Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems最新文献

筛选
英文 中文
Maximizing the Quality of User Experience of Using Services in Edge Computing for Delay-Sensitive IoT Applications 最大限度地提高延迟敏感物联网应用中边缘计算使用服务的用户体验质量
Jing Li, W. Liang, Wenzheng Xu, Zichuan Xu, Jin Zhao
{"title":"Maximizing the Quality of User Experience of Using Services in Edge Computing for Delay-Sensitive IoT Applications","authors":"Jing Li, W. Liang, Wenzheng Xu, Zichuan Xu, Jin Zhao","doi":"10.1145/3416010.3423234","DOIUrl":"https://doi.org/10.1145/3416010.3423234","url":null,"abstract":"The Internet of Things (IoT) technology offers unprecedented opportunities to interconnect human beings. However, the latency brought by unstable wireless networks and computation failures caused by limited resources on IoT devices prevents users from experiencing high efficiency and seamless user experience. To address these shortcomings, the integrated MEC with remote clouds is a promising platform, where edge-clouds (cloudlet) are co-located with wireless access points in the proximity of IoT devices, thus intensive-computation and sensing data from IoT devices can be offloaded to the MEC network for processing, and the service response latency can be significantly reduced. In this paper, we study delay-sensitive service provisioning in an MEC network for IoT applications. We first formulate two novel optimization problems, i.e., the total utility maximization problems under both static and dynamic offloading task request settings, with the aim to maximize the accumulative user satisfaction of using the services provided by the MEC. We then show that the defined problems are NP-hard. We instead devise efficient approximation and online algorithms with provable performance guarantees for the problems. We finally evaluate the performance of the proposed algorithms through experimental simulations. Experimental results demonstrate that the proposed algorithms are promising.","PeriodicalId":177469,"journal":{"name":"Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115059278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Lightweight Short-term Photovoltaic Power Prediction for Mobile Edge Computing 面向移动边缘计算的轻型短期光伏功率预测
Albert Y. Zomaya
{"title":"Lightweight Short-term Photovoltaic Power Prediction for Mobile Edge Computing","authors":"Albert Y. Zomaya","doi":"10.1145/3416010.3431218","DOIUrl":"https://doi.org/10.1145/3416010.3431218","url":null,"abstract":"To meet the needs for energy savings in Internet of Things (IoT) and mobile systems, solar energy has been increasingly exploited to serve as a green and renewable source to allow systems to better operate in an energy-efficient way. In this respect, accurate photovoltaics (PV) power output prediction is a prerequisite for any energy saving scheme employed in these systems [1]. In this talk, I am going to discuss a unified training framework combined with the LightGBM algorithm to obtain a prediction model, which can provide short-term predictions of PV power output. Compared with the training in a single powerful machine, our proposed framework is more energy-efficient and fits into devices with limited computation and storage capabilities (e.g. IoT and mobile devices)[2]. The experimental results show that our proposed framework is superior to other benchmark machine learning algorithms.","PeriodicalId":177469,"journal":{"name":"Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117283096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trajectory-Assisted Robust RFID-tagged Object Tracking and Recognition in Room Environment 室内环境下轨迹辅助鲁棒rfid标签目标跟踪与识别
Motoki Ougida, H. Yamaguchi, T. Higashino
{"title":"Trajectory-Assisted Robust RFID-tagged Object Tracking and Recognition in Room Environment","authors":"Motoki Ougida, H. Yamaguchi, T. Higashino","doi":"10.1145/3416010.3423241","DOIUrl":"https://doi.org/10.1145/3416010.3423241","url":null,"abstract":"This paper takes a Computer-Vision (CV) and RFID fusion approach to tracking RFID-tagged objects in a room environment. Unlike similar CV-RFID fusion techniques that fuse two different estimates from CV and RFID systems to increase the certainty of locations, our system does not directly localize RFID tags. Instead, each tag-attached object's usage time by a human is detected by observation of the tag's phase variance. The time is then used to identify the pinpoint locations where the object is handed and released by the human, using the corresponding human trajectory observed by 3D depth cameras. RSSI variance caused by human movement is also leveraged to estimate rough locations of such objects that are not used by humans. Finally, the correspondence between the objects and RFID tags is automatically recognized by clustering the feature vectors of objects. Consequently, once the type of one object, such as pen, book, and cup, the other objects in the cluster can be annotated with the same object type to facilitate object management in the system. The experimental results have shown that object usage is detected with 0.984 accuracy, objects are localized with 58.3cm median error in severe NLoS environment, and ten types of objects are identified with 0.842 accuracy in a laboratory room.","PeriodicalId":177469,"journal":{"name":"Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114437646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Revisiting Wi-Fi Performance under the Impact of Corrupted Channel State Information 信道状态信息损坏影响下的Wi-Fi性能重访
Youngwook Son, S. Bahk
