首页 > 最新文献

2015 IEEE Conference on Computer Communications (INFOCOM)最新文献

英文 中文
Fair and optimal resource allocation for LTE multicast (eMBMS): Group partitioning and dynamics LTE组播(eMBMS)的公平和最优资源分配:组划分和动态
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218502
Jiasi Chen, M. Chiang, Jeffrey Erman, Guangzhi Li, K. Ramakrishnan, R. Sinha
With recent standardization and deployment of LTE eMBMS, cellular multicast is gaining traction as a method of efficiently using wireless spectrum to deliver large amounts of multimedia data to multiple cell sites. Cellular operators still seek methods of performing optimal resource allocation in eMBMS based on a complete understanding of the complex interactions among a number of mechanisms: the multicast coding scheme, the resources allocated to unicast users and their scheduling at the base stations, the resources allocated to a multicast group to satisfy the user experience of its members, and the number of groups and their membership, all of which we consider in this work. We determine the optimal allocation of wireless resources for users to maximize proportional fair utility. To handle the heterogeneity of user channel conditions, we efficiently and optimally partition multicast users into groups so that users with good signal strength do not suffer by being grouped together with users of poor signal strength. Numerical simulations are performed to compare our scheme to practical heuristics and state-of-the-art schemes. We demonstrate the tradeoff between improving unicast user rates and improving spectrum efficiency through multicast. Finally, we analyze the interaction between the globally fair solution and individual user's desire to maximize its rate. We show that even if the user deviates from the global solution in a number of scenarios, we can bound the number of selfish users that will choose to deviate.
随着最近LTE eMBMS的标准化和部署,蜂窝多播作为一种有效地利用无线频谱向多个蜂窝站点传输大量多媒体数据的方法正在获得关注。蜂窝运营商仍在寻求在eMBMS中执行最佳资源分配的方法,这些方法基于对多个机制之间复杂交互的完全理解:组播编码方案、分配给单播用户的资源及其在基站的调度、分配给组播组以满足其成员的用户体验的资源、组的数量及其成员,所有这些都是我们在本工作中考虑的。我们确定了用户无线资源的最佳分配,以最大化比例公平效用。为了处理用户信道条件的异构性,我们对组播用户进行了高效、优化的分组,使信号强度好的组播用户不会与信号强度较差的组播用户分组。进行了数值模拟,将我们的方案与实际启发式和最先进的方案进行比较。我们演示了通过组播提高单播用户速率和提高频谱效率之间的权衡。最后,我们分析了全局公平解与个体用户最大化其比率的愿望之间的交互作用。我们表明,即使用户在许多场景中偏离了全局解决方案,我们也可以限制将选择偏离的自私用户的数量。
{"title":"Fair and optimal resource allocation for LTE multicast (eMBMS): Group partitioning and dynamics","authors":"Jiasi Chen, M. Chiang, Jeffrey Erman, Guangzhi Li, K. Ramakrishnan, R. Sinha","doi":"10.1109/INFOCOM.2015.7218502","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218502","url":null,"abstract":"With recent standardization and deployment of LTE eMBMS, cellular multicast is gaining traction as a method of efficiently using wireless spectrum to deliver large amounts of multimedia data to multiple cell sites. Cellular operators still seek methods of performing optimal resource allocation in eMBMS based on a complete understanding of the complex interactions among a number of mechanisms: the multicast coding scheme, the resources allocated to unicast users and their scheduling at the base stations, the resources allocated to a multicast group to satisfy the user experience of its members, and the number of groups and their membership, all of which we consider in this work. We determine the optimal allocation of wireless resources for users to maximize proportional fair utility. To handle the heterogeneity of user channel conditions, we efficiently and optimally partition multicast users into groups so that users with good signal strength do not suffer by being grouped together with users of poor signal strength. Numerical simulations are performed to compare our scheme to practical heuristics and state-of-the-art schemes. We demonstrate the tradeoff between improving unicast user rates and improving spectrum efficiency through multicast. Finally, we analyze the interaction between the globally fair solution and individual user's desire to maximize its rate. We show that even if the user deviates from the global solution in a number of scenarios, we can bound the number of selfish users that will choose to deviate.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124081654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 95
Cost efficient and performance guaranteed virtual network embedding in multicast fat-tree DCNs 在组播胖树DCNs中嵌入具有成本效益和性能保证的虚拟网络
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218376
Jun Duan, Zhiyang Guo, Yuanyuan Yang
Most of today's data center networks (DCNs) adopt a multi-rooted tree structure called fat-tree, which delivers large bisection bandwidth through rich path multiplicity. In fat-tree DCNs, core switch modules play an important role in providing nonblocking capability, and form a significant part of network cost simultaneously. Reducing core switches while simultaneously guaranteeing performance has been a constant challenge. For example, multicast is an essential communication pattern in cloud services which needs to be supported efficiently. In this paper, we propose virtual network embedding schemes to deal with this problem. In the first scheme, we place the virtual machines (VMs) of a multicast-capable virtual network (MVN) as compact as possible, without any disturbance to existing traffic. In the second scheme, we manage to keep VMs in an even more compact way to reduce cost by allowing a small degree of VM migration. Both schemes are guaranteed to support any multicast communications within MVNs, and simultaneously achieve significant cost saving in terms of core switches, compared to currently best known result. Moreover, we show that our schemes incur only a small overhead in terms of migrations. Finally, we evaluate the performance of proposed schemes and validate the theoretical analysis through extensive simulations.
