首页 > 最新文献

Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems最新文献

英文 中文
Sentiment Analysis of Twitter Data: Towards Filtering, Analyzing and Interpreting Social Network Data 推特数据的情感分析:面向社交网络数据的过滤、分析和解释
L. Branz, P. Brockmann
Social networks provide a rich data source for researchers that can be accessed in a comparatively effortless way. As data and text mining methods such as Sentiment Analysis are becoming increasingly refined, the wealth of social network data opens up entirely new possibilities for exploring specific in-depth research questions. In this paper an approach towards the retrieval, analysis and interpretation of social network data for research purposes is developed. The data is filtered according to relevant criteria and analyzed using Sentiment Analysis tools tailored specifically to the data source. The approach is verified by applying it to two example research questions, confirming past findings on cultural and gender differences in sentiment expression.
社交网络为研究人员提供了丰富的数据源,可以以相对轻松的方式访问。随着情感分析等数据和文本挖掘方法的日益完善,社交网络数据的丰富为探索特定的深度研究问题开辟了全新的可能性。本文提出了一种用于研究目的的社会网络数据的检索、分析和解释方法。数据根据相关标准进行过滤,并使用专门为数据源量身定制的情感分析工具进行分析。通过将该方法应用于两个示例研究问题,验证了过去关于情感表达的文化和性别差异的研究结果。
{"title":"Sentiment Analysis of Twitter Data: Towards Filtering, Analyzing and Interpreting Social Network Data","authors":"L. Branz, P. Brockmann","doi":"10.1145/3210284.3219769","DOIUrl":"https://doi.org/10.1145/3210284.3219769","url":null,"abstract":"Social networks provide a rich data source for researchers that can be accessed in a comparatively effortless way. As data and text mining methods such as Sentiment Analysis are becoming increasingly refined, the wealth of social network data opens up entirely new possibilities for exploring specific in-depth research questions. In this paper an approach towards the retrieval, analysis and interpretation of social network data for research purposes is developed. The data is filtered according to relevant criteria and analyzed using Sentiment Analysis tools tailored specifically to the data source. The approach is verified by applying it to two example research questions, confirming past findings on cultural and gender differences in sentiment expression.","PeriodicalId":412438,"journal":{"name":"Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127354395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
DCEP-Sim: An Open Simulation Framework for Distributed CEP: Introduction for Users and Prospective Developers DCEP-Sim:分布式CEP的开放仿真框架:用户和潜在开发人员介绍
Fabrice Starks, Stein Kristiansen, T. Plagemann
Evaluation of Distributed Complex Event Processing (CEP) systems is a rather challenging task. To simplify this task, we developed the open simulation framework for Distributed CEP, called DCEP-Sim. The goal of this tutorial is to facilitate the process of using DCEP-Sim. Since DCEP-Sim is designed and implemented in the popular network simulator ns-3 we introduce the most important concepts of ns-3. Simulations in ns-3 are configured and executed though a main program called an ns-3 script. We use a simple example script to explain how simulations with DCEP-Sim are set up and executed. To give an idea how DCEP-Sim can be adjusted to particular needs, we explain how DCEP-Sim can be adapted (e.g., through changing the workload and the network topology) and how new Distributed CEP solutions can be added by explaining how to add a new operator to DCEP-Sim.
