首页 > 最新文献

Proceedings of the 20th International Conference on Distributed Computing and Networking最新文献

英文 中文
Sublinear-time mutual visibility for fat oblivious robots 肥胖遗忘机器人的亚线性时间互可见性
Pavan Poudel, Gokarna Sharma, Aisha Aljohani
We consider a system of N autonomous mobile robots that operate following the classic oblivious robots model. In particular, we consider fat robots abstracted as unit discs operating on an infinite grid graph G (embedded on the Euclidean plane), and study the fundamental problem, where starting from an arbitrary initial configuration, N autonomous robots reposition themselves on the nodes of G to reach a configuration where each robot is visible to all others (the Complete Visibility problem). We provide the first [MATH HERE]-time algorithm for this problem under a centralized scheduler. We also show that the algorithm is asymptotically tight, i.e., even under a centralized scheduler, any algorithm needs [MATH HERE] time for this problem. We then provide the first [MATH HERE]-time algorithm for this problem under a distributed scheduler for a special initial configuration. To the best of our knowledge, these are the first sublinear-time results for the visibility of fat oblivious robots.
我们考虑一个由N个自主移动机器人组成的系统,它们遵循经典的遗忘机器人模型。特别是,我们将肥胖机器人抽象为在无限网格图G(嵌入欧几里德平面)上操作的单位圆盘,并研究基本问题,其中从任意初始配置开始,N个自主机器人在G的节点上重新定位自己,以达到每个机器人对所有其他机器人可见的配置(完全可见性问题)。我们在集中式调度程序下为这个问题提供了第一个[MATH HERE]时间算法。我们还证明了该算法是渐近紧密的,即,即使在集中式调度程序下,任何算法都需要[MATH HERE]时间来解决这个问题。然后,我们在一个特殊初始配置的分布式调度程序下为这个问题提供了第一个[MATH HERE]时间算法。据我们所知,这是第一个关于肥胖机器人可见性的亚线性时间结果。
{"title":"Sublinear-time mutual visibility for fat oblivious robots","authors":"Pavan Poudel, Gokarna Sharma, Aisha Aljohani","doi":"10.1145/3288599.3288602","DOIUrl":"https://doi.org/10.1145/3288599.3288602","url":null,"abstract":"We consider a system of N autonomous mobile robots that operate following the classic oblivious robots model. In particular, we consider fat robots abstracted as unit discs operating on an infinite grid graph G (embedded on the Euclidean plane), and study the fundamental problem, where starting from an arbitrary initial configuration, N autonomous robots reposition themselves on the nodes of G to reach a configuration where each robot is visible to all others (the Complete Visibility problem). We provide the first [MATH HERE]-time algorithm for this problem under a centralized scheduler. We also show that the algorithm is asymptotically tight, i.e., even under a centralized scheduler, any algorithm needs [MATH HERE] time for this problem. We then provide the first [MATH HERE]-time algorithm for this problem under a distributed scheduler for a special initial configuration. To the best of our knowledge, these are the first sublinear-time results for the visibility of fat oblivious robots.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129912475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Reconfigurable dataflow graphs for processing-in-memory 用于内存处理的可重构数据流图
C. Shelor, K. Kavi
In order to meet the ever-increasing speed differences between processor clocks and memory access times, there has been an interest in moving computation closer to memory. The near data processing or processing-in-memory is particularly suited for very high bandwidth memories such as the 3D-DRAMs. There are different ideas proposed for PIMs, including simple in-order processors, GPUs, specialized ASICs and reconfigurable designs. In our case, we use Coarse-Grained Reconfigurable Logic to build dataflow graphs for computational kernels as the PIM. We show that our approach can achieve significant speedups and save energy consumed by computations. We evaluated our designs using several processing technologies for building the coarse-gained logic units. The DFPIM concept showed good performance improvement and excellent energy efficiency for the streaming benchmarks that were analyzed. The DFPIM in a 28 nm process with an implementation in each of 16 vaults of a 3D-DRAM logic layer showed an average speed-up of 7.2 over that using 32 cores of an Intel Xeon server system. The server processor required 368 times more energy to execute the benchmarks than the DFPIM implementation.
