Yung Yi

ORCID: 0000-0002-6955-3135
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Wireless Network Optimization
  • Wireless Networks and Protocols
  • Advanced MIMO Systems Optimization
  • Cooperative Communication and Network Coding
  • Mobile Ad Hoc Networks
  • Complex Network Analysis Techniques
  • Auction Theory and Applications
  • Opportunistic and Delay-Tolerant Networks
  • Caching and Content Delivery
  • Game Theory and Applications
  • Network Traffic and Congestion Control
  • Green IT and Sustainability
  • Opinion Dynamics and Social Influence
  • Mobile Crowdsensing and Crowdsourcing
  • ICT Impact and Policies
  • Energy Efficient Wireless Sensor Networks
  • Power Line Communications and Noise
  • Wireless Communication Networks Research
  • Peer-to-Peer Network Technologies
  • Game Theory and Voting Systems
  • Reinforcement Learning in Robotics
  • Energy Harvesting in Wireless Networks
  • Advanced Graph Neural Networks
  • Privacy-Preserving Technologies in Data
  • Software-Defined Networks and 5G

Korea Advanced Institute of Science and Technology
2013-2022

Kootenay Association for Science & Technology
2009-2020

Korea Institute of Science & Technology Information
2020

National Institute for Mathematical Sciences
2018

Princeton University
2006-2008

Microsoft Research (United Kingdom)
2008

The University of Texas at Austin
2004-2007

Institute for Infocomm Research
2006

National Taiwan University
2005

University of California, Los Angeles
2004

Network virtualization is a powerful way to run multiple architectures or experiments simultaneously on shared infrastructure. However, making efficient use of the underlying resources requires effective techniques for virtual network embedding--mapping each specific nodes and links in substrate network. Since general embedding problem computationally intractable, past research restricted space allow solutions, focused designing heuristic algorithms. In this paper, we advocate different...

10.1145/1355734.1355737 article EN ACM SIGCOMM Computer Communication Review 2008-03-31

This paper presents a quantitative study on the performance of 3G mobile data offloading through WiFi networks. We recruited 97 iPhone users from metropolitan areas and collected statistics their connectivity during two-and-a-half-week period in February 2010. Our trace-driven simulation using acquired whole-day traces indicates that already offloads about 65% total traffic saves 55% battery power without any delayed transmission. If transfers can be with some deadline until enter zone,...

10.1109/tnet.2012.2218122 article EN IEEE/ACM Transactions on Networking 2012-11-21

Energy-efficiency, one of the major design goals in wireless cellular networks, has received much attention lately, due to increased awareness environmental and economic issues for network operators. In this paper, we develop a theoretical framework BS energy saving that encompasses dynamic operation related problem user association together. Specifically, formulate total cost minimization allows flexible tradeoff between flow-level performance consumption. For problem, propose an optimal...

10.1109/jsac.2011.110903 article EN IEEE Journal on Selected Areas in Communications 2011-08-25

We explore value-based solutions for multi-agent reinforcement learning (MARL) tasks in the centralized training with decentralized execution (CTDE) regime popularized recently. However, VDN and QMIX are representative examples that use idea of factorization joint action-value function into individual ones execution. address only a fraction factorizable MARL due to their structural constraint such as additivity monotonicity. In this paper, we propose new method MARL, QTRAN, which is free...

10.48550/arxiv.1905.05408 preprint EN other-oa arXiv (Cornell University) 2019-01-01

This paper focuses on congestion control over multi-hop, wireless networks. In a network, an important constraint that arises is due to the MAC (Media Access Control) layer. Many MACs use time-division strategy for channel access, where, at any point in space, physical can be accessed by single user each instant of time. this paper, we develop fair hop-by-hop algorithm with being imposed form access time constraint, using optimization-based framework. absence delay, show are globally stable...

