Skip to main content

Showing 1–39 of 39 results for author: Mortier, R

.
  1. arXiv:2407.04014  [pdf, other

    cs.DC

    Offline Energy-Optimal LLM Serving: Workload-Based Energy Models for LLM Inference on Heterogeneous Systems

    Authors: Grant Wilkins, Srinivasan Keshav, Richard Mortier

    Abstract: The rapid adoption of large language models (LLMs) has led to significant advances in natural language processing and text generation. However, the energy consumed through LLM model inference remains a major challenge for sustainable AI deployment. To address this problem, we model the workload-dependent energy consumption and runtime of LLM inference tasks on heterogeneous GPU-CPU systems. By con… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

    Comments: 7 pages, appearing at HotCarbon 2024

  2. arXiv:2407.00010  [pdf, other

    cs.DC cs.AI

    Hybrid Heterogeneous Clusters Can Lower the Energy Consumption of LLM Inference Workloads

    Authors: Grant Wilkins, Srinivasan Keshav, Richard Mortier

    Abstract: Both the training and use of Large Language Models (LLMs) require large amounts of energy. Their increasing popularity, therefore, raises critical concerns regarding the energy efficiency and sustainability of data centers that host them. This paper addresses the challenge of reducing energy consumption in data centers running LLMs. We propose a hybrid data center model that uses a cost-based sche… ▽ More

    Submitted 25 April, 2024; originally announced July 2024.

  3. arXiv:2401.02450  [pdf, other

    cs.CR cs.LG

    Locally Differentially Private Embedding Models in Distributed Fraud Prevention Systems

    Authors: Iker Perez, Jason Wong, Piotr Skalski, Stuart Burrell, Richard Mortier, Derek McAuley, David Sutton

    Abstract: Global financial crime activity is driving demand for machine learning solutions in fraud prevention. However, prevention systems are commonly serviced to financial institutions in isolation, and few provisions exist for data sharing due to fears of unintentional leaks and adversarial attacks. Collaborative learning advances in finance are rare, and it is hard to find real-world insights derived f… ▽ More

    Submitted 3 January, 2024; originally announced January 2024.

  4. arXiv:2312.13461  [pdf, other

    cs.DC

    FedSZ: Leveraging Error-Bounded Lossy Compression for Federated Learning Communications

    Authors: Grant Wilkins, Sheng Di, Jon C. Calhoun, Zilinghan Li, Kibaek Kim, Robert Underwood, Richard Mortier, Franck Cappello

    Abstract: With the promise of federated learning (FL) to allow for geographically-distributed and highly personalized services, the efficient exchange of model updates between clients and servers becomes crucial. FL, though decentralized, often faces communication bottlenecks, especially in resource-constrained scenarios. Existing data compression techniques like gradient sparsification, quantization, and p… ▽ More

    Submitted 24 April, 2024; v1 submitted 20 December, 2023; originally announced December 2023.

    Comments: Appearing at 44th IEEE International Conference on Distributed Computing Systems (ICDCS)

  5. arXiv:2311.09929  [pdf, other

    cs.DC

    Mutating etcd Towards Edge Suitability

    Authors: Andrew Jeffery, Heidi Howard, Richard Mortier

    Abstract: In the edge environment servers are no longer being co-located away from clients, instead they are being co-located with clients away from other servers, focusing on reliable and performant operation. Orchestration platforms, such as Kubernetes, are a key system being transitioned to the edge but they remain unsuited to the environment, stemming primarily from their critical key-value stores. In t… ▽ More

    Submitted 16 November, 2023; originally announced November 2023.

  6. arXiv:2305.02186  [pdf, other

    cs.NI cs.CR

    Mitigating IoT Botnet DDos Attacks through MUD and eBPF based Traffic Filtering

    Authors: Angelo Feraudo, Diana Andreea Popescu, Poonam Yadav, Richard Mortier, Paolo Bellavista

    Abstract: As the prevalence of Internet-of-Things (IoT) devices becomes more and more dominant, so too do the associated management and security challenges. One such challenge is the exploitation of vulnerable devices for recruitment into botnets, which can be used to carry out Distributed Denial-of-Service (DDoS) attacks. The recent Manufacturer Usage Description (MUD) standard has been proposed as a way t… ▽ More

    Submitted 3 May, 2023; originally announced May 2023.

