首页 > 最新文献

2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)最新文献

英文 中文
CODA: Improving Resource Utilization by Slimming and Co-locating DNN and CPU Jobs 结论:通过精简和共同定位DNN和CPU作业来提高资源利用率
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00069
Han Zhao, Weihao Cui, Quan Chen, Jingwen Leng, Kai Yu, Deze Zeng, Chao Li, M. Guo
While deep neural network (DNN) models are often trained on GPUs, many companies and research institutes build GPU clusters that are shared by different groups. On such GPU cluster, DNN training jobs also require CPU cores to run pre-processing, gradient synchronization. Our investigation shows that the number of cores allocated to a training job significantly impact its performance. To this end, we characterize representative deep learning models on their requirement for CPU cores under different GPU resource configurations, and study the sensitivity of these models to other CPU-side shared resources. Based on the characterization, we propose CODA, a scheduling system that is comprised of an adaptive CPU allocator, a real-time contention eliminator, and a multi-array job scheduler. Experimental results show that CODA improves GPU utilization by 20.8% on average without increasing the queuing time of CPU jobs.
虽然深度神经网络(DNN)模型通常在GPU上进行训练,但许多公司和研究机构构建的GPU集群由不同的团队共享。在这样的GPU集群上,DNN训练作业也需要CPU内核来进行预处理、梯度同步。我们的调查表明,分配给训练任务的核心数量会显著影响其性能。为此,我们对不同GPU资源配置下具有代表性的深度学习模型的CPU内核需求进行了表征,并研究了这些模型对其他CPU端共享资源的敏感性。在此基础上,我们提出了一个由自适应CPU分配器、实时争用消除器和多阵列作业调度器组成的调度系统CODA。实验结果表明,CODA在不增加CPU作业排队时间的情况下,平均提高了20.8%的GPU利用率。
{"title":"CODA: Improving Resource Utilization by Slimming and Co-locating DNN and CPU Jobs","authors":"Han Zhao, Weihao Cui, Quan Chen, Jingwen Leng, Kai Yu, Deze Zeng, Chao Li, M. Guo","doi":"10.1109/ICDCS47774.2020.00069","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00069","url":null,"abstract":"While deep neural network (DNN) models are often trained on GPUs, many companies and research institutes build GPU clusters that are shared by different groups. On such GPU cluster, DNN training jobs also require CPU cores to run pre-processing, gradient synchronization. Our investigation shows that the number of cores allocated to a training job significantly impact its performance. To this end, we characterize representative deep learning models on their requirement for CPU cores under different GPU resource configurations, and study the sensitivity of these models to other CPU-side shared resources. Based on the characterization, we propose CODA, a scheduling system that is comprised of an adaptive CPU allocator, a real-time contention eliminator, and a multi-array job scheduler. Experimental results show that CODA improves GPU utilization by 20.8% on average without increasing the queuing time of CPU jobs.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126163544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Deploy-able Privacy Preserving Collaborative ML 可部署的隐私保护协作式机器学习
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00184
Nandish Chattopadhyay, Ritabrata Maiti, A. Chattopadhyay
In the data-driven world, emerging technologies like the Internet of Things (IoT) and other crowd-sourced data sources like mobile devices etc. generate a tremendous volume of decentralized data that needs to be analyzed for obtaining useful insights, necessary for reliable decision making. Although the overall data is rich, contributors of such kind of data are reluctant to share their own data due to serious concerns regarding protection of their privacy; while those interested in harvesting the data are constrained by the limited computational resources available with each participant. In this paper, we propose an end-to-end algorithm that puts in coalescence the mechanism of learning collaboratively in a decentralized fashion, using Federated Learning, while preserving differential privacy of each participating client, which are typically conceived as resource-constrained edge devices. We have developed the proposed infrastructure and analyzed its performance from the standpoint of a machine learning task using standard metrics. We observed that the collaborative learning framework actually increases prediction capabilities in comparison to a centrally trained model (by 1-2%), without having to share data amongst the participants, while strong guarantees on privacy (ϵ, δ) can be provided with some compromise on performance (about 2-4%). Additionally, quantization of the model for deployment on edge devices do not degrade its capability, whilst enhancing the overall system efficiency.
