首页 > 最新文献

2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)最新文献

英文 中文
A semantic mechanism for Internet-of-Things (IoT) to implement intelligent interactions 物联网(IoT)实现智能交互的语义机制
Shujuan You, Xiaotao Li, Wai Chen
Intelligent interactions of IoT mean that devices can perform proper actions and communicate with each other to support specific application scenarios without human intervention. To do this, the biggest challenge is providing IoT objects with common knowledge and abilities to analyze data and to reason. In this paper, we present a semantic mechanism to realize intelligent interactions of IoT devices on account of the semantic knowledge and machine learning technology. Based on this mechanism, a three-layer IoT system named IoT-Book is built, and every action performed by a device is deduced through analyzing the environment data and personalized preferences of the user. Finally, a smart home use case is demonstrated, and our approach is proved to be effective.
物联网的智能交互意味着设备可以在没有人为干预的情况下执行适当的操作并相互通信,以支持特定的应用场景。要做到这一点,最大的挑战是为物联网对象提供分析数据和推理的常识和能力。本文基于语义知识和机器学习技术,提出了一种实现物联网设备智能交互的语义机制。基于这一机制,构建了一个名为IoT- book的三层物联网系统,通过分析环境数据和用户的个性化偏好,推导出设备的每一个动作。最后,给出了一个智能家居用例,证明了我们的方法是有效的。
{"title":"A semantic mechanism for Internet-of-Things (IoT) to implement intelligent interactions","authors":"Shujuan You, Xiaotao Li, Wai Chen","doi":"10.23919/WIOPT.2018.8362879","DOIUrl":"https://doi.org/10.23919/WIOPT.2018.8362879","url":null,"abstract":"Intelligent interactions of IoT mean that devices can perform proper actions and communicate with each other to support specific application scenarios without human intervention. To do this, the biggest challenge is providing IoT objects with common knowledge and abilities to analyze data and to reason. In this paper, we present a semantic mechanism to realize intelligent interactions of IoT devices on account of the semantic knowledge and machine learning technology. Based on this mechanism, a three-layer IoT system named IoT-Book is built, and every action performed by a device is deduced through analyzing the environment data and personalized preferences of the user. Finally, a smart home use case is demonstrated, and our approach is proved to be effective.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122060139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Distributed learning algorithms for coordination in a cognitive network in presence of jammers 存在干扰的认知网络中协调的分布式学习算法
Suneet Sawant, M. Hanawal, S. Darak, Rohit Kumar
Efficient utilization of licensed spectrum in the cognitive radio network is challenging due to lack of coordination among the Secondary Users (SUs). Distributed algorithms proposed in the literature aim to maximize the network throughput by ensuring orthogonal channel allocation for the SUs. However, these algorithms work under the assumption that all the SUs faithfully follow the algorithms which may not always hold due to the decentralized nature of the network. Moreover, they are vulnerable to Denial of Service attacks. In this paper, we study distributed algorithms that are robust against malicious behavior (jamming attack). We consider jammers launching coordinated attack where they select non-overlapping channels in each time slot and can lead to significantly higher number of collisions for SUs than uncoordinated attack. We setup the problem as a multiplayer bandit and develop distributed learning algorithms. The analysis shows that when the SUs faithfully implement proposed algorithms, the regret is constant with high probability. We validate our claims through exhaustive synthetic experiments and also through a realistic USRP based experiments.
