudlets on Phones\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p style=\"text-align: left\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-277521\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/gb.jpg\" alt=\"gb\" width=\"150\" height=\"218\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.cs.washington.edu\/homes\/gaetano\/\" target=\"_new\" rel=\"noopener\">Gaetano Borriello<\/a>&nbsp;| University of Washington<\/p>\n<p>Entrepreneurial people in developing regions have many ideas for mobile applications that will provide useful services in their local context. However, they are faced with a large barrier to developing and deploying those applications because they usually require external experts to help them harness cloud services. From our experiences in this space, we have reached the conclusion that a series of stepping stones are needed that allow applications to progress from simple implementations running on a user\u2019s own phone to full-fledged cloud-hosted applications. Communication constraints are quite different than the developed world, for example, data plans are very uncommon and most communication is through voice and SMS with specific costs associated with each call or message, often paid via pay-as-you-go plans. Applications must be built on simple communication technology with a clear migration path as GPRS and Internet connectivity become more available in the developing world.<\/p>\n<p>In this talk, we propose a set of steps for both the development and deployment of mobile applications that we believe are applicable in many parts of the world, especially given the increasing availability of high-end phones that can serve as hosting sites themselves. We highlight the challenges given some simple mechanisms on which many applications can be built. Our ultimate goal is to make it easy for entrepreneurs in developing regions to enable their ideas for mobile applications, generate their own content, and have the pride of ownership that will sustain their efforts.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tExperiences with a Vehicular Cloud Computing Platform\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img loading=\"lazy\" class=\"alignnone size-full wp-image-277524\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/jf.jpg\" alt=\"jf\" width=\"150\" height=\"194\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.eecs.umich.edu\/~jflinn\/\" target=\"_new\" rel=\"noopener\">Jason Flinn<\/a>&nbsp;| University of Michigan<\/p>\n<p>In this talk, I\u2019ll describe the experiences and lessons learned from teaching a class called \u201cCloud Computing in the Commute\u201d with Brian Noble and TJ Giuli at the University of Michigan last semester. In this project-based course, student teams designed, built, and demonstrated applications that leveraged an in-vehicle mobile sensing platform connected via wireless networks with cloud services. During the semester, students road-tested their applications on a computing platform built into a Ford Fiesta. At the end of the semester, a contest was held in which students demoed their applications; the winning team drove their project to Maker Faire in California. While our focus in this class was educational in nature, our experiences nevertheless illuminated several important research issues to consider in the design of mobile\/cloud applications, especially those intended for vehicular environments.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tCloudy with a Chance of Mobile Social Computing\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img loading=\"lazy\" class=\"alignnone size-full wp-image-277530\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/me.jpg\" alt=\"me\" width=\"110\" height=\"165\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a title=\"\" href=\"http:\/\/domino.research.ibm.com\/comm\/research_people.nsf\/pages\/ebling.index.html\" target=\"_new\" rel=\"noopener\">Maria Ebling<\/a>&nbsp;| IBM Research<\/p>\n<p>How does one bring information technology to people living on the margins of contemporary society? Whether in the U.S. or in the developing world, can a lack of computer access be overcome instead with inexpensive mobile phones? How might one go about addressing this need? In this talk, I will present some work we have been doing to support the homeless here in the U.S. and farmers in developing nations. One project, MobiSMD (aka PictureTalk), supports asynchronous conversations anchored by pictures. Another, CRM (joint with Chris Le Dantec of GaTech), focuses on supporting homeless clients and their case workers through mobile messaging and information dissemination. I will present an overview of the scenarios and discuss the requirements such applications place on a cloud infrastructure.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tUnderstanding the Behavior of a Large-Scale, Multi-Player, Mobile Game in the Wild\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><a href=\"http:\/\/pages.cs.wisc.edu\/~suman\/\" target=\"_new\" rel=\"noopener\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-277551\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/sb.jpg\" alt=\"sb\" width=\"193\" height=\"204\"><\/a><\/p>\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/pages.cs.wisc.edu\/~suman\/\" target=\"_new\" rel=\"noopener\">Suman Banerjee<\/a>&nbsp;| University of Wisconsin<\/p>\n<p>This talk describes a large-scale, long-term measurement study of a popular mobile Massively Multiplayer Online Role Playing Game (MMORPG), called Parallel Kingdom, with over 100,000 users distributed across 70 countries. Our study covers various aspects of the game including (i) characteristics of its players population, (ii) player behavior, (iii) network-level characteristics observed between game servers and player devices that connect through WiFi and cellular networks world-wide, (iv) money spending behavior of players and how network phenomenon affects such behavior, and (v) player mobility patterns. Our measurement study spans almost the entire life of the game staring from its inception on October 31, 2008 to until May 8, 2010 (555 days in total).<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tRemembering What Matters\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p style=\"text-align: left\"><img loading=\"lazy\" class=\"alignnone wp-image-277545\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/romit.jpg\" alt=\"romit\" width=\"153\" height=\"167\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/romit.jpg 530w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/romit-274x300.jpg 274w\" sizes=\"(max-width: 153px) 100vw, 153px\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/pages.cs.wisc.edu\/~suman\/\" target=\"_new\" rel=\"noopener\">Romit Roy Choudhury<\/a>&nbsp;| Duke University<\/p>\n<p>Sensor networks have been conventionally defined as a network of sensor motes that collaboratively detect important events from their surroundings. We make an attempt to extend this notion to the social context by using mobile phones as a replacement for motes. We envision a system in which mobile phones collaboratively sense their ambience, recognize socially \u201cinteresting\u201d events, and record short video clips of those events. At the end of the day, the video clips from different phones are \u201cstitched\u201d together, thereby creating an automatic video highlights of the occasion. We have built in early (offline) prototype of such a system using Nokia phones and iPod Nanos, and have experimented in real-life social gatherings. Results show that automatically generated video highlights are quite similar to those created manually, (i.e., by painstakingly editing the entire video of the occasion). In that sense, our system may be viewed as a collaborative information-distillation tool, capable of \u201cremembering what matters\u201d.