首页 > 最新文献

IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications最新文献

英文 中文
Apps on the move: A fine-grained analysis of usage behavior of mobile apps 移动应用:对移动应用使用行为的细粒度分析
L. Yang, Mingxuan Yuan, Wei Wang, Qian Zhang, Jia Zeng
Owing to the proliferation of mobile devices and their corresponding app ecosystems, more and more people are accessing the internet via various mobile apps, which generates tremendous volume of mobile data. Despite the growing importance of these mobile apps, we have a rather sparse understanding of how they are accessed and what issues affect their usage patterns. To address this problem, we perform a comprehensive measurement on large-scale anonymized network data collected from a tier-1 cellular carrier in China. In this measurement, we characterize the usage pattern of mobile apps and exhibit how the mobility, geospatial properties and behaviours of subscribers affect their mobile app usage at a fine-grained level.
由于移动设备及其应用生态系统的激增,越来越多的人通过各种移动应用程序访问互联网,这产生了巨大的移动数据量。尽管这些移动应用越来越重要,但我们对它们的访问方式以及影响它们使用模式的问题知之甚少。为了解决这个问题,我们对从中国一级蜂窝运营商收集的大规模匿名网络数据进行了全面测量。在此测量中,我们描述了移动应用程序的使用模式,并展示了用户的移动性、地理空间属性和行为如何在细粒度层面上影响他们的移动应用程序使用。
{"title":"Apps on the move: A fine-grained analysis of usage behavior of mobile apps","authors":"L. Yang, Mingxuan Yuan, Wei Wang, Qian Zhang, Jia Zeng","doi":"10.1109/INFOCOM.2016.7524464","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524464","url":null,"abstract":"Owing to the proliferation of mobile devices and their corresponding app ecosystems, more and more people are accessing the internet via various mobile apps, which generates tremendous volume of mobile data. Despite the growing importance of these mobile apps, we have a rather sparse understanding of how they are accessed and what issues affect their usage patterns. To address this problem, we perform a comprehensive measurement on large-scale anonymized network data collected from a tier-1 cellular carrier in China. In this measurement, we characterize the usage pattern of mobile apps and exhibit how the mobility, geospatial properties and behaviours of subscribers affect their mobile app usage at a fine-grained level.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114308416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Friendly channel-oblivious jamming with error amplification for wireless networks 无线网络中带有误差放大的友好信道无关干扰
Zhenghao Zhang, Avishek Mukherjee
Privacy has become a major concern in wireless networks, especially in networks with weak or no password protection. While it has been proposed to send jamming signals to thwart the reception of the eavesdropper, the jamming signal typically cannot introduce enough errors to cover the entire packet when the jamming signal is not very strong, mainly due to the use of error correction codes in the system. Fortunately, error amplifiers can be easily constructed using block ciphers to amplify and spread the errors without requiring any secret keys. With error amplification, the jamming strategy needs to be revisited, because introducing a few errors is sufficient protect the privacy of the entire packet, instead of having to jam the entire packet. We propose a novel jamming strategy, called jMax, with proven performance bounds to the optimal jamming signal power. The idea of jMax is to rotate jamming vectors such that the jamming power can be maximized when the jamming vector close to the optimal jamming vector is used. We collect real-world CSI data with the Intel 5300 wireless card and use the Microsoft Sora Software-Defined Radio to process jammed data packets. Our results show that jMax achieves significant gains over other approaches.
