Wei Li

ORCID: 0000-0002-2635-1269
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Caching and Content Delivery
  • Peer-to-Peer Network Technologies
  • Cloud Computing and Resource Management
  • Software-Defined Networks and 5G
  • Cryptography and Data Security
  • Optical measurement and interference techniques
  • Advanced Wireless Communication Techniques
  • Cloud Data Security Solutions
  • Privacy-Preserving Technologies in Data
  • Advanced Vision and Imaging
  • Neural Networks and Applications
  • Robotic Mechanisms and Dynamics
  • Algorithms and Data Compression
  • Advanced Database Systems and Queries
  • Satellite Communication Systems
  • Advanced Optical Network Technologies
  • Opportunistic and Delay-Tolerant Networks
  • Matrix Theory and Algorithms
  • Distributed systems and fault tolerance
  • Blind Source Separation Techniques
  • Technology and Security Systems
  • Smart Grid and Power Systems
  • Impact of Light on Environment and Health
  • Stochastic Gradient Optimization Techniques
  • Image Enhancement Techniques

Beijing University of Posts and Telecommunications
2007-2019

The University of Sydney
2017-2019

Hangzhou Dianzi University
2006-2012

Dezhou University
2011

Peking University
2009

Attribute-based encryption has been a promising technology to secure personal health records (PHRs) sharing in cloud computing. PHRs consist of the patient data often collected from various sources including hospitals and general practice centres. Different patients' access policies have common sub-policy. In this paper, we propose novel attribute-based scheme for fine-grained flexible control The generates shared information by sub-policy, which is based on different policies. Then,...

10.1109/jbhi.2018.2850304 article EN IEEE Journal of Biomedical and Health Informatics 2018-06-25

Mobile edge computing has significantly reduced the response time of mobile applications by executing services in close proximity to consumers. However, capabilities and resources servers are typically limited; additionally, service requirements environments becoming increasingly complex diverse. In this context, properly dispatching requests cloud improve quality become a crucial problem. paper, we focus on problem aim minimize invocations systems. The is formulated as an optimization...

10.1109/icws.2019.00042 article EN 2019-07-01

An extended robot–world and hand–eye calibration method is proposed in this paper to evaluate the transformation relationship between camera robot device. This approach could be performed for mobile or medical robotics applications, where precise, expensive, unsterile objects, enough movement space, cannot made available at work site. Firstly, a mathematical model established formulate robot-gripper-to-camera rigid robot-base-to-world using Kronecker product. Subsequently, sparse bundle...

10.3390/s18113949 article EN cc-by Sensors 2018-11-15

BitTorrent is one of the most well known peer-to-peer file sharing applications, accounting for a significant proportion Internet traffic. Current system builds its overlay network by randomly selecting peers, fact that has potential to seriously handicap both individual performance and generate amount cross-ISP In this paper, we propose novel peer selection algorithm called UTAPS which could selects peers within small hop counts low round trip time (RTT) range utilizing knowledge underlying...

10.1109/aina.2008.92 article EN 2008-01-01

Broadcasting has become a basic service that adds to existing DHT systems the ability search using arbitrary queries as well disseminate/collection global information. However, phenomenon of system churn, continuous process needs joining and leaving networks, degrades broadcast performance adversely impact applications built on top them. In this paper, we present an efficient algorithm for performing operation in under churn. It is suitable most such Chord, Tapestry, etc. Through proposed...

10.1109/wicom.2007.483 article EN International Conference on Wireless Communications, Networking and Mobile Computing 2007-09-01

Point system is a common application in loyalty marketing programs. However, points are usually difficult to be obtained so that consumers have small amount of and participate campaigns rarely. To promote consumer engagement, this paper proposes new method combines point trading with third-party payment, supporting more forms strategy. Trading subsystem the core part system. Traditional architecture faced resource competition database deadlock problems it cannot meet performance...

10.1145/3317614.3317632 article EN 2019-02-25

In order to overcome the restrictions of traditional robot-sensor calibration method which solve tool-camera transformation and robot-world rely on target, a calibration-free approach that problem form AX = YB based Second-Order Cone Programming is proposed. First, Structure-From-Motion was used recover camera motion matrix up scaling. Then rotation translation in equation were parameterized by dual quaternion theory. Finally, simultaneously optimal solution scale factor, hand-eye relation....

10.1051/matecconf/201817302005 article EN cc-by MATEC Web of Conferences 2018-01-01

Telcos and cloud service providers are keen to exploit virtual network functions (VNF) because it has the potential reduce reliance on expensive proprietary networking gear increase elasticity. In this paper, we propose a NFV Orchestration Rapid Migration (NORM) architecture system realize complete layout through SDN NFV. Through port MAC address mapping, NORM can physical nodes accessing Virtual Networks (VNs), while deploying related VNFs Docker. At same time, set up white list function...

10.1109/icicsp.2018.8549793 article EN 2018-09-01

10.1016/j.amc.2006.06.098 article EN Applied Mathematics and Computation 2006-08-29

10.1016/s1005-8885(15)60663-x article EN The Journal of China Universities of Posts and Telecommunications 2015-08-01

A network testbed with high flexibility plays an important role in testing and evaluating new technology. Both researchers engineers always need a which can customize experiment on demand. Some of the existing cloud computing platforms lack customization while some experimental platform not provide convenient virtual machine management functions. In this paper, we propose preliminary implementation elastic customized (ECCN) based Openstack project provides supports Openflow protocol. This...

10.1109/nana.2016.62 article EN 2022 International Conference on Networking and Network Applications (NaNA) 2016-07-01

The widespread introduction of white LEDs has brought an unprecedented opportunity to create a ubiquitous indoor visible light communication system. In order satisfy the illumination requirements, signals from multiple are always superposed on receiving surface which causes severe inter-cell interference and leads critical demand for cell identification scheduling handoff. this paper, we propose (VLCID) scheme based cumulative space time coding (CSTC) solve problem. main idea CSTC-based...

10.1109/nana.2016.42 article EN 2022 International Conference on Networking and Network Applications (NaNA) 2016-07-01

Due to inevitable cross-layer conflict existing in route objectives of overlay routing and traffic engineering, the interaction between two selfish players causes oscillations network performance loss. The is investigated as a Nash game with best-reply, where have equal status, take turn optimize their routes. Overlay aims minimize total latency all paths, while engineering maximum link utilization native network. We propose simple strategies for layers. simulation results under various...

10.1109/icbnmt.2013.6823909 article EN 2013-11-01

A new iterative Zero-Forcing BLAST with QR Decomposition algorithm improving the performance over error propagation is proposed in this paper. In algorithm, much effort made on several iterations to obtain high substreams. Simulation results show that greatly improve of traditional detection reasonable increase computation complexity. This also has better and lower complexity than another Detection approach [3].

10.1109/chinacom.2009.5339887 article EN 2009-08-01
Coming Soon ...