首页 > 最新文献

2015 IEEE Conference on Computer Communications (INFOCOM)最新文献

英文 中文
P3: Joint optimization of charger placement and power allocation for wireless power transfer P3:无线电力传输中充电器放置与功率分配的联合优化
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218622
S. Zhang, Zhuzhong Qian, Fanyu Kong, Jie Wu, Sanglu Lu
Wireless power transfer is a promising technology to extend the lifetime of, and thus enhance the usability of, the energy-hungry battery-powered devices. It enables energy to be wirelessly transmitted from power chargers to energy receiving devices. Existing studies have mainly focused on maximizing network lifetime, optimizing charging efficiency, minimizing charging delay, etc. Different from these works, our objective is to optimize charging quality in a 2-D target area. Specifically, we consider the following charger Placement and Power allocation Problem (P3): Given a set of candidate locations for placing chargers, find a charger placement and a corresponding power allocation to maximize the charging quality, subject to a power budget. We prove that P3 is NP-complete. We first study P3 with fixed power levels, for which we propose a (1-1/e)-approximation algorithm; we then design an approximation algorithm of factor 1-1/e / 2L for P3, where e is the base of the natural logarithm, and L is the maximum power level of a charger. We also show how to extend P3 in a cycle. Extensive simulations demonstrate that, the gap between our design and the optimal algorithm is within 4.5%, validating our theoretical results.
无线电力传输是一项很有前途的技术,可以延长耗电的电池供电设备的使用寿命,从而提高其可用性。它使能量能够从电源充电器无线传输到能量接收设备。现有的研究主要集中在最大化网络寿命、优化充电效率、最小化充电延迟等方面。与这些工作不同的是,我们的目标是在二维目标区域内优化充电质量。具体来说,我们考虑以下充电器放置和功率分配问题(P3):给定一组可供放置充电器的候选位置,在功率预算的前提下,找到一个充电器放置和相应的功率分配,以最大限度地提高充电质量。证明了P3是np完全的。我们首先研究了具有固定功率水平的P3,并提出了一种(1-1/e)近似算法;然后,我们为P3设计了因子1-1/e / 2L的近似算法,其中e为自然对数的底数,L为充电器的最大功率。我们还展示了如何在循环中扩展P3。大量的仿真表明,我们的设计与最优算法之间的差距在4.5%以内,验证了我们的理论结果。
{"title":"P3: Joint optimization of charger placement and power allocation for wireless power transfer","authors":"S. Zhang, Zhuzhong Qian, Fanyu Kong, Jie Wu, Sanglu Lu","doi":"10.1109/INFOCOM.2015.7218622","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218622","url":null,"abstract":"Wireless power transfer is a promising technology to extend the lifetime of, and thus enhance the usability of, the energy-hungry battery-powered devices. It enables energy to be wirelessly transmitted from power chargers to energy receiving devices. Existing studies have mainly focused on maximizing network lifetime, optimizing charging efficiency, minimizing charging delay, etc. Different from these works, our objective is to optimize charging quality in a 2-D target area. Specifically, we consider the following charger Placement and Power allocation Problem (P3): Given a set of candidate locations for placing chargers, find a charger placement and a corresponding power allocation to maximize the charging quality, subject to a power budget. We prove that P3 is NP-complete. We first study P3 with fixed power levels, for which we propose a (1-1/e)-approximation algorithm; we then design an approximation algorithm of factor 1-1/e / 2L for P3, where e is the base of the natural logarithm, and L is the maximum power level of a charger. We also show how to extend P3 in a cycle. Extensive simulations demonstrate that, the gap between our design and the optimal algorithm is within 4.5%, validating our theoretical results.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134410563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
MOOC performance prediction via clickstream data and social learning networks 基于点击流数据和社交学习网络的MOOC性能预测
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218617
Christopher G. Brinton, M. Chiang
We study student performance prediction in Massive Open Online Courses (MOOCs), where the objective is to predict whether a user will be Correct on First Attempt (CFA) in answering a question. In doing so, we develop novel techniques that leverage behavioral data collected by MOOC platforms. Using video-watching clickstream data from one of our MOOCs, we first extract summary quantities (e.g., fraction played, number of pauses) for each user-video pair, and show how certain intervals/sets of values for these behaviors quantify that a pair is more likely to be CFA or not for the corresponding question. Motivated by these findings, our methods are designed to determine suitable intervals from training data and to use the corresponding success estimates as learning features in prediction algorithms. Tested against a large set of empirical data, we find that our schemes outperform standard algorithms (i.e., without behavioral data) for all datasets and metrics tested. Moreover, the improvement is particularly pronounced when considering the first few course weeks, demonstrating the “early detection” capability of such clickstream data. We also discuss how CFA prediction can be used to depict graphs of the Social Learning Network (SLN) of students, which can help instructors manage courses more effectively.