在数据驱动的世界中,物联网(IoT)等新兴技术和其他众包数据源(如移动设备等)产生了大量分散的数据,需要对这些数据进行分析,以获得有用的见解,这是可靠决策所必需的。虽然整体数据丰富,但由于对隐私保护的严重担忧,此类数据的提供者不愿分享自己的数据;而那些对收集数据感兴趣的人则受到每个参与者可用的有限计算资源的限制。在本文中,我们提出了一种端到端算法,该算法使用联邦学习以分散的方式将协作学习机制合并在一起,同时保留每个参与客户端的差异隐私,这些客户端通常被认为是资源受限的边缘设备。我们已经开发了提议的基础设施,并使用标准指标从机器学习任务的角度分析了其性能。我们观察到,与集中训练的模型相比,协作学习框架实际上提高了预测能力(提高了1-2%),而无需在参与者之间共享数据,而对隐私(λ, δ)的强有力保证可以在性能上做出一些妥协(约2-4%)。此外,在边缘设备上部署模型的量化不会降低其能力,同时提高了整体系统效率。
{"title":"Deploy-able Privacy Preserving Collaborative ML","authors":"Nandish Chattopadhyay, Ritabrata Maiti, A. Chattopadhyay","doi":"10.1109/ICDCS47774.2020.00184","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00184","url":null,"abstract":"In the data-driven world, emerging technologies like the Internet of Things (IoT) and other crowd-sourced data sources like mobile devices etc. generate a tremendous volume of decentralized data that needs to be analyzed for obtaining useful insights, necessary for reliable decision making. Although the overall data is rich, contributors of such kind of data are reluctant to share their own data due to serious concerns regarding protection of their privacy; while those interested in harvesting the data are constrained by the limited computational resources available with each participant. In this paper, we propose an end-to-end algorithm that puts in coalescence the mechanism of learning collaboratively in a decentralized fashion, using Federated Learning, while preserving differential privacy of each participating client, which are typically conceived as resource-constrained edge devices. We have developed the proposed infrastructure and analyzed its performance from the standpoint of a machine learning task using standard metrics. We observed that the collaborative learning framework actually increases prediction capabilities in comparison to a centrally trained model (by 1-2%), without having to share data amongst the participants, while strong guarantees on privacy (ϵ, δ) can be provided with some compromise on performance (about 2-4%). Additionally, quantization of the model for deployment on edge devices do not degrade its capability, whilst enhancing the overall system efficiency.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125268944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study on Nine Years of Bitcoin Transactions: Understanding Real-world Behaviors of Bitcoin Miners and Users 9年比特币交易研究:理解比特币矿工和用户的现实行为
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00091
Binbing Hou, Feng Chen
Bitcoin is the world’s first blockchain-based, peer-to-peer cryptocurrency system. Being tremendously successful, the Bitcoin system is designed to support reliable, secure, and trusted transactions between untrusted peers. Since its release in 2009, the Bitcoin system has rapidly grown to an unprecedentedly large scale. However, the real-world behaviors of miners and users in the system and the efficacy of the original Bitcoin system design in the field deployment still remain unclear, hindering us from understanding its internals and developing the next-generation cryptocurrency system.In this paper, we study the behaviors of Bitcoin miners and users and their interactions based on quantitative analysis of more than nine years of Bitcoin transaction history, from its first release on January 3rd, 2009 to April 30th, 2018. We have analyzed over 300 million transaction records to study the transactions’ processing, confirmation, and implementation. We have obtained several critical findings regarding how the miners and users exploit the high degree of freedom provided by the Bitcoin system to achieve their own interests. For example, we find that miners often attempt to maximize their profits even by sacrificing system performance; users could try to speed up the transaction processing by mistakenly trading off security for reduced latency. Such unexpected behaviors, to some degree, deviate from the original design purposes of the Bitcoin system and could bring undesirable consequences. Besides revealing several unexpected behaviors of the Bitcoin miners and users in the real world, we have also discussed the associated system implications as well as optimization opportunities in the future.
