首页 > 最新文献

Proceedings of the 20th International Conference on Distributed Computing and Networking最新文献

英文 中文
A scalable and composable analytics platform for distributed wide-area tracking 一个可扩展和可组合的分析平台,用于分布式广域跟踪
Aakash Khochare, Yogesh L. Simmhan
Smart cities are a manifestation of the Internet of Things (IoT). The push for smart cities has led to the proliferation of video cameras in public spaces [1]. London is expected to deploy 642,000 cameras by 2020. These cameras will be used primarily for surveillance of the city for urban safety. At the same time, such smart city deployments have also seen edge and fog computing paradigms gain preference over the cloud-only computing model [2]. This is due to the network proximity of the edge and fog devices to the data sources, offering lower latency access to data and lower bandwidth requirements to push high volume data, such as video streams, to the cloud.
智慧城市是物联网的一种表现形式。对智慧城市的推动导致了公共场所摄像机的激增[1]。预计到2020年,伦敦将部署64.2万个摄像头。这些摄像头将主要用于监控城市,保障城市安全。与此同时,这种智慧城市部署也使边缘和雾计算范式比纯云计算模型更受青睐[2]。这是由于边缘和雾设备与数据源的网络接近,提供更低的延迟访问数据和更低的带宽需求,以将大容量数据(如视频流)推送到云端。
{"title":"A scalable and composable analytics platform for distributed wide-area tracking","authors":"Aakash Khochare, Yogesh L. Simmhan","doi":"10.1145/3288599.3299753","DOIUrl":"https://doi.org/10.1145/3288599.3299753","url":null,"abstract":"Smart cities are a manifestation of the Internet of Things (IoT). The push for smart cities has led to the proliferation of video cameras in public spaces [1]. London is expected to deploy 642,000 cameras by 2020. These cameras will be used primarily for surveillance of the city for urban safety. At the same time, such smart city deployments have also seen edge and fog computing paradigms gain preference over the cloud-only computing model [2]. This is due to the network proximity of the edge and fog devices to the data sources, offering lower latency access to data and lower bandwidth requirements to push high volume data, such as video streams, to the cloud.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129020258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time-optimal uniform scattering in a grid 网格中时间最优均匀散射
Pavan Poudel, Gokarna Sharma
We consider the distributed setting of K = (k + 1) × (k + 1) autonomous mobile robots operating on a grid graph of N = (n + 1) × (n + 1) nodes with n = k · d, d ≥ 2, k ≥ 2, following Look-Compute-Move cycles and communicating with other robots using colored lights under the robots with lights model. We consider the uniform scattering problem of repositioning the robots on the nodes of the grid graph so that each robot reach to a static configuration in which they cover uniformly the grid. In this paper, we provide the first O(n) time algorithm for this problem for robots with lights in the fully synchronous setting, given that the robots have the common orientation, the knowledge of parameters n and k, and the visibility range of distance 2d. The best previously known algorithm solves this problem in O(N/d) (i.e., O(n2/d)) time under the classic oblivious robots model (with no lights) with the same capabilities in the asynchronous setting. Our algorithm is asymptotically time-optimal, since for any solution to this uniform scattering problem in both the classic and lights models, Ω(n) time is necessary. Moreover, the proposed algorithm is collision-free.
