T. B. Richard

ORCID: 0000-0002-9883-5844
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • ICT Impact and Policies
  • Digital Platforms and Economics
  • Caching and Content Delivery
  • Peer-to-Peer Network Technologies
  • Network Traffic and Congestion Control
  • Auction Theory and Applications
  • Cloud Computing and Resource Management
  • Game Theory and Applications
  • Advanced Database Systems and Queries
  • Advanced Data Storage Technologies
  • Cooperative Communication and Network Coding
  • Software-Defined Networks and 5G
  • Blockchain Technology Applications and Security
  • Wireless Networks and Protocols
  • Opportunistic and Delay-Tolerant Networks
  • Consumer Market Behavior and Pricing
  • Smart Grid Energy Management
  • Game Theory and Voting Systems
  • Advanced Wireless Network Optimization
  • Data Management and Algorithms
  • Data Stream Mining Techniques
  • Complex Network Analysis Techniques
  • Electric Vehicles and Infrastructure
  • Covalent Organic Framework Applications
  • Advanced Bandit Algorithms Research

National University of Singapore
2016-2025

Advanced Digital Sciences Center
2012-2017

Digital Science (United States)
2015-2017

University of Illinois Urbana-Champaign
2010-2016

Agency for Science, Technology and Research
2013-2014

Columbia University
2005-2010

Chinese University of Hong Kong
2004-2006

University of Hong Kong
2003

Électricité de France (France)
2002

IBM (United States)
1976

Bloom filter (BF) has been widely used to support membership query, i.e., judge whether a given element x is member of set S or not. Recent years have seen flourish design explosion BF due its characteristic space-efficiency and the functionality constant-time query. The existing reviews surveys mainly focus on applications BF, but fall short in covering current trends, thereby lacking intrinsic understanding their philosophy. To this end, survey provides an overview variants, with emphasis...

10.1109/comst.2018.2889329 article EN IEEE Communications Surveys & Tutorials 2018-12-24

Conventional peer-to-peer (P2P) networks do not provide service differentiation and incentive for users. Therefore, users can easily obtain information without themselves contributing any or to a P2P community. This leads the well known free-riding problem. Consequently, most of requests are directed towards small number nodes which willing share service, causing "tragedy commons." The aim this paper is in network based on amount services each node has provided Since nodes' prior...

10.1109/tnet.2006.882904 article EN IEEE/ACM Transactions on Networking 2006-10-01

Within the current Internet, autonomous ISPs implement bilateral agreements, with each ISP establishing agreements that suit its own local objective to maximize profit. Peering based on views and settlements, while expedient, encourage selfish routing strategies discriminatory interconnections. From a more global perspective, such settlements reduce aggregate profits, limit stability of routes, discourage potentially useful peering/connectivity arrangements, thereby unnecessarily balkanizing...

10.1109/tnet.2010.2049205 article EN IEEE/ACM Transactions on Networking 2010-05-26

Frequency control is essential to maintain the stability and reliability of power grids. For decades, generation side controllers, e.g., governors automatic have been used stabilize frequency systems, which incur high operational costs. In smart grids, utilizing demand response an appealing alternative system at side, can reduce dependency grids on expensive controllers. Despite economic advantages, oscillation problem, occurs when appliances simultaneously respond by varying their...

10.1109/tsg.2014.2316913 article EN IEEE Transactions on Smart Grid 2014-05-09

Android, the most popular mobile OS, has around 78% of market share. Due to its popularity, it attracts many malware attacks. In fact, people have discovered 1 million new samples per quarter, and was reported that over 98% these are in fact "derivatives" (or variants) from existing families. this paper, we first show runtime behaviors malware's core functionalities similar within a family. Hence, propose framework combine "runtime behavior" with "static structures" detect variants. We...

10.1109/tifs.2016.2646641 article EN IEEE Transactions on Information Forensics and Security 2016-12-29

Graph neural networks (GNNs) have been widely used for representation learning on graph data. However, there is limited understanding how much performance GNNs actually gain from This paper introduces a context-surrounding GNN framework and proposes two smoothness metrics to measure the quantity quality of information obtained A new model, called CS-GNN, then designed improve use based values graph. CS-GNN shown achieve better than existing methods in different types real graphs.

