- Caching and Content Delivery
- Peer-to-Peer Network Technologies
- Advanced Wireless Network Optimization
- Blockchain Technology Applications and Security
- Cloud Computing and Resource Management
- Network Traffic and Congestion Control
- Opportunistic and Delay-Tolerant Networks
- Wireless Communication Networks Research
- IPv6, Mobility, Handover, Networks, Security
- Wireless Networks and Protocols
- Software-Defined Networks and 5G
- Advanced MIMO Systems Optimization
- Advanced Optical Network Technologies
- Internet Traffic Analysis and Secure E-voting
- Cooperative Communication and Network Coding
- Mobile Agent-Based Network Management
- Mobile Ad Hoc Networks
- Image and Video Quality Assessment
- Distributed and Parallel Computing Systems
- IoT and Edge/Fog Computing
- Distributed systems and fault tolerance
- Service-Oriented Architecture and Web Services
- Optimization and Search Problems
- Cloud Data Security Solutions
- Advanced Data Storage Technologies
Institute of Computing Technology
2010-2024
Chinese Academy of Sciences
2011-2024
University of Chinese Academy of Sciences
2019-2024
University of Ulster
2024
International Centre for Theoretical Physics Asia-Pacific
2024
Beijing University of Posts and Telecommunications
2016-2024
State Key Laboratory of Information Photonics and Optical Communications
2024
National University of Defense Technology
2024
Shandong University of Finance and Economics
2024
University of Hertfordshire
2017-2023
Bitrate adaptation is critical in ensuring good users' quality-of-experience (QoE) Internet video delivery system. Several efforts have argued that accurate throughput prediction can dramatically improve (1) initial bitrate selection for low startup delay and high resolution; (2) midstream QoE. However, prior ef- forts did not systematically quantify real-world predictability or develop algorithms. To bridge this gap, paper makes three key technical contributions: First, we analyze the...
Mobile cloud offloading migrates heavy computation from mobile devices to remote resources or nearby cloudlets. It is a promising method alleviate the struggle between resource-constrained and resource-hungry applications. Caused by frequently changing location users often see dynamically network conditions which have great impact on perceived application performance. Therefore, making high-quality decisions at run time difficult in environments. To balance energy-delay tradeoff based...
Enterprise-grade permissioned blockchain systems provide a promising infrastructure for data sharing and cooperation between different companies. However, performance bottlenecks seriously hinder the adoption of these in many industrial applications that process complex business logic huge transaction volumes. Our research identifies two key factors limit system performance: 1) At block level, serial dependency inter-block processing severely limits throughput. A new must wait completion all...
Sharding is one of the most promising technologies for significantly increasing blockchain transaction throughput. However, as number shards increases, ratio cross-shard transactions in existing sharding protocols gradually approaches 100%. Since consume many times more resources than intra-shard transactions, processing overhead already accounts majority total system. There a very large gap between throughput system and its theoretical upper limit. In this article, we propose Estuary, novel...
Even though a key driver for Information-Centric Networking (ICN) has been the rise in Internet video traffic, there surprisingly little work on analyzing interplay between ICN and ? which caching strategies well work- loads how helps improve video-centric quality of experience (QoE). In this work, we bridge disconnect with trace- driven study using 196M requests from over 16M users country-wide topology 80K routers. We evaluate broad space content replacement (e.g., LRU, LFU, FIFO)...
High-speed rail (HSR) systems potentially provide a more efficient way of door-to-door transportation than airplane. However, they also pose unprecedented challenges in delivering seamless Internet service for on-board passengers. In this paper, we conduct large-scale active-passive measurement study TCP performance over LTE on HSR. Our targets the HSR routes China operating at above 300 km/h. We performed extensive data collection through both controlled setting and passive monitoring,...
Information-centric networking (ICN) is designed to decouple contents from hosts at the network layer, using in-network caching as a key feature improve overall performance. However, en-route strategy used in many ICN implementations generally yields redundancies cached across different routers. There are also some recent works focusing on cache optimization by respectively exploiting either application layer or which we think not sufficient increase hit rate and reduce traffic. In this...
