首页 > 最新文献

2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)最新文献

英文 中文
Software-Defined Dependable Computing for Spacecraft 航天器软件定义可靠计算
C. Fuchs, N. Murillo, A. Plaat, E. V. D. Kouwe, D. Harsono, Peng Wang
In this contribution, we provide insights on the practical feasibility, effectiveness, and validation of a software-based fault-tolerance architecture we developed for use aboard small satellites. We exploit thread-level coarse-grain lockstep to facilitate forward-error-correction and assures computational correctness on an FPGA-based MPSoC. It can be implemented using standard open-source and FPGA design tools, requires only standard COTS components, and is processor architecture and operating system agnostic.
在这篇文章中,我们提供了关于我们开发的用于小型卫星的基于软件的容错架构的实际可行性、有效性和验证的见解。我们利用线程级粗粒度锁步来促进前向纠错,并确保基于fpga的MPSoC的计算正确性。它可以使用标准的开源和FPGA设计工具来实现,只需要标准的COTS组件,并且与处理器架构和操作系统无关。
{"title":"Software-Defined Dependable Computing for Spacecraft","authors":"C. Fuchs, N. Murillo, A. Plaat, E. V. D. Kouwe, D. Harsono, Peng Wang","doi":"10.1109/PRDC.2018.00043","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00043","url":null,"abstract":"In this contribution, we provide insights on the practical feasibility, effectiveness, and validation of a software-based fault-tolerance architecture we developed for use aboard small satellites. We exploit thread-level coarse-grain lockstep to facilitate forward-error-correction and assures computational correctness on an FPGA-based MPSoC. It can be implemented using standard open-source and FPGA design tools, requires only standard COTS components, and is processor architecture and operating system agnostic.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121983898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
InfoLeak: Scheduling-Based Information Leakage infolleak:基于调度的信息泄漏
Tsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang, N. Suri
Covert-and side-channel attacks, typically enabled by the usage of shared resources, pose a serious threat to complex systems such as the Cloud. While their exploitation in the real world depends on properties of the execution environment (e.g., scheduling), the explicit consideration of these factors is often neglected. This paper introduces InfoLeak, an information leakage model that establishes the crucial role of the scheduler for exploiting core-private caches as covert channels. We show, formally and empirically, how the availability of these channels and the corresponding attack feasibility are affected by scheduling. Moreover, our model allows security experts to assess the related threat, posed by core-private cache covert channels for a particular system by considering solely the scheduling information. To validate the utility of InfoLeak, we deploy a covert-channel attack and correlate its success ratio to the scheduling of the attacker processes in the target system. We demonstrate the applicability of the InfoLeak model for analyzing the scheduling information for possible information leakage and also provide an example on its usage.
隐蔽和侧信道攻击,通常通过使用共享资源来实现,对云等复杂系统构成严重威胁。虽然它们在现实世界中的利用取决于执行环境的属性(例如,调度),但对这些因素的显式考虑经常被忽略。本文介绍了一个信息泄漏模型infolak,该模型建立了调度程序在利用核心私有缓存作为隐蔽通道方面的关键作用。我们以正式和经验的方式展示了这些通道的可用性和相应的攻击可行性如何受到调度的影响。此外,我们的模型允许安全专家通过单独考虑调度信息来评估特定系统的核心私有缓存隐蔽通道所构成的相关威胁。为了验证infolak的有效性,我们部署了一个隐蔽通道攻击,并将其成功率与目标系统中攻击者进程的调度相关联。我们演示了infolak模型在分析可能的信息泄漏的调度信息方面的适用性,并提供了一个使用示例。
{"title":"InfoLeak: Scheduling-Based Information Leakage","authors":"Tsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang, N. Suri","doi":"10.1109/PRDC.2018.00015","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00015","url":null,"abstract":"Covert-and side-channel attacks, typically enabled by the usage of shared resources, pose a serious threat to complex systems such as the Cloud. While their exploitation in the real world depends on properties of the execution environment (e.g., scheduling), the explicit consideration of these factors is often neglected. This paper introduces InfoLeak, an information leakage model that establishes the crucial role of the scheduler for exploiting core-private caches as covert channels. We show, formally and empirically, how the availability of these channels and the corresponding attack feasibility are affected by scheduling. Moreover, our model allows security experts to assess the related threat, posed by core-private cache covert channels for a particular system by considering solely the scheduling information. To validate the utility of InfoLeak, we deploy a covert-channel attack and correlate its success ratio to the scheduling of the attacker processes in the target system. We demonstrate the applicability of the InfoLeak model for analyzing the scheduling information for possible information leakage and also provide an example on its usage.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"432 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116707035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Approach for Trustworthiness Benchmarking Using Software Metrics 一种基于软件度量的可信度基准测试方法
N. Medeiros, N. Ivaki, Pedro Costa, M. Vieira