比特币是世界上第一个基于区块链的点对点加密货币系统。由于取得了巨大的成功,比特币系统旨在支持不受信任的对等体之间可靠、安全和可信的交易。自2009年发布以来,比特币系统迅速发展到前所未有的规模。然而,系统中矿工和用户的真实行为以及原始比特币系统设计在现场部署中的功效仍然不清楚,阻碍了我们了解其内部和开发下一代加密货币系统。在本文中,我们通过对比特币从2009年1月3日首次发布到2018年4月30日的九年多的交易历史进行定量分析,研究了比特币矿工和用户的行为以及他们之间的互动。我们分析了3亿多笔交易记录,研究了交易的处理、确认和实现。关于矿工和用户如何利用比特币系统提供的高度自由来实现自己的利益,我们得到了一些重要的发现。例如,我们发现矿工经常试图通过牺牲系统性能来最大化他们的利润;用户可能会为了减少延迟而错误地牺牲安全性,从而试图加速事务处理。这种意想不到的行为在一定程度上偏离了比特币系统的原始设计目的,并可能带来不良后果。除了揭示现实世界中比特币矿工和用户的一些意想不到的行为外,我们还讨论了相关的系统影响以及未来的优化机会。
{"title":"A Study on Nine Years of Bitcoin Transactions: Understanding Real-world Behaviors of Bitcoin Miners and Users","authors":"Binbing Hou, Feng Chen","doi":"10.1109/ICDCS47774.2020.00091","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00091","url":null,"abstract":"Bitcoin is the world’s first blockchain-based, peer-to-peer cryptocurrency system. Being tremendously successful, the Bitcoin system is designed to support reliable, secure, and trusted transactions between untrusted peers. Since its release in 2009, the Bitcoin system has rapidly grown to an unprecedentedly large scale. However, the real-world behaviors of miners and users in the system and the efficacy of the original Bitcoin system design in the field deployment still remain unclear, hindering us from understanding its internals and developing the next-generation cryptocurrency system.In this paper, we study the behaviors of Bitcoin miners and users and their interactions based on quantitative analysis of more than nine years of Bitcoin transaction history, from its first release on January 3rd, 2009 to April 30th, 2018. We have analyzed over 300 million transaction records to study the transactions’ processing, confirmation, and implementation. We have obtained several critical findings regarding how the miners and users exploit the high degree of freedom provided by the Bitcoin system to achieve their own interests. For example, we find that miners often attempt to maximize their profits even by sacrificing system performance; users could try to speed up the transaction processing by mistakenly trading off security for reduced latency. Such unexpected behaviors, to some degree, deviate from the original design purposes of the Bitcoin system and could bring undesirable consequences. Besides revealing several unexpected behaviors of the Bitcoin miners and users in the real world, we have also discussed the associated system implications as well as optimization opportunities in the future.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114682460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Certificateless Consortium Blockchain for IoTs 物联网的无证书联盟区块链
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00054
Xiaobing Guo, Qingxiao Guo, Min Liu, Yunhao Wang, Yilong Ma, Bofu Yang
Blockchain is multi-centralized, immutable and traceable, thus is very suitable for distributed storage, privacy and security management in IoTs. However, most existing researches focus on the integration of public blockchain and IoTs. In fact, problems such as slow consensus, low transmission throughput, and completely open storage on the public blockchain are intolerable in IoT scenarios. Although consortium blockchain represented by Hyperledger Fabric has improved the transmission rate, its data security completely relies on the PKI-based certificate mechanism, resulting in transmission inefficiency and privacy leakage. In this paper, a key-derived Controllable Lightweight Secure Certificateless Signature (CLS2) algorithm is proposed to significantly improve the transmission efficiency and keep similar computation overhead of consortium blockchain. Compared with the existing certificateless signatures, CLS2 achieves more secure transactions, whose controllable anonymity and key-derived mechanism not only prevents public key replacement attacks and forged signature attacks, but also supports hierarchical privacy protection. Armed with CLS2, we design a consortium blockchain security architecture based on Hyper-ledger Fabric and edge computing. To the best of our knowledge, this is the first implementation of certificateless signature in consortium blockchain. We formally prove the security of our schemes in the random oracle model. Specifically, the security of the proposed scheme is reduced to the Elliptic curve discrete logarithm problem (ECDLP). Security analysis and experiments in IoT scenarios verify the feasibility and effectiveness of CLS2.
