首页 > 最新文献

Measurement and Modeling of Computer Systems最新文献

英文 中文
Understanding SMS spam in a large cellular network 了解大型蜂窝网络中的垃圾短信
Pub Date : 2013-06-17 DOI: 10.1145/2465529.2465530
Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang
In this paper, we conduct a comprehensive study of SMS spam in a large cellular network in the US. Using one year of user reported spam messages to the network carrier, we devise text clustering techniques to group associated spam messages in order to identify SMS spam campaigns and spam activities. Our analysis shows that spam campaigns can last for months and have a wide impact on the cellular network. Combining with SMS network records collected during the same time, we find that spam numbers within the same activity often exhibit strong similarity in terms of their sending patterns, tenure and geolocations. Our analysis sheds light on the intentions and strategies of SMS spammers and provides unique insights in developing better method for detecting SMS spam.
在本文中,我们进行了一个全面的研究短信垃圾邮件在一个大型蜂窝网络在美国。利用一年内用户向网络运营商报告的垃圾邮件,我们设计了文本聚类技术来对相关的垃圾邮件进行分组,以识别SMS垃圾邮件活动和垃圾邮件活动。我们的分析表明,垃圾邮件活动可以持续数月,并对蜂窝网络产生广泛的影响。结合在同一时间收集的SMS网络记录,我们发现同一活动中的垃圾邮件号码在其发送模式、使用期限和地理位置方面通常表现出很强的相似性。我们的分析揭示了SMS垃圾邮件发送者的意图和策略,并为开发更好的检测SMS垃圾邮件的方法提供了独特的见解。
{"title":"Understanding SMS spam in a large cellular network","authors":"Nan Jiang, Yu Jin, Ann Skudlark, Zhi-Li Zhang","doi":"10.1145/2465529.2465530","DOIUrl":"https://doi.org/10.1145/2465529.2465530","url":null,"abstract":"In this paper, we conduct a comprehensive study of SMS spam in a large cellular network in the US. Using one year of user reported spam messages to the network carrier, we devise text clustering techniques to group associated spam messages in order to identify SMS spam campaigns and spam activities. Our analysis shows that spam campaigns can last for months and have a wide impact on the cellular network. Combining with SMS network records collected during the same time, we find that spam numbers within the same activity often exhibit strong similarity in terms of their sending patterns, tenure and geolocations. Our analysis sheds light on the intentions and strategies of SMS spammers and provides unique insights in developing better method for detecting SMS spam.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129283228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Data center demand response: avoiding the coincident peak via workload shifting and local generation 数据中心需求响应:通过负载转移和本地发电避免同时出现峰值
Pub Date : 2013-06-17 DOI: 10.1145/2465529.2465740
Zhenhua Liu, A. Wierman, Yuan Chen, Benjamin Razon, Niangjun Chen
Demand response is a crucial aspect of the future smart grid. It has the potential to provide significant peak demand reduction and to ease the incorporation of renewable energy into the grid. Data centers' participation in demand response is becoming increasingly important given the high and increasing energy consumption and the flexibility in demand management in data centers compared to conventional industrial facilities. In this extended abstract we briefly describe recent work in our full paper on two demand response schemes to reduce a data center's peak loads and energy expenditure: workload shifting and the use of local power generations. In our full paper, we conduct a detailed characterization study of coincident peak data over two decades from Fort Collins Utilities, Colorado and then develop two algorithms for data centers by combining workload scheduling and local power generation to avoid the coincident peak and reduce the energy expenditure. The first algorithm optimizes the expected cost and the second one provides a good worst-case guarantee for any coincident peak pattern. We evaluate these algorithms via numerical simulations based on real world traces from production systems. The results show that using workload shifting in combination with local generation can provide significant cost savings (up to 40% in the Fort Collins Utilities' case) compared to either alone.
