{"title":"Popularity based probabilistic caching strategy design for named data networking","authors":"Ran Zhang, Jiang Liu, Tao Huang, Renchao Xie","doi":"10.1109/INFCOMW.2017.8116423","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116423","url":null,"abstract":"Named Data Networking (NDN) is a promising future network architecture. In NDN, caching is widely deployed to improve content delivery. A lot of caching strategies have been proposed to improve caching performance, such as complicated cooperative caching and non-cooperative caching. No-cooperative Probability caching is proposed to increase the content variety across caching nodes, although it enjoys the feasibility due to its simplicity, it basically caches content randomly without special intention and usually caches content which would never be used again. To solve this problem, Popularity based Probabilistic Caching (PPC) is proposed in this paper. PPC decides whether content would be reused based on their popularity and hence cache them with different possibility. Content popularity consists of two aspects, the immediate local popularity and the potential deduced popularity. PPC considers both factors to make caching decisions. Simulation is carried out to compare PPC and other existing caching strategies to prove the improvement, and the results show that the general traffic is reduced, while the hit ratio of caching is enhanced.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130288063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qingmin Jia, Renchao Xie, Tao Huang, Jiang Liu, Yun-jie Liu
{"title":"Energy-efficient cooperative coded caching for heterogeneous small cell networks","authors":"Qingmin Jia, Renchao Xie, Tao Huang, Jiang Liu, Yun-jie Liu","doi":"10.1109/INFCOMW.2017.8116421","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116421","url":null,"abstract":"Coded caching and cooperative caching have been considered as two promising technologies in heterogeneous small cell networks. Although some works have been done for coded caching and cooperative caching in heterogeneous small cell networks, to the best of our knowledge, these two important issues have traditionally been addressed separately. However, it is necessary to jointly consider these two significant issues to reduce the backhaul rate and improve content delivery as well as the Quality of Experience (QoE) of end-users. Moreover, the energy efficiency issue for content caching and content delivery is also extremely significant but excessively negligent. In this paper, we jointly consider the coded caching and cooperative caching issues, and propose a cooperative coded caching scheme to improve the content delivery efficiency and enhance the QoE for end-users. And then, based on the proposed scheme, we establish an energy consumption model from the perspective of content caching and content delivery to optimize the energy efficiency. In addition, we propose a greedy-based algorithm to solve this energy efficiency issue by optimizing the caching placement. Finally, simulation results show the performance of the proposed scheme.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127420713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mahdi Inaya, Michael Meli, Dimitrios Sikeridis, M. Devetsikiotis
{"title":"A real-subject evaluation trial for location-aware smart buildings","authors":"Mahdi Inaya, Michael Meli, Dimitrios Sikeridis, M. Devetsikiotis","doi":"10.1109/INFCOMW.2017.8116393","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116393","url":null,"abstract":"The increasing demand for smarter yet more efficient indoor spaces necessitates moving towards advanced technologies, such as Internet of Things architectures, to allow further integration to our physical world. In this work, we introduce a Bluetooth Low Energy-based infrastructure for location-aware buildings, along with a full-scale real-subject trial. The trial was undertaken with students in our engineering building at NC State, under IRB approval. Our focus is on showing a proof-of-concept of deploying location-aware infrastructure through experimentally collecting data able to facilitate building management and user localization. We examine a multi-floor environment installation and analytically prove how viable and economic our solution is to equip future intelligent facilities.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114278171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context-resilient capacity-achieving rateless code for OFDM channels with frequency diversity","authors":"Anfu Zhou, Liang Liu, Huadong Ma, G. Wang","doi":"10.1109/INFCOMW.2017.8116430","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116430","url":null,"abstract":"Recently, rateless codes make a remarkable progress on achieving maximum network performance without incurring CSI feedback overhead, under dynamic contexts with time-varying channels. However, existing rateless codes are only optimal for single-carrier channels, but are far from optimal for multi-subcarrier OFDM channels that are dominantly adopted in modern high-speed wireless networks. In this paper, we propose a new rateless code called SmartCode, which designs and incorporates an implicit sub-carrier differentiation mechanism into a unified rateless framework so as to achieve high performance over OFDM channels. We prove SmartCode's capacity optimality, and demonstrate its performance gain using trace-driven simulations.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115700672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulated annealing for edge partitioning","authors":"H. Mykhailenko, G. Neglia, F. Huet","doi":"10.1109/INFCOMW.2017.8116352","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116352","url":null,"abstract":"In distributed graph computation, graph partitioning is an important preliminary step, because the computation time can significantly depend on how the graph has been split among the different executors. In this paper, we propose a framework for distributed edge partitioning based on simulated annealing. The framework can be used to optimize a large family of partitioning metrics. We provide sufficient conditions for convergence to the optimum as well as discuss which metrics can be efficiently optimized in a distributed way. We implemented our partitioners in Apache GraphX and performed a preliminary comparison with JA-BE-JA-VC, a state-of-the-art partitioner that inspired our approach. We show that our approach can provide improvements, but further research is required to identify suitable metrics to optimize as well as to design a more efficient exploration phase for our algorithm without sacrificing convergence properties.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115797595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Markus Hähnel, Frehiwot Melak Arega, W. Dargie, R. Khasanov, J. Castrillón
