首页 > 最新文献

2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)最新文献

英文 中文
Safe Process Quitting for GPU Multi-Process Service (MPS) GPU多进程服务安全退出进程
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00125
Hao Wu, Wei Liu, Yifan Gong, Jiangming Jin
GPUs have been widely adopted to speedup various throughput-originated applications running on HPC platforms, where typically there are a number of tasks sharing GPUs to maximize GPU utilization. To facilitate GPU sharing, GPU vendors provide tools, allowing multiple processes concurrently to use GPUs. For example, Nvidia provides MPS (Multi-Process Service) managing all GPU processes to achieve high throughput by fully exploiting hardware resources. However, such tool leads to undesired single point of failure for all GPU processes, namely, one process’s exception makes other processes abnormal. In this work, we investigate the seriousness of this GPU process interferences caused by MPS, and propose an approach to address one of these interferences, which takes place during process quitting. By using signal handling and thread synchronization techniques in this approach, GPU processes are able to quit safely without interfering other GPU processes.
GPU已被广泛用于加速运行在HPC平台上的各种吞吐量源应用程序,其中通常有许多任务共享GPU以最大化GPU利用率。为了方便GPU共享,GPU厂商提供了工具,允许多个进程同时使用GPU。例如,Nvidia提供MPS (Multi-Process Service,多进程服务)来管理所有GPU进程,通过充分利用硬件资源来实现高吞吐量。然而,这种工具会导致所有GPU进程的单点故障,即一个进程的异常会导致其他进程异常。在这项工作中,我们研究了由MPS引起的GPU进程干扰的严重性,并提出了一种解决这些干扰的方法,这些干扰发生在进程退出期间。通过在这种方法中使用信号处理和线程同步技术,GPU进程能够在不干扰其他GPU进程的情况下安全退出。
{"title":"Safe Process Quitting for GPU Multi-Process Service (MPS)","authors":"Hao Wu, Wei Liu, Yifan Gong, Jiangming Jin","doi":"10.1109/ICDCS47774.2020.00125","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00125","url":null,"abstract":"GPUs have been widely adopted to speedup various throughput-originated applications running on HPC platforms, where typically there are a number of tasks sharing GPUs to maximize GPU utilization. To facilitate GPU sharing, GPU vendors provide tools, allowing multiple processes concurrently to use GPUs. For example, Nvidia provides MPS (Multi-Process Service) managing all GPU processes to achieve high throughput by fully exploiting hardware resources. However, such tool leads to undesired single point of failure for all GPU processes, namely, one process’s exception makes other processes abnormal. In this work, we investigate the seriousness of this GPU process interferences caused by MPS, and propose an approach to address one of these interferences, which takes place during process quitting. By using signal handling and thread synchronization techniques in this approach, GPU processes are able to quit safely without interfering other GPU processes.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128607914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data Outsourcing Services 数据外包服务中容量隐藏范围查询的新型混合索引
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00014
K. Ren, Yu Guo, Jiaqi Li, X. Jia, Cong Wang, Yajin Zhou, Sheng Wang, N. Cao, Feifei Li
An encrypted index is a data structure that assisting untrusted servers to provide various query functionalities in the ciphertext domain. Although traditional index designs can prevent servers from directly obtaining plaintexts, the confidentiality of outsourced data could still be compromised by observing the volume of different queries. Recent volume attacks have demonstrated the importance of sealing volume-pattern leakage. To this end, several works are made to design secure indexes with the volume-hiding property. However, prior designs only work for encrypted keyword search. Due to the unpredictable range query results, it is difficult to protect the volume-pattern leakage while achieving efficient range queries.In this paper, for the first time, we define and solve the challenging problem of volume-hiding range queries over encrypted data. Our proposed hybrid index framework, called HybrIDX, allows an untrusted server to efficiently search encrypted data based on order conditions without revealing the exact volume size. It resorts to the trusted hardware techniques to assist range query processing by moving the comparison algorithm to trusted SGX enclaves. To enable volume-hiding data retrieval, we propose to host encrypted results outside the enclave in an encrypted multimaps manner. Apart from this novel hybrid index design, we further customize a bulk refresh mechanism to enable accesspattern obfuscation. We formally analyze the security strengths and complete the prototype implementation. Evaluation results demonstrate the feasibility and practicability of our designs.
