首页 > 最新文献

2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)最新文献

英文 中文
File-system-level flash caching for improving application launch time on logical hybrid disks 用于改进逻辑混合磁盘上应用程序启动时间的文件系统级闪存缓存
Chang-Hycok Han, Junhee Ryu, Dongeun Lee, Jaemyoun Lee, Kyungtae Kang, Heonshik Shin
Application launch time is an important performance metric to user experience in desktop environment. The launch time mostly depends on the performance of secondary storage. There is a cost-performance trade-off in using hard disk drive (HDD) or solid-state drive (SSD). Thus, application launch times can be reduced by utilizing SSDs as caches for slow HDDs. We propose a new SSD caching scheme which migrates data blocks from HDDs to SSDs. Since our scheme operates entirely in the file system level and does not require an extra layer for mapping SSD-cached data, which is essential in most other schemes, our scheme does not incur mapping overheads that cause significant burdens on main memory, CPU, and SSD cache itself. Experimental results demonstrate our scheme yields 56% of performance gain in application launch.
在桌面环境中,应用程序启动时间是衡量用户体验的重要性能指标。启动时间主要取决于辅助存储器的性能。在使用硬盘驱动器(HDD)或固态驱动器(SSD)之间存在成本-性能权衡。因此,通过利用ssd作为慢速hdd的缓存,可以减少应用程序启动时间。我们提出了一种新的SSD缓存方案,将数据块从hdd迁移到SSD。由于我们的方案完全在文件系统级别操作,并且不需要额外的层来映射SSD缓存的数据,这在大多数其他方案中是必不可少的,因此我们的方案不会产生映射开销,从而对主内存、CPU和SSD缓存本身造成重大负担。实验结果表明,该方案在应用启动时的性能提高了56%。
{"title":"File-system-level flash caching for improving application launch time on logical hybrid disks","authors":"Chang-Hycok Han, Junhee Ryu, Dongeun Lee, Jaemyoun Lee, Kyungtae Kang, Heonshik Shin","doi":"10.1109/PCCC.2014.7017019","DOIUrl":"https://doi.org/10.1109/PCCC.2014.7017019","url":null,"abstract":"Application launch time is an important performance metric to user experience in desktop environment. The launch time mostly depends on the performance of secondary storage. There is a cost-performance trade-off in using hard disk drive (HDD) or solid-state drive (SSD). Thus, application launch times can be reduced by utilizing SSDs as caches for slow HDDs. We propose a new SSD caching scheme which migrates data blocks from HDDs to SSDs. Since our scheme operates entirely in the file system level and does not require an extra layer for mapping SSD-cached data, which is essential in most other schemes, our scheme does not incur mapping overheads that cause significant burdens on main memory, CPU, and SSD cache itself. Experimental results demonstrate our scheme yields 56% of performance gain in application launch.","PeriodicalId":105442,"journal":{"name":"2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131133593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A hybrid link protection scheme for link-state routing networks 一种用于链路状态路由网络的混合链路保护方案
Haijun Geng, Xingang Shi, Xia Yin, Zhiliang Wang, Han Zhang, Jiangyuan Yao
The Internet is playing an increasingly crucial role in both personal and business activities. Handling link failures is an important task in designing routing protocols. To enhance the network availability without incurring significant extra overhead, we propose a novel link protection algorithm, Hybrid Link Protection Scheme (HLP) to achieve failure resilient routing.
