Paper of ANS

1. Requirements

1.1 Contents Needed

  • 1 Background knowledge that is not written in the paper
  • 2 Short executive summary of the paper
  • 3 Key messages of the paper
  • 4 Details of data (data collection techniques, statistics)
  • 5 Analysis methodologies used in the paper
  • 6 Results -- meaning of each graph/table. Implications of the results.
    - Fig 1 in 3.2.2.1 Para3
    - Fig 2 in 3.2.3.2 Para1-4
    - Fig 3 in 3.2.3.2 Para1-5
    - Fig 4 in 3.2.4.1 Para2
    - Fig 5 in 3.2.4.1 Para4
    - Fig 6 in 3.2.4.2 Para1
    - Fig 7 in 3.2.4.3 Para1
    - Table 1 in 3.2.3.2 Para1-3
    - Table 2 in 3.2.3.1 Para2
    - Table 3 in 3.2.3.2 Para1-4
    - Table 4 in 3.2.4.1 Para1
    - Table 5 in 3.2.4.1 Para4
  • 7 Discussion (limitation of the work etc.)
  • 8 What you learned from the paper; your personal opinion

1.2 Notations

  • Slides pages less than 40
  • Make sure that the slides are made in a consistent way
  • Make offline meeting with your partner at least once before the presentation.
  • Each talk has 40 mins time slot: 30 mins for talk and 10 mins for Q and A. For your talk, use the first 15 mins for the first half and another 15 mins for the second half.
    - The first half may include introduction/background, executive summary, methodologies.
    - The second half may include results, discussion, and summary.
    - You can adjust the balance between first and second half after discussion with your partner; e.g., some of results may be moved to the first half, and etc.
  • You will present your talk in English. If you find difficulty to speak in English at the Q/A session, you can speak in Japanese.

2. IFTTT Introductions (Search on the Internet)

2.1 Terms

Chinese Website: https://sspai.com/post/25270

  • Channels(频道)
  • Triggers(触发器)
  • Actions(动作)
  • Ingredients(组成要素)
  • Recipes(流程)

3. Paper

3.1 Paper Introductions

3.1.1 Pulications

  • ACM Reference Format :
    Xianghang Mi, Feng Qian, Ying Zhang, and XiaoFeng Wang. 2017. An Empirical Characterization of IFTTT: Ecosystem, Usage, and Performance. In Proceedings of IMC ’17. ACM, New York, NY, USA, 7 pages. https://doi.org/10.1145/3131365.3131369

3.1.2 Authors

3.2 Paper Summary

3.2.1 Introduction

  • Para 1
    有很多智能设备,他们各有指标,需要统一的管理来完成复杂的任务
    Many smart devices and web applications, they have own all kinds of features
    It is non-trivial to manage each device separately, letting alone managing proper policies to coordinate them to accomplish complex tasks.

  • Para 2

  1. Simple introduction of IFTTT
  2. Why they choose IFTTT
  3. Why IFTTT is the most popular, given 3 Reasons
  • Para 3
  1. What do they want to show by writing this paper(IFTTT's ecosystem, usage, performance)
  2. 3 Challenges they faced when they do their measurement study
  • Para 4
  1. To address those challenges, they create a testbed to automatically monitor and profile the whole process of applets execution
  • Para 5
  1. According to their study of IFTTT, They found that:
    52% of services and 16% of applet usage are IoT-related
    With more than 200 IoT services identifed, IFTTT indeed provides a way to identify popular smart home and wearable devices on the market in a “centralized” manner.
  • Para 6
  1. In-lab controlled experiments :
    • Actions of many applets cannot be executed in real time when their triggers are activated, The delays are long (usually 1 to 2 minutes) with huge variance(up to 15min)
    • Reason: We found the delay is caused by IFTTT’s long polling interval.

-Para 7

  1. 3 Contributions of the paper
  2. Paper Outlines
    • CH2 : IFTTT's ecosystem
    • CH3 : IFTTT's usages
    • CH4 : IFTTT's performance
    • CH5 : Related work and Conclusions
    • CH6 : Recommendations

3.2.2 Understanding The Ecosystem

  • Para 1
  1. Simple introduction of IFTTT's applet and trigger and action and service

3.2.2.1 The Measurement Testbed

  • Para 1
  1. Introduction the rules of IFTTT's Centralized Engine, Partner Services, IoT devices and Web Applications
  • Para 2
  1. Introduction of the Testbed
  2. They get an account from IFTTT and can provide their service
  3. The service can be provided triggers and actions for 4 devices and some web applications
  • Para 3
  1. Introduction of the structure with Figure 1
  2. The Paths for comunications and protocols it was used
  3. APIs they used

3.2.2.2 Profiling Interactions Among Entities

  • Para 1
  1. They use the testbed and self-implement ITFFF service to profile the interactions among entities within IFTTT's Ecosystem
  2. Why they need to do their own experiments since ITFFF has it's documents to know some the interactions (Several Reasons)
  3. How to publish the services ( Base URL and series of unique URL under the base URL)
  4. How to Construct an applet (User visit ITFFF by web or smartphone app, and set an applet)( OAuth2framework used to do authentication)
  5. Online applet execution phase

