首页 > 最新文献

2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)最新文献

英文 中文
Collaborative Framework of Cloud Transcoding and Distribution Supporting Cost-Efficient Crowdsourced Live Streaming 支持高性价比众包直播的云转码和分发协作框架
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00122
Jiannan Zheng, Haitao Zhang, Yilin Jin, Huadong Ma
With the rapid development of high-speed Internet access and popularization of high-performance smart devices, past decade has witnessed the great development of crowdsourced live streaming (CLS) service. Transcoding and video distribution are essential in CLS service to guarantee viewer engagement. Large CLS systems gradually migrate their services to multi-cloud platforms. However, highly dynamic viewers' requests influence transcoding and CDN distribution decisions, eventually lead to fluctuation in QoE and increase in operational cost. It is challenging for the CLS system to serve viewer's requests in multi-cloud platforms with fluctuation in cloud transcoding and distribution performance. In this paper, we propose a collaborative framework of cloud transcoding and distribution supporting CLS service. First, we define cost model and QoE model in multi-cloud platforms, comprehensively considering cloud transcoding and distribution. Second, we propose a collaborative cost-efficient approach based on multi-agent decision model. We use a G-Greedy exploration approach to learn what actions to take by exploration and exploitation based on the state of current environment. The trace-driven experiments demonstrate that our proposed approach is cost-efficient and QoE-maintained and can reduce operational cost compared with alternatives (5.37%-21.21%) while maintaining QoE of viewers.
随着高速互联网接入的快速发展和高性能智能设备的普及,过去十年见证了众包直播(CLS)服务的巨大发展。转换编码和视频分发在CLS服务中是必不可少的,以保证观众的参与。大型CLS系统逐渐将其服务迁移到多云平台。然而,高度动态的观众请求会影响转码和CDN分发决策,最终导致QoE的波动和运营成本的增加。由于云转码和分发性能的波动,CLS系统在多云平台上满足观看者的请求是一个挑战。在本文中,我们提出了一个支持CLS服务的云转码和分发协作框架。首先,我们定义了多云平台下的成本模型和QoE模型,综合考虑了云转码和云分布。其次,我们提出了一种基于多智能体决策模型的协同成本效益方法。我们使用G-Greedy探索方法,根据当前环境的状态来学习通过探索和开发采取什么行动。跟踪驱动实验表明,我们提出的方法具有成本效益和QoE保持,与其他方法相比,在保持观众QoE的情况下,可以降低运营成本(5.37%-21.21%)。
{"title":"Collaborative Framework of Cloud Transcoding and Distribution Supporting Cost-Efficient Crowdsourced Live Streaming","authors":"Jiannan Zheng, Haitao Zhang, Yilin Jin, Huadong Ma","doi":"10.1109/ICPADS53394.2021.00122","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00122","url":null,"abstract":"With the rapid development of high-speed Internet access and popularization of high-performance smart devices, past decade has witnessed the great development of crowdsourced live streaming (CLS) service. Transcoding and video distribution are essential in CLS service to guarantee viewer engagement. Large CLS systems gradually migrate their services to multi-cloud platforms. However, highly dynamic viewers' requests influence transcoding and CDN distribution decisions, eventually lead to fluctuation in QoE and increase in operational cost. It is challenging for the CLS system to serve viewer's requests in multi-cloud platforms with fluctuation in cloud transcoding and distribution performance. In this paper, we propose a collaborative framework of cloud transcoding and distribution supporting CLS service. First, we define cost model and QoE model in multi-cloud platforms, comprehensively considering cloud transcoding and distribution. Second, we propose a collaborative cost-efficient approach based on multi-agent decision model. We use a G-Greedy exploration approach to learn what actions to take by exploration and exploitation based on the state of current environment. The trace-driven experiments demonstrate that our proposed approach is cost-efficient and QoE-maintained and can reduce operational cost compared with alternatives (5.37%-21.21%) while maintaining QoE of viewers.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131502174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TRAN: Task Replication with Guarantee via Multi-armed Bandit TRAN:通过多臂强盗保证任务复制
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00048
Yitong Zhou, Bowen Peng, Jingmian Wang, Weiwei Miao, Zeng Zeng, Yibo Jin, Sheng Z. Zhang, Zhuzhong Qian
With the rapid development of edge computing, edge clusters need to deal with a tremendous amount of tasks, making some edge clusters overloaded, which further translates into task completion lag. Previous works usually copy the tasks from overloaded edges to idle edges so as to reduce the task queuing and computing delay. However, the completion delay of tasks copied to different edges cannot be predicted before the replication decision is made, which affects the overall task replication performance. In this paper, we propose an online task replication algorithm based on the predictions derived from multi-armed bandit. Via rigorous proof, the regret is ensured to be sub-linear upon the bandit, measuring the gap between the online decisions and the offline optimum. Extensive simulations are conducted to confirm the superiority of the proposed algorithm over state-of-the-art replication strategies.