分布式复杂事件处理(CEP)系统的评估是一项相当具有挑战性的任务。为了简化这项任务,我们开发了分布式CEP的开放仿真框架,称为DCEP-Sim。本教程的目标是促进使用DCEP-Sim的过程。由于DCEP-Sim是在流行的网络模拟器ns-3中设计和实现的,因此我们介绍了ns-3中最重要的概念。ns-3中的模拟是通过称为ns-3脚本的主程序配置和执行的。我们使用一个简单的示例脚本来解释如何使用DCEP-Sim设置和执行模拟。为了说明如何调整DCEP-Sim以适应特定需求,我们解释了如何调整DCEP-Sim(例如,通过改变工作负载和网络拓扑),以及如何通过解释如何向DCEP-Sim添加新运营商来添加新的分布式CEP解决方案。
{"title":"DCEP-Sim: An Open Simulation Framework for Distributed CEP: Introduction for Users and Prospective Developers","authors":"Fabrice Starks, Stein Kristiansen, T. Plagemann","doi":"10.1145/3210284.3219501","DOIUrl":"https://doi.org/10.1145/3210284.3219501","url":null,"abstract":"Evaluation of Distributed Complex Event Processing (CEP) systems is a rather challenging task. To simplify this task, we developed the open simulation framework for Distributed CEP, called DCEP-Sim. The goal of this tutorial is to facilitate the process of using DCEP-Sim. Since DCEP-Sim is designed and implemented in the popular network simulator ns-3 we introduce the most important concepts of ns-3. Simulations in ns-3 are configured and executed though a main program called an ns-3 script. We use a simple example script to explain how simulations with DCEP-Sim are set up and executed. To give an idea how DCEP-Sim can be adjusted to particular needs, we explain how DCEP-Sim can be adapted (e.g., through changing the workload and the network topology) and how new Distributed CEP solutions can be added by explaining how to add a new operator to DCEP-Sim.","PeriodicalId":412438,"journal":{"name":"Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115016155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
STTR STTR
Zhuangdi Xu, Harshit Gupta, U. Ramachandran
To fully exploit the capabilities of sensors in real life, especially cameras, smart camera surveillance requires the cooperation from both domain experts in computer vision and systems. Existing alert-based smart surveillance is only capable of tracking a limited number of suspicious objects, while in most real-life applications, we often do not know the perpetrator ahead of time for tracking their activities in advance. In this work, we propose a radically different approach to smart surveillance for vehicle tracking. Specifically, we explore a smart camera surveillance system aimed at tracking all vehicles in real time. The insight is not to store the raw videos, but to store the space-time trajectories of the vehicles. Since vehicle tracking is a continuous and geo-distributed task, we assume a geo-distributed Fog computing infrastructure as the execution platform for our system. To bound the storage space for storing the trajectories on each Fog node (serving the computational needs of a camera), we focus on the activities of vehicles in the vicinity of a given camera in a specific geographic region instead of the time dimension, and the fact that every vehicle has a "finite" lifetime. To bound the computational and network communication requirements for detection, re-identification, and inter-node communication, we propose novel techniques, namely, forward and backward propagation that reduces the latency for the operations and the communication overhead. STTR is a system for smart surveillance that we have built embodying these ideas. For evaluation, we develop a toolkit upon SUMO to emulate camera detections from traffic flow and adopt MaxiNet to emulate the fog computing infrastructure on Microsoft Azure.
{"title":"STTR","authors":"Zhuangdi Xu, Harshit Gupta, U. Ramachandran","doi":"10.1145/3210284.3210291","DOIUrl":"https://doi.org/10.1145/3210284.3210291","url":null,"abstract":"To fully exploit the capabilities of sensors in real life, especially cameras, smart camera surveillance requires the cooperation from both domain experts in computer vision and systems. Existing alert-based smart surveillance is only capable of tracking a limited number of suspicious objects, while in most real-life applications, we often do not know the perpetrator ahead of time for tracking their activities in advance. In this work, we propose a radically different approach to smart surveillance for vehicle tracking. Specifically, we explore a smart camera surveillance system aimed at tracking all vehicles in real time. The insight is not to store the raw videos, but to store the space-time trajectories of the vehicles. Since vehicle tracking is a continuous and geo-distributed task, we assume a geo-distributed Fog computing infrastructure as the execution platform for our system. To bound the storage space for storing the trajectories on each Fog node (serving the computational needs of a camera), we focus on the activities of vehicles in the vicinity of a given camera in a specific geographic region instead of the time dimension, and the fact that every vehicle has a \"finite\" lifetime. To bound the computational and network communication requirements for detection, re-identification, and inter-node communication, we propose novel techniques, namely, forward and backward propagation that reduces the latency for the operations and the communication overhead. STTR is a system for smart surveillance that we have built embodying these ideas. For evaluation, we develop a toolkit upon SUMO to emulate camera detections from traffic flow and adopt MaxiNet to emulate the fog computing infrastructure on Microsoft Azure.","PeriodicalId":412438,"journal":{"name":"Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122633322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Preserving Privacy and Quality of Service in Complex Event Processing through Event Reordering 通过事件重排序保护复杂事件处理中的隐私和服务质量
