-
Conflict-Avoiding Codes of Prime Lengths and Cyclotomic Numbers
Authors:
Liang-Chung Hsia,
Hua-Chieh Li,
Wei-Liang Sun
Abstract:
The problem to construct optimal conflict-avoiding codes of even lengths and the Hamming weight $3$ is completely settled. On the contrary, it is still open for odd lengths. It turns out that the prime lengths are the fundamental cases needed to be constructed. In the article, we study conflict-avoiding codes of prime lengths and give a connection with the so-called cyclotomic numbers. By having s…
▽ More
The problem to construct optimal conflict-avoiding codes of even lengths and the Hamming weight $3$ is completely settled. On the contrary, it is still open for odd lengths. It turns out that the prime lengths are the fundamental cases needed to be constructed. In the article, we study conflict-avoiding codes of prime lengths and give a connection with the so-called cyclotomic numbers. By having some nonzero cyclotomic numbers, a well-known algorithm for constructing optimal conflict-avoiding codes will work for certain prime lengths. As a consequence, we are able to answer the size of optimal conflict-avoiding code for a new class of prime lengths.
△ Less
Submitted 2 February, 2023;
originally announced February 2023.
-
Certain Diagonal Equations and Conflict-Avoiding Codes of Prime Lengths
Authors:
Liang-Chung Hsia,
Hua-Chieh Li,
Wei-Liang Sun
Abstract:
We study the construction of optimal conflict-avoiding codes (CAC) from a number theoretical point of view. The determination of the size of optimal CAC of prime length $p$ and weight 3 is formulated in terms of the solvability of certain twisted Fermat equations of the form $g^2 X^{\ell} + g Y^{\ell} + 1 = 0$ over the finite field $\mathbb{F}_{p}$ for some primitive root $g$ modulo $p.$ We treat…
▽ More
We study the construction of optimal conflict-avoiding codes (CAC) from a number theoretical point of view. The determination of the size of optimal CAC of prime length $p$ and weight 3 is formulated in terms of the solvability of certain twisted Fermat equations of the form $g^2 X^{\ell} + g Y^{\ell} + 1 = 0$ over the finite field $\mathbb{F}_{p}$ for some primitive root $g$ modulo $p.$ We treat the problem of solving the twisted Fermat equations in a more general situation by allowing the base field to be any finite extension field $\mathbb{F}_q$ of $\mathbb{F}_{p}.$ We show that for $q$ greater than a lower bound of the order of magnitude $O(\ell^2)$ there exists a generator $g$ of $\mathbb{F}_{q}^{\times}$ such that the equation in question is solvable over $\mathbb{F}_{q}.$ Using our results we are able to contribute new results to the construction of optimal CAC of prime lengths and weight $3.$
△ Less
Submitted 2 February, 2023;
originally announced February 2023.
-
Towards Retina-Quality VR Video Streaming: 15ms Could Save You 80% of Your Bandwidth
Authors:
Luke Hsiao,
Brooke Krajancich,
Philip Levis,
Gordon Wetzstein,
Keith Winstein
Abstract:
Virtual reality systems today cannot yet stream immersive, retina-quality virtual reality video over a network. One of the greatest challenges to this goal is the sheer data rates required to transmit retina-quality video frames at high resolutions and frame rates. Recent work has leveraged the decay of visual acuity in human perception in novel gaze-contingent video compression techniques. In thi…
▽ More
Virtual reality systems today cannot yet stream immersive, retina-quality virtual reality video over a network. One of the greatest challenges to this goal is the sheer data rates required to transmit retina-quality video frames at high resolutions and frame rates. Recent work has leveraged the decay of visual acuity in human perception in novel gaze-contingent video compression techniques. In this paper, we show that reducing the motion-to-photon latency of a system itself is a key method for improving the compression ratio of gaze-contingent compression. Our key finding is that a client and streaming server system with sub-15ms latency can achieve 5x better compression than traditional techniques while also using simpler software algorithms than previous work.
△ Less
Submitted 20 September, 2021; v1 submitted 28 August, 2021;
originally announced August 2021.