互联网在个人和商业活动中发挥着越来越重要的作用。链路故障处理是路由协议设计中的一项重要任务。为了在不增加额外开销的情况下提高网络的可用性,我们提出了一种新的链路保护算法——混合链路保护方案(Hybrid link protection Scheme, HLP)来实现故障弹性路由。
{"title":"A hybrid link protection scheme for link-state routing networks","authors":"Haijun Geng, Xingang Shi, Xia Yin, Zhiliang Wang, Han Zhang, Jiangyuan Yao","doi":"10.1109/PCCC.2014.7017037","DOIUrl":"https://doi.org/10.1109/PCCC.2014.7017037","url":null,"abstract":"The Internet is playing an increasingly crucial role in both personal and business activities. Handling link failures is an important task in designing routing protocols. To enhance the network availability without incurring significant extra overhead, we propose a novel link protection algorithm, Hybrid Link Protection Scheme (HLP) to achieve failure resilient routing.","PeriodicalId":105442,"journal":{"name":"2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)","volume":"178 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133905687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A portable flood detection system using heterogeneous sensor networks 基于异构传感器网络的便携式洪水检测系统
Yanwei Wu, Yun Wang
The area of the state of Oregon has 98,381 square miles, which is the 9th largest in United States. Its population ranks 27th in United States, and most of its population residents in the Willamette valley, a narrow area north to Portland and south to eugene and home to eight of ten most populous cities in Oregon. This implies that most of Oregon are rural areas. It is necessary to design and deploy a portable intelligent system to monitor the danger and protect drivers' safety. In this paper, we will introduce the design of our portable intelligent flooding monitor system. We deploy sensors to roadside and/or vehicles. The flood alert will be sent to central control office or vehicles accessing the network.
俄勒冈州面积98,381平方英里,是美国第九大州。它的人口在美国排名第27位,大部分人口居住在威拉米特山谷,这是一个狭窄的地区,北至波特兰,南至尤金,俄勒冈州人口最多的十个城市中有八个在这里。这意味着俄勒冈州大部分地区都是农村地区。有必要设计和部署便携式智能系统来监测危险,保护驾驶员的安全。本文将介绍我们的便携式智能洪水监测系统的设计。我们在路边和/或车辆上部署传感器。洪水警报将发送到中央控制办公室或接入网络的车辆。
{"title":"A portable flood detection system using heterogeneous sensor networks","authors":"Yanwei Wu, Yun Wang","doi":"10.1109/PCCC.2014.7017026","DOIUrl":"https://doi.org/10.1109/PCCC.2014.7017026","url":null,"abstract":"The area of the state of Oregon has 98,381 square miles, which is the 9th largest in United States. Its population ranks 27th in United States, and most of its population residents in the Willamette valley, a narrow area north to Portland and south to eugene and home to eight of ten most populous cities in Oregon. This implies that most of Oregon are rural areas. It is necessary to design and deploy a portable intelligent system to monitor the danger and protect drivers' safety. In this paper, we will introduce the design of our portable intelligent flooding monitor system. We deploy sensors to roadside and/or vehicles. The flood alert will be sent to central control office or vehicles accessing the network.","PeriodicalId":105442,"journal":{"name":"2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115477220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Smoothly truncated levy walks: Toward a realistic mobility model 平滑截断征费行走:走向现实的移动模型
Lijuan Cao, M. Grabchak
Mobility models are crucial for the simulation and evaluation of protocols for multihop wireless networks. However, most commonly used mobility models do not reflect the way humans actually move. This significantly affects the reliability of simulation results. In this paper we introduce a new mobility model called the Smoothly Truncated Levy Walk (STLW), which is more realistic than most standard models that appear in the literature. Its main innovations are as follows. First, to take into account dependencies in the direction of motion, it models changes in the direction instead of the standard approach, which directly models the direction and ignores these dependencies. Second, it uses realistic models for pause times, flight lengths, and changes in direction. In particular, it uses tempered stable distributions to model pause times and flight lengths and the beta distribution to model changes in direction. We justify the use of these distributions from both a theoretical and an empirical perspective. In particular, we perform a trace-based validation on several real-world traces from various scenarios. Validation results show that this model is very flexible and can be used to model human movements in a variety of situations.
