首页 > 最新文献

2015 IEEE Conference on Computer Communications (INFOCOM)最新文献

英文 中文
Independent counter estimation buckets 独立计数器估计桶
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218646
Gil Einziger, B. Fellman, Yaron Kassner
Measurement capabilities are essential for a variety of network applications, such as load balancing, routing, fairness and intrusion detection. These capabilities require large counter arrays in order to monitor the traffic of all network flows. While commodity SRAM memories are capable of operating at line speed, they are too small to accommodate large counter arrays. Previous works suggested estimators, which trade precision for reduced space. However, in order to accurately estimate the largest counter, these methods compromise the accuracy of the rest of the counters. In this work we present a closed form representation of the optimal estimation function. We then introduce Independent Counter Estimation Buckets (ICE-Buckets), a novel algorithm that improves estimation accuracy for all counters. This is achieved by separating the flows to buckets and configuring the optimal estimation function according to each bucket's counter scale. We prove an improved upper bound on the relative error and demonstrate an accuracy improvement of up to 57 times on real Internet packet traces.
测量能力对于各种网络应用是必不可少的,例如负载平衡、路由、公平性和入侵检测。这些功能需要大型计数器阵列,以便监视所有网络流的流量。虽然商品SRAM存储器能够以线速度运行,但它们太小,无法容纳大型计数器阵列。以前的工作建议估计器,它以精度换取减少的空间。然而,为了准确地估计最大的计数器,这些方法损害了其余计数器的准确性。在这项工作中,我们提出了最优估计函数的封闭形式表示。然后,我们引入了独立计数器估计桶(ICE-Buckets),这是一种提高所有计数器估计精度的新算法。这是通过将流分离到桶并根据每个桶的计数器规模配置最优估计函数来实现的。我们证明了一个改进的相对误差上界,并证明了在真实的互联网数据包轨迹上精度提高了57倍。
{"title":"Independent counter estimation buckets","authors":"Gil Einziger, B. Fellman, Yaron Kassner","doi":"10.1109/INFOCOM.2015.7218646","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218646","url":null,"abstract":"Measurement capabilities are essential for a variety of network applications, such as load balancing, routing, fairness and intrusion detection. These capabilities require large counter arrays in order to monitor the traffic of all network flows. While commodity SRAM memories are capable of operating at line speed, they are too small to accommodate large counter arrays. Previous works suggested estimators, which trade precision for reduced space. However, in order to accurately estimate the largest counter, these methods compromise the accuracy of the rest of the counters. In this work we present a closed form representation of the optimal estimation function. We then introduce Independent Counter Estimation Buckets (ICE-Buckets), a novel algorithm that improves estimation accuracy for all counters. This is achieved by separating the flows to buckets and configuring the optimal estimation function according to each bucket's counter scale. We prove an improved upper bound on the relative error and demonstrate an accuracy improvement of up to 57 times on real Internet packet traces.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115773580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
JITScope: Protecting web users from control-flow hijacking attacks JITScope:保护web用户免受控制流劫持攻击
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218424
Chao Zhang, Chengyu Song, Byoungyoung Lee, Kangjie Lu, William R. Harris, Taesoo Kim, Wenke Lee
Web browsers are one of the most important enduser applications to browse, retrieve, and present Internet resources. Malicious or compromised resources may endanger Web users by hijacking web browsers to execute arbitrary malicious code in the victims' systems. Unfortunately, the widely-adopted Just-In-Time compilation (JIT) optimization technique, which compiles source code to native code at runtime, significantly increases this risk. By exploiting JIT compiled code, attackers can bypass all currently deployed defenses. In this paper, we systematically investigate threats against JIT compiled code, and the challenges of protecting JIT compiled code. We propose a general defense solution, JITScope, to enforce Control-Flow Integrity (CFI) on both statically compiled and JIT compiled code. Our solution furthermore enforces the W⊕X policy on JIT compiled code, preventing the JIT compiled code from being overwritten by attackers. We show that our prototype implementation of JITScope on the popular Firefox web browser introduces a reasonably low performance overhead, while defeating existing real-world control flow hijacking attacks.