为了满足处理器时钟和内存访问时间之间不断增长的速度差异,人们对将计算移到更靠近内存的地方很感兴趣。近数据处理或内存处理特别适合于非常高带宽的存储器,如3d - dram。针对pim提出了不同的想法,包括简单的顺序处理器、gpu、专用asic和可重构设计。在我们的示例中,我们使用粗粒度可重构逻辑为计算内核构建数据流图作为PIM。我们表明,我们的方法可以实现显着的加速和节省能源消耗的计算。我们使用几种处理技术来评估我们的设计,以构建粗获得的逻辑单元。DFPIM概念在分析的流基准测试中显示出良好的性能改进和卓越的能源效率。在3D-DRAM逻辑层的16个vault中实现的28 nm工艺中的DFPIM比使用32核英特尔至强服务器系统的平均速度提高了7.2。服务器处理器执行基准测试所需的能量是DFPIM实现的368倍。
{"title":"Reconfigurable dataflow graphs for processing-in-memory","authors":"C. Shelor, K. Kavi","doi":"10.1145/3288599.3288605","DOIUrl":"https://doi.org/10.1145/3288599.3288605","url":null,"abstract":"In order to meet the ever-increasing speed differences between processor clocks and memory access times, there has been an interest in moving computation closer to memory. The near data processing or processing-in-memory is particularly suited for very high bandwidth memories such as the 3D-DRAMs. There are different ideas proposed for PIMs, including simple in-order processors, GPUs, specialized ASICs and reconfigurable designs. In our case, we use Coarse-Grained Reconfigurable Logic to build dataflow graphs for computational kernels as the PIM. We show that our approach can achieve significant speedups and save energy consumed by computations. We evaluated our designs using several processing technologies for building the coarse-gained logic units. The DFPIM concept showed good performance improvement and excellent energy efficiency for the streaming benchmarks that were analyzed. The DFPIM in a 28 nm process with an implementation in each of 16 vaults of a 3D-DRAM logic layer showed an average speed-up of 7.2 over that using 32 cores of an Intel Xeon server system. The server processor required 368 times more energy to execute the benchmarks than the DFPIM implementation.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130435328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
To protect ecological system from electromagnetic radiation of mobile communication 保护生态系统免受移动通信的电磁辐射
Avirup Das, Srabani Kundu
The ever-increasing use of mobile phones, IoT, and the related infrastructures like wireless access points and mobile base stations is becoming a prominent source of non-ionizing electromagnetic field (EMF) having some harmful effects on our ecology. In this work, the effect of the non-ionizing electromagnetic radiation of BTS (Base Transceiver Station) and the Wi-Fi access points on our ecological system has been investigated over frequency band 900 MHz to 2500 MHz. A testbed is designed utilizing sensors to measure the EMF strength over a given region, and a heat map is generated. Using the standard safe limit of specific absorption rate (SAR) this heat map may enable us to issue alerts whenever the measured EMF exceeds the SAR limit. The stream of data from these sensors may be uploaded on a cloud to implement an adaptive transmitter power control mechanism to reduce the signal strength dynamically to maintain the safe limit of SAR. A modular design is proposed to implement a cloud-based transmission power control mechanism that can be applied for BTS as well as Wi-Fi routers in cellular networks.
