Xiao Ma

ORCID: 0000-0002-9504-3702
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Cloud Computing and Resource Management
  • IoT Networks and Protocols
  • Age of Information Optimization
  • Algorithms and Data Compression
  • Error Correcting Code Techniques
  • Advanced Wireless Communication Techniques
  • Open Education and E-Learning
  • Coding theory and cryptography
  • Software System Performance and Reliability
  • graph theory and CDMA systems
  • Recommender Systems and Techniques
  • Numerical Methods and Algorithms
  • Rough Sets and Fuzzy Logic
  • Mobile Crowdsensing and Crowdsourcing
  • Software Reliability and Analysis Research
  • Advanced Decision-Making Techniques
  • Advancements in PLL and VCO Technologies
  • Tribology and Wear Analysis
  • Polymer Nanocomposite Synthesis and Irradiation
  • Indoor and Outdoor Localization Technologies
  • Cellular Automata and Applications
  • Topic Modeling
  • Advanced Software Engineering Methodologies
  • Context-Aware Activity Recognition Systems

Beijing University of Posts and Telecommunications
2019-2024

Sun Yat-sen University
2023

Tiangong University
2020

Beijing Institute of Technology
2019

Tsinghua University
2012-2017

University of Illinois Urbana-Champaign
2011

Chongqing University of Posts and Telecommunications
2010

Configuration errors (i.e., misconfigurations) are among the dominant causes of system failures. Their importance has inspired many research efforts on detecting, diagnosing, and fixing misconfigurations; such would benefit greatly from a real-world characteristic study misconfigurations. Unfortunately, few studies have been conducted in past, primarily because historical misconfigurations usually not recorded rigorously databases.

10.1145/2043556.2043572 article EN 2011-10-23

Mobile edge computing is emerging as a new paradigm that provides enhanced experience to mobile users via low latency connections and augmented computation capacity. As the amount of user requests time-varying, while capacity hosts limited, Cloud Assisted Edge (CAME) framework introduced improve scalability platform. By outsourcing clouds with various types instances, CAME can accommodate dynamic diverse quality service requirements. In order provide guaranteed services at minimal system...

10.1109/tcc.2019.2903240 article EN IEEE Transactions on Cloud Computing 2019-03-05

Mobile edge computing is envisioned as a promising paradigm with the advantage of low latency. However, compared conventional mobile cloud computing, constrained in capacity, especially under scenario dense population. In this paper, we propose Cloud Assisted Edge (CAME) framework, which resources are leased to enhance system capacity. To balance tradeoff between delay and cost, workload scheduling outsourcing further devised. Specifically, analyzed by modeling CAME queuing network....

10.1109/iwqos.2017.7969148 article EN 2017-06-01

Abstract Ultra high molecular weight polyethylene (UHMWPE) fiber composite was reinforced by coating a functional layer on the surface of UHMWPE to improve interfacial adhesion between and resin matrix. In this work, tannic acid (TA)‐Na + modified used moisture wettability resin. This approach had advantages being green, sustainable, lossless, low‐cost, industrialized. The characteristics were investigated Fourier transform infrared spectroscopy, X‐ray photoelectron scanning electron...

10.1002/pc.25483 article EN Polymer Composites 2020-01-03

With the emergence of mobile cloud computing (MCC), an increasingly number applications and services becomes available on devices. In meantime, constrained battery power devices makes a serious impact user experience. As one prevalent type in environments, location based (LBAs) present some inherent limitations surrounding energy. For example, GPS (Global Positioning System) positioning mechanism is well-known to be extremely power-hungry. Due severity issue, considerable researches have...

10.1016/j.procs.2012.06.074 article EN Procedia Computer Science 2012-01-01

Mobile edge computing (MEC) is emerging as an effective paradigm which alleviates the conflict between computation-intensive mobile applications and resource-constrained devices. In this paper, a Cloud Assisted Edge (CAME) framework adopted to enhance adaptability of MEC time-varying requests. The resource provisioning problem investigated provide guaranteed quality service (QoS) with minimum system cost. By exploiting piecewise convexity problem, Optimal Resource Provisioning (ORP)...

10.1109/glocom.2017.8254704 article EN GLOBECOM 2022 - 2022 IEEE Global Communications Conference 2017-12-01

Deploying large language models (LLMs) inference into mobile devices is cost-efficient for companies, and well addresses the privacy concern of users. However, limited computation capacity memory constraints hinder their practical deployment. Prior work strives to expand model size better accuracy performance, while there a lack systematic understanding "small" sub-10 billion LLMs that are already feasible current commodity devices. To reveal landscape on devices, we conducted comprehensive...

10.1145/3662006.3662059 article EN 2024-06-03

<p>This paper is concerned with the locally constrained ordered statistic decoding (LC-OSD) of binary linear block codes, which a near maximum-likelihood algorithm. Compared conventional OSD, LC-OSD significantly reduces both maximum and average number searches. The former achieved by performing serial list Viterbi algorithm (SLVA) over trellis for local constraints on test error patterns, while latter incorporating tailored early termination criteria. main objective this to explore...

10.36227/techrxiv.22771085.v1 preprint EN cc-by-nc-sa 2023-05-11

Quantum error-correcting codes (QECCs) are necessary for fault-tolerant quantum computation. Surface a class of topological QECCs that have attracted significant attention due to their exceptional capabilities and easy implementation. In the decoding process surface codes, syndromes crucial error correction, though they not always correctly measured. Most existing algorithms equipped handle erroneous syndrome information or need additional measurements correct with errors, which implies...

10.48550/arxiv.2409.06979 preprint EN arXiv (Cornell University) 2024-09-10

The Internet of Things (IoT) depicts a bright future, where any devices having computing capabilities can interact with each other. However, due to limit energy, computing, size, and storage, the security mechanisms for IoT is still in its infancy. In this paper, we focus on requirements device prevent possible physical attacks expose secure data such as user's privacy from device. First, give an architecture model hardware Things, defeat attack that compromises Following this, discuss...

10.12783/dtcse/wcne2016/5146 article EN DEStech Transactions on Computer Science and Engineering 2016-01-01

Direct digital frequency synthesis (DDS) as an indispensable key technology for modern communication systems, is widely used in communications, satellite aerospace and high-speed instrumentation. In practical applications, DDS usually required to generate different kinds of signals. view the fact that there no related research on spurious signals when generates signals, this paper based a model can arbitrary symbol rate analyzes structure detail. The conclusions be spur evaluation parameter...

10.1109/itnec.2019.8729380 article EN 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2019-03-01

<p>This paper is concerned with the locally constrained ordered statistic decoding (LC-OSD) of binary linear block codes, which a near maximum-likelihood algorithm. Compared conventional OSD, LC-OSD significantly reduces both maximum and average number searches. The former achieved by performing serial list Viterbi algorithm (SLVA) over trellis for local constraints on test error patterns, while latter incorporating tailored early termination criteria. main objective this to explore...

10.36227/techrxiv.22771085 preprint EN cc-by-nc-sa 2023-05-11
Coming Soon ...