- Software-Defined Networks and 5G
- Caching and Content Delivery
- Network Traffic and Congestion Control
- Cloud Computing and Resource Management
- Mobile Ad Hoc Networks
- Security in Wireless Sensor Networks
- Energy Efficient Wireless Sensor Networks
- Advanced Data Storage Technologies
- Distributed systems and fault tolerance
- Network Packet Processing and Optimization
- Analog and Mixed-Signal Circuit Design
- IoT-based Smart Home Systems
- Anomaly Detection Techniques and Applications
- Statistical Methods and Inference
- Sensor Technology and Measurement Systems
- Advanced Chemical Sensor Technologies
- SARS-CoV-2 detection and testing
- Advanced Authentication Protocols Security
- Peer-to-Peer Network Technologies
- Internet Traffic Analysis and Secure E-voting
- Data Visualization and Analytics
- SARS-CoV-2 and COVID-19 Research
- Transportation Planning and Optimization
- Traffic Prediction and Management Techniques
- Vehicular Ad Hoc Networks (VANETs)
Xi’an University of Posts and Telecommunications
2024
Institute of Acoustics
2022-2023
Chinese Academy of Sciences
2022-2023
University of Chinese Academy of Sciences
2022-2023
Academy of Mathematics and Systems Science
2023
National Center for Mathematics and Interdisciplinary Sciences
2023
Tsinghua University
2014-2015
Illinois Institute of Technology
2015
Beijing University of Posts and Telecommunications
2015
Simon Fraser University
2014
In order to improve the scalability and reliability of Software Defined Networking (SDN), many studies use multiple controllers constitute logically centralized control plane provide load balancing fail over. this paper, we develop a fexible dormant multi-controller model based on architecture. The allows part enter state under light traffc condition for saving system cost. Meanwhile, through queueing analysis, various performance measures can be obtained. Moreover, analyze real traffic...
The network resource allocation in SDN for control applications is becoming a key problem the near future because of conflict between need flow-level flexibility and limited capacity flow table. Based on analysis difference definition traditional IP network, idea integrated link bandwidth table multiple proposed this paper. Furthermore, price-based joint model built by introducing price each resources, which can get proportional fair minimum global delay at same time. We have also designed...
The network resource allocation in SDN for control applications is becoming a key problem the near future because of conflict between need flow-level flexibility and limited capacity flow table. Based on analysis difference definition traditional IP network, idea integrated link bandwidth table multiple proposed this paper. Furthermore, price-based joint model built by introducing price each resources, which can get proportional fair minimum global delay at same time. We have also designed...
Owing to the extreme parallelism and high component failure rates of tomorrow's exascale, high-performance computing (HPC) system software will need be scalable, failure-resistant, adaptive for sustained operation full utilizations. Many existing HPC are still designed around a centralized server paradigm hence susceptible scaling issues single points failure. In this article, we explore design tradeoffs scalable at scales. We propose general taxonomy by deconstructing common into their...
Wireless Sensor Network is an important part of the Internet Things. Data privacy preservation in wireless sensor networks extremely urgent and challenging. To address this problem, we propose paper a privacy-preserving data aggregation protocol networks. Compared to previous research, our protects actual from other nodes based on rotation scheme while reducing communication overhead dramatically. The achieves accurate results. Finally, theoretical analysis simulation results confirm high...
Due to the battery limitation of wireless sensor network (WSN), there is imperative requirement energy saving and optimization in practical application WSN. In order optimize WSN, this paper, a stochastic model for WSN proposed. The based on continuous time Markovian decision processes (CMDP) machine spans both consumption ensued transition costs. We use PRISM analyze CMDP strategies devices as formal framework. Simulation experiment carried out evaluate with given performance criteria....
Piggybacking design has been applied extensively in distributed storage systems recent years, since it can reduce repair bandwidth significantly with small sub-packetization. In this work, we propose a bidirectional piggybacking (BPD) sub-packetization l = r, where r n − k equals the redundancy of an [n,k] linear code. Unlike most existing designs, there is no distinction between systematic nodes and parity BPD piggybacks are added bidirectionally. Consequently, leads to lower average than...
In order to facilitate the transition between networks and integration of heterogeneous networks, underlying link design current mainstream Information-Centric Networking (ICN) still considers characteristics general network extends customized ICN protocol on this basis. This requires that transmission equipment can not only distinguish packets but also support identification ICN-specific protocols. However, traditional parsers are designed for specific application scenarios, it is difficult...
Network monitoring is important to improve network performance and security. The separation of the data plane control SDN gives flexibility. This flexibility facilitates management rise need for accurate fine-grained networks. However, traditional software-based flow cannot easily keep up with today’s high-speed networks such as 100 GbE, even help high-performance frameworks DPDK. To meet networks, an hardware-based monitor design presented in this paper. In our design, FPGA-based pipelined...
This study addresses the prediction of CAN bus data, a lesser-explored aspect within unsupervised anomaly detection research. We propose Fast-Gated Attention (FGA) Transformer, novel approach designed for accurate and efficient data. model utilizes cross-attention window to optimize computational scale feature extraction, gated single-head attention mechanism in place multi-head attention, shared parameters minimize size. Additionally, generalized unbiased linear approximation technique...
Transmission Control Protocol (TCP) is a connection-oriented data transmission protocol, and it also the main communication protocol used for end-to-end in current Internet. At present, mainstream TCP processing service implemented by software running on Central Processing Unit (CPU). However, with rapid growth of bandwidth number connections, software-based method not ideal terms delay throughput, affects performance CPU other applications such as virtualization services. Moreover, hardware...
In this paper, we propose authentication protocols for 802.11s mesh networks, which support the point's fast handoff between Mesh key distributors (MKDs). The consist of initial protocol (IAP) and (FHAP). Once a MP firstly accesses will be executed, realizes mutual keys confirmation among MP, MKD server (AS). When moves from current to another, that can performed locally without contact with AS, is proposed. simulation results indicate latency our less than scheme in.
Recent studies have investigated a novel software paradigm that enables program decomposition and dynamic partitioning for cloud gaming system. Among the challenges proposed architecture, to design implement decomposed software, which follows platform's specification, is most critical in practice. In this work, we investigate fundamental application scenario, 3D skeletal game engine, often used animate avatars. A graphics demo developed demonstrate feasibility of system, while experiments...
Abstract Background The emergency of new COVID-19 variants over the past three years posed a serious challenge to public health. Cities in China implemented mass daily RT-PCR tests by pooling strategies. However, random delay exists between an infection and its first positive test. It is valuable for disease control know pattern incidences reconstructed from test observations. Methods We formulated convolution model counts as linear inverse problem with positivity restrictions. Consequently,...
The P2P technology makes it possible that the number of clients can be infinite, while still has some problems. Under free riding model, someone always shut down services to others immediately after downloaded he wanted, which will influence continue service and cause instability fluctuation. In this paper, a robust architecture, cactus-architecture, is proposed, avoid system fluctuation caused by new joining nodes or departing nodes. A incentive mechanism introduced, well motivate providing service.