目前大多数数据中心网络都采用一种称为“胖树”的多根树结构,这种结构通过丰富的路径多重性提供较大的平分带宽。在胖树型DCNs中,核心交换模块在提供非阻塞能力方面发挥着重要作用,同时也构成了网络成本的重要组成部分。在保证性能的同时减少核心交换机一直是一个挑战。例如,多播是云服务中必不可少的通信模式,需要得到有效的支持。本文提出了虚拟网络嵌入方案来解决这一问题。在第一种方案中,我们将具有组播功能的虚拟网络(MVN)中的虚拟机(vm)放置得尽可能紧凑,不会对现有流量造成任何干扰。在第二种方案中,我们设法以更紧凑的方式保持VM,通过允许小程度的VM迁移来降低成本。这两种方案都保证支持MVNs内的任何组播通信,同时与目前已知的结果相比,在核心交换机方面实现了显着的成本节约。此外,我们还展示了我们的方案在迁移方面只产生很小的开销。最后,我们评估了所提出方案的性能,并通过大量的仿真验证了理论分析。
{"title":"Cost efficient and performance guaranteed virtual network embedding in multicast fat-tree DCNs","authors":"Jun Duan, Zhiyang Guo, Yuanyuan Yang","doi":"10.1109/INFOCOM.2015.7218376","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218376","url":null,"abstract":"Most of today's data center networks (DCNs) adopt a multi-rooted tree structure called fat-tree, which delivers large bisection bandwidth through rich path multiplicity. In fat-tree DCNs, core switch modules play an important role in providing nonblocking capability, and form a significant part of network cost simultaneously. Reducing core switches while simultaneously guaranteeing performance has been a constant challenge. For example, multicast is an essential communication pattern in cloud services which needs to be supported efficiently. In this paper, we propose virtual network embedding schemes to deal with this problem. In the first scheme, we place the virtual machines (VMs) of a multicast-capable virtual network (MVN) as compact as possible, without any disturbance to existing traffic. In the second scheme, we manage to keep VMs in an even more compact way to reduce cost by allowing a small degree of VM migration. Both schemes are guaranteed to support any multicast communications within MVNs, and simultaneously achieve significant cost saving in terms of core switches, compared to currently best known result. Moreover, we show that our schemes incur only a small overhead in terms of migrations. Finally, we evaluate the performance of proposed schemes and validate the theoretical analysis through extensive simulations.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127125758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Time-constrained data harvesting in WSNs: Theoretical foundation and algorithm design 无线传感器网络的时间约束数据采集:理论基础与算法设计
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218472
Lin Chen, Wei Wang, Hua Huang, Shan Lin
Data harvesting using mobile data ferries has recently emerged as a promising alternative to the traditional multi-hop transmission paradigm. The use of data ferries can significantly reduce energy consumption at sensor nodes and increase network lifetime. However, it usually incurs longer data delivery latency as the data ferry needs to travel through the network to collect data, during which some delay-sensitive data may become obsolete. Therefore, optimizing the trajectory of the data ferry with data delivery latency bound is important for this approach to be effective in practice. To address this problem, we formally define the time-constrained data harvesting problem, which seeks an optimal data harvesting path in a network to collect as much data as possible within a time duration. We first characterise the performance bound given by the optimal data harvesting algorithm and show that the optimal algorithm significantly outperforms the random algorithm, especially when network scales. Motivated by the theoretical analysis and proving the NP-completeness of the time-constrained data harvesting problem, we then devise polynomial-time approximation schemes (PTAS) and mathematically prove the output being a constant-factor approximation of the optimal solution.
