首页 > 最新文献

Proceedings of the 2015 Workshop on Mobile Big Data最新文献

英文 中文
Controlling the Spreads of Infectious Disease and Scare via Utilizing Location and Social Networking Information 利用地理位置和社交网络信息控制传染病和恐慌的传播
Pub Date : 2015-06-21 DOI: 10.1145/2757384.2757386
Wei Cheng, F. Chen, Xiuzhen Cheng
Americans were anxious over infectious disease such as Ebola. According to Voice of America's report, more than four in 10 were worried, even though there had only been a few confirmed. People are usually thinking they may have already had an indirect/direct contact with a suspected/confirmed patient because of visiting same places. The scare, therefore, spreads among general public as (i) they suspect the administrative agencies' infection controls are not sufficiently proper, and (ii) there is still no customized model to convince them that their infection probabilities are very low. To address these issues, we propose to utilize location and social networking information to jointly control the spread of infectious disease and the scare among people. This work-in-progress paper specifically introduces our model and research directions.
美国人对埃博拉等传染病感到焦虑。根据美国之音的报道,超过四成的人担心,尽管只有少数人得到证实。人们通常认为,由于去过相同的地方,他们可能已经与疑似/确诊患者间接/直接接触过。因此,恐慌在公众中蔓延,因为(i)他们怀疑行政机构的感染控制不够适当,(ii)仍然没有定制的模型来说服他们,他们的感染概率非常低。针对这些问题,我们建议利用地理位置和社交网络信息,共同控制传染病的传播和人们的恐慌。本文详细介绍了我们的模型和研究方向。
{"title":"Controlling the Spreads of Infectious Disease and Scare via Utilizing Location and Social Networking Information","authors":"Wei Cheng, F. Chen, Xiuzhen Cheng","doi":"10.1145/2757384.2757386","DOIUrl":"https://doi.org/10.1145/2757384.2757386","url":null,"abstract":"Americans were anxious over infectious disease such as Ebola. According to Voice of America's report, more than four in 10 were worried, even though there had only been a few confirmed. People are usually thinking they may have already had an indirect/direct contact with a suspected/confirmed patient because of visiting same places. The scare, therefore, spreads among general public as (i) they suspect the administrative agencies' infection controls are not sufficiently proper, and (ii) there is still no customized model to convince them that their infection probabilities are very low. To address these issues, we propose to utilize location and social networking information to jointly control the spread of infectious disease and the scare among people. This work-in-progress paper specifically introduces our model and research directions.","PeriodicalId":330286,"journal":{"name":"Proceedings of the 2015 Workshop on Mobile Big Data","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126112689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Mobile Cloud Computing Middleware for Low Latency Offloading of Big Data 一种面向大数据低时延卸载的移动云计算中间件
Pub Date : 2015-06-21 DOI: 10.1145/2757384.2757390
Bo Yin, Wenlong Shen, L. Cai, Y. Cheng
Recent years have witnessed an explosive growth of mobile applications. Thanks to improved network connectivity, it becomes a promising enabling solution to offload computation-intensive applications to the resource abundant public cloud to further augment the capacity of resource-constrained devices. As mobile applications usually have QoS requirements, it is critical to provide low latency services to the mobile users while maintain low leasing cost of cloud resources. However, the resources offered by cloud vendors are usually charged based on a time quanta while the offloading demand for heavy-lifting computation may occur infrequently on mobile devices. This mismatch would demotivate users to resort to public cloud for computation offloading. In this paper, we design a computation offloading middleware which bridges the aforementioned gap between cloud vendors and mobile clients, providing offloading service to multiple users with low cost and delay. The proposed middleware has two key components: Task Scheduler and Instance Manager. The Task Scheduler dispatches the received offloading tasks to execute in the instances reserved by the Instance Manager. Based on the arrival pattern of offloading tasks, the Instance Manager dynamically changes the number of instances to ensure certain service grade of mobile users. Our proposed mechanisms are validated through numerical results. It is shown that a lower average delay can be achieved through proposed scheduling heuristic, and the number of reserved instances well adapts to the offloading demands.