{"title":"Revisiting Wi-Fi Performance under the Impact of Corrupted Channel State Information","authors":"Youngwook Son, S. Bahk","doi":"10.1145/3416010.3423223","DOIUrl":"https://doi.org/10.1145/3416010.3423223","url":null,"abstract":"Wi-Fi devices become increasingly susceptible to mutual interference in congested network scenarios. If a device starts to receive a new frame in the presence of concurrent interference signal, its preamble reception can be seriously damaged, which spoils the channel estimation process. The resulting corrupted channel state information (CSI) causes persistent decoding errors throughout the data payload. This paper presents a comprehensive study into the impact of corrupted CSI on Wi-Fi performance. Through experimental study and link-level analysis, we verify that actual receiver performance is highly dependent on CSI acquisition at the preamble, which has never been reflected by any physical layer abstraction models. We develop a realistic model that reflects the impact of corrupted CSI on overall frame reception. Applying our model to ns-3 simulator, we revisit network performance in interference-prone scenarios, to assess consistency with real-world Wi-Fi systems.","PeriodicalId":177469,"journal":{"name":"Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125589131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal Popularity-based Transmission Range Selection for D2D-supported Content Delivery 基于最优流行度的d2d支持内容传输范围选择
L. Pescosolido, A. Passarella, M. Conti
{"title":"Optimal Popularity-based Transmission Range Selection for D2D-supported Content Delivery","authors":"L. Pescosolido, A. Passarella, M. Conti","doi":"10.1145/3416010.3423238","DOIUrl":"https://doi.org/10.1145/3416010.3423238","url":null,"abstract":"Considering device-to-device (D2D) wireless links as a virtual extension of 5G (and beyond) cellular networks to deliver popular contents has been proposed as an interesting approach to reduce energy consumption, congestion, and bandwidth usage at the network edge. In the scenario of multiple users in a region independently requesting some popular content, there is a major potential for energy consumption reduction exploiting D2D communications. In this scenario, we consider the problem of selecting the maximum allowed transmission range (or equivalently the maximum transmit power) for the D2D links that support the content delivery process. We show that, for a given maximum allowed D2D energy consumption, a considerable reduction of the cellular infrastructure energy consumption can be achieved by selecting the maximum D2D transmission range as a function of content class parameters such as popularity and delay-tolerance, compared to a uniform selection across different content classes. Specifically, we provide an analytical model that can be used to estimate the energy consumption (for small delay tolerance) and thus to set the optimal transmission range. We validate the model via simulations and study the energy gain that our approach allows to obtain. Our results show that the proposed approach to the maximum D2D transmission range selection allows a reduction of the overall energy consumption in the range of 30% to 55%, compared to a selection of the maximum D2D transmission range oblivious to popularity and delay tolerance.","PeriodicalId":177469,"journal":{"name":"Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121526491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Capacity of a LoRaWAN Cell LoRaWAN小区容量
M. Heusse, Takwa Attia, C. Caillouet, F. Rousseau, A. Duda
{"title":"Capacity of a LoRaWAN Cell","authors":"M. Heusse, Takwa Attia, C. Caillouet, F. Rousseau, A. Duda","doi":"10.1145/3416010.3423228","DOIUrl":"https://doi.org/10.1145/3416010.3423228","url":null,"abstract":"In this paper, we consider the problem of evaluating the capacity of a LoRaWAN cell. Previous analytical studies investigated LoRaWAN performance in terms of the Packet Delivery Ratio (PDR) given a number of devices around a gateway and its range. We improve the model for PDR by taking into consideration that the following two events are dependent: successful capture during a collision and successful frame decoding despite ambient noise. We consider a realistic traffic model in which all devices generate packets with the same inter-transmission times corresponding to the duty cycle limitation at the highest SF, regardless of the distance to the gateway. Based on the developed model, we optimize the Spreading Factor (SF) boundaries to even out PDR throughout the cell. We validate the analytical results with simulations, compare our model with previous work, and experimentally validate the hypothesis of Rayleigh fading for the LoRa channel. The important conclusion from our results is that a LoRa cell can handle a relatively large number of devices. We also show that there is practically no inter-SF interference (cross interference between transmissions with different SFs): interference from higher SFs comes from nodes located farther away, so they face greater attenuation and thus, they do not interfere with lower SF nodes.","PeriodicalId":177469,"journal":{"name":"Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132640224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
An Adaptive Traffic-Flow based Controller Deployment Scheme for Software-Defined Vehicular Networks 一种基于自适应流量的软件定义车辆网络控制器部署方案
Noura Aljeri, A. Boukerche
