首页 > 最新文献

2015 IEEE Conference on Computer Communications (INFOCOM)最新文献

英文 中文
HybridCast: Joint multicast-unicast design for multiuser MIMO networks HybridCast:多用户MIMO网络的联合多播-单播设计
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218553
Bo-Xian Wu, K. Lin, Kai-Cheng Hsu, Hung-Yu Wei
Multi-user MIMO (MU-MIMO) has recently been specified in wireless standards, e.g., LTE-Advance and 802.11ac, to allow an access point (AP) to transmit multiple unicast streams simultaneously to different clients. These protocols however have no specific mechanism for multicasting. Existing systems hence simply allow a single multicast transmission, as a result underutilizing the AP's multiple antennas. Even worse, in most of systems, multicast is by default sent at the base rate, wasting a considerable link margin available for delivering extra information. To address this inefficiency, we present the design and implementation of HybridCast, a MU-MIMO system that enables joint unicast and multicast. HybridCast efficiently leverages the unused MIMO capability and link margin to send unicast streams concurrently with a multicast session, while ensuring not to harm the achievable rate of multicasting. We evaluate the performance of HybridCast via both testbed experiments and simulations. The results show that HybridCast always outperforms single multicast transmission. The average throughput gain for 4-antenna AP scenarios is 6.22× and 1.54× when multicast is sent at the base rate and the best rate of the bottleneck receiver, respectively.
多用户MIMO (MU-MIMO)最近被指定在无线标准中,例如LTE-Advance和802.11ac,以允许接入点(AP)同时向不同的客户端传输多个单播流。然而,这些协议没有特定的多播机制。因此,现有的系统只允许单组播传输,导致AP的多天线利用率不足。更糟糕的是,在大多数系统中,缺省情况下多播是按基本速率发送的,这浪费了大量可用于传递额外信息的链路余量。为了解决这种低效率问题,我们提出了HybridCast的设计和实现,这是一种允许联合单播和多播的MU-MIMO系统。HybridCast有效地利用了未使用的MIMO能力和链路余量,在发送多播会话的同时发送单播流,同时确保不损害可实现的多播速率。我们通过试验台实验和仿真来评估HybridCast的性能。结果表明,HybridCast总优于单组播传输。在4天线AP场景中,以瓶颈接收端的基本速率和最佳速率发送组播时,平均吞吐量增益分别为6.22倍和1.54倍。
{"title":"HybridCast: Joint multicast-unicast design for multiuser MIMO networks","authors":"Bo-Xian Wu, K. Lin, Kai-Cheng Hsu, Hung-Yu Wei","doi":"10.1109/INFOCOM.2015.7218553","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218553","url":null,"abstract":"Multi-user MIMO (MU-MIMO) has recently been specified in wireless standards, e.g., LTE-Advance and 802.11ac, to allow an access point (AP) to transmit multiple unicast streams simultaneously to different clients. These protocols however have no specific mechanism for multicasting. Existing systems hence simply allow a single multicast transmission, as a result underutilizing the AP's multiple antennas. Even worse, in most of systems, multicast is by default sent at the base rate, wasting a considerable link margin available for delivering extra information. To address this inefficiency, we present the design and implementation of HybridCast, a MU-MIMO system that enables joint unicast and multicast. HybridCast efficiently leverages the unused MIMO capability and link margin to send unicast streams concurrently with a multicast session, while ensuring not to harm the achievable rate of multicasting. We evaluate the performance of HybridCast via both testbed experiments and simulations. The results show that HybridCast always outperforms single multicast transmission. The average throughput gain for 4-antenna AP scenarios is 6.22× and 1.54× when multicast is sent at the base rate and the best rate of the bottleneck receiver, respectively.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131851862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
TagBooth: Deep shopping data acquisition powered by RFID tags 标签展位:由RFID标签驱动的深度购物数据采集
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218547
Tianci Liu, Lei Yang, Xiangyang Li, Huaiyi Huang, Yunhao Liu
To stay competitive, plenty of data mining techniques have been introduced to help stores better understand consumers' behaviors. However, these studies are generally confined within the customer transaction data. Actually, another kind of `deep shopping data', e.g. which and why goods receiving much attention are not purchased, offers much more valuable information to boost the product design. Unfortunately, these data are totally ignored in legacy systems. This paper introduces an innovative system, called TagBooth, to detect commodities' motion and further discover customers' behaviors, using COTS RFID devices. We first exploit the motion of tagged commodities by leveraging physical-layer information, like phase and RSS, and then design a comprehensive solution to recognize customers' actions. The system has been tested extensively in the lab environment and used for half a year in real retail store. As a result, TagBooth generally performs well to acquire deep shopping data with high accuracy.
