首页 > 最新文献

2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)最新文献

英文 中文
A game theoretic study of attack and defense in cyber-physical systems 网络物理系统攻击与防御的博弈论研究
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928904
Chris Y. T. Ma, N. Rao, David K. Y. Yau
Cyber-physical systems encompass a wide range of systems such as sensor networks, cloud computing complexes, and communication networks. They require both the cyber and physical components to function, and hence are susceptible to attacks on either. A cyber-physical system is characterized by the physical space that represents physical components, and the cyber space that represents computations and communications. In this paper, we present a number of game theoretic formulations of attack and defense aspects of cyber-physical systems under different cost and benefit functions and different budgets of the attacker and defender. We discuss the outcomes of the underlying game under linear, negative exponential, and S-shaped benefit functions. We show that the outcomes are determined by the Nash Equilibria (which sometimes occur at budget limits), which in turn determine the system survival.
信息物理系统包括广泛的系统,如传感器网络、云计算复合体和通信网络。它们需要网络和物理组件同时发挥作用,因此容易受到任何一种攻击。网络物理系统的特点是物理空间代表物理组件,网络空间代表计算和通信。在不同的成本效益函数和不同的攻击方和防御方预算下,我们给出了网络物理系统攻击和防御方面的一些博弈论公式。我们讨论了在线性、负指数和s形利益函数下潜在博弈的结果。我们证明了结果是由纳什均衡(有时发生在预算限制下)决定的,这反过来又决定了系统的生存。
{"title":"A game theoretic study of attack and defense in cyber-physical systems","authors":"Chris Y. T. Ma, N. Rao, David K. Y. Yau","doi":"10.1109/INFCOMW.2011.5928904","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928904","url":null,"abstract":"Cyber-physical systems encompass a wide range of systems such as sensor networks, cloud computing complexes, and communication networks. They require both the cyber and physical components to function, and hence are susceptible to attacks on either. A cyber-physical system is characterized by the physical space that represents physical components, and the cyber space that represents computations and communications. In this paper, we present a number of game theoretic formulations of attack and defense aspects of cyber-physical systems under different cost and benefit functions and different budgets of the attacker and defender. We discuss the outcomes of the underlying game under linear, negative exponential, and S-shaped benefit functions. We show that the outcomes are determined by the Nash Equilibria (which sometimes occur at budget limits), which in turn determine the system survival.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127494412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Adaptive scheduling for wireless video transmission in high-speed networks 高速网络中无线视频传输的自适应调度
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928803
Zheng Wan, N. Xiong, N. Ghani, M. Peng, A. Vasilakos, Liang Zhou
With the increase of wireless bandwidth, wireless video applications become more and more popular. A high speed core network is needed for large-scale applications to collect video from wireless terminals in a distributed way. It is necessary to guarantee video transmission in wireless networks because video data should be firstly transmitted via wireless channel. Since wireless bandwidth is still limited and fluctuates frequently, it is difficult to protect wireless video transmission. In this paper, we propose an adaptive cross layer scheduling schema to reduce video transmission distortion in IEEE 802.11e networks. Firstly, it is preferred to insert each video frame into the access category (AC) with minimum relative queuing delay to reduce transmission delay. Secondly, a dynamic frame assignment algorithm (DFAA) is proposed to guarantee the transmission of high priority frames efficiently, with the constraint of limited bandwidth. Finally, each parameter of DFAA is equipped with a fuzzy logic controller which can produce appropriate adjustment to reply quickly to the variation of video data rate, coding structure and network load. Extensive simulation results are presented to validate the effectiveness of our proposed scheme.
