首页 > 最新文献

2016 IEEE Symposium on Computers and Communication (ISCC)最新文献

英文 中文
Resource allocation using Nucleolus Value in downlink LTE networks 基于核仁值的LTE下行网络资源分配
Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543748
Samia Dardouri, R. Bouallègue, A. Wei
The QoS (Quality of Service) requirements of real time (RT) applications are within the most important challenges that LTE (Long Term Evolution) must provide. However, due to the limited radio resources, it is important to take advantage of these resources efficiently. User traffic can be classified into two main classes which are RT (Real Time) and NRT traffic. To respond to RTs QoS requirements, resource allocation steps must be as optimal as possible. This paper proposes a scheduling algorithm in two levels based on cooperative game theory, aiming at improving performance and justice in the distribution of radio resources. Simulations demonstrate that the proposed algorithm improve the level of the system's QoS more effectively than other algorithms under the circumstance that guarantees users minimum QoS requirement.
实时(RT)应用程序的QoS(服务质量)需求是LTE(长期演进)必须提供的最重要的挑战。然而,由于无线电资源有限,有效地利用这些资源是很重要的。用户流量可以分为实时流量(RT)和非实时流量(NRT)两大类。为了响应RTs的QoS需求,资源分配步骤必须尽可能优化。本文提出了一种基于合作博弈论的两级调度算法,旨在提高无线电资源分配的性能和公平性。仿真结果表明,在保证用户最低QoS需求的情况下,该算法比其他算法更有效地提高了系统的QoS水平。
{"title":"Resource allocation using Nucleolus Value in downlink LTE networks","authors":"Samia Dardouri, R. Bouallègue, A. Wei","doi":"10.1109/ISCC.2016.7543748","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543748","url":null,"abstract":"The QoS (Quality of Service) requirements of real time (RT) applications are within the most important challenges that LTE (Long Term Evolution) must provide. However, due to the limited radio resources, it is important to take advantage of these resources efficiently. User traffic can be classified into two main classes which are RT (Real Time) and NRT traffic. To respond to RTs QoS requirements, resource allocation steps must be as optimal as possible. This paper proposes a scheduling algorithm in two levels based on cooperative game theory, aiming at improving performance and justice in the distribution of radio resources. Simulations demonstrate that the proposed algorithm improve the level of the system's QoS more effectively than other algorithms under the circumstance that guarantees users minimum QoS requirement.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130772539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
TSentiment: On gamifying Twitter sentiment analysis 情感:关于游戏化Twitter情感分析
Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543720
M. Furini, M. Montangero
Social media platforms contain interesting information that can be used to directly measure people' feelings and, thanks to the use of communication technologies, also to geographically locate these feelings. Unfortunately, the understanding is not as easy as one may think. Indeed, the large volume of data makes the manual approach impractical and the diversity of language combined with the brevity of the texts makes the automatic approach quite complicated. In this paper, we consider the gamification approach to sentimentally classify tweets and we propose TSentiment, a game with a purpose that uses human beings to classify the polarity of tweets (e.g., positive, negative, neutral) and their sentiment (e.g., joy, surprise, sadness, etc.). We created a dataset of more than 65,000 tweets, we developed a Web-based game and we asked students to play the game. Obtained results showed that the game approach was well accepted and thus it can be useful in scenarios where the identification of people' feelings may bring benefits to decision making processes.
