effsense: Energy-Efficient and Cost-Effective Data Uploading in Mobile Crowdsensing
|
|
- Joseph Webster
- 6 years ago
- Views:
Transcription
1 effsense: Energy-Efficient and Cost-Effective Data Uploading in Mobile Crowdsensing Leye Wang, Daqing Zhang and Haoyi Xiong TELECOM SudParis, France PUCAA 2013
2 Outline Introduction Research Motivation User Needs and Objectives Some Observations Proposed Ideas Research Issues Main Contributions The Proposed effsense Framework Uploading Schemes in effsense System Evaluation Conclusions and Future Work 2
3 Research Motivation Mobile Crowdsensing can enable many applications, to encourage users to participate in Mobile Crowdsensing tasks, reducing cost incurred helps: Energy Consumption 3G Mobile Data Communication Cost 3 stages of a mobile crowdsensing task Task Assignment Sensing Data Uploading (our focus) 3
4 User Needs and Objectives User Types and Needs Data-plan users (DP) with unlimited data plan concerned about energy consumption Non-data-plan users (NDP) pay according to data size uploaded via 3G concerned about data cost Example: MIT Reality Mining ~30 users with data plan (data-plan users) ~70 users with no data plan (non-data-plan users) The data-plan/non-data-plan user ratio might change Objectives Data-plan users (DP) Reduce energy consumption Non-data-plan users (NDP) Reduce data cost 4
5 Some Observations Some Known techniques to Reduce Energy Consumption (for DP) Baseline: Initiate a 3G connection to upload data Uploading data via a Bluetooth gateway or WiFi consumes less energy Uploading data via 3G parallel with a phone call saves >75% energy J. Nurminen, Parallel connections and their effect on the battery consumption of a mobile phone, Some Known techniques to Eliminate Data Cost (for NDP) Uploading data via a Bluetooth gateway or WiFi Offloading data by Bluetooth to a DP user, who can later relay data to the server 5
6 Proposed Ideas for Energy/Data Cost Cut Leveraging Critical Events making a phone call encountering a Bluetooth gateway connecting to WiFi meeting another user Use Time to Trade-off Events - Delay-tolerant data uploading Traditionally, data is uploaded as soon as it is sensed. We allow delay between data sensing and uploading, so that critical events can happen and be leveraged to reduce energy and/or data cost. 6
7 A Running Example (How to Reduce Cost) Server S WiFi/LAN r i : sensing data of u i r i : sensing data of u i 3G (parallel with voice call) {r 2,r 1 } Bluetooth Gateway G 3 uploading paths: 1. u 3 G S 2. u 1 u 2 G S 3. u 2 u 1 S {r 1,r 2 } {r 3 } {r 1 } u 1 u 2 u 1 u 2 u 3 data-plan users {r 2 } non-data-plan users 7
8 Research Issues 1. Identify the critical events and predict the probability of future occurrence of these critical events. 2. Estimate data uploading energy consumption associated to each critical event. 3. Design a real-time algorithm distributed on each user s phone to decide whether to upload/offload data or keep data when a sequence of critical events occur. 8
9 Research Contributions Intend to achieve two objectives for two types of users for 1 st Time energy consumption (data-plan users) data cost (non-data-plan users) Propose a novel mechanism to address the problem delay-tolerant data uploading critical events Develop 4 different data uploading schemes Two for data-plan users Two for non-data-plan users Evaluate the proposed mechanism and schemes with two datasets MIT Reality Mining Nodobo 9
10 Outline Introduction Research Motivation User Needs and Objectives Some Observations Proposed Ideas Research Issues Main Contributions The Proposed effsense Framework Uploading Schemes in effsense System Evaluation Conclusions and Future Work 10
11 The Proposed effsense Framework Mobile Crowdsensing Framework Sensing Decision Making (offload or keep data) Data Uploading 11
12 The Proposed effsense Framework Key Concepts in effsense Framework Two types of crowdsensing users DP and NDP Critical Events Prediction for each user mobility prediction meet other user/ Bluetooth gateway/ WiFi AP call prediction Data Uploading Schemes Cold-Start works without user logs Prediction-Based - leverage user logs Force uploading at deadline At the end of the data uploading period (max delay), effsense checks data-plan users whether they have non-uploaded data: for those with data, effsense forces them to establish a 3G connection to upload data to the server. 12
