首页 > 最新文献

Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems最新文献

英文 中文
A Real-time Indoor Tracking System in Smartphones 智能手机的实时室内跟踪系统
J. Carrera, Zan Li, Zhongliang Zhao, T. Braun, A. Neto
The rapid growth area of ubiquitous applications and location-based services has made indoor localization an interesting topic for research. Some indoor localization solutions for smartphones exploit radio information and Inertial Measurement Units (IMUs), which are embedded in most of the modern smartphones. In this work, we propose to fuse WiFi Receiving Signal Strength Indicator (RSSI) readings, IMUs, and floor plan information in an enhanced particle filter to achieve high accuracy and stable performance in the tracking process. We provide an efficient double resampling method to mitigate errors caused by off-the-shelf IMUs and WiFi sensors embedded in commodity smartphones. The algorithms are designed in a terminal-based system, which consists of commercial smartphones and WiFi access points. We evaluate our system in two complex environments along moving paths. Experiment results show that our tracking method can achieve the average tracking error of $1.01$ meters and $90%$ accuracy of $1.7$ meters.
无处不在的应用和基于位置的服务的快速增长使得室内定位成为一个有趣的研究课题。一些智能手机的室内定位解决方案利用了无线电信息和惯性测量单元(imu),它们嵌入在大多数现代智能手机中。在这项工作中,我们提出将WiFi接收信号强度指标(RSSI)读数、imu和平面图信息融合在一个增强的粒子滤波器中,以实现跟踪过程中的高精度和稳定的性能。我们提供了一种有效的双重重采样方法,以减轻商用智能手机中嵌入的现成imu和WiFi传感器造成的误差。算法是在基于终端的系统中设计的,该系统由商用智能手机和WiFi接入点组成。我们在两个沿着移动路径的复杂环境中评估我们的系统。实验结果表明,我们的跟踪方法平均跟踪误差为1.01美元米,跟踪精度为1.7美元米。
{"title":"A Real-time Indoor Tracking System in Smartphones","authors":"J. Carrera, Zan Li, Zhongliang Zhao, T. Braun, A. Neto","doi":"10.1145/2988287.2989142","DOIUrl":"https://doi.org/10.1145/2988287.2989142","url":null,"abstract":"The rapid growth area of ubiquitous applications and location-based services has made indoor localization an interesting topic for research. Some indoor localization solutions for smartphones exploit radio information and Inertial Measurement Units (IMUs), which are embedded in most of the modern smartphones. In this work, we propose to fuse WiFi Receiving Signal Strength Indicator (RSSI) readings, IMUs, and floor plan information in an enhanced particle filter to achieve high accuracy and stable performance in the tracking process. We provide an efficient double resampling method to mitigate errors caused by off-the-shelf IMUs and WiFi sensors embedded in commodity smartphones. The algorithms are designed in a terminal-based system, which consists of commercial smartphones and WiFi access points. We evaluate our system in two complex environments along moving paths. Experiment results show that our tracking method can achieve the average tracking error of $1.01$ meters and $90%$ accuracy of $1.7$ meters.","PeriodicalId":158785,"journal":{"name":"Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114212281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Modeling and Analysis: Energy Harvesting in the Internet of Things 建模与分析:物联网中的能量收集
Yu-Hsuan Chen, Bryan K. F. Ng, Winston K.G. Seah, Ai-Chun Pang
In the Internet of Things(IoT), the size constraint of those small and embedded devices limits the network lifetime because limited energy can be stored on these devices. In recent years, energy harvesting technology has attracted increasing attention, due to its ability to extend the network lifetime significantly. However, the performance of IoT devices powered by energy harvesting sources has not been fully analyzed and understood. In this paper, we model the energy harvesting process in IoT devices using slotted Carrier Sense Multiple Access with Collision Avoidance (CSMA /CA) mechanism of IEEE 802.15.4 standard, and analyze the performance in terms of delay and throughput. Our new model successfully integrates the energy harvesting process and binary backoff process through a unified Markov chain model. Finally, the new model is validated by simulation and the throughput errors between simulation and analytical model are no more than 6%. We demonstrate the application of the model with different energy harvesting rate corresponding to different sources such as solar and vibration energy harvesters.
