首页 > 最新文献

IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications最新文献

英文 中文
To delay or not: Temporal vaccination games on networks 延迟与否:网络上的临时疫苗接种游戏
Abhijin Adiga, S. Venkatramanan, A. Vullikanti
Interventions such as vaccinations or installing anti-virus software are common strategies for controlling the spread of epidemics and malware on complex networks. Typically, nodes decide whether to implement such an intervention independently, depending on the costs they incur. A node can be protected by herd immunity, if enough other nodes implement such an intervention, making the problem of determining strategic decisions for vaccination a natural game-theoretical problem. There has been a lot of work on vaccination and network security game models, but all these models assume the vaccination decisions are made at the start of the game. However, in practice, a lot of individuals defer their vaccination decision, and the reasons for this behavior are not well understood, especially in network models. In this paper, we study a novel repeated game formulation, which considers vaccination decisions over time. We characterize Nash equilibria and the social optimum in such games, and find that a significant fraction of vaccinations might be deferred, in general. This depends crucially on the network structure, and the information and the vaccination delay. We show that finding Nash equilibria and the social optimum are NP-hard in general, and we develop an approximation algorithm for the social optimum whose approximation guarantee depends on the delay.
接种疫苗或安装杀毒软件等干预措施是控制流行病和恶意软件在复杂网络上传播的常用策略。通常,节点决定是否独立实现这种干预,这取决于它们所产生的成本。如果有足够多的其他节点实施这种干预,那么一个节点就可以受到群体免疫的保护,从而使确定疫苗接种战略决策的问题成为一个自然的博弈论问题。关于疫苗接种和网络安全的博弈模型已经有很多研究,但所有这些模型都假设疫苗接种决策是在博弈开始时做出的。然而,在实践中,许多个体推迟了他们的疫苗接种决定,而这种行为的原因并不是很清楚,特别是在网络模型中。在本文中,我们研究了一种新的重复博弈公式,该公式考虑了随时间的疫苗接种决策。我们描述了这种博弈中的纳什均衡和社会最优,并发现通常有很大一部分疫苗接种可能被推迟。这主要取决于网络结构、信息和疫苗接种延迟。我们证明了寻找纳什均衡和社会最优通常是np困难的,并且我们开发了一个社会最优的近似算法,其近似保证依赖于延迟。
{"title":"To delay or not: Temporal vaccination games on networks","authors":"Abhijin Adiga, S. Venkatramanan, A. Vullikanti","doi":"10.1109/INFOCOM.2016.7524351","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524351","url":null,"abstract":"Interventions such as vaccinations or installing anti-virus software are common strategies for controlling the spread of epidemics and malware on complex networks. Typically, nodes decide whether to implement such an intervention independently, depending on the costs they incur. A node can be protected by herd immunity, if enough other nodes implement such an intervention, making the problem of determining strategic decisions for vaccination a natural game-theoretical problem. There has been a lot of work on vaccination and network security game models, but all these models assume the vaccination decisions are made at the start of the game. However, in practice, a lot of individuals defer their vaccination decision, and the reasons for this behavior are not well understood, especially in network models. In this paper, we study a novel repeated game formulation, which considers vaccination decisions over time. We characterize Nash equilibria and the social optimum in such games, and find that a significant fraction of vaccinations might be deferred, in general. This depends crucially on the network structure, and the information and the vaccination delay. We show that finding Nash equilibria and the social optimum are NP-hard in general, and we develop an approximation algorithm for the social optimum whose approximation guarantee depends on the delay.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"595 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116276422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Application-aware traffic scheduling for workload offloading in mobile clouds 基于应用程序感知的移动云工作负载卸载流量调度
Liang Tong, Wei Gao
Mobile Cloud Computing (MCC) bridges the gap between limited capabilities of mobile devices and the increasing complexity of mobile applications, by offloading the computational workloads from local devices to the cloud. Current research supports workload offloading through appropriate application partitioning and remote method execution, but generally ignores the impact of wireless network characteristics on such offloading. Wireless data transmissions incurred by remote method execution consume a large amount of additional energy during transmission intervals when the network interface stays in the high-power state, and deferring these transmissions increases the response delay of mobile applications. In this paper, we adaptively balance the tradeoff between energy efficiency and responsiveness of mobile applications by developing application-aware wireless transmission scheduling algorithms. We take both causality and run-time dynamics of application method executions into account when deferring wireless transmissions, so as to minimize the wireless energy cost and satisfy the application delay constraint with respect to the practical system contexts. Systematic evaluations show that our scheme significantly improves the energy efficiency of workload offloading over realistic smartphone applications.