需求响应是未来智能电网的一个重要方面。它有可能提供显著的峰值需求减少,并简化可再生能源并入电网的过程。考虑到与传统工业设施相比,数据中心的能源消耗高且不断增加,需求管理的灵活性,数据中心参与需求响应变得越来越重要。在这篇扩展摘要中,我们简要描述了全文中关于两种需求响应方案的最新工作,以减少数据中心的峰值负载和能源消耗:工作负载转移和使用本地发电。在我们的全文中,我们对科罗拉多州柯林斯堡公用事业公司20多年来的一致峰值数据进行了详细的特征研究,然后通过将工作量调度和本地发电相结合,为数据中心开发了两种算法,以避免一致峰值并减少能源消耗。第一种算法优化了期望代价,第二种算法对任何一致峰值模式都提供了良好的最坏情况保证。我们通过基于生产系统的真实世界轨迹的数值模拟来评估这些算法。结果表明,与单独使用任何一种方法相比,使用工作量转移与本地发电相结合可以节省大量成本(在柯林斯堡公用事业公司的案例中高达40%)。
{"title":"Data center demand response: avoiding the coincident peak via workload shifting and local generation","authors":"Zhenhua Liu, A. Wierman, Yuan Chen, Benjamin Razon, Niangjun Chen","doi":"10.1145/2465529.2465740","DOIUrl":"https://doi.org/10.1145/2465529.2465740","url":null,"abstract":"Demand response is a crucial aspect of the future smart grid. It has the potential to provide significant peak demand reduction and to ease the incorporation of renewable energy into the grid. Data centers' participation in demand response is becoming increasingly important given the high and increasing energy consumption and the flexibility in demand management in data centers compared to conventional industrial facilities. In this extended abstract we briefly describe recent work in our full paper on two demand response schemes to reduce a data center's peak loads and energy expenditure: workload shifting and the use of local power generations. In our full paper, we conduct a detailed characterization study of coincident peak data over two decades from Fort Collins Utilities, Colorado and then develop two algorithms for data centers by combining workload scheduling and local power generation to avoid the coincident peak and reduce the energy expenditure. The first algorithm optimizes the expected cost and the second one provides a good worst-case guarantee for any coincident peak pattern. We evaluate these algorithms via numerical simulations based on real world traces from production systems. The results show that using workload shifting in combination with local generation can provide significant cost savings (up to 40% in the Fort Collins Utilities' case) compared to either alone.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128820940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 239
Greedy name lookup for named data networking 命名数据网络的贪婪名称查找
Pub Date : 2013-06-17 DOI: 10.1145/2465529.2465741
Yi Wang, Dongzhe Tai, Ting Zhang, Jianyuan Lu, Boyang Xu, Huichen Dai, B. Liu
Different from the IP-based routers, Named Data Networking routers forward packets by content names, which consist of characters and have variable and unbounded length. This kind of complex name constitution plus the huge-sized name routing table makes wire speed name lookup an extremely challenging task. Greedy name lookup mechanism is proposed to speed up name lookup by dynamically adjusting the search path against the changes of the prefix table. Meanwhile, we elaborate a string-oriented perfect hash table to reduce memory consumption which stores the signature of the key in the entry instead of the key itself. Extensive experimental results on a commodity PC server with 3 million name prefix entries demonstrate that greedy name lookup mechanism achieves 57.14 million searches per second using only 72.95 MB memory.
与基于ip的路由器不同,命名数据网络路由器通过内容名称转发报文,内容名称由字符组成,长度可变且不受限制。这种复杂的名称构成加上庞大的名称路由表使得在线速度名称查找成为一项极具挑战性的任务。提出了贪婪名称查找机制,通过根据前缀表的变化动态调整搜索路径来加快名称查找速度。同时,我们精心设计了一个面向字符串的完美哈希表,以减少内存消耗,它将密钥的签名存储在条目中,而不是密钥本身。在具有300万个名称前缀条目的商用PC服务器上进行的大量实验结果表明,贪婪名称查找机制仅使用72.95 MB内存即可实现每秒5714万次搜索。
{"title":"Greedy name lookup for named data networking","authors":"Yi Wang, Dongzhe Tai, Ting Zhang, Jianyuan Lu, Boyang Xu, Huichen Dai, B. Liu","doi":"10.1145/2465529.2465741","DOIUrl":"https://doi.org/10.1145/2465529.2465741","url":null,"abstract":"Different from the IP-based routers, Named Data Networking routers forward packets by content names, which consist of characters and have variable and unbounded length. This kind of complex name constitution plus the huge-sized name routing table makes wire speed name lookup an extremely challenging task. Greedy name lookup mechanism is proposed to speed up name lookup by dynamically adjusting the search path against the changes of the prefix table. Meanwhile, we elaborate a string-oriented perfect hash table to reduce memory consumption which stores the signature of the key in the entry instead of the key itself. Extensive experimental results on a commodity PC server with 3 million name prefix entries demonstrate that greedy name lookup mechanism achieves 57.14 million searches per second using only 72.95 MB memory.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"891 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116176729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Discriminant malware distance learning on structuralinformation for automated malware classification 基于结构信息的恶意软件远程判别学习,用于恶意软件自动分类
Pub Date : 2013-06-17 DOI: 10.1145/2465529.2465531
Deguang Kong, Guanhua Yan
In this work, we explore techniques that can automatically classify malware variants into their corresponding families. Our framework extracts structural information from malware programs as attributed function call graphs, further learns discriminant malware distance metrics, finally adopts an ensemble of classifiers for automated malware classification. Experimental results show that our method is able to achieve high classification accuracy.
