2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)最新文献

筛选
英文 中文
Demo abstract: PopperCI: Automated reproducibility validation 演示摘要:popici:自动再现性验证
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-05-01 DOI: 10.1109/INFCOMW.2017.8116506
I. Jimenez, Sina Hamedian, J. Lofstead, C. Maltzahn, K. Mohror, Remzi H. Arpaci-Dusseau, A. Arpaci-Dusseau, R. Ricci
{"title":"Demo abstract: PopperCI: Automated reproducibility validation","authors":"I. Jimenez, Sina Hamedian, J. Lofstead, C. Maltzahn, K. Mohror, Remzi H. Arpaci-Dusseau, A. Arpaci-Dusseau, R. Ricci","doi":"10.1109/INFCOMW.2017.8116506","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116506","url":null,"abstract":"In this demo we illustrate the usage of PopperCI [1], a continous integration (CI) service for experiments hosted at UC Santa Cruz that allows researchers to automate the end-to-end execution and validation of experiments. PopperCI assumes that experiments follow Popper [2], a convention for implementing experiments and writing articles following a DevOps approach that has been proposed recently.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131096834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online anomalous vehicle detection at the edge using multidimensional SSA 基于多维SSA的边缘异常车辆在线检测
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-05-01 DOI: 10.1109/INFCOMW.2017.8116487
N. Chen, Zekun Yang, Yu Chen, Aleksey S. Polunchenko
{"title":"Online anomalous vehicle detection at the edge using multidimensional SSA","authors":"N. Chen, Zekun Yang, Yu Chen, Aleksey S. Polunchenko","doi":"10.1109/INFCOMW.2017.8116487","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116487","url":null,"abstract":"We are witnessing the giant leap of Smart Cities and the prosperity of Internet of Things (loTs), but the anomalous vehicle surveillance issues in Intelligent Transportation Systems (ITS) are still challenging, especially when more computing tasks are migrated from Cloud center to the network edge. Different research studies attempted to tackle this problem, however, existing approaches are either requiring large training data sets or presenting detection unreliability without prior knowledge. In this paper, we propose to identify anomalous vehicles on roads in real-time using multidimensional Singular Spectrum Analysis (mSSA). Inspired by the excellent performance of the SSA algorithms in change point detection in time series, we adopted it to catch the differences in the dimension of characteristics of vehicles on roads. The multiple factors of vehicles' behavior are mapped into multiple channels in the mSSA framework. Instead of pre-training or defining normal motion patterns of vehicles, the anomaly detection is formatted as an outlier identifying problem. Using two vehicle trajectory data sets, the feasibility and effectiveness of our approach are verified. Comparing to other proposed methods like clustering, the experimental results show that our approach is more reliable and robust.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"25 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114118127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
IP-based seamless handover scheme using ANDSF in an untrusted environment 在不可信环境中使用ANDSF的基于ip的无缝切换方案
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-05-01 DOI: 10.1109/INFCOMW.2017.8116444
Fang-Yie Leu, Po-Yu Tsai, I. You, Hsing-Chung Chen
{"title":"IP-based seamless handover scheme using ANDSF in an untrusted environment","authors":"Fang-Yie Leu, Po-Yu Tsai, I. You, Hsing-Chung Chen","doi":"10.1109/INFCOMW.2017.8116444","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116444","url":null,"abstract":"In an Inter-WLAN-System, when an UE needs to hand over to an untrusted network, e.g., M, from its serving network, e.g., N, how to choose M and the best base station under M currently is a problem yet to be completely solved, no matter whether M and N belong to the same alliance group or not and no matter whether M and N are homogeneous or heterogeneous networks. In fact, 3GPP recommended ANDSF to solve this problem when N is a 3GPP network and M is a non-3GPP system or vice versa, i.e., when they are heterogeneous networks. Also, when selecting M, current approach neither considers the entire characteristics of mobile users, nor having significant discovery and selection policies to show the states of M, thus often leading UE to select an inappropriate M and/or a base station B in M. It results in the fact that after handover, UE may sometimes find that Radio Signal Strength Indicator (RSSI) of B is not strong, and even UE cannot connect itself to B since B's load is high. That means when M and N do not belong to the same alliance, the problem will be more serious. It also means that if we want to solve the mentioned problem in such an environment, the functions of ANDSF need to be enhanced. Therefore, in this paper, we first design an enhanced ANDSF, named E-ANDSF, which increases ANDSF with a Multiple Parameters Decision Making (MPDM) ranking scheme based on Proxy Mobile IPv6 (PMIPv6) protocol to provide PMAG in N with sufficient information, with which UE can hand over to an appropriate base station. We also propose an improved IP-based handover approach, called IP-based Handover Scheme assisted by E-ANDSF Function (IHEADs for short), which assists UE to hand over to an appropriate target base station by accessing the information provided by E-ANDSF.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114370960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PopperCI: Automated reproducibility validation popici:自动再现性验证
