• arXiv.cs.NI Pub Date : 2020-09-17
Debjit Paria; Krishnakumar; Abhishek Sinha

We consider the online $\textsf{Bipartite Caching}$ problem where $n$ users are connected to $m$ caches in the form of a bipartite network. Each of the $m$ caches has a file storage capacity of $C$. There is a library consisting of $N >C$ distinct files. Each user can request any one of the files from the library at each time slot. We allow the file request sequences to be chosen in an adversarial

更新日期：2020-09-20
• arXiv.cs.NI Pub Date : 2020-09-17

We present a method to automatically find security strategies for the use case of intrusion prevention. Following this method, we model the interaction between an attacker and a defender as a Markov game and let attack and defense strategies evolve through reinforcement learning and self-play without human intervention. Using a simple infrastructure configuration, we demonstrate that effective security

更新日期：2020-09-20
• arXiv.cs.NI Pub Date : 2020-09-17
Mark Hamilton; Nick Gonsalves; Christina Lee; Anand Raman; Brendan Walsh; Siddhartha Prasad; Dalitso Banda; Lucy Zhang; Lei Zhang; William T. Freeman

Deploying Machine Learning (ML) algorithms within databases is a challenge due to the varied computational footprints of modern ML algorithms and the myriad of database technologies each with their own restrictive syntax. We introduce an Apache Spark-based micro-service orchestration framework that extends database operations to include web service primitives. Our system can orchestrate web services

更新日期：2020-09-20
• arXiv.cs.NI Pub Date : 2020-09-16
Richa Varma; Chris Melville; Claudio Pinello; Tuhin Sahai

The secure command and control (C&C) of mobile agents arises in various settings including unmanned aerial vehicles, single pilot operations in commercial settings, and mobile robots to name a few. As more and more of these applications get integrated into aerospace and defense use cases, the security of the communication channel between the ground station and the mobile agent is of increasing importance

更新日期：2020-09-20
• arXiv.cs.NI Pub Date : 2020-09-16
Zhiyuan Wang; Lin Gao; Tong Wang; Jingjing Luo

In mobile Internet ecosystem, Mobile Users (MUs) purchase wireless data services from Internet Service Provider (ISP) to access to Internet and acquire the interested content services (e.g., online game) from Content Provider (CP). The popularity of intelligent functions (e.g., AI and 3D modeling) increases the computation-intensity of the content services, leading to a growing computation pressure

更新日期：2020-09-18
• arXiv.cs.NI Pub Date : 2020-09-15
Nariman Torkzaban; John S. Baras

With the emergence of network function virtualization (NFV), and software-defined networking (SDN), the realization and implementation of service function chains (SFCs) have become much easier. An SFC is an ordered set of interconnected virtual network functions (VNFs). NFV allows for decoupling the network functions from proprietary hardware realizing a software-based implementation of VNFs on commodity

更新日期：2020-09-18
• arXiv.cs.NI Pub Date : 2020-09-15
Maksym PlanetaTU Dresden; Jan BierbaumTU Dresden; Leo Sahaya Daphne AntonyAMOLF; Torsten HoeflerETH Zurich; Hermann HärtigTU Dresden

Major data centre providers are introducing RDMA-based networks for their tenants, as well as for operating the underlying infrastructure. In comparison to traditional socket-based network stacks, RDMA-based networks offer higher throughput, lower latency and reduced CPU overhead. However, transparent checkpoint and migration operations become much more difficult. The key reason is that the OS is removed

更新日期：2020-09-16
• arXiv.cs.NI Pub Date : 2020-09-14
Yi Shi; Yalin E. Sagduyu; Tugba Erpek

The paper presents a reinforcement learning solution to dynamic resource allocation for 5G radio access network slicing. Available communication resources (frequency-time blocks and transmit powers) and computational resources (processor usage) are allocated to stochastic arrivals of network slice requests. Each request arrives with priority (weight), throughput, computational resource, and latency

