首页 > 最新文献

Proceedings of the 20th International Conference on Distributed Computing and Networking最新文献

英文 中文
Evaluating the quality of word representation models for unstructured clinical Text based ICU mortality prediction 评价基于非结构化临床文本的ICU死亡率预测的词表示模型的质量
G. Krishnan, Sowmya S Kamath
In modern hospitals, the role of Clinical Decision Support Systems (CDSS) in assisting care providers is well-established. Most conventional CDSS systems are built on the availability of patient data in the form of structured Electronic Health Records. However, a significant percentage of patient data is still stored in the form of unstructured clinical text notes, especially in developing countries. These contain abundant patient-specific information, which has so far remained largely under-utilized in powering CDSS applications. In this paper, we attempt to build one such CDSS system for patient mortality prediction, using unstructured clinical records. Effectiveness of such prediction models largely depends on optimally capturing latent concept features, thus, word representation quality is of utmost importance. We experiment with three popular word embedding models - Word2Vec, FastText and GloVe for generating word embeddings of unstructured nursing notes of patients from a standard, open dataset, MIMIC-III. These word representations are used as features to train machine learning classifiers to build ICU mortality prediction models, a critical CDSS in ICUs of hospitals. Experimental validation showed that a model built on Word2Vec Skipgram based Random Forest classifier was the most optimal word embedding based mortality prediction model, that outperformed traditional severity scores like SAPS-II, SOFA, APS-III and OASIS, by a significant margin of 43-52%.
在现代医院,临床决策支持系统(CDSS)在协助护理提供者的作用是完善的。大多数传统的CDSS系统是建立在结构化电子健康记录形式的患者数据可用性的基础上的。然而,很大比例的患者数据仍然以非结构化临床文本笔记的形式存储,特别是在发展中国家。其中包含丰富的特定于患者的信息,到目前为止,这些信息在支持CDSS应用程序方面仍未得到充分利用。在本文中,我们试图建立一个这样的CDSS系统的病人死亡率预测,使用非结构化的临床记录。这种预测模型的有效性很大程度上取决于对潜在概念特征的最佳捕获,因此,单词表示质量至关重要。我们用三种流行的词嵌入模型——Word2Vec、FastText和GloVe进行实验,从一个标准的、开放的数据集MIMIC-III中生成病人的非结构化护理笔记的词嵌入。这些词表示被用作训练机器学习分类器的特征,以建立ICU死亡率预测模型,这是医院ICU的关键CDSS。实验验证表明,基于Word2Vec Skipgram的随机森林分类器构建的模型是最优的基于词嵌入的死亡率预测模型,其预测结果明显优于传统的严重程度评分如sap - ii、SOFA、APS-III和OASIS,准确率为43-52%。
{"title":"Evaluating the quality of word representation models for unstructured clinical Text based ICU mortality prediction","authors":"G. Krishnan, Sowmya S Kamath","doi":"10.1145/3288599.3297118","DOIUrl":"https://doi.org/10.1145/3288599.3297118","url":null,"abstract":"In modern hospitals, the role of Clinical Decision Support Systems (CDSS) in assisting care providers is well-established. Most conventional CDSS systems are built on the availability of patient data in the form of structured Electronic Health Records. However, a significant percentage of patient data is still stored in the form of unstructured clinical text notes, especially in developing countries. These contain abundant patient-specific information, which has so far remained largely under-utilized in powering CDSS applications. In this paper, we attempt to build one such CDSS system for patient mortality prediction, using unstructured clinical records. Effectiveness of such prediction models largely depends on optimally capturing latent concept features, thus, word representation quality is of utmost importance. We experiment with three popular word embedding models - Word2Vec, FastText and GloVe for generating word embeddings of unstructured nursing notes of patients from a standard, open dataset, MIMIC-III. These word representations are used as features to train machine learning classifiers to build ICU mortality prediction models, a critical CDSS in ICUs of hospitals. Experimental validation showed that a model built on Word2Vec Skipgram based Random Forest classifier was the most optimal word embedding based mortality prediction model, that outperformed traditional severity scores like SAPS-II, SOFA, APS-III and OASIS, by a significant margin of 43-52%.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129623678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Consistify: preserving correctness and SLA under weak consistency consistent:保持弱一致性下的正确性和SLA
Subhajit Sidhanta, S. Mukhopadhyay, W. Golab
