首页 > 最新文献

Measurement and Modeling of Computer Systems最新文献

英文 中文
Network-design sensitivity analysis 网络设计敏感性分析
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2591979
Paul Tune, M. Roughan
Traffic matrices are used in many network engineering tasks, for instance optimal network design. Unfortunately, measurements of these matrices are error-prone, a problem that is exacerbated when they are extrapolated to provide the predictions used in planning. Practical network design and management should consider sensitivity to such errors, but although robust optimisation techniques exist, it seems they are rarely used, at least in part because of the difficulty in generating an ensemble of admissible traffic matrices with a controllable error level. We address this problem in our paper by presenting a fast and flexible technique of generating synthetic traffic matrices. We demonstrate the utility of the method by presenting a methodology for robust network design based on adaptation of the mean-risk analysis concept from finance.
流量矩阵用于许多网络工程任务,例如网络优化设计。不幸的是,这些矩阵的测量很容易出错,当它们被外推以提供规划中使用的预测时,这个问题就会加剧。实际的网络设计和管理应该考虑对此类错误的敏感性,但是尽管存在稳健的优化技术,但似乎很少使用它们,至少部分原因是难以生成具有可控错误水平的可接受流量矩阵的集合。本文提出了一种快速灵活的合成交通矩阵生成技术,解决了这一问题。我们通过提出一种基于金融平均风险分析概念的鲁棒网络设计方法来证明该方法的实用性。
{"title":"Network-design sensitivity analysis","authors":"Paul Tune, M. Roughan","doi":"10.1145/2591971.2591979","DOIUrl":"https://doi.org/10.1145/2591971.2591979","url":null,"abstract":"Traffic matrices are used in many network engineering tasks, for instance optimal network design. Unfortunately, measurements of these matrices are error-prone, a problem that is exacerbated when they are extrapolated to provide the predictions used in planning. Practical network design and management should consider sensitivity to such errors, but although robust optimisation techniques exist, it seems they are rarely used, at least in part because of the difficulty in generating an ensemble of admissible traffic matrices with a controllable error level. We address this problem in our paper by presenting a fast and flexible technique of generating synthetic traffic matrices. We demonstrate the utility of the method by presenting a methodology for robust network design based on adaptation of the mean-risk analysis concept from finance.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127462766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Unleashing the potentials of dynamism for page allocation strategies in SSDs 释放ssd中页面分配策略的动态潜力
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592013
Arash Tavakkol, M. Arjomand, H. Sarbazi-Azad
In Solid-State Drives (SSDs) with tens of flash chips and highly parallel architecture, we can speed up I/O operations by well-utilizing resources during page allocation. Proposals already exist for using static page allocation which does not balance the IO load and its efficiency depends on access address patterns. To our best knowledge, there have been no research thus far to show what happens if one or more internal resources can be freely allocated regardless of the request address. This paper explores the possibility of using different degrees of dynamism in page allocation and identifies key design opportunities that they present to improve SSD's characteristics.
在具有数十个闪存芯片和高度并行架构的固态硬盘(ssd)中,我们可以通过在页面分配过程中充分利用资源来加快I/O操作。已经存在使用静态页面分配的建议,它不能平衡IO负载,其效率取决于访问地址模式。据我们所知,到目前为止还没有研究表明,如果一个或多个内部资源可以自由分配,而不考虑请求地址,会发生什么。本文探讨了在页面分配中使用不同程度的动态性的可能性,并确定了它们提供的改进SSD特性的关键设计机会。
{"title":"Unleashing the potentials of dynamism for page allocation strategies in SSDs","authors":"Arash Tavakkol, M. Arjomand, H. Sarbazi-Azad","doi":"10.1145/2591971.2592013","DOIUrl":"https://doi.org/10.1145/2591971.2592013","url":null,"abstract":"In Solid-State Drives (SSDs) with tens of flash chips and highly parallel architecture, we can speed up I/O operations by well-utilizing resources during page allocation. Proposals already exist for using static page allocation which does not balance the IO load and its efficiency depends on access address patterns. To our best knowledge, there have been no research thus far to show what happens if one or more internal resources can be freely allocated regardless of the request address. This paper explores the possibility of using different degrees of dynamism in page allocation and identifies key design opportunities that they present to improve SSD's characteristics.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"18 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131093939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
On maximizing diffusion speed in social networks: impact of random seeding and clustering 社会网络中扩散速度最大化:随机播种和聚类的影响