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-05-01 DOI: 10.1109/INFCOMW.2017.8116418
I. Jimenez, A. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, J. Lofstead, C. Maltzahn, K. Mohror, R. Ricci
{"title":"PopperCI: Automated reproducibility validation","authors":"I. Jimenez, A. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, J. Lofstead, C. Maltzahn, K. Mohror, R. Ricci","doi":"10.1109/INFCOMW.2017.8116418","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116418","url":null,"abstract":"This paper introduces PopperCI, a continous integration (CI) service hosted at UC Santa Cruz that allows researchers to automate the end-to-end execution and validation of experiments. PopperCI assumes that experiments follow Popper, a convention for implementing experiments and writing articles following a DevOps approach that has been proposed recently. PopperCI runs experiments on public, private or government-fundend cloud infrastructures in a fully automated way. We describe how PopperCI executes experiments and present a use case that illustrates the usefulness of the service.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115159604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
LMMSE-based interference mitigation method for compressive signal 基于lmmse的压缩信号干扰抑制方法
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-05-01 DOI: 10.1109/INFCOMW.2017.8116446
Longmei Zhou, Zhuo Sun, Na Wu, Wenbo Wang
{"title":"LMMSE-based interference mitigation method for compressive signal","authors":"Longmei Zhou, Zhuo Sun, Na Wu, Wenbo Wang","doi":"10.1109/INFCOMW.2017.8116446","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116446","url":null,"abstract":"Compressive sensing (CS) is a viable source of an innovative 5G system, what's more, it's an effective technology to deal with the data redundancy problem of massive machine-to-machine communication (MMC), since it enables the recovery of sparse and approximately sparse signals with significantly fewer samples than demanded by Nyquist-Shannon sampling theory. Interference in signal will lead a series problem to signal processing, which will be a recovery error proportional to the interference energy in CS. This paper tries to mitigate interference by proposing a compressive interference pre-filter based on linear minimal mean square error (LMMSE). The main contributions are that two practical estimation methods that based on autocorrelation function and auto-covariance function respectively, are applied to estimate the LMMSE-based filtering matrix. The estimation and pre-filter algorithms can be practically integrated into the compressive signal processing framework with improved robust property to noise and interference.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116752433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting opportunities in V2V transmissions with RSU-assisted backward delivery 利用rsu辅助反向传输的V2V传输机会
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-05-01 DOI: 10.1109/INFCOMW.2017.8116388
Chao Song, Jie Wu, Wei-Shih Yang, Ming Liu, I. Jawhar, N. Mohamed
{"title":"Exploiting opportunities in V2V transmissions with RSU-assisted backward delivery","authors":"Chao Song, Jie Wu, Wei-Shih Yang, Ming Liu, I. Jawhar, N. Mohamed","doi":"10.1109/INFCOMW.2017.8116388","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116388","url":null,"abstract":"The vehicle-to-vehicle (V2V) data transmissions in Vehicular Ad-hoc Networks (VANETs) have been applied in many areas including the Internet of Vehicles, mobile data offloading, and mobile crowdsensing. The V2V-based data delivery that is opposite to the direction of a vehicle is called a backward delivery against the traffic flow, and it is blocked by an existing problem: a traffic hole. Under the backward delivery with a traffic hole problem, there are no available vehicles that can move the data to its destination using the movement-assisted routing protocol; the data move in the direction opposite to that of the vehicle's motion. In this paper, we investigate backward data delivery under the traffic hole problem in order to provide more opportunities for V2V data transmissions. To mitigate the impact of the traffic hole on the backward data delivery, we propose an RSU-Assisted Backward Delivery scheme (RABD) which employs the roadside units (RSUs) as low-cost relays instead of traditional access points. RABD combines two methods of data delivery: one based on backward data forwarding among vehicles and another which is forwarded by the RSU. To reduce resource consumption, we investigate the single-copy scheme and consider the tradeoffs of both methods. Our extensional simulations verify the effectiveness of our proposed schemes.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114467363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Random projection data perturbation based privacy protection in WSNs 基于随机投影数据摄动的wsn隐私保护
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-05-01 DOI: 10.1109/INFCOMW.2017.8116426
Zhao Ming, Wu Zheng-jiang, Hui Liu