13 Outline Introduction Research Motivation User Needs and Objectives Some Observations Proposed Ideas Research Issues Main Contributions The Proposed effsense Framework Uploading Schemes in effsense System Evaluation Conclusions and Future Work 13
14 Uploading Schemes in effsense When a critical event occurs, decide whether to offload/keep data For NDP SimpleGreedy (cold-start) AdvancedGreedy (prediction-based) For DP Greedy (cold-start) ExpectationBased (prediction-based) Assumption - Offload and Dismiss: Once a user offloads data to another user, won t be responsible for sending the data any more. Avoid redundant data offloading to reduce energy consumption 14
15 cold-start schemes for NDP/DP users SimpleGreedy ndp /Greedy dp Cold-start schemes make the decision directly according to the event type. without using user history logs NDP user: SimpleGreedy ndp DP user: Greedy dp upload data without incurring NDP users data cost Call Bluetooth Gateway upload data with less energy consumption than 3G Call Bluetooth Gateway Critical Event Connect WiFi Critical Event Connect WiFi meet DP user meet DP user meet NDP user meet NDP user 15
16 prediction-based scheme for NDP users AdvancedGreedy ndp Difference from SimpleGreedy ndp a NDP user might offload data to another NDP user encountered Call Bluetooth Gateway Critical Event Connect WiFi meet DP user the encountered user has higher probability to upload data without data cost meet NDP user Otherwise 16
17 prediction-based scheme for DP users ExpectationBased dp Calculate DP user s expected energy consumption under different conditions when encountering a critical event Call / Bluetooth Gateway / WiFi Upload data Keep Data Meet another DP user (suppose two users: u i and u j ) u i offloads data to u j u j offloads data to u i u i and u j both keep own data Decide according to the condition with smallest value Calculation is based on predict the future occurrence of critical events estimate the data transmission energy of critical events 17
18 Outline Introduction Research Motivation User Needs and Objectives Some Observations Proposed Ideas Research Issues Main Contributions The Proposed effsense Framework Uploading Schemes in effsense System Evaluation Conclusions and Future Work 18
19 Experiment Setup Two datasets MIT Reality Mining, Nodobo Max delay: 24 hours Start of the data uploading: 00:00:00 for each day Estimation of the energy consumption under critical events N. Balasubramanian, etc., Energy consumption in mobile phones: a measurement study and implications for network applications, 2009 Prediction Method count week-level frequency MIT #DP user #NDP user #BT gateway 2 0?WiFi traces no yes Nodobo e.g. 3 weeks out of 5-week logs, a user makes calls during Monday 8:00~12:00 predict that this user s call probability is 60% during next Monday 8:00~12:00 19
20 Questions NDP user (Data Cost) How many NDP users could successfully upload their sensed data to the server without data cost? DP user (Energy Consumption) How much energy do DP users save compared with traditional 3G data uploading? 20
21 NDP user (Data Cost) NDP users uploading data without data cost more than 45% (MIT) ; 54% (Nodobo) MIT (41 NDP users) Nodobo (16 NDP users) Working Days Holidays SimpleGreedy AdvancedGreedy All Days 18.8 (45%) 19.6 (48%) Working Days Holidays SimpleGreedy AdvancedGreedy All Days 8.64 (54%) 8.93 (56%) 21
22 DP user (Energy Consumption) Energy consumption of DP users 4 scheme pairs: 2 (NDP)*2 (DP) traditional: establish a new 3G connection to upload data Compared with traditional 3G Greedy dp reduces ~55% ExpectationBased dp reduces ~65%. 22
23 Conclusions and Future Work effsense is a novel data uploading framework for mobile crowdsensing reduce both energy consumption and data cost introduce delay-tolerant data uploading and critical events design cold-start/prediction-based uploading schemes for DP/NDP users evaluation more than 45% NDP users uploading data without data cost DP users reducing more than 55% energy compared with traditional 3G uploading Future Work Other critical events Precise energy consumption estimation mechanism Advanced mobility/call prediction method Incentives for DP users to relay data Real-life deployment 23
24
Center for Networked Computing
Concept of mobile social networks (MSNs): People walk around with smartphones and communicate with each other via Bluetooth or Wi-Fi when they are within transmission range of each other. Characters: No
