首页 > 最新文献

Measurement and Modeling of Computer Systems最新文献

英文 中文
Network-design sensitivity analysis 网络设计敏感性分析
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2591979
Paul Tune, M. Roughan
Traffic matrices are used in many network engineering tasks, for instance optimal network design. Unfortunately, measurements of these matrices are error-prone, a problem that is exacerbated when they are extrapolated to provide the predictions used in planning. Practical network design and management should consider sensitivity to such errors, but although robust optimisation techniques exist, it seems they are rarely used, at least in part because of the difficulty in generating an ensemble of admissible traffic matrices with a controllable error level. We address this problem in our paper by presenting a fast and flexible technique of generating synthetic traffic matrices. We demonstrate the utility of the method by presenting a methodology for robust network design based on adaptation of the mean-risk analysis concept from finance.
流量矩阵用于许多网络工程任务,例如网络优化设计。不幸的是,这些矩阵的测量很容易出错,当它们被外推以提供规划中使用的预测时,这个问题就会加剧。实际的网络设计和管理应该考虑对此类错误的敏感性,但是尽管存在稳健的优化技术,但似乎很少使用它们,至少部分原因是难以生成具有可控错误水平的可接受流量矩阵的集合。本文提出了一种快速灵活的合成交通矩阵生成技术,解决了这一问题。我们通过提出一种基于金融平均风险分析概念的鲁棒网络设计方法来证明该方法的实用性。
{"title":"Network-design sensitivity analysis","authors":"Paul Tune, M. Roughan","doi":"10.1145/2591971.2591979","DOIUrl":"https://doi.org/10.1145/2591971.2591979","url":null,"abstract":"Traffic matrices are used in many network engineering tasks, for instance optimal network design. Unfortunately, measurements of these matrices are error-prone, a problem that is exacerbated when they are extrapolated to provide the predictions used in planning. Practical network design and management should consider sensitivity to such errors, but although robust optimisation techniques exist, it seems they are rarely used, at least in part because of the difficulty in generating an ensemble of admissible traffic matrices with a controllable error level. We address this problem in our paper by presenting a fast and flexible technique of generating synthetic traffic matrices. We demonstrate the utility of the method by presenting a methodology for robust network design based on adaptation of the mean-risk analysis concept from finance.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127462766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Unleashing the potentials of dynamism for page allocation strategies in SSDs 释放ssd中页面分配策略的动态潜力
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592013
Arash Tavakkol, M. Arjomand, H. Sarbazi-Azad
In Solid-State Drives (SSDs) with tens of flash chips and highly parallel architecture, we can speed up I/O operations by well-utilizing resources during page allocation. Proposals already exist for using static page allocation which does not balance the IO load and its efficiency depends on access address patterns. To our best knowledge, there have been no research thus far to show what happens if one or more internal resources can be freely allocated regardless of the request address. This paper explores the possibility of using different degrees of dynamism in page allocation and identifies key design opportunities that they present to improve SSD's characteristics.
