Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing最新文献

筛选
英文 中文
Sl-edge: network slicing at the edge Sl-edge:网络边缘切片
Salvatore D’oro, Leonardo Bonati, Francesco Restuccia, Michele Polese, M. Zorzi, T. Melodia
{"title":"Sl-edge: network slicing at the edge","authors":"Salvatore D’oro, Leonardo Bonati, Francesco Restuccia, Michele Polese, M. Zorzi, T. Melodia","doi":"10.1145/3397166.3409133","DOIUrl":"https://doi.org/10.1145/3397166.3409133","url":null,"abstract":"Network slicing of multi-access edge computing (MEC) resources is expected to be a pivotal technology to the success of 5G networks and beyond. The key challenge that sets MEC slicing apart from traditional resource allocation problems is that edge nodes depend on tightly-intertwined and strictly-constrained networking, computation and storage resources. Therefore, instantiating MEC slices without incurring in resource over-provisioning is hardly addressable with existing slicing algorithms. The main innovation of this paper is Sl-EDGE, a unified MEC slicing framework that allows network operators to instantiate heterogeneous slice services (e.g., video streaming, caching, 5G network access) on edge devices. We first describe the architecture and operations of Sl-EDGE, and then show that the problem of optimally instantiating joint network-MEC slices is NP-hard. Thus, we propose near-optimal algorithms that leverage key similarities among edge nodes and resource virtualization to instantiate heterogeneous slices 7.5x faster and within 25% of the optimum. We first assess the performance of our algorithms through extensive numerical analysis, and show that Sl-EDGE instantiates slices 6x more efficiently then state-of-the-art MEC slicing algorithms. Furthermore, experimental results on a 24-radio testbed with 9 smartphones demonstrate that Sl-EDGE provides simultaneously highly-efficient slicing of joint LTE connectivity, video streaming over WiFi, and ffmpeg video transcoding.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125133576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Portal 门户网站
Xiaolong Zheng, Dan Xia, Xiuzhen Guo, Liang Liu, Yuan He, Huadong Ma
{"title":"Portal","authors":"Xiaolong Zheng, Dan Xia, Xiuzhen Guo, Liang Liu, Yuan He, Huadong Ma","doi":"10.32388/a6fx8p","DOIUrl":"https://doi.org/10.32388/a6fx8p","url":null,"abstract":"Volunteer organizations can potentially partner with mainstream professional services to provide better parenting support to immigrant parents. This qualitative study of cooperation between professional agencies and volunteer organizations known as migrant volunteer and community organizations (MVCOs) aims to understand the extent to which professionals and volunteers can transform frame divergence from an obstacle into an advantage. Using frame analysis, this article explores the difficulties these groups encountered when they attempted to work together in two immigrant neighborhoods in Amsterdam. The divergence of the frames each group employed to define cooperation and its aims fueled mistrust and prevented attempts to work more closely together. The possibility of positively employing frame divergence to develop innovative solutions through frame reflection and reframing was hampered by the frame divergence itself, which was rooted in a long-standing controversy concerning roles, power relations, and patterns of inequality between the","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123711924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data inference from encrypted databases: a multi-dimensional order-preserving matching approach 加密数据库的数据推断:一种多维保序匹配方法
Yanjun Pan, A. Efrat, Ming Li, Boyang Wang, Hanyu Quan, Joseph S. B. Mitchell, Jie Gao, E. Arkin
{"title":"Data inference from encrypted databases: a multi-dimensional order-preserving matching approach","authors":"Yanjun Pan, A. Efrat, Ming Li, Boyang Wang, Hanyu Quan, Joseph S. B. Mitchell, Jie Gao, E. Arkin","doi":"10.1145/3397166.3409135","DOIUrl":"https://doi.org/10.1145/3397166.3409135","url":null,"abstract":"Due to increasing concerns of data privacy, databases are being encrypted before they are stored on an untrusted server. To enable search operations on the encrypted data, searchable encryption techniques have been proposed. Representative schemes use order-preserving encryption (OPE) for supporting efficient Boolean queries on encrypted databases. Yet, recent works showed the possibility of inferring plaintext data from OPE-encrypted databases, merely using the order-preserving constraints, or combined with an auxiliary plaintext dataset with similar frequency distribution. So far, the effectiveness of such attacks is limited to single-dimensional dense data (most values from the domain are encrypted), but it remains challenging to achieve it on high-dimensional datasets (e.g., spatial data), which are often sparse in nature. In this paper, for the first time, we study data inference attacks on multi-dimensional encrypted databases (with 2-D as a special case). We formulate it as a 2-D order-preserving matching problem and explore both unweighted and weighted cases, where the former maximizes the number of points matched using only order information and the latter further considers points with similar frequencies. We prove that the problem is NP-hard, and then propose a greedy algorithm, along with a polynomial-time algorithm with approximation guarantees. Experimental results on synthetic and real-world datasets show that the data recovery rate is significantly enhanced compared with the previous 1-D matching algorithm.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124539901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Private and communication-efficient edge learning: a sparse differential gaussian-masking distributed SGD approach 私有和通信高效边缘学习:稀疏微分高斯掩蔽分布式SGD方法
