首页 > 最新文献

2008 International Symposium on Parallel Architectures, Algorithms, and Networks (i-span 2008)最新文献

英文 中文
Improved Bounds on the Feedfoward Design of Optical Multiplexers 光复用器前馈设计的改进边界
Xiaoliang Wang, Xiaohong Jiang, S. Horiguchi
We focus on the non-conflicting design of a multistage feedforward network with optical bufferless Switch and fiber Delay Lines (SDL) to emulate an N-to-1 output buffered multiplexer supporting variable length bursts. Y. T. Chen et al. presented a sufficient condition (a bound) to guarantee the non-conflicting and FIFO properties in such a design. In this paper, we first point out the upper bound can not rise infinitely with the increase of the maximum burst length. Then, we develop a framework to construct a case which can be used to achieve a lower bound. Through simulation and performance comparison, we find the new bounds can significantly decrease the hardware cost for constructing such a feedforward SDL multiplexer while still providing the same performance guarantee as that of the old one.
我们专注于光无缓冲开关和光纤延迟线(SDL)的多级前馈网络的无冲突设计,以模拟支持可变长度突发的n对1输出缓冲多路复用器。Y. T. Chen等人提出了一个充分条件(界)来保证这种设计的不冲突和FIFO特性。本文首先指出,随着最大突发长度的增加,其上界不能无限上升。然后,我们开发了一个框架来构造一个可以用来实现下界的情况。通过仿真和性能比较,我们发现新的边界可以显著降低构建这种前馈SDL多路复用器的硬件成本,同时仍然提供与旧边界相同的性能保证。
{"title":"Improved Bounds on the Feedfoward Design of Optical Multiplexers","authors":"Xiaoliang Wang, Xiaohong Jiang, S. Horiguchi","doi":"10.1109/I-SPAN.2008.10","DOIUrl":"https://doi.org/10.1109/I-SPAN.2008.10","url":null,"abstract":"We focus on the non-conflicting design of a multistage feedforward network with optical bufferless Switch and fiber Delay Lines (SDL) to emulate an N-to-1 output buffered multiplexer supporting variable length bursts. Y. T. Chen et al. presented a sufficient condition (a bound) to guarantee the non-conflicting and FIFO properties in such a design. In this paper, we first point out the upper bound can not rise infinitely with the increase of the maximum burst length. Then, we develop a framework to construct a case which can be used to achieve a lower bound. Through simulation and performance comparison, we find the new bounds can significantly decrease the hardware cost for constructing such a feedforward SDL multiplexer while still providing the same performance guarantee as that of the old one.","PeriodicalId":305776,"journal":{"name":"2008 International Symposium on Parallel Architectures, Algorithms, and Networks (i-span 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131971318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Computing with Cells: Membrane Systems 细胞计算:膜系统
O. Ibarra
Summary form only given. Membrane computing, first introduced in 1998 by Gheorghe Paun, is a part of the general research effort of describing and investigating computing models, ideas, architectures, and paradigms from the processes taking place in nature. It is a branch of molecular computing that is motivated by cell biology. Membrane computing identifies an unconventional computing model, namely a P system, which abstracts from the way living cells process chemical compounds in their compartmental structure. Regions defined by a membrane structure contain multisets of objects that evolve according to specified rules. The objects can be represented as symbols or strings of symbols. By using the rules in a nondeterministic (deterministic) maximally parallel manner, transitions between the system configurations can be obtained. A sequence of transitions is a computation of how the system is evolving. Various ways of controlling the transfer of objects from one region to another and applying the rules, as well as possibilities to dissolve, divide or create membranes have been studied. P systems have a great potential for implementing massively concurrent systems in an efficient way that would allow us to solve currently intractable problems once future bio-technology gives way to a practical bio- realization. Since its introduction, the literature in this area has grown rapidly (in 2003, the Institute for Scientific Information designated the initialpaper as "fast breaking" and the domain as an "emerging research front in computer science"). We give a brief overview of membrane computing and report on recent results that answer some interesting and fundamental open questions in the field. We also look at the recently introduced neural-like systems, called spiking neural P systems. These systems incorporate the ideas of spiking neurons into membrane computing. We present various classes and characterize their computing power and complexity. In particular, we analyze asynchronous and sequential systems and present some conditions under which they become (non-)universal. The non-universal variants are characterized by monotonic counter machines and partially blind counter machines. The latter devices are known to be equivalent to vector addition systems (or Petri nets) and, hence, have many decidable properties.