我们研究了大规模开放在线课程(MOOCs)中的学生成绩预测,其目标是预测用户在第一次尝试(CFA)中是否正确回答问题。在此过程中,我们开发了利用MOOC平台收集的行为数据的新技术。使用来自mooc的视频观看点击流数据,我们首先提取每个用户视频对的汇总数量(例如,播放的分数,暂停的次数),并显示这些行为的特定间隔/值集如何量化一对更有可能获得CFA或不获得相应问题的CFA。受这些发现的启发,我们的方法旨在从训练数据中确定合适的间隔,并使用相应的成功估计作为预测算法中的学习特征。通过对大量经验数据的测试,我们发现我们的方案在所有测试的数据集和指标上都优于标准算法(即,没有行为数据)。此外,考虑到课程的前几周,这种改进尤其明显,这证明了这种点击流数据的“早期检测”能力。我们还讨论了如何使用CFA预测来描绘学生的社会学习网络(SLN)的图形,这可以帮助教师更有效地管理课程。
{"title":"MOOC performance prediction via clickstream data and social learning networks","authors":"Christopher G. Brinton, M. Chiang","doi":"10.1109/INFOCOM.2015.7218617","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218617","url":null,"abstract":"We study student performance prediction in Massive Open Online Courses (MOOCs), where the objective is to predict whether a user will be Correct on First Attempt (CFA) in answering a question. In doing so, we develop novel techniques that leverage behavioral data collected by MOOC platforms. Using video-watching clickstream data from one of our MOOCs, we first extract summary quantities (e.g., fraction played, number of pauses) for each user-video pair, and show how certain intervals/sets of values for these behaviors quantify that a pair is more likely to be CFA or not for the corresponding question. Motivated by these findings, our methods are designed to determine suitable intervals from training data and to use the corresponding success estimates as learning features in prediction algorithms. Tested against a large set of empirical data, we find that our schemes outperform standard algorithms (i.e., without behavioral data) for all datasets and metrics tested. Moreover, the improvement is particularly pronounced when considering the first few course weeks, demonstrating the “early detection” capability of such clickstream data. We also discuss how CFA prediction can be used to depict graphs of the Social Learning Network (SLN) of students, which can help instructors manage courses more effectively.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123967601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 145
ActCap: Accelerating MapReduce on heterogeneous clusters with capability-aware data placement ActCap:通过能力感知的数据放置在异构集群上加速MapReduce
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218509
Bo Wang, Jinlei Jiang, Guangwen Yang
As a widely used programming model and implementation for processing large data sets, MapReduce performs poorly on heterogeneous clusters, which, unfortunately, are common in current computing environments. To deal with the problem, this paper: 1) analyzes the causes of performance degradation and identifies the key one as the large volume of inter-node data transfer resulted from even data distribution among nodes of different computing capabilities, and 2) proposes ActCap, a solution that uses a Markov chain based model to do node-capability-aware data placement for the continuously incoming data. ActCap has been incorporated into Hadoop and evaluated on a 24-node heterogeneous cluster by 13 benchmarks. The experimental results show that ActCap can reduce the percentage of inter-node data transfer from 32.9% to 7.7% and gain an average speedup of 49.8% when compared with Hadoop, and achieve an average speedup of 9.8% when compared with Tarazu, the latest related work.