移动性模型对于多跳无线网络协议的仿真和评估至关重要。然而,大多数常用的移动模型并不能反映人类实际移动的方式。这极大地影响了仿真结果的可靠性。在本文中,我们引入了一个新的移动模型,称为平滑截断利维步行(STLW),它比文献中出现的大多数标准模型更现实。其主要创新点如下:首先,考虑到运动方向上的依赖关系,它对方向上的变化进行建模,而不是直接对方向建模而忽略这些依赖关系的标准方法。其次,它使用真实的暂停时间、飞行长度和方向变化模型。特别是,它使用缓和稳定分布来模拟暂停时间和飞行长度,使用beta分布来模拟方向变化。我们从理论和经验的角度证明了这些分布的使用。特别是,我们对来自不同场景的几个真实跟踪执行基于跟踪的验证。验证结果表明,该模型非常灵活,可用于模拟各种情况下的人体运动。
{"title":"Smoothly truncated levy walks: Toward a realistic mobility model","authors":"Lijuan Cao, M. Grabchak","doi":"10.1109/PCCC.2014.7017071","DOIUrl":"https://doi.org/10.1109/PCCC.2014.7017071","url":null,"abstract":"Mobility models are crucial for the simulation and evaluation of protocols for multihop wireless networks. However, most commonly used mobility models do not reflect the way humans actually move. This significantly affects the reliability of simulation results. In this paper we introduce a new mobility model called the Smoothly Truncated Levy Walk (STLW), which is more realistic than most standard models that appear in the literature. Its main innovations are as follows. First, to take into account dependencies in the direction of motion, it models changes in the direction instead of the standard approach, which directly models the direction and ignores these dependencies. Second, it uses realistic models for pause times, flight lengths, and changes in direction. In particular, it uses tempered stable distributions to model pause times and flight lengths and the beta distribution to model changes in direction. We justify the use of these distributions from both a theoretical and an empirical perspective. In particular, we perform a trace-based validation on several real-world traces from various scenarios. Validation results show that this model is very flexible and can be used to model human movements in a variety of situations.","PeriodicalId":105442,"journal":{"name":"2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122559903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Provenance logic: Enabling multi-event based trust in mobile sensing 来源逻辑:在移动传感中启用基于多事件的信任
Xinlei Wang, Hao Fu, Chao Xu, P. Mohapatra
With the proliferation of sensor-embedded mobile computing devices, mobile sensing is becoming a popular paradigm to collect information from participating mobile users. Unlike the well-calibrated and well-tested sensor networks, mobile sensing relies on participants with unknown reliability. Data collected from mobile users may be untrustworthy. There are various solutions proposed in the literature for assessing the trustworthiness of the sensing data that describe an individual event or observation. In addition to single-event based trust models, we propose the concept of Provenance Logic, to reason about the logical relations between multiple events by jointly recognizing and linking events from successive sensing observations. We propose an approach that combines logical reasoning and statistical learning techniques. To the best of our knowledge, our work is the first attempt for trust evaluation based on the logical relation among multiple events in the mobile sensing context. We motivate and illustrate our approach with a use case of traffic monitoring mobile sensing. Performance validation has shown that improved trust assessment can be achieved efficiently and effectively on top of single-event based analysis.
随着嵌入式传感器移动计算设备的普及,移动传感正在成为一种从参与移动用户收集信息的流行范式。与经过良好校准和测试的传感器网络不同,移动传感依赖于可靠性未知的参与者。从移动用户收集的数据可能不可信。文献中提出了各种解决方案,用于评估描述单个事件或观察的传感数据的可信度。除了基于单事件的信任模型外,我们还提出了出处逻辑的概念,通过联合识别和连接来自连续感知观测的事件来推断多个事件之间的逻辑关系。我们提出了一种结合逻辑推理和统计学习技术的方法。据我们所知,我们的工作是第一次尝试基于移动感知环境中多个事件之间的逻辑关系进行信任评估。我们用交通监测移动传感的一个用例来激励和说明我们的方法。性能验证表明,改进的信任评估可以在单事件分析的基础上高效实现。
{"title":"Provenance logic: Enabling multi-event based trust in mobile sensing","authors":"Xinlei Wang, Hao Fu, Chao Xu, P. Mohapatra","doi":"10.1109/PCCC.2014.7017107","DOIUrl":"https://doi.org/10.1109/PCCC.2014.7017107","url":null,"abstract":"With the proliferation of sensor-embedded mobile computing devices, mobile sensing is becoming a popular paradigm to collect information from participating mobile users. Unlike the well-calibrated and well-tested sensor networks, mobile sensing relies on participants with unknown reliability. Data collected from mobile users may be untrustworthy. There are various solutions proposed in the literature for assessing the trustworthiness of the sensing data that describe an individual event or observation. In addition to single-event based trust models, we propose the concept of Provenance Logic, to reason about the logical relations between multiple events by jointly recognizing and linking events from successive sensing observations. We propose an approach that combines logical reasoning and statistical learning techniques. To the best of our knowledge, our work is the first attempt for trust evaluation based on the logical relation among multiple events in the mobile sensing context. We motivate and illustrate our approach with a use case of traffic monitoring mobile sensing. Performance validation has shown that improved trust assessment can be achieved efficiently and effectively on top of single-event based analysis.","PeriodicalId":105442,"journal":{"name":"2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122083579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Achieving bandwidth guarantees in multi-tenant cloud networks using a dual-hose model 使用双软管模型在多租户云网络中实现带宽保证