在带灯机器人模型下,考虑K = (K + 1) × (K + 1)个自主移动机器人在N = (N + 1) × (N + 1)个节点(N = K·d, d≥2,K≥2)的网格图上运行的分布式设置,遵循Look-Compute-Move循环,并使用彩灯与其他机器人通信。我们考虑了在网格图节点上重新定位机器人的均匀散射问题,使每个机器人达到均匀覆盖网格的静态配置。在本文中,我们给出了在完全同步设置下带灯机器人的第一个O(n)时间算法,假设机器人具有共同的方向,参数n和k的知识,可见距离为2d。在经典遗忘机器人模型(无灯)下,已知的最佳算法在O(N/d)(即O(n2/d))时间内解决了这个问题,在异步设置中具有相同的功能。我们的算法是渐近时间最优的,因为对于经典模型和光模型中均匀散射问题的任何解,Ω(n)时间是必要的。此外,该算法是无碰撞的。
{"title":"Time-optimal uniform scattering in a grid","authors":"Pavan Poudel, Gokarna Sharma","doi":"10.1145/3288599.3288622","DOIUrl":"https://doi.org/10.1145/3288599.3288622","url":null,"abstract":"We consider the distributed setting of K = (k + 1) × (k + 1) autonomous mobile robots operating on a grid graph of N = (n + 1) × (n + 1) nodes with n = k · d, d ≥ 2, k ≥ 2, following Look-Compute-Move cycles and communicating with other robots using colored lights under the robots with lights model. We consider the uniform scattering problem of repositioning the robots on the nodes of the grid graph so that each robot reach to a static configuration in which they cover uniformly the grid. In this paper, we provide the first O(n) time algorithm for this problem for robots with lights in the fully synchronous setting, given that the robots have the common orientation, the knowledge of parameters n and k, and the visibility range of distance 2d. The best previously known algorithm solves this problem in O(N/d) (i.e., O(n2/d)) time under the classic oblivious robots model (with no lights) with the same capabilities in the asynchronous setting. Our algorithm is asymptotically time-optimal, since for any solution to this uniform scattering problem in both the classic and lights models, Ω(n) time is necessary. Moreover, the proposed algorithm is collision-free.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128124044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Round efficient computationally secure multi-party computation revisited 重新讨论了轮有效计算安全多方计算
Laasya Bangalore, Ashish Choudhury, Gayathri Garimella
In this work, we consider the problem of secure multi-party computation (MPC) with n parties where at most t are under the control of a computationally bounded adversary given the constraint t < n/2. We aim to design a round efficient protocol by minimizing the number of rounds in which the broadcast primitive is involved. In this setting, the previous best protocol can be attributed to Katz-Koo (EUROCRYPT 2007) which is set in the offline-online paradigm (where the parties generate preprocessing data during the offline phase to lighten the computation in the online phase). Their online phase is a constant round protocol with no invocations of broadcast, while the offline phase protocol needs total 29 rounds with a broadcast invocation in one round. Our work improves the round complexity of their offline phase protocol, by running in 4 rounds, with only a single broadcast round. Additionally, we also improve the communication complexity of the offline phase protocol by a factor of Ω(n3). As a technical contribution, we present the first two round computationally-secure verifiable secret-sharing (VSS) scheme that invokes broadcast in only one round.
在这项工作中,我们考虑了安全多方计算(MPC)的问题,在给定约束t < n/2的情况下,有n个当事方,其中最多t个在计算有界对手的控制下。我们的目标是通过最小化广播原语所涉及的轮数来设计一个有效的轮数协议。在这种情况下,之前的最佳协议可以归功于Katz-Koo (EUROCRYPT 2007),它是在离线-在线范式中设置的(各方在离线阶段生成预处理数据,以减轻在线阶段的计算)。它们的在线阶段是一个不调用广播的恒轮协议,而离线阶段协议在一轮中需要总共29轮广播调用。我们的工作提高了他们的离线阶段协议的回合复杂度,通过运行4轮,只有一个广播轮。此外,我们还将离线阶段协议的通信复杂度提高了Ω(n3)。作为技术贡献,我们提出了第一个两轮计算安全可验证秘密共享(VSS)方案,该方案仅在一轮中调用广播。
{"title":"Round efficient computationally secure multi-party computation revisited","authors":"Laasya Bangalore, Ashish Choudhury, Gayathri Garimella","doi":"10.1145/3288599.3288600","DOIUrl":"https://doi.org/10.1145/3288599.3288600","url":null,"abstract":"In this work, we consider the problem of secure multi-party computation (MPC) with n parties where at most t are under the control of a computationally bounded adversary given the constraint t < n/2. We aim to design a round efficient protocol by minimizing the number of rounds in which the broadcast primitive is involved. In this setting, the previous best protocol can be attributed to Katz-Koo (EUROCRYPT 2007) which is set in the offline-online paradigm (where the parties generate preprocessing data during the offline phase to lighten the computation in the online phase). Their online phase is a constant round protocol with no invocations of broadcast, while the offline phase protocol needs total 29 rounds with a broadcast invocation in one round. Our work improves the round complexity of their offline phase protocol, by running in 4 rounds, with only a single broadcast round. Additionally, we also improve the communication complexity of the offline phase protocol by a factor of Ω(n3). As a technical contribution, we present the first two round computationally-secure verifiable secret-sharing (VSS) scheme that invokes broadcast in only one round.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123952707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards energy-efficient and robust disaster response networks 建立高效节能和强大的灾害响应网络
V. Shah, Satyaki Roy, S. Silvestri, Sajal K. Das
In the aftermath of a large-scale disaster (such as earthquake), existing communication infrastructures are often critically impaired, preventing timely information exchange between the survivors, responders, and the coordination center. Typically, a temporary network, called Disaster Response Network (DRN), is set up using smart devices, movable base stations and easily deployable cellular antennas. However, such networks are challenged by rapid devices' energy depletion and component failures due to environmental adversities and hardware faults. State-of-the-art literature address energy challenges through intelligent routing, however robustness of DRN against component failures is largely unaddressed. In this paper, we investigate designing a novel network topology for DRNs, which is both energy-efficient and robust against component devices' failures. Specifically, the objective is to construct a sparse structure from the original DRN (termed, Sparse-DRN) while ensuring that there exists a connected tree backbone. Our performance evaluation shows that the Sparse-DRN offers a good trade-off between the energy efficiency and network robustness, while ensuring the QoS requirements i.e., packet delivery and network latency.