在具有数十个闪存芯片和高度并行架构的固态硬盘(ssd)中,我们可以通过在页面分配过程中充分利用资源来加快I/O操作。已经存在使用静态页面分配的建议,它不能平衡IO负载,其效率取决于访问地址模式。据我们所知,到目前为止还没有研究表明,如果一个或多个内部资源可以自由分配,而不考虑请求地址,会发生什么。本文探讨了在页面分配中使用不同程度的动态性的可能性,并确定了它们提供的改进SSD特性的关键设计机会。
{"title":"Unleashing the potentials of dynamism for page allocation strategies in SSDs","authors":"Arash Tavakkol, M. Arjomand, H. Sarbazi-Azad","doi":"10.1145/2591971.2592013","DOIUrl":"https://doi.org/10.1145/2591971.2592013","url":null,"abstract":"In Solid-State Drives (SSDs) with tens of flash chips and highly parallel architecture, we can speed up I/O operations by well-utilizing resources during page allocation. Proposals already exist for using static page allocation which does not balance the IO load and its efficiency depends on access address patterns. To our best knowledge, there have been no research thus far to show what happens if one or more internal resources can be freely allocated regardless of the request address. This paper explores the possibility of using different degrees of dynamism in page allocation and identifies key design opportunities that they present to improve SSD's characteristics.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"18 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131093939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
On maximizing diffusion speed in social networks: impact of random seeding and clustering 社会网络中扩散速度最大化:随机播种和聚类的影响
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2591991
Jungseul Ok, Youngmi Jin, Jinwoo Shin, Yung Yi
A variety of models have been proposed and analyzed to understand how a new innovation (e.g., a technology, a product, or even a behavior) diffuses over a social network, broadly classified into either of epidemic-based or game-based ones. In this paper, we consider a game-based model, where each individual makes a selfish, rational choice in terms of its payoff in adopting the new innovation, but with some noise. We study how diffusion effect can be maximized by seeding a subset of individuals (within a given budget), i.e., convincing them to pre-adopt a new innovation. In particular, we aim at finding `good' seeds for minimizing the time to infect all others, i.e., diffusion speed maximization. To this end, we design polynomial-time approximation algorithms for three representative classes, Erdőos-Réenyi, planted partition and geometrically structured graph models, which correspond to globally well-connected, locally well-connected with large clusters and locally well-connected with small clusters, respectively, provide their performance guarantee in terms of approximation and complexity. First, for the dense Erdős-Rényi and planted partition graphs, we show that an arbitrary seeding and a simple seeding proportional to the size of clusters are almost optimal with high probability. Second, for geometrically structured sparse graphs, including planar and d-dimensional graphs, our algorithm that (a) constructs clusters, (b) seeds the border individuals among clusters, and (c) greedily seeds inside each cluster always outputs an almost optimal solution. We validate our theoretical findings with extensive simulations under a real social graph. We believe that our results provide new practical insights on how to seed over a social network depending on its connection structure, where individuals rationally adopt a new innovation. To our best knowledge, we are the first to study such diffusion speed maximization on the game-based diffusion, while the extensive research efforts have been made in epidemic-based models, often referred to as influence maximization.
人们提出并分析了各种各样的模型,以理解一项新的创新(例如,一项技术,一种产品,甚至一种行为)是如何在社交网络中传播的,这些模型大致分为基于流行病的模型和基于游戏的模型。在本文中,我们考虑了一个基于游戏的模型,其中每个个体都做出了一个自私的、理性的选择,就其采用新创新的回报而言,但会有一些干扰。我们研究了如何通过播种个体子集(在给定的预算范围内)来最大化扩散效应,即说服他们预先采用新的创新。特别是,我们的目标是找到“好”种子,以最大限度地减少感染所有其他种子的时间,即传播速度最大化。为此,我们针对Erdőos-Réenyi、种植分区和几何结构图模型这三种具有代表性的类分别对应于全局良好连通、大簇局部良好连通和小簇局部良好连通,设计了多项式时间逼近算法,从逼近性和复杂度上保证了它们的性能。首先,对于密集Erdős-Rényi和种植分区图,我们证明了任意播种和与簇大小成比例的简单播种几乎是高概率最优的。其次,对于几何结构的稀疏图,包括平面和d维图,我们的算法(a)构建聚类,(b)在聚类之间播种边界个体,(c)在每个聚类内部贪婪播种,总是输出一个几乎最优的解。我们在真实的社交图谱下进行了大量的模拟,验证了我们的理论发现。我们相信,我们的研究结果为如何在社交网络上播种提供了新的实用见解,这取决于它的连接结构,在这种结构中,个人会理性地采用一种新的创新。据我们所知,我们是第一个在基于博弈的扩散上研究这种扩散速度最大化的人,而在基于流行病的模型上进行了广泛的研究,通常被称为影响最大化。
{"title":"On maximizing diffusion speed in social networks: impact of random seeding and clustering","authors":"Jungseul Ok, Youngmi Jin, Jinwoo Shin, Yung Yi","doi":"10.1145/2591971.2591991","DOIUrl":"https://doi.org/10.1145/2591971.2591991","url":null,"abstract":"A variety of models have been proposed and analyzed to understand how a new innovation (e.g., a technology, a product, or even a behavior) diffuses over a social network, broadly classified into either of epidemic-based or game-based ones. In this paper, we consider a game-based model, where each individual makes a selfish, rational choice in terms of its payoff in adopting the new innovation, but with some noise. We study how diffusion effect can be maximized by seeding a subset of individuals (within a given budget), i.e., convincing them to pre-adopt a new innovation. In particular, we aim at finding `good' seeds for minimizing the time to infect all others, i.e., diffusion speed maximization. To this end, we design polynomial-time approximation algorithms for three representative classes, Erdőos-Réenyi, planted partition and geometrically