{"title":"Multi-agent Communication with Attentional and Recurrent Message Integration","authors":"Zhaoqing Peng, Libo Zhang, Tiejian Luo","doi":"10.1109/ISCC.2018.8538766","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538766","url":null,"abstract":"Effective communication is significant for solving cooperative tasks in multi-agent domain. Agents coordinate their behaviors by appropriately modeling the communication signals or messages sent from others. To this end, agents are required to filter noise and obtain useful information from received messages, and learn to adapt to the dynamics of messages number. In this paper, we propose an attentional and recurrent message integration method (ARMI) that handles the dynamics by recurrently decoding messages, and performs attentional integration based on the relevance of each message. We evaluate our proposal on a new “predator-prey-toxin” environment where the number of agents changes, and the results outperform other competing multi-agent methods. Further investigations are also done to prove the superiority of ARMI in collaborating agents' behaviors for complex tasks and establishing interpretable communication protocol.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130000167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Increasing LoRaWAN Application-Layer Message Delivery Success Rates","authors":"S. Wang, Tzu-Yang Chen","doi":"10.1109/ISCC.2018.8538457","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538457","url":null,"abstract":"The LoRaWAN network is proposed for IoT applications and has the advantages of long range transmission and low power consumption. However, it suffers from very low data throughputs and long transmission duty cycle delays. In our real on-campus LoRaWAN deployment that has been lasting for one year, we found that even though we placed LoRaWAN end devices (nodes) at a short distance such as less than 700 meters from a LoRaWAN gateway, the packet loss rates at some locations are still too high to be acceptable. In this paper, we propose two approaches to overcome this high packet loss rate problem. We modified the IoT application running on nodes to let a node retransmit its lost data in multiple packets and help transmit its neighboring node’s data. Our experimental results show that our approaches can effectively increase the application-layer message delivery success rate of LoRaWAN.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134548223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reducing the Variability in Routing Decisions in Wireless Mesh Networks","authors":"B. Silva, D. Passos, C. Albuquerque","doi":"10.1109/ISCC.2018.8538715","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538715","url":null,"abstract":"Wireless mesh networks are multi-hop wireless networks which are useful in situations where there is little or no network infrastructure. Recently, those networks have been proposed for scenarios of Smart Grids and Internet of Things. The variability in routing metrics, which causes frequent changes in path choice, is a challenge in these networks. In this article, we propose a method, called Hypothesis Testing Estimator (HTE), for estimating the frame delivery probability of a link based on the concept of hypothesis testing. In this method, the estimate is fixed until the link behavior in the recent past significantly deviates from the expectation. The method was evaluated using simulations whose results show a significant reduction in the variability of the link quality estimates.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129433067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Regis F. T. Martins, F. Verdi, R. Villaça, L. U. Garcia
{"title":"Using Probabilistic Data Structures for Monitoring of Multi-tenant P4-based Networks","authors":"Regis F. T. Martins, F. Verdi, R. Villaça, L. U. Garcia","doi":"10.1109/ISCC.2018.8538352","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538352","url":null,"abstract":"With the evolution of the processing capacity of the network devices and the appearing of novel programmable network hardware, new methods and techniques for traffic monitoring have been proposed. Among these new techniques, the use of sketches has been increased. Sketches are probabilistic data structures capable of summarizing information about the network with two main advantages over flow-based counters: low memory usage and adjustable accuracy. Considering this scenario, this paper proposes the use of probabilistic data structures implemented in P4 (Programming Protocol-Independent Packet Processors) to monitor multi-tenant networks. While it is common to see similar solutions for monitoring non-shared networks, as far as we know this is the first work that deals multitenant scenarios. We implemented sketches for each tenant so that an isolated network monitoring can be done. The solution, named BitMatrix, was created taking into account two probabilistic structures: bitmaps and counter-arrays.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132799351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. G. Gomes, Leonardo da Silva Costa, L. Rocha, G. V. R. Viana, F. C. S. Dias
{"title":"Algorithms for BPRN Coloring of a Digraph","authors":"F. G. Gomes, Leonardo da Silva Costa, L. Rocha, G. V. R. Viana, F. C. S. Dias","doi":"10.1109/ISCC.2018.8538690","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538690","url":null,"abstract":"A radio network consists of a set of transceiver nodes that make use of radio transmissions to communicate with each other. Because these wireless networks share the communication channel, collisions may occur in transmissions, whether through primary or secondary interference. Considering that to a large extent these networks have multi-hops in their composition, thus it is possible the spatial reuse in the channel sharing, with the prevention of collisions and with this reducing the loss of data transmitted. In the context of these networks, several approaches are used to medium control access, in order to coordinate access to the wireless channel to avoid overlapping of transmissions in the use of the channel. A wireless network can be represented as a digraph, and the PRN (Packet Radio Network) coloring model is applied as a scheduling criterion for MAC protocols. The BPRN (Backbone PRN) model represents a generalization of the PRN coloring, applying a more realistic approach where it is considered only a subset of links that will be colored, which we call the backbone network. The backbone network considers the fact that in a multi-hop wireless network, a transceiver node communicates only with some of its neighbors. In this work, the backbone network is represented by a tree oriented towards a root node, due to its relationship to the domain of the wireless sensor networks. Thus, this work proposes the development of algorithms for coloring graphs based on the BPRN coloring model, with emphasis on the TDMA channel allocation technique, since it will be used for the scheduling of links in the context of multi-hop wireless networks.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130117002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yang Guo, Shaolin Xie, Zijun Liu, Lei Yang, Donglin Wang