3.2.3 Understanding IFTTT Usage

  • A holistic view of IFTTT usage. Contains services, triggers, actions, applets

3.2.3.1 Data Collection Methodology

  • Para 1
  1. From IFTTT partner service index page to get the list of all the services
  2. From reverse engineering the URLs of applet's pages to know the URLs can be transfered to a 6-digital appletID
  3. Fetch more than 300,000 published applets
  4. From each applet, get : (applet name, description, trigger, trigger service, action name, action service, add count)
  • Para 2
  1. How the do the data collection
  2. Simple introduction of the dataset
  3. Table 2 : The Comparison between their dataset with Paper[28]'s dataset

3.2.3.2 Data Characterization

  • Para 1
  1. First, IFTTT is growing steadily
  2. Next, characterize a particular snap shot collected on 3/25/2017
  3. Service Semantics
    • 13 categories of service (Table 1)
    • 1-4 are IoT devices
    • 5-13 are non-Iot device
    • Overall, We find that ** services provided by IFTTT are extraordinarily rich.**
  4. IoT Usage
    • Table 3 : List top IoT-related services and triggers and actions
    • Fig 2 : A heat map illustrating the interaction among different service categories.
    • The features of IoT service and **non-IoT services **
  5. ** Applet Properties**
    • Fig 3 : quantifes the overall applet usage by ranking the applets (X-Axis) by their add count (Y-Axis)
    • It exhibits a heavy-tail distribution: the top 1% (10%) of applets contribute 84.1% (97.6%) of the overall add count.
    • More interestingly and commonly, IFTTT helps bridge IoT devices with non-IoT services in the cloud
    • Although triggers and actions can only be provided by services, most applets (98%) are home-made by users.

3.2.4 Applet Execution Performance

3.2.4.1 Trigger-to-Action(T2A) Latency

  • Para 1
  1. T2A Latency is key performance metric for applet execution
  2. Table 4 : 7 popular applets and measure their T2A Latency used the testbed
  3. 2 functionalities of Test Controller (Fig 1-9)
  • Para 2
  1. Fig 4 : shows the T2A latency for the seven applets using the offcial IFTTT partner services
  2. Network never becomes the performance bottleneck.
  • Para 3
  1. To find high and variable Latency reason they do 3 scenarios test(E1,E2,E3)
  2. They use their implement service to replace IFTTT's service
  • Para 4
  1. Fig 5 : plots the T2A latency for A2 under scenarios E1/E2 and E3 (for each scenario we run 20 tests)
  2. The results clearly indicate that the performance bottleneck is the IFTTT engine itself
  3. Table 5 : exemplifes the breakdown of the T2A latency for a typical execution of applet A2 under the scenario E2
  • Para 4
  1. Introduction of the IFTTT's real-time APIs
  2. But it no use for their service, and show the reasons
  • Para 5
  1. Discussion about the Alexa which all used by A5 to A7

3.2.4.2 Squential Execution of Applets

  • Para 1
  1. The performance when a trigger is activated multiple times sequentially (every 5 seconds in our experiment)
  2. Fig 6 : top, show the clustered pattern of IFTTT and given the reason(Batched process of ITFFF polling)
  3. Fig 6 : bottom, shows one extreme case (possibly when IFTTT experiences high workload) where the polling delay between two clusters inflate to 14 minutes

3.2.4.3 Concurrent Execution of Applets

  • Para 1
  1. ** if A then B and C**
  2. Fig 7 : plots the CDF for T2A latency difference between “turn on Hue light when email arrives” and “activate WeMo switch when email arrives”
  3. As shown, the T2A latency difference ranges from -60 to 140 seconds(2 Reasons)
  4. Conclusion: The results indicate that in reality, IFTTT cannot guarantee the simultaneous execution of two applets with the same trigger.

3.2.4.4 Infinite Loop

  • Para 1
  1. **2 Reasons ** may cause Infinite Loop, and it's harmful
  2. IFTTT can not find the potential infinite loop
  3. Some runtime detection techniques are needed.

3.2.5 Related Work

3.2.5.1 IFTTT Characterization

  • Para 1
  1. Several related works: 27,28,25,19
  2. 3 contributions advanced with those related works

3.2.5.2 IFTTT-like Platforms

  • Para 1
  1. Several exist commerical platforms like IFTTT( 2,14,11,15,10,13)
  2. All less popular than IFTTT

3.2.5.3 Trigger-action Programming(TAP)

  • Para 1
  1. Samrt Home : 17,21,26,29,30
  2. Smart Buildings : 22
  3. general IoT/context -aware systems : 16.18.20,23

3.2.6 Discussions And Conclusions

3.2.6.1 Performance Improvements

  • Para 1
  1. How to reduce T2A Latency
  2. One reason why IFTTT reduce latency is Workload

3.2.6.2 Distributed Applet Execution

  • Para 1
  1. IFTTT need to have a **Hybrid(Centralized + Distributed) Applet exeution shceme
  2. But it has many Challenges

3.2.6.3 Permission Management

  • Para 1
  1. coarse-grained permission control at service level
  2. We need better permission management schemes that balance the tradeoff between usability and security.