作为处理大型数据集的广泛使用的编程模型和实现,MapReduce在异构集群上表现不佳,不幸的是,这在当前的计算环境中很常见。针对这一问题,本文分析了性能下降的原因,认为主要原因是由于数据在不同计算能力的节点之间均匀分布而导致的节点间数据传输量大,并提出了ActCap解决方案,该方案利用基于马尔可夫链的模型对连续传入的数据进行节点能力感知的数据放置。ActCap已经被整合到Hadoop中,并在一个24节点的异构集群上通过13个基准测试进行了评估。实验结果表明,ActCap可以将节点间数据传输的百分比从32.9%降低到7.7%,与Hadoop相比平均提速49.8%,与最新的相关工作Tarazu相比平均提速9.8%。
{"title":"ActCap: Accelerating MapReduce on heterogeneous clusters with capability-aware data placement","authors":"Bo Wang, Jinlei Jiang, Guangwen Yang","doi":"10.1109/INFOCOM.2015.7218509","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218509","url":null,"abstract":"As a widely used programming model and implementation for processing large data sets, MapReduce performs poorly on heterogeneous clusters, which, unfortunately, are common in current computing environments. To deal with the problem, this paper: 1) analyzes the causes of performance degradation and identifies the key one as the large volume of inter-node data transfer resulted from even data distribution among nodes of different computing capabilities, and 2) proposes ActCap, a solution that uses a Markov chain based model to do node-capability-aware data placement for the continuously incoming data. ActCap has been incorporated into Hadoop and evaluated on a 24-node heterogeneous cluster by 13 benchmarks. The experimental results show that ActCap can reduce the percentage of inter-node data transfer from 32.9% to 7.7% and gain an average speedup of 49.8% when compared with Hadoop, and achieve an average speedup of 9.8% when compared with Tarazu, the latest related work.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128733693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
SEISA: Secure and efficient encrypted image search with access control 安全,高效的加密图像搜索与访问控制
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218593
Jiawei Yuan, Shucheng Yu, Linke Guo
Image search has been widely deployed in many applications for the rich content that images contain. In the era of big data, image search engines have to be hosted in data centers. As a viable solution, outsourcing the image search to public clouds is an economic choice for many small organizations. However, as many images contain sensitive information, e.g., healthcare information and personal faces/locations, directly outsourcing image search services to public clouds obviously raises privacy concerns. With this observation, several attempts are made towards secure image search over encrypted dataset, but they are limited by either search accuracy or search efficiency. In this paper, we propose a lightweight secure image search scheme over encrypted data, namely SEISA. Compared with image search techniques over plaintexts, SEISA only increases about 9% search cost and sacrifices about 3% on search accuracy. SEISA also efficiently supports search access control by employing a novel polynomial based design, which enables data owners to define who can search a specific image. Furthermore, we design a secure k-means outsourcing algorithm that significantly saves the data owner's cost. To demonstrate SEISA's performance, we implement a prototype of SEISA on Amazon EC2 cloud over a dataset with 10 million images.
由于图像包含丰富的内容,图像搜索已被广泛应用于许多应用程序中。在大数据时代,图像搜索引擎必须托管在数据中心。作为一种可行的解决方案,将图像搜索外包到公共云是许多小型组织的经济选择。然而,由于许多图像包含敏感信息,例如医疗保健信息和个人面孔/位置,直接将图像搜索服务外包给公共云显然会引起隐私问题。根据这一观察结果,对加密数据集的安全图像搜索进行了几次尝试,但它们受到搜索准确性或搜索效率的限制。本文提出了一种基于加密数据的轻量级安全图像搜索方案,即SEISA。与基于明文的图像搜索技术相比,SEISA只增加了约9%的搜索成本,牺牲了约3%的搜索精度。SEISA还通过采用新颖的基于多项式的设计有效地支持搜索访问控制,该设计使数据所有者能够定义谁可以搜索特定的图像。此外,我们设计了一个安全的k-means外包算法,大大节省了数据所有者的成本。为了演示SEISA的性能,我们在Amazon EC2云上实现了一个SEISA的原型,该原型包含1000万张图像。
{"title":"SEISA: Secure and efficient encrypted image search with access control","authors":"Jiawei Yuan, Shucheng Yu, Linke Guo","doi":"10.1109/INFOCOM.2015.7218593","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218593","url":null,"abstract":"Image search has been widely deployed in many applications for the rich content that images contain. In the era of big data, image search engines have to be hosted in data centers. As a viable solution, outsourcing the image search to public clouds is an economic choice for many small organizations. However, as many images contain sensitive information, e.g., healthcare information and personal faces/locations, directly outsourcing image search services to public clouds obviously raises privacy concerns. With this observation, several attempts are made towards secure image search over encrypted dataset, but they are limited by either search accuracy or search efficiency. In this paper, we propose a lightweight secure image search scheme over encrypted data, namely SEISA. Compared with image search techniques over plaintexts, SEISA only increases about 9% search cost and sacrifices about 3% on search accuracy. SEISA also efficiently supports search access control by employing a novel polynomial based design, which enables data owners to define who can search a specific image. Furthermore, we design a secure k-means outsourcing algorithm that significantly saves the data owner's cost. To demonstrate SEISA's performance, we implement a prototype of SEISA on Amazon EC2 cloud over a dataset with 10 million images.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128823536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