在物联网(IoT)中,这些小型嵌入式设备的尺寸限制限制了网络的寿命,因为这些设备可以存储的能量有限。近年来,能量收集技术因其能够显著延长网络寿命而受到越来越多的关注。然而,由能量收集源供电的物联网设备的性能尚未得到充分的分析和理解。本文采用IEEE 802.15.4标准的开槽载波感知多址防碰撞(CSMA /CA)机制对物联网设备中的能量收集过程进行建模,并从延迟和吞吐量方面分析其性能。我们的新模型通过统一的马尔可夫链模型成功地将能量收集过程和二元回退过程集成在一起。最后,通过仿真验证了新模型的有效性,仿真结果与解析模型的吞吐量误差不超过6%。针对不同的能源,如太阳能和振动能量采集器,我们演示了不同能量收集率的模型的应用。
{"title":"Modeling and Analysis: Energy Harvesting in the Internet of Things","authors":"Yu-Hsuan Chen, Bryan K. F. Ng, Winston K.G. Seah, Ai-Chun Pang","doi":"10.1145/2988287.2989144","DOIUrl":"https://doi.org/10.1145/2988287.2989144","url":null,"abstract":"In the Internet of Things(IoT), the size constraint of those small and embedded devices limits the network lifetime because limited energy can be stored on these devices. In recent years, energy harvesting technology has attracted increasing attention, due to its ability to extend the network lifetime significantly. However, the performance of IoT devices powered by energy harvesting sources has not been fully analyzed and understood. In this paper, we model the energy harvesting process in IoT devices using slotted Carrier Sense Multiple Access with Collision Avoidance (CSMA /CA) mechanism of IEEE 802.15.4 standard, and analyze the performance in terms of delay and throughput. Our new model successfully integrates the energy harvesting process and binary backoff process through a unified Markov chain model. Finally, the new model is validated by simulation and the throughput errors between simulation and analytical model are no more than 6%. We demonstrate the application of the model with different energy harvesting rate corresponding to different sources such as solar and vibration energy harvesters.","PeriodicalId":158785,"journal":{"name":"Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123777450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Neighbor Contamination to Achieve Complete Bottleneck Control 邻域污染达到完全瓶颈控制
Nadav Schweitzer, Ariel Stulman, A. Shabtai
Black-holes, gray-holes and, wormholes, are devastating to the correct operation of any network. These attacks (among others) are based on the premise that packets will travel through compromised nodes, and methods exist to coax routing into these traps. Detection of these attacks are mainly centered around finding the subversion in action. In networks, bottleneck nodes -- those that sit on many potential routes between sender and receiver -- are an optimal location for compromise. Finding naturally occurring path bottlenecks, however, does not entitle network subversion, and as such are more difficult to detect. The dynamic nature of mobile ad-hoc networks (manets) causes ubiquitous routing algorithms to be even more susceptible to this class of attacks. Finding perceived bottlenecks in an olsr based manet, is able to capture between 50%-75% of data. In this paper we propose a method of subtly expanding perceived bottlenecks into complete bottlenecks, raising capture rate up to 99%; albeit, at high cost. We further tune the method to reduce cost, and measure the corresponding capture rate.