由于辅助用户之间缺乏协调,认知无线电网络中许可频谱的有效利用面临挑战。文献中提出的分布式算法旨在通过保证单元间信道的正交分配来最大化网络吞吐量。然而,这些算法是在假设所有的su都忠实地遵循算法的情况下工作的,由于网络的分散性,这些算法可能并不总是成立。此外,它们很容易受到拒绝服务攻击。在本文中,我们研究了分布式算法对恶意行为(干扰攻击)的鲁棒性。我们考虑干扰者发起协调攻击,他们在每个时隙中选择不重叠的信道,并且可能导致比非协调攻击更高数量的SUs碰撞。我们将问题设置为一个多人强盗,并开发分布式学习算法。分析表明,当系统忠实地执行所提出的算法时,后悔率是高概率恒定的。我们通过详尽的合成实验和现实的USRP实验来验证我们的主张。
{"title":"Distributed learning algorithms for coordination in a cognitive network in presence of jammers","authors":"Suneet Sawant, M. Hanawal, S. Darak, Rohit Kumar","doi":"10.23919/WIOPT.2018.8362853","DOIUrl":"https://doi.org/10.23919/WIOPT.2018.8362853","url":null,"abstract":"Efficient utilization of licensed spectrum in the cognitive radio network is challenging due to lack of coordination among the Secondary Users (SUs). Distributed algorithms proposed in the literature aim to maximize the network throughput by ensuring orthogonal channel allocation for the SUs. However, these algorithms work under the assumption that all the SUs faithfully follow the algorithms which may not always hold due to the decentralized nature of the network. Moreover, they are vulnerable to Denial of Service attacks. In this paper, we study distributed algorithms that are robust against malicious behavior (jamming attack). We consider jammers launching coordinated attack where they select non-overlapping channels in each time slot and can lead to significantly higher number of collisions for SUs than uncoordinated attack. We setup the problem as a multiplayer bandit and develop distributed learning algorithms. The analysis shows that when the SUs faithfully implement proposed algorithms, the regret is constant with high probability. We validate our claims through exhaustive synthetic experiments and also through a realistic USRP based experiments.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"334 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124306125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Hierarchical resource allocation scheme for M2M communications enabled by cellular networks 基于蜂窝网络的M2M通信分层资源分配方案
Guopeng Zhang, Jiansheng Qian, Shuo Xiao, Jie Gu
Machine-to-machine (M2M) type communications (MTCs) over cellular networks feature the large number of MTC devices (MTCDs), small and time controlled data transmissions, and rigorous energy limitation. Considering full-duplex (FD) relaying can achieve high spectrum and energy efficiency, this paper proposes an MTC-enabled cellular communication scheme, where a traditional cellular user equipment (UE) is configured as an FD relaying based gateway to assist the uplink transmissions of the served MTCDs. The designed objective is to minimize the aggregate energy consumption of a group consisting of a UE and multiple MTCDs, while fulfilling their minimum throughput requirements. To this end, a convex optimization problem is formulated and a low complexity algorithm is also developed to find the optimal power allocation strategies for the UE and the MTCDs. The simulation results show that the proposed scheme can achieve most of the channel reuse gain of the FD relaying if the self-interference at the UE is controlled below a certain level.
基于蜂窝网络的机器对机器(M2M)类型通信(MTC)具有MTC设备(mtcd)数量多、数据传输量小且受时间控制以及严格的能量限制等特点。考虑到全双工(FD)中继可以实现高频谱和高能效,本文提出了一种支持mtc的蜂窝通信方案,该方案将传统的蜂窝用户设备(UE)配置为基于FD中继的网关,以辅助所服务mtcd的上行传输。设计目标是最小化由UE和多个mtcd组成的组的总能耗,同时满足它们的最小吞吐量要求。为此,提出了一个凸优化问题,并开发了一个低复杂度的算法来寻找UE和mtcd的最优功率分配策略。仿真结果表明,在将终端自干扰控制在一定水平以下的情况下,该方案可以实现FD中继的大部分信道复用增益。
{"title":"Hierarchical resource allocation scheme for M2M communications enabled by cellular networks","authors":"Guopeng Zhang, Jiansheng Qian, Shuo Xiao, Jie Gu","doi":"10.23919/WIOPT.2018.8362807","DOIUrl":"https://doi.org/10.23919/WIOPT.2018.8362807","url":null,"abstract":"Machine-to-machine (M2M) type communications (MTCs) over cellular networks feature the large number of MTC devices (MTCDs), small and time controlled data transmissions, and rigorous energy limitation. Considering full-duplex (FD) relaying can achieve high spectrum and energy efficiency, this paper proposes an MTC-enabled cellular communication scheme, where a traditional cellular user equipment (UE) is configured as an FD relaying based gateway to assist the uplink transmissions of the served MTCDs. The designed objective is to minimize the aggregate energy consumption of a group consisting of a UE and multiple MTCDs, while fulfilling their minimum throughput requirements. To this end, a convex optimization problem is formulated and a low complexity algorithm is also developed to find the optimal power allocation strategies for the UE and the MTCDs. The simulation results show that the proposed scheme can achieve most of the channel reuse gain of the FD relaying if the self-interference at the UE is controlled below a certain level.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134502113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Quick discovery of mobile devices in the many-user regime — carrier sensing or simultaneous detection? 在多用户状态下快速发现移动设备——载波传感还是同步检测?