On the accuracy of smartphone-based mobile network measurement 基于智能手机的移动网络测量精度研究
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218402
Weichao Li, Ricky K. P. Mok, Daoyuan Wu, R. Chang
As most of mobile apps rely on network connections for their operations, measuring and understanding the performance of mobile networks is becoming very important for end users and operators. Despite the availability of many measurement apps, their measurement accuracy has not received sufficient scrutiny. In this paper, we appraise the accuracy of smartphone-based network performance measurement using the Android platform and the network round-trip time as the metric. We use a multiple-sniffer testbed to overcome the challenge of obtaining a complete trace for acquiring the required timestamps. Our experiment results show that the RTTs measured by the apps are all inflated, ranging from a few milliseconds (ms) to tens of milliseconds. Moreover, the 95% confidence interval can be as high as 2.4ms. A finer-grained analysis reveals that the delay inflation can be introduced both in the Dalvik VM (DVM) and below the Linux kernel. The in-DVM overhead can be mitigated but the other cannot be. Finally, we propose and implement a native app which uses HTTP messages for network measurement, and the delay inflation can be kept under 5ms for almost all cases.
由于大多数移动应用程序的运行都依赖于网络连接,因此测量和理解移动网络的性能对最终用户和运营商来说变得非常重要。尽管有许多测量应用程序,但它们的测量精度还没有得到足够的审查。在本文中,我们使用Android平台,以网络往返时间为度量标准,评估了基于智能手机的网络性能测量的准确性。我们使用多嗅探器测试平台来克服获取所需时间戳的完整跟踪的挑战。我们的实验结果表明,应用程序测量的rtt都被夸大了,范围从几毫秒(ms)到几十毫秒。此外,95%置信区间可高达2.4ms。细粒度的分析表明,延迟膨胀可以在Dalvik VM (DVM)和Linux内核下面引入。可以减少dvm内的开销,但不能减少其他开销。最后,我们提出并实现了一个使用HTTP消息进行网络测量的本地应用程序,在几乎所有情况下延迟膨胀都可以保持在5ms以下。
{"title":"On the accuracy of smartphone-based mobile network measurement","authors":"Weichao Li, Ricky K. P. Mok, Daoyuan Wu, R. Chang","doi":"10.1109/INFOCOM.2015.7218402","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218402","url":null,"abstract":"As most of mobile apps rely on network connections for their operations, measuring and understanding the performance of mobile networks is becoming very important for end users and operators. Despite the availability of many measurement apps, their measurement accuracy has not received sufficient scrutiny. In this paper, we appraise the accuracy of smartphone-based network performance measurement using the Android platform and the network round-trip time as the metric. We use a multiple-sniffer testbed to overcome the challenge of obtaining a complete trace for acquiring the required timestamps. Our experiment results show that the RTTs measured by the apps are all inflated, ranging from a few milliseconds (ms) to tens of milliseconds. Moreover, the 95% confidence interval can be as high as 2.4ms. A finer-grained analysis reveals that the delay inflation can be introduced both in the Dalvik VM (DVM) and below the Linux kernel. The in-DVM overhead can be mitigated but the other cannot be. Finally, we propose and implement a native app which uses HTTP messages for network measurement, and the delay inflation can be kept under 5ms for almost all cases.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117020394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Capturing resource tradeoffs in fair multi-resource allocation 在公平的多资源分配中获取资源权衡
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218479
Doron Zarchy, David Hay, Michael Schapira
Cloud computing platforms provide computational resources (CPU, storage, etc.) for running users' applications. Often, the same application can be implemented in various ways, each with different resource requirements. Taking advantage of this flexibility when allocating resources to users can both greatly benefit users and lead to much better global resource utilization. We develop a framework for fair resource allocation that captures such implementation tradeoffs by allowing users to submit multiple “resource demands”. We present and analyze two mechanisms for fairly allocating resources in such environments: the Lexicographically-Max-Min-Fair (LMMF) mechanism and the Nash-Bargaining (NB) mechanism. We prove that NB has many desirable properties, including Pareto optimality and envy freeness, in a broad variety of environments whereas the seemingly less appealing LMMF fares better, and is even immune to manipulations, in restricted settings of interest.