移动电话、物联网以及无线接入点和移动基站等相关基础设施的使用日益增加,正成为非电离电磁场(EMF)的主要来源,对我们的生态产生了一些有害影响。在这项工作中,研究了900 MHz至2500 MHz频段上BTS (Base Transceiver Station)和Wi-Fi接入点的非电离电磁辐射对我们生态系统的影响。设计了一个试验台,利用传感器测量给定区域的电动势强度,并生成热图。使用特定吸收率(SAR)的标准安全限值,该热图可使我们在测量的EMF超过SAR限值时发出警报。这些传感器的数据流可以上传到云端,实现自适应的发射功率控制机制,动态降低信号强度,以保持SAR的安全极限。提出了一种模块化设计,实现基于云的发射功率控制机制,可应用于蜂窝网络中的BTS和Wi-Fi路由器。
{"title":"To protect ecological system from electromagnetic radiation of mobile communication","authors":"Avirup Das, Srabani Kundu","doi":"10.1145/3288599.3295595","DOIUrl":"https://doi.org/10.1145/3288599.3295595","url":null,"abstract":"The ever-increasing use of mobile phones, IoT, and the related infrastructures like wireless access points and mobile base stations is becoming a prominent source of non-ionizing electromagnetic field (EMF) having some harmful effects on our ecology. In this work, the effect of the non-ionizing electromagnetic radiation of BTS (Base Transceiver Station) and the Wi-Fi access points on our ecological system has been investigated over frequency band 900 MHz to 2500 MHz. A testbed is designed utilizing sensors to measure the EMF strength over a given region, and a heat map is generated. Using the standard safe limit of specific absorption rate (SAR) this heat map may enable us to issue alerts whenever the measured EMF exceeds the SAR limit. The stream of data from these sensors may be uploaded on a cloud to implement an adaptive transmitter power control mechanism to reduce the signal strength dynamically to maintain the safe limit of SAR. A modular design is proposed to implement a cloud-based transmission power control mechanism that can be applied for BTS as well as Wi-Fi routers in cellular networks.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129222388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multi-tenant mobile offloading systems for real-time computer vision applications 用于实时计算机视觉应用的多租户移动卸载系统
Zhou Fang, Jeng-Hau Lin, M. Srivastava, Rajesh K. Gupta
Offloading techniques enable many emerging computer vision applications on mobile platforms by executing compute-intensive tasks on resource-rich servers. Although there have been a significant amount of research efforts devoted in optimizing mobile offloading frameworks, most previous works are evaluated in a single-tenant setting, that is, a server is assigned to a single client. However, in a practical scenario that servers must handle tasks from many clients running diverse applications, contention on shared server resources may degrade application performance. In this work, we study scheduling techniques to improve serving performance in multi-tenant mobile offloading systems, for computer vision algorithms running on CPUs and deep neural networks (DNNs) running on GPUs. For CPU workloads, we present methods to mitigate resource contention and to improve delay using a Plan-Schedule approach. The planning phase predicts future workloads from all clients, estimates contention, and adjusts future task start times to remove or reduce contention. The scheduling phase dispatches arriving offloaded tasks to the server that minimizes contention. For DNN workloads running on GPUs, we propose adaptive batching algorithms using information of batch size, model complexity and system load to achieve the best Quality of Service (QoS), which are measured from accuracy and delay of DNN tasks. We demonstrate the improvement of serving performance using several real-world applications with different server deployments.
卸载技术通过在资源丰富的服务器上执行计算密集型任务,使许多新兴的计算机视觉应用程序能够在移动平台上运行。尽管在优化移动卸载框架方面已经进行了大量的研究工作,但大多数先前的工作都是在单租户设置中进行评估的,即将服务器分配给单个客户端。但是,在服务器必须处理来自运行不同应用程序的许多客户机的任务的实际场景中,对共享服务器资源的争用可能会降低应用程序的性能。在这项工作中,我们研究了调度技术,以提高多租户移动卸载系统中运行在cpu上的计算机视觉算法和运行在gpu上的深度神经网络(dnn)的服务性能。对于CPU工作负载,我们提出了使用计划-调度方法来减轻资源争用和改善延迟的方法。规划阶段预测来自所有客户机的未来工作负载,估计争用,并调整未来的任务启动时间以消除或减少争用。调度阶段将到达的卸载任务分派给最大限度减少争用的服务器。对于在gpu上运行的DNN工作负载,我们提出了自适应批处理算法,利用批处理大小、模型复杂性和系统负载的信息来实现最佳的服务质量(QoS),这是从DNN任务的准确性和延迟来衡量的。我们使用几个具有不同服务器部署的实际应用程序来演示服务性能的改进。
