- Caching and Content Delivery
- Peer-to-Peer Network Technologies
- Image and Video Quality Assessment
- Network Traffic and Congestion Control
- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Software-Defined Networks and 5G
- Opportunistic and Delay-Tolerant Networks
- Software System Performance and Reliability
- Cloud Computing and Resource Management
- Anomaly Detection Techniques and Applications
- Plant and animal studies
- Image Processing Techniques and Applications
- Advanced Data Storage Technologies
- IPv6, Mobility, Handover, Networks, Security
- Video Coding and Compression Technologies
- Multimedia Communication and Technology
- Plant and Fungal Species Descriptions
- Plant Diversity and Evolution
- Indoor and Outdoor Localization Technologies
- Complex Network Analysis Techniques
- Network Packet Processing and Optimization
- Sparse and Compressive Sensing Techniques
- Cooperative Communication and Network Coding
- Ureteral procedures and complications
Institute of Computing Technology
2016-2025
University of Chinese Academy of Sciences
2008-2025
Shijiazhuang Yiling Pharmaceutical (China)
2025
Chinese Academy of Sciences
2015-2024
Purple Mountain Laboratories
2019-2024
Institute of Botany
2007-2024
International Centre for Theoretical Physics Asia-Pacific
2015-2024
Peking University
2023-2024
Peking University First Hospital
2023-2024
Shandong University of Science and Technology
2022-2023
Abstract Chirita D. Don, a large genus in the subfamily Cyrtandroideae of Gesneriaceae, has been subject much debate whether it is natural group or not. In addition, highly heterogeneous also very problematic with regard to delimitation and subdivision. Here we used nrDNA internal transcribed spacer cpDNA trnL-F for molecular phylogenetic analaysis, combined morphological data. Our results suggest that an artificial, polyphyletic genus. The most important character defines Chirita,...
In this paper, we examine mobile users' behavior and their corresponding video viewing patterns from logs extracted the servers of a large scale VoD system. We focus on analysis main discrepancies that might exist when users access system catalog WiFi or 3G connections. also study factors impact interests popularity. The exhibits strong daily weekly patterns, with being surprisingly spread across almost all categories lengths, independently connection type. However, by examining activity...
Content-centric networking (CCN) is a promising framework to rebuild the Internet's forwarding substrate around concept of content. CCN advocates ubiquitous in-network caching enhance content delivery, and thus each router has storage space cache frequently requested In this work, we focus on allocation problem, namely, how distribute capacity across routers under constrained total budget for network. We first formulate problem as placement obtain optimal solution by two-step method. then...
Depth estimation is an important computer vision problem with many practical applications to mobile devices. While solutions have been proposed for this task, they are usually very computationally expensive and thus not applicable on-device inference. To address problem, we introduce the first Mobile AI challenge, where target develop end-to-end deep learning-based depth that can demonstrate a nearly real-time performance on smartphones IoT platforms. For this, participants were provided new...
ABR algorithms dynamically select the bitrate of chunks based on network capacity. To estimate capacity, most use throughput prediction while recent works start to leverage delivery time prediction. We in this paper examine all components predictor for algorithms, i.e., input features, mapping function and output target. build an automated video streaming measurement platform, collect extensive dataset under various environments, containing 2500+ sessions. Through analysis, we find that...
Low-latency live streaming has imposed stringent latency requirements on video transport networks. In this paper we report the design and operation of Alibaba low-latency network, LiveNet. LiveNet builds a flat CDN overlay with centralized controller for global optimization. As part this, present our routing computation path assignment, as well fast data transmission architecture fine-grained control frames. The performance results obtained from three years demonstrate effectiveness in...
Collabieae (Orchidaceae) is a long neglected tribe with confusing tribal and generic delimitation little-understood phylogenetic relationships. Using plastid matK, psaB, rbcL, trnH-psbA DNA sequences morphological evidence, the relationships within were assessed as basis for revising their delimitation. (including previously misplaced mycoheterotrophic Risleya) supported monophyletic nested superclade that also includes Epidendreae, Podochileae, Cymbidieae Vandeae. Risleya in Collabiinae...
Content Centric Networking (CCN) performance by definition depends on the in-network caching efficiency. We propose CodingCache which utilizes network coding and random forwarding to improve efficiency under multipath forwarding. Its advantage is that existing strategies can be easily incorporated with it for better performance. evaluate extensive simulation experiments China Telecom topology a unique dataset consisting of video access logs from PPTV system. The results demonstrate compared...