While executing a client application, comprising a sequence of one or more storage operations (read, write, etc.), replicated datastores provide the option of tuning per-operation client-centric consistency settings, Weaker consistency settings allow client applications to execute with lower observed latency due to less coordination among the replica, improving throughput. To enable a client application running on a geo-replicated datastore to meet stringent SLA (Service Level Agreement) deadlines, i.e., latency thresholds provided in the SLA, users apply weak client-centric consistency settings. Strong consistency settings may result in higher latency due to coordination among greater number of replicas. However, since a weak consistency setting requires only a partial quorum of replicas to coordinate, some of the replicas may be overwritten by conflicting updates from concurrent clients, which, in turn, may result in violation of correctness conditions specified by the developer. Such correctness conditions are provided as postconditions that impose restrictions on the values observed by the clients. Enforcing correctness conditions under weak consistency settings on geo-replicated datastores from the client application code is a tedious and challenging task. The task is even more complicated when considering application-level SLA deadlines. Deadline (latency) is one of the most important SLA parameters for optimizing client-centric performance. To this end, we present Consistify, a novel framework, that acts as an interface layer between client applications and underlying data-stores, and enables client applications to execute with weak per-operation consistency settings, while simultaneously respecting: 1) the correctness conditions, specified using logical predicates, and 2) the SLA deadline. Using benchmark workloads, we experimentally demonstrate that Consistify outperforms the state-of-the-art systems, namely QUELA. For several other systems that provide flexible consistency settings, namely Bolt-on causal system, SIEVE, and Cure, we provide a comparison of the throughput and latency observed with Consistify against the numbers reported with those systems in prior papers.
在执行包含一个或多个存储操作(读、写等)序列的客户端应用程序时,复制的数据存储提供了调优每个操作以客户端为中心的一致性设置的选项,较弱的一致性设置允许客户端应用程序以较低的观察延迟执行,因为副本之间的协调较少,从而提高了吞吐量。为了使运行在地理复制数据存储上的客户端应用程序能够满足严格的SLA(服务水平协议)截止日期,即SLA中提供的延迟阈值,用户可以应用以客户端为中心的弱一致性设置。强一致性设置可能会导致更高的延迟,因为在更多的副本之间进行协调。然而,由于弱一致性设置只需要副本的部分仲裁来协调,一些副本可能会被来自并发客户机的冲突更新覆盖,这反过来又可能导致违反开发人员指定的正确性条件。这种正确性条件作为后置条件提供,对客户机观察到的值施加限制。在客户端应用程序代码的地理复制数据存储上执行弱一致性设置下的正确性条件是一项乏味且具有挑战性的任务。在考虑应用程序级SLA截止日期时,任务甚至更加复杂。截止日期(延迟)是优化以客户端为中心的性能的最重要的SLA参数之一。为此,我们提出了一个新的框架Consistify,它充当客户端应用程序和底层数据存储之间的接口层,并使客户端应用程序能够以弱的操作一致性设置执行,同时遵守:1)使用逻辑谓词指定的正确性条件,以及2)SLA截止日期。使用基准测试工作负载,我们通过实验证明了consistent优于最先进的系统,即QUELA。对于提供灵活一致性设置的其他几个系统,即Bolt-on因果系统、SIEVE和Cure,我们将使用consistent观察到的吞吐量和延迟与之前论文中使用这些系统报告的数字进行了比较。
{"title":"Consistify: preserving correctness and SLA under weak consistency","authors":"Subhajit Sidhanta, S. Mukhopadhyay, W. Golab","doi":"10.1145/3288599.3288630","DOIUrl":"https://doi.org/10.1145/3288599.3288630","url":null,"abstract":"While executing a client application, comprising a sequence of one or more storage operations (read, write, etc.), replicated datastores provide the option of tuning per-operation client-centric consistency settings, Weaker consistency settings allow client applications to execute with lower observed latency due to less coordination among the replica, improving throughput. To enable a client application running on a geo-replicated datastore to meet stringent SLA (Service Level Agreement) deadlines, i.e., latency thresholds provided in the SLA, users apply weak client-centric consistency settings. Strong consistency settings may result in higher latency due to coordination among greater number of replicas. However, since a weak consistency setting requires only a partial quorum of replicas to coordinate, some of the replicas may be overwritten by conflicting updates from concurrent clients, which, in turn, may result in violation of correctness conditions specified by the developer. Such correctness conditions are provided as postconditions that impose restrictions on the values observed by the clients. Enforcing correctness conditions under weak consistency settings on geo-replicated datastores from the client application