在这项工作中,我们探索了可以自动将恶意软件变体分类到相应家族的技术。该框架从恶意软件程序中提取结构信息作为属性函数调用图,进一步学习判别恶意软件距离度量,最后采用分类器集成实现恶意软件自动分类。实验结果表明,该方法具有较高的分类精度。
{"title":"Discriminant malware distance learning on structuralinformation for automated malware classification","authors":"Deguang Kong, Guanhua Yan","doi":"10.1145/2465529.2465531","DOIUrl":"https://doi.org/10.1145/2465529.2465531","url":null,"abstract":"In this work, we explore techniques that can automatically classify malware variants into their corresponding families. Our framework extracts structural information from malware programs as attributed function call graphs, further learns discriminant malware distance metrics, finally adopts an ensemble of classifiers for automated malware classification. Experimental results show that our method is able to achieve high classification accuracy.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125157767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 120
Tutorial on geo-replication in data center applications 关于数据中心应用程序中的地理复制的教程
Pub Date : 2013-06-17 DOI: 10.1145/2494232.2465768
M. Aguilera
Data center applications increasingly require a *geo-replicated* storage system, that is, a storage system replicated across many geographic locations. Geo-replication can reduce access latency, improve availability, and provide disaster tolerance. It turns out there are many techniques for geo-replication with different trade-offs. In this tutorial, we give an overview of these techniques, organized according to two orthogonal dimensions: level of synchrony (synchronous and asynchronous) and type of storage service (read-write, state machine, transaction). We explain the basic idea of these techniques, together with their applicability and trade-offs.
数据中心应用越来越需要“地理复制”存储系统,即跨多个地理位置复制的存储系统。异地复制可以减少访问延迟、提高可用性并提供容灾能力。事实证明,有许多具有不同权衡的地理复制技术。在本教程中,我们将根据两个正交的维度对这些技术进行概述:同步级别(同步和异步)和存储服务类型(读写、状态机、事务)。我们将解释这些技术的基本思想,以及它们的适用性和优缺点。
{"title":"Tutorial on geo-replication in data center applications","authors":"M. Aguilera","doi":"10.1145/2494232.2465768","DOIUrl":"https://doi.org/10.1145/2494232.2465768","url":null,"abstract":"Data center applications increasingly require a *geo-replicated* storage system, that is, a storage system replicated across many geographic locations. Geo-replication can reduce access latency, improve availability, and provide disaster tolerance. It turns out there are many techniques for geo-replication with different trade-offs. In this tutorial, we give an overview of these techniques, organized according to two orthogonal dimensions: level of synchrony (synchronous and asynchronous) and type of storage service (read-write, state machine, transaction). We explain the basic idea of these techniques, together with their applicability and trade-offs.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123570389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Challenges in cloud scale data centers 云规模数据中心面临的挑战
Pub Date : 2013-06-17 DOI: 10.1145/2465529.2465767
D. Maltz
Data centers are fascinating places, where the massive scale required to deliver on-line services like web search and cloud hosting turns minor issues into major challenges that must be addressed in the design of the physical infrastructure and the software platform. In this talk, I'll briefly overview the kinds of applications that run in mega-data centers and the workloads they place on the infrastructure. I'll then describe a number of challenges seen in Microsoft's data centers, with the goals of posing questions more than describing solutions and explaining how economic factors, technology issues, and software design interact when creating low-latency, low-cost, high availability services.
