John C. S. Lui

Orcid: 0000-0001-7466-0384

Affiliations:
  • Chinese University of Hong Kong, Department of Computer Science and Engineering, Hong Kong
  • University of California at Los Angeles, CA, USA (PhD)


According to our database1, John C. S. Lui authored at least 494 papers between 1990 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2010, "For contributions to performance modeling and analysis of storage communication systems and peer-to-peer networks".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Next-Word Prediction: A Perspective of Energy-Aware Distributed Inference.
IEEE Trans. Mob. Comput., May, 2024

Achieving Multi-Time-Step Segment Routing via Traffic Prediction and Compressive Sensing Techniques.
IEEE Trans. Netw. Serv. Manag., April, 2024

Online Learning Aided Decentralized Multi-User Task Offloading for Mobile Edge Computing.
IEEE Trans. Mob. Comput., April, 2024

Analyzing Queueing Problems via Bandits With Linear Reward & Nonlinear Workload Fairness.
IEEE Trans. Mob. Comput., April, 2024

UAV-Assisted Task Offloading in Vehicular Edge Computing Networks.
IEEE Trans. Mob. Comput., April, 2024

Joint Service Caching, Resource Allocation and Task Offloading for MEC-Based Networks: A Multi-Layer Optimization Approach.
IEEE Trans. Mob. Comput., April, 2024

Mean Field Graph Based D2D Collaboration and Offloading Pricing in Mobile Edge Computing.
IEEE/ACM Trans. Netw., February, 2024

HandKey: Knocking-Triggered Robust Vibration Signature for Keyless Unlocking.
IEEE Trans. Mob. Comput., January, 2024

Optimal Transport-Based One-Shot Federated Learning for Artificial Intelligence of Things.
IEEE Internet Things J., January, 2024

Variance-Dependent Regret Bounds for Non-stationary Linear Bandits.
CoRR, 2024

Federated Contextual Cascading Bandits with Asynchronous Communication and Heterogeneous Users.
CoRR, 2024

Fed-CVLC: Compressing Federated Learning Communications with Variable-Length Codes.
CoRR, 2024

MinFlow: High-performance and Cost-efficient Data Passing for I/O-intensive Stateful Serverless Analytics.
Proceedings of the 22nd USENIX Conference on File and Storage Technologies, 2024

Online Search with Predictions: Pareto-optimal Algorithm and its Applications in Energy Markets.
Proceedings of the 15th ACM International Conference on Future and Sustainable Energy Systems, 2024

Federated Contextual Cascading Bandits with Asynchronous Communication and Heterogeneous Users.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Cooperation Preference Aware Shapley Value: Modeling, Algorithms and Applications.
IEEE/ACM Trans. Netw., December, 2023

Enabling Distributed and Optimal RDMA Resource Sharing in Large-Scale Data Center Networks: Modeling, Analysis, and Implementation.
IEEE/ACM Trans. Netw., December, 2023

Multi-Objective Parallel Task Offloading and Content Caching in D2D-Aided MEC Networks.
IEEE Trans. Mob. Comput., November, 2023

An Incentive Auction for Heterogeneous Client Selection in Federated Learning.
IEEE Trans. Mob. Comput., October, 2023

PupilHeart: Heart Rate Variability Monitoring via Pupillary Fluctuations on Mobile Devices.
IEEE Internet Things J., October, 2023

Learning With Guarantee Via Constrained Multi-Armed Bandit: Theory and Network Applications.
IEEE Trans. Mob. Comput., September, 2023

Quantum Best Arm Identification.
SIGMETRICS Perform. Evaluation Rev., September, 2023

The First Workshop on Quantum Systems and Computations (2023).
SIGMETRICS Perform. Evaluation Rev., September, 2023

Optimizing recommendations under abandonment risks: Models and algorithms.
Perform. Evaluation, September, 2023

Generalized Contextual Bandits With Latent Features: Algorithms and Applications.
IEEE Trans. Neural Networks Learn. Syst., August, 2023

Stable Service Caching in MECs of Hierarchical Service Markets With Uncertain Request Rates.
IEEE Trans. Mob. Comput., July, 2023

Online Optimal Service Selection, Resource Allocation and Task Offloading for Multi-Access Edge Computing: A Utility-Based Approach.
IEEE Trans. Mob. Comput., July, 2023

Decentralized Scheduling and Dynamic Pricing for Edge Computing: A Mean Field Game Approach.
IEEE/ACM Trans. Netw., June, 2023

Accelerating Distributed DNN Training via Transport Layer Scheduling.
IEEE Trans. Parallel Distributed Syst., May, 2023

Common Neighbors Matter: Fast Random Walk Sampling With Common Neighbor Awareness.
IEEE Trans. Knowl. Data Eng., May, 2023

Towards High Performance and Efficient Memory Deduplication via Mixed Pages.
IEEE Trans. Computers, April, 2023

Dynamic Pricing and Placing for Distributed Machine Learning Jobs: An Online Learning Approach.
IEEE J. Sel. Areas Commun., April, 2023

Optimizing Random Walk Based Statistical Estimation Over Graphs via Bootstrapping.
IEEE Trans. Knowl. Data Eng., March, 2023

