- Software-Defined Networks and 5G
- Network Traffic and Congestion Control
- Caching and Content Delivery
- Advanced Optical Network Technologies
- Cloud Computing and Resource Management
- Advanced Wireless Network Optimization
- Mobile Ad Hoc Networks
- Security in Wireless Sensor Networks
- Reinforcement Learning in Robotics
- Network Time Synchronization Technologies
- Low-power high-performance VLSI design
- Peer-to-Peer Network Technologies
- Wireless Communication Networks Research
- Embedded Systems and FPGA Design
- Parallel Computing and Optimization Techniques
- Advanced Data Storage Technologies
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Decision-Making Techniques
- Advanced Computational Techniques and Applications
- Advancements in Semiconductor Devices and Circuit Design
- Algorithms and Data Compression
- Electromagnetic Compatibility and Noise Suppression
- Robot Manipulation and Learning
- Satellite Communication Systems
- Evolutionary Algorithms and Applications
Nanjing University of Posts and Telecommunications
2023-2024
Tencent (China)
2024
Huawei Technologies (China)
2017-2022
PRG S&Tech (South Korea)
2014
Tsinghua University
2014
Network virtualization (NV) has extensive and significant applications in cloud computing parallel distributed systems. Virtual network embedding (VNE) is a key issue NV, which an effective means to advance systems' performance. While existing VNE research lacks resource allocation coordination between mappings of different virtual requests, resulting insufficient utilization high overhead. In this article, we propose novel node essentiality evaluation model for data center networks (DCNs),...
Reducing network latency has always been a challenging problem due to the diversity of its potential causes. Though there have many successful solutions, they are limited certain applications or suffering from high resource consumption. In this paper, we propose hybrid architecture which combines existing methods meet low requirements future Internet services. We first make comprehensive survey solutions and employ classical queueing model analyze strengths weaknesses them. Then present our...
Loop Closure Detection (LCD) has been proved to be extremely useful in global consistent visual Simultaneously Localization and Mapping (SLAM) appearance-based robot relocalization. Methods exploiting binary features bag of words representation have recently gained a lot popularity for their efficiency, but suffer from low recall due the inherent drawback that high dimensional feature descriptors lack well-defined centroids. In this paper, we propose realtime LCD approach called MILD...
RDMA over Converged Ethernet (RoCEv2) has been widely deployed to data centers (DCs) for its better compatibility with Ethernet/IP than Infiniband (IB). As cross-DC applications emerge, they also demand high throughput, low latency, and lossless network transmission. However, RoCEv2's underlying mechanism Priority-based Flow Control (PFC) cannot fit into the long-haul transmission scenario degrades performance of RoCEv2. PFC is myopic only considers queue length pause upstream senders, which...
Low Earth Orbit (LEO) satellite networks are gaining more interest as a crucial component of future space-air-ground integrated networks. However, the traditional IP-based communication mode is not well-suited for supporting low-cost and highly reliable routing in inter-satellite packet transmission. On one hand, centralized IP address allocation model increases server resource consumption also leads to excessive between satellites. other single-path feature cannot guarantee timely recovery...
This paper presents a level based clustering routing scheme to solve these problems.There are many protocols for Wireless Sensor Network in the literature, while this studies Low Energy Adaptive Clustering Hierarchy (LEACH) protocol, which is well referred protocol WSN, and put forward its methodology.Every node can have number according their hops Base Station.Then information used select Cluster Head (CH) Second (SCH).Like LEACH, also divided into rounds setup clusters transmit data.But it...
With the popularization of intelligent transport and mobile internet services, vehicles people on board generate increasing amounts data. To match future networks with this use case, tools are needed to analyze requirements set for network. In paper, we study characteristics data traffic in context networked vehicles. We based real-world vehicle traces reported patterns end-user applications Based this, propose a two-level hidden Markov model describe both large small temporal from...