隐私已成为无线网络的主要问题,特别是在密码保护较弱或没有密码保护的网络中。虽然已经提出了发送干扰信号来阻止窃听者的接收,但当干扰信号不是很强时,干扰信号通常无法引入足够的错误来覆盖整个数据包,这主要是由于系统中使用了纠错码。幸运的是,错误放大器可以很容易地使用分组密码来放大和传播错误,而不需要任何密钥。当错误放大时,需要重新考虑干扰策略,因为引入一些错误足以保护整个数据包的隐私,而不必阻塞整个数据包。我们提出了一种新的干扰策略,称为jMax,具有经过验证的最佳干扰信号功率的性能界限。jMax的思想是旋转干扰向量,当使用接近最优干扰向量的干扰向量时,干扰功率最大。我们使用英特尔5300无线卡收集真实的CSI数据,并使用微软Sora软件定义无线电来处理堵塞的数据包。我们的结果表明,与其他方法相比,jMax取得了显著的进步。
{"title":"Friendly channel-oblivious jamming with error amplification for wireless networks","authors":"Zhenghao Zhang, Avishek Mukherjee","doi":"10.1109/INFOCOM.2016.7524446","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524446","url":null,"abstract":"Privacy has become a major concern in wireless networks, especially in networks with weak or no password protection. While it has been proposed to send jamming signals to thwart the reception of the eavesdropper, the jamming signal typically cannot introduce enough errors to cover the entire packet when the jamming signal is not very strong, mainly due to the use of error correction codes in the system. Fortunately, error amplifiers can be easily constructed using block ciphers to amplify and spread the errors without requiring any secret keys. With error amplification, the jamming strategy needs to be revisited, because introducing a few errors is sufficient protect the privacy of the entire packet, instead of having to jam the entire packet. We propose a novel jamming strategy, called jMax, with proven performance bounds to the optimal jamming signal power. The idea of jMax is to rotate jamming vectors such that the jamming power can be maximized when the jamming vector close to the optimal jamming vector is used. We collect real-world CSI data with the Intel 5300 wireless card and use the Microsoft Sora Software-Defined Radio to process jammed data packets. Our results show that jMax achieves significant gains over other approaches.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"232 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123447225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CompoundEyes: Near-duplicate detection in large scale online video systems in the cloud 复合眼:云中的大规模在线视频系统中的近重复检测
Yixin Chen, Wenbo He, Yu Hua, Wen Wang
At the present time, billions of videos are hosted and shared in the cloud of which a sizable portion consists of near-duplicate video copies. An efficient and accurate content-based online near-duplicate video detection method is a fundamental research goal; as it would benefit applications such as duplication-aware storage, pirate video detection, polluted video tag detection, searching result diversification. Despite the recent progress made in near-duplicate video detection, it remains challenging to develop a practical detection system for large-scale applications that has good efficiency and accuracy performance. In this paper, we shift the focus from feature representation design to system design, and develop a novel system, called CompoundEyes, accordingly. The improvement in accuracy is achieved via well-organized classifiers instead of advanced feature design. Meanwhile, by applying simple features with reduced dimensionality and exploiting the parallelism of the detection architecture, we accelerate the detection speed. Through extensive experiments we demonstrate that the proposed detection system is accurate and fast. It takes approximately 1.45 seconds to process a video clip from a large video dataset, CC_WEB_VIDEO, with a 89% detection accuracy.
目前,数以十亿计的视频在云上托管和共享,其中相当大一部分是由几乎重复的视频副本组成的。一种高效、准确的基于内容的在线近重复视频检测方法是一个基本的研究目标;因为它有利于重复感知存储、盗版视频检测、污染视频标签检测、搜索结果多样化等应用。尽管在近重复视频检测方面取得了一些进展,但开发一种具有良好效率和精度的大规模应用的实用检测系统仍然具有挑战性。在本文中,我们将重点从特征表示设计转移到系统设计,并相应地开发了一个新的系统,称为复合眼睛。准确度的提高是通过组织良好的分类器而不是高级特征设计来实现的。同时,通过采用简单的降维特征,利用检测体系结构的并行性,加快了检测速度。通过大量的实验,我们证明了所提出的检测系统是准确和快速的。处理来自大型视频数据集CC_WEB_VIDEO的视频剪辑大约需要1.45秒,检测准确率为89%。
{"title":"CompoundEyes: Near-duplicate detection in large scale online video systems in the cloud","authors":"Yixin Chen, Wenbo He, Yu Hua, Wen Wang","doi":"10.1109/INFOCOM.2016.7524429","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524429","url":null,"abstract":"At the present time, billions of videos are hosted and shared in the cloud of which a sizable portion consists of near-duplicate video copies. An efficient and accurate content-based online near-duplicate video detection method is a fundamental research goal; as it would benefit applications such as duplication-aware storage, pirate video detection, polluted video tag detection, searching result diversification. Despite the recent progress made in near-duplicate video detection, it remains challenging to develop a practical detection system for large-scale applications that has good efficiency and accuracy performance. In this paper, we shift the focus from feature representation design to system design, and develop a novel system, called CompoundEyes, accordingly. The improvement in accuracy is achieved via well-organized classifiers instead of advanced feature design. Meanwhile, by applying simple features with reduced dimensionality and exploiting the parallelism of the detection architecture, we accelerate the detection speed. Through extensive experiments we demonstrate that the proposed detection system is accurate and fast. It takes approximately 1.45 seconds to process a video clip from a large video dataset, CC_WEB_VIDEO, with a 89% detection accuracy.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123666963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Temporal correlation of the RSS improves accuracy of fingerprinting localization RSS的时间相关性提高了指纹定位的准确性