structured graph models, which correspond to globally well-connected, locally well-connected with large clusters and locally well-connected with small clusters, respectively, provide their performance guarantee in terms of approximation and complexity. First, for the dense Erdős-Rényi and planted partition graphs, we show that an arbitrary seeding and a simple seeding proportional to the size of clusters are almost optimal with high probability. Second, for geometrically structured sparse graphs, including planar and d-dimensional graphs, our algorithm that (a) constructs clusters, (b) seeds the border individuals among clusters, and (c) greedily seeds inside each cluster always outputs an almost optimal solution. We validate our theoretical findings with extensive simulations under a real social graph. We believe that our results provide new practical insights on how to seed over a social network depending on its connection structure, where individuals rationally adopt a new innovation. To our best knowledge, we are the first to study such diffusion speed maximization on the game-based diffusion, while the extensive research efforts have been made in epidemic-based models, often referred to as influence maximization.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132040211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Unified localization framework using trajectory signatures 使用轨迹签名的统一定位框架
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592027
S. Rallapalli, Wei Dong, L. Qiu, Yin Zhang
We develop a novel trajectory-based localization scheme which (i) identifies a user's current trajectory based on the measurements collected while the user is moving, by finding the best match among the training traces (trajectory matching) and then (ii) localizes the user on the trajectory (localization). The core requirement of both the steps is an accurate and robust algorithm to match two time-series that may contain significant noise and perturbation due to differences in mobility, devices, and environments. To achieve this, we develop an enhanced Dynamic Time Warping (DTW) alignment, and apply it to RSS, channel state information, or magnetic field measurements collected from a trajectory. We use indoor and outdoor experiments to demonstrate its effectiveness.
我们开发了一种新的基于轨迹的定位方案,该方案(i)根据用户移动时收集的测量数据识别用户当前的轨迹,通过在训练轨迹中找到最佳匹配(轨迹匹配),然后(ii)将用户定位在轨迹上(定位)。这两个步骤的核心要求是一个准确和鲁棒的算法来匹配两个时间序列,这两个时间序列可能包含由于移动性、设备和环境的差异而产生的显著噪声和扰动。为了实现这一点,我们开发了一种增强的动态时间扭曲(DTW)对准,并将其应用于RSS、通道状态信息或从轨迹收集的磁场测量。通过室内和室外实验验证了其有效性。
{"title":"Unified localization framework using trajectory signatures","authors":"S. Rallapalli, Wei Dong, L. Qiu, Yin Zhang","doi":"10.1145/2591971.2592027","DOIUrl":"https://doi.org/10.1145/2591971.2592027","url":null,"abstract":"We develop a novel trajectory-based localization scheme which (i) identifies a user's current trajectory based on the measurements collected while the user is moving, by finding the best match among the training traces (trajectory matching) and then (ii) localizes the user on the trajectory (localization). The core requirement of both the steps is an accurate and robust algorithm to match two time-series that may contain significant noise and perturbation due to differences in mobility, devices, and environments. To achieve this, we develop an enhanced Dynamic Time Warping (DTW) alignment, and apply it to RSS, channel state information, or magnetic field measurements collected from a trajectory. We use indoor and outdoor experiments to demonstrate its effectiveness.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123097393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IntroPerf: transparent context-sensitive multi-layer performance inference using system stack traces IntroPerf:透明的上下文敏感的多层性能推理,使用系统堆栈跟踪
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592008
C. Kim, J. Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, X. Zhang, Dongyan Xu
Performance bugs are frequently observed in commodity software. While profilers or source code-based tools can be used at development stage where a program is diagnosed in a well-defined environment, many performance bugs survive such a stage and affect production runs. OS kernel-level tracers are commonly used in post-development diagnosis due to their independence from programs and libraries; however, they lack detailed program-specific metrics to reason about performance problems such as function latencies and program contexts. In this paper, we propose a novel performance inference system, called IntroPerf, that generates fine-grained performance information -- like that from application profiling tools -- transparently by leveraging OS tracers that are widely available in most commodity operating systems. With system stack traces as input, IntroPerf enables transparent context-sensitive performance inference, and diagnoses application performance in a multi-layered scope ranging from user functions to the kernel. Evaluated with various performance bugs in multiple open source software projects, IntroPerf automatically ranks potential internal and external root causes of performance bugs with high accuracy without any prior knowledge about or instrumentation on the subject software. Our results show IntroPerf's effectiveness as a lightweight performance introspection tool for post-development diagnosis.