{"title":"Multi-tenant mobile offloading systems for real-time computer vision applications","authors":"Zhou Fang, Jeng-Hau Lin, M. Srivastava, Rajesh K. Gupta","doi":"10.1145/3288599.3288634","DOIUrl":"https://doi.org/10.1145/3288599.3288634","url":null,"abstract":"Offloading techniques enable many emerging computer vision applications on mobile platforms by executing compute-intensive tasks on resource-rich servers. Although there have been a significant amount of research efforts devoted in optimizing mobile offloading frameworks, most previous works are evaluated in a single-tenant setting, that is, a server is assigned to a single client. However, in a practical scenario that servers must handle tasks from many clients running diverse applications, contention on shared server resources may degrade application performance. In this work, we study scheduling techniques to improve serving performance in multi-tenant mobile offloading systems, for computer vision algorithms running on CPUs and deep neural networks (DNNs) running on GPUs. For CPU workloads, we present methods to mitigate resource contention and to improve delay using a Plan-Schedule approach. The planning phase predicts future workloads from all clients, estimates contention, and adjusts future task start times to remove or reduce contention. The scheduling phase dispatches arriving offloaded tasks to the server that minimizes contention. For DNN workloads running on GPUs, we propose adaptive batching algorithms using information of batch size, model complexity and system load to achieve the best Quality of Service (QoS), which are measured from accuracy and delay of DNN tasks. We demonstrate the improvement of serving performance using several real-world applications with different server deployments.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"17 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116708643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Scheduling virtual wifi interfaces for high bandwidth video upstreaming using multipath TCP 调度虚拟wifi接口,使用多路径TCP实现高带宽视频上行
Shobhi Maheshwari, Philip Lundrigan, S. Kasera
Live video upstreaming refers to the flow of live data in the upstream direction from mobile devices to other entities across the Internet and has found use in many modern applications such as remote driving, the recent social media trend of live video broadcasting along with the traditional applications of video calling/conferencing. Combined with the high definition video capturing capabilities of modern mobile devices, live video upstreaming is creating more upstream data traffic then what present day cellular networks are equipped to support, often resulting in sub-optimal video experience, especially in remote or crowded areas with low cellular connectivity and no WiFi. We propose that instead of using its single cellular connection, a mobile device connects to multiple nearby mobile devices and splits the live video data over the cellular bandwidth of these devices using Multipath TCP protocol. The use of MPTCP, for upstreaming live video data, has largely remained unexplored especially for scenarios where WiFi connectivity is not available. We use wireless interface virtualization, offered by Linux, to enable Multipath TCP to scale and connect to a large number of cellular devices. We design and build a system that is able to assess the instantaneous bandwidth of all the connected cellular devices/hotspots and uses the set of the most capable cellular devices for splitting and forwarding the live video data. We test our system in various settings and our experiments show that our system greatly increases the bandwidth and reliability of TCP connections in most cases and in cases where there is a significant difference in the throughput across cellular hotspots, our solution is able to recognize and isolate the better performing cellular hotspots to provide a stable throughput.
视频直播是指实时数据在互联网上从移动设备向其他实体的上游方向流动,在许多现代应用中都有应用,例如远程驾驶、最近的社交媒体趋势视频直播以及视频通话/会议等传统应用。结合现代移动设备的高清视频捕捉功能,实时视频上行流产生的上游数据流量比目前的蜂窝网络所能支持的要多,这通常会导致视频体验不佳,特别是在蜂窝网络连接低且没有WiFi的偏远或拥挤地区。我们建议,移动设备不使用单个蜂窝连接,而是连接到附近的多个移动设备,并使用多路径TCP协议在这些设备的蜂窝带宽上分割实时视频数据。MPTCP用于上行直播视频数据的使用在很大程度上仍未被探索,特别是在没有WiFi连接的情况下。我们使用Linux提供的无线接口虚拟化,使Multipath TCP能够扩展并连接到大量的蜂窝设备。我们设计并构建了一个系统,该系统能够评估所有连接的蜂窝设备/热点的瞬时带宽,并使用一组最强大的蜂窝设备来分割和转发实时视频数据。我们在各种设置中测试了我们的系统,我们的实验表明,我们的系统在大多数情况下大大增加了TCP连接的带宽和可靠性,并且在蜂窝热点之间的吞吐量存在显着差异的情况下,我们的解决方案能够识别和隔离性能较好的蜂窝热点,以提供稳定的吞吐量。