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2591991
Jungseul Ok, Youngmi Jin, Jinwoo Shin, Yung Yi
A variety of models have been proposed and analyzed to understand how a new innovation (e.g., a technology, a product, or even a behavior) diffuses over a social network, broadly classified into either of epidemic-based or game-based ones. In this paper, we consider a game-based model, where each individual makes a selfish, rational choice in terms of its payoff in adopting the new innovation, but with some noise. We study how diffusion effect can be maximized by seeding a subset of individuals (within a given budget), i.e., convincing them to pre-adopt a new innovation. In particular, we aim at finding `good' seeds for minimizing the time to infect all others, i.e., diffusion speed maximization. To this end, we design polynomial-time approximation algorithms for three representative classes, Erdőos-Réenyi, planted partition and geometrically structured graph models, which correspond to globally well-connected, locally well-connected with large clusters and locally well-connected with small clusters, respectively, provide their performance guarantee in terms of approximation and complexity. First, for the dense Erdős-Rényi and planted partition graphs, we show that an arbitrary seeding and a simple seeding proportional to the size of clusters are almost optimal with high probability. Second, for geometrically structured sparse graphs, including planar and d-dimensional graphs, our algorithm that (a) constructs clusters, (b) seeds the border individuals among clusters, and (c) greedily seeds inside each cluster always outputs an almost optimal solution. We validate our theoretical findings with extensive simulations under a real social graph. We believe that our results provide new practical insights on how to seed over a social network depending on its connection structure, where individuals rationally adopt a new innovation. To our best knowledge, we are the first to study such diffusion speed maximization on the game-based diffusion, while the extensive research efforts have been made in epidemic-based models, often referred to as influence maximization.
人们提出并分析了各种各样的模型,以理解一项新的创新(例如,一项技术,一种产品,甚至一种行为)是如何在社交网络中传播的,这些模型大致分为基于流行病的模型和基于游戏的模型。在本文中,我们考虑了一个基于游戏的模型,其中每个个体都做出了一个自私的、理性的选择,就其采用新创新的回报而言,但会有一些干扰。我们研究了如何通过播种个体子集(在给定的预算范围内)来最大化扩散效应,即说服他们预先采用新的创新。特别是,我们的目标是找到“好”种子,以最大限度地减少感染所有其他种子的时间,即传播速度最大化。为此,我们针对Erdőos-Réenyi、种植分区和几何结构图模型这三种具有代表性的类分别对应于全局良好连通、大簇局部良好连通和小簇局部良好连通,设计了多项式时间逼近算法,从逼近性和复杂度上保证了它们的性能。首先,对于密集Erdős-Rényi和种植分区图,我们证明了任意播种和与簇大小成比例的简单播种几乎是高概率最优的。其次,对于几何结构的稀疏图,包括平面和d维图,我们的算法(a)构建聚类,(b)在聚类之间播种边界个体,(c)在每个聚类内部贪婪播种,总是输出一个几乎最优的解。我们在真实的社交图谱下进行了大量的模拟,验证了我们的理论发现。我们相信,我们的研究结果为如何在社交网络上播种提供了新的实用见解,这取决于它的连接结构,在这种结构中,个人会理性地采用一种新的创新。据我们所知,我们是第一个在基于博弈的扩散上研究这种扩散速度最大化的人,而在基于流行病的模型上进行了广泛的研究,通常被称为影响最大化。
{"title":"On maximizing diffusion speed in social networks: impact of random seeding and clustering","authors":"Jungseul Ok, Youngmi Jin, Jinwoo Shin, Yung Yi","doi":"10.1145/2591971.2591991","DOIUrl":"https://doi.org/10.1145/2591971.2591991","url":null,"abstract":"A variety of models have been proposed and analyzed to understand how a new innovation (e.g., a technology, a product, or even a behavior) diffuses over a social network, broadly classified into either of epidemic-based or game-based ones. In this paper, we consider a game-based model, where each individual makes a selfish, rational choice in terms of its payoff in adopting the new innovation, but with some noise. We study how diffusion effect can be maximized by seeding a subset of individuals (within a given budget), i.e., convincing them to pre-adopt a new innovation. In particular, we aim at finding `good' seeds for minimizing the time to infect all others, i.e., diffusion speed maximization. To this end, we design polynomial-time approximation algorithms for three representative classes, Erdőos-Réenyi, planted partition and geometrically structured graph models, which correspond to globally well-connected, locally well-connected with large clusters and locally well-connected with small clusters, respectively, provide their performance guarantee in terms of approximation and complexity. First, for the dense Erdős-Rényi and planted partition graphs, we show that an arbitrary seeding and a simple seeding proportional to the size of clusters are almost optimal with high probability. Second, for geometrically structured sparse graphs, including planar and d-dimensional graphs, our algorithm that (a) constructs clusters, (b) seeds the border individuals among clusters, and (c) greedily seeds inside each cluster always outputs an almost optimal solution. We validate our theoretical findings with extensive simulations under a real social graph. We believe that our results provide new practical insights on how to seed over a social network depending on its connection structure, where individuals rationally adopt a new innovation. To our best knowledge, we are the first to study such diffusion speed maximization on the game-based diffusion, while the extensive research efforts have been made in epidemic-based models, often referred to as influence maximization.