10.48550/arxiv.2206.13170 preprint EN other-oa arXiv (Cornell University) 2022-01-01

Traditional peer-to-peer (P2P) networks do not provide service differentiation and incentive for users. Consequently, users can obtain services without themselves contributing any information or to a P2P community. This leads the "free-riding" "tragedy of commons" problems, in which majority requests are directed towards small number nodes willing share their resources. The objective this work is enable network based on amount each node has provided its community, thereby encouraging all We...

10.1145/1005686.1005711 article EN 2004-06-01

Internet service providers (ISPs) depend on one another to provide global network services. However, the profit-seeking nature of ISPs leads selfish behaviors that result in inefficiencies and disputes network. This concern is at heart "network neutrality" debate, which also asks for an appropriate compensation structure satisfies all types ISPs. Our previous work showed a general model Shapley value has several desirable properties, if applied as profit model, would yield globally optimal...

10.1109/tnet.2010.2089533 article EN IEEE/ACM Transactions on Networking 2010-11-17

In a data stream management system (DSMS), users register continuous queries, and receive result updates as arrive expire. We focus on applications with real-time constraints, in which the user must each update within given period after occurs. To handle fast data, DSMS is commonly placed top of cloud infrastructure. Because properties such arrival rates can fluctuate unpredictably, resources be dynamically provisioned scheduled accordingly to ensure response. It essential, for existing...

10.1109/icdcs.2015.49 article EN 2015-06-01

Aloha and its slotted variation are commonly deployed medium access control (MAC) protocols in environments where multiple transmitting devices compete for a medium, yet may have difficulty sensing each other's presence (the "hidden terminal problem''). Competing 802.11 gateways, as well most modern digital cellular systems, like GSM, examples. This paper models evaluates the throughput that can be achieved system nodes bandwidth using generalized version of slotted-Aloha protocols. The...

10.1109/tnet.2008.925633 article EN IEEE/ACM Transactions on Networking 2008-08-04

Internet service providers (ISPs) must interconnect to provide global connectivity users. The payment structure of these interconnections are often negotiated and maintained via bilateral agreements. Current differences opinion in the appropriate revenue model has on occasion caused ISPs de-peer from one another, hindering network availability.

10.1145/1403027.1403041 article EN 2008-08-22

In a stream data analytics system, input arrive continuously and trigger the processing updating of results. We focus on applications with real-time constraints, in which, any unit must be completely processed within given time duration. To handle fast data, it is common to place system top cloud infrastructure. Because properties, such as arrival rates can fluctuate unpredictably, resources dynamically provisioned scheduled accordingly ensure responses. It essential, for existing systems or...

10.1109/tnet.2017.2741969 article EN IEEE/ACM Transactions on Networking 2017-09-01

As Internet traffic grows exponentially due to the pervasive accesses via mobile devices and increasing adoptions of cloud-based applications, broadband providers start shift from flat-rate usage-based pricing, which has gained support regulators such as FCC. We consider generic congestion-prone network services study pricing service under market competition. Based on a novel model that captures users' preferences over price congestion alternatives, we derive induced share equilibrium design...

10.1109/tnet.2015.2500589 article EN IEEE/ACM Transactions on Networking 2015-12-03

In blockchains using the Proof-of-Work (PoW) consensus mechanism, a mining pool is joint group of miners who combine their computational resources and share generated revenue. Similarly, when Proof-of-Stake (PoS) mechanism adopted, staking imitates design by aggregating stakes. However, in PoW blockchains, pooling approach has been criticized to be vulnerable block withholding (BWH) attack. BWH attackers may steal dividends from victims pretending work but making invalid contributions victim...

10.1145/3711704 article EN Proceedings of the ACM on Measurement and Analysis of Computing Systems 2025-03-06

The Bench Dragon is one of the traditional folk activities originating in River Luo region and an annual event southern Chinese provinces cities. Villagers connect bench drills after another to form a dragon, which more than 200 metres long very spectacular. However, dragon will be too close or routes overlap during movement leading accidents. In order reduce injuries, this paper constructs two-dimensional collision model based on spiral motion mechanism curve planning problem study its law,...

