I. Jimenez, Sina Hamedian, J. Lofstead, C. Maltzahn, K. Mohror, Remzi H. Arpaci-Dusseau, A. Arpaci-Dusseau, R. Ricci
{"title":"Demo abstract: PopperCI: Automated reproducibility validation","authors":"I. Jimenez, Sina Hamedian, J. Lofstead, C. Maltzahn, K. Mohror, Remzi H. Arpaci-Dusseau, A. Arpaci-Dusseau, R. Ricci","doi":"10.1109/INFCOMW.2017.8116506","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116506","url":null,"abstract":"In this demo we illustrate the usage of PopperCI [1], a continous integration (CI) service for experiments hosted at UC Santa Cruz that allows researchers to automate the end-to-end execution and validation of experiments. PopperCI assumes that experiments follow Popper [2], a convention for implementing experiments and writing articles following a DevOps approach that has been proposed recently.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131096834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Chen, Zekun Yang, Yu Chen, Aleksey S. Polunchenko
{"title":"Online anomalous vehicle detection at the edge using multidimensional SSA","authors":"N. Chen, Zekun Yang, Yu Chen, Aleksey S. Polunchenko","doi":"10.1109/INFCOMW.2017.8116487","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116487","url":null,"abstract":"We are witnessing the giant leap of Smart Cities and the prosperity of Internet of Things (loTs), but the anomalous vehicle surveillance issues in Intelligent Transportation Systems (ITS) are still challenging, especially when more computing tasks are migrated from Cloud center to the network edge. Different research studies attempted to tackle this problem, however, existing approaches are either requiring large training data sets or presenting detection unreliability without prior knowledge. In this paper, we propose to identify anomalous vehicles on roads in real-time using multidimensional Singular Spectrum Analysis (mSSA). Inspired by the excellent performance of the SSA algorithms in change point detection in time series, we adopted it to catch the differences in the dimension of characteristics of vehicles on roads. The multiple factors of vehicles' behavior are mapped into multiple channels in the mSSA framework. Instead of pre-training or defining normal motion patterns of vehicles, the anomaly detection is formatted as an outlier identifying problem. Using two vehicle trajectory data sets, the feasibility and effectiveness of our approach are verified. Comparing to other proposed methods like clustering, the experimental results show that our approach is more reliable and robust.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"25 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114118127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fang-Yie Leu, Po-Yu Tsai, I. You, Hsing-Chung Chen
{"title":"IP-based seamless handover scheme using ANDSF in an untrusted environment","authors":"Fang-Yie Leu, Po-Yu Tsai, I. You, Hsing-Chung Chen","doi":"10.1109/INFCOMW.2017.8116444","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116444","url":null,"abstract":"In an Inter-WLAN-System, when an UE needs to hand over to an untrusted network, e.g., M, from its serving network, e.g., N, how to choose M and the best base station under M currently is a problem yet to be completely solved, no matter whether M and N belong to the same alliance group or not and no matter whether M and N are homogeneous or heterogeneous networks. In fact, 3GPP recommended ANDSF to solve this problem when N is a 3GPP network and M is a non-3GPP system or vice versa, i.e., when they are heterogeneous networks. Also, when selecting M, current approach neither considers the entire characteristics of mobile users, nor having significant discovery and selection policies to show the states of M, thus often leading UE to select an inappropriate M and/or a base station B in M. It results in the fact that after handover, UE may sometimes find that Radio Signal Strength Indicator (RSSI) of B is not strong, and even UE cannot connect itself to B since B's load is high. That means when M and N do not belong to the same alliance, the problem will be more serious. It also means that if we want to solve the mentioned problem in such an environment, the functions of ANDSF need to be enhanced. Therefore, in this paper, we first design an enhanced ANDSF, named E-ANDSF, which increases ANDSF with a Multiple Parameters Decision Making (MPDM) ranking scheme based on Proxy Mobile IPv6 (PMIPv6) protocol to provide PMAG in N with sufficient information, with which UE can hand over to an appropriate base station. We also propose an improved IP-based handover approach, called IP-based Handover Scheme assisted by E-ANDSF Function (IHEADs for short), which assists UE to hand over to an appropriate target base station by accessing the information provided by E-ANDSF.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114370960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Jimenez, A. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, J. Lofstead, C. Maltzahn, K. Mohror, R. Ricci
