2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)最新文献

筛选
英文 中文
A preference-aware trajectory privacy-preserving scheme in location-based social networks 基于位置的社交网络中偏好感知轨迹隐私保护方案
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-05-01 DOI: 10.1109/INFCOMW.2017.8116482
Liang Zhu, Changqiao Xu, Jianfeng Guan, Yang Liu, Hongke Zhang
{"title":"A preference-aware trajectory privacy-preserving scheme in location-based social networks","authors":"Liang Zhu, Changqiao Xu, Jianfeng Guan, Yang Liu, Hongke Zhang","doi":"10.1109/INFCOMW.2017.8116482","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116482","url":null,"abstract":"Trajectory privacy-preserving for Location-based Social Networks (LBSNs) has been received much attention to protect the sensitive location information of subscribers from leaking. Existing trajectory privacy-preserving schemes in literature are confronted with three problems: 1) it is limited for privacy-preserving by only considering the location anonymization in practical environment, and the sensitive locations are always revealed by this way; 2) they fail to consider the user preference and background information in trajectory anonymization, which is important to keep personalized location-based service; 3) they can not be adapted to different kinds of privacy risk levels, resulting in low the service precision. To tackle the above problems, we propose PTPP, a preference-aware trajectory privacy-preserving scheme. First, we model the user preference by considering movement pattern, user familiarity and location popularity. Then, we classify the privacy risk levels according to user familiarity and location popularity. Finally, we propose a preference-aware trajectory anonymization algorithm by considering privacy risk levels. The experimental results show that our method outperforms the existing method in terms of data utility and efficiency.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115480104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Topology inference of multilayer networks 多层网络的拓扑推理
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-05-01 DOI: 10.1109/INFCOMW.2017.8116495
Panagiotis A. Traganitis, Yanning Shen, G. Giannakis
{"title":"Topology inference of multilayer networks","authors":"Panagiotis A. Traganitis, Yanning Shen, G. Giannakis","doi":"10.1109/INFCOMW.2017.8116495","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116495","url":null,"abstract":"Linear structural equation models (SEMs) have been very successful in identifying the topology of complex graphs, such as those representing tactical, social and brain networks. The rising popularity of multilayer networks, presents the need for tools that are tailored to leverage the layered structure of the underlying network. To this end, a multilayer SEM is put forth, to infer causal relations between nodes belonging to multilayer networks. An efficient algorithm based on the alternating direction method of multipliers (ADMM) is developed, and preliminary tests on synthetic as well as real data demonstrate the effectiveness of the proposed approach.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116630821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Contracts as entry barriers for unlicensed spectrum 合约是进入非授权频谱的障碍
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-05-01 DOI: 10.1109/INFCOMW.2017.8116484
Yining Zhu, R. Berry
{"title":"Contracts as entry barriers for unlicensed spectrum","authors":"Yining Zhu, R. Berry","doi":"10.1109/INFCOMW.2017.8116484","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116484","url":null,"abstract":"Greater unlicensed access to spectrum has the potential to increase competition among wireless service providers and encourage innovations by lowering barriers to entry. However, early providers offering service in such a band could create new entry barriers through the use of contracts that impose a penalty on customers who switch to a new provider. This paper discusses cases in which an exclusive or non-exclusive contract may be signed before entrants come into an unlicensed spectrum market. Our results indicate that the incumbents will always offer an exclusive contract, which would increase the expected customer surplus. The expected social welfare may increase or decrease depending on how we model the customers' demand, and the technology of the incumbents and entrants.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121124218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Multicommodity games in public-cloud markets considering subadditive resource demands 考虑次可加性资源需求的公共云市场中的多商品博弈
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-05-01 DOI: 10.1109/INFCOMW.2017.8116454
G. Kesidis, N. Nasiriani, Y. Shan, B. Urgaonkar, I. Lambadaris