更新日期：2020-09-15
• arXiv.cs.NI Pub Date : 2020-09-13
Primal Wijesekera; Chamath I. Keppitiyagama

The density of mobile phones has increased rapidly in recent years. One drawback of the current mobile telephone technology is that it forces all the calls to go through cellular base stations even if the caller and the callee are within the radio range of each other. Hybrid cellular networks and Unlicensed Mobile Access (UMA) have been proposed as solutions that enable mobile phone users to bypass

更新日期：2020-09-15
• arXiv.cs.NI Pub Date : 2020-09-12
Anupama Hegde; Andreas Festag

Cellular Vehicle-to-X (Cellular V2X) is a communication technology that aims to facilitate the communication among vehicles and with the roadside infrastructure. Introduced with LTE Release 14, Cellular V2X enables device-to-device communication to support road safety and traffic efficiency applications. We present Artery-C, a simulation framework for the performance evaluation of Cellular V2X protocols

更新日期：2020-09-15
• arXiv.cs.NI Pub Date : 2020-09-11
Mao V. Ngo; Tie Luo; Hieu T. Hoang; Tony Q. S. Quek

Offloading computationally intensive tasks from mobile users (MUs) to a virtualized environment such as containers on a nearby edge server, can significantly reduce processing time and hence end-to-end (E2E) delay. However, when users are mobile, such containers need to be migrated to other edge servers located closer to the MUs to keep the E2E delay low. Meanwhile, the mobility of MUs necessitates

更新日期：2020-09-15
• arXiv.cs.NI Pub Date : 2020-09-14
Chaouki Ben Issaid; Anis Elgabli; Jihong Park; Mehdi Bennis

In this paper, we propose a communication-efficiently decentralized machine learning framework that solves a consensus optimization problem defined over a network of inter-connected workers. The proposed algorithm, Censored-and-Quantized Generalized GADMM (CQ-GGADMM), leverages the novel worker grouping and decentralized learning ideas of Group Alternating Direction Method of Multipliers (GADMM), and

更新日期：2020-09-15
• arXiv.cs.NI Pub Date : 2020-09-12
Walter Hussak; Amitabh Trehan

Basic synchronous flooding proceeds in rounds. Given a finite undirected (network) graph $G$, a set of sources $I \subseteq G$ initiate flooding in the first round by every node in $I$ sending the same message to all of its neighbours. In each subsequent round, nodes send the message to all of their neighbours from which they did not receive the message in the previous round. Flooding terminates when

更新日期：2020-09-15
• arXiv.cs.NI Pub Date : 2020-09-11
Jonathan Ling; Paul Cautereels

The GPU as a digital signal processing accelerator for cloud RAN is investigated. A new design for a 5G NR low density parity check code decoder running on a GPU is presented. The algorithm is flexibly adaptable to GPU architecture to achieve high resource utilization as well as low latency. It improves over an existing layered design that processes additional codewords in parallel to increase utilization

更新日期：2020-09-14
• arXiv.cs.NI Pub Date : 2020-09-11
DongNyeong Heo; Stanislav Lange; Hee-Gon Kim; Heeyoul Choi

Software-defined networking (SDN) and the network function virtualization (NFV) led to great developments in software based control technology by decreasing expenditures. Service function chaining (SFC) is an important technology to find efficient paths in network servers to process all of the requested virtualized network functions (VNF). However, SFC is challenging since it has to maintain high Quality

更新日期：2020-09-14
• arXiv.cs.NI Pub Date : 2020-09-11

Unmanned aerial vehicles (UAVs) have the potential to overcome the deployment constraint of Internet of Things (IoT) in remote or rural area. Wirelessly powered communications (WPC) can address the battery limitation of IoT devices through transferring wireless power to IoT devices. The integration of UAVs and WPC, namely UAV-enabled Wireless Powering IoT (Ue-WPIoT) can greatly extend the IoT applications

更新日期：2020-09-14
• arXiv.cs.NI Pub Date : 2020-09-11
Mohan Krishna Kagita; Navod Thilakarathne; Thippa Reddy Gadekallu; Praveen Kumar Reddy Maddikunta