加密索引是一种数据结构,它帮助不受信任的服务器在密文域中提供各种查询功能。尽管传统的索引设计可以防止服务器直接获取明文,但是通过观察不同查询的数量,外包数据的机密性仍然可能受到损害。最近的体积攻击已经证明了密封体积模式泄漏的重要性。为此,本文做了一些工作来设计具有卷隐藏特性的安全索引。然而,先前的设计只适用于加密的关键字搜索。由于距离查询结果的不可预测性,在实现有效的距离查询的同时很难保护体积模式泄漏。在本文中,我们首次定义并解决了具有挑战性的加密数据卷隐藏范围查询问题。我们提出的混合索引框架,称为HybrIDX,允许不受信任的服务器根据订单条件有效地搜索加密数据,而不会透露确切的交易量大小。它借助可信硬件技术,通过将比较算法移动到可信的SGX飞地来协助范围查询处理。为了启用卷隐藏数据检索,我们建议以加密的multimaps方式在enclave外托管加密的结果。除了这种新颖的混合索引设计之外,我们还进一步定制了一种批量刷新机制,以支持访问模式混淆。我们正式分析了安全优势并完成了原型实现。评价结果表明了设计的可行性和实用性。
{"title":"HybrIDX: New Hybrid Index for Volume-hiding Range Queries in Data Outsourcing Services","authors":"K. Ren, Yu Guo, Jiaqi Li, X. Jia, Cong Wang, Yajin Zhou, Sheng Wang, N. Cao, Feifei Li","doi":"10.1109/ICDCS47774.2020.00014","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00014","url":null,"abstract":"An encrypted index is a data structure that assisting untrusted servers to provide various query functionalities in the ciphertext domain. Although traditional index designs can prevent servers from directly obtaining plaintexts, the confidentiality of outsourced data could still be compromised by observing the volume of different queries. Recent volume attacks have demonstrated the importance of sealing volume-pattern leakage. To this end, several works are made to design secure indexes with the volume-hiding property. However, prior designs only work for encrypted keyword search. Due to the unpredictable range query results, it is difficult to protect the volume-pattern leakage while achieving efficient range queries.In this paper, for the first time, we define and solve the challenging problem of volume-hiding range queries over encrypted data. Our proposed hybrid index framework, called HybrIDX, allows an untrusted server to efficiently search encrypted data based on order conditions without revealing the exact volume size. It resorts to the trusted hardware techniques to assist range query processing by moving the comparison algorithm to trusted SGX enclaves. To enable volume-hiding data retrieval, we propose to host encrypted results outside the enclave in an encrypted multimaps manner. Apart from this novel hybrid index design, we further customize a bulk refresh mechanism to enable accesspattern obfuscation. We formally analyze the security strengths and complete the prototype implementation. Evaluation results demonstrate the feasibility and practicability of our designs.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129261449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
SpotTune: Leveraging Transient Resources for Cost-efficient Hyper-parameter Tuning in the Public Cloud SpotTune:在公共云中利用瞬时资源进行经济高效的超参数调优
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00111
Yan Li, Bo An, Junming Ma, Donggang Cao, Yasha Wang, Hong Mei
Hyper-parameter tuning (HPT) is crucial for many machine learning (ML) algorithms. But due to the large searching space, HPT is usually time-consuming and resource-intensive. Nowadays, many researchers use public cloud resources to train machine learning models, convenient yet expensive. How to speed up the HPT process while at the same time reduce cost is very important for cloud ML users. In this paper, we propose SpotTune, an approach that exploits transient revocable resources in the public cloud with some tailored strategies to do HPT in a parallel and cost-efficient manner. Orchestrating the HPT process upon transient servers, SpotTune uses two main techniques, fine-grained cost-aware resource provisioning, and ML training trend predicting, to reduce the monetary cost and runtime of HPT processes. Our evaluations show that SpotTune can reduce the cost by up to 90% and achieve a 16.61x performance-cost rate improvement.
