2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)最新文献

筛选
英文 中文
A Modular and Distributed Setup for Power and Performance Analysis of Multi-Processor System-on-Chip at Electronic System Level 电子系统级多处理器片上系统的功率和性能分析的模块化和分布式设置
2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC) Pub Date : 2020-11-06 DOI: 10.1109/IPCCC50635.2020.9391516
M. Ayub, F. Kreupl
{"title":"A Modular and Distributed Setup for Power and Performance Analysis of Multi-Processor System-on-Chip at Electronic System Level","authors":"M. Ayub, F. Kreupl","doi":"10.1109/IPCCC50635.2020.9391516","DOIUrl":"https://doi.org/10.1109/IPCCC50635.2020.9391516","url":null,"abstract":"5G brings innovation challenges for the spectra of computing and connectivity technology. Cellular modems, in particular, have to support various services and applications requiring low to high data rates. Therefore, the co-optimization of power and performance for architecture along circuit design is inevitable. In order to meet this challenge, this work presents a modular and distributed setup. It first separates functionality from architecture, and second, the way a power database is attached and integrated makes it practical. A simple use-case presented for the network processor demonstrates the effectiveness of the setup/methodology.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"606 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131562379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Open Framework of Gateway Monitoring System for Internet of Things in Edge Computing 边缘计算下的物联网网关监控系统开放框架
2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC) Pub Date : 2020-11-06 DOI: 10.1109/IPCCC50635.2020.9391568
Ke Han, Youyan Duan, Rui Jin, Zhicheng Ma, Hui Rong, Xiaobo Cai
{"title":"Open Framework of Gateway Monitoring System for Internet of Things in Edge Computing","authors":"Ke Han, Youyan Duan, Rui Jin, Zhicheng Ma, Hui Rong, Xiaobo Cai","doi":"10.1109/IPCCC50635.2020.9391568","DOIUrl":"https://doi.org/10.1109/IPCCC50635.2020.9391568","url":null,"abstract":"Aiming at the problems of the diversity of communication protocols for IoT devices and insufficient cloud computing power, a monitoring system for IoT gateways based on edge computing is designed. Through a combination of simulation and experiment, the transmission performance of IoT gateways based on multiple communication protocols is tested and analyzed. The paper uses EdgeX Foundry edge computing framework, Raspberry Pi 3B+ as the core, and Docker virtualized container technology, distributed A microservice architecture was deployed and a temperature and humidity alarm system based on the Modbus communication protocol was constructed. The average delay of the system was 576 ms. The experimental results show that the transmission performance of the IoT gateway meets the needs of the factory, provides a new idea for the data collection and control of the equipment, and has high application value.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"193 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127563207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
FPGA Implementation of a Pseudo-Random Signal Generator for RF Hardware Test and Evaluation 用于射频硬件测试与评估的伪随机信号发生器的FPGA实现
2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC) Pub Date : 2020-11-06 DOI: 10.1109/IPCCC50635.2020.9391555
Randeep S. Baweja, Devin Ridge, Harpreet S. Dhillon, W. Headley
{"title":"FPGA Implementation of a Pseudo-Random Signal Generator for RF Hardware Test and Evaluation","authors":"Randeep S. Baweja, Devin Ridge, Harpreet S. Dhillon, W. Headley","doi":"10.1109/IPCCC50635.2020.9391555","DOIUrl":"https://doi.org/10.1109/IPCCC50635.2020.9391555","url":null,"abstract":"Test and evaluation (T&E) is a critically important step before in-the-field deployment of radio frequency hardware in order to assure that the hardware meets its design requirements and specifications. Typically, T&E is performed either in a lab setting utilizing a software simulation environment or through real-world field testing. While the former approach is typically limited by the accuracy of the simulation models (of the anticipated hardware effects, channel conditions, etc.) and by non-real-time data rates, the latter can be extremely costly in terms of time, money, and manpower. To address these issues, this work presents the development of an FPGA-based T&E tool that allows for real-time pseudo-random signal generation for testing radio frequency receiver hardware (such as communication receivers, spectrum sensors, etc.). In particular, a framework is developed for an FPGA-based implementation of a test signal emulator that allows for user-defined randomization of test signal parameters such as center frequencies, bandwidths, start times, and durations, as well as receiver and channel effects such as additive white Gaussian noise (AWGN). To test the accuracy of the developed emulation framework, the randomization properties of the framework are analyzed to assure correct probability distributions and independence. Additionally, FPGA implementation decisions such as bit precision vs. accuracy of the generated signal and the impact on the FPGA’s hardware footprint are analyzed. Ultimately, it is shown that this framework is easily extensible to other signal types and channel models.