随着边缘计算的快速发展,边缘集群需要处理大量的任务,这使得一些边缘集群过载,进而导致任务完成滞后。以往的工作通常是将任务从过载边复制到空闲边,以减少任务排队和计算延迟。但是,在做出复制决策之前,无法预测复制到不同边的任务的完成延迟,这会影响任务复制的整体性能。在本文中,我们提出了一种基于多臂强盗预测的在线任务复制算法。通过严格的证明,保证了对强盗的后悔是次线性的,测量了在线决策与离线最优决策之间的差距。进行了大量的仿真,以证实所提出的算法优于最先进的复制策略。
{"title":"TRAN: Task Replication with Guarantee via Multi-armed Bandit","authors":"Yitong Zhou, Bowen Peng, Jingmian Wang, Weiwei Miao, Zeng Zeng, Yibo Jin, Sheng Z. Zhang, Zhuzhong Qian","doi":"10.1109/ICPADS53394.2021.00048","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00048","url":null,"abstract":"With the rapid development of edge computing, edge clusters need to deal with a tremendous amount of tasks, making some edge clusters overloaded, which further translates into task completion lag. Previous works usually copy the tasks from overloaded edges to idle edges so as to reduce the task queuing and computing delay. However, the completion delay of tasks copied to different edges cannot be predicted before the replication decision is made, which affects the overall task replication performance. In this paper, we propose an online task replication algorithm based on the predictions derived from multi-armed bandit. Via rigorous proof, the regret is ensured to be sub-linear upon the bandit, measuring the gap between the online decisions and the offline optimum. Extensive simulations are conducted to confirm the superiority of the proposed algorithm over state-of-the-art replication strategies.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114544716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
[Copyright notice] (版权)
Pub Date : 2021-12-01 DOI: 10.1109/icpads53394.2021.00003
{"title":"[Copyright notice]","authors":"","doi":"10.1109/icpads53394.2021.00003","DOIUrl":"https://doi.org/10.1109/icpads53394.2021.00003","url":null,"abstract":"","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125390495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Framework for Evaluating BFT 评价BFT的框架
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00030
James R. Clavin, Yue Huang, Xin Wang, Pradeep M. Prakash, Sisi Duan, Jianwu Wang, S. Peisert
We present a framework for evaluating the performance of Byzantine fault-tolerant (BFT) protocols theoretically. Our motivation is to identify protocols suitable for a particular power grid application. In this application, replicas are located in a LAN network where latency is the priority. To fully understand the performance of BFT, we provide a generic approach that quantifies the performance of BFT protocols based on the number of cryptographic operations under five different scenarios (in the presence of failures and without failures). We present the performance of three representative BFT protocols: PBFT, Prime, and SBFT. To validate our framework, we also evaluate the protocols experimentally in the CloudLab testbed. Our experimental results match the findings predicted by the framework. Although a variety of factors may affect the performance of the protocols, our framework can be used as a valuable reference to understand the performance of BFT.