超参数调优(HPT)对于许多机器学习(ML)算法至关重要。但由于搜索空间大,HPT通常耗时且资源密集。目前,许多研究人员使用公共云资源来训练机器学习模型,方便但昂贵。如何在加快HPT过程的同时降低成本对云ML用户来说是非常重要的。在本文中,我们提出了SpotTune,这是一种利用公共云中的瞬时可撤销资源的方法,通过一些定制的策略以并行和经济高效的方式进行HPT。在临时服务器上编排HPT过程,SpotTune使用两种主要技术,细粒度的成本感知资源配置和ML训练趋势预测,以减少HPT过程的货币成本和运行时间。我们的评估表明,SpotTune可以降低高达90%的成本,并实现16.61倍的性能成本提升。
{"title":"SpotTune: Leveraging Transient Resources for Cost-efficient Hyper-parameter Tuning in the Public Cloud","authors":"Yan Li, Bo An, Junming Ma, Donggang Cao, Yasha Wang, Hong Mei","doi":"10.1109/ICDCS47774.2020.00111","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00111","url":null,"abstract":"Hyper-parameter tuning (HPT) is crucial for many machine learning (ML) algorithms. But due to the large searching space, HPT is usually time-consuming and resource-intensive. Nowadays, many researchers use public cloud resources to train machine learning models, convenient yet expensive. How to speed up the HPT process while at the same time reduce cost is very important for cloud ML users. In this paper, we propose SpotTune, an approach that exploits transient revocable resources in the public cloud with some tailored strategies to do HPT in a parallel and cost-efficient manner. Orchestrating the HPT process upon transient servers, SpotTune uses two main techniques, fine-grained cost-aware resource provisioning, and ML training trend predicting, to reduce the monetary cost and runtime of HPT processes. Our evaluations show that SpotTune can reduce the cost by up to 90% and achieve a 16.61x performance-cost rate improvement.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128252721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Three-Dimensional Reconstruction and Phenotype Nondestructive Measurement Technology for Rape Roots 油菜根系三维重建及表型无损检测技术
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00178
Rui Liang, Shengyong Xu
In recent years, 3D reconstruction technology has developed rapidly. It is a promising field to apply 3D reconstruction technology to the measurement of plant configuration parameters. The main content of this paper is the 3D reconstruction technology for rape roots and the measurement methods for their key traits. Firstly, we set up a set of low-cost image sequence acquisition device of rape roots. We collected image data with common consumption level camera and used the method of SfM to carry out 3D reconstruction of rape roots. Then we proposed a series of algorithms to measure the surface area, volume, number of primary lateral roots and length of taproot based on the huge point cloud data obtained from 3D reconstruction. Finally, we designed a set of nondestructive measurement system for key traits of rape roots. The total volume of root, the number of primary lateral roots and the length of taproot were measured manually. Compared with the results of manual measurement, the accuracy of the main algorithm proposed in this paper is not less than 95%. Our contribution is to provide a 3D reconstruction method that is easy to operate, and to provide a high-precision measurement method for the key traits of rape roots, which has an important value for quantitative analysis of rape roots phenotype.
近年来,三维重建技术发展迅速。将三维重建技术应用于工厂结构参数的测量是一个很有前途的领域。本文的主要内容是油菜根系三维重建技术及其关键性状的测量方法。首先,我们搭建了一套低成本的油菜根系图像序列采集装置。我们使用普通消费级相机采集图像数据,采用SfM方法对油菜根系进行三维重建。然后,基于三维重建获得的海量点云数据,提出了一系列测量主侧根表面积、体积、数量和主根长度的算法。最后,设计了一套油菜根系关键性状无损检测系统。人工测量根系的总体积、主根的侧根数和主根的长度。与人工测量结果相比,本文提出的主要算法的测量精度不低于95%。我们的贡献在于提供了一种易于操作的三维重建方法,并为油菜根系关键性状提供了一种高精度的测量方法,对油菜根系表型的定量分析具有重要价值。
{"title":"Three-Dimensional Reconstruction and Phenotype Nondestructive Measurement Technology for Rape Roots","authors":"Rui Liang, Shengyong Xu","doi":"10.1109/ICDCS47774.2020.00178","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00178","url":null,"abstract":"In recent years, 3D reconstruction technology has developed rapidly. It is a promising field to apply 3D reconstruction technology to the measurement of plant configuration parameters. The main content of this paper is the 3D reconstruction technology for rape roots and the measurement methods for their key traits. Firstly, we set up a set of low-cost image sequence acquisition device of rape roots. We collected image data with common consumption level camera and used the method of SfM to carry out 3D reconstruction of rape roots. Then we proposed a series of algorithms to measure the surface area, volume, number of primary lateral roots and length of taproot based on the huge point cloud data obtained from 3D reconstruction. Finally, we designed a set of nondestructive measurement system for key traits of rape roots. The total volume of root, the number of primary lateral roots and the length of taproot were measured manually. Compared with the results of manual measurement, the accuracy of the main algorithm proposed in this paper is not less than 95%. Our contribution is to provide a 3D reconstruction method that is easy to operate, and to provide a high-precision measurement method for the key traits of rape roots, which has an important value for quantitative analysis of rape roots phenotype.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124363059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterizing the Impact of TCP Coexistence in Data Center Networks 描述TCP共存对数据中心网络的影响