    Comments: 12 pages, 10 figures, in review currently

  7. arXiv:2209.15290  [pdf

    eess.SY cs.NI

    CDBB West Cambridge Digital Twin: Lessons Learned

    Authors: Justas Brazauskas, Matt Danish, Vadim Safronov, Rohit Verma, Richard Mortier, Ian Lewis

    Abstract: The report describes the digital architecture developed for the West Cambridge Digital Twin, particularly focussed on real-time sensor data collection and analysis with a privacy framework allowing occupants of the buildings to be first-class participants in the system. The implementation has some notable characteristics. In particular 'push' technology is used throughout such that information str… ▽ More

    Submitted 30 September, 2022; originally announced September 2022.

    Comments: 72 pages. arXiv admin note: substantial text overlap with arXiv:2103.04924, arXiv:2103.09169

    ACM Class: C.2; C.3; H.5; I.6

  8. arXiv:2203.16122  [pdf, ps, other

    cs.HC

    Eff the ineffable: on the uncommunicability of a conceptually simple contribution to HCI methodology

    Authors: Helen Oliver, Richard Mortier, Jon Crowcroft

    Abstract: Given a simple concept that has the potential for a methodological contribution to the field of HCI, the constraints of submission conventions within the field may make it impossible to communicate the concept in a manner that is intelligible to the reader.

    Submitted 30 March, 2022; originally announced March 2022.

    Comments: 9 pages

  9. arXiv:2203.14109  [pdf

    cs.CR cs.HC cs.NI

    Human-centred home network security

    Authors: Derek McAuley, Jiahong Chen, Tom Lodge, Richard Mortier, Stanislaw Piasecki, Diana Andreea Popescu, Lachlan Urquhart

    Abstract: This chapter draws from across the foregoing chapters discussing many core HDI approaches and disciplinary perspectives to consider the specific application of HDI in home network security. While much work has considered the challenges of securing in home IoT devices and their communications, especially for those with limited power or computational capacity, scant attention has been paid by the re… ▽ More

    Submitted 26 March, 2022; originally announced March 2022.

    Comments: Preprint of Chapter 9 of Privacy by Design for the Internet of Things: Building accountability and security

  10. arXiv:2203.14088  [pdf

    cs.DC cs.CR cs.LG

    Distributed data analytics

    Authors: Richard Mortier, Hamed Haddadi, Sandra Servia, Liang Wang

    Abstract: Machine Learning (ML) techniques have begun to dominate data analytics applications and services. Recommendation systems are a key component of online service providers. The financial industry has adopted ML to harness large volumes of data in areas such as fraud detection, risk-management, and compliance. Deep Learning is the technology behind voice-based personal assistants, etc. Deployment of M… ▽ More

    Submitted 26 March, 2022; originally announced March 2022.

    Comments: Accepted as Chapter 8 of "Privacy by Design for the Internet of Things: Building accountability and security"

  11. arXiv:2203.03058  [pdf, ps, other

    cs.DC

    Relaxed Paxos: Quorum Intersection Revisited (Again)

    Authors: Heidi Howard, Richard Mortier

    Abstract: Distributed consensus, the ability to reach agreement in the face of failures, is a fundamental primitive for constructing reliable distributed systems. The Paxos algorithm is synonymous with consensus and widely utilized in production. Paxos uses two phases: phase one and phase two, each requiring a quorum of acceptors, to reach consensus during a round of the protocol. Traditionally, Paxos requi… ▽ More

    Submitted 6 March, 2022; originally announced March 2022.