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132040211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Unified localization framework using trajectory signatures 使用轨迹签名的统一定位框架
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592027
S. Rallapalli, Wei Dong, L. Qiu, Yin Zhang
We develop a novel trajectory-based localization scheme which (i) identifies a user's current trajectory based on the measurements collected while the user is moving, by finding the best match among the training traces (trajectory matching) and then (ii) localizes the user on the trajectory (localization). The core requirement of both the steps is an accurate and robust algorithm to match two time-series that may contain significant noise and perturbation due to differences in mobility, devices, and environments. To achieve this, we develop an enhanced Dynamic Time Warping (DTW) alignment, and apply it to RSS, channel state information, or magnetic field measurements collected from a trajectory. We use indoor and outdoor experiments to demonstrate its effectiveness.
我们开发了一种新的基于轨迹的定位方案,该方案(i)根据用户移动时收集的测量数据识别用户当前的轨迹,通过在训练轨迹中找到最佳匹配(轨迹匹配),然后(ii)将用户定位在轨迹上(定位)。这两个步骤的核心要求是一个准确和鲁棒的算法来匹配两个时间序列,这两个时间序列可能包含由于移动性、设备和环境的差异而产生的显著噪声和扰动。为了实现这一点,我们开发了一种增强的动态时间扭曲(DTW)对准,并将其应用于RSS、通道状态信息或从轨迹收集的磁场测量。通过室内和室外实验验证了其有效性。
{"title":"Unified localization framework using trajectory signatures","authors":"S. Rallapalli, Wei Dong, L. Qiu, Yin Zhang","doi":"10.1145/2591971.2592027","DOIUrl":"https://doi.org/10.1145/2591971.2592027","url":null,"abstract":"We develop a novel trajectory-based localization scheme which (i) identifies a user's current trajectory based on the measurements collected while the user is moving, by finding the best match among the training traces (trajectory matching) and then (ii) localizes the user on the trajectory (localization). The core requirement of both the steps is an accurate and robust algorithm to match two time-series that may contain significant noise and perturbation due to differences in mobility, devices, and environments. To achieve this, we develop an enhanced Dynamic Time Warping (DTW) alignment, and apply it to RSS, channel state information, or magnetic field measurements collected from a trajectory. We use indoor and outdoor experiments to demonstrate its effectiveness.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123097393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IntroPerf: transparent context-sensitive multi-layer performance inference using system stack traces IntroPerf:透明的上下文敏感的多层性能推理,使用系统堆栈跟踪
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592008
C. Kim, J. Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, X. Zhang, Dongyan Xu
Performance bugs are frequently observed in commodity software. While profilers or source code-based tools can be used at development stage where a program is diagnosed in a well-defined environment, many performance bugs survive such a stage and affect production runs. OS kernel-level tracers are commonly used in post-development diagnosis due to their independence from programs and libraries; however, they lack detailed program-specific metrics to reason about performance problems such as function latencies and program contexts. In this paper, we propose a novel performance inference system, called IntroPerf, that generates fine-grained performance information -- like that from application profiling tools -- transparently by leveraging OS tracers that are widely available in most commodity operating systems. With system stack traces as input, IntroPerf enables transparent context-sensitive performance inference, and diagnoses application performance in a multi-layered scope ranging from user functions to the kernel. Evaluated with various performance bugs in multiple open source software projects, IntroPerf automatically ranks potential internal and external root causes of performance bugs with high accuracy without any prior knowledge about or instrumentation on the subject software. Our results show IntroPerf's effectiveness as a lightweight performance introspection tool for post-development diagnosis.