The network resource competition of today' data enters is extremely intense between long-lived elephant flows and latency-sensitive mice flows. Achieving both goals high throughput low latency respectively for the two types requires compromise, which recent research has not successfully solved mainly due to transfer on shared links without any differentiation. However, current usually adopt clos-based topology, e.g. Fat-tree/VL2, so there exist multiple shortest paths pair source...
Broadcasting plays a vital role in the consensus mechanisms of blockchain systems, since each block must wait until previous is received by (nearly) all nodes systems. Therefore, optimizing performance broadcasting can significantly improve system. However, compared with other traditional P2P applications such as file downloading or video delivery, has two new requirements, namely low redundancy and propagation latency, which existing (e.g. flooding, structural DHT etc.) not meet well. In...
In the Interplanetary File System (IPFS), consumers can help each other protect data against hardware failures and improve availability through replication. While previous replication methods in peer-to-peer (P2P) networks be used to increase IPFS network, they are either hostile peers with limited availability, preventing them from achieving adequate or lack flexibility. An ideal method should optimize a manner equitable all while providing To achieve this goal, paper introduces...
Abstract Drinks and foods may be thickened to improve swallowing safety for dysphagia patients, but the resultant consistencies are not always palatable. Characterising alternative appetising is an important task. The study aims characterise in vitro behaviour of specifically formulated fluids containing xanthan gum and/or starch with standard jellies yoghurt using a validated mechanical model, “Cambridge Throat”. Observing from side, model throat can follow experimental oral transit time...
In this paper, we tackle the packet scheduling problem in IEEE 802.16e wireless metropolitan area network (WMAN), where Sleep Mode is applied to save energy of mobile stations (MSs). Our objective design an efficient policy which works closely with sleep mode mechanism so as maximize battery lifetime MSs. To best our knowledge no power saving algorithms based on defined have been proposed far literature. We propose a longest virtual burst first (LVBF) algorithm schedules packets MSs there...
Mobile video is becoming extremely popular, and P2P mobile platforms are being considered for large-scale deployment in this context. However, the design of realistic systems have to consider specific characteristics networks. In article, we look from viewpoint a commercial provider system, PPTV, describe implementation challenges system over 3G Our analysis backed by real measurements experience PPTV. We extract these videos analyze their impact on systems. also briefly discuss other...
The blockchain technology has been applied to wide areas. However, the open and transparent properties of blockchains pose serious challenges users' privacy. Among all schemes for privacy protection, zero-knowledge proof algorithm conceals most private information in a transaction, while participants can validate this transaction without information. current are only aimed at with UTXO model, one type assets circulates on these blockchains. Based algorithm, paper proposes protection scheme...
The advances in wireless communications and mobile devices have resulted a massive growth of the video services over networks. In this article, we study potential peer-assisted delivery WiFi networks aimed at reducing servers¿ load. Our is based on real measurement viewing logs from leading Internet provider for 14 days. We analyze behavior users with respect to three main factors design network: time, user population, locality. then discuss implications observations. Finally, apply findings...
The advent of software defined networking enables flexible, reliable and feature-rich control planes for data center networks. However, the tight coupling centralized complete visibility leads to a wide range issues among which scalability has risen prominence due excessive workload on central controller. By analyzing traffic patterns from couple production centers, we observe that is usually highly skewed thus edge switches can be clustered into set communication-intensive groups according...
research-article Share on Blockchain in China Authors: Liang Cai Zhejiang University, Hangzhou, ChinaView Profile , Yi Sun Chinese Academy of Sciences, Beijing, Zibin Zheng Yat-sen Guangzhou, Jiang Xiao Huazhong University Science and Technology, Wuhan, Weiwei Qiu Hangzhou Qulian Technology Ltd., Authors Info & Claims Communications the ACMVolume 64Issue 11November 2021 pp 88–93https://doi.org/10.1145/3481627Published:25 October 2021Publication History 4citation6,430DownloadsMetricsTotal...