Skip to main content

Volume 3 Supplement 1

Special Issue on the Future of Middleware (FOME'11)

  • SI: FOME - The Future of Middleware
  • Open access
  • Published:

Middleware for social computing: a roadmap

Abstract

Social computing broadly refers to supporting social behaviours using computational systems. In the last decade, the advent of Web 2.0 and its social networking services, wikis, blogs, and social bookmarking has revolutionised social computing, creating new online contexts within which people interact socially (social networking). With the pervasiveness of mobile devices and embedded sensors, we stand at the brink of another major revolution, where the boundary between online and offline social behaviours blurs, providing opportunities for (re)defining social conventions and contexts once again. But opportunities come with challenges: can middleware foster the engineering of social software? We identify three societal grand challenges that are likely to drive future research in social computing and elaborate on how the middleware community can help address them.

References

  1. Azizyan M, Constandache I, Choudhury RR (2009) Surroundsense: mobile phone localization via ambience fingerprinting. In: Shin KG, Zhang Y-g, Bagrodia R, Govindan R (eds) Proc of the 15th annual intl conference on mobile computing and networking, Beijing, China. ACM, New York, pp 261–272

    Chapter  Google Scholar 

  2. Bawa-Cavia A (2011) Sensing the urban: using location-based social network data in urban analysis. In: The 1st workshop on pervasive urban applications (PURBA), June 2011

    Google Scholar 

  3. Bertier M, Frey D, Guerraoui R, Kermarrec A-M, Leroy V (2010) The gossple anonymous social network. In: Proc of ACM/IFIP/USENIX 11th intl middleware conference, Bangalore, India, pp 191–211

    Google Scholar 

  4. Bettencourt L, West G (2010) A unified theory of urban living. Nature 467(7318):912–913

    Article  Google Scholar 

  5. Boyd D (2010) The future of privacy: how privacy norms can inform regulation. In: 32nd intl conference of data protection and privacy commissioners, October 2010

    Google Scholar 

  6. Boyd D (2011) Designing for social norms (or how not to create angry mobs). http://www.zephoria.org/thoughts/archives/2011/08/05/design-social-norms.html, August 2011

  7. Chen Q, Hsu M (2010) Data stream analytics as cloud service for mobile applications. In: Meersman R, Dillon TS, Herrero P (eds) OTM conferences (2). Lecture notes in computer science, vol 6427. Springer, Berlin, pp 709–726

    Google Scholar 

  8. Cornelius C, Kapadia A, Kotz D, Peebles D, Shin M, Triandopoulos N (2008) Anonysense: privacy-aware people-centric sensing. In: Proc of the 6th intl conference on mobile systems, applications, and services, Breckenridge, CO, USA, pp 211–224

    Google Scholar 

  9. Crandall DJ, Backstrom L, Cosley D, Suri S, Huttenlocher D, Kleinberg J (2010) Inferring social ties from geographic coincidences. Proc Natl Acad Sci 107

  10. Crowcroft J, Madhavapeddy A, Schwarzkopf M, Hong T, Mortier R (2011) Unclouded vision. In: 12th intl conference on distributed computing and networking (ICDCN), January 2011

    Google Scholar 

  11. De Capitani di Vimercati S, Foresti S, Paraboschi S, Pelosi G, Samarati P (2011) Efficient and private access to outsourced data. In: Proc of the 31th IEEE intl conference on distributed computing systems (ICDCS), Minneapolis, USA, June 2011

    Google Scholar 

  12. De Cristofaro E, Durussel A, Aad I (2011) Reclaiming privacy for smartphone applications. In: Proc of 9th annual IEEE intl conference on pervasive computing and communications (PerCom), Seattle, WA, USA, pp 84–92

    Google Scholar 

  13. Dobbs R, Remes J (2011) What’s the biggest limit on city growth? (hint: it’s not steel or cement). McKinsey: What Matters, February 2011

  14. Falaki H, Mahajan R, Kandula S, Lymberopoulos D, Govindan R, Estrin D (2010) Diversity in smartphone usage. In: Proc of the 8th intl conference on mobile systems, applications, and services (MobiSys), pp 179–194

    Google Scholar 

  15. Friedman R, Kogan A (2009) Power aware management middleware for multiple radio interfaces. In: Proc of 10th intl middleware conference, Urbana, IL, USA, pp 288–307

    Google Scholar 

  16. Geambasu R, Kohno T, Levy A, Levy HM (2009) Vanish: increasing data privacy with self-destructing data. In: 18th USENIX security symposium, August 2009

