-
Monoidal bicategories, differential linear logic, and analytic functors
Authors:
M. Fiore,
N. Gambino,
M. Hyland
Abstract:
We develop further the theory of monoidal bicategories by introducing and studying bicategorical counterparts of the notions of a linear explonential comonad, as considered in the study of linear logic, and of a codereliction transformation, introduced to study differential linear logic via differential categories. As an application, we extend the differential calculus of Joyal's analytic functors…
▽ More
We develop further the theory of monoidal bicategories by introducing and studying bicategorical counterparts of the notions of a linear explonential comonad, as considered in the study of linear logic, and of a codereliction transformation, introduced to study differential linear logic via differential categories. As an application, we extend the differential calculus of Joyal's analytic functors to analytic functors between presheaf categories, just as ordinary calculus extends from a single variable to many variables.
△ Less
Submitted 23 May, 2024; v1 submitted 9 May, 2024;
originally announced May 2024.
-
Designing the Network Intelligence Stratum for 6G Networks
Authors:
Paola Soto,
Miguel Camelo,
Gines Garcia-Aviles,
Esteban Municio,
Marco Gramaglia,
Evangelos Kosmatos,
Nina Slamnik-Kriještorac,
Danny De Vleeschauwer,
Antonio Bazco-Nogueras,
Lidia Fuentes,
Joaquin Ballesteros,
Andra Lutu,
Luca Cominardi,
Ivan Paez,
Sergi Alcalá-Marín,
Livia Elena Chatzieleftheriou,
Andres Garcia-Saavedra,
Marco Fiore
Abstract:
As network complexity escalates, there is an increasing need for more sophisticated methods to manage and operate these networks, focusing on enhancing efficiency, reliability, and security. A wide range of Artificial Intelligence (AI)/Machine Learning (ML) models are being developed in response. These models are pivotal in automating decision-making, conducting predictive analyses, managing netwo…
▽ More
As network complexity escalates, there is an increasing need for more sophisticated methods to manage and operate these networks, focusing on enhancing efficiency, reliability, and security. A wide range of Artificial Intelligence (AI)/Machine Learning (ML) models are being developed in response. These models are pivotal in automating decision-making, conducting predictive analyses, managing networks proactively, enhancing security, and optimizing network performance. They are foundational in sha** the future of networks, collectively forming what is known as Network Intelligence (NI). Prominent Standard-Defining Organizations (SDOs) are integrating NI into future network architectures, particularly emphasizing the closed-loop approach. However, existing methods for seamlessly integrating NI into network architectures are not yet fully effective. This paper introduces an in-depth architectural design for a Network Intelligence Stratum (NI Stratum). This stratum is supported by a novel end-to-end NI orchestrator that supports closed-loop NI operations across various network domains. The primary goal of this design is to streamline the deployment and coordination of NI throughout the entire network infrastructure, tackling issues related to scalability, conflict resolution, and effective data management. We detail exhaustive workflows for managing the NI lifecycle and demonstrate a reference implementation of the NI Stratum, focusing on its compatibility and integration with current network systems and open-source platforms such as Kubernetes and Kubeflow, as well as on its validation on real-world environments. The paper also outlines major challenges and open issues in deploying and managing NI.
△ Less
Submitted 7 May, 2024;
originally announced May 2024.
-
Solving Maxwell's equations with Non-Trainable Graph Neural Network Message Passing
Authors:
Stefanos Bakirtzis,
Marco Fiore,
Jie Zhang,
Ian Wassell
Abstract:
Computational electromagnetics (CEM) is employed to numerically solve Maxwell's equations, and it has very important and practical applications across a broad range of disciplines, including biomedical engineering, nanophotonics, wireless communications, and electrodynamics. The main limitation of existing CEM methods is that they are computationally demanding. Our work introduces a leap forward i…
▽ More
Computational electromagnetics (CEM) is employed to numerically solve Maxwell's equations, and it has very important and practical applications across a broad range of disciplines, including biomedical engineering, nanophotonics, wireless communications, and electrodynamics. The main limitation of existing CEM methods is that they are computationally demanding. Our work introduces a leap forward in scientific computing and CEM by proposing an original solution of Maxwell's equations that is grounded on graph neural networks (GNNs) and enables the high-performance numerical resolution of these fundamental mathematical expressions. Specifically, we demonstrate that the update equations derived by discretizing Maxwell's partial differential equations can be innately expressed as a two-layer GNN with static and pre-determined edge weights. Given this intuition, a straightforward way to numerically solve Maxwell's equations entails simple message passing between such a GNN's nodes, yielding a significant computational time gain, while preserving the same accuracy as conventional transient CEM methods. Ultimately, our work supports the efficient and precise emulation of electromagnetic wave propagation with GNNs, and more importantly, we anticipate that applying a similar treatment to systems of partial differential equations arising in other scientific disciplines, e.g., computational fluid dynamics, can benefit computational sciences
△ Less
Submitted 1 May, 2024;
originally announced May 2024.
-
Fixpoint constructions in focused orthogonality models of linear logic
Authors:
Marcelo Fiore,
Zeinab Galal,
Farzad Jafarrahmani
Abstract:
Orthogonality is a notion based on the duality between programs and their environments used to determine when they can be safely combined. For instance, it is a powerful tool to establish termination properties in classical formal systems. It was given a general treatment with the concept of orthogonality category, of which numerous models of linear logic are instances, by Hyland and Schalk. This…
▽ More
Orthogonality is a notion based on the duality between programs and their environments used to determine when they can be safely combined. For instance, it is a powerful tool to establish termination properties in classical formal systems. It was given a general treatment with the concept of orthogonality category, of which numerous models of linear logic are instances, by Hyland and Schalk. This paper considers the subclass of focused orthogonalities. We develop a theory of fixpoint constructions in focused orthogonality categories. Central results are lifting theorems for initial algebras and final coalgebras. These crucially hinge on the insight that focused orthogonality categories are relational fibrations. The theory provides an axiomatic categorical framework for models of linear logic with least and greatest fixpoints of types. We further investigate domain-theoretic settings, showing how to lift bifree algebras, used to solve mixed-variance recursive type equations, to focused orthogonality categories.
△ Less
Submitted 17 November, 2023; v1 submitted 18 September, 2023;
originally announced September 2023.
-
Development of a Metaverse Platform for Tourism Promotion in Apulia
Authors:
Enrico Carmine Ciliberti,
Marco Fiore,
Marina Mongiello
Abstract:
Metaverse is an engaging way to recreate in a digital environment the real world. It allows people to connect not by just browsing a website, but by using headsets and virtual reality techniques. The metaverse is actually in a rapid development phase, thanks to the advances in different topics. This paper proposes a smart tourism platform in which tourists can interact with guides and different ki…
▽ More
Metaverse is an engaging way to recreate in a digital environment the real world. It allows people to connect not by just browsing a website, but by using headsets and virtual reality techniques. The metaverse is actually in a rapid development phase, thanks to the advances in different topics. This paper proposes a smart tourism platform in which tourists can interact with guides and different kinds of suppliers, without the need to phisically visit the city they are in. We propose some techniques to scan the real world and transpose it in a metaverse platform, using the recreation of an Italian city, Bari, as a real life scenario.
△ Less
Submitted 5 May, 2023;
originally announced May 2023.