随着无线带宽的增加,无线视频应用越来越受欢迎。大规模应用需要高速核心网以分布式方式采集无线终端的视频。由于视频数据首先要通过无线信道传输,因此必须保证无线网络中的视频传输。由于无线带宽仍然有限且波动频繁,因此难以对无线视频传输进行保护。为了减少IEEE 802.11e网络中的视频传输失真,本文提出了一种自适应跨层调度方案。首先,优选将每个视频帧插入到相对排队延迟最小的接入类别(AC)中,以减少传输延迟。其次,在有限带宽约束下,提出了一种动态帧分配算法(DFAA),以保证高优先级帧的高效传输。最后,DFAA的各个参数都配有模糊控制器,能够根据视频数据速率、编码结构和网络负载的变化做出适当的调整。大量的仿真结果验证了所提方案的有效性。
{"title":"Adaptive scheduling for wireless video transmission in high-speed networks","authors":"Zheng Wan, N. Xiong, N. Ghani, M. Peng, A. Vasilakos, Liang Zhou","doi":"10.1109/INFCOMW.2011.5928803","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928803","url":null,"abstract":"With the increase of wireless bandwidth, wireless video applications become more and more popular. A high speed core network is needed for large-scale applications to collect video from wireless terminals in a distributed way. It is necessary to guarantee video transmission in wireless networks because video data should be firstly transmitted via wireless channel. Since wireless bandwidth is still limited and fluctuates frequently, it is difficult to protect wireless video transmission. In this paper, we propose an adaptive cross layer scheduling schema to reduce video transmission distortion in IEEE 802.11e networks. Firstly, it is preferred to insert each video frame into the access category (AC) with minimum relative queuing delay to reduce transmission delay. Secondly, a dynamic frame assignment algorithm (DFAA) is proposed to guarantee the transmission of high priority frames efficiently, with the constraint of limited bandwidth. Finally, each parameter of DFAA is equipped with a fuzzy logic controller which can produce appropriate adjustment to reply quickly to the variation of video data rate, coding structure and network load. Extensive simulation results are presented to validate the effectiveness of our proposed scheme.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130148887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
StorNet: Co-scheduling of end-to-end bandwidth reservation on storage and network systems for high-performance data transfers StorNet:存储系统和网络系统的端到端带宽预留协同调度,用于高性能数据传输
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928792
Junmin Gu, D. Katramatos, Xin Liu, V. Natarajan, A. Shoshani, A. Sim, Dantong Yu, S. Bradley, S. McKee
Modern scientific data-intensive applications brought about the need for novel data transfer technologies and automated tools capable of effectively utilizing available raw network bandwidth and intelligently assisting scientists in replicating large volumes of data to desired locations in a timely manner. In this paper we describe the design of StorNet, an integrated end-to-end resource provisioning and management system for high performance data transfers that can operate with heterogeneous network protocols and storage systems in a federated computing environment. StorNet allocates and co-schedules storage and network resources involved in data transfers. It is based on existing Storage Resource Manager, TeraPaths, and OSCARS capabilities. StorNet provides data intensive applications with the capability of predictable, yet efficient delivery of data at rates of multiple gigabits/second, bridging end-to-end advanced storage and network technologies in a transparent way.
现代科学数据密集型应用带来了对新型数据传输技术和自动化工具的需求,这些技术和自动化工具能够有效地利用可用的原始网络带宽,并智能地帮助科学家及时将大量数据复制到所需的位置。在本文中,我们描述了StorNet的设计,这是一个集成的端到端资源供应和管理系统,用于高性能数据传输,可以在联邦计算环境中使用异构网络协议和存储系统。StorNet分配和共同调度数据传输中涉及的存储和网络资源。它基于现有的存储资源管理器、terapaath和OSCARS功能。StorNet为数据密集型应用程序提供了可预测的能力,并且以千兆位/秒的速率高效传输数据,以透明的方式桥接端到端的先进存储和网络技术。
{"title":"StorNet: Co-scheduling of end-to-end bandwidth reservation on storage and network systems for high-performance data transfers","authors":"Junmin Gu, D. Katramatos, Xin Liu, V. Natarajan, A. Shoshani, A. Sim, Dantong Yu, S. Bradley, S. McKee","doi":"10.1109/INFCOMW.2011.5928792","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928792","url":null,"abstract":"Modern scientific data-intensive applications brought about the need for novel data transfer technologies and automated tools capable of effectively utilizing available raw network bandwidth and intelligently assisting scientists in replicating large volumes of data to desired locations in a timely manner. In this paper we describe the design of StorNet, an integrated end-to-end resource provisioning and management system for high performance data transfers that can operate with heterogeneous network protocols and storage systems in a federated computing environment. StorNet allocates and co-schedules storage and network resources involved in data transfers. It is based on existing Storage Resource Manager, TeraPaths, and OSCARS capabilities. StorNet provides data intensive applications with the capability of predictable, yet efficient delivery of data at rates of multiple gigabits/second, bridging end-to-end advanced storage and network technologies in a transparent way.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131029532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Human centric data fusion in Vehicular Cyber-Physical Systems 车载信息物理系统中以人为中心的数据融合