{"title":"Application interference analysis: Towards energy-efficient workload management on heterogeneous micro-server architectures","authors":"Markus Hähnel, Frehiwot Melak Arega, W. Dargie, R. Khasanov, J. Castrillón","doi":"10.1109/INFCOMW.2017.8116415","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116415","url":null,"abstract":"The ever increasing demand for Internet traffic, storage and processing requires an ever increasing amount of hardware resources. In addition to this, infrastructure providers over-provision system architectures to serve users at peak times without performance delays. Over-provisioning leads to underutilization and thus to unnecessary power consumption. Therefore, there is a need for workload management strategies to map and schedule different services simultaneously in an energy-efficient manner without compromising performance, specially for heterogeneous micro-server architectures. This requires statistical models of how services interfere with each other, thereby affecting both performance and energy consumption. Indeed, the performance-energy behavior when mixing workloads is not well understood. This paper presents an interference analysis for heterogeneous workloads (i.e., CPU- and memory-intensive) on a big.LITTLE MPSoC architecture. We employ state-of-the-art tools to generate multiple single-application mappings and characterize the interference among two different services. We observed a performance degradation factor between 1.1 and 2.5. For some configurations, executing on different clusters resulted in reduced energy consumption with no performance penalty. This kind of detailed analysis give us first insights towards more general models for future workload management systems.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132541834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jin Cao, Sining Chen, W. Kennedy, Nicolas Kim, Lisa Zhang
{"title":"Extracting mobile user behavioral similarity via cell-level location trace","authors":"Jin Cao, Sining Chen, W. Kennedy, Nicolas Kim, Lisa Zhang","doi":"10.1109/INFCOMW.2017.8116406","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116406","url":null,"abstract":"We study mobile user behavior from cell-level location trace (CLLT). Since CLLT contains no GPS coordinates of mobile users, we infer approximate user locations from the cell locations they visit. We build upon the vast literature on user behavior analysis and demonstrate the ability to extract user behavior in the absence of the more precise GPS information. We focus on the “leisure time” behavior, i.e. activities outside home and office. In particular, we compare pairs of users and study their similarity or the lack of it. Such similarity comparison can be done directly using the users' actual cell-level locations and the times of their visits. We observe that a user's behavior on different days tends to be more similar to oneself than to others. We then compare users in terms of their activities irrespective of physical locations. We develop the notion of semantic cell type which classifies the cells according to the consistency of points of interest within the cells. In this way, we can compare two users based on the type of cells they visit and extract similarity from there. As a result, we gain understanding of the general profiles of the cells and the users. We are able to differentiate user behavior and cluster them in a meaningful way.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132097703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust authentication and data storage with perfect secrecy","authors":"Sebastian Baur, H. Boche","doi":"10.1109/INFCOMW.2017.8116437","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116437","url":null,"abstract":"We consider a Physical-Unclonable-Function (PUF)-based authentication process. We define achievable secret-key rate versus privacy-leakage rate pairs featuring perfect secrecy and uniform distribution of the secret-key. We derive the capacity region corresponding to this definition of achievability and thus show that it equals the known capacity region corresponding to weak secrecy. We define achievability requiring a small false acceptance probability and show that the corresponding capacity region is the same. We generalize our result for perfect secrecy to the case of a compound source. We also discuss the problem of secure data storage using data from a PUF when the statistics of the PUF are not perfectly known.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125303455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Arunan Sivanathan, Daniel Sherratt, H. Gharakheili, Adam Radford, C. Wijenayake, A. Vishwanath, V. Sivaraman
{"title":"Characterizing and classifying IoT traffic in smart cities and campuses","authors":"Arunan Sivanathan, Daniel Sherratt, H. Gharakheili, Adam Radford, C. Wijenayake, A. Vishwanath, V. Sivaraman","doi":"10.1109/INFCOMW.2017.8116438","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116438","url":null,"abstract":"Campuses and cities of the near future will be equipped with vast numbers of IoT devices. Operators of such environments may not even be fully aware of their IoT assets, let alone whether each IoT device is functioning properly safe from cyber-attacks. This paper proposes the use of network traffic analytics to characterize IoT devices, including their typical behaviour mode. We first collect and synthesize traffic traces from a smart-campus environment instrumented with a diversity of IoT devices including cameras, lights, appliances, and health-monitors; our traces, collected over a period of 3 weeks, are released as open data to the public. We then analyze the traffic traces to characterize statistical attributes such as data rates and burstiness, activity cycles, and signalling patterns, for over 20 IoT devices deployed in our environment. Finally, using these attributes, we develop a classification method that can not only distinguish IoT from non-IoT traffic, but also identify specific IoT devices with over 95% accuracy. Our study empowers operators of smart cities and campuses to discover and monitor their IoT assets based on their network behaviour.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114388446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Timely information dissemination with distributed storage in delay tolerant mobile sensor networks","authors":"Aashish Dhungana, E. Bulut","doi":"10.1109/INFCOMW.2017.8116360","DOIUrl":"https://doi.org/10.1109/INFCOMW.2017.8116360","url":null,"abstract":"In delay tolerant mobile sensor networks, the application may sometimes require informing all the sensor nodes in the network about the presence of a message while delivering it to a specific destination node. But, due to constraints on buffer space, it is not efficient to keep these message copies in the buffer of all nodes. In this paper, we propose a probabilistic approach for information dissemination to every node in the network but caching the message copies in only some of the nodes' buffer that can be utilized for future references to decrease the data access latency. This method saves the buffer space of nodes which do not hold the copies while still allowing the whole network nodes to access information on the message whenever required by providing the copies from the nodes that still hold it.","PeriodicalId":306731,"journal":{"name":"2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116935844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}