S. Palanisamy, Frank Dürr, M. Tariq, K. Rothermel
The Internet of Things (IoT) envisions a huge number of networked sensors connected to the internet. These sensors collect large streams of data which serve as input to wide range of IoT applications and services such as e-health, e-commerce, and automotive services. Complex Event Processing (CEP) is a powerful tool that transforms streams of raw sensor data into meaningful information required by these IoT services. Often these streams of data collected by sensors carry privacy-sensitive information about the user. Thus, protecting privacy is of paramount importance in IoT services based on CEP. In this paper we present a novel pattern-level access control mechanism for CEP based services that conceals private information while minimizing the impact on useful non-sensitive information required by the services to provide a certain quality of service (QoS). The idea is to reorder events from the event stream to conceal privacy-sensitive event patterns while preserving non-privacy sensitive event patterns to maximize QoS. We propose two approaches, namely an ILP-based approach and a graph-based approach, calculating an optimal reordering of events. Our evaluation results show that these approaches are effective in concealing private patterns without significant loss of QoS.
物联网(IoT)设想将大量联网传感器连接到互联网。这些传感器收集大量数据流,作为电子医疗、电子商务和汽车服务等广泛物联网应用和服务的输入。复杂事件处理(CEP)是一种强大的工具,可以将原始传感器数据流转换为这些物联网服务所需的有意义的信息。这些由传感器收集的数据流通常带有用户的隐私敏感信息。因此,在基于CEP的物联网服务中,保护隐私至关重要。在本文中,我们提出了一种新的基于CEP的服务模式级访问控制机制,该机制可以隐藏私有信息,同时最小化对服务所需的有用非敏感信息的影响,以提供一定的服务质量(QoS)。其思想是对事件流中的事件重新排序,以隐藏隐私敏感的事件模式,同时保留非隐私敏感的事件模式,以最大限度地提高QoS。我们提出了两种方法,即基于ilp的方法和基于图的方法,来计算事件的最优重新排序。我们的评估结果表明,这些方法在隐藏私有模式方面是有效的,并且没有明显的QoS损失。
{"title":"Preserving Privacy and Quality of Service in Complex Event Processing through Event Reordering","authors":"S. Palanisamy, Frank Dürr, M. Tariq, K. Rothermel","doi":"10.1145/3210284.3210296","DOIUrl":"https://doi.org/10.1145/3210284.3210296","url":null,"abstract":"The Internet of Things (IoT) envisions a huge number of networked sensors connected to the internet. These sensors collect large streams of data which serve as input to wide range of IoT applications and services such as e-health, e-commerce, and automotive services. Complex Event Processing (CEP) is a powerful tool that transforms streams of raw sensor data into meaningful information required by these IoT services. Often these streams of data collected by sensors carry privacy-sensitive information about the user. Thus, protecting privacy is of paramount importance in IoT services based on CEP. In this paper we present a novel pattern-level access control mechanism for CEP based services that conceals private information while minimizing the impact on useful non-sensitive information required by the services to provide a certain quality of service (QoS). The idea is to reorder events from the event stream to conceal privacy-sensitive event patterns while preserving non-privacy sensitive event patterns to maximize QoS. We propose two approaches, namely an ILP-based approach and a graph-based approach, calculating an optimal reordering of events. Our evaluation results show that these approaches are effective in concealing private patterns without significant loss of QoS.","PeriodicalId":412438,"journal":{"name":"Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121284822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
LoCoVolt: Distributed Detection of Broken Meters in Smart Grids through Stream Processing LoCoVolt:通过流处理的智能电网中破损仪表的分布式检测
Joris van Rooij, Vincenzo Gulisano, M. Papatriantafilou
Smart Grids and Advanced Metering Infrastructures are rapidly replacing traditional energy grids. The cumulative computational power of their IT devices, which can be leveraged to continuously monitor the state of the grid, is nonetheless vastly underused. This paper provides evidence of the potential of streaming analysis run at smart grid devices. We propose a structural component, which we name LoCoVolt (Local Comparison of Voltages), that is able to detect in a distributed fashion malfunctioning smart meters, which report erroneous information about the power quality. This is achieved by comparing the voltage readings of meters that, because of their proximity in the network, are expected to report readings following similar trends. Having this information can allow utilities to react promptly and thus increase timeliness, quality and safety of their services to society and, implicitly, their business value. As we show, based on our implementation on Apache Flink and the evaluation conducted with resource-constrained hardware (i.e., with capacity similar to that of hardware in smart grids) and data from a real-world network, the streaming paradigm can deliver efficient and effective monitoring tools and thus achieve the desired goals with almost no additional computational cost.
