首页 > 最新文献

2015 IEEE Conference on Computer Communications (INFOCOM)最新文献

英文 中文
Robust geometric forest routing with tunable load balancing 具有可调负载平衡的鲁棒几何森林路由
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218515
Rein Houthooft, Sahel Sahhaf, W. Tavernier, F. Turck, D. Colle, M. Pickavet
Although geometric routing is proposed as a memory-efficient alternative to traditional lookup-based routing and forwarding algorithms, it still lacks: (i) adequate mechanisms to trade stretch against load balancing, and (ii) robustness to cope with network topology change. The main contribution of this paper involves the proposal of a family of routing schemes, called Forest Routing. These are based on the principles of geometric routing, adding flexibility in its load balancing characteristics. This is achieved by using an aggregation of greedy embeddings along with a configurable distance function. Incorporating link load information in the forwarding layer enables load balancing behavior while still attaining low path stretch. In addition, the proposed schemes are validated regarding their resilience towards network failures.
尽管几何路由被提出作为传统的基于查找的路由和转发算法的内存效率替代方案,但它仍然缺乏:(i)足够的机制来交易负载平衡的拉伸,以及(ii)应对网络拓扑变化的鲁棒性。本文的主要贡献是提出了一组路由方案,称为森林路由。这些都是基于几何路由的原则,增加了负载平衡特性的灵活性。这是通过使用贪婪嵌入的聚合以及可配置的距离函数来实现的。在转发层中合并链路负载信息可以实现负载平衡行为,同时仍然可以获得低路径拉伸。此外,所提出的方案对网络故障的恢复能力进行了验证。
{"title":"Robust geometric forest routing with tunable load balancing","authors":"Rein Houthooft, Sahel Sahhaf, W. Tavernier, F. Turck, D. Colle, M. Pickavet","doi":"10.1109/INFOCOM.2015.7218515","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218515","url":null,"abstract":"Although geometric routing is proposed as a memory-efficient alternative to traditional lookup-based routing and forwarding algorithms, it still lacks: (i) adequate mechanisms to trade stretch against load balancing, and (ii) robustness to cope with network topology change. The main contribution of this paper involves the proposal of a family of routing schemes, called Forest Routing. These are based on the principles of geometric routing, adding flexibility in its load balancing characteristics. This is achieved by using an aggregation of greedy embeddings along with a configurable distance function. Incorporating link load information in the forwarding layer enables load balancing behavior while still attaining low path stretch. In addition, the proposed schemes are validated regarding their resilience towards network failures.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128468718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems TR-MABE:白盒可追溯和可撤销的基于多权威属性的加密及其在多级隐私保护电子医疗云计算系统中的应用
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218628
Jun Zhou, Z. Cao, Xiaolei Dong, Xiaodong Lin
Cloud-assisted e-healthcare systems significantly facilitate the patients to outsource their personal health information (PHI) for medical treatment of high quality and efficiency. Unfortunately, a series of unaddressed security and privacy issues dramatically impede its practicability and popularity. In e-healthcare systems, it is expected that only the primary physicians responsible for the patients treatment can not only access the PHI content but verify the real identity of the patient. Secondary physicians participating in medical consultation and/or research tasks, however, are only permitted to view or use the content of the protected PHI, while unauthorized entities cannot obtain anything. Existing work mainly focuses on patients conditional identity privacy by exploiting group signatures, which are very computationally costly. In this paper, we propose a white-box traceable and revocable multi-authority attribute-based encryption named TR-MABE to efficiently achieve multilevel privacy preservation without introducing additional special signatures. It can efficiently prevent secondary physicians from knowing the patients identity. Also, it can efficiently track the physicians who leak secret keys used to protect patients identity and PHI. Finally, formal security proof and extensive simulations demonstrate the effectiveness and practicability of our proposed TR-MABE in e-healthcare cloud computing systems.