近年来,移动应用程序呈现爆炸式增长。由于改进了网络连接,它成为一种很有前途的解决方案,可以将计算密集型应用程序卸载到资源丰富的公共云上,从而进一步增强资源受限设备的容量。由于移动应用程序通常具有QoS要求,因此在为移动用户提供低延迟服务的同时保持较低的云资源租赁成本至关重要。然而,云供应商提供的资源通常是基于时间量收费的,而卸载繁重计算的需求可能很少出现在移动设备上。这种不匹配会使用户失去使用公共云进行计算卸载的动力。本文设计了一种计算卸载中间件,弥补了云计算厂商和移动客户端的差距,为多用户提供低成本、低时延的计算卸载服务。提议的中间件有两个关键组件:任务调度程序和实例管理器。任务调度器将接收到的卸载任务分派到实例管理器保留的实例中执行。实例管理器根据卸载任务的到达模式,动态改变实例数量,保证移动用户的服务等级。通过数值结果验证了我们提出的机制。结果表明,该算法可以获得较低的平均延迟,并且保留实例的数量可以很好地适应卸载需求。
{"title":"A Mobile Cloud Computing Middleware for Low Latency Offloading of Big Data","authors":"Bo Yin, Wenlong Shen, L. Cai, Y. Cheng","doi":"10.1145/2757384.2757390","DOIUrl":"https://doi.org/10.1145/2757384.2757390","url":null,"abstract":"Recent years have witnessed an explosive growth of mobile applications. Thanks to improved network connectivity, it becomes a promising enabling solution to offload computation-intensive applications to the resource abundant public cloud to further augment the capacity of resource-constrained devices. As mobile applications usually have QoS requirements, it is critical to provide low latency services to the mobile users while maintain low leasing cost of cloud resources. However, the resources offered by cloud vendors are usually charged based on a time quanta while the offloading demand for heavy-lifting computation may occur infrequently on mobile devices. This mismatch would demotivate users to resort to public cloud for computation offloading. In this paper, we design a computation offloading middleware which bridges the aforementioned gap between cloud vendors and mobile clients, providing offloading service to multiple users with low cost and delay. The proposed middleware has two key components: Task Scheduler and Instance Manager. The Task Scheduler dispatches the received offloading tasks to execute in the instances reserved by the Instance Manager. Based on the arrival pattern of offloading tasks, the Instance Manager dynamically changes the number of instances to ensure certain service grade of mobile users. Our proposed mechanisms are validated through numerical results. It is shown that a lower average delay can be achieved through proposed scheduling heuristic, and the number of reserved instances well adapts to the offloading demands.","PeriodicalId":330286,"journal":{"name":"Proceedings of the 2015 Workshop on Mobile Big Data","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124104971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Survey of Fog Computing: Concepts, Applications and Issues 雾计算综述:概念、应用和问题
Pub Date : 2015-06-21 DOI: 10.1145/2757384.2757397
Shanhe Yi, Cheng Li, Qun A. Li
Despite the increasing usage of cloud computing, there are still issues unsolved due to inherent problems of cloud computing such as unreliable latency, lack of mobility support and location-awareness. Fog computing can address those problems by providing elastic resources and services to end users at the edge of network, while cloud computing are more about providing resources distributed in the core network. This survey discusses the definition of fog computing and similar concepts, introduces representative application scenarios, and identifies various aspects of issues we may encounter when designing and implementing fog computing systems. It also highlights some opportunities and challenges, as direction of potential future work, in related techniques that need to be considered in the context of fog computing.
