2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)最新文献

筛选
英文 中文
Multi-Agent Data Collection in Non-Stationary Environments 非平稳环境下的多智能体数据采集
N. Nguyen, D. Nguyen, Junae Kim, G. Rizzo, H. Nguyen
{"title":"Multi-Agent Data Collection in Non-Stationary Environments","authors":"N. Nguyen, D. Nguyen, Junae Kim, G. Rizzo, H. Nguyen","doi":"10.1109/WoWMoM54355.2022.00023","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00023","url":null,"abstract":"Coordinated multi-robot systems are an effective way to harvest data from sensor networks and to implement active perception strategies. However, achieving efficient coordination in a way which guarantees a target QoS while adapting dynamically to changes (in the environment, due to sensors’ mobility, and/or in the value of harvested data) is to date a key open issue. In this paper, we propose a novel decentralized Monte Carlo Tree Search algorithm (MCTS) which allows agents to optimize their own actions while achieving some form of coordination, in a changing environment. Its key underlying idea is to balance in an adaptive manner the exploration-exploitation trade-off to deal effectively with abrupt changes caused by the environment and random changes caused by other agents’ actions. Critically, outdated and irrelevant samples - an inherent and prevalent feature in all multi-agent MCTS-based algorithms - are filtered out by means of a sliding window mechanism. We show both theoretically and through simulations that our algorithm provides a log-factor (in terms of time steps) smaller regret than state-of-the-art decentralized multi-agent planning methods. We instantiate our approach on the problem of underwater data collection, showing on a set of different models for changes that our approach greatly outperforms the best available algorithms for that setting, both in terms of convergence speed and of global utility.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124919066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vineyard Digital Twin: construction and characterization via UAV images – DIWINE Proof of Concept 葡萄园数字孪生:通过无人机图像构建和表征- DIWINE概念验证
Francesco Edemetti, Angela Maiale, Camillo Carlini, Olga D’Auria, J. Llorca, A. Tulino
{"title":"Vineyard Digital Twin: construction and characterization via UAV images – DIWINE Proof of Concept","authors":"Francesco Edemetti, Angela Maiale, Camillo Carlini, Olga D’Auria, J. Llorca, A. Tulino","doi":"10.1109/WoWMoM54355.2022.00094","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00094","url":null,"abstract":"The DIWINE project aims to play a salient role in the Smart and Sustainable Agriculture industry by enabling creation of a Digital Twin platform for a vineyard. It is conceived as a disruptive solution based on the use of: Unmanned Aerial Vehicles (UAVs), 5G, edge/cloud computing, Machine Learning (ML) and Artificial Intelligence (AI). The platform leverages key 5G technologies such as 5G New Radio (NR) and Multi Access Edge computing (MEC) to remotely control the UAVs and to transfer captured high-resolution images to the cloud. Moreover, the computational power of MEC and central cloud computing enables the use of ML and AI algorithms to process captured data and transform it into a highly accurate Digital Twin. The winemaker has an immediate and flexible access to the Digital Twin platform and is also able to integrate existing technologies, such as IoT sensors and weather forecasts. DIWINE allows: an efficient management of the vineyard, accurately differentiating the final product, simulating different possible scenarios, and optimizing the farm’s consumption, supporting the winemaker to minimize missed harvests risk, and optimizing profitability.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122439159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Migration Path Toward Green Edge Gaming 向绿色边缘游戏的迁移路径
Francesco Spinelli, V. Mancuso
{"title":"A Migration Path Toward Green Edge Gaming","authors":"Francesco Spinelli, V. Mancuso","doi":"10.1109/WoWMoM54355.2022.00033","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00033","url":null,"abstract":"5G and beyond 5G networks will allow novel use cases by placing constrained computing nodes at the edge, following the Multi-access Edge Computing (MEC) paradigm. Edge nodes could be partially powered by intermittent renewable energies, leading to the possibility of having time-varying computing capacities. In this scenario, we tackle the problem of how to support gaming at the edge of the cellular network. Moving cloud-based games to the edge could be a premium service for end-users, thanks to reduced latency and higher bandwidth. The goal of our paper is to design a scheme that maximizes the utility of a service/infrastructure provider in a MEC scenario, with time-varying MEC nodes capacities powered by intermittent renewable energies. We formulate a multi-dimensional integer linear programming problem, proving that it is NP Hard in the strong sense. We prove that our problem is sub-modular and propose an efficient heuristic, GREENING, which considers the allocation of gaming sessionse and their migration. Through simulations, we show that our heuristic achieves performance close to what achievable by a solver, except with extremely lower complexity, and performs near-optimally, 20% better than state-of-the-art algorithms in terms of system utility. We also show that our scheme is compliant with currently adopted standards by ETSI and meant to support novel networking principles like network slicing.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131138132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adapting the Resource Reservation Interval for Improved Congestion Control in NR-V2X 利用资源预留间隔改进NR-V2X拥塞控制