在大规模灾难(如地震)发生后,现有的通信基础设施往往严重受损,无法在幸存者、响应者和协调中心之间及时交换信息。通常,一个临时网络,称为灾难响应网络(DRN),使用智能设备,移动基站和易于部署的蜂窝天线建立。然而,由于环境逆境和硬件故障,这种网络面临着设备能量快速消耗和组件故障的挑战。最新的文献通过智能路由解决了能源挑战,但是DRN对组件故障的鲁棒性在很大程度上没有得到解决。在本文中,我们研究了为drn设计一种新颖的网络拓扑结构,它既节能又抗组件设备故障。具体来说,目标是从原始DRN(称为sparse -DRN)构建一个稀疏结构,同时确保存在连接的树主干。我们的性能评估表明,Sparse-DRN在能源效率和网络鲁棒性之间提供了一个很好的权衡,同时保证了QoS要求,即数据包传递和网络延迟。
{"title":"Towards energy-efficient and robust disaster response networks","authors":"V. Shah, Satyaki Roy, S. Silvestri, Sajal K. Das","doi":"10.1145/3288599.3295589","DOIUrl":"https://doi.org/10.1145/3288599.3295589","url":null,"abstract":"In the aftermath of a large-scale disaster (such as earthquake), existing communication infrastructures are often critically impaired, preventing timely information exchange between the survivors, responders, and the coordination center. Typically, a temporary network, called Disaster Response Network (DRN), is set up using smart devices, movable base stations and easily deployable cellular antennas. However, such networks are challenged by rapid devices' energy depletion and component failures due to environmental adversities and hardware faults. State-of-the-art literature address energy challenges through intelligent routing, however robustness of DRN against component failures is largely unaddressed. In this paper, we investigate designing a novel network topology for DRNs, which is both energy-efficient and robust against component devices' failures. Specifically, the objective is to construct a sparse structure from the original DRN (termed, Sparse-DRN) while ensuring that there exists a connected tree backbone. Our performance evaluation shows that the Sparse-DRN offers a good trade-off between the energy efficiency and network robustness, while ensuring the QoS requirements i.e., packet delivery and network latency.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130571303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Identifying fact-checkable microblogs during disasters: a classification-ranking approach 在灾难期间识别可核实事实的微博:一种分类排序方法
Divyank Barnwal, Siddharth Ghelani, Rohit Krishna, Moumita Basu, Saptarshi Ghosh
Microblogging sites are increasingly playing an important role in real-time disaster management. However, rumors and fake news often spread on such platforms, which if not detected, can derail the rescue operations. Therefore, it becomes imperative to verify some of the information posted on social media during disaster situations. To this end, it is necessary to correctly identify fact-checkable posts, so that their information content can be verified. In the present work, we address the problem of identifying fact-checkable posts on the Twitter microblogging site. We organized a shared task in the FIRE 2018 conference to study the problem of identification of fact-checkable tweets posted during a particular disaster event (the 2015 Nepal earthquake). This paper describes the dataset used in the shared task, and compares the performance of different methodologies for identifying fact-checkable tweets. We primarily experiment with two different types of approaches - classification-based and ranking-based. Our experiments show that a hybrid methodology involving both classification and ranking performs well and outperforms the methodologies that employ only classification or only ranking.