More informationEnergy Consumption in Mobile Phones: A Measurement Study and Implications for Network Applications (IMC09)
Energy Consumption in Mobile Phones: A Measurement Study and Implications for Network Applications (IMC09) Niranjan Balasubramanian Aruna Balasubramanian Arun Venkataramani University of Massachusetts
More informationicrowd: Near-Optimal Task Allocation for Piggyback Crowdsensing
.9/TMC.5.4855, IEEE Transactions on Mobile Computing icrowd: Near-Optimal Task Allocation for Piggyback Crowdsensing Haoyi Xiong, Daqing Zhang, Guanling Chen, Leye Wang, Vincent Gauthier, Laura E. Barnes
More informationHeterogeneous Community-based Routing in Opportunistic Mobile Social Networks
Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Yunsheng Wang Kettering University Jie Wu Temple University Mingjun Xiao University of Science and Tech. of China Daqiang Zhang
More informationTask Allocation Schemes for Crowdsourcing in Opportunistic Mobile Social Networks
Task Allocation Schemes for Crowdsourcing in Opportunistic Mobile Social Networks Xiao Chen 1, Bo Deng 1 Department of Computer Science, Texas State University, San Marcos, TX 7 Vandegrift High School,
More informationBUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks
1 BUBBLE RAP: Social-Based Forwarding in Delay-Tolerant Networks Pan Hui, Jon Crowcroft, Eiko Yoneki Presented By: Shaymaa Khater 2 Outline Introduction. Goals. Data Sets. Community Detection Algorithms
More informationNear-Optimal Incentive Allocation for Piggyback Crowdsensing
Sustainable Incentive Mechanisms for Mobile Crowdsensing Near-Optimal Incentive Allocation for Piggyback Crowdsensing Haoyi Xiong, Daqing Zhang, Zhishan uo, uanling Chen, and Laura E. Barnes The authors
More informationContext-for-Wireless: Context-Sensitive Energy- Efficient Wireless Data Transfer
Context-for-Wireless: Context-Sensitive Energy- Efficient Wireless Data Transfer Ahmad Rahmati and Lin Zhong Rice Efficient Computing Group (recg.org) Dept. of Electrical & Computer Engineering Rice University
More informationIncentives for Opportunistic Networks
Incentives for Opportunistic Networks gjb4@st-andrews.ac.uk Tristan Henderson tnhh@st-andrews.ac.uk University of Opportunistic Networks Users carry wireless mobile devices Network leveraged from human
More informationEmpirical Evaluation of Hybrid Opportunistic Networks
Empirical Evaluation of Hybrid Opportunistic Networks Pan Hui Joint work with Anders Lindgren and Jon Crowcroft (University of Cambridge) 1 Introduction Two trends observed Lots of work done on opportunistic
More informationMobile and Ubiquitous Computing: Mobile Sensing
Mobile and Ubiquitous Computing: Mobile Sensing Master studies, Winter 2015/2016 Dr Veljko Pejović Veljko.Pejovic@fri.uni-lj.si Based on: Mobile and Ubiquitous Computing Mirco Musolesi, University of Birmingham,
More informationCenter for Networked Computing
Concept of Mobile Cloud Computing (MCC): - Offload the computation complexity task from mobile devices to the cloud - Combination of cloud computing, mobile computing, and wireless networks to bring rich
More informationOpportunistic CrowdSensing. Nic Lane Mobile and Sensing Systems Group (MASS) Microsoft Research Asia (MSRA)
Opportunistic CrowdSensing Nic Lane Mobile and Sensing Systems Group (MASS) Microsoft Research Asia (MSRA) On-going Large-scale Opportunistic CrowdSensing Investigations in MASS Lowering Energy Consumed
More informationAn Optimal Control Policy in a Mobile Cloud Computing System Based on Stochastic Data
An Optimal Control Policy in a Mobile Cloud Computing System Based on Stochastic Data Xue Lin, Yanzhi Wang, and Massoud Pedram Dept. of Electrical Engineering University of Southern California Los Angeles,
More informationDetecting Blackhole and Greyhole Attacks in Vehicular Delay Tolerant Networks
Platzhalter für Bild, Bild auf Titelfolie hinter das Logo einsetzen Detecting Blackhole and Greyhole Attacks in Vehicular Delay Tolerant Networks Yinghui Guo, Sebastian Schildt and Lars Wolf COMSNETS 2013,
More informationSense-Aid: A framework for enabling network as a service for participatory sensing
Sense-Aid: A framework for enabling network as a service for participatory sensing Heng Zhang Purdue ECE, Saurabh Bagchi Purdue ECE, He Wang Purdue CS, Rajesh K. Panta AT&T Labs CS logo Supported by: Slide
More informationThe Power of Prediction: Cloud Bandwidth and Cost Reduction