使用移动数据轮渡的数据收集最近成为传统多跳传输范例的一种有前途的替代方案。使用数据轮渡可以显著降低传感器节点的能耗,延长网络寿命。然而,它通常会导致更长的数据传递延迟,因为数据传输需要通过网络来收集数据,在此期间,一些对延迟敏感的数据可能会过时。因此,优化具有数据传递延迟限制的数据轮渡的轨迹对于该方法在实践中有效非常重要。为了解决这个问题,我们正式定义了时间约束数据收集问题,该问题在网络中寻求最佳数据收集路径,以便在一段时间内收集尽可能多的数据。我们首先描述了最优数据采集算法给出的性能界限,并表明最优算法显著优于随机算法,特别是当网络扩展时。在理论分析和证明时间约束数据采集问题的np完备性的激励下,我们设计了多项式时间逼近方案(PTAS),并在数学上证明了输出是最优解的常因子逼近。
{"title":"Time-constrained data harvesting in WSNs: Theoretical foundation and algorithm design","authors":"Lin Chen, Wei Wang, Hua Huang, Shan Lin","doi":"10.1109/INFOCOM.2015.7218472","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218472","url":null,"abstract":"Data harvesting using mobile data ferries has recently emerged as a promising alternative to the traditional multi-hop transmission paradigm. The use of data ferries can significantly reduce energy consumption at sensor nodes and increase network lifetime. However, it usually incurs longer data delivery latency as the data ferry needs to travel through the network to collect data, during which some delay-sensitive data may become obsolete. Therefore, optimizing the trajectory of the data ferry with data delivery latency bound is important for this approach to be effective in practice. To address this problem, we formally define the time-constrained data harvesting problem, which seeks an optimal data harvesting path in a network to collect as much data as possible within a time duration. We first characterise the performance bound given by the optimal data harvesting algorithm and show that the optimal algorithm significantly outperforms the random algorithm, especially when network scales. Motivated by the theoretical analysis and proving the NP-completeness of the time-constrained data harvesting problem, we then devise polynomial-time approximation schemes (PTAS) and mathematically prove the output being a constant-factor approximation of the optimal solution.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128054042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Information sharing in distributed stochastic bandits 分布式随机强盗中的信息共享
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218651
Swapna Buccapatnam, Jian Tan, Li Zhang
Information sharing is an important issue for stochastic bandit problems in a distributed setting. Consider N players dealing with the same multi-armed bandit problem. All players receive requests simultaneously and must choose one of M actions for each request. Sharing information among these N players can decrease the regret for each of them but also incurs cooperation and communication overhead. In this setting, we study how cooperation and communication can impact the system performance measured by regret and communication cost. For both scenarios, we establish a uniform lower bound to the regret for the entire system as a function of time and network size. Concerning cooperation, we study the problem from a game-theoretic perspective. When each player's actions and payoffs are immediately visible to all others, we identify strategies for all players under which co-operative exploration is ensured. Regarding the communication cost, we consider incomplete information sharing such that a player's payoffs and actions are not entirely available to others. The players communicate observations to each other to reduce their regret, however with a cost. We show that a logarithmic communication cost is necessary to achieve the optimal regret. For Bernoulli arrivals, we specify a policy that achieves the optimal regret with a logarithmic communication cost. Our work opens a novel direction towards understanding information sharing for active learning in a distributed environment.