为了保持竞争力,大量的数据挖掘技术已经被引入,以帮助商店更好地了解消费者的行为。然而,这些研究通常局限于客户交易数据。实际上,另一种“深度购物数据”,例如,哪些受到关注的商品没有被购买,以及为什么没有被购买,为推动产品设计提供了更有价值的信息。不幸的是,这些数据在遗留系统中完全被忽略了。本文介绍了一个名为TagBooth的创新系统,该系统使用COTS RFID设备来检测商品的运动并进一步发现顾客的行为。我们首先利用相位、RSS等物理层信息来挖掘标签商品的运动,然后设计一个全面的解决方案来识别顾客的行为。该系统已在实验室环境中进行了广泛的测试,并在实际零售商店中使用了半年。因此,TagBooth在获取深度购物数据方面普遍表现良好,准确率较高。
{"title":"TagBooth: Deep shopping data acquisition powered by RFID tags","authors":"Tianci Liu, Lei Yang, Xiangyang Li, Huaiyi Huang, Yunhao Liu","doi":"10.1109/INFOCOM.2015.7218547","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218547","url":null,"abstract":"To stay competitive, plenty of data mining techniques have been introduced to help stores better understand consumers' behaviors. However, these studies are generally confined within the customer transaction data. Actually, another kind of `deep shopping data', e.g. which and why goods receiving much attention are not purchased, offers much more valuable information to boost the product design. Unfortunately, these data are totally ignored in legacy systems. This paper introduces an innovative system, called TagBooth, to detect commodities' motion and further discover customers' behaviors, using COTS RFID devices. We first exploit the motion of tagged commodities by leveraging physical-layer information, like phase and RSS, and then design a comprehensive solution to recognize customers' actions. The system has been tested extensively in the lab environment and used for half a year in real retail store. As a result, TagBooth generally performs well to acquire deep shopping data with high accuracy.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131903557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
On setting-up asynchronous ad hoc wireless networks 关于异步自组织无线网络的建立
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218605
T. Jurdzinski, D. Kowalski, M. Różański, Grzegorz Stachowiak
This paper studies the task of setting up ad hoc wireless networks. In such networks, it is often the case that nodes become active at different times, without coordination or knowledge about network topology. We consider the following tasks: wake-up, clock synchronization, leader election, and multimessage broadcast. We show how to achieve these goals in scalable O(D polylog(n)) time. As a tool we define and give a solution to a quasi-backbone problem, which aims to set up transmission probabilities at nodes in a way that they can be efficiently used to solve other tasks. Our results are obtained by minimalistic algorithms, which do not require power control or carrier sensing capabilities, use very small energy, local computation and memory. Moreover, unlike many previous work, they remain scalable even if the network is not highly connected.