只提供摘要形式。膜计算于1998年由georghe Paun首次提出,是描述和调查计算模型、思想、架构和范式的一般研究工作的一部分,这些模型、思想、架构和范式来自自然界中发生的过程。它是分子计算的一个分支,受到细胞生物学的启发。膜计算确定了一种非常规的计算模型,即P系统,它从活细胞在其隔室结构中处理化合物的方式中抽象出来。由膜结构定义的区域包含多组根据特定规则演化的对象。对象可以表示为符号或符号串。通过以非确定性(deterministic)最大并行方式使用规则,可以获得系统配置之间的转换。转换序列是对系统如何演化的计算。研究人员研究了控制物体从一个区域转移到另一个区域并应用这些规则的各种方法,以及溶解、分裂或产生膜的可能性。一旦未来的生物技术让位于实际的生物实现,P系统在以一种有效的方式实现大规模并发系统方面具有巨大的潜力,这将使我们能够解决当前棘手的问题。自引入以来,该领域的文献迅速增长(2003年,科学信息研究所将最初的论文指定为“快速突破”,并将该领域指定为“计算机科学的新兴研究前沿”)。我们给出了膜计算的简要概述,并报告了最近的结果,回答了一些有趣的和基本的开放性问题。我们还研究了最近引入的类神经系统,称为脉冲神经P系统。这些系统将脉冲神经元的思想融入到膜计算中。我们介绍了不同的类,并描述了它们的计算能力和复杂性。特别地,我们分析了异步和顺序系统,并提出了它们成为(非)通用的一些条件。非泛型的特征是单调计数机和部分盲计数机。众所周知,后一种装置相当于矢量加法系统(或Petri网),因此具有许多可确定的性质。
{"title":"Computing with Cells: Membrane Systems","authors":"O. Ibarra","doi":"10.1109/I-SPAN.2008.12","DOIUrl":"https://doi.org/10.1109/I-SPAN.2008.12","url":null,"abstract":"Summary form only given. Membrane computing, first introduced in 1998 by Gheorghe Paun, is a part of the general research effort of describing and investigating computing models, ideas, architectures, and paradigms from the processes taking place in nature. It is a branch of molecular computing that is motivated by cell biology. Membrane computing identifies an unconventional computing model, namely a P system, which abstracts from the way living cells process chemical compounds in their compartmental structure. Regions defined by a membrane structure contain multisets of objects that evolve according to specified rules. The objects can be represented as symbols or strings of symbols. By using the rules in a nondeterministic (deterministic) maximally parallel manner, transitions between the system configurations can be obtained. A sequence of transitions is a computation of how the system is evolving. Various ways of controlling the transfer of objects from one region to another and applying the rules, as well as possibilities to dissolve, divide or create membranes have been studied. P systems have a great potential for implementing massively concurrent systems in an efficient way that would allow us to solve currently intractable problems once future bio-technology gives way to a practical bio- realization. Since its introduction, the literature in this area has grown rapidly (in 2003, the Institute for Scientific Information designated the initialpaper as \"fast breaking\" and the domain as an \"emerging research front in computer science\"). We give a brief overview of membrane computing and report on recent results that answer some interesting and fundamental open questions in the field. We also look at the recently introduced neural-like systems, called spiking neural P systems. These systems incorporate the ideas of spiking neurons into membrane computing. We present various classes and characterize their computing power and complexity. In particular, we analyze asynchronous and sequential systems and present some conditions under which they become (non-)universal. The non-universal variants are characterized by monotonic counter machines and partially blind counter machines. The latter devices are known to be equivalent to vector addition systems (or Petri nets) and, hence, have many decidable properties.","PeriodicalId":305776,"journal":{"name":"2008 International Symposium on Parallel Architectures, Algorithms, and Networks (i-span 2008)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125089026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Handoff Performance Comparison of Mobile IP, Fast Handoff and mSCTP in Mobile Wireless Networks 移动无线网络中移动IP、快速切换和mSCTP切换性能比较
Ken C. K. Tsang, Cho-Li Wang, F. Lau