Altug Karakurt, A. Eryilmaz, C. E. Koksal
We consider the problem of detecting the active wireless stations among a very large population. This problem is highly relevant in applications involving passive and active RFID tags and dense IoT settings. The state of the art mainly utilizes interference avoiding (e.g., CSMA-based) approaches with the objective of identifying one station at a time. We first derive basic limits of the achievable delay with interference avoiding paradigm. Then, we consider the setting in which each station is assigned a signature sequence, picked at random from a specific alphabet and active stations transmit their signatures simultaneously upon activation. The challenge at the detector is to detect all active stations from the combined signature signal with low probability of misdetection and false positives. We show that, such an interference embracing approach can substantially reduce the detection delay, at an arbitrarily low probability of both types of detection errors, as the number of stations scale. We show that, under a randomized activation model the collision embracing detection scheme achieves Θ(log2(n)/log(log(n))) delay while the expected delay of existing CSMA schemes are Ω(log2(n)) for a population of n stations. Finally, we discuss large-scale implementation issues such as the design of low-complexity detection schemes and present numerical investigations.
我们考虑了在非常大的人群中检测有源无线基站的问题。这个问题在涉及无源和有源RFID标签以及密集物联网设置的应用中高度相关。目前的技术状况主要利用避免干扰(例如,基于csma的)方法,目的是一次识别一个电台。我们首先推导出用避免干扰的范式可实现延迟的基本极限。然后,我们考虑这样的设置:每个电台被分配一个签名序列,从一个特定的字母表中随机挑选,活跃的电台在激活时同时发送他们的签名。检测器面临的挑战是在低误检和误报概率的情况下,从组合特征信号中检测出所有活动台站。我们表明,随着台站数量的增加,这种干扰包容方法可以在任意低的两种检测误差概率下大幅减少检测延迟。我们证明,在随机激活模型下,碰撞拥抱检测方案实现Θ(log2(n)/log(log(n)))延迟,而现有CSMA方案对n个站点的预期延迟为Ω(log2(n))。最后,我们讨论了大规模实现问题,如低复杂度检测方案的设计和目前的数值研究。
{"title":"Quick discovery of mobile devices in the many-user regime — carrier sensing or simultaneous detection?","authors":"Altug Karakurt, A. Eryilmaz, C. E. Koksal","doi":"10.23919/WIOPT.2018.8362851","DOIUrl":"https://doi.org/10.23919/WIOPT.2018.8362851","url":null,"abstract":"We consider the problem of detecting the active wireless stations among a very large population. This problem is highly relevant in applications involving passive and active RFID tags and dense IoT settings. The state of the art mainly utilizes interference avoiding (e.g., CSMA-based) approaches with the objective of identifying one station at a time. We first derive basic limits of the achievable delay with interference avoiding paradigm. Then, we consider the setting in which each station is assigned a signature sequence, picked at random from a specific alphabet and active stations transmit their signatures simultaneously upon activation. The challenge at the detector is to detect all active stations from the combined signature signal with low probability of misdetection and false positives. We show that, such an interference embracing approach can substantially reduce the detection delay, at an arbitrarily low probability of both types of detection errors, as the number of stations scale. We show that, under a randomized activation model the collision embracing detection scheme achieves Θ(log2(n)/log(log(n))) delay while the expected delay of existing CSMA schemes are Ω(log2(n)) for a population of n stations. Finally, we discuss large-scale implementation issues such as the design of low-complexity detection schemes and present numerical investigations.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115672545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV placement games for optimal wireless service provision 优化无线服务提供的无人机放置游戏
Xinping Xu, Lingjie Duan, Minming Li
Unmanned Aerial Vehicle (UAV) networks have emerged as a promising technique to rapidly provide wireless services to a group of mobile users simultaneously in the three-dimensional (3D) geographical space, where a flying UAV facility can be deployed closely based on users' 3D location reports. The paper aims to address a challenging issue that each user is selfish and prefers the UAV to be located as close to himself as possible, by misreporting his location and changing the optimal UAV location. We study the social planner's problem to determine the final deployment location of a UAV facility in a 3D space, by ensuring all selfish users' truthfulness in reporting their locations. To minimize the social service cost in this UAV placement game, we design a strategyproof mechanism with approximation ratio 2, when comparing to the social optimum. On the other hand, as the UAV to be deployed may interfere with another group of incumbent users in the same space, we also study the obnoxious UAV placement game to maximally keep their social utility, where each incumbent user may misreport his location to keep the UAV away from him. We propose a strategyproof mechanism with approximation ratio 5. Besides the worst-case analysis, we further analyze the empirical performances of the proposed mechanisms and show that they converge to the social optimum as the number of users becomes large. Finally, we extend to the dual-preference UAV placement game by considering the coexistence of the two groups of users, where users can misreport both their locations and preference types. We successfully propose a strategyproof mechanism with approximation ratio 8.