DiffForward: On Balancing Forwarding Traffic for Modern Cloud Block Services via Differentiated Forwarding.
Proc. ACM Meas. Anal. Comput. Syst., March, 2023

Pricing Social Visibility Service in Online Social Networks: Modeling and Algorithms.
IEEE Trans. Netw. Sci. Eng., 2023

Quantifying Worker Reliability for Crowdsensing Applications: Robust Feedback Rating and Convergence.
IEEE Trans. Mob. Comput., 2023

Online Zero-Cost Learning: Optimizing Large Scale Network Rare Threats Simulation.
IEEE Trans. Mob. Comput., 2023

Task Offloading for Cloud-Assisted Fog Computing With Dynamic Service Caching in Enterprise Management Systems.
IEEE Trans. Ind. Informatics, 2023

Task Co-Offloading for D2D-Assisted Mobile Edge Computing in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2023

Enhancing Sybil Detection via Social-Activity Networks: A Random Walk Approach.
IEEE Trans. Dependable Secur. Comput., 2023

Dynamic GPU Scheduling With Multi-Resource Awareness and Live Migration Support.
IEEE Trans. Cloud Comput., 2023

Joint Client Selection and Receive Beamforming for Over-the-Air Federated Learning With Energy Harvesting.
IEEE Open J. Commun. Soc., 2023

LiveProbe: Exploring Continuous Voice Liveness Detection via Phonemic Energy Response Patterns.
IEEE Internet Things J., 2023

Classical simulation of one-query quantum distinguishers.
Electron. Colloquium Comput. Complex., 2023

Adversarial Attacks on Cooperative Multi-agent Bandits.
CoRR, 2023

Online Corrupted User Detection and Regret Minimization.
CoRR, 2023

Online Clustering of Bandits with Misspecified User Models.
CoRR, 2023

Cooperative Multi-agent Bandits: Distributed Algorithms with Optimal Individual Regret and Constant Communication Costs.
CoRR, 2023

Contextual Combinatorial Bandits with Probabilistically Triggered Arms.
CoRR, 2023

Interactive Log Parsing via Light-weight User Feedbacks.
CoRR, 2023

Applying the Quantum Error-correcting Codes for Fault-tolerant Blind Quantum Computation.
CoRR, 2023

Interactive Log Parsing via Light-weight User Feedback.
Proceedings of the ACM Web Conference 2023, 2023

Exploration for Free: How Does Reward Heterogeneity Improve Regret in Cooperative Multi-agent Bandits?
Proceedings of the Uncertainty in Artificial Intelligence, 2023

Uncertainty-Aware Instance Reweighting for Off-Policy Learning.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Online Corrupted User Detection and Regret Minimization.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Online Clustering of Bandits with Misspecified User Models.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Multi-Fidelity Multi-Armed Bandits Revisited.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Block Broyden's Methods for Solving Nonlinear Equations.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Communication Efficient Distributed Newton Method with Fast Convergence Rates.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Variance-Adaptive Algorithm for Probabilistic Maximum Coverage Bandits with General Feedback.
Proceedings of the IEEE INFOCOM 2023, 2023

A Survey of Federated Evaluation in Federated Learning.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Scalable Compositional Static Taint Analysis for Sensitive Data Tracing on Industrial Micro-Services.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2023

Contextual Combinatorial Bandits with Probabilistically Triggered Arms.
Proceedings of the International Conference on Machine Learning, 2023

Achieving Near-Optimal Individual Regret & Low Communications in Multi-Agent Bandits.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

LightTraffic: On Optimizing CPU-GPU Data Traffic for Efficient Large-scale Random Walks.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Data-Driven Rate Control for RDMA Networks: A Lightweight Online Learning Approach.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

IoT Anomaly Detection Via Device Interaction Graph.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

On-Demand Communication for Asynchronous Multi-Agent Bandits.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2023

Efficient Explorative Key-Term Selection Strategies for Conversational Contextual Bandits.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Resource management in UAV-assisted MEC: state-of-the-art and open challenges.
Wirel. Networks, 2022

G-thinker: a general distributed framework for finding qualified subgraphs in a big graph with load balancing.
VLDB J., 2022

Toward Fast and Scalable Random Walks over Disk-Resident Graphs via Efficient I/O Management.
ACM Trans. Storage, 2022

Approximate and Deployable Shortest Remaining Processing Time Scheduler.
IEEE/ACM Trans. Netw., 2022

Towards Personalized Privacy-Preserving Truth Discovery Over Crowdsourced Data Streams.
IEEE/ACM Trans. Netw., 2022

Inferring Hidden IoT Devices and User Interactions via Spatial-Temporal Traffic Fingerprinting.
IEEE/ACM Trans. Netw., 2022

Optimizing Social Visibility in OSNs With Anonymity Guarantees: Efficient Algorithms and Applications.
IEEE Trans. Netw. Sci. Eng., 2022

A Reinforcement Learning Approach to Price Cloud Resources With Provable Convergence Guarantees.
IEEE Trans. Neural Networks Learn. Syst., 2022

Online Task Offloading for 5G Small Cell Networks.
IEEE Trans. Mob. Comput., 2022

Mobile Data Traffic Prediction by Exploiting Time-Evolving User Mobility Patterns.
IEEE Trans. Mob. Comput., 2022