区块链具有多中心化、不可变和可追溯的特点,非常适合物联网中的分布式存储、隐私和安全管理。然而,现有的研究大多集中在公链与物联网的融合上。事实上,在物联网场景下,共识慢、传输吞吐量低、公有链完全开放存储等问题是无法容忍的。以Hyperledger Fabric为代表的联合体区块链虽然提高了传输速率,但其数据安全完全依赖于基于pki的证书机制,导致传输效率低下和隐私泄露。本文提出了一种基于密钥的可控轻量级安全无证书签名(CLS2)算法,以显著提高联盟区块链的传输效率并保持相似的计算开销。与现有的无证书签名相比,CLS2实现了更安全的交易,其可控制的匿名性和密钥派生机制不仅可以防止公钥替换攻击和伪造签名攻击,而且还支持分层隐私保护。利用CLS2,我们设计了一个基于超分类账结构和边缘计算的联盟区块链安全架构。据我们所知,这是联盟区块链中首次实现无证书签名。我们在随机oracle模型中正式证明了我们的方案的安全性。具体来说,该方案的安全性被简化为椭圆曲线离散对数问题(ECDLP)。物联网场景下的安全分析和实验验证了CLS2的可行性和有效性。
{"title":"A Certificateless Consortium Blockchain for IoTs","authors":"Xiaobing Guo, Qingxiao Guo, Min Liu, Yunhao Wang, Yilong Ma, Bofu Yang","doi":"10.1109/ICDCS47774.2020.00054","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00054","url":null,"abstract":"Blockchain is multi-centralized, immutable and traceable, thus is very suitable for distributed storage, privacy and security management in IoTs. However, most existing researches focus on the integration of public blockchain and IoTs. In fact, problems such as slow consensus, low transmission throughput, and completely open storage on the public blockchain are intolerable in IoT scenarios. Although consortium blockchain represented by Hyperledger Fabric has improved the transmission rate, its data security completely relies on the PKI-based certificate mechanism, resulting in transmission inefficiency and privacy leakage. In this paper, a key-derived Controllable Lightweight Secure Certificateless Signature (CLS2) algorithm is proposed to significantly improve the transmission efficiency and keep similar computation overhead of consortium blockchain. Compared with the existing certificateless signatures, CLS2 achieves more secure transactions, whose controllable anonymity and key-derived mechanism not only prevents public key replacement attacks and forged signature attacks, but also supports hierarchical privacy protection. Armed with CLS2, we design a consortium blockchain security architecture based on Hyper-ledger Fabric and edge computing. To the best of our knowledge, this is the first implementation of certificateless signature in consortium blockchain. We formally prove the security of our schemes in the random oracle model. Specifically, the security of the proposed scheme is reduced to the Elliptic curve discrete logarithm problem (ECDLP). Security analysis and experiments in IoT scenarios verify the feasibility and effectiveness of CLS2.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125519015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Distributed Storage System for Robust, Privacy-Preserving Surveillance Cameras 一种用于鲁棒、隐私保护监控摄像机的分布式存储系统
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00189
Jiaping Yu, Haiwen Chen, Kui Wu, Zhiping Cai, Jinhua Cui
Surveillance cameras have been extensively used in smart cities and high security zones. Recent incidents have posed a new, powerful geo-range attack, where the attacker may compromise a group of surveillance cameras located within an area. To tackle the problem, we develop a distributed camera storage system that distributes video content across geographically dispersed surveillance cameras. It generates secure copies for the video content and enhances robustness by judiciously distributing erasure coded video blocks across optimally-chosen surveillance cameras. We implement the distributed storage system for surveillance cameras and evaluate its performance via real-world field test. Our system is the first solution that can defend against geo-range attacks in a robust and privacy-preserving manner.
监控摄像头已广泛应用于智慧城市和高安全区。最近的事件引发了一种新的、强大的地理范围攻击,攻击者可能会破坏位于一个区域内的一组监控摄像头。为了解决这个问题,我们开发了一个分布式摄像机存储系统,该系统将视频内容分布在地理上分散的监控摄像机上。它为视频内容生成安全副本,并通过明智地在最佳选择的监控摄像机上分配擦除编码视频块来增强鲁棒性。我们实现了分布式存储系统用于监控摄像机,并通过实际现场测试对其性能进行了评估。我们的系统是第一个能够以健壮和保护隐私的方式防御地理范围攻击的解决方案。
{"title":"A Distributed Storage System for Robust, Privacy-Preserving Surveillance Cameras","authors":"Jiaping Yu, Haiwen Chen, Kui Wu, Zhiping Cai, Jinhua Cui","doi":"10.1109/ICDCS47774.2020.00189","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00189","url":null,"abstract":"Surveillance cameras have been extensively used in smart cities and high security zones. Recent incidents have posed a new, powerful geo-range attack, where the attacker may compromise a group of surveillance cameras located within an area. To tackle the problem, we develop a distributed camera storage system that distributes video content across geographically dispersed surveillance cameras. It generates secure copies for the video content and enhances robustness by judiciously distributing erasure coded video blocks across optimally-chosen surveillance cameras. We implement the distributed storage system for surveillance cameras and evaluate its performance via real-world field test. Our system is the first solution that can defend against geo-range attacks in a robust and privacy-preserving manner.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131808290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Latency, Capacity, and Distributed Minimum Spanning Tree† 延迟、容量和分布式最小生成树
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00055
John E. Augustine, Seth Gilbert, F. Kuhn, Peter Robinson, S. Sourav
We study the cost of distributed MST construction in the setting where each edge has a latency and a capacity, along with the weight. Edge latencies capture the delay on the links of the communication network, while capacity captures their throughput (the rate at which messages can be sent). Depending on how the edge latencies relate to the edge weights, we provide several tight bounds on the time and messages required to construct an MST.When edge weights exactly correspond with the latencies, we show that, perhaps interestingly, the bottleneck parameter in determining the running time of an algorithm is the total weight W of the MST (rather than the total number of nodes n, as in the standard CONGEST model). That is, we show a tight bound of $tilde Theta $ (D + $sqrt {W/c} $) rounds, where D refers to the latency diameter of the graph, W refers to the total weight of the constructed MST and edges have capacity c. The proposed algorithm sends Õ (m + W) messages, where m, the total number of edges in the network graph under consideration, is a known lower bound on message complexity for MST construction. We also show that Ω(W) is a lower bound for fast MST constructions.When the edge latencies and the corresponding edge weights are unrelated, and either can take arbitrary values, we show that (unlike the sub-linear time algorithms in the standard CONGEST model, on small diameter graphs), the best time complexity that can be achieved is Θ(D + n/c). However, if we restrict all edges to have equal latency ℓ and capacity c while having possibly different weights (weights could deviate arbitrarily from ℓ), we give an algorithm that constructs an MST in Õ (D + $sqrt {nell /c} $) time. In each case, we provide nearly matching upper and lower bounds.