-
The NetMob23 Dataset: A High-resolution Multi-region Service-level Mobile Data Traffic Cartography
Authors:
Orlando E. Martínez-Durive,
Sachit Mishra,
Cezary Ziemlicki,
Stefania Rubrichi,
Zbigniew Smoreda,
Marco Fiore
Abstract:
Digital sources have been enabling unprecedented data-driven and large-scale investigations across a wide range of domains, including demography, sociology, geography, urbanism, criminology, and engineering. A major barrier to innovation is represented by the limited availability of dependable digital datasets, especially in the context of data gathered by mobile network operators or service provi…
▽ More
Digital sources have been enabling unprecedented data-driven and large-scale investigations across a wide range of domains, including demography, sociology, geography, urbanism, criminology, and engineering. A major barrier to innovation is represented by the limited availability of dependable digital datasets, especially in the context of data gathered by mobile network operators or service providers, due to concerns about user privacy and industrial competition. The resulting lack of reference datasets curbs the production of new research methods and results, and prevents verifiability and reproducibility of research outcomes. The NetMob23 dataset offers a rare opportunity to the multidisciplinary research community to access rich data about the spatio-temporal consumption of mobile applications in a developed country. The generation process of the dataset sets a new quality standard, leading to information about the demands generated by 68 popular mobile services, geo-referenced at a high resolution of $100\times100$ $m^2$ over 20 metropolitan areas in France, and monitored during 77 consecutive days in 2019.
△ Less
Submitted 17 July, 2023; v1 submitted 11 May, 2023;
originally announced May 2023.
-
Development of an Hybrid Blockchain and NoSQL Platform to Improve Data Management
Authors:
Federico Carrozzino,
Marco Fiore,
Marina Mongiello
Abstract:
Blockchain technology is a Distributed Ledger Technology mainly used to store information in an immutable and secure way, but scalability and throughput issues are major challenges. Integration of the NoSQL paradigm within a Blockchain pipeline enhances throughput and scalability, and it can handle both on-chain and off-chain data. This work aims to study which approaches are currently used to int…
▽ More
Blockchain technology is a Distributed Ledger Technology mainly used to store information in an immutable and secure way, but scalability and throughput issues are major challenges. Integration of the NoSQL paradigm within a Blockchain pipeline enhances throughput and scalability, and it can handle both on-chain and off-chain data. This work aims to study which approaches are currently used to integrate a NoSQL database in a Blockchain architecture, how the advantages of both technologies can be exploited to enhance the system's capabilities, and to propose a novel hybrid architecture that mixes Blockchain and NoSQL characteristics.
△ Less
Submitted 25 May, 2023; v1 submitted 5 May, 2023;
originally announced May 2023.
-
A context-aware multiple Blockchain architecture for managing low memory devices
Authors:
Marco Fiore,
Marina Mongiello,
Giuseppe Acciani
Abstract:
Blockchain technology constitutes a paradigm shift in the way we conceive distributed architectures. A Blockchain system lets us build platforms where data are immutable and tamper-proof, with some constraints on the throughput and the amount of memory required to store the ledger. This paper aims to solve the issue of memory and performance requirements develo** a multiple Blockchain architectu…
▽ More
Blockchain technology constitutes a paradigm shift in the way we conceive distributed architectures. A Blockchain system lets us build platforms where data are immutable and tamper-proof, with some constraints on the throughput and the amount of memory required to store the ledger. This paper aims to solve the issue of memory and performance requirements develo** a multiple Blockchain architecture that mixes the benefits deriving from a public and a private Blockchain. This kind of approach enables small sensors - with memory and performance constraints - to join the network without worrying about the amount of data to store. The development is proposed following a context-aware approach, to make the architecture scalable and easy to use in different scenarios.
△ Less
Submitted 5 May, 2023;
originally announced May 2023.
-
Blockchain for smart cities improvement: an architecture proposal
Authors:
Marco Fiore,
Marina Mongiello
Abstract:
The combination between innovative topics and emerging technologies lets researchers define new processes and models. New needs regard the definition of modular and scalable approaches, with society and environment in mind. An important topic to focus on is the smart city one. The use of emerging technologies lets smart cities develop new processes to improve services offered from various actors,…
▽ More
The combination between innovative topics and emerging technologies lets researchers define new processes and models. New needs regard the definition of modular and scalable approaches, with society and environment in mind. An important topic to focus on is the smart city one. The use of emerging technologies lets smart cities develop new processes to improve services offered from various actors, either industries or government. Smart cities were born to improve quality of life for citizens. To reach this goal, various approaches have been proposed, but they lack on a common interface to let each stakeholder communicate in a simple and fast way. This paper shows the proposal of an architecture to overcome the actual limitations of smart cities: it uses Blockchain technology as a distributed database to let everyone join the network and feel part of a community. Blockchain can improve processes development for smart cities. Scalability is granted thanks to a context-aware approach: applications do not need to know about the back-end implementation, they just need to adapt to an interface. With Blockchain, it is possible to collect data anonymously to make some statistical analysis, to access public records to ensure security in the city and to guarantee the origin of products and energy.
△ Less
Submitted 5 May, 2023;
originally announced May 2023.
-
Stabilized profunctors and stable species of structures
Authors:
Marcelo Fiore,
Zeinab Galal,
Hugo Paquet
Abstract:
We introduce a bicategorical model of linear logic which is a novel variation of the bicategory of groupoids, profunctors, and natural transformations. Our model is obtained by endowing groupoids with additional structure, called a kit, to stabilize the profunctors by controlling the freeness of the groupoid action on profunctor elements.
The theory of generalized species of structures, based on p…
▽ More
We introduce a bicategorical model of linear logic which is a novel variation of the bicategory of groupoids, profunctors, and natural transformations. Our model is obtained by endowing groupoids with additional structure, called a kit, to stabilize the profunctors by controlling the freeness of the groupoid action on profunctor elements.
The theory of generalized species of structures, based on profunctors, is refined to a new theory of \emph{stable species} of structures between groupoids with Boolean kits. Generalized species are in correspondence with analytic functors between presheaf categories; in our refined model, stable species are shown to be in correspondence with restrictions of analytic functors, which we characterize as being stable, to full subcategories of stabilized presheaves. Our motivating example is the class of finitary polynomial functors between categories of indexed sets, also known as normal functors, that arises from kits enforcing free actions.
We show that the bicategory of groupoids with Boolean kits, stable species, and natural transformations is cartesian closed. This makes essential use of the logical structure of Boolean kits and explains the well-known failure of cartesian closure for the bicategory of finitary polynomial functors between categories of set-indexed families and cartesian natural transformations. The paper additionally develops the model of classical linear logic underlying the cartesian closed structure and clarifies the connection to stable domain theory.
△ Less
Submitted 28 February, 2024; v1 submitted 8 March, 2023;
originally announced March 2023.
