Search Results - "Shigang Chen"
-
1
Counter Tree: A Scalable Counter Architecture for Per-Flow Traffic Measurement
Published in IEEE/ACM transactions on networking (01-04-2017)“…Per-flow traffic measurement, which is to count the number of packets for each active flow during a certain measurement period, has many applications in…”
Get full text
Journal Article -
2
An Automated Signature-Based Approach against Polymorphic Internet Worms
Published in IEEE transactions on parallel and distributed systems (01-07-2007)“…Capable of infecting hundreds of thousands of hosts, worms represent a major threat to the Internet. However, the defense against them is still an open…”
Get full text
Journal Article -
3
Per-Flow Traffic Measurement Through Randomized Counter Sharing
Published in IEEE/ACM transactions on networking (01-10-2012)“…Traffic measurement provides critical real-world data for service providers and network administrators to perform capacity planning, accounting and billing,…”
Get full text
Journal Article -
4
An Efficient Tag Search Protocol in Large-Scale RFID Systems With Noisy Channel
Published in IEEE/ACM transactions on networking (01-04-2016)“…Radio frequency identification (RFID) technology has many applications in inventory management, supply chain, product tracking, transportation, and logistics…”
Get full text
Journal Article -
5
Missing-Tag Detection and Energy-Time Tradeoff in Large-Scale RFID Systems With Unreliable Channels
Published in IEEE/ACM transactions on networking (01-08-2014)“…Radio frequency identification (RFID) technologies are poised to revolutionize retail, warehouse, and supply chain management. One of their interesting…”
Get full text
Journal Article -
6
Joint Optimization of Flow Table and Group Table for Default Paths in SDNs
Published in IEEE/ACM transactions on networking (01-08-2018)“…Software-defined networking (SDN) separates the control plane from the data plane to ease network management and provide flexibility in packet routing. The…”
Get full text
Journal Article -
7
Fit a Compact Spread Estimator in Small High-Speed Memory
Published in IEEE/ACM transactions on networking (01-10-2011)“…The spread of a source host is the number of distinct destinations that it has sent packets to during a measurement period. A spread estimator is a…”
Get full text
Journal Article -
8
Robust signal timing optimization with environmental concerns
Published in Transportation research. Part C, Emerging technologies (01-04-2013)“…► This paper develops a signal timing optimization model. ► The objective is to minimize both traffic delay and air pollutant concentrations. ► The model is…”
Get full text
Journal Article -
9
Privacy-Preserving Transportation Traffic Measurement in Intelligent Cyber-physical Road Systems
Published in IEEE transactions on vehicular technology (01-05-2016)“…Traffic measurement is a critical function in transportation engineering. We consider privacy-preserving point-to-point traffic measurement in this paper. We…”
Get full text
Journal Article -
10
Two Techniques for Fast Computation of Constrained Shortest Paths
Published in IEEE/ACM transactions on networking (01-02-2008)“…Computing constrained shortest paths is fundamental to some important network functions such as QoS routing, MPLS path selection, ATM circuit routing, and…”
Get full text
Journal Article -
11
Cardinality Estimation for Elephant Flows: A Compact Solution Based on Virtual Register Sharing
Published in IEEE/ACM transactions on networking (01-12-2017)“…For many practical applications, it is a fundamental problem to estimate the flow cardinalities over big network data consisting of numerous flows (especially…”
Get full text
Journal Article -
12
Efficient Protocols for Identifying the Missing Tags in a Large RFID System
Published in IEEE/ACM transactions on networking (01-12-2013)“…Compared to the classical barcode system, radio frequency identification (RFID) extends the operational distance from inches to a number of feet (passive RFID…”
Get full text
Journal Article -
13
Tag-Ordering Polling Protocols in RFID Systems
Published in IEEE/ACM transactions on networking (01-06-2016)“…Future RFID technologies will go far beyond today's widely used passive tags. Battery-powered active tags are likely to gain more popularity due to their long…”
Get full text
Journal Article -
14
A novel scheme for protecting receiver's location privacy in wireless sensor networks
Published in IEEE transactions on wireless communications (01-10-2008)“…Due to the open nature of a sensor network, it is relatively easy for an adversary to eavesdrop and trace packet movement in the network in order to capture…”
Get full text
Journal Article -
15
Lightweight Anonymous Authentication Protocols for RFID Systems
Published in IEEE/ACM transactions on networking (01-06-2017)“…Radio-frequency identification (RFID) technologies are making their way into retail products, library books, debit cards, passports, driver licenses, car…”
Get full text
Journal Article -
16
Key materials and future perspective for aqueous rechargeable lithium-ion batteries
Published in Materials Reports: Energy (01-05-2022)“…Aqueous rechargeable lithium-ion battery (ARLiB) is of specific importance due to the low-cost, environmental-friendly properties. Recently, its energy denisty…”
Get full text
Journal Article -
17
A fast ceramic mixed OH−/H+ ionic conductor for low temperature fuel cells
Published in Nature communications (30-01-2024)“…Low temperature ionic conducting materials such as OH − and H + ionic conductors are important electrolytes for electrochemical devices. Here we show the…”
Get full text
Journal Article -
18
An Efficient Anonymous Authentication Protocol for RFID Systems Using Dynamic Tokens
Published in 2015 IEEE 35th International Conference on Distributed Computing Systems (01-06-2015)“…Radio frequency identification (RFID) technologies are widely used in many applications. The widespread use of tags in traditional ways of deployment raises a…”
Get full text
Conference Proceeding Journal Article -
19
Fast Bloom Filters and Their Generalization
Published in IEEE transactions on parallel and distributed systems (01-01-2014)“…Bloom filters have been extensively applied in many network functions. Their performance is judged by three criteria: query overhead, space requirement, and…”
Get full text
Journal Article -
20
When Bloom Filters Are No Longer Compact: Multi-Set Membership Lookup for Network Applications
Published in IEEE/ACM transactions on networking (01-12-2016)“…Many important network functions require online membership lookup against a large set of addresses, flow labels, signatures, and so on. This paper studies a…”
Get full text
Journal Article