我们研究了在每个边都有一个延迟和一个容量以及权重的情况下,分布式MST构建的成本。边缘延迟捕获通信网络链路上的延迟,而容量捕获它们的吞吐量(可以发送消息的速率)。根据边缘延迟与边缘权重的关系,我们对构建MST所需的时间和消息提供了几个严格的界限。当边缘权重与延迟完全对应时,我们发现,也许有趣的是,决定算法运行时间的瓶颈参数是MST的总权重W(而不是节点总数n,如在标准CONGEST模型中)。也就是说,我们展示了$tilde Theta $ (D + $sqrt {W/c} $)轮的紧界,其中D表示图的延迟直径,W表示构造的MST的总权重,边的容量为c。提出的算法发送Õ (m + W)条消息,其中m是考虑的网络图中边的总数,是MST构造的消息复杂度的已知下界。我们还证明Ω(W)是快速MST结构的下界。当边缘延迟和相应的边缘权重不相关,并且两者都可以取任意值时,我们表明(与标准CONGEST模型中的次线性时间算法不同,在小直径图上),可以实现的最佳时间复杂度为Θ(D + n/c)。然而,如果我们限制所有边具有相等的延迟时间和容量c,同时具有可能不同的权值(权值可以任意偏离r),我们给出了在Õ (D + $sqrt {nell /c} $)时间内构造MST的算法。在每种情况下,我们都提供了几乎匹配的上界和下界。
{"title":"Latency, Capacity, and Distributed Minimum Spanning Tree†","authors":"John E. Augustine, Seth Gilbert, F. Kuhn, Peter Robinson, S. Sourav","doi":"10.1109/ICDCS47774.2020.00055","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00055","url":null,"abstract":"We study the cost of distributed MST construction in the setting where each edge has a latency and a capacity, along with the weight. Edge latencies capture the delay on the links of the communication network, while capacity captures their throughput (the rate at which messages can be sent). Depending on how the edge latencies relate to the edge weights, we provide several tight bounds on the time and messages required to construct an MST.When edge weights exactly correspond with the latencies, we show that, perhaps interestingly, the bottleneck parameter in determining the running time of an algorithm is the total weight W of the MST (rather than the total number of nodes n, as in the standard CONGEST model). That is, we show a tight bound of $tilde Theta $ (D + $sqrt {W/c} $) rounds, where D refers to the latency diameter of the graph, W refers to the total weight of the constructed MST and edges have capacity c. The proposed algorithm sends Õ (m + W) messages, where m, the total number of edges in the network graph under consideration, is a known lower bound on message complexity for MST construction. We also show that Ω(W) is a lower bound for fast MST constructions.When the edge latencies and the corresponding edge weights are unrelated, and either can take arbitrary values, we show that (unlike the sub-linear time algorithms in the standard CONGEST model, on small diameter graphs), the best time complexity that can be achieved is Θ(D + n/c). However, if we restrict all edges to have equal latency ℓ and capacity c while having possibly different weights (weights could deviate arbitrarily from ℓ), we give an algorithm that constructs an MST in Õ (D + $sqrt {nell /c} $) time. In each case, we provide nearly matching upper and lower bounds.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133913159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Dispersion of Mobile Robots on Dynamic Graphs 动态图上移动机器人的高效分散
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00100
A. Kshemkalyani, A. R. Molla, Gokarna Sharma
The dispersion problem on graphs asks k ≤n robots placed initially arbitrarily on the nodes of an n-node anonymous graph to reposition autonomously to reach a configuration in which each robot is on a distinct node of the graph. This problem is of significant interest due to its relationship to other fundamental robot coordination problems, such as exploration, scattering, load balancing, and relocation of self-driving electric cars (robots) to recharge stations (nodes). The objective is to simultaneously minimize (or provide trade-off between) two fundamental performance metrics: (i) time to achieve dispersion and (ii) memory requirement at each robot. This problem has been relatively well-studied on static graphs. In this paper, we investigate it for the very first time on dynamic graphs. Particularly, we show that, even with unlimited memory at each robot and 1-neighborhood knowledge, dispersion is impossible to solve on dynamic graphs in the local communication model, where a robot can only communicate with other robots that are present at the same node. We then show that, even with unlimited memory at each robot but without 1-neighborhood knowledge, dispersion is impossible to solve in the global communication model, where a robot can communicate with any other robot in the graph possibly at different nodes. We then consider the global communication model with 1-neighborhood knowledge and establish a tight bound of Θ(k) on the time complexity of solving dispersion in any n-node arbitrary anonymous dynamic graph with Θ(log k) bits memory at each robot. Finally, we extend the fault-free algorithm to solve dispersion for (crash) faulty robots under the global model with 1-neighborhood knowledge.