Meng Shen, Lixin Gao, Ke Xu, Liehuang Zhu
In public cloud networks, applications of different tenants compete for the shared network bandwidth and thus might suffer from unpredictable performance. It is desirable for cloud providers to offer tenants with bandwidth guarantees. However, it is challenging to precisely abstract tenant bandwidth requirements for their intra- and inter-tenant communications and to achieve work conservation simultaneously. In this paper, we first propose a dual-hose model, a novel tenant requirement abstraction that decouples bandwidth guarantees for a tenant's inter-tenant communications from those for its intra-tenant communications. We then develop a new VM placement algorithm to optimize operational goals of cloud providers, while providing tenants with minimum bandwidth guarantees captured by the dual-hose model. Finally, we design a dynamic bandwidth allocation strategy to achieve work conservation. Through extensive simulation results, we show that our solution provides bandwidth guarantees for tenant requests while improving the overall request throughput by 5.3%.
在公共云网络中,不同租户的应用程序争夺共享的网络带宽,因此可能会受到不可预测的性能影响。云提供商希望为租户提供带宽保证。然而,精确地抽象租户内部和租户间通信的带宽需求并同时实现工作节约是一项挑战。在本文中,我们首先提出了一个双软管模型,这是一种新颖的租户需求抽象,它将租户间通信的带宽保证与租户内通信的带宽保证分离开来。然后,我们开发了一种新的VM放置算法,以优化云提供商的操作目标,同时为租户提供双软管模型捕获的最小带宽保证。最后,设计了一种动态带宽分配策略,实现了功节约。通过广泛的模拟结果,我们表明我们的解决方案为租户请求提供带宽保证,同时将总体请求吞吐量提高5.3%。
{"title":"Achieving bandwidth guarantees in multi-tenant cloud networks using a dual-hose model","authors":"Meng Shen, Lixin Gao, Ke Xu, Liehuang Zhu","doi":"10.1109/PCCC.2014.7017102","DOIUrl":"https://doi.org/10.1109/PCCC.2014.7017102","url":null,"abstract":"In public cloud networks, applications of different tenants compete for the shared network bandwidth and thus might suffer from unpredictable performance. It is desirable for cloud providers to offer tenants with bandwidth guarantees. However, it is challenging to precisely abstract tenant bandwidth requirements for their intra- and inter-tenant communications and to achieve work conservation simultaneously. In this paper, we first propose a dual-hose model, a novel tenant requirement abstraction that decouples bandwidth guarantees for a tenant's inter-tenant communications from those for its intra-tenant communications. We then develop a new VM placement algorithm to optimize operational goals of cloud providers, while providing tenants with minimum bandwidth guarantees captured by the dual-hose model. Finally, we design a dynamic bandwidth allocation strategy to achieve work conservation. Through extensive simulation results, we show that our solution provides bandwidth guarantees for tenant requests while improving the overall request throughput by 5.3%.","PeriodicalId":105442,"journal":{"name":"2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123273169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Pricing and revenue sharing mechanism for secondary redistribution of data service for mobile devices 移动设备数据服务二次再分配的定价与收益分享机制
Hengky Susanto, Bhanu Kaushik, Benyuan Liu, Byung-Guk Kim
Cellular Network Providers (CNP) provide users with wireless data access to meet the growing ubiquitous demand for the Internet. As users subscribe to a fixed data plan for a monthly flat fee, some users may exhaust their data allowance before the end of the billing cycle, while others underutilize their monthly quota. To take advantage of such underutilization, Khausik et. al. propose a mechanism for ad hoc bandwidth redistribution that allows subscribers to sell their unused bandwidth to users needing Internet access in exchange for some financial compensation as and when opportunities arise. There exists a popular belief that allowing such on-demand ad hoc service is not beneficial to CNP. This paper seeks to address and counter this opinion by proposing a pricing scheme and a revenue sharing mechanism that makes the provision of ad hoc connection advantageous to CNP. Our revenue sharing mechanism provides economic incentives to CNP. The simulation results show that our revenue sharing model ensures that CNP receives the majority portion of the revenue gained, regardless of the amount. Secondly, our pricing model ensures traffic from ad hoc users has minimal impact on the connection quality of current subscribers. In this model, we use Shapley value as the basis for deriving the revenue sharing.
