{"title":"Research challenges in bionanosensor networks","authors":"Yutaka Okaie, T. Nakano, T. Obuchi, T. Hara","doi":"10.1109/INFCOMW.2016.7562240","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562240","url":null,"abstract":"This paper describes an architectural design of and research challenges in bionanosensor networks. We first review the architectural design of bionanosensor networks proposed in our previous work. We then discuss research challenges that need to be addressed in order to design, develop and deploy bionanosensor networks for practical applications.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122521894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Spark performance with zero-copy buffer management and RDMA","authors":"Hu Li, Tian-Li Chen, W. Xu","doi":"10.1109/INFCOMW.2016.7562041","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562041","url":null,"abstract":"With the ever increasing demand on interactive data analytics, latency for big data frameworks becomes more important. We present our preliminary experience designing and implementing NetSpark, an improved Spark [1] framework that is highly optimized for network latency. Combining optimizations on data serialization, network buffer management with hardware-supported Remote Direct Memory Access (RDMA) technology, we show that we can eliminate most of the data copies from end to end, significantly reducing the Spark task running time. Our preliminary experiments show that NetSpark improves GroupBy operation in Spark by about 40% and the PageRank algorithm in GraphX by about 20% on a 10Gbps data center network over the legacy network stack.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122628867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pragnesh V. Patel, M. Sarkar, S. Nagaraj, Kiran Kushalad
{"title":"Channel modelling based on statistical analysis for brain-computer-interface (BCI) applications","authors":"Pragnesh V. Patel, M. Sarkar, S. Nagaraj, Kiran Kushalad","doi":"10.1109/INFCOMW.2016.7562094","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562094","url":null,"abstract":"This poster showcases the experimental set up and the transmission characteristics of an ECog signal emitted by an implanted UWB transmitter in the human brain. We study the signal characteristics as it traverses medium like tissue fluid and blood to reach a UWB receiver, placed externally on the head.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122071323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asynchronous device discovery and rendezvous protocol for D2D communication","authors":"Kiran Kushalad, M. Sarkar, Pragnesh V. Patel","doi":"10.1109/INFCOMW.2016.7562071","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562071","url":null,"abstract":"This poster addresses asynchronous device discovery problem in D2D communication. We preset Tic-Toc, asynchronous, autonomous device discovery and rendezvous protocol, which targets optimal trade-off between energy consumption and discovery latency.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129569689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Causality inference for failures in NFV","authors":"D. Kushnir, M. Goldstein","doi":"10.1109/INFCOMW.2016.7562212","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562212","url":null,"abstract":"In this paper we consider a root-cause analysis framework for NFV infrastructure. As monitoring machinery for NFV has matured the next step is to leverage on such data to automatically optimize failure detection, analysis, and overall resiliency. The complex architecture and dynamics of NFV poses significant challenges from the point of view of causality inference. In particular, the need for an approach that does not depend on domain knowledge or human intervention is of high importance. We propose in this context a step-wise data-driven root-case analysis approach based on correlation clustering, and time sensitivity analysis of alarms data. Our approach recovers templates of causality relationship between network resources alarms, which in turn allows to determine rules for performing root cause analysis. We demonstrate our approach on real data collected from NFV, where our algorithm computes causality templates. These templates were verified by system experts, while most of them were confirmed to be known and others were new.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128476889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal AdvInterval for BLE scanning in different number of BLE devices environment","authors":"Gaoyang Shan, Sun-young Im, B. Roh","doi":"10.1109/INFCOMW.2016.7562238","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562238","url":null,"abstract":"The Bluetooth Low Energy (BLE) is one of promising technologies widely used for Internet of things (IoT) services because of its low energy consumption. In IoT, BLE gateways should discover surrounding BLE devices in a short time. However, this requirement is difficult to achieve when the number of BLE devices is very large. As the number of BLE devices increase, the signal density increase, and the collision problems become more serious. In this paper, we analyze the performance of BLE by considering both signal collision and density. The simulation results show that there exists the optimal AdvInterval for given number of BLE devices.