微博网站在实时灾害管理中发挥着越来越重要的作用。然而,谣言和假新闻经常在这些平台上传播,如果不被发现,可能会破坏救援行动。因此,在灾难发生时,核实社交媒体上发布的一些信息变得势在必行。为此,有必要正确识别可核实事实的帖子,以便对其信息内容进行核实。在目前的工作中,我们解决了在Twitter微博网站上识别事实核查帖子的问题。我们在FIRE 2018会议上组织了一个共享任务,研究在特定灾难事件(2015年尼泊尔地震)期间发布的可事实核查推文的识别问题。本文描述了共享任务中使用的数据集,并比较了用于识别事实核查推文的不同方法的性能。我们主要用两种不同类型的方法进行实验——基于分类和基于排名。我们的实验表明,涉及分类和排名的混合方法表现良好,并且优于仅使用分类或仅使用排名的方法。
{"title":"Identifying fact-checkable microblogs during disasters: a classification-ranking approach","authors":"Divyank Barnwal, Siddharth Ghelani, Rohit Krishna, Moumita Basu, Saptarshi Ghosh","doi":"10.1145/3288599.3295587","DOIUrl":"https://doi.org/10.1145/3288599.3295587","url":null,"abstract":"Microblogging sites are increasingly playing an important role in real-time disaster management. However, rumors and fake news often spread on such platforms, which if not detected, can derail the rescue operations. Therefore, it becomes imperative to verify some of the information posted on social media during disaster situations. To this end, it is necessary to correctly identify fact-checkable posts, so that their information content can be verified. In the present work, we address the problem of identifying fact-checkable posts on the Twitter microblogging site. We organized a shared task in the FIRE 2018 conference to study the problem of identification of fact-checkable tweets posted during a particular disaster event (the 2015 Nepal earthquake). This paper describes the dataset used in the shared task, and compares the performance of different methodologies for identifying fact-checkable tweets. We primarily experiment with two different types of approaches - classification-based and ranking-based. Our experiments show that a hybrid methodology involving both classification and ranking performs well and outperforms the methodologies that employ only classification or only ranking.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123117654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
An efficient heuristic to minimize number of regenerations in translucent optical network under dynamic scenario 动态场景下半透明光网络中最小再生数的一种有效启发式算法
Ira Nath, U. Bhattacharya, M. Chatterjee
In this paper, the problem of minimizing the utilization of resources at regenerators under dynamic environment in translucent optical networks has been studied. The problem is an NP-complete one the solution of which remains intractable as the network size increases. A heuristic approach is proposed here to route each incoming request in a way to reduce the number of regenerations at regenerating nodes under dynamic scenario to the extent possible. Input to this algorithmic approach is the regenerator positions obtained from the output of execution of another heuristic CLR [14] which actually selects minimum possible number of regenerator nodes in the network. Performance comparisons show that the proposed heuristic provide a significant improvement over the existing one both in terms of maximum number of regenerations that occur amongst all the regenerator nodes and also connection blocking probability.