The Power of Prediction: Cloud Bandwidth and Cost Reduction Eyal Zohar Israel Cidon Technion Osnat(Ossi) Mokryn Tel-Aviv College Traffic Redundancy Elimination (TRE) Traffic redundancy stems from downloading
More informationAn E cient Content Delivery Infrastructure Leveraging the Public Transportation Network
An E cient Content Delivery Infrastructure Leveraging the Public Transportation Network Qiankun Su, Katia Ja rès-runser, Gentian Jakllari and Charly Poulliat IRIT, INP-ENSEEIHT, University of Toulouse
More informationOn Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks
On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University Outline Introduction
More informationProgramming Project. Remember the Titans
Programming Project Remember the Titans Due: Data and reports due 12/10 & 12/11 (code due 12/7) In the paper Measured Capacity of an Ethernet: Myths and Reality, David Boggs, Jeff Mogul and Chris Kent
More informationIncentive-Aware Routing in DTNs
Incentive-Aware Routing in DTNs Upendra Shevade Han Hee Song Lili Qiu Yin Zhang The University of Texas at Austin IEEE ICNP 2008 October 22, 2008 1 DTNs Disruption tolerant networks No contemporaneous
More informationCOMFA: Exploiting Regularity of People Movement for Message Forwarding in Community-based Delay Tolerant Networks
COMFA: Exploiting Regularity of People Movement for Message Forwarding in Community-based Delay Tolerant Networks Long Vu, Quang Do, Klara Nahrstedt Department of Computer Science, University of Illinois
More information> *** Strengths: What are the major reasons to accept the paper? [Be brief.]
======= Review 1 ======= This paper considers how the large amounts of user upload activity can be supported in mobile networks economically. Their proposal revolves around the concept of using delayed
More informationData Offloading in Mobile Cloud Computing: A Markov Decision Process Approach
Data Offloading in Mobile Cloud Computing: A Markov Decision Process Approach Dongqing Liu University of Montreal & University of Technology of Troyes dongqing.liu@utt.fr September 13, 2018 Dongqing Liu
More informationCOLLEGE OF ARTS & SCIENCE, SULUR,COIMBATORE
EFFECTIVE SOCIAL ROUTING FRAMEWORK FOR MOBILE SOCIAL SENSING NETWORK USING MULTI HIERARCHICAL ROUTING 1. E.SATHISHKUMAR M.Sc(CS), 2. Mrs. M.SUGANYA M.Sc,Mphil. RATHNAVEL SUBRAMANIAM COLLEGE OF ARTS & SCIENCE,
More informationCooperative Mobile Internet Access with Opportunistic Scheduling
Cooperative Mobile Internet Access with Opportunistic Scheduling Pouya Ostovari, Jie Wu, and Abdallah Khreishah Computer & Information Sciences Temple University Center for Networked Computing http://www.cnc.temple.edu
More informationOpera 5. User manual. Version 1.15
Opera 5 User manual Version 1.15 Opera 5 is a device containing audio recorder with an integrated WiFi interface that is used for recording and online listening with remote control and download recordings
More informationToday. Lecture 17: Reality Mining. Last time
Today We will introduce the idea of a relational database, discuss its underlying data model and present a slightly simplified view of how to access its information Lecture 17: As with all new technologies
More informationEnergy-aware Fault-tolerant and Real-time Wireless Sensor Network for Control System
Energy-aware Fault-tolerant and Real-time Wireless Sensor Network for Control System Thesis Proposal Wenchen Wang Computer Science, University of Pittsburgh Committee: Dr. Daniel Mosse, Computer Science,
More informationNetwork Services BT MPLS (Marketed as IP Connect Global)
Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects Service as detailed in
More informationCloud Transcoder: Bridging the Format and Resolution Gap between Internet Videos and Mobile Devices
Cloud Transcoder: Bridging the Format and Resolution Gap between Internet Videos and Mobile Devices Zhenhua Li, Peking University Yan Huang, Gang Liu, Fuchen Wang, Tencent Research Zhi-Li Zhang, University
More informationImpact of Source Counter on Routing Performance in Resource Constrained DTNs
Impact of Source Counter on Routing Performance in Resource Constrained DTNs Xiaolan Zhang a,, Honggang Zhang b, Yu Gu c a Dept. of Computer and Information Sciences, Fordham University b Dept. of Mathematics
More informationWaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks
WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks Tzu-Chieh Tsai, Ting-Shen Liu, and Chien-Chun Han Department of Computer Science, National Chengchi University, Taipei,