Web浏览器是用于浏览、检索和呈现Internet资源的最重要的终端用户应用程序之一。恶意或被破坏的资源可能通过劫持Web浏览器在受害者的系统中执行任意恶意代码来危及Web用户。不幸的是,广泛采用的即时编译(JIT)优化技术(在运行时将源代码编译为本机代码)显著地增加了这种风险。通过利用JIT编译的代码,攻击者可以绕过所有当前部署的防御。在本文中,我们系统地研究了针对JIT编译代码的威胁,以及保护JIT编译代码的挑战。我们提出了一个通用的防御解决方案,JITScope,在静态编译和JIT编译的代码上强制控制流完整性(CFI)。我们的解决方案进一步在JIT编译的代码上执行W⊕X策略,防止JIT编译的代码被攻击者覆盖。我们展示了JITScope的原型实现在流行的Firefox web浏览器上引入了相当低的性能开销,同时击败了现有的实际控制流劫持攻击。
{"title":"JITScope: Protecting web users from control-flow hijacking attacks","authors":"Chao Zhang, Chengyu Song, Byoungyoung Lee, Kangjie Lu, William R. Harris, Taesoo Kim, Wenke Lee","doi":"10.1109/INFOCOM.2015.7218424","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218424","url":null,"abstract":"Web browsers are one of the most important enduser applications to browse, retrieve, and present Internet resources. Malicious or compromised resources may endanger Web users by hijacking web browsers to execute arbitrary malicious code in the victims' systems. Unfortunately, the widely-adopted Just-In-Time compilation (JIT) optimization technique, which compiles source code to native code at runtime, significantly increases this risk. By exploiting JIT compiled code, attackers can bypass all currently deployed defenses. In this paper, we systematically investigate threats against JIT compiled code, and the challenges of protecting JIT compiled code. We propose a general defense solution, JITScope, to enforce Control-Flow Integrity (CFI) on both statically compiled and JIT compiled code. Our solution furthermore enforces the W⊕X policy on JIT compiled code, preventing the JIT compiled code from being overwritten by attackers. We show that our prototype implementation of JITScope on the popular Firefox web browser introduces a reasonably low performance overhead, while defeating existing real-world control flow hijacking attacks.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"175 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120956838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
StoreApp: A shared storage appliance for efficient and scalable virtualized Hadoop clusters StoreApp:用于高效和可扩展的虚拟化Hadoop集群的共享存储设备
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218427
Yanfei Guo, J. Rao, Dazhao Cheng, Changjun Jiang, Chengzhong Xu, Xiaobo Zhou
Virtualizing Hadoop clusters provides many benefits, including rapid deployment, on-demand elasticity and secure multi-tenancy. However, a simple migration of Hadoop to a virtualized environment does not fully exploit these benefits. The dual role of a Hadoop worker, acting as both a compute node and a data node, makes it difficult to achieve efficient IO processing, maintain data locality, and exploit resource elasticity in the cloud. We find that decoupling per-node storage from its computation opens up opportunities for IO acceleration, locality improvement, and on-the-fly cluster resizing. To fully exploit these opportunities, we propose StoreApp, a shared storage appliance for virtual Hadoop worker nodes co-located on the same physical host. To completely separate storage from computation and prioritize IO processing, StoreApp pro-actively pushes intermediate data generated by map tasks to the storage node. StoreApp also implements late-binding task creation to take the advantage of prefetched data due to mis-aligned records. Experimental results show that StoreApp achieves up to 61% performance improvement compared to stock Hadoop and resizes the cluster to the (near) optimal degree of parallelism.
