the widespread of mobile applications tightens wireless users' social relationships and encourages them to generate more data traffic under network effects. this boosts the demand for wireless services yet may cha...
详细信息
ISBN:
(数字)9783319428369
ISBN:
(纸本)9783319428369;9783319428352
the widespread of mobile applications tightens wireless users' social relationships and encourages them to generate more data traffic under network effects. this boosts the demand for wireless services yet may challenge users' limited wireless capacities and budgets. In this paper, we employ collaborative communication services to address this challenge, by considering the network effect in a social-aware environment. Specifically, we develop an optimization model, namely SUO, for the problem formulation. Furthermore, we then propose a distributed update algorithm for users to reach the optimal decisions. We evaluate the performance of our proposed algorithm by numerical studies using real data, and thereby draw useful engineering insights for the operation of wireless providers.
Microsoft Azure is a relatively new public cloud service which has potentially much to offer to the scientific community, but has not yet been widely used for research applications. this paper evaluates suitability of...
详细信息
ISBN:
(纸本)9783319321493;9783319321486
Microsoft Azure is a relatively new public cloud service which has potentially much to offer to the scientific community, but has not yet been widely used for research applications. this paper evaluates suitability of Microsoft Azure as a platform for execution of computational applications in three scenarios: we evaluate dynamic horizontal scaling, distributed execution of a CPU-intensive application - POV-Ray ray-tracer, and distributed execution of a bioinformatics application - Exon-Visualizer. To this end, we created a distributed Task Library (DTL), due to lack of free, simple solution for distributed execution of dynamically defined tasks in. NET. In conclusion, we show that while dynamic horizontal scaling is quite slow, Microsoft Azure is a worthy platform for computational applications, offering, in conjunction with DTL, an easy way to speed up CPU-intensive, embarrassingly parallel problems.
Very large data sets within the range of megabytes to terabytes generated daily from checkpoint-and- restart processes are seen in today's scientific simulations. Reliability and durability are two important facto...
详细信息
the recent advent of novel multi- and many-core architectures forces application programmers to deal with hardware-specific implementation details and to be familiar with software optimization techniques to benefit fr...
详细信息
ISBN:
(纸本)9783319321523;9783319321516
the recent advent of novel multi- and many-core architectures forces application programmers to deal with hardware-specific implementation details and to be familiar with software optimization techniques to benefit from new high-performance computing machines. An extra care must be taken for communication-intensive algorithms, which may be a bottleneck for forthcoming era of exascale computing. this paper aims to present a high level stencil framework implemented for the EULAG model that efficiently utilizes heterogeneous clusters. Only an efficient usage of both CPUs and GPUs withthe flexible data decomposition method can lead to the maximum performance that scales communication-intensive elliptic solver with preconditioner.
distributed algorithms for graph searching require a high-performance CPU-efficient hash table that supports find-or-put. this operation either inserts data or indicates that it has already been added before. this pap...
详细信息
ISBN:
(纸本)9783319321523;9783319321516
distributed algorithms for graph searching require a high-performance CPU-efficient hash table that supports find-or-put. this operation either inserts data or indicates that it has already been added before. this paper focuses on the design and evaluation of such a hash table, targeting supercomputers. the latency of find-or-put is minimized by using one-sided RDMA operations. these operations are overlapped as much as possible to reduce waiting times for roundtrips. In contrast to existing work, we use linear probing and argue that this requires less roundtrips. the hash table is implemented in UPC. A peak-throughput of 114.9 million op/s is reached on an Infiniband cluster. With a load-factor of 0.9, find-or-put can be performed in 4.5 mu s on average. the hash table performance remains very high, even under high loads.
Withthe raising popularity of online/mobile social applications, many individuals are increasingly attracted to their relative positions when compared to others in terms of emotional mood, travelling location, walkin...
详细信息
ISBN:
(纸本)9783319428369;9783319428352
Withthe raising popularity of online/mobile social applications, many individuals are increasingly attracted to their relative positions when compared to others in terms of emotional mood, travelling location, walking distance, fitness status, etc. these interest can be summarized as one question "where am I in my community?". However, it often forms a deadlock that people are interested in the others' data but are unwilling to disclose their own information (mood, health, etc.). In order to break the deadlock, we propose a privacy preserving participatory sensing scheme that will not disclose individual's privacy. Specifically, we present a privacy preservation data gathering approach and adopt an improved data mining algorithm to acquire a polynomial approximation function model on distributed user data to provide a privacy preservation method in participatory sensing. Experiments demonstrate that our approach can achieve a valid result comparing withthe result without privacy preservation.
To preserve data privacy and integrity, sensitive data has to be encrypted before outsourcing to the cloud server. However, this makes keyword search based on plaintext queries obsolete. therefore, supporting efficien...
详细信息
ISBN:
(纸本)9783319289106;9783319289090
To preserve data privacy and integrity, sensitive data has to be encrypted before outsourcing to the cloud server. However, this makes keyword search based on plaintext queries obsolete. therefore, supporting efficient keyword based ranked searches over encrypted data became an open challenge. In recent years, several multi-keyword ranked search schemes have been proposed in trying to solve the posed challenge. However, most recently proposed schemes don't address the issues regarding dynamics in the keyword dictionary. In this paper, we propose a novel scheme called A-MRSE that addresses and solves these issues. We introduce new algorithms to be used by data owners each time they make modifications that affects the size of the keyword dictionary. We conduct multiple experiments to demonstrate the effectiveness of our newly proposed scheme, and the results illustrates that the performance of A-MRSE scheme is much better that previously proposed schemes.
In a WSN, sink-node gathers data from surrounding nodes and sends it to outside world via a gateway. therefore, its location information is important to both attacker and network operator. the former can launch attack...
详细信息
the proceedings contain 62 papers. the special focus in this conference is on Dynamic Spectrum Access, networking Protocols for Cognitive Radio, Sensing, Modelling and theory. the topics include: A new evaluation crit...
ISBN:
(纸本)9783319403519
the proceedings contain 62 papers. the special focus in this conference is on Dynamic Spectrum Access, networking Protocols for Cognitive Radio, Sensing, Modelling and theory. the topics include: A new evaluation criteria for learning capability in OSA context;a two-stage precoding algorithm for spectrum access systems with different priorities of spectrum utilization;closed form expression of the saddle point in cognitive radio and jammer power allocation game;code-aware power allocation for irregular LDPC codes;cooperative game and relay pairing in cognitive radio networks;effect of primary user traffic on largest eigenvalue based spectrum sensing technique;energy efficient information sharing in social cognitive radio networks;fair channel sharing by Wi-Fi and LTE-U networks with equal priority;minimum separation distance calculations for incumbent protection in LSA;mobile content offloading in database-assisted white space networks;neighbours-aware proportional fair scheduler for future wireless networks;performance analysis of dynamic spectrum allocation in multi-radio heterogeneous networks;sensing based semi-deterministic inter-cell interference map in heterogeneous networks;simultaneous uplink and downlink transmission scheme for flexible duplexing;fast traffic adaptive energy efficient MAC protocol for wireless sensor networks;threshold based censoring of cognitive radios in rician fading channel with perfect channel estimation;distributed topology control with SINR based interference for multihop wireless networks;a comparison of physical layers for low power wide area networks;a novel sequential phase difference detection method for spectrum sensing and spectrum sensing for full-duplex cognitive radio systems.
Information Fusion is the integration of synergic information to support cognition and high-level processing. Emergency management systems may take advantage of such integration and better support human operators in t...
详细信息
暂无评论