移动云计算(MCC)通过将计算工作负载从本地设备转移到云端,弥合了移动设备有限的功能与移动应用程序日益复杂之间的差距。目前的研究支持通过适当的应用程序分区和远程方法执行来卸载工作负载,但通常忽略了无线网络特性对这种卸载的影响。当网络接口处于高功率状态时,远程方法执行产生的无线数据传输在传输间隔期间消耗大量的额外能量,延迟这些传输增加了移动应用程序的响应延迟。在本文中,我们通过开发应用感知的无线传输调度算法,自适应地平衡了移动应用的能源效率和响应性之间的权衡。在延迟无线传输时,我们考虑了应用方法执行的因果关系和运行时动态,以最小化无线能量消耗并满足实际系统环境下的应用延迟约束。系统评估表明,我们的方案显着提高了实际智能手机应用程序负载卸载的能源效率。
{"title":"Application-aware traffic scheduling for workload offloading in mobile clouds","authors":"Liang Tong, Wei Gao","doi":"10.1109/INFOCOM.2016.7524520","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524520","url":null,"abstract":"Mobile Cloud Computing (MCC) bridges the gap between limited capabilities of mobile devices and the increasing complexity of mobile applications, by offloading the computational workloads from local devices to the cloud. Current research supports workload offloading through appropriate application partitioning and remote method execution, but generally ignores the impact of wireless network characteristics on such offloading. Wireless data transmissions incurred by remote method execution consume a large amount of additional energy during transmission intervals when the network interface stays in the high-power state, and deferring these transmissions increases the response delay of mobile applications. In this paper, we adaptively balance the tradeoff between energy efficiency and responsiveness of mobile applications by developing application-aware wireless transmission scheduling algorithms. We take both causality and run-time dynamics of application method executions into account when deferring wireless transmissions, so as to minimize the wireless energy cost and satisfy the application delay constraint with respect to the practical system contexts. Systematic evaluations show that our scheme significantly improves the energy efficiency of workload offloading over realistic smartphone applications.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116223898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
CamK: A camera-based keyboard for small mobile devices CamK:用于小型移动设备的基于摄像头的键盘
Yafeng Yin, Qun A. Li, Lei Xie, Shanhe Yi, Ed Novak, Sanglu Lu
Due to the smaller size of mobile devices, on-screen keyboards become inefficient for text entry. In this paper, we present CamK, a camera-based text-entry method, which uses an arbitrary panel (e.g., a piece of paper) with a keyboard layout to input text into small devices. CamK captures the images during the typing process and uses the image processing technique to recognize the typing behavior. The principle of CamK is to extract the keys, track the user's fingertips, detect and localize the keystroke. To achieve high accuracy of keystroke localization and low false positive rate of keystroke detection, CamK introduces the initial training and online calibration. Additionally, CamK optimizes computation-intensive modules to reduce the time latency. We implement CamK on a mobile device running Android. Our experiment results show that CamK can achieve above 95% accuracy of keystroke localization, with only 4.8% false positive keystrokes. When compared to on-screen keyboards, CamK can achieve 1.25X typing speedup for regular text input and 2.5X for random character input.