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tMAUI: enabling fine-grained code offload for resource-intensive applications\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img loading=\"lazy\" class=\"alignnone size-full wp-image-277509\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/alecw.jpg\" alt=\"alecw\" width=\"75\" height=\"75\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/alecw\/\" target=\"_self\" rel=\"noopener\">Alec Wolman<\/a>&nbsp;| Microsoft Research<\/p>\n<p>MAUI is a system that enables \ufb01ne-grained energy-aware of\ufb02oad of mobile code to the infrastructure. Previous approaches to these problems either relied heavily on programmer support to partition an application, or they were coarse-grained requiring full process (or full VM) migration. MAUI uses the bene\ufb01ts of a managed code environment to offer the best of both worlds: it supports \ufb01ne-grained code of\ufb02oad to maximize energy savings with minimal burden on the programmer. MAUI decides at run-time which methods should be remotely executed, driven by an optimization engine that achieves the best energy savings possible under the mobile device\u2019s current connectivity constrains. Using MAUI, we have developed: 1) a resource-intensive face recognition application that consumes an order of magnitude less energy, 2) a latency-sensitive arcade game application that doubles its refresh rate, and 3) a voice-based language translation application that bypasses the limitations of the smartphone environment by executing unsupported components remotely.<\/p>\n<p><\/p><\/div>\n<h4 class=\"js-accordion__header\">\n\t\t\t\tTrusted Sensors\t\t\t<\/h4>\n<div class=\"js-accordion__panel\">\n<p class=\"msr-accordion-content\">\n<\/p><p><img loading=\"lazy\" class=\"alignnone wp-image-277533\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/me_2010.jpg\" alt=\"me_2010\" width=\"155\" height=\"235\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/me_2010.jpg 243w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/me_2010-198x300.jpg 198w\" sizes=\"(max-width: 155px) 100vw, 155px\"><\/p>\n<p style=\"text-align: left\" align=\"right\"><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/ssaroiu\/\" target=\"_self\" rel=\"noopener\">Stefan Saroiu<\/a>&nbsp;| Microsoft Research<\/p>\n<p>Despite the popularity of adding sensors to mobile devices, the readings provided by these sensors cannot be trusted. Users can fabricate sensor readings with relatively little effort. This lack of trust discourages the emergence of applications where users have an incentive to lie about their sensor readings, such as falsifying a location or altering a photo taken by the camera. In this talk, we will present a broad range of applications that would benefit from the deployment of trusted sensors, from participatory sensing to monitoring energy consumption. We describe two design alternatives for making sensor readings trustworthy. Although both designs rely on the presence of a trusted platform module (TPM), they trade-off security guarantees for hardware requirements. While our first design is less secure, it requires no additional hardware beyond a TPM, unlike our second design. Finally, we present the privacy issues arising from the deployment of trusted sensors and we discuss protocols that can overcome them.<\/p>\n<p><\/p><\/div>\n<p><\/p><\/div>\n<!-- \/wp:freeform -->\n<!-- \/wp:msr\/content-tab -->\n\n<!-- wp:msr\/content-tab {\"title\":\"Participants\"} -->\n<!-- wp:freeform -->\n<h2>Non-Microsoft Particpants<\/h2>\n<ul>\n<li><a href=\"http:\/\/www.cs.umd.edu\/~agrawala\/\">Ashok Agarwala<\/a>, University of Maryland<\/li>\n<li><a href=\"http:\/\/www.cs.cmu.edu\/~dga\/\">Dave Andersen, <\/a>Carnegie Mellon University<\/li>\n<li><a href=\"http:\/\/pages.cs.wisc.edu\/~suman\/\">Suman Banerjee, <\/a>University of Wisconsin<\/li>\n<li><a href=\"http:\/\/www.cs.washington.edu\/homes\/gaetano\/\">Gaetano Borriello<\/a>, University of Washington<\/li>\n<li><a href=\"http:\/\/people.ee.duke.edu\/~romit\/\">Romit Roy Choudhury<\/a>, Duke University<\/li>\n<li><a href=\"http:\/\/domino.research.ibm.com\/comm\/research_people.nsf\/pages\/ebling.index.html\">Maria Ebling<\/a>, IBM<\/li>\n<li><a href=\"http:\/\/www.eecs.umich.edu\/~jflinn\/\">Jason Flinn<\/a>, University of Michigan<\/li>\n<li><a href=\"http:\/\/www.infosys.com\/about\/management-profiles\/Pages\/subrahmanyam-goparaju.aspx\">Subrahmanyam Goparaju<\/a>, Infosys<\/li>\n<li><a href=\"http:\/\/www.cs.colorado.edu\/~rhan\/\">Rick Han<\/a>, University of Colorado<\/li>\n<li><a href=\"http:\/\/www.cs.ucl.ac.uk\/staff\/B.Karp\/\">Brad Karp<\/a>, University College London<\/li>\n<li><a href=\"http:\/\/www.cs.washington.edu\/homes\/yoshi\/\">Yoshi Kohno<\/a>, University of Washington<\/li>\n<li><a href=\"http:\/\/www.cs.toronto.edu\/~delara\/\">Eyal de Lara<\/a>, University of Toronto<\/li>\n<li><a href=\"http:\/\/seattleweb.intel-research.net\/people\/lamarca\/Publications.html\">Anthony LaMarca<\/a>, Intel<\/li>\n<li><a href=\"http:\/\/www.eecs.umich.edu\/~bnoble\/\">Brian Noble<\/a>, University of Michigan<\/li>\n<li><a href=\"http:\/\/rodriguezrodriguez.com\/\">Pablo Rodriguez<\/a>, Telefonica<\/li>\n<li><a href=\"http:\/\/www.cs.cmu.edu\/~satya\/\">Mahadev Satyanarayanan<\/a>, Carnegie Mellon University<\/li>\n<li><a href=\"http:\/\/www.cs.cmu.edu\/~dps\/\">Daniel P. Siewiorek, <\/a>Carnegie Mellon University<\/li>\n<li><a href=\"http:\/\/cseweb.ucsd.edu\/~snoeren\/\">Alex C. Snoeren<\/a>, University of California San Diego<\/li>\n<li><a href=\"http:\/\/www.communities.hp.com\/online\/blogs\/wee\/default.aspx\">Susie Wee<\/a>, Hewett Packard<\/li>\n<li><a href=\"http:\/\/www.ruf.rice.edu\/~lzhong\/\">Lin Zhong<\/a>, Rice University<\/li>\n<\/ul>\n<h2>Students<\/h2>\n<ul>\n<li>Sara Alspaugh,&nbsp;University of California Berkeley<\/li>\n<li>Aaron Beach, University of Colorado<\/li>\n<li>Rohit Chaudhri, University of Washington<\/li>\n<li>Hossein Falaki, University of California Los Angeles<\/li>\n<li>Brett Higgins, University of Michigan<\/li>\n<li>Cem Onyuksel, Carnegie Mellon university<\/li>\n<li>Ashish Patro, University of Wisconsin<\/li>\n<li>Azarias Reda, University of Michigan<\/li>\n<li>Qiang Xu, University of Michigan<\/li>\n<\/ul>\n<!-- \/wp:freeform -->\n<!-- \/wp:msr\/content-tab -->\n\n<!-- wp:msr\/content-tab {\"title\":\"Past Summits\"} -->\n<!-- wp:freeform -->\n<p>The MSR Networking Summit is an annual event organized by the <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/group\/networking-research-group\/\">Networking Research Group<\/a>&nbsp;at Microsoft Research, Redmond. Previous summits have focused on home networks, cognitive wireless networks and high speed TCP, among others.<\/p>\n<ul>\n<li>2009: <a href=\"http:\/\/www.cs.washington.edu\/mssi\/2009\/index.html\">Unraveling the Technological Knot in Homes<\/a><\/li>\n<li>2008: Cognitive Wireless Networking<\/li>\n<li>2007: High Speed TCP<\/li>\n<li>2006: Life at the Edge: Research and Practice in Corporate\/Campus Networks<\/li>\n<li>2005: Self-Managing Networks<\/li>\n<li>2004: Mesh Networking<\/li>\n<\/ul>\n<p>This year, the summit is on Mobile and Cloud Services, and is organized by Ming Zhang, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/padhye\/\">Jitendra Padhye<\/a>&nbsp;and <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/bahl\/\">Victor Bahl<\/a>.<\/p>\n<!-- \/wp:freeform -->\n<!-- \/wp:msr\/content-tab -->\n<!