3.2.6.4 Limitations

  • Para 1
  1. We acknowledge that observing the IoT ecosystem from the perspective of IFTTT is interesting but still limited as IFTTT may not cover all available IoT devices and their owners.
  2. To conclude, in this study, we observe the fast growth of the IFTTT ecosystem and its increasing usage for automating IoTrelated tasks, which correspond to 52% of services and 16% of the applet usage.
  3. We observe several performance inefciencies and identify their causes.
  4. We plan to study future IFTTT features such as queries and conditions [25].
©著作权归作者所有,转载或内容合作请联系作者
  • 序言:七十年代末,一起剥皮案震惊了整个滨河市,随后出现的几起案子,更是在滨河造成了极大的恐慌,老刑警刘岩,带你破解...
    沈念sama阅读 198,932评论 5 466
  • 序言:滨河连续发生了三起死亡事件,死亡现场离奇诡异,居然都是意外死亡,警方通过查阅死者的电脑和手机,发现死者居然都...
    沈念sama阅读 83,554评论 2 375
  • 文/潘晓璐 我一进店门,熙熙楼的掌柜王于贵愁眉苦脸地迎上来,“玉大人,你说我怎么就摊上这事。” “怎么了?”我有些...
    开封第一讲书人阅读 145,894评论 0 328
  • 文/不坏的土叔 我叫张陵,是天一观的道长。 经常有香客问我,道长,这世上最难降的妖魔是什么? 我笑而不...
    开封第一讲书人阅读 53,442评论 1 268
  • 正文 为了忘掉前任,我火速办了婚礼,结果婚礼上,老公的妹妹穿的比我还像新娘。我一直安慰自己,他们只是感情好,可当我...
    茶点故事阅读 62,347评论 5 359
  • 文/花漫 我一把揭开白布。 她就那样静静地躺着,像睡着了一般。 火红的嫁衣衬着肌肤如雪。 梳的纹丝不乱的头发上,一...
    开封第一讲书人阅读 47,899评论 1 275
  • 那天,我揣着相机与录音,去河边找鬼。 笑死,一个胖子当着我的面吹牛,可吹牛的内容都是我干的。 我是一名探鬼主播,决...
    沈念sama阅读 37,325评论 3 390
  • 文/苍兰香墨 我猛地睁开眼,长吁一口气:“原来是场噩梦啊……” “哼!你这毒妇竟也来了?” 一声冷哼从身侧响起,我...
    开封第一讲书人阅读 35,980评论 0 254
  • 序言:老挝万荣一对情侣失踪,失踪者是张志新(化名)和其女友刘颖,没想到半个月后,有当地人在树林里发现了一具尸体,经...
    沈念sama阅读 40,196评论 1 294
  • 正文 独居荒郊野岭守林人离奇死亡,尸身上长有42处带血的脓包…… 初始之章·张勋 以下内容为张勋视角 年9月15日...
    茶点故事阅读 35,163评论 2 317
  • 正文 我和宋清朗相恋三年,在试婚纱的时候发现自己被绿了。 大学时的朋友给我发了我未婚夫和他白月光在一起吃饭的照片。...
    茶点故事阅读 37,085评论 1 328
  • 序言:一个原本活蹦乱跳的男人离奇死亡,死状恐怖,灵堂内的尸体忽然破棺而出,到底是诈尸还是另有隐情,我是刑警宁泽,带...
    沈念sama阅读 32,826评论 3 316
  • 正文 年R本政府宣布,位于F岛的核电站,受9级特大地震影响,放射性物质发生泄漏。R本人自食恶果不足惜,却给世界环境...
    茶点故事阅读 38,389评论 3 302
  • 文/蒙蒙 一、第九天 我趴在偏房一处隐蔽的房顶上张望。 院中可真热闹,春花似锦、人声如沸。这庄子的主人今日做“春日...
    开封第一讲书人阅读 29,501评论 0 19
  • 文/苍兰香墨 我抬头看了看天上的太阳。三九已至,却和暖如春,着一层夹袄步出监牢的瞬间,已是汗流浃背。 一阵脚步声响...
    开封第一讲书人阅读 30,753评论 1 255
  • 我被黑心中介骗来泰国打工, 没想到刚下飞机就差点儿被人妖公主榨干…… 1. 我叫王不留,地道东北人。 一个月前我还...
    沈念sama阅读 42,171评论 2 344
  • 正文 我出身青楼,却偏偏与公主长得像,于是被迫代替她去往敌国和亲。 传闻我的和亲对象是个残疾皇子,可洞房花烛夜当晚...
    茶点故事阅读 41,616评论 2 339

推荐阅读更多精彩内容