社交媒体平台包含有趣的信息,可以用来直接衡量人们的感受,并且由于通信技术的使用,也可以定位这些感受的地理位置。不幸的是,理解并不像人们想象的那么容易。事实上,大量的数据使人工方法变得不切实际,语言的多样性加上文本的简洁使自动方法变得相当复杂。在本文中,我们考虑了游戏化方法来对tweet进行情感分类,我们提出了sentiment,这是一种游戏,其目的是使用人类对tweet的极性(例如,积极,消极,中性)及其情感(例如,喜悦,惊喜,悲伤等)进行分类。我们创建了一个超过65000条推文的数据集,我们开发了一个基于网络的游戏,我们让学生们玩这个游戏。获得的结果表明,游戏方法被广泛接受,因此在识别人们的感受可能会给决策过程带来好处的情况下,它是有用的。
{"title":"TSentiment: On gamifying Twitter sentiment analysis","authors":"M. Furini, M. Montangero","doi":"10.1109/ISCC.2016.7543720","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543720","url":null,"abstract":"Social media platforms contain interesting information that can be used to directly measure people' feelings and, thanks to the use of communication technologies, also to geographically locate these feelings. Unfortunately, the understanding is not as easy as one may think. Indeed, the large volume of data makes the manual approach impractical and the diversity of language combined with the brevity of the texts makes the automatic approach quite complicated. In this paper, we consider the gamification approach to sentimentally classify tweets and we propose TSentiment, a game with a purpose that uses human beings to classify the polarity of tweets (e.g., positive, negative, neutral) and their sentiment (e.g., joy, surprise, sadness, etc.). We created a dataset of more than 65,000 tweets, we developed a Web-based game and we asked students to play the game. Obtained results showed that the game approach was well accepted and thus it can be useful in scenarios where the identification of people' feelings may bring benefits to decision making processes.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130911820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
NFRs based web services scoring as web service 基于nfr的web服务评分为web服务
Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543872
Taycir Bouasker, Mahjoub Langar, R. Robbana
Non functional requirements are very interesting specially in case of business relationships. In fact they are idioms of communication between business environment parties: provider and consumer. In particular in web services context, these requirements and non functional characteristics are also seen as a ranking and selection criteria. Thus, many researchers propose tools to measure the quality of service value of web services and define scoring formulas to rank them. However, we strongly deem that a web service has relative scores depending on end-user requirements rather than an absolute score. In this research paper, we propose a mean for the client to specify his non functional constraints. These, as well as quality attributes measurements will present inputs of a newly developed scoring web service. This web service computes the score of a web service in request relatively to the client's non functional specifications. In addition, a two level ranking is provided to help the client make the suitable decision especially in case of equal scores.
非功能性需求非常有趣,特别是在业务关系的情况下。实际上,它们是业务环境各方(提供者和消费者)之间通信的习惯用法。特别是在web服务上下文中,这些需求和非功能特征也被视为排序和选择标准。因此,许多研究人员提出了衡量web服务质量价值的工具,并定义了评分公式来对其进行排名。然而,我们强烈认为web服务具有依赖于最终用户需求的相对分数,而不是绝对分数。在这篇研究论文中,我们为客户提出了一种方法来指定他的非功能约束。这些以及质量属性度量将呈现新开发的评分web服务的输入。此web服务计算请求中web服务相对于客户端非功能规范的分数。此外,还提供了两个等级的排名,以帮助客户做出合适的决定,特别是在分数相等的情况下。
{"title":"NFRs based web services scoring as web service","authors":"Taycir Bouasker, Mahjoub Langar, R. Robbana","doi":"10.1109/ISCC.2016.7543872","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543872","url":null,"abstract":"Non functional requirements are very interesting specially in case of business relationships. In fact they are idioms of communication between business environment parties: provider and consumer. In particular in web services context, these requirements and non functional characteristics are also seen as a ranking and selection criteria. Thus, many researchers propose tools to measure the quality of service value of web services and define scoring formulas to rank them. However, we strongly deem that a web service has relative scores depending on end-user requirements rather than an absolute score. In this research paper, we propose a mean for the client to specify his non functional constraints. These, as well as quality attributes measurements will present inputs of a newly developed scoring web service. This web service computes the score of a web service in request relatively to the client's non functional specifications. In addition, a two level ranking is provided to help the client make the suitable decision especially in case of equal scores.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128341081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Learning-based Autonomic Decision System for bandwidth-aware routing 基于学习的带宽感知路由自主决策系统
Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543714
C. Ferreira, S. Sargento, Arnaldo S. R. Oliveira
Since today's networks use traditional centralized management systems, the management became costly with the growth in the number of network equipments and available services. It became then clear that it was necessary to distribute the central management responsibilities throughout the network equipments.