The Internet of Medical Things (IoMT) are increasing the accuracy, reliability, and the production capability of electronic devices by playing a very important part in the industry of healthcare. The available medical resources and services related to healthcare are working to get an interconnection with each other by the digital healthcare system by the contribution of the researchers. Sensors, wearable

更新日期：2020-09-14
• arXiv.cs.NI Pub Date : 2020-09-10
Navrati Saxena; Prasham Jain; Abhishek Roy; Harman Jit Singh; Sukhdeep Singh; Madhan Raj Kanagarathinam

Emerging 5G and next generation 6G wireless are likely to involve myriads of connectivity, consisting of a huge number of relatively smaller cells providing ultra-dense coverage. Guaranteeing seamless connectivity and service level agreements in such a dense wireless system demands efficient network management and fast service recovery. However, restoration of a wireless network, in terms of maximizing

更新日期：2020-09-14
• arXiv.cs.NI Pub Date : 2020-09-10
Yusheng Xiang; Bing Xu; Tianqing Su; Christine Brach; Samuel S. Mao; Marcus Geimer

The fleet management of mobile working machines with the help of connectivity can increase safety and productivity. Although in our previous study, we proposed a solution to use IEEE 802.11p to achieve the fleet management of construction machines, the shortcoming of WIFI may limit the usage of this technology in some cases. Alternatively, the fifth-generation mobile networks (5G) have shown great

更新日期：2020-09-11
• arXiv.cs.NI Pub Date : 2020-09-10
K. Eledlebi; D. Ruta; H. Hildmann; F. Saffre; Y. Al Hammadi; A. F. Isakovic

The rapid deployment of wireless sensor network (WSN) poses the challenge of finding optimal locations for the network nodes, especially so in (i) unknown and (ii) obstacle-rich environments. This paper addresses this challenge with BISON (Bio-Inspired Self-Organizing Network), a variant of the Voronoi algorithm. In line with the scenario challenges, BISON nodes are restricted to (i) locally sensed

更新日期：2020-09-11
• arXiv.cs.NI Pub Date : 2020-09-10
Bikramjit Singh; Majid Gerami

Configured Grant-based allocation has been adopted in New Radio 3rd Generation Partnership Project Release 16. This scheme is beneficial in supporting Ultra-Reliable and Low Latency Communication for industrial communication, a key Fifth Generation mobile communication usage scenario. This scheduling mechanism enables a user with a periodic traffic to transmit its data readily and bypasses the signaling

更新日期：2020-09-11
• arXiv.cs.NI Pub Date : 2020-09-09
Jatin Sharma; Nikhilesh Behera; Priya Venkatraman; Boon Thau Loo

Software Defined Networking has unfolded a new area of opportunity in distributed networking and intelligent networks. There has been a great interest in performing machine learning in distributed setting, exploiting the abstraction of SDN which makes it easier to write complex ML queries on standard control plane. However, most of the research has been made towards specialized problems (security,

更新日期：2020-09-11
• arXiv.cs.NI Pub Date : 2020-09-10
Rajarshi Roy Chowdhury; Sandhya Aneja; Nagender Aneja; Emeroylariffion Abas

Device identification is the process of identifying a device on Internet without using its assigned network or other credentials. The sharp rise of usage in Internet of Things (IoT) devices has imposed new challenges in device identification due to a wide variety of devices, protocols and control interfaces. In a network, conventional IoT devices identify each other by utilizing IP or MAC addresses

更新日期：2020-09-11
• arXiv.cs.NI Pub Date : 2020-09-09
Richard Sailer; Jörg Hähner

This paper proposes AFMT, a packet scheduling algorithm to achieve adaptive flow-aware multipath tunnelling. AFMT has two unique properties. Firstly, it implements robust adaptive traffic splitting for the subtunnels. Secondly, it detects and schedules bursts of packets cohesively, a scheme that already enabled traffic splitting for load balancing with little to no packet reordering. Several NS-3 experiments