虚拟化Hadoop集群提供了许多好处,包括快速部署、按需弹性和安全的多租户。然而,简单地将Hadoop迁移到虚拟化环境并不能充分利用这些优势。Hadoop worker同时充当计算节点和数据节点的双重角色,使得在云中难以实现高效的IO处理、维护数据局部性和利用资源弹性。我们发现,将每个节点的存储与其计算解耦为IO加速、局部性改进和动态集群调整大小提供了机会。为了充分利用这些机会,我们提出了StoreApp,这是一个共享存储设备,用于位于同一物理主机上的虚拟Hadoop工作节点。为了将存储与计算完全分离,并优先处理IO处理,StoreApp主动将映射任务生成的中间数据推送到存储节点。StoreApp还实现了后绑定任务创建,以利用由于记录不一致而预取的数据。实验结果表明,与stock Hadoop相比,StoreApp实现了高达61%的性能提升,并将集群大小调整到(接近)最优的并行度。
{"title":"StoreApp: A shared storage appliance for efficient and scalable virtualized Hadoop clusters","authors":"Yanfei Guo, J. Rao, Dazhao Cheng, Changjun Jiang, Chengzhong Xu, Xiaobo Zhou","doi":"10.1109/INFOCOM.2015.7218427","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218427","url":null,"abstract":"Virtualizing Hadoop clusters provides many benefits, including rapid deployment, on-demand elasticity and secure multi-tenancy. However, a simple migration of Hadoop to a virtualized environment does not fully exploit these benefits. The dual role of a Hadoop worker, acting as both a compute node and a data node, makes it difficult to achieve efficient IO processing, maintain data locality, and exploit resource elasticity in the cloud. We find that decoupling per-node storage from its computation opens up opportunities for IO acceleration, locality improvement, and on-the-fly cluster resizing. To fully exploit these opportunities, we propose StoreApp, a shared storage appliance for virtual Hadoop worker nodes co-located on the same physical host. To completely separate storage from computation and prioritize IO processing, StoreApp pro-actively pushes intermediate data generated by map tasks to the storage node. StoreApp also implements late-binding task creation to take the advantage of prefetched data due to mis-aligned records. Experimental results show that StoreApp achieves up to 61% performance improvement compared to stock Hadoop and resizes the cluster to the (near) optimal degree of parallelism.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124859213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Blast: Accelerating high-performance data analytics applications by optical multicast Blast:通过光组播加速高性能数据分析应用
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218576
Yiting Xia, Xiaoye Steven Sun
Multicast data dissemination is the performance bottleneck for high-performance data analytics applications in cluster computing, because terabytes of data need to be distributed routinely from a single data source to hundreds of computing servers. The state-of-the-art solutions for delivering these massive data sets all rely on application-layer overlays, which suffer from inherent performance limitations. This paper presents Blast, a system for accelerating data analytics applications by optical multicast. Blast leverages passive optical power splitting to duplicate data at line rate on a physical-layer broadcast medium separate from the packet-switched network core. We implement Blast on a small-scale hardware testbed. Multicast transmission can start 33ms after an application issues the request, resulting in a very small control overhead. We evaluate Blast's performance at the scale of thousands of servers through simulation. Using only a 10Gbps optical uplink per rack, Blast achieves upto 102× better performance than the state-of-the-art solutions even when they are used over a non-blocking core network with a 400Gbps uplink per rack.