    Comments: to be published in the 9th Workshop on Principles and Practice of Consistency for Distributed Data (PaPoC'22)

  12. arXiv:2107.07818  [pdf, other

    cs.CR cs.LG

    Revisiting IoT Device Identification

    Authors: Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Richard Mortier, Hamed Haddadi

    Abstract: Internet-of-Things (IoT) devices are known to be the source of many security problems, and as such, they would greatly benefit from automated management. This requires robustly identifying devices so that appropriate network security policies can be applied. We address this challenge by exploring how to accurately identify IoT devices based on their network behavior, while leveraging approaches pr… ▽ More

    Submitted 16 July, 2021; originally announced July 2021.

    Comments: To appear in TMA 2021 conference. 9 pages, 6 figures. arXiv admin note: text overlap with arXiv:2011.08605

  13. Rearchitecting Kubernetes for the Edge

    Authors: Andrew Jeffery, Heidi Howard, Richard Mortier

    Abstract: Recent years have seen Kubernetes emerge as a primary choice for container orchestration. Kubernetes largely targets the cloud environment but new use cases require performant, available and scalable orchestration at the edge. Kubernetes stores all cluster state in etcd, a strongly consistent key-value store. We find that at larger etcd cluster sizes, offering higher availability, write request la… ▽ More

    Submitted 6 April, 2021; originally announced April 2021.

    Comments: 6 pages. Accepted in EdgeSys '21

    Journal ref: Proceedings of the 4th International Workshop on Edge Systems, Analytics and Networking (2021) 7-12

  14. arXiv:2103.09169  [pdf, other

    cs.NI

    SenseRT: A Streaming Architecture for Smart Building Sensors

    Authors: Rohit Verma, Justas Brazauskas, Vadim Safronov, Matthew Danish, Jorge Merino, Xiang Xie, Ian Lewis, Richard Mortier

    Abstract: Building Management Systems (BMSs) have evolved in recent years, in ways that require changes to existing network architectures that follow the store-then-analyse approach. The primary cause is the increasing deployment of a diverse range of cost-effective sensors and actuators in smart buildings that generate real-time streaming data. Any in-building system with a large number of sensors needs a… ▽ More

    Submitted 16 March, 2021; originally announced March 2021.

  15. arXiv:2103.04924  [pdf, other

    cs.HC

    Data Management for Building Information Modelling in a Real-Time Adaptive City Platform

    Authors: Justas Brazauskas, Rohit Verma, Vadim Safronov, Matthew Danish, Jorge Merino, Xiang Xie, Ian Lewis, Richard Mortier

    Abstract: Legacy Building Information Modelling (BIM) systems are not designed to process the high-volume, high-velocity data emitted by in-building Internet-of-Things (IoT) sensors. Historical lack of consideration for the real-time nature of such data means that outputs from such BIM systems typically lack the timeliness necessary for enacting decisions as a result of patterns emerging in the sensor data.… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.

  16. arXiv:2011.08605  [pdf, other

    cs.NI cs.LG

    The Case for Retraining of ML Models for IoT Device Identification at the Edge

    Authors: Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Yiming Xie, Richard Mortier, Hamed Haddadi

    Abstract: Internet-of-Things (IoT) devices are known to be the source of many security problems, and as such they would greatly benefit from automated management. This requires robustly identifying devices so that appropriate network security policies can be applied. We address this challenge by exploring how to accurately identify IoT devices based on their network behavior, using resources available at th… ▽ More

    Submitted 17 November, 2020; originally announced November 2020.

    Comments: 13 pages, 8 figures, 4 tables

  17. arXiv:2008.02671  [pdf, other

    cs.DC

    Fast Flexible Paxos: Relaxing Quorum Intersection for Fast Paxos

    Authors: Heidi Howard, Aleksey Charapko, Richard Mortier

    Abstract: Paxos, the de facto standard approach to solving distributed consensus, operates in two phases, each of which requires an intersecting quorum of nodes. Multi-Paxos reduces this to one phase by electing a leader but this leader is also a performance bottleneck. Fast Paxos bypasses the leader but has stronger quorum intersection requirements. In this paper we observe that Fast Paxos' intersection… ▽ More

    Submitted 16 October, 2020; v1 submitted 6 August, 2020; originally announced August 2020.