Rewarding Social Recommendation in OSNs: Empirical Evidences, Modeling and Optimization.
IEEE Trans. Knowl. Data Eng., 2022

Improving Bandit Learning Via Heterogeneous Information Networks: Algorithms and Applications.
ACM Trans. Knowl. Discov. Data, 2022

Quantum Networks with Multiple Service Providers: Transport Layer Protocols and Research Opportunities.
IEEE Netw., 2022

Toward Large-Scale Hybrid Edge Server Provision: An Online Mean Field Learning Approach.
IEEE J. Sel. Areas Commun., 2022

PupilRec: Leveraging Pupil Morphology for Recommending on Smartphones.
IEEE Internet Things J., 2022

Pareto-Optimal Learning-Augmented Algorithms for Online k-Search Problems.
CoRR, 2022

LPC-AD: Fast and Accurate Multivariate Time Series Anomaly Detection via Latent Predictive Coding.
CoRR, 2022

A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses.
IEEE Commun. Surv. Tutorials, 2022

Topology-theoretic approach to address attribute linkage attacks in differential privacy.
Comput. Secur., 2022

TinyQMIX: Distributed Access Control for mMTC via Multi-agent Reinforcement Learning.
Proceedings of the 96th Vehicular Technology Conference, 2022

Federated online clustering of bandits.
Proceedings of the Uncertainty in Artificial Intelligence, 2022

Zigbee's Network Rejoin Procedure for IoT Systems: Vulnerabilities and Implications.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Batch-Size Independent Regret Bounds for Combinatorial Semi-Bandits with Probabilistically Triggered Arms or Independent Arms.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Achieving efficiency via fairness in online resource allocation.
Proceedings of the MobiHoc '22: The Twenty-third International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, Seoul, Republic of Korea, October 17, 2022

Partial-Quasi-Newton Methods: Efficient Algorithms for Minimax Optimization Problems with Unbalanced Dimensionality.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

A Control-Theoretic and Online Learning Approach to Self-Tuning Queue Management.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

Distributed Bandits with Heterogeneous Agents.
Proceedings of the IEEE INFOCOM 2022, 2022

Decentralized Task Offloading in Edge Computing: A Multi-User Multi-Armed Bandit Approach.
Proceedings of the IEEE INFOCOM 2022, 2022

Multi-Player Multi-Armed Bandits with Finite Shareable Resources Arms: Learning Algorithms & Applications.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Towards Fast Large-scale Graph Analysis via Two-dimensional Balanced Partitioning.
Proceedings of the 51st International Conference on Parallel Processing, 2022

Reposting Service in Online Social Networks: Modeling and Online Incentive Protocols.
Proceedings of the 30th IEEE International Conference on Network Protocols, 2022

Towards the Full Extensibility of Multipath TCP with eMPTCP.
Proceedings of the 30th IEEE International Conference on Network Protocols, 2022

Multiple-Play Stochastic Bandits with Shareable Finite-Capacity Arms.
Proceedings of the International Conference on Machine Learning, 2022

Energy Harvesting Aware Client Selection for Over-the-Air Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2022

Detecting Cross-language Memory Management Issues in Rust.
Proceedings of the Computer Security - ESORICS 2022, 2022

Online Competitive Influence Maximization.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022

2021
Learning to count: A deep learning framework for graphlet count estimation.
Netw. Sci., October, 2021

Online VNF Chaining and Predictive Scheduling: Optimality and Trade-Offs.
IEEE/ACM Trans. Netw., 2021

Streaming Algorithms for Estimating High Set Similarities in LogLog Space.
IEEE Trans. Knowl. Data Eng., 2021

Understanding Persuasion Cascades in Online Product Rating Systems: Modeling, Analysis, and Inference.
ACM Trans. Knowl. Discov. Data, 2021

On Modeling Influence Maximization in Social Activity Networks under General Settings.
ACM Trans. Knowl. Discov. Data, 2021

Jointly Optimizing Throughput and Content Delivery Cost Over Lossy Cache Networks.
IEEE Trans. Commun., 2021

Affinity-Aware VNF Placement in Mobile Edge Clouds via Leveraging GPUs.
IEEE Trans. Computers, 2021

The Online Knapsack Problem with Departures.
Proc. ACM Meas. Anal. Comput. Syst., 2021

Tracking triadic cardinality distributions for burst detection in high-speed graph streams.
Knowl. Inf. Syst., 2021

Dynamic online convex optimization with long-term constraints via virtual queue.
Inf. Sci., 2021

Decentralized Stochastic Proximal Gradient Descent with Variance Reduction over Time-varying Networks.
CoRR, 2021

Unifying Offline Causal Inference and Online Bandit Learning for Data Driven Decision.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Cooperative Stochastic Bandits with Asynchronous Agents and Constrained Feedback.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

An Online Mean Field Approach for Hybrid Edge Server Provision.
Proceedings of the MobiHoc '21: The Twenty-second International Symposium on Theory, 2021

Designing Approximate and Deployable SRPT Scheduler: A Unified Framework.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Joint D2D Collaboration and Task Offloading for Edge Computing: A Mean Field Graph Approach.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Multi-layered Network Exploration via Random Walks: From Offline Optimization to Online Learning.
Proceedings of the 38th International Conference on Machine Learning, 2021

