171 research outputs found

    Service Abstractions for Scalable Deep Learning Inference at the Edge

    Get PDF
    Deep learning driven intelligent edge has already become a reality, where millions of mobile, wearable, and IoT devices analyze real-time data and transform those into actionable insights on-device. Typical approaches for optimizing deep learning inference mostly focus on accelerating the execution of individual inference tasks, without considering the contextual correlation unique to edge environments and the statistical nature of learning-based computation. Specifically, they treat inference workloads as individual black boxes and apply canonical system optimization techniques, developed over the last few decades, to handle them as yet another type of computation-intensive applications. As a result, deep learning inference on edge devices still face the ever increasing challenges of customization to edge device heterogeneity, fuzzy computation redundancy between inference tasks, and end-to-end deployment at scale. In this thesis, we propose the first framework that automates and scales the end-to-end process of deploying efficient deep learning inference from the cloud to heterogeneous edge devices. The framework consists of a series of service abstractions that handle DNN model tailoring, model indexing and query, and computation reuse for runtime inference respectively. Together, these services bridge the gap between deep learning training and inference, eliminate computation redundancy during inference execution, and further lower the barrier for deep learning algorithm and system co-optimization. To build efficient and scalable services, we take a unique algorithmic approach of harnessing the semantic correlation between the learning-based computation. Rather than viewing individual tasks as isolated black boxes, we optimize them collectively in a white box approach, proposing primitives to formulate the semantics of the deep learning workloads, algorithms to assess their hidden correlation (in terms of the input data, the neural network models, and the deployment trials) and merge common processing steps to minimize redundancy

    SeHCAT [tauroselcholic (selenium-75) acid] for the investigation of bile acid malabsorption and measurement of bile acid pool loss

    Get PDF
    Background The principal diagnosis/indication for this assessment is chronic diarrhoea due to bile acid malabsorption (BAM). Diarrhoea can be defined as the abnormal passage of loose or liquid stools more than three times daily and/or a daily stool weight > 200 g per day and is considered to be chronic if it persists for more than 4 weeks. The cause of chronic diarrhoea in adults is often difficult to ascertain and patients may undergo several investigations without a definitive cause being identified. BAM is one of several causes of chronic diarrhoea and results from failure to absorb bile acids (which are required for the absorption of dietary fats and sterols in the intestine) in the distal ileum. Objective For people with chronic diarrhoea with unknown cause and in people with Crohn's disease and chronic diarrhoea with unknown cause (i.e. before resection): (1) What are the effects of selenium-75-homocholic acid taurine (SeHCAT) compared with no SeHCAT in terms of chronic diarrhoea, other health outcomes and costs? (2) What are the effects of bile acid sequestrants (BASs) compared with no BASs in people with a positive or negative SeHCAT test? (3) Does a positive or negative SeHCAT test predict improvement in terms of chronic diarrhoea, other health outcomes and costs? Data sources A systematic review was conducted to summarise the evidence on the clinical effectiveness of SeHCAT for the assessment of BAM and the measurement of bile acid pool loss. Search strategies were based on target condition and intervention, as recommended in the Centre for Reviews and Dissemination (CRD) guidance for undertaking reviews in health care and the Cochrane Handbook for Diagnostic Test Accuracy Reviews. The following databases were searched up to April 2012: MEDLINE; MEDLINE In-Process & Other Non-Indexed Citations; EMBASE; the Cochrane Databases; Database of Abstracts of Reviews of Effects; Health Technology Assessment (HTA) Database; and Science Citation Index. Research registers and conference proceedings were also searched. Review methods Systematic review methods followed the principle

    Network Traffic Measurements, Applications to Internet Services and Security

    Get PDF
    The Internet has become along the years a pervasive network interconnecting billions of users and is now playing the role of collector for a multitude of tasks, ranging from professional activities to personal interactions. From a technical standpoint, novel architectures, e.g., cloud-based services and content delivery networks, innovative devices, e.g., smartphones and connected wearables, and security threats, e.g., DDoS attacks, are posing new challenges in understanding network dynamics. In such complex scenario, network measurements play a central role to guide traffic management, improve network design, and evaluate application requirements. In addition, increasing importance is devoted to the quality of experience provided to final users, which requires thorough investigations on both the transport network and the design of Internet services. In this thesis, we stress the importance of users’ centrality by focusing on the traffic they exchange with the network. To do so, we design methodologies complementing passive and active measurements, as well as post-processing techniques belonging to the machine learning and statistics domains. Traffic exchanged by Internet users can be classified in three macro-groups: (i) Outbound, produced by users’ devices and pushed to the network; (ii) unsolicited, part of malicious attacks threatening users’ security; and (iii) inbound, directed to users’ devices and retrieved from remote servers. For each of the above categories, we address specific research topics consisting in the benchmarking of personal cloud storage services, the automatic identification of Internet threats, and the assessment of quality of experience in the Web domain, respectively. Results comprise several contributions in the scope of each research topic. In short, they shed light on (i) the interplay among design choices of cloud storage services, which severely impact the performance provided to end users; (ii) the feasibility of designing a general purpose classifier to detect malicious attacks, without chasing threat specificities; and (iii) the relevance of appropriate means to evaluate the perceived quality of Web pages delivery, strengthening the need of users’ feedbacks for a factual assessment