黑洞、灰洞和虫洞对任何网络的正常运行都是毁灭性的。这些攻击(以及其他攻击)是基于这样一个前提,即数据包将通过受损的节点传播,并且存在诱骗路由进入这些陷阱的方法。对这些攻击的检测主要集中在发现活动中的颠覆。在网络中,瓶颈节点——那些位于发送方和接收方之间的许多潜在路由上的节点——是妥协的最佳位置。然而,发现自然发生的路径瓶颈并不意味着要颠覆网络,因此更难以检测到。移动自组织网络(manet)的动态特性导致无处不在的路由算法更容易受到这类攻击。在基于olsr的manet中发现可感知的瓶颈,能够捕获50%-75%的数据。在本文中,我们提出了一种巧妙地将感知瓶颈扩展为完全瓶颈的方法,将捕获率提高到99%;尽管代价高昂。我们进一步调整方法以降低成本,并测量相应的捕获率。
{"title":"Neighbor Contamination to Achieve Complete Bottleneck Control","authors":"Nadav Schweitzer, Ariel Stulman, A. Shabtai","doi":"10.1145/2988287.2989146","DOIUrl":"https://doi.org/10.1145/2988287.2989146","url":null,"abstract":"Black-holes, gray-holes and, wormholes, are devastating to the correct operation of any network. These attacks (among others) are based on the premise that packets will travel through compromised nodes, and methods exist to coax routing into these traps. Detection of these attacks are mainly centered around finding the subversion in action. In networks, bottleneck nodes -- those that sit on many potential routes between sender and receiver -- are an optimal location for compromise. Finding naturally occurring path bottlenecks, however, does not entitle network subversion, and as such are more difficult to detect. The dynamic nature of mobile ad-hoc networks (manets) causes ubiquitous routing algorithms to be even more susceptible to this class of attacks. Finding perceived bottlenecks in an olsr based manet, is able to capture between 50%-75% of data. In this paper we propose a method of subtly expanding perceived bottlenecks into complete bottlenecks, raising capture rate up to 99%; albeit, at high cost. We further tune the method to reduce cost, and measure the corresponding capture rate.","PeriodicalId":158785,"journal":{"name":"Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125022645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Adaptive Access Barring Scheme For Heavily Congested M2M Networks 重度拥塞M2M网络的动态自适应接入限制方案
Meriam Bouzouita, Y. H. Aoul, N. Zangar, G. Rubino, S. Tabbane
The massive deployment of Machine-to-machine (M2M) communications may overwhelm the cellular network by imposing strong constraints on the Radio Access Network (RAN). As the base station cannot accurately get the exact number of M2M arrivals, it cannot really predict the overload status. Consequently, a better estimation of this number would efficiently help to overcome the risk of congestion. In this paper, we proposed a novel fluid model for M2M communications, which allows gaining an enhanced understanding of the dynamics of such systems. The provided analysis of the model was used to devise a new method to estimate accurately the number of M2M devices. We proposed, then, a novel implementation of the ACB process, which dynamically computes the ACB factor according to the network's overload conditions while includes a corrective action adapting the controller action based on the mismatch existing between the computed and the targeted mean load. The simulation results show that the proposed algorithms allow improving considerably the estimation of the number of M2M devices' arrivals, while outperforming existing techniques.
机器对机器(M2M)通信的大规模部署可能会对无线接入网(RAN)施加强大的限制,从而使蜂窝网络不堪重负。由于基站无法准确得到M2M到达的确切数量,因此无法真正预测过载状态。因此,更好地估计这个数字将有效地帮助克服拥堵的风险。在本文中,我们提出了一种新的M2M通信流体模型,该模型可以增强对此类系统动力学的理解。利用所提供的模型分析,设计了一种新的方法来准确估计M2M设备的数量。然后,我们提出了一种新的ACB过程实现,该过程根据网络的过载条件动态计算ACB因子,同时包含基于计算结果与目标平均负载之间存在的不匹配而适应控制器动作的校正动作。仿真结果表明,所提出的算法大大提高了对M2M设备到达数量的估计,同时优于现有的技术。
{"title":"Dynamic Adaptive Access Barring Scheme For Heavily Congested M2M Networks","authors":"Meriam Bouzouita, Y. H. Aoul, N. Zangar, G. Rubino, S. Tabbane","doi":"10.1145/2988287.2989174","DOIUrl":"https://doi.org/10.1145/2988287.2989174","url":null,"abstract":"The massive deployment of Machine-to-machine (M2M) communications may overwhelm the cellular network by imposing strong constraints on the Radio Access Network (RAN). As the base station cannot accurately get the exact number of M2M arrivals, it cannot really predict the overload status. Consequently, a better estimation of this number would efficiently help to overcome the risk of congestion. In this paper, we proposed a novel fluid model for M2M communications, which allows gaining an enhanced understanding of the dynamics of such systems. The provided analysis of the model was used to devise a new method to estimate accurately the number of M2M devices. We proposed, then, a novel implementation of the ACB process, which dynamically computes the ACB factor according to the network's overload conditions while includes a corrective action adapting the controller action based on the mismatch existing between the computed and the targeted mean load. The simulation results show that the proposed algorithms allow improving considerably the estimation of the number of M2M devices' arrivals, while outperforming existing techniques.","PeriodicalId":158785,"journal":{"name":"Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114807695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Semi-Supervised Adaboost Technique for Network Anomaly Detection 一种新的半监督Adaboost网络异常检测技术
Yali Yuan, Georgios Kaklamanos, D. Hogrefe
With the developing of Internet, network intrusion has become more and more common. Quickly identifying and preventing network attacks is getting increasingly more important and difficult. Machine learning techniques have already proven to be robust methods in detecting malicious activities and network threats. Ensemble-based and semi-supervised learning methods are some of the areas that receive most attention in machine learning today. However relatively little attention has been given in combining these methods. To overcome such limitations, this paper proposes a novel network anomaly detection method by using a combination of a tri-training approach with Adaboost algorithms. The bootstrap samples of tri-training are replaced by three different Adaboost algorithms to create the diversity. We run 30 iteration for every simulation to obtain the average results. Simulations indicate that our proposed semi-supervised Adaboost algorithm is reproducible and consistent over a different number of runs. It outperforms other state-of-the-art learning algorithms, even with a small part of labeled data in the training phase. Specifically, it has a very short execution time and a good balance between the detection rate as well as the false-alarm rate.