信息共享是分布式环境下随机盗匪问题的一个重要问题。假设N个玩家面对相同的多手强盗问题。所有玩家同时收到请求,并且必须为每个请求选择M种行动中的一种。在这N个玩家之间分享信息可以减少他们每个人的遗憾,但也会增加合作和沟通的开销。在此背景下,我们研究合作与沟通如何影响以后悔和沟通成本衡量的系统绩效。对于这两种情况,我们为整个系统建立了一个统一的遗憾下界,作为时间和网络大小的函数。关于合作问题,我们从博弈论的角度来研究。当每个玩家的行动和收益都能立即被所有人看到时,我们就为所有玩家确定了确保合作探索的策略。关于沟通成本,我们考虑的是不完全信息共享,即玩家的收益和行动并不完全为他人所知。玩家相互交流观察结果以减少后悔,但这是有代价的。我们证明了对数通信代价是实现最优遗憾的必要条件。对于伯努利到达,我们指定了一个以对数通信成本实现最优后悔的策略。我们的工作为理解分布式环境中主动学习的信息共享开辟了一个新的方向。
{"title":"Information sharing in distributed stochastic bandits","authors":"Swapna Buccapatnam, Jian Tan, Li Zhang","doi":"10.1109/INFOCOM.2015.7218651","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218651","url":null,"abstract":"Information sharing is an important issue for stochastic bandit problems in a distributed setting. Consider N players dealing with the same multi-armed bandit problem. All players receive requests simultaneously and must choose one of M actions for each request. Sharing information among these N players can decrease the regret for each of them but also incurs cooperation and communication overhead. In this setting, we study how cooperation and communication can impact the system performance measured by regret and communication cost. For both scenarios, we establish a uniform lower bound to the regret for the entire system as a function of time and network size. Concerning cooperation, we study the problem from a game-theoretic perspective. When each player's actions and payoffs are immediately visible to all others, we identify strategies for all players under which co-operative exploration is ensured. Regarding the communication cost, we consider incomplete information sharing such that a player's payoffs and actions are not entirely available to others. The players communicate observations to each other to reduce their regret, however with a cost. We show that a logarithmic communication cost is necessary to achieve the optimal regret. For Bernoulli arrivals, we specify a policy that achieves the optimal regret with a logarithmic communication cost. Our work opens a novel direction towards understanding information sharing for active learning in a distributed environment.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"263 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132464345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Heterogeneous statistical QoS provisioning over 5G wireless full-duplex networks 5G无线全双工异构统计QoS发放
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218367
Wenchi Cheng, Xi Zhang, Hailin Zhang
Recently, both academia and industry are moving their research attention to the fifth-generation (5G) wireless networks - the next new era of wireless networks. The wireless full-duplex transmission, as one of promising candidate techniques for 5G, can significantly boost the spectrum efficiency of the wireless networks, thus providing a powerful thrust to optimize the quality-of-service (QoS) performances for the wireless networks. However, due to the heterogeneity caused by different types of simultaneous traffics over the wireless full-duplex link, supporting QoS guarantees for wireless full-duplex networks imposes the new challenges that we need to provide heterogeneous QoS guarantees for different types of traffics over the same link simultaneously. To overcome the aforementioned problems, in this paper we propose the heterogeneous statistical QoS provisioning framework for bidirectional transmission based wireless full-duplex networks. In particular, we formulate the optimization problems to maximize the system throughput subject to heterogeneous statistical delay-bound QoS requirements. Then, we convert the resulted non-convex optimization problem into an equivalent convex optimization problem, solving which we can derive the optimal QoS-driven power allocation scheme to maximize the system throughput while guaranteeing the heterogeneous statistical delay-bound QoS requirements. The extensive simulation results obtained show that our proposed QoS-driven power allocation scheme for heterogeneous statistical delay-bound QoS requirements can achieve larger aggregate system throughput than the scheme for the homogeneous statistical delay-bound QoS requirement over 5G mobile wireless full-duplex networks.