我们从理论上提出了一个评估拜占庭容错协议性能的框架。我们的动机是确定适合特定电网应用的协议。在此应用程序中,副本位于优先考虑延迟的LAN网络中。为了充分理解BFT的性能,我们提供了一种通用方法,该方法基于五种不同场景下(存在故障和没有故障)的加密操作数量来量化BFT协议的性能。我们介绍了三种代表性的BFT协议:PBFT、Prime和SBFT的性能。为了验证我们的框架,我们还在CloudLab测试台上对协议进行了实验评估。我们的实验结果与框架预测的结果相吻合。虽然各种因素可能会影响协议的性能,但我们的框架可以作为理解BFT性能的有价值的参考。
{"title":"A Framework for Evaluating BFT","authors":"James R. Clavin, Yue Huang, Xin Wang, Pradeep M. Prakash, Sisi Duan, Jianwu Wang, S. Peisert","doi":"10.1109/ICPADS53394.2021.00030","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00030","url":null,"abstract":"We present a framework for evaluating the performance of Byzantine fault-tolerant (BFT) protocols theoretically. Our motivation is to identify protocols suitable for a particular power grid application. In this application, replicas are located in a LAN network where latency is the priority. To fully understand the performance of BFT, we provide a generic approach that quantifies the performance of BFT protocols based on the number of cryptographic operations under five different scenarios (in the presence of failures and without failures). We present the performance of three representative BFT protocols: PBFT, Prime, and SBFT. To validate our framework, we also evaluate the protocols experimentally in the CloudLab testbed. Our experimental results match the findings predicted by the framework. Although a variety of factors may affect the performance of the protocols, our framework can be used as a valuable reference to understand the performance of BFT.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116014766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Post-Quantum User Authentication and Key Exchange Based on Consortium Blockchain 基于联盟区块链的后量子用户认证和密钥交换
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00089
Shiwei Xu, Ao Sun, Xiaowen Cai, Zhengwei Ren, Yizhi Zhao, Jianying Zhou
Consortium blockchain has been widely used in many application scenarios, where there is the demand for a universal user authentication and key exchange mechanism for all the application users in the system like Know Your Customer. Since current solutions heavily rely on traditional public-key cryptosystems that are vulnerable to attacks from quantum computers, we design and implement the first post-quantum (PQ) user authentication and key exchange system for consortium blockchain, which is integrated with all the PQ public-key (i.e., signature and encryption/KEM) algorithms in the current round of NIST call for national standard. Furthermore, we also provide chaincodes, related APIs together with client codes for further development. Last but not least, we perform a systematic evaluation on the performance of the system including the consumed time of chaincodes execution and the needed on-chain storage space. Based on the experiment results, we discuss the implications of our findings, which are helpful for the PQ blockchain-based application developers, the undergoing NIST call and the developers of the PQ algorithms.
财团b区块链已被广泛应用于许多应用场景中,这些场景需要为系统中的所有应用程序用户提供通用的用户身份验证和密钥交换机制,例如Know Your Customer。由于目前的解决方案严重依赖于传统的公钥密码系统,容易受到量子计算机的攻击,我们为联盟b区块链设计并实现了第一个后量子(PQ)用户身份验证和密钥交换系统,该系统集成了当前一轮NIST国家标准呼吁中的所有PQ公钥(即签名和加密/KEM)算法。此外,我们还提供链码,相关api以及客户端代码,以供进一步开发。最后但并非最不重要的是,我们对系统的性能进行了系统的评估,包括链码执行的消耗时间和所需的链上存储空间。根据实验结果,我们讨论了我们的研究结果的含义,这对基于PQ区块链的应用程序开发人员,正在进行的NIST呼叫和PQ算法的开发人员有帮助。
