- Peer-to-Peer Network Technologies
- Caching and Content Delivery
- Parallel Computing and Optimization Techniques
- Cloud Computing and Resource Management
- Distributed and Parallel Computing Systems
- Opportunistic and Delay-Tolerant Networks
- Mobile Ad Hoc Networks
- Distributed systems and fault tolerance
- Network Traffic and Congestion Control
- Logic, programming, and type systems
- Advanced Data Storage Technologies
- Formal Methods in Verification
- Software-Defined Networks and 5G
- Advanced Optical Network Technologies
- Energy Efficient Wireless Sensor Networks
- Vehicular Ad Hoc Networks (VANETs)
- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Software Testing and Debugging Techniques
- Error Correcting Code Techniques
- Network Time Synchronization Technologies
- Gene expression and cancer classification
- Food Quality and Safety Studies
- Wireless Networks and Protocols
- Single-cell and spatial transcriptomics
Shandong Agricultural University
2025
Hunan Institute of Engineering
2014-2023
Jianghan University
2023
Changchun University of Science and Technology
2022
Beijing University of Posts and Telecommunications
2016-2017
University of Hawaiʻi at Mānoa
2011
Wuhan University of Technology
2010
Chinese University of Hong Kong, Shenzhen
2009
Purdue University West Lafayette
2003-2009
Southwest Jiaotong University
2007
Distributed hash tables (DHTs) have proven to be a novel and efficient platform for building variety of scalable robust distributed applications like content sharing location in the Internet. Similar those Internet, network services mobile ad hoc networks (MANETs) can potentially benefit from deployment DHT. However, bandwidth limitations, node mobility, multi access interference pose unique challenges deploying such DHTs MANETs. In this paper, we first study how efficiently implement We...
Condor provides high throughput computing by leveraging idle-cycles on off-the-shelf desktop machines. It also supports flocking, a mechanism for sharing resources among pools. Since pools distributed over wide area can have dynamically changing availability and preferences, the current flocking based static configurations limit potential of across This paper presents technique resource discovery in using peer-to-peer mechanisms that are self-organizing, fault-tolerant, scalable,...
The most popular method used in traditional power system state estimation is the Maximum Likelihood Estimation (MLE). It assumes of a set deterministic variables and determines likely via error included interval measurements. In distribution system, measurements are often too sparse to fulfill observability. Instead introducing pseudomeasurements, we propose Belief Propagation (BP) based estimator. This new approach that stochastic variables. With prior distributions, it calculates posterior...
Controller placement is an important problem in software defined networks. Previously, some works addressed the by taking into account primary factors, such as propagation delay of control paths and capacity controllers. Here, from a novel standpoint energy consumption, which modeled binary integer program (BIP). In BIP model, consumption network that serves for traffic minimized under constraints load consideration high complexity large networks, genetic heuristic algorithm designed to find...
This paper proposes a new coherence method called multicast snooping that dynamically adapts between broadcast and directory protocol. Multicast is unique because processors predict which caches should snoop each transaction by specifying mask. Transactions are delivered with an ordered network, such as Isotach eliminates the need for acknowledgment messages. Processors handle transactions they would protocol, while simplified operates in parallel to check masks gracefully incorrect ones...
This paper introduces a novel fuzzing framework, SyzParam which incorporates runtime parameters into the process. Achieving this objective requires addressing several key challenges, including valid value extraction, inter-device relation construction, and fuzz engine integration. By inspecting data structures functions associated with LKDM, our tool can extract across various drivers through static analysis. Additionally, collects relations identifies associations between drivers....
Constipation severely affects the quality of life, and current treatment strategies may cause adverse effects. Garlic fructans have shown great potential for improving gastrointestinal health. This study aimed to elucidate protective effects mechanisms three garlic with different degrees polymerization (DPs) against loperamide (Lop)-induced constipated mice. The results showed that accelerated intestinal motility (0.57-1.05-fold) alleviated colonic crypt shortening (1.42-1.97-fold)....
This paper presents a new probabilistic approach of the real-time state estimation on micro-grid. The grid is modeled as factor graph which can characterize linear correlations among variables. functions are defined for both circuit elements and renewable energy generation. With stochastic model, estimator conducts Belief Propagation algorithm utilizing measurements from smart metering devices. result statistical inference optimal estimates system state. work with sparse by delivering rather...
Overlay routing has emerged as a promising approach to improving performance and reliability of Internet paths. To fully realize the potential overlay under constraints deployment costs in terms hardware, network connectivity human effort, it is critical carefully place infrastructure nodes balance trade-off between resource constraints. In this paper, we investigate approaches perform intelligent placement facilitate (i) resilient (ii) TCP improvement. We formulate objective functions...
Overlay routing has emerged as a promising approach to improving performance and reliability of Internet paths. To fully realize the potential overlay under constraints deployment costs in terms hardware, network connectivity human effort, it is critical carefully place infrastructure nodes balance tradeoff between resource constraints. In this paper, we investigate approaches perform intelligent placement facilitate (i) resilient (ii) TCP improvement. We formulate objective functions...
In Software defined networks (SDNs), controller placement is an important problem which will affect the performance of network directly. At present, there have been some studies on in SDN from different aspects such as delay, capacity, reliability and load balance. this paper, discussed aspect delay balance at same time. More precisely, for a given topology, we study how to choose locations multiple controllers minimize average or worst all control paths under consideration The trade-off...
We present the design, implementation, and evaluation of a Time Division Multiplex (TDM) MAC protocol for multi-hop wireless mesh networks using programmable platform. Extensive research has been devoted to optimal scheduling algorithms assuming perfect TDM protocol. However, problem designing implementing such not received due attention. introduce design framework that addresses three main challenges comprise this problem: (i) How calibrate optimize parameters given platform, (ii) how...
Peer-to-peer (p2p) systems such as Gnutella and KaZaa are routinely used by millions of people for sharing music many other files over the Internet, they account a significant portion Internet traffic. The p2p traffic can be broken down into two categories: protocol messages maintaining searching overlay network, data downloading files. This paper makes following contributions. First, we present study locality in collective query being initiated forwarded servants within same organization....
Conditional compilation is one of the most powerful parts a C/C++ environment available for building software different platforms with feature sets. Although conditional powerful, it can be difficult to understand and error-prone. In large systems, file inclusion, macro substitution are closely related often largely interleaved. Without adequate tools, understanding complex header files tedious task. This practice may even complicated as hierarchies grow projects. paper presents our...
In this paper, we examine the communication model widely used in simulation studies of mobile ad hoc networks (MANETs). We find that uses an overly simplistic traffic pattern which restricts number connections originate from each source node to be one or two, and thus may not represent patterns many potential applications MANETs. then propose a new extends previous include more general varies per node. study performance impact on various routing protocols via detailed simulations MANET 112...