2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)最新文献

筛选
英文 中文
Bringing the cloud to the edge 把云带到边缘
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849256
Hyunseok Chang, A. Hari, S. Mukherjee, T. Lakshman
{"title":"Bringing the cloud to the edge","authors":"Hyunseok Chang, A. Hari, S. Mukherjee, T. Lakshman","doi":"10.1109/INFCOMW.2014.6849256","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849256","url":null,"abstract":"Edge services become increasingly important as the Internet transforms into an Internet of Things (IoT). Edge services require bounded latency, bandwidth reduction between the edge and the core, service resiliency with graceful degradation, and access to resources visible only inside the NATed and secured edge networks. While the data center based cloud excels at providing general purpose computation/storage at scale, it is not suitable for edge services. We present a new model for cloud computing, which we call the Edge Cloud, that addresses edge computing specific issues by augmenting the traditional data center cloud model with service nodes placed at the network edges. We describe the architecture of the Edge Cloud and its implementation as an overlay hybrid cloud using the industry standard OpenStack cloud management framework. We demonstrate the advantages garnered by two new classes of applications enabled by the Edge Cloud - a highly accurate indoor localization that saves on latency, and a scalable and resilient video monitoring that saves on bandwidth.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"255 1","pages":"346-351"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75762377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 165
Random sensing order in cognitive radio systems: Performance evaluation and optimization 认知无线电系统中的随机感知顺序:性能评估与优化
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849225
H. S. Ghadikolaei, C. Fischione
{"title":"Random sensing order in cognitive radio systems: Performance evaluation and optimization","authors":"H. S. Ghadikolaei, C. Fischione","doi":"10.1109/INFCOMW.2014.6849225","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849225","url":null,"abstract":"Developing an efficient spectrum access policy enables cognitive radios to dramatically increase spectrum utilization while assuring predetermined quality of service levels for the primary users. In this abstract, modeling, performance evaluation, and optimization of a distributed secondary network with random sensing order policy are studied. Specifically, the secondary users create a random order of the available channels upon primary users return, and then find an optimal transmission opportunity in a distributed manner. After modeling the behavior of the SUs by a Markov chain, the average throughputs of the secondary users and interference level among the secondary and primary users are evaluated. Then, a maximization of the secondary network performance in terms of throughput while keeping under control the average interference is proposed. A simple and practical adaptive algorithm is developed to optimize the network. Interestingly, the proposed algorithm follows the variations of the wireless channels in non-stationary conditions and outperforms even static brute force optimization, while demanding few computations. Finally, numerical results are provided to demonstrate the efficiencies of the proposed schemes. It is shown that fully distributed algorithms can achieve substantial performance improvements in cognitive radio networks without the need of centralized management or message passing among the users.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"42 1","pages":"201-202"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74207483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social interaction based video recommendation: Recommending YouTube videos to facebook users 基于社交互动的视频推荐:向facebook用户推荐YouTube视频
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849175
Bin Nie, Honggang Zhang, Yong Liu
{"title":"Social interaction based video recommendation: Recommending YouTube videos to facebook users","authors":"Bin Nie, Honggang Zhang, Yong Liu","doi":"10.1109/INFCOMW.2014.6849175","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849175","url":null,"abstract":"Online videos, e.g., YouTube videos, are important topics for social interactions among users of online social networking sites (OSN), e.g., Facebook. This opens up the possibility of exploiting video-related user social interaction information for better video recommendation. Towards this goal, we conduct a case study of recommending YouTube videos to Facebook users based on their social interactions. We first measure social interactions related to YouTube videos among Facebook users. We observe that the attention a video attracts on Facebook is not always well-aligned with its popularity on YouTube. Unpopular videos on YouTube can become popular on Facebook, while popular videos on YouTube often do not attract proportionally high attentions on Facebook. This finding motivates us to develop a simple top-k video recommendation algorithm that exploits user social interaction information to improve the recommendation accuracy for niche videos, that are globally unpopular, but highly relevant to a specific user or user group. Through experiments on the collected Facebook traces, we demonstrate that our recommendation algorithm significantly outperforms the YouTube-popularity based video recommendation algorithm as well as a collaborative filtering algorithm based on user similarities.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"10 1","pages":"97-102"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84192571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Spectrum aware and energy efficient MAC protocol for cognitive radio sensor network 认知无线电传感器网络的频谱感知和节能MAC协议