本文研究的任务是建立自组织无线网络。在这种网络中,节点在不同的时间处于活动状态,而不需要协调或了解网络拓扑。我们考虑了以下任务:唤醒、时钟同步、leader选举和多消息广播。我们将展示如何在可伸缩的O(D) polylog(n))时间内实现这些目标。作为一种工具,我们定义并给出了准骨干问题的解决方案,该问题旨在建立节点上的传输概率,使其能够有效地用于解决其他任务。我们的结果是通过极简算法获得的,它不需要功率控制或载波传感能力,使用非常小的能量,本地计算和内存。此外,与许多以前的工作不同,即使网络不是高度连接,它们也保持可扩展性。
{"title":"On setting-up asynchronous ad hoc wireless networks","authors":"T. Jurdzinski, D. Kowalski, M. Różański, Grzegorz Stachowiak","doi":"10.1109/INFOCOM.2015.7218605","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218605","url":null,"abstract":"This paper studies the task of setting up ad hoc wireless networks. In such networks, it is often the case that nodes become active at different times, without coordination or knowledge about network topology. We consider the following tasks: wake-up, clock synchronization, leader election, and multimessage broadcast. We show how to achieve these goals in scalable O(D polylog(n)) time. As a tool we define and give a solution to a quasi-backbone problem, which aims to set up transmission probabilities at nodes in a way that they can be efficiently used to solve other tasks. Our results are obtained by minimalistic algorithms, which do not require power control or carrier sensing capabilities, use very small energy, local computation and memory. Moreover, unlike many previous work, they remain scalable even if the network is not highly connected.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131917674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Price of fairness for opportunistic and priority schedulers 机会和优先级调度器的公平代价
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218488
Malhar Mehta, V. Kavitha, N. Hemachandra
When agents compete for common resource and when the utilities derived by them, upon allocation, are independent across the agents and time slots, an opportunistic scheduler is used. The instantaneous utility of one agent can be low, however few among many would have `good' utility with high probability. Opportunistic schedulers utilize these opportunities, allocate resource at any time to a `good' agent. Efficient schedulers maximize the sum of accumulated utilities. Thus, every time `best' agent is allocated. This can result in negligible (unfair) accumulations for some agents, whose instantaneous utilities are `low' with high probability. Fair opportunistic schedulers are thus introduced (e.g., alpha-fair schedulers). We study their price of fairness (PoF). We group the agents into finite classes, each class having identical utilities and QoS requirements. We study the asymptotic PoF as agents increase, while maintaining class-wise proportions constant. Asymptotic PoF is less than one, depends only upon the differences in the largest utilities of individual classes and is less than the maximum such normalized differences. The PoF is zero initially and increases with increase in fairness requirements to an upper bound strictly less than one. We observe that the fair schedulers are essentially priority schedulers, which facilitated easy analysis of PoF.
当代理竞争公共资源时,当它们在分配时派生的实用程序在代理和时间段之间是独立的时,就会使用机会调度程序。一个代理的瞬时效用可能很低,但在许多代理中很少有高概率具有“良好”效用。机会调度程序利用这些机会,随时将资源分配给“好的”代理。高效的调度器使累积的实用程序的总和最大化。因此,每次分配“最佳”代理。这可能导致一些代理的累积可以忽略不计(不公平),它们的瞬时效用很可能是“低”的。因此引入了公平机会调度器(例如,alpha-公平调度器)。我们研究了它们的公平价格(PoF)。我们将代理分成有限的类,每个类具有相同的实用程序和QoS需求。我们研究了智能体增加时的渐近PoF,同时保持类明智比例不变。渐近PoF小于1,仅取决于单个类的最大效用的差异,并且小于这种归一化差异的最大值。PoF最初为零,随着公平性要求的增加而增加,直到一个严格小于1的上界。我们观察到公平调度程序本质上是优先级调度程序,这便于分析PoF。
{"title":"Price of fairness for opportunistic and priority schedulers","authors":"Malhar Mehta, V. Kavitha, N. Hemachandra","doi":"10.1109/INFOCOM.2015.7218488","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218488","url":null,"abstract":"When agents compete for common resource and when the utilities derived by them, upon allocation, are independent across the agents and time slots, an opportunistic scheduler is used. The instantaneous utility of one agent can be low, however few among many would have `good' utility with high probability. Opportunistic schedulers utilize these opportunities, allocate resource at any time to a `good' agent. Efficient schedulers maximize the sum of accumulated utilities. Thus, every time `best' agent is allocated. This can result in negligible (unfair) accumulations for some agents, whose instantaneous utilities are `low' with high probability. Fair opportunistic schedulers are thus introduced (e.g., alpha-fair schedulers). We study their price of fairness (PoF). We group the agents into finite classes, each class having identical utilities and QoS requirements. We study the asymptotic PoF as agents increase, while maintaining class-wise proportions constant. Asymptotic PoF is less than one, depends only upon the differences in the largest utilities of individual classes and is less than the maximum such normalized differences. The PoF is zero initially and increases with increase in fairness requirements to an upper bound strictly less than one. We observe that the fair schedulers are essentially priority schedulers, which facilitated easy analysis of PoF.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134464555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fast RFID grouping protocols 快速RFID分组协议
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218578
Jia Liu, Bin Xiao, Shigang Chen, F. Zhu, Lijun Chen
In RFID systems, the grouping problem is to efficiently group all tags according to a given partition such that tags in the same group will have the same group ID. Unlike previous research on the unicast transmission from a reader to a tag, grouping provides a fundamental mechanism for efficient multicast transmissions and aggregate queries in large RFID-enabled applications. A message can be transmitted to a group of m tags simultaneously in multicast, which improves the efficiency by m times when comparing with unicast. We study fast grouping protocols in large RFID systems. To the best of our knowledge, it is the first attempt to tackle this practically important yet uninvestigated problem. We start with a straightforward solution called the Enhanced Polling Grouping (EPG) protocol. We then propose a time-efficient FIltering Grouping (FIG) protocol that uses Bloom filters to remove the costly ID transmissions. We point out the limitation of the Bloom-filter based solution due to its intrinsic false positive problem, which leads to our final ConCurrent Grouping (CCG) protocol. With a drastically different design, CCG is able to outperform FIG by exploiting collisions to inform multiple tags of their group ID simultaneously and by removing any wasteful slots in its frame-based execution. Simulation results demonstrate that our best protocol CCG can reduce the execution time by a factor of 11 when comparing with a baseline polling protocol.