We compare the performance of three handoff protocols, namely Mobile IP, Fast Handoff and mSCTP. Among the three schemes, Mobile IP suffers from the lowest data throughput and longest handoff latency. Fast Handoff can perform better, provided that the mobile node can handoff to the new base station at an appropriate time instant when data forwarding between network routers begins. mSCTP supports multihoming; the mobile node does not need to determine the exact handoff time. Nevertheless, packet reordering and the subsequent fast retransmission degrades its handoff performance. To avoid these problems, adding some flow control operations in the transport layer is necessary. Flow control should be carried out in-sync with the handoff operations. This implies the transport layer should additionally recognise when do the handoff procedures start or finish. We therefore come up with a natural choice in designing a handoff scheme, which is to centralise the handoff and flow control operations in the transport layer.
我们比较了三种切换协议的性能,即移动IP,快速切换和mSCTP。三种方案中,移动IP方案的数据吞吐量最低,切换时延最长。如果移动节点能够在网络路由器之间的数据转发开始的适当时刻切换到新的基站,那么Fast Handoff的性能会更好。mSCTP支持多宿主;移动节点不需要确定确切的切换时间。然而,分组重排序和随后的快速重传降低了它的切换性能。为了避免这些问题,有必要在传输层中添加一些流控制操作。流量控制应与切换操作同步进行。这意味着传输层还应该识别切换过程何时开始或结束。因此,我们在设计切换方案时提出了一个自然的选择,即在传输层集中切换和流控制操作。
{"title":"Handoff Performance Comparison of Mobile IP, Fast Handoff and mSCTP in Mobile Wireless Networks","authors":"Ken C. K. Tsang, Cho-Li Wang, F. Lau","doi":"10.1109/I-SPAN.2008.43","DOIUrl":"https://doi.org/10.1109/I-SPAN.2008.43","url":null,"abstract":"We compare the performance of three handoff protocols, namely Mobile IP, Fast Handoff and mSCTP. Among the three schemes, Mobile IP suffers from the lowest data throughput and longest handoff latency. Fast Handoff can perform better, provided that the mobile node can handoff to the new base station at an appropriate time instant when data forwarding between network routers begins. mSCTP supports multihoming; the mobile node does not need to determine the exact handoff time. Nevertheless, packet reordering and the subsequent fast retransmission degrades its handoff performance. To avoid these problems, adding some flow control operations in the transport layer is necessary. Flow control should be carried out in-sync with the handoff operations. This implies the transport layer should additionally recognise when do the handoff procedures start or finish. We therefore come up with a natural choice in designing a handoff scheme, which is to centralise the handoff and flow control operations in the transport layer.","PeriodicalId":305776,"journal":{"name":"2008 International Symposium on Parallel Architectures, Algorithms, and Networks (i-span 2008)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115671663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Probabilistic Characterization of Fault Rings in Adaptively-Routed Mesh Interconnection Networks 自适应路由网状互连网络中故障环的概率表征
F. Safaei, A. Khonsari, Aresh Dadlani, M. Ould-Khaoua
With increase in concern for reliability in the current and next generation of multiprocessors system-on-chip (MP-SoCs), multi-computers, cluster computers, and peer-to-peer communication networks, fault-tolerance has become an integral part of these systems. One of the fundamental issues regarding fault-tolerance is how to efficiently route a faulty network where each component is associated with some probability of failure. Adaptive fault-tolerant routing algorithms have been frequently suggested in the literature as means of improving communication performance and fault-tolerant demands in computer systems. Also, several results have been reported on usage of fault rings in providing detours to messages blocked by faults and in routing messages adaptively around the rectangular faulty regions. In order to analyze the performance of such routing schemes, one must investigate the characteristics of fault rings. In this paper, we derive mathematical expressions to compute the probability of message facing the fault rings in the well-known mesh interconnection network. We also conduct extensive simulation experiments using a variety of faults, the results of which are used to confirm the accuracy of the proposed models.