{"title":"Post-Quantum User Authentication and Key Exchange Based on Consortium Blockchain","authors":"Shiwei Xu, Ao Sun, Xiaowen Cai, Zhengwei Ren, Yizhi Zhao, Jianying Zhou","doi":"10.1109/ICPADS53394.2021.00089","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00089","url":null,"abstract":"Consortium blockchain has been widely used in many application scenarios, where there is the demand for a universal user authentication and key exchange mechanism for all the application users in the system like Know Your Customer. Since current solutions heavily rely on traditional public-key cryptosystems that are vulnerable to attacks from quantum computers, we design and implement the first post-quantum (PQ) user authentication and key exchange system for consortium blockchain, which is integrated with all the PQ public-key (i.e., signature and encryption/KEM) algorithms in the current round of NIST call for national standard. Furthermore, we also provide chaincodes, related APIs together with client codes for further development. Last but not least, we perform a systematic evaluation on the performance of the system including the consumed time of chaincodes execution and the needed on-chain storage space. Based on the experiment results, we discuss the implications of our findings, which are helpful for the PQ blockchain-based application developers, the undergoing NIST call and the developers of the PQ algorithms.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116944716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Intelligent Game Theory Framework for Detecting Advanced Persistent Threats 一种检测高级持续威胁的智能博弈论框架
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00062
Hao Yan, Qianzhen Zhang, Junjie Xie, Ziyue Lu, Sheng Chen, Deke Guo
The advanced persistent threat (APT) is a stealthy cyber attack perpetrated by a group that gains unauthorized access to a computer network and remains undiscovered to steal specific data and resources. Fast detection and defense of APT attacks are critical tasks in cyber security. Previous works use simple feature extraction and classification methods to distinguish APT information flow from the normal one. However, APT attacks are latent, with very little flow and mixed in many normal information flows. Moreover, APT attacks can adjust their behavior according to the environment, making it challenging to be discovered and extract features. Meanwhile, dynamic information flow tracking (DIFT) is a tool for tracking information flow, which can also adjust the marking strategy according to the environment and is often used to track and detect APT information flow. On the other hand, game theory is a mathematical model that expresses the game of two or more parties. Therefore, this motivates us to model a game theory to solve the above challenge. In this paper, to solve the above obstacles, we propose an intelligent game theory framework named DPS, which models the strategic interaction between APTs and DIFT and aims to get a high reward for DIFT. Our proposed DPS framework utilizes deep reinforcement learning to find the Nash equilibrium. The game model is a nonzero-sum, average reward stochastic game. Specifically, we design a subgraph pruning strategy and deep Q-network to guide the player in exploring new strategies in the information flow graph. Finally, we implement our framework to compute an optimal defender strategy to defend cyber security. Based on 2 real-world datasets, the experiment results demonstrate that the DPS framework can delay APT intrusions under equilibrium in 3 epochs and get a better reward than the Uniform policy.
高级持续性威胁(APT)是一种隐蔽的网络攻击,由一个组织未经授权访问计算机网络,并在不被发现的情况下窃取特定数据和资源。快速检测和防御APT攻击是网络安全的关键任务。以往的工作使用简单的特征提取和分类方法来区分APT信息流和正常信息流。然而,APT攻击是潜在的,流量很小,并且混合在许多正常的信息流中。此外,APT攻击可以根据环境调整自己的行为,这给发现和提取特征带来了挑战。同时,动态信息流跟踪(dynamic information flow tracking, DIFT)是一种跟踪信息流的工具,它还可以根据环境调整标记策略,常用于跟踪和检测APT信息流。另一方面,博弈论是表达两方或多方博弈的数学模型。因此,这促使我们建立一个博弈论模型来解决上述挑战。为了解决上述障碍,本文提出了一个名为DPS的智能博弈论框架,该框架对apt和DIFT之间的战略互动进行建模,旨在为DIFT获得高回报。我们提出的DPS框架利用深度强化学习来寻找纳什均衡。游戏模型是非零和、平均奖励的随机游戏。具体来说,我们设计了子图修剪策略和深度q网络来指导玩家在信息流图中探索新的策略。最后,我们实现了我们的框架来计算最优防御策略来防御网络安全。基于2个真实数据集的实验结果表明,DPS框架可以在3个epoch的均衡状态下延迟APT入侵,并且比统一策略获得更好的奖励。