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127711217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of the interest of an extra-slot for a grouped polling-selecting method 分组轮询选择方法中额外槽的兴趣评价
2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC) Pub Date : 2020-11-06 DOI: 10.1109/IPCCC50635.2020.9391538
Guéréguin Der Sylvestre Sidibé, Raphaël Bidaud, M. Servajean, N. Hakem, M. Misson
{"title":"Evaluation of the interest of an extra-slot for a grouped polling-selecting method","authors":"Guéréguin Der Sylvestre Sidibé, Raphaël Bidaud, M. Servajean, N. Hakem, M. Misson","doi":"10.1109/IPCCC50635.2020.9391538","DOIUrl":"https://doi.org/10.1109/IPCCC50635.2020.9391538","url":null,"abstract":"Switched beam antennas (SBA) have been shown to offer many advantages when used in confined and obstructed environments that represent a difficult radio propagation environment. However, when SBA are used in wireless network, the popular contention-based medium access control protocol such as IEEE 802.15.4 MAC is no longer effective. Furthermore, the contention based nature of IEEE 802.15.4 MAC makes it not suitable for deterministic transmissions. In order to have a good compromise between range, data rate and deterministic behavior, in this paper, we propose data collection schemes based on polling-selecting strategies for low latency deterministic networked (LLDN) systems where the sink is equipped with a SBA and sensor nodes with usual omnidirectional antennas. Our solution is based on IEEE 802.15.4 frame exchanges in star topology. We present an analytical model to evaluate the benefit of using an extra slot in a collection scheme based on polling strategy. Several simulations were conducted to validate the analytical model and show that using an extra slot in a collection scheme based on polling strategy improves the frame delivery rate.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122587327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BonnMotion 4 – Taking Mobility Generation to the Next Level BonnMotion 4 -将移动一代提升到一个新的水平
2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC) Pub Date : 2020-11-06 DOI: 10.1109/IPCCC50635.2020.9391563
Alexander Bothe, N. Aschenbruck
{"title":"BonnMotion 4 – Taking Mobility Generation to the Next Level","authors":"Alexander Bothe, N. Aschenbruck","doi":"10.1109/IPCCC50635.2020.9391563","DOIUrl":"https://doi.org/10.1109/IPCCC50635.2020.9391563","url":null,"abstract":"Human mobility plays an important role in multiple research areas, ranging from virus spread research to network performance analysis. As real-world campaigns tend to be rather time consuming and expensive, they are often used to extract statistical features characterizing human mobility, which are then used as basis to create mobility models. For the implementation of such models and the subsequent simulative generation of movement traces, various tools exist. One such tool, focusing on the mobility modeling aspect of network performance analysis, is BonnMotion (BM).In this paper, we introduce new features to BM which increase the overall usability of the framework, simplify the implementation of new models, and improve the trace generation performance by introducing parallel processing capabilities. In addition, the introduced features are used to implement two additional movement models: The Sedentary Random Waypoint model and the Working Day Model. Furthermore, we exemplarily evaluate both, the impact of our enhancements, and the newly added models.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129051785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
FluxInfer: Automatic Diagnosis of Performance Anomaly for Online Database System 在线数据库系统性能异常的自动诊断
2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC) Pub Date : 2020-11-06 DOI: 10.1109/IPCCC50635.2020.9391550
Ping Liu, Shenglin Zhang, Yongqian Sun, Yuan Meng, Jiahai Yang, Dan Pei
