首页 > 最新文献

Proceedings of the 20th International Conference on Distributed Computing and Networking最新文献

英文 中文
STSDB: spatio-temporal sensor database for smart city query processing STSDB:用于智慧城市查询处理的时空传感器数据库
Utsav Vyas, P. Panchal, Mayank Patel, Minal Bhise
Modern world smart devices are equipped with several sensors which continuously generate the data. Managing and analyzing these data efficiently is a key need of the current sensor world. Present applications require real-time analysis of past sensor data for decision making. The goal of this work is to efficiently process the spatio-temporal queries for sensor data. Spatio-Temporal Sensor Index STSI helps in managing the sensor details and leads to faster query processing. The types of queries that have been considered are; 1) Spatio-Time Travel, 2) Temporal Aggregation and 3) Time Travel, 4) Spatio-temporal Aggregation. Spatio-Temporal Sensor Database STSDB is built by including STSI index in HBase. The STSDB performance is compared with HBase on two parameters Data Insertion Time DIT, and Query Execution Time QET. The DIT of STSDB is almost identical as compared to HBase. While the QET averaged over all four types of queries show 49% improvement for STSDB over HBase. Both the performance parameters continue to show similar trends for scaled data in HBase and STSDB. STSDB is demonstrated in this work using smart city data.
现代世界的智能设备配备了几个传感器,这些传感器可以不断地产生数据。有效地管理和分析这些数据是当前传感器世界的关键需求。目前的应用需要实时分析过去的传感器数据来进行决策。本工作的目的是有效地处理传感器数据的时空查询。时空传感器索引STSI有助于管理传感器细节,并导致更快的查询处理。已经考虑的查询类型有:1)时空旅行,2)时间聚集,3)时间旅行,4)时空聚集。通过在HBase中加入STSI索引,构建了时空传感器数据库STSDB。在数据插入时间DIT和查询执行时间QET两个参数上比较了STSDB与HBase的性能。与HBase相比,STSDB的DIT几乎相同。而所有四种查询类型的QET平均值显示,STSDB比HBase提高了49%。对于HBase和STSDB中的扩展数据,这两个性能参数继续显示类似的趋势。本研究使用智慧城市数据演示了STSDB。
{"title":"STSDB: spatio-temporal sensor database for smart city query processing","authors":"Utsav Vyas, P. Panchal, Mayank Patel, Minal Bhise","doi":"10.1145/3288599.3296015","DOIUrl":"https://doi.org/10.1145/3288599.3296015","url":null,"abstract":"Modern world smart devices are equipped with several sensors which continuously generate the data. Managing and analyzing these data efficiently is a key need of the current sensor world. Present applications require real-time analysis of past sensor data for decision making. The goal of this work is to efficiently process the spatio-temporal queries for sensor data. Spatio-Temporal Sensor Index STSI helps in managing the sensor details and leads to faster query processing. The types of queries that have been considered are; 1) Spatio-Time Travel, 2) Temporal Aggregation and 3) Time Travel, 4) Spatio-temporal Aggregation. Spatio-Temporal Sensor Database STSDB is built by including STSI index in HBase. The STSDB performance is compared with HBase on two parameters Data Insertion Time DIT, and Query Execution Time QET. The DIT of STSDB is almost identical as compared to HBase. While the QET averaged over all four types of queries show 49% improvement for STSDB over HBase. Both the performance parameters continue to show similar trends for scaled data in HBase and STSDB. STSDB is demonstrated in this work using smart city data.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127113674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cslim: automated extraction of IoT functionalities from legacy C codebases Cslim:从遗留C代码库中自动提取物联网功能
Hyogi Sim, A. Paul, E. Tilevich, A. Butt, Muhammad Shahzad
Many Internet of Things (IoT) devices are resource-poor, possessing limited memory, disk space, and processor capacity. To accommodate such resource scarcity, IoT software cannot include any extraneous functionalities not used in operating the underlying device. Although legacy systems software contains numerous functionalities that can be reused in IoT applications, these functionalities are exposed as part of a larger codebase with multiple complex dependencies and a heavy runtime footprint. To enable programmers to effectively reuse extant systems software in IoT applications, this paper presents Cslim, a cross-package function extraction tool for C. Cslim extracts programmer-specified functions from a source package and generates new source files for a target package, thereby enabling the reuse of systems software in resource-poor execution environments, such as the IoT devices. Cslim resolves all dependencies by recursively extracting required functions, while bypassing the complexities of preprocessor macro variabilities by operating on preprocessed source files. Furthermore, Cslim efficiently traverses and resolves the calling dependencies by maintaining an in-memory relational database. Finally, Cslim is easy to use, as it requires neither manual intervention nor source code modifications. Our prototype implementation of Cslim has successfully extracted a set of functions from SQLite and GlusterFS, producing slimmed down executables that can be deployed on IoT devices.