{"title":"Scheduling virtual wifi interfaces for high bandwidth video upstreaming using multipath TCP","authors":"Shobhi Maheshwari, Philip Lundrigan, S. Kasera","doi":"10.1145/3288599.3288620","DOIUrl":"https://doi.org/10.1145/3288599.3288620","url":null,"abstract":"Live video upstreaming refers to the flow of live data in the upstream direction from mobile devices to other entities across the Internet and has found use in many modern applications such as remote driving, the recent social media trend of live video broadcasting along with the traditional applications of video calling/conferencing. Combined with the high definition video capturing capabilities of modern mobile devices, live video upstreaming is creating more upstream data traffic then what present day cellular networks are equipped to support, often resulting in sub-optimal video experience, especially in remote or crowded areas with low cellular connectivity and no WiFi. We propose that instead of using its single cellular connection, a mobile device connects to multiple nearby mobile devices and splits the live video data over the cellular bandwidth of these devices using Multipath TCP protocol. The use of MPTCP, for upstreaming live video data, has largely remained unexplored especially for scenarios where WiFi connectivity is not available. We use wireless interface virtualization, offered by Linux, to enable Multipath TCP to scale and connect to a large number of cellular devices. We design and build a system that is able to assess the instantaneous bandwidth of all the connected cellular devices/hotspots and uses the set of the most capable cellular devices for splitting and forwarding the live video data. We test our system in various settings and our experiments show that our system greatly increases the bandwidth and reliability of TCP connections in most cases and in cases where there is a significant difference in the throughput across cellular hotspots, our solution is able to recognize and isolate the better performing cellular hotspots to provide a stable throughput.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121722914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving efficacy of concurrent internal binary search trees using local recovery 利用局部恢复提高并发内部二叉搜索树的效率
Arunmoezhi Ramachandran, N. Mittal
Binary Search Tree (BST) is an important data structure for managing ordered data. Many algorithms have been proposed for concurrent manipulation of a binary search tree in an asynchronous shared memory system that supports search, insert and delete operations based on both external and internal representations of a search tree. An important step in executing an operation on a tree is to traverse the tree from top-to-down in order to locate the operation's window. A process may need to perform this traversal several times to handle failures occurring due to other processes performing concurrent updates on the tree. Most concurrent algorithms that have been proposed so far use a naïve approach and simply restart the traversal from the root of the tree. In this work, we present a new approach to recover from such failures more efficiently for certain types of concurrent binary search tree algorithms using local recovery by restarting the traversal from the "middle" of the tree in order to locate an operation's window (tree section of interest). Our approach is sufficiently general in the sense that it can be applied to most of the existing concurrent binary search trees using internal representation based on both blocking as well as non-blocking approaches. Using experimental evaluation, we demonstrate that our local recovery approach can significantly improve the performance of a concurrent internal BST by up to 124.7% when the contention is high.
二叉搜索树(BST)是管理有序数据的重要数据结构。对于异步共享内存系统中二叉搜索树的并发操作,已经提出了许多算法,这些算法支持基于搜索树的外部和内部表示进行搜索、插入和删除操作。在树上执行操作的一个重要步骤是自上而下遍历树,以便定位操作的窗口。一个进程可能需要多次执行这种遍历来处理由于其他进程在树上执行并发更新而导致的故障。到目前为止提出的大多数并发算法都使用naïve方法,只是从树的根重新开始遍历。在这项工作中,我们提出了一种新的方法,可以更有效地从某些类型的并发二叉搜索树算法中恢复,使用本地恢复,从树的“中间”重新开始遍历,以定位操作的窗口(感兴趣的树部分)。我们的方法在某种意义上是足够通用的,它可以应用于大多数现有的并发二叉搜索树,使用基于阻塞和非阻塞方法的内部表示。通过实验评估,我们证明了我们的本地恢复方法可以显着提高并发内部BST的性能,当争用高时,性能可提高124.7%。
{"title":"Improving efficacy of concurrent internal binary search trees using local recovery","authors":"Arunmoezhi Ramachandran, N. Mittal","doi":"10.1145/3288599.3288615","DOIUrl":"https://doi.org/10.1145/3288599.3288615","url":null,"abstract":"Binary Search Tree (BST) is an important data structure for managing ordered data. Many algorithms have been proposed for concurrent manipulation of a binary search tree in an asynchronous shared memory system that supports search, insert and delete operations based on both external and internal representations of a search tree. An important step in executing an operation on a tree is to traverse the tree from top-to-down in order to locate the operation's window. A process may need to perform this traversal several times to handle failures occurring due to other processes performing concurrent updates on the tree. Most concurrent algorithms that have been proposed so far use