Mei Wang, Zhehui Zhang, Xiaohua Tian, Xinbing Wang
Indoor localization based on RSS fingerprinting approach has been attracting many research efforts in the past decades. Recent study presents a fundamental limit of the approach: given requirement of estimation accuracy, reliability of the user's localization result can be derived. As highly accurate indoor localization is essential to enable many location based services, a natural question to ask is: can we further improve the accuracy of the localization scheme fundamentally? In this paper, we theoretically show that the temporal correlation of the RSS can improve accuracy of the RSS fingerprinting based indoor localization. In particular, we construct a theoretical framework to evaluate how the temporal correlation of the RSS can influence the reliability of location estimation, which is based on a newly proposed radio propagation model considering the time-varying property of signals from a given Wi-Fi AP. Such a theoretical framework is then applied to analyze localization in the one dimensional physical space, which reveals the fundamental reason why performance improvement of localization can be brought by temporal correlation of the RSS. We further extend our analysis to high-dimensional scenarios. Experimental results corroborate our theoretical analysis.
在过去的几十年里,基于RSS指纹识别的室内定位方法引起了许多研究的关注。最近的研究发现了该方法的一个基本局限性:在给定估计精度要求的情况下,可以推导出用户定位结果的可靠性。由于高度精确的室内定位对于实现许多基于位置的服务至关重要,一个自然的问题是:我们能否从根本上进一步提高定位方案的准确性?本文从理论上证明了RSS的时间相关性可以提高基于RSS指纹的室内定位精度。特别是,我们构建了一个理论框架来评估RSS的时间相关性如何影响位置估计的可靠性,该框架基于一个新提出的无线电传播模型,考虑给定Wi-Fi AP信号的时变特性。然后,将该理论框架应用于一维物理空间中的定位分析。这揭示了RSS的时间相关性可以提高定位性能的根本原因。我们进一步将分析扩展到高维场景。实验结果证实了我们的理论分析。
{"title":"Temporal correlation of the RSS improves accuracy of fingerprinting localization","authors":"Mei Wang, Zhehui Zhang, Xiaohua Tian, Xinbing Wang","doi":"10.1109/INFOCOM.2016.7524492","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524492","url":null,"abstract":"Indoor localization based on RSS fingerprinting approach has been attracting many research efforts in the past decades. Recent study presents a fundamental limit of the approach: given requirement of estimation accuracy, reliability of the user's localization result can be derived. As highly accurate indoor localization is essential to enable many location based services, a natural question to ask is: can we further improve the accuracy of the localization scheme fundamentally? In this paper, we theoretically show that the temporal correlation of the RSS can improve accuracy of the RSS fingerprinting based indoor localization. In particular, we construct a theoretical framework to evaluate how the temporal correlation of the RSS can influence the reliability of location estimation, which is based on a newly proposed radio propagation model considering the time-varying property of signals from a given Wi-Fi AP. Such a theoretical framework is then applied to analyze localization in the one dimensional physical space, which reveals the fundamental reason why performance improvement of localization can be brought by temporal correlation of the RSS. We further extend our analysis to high-dimensional scenarios. Experimental results corroborate our theoretical analysis.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116868995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Heavy-ball: A new approach to tame delay and convergence in wireless network optimization 重型球:在无线网络优化中驯服延迟和收敛的新方法
Jia Liu, A. Eryilmaz, N. Shroff, E. Bentley
The last decade has seen significant advances in optimization-based resource allocation and control approaches for wireless networks. However, the existing work suffer from poor performance in one or more of the metrics of optimality, delay, and convergence speed. To overcome these limitations, in this paper, we introduce a largely overlooked but highly effective heavy-ball optimization method. Based on this heavy-ball technique, we develop a cross-layer optimization framework that offers utility-optimality, fast-convergence, and significant delay reduction. Our contributions are three-fold: i) we propose a heavy-ball joint congestion control and routing/scheduling framework for both single-hop and multi-hop wireless networks; ii) we show that the proposed heavy-ball method offers an elegant three-way trade-off in utility, delay, and convergence, which is achieved under a near index-type simple policy; and more importantly, iii) our work opens the door to an unexplored network control and optimization paradigm that leverages advanced optimization techniques based on “memory/momentum” information.
