• ### Aggressive Congestion Control Mechanism for Space Systems(1701.00234)

Jan. 23, 2019 cs.NI
How to implement an impeccable space system-of-systems (SoS) internetworking architecture has been a significant issue in system engineering for years. Reliable data transmission is considered one of the most important technologies of space SoS internetworking systems. Due to the high bit error rate (BER), long time delay and asymmetrical channel in the space communication environment, the congestion control mechanism of classic transport control protocols (TCP) shows unsatisfying performances. With the help of existing TCP modifications, this paper contributes an aggressive congestion control mechanism. The proposed mechanism is characterized with a fast start procedure, as well as the feedback information to analyze network traffic and with a link terminating processing mechanism, which can help to reveal the real reason of packet loss, and maintain the size of congestion window at a high level. Simulation results are shown in the end to verify the proposed scheme.
• ### Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction(1701.00237)

Jan. 23, 2019 cs.NI, cs.GT
Device-to-Device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this paper, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.
• ### Complex Network Theoretical Analysis on Information Dissemination over Vehicular Networks(1701.00240)

Jan. 23, 2019 cs.IT, math.IT, cs.NI
How to enhance the communication efficiency and quality on vehicular networks is one critical important issue. While with the larger and larger scale of vehicular networks in dense cities, the real-world datasets show that the vehicular networks essentially belong to the complex network model. Meanwhile, the extensive research on complex networks has shown that the complex network theory can both provide an accurate network illustration model and further make great contributions to the network design, optimization and management. In this paper, we start with analyzing characteristics of a taxi GPS dataset and then establishing the vehicular-to-infrastructure, vehicle-to-vehicle and the hybrid communication model, respectively. Moreover, we propose a clustering algorithm for station selection, a traffic allocation optimization model and an information source selection model based on the communication performances and complex network theory.
• ### Access Strategy in Super WiFi Network Powered by Solar Energy Harvesting: A POMDP Method(1701.00241)

Jan. 23, 2019 cs.IT, math.IT
The recently announced Super Wi-Fi Network proposal in United States is aiming to enable Internet access in a nation-wide area. As traditional cable-connected power supply system becomes impractical or costly for a wide range wireless network, new infrastructure deployment for Super Wi-Fi is required. The fast developing Energy Harvesting (EH) techniques receive global attentions for their potential of solving the above power supply problem. It is a critical issue, from the user's perspective, how to make efficient network selection and access strategies. Unlike traditional wireless networks, the battery charge state and tendency in EH based networks have to be taken into account when making network selection and access, which has not been well investigated. In this paper, we propose a practical and efficient framework for multiple base stations access strategy in an EH powered Super Wi-Fi network. We consider the access strategy from the user's perspective, who exploits downlink transmission opportunities from one base station. To formulate the problem, we used Partially Observable Markov Decision Process (POMDP) to model users' observations on the base stations' battery situation and decisions on the base station selection and access. Simulation results show that our methods are efficacious and significantly outperform the traditional widely used CSMA method.
• ### Distributed Transactions: Dissecting the Nightmare(1803.06341)

March 16, 2018 cs.DC
Many distributed storage systems are transactional and a lot of work has been devoted to optimizing their performance, especially the performance of read-only transactions that are considered the most frequent in practice. Yet, the results obtained so far are rather disappointing, and some of the design decisions seem contrived. This paper contributes to explaining this state of affairs by proving intrinsic limitations of transactional storage systems, even those that need not ensure strong consistency but only causality. We first consider general storage systems where some transactions are read-only and some also involve write operations. We show that even read-only transactions cannot be "fast": their operations cannot be executed within one round-trip message exchange between a client seeking an object and the server storing it. We then consider systems (as sometimes implemented today) where all transactions are read-only, i.e., updates are performed as individual operations outside transactions. In this case, read-only transactions can indeed be "fast", but we prove that they need to be "visible". They induce inherent updates on the servers, which in turn impact their overall performance.
• ### Causal Consistency and Latency Optimality: Friend or Foe?(1803.04237)

March 12, 2018 cs.DC, cs.DB
• ### High visibility temporal ghost imaging with classical light(1707.09088)

July 28, 2017 quant-ph, physics.optics
High visibility temporal ghost imaging with classical light is possible when superbunching pseudothermal light is employed. In the numerical simulation, the visibility of temporal ghost imaging with pseudothermal light equaling ($4.7\pm 0.2$)\% can be increased to ($75\pm 8$)\% in the same scheme with superbunching pseudothermal light. The reasons for the difference in visibility and quality of the retrieved images in different situations are discussed in detail. It is concluded that high visibility and high quality temporal ghost image can be obtained by collecting large enough number of data points. The results are helpful to understand the difference between ghost imaging with classical light and entangled photon pairs. The superbunching pseudothermal light can be employed to improve the image quality in ghost imaging applications.
• ### Second-order temporal interference of two independent light beams at an asymmetrical beam splitter(1608.07941)