-
Semantic Analysis of Normalisation by Evaluation for Typed Lambda Calculus
Authors:
Marcelo Fiore
Abstract:
This paper studies normalisation by evaluation for typed lambda calculus from a categorical and algebraic viewpoint. The first part of the paper analyses the lambda definability result of Jung and Tiuryn via Kripke logical relations and shows how it can be adapted to unify definability and normalisation, yielding an extensional normalisation result. In the second part of the paper the analysis is…
▽ More
This paper studies normalisation by evaluation for typed lambda calculus from a categorical and algebraic viewpoint. The first part of the paper analyses the lambda definability result of Jung and Tiuryn via Kripke logical relations and shows how it can be adapted to unify definability and normalisation, yielding an extensional normalisation result. In the second part of the paper the analysis is refined further by considering intensional Kripke relations (in the form of Artin glueing) and shown to provide a function for normalising terms, casting normalisation by evaluation in the context of categorical glueing. The technical development includes an algebraic treatment of the syntax and semantics of the typed lambda calculus that allows the definition of the normalisation function to be given within a simply typed metatheory. A normalisation-by-evaluation program in a dependently-typed functional programming language is synthesised.
△ Less
Submitted 18 August, 2022; v1 submitted 18 July, 2022;
originally announced July 2022.
-
A General Framework for Hierarchical Redundancy Resolution Under Arbitrary Constraints
Authors:
Mario D. Fiore,
Gaetano Meli,
Anton Ziese,
Bruno Siciliano,
Ciro Natale
Abstract:
The increasing interest in autonomous robots with a high number of degrees of freedom for industrial applications and service robotics demands control algorithms to handle multiple tasks as well as hard constraints efficiently. This paper presents a general framework in which both kinematic (velocity- or acceleration-based) and dynamic (torque-based) control of redundant robots are handled in a un…
▽ More
The increasing interest in autonomous robots with a high number of degrees of freedom for industrial applications and service robotics demands control algorithms to handle multiple tasks as well as hard constraints efficiently. This paper presents a general framework in which both kinematic (velocity- or acceleration-based) and dynamic (torque-based) control of redundant robots are handled in a unified fashion. The framework allows for the specification of redundancy resolution problems featuring a hierarchy of arbitrary (equality and inequality) constraints, arbitrary weighting of the control effort in the cost function and an additional input used to optimize possibly remaining redundancy. To solve such problems, a generalization of the Saturation in the Null Space (SNS) algorithm is introduced, which extends the original method according to the features required by our general control framework. Variants of the developed algorithm are presented, which ensure both efficient computation and optimality of the solution. Experiments on a KUKA LBRiiwa robotic arm, as well as simulations with a highly redundant mobile manipulator are reported.
△ Less
Submitted 13 December, 2022; v1 submitted 8 April, 2022;
originally announced April 2022.
-
Formal Metatheory of Second-Order Abstract Syntax
Authors:
Marcelo Fiore,
Dmitrij Szamozvancev
Abstract:
Despite extensive research both on the theoretical and practical fronts, formalising, reasoning about, and implementing languages with variable binding is still a daunting endeavour - repetitive boilerplate and the overly complicated metatheory of capture-avoiding substitution often get in the way of progressing on to the actually interesting properties of a language. Existing developments offer s…
▽ More
Despite extensive research both on the theoretical and practical fronts, formalising, reasoning about, and implementing languages with variable binding is still a daunting endeavour - repetitive boilerplate and the overly complicated metatheory of capture-avoiding substitution often get in the way of progressing on to the actually interesting properties of a language. Existing developments offer some relief, however at the expense of inconvenient and error-prone term encodings and lack of formal foundations.
We present a mathematically-inspired language-formalisation framework implemented in Agda. The system translates the description of a syntax signature with variable-binding operators into an intrinsically-encoded, inductive data type equipped with syntactic operations such as weakening and substitution, along with their correctness properties. The generated metatheory further incorporates metavariables and their associated operation of metasubstitution, which enables second-order equational/rewriting reasoning. The underlying mathematical foundation of the framework - initial algebra semantics - derives compositional interpretations of languages into their models satisfying the semantic substitution lemma by construction.
△ Less
Submitted 10 January, 2022;
originally announced January 2022.
-
Influence Dynamics Among Narratives: A Case Study of the Venezuelan Presidential Crisis
Authors:
Akshay Aravamudan,
Xi Zhang,
Jihye Song,
Stephen M. Fiore,
Georgios C. Anagnostopoulos
Abstract:
It is widely understood that diffusion of and simultaneous interactions between narratives -- defined here as persistent point-of-view messaging -- significantly contributes to the sha** of political discourse and public opinion. In this work, we propose a methodology based on Multi-Variate Hawkes Processes and our newly-introduced Process Influence Measures for quantifying and assessing how suc…
▽ More
It is widely understood that diffusion of and simultaneous interactions between narratives -- defined here as persistent point-of-view messaging -- significantly contributes to the sha** of political discourse and public opinion. In this work, we propose a methodology based on Multi-Variate Hawkes Processes and our newly-introduced Process Influence Measures for quantifying and assessing how such narratives influence (Granger-cause) each other. Such an approach may aid social scientists enhance their understanding of socio-geopolitical phenomena as they manifest themselves and evolve in the realm of social media. In order to show its merits, we apply our methodology on Twitter narratives during the 2019 Venezuelan presidential crisis. Our analysis indicates a nuanced, evolving influence structure between 8 distinct narratives, part of which could be explained by landmark historical events.
△ Less
Submitted 5 November, 2021;
originally announced November 2021.
-
Metrics and Mechanisms: Measuring the Unmeasurable in the Science of Science
Authors:
Lingfei Wu,
Aniket Kittur,
Hye** Youn,
Staša Milojević,
Erin Leahey,
Stephen M. Fiore,
Yong Yeol Ahn
Abstract:
What science does, what science could do, and how to make science work? If we want to know the answers to these questions, we need to be able to uncover the mechanisms of science, going beyond metrics that are easily collectible and quantifiable. In this perspective piece, we link metrics to mechanisms by demonstrating how emerging metrics of science not only offer complementaries to existing ones…
▽ More
What science does, what science could do, and how to make science work? If we want to know the answers to these questions, we need to be able to uncover the mechanisms of science, going beyond metrics that are easily collectible and quantifiable. In this perspective piece, we link metrics to mechanisms by demonstrating how emerging metrics of science not only offer complementaries to existing ones, but also shed light on the hidden structure and mechanisms of science. Based on fundamental properties of science, we classify existing theories and findings into: hot and cold science referring to attention shift between scientific fields, fast and slow science reflecting productivity of scientists and teams, soft and hard science revealing reproducibility of scientific research. We suggest that interest about mechanisms of science since Derek J. de Solla Price, Robert K. Merton, Eugene Garfield, and many others complement the zeitgeist in pursuing new, complex metrics without understanding the underlying processes. We propose that understanding and modeling the mechanisms of science condition effective development and application of metrics.
△ Less
Submitted 9 April, 2022; v1 submitted 14 November, 2021;
originally announced November 2021.
-
Free Commutative Monoids in Homotopy Type Theory
Authors:
Vikraman Choudhury,
Marcelo Fiore
Abstract:
We develop a constructive theory of finite multisets in Homotopy Type Theory, defining them as free commutative monoids. After recalling basic structural properties of the free commutative-monoid construction, we formalise and establish the categorical universal property of two, necessarily equivalent, algebraic presentations of free commutative monoids using 1-HITs. These presentations correspond…
▽ More
We develop a constructive theory of finite multisets in Homotopy Type Theory, defining them as free commutative monoids. After recalling basic structural properties of the free commutative-monoid construction, we formalise and establish the categorical universal property of two, necessarily equivalent, algebraic presentations of free commutative monoids using 1-HITs. These presentations correspond to two different equational theories invariably including commutation axioms. In this setting, we prove important structural combinatorial properties of finite multisets. These properties are established in full generality without assuming decidable equality on the carrier set.