多播数据传播是集群计算中高性能数据分析应用程序的性能瓶颈,因为需要将tb级的数据从单个数据源例行地分发到数百个计算服务器。用于交付这些海量数据集的最先进的解决方案都依赖于应用程序层覆盖,这受到固有性能限制的影响。本文介绍了一个利用光组播技术加速数据分析应用的系统Blast。Blast利用无源光功率分割在与分组交换网络核心分离的物理层广播介质上以线速率复制数据。我们在一个小规模的硬件测试平台上执行Blast。多播传输可以在应用程序发出请求后33ms开始,从而产生非常小的控制开销。我们通过模拟来评估Blast在数千台服务器规模下的性能。每个机架仅使用10Gbps的光上行链路,即使在每个机架具有400Gbps上行链路的非阻塞核心网络上使用,Blast的性能也比最先进的解决方案高出102倍。
{"title":"Blast: Accelerating high-performance data analytics applications by optical multicast","authors":"Yiting Xia, Xiaoye Steven Sun","doi":"10.1109/INFOCOM.2015.7218576","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218576","url":null,"abstract":"Multicast data dissemination is the performance bottleneck for high-performance data analytics applications in cluster computing, because terabytes of data need to be distributed routinely from a single data source to hundreds of computing servers. The state-of-the-art solutions for delivering these massive data sets all rely on application-layer overlays, which suffer from inherent performance limitations. This paper presents Blast, a system for accelerating data analytics applications by optical multicast. Blast leverages passive optical power splitting to duplicate data at line rate on a physical-layer broadcast medium separate from the packet-switched network core. We implement Blast on a small-scale hardware testbed. Multicast transmission can start 33ms after an application issues the request, resulting in a very small control overhead. We evaluate Blast's performance at the scale of thousands of servers through simulation. Using only a 10Gbps optical uplink per rack, Blast achieves upto 102× better performance than the state-of-the-art solutions even when they are used over a non-blocking core network with a 400Gbps uplink per rack.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"87 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126100998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
AE: An Asymmetric Extremum content defined chunking algorithm for fast and bandwidth-efficient data deduplication AE:一种非对称极值内容定义的分块算法,用于快速和带宽高效的重复数据删除
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218510
Yucheng Zhang, Hong Jiang, D. Feng, Wen Xia, Min Fu, Fangting Huang, Yukun Zhou
Data deduplication, a space-efficient and bandwidth-saving technology, plays an important role in bandwidth-efficient data transmission in various data-intensive network and cloud applications. Rabin-based and MAXP-based Content-Defined Chunking (CDC) algorithms, while robust in finding suitable cut-points for chunk-level redundancy elimination, face the key challenges of (1) low chunking throughput that renders the chunking stage the deduplication performance bottleneck and (2) large chunk-size variance that decreases deduplication efficiency. To address these challenges, this paper proposes a new CDC algorithm called the Asymmetric Extremum (AE) algorithm. The main idea behind AE is based on the observation that the extreme value in an asymmetric local range is not likely to be replaced by a new extreme value in dealing with the boundaries-shift problem, which motivates AE's use of asymmetric (rather than symmetric as in MAXP) local range to identify cut-points and simultaneously achieve high chunking throughput and low chunk-size variance. As a result, AE simultaneously addresses the problems of low chunking throughput in MAXP and Rabin and high chunk-size variance in Rabin. The experimental results based on four real-world datasets show that AE improves the throughput performance of the state-of-the-art CDC algorithms by 3x while attaining comparable or higher deduplication efficiency.