a naïve approach and simply restart the traversal from the root of the tree. In this work, we present a new approach to recover from such failures more efficiently for certain types of concurrent binary search tree algorithms using local recovery by restarting the traversal from the \"middle\" of the tree in order to locate an operation's window (tree section of interest). Our approach is sufficiently general in the sense that it can be applied to most of the existing concurrent binary search trees using internal representation based on both blocking as well as non-blocking approaches. Using experimental evaluation, we demonstrate that our local recovery approach can significantly improve the performance of a concurrent internal BST by up to 124.7% when the contention is high.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"63 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114045146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On designing a fast-deployable 'localized' GIS platform for using 'offline' during post-disaster situation 设计一个快速部署的“本地化”GIS平台,用于灾后情况下的“离线”使用
P. Paul, C. Mukherjee, B. Ghosh, Sudipta Pandit, Sujoy Saha, S. Nandi
Modeling the demand and supply during an absolute catastrophe is a major challenge for any disaster manager. This paper demonstrates implementation of an easily deployable end-to-end system, by which, various situational data can be collected by the stakeholders during any post-disaster circumstances, and a general summarized view can be plotted on crisis map. The proposed Four Tier Hybrid Ad hoc Network Architecture does not require an Internet backbone but can conduct the complete process in 'offline' mode. Periodic Merging of GIS data enriches the quality of the summarized view. Here we have tried to evaluate the system based on some initial results on a dummy challenged network scenario.
对绝对灾难期间的需求和供应进行建模是任何灾难管理人员面临的主要挑战。本文演示了一个易于部署的端到端系统的实现,通过该系统,利益相关者可以在任何灾后情况下收集各种情景数据,并可以在危机地图上绘制总体总结视图。提出的四层混合自组织网络架构不需要互联网骨干网,但可以在“离线”模式下完成整个过程。GIS数据的定期合并提高了汇总视图的质量。在这里,我们尝试基于虚拟挑战网络场景的一些初始结果来评估系统。
{"title":"On designing a fast-deployable 'localized' GIS platform for using 'offline' during post-disaster situation","authors":"P. Paul, C. Mukherjee, B. Ghosh, Sudipta Pandit, Sujoy Saha, S. Nandi","doi":"10.1145/3288599.3295592","DOIUrl":"https://doi.org/10.1145/3288599.3295592","url":null,"abstract":"Modeling the demand and supply during an absolute catastrophe is a major challenge for any disaster manager. This paper demonstrates implementation of an easily deployable end-to-end system, by which, various situational data can be collected by the stakeholders during any post-disaster circumstances, and a general summarized view can be plotted on crisis map. The proposed Four Tier Hybrid Ad hoc Network Architecture does not require an Internet backbone but can conduct the complete process in 'offline' mode. Periodic Merging of GIS data enriches the quality of the summarized view. Here we have tried to evaluate the system based on some initial results on a dummy challenged network scenario.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123382233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Proactive diabetes management: research directions 积极的糖尿病管理:研究方向
Merlin George, A. Chacko, Sudeep Koshy Kurien
More than 200 million people across the globe are affected by Diabetes Mellitus (DM), which is one of the most common endocrine disorders. DM progression is dangerous as it leads to several life-threatening complications within 5--15 years of onset, depending on the care and management that they receive for DM. Hence, it is important for the public and healthcare policymakers to look proactively at managing the onset of the disease and delay associated complications as far as possible. Proactive management would result in significant reductions in the healthcare expenses. The fight against DM is multidisciplinary and research-oriented. Computer and data scientists can collaborate with medical researchers to augment research and management by using the power of big data analytics, machine learning, IoT (Internet of Things), and cloud computing. Computing principles and techniques can be used to efficiently collect, manage, and analyse data to derive meaningful insights, which can then be used for efficient management of the health concerns of patients. This paper describes the need for diabetes management and reviews technological interventions and related research directions in proactive diabetes management.