云辅助的电子医疗保健系统极大地促进了患者将其个人健康信息(PHI)外包,以获得高质量和高效率的医疗。不幸的是,一系列未解决的安全和隐私问题极大地阻碍了它的实用性和普及。在电子医疗保健系统中,预计只有负责患者治疗的初级医生才能访问PHI内容,还可以验证患者的真实身份。然而,参与医疗咨询和/或研究任务的二级医生只允许查看或使用受保护的PHI的内容,而未经授权的实体不能获取任何内容。现有的工作主要集中在利用群签名实现患者有条件的身份隐私,计算成本非常高。为了在不引入额外的特殊签名的情况下有效地实现多级隐私保护,本文提出了一种基于白盒可追溯和可撤销的多权威属性加密算法TR-MABE。它可以有效地防止二级医生对患者身份的了解。此外,它还可以有效地跟踪泄露用于保护患者身份和PHI的密钥的医生。最后,正式的安全证明和广泛的仿真证明了我们提出的TR-MABE在电子医疗云计算系统中的有效性和实用性。
{"title":"TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems","authors":"Jun Zhou, Z. Cao, Xiaolei Dong, Xiaodong Lin","doi":"10.1109/INFOCOM.2015.7218628","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218628","url":null,"abstract":"Cloud-assisted e-healthcare systems significantly facilitate the patients to outsource their personal health information (PHI) for medical treatment of high quality and efficiency. Unfortunately, a series of unaddressed security and privacy issues dramatically impede its practicability and popularity. In e-healthcare systems, it is expected that only the primary physicians responsible for the patients treatment can not only access the PHI content but verify the real identity of the patient. Secondary physicians participating in medical consultation and/or research tasks, however, are only permitted to view or use the content of the protected PHI, while unauthorized entities cannot obtain anything. Existing work mainly focuses on patients conditional identity privacy by exploiting group signatures, which are very computationally costly. In this paper, we propose a white-box traceable and revocable multi-authority attribute-based encryption named TR-MABE to efficiently achieve multilevel privacy preservation without introducing additional special signatures. It can efficiently prevent secondary physicians from knowing the patients identity. Also, it can efficiently track the physicians who leak secret keys used to protect patients identity and PHI. Finally, formal security proof and extensive simulations demonstrate the effectiveness and practicability of our proposed TR-MABE in e-healthcare cloud computing systems.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128381952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Latency-aware rate adaptation in 802.11n home networks 802.11n家庭网络中的延迟感知速率适应
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218505
Chi-Yu Li, Chunyi Peng, Songwu Lu, Xinbing Wang, Ranveer Chandra
Latency-sensitive applications (e.g., wireless gaming and TV remote play) are increasingly popular in home WiFi networks. Such millisecond-level latency requirements call for new fine-grained approaches at the link layer. In this paper, we show that current solutions work well for throughput but not for latency due to the long tail of the packet delay distribution. We thus propose LLRA, a new latency-aware rate adaptation scheme that reduces the tail latency for delay-sensitive applications. LLRA takes concerted design in rate control, frame aggregation scheduling and software/hardware retransmission dispatching. Our implementation and evaluation confirm the viability of LLRA in 802.11n home networks.
对延迟敏感的应用(例如,无线游戏和电视远程播放)在家庭WiFi网络中越来越受欢迎。这种毫秒级的延迟需求需要在链路层采用新的细粒度方法。在本文中,我们证明了当前的解决方案在吞吐量方面工作得很好,但由于数据包延迟分布的长尾而不能解决延迟问题。因此,我们提出了一种新的延迟感知速率自适应方案LLRA,它可以减少延迟敏感应用的尾部延迟。LLRA在速率控制、帧聚合调度和软/硬件重传调度等方面进行了协同设计。我们的实施和评估证实了LLRA在802.11n家庭网络中的可行性。
{"title":"Latency-aware rate adaptation in 802.11n home networks","authors":"Chi-Yu Li, Chunyi Peng, Songwu Lu, Xinbing Wang, Ranveer Chandra","doi":"10.1109/INFOCOM.2015.7218505","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218505","url":null,"abstract":"Latency-sensitive applications (e.g., wireless gaming and TV remote play) are increasingly popular in home WiFi networks. Such millisecond-level latency requirements call for new fine-grained approaches at the link layer. In this paper, we show that current solutions work well for throughput but not for latency due to the long tail of the packet delay distribution. We thus propose LLRA, a new latency-aware rate adaptation scheme that reduces the tail latency for delay-sensitive applications. LLRA takes concerted design in rate control, frame aggregation scheduling and software/hardware retransmission dispatching. Our implementation and evaluation confirm the viability of LLRA in 802.11n home networks.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129536174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
WRH-ONoC: A wavelength-reused hierarchical architecture for optical Network on Chips WRH-ONoC:一种波长复用的片上光网络分层架构
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218574
Feiyang Liu, Haibo Zhang, Yawen Chen, Zhiyi Huang, Huaxi Gu