    Energy systems in sustainability-profiled districts in Sweden: A literature review and a socio-technical ecology approach for future research

    Get PDF
    Over the past 30 years, several sustainability-profiled districts have been developed in Sweden with high ambitions for the energy systems, such as Hammarby Sj\ua8ostad in Stockholm and Western Harbor in Malm\ua8o. Research into energy systems in urban districts is interdisciplinary and therefore spread over different areas, which means that an overview of the current state of knowledge and lessons learned is lacking. This semi-systematic literature review aims to provide an overview of previous research on the planning, development, and evaluation of energy systems in sustainability-profiled districts in Sweden. The review of 70 journal and conference articles reveals seven research themes in the interdisciplinary nexus of energy systems and sustainability-profiled districts: (1) Conceptualizations and critique of sustainability-profiled districts, (2) Evaluations of energy goals and requirements, (3) Technical and economic assessments of heating and electricity systems, (4) Integration of innovative (energy) solutions in urban planning, (5) Stakeholder perspectives on energy systems, (6) Stakeholder collaboration on the building and the district level, (7) Governance and policy instruments for sustainable urban development and energy systems. We use a socio-technical ecology approach to critically discuss the existing research on energy systems planning, development, and evaluation to guide future research on energy systems development in urban districts. An increase in integrated approaches across all identified research themes and relationships between scales, phases, and impacts are discussed as central observations that can guide future research. Future research is needed on new or better-adapted energy indicators, the inclusion, perspectives, and roles of (new) stakeholders, and the consideration of ecology and nature in research on the planning, development, and evaluation of energy systems

    Security and Privacy Preservation in Mobile Crowdsensing

    Get PDF
    Mobile crowdsensing (MCS) is a compelling paradigm that enables a crowd of individuals to cooperatively collect and share data to measure phenomena or record events of common interest using their mobile devices. Pairing with inherent mobility and intelligence, mobile users can collect, produce and upload large amounts of data to service providers based on crowdsensing tasks released by customers, ranging from general information, such as temperature, air quality and traffic condition, to more specialized data, such as recommended places, health condition and voting intentions. Compared with traditional sensor networks, MCS can support large-scale sensing applications, improve sensing data trustworthiness and reduce the cost on deploying expensive hardware or software to acquire high-quality data. Despite the appealing benefits, however, MCS is also confronted with a variety of security and privacy threats, which would impede its rapid development. Due to their own incentives and vulnerabilities of service providers, data security and user privacy are being put at risk. The corruption of sensing reports may directly affect crowdsensing results, and thereby mislead customers to make irrational decisions. Moreover, the content of crowdsensing tasks may expose the intention of customers, and the sensing reports might inadvertently reveal sensitive information about mobile users. Data encryption and anonymization techniques can provide straightforward solutions for data security and user privacy, but there are several issues, which are of significantly importance to make MCS practical. First of all, to enhance data trustworthiness, service providers need to recruit mobile users based on their personal information, such as preferences, mobility pattern and reputation, resulting in the privacy exposure to service providers. Secondly, it is inevitable to have replicate data in crowdsensing reports, which may possess large communication bandwidth, but traditional data encryption makes replicate data detection and deletion challenging. Thirdly, crowdsensed data analysis is essential to generate crowdsensing reports in MCS, but the correctness of crowdsensing results in the absence of malicious mobile users and service providers become a huge concern for customers. Finally yet importantly, even if user privacy is preserved during task allocation and data collection, it may still be exposed during reward distribution. It further discourage mobile users from task participation. In this thesis, we explore the approaches to resolve these challenges in MCS. Based on the architecture of MCS, we conduct our research with the focus on security and privacy protection without sacrificing data quality and users' enthusiasm. Specifically, the main contributions are, i) to enable privacy preservation and task allocation, we propose SPOON, a strong privacy-preserving mobile crowdsensing scheme supporting accurate task allocation. In SPOON, the service provider recruits mobile users based on their locations, and selects proper sensing reports according to their trust levels without invading user privacy. By utilizing the blind signature, sensing tasks are protected and reports are anonymized. In addition, a privacy-preserving credit management mechanism is introduced to achieve decentralized trust management and secure credit proof for mobile users; ii) to improve communication efficiency while guaranteeing data confidentiality, we propose a fog-assisted secure data deduplication scheme, in which a BLS-oblivious pseudo-random function is developed to enable fog nodes to detect and delete replicate data in sensing reports without exposing the content of reports. Considering the privacy leakages of mobile users who report the same data, the blind signature is utilized to hide users' identities, and chameleon hash function is leveraged to achieve contribution claim and reward retrieval for anonymous greedy mobile users; iii) to achieve data statistics with privacy preservation, we propose a privacy-preserving data statistics scheme to achieve end-to-end security and integrity protection, while enabling the aggregation of the collected data from multiple sources. The correctness verification is supported to prevent the corruption of the aggregate results during data transmission based on the homomorphic authenticator and the proxy re-signature. A privacy-preserving verifiable linear statistics mechanism is developed to realize the linear aggregation of multiple crowdsensed data from a same device and the verification on the correctness of aggregate results; and iv) to encourage mobile users to participating in sensing tasks, we propose a dual-anonymous reward distribution scheme to offer the incentive for mobile users and privacy protection for both customers and mobile users in MCS. Based on the dividable cash, a new reward sharing incentive mechanism is developed to encourage mobile users to participating in sensing tasks, and the randomization technique is leveraged to protect the identities of customers and mobile users during reward claim, distribution and deposit

