Understanding RFID Counting Protocols Authors: Binbin Chen, Ziling Zhou, Haifeng Yu MobiCom 2013 Presenter: Musab Hameed.

Slides:



Advertisements
Similar presentations
A small taste of inferential statistics
Advertisements

Parallel List Ranking Advanced Algorithms & Data Structures Lecture Theme 17 Prof. Dr. Th. Ottmann Summer Semester 2006.
Introduction to Algorithms Quicksort
Complexity Analysis (Part II)
Hadi Goudarzi and Massoud Pedram
Overcoming Limitations of Sampling for Agrregation Queries Surajit ChaudhuriMicrosoft Research Gautam DasMicrosoft Research Mayur DatarStanford University.
Chapter 11 Indexing and Hashing (2) Yonsei University 2 nd Semester, 2013 Sanghyun Park.
G. Alonso, D. Kossmann Systems Group
Fundamentals of Python: From First Programs Through Data Structures
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies.
Stick Tossing and Confidence Intervals Asilomar - December 2006 Bruce Cohen Lowell High School, SFUSD
Quick Sort, Shell Sort, Counting Sort, Radix Sort AND Bucket Sort
Programming with Alice Computing Institute for K-12 Teachers Summer 2011 Workshop.
Every Bit Counts – Fast and Scalable RFID Estimation Muhammad Shahzad and Alex X. Liu Dept. of Computer Science and Engineering Michigan State University.
Sampling distributions. Example Take random sample of students. Ask “how many courses did you study for this past weekend?” Calculate a statistic, say,
Sampling distributions. Example Take random sample of 1 hour periods in an ER. Ask “how many patients arrived in that one hour period ?” Calculate statistic,
Fall 2006CENG 7071 Algorithm Analysis. Fall 2006CENG 7072 Algorithmic Performance There are two aspects of algorithmic performance: Time Instructions.
Evaluation.
CSC1016 Coursework Clarification Derek Mortimer March 2010.
Date:2011/06/08 吳昕澧 BOA: The Bayesian Optimization Algorithm.
The Rate of Convergence of AdaBoost Indraneel Mukherjee Cynthia Rudin Rob Schapire.
Resampling techniques Why resampling? Jacknife Cross-validation Bootstrap Examples of application of bootstrap.
Evaluation.
FALL 2006CENG 351 Data Management and File Structures1 External Sorting.
A gentle introduction to Gaussian distribution. Review Random variable Coin flip experiment X = 0X = 1 X: Random variable.
4. Multiple Regression Analysis: Estimation -Most econometric regressions are motivated by a question -ie: Do Canadian Heritage commercials have a positive.
Algorithm Efficiency and Sorting
Introduction to Boosting Aristotelis Tsirigos SCLT seminar - NYU Computer Science.
CSCI 5708: Query Processing I Pusheng Zhang University of Minnesota Feb 3, 2004.
Advanced Topics in Algorithms and Data Structures 1 Two parallel list ranking algorithms An O (log n ) time and O ( n log n ) work list ranking algorithm.
Admission Control and Dynamic Adaptation for a Proportional-Delay DiffServ-Enabled Web Server Yu Cai.
PROCESS ANALYSIS ESSAY 2) INFORMATIONAL - when you want to inform OBJECTIVES OF WRITING A PROCESS ANALYSIS ESSAY 1) DIRECTIONAL - when you want.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies Presented by : Joseph Gunawan.
1 Cardinality Estimation for Large-scale RFID Systems Chen Qian, Hoilun Ngan, and Yunhao Liu Hong Kong University of Science and Technology.
Understanding RFID Counting Protocols Binbin Chen # Ziling Zhou ^# Haifeng Yu ^ # Advanced Digital Sciences Center ^ National University of Singapore MobiCom.
Time Complexity Dr. Jicheng Fu Department of Computer Science University of Central Oklahoma.
ECE 8443 – Pattern Recognition ECE 8423 – Adaptive Signal Processing Objectives: Example Clustered Transformations MAP Adaptation Resources: ECE 7000:
沈致远. Test error(generalization error): the expected prediction error over an independent test sample Training error: the average loss over the training.
1 Chapter 24 Developing Efficient Algorithms. 2 Executing Time Suppose two algorithms perform the same task such as search (linear search vs. binary search)