图上的分散问题要求初始任意放置在n节点匿名图的节点上的k≤n个机器人自主重新定位,以达到每个机器人在图的不同节点上的配置。这个问题非常有趣,因为它与其他基本的机器人协调问题有关,例如自动驾驶电动汽车(机器人)的探索、分散、负载平衡以及向充电站(节点)的搬迁。目标是同时最小化(或提供权衡)两个基本性能指标:(i)实现分散的时间和(ii)每个机器人的内存需求。这个问题已经在静态图上得到了比较充分的研究。本文首次在动态图上研究了这一问题。特别是,我们表明,即使每个机器人具有无限的内存和1邻域知识,在局部通信模型中,动态图上的分散是不可能解决的,其中机器人只能与存在于同一节点的其他机器人通信。然后,我们证明,即使每个机器人具有无限的内存,但没有1邻域知识,在全局通信模型中,分散是不可能解决的,其中机器人可以与图中可能位于不同节点的任何其他机器人通信。然后,我们考虑具有1邻域知识的全局通信模型,并在每个机器人具有Θ(log k)位内存的任意n节点任意匿名动态图中求解色散的时间复杂度上建立了Θ(k)的紧界。最后,我们将无故障算法扩展到具有1邻域知识的全局模型下求解(碰撞)故障机器人的离散问题。
{"title":"Efficient Dispersion of Mobile Robots on Dynamic Graphs","authors":"A. Kshemkalyani, A. R. Molla, Gokarna Sharma","doi":"10.1109/ICDCS47774.2020.00100","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00100","url":null,"abstract":"The dispersion problem on graphs asks k ≤n robots placed initially arbitrarily on the nodes of an n-node anonymous graph to reposition autonomously to reach a configuration in which each robot is on a distinct node of the graph. This problem is of significant interest due to its relationship to other fundamental robot coordination problems, such as exploration, scattering, load balancing, and relocation of self-driving electric cars (robots) to recharge stations (nodes). The objective is to simultaneously minimize (or provide trade-off between) two fundamental performance metrics: (i) time to achieve dispersion and (ii) memory requirement at each robot. This problem has been relatively well-studied on static graphs. In this paper, we investigate it for the very first time on dynamic graphs. Particularly, we show that, even with unlimited memory at each robot and 1-neighborhood knowledge, dispersion is impossible to solve on dynamic graphs in the local communication model, where a robot can only communicate with other robots that are present at the same node. We then show that, even with unlimited memory at each robot but without 1-neighborhood knowledge, dispersion is impossible to solve in the global communication model, where a robot can communicate with any other robot in the graph possibly at different nodes. We then consider the global communication model with 1-neighborhood knowledge and establish a tight bound of Θ(k) on the time complexity of solving dispersion in any n-node arbitrary anonymous dynamic graph with Θ(log k) bits memory at each robot. Finally, we extend the fault-free algorithm to solve dispersion for (crash) faulty robots under the global model with 1-neighborhood knowledge.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130919856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Research on Data Protection Algorithm Based on Social Network 基于社交网络的数据保护算法研究
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00197
Yuanhu Yang, Jing Hu, Yusi Yang
In a social network, it needs to protect the network data effectively. To improve the security and privacy protection ability of the network data, a social network data protection algorithm is proposed based on dynamic cyclic encryption and link equilibrium configuration. The architecture model and routing control protocol of mobile social network are constructed. The mixed recommended values of user behavior attribution data of social network are calculated, and the data encryption in social network is realized by using sub-key random amplitude modulation method. The dynamic cyclic encryption algorithm is used to encrypt and transmit the data and the adaptive equalization scheduling of the data output of the social network is carried out by using the link equalization configuration method to improve the protection ability in the process of data transmission. The simulation results show that the proposed algorithm has good encryption ability, and the ability of data storage and transmission is improved.