As an application, we present a constructive formalisation of the relational model of classical linear logic and its differential structure. This leads to constructively establishing that free commutative monoids are conical refinement monoids. Thereon we obtain a characterisation of the equality type of finite multisets and a new presentation of the free commutative-monoid construction as a set-quotient of the list construction. These developments crucially rely on the commutation relation of creation/annihilation operators associated with the free commutative-monoid construction seen as a combinatorial Fock space.
△ Less
Submitted 20 February, 2023; v1 submitted 11 October, 2021;
originally announced October 2021.
-
Quotients, inductive types, and quotient inductive types
Authors:
Marcelo P. Fiore,
Andrew M. Pitts,
S. C. Steenkamp
Abstract:
This paper introduces an expressive class of indexed quotient-inductive types, called QWI types, within the framework of constructive type theory. They are initial algebras for indexed families of equational theories with possibly infinitary operators and equations. We prove that QWI types can be derived from quotient types and inductive types in the type theory of toposes with natural number obje…
▽ More
This paper introduces an expressive class of indexed quotient-inductive types, called QWI types, within the framework of constructive type theory. They are initial algebras for indexed families of equational theories with possibly infinitary operators and equations. We prove that QWI types can be derived from quotient types and inductive types in the type theory of toposes with natural number object and universes, provided those universes satisfy the Weakly Initial Set of Covers (WISC) axiom. We do so by constructing QWI types as colimits of a family of approximations to them defined by well-founded recursion over a suitable notion of size, whose definition involves the WISC axiom. We developed the proof and checked it using the Agda theorem prover.
△ Less
Submitted 6 June, 2022; v1 submitted 8 January, 2021;
originally announced January 2021.
-
Analyzing the Productivity of GitHub Teams based on Formation Phase Activity
Authors:
Samaneh Saadat,
Olivia B. Newton,
Gita Sukthankar,
Stephen M. Fiore
Abstract:
Our goal is to understand the characteristics of high-performing teams on GitHub. Towards this end, we collect data from software repositories and evaluate teams by examining differences in productivity. Our study focuses on the team formation phase, the first six months after repository creation. To better understand team activity, we clustered repositories based on the proportion of their work a…
▽ More
Our goal is to understand the characteristics of high-performing teams on GitHub. Towards this end, we collect data from software repositories and evaluate teams by examining differences in productivity. Our study focuses on the team formation phase, the first six months after repository creation. To better understand team activity, we clustered repositories based on the proportion of their work activities and discovered three work styles in teams: toilers, communicators, and collaborators. Based on our results, we contend that early activities in software development repositories on GitHub establish coordination processes that enable effective collaborations over time.
△ Less
Submitted 6 November, 2020;
originally announced November 2020.
-
Algebraic models of simple type theories: a polynomial approach
Authors:
Nathanael Arkor,
Marcelo Fiore
Abstract:
We develop algebraic models of simple type theories, laying out a framework that extends universal algebra to incorporate both algebraic sorting and variable binding. Examples of simple type theories include the unityped and simply-typed $λ$-calculi, the computational $λ$-calculus, and predicate logic.
Simple type theories are given models in presheaf categories, with structure specified by alge…
▽ More
We develop algebraic models of simple type theories, laying out a framework that extends universal algebra to incorporate both algebraic sorting and variable binding. Examples of simple type theories include the unityped and simply-typed $λ$-calculi, the computational $λ$-calculus, and predicate logic.
Simple type theories are given models in presheaf categories, with structure specified by algebras of polynomial endofunctors that correspond to natural deduction rules. Initial models, which we construct, abstractly describe the syntax of simple type theories. Taking substitution structure into consideration, we further provide sound and complete semantics in structured cartesian multicategories. This development generalises Lambek's correspondence between the simply-typed $λ$-calculus and cartesian-closed categories, to arbitrary simple type theories.
△ Less
Submitted 30 June, 2020;
originally announced June 2020.
-
Deep Agent: Studying the Dynamics of Information Spread and Evolution in Social Networks
Authors:
Ivan Garibay,
Toktam A. Oghaz,
Niloofar Yousefi,
Ece C. Mutlu,
Madeline Schiappa,
Steven Scheinert,
Georgios C. Anagnostopoulos,
Christina Bouwens,
Stephen M. Fiore,
Alexander Mantzaris,
John T. Murphy,
William Rand,
Anastasia Salter,
Mel Stanfill,
Gita Sukthankar,
Nisha Baral,
Gabriel Fair,
Chathika Gunaratne,
Neda B. Hajiakhoond,
Jasser Jasser,
Chathura Jayalath,
Olivia Newton,
Samaneh Saadat,
Chathurani Senevirathna,
Rachel Winter
, et al. (1 additional authors not shown)
Abstract:
This paper explains the design of a social network analysis framework, developed under DARPA's SocialSim program, with novel architecture that models human emotional, cognitive and social factors. Our framework is both theory and data-driven, and utilizes domain expertise. Our simulation effort helps in understanding how information flows and evolves in social media platforms. We focused on modeli…
▽ More
This paper explains the design of a social network analysis framework, developed under DARPA's SocialSim program, with novel architecture that models human emotional, cognitive and social factors. Our framework is both theory and data-driven, and utilizes domain expertise. Our simulation effort helps in understanding how information flows and evolves in social media platforms. We focused on modeling three information domains: cryptocurrencies, cyber threats, and software vulnerabilities for the three interrelated social environments: GitHub, Reddit, and Twitter. We participated in the SocialSim DARPA Challenge in December 2018, in which our models were subjected to extensive performance evaluation for accuracy, generalizability, explainability, and experimental power. This paper reports the main concepts and models, utilized in our social media modeling effort in develo** a multi-resolution simulation at the user, community, population, and content levels.
△ Less
Submitted 29 May, 2021; v1 submitted 25 March, 2020;
originally announced March 2020.
-
Will the Proliferation of 5G Base Stations Increase the Radio-Frequency "Pollution"?
Authors:
Luca Chiaraviglio,
Giuseppe Bianchi,
Nicola Blefari-Melazzi,
Marco Fiore
Abstract:
A common concern among the population is that installing new 5G Base Stations (BSs) over a given geographic region may result in an uncontrollable increase of Radio-Frequency "Pollution" (RFP). To face this dispute in a way that can be understood by the layman, we develop a very simple model, which evaluates the RFP at selected distances between the user and the 5G BS locations. We then obtain clo…
▽ More
A common concern among the population is that installing new 5G Base Stations (BSs) over a given geographic region may result in an uncontrollable increase of Radio-Frequency "Pollution" (RFP). To face this dispute in a way that can be understood by the layman, we develop a very simple model, which evaluates the RFP at selected distances between the user and the 5G BS locations. We then obtain closed-form expressions to quantify the RFP increase/decrease when comparing a pair of alternative 5G deployments. Results show that a dense 5G deployment is beneficial to the users living in proximity to the 5G BSs, with an abrupt decrease of RFP (up to three orders of magnitude) compared to a sparse deployment. We also analyze scenarios where the user equipment minimum detectable signal threshold is increased, showing that in such cases a (slight) increase of RFP may be experienced.
△ Less
Submitted 3 March, 2020; v1 submitted 2 December, 2019;
originally announced December 2019.