智能电网和先进的计量基础设施正在迅速取代传统的电网。他们的IT设备的累积计算能力,可以用来持续监控电网的状态,但却没有得到充分利用。本文提供了在智能电网设备上运行流分析的潜力的证据。我们提出了一种结构组件,我们将其命名为LoCoVolt(本地电压比较),它能够以分布式方式检测故障智能电表,这些电表会报告有关电能质量的错误信息。这是通过比较电表的电压读数来实现的,因为它们靠近网络,预计会报告类似趋势的读数。拥有这些信息可以使公用事业公司迅速作出反应,从而提高其对社会服务的及时性、质量和安全性,并隐含地提高其业务价值。正如我们所展示的,基于我们在Apache Flink上的实现和对资源受限硬件(即,与智能电网中的硬件容量相似)和来自现实世界网络的数据进行的评估,流范式可以提供高效和有效的监控工具,从而在几乎没有额外计算成本的情况下实现预期的目标。
{"title":"LoCoVolt: Distributed Detection of Broken Meters in Smart Grids through Stream Processing","authors":"Joris van Rooij, Vincenzo Gulisano, M. Papatriantafilou","doi":"10.1145/3210284.3210298","DOIUrl":"https://doi.org/10.1145/3210284.3210298","url":null,"abstract":"Smart Grids and Advanced Metering Infrastructures are rapidly replacing traditional energy grids. The cumulative computational power of their IT devices, which can be leveraged to continuously monitor the state of the grid, is nonetheless vastly underused. This paper provides evidence of the potential of streaming analysis run at smart grid devices. We propose a structural component, which we name LoCoVolt (Local Comparison of Voltages), that is able to detect in a distributed fashion malfunctioning smart meters, which report erroneous information about the power quality. This is achieved by comparing the voltage readings of meters that, because of their proximity in the network, are expected to report readings following similar trends. Having this information can allow utilities to react promptly and thus increase timeliness, quality and safety of their services to society and, implicitly, their business value. As we show, based on our implementation on Apache Flink and the evaluation conducted with resource-constrained hardware (i.e., with capacity similar to that of hardware in smart grids) and data from a real-world network, the streaming paradigm can deliver efficient and effective monitoring tools and thus achieve the desired goals with almost no additional computational cost.","PeriodicalId":412438,"journal":{"name":"Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130842820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Real-time Destination and ETA Prediction for Maritime Traffic 海上交通实时目的地和预计到达时间预测
Oleh Bodunov, Florian Schmidt, André Martin, Andrey Brito, C. Fetzer
In this paper, we present our approach for solving the DEBS Grand Challenge 2018. The challenge asks to provide a prediction for (i) a destination and the (ii) arrival time of ships in a streaming-fashion using Geo-spatial data in the maritime context. Novel aspects of our approach include the use of ensemble learning based on Random Forest, Gradient Boosting Decision Trees (GBDT), XGBoost Trees and Extremely Randomized Trees (ERT) in order to provide a prediction for a destination while for the arrival time, we propose the use of Feed-forward Neural Networks. In our evaluation, we were able to achieve an accuracy of 97% for the port destination classification problem and 90% (in minutes) for the ETA prediction.
