首页 > 最新文献

2012 IEEE 32nd International Conference on Distributed Computing Systems最新文献

英文 中文
Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks 机会移动网络中缓存新鲜度的分布式维护
Pub Date : 2012-06-18 DOI: 10.1109/ICDCS.2012.63
Wei Gao, G. Cao, M. Srivatsa, A. Iyengar
Opportunistic mobile networks consist of personal mobile devices which are intermittently connected with each other. Data access can be provided to these devices via cooperative caching without support from the cellular network infrastructure, but only limited research has been done on maintaining the freshness of cached data which may be refreshed periodically and is subject to expiration. In this paper, we propose a scheme to efficiently maintain cache freshness. Our basic idea is to let each caching node be only responsible for refreshing a specific set of caching nodes, so as to maintain cache freshness in a distributed and hierarchical manner. Probabilistic replication methods are also proposed to analytically ensure that the freshness requirements of cached data are satisfied. Extensive trace driven simulations show that our scheme significantly improves cache freshness, and hence ensures the validity of data access provided to mobile users.
机会式移动网络由个人移动设备组成,这些设备彼此间歇连接。在没有蜂窝网络基础设施支持的情况下,可以通过协作缓存向这些设备提供数据访问,但对于如何保持缓存数据的新鲜度进行的研究有限,缓存数据可能会定期刷新,并且可能会过期。在本文中,我们提出了一种有效保持缓存新鲜度的方案。我们的基本思想是让每个缓存节点只负责刷新一组特定的缓存节点,从而以分布式和分层的方式保持缓存的新鲜度。本文还提出了概率复制方法,以分析地保证缓存数据的新鲜度要求得到满足。大量的跟踪驱动仿真表明,我们的方案显著提高了缓存新鲜度,从而确保了提供给移动用户的数据访问的有效性。
{"title":"Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks","authors":"Wei Gao, G. Cao, M. Srivatsa, A. Iyengar","doi":"10.1109/ICDCS.2012.63","DOIUrl":"https://doi.org/10.1109/ICDCS.2012.63","url":null,"abstract":"Opportunistic mobile networks consist of personal mobile devices which are intermittently connected with each other. Data access can be provided to these devices via cooperative caching without support from the cellular network infrastructure, but only limited research has been done on maintaining the freshness of cached data which may be refreshed periodically and is subject to expiration. In this paper, we propose a scheme to efficiently maintain cache freshness. Our basic idea is to let each caching node be only responsible for refreshing a specific set of caching nodes, so as to maintain cache freshness in a distributed and hierarchical manner. Probabilistic replication methods are also proposed to analytically ensure that the freshness requirements of cached data are satisfied. Extensive trace driven simulations show that our scheme significantly improves cache freshness, and hence ensures the validity of data access provided to mobile users.","PeriodicalId":6300,"journal":{"name":"2012 IEEE 32nd International Conference on Distributed Computing Systems","volume":"13 1","pages":"132-141"},"PeriodicalIF":0.0,"publicationDate":"2012-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86046702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Optimal Recovery from Large-Scale Failures in IP Networks IP网络大规模故障的最佳恢复
Pub Date : 2012-06-18 DOI: 10.1109/ICDCS.2012.47
Qiang Zheng, G. Cao, T. L. Porta, A. Swami
Quickly recovering IP networks from failures is critical to enhancing Internet robustness and availability. Due to their serious impact on network routing, large-scale failures have received increasing attention in recent years. We propose an approach called Reactive Two-phase Rerouting (RTR) for intra-domain routing to quickly recover from large-scale failures with the shortest recovery paths. To recover a failed routing path, RTR first forwards packets around the failure area to collect information on failures. Then, in the second phase, RTR calculates a new shortest path and forwards packets along it through source routing. RTR can deal with large-scale failures associated with areas of any shape and location, and is free of permanent loops. For any failure area, the recovery paths provided by RTR are guaranteed to be the shortest. Extensive simulations based on ISP topologies show that RTR can find the shortest recovery paths for more than 98.6% of failed routing paths with reachable destinations. Compared with prior works, RTR achieves better performance for recoverable failed routing paths and uses much less network resources for irrecoverable failed routing paths.