无人机(UAV)网络已经成为一种有前途的技术,可以在三维(3D)地理空间中同时向一组移动用户快速提供无线服务,在三维(3D)地理空间中,飞行的无人机设施可以根据用户的3D位置报告紧密部署。本文旨在解决一个具有挑战性的问题,即每个用户都是自私的,并希望无人机尽可能靠近自己,通过误报自己的位置和改变无人机的最佳位置。我们研究了社会规划者问题,以确定无人机设施在三维空间中的最终部署位置,确保所有自私用户报告其位置的真实性。为了使该无人机布局博弈的社会服务成本最小化,我们设计了一个与社会最优方案比较时近似比为2的防策略机制。另一方面,由于待部署的无人机可能会干扰同一空间内的另一组在位用户,我们还研究了讨厌的无人机放置博弈,以最大限度地保持其社会效用,其中每个在位用户可能会误报自己的位置以使无人机远离他。我们提出了一个近似比为5的防策略机制。除了最坏情况分析外,我们还进一步分析了所提出机制的经验性能,并表明它们随着用户数量的增加而收敛于社会最优。最后,我们通过考虑两组用户的共存,扩展到双偏好无人机放置博弈,其中用户可能会误报他们的位置和偏好类型。我们成功地提出了一个近似比为8的防策略机制。
{"title":"UAV placement games for optimal wireless service provision","authors":"Xinping Xu, Lingjie Duan, Minming Li","doi":"10.23919/WIOPT.2018.8362811","DOIUrl":"https://doi.org/10.23919/WIOPT.2018.8362811","url":null,"abstract":"Unmanned Aerial Vehicle (UAV) networks have emerged as a promising technique to rapidly provide wireless services to a group of mobile users simultaneously in the three-dimensional (3D) geographical space, where a flying UAV facility can be deployed closely based on users' 3D location reports. The paper aims to address a challenging issue that each user is selfish and prefers the UAV to be located as close to himself as possible, by misreporting his location and changing the optimal UAV location. We study the social planner's problem to determine the final deployment location of a UAV facility in a 3D space, by ensuring all selfish users' truthfulness in reporting their locations. To minimize the social service cost in this UAV placement game, we design a strategyproof mechanism with approximation ratio 2, when comparing to the social optimum. On the other hand, as the UAV to be deployed may interfere with another group of incumbent users in the same space, we also study the obnoxious UAV placement game to maximally keep their social utility, where each incumbent user may misreport his location to keep the UAV away from him. We propose a strategyproof mechanism with approximation ratio 5. Besides the worst-case analysis, we further analyze the empirical performances of the proposed mechanisms and show that they converge to the social optimum as the number of users becomes large. Finally, we extend to the dual-preference UAV placement game by considering the coexistence of the two groups of users, where users can misreport both their locations and preference types. We successfully propose a strategyproof mechanism with approximation ratio 8.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125716299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Scheduling URLLC users with reliable latency guarantees 调度具有可靠延迟保证的URLLC用户
Apostolos Destounis, G. Paschos, Jesús Arnau, M. Kountouris
This paper studies Ultra-Reliable Low-Latency Communications (URLLC), an important service class of emerging 5G networks. In this class, multiple unreliable transmissions must be combined to achieve reliable latency: a user experiences a frame success when the entire L bits are received correctly within a deadline, and its latency performance is reliable when the frame success rate is above a threshold. When jointly serving multiple users, a natural URLLC scheduling question arises: given the uncertainty of the wireless channel, can we find a scheduling policy that allows all users to meet a target reliable latency objective? This is called the URLLC SLA Satisfaction (USS) problem. The USS problem is an infinite horizon constrained Markov Decision Process, for which, after establishing a convenient property, we are able to derive an optimal policy based on dynamic programming. Our policy suffers from the curse of dimensionality, hence for large instances we propose a class of knapsack-inspired computationally efficient — but not necessarily optimal — policies. We prove that every policy in that class becomes optimal in a fluid regime, where both the deadline and L scale to infinity, while our simulations show that the policies perform well even in small practical instances of the USS problem.