{"title":"An Intelligent Game Theory Framework for Detecting Advanced Persistent Threats","authors":"Hao Yan, Qianzhen Zhang, Junjie Xie, Ziyue Lu, Sheng Chen, Deke Guo","doi":"10.1109/ICPADS53394.2021.00062","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00062","url":null,"abstract":"The advanced persistent threat (APT) is a stealthy cyber attack perpetrated by a group that gains unauthorized access to a computer network and remains undiscovered to steal specific data and resources. Fast detection and defense of APT attacks are critical tasks in cyber security. Previous works use simple feature extraction and classification methods to distinguish APT information flow from the normal one. However, APT attacks are latent, with very little flow and mixed in many normal information flows. Moreover, APT attacks can adjust their behavior according to the environment, making it challenging to be discovered and extract features. Meanwhile, dynamic information flow tracking (DIFT) is a tool for tracking information flow, which can also adjust the marking strategy according to the environment and is often used to track and detect APT information flow. On the other hand, game theory is a mathematical model that expresses the game of two or more parties. Therefore, this motivates us to model a game theory to solve the above challenge. In this paper, to solve the above obstacles, we propose an intelligent game theory framework named DPS, which models the strategic interaction between APTs and DIFT and aims to get a high reward for DIFT. Our proposed DPS framework utilizes deep reinforcement learning to find the Nash equilibrium. The game model is a nonzero-sum, average reward stochastic game. Specifically, we design a subgraph pruning strategy and deep Q-network to guide the player in exploring new strategies in the information flow graph. Finally, we implement our framework to compute an optimal defender strategy to defend cyber security. Based on 2 real-world datasets, the experiment results demonstrate that the DPS framework can delay APT intrusions under equilibrium in 3 epochs and get a better reward than the Uniform policy.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"52 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124215227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GraFin: An Applicable Graph-based Fingerprinting Approach for Robust Indoor Localization GraFin:一种适用于室内定位的基于图形的指纹识别方法
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00099
Han Zheng, Yan Zhang, Lan Zhang, Hao Xia, Shaojie Bai, G. Shen, Tian He, Xiangyang Li
Wi-Fi fingerprinting using the received signal strength (RSS) of the access point (AP) as a physical signal feature is widely studied in the indoor localization area with various applications. One main problem with fingerprinting based approach is the uncertainty of RSS measurements, which often leads to instability and decline of localization performance. In this work, we propose GraFin, a graph-based fingerprinting approach, to provide accurate and robust indoor localization without tedious site surveys and extra assistant information. The key idea lies in the insight that despite the RSS measurement of one AP at one reference point (RP) can be noisy, the proximity pattern, which describes one AP's relative position to other APs and RPs, is usually more stable. Specifically, GraFin models APs and RPs on a graph based on limited RSS measurements and provides position-aware fingerprints for APs and RPs based on an inductive deep graph model. We evaluate GraFin on a public indoor localization dataset, and the results demonstrate the effectiveness and robustness of our approach. Furthermore, we apply our approach to the arrival-departure time estimation task for instant delivery service. Experiment results on the enterprise dataset from one of the largest instant delivery platforms in China show that GraFin outperforms baseline approaches with significantly lower time estimation error.