在本文中,我们提出了解决DEBS大挑战2018的方法。该挑战要求使用海事环境中的地理空间数据以流方式预测(i)目的地和(ii)船舶到达时间。我们方法的新颖方面包括使用基于随机森林、梯度增强决策树(GBDT)、XGBoost树和极度随机树(ERT)的集成学习,以便为目的地提供预测,而对于到达时间,我们建议使用前馈神经网络。在我们的评估中,我们能够在港口目的地分类问题上达到97%的准确率,在ETA预测上达到90%(以分钟为单位)。
{"title":"Real-time Destination and ETA Prediction for Maritime Traffic","authors":"Oleh Bodunov, Florian Schmidt, André Martin, Andrey Brito, C. Fetzer","doi":"10.1145/3210284.3220502","DOIUrl":"https://doi.org/10.1145/3210284.3220502","url":null,"abstract":"In this paper, we present our approach for solving the DEBS Grand Challenge 2018. The challenge asks to provide a prediction for (i) a destination and the (ii) arrival time of ships in a streaming-fashion using Geo-spatial data in the maritime context. Novel aspects of our approach include the use of ensemble learning based on Random Forest, Gradient Boosting Decision Trees (GBDT), XGBoost Trees and Extremely Randomized Trees (ERT) in order to provide a prediction for a destination while for the arrival time, we propose the use of Feed-forward Neural Networks. In our evaluation, we were able to achieve an accuracy of 97% for the port destination classification problem and 90% (in minutes) for the ETA prediction.","PeriodicalId":412438,"journal":{"name":"Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132762784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Iterative Scheduling for Distributed Stream Processing Systems 分布式流处理系统的迭代调度
Leila Eskandari, J. Mair, Zhiyi Huang, D. Eyers
Nowadays data stream processing systems need to efficiently handle large volumes of data in near real-time. To achieve this, the schedulers within such systems minimise the data movement between highly communicating tasks, improving system throughput. However, finding an optimal schedule for these systems is NP-hard. In this research, we propose a heuristic scheduling algorithm which reliably and efficiently finds the highly communicating tasks by exploiting graph partitioning algorithms and a mathematical optimisation software package. We evaluate our scheduler with two popular existing schedulers R-Storm and Aniello et al.'s 'Online scheduler' using two real-world applications and show that our proposed scheduler outperforms R-Storm, increasing throughput by between 3% and 30% and Online scheduler by 20--86% as a result of finding a more efficient schedule.
目前,数据流处理系统需要在接近实时的情况下高效地处理大量数据。为了实现这一点,这些系统中的调度器将高度通信任务之间的数据移动最小化,从而提高系统吞吐量。然而,为这些系统找到最优调度是np困难的。在本研究中,我们提出了一种启发式调度算法,该算法利用图划分算法和数学优化软件包可靠有效地找到高通信任务。我们使用两个流行的现有调度器R-Storm和Aniello等人的“在线调度器”来评估我们的调度器,并使用两个真实世界的应用程序,结果表明我们提出的调度器优于R-Storm,由于找到了更有效的调度,我们的调度器将吞吐量提高了3%到30%,在线调度器提高了20%到86%。
{"title":"Iterative Scheduling for Distributed Stream Processing Systems","authors":"Leila Eskandari, J. Mair, Zhiyi Huang, D. Eyers","doi":"10.1145/3210284.3219768","DOIUrl":"https://doi.org/10.1145/3210284.3219768","url":null,"abstract":"Nowadays data stream processing systems need to efficiently handle large volumes of data in near real-time. To achieve this, the schedulers within such systems minimise the data movement between highly communicating tasks, improving system throughput. However, finding an optimal schedule for these systems is NP-hard. In this research, we propose a heuristic scheduling algorithm which reliably and efficiently finds the highly communicating tasks by exploiting graph partitioning algorithms and a mathematical optimisation software package. We evaluate our scheduler with two popular existing schedulers R-Storm and Aniello et al.'s 'Online scheduler' using two real-world applications and show that our proposed scheduler outperforms R-Storm, increasing throughput by between 3% and 30% and Online scheduler by 20--86% as a result of finding a more efficient schedule.","PeriodicalId":412438,"journal":{"name":"Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126580346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Predicting Destinations by Nearest Neighbor Search on Training Vessel Routes 训练船航线最近邻搜索预测目的地
Valentin Rosca, Emanuel Onica, Paul Diac, Ciprian Amariei
The DEBS Grand Challenge 2018 is set in the context of maritime route prediction. Vessel routes are modeled as streams of Automatic Identification System (AIS) data points selected from real-world tracking data. The challenge requires to correctly estimate the destination ports and arrival times of vessel trips, as early as possible. Our proposed solution partitions the training vessel routes by reported destination port and uses a nearest neighbor search to find the training routes that are closer to the query AIS point. Particular improvements have been included as well, such as a way to avoid changing the predicted ports frequently within one query route and automating the parameters tuning by the use of a genetic algorithm. This leads to significant improvements on the final score.