最近,学术界和工业界都将研究重点转移到第五代(5G)无线网络-无线网络的下一个新时代。无线全双工传输作为5G有前景的候选技术之一,可以显著提高无线网络的频谱效率,从而为优化无线网络的服务质量(QoS)性能提供强大的推力。然而,由于无线全双工链路上同时存在不同类型的业务所带来的异构性,对无线全双工网络的QoS保障提出了新的挑战,我们需要在同一链路上同时为不同类型的业务提供异构的QoS保障。为了克服上述问题,本文提出了基于双向传输的无线全双工网络异构统计QoS提供框架。特别是,我们制定了优化问题,以最大限度地提高系统吞吐量受制于异构统计延迟绑定QoS要求。然后,我们将得到的非凸优化问题转化为等效凸优化问题,通过求解该问题,我们可以得到最优的QoS驱动功率分配方案,在保证异构统计时延约束的QoS要求的同时,最大限度地提高系统吞吐量。大量的仿真结果表明,在5G移动无线全双工网络上,基于异构统计时延绑定QoS需求的QoS驱动功率分配方案比基于同质统计时延绑定QoS需求的方案能够实现更大的系统总吞吐量。
{"title":"Heterogeneous statistical QoS provisioning over 5G wireless full-duplex networks","authors":"Wenchi Cheng, Xi Zhang, Hailin Zhang","doi":"10.1109/INFOCOM.2015.7218367","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218367","url":null,"abstract":"Recently, both academia and industry are moving their research attention to the fifth-generation (5G) wireless networks - the next new era of wireless networks. The wireless full-duplex transmission, as one of promising candidate techniques for 5G, can significantly boost the spectrum efficiency of the wireless networks, thus providing a powerful thrust to optimize the quality-of-service (QoS) performances for the wireless networks. However, due to the heterogeneity caused by different types of simultaneous traffics over the wireless full-duplex link, supporting QoS guarantees for wireless full-duplex networks imposes the new challenges that we need to provide heterogeneous QoS guarantees for different types of traffics over the same link simultaneously. To overcome the aforementioned problems, in this paper we propose the heterogeneous statistical QoS provisioning framework for bidirectional transmission based wireless full-duplex networks. In particular, we formulate the optimization problems to maximize the system throughput subject to heterogeneous statistical delay-bound QoS requirements. Then, we convert the resulted non-convex optimization problem into an equivalent convex optimization problem, solving which we can derive the optimal QoS-driven power allocation scheme to maximize the system throughput while guaranteeing the heterogeneous statistical delay-bound QoS requirements. The extensive simulation results obtained show that our proposed QoS-driven power allocation scheme for heterogeneous statistical delay-bound QoS requirements can achieve larger aggregate system throughput than the scheme for the homogeneous statistical delay-bound QoS requirement over 5G mobile wireless full-duplex networks.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131505049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Drawing dominant dataset from big sensory data in wireless sensor networks 从无线传感器网络的大数据中提取优势数据集
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218420
Siyao Cheng, Zhipeng Cai, Jianzhong Li, Xiaolin Fang
The amount of sensory data manifests an explosive growth due to the increasing popularity of Wireless Sensor Networks. The scale of the sensory data in many applications has already exceeds several petabytes annually, which is beyond the computation and transmission capabilities of the conventional WSNs. On the other hand, the information carried by big sensory data has high redundancy because of strong correlation among sensory data. In this paper, we define the concept of e-dominant dataset, which is only a small data set and can represent the vast information carried by big sensory data with the information loss rate being less than e, where e can be arbitrarily small. We prove that drawing the minimum e-dominant dataset is polynomial time solvable and provide a centralized algorithm with 0(n3) time complexity. Furthermore, a distributed algorithm with constant complexity (O(l)) is also designed. It is shown that the result returned by the distributed algorithm can satisfy the e requirement with a near optimal size. Finally, the extensive real experiment results and simulation results are carried out. The results indicate that all the proposed algorithms have high performance in terms of accuracy and energy efficiency.