Optical Network on Chip (ONoC) is a promising technology for the next-generation many-core chip multiprocessors owing to its tremendous advantages in low power consumption, low communication delay, and high bandwidth. In this paper we present WRH-ONoC, a novel wavelength-reused hierarchical architecture that is capable of interconnecting thousands of cores using a limited number of wavelengths while providing extremely high-throughput data communication between connected cores. In WRH-ONoC, the cores are divided into small subsystems that are interconnected using multiple λ-routers and gateways in a hierarchical manner. Each λ-router can provide non-blocking parallel communication among the directly connected cores or gateways, and all λ-routers can reuse the limited number of available wavelengths. Communications between cores in different subsystems are routed via gateways in which optical signals can change their wavelengths via optical-electrical signal conversions. For a given number of cores, we give the minimum number of levels, λ-routers, and gateways required to interconnect these cores, and derive the expected end-to-end data communication delay under the Uniform-Poisson traffic pattern. Both theoretical analysis and simulation results demonstrate that WRH-ONoC can achieve significant improvement on performance and reduction on hardware cost in comparison with the existing solutions.
光片上网络(ONoC)以其低功耗、低通信延迟和高带宽等优点,成为下一代多核芯片多处理器的发展方向。在本文中,我们提出了WRH-ONoC,这是一种新颖的波长重用分层架构,能够使用有限数量的波长互连数千个核心,同时在连接的核心之间提供极高吞吐量的数据通信。在WRH-ONoC中,核心被分成小的子系统,这些子系统使用多个λ路由器和网关以分层方式互连。每个λ路由器都可以在直接连接的核心或网关之间提供无阻塞并行通信,并且所有λ路由器都可以重用有限数量的可用波长。不同子系统核心之间的通信通过网关路由,其中光信号可以通过光电信号转换改变其波长。对于给定数量的核心,我们给出了互连这些核心所需的最小级别,λ路由器和网关数量,并推导出均匀泊松流量模式下预期的端到端数据通信延迟。理论分析和仿真结果表明,与现有方案相比,WRH-ONoC方案在性能和硬件成本方面都有显著提高。
{"title":"WRH-ONoC: A wavelength-reused hierarchical architecture for optical Network on Chips","authors":"Feiyang Liu, Haibo Zhang, Yawen Chen, Zhiyi Huang, Huaxi Gu","doi":"10.1109/INFOCOM.2015.7218574","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218574","url":null,"abstract":"Optical Network on Chip (ONoC) is a promising technology for the next-generation many-core chip multiprocessors owing to its tremendous advantages in low power consumption, low communication delay, and high bandwidth. In this paper we present WRH-ONoC, a novel wavelength-reused hierarchical architecture that is capable of interconnecting thousands of cores using a limited number of wavelengths while providing extremely high-throughput data communication between connected cores. In WRH-ONoC, the cores are divided into small subsystems that are interconnected using multiple λ-routers and gateways in a hierarchical manner. Each λ-router can provide non-blocking parallel communication among the directly connected cores or gateways, and all λ-routers can reuse the limited number of available wavelengths. Communications between cores in different subsystems are routed via gateways in which optical signals can change their wavelengths via optical-electrical signal conversions. For a given number of cores, we give the minimum number of levels, λ-routers, and gateways required to interconnect these cores, and derive the expected end-to-end data communication delay under the Uniform-Poisson traffic pattern. Both theoretical analysis and simulation results demonstrate that WRH-ONoC can achieve significant improvement on performance and reduction on hardware cost in comparison with the existing solutions.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129674271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Low-delay distributed source coding for time-varying sources with unknown statistics 具有未知统计量的时变源的低延迟分布式源编码
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218447
Fangzhou Chen, Bin Li, C. E. Koksal
We consider a system in which two nodes take correlated measurements of a random source with time-varying and unknown statistics. The observations of the source at the first node are to be losslessly replicated with a given probability of outage at the second node, which receives data from the first node over a constant-rate channel. We develop a system and associated strategies for joint distributed source coding (encoding and decoding) and transmission control in order to achieve low end-to-end delay. Slepian-Wolf coding in its traditional form cannot be applied in our scenario, since the encoder requires the joint statistics of the observations and the associated decoding delay is very high. We analytically evaluate the performance of our strategies and show that the delay achieved by them are order optimal, as the conditional entropy of the source approaches to the channel rate. We also evaluate the performance of our algorithms based on real-world experiments using two cameras recording videos of a scene at different angles. Having realized our schemes, we demonstrated that, even with a very low-complexity quantizer, a compression ratio of approximately 50% is achievable for lossless replication at the decoder, at an average delay of a few seconds.