利用接入点(AP)的接收信号强度(RSS)作为物理信号特征的Wi-Fi指纹识别技术在室内定位领域得到了广泛的研究和应用。基于指纹识别方法的一个主要问题是RSS测量的不确定性,这通常会导致定位性能的不稳定和下降。在这项工作中,我们提出了GraFin,一种基于图形的指纹识别方法,可以提供准确而强大的室内定位,而无需繁琐的现场调查和额外的辅助信息。关键思想在于,尽管一个AP在一个参考点(RP)的RSS测量可能有噪声,但邻近模式(描述一个AP与其他AP和RP的相对位置)通常更稳定。具体来说,GraFin基于有限的RSS测量值在图上对APs和rp进行建模,并基于归纳深度图模型为APs和rp提供位置感知指纹。我们在一个公开的室内定位数据集上评估了GraFin,结果证明了我们方法的有效性和鲁棒性。此外,我们将此方法应用于即时递送服务的到达和离开时间估计任务。在中国最大的即时交付平台之一的企业数据集上的实验结果表明,GraFin在时间估计误差显著降低的情况下优于基线方法。
{"title":"GraFin: An Applicable Graph-based Fingerprinting Approach for Robust Indoor Localization","authors":"Han Zheng, Yan Zhang, Lan Zhang, Hao Xia, Shaojie Bai, G. Shen, Tian He, Xiangyang Li","doi":"10.1109/ICPADS53394.2021.00099","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00099","url":null,"abstract":"Wi-Fi fingerprinting using the received signal strength (RSS) of the access point (AP) as a physical signal feature is widely studied in the indoor localization area with various applications. One main problem with fingerprinting based approach is the uncertainty of RSS measurements, which often leads to instability and decline of localization performance. In this work, we propose GraFin, a graph-based fingerprinting approach, to provide accurate and robust indoor localization without tedious site surveys and extra assistant information. The key idea lies in the insight that despite the RSS measurement of one AP at one reference point (RP) can be noisy, the proximity pattern, which describes one AP's relative position to other APs and RPs, is usually more stable. Specifically, GraFin models APs and RPs on a graph based on limited RSS measurements and provides position-aware fingerprints for APs and RPs based on an inductive deep graph model. We evaluate GraFin on a public indoor localization dataset, and the results demonstrate the effectiveness and robustness of our approach. Furthermore, we apply our approach to the arrival-departure time estimation task for instant delivery service. Experiment results on the enterprise dataset from one of the largest instant delivery platforms in China show that GraFin outperforms baseline approaches with significantly lower time estimation error.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"189 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132655285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
JointCS: Joint Search for Deep Model Compression and Segmentation on Heterogeneous IoT Devices JointCS:异构物联网设备上深度模型压缩和分割的联合搜索
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00059
Xinyu Li, Bin Guo, Sicong Liu, Chen Qiu, Yunji Liang, Zhiwen Yu
Deep neural networks (DNNs) play an important role in a variety of intelligent applications (e.g. image classification and target recognition), yet at the cost of heavy computation burden, that makes DNNs difficult to deploy on resource-constrained IoT devices. To solve this problem, there are two categories of model computation adjustment methods: model compression and model segmentation. However, model compression mainly reduces resource consumption at the cost of accuracy while model segmentation reduces resource consumption according to the cost of communication latency. In this paper, we propose Joint Search for Model Compression and Segmentation (JointCS) that highlights the following aspects: 1) we integrate both model compression and model segmentation under an automatic and progressive framework, it simplifies model to fit the different IoT resource requirements. JointCS achieves a series slim models that outperform better both in accuracy and latency. 2) we train a network architecture-aware latency predictor to fast measure the latency of the slimed model on heterogeneous IoT devices. 3) we introduce a search algorithm to select the optimal state in progressively joint search. Finally, we evaluate the performance of our proposed method for image classification on CIFAR datasets comparing with the state-of-the-art approach, the inference time of the proposed method has inference speedup of 12.2 % −30.9 % under the same accuracy.
