Search Results - "Yau, D. K. Y."

Refine Results
  1. 1

    Energy-Efficient Capture of Stochastic Events under Periodic Network Coverage and Coordinated Sleep by Shibo He, Jiming Chen, Yau, D. K. Y., Huanyu Shao, Youxian Sun

    “…We consider a high density of sensors randomly placed in a geographical area for event monitoring. The monitoring regions of the sensors may have significant…”
    Get full text
    Journal Article
  2. 2

    Adaptive rate-controlled scheduling for multimedia applications by Yau, D.K.Y., Lam, S.S.

    Published in IEEE/ACM transactions on networking (01-08-1997)
    “…We present a framework for integrated scheduling of continuous media (CM) and other applications. The framework, called ARC scheduling, consists of a…”
    Get full text
    Journal Article
  3. 3

    Privacy Vulnerability of Published Anonymous Mobility Traces by Ma, C. Y. T., Yau, D. K. Y., Yip, N. K., Rao, N. S. V.

    Published in IEEE/ACM transactions on networking (01-06-2013)
    “…Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban…”
    Get full text
    Journal Article
  4. 4

    A lossless smoothing algorithm for compressed video by Lam, S.S., Chow, S., Yau, D.K.Y.

    Published in IEEE/ACM transactions on networking (01-10-1996)
    “…Interframe coding techniques, such as those used in MPEG video, give rise to a sequence of encoded pictures whose sizes (in number of bits) differ by a factor…”
    Get full text
    Journal Article
  5. 5

    Automatic image segmentation by integrating color-edge extraction and seeded region growing by Jianping Fan, Yau, D.K.Y., Elmagarmid, A.K., Aref, W.G.

    Published in IEEE transactions on image processing (01-10-2001)
    “…We propose a new automatic image segmentation method. Color edges in an image are first obtained automatically by combining an improved isotropic edge detector…”
    Get full text
    Journal Article
  6. 6

    Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles by Yau, D.K.Y., Lui, J.C.S., Feng Liang, Yeung Yam

    Published in IEEE/ACM transactions on networking (01-02-2005)
    “…Our work targets a network architecture and accompanying algorithms for countering distributed denial-of-service (DDoS) attacks directed at an Internet server…”
    Get full text
    Journal Article
  7. 7

    Incentive and Service Differentiation in P2P Networks: A Game Theoretic Approach by Ma, R.T.B., Lee, S.C.M., Lui, J.C.S., Yau, D.K.Y.

    Published in IEEE/ACM transactions on networking (01-10-2006)
    “…Conventional peer-to-peer (P2P) networks do not provide service differentiation and incentive for users. Therefore, users can easily obtain information without…”
    Get full text
    Journal Article
  8. 8

    Scalable Solutions of Markov Games for Smart-Grid Infrastructure Protection by Ma, C. Y. T., Yau, D. K. Y., Rao, N. S. V.

    Published in IEEE transactions on smart grid (01-03-2013)
    “…The anticipated proliferation of cyber components for collecting information and controlling operations of smart grids increases their vulnerability to a…”
    Get full text
    Journal Article
  9. 9

    Energy provisioning in wireless rechargeable sensor networks by Shibo He, Jiming Chen, Fachang Jiang, Yau, D. K. Y., Guoliang Xing, Youxian Sun

    Published in 2011 Proceedings IEEE INFOCOM (01-04-2011)
    “…Wireless rechargeable sensor networks (WRSNs) have emerged as an alternative to solving the challenges of size and operation time posed by traditional…”
    Get full text
    Conference Proceeding
  10. 10

    Distributed collaborative key agreement and authentication protocols for dynamic peer Groups by Lee, P.P.C., Lui, J.C.S., Yau, D.K.Y.

    Published in IEEE/ACM transactions on networking (01-04-2006)
    “…We consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristics…”
    Get full text
    Journal Article
  11. 11

    Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems by Jing Dong, Curtmola, R., Nita-Rotaru, C., Yau, D. K. Y.

    “…We study data pollution attacks in wireless interflow network coding systems. Although several defenses for these attacks are known for intraflow network…”
    Get full text
    Journal Article
  12. 12

    Stochastic Steepest Descent Optimization of Multiple-Objective Mobile Sensor Coverage by Ma, C. Y. T., Yau, D. K. Y., Nung Kwan Yip, Rao, N. S. V., Jiming Chen

    Published in IEEE transactions on vehicular technology (01-05-2012)
    “…We propose a steepest descent method to compute optimal control parameters for balancing between multiple performance objectives in stateless stochastic…”
    Get full text
    Journal Article
  13. 13

    Efficient and Robust Localization of Multiple Radiation Sources in Complex Environments by Jren-Chit Chin, Yau, D. K. Y., Rao, N. S. V.

    “…We present a robust localization algorithm for multiple radiation sources using a network of sensors under random underlying physical processes and measurement…”
    Get full text
    Conference Proceeding
  14. 14

    An Experimental Low-Cost, Low-Data-Rate Rapid Structural Assessment Network by Jren-Chit Chin, Rautenberg, J.M., Ma, C.Y.T., Pujol, S., Yau, D.K.Y.

    Published in IEEE sensors journal (01-11-2009)
    “…In this paper, we present the design, implementation, and experimental evaluation of a wireless sensor network for real-time structural ldquohealthrdquo…”
    Get full text
    Journal Article
  15. 15

    Adaptive proportional delay differentiated services: characterization and performance evaluation by Leung, M.K.H., Lui, J.C.S., Yau, D.K.Y.

    Published in IEEE/ACM transactions on networking (01-12-2001)
    “…We examine a proportional-delay model for Internet differentiated services. Under this model, an Internet service provider (ISP) can control the waiting-time…”
    Get full text
    Journal Article
  16. 16

    Dynamic Activation Policies for Event Capture with Rechargeable Sensors by Zhu Ren, Peng Cheng, Jiming Chen, Yau, D. K. Y., Youxian Sun

    “…We consider the problem of event capture by a rechargeable sensor network. We assume that the events of interest follow a renewal process whose event…”
    Get full text
    Conference Proceeding
  17. 17

    A proportional-delay DiffServ-enabled Web server: admission control and dynamic adaptation by Lee, S.C.M., Lui, J.C.S., Yau, D.K.Y.

    “…We consider a Web server that can provide differentiated services to clients with different quality of service (QoS) requirements. The Web server can provide…”
    Get full text
    Journal Article
  18. 18

    You can run, but you can t hide: an effective statistical methodology to trace back DDoS attackers by Law, T K T, Lui, J C S, Yau, D K Y

    “…There is currently an urgent need for effective solutions against distributed denial-of-service (DDoS) attacks directed at many well-known Web sites. Because…”
    Get full text
    Journal Article
  19. 19

    A multikey secure multimedia proxy using asymmetric reversible parametric sequences: theory, design, and implementation by Yeung, S.F., Lui, J.C.S., Yau, D.K.Y.

    Published in IEEE transactions on multimedia (01-04-2005)
    “…Because of limited server and network capacities for streaming applications, multimedia proxies are commonly used to cache multimedia objects such that, by…”
    Get full text
    Journal Article
  20. 20