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00035
Anirudh Ganji, Anandeshwar Singh, Muhammad Shahzad
The switch fabrics of today’s data centers carry traffic controlled by a variety of TCP congestion control algorithms. This leads us to ask: how does the coexistence of multiple variants of TCP on shared switch fabric impacts the performance achieved by different applications in data centers? To answer this question, we conducted an extensive set of experiments with coexisting TCP variants on Leaf-Spine and Fat-Tree switch fabrics. We executed common data center workloads, which include streaming, MapReduce, and storage workloads, using four commonly used TCP variants, namely BBR, DCTCP, CUBIC, and New Reno. We also extensively executed iPerf workloads using these 4 TCP variants to purely study the impact of the coexistence of TCP variants on each other’s performance without incorporating the network behavior of the application layer. Our experiments resulted in a large set of network traces comprised of 160 billion packets (we will release these traces after publication of this work). We present comprehensive observations from these traces that have important implications in ensuring optimal utilization of data center switch fabric and in meeting the network performance needs of application layer workloads.
当今数据中心的交换结构承载着由各种TCP拥塞控制算法控制的流量。这让我们不禁要问:在共享交换结构上共存的多种TCP变体如何影响数据中心中不同应用程序实现的性能?为了回答这个问题,我们对Leaf-Spine和Fat-Tree交换结构上共存的TCP变体进行了广泛的实验。我们执行常见的数据中心工作负载,包括流、MapReduce和存储工作负载,使用四种常用的TCP变体,即BBR、DCTCP、CUBIC和New Reno。我们还使用这4种TCP变体广泛执行iPerf工作负载,纯粹研究TCP变体共存对彼此性能的影响,而不考虑应用层的网络行为。我们的实验产生了一个由1600亿个数据包组成的大型网络轨迹集(我们将在本工作发表后发布这些轨迹)。我们从这些轨迹中提出了全面的观察结果,这些观察结果对于确保数据中心交换结构的最佳利用和满足应用层工作负载的网络性能需求具有重要意义。
{"title":"Characterizing the Impact of TCP Coexistence in Data Center Networks","authors":"Anirudh Ganji, Anandeshwar Singh, Muhammad Shahzad","doi":"10.1109/ICDCS47774.2020.00035","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00035","url":null,"abstract":"The switch fabrics of today’s data centers carry traffic controlled by a variety of TCP congestion control algorithms. This leads us to ask: how does the coexistence of multiple variants of TCP on shared switch fabric impacts the performance achieved by different applications in data centers? To answer this question, we conducted an extensive set of experiments with coexisting TCP variants on Leaf-Spine and Fat-Tree switch fabrics. We executed common data center workloads, which include streaming, MapReduce, and storage workloads, using four commonly used TCP variants, namely BBR, DCTCP, CUBIC, and New Reno. We also extensively executed iPerf workloads using these 4 TCP variants to purely study the impact of the coexistence of TCP variants on each other’s performance without incorporating the network behavior of the application layer. Our experiments resulted in a large set of network traces comprised of 160 billion packets (we will release these traces after publication of this work). We present comprehensive observations from these traces that have important implications in ensuring optimal utilization of data center switch fabric and in meeting the network performance needs of application layer workloads.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127823900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluating the Merits of Ranking in Structured Network Pruning 评价结构化网络修剪中排序的优点
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00183
Kuldeep Sharma, N. Ramakrishnan, Alok Prakash, S. Lam, T. Srikanthan
Pruning of channels in trained deep neural networks has been widely used to implement efficient DNNs that can be deployed on embedded/mobile devices. Majority of existing techniques employ criteria-based sorting of the channels to preserve salient channels during pruning as well as to automatically determine the pruned network architecture. However, recent studies on widely used DNNs, such as VGG-16, have shown that selecting and preserving salient channels using pruning criteria is not necessary since the plasticity of the network allows the accuracy to be recovered through fine-tuning. In this work, we further explore the value of the ranking criteria in pruning to show that if channels are removed gradually and iteratively, alternating with fine-tuning on the target dataset, ranking criteria are indeed not necessary to select redundant channels. Experimental results confirm that even a random selection of channels for pruning leads to similar performance (accuracy). In addition, we demonstrate that even a simple pruning technique that uniformly removes channels from all layers in the network, performs similar to existing ranking criteria-based approaches, while leading to lower inference time (GFLOPs). Our extensive evaluations include the context of embedded implementations of DNNs - specifically, on small networks such as SqueezeNet and at aggressive pruning percentages. We leverage these insights, to propose a GFLOPs-aware iterative pruning strategy that does not rely on any ranking criteria and yet can further lead to lower inference time by 15% without sacrificing accuracy.
