DMCA
Coding-Based System Primitives for Airborne Cloud Computing (2011)
Citations: | 1 - 0 self |
Citations
3609 | Compressed sensing - Donoho - 1996 |
3437 | Mapreduce: Simplified data processing on large clusters
- Dean, Ghemawat
(Show Context)
Citation Context ...lem is to process the data closer to the sensor that generated them, thereby reducing the need for backhaul communications. To achieve this, parallel data processing infrastructures such as MapReduce =-=[5]-=- could be used in the field as a way to handle the data volume while still meeting short deadlines. Of course, delivering the necessary computing power to sensors in the field is not an easy task, esp... |
2717 | Atomic decomposition by basis pursuit
- Chen, Donoho, et al.
- 1999
(Show Context)
Citation Context ... with H at a point near the axes, where the sparse vector lies. Fortunately, the ℓ1 minimization problem is tractable; it is a convex optimization and reduces to a linear program called basis pursuit =-=[44]-=-, which is solved by interior point methods. A full treatment of the optimization methods used to decode is beyond the scope of this chapter and the interested reader is referred to the ℓ1-magic packa... |
2621 | Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information
- Candès, Romberg, et al.
- 2006
(Show Context)
Citation Context ...or decode, the original signal from y given Φ and Ψ, even though solving for s is an ill-posed problem since M < N? Below, we consider these two issues in turn. 2.4.2 Encoding Candés, Romberg and Tao =-=[39]-=- have identified two necessary and sufficient conditions under which constructing Φ will permit accurate recovery of the original signal. as The first condition is the incoherence of Φ with respect to... |
1964 | Network information flow
- Ahlswede, Cai, et al.
(Show Context)
Citation Context ...lector’s Problem and packet erasures). We will describe these gains and the mechanics of network coding in detail below. 2.3.1 Throughput Gains In the seminal paper on network coding, Ahlswede et al. =-=[25]-=- proved the theoretical bounds on the capacity of a multicast network and showed that traditional multicast routing could not achieve the bound, but that network coding could. Consider the butterfly n... |
1501 | The Google file system
- Ghemawat, Gobioff, et al.
- 2003
(Show Context)
Citation Context ... 2 In this example, the input key is irrelevant.Chapter 2: Background 29 will assume here since a full treatment is beyond our scope. The interested reader is referred to the work of Ghemawat et al. =-=[21]-=- for details. A MapReduce job, which consists of M map tasks and R reduce tasks, is administered by the MapReduce run-time according to the following execution flow. First, the user submits her job to... |
1432 | Compressive sampling
- Candès
- 2006
(Show Context)
Citation Context ...on process. Below, we will discuss the basic formulation of the high-rate sensing problem and the mechanics of compressive sensing encoding and decoding, as they are typically found in the literature =-=[41, 42]-=-. Later, in Chapter 5 we will explore how CS is a natural fit for the distributed source setting. 2.4.1 The High-Rate Sensing Problem Consider a real-valued, finite-length, discrete-time signal repres... |
1389 | Stable signal recovery from incomplete and inaccurate measurements
- Candès, Romberg, et al.
(Show Context)
Citation Context ...s that if s were approximately K-sparse, then our recovered ˆs signal is almost as good as if we had known the indices of the K largest coefficients in s and just measured these coefficients directly =-=[40]-=-. Not only does this allow us to handle noisy signals, but this property also lays the foundation for the ability to perform incremental decoding of compressive measurements in a “largest coefficient ... |
1385 | TAG: A tiny aggregation service for ad-hoc sensor networks
- Madden, Franklin, et al.
- 2002
(Show Context)
Citation Context ...satisfied through in-network aggregation of raw sensor data as the data traveled up the collection tree, and offered a simple form of data compression. Among these works were the Cougar [100] and TAG =-=[101]-=- projects, which treated a sensor network’s data streams as an append-only relational database, against which SQL-like queries using aggregation functions (such as MIN, MAX, COUNT, SUM and AVERAGE) co... |
1262 |
Noiseless coding of correlated information sources
- Slepian, Wolf
- 1973
(Show Context)
Citation Context ... X had access to “side-information” Y , then X and Y could coordinate their coding and use the optimal total rate of RX + RY ≥ H(X, Y ), the rate of a joint optimal encoder. In 1973, Slepian and Wolf =-=[108]-=- published a landmark paper proving their eponymous theorem stating that X and Y could be coded with a total rate equal to the joint entropy H(X, Y ) as long as their individual rates satisfied RX ≥ H... |
1015 | Linear network coding
- Li, Yeung, et al.