More informationRobust Regression. Robust Data Mining Techniques By Boonyakorn Jantaranuson
Robust Regression Robust Data Mining Techniques By Boonyakorn Jantaranuson Outline Introduction OLS and important terminology Least Median of Squares (LMedS) M-estimator Penalized least squares What is
More informationPersonalized Diapause: Reducing Radio Energy Consumption of Smartphones by Network-Context Aware Dormancy Predictions
Personalized Diapause: Reducing Radio Energy Consumption of Smartphones by Network-Context Aware Dormancy Predictions Yeseong Kim Jihong Kim Department of Computer Science and Engineering Seoul National
More informationTOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM
TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD
More informationParticipant selection for data collection through device-to-device communications in mobile sensing
DOI.7/s779-6-974- ORIGINAL ARTICLE Participant selection for data collection through device-to-device communications in mobile sensing Yu Wang,2 Hanshang Li 2 Ting Li 2 Received: September 26 / Accepted:
More informationToward Energy-efficient and Fault-tolerant Consistent Hashing based Data Store. Wei Xie TTU CS Department Seminar, 3/7/2017
Toward Energy-efficient and Fault-tolerant Consistent Hashing based Data Store Wei Xie TTU CS Department Seminar, 3/7/2017 1 Outline General introduction Study 1: Elastic Consistent Hashing based Store
More informationAndroid project proposals
Android project proposals Luca Bedogni (lbedogni@cs.unibo.it) April 7, 2016 Introduction In this document, we describe four possible projects for the exam of the Laboratorio di applicazioni mobili course.
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More informationPrototyping. SWE 432, Fall Web Application Development
Prototyping SWE 432, Fall 2018 Web Application Development Conceptual design Goal: match users mental model Tool: Metaphor - analogies from existing system Offers expectations about what system does &
More informationA First Look at Traffic on Smartphones
A First Look at Traffic on Smartphones by Falaki et al. Andrew Zafft CS Department Agenda Objective Study Structure Outcomes & Observations Future Work / Citations Conclusions 2 Objective Statistics Why
More information5G From Fixed Wireless Today to Mobility & Transformative Improvements by 2019
5G From Fixed Wireless Today to Mobility & Transformative Improvements by 2019 5G is rapidly climbing the hype cycle. Qualcomm has even claimed it could be as transformative as electricity. Wireless network
More informationPaper Discussion: A Survey on Device-to-Device Communication in Cellular Networks
Paper Discussion: A Survey on Device-to-Device Communication in Cellular Networks Asadi, Arash, Qing Wang, and Vincenzo Mancuso. "A survey on deviceto-device communication in cellular networks." Communications
More informationLAVEA: Latency-Aware Video Analytics on Edge Computing Platform
LAVEA: Latency-Aware Video Analytics on Edge Computing Platform Shanhe Yi *, Zijiang Hao *, Qingyang Zhang, Quan Zhang, Weisong Shi, Qun Li * College of William and Mary * Wayne State University Anhui
More informationHands-On Voice Over IP
Hands-On Course Description Networking is taking an evolutionary path that will allow voice and video - real time services - to successfully exist with data on the same network. This will allow new ways
More informationEnhancing Participant Selection through Caching in Mobile Crowd Sensing
Enhancing Participant Selection through Caching in Mobile Crowd Sensing Hanshang Li Ting Li Fan Li Weichao Wang Yu Wang Department of Computer Science, University of North Carolina at Charlotte, Charlotte,
More informationEnergy-constrained Wi-Fi Offloading Method Using Prefetching
Energy-constrained Wi-Fi Offloading Method Using Prefetching Yoshihisa Onoue, Morihiko Tamai, Keiichi Yasumoto Nara Institute of Science and Technology Ikoma, Nara 630-0192, Japan Email: see http://ubi-lab.naist.jp/index-e.html
More informationTowards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani
Towards a Robust Protocol Stack for Diverse Wireless Networks Arun Venkataramani (in collaboration with Ming Li, Devesh Agrawal, Deepak Ganesan, Aruna Balasubramanian, Brian Levine, Xiaozheng Tie at UMass
More informationFast and Optimal Scheduling over Multiple Network Interfaces
Fast and Optimal Scheduling over Multiple Network Interfaces Problem and Motivation Matei A. Zaharia (matei@matei.ca) Advised by Srinivasan Keshav (keshav@uwaterloo.ca) University of Waterloo Most of today's