Chap 20-1 Statistics for Business and Economics, 6e © 2007 Pearson Education, Inc. Chapter 20 Sampling: Additional Topics in Sampling Statistics for Business.
Microprocessor-based systems Curse 7 Memory hierarchies.
Summer Essay Reflections AP English Literature 2015.
Complexity of algorithms Algorithms can be classified by the amount of time they need to complete compared to their input size. There is a wide variety:
SEARCHING UNIT II. Divide and Conquer The most well known algorithm design strategy: 1. Divide instance of problem into two or more smaller instances.
Keith D. McCroan US EPA National Air and Radiation Environmental Laboratory.
Testing & modeling users. The aims Describe how to do user testing. Discuss the differences between user testing, usability testing and research experiments.
Efficiently Processing Queries on Interval-and-Value Tuples in Relational Databases Jost Enderle, Nicole Schneider, Thomas Seidl RWTH Aachen University,
Secure and Highly-Available Aggregation Queries via Set Sampling Haifeng Yu National University of Singapore.
CSC 211 Data Structures Lecture 13
1 Building The Ultimate Consistent Reader. 2 Introduction We’ve already built a consistent reader (cube-Vs.-point)... Except it had variables ranging.
RFID E STIMATION P ROBLEM Lee, Gunhee S URVEY. R EFERENCES Energy Efficient Algorithms for the RFID Estimation Problem –Tao Li, Samuel Wu, Shigang Chen.
Improving Loss Resilience with Multi- Radio Diversity in Wireless Networks by Allen Miu, Hari Balakrishnan and C.E. Koksal Appeared in ACM MOBICOM 2005,
The Cost of Fault Tolerance in Multi-Party Communication Complexity Binbin Chen Advanced Digital Sciences Center Haifeng Yu National University of Singapore.
The final exam solutions. Part I, #1, Central limit theorem Let X1,X2, …, Xn be a sequence of i.i.d. random variables each having mean μ and variance.
CS 2601 Runtime Analysis Big O, Θ, some simple sums. (see section 1.2 for motivation) Notes, examples and code adapted from Data Structures and Other Objects.
Learning to Detect Faces A Large-Scale Application of Machine Learning (This material is not in the text: for further information see the paper by P.
Prof. Amr Goneid, AUC1 Analysis & Design of Algorithms (CSCE 321) Prof. Amr Goneid Department of Computer Science, AUC Part 1. Complexity Bounds.
Every Bit Counts – Fast and Scalable RFID Estimation
CS 150: Analysis of Algorithms. Goals for this Unit Begin a focus on data structures and algorithms Understand the nature of the performance of algorithms.
Identifying the Missing Tags in a Large RFID System Tao Li (University of Florida, US) Shigang Chen (University of Florida, US) Yibei Ling (Telcordia Technologies,
Chapter 13 Query Optimization Yonsei University 1 st Semester, 2015 Sanghyun Park.
Data Structures and Algorithms Instructor: Tesfaye Guta [M.Sc.] Haramaya University.
CMPT 120 Topic: Searching – Part 2 and Intro to Time Complexity (Algorithm Analysis)
Chapter 15 Running Time Analysis. Topics Orders of Magnitude and Big-Oh Notation Running Time Analysis of Algorithms –Counting Statements –Evaluating.
Software Testing. SE, Testing, Hans van Vliet, © Nasty question  Suppose you are being asked to lead the team to test the software that controls.
1 Machine Learning Lecture 8: Ensemble Methods Moshe Koppel Slides adapted from Raymond J. Mooney and others.
Reading and Text Based Writing  Basic Reading Techniques: Underlining Underlining Annotating Annotating Outlining Outlining Taking Notes Taking Notes.
Data Science Credibility: Evaluating What’s Been Learned
Where did we stop? The Bayes decision rule guarantees an optimal classification… … But it requires the knowledge of P(ci|x) (or p(x|ci) and P(ci)) We.
CENG 351 Data Management and File Structures
Presentation transcript:

Understanding RFID Counting Protocols Authors: Binbin Chen, Ziling Zhou, Haifeng Yu MobiCom 2013 Presenter: Musab Hameed