(Show Context)
Citation Context ...d (called the native data) are treated as a vector over a finite field. A linear transformation is then applied to the vector (i.e., a linear combination is taken) and the result forwarded. Li et al. =-=[27]-=- showed that, for acyclic multicast networks, linear network codes achieve the maximum multicast capacity bounds; Koetter and Médard [28] extended this result to arbitrary networks. Subsequently, Ho e... |
961 |
Communication in the presence of noise
- Shannon
- 1949
(Show Context)
Citation Context ...yk,1 . . . yk,n 0 0 . . . 1 xk,1 . . . xk,n In this form, the native packets x1, . . . , xk can be read out from the coding matrix easily. 2.4 Compressive Sensing The Nyquist-Shannon sampling theorem =-=[37]-=- states that a signal must be sampled at a rate that is at least twice the maximum frequency present in the signal (i.e., at the so-called Nyquist rate) in order for signal reconstruction to suffer no... |
857 | An algebraic approach to network coding
- Koetter, Médard
(Show Context)
Citation Context ...near combination is taken) and the result forwarded. Li et al. [27] showed that, for acyclic multicast networks, linear network codes achieve the maximum multicast capacity bounds; Koetter and Médard =-=[28]-=- extended this result to arbitrary networks. Subsequently, Ho et al. [29,30] showed that the above properties hold when random coefficients are chosen for the linear transform matrix, i.e., when each ... |
768 | CoSaMP: Iterative signal recovery from incomplete and inaccurate samples
- Needell, Tropp
- 2009
(Show Context)
Citation Context ...ion details. It is, however, worth noting here that the bulk of these numerical methods has a non-trivial observed polynomial complexity of at least O(N 3 ), though more recent methods such as CoSaMP =-=[46]-=- achieve O(N 2 ) with a slight increase in the number of measurements required. Still, there is an explicit trade-off when using compressive sensing: simplicity during encoding is traded for complexit... |
691 |
The restricted isometry property and its implications for compressed sensing
- Candès
(Show Context)
Citation Context ...centage of the total population, the signal is sparse. Moreover, the signal tail drops rapidly, meaning the number of measurements required to accurately decode the largest magnitude anomalies is low =-=[97]-=- and decoding can occur early, as soon as the first few measurements are received. In Evaluations 5.3.2 and 5.3.3 below, we are interested in knowing the effect of M on decoding accuracy for such sign... |
566 | Linklevel measurements from an 802.11b mesh network
- Aguayo, Bicket, et al.
- 2004
(Show Context)
Citation Context ...or different neighbors and broadcasting the coded packet. Loss correction is achieved via hop-by-hop ACK and an external best-path routing mechanism is assumed. Results from deployment on MIT RoofNet =-=[83]-=- showed that COPE could increase the throughput of TCP flows, though this is achieved by making COPE TCP-aware to prevent TCP packet reordering. Instead of working on multiple flows, the MORE project ... |
548 | Xors in the air: Practical wireless network coding
- Katti, Rahul, et al.
(Show Context)
Citation Context ... destination to source, can be similarly encoded but in a different generation ID space. Thus, FlowCode does not seek the traditional network coding throughput gain due to intersecting packet streams =-=[57]-=-. We have found that behaviors of complex transport protocols like TCP (e.g., delayed ACK) present few opportunities to achieve this type of gain in practice. Furthermore, for the TCP ACK stream flowi... |
537 | Sparse MRI: The application of compressed sensing for rapid MR imaging
- Lustig, Donoho, et al.
- 2007
(Show Context)
Citation Context ...omputing power to handle decoding separately. This is one of the most attractive advantages to compressive sensing and has been exploited already in many sensing modalities, including medical imaging =-=[47]-=- and radar [48]. Yet another advantage of compressive sensing is its robustness against signalsChapter 2: Background 49 that are not exactly sparse. In our discussion so far, we’ve only considered K-... |
531 |
Probability and Computing: Randomized Algorithms and Probabilistic Analysis
- Mitzenmacher, Upfal
- 2005
(Show Context)
Citation Context ... can provide additional gains in more sophisticated settings than the canonical examples above. 2.3.2 Robustness Gains Random linear network codes provide robustness to the Coupon Collector’s Problem =-=[31]-=- as well as packet erasures. These gains are particularly important to practical systems that implement network coding, since they generally help simplify protocol designs, as we shall see below.Chap... |
497 | The cougar approach to in-network query processing in sensor networks
- YAO, GEHRKE
(Show Context)
Citation Context ... queries were satisfied through in-network aggregation of raw sensor data as the data traveled up the collection tree, and offered a simple form of data compression. Among these works were the Cougar =-=[100]-=- and TAG [101] projects, which treated a sensor network’s data streams as an append-only relational database, against which SQL-like queries using aggregation functions (such as MIN, MAX, COUNT, SUM a... |
469 |
for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems,
- Standard
- 2001
(Show Context)
Citation Context ... (e.g., via feedback), then the transmitted signal x can be recovered by channel matrix inversion. MU-MIMO has been recently adopted in various revisions to broadband wireless standards such as WiMax =-=[68]-=- and 3GPP LTE [69], though base stations and devicesChapter 4: Improved Data Transport Using Network Coding 118 that support these extensions are not yet widely available. Base stations that are comm... |
461 | Practical Network Coding,”
- Chou, Wu, et al.
- 2003
(Show Context)
Citation Context ...ibe in detail how random linear network codes work in practice. In particular, we describe the implementation of random linear network coding we will use in Chapter 4, which is similar to other works =-=[35, 36]-=-. We assume an arbitrary multihop network in which one node is a source and another a destination. The source generates an infinite stream of native packets destined for the destination. We assume nat... |
450 | Astrolabe: A robust and scalable technology for distributed system monitoring, management, and data mining
- Renesse, Birman, et al.
- 2003
(Show Context)
Citation Context ...ns that data reduction solutions based on local comparisons, filtering, and summarization are unsuitable. Existing solutions resort to reducing the data volume by either employing aggregation methods =-=[87]-=- to lower the resolution of information or by sampling at a low rate [88]. Unfortunately, neither strategy is amenable to the continuous, fine-grain monitoring we want. This led us to cast the scenari... |
407 | Distributed source coding using syndromes (discus): Design and construction,” Information Theory
- Pradhan, Ramchandran
- 2003
(Show Context)
Citation Context ...ed using just 2 bits, which is the same rate achieved as when the encoder had access to side information V . More than 30 years after the Slepian-Wolf theorem, Pradhan and Ramchandran proposed DISCUS =-=[109]-=-, one of the first practical methods for partitioning the input space into co-sets according to the channel code being used. However, such distributed source codes did not support different compressio... |
400 | The impact of data aggregation in wireless sensor networks.
- Krishnamachari, Estrin, et al.