蜂窝网络提供商(CNP)为用户提供无线数据访问,以满足日益增长的无处不在的互联网需求。由于用户订阅了每月固定费用的固定数据计划,一些用户可能会在计费周期结束前耗尽其数据津贴,而另一些用户则未充分利用其每月配额。为了利用这种未充分利用的情况,Khausik等人提出了一种临时带宽再分配机制,允许用户将未使用的带宽出售给需要互联网接入的用户,以换取一些经济补偿。有一种流行的观点认为,允许这种随需应变的特别服务对CNP不利。本文试图通过提出一种定价方案和一种收入分享机制来解决和反驳这种观点,这种机制使得提供临时连接对CNP有利。我们的收益分享机制为CNP提供了经济激励。仿真结果表明,我们的收益共享模型保证了CNP获得的收益的大部分,而不管收益的多少。其次,我们的定价模型确保来自临时用户的流量对当前用户的连接质量的影响最小。在该模型中,我们使用Shapley值作为推导收益分成的基础。
{"title":"Pricing and revenue sharing mechanism for secondary redistribution of data service for mobile devices","authors":"Hengky Susanto, Bhanu Kaushik, Benyuan Liu, Byung-Guk Kim","doi":"10.1109/PCCC.2014.7017112","DOIUrl":"https://doi.org/10.1109/PCCC.2014.7017112","url":null,"abstract":"Cellular Network Providers (CNP) provide users with wireless data access to meet the growing ubiquitous demand for the Internet. As users subscribe to a fixed data plan for a monthly flat fee, some users may exhaust their data allowance before the end of the billing cycle, while others underutilize their monthly quota. To take advantage of such underutilization, Khausik et. al. propose a mechanism for ad hoc bandwidth redistribution that allows subscribers to sell their unused bandwidth to users needing Internet access in exchange for some financial compensation as and when opportunities arise. There exists a popular belief that allowing such on-demand ad hoc service is not beneficial to CNP. This paper seeks to address and counter this opinion by proposing a pricing scheme and a revenue sharing mechanism that makes the provision of ad hoc connection advantageous to CNP. Our revenue sharing mechanism provides economic incentives to CNP. The simulation results show that our revenue sharing model ensures that CNP receives the majority portion of the revenue gained, regardless of the amount. Secondly, our pricing model ensures traffic from ad hoc users has minimal impact on the connection quality of current subscribers. In this model, we use Shapley value as the basis for deriving the revenue sharing.","PeriodicalId":105442,"journal":{"name":"2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131737890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Load scheduling in smart buildings with bidirectional energy trading 具有双向能源交易的智能建筑负荷调度
Abdullah Al Hasib, N. Nikitin, L. Natvig
The advent of innovative power generation and storage systems introduces new opportunities of cost minimization for the demand response (DR) algorithms in smart grid (SG) technology. Conventional DR algorithms consider unidirectional flow of energy from power grid to the residential building. In this paper, we study an extended model of a smart residential building with hybrid energy system (e.g. connected with traditional electric grid and renewable energy sources) and bidirectional energy trading facility. This model not only allows a user to reduce the energy cost by storing the energy for the future usage, but also permits the user to earn revenue by selling surplus energy to the grid. Furthermore, we discuss an appliance-scheduling algorithm for the extended DR model.