Social Visibility Optimization in OSNs with Anonymity Guarantees: Modeling, Algorithms and Applications.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

Heterogeneous Information Assisted Bandit Learning: Theory and Application.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

A Bootstrapping Approach to Optimize Random Walk Based Statistical Estimation over Graphs.
Proceedings of the 37th IEEE International Conference on Data Engineering, 2021

A Truthful Procurement Auction for Incentivizing Heterogeneous Clients in Federated Learning.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

MirChecker: Detecting Bugs in Rust Programs via Static Analysis.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Mining Deficiencies of Online Reputation Systems: Methodologies, Experiments and Implications.
IEEE Trans. Serv. Comput., 2020

FAVE: A Fast and Efficient Network Flow AVailability Estimation Method With Bounded Relative Error.
IEEE/ACM Trans. Netw., 2020

Quantifying Deployability and Evolvability of Future Internet Architectures via Economic Models.
IEEE/ACM Trans. Netw., 2020

A Reinforcement Learning Approach to Optimize Discount and Reputation Tradeoffs in E-commerce Systems.
ACM Trans. Internet Techn., 2020

Understanding Ethereum via Graph Analysis.
ACM Trans. Internet Techn., 2020

Understanding Assimilation-contrast Effects in Online Rating Systems: Modelling, Debiasing, and Applications.
ACM Trans. Inf. Syst., 2020

Guest Editorial: Special Section on End-Edge-Cloud Orchestrated Algorithms, Systems and Applications.
IEEE Trans. Ind. Informatics, 2020

Improving network embedding with partially available vertex and edge content.
Inf. Sci., 2020

Taming energy cost of disk encryption software on data-intensive mobile devices.
Future Gener. Comput. Syst., 2020

Emergency demand response in edge computing.
EURASIP J. Wirel. Commun. Netw., 2020

Combining Offline Causal Inference and Online Bandit Learning for Data Driven Decisions.
CoRR, 2020

Exploiting non-uniform program execution time to evade record/replay forensic analysis.
Comput. Secur., 2020

Editorial of CCF transactions on networking: special issue on intelligence-enabled end-edge-cloud orchestrated computing.
CCF Trans. Netw., 2020

Conversational Contextual Bandit: Algorithm and Application.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

GraphWalker: An I/O-Efficient and Resource-Friendly Graph Analytic System for Fast and Scalable Random Walks.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

Adversarial Bandits with Corruptions: Regret Lower Bound and No-regret Algorithm.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Restless-UCB, an Efficient and Low-complexity Algorithm for Online Restless Bandits.
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020

Edge Emergency Demand Response Control via Scheduling in Cloudlet Cluster.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Distributed and Optimal RDMA Resource Scheduling in Shared Data Center Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Pinpointing Hidden IoT Devices via Spatial-temporal Traffic Fingerprinting.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Optimizing Mixture Importance Sampling Via Online Learning: Algorithms and Applications.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

An Online Learning-Based Task Offloading Framework for 5G Small Cell Networks.
Proceedings of the ICPP 2020: 49th International Conference on Parallel Processing, 2020

Continuously Tracking Core Items in Data Streams with Probabilistic Decays.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

G-thinker: A Distributed Framework for Mining Subgraphs in a Big Graph.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

To Cache or Not to Cache: Stable Service Caching in Mobile Edge-Clouds of a Service Market.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Dynamic Pricing and Placement for Distributed Machine Learning Jobs.
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020

2019
On the Feasibility of Inter-Domain Routing via a Small Broker Set.
IEEE Trans. Parallel Distributed Syst., 2019

On the Profitability of Bundling Sale Strategy for Online Service Markets With Network Effects.
ACM Trans. Internet Techn., 2019

Pay as Your Service Needs: An Application-Driven Pricing Approach for the Internet Economics.
ACM Trans. Internet Techn., 2019

Inferring Higher-Order Structure Statistics of Large Networks from Sampled Edges.
IEEE Trans. Knowl. Data Eng., 2019

Editorial.
Perform. Evaluation, 2019

Practical characterization of large networks using neighborhood information.
Knowl. Inf. Syst., 2019

Fast crawling methods of exploring content distributed over large graphs.
Knowl. Inf. Syst., 2019

Optimizing node discovery on networks: Problem definitions, fast algorithms, and observations.
Inf. Sci., 2019

Sampling online social networks by random walk with indirect jumps.
Data Min. Knowl. Discov., 2019

Toward Building Conversational Recommender Systems: A Contextual Bandit Approach.
CoRR, 2019

A Fast Approach to Scale Up Disk Arrays With Parity Declustered Data Layout by Minimizing Data Migration.
IEEE Access, 2019

T-thinker: a task-centric distributed framework for compute-intensive divide-and-conquer algorithms.
Proceedings of the 24th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2019

A Memory-Efficient Sketch Method for Estimating High Similarities in Streaming Sets.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019

To Be or Not to Be: Analyzing & Modeling Social Recommendation in Online Social Networks.
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019

Tracking Influential Nodes in Time-Decaying Dynamic Interaction Networks.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

Walking with Perception: Efficient Random Walk Sampling via Common Neighbor Awareness.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