由于无线传感器网络的日益普及,传感器数据的数量呈现爆炸式增长。在许多应用中,每年的传感数据量已经超过数pb,这已经超出了传统wsn的计算和传输能力。另一方面,由于大数据之间的相关性强,大数据所承载的信息具有较高的冗余度。在本文中,我们定义了e-dominant dataset的概念,它只是一个小的数据集,可以代表大的感官数据所携带的大量信息,信息损失率小于e,其中e可以任意小。我们证明了绘制最小e优势数据集是多项式时间可解的,并提供了一个时间复杂度为0(n3)的集中算法。在此基础上,设计了一种复杂度为O(l)的分布式算法。结果表明,分布式算法能以接近最优的大小满足e的要求。最后,给出了大量的真实实验结果和仿真结果。结果表明,所提出的算法在精度和能效方面都具有较高的性能。
{"title":"Drawing dominant dataset from big sensory data in wireless sensor networks","authors":"Siyao Cheng, Zhipeng Cai, Jianzhong Li, Xiaolin Fang","doi":"10.1109/INFOCOM.2015.7218420","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218420","url":null,"abstract":"The amount of sensory data manifests an explosive growth due to the increasing popularity of Wireless Sensor Networks. The scale of the sensory data in many applications has already exceeds several petabytes annually, which is beyond the computation and transmission capabilities of the conventional WSNs. On the other hand, the information carried by big sensory data has high redundancy because of strong correlation among sensory data. In this paper, we define the concept of e-dominant dataset, which is only a small data set and can represent the vast information carried by big sensory data with the information loss rate being less than e, where e can be arbitrarily small. We prove that drawing the minimum e-dominant dataset is polynomial time solvable and provide a centralized algorithm with 0(n3) time complexity. Furthermore, a distributed algorithm with constant complexity (O(l)) is also designed. It is shown that the result returned by the distributed algorithm can satisfy the e requirement with a near optimal size. Finally, the extensive real experiment results and simulation results are carried out. The results indicate that all the proposed algorithms have high performance in terms of accuracy and energy efficiency.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123821379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 126
MadeCR: Correlation-based malware detection for cognitive radio MadeCR:基于关联的认知无线电恶意软件检测
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218432
Yanzhi Dou, K. Zeng, Yaling Yang, D. Yao
Cognitive Radio (CR) is an intelligent radio technology to boost spectrum utilization and is likely to be widely spread in the near future. However, its flexible software-oriented design may be exploited by an adversary to control CR devices to launch large scale attacks on a wide range of critical wireless infrastructures. To proactively mitigate the potentially serious threat, this paper presents MadeCR, a Correlation-based Malware detection system for CR. MadeCR exploits correlations among CR applications' component actions to detect malicious behaviors. In addition, a significant contribution of the paper is a general experimentation method referred to as mutation testing to comprehensively evaluate the effectiveness of the anomaly detection method against a large number of artificial malware cases. Evaluation shows that MadeCR detects malicious behaviors within 1.10s at an accuracy of 94.9%.
认知无线电(CR)是一种提高频谱利用率的智能无线电技术,在不久的将来有可能得到广泛应用。然而,其灵活的面向软件的设计可能被对手利用来控制CR设备,从而对各种关键无线基础设施发动大规模攻击。为了主动缓解潜在的严重威胁,本文提出了基于关联的CR恶意软件检测系统MadeCR, MadeCR利用CR应用程序组件操作之间的相关性来检测恶意行为。此外,本文的一个重要贡献是一种称为突变测试的通用实验方法,以全面评估异常检测方法对大量人为恶意软件案例的有效性。评估表明,MadeCR在1.10s内检测到恶意行为,准确率为94.9%。
{"title":"MadeCR: Correlation-based malware detection for cognitive radio","authors":"Yanzhi Dou, K. Zeng, Yaling Yang, D. Yao","doi":"10.1109/INFOCOM.2015.7218432","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218432","url":null,"abstract":"Cognitive Radio (CR) is an intelligent radio technology to boost spectrum utilization and is likely to be widely spread in the near future. However, its flexible software-oriented design may be exploited by an adversary to control CR devices to launch large scale attacks on a wide range of critical wireless infrastructures. To proactively mitigate the potentially serious threat, this paper presents MadeCR, a Correlation-based Malware detection system for CR. MadeCR exploits correlations among CR applications' component actions to detect malicious behaviors. In addition, a significant contribution of the paper is a general experimentation method referred to as mutation testing to comprehensively evaluate the effectiveness of the anomaly detection method against a large number of artificial malware cases. Evaluation shows that MadeCR detects malicious behaviors within 1.10s at an accuracy of 94.9%.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114495260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Performance analysis for two-tier cellular systems based on probabilistic distance models 基于概率距离模型的双层蜂窝系统性能分析
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218400
Maryam Ahmadi, Fei Tong, Lei Zheng, Jianping Pan
Tiered networks have been introduced to mitigate the issues related to poor cellular coverage in dead zones and indoor environments. However, the large-scale deployment of multiple tiers can result in severe intra-tier and inter-tier interference that can considerably degrade the performance of users in all tiers. Thus, the network interference analysis has been an important topic in tiered networks. In this paper, we focus on the uplink resource reusing scenario in a two-tier cellular network consisting of a macro cell and multiple femto cells. Without imposing any limitations on the shape of the macro/femto cells (as long as they are approximated by polygons), for the first time in the literature, we obtain the distance distributions associated with tiered structures. Utilizing these distance distributions and the path-loss model in an interference-limited environment, we obtain the distributions of the received signal and interference for both tiers. Further, we give details on how our approach applies to the downlink resource reusing scenario as well as a network with multiple macro cells. Our performance study provides insights into the Signal-to-Interference Ratio and outage probability for macro/femto-cell base stations.