在RFID系统中,分组问题是根据给定的分区对所有标签进行有效分组,使同一组中的标签具有相同的组ID。与以往对从阅读器到标签的单播传输的研究不同,分组为大型启用rfid的应用程序中的高效多播传输和聚合查询提供了基本机制。在组播中,一条消息可以同时传递给m个标签,与单播相比,效率提高了m倍。我们研究了大型RFID系统中的快速分组协议。据我们所知,这是第一次尝试解决这个实际重要但尚未研究的问题。我们从一个称为增强轮询分组(Enhanced Polling Grouping, EPG)协议的简单解决方案开始。然后,我们提出了一种时间效率高的过滤分组(FIG)协议,该协议使用布隆过滤器来去除昂贵的ID传输。本文指出了基于布隆过滤器的解决方案固有的假阳性问题的局限性,并由此得出了最终的并发分组(CCG)协议。通过完全不同的设计,CCG能够通过利用冲突来同时通知多个标签其组ID,并通过在其基于帧的执行中删除任何浪费的插槽,从而优于FIG。仿真结果表明,与基线轮询协议相比,我们的最佳协议CCG可以将执行时间减少11倍。
{"title":"Fast RFID grouping protocols","authors":"Jia Liu, Bin Xiao, Shigang Chen, F. Zhu, Lijun Chen","doi":"10.1109/INFOCOM.2015.7218578","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218578","url":null,"abstract":"In RFID systems, the grouping problem is to efficiently group all tags according to a given partition such that tags in the same group will have the same group ID. Unlike previous research on the unicast transmission from a reader to a tag, grouping provides a fundamental mechanism for efficient multicast transmissions and aggregate queries in large RFID-enabled applications. A message can be transmitted to a group of m tags simultaneously in multicast, which improves the efficiency by m times when comparing with unicast. We study fast grouping protocols in large RFID systems. To the best of our knowledge, it is the first attempt to tackle this practically important yet uninvestigated problem. We start with a straightforward solution called the Enhanced Polling Grouping (EPG) protocol. We then propose a time-efficient FIltering Grouping (FIG) protocol that uses Bloom filters to remove the costly ID transmissions. We point out the limitation of the Bloom-filter based solution due to its intrinsic false positive problem, which leads to our final ConCurrent Grouping (CCG) protocol. With a drastically different design, CCG is able to outperform FIG by exploiting collisions to inform multiple tags of their group ID simultaneously and by removing any wasteful slots in its frame-based execution. Simulation results demonstrate that our best protocol CCG can reduce the execution time by a factor of 11 when comparing with a baseline polling protocol.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133813112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Robust optimization of cognitive radio networks powered by energy harvesting 基于能量收集的认知无线网络鲁棒优化
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218429
Shimin Gong, Lingjie Duan, Ping Wang
We consider a cognitive radio network, where primary users (PUs) share their spectrum with energy harvesting (EH) enabled secondary users (SUs), conditioned on a limited SUs' interference at PU receivers. Due to the lack of information exchange between SUs and PUs, the SU-PU interference channels are subject to uncertainty in channel estimation. Besides channel uncertainty, SUs' EH profile is also subject to spatial and temporal variations, which enforce an energy causality constraint on SUs' transmit power control and affect SUs' interference at PU receivers. Considering both the channel and EH uncertainties, we propose a robust design for SUs' power control to maximize SUs' throughput performance. Our robust design targets at the worst-case interference constraint to provide a robust protection for PUs, while guarantees a transmission probability to reflect SUs' minimum QoS requirements. To make the non-convex throughput maximization problem tractable, we develop a convex approximation for each robust constraint and successfully design a successive approximation approach that converges to the global optimum of the throughput objective. Simulations show that SUs will change transmission strategies according to PUs' sensitivity to interference, and we also exploit the impact of SUs' EH profile (e.g., mean, variance, and correlation) on SUs' power control.