HP-Mapper: A High Performance Storage Driver for Docker Containers.
Proceedings of the ACM Symposium on Cloud Computing, SoCC 2019, 2019

DCUDA: Dynamic GPU Scheduling with Live Migration Support.
Proceedings of the ACM Symposium on Cloud Computing, SoCC 2019, 2019

An Online Learning Multi-path Selection Framework for Multi-path Transmission Protocols.
Proceedings of the 53rd Annual Conference on Information Sciences and Systems, 2019

Submodular Optimization over Streams with Inhomogeneous Decays.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

Optimizing Discount and Reputation Trade-Offs in E-Commerce Systems: Characterization and Online Learning.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

Understanding Persuasion Cascades in Online Product Rating Systems.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

Securing the Device Drivers of Your Embedded Systems: Framework and Prototype.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Incentive Mechanism and Rating System Design for Crowdsourcing Systems: Analysis, Tradeoffs and Inference.
IEEE Trans. Serv. Comput., 2018

P<sup>3</sup>-LOC: A Privacy-Preserving Paradigm-Driven Framework for Indoor Localization.
IEEE/ACM Trans. Netw., 2018

Information Spreading Forensics via Sequential Dependent Snapshots.
IEEE/ACM Trans. Netw., 2018

MOSS-5: A Fast Method of Approximating Counts of 5-Node Graphlets in Large Graphs.
IEEE Trans. Knowl. Data Eng., 2018

Enhancing Reputation via Price Discounts in E-Commerce Systems: A Data-Driven Approach.
ACM Trans. Knowl. Discov. Data, 2018

Mining Graphlet Counts in Online Social Networks.
ACM Trans. Knowl. Discov. Data, 2018

Boosting Information Spread: An Algorithmic Approach.
IEEE Trans. Comput. Soc. Syst., 2018

A Markov Decision Process Approach to Analyze Discount & Reputation Trade-offs in E-commerce Systems.
SIGMETRICS Perform. Evaluation Rev., 2018

Accurate Learning or Fast Mixing? Dynamic Adaptability of Caching Algorithms.
IEEE J. Sel. Areas Commun., 2018

Enabling Relay-Assisted D2D Communication for Cellular Networks: Algorithm and Protocols.
IEEE Internet Things J., 2018

Graphlet Count Estimation via Convolutional Neural Networks.
CoRR, 2018

Joint cache resource allocation and request routing for in-network caching services.
Comput. Networks, 2018

Community Exploration: From Offline Optimization to Online Learning.
Proceedings of the Advances in Neural Information Processing Systems 31: Annual Conference on Neural Information Processing Systems 2018, 2018

On the Theory of Function Placement and Chaining for Network Function Virtualization.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018

Hybrid Circuit/Packet Network Scheduling with Multiple Composite Paths.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

An Online Learning Approach to Network Application Optimization with Guarantee.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Modeling the Assimilation-Contrast Effects in Online Product Rating Systems: Debiasing and Recommendations.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Beyond the Click-Through Rate: Web Link Selection with Multi-level Feedback.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Sybil Detection in Social-Activity Networks: Modeling, Algorithms and Evaluations.
Proceedings of the 2018 IEEE 26th International Conference on Network Protocols, 2018

Quantifying Deployability & Evolvability of Future Internet Architectures via Economic Models.
Proceedings of the 2018 IEEE 26th International Conference on Network Protocols, 2018

MOSS-5: A Fast Method of Approximating Counts of 5-Node Graphlets in Large Graphs (Extended Abstract).
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

2017
eBA: Efficient Bandwidth Guarantee Under Traffic Variability in Datacenters.
IEEE/ACM Trans. Netw., 2017

Cocoa: Dynamic Container-Based Group Buying Strategies for Cloud Computing.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2017

The Economics of the Cloud.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2017

Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android.
IEEE Trans. Inf. Forensics Secur., 2017

Workload-Aware Elastic Striping With Hot Data Identification for SSD RAID Arrays.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2017

I/O-efficient calculation of H-group closeness centrality over disk-resident graphs.
Inf. Sci., 2017

G-thinker: Big Graph Mining Made Easier and Faster.
CoRR, 2017

Tracking Triadic Cardinality Distributions for Burst Detection in High-Speed Multigraph Streams.
CoRR, 2017

Towards Efficient Node Discoverability Optimization on Large Networks.
CoRR, 2017

SmartMD: A High Performance Deduplication Engine with Mixed Pages.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Pricing Intra-Datacenter Networks with Over-Committed Bandwidth Guarantee.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Modeling the Assimilation-Contrast Effects in Online Product Rating Systems: Debiasing and Recommendations.
Proceedings of the Eleventh ACM Conference on Recommender Systems, 2017

Mining Customer Valuations to Optimize Product Bundling Strategy.
Proceedings of the 2017 IEEE International Conference on Data Mining, 2017

Multi-level Feedback Web Links Selection Problem: Learning and Optimization.
Proceedings of the 2017 IEEE International Conference on Data Mining, 2017

Joint Optimization of Chain Placement and Request Scheduling for Network Function Virtualization.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

On the Feasibility of Inter-Domain Routing via a Small Broker Set.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Measuring and Maximizing Influence via Random Walk in Social Activity Networks.
Proceedings of the Database Systems for Advanced Applications, 2017