分层网络已被引入,以减轻与死区和室内环境中蜂窝覆盖差有关的问题。然而,多层的大规模部署可能会导致严重的层内和层间干扰,从而大大降低所有层用户的性能。因此,网络干扰分析已成为分层网络中的一个重要课题。本文主要研究由一个宏蜂窝和多个femto蜂窝组成的二层蜂窝网络中的上行资源复用方案。在没有对宏/femto细胞的形状施加任何限制的情况下(只要它们是用多边形近似的),我们在文献中首次获得了与分层结构相关的距离分布。利用这些距离分布和有限干扰环境下的路径损耗模型,我们得到了两层接收信号和干扰的分布。此外,我们还详细介绍了我们的方法如何应用于下行链路资源重用场景以及具有多个宏单元的网络。我们的性能研究为宏/飞蜂窝基站的信干扰比和中断概率提供了见解。
{"title":"Performance analysis for two-tier cellular systems based on probabilistic distance models","authors":"Maryam Ahmadi, Fei Tong, Lei Zheng, Jianping Pan","doi":"10.1109/INFOCOM.2015.7218400","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218400","url":null,"abstract":"Tiered networks have been introduced to mitigate the issues related to poor cellular coverage in dead zones and indoor environments. However, the large-scale deployment of multiple tiers can result in severe intra-tier and inter-tier interference that can considerably degrade the performance of users in all tiers. Thus, the network interference analysis has been an important topic in tiered networks. In this paper, we focus on the uplink resource reusing scenario in a two-tier cellular network consisting of a macro cell and multiple femto cells. Without imposing any limitations on the shape of the macro/femto cells (as long as they are approximated by polygons), for the first time in the literature, we obtain the distance distributions associated with tiered structures. Utilizing these distance distributions and the path-loss model in an interference-limited environment, we obtain the distributions of the received signal and interference for both tiers. Further, we give details on how our approach applies to the downlink resource reusing scenario as well as a network with multiple macro cells. Our performance study provides insights into the Signal-to-Interference Ratio and outage probability for macro/femto-cell base stations.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116630585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The collocation of measurement points in large open indoor environment 大型开放式室内环境中测点的配置
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218638
Kaikai Sheng, Zhicheng Gu, Xueyu Mao, Xiaohua Tian, Weijie Wu, Xiaoying Gan, Xinbing Wang
With the pervasion of mobile devices, crowdsourcing based received signal strength (RSS) fingerprint collection method has drawn much attention to facilitate the indoor localization since it is effective and requires no pre-deployment. However, in large open indoor environment like museums and exhibition centres, RSS measurement points cannot be collocated densely, which degrades localization accuracy. This paper focuses on measurement point collocation in different cases and their effects on localization accuracy. We first study two simple preliminary cases under assumption that users are uniformly distributed: when measurement points are collocated regularly, we propose a collocation pattern which is most beneficial to localization accuracy; when measurement points are collocated randomly, we prove that localization accuracy is limited by a tight bound. Under the general case that users are distributed asymmetrically, we show the best allocation scheme of measurement points: measurement point density ρ is proportional to (cμ)2/3 in every part of the region, where μ is user density and c is a constant determined by the collocation pattern. We also give some guidelines on collocation choice and perform extensive simulations to validate our assumptions and results.