许多物联网(IoT)设备资源匮乏,内存、磁盘空间和处理器容量有限。为了适应这种资源稀缺性,物联网软件不能包括操作底层设备时未使用的任何无关功能。尽管遗留系统软件包含许多可以在物联网应用程序中重用的功能,但这些功能暴露为更大的代码库的一部分,具有多个复杂的依赖关系和沉重的运行时足迹。为了使程序员能够在物联网应用中有效地重用现有的系统软件,本文提出了Cslim,一种针对c语言的跨包功能提取工具。Cslim从源包中提取程序员指定的功能,并为目标包生成新的源文件,从而使系统软件能够在资源贫乏的执行环境(如物联网设备)中重用。Cslim通过递归地提取所需的函数来解决所有依赖关系,同时通过操作预处理的源文件来绕过预处理器宏变量的复杂性。此外,Cslim通过维护内存中的关系数据库有效地遍历和解析调用依赖项。最后,Cslim易于使用,因为它既不需要人工干预,也不需要修改源代码。我们的Cslim原型实现已经成功地从SQLite和GlusterFS中提取了一组函数,生成了精简的可执行文件,可以部署在物联网设备上。
{"title":"Cslim: automated extraction of IoT functionalities from legacy C codebases","authors":"Hyogi Sim, A. Paul, E. Tilevich, A. Butt, Muhammad Shahzad","doi":"10.1145/3288599.3296013","DOIUrl":"https://doi.org/10.1145/3288599.3296013","url":null,"abstract":"Many Internet of Things (IoT) devices are resource-poor, possessing limited memory, disk space, and processor capacity. To accommodate such resource scarcity, IoT software cannot include any extraneous functionalities not used in operating the underlying device. Although legacy systems software contains numerous functionalities that can be reused in IoT applications, these functionalities are exposed as part of a larger codebase with multiple complex dependencies and a heavy runtime footprint. To enable programmers to effectively reuse extant systems software in IoT applications, this paper presents Cslim, a cross-package function extraction tool for C. Cslim extracts programmer-specified functions from a source package and generates new source files for a target package, thereby enabling the reuse of systems software in resource-poor execution environments, such as the IoT devices. Cslim resolves all dependencies by recursively extracting required functions, while bypassing the complexities of preprocessor macro variabilities by operating on preprocessed source files. Furthermore, Cslim efficiently traverses and resolves the calling dependencies by maintaining an in-memory relational database. Finally, Cslim is easy to use, as it requires neither manual intervention nor source code modifications. Our prototype implementation of Cslim has successfully extracted a set of functions from SQLite and GlusterFS, producing slimmed down executables that can be deployed on IoT devices.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126025914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Compositional structures for streaming applications 流应用程序的组合结构
K. Chandy, J. Bunn
This paper describes an ongoing project to develop a Python software package, IoTPy, that helps beginning programmers build modular applications that process streams of data collected from sensors, social media and other sources, and to reason about the correctness of their applications in a compositional fashion. IoTPy helps build streaming applications in four ways: (1) enables the construction of non-terminating applications that continuously process endless streams of data by encapsulating terminating programs; (2) supports computation throughout a network of nodes from sensors at the edges of the network to the cloud and back to actuators at the edge; (3) allows users to separate concerns of the logic of an application from the parallel hardware on which the application runs, and (4) supports proofs and testing of the correct behavior of a composition from the specifications of its components.