创新发电和存储系统的出现为智能电网(SG)技术中的需求响应(DR)算法带来了成本最小化的新机会。传统的DR算法考虑从电网到住宅建筑的单向能量流。本文研究了具有混合能源系统(例如与传统电网和可再生能源相连接)和双向能源交易设施的智能住宅建筑的扩展模型。这种模式不仅允许用户通过储存能源以备将来使用来降低能源成本,还允许用户通过向电网出售多余的能源来获得收入。此外,我们还讨论了一种适用于扩展DR模型的设备调度算法。
{"title":"Load scheduling in smart buildings with bidirectional energy trading","authors":"Abdullah Al Hasib, N. Nikitin, L. Natvig","doi":"10.1109/PCCC.2014.7017039","DOIUrl":"https://doi.org/10.1109/PCCC.2014.7017039","url":null,"abstract":"The advent of innovative power generation and storage systems introduces new opportunities of cost minimization for the demand response (DR) algorithms in smart grid (SG) technology. Conventional DR algorithms consider unidirectional flow of energy from power grid to the residential building. In this paper, we study an extended model of a smart residential building with hybrid energy system (e.g. connected with traditional electric grid and renewable energy sources) and bidirectional energy trading facility. This model not only allows a user to reduce the energy cost by storing the energy for the future usage, but also permits the user to earn revenue by selling surplus energy to the grid. Furthermore, we discuss an appliance-scheduling algorithm for the extended DR model.","PeriodicalId":105442,"journal":{"name":"2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127518578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Continuous user identification via touch and movement behavioral biometrics 通过触摸和运动行为生物识别技术进行持续的用户识别
Cheng Bo, Lan Zhang, Taeho Jung, Junze Han, Xiangyang Li, Yang Wang
With the increased popularity of smartphones, various security threats and privacy leakages targeting them are discovered and investigated. In this work, we present SilentSense, a framework to authenticate users silently and transparently by exploiting dynamics mined from the user touch behavior biometrics and the micro-movement of the device caused by user's screen-touch actions. We build a “touch-based biometrics” model of the owner by extracting some principle features, and then verify whether the current user is the owner or guest/attacker. When using the smartphone, some unique operating dynamics of the user is detected and learnt by collecting the sensor data and touch events silently. When users are mobile, the micro-movement of mobile devices caused by touch is suppressed by that due to the large scale user-movement which will render the touch-based biometrics ineffective. To address this, we integrate a movement-based biometrics for each user with previous touch-based biometrics. We conduct extensive evaluations of our approaches on the Android smartphone, we show that the user identification accuracy is over 99%.
随着智能手机的日益普及,各种针对智能手机的安全威胁和隐私泄露被发现和调查。在这项工作中,我们提出了SilentSense,这是一个框架,通过利用从用户触摸行为生物识别中挖掘的动态和由用户的屏幕触摸动作引起的设备的微运动来静默和透明地验证用户。我们通过提取一些基本特征,建立了主人的“基于触摸的生物识别”模型,然后验证当前用户是主人还是客人/攻击者。当使用智能手机时,通过无声地收集传感器数据和触摸事件来检测和学习用户的一些独特操作动态。当用户处于移动状态时,由触摸引起的移动设备的微运动被用户大规模移动引起的微运动所抑制,使得基于触摸的生物识别技术失效。为了解决这个问题,我们为每个用户集成了基于运动的生物识别技术和之前基于触摸的生物识别技术。我们在Android智能手机上对我们的方法进行了广泛的评估,我们表明用户识别准确率超过99%。
{"title":"Continuous user identification via touch and movement behavioral biometrics","authors":"Cheng Bo, Lan Zhang, Taeho Jung, Junze Han, Xiangyang Li, Yang Wang","doi":"10.1109/PCCC.2014.7017067","DOIUrl":"https://doi.org/10.1109/PCCC.2014.7017067","url":null,"abstract":"With the increased popularity of smartphones, various security threats and privacy leakages targeting them are discovered and investigated. In this work, we present SilentSense, a framework to authenticate users silently and transparently by exploiting dynamics mined from the user touch behavior biometrics and the micro-movement of the device caused by user's screen-touch actions. We build a “touch-based biometrics” model of the owner by extracting some principle features, and then verify whether the current user is the owner or guest/attacker. When using the smartphone, some unique operating dynamics of the user is detected and