深度神经网络(dnn)在各种智能应用(如图像分类和目标识别)中发挥着重要作用,但其代价是沉重的计算负担,这使得dnn难以在资源受限的物联网设备上部署。为了解决这一问题,有两类模型计算调整方法:模型压缩和模型分割。然而,模型压缩主要是以准确性为代价来降低资源消耗,而模型分割主要是以通信延迟为代价来降低资源消耗。本文提出了联合搜索模型压缩和分割(JointCS),突出了以下几个方面:1)我们将模型压缩和模型分割集成在一个自动渐进的框架下,它简化了模型以适应不同的物联网资源需求。JointCS实现了一系列纤薄模型,在精度和延迟方面都表现得更好。2)我们训练了一个网络架构感知延迟预测器,以快速测量异构物联网设备上泥化模型的延迟。3)引入了一种渐进式联合搜索中选择最优状态的搜索算法。最后,我们对所提方法在CIFAR数据集上的图像分类性能进行了评价,在相同精度下,所提方法的推理速度提高了12.2% ~ 30.9%。
{"title":"JointCS: Joint Search for Deep Model Compression and Segmentation on Heterogeneous IoT Devices","authors":"Xinyu Li, Bin Guo, Sicong Liu, Chen Qiu, Yunji Liang, Zhiwen Yu","doi":"10.1109/ICPADS53394.2021.00059","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00059","url":null,"abstract":"Deep neural networks (DNNs) play an important role in a variety of intelligent applications (e.g. image classification and target recognition), yet at the cost of heavy computation burden, that makes DNNs difficult to deploy on resource-constrained IoT devices. To solve this problem, there are two categories of model computation adjustment methods: model compression and model segmentation. However, model compression mainly reduces resource consumption at the cost of accuracy while model segmentation reduces resource consumption according to the cost of communication latency. In this paper, we propose Joint Search for Model Compression and Segmentation (JointCS) that highlights the following aspects: 1) we integrate both model compression and model segmentation under an automatic and progressive framework, it simplifies model to fit the different IoT resource requirements. JointCS achieves a series slim models that outperform better both in accuracy and latency. 2) we train a network architecture-aware latency predictor to fast measure the latency of the slimed model on heterogeneous IoT devices. 3) we introduce a search algorithm to select the optimal state in progressively joint search. Finally, we evaluate the performance of our proposed method for image classification on CIFAR datasets comparing with the state-of-the-art approach, the inference time of the proposed method has inference speedup of 12.2 % −30.9 % under the same accuracy.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"2 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133080756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-Layer Traffic Signal Optimization: A Edge-assisted Pressure Balance Approach Based on Cooperative Game 两层交通信号优化:一种基于合作博弈的边缘辅助压力平衡方法
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00016
Zhenhua Han, Mingjun Xiao, Haisheng Tan, Guoju Gao
Traffic signal control is essential to efficient transportation networks since it can mitigate traffic congestion significantly. Trial-and-error approach in reinforcement learning will lead to traffic jams, even traffic accidents in the real scene, which is in violation of safety for traffic signal control. Besides, most signal control systems still rely on oversimplified information, which makes item challenging to adapt to dynamic traffic. In this paper, we focus on the edge coordinated optimization of large-scale traffic signal control, and propose a two-layeR edge-assisted pressUre balaNce (RUN) approach based on cooperative game. The external layer utilizes cooperative game to divide the traffic network into multiple coalitions. The internal layer uses pressure control and weighted queue to coordinate actions within each coalition and handle dynamic traffic situations over time. We derive a Pareto stable solution for the multi-intersection signal cooperative game with pressure control, and prove that it is non-superadditive. Moreover, we conduct extensive simulations to verify the significant performances of RUN based on both real data and synthetic data.
交通信号控制对有效的交通网络至关重要,因为它可以显著缓解交通拥堵。强化学习中的试错方法会导致现实场景中的交通堵塞,甚至交通事故,这是违反交通信号控制安全的。此外,大多数信号控制系统仍然依赖于过于简化的信息,这使得项目难以适应动态交通。针对大规模交通信号控制中的边缘协调优化问题,提出了一种基于合作博弈的两层边缘辅助压力平衡(RUN)方法。外部层利用合作博弈将交通网络划分为多个联盟。内层使用压力控制和加权队列来协调每个联盟内部的行动,并处理随时间变化的动态交通情况。导出了具有压力控制的多交叉口信号协同对策的Pareto稳定解,并证明了其非超加性。此外,我们还进行了大量的仿真,以验证基于真实数据和合成数据的RUN的显著性能。