本文描述了一个正在进行的开发Python软件包IoTPy的项目,它可以帮助初级程序员构建模块化应用程序,处理从传感器、社交媒体和其他来源收集的数据流,并以组合方式推断其应用程序的正确性。IoTPy通过四种方式帮助构建流应用程序:(1)通过封装终止程序来构建非终止应用程序,该应用程序可以连续处理无穷无尽的数据流;(2)支持整个节点网络的计算,从网络边缘的传感器到云,再返回到边缘的执行器;(3)允许用户将应用程序的逻辑关注点从应用程序运行的并行硬件中分离出来;(4)支持从组件的规范中对组合的正确行为进行证明和测试。
{"title":"Compositional structures for streaming applications","authors":"K. Chandy, J. Bunn","doi":"10.1145/3288599.3288642","DOIUrl":"https://doi.org/10.1145/3288599.3288642","url":null,"abstract":"This paper describes an ongoing project to develop a Python software package, IoTPy, that helps beginning programmers build modular applications that process streams of data collected from sensors, social media and other sources, and to reason about the correctness of their applications in a compositional fashion. IoTPy helps build streaming applications in four ways: (1) enables the construction of non-terminating applications that continuously process endless streams of data by encapsulating terminating programs; (2) supports computation throughout a network of nodes from sensors at the edges of the network to the cloud and back to actuators at the edge; (3) allows users to separate concerns of the logic of an application from the parallel hardware on which the application runs, and (4) supports proofs and testing of the correct behavior of a composition from the specifications of its components.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126782996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CAN-based networked path-tracking control of a 4WS4WD electric vehicle: selection of sampling period and hardware-in-the-loop simulation 基于can的4WS4WD电动汽车网络路径跟踪控制:采样周期选择与硬件在环仿真
A. Singh, R. Potluri
A four-wheel steering four-wheel drive (4WS4WD) electric vehicle has a steering motor and a driving motor for each wheel, for a total of eight motors. An earlier work of the authors [2] presented a multi-input multi-output (MIMO) path-tracking control system (PTCS) for an autonomous version of this vehicle. The practical implementation of the PTCS planned by the authors has these nine modules communicating and forming feedback loops over a Controller Area Network (CAN)-based serial link, thereby forming a networked control system (NCS). However, the MIMO nonlinear loops in the PTCS turn the selection of the sampling period TS for a digital implementation, while factoring the time delays introduced by the communication, into a non-trivial task. This work solves the difficulty of MIMO nonlinear loops by finding a SISO representation of the MIMO NCS using a procedure that is applicable to a class of MIMO NCS that evince a certain symmetry. This work solves the problem of conservativeness of the controller and order of controller by systematically accounting for the time delays caused by the communication and by controller code execution. It then validates the choice of TS through a hardware-in-the-loop simulation. The techniques shown in this work are promising for applications involving the coordination of multiple actuators and for CAN-based NCS. Almost all of the subsequent literature seems to have focussed on the challenges, and has not tried to construct an NCS where these challenges may be absent. In sharp contrast, this work focuses in the positives of the NCS architecture, and avoids the challenges by using the communication protocol carefully. As a consequence, this work shows another positive of the NCS architecture that seems to have been overlooked by all the existing literature: that of performance improvement. This paper shows that distributed processing can be used to reduce the sampling interval.