由于移动设备的尺寸较小,屏幕上的键盘对于文本输入变得低效。在本文中,我们提出了CamK,一种基于摄像头的文本输入方法,它使用带有键盘布局的任意面板(例如,一张纸)将文本输入到小型设备中。CamK捕获输入过程中的图像,并使用图像处理技术来识别输入行为。CamK的原理是提取按键,跟踪用户的指尖,检测和定位按键。为了实现高精度的按键定位和低误报率的按键检测,CamK引入了初始训练和在线校准。此外,CamK优化了计算密集型模块,以减少时间延迟。我们在运行Android的移动设备上实现CamK。实验结果表明,CamK可以实现95%以上的按键定位准确率,只有4.8%的误报按键。与屏幕键盘相比,CamK对于常规文本输入可以实现1.25倍的输入加速,对于随机字符输入可以实现2.5倍的输入加速。
{"title":"CamK: A camera-based keyboard for small mobile devices","authors":"Yafeng Yin, Qun A. Li, Lei Xie, Shanhe Yi, Ed Novak, Sanglu Lu","doi":"10.1109/INFOCOM.2016.7524400","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524400","url":null,"abstract":"Due to the smaller size of mobile devices, on-screen keyboards become inefficient for text entry. In this paper, we present CamK, a camera-based text-entry method, which uses an arbitrary panel (e.g., a piece of paper) with a keyboard layout to input text into small devices. CamK captures the images during the typing process and uses the image processing technique to recognize the typing behavior. The principle of CamK is to extract the keys, track the user's fingertips, detect and localize the keystroke. To achieve high accuracy of keystroke localization and low false positive rate of keystroke detection, CamK introduces the initial training and online calibration. Additionally, CamK optimizes computation-intensive modules to reduce the time latency. We implement CamK on a mobile device running Android. Our experiment results show that CamK can achieve above 95% accuracy of keystroke localization, with only 4.8% false positive keystrokes. When compared to on-screen keyboards, CamK can achieve 1.25X typing speedup for regular text input and 2.5X for random character input.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116828597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
An O(1)-competitive online caching algorithm for content centric networking 面向内容中心网络的0(1)竞争在线缓存算法
Ammar Gharaibeh, Abdallah Khreishah, Issa M. Khalil
Since the emergence of Content Centric Networking (CCN) as a new paradigm for content delivery in the Internet, copious of research targeted the evaluation or the enhancement of CCN caching schemes. Motivated by providing the Internet Service Providers with incentives to perform caching, the increasing deployment of in-network cloudlets, and the low cost of storage devices, we study caching in CCN from an economical point of view, where the content providers pay the Internet Service Providers in exchange for caching their content items. We propose an online caching algorithm for CCN that does not require the exact knowledge of content items' popularities to minimize the total cost paid by the content providers. The total cost here is the sum of the caching costs and the retrieval costs. Our analysis shows that the proposed algorithm achieves an O(1) competitive ratio when compared to the optimal offline caching scheme that possesses the exact knowledge of content items' popularities. We also show through simulations that the proposed algorithm can cut the cost incurred by widely used caching schemes such as Leave Copy Down (LCD) and Leave Copy Everywhere (LCE) by up to 65%.
自从内容中心网络(CCN)作为互联网内容交付的新范式出现以来,大量的研究针对CCN缓存方案的评估或增强。由于向互联网服务提供商提供执行缓存的激励、网络内云的不断增加的部署以及存储设备的低成本,我们从经济的角度研究了CCN中的缓存,其中内容提供商支付互联网服务提供商以换取缓存其内容项。我们提出了一种CCN的在线缓存算法,该算法不需要准确了解内容项目的流行程度,以最大限度地减少内容提供商支付的总成本。这里的总成本是缓存成本和检索成本的总和。我们的分析表明,与拥有内容项目流行度确切知识的最优离线缓存方案相比,所提出的算法实现了O(1)的竞争比。我们还通过仿真表明,该算法可以将广泛使用的缓存方案(如Leave Copy Down (LCD)和Leave Copy Everywhere (LCE))所产生的成本降低高达65%。
{"title":"An O(1)-competitive online caching algorithm for content centric networking","authors":"Ammar Gharaibeh, Abdallah Khreishah, Issa M. Khalil","doi":"10.1109/INFOCOM.2016.7524444","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524444","url":null,"abstract":"Since the emergence of Content Centric Networking (CCN) as a new paradigm for content delivery in the Internet, copious of research targeted the evaluation or the enhancement of CCN caching schemes. Motivated by providing the Internet Service Providers with incentives to perform caching, the increasing deployment of in-network cloudlets, and the low cost of storage devices, we study caching in CCN from an economical point of view, where the content providers pay the Internet Service Providers in exchange for caching their content items. We propose an online caching algorithm for CCN that does not require the exact knowledge of content items' popularities to minimize the total cost paid by the content providers. The total cost here is the sum of the caching costs and the retrieval costs. Our analysis shows that the proposed algorithm achieves an O(1) competitive ratio when compared to the optimal offline caching scheme that possesses the exact knowledge of content items' popularities. We also show through simulations that the proposed algorithm can cut the cost incurred by widely used caching schemes such as Leave Copy Down (LCD) and Leave Copy Everywhere (LCE) by up to 65%.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123356793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