云计算平台为用户的应用运行提供计算资源(CPU、存储等)。通常,同一个应用程序可以以各种方式实现,每种方式都有不同的资源需求。在向用户分配资源时利用这种灵活性,既可以极大地使用户受益,又可以更好地利用全局资源。我们开发了一个公平资源分配的框架,通过允许用户提交多个“资源需求”来捕获这种实现权衡。我们提出并分析了在这种环境中公平分配资源的两种机制:词典编纂最大最小公平(LMMF)机制和纳什议价(NB)机制。我们证明了NB在各种各样的环境中具有许多理想的特性,包括帕累托最优性和嫉妒自由,而看似不那么吸引人的LMMF在有限的兴趣设置中表现得更好,甚至不受操纵。
{"title":"Capturing resource tradeoffs in fair multi-resource allocation","authors":"Doron Zarchy, David Hay, Michael Schapira","doi":"10.1109/INFOCOM.2015.7218479","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218479","url":null,"abstract":"Cloud computing platforms provide computational resources (CPU, storage, etc.) for running users' applications. Often, the same application can be implemented in various ways, each with different resource requirements. Taking advantage of this flexibility when allocating resources to users can both greatly benefit users and lead to much better global resource utilization. We develop a framework for fair resource allocation that captures such implementation tradeoffs by allowing users to submit multiple “resource demands”. We present and analyze two mechanisms for fairly allocating resources in such environments: the Lexicographically-Max-Min-Fair (LMMF) mechanism and the Nash-Bargaining (NB) mechanism. We prove that NB has many desirable properties, including Pareto optimality and envy freeness, in a broad variety of environments whereas the seemingly less appealing LMMF fares better, and is even immune to manipulations, in restricted settings of interest.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"633 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116206682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Static power of mobile devices: Self-updating radio maps for wireless indoor localization 移动设备的静态功率:用于室内无线定位的自更新无线地图
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218639
Chenshu Wu, Zheng Yang, Chaowei Xiao, Chaofan Yang, Yunhao Liu, M. Liu
The proliferation of mobile computing has prompted WiFi-based indoor localization to be one of the most attractive and promising techniques for ubiquitous applications. A primary concern for these technologies to be fully practical is to combat harsh indoor environmental dynamics, especially for long-term deployment. Despite numerous research on WiFi fingerprint-based localization, the problem of radio map adaptation has not been sufficiently studied and remains open. In this work, we propose AcMu, an automatic and continuous radio map self-updating service for wireless indoor localization that exploits the static behaviors of mobile devices. By accurately pinpointing mobile devices with a novel trajectory matching algorithm, we employ them as mobile reference points to collect real-time RSS samples when they are static. With these fresh reference data, we adapt the complete radio map by learning an underlying relationship of RSS dependency between different locations, which is expected to be relatively constant over time. Extensive experiments for 20 days across 6 months demonstrate that AcMu effectively accommodates RSS variations over time and derives accurate prediction of fresh radio map with average errors of less than 5dB. Moreover, AcMu provides 2x improvement on localization accuracy by maintaining an up-to-date radio map.