数据中心是一个令人着迷的地方,在这里,提供网络搜索和云托管等在线服务所需的大规模规模将小问题变成了必须在物理基础设施和软件平台的设计中解决的重大挑战。在这次演讲中,我将简要概述在大型数据中心中运行的各种应用程序以及它们在基础设施上的工作负载。然后,我将描述微软数据中心面临的一些挑战,目的是提出问题,而不是描述解决方案,并解释在创建低延迟、低成本、高可用性服务时,经济因素、技术问题和软件设计是如何相互作用的。
{"title":"Challenges in cloud scale data centers","authors":"D. Maltz","doi":"10.1145/2465529.2465767","DOIUrl":"https://doi.org/10.1145/2465529.2465767","url":null,"abstract":"Data centers are fascinating places, where the massive scale required to deliver on-line services like web search and cloud hosting turns minor issues into major challenges that must be addressed in the design of the physical infrastructure and the software platform. In this talk, I'll briefly overview the kinds of applications that run in mega-data centers and the workloads they place on the infrastructure. I'll then describe a number of challenges seen in Microsoft's data centers, with the goals of posing questions more than describing solutions and explaining how economic factors, technology issues, and software design interact when creating low-latency, low-cost, high availability services.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122600375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
High-throughput low-latency fine-grained disk logging 高吞吐量、低延迟的细粒度磁盘日志记录
Pub Date : 2013-06-17 DOI: 10.1145/2465529.2465552
D. Simha, T. Chiueh, G. Rajagopalan, P. Bose
Synchronously logging updates to persistent storage first and then asynchronously committing these updates to their rightful storage locations is a well-known and heavily used technique to improve the sustained throughput of write-intensive disk-based data processing systems, whose latency and throughput accordingly are largely determined by the latency and throughput of the underlying logging mechanism. The conventional wisdom is that logging operations are relatively straightforward to optimize because the associated disk access pattern is largely sequential. However, it turns out that to achieve both high throughput and low latency for fine-grained logging operations, whose payload size is smaller than a disk sector, is extremely challenging. This paper describes the experiences and lessons we have gained from building a disk logging system that can successfully deliver over 1.2 million 256-byte logging operations per second, with the average logging latency below 1 msec.
首先将更新同步地记录到持久存储中,然后将这些更新异步地提交到正确的存储位置,这是一种众所周知且广泛使用的技术,用于提高基于磁盘的写密集型数据处理系统的持续吞吐量,其延迟和吞吐量在很大程度上取决于底层日志记录机制的延迟和吞吐量。传统观点认为,日志操作相对容易优化,因为相关的磁盘访问模式在很大程度上是顺序的。然而,事实证明,要实现细粒度日志操作的高吞吐量和低延迟,其有效负载大小小于磁盘扇区,是极具挑战性的。本文描述了我们从构建磁盘日志系统中获得的经验和教训,该系统可以每秒成功地交付超过120万个256字节的日志操作,平均日志延迟低于1毫秒。
{"title":"High-throughput low-latency fine-grained disk logging","authors":"D. Simha, T. Chiueh, G. Rajagopalan, P. Bose","doi":"10.1145/2465529.2465552","DOIUrl":"https://doi.org/10.1145/2465529.2465552","url":null,"abstract":"Synchronously logging updates to persistent storage first and then asynchronously committing these updates to their rightful storage locations is a well-known and heavily used technique to improve the sustained throughput of write-intensive disk-based data processing systems, whose latency and throughput accordingly are largely determined by the latency and throughput of the underlying logging mechanism. The conventional wisdom is that logging operations are relatively straightforward to optimize because the associated disk access pattern is largely sequential. However, it turns out that to achieve both high throughput and low latency for fine-grained logging operations, whose payload size is smaller than a disk sector, is extremely challenging. This paper describes the experiences and lessons we have gained from building a disk logging system that can successfully deliver over 1.2 million 256-byte logging operations per second, with the average logging latency below 1 msec.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131909926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
How does energy accounting matter for energy management? 能源会计对能源管理有何影响?
Pub Date : 2013-06-17 DOI: 10.1145/2465529.2465742
Mian Dong, Tian Lan, Lin Zhong
{"title":"How does energy accounting matter for energy management?","authors":"Mian Dong, Tian Lan, Lin Zhong","doi":"10.1145/2465529.2465742","DOIUrl":"https://doi.org/10.1145/2465529.2465742","url":null,"abstract":"","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134273938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing large-scale nudge engines 设计大型推力发动机
Pub Date : 2013-06-17 DOI: 10.1145/2465529.2465766
B. Prabhakar
In many of the challenges faced by the modern world, from overcrowded transportation systems to overstretched healthcare systems, large benefits for society come about from small changes by very many individuals. We survey the problems and the cost they impose on society, and describe a framework for designing "nudge engines"---algorithms, incentives and technology for influencing human behavior. We present a model for analyzing their effectiveness and results from transportation pilots conducted in Bangalore, at Stanford and in Singapore, and a wellness program for the employees of Accenture-USA.