10.1109/tnet.2006.890121 article EN IEEE/ACM Transactions on Networking 2007-02-01

This is a quantitative study on the performance of 3G mobile data offloading through WiFi networks. We recruited about 100 iPhone users from metropolitan area and collected statistics their connectivity during two half week period in February 2010. find that user coverage for 70% time average distributions connection disconnection times have strong heavy-tail tendency with means around 2 hours 40 minutes, respectively. Using acquired traces, we run trace-driven simulation to measure...

10.1145/1851182.1851244 article EN 2010-08-30

Due to the increasing demand of capacity in wireless cellular networks, small cells such as pico and femto are becoming more popular enjoy a spatial reuse gain, thus with different sizes expected coexist complex manner. In heterogeneous environment, role interference management (IM) becomes importance, but technical challenges also increase, since number cell-edge users, suffering from severe neighboring cells, will naturally grow. order overcome low performance and/or high complexity...

10.1109/jsac.2011.110613 article EN IEEE Journal on Selected Areas in Communications 2011-05-24

As high-speed networks are becoming commonplace, it is increasingly challenging to prevent the attack attempts at edge of Internet. While many high-performance intrusion detection systems (IDSes) employ dedicated network processors or special memory meet demanding performance requirements, often increases cost and limits functional flexibility. In contrast, existing software-based IDS stacks fail achieve a high throughput despite modern hardware innovations such as multicore CPUs, manycore...

10.1145/2382196.2382232 article EN Proceedings of the ACM Conference on Computer and Communications Security 2012-10-15

Cellular networks are facing severe traffic overloads due to the proliferation of smart handheld devices and traffic-hungry applications. A cost-effective practical solution is offload cellular data through WiFi. Recent theoretical experimental studies show that a scheme, referred as delayed WiFi offloading, can significantly save capacity by delaying users' exploiting mobility thus increasing chance meeting APs (Access Points). Despite huge potential offloading in alleviating mobile...

10.1109/twc.2014.010214.130949 article EN IEEE Transactions on Wireless Communications 2014-01-31

Wearable devices have evolved as screening tools for atrial fibrillation (AF). A photoplethysmographic (PPG) AF detection algorithm was developed and applied to a convenient smartphone-based device with good accuracy. However, patients paroxysmal frequently exhibit premature complexes (PACs), which result in poor unmanned detection, mainly because of rule-based or handcrafted machine learning techniques that are limited terms diagnostic accuracy reliability.This study aimed develop deep (DL)...

10.2196/12770 article EN cc-by JMIR mhealth and uhealth 2019-05-02

This is by far the first paper considering joint optimization of link scheduling, routing and replication for disruption-tolerant networks (DTNs). The problems resource allocation in DTNs are typically solved using dynamic programming which requires knowledge future events such as meeting schedules durations. defines a new notion optimality DTNs, called snapshot where nodes not clairvoyant, i.e., cannot look ahead into events, thus decisions made only contemporarily available knowledge....

10.1109/infcom.2010.5461932 article EN 2010-03-01

Abstract Since the seminal work by Kelly on distributed network resource allocation using language of utility maximisation (NUM) a decade ago, there have been extensive research efforts generalising and applying NUM to model, analyse design various protocols architectures. Some these works combine optimisation approach with stochastic models study under dynamics occurring at session, packet constraint levels. We survey presenting key questions, results methodologies in this emerging theory...

10.1002/ett.1285 article EN European Transactions on Telecommunications 2008-04-10

Many real-world reinforcement learning tasks require multiple agents to make sequential decisions under the agents' interaction, where well-coordinated actions among are crucial achieve target goal better at these tasks. One way accelerate coordination effect is enable communicate with each other in a distributed manner and behave as group. In this paper, we study practical scenario when (i) communication bandwidth limited (ii) share medium so that only restricted number of able...

10.48550/arxiv.1902.01554 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Continuous photoplethysmography (PPG) monitoring with a wearable device may aid the early detection of atrial fibrillation (AF).We aimed to evaluate diagnostic performance ring-type (CardioTracker, CART), which can detect AF using deep learning analysis PPG signals.Patients persistent who underwent cardioversion were recruited prospectively. We recorded signals at finger CART and conventional pulse oximeter before after over period 15 min (each instrument). Cardiologists validated rhythms...