全球有超过2亿人患有糖尿病(DM),这是最常见的内分泌疾病之一。糖尿病的进展是危险的,因为它会在发病的5- 15年内导致几种危及生命的并发症,这取决于他们接受的糖尿病的护理和管理。因此,公众和医疗保健决策者积极考虑控制疾病的发作并尽可能延迟相关并发症是很重要的。积极主动的管理将显著减少医疗费用。与糖尿病的斗争是多学科和以研究为导向的。计算机和数据科学家可以与医学研究人员合作,利用大数据分析、机器学习、物联网(IoT)和云计算的力量来增强研究和管理。计算原理和技术可用于有效地收集、管理和分析数据,以获得有意义的见解,然后可用于有效管理患者的健康问题。本文阐述了糖尿病管理的必要性,综述了糖尿病主动管理的技术干预措施及相关研究方向。
{"title":"Proactive diabetes management: research directions","authors":"Merlin George, A. Chacko, Sudeep Koshy Kurien","doi":"10.1145/3288599.3297119","DOIUrl":"https://doi.org/10.1145/3288599.3297119","url":null,"abstract":"More than 200 million people across the globe are affected by Diabetes Mellitus (DM), which is one of the most common endocrine disorders. DM progression is dangerous as it leads to several life-threatening complications within 5--15 years of onset, depending on the care and management that they receive for DM. Hence, it is important for the public and healthcare policymakers to look proactively at managing the onset of the disease and delay associated complications as far as possible. Proactive management would result in significant reductions in the healthcare expenses. The fight against DM is multidisciplinary and research-oriented. Computer and data scientists can collaborate with medical researchers to augment research and management by using the power of big data analytics, machine learning, IoT (Internet of Things), and cloud computing. Computing principles and techniques can be used to efficiently collect, manage, and analyse data to derive meaningful insights, which can then be used for efficient management of the health concerns of patients. This paper describes the need for diabetes management and reviews technological interventions and related research directions in proactive diabetes management.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124900978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Defense strategies and expected capacity of high performance computing infrastructures 高性能计算基础设施的防御策略和预期容量
N. Rao, N. Imam, Chris Y. T. Ma, Fei He
We consider high performance computing infrastructures consisting of multiple sites connected over a wide-area network. These sites house heterogeneous computing systems, network elements and local-area connections, and the wide-area network plays a critical, asymmetric role of providing the vital connectivity between them. We model this infrastructure as a recursive system of systems, wherein the basic systems at the finest levels are composed of discrete cyber and physical components. These components may be disabled by cyber and physical disruptions, and their reinforcements protect against them albeit at a cost. We utilize results from a game formulation based on (i) characterizing the disruptions between systems at each level of recursion using aggregate failure correlation functions, and within basic systems using the multiplier functions, and (ii) using utility functions expressed in terms of the number of basic system components attacked and reinforced. At Nash Equilibrium, we derive expressions for the expected capacity of the infrastructure given by the number of computing nodes that are operational and connected to the network.