On the synchronization bottleneck of OpenStack Swift-like cloud storage systems 关于OpenStack类swift云存储的同步瓶颈问题
T. Chekam, Ennan Zhai, Zhenhua Li, Yong Cui, K. Ren
As one type of the most popular cloud storage services, OpenStack Swift and its follow-up systems replicate each data object across multiple storage nodes and leverage object sync protocols to achieve high availability and eventual consistency. The performance of object sync protocols heavily relies on two key parameters: r (number of replicas for each object) and η (number of objects hosted by each storage node). In existing tutorials and demos, the configurations are usually r = 3 and n <; 1000 by default, and the object sync process seems to perform well. To deep understand object sync protocols, we first make a lab-scale OpenStack Swift deployment and run experiments with various configurations. We discover that in data-intensive scenarios, e.g., when r > 3 and n ≫ 1000, the object sync process is significantly delayed and produces massive network overhead. This phenomenon is referred to as the sync bottleneck problem. Then, to explore the root cause, we review the source code of OpenStack Swift and find that its object sync protocol utilizes a fairly simple and network-intensive approach to check the consistency among replicas of objects. In particular, each storage node is required to periodically multicast the hash values of all its hosted objects to all the other replica nodes. Thus in a sync round, the number of exchanged hash values per node is Θ(n×r). Further, to tackle the problem, we propose a lightweight object sync protocol called LightSync. It remarkably reduces the sync overhead by using two novel building blocks: 1) Hashing of Hashes, which aggregates all the h hash values of each data partition into a single but representative hash value with the Merkle tree; 2) Circular Hash Checking, which checks the consistency of different partition replicas by only sending the aggregated hash value to the clockwise neighbor. Its design provably reduces the per-node network overhead from Θ(n×r) to Θ(n/h). In addition, we have implemented LightSync as an open-source patch and adopted it to OpenStack Swift, thus reducing sync delay by up to 28.8× and network overhead by up to 14.2×.
OpenStack Swift及其后续系统作为目前最流行的云存储服务之一,通过在多个存储节点上复制每个数据对象,并利用对象同步协议实现高可用性和最终一致性。对象同步协议的性能严重依赖于两个关键参数:r(每个对象的副本数量)和η(每个存储节点托管的对象数量)。在现有的教程和演示中,配置通常是r = 3、n3和n = 1000,对象同步过程明显延迟,并产生大量的网络开销。这种现象被称为同步瓶颈问题。然后,为了探究根本原因,我们回顾了OpenStack Swift的源代码,发现它的对象同步协议使用了一种相当简单和网络密集型的方法来检查对象副本之间的一致性。特别是,每个存储节点需要定期将其所有托管对象的哈希值多播给所有其他副本节点。因此,在同步轮中,每个节点交换的哈希值的数量为Θ(n×r)。此外,为了解决这个问题,我们提出了一个轻量级的对象同步协议LightSync。它通过使用两个新的构建块显著地减少了同步开销:1)哈希的哈希,它将每个数据分区的所有h哈希值聚集到一个具有Merkle树代表性的单个哈希值中;2)循环哈希检查(Circular Hash Checking),通过只将聚合的哈希值发送给顺时针邻居来检查不同分区副本的一致性。其设计可证明将每个节点的网络开销从Θ(n×r)降低到Θ(n/h)。此外,我们已经将LightSync作为开源补丁实现,并将其采用到OpenStack Swift中,从而减少了高达28.8倍的同步延迟和高达14.2倍的网络开销。
{"title":"On the synchronization bottleneck of OpenStack Swift-like cloud storage systems","authors":"T. Chekam, Ennan Zhai, Zhenhua Li, Yong Cui, K. Ren","doi":"10.1109/INFOCOM.2016.7524349","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524349","url":null,"abstract":"As one type of the most popular cloud storage services, OpenStack Swift and its follow-up systems replicate each data object across multiple storage nodes and leverage object sync protocols to achieve high availability and eventual consistency. The performance of object sync protocols heavily relies on two key parameters: r (number of replicas for each object) and η (number of objects hosted by each storage node). In existing tutorials and demos, the configurations are usually r = 3 and n <; 1000 by default, and the object sync process seems to perform well. To deep understand object sync protocols, we first make a lab-scale OpenStack Swift deployment and run experiments with various configurations. We discover that in data-intensive scenarios, e.g., when r > 3 and n ≫ 1000, the object sync process is significantly delayed and produces massive network overhead. This phenomenon is referred to as the sync bottleneck problem. Then, to explore the root cause, we review the source code of OpenStack Swift and find that its object sync protocol utilizes a fairly simple and network-intensive approach to check the consistency among replicas of objects. In particular, each storage node is required to periodically multicast the hash values of all its hosted objects to all the other replica nodes. Thus in a sync round, the number of exchanged hash values per node is Θ(n×r). Further, to tackle the problem, we propose a lightweight object sync protocol called LightSync. It remarkably reduces the sync overhead by using two novel building blocks: 1) Hashing of Hashes, which aggregates all the h hash values of each data partition into a single but representative hash value with the Merkle tree; 2) Circular Hash Checking, which checks the consistency of different partition replicas by only sending the aggregated hash value to the clockwise neighbor. Its design provably reduces the per-node network overhead from Θ(n×r) to Θ(n/h). In addition, we have implemented LightSync as an open-source patch and adopted it to OpenStack Swift, thus reducing sync delay by up to 28.8× and network overhead by up to 14.2×.