More informationDoctoral Written Exam in Networking, Fall 2009
Doctoral Written Exam in Networking, Fall 2009 November 9, 2009 Answer all parts of all questions. There are four multi-part questions, each of equal weight. Turn in your answers by Thursday, November
More informationAlgorithms for Data Science
Algorithms for Data Science CSOR W4246 Eleni Drinea Computer Science Department Columbia University Thursday, October 1, 2015 Outline 1 Recap 2 Shortest paths in graphs with non-negative edge weights (Dijkstra
More informationImportant Information About Your New Online Banking Services. Business Online Banking
Important Information About Your New Online Banking Services Business Online Banking Welcome to Citizens Business Bank At Citizens Business Bank, we value your relationship and continually strive to be
More informationAn Empirical Study of High Availability in Stream Processing Systems
An Empirical Study of High Availability in Stream Processing Systems Yu Gu, Zhe Zhang, Fan Ye, Hao Yang, Minkyong Kim, Hui Lei, Zhen Liu Stream Processing Model software operators (PEs) Ω Unexpected machine
More informationMobile Offloading for Maximum Utility at Minimum Cost
ISSN 2278 0211 (Online) Mobile Offloading for Maximum Utility at Minimum Cost Anjana Antony M. Tech 4th Sem, Department of Computer Science & Engineering Dr. B. R. Prasad Babu Professor & HOD, Department
More informationIMPLEMENTING CISCO VOICE COMMUNICATIONS AND QOS
IMPLEMENTING CISCO VOICE COMMUNICATIONS AND QOS V8.0 (CVOICE) COURSE OVERVIEW: Implementing Cisco Voice Communications and QoS (CVOICE) teaches students about voice gateways, characteristics of VoIP call
More informationSMITE: A Stochastic Compressive Data Collection. Sensor Networks
SMITE: A Stochastic Compressive Data Collection Protocol for Mobile Wireless Sensor Networks Longjiang Guo, Raheem Beyah, and Yingshu Li Department of Computer Science, Georgia State University, USA Data
More informationIEEE networking projects
IEEE 2018-18 networking projects An Enhanced Available Bandwidth Estimation technique for an End-to-End Network Path. This paper presents a unique probing scheme, a rate adjustment algorithm, and a modified
More informationOpportunistic Routing Algorithms in Delay Tolerant Networks
Opportunistic Routing Algorithms in Delay Tolerant Networks Eyuphan Bulut Rensselaer Polytechnic Institute Department of Computer Science and Network Science and Technology (NeST) Center PhD Thesis Defense
More informationMesh4G City Wireless
City Wireless M e s h 4 G C i t y W i r e l e s s City Wireless Pollution Monitoring Bluetooth Journey Time Traffic Lights ANPR Parking WiFi CCTV Bus Stop VMS Installing wireless Traffic Lights or CCTV
More informationA Joint Replication-Migration-based Routing in Delay Tolerant Networks
A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West
More informationFault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks
Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks Harichandan Roy, Shuvo Kumar De, Md.Maniruzzaman, and Ashikur Rahman Department of Computer Science and Engineering Bangladesh University
More informationNeuro-Dynamic Programming An Overview
1 Neuro-Dynamic Programming An Overview Dimitri Bertsekas Dept. of Electrical Engineering and Computer Science M.I.T. May 2006 2 BELLMAN AND THE DUAL CURSES Dynamic Programming (DP) is very broadly applicable,
More informationIncentive Design Bidderand Market Evolution Bidder of Mobile
Allocation rule Allocation rule Incentive Design Bidderand Market Evolution Bidder of Mobile Disclore all private Signaling his private User-Provided information Networks information Mohammad Mahdi Khalili,
More informationEnergy and Performance-Aware Task Scheduling in a Mobile Cloud Computing Environment
2014 IEEE International Conference on Cloud Computing Energy and Performance-Aware Task Scheduling in a Mobile Cloud Computing Environment Xue Lin, Yanzhi Wang, Qing Xie, Massoud Pedram Department of Electrical
More informationLarge-scale Measurements of Wireless Network Behavior
Large-scale Measurements of Wireless Network Behavior Sanjit Biswas (biswas@samsara.com), John Bicket (jbicket@samsara.com), Edmund L. Wong (elwong@meraki.com), Raluca Musaloiu-E (ralucam@meraki.com),
More informationOpportunistic Data Dissemination Using Real-World User Mobility Traces