A Unified Framework to Estimate Global and Local Graphlet Counts for Streaming Graphs.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
BLOW-UP: Toward Distributed and Scalable Space Filling Curve Construction in 3D Volumetric WSNs.
ACM Trans. Sens. Networks, 2016

SLICE: Enabling Greedy Routing in High Genus 3-D WSNs With General Topologies.
IEEE/ACM Trans. Netw., 2016

Fair Network Bandwidth Allocation in IaaS Datacenters via a Cooperative Game Approach.
IEEE/ACM Trans. Netw., 2016

Design and Analysis of Incentive and Reputation Mechanisms for Online Crowdsourcing Systems.
ACM Trans. Model. Perform. Evaluation Comput. Syst., 2016

VENUS: A System for Streamlined Graph Computation on a Single PC.
IEEE Trans. Knowl. Data Eng., 2016

Product Selection Problem: Improve Market Share by Learning Consumer Behavior.
ACM Trans. Knowl. Discov. Data, 2016

Analysis of Reliability Dynamics of SSD RAID.
IEEE Trans. Computers, 2016

Generalization of Information Spreading Forensics via Sequential Dependent Snapshots.
SIGMETRICS Perform. Evaluation Rev., 2016

A General-Purpose Query-Centric Framework for Querying Big Graphs.
Proc. VLDB Endow., 2016

A General Framework for Estimating Graphlet Statistics via Random Walk.
Proc. VLDB Endow., 2016

SAND: A fault-tolerant streaming architecture for network traffic analytics.
J. Syst. Softw., 2016

Block-structured supermarket models.
Discret. Event Dyn. Syst., 2016

Impact of Online Activities on Influence Maximization: A Random Walk Approach.
CoRR, 2016

Quegel: A General-Purpose Query-Centric Framework for Querying Big Graphs.
CoRR, 2016

A Fast Sampling Method of Exploring Graphlet Degrees of Large Directed and Undirected Graphs.
CoRR, 2016

A Unified Framework for Information Consumption Based on Markov Chains.
CoRR, 2016

Trading Discount for Reputation?: On the Design and Analysis of E-Commerce Discount Mechanisms.
Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science, 2016

Blender: Self-randomizing Address Space Layout for Android Apps.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Stochastic Modeling of Hybrid Cache Systems.
Proceedings of the 24th IEEE International Symposium on Modeling, 2016

Diversified Temporal Subgraph Pattern Mining.
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016

Minfer: A method of inferring motif statistics from sampled edges.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

PowerWalk: Scalable Personalized PageRank via Random Walks with Vertex-Centric Decomposition.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Evolution of the Internet Economic Ecosystem.
IEEE/ACM Trans. Netw., 2015

Mathematical Modeling and Analysis of Product Rating with Partial Information.
ACM Trans. Knowl. Discov. Data, 2015

Unbiased Characterization of Node Pairs over Large Graphs.
ACM Trans. Knowl. Discov. Data, 2015

AppATP: An Energy Conserving Adaptive Mobile-Cloud Transmission Protocol.
IEEE Trans. Computers, 2015

Walking in the Cloud: Parallel SimRank at Scale.
Proc. VLDB Endow., 2015

Modeling eBay-like reputation systems: Analysis, characterization and insurance mechanism design.
Perform. Evaluation, 2015

Analyzing competitive influence maximization problems with partial information: An approximation algorithmic framework.
Perform. Evaluation, 2015

Accurate DNS query characteristics estimation via active probing.
J. Netw. Comput. Appl., 2015

Mathematical Modeling of Insurance Mechanisms for E-commerce Systems.
CoRR, 2015

Minfer: Inferring Motif Statistics From Sampled Edges.
CoRR, 2015

Impact of Data Locality on Garbage Collection in SSDs: A General Analytical Study.
Proceedings of the 6th ACM/SPEC International Conference on Performance Engineering, Austin, TX, USA, January 31, 2015

DroidEagle: seamless detection of visually similar Android apps.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Incentive and reputation mechanisms for online crowdsourcing systems.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

A Data Driven Approach to Uncover Deficiencies in Online Reputation Systems.
Proceedings of the 2015 IEEE International Conference on Data Mining, 2015

A tale of three graphs: Sampling design on hybrid social-affiliation networks.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

VENUS: Vertex-centric streamlined graph computation on a single PC.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

A Mechanism Approach to Reduce New Seller Ramp-Up Time in eBay-Like Reputation Systems.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Tracking Triadic Cardinality Distributions for Burst Detection in Social Activity Streams.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

Enpublic Apps: Security Threats Using iOS Enterprise and Developer Certificates.
Proceedings of the 10th ACM Symposium on Information, 2015

I/O Efficient Algorithms for Exact Distance Queries on Disk-Resident Dynamic Graphs.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Distributed Caching via Rewarding: An Incentive Scheme Design in P2P-VoD Systems.
IEEE Trans. Parallel Distributed Syst., 2014

Efficiently Estimating Motif Statistics of Large Networks.
ACM Trans. Knowl. Discov. Data, 2014

Friends or Foes: Distributed and Randomized Algorithms to Determine Dishonest Recommenders in Online Social Networks.
IEEE Trans. Inf. Forensics Secur., 2014

