Maps of physical and logical Internet connectivity that are informed by and consistent with each other can expand scope and improve accuracy in analysis of performance, robustness and security. In this paper, we descr...
详细信息
ISBN:
(纸本)9781450392594
Maps of physical and logical Internet connectivity that are informed by and consistent with each other can expand scope and improve accuracy in analysis of performance, robustness and security. In this paper, we describe a methodology for linking physical and logical Internet maps that aims toward a consistent, cross-layer representation. Our approach is constructive and uses geographic location as the key feature for linking physical and logical layers. We begin by building a representation of physical connectivity using on-line sources to identify locations that house transport hardware (i.e., PoPs, colocation centers, IXPs, etc.), and approximate locations of links between these based on shortest-path rights-of-way. We then utilize standard data sources for generating maps of IP-level and AS-level logical connectivity, and graft these onto physical maps using geographic anchors. We implement our methodology in an open-source framework called the Internet Geographic Database (iGDB), which includes tools for updating measurement data and assuring internal consistency. iGDB is built to be used with ArcGIS, a geographic information system that provides broad capability for spatial analysis and visualization. We describe the details of the iGDB implementation and demonstrate how it can be used in a variety of settings.
Existing task deployment frameworks for edge clusters optimize at the model-level, lacking fine-grained resource awareness and concurrency control, where the urgent tasks are frequently blocked and miss their deadline...
详细信息
ISBN:
(纸本)9798400714795
Existing task deployment frameworks for edge clusters optimize at the model-level, lacking fine-grained resource awareness and concurrency control, where the urgent tasks are frequently blocked and miss their deadlines. Therefore, we propose a multi-level collaborative deployment framework Coconut for real-time deep learning tasks in the typical heterogeneous edge GPU cluster. Coconut collaboratively optimizes model deployment and fine-grained concurrency control. To address the high complexity of multi-level collaborative optimization, we employ an efficient learning-based search algorithm. Based on the operator-level information, we also pre-train an accurate latency predictor for each device, enabling centralized optimization to further accelerate the search. We conduct a preliminary evaluation in an edge cluster and validate the effectiveness of Coconut.
The Inertial Navigation System (INS) is a navigation system that determines the position, velocity, and orientation of a moving object without the aid of outside references. It does this by using gyroscopes and accele...
详细信息
This work introduces the concept of Embodied measurement (EM), designed to improve the validity and inclusivity of cognitive load assessments by incorporating physical interactions that mirror mental effort. We implem...
详细信息
Fifth-generation (5G) networks are now entering a stable phase in terms of commercial release. 5G design is flexible to support a diverse range of radio bands (i.e., low-, mid-, and high-band) and application requirem...
详细信息
ISBN:
(纸本)9781450394796
Fifth-generation (5G) networks are now entering a stable phase in terms of commercial release. 5G design is flexible to support a diverse range of radio bands (i.e., low-, mid-, and high-band) and application requirements. Since its initial roll-out in 2019, extensive measurements studies have revealed key aspects of commercial 5G deployments (e.g., coverage, signal strength, throughput, latency, handover, and power consumption among the others) for several scenarios (e.g., pedestrian and car mobility, mid-, and high-bands, etc.). In this paper, we take a different angle than previous studies and carry out an in-depth measurement study of 5G in a large public bus transit system in a major European city. For several mobile network operators, we identify how flexible the network deployment is by analyzing Radio Resource Control (RRC) messages, mobility management, and application performance.
This paper presents a comparative analysis of various Voltage-Controlled Oscillator (VCO) designs, focusing on key performance parameters such as tuning control voltage range, phase noise, delay, power consumption, an...
详细信息
The proceedings contain 23 papers. The topics discussed include: resource optimization of stream processing in layered Internet of Things;range-based set reconciliation;FreSh: a lock-free data series index;PRISPARK: d...
ISBN:
(纸本)9798350329100
The proceedings contain 23 papers. The topics discussed include: resource optimization of stream processing in layered Internet of Things;range-based set reconciliation;FreSh: a lock-free data series index;PRISPARK: differential privacy enforcement for big data computing in Apache spark;subdomain protection is needed: an SPF and DMARC-based empirical measurement study and proactive solution of email security;low-overhead routing for offchain networks with high resource utilization;SilenTower: a robust, scalable and secure watchtower with silent executors;extending the boundaries and exploring the limits of blockchain compression;detective-dee: a non-intrusive in situ anomaly detection and fault localization framework;and CRIBA: a tool for comprehensive analysis of cryptographic ransomware’s I/O behavior.
Misconceptions about digital security and privacy topics in the general public frequently lead to insecure behavior. However, little is known about the prevalence and extent of such misconceptions in a global context....
详细信息
ISBN:
(纸本)9781450394215
Misconceptions about digital security and privacy topics in the general public frequently lead to insecure behavior. However, little is known about the prevalence and extent of such misconceptions in a global context. In this work, we present the results of the first large-scale survey of a global population on misconceptions: We conducted an online survey with n = 12, 351 participants in 12 countries on four continents. By investigating influencing factors of misconceptions around eight common security and privacy topics (including E2EE, Wi-Fi, VPN, and malware), we find the country of residence to be the strongest estimate for holding misconceptions. We also identify differences between non-Western and Western countries, demonstrating the need for region-specific research on user security knowledge, perceptions, and behavior. While we did not observe many outright misconceptions, we did identify a lack of understanding and uncertainty about several fundamental privacy and security topics.
The supermarket model is a popular load balancing model where each incoming job is assigned to a server with the least number of jobs among d randomly selected servers. Several authors have shown that the large scale ...
详细信息
The supermarket model is a popular load balancing model where each incoming job is assigned to a server with the least number of jobs among d randomly selected servers. Several authors have shown that the large scale limit in case of processor sharing servers has a unique insensitive fixed point, which naturally leads to the belief that the queue length distribution in such a system is insensitive to the job size distribution as the number of servers tends to infinity. Simulation results that support this belief have also been reported. However, global attraction of the unique fixed point of the large scale limit was not proven except for exponential job sizes, which is needed to formally prove asymptotic insensitivity. The difficulty lies in the fact that with processor sharing servers, the limiting system is in general not monotone. In this paper we focus on the class of hyperexponential distributions of order 2 and demonstrate that for this class of distributions global attraction of the unique fixed point can still be established using monotonicity by picking a suitable state space and partial order. This allows us to formally show that we have asymptotic insensitivity within this class of job size distributions. We further demonstrate that our result can be leveraged to prove asymptotic insensitivity within this class of distributions for other load balancing systems.
Historical visualizations are a valuable resource for studying the history of visualization and inspecting the cultural context where they were created. When investigating historical visualizations, it is essential to...
详细信息
暂无评论