随着移动设备的普及,基于众包的接收信号强度(RSS)指纹采集方法因其有效且不需要预先部署而备受关注,便于室内定位。然而,在博物馆、展览中心等大型开放室内环境中,RSS测点不能密集配置,降低了定位精度。重点研究了不同情况下测点的配置及其对定位精度的影响。首先,在假设用户均匀分布的情况下,我们研究了两种简单的初步情况:当测量点有规律地配置时,我们提出了最有利于定位精度的配置模式;当测量点随机配置时,我们证明了定位精度受到严格限制。在用户不对称分布的一般情况下,给出了测点的最佳分配方案:测点密度ρ在区域的每一部分都与(cμ)2/3成正比,其中μ为用户密度,c为由配置模式决定的常数。我们还给出了一些搭配选择的指导原则,并进行了大量的模拟来验证我们的假设和结果。
{"title":"The collocation of measurement points in large open indoor environment","authors":"Kaikai Sheng, Zhicheng Gu, Xueyu Mao, Xiaohua Tian, Weijie Wu, Xiaoying Gan, Xinbing Wang","doi":"10.1109/INFOCOM.2015.7218638","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218638","url":null,"abstract":"With the pervasion of mobile devices, crowdsourcing based received signal strength (RSS) fingerprint collection method has drawn much attention to facilitate the indoor localization since it is effective and requires no pre-deployment. However, in large open indoor environment like museums and exhibition centres, RSS measurement points cannot be collocated densely, which degrades localization accuracy. This paper focuses on measurement point collocation in different cases and their effects on localization accuracy. We first study two simple preliminary cases under assumption that users are uniformly distributed: when measurement points are collocated regularly, we propose a collocation pattern which is most beneficial to localization accuracy; when measurement points are collocated randomly, we prove that localization accuracy is limited by a tight bound. Under the general case that users are distributed asymmetrically, we show the best allocation scheme of measurement points: measurement point density ρ is proportional to (cμ)2/3 in every part of the region, where μ is user density and c is a constant determined by the collocation pattern. We also give some guidelines on collocation choice and perform extensive simulations to validate our assumptions and results.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117249390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Routing in accumulative multi-hop networks 累积多跳网络中的路由
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218563
J. Gómez-Vilardebó
This paper investigates the problem of finding optimal paths in single-source single-destination accumulative multi-hop networks. We consider a single source that communicates to a single destination assisted by several relays through multiple-hops. At each hop, only one node transmits, while the rest of nodes receive the transmitted signal, and store it after processing/decoding and mixing with the signals received in previous hops. This is, we consider that terminals make use of advanced energy accumulation transmission/reception techniques such us maximal ratio combining reception of repetition codes, or information accumulation with rateless codes. Accumulative techniques increase communication reliability, reduce energy consumption, and decrease latency. We investigate the properties that a routing metric must satisfy in these accumulative networks to guarantee that optimal paths can be computed with Dijkstra's algorithm. We model the problem of routing in an accumulative multi-hop networks, as the problem of routing in a hypergraph. We show that optimality properties in traditional multi-hop network (monotonicity and isotonicity) are no longer valid and derive a new set of sufficient conditions for optimality.
研究了单源单目的累积多跳网络中最优路径的寻优问题。我们考虑一个由多个中继通过多跳辅助的单一源与单一目的地通信。每一跳只有一个节点发送,其余节点接收发送的信号,将其与前一跳接收的信号进行处理/解码并混合后存储。也就是说,我们认为终端使用了先进的能量积累发射/接收技术,如重复码的最大比结合接收,或无速率码的信息积累。累加技术提高了通信可靠性,降低了能耗,减少了延迟。我们研究了在这些累积网络中路由度量必须满足的性质,以保证用Dijkstra算法可以计算出最优路径。我们将累积多跳网络中的路由问题建模为超图中的路由问题。我们证明了传统多跳网络的最优性(单调性和等压性)不再成立,并导出了一组新的最优性的充分条件。
{"title":"Routing in accumulative multi-hop networks","authors":"J. Gómez-Vilardebó","doi":"10.1109/INFOCOM.2015.7218563","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218563","url":null,"abstract":"This paper investigates the problem of finding optimal paths in single-source single-destination accumulative multi-hop networks. We consider a single source that communicates to a single destination assisted by several relays through multiple-hops. At each hop, only one node transmits, while the rest of nodes receive the transmitted signal, and store it after processing/decoding and mixing with the signals received in previous hops. This is, we consider that terminals make use of advanced energy accumulation transmission/reception techniques such us maximal ratio combining reception of repetition codes, or information accumulation with rateless codes. Accumulative techniques increase communication reliability, reduce energy consumption, and decrease latency. We investigate the properties that a routing metric must satisfy in these accumulative networks to guarantee that optimal paths can be computed with Dijkstra's algorithm. We model the problem of routing in an accumulative multi-hop networks, as the problem of routing in a hypergraph. We show that optimality properties in traditional multi-hop network (monotonicity and isotonicity) are no longer valid and derive a new set of sufficient conditions for optimality.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115454303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2015 IEEE Conference on Computer Communications (INFOCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1