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928899
Aditya Wagh, Xu Li, Jingyan Wan, C. Qiao, Changxu Wu
Building effective Vehicular Cyber-Physical Systems (VCPS) to improve road safety is a non-trivial challenge, especially when we examine how the driver benefits from the existing and proposed technologies in the presence of Human Factors (HF) related negative factors such as information overload, confusion, and distraction. In this paper, we address a human-centric data fusion problem in VCPS. To the best of our knowledge, this work is the first to apply HF to the data fusion problem, which has both theoretical value and practical implications. In particular, we present a new architecture by defining a distinct High-Level (HL) data fusion layer with HF considerations, that is placed between the safety applications on the VCPS and the human driver. A data fusion algorithm is proposed to fuse multiple messages (based on reaction time, message type, preferred evasive actions, severity of the hazards, etc) and to maximize the total utility of the messages. The algorithm is tested with real human drivers to demonstrate the potential benefit of incorporating such human-centric fusion in existing warning systems.
建立有效的车辆网络物理系统(VCPS)以提高道路安全是一项非同小可的挑战,特别是当我们研究驾驶员如何在存在与人为因素(HF)相关的负面因素(如信息过载、混乱和分心)的情况下从现有和拟议的技术中获益时。在本文中,我们解决了VCPS中以人为中心的数据融合问题。据我们所知,这项工作是第一次将高频应用于数据融合问题,具有理论价值和实际意义。特别是,我们提出了一个新的架构,通过定义一个具有HF考虑的独特的高级(HL)数据融合层,该层位于VCPS上的安全应用程序和人类驾驶员之间。提出了一种基于反应时间、信息类型、首选规避动作、危害严重程度等因素的信息融合算法,并使信息的总效用最大化。该算法在真实的人类驾驶员身上进行了测试,以证明将这种以人为中心的融合纳入现有预警系统的潜在好处。
{"title":"Human centric data fusion in Vehicular Cyber-Physical Systems","authors":"Aditya Wagh, Xu Li, Jingyan Wan, C. Qiao, Changxu Wu","doi":"10.1109/INFCOMW.2011.5928899","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928899","url":null,"abstract":"Building effective Vehicular Cyber-Physical Systems (VCPS) to improve road safety is a non-trivial challenge, especially when we examine how the driver benefits from the existing and proposed technologies in the presence of Human Factors (HF) related negative factors such as information overload, confusion, and distraction. In this paper, we address a human-centric data fusion problem in VCPS. To the best of our knowledge, this work is the first to apply HF to the data fusion problem, which has both theoretical value and practical implications. In particular, we present a new architecture by defining a distinct High-Level (HL) data fusion layer with HF considerations, that is placed between the safety applications on the VCPS and the human driver. A data fusion algorithm is proposed to fuse multiple messages (based on reaction time, message type, preferred evasive actions, severity of the hazards, etc) and to maximize the total utility of the messages. The algorithm is tested with real human drivers to demonstrate the potential benefit of incorporating such human-centric fusion in existing warning systems.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130678687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
SDSM: A secure data service mechanism in mobile cloud computing SDSM:移动云计算中的安全数据服务机制
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928784
Weiwei Jia, Haojin Zhu, Z. Cao, Lifei Wei, Xiaodong Lin
To enhance the security of mobile cloud users, a few proposals have been presented recently. However we argue that most of them are not suitable for mobile cloud where mobile users might join or leave the mobile networks arbitrarily. In this paper, we design a secure mobile user-based data service mechanism (SDSM) to provide confidentiality and fine-grained access control for data stored in the cloud. This mechanism enables the mobile users to enjoy a secure outsourced data services at a minimized security management overhead. The core idea of SDSM is that SDSM outsources not only the data but also the security management to the mobile cloud in a trust way. Our analysis shows that the proposed mechanism has many advantages over the existing traditional methods such as lower overhead and convenient update, which could better cater the requirements in mobile cloud computing scenarios.