Single Disk Failure Recovery forX-Code-Based Parallel Storage Systems.
IEEE Trans. Computers, 2014

Modeling crowdsourcing systems: design and analysis of incentive mechanism and rating system.
SIGMETRICS Perform. Evaluation Rev., 2014

The economics of the cloud: price competition and congestion.
SIGMETRICS Perform. Evaluation Rev., 2014

Stochastic modeling and optimization of garbage collection algorithms in solid-state drive systems.
Queueing Syst. Theory Appl., 2014

Security adoption and influence of cyber-insurance markets in heterogeneous networks.
Perform. Evaluation, 2014

Mathematical modeling of group product recommendation with partial information: How many ratings do we need?
Perform. Evaluation, 2014

The mean-field computation in a supermarket model with server multiple vacations.
Discret. Event Dyn. Syst., 2014

Design of Efficient Sampling Methods on Hybrid Social-Affiliation Networks.
CoRR, 2014

Algorithmic Design for Competitive Influence Maximization Problems.
CoRR, 2014

Modelling multi-state diffusion process in complex networks: theory and applications.
J. Complex Networks, 2014

Whom to follow: Efficient followee selection for cascading outbreak detection on online social networks.
Comput. Networks, 2014

Measuring and maximizing group closeness centrality over disk-resident graphs.
Proceedings of the 23rd International World Wide Web Conference, 2014

A provable algorithmic approach to product selection problems for market entry and sustainability.
Proceedings of the Conference on Scientific and Statistical Database Management, 2014

Multi-dimensional network security game: How do attacker and defender battle on parallel targets?
Proceedings of the 7th International Conference on NETwork Games, COntrol and OPtimization, 2014

Mathematical Modeling of Crowdsourcing Systems: Incentive Mechanism and Rating System Design.
Proceedings of the IEEE 22nd International Symposium on Modelling, 2014

DroidTrace: A ptrace based Android dynamic analysis system with forward execution capability.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Exploring bundling sale strategy in online service markets with network effects.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

On efficient bandwidth allocation for traffic variability in datacenters.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Combinatorial Partial Monitoring Game with Linear Feedback and Its Applications.
Proceedings of the 31th International Conference on Machine Learning, 2014

Keynote speakers: Big data science and social networks - Accelerating insights and building value.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

DroidRay: a security evaluation system for customized android firmwares.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Incentive mechanism and protocol design for crowdsourcing systems.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

Design and implementation of an Android host-based intrusion prevention system.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Epidemic Attacks in Network-Coding-Enabled Wireless Mesh Networks: Detection, Identification, and Evaluation.
IEEE Trans. Mob. Comput., 2013

Phase transition of multi-state diffusion process in networks.
SIGMETRICS Perform. Evaluation Rev., 2013

Price differentiation and control in the Kelly mechanism.
Perform. Evaluation, 2013

Social Sensor Placement in Large Scale Networks: A Graph Sampling Perspective
CoRR, 2013

Mathematical Modeling of Product Rating: Sufficiency, Misbehavior and Aggregation Rules
CoRR, 2013

DroidAnalytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware
CoRR, 2013

Sampling Content Distributed Over Graphs.
CoRR, 2013

Efficiently Estimating Subgraph Statistics of Large Networks in the Dark.
CoRR, 2013

On incentivizing upload capacity in P2P-VoD systems: Design, analysis and evaluation.
Comput. Networks, 2013

On the credit evolution of credit-based incentive protocols in wireless mesh networks.
Comput. Networks, 2013

Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Stochastic Analysis on RAID Reliability for Solid-State Drives.
Proceedings of the IEEE 32nd Symposium on Reliable Distributed Systems, 2013

Modeling Multi-state Diffusion Process in Complex Networks: Theory and Applications.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Stochastic modeling of large-scale solid-state storage systems: analysis, design tradeoffs and optimization.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

A peek into smartphones, cloud services and their security.
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013

Carbon-Aware Load Balancing for Geo-distributed Cloud Services.
Proceedings of the 2013 IEEE 21st International Symposium on Modelling, 2013

A cooperative game based allocation for sharing data center networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Falloc: Fair network bandwidth allocation in IaaS datacenters via a bargaining game approach.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Sampling node pairs over large graphs.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Secure Cache Provision: Provable DDOS Prevention for Randomly Partitioned Services with Replication.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Modeling Hierarchical Caches in Content-Centric Networks.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

2012
Exploring the Optimal Replication Strategy in P2P-VoD Systems: Characterization and Evaluation.
IEEE Trans. Parallel Distributed Syst., 2012

A Mathematical Framework for Analyzing Adaptive Incentive Protocols in P2P Networks.
IEEE/ACM Trans. Netw., 2012

On Modeling Product Advertisement in Large-Scale Online Social Networks.
IEEE/ACM Trans. Netw., 2012

Secure Overlay Cloud Storage with Access Control and Assured Deletion.
IEEE Trans. Dependable Secur. Comput., 2012

On the Security and Efficiency of Content Distribution via Network Coding.
IEEE Trans. Dependable Secur. Comput., 2012

Price differentiation in the kelly mechanism.
SIGMETRICS Perform. Evaluation Rev., 2012

ANOC: Anonymous Network-Coding-Based Communication with Efficient Cooperation.
IEEE J. Sel. Areas Commun., 2012

