scispace - formally typeset
Search or ask a question

Showing papers presented at "Conference on Computer Communications Workshops in 2014"


Proceedings ArticleDOI
08 Jul 2014
TL;DR: This work proposes a new model that is able to capture the complex interdependency relations between entities of the power grid and the communication networks involving a combination of conjunctive and disjunctive relations and provides techniques to identify the K most “vulnerable” nodes of an interdependent network.

83 citations


Proceedings ArticleDOI
01 Apr 2014
TL;DR: Numerical results show that the proposed reinforcement learning algorithm can effectively work without a priori information of the system dynamics, and propose an approximate state definition and adopt virtual experience.
Abstract: In the smart grid system, dynamic pricing can be an efficient tool for the service provider which enables efficient and automated management of the grid. However, in practice, the lack of information about the customers’ time-varying load demand and energy consumption patterns and the volatility of electricity price in the wholesale market make the implementation of dynamic pricing highly challenging. In this paper, we study a dynamic pricing problem in the smart grid system where the service provider decides the electricity price in the retail market. In order to overcome the challenges in implementing dynamic pricing, we develop a reinforcement learning algorithm. To resolve the drawbacks of the conventional reinforcement learning algorithm such as high computational complexity and low convergence speed, we propose an approximate state definition and adopt virtual experience. Numerical results show that the proposed reinforcement learning algorithm can effectively work without a priori information of the system dynamics.

33 citations


Proceedings ArticleDOI
08 Jul 2014
TL;DR: Preliminary experimental results of inter-vehicular live video streaming for surveillance applications and a test-bed for the demonstration of the achievable visual quality under different channel conditions are presented.
Abstract: Prospective IEEE 802.11p-enabled automotive video applications are identified. Preliminary experimental results of inter-vehicular live video streaming for surveillance applications are presented. ...

25 citations


Proceedings ArticleDOI
27 Apr 2014
TL;DR: A notion of density is proposed that captures both temporal and structural features of interactions, and generalizes the classical notion of clustering coefficient, and is used to point out important differences between distinct parts of the traffic.
Abstract: Captures of IP traffic contain much information on very different kinds of activities like file transfers, users interacting with remote systems, automatic backups, or distributed computations. Identifying such activities is crucial for an appropriate analysis, modeling and monitoring of the traffic. We propose here a notion of density that captures both temporal and structural features of interactions, that generalizes the classical notion of clustering coefficient. We use it to point out important differences between distinct parts of the traffic, and to identify interesting nodes and groups of nodes in terms of roles in the network.

14 citations


Proceedings ArticleDOI
08 Jul 2014
TL;DR: A new hidden attack framework is presented for power grids where all meter measurements are secure from injection of malicious data and an algorithm to determine an optimal attack involving the minimum set of breaker status errors is developed.
Abstract: Undetectable data attacks on the power grid produces errors in the state estimation that can potentially affect electricity prices as well as make the grid vulnerable to failures. A new hidden attack framework is presented for power grids where all meter measurements are secure from injection of malicious data. An adversary here only jams or blocks meter data from being sent to the control center. Additionally the adversary causes errors in the status of breakers in the grid to change the topological estimate of the grid. Necessary and sufficient conditions for a successful hidden attack in this regime are discussed and an algorithm to determine an optimal attack involving the minimum set of breaker status errors is developed. The efficacy of this novel attack strategy that does not require corruption of any meter data is shown through examples.

14 citations


Proceedings ArticleDOI
08 Jul 2014
TL;DR: Originally defined in the 90s, multicast is nowadays (re)gaining interest given the increasing popularity of multimedia streaming/content traffic and the explosion of cloud services and worst-case projections predict indeed that routing engines could have to process and maintain in the order of 1 million active routes within the next 5 years.
Abstract: This work has been partially funded by the EULER FP7-258307 and DOMINO (TEC2010-18522) projects.

1 citations