在现代世界面临的许多挑战中,从过度拥挤的交通系统到过度紧张的医疗保健系统,社会的巨大利益来自于许多个人的微小改变。我们调查了这些问题及其对社会造成的成本,并描述了一个设计“助推引擎”的框架——影响人类行为的算法、激励和技术。我们提出了一个模型,用于分析在班加罗尔、斯坦福大学和新加坡进行的交通试点的有效性和结果,以及埃森哲美国公司的员工健康计划。
{"title":"Designing large-scale nudge engines","authors":"B. Prabhakar","doi":"10.1145/2465529.2465766","DOIUrl":"https://doi.org/10.1145/2465529.2465766","url":null,"abstract":"In many of the challenges faced by the modern world, from overcrowded transportation systems to overstretched healthcare systems, large benefits for society come about from small changes by very many individuals. We survey the problems and the cost they impose on society, and describe a framework for designing \"nudge engines\"---algorithms, incentives and technology for influencing human behavior. We present a model for analyzing their effectiveness and results from transportation pilots conducted in Bangalore, at Stanford and in Singapore, and a wellness program for the employees of Accenture-USA.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125700843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Computational analysis of cascading failures in power networks 电网级联故障的计算分析
Pub Date : 2013-06-17 DOI: 10.1145/2465529.2465752
Dorian Mazauric, Saleh Soltan, G. Zussman
This paper focuses on cascading line failures in the transmission system of the power grid. Such a cascade may have a devastating effect not only on the power grid but also on the interconnected communication networks. Recent large-scale power outages demonstrated the limitations of epidemic- and percolation-based tools in modeling the cascade evolution. Hence, based on a linearized power flow model (that substantially differs from the classical packet flow models), we obtain results regarding the various properties of a cascade. Specifically, we consider performance metrics such as the the distance between failures, the length of the cascade, and the fraction of demand (load) satisfied after the cascade. We show, for example, that due to the unique properties of the model: (i) the distance between subsequent failures can be arbitrarily large and the cascade may be arbitrarily long, (ii) a large set of initial line failures may have a smaller effect than a failure of one of the lines in the set, and (iii) minor changes to the network parameters may have a significant impact. Moreover, we show that finding the set of lines whose removal has the most significant impact (under various metrics) is NP-Hard. Moreover, we develop a fast algorithm to recompute the flows at each step of the cascade. The results can provide insight into the design of smart grid measurement and control algorithms that can mitigate a cascade.
本文主要研究电网输电系统中的级联线路故障。这种级联不仅对电网,而且对相互连接的通信网络都可能造成毁灭性的影响。最近的大规模停电表明,基于流行病和渗漏的工具在级联进化建模方面存在局限性。因此,基于线性化的功率流模型(与经典的包流模型有很大的不同),我们得到了关于级联的各种特性的结果。具体来说,我们考虑诸如故障之间的距离、级联的长度以及级联后满足的需求(负载)的比例等性能指标。例如,我们表明,由于模型的独特属性:(i)后续故障之间的距离可以任意大,级联可以任意长,(ii)一组大的初始线路故障可能比一组线路故障的影响要小,(iii)网络参数的微小变化可能会产生重大影响。此外,我们表明,找到其删除具有最显著影响的线集(在各种指标下)是NP-Hard的。此外,我们还开发了一种快速算法来重新计算串级的每一步流。研究结果可以为智能电网测量和控制算法的设计提供见解,以减轻级联。
{"title":"Computational analysis of cascading failures in power networks","authors":"Dorian Mazauric, Saleh Soltan, G. Zussman","doi":"10.1145/2465529.2465752","DOIUrl":"https://doi.org/10.1145/2465529.2465752","url":null,"abstract":"This paper focuses on cascading line failures in the transmission system of the power grid. Such a cascade may have a devastating effect not only on the power grid but also on the interconnected communication networks. Recent large-scale power outages demonstrated the limitations of epidemic- and percolation-based tools in modeling the cascade evolution. Hence, based on a linearized power flow model (that substantially differs from the classical packet flow models), we obtain results regarding the various properties of a cascade. Specifically, we consider performance metrics such as the the distance between failures, the length of the cascade, and the fraction of demand (load) satisfied after the cascade. We show, for example, that due to the unique properties of the model: (i) the distance between subsequent failures can be arbitrarily large and the cascade may be arbitrarily long, (ii) a large set of initial line failures may have a smaller effect than a failure of one of the lines in the set, and (iii) minor changes to the network parameters may have a significant impact. Moreover, we show that finding the set of lines whose removal has the most significant impact (under various metrics) is NP-Hard. Moreover, we develop a fast algorithm to recompute the flows at each step of the cascade. The results can provide insight into the design of smart grid measurement and control algorithms that can mitigate a cascade.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125440656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
Measurement and Modeling of Computer Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1