尽管云计算的使用越来越多,但由于云计算固有的问题,例如不可靠的延迟、缺乏移动性支持和位置感知,仍然存在未解决的问题。雾计算可以通过在网络边缘为最终用户提供弹性资源和服务来解决这些问题,而云计算更多的是提供分布在核心网络中的资源。本调查讨论了雾计算和类似概念的定义,介绍了代表性的应用场景,并确定了我们在设计和实现雾计算系统时可能遇到的问题的各个方面。它还强调了在雾计算背景下需要考虑的相关技术中的一些机遇和挑战,作为潜在的未来工作方向。
{"title":"A Survey of Fog Computing: Concepts, Applications and Issues","authors":"Shanhe Yi, Cheng Li, Qun A. Li","doi":"10.1145/2757384.2757397","DOIUrl":"https://doi.org/10.1145/2757384.2757397","url":null,"abstract":"Despite the increasing usage of cloud computing, there are still issues unsolved due to inherent problems of cloud computing such as unreliable latency, lack of mobility support and location-awareness. Fog computing can address those problems by providing elastic resources and services to end users at the edge of network, while cloud computing are more about providing resources distributed in the core network. This survey discusses the definition of fog computing and similar concepts, introduces representative application scenarios, and identifies various aspects of issues we may encounter when designing and implementing fog computing systems. It also highlights some opportunities and challenges, as direction of potential future work, in related techniques that need to be considered in the context of fog computing.","PeriodicalId":330286,"journal":{"name":"Proceedings of the 2015 Workshop on Mobile Big Data","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129358807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1222
Session details: Social Networks, Sensor Networks, and Smartphone Systems 会议细节:社交网络,传感器网络和智能手机系统
Pub Date : 2015-06-21 DOI: 10.1145/3260492
John Wang
{"title":"Session details: Social Networks, Sensor Networks, and Smartphone Systems","authors":"John Wang","doi":"10.1145/3260492","DOIUrl":"https://doi.org/10.1145/3260492","url":null,"abstract":"","PeriodicalId":330286,"journal":{"name":"Proceedings of the 2015 Workshop on Mobile Big Data","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129212971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on 3D Localization Algorithm of Wireless Sensor Networks in Underground Coal Mine 煤矿井下无线传感器网络三维定位算法研究
Pub Date : 2015-06-21 DOI: 10.1145/2757384.2757393
Feng Wang, Cong Wang, Z. Wang, Xueying Zhang, Chao Shang
Most of the existing algorithms for Wireless Sensor Networks (WSN) localization in underground coal mine are exposed such problems as unreasonable node model, low accuracy and unsteady. This paper presents a new method of nodes layout in coal mine roadway, and builds positioning model underground. Compared with traditional model, this model can reduce the number of sensor nodes when meets positioning requirement. Then the non-ranging positioning algorithm of TDOA/AOA hybrid algorithm, currently used as three-dimensional positioning algorithm, is introduced to the model. Simulation results show that: this algorithm has better positioning performance than the traditional algorithms, fitting into underground coal mine.
现有的煤矿井下无线传感器网络(WSN)定位算法大多存在节点模型不合理、定位精度低、定位不稳定等问题。提出了一种新的煤矿巷道节点布置方法,并建立了井下节点定位模型。与传统模型相比,该模型可以在满足定位要求的情况下减少传感器节点数量。然后将目前常用的三维定位算法TDOA/AOA混合算法中的非测距定位算法引入到模型中。仿真结果表明:该算法比传统算法具有更好的定位性能,适用于煤矿井下。
{"title":"Research on 3D Localization Algorithm of Wireless Sensor Networks in Underground Coal Mine","authors":"Feng Wang, Cong Wang, Z. Wang, Xueying Zhang, Chao Shang","doi":"10.1145/2757384.2757393","DOIUrl":"https://doi.org/10.1145/2757384.2757393","url":null,"abstract":"Most of the existing algorithms for Wireless Sensor Networks (WSN) localization in underground coal mine are exposed such problems as unreasonable node model, low accuracy and unsteady. This paper presents a new method of nodes layout in coal mine roadway, and builds positioning model underground. Compared with traditional model, this model can reduce the number of sensor nodes when meets positioning requirement. Then the non-ranging positioning algorithm of TDOA/AOA hybrid algorithm, currently used as three-dimensional positioning algorithm, is introduced to the model. Simulation results show that: this algorithm has better positioning performance than the traditional algorithms, fitting into underground coal mine.","PeriodicalId":330286,"journal":{"name":"Proceedings of the 2015 Workshop on Mobile Big Data","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127443345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Measurement-based Study on Application Popularity in Android and iOS App Stores 基于测量的Android和iOS应用商店应用受欢迎程度研究
Pub Date : 2015-06-21 DOI: 10.1145/2757384.2757392
Wei Liu, Ge Zhang, Jun Chen, Y. Zou, Wenchao Ding
Mobile application stores (appstores) are emerging digital distribution platforms with explosive growth. Although there have been some observations on the mobile application (app) popularity in Android appstores, there is no report on the app popularity in iOS appstores. What's more, the details about user downloads and app popularity, such as the composition of downloads traffic and the migration of user interests, are untouched yet. In this paper, we unreel these issues based on five-month measurements of four third-party appstores (two for Android and two for iOS respectively). Our main results include: 1) The app popularity distributions of third-party Android appstores are different from those of iOS third-party appstores. There is an exponential cut-off observed besides the Zipf-like distribution in the app popularity distribution of Android appstores. 2) In both Android and iOS families of appstores, the major part of downloads traffic is contributed by the large-size apps, counting 80% or more in the volume of total downloads traffic. 3) There is less rank variance of the most popular apps in the iOS appstores than those in the Android appstores. About 52% of the top 100 iOS apps observed in one month are still in the rank of top 100 in the following four months.