重复数据删除是一种节省空间和带宽的技术,在各种数据密集型网络和云应用中,重复数据删除在带宽高效的数据传输中发挥着重要作用。基于rabin和基于maxp的内容定义分块(CDC)算法虽然在寻找块级冗余消除的合适切点方面具有鲁棒性,但面临以下主要挑战:(1)低分块吞吐量使分块阶段成为重复数据删除性能瓶颈;(2)大的块大小差异降低了重复数据删除效率。为了解决这些问题,本文提出了一种新的CDC算法,称为非对称极值(AE)算法。AE背后的主要思想是基于这样的观察,即在处理边界移动问题时,不对称局部范围内的极值不太可能被新的极值所取代,这促使AE使用不对称(而不是MAXP中的对称)局部范围来识别切点,同时实现高分块吞吐量和低块大小方差。因此,AE同时解决了MAXP和Rabin中分块吞吐量低和Rabin中分块大小方差大的问题。基于四个真实数据集的实验结果表明,AE将最先进的CDC算法的吞吐量性能提高了3倍,同时获得相当或更高的重复数据删除效率。
{"title":"AE: An Asymmetric Extremum content defined chunking algorithm for fast and bandwidth-efficient data deduplication","authors":"Yucheng Zhang, Hong Jiang, D. Feng, Wen Xia, Min Fu, Fangting Huang, Yukun Zhou","doi":"10.1109/INFOCOM.2015.7218510","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218510","url":null,"abstract":"Data deduplication, a space-efficient and bandwidth-saving technology, plays an important role in bandwidth-efficient data transmission in various data-intensive network and cloud applications. Rabin-based and MAXP-based Content-Defined Chunking (CDC) algorithms, while robust in finding suitable cut-points for chunk-level redundancy elimination, face the key challenges of (1) low chunking throughput that renders the chunking stage the deduplication performance bottleneck and (2) large chunk-size variance that decreases deduplication efficiency. To address these challenges, this paper proposes a new CDC algorithm called the Asymmetric Extremum (AE) algorithm. The main idea behind AE is based on the observation that the extreme value in an asymmetric local range is not likely to be replaced by a new extreme value in dealing with the boundaries-shift problem, which motivates AE's use of asymmetric (rather than symmetric as in MAXP) local range to identify cut-points and simultaneously achieve high chunking throughput and low chunk-size variance. As a result, AE simultaneously addresses the problems of low chunking throughput in MAXP and Rabin and high chunk-size variance in Rabin. The experimental results based on four real-world datasets show that AE improves the throughput performance of the state-of-the-art CDC algorithms by 3x while attaining comparable or higher deduplication efficiency.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125392711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
Exploiting causes and effects of wireless link correlation for better performance 利用无线链路相关的因果关系来获得更好的性能
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218403
S. Kim, Shuai Wang, T. He
Contradicting the widely believed assumption of link independence, recently the phenomenon of reception correlation among nearby receivers has been revealed and exploited for varieties of protocols [3], [8], [17], [21], [23], [24]. However, despite the diversified correlation-aware designs proposed up to date, they commonly suffer from a shortcoming where link correlation is inaccurately measured, which leads them to sub-optimal performance. In this work we propose a general framework for accurate capturing of link correlation, enabling better utilization of the phenomenon for protocols lying on top of it. Our framework uses SINR (Signal to Interference plus Noise Ratio) to detect correlations, followed by modeling the correlations for in-network use. We show that our design is light-weight, both computation and storage-wise. We apply our model to opportunistic routing and network coding on a physical 802.15.4 test-bed for energy savings of 25% and 15%.
与人们普遍认为的链路独立假设相反,最近发现并利用了各种协议[3]、[8]、[17]、[21]、[23]、[24]之间的接收相关现象。然而,尽管目前提出了多种相关感知设计,但它们普遍存在链路相关性测量不准确的缺点,这导致它们的性能不佳。在这项工作中,我们提出了一个用于准确捕获链路相关性的通用框架,以便更好地利用位于其上的协议的现象。我们的框架使用SINR(信号干扰加噪声比)来检测相关性,然后为网络内使用的相关性建模。我们展示了我们的设计在计算和存储方面都是轻量级的。我们将我们的模型应用于物理802.15.4测试台上的机会路由和网络编码,以节省25%和15%的能源。
{"title":"Exploiting causes and effects of wireless link correlation for better performance","authors":"S. Kim, Shuai Wang, T. He","doi":"10.1109/INFOCOM.2015.7218403","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218403","url":null,"abstract":"Contradicting the widely believed assumption of link independence, recently the phenomenon of reception correlation among nearby receivers has been revealed and exploited for varieties of protocols [3], [8], [17], [21], [23], [24]. However, despite the diversified correlation-aware designs proposed up to date, they commonly suffer from a shortcoming where link correlation is inaccurately measured, which leads them to sub-optimal performance. In this work we propose a general framework for accurate capturing of link correlation, enabling better utilization of the phenomenon for protocols lying on top of it. Our framework uses SINR (Signal to Interference plus Noise Ratio) to detect correlations, followed by modeling the correlations for in-network use. We show that our design is light-weight, both computation and storage-wise. We apply our model to opportunistic routing and network coding on a physical 802.15.4 test-bed for energy savings of 25% and 15%.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126714930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Enhancing reliability and response times via replication in computing clusters 通过计算集群中的复制提高可靠性和响应时间
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218512
Z. Qiu, Juan F. Pérez
Computing clusters have been widely deployed for scientific and engineering applications to support intensive computation and massive data operations. As applications and resources in a cluster are subject to failures, fault-tolerance strategies are commonly adopted, sometimes at the expense of additional delays in job response times, or unnecessarily increasing resource usage. In this paper, we explore concurrent replication with canceling, a fault-tolerance approach where jobs and their replicas are processed concurrently, and the successful completion of either triggers the removals of its replica. We propose a stochastic model to study how this approach affects the cluster service level objectives (SLOs), particularly the offered response time percentiles. In addition to the expected gains in reliability, the proposed model allows us to determine the regions of the utilization where introducing replication with canceling effectively reduces the response times. Moreover, we show how this model can support resource provisioning decisions with reliability and response time guarantees.