在商用软件中经常可以观察到性能缺陷。虽然可以在在定义良好的环境中诊断程序的开发阶段使用分析器或基于源代码的工具,但许多性能错误会在此阶段存活下来并影响生产运行。OS内核级示踪器由于独立于程序和库而被广泛用于开发后诊断;然而,它们缺乏详细的特定于程序的度量来推断诸如函数延迟和程序上下文之类的性能问题。在本文中,我们提出了一种新的性能推断系统,称为IntroPerf,它通过利用在大多数商用操作系统中广泛可用的操作系统跟踪器,透明地生成细粒度的性能信息——就像来自应用程序分析工具的信息一样。使用系统堆栈跟踪作为输入,IntroPerf支持透明的上下文敏感性能推断,并在从用户函数到内核的多层范围内诊断应用程序性能。对多个开源软件项目中的各种性能缺陷进行评估后,IntroPerf自动对性能缺陷的潜在内部和外部根本原因进行了高精度的排名,而无需事先了解或检测主题软件。我们的研究结果表明IntroPerf作为开发后诊断的轻量级性能自省工具的有效性。
{"title":"IntroPerf: transparent context-sensitive multi-layer performance inference using system stack traces","authors":"C. Kim, J. Rhee, Hui Zhang, Nipun Arora, Guofei Jiang, X. Zhang, Dongyan Xu","doi":"10.1145/2591971.2592008","DOIUrl":"https://doi.org/10.1145/2591971.2592008","url":null,"abstract":"Performance bugs are frequently observed in commodity software. While profilers or source code-based tools can be used at development stage where a program is diagnosed in a well-defined environment, many performance bugs survive such a stage and affect production runs. OS kernel-level tracers are commonly used in post-development diagnosis due to their independence from programs and libraries; however, they lack detailed program-specific metrics to reason about performance problems such as function latencies and program contexts. In this paper, we propose a novel performance inference system, called IntroPerf, that generates fine-grained performance information -- like that from application profiling tools -- transparently by leveraging OS tracers that are widely available in most commodity operating systems. With system stack traces as input, IntroPerf enables transparent context-sensitive performance inference, and diagnoses application performance in a multi-layered scope ranging from user functions to the kernel. Evaluated with various performance bugs in multiple open source software projects, IntroPerf automatically ranks potential internal and external root causes of performance bugs with high accuracy without any prior knowledge about or instrumentation on the subject software. Our results show IntroPerf's effectiveness as a lightweight performance introspection tool for post-development diagnosis.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126300751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Impact of DHCP churn on network characterization DHCP流失对网络特性的影响
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592034
Long H. Vu, D. Turaga, S. Parthasarathy
We investigate the DHCP churn impact on network characterization by analyzing 18 months of DHCP, DNS, Firewall Alert, and Netflow data collected from an enterprise network of 30,000 clients. We find that DHCP churn has clear impact on network metrics.