快速从故障中恢复IP网络对于增强Internet健壮性和可用性至关重要。由于大规模故障对网络路由的严重影响,近年来受到越来越多的关注。我们提出了一种称为响应式两相重路由(RTR)的方法,用于域内路由以最短的恢复路径从大规模故障中快速恢复。为了恢复故障的路由路径,RTR首先在故障区域周围转发报文,收集故障信息。然后,在第二阶段,RTR计算一条新的最短路径,并通过源路由沿着这条路径转发数据包。RTR可以处理与任何形状和位置的区域相关的大规模故障,并且没有永久回路。对于任何故障区域,RTR提供的恢复路径都保证最短。基于ISP拓扑的大量仿真结果表明,对于98.6%以上具有可达目的地的故障路由路径,RTR能够找到最短的恢复路径。与以往的工作相比,RTR在可恢复的故障路由路径上取得了更好的性能,并且在不可恢复的故障路由路径上使用了更少的网络资源。
{"title":"Optimal Recovery from Large-Scale Failures in IP Networks","authors":"Qiang Zheng, G. Cao, T. L. Porta, A. Swami","doi":"10.1109/ICDCS.2012.47","DOIUrl":"https://doi.org/10.1109/ICDCS.2012.47","url":null,"abstract":"Quickly recovering IP networks from failures is critical to enhancing Internet robustness and availability. Due to their serious impact on network routing, large-scale failures have received increasing attention in recent years. We propose an approach called Reactive Two-phase Rerouting (RTR) for intra-domain routing to quickly recover from large-scale failures with the shortest recovery paths. To recover a failed routing path, RTR first forwards packets around the failure area to collect information on failures. Then, in the second phase, RTR calculates a new shortest path and forwards packets along it through source routing. RTR can deal with large-scale failures associated with areas of any shape and location, and is free of permanent loops. For any failure area, the recovery paths provided by RTR are guaranteed to be the shortest. Extensive simulations based on ISP topologies show that RTR can find the shortest recovery paths for more than 98.6% of failed routing paths with reachable destinations. Compared with prior works, RTR achieves better performance for recoverable failed routing paths and uses much less network resources for irrecoverable failed routing paths.","PeriodicalId":6300,"journal":{"name":"2012 IEEE 32nd International Conference on Distributed Computing Systems","volume":"10 1","pages":"295-304"},"PeriodicalIF":0.0,"publicationDate":"2012-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82563197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
SybilRes: A Sybil-resilient Flow-Based Decentralized Reputation Mechanism SybilRes:基于sybilr弹性流的去中心化声誉机制
Pub Date : 2012-06-18 DOI: 10.1109/ICDCS.2012.28
Rahim Delaviz, N. Andrade, J. Pouwelse, D. Epema
Due to the possibility of cheap identity creation, decentralized online reputation mechanisms are susceptible to sybil attacks. Barter Cast is a reputation mechanism used in the Internet-deployed Tribler file-sharing client. In this paper we study the opportunities for sybil attacks in Barter Cast and we devise a method for making Barter Cast sybil resilient, which is incorporated in a protocol called Sybil Res. Like in Barter Cast, in Sybil Res each peer maintains a local subjective weighted directed graph reflecting data transfer actions in Tribler, from which it computes the reputations of other peers using a flow based algorithm taking the edge weights as flows. In Sybil Res, after an upload action, the uploading peer discounts the weights of the edges on the paths from the down loader to itself. As a consequence, due to the way reputations are computed, the reputation of a peer performing a sybil attack decreases fast. To mitigate the negative impact of edge weight discounting on the reputations of honest peers, after a download action, the downloading peer increases the weights of the edges on the paths from the up loader to itself. We demonstrate that Sybil Res is effective in practice by means of trace-driven simulations using data collected from the Tribler network. The results show that Sybil Res effectively marginalizes attackers while having a minimal effect on the reputations of honest peers.