计算集群已广泛应用于科学和工程应用,以支持密集计算和海量数据操作。由于集群中的应用程序和资源容易发生故障,因此通常采用容错策略,有时会增加作业响应时间的额外延迟,或者不必要地增加资源使用。在本文中,我们探讨了带取消的并发复制,这是一种容错方法,其中作业及其副本是并发处理的,成功完成任一作业都会触发其副本的删除。我们提出了一个随机模型来研究这种方法如何影响集群服务水平目标(slo),特别是提供的响应时间百分位数。除了可靠性方面的预期收益外,所建议的模型还允许我们确定在哪些区域引入复制并取消复制可以有效地减少响应时间。此外,我们还展示了该模型如何支持具有可靠性和响应时间保证的资源供应决策。
{"title":"Enhancing reliability and response times via replication in computing clusters","authors":"Z. Qiu, Juan F. Pérez","doi":"10.1109/INFOCOM.2015.7218512","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218512","url":null,"abstract":"Computing clusters have been widely deployed for scientific and engineering applications to support intensive computation and massive data operations. As applications and resources in a cluster are subject to failures, fault-tolerance strategies are commonly adopted, sometimes at the expense of additional delays in job response times, or unnecessarily increasing resource usage. In this paper, we explore concurrent replication with canceling, a fault-tolerance approach where jobs and their replicas are processed concurrently, and the successful completion of either triggers the removals of its replica. We propose a stochastic model to study how this approach affects the cluster service level objectives (SLOs), particularly the offered response time percentiles. In addition to the expected gains in reliability, the proposed model allows us to determine the regions of the utilization where introducing replication with canceling effectively reduces the response times. Moreover, we show how this model can support resource provisioning decisions with reliability and response time guarantees.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114890076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An online procurement auction for power demand response in storage-assisted smart grids 存储辅助智能电网电力需求响应的在线采购拍卖
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218655
Ruiting Zhou, Zongpeng Li, Chuan Wu
The quintessential problem in a smart grid is the matching between power supply and demand - a perfect balance across the temporal domain, for the stable operation of the power network. Recent studies have revealed the critical role of electricity storage devices, as exemplified by rechargeable batteries and plug-in electric vehicles (PEVs), in helping achieve the balance through power arbitrage. Such potential from batteries and PEVs can not be fully realized without an appropriate economic mechanism that incentivizes energy discharging at times when supply is tight. This work aims at a systematic study of such demand response problem in storage-assisted smart grids through a well-designed online procurement auction mechanism. The long-term social welfare maximization problem is naturally formulated into a linear integer program. We first apply a primal-dual optimization algorithm to decompose the online auction design problem into a series of one-round auction design problems, achieving a small loss in competitive ratio. For the one round auction, we show that social welfare maximization is still NP-hard, and design a primal-dual approximation algorithm that works in concert with the decomposition algorithm. The end result is a truthful power procurement auction that is online, truthful, and 2-competitive in typical scenarios.