随着互联网的发展,网络入侵变得越来越普遍。快速识别和预防网络攻击变得越来越重要和困难。机器学习技术已经被证明是检测恶意活动和网络威胁的强大方法。基于集成和半监督的学习方法是当今机器学习中最受关注的一些领域。然而,很少有人注意将这些方法结合起来。为了克服这些限制,本文提出了一种新的网络异常检测方法,该方法将三训练方法与Adaboost算法相结合。三组训练的bootstrap样本被三种不同的Adaboost算法取代,以创造多样性。我们对每个模拟进行30次迭代以获得平均结果。仿真表明,我们提出的半监督Adaboost算法在不同次数的运行中具有可重复性和一致性。它优于其他最先进的学习算法,即使在训练阶段使用一小部分标记数据。具体来说,它的执行时间非常短,并且在检测率和误报率之间取得了很好的平衡。
{"title":"A Novel Semi-Supervised Adaboost Technique for Network Anomaly Detection","authors":"Yali Yuan, Georgios Kaklamanos, D. Hogrefe","doi":"10.1145/2988287.2989177","DOIUrl":"https://doi.org/10.1145/2988287.2989177","url":null,"abstract":"With the developing of Internet, network intrusion has become more and more common. Quickly identifying and preventing network attacks is getting increasingly more important and difficult. Machine learning techniques have already proven to be robust methods in detecting malicious activities and network threats. Ensemble-based and semi-supervised learning methods are some of the areas that receive most attention in machine learning today. However relatively little attention has been given in combining these methods. To overcome such limitations, this paper proposes a novel network anomaly detection method by using a combination of a tri-training approach with Adaboost algorithms. The bootstrap samples of tri-training are replaced by three different Adaboost algorithms to create the diversity. We run 30 iteration for every simulation to obtain the average results. Simulations indicate that our proposed semi-supervised Adaboost algorithm is reproducible and consistent over a different number of runs. It outperforms other state-of-the-art learning algorithms, even with a small part of labeled data in the training phase. Specifically, it has a very short execution time and a good balance between the detection rate as well as the false-alarm rate.","PeriodicalId":158785,"journal":{"name":"Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121775213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A Virtual Local-hub Solution with Function Module Sharing for Wearable Devices 一种可穿戴设备功能模块共享的虚拟本地中心解决方案
Hsin-Peng Lin, Yuan-Yao Shih, Ai-Chun Pang, Yuan-Yao Lou
Wearable devices, which are small electronic devices worn on a human body, are equipped with low level of processing and storage capacities and offer some types of integrated functionalities. Recently, wearable device is becoming increasingly popular, various kinds of wearable device are launched in the market; however, wearable devices require a powerful local-hub, most are smartphone, to replenish processing and storage capacities for advanced functionalities. Sometime it may be inconvenient to carry the local-hub (smartphone); thus, many wearable devices are equipped with Wi-Fi interface, enabling them to exchange data with local-hub though the Internet when the local-hub is not nearby. However, this results in long response time and restricted functionalities. In this paper, we present a virtual local-hub solution, which utilizes network equipment nearby (e.g., Wi-Fi APs) as the local-hub. Since migrating all applications serving the wearable devices respectively takes too much networking and storage resources, the proposed solution deploys function modules to multiple network nodes and enables remote function module sharing among different users and applications. To reduce the impact of the solution on the network bandwidth, we propose a heuristic algorithm for function module allocation with the objective of minimizing total bandwidth consumption. We conduct series of experiments, and the results show that the proposed solution can reduce the bandwidth consumption by up to half and still serve all requests given a large number of service requests.