我们考虑由广域网上连接的多个站点组成的高性能计算基础设施。这些站点容纳异构计算系统、网络元素和局部区域连接,广域网在提供它们之间的重要连接方面起着关键的、不对称的作用。我们将此基础设施建模为系统的递归系统,其中最高级的基本系统由离散的网络和物理组件组成。这些组件可能会因网络和物理干扰而失效,它们的增援可以防范这些干扰,尽管这是有代价的。我们利用游戏公式的结果,该公式基于(i)使用总体失效相关函数描述递归的每个级别的系统之间的中断,并在基本系统内使用乘数函数,以及(ii)使用以受攻击和增强的基本系统组件数量表示的效用函数。在纳什均衡中,我们推导出基础设施预期容量的表达式,该表达式由可运行并连接到网络的计算节点的数量给出。
{"title":"Defense strategies and expected capacity of high performance computing infrastructures","authors":"N. Rao, N. Imam, Chris Y. T. Ma, Fei He","doi":"10.1145/3288599.3288625","DOIUrl":"https://doi.org/10.1145/3288599.3288625","url":null,"abstract":"We consider high performance computing infrastructures consisting of multiple sites connected over a wide-area network. These sites house heterogeneous computing systems, network elements and local-area connections, and the wide-area network plays a critical, asymmetric role of providing the vital connectivity between them. We model this infrastructure as a recursive system of systems, wherein the basic systems at the finest levels are composed of discrete cyber and physical components. These components may be disabled by cyber and physical disruptions, and their reinforcements protect against them albeit at a cost. We utilize results from a game formulation based on (i) characterizing the disruptions between systems at each level of recursion using aggregate failure correlation functions, and within basic systems using the multiplier functions, and (ii) using utility functions expressed in terms of the number of basic system components attacked and reinforced. At Nash Equilibrium, we derive expressions for the expected capacity of the infrastructure given by the number of computing nodes that are operational and connected to the network.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124164629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On upper and lower bounds of identifying code set for soccer ball graph with application to satellite deployment 足球图识别码集的上下界及其在卫星部署中的应用
Arunabha Sen, V. Goliber, K. Basu, Chenyang Zhou, Sumitava Ghosh
We study a monitoring problem on the surface of the earth for significant environmental, social/political and extreme events using satellites as sensors. We assume that the surface of the earth is divided into a set of regions, where a region may be a continent, a country, or a set of neighboring countries. We also assume that, the impact of a significant event spills into neighboring regions and there will be corresponding indicators of such events. Careful deployment of sensors, utilizing Identifying Codes, can ensure that even though the number of deployed sensors is fewer than the number of regions, it may be possible to uniquely identify the region where the event has taken place. We assume that an event is confined to a region. As Earth is almost a sphere, we use a soccer ball (a sphere) as a model. From the model, we construct a Soccer Ball Graph (SBG), and show that the SBG has at least 26 sets of Identifying Codes of cardinality ten, implying that there are at least 26 different ways to deploy ten satellites to monitor the Earth. Finally, we also show that the size of the minimum Identifying Code for the SBG is at least nine.
我们研究了一个监测问题,在地球表面的重大环境,社会/政治和极端事件使用卫星作为传感器。我们假设地球表面被划分为一组区域,其中一个区域可以是一个大陆、一个国家或一组邻国。我们还假设,一个重大事件的影响会扩散到邻近地区,并且会有相应的事件指标。仔细部署传感器,利用识别代码,可以确保即使部署的传感器数量少于区域数量,也有可能唯一地识别事件发生的区域。我们假设一个事件局限于一个地区。由于地球几乎是一个球体,我们用足球(一个球体)作为模型。从模型中,我们构建了一个足球图(SBG),并表明SBG至少有26组基数为10的识别代码,这意味着至少有26种不同的方式来部署10颗卫星来监视地球。最后,我们还表明,SBG的最小识别码的大小至少为9。
{"title":"On upper and lower bounds of identifying code set for soccer ball graph with application to satellite deployment","authors":"Arunabha Sen, V. Goliber, K. Basu, Chenyang Zhou, Sumitava Ghosh","doi":"10.1145/3288599.3288632","DOIUrl":"https://doi.org/10.1145/3288599.3288632","url":null,"abstract":"We study a monitoring problem on the surface of the earth for significant environmental, social/political and extreme events using satellites as sensors. We assume that the surface of the earth is divided into a set of regions, where a region may be a continent, a country, or a set of neighboring countries. We also assume that, the impact of a significant event spills into neighboring regions and there will be corresponding indicators of such events. Careful deployment of sensors, utilizing Identifying Codes, can ensure that even though the number of deployed sensors is fewer than the number of regions, it may be possible to uniquely identify the region where the event has taken place. We assume that an event is confined to a region. As Earth is almost a sphere, we use a soccer ball (a sphere) as a model. From the model, we construct a Soccer Ball Graph (SBG), and show that the SBG has at least 26 sets of Identifying Codes of cardinality ten, implying that there are at least 26 different ways to deploy ten satellites to monitor the Earth. Finally, we also show that the size of the minimum Identifying Code for the SBG is at least nine.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128533752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Proceedings of the 20th International Conference on Distributed Computing and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1