更新日期：2020-09-11
• arXiv.cs.NI Pub Date : 2020-09-09
Alisson Yury; Everaldo Andrade; Michele Nogueira; Aldri Santos; Fernando Matos

Critical urban events need to be efficiently handled, for instance, through rapid notification. VANETs are a promising choice in supporting notification of information on arbitrary critical events. Although the dynamicity of VANETs compromises the dissemination process, the connections among vehicles based on users' social interests allow for optimizing message exchange and data dissemination. This

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-09-09
Laurent Petit; Jean-Baptiste Dore; Eric Mercier; Claude Brocheton; Julien Legrand; Dimitri Ktenas

On the eve of 5G network deployment worldwide, a new boom in the mass digitization of our personal and professional lifestyles is looming. 5G marks a strong shift in the way in which connectivity will impact our societies and industries. This shift is taking place through a combination of technologies that have progressed business-as-usual with technical improvements. The future of 5G, already called

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-09-09
Philipp H. Kindt; Swaminathan Narayanaswamy; Marco Saur; Samarjit Chakraborty

Neighbor discovery (ND) protocols are used for establishing a first contact between multiple wireless devices. The energy consumption and discovery latency of this procedure are determined by the parametrization of the protocol. In most existing protocols, reception and transmission are temporally coupled. Such schemes are referred to as \textit{slotted}, for which the problem of finding optimized

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-09-09
Abdelaali Chaoub; Marco Giordani; Brejesh Lall; Vimal Bhatia; Adrian Kliks; Luciano Mendes; Khaled Rabie; Harri Saarnisaari; Amit Singhal; Nan Zhang; Sudhir Dixit

In telecommunications, network sustainability as a requirement is closely related to equitably serving the population residing at locations that can most appropriately be described as remote. The first four generations of mobile communication ignored the remote connectivity requirements, and the fifth generation is addressing it as an afterthought. However, sustainability and its social impact are

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-09-08
René Brandborg Sørensen; Jimmy Jessen Nielsen; Petar Popovski

The growth of Machine-Type Communication (MTC) increases the relevance of queuing scenarios with deterministic service times. In this letter, we present a model for queues without waiting lines and with degenerate service time distributions and show how the framework is extendable to model general service time distributions. Simple bounds and a close approximation of the blocking probability are derived

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-09-08
Everaldo Andrade; Aldri Santos; Paulo Maciel Jr; Fernando Matos

The treatment of mobile and simultaneous critical urban events requires effective actions by the appropriate authorities. Additionally it implies communication challenges in the speed and accuracy of their occurrence by the entities, as well as dealing with the dynamics and speed in these environments. Cooperative solutions with shared resources that address these challenges become a real option in

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-09-09
Eliseu M. Oliveira; Rafael F. Reale; Joberto S. B. Martins

Artificial intelligence (AI) has been used in various areas to support system optimization and find solutions where the complexity makes it challenging to use algorithmic and heuristics. Case-based Reasoning (CBR) is an AI technique intensively exploited in domains like management, medicine, design, construction, retail and smart grid. CBR is a technique for problem-solving and captures new knowledge

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-09-08
Pratheek S. Upadhyaya; Vijay K. Shah; Jeffrey H. Reed

As several new spectrum bands are opening up for shared use, a new paradigm of \textit{Diverse Band-aware Dynamic Spectrum Access} (d-DSA) has emerged. d-DSA equips a secondary device with software defined radios (SDRs) and utilize whitespaces (or idle channels) in \textit{multiple bands}, including but not limited to TV, LTE, Citizen Broadband Radio Service (CBRS), unlicensed ISM. In this paper, we

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-09-07
Lanfranco Zanzi; Vincenzo Sciancalepore; Andres Garcia-Saavedra; Hans D. Schotten; Xavier Costa-Perez