手机应用商店(appstore)是新兴的数字发行平台,发展迅猛。虽然有一些关于Android应用商店中手机应用受欢迎程度的观察,但却没有关于iOS应用商店中应用受欢迎程度的报告。更重要的是,用户下载量和应用受欢迎程度的细节,如下载流量的构成和用户兴趣的迁移,还没有触及。在本文中,我们将基于对4个第三方应用商店(分别针对Android和iOS)的5个月测量来分析这些问题。我们的主要研究结果包括:1)Android第三方应用商店的应用人气分布与iOS第三方应用商店存在差异。在Android应用商店的应用人气分布中,除了zipf分布外,还存在指数截断现象。2)在Android和iOS应用商店中,大部分下载量都是由大型应用贡献的,占总下载量的80%以上。3) iOS应用商店中最受欢迎应用的排名差异小于Android应用商店。在一个月内排名前100的iOS应用中,约有52%的应用在接下来的4个月内仍然保持在前100名的位置。
{"title":"A Measurement-based Study on Application Popularity in Android and iOS App Stores","authors":"Wei Liu, Ge Zhang, Jun Chen, Y. Zou, Wenchao Ding","doi":"10.1145/2757384.2757392","DOIUrl":"https://doi.org/10.1145/2757384.2757392","url":null,"abstract":"Mobile application stores (appstores) are emerging digital distribution platforms with explosive growth. Although there have been some observations on the mobile application (app) popularity in Android appstores, there is no report on the app popularity in iOS appstores. What's more, the details about user downloads and app popularity, such as the composition of downloads traffic and the migration of user interests, are untouched yet. In this paper, we unreel these issues based on five-month measurements of four third-party appstores (two for Android and two for iOS respectively). Our main results include: 1) The app popularity distributions of third-party Android appstores are different from those of iOS third-party appstores. There is an exponential cut-off observed besides the Zipf-like distribution in the app popularity distribution of Android appstores. 2) In both Android and iOS families of appstores, the major part of downloads traffic is contributed by the large-size apps, counting 80% or more in the volume of total downloads traffic. 3) There is less rank variance of the most popular apps in the iOS appstores than those in the Android appstores. About 52% of the top 100 iOS apps observed in one month are still in the rank of top 100 in the following four months.","PeriodicalId":330286,"journal":{"name":"Proceedings of the 2015 Workshop on Mobile Big Data","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130325721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Application of multiple orthogonal window spectrum estimation in speaker recognition 多重正交窗谱估计在说话人识别中的应用
Pub Date : 2015-06-21 DOI: 10.1145/2757384.2757394
Bai Jing, Zhang Yiran, Yin Cong
For speaker recognition systems, short-time spectrum of speech signal is obtained by using windowed discrete Fourier transform (DFT) in feature extraction. Although windowed DFT can reduces spectral leakage, variance of the spectrum estimation remains high, which reduces the stability of spectrum estimation. Multiple orthogonal window spectrum estimation(referred Multitapering) method, which can not only reduces spectral leakage but also reduces the variance of the spectrum estimation, has more stable performance of spectrum estimate, is utilized in this paper. After how number of windows affects performance of spectrum estimation is studied, the performance of speaker recognition system is also tested in noisy environment. The results show that multiple orthogonal spectrum estimation method has more stable performance and better noise robustness than Hamming windowed DFT.