本文研究了动态环境下半透明光网络中再生器资源利用率最小化的问题。这个问题是一个np完全问题,随着网络规模的增加,其解决方案仍然难以解决。本文提出了一种启发式方法,在动态场景下,以尽可能减少再生节点上的再生次数的方式路由每个传入请求。该算法方法的输入是从执行另一个启发式CLR[14]的输出中获得的再生器位置,该启发式CLR[14]实际上选择了网络中最小可能数量的再生器节点。性能比较表明,所提出的启发式算法在所有再生器节点之间发生的最大再生次数和连接阻塞概率方面都比现有的启发式算法有了显著的改进。
{"title":"An efficient heuristic to minimize number of regenerations in translucent optical network under dynamic scenario","authors":"Ira Nath, U. Bhattacharya, M. Chatterjee","doi":"10.1145/3288599.3295578","DOIUrl":"https://doi.org/10.1145/3288599.3295578","url":null,"abstract":"In this paper, the problem of minimizing the utilization of resources at regenerators under dynamic environment in translucent optical networks has been studied. The problem is an NP-complete one the solution of which remains intractable as the network size increases. A heuristic approach is proposed here to route each incoming request in a way to reduce the number of regenerations at regenerating nodes under dynamic scenario to the extent possible. Input to this algorithmic approach is the regenerator positions obtained from the output of execution of another heuristic CLR [14] which actually selects minimum possible number of regenerator nodes in the network. Performance comparisons show that the proposed heuristic provide a significant improvement over the existing one both in terms of maximum number of regenerations that occur amongst all the regenerator nodes and also connection blocking probability.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127611004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fundamentals for IoT networks: secure and low-latency communications 物联网网络的基础:安全和低延迟通信
H. Poor, Mario Goldenbaum, Wei Yang
The emerging Internet of Things (IoT) has several salient characteristics that differentiate it from existing wireless networking architectures. These include the deployment of very large numbers of (possibly) low-complexity terminals; the need for low-latency, short-packet communications (e.g., to support automation); light or no infrastructure; and primary applications of data gathering, inference and control. These characteristics have motivated the development of new fundamentals that can provide insights into the limits of communication in this regime. This paper discusses two issues in this context, namely security and low-latency, through the respective lenses of physical layer security and finite-blocklength information theory.
新兴的物联网(IoT)具有与现有无线网络架构不同的几个显著特征。这包括部署大量(可能的)低复杂性终端;对低延迟、短包通信的需求(例如,支持自动化);基础设施少或没有;主要应用于数据采集、推理和控制。这些特征推动了新的基本原理的发展,这些基本原理可以提供对这种制度下通信限制的见解。本文通过物理层安全性和有限块长度信息理论分别讨论了在此背景下的安全性和低延迟两个问题。
{"title":"Fundamentals for IoT networks: secure and low-latency communications","authors":"H. Poor, Mario Goldenbaum, Wei Yang","doi":"10.1145/3288599.3288643","DOIUrl":"https://doi.org/10.1145/3288599.3288643","url":null,"abstract":"The emerging Internet of Things (IoT) has several salient characteristics that differentiate it from existing wireless networking architectures. These include the deployment of very large numbers of (possibly) low-complexity terminals; the need for low-latency, short-packet communications (e.g., to support automation); light or no infrastructure; and primary applications of data gathering, inference and control. These characteristics have motivated the development of new fundamentals that can provide insights into the limits of communication in this regime. This paper discusses two issues in this context, namely security and low-latency, through the respective lenses of physical layer security and finite-blocklength information theory.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122513398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Load balanced transaction scheduling in on-demand computing using cuckoo search-ant colony optimization 基于布谷鸟搜索蚁群优化的按需计算负载均衡事务调度
D. P. Mahato
Load balanced transaction scheduling in on-demand computing system is known to be NP-hard problem. In order to solve this problem, this paper introduces a hybrid approach named cuckoo search-ant colony optimization. The approach dynamically generates an optimal schedule by clustering the on-demand computing resources considering their load and completes the transaction execution within their deadlines. The approach also balances the load of the system before scheduling the transactions. For clustering the resources we use cuckoo search method. We use ant colony optimization for selecting the appropriate and optimal resources. We evaluate the performance of the proposed algorithm with six existing algorithms.