code is a tedious and challenging task. The task is even more complicated when considering application-level SLA deadlines. Deadline (latency) is one of the most important SLA parameters for optimizing client-centric performance. To this end, we present Consistify, a novel framework, that acts as an interface layer between client applications and underlying data-stores, and enables client applications to execute with weak per-operation consistency settings, while simultaneously respecting: 1) the correctness conditions, specified using logical predicates, and 2) the SLA deadline. Using benchmark workloads, we experimentally demonstrate that Consistify outperforms the state-of-the-art systems, namely QUELA. For several other systems that provide flexible consistency settings, namely Bolt-on causal system, SIEVE, and Cure, we provide a comparison of the throughput and latency observed with Consistify against the numbers reported with those systems in prior papers.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129856844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic sensor selection for path coverage 路径覆盖的动态传感器选择
S. Shamoun, T. Abdelzaher, A. Bar-Noy
We study the problem of dynamically selecting sensors to maximize the number of steps covered on the path of a mobile target. The sensors are selected from those already deployed in a network as the target moves. The total number of sensors selected and rounds of selection are limited according to budget constraints. The variables are which sensors to select, when, and how. The best settings depend on how much is known about the target's path, such as its start and end locations and mobility pattern, which is updated as the target moves. We study how coverage is affected by these parameters, and how much such dynamic selection strategies can improve coverage over sensors selected in advance.
我们研究了动态选择传感器以最大化移动目标路径上覆盖的步数的问题。当目标移动时,传感器是从已经部署在网络中的传感器中选择的。根据预算约束,对所选传感器的总数和轮次进行了限制。变量是选择哪些传感器、何时选择以及如何选择。最佳设置取决于对目标路径的了解程度,比如它的开始和结束位置以及移动模式,这些都会随着目标的移动而更新。我们研究了这些参数是如何影响覆盖的,以及这种动态选择策略可以在多大程度上提高预先选择的传感器的覆盖。
{"title":"Dynamic sensor selection for path coverage","authors":"S. Shamoun, T. Abdelzaher, A. Bar-Noy","doi":"10.1145/3288599.3288627","DOIUrl":"https://doi.org/10.1145/3288599.3288627","url":null,"abstract":"We study the problem of dynamically selecting sensors to maximize the number of steps covered on the path of a mobile target. The sensors are selected from those already deployed in a network as the target moves. The total number of sensors selected and rounds of selection are limited according to budget constraints. The variables are which sensors to select, when, and how. The best settings depend on how much is known about the target's path, such as its start and end locations and mobility pattern, which is updated as the target moves. We study how coverage is affected by these parameters, and how much such dynamic selection strategies can improve coverage over sensors selected in advance.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128369365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A blockchain based incentive scheme for post disaster opportunistic communication over DTN 基于区块链的DTN灾后机会通信激励方案
Chandrima Chakrabarti, Souvik Basu
Delay tolerant network (DTN) is successfully proposed for setting up emergency post disaster communication networks when normal communication infrastructure is incapacitated. Performance of such networks get affected by selfish nodes that do not participate in message forwarding. Thus, nodes must receive satisfactory rewards for cooperation. The available incentive schemes either rely on central trusted authorities or do not use an explicit and secure digital currency. Blockchain, a decentralized digital ledger of immutable transactions, is an attractive approach for addressing the incentive challenges in peer-to-peer networks that lack central trusted authorities. Bitcoin, the Blockchain based cryptocurrency, make it possible to devise practical credit based incentive schemes for such networks. In this paper, we propose a Blockchain based incentive scheme for DTN based post disaster communication network that uses Bitcoin to incentivize nodes for cooperation. The scheme uses a novel reward strategy to bring rationality in the incentivizing process.