移动计算的激增促使基于wifi的室内定位成为最具吸引力和最有前途的无处不在的应用技术之一。这些技术要完全实用,首先要考虑的是对抗恶劣的室内环境动态,特别是长期部署。尽管基于WiFi指纹的定位研究很多,但无线地图的适应问题还没有得到充分的研究,仍然是一个开放的问题。在这项工作中,我们提出了AcMu,这是一种用于无线室内定位的自动连续无线电地图自更新服务,利用移动设备的静态行为。通过使用一种新颖的轨迹匹配算法精确定位移动设备,我们将它们作为移动参考点,在它们处于静态状态时收集实时RSS样本。有了这些新的参考数据,我们通过学习不同位置之间的RSS依赖关系来调整完整的无线电地图,该关系随着时间的推移相对恒定。6个月20天的大量实验表明,AcMu有效地适应了RSS随时间的变化,并获得了平均误差小于5dB的准确新无线电地图预测。此外,AcMu通过保持最新的无线电地图,将定位精度提高了2倍。
{"title":"Static power of mobile devices: Self-updating radio maps for wireless indoor localization","authors":"Chenshu Wu, Zheng Yang, Chaowei Xiao, Chaofan Yang, Yunhao Liu, M. Liu","doi":"10.1109/INFOCOM.2015.7218639","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218639","url":null,"abstract":"The proliferation of mobile computing has prompted WiFi-based indoor localization to be one of the most attractive and promising techniques for ubiquitous applications. A primary concern for these technologies to be fully practical is to combat harsh indoor environmental dynamics, especially for long-term deployment. Despite numerous research on WiFi fingerprint-based localization, the problem of radio map adaptation has not been sufficiently studied and remains open. In this work, we propose AcMu, an automatic and continuous radio map self-updating service for wireless indoor localization that exploits the static behaviors of mobile devices. By accurately pinpointing mobile devices with a novel trajectory matching algorithm, we employ them as mobile reference points to collect real-time RSS samples when they are static. With these fresh reference data, we adapt the complete radio map by learning an underlying relationship of RSS dependency between different locations, which is expected to be relatively constant over time. Extensive experiments for 20 days across 6 months demonstrate that AcMu effectively accommodates RSS variations over time and derives accurate prediction of fresh radio map with average errors of less than 5dB. Moreover, AcMu provides 2x improvement on localization accuracy by maintaining an up-to-date radio map.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127010647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
Video acuity assessment in mobile devices 移动设备视频清晰度评估
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218361
E. Baik, A. Pande, Chris Stover, P. Mohapatra
The quality of mobile videos is usually quantified through the Quality of Experience (QoE), which is usually based on network QoS measurements, user engagement, or post-view subjective scores. Such quantifications are not adequate for real-time evaluation. They cannot provide on-line feedback for improvement of visual acuity, which represents the actual viewing experience of the end user. We present a visual acuity framework which makes fast online computations in a mobile device and provide an accurate estimate of mobile video QoE. We identify and study the three main causes that impact visual acuity in mobile videos: spatial distortions, types of buffering and resolution changes. Each of them can be accurately modeled using our framework. We use machine learning techniques to build a prediction model for visual acuity, which depicts more than 78% accuracy. We present an experimental implementation on iPhone 4 and 5s to show that the proposed visual acuity framework is feasible to deploy in mobile devices. Using a data corpus of over 2852 mobile video clips for the experiments, we validate the proposed framework.
