- IoT and Edge/Fog Computing
- Cloud Computing and Resource Management
- IoT Networks and Protocols
- Age of Information Optimization
- Algorithms and Data Compression
- Error Correcting Code Techniques
- Advanced Wireless Communication Techniques
- Open Education and E-Learning
- Coding theory and cryptography
- Software System Performance and Reliability
- graph theory and CDMA systems
- Recommender Systems and Techniques
- Numerical Methods and Algorithms
- Rough Sets and Fuzzy Logic
- Mobile Crowdsensing and Crowdsourcing
- Software Reliability and Analysis Research
- Advanced Decision-Making Techniques
- Advancements in PLL and VCO Technologies
- Tribology and Wear Analysis
- Polymer Nanocomposite Synthesis and Irradiation
- Indoor and Outdoor Localization Technologies
- Cellular Automata and Applications
- Topic Modeling
- Advanced Software Engineering Methodologies
- Context-Aware Activity Recognition Systems
Beijing University of Posts and Telecommunications
2019-2024
Sun Yat-sen University
2023
Tiangong University
2020
Beijing Institute of Technology
2019
Tsinghua University
2012-2017
University of Illinois Urbana-Champaign
2011
Chongqing University of Posts and Telecommunications
2010
Configuration errors (i.e., misconfigurations) are among the dominant causes of system failures. Their importance has inspired many research efforts on detecting, diagnosing, and fixing misconfigurations; such would benefit greatly from a real-world characteristic study misconfigurations. Unfortunately, few studies have been conducted in past, primarily because historical misconfigurations usually not recorded rigorously databases.
Mobile edge computing is emerging as a new paradigm that provides enhanced experience to mobile users via low latency connections and augmented computation capacity. As the amount of user requests time-varying, while capacity hosts limited, Cloud Assisted Edge (CAME) framework introduced improve scalability platform. By outsourcing clouds with various types instances, CAME can accommodate dynamic diverse quality service requirements. In order provide guaranteed services at minimal system...
Mobile edge computing is envisioned as a promising paradigm with the advantage of low latency. However, compared conventional mobile cloud computing, constrained in capacity, especially under scenario dense population. In this paper, we propose Cloud Assisted Edge (CAME) framework, which resources are leased to enhance system capacity. To balance tradeoff between delay and cost, workload scheduling outsourcing further devised. Specifically, analyzed by modeling CAME queuing network....
Abstract Ultra high molecular weight polyethylene (UHMWPE) fiber composite was reinforced by coating a functional layer on the surface of UHMWPE to improve interfacial adhesion between and resin matrix. In this work, tannic acid (TA)‐Na + modified used moisture wettability resin. This approach had advantages being green, sustainable, lossless, low‐cost, industrialized. The characteristics were investigated Fourier transform infrared spectroscopy, X‐ray photoelectron scanning electron...
With the emergence of mobile cloud computing (MCC), an increasingly number applications and services becomes available on devices. In meantime, constrained battery power devices makes a serious impact user experience. As one prevalent type in environments, location based (LBAs) present some inherent limitations surrounding energy. For example, GPS (Global Positioning System) positioning mechanism is well-known to be extremely power-hungry. Due severity issue, considerable researches have...
Mobile edge computing (MEC) is emerging as an effective paradigm which alleviates the conflict between computation-intensive mobile applications and resource-constrained devices. In this paper, a Cloud Assisted Edge (CAME) framework adopted to enhance adaptability of MEC time-varying requests. The resource provisioning problem investigated provide guaranteed quality service (QoS) with minimum system cost. By exploiting piecewise convexity problem, Optimal Resource Provisioning (ORP)...
Deploying large language models (LLMs) inference into mobile devices is cost-efficient for companies, and well addresses the privacy concern of users. However, limited computation capacity memory constraints hinder their practical deployment. Prior work strives to expand model size better accuracy performance, while there a lack systematic understanding "small" sub-10 billion LLMs that are already feasible current commodity devices. To reveal landscape on devices, we conducted comprehensive...
<p>This paper is concerned with the locally constrained ordered statistic decoding (LC-OSD) of binary linear block codes, which a near maximum-likelihood algorithm. Compared conventional OSD, LC-OSD significantly reduces both maximum and average number searches. The former achieved by performing serial list Viterbi algorithm (SLVA) over trellis for local constraints on test error patterns, while latter incorporating tailored early termination criteria. main objective this to explore...
Quantum error-correcting codes (QECCs) are necessary for fault-tolerant quantum computation. Surface a class of topological QECCs that have attracted significant attention due to their exceptional capabilities and easy implementation. In the decoding process surface codes, syndromes crucial error correction, though they not always correctly measured. Most existing algorithms equipped handle erroneous syndrome information or need additional measurements correct with errors, which implies...
The Internet of Things (IoT) depicts a bright future, where any devices having computing capabilities can interact with each other. However, due to limit energy, computing, size, and storage, the security mechanisms for IoT is still in its infancy. In this paper, we focus on requirements device prevent possible physical attacks expose secure data such as user's privacy from device. First, give an architecture model hardware Things, defeat attack that compromises Following this, discuss...
Direct digital frequency synthesis (DDS) as an indispensable key technology for modern communication systems, is widely used in communications, satellite aerospace and high-speed instrumentation. In practical applications, DDS usually required to generate different kinds of signals. view the fact that there no related research on spurious signals when generates signals, this paper based a model can arbitrary symbol rate analyzes structure detail. The conclusions be spur evaluation parameter...
<p>This paper is concerned with the locally constrained ordered statistic decoding (LC-OSD) of binary linear block codes, which a near maximum-likelihood algorithm. Compared conventional OSD, LC-OSD significantly reduces both maximum and average number searches. The former achieved by performing serial list Viterbi algorithm (SLVA) over trellis for local constraints on test error patterns, while latter incorporating tailored early termination criteria. main objective this to explore...