我们考虑了一个认知无线电网络,其中主用户(PU)与支持能量收集(EH)的辅助用户(su)共享其频谱,条件是su对PU接收器的干扰有限。由于SU-PU之间缺乏信息交换,SU-PU之间的干扰通道在信道估计中存在不确定性。除了信道的不确定性外,微源的EH分布也受到时空变化的影响,这对微源的发射功率控制施加了能量因果约束,并影响微源对PU接收器的干扰。考虑到通道和EH的不确定性,我们提出了一种稳健的su功率控制设计,以最大化su的吞吐量性能。我们的鲁棒设计以最坏干扰约束为目标,为pu提供鲁棒保护,同时保证传输概率反映su的最低QoS要求。为了使非凸吞吐量最大化问题易于处理,我们对每个鲁棒约束建立了一个凸逼近,并成功地设计了一个收敛到吞吐量目标全局最优的逐次逼近方法。仿真结果表明,微单元将根据微单元对干扰的敏感性改变传输策略,并利用微单元的EH分布(如均值、方差和相关性)对微单元功率控制的影响。
{"title":"Robust optimization of cognitive radio networks powered by energy harvesting","authors":"Shimin Gong, Lingjie Duan, Ping Wang","doi":"10.1109/INFOCOM.2015.7218429","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218429","url":null,"abstract":"We consider a cognitive radio network, where primary users (PUs) share their spectrum with energy harvesting (EH) enabled secondary users (SUs), conditioned on a limited SUs' interference at PU receivers. Due to the lack of information exchange between SUs and PUs, the SU-PU interference channels are subject to uncertainty in channel estimation. Besides channel uncertainty, SUs' EH profile is also subject to spatial and temporal variations, which enforce an energy causality constraint on SUs' transmit power control and affect SUs' interference at PU receivers. Considering both the channel and EH uncertainties, we propose a robust design for SUs' power control to maximize SUs' throughput performance. Our robust design targets at the worst-case interference constraint to provide a robust protection for PUs, while guarantees a transmission probability to reflect SUs' minimum QoS requirements. To make the non-convex throughput maximization problem tractable, we develop a convex approximation for each robust constraint and successfully design a successive approximation approach that converges to the global optimum of the throughput objective. Simulations show that SUs will change transmission strategies according to PUs' sensitivity to interference, and we also exploit the impact of SUs' EH profile (e.g., mean, variance, and correlation) on SUs' power control.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114546622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
On the efficiency-optimal Markov chains for distributed networking applications 分布式网络应用的效率最优马尔可夫链
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218566
Chul-Ho Lee, Do Young Eun
The Metropolis-Hastings (MH) algorithm, in addition to its application for Markov Chain Monte Carlo sampling or simulation, has been popularly used for constructing a random walk that achieves a given, desired stationary distribution over a graph. Applications include crawling-based sampling of large graphs or online social networks, statistical estimation or inference from massive scale of networked data, efficient searching algorithms in unstructured peer-to-peer networks, randomized routing and movement strategies in wireless sensor networks, to list a few. Despite its versatility, the MH algorithm often causes self-transitions of its resulting random walk at some nodes, which is not efficient in the sense of the Peskun ordering - a partial order between off-diagonal elements of transition matrices of two different Markov chains, and in turn results in deficient performance in terms of asymptotic variance of time averages and expected hitting times with slower speed of convergence. To alleviate this problem, we present simple yet effective distributed algorithms that are guaranteed to improve the MH algorithm over time when running on a graph, and eventually reach `efficiency-optimality', while ensuring the same desired stationary distribution throughout.