Aug. 29, 2016 quant-ph
The second-order temporal interference of classical and nonclassical light at an asymmetrical beam splitter is discussed based on two-photon interference in Feynman's path integral theory. The visibility of the second-order interference pattern is determined by the properties of the superposed light beams, the ratio between the intensities of these two light beams, and the reflectivity of the asymmetrical beam splitter. Some requirements about the asymmetrical beam splitter have to be satisfied in order to ensure that the visibility of the second-order interference pattern of nonclassical light beams exceeds classical limit. The visibility of the second-order interference pattern of photons emitted by two independent single-photon sources is independent of the ratio between the intensities. These conclusions are important for the researches and applications in quantum optics and quantum information when asymmetrical beam splitter is employed.
• ### Complexes Detection in Biological Networks via Diversified Dense Subgraphs Mining(1604.03244)

April 12, 2016 cs.DS, q-bio.MN
Protein-protein interaction (PPI) networks, providing a comprehensive landscape of protein interacting patterns, enable us to explore biological processes and cellular components at multiple resolutions. For a biological process, a number of proteins need to work together to perform the job. Proteins densely interact with each other, forming large molecular machines or cellular building blocks. Identification of such densely interconnected clusters or protein complexes from PPI networks enables us to obtain a better understanding of the hierarchy and organization of biological processes and cellular components. Most existing methods apply efficient graph clustering algorithms on PPI networks, often failing to detect possible densely connected subgraphs and overlapped subgraphs. Besides clustering-based methods, dense subgraph enumeration methods have also been used, which aim to find all densely connected protein sets. However, such methods are not practically tractable even on a small yeast PPI network, due to high computational complexity. In this paper, we introduce a novel approximate algorithm to efficiently enumerate putative protein complexes from biological networks. The key insight of our algorithm is that we do not need to enumerate all dense subgraphs. Instead we only need to find a small subset of subgraphs that cover as many proteins as possible. The problem is formulated as finding a diverse set of dense subgraphs, where we develop highly effective pruning techniques to guarantee efficiency. To handle large networks, we take a divide-and-conquer approach to speed up the algorithm in a distributed manner. By comparing with existing clustering and dense subgraph-based algorithms on several human and yeast PPI networks, we demonstrate that our method can detect more putative protein complexes and achieves better prediction accuracy.
• ### Constructing a Non-Negative Low Rank and Sparse Graph with Data-Adaptive Features(1409.0964)

Sept. 3, 2014 cs.CV, cs.LG
This paper aims at constructing a good graph for discovering intrinsic data structures in a semi-supervised learning setting. Firstly, we propose to build a non-negative low-rank and sparse (referred to as NNLRS) graph for the given data representation. Specifically, the weights of edges in the graph are obtained by seeking a nonnegative low-rank and sparse matrix that represents each data sample as a linear combination of others. The so-obtained NNLRS-graph can capture both the global mixture of subspaces structure (by the low rankness) and the locally linear structure (by the sparseness) of the data, hence is both generative and discriminative. Secondly, as good features are extremely important for constructing a good graph, we propose to learn the data embedding matrix and construct the graph jointly within one framework, which is termed as NNLRS with embedded features (referred to as NNLRS-EF). Extensive experiments on three publicly available datasets demonstrate that the proposed method outperforms the state-of-the-art graph construction method by a large margin for both semi-supervised classification and discriminative analysis, which verifies the effectiveness of our proposed method.
• ### Efficient K-Nearest Neighbor Join Algorithms for High Dimensional Sparse Data(1011.2807)

Nov. 12, 2010 cs.DB, cs.DS
The K-Nearest Neighbor (KNN) join is an expensive but important operation in many data mining algorithms. Several recent applications need to perform KNN join for high dimensional sparse data. Unfortunately, all existing KNN join algorithms are designed for low dimensional data. To fulfill this void, we investigate the KNN join problem for high dimensional sparse data. In this paper, we propose three KNN join algorithms: a brute force (BF) algorithm, an inverted index-based(IIB) algorithm and an improved inverted index-based(IIIB) algorithm. Extensive experiments on both synthetic and real-world datasets were conducted to demonstrate the effectiveness of our algorithms for high dimensional sparse data.