在过去十年中,基于优化的无线网络资源分配和控制方法取得了重大进展。然而,现有的工作在最优性、延迟和收敛速度的一个或多个指标上表现不佳。为了克服这些限制,在本文中,我们介绍了一种很大程度上被忽视但非常有效的重球优化方法。基于这种重球技术,我们开发了一个跨层优化框架,该框架提供了实用最优性、快速收敛和显著的延迟减少。我们的贡献有三个方面:i)我们提出了一个用于单跳和多跳无线网络的重型联合拥塞控制和路由/调度框架;Ii)我们证明了所提出的重球方法在效用、延迟和收敛性方面提供了一个优雅的三方权衡,这是在近指数型简单策略下实现的;更重要的是,iii)我们的工作打开了一扇未开发的网络控制和优化范式的大门,该范式利用基于“记忆/动量”信息的高级优化技术。
{"title":"Heavy-ball: A new approach to tame delay and convergence in wireless network optimization","authors":"Jia Liu, A. Eryilmaz, N. Shroff, E. Bentley","doi":"10.1109/INFOCOM.2016.7524474","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524474","url":null,"abstract":"The last decade has seen significant advances in optimization-based resource allocation and control approaches for wireless networks. However, the existing work suffer from poor performance in one or more of the metrics of optimality, delay, and convergence speed. To overcome these limitations, in this paper, we introduce a largely overlooked but highly effective heavy-ball optimization method. Based on this heavy-ball technique, we develop a cross-layer optimization framework that offers utility-optimality, fast-convergence, and significant delay reduction. Our contributions are three-fold: i) we propose a heavy-ball joint congestion control and routing/scheduling framework for both single-hop and multi-hop wireless networks; ii) we show that the proposed heavy-ball method offers an elegant three-way trade-off in utility, delay, and convergence, which is achieved under a near index-type simple policy; and more importantly, iii) our work opens the door to an unexplored network control and optimization paradigm that leverages advanced optimization techniques based on “memory/momentum” information.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125021263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
A decomposition principle for link and relay selection in dual-hop 60 GHz networks 双跳60ghz网络中链路和中继选择的分解原理
Zhifeng He, S. Mao
We investigate the scheduling problem in a centralized dual-hop 60 GHz network with multiple Source-Destination (SD) pairs, relays, and a PicoNet Coordinator (PNC). The objective is to minimize the Maximum Expected Delivery Time (MEDT) among all SD pairs by jointly optimizing relay and link selection, while exploiting reflected mmWave transmissions and considering link blockage dynamics. We develop a Decomposition Principle to transform this problem into two sub-problems, one for link selection and the other for relay assignment when there is enough replays. We prove that the proposed scheme can achieve an optimality gap of just 1 time slot at greatly reduced complexity. We also develop a heuristic scheme to handle the case when there is no enough relays. The proposed schemes are validated with simulations, where their superior performance is observed.