22nd International Conference on Advanced Information Networking and Applications - Workshops Opportunistic Data Dissemination Using Real-World User Mobility Traces Andreas Heinemann Darmstadt University
More informationMobile Middleware Course. Mobile Platforms and Middleware. Sasu Tarkoma
Mobile Middleware Course Mobile Platforms and Middleware Sasu Tarkoma Role of Software and Algorithms Software has an increasingly important role in mobile devices Increase in device capabilities Interaction
More informationScheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network
International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge
More informationAn Energy-efficient Offloading Framework with Predictable Temporal Correctness
An Energy-efficient Offloading Framework with Predictable Temporal Correctness Zheng Dong Department of Computer Science University of Texas at Dallas zheng@utdallas.edu ABSTRACT Yu Gu Watson Health Cloud
More informationOn the Minimum k-connectivity Repair in Wireless Sensor Networks
On the Minimum k-connectivity epair in Wireless Sensor Networks Hisham M. Almasaeid and Ahmed E. Kamal Dept. of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 Email:{hisham,kamal}@iastate.edu
More informationCoordinated carrier aggregation for campus of home base stations
2015 IEEE 2015 International Symposium on Wireless Communication Systems (ISWCS), Brussels (Belgium), Aug. 2015 DOI: 10.1109/ISWCS.2015.7454390 Coordinated carrier aggregation for campus of home base stations
More informationSurveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web
Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the Web TR020701 April 2002 Erbil Yilmaz Department of Computer Science The Florida State University Tallahassee, FL 32306
More informationFault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks
Fault-Aware Flow Control and Multi-path Routing in Wireless Sensor Networks X. Zhang, X. Dong Shanghai Jiaotong University J. Wu, X. Li Temple University, University of North Carolina N. Xiong Colorado
More informationDecommissioning Legacy Networks
Decommissioning Legacy Networks How Vertix Consulting Helped a Top US Wireless Carrier Decommission Its CDMA Network in Mexico for Future LTE Deployments THE CHALLENGE A major carrier in Mexico was in
More informationChina Telecom SDP Introduction
ITU Workshop on Service Delivery Platforms (SDP) for Telecommunication Ecosystems: from today s realities to requirements and challenges of the future ( ) China Telecom SDP Introduction XiaoSu Research
More informationAn Adaptive Framework for Multistream Classification
An Adaptive Framework for Multistream Classification Swarup Chandra, Ahsanul Haque, Latifur Khan and Charu Aggarwal* University of Texas at Dallas *IBM Research This material is based upon work supported
More informationRealising WACNet Through a Zigbee-based Architecture
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2007 Realising WACNet Through a Zigbee-based Architecture A. Desmet University
More informationCrowdsourcing mobile networks
Crowdsourcing mobile networks Katia Jaffrès-Runser University of Toulouse, INPT-ENSEEIHT, IRIT lab, IRT Team Jiaotong University, Shanghai Fête Nationale / Bastille day, July 14, 2015 N7 Engineering school,
More informationPeter X. Gao, Andrew R. Curtis, Bernard Wong, S. Keshav. Cheriton School of Computer Science University of Waterloo
Peter X. Gao, Andrew R. Curtis, Bernard Wong, S. Keshav Cheriton School of Computer Science University of Waterloo August 15, 2012 1 = ~1M servers CO 2 of 280,000 cars 2 Datacenters and Request Routing
More informationSocial-Tie-Based Information Dissemination in Mobile Opportunistic Social Networks
Social-Tie-Based Information Dissemination in Mobile Opportunistic Social Networks Yunsheng Wang and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 191 Abstract
More informationIBM FlashSystem 720 & FlashSystem 820 Remote Support Overview
IBM FlashSystem 720 & FlashSystem 820 Remote Support Overview Copyright IBM Corporation 2014 i Applicable Products Product: IBM FlashSystem 720 Product Version(s): 6.3.1-p10, 6.3.0 Product: IBM FlashSystem
More informationEnabling opportunistic resources sharing in mobile Operating Systems
ErdOS Enabling opportunistic resources sharing in mobile Operating Systems Narseo Vallina-Rodríguez Jon Crowcroft University of Cambridge http://www.cl.cam.ac.uk/~nv240/erdos.html http://nosql.mypopescu.com/post/1016320617