{"title":"FluxInfer: Automatic Diagnosis of Performance Anomaly for Online Database System","authors":"Ping Liu, Shenglin Zhang, Yongqian Sun, Yuan Meng, Jiahai Yang, Dan Pei","doi":"10.1109/IPCCC50635.2020.9391550","DOIUrl":"https://doi.org/10.1109/IPCCC50635.2020.9391550","url":null,"abstract":"The root cause diagnosis of performance anomaly for online database anomalies is challenging due to diverse types of database engines, different operational modes, and variable anomaly patterns. To relieve database operators from manual anomaly diagnosis and alarm storm, we propose FluxInfer, a framework to accurately and rapidly localize root cause related KPIs for database performance anomaly. It first constructs a Weighted Undirected Dependency Graph (WUDG) to represent the dependency relationships of anomalous KPIs accurately, and then applies a weighted PageRank algorithm to localize root cause related KPIs. The testbed evaluation experiments show that the AC@3, AC@5, and Avg@5 of FluxInfer are 0.90, 0.95, and 0.77, outperforming nine baselines by 64%, 60%, and 53% on average, respectively.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115453147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
LIDAUS: Localization of IoT Device via Anchor UAV SLAM LIDAUS:基于Anchor UAV SLAM的物联网设备定位
2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC) Pub Date : 2020-11-06 DOI: 10.1109/IPCCC50635.2020.9391527
Yue Sun, Deqiang Xu, Zhuoming Huang, Honggang Zhang, Xiaohui Liang
{"title":"LIDAUS: Localization of IoT Device via Anchor UAV SLAM","authors":"Yue Sun, Deqiang Xu, Zhuoming Huang, Honggang Zhang, Xiaohui Liang","doi":"10.1109/IPCCC50635.2020.9391527","DOIUrl":"https://doi.org/10.1109/IPCCC50635.2020.9391527","url":null,"abstract":"We introduce LIDAUS (Localization of IoT Device via Anchor UAV SLAM), an infrastructure-free, multi-stage SLAM system that utilizes an Unmanned Aerial Vehicle (UAV) to accurately localize IoT devices in a 3D indoor space where GPS signals are unavailable or weak, e.g., manufacturing factories, disaster sites, or smart buildings. The lack of GPS signals and infrastructure support makes most of the existing indoor localization systems not practical when localizing a large number of wireless IoT devices. In addition, safety concerns, access restriction, and simply the huge amount of IoT devices make it not practical for humans to manually localize and track IoT devices. To address these challenges, the UAV in our LIDAUS system conducts multi-stage 3D SLAM trips to localize devices based only on RSSIs, the most widely available measurement of the signals of almost all commodity IoT devices. The main novelties of the system include a weighted entropy-based clustering algorithm to select high quality RSSI observation locations, a 3D U-SLAM algorithm that is enhanced by deploying anchor beacons along the UAV’s path, and the path planning based on Eulerian cycles on multi-layer grid graphs that model the space in exploring stage and Steiner tree paths in searching stages. Our simulations and experiments of Bluetooth IoT devices have demonstrated that the system can achieve high localization accuracy based only on RSSIs of commodity IoT devices.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"60 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127386674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Policy Units and Categories: Networking Models for Simplifying Security Policy Management 策略单元和类别:简化安全策略管理的组网模型
2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC) Pub Date : 2020-11-06 DOI: 10.1109/IPCCC50635.2020.9391572
Madeline Van Ness, Xin Sun
{"title":"Policy Units and Categories: Networking Models for Simplifying Security Policy Management","authors":"Madeline Van Ness, Xin Sun","doi":"10.1109/IPCCC50635.2020.9391572","DOIUrl":"https://doi.org/10.1109/IPCCC50635.2020.9391572","url":null,"abstract":"This paper proposes new models for simplifying policy management in enterprise networks. The application of these models to five operational networks has demonstrated their capacity for abstractly modeling network policy structures and their potential for simplifying network management tasks, which would result in reduced opportunity for human error in network management. This is useful because human error is currently a significant cause of data breaches in enterprise networks, so a reduction in human errors would be greatly beneficial to network security. Specifically, we have created two new models for abstracting policies. The policy unit model divides a network into sections, called policy units, by grouping hosts together according to similarities in the existing policy rules that are applied them. This model allows policies to be viewed and analyzed at a higher level of abstraction, which would increase the efficiency of policy management (e.g., rule changes can be applied to an entire policy unit at once). The category model groups policy units together, giving the potential for even greater efficiency. Analysis of the application of these models to five enterprise networks exposed new insight in policy management in production networks, and showed that policy management in large networks could be greatly simplified through the use of these models. This indicates the potential benefit of integrating our models in future network management systems.