    Comments: To be published in the Proceedings of International Conference on Distributed Computing and Networking 2021 (ICDCN '21)

  18. arXiv:2004.08003  [pdf, other

    cs.NI cs.DC

    SoK: Beyond IoT MUD Deployments -- Challenges and Future Directions

    Authors: Angelo Feraudo, Poonam Yadav, Richard Mortier, Paolo Bellavista, Jon Crowcroft

    Abstract: Due to the advancement of IoT devices in both domestic and industrial environments, the need to incorporate a mechanism to build accountability in the IoT ecosystem is paramount. In the last few years, various initiatives have been started in this direction addressing many socio-technical concerns and challenges to build an accountable system. The solution that has received a lot of attention in b… ▽ More

    Submitted 22 April, 2020; v1 submitted 16 April, 2020; originally announced April 2020.

    Comments: 7 pages, 5 figures, WIP

    ACM Class: C.2.1; C.2.3; C.2.6; C.2

  19. Paxos vs Raft: Have we reached consensus on distributed consensus?

    Authors: Heidi Howard, Richard Mortier

    Abstract: Distributed consensus is a fundamental primitive for constructing fault-tolerant, strongly-consistent distributed systems. Though many distributed consensus algorithms have been proposed, just two dominate production systems: Paxos, the traditional, famously subtle, algorithm; and Raft, a more recent algorithm positioned as a more understandable alternative to Paxos. In this paper, we consider t… ▽ More

    Submitted 27 April, 2020; v1 submitted 10 April, 2020; originally announced April 2020.

    Comments: To be published in the 7th Workshop on Principles and Practice of Consistency for Distributed Data (PaPoC)

  20. arXiv:1905.02529  [pdf, other

    cs.PL cs.OS

    Programming Unikernels in the Large via Functor Driven Development

    Authors: Gabriel Radanne, Thomas Gazagnaire, Anil Madhavapeddy, Jeremy Yallop, Richard Mortier, Hannes Mehnert, Mindy Preston, David Scott

    Abstract: Compiling applications as unikernels allows them to be tailored to diverse execution environments. Dependency on a monolithic operating system is replaced with linkage against libraries that provide specific services. Doing so in practice has revealed a major barrier: managing the configuration matrix across heterogenous execution targets. A realistic unikernel application depends on hundreds of l… ▽ More

    Submitted 7 May, 2019; originally announced May 2019.

  21. Network Service Dependencies in Commodity Internet-of-Things Devices

    Authors: Poonam Yadav, Qi Li, Anthony Brown, Richard Mortier

    Abstract: We continue to see increasingly widespread deployment of IoT devices, with apparent intent to embed them in our built environment likely to accelerate if smart city and related programmes succeed. In this paper we are concerned with the ways in which current generation IoT devices are being designed in terms of their ill-considered dependencies on network connectivity and services. Our hope is to… ▽ More

    Submitted 25 February, 2019; originally announced February 2019.

    Comments: IoTDI '19: Internet of Things Design and Implementation, April 15--18, 2019, Montreal, QC, Canada

  22. arXiv:1902.09636  [pdf, other

    cs.DC

    Fractal: Automated Application Scaling

    Authors: Masoud Koleini, Carlos Oviedo, Derek McAuley, Charalampos Rotsos, Anil Madhavapeddy, Thomas Gazagnaire, Magnus Skejgstad, Richard Mortier

    Abstract: To date, cloud applications have used datacenter resources through manual configuration and deployment of virtual machines and containers. Current trends see increasing use of microservices, where larger applications are split into many small containers, to be developed and deployed independently. However, even with the rise of the devops movement and orchestration facilities such as Kubernetes, t… ▽ More

    Submitted 25 February, 2019; originally announced February 2019.

