C. Anagnostopoulos 1 K. Kolomvatsos 2 & S. Hadjiefthymiades 2 1 Ionian University, Corfu, Greece 2 National and Kapodistrian University of Athens, Greece.

Slides:



Advertisements
Similar presentations
A Construction of Locality-Aware Overlay Network: mOverlay and Its Performance Found in: IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO.
Advertisements

Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
Playback delay in p2p streaming systems with random packet forwarding Viktoria Fodor and Ilias Chatzidrossos Laboratory for Communication Networks School.
Study of Hurricane and Tornado Operating Systems By Shubhanan Bakre.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
1 Prediction-based Strategies for Energy Saving in Object Tracking Sensor Networks Yingqi Xu, Wang-Chien Lee Proceedings of the 2004 IEEE International.
Wireless Broadcasting with Optimized Transmission Efficiency Jehn-Ruey Jiang and Yung-Liang Lai National Central University, Taiwan.
Kuang-Hao Liu et al Presented by Xin Che 11/18/09.
1 Complexity of Network Synchronization Raeda Naamnieh.
Data Transmission and Base Station Placement for Optimizing Network Lifetime. E. Arkin, V. Polishchuk, A. Efrat, S. Ramasubramanian,V. PolishchukA. EfratS.
An Adaptive Data Forwarding Scheme for Energy Efficiency in Wireless Sensor Networks Christos Anagnostopoulos Theodoros Anagnostopoulos Stathes Hadjiefthymiades.
On Reducing Communication Cost for Distributed Query Monitoring Systems. Fuyu Liu, Kien A. Hua, Fei Xie MDM 2008 Alex Papadimitriou.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Context Compression: using Principal Component Analysis for Efficient Wireless Communications Christos Anagnostopoulos & Stathes Hadjiefthymiades Pervasive.
An Efficient Clustering-based Heuristic for Data Gathering and Aggregation in Sensor Networks Wireless Communications and Networking (WCNC 2003). IEEE,
On the Use of Fuzzy Logic in a Seller Bargaining Game Kostas Kolomvatsos Christos Anagnostopoulos Stathes Hadjiefthymiades Pervasive Computing Research.
University of Athens, Greece Pervasive Computing Research Group Predicting the Location of Mobile Users: A Machine Learning Approach 1 University of Athens,
Distributed Servers Architecture for Networked Video Services S. H. Gary Chan, Member IEEE, and Fouad Tobagi, Fellow IEEE.
1 Introduction to Load Balancing: l Definition of Distributed systems. Collection of independent loosely coupled computing resources. l Load Balancing.
University of Athens, Greece Pervasive Computing Research Group An Online Adaptive Model for Location Prediction University of Athens, Department of Informatics.
The k-server Problem Study Group: Randomized Algorithm Presented by Ray Lam August 16, 2003.
ISCC 2011 An Adaptive Epidemic Information Dissemination Scheme with Cross-layer Enhancements T. Kontos, E. Zaimidis, C. Anagnostopoulos, S. Hadjiefthymiades,
Lecture 12 Synchronization. EECE 411: Design of Distributed Software Applications Summary so far … A distributed system is: a collection of independent.
Automatic Fuzzy Rules Generation for the Deadline Calculation of a Seller Agent Kostas Kolomvatsos and Stathes Hadjiefthymiades Pervasive Computing Research.
Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Recipient of the MOBICOM'98 Best Student Paper Award.