为了加强移动云用户的安全,最近提出了一些建议。然而,我们认为它们中的大多数都不适合移动云,因为移动用户可能会随意加入或离开移动网络。本文设计了一种安全的基于移动用户的数据服务机制(SDSM),为存储在云中的数据提供保密性和细粒度访问控制。该机制使移动用户能够以最小的安全管理开销享受安全的外包数据服务。SDSM的核心思想是将数据和安全管理以信任的方式外包给移动云。分析表明,与现有的传统方法相比,该机制具有成本低、更新方便等优点,能够更好地满足移动云计算场景的需求。
{"title":"SDSM: A secure data service mechanism in mobile cloud computing","authors":"Weiwei Jia, Haojin Zhu, Z. Cao, Lifei Wei, Xiaodong Lin","doi":"10.1109/INFCOMW.2011.5928784","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928784","url":null,"abstract":"To enhance the security of mobile cloud users, a few proposals have been presented recently. However we argue that most of them are not suitable for mobile cloud where mobile users might join or leave the mobile networks arbitrarily. In this paper, we design a secure mobile user-based data service mechanism (SDSM) to provide confidentiality and fine-grained access control for data stored in the cloud. This mechanism enables the mobile users to enjoy a secure outsourced data services at a minimized security management overhead. The core idea of SDSM is that SDSM outsources not only the data but also the security management to the mobile cloud in a trust way. Our analysis shows that the proposed mechanism has many advantages over the existing traditional methods such as lower overhead and convenient update, which could better cater the requirements in mobile cloud computing scenarios.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132451425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 114
Capacity of multi-hop wireless network with frequency agile software defined radio 频率敏捷软件无线电多跳无线网络容量研究
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928850
Juncheng Jia, W. Zhuang
With the advance of both hardware and software technologies, the concept of software defined radio (SDR) is becoming more and more popular in the academic and industrial communities. Its popularity has been increased by the recent intensive research of cognitive radio technology, which is built on top of SDR. One of key features of SDR is its capability of frequency agility, which means a single SDR can access multiple channels, subject to a certain total frequency bandwidth (channel span) constraint. Compared with the traditional multiple-radio solutions, the SDR setup has the advantages of higher flexibility and reduced hardware size (cost). In this paper, we investigate the achievable capacity of a wireless network with single-SDR equipped transceivers, especially a multiple-hop network, for any given network flows. We propose new approaches to formulate the single-SDR constraint, which is unique for the derivation of capacity upper bounds. We also propose a heuristic algorithm to obtain a lower bound for the capacity. Both numerical and simulation results are presented to demonstrate the potential capacity for an SDR network and compared it with a multipleradio network.