在训练好的深度神经网络中,通道修剪已被广泛用于实现可部署在嵌入式/移动设备上的高效深度神经网络。现有的大多数技术都采用基于标准的通道排序,以在修剪过程中保留显著通道,并自动确定修剪后的网络结构。然而,最近对广泛使用的dnn(如VGG-16)的研究表明,使用修剪标准选择和保留显著通道是不必要的,因为网络的可塑性允许通过微调恢复精度。在这项工作中,我们进一步探讨了排序标准在修剪中的价值,表明如果频道是逐步迭代地删除的,并且在目标数据集上交替进行微调,那么选择冗余频道确实不需要排序标准。实验结果证实,即使随机选择修剪通道,也会产生相似的性能(精度)。此外,我们证明,即使是一种简单的修剪技术,即从网络中的所有层中均匀地删除通道,其性能与现有的基于排名标准的方法相似,同时导致更低的推理时间(GFLOPs)。我们的广泛评估包括dnn的嵌入式实现的背景-特别是在小型网络上,如SqueezeNet和积极的修剪百分比。我们利用这些见解,提出了一种不依赖于任何排名标准的gflops感知迭代修剪策略,该策略可以在不牺牲准确性的情况下进一步降低15%的推理时间。
{"title":"Evaluating the Merits of Ranking in Structured Network Pruning","authors":"Kuldeep Sharma, N. Ramakrishnan, Alok Prakash, S. Lam, T. Srikanthan","doi":"10.1109/ICDCS47774.2020.00183","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00183","url":null,"abstract":"Pruning of channels in trained deep neural networks has been widely used to implement efficient DNNs that can be deployed on embedded/mobile devices. Majority of existing techniques employ criteria-based sorting of the channels to preserve salient channels during pruning as well as to automatically determine the pruned network architecture. However, recent studies on widely used DNNs, such as VGG-16, have shown that selecting and preserving salient channels using pruning criteria is not necessary since the plasticity of the network allows the accuracy to be recovered through fine-tuning. In this work, we further explore the value of the ranking criteria in pruning to show that if channels are removed gradually and iteratively, alternating with fine-tuning on the target dataset, ranking criteria are indeed not necessary to select redundant channels. Experimental results confirm that even a random selection of channels for pruning leads to similar performance (accuracy). In addition, we demonstrate that even a simple pruning technique that uniformly removes channels from all layers in the network, performs similar to existing ranking criteria-based approaches, while leading to lower inference time (GFLOPs). Our extensive evaluations include the context of embedded implementations of DNNs - specifically, on small networks such as SqueezeNet and at aggressive pruning percentages. We leverage these insights, to propose a GFLOPs-aware iterative pruning strategy that does not rely on any ranking criteria and yet can further lead to lower inference time by 15% without sacrificing accuracy.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127179275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scale the Data Plane of Software-Defined Networks: a Lazy Rule Placement Approach 扩展软件定义网络的数据平面:一种惰性规则放置方法
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00077
Qing Li, Nanyang Huang, Yong Jiang, R. Sinnott, Mingwei Xu
Data plane programming languages enable administrators of Software-Defined Networks (SDNs) to perform fine-grained flow control by compiling high-level policies into low-level rules and deploying rules in the data plane. However, it is difficult to scale the data plane with the dynamics of network traffic and the limited storage space of switches. In this paper, we propose a lazy OpenFlow Rule Placement (ORP) framework to enforce control polices and scale the SDN data plane by placing and reusing wildcard rules. We provide an offline rule placement scheme to meet performance objectives under real-world constraints. To handle dynamic traffic and perform incremental rule updates, we design an online matching rule deployment algorithm to place rules in polynomial time and prove it to be conditionally-optimal. Furthermore, to address the rule dependency problem during online rule placement, we extend the algorithm to deploy dependent rules and present lightweight heuristics to guarantee the fast reaction to the new flows. Extensive experiments are conducted on diverse network topologies and datasets to show that the lazy ORP framework significantly reduces the storage cost, improves data plane scalability and is flexible enough to accomplish different optimization goals.
