450 research outputs found
Utility Maximization for Uplink MU-MIMO: Combining Spectral-Energy Efficiency and Fairness
Driven by green communications, energy efficiency (EE) has become a new
important criterion for designing wireless communication systems. However, high
EE often leads to low spectral efficiency (SE), which spurs the research on
EE-SE tradeoff. In this paper, we focus on how to maximize the utility in
physical layer for an uplink multi-user multiple-input multipleoutput (MU-MIMO)
system, where we will not only consider EE-SE tradeoff in a unified way, but
also ensure user fairness. We first formulate the utility maximization problem,
but it turns out to be non-convex. By exploiting the structure of this problem,
we find a convexization procedure to convert the original nonconvex problem
into an equivalent convex problem, which has the same global optimum with the
original problem. Following the convexization procedure, we present a
centralized algorithm to solve the utility maximization problem, but it
requires the global information of all users. Thus we propose a primal-dual
distributed algorithm which does not need global information and just consumes
a small amount of overhead. Furthermore, we have proved that the distributed
algorithm can converge to the global optimum. Finally, the numerical results
show that our approach can both capture user diversity for EE-SE tradeoff and
ensure user fairness, and they also validate the effectiveness of our
primal-dual distributed algorithm
Harnessing the Power of Many: Extensible Toolkit for Scalable Ensemble Applications
Many scientific problems require multiple distinct computational tasks to be
executed in order to achieve a desired solution. We introduce the Ensemble
Toolkit (EnTK) to address the challenges of scale, diversity and reliability
they pose. We describe the design and implementation of EnTK, characterize its
performance and integrate it with two distinct exemplar use cases: seismic
inversion and adaptive analog ensembles. We perform nine experiments,
characterizing EnTK overheads, strong and weak scalability, and the performance
of two use case implementations, at scale and on production infrastructures. We
show how EnTK meets the following general requirements: (i) implementing
dedicated abstractions to support the description and execution of ensemble
applications; (ii) support for execution on heterogeneous computing
infrastructures; (iii) efficient scalability up to O(10^4) tasks; and (iv)
fault tolerance. We discuss novel computational capabilities that EnTK enables
and the scientific advantages arising thereof. We propose EnTK as an important
addition to the suite of tools in support of production scientific computing
Efficient Non-Learning Similar Subtrajectory Search
Similar subtrajectory search is a finer-grained operator that can better
capture the similarities between one query trajectory and a portion of a data
trajectory than the traditional similar trajectory search, which requires the
two checked trajectories are similar to each other in whole. Many real
applications (e.g., trajectory clustering and trajectory join) utilize similar
subtrajectory search as a basic operator. It is considered that the time
complexity is O(mn^2) for exact algorithms to solve the similar subtrajectory
search problem under most trajectory distance functions in the existing
studies, where m is the length of the query trajectory and n is the length of
the data trajectory. In this paper, to the best of our knowledge, we are the
first to propose an exact algorithm to solve the similar subtrajectory search
problem in O(mn) time for most of widely used trajectory distance functions
(e.g., WED, DTW, ERP, EDR and Frechet distance). Through extensive experiments
on three real datasets, we demonstrate the efficiency and effectiveness of our
proposed algorithms.Comment: VLDB 202
Online Ridesharing with Meeting Points [Technical Report]
Nowadays, ridesharing becomes a popular commuting mode. Dynamically arriving
riders post their origins and destinations, then the platform assigns drivers
to serve them. In ridesharing, different groups of riders can be served by one
driver if their trips can share common routes. Recently, many ridesharing
companies (e.g., Didi and Uber) further propose a new mode, namely "ridesharing
with meeting points". Specifically, with a short walking distance but less
payment, riders can be picked up and dropped off around their origins and
destinations, respectively. In addition, meeting points enables more flexible
routing for drivers, which can potentially improve the global profit of the
system. In this paper, we first formally define the Meeting-Point-based Online
Ridesharing Problem (MORP). We prove that MORP is NP-hard and there is no
polynomial-time deterministic algorithm with a constant competitive ratio for
it. We notice that a structure of vertex set, -skip cover, fits well to the
MORP. -skip cover tends to find the vertices (meeting points) that are
convenient for riders and drivers to come and go. With meeting points, MORP
tends to serve more riders with these convenient vertices. Based on the idea,
we introduce a convenience-based meeting point candidates selection algorithm.
We further propose a hierarchical meeting-point oriented graph (HMPO graph),
which ranks vertices for assignment effectiveness and constructs -skip cover
to accelerate the whole assignment process. Finally, we utilize the merits of
-skip cover points for ridesharing and propose a novel algorithm, namely
SMDB, to solve MORP. Extensive experiments on real and synthetic datasets
validate the effectiveness and efficiency of our algorithms.Comment: 18 page
Quantum Searchable Encryption for Cloud Data Based on Full-Blind Quantum Computation
Searchable encryption (SE) is a positive way to protect users sensitive data
in cloud computing setting, while preserving search ability on the server side,
i.e., it allows the server to search encrypted data without leaking information
about the plaintext data. In this paper, a multi-client universal circuit-based
full-blind quantum computation (FBQC) model is proposed. In order to meet the
requirements of multi-client accessing or computing encrypted cloud data, all
clients with limited quantum ability outsource the key generation to a trusted
key center and upload their encrypted data to the data center. Considering the
feasibility of physical implementation, all quantum gates in the circuit are
replaced with the combination of {\pi}/8 rotation operator set {Rz({\pi}/4),
Ry({\pi}/4), CRz({\pi}/4), CRy({\pi}/4), CCRz({\pi}/4), CCRy({\pi}/4)}. In
addition, the data center is only allowed to perform one {\pi}/8 rotation
operator each time, but does not know the structure of the circuit (i.e.,
quantum computation), so it can guarantee the blindness of computation. Then,
through combining this multi-client FBQC model and Grover searching algorithm,
we continue to propose a quantum searchable encryption scheme for cloud data.
It solves the problem of multi-client access mode under searchable encryption
in the cloud environment, and has the ability to resist against some quantum
attacks. To better demonstrate our scheme, an example of our scheme to search
on encrypted 2-qubit state is given in detail. Furthermore, the security of our
scheme is analysed from two aspects: external attacks and internal attacks, and
the result indicates that it can resist against such kinds of attacks and also
guarantee the blindness of data and computation.Comment: 20 pages, 13 figure
- …