我们研究了一个集中式双跳60ghz网络中的调度问题,该网络具有多个源-目的(SD)对、中继和一个PicoNet协调器(PNC)。目标是通过联合优化中继和链路选择,同时利用反射毫米波传输并考虑链路阻塞动态,最大限度地减少所有SD对之间的最大预期传输时间(MEDT)。利用分解原理将该问题分解为两个子问题,一个是链路选择问题,另一个是中继分配问题。我们证明了该方案可以在大大降低复杂度的情况下实现仅1个时隙的最优性间隙。我们还开发了一种启发式方案来处理没有足够继电器的情况。通过仿真验证了所提方案的有效性。
{"title":"A decomposition principle for link and relay selection in dual-hop 60 GHz networks","authors":"Zhifeng He, S. Mao","doi":"10.1109/INFOCOM.2016.7524517","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524517","url":null,"abstract":"We investigate the scheduling problem in a centralized dual-hop 60 GHz network with multiple Source-Destination (SD) pairs, relays, and a PicoNet Coordinator (PNC). The objective is to minimize the Maximum Expected Delivery Time (MEDT) among all SD pairs by jointly optimizing relay and link selection, while exploiting reflected mmWave transmissions and considering link blockage dynamics. We develop a Decomposition Principle to transform this problem into two sub-problems, one for link selection and the other for relay assignment when there is enough replays. We prove that the proposed scheme can achieve an optimality gap of just 1 time slot at greatly reduced complexity. We also develop a heuristic scheme to handle the case when there is no enough relays. The proposed schemes are validated with simulations, where their superior performance is observed.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128330462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Aggregation points planning for software-defined network based smart grid communications 基于软件定义网络的智能电网通信汇聚点规划
Shaowei Wang, X. Huang
Smart grid is characterized by a large number of smart meters (SMs) that exchange huge amounts of data with control center, where an effective communication network is required to guarantee reliable data transmission. In this paper, we introduce software defined network (SDN) technology to the smart grid, which decouples the control plane from the data plane so as to satisfy the communication requirements in the mart grid effectively. Aggregation points (APs) are employed in the data plane to process and forward data between SMs and control center. A general mathematical model is formulated to plan the APs, where we try to minimize the total deployment cost, including the opening expenditure of the APs, the connection cost between SMs and APs, and the connection cost between APs and control center. We present a 5-approximation algorithm to address the generated NP-hard problem, which yields performance-guaranteed solutions. Three representative scenarios are investigated to verity the efficiency of our proposal. Numerical results show that our proposed algorithm has great advantages over other heuristic ones.
智能电网的特点是大量的智能电表与控制中心交换大量的数据,需要有效的通信网络来保证数据的可靠传输。本文将软件定义网络(SDN)技术引入智能电网,将控制平面与数据平面解耦,从而有效地满足智能电网的通信需求。数据平面通过ap (Aggregation points)处理和转发短信与控制中心之间的数据。通过建立一个通用的数学模型对ap进行规划,尽量减少总部署成本,包括ap的开放费用、SMs与ap之间的连接成本、ap与控制中心之间的连接成本。我们提出了一个5-近似算法来解决生成的np困难问题,它产生了性能保证的解决方案。研究了三个典型的场景来验证我们的建议的有效性。数值结果表明,与其他启发式算法相比,本文提出的算法具有很大的优势。
{"title":"Aggregation points planning for software-defined network based smart grid communications","authors":"Shaowei Wang, X. Huang","doi":"10.1109/INFOCOM.2016.7524564","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524564","url":null,"abstract":"Smart grid is characterized by a large number of smart meters (SMs) that exchange huge amounts of data with control center, where an effective communication network is required to guarantee reliable data transmission. In this paper, we introduce software defined network (SDN) technology to the smart grid, which decouples the control plane from the data plane so as to satisfy the communication requirements in the mart grid effectively. Aggregation points (APs) are employed in the data plane to process and forward data between SMs and control center. A general mathematical model is formulated to plan the APs, where we try to minimize the total deployment cost, including the opening expenditure of the APs, the connection cost between SMs and APs, and the connection cost between APs and control center. We present a 5-approximation algorithm to address the generated NP-hard problem, which yields performance-guaranteed solutions. Three representative scenarios are investigated to verity the efficiency of our proposal. Numerical results show that our proposed algorithm has great advantages over other heuristic ones.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128405449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