-
Constructing Infinitary Quotient-Inductive Types
Authors:
Marcelo Fiore,
Andrew M. Pitts,
S. C. Steenkamp
Abstract:
This paper introduces an expressive class of quotient-inductive types, called QW-types. We show that in dependent type theory with uniqueness of identity proofs, even the infinitary case of QW-types can be encoded using the combination of inductive-inductive definitions involving strictly positive occurrences of Hofmann-style quotient types, and Abel's size types. The latter, which provide a conve…
▽ More
This paper introduces an expressive class of quotient-inductive types, called QW-types. We show that in dependent type theory with uniqueness of identity proofs, even the infinitary case of QW-types can be encoded using the combination of inductive-inductive definitions involving strictly positive occurrences of Hofmann-style quotient types, and Abel's size types. The latter, which provide a convenient constructive abstraction of what classically would be accomplished with transfinite ordinals, are used to prove termination of the recursive definitions of the elimination and computation properties of our encoding of QW-types. The development is formalized using the Agda theorem prover.
△ Less
Submitted 19 February, 2020; v1 submitted 15 November, 2019;
originally announced November 2019.
-
CloudLSTM: A Recurrent Neural Model for Spatiotemporal Point-cloud Stream Forecasting
Authors:
Chaoyun Zhang,
Marco Fiore,
Iain Murray,
Paul Patras
Abstract:
This paper introduces CloudLSTM, a new branch of recurrent neural models tailored to forecasting over data streams generated by geospatial point-cloud sources. We design a Dynamic Point-cloud Convolution (DConv) operator as the core component of CloudLSTMs, which performs convolution directly over point-clouds and extracts local spatial features from sets of neighboring points that surround differ…
▽ More
This paper introduces CloudLSTM, a new branch of recurrent neural models tailored to forecasting over data streams generated by geospatial point-cloud sources. We design a Dynamic Point-cloud Convolution (DConv) operator as the core component of CloudLSTMs, which performs convolution directly over point-clouds and extracts local spatial features from sets of neighboring points that surround different elements of the input. This operator maintains the permutation invariance of sequence-to-sequence learning frameworks, while representing neighboring correlations at each time step -- an important aspect in spatiotemporal predictive learning. The DConv operator resolves the grid-structural data requirements of existing spatiotemporal forecasting models and can be easily plugged into traditional LSTM architectures with sequence-to-sequence learning and attention mechanisms. We apply our proposed architecture to two representative, practical use cases that involve point-cloud streams, i.e., mobile service traffic forecasting and air quality indicator forecasting. Our results, obtained with real-world datasets collected in diverse scenarios for each use case, show that CloudLSTM delivers accurate long-term predictions, outperforming a variety of competitor neural network models.
△ Less
Submitted 21 February, 2021; v1 submitted 29 July, 2019;
originally announced July 2019.
-
Multi-Service Mobile Traffic Forecasting via Convolutional Long Short-Term Memories
Authors:
Chaoyun Zhang,
Marco Fiore,
Paul Patras
Abstract:
Network slicing is increasingly used to partition network infrastructure between different mobile services. Precise service-wise mobile traffic forecasting becomes essential in this context, as mobile operators seek to pre-allocate resources to each slice in advance, to meet the distinct requirements of individual services. This paper attacks the problem of multi-service mobile traffic forecasting…
▽ More
Network slicing is increasingly used to partition network infrastructure between different mobile services. Precise service-wise mobile traffic forecasting becomes essential in this context, as mobile operators seek to pre-allocate resources to each slice in advance, to meet the distinct requirements of individual services. This paper attacks the problem of multi-service mobile traffic forecasting using a sequence-to-sequence (S2S) learning paradigm and convolutional long short-term memories (ConvLSTMs). The proposed architecture is designed so as to effectively extract complex spatiotemporal features of mobile network traffic and predict with high accuracy the future demands for individual services at city scale. We conduct experiments on a mobile traffic dataset collected in a large European metropolis, demonstrating that the proposed S2S-ConvLSTM can forecast the mobile traffic volume produced by tens of different services in advance of up to one hour, by just using measurements taken during the past hour. In particular, our solution achieves mean absolute errors (MAE) at antenna level that are below 13KBps, outperforming other deep learning approaches by up to 31.2%.
△ Less
Submitted 23 May, 2019;
originally announced May 2019.
-
A type theory for cartesian closed bicategories
Authors:
Marcelo Fiore,
Philip Saville
Abstract:
We construct an internal language for cartesian closed bicategories. Precisely, we introduce a type theory modelling the structure of a cartesian closed bicategory and show that its syntactic model satisfies an appropriate universal property, thereby lifting the Curry-Howard-Lambek correspondence to the bicategorical setting. Our approach is principled and practical. Weak substitution structure is…
▽ More
We construct an internal language for cartesian closed bicategories. Precisely, we introduce a type theory modelling the structure of a cartesian closed bicategory and show that its syntactic model satisfies an appropriate universal property, thereby lifting the Curry-Howard-Lambek correspondence to the bicategorical setting. Our approach is principled and practical. Weak substitution structure is constructed using a bicategorification of the notion of abstract clone from universal algebra, and the rules for products and exponentials are synthesised from semantic considerations. The result is a type theory that employs a novel combination of 2-dimensional type theory and explicit substitution, and directly generalises the Simply-Typed Lambda Calculus. This work is the first step in a programme aimed at proving coherence for cartesian closed bicategories.
△ Less
Submitted 13 April, 2019;
originally announced April 2019.
-
Privacy in trajectory micro-data publishing : a survey
Authors:
Marco Fiore,
Panagiota Katsikouli,
Elli Zavou,
Mathieu Cunche,
Françoise Fessant,
Dominique Le Hello,
Ulrich Matchi Aivodji,
Baptiste Olivier,
Tony Quertier,
Razvan Stanica
Abstract:
We survey the literature on the privacy of trajectory micro-data, i.e., spatiotemporal information about the mobility of individuals, whose collection is becoming increasingly simple and frequent thanks to emerging information and communication technologies. The focus of our review is on privacy-preserving data publishing (PPDP), i.e., the publication of databases of trajectory micro-data that pre…
▽ More
We survey the literature on the privacy of trajectory micro-data, i.e., spatiotemporal information about the mobility of individuals, whose collection is becoming increasingly simple and frequent thanks to emerging information and communication technologies. The focus of our review is on privacy-preserving data publishing (PPDP), i.e., the publication of databases of trajectory micro-data that preserve the privacy of the monitored individuals. We classify and present the literature of attacks against trajectory micro-data, as well as solutions proposed to date for protecting databases from such attacks. This paper serves as an introductory reading on a critical subject in an era of growing awareness about privacy risks connected to digital services, and provides insights into open problems and future directions for research.
△ Less
Submitted 13 May, 2020; v1 submitted 26 March, 2019;
originally announced March 2019.