由于廉价的身份创建的可能性,分散的在线声誉机制很容易受到sybil攻击。物物交换是internet部署的Tribler文件共享客户端中使用的一种信誉机制。在本文中,我们研究了易货交换中sybil攻击的机会,并设计了一种使易货交换sybil具有弹性的方法,该方法被纳入一个名为sybil Res的协议中。与易货交换一样,在sybil Res中,每个对等点维护一个本地主观加权有向图,反映Tribler中的数据传输动作,它使用基于流的算法计算其他对等点的声誉,将边缘权重作为流。在Sybil Res中,上传操作完成后,上传节点会对从downloader到自己的路径上的边的权值进行折扣。因此,由于声誉的计算方式,执行符号攻击的同行的声誉会迅速下降。为了减轻边权折扣对诚实对等体声誉的负面影响,在下载操作之后,下载对等体增加从up加载器到自己的路径上的边权。我们通过使用从Tribler网络收集的数据进行跟踪驱动模拟,证明了Sybil Res在实践中是有效的。结果表明,Sybil Res有效地边缘化了攻击者,而对诚实同伴的声誉影响最小。
{"title":"SybilRes: A Sybil-resilient Flow-Based Decentralized Reputation Mechanism","authors":"Rahim Delaviz, N. Andrade, J. Pouwelse, D. Epema","doi":"10.1109/ICDCS.2012.28","DOIUrl":"https://doi.org/10.1109/ICDCS.2012.28","url":null,"abstract":"Due to the possibility of cheap identity creation, decentralized online reputation mechanisms are susceptible to sybil attacks. Barter Cast is a reputation mechanism used in the Internet-deployed Tribler file-sharing client. In this paper we study the opportunities for sybil attacks in Barter Cast and we devise a method for making Barter Cast sybil resilient, which is incorporated in a protocol called Sybil Res. Like in Barter Cast, in Sybil Res each peer maintains a local subjective weighted directed graph reflecting data transfer actions in Tribler, from which it computes the reputations of other peers using a flow based algorithm taking the edge weights as flows. In Sybil Res, after an upload action, the uploading peer discounts the weights of the edges on the paths from the down loader to itself. As a consequence, due to the way reputations are computed, the reputation of a peer performing a sybil attack decreases fast. To mitigate the negative impact of edge weight discounting on the reputations of honest peers, after a download action, the downloading peer increases the weights of the edges on the paths from the up loader to itself. We demonstrate that Sybil Res is effective in practice by means of trace-driven simulations using data collected from the Tribler network. The results show that Sybil Res effectively marginalizes attackers while having a minimal effect on the reputations of honest peers.","PeriodicalId":6300,"journal":{"name":"2012 IEEE 32nd International Conference on Distributed Computing Systems","volume":"60 1","pages":"203-213"},"PeriodicalIF":0.0,"publicationDate":"2012-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86065059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Publiy+: A Peer-Assisted Publish/Subscribe Service for Timely Dissemination of Bulk Content 发布+:一种同行协助的发布/订阅服务,用于及时传播大量内容
Pub Date : 2012-06-18 DOI: 10.1109/ICDCS.2012.62
R. Kazemzadeh, H. Jacobsen
Publish/Subscribe (P/S) systems and file sharing applications traditionally share the common goal of disseminating data among large populations of users. Despite this similarity, the former focuses on timely dissemination of small-sized notification messages, while the latter presumes larger types of bulk content with less emphasis on the time needed between release and delivery of data. In this paper, we develop a peer-assisted content dissemination mechanism to bridge this gap by adopting the P/S model. We propose a hybrid two-layer architecture in which P/S brokers act as coordinators and guide their clients with interest in similar content to engage in direct exchange of data blocks in a peer-to-peer and cooperative fashion. Furthermore, we use network coding in order to facilitate data exchange among clients. Our peer-assisted scheme offloads the burden of disseminating huge volumes of data from P/S brokers to subscribers themselves. As an added advantage of our approach, brokers employ strategies that help shape traffic flows in multi-domain network settings. Finally, we have implemented our approach and carried out extensive large-scale experimental evaluation on a cluster with aggregate data transfers of up to 1 TB and involving up to 1000 subscribers. Our results demonstrate good scalability and faster content delivery compared to file sharing protocols such as BitTorrent.
发布/订阅(P/S)系统和文件共享应用程序传统上都有一个共同的目标,即在大量用户中传播数据。尽管有这种相似之处,前者侧重于及时传播小型通知消息,而后者则假定更大类型的批量内容,而不太强调发布和交付数据之间所需的时间。在本文中,我们开发了一个对等辅助的内容传播机制,通过采用P/S模型来弥补这一差距。我们提出了一种混合的两层架构,其中P/S代理作为协调者,引导对类似内容感兴趣的客户以点对点和合作的方式直接交换数据块。此外,我们使用网络编码,以方便客户端之间的数据交换。我们的对等辅助方案减轻了从P/S经纪人向订户自己传播大量数据的负担。作为我们方法的一个额外优势,代理采用有助于在多域网络设置中塑造流量的策略。最后,我们已经实施了我们的方法,并在一个集群上进行了广泛的大规模实验评估,该集群的总数据传输量高达1tb,涉及多达1000个订阅者。我们的结果表明,与BitTorrent等文件共享协议相比,具有良好的可扩展性和更快的内容交付速度。