    Google Scholar 

  17. Giurgiu I, Riva O, Juric D, Krivulev I, Alonso G (2009) Calling the cloud: enabling mobile phones as interfaces to cloud applications. In: Proc of 10th intl middleware conference, Urbana, IL, USA, pp 83–102

    Google Scholar 

  18. Haridasan M, Mohomed I, Terry D, Thekkath CA, Zhang L (2010) StarTrack next generation: a scalable infrastructure for track-based applications. In: Proc of OSDI 2010, October 2010

    Google Scholar 

  19. Kim DH, Kim Y, Estrin D, Srivastava MB (2010) Sensloc: sensing everyday places and paths using less energy. In: Proc of the 8th intl conference on embedded networked sensor systems (SenSys), pp 43–56

    Google Scholar 

  20. Kourtellis N, Finnis J, Anderson P, Blackburn J, Borcea C, Iamnitchi A (2010) Prometheus: user-controlled p2p social data management for socially-aware applications. In: Proc of ACM/IFIP/USENIX 11th intl middleware conference, Bangalore, India, pp 212–231

    Google Scholar 

  21. Krohn M, Yip A, Brodsky M, Morris R, Walfish M (2007) A World Wide Web without walls. In: 6th ACM workshop on hot topics in networking (Hotnets), Atlanta, GA, November 2007

    Google Scholar 

  22. Lindsay G, Kasarda JD (2011) At home in the aerotropolis. McKinsey: What Matters, February 2011

  23. Lu H, Yang J, Liu Z, Lane ND, Choudhury T, Campbell AT (2010) The jigsaw continuous sensing engine for mobile phone applications. In: Proc of the 8th intl conference on embedded networked sensor systems (SenSys), pp 71–84

    Google Scholar 

  24. Mancini C, Thomas K, Rogers Y, Price BA, Jedrzejczyk L, Bandara AK, Joinson AN, Nuseibeh B (2009) From spaces to places: emerging contexts in mobile privacy. In: Helal S, Gellersen H, Consolvo S (eds) UbiComp, ACM intl conference proceeding series. ACM, New York, pp 1–10

    Google Scholar 

  25. Manyika J, Chui M, Brown B, Bughin J, Dobbs R, Roxburgh C, Byers AH (2011) Big data: the next frontier for innovation, competition, and productivity. Technical report, McKinsey Global Institute

  26. Massaguer D, Hore B, Diallo MH, Mehrotra S, Venkatasubramanian N (2009) Middleware for pervasive spaces: balancing privacy and utility. In: Proc of 10th intl middleware conference, Urbana, IL, USA, pp 247–267

    Google Scholar 

  27. Mayer-Schönberger V (2009) Delete: the virtue of forgetting in the digital age. Princeton University Press, Princeton

    Google Scholar 

  28. Miluzzo E et al. (2010) Darwin phones: the evolution of sensing and inference on mobile phones. In: Proc of the 8th intl conference on mobile systems, applications, and services (MobiSys), San Francisco, California, USA, pp 5–20

    Google Scholar 

  29. Miluzzo E et al. (2008) Sensing meets mobile social networks: the design, implementation and evaluation of the cenceme application. In: Proc of the 6th intl conference on embedded networked sensor systems, Raleigh, NC, USA. ACM, New York, pp 337–350

    Google Scholar 

  30. Moraveji N, Akasaka R, Pea R, Fogg BJ (2011) The role of commitment devices and self-shaping in persuasive technology. In: Proc of the ACM conference extended abstracts on human factors in computing systems (CHI), May 2011, pp 1591–1596

    Google Scholar 

  31. Mortier R, Greenhalgh C, McAuley D, Spence A, Madhavapeddy A, Crowcroft J, Hand S (2010) Personal containers or, your life in bits. In: Digital futures workshop, October 2010

    Google Scholar 

  32. Murray DG, Schwarzkopf M, Smowton C, Smith S, Madhavapeddy A, Hand S (2011) Ciel: a universal execution engine for distributed data-flow computing. In: 9th USENIX symposium on networked systems design and implementation (NSDI)

    Google Scholar 

  33. Nguyen NP, Dinh TN, Xuan Y, Thai MT (2011) Adaptive algorithms for detecting community structure in dynamic social networks. In: INFOCOM. IEEE, New York, pp 2282–2290