Brian McCarthy, Aisling O'Driscoll
{"title":"Adapting the Resource Reservation Interval for Improved Congestion Control in NR-V2X","authors":"Brian McCarthy, Aisling O'Driscoll","doi":"10.1109/WoWMoM54355.2022.00045","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00045","url":null,"abstract":"This paper presents a detailed quantitative evaluation of standardised ETSI & 3GPP Decentralised Congestion Control (DCC) and packet dropping mechanisms for Cellular V2X (C-V2X) and New Radio (NR) V2X. Based on the identified shortcomings, an Access layer scheme, RRI DCC, is then proposed. RRI DCC explicitly accommodates the sidelink scheduling mechanism Sensing Based Semi-Persistent Scheduling (SB-SPS), eliminating incompatibilities between current standards and the scheduling mechanism, to avoid unnecessary and recurring collisions. Three variants are proposed; one is an evolution of the ETSI Reactive DCC mechanism, the second is based on the ETSI Adaptive DCC mechanism and the final aligns with the 3GPP approach based on channel occupancy ratio (CR). All approaches are compared with current ETSI and 3GPP standards and exhibit improved performance. An evaluation of the proposed RRI DCC mechanisms and existing DCC standards, to meet the Quality of Service (QoS) requirements of vehicular cooperative awareness applications is also conducted.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133101068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Edge-Cloud Collaboration for Human Activity Recognition on Multiple Subjects 多主题人类活动识别的边缘云协作
Wenjing Xiao, Linfu Xie, Jin Ning, Ziyu Fu, Mingde Zhao, Zhenjie Lin, Qiang Lin
{"title":"Edge-Cloud Collaboration for Human Activity Recognition on Multiple Subjects","authors":"Wenjing Xiao, Linfu Xie, Jin Ning, Ziyu Fu, Mingde Zhao, Zhenjie Lin, Qiang Lin","doi":"10.1109/WoWMoM54355.2022.00030","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00030","url":null,"abstract":"Multi-subject video analysis is one of the most important problems in the field of visual perception for human activity recognition on multiple subjects nowadays. However, multi-subject video analysis is difficult to achieve real-time performance at the edge due to the limited resources of edge devices and the high complexity of the Convolutional Neural Networks (CNN) model used in this task. The common processing method is to upload the video data to the cloud. However, due to the influence of network bandwidth, the transmission time is not fixed, and the latency cannot be guaranteed. Thus, statically deployed model configurations cannot meet some dynamically changing scenarios. To address these challenges, in this paper, we propose an edge-cloud collaboration processing system for multi-subject video stream analysis, which can dynamically configure and optimize the related configurations according to specific scenarios. Specifically, we provide an adaptive configuration optimization solution based on context awareness for edge devices with limited resources such that multi-subject video stream analysis can be processed completely at the edge. For other complex scenarios, we propose an edge-cloud collaboration method to achieve task segmentation and collaboration to meet the performance requirements of the complex scenarios. Experimental results show that our method can achieve an average accuracy of 91.3% and the latency of less than 78ms with arbitrary runtime state.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133789308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling Service Mixes in Access Links: Product Form and Oscillations 访问链接中的服务混合建模:产品形式和振荡
A. Marin, M. Meo, M. Sereno, M. Marsan
{"title":"Modeling Service Mixes in Access Links: Product Form and Oscillations","authors":"A. Marin, M. Meo, M. Sereno, M. Marsan","doi":"10.1109/WoWMoM54355.2022.00065","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00065","url":null,"abstract":"We consider an access link of a data network loaded with data flows generated by streaming and elastic services requested by fixed or mobile end users, and subjected to an admission control (AC) algorithm. For the performance analysis of such link we develop a new queuing model and we show that, with the considered AC, the queuing model admits a product form expression for the joint limiting probability distribution of the numbers of active services of the different types. Numerical results show unexpected oscillating behaviors for several performance metrics, and provide interesting insight into the link performance.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114413064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reviewers: Main Conference 审稿人:主要会议
{"title":"Reviewers: Main Conference","authors":"","doi":"10.1109/wowmom54355.2022.00008","DOIUrl":"https://doi.org/10.1109/wowmom54355.2022.00008","url":null,"abstract":"","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114863253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RF-SITL: A Software-in-the-loop Channel Emulator for UAV Swarm Networks 一种用于无人机群网络的软件在环信道仿真器