{"title":"PopperCI: Automated reproducibility validation","authors":"I. Jimenez, A. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, J. Lofstead, C. Maltzahn, K. Mohror, R. Ricci","doi":"10.1109/INFCOMW.2017.8116418","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116418","url":null,"abstract":"This paper introduces PopperCI, a continous integration (CI) service hosted at UC Santa Cruz that allows researchers to automate the end-to-end execution and validation of experiments. PopperCI assumes that experiments follow Popper, a convention for implementing experiments and writing articles following a DevOps approach that has been proposed recently. PopperCI runs experiments on public, private or government-fundend cloud infrastructures in a fully automated way. We describe how PopperCI executes experiments and present a use case that illustrates the usefulness of the service.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115159604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LMMSE-based interference mitigation method for compressive signal","authors":"Longmei Zhou, Zhuo Sun, Na Wu, Wenbo Wang","doi":"10.1109/INFCOMW.2017.8116446","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116446","url":null,"abstract":"Compressive sensing (CS) is a viable source of an innovative 5G system, what's more, it's an effective technology to deal with the data redundancy problem of massive machine-to-machine communication (MMC), since it enables the recovery of sparse and approximately sparse signals with significantly fewer samples than demanded by Nyquist-Shannon sampling theory. Interference in signal will lead a series problem to signal processing, which will be a recovery error proportional to the interference energy in CS. This paper tries to mitigate interference by proposing a compressive interference pre-filter based on linear minimal mean square error (LMMSE). The main contributions are that two practical estimation methods that based on autocorrelation function and auto-covariance function respectively, are applied to estimate the LMMSE-based filtering matrix. The estimation and pre-filter algorithms can be practically integrated into the compressive signal processing framework with improved robust property to noise and interference.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116752433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chao Song, Jie Wu, Wei-Shih Yang, Ming Liu, I. Jawhar, N. Mohamed
{"title":"Exploiting opportunities in V2V transmissions with RSU-assisted backward delivery","authors":"Chao Song, Jie Wu, Wei-Shih Yang, Ming Liu, I. Jawhar, N. Mohamed","doi":"10.1109/INFCOMW.2017.8116388","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116388","url":null,"abstract":"The vehicle-to-vehicle (V2V) data transmissions in Vehicular Ad-hoc Networks (VANETs) have been applied in many areas including the Internet of Vehicles, mobile data offloading, and mobile crowdsensing. The V2V-based data delivery that is opposite to the direction of a vehicle is called a backward delivery against the traffic flow, and it is blocked by an existing problem: a traffic hole. Under the backward delivery with a traffic hole problem, there are no available vehicles that can move the data to its destination using the movement-assisted routing protocol; the data move in the direction opposite to that of the vehicle's motion. In this paper, we investigate backward data delivery under the traffic hole problem in order to provide more opportunities for V2V data transmissions. To mitigate the impact of the traffic hole on the backward data delivery, we propose an RSU-Assisted Backward Delivery scheme (RABD) which employs the roadside units (RSUs) as low-cost relays instead of traditional access points. RABD combines two methods of data delivery: one based on backward data forwarding among vehicles and another which is forwarded by the RSU. To reduce resource consumption, we investigate the single-copy scheme and consider the tradeoffs of both methods. Our extensional simulations verify the effectiveness of our proposed schemes.