  23. arXiv:1902.07009  [pdf, other

    cs.DC

    Zest: REST over ZeroMQ

    Authors: John Moore, Andrés Arcia-Moret, Poonam Yadav, Richard Mortier, Anthony Brown, Derek McAuley, Andy Crabtree, Chris Greenhalgh, Hamed Haddadi, Yousef Amar

    Abstract: In this paper, we introduce Zest (REST over ZeroMQ), a middleware technology in support of an Internet of Things (IoT). Our work is influenced by the Constrained Application Protocol (CoAP) but emphasises systems that can support fine-grained access control to both resources and audit information, and can provide features such as asynchronous communication patterns between nodes. We achieve this b… ▽ More

    Submitted 19 February, 2019; originally announced February 2019.

  24. arXiv:1902.06776  [pdf, ps, other

    cs.DC

    A Generalised Solution to Distributed Consensus

    Authors: Heidi Howard, Richard Mortier

    Abstract: Distributed consensus, the ability to reach agreement in the face of failures and asynchrony, is a fundamental primitive for constructing reliable distributed systems from unreliable components. The Paxos algorithm is synonymous with distributed consensus, yet it performs poorly in practice and is famously difficult to understand. In this paper, we re-examine the foundations of distributed consens… ▽ More

    Submitted 18 February, 2019; originally announced February 2019.

  25. arXiv:1805.05995  [pdf, other

    cs.SE cs.DB

    Data Analytics Service Composition and Deployment on Edge Devices

    Authors: Jianxin Zhao, Tudor Tiplea, Richard Mortier, Jon Crowcroft, Liang Wang

    Abstract: Data analytics on edge devices has gained rapid growth in research, industry, and different aspects of our daily life. This topic still faces many challenges such as limited computation resource on edge devices. In this paper, we further identify two main challenges: the composition and deployment of data analytics services on edge devices. We present the Zoo system to address these two challenge:… ▽ More

    Submitted 13 April, 2018; originally announced May 2018.

  26. arXiv:1803.05368  [pdf, other

    cs.NI

    An Analysis of Home IoT Network Traffic and Behaviour

    Authors: Yousef Amar, Hamed Haddadi, Richard Mortier, Anthony Brown, James Colley, Andy Crabtree

    Abstract: Internet-connected devices are increasingly present in our homes, and privacy breaches, data thefts, and security threats are becoming commonplace. In order to avoid these, we must first understand the behaviour of these devices. In this work, we analyse network traces from a testbed of common IoT devices, and describe general methods for fingerprinting their behavior. We then use the informatio… ▽ More

    Submitted 14 March, 2018; originally announced March 2018.

    Comments: Submitted to TMA 2018

  27. arXiv:1710.09027  [pdf, other

    cs.LG cs.CY

    User-centric Composable Services: A New Generation of Personal Data Analytics

    Authors: Jianxin Zhao, Richard Mortier, Jon Crowcroft, Liang Wang

    Abstract: Machine Learning (ML) techniques, such as Neural Network, are widely used in today's applications. However, there is still a big gap between the current ML systems and users' requirements. ML systems focus on improving the performance of models in training, while individual users cares more about response time and expressiveness of the tool. Many existing research and product begin to move computa… ▽ More

    Submitted 26 November, 2017; v1 submitted 24 October, 2017; originally announced October 2017.

  28. arXiv:1709.07772  [pdf, other

    cs.DC cs.LG

    Probabilistic Synchronous Parallel

    Authors: Liang Wang, Ben Catterall, Richard Mortier

    Abstract: Most machine learning and deep neural network algorithms rely on certain iterative algorithms to optimise their utility/cost functions, e.g. Stochastic Gradient Descent. In distributed learning, the networked nodes have to work collaboratively to update the model parameters, and the way how they proceed is referred to as synchronous parallel design (or barrier control). Synchronous parallel protoc… ▽ More

    Submitted 5 October, 2017; v1 submitted 22 September, 2017; originally announced September 2017.