Many applications need counting RFID technology enables large-scale counting 2

RFID counting problem (a simple single-set version) One reader and tags They run a protocol to get an ≈ – Getting the exact is expensive Guarantee: − ≤ holds (say, with 90% probability) – Here, bounds the relative error See paper for generalizations: e.g., a reader moves around to extend coverage Legends: RFID tag RFID reader 3

Existing RFID counting research An impressive arsenal of techniques The central design goal: Reduce time overhead & provide the guarantee 4

despite the resulting complexity? Novel statistical gauges Optimization of parameters Adaptive iterations …… 5 Call for fundamental understanding Diverse views on which design aspects are important Should we combine all these techniques

2 Our central thesis for RFID counting The overlooked key is to have two phases: 6 2 nd phase 1 O 1 st phase (log) Final estimate Rough estimate Other techniques proposed in the literature are less important than originally thought Note: the log term can be reduced to a loglog term

incurring o loglog + 2 The inspiration Novel lower bounds for RFID counting protocols: Theorem: For single-set RFID counting, no protocol can estimate with < relative error while 1 1 overhead 7

Validating our thesis Examine the importance of other techniques Apply our thesis to design better protocols 8

Existing literature: diverse views about what are important Optimization of parameters Adaptive iterations …… 9 Novel statistical gauges

10 Let us step back, and take an asymptotic view of existing protocols Such a comparison has not been done before

log log + Multiplicative overhead: 1 2 Additive overhead: 1 2 Two distinct groups Enhanced Note: Some protocols reduce the log term to a loglog term

13 How they achieve additive overhead? Despite their many differences (as originally emphasized), they all have a two-phase design: 2 nd O phase st phase (log) Final estimate Rough estimate

Enhanced FNEB(’10) Use of a novel gauge: The indices of the first non-empty slots ART(’12) Use of a novel gauge: The average run length of non-emptyslots ZOE(’13) i)Unique design about the gauge: Each trial has a single slot ii)Two-phasedesign Our thesis has not been discovered They also employ other interesting techniques: – involved optimizations, adaptive iterations …

15 Are these other techniques important? Let us focus on the gauges

An old gauge of the early EZB (’07) protocol # of empty slots – More empty slots ⟹ less tags

The novel gauges ART: average run length of non-empty slots – In the example: (1+2+1)/3 FNEB: index of the first non-empty slot ZOE: still # of empty slots, but each slot is independent

Let us examine ART’s (’12) performance gain (over the early EZB (’07) protocol) 18

Replace ART’s (’12) gauge by the old EZB’s (’07) gauge We keep everything else unmodified 19

Similarly … FNEB’s gauge seems not help Neither does ZOE’s 20

Validating our thesis Examine the importance of other techniques Apply our thesis to design better protocols 21

22 SRC : a Simple RFID Counting protocol for single-set counting The design of SRC is solely driven by our thesis: – It applies the 2-phase design – It uses simple & basic building blocks in all other aspects we claim no novelty for these building blocks SRC pseudo-code: 1: Invoke a simple early protocol (LOF ’08) to get a rough estimate ; 2.1: calculate tag-responding probability according to ; 2.2: Use a simple early gauge (EZB ’07) to obtain the final estimate;

SRC is ≥ 100% faster 23 SRC Note: We have done extensive experiments under different settings Please see our paper for more details

How about multiple-set RFID counting? Consider a reader sequentially visits multiple locations to count # of tags in a large space – Here = | 1 ∪ 2 ∪ 3 | : the sets can overlap 1 2 3

Apply our thesis Unlike single-set case, no one happens to use 2 phase – All existing protocols incur multiplicative overhead – Our thesis hints that big improvement might be possible Applying our thesis needs to overcome a challenge – The reader has no rough estimate of until the last location Our SRC protocol uses some interesting techniques to overcome the challenge – It achieves additive overhead, and is ≥ 500% faster Knowing the thesis is critical – It guides us to identify & focus on the key challenge 25

Summary Inspired by our RFID counting lower bound results, we find the overlooked key is a 2-phase design All other techniques are less important Our thesis leads to better protocols 26 2 nd O phase st phase (log) Final estimate Rough estimate