Search Results - "Hu, Y. Charlie"

Refine Results
  1. 1

    A Case for Sampling-Based Learning Techniques in Coflow Scheduling by Jajoo, Akshay, Hu, Y. Charlie, Lin, Xiaojun

    Published in IEEE/ACM transactions on networking (01-08-2022)
    “…Coflow scheduling improves data-intensive application performance by improving their networking performance. State-of-the-art online coflow schedulers in…”
    Get full text
    Journal Article
  2. 2

    Exploring the design space of reliable multicast protocols for wireless mesh networks by Koutsonikolas, Dimitrios, Charlie Hu, Y.

    Published in Ad hoc networks (01-07-2009)
    “…Many important applications in wireless mesh networks require reliable multicast communication, i.e., with 100% packet delivery ratio (PDR). Previously,…”
    Get full text
    Journal Article
  3. 3

    An interference-aware fair scheduling for multicast in wireless mesh networks by Koutsonikolas, Dimitrios, Das, Saumitra M., Charlie Hu, Y.

    “…Multicast is a fundamental routing service in wireless mesh networks (WMNs) due to its many potential applications such as video conferencing, online games,…”
    Get full text
    Journal Article
  4. 4

    SLearn: A Case for Task Sampling Based Learning for Cluster Job Scheduling by Jajoo, Akshay, Hu, Y. Charlie, Lin, Xiaojun, Deng, Nan

    Published in IEEE transactions on cloud computing (01-07-2023)
    “…The ability to accurately estimate job runtime properties allows a scheduler to effectively schedule jobs. State-of-the-art online cluster job schedulers use…”
    Get full text
    Journal Article
  5. 5

    On the impact of packet spraying in data center networks by Dixit, Advait, Prakash, Pawan, Hu, Y. Charlie, Kompella, Ramana Rao

    Published in 2013 Proceedings IEEE INFOCOM (01-04-2013)
    “…Modern data center networks are commonly organized in multi-rooted tree topologies. They typically rely on equal-cost multipath to split flows across multiple…”
    Get full text
    Conference Proceeding
  6. 6

    Hierarchical geographic multicast routing for wireless sensor networks by Koutsonikolas, Dimitrios, Das, Saumitra M., Hu, Y. Charlie, Stojmenovic, Ivan

    Published in Wireless networks (01-02-2010)
    “…Wireless sensor networks comprise typically dense deployments of large networks of small wireless capable sensor devices. In such networks, multicast is a…”
    Get full text
    Journal Article
  7. 7

    Wireless Network Instabilities in the Wild: Measurement, Applications (Non)Resilience, and OS Remedy by Cui, Yong, Jiang, Yimin, Lai, Zeqi, Chen, Xiaomeng, Hu, Y. Charlie, Tan, Kun, Dai, Minglong, Zheng, Kai, Li, Yi

    Published in IEEE/ACM transactions on networking (01-02-2019)
    “…While the bandwidth and latency improvement of both WiFi and cellular data networks in the past decades are plenty evident, the extent of signal strength…”
    Get full text
    Journal Article
  8. 8

    iSPY: Detecting IP Prefix Hijacking on My Own by Zheng Zhang, Ying Zhang, Hu, Y Charlie, Mao, Z Morley, Bush, Randy

    Published in IEEE/ACM transactions on networking (01-12-2010)
    “…IP prefix hijacking remains a major threat to the security of the Internet routing system due to a lack of authoritative prefix ownership information. Despite…”
    Get full text
    Journal Article
  9. 9

    A Study of Network-Side 5G User Localization Using Angle-Based Fingerprints by Meng, Jiayi, Sharma, Abhigyan, Tran, Tuyen X., Balasubramanian, Bharath, Jung, Gueyoung, Hiltunen, Matti, Charlie Hu, Y.