随着对当前和下一代多处理器片上系统(mp - soc)、多计算机、集群计算机和点对点通信网络可靠性关注的增加,容错已成为这些系统不可或缺的一部分。关于容错的一个基本问题是如何有效地路由一个有故障的网络,其中每个组件都有一定的故障概率。自适应容错路由算法在文献中经常被提出作为提高计算机系统通信性能和容错要求的手段。此外,在使用故障环为被故障阻塞的消息提供绕路以及在矩形故障区域周围自适应路由消息方面,已经报道了一些结果。为了分析这些路由方案的性能,必须研究故障环的特性。在众所周知的网状互连网络中,我们导出了计算消息面对故障环概率的数学表达式。我们还使用各种故障进行了广泛的模拟实验,其结果用于确认所提出模型的准确性。
{"title":"A Probabilistic Characterization of Fault Rings in Adaptively-Routed Mesh Interconnection Networks","authors":"F. Safaei, A. Khonsari, Aresh Dadlani, M. Ould-Khaoua","doi":"10.1109/I-SPAN.2008.17","DOIUrl":"https://doi.org/10.1109/I-SPAN.2008.17","url":null,"abstract":"With increase in concern for reliability in the current and next generation of multiprocessors system-on-chip (MP-SoCs), multi-computers, cluster computers, and peer-to-peer communication networks, fault-tolerance has become an integral part of these systems. One of the fundamental issues regarding fault-tolerance is how to efficiently route a faulty network where each component is associated with some probability of failure. Adaptive fault-tolerant routing algorithms have been frequently suggested in the literature as means of improving communication performance and fault-tolerant demands in computer systems. Also, several results have been reported on usage of fault rings in providing detours to messages blocked by faults and in routing messages adaptively around the rectangular faulty regions. In order to analyze the performance of such routing schemes, one must investigate the characteristics of fault rings. In this paper, we derive mathematical expressions to compute the probability of message facing the fault rings in the well-known mesh interconnection network. We also conduct extensive simulation experiments using a variety of faults, the results of which are used to confirm the accuracy of the proposed models.","PeriodicalId":305776,"journal":{"name":"2008 International Symposium on Parallel Architectures, Algorithms, and Networks (i-span 2008)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121692208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Using an MDE Approach for Modeling of Interconnection Networks 用MDE方法建模互连网络
I. Quadri, Pierre Boulet, S. Meftali, J. Dekeyser
As system-on-chip (SoCs) become more complex, high performance interconnection mediums are required to handle their complexity. Network-on-chips (NoCs) enable integration of more intellectual properties (IPs) into the SoC with increased performance. In the recent MARTE (modeling and analysis of real-time and embedded systems) profile, a notion of multidimensional multiplicity has been proposed to model repetitive structures and topologies. This paper presents a modeling methodology based on that notation to model the delta network family of interconnection networks for NoC construction.