我们通过分析18个月的DHCP、DNS、防火墙警报和Netflow数据,从30,000个客户端的企业网络中收集数据,研究DHCP流失对网络特征的影响。我们发现DHCP流失对网络指标有明显的影响。
{"title":"Impact of DHCP churn on network characterization","authors":"Long H. Vu, D. Turaga, S. Parthasarathy","doi":"10.1145/2591971.2592034","DOIUrl":"https://doi.org/10.1145/2591971.2592034","url":null,"abstract":"We investigate the DHCP churn impact on network characterization by analyzing 18 months of DHCP, DNS, Firewall Alert, and Netflow data collected from an enterprise network of 30,000 clients. We find that DHCP churn has clear impact on network metrics.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126091306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the energy and performance of commodity hardware transactional memory 商品硬件事务性存储器的能量和性能
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592030
Nuno Diegues, P. Romano, L. Rodrigues
The advent of multi-core architectures has brought concurrent programming to the forefront of software development. In this context, Transactional Memory (TM) has gained increasing popularity as a simpler, attractive alternative to traditional lock-based synchronization. The recent integration of Hardware TM (HTM) in the last generation of Intel commodity processors turned TM into a mainstream technology, raising a number of questions on its future and that of concurrent programming. To evaluate the potential impact of Intel's HTM, we conducted the largest study on TM to date, comparing different locking techniques, hardware and software TMs, as well as different combinations of these mechanisms, from the dual perspective of performance and power consumption. As a result we perform a workload characterization, to help programmers better exploit the currently available TM facilities, and identify important research directions.
多核架构的出现将并发编程带到了软件开发的前沿。在这种情况下,事务性内存(Transactional Memory, TM)作为传统的基于锁的同步的一种更简单、更有吸引力的替代方案而越来越受欢迎。最近在上一代Intel商用处理器中集成了Hardware TM (HTM),使TM成为一种主流技术,这就对TM的未来和并发编程提出了许多问题。为了评估英特尔HTM的潜在影响,我们对TM进行了迄今为止最大规模的研究,从性能和功耗的双重角度比较了不同的锁定技术、硬件和软件TM,以及这些机制的不同组合。因此,我们执行工作负载特征,以帮助程序员更好地利用当前可用的TM设施,并确定重要的研究方向。
{"title":"On the energy and performance of commodity hardware transactional memory","authors":"Nuno Diegues, P. Romano, L. Rodrigues","doi":"10.1145/2591971.2592030","DOIUrl":"https://doi.org/10.1145/2591971.2592030","url":null,"abstract":"The advent of multi-core architectures has brought concurrent programming to the forefront of software development. In this context, Transactional Memory (TM) has gained increasing popularity as a simpler, attractive alternative to traditional lock-based synchronization. The recent integration of Hardware TM (HTM) in the last generation of Intel commodity processors turned TM into a mainstream technology, raising a number of questions on its future and that of concurrent programming.\u0000 To evaluate the potential impact of Intel's HTM, we conducted the largest study on TM to date, comparing different locking techniques, hardware and software TMs, as well as different combinations of these mechanisms, from the dual perspective of performance and power consumption. As a result we perform a workload characterization, to help programmers better exploit the currently available TM facilities, and identify important research directions.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132834850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Rumor source detection with multiple observations: fundamental limits and algorithms 多观测的谣言源检测:基本限制和算法
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2591993
Zhaoxu Wang, Wenxiang Dong, Wenyi Zhang, C. Tan
This paper addresses the problem of a single rumor source detection with multiple observations, from a statistical point of view of a spreading over a network, based on the susceptible-infectious model. For tree networks, multiple sequential observations for one single instance of rumor spreading cannot improve over the initial snapshot observation. The situation dramatically improves for multiple independent observations. We propose a unified inference framework based on the union rumor centrality, and provide explicit detection performance for degree-regular tree networks. Surprisingly, even with merely two observations, the detection probability at least doubles that of a single observation, and further approaches one, i.e., reliable detection, with increasing degree. This indicates that a richer diversity enhances detectability. For general graphs, a detection algorithm using a breadth-first search strategy is also proposed and evaluated. Besides rumor source detection, our results can be used in network forensics to combat recurring epidemic-like information spreading such as online anomaly and fraudulent email spams.
