-
Throughput Analysis of IEEE 802.11bn Coordinated Spatial Reuse
Authors:
Francesc Wilhelmi,
Lorenzo Galati-Giordano,
Giovanni Geraci,
Boris Bellalta,
Gianluca Fontanesi,
David Nuñez
Abstract:
Multi-Access Point Coordination (MAPC) is becoming the cornerstone of the IEEE 802.11bn amendment, alias Wi-Fi 8. Among the MAPC features, Coordinated Spatial Reuse (C-SR) stands as one of the most appealing due to its capability to orchestrate simultaneous access point transmissions at a low implementation complexity. In this paper, we contribute to the understanding of C-SR by introducing an ana…
▽ More
Multi-Access Point Coordination (MAPC) is becoming the cornerstone of the IEEE 802.11bn amendment, alias Wi-Fi 8. Among the MAPC features, Coordinated Spatial Reuse (C-SR) stands as one of the most appealing due to its capability to orchestrate simultaneous access point transmissions at a low implementation complexity. In this paper, we contribute to the understanding of C-SR by introducing an analytical model based on Continuous Time Markov Chains (CTMCs) to characterize its throughput and spatial efficiency. Applying the proposed model to several network topologies, we show that C-SR opportunistically enables parallel high-quality transmissions and yields an average throughput gain of up to 59% in comparison to the legacy 802.11 Distributed Coordination Function (DCF) and up to 42% when compared to the 802.11ax Overlap** Basic Service Set Packet Detect (OBSS/PD) mechanism.
△ Less
Submitted 19 October, 2023; v1 submitted 17 September, 2023;
originally announced September 2023.
-
Skin Lesion Diagnosis Using Convolutional Neural Networks
Authors:
Daniel Alonso Villanueva Nunez,
Yongmin Li
Abstract:
Cancerous skin lesions are one of the most common malignancies detected in humans, and if not detected at an early stage, they can lead to death. Therefore, it is crucial to have access to accurate results early on to optimize the chances of survival. Unfortunately, accurate results are typically obtained by highly trained dermatologists, who may not be accessible to many people, particularly in l…
▽ More
Cancerous skin lesions are one of the most common malignancies detected in humans, and if not detected at an early stage, they can lead to death. Therefore, it is crucial to have access to accurate results early on to optimize the chances of survival. Unfortunately, accurate results are typically obtained by highly trained dermatologists, who may not be accessible to many people, particularly in low-income and middle-income countries. Artificial Intelligence (AI) appears to be a potential solution to this problem, as it has proven to provide equal or even better diagnoses than healthcare professionals. This project aims to address the issue by collecting state-of-the-art techniques for image classification from various fields and implementing them. Some of these techniques include mixup, presizing, and test-time augmentation, among others. Three architectures were used for the implementation: DenseNet121, VGG16 with batch normalization, and ResNet50. The models were designed with two main purposes. First, to classify images into seven categories, including melanocytic nevus, melanoma, benign keratosis-like lesions, basal cell carcinoma, actinic keratoses and intraepithelial carcinoma, vascular lesions, and dermatofibroma. Second, to classify images into benign or malignant. The models were trained using a dataset of 8012 images, and their performance was evaluated using 2003 images. It's worth noting that this model is trained end-to-end, directly from the image to the labels, without the need for handcrafted feature extraction.
△ Less
Submitted 18 May, 2023;
originally announced May 2023.
-
Multi-AP Coordinated Spatial Reuse for Wi-Fi 8: Group Creation and Scheduling
Authors:
David Nunez,
Malcom Smith,
Boris Bellalta
Abstract:
Multi-Access Point Coordination (MAPC) will be a key feature in next generation Wi-Fi 8 networks. MAPC aims to improve the overall network performance by allowing Access Points (APs) to share time, frequency and/or spatial resources in a coordinated way, thus alleviating inter-AP contention and enabling new multi-AP channel access strategies. This paper introduces a framework to support periodic M…
▽ More
Multi-Access Point Coordination (MAPC) will be a key feature in next generation Wi-Fi 8 networks. MAPC aims to improve the overall network performance by allowing Access Points (APs) to share time, frequency and/or spatial resources in a coordinated way, thus alleviating inter-AP contention and enabling new multi-AP channel access strategies. This paper introduces a framework to support periodic MAPC transmissions on top of current Wi-Fi operation. We first focus on the problem of creating multi-AP groups that can transmit simultaneously to leverage Spatial Reuse opportunities. Then, once these groups are created, we study different scheduling algorithms to determine which groups will transmit at every MAPC transmission. Two different types of algorithms are tested: per-AP, and per-Group. While per-AP algorithms base their scheduling decision on the buffer state of individual APs, per-Group algorithms do that taking into account the aggregate buffer state of all APs in a group. Obtained results -- targetting worst-case delay -- show that per-AP based algorithms outperform per-Group ones due to their ability to guarantee that the AP with a) more packets, or b) with the oldest waiting packet in the buffer is selected.
△ Less
Submitted 8 May, 2023;
originally announced May 2023.