-- \/wp:msr\/content-tabs -->","tab-content":[{"id":0,"name":"Home","content":"<img class=\"alignnone size-full wp-image-277572\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/mobile_plus_cloud_banner.png\" alt=\"mobile_plus_cloud_banner\" width=\"538\" height=\"98\" \/>\r\n\r\nMicrosoft Research's Seventh Annual Networking Summit will bring together researchers from academia and industry to discuss the new challenges in building mobile + cloud applications. The cross-disciplinary agenda of this summit will include presentations and discussions on creating the \"newest and hottest\" applications and more.\r\n\r\nWireless technologies, such as LTE, LTE Advanced, HSPA+, EVDO-RevB, WiMAX, and high-speed Wi-Fi, are enabling anytime, anywhere Internet connectivity. In addition, large-scale cloud infrastructure from Microsoft, Yahoo, Amazon and Google, provide abundant computational and storage resources with low programming and management overheads. These two developments compel us to rethink the current end-to-end design of mobile applications, ranging from software stacks on mobile devices to back-end services in the cloud. The cross-disciplinary agenda of this summit will include presentations and discussions on creating the \"newest and hottest\" applications, overcoming the fundamental limitations in energy and physical capabilities, optimizing OS and networking stack, protecting the security of user data, and identifying proof-of-concept demonstrations. The objective is to take a critical and deep look at the nascent field, and to prioritize research problems to realize next-generation mobile applications."},{"id":1,"name":"Program","content":"[accordion]\r\n\r\n[panel header=\"Wednesday, June 2, 2010\"]\r\n\r\n<strong>8:00am - 8:30am<\/strong>\r\n\r\n<strong>Breakfast<\/strong>\r\n\r\n<strong>8:30am - 8:45am<\/strong>\r\n\r\n<strong>Welcome &amp; Round Table Introductions<\/strong>\r\n\r\n<strong>8:45am - 10:05am <\/strong>\r\n\r\n<strong>Exploiting Context<\/strong> (Chair: Ming Zhang, MSR Redmond)\r\n<ol>\r\n \t<li><strong>A framework for context-aware applications,<\/strong> Ashok Agarwala, University of Maryland. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/aa1.pptx\">slides 1<\/a>) (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/aa2.pdf\">slides 2<\/a>)<\/li>\r\n \t<li><strong>Context-awareness, cloudlets and the case for AP-embedded, anonymous computing, <\/strong>Anthony LaMarca, Intel Research Seattle. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/anthony.ppt\">slides<\/a>)<\/li>\r\n \t<li><strong>Towards context-aware computing via the mobile social cloud, <\/strong>Rick Han, University of Colorado. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/msr_net_summit_rhan4.pptx\">slides<\/a>)<\/li>\r\n \t<li><strong>Intentional Networking<\/strong>, Brian Noble, University of Michigan. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/noble.pptx\">slides<\/a>)<\/li>\r\n<\/ol>\r\n<strong>10:05am - 10:15am <\/strong>\r\n\r\n<strong>Break<\/strong>\r\n\r\n<strong>10:15am - 11:35am <\/strong>\r\n\r\n<strong>Partitioning &amp; Offloading<\/strong> (Chair: Jitu Padhye, Microsoft Research)\r\n<ol>\r\n \t<li><strong>Leveraging fast VM fork for next generation mobile perception, <\/strong>Eyal de Lara, University of Toronto. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/eyal.pptx\">slides<\/a>)<\/li>\r\n \t<li><strong>The role of cloudlets in mobile computing, <\/strong>Mahadev Satyanarayanan, Carnegie Mellon University. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/satya.ppt\">slides<\/a>)<\/li>\r\n \t<li><strong>Programming smartphones as distributed systems with extreme heterogeneity, <\/strong>Lin Zhong, Rice University. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/lin.pptx\">slides<\/a>)<\/li>\r\n \t<li><strong>Resource-intensive mobile computing (Project MAUI), <\/strong>Alec Wolman, MSR Redmond. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/alec.pptx\">slides<\/a>)<\/li>\r\n<\/ol>\r\n<strong>11:35am - 11:45am<\/strong>\r\n\r\n<strong>Break<\/strong>\r\n\r\n<strong>11:45am - 12:30pm<\/strong>\r\n\r\n<strong>Round Table Discussion: My favorite mobile computing research paper from last three years (not my own)<\/strong>\r\n\r\n<strong>12:30pm - 1:20pm<\/strong>\r\n\r\n<strong>Mingling &amp; Lunch<\/strong>\r\n\r\n<strong>1:20pm - 3:00pm <\/strong>\r\n\r\n<strong>Novel Scenarios<\/strong> (Chair: Ratul Mahajan, MSR Redmond)\r\n<ol>\r\n \t<li><strong>Remembering what matters,<\/strong> Romit Roy Choudhury, Duke University (<a href=\"http:\/\/synrg.ee.duke.edu\/ppts\/MoVi-MSR-Summit.ppt\">slides<\/a>)<\/li>\r\n \t<li><strong>Cloudlets on phones,<\/strong> Gaetano Borriello, University of Washington (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/borriello-msr.pdf\">slides<\/a>)<\/li>\r\n \t<li><strong>Experiences with a vehicular cloud computing platform,<\/strong> Jason Flinn, University of Michigan (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/jason.ppt\">slides<\/a>)<\/li>\r\n \t<li><strong>Cloudy with a chance of mobile social computing,<\/strong> Maria Ebling, IBM Research (slides)<strong>Understanding the behavior of a large-scale, multi-player, mobile game in the wild, <\/strong>Suman Banerjee, University of Wisconsin (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/suman.pdf\">slides<\/a>)<\/li>\r\n<\/ol>\r\n<strong>3:00pm - 3:10pm<\/strong>\r\n\r\n<strong>Bio Break<\/strong>\r\n\r\n<strong>3:10pm - 3:50pm <\/strong>\r\n\r\n<strong>Security &amp; Privacy<\/strong> (Chair: Srikanth Kandula, Microsoft Research)\r\n<ol>\r\n \t<li><strong>Vanish: self-destructing digital data, <\/strong>Yoshi Kohno, University of Washington<\/li>\r\n \t<li><strong>Improving the Security of Commodity Hypervisors for Cloud Computing, <\/strong>Stefan Saroiu, MSR Redmond (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/saroiu_networking_summit_2010.pdf\">slides<\/a>)<\/li>\r\n<\/ol>\r\n<strong>3:50pm - 5:10pm <\/strong>\r\n\r\n<strong>Social Event<\/strong>\r\n\r\nFun times at <a href=\"http:\/\/www.bowlluckystrike.com\/\">Lucky Strike Lane &amp; Lounge<\/a>\r\n\r\nGroup photos &amp; mingling\r\n\r\n<strong>5:10pm - 6:30pm <\/strong>\r\n\r\n<strong>Cloud Infrastructure<\/strong> (Chair: Sharad Agarwal, MSR Redmond)\r\n<ol>\r\n \t<li><strong>Centralize what you can, distribute what you must: a telco's view to the cloud,<\/strong> Pablo Rodriguez, Telefonica Research. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/pablo.pdf\">slides<\/a>)<\/li>\r\n \t<li><strong>Networking as a service: cloud centric networking in a federated network environment,<\/strong> Raj Jain, Washington University in St. Louis. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/raj.pdf\">slides<\/a>)<\/li>\r\n \t<li><strong>Educational support infrastructure for mobile + cloud computing (Project HAWAII), <\/strong>Jitendra Padhye, MSR Redmond. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/padhye.pptx\">slides<\/a>)<\/li>\r\n \t<li><strong>Future challenges from FAWN, <\/strong>Dave Andersen, CMU. (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/david.pdf\">slides<\/a>)<\/li>\r\n<\/ol>\r\n<strong>7:00pm <\/strong>\r\n\r\n<strong>Cocktails &amp; Dinner Banquet<\/strong> at <a href=\"http:\/\/www.thepurplecafe.com\/\">Purple Cafe<\/a>\r\n\r\nHost: <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/malvar\/\">Rico Malvar<\/a>, Distinguished Engineer and Managing Director, MSR Redmond\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Thursday, June 3, 2010\"]\r\n\r\n<strong>8:30am - 9:00am <\/strong>\r\n\r\n<strong>Breakfast<\/strong>\r\n\r\n<strong>9:00am - 9:50am <\/strong>\r\n\r\n<strong>Round Table Discussion: My five year research agenda in mobile computing<\/strong>\r\n\r\n<strong>9:50am - 10:00am<\/strong>\r\n\r\n<strong>Break<\/strong>\r\n\r\n<strong>10:00am - 11:20pm <\/strong>\r\n\r\n<strong>Research Showcase (Demos &amp; Posters)<\/strong>\r\n<ul>\r\n \t<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/dimitrios.pdf\">A Mobile Search and Advertisement Cache Architecture<\/a> <\/em>(Dimitrios Lymberopoulos, MSR)<\/li>\r\n \t<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/falaki.pdf\">Diversity in Smartphone Usage<\/a> <\/em>(Hossein Falaki, Ratul Mahajan, Deborah Estrin, UCLA &amp; MSR)<\/li>\r\n \t<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/ramesh.pdf\">Trends in Mobile and Cloud Computing<\/a> <\/em>(Joongheon Kim, Bin Liu, Nilesh Mishra, Luis Pedrosa, University of Southern California)<\/li>\r\n \t<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/bodhi.pdf\">Continuous Sensing on Mobile Phones<\/a> <\/em>(Bodhi Priyantha, Dimitrios Lymberopoulos, Jie Liu, MSR Redmond)<\/li>\r\n \t<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/yangfan.pdf\">A Platform for Mobile-Cloud Computing in Streams<\/a> <\/em>(Fan Yang, MSR Asia)<\/li>\r\n \t<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/xu.pdf\">Anatomizing Application Performance Differences on Smartphones<\/a> <\/em>(Junxian Huang, Qiang Xu, Birjodh Tiwana, Z. Morley Mao, Ming Zhang, Victor Bahl, Michigan &amp; MSR)<\/li>\r\n \t<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/azarias.pdf\">Network solutions for challenged environments<\/a> <\/em>(Azarias Reda, Univeristy of Michigan)<\/li>\r\n \t<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/brett.pdf\">Intentional Networking<\/a> <\/em>(Brett Higgins, Brian Noble, University of Michigan)<\/li>\r\n \t<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/ratul.pdf\">Augmenting Mobile 3G using Wi-Fi<\/a> <\/em>(Aruna Balasubramanian, Ratul Mahajan, Arun Venkataramani, UMASS &amp; MSR)<\/li>\r\n \t<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/ashish.pdf\">The Anatomy of a Large Mobile Massively Multiplayer Online Game<\/a> <\/em>(Ashish Patro, Suman Banerjee, University of Wisconsin)<\/li>\r\n \t<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/aaron.pdf\">Anonymous APIs = Anonymous Cloud Services<\/a> <\/em>(Aaron Beach, Colorado)<\/li>\r\n \t<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/cem.pdf\">Using Multiple Wearable Sensors Dynamically to Facilitate Activity Recognition<\/a> <\/em>(Cem Onyuksel, Carnegie Mellon University)<\/li>\r\n \t<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/stefan.pdf\">Trusted Sensors<\/a> <\/em>(Stefan Saroiu, Alec Wolman, MSR Redmond)<\/li>\r\n \t<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/sharad.pdf\">Virtual Compass: relative positioning to enable mobile social interactions<\/a> <\/em>(Sharad Agarwal, Victor Bahl, Nilanjan Banerjee, Ranveer Chandra, Alec Wolman, Mark Corner, UMASS &amp; MSR)<\/li>\r\n \t<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/sierra.pdf\">Sierra: practical power-proportionality for data center storage<\/a> <\/em>(Eno Thereska, Austin Donnelly, Dushyanth Narayanan, MSR Cambridge)<\/li>\r\n \t<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/rohit.pdf\">FoneAstra: Making Mobile Phones Smarter<\/a> <\/em>(Rohit Chaudhri, Kentaro Toyama, Bill Thies, University of Washington &amp; MSR India)<\/li>\r\n \t<li><em><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/yunxin.pdf\">Energy Efficient Mobile Computing Through Cloud Offloading<\/a> <\/em>(Yunxin Liu, Yongqiang Xiong, Microsoft Research Asia)<\/li>\r\n<\/ul>\r\n<strong>11:20am - 12:30pm <\/strong>\r\n\r\n<strong>Panel: \u201cSmartphone: is this it?\u201d<\/strong>\r\n\r\nModerator: <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/bahl\/\">Victor Bahl<\/a>, MSR Redmond\r\n\r\nPanelists:\r\n<ul>\r\n \t<li><a href=\"http:\/\/www.linkedin.com\/in\/susiewee\">Susie Wee<\/a>, CTO, Client Cloud Services, Hewett Packard<\/li>\r\n \t<li><a href=\"http:\/\/www.infosys.com\/about\/management-profiles\/Pages\/subrahmanyam-goparaju.aspx\">Subrahmanyam Goparaju<\/a>, Vice President and Head, SETLabs, Infosys<\/li>\r\n \t<li>Keith Rowe, Director of Hardware, KIN, Microsoft Corporation<\/li>\r\n \t<li><a href=\"http:\/\/www.cs.cmu.edu\/~dps\/\">Dan P. Siewiorek<\/a>, Director of HCI Institute, Carnegie Mellon University<\/li>\r\n<\/ul>\r\n<strong>12:30pm - 12:40pm<\/strong>\r\n\r\n<strong>Set up Working Groups<\/strong>\r\n\r\n<strong>12:40pm - 1:30pm <\/strong>\r\n\r\n<strong>Mingling &amp; Lunch<\/strong>\r\n\r\n<strong>1:30pm - 3:30pm <\/strong>\r\n\r\n<strong>Brainstorming<\/strong>\r\n\r\n<strong>WG1: Cloud services for mobile<\/strong>\r\n<ul>\r\n \t<li>Discussion lead: <a href=\"http:\/\/cseweb.ucsd.edu\/~snoeren\/\">Alex C. Snoeren<\/a>, UCSD<\/li>\r\n<\/ul>\r\n<strong>WG2: Smartphone 2020 &amp; disruptive hardware capabilities<\/strong>\r\n<ul>\r\n \t<li>Discussion lead: <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/dburger\/\">Doug Burger<\/a>, eXtreme Computing Group, MSR<\/li>\r\n<\/ul>\r\n<strong>WG3: Sleep well \u2013 designing for security &amp; privacy<\/strong>\r\n<ul>\r\n \t<li>Discussion lead: <a href=\"http:\/\/www.cs.ucl.ac.uk\/staff\/b.karp\/\">Brad Karp<\/a>, University College London.<\/li>\r\n<\/ul>\r\n<strong>WG4: Game changing platform &amp; applications<\/strong>\r\n<ul>\r\n \t<li>Discussion lead: <a href=\"http:\/\/people.ee.duke.edu\/~romit\/\">Romit Roy Choudhury<\/a>, Duke University.<\/li>\r\n<\/ul>\r\n<strong>3:30pm - 4:30pm<\/strong>\r\n\r\n<strong>Working Group Presentations<\/strong>\r\n\r\n<strong>4:30pm - 5:30pm<\/strong>\r\n\r\n<strong>Round Table Impressions &amp; Wrap-up<\/strong>\r\n\r\n<strong>6:00pm<\/strong>\r\n\r\n<strong>Plated Dinner<\/strong> at <a href=\"http:\/\/www.starwoodhotels.com\/pub\/media\/1555\/na1555lo5_tn.jpg\">Westin Hotel in the GrandBall Room-C<\/a>\r\n\r\n[\/panel]\r\n\r\n[\/accordion]"},{"id":2,"name":"Abstracts","content":"[accordion]\r\n\r\n[panel header=\"Rover: A Framework for Context-Aware Applications\"]\r\n\r\n<img class=\"alignnone size-full wp-image-277503\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/aa.jpg\" alt=\"aa\" width=\"150\" height=\"180\" \/>\r\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.cs.umd.edu\/~agrawala\" target=\"_new\">Ashok Agarwala<\/a> | University of Maryland<\/p>\r\nRover is a framework for integration of context-aware applications in which a number and variety of client devices such a smart phones, PDAs etc. may connect to its server using communication channels such as 2G, 3G, WiFi, WiMAX, etc., and obtain information and services appropriate for their context. The context for each client is maintained and managed by the server and is used to customize the information and services provided. MyeVyu is an application suite that has been implemented to show the capabilities of this framework for use by a campus community. This system can location a client anywhere on campus, indoors or outdoors, with an accuracy of 10\u2019 or better. MyeVyu applications include: Campus and class information (Class schedule, Campus events, Assignments and exams, Grades, Campus Alerts), Weather, Transportation (Real time information about Washington Metro Trains, Washington Metro Buses, Campus Shuttle Buses, Parking location), Social Networking, Campus building and directory, Public Safety Access.\r\n\r\nThe public safety application, called V911, not only provides the identity of the client and the location to the Public Safety Answering Point (PSAP) but also opens an audio and a video stream from the client device so that the dispatcher can hear and see the incident scene. If there are any PTZ cameras in the area the video feeds from them are also provided to the dispatcher who can forward one or more of the feeds to a responder assigned to handle the situation. This way the responder has up to the minute information about the incident. Rover is a flexible integration platform on which a number of additional applications are being developed.