- 2002
(Show Context)
Citation Context ...ata and routing were jointly optimized. Initial simple models were route-centric, where data were optimally routed via a shortest path tree and only opportunistically compressed at intermediate nodes =-=[104]-=-. These evolved into more data-centric approaches where sub-optimal routes were used to maximize the correlation between data arriving at relays. Scaglione et al. proposed a heuristic for determining ... |
361 | The benefits of coding over routing in a randomized setting.
- Ho, Medard, et al.
- 2003
(Show Context)
Citation Context ...d that, for acyclic multicast networks, linear network codes achieve the maximum multicast capacity bounds; Koetter and Médard [28] extended this result to arbitrary networks. Subsequently, Ho et al. =-=[29,30]-=- showed that the above properties hold when random coefficients are chosen for the linear transform matrix, i.e., when each node uses a random linear network code to generate random linear combination... |
322 |
Aloha packet system with and without slots and capture
- Roberts
- 1975
(Show Context)
Citation Context ...ength (RSS), even if the difference in RSS is small. This phenomenon is known as the capture effect and has been known to occur in a wide variety of transceivers besides 802.11, such as ALOHA network =-=[16]-=-, FM [17], and Bluetooth [18]. The difference in RSS between two competing transmitter’s frames can be viewed as a signal-to-noise ratio (SNR), with the stronger transmission considered the signal and... |
314 | Improving the performance of reliable transport protocols in mobile computing environments.
- Caceres, Iftode
- 1995
(Show Context)
Citation Context ...ransport. For example, it is well-known that under these lossy conditions, transport protocols such as TCP achieve considerably lower throughput than that offered by the capacity of the wireless link =-=[51]-=-. This is because TCP misinterprets packet loss as a congestion signal, resulting in unnecessary source throttling. Furthermore, during long-term outages, TCP will timeout and go into exponential back... |
312 | The Ganglia Distributed Monitoring System: Design, Implementation, and Experience. Parallel Computing,
- Massie, Chun, et al.
- 2004
(Show Context)
Citation Context ...nd summarization are unsuitable. Existing solutions resort to reducing the data volume by either employing aggregation methods [87] to lower the resolution of information or by sampling at a low rate =-=[88]-=-. Unfortunately, neither strategy is amenable to the continuous, fine-grain monitoring we want. This led us to cast the scenario as a distributed compression problem (e.g., nodes with “normal” status ... |
294 | Trading structure for randomness in wireless opportunistic routing
- Chachulski, Jennings, et al.
- 2007
(Show Context)
Citation Context ...creasing the time it takes to establish a connection if k were large. Throughput gain from inter-flow network coding is negligible in bulk data transport. Unlike other wireless network coding systems =-=[57,63]-=-, FlowCode does not attempt to achieve the throughput gain resulting from coding together independent packet streams that intersect at a network node (i.e., inter-flow network coding). Net-Chapter 4:... |
278 | Google news personalization: scalable online collaborative filtering.
- Das
- 2007
(Show Context)
Citation Context ...tion domains, ranging from indexing for web search [5] to scientific data analysis for high-energy particle physics [22] and computational chemistry [23] to machine learning in recommendation systems =-=[24]-=- and image analysis [7]. Furthermore, the traditional MapReduce deployment onto large commodity clusters has made big data processing economical for even small organizations, since the hardware is bot... |
218 |
Balanis, Antenna Theory: Analysis and Design
- A
- 2005
(Show Context)
Citation Context ...antenna patterns and the capture effect. We base our discussion of path loss and fading on the treatment of the subjects by Rappaport [13] and Parsons [14], and of antenna patterns on that by Balanis =-=[15]-=-. The interested reader is referred to these texts for further details. 2.1.1 Path Loss As a receiver moves away from a transmitter, the power of the signal it receives will drop, since the transmitte... |
205 | The cost of a cloud: Research problems in data center networks,”
- Greenberg
- 2008
(Show Context)
Citation Context ...ormation is therefore crucial for better decision-making by automated data center management systems [85] and for maintaining what amounts to a geographically-distributed, container-based data center =-=[86]-=-.Chapter 5: Low-Overhead Status Monitoring using Compressive Sensing 131 Second, as UAVs are recruited by a terrestrial unit, a typical operating scenario is one in which the ground unit assigns task... |
203 | The impact of spatial correlation on routing with compression in wireless sensor networks,”
- Pattem, Krishnamachari, et al.
- 2008
(Show Context)
Citation Context ...re suited to handle data with low and high correlations, respectively. Neither perform particularly well when there is an intermediate level of correlation. To address this shortcoming, Pattem et al. =-=[105]-=- proposed a hybrid approach that exploits the fact that spatially close sensors are likely to generate highly correlated data. In their approach, the sensor network is first grouped into geographic cl... |
202 |
Distributed compression in a dense microsensor network
- Pradhan, Kusuma, et al.
- 2002
(Show Context)
Citation Context ...s led us to cast the scenario as a distributed compression problem (e.g., nodes with “normal” status are essentially correlated sources, in the parlance of distributed compression for sensor networks =-=[89]-=-), for which a solution naturally arises: in-network compression of status messages using compressive sensing. We observe that the required bandwidth for each network link in a status collectionChapt... |
199 | On randomized network coding.
- Ho, Medard, et al.