{"title":"Two-Layer Traffic Signal Optimization: A Edge-assisted Pressure Balance Approach Based on Cooperative Game","authors":"Zhenhua Han, Mingjun Xiao, Haisheng Tan, Guoju Gao","doi":"10.1109/ICPADS53394.2021.00016","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00016","url":null,"abstract":"Traffic signal control is essential to efficient transportation networks since it can mitigate traffic congestion significantly. Trial-and-error approach in reinforcement learning will lead to traffic jams, even traffic accidents in the real scene, which is in violation of safety for traffic signal control. Besides, most signal control systems still rely on oversimplified information, which makes item challenging to adapt to dynamic traffic. In this paper, we focus on the edge coordinated optimization of large-scale traffic signal control, and propose a two-layeR edge-assisted pressUre balaNce (RUN) approach based on cooperative game. The external layer utilizes cooperative game to divide the traffic network into multiple coalitions. The internal layer uses pressure control and weighted queue to coordinate actions within each coalition and handle dynamic traffic situations over time. We derive a Pareto stable solution for the multi-intersection signal cooperative game with pressure control, and prove that it is non-superadditive. Moreover, we conduct extensive simulations to verify the significant performances of RUN based on both real data and synthetic data.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132229128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling User Interest Changes with Dynamic Differential Graphs for Item Recommendation 基于动态差分图的商品推荐用户兴趣变化建模
Pub Date : 2021-12-01 DOI: 10.1109/ICPADS53394.2021.00091
Chengyu Zhu, Yanmin Zhu, Xuansheng Lu
User interests are significant components in recommendation systems. Modeling user interests based on users' historical behaviors is a challenging problem, and many recommendation models have been proposed for user interests modeling, such as long-term and short-term interests modeling. In the real world, users' interests always change over time, however, existing models rarely consider users' interest changes. The purpose of this research is to apply graph neural networks to capture users' interest changes. This research first conducts data analysis on two public datasets, and results show that there are considerable amounts of users with a trend of interest changes. Based on this analysis, we construct user-category dynamic differential graphs, and we design a novel neural network based on dynamic differential graphs to learn users' interest changes representations from dynamic differential graphs. The learned representations are integrated with long-term and short-term interest representations to get users' final representations and make recommendations by getting scores with items. Different types of experiments are conducted to evaluate the performance of our proposed model, and experiment results show that the proposed model outperforms other baseline models.
用户兴趣是推荐系统的重要组成部分。基于用户历史行为的用户兴趣建模是一个具有挑战性的问题,针对用户兴趣建模已经提出了许多推荐模型,如长期和短期兴趣建模。在现实世界中,用户的兴趣总是随着时间的推移而变化,但是现有的模型很少考虑用户的兴趣变化。本研究的目的是应用图神经网络来捕捉用户的兴趣变化。本研究首先对两个公共数据集进行了数据分析,结果显示有相当数量的用户具有兴趣变化的趋势。在此基础上,构造了用户类别动态差分图,并设计了一种基于动态差分图的神经网络,从动态差分图中学习用户兴趣变化的表征。将学习到的表征与长期和短期兴趣表征相结合,得到用户的最终表征,并通过对项目的得分进行推荐。我们进行了不同类型的实验来评估我们提出的模型的性能,实验结果表明,我们提出的模型优于其他基线模型。
{"title":"Modeling User Interest Changes with Dynamic Differential Graphs for Item Recommendation","authors":"Chengyu Zhu, Yanmin Zhu, Xuansheng Lu","doi":"10.1109/ICPADS53394.2021.00091","DOIUrl":"https://doi.org/10.1109/ICPADS53394.2021.00091","url":null,"abstract":"User interests are significant components in recommendation systems. Modeling user interests based on users' historical behaviors is a challenging problem, and many recommendation models have been proposed for user interests modeling, such as long-term and short-term interests modeling. In the real world, users' interests always change over time, however, existing models rarely consider users' interest changes. The purpose of this research is to apply graph neural networks to capture users' interest changes. This research first conducts data analysis on two public datasets, and results show that there are considerable amounts of users with a trend of interest changes. Based on this analysis, we construct user-category dynamic differential graphs, and we design a novel neural network based on dynamic differential graphs to learn users' interest changes representations from dynamic differential graphs. The learned representations are integrated with long-term and short-term interest representations to get users' final representations and make recommendations by getting scores with items. Different types of experiments are conducted to evaluate the performance of our proposed model, and experiment results show that the proposed model outperforms other baseline models.","PeriodicalId":309508,"journal":{"name":"2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132233745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 IEEE 27th International Conference on Parallel and Distributed Systems (ICPADS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1