在社交网络中,需要对网络数据进行有效的保护。为了提高网络数据的安全和隐私保护能力,提出了一种基于动态循环加密和链路均衡配置的社交网络数据保护算法。构建了移动社交网络的体系结构模型和路由控制协议。计算了社交网络用户行为归因数据的混合推荐值,采用子密钥随机调幅方法实现了社交网络中的数据加密。采用动态循环加密算法对数据进行加密和传输,采用链路均衡配置方法对社交网络的数据输出进行自适应均衡调度,提高数据传输过程中的保护能力。仿真结果表明,该算法具有良好的加密能力,提高了数据的存储和传输能力。
{"title":"Research on Data Protection Algorithm Based on Social Network","authors":"Yuanhu Yang, Jing Hu, Yusi Yang","doi":"10.1109/ICDCS47774.2020.00197","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00197","url":null,"abstract":"In a social network, it needs to protect the network data effectively. To improve the security and privacy protection ability of the network data, a social network data protection algorithm is proposed based on dynamic cyclic encryption and link equilibrium configuration. The architecture model and routing control protocol of mobile social network are constructed. The mixed recommended values of user behavior attribution data of social network are calculated, and the data encryption in social network is realized by using sub-key random amplitude modulation method. The dynamic cyclic encryption algorithm is used to encrypt and transmit the data and the adaptive equalization scheduling of the data output of the social network is carried out by using the link equalization configuration method to improve the protection ability in the process of data transmission. The simulation results show that the proposed algorithm has good encryption ability, and the ability of data storage and transmission is improved.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132048989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overlapped Mobile Charging for Sensor Networks 传感器网络的重叠移动收费
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00158
Sheng Zhang, Yung-Shiuan Liang, Zhuzhong Qian, Mingjun Xiao, Jidong Ge, Jie Wu, Sanglu Lu
In this paper, we consider a fundamental problem: given one mobile charger that can charge multiple sensor nodes simultaneously, how we can schedule it to charge a given WSN to maximize the energy usage effectiveness (EUE)? We propose a novel charging paradigm–Overlapped Mobile Charging (OMC)– the first of its kind to the best of our knowledge. Firstly, OMC clusters sensor nodes into multiple non-overlapped sets using k-means evaluated by the Davies-Bouldin Index, such that the sensor nodes in each set have similar recharging cycles. Secondly, for each set of sensor nodes, OMC further divides them into multiple overlapped groups, and charges each group at different locations for different time durations to make sure that each overlapped sensor node just receives its required energy from multiple charging locations.
在本文中,我们考虑了一个基本问题:给定一个可以同时为多个传感器节点充电的移动充电器,我们如何安排它为给定的WSN充电以最大化能源使用效率(EUE)?我们提出了一种新的充电模式——重叠移动充电(OMC)——据我们所知,这是第一次。首先,OMC利用davis - bouldin指数评估的k-means将传感器节点聚为多个不重叠的集合,使每个集合中的传感器节点具有相似的充电周期。其次,对于每一组传感器节点,OMC进一步将其划分为多个重叠的组,并在不同的位置对每一组进行不同的充电时间,以确保每个重叠的传感器节点都能从多个充电位置获得所需的能量。
{"title":"Overlapped Mobile Charging for Sensor Networks","authors":"Sheng Zhang, Yung-Shiuan Liang, Zhuzhong Qian, Mingjun Xiao, Jidong Ge, Jie Wu, Sanglu Lu","doi":"10.1109/ICDCS47774.2020.00158","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00158","url":null,"abstract":"In this paper, we consider a fundamental problem: given one mobile charger that can charge multiple sensor nodes simultaneously, how we can schedule it to charge a given WSN to maximize the energy usage effectiveness (EUE)? We propose a novel charging paradigm–Overlapped Mobile Charging (OMC)– the first of its kind to the best of our knowledge. Firstly, OMC clusters sensor nodes into multiple non-overlapped sets using k-means evaluated by the Davies-Bouldin Index, such that the sensor nodes in each set have similar recharging cycles. Secondly, for each set of sensor nodes, OMC further divides them into multiple overlapped groups, and charges each group at different locations for different time durations to make sure that each overlapped sensor node just receives its required energy from multiple charging locations.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133854335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Merits of Ranking in Structured Network Pruning 评价结构化网络修剪中排序的优点
Pub Date : 2020-11-01 DOI: 10.1109/ICDCS47774.2020.00183