我们考虑一个系统,其中两个节点对具有时变和未知统计量的随机源进行相关测量。在给定第二个节点的中断概率下,将无损地复制第一个节点上的源的观测值,第二个节点通过恒定速率通道接收来自第一个节点的数据。为了实现低端到端延迟,我们开发了一个联合分布式源编码(编码和解码)和传输控制的系统和相关策略。传统形式的睡狼编码不能应用于我们的场景,因为编码器需要对观察结果进行联合统计,并且相关的解码延迟非常高。我们分析地评估了我们的策略的性能,并表明它们所实现的延迟是阶最优的,因为源的条件熵接近信道速率。我们还评估了基于真实世界实验的算法的性能,使用两台摄像机从不同角度记录场景的视频。在实现了我们的方案之后,我们证明,即使使用非常低复杂度的量化器,在解码器中也可以实现大约50%的压缩比,以平均几秒钟的延迟进行无损复制。
{"title":"Low-delay distributed source coding for time-varying sources with unknown statistics","authors":"Fangzhou Chen, Bin Li, C. E. Koksal","doi":"10.1109/INFOCOM.2015.7218447","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218447","url":null,"abstract":"We consider a system in which two nodes take correlated measurements of a random source with time-varying and unknown statistics. The observations of the source at the first node are to be losslessly replicated with a given probability of outage at the second node, which receives data from the first node over a constant-rate channel. We develop a system and associated strategies for joint distributed source coding (encoding and decoding) and transmission control in order to achieve low end-to-end delay. Slepian-Wolf coding in its traditional form cannot be applied in our scenario, since the encoder requires the joint statistics of the observations and the associated decoding delay is very high. We analytically evaluate the performance of our strategies and show that the delay achieved by them are order optimal, as the conditional entropy of the source approaches to the channel rate. We also evaluate the performance of our algorithms based on real-world experiments using two cameras recording videos of a scene at different angles. Having realized our schemes, we demonstrated that, even with a very low-complexity quantizer, a compression ratio of approximately 50% is achievable for lossless replication at the decoder, at an average delay of a few seconds.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124179849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Measuring the mixing time of a network 测量网络的混合时间
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218667
Xenofon Foukas, Antonio Carzaniga, A. Wolf
Mixing time is a global property of a network that indicates how fast a random walk gains independence from its starting point. Mixing time is an essential parameter for many distributed algorithms, but especially those based on gossip. We design, implement, and evaluate a distributed protocol to measure mixing time. The protocol extends an existing algorithm that models the diffusion of information seen from each node in the network as the impulse response of a particular dynamic system. In its original formulation, the algorithm was susceptible to topology changes (or “churn”) and was evaluated only in simulation. Here we present a concrete implementation of an enhanced version of the algorithm that exploits multiple parallel runs to obtain a robust measurement, and evaluate it using a network testbed (Emulab) in combination with a peer-to-peer system (FreePastry) to assess both its performance and its ability to deal with network churn.