- 2003
(Show Context)
Citation Context ...d that, for acyclic multicast networks, linear network codes achieve the maximum multicast capacity bounds; Koetter and Médard [28] extended this result to arbitrary networks. Subsequently, Ho et al. =-=[29,30]-=- showed that the above properties hold when random coefficients are chosen for the linear transform matrix, i.e., when each node uses a random linear network code to generate random linear combination... |
194 |
Incentives Build Robustness
- Cohen
- 2003
(Show Context)
Citation Context ...sing chunks of a file it has, it codes all of its chunks together and broadcasts the coded chunk to help fill gaps at all of its neighbors. Lee et al. [78] formalized this idea into a BitTorrent-like =-=[79]-=- protocol called CodeTorrent for file sharing in simulated vehicular networks. In both these systems, nodes promiscuously listen for coded packets from neighbors. Naturally, efforts in file sharing an... |
193 | Information exchange in wireless networks with network coding and physical-layer broadcast,” Microsoft Research
- Wu, Chou, et al.
- 2004
(Show Context)
Citation Context ...t the transmission operation that node Z performs is a broadcast of b1 ⊕ b2 to the destinations. This suggests that network coding is particularly well-suited to wireless, which is a broadcast medium =-=[26]-=-. We illustrate how network coding can improve the throughput of a wireless network in Figure 2.5. Consider wireless node A with packet a and node B with packet b. They wish to exchange packets throug... |
190 | Medians and beyond: New aggregation techniques for sensor networks
- Shrivastava, Buragohain, et al.
- 2004
(Show Context)
Citation Context ...e receiving a value of “1” from each of its two children would transmit a value of “2” to its parent, thereby reducing the number of transmissions by 50%. This work was extended by Shrivastava et al. =-=[102]-=-, who introduced the quantile digest, a data structure that adapts its compression to the data distribution by binning the data into variable-sized buckets of approximately equal weight. This data str... |
146 | A Distributed and Adaptive Signal Processing Approach to Reducing Energy Consumption in Sensor Networks,”
- Chou, Petrovic, et al.
- 2003
(Show Context)
Citation Context ...ks are fixed. In the wireless sensor network setting, variable-rate compression is necessary because the data correlation, and thus the compression rate, can be time-varying. In response, Chou et al. =-=[110]-=- propose a practical, two-phased approach for distributed source coding that supports variable-rate compression without the need to change the underlying codebook. In Phase 1, the decoder gathers unco... |
134 | Algebraic gossip: A network coding approach to optimal multiple rumor mongering.
- Deb, Medard
- 2004
(Show Context)
Citation Context ...essage to a randomly chosen node out of the other n−1 nodes— would require O(n log n) rounds. However, if the nodes performed random linear network coding, the number of rounds required would be O(n) =-=[32]-=-. This is again due to the fact that each RLC received is as useful as the next, so each node needs to collect just n RLCs. Packet Erasures It is generally difficult to achieve simultaneously the opti... |
128 | Network coding for efficient communication in extreme networks,” in
- Widmer, Boudec
- 2005
(Show Context)
Citation Context ...uable systemlevel insights. Generation size should be small. There are several practical reasons for keeping the generation size small, even though larger generation sizes are traditionally preferred =-=[35, 62]-=- since they defend more effectively against the coupon collector’s problem. Primarily, FlowCode must keep generation sizes small because it should not introduce extraneous burstiness to transport laye... |
127 | On network correlated data gathering, in:
- Cristescu, Beferull-Lozano, et al.
- 2004
(Show Context)
Citation Context ... rounds, after which Phase 1 is re-invoked to limit error accumulation. An interesting consequence from Slepian-Wolf coding is that routing can be completely decoupled from the problem of compression =-=[111]-=-. Thus, it circumvents the NP-hard problem of jointly optimizing rate allocation and routing: the optimal route is the shortest-path tree and the optimal rate allocation is given by Slepian-Wolf codin... |
125 | CUBIC: A new TCP-friendly high-speed TCP variant.
- Ha, Rhee, et al.
- 2008
(Show Context)
Citation Context ... the maximum number of concurrent connections. We call this modification TCP with low-rate retry (TCP+LRR). Our validation experiments compare the performance of unmodified, standard Linux TCP (CUBIC =-=[58]-=-) over FlowCode against that of TCP+LRR over the standard 802.11 MAC with link-layer ARQ enabled. For TCP over FlowCode, we use parallel links in a 4-Tx/4-Rx configuration (as described in Chapter 3) ... |
117 | Agrawala A. Sniffing out the correct physical layer capture model in 802.11b
- Kochut, Vasan, et al.
(Show Context)
Citation Context ... own SNR thresholds for capture. For 802.11 radios, the capture threshold can be <1dB, but is typically a function of the PHY bit rate, with higher bit rates requiring a higher threshold. Recent work =-=[19,20]-=- in 802.11 networks have shown that capture occurs under three distinct scenarios and that some of these cases have different SNR thresholds. For simplicity, we describe these scenarios using only two... |
98 | Uniform uncertainty principle for Bernoulli and subgaussian ensembles
- Mendelson, Pajor, et al.
(Show Context)
Citation Context ...e it is essentially white noise, an i.i.d. Gaussian Φ is incoherent with respect to almost any basis Ψ. Other random matrices, such as those with entries drawn from a symmetric Bernoulli distribution =-=[43]-=-, have also been shown to satisfy the incoherence and RIP conditions.Chapter 2: Background 46 ˆs ˆs s H s H ˆs s H (a) ℓ2-norm minimization (b) ℓ0-norm minimization (c) ℓ1-norm minimization Figure 2.... |
89 | Digital fountains: A survey and look forward.
- Mitzenmacher
- 2004
(Show Context)
Citation Context ...lt to achieve simultaneously the optimal delay and optimal rate in a packet erasure network using existing methods such as link-by-link block coding or end-to-end erasure codes such as fountain codes =-=[33]-=-. Typically, the former trades delay for a higher rate, while the latter trades rate for a shorter delay. Consider a simple linear network topology with three nodes A, B, and C. Link AB has a loss rat... |
88 | Mapreduce for data intensive scientific analyses
- Ekanayake, Pallickara, et al.