超可靠低时延通信(URLLC)是新兴5G网络的重要业务类别。在这类中,必须将多个不可靠的传输组合在一起才能实现可靠的延迟:当用户在截止日期内正确接收到整个L位时,用户体验到帧成功;当帧成功率高于阈值时,其延迟性能是可靠的。当联合服务多个用户时,一个自然的URLLC调度问题出现了:给定无线信道的不确定性,我们能否找到一个调度策略,允许所有用户满足目标可靠延迟目标?这被称为URLLC SLA满意度(USS)问题。USS问题是一个无限视界约束的马尔可夫决策过程,在建立了该决策过程的一个方便性质后,我们可以推导出基于动态规划的最优策略。我们的策略受到维度的诅咒,因此对于大型实例,我们提出了一类受背包启发的计算效率-但不一定是最优的-策略。我们证明了该类中的每个策略在流体状态下都是最优的,其中截止日期和L都扩展到无穷大,而我们的模拟表明,即使在USS问题的小实际实例中,这些策略也表现良好。
{"title":"Scheduling URLLC users with reliable latency guarantees","authors":"Apostolos Destounis, G. Paschos, Jesús Arnau, M. Kountouris","doi":"10.23919/WIOPT.2018.8362847","DOIUrl":"https://doi.org/10.23919/WIOPT.2018.8362847","url":null,"abstract":"This paper studies Ultra-Reliable Low-Latency Communications (URLLC), an important service class of emerging 5G networks. In this class, multiple unreliable transmissions must be combined to achieve reliable latency: a user experiences a frame success when the entire L bits are received correctly within a deadline, and its latency performance is reliable when the frame success rate is above a threshold. When jointly serving multiple users, a natural URLLC scheduling question arises: given the uncertainty of the wireless channel, can we find a scheduling policy that allows all users to meet a target reliable latency objective? This is called the URLLC SLA Satisfaction (USS) problem. The USS problem is an infinite horizon constrained Markov Decision Process, for which, after establishing a convenient property, we are able to derive an optimal policy based on dynamic programming. Our policy suffers from the curse of dimensionality, hence for large instances we propose a class of knapsack-inspired computationally efficient — but not necessarily optimal — policies. We prove that every policy in that class becomes optimal in a fluid regime, where both the deadline and L scale to infinity, while our simulations show that the policies perform well even in small practical instances of the USS problem.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127778817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Optimum caching versus LRU and LFU: Comparison and combined limited look-ahead strategies 最优缓存与LRU和LFU:比较和组合有限前瞻性策略
G. Haßlinger, Juho Heikkinen, K. Ntougias, Frank Hasslinger, O. Hohlfeld
We compare web caching strategies based on the least recently used (LRU) and the least frequently used (LFU) replacement principles with optimum caching according to Belady's algorithm. The achievable hit rates of the strategies are shown to improve with the exploited knowledge about the request pattern while the computation effort is also increasing. The results give an overview of performance tradeoffs in the whole relevant range for web caching with Zipf request pattern. In a second part, we study a combined approach of the optimum strategy for a limited look-ahead with LRU, LFU or other non-predictive methods. We evaluate the hit rate gain depending on the extent of the look-ahead for request traces and for the independent reference model (IRM) via simulation and derive an analytic confirmation of the observed behaviour. It is shown that caching for video streaming can benefit from the proposed look-ahead technique, when replacement decisions can be partly revised due to new requests being encountered during long lasting content updates.