Metropolis-Hastings (MH)算法,除了用于马尔可夫链蒙特卡罗采样或模拟之外,还被广泛用于构造随机漫步,以在图上实现给定的、期望的平稳分布。应用包括基于爬行的大型图或在线社交网络采样,大规模网络数据的统计估计或推断,非结构化点对点网络中的高效搜索算法,无线传感器网络中的随机路由和移动策略,等等。尽管它的多功能性,MH算法经常导致其产生的随机游走在一些节点上的自转移,这在Peskun排序(两个不同马尔可夫链的转移矩阵的非对角元素之间的偏序)的意义上是不有效的,反过来导致时间平均的渐近方差和预期命中时间方面的性能不足,收敛速度较慢。为了缓解这个问题,我们提出了简单而有效的分布式算法,保证在图上运行时随着时间的推移改进MH算法,并最终达到“效率最优”,同时确保始终保持相同的期望平稳分布。
{"title":"On the efficiency-optimal Markov chains for distributed networking applications","authors":"Chul-Ho Lee, Do Young Eun","doi":"10.1109/INFOCOM.2015.7218566","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218566","url":null,"abstract":"The Metropolis-Hastings (MH) algorithm, in addition to its application for Markov Chain Monte Carlo sampling or simulation, has been popularly used for constructing a random walk that achieves a given, desired stationary distribution over a graph. Applications include crawling-based sampling of large graphs or online social networks, statistical estimation or inference from massive scale of networked data, efficient searching algorithms in unstructured peer-to-peer networks, randomized routing and movement strategies in wireless sensor networks, to list a few. Despite its versatility, the MH algorithm often causes self-transitions of its resulting random walk at some nodes, which is not efficient in the sense of the Peskun ordering - a partial order between off-diagonal elements of transition matrices of two different Markov chains, and in turn results in deficient performance in terms of asymptotic variance of time averages and expected hitting times with slower speed of convergence. To alleviate this problem, we present simple yet effective distributed algorithms that are guaranteed to improve the MH algorithm over time when running on a graph, and eventually reach `efficiency-optimality', while ensuring the same desired stationary distribution throughout.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123017907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Application-specific configuration selection in the cloud: Impact of provider policy and potential of systematic testing 云中特定于应用程序的配置选择:提供商策略的影响和系统测试的潜力
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218458
Mohammad Y. Hajjat, Ruiqi Liu, Yiyang Chang, T. Ng, Sanjay G. Rao
Provider policy (e.g., bandwidth rate limits, virtualization, CPU scheduling) can significantly impact application performance in cloud environments. This paper takes a first step towards understanding the impact of provider policy and tackling the complexity of selecting configurations that can best meet the cost and performance requirements of applications. We make three contributions. First, we conduct a measurement study spanning a 19 months period of a wide variety of applications on Amazon EC2 to understand issues involved in configuration selection. Our results show that provider policy can impact communication and computation performance in unpredictable ways. Moreover, seemingly sensible rules of thumb are inappropriate - e.g., VMs with latest hardware or larger VM sizes do not always provide the best performance. Second, we systematically characterize the overheads and resulting benefits of a range of testing strategies for configuration selection. A key focus of our characterization is understanding the overheads of a testing approach in the face of variability in performance across deployments and measurements. Finally, we present configuration pruning and short-listing techniques for minimizing testing overheads. Evaluations on a variety of compute, bandwidth and data intensive applications validate the effectiveness of these techniques in selecting good configurations with low overheads.