成功地提出了容延迟网络(DTN),用于在正常通信基础设施失效的情况下建立灾后应急通信网络。这种网络的性能受到不参与消息转发的自私节点的影响。因此,节点必须获得令人满意的合作奖励。现有的激励方案要么依赖于中央可信机构,要么不使用明确且安全的数字货币。区块链是一种分散的不可变交易数字分类账,是解决缺乏中央可信权威的点对点网络中激励挑战的一种有吸引力的方法。基于区块链的加密货币比特币使为此类网络设计实用的基于信用的激励方案成为可能。在本文中,我们提出了一种基于区块链的基于DTN的灾后通信网络激励方案,该方案使用比特币激励节点进行合作。该方案采用了一种新颖的奖励策略,使激励过程具有合理性。
{"title":"A blockchain based incentive scheme for post disaster opportunistic communication over DTN","authors":"Chandrima Chakrabarti, Souvik Basu","doi":"10.1145/3288599.3295584","DOIUrl":"https://doi.org/10.1145/3288599.3295584","url":null,"abstract":"Delay tolerant network (DTN) is successfully proposed for setting up emergency post disaster communication networks when normal communication infrastructure is incapacitated. Performance of such networks get affected by selfish nodes that do not participate in message forwarding. Thus, nodes must receive satisfactory rewards for cooperation. The available incentive schemes either rely on central trusted authorities or do not use an explicit and secure digital currency. Blockchain, a decentralized digital ledger of immutable transactions, is an attractive approach for addressing the incentive challenges in peer-to-peer networks that lack central trusted authorities. Bitcoin, the Blockchain based cryptocurrency, make it possible to devise practical credit based incentive schemes for such networks. In this paper, we propose a Blockchain based incentive scheme for DTN based post disaster communication network that uses Bitcoin to incentivize nodes for cooperation. The scheme uses a novel reward strategy to bring rationality in the incentivizing process.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122102348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Scalable, high-speed on-chip-based NDN name forwarding using FPGA 可扩展的,高速的基于片上的NDN名称转发使用FPGA
Divya Saxena, Suyash Mahar, V. Raychoudhury, Jiannong Cao
Named Data Networking (NDN) is the most promising candidate among the proposed content-based future Internet architectures. In NDN, Forwarding Information Base (FIB) maintains name prefixes and their corresponding outgoing interface(s) and forwards incoming packets by calculating the longest prefix match (LPM) of their content names (CNs). A CN in NDN is of variable-length and is maintained using a hierarchical structure. Therefore, to perform name lookup for packet forwarding at wire speed is a challenging task. However, the use of GPUs can lead to much better lookup speeds than CPU but, they are often limited by the CPU-GPU transfer latencies. In this paper, we exploit the massive parallel processing power of FPGA technology and propose a scalable, high-speed on-chip SRAM-based NDN name forwarding scheme for FIB (OnChip-FIB) using Field-Programmable Gate Arrays (FPGA). OnChip-FIB scales well as the number of prefixes grow, due to low storage complexity and low resource utilization. Extensive simulation results show that the OnChip-FIB scheme can achieve 1.06 μs measured lookup latency with a 26% on-chip block memory usage in a single Xilinx UltraScale FPGA for 50K named dataset.