随着硬件技术和软件技术的进步,软件无线电(SDR)的概念越来越受到学术界和工业界的欢迎。近年来建立在SDR基础上的认知无线电技术的深入研究使其越来越受欢迎。SDR的关键特征之一是其频率敏捷性,即在一定的总频带(信道跨度)约束下,单个SDR可以接入多个信道。与传统的多无线电解决方案相比,SDR设置具有更高的灵活性和更小的硬件尺寸(成本)。在本文中,我们研究了在任意给定的网络流下,单sdr收发器的无线网络,特别是多跳网络的可实现容量。我们提出了新的方法来表述单sdr约束,这是唯一的能力上界的推导。我们还提出了一种启发式算法来获得容量的下界。通过数值和仿真结果验证了SDR网络的潜在容量,并将其与多路无线网络进行了比较。
{"title":"Capacity of multi-hop wireless network with frequency agile software defined radio","authors":"Juncheng Jia, W. Zhuang","doi":"10.1109/INFCOMW.2011.5928850","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928850","url":null,"abstract":"With the advance of both hardware and software technologies, the concept of software defined radio (SDR) is becoming more and more popular in the academic and industrial communities. Its popularity has been increased by the recent intensive research of cognitive radio technology, which is built on top of SDR. One of key features of SDR is its capability of frequency agility, which means a single SDR can access multiple channels, subject to a certain total frequency bandwidth (channel span) constraint. Compared with the traditional multiple-radio solutions, the SDR setup has the advantages of higher flexibility and reduced hardware size (cost). In this paper, we investigate the achievable capacity of a wireless network with single-SDR equipped transceivers, especially a multiple-hop network, for any given network flows. We propose new approaches to formulate the single-SDR constraint, which is unique for the derivation of capacity upper bounds. We also propose a heuristic algorithm to obtain a lower bound for the capacity. Both numerical and simulation results are presented to demonstrate the potential capacity for an SDR network and compared it with a multipleradio network.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129248034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Repeater design and modeling for molecular communication networks 分子通信网络中继器设计与建模
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928865
T. Nakano, J. Shuai
Molecular communication or communication based on molecules in aqueous environments often relies on free diffusion of signal molecules where a transmitter nanomachine releases signal molecules that randomly walk in the environments to reach the receiver nanomachine. Since the signal molecules randomly walk in the three dimensional environments, the number of molecules that can reach the receiver significantly decreases over distance. A challenge in molecular communication is therefore to overcome the attenuation of molecular signals over distance. In this paper, we investigate a design of repeater nanomachines that amplify signal molecules to enable molecular communication over extended distances. The repeater nanomachines are placed between a transmitter and the receiver, where signal molecules released by the transmitter are amplified by the intermediate repeaters to reach the receiver. A specific biological model and design of molecular communication are used for designing repeaters, with simulation results showing the conditions for the repeaters to amplify, signal molecules for long distance molecular communication.
分子通信或基于水环境中分子的通信通常依赖于信号分子的自由扩散,其中发射纳米机释放在环境中随机行走的信号分子到达接收纳米机。由于信号分子在三维环境中随机行走,因此能够到达接收器的分子数量会随着距离的增加而显著减少。因此,分子通信的一个挑战是克服分子信号在距离上的衰减。在本文中,我们研究了一种中继器纳米机器的设计,它可以放大信号分子,使分子能够在更远的距离上进行通信。中继器纳米机器被放置在发射器和接收器之间,发射器释放的信号分子被中间中继器放大,到达接收器。利用特定的生物学模型和分子通信设计来设计中继器,仿真结果显示了中继器放大信号分子进行远距离分子通信的条件。
{"title":"Repeater design and modeling for molecular communication networks","authors":"T. Nakano, J. Shuai","doi":"10.1109/INFCOMW.2011.5928865","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928865","url":null,"abstract":"Molecular communication or communication based on molecules in aqueous environments often relies on free diffusion of signal molecules where a transmitter nanomachine releases signal molecules that randomly walk in the environments to reach the receiver nanomachine. Since the signal molecules randomly walk in the three dimensional environments, the number of molecules that can reach the receiver significantly decreases over distance. A challenge in molecular communication is therefore to overcome the attenuation of molecular signals over distance. In this paper, we investigate a design of repeater nanomachines that amplify signal molecules to enable molecular communication over extended distances. The repeater nanomachines are placed between a transmitter and the receiver, where signal molecules released by the transmitter are amplified by the intermediate repeaters to reach the receiver. A specific biological model and design of molecular communication are used for designing repeaters, with simulation results showing the conditions for the repeaters to amplify, signal molecules for long distance molecular communication.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126448874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Empirical analysis of the evolution of follower network: A case study on Douban 追随者网络演化的实证分析——以豆瓣为例
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928945
Junzhou Zhao, John C.S. Lui, D. Towsley, X. Guan, Yadong Zhou
Follower networks such as Twitter and Digg are becoming popular form of social information networks. This paper seeks to gain insights into how they evolve and the relationship between their structure and their ability to spread information. By studying the Douban follower network, which is a popular online social network in China, we provide some evidences showing its suitability for information spreading. For example, it exhibits an unbalanced bow-tie structure with a large out-component, which indicates that the majority of users can spread information widely; the effective diameter of the strongly connected component is shrinking as the user base grows, which facilitates spreading; and the transitivity property shows that people in a follower network tend to shorten the path of information flow, i.e., it takes fewer hops to spread information. Also, we observe the following users' behaviors, a user's following activity decays exponentially during her lifetime and the following behaviors differ according to the age of the account. These findings provide a deep understanding on the evolution of follower networks, and can provide guidelines on how to build an efficient information diffusion system.
