Local L2-Thresholding Based Data Mining in Peer-to-Peer Systems Ran Wolff Kanishka Bhaduri Hillol Kargupta CSEE Dept, UMBC Presented by: Kanishka Bhaduri.

Slides:



Advertisements
Similar presentations
Ranveer Chandra Ramasubramanian Venugopalan Ken Birman
Advertisements

Costas Busch Louisiana State University CCW08. Becomes an issue when designing algorithms The output of the algorithms may affect the energy efficiency.
Bayesian Belief Propagation
Detecting Cuts in Sensor Networks Subhash Suri UC Santa Barbara (Joint work with N. Shrivastava and C. Toth)
An Adaptive Compulsory Protocol for Basic Communication in Ad-hoc Mobile Networks Ioannis Chatzigiannakis Sotiris Nikoletseas April 2002.
VC Dimension – definition and impossibility result
Principal Component Analysis Based on L1-Norm Maximization Nojun Kwak IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008.
Yang Yang, Miao Jin, Hongyi Wu Presenter: Buri Ban The Center for Advanced Computer Studies (CACS) University of Louisiana at Lafayette 3D Surface Localization.
Failure Detection The ping-ack failure detector in a synchronous system satisfies – A: completeness – B: accuracy – C: neither – D: both.
20/10/2006ALPAGE1 Ordered slicing of very large scale overlay networks Mark Jelasity University of Bologna, Italy Anne-Marie Kermarrec INRIA Rennes/IRISA,
Online Distributed Sensor Selection Daniel Golovin, Matthew Faulkner, Andreas Krause theory and practice collide 1.
Gossip Algorithms and Implementing a Cluster/Grid Information service MsSys Course Amar Lior and Barak Amnon.
Gossip algorithms : “infect forever” dynamics Low-level objectives: – One-to-all: Disseminate rumor from source node to all nodes of network – All-to-all:
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
3D Position Determination Hasti AhleHagh Professor. W.R. Michalson.
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
Distributed Computing Group A Self-Repairing Peer-to-Peer System Resilient to Dynamic Adversarial Churn Fabian Kuhn Stefan Schmid Roger Wattenhofer IPTPS.
Dynamic Hypercube Topology Stefan Schmid URAW 2005 Upper Rhine Algorithms Workshop University of Tübingen, Germany.
A Survey on Sensor Networks Rick Han CSCI 7143 Secure Sensor Networks Fall 2004.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
Chess Review May 11, 2005 Berkeley, CA Closing the loop around Sensor Networks Bruno Sinopoli Shankar Sastry Dept of Electrical Engineering, UC Berkeley.
Data mining and statistical learning - lecture 13 Separating hyperplane.
Jana van Greunen - 228a1 Analysis of Localization Algorithms for Sensor Networks Jana van Greunen.
A Local Facility Location Algorithm Supervisor: Assaf Schuster Denis Krivitski Technion – Israel Institute of Technology.
1 University of Denver Department of Mathematics Department of Computer Science.
Scalable and Distributed GPS free Positioning for Sensor Networks Rajagopal Iyengar and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic Institute.
GS 3 GS 3 : Scalable Self-configuration and Self-healing in Wireless Networks Hongwei Zhang & Anish Arora.
01/16/2002 Reliable Query Reporting Project Participants: Rajgopal Kannan S. S. Iyengar Sudipta Sarangi Y. Rachakonda (Graduate Student) Sensor Networking.
Minimizing interference for the highway model in Wireless Ad-hoc and Sensor Networks Haisheng Tan, Tiancheng, Lou, Francis C.M. Lau, YuexuanWang, Shiteng.
Authors: Sheng-Po Kuo, Yu-Chee Tseng, Fang-Jing Wu, and Chun-Yu Lin
Limits of Local Algorithms in Random Graphs
Dynamic Coverage Enhancement for Object Tracking in Hybrid Sensor Networks Computer Science and Information Engineering Department Fu-Jen Catholic University.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Adaptive CSMA under the SINR Model: Fast convergence using the Bethe Approximation Krishna Jagannathan IIT Madras (Joint work with) Peruru Subrahmanya.