Network Slicing is expected to become a game changer in the upcoming 5G networks and beyond, enlarging the telecom business ecosystem through still-unexplored vertical industry profits. This implies that heterogeneous service level agreements (SLAs) must be guaranteed per slice given the multitude of predefined requirements. In this paper, we pioneer a novel radio slicing orchestration solution that

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-09-04
Abdallah Moubayed; Tanveer Ahmed; Anwar Haque; Abdallah Shami

The growth in wireless broadband users, devices, and novel applications has led to a significant increase in the demand for new radio frequency spectrum. This is expected to grow even further given the projection that the global traffic per year will reach 4.8 zettabytes by 2022. Moreover, it is projected that the number of Internet users will reach 4.8 billion and the number of connected devices will

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-09-01
Jatin Sharma; Vishwanath Sinha

Future broadband networks need to provide high capacity at low cost with increased revenue through enhanced services. WiMAX came up as one of the leading technologies, however, the 2.3 GHz and 2.5 GHz frequency bands allocated create two serious coexistence issues with the adjacent 2.4 GHz ISM band. First problem is to address radio interfaces that are located on two independent platforms and still

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-08-01
Fuqiang Gu; Milad Ramezani; Kourosh Khoshelham; Xiaoping Zheng; Ruiqin Zhou; Jianga Shang

Fingerprinting is a popular indoor localization technique since it can utilize existing infrastructures (e.g., access points). However, its site survey process is a labor-intensive and time-consuming task, which limits the application of such systems in practice. In this paper, motivated by the availability of advanced sensing capabilities in smartphones, we propose a fast and reliable fingerprint

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-07-31
Elham Kalantari; Halim Yanikomeroglu; Abbas Yongacoglu

Use of aerial base stations (ABSs) is a promising approach to enhance the agility and flexibility of future wireless networks. ABSs can improve the coverage and/or capacity of a network by moving supply towards demand. Deploying ABSs in a network presents several challenges such as finding an efficient 3D-placement of ABSs that takes network objectives into account. Another challenge is the limited

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-09-01
Amir Mirzaeinnia; Mehdi Mirzaeinia; Abdelmounaam Rezgui

Modern applications are highly sensitive to communication delays and throughput. This paper surveys major attempts on reducing latency and increasing the throughput. These methods are surveyed on different networks and surroundings such as wired networks, wireless networks, application layer transport control, Remote Direct Memory Access, and machine learning based transport control.

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-08-19
Haixia Peng; Xuemin Shen

In this paper, we investigate joint vehicle association and multi-dimensional resource management in a vehicular network assisted by multi-access edge computing (MEC) and unmanned aerial vehicle (UAV). To efficiently manage the available spectrum, computing, and caching resources for the MEC-mounted base station and UAVs, a resource optimization problem is formulated and carried out at a central controller

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-08-06
Caitlyn A. K. Singam

The objective of this analysis was to simulate the performance of three different ad-hoc protocols for disruption-tolerant networking (DTN) - i.e. the transfer of information through a network of nodes in contexts prone to signal interruption/signal degradation - and to perform a trade-off analysis that will yield a recommendation of the best course of action (COA) for a user of a space-based network

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-09-08
Souhila Silmi; Zouina Doukha; Rebiha Kemcha; Samira Moussaoui

Wireless sensor networks (WSNs) have emerged as one of the most promising technologies for the current era. Researchers have studied them for several years ago, but more work still needed to be made since open opportunities to integrate new technologies are added to this field. One challenging task is WSN deployment. Yet, this is done by real deployment with testbeds platforms or by simulation tools

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-09-08
Hamidreza Bagheri; Md Noor-A-Rahim; Zilong Liu; Haeyoung Lee; Dirk Pesch; Klaus Moessner; Pei Xiao

This paper is concerned with the key features and fundamental technology components for 5G New Radio (NR) for genuine realization of connected and cooperative autonomous driving. We discuss the major functionalities of physical layer, Sidelink features and its resource allocation, architecture flexibility, security and privacy mechanisms, and precise positioning techniques with an evolution path from