Optimal Stopping of the Context Collection Process in Mobile Sensor Networks Christos Anagnostopoulos 1, Stathes Hadjiefthymiades 2, Evangelos Zervas 3.
Business Process Performance Prediction on a Tracked Simulation Model Andrei Solomon, Marin Litoiu– York University.
報告者:郭茂源 授課老師 : 童曉儒.  Introduction  Dissemination Strategies Overcoming fragmentation Updating the wait time dynamically  Message form and algorithm.
Wireless Sensor Networks COE 499 Energy Aware Routing
Presented by Chaitanya Nemallapudi Understanding and Exploiting the Trade-Offs between Broadcasting and Multicasting in Mobile Ad Hoc Networks Lap Kong.
Chih-Ming Chen, Student Member, IEEE, Ying-ping Chen, Member, IEEE, Tzu-Ching Shen, and John K. Zao, Senior Member, IEEE Evolutionary Computation (CEC),
1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.
Content Sharing over Smartphone-Based Delay- Tolerant Networks.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Comp763: Modern Computer Games Local-lag and Timewarp: Providing Consistency for Replicated Continuous Applications by Martin Mauve, Jurgen Vogel, Volker.
K. Kolomvatsos 1, C. Anagnostopoulos 2, and S. Hadjiefthymiades 1 An Efficient Environmental Monitoring System adopting Data Fusion, Prediction & Fuzzy.
A Mobile Terminal Based Trajectory Preserving Strategy for Continuous Querying LBS Users Yunxia Feng, Peng Liu, Jianhui Zhang May , 2012 Hangzhou,
Guidelines Revisions Defining What RTF Means by “Savings” December 17,
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
1 Utilizing Shared Vehicle Trajectories for Data Forwarding in Vehicular Networks IEEE INFOCOM MINI-CONFERENCE Fulong Xu, Shuo Gu, Jaehoon Jeong, Yu Gu,
Hybrid Indirect Transmissions (HIT) for Data Gathering in Wireless Micro Sensor Networks with Biomedical Applications Jack Culpepper(NASA), Lan Dung, Melody.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
Distributed and hierarchical deadlock detection, deadlock resolution
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Ching-Ju Lin Institute of Networking and Multimedia NTU
Sharp Hybrid Adaptive Routing Protocol for Mobile Ad Hoc Networks
Chapter 7: Consistency & Replication IV - REPLICATION MANAGEMENT By Jyothsna Natarajan Instructor: Prof. Yanqing Zhang Course: Advanced Operating Systems.
Data Mining By Farzana Forhad CS 157B. Agenda Decision Tree and ID3 Rough Set Theory Clustering.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Wireless Cache Invalidation Schemes with Link Adaptation and Downlink Traffic Presented by Ying Jin.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
An Optimal Probabilistic Forwarding Protocol in Delay Tolerant Networks ACM MobiHoc ’09 Cong Liu and Jie Wu Presenter: Hojin Lee.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
A Self-Adaptive Scheduling Algorithm of On-Demand Broadcasts
Quality-aware Aggregation & Predictive Analytics at the Edge
Presented by Prashant Duhoon
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
K. Kolomvatsos1, C. Anagnostopoulos2, and S. Hadjiefthymiades1
Intelligent Contextual Data Stream Monitoring
Protocols.
Information Theoretical Analysis of Digital Watermarking
An Edge-Centric Ensemble Scheme for Queries Assignment
Kostas Kolomvatsos, Christos Anagnostopoulos
Authors: Jinliang Fan and Mostafa H. Ammar
Protocols.
M. Mock and E. Nett and S. Schemmer
Presentation transcript:

C. Anagnostopoulos 1 K. Kolomvatsos 2 & S. Hadjiefthymiades 2 1 Ionian University, Corfu, Greece 2 National and Kapodistrian University of Athens, Greece 14 th IEEE intl. conf. on mobile data management Milan, 3-6 June 2013 Efficient Location Based Services for Groups of Mobile Users

Observation Mobile users send location updates to LBS server (back-end system; BES) The BES pushes content (possibly, personalized) to a mobile user if she enters/crosses a region

Observation Location update report Mobile node LBS server

Observation Location-dependent content Mobile node LBS server

Observation As the number of mobile users increases, and As the users continuously change their position then The communication overhead for location reporting and location-based content delivery becomes quite significant

Group Identification Mobile users are not only close to each other but also likely to move together for a certain time horizon, thus, forming a moving group. A group has a unique group leader (GL). GL …is the representative of the group, i.e.,  sends location updates to BES  receives possible location-dependent content and disseminates it to its members

Moving Object Groups Monitoring Location update report Mobile node LBS server Group leader Group

Moving Object Groups Monitoring Location-dependent content Mobile node LBS server Group leader Group

Moving Object Groups Monitoring Location-dependent content Mobile node LBS server Group leader Group

Problem How to evaluate that a formed group Q at time t, will remain the same group at time t+k, k>1 …‘same’ group means:  coherence: group consists of the same mobile users as initially identified, and  compactness: all group members are within the communication range of the GL during a finite time horizon

Some Definitions Group Q is defined as: i.e., the GL of Q i.e., the center point of Q i.e., the group members

Some Definitions Group validity at (discrete) time t: i.e., the average distance between members, within the range of GL, and group centroid

Group Validity and Validation System Consider a clustering algorithm, which is invoked periodically every N time instances and produces a set of groups Q = {Q 1, Q 2, …, Q |Q| }; Let Q  Q be formed at t 0. Q is valid at t > t 0 if x t ≤ θ The lower the x t is, the more compact Q is at t

Group Validity and Validation System Group Validation System (GVS) [1] monitors the behavior of Q in [t 0, k], i.e., checks whether Q maintains its initial structure. [2] considers Q as a persistent group in (k, t 0 + N] At time t in [t 0, k] (1) each member reports its location to BES; f t (|Q|) (2) GVS evaluates the group validity x t ; g t (|Q|) (3) Total cost c t up to t is

Group Validity and Validation System If GVS validates Q at k then for t in (k, t 0 + N] (1) BES communicates only with GL; (2) only the GL reports its location to BES; (3) (possible) content is delivered to the members through the GL.

Formation, Validation & Persistence Phase group validation process (observations) group is treated as a ‘singleton’ through the GL t0t0 k*k* t0+Nt0+N validation decision group formation phase (clustering)

Group Validity and Validation System The problem is to find (an optimal) time k *, 1 < k ≤ N:

Optimal Stopping Theory Choose the best time instance to take a decision of performing a certain action. Observe the current state of a system and decide whether to:  continue the process or  stop the process, and incur a certain cost. …the odds algorithm, the secretary problem, the parking problem, the asset-selling problem, etc.

Application to Group Validity Process Adoption of Optimal Stopping Theory for evaluating an criterion for k *. The more validity values the GVS observes, the more certain is on concluding on a ‘group persistence’ The GVS observes X t at each t. The decision is:  stop observing X t and classify Q as persistent  continue observing X t+1 with additional cost C ‘Finite’ Horizon GVS (FVS), i.e., 1 < k ≤ N ‘Infinite’-like Horizon GVS (IVS), i.e., 1 < k

‘Finite’ Horizon GVS (FVS) FVS should validate Q up to N. The criterion is the sequence (a 1, a 2, …, a N ) such that FVS stops at t iff x t < a t The {a t } values are constants and estimated through the ‘principle of optimality’ by adopting backward induction.

‘Infinite’-like Horizon GVS (IVS) IVS validates Q independent of N. At certain checkpoints, it checks whether Q maintains its initial structure. If Q is still persistent then there is no need for re-initiating the validation process. The criterion for optimal stopping is: stop at t iff x t < a *

Performance Evaluation Metric ε :communication overhead during N (total number of messages) w.r.t. a continuous monitoring system. For a continuous monitoring system: |Q|N For FVS is: |Q|k * + (N - k * ) For IVS is: |Q|k * + (Nm- k * ); m -1 = re-validation rate For IMS (immediate validation system) is: N IMS: periodically performs re-clustering with freq. 1/N

The load savings

Performance Evaluation Required communication load: I t = 1, if Q is valid at t; I t  (1,|Q|], otherwise; i.e., the case in which some members are not within the communication range of the GL. Metric γ :efficiency is defined as: Low γ indicates that the GVS improperly validated Q

The efficiency

Conclusions There is a trade-off between: validating a group rapidly, thus, achieving low communication load (low ε) and delaying the validation decision for being certain on concluding on group persistence (high γ)

Thank you!