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123232107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Augmenting wide-band 802.11 transmissions via unequal packet bit protection 通过不相等分组位保护增强宽带802.11传输
Yaxiong Xie, Zhenjiang Li, Mo Li, K. Jamieson
Due to frequency selective fading, modern wideband 802.11 transmissions have unevenly distributed bit BERs in a packet. In this paper, we propose to unequally protect packet bits according to their BERs. By doing so, we can best match the effective transmission rate of each bit to channel condition, and improve throughput. The major design challenge lies in deriving an accurate relationship between the frequency selective channel condition and the decoded packet bit BERs, all the way through the complex 802.11 PHY layer. Based on our study, we find that the decoding error of a packet bit corresponds to dense errors in the underlying codeword bits, and the BER can be truthfully approximated by the codeword bit error density. With above observation, we propose UnPKT, scheme that protects packet bits using different MAC-layer FEC redundancies based on bit-wise BER estimation to augment wide-band 802.11 transmissions. UnPKT is software-implementable and compatible with the existing 802.11 architecture. Extensive evaluations based on Atheros 9580 NICs and GNU-Radio platforms show the effectiveness of our design. UnPKT can achieve a significant goodput improvement over state-of-the-art approaches.
由于频率选择性衰落,现代宽带802.11传输在数据包中具有不均匀分布的位ber。在本文中,我们提出根据分组的ber对分组位进行不等保护。这样可以使每个比特的有效传输速率与信道条件最好地匹配,提高吞吐量。主要的设计挑战在于通过复杂的802.11物理层推导出频率选择信道条件和解码数据包位ber之间的精确关系。通过研究,我们发现数据包位的译码误差对应于底层码字位的密集误差,误码率可以用码字误码密度真实地近似。基于以上观察,我们提出了UnPKT方案,该方案使用基于比特误码率估计的不同mac层FEC冗余来保护数据包位,以增强宽带802.11传输。UnPKT是软件实现的,与现有的802.11架构兼容。基于Atheros 9580网卡和GNU-Radio平台的广泛评估显示了我们设计的有效性。联合国维和部队可以大大改进最先进的办法。
{"title":"Augmenting wide-band 802.11 transmissions via unequal packet bit protection","authors":"Yaxiong Xie, Zhenjiang Li, Mo Li, K. Jamieson","doi":"10.1109/INFOCOM.2016.7524450","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524450","url":null,"abstract":"Due to frequency selective fading, modern wideband 802.11 transmissions have unevenly distributed bit BERs in a packet. In this paper, we propose to unequally protect packet bits according to their BERs. By doing so, we can best match the effective transmission rate of each bit to channel condition, and improve throughput. The major design challenge lies in deriving an accurate relationship between the frequency selective channel condition and the decoded packet bit BERs, all the way through the complex 802.11 PHY layer. Based on our study, we find that the decoding error of a packet bit corresponds to dense errors in the underlying codeword bits, and the BER can be truthfully approximated by the codeword bit error density. With above observation, we propose UnPKT, scheme that protects packet bits using different MAC-layer FEC redundancies based on bit-wise BER estimation to augment wide-band 802.11 transmissions. UnPKT is software-implementable and compatible with the existing 802.11 architecture. Extensive evaluations based on Atheros 9580 NICs and GNU-Radio platforms show the effectiveness of our design. UnPKT can achieve a significant goodput improvement over state-of-the-art approaches.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124675030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
DiVA: Distributed Voronoi-based acoustic source localization with wireless sensor networks DiVA:基于voronoi的分布式声源定位与无线传感器网络
Xueshu Zheng, S. Yang, Naigao Jin, Lei Wang, Mathew L. Wymore, D. Qiao
This paper presents DiVA, a novel hybrid range-free and range-based acoustic source localization scheme that uses an ad-hoc network of microphone sensor nodes to produce an accurate estimate of the source's location in the presence of various real-world challenges. DiVA uses range-free pairwise comparisons of sound detection timestamps between local Voronoi neighbors to identify the node closest to the acoustic source, which then estimates the source's location using a constrained range-based method. Through simulation and experimental evaluations, DiVA is shown to be accurate and highly robust, making it practical for real-world applications.