我们比较了基于最近最少使用(LRU)和最不频繁使用(LFU)替换原则的web缓存策略与根据Belady算法的最优缓存。结果表明,随着对请求模式知识的利用,策略的可实现命中率有所提高,同时计算量也在增加。结果给出了使用Zipf请求模式的web缓存在整个相关范围内的性能权衡的概述。在第二部分中,我们研究了与LRU、LFU或其他非预测方法相结合的有限前瞻性最优策略方法。我们通过模拟来评估命中率增益,这取决于请求跟踪和独立参考模型(IRM)的前瞻性程度,并得出对观察到的行为的分析确认。研究表明,视频流缓存可以从所建议的前瞻性技术中受益,因为在长时间的内容更新期间遇到的新请求可以部分修改替换决策。
{"title":"Optimum caching versus LRU and LFU: Comparison and combined limited look-ahead strategies","authors":"G. Haßlinger, Juho Heikkinen, K. Ntougias, Frank Hasslinger, O. Hohlfeld","doi":"10.23919/WIOPT.2018.8362880","DOIUrl":"https://doi.org/10.23919/WIOPT.2018.8362880","url":null,"abstract":"We compare web caching strategies based on the least recently used (LRU) and the least frequently used (LFU) replacement principles with optimum caching according to Belady's algorithm. The achievable hit rates of the strategies are shown to improve with the exploited knowledge about the request pattern while the computation effort is also increasing. The results give an overview of performance tradeoffs in the whole relevant range for web caching with Zipf request pattern. In a second part, we study a combined approach of the optimum strategy for a limited look-ahead with LRU, LFU or other non-predictive methods. We evaluate the hit rate gain depending on the extent of the look-ahead for request traces and for the independent reference model (IRM) via simulation and derive an analytic confirmation of the observed behaviour. It is shown that caching for video streaming can benefit from the proposed look-ahead technique, when replacement decisions can be partly revised due to new requests being encountered during long lasting content updates.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128861098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Wireless power provision as a public good 无线供电作为一种公共产品
Meng Zhang, Jianwei Huang, Rui Zhang
Wireless power transfer (WPT) technology enables a cost-effective and sustainable energy supply in wireless networks, where energy users (EUs) can remotely harvest energy from the wireless signal transmitted by energy transmitters (ETs). However, the broadcast nature of wireless signal makes wireless power a non-excludable public good, which renders the traditional market mechanisms inefficient due to the possibility of the free-riders. In this study, we formulate the transmit power provision problem in a single-channel WPT network as a public good provision problem, aiming to maximize the social welfare of all the ET and EUs considering their private information and selfish behaviors. The considered problem also brings both economic and technical challenges in ensuring voluntary participation and distributed algorithm design. To this end, we propose a two- phase all-or-none procedure involving a low-complexity Power And Taxation (PAT) Nash mechanism, which ensures voluntary participation, incentive compatibility, and budget balance, and yields the socially optimal transmit power at all Nash equilibria. We further propose a distributed D-PAT Algorithm and prove its convergence by exploiting the connection between the structure of Nash equilibria and that of the optimal solutions to a related optimization problem. Finally, our simulation results validate the PAT Mechanism and the practical algorithm. We show that our design can significantly improve the social welfare compared to the benchmark market mechanism, especially when there are many and relatively comparable EUs.
无线电力传输(WPT)技术使无线网络中的能源供应具有成本效益和可持续性,能源用户(EUs)可以远程从能量发射器(et)传输的无线信号中获取能量。然而,无线信号的广播性使无线电力成为一种非排他性的公共产品,这使得传统的市场机制由于存在搭便车的可能性而变得低效。在本研究中,我们将单通道WPT网络中的发射功率供给问题表述为公共产品供给问题,以考虑ET和EUs的私有信息和自私行为,使其社会福利最大化为目标。所考虑的问题在确保自愿参与和分布式算法设计方面也带来了经济和技术上的挑战。为此,我们提出了一个两阶段全有或全无的程序,涉及低复杂性的电力和税收(PAT)纳什机制,该机制确保了自愿参与、激励兼容性和预算平衡,并产生了所有纳什均衡下的社会最优传输功率。我们进一步提出了一种分布式D-PAT算法,并利用纳什均衡结构与相关优化问题的最优解结构之间的联系证明了它的收敛性。最后,仿真结果验证了PAT机制和实用算法。我们的研究表明,与基准市场机制相比,我们的设计可以显著提高社会福利,特别是当存在许多相对可比的EUs时。
{"title":"Wireless power provision as a public good","authors":"Meng Zhang, Jianwei Huang, Rui Zhang","doi":"10.23919/WIOPT.2018.8362809","DOIUrl":"https://doi.org/10.23919/WIOPT.2018.8362809","url":null,"abstract":"Wireless power transfer (WPT) technology enables a cost-effective and sustainable energy supply in wireless networks, where energy users (EUs) can remotely harvest energy from the wireless signal transmitted by energy transmitters (ETs). However, the broadcast nature of wireless signal makes wireless power a non-excludable public good, which renders the traditional market mechanisms inefficient due to the possibility of the free-riders. In this study, we formulate the transmit power provision problem in a single-channel WPT network as a public good provision problem, aiming to maximize the social welfare of all the ET and EUs considering their