混合时间是网络的一个全局属性,它表示随机漫步从其起点获得独立性的速度有多快。混合时间是许多分布式算法的重要参数,尤其是基于八卦的分布式算法。我们设计、实现和评估一个分布式协议来测量混合时间。该协议扩展了现有的一种算法,该算法将网络中每个节点的信息扩散建模为特定动态系统的脉冲响应。在其原始公式中,该算法容易受到拓扑变化(或“搅动”)的影响,并且仅在模拟中进行了评估。在这里,我们提出了该算法的增强版本的具体实现,该算法利用多个并行运行来获得稳健的测量,并使用网络测试平台(Emulab)结合点对点系统(freepaststry)来评估其性能和处理网络流失的能力。
{"title":"Measuring the mixing time of a network","authors":"Xenofon Foukas, Antonio Carzaniga, A. Wolf","doi":"10.1109/INFOCOM.2015.7218667","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218667","url":null,"abstract":"Mixing time is a global property of a network that indicates how fast a random walk gains independence from its starting point. Mixing time is an essential parameter for many distributed algorithms, but especially those based on gossip. We design, implement, and evaluate a distributed protocol to measure mixing time. The protocol extends an existing algorithm that models the diffusion of information seen from each node in the network as the impulse response of a particular dynamic system. In its original formulation, the algorithm was susceptible to topology changes (or “churn”) and was evaluated only in simulation. Here we present a concrete implementation of an enhanced version of the algorithm that exploits multiple parallel runs to obtain a robust measurement, and evaluate it using a network testbed (Emulab) in combination with a peer-to-peer system (FreePastry) to assess both its performance and its ability to deal with network churn.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127746514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling repeating behaviors in packet arrivals: Detection and measurement 数据包到达中的重复行为建模:检测和测量
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218635
Jianfeng Li, Jing Tao, Xiaobo Ma, Junjie Zhang, X. Guan
With the growing stickiness of the Internet, numerous automated programs running in terminal facilities (e.g., laptops) tend to keep closely connected to the Internet by repetitively interacting with remote services. It is of fundamental importance to study such repeating behaviors of automated programs in areas like traffic engineering and network monitoring. This paper focuses on repeating behaviors in packet arrivals that are of interest, aiming at a hierarchical characterization of packet arrivals, detection methods and quantitative metrics. To this end, we present a structure-oriented characterization of packet arrivals, which reflects the temporal structure of repeating behaviors at different scales. Based on such characterization, a repeating behavior detection method is proposed by leveraging online-learning prediction, and two novel metrics of repeating behaviors are proposed from different aspects. In addition, a denoising method is developed to enhance the noise-tolerant capability of detection and measurement in face of noises. Experimental results based on real-world traces demonstrate the effectiveness of our proposed approaches in automated program behavior detection and behavioral botnet analysis.
随着互联网的黏性越来越强,在终端设备(如笔记本电脑)上运行的许多自动化程序倾向于通过与远程服务重复交互来保持与互联网的紧密连接。研究自动化程序的这种重复行为在交通工程和网络监控等领域具有重要的基础意义。本文关注的是数据包到达过程中的重复行为,旨在对数据包到达进行分层表征、检测方法和定量度量。为此,我们提出了一个面向结构的数据包到达表征,它反映了不同尺度上重复行为的时间结构。在此基础上,提出了一种利用在线学习预测的重复行为检测方法,并从不同角度提出了两个新的重复行为度量标准。在此基础上,提出了一种去噪方法,提高了检测测量系统在噪声环境下的抗噪能力。基于真实世界痕迹的实验结果证明了我们提出的方法在自动程序行为检测和行为僵尸网络分析中的有效性。
{"title":"Modeling repeating behaviors in packet arrivals: Detection and measurement","authors":"Jianfeng Li, Jing Tao, Xiaobo Ma, Junjie Zhang, X. Guan","doi":"10.1109/INFOCOM.2015.7218635","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218635","url":null,"abstract":"With the growing stickiness of the Internet, numerous automated programs running in terminal facilities (e.g., laptops) tend to keep closely connected to the Internet by repetitively interacting with remote services. It is of fundamental importance to study such repeating behaviors of automated programs in areas like traffic engineering and network monitoring. This paper focuses on repeating behaviors in packet arrivals that are of interest, aiming at a hierarchical characterization of packet arrivals, detection methods and quantitative metrics. To this end, we present a structure-oriented characterization of packet arrivals, which reflects the temporal structure of repeating behaviors at different scales. Based on such characterization, a repeating behavior detection method is proposed by leveraging online-learning prediction, and two novel metrics of repeating behaviors are proposed from different aspects. In addition, a denoising method is developed to enhance the noise-tolerant capability of detection and measurement in face of noises. Experimental results based on real-world traces demonstrate the effectiveness of our proposed approaches in automated program behavior detection and behavioral botnet analysis.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132133644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Approximation algorithm for minimum weight fault-tolerant virtual backbone in homogeneous wireless sensor network 均匀无线传感器网络中最小权值容错虚拟骨干的近似算法
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218481
Zhao Zhang, Yishuo Shi
In a wireless sensor network, the virtual backbone plays an important role. Due to accidental damage or energy depletion, it is desirable that the virtual backbone is fault-tolerant. Such a consideration leads to the problem of finding a minimum weight k-connected m-fold dominating set ((k, m)-MWCDS for short). In this paper, we give an (α + 2.5ρ)-approximation for (2, m)-MWCDS with m ≥ 2 in unit disk graph, where α is the performance ratio for the minimum weight m-fold dominating set problem, and ρ is the performance ratio for the {0,1,2}-Steiner Network Design problem. In view of currently best known ratios for α and ρ, (2, m)-MWCDS has a (9 + ε)-approximation for m ≥ 3 and a (8 + ε)-approximation for m =2, where ε is an arbitrary positive real number.