命名数据网络(NDN)是提出的基于内容的未来互联网体系结构中最有前途的候选。在NDN中,FIB (Forwarding Information Base)维护名称前缀及其对应的出接口,并通过计算其内容名称(CNs)的LPM (longest prefix match)来转发进入的报文。NDN中的网络是可变长度的,并使用分层结构进行维护。因此,以线速执行包转发的名称查找是一项具有挑战性的任务。然而,使用gpu可以带来比CPU更好的查找速度,但是,它们通常受到CPU- gpu传输延迟的限制。在本文中,我们利用FPGA技术的巨大并行处理能力,提出了一个可扩展的,高速的基于片上sram的NDN名称转发方案,用于FIB (OnChip-FIB),使用现场可编程门阵列(FPGA)。由于存储复杂度低,资源利用率低,因此OnChip-FIB可以随着前缀数量的增加而扩展。大量的仿真结果表明,在单个Xilinx UltraScale FPGA上,对于50K命名数据集,OnChip-FIB方案可以在26%的片上块内存使用率下实现1.06 μs的测量查找延迟。
{"title":"Scalable, high-speed on-chip-based NDN name forwarding using FPGA","authors":"Divya Saxena, Suyash Mahar, V. Raychoudhury, Jiannong Cao","doi":"10.1145/3288599.3288613","DOIUrl":"https://doi.org/10.1145/3288599.3288613","url":null,"abstract":"Named Data Networking (NDN) is the most promising candidate among the proposed content-based future Internet architectures. In NDN, Forwarding Information Base (FIB) maintains name prefixes and their corresponding outgoing interface(s) and forwards incoming packets by calculating the longest prefix match (LPM) of their content names (CNs). A CN in NDN is of variable-length and is maintained using a hierarchical structure. Therefore, to perform name lookup for packet forwarding at wire speed is a challenging task. However, the use of GPUs can lead to much better lookup speeds than CPU but, they are often limited by the CPU-GPU transfer latencies. In this paper, we exploit the massive parallel processing power of FPGA technology and propose a scalable, high-speed on-chip SRAM-based NDN name forwarding scheme for FIB (OnChip-FIB) using Field-Programmable Gate Arrays (FPGA). OnChip-FIB scales well as the number of prefixes grow, due to low storage complexity and low resource utilization. Extensive simulation results show that the OnChip-FIB scheme can achieve 1.06 μs measured lookup latency with a 26% on-chip block memory usage in a single Xilinx UltraScale FPGA for 50K named dataset.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130176948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The weakest failure detector to solve the mutual exclusion problem in an unknown dynamic environment 用最弱的故障检测器解决未知动态环境下的互斥问题
Etienne Mauffret, D. Jeanneau, L. Arantes, Pierre Sens
Mutual exclusion is one of the fundamental problems in distributed computing but existing mutual exclusion algorithms are unadapted to the dynamics and lack of membership knowledge of current distributed systems (e.g., mobile ad-hoc networks, peer-to-peer systems, etc.). Additionally, in order to circumvent the impossibility of solving mutual exclusion in asynchronous message passing systems where processes can crash, some solutions include the use of (T + Σl) [3], which is the weakest failure detector to solve mutual exclusion in known static distributed systems. In this paper, we define a new failure detector TΣlr which is equivalent to (T + Σl) in known static systems, and prove that T Σlr is the weakest failure detector to solve mutual exclusion in unknown dynamic systems with partial memory losses. We consider that crashed processes may recover.