-
Urban Vibes and Rural Charms: Analysis of Geographic Diversity in Mobile Service Usage at National Scale
Authors:
Rajkarn Singh,
Marco Fiore,
Mahesh K. Marina,
Alessandro Nordio,
Alberto Tarable
Abstract:
We investigate spatial patterns in mobile service consumption that emerge at national scale. Our investigation focuses on a representative case study, i.e., France, where we find that: (i) the demand for popular mobile services is fairly uniform across the whole country, and only a reduced set of peculiar services (mainly operating system updates and long-lived video streaming) yields geographic d…
▽ More
We investigate spatial patterns in mobile service consumption that emerge at national scale. Our investigation focuses on a representative case study, i.e., France, where we find that: (i) the demand for popular mobile services is fairly uniform across the whole country, and only a reduced set of peculiar services (mainly operating system updates and long-lived video streaming) yields geographic diversity; (ii) even for such distinguishing services, the spatial heterogeneity of demands is limited, and a small set of consumption behaviors is sufficient to characterize most of the mobile service usage across the country; (iii) the spatial distribution of these behaviors correlates well with the urbanization level, ultimately suggesting that the adoption of geographically-diverse mobile applications is linked to a dichotomy of cities and rural areas. We derive our results through the analysis of substantial measurement data collected by a major mobile network operator, leveraging an approach rooted in information theory that can be readily applied to other scenarios.
△ Less
Submitted 1 March, 2019;
originally announced March 2019.
-
Estimation of Static and Dynamic Urban Populations with Mobile Network Metadata
Authors:
Ghazaleh Khodabandelou,
Vincent Gauthier,
Marco Fiore,
Mounim El-Yacoubi
Abstract:
Communication-enabled devices routinely carried by individuals have become pervasive, opening unprecedented opportunities for collecting digital metadata about the mobility of large populations. In this paper, we propose a novel methodology for the estimation of people density at metropolitan scales, using subscriber presence metadata collected by a mobile operator. Our approach suits the estimati…
▽ More
Communication-enabled devices routinely carried by individuals have become pervasive, opening unprecedented opportunities for collecting digital metadata about the mobility of large populations. In this paper, we propose a novel methodology for the estimation of people density at metropolitan scales, using subscriber presence metadata collected by a mobile operator. Our approach suits the estimation of static population densities, i.e., of the distribution of dwelling units per urban area contained in traditional censuses. More importantly, it enables the estimation of dynamic population densities, i.e., the time-varying distributions of people in a conurbation. By leveraging substantial real-world mobile network metadata and ground-truth information, we demonstrate that the accuracy of our solution is superior to that granted by state-of-the-art methods in practical heterogeneous urban scenarios.
△ Less
Submitted 30 October, 2018;
originally announced October 2018.
-
Towards a computational model of social norms
Authors:
Ladislau Bölöni,
Taranjeet Singh Bhatia,
Saad Ahmad Khan,
Jonathan Streater,
Stephen M. Fiore
Abstract:
We describe a computational model of social norms based on identifying values that a certain culture finds desirable such as dignity, generosity and politeness. The model quantifies these values in the form of Culture-Sanctioned Social Metrics (CSSMs) and treats social norms as the requirement to maximize these metrics from the perspective of the self, peers and public. This model can be used to c…
▽ More
We describe a computational model of social norms based on identifying values that a certain culture finds desirable such as dignity, generosity and politeness. The model quantifies these values in the form of Culture-Sanctioned Social Metrics (CSSMs) and treats social norms as the requirement to maximize these metrics from the perspective of the self, peers and public. This model can be used to create realistic social simulations, to explain or predict human behavior in specific scenarios, or as a component of robots or agents that need to interact with humans in specific social-cultural settings. We validate the model by using it to represent a complex deception scenario and showing that it can yield non-trivial insights such as the explanation of apparently irrational human behavior.
△ Less
Submitted 17 January, 2018;
originally announced January 2018.
-
$k^{τ,ε}$-anonymity: Towards Privacy-Preserving Publishing of Spatiotemporal Trajectory Data
Authors:
Marco Gramaglia,
Marco Fiore,
Alberto Tarable,
Albert Banchs
Abstract:
Mobile network operators can track subscribers via passive or active monitoring of device locations. The recorded trajectories offer an unprecedented outlook on the activities of large user populations, which enables develo** new networking solutions and services, and scaling up studies across research disciplines. Yet, the disclosure of individual trajectories raises significant privacy concern…
▽ More
Mobile network operators can track subscribers via passive or active monitoring of device locations. The recorded trajectories offer an unprecedented outlook on the activities of large user populations, which enables develo** new networking solutions and services, and scaling up studies across research disciplines. Yet, the disclosure of individual trajectories raises significant privacy concerns: thus, these data are often protected by restrictive non-disclosure agreements that limit their availability and impede potential usages. In this paper, we contribute to the development of technical solutions to the problem of privacy-preserving publishing of spatiotemporal trajectories of mobile subscribers. We propose an algorithm that generalizes the data so that they satisfy $k^{τ,ε}$-anonymity, an original privacy criterion that thwarts attacks on trajectories. Evaluations with real-world datasets demonstrate that our algorithm attains its objective while retaining a substantial level of accuracy in the data. Our work is a step forward in the direction of open, privacy-preserving datasets of spatiotemporal trajectories.
△ Less
Submitted 9 January, 2017;
originally announced January 2017.
-
Population estimation from mobile network traffic metadata
Authors:
Ghazaleh Khodabandelou,
Vincent Gauthier,
Mounim A. El-Yacoubi,
Marco Fiore
Abstract:
Smartphones and other mobile devices are today pervasive across the globe. As an interesting side effect of the surge in mobile communications, mobile network operators can now easily collect a wealth of high-resolution data on the habits of large user populations. The information extracted from mobile network traffic data is very relevant in the context of population map**: it provides a tool f…
▽ More
Smartphones and other mobile devices are today pervasive across the globe. As an interesting side effect of the surge in mobile communications, mobile network operators can now easily collect a wealth of high-resolution data on the habits of large user populations. The information extracted from mobile network traffic data is very relevant in the context of population map**: it provides a tool for the automatic and live estimation of population densities, overcoming the limitations of traditional data sources such as censuses and surveys. In this paper, we propose a new approach to infer population densities at urban scales, based on aggregated mobile network traffic metadata. Our approach allows estimating both static and dynamic populations, achieves a significant improvement in terms of accuracy with respect to state-of-the-art solutions in the literature, and is validated on different city scenarios.
△ Less
Submitted 4 October, 2016;
originally announced October 2016.
-
Some essential skills and their combination in an architecture for a cognitive and interactive robot
Authors:
Sandra Devin,
Grégoire Milliez,
Michelangelo Fiore,
Aurélie Clodic,
Rachid Alami
Abstract:
The topic of joint actions has been deeply studied in the context of Human-Human interaction in order to understand how humans cooperate. Creating autonomous robots that collaborate with humans is a complex problem, where it is relevant to apply what has been learned in the context of Human-Human interaction. The question is what skills to implement and how to integrate them in order to build a co…
▽ More
The topic of joint actions has been deeply studied in the context of Human-Human interaction in order to understand how humans cooperate. Creating autonomous robots that collaborate with humans is a complex problem, where it is relevant to apply what has been learned in the context of Human-Human interaction. The question is what skills to implement and how to integrate them in order to build a cognitive architecture, allowing a robot to collaborate efficiently and naturally with humans. In this paper, we first list a set of skills that we consider essential for Joint Action, then we analyze the problem from the robot's point of view and discuss how they can be instantiated in human-robot scenarios. Finally, we open the discussion on how to integrate such skills into a cognitive architecture for human-robot collaborative problem solving and task achievement.
△ Less
Submitted 2 March, 2016;
originally announced March 2016.