-
The Price of Free Illegal Live Streaming Services
Authors:
Luke Hsiao,
Hudson Ayers
Abstract:
As Internet streaming of live content has gained on traditional cable TV viewership, we have also seen significant growth of free live streaming services which illegally provide free access to copyrighted content over the Internet. Some of these services draw millions of viewers each month. Moreover, this viewership has continued to increase, despite the consistent coupling of this free content wi…
▽ More
As Internet streaming of live content has gained on traditional cable TV viewership, we have also seen significant growth of free live streaming services which illegally provide free access to copyrighted content over the Internet. Some of these services draw millions of viewers each month. Moreover, this viewership has continued to increase, despite the consistent coupling of this free content with deceptive advertisements and user-hostile tracking.
In this paper, we explore the ecosystem of free illegal live streaming services by collecting and examining the behavior of a large corpus of illegal sports streaming websites. We explore and quantify evidence of user tracking via third-party HTTP requests, cookies, and fingerprinting techniques on more than $27,303$ unique video streams provided by $467$ unique illegal live streaming domains. We compare the behavior of illegal live streaming services with legitimate services and find that the illegal services go to much greater lengths to track users than most legitimate services, and use more obscure tracking services. Similarly, we find that moderated sites that aggregate links to illegal live streaming content fail to moderate out sites that go to significant lengths to track users. In addition, we perform several case studies which highlight deceptive behavior and modern techniques used by some domains to avoid detection, monetize traffic, or otherwise exploit their viewers.
Overall, we find that despite recent improvements in mechanisms for detecting malicious browser extensions, ad-blocking, and browser warnings, users of free illegal live streaming services are still exposed to deceptive ads, malicious browser extensions, scams, and extensive tracking. We conclude with insights into the ecosystem and recommendations for addressing the challenges highlighted by this study.
△ Less
Submitted 2 January, 2019;
originally announced January 2019.
-
A Scalable Data Science Platform for Healthcare and Precision Medicine Research
Authors:
Jacob McPadden,
Thomas JS Durant,
Dustin R Bunch,
Andreas Coppi,
Nathan Price,
Kris Rodgerson,
Charles J Torre Jr,
William Byron,
H Patrick Young,
Allen L Hsiao,
Harlan M Krumholz,
Wade L Schulz
Abstract:
Objective: To (1) demonstrate the implementation of a data science platform built on open-source technology within a large, academic healthcare system and (2) describe two computational healthcare applications built on such a platform. Materials and Methods: A data science platform based on several open source technologies was deployed to support real-time, big data workloads. Data acquisition wor…
▽ More
Objective: To (1) demonstrate the implementation of a data science platform built on open-source technology within a large, academic healthcare system and (2) describe two computational healthcare applications built on such a platform. Materials and Methods: A data science platform based on several open source technologies was deployed to support real-time, big data workloads. Data acquisition workflows for Apache Storm and NiFi were developed in Java and Python to capture patient monitoring and laboratory data for downstream analytics. Results: The use of emerging data management approaches along with open-source technologies such as Hadoop can be used to create integrated data lakes to store large, real-time data sets. This infrastructure also provides a robust analytics platform where healthcare and biomedical research data can be analyzed in near real-time for precision medicine and computational healthcare use cases. Discussion: The implementation and use of integrated data science platforms offer organizations the opportunity to combine traditional data sets, including data from the electronic health record, with emerging big data sources, such as continuous patient monitoring and real-time laboratory results. These platforms can enable cost-effective and scalable analytics for the information that will be key to the delivery of precision medicine initiatives. Conclusion: Organizations that can take advantage of the technical advances found in data science platforms will have the opportunity to provide comprehensive access to healthcare data for computational healthcare and precision medicine research.
△ Less
Submitted 14 August, 2018;
originally announced August 2018.