An efficient auction mechanism for service chains in the NFV market NFV市场中服务链的有效拍卖机制
Sijia Gu, Zongpeng Li, Chuan Wu, Chuanhe Huang
Network Function Virtualization (NFV) is emerging as a new paradigm for providing elastic network functions through flexible virtual network function (VNF) instances executed on virtualized computing platforms exemplified by cloud datacenters. In the new NFV market, well defined VNF instances each realize an atomic function that can be chained to meet user demands in practice. This work studies the dynamic market mechanism design for the transaction of VNF service chains in the NFV market, to help relinquish the full power of NFV. Combining the techniques of primal-dual approximation algorithm design with Myerson's characterization of truthful mechanisms, we design a VNF chain auction that runs efficiently in polynomial time, guarantees truthfulness, and achieves near-optimal social welfare in the NFV eco-system. Extensive simulation studies verify the efficacy of our auction mechanism.
网络功能虚拟化(Network Function Virtualization, NFV)正在成为一种新的范例,它通过在云数据中心等虚拟化计算平台上执行灵活的虚拟网络功能(virtual Network Function, VNF)实例来提供弹性网络功能。在新的NFV市场中,定义良好的VNF实例每个都实现一个原子功能,可以通过链接来满足用户在实践中的需求。本文研究了NFV市场中VNF服务链交易的动态市场机制设计,以帮助NFV充分释放力量。结合原对偶逼近算法设计技术和Myerson真实机制表征,设计了一个在多项式时间内高效运行、保证真实性并实现NFV生态系统中接近最优社会福利的VNF链拍卖。大量的模拟研究验证了我们的拍卖机制的有效性。
{"title":"An efficient auction mechanism for service chains in the NFV market","authors":"Sijia Gu, Zongpeng Li, Chuan Wu, Chuanhe Huang","doi":"10.1109/INFOCOM.2016.7524438","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524438","url":null,"abstract":"Network Function Virtualization (NFV) is emerging as a new paradigm for providing elastic network functions through flexible virtual network function (VNF) instances executed on virtualized computing platforms exemplified by cloud datacenters. In the new NFV market, well defined VNF instances each realize an atomic function that can be chained to meet user demands in practice. This work studies the dynamic market mechanism design for the transaction of VNF service chains in the NFV market, to help relinquish the full power of NFV. Combining the techniques of primal-dual approximation algorithm design with Myerson's characterization of truthful mechanisms, we design a VNF chain auction that runs efficiently in polynomial time, guarantees truthfulness, and achieves near-optimal social welfare in the NFV eco-system. Extensive simulation studies verify the efficacy of our auction mechanism.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128164086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
A hierarchical edge cloud architecture for mobile computing 用于移动计算的分层边缘云架构
Liang Tong, Yong Li, Wei Gao
The performance of mobile computing would be significantly improved by leveraging cloud computing and migrating mobile workloads for remote execution at the cloud. In this paper, to efficiently handle the peak load and satisfy the requirements of remote program execution, we propose to deploy cloud servers at the network edge and design the edge cloud as a tree hierarchy of geo-distributed servers, so as to efficiently utilize the cloud resources to serve the peak loads from mobile users. The hierarchical architecture of edge cloud enables aggregation of the peak loads across different tiers of cloud servers to maximize the amount of mobile workloads being served. To ensure efficient utilization of cloud resources, we further propose a workload placement algorithm that decides which edge cloud servers mobile programs are placed on and how much computational capacity is provisioned to execute each program. The performance of our proposed hierarchical edge cloud architecture on serving mobile workloads is evaluated by formal analysis, small-scale system experimentation, and large-scale trace-based simulations.