private information and selfish behaviors. The considered problem also brings both economic and technical challenges in ensuring voluntary participation and distributed algorithm design. To this end, we propose a two- phase all-or-none procedure involving a low-complexity Power And Taxation (PAT) Nash mechanism, which ensures voluntary participation, incentive compatibility, and budget balance, and yields the socially optimal transmit power at all Nash equilibria. We further propose a distributed D-PAT Algorithm and prove its convergence by exploiting the connection between the structure of Nash equilibria and that of the optimal solutions to a related optimization problem. Finally, our simulation results validate the PAT Mechanism and the practical algorithm. We show that our design can significantly improve the social welfare compared to the benchmark market mechanism, especially when there are many and relatively comparable EUs.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133382627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A double-auction mechanism for mobile data-offloading markets with strategic agents 具有战略代理的移动数据卸载市场的双重拍卖机制
K. P. Naveen, R. Sundaresan
We consider a recently proposed double-auction mechanism for mobile data-offloading. Network operators (users) derive benefit from offloading their traffic to third party WiFi or femtocell network (link-supplier). A link-supplier experiences costs for the additional capacity that he provides. Users and link-supplier (collectively referred to as agents) have their utilities and cost function as private knowledge. A system-designer decomposes the problem into a network problem (with surrogate utilities and surrogate cost functions) and agent problems (one per agent). The surrogate utilities and cost functions are modulated by the agents' bids. Agents' payoffs and costs are then determined by the allocations and prices set by the system designer. So long as the agents do not anticipate the effect of their actions, a competitive equilibrium exists as a solution to the network and agent problems, and this equilibrium optimizes the system utility. This work shows that when the agents are strategic (price-anticipating), the presence of strategic supplying agents drives the system to an undesirable equilibrium with zero participation. This is in stark contrast to the setting when link-suppliers are not strategic where the efficiency loss is at most 34%. The paper then proposes a Stackelberg game modification to alleviate the efficiency loss problem. The system designer first announces the allocation and payment functions. He then invites the supplying agents to announce their bids. He then invites the users to respond to the suppliers' bids. The resulting efficiency loss is characterized in terms of the suppliers' cost functions.
我们考虑了最近提出的移动数据卸载的双重拍卖机制。网络运营商(用户)从将其流量转移到第三方WiFi或移动蜂窝网络(链路供应商)中获益。链路供应商要为他提供的额外容量承担成本。用户和链接提供者(统称为代理)的效用和成本函数都是私有知识。系统设计者将问题分解为网络问题(具有代理效用和代理成本函数)和代理问题(每个代理一个)。代理效用和成本函数由代理的出价调节。然后,代理的收益和成本由系统设计者设定的分配和价格决定。只要智能体不预期其行为的效果,竞争均衡就作为网络和智能体问题的解决方案而存在,这种均衡使系统效用最优化。该研究表明,当代理人是战略性的(价格预期的)时,战略供应代理人的存在将系统驱动到零参与的不良均衡。这与链接供应商不具有战略性的情况形成鲜明对比,后者的效率损失最多为34%。然后提出了一种Stackelberg博弈修正来缓解效率损失问题。系统设计者首先宣布分配和支付功能。然后,他邀请供应代理商宣布他们的出价。然后,他邀请用户对供应商的出价作出回应。由此产生的效率损失用供应商的成本函数表示。
{"title":"A double-auction mechanism for mobile data-offloading markets with strategic agents","authors":"K. P. Naveen, R. Sundaresan","doi":"10.23919/WIOPT.2018.8362857","DOIUrl":"https://doi.org/10.23919/WIOPT.2018.8362857","url":null,"abstract":"We consider a recently proposed double-auction mechanism for mobile data-offloading. Network operators (users) derive benefit from offloading their traffic to third party WiFi or femtocell network (link-supplier). A link-supplier experiences costs for the additional capacity that he provides. Users and link-supplier (collectively referred to as agents) have their utilities and cost function as private knowledge. A system-designer decomposes the problem into a network problem (with surrogate utilities and surrogate cost functions) and agent problems (one per agent). The surrogate utilities and cost functions are modulated by the agents' bids. Agents' payoffs and costs are then determined by the allocations and prices set by the system designer. So long as the agents do not anticipate the effect of their actions, a competitive equilibrium exists as a solution to the network and agent problems, and this equilibrium optimizes the system utility. This work shows that when the agents are strategic (price-anticipating), the presence of strategic supplying agents drives the system to an undesirable equilibrium with zero participation. This is in stark contrast to the setting when link-suppliers are not strategic where the efficiency loss is at most 34%. The paper then proposes a Stackelberg game modification to alleviate the efficiency loss problem. The system designer first announces the allocation and payment functions. He then invites the supplying agents to announce their bids. He then invites the users to respond to the suppliers' bids. The resulting efficiency loss is characterized in terms of the suppliers' cost functions.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130049256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient and low-overhead uplink scheduling for large-scale wireless Internet-of-Things 面向大规模无线物联网的高效低开销上行调度