{"title":"Publiy+: A Peer-Assisted Publish/Subscribe Service for Timely Dissemination of Bulk Content","authors":"R. Kazemzadeh, H. Jacobsen","doi":"10.1109/ICDCS.2012.62","DOIUrl":"https://doi.org/10.1109/ICDCS.2012.62","url":null,"abstract":"Publish/Subscribe (P/S) systems and file sharing applications traditionally share the common goal of disseminating data among large populations of users. Despite this similarity, the former focuses on timely dissemination of small-sized notification messages, while the latter presumes larger types of bulk content with less emphasis on the time needed between release and delivery of data. In this paper, we develop a peer-assisted content dissemination mechanism to bridge this gap by adopting the P/S model. We propose a hybrid two-layer architecture in which P/S brokers act as coordinators and guide their clients with interest in similar content to engage in direct exchange of data blocks in a peer-to-peer and cooperative fashion. Furthermore, we use network coding in order to facilitate data exchange among clients. Our peer-assisted scheme offloads the burden of disseminating huge volumes of data from P/S brokers to subscribers themselves. As an added advantage of our approach, brokers employ strategies that help shape traffic flows in multi-domain network settings. Finally, we have implemented our approach and carried out extensive large-scale experimental evaluation on a cluster with aggregate data transfers of up to 1 TB and involving up to 1000 subscribers. Our results demonstrate good scalability and faster content delivery compared to file sharing protocols such as BitTorrent.","PeriodicalId":6300,"journal":{"name":"2012 IEEE 32nd International Conference on Distributed Computing Systems","volume":"8 1","pages":"345-354"},"PeriodicalIF":0.0,"publicationDate":"2012-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91530295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
NEAT: Road Network Aware Trajectory Clustering 道路网络感知轨迹聚类
Pub Date : 2012-06-18 DOI: 10.1109/ICDCS.2012.31
Binh Han, Ling Liu, E. Omiecinski
Mining trajectory data has been gaining significant interest in recent years. However, existing approaches to trajectory clustering are mainly based on density and Euclidean distance measures. We argue that when the utility of spatial clustering of mobile object trajectories is targeted at road network aware location based applications, density and Euclidean distance are no longer the effective measures. This is because traffic flows in a road network and the flow-based density characterization become important factors for finding interesting trajectory clusters of mobile objects travelling in road networks. In this paper, we propose NEAT-a road network aware approach for fast and effective clustering of spatial trajectories of mobile objects travelling in road networks. Our method takes into account the physical constraints of the road network, the network proximity and the traffic flows among consecutive road segments to organize trajectories into spatial clusters. The clusters discovered by NEAT are groups of sub-trajectories which describe both dense and highly continuous traffic flows of mobile objects. We perform extensive experiments with mobility traces generated using different scales of real road network maps. Our experimental results demonstrate that the NEAT approach is highly accurate and runs orders of magnitude faster than existing density-based trajectory clustering approaches.
近年来,采矿轨迹数据引起了人们极大的兴趣。然而,现有的轨迹聚类方法主要基于密度和欧氏距离度量。本文认为,当移动目标轨迹空间聚类应用于基于道路网络的位置感知应用时,密度和欧氏距离不再是有效的度量。这是因为路网中的交通流和基于流的密度表征成为寻找路网中移动物体有趣轨迹簇的重要因素。在本文中,我们提出了一种道路网络感知方法neat,用于快速有效地聚类道路网络中移动物体的空间轨迹。我们的方法考虑了道路网络的物理约束、网络邻近性和连续路段之间的交通流,将轨迹组织成空间集群。NEAT发现的簇是一组描述移动物体密集和高度连续交通流的子轨迹。我们对使用不同比例尺的真实道路网络地图生成的移动轨迹进行了广泛的实验。我们的实验结果表明,NEAT方法是高度精确的,运行速度比现有的基于密度的轨迹聚类方法快几个数量级。
{"title":"NEAT: Road Network Aware Trajectory Clustering","authors":"Binh Han, Ling Liu, E. Omiecinski","doi":"10.1109/ICDCS.2012.31","DOIUrl":"https://doi.org/10.1109/ICDCS.2012.31","url":null,"abstract":"Mining trajectory data has been gaining significant interest in recent years. However, existing approaches to trajectory clustering are mainly based on density and Euclidean distance measures. We argue that when the utility of spatial clustering of mobile object trajectories is targeted at road network aware location based applications, density and Euclidean distance are no longer the effective measures. This is because traffic flows in a road network and the flow-based density characterization become important factors for finding interesting trajectory clusters of mobile objects travelling in road networks. In this paper, we propose NEAT-a road network aware approach for fast and effective clustering of spatial trajectories of mobile objects travelling in road networks. Our method takes into account the physical constraints of the road network, the network proximity and the traffic flows among consecutive road segments to organize trajectories into spatial clusters. The clusters discovered by NEAT are groups of sub-trajectories which describe both dense and highly continuous traffic flows of mobile objects. We perform extensive experiments with mobility traces generated using different scales of real road network maps. Our experimental results demonstrate that the NEAT approach is highly accurate and runs orders of magnitude faster than existing density-based trajectory clustering approaches.","PeriodicalId":6300,"journal":{"name":"2012 IEEE 32nd International Conference on Distributed Computing Systems","volume":"10 1","pages":"142-151"},"PeriodicalIF":0.0,"publicationDate":"2012-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90220444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