由于当今的网络采用传统的集中式管理系统,随着网络设备和可用服务数量的增加,管理成本越来越高。很明显,有必要在整个网络设备中分配集中管理责任。
{"title":"Learning-based Autonomic Decision System for bandwidth-aware routing","authors":"C. Ferreira, S. Sargento, Arnaldo S. R. Oliveira","doi":"10.1109/ISCC.2016.7543714","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543714","url":null,"abstract":"Since today's networks use traditional centralized management systems, the management became costly with the growth in the number of network equipments and available services. It became then clear that it was necessary to distribute the central management responsibilities throughout the network equipments.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126869605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Policy-based dynamic service chaining in Network Functions Virtualization 网络功能虚拟化中基于策略的动态服务链
Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543763
E. Scheid, C. C. Machado, R. Santos, A. E. S. Filho, L. Granville
Network Functions Virtualization (NFV) enables the rapid development, flexible management, and the dynamic placement of new, innovative Virtualized Network Functions (VNFs), such as load balancers, firewalls, and Intrusion Detection Systems (IDSes). Furthermore, NFV along with Software-Defined Networking (SDN) allows VNFs and physical middleboxes to be dynamically composed into service chaining graphs. Despite these benefits, service chaining graphs can be further improved through the use of techniques that have not been satisfactorily explored yet, such as Policy-Based Network Management (PBNM). In PBNM, policies can be written and triggered during runtime, thus supporting the dynamic (re)configuration of service graphs with minimal disruption. In this paper, we propose an approach to automatically design NFV service chaining graphs based on policies. These policies rule the forwarding of traffic and the construction of service chaining graphs. In our approach, service chaining graphs are enforced dynamically in the network during runtime. Finally, to assess its feasibility and generality, we create two different scenarios to demonstrate and discuss how our solution can be employed and its expected results.
网络功能虚拟化(Network Functions Virtualization, NFV)为负载均衡、防火墙、入侵检测系统(ids)等新型虚拟网络功能提供了快速开发、灵活管理和动态部署的技术。此外,NFV和软件定义网络(SDN)允许将VNFs和物理中间盒动态地组合成服务链图。尽管有这些好处,但可以通过使用尚未令人满意地探索的技术(如基于策略的网络管理(PBNM))进一步改进服务链图。在PBNM中,可以在运行时编写和触发策略,从而支持服务图的动态(重新)配置,并将中断降到最低。本文提出了一种基于策略的NFV业务链图自动设计方法。这些策略控制流量的转发和业务链图的构造。在我们的方法中,服务链图在运行时在网络中动态执行。最后,为了评估其可行性和通用性,我们创建了两个不同的场景来演示和讨论如何使用我们的解决方案及其预期结果。
{"title":"Policy-based dynamic service chaining in Network Functions Virtualization","authors":"E. Scheid, C. C. Machado, R. Santos, A. E. S. Filho, L. Granville","doi":"10.1109/ISCC.2016.7543763","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543763","url":null,"abstract":"Network Functions Virtualization (NFV) enables the rapid development, flexible management, and the dynamic placement of new, innovative Virtualized Network Functions (VNFs), such as load balancers, firewalls, and Intrusion Detection Systems (IDSes). Furthermore, NFV along with Software-Defined Networking (SDN) allows VNFs and physical middleboxes to be dynamically composed into service chaining graphs. Despite these benefits, service chaining graphs can be further improved through the use of techniques that have not been satisfactorily explored yet, such as Policy-Based Network Management (PBNM). In PBNM, policies can be written and triggered during runtime, thus supporting the dynamic (re)configuration of service graphs with minimal disruption. In this paper, we propose an approach to automatically design NFV service chaining graphs based on policies. These policies rule the forwarding of traffic and the construction of service chaining graphs. In our approach, service chaining graphs are enforced dynamically in the network during runtime. Finally, to assess its feasibility and generality, we create two different scenarios to demonstrate and discuss how our solution can be employed and its expected results.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116915030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Efficient, problem tailored big data processing using framework delegation 使用框架委托进行高效、问题定制的大数据处理
Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543916
Nickolas Davis, Matthew Broomfield, A. Rezgui
The rise of the Internet of Things, social networking, and embedded connectivity has led to an explosion of available data. In order to better analyze this big data, many different tools have been created that can process the data efficiently. However, the increase in the amount of tools available makes it more difficult to determine which one will provide the most efficient solution to a given big data problem. In this paper, we present a delegation system that takes various frameworks and problem parameters as input and computes the best framework to use for a specific big data problem. To evaluate our system, we used two big data processing frameworks, namely, Hadoop MapReduce and AJIRA, with problem size as an input parameter. Preliminary results show that the system is able to select the most optimal big data processing framework for a given problem 90% of the time. Moreover, the proposed delegation system introduces only an additional 1% overhead when compared to the individual framework in terms of execution time.