More informationHosted Voice Product Training Premium Auto Attendant
Hosted Voice Product Training Premium Auto Attendant 1 Agenda 1. What is an Auto Attendant? 2. Auto Attendant Flow Chart 3. Getting Started 4. Time & Day Routing 5. Premium Attendant Icons 6. Premium Offering
More informationCoalition Formation towards Energy-Efficient Collaborative Mobile Computing. Liyao Xiang, Baochun Li, Bo Li Aug. 3, 2015
Coalition Formation towards Energy-Efficient Collaborative Mobile Computing Liyao Xiang, Baochun Li, Bo Li Aug. 3, 2015 Collaborative Mobile Computing Mobile offloading: migrating the computation-intensive
More informationAdaptive Stream Mining: A Novel Dynamic Computing Paradigm for Knowledge Extraction
Adaptive Stream Mining: A Novel Dynamic Computing Paradigm for Knowledge Extraction AFOSR DDDAS Program PI Meeting Presentation PIs: Shuvra S. Bhattacharyya, University of Maryland Mihaela van der Schaar,
More informationPartners: Nokia, NSN, Aalto/ComNet, Aalto/CSE, UH, VTT Future Internet SHOK preconference Johanna Nieminen (Nokia)
Partners: Nokia, NSN, Aalto/ComNet, Aalto/CSE, UH, VTT Future Internet SHOK preconference 30.5.2012 Johanna Nieminen (Nokia) Vision: Future Internet = a mission cri1cal backbone of global informa1on society
More informationEnergy Efficient Social-Based Routing for Delay Tolerant Networks
Energy Efficient Social-Based Routing for Delay Tolerant Networks Chenfei Tian,FanLi,, Libo Jiang,ZeyeWang, and Yu Wang 2, School of Computer Science, Beijing Institute of Technology, Beijing, 8, China
More information- Mobile context-adaptive CAching for COntent-centric networking
EU CHIST-ERA 2012 call C3N Context- and Content-adaptive Communication Networks - Mobile context-adaptive CAching for COntent-centric networking Katia Jaffrès-Runser University of Toulouse, INPT-ENSEEIHT,
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More information6th International Workshop on OMNeT++
6th International Workshop on OMNeT++ An OMNeT++ Framework to Evaluate Video Transmission in Mobile Wireless Multimedia Sensor Networks Denis Rosário, Zhongliang Zhao, Claudio Silva, Eduardo Cerqueira,
More informationHigh and Medium Voltage Substation Design, Testing and Maintenance. KSA, Jeddah, Holiday Inn Jeddah Gateway Hotel.
Training Course : High and Medium Voltage Substation Design, Testing and Maintenance Training Course For One Week In KSA, Jeddah, Holiday Inn Jeddah Gateway Hotel Which Be Held As Under Details : Tel.
More informationApplication Provisioning in Fog Computingenabled Internet-of-Things: A Network Perspective
Application Provisioning in Fog Computingenabled Internet-of-Things: A Network Perspective Ruozhou Yu, Guoliang Xue, and Xiang Zhang Arizona State University Outlines Background and Motivation System Modeling
More informationInter-Domain Routing: BGP
Inter-Domain Routing: BGP Brad Karp UCL Computer Science (drawn mostly from lecture notes by Hari Balakrishnan and Nick Feamster, MIT) CS 3035/GZ01 4 th December 2014 Outline Context: Inter-Domain Routing
More informationMOBILITY PREDICTION IN TELECOM CLOUD USING MOBILE CALLS
MOBILE SOCIAL NETWORKS MOBILITY PREDICTION IN TELECOM CLOUD USING MOBILE CALLS DAQIANG ZHANG, TONGJI UNIVERSITY MIN CHEN, HUAZHONG UNIVERSITY OF SCIENCE AND TECHNOLOGY MOHSEN GUIZANI, QATAR UNIVERSITY
More informationDecommissioning Legacy Networks
ERTIX Consulting Decommissioning Legacy Networks How Vertix Consulting Helped a Top US Wireless Carrier Decommission Its CDMA Network in Mexico for Future LTE Deployments ERTIX Consulting Decommissioning
More informationOptimizing Translation Information Management in NAND Flash Memory Storage Systems
Optimizing Translation Information Management in NAND Flash Memory Storage Systems Qi Zhang 1, Xuandong Li 1, Linzhang Wang 1, Tian Zhang 1 Yi Wang 2 and Zili Shao 2 1 State Key Laboratory for Novel Software
More informationMobiSensing: Exploiting Human Mobility for Multi-Application Mobile Data Sensing with Low User Intervention*
MobiSensing: Exploiting Human Mobility for Multi-Application Mobile Data Sensing with Low User Intervention* Kang Chen 1 and Haiying Shen 2 1 Dept. of ECE, Southern Illinois University, IL, USA 2 Dept.
More informationSimulation and Analysis of Opportunistic Routing Protocols
Simulation and Analysis of Opportunistic Routing Protocols 1 The Purpose The purpose of this assignment is to gain familiarity with a network simulation tool and to get experience in basic data analysis.
More information