    “…This paper explores network-side cellular user localization using fingerprints created from the angle measurements enabled by 5G. Our key idea is a…”
    Get full text
    Conference Proceeding
  10. 10

    On the feasibility of bandwidth estimation in wireless access networks by Koutsonikolas, Dimitrios, Hu, Y. Charlie

    Published in Wireless networks (01-08-2011)
    “…Bandwidth estimation refers to the measurement of a bandwidth-related metric over a network path, performed only by the end hosts, without access to the…”
    Get full text
    Journal Article
  11. 11

    CCACK: Efficient Network Coding Based Opportunistic Routing Through Cumulative Coded Acknowledgments by Koutsonikolas, Dimitrios, Chih-Chun Wang, Hu, Y Charlie

    Published in 2010 Proceedings IEEE INFOCOM (01-03-2010)
    “…The use of random linear network coding (NC) has significantly simplified the design of opportunistic routing (OR) protocols by removing the need of…”
    Get full text
    Conference Proceeding
  12. 12

    Distributed Hashing for Scalable Multicast in Wireless Ad Hoc Networks by Das, S.M., Pucha, H., Hu, Y.C.

    “…Several multicast protocols for mobile ad hoc networks have been proposed, which build multicast trees by using location information that is available from the…”
    Get full text
    Journal Article
  13. 13

    The performance impact of traffic patterns on routing protocols in mobile ad hoc networks by Pucha, Himabindu, Das, Saumitra M., Hu, Y. Charlie

    “…As mobile ad hoc network (MANET) systems research has matured and several testbeds have been built to study MANETs, research has focused on developing new…”
    Get full text
    Journal Article
  14. 14

    On the scalability of rendezvous-based location services for geographic wireless ad hoc routing by Das, Saumitra M., Pucha, Himabindu, Hu, Y. Charlie

    “…Geographic routing protocols allow stateless routing by taking advantage of the location information of mobile nodes and thus are highly scalable. A central…”
    Get full text
    Journal Article
  15. 15

    Prediction models for long-term Internet prefix availability by Khosla, Ravish, Fahmy, Sonia, Hu, Y. Charlie, Neville, Jennifer

    “…The Border Gateway Protocol (BGP) maintains inter-domain routing information by announcing and withdrawing IP prefixes. These routing updates can cause…”
    Get full text
    Journal Article
  16. 16

    P-SLAM: Simultaneous Localization and Mapping With Environmental-Structure Prediction by Chang, H.J., Lee, C.S.G., Yung-Hsiang Lu, Hu, Y.C.

    Published in IEEE transactions on robotics (01-04-2007)
    “…Traditionally, simultaneous localization and mapping (SLAM) algorithms solve the localization and mapping problem in explored regions. This paper presents a…”
    Get full text
    Journal Article
  17. 17

    Mitigating the gateway bottleneck via transparent cooperative caching in wireless mesh networks by Das, Saumitra M., Pucha, Himabindu, Hu, Y. Charlie

    Published in Ad hoc networks (01-08-2007)
    “…Wireless mesh networks (WMNs) have been proposed to provide cheap, easily deployable and robust Internet access. The dominant Internet-access traffic from…”
    Get full text
    Journal Article
  18. 18
  19. 19

    High-Fidelity Cellular Network Control-Plane Traffic Generation without Domain Knowledge by Kong, Z. Jonny, Hu, Nathan, Hu, Y. Charlie, Meng, Jiayi, Koral, Yaron

    Published 11-11-2024
    “…With rapid evolution of mobile core network (MCN) architectures, large-scale control-plane traffic (CPT) traces are critical to studying MCN design and…”
    Get full text
    Journal Article
  20. 20

    Realizing the full potential of PSM using proxying by Ning Ding, Pathak, A., Koutsonikolas, D., Shepard, C., Hu, Y. C., Lin Zhong

    Published in 2012 Proceedings IEEE INFOCOM (01-03-2012)
    “…The WiFi radio in smartphones consumes a significant portion of energy when active. To reduce the energy consumption, the Power Saving Mode was standardized in…”
    Get full text
    Conference Proceeding