-
Smart Contracts for Machine-to-Machine Communication: Possibilities and Limitations
Authors:
Yuichi Hanada,
Luke Hsiao,
Philip Levis
Abstract:
Blockchain technologies, such as smart contracts, present a unique interface for machine-to-machine communication that provides a secure, append-only record that can be shared without trust and without a central administrator. We study the possibilities and limitations of using smart contracts for machine-to-machine communication by designing, implementing, and evaluating AGasP, an application for…
▽ More
Blockchain technologies, such as smart contracts, present a unique interface for machine-to-machine communication that provides a secure, append-only record that can be shared without trust and without a central administrator. We study the possibilities and limitations of using smart contracts for machine-to-machine communication by designing, implementing, and evaluating AGasP, an application for automated gasoline purchases. We find that using smart contracts allows us to directly address the challenges of transparency, longevity, and trust in IoT applications. However, real-world applications using smart contracts must address their important trade-offs, such as performance, privacy, and the challenge of ensuring they are written correctly.
△ Less
Submitted 7 January, 2019; v1 submitted 1 June, 2018;
originally announced June 2018.
-
Fonduer: Knowledge Base Construction from Richly Formatted Data
Authors:
Sen Wu,
Luke Hsiao,
Xiao Cheng,
Braden Hancock,
Theodoros Rekatsinas,
Philip Levis,
Christopher RĂ©
Abstract:
We focus on knowledge base construction (KBC) from richly formatted data. In contrast to KBC from text or tabular data, KBC from richly formatted data aims to extract relations conveyed jointly via textual, structural, tabular, and visual expressions. We introduce Fonduer, a machine-learning-based KBC system for richly formatted data. Fonduer presents a new data model that accounts for three chall…
▽ More
We focus on knowledge base construction (KBC) from richly formatted data. In contrast to KBC from text or tabular data, KBC from richly formatted data aims to extract relations conveyed jointly via textual, structural, tabular, and visual expressions. We introduce Fonduer, a machine-learning-based KBC system for richly formatted data. Fonduer presents a new data model that accounts for three challenging characteristics of richly formatted data: (1) prevalent document-level relations, (2) multimodality, and (3) data variety. Fonduer uses a new deep-learning model to automatically capture the representation (i.e., features) needed to learn how to extract relations from richly formatted data. Finally, Fonduer provides a new programming model that enables users to convert domain expertise, based on multiple modalities of information, to meaningful signals of supervision for training a KBC system. Fonduer-based KBC systems are in production for a range of use cases, including at a major online retailer. We compare Fonduer against state-of-the-art KBC approaches in four different domains. We show that Fonduer achieves an average improvement of 41 F1 points on the quality of the output knowledge base---and in some cases produces up to 1.87x the number of correct entries---compared to expert-curated public knowledge bases. We also conduct a user study to assess the usability of Fonduer's new programming model. We show that after using Fonduer for only 30 minutes, non-domain experts are able to design KBC systems that achieve on average 23 F1 points higher quality than traditional machine-learning-based KBC approaches.
△ Less
Submitted 1 March, 2018; v1 submitted 15 March, 2017;
originally announced March 2017.
-
TCPTuner: Congestion Control Your Way
Authors:
Kevin Miller,
Luke W. Hsiao
Abstract:
TCPTuner is a TCP (transmission control protocol) congestion control kernel module and GUI (graphical user interface) for Linux that allows real-time modification of the congestion control parameters of TCP CUBIC, the current default algorithm in Linux. Specifically, the tool provides access to alpha, the rate at which a sender's congestion window grows; beta, the multiplicative factor to decrease…
▽ More
TCPTuner is a TCP (transmission control protocol) congestion control kernel module and GUI (graphical user interface) for Linux that allows real-time modification of the congestion control parameters of TCP CUBIC, the current default algorithm in Linux. Specifically, the tool provides access to alpha, the rate at which a sender's congestion window grows; beta, the multiplicative factor to decrease the congestion window on a loss event; as well as CUBIC's fast convergence and tcp friendliness parameters. Additionally, the interface provides access to ip-route parameters for the minimum retransmission time and initial congestion window size. In this paper, we describe the implementation of TCPTuner and show experimental data of the effects of adjusting congestion control parameters.
△ Less
Submitted 6 May, 2016;
originally announced May 2016.