互斥是分布式计算的基本问题之一,但现有的互斥算法不适应当前分布式系统(如移动自组织网络、点对点系统等)的动态特性和成员知识的缺乏。此外,为了避免在异步消息传递系统(其中进程可能崩溃)中无法解决互斥,一些解决方案包括使用(T + Σl)[3],它是在已知静态分布式系统中解决互斥的最弱的故障检测器。本文定义了一个新的故障检测器TΣlr,它在已知静态系统中等价于(T + Σl),并证明了TΣlr是解决未知动态系统中部分内存丢失的互斥问题的最弱的故障检测器。我们认为崩溃的进程可能会恢复。
{"title":"The weakest failure detector to solve the mutual exclusion problem in an unknown dynamic environment","authors":"Etienne Mauffret, D. Jeanneau, L. Arantes, Pierre Sens","doi":"10.1145/3288599.3288608","DOIUrl":"https://doi.org/10.1145/3288599.3288608","url":null,"abstract":"Mutual exclusion is one of the fundamental problems in distributed computing but existing mutual exclusion algorithms are unadapted to the dynamics and lack of membership knowledge of current distributed systems (e.g., mobile ad-hoc networks, peer-to-peer systems, etc.). Additionally, in order to circumvent the impossibility of solving mutual exclusion in asynchronous message passing systems where processes can crash, some solutions include the use of (T + Σl) [3], which is the weakest failure detector to solve mutual exclusion in known static distributed systems. In this paper, we define a new failure detector TΣlr which is equivalent to (T + Σl) in known static systems, and prove that T Σlr is the weakest failure detector to solve mutual exclusion in unknown dynamic systems with partial memory losses. We consider that crashed processes may recover.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134050341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SURAKSHIT: a smartphone-based application for 'localized' GIS data aggregation in absence of internet SURAKSHIT:一个基于智能手机的应用程序,用于在没有互联网的情况下“本地化”GIS数据聚合
P. Paul, Naman Mehta, Aman Kumar Das, Sourav Agarwal, Sujoy Saha, S. Nandi
Dissemination of information after a large-scale disaster is always a difficult task and hinders the possibilities of proper decision making. Relief work and rescuing survivors take a major hit without a proper map showcasing the current scenario of the disaster-hit terrain. All due to the lack of traditional communication channels after a disaster. However, we want to change this with the proposition of Android-based mobile application SURAKSHIT that prepares 'localized' crisis map through 'offline' crowdsourcing of circumstantial data and distribution of the same in a smooth manner using a delay-tolerant network. The information gap between the first responders and local survivors can thus be greatly reduced with proper knowledge about the affected area collected by the volunteers. Multimedia data accumulated with the application can further assist the rescue forces in planning rescue-relief operations better.
大规模灾难后的信息传播一直是一项艰巨的任务,并阻碍了作出适当决策的可能性。如果没有适当的地图显示受灾地区的当前情况,救援工作和幸存者将受到重大打击。这都是因为灾后缺乏传统的沟通渠道。然而,我们希望通过基于android的移动应用程序SURAKSHIT来改变这一点,SURAKSHIT通过“离线”的环境数据众包来准备“本地化”的危机地图,并使用延迟容忍网络以平稳的方式分发相同的地图。通过志愿者收集有关受灾地区的适当知识,可以大大减少第一反应者和当地幸存者之间的信息差距。应用程序积累的多媒体数据可以进一步帮助救援力量更好地规划救援行动。
{"title":"SURAKSHIT: a smartphone-based application for 'localized' GIS data aggregation in absence of internet","authors":"P. Paul, Naman Mehta, Aman Kumar Das, Sourav Agarwal, Sujoy Saha, S. Nandi","doi":"10.1145/3288599.3295588","DOIUrl":"https://doi.org/10.1145/3288599.3295588","url":null,"abstract":"Dissemination of information after a large-scale disaster is always a difficult task and hinders the possibilities of proper decision making. Relief work and rescuing survivors take a major hit without a proper map showcasing the current scenario of the disaster-hit terrain. All due to the lack of traditional communication channels after a disaster. However, we want to change this with the proposition of Android-based mobile application SURAKSHIT that prepares 'localized' crisis map through 'offline' crowdsourcing of circumstantial data and distribution of the same in a smooth manner using a delay-tolerant network. The information gap between the first responders and local survivors can thus be greatly reduced with proper knowledge about the affected area collected by the volunteers. Multimedia data accumulated with the application can further assist the rescue forces in planning rescue-relief operations better.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"252 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121240556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Parallel algorithms for predicate detection 谓词检测的并行算法
V. Garg, Rohan Garg
Given a trace of a distributed computation and a desired predicate, the predicate detection problem is to find a consistent global state that satisfies the given predicate. The predicate detection problem has many applications in the testing and runtime verification of parallel and distributed systems. We show that many problems related to predicate detection are in the parallel complexity class NC, the set of decision problems decidable in polylogarithmic time on a parallel computer with a polynomial number of processors. Given a computation on n processes with at most m local states per process, our parallel algorithm to detect a given conjunctive predicate takes O(log mn) time and O(m3n3 log mn) work. The sequential algorithm takes O(mn2) time. For data race detection, we give a parallel algorithm that takes O(log mn log n) time, also placing that problem in NC. This is the first work, to the best of our knowledge, that places the parallel complexity of such predicate detection problems in the class NC.