物联网、社交网络和嵌入式连接的兴起导致了可用数据的爆炸式增长。为了更好地分析这些大数据,已经创建了许多不同的工具来有效地处理这些数据。然而,可用工具数量的增加使得确定哪种工具将为给定的大数据问题提供最有效的解决方案变得更加困难。在本文中,我们提出了一个授权系统,该系统将各种框架和问题参数作为输入,并计算出用于特定大数据问题的最佳框架。为了评估我们的系统,我们使用了两个大数据处理框架,即Hadoop MapReduce和AJIRA,并将问题大小作为输入参数。初步结果表明,该系统能够在90%的时间内为给定问题选择最优的大数据处理框架。此外,就执行时间而言,与单个框架相比,提议的委托系统只引入了1%的额外开销。
{"title":"Efficient, problem tailored big data processing using framework delegation","authors":"Nickolas Davis, Matthew Broomfield, A. Rezgui","doi":"10.1109/ISCC.2016.7543916","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543916","url":null,"abstract":"The rise of the Internet of Things, social networking, and embedded connectivity has led to an explosion of available data. In order to better analyze this big data, many different tools have been created that can process the data efficiently. However, the increase in the amount of tools available makes it more difficult to determine which one will provide the most efficient solution to a given big data problem. In this paper, we present a delegation system that takes various frameworks and problem parameters as input and computes the best framework to use for a specific big data problem. To evaluate our system, we used two big data processing frameworks, namely, Hadoop MapReduce and AJIRA, with problem size as an input parameter. Preliminary results show that the system is able to select the most optimal big data processing framework for a given problem 90% of the time. Moreover, the proposed delegation system introduces only an additional 1% overhead when compared to the individual framework in terms of execution time.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114215391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hidden terminal management for uplink traffic in rate-controlled WiFi networks 速率控制WiFi网络上行流量的隐藏终端管理
Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543877
Mustafa Al-Bado, C. Sengul, C. Sreenan, Kenneth N. Brown
This paper exposes several problems in managing hidden terminals for uplink traffic in rate-controlled environments, and presents solutions to mitigate them. In particular, we focus on scenarios, in which, clients are associated with an access point (AP). The main challenge stems from the negative interactions between rate-control protocols and hidden terminals. To expose the problems, we use a recent channel estimation approach (CEA) to differentiate the reason for packet losses into three categories, noise, congestion and hidden terminals. Our testbed and simulation-based experiments show that the accuracy of hidden terminal estimations using the CEA degrades as MAC-layer ACK frames are sent with relatively high transmission rates. To improve the accuracy of the CEA, the results demonstrate the necessity and cost of making the AP send ACKs based on the minimum ACK rate of all clients. We propose an adaptive scheme that combines both the CEA and RTS/CTS messages. The proposed scheme increases the overall throughput of Minstrel rate-control algorithm by 60% in case of light congested environments. We also proposed a threshold-based adaptive RTS/CTS scheme based on the prior scheme to handle the highly congested environments. The threshold-based adaptive RTS/CTS scheme improves the overall throughput of the adaptive RTS/CTS scheme and Minstrel algorithm between 20-35%. Finally, we propose and evaluate an opportunistic burst scheme, which enforce fairness among clients. Simulation results show that opportunistic bursting outperforms the prior schemes and Minstrel algorithm in Jain's fairness metric (between 0.11 and 0.38) for a realistic given scenario. It also keeps a relatively high overall throughput.