在无线传感器网络中,虚拟骨干网起着重要的作用。由于意外损坏或能量耗尽,希望虚拟骨干网具有容错性。这样的考虑导致了寻找最小权值k连接m-fold控制集(简称(k, m)-MWCDS)的问题。本文给出了单元磁盘图中(2,m)- m≥2的mwcds的(α + 2.5ρ)-近似,其中α是最小权值m-fold支配集问题的性能比,ρ是{0,1,2}-Steiner网络设计问题的性能比。鉴于目前已知的α和ρ的比值,(2,m)-MWCDS对于m≥3具有(9 + ε)近似,对于m =2具有(8 + ε)近似,其中ε是任意正实数。
{"title":"Approximation algorithm for minimum weight fault-tolerant virtual backbone in homogeneous wireless sensor network","authors":"Zhao Zhang, Yishuo Shi","doi":"10.1109/INFOCOM.2015.7218481","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218481","url":null,"abstract":"In a wireless sensor network, the virtual backbone plays an important role. Due to accidental damage or energy depletion, it is desirable that the virtual backbone is fault-tolerant. Such a consideration leads to the problem of finding a minimum weight k-connected m-fold dominating set ((k, m)-MWCDS for short). In this paper, we give an (α + 2.5ρ)-approximation for (2, m)-MWCDS with m ≥ 2 in unit disk graph, where α is the performance ratio for the minimum weight m-fold dominating set problem, and ρ is the performance ratio for the {0,1,2}-Steiner Network Design problem. In view of currently best known ratios for α and ρ, (2, m)-MWCDS has a (9 + ε)-approximation for m ≥ 3 and a (8 + ε)-approximation for m =2, where ε is an arbitrary positive real number.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"168 1-2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132463682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy-efficient transmission with data sharing 具有数据共享的节能传输
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218369
Weiwei Wu, Jianping Wang, Minming Li, Kai Liu, Junzhou Luo
In a wireless system, when multiple applications can share data transmitted by rate-adaptive wireless devices, there exists a trade-off between transmission redundancy and energy efficiency. This paper conducts the first theoretical analysis on such a trade-off. We formulate the problem as a bi-objective optimization problem to simultaneously minimize the transmission redundancy and the energy consumption. In the offline setting that the full information is known in advance, we provide optimal algorithms for the bi-objective optimization problem. In the online setting, we provide an online algorithm with proven performance bound to approximate the optimal solution without relying on any assumed distribution or future information. The proposed online algorithm is proved O(ln T)-competitive with respect to transmission redundancy and also O(ln T)-competitive with respect to energy consumption, where T is the number of time slots. That is, the output of the algorithm always approximates the optimal solution within a logarithmic factor over all possible inputs. Our simulation results further validate the efficiency of our online algorithm.