数据平面编程语言使sdn (Software-Defined network)管理员能够将高级策略编译成低级规则,并在数据平面部署规则,从而实现细粒度的流量控制。然而,由于网络流量的动态性和交换机存储空间的有限性,数据平面难以扩展。在本文中,我们提出了一个懒惰的OpenFlow规则放置(ORP)框架,通过放置和重用通配符规则来执行控制策略和扩展SDN数据平面。我们提供离线规则放置方案,以满足现实世界约束下的性能目标。为了处理动态流量和执行增量规则更新,我们设计了一种在线匹配规则部署算法,在多项式时间内放置规则,并证明了它是条件最优的。此外,为了解决在线规则放置过程中的规则依赖问题,我们扩展了该算法以部署依赖规则,并提出了轻量级启发式算法以保证对新流的快速反应。在不同的网络拓扑和数据集上进行了大量的实验,结果表明lazy ORP框架显著降低了存储成本,提高了数据平面的可扩展性,并且具有足够的灵活性来实现不同的优化目标。
{"title":"Scale the Data Plane of Software-Defined Networks: a Lazy Rule Placement Approach","authors":"Qing Li, Nanyang Huang, Yong Jiang, R. Sinnott, Mingwei Xu","doi":"10.1109/ICDCS47774.2020.00077","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00077","url":null,"abstract":"Data plane programming languages enable administrators of Software-Defined Networks (SDNs) to perform fine-grained flow control by compiling high-level policies into low-level rules and deploying rules in the data plane. However, it is difficult to scale the data plane with the dynamics of network traffic and the limited storage space of switches. In this paper, we propose a lazy OpenFlow Rule Placement (ORP) framework to enforce control polices and scale the SDN data plane by placing and reusing wildcard rules. We provide an offline rule placement scheme to meet performance objectives under real-world constraints. To handle dynamic traffic and perform incremental rule updates, we design an online matching rule deployment algorithm to place rules in polynomial time and prove it to be conditionally-optimal. Furthermore, to address the rule dependency problem during online rule placement, we extend the algorithm to deploy dependent rules and present lightweight heuristics to guarantee the fast reaction to the new flows. Extensive experiments are conducted on diverse network topologies and datasets to show that the lazy ORP framework significantly reduces the storage cost, improves data plane scalability and is flexible enough to accomplish different optimization goals.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126561714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
WiWrite: An Accurate Device-Free Handwriting Recognition System with COTS WiFi WiWrite:一个精确的无设备手写识别系统与COTS WiFi
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00079
Chi Lin, Tingting Xu, Jie Xiong, Fenglong Ma, Lei Wang, Guowei Wu
Handwriting recognition system provides people a convenient and alternative way for writing in the air with fingers rather than typing keyboards. For people with blurred vision and patients with generalized hand neurological disease, writing in the air is particularly attracting due to the small input screen of smartphones and smartwatches. Existing recognition systems still face drawbacks such as requiring to wear dedicated devices, relatively low accuracy and infeasible for cross domain identification, which greatly limit the usability of these systems. To address these issues, we propose WiWrite, an accurate device-free handwriting recognition system which allows writing in the air without a need of attaching any device to the user. Specifically, we use Commercial Off-The-Shelf (COTS) WiFi hardware to achieve fine-grained finger tracking. We develop a CSI division scheme to process the noisy raw WiFi channel state information (CSI), which stabilizes the CSI phase and reduces the noise of the CSI amplitude. To automatically retain low noise data for identification, we propose a self-paced dense convolutional network (SPDCN), which consists of the self-paced loss function based on a modified convolutional neural network, together with a dense convolutional network. Comprehensive experiments are conducted to show the merits of WiWrite, revealing that, the recognition accuracies for the same-size input and different-size input are 93.6% and 89.0%, respectively. Moreover, WiWrite can achieve a one-fit-for-all recognition regardless of environment diversities.