四轮转向四轮驱动(4WS4WD)电动汽车每个车轮有一个转向电机和一个驱动电机,总共有8个电机。作者[2]的早期工作提出了一种用于自动驾驶车辆的多输入多输出(MIMO)路径跟踪控制系统(PTCS)。作者计划的PTCS的实际实现是这9个模块通过基于控制器局域网(CAN)的串行链路进行通信并形成反馈回路,从而形成网络化控制系统(NCS)。然而,PTCS中的MIMO非线性环路将采样周期TS的选择转变为数字实现,同时将通信引入的时间延迟分解为一项重要任务。这项工作通过使用适用于具有一定对称性的一类MIMO NCS的过程找到MIMO NCS的SISO表示来解决MIMO非线性回路的困难。该工作通过系统地考虑由通信和控制器代码执行引起的时间延迟,解决了控制器的保守性和顺序性问题。然后通过硬件在环仿真验证TS的选择。在这项工作中显示的技术是有希望的应用涉及多个执行器的协调和基于can的NCS。几乎所有的后续文献似乎都集中在这些挑战上,并没有试图构建一个可能不存在这些挑战的NCS。与此形成鲜明对比的是,这项工作侧重于NCS体系结构的优点,并通过仔细使用通信协议来避免挑战。因此,这项工作显示了NCS架构的另一个积极方面,这似乎被所有现有文献所忽视:性能改进。本文表明,分布式处理可以减小采样间隔。
{"title":"CAN-based networked path-tracking control of a 4WS4WD electric vehicle: selection of sampling period and hardware-in-the-loop simulation","authors":"A. Singh, R. Potluri","doi":"10.1145/3288599.3299726","DOIUrl":"https://doi.org/10.1145/3288599.3299726","url":null,"abstract":"A four-wheel steering four-wheel drive (4WS4WD) electric vehicle has a steering motor and a driving motor for each wheel, for a total of eight motors. An earlier work of the authors [2] presented a multi-input multi-output (MIMO) path-tracking control system (PTCS) for an autonomous version of this vehicle. The practical implementation of the PTCS planned by the authors has these nine modules communicating and forming feedback loops over a Controller Area Network (CAN)-based serial link, thereby forming a networked control system (NCS). However, the MIMO nonlinear loops in the PTCS turn the selection of the sampling period TS for a digital implementation, while factoring the time delays introduced by the communication, into a non-trivial task. This work solves the difficulty of MIMO nonlinear loops by finding a SISO representation of the MIMO NCS using a procedure that is applicable to a class of MIMO NCS that evince a certain symmetry. This work solves the problem of conservativeness of the controller and order of controller by systematically accounting for the time delays caused by the communication and by controller code execution. It then validates the choice of TS through a hardware-in-the-loop simulation. The techniques shown in this work are promising for applications involving the coordination of multiple actuators and for CAN-based NCS. Almost all of the subsequent literature seems to have focussed on the challenges, and has not tried to construct an NCS where these challenges may be absent. In sharp contrast, this work focuses in the positives of the NCS architecture, and avoids the challenges by using the communication protocol carefully. As a consequence, this work shows another positive of the NCS architecture that seems to have been overlooked by all the existing literature: that of performance improvement. This paper shows that distributed processing can be used to reduce the sampling interval.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129276396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study on rumor propagation trends and features in a post disaster situation 灾后情况下谣言传播趋势与特征研究
T. Mondal, Tunir Roy, Indrajit Bhattacharya, Sourav Bhattacharya, Indranil Das
This paper explores the characteristics of three established rumor propagation features i.e. temporal, structural and linguistic for collected tweets in a natural disaster i.e. Chennai Flood, 2015. The consequences of the features and the rationale behind such effects have been explored extensively for collected rumors and non-rumors of that disaster event.