移动视频的质量通常通过体验质量(QoE)来量化,这通常基于网络QoS测量、用户参与度或观看后的主观评分。这样的量化不足以进行实时评价。他们不能为视觉敏锐度的提高提供在线反馈,而视觉敏锐度代表了最终用户的实际观看体验。我们提出了一种视觉灵敏度框架,可以在移动设备上进行快速在线计算,并提供准确的移动视频QoE估计。我们确定并研究了影响移动视频视觉敏锐度的三个主要原因:空间扭曲、缓冲类型和分辨率变化。它们中的每一个都可以使用我们的框架精确地建模。我们使用机器学习技术建立了一个视觉敏锐度的预测模型,其准确率超过78%。我们提出了在iPhone 4和5s上的实验实现,以表明所提出的视觉灵敏度框架在移动设备上部署是可行的。使用超过2852个移动视频片段的数据语料库进行实验,我们验证了所提出的框架。
{"title":"Video acuity assessment in mobile devices","authors":"E. Baik, A. Pande, Chris Stover, P. Mohapatra","doi":"10.1109/INFOCOM.2015.7218361","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218361","url":null,"abstract":"The quality of mobile videos is usually quantified through the Quality of Experience (QoE), which is usually based on network QoS measurements, user engagement, or post-view subjective scores. Such quantifications are not adequate for real-time evaluation. They cannot provide on-line feedback for improvement of visual acuity, which represents the actual viewing experience of the end user. We present a visual acuity framework which makes fast online computations in a mobile device and provide an accurate estimate of mobile video QoE. We identify and study the three main causes that impact visual acuity in mobile videos: spatial distortions, types of buffering and resolution changes. Each of them can be accurately modeled using our framework. We use machine learning techniques to build a prediction model for visual acuity, which depicts more than 78% accuracy. We present an experimental implementation on iPhone 4 and 5s to show that the proposed visual acuity framework is feasible to deploy in mobile devices. Using a data corpus of over 2852 mobile video clips for the experiments, we validate the proposed framework.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"437 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126125925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
On the impossibility of efficient self-stabilization in virtual overlays with churn 带扰动的虚拟叠加中有效自稳定的不可能性
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218394
Stefanie Roos, T. Strufe
Virtual overlays generate topologies for greedy routing, like rings or hypercubes, on connectivity restricted networks. They have been proposed to achieve efficient content discovery in the Darknet mode of Freenet, for instance, which provides a private and secure communication platform for dissidents and whistle-blowers. Virtual overlays create tunnels between nodes with neighboring addresses in the topology. The routing performance hence is directly related to the length of the tunnels, which have to be set up and maintained at the cost of communication overhead in the absence of an underlying routing protocol. In this paper, we show the impossibility to efficiently maintain sufficiently short tunnels. Specifically, we prove that in a dynamic network either the maintenance or the routing eventually exceeds polylog cost in the number of participants. Our simulations additionally show that the length of the tunnels increases fast if standard maintenance protocols are applied. Thus, we show that virtual overlays can only offer efficient routing at the price of high maintenance costs.
在连接受限的网络上,虚拟覆盖为贪婪路由(如环或超立方体)生成拓扑。例如,他们被提议在Freenet的暗网模式中实现有效的内容发现,暗网模式为持不同政见者和告密者提供了一个私人和安全的通信平台。虚拟叠加在拓扑中具有相邻地址的节点之间创建隧道。因此,路由性能与隧道的长度直接相关,在没有底层路由协议的情况下,必须以通信开销为代价建立和维护隧道。在本文中,我们证明了有效维护足够短的隧道是不可能的。具体地说,我们证明了在动态网络中,无论是维护成本还是路由成本最终都会超过参与者数量的多对数成本。我们的模拟还表明,如果采用标准维护协议,隧道的长度会迅速增加。因此,我们表明虚拟覆盖只能以高维护成本为代价提供高效路由。
{"title":"On the impossibility of efficient self-stabilization in virtual overlays with churn","authors":"Stefanie Roos, T. Strufe","doi":"10.1109/INFOCOM.2015.7218394","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218394","url":null,"abstract":"Virtual overlays generate topologies for greedy routing, like rings or hypercubes, on connectivity restricted networks. They have been proposed to achieve efficient content discovery in the Darknet mode of Freenet, for instance, which provides a private and secure communication platform for dissidents and whistle-blowers. Virtual overlays create tunnels between nodes with neighboring addresses in the topology. The routing performance hence is directly related to the length of the tunnels, which have to be set up and maintained at the cost of communication overhead in the absence of an underlying routing protocol. In this paper, we show the impossibility to efficiently maintain sufficiently short tunnels. Specifically, we prove that in a dynamic network either the maintenance or the routing eventually exceeds polylog cost in the number of participants. Our simulations additionally show that the length of the tunnels increases fast if standard maintenance protocols are applied. Thus, we show that virtual overlays can only offer efficient routing at the price of high maintenance costs.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127498038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Contextual-code: Simplifying information pulling from targeted sources in physical world 上下文代码:简化从物理世界的目标源提取的信息