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Context-awareness, Cloudlets and the Case for AP-embedded, Anonymous Computing\"]\r\n\r\n<img class=\"alignnone size-full wp-image-277506\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/al.jpg\" alt=\"al\" width=\"150\" height=\"161\" \/>\r\n<p style=\"text-align: left\" align=\"right\"><a title=\"\" href=\"http:\/\/seattle.intel-research.net\/people\/lamarca\/\" target=\"_new\">Anthony LaMarca<\/a>\u00a0| Intel Research, Seattle<\/p>\r\nContext-awareness and the ability of our computing devices to sense where we are, who we are with, and what we are doing is driving a new class of high-value, always-on applications and services. As the need for coverage, accuracy and detail increases, context-aware devices will increasingly rely on computationally intense vision-based approaches to inferring context. A promising solution to the efficient implementation of mobile context-awareness is the \"cloudlet\" model proposed by Satyanarayanan et al. I will outline why I think the trend towards vision-based context-awareness will drive demand for cloudlets and some of the challenges and market opportunities it will enable.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Towards Context-Aware Computing Via the Mobile Social Cloud\"]\r\n\r\n<img class=\"alignnone size-full wp-image-277539\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/rh.jpg\" alt=\"rh\" width=\"110\" height=\"164\" \/>\r\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.cs.colorado.edu\/~rhan\/\" target=\"_self\">Rick Han<\/a>\u00a0| University of Colorado<\/p>\r\nThe combination of mobile smartphones with social networks enables a new era of context-aware computing, which stimulates new thinking about what kind of cloud services and infrastructure are needed to support smart mobile-aware spaces. We will describe our initial research focused on creating context-aware applications using mobile social networks, namely our SocialFusion project. Some of the interesting issues addressed by SocialFusion so far include group-based context awareness, as well as privacy and anonymity concerns introduced by mobile social networks. We will describe some of our initial thinking on what kinds of common services and framework may be needed to enable context awareness via the mobile social cloud.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Leveraging Fast VM Fork for Next Generation Mobile Perception\"]\r\n\r\n<img class=\"alignnone size-full wp-image-277518\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/edl.jpg\" alt=\"edl\" width=\"150\" height=\"226\" \/>\r\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.cs.toronto.edu\/~delara\/\" target=\"_self\">Eyal de Lara<\/a>\u00a0| University of Toranto<\/p>\r\nCloudlets, consisting of infrastructure accessible via a wireless LAN, are poised to enable a new generation of mobile applications that opportunistically leverage nearby computationally resources to augment human perception. We anticipate that cloudlets could be implemented as networks of computational enabled access points that lend their resources to nearby mobile users. The speed and local setting is necessary since most of the next generation perception (ESP) use cases require low latencies for responsiveness to human interaction. In this talk, I will describe early research that leverages fast virtual machine (VM) fork to migrate computation between a mobile device and a nearby cloudlet, and once on the cloudlet to enable parallel computation. VM fork is a novel abstraction that enables fast (hundreds of milliseconds) instantiation of computing elements in a cloud environment. While VM fork is conceptually a simple idea, the large size of VM memory images (which reaches hundreds of megabytes or even gigabytes) makes an efficient implementation challenging. Our VM fork implementation addresses this challenge with three key mechanisms: Lazy State Replication, which allows for extremely fast instantiation of VM clones by initially copying only metadata necessary to resume a VM, and transmitting the parent\u2019s state that the clone actually accesses on demand; Avoidance Heuristics, which eliminate superfluous memory transfers for the common case of clones allocating new private state; and Multicast Distribution, a technique that provides scalability and pre-fetching by multicasting replies to memory page requests.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"The Role of Cloudlets in Mobile Computing\"]\r\n\r\n<img class=\"alignnone size-full wp-image-277548\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/satya.jpg\" alt=\"satya\" width=\"150\" height=\"195\" \/>\r\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.cs.cmu.edu\/~satya\/\" target=\"_self\">Mahadev Satyanarayanan<\/a>\u00a0| Carnegie Mellon University<\/p>\r\nImagine Wi-Fi points augmented with computing, memory and storage resources that can be used by nearby mobile devices. How could the widespread deployment of such infrastructure fundamentally change mobile computing? Rather than relying on a distant cloud, a mobile user could rapidly instantiate and use a customized \"cloudlet\" that is just one wireless hop away. Crisp interactive response for immersive applications that augment human cognition is then much easier to achieve because the proximity of the cloudlet ensures low latency and jitter. A critical aspect of this vision, namely rapid customization of cloudlet infrastructure, is achievable through dynamic VM synthesis.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Programming Smartphones as Distributed Systems with Extreme Heterogeneity\"]\r\n\r\n<img class=\"alignnone size-full wp-image-277527\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/lz.jpg\" alt=\"lz\" width=\"150\" height=\"200\" \/>\r\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.ruf.rice.edu\/~lzhong\/\" target=\"_new\">Lin Zhong<\/a>\u00a0| Rice University<\/p>\r\nTo enable creative services on smartphones-like mobile systems, researchers have sought help from two very different computing platforms. On one hand, sensors, either built in device or wireless body-worn, have been studied to enhance the \u201csense\u201d of smartphones so that the latter can better infer about the user and their context. On the other extreme, the powerful cloud has been leveraged to enhance the \u201cbrain\u201d of smartphones so that the latter can benefit sophisticated applications of pattern recognition, data mining, and artificial intelligence. As a result, the smartphone increasingly appears to be a distributed system with the cloud at one end and sensors at the other from the perspective of application developers. To help developers cope with such extreme heterogeneity, we have been studying programming and operating system support so that they can code applications for smartphones in a platform transparent way yet still benefit from the power and efficiency of programmable execution in the cloud and in the sensor. We will be able to share some early results from our Reflex project along this direction.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Future Challenges from FAWN\"]\r\n\r\n<img class=\"alignnone size-full wp-image-277515\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/da.jpg\" alt=\"da\" width=\"150\" height=\"156\" \/>\r\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.cs.cmu.edu\/~dga\/\" target=\"_new\">David Andersen<\/a>\u00a0| Carnegie Mellon University<\/p>\r\nThis talk will briefly describe our experiences building an energy-efficient cluster architecture for data-intensive computing, called FAWN: A Fast Array of Wimpy Nodes. FAWN makes use of an array of low-power, energy efficient nodes instead of more traditional high-performance computers. In the process, it drastically reduces power consumption, particularly for I\/O bound workloads, but the constrained CPU and DRAM, and the performance quirks of flash memory impose substantial systems engineering challenges. I will overview the solutions we developed, and then discuss the ongoing systems and algorithmic challenges that sit between the fundamental efficiency of the architecture and its practical realization. I will conclude with a brief mention of a future, radically constrained, hardware platform that is guiding our upcoming research.