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-09-08
Jiexin Wu; Cunlai Pu; Shuxin Ding

Transport processes are universal in real-world complex networks, such as communication and transportation networks. As the increase of the traffic in these complex networks, problems like traffic congestion and transport delay are becoming more and more serious, which call for a systematic optimization of these networks. In this paper, we formulate a multi-objective optimization problem (MOP) to deal

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-08-06
Matteo Varvello; Benjamin Livshits

Mobile web browsing has recently surpassed desktop browsing both in term of popularity and traffic. Following its desktop counterpart, the mobile browsers ecosystem has been growing from few browsers (Chrome, Firefox, and Safari) to a plethora of browsers, each with unique characteristics (battery friendly, privacy preserving, lightweight, etc.). In this paper, we introduce a browser benchmarking pipeline

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-09-07
Sanjay Seshan

Studies predict that demand for autonomous vehicles will increase tenfold between 2019 and 2026. However, recent high-profile accidents have significantly impacted consumer confidence in this technology. The cause for many of these accidents can be traced back to the inability of these vehicles to correctly sense the impending danger. In response, manufacturers have been improving the already extensive

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-09-07
Rojin Aslani; Mehdi Rasti

In this paper, we propose a distributed power control algorithm for addressing the global energy efficiency (GEE) maximization problem subject to satisfying a minimum target SINR for all user equipments (UEs) in wireless cellular networks. We state the problem as a multi-objective optimization problem which targets minimizing total power consumption and maximizing total throughput, simultaneously,

更新日期：2020-09-10
• arXiv.cs.NI Pub Date : 2020-09-07
Yulei Wu; Hong-Ning Dai; Hao Wang; Kim-Kwang Raymond Choo

5G-enabled drones have potential applications in a variety of both military and civilian settings (e.g., monitoring and tracking of individuals in demonstrations and/or enforcing of social / physical distancing during pandemics such as COVID-19). Such applications generally involve the collection and dissemination of (massive) data from the drones to remote data centres for storage and analysis, for

更新日期：2020-09-08
• arXiv.cs.NI Pub Date : 2020-09-07
Tzu-Hsuan Liu; Che-Hao Yu; Yi-Jheng Lin; Cheng-Shang Chang; Duan-Shin Lee

Motivated by the need to hide the complexity of the physical layer from performance analysis in a layer 2 protocol, a class of abstract receivers, called Poisson receivers, was recently proposed in [1] as a probabilistic framework for providing differentiated services in uplink transmissions in 5G networks. In this paper, we further propose a deterministic framework of ALOHA receivers that can be incorporated

更新日期：2020-09-08
• arXiv.cs.NI Pub Date : 2020-09-07
Fan Tiegang; Chen Junmin

The deployment of network nodes is essential to ensure the wireless sensor network's regular operation and affects the multiple network performance metrics, such as connectivity, coverage, lifetime, and cost. This paper focuses on the problem of minimizing network costs while meeting network requirements, and proposes a corona-based deployment method by using the variable transmission distance sensor

更新日期：2020-09-08
• arXiv.cs.NI Pub Date : 2020-09-07
Hessam Moeini; I-Ling Yen; Farokh Bastani

In the last decade, many semantic-based routing protocols had been designed for peer-to-peer systems. However, they are not suitable for IoT systems, mainly due to their high demands in memory and computing power which are not available in many IoT devices. In this paper, we develop a semantic-based routing protocol for dynamic IoT systems to facilitate dynamic IoT capability discovery and composition

更新日期：2020-09-08
• arXiv.cs.NI Pub Date : 2020-09-06
Tasneem Darwish; Gunes Karabulut Kurt; Halim Yanikomeroglu; Gamini Senarath; Peiying Zhu

Future integrated terrestrial-aerial-satellite networks will have to exhibit some unprecedented characteristics for the provision of both communications and computation services, and security for a tremendous number of devices with very broad and demanding requirements in an almost-ubiquitous manner. Although 3GPP introduced the concept of self-organization networks (SONs) in 4G and 5G documents to

