Michael A. Beck, Sebastian A. Henningsen, Qian Xu, Jianping Wang, Kui Wu, Xian Liu
{"title":"Demo abstract: An integrated tool of applying stochastic network calculus for network performance analysis","authors":"Michael A. Beck, Sebastian A. Henningsen, Qian Xu, Jianping Wang, Kui Wu, Xian Liu","doi":"10.1109/INFCOMW.2017.8116512","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116512","url":null,"abstract":"With the recent emergence of online network performance measuring tools, Internet users are now able to measure their received service levels. Such user-initiated network performance measurements push the ISPs to an ever-high standard, requiring them to know the worst-case performance of its admitted flows, whether and where to accommodate a new flow request, without violating the service agreement level (SLA). Stochastic Network Calculus (SNC) has been developed to derive performance bounds of a network system for many years in the research community. However, it has not been practically adopted by ISPs due to the lack of a tool supporting features such as end-to-end analysis or optimal parameter tuning. In this demo, we extended the DISCO Stochastic Network Calculator. We also compare the analytical results obtained from the tool with the simulation results obtained in NS-3 to validate the tightness of the performance bounds.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128638112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Location-centric flow flux for improved indoor mobility models","authors":"Mimonah Al Qathrady, A. Helmy","doi":"10.1109/INFCOMW.2017.8116395","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116395","url":null,"abstract":"Understanding the mobile user flow flux patterns is important for numerous applications relevant to crowd movement, from information sharing, networking, to security and public health. Particularly in instances of smart buildings and hospitals, among others, the flow between indoor locations, and mobility modeling within buildings is of a prime significance. Much of the mobility modeling studies have focused on a user-centric approach for outdoors movement. In this study, we take a location-centric approach for indoor mobility to analyze and characterize region relationships as pertains to user flow. Our study is trace-driven, as we use extensive measurements from wireless LANs, and mine them to quantify metrics for influx and outflux and show their stability for various buildings at university campus involving more than 108K anonymous mobile users and more than 3 million records. The flux degrees are shown to be temporally stable where their coefficient of variations do not exceed 0.42. However, the correlation between the degrees and dynamic spatial density is not always strongly positive and it varies between buildings. Finally, we outline several smart buildings applications of location-centric flow flux.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"65 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129817464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demo abstract: Stemflow: Inter-datacenter overlay as a service","authors":"Shuhao Liu, Baochun Li","doi":"10.1109/INFCOMW.2017.8116518","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116518","url":null,"abstract":"Thanks to the abundant available bandwidth and multiple paths on wide-area links that interconnect datacenters on major cloud platforms, it is conceivable that bandwidth-intensive applications may improve their performance by relaying their traffic through such an inter-datacenter network. We propose Stemflow, a new systems framework that provides Inter-Datacenter Overlay as a Service. It is provided as a turn-key solution for applications to conveniently and transparently tap into the available bandwidth resources across datacenters in the cloud, with internal optimizations on the performance of data delivery. Internally, we have implemented Stemflow as a software-defined overlay. We present two interactive cloud applications built upon Stemflow — live video broadcast and instant messaging — to demonstrate the ease of development and the performance gains by using Stemflow.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130954802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gaoyang Guan, Kaibo Fu, Zhihao Cheng, Yi Gao, Wei Dong
{"title":"Rapid development of IoT applications with TinyLink","authors":"Gaoyang Guan, Kaibo Fu, Zhihao Cheng, Yi Gao, Wei Dong","doi":"10.1109/INFCOMW.2017.8116508","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116508","url":null,"abstract":"TinyLink is a holistic system for rapid development of IoT applications. It adopts a top down approach for both hardware and software designs of IoT applications. Taking the application code as input, TinyLink automatically generates the hardware configuration as well as the software binary code executable on the targeted hardware platform. Objective of this demo is to present how the the hardware configuration and software binary code are automatically generated, as well as how to assemble the hardware components, burn the binary code and validate the functionalities.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121210156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Poster abstract: En route towards trace-based simulation of vehicular mobility","authors":"Roozbeh Ketabi, Babak Alipour, A. Helmy","doi":"10.1109/INFCOMW.2017.8116540","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116540","url":null,"abstract":"This study addresses issues of vehicular mobility scenario generation using the framework called En Route. By applying the framework to planet scale imagery dataset (traffic cameras) we were able to model the traffic demand of a large scale urban scenario (city of London) by means of origin/destination matrix and trips starting within 30 minutes. Along the way, we investigate the relationship of traffic flow (vehicles per minute) vs occupancy, lognormality of trip duration distribution and number of trips started within 30 minutes using available datasets of Berkeley highways and taxicabs of Beijing and San Francisco (SF). We then compare different routing methods and study the effects of system parameters on the number of generated trips.