LINEAR CLASSIFICATION. Biological inspirations  Some numbers…  The human brain contains about 10 billion nerve cells ( neurons )  Each neuron is connected.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Super-peer Network. Motivation: Search in P2P Centralised (Napster) Flooding (Gnutella)  Essentially a breadth-first search using TTLs Distributed Hash.
Data Mining Algorithms for Large-Scale Distributed Systems Presenter: Ran Wolff Joint work with Assaf Schuster 2003.
Energy-Efficient Signal Processing and Communication Algorithms for Scalable Distributed Fusion.
Distributed Classification in Peer-to-Peer Networks Ping Luo, Hui Xiong, Kevin Lü, Zhongzhi Shi Institute of Computing Technology, Chinese Academy of Sciences.
Association Rule Mining in Peer-to-Peer Systems Ran Wolff Assaf Shcuster Department of Computer Science Technion I.I.T. Haifa 32000,Isreal.
A Mechanized Model for CAN Protocols Context and objectives Our mechanized model Results Conclusions and Future Works Francesco Bongiovanni and Ludovic.
Neighborhood-Based Topology Recognition in Sensor Networks S.P. Fekete, A. Kröller, D. Pfisterer, S. Fischer, and C. Buschmann Corby Ziesman.
Hierarchical Clustering of Gene Expression Data Author : Feng Luo, Kun Tang Latifur Khan Graduate : Chien-Ming Hsiao.
A new Ad Hoc Positioning System 컴퓨터 공학과 오영준.
1 Shape Segmentation and Applications in Sensor Networks Xianjin Xhu, Rik Sarkar, Jie Gao Department of CS, Stony Brook University INFOCOM 2007.
A New Hybrid Wireless Sensor Network Localization System Ahmed A. Ahmed, Hongchi Shi, and Yi Shang Department of Computer Science University of Missouri-Columbia.
Ad Hoc Positioning System (APS)
Analyzing the Vulnerability of Superpeer Networks Against Attack Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Intro. ANN & Fuzzy Systems Lecture 14. MLP (VI): Model Selection.
Computer Network Lab. Integrated Coverage and Connectivity Configuration in Wireless Sensor Networks SenSys ’ 03 Xiaorui Wang, Guoliang Xing, Yuanfang.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
By: Gang Zhou Computer Science Department University of Virginia 1 Medians and Beyond: New Aggregation Techniques for Sensor Networks CS851 Seminar Presentation.
Computer Science 1 Using Clustering Information for Sensor Network Localization Haowen Chan, Mark Luk, and Adrian Perrig Carnegie Mellon University
Anish Arora Ohio State University Mikhail Nesterenko Kent State University Local Tolerance to Unbounded Byzantine Faults.
Energy-Efficient Signal Processing and Communication Algorithms for Scalable Distributed Fusion.
Of 17 Limits of Local Algorithms in Random Graphs Madhu Sudan MSR Joint work with David Gamarnik (MIT) 7/11/2013Local Algorithms on Random Graphs1.
Dynamic Load Balancing Tree and Structured Computations.
Straight Line Routing for Wireless Sensor Networks Cheng-Fu Chou, Jia-Jang Su, and Chao-Yu Chen Computer Science and Information Engineering Dept., National.
Delay-Tolerant Networks (DTNs)
Vineet Mittal Should more be added here Committee Members:
Peer-to-Peer and Social Networks
Presented by Prashant Duhoon
DISTRIBUTED CLUSTERING OF UBIQUITOUS DATA STREAMS
DATA RETRIEVAL IN ADHOC NETWORKS
Neuro-RAM Unit in Spiking Neural Networks with Applications
The Coverage Problem in a Wireless Sensor Network
Speaker : Lee Heon-Jong
Presentation transcript:

Local L2-Thresholding Based Data Mining in Peer-to-Peer Systems Ran Wolff Kanishka Bhaduri Hillol Kargupta CSEE Dept, UMBC Presented by: Kanishka Bhaduri Wednesday, April 15, 2015

Roadmap Motivation Algorithms – Local L2 – K-means Results Related Work Conclusions