The pantropical genus Bauhinia, along with the northern temperate Cercis and several tropical genera, bear bilobate, bifoliolate, or sometimes unifoliolate leaves, which constitute tribe Cercideae as sister to rest of family Leguminosae based on molecular phylogenetics. Hence, fossil record is pivotal understand early evolution biogeographic history legumes. Three species Bauhinia were described from Oligocene Ningming Formation Guangxi, South China. ningmingensis sp. nov. characterized by...
Consistency maintenance mechanism is necessary for the emerging Peer-to-Peer applications due to their frequent data updates. Centralized approaches suffer single point of failure, while previous decentralized incur too many duplicate update messages because locality-ignorant structures. To address this issue, we propose a scalable and efficient consistency scheme heterogeneous P2P systems. Our takes heterogeneity nature into account forms replica nodes key locality-aware hierarchical...
Streaming live content to mobile terminals has become prevalent. While there are extensive measurement studies of non-mobile streaming (and in particular P2P streaming) and video-on-demand (both non-mobile), user behavior systems is yet be explored. This paper relies on over 4 million access logs collected from the PPTV system study viewing activity pattern, with emphasis discrepancies that might exist when users catalog terminals. We observe high rates abandoned sessions for identify...
Open vSwitch (OvS) has been widely used in cloud networks view of its programmability and flexibility. However, we observe a huge performance drop when it loads practical networking services (e.g., tunneling firewalling). Our further analysis reveals that the root cause lies gap between needs supporting various selections packet header fields one-size-fits-all data path vanilla OvS. Motivated by this, design Hoda, high-performance OvS dataplane with multiple specialized paths. Specifically,...
Increasing bandwidth demands of mobile video streaming pose a challenge in optimizing the Quality Experience (QoE) for better user engagement. Multipath transmission promises to extend network capacity by utilizing multiple wireless links simultaneously. Previous studies mainly tune packet scheduler multipath transmission, expecting higher QoE accelerating transmission. However, since Adaptive BitRate (ABR) algorithms overlook impact scheduling on throughput prediction, adaptive can even...
The widespread availability of smart mobile terminals along with the ever increasing bandwidth capabilities has promoted popularity Internet video systems. Understanding geographic features content consumption is an extreme importance for design and performance optimization a delivery system. This paper first step towards characterization patterns large-scale commercial video-on-demand (VoD) system, by measuring both uniformity intensity interests on videos. In particular, we identify...
Cloud storage services are serving a rapidly increasing number of mobile users. However, little is known about the differences between and traditional cloud at scale. In order to understand user access behavior, we analyzed dataset 350 million HTTP request logs from large-scale service. This paper presents our results discusses implications for system design network performance. Our key observation that examined service dominated by uploads, vast majority users rarely retrieve their uploads...
This article presents SOFIA, a service-oriented information-centric networking architecture. SOFIA is designed by exploring the design space between host abstraction and content abstraction. It can facilitate ICN to easily support various applications beyond retrieval. decouples flexible service processing efficient data transmission into two stack layers: network layers. Service requesting driven name processed intermediate routers according rules at layer. Applications build on layer...
Video delivery performance is the main factor that affects Internet video quality. Characterizing performance, especially throughput, can help content providers as well service (ISPs) in system optimization and network planning. Based on a unique dataset consisting of 20 million download speed measurements , this paper comprehensively studies throughput large-scale commercial video-on- demand (VoD) system. We observe user exhibits large variation over time day across provincial locations. In...
In mobile live streaming systems, users have fairly limited interactions with objects due to the constraints coming from devices and event-driven nature of content. The could lead unique user behavior characteristics, which yet be explored. This paper investigates over 9 million access logs collected PPTV system, an emphasis on discrepancies that might exist when catalog nonmobile terminals. We observe a much higher likelihood abandoning sessions by examine structure abandoned perspectives...
The attacks, faults, and severe communication/system conditions in Mobile Crowd Sensing (MCS) make false data detection a critical problem. Observing the intrinsic low dimensionality of general monitoring sparsity data, can be performed based on separation normal anomalies. Although existing algorithm Direct Robust Matrix Factorization (DRMF) is proven to effective, requiring iteratively performing Singular Value Decomposition (SVD) for low-rank matrix approximation would result...