在说话人识别系统中,利用带窗离散傅立叶变换(DFT)进行特征提取,得到语音信号的短时频谱。加窗DFT虽然可以减少谱漏,但谱估计方差仍然很大,降低了谱估计的稳定性。本文采用了多重正交窗谱估计方法,该方法不仅可以减少频谱泄漏,还可以减小频谱估计的方差,具有更稳定的频谱估计性能。在研究了窗数对频谱估计性能的影响之后,还测试了在噪声环境下说话人识别系统的性能。结果表明,多重正交谱估计方法比Hamming加窗DFT具有更稳定的性能和更好的噪声鲁棒性。
{"title":"Application of multiple orthogonal window spectrum estimation in speaker recognition","authors":"Bai Jing, Zhang Yiran, Yin Cong","doi":"10.1145/2757384.2757394","DOIUrl":"https://doi.org/10.1145/2757384.2757394","url":null,"abstract":"For speaker recognition systems, short-time spectrum of speech signal is obtained by using windowed discrete Fourier transform (DFT) in feature extraction. Although windowed DFT can reduces spectral leakage, variance of the spectrum estimation remains high, which reduces the stability of spectrum estimation. Multiple orthogonal window spectrum estimation(referred Multitapering) method, which can not only reduces spectral leakage but also reduces the variance of the spectrum estimation, has more stable performance of spectrum estimate, is utilized in this paper. After how number of windows affects performance of spectrum estimation is studied, the performance of speaker recognition system is also tested in noisy environment. The results show that multiple orthogonal spectrum estimation method has more stable performance and better noise robustness than Hamming windowed DFT.","PeriodicalId":330286,"journal":{"name":"Proceedings of the 2015 Workshop on Mobile Big Data","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125959116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SH-CRAN: Hierarchical Framework to Support Mobile Big Data Computing in a Secure Manner SH-CRAN:安全支持移动大数据计算的分层框架
Pub Date : 2015-06-21 DOI: 10.1145/2757384.2757388
Qiang Liu, E. Ngai, Xiping Hu, Zhengguo Sheng, Victor C. M. Leung, Jianping Yin
The heterogeneous cloud radio access network (H-CRAN) has been emerging as a cost-effective solution supporting huge volumes of mobile traffic in the big data era. This paper investigates potential security challenges on H-CRAN and analyzes their likelihoods and difficulty levels. Typically, the security threats in H-CRAN can be categorized into three groups, i.e., security threats towards remote radio heads (RRHs), those towards the radio cloud infrastructure and towards backhaul networks. To overcome challenges made by the security threats, we propose a hierarchical security framework called Secure H-CRAN (SH-CRAN) to protect the H-CRAN system against the potential threats. Specifically, the architecture of SH-CRAN contains three logically independent secure domains (SDs), which are the SDs of radio cloud infrastructure, RRHs and backhauls. The notable merits of SH-CRAN include two aspects: (i) the proposed framework is able to provide security assurance for the evolving H-CRAN system, and (ii) the impacts of any failure are limited in one specific component of H-CRAN. The proposed SH-CRAN can be regarded as the basis of the future security mechanisms of mobile bag data computing.
在大数据时代,异构云无线接入网(H-CRAN)作为一种支持海量移动通信的高性价比解决方案已经崭露头角。本文研究了H-CRAN的潜在安全挑战,并分析了其可能性和难度。通常,H-CRAN中的安全威胁可分为三类,即针对远程无线电头(RRHs)的安全威胁、针对无线电云基础设施的安全威胁和针对回程网络的安全威胁。为了克服安全威胁带来的挑战,我们提出了一种称为安全H-CRAN (SH-CRAN)的分层安全框架,以保护H-CRAN系统免受潜在威胁。具体来说,SH-CRAN架构包含三个逻辑上独立的安全域,分别是无线电云基础设施、RRHs和回程的安全域。SH-CRAN的显著优点包括两个方面:(i)所提出的框架能够为不断发展的H-CRAN系统提供安全保证;(ii)任何故障的影响仅限于H-CRAN的一个特定组件。本文提出的SH-CRAN可以作为未来移动包数据计算安全机制的基础。
{"title":"SH-CRAN: Hierarchical Framework to Support Mobile Big Data Computing in a Secure Manner","authors":"Qiang Liu, E. Ngai, Xiping Hu, Zhengguo Sheng, Victor C. M. Leung, Jianping Yin","doi":"10.1145/2757384.2757388","DOIUrl":"https://doi.org/10.1145/2757384.2757388","url":null,"abstract":"The heterogeneous cloud radio access network (H-CRAN) has been emerging as a cost-effective solution supporting huge volumes of mobile traffic in the big data era. This paper investigates potential security challenges on H-CRAN and analyzes their likelihoods and difficulty levels. Typically, the security threats in H-CRAN can be categorized into three groups, i.e., security threats towards remote radio heads (RRHs), those towards the radio cloud infrastructure and towards backhaul networks. To overcome challenges made by the security threats, we propose a hierarchical security framework called Secure H-CRAN (SH-CRAN) to protect the H-CRAN system against the potential threats. Specifically, the architecture of SH-CRAN contains three