Game Theoretic Analysis of Distributed Spectrum Sharing with Database 分布式频谱与数据库共享的博弈论分析
Pub Date : 2012-06-18 DOI: 10.1109/ICDCS.2012.37
Xu Chen, Jianwei Huang
According to FCC's ruling for white-space spectrum access, white-space devices are required to query a database to determine the spectrum availability. In this paper, we adopt a game theoretic approach for the database-assisted white-space access point (AP) network design. We first model the channel selection problem among the APs as a distributed AP channel selection game, and design a distributed AP channel selection algorithm that achieves a Nash equilibrium. We then propose a state-based game formulation for the distributed AP association problem of the secondary users by taking the cost of mobility into account. We show that the state-based distributed AP association game has the finite improvement property, and design a distributed AP association algorithm can converge to a state-based Nash equilibrium. Numerical results show that the algorithm is robust to the perturbation by secondary users' dynamical leaving and entering the system.
根据FCC对空白频段接入的规定,空白频段设备需要查询数据库来确定频谱的可用性。本文采用博弈论的方法对数据库辅助白色空间接入点(AP)网络进行设计。首先将AP之间的信道选择问题建模为一个分布式AP信道选择博弈,并设计了一个实现纳什均衡的分布式AP信道选择算法。然后,通过考虑移动成本,我们提出了一个基于状态的二级用户分布式AP关联问题的博弈公式。证明了基于状态的分布式AP关联博弈具有有限改进性质,并设计了一种能够收敛到基于状态的纳什均衡的分布式AP关联算法。数值结果表明,该算法对二次用户动态离开和进入系统的扰动具有较强的鲁棒性。
{"title":"Game Theoretic Analysis of Distributed Spectrum Sharing with Database","authors":"Xu Chen, Jianwei Huang","doi":"10.1109/ICDCS.2012.37","DOIUrl":"https://doi.org/10.1109/ICDCS.2012.37","url":null,"abstract":"According to FCC's ruling for white-space spectrum access, white-space devices are required to query a database to determine the spectrum availability. In this paper, we adopt a game theoretic approach for the database-assisted white-space access point (AP) network design. We first model the channel selection problem among the APs as a distributed AP channel selection game, and design a distributed AP channel selection algorithm that achieves a Nash equilibrium. We then propose a state-based game formulation for the distributed AP association problem of the secondary users by taking the cost of mobility into account. We show that the state-based distributed AP association game has the finite improvement property, and design a distributed AP association algorithm can converge to a state-based Nash equilibrium. Numerical results show that the algorithm is robust to the perturbation by secondary users' dynamical leaving and entering the system.","PeriodicalId":6300,"journal":{"name":"2012 IEEE 32nd International Conference on Distributed Computing Systems","volume":"195 2 1","pages":"255-264"},"PeriodicalIF":0.0,"publicationDate":"2012-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78328464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Enforcing High-Performance Operation of Multi-hop Wireless Networks with MIMO Relays 利用MIMO中继实现多跳无线网络的高性能运行
Pub Date : 2012-06-18 DOI: 10.1109/ICDCS.2012.60
Shan Chu, Xin Wang, Minming Li
In multi-hop wireless networks where links are prone to be broken or degraded, it is important to guarantee the network connectivity as well as satisfy the performance requirements. Observing the promising features of Multiple-Input Multiple-Output (MIMO) techniques for improving the transmission capacity and reliability, in this paper, we make the very first attempt to deploy MIMO nodes as relays to assist weak links in wireless networks, with the aim of reducing the number of relay nodes and providing performance provisioning. We identify the specific constraints of MIMO relay nodes for assisting weak links, and take advantage of the MIMO ability to flexibly select among different transmission strategies. The constrains and flexibility, however, make the MIMO deployment problem different from conventional single-antenna deployment schemes and much more challenging. Based on the constraints, we formulate the MIMO relay deployment problem, and provide a polynomial-time approximation scheme (PTAS) algorithm, as well as a distributed heuristic algorithm. The performance of the proposed algorithms is evaluated through simulations and demonstrated to be very effective.