Trustworthiness is a paramount concern for users and customers in the selection of a software solution, specially in the context of complex and dynamic environments, such as Cloud and IoT. However, assessing and benchmarking trustworthiness (worthiness of software for being trusted) is a challenging task, mainly due to the variety of application scenarios (e.g., businesscritical, safety-critical), the large number of determinative quality attributes (e.g., security, performance), and last, but foremost, due to the subjective notion of trust and trustworthiness. In this paper, we present trustworthiness as a measurable notion in relative terms based on security attributes and propose an approach for the assessment and benchmarking of software. The main goal is to build a trustworthiness assessment model based on software metrics (e.g., Cyclomatic Complexity, CountLine, CBO) that can be used as indicators of software security. To demonstrate the proposed approach, we assessed and ranked several files and functions of the Mozilla Firefox project based on their trustworthiness score and conducted a survey among several software security experts in order to validate the obtained rank. Results show that our approach is able to provide a sound ranking of the benchmarked software.
用户和客户在选择软件解决方案时,尤其是在云和物联网等复杂和动态环境的背景下,可靠性是最重要的考虑因素。然而,评估和基准测试可信度(软件值得信任的价值)是一项具有挑战性的任务,主要是由于各种各样的应用场景(例如,业务关键型,安全关键型),大量决定性的质量属性(例如,安全性,性能),最后,但最重要的是,由于信任和可信度的主观概念。在本文中,我们将可信度作为一个基于安全属性的相对可测量的概念,并提出了一种软件评估和基准测试的方法。主要目标是建立一个基于软件度量(例如,圈复杂度,CountLine, CBO)的可信度评估模型,该模型可以用作软件安全性的指示器。为了证明所提出的方法,我们根据可信度评分对Mozilla Firefox项目的几个文件和功能进行了评估和排名,并在几位软件安全专家中进行了调查,以验证所获得的排名。结果表明,我们的方法能够为基准软件提供一个健全的排名。
{"title":"An Approach for Trustworthiness Benchmarking Using Software Metrics","authors":"N. Medeiros, N. Ivaki, Pedro Costa, M. Vieira","doi":"10.1109/PRDC.2018.00019","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00019","url":null,"abstract":"Trustworthiness is a paramount concern for users and customers in the selection of a software solution, specially in the context of complex and dynamic environments, such as Cloud and IoT. However, assessing and benchmarking trustworthiness (worthiness of software for being trusted) is a challenging task, mainly due to the variety of application scenarios (e.g., businesscritical, safety-critical), the large number of determinative quality attributes (e.g., security, performance), and last, but foremost, due to the subjective notion of trust and trustworthiness. In this paper, we present trustworthiness as a measurable notion in relative terms based on security attributes and propose an approach for the assessment and benchmarking of software. The main goal is to build a trustworthiness assessment model based on software metrics (e.g., Cyclomatic Complexity, CountLine, CBO) that can be used as indicators of software security. To demonstrate the proposed approach, we assessed and ranked several files and functions of the Mozilla Firefox project based on their trustworthiness score and conducted a survey among several software security experts in order to validate the obtained rank. Results show that our approach is able to provide a sound ranking of the benchmarked software.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115763408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Hierarchical Abnormal-Node Detection Using Fuzzy Logic for ECA Rule-Based Wireless Sensor Networks 基于ECA规则的无线传感器网络的模糊层次异常节点检测
Nesrine Berjab, Hieu Hanh Le, Chia-Mu Yu, S. Kuo, H. Yokota
The Internet of things (IoT) is a distributed, networked system composed of many embedded sensor devices. Unfortunately, these devices are resource constrained and susceptible to malicious data-integrity attacks and failures, leading to unreliability and sometimes to major failure of parts of the entire system. Intrusion detection and failure handling are essential requirements for IoT security. Nevertheless, as far as we know, the area of data-integrity detection for IoT has yet to receive much attention. Most previous intrusion-detection methods proposed for IoT, particularly for wireless sensor networks (WSNs), focus only on specific types of network attacks. Moreover, these approaches usually rely on using precise values to specify abnormality thresholds. However, sensor readings are often imprecise and crisp threshold values are inappropriate. To guarantee a lightweight, dependable monitoring system, we propose a novel hierarchical framework for detecting abnormal nodes in WSNs. The proposed approach uses fuzzy logic in event-condition-action (ECA) rule-based WSNs to detect malicious nodes, while also considering failed nodes. The spatiotemporal semantics of heterogeneous sensor readings are considered in the decision process to distinguish malicious data from other anomalies. Following our experiments with the proposed framework, we stress the significance of considering the sensor correlations to achieve detection accuracy, which has been neglected in previous studies. Our experiments using real-world sensor data demonstrate that our approach can provide high detection accuracy with low false-alarm rates. We also show that our approach performs well when compared to two well-known classification algorithms.