logically independent secure domains (SDs), which are the SDs of radio cloud infrastructure, RRHs and backhauls. The notable merits of SH-CRAN include two aspects: (i) the proposed framework is able to provide security assurance for the evolving H-CRAN system, and (ii) the impacts of any failure are limited in one specific component of H-CRAN. The proposed SH-CRAN can be regarded as the basis of the future security mechanisms of mobile bag data computing.","PeriodicalId":330286,"journal":{"name":"Proceedings of the 2015 Workshop on Mobile Big Data","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131006822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Crime Risk Evaluation in Individual's Local Community 个人所在社区的犯罪风险评估
Pub Date : 2015-06-21 DOI: 10.1145/2757384.2757387
Yunkai Liu, Anirudh Marthur, Christopher Magno
Our everyday lives involve navigating in the public space. If the public space is not safe it will reduce our freedom of movement and ability to participate in school, work and public life. Awareness on the level of security and danger in our public space can help us prepare and secure the area around us. But the lack of boundaries of public space makes it difficult to assess the level of safety and designing of security. The theory suggest (Creating Defensible Space by Oscar Newman, 1976) that the more personal and individualize the space we have, the more control and influence we have of defending it. Based on this theory, we are proposing a new sociological term called "Individual's Local Community (ILC)", which addresses on the unique environment of each individual navigating the public space. ILC is designed as the smallest measurable unit crossover local communities. ILC will personalize each individual's navigation to the public space. To measure the level of danger and safety in ILC we developed an android-based mobile application that estimate the risk of being victimize of crime in specified space and time-period. To extend the concept, one resident's risk to become victim or perpetrators of crime incidents is evaluated by estimated values based on "stable" ILC and historical crime records. The evaluation system is developed as a mobile app, named as "Are You Safe". The application contains local crime maps and a GPS tracking component. Mathematical formulas are developed to evaluate the potential risk. Furthermore, a re-routing function is provided for "safer" ILC. The prototype of "Are You Safe" app is implemented and tested in the city of northwestern Pennsylvania, United States. We believe the ILC concept will enrich the study of Personal Big Data and enable us to study social science in a different level. Also the app will help residents to have a better understanding on the safety and security of their environment.
我们的日常生活涉及在公共空间中导航。如果公共空间不安全,我们的行动自由和参与学校、工作和公共生活的能力就会减少。对公共空间的安全和危险程度的认识可以帮助我们做好准备,保护我们周围的区域。但是,公共空间边界的缺乏使得安全水平的评估和安全设计变得困难。该理论认为(创造可防御的空间,Oscar Newman, 1976),我们拥有的空间越个性化,我们就越能控制和影响它。基于这一理论,我们提出了一个新的社会学术语“个人的本地社区”(Individual’s Local Community, ILC),它涉及到每个人在公共空间中导航的独特环境。ILC被设计为跨区域社区的最小可测量单位。ILC将个性化每个人对公共空间的导航。为了衡量ILC的危险和安全程度,我们开发了一个基于android的移动应用程序,可以估计在特定空间和时间段内成为犯罪受害者的风险。为了扩展这一概念,一个居民成为犯罪事件受害者或肇事者的风险是通过基于“稳定”的ILC和历史犯罪记录的估计值来评估的。该评估系统是作为一款名为“你安全吗”的移动应用程序开发的。该应用程序包含本地犯罪地图和GPS跟踪组件。开发了数学公式来评估潜在的风险。此外,为“更安全”的ILC提供了重路由功能。“你安全吗”应用程序的原型在美国宾夕法尼亚州西北部的城市实施和测试。我们相信ILC的概念将丰富个人大数据的研究,使我们能够在不同的层面上研究社会科学。此外,该应用程序将帮助居民更好地了解他们环境的安全和保障。
{"title":"Crime Risk Evaluation in Individual's Local Community","authors":"Yunkai Liu, Anirudh Marthur, Christopher Magno","doi":"10.1145/2757384.2757387","DOIUrl":"https://doi.org/10.1145/2757384.2757387","url":null,"abstract":"Our everyday lives involve navigating in the public space. If the public space is not safe it will reduce our freedom of movement and ability to participate in school, work and public life. Awareness on the level of security and danger in our public space can help us prepare and secure the area around us. But the lack of boundaries of public space makes it difficult to assess the level of safety and designing of security. The theory suggest (Creating Defensible Space by Oscar Newman, 1976) that the more personal and individualize the space we have, the more control and influence we have of defending it. Based on this theory, we are proposing a new sociological term called \"Individual's Local Community (ILC)\", which addresses on the unique environment of each individual