The proceedings contain 46 papers. The topics discussed include: heavy-traffic delay optimality in pull-based load balancing systems: necessary and sufficient conditions;performance analysis of workload dependent load...
ISBN:
(纸本)9781450366786
The proceedings contain 46 papers. The topics discussed include: heavy-traffic delay optimality in pull-based load balancing systems: necessary and sufficient conditions;performance analysis of workload dependent load balancing policies;load balancing guardrails: keeping your heavy traffic on the road to low response times;RandomWalk based sampling for load balancing in multi-server systems;network resilience assessment via QoS degradation metrics: an algorithmic approach;retroactive packet sampling for traffic receipts;crystal gazer: profile-driven write-rationing garbage collection for hybrid memories;architecture-aware approximate computing;dynamic pricing of relocating resources in large networks;on the value of look-ahead in competitive online convex optimization;and competitive online optimization under inventory constraints.
Due to hardware limitations and low cost, manufacturers often overlook security in widely deployed IoT devices, making them susceptible to attacks. Malware is one such attack that can cause extensive damage. In this w...
ISBN:
(纸本)9798400714795
Due to hardware limitations and low cost, manufacturers often overlook security in widely deployed IoT devices, making them susceptible to attacks. Malware is one such attack that can cause extensive damage. In this work, we analyze a large corpus of IoT malware to extract features that emerge from the shared development and logistics in the malware development life cycle (MDLC), which we name operational features. We use these features to formulate a novel operational similarity concept for malware families and variants that complements existing code and behavior analysis.
Microservice architectures have become the de facto paradigm for building scalable, service-oriented systems. Although their decentralized design promotes resilience and rapid development, the inherent complexity lead...
详细信息
ISBN:
(纸本)9798400715938
Microservice architectures have become the de facto paradigm for building scalable, service-oriented systems. Although their decentralized design promotes resilience and rapid development, the inherent complexity leads to subtle performance challenges. In particular, non-fatal errors - internal failures of remote procedure calls that do not cause top-level request failures - can accumulate along the critical path, inflating latency and wasting *** this work, we analyze over 11 billion RPCs across more than 6,000 microservices at Uber. Our study shows that nearly 29% of successful requests experience non-fatal errors that remain hidden in traditional monitoring. We propose a novel latency-reduction estimator (LR estimator) to quantify the potential benefit of eliminating these errors. Our contributions include a systematic study of RPC error patterns, a methodology to estimate latency reductions, and case studies demonstrating up to a 30% reduction in tail latency.
Online 3D model repositories such as Thingiverse ofer millions of open source designs that are shared for reuse and remix. Many of the designs are customizable to adapt to real-world objects upon personal needs of var...
详细信息
ISBN:
(纸本)9781450393584
Online 3D model repositories such as Thingiverse ofer millions of open source designs that are shared for reuse and remix. Many of the designs are customizable to adapt to real-world objects upon personal needs of varying tasks and physical dimensions. However, it is challenging for novices to discover such designs using text-based search queries, comprehend what each parameter means for customization, locate these parameters on the target objects for measurement, and conduct measurements correctly. These challenges may cause the designs to be incorrectly adjusted, thus failing to function as expected and requiring users to start over, which costs additional time and material. We present CustomizAR, a pipeline for facilitating the interactive exploration of adaptive designs and the measurement of real-world constraints to fabricate them correctly. CustomizAR supports the search and discovery of adaptive 3D designs using an object-centric graph-based data structure, and guides users through an interactive measurement process leveraging computer vision techniques. Our technical evaluations and user studies demonstrate that CustomizAR facilitates efective discovery, adjustment, and reuse of adaptive designs that are shared online.
With a growing number of quantum networks in operation, there is a pressing need for performance analysis of quantum switching technologies. A quantum switch establishes, distributes, and maintains entanglements acros...
详细信息
ISBN:
(纸本)9798400715938
With a growing number of quantum networks in operation, there is a pressing need for performance analysis of quantum switching technologies. A quantum switch establishes, distributes, and maintains entanglements across a network. In contrast to a classical switching fabric, a quantum switch is a two-sided queueing network. The switch generates Link-Level Entanglements (LLEs) across links that connect users to the switch, which are then fused to process the network's entanglement requests. First, we characterize the capacity region that is defined as the set of entanglement request rates for which there exists a scheduling policy stabilizing the system. We then show that a sequence of Max-Weight policies that we propose achieve throughput optimality in the asymptotic sense. Our proof techniques analyse a two-time scale separation phenomenon at the fluid scale for a general switch topology. This allows us to demonstrate that the optimal fluid dynamics are given by a scheduling algorithm that solves a certain average reward Markov Decision Process.