-
On the anonymizability of mobile traffic datasets
Authors:
Marco Gramaglia,
Marco Fiore
Abstract:
Preserving user privacy is paramount when it comes to publicly disclosed datasets that contain fine-grained data about large populations. The problem is especially critical in the case of mobile traffic datasets collected by cellular operators, as they feature elevate subscriber trajectory uniqueness and they are resistant to anonymization through spatiotemporal generalization. In this work, we in…
▽ More
Preserving user privacy is paramount when it comes to publicly disclosed datasets that contain fine-grained data about large populations. The problem is especially critical in the case of mobile traffic datasets collected by cellular operators, as they feature elevate subscriber trajectory uniqueness and they are resistant to anonymization through spatiotemporal generalization. In this work, we investigate the $k$-anonymizability of trajectories in two large-scale mobile traffic datasets, by means of a novel dedicated measure. Our results are in agreement with those of previous analyses, however they also provide additional insights on the reasons behind the poor anonimizability of mobile traffic datasets. As such, our study is a step forward in the direction of a more robust dataset anonymization.
△ Less
Submitted 14 April, 2015; v1 submitted 31 December, 2014;
originally announced January 2015.
-
Functorial Semantics of Second-Order Algebraic Theories
Authors:
Marcelo Fiore,
Ola Mahmoud
Abstract:
The purpose of this work is to complete the algebraic foundations of second-order languages from the viewpoint of categorical algebra as developed by Lawvere. To this end, this paper introduces the notion of second-order algebraic theory and develops its basic theory. A crucial role in the definition is played by the second-order theory of equality $\M$, representing the most elementary operators…
▽ More
The purpose of this work is to complete the algebraic foundations of second-order languages from the viewpoint of categorical algebra as developed by Lawvere. To this end, this paper introduces the notion of second-order algebraic theory and develops its basic theory. A crucial role in the definition is played by the second-order theory of equality $\M$, representing the most elementary operators and equations present in every second-order language. The category $\M$ can be described abstractly via the universal property of being the free cartesian category on an exponentiable object. Thereby, in the tradition of categorical algebra, a second-order algebraic theory consists of a cartesian category $\Mlaw$ and a strict cartesian identity-on-objects functor $\M \to \Mlaw$ that preserves the universal exponentiable object of $\Mlaw$. Lawvere's functorial semantics for algebraic theories can then be generalised to the second-order setting. To verify the correctness of our theory, two categorical equivalences are established: at the syntactic level, that of second-order equational presentations and second-order algebraic theories; at the semantic level, that of second-order algebras and second-order functorial models.
△ Less
Submitted 19 January, 2014;
originally announced January 2014.
-
Second-Order Algebraic Theories
Authors:
Marcelo Fiore,
Ola Mahmoud
Abstract:
Fiore and Hur recently introduced a conservative extension of universal algebra and equational logic from first to second order. Second-order universal algebra and second-order equational logic respectively provide a model theory and a formal deductive system for languages with variable binding and parameterised metavariables. This work completes the foundations of the subject from the viewpoint o…
▽ More
Fiore and Hur recently introduced a conservative extension of universal algebra and equational logic from first to second order. Second-order universal algebra and second-order equational logic respectively provide a model theory and a formal deductive system for languages with variable binding and parameterised metavariables. This work completes the foundations of the subject from the viewpoint of categorical algebra. Specifically, the paper introduces the notion of second-order algebraic theory and develops its basic theory. Two categorical equivalences are established: at the syntactic level, that of second-order equational presentations and second-order algebraic theories; at the semantic level, that of second-order algebras and second-order functorial models. Our development includes a mathematical definition of syntactic translation between second-order equational presentations. This gives the first formalisation of notions such as encodings and transforms in the context of languages with variable binding.
△ Less
Submitted 25 August, 2013;
originally announced August 2013.
-
The DAME/VO-Neural Infrastructure: an Integrated Data Mining System Support for the Science Community
Authors:
M. Brescia,
A. Corazza,
S. Cavuoti,
G. d'Angelo,
R. D'Abrusco,
C. Donalek,
S. G. Djorgovski,
N. Deniskina,
M. Fiore,
M. Garofalo,
O. Laurino,
G. Longo A. Mahabal,
F. Manna,
A. Nocella,
B. Skordovski
Abstract:
Astronomical data are gathered through a very large number of heterogeneous techniques and stored in very diversified and often incompatible data repositories. Moreover in the e-science environment, it is needed to integrate services across distributed, heterogeneous, dynamic "virtual organizations" formed by different resources within a single enterprise and/or external resource sharing and servi…
▽ More
Astronomical data are gathered through a very large number of heterogeneous techniques and stored in very diversified and often incompatible data repositories. Moreover in the e-science environment, it is needed to integrate services across distributed, heterogeneous, dynamic "virtual organizations" formed by different resources within a single enterprise and/or external resource sharing and service provider relationships. The DAME/VONeural project, run jointly by the University Federico II, INAF (National Institute of Astrophysics) Astronomical Observatories of Napoli and the California Institute of Technology, aims at creating a single, sustainable, distributed e-infrastructure for data mining and exploration in massive data sets, to be offered to the astronomical (but not only) community as a web application. The framework makes use of distributed computing environments (e.g. S.Co.P.E.) and matches the international IVOA standards and requirements. The integration process is technically challenging due to the need of achieving a specific quality of service when running on top of different native platforms. In these terms, the result of the DAME/VO-Neural project effort will be a service-oriented architecture, obtained by using appropriate standards and incorporating Grid paradigms and restful Web services frameworks where needed, that will have as main target the integration of interdisciplinary distributed systems within and across organizational domains.
△ Less
Submitted 4 December, 2011;
originally announced December 2011.
-
On the mathematical synthesis of equational logics
Authors:
Marcelo Fiore,
Chung-Kil Hur
Abstract:
We provide a mathematical theory and methodology for synthesising equational logics from algebraic metatheories. We illustrate our methodology by means of two applications: a rational reconstruction of Birkhoff's Equational Logic and a new equational logic for reasoning about algebraic structure with name-binding operators.
We provide a mathematical theory and methodology for synthesising equational logics from algebraic metatheories. We illustrate our methodology by means of two applications: a rational reconstruction of Birkhoff's Equational Logic and a new equational logic for reasoning about algebraic structure with name-binding operators.
△ Less
Submitted 7 September, 2011; v1 submitted 15 July, 2011;
originally announced July 2011.
-
Adding Network Coding Capabilities to the WSNet Simulator
Authors:
Wei Liang Choo,
Frédéric Le Mouël,
Katia Jaffrès-Runser,
Marco Fiore
Abstract:
This technical report presents the implementation of a Network Coding module in WSNet - a Wireless Sensor Network simulator. This implementation provides a generic programming interface to allow an easy specialization of different coding strategies: random, source/destination-oriented, intra/inter-flow, etc.
This technical report presents the implementation of a Network Coding module in WSNet - a Wireless Sensor Network simulator. This implementation provides a generic programming interface to allow an easy specialization of different coding strategies: random, source/destination-oriented, intra/inter-flow, etc.
△ Less
Submitted 9 March, 2011;
originally announced March 2011.
