Search Results - "Ling, Yibei"
-
1
Per-Flow Traffic Measurement Through Randomized Counter Sharing
Published in IEEE/ACM transactions on networking (01-10-2012)“…Traffic measurement provides critical real-world data for service providers and network administrators to perform capacity planning, accounting and billing,…”
Get full text
Journal Article -
2
Cardinality Estimation for Elephant Flows: A Compact Solution Based on Virtual Register Sharing
Published in IEEE/ACM transactions on networking (01-12-2017)“…For many practical applications, it is a fundamental problem to estimate the flow cardinalities over big network data consisting of numerous flows (especially…”
Get full text
Journal Article -
3
Efficient Protocols for Identifying the Missing Tags in a Large RFID System
Published in IEEE/ACM transactions on networking (01-12-2013)“…Compared to the classical barcode system, radio frequency identification (RFID) extends the operational distance from inches to a number of feet (passive RFID…”
Get full text
Journal Article -
4
Fast and compact per-flow traffic measurement through randomized counter sharing
Published in 2011 Proceedings IEEE INFOCOM (01-04-2011)“…Traffic measurement provides critical real-world data for service providers and network administrators to perform capacity planning, accounting and billing,…”
Get full text
Conference Proceeding -
5
Preserving HTTP Sessions in Vehicular Environments
Published in IEEE transactions on vehicular technology (01-09-2007)“…Wireless Internet in the in-vehicle environment is an evolving reality that reflects the gradual maturity of wireless technologies. Its complexity is reflected…”
Get full text
Journal Article -
6
On quantification of anchor placement
Published in 2012 Proceedings IEEE INFOCOM (01-03-2012)“…This paper attempts to answer a question: for a given traversal area, how to quantify the geometric impact of anchor placement on localization performance. We…”
Get full text
Conference Proceeding -
7
A variational calculus approach to optimal checkpoint placement
Published in IEEE transactions on computers (01-07-2001)“…Checkpointing is an effective fault-tolerant technique for improving system availability and reliability. However, a blind checkpointing placement can result…”
Get full text
Journal Article -
8
State aggregation of large network domains
Published in Computer communications (26-02-2007)“…Many important network functions (e.g., QoS provision, admission control, traffic engineering, resource management) rely on the availability and the accuracy…”
Get full text
Journal Article -
9
AID: A global anti-DoS service
Published in Computer networks (Amsterdam, Netherlands : 1999) (24-10-2007)“…Distributed denial of service (DDoS) has long been an open security problem of the Internet. Most proposed solutions require the upgrade of routers across the…”
Get full text
Journal Article -
10
Fair End-to-End Bandwidth Distribution in Wireless Sensor Networks
Published in 2010 IEEE International Conference on Communications (01-05-2010)“…End-to-end fairness in a sensor network ensures that data from each sensor has an equal (or weighted) chance to reach the sink. It eliminates the problem that…”
Get full text
Conference Proceeding -
11
On Optimal Deadlock Detection Scheduling
Published in IEEE transactions on computers (01-09-2006)“…Deadlock detection scheduling is an important, yet often overlooked problem that can significantly affect the overall performance of deadlock handling…”
Get full text
Journal Article -
12
Energy Saving via Power-Aware Buffering in Wireless Sensor Networks
Published in IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications (01-05-2007)“…This paper presents a study on the impact of buffering schemes on wireless sensor power consumption. Two common buffering paradigms are studied: fixed-size…”
Get full text
Conference Proceeding -
13
An optimal trade-off between content freshness and refresh cost
Published in Journal of applied probability (01-09-2004)“…Caching is an effective mechanism for reducing bandwidth usage and alleviating server load. However, the use of caching entails a compromise between content…”
Get full text
Journal Article -
14
Computing diagnostic explanations of network faults from monitoring data
Published in MILCOM 2008 - 2008 IEEE Military Communications Conference (01-11-2008)“…Network fault diagnosis is an important aspect of network management. Often, a single component failure will result in a cascade of secondary faults that…”
Get full text
Conference Proceeding -
15
Scalable request routing with next-neighbor load sharing in multi-server environments
Published in 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers) (2005)“…Load balancing for distributed servers is a common issue in many applications and has been extensively studied. Several distributed load balancing schemes have…”
Get full text
Conference Proceeding -
16
Network awareness and network adaptation
Published in IEEE International Conference on Networking, Sensing and Control, 2004 (2004)“…A wide variety of telematics applications emerge as an evolving reality that reflects continual convergence of Internet infrastructure and wireless…”
Get full text
Conference Proceeding -
17
A hybrid estimator for selectivity estimation
Published in IEEE transactions on knowledge and data engineering (01-03-1999)“…Traditional sampling-based estimators infer the actual selectivity of a query based purely on runtime information gathering, excluding the previously collected…”
Get full text
Journal Article -
18
Entropic analysis of biological growth models
Published in IEEE transactions on biomedical engineering (01-12-1993)“…Using the concept of isomorphism, we provide a quantitative description of the thermodynamic characteristics of the Logistic, Bertalanffy, and Gompertz…”
Get full text
Journal Article -
19
Non-interactive malicious behavior detection in vehicular networks
Published in 2010 IEEE Vehicular Networking Conference (01-12-2010)“…We lay ground for a comprehensive investigation of "traffic-related" threats to vehicular networks. While current research in the vehicular networks security…”
Get full text
Conference Proceeding -
20
Supporting inheritance using subclass assertions
Published in Information systems (Oxford) (01-12-1995)“…Inheritance, together with object and class, is the key concept of object oriented systems. Adopting the concept-oriented view (COV for short) of inheritance,…”
Get full text
Journal Article