提供商策略(例如,带宽速率限制、虚拟化、CPU调度)可以显著影响云环境中的应用程序性能。本文为理解提供者策略的影响和解决选择最能满足应用程序成本和性能要求的配置的复杂性迈出了第一步。我们有三个贡献。首先,我们对Amazon EC2上的各种应用程序进行了为期19个月的度量研究,以了解配置选择中涉及的问题。我们的结果表明,提供者策略可以以不可预测的方式影响通信和计算性能。此外,看似合理的经验法则是不合适的——例如,具有最新硬件或更大虚拟机大小的虚拟机并不总是提供最佳性能。其次,我们系统地描述了用于配置选择的一系列测试策略的开销和由此产生的好处。我们描述的一个关键焦点是理解在面对跨部署和度量的性能可变性时测试方法的开销。最后,我们介绍了配置修剪和短列表技术,以最小化测试开销。对各种计算、带宽和数据密集型应用程序的评估验证了这些技术在选择低开销的良好配置方面的有效性。
{"title":"Application-specific configuration selection in the cloud: Impact of provider policy and potential of systematic testing","authors":"Mohammad Y. Hajjat, Ruiqi Liu, Yiyang Chang, T. Ng, Sanjay G. Rao","doi":"10.1109/INFOCOM.2015.7218458","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218458","url":null,"abstract":"Provider policy (e.g., bandwidth rate limits, virtualization, CPU scheduling) can significantly impact application performance in cloud environments. This paper takes a first step towards understanding the impact of provider policy and tackling the complexity of selecting configurations that can best meet the cost and performance requirements of applications. We make three contributions. First, we conduct a measurement study spanning a 19 months period of a wide variety of applications on Amazon EC2 to understand issues involved in configuration selection. Our results show that provider policy can impact communication and computation performance in unpredictable ways. Moreover, seemingly sensible rules of thumb are inappropriate - e.g., VMs with latest hardware or larger VM sizes do not always provide the best performance. Second, we systematically characterize the overheads and resulting benefits of a range of testing strategies for configuration selection. A key focus of our characterization is understanding the overheads of a testing approach in the face of variability in performance across deployments and measurements. Finally, we present configuration pruning and short-listing techniques for minimizing testing overheads. Evaluations on a variety of compute, bandwidth and data intensive applications validate the effectiveness of these techniques in selecting good configurations with low overheads.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122724906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Personalized location privacy in mobile networks: A social group utility approach 移动网络中的个性化位置隐私:一种社会群体效用方法
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218473
Xiaowen Gong, Xu Chen, Kai Xing, Dong-Hoon Shin, Mengyuan Zhang, Junshan Zhang
With increasing popularity of location-based services (LBSs), there have been growing concerns for location privacy. To protect location privacy in a LBS, mobile users in physical proximity can work in concert to collectively change their pseudonyms, in order to hide spatial-temporal correlation in their location traces. In this study, we leverage the social tie structure among mobile users to motivate them to participate in pseudonym change. Drawing on a social group utility maximization (SGUM) framework, we cast users' decision making of whether to change pseudonyms as a socially-aware pseudonym change game (PCG). The PCG further assumes a general anonymity model that allows a user to have its specific anonymity set for personalized location privacy. For the SGUM-based PCG, we show that there exists a socially-aware Nash equilibrium (SNE), and quantify the system efficiency of the SNE with respect to the optimal social welfare. Then we develop a greedy algorithm that myopically determines users' strategies, based on the social group utility derived from only the users whose strategies have already been determined. It turns out that this algorithm can efficiently find a Pareto-optimal SNE with social welfare higher than that for the socially-oblivious PCG, pointing out the impact of exploiting social tie structure. We further show that the Pareto-optimal SNE can be achieved in a distributed manner.
