IEEE/ACM International Symposium on Quality of Service (IWQoS) 2021
Technical Sessions
Video Streaming
Optimizing Quality of Experience for Long-Range UAS Video Streaming
Russell Shirey (Purdue University & US Air Force, USA); Sanjay Rao and Shreyas Sundaram (Purdue University, USA)
QoS-Aware Network Energy Optimization for Danmu Video Streaming in WiFi Networks
Nan Jiang and Mehmet Can Vuran (University of Nebraska-Lincoln, USA); Sheng Wei (Rutgers University, USA); Lisong Xu (University of Nebraska-Lincoln, USA)
Understanding and Improving User Engagement in Adaptive Video Streaming
Chunyu Qiao and Jiliang Wang (Tsinghua University, China); Yanan Wang (IQIYI Science & Technology Co., Ltd., China); Yunhao Liu (Tsinghua University & The Hong Kong University of Science and Technology, China); Hu Tuo (IQIYI Science & Technology Co., Ltd., China)
Soudain: Online Adaptive Profile Configuration for Real-time Video Analytics
Kun Wu and Yibo Jin (Nanjing University, China); Weiwei Miao (Communication Bureau, State Grid Jiangsu Electric Power Company, China); Zeng Zeng (State Grid Jiangsu Electric Power CO., LTD., China); Zhuzhong Qian, Jingmian Wang, Mingxian Zhou and Tuo Cao (Nanjing University, China)
Session Chair
Vijay Gopalakrishnan, AT&T Labs -Research, USA
Transport & Security
ASAP: Anti-Spoofing Aphorism using Path-analysis
Eric Muhati and Danda B. Rawat (Howard University, USA)
Lightning: A Practical Building Block for RDMA Transport Control
Qingkai Meng and Fengyuan Ren (Tsinghua University, China)
In this paper, we propose Lightning, a switch building block to enhance RoCE's simple loss recovery. Lightning enhances the switches to send loss notifications directly to the sources with high priority, thus informing sources as quickly as possible. Then, sources can retransmit packets sooner. By addressing challenges such as that shared buffer status is not available at ingress in modern switches, Lightning generates loss notification only when the expected packet is dropped and filters other unexpected packets at ingress, so as to avoid timeouts and prevent unnecessary congestion from unexpected packets. We implement Lightning on commodity programmable switches. In our evaluation, Lightning achieves up to 16.08\(\times\) reduction of 99.9th percentile flow completion time compared to PFC, IRN and other alternatives.
Helm: Credit-based Data Center Congestion Control to Achieve Near Global-Optimal SRTF
Jiao Zhang and Jiaming Shi (Beijing University of Posts and Telecommunications, China); Yuxuan Gao (BUPT, China); Yunjie Liu (Beijing University of Posts and Telecommunications, China)
MASK: Practical Source and Path Verification based on Multi-AS-Key
Songtao Fu, Ke Xu and Qi Li (Tsinghua University, China); Xiaoliang Wang (Capital Normal University, China); Su Yao, Yangfei Guo and Xinle Du (Tsinghua University, China)
Session Chair
Danda Rawat, Howard University, USA
Federated Learning
FedEraser: Enabling Efficient Client-Level Data Removal from Federated Learning Models
Gaoyang Liu and Xiaoqiang Ma (Huazhong University of Science and Technology, China); Yang Yang (Hubei University, China); Chen Wang (Huazhong University of Science and Technology, China); Jiangchuan Liu (Simon Fraser University, Canada)
BatFL: Backdoor Detection on Federated Learning in e-Health
Binhan Xi, Shaofeng Li, Jiachun Li and Hui Liu (Shanghai Jiao Tong University, China); Hong Liu (East China Normal University, China); Haojin Zhu (Shanghai Jiao Tong University, China)
Optimizing Federated Learning on Device Heterogeneity with A Sampling Strategy
Xiaohui Xu, Sijing Duan, Jinrui Zhang, Yunzhen Luo and Deyu Zhang (Central South University, China)
Glint: Decentralized Federated Graph Learning with Traffic Throttling and Flow Scheduling
Tao Liu and Peng Li (The University of Aizu, Japan); Yu Gu (Hefei University of Technology, China)
Session Chair
Baochun Li, University of Toronto, Canada
NFV
Gost: Enabling Efficient Spatio-Temporal GPU Sharing for Network Function Virtualization
Andong Zhu and Deze Zeng (China University of Geosciences, China); Lin Gu (Huazhong University of Science and Technology, China); Peng Li (The University of Aizu, Japan); Quan Chen (Shanghai Jiao Tong University, China)
A-DDPG: Attention Mechanism-based Deep Reinforcement Learning for NFV
Nan He, Song Yang and Fan Li (Beijing Institute of Technology, China); Stojan Trajanovski (Microsoft, United Kingdom (Great Britain)); Fernando A. Kuipers (Delft University of Technology, The Netherlands); Xiaoming Fu (University of Goettingen, Germany)
Towards Chain-Aware Scaling Detection in NFV with Reinforcement Learning
Lin He, Lishan Li and Ying Liu (Tsinghua University, China)
In this paper, we propose a chain-aware scaling detection mechanism, namely CASD, which learns policies directly from experience using reinforcement learning (RL) techniques. Furthermore, CASD incorporates chain information into control policies to efficiently plan the scaling sequence of VNFs within a service function chain. This paper makes the following two key technical contributions. Firstly, we develop chain-aware representations, which embed global chains of arbitrary sizes and shapes into a set of embedding vectors based on graph embedding techniques. Secondly, we design an RL-based neural network model to make scaling decisions based on chain-aware representations. We implement a prototype of CASD, and its evaluation results demonstrate that CASD reduces the overall system cost and improves system performance over other baseline algorithms across different workloads and chains.