物联网(IoT)是由许多嵌入式传感器设备组成的分布式网络系统。不幸的是,这些设备资源有限,容易受到恶意数据完整性攻击和故障的影响,从而导致不可靠性,有时甚至导致整个系统的某些部分出现重大故障。入侵检测和故障处理是物联网安全的基本要求。然而,据我们所知,物联网数据完整性检测领域尚未受到太多关注。大多数以前针对物联网提出的入侵检测方法,特别是无线传感器网络(wsn),只关注特定类型的网络攻击。此外,这些方法通常依赖于使用精确的值来指定异常阈值。然而,传感器读数往往不精确,清晰的阈值是不合适的。为了保证监测系统的轻量化和可靠性,我们提出了一种新的分层框架来检测wsn中的异常节点。该方法在基于事件-条件-动作(ECA)规则的wsn中使用模糊逻辑来检测恶意节点,同时考虑故障节点。在决策过程中考虑异构传感器读数的时空语义,以区分恶意数据和其他异常。根据我们对所提出框架的实验,我们强调了考虑传感器相关性以实现检测精度的重要性,这在以前的研究中被忽视了。我们使用真实传感器数据的实验表明,我们的方法可以提供高检测精度和低误报率。我们还表明,与两种知名的分类算法相比,我们的方法表现良好。
{"title":"Hierarchical Abnormal-Node Detection Using Fuzzy Logic for ECA Rule-Based Wireless Sensor Networks","authors":"Nesrine Berjab, Hieu Hanh Le, Chia-Mu Yu, S. Kuo, H. Yokota","doi":"10.1109/PRDC.2018.00051","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00051","url":null,"abstract":"The Internet of things (IoT) is a distributed, networked system composed of many embedded sensor devices. Unfortunately, these devices are resource constrained and susceptible to malicious data-integrity attacks and failures, leading to unreliability and sometimes to major failure of parts of the entire system. Intrusion detection and failure handling are essential requirements for IoT security. Nevertheless, as far as we know, the area of data-integrity detection for IoT has yet to receive much attention. Most previous intrusion-detection methods proposed for IoT, particularly for wireless sensor networks (WSNs), focus only on specific types of network attacks. Moreover, these approaches usually rely on using precise values to specify abnormality thresholds. However, sensor readings are often imprecise and crisp threshold values are inappropriate. To guarantee a lightweight, dependable monitoring system, we propose a novel hierarchical framework for detecting abnormal nodes in WSNs. The proposed approach uses fuzzy logic in event-condition-action (ECA) rule-based WSNs to detect malicious nodes, while also considering failed nodes. The spatiotemporal semantics of heterogeneous sensor readings are considered in the decision process to distinguish malicious data from other anomalies. Following our experiments with the proposed framework, we stress the significance of considering the sensor correlations to achieve detection accuracy, which has been neglected in previous studies. Our experiments using real-world sensor data demonstrate that our approach can provide high detection accuracy with low false-alarm rates. We also show that our approach performs well when compared to two well-known classification algorithms.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129929983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Specification and Formal Verification of Atomic Concurrent Real-Time Transactions 原子并发实时事务的规范和形式化验证
Simin Cai, B. Gallina, Dag Nyström, C. Seceleanu
Although atomicity, isolation and temporal correctness are crucial to the dependability of many real-time database-centric systems, the selected assurance mechanism for one property may breach another. Trading off these properties requires to specify and analyze their dependencies, together with the selected supporting mechanisms (abort recovery, concurrency control, and scheduling), which is still insufficiently supported. In this paper, we propose a UML profile, called UTRAN, for specifying atomic concurrent real-time transactions, with explicit support for all three properties and their supporting mechanisms. We also propose a pattern-based modeling framework, called UPPCART, to formalize the transactions and the mechanisms specified in UTRAN, as UPPAAL timed automata. Various mechanisms can be modeled flexibly using our reusable patterns, after which the desired properties can be verified by the UPPAAL model checker. Our techniques facilitate systematic analysis of atomicity, isolation and temporal correctness trade-offs with guarantee, thus contributing to a dependable real-time database system.
