Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Julinda Stefa is active.

Publication


Featured researches published by Julinda Stefa.


international conference on computer communications | 2013

To offload or not to offload? The bandwidth and energy costs of mobile cloud computing

Marco Valerio Barbera; Sokol Kosta; Alessandro Mei; Julinda Stefa

The cloud seems to be an excellent companion of mobile systems, to alleviate battery consumption on smartphones and to backup users data on-the-fly. Indeed, many recent works focus on frameworks that enable mobile computation offloading to software clones of smartphones on the cloud and on designing cloud-based backup systems for the data stored in our devices. Both mobile computation offloading and data backup involve communication between the real devices and the cloud. This communication does certainly not come for free. It costs in terms of bandwidth (the traffic overhead to communicate with the cloud) and in terms of energy (computation and use of network interfaces on the device). In this work we study the fmobile software/data backupseasibility of both mobile computation offloading and mobile software/data backups in real-life scenarios. In our study we assume an architecture where each real device is associated to a software clone on the cloud. We consider two types of clones: The off-clone, whose purpose is to support computation offloading, and the back-clone, which comes to use when a restore of users data and apps is needed. We give a precise evaluation of the feasibility and costs of both off-clones and back-clones in terms of bandwidth and energy consumption on the real device. We achieve this through measurements done on a real testbed of 11 Android smartphones and an equal number of software clones running on the Amazon EC2 public cloud. The smartphones have been used as the primary mobile by the participants for the whole experiment duration.


international conference on computer communications | 2011

Social-aware stateless forwarding in pocket switched networks

Alessandro Mei; Giacomo Morabito; Paolo Santi; Julinda Stefa

In this paper we describe SANE, the first forwarding mechanism that combines the advantages of both social-aware and stateless approaches in pocket switched network routing. SANE is based on the observation“that we validate on real-world traces”that individuals with similar interests tend to meet more often. In our approach, individuals (network members) are characterized by their interest profile, a compact representation of their interests. Through extensive experiments, we show the superiority of social-aware, stateless forwarding over existing stateful, social-aware and stateless, social-oblivious forwarding. An important byproduct of our interest-based approach is that it easily enables innovative routing primitives, such as interest-casting. An interest-casting protocol is also described, and extensively evaluated through experiments based on both real-world and synthetic mobility traces.


international conference on computer communications | 2009

SWIM: A Simple Model to Generate Small Mobile Worlds

Alessandro Mei; Julinda Stefa

This paper presents small world in motion (SWIM), a new mobility model for ad-hoc networking. SWIM is relatively simple, is easily tuned by setting just a few parameters, and generates traces that look real—synthetic traces have the same statistical properties of real traces. SWIM shows experimentally and theoretically the presence of the power law and exponential decay dichotomy of inter-contact time, and, most importantly, our experiments show that it can predict very accurately the performance of forwarding protocols. Index Terms—Mobility model, small world, simulations, for- warding protocols in mobile networks. I. INTRODUCTION it has been established clearly that models like RWP are not good to simulate human mobility, raising the need of new, more realistic mobility models for mobile ad-hoc networking. In this paper we present small world in motion (SWIM), a simple mobility model that generates small worlds. The model is very simple to implement and very efficient in simulations. The mobility pattern of the nodes is based on a simple intuition on human mobility: People go more often to places not very far from their home and where they can meet a lot of other people. By implementing this simple rule, SWIM is able to raise social behavior among nodes, which we believe to be the base of human mobility in real life. We validate our model using real traces and compare the distribution of inter-contact time, contact duration and number of contact distributions between nodes, showing that synthetic data that we generate match very well real data traces. Furthermore, we show that SWIM can predict well the performance of forwarding protocols. We compare the performance of two forwarding protocols— epidemic forwarding (9) and (a simplified version of) del- egation forwarding (10)—on both real traces and synthetic traces generated with SWIM. The performance of the two protocols on the synthetic traces accurately approximates their performance on real traces, supporting the claim that SWIM is an excellent model for human mobility. The rest of the paper is organized as follows: Section II briefly reports on current work in the field; in Section III we present the details of SWIM and we prove theoretically that the distribution of inter-contact time in SWIM has an exponential tail, as recently observed in real life experiments; Section V compares synthetic data traces to real traces and shows that the distribution of inter-contact time has a head that decays as a power law, again like in real experiments; in Section VI we show our experimental results on the behavior of two forwarding protocols on both synthetic and real traces; lastly, Section VII present some concluding remarks.


IEEE Network | 2016

Energy-efficient dynamic traffic offloading and reconfiguration of networked data centers for big data stream mobile computing: review, challenges, and a case study

Enzo Baccarelli; Nicola Cordeschi; Alessandro Mei; Massimo Panella; Mohammad Shojafar; Julinda Stefa

Big data stream mobile computing is proposed as a paradigm that relies on the convergence of broadband Internet mobile networking and real-time mobile cloud computing. It aims at fostering the rise of novel self-configuring integrated computing-communication platforms for enabling in real time the offloading and processing of big data streams acquired by resource-limited mobile/wireless devices. This position article formalizes this paradigm, discusses its most significant application opportunities, and outlines the major challenges in performing real-time energy-efficient management of the distributed resources available at both mobile devices and Internet-connected data centers. The performance analysis of a small-scale prototype is also included in order to provide insight into the energy vs. performance tradeoff that is achievable through the optimized design of the resource management modules. Performance comparisons with some state-of-the-art resource managers corroborate the discussion. Hints for future research directions conclude the article.