Xin Zhang, Minghong Fang, Jia Liu, Zhengyuan Zhu
{"title":"Private and communication-efficient edge learning: a sparse differential gaussian-masking distributed SGD approach","authors":"Xin Zhang, Minghong Fang, Jia Liu, Zhengyuan Zhu","doi":"10.1145/3397166.3409123","DOIUrl":"https://doi.org/10.1145/3397166.3409123","url":null,"abstract":"With the rise of machine learning (ML) and the proliferation of smart mobile devices, recent years have witnessed a surge of interest in performing ML in wireless edge networks. In this paper, we consider the problem of jointly improving data privacy and communication efficiency of distributed edge learning, both of which are critical performance metrics in wireless edge network computing. Toward this end, we propose a new distributed stochastic gradient method with sparse differential Gaussian-masked stochastic gradients (SDM-DSGD) for non-convex distributed edge learning. Our main contributions are three-fold: i) We theoretically establish the privacy and communication efficiency performance guarantee for our SDM-DSGD method, which outperforms all existing works; ii) We propose a generalized differential-coded DSGD update, which enables a much lower transmit probability for gradient sparsification, and provides an [EQUATION] convergence rate; and iii) We reveal theoretical insights and offer practical design guidelines for the interactions between privacy preservation and communication efficiency - two conflicting performance goals. We conduct extensive experiments with a variety of learning models on MNIST and CIFAR-10 datasets to verify our theoretical findings.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129506612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Fresher content or smoother playback?: a brownian-approximation framework for scheduling real-time wireless video streams 内容更新鲜还是播放更流畅?:调度实时无线视频流的布朗近似框架
Ping-Chun Hsieh, Xi Liu, I.-Hong Hou
{"title":"Fresher content or smoother playback?: a brownian-approximation framework for scheduling real-time wireless video streams","authors":"Ping-Chun Hsieh, Xi Liu, I.-Hong Hou","doi":"10.1145/3397166.3409121","DOIUrl":"https://doi.org/10.1145/3397166.3409121","url":null,"abstract":"This paper presents a Brownian-approximation framework to optimize the quality of experience (QoE) for real-time video streaming in wireless networks. In real-time video streaming, one major challenge is to tackle the natural tension between the two most critical QoE metrics: playback latency and video interruption. To study this trade-off, we first propose an analytical model that precisely captures all aspects of the playback process of a real-time video stream, including playback latency, video interruptions, and packet dropping. Built on this model, we show that the playback process of a real-time video can be approximated by a two-sided reflected Brownian motion. Through such Brownian approximation, we are able to study the fundamental limits of the two QoE metrics and characterize a necessary and sufficient condition for a set of QoE performance requirements to be feasible. We propose a scheduling policy that satisfies any feasible set of QoE performance requirements and then obtain simple rules on the trade-off between playback latency and the video interrupt rates, in both heavy-traffic and under-loaded regimes. Finally, simulation results verify the accuracy of the proposed approximation and show that the proposed policy outperforms other popular baseline policies.","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126193126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
REFRAIN
Youngwook Son, K. Lee, Seongwon Kim, Jinmyeong Lee, S. Choi, S. Bahk
{"title":"REFRAIN","authors":"Youngwook Son, K. Lee, Seongwon Kim, Jinmyeong Lee, S. Choi, S. Bahk","doi":"10.2307/j.ctvkjb3p9.11","DOIUrl":"https://doi.org/10.2307/j.ctvkjb3p9.11","url":null,"abstract":"Rating: Explicit Archive Warning: Graphic Depictions Of Violence Category: F/M Fandom: Iron Man (Movies), The Avengers (2012), Marvel Cinematic Universe Relationship: Pepper Potts/Tony Stark, Carol Danvers & James \"Rhodey\" Rhodes Character: Tony Stark, Pepper Potts, James \"Rhodey\" Rhodes, Bruce Banner, Clint Barton, Carol Danvers, Steve Rogers, Loki (Marvel), Also everyone else Additional Tags: Post Iron Man 3, Panic Attacks, Angst, Oral Sex, Dealing with the room's elephant, Let me get my whump stick, Mind Control, Character Death, Action/Adventure, Kidnapping, Torture, Post-Traumatic Stress Disorder PTSD, That one Winter Soldier spoiler (identity), Podfic Available Collections: Buffyverse Top 5 Stats: Published: 2013-07-16 Completed: 2014-04-09 Chapters: 30/30 Words: 95104","PeriodicalId":122577,"journal":{"name":"Proceedings of the Twenty-First International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116642177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信