-
Content replication and placement in mobile networks
Authors:
Chi-Anh La,
Pietro Michiardi,
Claudio Casetti,
Carla-Fabiana Chiasserini,
Marco Fiore
Abstract:
Performance and reliability of content access in mobile networks is conditioned by the number and location of content replicas deployed at the network nodes. Location theory has been the traditional, centralized approach to study content replication: computing the number and placement of replicas in a static network can be cast as a facility location problem. The endeavor of this work is to design…
▽ More
Performance and reliability of content access in mobile networks is conditioned by the number and location of content replicas deployed at the network nodes. Location theory has been the traditional, centralized approach to study content replication: computing the number and placement of replicas in a static network can be cast as a facility location problem. The endeavor of this work is to design a practical solution to the above joint optimization problem that is suitable for mobile wireless environments. We thus seek a replication algorithm that is lightweight, distributed, and reactive to network dynamics. We devise a solution that lets nodes (i) share the burden of storing and providing content, so as to achieve load balancing, and (ii) autonomously decide whether to replicate or drop the information, so as to adapt the content availability to dynamic demands and time-varying network topologies. We evaluate our mechanism through simulation, by exploring a wide range of settings, including different node mobility models, content characteristics and system scales. Furthermore, we compare our mechanism to state-of-the-art approaches to content delivery in static and mobile networks. Results show that our mechanism, which uses local measurements only, is: (i) extremely precise in approximating an optimal solution to content placement and replication; (ii) robust against network mobility; (iii) flexible in accommodating various content access patterns. Moreover, our scheme outperforms alternative approaches to content dissemination both in terms of content access delay and access congestion.
△ Less
Submitted 15 February, 2011;
originally announced February 2011.
-
DAME: A Web Oriented Infrastructure for Scientific Data Mining & Exploration
Authors:
Massimo Brescia,
Giuseppe Longo,
George S. Djorgovski,
Stefano Cavuoti,
Raffaele D'Abrusco,
Ciro Donalek,
Alessandro Di Guido,
Michelangelo Fiore,
Mauro Garofalo,
Omar Laurino,
Ashish Mahabal,
Francesco Manna,
Alfonso Nocella,
Giovanni d'Angelo,
Maurizio Paolillo
Abstract:
Nowadays, many scientific areas share the same need of being able to deal with massive and distributed datasets and to perform on them complex knowledge extraction tasks. This simple consideration is behind the international efforts to build virtual organizations such as, for instance, the Virtual Observatory (VObs). DAME (DAta Mining & Exploration) is an innovative, general purpose, Web-based, VO…
▽ More
Nowadays, many scientific areas share the same need of being able to deal with massive and distributed datasets and to perform on them complex knowledge extraction tasks. This simple consideration is behind the international efforts to build virtual organizations such as, for instance, the Virtual Observatory (VObs). DAME (DAta Mining & Exploration) is an innovative, general purpose, Web-based, VObs compliant, distributed data mining infrastructure specialized in Massive Data Sets exploration with machine learning methods. Initially fine tuned to deal with astronomical data only, DAME has evolved in a general purpose platform which has found applications also in other domains of human endeavor. We present the products and a short outline of a science case, together with a detailed description of main features available in the beta release of the web application now released.
△ Less
Submitted 7 December, 2010; v1 submitted 23 October, 2010;
originally announced October 2010.
-
Secure Neighbor Position Discovery in VANETs
Authors:
Marco Fiore,
Claudio Casetti,
Carla Fabiana Chiasserini,
Panagiotis Papadimitratos
Abstract:
Many significant functionalities of vehicular ad hoc networks (VANETs) require that nodes have knowledge of the positions of other vehicles, and notably of those within communication range. However, adversarial nodes could provide false position information or disrupt the acquisition of such information. Thus, in VANETs, the discovery of neighbor positions should be performed in a secure manner. I…
▽ More
Many significant functionalities of vehicular ad hoc networks (VANETs) require that nodes have knowledge of the positions of other vehicles, and notably of those within communication range. However, adversarial nodes could provide false position information or disrupt the acquisition of such information. Thus, in VANETs, the discovery of neighbor positions should be performed in a secure manner. In spite of a multitude of security protocols in the literature, there is no secure discovery protocol for neighbors positions. We address this problem in our paper: we design a distributed protocol that relies solely on information exchange among one-hop neighbors, we analyze its security properties in presence of one or multiple (independent or colluding) adversaries, and we evaluate its performance in a VANET environment using realistic mobility traces. We show that our protocol can be highly effective in detecting falsified position information, while maintaining a low rate of false positive detections.
△ Less
Submitted 4 June, 2010;
originally announced June 2010.
-
A Lightweight Distributed Solution to Content Replication in Mobile Networks
Authors:
Chi-Anh La,
Pietro Michiardi,
Claudio Casetti,
Carla-Fabiana Chiasserini,
Marco Fiore
Abstract:
Performance and reliability of content access in mobile networks is conditioned by the number and location of content replicas deployed at the network nodes. Facility location theory has been the traditional, centralized approach to study content replication: computing the number and placement of replicas in a network can be cast as an uncapacitated facility location problem. The endeavour of th…
▽ More
Performance and reliability of content access in mobile networks is conditioned by the number and location of content replicas deployed at the network nodes. Facility location theory has been the traditional, centralized approach to study content replication: computing the number and placement of replicas in a network can be cast as an uncapacitated facility location problem. The endeavour of this work is to design a distributed, lightweight solution to the above joint optimization problem, while taking into account the network dynamics. In particular, we devise a mechanism that lets nodes share the burden of storing and providing content, so as to achieve load balancing, and decide whether to replicate or drop the information so as to adapt to a dynamic content demand and time-varying topology. We evaluate our mechanism through simulation, by exploring a wide range of settings and studying realistic content access mechanisms that go beyond the traditional assumptionmatching demand points to their closest content replica. Results show that our mechanism, which uses local measurements only, is: (i) extremely precise in approximating an optimal solution to content placement and replication; (ii) robust against network mobility; (iii) flexible in accommodating various content access patterns, including variation in time and space of the content demand.
△ Less
Submitted 10 September, 2009;
originally announced September 2009.
-
A Holistic Approach to Information Distribution in Ad Hoc Networks
Authors:
Claudio Casetti,
Carla-Fabiana Chiasserini,
Marco Fiore,
Chi-Anh La,
Pietro Michiardi
Abstract:
We investigate the problem of spreading information contents in a wireless ad hoc network with mechanisms embracing the peer-to-peer paradigm. In our vision, information dissemination should satisfy the following requirements: (i) it conforms to a predefined distribution and (ii) it is evenly and fairly carried by all nodes in their turn. In this paper, we observe the dissemination effects when…
▽ More
We investigate the problem of spreading information contents in a wireless ad hoc network with mechanisms embracing the peer-to-peer paradigm. In our vision, information dissemination should satisfy the following requirements: (i) it conforms to a predefined distribution and (ii) it is evenly and fairly carried by all nodes in their turn. In this paper, we observe the dissemination effects when the information moves across nodes according to two well-known mobility models, namely random walk and random direction. Our approach is fully distributed and comes at a very low cost in terms of protocol overhead; in addition, simulation results show that the proposed solution can achieve the aforementioned goals under different network scenarios, provided that a sufficient number of information replicas are injected into the network. This observation calls for a further step: in the realistic case where the user content demand varies over time, we need a content replication/drop strategy to adapt the number of information replicas to the changes in the information query rate. We therefore devise a distributed, lightweight scheme that performs efficiently in a variety of scenarios.
△ Less
Submitted 13 January, 2009;
originally announced January 2009.