本文探讨了2015年金奈洪水这一自然灾害中收集的推文的三个既定的谣言传播特征,即时间、结构和语言特征。这些特征的后果和这些影响背后的基本原理已经被广泛地探讨了收集到的关于那次灾难事件的谣言和非谣言。
{"title":"A study on rumor propagation trends and features in a post disaster situation","authors":"T. Mondal, Tunir Roy, Indrajit Bhattacharya, Sourav Bhattacharya, Indranil Das","doi":"10.1145/3288599.3295581","DOIUrl":"https://doi.org/10.1145/3288599.3295581","url":null,"abstract":"This paper explores the characteristics of three established rumor propagation features i.e. temporal, structural and linguistic for collected tweets in a natural disaster i.e. Chennai Flood, 2015. The consequences of the features and the rationale behind such effects have been explored extensively for collected rumors and non-rumors of that disaster event.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126935888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An accurate missing data prediction method using LSTM based deep learning for health care 基于LSTM的医疗卫生深度学习缺失数据准确预测方法
Hemant Verma, Sudhir Kumar
In this paper, an accurate missing data prediction method using Long Short-Term Memory (LSTM) based deep learning for health care is proposed. Physiological signal monitoring, especially with missing data, is a challenging task in health-care monitoring. The reliable and accurate acquisition of many physiological signals can help doctors to identify and detect potential health risks. In general, the missing data problem arises due to patient movement, faulty kits, incorrect observation or interference of the network. Subsequently, this problem leads to poorly diagnosed results. The ability of LSTM model to learn long-term dependencies enables it for efficient missing data prediction. In this paper, we proposed two LSTM model for 5-step and 10-step prediction. The dataset used is MIT-BIH normal person ECG data. The experimental results obtained using the LSTM method outperforms the Linear Regression and Gaussian Process Regression (GPR) method.
本文提出了一种基于长短期记忆(LSTM)深度学习的医疗保健缺失数据准确预测方法。生理信号监测是医疗监测中的一项具有挑战性的任务,尤其是在数据缺失的情况下。许多生理信号的可靠和准确的采集可以帮助医生识别和发现潜在的健康风险。通常,数据丢失问题是由于患者的移动、错误的试剂盒、不正确的观察或网络的干扰而引起的。随后,这个问题导致诊断结果不佳。LSTM模型学习长期依赖关系的能力使其能够有效地预测缺失数据。本文提出了两种LSTM模型分别用于5步和10步预测。使用的数据集是MIT-BIH正常人心电图数据。LSTM方法的实验结果优于线性回归和高斯过程回归(GPR)方法。
{"title":"An accurate missing data prediction method using LSTM based deep learning for health care","authors":"Hemant Verma, Sudhir Kumar","doi":"10.1145/3288599.3295580","DOIUrl":"https://doi.org/10.1145/3288599.3295580","url":null,"abstract":"In this paper, an accurate missing data prediction method using Long Short-Term Memory (LSTM) based deep learning for health care is proposed. Physiological signal monitoring, especially with missing data, is a challenging task in health-care monitoring. The reliable and accurate acquisition of many physiological signals can help doctors to identify and detect potential health risks. In general, the missing data problem arises due to patient movement, faulty kits, incorrect observation or interference of the network. Subsequently, this problem leads to poorly diagnosed results. The ability of LSTM model to learn long-term dependencies enables it for efficient missing data prediction. In this paper, we proposed two LSTM model for 5-step and 10-step prediction. The dataset used is MIT-BIH normal person ECG data. The experimental results obtained using the LSTM method outperforms the Linear Regression and Gaussian Process Regression (GPR) method.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114371546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Exploration and impact of blockchain-enabled adaptive non-binary trust models 区块链自适应非二元信任模型的探索和影响
D. W. Kravitz
Distributed identity-, attribute- and reputation- management constitutes a major benefit that a properly designed permissioned blockchain system can provide. As a complementary built-in feature set, finely-granulated and time-window-constrained auditability mechanisms aid blockchain performance and scalability by eliminating the need to front-load core transaction processing with onerous communications and computational complexity, while still meeting the requirements of effective governance, risk & compliance management and containment against compromised entities. A prevalent aspect of this methodology is the capability to determine not only what entities should be considered trustworthy, but to what extent and with which relevant functionalities, where completion of tasks entails distributing communications across multiple components as means of addressing corroboration of claimed suitability in order to choose the most trustworthy available solution components matched against specific sub-task requirements.