    ICedge: When Edge Computing Meets Information-Centric Networking

    Get PDF
    In today’s era of explosion of Internet of Things (IoT) and end-user devices and their data volume, emanating at the network’s edge, the network should be more in-tune with meeting the needs of these demanding edge computing applications. To this end, we design and prototype Information-Centric edge (ICedge), a general-purpose networking framework that streamlines service invocation and improves reuse of redundant computation at the edge. ICedge runs on top of Named-Data Networking, a realization of the Information-Centric Networking vision, and handles the “low-level” network communication on behalf of applications. ICedge features a fully distributed design that: (i) enables users to get seamlessly on-boarded onto an edge network, (ii) delivers application invoked tasks to edge nodes for execution in a timely manner, and (iii) offers naming abstractions and network-based mechanisms to enable (partial or full) reuse of the results of already executed tasks among users, which we call “compute reuse”, resulting in lower task completion times and efficient use of edge computing resources. Our simulation and testbed deployment results demonstrate that ICedge can achieve up to 50× lower task completion times leveraging its networkbased compute reuse mechanism compared to cases, where reuse is not available

    The Adoption and Effectiveness of Automation in Health Evidence Synthesis

    Get PDF
    Background: Health systems worldwide are often informed by evidence-based guidelines which in turn rely heavily on systematic reviews. Systematic reviews are currently hindered by the increasing volume of new research and by its variable quality. Automation has potential to alleviate this problem but is not widely used in health evidence synthesis. This thesis sought to address the following: why is automation adopted (or not), and what effects does it have when it is put into use? / Methods: Roger’s Diffusion of Innovations theory, as a well-established and widely used framework, informed the study design and analysis. Adoption barriers and facilitators were explored through a thematic analysis of guideline developers’ opinions towards automation, and by mapping the adoption journey of a machine learning (ML) tool among Cochrane Information Specialists (CISs). A randomised trial of ML assistance in Risk of Bias (RoB) assessments and a cost-effectiveness analysis of a semi-automated workflow in the maintenance of a living evidence map each evaluated the effects of automation in practice. / Results: Adoption decisions are most strongly informed by the professional cultural expectations of health evidence synthesis. The stringent expectations of systematic reviewers and their users must be met before any other characteristic of an automation technology is considered by potential adopters. Ease-of-use increases in importance as a tool becomes more diffused across a population. Results of the randomised trial showed that ML-assisted RoB assessments were non-inferior to assessments completed entirely by human researcher effort. The cost-effectiveness analysis showed that a semi-automated workflow identified more relevant studies than the manual workflow and was less costly. / Conclusions: Automation can have substantial benefits when integrated into health evidence workflows. Wider adoption of automation tools will be facilitated by ensuring they are aligned with professional values of the field and limited in technical complexity

    Cloud technology options towards Free Flow of Data

    Get PDF
    This whitepaper collects the technology solutions that the projects in the Data Protection, Security and Privacy Cluster propose to address the challenges raised by the working areas of the Free Flow of Data initiative. The document describes the technologies, methodologies, models, and tools researched and developed by the clustered projects mapped to the ten areas of work of the Free Flow of Data initiative. The aim is to facilitate the identification of the state-of-the-art of technology options towards solving the data security and privacy challenges posed by the Free Flow of Data initiative in Europe. The document gives reference to the Cluster, the individual projects and the technologies produced by them
    • …
    corecore