2018年DEBS挑战赛以海上航线预测为背景。船舶航线建模为从真实世界跟踪数据中选择的自动识别系统(AIS)数据点流。这一挑战要求尽可能早地正确估计目的港口和船舶到达时间。我们提出的解决方案按照报告的目的港划分训练船路线,并使用最近邻搜索来查找离查询AIS点更近的训练船路线。还包括一些特殊的改进,例如避免在一个查询路由中频繁更改预测端口的方法,以及通过使用遗传算法自动调整参数。这将导致最终分数的显著提高。
{"title":"Predicting Destinations by Nearest Neighbor Search on Training Vessel Routes","authors":"Valentin Rosca, Emanuel Onica, Paul Diac, Ciprian Amariei","doi":"10.1145/3210284.3220509","DOIUrl":"https://doi.org/10.1145/3210284.3220509","url":null,"abstract":"The DEBS Grand Challenge 2018 is set in the context of maritime route prediction. Vessel routes are modeled as streams of Automatic Identification System (AIS) data points selected from real-world tracking data. The challenge requires to correctly estimate the destination ports and arrival times of vessel trips, as early as possible. Our proposed solution partitions the training vessel routes by reported destination port and uses a nearest neighbor search to find the training routes that are closer to the query AIS point. Particular improvements have been included as well, such as a way to avoid changing the predicted ports frequently within one query route and automating the parameters tuning by the use of a genetic algorithm. This leads to significant improvements on the final score.","PeriodicalId":412438,"journal":{"name":"Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114285474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Deconstructing Blockchains: Concepts, Systems, and Insights 解构区块链:概念、系统和见解
Kaiwen Zhang, R. Vitenberg, H. Jacobsen
Popularly known for powering cryptocurrencies such as Bitcoin and Ethereum, blockchains is seen as a disruptive technology capable of impacting a wide variety of domains, ranging from finance to governance, by offering superior security, reliability, and transparency in a decentralized manner. In this tutorial presentation, we first study the original Bitcoin design, as well as Ethereum and Hyperledger, and reflect on their design from an academic perspective. We provide an overview of potential applications and associated research challenges, as well as a survey of ongoing research projects. We mention opportunities blockchain creates for event-based systems. Finally, we conclude with a walkthrough showing the process of developing a decentralized application (ĐSApp), using a popular Smart Contract language (Solidity) for the blockchain platform of Ethereum.