可穿戴设备是一种佩戴在人体上的小型电子设备,具有低水平的处理和存储能力,并提供某些类型的集成功能。最近,可穿戴设备越来越受欢迎,各种可穿戴设备在市场上推出;然而,可穿戴设备需要一个强大的本地中心,大多数是智能手机,以补充高级功能的处理和存储能力。有时携带本地集线器(智能手机)可能不方便;因此,许多可穿戴设备都配备了Wi-Fi接口,可以在本地集线器不在附近时通过互联网与本地集线器交换数据。然而,这将导致较长的响应时间和受限的功能。在本文中,我们提出了一个虚拟的本地集线器解决方案,它利用附近的网络设备(例如Wi-Fi ap)作为本地集线器。由于分别迁移所有服务于可穿戴设备的应用会占用过多的网络资源和存储资源,本方案将功能模块部署到多个网络节点,实现不同用户和应用之间的远程功能模块共享。为了减少解决方案对网络带宽的影响,我们提出了一种以最小化总带宽消耗为目标的启发式功能模块分配算法。我们进行了一系列的实验,结果表明,所提出的解决方案可以将带宽消耗减少一半,并且在大量业务请求的情况下仍然可以满足所有请求。
{"title":"A Virtual Local-hub Solution with Function Module Sharing for Wearable Devices","authors":"Hsin-Peng Lin, Yuan-Yao Shih, Ai-Chun Pang, Yuan-Yao Lou","doi":"10.1145/2988287.2989150","DOIUrl":"https://doi.org/10.1145/2988287.2989150","url":null,"abstract":"Wearable devices, which are small electronic devices worn on a human body, are equipped with low level of processing and storage capacities and offer some types of integrated functionalities. Recently, wearable device is becoming increasingly popular, various kinds of wearable device are launched in the market; however, wearable devices require a powerful local-hub, most are smartphone, to replenish processing and storage capacities for advanced functionalities. Sometime it may be inconvenient to carry the local-hub (smartphone); thus, many wearable devices are equipped with Wi-Fi interface, enabling them to exchange data with local-hub though the Internet when the local-hub is not nearby. However, this results in long response time and restricted functionalities. In this paper, we present a virtual local-hub solution, which utilizes network equipment nearby (e.g., Wi-Fi APs) as the local-hub. Since migrating all applications serving the wearable devices respectively takes too much networking and storage resources, the proposed solution deploys function modules to multiple network nodes and enables remote function module sharing among different users and applications. To reduce the impact of the solution on the network bandwidth, we propose a heuristic algorithm for function module allocation with the objective of minimizing total bandwidth consumption. We conduct series of experiments, and the results show that the proposed solution can reduce the bandwidth consumption by up to half and still serve all requests given a large number of service requests.","PeriodicalId":158785,"journal":{"name":"Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"89 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114935111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Effective Selection of Targeted Advertisements for Vehicular Users 有效选择针对车辆用户的定向广告
Gil Einziger, C. Chiasserini, F. Malandrino
This paper focuses on targeted advertising for vehicular users, where users receive advertisements (ads) from roadside units and the vehicle onboard system displays only ads that are relevant to the user. A broker broadcasts ads and is paid by advertisers based on the number of vehicles that displayed each ad. The problem we study is the following: given that the broker can broadcast a limited number of ads, what is the strategy for ad selection that maximizes the broker's revenue? We first identify the conflict existing between users' interests and broker's revenue as a critical feature of this scenario, which may dramatically reduce the broker's revenue. Then, given the problem complexity, we propose Volfied, an algorithm that solves this conflict, allows for near-optimal broker's revenue and has very limited computational complexity. Our results show that Volfied increases the broker's revenue by up to 70% with respect to state-of-the-art alternatives.