在链路容易中断或降级的多跳无线网络中,在保证网络连通性的同时满足性能要求是非常重要的。观察到多输入多输出(MIMO)技术在提高传输容量和可靠性方面的前景,本文首次尝试将MIMO节点作为中继来辅助无线网络中的弱链路,目的是减少中继节点的数量并提供性能保障。我们确定了MIMO中继节点辅助弱链路的具体约束条件,并利用MIMO的能力灵活选择不同的传输策略。然而,约束和灵活性使得MIMO部署问题不同于传统的单天线部署方案,更具挑战性。在此基础上,提出了MIMO中继部署问题,并给出了多项式时间逼近算法(PTAS)和分布式启发式算法。通过仿真对所提算法的性能进行了评价,并证明了算法的有效性。
{"title":"Enforcing High-Performance Operation of Multi-hop Wireless Networks with MIMO Relays","authors":"Shan Chu, Xin Wang, Minming Li","doi":"10.1109/ICDCS.2012.60","DOIUrl":"https://doi.org/10.1109/ICDCS.2012.60","url":null,"abstract":"In multi-hop wireless networks where links are prone to be broken or degraded, it is important to guarantee the network connectivity as well as satisfy the performance requirements. Observing the promising features of Multiple-Input Multiple-Output (MIMO) techniques for improving the transmission capacity and reliability, in this paper, we make the very first attempt to deploy MIMO nodes as relays to assist weak links in wireless networks, with the aim of reducing the number of relay nodes and providing performance provisioning. We identify the specific constraints of MIMO relay nodes for assisting weak links, and take advantage of the MIMO ability to flexibly select among different transmission strategies. The constrains and flexibility, however, make the MIMO deployment problem different from conventional single-antenna deployment schemes and much more challenging. Based on the constraints, we formulate the MIMO relay deployment problem, and provide a polynomial-time approximation scheme (PTAS) algorithm, as well as a distributed heuristic algorithm. The performance of the proposed algorithms is evaluated through simulations and demonstrated to be very effective.","PeriodicalId":6300,"journal":{"name":"2012 IEEE 32nd International Conference on Distributed Computing Systems","volume":"1 1","pages":"376-385"},"PeriodicalIF":0.0,"publicationDate":"2012-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76259878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Achieving Full View Coverage with Randomly-Deployed Heterogeneous Camera Sensors 利用随机部署的异构相机传感器实现全视野覆盖
Pub Date : 2012-06-18 DOI: 10.1109/ICDCS.2012.9
Yibo Wu, Xinbing Wang
A brand-new concept about the coverage problem of camera sensor networks, full view coverage, has been proposed recently to judge whether an object's face is guaranteed to be captured. It is specially significant for camera networks since image shot at the frontal viewpoint considerably increases the possibility to recognize the object. In this paper, we investigate the necessary and sufficient conditions to achieve full view coverage under two random deployment schemes, uniform deployment and Poisson deployment. In uniform deployment, we define a centralized parameter - critical sensing area (CSA) - to evaluate the total requirements to reach symptotic full view coverage for all heterogeneous sensors in the network. In Poisson deployment, we develop the probability for a point to be full view covered. Our results reveal that under uniform deployment, whether full view coverage is achieved depends largely on the area of the sensing region, rather than its shape.