本文揭示了速率控制环境下上行流量隐藏终端管理中存在的几个问题,并提出了相应的解决方案。我们特别关注客户机与接入点(AP)相关联的场景。主要的挑战来自于速率控制协议和隐藏终端之间的负交互。为了揭示这些问题,我们使用一种最新的信道估计方法(CEA)将丢包的原因分为三类:噪声、拥塞和隐藏终端。我们的测试平台和基于仿真的实验表明,当mac层ACK帧以相对较高的传输速率发送时,使用CEA的隐藏终端估计的准确性会下降。为了提高CEA的准确性,结果证明了AP根据所有客户端的最小ACK率发送ACK的必要性和成本。我们提出了一种结合CEA和RTS/CTS消息的自适应方案。在轻度拥塞环境下,该方案使Minstrel速率控制算法的总吞吐量提高了60%。我们还提出了一种基于阈值的自适应RTS/CTS方案来处理高度拥塞的环境。基于阈值的自适应RTS/CTS方案将自适应RTS/CTS方案和Minstrel算法的总吞吐量提高了20-35%。最后,我们提出并评估了一种机会爆发方案,该方案在客户端之间实现了公平性。仿真结果表明,在给定的实际场景中,机会爆破算法在Jain公平性度量(0.11 ~ 0.38)上优于先前的方案和Minstrel算法。它还保持了相对较高的总体吞吐量。
{"title":"Hidden terminal management for uplink traffic in rate-controlled WiFi networks","authors":"Mustafa Al-Bado, C. Sengul, C. Sreenan, Kenneth N. Brown","doi":"10.1109/ISCC.2016.7543877","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543877","url":null,"abstract":"This paper exposes several problems in managing hidden terminals for uplink traffic in rate-controlled environments, and presents solutions to mitigate them. In particular, we focus on scenarios, in which, clients are associated with an access point (AP). The main challenge stems from the negative interactions between rate-control protocols and hidden terminals. To expose the problems, we use a recent channel estimation approach (CEA) to differentiate the reason for packet losses into three categories, noise, congestion and hidden terminals. Our testbed and simulation-based experiments show that the accuracy of hidden terminal estimations using the CEA degrades as MAC-layer ACK frames are sent with relatively high transmission rates. To improve the accuracy of the CEA, the results demonstrate the necessity and cost of making the AP send ACKs based on the minimum ACK rate of all clients. We propose an adaptive scheme that combines both the CEA and RTS/CTS messages. The proposed scheme increases the overall throughput of Minstrel rate-control algorithm by 60% in case of light congested environments. We also proposed a threshold-based adaptive RTS/CTS scheme based on the prior scheme to handle the highly congested environments. The threshold-based adaptive RTS/CTS scheme improves the overall throughput of the adaptive RTS/CTS scheme and Minstrel algorithm between 20-35%. Finally, we propose and evaluate an opportunistic burst scheme, which enforce fairness among clients. Simulation results show that opportunistic bursting outperforms the prior schemes and Minstrel algorithm in Jain's fairness metric (between 0.11 and 0.38) for a realistic given scenario. It also keeps a relatively high overall throughput.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114360403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Priority-based and Throughput-guaranteed Transport protocol for data center networks 基于优先级和吞吐量保证的数据中心网络传输协议
Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543906
Zongyi Zhao, Qing Li, Mingwei Xu, Lei Wang, Meng Chen
The previous surveys show that more than 90% of the flows in typical data center networks are smaller than 100KB in size, while most bytes transmitted are from a few large flows. The small flows are usually sensitive to their completion times while the large flows require a high throughput. The previous works usually either achieve low completion times for small flows or high throughput for large flows, but not both. In this paper, we propose PTT (Priority-based and Throughput-guaranteed Transport) to minimize the average completion time of small flows while guaranteeing the high throughput of large flows. We conduct comprehensive simulations to evaluate the performance of PTT. The simulation results show that PTT reduces the average completion time of small flows by up to 27.52% over DCTCP and 23.82% over L2DCT while the throughput of large flows is comparable to that in DCTCP, which is 170.46% better than that in L2DCT.