本文主要研究针对车载用户的定向广告,即用户接收来自路边单位的广告(ads),车载系统只显示与用户相关的广告。经纪人播放广告,并根据显示每个广告的车辆数量由广告商付费。我们研究的问题是这样的:给定经纪人可以播放有限数量的广告,什么是广告选择策略,使经纪人的收入最大化?我们首先将用户利益和经纪人收入之间存在的冲突确定为该场景的一个关键特征,这可能会大大减少经纪人的收入。然后,考虑到问题的复杂性,我们提出了Volfied,一种解决这种冲突的算法,允许接近最优的经纪人收入,并且具有非常有限的计算复杂性。我们的研究结果表明,与最先进的替代方案相比,volify使经纪商的收入增加了70%。
{"title":"Effective Selection of Targeted Advertisements for Vehicular Users","authors":"Gil Einziger, C. Chiasserini, F. Malandrino","doi":"10.1145/2988287.2989136","DOIUrl":"https://doi.org/10.1145/2988287.2989136","url":null,"abstract":"This paper focuses on targeted advertising for vehicular users, where users receive advertisements (ads) from roadside units and the vehicle onboard system displays only ads that are relevant to the user. A broker broadcasts ads and is paid by advertisers based on the number of vehicles that displayed each ad. The problem we study is the following: given that the broker can broadcast a limited number of ads, what is the strategy for ad selection that maximizes the broker's revenue? We first identify the conflict existing between users' interests and broker's revenue as a critical feature of this scenario, which may dramatically reduce the broker's revenue. Then, given the problem complexity, we propose Volfied, an algorithm that solves this conflict, allows for near-optimal broker's revenue and has very limited computational complexity. Our results show that Volfied increases the broker's revenue by up to 70% with respect to state-of-the-art alternatives.","PeriodicalId":158785,"journal":{"name":"Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114109039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Approach to Rule Placement in Software-Defined Networks 软件定义网络中的规则放置方法
Wenjie Li, Zheng Qin, H. Yin, Rui Li, L. Ou, Heng Li
Software-Defined Networks (SDN) is a trend of research in networks. Rule placement, a common operation for network administrators, has become more complicated due to the capacity limitation of devices in which the large number of rules are deployed. Prior works on rule placement mostly consider the influence on rule placement incurred by the rules in a single device. However, the position relationships between neighbor devices have influences on rule placement. Our basic idea is to classify the position relationships into two categories: the serial relationship and the parallel relationship, and we present a novel strategy for rule placement based on the two different position relationships. There are two challenges of implementing our strategies: to check whether a rule is contained by a rule set or not and to check whether a rule can be merged by other rules or not.To overcome the challenges, we propose a novel data structure called OPTree to represent the rules, which is convenient to check whether a rule is covered by other rules. We design the insertion algorithm and search algorithm for OPTree. Extensive experiments show that our approach can effectively reduce the number of rules while ensuring placed rules work. On the other hand, the experimental results also demonstrate that it is necessary to consider the position relationships between neighbor devices when placing rules.
软件定义网络(SDN)是网络研究的一个趋势。规则放置是网络管理员的一项常见操作,由于部署大量规则的设备的容量限制,规则放置变得更加复杂。以往关于规则放置的研究多考虑单个设备中的规则对规则放置的影响。然而,相邻设备之间的位置关系会影响规则的放置。我们的基本思想是将位置关系分为两类:序列关系和平行关系,并提出了一种基于两种不同位置关系的规则放置策略。实现我们的策略有两个挑战:检查规则是否包含在规则集中,以及检查规则是否可以被其他规则合并。为了克服这些挑战,我们提出了一种新的数据结构OPTree来表示规则,该结构便于检查规则是否被其他规则覆盖。设计了OPTree的插入算法和搜索算法。大量的实验表明,我们的方法可以有效地减少规则的数量,同时保证放置规则的有效性。另一方面,实验结果也表明,在设置规则时,需要考虑相邻设备之间的位置关系。
{"title":"An Approach to Rule Placement in Software-Defined Networks","authors":"Wenjie Li, Zheng Qin, H. Yin, Rui Li, L. Ou, Heng Li","doi":"10.1145/2988287.2989170","DOIUrl":"https://doi.org/10.1145/2988287.2989170","url":null,"abstract":"Software-Defined Networks (SDN) is a trend of research in networks. Rule placement, a common operation for network administrators, has become more complicated due to the capacity limitation of devices in which the large number of rules are deployed. Prior works on rule placement mostly consider the influence on rule placement incurred by the rules in a single device. However, the position relationships between neighbor devices have influences on rule placement. Our basic idea is to classify the position relationships into two