learnt by collecting the sensor data and touch events silently. When users are mobile, the micro-movement of mobile devices caused by touch is suppressed by that due to the large scale user-movement which will render the touch-based biometrics ineffective. To address this, we integrate a movement-based biometrics for each user with previous touch-based biometrics. We conduct extensive evaluations of our approaches on the Android smartphone, we show that the user identification accuracy is over 99%.","PeriodicalId":105442,"journal":{"name":"2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)","volume":"92 16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128853513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Network agile preference-based prefetching for mobile devices 基于网络敏捷偏好的移动设备预取
Junze Han, Xiangyang Li, Taeho Jung, Junmin Zhao, Z. Zhao
For mobile devices, communication via cellular networks consumes more energy than via WiFi networks, and suffers an expensive limited data plan. On the other hand, as the coverage and the density of WiFI networks are smaller than those of the cellular networks, users cannot purely rely on WiFi to access the Internet. In this work we present a behavior-aware and preference-based approach to prefetch news webpages for the user to visit in the near future, by exploiting the WiFi network connections to reduce the energy and monetary cost. We first design an efficient preference learning algorithm to keep track of the user's changing interests, and then by predicting the appearance and durations of the WiFi network connections, our prefetch approach optimizes when to prefetch to maximize the user experience while lowing the prefetch cost. Our prefetch approach also exploits the idle period of WiFi connections to reduce the tail-energy consumption. We implement our approach in iPhone and our extensive evaluations show that our system achieves about 60% hit ratio, saves about 50% cellular data usage, and reduces the energy cost by 7%.
对于移动设备来说,通过蜂窝网络进行通信比通过WiFi网络消耗更多的能量,并且受到昂贵的有限数据计划的影响。另一方面,由于WiFI网络的覆盖范围和密度都小于蜂窝网络,用户不能单纯依靠WiFI上网。在这项工作中,我们提出了一种基于行为感知和偏好的方法,通过利用WiFi网络连接来减少能源和金钱成本,为用户在不久的将来访问预取新闻网页。我们首先设计了一种高效的偏好学习算法来跟踪用户兴趣的变化,然后通过预测WiFi网络连接的外观和持续时间来优化何时进行预取,从而在降低预取成本的同时最大化用户体验。我们的预取方法还利用了WiFi连接的空闲时间来减少尾部能耗。我们在iPhone上实现了我们的方法,我们的广泛评估表明,我们的系统达到了约60%的命中率,节省了约50%的蜂窝数据使用量,并降低了7%的能源成本。
{"title":"Network agile preference-based prefetching for mobile devices","authors":"Junze Han, Xiangyang Li, Taeho Jung, Junmin Zhao, Z. Zhao","doi":"10.1109/PCCC.2014.7017072","DOIUrl":"https://doi.org/10.1109/PCCC.2014.7017072","url":null,"abstract":"For mobile devices, communication via cellular networks consumes more energy than via WiFi networks, and suffers an expensive limited data plan. On the other hand, as the coverage and the density of WiFI networks are smaller than those of the cellular networks, users cannot purely rely on WiFi to access the Internet. In this work we present a behavior-aware and preference-based approach to prefetch news webpages for the user to visit in the near future, by exploiting the WiFi network connections to reduce the energy and monetary cost. We first design an efficient preference learning algorithm to keep track of the user's changing interests, and then by predicting the appearance and durations of the WiFi network connections, our prefetch approach optimizes when to prefetch to maximize the user experience while lowing the prefetch cost. Our prefetch approach also exploits the idle period of WiFi connections to reduce the tail-energy consumption. We implement our approach in iPhone and our extensive evaluations show that our system achieves about 60% hit ratio, saves about 50% cellular data usage, and reduces the energy cost by 7%.","PeriodicalId":105442,"journal":{"name":"2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)","volume":"75 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133140299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1