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Centralize What You Can, Distribute What You Must: a Telco's View to the Cloud\"]\r\n\r\n<img class=\"alignnone size-full wp-image-277536\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/pr.jpg\" alt=\"pr\" width=\"150\" height=\"208\" \/>\r\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.rodriguezrodriguez.com\/\" target=\"_new\">Pablo Rodriguez<\/a>\u00a0| Telefonica<\/p>\r\nOver the last years, most networking research has focused on the \"divide and conquer principle\", with more and more distributed architectures where the goal was to achieve better scalability and reliability. However, with more distributed architectures also come higher operational costs (configuration, management, support, upgrades, etc). In fact, operational costs are often orders of magnitude higher than the costs of the infrastructure itself. As a result one may want to centralized most equipment to reduce operational costs, and distribute only those elements required for scalability and efficiency. In wireless, new smartphone devices are causing a number of operational costs in the network infrastructure that cause constant upgrades and expensive maintenance. In this talk, i will describe some of these problems, and delve into some potential solutions.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Networking as a Service: Cloud Centric Networking in a Federated Network Environment\"]\r\n\r\n<img class=\"alignnone size-full wp-image-277542\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/rj.jpg\" alt=\"rj\" width=\"150\" height=\"225\" \/>\r\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.cse.wustl.edu\/~jain\/\" target=\"_new\">Raj Jain<\/a>\u00a0| Washington University<\/p>\r\nWhile cloud computing technology allows efficient sharing of compute resources, dynamically provisioning wide-area QoS links, interconnecting distributed application instances deployed over resources leased from multiple cloud providers, is still static and non-trivial. Therefore, customers are limited either to a single cloud service provider or to static links that cannot be easily allocated and de-allocated on demand. Here we are not talking about simple cloud service such as document sharing that can be easily be done using best effort low speed connections over the public Internet. We are concerned about applications requiring significant network bandwidth such as data intensive computing.\r\n\r\nElastic Pipes - an extension of our NSF funded Internet 3.0 architecture - extend the cloud computing concepts to networking and allow telecommunication service providers to advertise their transport capabilities. Clients can establish high-speed connections with desired quality of service by dynamically combining transport service objects from various carriers. This will allow cloud computing to grow into a \"Cloud Market\" where the clients can choose cloud computing resources from \u201cNetwork as a service (NaaS)\u201d offerings from different providers and interconnect them via elastic pipes using different telecommunication carriers.\r\n\r\nThis is somewhat of a \u201cparadigm shift\u201d from current practice but is inevitable given the current success of \u201csoftware as a service (SaaS)\u201d and \"Infrastructure as a Service(IaaS)\" service offerings of commercial cloud platforms that is expected to enable feasible deployment of high end distributed applications and services.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Vanish: Self Destructing Digital Data\"]\r\n\r\n<img class=\"alignnone size-full wp-image-277554\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/yk.jpg\" alt=\"yk\" width=\"150\" height=\"203\" \/>\r\n\r\n<a href=\"http:\/\/www.cs.washington.edu\/homes\/yoshi\/\" target=\"_new\">Yoshi Kohno<\/a>\u00a0| University of Washington\r\n\r\nComputing and communicating through the web make it virtually impossible to leave the past behind. College Facebook posts or pictures can resurface during a job interview; a lost or stolen laptop can expose personal photos or messages; or a legal investigation can subpoena the entire contents of a home or work computer, uncovering incriminating or just embarrassing details from the past.\r\n<p class=\"smallText\">Our research seeks to protect the privacy of past, archived data \u2014 such as copies of emails maintained by an email provider \u2014 against accidental, malicious, and legal attacks. Specifically, we wish to ensure that all copies of certain data become unreadable after a user-specified time, without any specific action on the part of a user, without needing to trust any single third party to perform the deletion, and even if an attacker obtains both a cached copy of that data and the user's cryptographic keys and passwords.<\/p>\r\n<p class=\"smallText\">[\/panel]<\/p>\r\n[panel header=\"Intentional Networking\"]\r\n\r\n<img class=\"alignnone size-full wp-image-277512\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/bn.jpg\" alt=\"bn\" width=\"110\" height=\"142\" \/>\r\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.eecs.umich.edu\/~bnoble\/\" target=\"_new\">Brian Noble<\/a>\u00a0| University of Michigan<\/p>\r\nMobile devices face a diverse and dynamic set of networking options. Using those options to the fullest requires knowledge of application intent. This talk introduces Intentional Networking, a simple but powerful mechanism for handling network diversity. Applications supply a declarative label for network transmissions, and the system matches transmissions to the most appropriate network. The system may also defer and re-order opportunistic transmissions subject to application-supplied mutual exclusion and ordering constraints. We have modified three applications to use Intentional Networking: BlueFS, a distributed file system for pervasive computing, Mozilla's Thunderbird e-mail client, and a vehicular participatory sensing application. Compared to an idealized solution that makes optimal use of all aggregated available networks but without knowledge of application intent, Intentional Networking improves the latency of interactive messages from 42% to 13x, while adding only 1-8% throughput overhead.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Cloudlets on Phones\"]\r\n<p style=\"text-align: left\"><img class=\"alignnone size-full wp-image-277521\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/gb.jpg\" alt=\"gb\" width=\"150\" height=\"218\" \/><\/p>\r\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.cs.washington.edu\/homes\/gaetano\/\" target=\"_new\">Gaetano Borriello<\/a>\u00a0| University of Washington<\/p>\r\nEntrepreneurial people in developing regions have many ideas for mobile applications that will provide useful services in their local context. However, they are faced with a large barrier to developing and deploying those applications because they usually require external experts to help them harness cloud services. From our experiences in this space, we have reached the conclusion that a series of stepping stones are needed that allow applications to progress from simple implementations running on a user's own phone to full-fledged cloud-hosted applications. Communication constraints are quite different than the developed world, for example, data plans are very uncommon and most communication is through voice and SMS with specific costs associated with each call or message, often paid via pay-as-you-go plans. Applications must be built on simple communication technology with a clear migration path as GPRS and Internet connectivity become more available in the developing world.