navigating the public space. ILC is designed as the smallest measurable unit crossover local communities. ILC will personalize each individual's navigation to the public space. To measure the level of danger and safety in ILC we developed an android-based mobile application that estimate the risk of being victimize of crime in specified space and time-period. To extend the concept, one resident's risk to become victim or perpetrators of crime incidents is evaluated by estimated values based on \"stable\" ILC and historical crime records. The evaluation system is developed as a mobile app, named as \"Are You Safe\". The application contains local crime maps and a GPS tracking component. Mathematical formulas are developed to evaluate the potential risk. Furthermore, a re-routing function is provided for \"safer\" ILC. The prototype of \"Are You Safe\" app is implemented and tested in the city of northwestern Pennsylvania, United States. We believe the ILC concept will enrich the study of Personal Big Data and enable us to study social science in a different level. Also the app will help residents to have a better understanding on the safety and security of their environment.","PeriodicalId":330286,"journal":{"name":"Proceedings of the 2015 Workshop on Mobile Big Data","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123604588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Data Preservation in Data-Intensive Sensor Networks With Spatial Correlation 具有空间相关性的数据密集型传感器网络中的数据保存
Pub Date : 2015-06-21 DOI: 10.1145/2757384.2757389
Nathaniel Crary, Bin Tang, Setu Taase
Many data-intensive sensor network applications are potential big-data enabler: they are deployed in challenging environments to collect large volume of data for a long period of time. However, in the challenging environments, it is not possible to deploy base stations in or near the sensor field to collect sensory data. Therefore, the overflow data of the source nodes is first offloaded to other nodes inside the network, and is then collected when uploading opportunities become available. We call this process data preservation in sensor networks. In this paper, we take into account spatial correlation that exist in sensory data, and study how to minimize the total energy consumption in data preservation. We call this problem data preservation problem with data correlation. We show that with proper transformation, this problem is equivalent to minimum cost flow problem, which can be solved optimally and efficiently. Via simulations, we show that it outperforms an efficient greedy algorithm.
许多数据密集型传感器网络应用都是潜在的大数据推动者:它们被部署在具有挑战性的环境中,以长时间收集大量数据。然而,在具有挑战性的环境中,不可能在传感器场内或附近部署基站来收集传感器数据。因此,源节点的溢出数据首先被卸载到网络内的其他节点,待有上传机会时再收集。我们把这个过程称为传感器网络中的数据保存。本文考虑了感知数据中存在的空间相关性,研究了在数据保存过程中如何使总能耗最小化。我们称这个问题为数据关联的数据保存问题。结果表明,通过适当的变换,该问题等价于最小成本流问题,可以最优有效地求解。通过仿真,我们证明了它优于一种高效的贪婪算法。
{"title":"Data Preservation in Data-Intensive Sensor Networks With Spatial Correlation","authors":"Nathaniel Crary, Bin Tang, Setu Taase","doi":"10.1145/2757384.2757389","DOIUrl":"https://doi.org/10.1145/2757384.2757389","url":null,"abstract":"Many data-intensive sensor network applications are potential big-data enabler: they are deployed in challenging environments to collect large volume of data for a long period of time. However, in the challenging environments, it is not possible to deploy base stations in or near the sensor field to collect sensory data. Therefore, the overflow data of the source nodes is first offloaded to other nodes inside the network, and is then collected when uploading opportunities become available. We call this process data preservation in sensor networks. In this paper, we take into account spatial correlation that exist in sensory data, and study how to minimize the total energy consumption in data preservation. We call this problem data preservation problem with data correlation. We show that with proper transformation, this problem is equivalent to minimum cost flow problem, which can be solved optimally and efficiently. Via simulations, we show that it outperforms an efficient greedy algorithm.","PeriodicalId":330286,"journal":{"name":"Proceedings of the 2015 Workshop on Mobile Big Data","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131065586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Proceedings of the 2015 Workshop on Mobile Big Data
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1