分布式身份、属性和声誉管理是设计合理的受许可区块链系统可以提供的主要优势。作为一种补充的内置功能集,细粒度和时间窗口约束的审计机制通过消除需要预先加载具有繁重通信和计算复杂性的核心事务处理来帮助区块链提高性能和可伸缩性,同时仍然满足有效治理、风险和合规性管理以及对受损实体的遏制的要求。该方法的一个普遍方面是,不仅能够确定哪些实体应该被认为是可信的,而且能够确定在多大程度上以及与哪些相关功能相关,其中任务的完成需要跨多个组件分发通信,作为解决声称的适用性的证实的手段,以便选择与特定子任务需求相匹配的最值得信赖的可用解决方案组件。
{"title":"Exploration and impact of blockchain-enabled adaptive non-binary trust models","authors":"D. W. Kravitz","doi":"10.1145/3288599.3288639","DOIUrl":"https://doi.org/10.1145/3288599.3288639","url":null,"abstract":"Distributed identity-, attribute- and reputation- management constitutes a major benefit that a properly designed permissioned blockchain system can provide. As a complementary built-in feature set, finely-granulated and time-window-constrained auditability mechanisms aid blockchain performance and scalability by eliminating the need to front-load core transaction processing with onerous communications and computational complexity, while still meeting the requirements of effective governance, risk & compliance management and containment against compromised entities. A prevalent aspect of this methodology is the capability to determine not only what entities should be considered trustworthy, but to what extent and with which relevant functionalities, where completion of tasks entails distributing communications across multiple components as means of addressing corroboration of claimed suitability in order to choose the most trustworthy available solution components matched against specific sub-task requirements.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114814924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Odd-even based adaptive two-way routing in mesh NoCs for hotspot mitigation 基于奇偶的网状noc自适应双向路由热点缓解
R. Raj, C. Gayathri, Saidalavi Kalady, P. Jayaraj
Network-on-Chip is adapted as a profitable framework for communication in on-chip multiprocessors. Congestion management using adaptive routing techniques become the major research focus in recent days. Hotspots are congested cores in multi-core systems, which has to deal with large amount of packetized data than other cores in the network. When a packet has to pass through hotspots, it will adversely affect the overall system performance. We identify the hotspot cores using counters, and propose an adaptive two-way routing algorithm by restricting some routes as in odd-even turn model to handle the presence of hotspots. The algorithm designed not only de-routes packets from current hotspots, but also reduces the possibility of nearby hotspots formation in the future. Experimental results using SPEC 2006 CPU benchmarks show that the chances of hotspots are large in highly congested traffic, and our algorithm gives about 14% average reduction in packet latency than existing routing methods in presence of hotspot cores.
片上网络被适应为片上多处理器通信的有利框架。采用自适应路由技术进行拥塞管理已成为近年来研究的热点。热点是多核系统中的拥塞核心,与网络中的其他核心相比,热点需要处理大量的分组数据。当数据包需要经过热点时,会对系统的整体性能产生不利影响。我们利用计数器识别热点核,并提出了一种自适应双向路由算法,通过限制奇偶轮模型中的一些路由来处理热点的存在。该算法不仅使数据包脱离当前热点,而且减少了未来在附近形成热点的可能性。使用spec2006 CPU基准测试的实验结果表明,在高度拥塞的流量中出现热点的可能性很大,并且在存在热点核心的情况下,我们的算法比现有路由方法平均减少了14%的数据包延迟。
{"title":"Odd-even based adaptive two-way routing in mesh NoCs for hotspot mitigation","authors":"R. Raj, C. Gayathri, Saidalavi Kalady, P. Jayaraj","doi":"10.1145/3288599.3288611","DOIUrl":"https://doi.org/10.1145/3288599.3288611","url":null,"abstract":"Network-on-Chip is adapted as a profitable framework for communication in on-chip multiprocessors. Congestion management using adaptive routing techniques become the major research focus in recent days. Hotspots are congested cores in multi-core systems, which has to deal with large amount of packetized data than other cores in the network. When a packet has to pass through hotspots, it will adversely affect the overall system performance. We identify the hotspot cores using counters, and propose an adaptive two-way routing algorithm by restricting some routes as in odd-even turn model to handle the presence of hotspots. The algorithm designed not only de-routes packets from current hotspots, but also reduces the possibility of nearby hotspots formation in the future. Experimental results using SPEC 2006 CPU benchmarks show that the chances of hotspots are large in highly congested traffic, and our algorithm gives about 14% average reduction in packet latency than existing routing methods in presence of hotspot cores.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126493809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