3 P2P Network Networks connect millions of individuals Economical No structural bias – ad hoc connections Nodes equivalent in functionality Volatile network structure Motivation Algorithms Results Related Work Conclusions

4 P2P Setup Millions of peers (Skype ~50 millions) Dynamic topology and data Communication – reliable, bandwidth-limited, asynchronous, asymmetric Impracticalities / impossibilities – global communication – global synchronization Motivation Algorithms Results Related Work Conclusions

5 P2P Applications P2P file sharing – audio, video (e-Mule, Kazaa, BitTorrents) P2P sensor network applications Grid Computing Motivation Algorithms Results Related Work Conclusions

6 P2P Data Monitoring Models (or predicates) e.g. k-means, eigenstates,   of current data Data and topology changes rapidly Does current model still represent data ? Motivation Algorithms Results Related Work Conclusions

7 Developed a monitoring algorithm Monitors the quality of data mining results Can be deployed in large peer-to-peer networks with very low resource consumption Our Work Motivation Algorithms Results Related Work Conclusions

8 Local Algorithms Property: – There exists k such that for any N there are instances (Graph, inputs) with runtime / messaging / memory below k – Eventual correctness guaranteed – Local stopping rule Motivation Algorithms Results Related Work Conclusions

9 Local L2 Algorithm Initial setup: each peer has – A data vector – Some global pattern vector Monitoring Problem: – is the L2 norm of the distance between the average data vector and the pattern vector greater than a given constant  Motivation Algorithms Results Related Work Conclusions

10 K-means Monitoring Centroids of data are pattern vector Monitoring problem: Monitor the distance between current centroids and global average – raise flag if error more than C Computing Centroids: Expensive, non-local, best effort sampling Motivation Algorithms Results Related Work Conclusions

11 Local Vectors For peer P i – Own estimate of global average (X) – Agreement with neighbor P j (Y) – Withheld knowledge w.r.t neighbor P j (Z=X-Y) Motivation Algorithms Results Related Work Conclusions

12 Possibilities 1. All 3 vectors inside circle 2. All 3 vectors outside circle 3. Some are inside, some are outside Case 1 Case 3 Motivation Algorithms Results Related Work Conclusions

13 Theorem If for every peer and each of its neighbours both the agreement and the withheld knowledge are in a convex shape (here a circle) - then so is the global average Motivation Algorithms Results Related Work Conclusions

14 Case 1 : All Inside Circle No more communication Motivation Algorithms Results Related Work Conclusions

15 Case 2: All Outside Circle Two peers independently estimate that global average vector outside Combined average can still be inside !!! Motivation Algorithms Results Related Work Conclusions

16 Case 2: All Outside Circle Solution – use tangent lines to bound circle A tangent or half-space is itself an unbounded convex region The theorem holds in this case as well Motivation Algorithms Results Related Work Conclusions

17 Case 3 : Inside & Outside Needs communication Motivation Algorithms Results Related Work Conclusions

18 Overall Algorithm (A) Area inside  circle. (B) Seven evenly spaced vectors. (C) Borders of seven half-spaces u i.x ≥  define a polygon. (D) Area between circle and union of half- spaces Motivation Algorithms Results Related Work Conclusions

19 Results : L2 Scalability Quality Messages Motivation Algorithms Results Related Work Conclusions

20 Results : k-means Quality Messages Motivation Algorithms Results Related Work Conclusions

21 Related work Flooding / limited depth flooding [Bawa et al.‘04] – Unacceptable resource requirement Best effort sampling [Bandhopadhaya et al.‘05] – Inaccurate for long periods, expensive Gossip based sampling and aggregation [Kempe et al. ‘03] – No answer for dynamic data Local algorithms [Peleg; Kutten; Patt-Shamir; Wolff ‘03] Motivation Algorithms Results Related Work Conclusions

22 Conclusion Presents a general framework for bounding the L2 norm of the average vector within any convex shape (also non-convex shapes) L2 algorithm is local and hence highly scalable k-Means algorithm shows excellent accuracy Motivation Algorithms Results Related Work Conclusions