在按需计算系统中,负载均衡事务调度是一个np难题。为了解决这一问题,本文引入了一种称为布谷鸟搜索-蚁群优化的混合方法。该方法通过考虑按需计算资源的负载对其进行聚类,动态生成最优调度,并在其截止日期内完成事务的执行。该方法还可以在调度事务之前平衡系统负载。对于资源的聚类,我们使用布谷鸟搜索法。我们使用蚁群优化来选择合适和最优的资源。我们用六种现有算法来评估所提出算法的性能。
{"title":"Load balanced transaction scheduling in on-demand computing using cuckoo search-ant colony optimization","authors":"D. P. Mahato","doi":"10.1145/3288599.3298791","DOIUrl":"https://doi.org/10.1145/3288599.3298791","url":null,"abstract":"Load balanced transaction scheduling in on-demand computing system is known to be NP-hard problem. In order to solve this problem, this paper introduces a hybrid approach named cuckoo search-ant colony optimization. The approach dynamically generates an optimal schedule by clustering the on-demand computing resources considering their load and completes the transaction execution within their deadlines. The approach also balances the load of the system before scheduling the transactions. For clustering the resources we use cuckoo search method. We use ant colony optimization for selecting the appropriate and optimal resources. We evaluate the performance of the proposed algorithm with six existing algorithms.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130354499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Sensor node assisted DTN for a post-disaster scenario 传感器节点协助DTN进行灾后场景
A. Gupta, J. K. Mandal, Indrajit Bhattacharya
A Delay Tolerant Network being a facilitator of communication establishment in heterogeneous networking environments may present an efficient solution of communication in a Wireless Sensor Network that may exist within the ambit of the DTN. WSNs may be found easily in a DTN like those temporarily created using sensor-deployment over drowned places or villages, etc. Collecting information from those cut-off areas is of utmost importance to provide efficient rescue and relief operation. Current work suggests distributing Delsar Life Detection Sensors for probing such cut-off areas for tracing of struck or trapped life. Localization techniques have been used to locate the exact positions of the victims so that appropriate help could be administered to them with efficiency. At the time of distributing the sensors, one or two tag sensors with high power are positioned strategically in the cut-off areas that collect data from the sensors and from where data is further collected using some data mules. The results have been obtained both over simulation in the NS2 simulator and over a practical field implementation. Results suggest that the proposed architecture is able to predict presence of life with more than 70 percent accuracy. This shows that the proposed novel solution to WSN assisted DTN is practicable and efficient for implementation during disasters to communicate with cut-off and far-off remote areas.
容延迟网络作为异构网络环境中通信建立的促进者,可以为可能存在于DTN范围内的无线传感器网络提供有效的通信解决方案。无线传感器网络可以很容易地在DTN中找到,比如在淹没的地方或村庄等使用传感器部署临时创建的DTN。从这些被切断的地区收集信息对于提供有效的救援行动至关重要。目前的工作建议分配Delsar生命探测传感器,用于探测这些切断区域,以追踪被击中或被困的生命。已经使用了本地化技术来确定受害者的确切位置,以便能够有效地向他们提供适当的帮助。在分配传感器时,策略性地将一个或两个高功率标签传感器放置在从传感器收集数据的截止区域,并使用一些数据骡子从那里进一步收集数据。结果在NS2仿真器和实际现场实现中都得到了验证。结果表明,所提出的架构能够以超过70%的准确率预测生命的存在。这表明本文提出的WSN辅助DTN的新方案在灾害中实现与偏远地区的通信是可行和有效的。
{"title":"Sensor node assisted DTN for a post-disaster scenario","authors":"A. Gupta, J. K. Mandal, Indrajit Bhattacharya","doi":"10.1145/3288599.3295590","DOIUrl":"https://doi.org/10.1145/3288599.3295590","url":null,"abstract":"A Delay Tolerant Network being a facilitator of communication establishment in heterogeneous networking environments may present an efficient solution of communication in a Wireless Sensor Network that may exist within the ambit of the DTN. WSNs may be found easily in a DTN like those temporarily created using sensor-deployment over drowned places or villages, etc. Collecting information from those cut-off areas is of utmost importance to provide efficient rescue and relief operation. Current work suggests distributing Delsar Life Detection Sensors for probing such cut-off areas for tracing of struck or trapped life. Localization techniques have been used to locate the exact positions of the victims so that appropriate help could be administered to them with efficiency. At the time of distributing the sensors, one or two tag sensors with high power are positioned strategically in the cut-off areas that collect data from the sensors and from where data is further collected using some data mules. The results have been obtained both over simulation in the NS2 simulator and over a practical field implementation. Results suggest that the proposed architecture is able to predict presence of life with more than 70 percent accuracy. This shows that the proposed novel solution to WSN assisted DTN is practicable and efficient for implementation during disasters to communicate with cut-off and far-off remote areas.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130363051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measurements and analytics of wide-area file transfers over dedicated connections 测量和分析专用连接上的广域文件传输
N. Rao, Qiang Liu, S. Sen, Zhengchun Liu, R. Kettimuthu, Ian T Foster
Distributed scientific and big-data computations are becoming increasingly dependent on access to remote files. Wide-area file transfers are supported by two basic schemes: (i) application-level tools, such as GridFTP, that provide transport services between file systems housed at geographically separated sites, and (ii) file systems mounted over wide-area networks, using mechanisms such as LNet routers that make them transparently available. In both cases, the file transfer performance critically depends on the configuration consisting of host, file, IO, and disk subsystems, which are complex by themselves, as well as on their complex compositions implemented using buffers and IO-network data transitions. We present extensive file transfer rate measurements collected over dedicated 10 Gbps connections with 0-366 ms round-trip times, using GridFTP and XDD file transfer tools, and Lustre file system extended over wide-area networks using LNet routers. Our test configurations are composed of: three types of host systems; XFS, Lustre, and ext3 file systems; and Ethernet and SONET wide-area connections. We present analytics based on the convexity-concavity of throughput profiles which provide insights into throughput and its superior or inferior trend compared to linear interpolations. We propose the utilization-concavity coefficient, a scalar metric that characterizes the overall performance of any file transfer method consisting of specific configuration and scheme. Our results enable performance optimizations by highlighting the significant roles of (i) buffer sizes and parallelism in GridFTP and XDD, and (ii) buffer utilization and credit mechanism in LNet routers.