以往的调查表明,在典型的数据中心网络中,90%以上的流的大小小于100KB,而大多数传输的字节都来自几个大的流。小流通常对它们的完成时间很敏感,而大流则需要高吞吐量。以前的工作通常要么实现小流量的低完成时间,要么实现大流量的高吞吐量,但不是两者兼而有之。在本文中,我们提出了PTT(基于优先级和吞吐量保证的传输)来最小化小流的平均完成时间,同时保证大流的高吞吐量。我们进行了全面的仿真来评估PTT的性能。仿真结果表明,PTT使小流量的平均完成时间比DCTCP减少27.52%,比L2DCT减少23.82%,而大流量的吞吐量与DCTCP相当,比L2DCT提高了170.46%。
{"title":"Priority-based and Throughput-guaranteed Transport protocol for data center networks","authors":"Zongyi Zhao, Qing Li, Mingwei Xu, Lei Wang, Meng Chen","doi":"10.1109/ISCC.2016.7543906","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543906","url":null,"abstract":"The previous surveys show that more than 90% of the flows in typical data center networks are smaller than 100KB in size, while most bytes transmitted are from a few large flows. The small flows are usually sensitive to their completion times while the large flows require a high throughput. The previous works usually either achieve low completion times for small flows or high throughput for large flows, but not both. In this paper, we propose PTT (Priority-based and Throughput-guaranteed Transport) to minimize the average completion time of small flows while guaranteeing the high throughput of large flows. We conduct comprehensive simulations to evaluate the performance of PTT. The simulation results show that PTT reduces the average completion time of small flows by up to 27.52% over DCTCP and 23.82% over L2DCT while the throughput of large flows is comparable to that in DCTCP, which is 170.46% better than that in L2DCT.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115940317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart grid power scheduling via bottom left decreasing height packing 基于左下递减高度分组的智能电网电力调度
Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543888
Anshu Ranjan, P. Khargonekar, S. Sahni
We consider the scheduling of flexible electric power loads so as to minimize the peak load. We settle a conjecture of Alamdari et al.[1] regarding the performance of the bottom left decreasing height heuristic to schedule preemptable loads with known power requirement and duration and having the same earliest start time and the same deadline. Specifically, we show a tight bound of 4/3 - 1/(3D) relative to the minimum peak power load, where D is the duration of the scheduling interval. On benchmark strip packing data, the bottom left decreasing height heuristic generated schedules that required up to 45% less peak power than required by schedules generated using the next fit decreasing height heuristic. On electric and plug-in hybrid electric vehicles data, these two heuristics are very competitive.