本文介绍了DiVA,一种新型的无距离和基于距离的混合声源定位方案,该方案使用麦克风传感器节点的自组织网络,在各种现实世界挑战的存在下准确估计声源的位置。DiVA使用无距离两两比较本地Voronoi邻居之间的声音检测时间戳来识别最接近声源的节点,然后使用基于受限距离的方法估计声源的位置。通过仿真和实验评估,DiVA被证明是准确的和高度鲁棒性的,使其在实际应用中具有实用性。
{"title":"DiVA: Distributed Voronoi-based acoustic source localization with wireless sensor networks","authors":"Xueshu Zheng, S. Yang, Naigao Jin, Lei Wang, Mathew L. Wymore, D. Qiao","doi":"10.1109/INFOCOM.2016.7524541","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524541","url":null,"abstract":"This paper presents DiVA, a novel hybrid range-free and range-based acoustic source localization scheme that uses an ad-hoc network of microphone sensor nodes to produce an accurate estimate of the source's location in the presence of various real-world challenges. DiVA uses range-free pairwise comparisons of sound detection timestamps between local Voronoi neighbors to identify the node closest to the acoustic source, which then estimates the source's location using a constrained range-based method. Through simulation and experimental evaluations, DiVA is shown to be accurate and highly robust, making it practical for real-world applications.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"4 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120839635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Accurate recovery of Internet traffic data: A tensor completion approach 互联网流量数据的精确恢复:一种张量补全方法
Kun Xie, Lele Wang, Xin Wang, Gaogang Xie, Jigang Wen, Guangxin Zhang
The inference of traffic volume of the whole network from partial traffic measurements becomes increasingly critical for various network engineering tasks, such as traffic prediction, network optimization, and anomaly detection. Previous studies indicate that the matrix completion is a possible solution for this problem. However, as a two-dimension matrix cannot sufficiently capture the spatial-temporal features of traffic data, these approaches fail to work when the data missing ratio is high. To fully exploit hidden spatial-temporal structures of the traffic data, this paper models the traffic data as a 3-way traffic tensor and formulates the traffic data recovery problem as a low-rank tensor completion problem. However, the high computation complexity incurred by the conventional tensor completion algorithms prevents its practical application for the traffic data recovery. To reduce the computation cost, we propose a novel Sequential Tensor Completion algorithm (STC) which can efficiently exploit the tensor decomposition result for the previous traffic data to deduce the tensor decomposition for the current data. To the best of our knowledge, we are the first to apply the tensor to model Internet traffic data to well exploit their hidden structures and propose a sequential tensor completion algorithm to significantly speed up the traffic data recovery process. We have done extensive simulations with the real traffic trace as the input. The simulation results demonstrate that our algorithm can achieve significantly better performance compared with the literature tensor and matrix completion algorithms even when the data missing ratio is high.