区块链以支持比特币和以太坊等加密货币而闻名,被视为一种颠覆性技术,能够通过以分散的方式提供卓越的安全性、可靠性和透明度,影响从金融到治理的各种领域。在本教程演示中,我们首先研究了比特币的原始设计,以及以太坊和超级账本,并从学术角度反思它们的设计。我们提供了潜在应用和相关研究挑战的概述,以及正在进行的研究项目的调查。我们提到了区块链为基于事件的系统创造的机会。最后,我们以一个演练来结束,展示了为以太坊区块链平台使用流行的智能合约语言(Solidity)开发分散应用程序(ĐSApp)的过程。
{"title":"Deconstructing Blockchains: Concepts, Systems, and Insights","authors":"Kaiwen Zhang, R. Vitenberg, H. Jacobsen","doi":"10.1145/3210284.3219502","DOIUrl":"https://doi.org/10.1145/3210284.3219502","url":null,"abstract":"Popularly known for powering cryptocurrencies such as Bitcoin and Ethereum, blockchains is seen as a disruptive technology capable of impacting a wide variety of domains, ranging from finance to governance, by offering superior security, reliability, and transparency in a decentralized manner. In this tutorial presentation, we first study the original Bitcoin design, as well as Ethereum and Hyperledger, and reflect on their design from an academic perspective. We provide an overview of potential applications and associated research challenges, as well as a survey of ongoing research projects. We mention opportunities blockchain creates for event-based systems. Finally, we conclude with a walkthrough showing the process of developing a decentralized application (ĐSApp), using a popular Smart Contract language (Solidity) for the blockchain platform of Ethereum.","PeriodicalId":412438,"journal":{"name":"Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133373908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Mitigating Network Side Channel Leakage for Stream Processing Systems in Trusted Execution Environments 可信执行环境下流处理系统的网络侧信道泄漏缓解
Muhammad Bilal, Hassan Alsibyani, M. Canini
A crucial concern regarding cloud computing is the confidentiality of sensitive data being processed in the cloud. Trusted Execution Environments (TEEs), such as Intel Software Guard extensions (SGX), allow applications to run securely on an untrusted platform. However, using TEEs alone for stream processing is not enough to ensure privacy as network communication patterns may leak information about the data. This paper introduces two techniques -- anycast and multicast --for mitigating leakage at inter-stage communications in streaming applications according to a user-selected mitigation level. These techniques aim to achieve network data obliviousness, i.e., communication patterns should not depend on the data. We implement these techniques in an SGX-based stream processing system. We evaluate the latency and throughput overheads, and the data obliviousness using three benchmark applications. The results show that anycast scales better with input load and mitigation level, and provides better data obliviousness than multicast.
关于云计算的一个关键问题是在云中处理的敏感数据的保密性。受信任的执行环境(tee),如Intel Software Guard扩展(SGX),允许应用程序在不受信任的平台上安全地运行。然而,仅使用tee进行流处理不足以确保隐私,因为网络通信模式可能会泄露有关数据的信息。本文介绍了两种技术——任播和多播——用于根据用户选择的缓解级别减轻流应用程序中级间通信中的泄漏。这些技术旨在实现网络数据遗忘,即通信模式不应依赖于数据。我们在一个基于sgx的流处理系统中实现了这些技术。我们使用三个基准测试应用程序来评估延迟和吞吐量开销以及数据遗忘。结果表明,与组播相比,任意播可以更好地扩展输入负载和缓解级别,并提供更好的数据遗忘。
{"title":"Mitigating Network Side Channel Leakage for Stream Processing Systems in Trusted Execution Environments","authors":"Muhammad Bilal, Hassan Alsibyani, M. Canini","doi":"10.1145/3210284.3210286","DOIUrl":"https://doi.org/10.1145/3210284.3210286","url":null,"abstract":"A crucial concern regarding cloud computing is the confidentiality of sensitive data being processed in the cloud. Trusted Execution Environments (TEEs), such as Intel Software Guard extensions (SGX), allow applications to run securely on an untrusted platform. However, using TEEs alone for stream processing is not enough to ensure privacy as network communication patterns may leak information about the data. This paper introduces two techniques -- anycast and multicast --for mitigating leakage at inter-stage communications in streaming applications according to a user-selected mitigation level. These techniques aim to achieve network data obliviousness, i.e., communication patterns should not depend on the data. We implement these techniques in an SGX-based stream processing system. We evaluate the latency and throughput overheads, and the data obliviousness using three benchmark applications. The results show that anycast scales better with input load and mitigation level, and provides better data obliviousness than multicast.","PeriodicalId":412438,"journal":{"name":"Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130321585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Proceedings of the 12th ACM International Conference on Distributed and Event-based Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1