手写识别系统为人们提供了一种用手指在空中书写而不是用键盘打字的方便和替代方式。由于智能手机和智能手表的输入屏幕小,对于视力模糊和患有广泛性手部神经疾病的患者来说,在空中写字特别有吸引力。现有的识别系统仍然存在需要佩戴专用设备、准确率相对较低、无法进行跨域识别等缺点,极大地限制了系统的可用性。为了解决这些问题,我们提出了WiWrite,这是一个精确的无设备手写识别系统,允许在空中书写,而不需要在用户身上附加任何设备。具体来说,我们使用商用现货(COTS) WiFi硬件来实现细粒度的手指跟踪。我们提出了一种CSI分割方案来处理有噪声的原始WiFi信道状态信息(CSI),从而稳定了CSI相位并降低了CSI振幅的噪声。为了自动保留低噪声数据用于识别,我们提出了一种自定速密集卷积网络(SPDCN),该网络由基于改进卷积神经网络的自定速损失函数和密集卷积网络组成。通过全面的实验验证了WiWrite的优点,结果表明,对于相同大小的输入和不同大小的输入,WiWrite的识别准确率分别为93.6%和89.0%。此外,WiWrite可以在不考虑环境多样性的情况下实现一刀切的识别。
{"title":"WiWrite: An Accurate Device-Free Handwriting Recognition System with COTS WiFi","authors":"Chi Lin, Tingting Xu, Jie Xiong, Fenglong Ma, Lei Wang, Guowei Wu","doi":"10.1109/ICDCS47774.2020.00079","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00079","url":null,"abstract":"Handwriting recognition system provides people a convenient and alternative way for writing in the air with fingers rather than typing keyboards. For people with blurred vision and patients with generalized hand neurological disease, writing in the air is particularly attracting due to the small input screen of smartphones and smartwatches. Existing recognition systems still face drawbacks such as requiring to wear dedicated devices, relatively low accuracy and infeasible for cross domain identification, which greatly limit the usability of these systems. To address these issues, we propose WiWrite, an accurate device-free handwriting recognition system which allows writing in the air without a need of attaching any device to the user. Specifically, we use Commercial Off-The-Shelf (COTS) WiFi hardware to achieve fine-grained finger tracking. We develop a CSI division scheme to process the noisy raw WiFi channel state information (CSI), which stabilizes the CSI phase and reduces the noise of the CSI amplitude. To automatically retain low noise data for identification, we propose a self-paced dense convolutional network (SPDCN), which consists of the self-paced loss function based on a modified convolutional neural network, together with a dense convolutional network. Comprehensive experiments are conducted to show the merits of WiWrite, revealing that, the recognition accuracies for the same-size input and different-size input are 93.6% and 89.0%, respectively. Moreover, WiWrite can achieve a one-fit-for-all recognition regardless of environment diversities.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129767944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Achieving Consensus in Privacy-Preserving Decentralized Learning 在保护隐私的分散学习中达成共识
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00086
Liyao Xiang, Lingdong Wang, Shufan Wang, Baochun Li
Machine learning algorithms have been widely deployed on decentralized systems so that users with private, local data can jointly contribute to a better generalized model. One promising approach is Aggregation of Teacher Ensembles, which transfers knowledge of locally trained models to a global one without releasing any private data. However, previous methods largely focus on privately aggregating the local results without concerning their validity, which easily leads to erroneous aggregation results especially when data is unbalanced across different users. Hence, we propose a private consensus protocol — which reveals nothing else but the label with the highest votes, in the condition that the number of votes exceeds a given threshold. The purpose is to filter out undesired aggregation results that could hurt the aggregator model performance. Our protocol also guarantees differential privacy such that any adversary with auxiliary information cannot gain any additional knowledge from the results. We show that with our protocol, we achieve the same privacy level with an improved accuracy compared to previous works.