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122723476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A trust evaluation framework using in a vehicular social environment","authors":"Xiao Chen, Liangmin Wang","doi":"10.1109/INFCOMW.2017.8116532","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116532","url":null,"abstract":"The development of mobile industry promotes a deep progress of mobile applications, such as vehicular social networks (VSNs), which afford large scale data sharing between vehicles. However, trustworthiness has still been a potential security issue. Traditional public key infrastructure (PKI) cannot restrain malicious users as they are authorized in VSNs. For the reason, this paper proposes a trust evaluation framework for VSNs, and designs a cloud-based network architecture to implement the trust framework. Moreover, performance evaluation is conducted through a novel compositional formal method — PEPA (Performance Evaluation Process Algebra).","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115622789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PCD: A privacy-preserving predictive clinical decision scheme with E-health big data based on RNN","authors":"Jiaping Lin, J. Niu, Hui Li","doi":"10.1109/INFCOMW.2017.8116480","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116480","url":null,"abstract":"As large amount of e-health data is generated exponentially, recurrent neural networks (RNN) can be utilized to make predictive clinical decision which is helpful to improve diagnosis accuracy and reduce diagnosis time. However, it is still a challenging task to guarantee the information security and solve the privacy concerns. We design a new Privacy-preserving Predictive Clinical Decision scheme based on RNN, called PCD, that can predict and alert before diseases occur while preserving the privacy of patients. In PCD, we utilize a homomorphic encryption scheme, so no e-health data will be leaked. PCD could resist various security threats. We design a sequential and an averaged RNN model in real-time systems that is capable to improve prediction accuracy. The experimental results illustrate that our scheme achieves high disease prediction accuracy and time efficiency while protecting privacy of patients.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114421487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pricing and bidding strategies for cloud computing spot instances","authors":"Jiayi Song, R. Guérin","doi":"10.1109/INFCOMW.2017.8116453","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116453","url":null,"abstract":"We consider a cloud service based on spot instances and explore bidding and pricing strategies aimed at optimizing users' utility and provider's revenue, respectively. Our focus is on jobs that are heterogeneous in both valuation and sensitivity to execution delay. Of particular interest is the impact of correlation in these two dimensions. We characterize optimal bidding and pricing strategies under some simplifying assumptions, and more importantly highlight the impact of correlation in determining the benefits of a spot service over an on-demand service. We also provide a preliminary assessment of the results' robustness under more general assumptions.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116142349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Doppler warp correction for wideband burst communications","authors":"Avik Dayal, A. Beex","doi":"10.1109/INFCOMW.2017.8116380","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116380","url":null,"abstract":"Burst communications in a wideband environment subject to Doppler, multipath, and noise is challenging. An example is the Underwater Acoustic (UWA) channel. Compared to the over-the-air radio frequency (RF) channel, the UWA channel is subject to severe distortions due to Doppler as well as multipath. The challenge of interest is wideband burst communications in such an environment. Thereto the effect of Doppler is modeled as a quadratic time warp. A procedure is developed to estimate the parameters of the time warp based on observed burst signal components, so that subsequently the Doppler time warp can be undone. Two different methods are compared. The first technique uses sinusoids in a pre- and in a post-amble to a communications burst, while the second technique uses out of band (communication signal bandwidth) sinusoids present during the burst. The results, from over-the-air acoustic proxy experiments, show that performance improvements can be realized using the Doppler time warp model and correction process.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124930056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yiyang Chang, G. Petri, Sanjay G. Rao, Tiark Rompf
{"title":"Composing middlebox and traffic engineering policies in SDNs","authors":"Yiyang Chang, G. Petri, Sanjay G. Rao, Tiark Rompf","doi":"10.1109/INFCOMW.2017.8116409","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116409","url":null,"abstract":"Middleboxes present new requirements that need to be integrated with traffic engineering applications that are already complex and consider myriad factors (e.g., routing, QoS, load-balancing). While it is possible to revisit traffic engineering algorithms to explicitly integrate middleboxes, such an approach is not compositional. Existing efforts at compositional SDN application development do not apply since they support application composition after static packet-forwarding policies are generated by application modules. Consequently, routes computed by a traffic engineering module cannot be influenced by the constraints imposed by a module that specifies middlebox traversal requirements. In this paper, we explore an alternate approach where application composition is done prior to the generation of packet-forwarding policies. Each application is written as a logic program, and provides a set of requirements that must be respected by a synthesized solution. A constraint solving engine iterates over these requirements to search the solution space and find a solution respecting all the requirements. We illustrate our approach with a concrete case study, and implement it using the Z3 SMT solver [1]. Our initial results point to the promise of the approach.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123612999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}