从部分流量测量中推断出整个网络的流量,对于各种网络工程任务,如流量预测、网络优化和异常检测,变得越来越重要。以往的研究表明,矩阵完井是解决这一问题的一种可能方法。然而,由于二维矩阵不能充分捕捉交通数据的时空特征,当数据缺失率较高时,这些方法就失效了。为了充分挖掘交通数据隐藏的时空结构,本文将交通数据建模为一个三向交通张量,将交通数据恢复问题表述为一个低秩张量补全问题。然而,传统张量补全算法计算量大,阻碍了其在交通数据恢复中的实际应用。为了减少计算量,提出了一种新的顺序张量补全算法(STC),该算法可以有效地利用之前交通数据的张量分解结果来推导当前数据的张量分解。据我们所知,我们是第一个将张量应用于互联网流量数据建模,以很好地利用其隐藏结构,并提出了一个顺序张量补全算法,以显着加快流量数据恢复过程。我们用真实的交通轨迹作为输入进行了大量的模拟。仿真结果表明,即使在数据缺失率较高的情况下,与文献中的张量和矩阵补全算法相比,我们的算法也能取得明显更好的性能。
{"title":"Accurate recovery of Internet traffic data: A tensor completion approach","authors":"Kun Xie, Lele Wang, Xin Wang, Gaogang Xie, Jigang Wen, Guangxin Zhang","doi":"10.1109/INFOCOM.2016.7524463","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524463","url":null,"abstract":"The inference of traffic volume of the whole network from partial traffic measurements becomes increasingly critical for various network engineering tasks, such as traffic prediction, network optimization, and anomaly detection. Previous studies indicate that the matrix completion is a possible solution for this problem. However, as a two-dimension matrix cannot sufficiently capture the spatial-temporal features of traffic data, these approaches fail to work when the data missing ratio is high. To fully exploit hidden spatial-temporal structures of the traffic data, this paper models the traffic data as a 3-way traffic tensor and formulates the traffic data recovery problem as a low-rank tensor completion problem. However, the high computation complexity incurred by the conventional tensor completion algorithms prevents its practical application for the traffic data recovery. To reduce the computation cost, we propose a novel Sequential Tensor Completion algorithm (STC) which can efficiently exploit the tensor decomposition result for the previous traffic data to deduce the tensor decomposition for the current data. To the best of our knowledge, we are the first to apply the tensor to model Internet traffic data to well exploit their hidden structures and propose a sequential tensor completion algorithm to significantly speed up the traffic data recovery process. We have done extensive simulations with the real traffic trace as the input. The simulation results demonstrate that our algorithm can achieve significantly better performance compared with the literature tensor and matrix completion algorithms even when the data missing ratio is high.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130541582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
Optimal local data exchange in fiber-wireless access network: A joint network coding and device association design 光纤-无线接入网中最优本地数据交换:一种联合网络编码和设备关联设计
Jin Wang, K. Lu, Jianping Wang, C. Qiao
For many emerging mobile broadband services and applications, the source and destination are located in the same local region. Consequently, it is very important to design access networks to facilitate efficient local data exchange. In the past few years, most existing studies focus on either the wired or wireless domains. In this paper, we aim to exploit both the wired and wireless domains. Specifically, we consider a Fiber-Wireless access network in which a passive optical network (PON) connects densely deployed base stations. In such a scenario, we propose a novel access scheme, namely, NCDA, where the main idea is to utilize both network coding and device association. To understand the potentials of NCDA, we first formulate a mixed integer nonlinear programming (MINLP) to minimize the weighted number of packet transmissions (WNT), which is related to both the system capacity and energy consumption. We then theoretically analyze the tight upper bounds of the minimal WNT in the PON, which helps us to approximate the original problem by a mixed integer linear programming (MILP). Next, we develop efficient algorithms based on linear programming relaxation to solve the optimal NCDA problem. To validate our design, we conduct extensive simulation experiments, which demonstrate the impact of important network parameters and the promising potentials of the proposed scheme.