  29. arXiv:1705.09902  [pdf, other

    cs.PL

    Extending programs with debug-related features, with application to hardware development

    Authors: Nik Sultana, Salvator Galea, David Greaves, Marcin Wojcik, Noa Zilberman, Richard Clegg, Luo Mai, Richard Mortier, Peter Pietzuch, Jon Crowcroft, Andrew W Moore

    Abstract: The capacity and programmability of reconfigurable hardware such as FPGAs has improved steadily over the years, but they do not readily provide any mechanisms for monitoring or debugging running programs. Such mechanisms need to be written into the program itself. This is done using ad hoc methods and primitive tools when compared to CPU programming. This complicates the programming and debugging… ▽ More

    Submitted 28 May, 2017; originally announced May 2017.

  30. arXiv:1703.00380  [pdf, other

    cs.LG

    Privacy-Preserving Personal Model Training

    Authors: Sandra Servia-Rodriguez, Liang Wang, Jianxin R. Zhao, Richard Mortier, Hamed Haddadi

    Abstract: Many current Internet services rely on inferences from models trained on user data. Commonly, both the training and inference tasks are carried out using cloud resources fed by personal data collected at scale from users. Holding and using such large collections of personal data in the cloud creates privacy risks to the data subjects, but is currently required for users to benefit from such servic… ▽ More

    Submitted 3 April, 2018; v1 submitted 1 March, 2017; originally announced March 2017.

    Journal ref: The 3rd ACM/IEEE International Conference on Internet of Things Design and Implementation (IoTDI 2018)

  31. arXiv:1609.03312  [pdf, other

    cs.CY cs.NI

    Valorising the IoT Databox: Creating Value for Everyone

    Authors: Charith Perera, Susan Wakenshaw, Tim Baarslag, Hamed Haddadi, Arosha Bandara, Richard Mortier, Andy Crabtree, Irene Ng, Derek McAuley, Jon Crowcroft

    Abstract: The Internet of Things (IoT) is expected to generate large amounts of heterogeneous data from diverse sources including physical sensors, user devices, and social media platforms. Over the last few years, significant attention has been focused on personal data, particularly data generated by smart wearable and smart home devices. Making personal data available for access and trade is expected to b… ▽ More

    Submitted 12 September, 2016; originally announced September 2016.

    Comments: Accepted for Transactions on Emerging Telecommunications Technologies

  32. arXiv:1605.09471  [pdf, other

    cs.NI

    Staggercast: Demand-Side Management for ISPs

    Authors: Gareth Tyson, Nishanth Sastry, Richard Mortier, Nick Feamster

    Abstract: The continuing expansion of Internet media consumption has increased traffic volumes, and hence congestion, on access links. In response, both mobile and wireline ISPs must either increase capacity or perform traffic engineering over existing resources. Unfortunately, provisioning timescales are long, the process is costly, and single-homing means operators cannot balance across the last mile. Ins… ▽ More

    Submitted 30 May, 2016; originally announced May 2016.

  33. arXiv:1501.04737  [pdf, ps, other

    cs.CY

    Personal Data: Thinking Inside the Box

    Authors: Hamed Haddadi, Heidi Howard, Amir Chaudhry, Jon Crowcroft, Anil Madhavapeddy, Richard Mortier

    Abstract: We propose there is a need for a technical platform enabling people to engage with the collection, management and consumption of personal data; and that this platform should itself be personal, under the direct control of the individual whose data it holds. In what follows, we refer to this platform as the Databox, a personal, networked service that collates personal data and can be used to make t… ▽ More

    Submitted 20 January, 2015; originally announced January 2015.

  34. arXiv:1412.6159  [pdf, ps, other

    cs.CY cs.HC cs.SI

    Human-Data Interaction: The Human Face of the Data-Driven Society

    Authors: Richard Mortier, Hamed Haddadi, Tristan Henderson, Derek McAuley, Jon Crowcroft

    Abstract: The increasing generation and collection of personal data has created a complex ecosystem, often collaborative but sometimes combative, around companies and individuals engaging in the use of these data. We propose that the interactions between these agents warrants a new topic of study: Human-Data Interaction (HDI). In this paper we discuss how HDI sits at the intersection of various disciplines,… ▽ More

    Submitted 6 January, 2015; v1 submitted 6 October, 2014; originally announced December 2014.