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849326
Amna Jamal, C. Tham, L. Wong
{"title":"Spectrum aware and energy efficient MAC protocol for cognitive radio sensor network","authors":"Amna Jamal, C. Tham, L. Wong","doi":"10.1109/INFCOMW.2014.6849326","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849326","url":null,"abstract":"Dynamic spectrum access in the form of cognitive radio (CR) has gained traction in wireless sensor networks (WSN) because of scarcity caused by the proliferation of wireless devices and service and it provides spectrum efficient communication for the resource constrained WSNs. However, proper means have to be devised to satisfy the requirements of both WSNs and CRs and to enjoy the benefits of cognition in sensor networks. In this paper, we propose a novel energy-efficient and spectrum aware multi-channel medium access control (MAC) protocol for the underlying cognitive radio enabled sensor network. We designed a spectrum aware multichannel asynchronous duty cycle approach which caters to the requirements of both the domains. The performance of the proposed MAC is evaluated via simulations. The simulation results are also compared with MCMAC, a multi-channel MAC for WSNs. The comparative results show that the proposed approach outperforms the multi-channel scheme for WSN.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"86 1","pages":"759-764"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84356490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
VANET via Named Data Networking VANET通过命名数据网络
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849267
Giulio Grassi, Davide Pesavento, G. Pau, Rama Vuyyuru, R. Wakikawa, Lixia Zhang
{"title":"VANET via Named Data Networking","authors":"Giulio Grassi, Davide Pesavento, G. Pau, Rama Vuyyuru, R. Wakikawa, Lixia Zhang","doi":"10.1109/INFCOMW.2014.6849267","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849267","url":null,"abstract":"In this paper we apply the Named Data Networking [1], a newly proposed Internet architecture, to networking vehicles on the run. Our initial design, dubbed V-NDN, illustrates NDN's promising potential in providing a unifying architecture that enables networking among all computing devices independent from whether they are connected through wired infrastructure, ad hoc, or intermittent DTN. This paper describes a prototype implementation of V-NDN and its preliminary performance assessment, and identifies remaining challenges.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"72 1","pages":"410-415"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80429729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 292
Name-based replication priorities in disaster cases 灾难情况下基于名称的复制优先级
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849271
I. Psaras, Lorenzo Saino, M. Arumaithurai, K. Ramakrishnan, G. Pavlou
{"title":"Name-based replication priorities in disaster cases","authors":"I. Psaras, Lorenzo Saino, M. Arumaithurai, K. Ramakrishnan, G. Pavlou","doi":"10.1109/INFCOMW.2014.6849271","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849271","url":null,"abstract":"In the immediate aftermath of a natural disaster, network infrastructure is likely to have suffered severe damages that challenge normal communications. In addition to that, traffic substantially increases as a result of people attempting to get in touch with friends, relatives or the rescue teams. To address such requirements of a challenged network, we propose a communication framework based on messages that exploits name-based replication of content and enables ad-hoc communications with spatial and temporal scoping and prioritisation of named messages. We evaluate our design against less sophisticated replication strategies and show that important messages (e.g., from first responders) get disseminated to more nodes than less important messages.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"434-439"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90861766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Moving Business Intelligence to cloud environments 将商业智能迁移到云环境
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849166
Adrian Juan Verdejo, Bholanathsingh Surajbali, H. Baars, H.-G. Kemper