Kuldeep Sharma, N. Ramakrishnan, Alok Prakash, S. Lam, T. Srikanthan
Pruning of channels in trained deep neural networks has been widely used to implement efficient DNNs that can be deployed on embedded/mobile devices. Majority of existing techniques employ criteria-based sorting of the channels to preserve salient channels during pruning as well as to automatically determine the pruned network architecture. However, recent studies on widely used DNNs, such as VGG-16, have shown that selecting and preserving salient channels using pruning criteria is not necessary since the plasticity of the network allows the accuracy to be recovered through fine-tuning. In this work, we further explore the value of the ranking criteria in pruning to show that if channels are removed gradually and iteratively, alternating with fine-tuning on the target dataset, ranking criteria are indeed not necessary to select redundant channels. Experimental results confirm that even a random selection of channels for pruning leads to similar performance (accuracy). In addition, we demonstrate that even a simple pruning technique that uniformly removes channels from all layers in the network, performs similar to existing ranking criteria-based approaches, while leading to lower inference time (GFLOPs). Our extensive evaluations include the context of embedded implementations of DNNs - specifically, on small networks such as SqueezeNet and at aggressive pruning percentages. We leverage these insights, to propose a GFLOPs-aware iterative pruning strategy that does not rely on any ranking criteria and yet can further lead to lower inference time by 15% without sacrificing accuracy.
在训练好的深度神经网络中,通道修剪已被广泛用于实现可部署在嵌入式/移动设备上的高效深度神经网络。现有的大多数技术都采用基于标准的通道排序,以在修剪过程中保留显著通道,并自动确定修剪后的网络结构。然而,最近对广泛使用的dnn(如VGG-16)的研究表明,使用修剪标准选择和保留显著通道是不必要的,因为网络的可塑性允许通过微调恢复精度。在这项工作中,我们进一步探讨了排序标准在修剪中的价值,表明如果频道是逐步迭代地删除的,并且在目标数据集上交替进行微调,那么选择冗余频道确实不需要排序标准。实验结果证实,即使随机选择修剪通道,也会产生相似的性能(精度)。此外,我们证明,即使是一种简单的修剪技术,即从网络中的所有层中均匀地删除通道,其性能与现有的基于排名标准的方法相似,同时导致更低的推理时间(GFLOPs)。我们的广泛评估包括dnn的嵌入式实现的背景-特别是在小型网络上,如SqueezeNet和积极的修剪百分比。我们利用这些见解,提出了一种不依赖于任何排名标准的gflops感知迭代修剪策略,该策略可以在不牺牲准确性的情况下进一步降低15%的推理时间。
{"title":"Evaluating the Merits of Ranking in Structured Network Pruning","authors":"Kuldeep Sharma, N. Ramakrishnan, Alok Prakash, S. Lam, T. Srikanthan","doi":"10.1109/ICDCS47774.2020.00183","DOIUrl":"https://doi.org/10.1109/ICDCS47774.2020.00183","url":null,"abstract":"Pruning of channels in trained deep neural networks has been widely used to implement efficient DNNs that can be deployed on embedded/mobile devices. Majority of existing techniques employ criteria-based sorting of the channels to preserve salient channels during pruning as well as to automatically determine the pruned network architecture. However, recent studies on widely used DNNs, such as VGG-16, have shown that selecting and preserving salient channels using pruning criteria is not necessary since the plasticity of the network allows the accuracy to be recovered through fine-tuning. In this work, we further explore the value of the ranking criteria in pruning to show that if channels are removed gradually and iteratively, alternating with fine-tuning on the target dataset, ranking criteria are indeed not necessary to select redundant channels. Experimental results confirm that even a random selection of channels for pruning leads to similar performance (accuracy). In addition, we demonstrate that even a simple pruning technique that uniformly removes channels from all layers in the network, performs similar to existing ranking criteria-based approaches, while leading to lower inference time (GFLOPs). Our extensive evaluations include the context of embedded implementations of DNNs - specifically, on small networks such as SqueezeNet and at aggressive pruning percentages. We leverage these insights, to propose a GFLOPs-aware iterative pruning strategy that does not rely on any ranking criteria and yet can further lead to lower inference time by 15% without sacrificing accuracy.","PeriodicalId":158630,"journal":{"name":"2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127179275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 IEEE 40th International Conference on Distributed Computing Systems (ICDCS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1