\r\n\r\nIn this talk, we propose a set of steps for both the development and deployment of mobile applications that we believe are applicable in many parts of the world, especially given the increasing availability of high-end phones that can serve as hosting sites themselves. We highlight the challenges given some simple mechanisms on which many applications can be built. Our ultimate goal is to make it easy for entrepreneurs in developing regions to enable their ideas for mobile applications, generate their own content, and have the pride of ownership that will sustain their efforts.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Experiences with a Vehicular Cloud Computing Platform\"]\r\n\r\n<img class=\"alignnone size-full wp-image-277524\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/jf.jpg\" alt=\"jf\" width=\"150\" height=\"194\" \/>\r\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/www.eecs.umich.edu\/~jflinn\/\" target=\"_new\">Jason Flinn<\/a>\u00a0| University of Michigan<\/p>\r\nIn this talk, I\u2019ll describe the experiences and lessons learned from teaching a class called \u201cCloud Computing in the Commute\u201d with Brian Noble and TJ Giuli at the University of Michigan last semester. In this project-based course, student teams designed, built, and demonstrated applications that leveraged an in-vehicle mobile sensing platform connected via wireless networks with cloud services. During the semester, students road-tested their applications on a computing platform built into a Ford Fiesta. At the end of the semester, a contest was held in which students demoed their applications; the winning team drove their project to Maker Faire in California. While our focus in this class was educational in nature, our experiences nevertheless illuminated several important research issues to consider in the design of mobile\/cloud applications, especially those intended for vehicular environments.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Cloudy with a Chance of Mobile Social Computing\"]\r\n\r\n<img class=\"alignnone size-full wp-image-277530\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/me.jpg\" alt=\"me\" width=\"110\" height=\"165\" \/>\r\n<p style=\"text-align: left\" align=\"right\"><a title=\"\" href=\"http:\/\/domino.research.ibm.com\/comm\/research_people.nsf\/pages\/ebling.index.html\" target=\"_new\">Maria Ebling<\/a>\u00a0| IBM Research<\/p>\r\nHow does one bring information technology to people living on the margins of contemporary society? Whether in the U.S. or in the developing world, can a lack of computer access be overcome instead with inexpensive mobile phones? How might one go about addressing this need? In this talk, I will present some work we have been doing to support the homeless here in the U.S. and farmers in developing nations. One project, MobiSMD (aka PictureTalk), supports asynchronous conversations anchored by pictures. Another, CRM (joint with Chris Le Dantec of GaTech), focuses on supporting homeless clients and their case workers through mobile messaging and information dissemination. I will present an overview of the scenarios and discuss the requirements such applications place on a cloud infrastructure.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Understanding the Behavior of a Large-Scale, Multi-Player, Mobile Game in the Wild\"]\r\n\r\n<a href=\"http:\/\/pages.cs.wisc.edu\/~suman\/\" target=\"_new\"><img class=\"alignnone size-full wp-image-277551\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/sb.jpg\" alt=\"sb\" width=\"193\" height=\"204\" \/><\/a>\r\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/pages.cs.wisc.edu\/~suman\/\" target=\"_new\">Suman Banerjee<\/a>\u00a0| University of Wisconsin<\/p>\r\nThis talk describes a large-scale, long-term measurement study of a popular mobile Massively Multiplayer Online Role Playing Game (MMORPG), called Parallel Kingdom, with over 100,000 users distributed across 70 countries. Our study covers various aspects of the game including (i) characteristics of its players population, (ii) player behavior, (iii) network-level characteristics observed between game servers and player devices that connect through WiFi and cellular networks world-wide, (iv) money spending behavior of players and how network phenomenon affects such behavior, and (v) player mobility patterns. Our measurement study spans almost the entire life of the game staring from its inception on October 31, 2008 to until May 8, 2010 (555 days in total).\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Remembering What Matters\"]\r\n<p style=\"text-align: left\"><img class=\"alignnone wp-image-277545\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/romit.jpg\" alt=\"romit\" width=\"153\" height=\"167\" \/><\/p>\r\n<p style=\"text-align: left\" align=\"right\"><a href=\"http:\/\/pages.cs.wisc.edu\/~suman\/\" target=\"_new\">Romit Roy Choudhury<\/a>\u00a0| Duke University<\/p>\r\nSensor networks have been conventionally defined as a network of sensor motes that collaboratively detect important events from their surroundings. We make an attempt to extend this notion to the social context by using mobile phones as a replacement for motes. We envision a system in which mobile phones collaboratively sense their ambience, recognize socially \"interesting\" events, and record short video clips of those events. At the end of the day, the video clips from different phones are \"stitched\" together, thereby creating an automatic video highlights of the occasion. We have built in early (offline) prototype of such a system using Nokia phones and iPod Nanos, and have experimented in real-life social gatherings. Results show that automatically generated video highlights are quite similar to those created manually, (i.e., by painstakingly editing the entire video of the occasion). In that sense, our system may be viewed as a collaborative information-distillation tool, capable of \"remembering what matters\".\r\n\r\n[\/panel]\r\n\r\n[panel header=\"MAUI: enabling fine-grained code offload for resource-intensive applications\"]\r\n\r\n<img class=\"alignnone size-full wp-image-277509\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/alecw.jpg\" alt=\"alecw\" width=\"75\" height=\"75\" \/>\r\n<p style=\"text-align: left\" align=\"right\"><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/alecw\/\" target=\"_self\">Alec Wolman<\/a>\u00a0| Microsoft Research<\/p>\r\nMAUI is a system that enables \ufb01ne-grained energy-aware of\ufb02oad of mobile code to the infrastructure. Previous approaches to these problems either relied heavily on programmer support to partition an application, or they were coarse-grained requiring full process (or full VM) migration. MAUI uses the bene\ufb01ts of a managed code environment to offer the best of both worlds: it supports \ufb01ne-grained code of\ufb02oad to maximize energy savings with minimal burden on the programmer. MAUI decides at run-time which methods should be remotely executed, driven by an optimization engine that achieves the best energy savings possible under the mobile device\u2019s current connectivity constrains. Using MAUI, we have developed: 1) a resource-intensive face recognition application that consumes an order of magnitude less energy, 2) a latency-sensitive arcade game application that doubles its refresh rate, and 3) a voice-based language translation application that bypasses the limitations of the smartphone environment by executing unsupported components remotely.