{"title":"Random projection data perturbation based privacy protection in WSNs","authors":"Zhao Ming, Wu Zheng-jiang, Hui Liu","doi":"10.1109/INFCOMW.2017.8116426","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116426","url":null,"abstract":"Wireless sensor networks are responsible for sensing, gathering and processing the information of the objects in the network coverage area. Basic data fusion technology generally does not provide data privacy protection mechanism, and the privacy protection mechanism in health care, military reconnaissance, smart home and other areas of the application is usually indispensable. In this paper, we consider the privacy, confidentiality, and the accuracy of fusion results, and propose a data fusion algorithm for privacy preserving. This algorithm relies on the characteristics of data fusion, and uses the method of pre-distribution random number in the node to get the privacy protection requirements of the original data. Theoretical analysis shows that the malicious attacker attempts to steal the difficulty of node privacy in PPND algorithm. At the same time in the TOSSIM simulation results also show that, compared with TAG, SMART algorithm, PPND algorithm in the data traffic, the convergence accuracy of the good performance.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134569693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Poster abstract: Location-centric relationship graph for indoor mobility using WLANs 海报摘要:使用无线局域网的室内移动的以位置为中心的关系图
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-05-01 DOI: 10.1109/INFCOMW.2017.8116542
Mimonah Al Qathrady, A. Helmy
{"title":"Poster abstract: Location-centric relationship graph for indoor mobility using WLANs","authors":"Mimonah Al Qathrady, A. Helmy","doi":"10.1109/INFCOMW.2017.8116542","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116542","url":null,"abstract":"Understanding the mobile user flow flux patterns is important for numerous applications. Much of the mobility modeling studies have focused on a user-centric approach for outdoors movement. In this study, we take a location-centric approach for indoor mobility to analyze and characterize region relationships as pertains to user flow. Our study is trace-driven, as we use extensive measurements from wireless LANs, and mine them to quantify metrics for influx and outflux for various buildings at a university campus involving more than 84K anonymous mobile users. We derived the regions' relationship graph and compute and contrast its properties in different buildings during both a weekday and a weekend. Then, the influx and outflux degrees are computed for regions during thirty days. Interestingly, the degrees do not follow a power law distribution.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133993824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demo abstract: Prototyping M2I communication system for underground and underwater networks 演示摘要:用于地下和水下网络的M2I通信系统原型
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-05-01 DOI: 10.1109/INFCOMW.2017.8116511
Hongzhi Guo, Zhi Sun
{"title":"Demo abstract: Prototyping M2I communication system for underground and underwater networks","authors":"Hongzhi Guo, Zhi Sun","doi":"10.1109/INFCOMW.2017.8116511","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116511","url":null,"abstract":"In the past few years, magnetic induction (MI) communication and networking have attracted significant attentions for wireless applications in underground, underwater, and many other complex and extreme environments. Although the technology is becoming more and more mature, there are still many research challenges, which prohibit MI from being widely applied. One of the most challenging task is to extend the limited MI communication range. Metamaterial-enhanced magnetic induction (M2I) has been theoretically proved to be an efficient way to achieve long distance communication without increasing antenna size. In this demo, we for the first time present a prototype for M2I communication and networking. The objective of this demo is to show the communication-range enhancement of M2I and the proposed communication and networking architecture.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125648307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A hybrid-timeout mechanism to handle rule dependencies in software defined networks 在软件定义的网络中处理规则依赖的混合超时机制
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2017-05-01 DOI: 10.1109/INFCOMW.2017.8116383
Dingmin Wang, Qing Li, Lei Wang, R. Sinnott, Yong Jiang
{"title":"A hybrid-timeout mechanism to handle rule dependencies in software defined networks","authors":"Dingmin Wang, Qing Li, Lei Wang, R. Sinnott, Yong Jiang","doi":"10.1109/INFCOMW.2017.8116383","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116383","url":null,"abstract":"Software Defined Networks (SDN) enables flexible flow control by installing policy rules into switches. However, one of the challenges is the dependencies between rules, which is generated due to the rules overlapping in filed space with different priorities. To keep the forwarding correctness and avoid complicated scenarios caused by the asynchronous removal, controllers usually adopt a hard timeout mechanism. However, such mechanism is inflexible for evolving and dynamic network flows. A large timeout may waste the switch memory, while a short timeout may cause multiple requests (Packet-in events) to occur for the same flow. To handle such rule dependencies flexibly, we propose a hybrid timeout mechanism. When a table miss occurs, we adaptively assign an idle timeout to the table-miss flow rule, and dependent rules are assigned with no timeout, which allow them to be removed using a proactive eviction strategy. We conduct extensive experiments using real packet traces from data centers. The experimental results show that our hybrid mechanism significantly reduces the number of table misses and the flow table occupation, while adapting quickly to changes of network flows.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124170022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信