随着片上系统(soc)变得越来越复杂,需要高性能的互连介质来处理其复杂性。片上网络(noc)可以将更多的知识产权(ip)集成到SoC中,从而提高性能。在最近的MARTE(实时和嵌入式系统的建模和分析)概要中,提出了多维多样性的概念来对重复结构和拓扑进行建模。本文提出了一种基于该符号的建模方法,对NoC建设中互连网络的三角洲网络族进行建模。
{"title":"Using an MDE Approach for Modeling of Interconnection Networks","authors":"I. Quadri, Pierre Boulet, S. Meftali, J. Dekeyser","doi":"10.1109/I-SPAN.2008.40","DOIUrl":"https://doi.org/10.1109/I-SPAN.2008.40","url":null,"abstract":"As system-on-chip (SoCs) become more complex, high performance interconnection mediums are required to handle their complexity. Network-on-chips (NoCs) enable integration of more intellectual properties (IPs) into the SoC with increased performance. In the recent MARTE (modeling and analysis of real-time and embedded systems) profile, a notion of multidimensional multiplicity has been proposed to model repetitive structures and topologies. This paper presents a modeling methodology based on that notation to model the delta network family of interconnection networks for NoC construction.","PeriodicalId":305776,"journal":{"name":"2008 International Symposium on Parallel Architectures, Algorithms, and Networks (i-span 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122666326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Three-Dimensional Layout of On-Chip Tree-Based Networks 片上树型网络的三维布局
Hiroki Matsutani, M. Koibuchi, D. Hsu, H. Amano
Three-dimensional network-on-chip (3-D NoC) is an emerging research area exploring the network architecture of 3-D ICs that stack several smaller wafers or dice for reducing wire length and wire delay. Various network topologies such as meshes, tori, and trees have been used for NoCs. In particular, much attention has been focused on tree-based topologies, such as fat trees and fat H-tree, because of their relatively short hop-count that enables lower latency communication compared to meshes or tori. However, since on-chip tree-based networks in their 2-D layouts have long wire links around the root, they generate serious wire delay, posing severe problems to modem VLSI design. In this paper, we propose a 3-D layout scheme of trees including Fat Trees and fat H-tree for 3-D ICs in order to resolve the trees' intrinsic disadvantage. The 3-D layouts are compared with the original 2-D layouts in terms of network logic area, wire length, wire delay, number of repeaters inserted, and energy consumption. Evaluation results show that 1) total wire length is reduced by 25.0% to 50.0%; 2) wire delay is improved and repeater buffers that consume considerable energy can be removed; 3) flit transmission energy is reduced by up to 47.0%; 4) area overhead is at most 7.8%, which compares favorably to those for 3-D mesh and torus.
三维片上网络(3-D NoC)是一个新兴的研究领域,探索3-D集成电路的网络架构,将几个较小的晶圆或骰子堆叠在一起,以减少导线长度和导线延迟。各种网络拓扑结构,如网格、环面和树已被用于noc。特别是,许多注意力集中在基于树的拓扑结构上,如胖树和胖h树,因为与网格或环面相比,它们的跳数相对较短,可以实现更低的延迟通信。然而,由于片上树型网络的二维布局在根周围有很长的导线连接,它们会产生严重的导线延迟,给现代VLSI设计带来严重的问题。为了解决三维集成电路树的固有缺点,本文提出了一种包括胖树和胖h树在内的树的三维布局方案。从网络逻辑面积、线长、线延迟、中继器插入数、能耗等方面对三维布局与二维布局进行了比较。评价结果表明:1)总钢丝长度减少25.0% ~ 50.0%;2)改善了线延迟,消除了消耗大量能量的中继器缓冲器;3)飞行传输能量降低高达47.0%;4)面积开销最多为7.8%,这与3d网格和环面相比是有利的。
{"title":"Three-Dimensional Layout of On-Chip Tree-Based Networks","authors":"Hiroki Matsutani, M. Koibuchi, D. Hsu, H. Amano","doi":"10.1109/I-SPAN.2008.39","DOIUrl":"https://doi.org/10.1109/I-SPAN.2008.39","url":null,"abstract":"Three-dimensional network-on-chip (3-D NoC) is an emerging research area exploring the network architecture of 3-D ICs that stack several smaller wafers or dice for reducing wire length and wire delay. Various network topologies such as meshes, tori, and trees have been used for NoCs. In particular, much attention has been focused