分布式科学和大数据计算越来越依赖于对远程文件的访问。广域文件传输由两种基本方案支持:(i)应用程序级工具,如GridFTP,它在地理位置分开的站点上提供文件系统之间的传输服务;(ii)安装在广域网络上的文件系统,使用LNet路由器等机制使它们透明可用。在这两种情况下,文件传输性能主要取决于由主机、文件、IO和磁盘子系统组成的配置(这些子系统本身就很复杂),以及它们使用缓冲区和IO网络数据转换实现的复杂组合。我们使用GridFTP和XDD文件传输工具,在专用的10 Gbps连接上收集了大量的文件传输速率测量数据,往返时间为0-366毫秒,并使用LNet路由器在广域网上扩展了Lustre文件系统。我们的测试配置包括:三种类型的主机系统;XFS、Lustre和ext3文件系统;以及以太网和SONET广域连接。我们提出了基于吞吐量轮廓的凹凸性的分析,与线性插值相比,它提供了对吞吐量及其优势或劣势趋势的见解。我们提出了利用-凹凸系数,这是一个标量度量,表征由特定配置和方案组成的任何文件传输方法的整体性能。我们的结果通过强调(i) GridFTP和XDD中的缓冲区大小和并行性以及(ii) LNet路由器中的缓冲区利用率和信用机制的重要作用来实现性能优化。
{"title":"Measurements and analytics of wide-area file transfers over dedicated connections","authors":"N. Rao, Qiang Liu, S. Sen, Zhengchun Liu, R. Kettimuthu, Ian T Foster","doi":"10.1145/3288599.3288641","DOIUrl":"https://doi.org/10.1145/3288599.3288641","url":null,"abstract":"Distributed scientific and big-data computations are becoming increasingly dependent on access to remote files. Wide-area file transfers are supported by two basic schemes: (i) application-level tools, such as GridFTP, that provide transport services between file systems housed at geographically separated sites, and (ii) file systems mounted over wide-area networks, using mechanisms such as LNet routers that make them transparently available. In both cases, the file transfer performance critically depends on the configuration consisting of host, file, IO, and disk subsystems, which are complex by themselves, as well as on their complex compositions implemented using buffers and IO-network data transitions. We present extensive file transfer rate measurements collected over dedicated 10 Gbps connections with 0-366 ms round-trip times, using GridFTP and XDD file transfer tools, and Lustre file system extended over wide-area networks using LNet routers. Our test configurations are composed of: three types of host systems; XFS, Lustre, and ext3 file systems; and Ethernet and SONET wide-area connections. We present analytics based on the convexity-concavity of throughput profiles which provide insights into throughput and its superior or inferior trend compared to linear interpolations. We propose the utilization-concavity coefficient, a scalar metric that characterizes the overall performance of any file transfer method consisting of specific configuration and scheme. Our results enable performance optimizations by highlighting the significant roles of (i) buffer sizes and parallelism in GridFTP and XDD, and (ii) buffer utilization and credit mechanism in LNet routers.","PeriodicalId":346177,"journal":{"name":"Proceedings of the 20th International Conference on Distributed Computing and Networking","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128652812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the 20th International Conference on Distributed Computing and Networking
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1