机器学习算法已被广泛部署在分散的系统上,因此拥有私有本地数据的用户可以共同为更好的广义模型做出贡献。一种很有前途的方法是教师集合,它将本地训练模型的知识转移到全球模型,而不释放任何私人数据。然而,以往的方法大多侧重于对局部结果的私下聚合,而不考虑其有效性,容易导致聚合结果错误,特别是在不同用户之间数据不平衡的情况下。因此,我们提出了一个私人共识协议——在票数超过给定阈值的情况下,该协议只显示票数最高的标签。目的是过滤掉可能损害聚合器模型性能的不希望的聚合结果。我们的协议还保证了差异隐私,这样任何具有辅助信息的攻击者都无法从结果中获得任何额外的信息。我们表明,与以前的工作相比,使用我们的协议,我们实现了相同的隐私级别,并且提高了准确性。
{"title":"Achieving Consensus in Privacy-Preserving Decentralized Learning","authors":"Liyao Xiang, Lingdong Wang, Shufan Wang, Baochun Li","doi":"10.1109/ICDCS47774.2020.00086","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00086","url":null,"abstract":"Machine learning algorithms have been widely deployed on decentralized systems so that users with private, local data can jointly contribute to a better generalized model. One promising approach is Aggregation of Teacher Ensembles, which transfers knowledge of locally trained models to a global one without releasing any private data. However, previous methods largely focus on privately aggregating the local results without concerning their validity, which easily leads to erroneous aggregation results especially when data is unbalanced across different users. Hence, we propose a private consensus protocol — which reveals nothing else but the label with the highest votes, in the condition that the number of votes exceeds a given threshold. The purpose is to filter out undesired aggregation results that could hurt the aggregator model performance. Our protocol also guarantees differential privacy such that any adversary with auxiliary information cannot gain any additional knowledge from the results. We show that with our protocol, we achieve the same privacy level with an improved accuracy compared to previous works.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131207105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application research on application performance management system in big data of power grid 电网大数据应用性能管理系统的应用研究
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00179
Deji Zhao, Bo Ning, Chao Yang
In order to solve the challenges brought by the operation and maintenance of power system in the era of big data, APM (Application Performance Management) system is introduced, which can monitor the operation of software and hardware system, show the health of system operation, and find the performance bottleneck. On the Hadoop platform, a big data deep mining and analysis platform based on map / reduce mode is built, integrating regression analysis, association analysis, data classification, data clustering, text mining, web mining and other data mining algorithms. It can complete 100TB level data retrieval in 30s, and then analyze; the system monitoring server can run stably in a cluster of 256 nodes. The use of APM system can prevent performance bottlenecks, greatly reduce the response time of performance problem processing, and quickly locate the location of performance problems, so as to ensure higher availability and stability of information system.
为了解决大数据时代电力系统运维带来的挑战,引入了APM (Application Performance Management)系统,该系统可以监控软硬件系统的运行情况,显示系统运行的健康状况,发现性能瓶颈。在Hadoop平台上,构建了基于map / reduce模式的大数据深度挖掘分析平台,集成了回归分析、关联分析、数据分类、数据聚类、文本挖掘、web挖掘等数据挖掘算法。可在30秒内完成100TB级别的数据检索,并进行分析;系统监控服务器可以在256节点的集群中稳定运行。使用APM系统可以防止性能瓶颈,大大缩短性能问题处理的响应时间,快速定位性能问题的位置,从而保证信息系统更高的可用性和稳定性。
{"title":"Application research on application performance management system in big data of power grid","authors":"Deji Zhao, Bo Ning, Chao Yang","doi":"10.1109/ICDCS47774.2020.00179","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00179","url":null,"abstract":"In order to solve the challenges brought by the operation and maintenance of power system in the era of big data, APM (Application Performance Management) system is introduced, which can monitor the operation of software and hardware system, show the health of system operation, and find the performance bottleneck. On the Hadoop platform, a big data deep mining and analysis platform based on map / reduce mode is built, integrating regression analysis, association analysis, data classification, data clustering, text mining, web mining and other data mining algorithms. It can complete 100TB level data retrieval in 30s, and then analyze; the system monitoring server can run stably in a cluster of 256 nodes. The use of APM system can prevent performance bottlenecks, greatly reduce the response time of performance problem processing, and quickly locate the location of performance problems, so as to ensure higher availability and stability of information system.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133410825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1