本文基于易感感染模型,从网络传播的统计角度出发,解决了用多个观测值检测单个谣言源的问题。对于树状网络,对单个谣言传播实例的多个顺序观察不能优于初始快照观察。对于多个独立的观测,这种情况显著改善。提出了一种基于联合谣言中心性的统一推理框架,并为度正则树网络提供了明确的检测性能。令人惊讶的是,即使只有两次观测,探测概率至少是一次观测的两倍,并且随着程度的增加,进一步接近于一次,即可靠的探测。这表明更丰富的多样性提高了可探测性。对于一般图,提出了一种基于宽度优先搜索策略的检测算法,并对其进行了评价。除了谣言来源检测之外,我们的研究结果还可以用于网络取证,以打击在线异常和欺诈性电子邮件垃圾邮件等反复出现的类似流行病的信息传播。
{"title":"Rumor source detection with multiple observations: fundamental limits and algorithms","authors":"Zhaoxu Wang, Wenxiang Dong, Wenyi Zhang, C. Tan","doi":"10.1145/2591971.2591993","DOIUrl":"https://doi.org/10.1145/2591971.2591993","url":null,"abstract":"This paper addresses the problem of a single rumor source detection with multiple observations, from a statistical point of view of a spreading over a network, based on the susceptible-infectious model. For tree networks, multiple sequential observations for one single instance of rumor spreading cannot improve over the initial snapshot observation. The situation dramatically improves for multiple independent observations. We propose a unified inference framework based on the union rumor centrality, and provide explicit detection performance for degree-regular tree networks. Surprisingly, even with merely two observations, the detection probability at least doubles that of a single observation, and further approaches one, i.e., reliable detection, with increasing degree. This indicates that a richer diversity enhances detectability. For general graphs, a detection algorithm using a breadth-first search strategy is also proposed and evaluated. Besides rumor source detection, our results can be used in network forensics to combat recurring epidemic-like information spreading such as online anomaly and fraudulent email spams.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131911231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 130
Automated analysis of multithreaded programs for performance modeling 自动分析多线程程序的性能建模
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592016
A. Tarvo, S. Reiss
We present an approach for building performance models of multithreaded programs automatically. We use a combination of static and a dynamic analyses of a single representative run of the program to build its model. The model can predict performance of the program under a variety of configurations. This paper outlines how we construct the model and demonstrates how the resultant models accurately predict the performance %and resource utilization of complex multithreaded programs.
提出了一种自动构建多线程程序性能模型的方法。我们使用静态和动态分析的一个单一的代表性运行程序的组合来建立它的模型。该模型可以预测程序在各种配置下的性能。本文概述了我们如何构建模型,并演示了所得到的模型如何准确地预测复杂多线程程序的性能和资源利用率。
{"title":"Automated analysis of multithreaded programs for performance modeling","authors":"A. Tarvo, S. Reiss","doi":"10.1145/2591971.2592016","DOIUrl":"https://doi.org/10.1145/2591971.2592016","url":null,"abstract":"We present an approach for building performance models of multithreaded programs automatically. We use a combination of static and a dynamic analyses of a single representative run of the program to build its model. The model can predict performance of the program under a variety of configurations. This paper outlines how we construct the model and demonstrates how the resultant models accurately predict the performance %and resource utilization of complex multithreaded programs.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124994601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
GemDroid: a framework to evaluate mobile platforms GemDroid:一个评估移动平台的框架
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2591973
N. Nachiappan, Praveen Yedlapalli, N. Soundararajan, M. Kandemir, A. Sivasubramaniam, C. Das
As the demand for feature-rich mobile systems such as smartphones and tablets has outpaced other computing systems and is expected to continue at a faster rate, it is projected that SoCs with tens of cores and hundreds of IPs (or accelerator) will be designed to provide unprecedented level of features and functionality in future. Design of such mobile systems with required QoS and power budgets along with other design constraints will be a daunting task for computer architects since any ad hoc, piece-meal solution is unlikely to result in an optimal design. This requires early exploration of the complete design space to understand the system-level design trade-offs. To the best of our knowledge, there is no such publicly available tool to conduct a holistic evaluation of mobile platforms consisting of cores, IPs and system software. This paper presents GemDroid, a comprehensive simulation infrastructure to address these concerns. GemDroid has been designed by integrating the Android open-source emulator for facilitating execution of mobile applications, the GEM5 core simulator for analyzing the CPU and memory centric designs, and models for several IPs to collectively study their impact on system-level performance and power. Analyzing a spectrum of applications with GemDroid, we observed that the memory subsystem is a vital cog in the mobile platform because, it needs to handle both core and IP traffic, which have very different characteristics. Consequently, we present a heterogeneous memory controller (HMC) design, where we divide the memory physically into two address regions, where the first region with one memory controller (MC) handles core-specific application data and the second region with another MC handles all IP related data. The proposed modifications to the memory controller design results in an average 25% reduction in execution time for CPU bound applications, up to 11% reduction in frame drops, and on average 17% reduction in CPU busy time for on-screen (IP bound) applications.