(Show Context)
Citation Context ...e.g., multicore processors and GPUs) as well as its wide use in a variety of application domains, ranging from indexing for web search [5] to scientific data analysis for high-energy particle physics =-=[22]-=- and computational chemistry [23] to machine learning in recommendation systems [24] and image analysis [7]. Furthermore, the traditional MapReduce deployment onto large commodity clusters has made bi... |
86 | Mobisteer: using steerable beam directional antenna for vehicular network access
- Navda, Subramanian, et al.
- 2007
(Show Context)
Citation Context ...ering in vehicular 802.11 networks and multi-user MIMO (MU-MIMO). We will first consider these separately and then discuss some recent work on UAVs in both areas. Beam Steering. The MobiSteer project =-=[64]-=- investigated the use of beam steering based on probing to improve the throughput of 802.11 links between a moving car and roadside access points (APs). MobiSteer uses a car-mounted, software-controll... |
77 | Fast support vector machine training and classification on graphics processors,”
- Catanzaro, Sundaram, et al.
- 2008
(Show Context)
Citation Context ...and (3) it was designed to process large volumes of data effectively and has been used effectively in application domains of interest (e.g., image clustering [7] and, more generally, machine learning =-=[8,9]-=-). However, the framework that is ultimately deployed may not exactly be a MapReduce implementation, mainly due to the difficulties surrounding centralized MapReduce masters in the airborne environmen... |
77 | Autopilot: automatic data center management.
- Isard
- 2007
(Show Context)
Citation Context ...rvice, especially since no physical human intervention is possible during flight. Timely status information is therefore crucial for better decision-making by automated data center management systems =-=[85]-=- and for maintaining what amounts to a geographically-distributed, container-based data center [86].Chapter 5: Low-Overhead Status Monitoring using Compressive Sensing 131 Second, as UAVs are recruit... |
76 | Compressive Data Gathering for Large-Scale Wireless Sensor Networks,”
- Luo, Wu, et al.
- 2009
(Show Context)
Citation Context ...s just a function of the depth of the network tree, making CS an attractive solution to cloud status monitoring. Indeed, CS has already been suggested as a tool for data center temperature monitoring =-=[93]-=-. In this chapter, we propose a general architecture that allows this idea to be easily extended to other classes of applications including, e.g., CPU load monitoring for VM load spreading, per-flow b... |
72 | Network correlated data gathering with explicit communication:
- Cristescu, Beferull-Lozano, et al.
- 2006
(Show Context)
Citation Context ...user’s error tolerance). The common thread underlying these efforts is that they attempt to jointly optimize data correlation and routing. Unfortunately, this is a difficult problem: Cristescu et al. =-=[107]-=- show that this joint optimization of rate allocation and tree building is NP-hard. CloudSense differs in several ways from these efforts. First, the above works often rely on or assume a spatial corr... |
67 | Scalable algorithms for molecular dynamics simulations on commodity clusters
- Bowers, Chow, et al.
(Show Context)
Citation Context ...Us) as well as its wide use in a variety of application domains, ranging from indexing for web search [5] to scientific data analysis for high-energy particle physics [22] and computational chemistry =-=[23]-=- to machine learning in recommendation systems [24] and image analysis [7]. Furthermore, the traditional MapReduce deployment onto large commodity clusters has made big data processing economical for ... |
66 |
The Mobile Radio Propagation
- Parsons
- 1992
(Show Context)
Citation Context ...adio wave propagation such as path loss, fading, antenna patterns and the capture effect. We base our discussion of path loss and fading on the treatment of the subjects by Rappaport [13] and Parsons =-=[14]-=-, and of antenna patterns on that by Balanis [15]. The interested reader is referred to these texts for further details. 2.1.1 Path Loss As a receiver moves away from a transmitter, the power of the s... |
56 | Methods for efficient network coding.
- Maymounkov, Harvey, et al.
- 2006
(Show Context)
Citation Context ...ibe in detail how random linear network codes work in practice. In particular, we describe the implementation of random linear network coding we will use in Chapter 4, which is similar to other works =-=[35, 36]-=-. We assume an arbitrary multihop network in which one node is a source and another a destination. The source generates an infinite stream of native packets destined for the destination. We assume nat... |
55 |
Codecast: a networkcoding-based ad hoc multicast protocol,”
- Park, Gerla, et al.
- 2006
(Show Context)
Citation Context ... In both these systems, nodes promiscuously listen for coded packets from neighbors. Naturally, efforts in file sharing and content distribution led to work on multicasting over wireless. In CodeCast =-=[80]-=-, Park et al. consider the controlled loss, bounded delay multicast problem, which is applicable to multicasting data with deadlines, e.g., video. Loss is corrected by piggybacking the generation rank... |
51 | Network coding meets TCP
- Sundararajan, Shah, et al.
- 2009
(Show Context)
Citation Context ...es that perform routing by requiring a minimum distance from neighbors. Network coding has also been studied in the context of transport layer protocols such as TCP. Most notably, Sundararajan et al. =-=[81]-=- have proposed a network coding modification to TCP (called TCP/NC) that recasts TCP ACKs to acknowledge rank increase rather than sequence numbers, since standard TCP does not allow the destination t... |
46 |
Wi-Fi (802.11b) and Bluetooth: Enabling coexistence.
- Lansford, Stephens, et al.
- 2001
(Show Context)
Citation Context ...erence in RSS is small. This phenomenon is known as the capture effect and has been known to occur in a wide variety of transceivers besides 802.11, such as ALOHA network [16], FM [17], and Bluetooth =-=[18]-=-. The difference in RSS between two competing transmitter’s frames can be viewed as a signal-to-noise ratio (SNR), with the stronger transmission considered the signal and the weaker one the noise1 . ... |
45 | NetFPGA – an open platform for gigabit-rate network switching and routing.