关于相机传感器网络的覆盖问题,最近提出了一个全新的概念——全视场覆盖,用以判断是否保证捕捉到目标的脸部。这对于摄像机网络尤其重要,因为在正面视点拍摄的图像大大增加了识别物体的可能性。本文研究了均匀部署和泊松部署两种随机部署方案下实现全视场覆盖的充分必要条件。在统一部署中,我们定义了一个集中参数-关键感知区域(CSA) -来评估网络中所有异构传感器达到症状性全视图覆盖的总需求。在泊松部署中,我们开发了一个点被完全覆盖的概率。我们的研究结果表明,在均匀部署下,是否实现全视野覆盖主要取决于感测区域的面积,而不是其形状。
{"title":"Achieving Full View Coverage with Randomly-Deployed Heterogeneous Camera Sensors","authors":"Yibo Wu, Xinbing Wang","doi":"10.1109/ICDCS.2012.9","DOIUrl":"https://doi.org/10.1109/ICDCS.2012.9","url":null,"abstract":"A brand-new concept about the coverage problem of camera sensor networks, full view coverage, has been proposed recently to judge whether an object's face is guaranteed to be captured. It is specially significant for camera networks since image shot at the frontal viewpoint considerably increases the possibility to recognize the object. In this paper, we investigate the necessary and sufficient conditions to achieve full view coverage under two random deployment schemes, uniform deployment and Poisson deployment. In uniform deployment, we define a centralized parameter - critical sensing area (CSA) - to evaluate the total requirements to reach symptotic full view coverage for all heterogeneous sensors in the network. In Poisson deployment, we develop the probability for a point to be full view covered. Our results reveal that under uniform deployment, whether full view coverage is achieved depends largely on the area of the sensing region, rather than its shape.","PeriodicalId":6300,"journal":{"name":"2012 IEEE 32nd International Conference on Distributed Computing Systems","volume":"82 1","pages":"556-565"},"PeriodicalIF":0.0,"publicationDate":"2012-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72952268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
DMap: A Shared Hosting Scheme for Dynamic Identifier to Locator Mappings in the Global Internet DMap:全球网际网路中动态标识符到定位器映射的共享托管方案
Pub Date : 2012-06-18 DOI: 10.1109/ICDCS.2012.50
Tam N. Vu, A. Baid, Yanyong Zhang, Thu D. Nguyen, J. Fukuyama, R. Martin, D. Raychaudhuri
This paper presents the design and evaluation of a novel distributed shared hosting approach, DMap, for managing dynamic identifier to locator mappings in the global Internet. DMap is the foundation for a fast global name resolution service necessary to enable emerging Internet services such as seamless mobility support, content delivery and cloud computing. Our approach distributes identifier to locator mappings among Autonomous Systems (ASs) by directly applying K>;1 consistent hash functions on the identifier to produce network addresses of the AS gateway routers at which the mapping will be stored. This direct mapping technique leverages the reachability information of the underlying routing mechanism that is already available at the network layer, and achieves low lookup latencies through a single overlay hop without additional maintenance overheads. The proposed DMap technique is described in detail and specific design problems such as address space fragmentation, reducing latency through replication, taking advantage of spatial locality, as well as coping with inconsistent entries are addressed. Evaluation results are presented from a large-scale discrete event simulation of the Internet with ~26,000 ASs using real-world traffic traces from the DIMES repository. The results show that the proposed method evenly balances storage load across the global network while achieving lookup latencies with a mean value of ~50 ms and 95th percentile value of ~100 ms, considered adequate for support of dynamic mobility across the global Internet.
本文提出了一种新的分布式共享主机方法DMap,用于管理全球互联网中动态标识符到定位器映射的设计和评估。DMap是快速全球域名解析服务的基础,这是实现无缝移动支持、内容交付和云计算等新兴互联网服务所必需的。我们的方法是将标识符分配到自治系统(AS)之间的定位器映射,方法是直接在标识符上应用K>;1一致的哈希函数,生成将存储映射的AS网关路由器的网络地址。这种直接映射技术利用了在网络层已经可用的底层路由机制的可达性信息,并通过单个覆盖跳实现低查找延迟,而无需额外的维护开销。详细描述了所提出的DMap技术,并解决了具体的设计问题,如地址空间碎片化、通过复制减少延迟、利用空间局域性以及处理不一致的条目。评估结果来自互联网的大规模离散事件模拟,约有26,000个as使用DIMES存储库中的真实流量痕迹。结果表明,该方法均衡了全局网络上的存储负载,同时实现了平均约50 ms和第95百分位值约100 ms的查找延迟,足以支持全局互联网的动态移动。
{"title":"DMap: A Shared Hosting Scheme for Dynamic Identifier to Locator Mappings in the Global Internet","authors":"Tam N. Vu, A. Baid, Yanyong Zhang, Thu D. Nguyen, J. Fukuyama, R. Martin, D. Raychaudhuri","doi":"10.1109/ICDCS.2012.50","DOIUrl":"https://doi.org/10.1109/ICDCS.2012.50","url":null,"abstract":"This paper presents the design and evaluation of a novel distributed shared hosting approach, DMap, for managing dynamic identifier to locator mappings in the global Internet. DMap is the foundation for a fast global name resolution service necessary to enable emerging Internet services such as seamless mobility support, content delivery and cloud computing. Our approach distributes identifier to locator mappings among Autonomous Systems (ASs) by directly applying K>;1 consistent hash functions on the identifier to produce network addresses of the AS gateway routers at which the mapping will be stored. This direct mapping technique leverages the reachability information of the underlying routing mechanism that is already