在无线系统中,当多个应用程序可以共享由速率自适应无线设备传输的数据时,需要在传输冗余和能源效率之间进行权衡。本文首次对这种权衡进行了理论分析。我们将该问题表述为同时最小化传输冗余和能耗的双目标优化问题。在预先知道全部信息的离线环境下,我们给出了双目标优化问题的最优算法。在在线设置中,我们提供了一种在线算法,该算法具有经过验证的性能,可以在不依赖任何假设分布或未来信息的情况下近似最优解。所提出的在线算法在传输冗余度方面具有O(ln T)竞争,在能耗方面也具有O(ln T)竞争,其中T为时隙数。也就是说,算法的输出总是在所有可能输入的对数因子范围内逼近最优解。仿真结果进一步验证了在线算法的有效性。
{"title":"Energy-efficient transmission with data sharing","authors":"Weiwei Wu, Jianping Wang, Minming Li, Kai Liu, Junzhou Luo","doi":"10.1109/INFOCOM.2015.7218369","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218369","url":null,"abstract":"In a wireless system, when multiple applications can share data transmitted by rate-adaptive wireless devices, there exists a trade-off between transmission redundancy and energy efficiency. This paper conducts the first theoretical analysis on such a trade-off. We formulate the problem as a bi-objective optimization problem to simultaneously minimize the transmission redundancy and the energy consumption. In the offline setting that the full information is known in advance, we provide optimal algorithms for the bi-objective optimization problem. In the online setting, we provide an online algorithm with proven performance bound to approximate the optimal solution without relying on any assumed distribution or future information. The proposed online algorithm is proved O(ln T)-competitive with respect to transmission redundancy and also O(ln T)-competitive with respect to energy consumption, where T is the number of time slots. That is, the output of the algorithm always approximates the optimal solution within a logarithmic factor over all possible inputs. Our simulation results further validate the efficiency of our online algorithm.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130072029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Socially-optimal online spectrum auctions for secondary wireless communication 二级无线通信的社会最优在线频谱拍卖
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218589
Hongxing Li, Chuan Wu, Zongpeng Li
Spectrum auctions are efficient mechanisms for licensed users to relinquish their under-utilized spectrum to secondary links for monetary remuneration. Truthfulness and social welfare maximization are two natural goals in such auctions, but cannot be achieved simultaneously with polynomial-time complexity by existing methods, even in a static network with fixed parameters. The challenge escalates in practical systems with QoS requirements and volatile traffic demands for secondary communication. Online, dynamic decisions are required for rate control, channel evaluation/bidding, and packet dropping at each secondary link, as well as for winner determination and pricing at the primary user. This work proposes an online spectrum auction framework with cross-layer decision making and randomized winner determination on the fly. The framework is truthful-in-expectation, and achieves close-to-offline-optimal time-averaged social welfare and individual utilities with polynomial time complexity. A new method is introduced for online channel evaluation in a stochastic setting. Simulation studies further verify the efficacy of the proposed auction in practical scenarios.
频谱拍卖是一种有效的机制,让持牌用户将其未充分利用的频谱让与二级链路,以换取金钱报酬。真实性和社会福利最大化是这类拍卖的两个自然目标,但现有方法无法以多项式时间复杂度同时实现,即使在具有固定参数的静态网络中也是如此。在实际系统中,由于对二次通信的QoS要求和不稳定的流量需求,这一挑战不断升级。在线上,需要动态决策来控制速率、通道评估/竞标和每个次要链路的数据包丢弃,以及主要用户的赢家确定和定价。本文提出了一个在线频谱拍卖框架,该框架具有跨层决策和随机赢家的动态确定。该框架符合预期,以多项式时间复杂度实现接近离线最优的时间平均社会福利和个人效用。介绍了一种随机环境下在线渠道评估的新方法。仿真研究进一步验证了所提出的拍卖在实际场景中的有效性。
{"title":"Socially-optimal online spectrum auctions for secondary wireless communication","authors":"Hongxing Li, Chuan Wu, Zongpeng Li","doi":"10.1109/INFOCOM.2015.7218589","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218589","url":null,"abstract":"Spectrum auctions are efficient mechanisms for licensed users to relinquish their under-utilized spectrum to secondary links for monetary remuneration. Truthfulness and social welfare maximization are two natural goals in such auctions, but cannot be achieved simultaneously with polynomial-time complexity by existing methods, even in a static network with fixed parameters. The challenge escalates in practical systems with QoS requirements and volatile traffic demands for secondary communication. Online, dynamic decisions are required for rate control, channel evaluation/bidding, and packet dropping at each secondary link, as well as for winner determination and pricing at the primary user. This work proposes an online spectrum auction framework with cross-layer decision making and randomized winner determination on the fly. The framework is truthful-in-expectation, and achieves close-to-offline-optimal time-averaged social welfare and individual utilities with polynomial time complexity. A new method is introduced for online channel evaluation in a stochastic setting. Simulation studies further verify the efficacy of the proposed auction in practical scenarios.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131761092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
2015 IEEE Conference on Computer Communications (INFOCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1