在商用软件中经常可以观察到性能缺陷。虽然可以在在定义良好的环境中诊断程序的开发阶段使用分析器或基于源代码的工具,但许多性能错误会在此阶段存活下来并影响生产运行。OS内核级示踪器由于独立于程序和库而被广泛用于开发后诊断;然而,它们缺乏详细的特定于程序的度量来推断诸如函数延迟和程序上下文之类的性能问题。在本文中,我们提出了一种新的性能推断系统,称为IntroPerf,它通过利用在大多数商用操作系统中广泛可用的操作系统跟踪器,透明地生成细粒度的性能信息——就像来自应用程序分析工具的信息一样。使用系统堆栈跟踪作为输入,IntroPerf支持透明的上下文敏感性能推断,并在从用户函数到内核的多层范围内诊断应用程序性能。对多个开源软件项目中的各种性能缺陷进行评估后,IntroPerf自动对性能缺陷的潜在内部和外部根本原因进行了高精度的排名,而无需事先了解或检测主题软件。我们的研究结果表明IntroPerf作为开发后诊断的轻量级性能自省工具的有效性。
{"title":"IntroPerf: transparent context-sensitive multi-layer performance inference using system stack traces","authors":"C. Kim, J. Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, X. Zhang, Dongyan Xu","doi":"10.1145/2591971.2592008","DOIUrl":"https://doi.org/10.1145/2591971.2592008","url":null,"abstract":"Performance bugs are frequently observed in commodity software. While profilers or source code-based tools can be used at development stage where a program is diagnosed in a well-defined environment, many performance bugs survive such a stage and affect production runs. OS kernel-level tracers are commonly used in post-development diagnosis due to their independence from programs and libraries; however, they lack detailed program-specific metrics to reason about performance problems such as function latencies and program contexts. In this paper, we propose a novel performance inference system, called IntroPerf, that generates fine-grained performance information -- like that from application profiling tools -- transparently by leveraging OS tracers that are widely available in most commodity operating systems. With system stack traces as input, IntroPerf enables transparent context-sensitive performance inference, and diagnoses application performance in a multi-layered scope ranging from user functions to the kernel. Evaluated with various performance bugs in multiple open source software projects, IntroPerf automatically ranks potential internal and external root causes of performance bugs with high accuracy without any prior knowledge about or instrumentation on the subject software. Our results show IntroPerf's effectiveness as a lightweight performance introspection tool for post-development diagnosis.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126300751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Impact of DHCP churn on network characterization DHCP流失对网络特性的影响
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592034
Long H. Vu, D. Turaga, S. Parthasarathy
We investigate the DHCP churn impact on network characterization by analyzing 18 months of DHCP, DNS, Firewall Alert, and Netflow data collected from an enterprise network of 30,000 clients. We find that DHCP churn has clear impact on network metrics.
我们通过分析18个月的DHCP、DNS、防火墙警报和Netflow数据,从30,000个客户端的企业网络中收集数据,研究DHCP流失对网络特征的影响。我们发现DHCP流失对网络指标有明显的影响。
{"title":"Impact of DHCP churn on network characterization","authors":"Long H. Vu, D. Turaga, S. Parthasarathy","doi":"10.1145/2591971.2592034","DOIUrl":"https://doi.org/10.1145/2591971.2592034","url":null,"abstract":"We investigate the DHCP churn impact on network characterization by analyzing 18 months of DHCP, DNS, Firewall Alert, and Netflow data collected from an enterprise network of 30,000 clients. We find that DHCP churn has clear impact on network metrics.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126091306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the energy and performance of commodity hardware transactional memory 商品硬件事务性存储器的能量和性能
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592030
Nuno Diegues, P. Romano, L. Rodrigues
The advent of multi-core architectures has brought concurrent programming to the forefront of software development. In this context, Transactional Memory (TM) has gained increasing popularity as a simpler, attractive alternative to traditional lock-based synchronization. The recent integration of Hardware TM (HTM) in the last generation of Intel commodity processors turned TM into a mainstream technology, raising a number of questions on its future and that of concurrent programming. To evaluate the potential impact of Intel's HTM, we conducted the largest study on TM to date, comparing different locking techniques, hardware and software TMs, as well as different combinations of these mechanisms, from the dual perspective of performance and power consumption. As a result we perform a workload characterization, to help programmers better exploit the currently available TM facilities, and identify important research directions.