- Lockwood
- 2007
(Show Context)
Citation Context ...witches as well as in hardware. As follow-on work, we will be looking into implementing CloudSense switches using the NetF-Chapter 5: Low-Overhead Status Monitoring using Compressive Sensing 150 PGA =-=[98]-=- platform. 5.5 Applicability to the Airborne Setting The advantages that compressive sensing brings to the airborne compute cloud are quite promising. Below, we offer some informal arguments on how Cl... |
42 | SourceSync: A distributed wireless architecture for exploiting sender diversity
- Rahul, Hassanieh, et al.
- 2010
(Show Context)
Citation Context ... aside from these practical concerns, one technical challenge to applying MU-MIMO in the UAV setting is symbol-level synchronization (on the order of microseconds) of geographically distributed users =-=[70, 71]-=-. This problem arises because frame transmission must be aligned across users in order for each to be decoded successfully at the receiver. Existing WiMax and LTE systems have a ready solution in whic... |
41 | An Airborne Wireless Sensor Network of Micro-Air Vehicles.
- Allred, Hasan, et al.
- 2007
(Show Context)
Citation Context ...aracterizations of the ground-to-UAV wireless channel. In the literature, there have been few efforts to characterize the performance of UAV wireless ad-hoc networks in the field. Those that do exist =-=[11, 12]-=- have focused on characterizing the point-to-point performance of air-to-air and air-to-ground wireless channels. In part, this is because these previous studies were mainly concerned with in-air rout... |
40 | An experimental study on the capture effect in 802.11a networks
- Lee, KimW, et al.
- 2007
(Show Context)
Citation Context ... own SNR thresholds for capture. For 802.11 radios, the capture threshold can be <1dB, but is typically a function of the PHY bit rate, with higher bit rates requiring a higher threshold. Recent work =-=[19,20]-=- in 802.11 networks have shown that capture occurs under three distinct scenarios and that some of these cases have different SNR thresholds. For simplicity, we describe these scenarios using only two... |
38 | A Programmable and High Performance Platform for Data Center Networks.
- LU, GUO, et al.
- 2011
(Show Context)
Citation Context ...us, low-overhead, in-network compression of status reports via compressive sensing. Our prototype design dovetails with recent work on programmable switches, such as the SideCar [90] and ServerSwitch =-=[91]-=- projects. In fact, for our prototype, we assume a hardware setup similar to SideCar: a CloudSense switch is comprised of a commodity switch connected to a general-purpose sidecar processor on a speci... |
36 | AIDA: Adaptive application-independent data aggregation in wireless sensor networks."
- He, Blum, et al.
- 2004
(Show Context)
Citation Context ...ctions required some understanding of data fields or types on which they operated. Also, the compression achieved by these aggregation methods was, by definition, lossy. In contrast, the AIDA project =-=[103]-=- attempted to provide a lossless compression mechanism by concatenating multiple packets heldChapter 5: Low-Overhead Status Monitoring using Compressive Sensing 160 in a sensor’s output queue, subjec... |
35 | Codetorrent: Content distribution using network coding in vanets
- Park, Park, et al.
- 2006
(Show Context)
Citation Context ...nformation. Whenever a node notices neighbors missing chunks of a file it has, it codes all of its chunks together and broadcasts the coded chunk to help fill gaps at all of its neighbors. Lee et al. =-=[78]-=- formalized this idea into a BitTorrent-like [79] protocol called CodeTorrent for file sharing in simulated vehicular networks. In both these systems, nodes promiscuously listen for coded packets from... |
29 | Clustering billions of images with large scale nearest neighbor search.
- Liu, Rosenberg, et al.
- 2007
(Show Context)
Citation Context ...ies could be adapted to the UAV scenario, and (3) it was designed to process large volumes of data effectively and has been used effectively in application domains of interest (e.g., image clustering =-=[7]-=- and, more generally, machine learning [8,9]). However, the framework that is ultimately deployed may not exactly be a MapReduce implementation, mainly due to the difficulties surrounding centralized ... |
28 | The secrecy of compressed sensing measurements.
- Rachlin, Baron
- 2008
(Show Context)
Citation Context ... Bob, who can decrypt it via ℓ1-minimization after successful key exchange. But, suppose an eavesdropper Eve intercepts the ciphertext y. Is the message Alice sent Bob still secure? Rachlin and Baron =-=[99]-=- have proved that compressive sensing does not satisfy Shannon’s notion of perfect secrecy but nonetheless can be considered computationally secure since guessing Φ correctly is NP-hard. Interestingly... |
27 |
The capture effect in FM receivers
- Leentvaar, Flint
- 1976
(Show Context)
Citation Context ...S), even if the difference in RSS is small. This phenomenon is known as the capture effect and has been known to occur in a wide variety of transceivers besides 802.11, such as ALOHA network [16], FM =-=[17]-=-, and Bluetooth [18]. The difference in RSS between two competing transmitter’s frames can be viewed as a signal-to-noise ratio (SNR), with the stronger transmission considered the signal and the weak... |
27 | Network coding for wireless mesh networks: A case study
- Hamra, Barakat, et al.
- 2006
(Show Context)
Citation Context ...since coded packets are innovative for all recipients with high probability. Others have looked at using network coding to improve peer-to-peer file sharing in wireless mesh networks. Al Hamra et al. =-=[77]-=- proposed a selective forwarding protocolChapter 4: Improved Data Transport Using Network Coding 121 based on neighbor content information. Whenever a node notices neighbors missing chunks of a file ... |
25 | Ad hoc UAV ground network (AUGNet),”
- Brown, Argrow, et al.