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121822842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Machine Learning-based Stage-aware Performance Prediction of Spark Applications 基于机器学习的Spark应用阶段感知性能预测
2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC) Pub Date : 2020-11-06 DOI: 10.1109/IPCCC50635.2020.9391564
Guangjun Ye, Wuji Liu, C. Wu, Wei Shen, Xukang Lyu
{"title":"On Machine Learning-based Stage-aware Performance Prediction of Spark Applications","authors":"Guangjun Ye, Wuji Liu, C. Wu, Wei Shen, Xukang Lyu","doi":"10.1109/IPCCC50635.2020.9391564","DOIUrl":"https://doi.org/10.1109/IPCCC50635.2020.9391564","url":null,"abstract":"The data volume of large-scale applications in various science, engineering, and business domains has experienced an explosive growth over the past decade, and has gone far beyond the computing capability and storage capacity of any single server. As a viable solution, such data is oftentimes stored in distributed file systems and processed by parallel computing engines, as exemplified by Spark, which has gained increasing popularity over the traditional MapReduce framework due to its fast in-memory processing of streaming data. Spark engines are generally deployed in cloud environments such as Amazon EC2 and Alibaba Cloud. However, storage and computing resources in these cloud environments are typically provisioned on a pay-as-you-go basis and thus an accurate estimate of the execution time of Spark workloads is critical to making full utilization of cloud resources and meeting performance requirements of end users. Our insight is that the execution pattern of many Spark workloads is qualitatively similar, which makes it possible to leverage historical performance data to predict the execution time of a given Spark application. We use the execution information extracted from Spark History Server as training data and develop a stage-aware hierarchical neural network model for performance prediction. Experimental results show that the proposed hierarchical model achieves higher accuracy than a holistic prediction model at the end-to-end level, and also outperforms other existing regression-based prediction methods.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127619234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detect Stepping-stone Intrusion by Mining Network Traffic using k-Means Clustering 基于k-均值聚类挖掘网络流量的入侵检测
2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC) Pub Date : 2020-11-06 DOI: 10.1109/IPCCC50635.2020.9391521
Lixin Wang, Jianhua Yang, Mary Mccormick, Pengyuan Wan, Xiaohua Xu
{"title":"Detect Stepping-stone Intrusion by Mining Network Traffic using k-Means Clustering","authors":"Lixin Wang, Jianhua Yang, Mary Mccormick, Pengyuan Wan, Xiaohua Xu","doi":"10.1109/IPCCC50635.2020.9391521","DOIUrl":"https://doi.org/10.1109/IPCCC50635.2020.9391521","url":null,"abstract":"Attackers on the Internet often launch network intrusions through compromised hosts, called stepping-stones, in order to reduce the chance of being detected. In a stepping-stone attack, an attacker uses a chain of hosts on the Internet as relay machines and remotely login these hosts using tools such as SSH. An effective method to detect stepping-stone intrusion is to estimate the length of a connection chain. In this paper, we develop an efficient algorithm to detect stepping-stone intrusion by mining network traffic using the k-Means clustering algorithm. Our proposed detection algorithm does not require a large number of TCP packets to be captured and processed. The length of a connection chain can be accurately determined by using our proposed detection method. Our proposed detection algorithm is more efficient and easier to implement than all of the existing connection-chain based approaches for stepping-stone intrusion detection. The effectiveness and correctness of our proposed detection algorithm are verified through well-designed network experiments.","PeriodicalId":226034,"journal":{"name":"2020 IEEE 39th International Performance Computing and Communications Conference (IPCCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116483620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信