10.54097/v6tg9q68 article EN cc-by-nc Highlights in Science Engineering and Technology 2025-03-31

The current peer-to-peer (P2P) information sharing paradigm does not provide incentive and service differentiation for users. Since there is no motivation to share or resources, this leads the "free-riding" "tragedy of commons" problems. We address how one can incorporate into P2P so as encourage users resources. Our mechanism (or protocol) provides with different contribution values connection types. also has some desirable properties: (1) conservation cumulative social utility in...

10.1109/icdcs.2004.1281618 article EN 2004-01-01

Internet service providers (ISPs) depend on one another to provide global network services. However, the profit-seeking nature of ISPs leads selfish behaviors that result in inefficiencies and disputes network. This concern is at heart "network neutrality" debate, which also asks for an appropriate compensation structure satisfies all types ISPs. Our previous work showed a general model Shapley value has several desirable properties, if applied as revenue model, would yield globally optimal...

10.1145/1544012.1544019 article EN 2008-01-01

Network neutrality and the role of regulation on Internet have been heavily debated in recent times. Among various definitions network neutrality, we focus one that prohibits paid prioritization content. We develop a model ecosystem terms three primary players: consumers, ISPs, content providers. analyze this issue from point view consumer target desired system state maximizes utility. By analyzing structures an ISP market, obtain different conclusions desirability regulation. also introduce...

10.1109/tnet.2012.2237412 article EN IEEE/ACM Transactions on Networking 2013-01-23

In this paper, we propose a new distributed frequency control scheme for electric vehicles (EVs) to help restore the power grid upon contingency of supply-demand imbalance. Under our scheme, each EV independently monitors at discrete times and responds by switching among its charging, idle, discharging operational modes according simple threshold-based algorithm. To recover smoothly prevent an undesired overshoot/undershoot due simultaneous response EVs, design inter-response any follow...

10.1109/tste.2015.2494504 article EN IEEE Transactions on Sustainable Energy 2015-11-18

Content distribution, especially the distribution of video content, unavoidably consumes bandwidth resource heavily. Internet content providers (ICP) spend lots money to buy network (CDN) service. By deploying thousands edge servers close end users, CDN companies are able distribute efficiently. In lieu traditional systems, we implement a crowdsourcing-based system, Thunder Crystal, which utilizes agents' upload amplify capacity. Agents well motivated contribute storage and system by rebated...

10.1145/2736084.2736085 article EN 2015-03-18

Telecommunication companies possess mobility information of their phone users, containing accurate locations and velocities commuters travelling in public transportation system. Although the value telecommunication data is well believed under smart city vision, there no existing solution to transform into actionable items for better transportation, mainly due lack appropriate utilization scheme limited processing capability on massive data. This paper presents first ever system...

10.1109/icde.2016.7498348 article EN 2016-05-01

Unlike telephone operators, which pay {\em termination fees} to reach the users of another network, Internet Content Providers (CPs) do not Service (ISPs) they reach. While consequent cross subsidization CPs has nurtured content innovations at edge Internet, it reduces investment incentives for access ISPs expand capacity. As potential charges terminating CPs' traffic are criticized under net neutrality debate, we propose allow voluntarily subsidize usage-based fees induced by their...

10.1145/2674005.2674987 article EN 2014-12-02

As the Internet continues to evolve, traditional peering agreements cannot accommodate changing market conditions. Premium has emerged where access providers (APs) charge content (CPs) for premium services beyond best-effort connectivity. Although prioritized raises concerns about net neutrality, U.S. FCC exempted from its recent ruling, as it falls short of background in context. In this paper, we consider options provided by APs and study whether CPs will choose peer. Based on a novel...

10.1109/jsac.2017.2659038 article EN IEEE Journal on Selected Areas in Communications 2017-01-26

Peer-to-peer (P2P) systems rely on peers' cooperation to provide a more robust and scalable service as compared the traditional client-server architecture. However, peers might be selfish in nature-they would like receive services from others, but not contribute their own resources by default. To conquer this problem, proper incentive schemes are needed so stimulate contributions. In particular, P2P video-on-demand (VoD) systems, need distributively cache videos mutually upload help each...

10.1109/tpds.2013.94 article EN IEEE Transactions on Parallel and Distributed Systems 2013-10-28
Coming Soon ...