考虑柔性电力负荷的调度,使峰值负荷最小化。我们解决了Alamdari等人[1]关于左下递减高度启发式调度具有已知功率需求和持续时间且具有相同最早开始时间和相同截止日期的可抢占负载的性能的猜想。具体来说,我们显示了相对于最小峰值功率负载的4/3 - 1/(3D)的紧密边界,其中D是调度间隔的持续时间。在基准条形填料数据上,左下方的高度递减启发式算法生成的调度所需的峰值功率比使用下一个拟合高度递减启发式算法生成的调度所需的峰值功率少45%。在电动和插电式混合动力汽车数据上,这两种启发式方法非常有竞争力。
{"title":"Smart grid power scheduling via bottom left decreasing height packing","authors":"Anshu Ranjan, P. Khargonekar, S. Sahni","doi":"10.1109/ISCC.2016.7543888","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543888","url":null,"abstract":"We consider the scheduling of flexible electric power loads so as to minimize the peak load. We settle a conjecture of Alamdari et al.[1] regarding the performance of the bottom left decreasing height heuristic to schedule preemptable loads with known power requirement and duration and having the same earliest start time and the same deadline. Specifically, we show a tight bound of 4/3 - 1/(3D) relative to the minimum peak power load, where D is the duration of the scheduling interval. On benchmark strip packing data, the bottom left decreasing height heuristic generated schedules that required up to 45% less peak power than required by schedules generated using the next fit decreasing height heuristic. On electric and plug-in hybrid electric vehicles data, these two heuristics are very competitive.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"18 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120856764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Deployment strategies for underwater sensing and processing networks 水下传感与处理网络的部署策略
Pub Date : 2016-06-27 DOI: 10.1109/ISCC.2016.7543766
H. Alhumyani, R. Ammar, Hussain Albarakati, Ayman Alharbi
One method of alleviating the burdens of low bandwidth channel in underwater sensor networks (UWSNs) is to perform in-network processing on the collected data, which leads to efficient channel usage, improvement of the end-to-end delay, and improvement of the network lifetime. However, for applications that require large amounts of data, such as seismic monitoring, the detection and tracking of marine objects, and underwater multimedia systems, the use of traditional underwater sensor nodes to perform such data processing techniques is impractical because of their limited power and processing capability. Therefore, the deployment of underwater sensor nodes called processing nodes that have extended power resources and higher features processing units can mitigate the problem of underwater in-network processing. Because the underwater processing nodes are expensive, their deployment is usually considered to be an optimization problem with the objective to best satisfy certain parameters. To solve the optimization problem efficiently, we propose several heuristic approaches that can be used to solve the optimization problem in polynomial time. The quality of the obtained solutions is verified by simulation and compared with the optimal solution.
减轻水下传感器网络低带宽信道负担的一种方法是对采集到的数据进行网内处理,从而提高信道利用率,改善端到端时延,提高网络寿命。然而,对于需要大量数据的应用,如地震监测、海洋物体的探测和跟踪以及水下多媒体系统,由于其功率和处理能力有限,使用传统的水下传感器节点来执行此类数据处理技术是不切实际的。因此,部署具有更大功耗资源和更高特征处理单元的水下传感器节点称为处理节点,可以缓解水下网内处理问题。由于水下处理节点价格昂贵,其部署通常被认为是一个优化问题,其目标是最好地满足某些参数。为了有效地解决优化问题,我们提出了几种可用于在多项式时间内解决优化问题的启发式方法。通过仿真验证了所得解的质量,并与最优解进行了比较。
{"title":"Deployment strategies for underwater sensing and processing networks","authors":"H. Alhumyani, R. Ammar, Hussain Albarakati, Ayman Alharbi","doi":"10.1109/ISCC.2016.7543766","DOIUrl":"https://doi.org/10.1109/ISCC.2016.7543766","url":null,"abstract":"One method of alleviating the burdens of low bandwidth channel in underwater sensor networks (UWSNs) is to perform in-network processing on the collected data, which leads to efficient channel usage, improvement of the end-to-end delay, and improvement of the network lifetime. However, for applications that require large amounts of data, such as seismic monitoring, the detection and tracking of marine objects, and underwater multimedia systems, the use of traditional underwater sensor nodes to perform such data processing techniques is impractical because of their limited power and processing capability. Therefore, the deployment of underwater sensor nodes called processing nodes that have extended power resources and higher features processing units can mitigate the problem of underwater in-network processing. Because the underwater processing nodes are expensive, their deployment is usually considered to be an optimization problem with the objective to best satisfy certain parameters. To solve the optimization problem efficiently, we propose several heuristic approaches that can be used to solve the optimization problem in polynomial time. The quality of the obtained solutions is verified by simulation and compared with the optimal solution.","PeriodicalId":148096,"journal":{"name":"2016 IEEE Symposium on Computers and Communication (ISCC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123943097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2016 IEEE Symposium on Computers and Communication (ISCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1