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114467363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Random projection data perturbation based privacy protection in WSNs","authors":"Zhao Ming, Wu Zheng-jiang, Hui Liu","doi":"10.1109/INFCOMW.2017.8116426","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116426","url":null,"abstract":"Wireless sensor networks are responsible for sensing, gathering and processing the information of the objects in the network coverage area. Basic data fusion technology generally does not provide data privacy protection mechanism, and the privacy protection mechanism in health care, military reconnaissance, smart home and other areas of the application is usually indispensable. In this paper, we consider the privacy, confidentiality, and the accuracy of fusion results, and propose a data fusion algorithm for privacy preserving. This algorithm relies on the characteristics of data fusion, and uses the method of pre-distribution random number in the node to get the privacy protection requirements of the original data. Theoretical analysis shows that the malicious attacker attempts to steal the difficulty of node privacy in PPND algorithm. At the same time in the TOSSIM simulation results also show that, compared with TAG, SMART algorithm, PPND algorithm in the data traffic, the convergence accuracy of the good performance.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134569693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Poster abstract: Location-centric relationship graph for indoor mobility using WLANs","authors":"Mimonah Al Qathrady, A. Helmy","doi":"10.1109/INFCOMW.2017.8116542","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116542","url":null,"abstract":"Understanding the mobile user flow flux patterns is important for numerous applications. Much of the mobility modeling studies have focused on a user-centric approach for outdoors movement. In this study, we take a location-centric approach for indoor mobility to analyze and characterize region relationships as pertains to user flow. Our study is trace-driven, as we use extensive measurements from wireless LANs, and mine them to quantify metrics for influx and outflux for various buildings at a university campus involving more than 84K anonymous mobile users. We derived the regions' relationship graph and compute and contrast its properties in different buildings during both a weekday and a weekend. Then, the influx and outflux degrees are computed for regions during thirty days. Interestingly, the degrees do not follow a power law distribution.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133993824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demo abstract: Prototyping M2I communication system for underground and underwater networks","authors":"Hongzhi Guo, Zhi Sun","doi":"10.1109/INFCOMW.2017.8116511","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116511","url":null,"abstract":"In the past few years, magnetic induction (MI) communication and networking have attracted significant attentions for wireless applications in underground, underwater, and many other complex and extreme environments. Although the technology is becoming more and more mature, there are still many research challenges, which prohibit MI from being widely applied. One of the most challenging task is to extend the limited MI communication range. Metamaterial-enhanced magnetic induction (M2I) has been theoretically proved to be an efficient way to achieve long distance communication without increasing antenna size. In this demo, we for the first time present a prototype for M2I communication and networking. The objective of this demo is to show the communication-range enhancement of M2I and the proposed communication and networking architecture.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125648307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dingmin Wang, Qing Li, Lei Wang, R. Sinnott, Yong Jiang
{"title":"A hybrid-timeout mechanism to handle rule dependencies in software defined networks","authors":"Dingmin Wang, Qing Li, Lei Wang, R. Sinnott, Yong Jiang","doi":"10.1109/INFCOMW.2017.8116383","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116383","url":null,"abstract":"Software Defined Networks (SDN) enables flexible flow control by installing policy rules into switches. However, one of the challenges is the dependencies between rules, which is generated due to the rules overlapping in filed space with different priorities. To keep the forwarding correctness and avoid complicated scenarios caused by the asynchronous removal, controllers usually adopt a hard timeout mechanism. However, such mechanism is inflexible for evolving and dynamic network flows. A large timeout may waste the switch memory, while a short timeout may cause multiple requests (Packet-in events) to occur for the same flow. To handle such rule dependencies flexibly, we propose a hybrid timeout mechanism. When a table miss occurs, we adaptively assign an idle timeout to the table-miss flow rule, and dependent rules are assigned with no timeout, which allow them to be removed using a proactive eviction strategy. We conduct extensive experiments using real packet traces from data centers. The experimental results show that our hybrid mechanism significantly reduces the number of table misses and the flow table occupation, while adapting quickly to changes of network flows.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124170022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}