on tree-based topologies, such as fat trees and fat H-tree, because of their relatively short hop-count that enables lower latency communication compared to meshes or tori. However, since on-chip tree-based networks in their 2-D layouts have long wire links around the root, they generate serious wire delay, posing severe problems to modem VLSI design. In this paper, we propose a 3-D layout scheme of trees including Fat Trees and fat H-tree for 3-D ICs in order to resolve the trees' intrinsic disadvantage. The 3-D layouts are compared with the original 2-D layouts in terms of network logic area, wire length, wire delay, number of repeaters inserted, and energy consumption. Evaluation results show that 1) total wire length is reduced by 25.0% to 50.0%; 2) wire delay is improved and repeater buffers that consume considerable energy can be removed; 3) flit transmission energy is reduced by up to 47.0%; 4) area overhead is at most 7.8%, which compares favorably to those for 3-D mesh and torus.","PeriodicalId":305776,"journal":{"name":"2008 International Symposium on Parallel Architectures, Algorithms, and Networks (i-span 2008)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125434059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Detection and Identification of Anomalies in Wireless Mesh Networks Using Principal Component Analysis (PCA) 基于主成分分析(PCA)的无线Mesh网络异常检测与识别
Z. Zaidi, Sara Hakami, T. Moors, B. Landfeldt
Anomaly detection is becoming a powerful and necessary component as wireless networks gain popularity. In this paper, we evaluate the efficacy of PCA based anomaly detection for wireless mesh networks. PCA was originally developed for wired networks. Our experiments show that it is possible to detect different types of anomalies in an interference prone wireless environment. However, the sensitivity of PCA to small changes in flows prompted us to develop an anomaly identification scheme which automatically identifies the flow(s) causing the detected anomaly and their contributions in terms of number of packets. Our results show that the identification scheme is able to differentiate false alarms from real anomalies and pinpoint the culprit(s) in case of a real fault or threat. The experiments were performed over an 8 node mesh testbed deployed in an urban street layout in Sydney, under different realistic traffic scenarios. Our identification scheme facilitates the use of PCA based method for real-time anomaly detection in wireless networks as it can filter the false alarms locally at the monitoring nodes without excessive computational overhead.
随着无线网络的普及,异常检测正成为一个强大而必要的组成部分。在本文中,我们评估了基于PCA的无线网状网络异常检测的有效性。PCA最初是为有线网络开发的。我们的实验表明,在易受干扰的无线环境中检测不同类型的异常是可能的。然而,PCA对流量中的微小变化的敏感性促使我们开发了一种异常识别方案,该方案可以自动识别导致检测到的异常的流及其在数据包数量方面的贡献。我们的结果表明,该识别方案能够区分假警报和真实异常,并在发生真实故障或威胁的情况下查明罪魁祸首。实验在悉尼城市街道布置的8节点网格测试台上进行,在不同的现实交通场景下进行。我们的识别方案便于使用基于PCA的方法在无线网络中进行实时异常检测,因为它可以在监测节点本地过滤假警报,而不会产生过多的计算开销。
{"title":"Detection and Identification of Anomalies in Wireless Mesh Networks Using Principal Component Analysis (PCA)","authors":"Z. Zaidi, Sara Hakami, T. Moors, B. Landfeldt","doi":"10.1142/S0219265909002698","DOIUrl":"https://doi.org/10.1142/S0219265909002698","url":null,"abstract":"Anomaly detection is becoming a powerful and necessary component as wireless networks gain popularity. In this paper, we evaluate the efficacy of PCA based anomaly detection for wireless mesh networks. PCA was originally developed for wired networks. Our experiments show that it is possible to detect different types of anomalies in an interference prone wireless environment. However, the sensitivity of PCA to small changes in flows prompted us to develop