多核架构的出现将并发编程带到了软件开发的前沿。在这种情况下,事务性内存(Transactional Memory, TM)作为传统的基于锁的同步的一种更简单、更有吸引力的替代方案而越来越受欢迎。最近在上一代Intel商用处理器中集成了Hardware TM (HTM),使TM成为一种主流技术,这就对TM的未来和并发编程提出了许多问题。为了评估英特尔HTM的潜在影响,我们对TM进行了迄今为止最大规模的研究,从性能和功耗的双重角度比较了不同的锁定技术、硬件和软件TM,以及这些机制的不同组合。因此,我们执行工作负载特征,以帮助程序员更好地利用当前可用的TM设施,并确定重要的研究方向。
{"title":"On the energy and performance of commodity hardware transactional memory","authors":"Nuno Diegues, P. Romano, L. Rodrigues","doi":"10.1145/2591971.2592030","DOIUrl":"https://doi.org/10.1145/2591971.2592030","url":null,"abstract":"The advent of multi-core architectures has brought concurrent programming to the forefront of software development. In this context, Transactional Memory (TM) has gained increasing popularity as a simpler, attractive alternative to traditional lock-based synchronization. The recent integration of Hardware TM (HTM) in the last generation of Intel commodity processors turned TM into a mainstream technology, raising a number of questions on its future and that of concurrent programming.\u0000 To evaluate the potential impact of Intel's HTM, we conducted the largest study on TM to date, comparing different locking techniques, hardware and software TMs, as well as different combinations of these mechanisms, from the dual perspective of performance and power consumption. As a result we perform a workload characterization, to help programmers better exploit the currently available TM facilities, and identify important research directions.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132834850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rumor source detection with multiple observations: fundamental limits and algorithms 多观测的谣言源检测:基本限制和算法
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2591993
Zhaoxu Wang, Wenxiang Dong, Wenyi Zhang, C. Tan
This paper addresses the problem of a single rumor source detection with multiple observations, from a statistical point of view of a spreading over a network, based on the susceptible-infectious model. For tree networks, multiple sequential observations for one single instance of rumor spreading cannot improve over the initial snapshot observation. The situation dramatically improves for multiple independent observations. We propose a unified inference framework based on the union rumor centrality, and provide explicit detection performance for degree-regular tree networks. Surprisingly, even with merely two observations, the detection probability at least doubles that of a single observation, and further approaches one, i.e., reliable detection, with increasing degree. This indicates that a richer diversity enhances detectability. For general graphs, a detection algorithm using a breadth-first search strategy is also proposed and evaluated. Besides rumor source detection, our results can be used in network forensics to combat recurring epidemic-like information spreading such as online anomaly and fraudulent email spams.