EnTER: an encounter based trowbox deployment strategy for enhancing network reliability in post-disaster scenarios over DTN 进入:一种基于偶遇的槽箱部署策略,通过DTN增强灾后场景下的网络可靠性
S. Bhattacharjee, S. Bit
Delay-tolerant network (DTN) has been employed as a viable option for exchanging situational information during post-disaster communication. In contrast to stable network, network reliability in DTN depends on the contact opportunities among the nodes (both mobile and static). Higher degree of contact opportunity implies improved message delivery with reduced delivery latency, which results in enhanced network reliability. In order to improve the degree of contact opportunity among the nodes the deployment of static relay nodes (Throwboxes) has been widely adopted. In order to deploy Throwboxes effectively, prior knowledge regarding network parameters like scale of the network, network topology and mobility pattern of nodes etc. is essential. However, availability of such parameters in post disaster scenarios becomes challenging. Therefore, in this work, we propose an encounter based Throwbox deployment strategy EnTER. The proposed strategy attempts to formulate an empirical relationship between the degree of contact opportunity and extent of network reliability in DTN. The extent of network reliability is measured in terms of Knowledge Sharing Ratio and Average Delivery Latency. This relationship helps in formulating a suitable strategy for deploying Throwboxes in a post-disaster scenario. Extensive simulation by implementing a realistic post-disaster scenario reveals that our proposed Throwbox deployment strategy outperforms one of the state-of-the-art Throwbox deployment strategies in terms of network reliability.
容延迟网络(Delay-tolerant network, DTN)已成为灾后通信中交换情景信息的可行选择。与稳定网络相比,DTN网络的可靠性取决于节点之间(包括移动和静态)的接触机会。更高程度的接触机会意味着改进消息传递,减少传递延迟,从而提高网络可靠性。为了提高节点间的接触机会程度,静态中继节点(Throwboxes)的部署被广泛采用。为了有效地部署Throwboxes,关于网络规模、网络拓扑和节点移动模式等网络参数的先验知识是必不可少的。然而,这些参数在灾后场景中的可用性变得具有挑战性。因此,在这项工作中,我们提出了一种基于偶遇的Throwbox部署策略EnTER。本文提出的策略试图建立DTN中接触机会程度与网络可靠性程度之间的经验关系。通过知识共享率和平均传递延迟来衡量网络的可靠性程度。这种关系有助于制定在灾后场景中部署Throwboxes的合适策略。通过实现现实的灾后场景进行的广泛模拟表明,我们提出的Throwbox部署策略在网络可靠性方面优于最先进的Throwbox部署策略之一。
{"title":"EnTER: an encounter based trowbox deployment strategy for enhancing network reliability in post-disaster scenarios over DTN","authors":"S. Bhattacharjee, S. Bit","doi":"10.1145/3288599.3295593","DOIUrl":"https://doi.org/10.1145/3288599.3295593","url":null,"abstract":"Delay-tolerant network (DTN) has been employed as a viable option for exchanging situational information during post-disaster communication. In contrast to stable network, network reliability in DTN depends on the contact opportunities among the nodes (both mobile and static). Higher degree of contact opportunity implies improved message delivery with reduced delivery latency, which results in enhanced network reliability. In order to improve the degree of contact opportunity among the nodes the deployment of static relay nodes (Throwboxes) has been widely adopted. In order to deploy Throwboxes effectively, prior knowledge regarding network parameters like scale of the network, network topology and mobility pattern of nodes etc. is essential. However, availability of such parameters in post disaster scenarios becomes challenging. Therefore, in this work, we propose an encounter based Throwbox deployment strategy EnTER. The proposed strategy attempts to formulate an empirical relationship between the degree of contact opportunity and extent of network reliability in DTN. The extent of network reliability is measured in terms of Knowledge Sharing Ratio and Average Delivery Latency. This relationship helps in formulating a suitable strategy for deploying Throwboxes in a post-disaster scenario. Extensive simulation by implementing a realistic post-disaster scenario reveals that our proposed Throwbox deployment strategy outperforms one of the state-of-the-art Throwbox deployment strategies in terms of network reliability.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114793867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