通过利用云计算并将移动工作负载迁移到云中进行远程执行,将大大提高移动计算的性能。为了有效地处理峰值负载,满足远程程序执行的需求,本文提出在网络边缘部署云服务器,并将边缘云设计为地理分布服务器的树形结构,从而有效地利用云资源服务于移动用户的峰值负载。边缘云的分层架构支持跨不同层的云服务器聚合峰值负载,从而最大限度地提高所服务的移动工作负载量。为了确保云资源的有效利用,我们进一步提出了一种工作负载放置算法,该算法决定将移动程序放置在哪些边缘云服务器上,以及为执行每个程序提供多少计算能力。我们提出的分层边缘云架构在服务移动工作负载方面的性能通过形式分析、小规模系统实验和大规模基于跟踪的模拟来评估。
{"title":"A hierarchical edge cloud architecture for mobile computing","authors":"Liang Tong, Yong Li, Wei Gao","doi":"10.1109/INFOCOM.2016.7524340","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524340","url":null,"abstract":"The performance of mobile computing would be significantly improved by leveraging cloud computing and migrating mobile workloads for remote execution at the cloud. In this paper, to efficiently handle the peak load and satisfy the requirements of remote program execution, we propose to deploy cloud servers at the network edge and design the edge cloud as a tree hierarchy of geo-distributed servers, so as to efficiently utilize the cloud resources to serve the peak loads from mobile users. The hierarchical architecture of edge cloud enables aggregation of the peak loads across different tiers of cloud servers to maximize the amount of mobile workloads being served. To ensure efficient utilization of cloud resources, we further propose a workload placement algorithm that decides which edge cloud servers mobile programs are placed on and how much computational capacity is provisioned to execute each program. The performance of our proposed hierarchical edge cloud architecture on serving mobile workloads is evaluated by formal analysis, small-scale system experimentation, and large-scale trace-based simulations.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128173714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 425
Divide-and-conquer based cooperative jamming: Addressing multiple eavesdroppers in close proximity 基于分而治之的协同干扰:寻址近距离的多个窃听者
Zhihong Liu, Jiajia Liu, N. Kato, Jianfeng Ma, Qiping Huang
This paper investigates divide-and-conquer based cooperative jamming for physical-layer security enhancement in the presence of multiple eavesdroppers. Different from previous works, we consider a scenario where the eavesdroppers can be located anywhere inside the communication region of the source, no location information of the eavesdroppers is available and no constraint on the number of eavesdroppers is presupposed. The basic idea is to transmit the message in multiple rounds and exploit the helpful interference from the source and the destination to jam the eavesdroppers in close proximity. Stochastic geometry based analytic results as well as Monte Carlo simulations are presented to illustrate the achievable secrecy performances.
本文研究了在多窃听者存在的情况下,基于分而治之的物理层安全增强协同干扰。与以往的研究不同,我们考虑了这样一种场景:窃听者可以位于信号源通信区域内的任何位置,窃听者的位置信息不可用,窃听者的数量不受约束。其基本思想是多轮传输信息,利用源端和目标端的有益干扰干扰近距离的窃听者。给出了基于随机几何的分析结果和蒙特卡罗仿真来说明可实现的保密性能。
{"title":"Divide-and-conquer based cooperative jamming: Addressing multiple eavesdroppers in close proximity","authors":"Zhihong Liu, Jiajia Liu, N. Kato, Jianfeng Ma, Qiping Huang","doi":"10.1109/INFOCOM.2016.7524448","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524448","url":null,"abstract":"This paper investigates divide-and-conquer based cooperative jamming for physical-layer security enhancement in the presence of multiple eavesdroppers. Different from previous works, we consider a scenario where the eavesdroppers can be located anywhere inside the communication region of the source, no location information of the eavesdroppers is available and no constraint on the number of eavesdroppers is presupposed. The basic idea is to transmit the message in multiple rounds and exploit the helpful interference from the source and the destination to jam the eavesdroppers in close proximity. Stochastic geometry based analytic results as well as Monte Carlo simulations are presented to illustrate the achievable secrecy performances.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128685094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1