像Twitter和Digg这样的追随者网络正在成为社会信息网络的流行形式。本文旨在深入了解它们是如何进化的,以及它们的结构与传播信息能力之间的关系。通过对国内流行的网络社交网络豆瓣粉丝网络的研究,提供了其信息传播适宜性的证据。例如,它呈现出不平衡的领结结构,外分量很大,这表明大多数用户可以广泛传播信息;强连接构件的有效直径随着用户群的增长而缩小,有利于扩散;传递性表明,追随者网络中的人倾向于缩短信息流的路径,即传播信息的跳数更少。同时,我们观察到以下用户的行为,用户的关注活动在其一生中呈指数衰减,并且以下行为随账户年龄的不同而不同。这些发现有助于深入理解追随者网络的演化,并为如何构建高效的信息扩散系统提供指导。
{"title":"Empirical analysis of the evolution of follower network: A case study on Douban","authors":"Junzhou Zhao, John C.S. Lui, D. Towsley, X. Guan, Yadong Zhou","doi":"10.1109/INFCOMW.2011.5928945","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928945","url":null,"abstract":"Follower networks such as Twitter and Digg are becoming popular form of social information networks. This paper seeks to gain insights into how they evolve and the relationship between their structure and their ability to spread information. By studying the Douban follower network, which is a popular online social network in China, we provide some evidences showing its suitability for information spreading. For example, it exhibits an unbalanced bow-tie structure with a large out-component, which indicates that the majority of users can spread information widely; the effective diameter of the strongly connected component is shrinking as the user base grows, which facilitates spreading; and the transitivity property shows that people in a follower network tend to shorten the path of information flow, i.e., it takes fewer hops to spread information. Also, we observe the following users' behaviors, a user's following activity decays exponentially during her lifetime and the following behaviors differ according to the age of the account. These findings provide a deep understanding on the evolution of follower networks, and can provide guidelines on how to build an efficient information diffusion system.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122544867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Keeping the connectivity and saving the energy in the internet 保持网络连接,节约网络能源
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928831
F. Cuomo, Anna Abbagnale, A. Cianfrani, Marco Polverini
Nowadays a big effort is spent to reduce the Internet energy consumption. Actual Internet topologies have space to power off some links and devices to reduce the energy consumed in off-peak periods still guaranteeing connectivity among terminals. In this work we leverage the algebraic connectivity of the graph modeling an ISP network in order to define the ESACON (Energy Saving based on Algebraic CONnectivity) algorithm. We then consider the network connectivity as a first target performance to be assured. To this aim we identify a metric based on the algebraic connectivity that, on one side, allows to switch off several links with the consequent significant energy saving and, on the other side, still preserves network connectivity and network performance for efficiently supporting the Internet traffic. We find that ESACON achieves better performance with respect to similar topology-aware approaches; moreover ESACON performance are comparable with ones of a complex traffic-aware solution.