    Google Scholar 

  34. Paek J, Kim J, Govindan R (2010) Energy-efficient rate-adaptive gps-based positioning for smartphones. In: Proc of the 8th intl conference on mobile systems, applications, and services (MobiSys), San Francisco, California, USA, pp 299–314

    Google Scholar 

  35. Qian F, Wang Z, Gerber A, Mao ZM, Sen S, Spatscheck O (2011) Profiling resource usage for mobile applications: a cross-layer approach. In: Proc of the 9th intl conference on mobile systems, applications, and services, Bethesda, MD, USA, pp 321–334

    Google Scholar 

  36. Quercia D, Kosinski M, Stillwell D, Crowcroft J (2011) Our Twitter profiles, our selves: predicting personality with Twitter. In: 3rd IEEE conference of social computing (Socialcom), October 2011

    Google Scholar 

  37. Rachuri KK, Musolesi M, Mascolo C, Rentfrow PJ, Longworth C, Aucinas A (2010) Emotionsense: a mobile phones based adaptive platform for experimental social psychology research. In: Proc 12th intl conference on ubiquitous computing, Copenhagen, Denmark, pp 281–290

    Chapter  Google Scholar 

  38. Ranganathan A, Al-Muhtadi J, Chetan S, Campbell RH, Mickunas MD (2004) Middlewhere: a middleware for location awareness in ubiquitous computing applications. In: Jacobsen H-A (ed) Middleware. Lecture notes in computer science, vol 3231. Springer, Berlin, pp 397–416

    Google Scholar 

  39. Rice AC, Hay S (2010) Decomposing power measurements for mobile devices. In: PerCom. IEEE Computer Society, Los Alamitos, pp 70–78

    Google Scholar 

  40. Riva O (2006) Contory: a middleware for the provisioning of context information on smart phones. In: Proc of intl conference on middleware, pp 219–239

    Google Scholar 

  41. Roy N, Misra A, Julien C, Das SK, Biswas J (2011) An energy-efficient quality adaptive framework for multi-modal sensor context recognition. In: Proc of 9th annual IEEE intl conference on pervasive computing and communications (PerCom), Seattle, WA, USA, pp 63–73

    Google Scholar 

  42. Salber D, Dey AK, Abowd GD (1999) The context toolkit: aiding the development of context-enabled applications. In: Proc of the SIGCHI conference on human factors in computing systems, pp 434–441

    Google Scholar 

  43. Sassen S (2011) Talking back to your intelligent city. McKinsey: What Matters, February 2011

  44. Schiavoni V, Riviere E, Felber P (2011) Whisper: middleware for confidential communication in large-scale networks. In: Proc of the 31th IEEE intl conference on distributed computing systems (ICDCS), Minneapolis, USA, June 2011

    Google Scholar 

  45. Searls D (2010) Eof: now data gets personal. Linux J, January 2010

  46. Swan M (2009) Emerging patient-driven health care models: an examination of health social networks, consumer personalized medicine and quantified self-tracking. Intl J Environ Res Publ Health 492–525

  47. Tang KP, Lin J, Hong JI, Siewiorek DP, Sadeh NM (2010) Rethinking location sharing: exploring the implications of social-driven vs purpose-driven location sharing. In: Proc 12th intl conference on ubiquitous computing, Copenhagen, Denmark, pp 85–94

    Chapter  Google Scholar 

  48. Teng J, Zhang B, Li X, Bai X, Xuan D (2011) E-Shadow: lubricating social interaction using mobile phones. In: Proc of the 31th IEEE intl conference on distributed computing systems (ICDCS), Minneapolis, USA, June 2011

    Google Scholar 

  49. Toch E, Cranshaw J, Drielsma PH, Tsai JY, Kelley PG, Springfield J, Cranor LF, Hong JI, Sadeh NM (2010) Empirical models of privacy in location sharing. In: Proc 12th intl conference on ubiquitous computing, Copenhagen, Denmark, pp 129–138

    Chapter  Google Scholar 

  50. Wilkinson R, Pickett K (2009) The spirit level: why greater equality makes societies stronger. Bloomsbury Press, New York

    Google Scholar 

  51. Wolf G (2010) The data-drive life. The New York Times, April 2010

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Licia Capra.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://creativecommons.org/licenses/by/2.0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Capra, L., Quercia, D. Middleware for social computing: a roadmap. J Internet Serv Appl 3, 117–125 (2012). https://doi.org/10.1007/s13174-011-0045-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13174-011-0045-8

Keywords