an anomaly identification scheme which automatically identifies the flow(s) causing the detected anomaly and their contributions in terms of number of packets. Our results show that the identification scheme is able to differentiate false alarms from real anomalies and pinpoint the culprit(s) in case of a real fault or threat. The experiments were performed over an 8 node mesh testbed deployed in an urban street layout in Sydney, under different realistic traffic scenarios. Our identification scheme facilitates the use of PCA based method for real-time anomaly detection in wireless networks as it can filter the false alarms locally at the monitoring nodes without excessive computational overhead.","PeriodicalId":305776,"journal":{"name":"2008 International Symposium on Parallel Architectures, Algorithms, and Networks (i-span 2008)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132833931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Wide Diameter of Cayley Digraphs of Finite Cyclic Groups 有限循环群的Cayley有向图的宽直径
Xingde Jia
According to recent studies, communication networks built on extremal Cayley digraphs of finite cyclic groups have many advantages over that based on n-cubes. Extremal Cayley digraphs have been studied extensively in recent years. In this paper, we prove, for every positive integer k, that the k-wide diameter of the Cayley digraph Cay(Zm, A) is at most diam(Cay(Zm, A)) + 1 if A is an "m-ideal" set of k positive integers.
根据最近的研究,建立在有限循环群的极值Cayley有向图上的通信网络比建立在n-立方体上的通信网络有许多优点。近年来,人们对极值凯利有向图进行了广泛的研究。本文证明了对于每一个正整数k,如果A是k个正整数的“m-理想”集,那么Cayley有向图Cay(Zm, A)的k宽直径不大于(Cay(Zm, A)) + 1。
{"title":"Wide Diameter of Cayley Digraphs of Finite Cyclic Groups","authors":"Xingde Jia","doi":"10.1109/I-SPAN.2008.19","DOIUrl":"https://doi.org/10.1109/I-SPAN.2008.19","url":null,"abstract":"According to recent studies, communication networks built on extremal Cayley digraphs of finite cyclic groups have many advantages over that based on n-cubes. Extremal Cayley digraphs have been studied extensively in recent years. In this paper, we prove, for every positive integer k, that the k-wide diameter of the Cayley digraph Cay(Zm, A) is at most diam(Cay(Zm, A)) + 1 if A is an \"m-ideal\" set of k positive integers.","PeriodicalId":305776,"journal":{"name":"2008 International Symposium on Parallel Architectures, Algorithms, and Networks (i-span 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130614450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
K-Tree Trunk and a Distributed Algorithm for Effective Overlay Multicast on Mobile Ad Hoc Networks 移动Ad Hoc网络中有效覆盖组播的K-Tree树干和分布式算法
Yamin Li, S. Peng, Wanming Chu
Overlay multicast protocols construct a virtual mesh spanning all member nodes of a multicast group. It employs standard unicast routing and forwarding to fulfill multicast functionality. The advantages of this approach are robustness and low overhead. However, efficiency and stability are the issues that must be addressed in the mobile ad hoc network (MANET) environment. In this paper, we propose an effective structure for overlay multicast to solve these problems in MANET. Instead of using a spanning tree on the virtual mesh, we introduce a simple structure called k- tree trunk for multicast. A k-tree trunk of a tree is a subtree with k leaves that minimizes the sum of the distances of all vertices to the subtree plus the size of the subtree. The k-tree trunk is more stable and easier to maintain than the spanning tree in MANET. The simulation results show that our approach handles the flexibility and mobility issues in an overlay multicast protocol effectively, especially when the group size is large.