{"title":"Parallel Polar Encoding in 5G Communication","authors":"Yang Guo, Shaolin Xie, Zijun Liu, Lei Yang, Donglin Wang","doi":"10.1109/ISCC.2018.8538743","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538743","url":null,"abstract":"Because of its theoretical capacity-achieving property, polar code has become the coding scheme of the control channel in the 5G communication standard. Although its encoding complexity is low, the data dependency in polar code makes it difficult to parallelize. This paper proposes a parallel polar encoding method for 5G communication and evaluates its performance with extended digital signal processor (DSP) instructions. Compared with the existing field-programmable gate array (FPGA) implementation, the performance improved by $300 times$ with negligible area and power overhead. The extended instructions are based on our in-house DSP architecture, but the parallel scheme is applicable to other single instruction multiple data (SIMD) architectures.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"8 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114109930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marcos Antônio Filho, Matheus Ribeiro, Ivyson Silva, A. Santos, C. Oliveira, R. Braga
{"title":"Performance Issues in a Low Cost Multi-Channel Multi-Interface Wireless Mesh Network","authors":"Marcos Antônio Filho, Matheus Ribeiro, Ivyson Silva, A. Santos, C. Oliveira, R. Braga","doi":"10.1109/ISCC.2018.8538458","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538458","url":null,"abstract":"In urban environments, several studies have shown that a mesh network is able to complement a number of existing access technologies, including wired broadband networks, 3G, 4G and commercial WiFi hotspots. However, due to the limited number of orthogonal channels available in the radio spectrum (3 in IEEE 802.11b / g / n in 2.4 GHz band), interference and containment bring new challenges to provide high performance in these networks. In this context, multi-channel multi-interface wireless mesh networks emerge as an efficient strategy of spreading the load through orthogonal channels to improve the network capacity. In this paper, we investigate different strategies for the use of multiple channels and multiple heterogeneous and homogeneous interfaces in a community area as a real university mesh network. Experimental results show that the use of multiple interfaces and multiple channels does not always increase the performance of the network in a real scenario.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114118343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Francisco R. P. da Ponte, R. Gomes, J. Celestino, E. Madeira, Ahmed Patel
{"title":"IoT Device Programmable Language Customization for Home Automation","authors":"Francisco R. P. da Ponte, R. Gomes, J. Celestino, E. Madeira, Ahmed Patel","doi":"10.1109/ISCC.2018.8538503","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538503","url":null,"abstract":"The deployment of home automation projects is a simple task for IT professionals, but its a complex task for endusers to use the Internet of Things (IoT) technology. Moreover, the customization of the behavior of IoT devices is hard, since no friendly environment exists. Within this context, this paper presents a descriptive language to enable the programmability of IoT devices functionalities without changing their source code. The language allows the interaction between the end-user and IoT devices in a seamless friendly manner. Additionally, an architecture was designed to support this interaction between users and IoT devices. From a real IoT testbed, the proposed language and the designed architecture were evaluated, where both met the expected goals with a suitable performance.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131883429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Villari, A. Galletta, A. Celesti, Lorenzo Carnevale, M. Fazio
{"title":"Osmotic Computing: Software Defined Membranes meet Private/Federated Blockchains","authors":"M. Villari, A. Galletta, A. Celesti, Lorenzo Carnevale, M. Fazio","doi":"10.1109/ISCC.2018.8538546","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538546","url":null,"abstract":"This paper presents an innovative solution to manage security and trustiness in Osmotic Computing. Osmotic Computing dynamically manages Cloud, Edge and IoT resources across federated environments set up by different and cooperating stakeholders. In this context, the Software Defined Membrane (SDMem) is the main component responsible to orchestrate the osmotic transfer of microelements (MELs) across different environments straightening the security needs of such a complex ecosystem. The basic idea presented in this paper is to leverage Private Blockchain technologies in SDMem implementation over federated systems. Data access activities will be logged in a private distributed Blockchain-based ledger. This will allow to have a certified, non-repudiable record of all the data accessed performed by distributed computing, thus assuring the overall ownership and integrity of data and processes running in MELs. The resulting SDMem solution allow us to isolate data and workflows in distributed environments where heterogeneous resources and devices are exploited.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132242989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QoS Guaranteed Batch Scheduling for Optical Switches Based on Unequal Weight Sequence","authors":"Yan Guan, Bin Wu, Zhipeng Zhao, Boyu Li, Shu Fu","doi":"10.1109/ISCC.2018.8538553","DOIUrl":"https://doi.org/10.1109/ISCC.2018.8538553","url":null,"abstract":"Due to the reconfiguration overhead of optical fabrics, batch scheduling method is generally used to schedule an optical packet switch, with a necessary speedup inside the switch to ensure 100% throughput with a bounded packet delay. Existing algorithms take each traffic matrix as a batch, and adopt traffic matrix decomposition techniques to decompose it into the sum of a set of weighted permutation matrices (which are then used as switch configurations). Nevertheless, existing algorithms adopt an equal weight for all switch configurations, meaning that each configuration should be held for the same time duration to transmit packets. We observe that this rigid strategy may limit the flexibility of the scheduling and result in a large speedup requirement due to inefficient time slot utilization. Motivated by this observation, we propose a UWS (Unequal Weight Sequence) algorithm to decompose the traffic matrix. UWS uses a different weight for each switch configuration. It first takes an arithmetic progression as the starting weight sequence, and then adjusts the weights for configurations to ensure 100% throughput with a bounded packet delay (such that QoS can be guaranteed). We theoretically prove that the worst case speedup of UWS will never be larger than that of the best existing ADAPT algorithm. Simulation results indeed demonstrate a speedup improvement of around 15%.","PeriodicalId":233592,"journal":{"name":"2018 IEEE Symposium on Computers and Communications (ISCC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134621705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}