尽管原子性、隔离性和时间正确性对于许多以实时数据库为中心的系统的可靠性至关重要,但为一个属性选择的保证机制可能会破坏另一个属性。权衡这些属性需要指定和分析它们的依赖关系,以及所选的支持机制(中止恢复、并发控制和调度),这些机制目前还没有得到充分的支持。在本文中,我们提出了一个UML概要文件,称为UTRAN,用于指定原子并发实时事务,并显式支持所有三个属性及其支持机制。我们还提出了一个基于模式的建模框架,称为UPPCART,用于形式化UTRAN中指定的事务和机制,作为UPPAAL时间自动机。可以使用我们的可重用模式灵活地对各种机制进行建模,之后可以由UPPAAL模型检查器验证所需的属性。我们的技术促进了对原子性、隔离性和时间正确性权衡的系统分析,从而有助于构建可靠的实时数据库系统。
{"title":"Specification and Formal Verification of Atomic Concurrent Real-Time Transactions","authors":"Simin Cai, B. Gallina, Dag Nyström, C. Seceleanu","doi":"10.1109/PRDC.2018.00021","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00021","url":null,"abstract":"Although atomicity, isolation and temporal correctness are crucial to the dependability of many real-time database-centric systems, the selected assurance mechanism for one property may breach another. Trading off these properties requires to specify and analyze their dependencies, together with the selected supporting mechanisms (abort recovery, concurrency control, and scheduling), which is still insufficiently supported. In this paper, we propose a UML profile, called UTRAN, for specifying atomic concurrent real-time transactions, with explicit support for all three properties and their supporting mechanisms. We also propose a pattern-based modeling framework, called UPPCART, to formalize the transactions and the mechanisms specified in UTRAN, as UPPAAL timed automata. Various mechanisms can be modeled flexibly using our reusable patterns, after which the desired properties can be verified by the UPPAAL model checker. Our techniques facilitate systematic analysis of atomicity, isolation and temporal correctness trade-offs with guarantee, thus contributing to a dependable real-time database system.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123412833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On Algorithms Selection for Unsupervised Anomaly Detection 无监督异常检测算法选择研究
T. Zoppi, A. Ceccarelli, A. Bondavalli
Anomaly detection, which aims at identifying unexpected trends and data patterns, has widely been used to build error detectors, failure predictors or intrusion detectors. Internal faults or malicious attacks have a different impact on the behavior of the system. They usually manifest as different observable deviations from the expected behavior, which may be identified by anomaly detection algorithms. Our study aims at investigating the suitability of unsupervised algorithms and their families in detecting either point, contextual or collective anomalies. To provide a complete picture, we consider both sliding and non-sliding window algorithms which operate in unsupervised mode. Along with qualitative analyses of each algorithm and family, we conduct an experimental campaign in which we run each algorithm on three state-of-the-art datasets in which we inject either point, contextual or collective anomalies. Results show that non-sliding algorithms are capable to detect point and collective anomalies, while they cannot effectively deal with contextual ones. Instead, sliding window algorithms require shorter periods of training and naturally build a local context, which allow them to effectively deal with contextual anomalies. Such observations are summarized to support the choice of the correct algorithm depending on the investigated class(es) of anomaly.