{"title":"Multicommodity games in public-cloud markets considering subadditive resource demands","authors":"G. Kesidis, N. Nasiriani, Y. Shan, B. Urgaonkar, I. Lambadaris","doi":"10.1109/INFCOMW.2017.8116454","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116454","url":null,"abstract":"In still developing, public cloud-computing markets, prices for virtual machine (VM) offerings fluctuate, and not just for spot/preemptible instances. Moreover, some (particularly derivative) providers allow for fine-grain initial resource provisioning and dynamic reprovisioning of VMs. In this preliminary study, we consider long-lived tenants of a public cloud under resource-based service-level agreements. For noncooperative aggregative multicommodity (plural IT resource) games among them, conditions are established for an interior Nash equilibrium and an exact potential (giving convergence to Nash equilibrium). Also discussed are extensions to plural IT resource demands that are subadditive in workload intensity.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127256000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CO-RTO: Achieving efficient data retransmission in VNDN by correlations implied in names CO-RTO:通过名称中隐含的相关性实现VNDN中有效的数据重传
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-05-01 DOI: 10.1109/INFCOMW.2017.8116404
Yuwei Xu, Siyan Yao, Changhai Wang, Jingdong Xu
{"title":"CO-RTO: Achieving efficient data retransmission in VNDN by correlations implied in names","authors":"Yuwei Xu, Siyan Yao, Changhai Wang, Jingdong Xu","doi":"10.1109/INFCOMW.2017.8116404","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116404","url":null,"abstract":"Packet loss is a serious phenomenon in Vehicular Ad-hoc NETworks (VANETs). Although the multi-source and in-network caching characteristics of Named Data Networking (NDN) can help the consumer to retrieve named content, how to provide reliable named data transmission in vehicular environment is still a problem. To achieve the named data retransmission, previous works follow the traditional RTO algorithms based on the latest RTT samples. Since the host-to-host transmission mode is broken by the multi-source and high dynamic Vehicular Named Data Networking (VNDN), those algorithms are no longer applicable. In this paper, we first put forward the concept of correlativity between two chunk transmissions, then quantify it by the logic and physical semantics implied in names, and finally propose CO-RTO, a correlativity-based algorithm which estimates the Retransmission TimeOut (RTO) according to the RTT samples with high correlativity. We have validated our approach in an urban traffic scenario on ndnSIM. The simulation results show that CO-RTO is more efficient than some classic algorithms in named data retransmission.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127499957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Poster abstract: Resource allocation with service availability & QoS constraints in mobile fog networks 海报摘要:移动雾网络中具有服务可用性和QoS约束的资源分配
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-05-01 DOI: 10.1109/INFCOMW.2017.8116539
N. Daneshfar, N. Pappas, Vangelis Angelakis
{"title":"Poster abstract: Resource allocation with service availability & QoS constraints in mobile fog networks","authors":"N. Daneshfar, N. Pappas, Vangelis Angelakis","doi":"10.1109/INFCOMW.2017.8116539","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116539","url":null,"abstract":"The evolution of the Internet of Things (IoT) is bringing Cloud services closer to the networks' edge. Thus, fog networking presents itself as an approach aiming to utilize more and more resources in network edge devices to provide various networking tasks. This work presents an optimization formulation that minimizes the cost of executing a set of services, taking into account the availability of resources in mobile edge devices.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125035215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cumulative prospect theoretic study of a cloud storage defense game against advanced persistent threats 针对高级持续性威胁的云存储防御博弈累积前景理论研究
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-05-01 DOI: 10.1109/INFCOMW.2017.8116435
Dongjin Xu, Liang Xiao, N. Mandayam, H. Poor
{"title":"Cumulative prospect theoretic study of a cloud storage defense game against advanced persistent threats","authors":"Dongjin Xu, Liang Xiao, N. Mandayam, H. Poor","doi":"10.1109/INFCOMW.2017.8116435","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116435","url":null,"abstract":"Cloud storage is vulnerable to advanced persistent threats (APTs), in which an attacker launches stealthy, continuous, well-funded and targeted attacks on storage devices. In this paper, cumulative prospect theory (CPT) is applied to study the interactions between a defender of cloud storage and an APT attacker when each of them makes subjective decisions to choose the scan interval and attack interval, respectively. Both the probability weighting effect and the framing effect are applied to model the deviation of subjective decisions of end-users from the objective decisions governed by expected utility theory, under uncertain attack durations. Cumulative decision weights are used to describe the probability weighting effect and the value distortion functions are used to represent the framing effect of subjective APT attackers and defenders in the CPT-based APT defense game, rather than discrete decision weights, as in earlier prospect theoretic study of APT defense. The Nash equilibria of the CPT-based APT defense game are derived, showing that a subjective attacker becomes risk-seeking if the frame of reference for evaluating the utility is large, and becomes risk-averse if the frame of reference for evaluating the utility is small.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123784190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Improving the energy performance of GPS receivers for location tracking applications 改善GPS接收器的能量性能,用于位置跟踪应用