iSecure: imperceptible and secure peer-to-peer communication of post-disaster situational data over opportunistic DTN iSecure:难以察觉的和安全的点对点通信的灾后情景数据通过机会DTN
Chandrima Chakrabarti, Siuli Roy
Researchers have proposed to set up "infrastructure-less" peer-to-peer opportunistic network (also known as Delay Tolerant Network) using smart phones carried by different victims or volunteers in post-disaster scenario. Volunteers may use this DTN to relay sensitive situational data. However, in such fragile network environment, some malicious nodes may try to intercept, manipulate data with the intention of corruption and fraud. Furthermore, an adversary node may compel a trusted node to compromise its security credentials or may physically capture the node. As a result, attackers get the authority to sign any message on behalf of the compromised node and can launch various attacks to perturb the network. To combat these attacks, we envision a compromise-tolerant DTN, where time-varying pseudonyms are used to obscure the actual identity and safeguard the privacy of genuine nodes. Unique implicit session key agreement facilitates the establishment of credential-free secure communication session between two legitimate nodes and protects the data from being revealed to the adversaries. Periodic certificate revocation scheme restricts use of any compromised credentials beyond a certain time. We evaluate iSecure scheme using ONE simulator to understand feasibility, performance and overhead.
研究人员提出,在灾后场景中,利用不同的受害者或志愿者携带的智能手机,建立“无基础设施”的点对点机会网络(也称为容忍延迟网络)。志愿者可以使用这个DTN来传递敏感的情景数据。然而,在这种脆弱的网络环境中,一些恶意节点可能会试图拦截、操纵数据,从而达到破坏和欺诈的目的。此外,对手节点可能会迫使受信任节点妥协其安全凭据,或者可能物理地捕获该节点。因此,攻击者获得了代表受损节点签署任何消息的权限,并可以发起各种攻击来扰乱网络。为了对抗这些攻击,我们设想了一个容错的DTN,其中使用时变的假名来掩盖实际身份并保护真正节点的隐私。独特的隐式会话密钥协议有助于在两个合法节点之间建立无凭据的安全通信会话,保护数据不被泄露给攻击者。定期证书撤销方案限制在一定时间内使用任何泄露的凭据。我们使用一个模拟器来评估iSecure方案,以了解可行性、性能和开销。
{"title":"iSecure: imperceptible and secure peer-to-peer communication of post-disaster situational data over opportunistic DTN","authors":"Chandrima Chakrabarti, Siuli Roy","doi":"10.1145/3288599.3295585","DOIUrl":"https://doi.org/10.1145/3288599.3295585","url":null,"abstract":"Researchers have proposed to set up \"infrastructure-less\" peer-to-peer opportunistic network (also known as Delay Tolerant Network) using smart phones carried by different victims or volunteers in post-disaster scenario. Volunteers may use this DTN to relay sensitive situational data. However, in such fragile network environment, some malicious nodes may try to intercept, manipulate data with the intention of corruption and fraud. Furthermore, an adversary node may compel a trusted node to compromise its security credentials or may physically capture the node. As a result, attackers get the authority to sign any message on behalf of the compromised node and can launch various attacks to perturb the network. To combat these attacks, we envision a compromise-tolerant DTN, where time-varying pseudonyms are used to obscure the actual identity and safeguard the privacy of genuine nodes. Unique implicit session key agreement facilitates the establishment of credential-free secure communication session between two legitimate nodes and protects the data from being revealed to the adversaries. Periodic certificate revocation scheme restricts use of any compromised credentials beyond a certain time. We evaluate iSecure scheme using ONE simulator to understand feasibility, performance and overhead.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124691631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the 20th International Conference on Distributed Computing and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1