Bin Li, Bo Ji, Jia Liu
With the rapid growth of Internet of Things (IoT) applications in recent years, there is a strong need for wireless uplink scheduling algorithms that determine when and which subset of a large number of users should transmit to the central controller. Different from the downlink case, the central controller in the uplink scenario typically has very limited information about the users. On the other hand, collecting all such information from a large number of users typically incurs a prohibitively high communication overhead. This motivates us to investigate the development of an efficient and low-overhead uplink scheduling algorithm that is suitable for large-scale IoT applications with limited amount of coordination from the central controller. Specifically, we first characterize a capacity outer bound subject to the sampling constraint where only a small subset of users are allowed to use control channels for system state reporting and wireless channel probing. Next, we relax the sampling constraint and propose a joint sampling and transmission algorithm, which utilizes full knowledge of channel state distributions and instantaneous queue lengths to achieve the capacity outer bound. The insights obtained from this capacity-achieving algorithm allow us to develop an efficient and low-overhead scheduling algorithm that can strictly satisfy the sampling constraint with asymptotically diminishing throughput loss. Moreover, the throughput performance of our proposed algorithm is independent of the number of users, a highly desirable property in large-scale IoT systems. Finally, we perform extensive simulations to validate our theoretical results.
随着近年来物联网(IoT)应用的快速增长,迫切需要无线上行链路调度算法来确定何时以及将大量用户的哪个子集传输到中央控制器。与下行场景不同,上行场景中的中央控制器通常拥有非常有限的用户信息。另一方面,从大量用户那里收集所有这些信息通常会导致过高的通信开销。这促使我们研究一种高效、低开销的上行调度算法的开发,该算法适用于中央控制器协调量有限的大规模物联网应用。具体地说,我们首先描述了受制于采样约束的容量外边界,其中只允许一小部分用户使用控制通道进行系统状态报告和无线通道探测。其次,我们放宽了采样约束,提出了一种联合采样和传输算法,该算法充分利用了信道状态分布和瞬时队列长度的知识来实现容量外界。从这种容量实现算法中获得的见解使我们能够开发一种高效、低开销的调度算法,该算法可以严格满足采样约束,并且吞吐量损失渐近减小。此外,我们提出的算法的吞吐量性能与用户数量无关,这是大规模物联网系统中非常理想的特性。最后,我们进行了大量的模拟来验证我们的理论结果。
{"title":"Efficient and low-overhead uplink scheduling for large-scale wireless Internet-of-Things","authors":"Bin Li, Bo Ji, Jia Liu","doi":"10.23919/WIOPT.2018.8362813","DOIUrl":"https://doi.org/10.23919/WIOPT.2018.8362813","url":null,"abstract":"With the rapid growth of Internet of Things (IoT) applications in recent years, there is a strong need for wireless uplink scheduling algorithms that determine when and which subset of a large number of users should transmit to the central controller. Different from the downlink case, the central controller in the uplink scenario typically has very limited information about the users. On the other hand, collecting all such information from a large number of users typically incurs a prohibitively high communication overhead. This motivates us to investigate the development of an efficient and low-overhead uplink scheduling algorithm that is suitable for large-scale IoT applications with limited amount of coordination from the central controller. Specifically, we first characterize a capacity outer bound subject to the sampling constraint where only a small subset of users are allowed to use control channels for system state reporting and wireless channel probing. Next, we relax the sampling constraint and propose a joint sampling and transmission algorithm, which utilizes full knowledge of channel state distributions and instantaneous queue lengths to achieve the capacity outer bound. The insights obtained from this capacity-achieving algorithm allow us to develop an efficient and low-overhead scheduling algorithm that can strictly satisfy the sampling constraint with asymptotically diminishing throughput loss. Moreover, the throughput performance of our proposed algorithm is independent of the number of users, a highly desirable property in large-scale IoT systems. Finally, we perform extensive simulations to validate our theoretical results.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127560750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1