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-05-01 DOI: 10.1109/INFCOMW.2017.8116357
Kongyang Chen, Guang Tan, Mingming Lu
{"title":"Improving the energy performance of GPS receivers for location tracking applications","authors":"Kongyang Chen, Guang Tan, Mingming Lu","doi":"10.1109/INFCOMW.2017.8116357","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116357","url":null,"abstract":"Integrated GPS receivers have become a basic module in location based services, such as position sharing, wild animal monitoring, and location tracking. However, GPS modules have a serious battery drain problem due to their high computation load. This paper aims to reveal the impact of key software parameters on GPS energy consumption, by establishing an energy model for a standard GPS receiver architecture as found in both academic and industrial designs. In particular, our measurements show that the receiver's energy consumption is in large part linear with the number of tracked satellites. This leads to a design of selective tracking algorithm that provides similar positioning accuracy (around 12m) with a subset of selected satellites, which translates to an energy saving of 22.7%.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116093272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
On active queue management in cellular networks 蜂窝网络中的主动队列管理
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-05-01 DOI: 10.1109/INFCOMW.2017.8116407
Joseph D. Beshay, A. T. Nasrabadi, R. Prakash, A. Francini
{"title":"On active queue management in cellular networks","authors":"Joseph D. Beshay, A. T. Nasrabadi, R. Prakash, A. Francini","doi":"10.1109/INFCOMW.2017.8116407","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116407","url":null,"abstract":"Active queue management (AQM) is broadly accepted as the tool of choice for tackling bufferbloat (the accumulation of large queueing delays) in network buffers. CoDel and PIE are considered two of the most promising AQM schemes, but little has been done to adopt them in cellular networks, which are particularly plagued by bufferbloat. This is partly due to the lack of adequate evaluation of their performance on links where the data rate varies quickly and widely. Past studies have used simplistic link models and thus do not provide a strong case for the adoption of either scheme in cellular networks. We study the performance of CoDel and PIE on a recently introduced emulator that accurately reproduces the highly variable nature of cellular links. We discover that both schemes incur link utilization losses up to 60% in return for reducing queueing delay. This trade-off is undesirable for network providers and applications, yet it is inherent to the design of both CoDel and PIE. We argue that AQM schemes designed around the primary goal of maximizing network power (the ratio between throughput and queuing delay) are not the most effective tool for tackling bufferbloat in cellular links. We propose a new queue balance metric as the driving criterion for designing more effective congestion control solutions for cellular networks.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"320 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122714709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Collaborative hierarchical caching in cloud radio access networks 云无线接入网络中的协同分层缓存
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-05-01 DOI: 10.1109/INFCOMW.2017.8116420
Xiuhua Li, Peiran Wu, Xiaofei Wang, Keqiu Li, Zhu Han, Victor C. M. Leung
{"title":"Collaborative hierarchical caching in cloud radio access networks","authors":"Xiuhua Li, Peiran Wu, Xiaofei Wang, Keqiu Li, Zhu Han, Victor C. M. Leung","doi":"10.1109/INFCOMW.2017.8116420","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116420","url":null,"abstract":"To deal with the severe challenge from explosively increasing mobile users' multimedia service requests in mobile networks, introducing cloud-based computing platform and content caching into radio access networks (RANs) has become an effective emerging technique. In this paper, we propose a collaborative hierarchical caching framework in cloud RANs (C-RANs), which minimizes the access delay of content delivery under certain specific network constraints to improve users' Quality of Service (QoS) as well as offload network traffic. Specifically, based on the formed hierarchical caching topology consisting of two tiers of content caching at the base stations and the cloud central unit (CCU), we decompose the formulated large-scale optimization problem into a series of simpler subproblems, and then propose the corresponding low-complexity distributed heuristic solutions as well as a content request routing scheme. Trace-based evaluation results demonstrate the effectiveness of the proposed framework.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122460087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信