对于许多新兴的移动宽带业务和应用来说,源端和目的端都位于同一本地区域。因此,设计接入网以实现高效的本地数据交换是非常重要的。在过去的几年里,大多数现有的研究都集中在有线或无线领域。在本文中,我们的目标是利用有线和无线领域。具体来说,我们考虑一个光纤无线接入网,其中无源光网络(PON)连接密集部署的基站。在这种情况下,我们提出了一种新的访问方案,即NCDA,其主要思想是同时利用网络编码和设备关联。为了了解NCDA的潜力,我们首先制定了一个混合整数非线性规划(MINLP)来最小化加权分组传输数(WNT),这与系统容量和能量消耗有关。然后,我们从理论上分析了PON中最小WNT的紧上界,这有助于我们用混合整数线性规划(MILP)逼近原始问题。接下来,我们开发了基于线性规划松弛的高效算法来解决最优NCDA问题。为了验证我们的设计,我们进行了大量的仿真实验,证明了重要网络参数的影响以及所提出方案的潜力。
{"title":"Optimal local data exchange in fiber-wireless access network: A joint network coding and device association design","authors":"Jin Wang, K. Lu, Jianping Wang, C. Qiao","doi":"10.1109/INFOCOM.2016.7524477","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524477","url":null,"abstract":"For many emerging mobile broadband services and applications, the source and destination are located in the same local region. Consequently, it is very important to design access networks to facilitate efficient local data exchange. In the past few years, most existing studies focus on either the wired or wireless domains. In this paper, we aim to exploit both the wired and wireless domains. Specifically, we consider a Fiber-Wireless access network in which a passive optical network (PON) connects densely deployed base stations. In such a scenario, we propose a novel access scheme, namely, NCDA, where the main idea is to utilize both network coding and device association. To understand the potentials of NCDA, we first formulate a mixed integer nonlinear programming (MINLP) to minimize the weighted number of packet transmissions (WNT), which is related to both the system capacity and energy consumption. We then theoretically analyze the tight upper bounds of the minimal WNT in the PON, which helps us to approximate the original problem by a mixed integer linear programming (MILP). Next, we develop efficient algorithms based on linear programming relaxation to solve the optimal NCDA problem. To validate our design, we conduct extensive simulation experiments, which demonstrate the impact of important network parameters and the promising potentials of the proposed scheme.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130622653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cooperative data offloading in opportunistic mobile networks 机会移动网络中的协同数据卸载
Zongqing Lu, Xiao Sun, T. L. Porta
Opportunistic mobile networks consisting of intermittently connected mobile devices have been exploited for various applications, such as computational offloading and mitigating cellular traffic load. Different from existing work, in this paper, we focus on cooperatively offloading data among mobile devices to maximally improve the probability of data delivery from a mobile device to an intermittently connected remote server or data center within a given time constraint, which is referred to as the cooperative offloading problem. Unfortunately, cooperative offloading is NP-hard. To this end, a heuristic algorithm is designed based on the proposed probabilistic framework, which provides the estimation of the probability of successful data delivery over the opportunistic path, considering both data size and contact duration. Due to the lack of global information, a distributed algorithm is further proposed. The performance of the proposed approaches is evaluated based on both synthetic networks and real traces, and simulation results show that cooperative offloading can significantly improve the data delivery probability and the performance of both heuristic algorithm and distributed algorithm outperforms other approaches.
由间歇性连接的移动设备组成的机会性移动网络已被用于各种应用,例如计算卸载和减轻蜂窝流量负载。与已有工作不同的是,本文关注的是移动设备之间的数据协同卸载,以最大限度地提高在给定时间约束下,移动设备向间断性连接的远程服务器或数据中心传输数据的概率,称为协同卸载问题。不幸的是,合作卸载是NP-hard。为此,基于所提出的概率框架设计了一种启发式算法,该算法在考虑数据大小和接触时间的情况下,提供了通过机会路径成功传递数据的概率估计。由于缺乏全局信息,进一步提出了一种分布式算法。基于合成网络和真实轨迹对所提方法的性能进行了评估,仿真结果表明,协同卸载可以显著提高启发式算法和分布式算法的数据传输概率和性能,优于其他方法。
{"title":"Cooperative data offloading in opportunistic mobile networks","authors":"Zongqing Lu, Xiao Sun, T. L. Porta","doi":"10.1109/INFOCOM.2016.7524494","DOIUrl":"https://doi.org/10.1109/INFOCOM.2016.7524494","url":null,"abstract":"Opportunistic mobile networks consisting of intermittently connected mobile devices have been exploited for various applications, such as computational offloading and mitigating cellular traffic load. Different from existing work, in this paper, we focus on cooperatively offloading data among mobile devices to maximally improve the probability of data delivery from a mobile device to an intermittently connected remote server or data center within a given time constraint, which is referred to as the cooperative offloading problem. Unfortunately, cooperative offloading is NP-hard. To this end, a heuristic algorithm is designed based on the proposed probabilistic framework, which provides the estimation of the probability of successful data delivery over the opportunistic path, considering both data size and contact duration. Due to the lack of global information, a distributed algorithm is further proposed. The performance of the proposed approaches is evaluated based on both synthetic networks and real traces, and simulation results show that cooperative offloading can significantly improve the data delivery probability and the performance of both heuristic algorithm and distributed algorithm outperforms other approaches.","PeriodicalId":274591,"journal":{"name":"IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129457127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
期刊
IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1