随着基于位置的服务(lbs)的日益普及,人们越来越关注位置隐私。为了保护LBS中的位置隐私,物理上接近的移动用户可以协同工作,集体更改他们的假名,以隐藏他们位置痕迹中的时空相关性。在本研究中,我们利用移动用户之间的社会关系结构来激励他们参与假名更改。利用社会群体效用最大化(social group utility maximization, SGUM)框架,我们将用户是否更改假名的决策视为社会意识假名更改游戏(social -aware pseudonym change game, PCG)。PCG进一步假设了一个通用匿名模型,该模型允许用户为个性化位置隐私设置特定的匿名集。对于基于sgum的PCG,我们证明存在社会意识纳什均衡(SNE),并量化了SNE相对于最优社会福利的系统效率。然后,我们开发了一种贪婪算法,该算法基于仅从策略已确定的用户中获得的社会群体效用来近视地确定用户的策略。结果表明,该算法可以有效地找到社会福利高于社会无关PCG的帕累托最优SNE,指出了利用社会关系结构的影响。我们进一步证明了pareto最优SNE可以在分布式方式下实现。
{"title":"Personalized location privacy in mobile networks: A social group utility approach","authors":"Xiaowen Gong, Xu Chen, Kai Xing, Dong-Hoon Shin, Mengyuan Zhang, Junshan Zhang","doi":"10.1109/INFOCOM.2015.7218473","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218473","url":null,"abstract":"With increasing popularity of location-based services (LBSs), there have been growing concerns for location privacy. To protect location privacy in a LBS, mobile users in physical proximity can work in concert to collectively change their pseudonyms, in order to hide spatial-temporal correlation in their location traces. In this study, we leverage the social tie structure among mobile users to motivate them to participate in pseudonym change. Drawing on a social group utility maximization (SGUM) framework, we cast users' decision making of whether to change pseudonyms as a socially-aware pseudonym change game (PCG). The PCG further assumes a general anonymity model that allows a user to have its specific anonymity set for personalized location privacy. For the SGUM-based PCG, we show that there exists a socially-aware Nash equilibrium (SNE), and quantify the system efficiency of the SNE with respect to the optimal social welfare. Then we develop a greedy algorithm that myopically determines users' strategies, based on the social group utility derived from only the users whose strategies have already been determined. It turns out that this algorithm can efficiently find a Pareto-optimal SNE with social welfare higher than that for the socially-oblivious PCG, pointing out the impact of exploiting social tie structure. We further show that the Pareto-optimal SNE can be achieved in a distributed manner.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122851120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
SMOC: A secure mobile cloud computing platform SMOC:安全移动云计算平台
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218658
Zijiang Hao, Yutao Tang, Yifan Zhang, Ed Novak, Nancy Carter, Qun A. Li
Mobile devices are now ubiquitous in the modern world. In this paper, we propose a novel and practical mobile-cloud platform for smart mobile devices. Our platform allows users to run the entire mobile device operating system and arbitrary applications on a cloud-based virtual machine. It has two design fundamentals. First, applications can freely migrate between the user's mobile device and a backend cloud server. We design a file system extension to enable this feature, so users can freely choose to run their applications either in the cloud (for high security guarantees), or on their local mobile device (for better user experience). Second, in order to protect user data on the smart mobile device, we leverage hardware virtualization technology, which isolates the data from the local mobile device operating system. We have implemented a prototype of our platform using off-the-shelf hardware, and performed an extensive evaluation of it. We show that our platform is efficient, practical, and secure.
移动设备在现代世界无处不在。本文提出了一种新颖实用的智能移动设备移动云平台。我们的平台允许用户在基于云的虚拟机上运行整个移动设备操作系统和任意应用程序。它有两个设计基础。首先,应用程序可以在用户的移动设备和后端云服务器之间自由迁移。我们设计了一个文件系统扩展来启用这个特性,因此用户可以自由选择在云中(为了高安全性保证)或在本地移动设备上(为了更好的用户体验)运行他们的应用程序。其次,为了保护智能移动设备上的用户数据,我们利用硬件虚拟化技术,将数据与本地移动设备操作系统隔离开来。我们已经使用现成的硬件实现了我们平台的原型,并对其进行了广泛的评估。我们证明了我们的平台是高效、实用和安全的。
{"title":"SMOC: A secure mobile cloud computing platform","authors":"Zijiang Hao, Yutao Tang, Yifan Zhang, Ed Novak, Nancy Carter, Qun A. Li","doi":"10.1109/INFOCOM.2015.7218658","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218658","url":null,"abstract":"Mobile devices are now ubiquitous in the modern world. In this paper, we propose a novel and practical mobile-cloud platform for smart mobile devices. Our platform allows users to run the entire mobile device operating system and arbitrary applications on a cloud-based virtual machine. It has two design fundamentals. First, applications can freely migrate between the user's mobile device and a backend cloud server. We design a file system extension to enable this feature, so users can freely choose to run their applications either in the cloud (for high security guarantees), or on their local mobile device (for better user experience). Second, in order to protect user data on the smart mobile device, we leverage hardware virtualization technology, which isolates the data from the local mobile device operating system. We have implemented a prototype of our platform using off-the-shelf hardware, and performed an extensive evaluation of it. We show that our platform is efficient, practical, and secure.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125520619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
期刊
2015 IEEE Conference on Computer Communications (INFOCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1