  35. arXiv:1409.1066  [pdf, other

    cs.SI cs.CY

    Anatomy of the Third-Party Web Tracking Ecosystem

    Authors: Marjan Falahrastegar, Hamed Haddadi, Steve Uhlig, Richard Mortier

    Abstract: The presence of third-party tracking on websites has become customary. However, our understanding of the third-party ecosystem is still very rudimentary. We examine third-party trackers from a geographical perspective, observing the third-party tracking ecosystem from 29 countries across the globe. When examining the data by region (North America, South America, Europe, East Asia, Middle East, and… ▽ More

    Submitted 3 September, 2014; originally announced September 2014.

    ACM Class: K.4

  36. arXiv:1206.3280  [pdf

    cs.AI stat.AP

    CT-NOR: Representing and Reasoning About Events in Continuous Time

    Authors: Aleksandr Simma, Moises Goldszmidt, John MacCormick, Paul Barham, Richard Black, Rebecca Isaacs, Richard Mortier

    Abstract: We present a generative model for representing and reasoning about the relationships among events in continuous time. We apply the model to the domain of networked and distributed computing environments where we fit the parameters of the model from timestamp observations, and then use hypothesis testing to discover dependencies between the events and changes in behavior for monitoring and diagnosi… ▽ More

    Submitted 13 June, 2012; originally announced June 2012.

    Comments: Appears in Proceedings of the Twenty-Fourth Conference on Uncertainty in Artificial Intelligence (UAI2008)

    Report number: UAI-P-2008-PG-484-493

  37. arXiv:1105.3232  [pdf, other

    cs.DC cs.NI cs.OS

    Unleashing the Power of Mobile Cloud Computing using ThinkAir

    Authors: Sokol Kosta, Andrius Aucinas, Pan Hui, Richard Mortier, Xinwen Zhang

    Abstract: Smartphones have exploded in popularity in recent years, becoming ever more sophisticated and capable. As a result, developers worldwide are building increasingly complex applications that require ever increasing amounts of computational power and energy. In this paper we propose ThinkAir, a framework that makes it simple for developers to migrate their smartphone applications to the cloud. ThinkA… ▽ More

    Submitted 16 May, 2011; originally announced May 2011.

    Comments: 17 pages

  38. arXiv:0909.3481  [pdf, ps, other

    cs.NI cs.CY cs.GL

    Planet-scale Human Mobility Measurement

    Authors: Pan Hui, Richard Mortier, Tristan Henderson, Jon Crowcroft

    Abstract: Research into, and design and construction of mobile systems and algorithms requires access to large-scale mobility data. Unfortunately, the wireless and mobile research community lacks such data. For instance, the largest available human contact traces contain only 100 nodes with very sparse connectivity, limited by experimental logistics. In this paper we pose a challenge to the community: how… ▽ More

    Submitted 18 September, 2009; originally announced September 2009.

    Comments: 6 pages, 2 figures

  39. arXiv:0807.2023  [pdf, ps, other

    cs.NI

    Beyond Node Degree: Evaluating AS Topology Models

    Authors: Hamed Haddadi, Damien Fay, Almerima Jamakovic, Olaf Maennel, Andrew W. Moore, Richard Mortier, Miguel Rio, Steve Uhlig

    Abstract: Many models have been proposed to generate Internet Autonomous System (AS) topologies, most of which make structural assumptions about the AS graph. In this paper we compare AS topology generation models with several observed AS topologies. In contrast to most previous works, we avoid making assumptions about which topological properties are important to characterize the AS topology. Our analysi… ▽ More

    Submitted 13 July, 2008; originally announced July 2008.

    ACM Class: C.2.1; I.6.4