Nicholas Mastronarde, Daniel Russell, Zhangyu Guan, George Sklivanitis, D. Pados, E. Bentley, M. Medley
{"title":"RF-SITL: A Software-in-the-loop Channel Emulator for UAV Swarm Networks","authors":"Nicholas Mastronarde, Daniel Russell, Zhangyu Guan, George Sklivanitis, D. Pados, E. Bentley, M. Medley","doi":"10.1109/WoWMoM54355.2022.00076","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00076","url":null,"abstract":"We introduce RF-SITL, a radio frequency (RF) software-in-the-loop (SITL) channel emulator developed with GNU Radio and the University at Buffalo’s Airborne Networking and Communications (UB-ANC) emulator to enable integrated simulation of systems comprising multiple unmanned aerial vehicles (UAVs) interacting over a wireless communication channel. RF-SITL could be paired with any multi-robot simulator to enable I/Q sample-level fidelity simulation of communication interactions between the robots by accurately simulating channel effects, including interference, noise, distance-dependent path loss, and packet losses. RF-SITL works as follows: 1) it instantiates a virtual software-defined transceiver in GNU Radio for each UAV simulated in the UB-ANC Emulator; 2) it builds an interference channel model in which each network node receives the superposition of signals transmitted from other nodes; and 3) it synchronizes the location of each simulated UAV in the UB-ANC Emulator with the virtualized RF transceivers in RF-SITL, such that the communication channel between nodes can accurately model distance-dependent channel effects, such as path loss. With these capabilities, we can use both off-the-shelf and custom-built signal processing flowgraphs that simulate Gaussian Minimum Shift Keying (GMSK), 802.11-like Orthogonal Frequency Division Multiplexing (OFDM), and direct sequence spread-spectrum (DSSS) links in GNU Radio to simulate swarm UAV networks prior to their deployment in software-defined radios in a swarm UAV network.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123150691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy monitoring of LoRaWAN devices through traffic stream analysis 通过流量流分析实现LoRaWAN设备的隐私监控
Francesco Terenzi, Pietro Spadaccino, F. Cuomo
{"title":"Privacy monitoring of LoRaWAN devices through traffic stream analysis","authors":"Francesco Terenzi, Pietro Spadaccino, F. Cuomo","doi":"10.1109/WoWMoM54355.2022.00062","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00062","url":null,"abstract":"LoRaWAN is a wireless technology developed to transmit over long distances using low power. It runs over the proprietary LoRa radio modulation and provides fundamental IoT requirements such as bi-directional communication, end-to-end security, key management, mobility, and localization services. Despite LoRaWAN guarantees confidentiality and integrity of application payload, the wireless nature of the medium causes that an eavesdropper, listening to the network communications, can collect non-encrypted information stored in the packets. In particular, it can obtain two sensible metadata elements, called DevAddress e DevEUI. Since the association between these elements can involve privacy issues, LoRaWAN forces endpoints to expose their DevEUI only during the association procedure to avoid the association with the corresponding DevAddress. In the first part of this work, we prove how an adversary can link them nevertheless. Then we explain the consequences for the privacy of devices and users that joined the network and propose PIVOT (Privacy-Monitoring), an analyzer system for LoRaWAN that detects in real-time vulnerable endpoints. Furthermore, we explain how the metrics used in PIVOT can support the operator in applying adequate countermeasures. Finally, we test our scheme on a simulated LoRaWAN application and examine the results obtained.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124297469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast Approximation Algorithms for Multiple Coverage with Unit Disks 单位磁盘多重覆盖的快速逼近算法
Xuening Gao, Longkun Guo, Kewen Liao
{"title":"Fast Approximation Algorithms for Multiple Coverage with Unit Disks","authors":"Xuening Gao, Longkun Guo, Kewen Liao","doi":"10.1109/WoWMoM54355.2022.00037","DOIUrl":"https://doi.org/10.1109/WoWMoM54355.2022.00037","url":null,"abstract":"Effective monitoring of applications in wireless sensor networks can be underpinned by the multiple coverage problem with unit disks. In the problem, we are given a set of targets T = {t1, t2, …, tn} distributed in the plane, where ti needs to be covered f(ti) times for any positive integer f(ti). The aim is to place a minimum number of disks, such that all the targets can be covered as desired. In the paper, we first present a 5-approximation algorithm with runtime O(n + m) for m = maxi{f(ti)}. Then, we give a theoretically improved 4-approximation algorithm, albeit with an increased time complexity to O(n2). In addition, we consider the online setting where targets arrive in sequence and upon each arrival the corresponding coverage disk must be placed. For this setting, we devise an online algorithm with a competitive ratio of 6 and constant update time. To verify aforementioned theoretical findings, numerical experiments are conducted to demonstrate and compare the practical performance of the proposed algorithms.","PeriodicalId":275324,"journal":{"name":"2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130026290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信