LightNF: Simplifying Network Function Offloading in Programmable Networks
Xiang Chen (Peking University, Pengcheng Lab, and Fuzhou University, China); Qun Huang (Peking University, China); Wang Peiqiao (Fuzhou University, China); Zili Meng (Tsinghua University, China); Hongyan Liu (Zhejiang University, China); Yuxin Chen (University of Science and Technology of China, China); Dong Zhang (Fuzhou University, China); Haifeng Zhou (Zhejiang University, China); Boyang Zhou (Zhejiang Lab, China); Chunming Wu (College of Computer Science, Zhejiang University, China)
Session Chair
Zehua Guo, Beijing Institute of Technology, China
Blockchain & Security
Secure and Scalable QoS for Critical Applications
Marc Wyss, Giacomo Giuliari and Markus Legner (ETH Zürich, Switzerland); Adrian Perrig (ETH Zurich Switzerland & Carnegie Mellon University, USA)
To address this rising demand for strong quality-of-service (QoS) guarantees, we develop the GMA-based light-weight communication protocol (GLWP), building on a recent theoretical result, the GMA algorithm. GLWP is a capability-based protocol which is able to bootstrap network-wide bandwidth allocations in single round-trip times, and achieves high availability even under active attacks. Due to its clever use of cryptographic mechanisms, GLWP introduces minimal state in the network and causes low computation and communication overhead. We implement a GLWP prototype using Intel DPDK and show that it achieves line rate on a 40 Gbps link running on commodity hardware, thus showing that GLWP is a viable solution to provide strong QoS guarantees for critical-yet-frugal communications.
A Novel Proof-of-Reputation Consensus for Storage Allocation in Edge Blockchain Systems
Jiarui Zhang, Yaodong Huang, Fan Ye and Yuanyuan Yang (Stony Brook University, USA)
Accelerating Transactions Relay in Blockchain Networks via Reputation
Mengqian Zhang (Shanghai Jiao Tong University, China); Yukun Cheng (Suzhou University of Science and Technology, China); Xiaotie Deng (Peking University, China); Bo Wang (Nervina Labs Ltd., China); Jan Xie (Cryptape Technology Co., Ltd., China); Yuanyuan Yang and Jiarui Zhang (Stony Brook University, USA)
In this paper, we introduce the concept of reputation and propose a novel relay protocol, RepuLay, to accelerate the transmission of transactions across the network. First of all, we design a reputation mechanism to help each node identify the unreliable and inactive neighbors. In this mechanism, two values are used to define one's reputation. Each node keeps a local list of reputations of all its neighbors. Based on the reputation mechanism, RepuLay adopts probabilistic strategies to process transactions. More specifically, after receiving a transaction, the relay node verifies it with a certain probability, which is deduced from the first value of sender's reputation. Next, the valid and unverified transactions are forwarded to some neighbors. Each neighbor has some probability to be chosen as a receiver and the probability is determined by its second value of reputation. Theoretically, we prove that our design can guarantee the quality of relayed transactions. Further simulation results confirm that RepuLay effectively accelerates the spread of transactions and optimize the usage of nodes' bandwidths.
Protecting Your Offloading Preference: Privacy-aware Online Computation Offloading in Mobile Blockchain
Dawei Wei, Ning Xi, Jianfeng Ma and Jiayi Li (Xidian University, China)
Session Chair
Jinsong Han, Zhejiang University, China
Made with in Toronto · Privacy Policy · IWQoS 2020 · © 2021 Duetone Corp.