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129352256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding rollover data","authors":"Liang Zheng, Carlee Joe-Wong","doi":"10.1109/INFCOMW.2016.7562159","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562159","url":null,"abstract":"Internet service providers (ISPs) have been facing heavy competition to attract more users in the mobile data market, along with growing operational costs. Most mobile data plans charge users a fixed fee for a monthly data quota, and any unused data at the end of each month will be wasted. In the beginning of 2015, both AT&T and T-Mobile reinstated rollover data plans with constrained eligibility. Users could then keep the unused portion of their monthly data quotas for use in a future month(s). In this work, we evaluate the benefits of rollover data for both ISPs and users as well as identify the types of users who would upgrade to rollover data plans. To do so, we consider two alternatives: a smaller data plan without rollover data, and a more expensive data plan with larger monthly quota that does include rollover data. We find that moderately price-sensitive users benefit from rollover data: price-insensitive users would not have any data to rollover, while extremely price-sensitive users would not find the rollover data worth its higher cost. Under specific bounds on the size of the rollover data plan's monthly quota, we find that users can obtain more utility and ISPs can profit from rollover data, which is verified on one year of usage data from a U.S. ISP.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124680031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the collaborative cellular cognitive radio networks","authors":"C. DeepakG., K. Navaie","doi":"10.1109/INFCOMW.2016.7562193","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562193","url":null,"abstract":"In this article, we evaluate the collaborative sub-channel activity index (SAI) to characterize the primary users activity in cognitive radio network. The optimal transmit power allocation policy is then formulated based on SAI as an optimization problem with the objective of maximizing the total user rate and minimizing the energy consumption at the secondary base station (SBS), subject to various constraints at the primary system. The obtained results enable to achieve a tradeoff between contradicting energy efficiency (EE) and spectral efficiency (SE) objectives as a function of SAI which ultimately provides a quantitative insights on the system design. The simulations show the better tradeoff deal between EE and SE by tuning the sensing constraints.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129659281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Looking for new allies in mobile internet market","authors":"A. Kostopoulos, M. Papadopouli","doi":"10.1109/INFCOMW.2016.7562079","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562079","url":null,"abstract":"The unprecedented increase in the mobile data traffic volume, as well as the need for network coverage expansion are major concerns for mobile operators. Although new pricing regimes have been actually employed to affect user's behavior over the usage of the network resources, operators still face challenges related to congestion management, cost reduction and revenue generation. Operators are induced to look for new allies in the mobile Internet market and introduce more innovative incentive mechanisms. Sponsored data, where an operator negotiates with a content provider so that content of the latter is free to end-users, motivates content providers to be more actively involved within the Internet value-chain. Another paradigm is offloading via user-provided networks (UPN), which motivates end-users acting as providers to extend mobile network coverage. We investigate incentives provision by network operators for making alliances with both content providers and end-users, including insights from the business perspective.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114310784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AirNet: The edge-fabric model as a virtual control plane","authors":"M. Aouadj, E. Lavinal, T. Desprats, M. Sibilla","doi":"10.1109/INFCOMW.2016.7562059","DOIUrl":"https://doi.org/10.1109/INFCOMW.2016.7562059","url":null,"abstract":"While there are many motivations to virtualize networks, easing their management is probably one of the most important reasons. However, the choice of the network abstraction model that will be used to abstract the physical infrastructure represents a major challenge, given that this choice will have a significant impact on what an administrator can see and do. In this article, we present a new domain specific language, called AirNet, to design and control virtual networks. The central feature of this language is to rely on a new network abstraction model that offers a clear separation between simple transport functions and advanced network services. These services are classified into three main categories: static control functions, dynamic control functions and data functions. In addition, we developed a hypervisor that supports the AirNet language and handles, in particular, the virtual-to-physical mapping.","PeriodicalId":348177,"journal":{"name":"2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126213829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}