由于对智能手机和平板电脑等功能丰富的移动系统的需求已经超过了其他计算系统,并且预计将继续以更快的速度增长,预计未来将设计具有数十个核心和数百个ip(或加速器)的soc,以提供前所未有的功能和功能水平。对于计算机架构师来说,设计这种具有所需QoS和功耗预算以及其他设计约束的移动系统将是一项艰巨的任务,因为任何临时的、零碎的解决方案都不太可能产生最佳设计。这需要尽早探索完整的设计空间,以了解系统级设计的权衡。据我们所知,目前还没有这样一个公开的工具来对手机平台进行整体评估,包括核心、ip和系统软件。本文介绍了GemDroid,一个全面的仿真基础设施来解决这些问题。GemDroid的设计集成了Android开源模拟器,用于促进移动应用程序的执行,GEM5核心模拟器用于分析以CPU和内存为中心的设计,以及几个ip的模型,以共同研究它们对系统级性能和功耗的影响。通过分析GemDroid的一系列应用程序,我们发现内存子系统是移动平台中至关重要的一个齿轮,因为它需要处理核心和IP流量,这两者具有非常不同的特征。因此,我们提出了一种异构内存控制器(HMC)设计,其中我们将内存物理地划分为两个地址区域,其中具有一个内存控制器(MC)的第一个区域处理特定于核心的应用程序数据,具有另一个MC的第二个区域处理所有与IP相关的数据。对内存控制器设计的建议修改导致CPU绑定应用程序的执行时间平均减少25%,帧丢失最多减少11%,屏幕上(IP绑定)应用程序的CPU繁忙时间平均减少17%。
{"title":"GemDroid: a framework to evaluate mobile platforms","authors":"N. Nachiappan, Praveen Yedlapalli, N. Soundararajan, M. Kandemir, A. Sivasubramaniam, C. Das","doi":"10.1145/2591971.2591973","DOIUrl":"https://doi.org/10.1145/2591971.2591973","url":null,"abstract":"As the demand for feature-rich mobile systems such as smartphones and tablets has outpaced other computing systems and is expected to continue at a faster rate, it is projected that SoCs with tens of cores and hundreds of IPs (or accelerator) will be designed to provide unprecedented level of features and functionality in future. Design of such mobile systems with required QoS and power budgets along with other design constraints will be a daunting task for computer architects since any ad hoc, piece-meal solution is unlikely to result in an optimal design. This requires early exploration of the complete design space to understand the system-level design trade-offs. To the best of our knowledge, there is no such publicly available tool to conduct a holistic evaluation of mobile platforms consisting of cores, IPs and system software.\u0000 This paper presents GemDroid, a comprehensive simulation infrastructure to address these concerns. GemDroid has been designed by integrating the Android open-source emulator for facilitating execution of mobile applications, the GEM5 core simulator for analyzing the CPU and memory centric designs, and models for several IPs to collectively study their impact on system-level performance and power. Analyzing a spectrum of applications with GemDroid, we observed that the memory subsystem is a vital cog in the mobile platform because, it needs to handle both core and IP traffic, which have very different characteristics. Consequently, we present a heterogeneous memory controller (HMC) design, where we divide the memory physically into two address regions, where the first region with one memory controller (MC) handles core-specific application data and the second region with another MC handles all IP related data. The proposed modifications to the memory controller design results in an average 25% reduction in execution time for CPU bound applications, up to 11% reduction in frame drops, and on average 17% reduction in CPU busy time for on-screen (IP bound) applications.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121953940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
期刊
Measurement and Modeling of Computer Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1