智能电网的核心问题是电力供需的匹配,即电力供需在时域上的完美平衡,以保证电网的稳定运行。最近的研究表明,以可充电电池和插电式电动汽车(pev)为例,电力存储设备在通过电力套利帮助实现平衡方面发挥了关键作用。如果没有适当的经济机制,在供应紧张的情况下激励能源排放,电池和电动汽车的这种潜力就无法充分实现。本文旨在通过精心设计的在线采购拍卖机制,系统研究储能辅助智能电网的需求响应问题。长期社会福利最大化问题自然被表述为线性整数规划。我们首先运用原始对偶优化算法将网络拍卖设计问题分解为一系列一轮拍卖设计问题,实现了竞争比损失较小。对于一轮拍卖,我们证明了社会福利最大化仍然是np困难的,并设计了一个与分解算法协同工作的原始对偶近似算法。最终的结果是一个真实的电力采购拍卖,在典型的情况下是在线的、真实的和竞争性的。
{"title":"An online procurement auction for power demand response in storage-assisted smart grids","authors":"Ruiting Zhou, Zongpeng Li, Chuan Wu","doi":"10.1109/INFOCOM.2015.7218655","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218655","url":null,"abstract":"The quintessential problem in a smart grid is the matching between power supply and demand - a perfect balance across the temporal domain, for the stable operation of the power network. Recent studies have revealed the critical role of electricity storage devices, as exemplified by rechargeable batteries and plug-in electric vehicles (PEVs), in helping achieve the balance through power arbitrage. Such potential from batteries and PEVs can not be fully realized without an appropriate economic mechanism that incentivizes energy discharging at times when supply is tight. This work aims at a systematic study of such demand response problem in storage-assisted smart grids through a well-designed online procurement auction mechanism. The long-term social welfare maximization problem is naturally formulated into a linear integer program. We first apply a primal-dual optimization algorithm to decompose the online auction design problem into a series of one-round auction design problems, achieving a small loss in competitive ratio. For the one round auction, we show that social welfare maximization is still NP-hard, and design a primal-dual approximation algorithm that works in concert with the decomposition algorithm. The end result is a truthful power procurement auction that is online, truthful, and 2-competitive in typical scenarios.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116534373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
iSelf: Towards cold-start emotion labeling using transfer learning with smartphones self:使用智能手机迁移学习实现冷启动情感标签
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218495
Boyuan Sun, Q. Ma, Shanfeng Zhang, Kebin Liu, Yunhao Liu
To meet the demand of more intelligent automation services on smartphone, more and more applications are developed based on users' emotion and personality. It has been a consensus that a relationship exists between personal emotions and usage pattern of smartphone. Most of existing work studies this relationship by learning manually labeled samples collected from smartphone users. The manual labeling process, however, is time-consuming, labor-intensive and money-consuming. To address this issue, we propose iSelf, a system which provides a general service of automatic detection for user's emotions in cold-start conditions with smartphone. Using transfer learning technology, iSelf achieves high accuracy given only a few labeled samples. We also develop a hybrid public/personal inference engine and validation system, so as to make iSelf maintain continuous update. Through extensive experiments, the inferring accuracy is tested about 75% and can be improved increasingly through validation and update.