- 2004
(Show Context)
Citation Context ...aracterizations of the ground-to-UAV wireless channel. In the literature, there have been few efforts to characterize the performance of UAV wireless ad-hoc networks in the field. Those that do exist =-=[11, 12]-=- have focused on characterizing the point-to-point performance of air-to-air and air-to-ground wireless channels. In part, this is because these previous studies were mainly concerned with in-air rout... |
16 | A measurement study of inter-vehicular communication using steerable beam directional antenna
- Subramanian, Navda, et al.
- 2008
(Show Context)
Citation Context ...reshold of packet loss is reached. Then, the next best AP/beam pattern pair is selected and so on until none are left, at which point a new probing phase starts. In follow-on work, Subramanian et al. =-=[65]-=- extend MobiSteer to the vehicle-to-vehicle (V2V) scenario, where the vehicles exchange GPS coordinates and use the beam pattern that corresponds best to LOS 6 “Spatial multiplexing” is defined as the... |
15 |
Compressive Sensing [lecture notes].” Signal Processing Magazine
- Baraniuk
- 2007
(Show Context)
Citation Context ...on process. Below, we will discuss the basic formulation of the high-rate sensing problem and the mechanics of compressive sensing encoding and decoding, as they are typically found in the literature =-=[41, 42]-=-. Later, in Chapter 5 we will explore how CS is a natural fit for the distributed source setting. 2.4.1 The High-Rate Sensing Problem Consider a real-valued, finite-length, discrete-time signal repres... |
14 |
Cooperative relaying for ad-hoc ground networks using swarm UAVs,”
- Palat, Annamalai, et al.
- 2005
(Show Context)
Citation Context ...ifference between the vehicular beam steering problem in MobiSteer [64] and its UAV analog: the location and movement of an UAV is much less predictable than that of a car. Subsequently, Palat et al. =-=[74]-=- proposed cooperatively using single antenna elements in an UAV swarm as a virtual MIMO antenna array to improve data relay throughput between disconnected ground nodes via spatial diversity and multi... |
13 | R2D2: Regulating Beam Shape and Rate as Directionality meets Diversity
- Ramachandran, Kokku, et al.
- 2008
(Show Context)
Citation Context ...V extension focus on steering a single beam towards a single target and do not consider shaping the beam in multiple directions towards different APs for increased spatial diversity. The R2D2 project =-=[66]-=- investigated this shortcoming by considering the trade-off between directionality (narrowness of beams) and diversity (simultaneous coverage of multiple APs). Instead of using a single narrow beam, R... |
13 | SideCar: Building Programmable Datacenter Networks without Programmable Switches. In HotNets
- SHIEH, KANDULA, et al.
- 2010
(Show Context)
Citation Context ... that enables continuous, low-overhead, in-network compression of status reports via compressive sensing. Our prototype design dovetails with recent work on programmable switches, such as the SideCar =-=[90]-=- and ServerSwitch [91] projects. In fact, for our prototype, we assume a hardware setup similar to SideCar: a CloudSense switch is comprised of a commodity switch connected to a general-purpose sideca... |
11 | Performance measurement of 802.11a wireless links from UAV to ground nodes with various antenna orientations,” - Cheng, Hsiao, et al. - 2006 |
11 | Experimental characterization of 802.11n link quality at high rates
- Pelechrinis, Salonidis, et al.
- 2010
(Show Context)
Citation Context ...t of time. This behavior is also observed in MIMO radios—the maximum throughput for a 3x3 MIMO configuration is often advertised to be 300Mbps, but average achievable throughput is between 80–100Mbps =-=[60,61]-=-—yet, MIMO gains have been sufficiently large to vault the technology into commodity status. Second, inhospitable UAV deployment scenarios often thrust particularly harsh requirements onto the applica... |
10 |
Netcompress: Coupling network coding and compressed sensing for efficient data communication in wsns,”
- Nguyen, Jones, et al.
- 2010
(Show Context)
Citation Context ...d from multiple sources in the network and sent up a collection tree. En route, RNC is used to compress these data as well as realize the throughput gains from network coding. Recently, Nguyen et al. =-=[113]-=- have even implemented NetCompress, a Mote-based system similar to RNC that overcomes some practical issues such as header overhead. What RNC and NetCompress propose is essentially inter-flow compress... |
9 | Maximizing throughput of UAV-relaying networks with the loadcarry-and-deliver paradigm,”
- Cheng, Hsiao, et al.
- 2007
(Show Context)
Citation Context ...n airborne compute cloud enables flexible, dynamic deployment of ad-hoc network infrastructure because the aircraft can fly to any location with relative ease. For example, UAVs can act as data mules =-=[6]-=-, thereby reducing the need for labor-intensive (and possibly dangerous) deployments of terrestrial, fixed network infrastructures for backhauling data from field sensors. Second, the airborne compute... |
8 |
Efficient Gathering of Correlated Data
- Gupta, Navda, et al.
- 2005
(Show Context)
Citation Context ...antage of any chance correlations across clusters. Other efforts have made the same observation of spatial correlation of sensor data and have used clustering techniques in similar ways. Gupta et al. =-=[106]-=- proposed to reduce traffic by selecting a subset of “representative” sensors (i.e., cluster heads) to transmit, subject to satisfying a route-to-sink connectivity constraint. Yoon et al. proposed CAG... |
7 | Implementing algorithms for signal and image reconstruction on graphical processing units - Lee, Wright - 2008 |
6 | and ‘complex’ network codes
- Shintre, Katti, et al.