10.2196/16443 article EN cc-by Journal of Medical Internet Research 2020-03-21

Hypergraphs provide a natural way of representing group relations, whose complexity motivates an extensive array prior work to adopt some form abstraction and simplification higher-order interactions. However, the following question has yet be addressed: How much interactions is sufficient in solving hypergraph task, how different such results become across datasets? This question, if properly answered, provides useful engineering guideline on trade off between accuracy downstream task. To...

10.1145/3366423.3380016 preprint EN 2020-04-20

Abstract It has been recently suggested by Jiang and Walrand that adaptive carrier sense multiple access (CSMA) can achieve optimal utility without any message passing in wireless networks. In this paper, after a survey of recent work on random access, generalization algorithm is considered. the continuous‐time model, proof presented convergence these CSMA algorithms to be arbitrarily close optimality, assuming network dynamics converge an equilibrium between consecutive parameter updates....

10.1002/wcm.897 article EN Wireless Communications and Mobile Computing 2009-12-23

Femtocells are a promising technology for handling exponentially increasing wireless data traffic. Although extensive attention has been paid to resource control mechanisms, example, power and load balancing in femtocell networks, their success largely depends on whether operators users accept this or not. In paper, we study the economic aspects of services case monopoly market, aim answer questions operator's revenue, user surplus, social welfare by considering practical service types...

10.1109/jsac.2012.120409 article EN IEEE Journal on Selected Areas in Communications 2012-03-28

This paper presents a quantitative study on the performance of 3G mobile data offloading through WiFi networks. We recruited about 100 iPhone users from metropolitan areas and collected statistics their connectivity during two half week period in February 2010. Our trace-driven simulation using acquired traces indicates that already offloads 65% total traffic saves 55% battery power without any delayed transmission. If transfers can be with some deadline until enter zone, substantial gains...

10.1145/1921168.1921203 article EN Proceedings of the 28th International Conference 2010-11-30

The femtocell is an enabling technology to handle exponentially increasing wireless data traffic. Despite extensive attentions paid resource control, e.g., power control and load balancing in networks, the success largely depends on whether operators users accept this or not. In paper, we study economic aspects of services with game theoretic models between providers and/or users. We consider three services: can access only macro BSs (mobile-only), open/exclusively use their femto BS (open...

10.1109/infcom.2011.5934894 article EN 2011-04-01

Rate Adaptation (RA) is a fundamental mechanism in 802.11 systems. It allows transmitters to adapt the coding and modulation scheme as well MIMO transmission mode radio channel conditions, learn track (mode, rate) pair providing highest throughput. The design of RA mechanisms has been mainly driven by heuristics. In contrast, we rigorously formulate an online stochastic optimization problem. We solve this problem present G-ORS (Graphical Optimal Sampling), family provably optimal adaptation...

10.1109/tmc.2018.2854758 article EN IEEE Transactions on Mobile Computing 2018-07-10

As the proliferation of mobile devices has ignited cloud computing, it is expected that increasing development and deployment IoT services will expedite era fog computing. Fog computing brings storage, networking even closer to end users for with better QoS. We introduce FogOS, a architecture services. take perspective designing an operating system, practicing architectural lessons from long history systems. focus on addressing challenges raised by diversity heterogeneity edge are owned...

10.1109/mcom.2017.1600908 article EN IEEE Communications Magazine 2017-08-01

The blind flooding can become very inefficient because of redundant, "superfluous" forwarding. In fact, superfluous increases link overhead and wireless medium congestion. a large network, with heavy load, this extra have severe impact on performance should be eliminated. Efficient schemes to choose dominant set nodes been recently proposed in ad hoc networks. paper, we compare the representative via simulation using as criteria efficiency delivery ratio.

10.1109/icc.2003.1204518 article EN 2004-03-30
Coming Soon ...