如今,人们花了很大的努力来减少互联网的能源消耗。实际的互联网拓扑有空间关闭部分链路和设备,以减少非高峰时段的能量消耗,同时保证终端之间的连通性。在这项工作中,我们利用图的代数连通性来建模一个ISP网络,以定义ESACON(基于代数连通性的节能)算法。然后,我们将网络连接视为要确保的第一个目标性能。为此,我们确定了一个基于代数连通性的度量,一方面,它允许关闭几个链路,从而显著节省能源,另一方面,仍然保持网络连通性和网络性能,以有效地支持互联网流量。我们发现,相对于类似的拓扑感知方法,ESACON实现了更好的性能;此外,ESACON的性能可与复杂的交通感知解决方案相媲美。
{"title":"Keeping the connectivity and saving the energy in the internet","authors":"F. Cuomo, Anna Abbagnale, A. Cianfrani, Marco Polverini","doi":"10.1109/INFCOMW.2011.5928831","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928831","url":null,"abstract":"Nowadays a big effort is spent to reduce the Internet energy consumption. Actual Internet topologies have space to power off some links and devices to reduce the energy consumed in off-peak periods still guaranteeing connectivity among terminals. In this work we leverage the algebraic connectivity of the graph modeling an ISP network in order to define the ESACON (Energy Saving based on Algebraic CONnectivity) algorithm. We then consider the network connectivity as a first target performance to be assured. To this aim we identify a metric based on the algebraic connectivity that, on one side, allows to switch off several links with the consequent significant energy saving and, on the other side, still preserves network connectivity and network performance for efficiently supporting the Internet traffic. We find that ESACON achieves better performance with respect to similar topology-aware approaches; moreover ESACON performance are comparable with ones of a complex traffic-aware solution.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"301 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123119939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
Efficient prioritized congestion management for social network based live sharing 基于社交网络直播共享的高效优先级拥塞管理
Pub Date : 2011-04-10 DOI: 10.1109/INFCOMW.2011.5928817
Yili Gong, Wenjie Wang, C. Liu
In this paper, we explicitly consider the scenario of supporting applications with high-bandwidth and low-latency requirements in mobile social networks (MSNs), by leveraging the existing social network sites. Our solution does not assume any centralized server who coordinates the data storage, access, and group management. We address the fundamental challenge supporting such applications, namely: the limited bandwidth availability and intense bandwidth requirement that may hinder the deployment of these applications. We propose a link-based congestion management (LCM) mechanism to adjust the source rate of each stream, and a prioritized flow management mechanism composed of a novel concept of “stress weight” and its associated utility function. Extensive simulation results show that our proposal achieves 50% less rate reduction under the severe congestions, and the achievable source rate of the proposed LCM scheme is over one order of magnitude higher than the alternative approach.
在本文中,我们通过利用现有的社交网络站点,明确考虑了在移动社交网络(msn)中支持具有高带宽和低延迟要求的应用程序的场景。我们的解决方案不假设有任何集中式服务器来协调数据存储、访问和组管理。我们解决了支持这些应用程序的基本挑战,即:有限的带宽可用性和强烈的带宽需求可能阻碍这些应用程序的部署。提出了一种基于链路的拥塞管理(LCM)机制来调整每个流的源速率,并提出了一种由“压力权重”概念及其相关效用函数组成的优先级流管理机制。大量的仿真结果表明,在严重拥塞情况下,我们提出的LCM方案可实现的源率比替代方案高一个数量级以上。
{"title":"Efficient prioritized congestion management for social network based live sharing","authors":"Yili Gong, Wenjie Wang, C. Liu","doi":"10.1109/INFCOMW.2011.5928817","DOIUrl":"https://doi.org/10.1109/INFCOMW.2011.5928817","url":null,"abstract":"In this paper, we explicitly consider the scenario of supporting applications with high-bandwidth and low-latency requirements in mobile social networks (MSNs), by leveraging the existing social network sites. Our solution does not assume any centralized server who coordinates the data storage, access, and group management. We address the fundamental challenge supporting such applications, namely: the limited bandwidth availability and intense bandwidth requirement that may hinder the deployment of these applications. We propose a link-based congestion management (LCM) mechanism to adjust the source rate of each stream, and a prioritized flow management mechanism composed of a novel concept of “stress weight” and its associated utility function. Extensive simulation results show that our proposal achieves 50% less rate reduction under the severe congestions, and the achievable source rate of the proposed LCM scheme is over one order of magnitude higher than the alternative approach.","PeriodicalId":402219,"journal":{"name":"2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125162468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1