categories: the serial relationship and the parallel relationship, and we present a novel strategy for rule placement based on the two different position relationships. There are two challenges of implementing our strategies: to check whether a rule is contained by a rule set or not and to check whether a rule can be merged by other rules or not.To overcome the challenges, we propose a novel data structure called OPTree to represent the rules, which is convenient to check whether a rule is covered by other rules. We design the insertion algorithm and search algorithm for OPTree. Extensive experiments show that our approach can effectively reduce the number of rules while ensuring placed rules work. On the other hand, the experimental results also demonstrate that it is necessary to consider the position relationships between neighbor devices when placing rules.","PeriodicalId":158785,"journal":{"name":"Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"319 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133399834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analytical Models for QoS-driven VNF Placement and Provisioning in Wireless Carrier Cloud 无线运营商云中qos驱动的VNF放置和配置分析模型
F. Jemaa, G. Pujolle, Michel Pariente
Network Function Virtualisation (NFV) represents a promising solution for wireless network operators to improve business agility and cope with the continuing growth in data traffic. Furthermore, by virtualizing core network functions as well as radio-access network functions, NFV can effectively reduce the cost to deploy and operate large wireless networks. Face to this technology revolution, a new underlying cloud architecture is emerging. This architecture is based on the combination of edge clouds and a centralized cloud, referred to as the edge-central cloud. This notably improves user experience while ensuring scalability and load balancing. In such carrier cloud environment, efficient management mechanisms for the Virtual Network Functions (VNFs) are of crucial importance. In this paper, we introduce VNF placement and provisioning optimization strategies over an edge-central carrier cloud infrastructure taking into account QoS requirements (i.e., response time, latency constraints and real-time requirements) and using analytical and QoS models. Our main design goals are to optimize resource utilization, to prevent cloudlet overload, and to avoid violation of SLA requirements. We propose different solutions to achieve a trade-off between these conflicting objectives according to the wireless operator requirements. These solutions are evaluated through extensive simulations using different performance metrics and encouraging results are obtained.
网络功能虚拟化(NFV)是无线网络运营商提高业务灵活性和应对持续增长的数据流量的一种有前途的解决方案。此外,NFV通过对核心网功能和无线接入网功能的虚拟化,可以有效降低大型无线网络的部署和运营成本。面对这场技术革命,一种新的底层云架构正在出现。这种架构基于边缘云和集中式云的组合,称为边缘中心云。这在确保可伸缩性和负载平衡的同时显著改善了用户体验。在这种运营商云环境下,高效的虚拟网络功能管理机制至关重要。在本文中,我们介绍了在边缘中心载波云基础设施上的VNF放置和配置优化策略,考虑了QoS需求(即响应时间、延迟约束和实时需求),并使用了分析模型和QoS模型。我们的主要设计目标是优化资源利用,防止cloudlet过载,并避免违反SLA需求。根据无线运营商的要求,我们提出了不同的解决方案来实现这些相互冲突的目标之间的权衡。这些解决方案通过使用不同的性能指标进行了广泛的模拟评估,并获得了令人鼓舞的结果。
{"title":"Analytical Models for QoS-driven VNF Placement and Provisioning in Wireless Carrier Cloud","authors":"F. Jemaa, G. Pujolle, Michel Pariente","doi":"10.1145/2988287.2989154","DOIUrl":"https://doi.org/10.1145/2988287.2989154","url":null,"abstract":"Network Function Virtualisation (NFV) represents a promising solution for wireless network operators to improve business agility and cope with the continuing growth in data traffic. Furthermore, by virtualizing core network functions as well as radio-access network functions, NFV can effectively reduce the cost to deploy and operate large wireless networks. Face to this technology revolution, a new underlying cloud architecture is emerging. This architecture is based on the combination of edge clouds and a centralized cloud, referred to as the edge-central cloud. This notably improves user experience while ensuring scalability and load balancing. In such carrier cloud environment, efficient management mechanisms for the Virtual Network Functions (VNFs) are of crucial importance. In this paper, we introduce VNF placement and provisioning optimization strategies over an edge-central carrier cloud infrastructure taking into account QoS requirements (i.e., response time, latency constraints and real-time requirements) and using analytical and QoS models. Our main design goals are to optimize resource utilization, to prevent cloudlet overload, and to avoid violation of SLA requirements. We propose different solutions to achieve a trade-off between these conflicting objectives according to the wireless operator requirements. These solutions are evaluated through extensive simulations using different performance metrics and encouraging results are obtained.","PeriodicalId":158785,"journal":{"name":"Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134404059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Slot Sharing TDMA Scheme for Reliable and Efficient Collision Resolution in WSNs 一种可靠高效的无线传感器网络冲突解决方案
Philip Parsch, Alejandro Masrur
With the advent of Internet of Things (IoT), an increasing number of devices may spontaneously communicate to exchange information. This puts emphasis on wireless sensor networks (WSNs) and, in particular, on intelligent medium access control (MAC) protocols, as there is a need to guarantee a certain quality of service (QoS) on timely data/packet delivery. Most existing approaches, however, are either of random nature, making it impossible to guarantee any bounded delay, or do not scale well for a higher number of nodes. As a result, we propose slot sharing TDMAs², a deterministic contention resolution scheme in form of generating TDMA cycles with shared slots at the event of collisions. Every TDMA slot is assigned to a range of IDs, in which the corresponding nodes can transmit. By further dividing these slots in case of collisions, we implement an interval tree search enabling for fast collision resolution in logŝ-complexity, where ŝ is the number of slots in each cycle. Since our scheme is activated upon collisions, it incurs in zero overhead during normal operation and is able to quickly react to changing traffic load such as bursty traffic. We perform a large set of detailed simulations on OMNeT++ showing that our technique offers a fast collision resolution and is able to handle a large number of nodes in the network.
随着物联网(IoT)的出现,越来越多的设备可以自发地进行通信以交换信息。这就强调了无线传感器网络(wsn),特别是智能介质访问控制(MAC)协议,因为需要在及时的数据/分组传输上保证一定的服务质量(QoS)。然而,大多数现有的方法要么是随机的,无法保证任何有界延迟,要么不能很好地扩展到更高数量的节点。因此,我们提出了一种时隙共享TDMA²,这是一种确定性的争用解决方案,其形式是在发生碰撞时产生具有共享时隙的TDMA周期。每个TDMA槽被分配到一个id范围,在这个id范围内对应的节点可以传输。通过在碰撞的情况下进一步划分这些槽,我们实现了一个区间树搜索,支持在logŝ-complexity中快速解决碰撞,其中,i是每个循环中的槽数。由于我们的方案是在碰撞时激活的,因此在正常运行时,它的开销为零,并且能够快速响应不断变化的交通负载,例如突发交通。我们在omnet++上进行了大量详细的模拟,表明我们的技术提供了快速的冲突解决方案,并且能够处理网络中的大量节点。
{"title":"A Slot Sharing TDMA Scheme for Reliable and Efficient Collision Resolution in WSNs","authors":"Philip Parsch, Alejandro Masrur","doi":"10.1145/2988287.2989164","DOIUrl":"https://doi.org/10.1145/2988287.2989164","url":null,"abstract":"With the advent of Internet of Things (IoT), an increasing number of devices may spontaneously communicate to exchange information. This puts emphasis on wireless sensor networks (WSNs) and, in particular, on intelligent medium access control (MAC) protocols, as there is a need to guarantee a certain quality of service (QoS) on timely data/packet delivery. Most existing approaches, however, are either of random nature, making it impossible to guarantee any bounded delay, or do not scale well for a higher number of nodes. As a result, we propose slot sharing TDMAs², a deterministic contention resolution scheme in form of generating TDMA cycles with shared slots at the event of collisions. Every TDMA slot is assigned to a range of IDs, in which the corresponding nodes can transmit. By further dividing these slots in case of collisions, we implement an interval tree search enabling for fast collision resolution in logŝ-complexity, where ŝ is the number of slots in each cycle. Since our scheme is activated upon collisions, it incurs in zero overhead during normal operation and is able to quickly react to changing traffic load such as bursty traffic. We perform a large set of detailed simulations on OMNeT++ showing that our technique offers a fast collision resolution and is able to handle a large number of nodes in the network.","PeriodicalId":158785,"journal":{"name":"Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132862358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1