给定分布式计算的跟踪和期望的谓词,谓词检测问题是找到满足给定谓词的一致全局状态。谓词检测问题在并行和分布式系统的测试和运行时验证中有着广泛的应用。我们证明了许多与谓词检测相关的问题属于并行复杂性类NC,决策问题集在具有多项式处理器数的并行计算机上在多对数时间内可决定。给定n个进程的计算,每个进程最多有m个局部状态,我们的并行算法检测给定的连接谓词需要O(log mn)时间和O(m3n3 log mn)工作。顺序算法耗时O(mn2)。对于数据竞争检测,我们给出了一个耗时O(log mn log n)的并行算法,也将该问题置于NC中。据我们所知,这是第一个将这种谓词检测问题的并行复杂性放在NC类中的工作。
{"title":"Parallel algorithms for predicate detection","authors":"V. Garg, Rohan Garg","doi":"10.1145/3288599.3288604","DOIUrl":"https://doi.org/10.1145/3288599.3288604","url":null,"abstract":"Given a trace of a distributed computation and a desired predicate, the predicate detection problem is to find a consistent global state that satisfies the given predicate. The predicate detection problem has many applications in the testing and runtime verification of parallel and distributed systems. We show that many problems related to predicate detection are in the parallel complexity class NC, the set of decision problems decidable in polylogarithmic time on a parallel computer with a polynomial number of processors. Given a computation on n processes with at most m local states per process, our parallel algorithm to detect a given conjunctive predicate takes O(log mn) time and O(m3n3 log mn) work. The sequential algorithm takes O(mn2) time. For data race detection, we give a parallel algorithm that takes O(log mn log n) time, also placing that problem in NC. This is the first work, to the best of our knowledge, that places the parallel complexity of such predicate detection problems in the class NC.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123388030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
pTASC: trustable autonomous secure communications pTASC:可信赖的自主安全通信
Patrícia R. Sousa, André Cirne, João S. Resende, Rolando Martins, L. Antunes
The number of devices connected to the Internet has been increasing exponentially. There is a substantial amount of data being exchanged among numerous connected devices. The added convenience brought by these devices spans across multiple facets of everyday life, such as drivers reporting an accident through dash cams, patients monitoring their own health, and companies controlling the safety of their facilities. However, it is critical to increase safety and privacy across the data generated and propagated by these devices. Previous works have focused mainly on device management and relied on centralized solutions namely Public Key Infrastructure (PKI). This paper describes a novel mechanism that ensures secure autonomous communication between Internet of Things (IoT) devices, while using a completely decentralized solution that mitigates the classical single points-of-failure problem. This is accomplished by a new peer-to-peer protocol using Short Authentication Strings (SAS), in which verification is made through a Limited-Location Channel (LLC).