{"title":"Moving Business Intelligence to cloud environments","authors":"Adrian Juan Verdejo, Bholanathsingh Surajbali, H. Baars, H.-G. Kemper","doi":"10.1109/INFCOMW.2014.6849166","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849166","url":null,"abstract":"Business Intelligence systems use information technology to supply integrated management support with data coming from several sources of structured and unstructured data. The integrated infrastructures of Business Intelligence (BI) are often too complex and hence costly and inflexible. A solution for these issues is to leverage cloud computing services to enhance legacy BI systems and applications with cost-efficient increased scalability and flexibility. However, the migration of BI systems to cloud environments is usually hindered by strict requirements regarding privacy, security, or availability and a multitude of interdependences with other systems. In this paper, we describe the challenges in the adoption of BI within cloud environments and propose a cloud migration framework to assist decision makers in taking into account the consequences of the migration of BI systems to cloud environments as well as the impact of privacy, security, cost, and performance in so doing.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"1 1","pages":"43-48"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89207267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A proposal for elastic spectrum management in wireless local area networks 无线局域网弹性频谱管理的一种方案
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849188
L. A. Lopes, Rute C. Sofia, H. Osman, Huseyin Haci
{"title":"A proposal for elastic spectrum management in wireless local area networks","authors":"L. A. Lopes, Rute C. Sofia, H. Osman, Huseyin Haci","doi":"10.1109/INFCOMW.2014.6849188","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849188","url":null,"abstract":"The last hop of the Internet towards the end-user is mostly supported by wireless technologies and thus interconnects multiple users, that should, ideally, be served simultaneously. The shared media capability of such last hop is, however, underused, asthe principle behind wireless technologies implies that only one user can be served at an instant in time. Aiming at allowing multiuser transmission within a specific time-frame, this technological demonstration goes over a novel wireless extension mechanism explaining how it can be applied to current wireless networks while keeping backward compatibility.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"38 1","pages":"127-128"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88300902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Lossless reconfiguration protocol for multi-domain data plane in software-defined networks 软件定义网络中多域数据平面无损重构协议
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849221
Boyang Zhou, Haifeng Zhou, W. Gao, X. Hong, Bin Wang, Chunming Wu
{"title":"Lossless reconfiguration protocol for multi-domain data plane in software-defined networks","authors":"Boyang Zhou, Haifeng Zhou, W. Gao, X. Hong, Bin Wang, Chunming Wu","doi":"10.1109/INFCOMW.2014.6849221","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849221","url":null,"abstract":"Software-Defined Networking (SDN) opens the configuring interfaces for the data plane to improve its flexibility[1]. In the data plane, the switches are partitioned into multiple domains. Each domain is dynamically configured by its controller. The domains are physically connected via the border switches. In the control plane, each controller supports multiple services. Each service runs the same control program at multiple controllers in a distributed manner.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"61 1","pages":"193-194"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76021235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Poster: Energy balance bounds of mixed data transmission in wireless sensor networks 海报:无线传感器网络中混合数据传输的能量平衡边界
2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) Pub Date : 2014-07-08 DOI: 10.1109/INFCOMW.2014.6849196
Xianjin Xia, Shining Li, Yu Zhang, Zhe Yang
{"title":"Poster: Energy balance bounds of mixed data transmission in wireless sensor networks","authors":"Xianjin Xia, Shining Li, Yu Zhang, Zhe Yang","doi":"10.1109/INFCOMW.2014.6849196","DOIUrl":"https://doi.org/10.1109/INFCOMW.2014.6849196","url":null,"abstract":"Mixed data transmission strategies have been proposed to address the energy imbalance problem in wireless sensor networks. However, whether the energy of all nodes can be balanced by this approach, especially under the communication range constraints of sensor nodes, is lack of study. In this paper, we present a novel analytical model for the two-hop based mixed data transmission and derive its energy balance bounds. It is found that the limits of the mixed data transmission scheme on energy balance are only determined by the power profiles of the communication system. This power profile is indicated by a newly discovered parameter which is defined as the premium power ratio of the system.","PeriodicalId":6468,"journal":{"name":"2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"7 1","pages":"143-144"},"PeriodicalIF":0.0,"publicationDate":"2014-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80091415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信