本文基于易感感染模型,从网络传播的统计角度出发,解决了用多个观测值检测单个谣言源的问题。对于树状网络,对单个谣言传播实例的多个顺序观察不能优于初始快照观察。对于多个独立的观测,这种情况显著改善。提出了一种基于联合谣言中心性的统一推理框架,并为度正则树网络提供了明确的检测性能。令人惊讶的是,即使只有两次观测,探测概率至少是一次观测的两倍,并且随着程度的增加,进一步接近于一次,即可靠的探测。这表明更丰富的多样性提高了可探测性。对于一般图,提出了一种基于宽度优先搜索策略的检测算法,并对其进行了评价。除了谣言来源检测之外,我们的研究结果还可以用于网络取证,以打击在线异常和欺诈性电子邮件垃圾邮件等反复出现的类似流行病的信息传播。
{"title":"Rumor source detection with multiple observations: fundamental limits and algorithms","authors":"Zhaoxu Wang, Wenxiang Dong, Wenyi Zhang, C. Tan","doi":"10.1145/2591971.2591993","DOIUrl":"https://doi.org/10.1145/2591971.2591993","url":null,"abstract":"This paper addresses the problem of a single rumor source detection with multiple observations, from a statistical point of view of a spreading over a network, based on the susceptible-infectious model. For tree networks, multiple sequential observations for one single instance of rumor spreading cannot improve over the initial snapshot observation. The situation dramatically improves for multiple independent observations. We propose a unified inference framework based on the union rumor centrality, and provide explicit detection performance for degree-regular tree networks. Surprisingly, even with merely two observations, the detection probability at least doubles that of a single observation, and further approaches one, i.e., reliable detection, with increasing degree. This indicates that a richer diversity enhances detectability. For general graphs, a detection algorithm using a breadth-first search strategy is also proposed and evaluated. Besides rumor source detection, our results can be used in network forensics to combat recurring epidemic-like information spreading such as online anomaly and fraudulent email spams.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131911231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 130
Error estimating codes for insertion and deletion channels 插入和删除信道代码的错误估计
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2591976
Jiwei Huang, Sen Yang, Ashwin Lall, J. Romberg, Jun Xu, Chuang Lin
Error estimating codes (EEC) have recently been proposed for measuring the bit error rate (BER) in packets transmitted over wireless links. They however can provide such measurements only when there are no insertion and deletion errors, which could occur in various wireless network environments. In this work, we propose ``idEEC'', the first technique that can do so even in the presence of insertion and deletion errors. We show that idEEC is provable robust under most bit insertion and deletion scenarios, provided insertion/deletion errors occur with much lower probability than bit flipping errors. Our idEEC design can build upon any existing EEC scheme. The basic idea of the idEEC encoding is to divide the packet into a number of segments, each of which is encoded using the underlying EEC scheme. The basic idea of the idEEC decoding is to divide the packet into a few slices in a randomized manner -- each of which may contain several segments -- and then try to identify a slice that has no insertion and deletion errors in it (called a ``clean slice''). Once such a clean slice is found, it is removed from the packet for later processing, and this ``randomized divide and search'' procedure will be iteratively performed on the rest of the packet until no more clean slices can be found. The BER will then be estimated from all the clean slices discovered through all the iterations. A careful analysis of the accuracy guarantees of the idEEC decoding is provided, and the efficacy of idEEC is further validated by simulation experiments.
误码估计(EEC)最近被提出用于测量无线链路上传输的数据包的误码率(BER)。然而,它们只能在没有插入和删除错误的情况下提供这种测量,而插入和删除错误可能发生在各种无线网络环境中。在这项工作中,我们提出了“idEEC”,这是第一个即使在存在插入和删除错误的情况下也能做到这一点的技术。我们证明了idEEC在大多数插入和删除场景下是鲁棒的,前提是插入/删除错误发生的概率远低于比特翻转错误。我们的idEEC设计可以建立在任何现有的EEC方案之上。eeec编码的基本思想是将数据包分成许多段,每个段都使用底层EEC方案进行编码。idEEC解码的基本思想是以随机的方式将数据包分成几个片段——每个片段可能包含几个片段——然后尝试识别其中没有插入和删除错误的片段(称为“干净片段”)。一旦找到这样一个干净的切片,它将从数据包中删除以供稍后处理,并且这种“随机分割和搜索”过程将在数据包的其余部分上迭代执行,直到再也找不到干净的切片为止。然后将根据通过所有迭代发现的所有干净切片估计误码率。详细分析了idEEC译码的精度保证,并通过仿真实验进一步验证了idEEC译码的有效性。
{"title":"Error estimating codes for insertion and deletion channels","authors":"Jiwei Huang, Sen Yang, Ashwin Lall, J. Romberg, Jun Xu, Chuang Lin","doi":"10.1145/2591971.2591976","DOIUrl":"https://doi.org/10.1145/2591971.2591976","url":null,"abstract":"Error estimating codes (EEC) have recently been proposed for measuring the bit error rate (BER) in packets transmitted over wireless links. They however can provide such measurements only when there are no insertion and deletion errors, which could occur in various wireless network environments. In this work, we propose ``idEEC'', the first technique that can do so even in the presence of insertion and deletion errors. We show that idEEC is provable robust under most bit insertion and deletion scenarios, provided insertion/deletion errors occur