异常检测旨在识别意外的趋势和数据模式,已广泛用于构建错误检测器、故障预测器或入侵检测器。内部故障或恶意攻击对系统行为的影响不同。它们通常表现为与预期行为不同的可观察偏差,这些偏差可以通过异常检测算法识别出来。我们的研究旨在调查无监督算法及其家族在检测点、上下文或集体异常方面的适用性。为了提供一个完整的图像,我们考虑了在无监督模式下运行的滑动和非滑动窗口算法。随着每个算法和家族的定性分析,我们进行了一个实验活动,我们在三个最先进的数据集上运行每个算法,我们注入点,上下文或集体异常。结果表明,非滑动算法能够检测到点异常和集体异常,但不能有效地处理上下文异常。相反,滑动窗口算法需要更短的训练时间,并且自然地建立一个局部上下文,这使得它们能够有效地处理上下文异常。总结了这些观察结果,以支持根据所调查的异常类别选择正确的算法。
{"title":"On Algorithms Selection for Unsupervised Anomaly Detection","authors":"T. Zoppi, A. Ceccarelli, A. Bondavalli","doi":"10.1109/PRDC.2018.00050","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00050","url":null,"abstract":"Anomaly detection, which aims at identifying unexpected trends and data patterns, has widely been used to build error detectors, failure predictors or intrusion detectors. Internal faults or malicious attacks have a different impact on the behavior of the system. They usually manifest as different observable deviations from the expected behavior, which may be identified by anomaly detection algorithms. Our study aims at investigating the suitability of unsupervised algorithms and their families in detecting either point, contextual or collective anomalies. To provide a complete picture, we consider both sliding and non-sliding window algorithms which operate in unsupervised mode. Along with qualitative analyses of each algorithm and family, we conduct an experimental campaign in which we run each algorithm on three state-of-the-art datasets in which we inject either point, contextual or collective anomalies. Results show that non-sliding algorithms are capable to detect point and collective anomalies, while they cannot effectively deal with contextual ones. Instead, sliding window algorithms require shorter periods of training and naturally build a local context, which allow them to effectively deal with contextual anomalies. Such observations are summarized to support the choice of the correct algorithm depending on the investigated class(es) of anomaly.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121634144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Research on Convolutional Codes are Used in RAID 卷积码在RAID中的应用研究
Tianyi Zhang, M. Kitakami
This paper proposes a new class of convolutional codes that are used in RAID, and compares their tolerating capabilities with existing MDS codes, they can solve erasure situations that the existing MDS codes of the same rate fail to solve for RAID.
本文提出了一种新的用于RAID的卷积码,并将其与现有的MDS码的容错能力进行了比较,解决了现有相同速率的MDS码无法解决的RAID擦除问题。
{"title":"Research on Convolutional Codes are Used in RAID","authors":"Tianyi Zhang, M. Kitakami","doi":"10.1109/PRDC.2018.00032","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00032","url":null,"abstract":"This paper proposes a new class of convolutional codes that are used in RAID, and compares their tolerating capabilities with existing MDS codes, they can solve erasure situations that the existing MDS codes of the same rate fail to solve for RAID.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133613125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive Repetition Scheme with Machine Learning for 3GPP NB-IoT 基于机器学习的3GPP NB-IoT自适应重复方案
Li-Sheng Chen, W. Chung, Ing-Yi Chen, S. Kuo
In NB-IoT systems, UEs with poor signal quality employ more repetitions to compensate for additional signal attenuation. Excessively high CE levels and repetitions of UEs lead to wastage of valuable wireless resources, whereas inadequate CE levels and repetitions result in data retrieval failure at the receiving end. Therefore, a machine learning-based adaptive repetition scheme for a 3GPP NB-IoT system is proposed in this work to effectively improve overall network transmission efficiency. The results of simulation show the effect of the discount factor? on the convergence behavior of the proposed scheme, with a lower discount factor value denoting the myopic behavior of the proposed scheme, which results from the fact that it places more emphasis on immediate rewards. And the propose scheme is capable of effectively improving the average spectral efficiency.