sensor mesh and ad hoc communications and networks | 2010

Small World in Motion (SWIM): Modeling Communities in Ad-Hoc Mobile Networking

Sokol Kosta; Alessandro Mei; Julinda Stefa

The complexity of social mobile networks, networks of devices carried by humans (e.g. sensors or PDAs) and communicating with short-range wireless technology, makes it hard protocol evaluation. A simple and efficient mobility model such as SWIM reflects correctly kernel properties of human movement and, at the same time, allows to evaluate accurately protocols in this context. In this paper we investigate the properties of SWIM, in particular how SWIM is able to generate social behavior among the nodes and how SWIM is able to model networks with a power-law exponential decay dichotomy of inter contact time and with complex sub-structures (communities) as the ones observed in the real data traces. We simulate three real scenarios and compare the synthetic data with real world data in terms of inter-contact, contact duration, number of contacts, and presence and structure of communities among nodes and find out a very good matching. By comparing the performance of BUBBLE, a community-based forwarding protocol for social mobile networks, on both real and synthetic data traces, we show that SWIM not only is able to extrapolate key properties of human mobility but also is very accurate in predicting performance of protocols based on social human sub-structures.


IEEE Transactions on Dependable and Secure Computing | 2012

Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals

Alessandro Mei; Julinda Stefa

In this paper, we present two forwarding protocols for mobile wireless networks of selfish individuals. We assume that all the nodes are selfish and show formally that both protocols are strategy proof, that is, no individual has an interest to deviate. Extensive simulations with real traces show that our protocols introduce an extremely small overhead in terms of delay, while the techniques we introduce to force faithful behavior have the positive and quite surprising side effect to improve performance by reducing the number of replicas and the storage requirements. We test our protocols also in the presence of a natural variation of the notion of selfishness-nodes that are selfish with outsiders and faithful with people from the same community. Even in this case, our protocols are shown to be very efficient in detecting possible misbehavior.


Archive | 2013

IoT Reference Architecture

Martin Bauer; Mathieu Boussard; Nicola Bui; Jourik De Loof; Carsten Magerkurth; Stefan Meissner; Andreas Nettsträter; Julinda Stefa; Matthias Thoma; Joachim Walewski

In this chapter we present our IoT Reference Architecture. This IoT Reference Architecture is, among others, designed as a reference for the generation of compliant IoT concrete architectures that are tailored to one’s specific needs. For other usages of the IoT Architectural Reference Model see Chap. 3.


distributed computing in sensor systems | 2011

VIP delegation: Enabling VIPs to offload data in wireless social mobile networks

Marco Valerio Barbera; Julinda Stefa; Aline Carneiro Viana; Marcelo Dias de Amorim; Mathias Boc

We propose the use of opportunistic delegation as a data traffic offload solution to the recent boost up of mobile data consumption in metropolitan areas, by investigating two main questions: (i) “How to gain insights into social mobile networking scenarios?” and (ii) “How to utilize such insights to design solutions to alleviate overloaded 3G networks?”. The purpose of our solution is to leverage usage of mobile applications requiring large data transfers by channeling the traffic to a few, socially selected important users in the network called VIP delegates. The proposed VIP selection strategies are based on social network properties and are compared to the optimal solution (that covers 100% of users with minimum number of VIPs). Our extensive experiments with real and synthetic traces show the effectiveness of VIP delegation both in terms of coverage and required number of VIPs — down to 7% in average of VIPs are needed in campuslike scenarios to offload about 90% of the traffic.


IEEE Transactions on Mobile Computing | 2014

Large-Scale Synthetic Social Mobile Networks with SWIM

Sokol Kosta; Alessandro Mei; Julinda Stefa

This paper presents small world in motion (SWIM), a new mobility model for ad hoc networking. SWIM is relatively simple, is easily tuned by setting just a few parameters, and generates traces that look real-synthetic traces have the same statistical properties of real traces in terms of intercontact times, contact duration, and frequency among node couples. Furthermore, it generates social behavior among nodes and models networks with complex social communities as the ones observed in the real traces. SWIM shows experimentally and theoretically the presence of the power-law and exponential decay dichotomy of intercontact times, and, most importantly, our experiments show that predicts very accurately the performance of forwarding protocols for PSNs like Epidemic, Delegation, Spray&Wait, and more complex, social-based ones like BUBBLE. Moreover, we propose a methodology to assess protocols on model with a large number of nodes. To the best of our knowledge, this is the first such study. Scaling of mobility models is a fundamental issue, yet never considered in the literature. Thanks to SWIM, here we present the first analysis of the scaling capabilities of Epidemic Forwarding, Delegation Forwarding, Spray&Wait, and BUBBLE.


mobile ad hoc networking and computing | 2008

Routing in outer space: fair traffic load in multi-hop wireless networks

Alessandro Mei; Julinda Stefa

In this paper, we consider security-related and energy efficiency issues in multihop wireless networks. We start our work from the observation, known in the literature, that shortest path routing creates congested areas in multihop wireless networks. These areas are critical-they generate both security and energy efficiency issues. We attack these problems and set out routing in outer space, a new routing mechanism that transforms any shortest path routing protocol (or approximated versions of it) into a new protocol that does not create congested areas, does not have the associated security-related issues, and does not encourage selfish positioning. Moreover, the network is more energy efficient than the same network using the original routing protocol (in spite of using more energy globally) and dies more gracefully. We also describe applications of our idea to mobility and to a security protocol for the detection of node replication attacks.

Collaboration


Dive into the Julinda Stefa's collaboration.

Top Co-Authors

Avatar

Alessandro Mei

Sapienza University of Rome

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Adriano Di Luzio

Sapienza University of Rome

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Pan Hui

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Paolo Santi

National Research Council

View shared research outputs
Researchain Logo
Decentralizing Knowledge