为了满足智能手机上更加智能化的自动化服务需求,越来越多的基于用户情感和个性的应用被开发出来。个人情绪与智能手机的使用模式之间存在一定的关系,这已经成为共识。现有的大部分工作都是通过学习从智能手机用户那里收集的手动标记样本来研究这种关系的。然而,手工贴标签的过程是耗时的,劳动密集型的和金钱消耗。为了解决这一问题,我们提出了一种智能手机冷启动条件下用户情绪自动检测的系统。利用迁移学习技术,在少量标记样本的情况下,实现了较高的准确率。我们还开发了混合公共/个人推理引擎和验证系统,使自己保持持续更新。通过大量的实验,该方法的推断精度约为75%,并可通过验证和更新不断提高。
{"title":"iSelf: Towards cold-start emotion labeling using transfer learning with smartphones","authors":"Boyuan Sun, Q. Ma, Shanfeng Zhang, Kebin Liu, Yunhao Liu","doi":"10.1109/INFOCOM.2015.7218495","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218495","url":null,"abstract":"To meet the demand of more intelligent automation services on smartphone, more and more applications are developed based on users' emotion and personality. It has been a consensus that a relationship exists between personal emotions and usage pattern of smartphone. Most of existing work studies this relationship by learning manually labeled samples collected from smartphone users. The manual labeling process, however, is time-consuming, labor-intensive and money-consuming. To address this issue, we propose iSelf, a system which provides a general service of automatic detection for user's emotions in cold-start conditions with smartphone. Using transfer learning technology, iSelf achieves high accuracy given only a few labeled samples. We also develop a hybrid public/personal inference engine and validation system, so as to make iSelf maintain continuous update. Through extensive experiments, the inferring accuracy is tested about 75% and can be improved increasingly through validation and update.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122759857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Supporting WiFi and LTE co-existence 支持WiFi和LTE共存
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218451
Sangki Yun, L. Qiu
Motivated by the recent push to deploy LTE in unlicensed spectrum, this paper develops a novel system to enable co-existence between LTE and WiFi. Our approach leverages LTE and WiFi antennas already available on smartphones to let LTE and WiFi transmit together and successfully decode the interfered signals. Our system offers several distinct advantages over existing MIMO work: (i) it can decode all the interfering signals under cross technology interference even when the interfering signals have similar power and occupy similar frequency, (ii) it does not need clean reference signals from either WiFi or LTE transmission, (iii) it can decode interfering WiFi MIMO and LTE transmissions, and (iv) it has a simple yet effective carrier sense mechanism for WiFi to access the medium under interfering LTE signals while avoiding other WiFi transmissions. We use USRP implementation and experiments to show its effectiveness.
受近期在非授权频谱中部署LTE的推动,本文开发了一种新颖的系统,使LTE和WiFi能够共存。我们的方法利用智能手机上已有的LTE和WiFi天线,让LTE和WiFi一起传输,并成功解码受干扰的信号。与现有的MIMO工作相比,我们的系统具有以下几个明显的优势:(1)在交叉技术干扰下,即使干扰信号功率相近、频率相近,也能对所有干扰信号进行解码;(2)不需要WiFi或LTE传输的干净参考信号;(3)对WiFi MIMO和LTE传输的干扰进行解码;(4)具有简单有效的载波感知机制,使WiFi能够在LTE信号干扰下接入介质,同时避免其他WiFi传输。通过USRP的实施和实验验证了其有效性。
{"title":"Supporting WiFi and LTE co-existence","authors":"Sangki Yun, L. Qiu","doi":"10.1109/INFOCOM.2015.7218451","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218451","url":null,"abstract":"Motivated by the recent push to deploy LTE in unlicensed spectrum, this paper develops a novel system to enable co-existence between LTE and WiFi. Our approach leverages LTE and WiFi antennas already available on smartphones to let LTE and WiFi transmit together and successfully decode the interfered signals. Our system offers several distinct advantages over existing MIMO work: (i) it can decode all the interfering signals under cross technology interference even when the interfering signals have similar power and occupy similar frequency, (ii) it does not need clean reference signals from either WiFi or LTE transmission, (iii) it can decode interfering WiFi MIMO and LTE transmissions, and (iv) it has a simple yet effective carrier sense mechanism for WiFi to access the medium under interfering LTE signals while avoiding other WiFi transmissions. We use USRP implementation and experiments to show its effectiveness.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114379319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
期刊
2015 IEEE Conference on Computer Communications (INFOCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1