覆盖组播协议构建了一个虚拟网络,覆盖组播组的所有成员节点。它采用标准的单播路由和转发来实现多播功能。这种方法的优点是健壮性和低开销。然而,在移动自组织网络(MANET)环境中,效率和稳定性是必须解决的问题。本文提出了一种有效的覆盖组播结构来解决这些问题。在虚拟网络中,我们没有使用生成树,而是引入了一种简单的k- tree树干结构。一棵树的k树树干是一棵有k个叶子的子树,它最小化了所有顶点到子树的距离加上子树的大小。在MANET中,k树树干比生成树更稳定,更容易维护。仿真结果表明,该方法有效地解决了覆盖组播协议中的灵活性和移动性问题,特别是在组规模较大的情况下。
{"title":"K-Tree Trunk and a Distributed Algorithm for Effective Overlay Multicast on Mobile Ad Hoc Networks","authors":"Yamin Li, S. Peng, Wanming Chu","doi":"10.1109/I-SPAN.2008.22","DOIUrl":"https://doi.org/10.1109/I-SPAN.2008.22","url":null,"abstract":"Overlay multicast protocols construct a virtual mesh spanning all member nodes of a multicast group. It employs standard unicast routing and forwarding to fulfill multicast functionality. The advantages of this approach are robustness and low overhead. However, efficiency and stability are the issues that must be addressed in the mobile ad hoc network (MANET) environment. In this paper, we propose an effective structure for overlay multicast to solve these problems in MANET. Instead of using a spanning tree on the virtual mesh, we introduce a simple structure called k- tree trunk for multicast. A k-tree trunk of a tree is a subtree with k leaves that minimizes the sum of the distances of all vertices to the subtree plus the size of the subtree. The k-tree trunk is more stable and easier to maintain than the spanning tree in MANET. The simulation results show that our approach handles the flexibility and mobility issues in an overlay multicast protocol effectively, especially when the group size is large.","PeriodicalId":305776,"journal":{"name":"2008 International Symposium on Parallel Architectures, Algorithms, and Networks (i-span 2008)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134393902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Taxonomy of Data Prefetching Mechanisms 数据预取机制的分类
S. Byna, Yong Chen, Xian-He Sun
Data prefetching has been considered an effective way to mask data access latency caused by cache misses and to bridge the performance gap between processor and memory. With hardware and/or software support, data prefetching brings data closer to a processor before it is actually needed. Many prefetching techniques have been proposed in the last few years to reduce data access latency by taking advantage of multi-core architectures. In this paper, we propose a taxonomy that classifies various design concerns in developing a prefetching strategy. We discuss various prefetching strategies and issues that have to be considered in designing a prefetching strategy for multi-core processors.
数据预取被认为是一种有效的方法来掩盖由缓存丢失引起的数据访问延迟,并弥合处理器和内存之间的性能差距。在硬件和/或软件的支持下,数据预取使数据在实际需要之前更接近处理器。在过去的几年中,已经提出了许多预取技术,通过利用多核架构来减少数据访问延迟。在本文中,我们提出了一种分类法,对开发预取策略时的各种设计关注点进行分类。我们讨论了在设计多核处理器的预取策略时必须考虑的各种预取策略和问题。
{"title":"A Taxonomy of Data Prefetching Mechanisms","authors":"S. Byna, Yong Chen, Xian-He Sun","doi":"10.1109/I-SPAN.2008.24","DOIUrl":"https://doi.org/10.1109/I-SPAN.2008.24","url":null,"abstract":"Data prefetching has been considered an effective way to mask data access latency caused by cache misses and to bridge the performance gap between processor and memory. With hardware and/or software support, data prefetching brings data closer to a processor before it is actually needed. Many prefetching techniques have been proposed in the last few years to reduce data access latency by taking advantage of multi-core architectures. In this paper, we propose a taxonomy that classifies various design concerns in developing a prefetching strategy. We discuss various prefetching strategies and issues that have to be considered in designing a prefetching strategy for multi-core processors.","PeriodicalId":305776,"journal":{"name":"2008 International Symposium on Parallel Architectures, Algorithms, and Networks (i-span 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128932171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
期刊
2008 International Symposium on Parallel Architectures, Algorithms, and Networks (i-span 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1