更新日期：2020-09-08
• arXiv.cs.NI Pub Date : 2020-09-05
Muhammad Usama; Rupendra Nath Mitra; Inaam Ilahi; Junaid Qadir; Mahesh K. Marina

Spurred by the recent advances in deep learning to harness rich information hidden in large volumes of data and to tackle problems that are hard to model/solve (e.g., resource allocation problems), there is currently tremendous excitement in the mobile networks domain around the transformative potential of data-driven AI/ML based network automation, control and analytics for 5G and beyond. In this

更新日期：2020-09-08
• arXiv.cs.NI Pub Date : 2020-09-06
Heng-Li Liu; Quan-Lin Li; Chi Zhang

In this paper, we discuss an interesting but challenging bilateral stochastically matching problem: A more general matched queue with matching batch pair (m, n) and two types (i.e., types A and B) of impatient customers, where the arrivals of A- and B-customers are both Poisson processes, m A-customers and n B-customers are matched as a group which leaves the system immediately, and the customers'

更新日期：2020-09-08
• arXiv.cs.NI Pub Date : 2020-09-05
Daehyeok Kim; Ankush Jain; Zaoxing Liu; George Amvrosiadis; Damian Hazen; Bradley Settlemyer; Vyas Sekar

Many recent efforts have shown that in-network computing can benefit various datacenter applications. In this paper, we explore a relatively less-explored domain which we argue can benefit from in-network computing: scientific workloads in high-performance computing. By analyzing canonical examples of HPC applications, we observe unique opportunities and challenges for exploiting in-network computing

更新日期：2020-09-08
• arXiv.cs.NI Pub Date : 2020-09-04
Yudi Huang; Ting He; Nilanjan Ray Chaudhuri; Thomas La Porta

Effective defense against cyber-physical attacks in power grid requires the capability of accurate damage assessment within the attacked area. While some solutions have been proposed to recover the phase angles and the link status (i.e., breaker status) within the attacked area, existing solutions made the limiting assumption that the grid stays connected after the attack. To fill this gap, we study

更新日期：2020-09-08
• arXiv.cs.NI Pub Date : 2020-09-04

In this paper we show that the data plane of commodity programmable (Network Interface Cards) NICs can run neural network inference tasks required by packet monitoring applications, with low overhead. This is particularly important as the data transfer costs to the host system and dedicated machine learning accelerators, e.g., GPUs, can be more expensive than the processing task itself. We design and

更新日期：2020-09-08
• arXiv.cs.NI Pub Date : 2020-09-04

The Internet-of-Things (IoT) presents itself as an emerging technology, which is able to interconnect a massive number of heterogeneous smart devices for supporting complex data-driven applications in a variety of domains, such as smart-cities, healthcare, industrial automation etc. Throughout their extended lifetime, the devices forming the IoT networks need to be re-programmed over-the-air, so that

更新日期：2020-09-08
• arXiv.cs.NI Pub Date : 2020-09-04
Guangxu Zhu; Jie Xu; Kaibin Huang

Wireless data aggregation (WDA), referring to aggregating data distributed at devices, is a common operation in 5G-and-beyond networks for supporting applications related to distributed sensing, learning, and consensus. Conventional WDA techniques that are designed based on a separated-communication-and-computation principle encounter difficulty in meeting the stringent throughput/latency requirements

更新日期：2020-09-08
• arXiv.cs.NI Pub Date : 2020-09-04
Wei Duan; Yancheng Ji; Yan Zhang; Guoan Zhang; Valerio Frascolla; Xin Li

Currently, many countries are facing the problems of aging population, serious imbalance of medical resources supply and demand, as well as uneven geographical distribution, resulting in a huge demand for remote e-health. Particularly, with invasions of COVID-19, the health of people and even social stability have been challenged unprecedentedly. To contribute to these urgent problems, this article

更新日期：2020-09-08
• arXiv.cs.NI Pub Date : 2020-09-04