连接到互联网的设备数量呈指数级增长。在众多连接的设备之间交换着大量的数据。这些设备带来的额外便利跨越了日常生活的多个方面,例如驾驶员通过行车记录仪报告事故,患者监控自己的健康状况,以及公司控制其设施的安全。然而,提高这些设备生成和传播的数据的安全性和隐私性至关重要。以前的工作主要集中在设备管理上,并依赖于集中的解决方案,即公钥基础设施(PKI)。本文描述了一种确保物联网(IoT)设备之间安全自主通信的新机制,同时使用完全分散的解决方案,减轻了经典的单点故障问题。这是通过使用短身份验证字符串(SAS)的新的点对点协议实现的,其中通过有限位置通道(LLC)进行验证。
{"title":"pTASC: trustable autonomous secure communications","authors":"Patrícia R. Sousa, André Cirne, João S. Resende, Rolando Martins, L. Antunes","doi":"10.1145/3288599.3288623","DOIUrl":"https://doi.org/10.1145/3288599.3288623","url":null,"abstract":"The number of devices connected to the Internet has been increasing exponentially. There is a substantial amount of data being exchanged among numerous connected devices. The added convenience brought by these devices spans across multiple facets of everyday life, such as drivers reporting an accident through dash cams, patients monitoring their own health, and companies controlling the safety of their facilities. However, it is critical to increase safety and privacy across the data generated and propagated by these devices. Previous works have focused mainly on device management and relied on centralized solutions namely Public Key Infrastructure (PKI). This paper describes a novel mechanism that ensures secure autonomous communication between Internet of Things (IoT) devices, while using a completely decentralized solution that mitigates the classical single points-of-failure problem. This is accomplished by a new peer-to-peer protocol using Short Authentication Strings (SAS), in which verification is made through a Limited-Location Channel (LLC).","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122452022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
NOVN: named-object based virtual network architecture NOVN:基于命名对象的虚拟网络体系结构
F. Bronzino, S. Maheshwari, I. Seskar, D. Raychaudhuri
This paper presents NOVN: a novel network virtualization framework aimed at providing an efficient and low overhead solution for deploying Virtual Networks (VNs) based on the concept of named-objects. Name based communication paradigms, realized by separating object names and network addresses through a logically centralized globally distributed Name Resolution Service (NRS), can be used to build a natural and efficient architecture for virtual networks. The proposed VN framework exploits the name based abstraction to create customized networking for distributed services which benefit from an awareness of network topology and routing. A specific example of edge cloud computing is presented in which VN's are used to realize "application specific routing" (ASR) for efficiently connecting users with cloud resources. Experimental results are presented for validation of the proposed VN architecture using a software router implementation running on the ORBIT testbed. The results validate the feasibility of the named-object approach, showing minimal VN processing, control overhead, and latency. The results also validate application aware ASR routing functionality for an example latency constrained edge cloud service scenario.
本文提出了NOVN:一个新的网络虚拟化框架,旨在基于命名对象的概念,为部署虚拟网络(VNs)提供一个高效、低开销的解决方案。通过逻辑集中的全局分布式名称解析服务(Name Resolution Service, NRS)将对象名称和网络地址分离,实现基于名称的通信范式,可用于构建自然高效的虚拟网络体系结构。所提出的VN框架利用基于名称的抽象为分布式服务创建自定义网络,从而受益于网络拓扑和路由的感知。给出了一个边缘云计算的具体示例,其中使用VN实现“特定于应用的路由”(ASR),以便有效地将用户与云资源连接起来。通过运行在ORBIT测试平台上的软件路由器实现,给出了验证所提出的VN架构的实验结果。结果验证了命名对象方法的可行性,显示了最小的VN处理、控制开销和延迟。结果还验证了一个示例延迟受限边缘云服务场景的应用程序感知ASR路由功能。
{"title":"NOVN: named-object based virtual network architecture","authors":"F. Bronzino, S. Maheshwari, I. Seskar, D. Raychaudhuri","doi":"10.1145/3288599.3288637","DOIUrl":"https://doi.org/10.1145/3288599.3288637","url":null,"abstract":"This paper presents NOVN: a novel network virtualization framework aimed at providing an efficient and low overhead solution for deploying Virtual Networks (VNs) based on the concept of named-objects. Name based communication paradigms, realized by separating object names and network addresses through a logically centralized globally distributed Name Resolution Service (NRS), can be used to build a natural and efficient architecture for virtual networks. The proposed VN framework exploits the name based abstraction to create customized networking for distributed services which benefit from an awareness of network topology and routing. A specific example of edge cloud computing is presented in which VN's are used to realize \"application specific routing\" (ASR) for efficiently connecting users with cloud resources. Experimental results are presented for validation of the proposed VN architecture using a software router implementation running on the ORBIT testbed. The results validate the feasibility of the named-object approach, showing minimal VN processing, control overhead, and latency. The results also validate application aware ASR routing functionality for an example latency constrained edge cloud service scenario.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124707204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Proceedings of the 20th International Conference on Distributed Computing and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1