-
DyREx: Dynamic Query Representation for Extractive Question Answering
Authors:
Urchade Zaratiana,
Niama El Khbir,
Dennis Núñez,
Pierre Holat,
Nadi Tomeh,
Thierry Charnois
Abstract:
Extractive question answering (ExQA) is an essential task for Natural Language Processing. The dominant approach to ExQA is one that represents the input sequence tokens (question and passage) with a pre-trained transformer, then uses two learned query vectors to compute distributions over the start and end answer span positions. These query vectors lack the context of the inputs, which can be a b…
▽ More
Extractive question answering (ExQA) is an essential task for Natural Language Processing. The dominant approach to ExQA is one that represents the input sequence tokens (question and passage) with a pre-trained transformer, then uses two learned query vectors to compute distributions over the start and end answer span positions. These query vectors lack the context of the inputs, which can be a bottleneck for the model performance. To address this problem, we propose \textit{DyREx}, a generalization of the \textit{vanilla} approach where we dynamically compute query vectors given the input, using an attention mechanism through transformer layers. Empirical observations demonstrate that our approach consistently improves the performance over the standard one. The code and accompanying files for running the experiments are available at \url{https://github.com/urchade/DyReX}.
△ Less
Submitted 26 October, 2022;
originally announced October 2022.
-
TXOP sharing with Coordinated Spatial Reuse in Multi-AP Cooperative IEEE 802.11be WLANs
Authors:
David Nunez,
Francesc Wilhelmi,
Stefano Avallone,
Malcolm Smith,
Boris Bellalta
Abstract:
IEEE 802.11be networks (aka Wi-Fi 7) will have to cope with new bandwidth-hungry and low-latency services such as eXtended Reality and multi-party cloud gaming. With this goal in mind, transmit opportunity (TXOP) sharing between coordinated access points (APs) may contribute to alleviating inter-AP contention, hence increasing the overall network throughput. This paper evaluates two coordinated TX…
▽ More
IEEE 802.11be networks (aka Wi-Fi 7) will have to cope with new bandwidth-hungry and low-latency services such as eXtended Reality and multi-party cloud gaming. With this goal in mind, transmit opportunity (TXOP) sharing between coordinated access points (APs) may contribute to alleviating inter-AP contention, hence increasing the overall network throughput. This paper evaluates two coordinated TXOP sharing strategies: coordinated time division multiple access (c-TDMA) and coordinated-TDMA with spatial reuse (c-TDMA/SR). We show that, while c-TDMA alone does not result in any significant improvement in terms of the WLAN throughput, it lays the groundwork to implement coordinated SR (c-SR) techniques. To evaluate the performance of c-TDMA/SR, we propose a fair scheduler able to select the best subset of parallel transmissions in WLAN deployments, as well as the appropriate power levels to be used by APs and stations (STAs), leading to maximum performance. The results obtained for c-TDMA/SR show significant throughput gains compared with c-TDMA, with values higher than 140% in 90% of the considered scenarios.
△ Less
Submitted 21 December, 2021; v1 submitted 1 December, 2021;
originally announced December 2021.
-
NuCypher KMS: Decentralized key management system
Authors:
Michael Egorov,
MacLane Wilkison,
David Nunez
Abstract:
NuCypher KMS is a decentralized Key Management System (KMS) that addresses the limitations of using consensus networks to securely store and manipulate private, encrypted data. It provides encryption and cryptographic access controls, performed by a decentralized network, leveraging proxy re-encryption. Unlike centralized KMS as a service solutions, it doesn't require trusting a service provider.…
▽ More
NuCypher KMS is a decentralized Key Management System (KMS) that addresses the limitations of using consensus networks to securely store and manipulate private, encrypted data. It provides encryption and cryptographic access controls, performed by a decentralized network, leveraging proxy re-encryption. Unlike centralized KMS as a service solutions, it doesn't require trusting a service provider. NuCypher KMS enables sharing of sensitive data for both decentralized and centralized applications, providing security infrastructure for applications from healthcare to identity management to decentralized content marketplaces. NuCypher KMS will be an essential part of decentralized applications, just as SSL/TLS is an essential part of every secure web application.
△ Less
Submitted 12 November, 2017; v1 submitted 19 July, 2017;
originally announced July 2017.
-
Prioritized Garbage Collection: Explicit GC Support for Software Caches
Authors:
Diogenes Nunez,
Samuel Z. Guyer,
Emery D. Berger
Abstract:
Programmers routinely trade space for time to increase performance, often in the form of caching or memoization. In managed languages like Java or JavaScript, however, this space-time tradeoff is complex. Using more space translates into higher garbage collection costs, especially at the limit of available memory. Existing runtime systems provide limited support for space-sensitive algorithms, for…
▽ More
Programmers routinely trade space for time to increase performance, often in the form of caching or memoization. In managed languages like Java or JavaScript, however, this space-time tradeoff is complex. Using more space translates into higher garbage collection costs, especially at the limit of available memory. Existing runtime systems provide limited support for space-sensitive algorithms, forcing programmers into difficult and often brittle choices about provisioning.
This paper presents prioritized garbage collection, a cooperative programming language and runtime solution to this problem. Prioritized GC provides an interface similar to soft references, called priority references, which identify objects that the collector can reclaim eagerly if necessary. The key difference is an API for defining the policy that governs when priority references are cleared and in what order. Application code specifies a priority value for each reference and a target memory bound. The collector reclaims references, lowest priority first, until the total memory footprint of the cache fits within the bound. We use this API to implement a space-aware least-recently-used (LRU) cache, called a Sache, that is a drop-in replacement for existing caches, such as Google's Guava library. The garbage collector automatically grows and shrinks the Sache in response to available memory and workload with minimal provisioning information from the programmer. Using a Sache, it is almost impossible for an application to experience a memory leak, memory pressure, or an out-of-memory crash caused by software caching.
△ Less
Submitted 15 October, 2016;
originally announced October 2016.