Search Results - "Yau, D. K. Y."
-
1
Energy-Efficient Capture of Stochastic Events under Periodic Network Coverage and Coordinated Sleep
Published in IEEE transactions on parallel and distributed systems (01-06-2012)“…We consider a high density of sensors randomly placed in a geographical area for event monitoring. The monitoring regions of the sensors may have significant…”
Get full text
Journal Article -
2
Adaptive rate-controlled scheduling for multimedia applications
Published in IEEE/ACM transactions on networking (01-08-1997)“…We present a framework for integrated scheduling of continuous media (CM) and other applications. The framework, called ARC scheduling, consists of a…”
Get full text
Journal Article -
3
Privacy Vulnerability of Published Anonymous Mobility Traces
Published in IEEE/ACM transactions on networking (01-06-2013)“…Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban…”
Get full text
Journal Article -
4
A lossless smoothing algorithm for compressed video
Published in IEEE/ACM transactions on networking (01-10-1996)“…Interframe coding techniques, such as those used in MPEG video, give rise to a sequence of encoded pictures whose sizes (in number of bits) differ by a factor…”
Get full text
Journal Article -
5
Automatic image segmentation by integrating color-edge extraction and seeded region growing
Published in IEEE transactions on image processing (01-10-2001)“…We propose a new automatic image segmentation method. Color edges in an image are first obtained automatically by combining an improved isotropic edge detector…”
Get full text
Journal Article -
6
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
Published in IEEE/ACM transactions on networking (01-02-2005)“…Our work targets a network architecture and accompanying algorithms for countering distributed denial-of-service (DDoS) attacks directed at an Internet server…”
Get full text
Journal Article -
7
Incentive and Service Differentiation in P2P Networks: A Game Theoretic Approach
Published in IEEE/ACM transactions on networking (01-10-2006)“…Conventional peer-to-peer (P2P) networks do not provide service differentiation and incentive for users. Therefore, users can easily obtain information without…”
Get full text
Journal Article -
8
Scalable Solutions of Markov Games for Smart-Grid Infrastructure Protection
Published in IEEE transactions on smart grid (01-03-2013)“…The anticipated proliferation of cyber components for collecting information and controlling operations of smart grids increases their vulnerability to a…”
Get full text
Journal Article -
9
Energy provisioning in wireless rechargeable sensor networks
Published in 2011 Proceedings IEEE INFOCOM (01-04-2011)“…Wireless rechargeable sensor networks (WRSNs) have emerged as an alternative to solving the challenges of size and operation time posed by traditional…”
Get full text
Conference Proceeding -
10
Distributed collaborative key agreement and authentication protocols for dynamic peer Groups
Published in IEEE/ACM transactions on networking (01-04-2006)“…We consider several distributed collaborative key agreement and authentication protocols for dynamic peer groups. There are several important characteristics…”
Get full text
Journal Article -
11
Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems
Published in IEEE transactions on dependable and secure computing (01-09-2012)“…We study data pollution attacks in wireless interflow network coding systems. Although several defenses for these attacks are known for intraflow network…”
Get full text
Journal Article -
12
Stochastic Steepest Descent Optimization of Multiple-Objective Mobile Sensor Coverage
Published in IEEE transactions on vehicular technology (01-05-2012)“…We propose a steepest descent method to compute optimal control parameters for balancing between multiple performance objectives in stateless stochastic…”
Get full text
Journal Article -
13
Efficient and Robust Localization of Multiple Radiation Sources in Complex Environments
Published in 2011 31st International Conference on Distributed Computing Systems (01-06-2011)“…We present a robust localization algorithm for multiple radiation sources using a network of sensors under random underlying physical processes and measurement…”
Get full text
Conference Proceeding -
14
An Experimental Low-Cost, Low-Data-Rate Rapid Structural Assessment Network
Published in IEEE sensors journal (01-11-2009)“…In this paper, we present the design, implementation, and experimental evaluation of a wireless sensor network for real-time structural ldquohealthrdquo…”
Get full text
Journal Article -
15
Adaptive proportional delay differentiated services: characterization and performance evaluation
Published in IEEE/ACM transactions on networking (01-12-2001)“…We examine a proportional-delay model for Internet differentiated services. Under this model, an Internet service provider (ISP) can control the waiting-time…”
Get full text
Journal Article -
16
Dynamic Activation Policies for Event Capture with Rechargeable Sensors
Published in 2012 IEEE 32nd International Conference on Distributed Computing Systems (01-06-2012)“…We consider the problem of event capture by a rechargeable sensor network. We assume that the events of interest follow a renewal process whose event…”
Get full text
Conference Proceeding -
17
A proportional-delay DiffServ-enabled Web server: admission control and dynamic adaptation
Published in IEEE transactions on parallel and distributed systems (01-05-2004)“…We consider a Web server that can provide differentiated services to clients with different quality of service (QoS) requirements. The Web server can provide…”
Get full text
Journal Article -
18
You can run, but you can t hide: an effective statistical methodology to trace back DDoS attackers
Published in IEEE transactions on parallel and distributed systems (01-09-2005)“…There is currently an urgent need for effective solutions against distributed denial-of-service (DDoS) attacks directed at many well-known Web sites. Because…”
Get full text
Journal Article -
19
A multikey secure multimedia proxy using asymmetric reversible parametric sequences: theory, design, and implementation
Published in IEEE transactions on multimedia (01-04-2005)“…Because of limited server and network capacities for streaming applications, multimedia proxies are commonly used to cache multimedia objects such that, by…”
Get full text
Journal Article -
20
Operating system support for distributed multimedia: Multimedia computing systems
Published in International journal of intelligent systems (1998)Get full text
Journal Article