{"title":"An Adaptive Traffic-Flow based Controller Deployment Scheme for Software-Defined Vehicular Networks","authors":"Noura Aljeri, A. Boukerche","doi":"10.1145/3416010.3423237","DOIUrl":"https://doi.org/10.1145/3416010.3423237","url":null,"abstract":"Software-Defined Vehicular Networks has been a vital component for heterogeneous radio access technologies to support massive data load through various safety and infotainment applications. Elevating the constraint of static hardware network devices into a programmable unit and providing a global view of the network status and standard interface between heterogeneous radio access technologies. However, having a logically centralized control unit brings several challenges, including bottleneck problem and densification issues. A distributed control plane comes as a possible solution to the centralized control plane yet with several questions of where to deploy the control units and how many SDN controllers are needed in a given network structure. In this paper, we present an adaptive Flow-based controller deployment and assignment strategy for distributed Software-Defined Vehicular Networks through the utilization of the communication latencies between switch-enabled access points and their corresponding vehicles' flow over a time window. We evaluate the proposed method's performance in terms of end-to-end delay and load on the resulted controller's points and their cluster's set. The clustering method is compared to several types of static placement strategies, in which the proposed method showed a reduction in controllers' average delays while distributing the load among them over time.","PeriodicalId":177469,"journal":{"name":"Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115359449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Interaction and Behaviour Evaluation for Smart Homes: Data Collection and Analytics in the ScaledHome Project 智能家居的交互和行为评估:ScaledHome项目中的数据收集和分析
Matteo Mendula, Siavash Khodadadeh, S. S. Bacanli, Sharare Zehtabian, Hassam Sheikh, Ladislau Bölöni, D. Turgut, P. Bellavista
{"title":"Interaction and Behaviour Evaluation for Smart Homes: Data Collection and Analytics in the ScaledHome Project","authors":"Matteo Mendula, Siavash Khodadadeh, S. S. Bacanli, Sharare Zehtabian, Hassam Sheikh, Ladislau Bölöni, D. Turgut, P. Bellavista","doi":"10.1145/3416010.3423227","DOIUrl":"https://doi.org/10.1145/3416010.3423227","url":null,"abstract":"The smart home concept can significantly benefit from predictive models that take proactive management operations on home actuators, based on users' behavior evaluation. In this paper, we use a small-scale physical model, the ScaledHome-2 testbed, to experiment with the evolution of measurements in a suburban home under different environmental scenarios. We start from the observation that, for a home to become smart, in addition to IoT sensors and actuators, we also need a predictive model of how actions taken by inhabitants and home actuators affect the internal environment of the home, reflected in the sensor readings. In this paper, we propose a technique to create such a predictive model through machine learning in various simulated weather scenarios. This paper also contributes to the literature in the field by quantitatively comparing several machine learning algorithms (K-nearest neighbor, regression trees, Support Vector Machine regression, and Long Short Term Memory deep neural networks) in their ability to create accurate and generalizable predictive models for smart homes.","PeriodicalId":177469,"journal":{"name":"Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116990548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Experimental Study of Rate and Beam Adaptation in 60 GHz WLANs 60 GHz无线局域网速率和波束自适应的实验研究
Shivang Aggarwal, Urjit Satish Sardesai, Viral Sinha, Dimitrios Koutsonikolas
{"title":"An Experimental Study of Rate and Beam Adaptation in 60 GHz WLANs","authors":"Shivang Aggarwal, Urjit Satish Sardesai, Viral Sinha, Dimitrios Koutsonikolas","doi":"10.1145/3416010.3423219","DOIUrl":"https://doi.org/10.1145/3416010.3423219","url":null,"abstract":"In this paper, we conduct an extensive experimental study of the two primary link adaptation mechanisms in 60 GHz WLANs, namely rate adaptation and beam adaptation, using a large data set collected from a 60 GHz software-defined radio testbed. First, we compare the effectiveness of the two mechanisms in a variety of indoor environments and scenarios, including linear and angular displacement, mobility, blockage, and interference. Next, we study the effectiveness of two rate adaptation approaches -- SNR-based rate adaptation, which has been proposed by recent works, and a learning-based approach using PHY layer information. Our results show that the former performs poorly in practical scenarios, while the latter is promising, especially when combined with online training. Finally, we explore the effectiveness of maintaining backup beams to speedup link recovery and reduce the beam training overhead. We show that this heuristic fails in scenarios involving angular displacement on the receiver side but is quite effective in most other scenarios.","PeriodicalId":177469,"journal":{"name":"Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116542420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Using Reinforcement Learning in Slotted Aloha for Ad-Hoc Networks 在Ad-Hoc网络的开槽Aloha中使用强化学习
Molly Zhang, L. D. Alfaro, J. Garcia-Luna-Aceves
{"title":"Using Reinforcement Learning in Slotted Aloha for Ad-Hoc Networks","authors":"Molly Zhang, L. D. Alfaro, J. Garcia-Luna-Aceves","doi":"10.1145/3416010.3423231","DOIUrl":"https://doi.org/10.1145/3416010.3423231","url":null,"abstract":"Slotted ALOHA is known to have poor channel utilization (a maximum of 37% when average offered load is one packet per time slot). Reinforcement learning has recently been proposed as a technique that allows nodes to learn to coordinate their transmissions in order to attain much higher network utilization. All reinforcement learning schemes proposed to date assume immediate feedback on the outcome of a packet transmission. We introduce ALOHA-dQT, a reinforcement-learning protocol that achieves high utilization by having nodes broadcast short summaries of the channel history as known to them along with their packets. Our simulation results show that ALOHA-dQT leads to network utilization above 75%, with fair bandwidth allocation among nodes. ALOHA-dQT is the first reinforcement-learning approach applied to slotted ALOHA suitable for ad-hoc networks without centralized repeaters.","PeriodicalId":177469,"journal":{"name":"Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126593420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信