\r\n\r\n[\/panel]\r\n\r\n[panel header=\"Trusted Sensors\"]\r\n\r\n<img class=\"alignnone wp-image-277533\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/08\/me_2010.jpg\" alt=\"me_2010\" width=\"155\" height=\"235\" \/>\r\n<p style=\"text-align: left\" align=\"right\"><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/ssaroiu\/\" target=\"_self\">Stefan Saroiu<\/a>\u00a0| Microsoft Research<\/p>\r\nDespite the popularity of adding sensors to mobile devices, the readings provided by these sensors cannot be trusted. Users can fabricate sensor readings with relatively little effort. This lack of trust discourages the emergence of applications where users have an incentive to lie about their sensor readings, such as falsifying a location or altering a photo taken by the camera. In this talk, we will present a broad range of applications that would benefit from the deployment of trusted sensors, from participatory sensing to monitoring energy consumption. We describe two design alternatives for making sensor readings trustworthy. Although both designs rely on the presence of a trusted platform module (TPM), they trade-off security guarantees for hardware requirements. While our first design is less secure, it requires no additional hardware beyond a TPM, unlike our second design. Finally, we present the privacy issues arising from the deployment of trusted sensors and we discuss protocols that can overcome them.\r\n\r\n[\/panel]\r\n\r\n[\/accordion]"},{"id":3,"name":"Participants","content":"<h2>Non-Microsoft Particpants<\/h2>\r\n<ul>\r\n \t<li><a href=\"http:\/\/www.cs.umd.edu\/~agrawala\/\">Ashok Agarwala<\/a>, University of Maryland<\/li>\r\n \t<li><a href=\"http:\/\/www.cs.cmu.edu\/~dga\/\">Dave Andersen, <\/a>Carnegie Mellon University<\/li>\r\n \t<li><a href=\"http:\/\/pages.cs.wisc.edu\/~suman\/\">Suman Banerjee, <\/a>University of Wisconsin<\/li>\r\n \t<li><a href=\"http:\/\/www.cs.washington.edu\/homes\/gaetano\/\">Gaetano Borriello<\/a>, University of Washington<\/li>\r\n \t<li><a href=\"http:\/\/people.ee.duke.edu\/~romit\/\">Romit Roy Choudhury<\/a>, Duke University<\/li>\r\n \t<li><a href=\"http:\/\/domino.research.ibm.com\/comm\/research_people.nsf\/pages\/ebling.index.html\">Maria Ebling<\/a>, IBM<\/li>\r\n \t<li><a href=\"http:\/\/www.eecs.umich.edu\/~jflinn\/\">Jason Flinn<\/a>, University of Michigan<\/li>\r\n \t<li><a href=\"http:\/\/www.infosys.com\/about\/management-profiles\/Pages\/subrahmanyam-goparaju.aspx\">Subrahmanyam Goparaju<\/a>, Infosys<\/li>\r\n \t<li><a href=\"http:\/\/www.cs.colorado.edu\/~rhan\/\">Rick Han<\/a>, University of Colorado<\/li>\r\n \t<li><a href=\"http:\/\/www.cs.ucl.ac.uk\/staff\/B.Karp\/\">Brad Karp<\/a>, University College London<\/li>\r\n \t<li><a href=\"http:\/\/www.cs.washington.edu\/homes\/yoshi\/\">Yoshi Kohno<\/a>, University of Washington<\/li>\r\n \t<li><a href=\"http:\/\/www.cs.toronto.edu\/~delara\/\">Eyal de Lara<\/a>, University of Toronto<\/li>\r\n \t<li><a href=\"http:\/\/seattleweb.intel-research.net\/people\/lamarca\/Publications.html\">Anthony LaMarca<\/a>, Intel<\/li>\r\n \t<li><a href=\"http:\/\/www.eecs.umich.edu\/~bnoble\/\">Brian Noble<\/a>, University of Michigan<\/li>\r\n \t<li><a href=\"http:\/\/rodriguezrodriguez.com\/\">Pablo Rodriguez<\/a>, Telefonica<\/li>\r\n \t<li><a href=\"http:\/\/www.cs.cmu.edu\/~satya\/\">Mahadev Satyanarayanan<\/a>, Carnegie Mellon University<\/li>\r\n \t<li><a href=\"http:\/\/www.cs.cmu.edu\/~dps\/\">Daniel P. Siewiorek, <\/a>Carnegie Mellon University<\/li>\r\n \t<li><a href=\"http:\/\/cseweb.ucsd.edu\/~snoeren\/\">Alex C. Snoeren<\/a>, University of California San Diego<\/li>\r\n \t<li><a href=\"http:\/\/www.communities.hp.com\/online\/blogs\/wee\/default.aspx\">Susie Wee<\/a>, Hewett Packard<\/li>\r\n \t<li><a href=\"http:\/\/www.ruf.rice.edu\/~lzhong\/\">Lin Zhong<\/a>, Rice University<\/li>\r\n<\/ul>\r\n<h2>Students<\/h2>\r\n<ul>\r\n \t<li>Sara Alspaugh,\u00a0University of California Berkeley<\/li>\r\n \t<li>Aaron Beach, University of Colorado<\/li>\r\n \t<li>Rohit Chaudhri, University of Washington<\/li>\r\n \t<li>Hossein Falaki, University of California Los Angeles<\/li>\r\n \t<li>Brett Higgins, University of Michigan<\/li>\r\n \t<li>Cem Onyuksel, Carnegie Mellon university<\/li>\r\n \t<li>Ashish Patro, University of Wisconsin<\/li>\r\n \t<li>Azarias Reda, University of Michigan<\/li>\r\n \t<li>Qiang Xu, University of Michigan<\/li>\r\n<\/ul>"},{"id":4,"name":"Past Summits","content":"The MSR Networking Summit is an annual event organized by the <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/group\/networking-research-group\/\">Networking Research Group<\/a>\u00a0at Microsoft Research, Redmond. Previous summits have focused on home networks, cognitive wireless networks and high speed TCP, among others.\r\n<ul>\r\n \t<li>2009: <a href=\"http:\/\/www.cs.washington.edu\/mssi\/2009\/index.html\">Unraveling the Technological Knot in Homes<\/a><\/li>\r\n \t<li>2008: Cognitive Wireless Networking<\/li>\r\n \t<li>2007: High Speed TCP<\/li>\r\n \t<li>2006: Life at the Edge: Research and Practice in Corporate\/Campus Networks<\/li>\r\n \t<li>2005: Self-Managing Networks<\/li>\r\n \t<li>2004: Mesh Networking<\/li>\r\n<\/ul>\r\nThis year, the summit is on Mobile and Cloud Services, and is organized by Ming Zhang, <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/padhye\/\">Jitendra Padhye<\/a>\u00a0and <a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/bahl\/\">Victor Bahl<\/a>."}],"msr_startdate":"2010-06-02","msr_enddate":"2010-06-03","msr_event_time":"","msr_location":"Bellevue, WA","msr_event_link":"","msr_event_recording_link":"","msr_startdate_formatted":"June 2, 2010","msr_register_text":"Watch now","msr_cta_link":"","msr_cta_text":"","msr_cta_bi_name":"","featured_image_thumbnail":null,"event_excerpt":"Microsoft Research's Seventh Annual Networking Summit will bring together researchers from academia and industry to discuss the new challenges in building mobile + cloud applications. The cross-disciplinary agenda of this summit will include presentations and discussions on creating the \"newest and hottest\" applications and more. Wireless technologies, such as LTE, LTE Advanced, HSPA+, EVDO-RevB, WiMAX, and high-speed Wi-Fi, are enabling anytime, anywhere Internet connectivity. In addition, large-scale cloud infrastructure from Microsoft, Yahoo, Amazon and Google,&hellip;","msr_research_lab":[199565],"related-researchers":[],"msr_impact_theme":[],"related-academic-programs":[],"related-groups":[],"related-projects":[],"related-opportunities":[],"related-publications":[],"related-videos":[],"related-posts":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/277482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-event"}],"version-history":[{"count":2,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/277482\/revisions"}],"predecessor-version":[{"id":874446,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/277482\/revisions\/874446"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=277482"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=277482"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=277482"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=277482"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=277482"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=277482"},{"taxonomy":"msr-program-audience","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-program-audience?post=277482"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=277482"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=277482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}