with much lower probability than bit flipping errors. Our idEEC design can build upon any existing EEC scheme. The basic idea of the idEEC encoding is to divide the packet into a number of segments, each of which is encoded using the underlying EEC scheme. The basic idea of the idEEC decoding is to divide the packet into a few slices in a randomized manner -- each of which may contain several segments -- and then try to identify a slice that has no insertion and deletion errors in it (called a ``clean slice''). Once such a clean slice is found, it is removed from the packet for later processing, and this ``randomized divide and search'' procedure will be iteratively performed on the rest of the packet until no more clean slices can be found. The BER will then be estimated from all the clean slices discovered through all the iterations. A careful analysis of the accuracy guarantees of the idEEC decoding is provided, and the efficacy of idEEC is further validated by simulation experiments.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129945101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
GDM: device memory management for gpgpu computing GDM:用于gpgpu计算的设备内存管理
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592002
Kaibo Wang, Xiaoning Ding, Rubao Lee, S. Kato, Xiaodong Zhang
GPGPUs are evolving from dedicated accelerators towards mainstream commodity computing resources. During the transition, the lack of system management of device memory space on GPGPUs has become a major hurdle. In existing GPGPU systems, device memory space is still managed explicitly by individual applications, which not only increases the burden of programmers but can also cause application crashes, hangs, or low performance. In this paper, we present the design and implementation of GDM, a fully functional GPGPU device memory manager to address the above problems and unleash the computing power of GPGPUs in general-purpose environments. To effectively coordinate the device memory usage of different applications, GDM takes control over device memory allocations and data transfers to and from device memory, leveraging a buffer allocated in each application's virtual memory. GDM utilizes the unique features of GPGPU systems and relies on several effective optimization techniques to guarantee the efficient usage of device memory space and to achieve high performance. We have evaluated GDM and compared it against state-of-the-art GPGPU system software on a range of workloads. The results show that GDM can prevent applications from crashes, including those induced by device memory leaks, and improve system performance by up to 43%.
gpgpu正在从专用加速器向主流商用计算资源发展。在过渡过程中,缺乏对gpgpu上设备内存空间的系统管理已成为一个主要障碍。在现有的GPGPU系统中,设备内存空间仍然由各个应用程序显式地管理,这不仅增加了程序员的负担,而且还可能导致应用程序崩溃、挂起或性能低下。在本文中,我们提出了GDM的设计和实现,一个全功能的GPGPU设备内存管理器,以解决上述问题,并释放GPGPU在通用环境中的计算能力。为了有效地协调不同应用程序的设备内存使用,GDM控制设备内存分配和进出设备内存的数据传输,利用在每个应用程序的虚拟内存中分配的缓冲区。GDM利用GPGPU系统的独特特性,并依靠几种有效的优化技术来保证设备内存空间的有效利用并实现高性能。我们已经对GDM进行了评估,并将其与最先进的GPGPU系统软件在一系列工作负载上进行了比较。结果表明,GDM可以防止应用程序崩溃,包括由设备内存泄漏引起的崩溃,并将系统性能提高43%。
{"title":"GDM: device memory management for gpgpu computing","authors":"Kaibo Wang, Xiaoning Ding, Rubao Lee, S. Kato, Xiaodong Zhang","doi":"10.1145/2591971.2592002","DOIUrl":"https://doi.org/10.1145/2591971.2592002","url":null,"abstract":"GPGPUs are evolving from dedicated accelerators towards mainstream commodity computing resources. During the transition, the lack of system management of device memory space on GPGPUs has become a major hurdle. In existing GPGPU systems, device memory space is still managed explicitly by individual applications, which not only increases the burden of programmers but can also cause application crashes, hangs, or low performance.\u0000 In this paper, we present the design and implementation of GDM, a fully functional GPGPU device memory manager to address the above problems and unleash the computing power of GPGPUs in general-purpose environments. To effectively coordinate the device memory usage of different applications, GDM takes control over device memory allocations and data transfers to and from device memory, leveraging a buffer allocated in each application's virtual memory. GDM utilizes the unique features of GPGPU systems and relies on several effective optimization techniques to guarantee the efficient usage of device memory space and to achieve high performance.\u0000 We have evaluated GDM and compared it against state-of-the-art GPGPU system software on a range of workloads. The results show that GDM can prevent applications from crashes, including those induced by device memory leaks, and improve system performance by up to 43%.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129252868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
期刊
Measurement and Modeling of Computer Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1