在NB-IoT系统中,信号质量差的终端使用更多的重复来补偿额外的信号衰减。过高的CE水平和ue的重复会导致宝贵的无线资源的浪费,而不足的CE水平和重复会导致接收端数据检索失败。因此,本文提出了一种基于机器学习的3GPP NB-IoT系统自适应重复方案,以有效提高整体网络传输效率。仿真结果显示了贴现因子的影响。关于所提方案的收敛行为,贴现因子值越小表示所提方案的短视行为,这是因为所提方案更强调即时奖励。该方案能够有效地提高平均频谱效率。
{"title":"Adaptive Repetition Scheme with Machine Learning for 3GPP NB-IoT","authors":"Li-Sheng Chen, W. Chung, Ing-Yi Chen, S. Kuo","doi":"10.1109/PRDC.2018.00046","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00046","url":null,"abstract":"In NB-IoT systems, UEs with poor signal quality employ more repetitions to compensate for additional signal attenuation. Excessively high CE levels and repetitions of UEs lead to wastage of valuable wireless resources, whereas inadequate CE levels and repetitions result in data retrieval failure at the receiving end. Therefore, a machine learning-based adaptive repetition scheme for a 3GPP NB-IoT system is proposed in this work to effectively improve overall network transmission efficiency. The results of simulation show the effect of the discount factor? on the convergence behavior of the proposed scheme, with a lower discount factor value denoting the myopic behavior of the proposed scheme, which results from the fact that it places more emphasis on immediate rewards. And the propose scheme is capable of effectively improving the average spectral efficiency.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131160732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A SAT-Based Approach for SDN Rule Table Distribution 基于sat的SDN规则表分发方法
Ryota Ogasawara, Masayuki Arai
In Software-Defined Networking (SDN) it is important to efficiently partition the rule table into sub-tables and distribute them to the multiple switches over the network. In this paper we proposed an optimal rule table distribution strategy by applying satisfiability (SAT)-based approach. N-coloring problem for partitioning is formulated as conjunctive normal form (CNF), and by repeatedly running SAT solver we can obtain maximum number of partitions.
在软件定义网络(SDN)中,如何有效地将规则表划分为子表并将其分发到网络中的多台交换机上是非常重要的。本文提出了一种基于可满足性(SAT)的最优规则表分布策略。将分区的n -着色问题表述为合取范式(CNF),通过反复运行SAT求解器可以得到分区的最大数目。
{"title":"A SAT-Based Approach for SDN Rule Table Distribution","authors":"Ryota Ogasawara, Masayuki Arai","doi":"10.1109/PRDC.2018.00034","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00034","url":null,"abstract":"In Software-Defined Networking (SDN) it is important to efficiently partition the rule table into sub-tables and distribute them to the multiple switches over the network. In this paper we proposed an optimal rule table distribution strategy by applying satisfiability (SAT)-based approach. N-coloring problem for partitioning is formulated as conjunctive normal form (CNF), and by repeatedly running SAT solver we can obtain maximum number of partitions.","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125394485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Restructuring Mesh-Connected Processor Arrays with Spares on Four Sides by Orthogonal Side Rotation 四边备件网格连接处理器阵列的正交边旋转重构
I. Takanami, Masaru Fukushi
An array with spares on four sides and the restructuring algorithm for it were proposed in [1]. However, the restructuring algorithm described in [1] is too complicated to be realized in hardware. Here, we propose a method to improve such the situation. First, the array is considered to be an (N +2) (N +2) array if four PEs are added to the four corners of the array and the spares are included. The (N+2) (N+2) array is divided into four subarrays, each of which is of size (N=2 + 1)(N=2 + 1), and the orthogonal side rotation introduced here is individually applied to each subarray. The reliabilities are given by computer simulation. They fairly increase, comparing with those in [1]. :
文献[1]提出了一种四面有备件的阵列及其重构算法。然而,文献[1]中描述的重构算法过于复杂,无法在硬件上实现。在此,我们提出一种方法来改善这种情况。首先,如果在数组的四个角上加上四个pe,并包括备件,则认为该数组为(N +2) (N +2)数组。(N+2) (N+2)数组被分成四个子数组,每个子数组的大小为(N=2 + 1)(N=2 + 1),这里介绍的正交侧旋转分别应用于每个子数组。通过计算机仿真给出了系统的可靠性。与文献[1]相比,它们明显增加。:
{"title":"Restructuring Mesh-Connected Processor Arrays with Spares on Four Sides by Orthogonal Side Rotation","authors":"I. Takanami, Masaru Fukushi","doi":"10.1109/PRDC.2018.00029","DOIUrl":"https://doi.org/10.1109/PRDC.2018.00029","url":null,"abstract":"An array with spares on four sides and the restructuring algorithm for it were proposed in [1]. However, the restructuring algorithm described in [1] is too complicated to be realized in hardware. Here, we propose a method to improve such the situation. First, the array is considered to be an (N +2) (N +2) array if four PEs are added to the four corners of the array and the spares are included. The (N+2) (N+2) array is divided into four subarrays, each of which is of size (N=2 + 1)(N=2 + 1), and the orthogonal side rotation introduced here is individually applied to each subarray. The reliabilities are given by computer simulation. They fairly increase, comparing with those in [1]. :","PeriodicalId":409301,"journal":{"name":"2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116783370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1