- 2008
(Show Context)
Citation Context ...of decoding accuracy, of course). The difference between the two methods stems from the fact that network coding encodes data over finite fields, whereas compressive sensing does so over a real field =-=[112]-=-. Katti et al. [112] have proposed Real Network Codes (RNC), in which all the finite field operations found in traditional algebraic network codes are essentially replaced with real field operations. ... |
6 | Fast gpu implementation of sparse signal recovery from random projections. - ANDRECUT - 2009 |
5 |
An empirical study on achievable throughputs of
- Visoottiviseth, Piroonsith, et al.
(Show Context)
Citation Context ...t of time. This behavior is also observed in MIMO radios—the maximum throughput for a 3x3 MIMO configuration is often advertised to be 300Mbps, but average achievable throughput is between 80–100Mbps =-=[60,61]-=-—yet, MIMO gains have been sufficiently large to vault the technology into commodity status. Second, inhospitable UAV deployment scenarios often thrust particularly harsh requirements onto the applica... |
5 | Fuqing Yang. An Overview of
- Li, Guo, et al.
- 1997
(Show Context)
Citation Context ...eceiver. Existing WiMax and LTE systems have a ready solution in which they rely on the base station to impose slotted transmission scheduling on users through the use of a reference signal, or pilot =-=[72]-=-. This mechanism makes sense for WiMax and LTE since the base station is fixed and reliable, and might even work in limited UAV settings, e.g., if a base station were mounted on a single UAV. However,... |
5 |
Using airborne vehicle-based antenna arrays to improve communications with UAV clusters,”
- Breheny, D’Andrea, et al.
- 2003
(Show Context)
Citation Context ...ed on hardware that has already been deployed in the field. Smart Antennas for UAVs. There is emerging interest in employing smart antenna technology and principles in the UAV setting. Breheny et al. =-=[73]-=- were among the first to propose using a swarm of UAVs as a virtual antenna array to improve swarm-tosatellite signal strength through cooperative beam steering on the UAVs. The authorsChapter 4: Imp... |
5 | A simple compressive sensing algorithm for parallel many-core architectures - Borghi, Darbon, et al. - 2013 |
4 |
Wireless relay communications with unmanned aerial vehicles: performance and optimization,”
- Zhan, Yu, et al.
- 2011
(Show Context)
Citation Context ...range in a two-hop UAV swarm relay system even under turbulence (i.e., position error) and Doppler shift assumptions, as long as low carrier frequencies were used (VHF and below). More recent efforts =-=[75,76]-=- have focused on using Kalman filters to predict the future locations of cooperating mobile ground transmitters and optimizing an UAV’s flight path to maximize aggregate uplink throughput. With FlowCo... |
3 | Transmit Antenna Selection Based on Link-layer Channel - Cheng, Hsiao, et al. - 2007 |
3 |
Antenna Selection Performance in 802.11 Networks
- Vlah
- 2007
(Show Context)
Citation Context ...ing data an upper bound for the throughput of a transmitter selection strategy that probes and recalculates the best transmitter once every 100 packets (approximately 1Hz, based on prior work by Vlah =-=[59]-=-). For Regions A and B, TCP+LRR average throughput deviates only 1% and 2% from the upper bounds, respectively. This result is to be expected because our data show (Table 4.1) that there is always a d... |
3 | Dynamic UAV relay positioning for the ground-to-air uplink
- Jiang, Swindlehurst
- 2010
(Show Context)
Citation Context ...range in a two-hop UAV swarm relay system even under turbulence (i.e., position error) and Doppler shift assumptions, as long as low carrier frequencies were used (VHF and below). More recent efforts =-=[75,76]-=- have focused on using Kalman filters to predict the future locations of cooperating mobile ground transmitters and optimizing an UAV’s flight path to maximize aggregate uplink throughput. With FlowCo... |
2 |
Data Analysis Challenges
- Meiron, Cazares, et al.
- 2008
(Show Context)
Citation Context ...ed in capability and can now output gigabytes of data per hour, meaning that the sensor data volume from military applications alone is projected to be on the order of yottabytes (1024 bytes) by 2015 =-=[2]-=-. This rapid growth in the volume of sensor data has been aptly termed the “data deluge” in the literature and has naturally become a significant concern, especially as it has far outstripped the rate... |
2 | A location-dependent runs-andgaps model for predicting tcp performance over a uav wireless channel
- Kung, Lin, et al.
- 2010
(Show Context)
Citation Context ...28.8% 4 52.5% 18.3% 29.2% Table 3.2: Percent of flight traces with full loss, intermediate signal, and no loss, determined using a 20-packet window. tocols such as Transmission Control Protocol (TCP) =-=[49, 50]-=- which are sensitive to packet loss patterns. Secondly, the significant presence of intermediate loss regions (16.1–18.6% in Table 3.2) indicates that we could obtain substantial gains through the use... |
1 |
Thoughts on the Future of Information Sharing,” http://ctovision.typepad.com/InfoSharingTechnologyFutures.ppt
- Gourley
(Show Context)
Citation Context ...the sheer volume of sensor data generated globally. In 2006, the total data rate of phenomenology sensors (e.g., electro-optical, infrared, radar) by the U.S. military amounted to just 270GB per year =-=[1]-=-. In the time since, sensors have increased in capability and can now output gigabytes of data per hour, meaning that the sensor data volume from military applications alone is projected to be on the ... |
1 |
Separation-based Joint Decoding
- Chen, Kung
(Show Context)
Citation Context ... CloudSense TOR switches always buffer the latest report and 1 ΦA and ΦB could be the same if we choose a proper sparsifying transform that distinguishes 〈x1, x2, x3〉 from 〈x4, x5, x6〉 to some degree =-=[92]-=-. In our setting, since the sparsifying transform is assumed to be the identity, we must use distinct Φj. However, it can be desirable to use the same Φj since this will reduce the total number of var... |