available at the network layer, and achieves low lookup latencies through a single overlay hop without additional maintenance overheads. The proposed DMap technique is described in detail and specific design problems such as address space fragmentation, reducing latency through replication, taking advantage of spatial locality, as well as coping with inconsistent entries are addressed. Evaluation results are presented from a large-scale discrete event simulation of the Internet with ~26,000 ASs using real-world traffic traces from the DIMES repository. The results show that the proposed method evenly balances storage load across the global network while achieving lookup latencies with a mean value of ~50 ms and 95th percentile value of ~100 ms, considered adequate for support of dynamic mobility across the global Internet.","PeriodicalId":6300,"journal":{"name":"2012 IEEE 32nd International Conference on Distributed Computing Systems","volume":"156 1","pages":"698-707"},"PeriodicalIF":0.0,"publicationDate":"2012-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86320540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 128
Skeleton Extraction from Incomplete Boundaries in Sensor Networks Based on Distance Transform 基于距离变换的传感器网络不完全边界骨架提取
Pub Date : 2012-06-18 DOI: 10.1109/ICDCS.2012.11
Wenping Liu, Hongbo Jiang, X. Bai, Guang Tan, Chonggang Wang, Wenyu Liu, Kechao Cai
We study the problem of skeleton extraction for large-scale sensor networks using only connectivity information. Existing solutions for this problem heavily depend on an algorithm that can accurately detect network boundaries. This dependence may seriously affect the effectiveness of skeleton extraction. For example, in low density networks, boundary detection algorithms normally do not work well, potentially leading to an incorrect skeleton being generated. This paper proposes a novel approach, named DIST, to skeleton extraction from incomplete boundaries using the idea of distance transform, a concept in the computer graphics area. The main contribution is a distributed and low-cost algorithm that produces accurate network skeletons without requiring that the boundaries be complete or tight. The algorithm first establishes the network's distance transform - the hop distance of each node to the network's boundaries. Based on this, some critical skeleton nodes are identified. Next, a set of skeleton arcs are generated by controlled flooding; connecting these skeleton arcs then gives us a coarse skeleton. The algorithm finally refines the coarse skeleton by building shortest path trees, followed by a prune phase. The obtained skeletons are robust to boundary noise and shape variations.
研究了仅使用连接信息的大型传感器网络的骨架提取问题。该问题的现有解决方案严重依赖于能够准确检测网络边界的算法。这种依赖性可能严重影响骨提取的效果。例如,在低密度网络中,边界检测算法通常不能很好地工作,可能导致生成不正确的骨架。本文利用计算机图形学领域中的距离变换思想,提出了一种从不完全边界提取骨架的新方法DIST。其主要贡献是一种分布式和低成本的算法,可以在不要求边界完整或紧密的情况下生成准确的网络骨架。该算法首先建立网络的距离变换,即每个节点到网络边界的跳距。在此基础上,确定了一些关键的骨架节点。其次,通过控制洪水产生一组骨架弧;将这些骨架弧线连接起来,我们就得到了一个粗略的骨架。该算法最后通过构建最短路径树来细化粗骨架,然后进行修剪阶段。所得骨架对边界噪声和形状变化具有较强的鲁棒性。
{"title":"Skeleton Extraction from Incomplete Boundaries in Sensor Networks Based on Distance Transform","authors":"Wenping Liu, Hongbo Jiang, X. Bai, Guang Tan, Chonggang Wang, Wenyu Liu, Kechao Cai","doi":"10.1109/ICDCS.2012.11","DOIUrl":"https://doi.org/10.1109/ICDCS.2012.11","url":null,"abstract":"We study the problem of skeleton extraction for large-scale sensor networks using only connectivity information. Existing solutions for this problem heavily depend on an algorithm that can accurately detect network boundaries. This dependence may seriously affect the effectiveness of skeleton extraction. For example, in low density networks, boundary detection algorithms normally do not work well, potentially leading to an incorrect skeleton being generated. This paper proposes a novel approach, named DIST, to skeleton extraction from incomplete boundaries using the idea of distance transform, a concept in the computer graphics area. The main contribution is a distributed and low-cost algorithm that produces accurate network skeletons without requiring that the boundaries be complete or tight. The algorithm first establishes the network's distance transform - the hop distance of each node to the network's boundaries. Based on this, some critical skeleton nodes are identified. Next, a set of skeleton arcs are generated by controlled flooding; connecting these skeleton arcs then gives us a coarse skeleton. The algorithm finally refines the coarse skeleton by building shortest path trees, followed by a prune phase. The obtained skeletons are robust to boundary noise and shape variations.","PeriodicalId":6300,"journal":{"name":"2012 IEEE 32nd International Conference on Distributed Computing Systems","volume":"140 1","pages":"42-51"},"PeriodicalIF":0.0,"publicationDate":"2012-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81315153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
2012 IEEE 32nd International Conference on Distributed Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1