Pub Date : 2015-08-24 DOI: 10.1109/INFOCOM.2015.7218611
Yang Tian, Kaigui Bian, G. Shen, Xiaochen Liu, Xiaoguang Li, T. Moscibroda
The popularity of QR code clearly indicates the strong demand of users to acquire (or pull) further information from interested sources (e.g., a poster) in the physical world. However, existing information pulling practices such as a mobile search or QR code scanning incur heavy user involvement to identify the targeted posters. Meanwhile, businesses (e.g., advertisers) are also interested to learn about the behaviors of potential customers such as where, when, and how users show interests in their offerings. Unfortunately, little such context information are provided by existing information pulling systems. In this paper, we present Contextual-Code (C-Code) - an information pulling system that greatly relieves users' efforts in pulling information from targeted posters, and in the meantime provides rich context information of user behavior to businesses. C-Code leverages the rich contextual information captured by the smartphone sensors to automatically disambiguate information sources in different contexts. It assigns simple codes (e.g., a character) to sources whose contexts are not discriminating enough. To pull the information from an interested source, users only need to input the simple code shown on the targeted source. Our experiments demonstrate the effectiveness of C-Code design. Users can effectively and uniquely identify targeted information sources with an average accuracy over 90%.
QR码的流行清楚地表明,用户强烈需要从现实世界中感兴趣的来源(例如海报)获取(或提取)进一步的信息。然而,现有的信息提取实践,如移动搜索或二维码扫描,需要大量的用户参与来识别目标海报。与此同时,企业(如广告商)也有兴趣了解潜在客户的行为,如用户在何时何地以及如何对他们的产品表现出兴趣。不幸的是,现有的信息提取系统几乎没有提供这样的上下文信息。本文提出了一种信息提取系统——上下文代码(C-Code),大大减轻了用户从目标海报中提取信息的工作量,同时为企业提供了丰富的用户行为上下文信息。C-Code利用智能手机传感器捕获的丰富的上下文信息来自动消除不同上下文中的信息源的歧义。它将简单的代码(例如,一个字符)分配给上下文没有足够区别的源。要从感兴趣的源提取信息,用户只需要输入目标源上显示的简单代码。我们的实验证明了C-Code设计的有效性。用户可以有效、唯一地识别目标信息源,平均准确率超过90%。
{"title":"Contextual-code: Simplifying information pulling from targeted sources in physical world","authors":"Yang Tian, Kaigui Bian, G. Shen, Xiaochen Liu, Xiaoguang Li, T. Moscibroda","doi":"10.1109/INFOCOM.2015.7218611","DOIUrl":"https://doi.org/10.1109/INFOCOM.2015.7218611","url":null,"abstract":"The popularity of QR code clearly indicates the strong demand of users to acquire (or pull) further information from interested sources (e.g., a poster) in the physical world. However, existing information pulling practices such as a mobile search or QR code scanning incur heavy user involvement to identify the targeted posters. Meanwhile, businesses (e.g., advertisers) are also interested to learn about the behaviors of potential customers such as where, when, and how users show interests in their offerings. Unfortunately, little such context information are provided by existing information pulling systems. In this paper, we present Contextual-Code (C-Code) - an information pulling system that greatly relieves users' efforts in pulling information from targeted posters, and in the meantime provides rich context information of user behavior to businesses. C-Code leverages the rich contextual information captured by the smartphone sensors to automatically disambiguate information sources in different contexts. It assigns simple codes (e.g., a character) to sources whose contexts are not discriminating enough. To pull the information from an interested source, users only need to input the simple code shown on the targeted source. Our experiments demonstrate the effectiveness of C-Code design. Users can effectively and uniquely identify targeted information sources with an average accuracy over 90%.","PeriodicalId":342583,"journal":{"name":"2015 IEEE Conference on Computer Communications (INFOCOM)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126374421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2015 IEEE Conference on Computer Communications (INFOCOM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1