The complexity required to support the flexibility and scale of networks achievable by Kubernetes (K8s)-based applications leaves them vulnerable to Economic Denial of Sustainability (EDoS) attacks attempting to depri...
详细信息
ISBN:
(纸本)9798400715938
The complexity required to support the flexibility and scale of networks achievable by Kubernetes (K8s)-based applications leaves them vulnerable to Economic Denial of Sustainability (EDoS) attacks attempting to deprive targets of the financial means to sustain themselves. We develop Markov Decision Process (MDP) based models to reason about autoscaling and the components influencing scaling thresholds, and build atop the MDP a Stackelberg game structure to reason about EDoS attacks on K8s autoscaling and the circumstances under which adversaries inject traffic. Through numerical evaluations, we show examples where hourly-based charges eliminate incentives for resource scale-down, increasing attack incentive. Through the use of experiments on a realistic K8s cluster, we further show that increasing the attack intensity may render it less effective in generating surplus K8s resources compared to the increased traffic generation cost.
Knowledge graphs (KGs) are machine-readable representations of cyber-physical systems (CPS) which can be incomplete due to the size and complexity of CPS. Knowledge graph completion (KGC) models can predict missing ed...
详细信息
ISBN:
(纸本)9798400714795
Knowledge graphs (KGs) are machine-readable representations of cyber-physical systems (CPS) which can be incomplete due to the size and complexity of CPS. Knowledge graph completion (KGC) models can predict missing edges, but perform poorly and fail to generalize on CPS KGs due to the high heterogeneity and small size of those graphs. In this work, we propose an ontology-informed heterogeneous Graph Neural Network (GNN) architecture that integrates hierarchical parent-class layers to enhance generalization in CPS KGs. Our approach outperforms traditional heterogeneous GNNs and Node2Vec-based methods in edge prediction tasks, offering a promising solution for CPS KGs.
A new mobile computing paradigm, dubbed mini-app, has been growing rapidly over the past few years since being introduced by WeChat in 2017. In this paradigm, a host app allows its end-users to install and run mini-ap...
详细信息
A new mobile computing paradigm, dubbed mini-app, has been growing rapidly over the past few years since being introduced by WeChat in 2017. In this paradigm, a host app allows its end-users to install and run mini-apps inside itself, enabling the host app to build an ecosystem around (much like Google Play and Apple AppStore), enrich the host's functionalities, and offer mobile users elevated convenience without leaving the host app. It has been reported that there are over millions of mini-apps in WeChat. However, little information is known about these mini-apps at an aggregated level. In this paper, we present MiniCrawler, the first scalable and open source WeChat mini-app crawler that has indexed over 1,333,308 mini-apps. It leverages a number of reverse engineering techniques to uncover the interfaces and APIs in WeChat for crawling the mini-apps. With the crawled mini-apps, we then measure their resource consumption, API usage, library usage, obfuscation rate, app categorization, and app ratings at an aggregated level. The details of how we develop MiniCrawler and our measurement results are reported in this paper.
Speaker diarization refers to identifying who speaks what in a conversation. It is critical in sensitive settings like psychological counseling and legal consultations. However, traditional approaches, such as microph...
详细信息
ISBN:
(纸本)9798400714795
Speaker diarization refers to identifying who speaks what in a conversation. It is critical in sensitive settings like psychological counseling and legal consultations. However, traditional approaches, such as microphone or video, raise privacy concerns and cause discomfort to participants due to their noticeable deployment. To address this, we propose a non-intrusive speaker diarization system via mmWave sensing. Our approach leverages the spatial diversity of signals from multiple objects to distinguish speakers. Specifically, it isolates speech-induced vibrating objects signals and extracts speaker-related features through a two-stage feature extraction process. Our system achieves over 93% accuracy in real-world scenarios, demonstrating its effectiveness in reliably distinguishing speakers.
Damp walls are a significant problem that affects not only historical buildings. The effects of moisture inside walls include premature degradation of the structure and paintwork as well as health hazards for people s...
详细信息
ISBN:
(纸本)9798400714795
Damp walls are a significant problem that affects not only historical buildings. The effects of moisture inside walls include premature degradation of the structure and paintwork as well as health hazards for people staying inside the rooms (fungi, microorganisms, allergens). To effectively remove moisture, it is necessary to identify the areas where it occurs. Tomography is the only nondestructive method that allows for imaging the interior of walls. It is not common due to the low image resolution [1]. The aim of the research presented is to present a new concept of impedance tomography, taking into account many measurement sequences at different frequencies of electric current. A neural network with LSTM (Long Short-Term Memory) layers was used to transform the measurements into images. A comparison of the results of the new approach proves the advantage of the multi-frequency method over the traditional method, which brings closer the breakthrough moment in the dissemination of tomography as the main method of imaging moisture in walls.
暂无评论