Using contracts to induce cooperation in large scale P2P communication networks: algorithms, stability and applications.
Int. J. Commun. Networks Distributed Syst., 2012

Mathematical Modeling of Competitive Group Recommendation Systems with Application to Peer Review Systems
CoRR, 2012

A game theoretic analysis on incentive mechanisms for wireless ad hoc VoD systems.
Proceedings of the 10th International Symposium on Modeling and Optimization in Mobile, 2012

Security Adoption in Heterogeneous Networks: the Influence of Cyber-Insurance Market.
Proceedings of the NETWORKING 2012, 2012

A Panoramic View of 3G Data/Control-Plane Traffic: Mobile Device Perspective.
Proceedings of the NETWORKING 2012, 2012

On incentivizing caching for P2P-VoD systems.
Proceedings of the 2012 Proceedings IEEE INFOCOM Workshops, 2012

ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

On detecting malicious behaviors in interactive networks: Algorithms and analysis.
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012

Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
A Hybrid Approach to Failed Disk Recovery Using RAID-6 Codes: Algorithms and Performance Evaluation.
ACM Trans. Storage, 2011

A simple model for chunk-scheduling strategies in P2P streaming.
IEEE/ACM Trans. Netw., 2011

On cooperative settlement between content, transit, and eyeball internet service providers.
IEEE/ACM Trans. Netw., 2011

Investigating the effect of node heterogeneity and network externality on security adoption.
SIGMETRICS Perform. Evaluation Rev., 2011

Online Robust Subspace Tracking from Partial Information
CoRR, 2011

Super-Exponential Solution for a Retrial Supermarket Model
CoRR, 2011

A Matrix-Analytic Solution for Randomized Load Balancing Models with Phase-Type Service Times
CoRR, 2011

Analyzing credit evolution for credit-based incentive schemes in wireless mesh networks.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Live Deduplication Storage of Virtual Machine Images in an Open-Source Cloud.
Proceedings of the Middleware 2011, 2011

Identity attack and anonymity protection for P2P-VoD systems.
Proceedings of the 19th International Workshop on Quality of Service, 2011

A Secure Cloud Backup System with Assured Deletion and Version Control.
Proceedings of the 2011 International Conference on Parallel Processing Workshops, 2011

Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Friends or Foes: Detecting Dishonest Recommenders in Online Social Networks.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Incentivizing Upload Capacity in P2P-VoD Systems: A Game Theoretic Analysis.
Proceedings of the Game Theory for Networks - 2nd International ICST Conference, 2011

2010
An ISP-Friendly File Distribution Protocol: Analysis, Design, and Implementation.
IEEE Trans. Parallel Distributed Syst., 2010

Internet Economics: The Use of Shapley Value for ISP Settlement.
IEEE/ACM Trans. Netw., 2010

On the Performance Bounds of Practical Wireless Network Coding.
IEEE Trans. Mob. Comput., 2010

DCAR: Distributed Coding-Aware Routing in Wireless Networks.
IEEE Trans. Mob. Comput., 2010

Stochastic analysis of a randomized detection algorithm for pollution attack in P2P live streaming systems.
Perform. Evaluation, 2010

On oligopoly spectrum allocation game in cognitive radio networks with capacity constraints.
Comput. Networks, 2010

An online framework for catching top spreaders and scanners.
Comput. Networks, 2010

Optimal recovery of single disk failure in RDP code storage systems.
Proceedings of the SIGMETRICS 2010, 2010

FADE: Secure Overlay Cloud Storage with File Assured Deletion.
Proceedings of the Security and Privacy in Communication Networks, 2010

A Matrix-Analytic Solution for Randomized Load Balancing Models with PH Service Times.
Proceedings of the Performance Evaluation of Computer and Communication Systems. Milestones and Future Challenges, 2010

2009
Cross-Layer QoS Scheduling for Layered Multicast Streaming in OFDMA Wireless Networks.
Wirel. Pers. Commun., 2009

Characterizing the capacity gain of stream control scheduling in MIMO wireless mesh networks.
Wirel. Commun. Mob. Comput., 2009

Understanding the paradoxical effects of power control on the capacity of wireless networks.
IEEE Trans. Wirel. Commun., 2009

Entropy based adaptive flow aggregation.
IEEE/ACM Trans. Netw., 2009

The design trade-offs of BitTorrent-like file sharing protocols.
IEEE/ACM Trans. Netw., 2009

On modeling product advertisement in social networks.
SIGMETRICS Perform. Evaluation Rev., 2009

Hack-proof synchronization protocol for multi-player online games.
Multim. Tools Appl., 2009

Analysis and scheduling of practical network coding in OFDMA relay networks.
Comput. Networks, 2009

Profiling and identification of P2P traffic.
Comput. Networks, 2009

Improving energy efficiency via probabilistic rate combination in 802.11 multi-rate wireless networks.
Ad Hoc Networks, 2009

PBS: Periodic Behavioral Spectrum of P2P Applications.
Proceedings of the Passive and Active Network Measurement, 10th International Conference, 2009

Exploring the Optimal Chunk Selection Policy for Data-Driven P2P Streaming Systems.
Proceedings of the Proceedings P2P 2009, 2009

Analysis of Adaptive Incentive Protocols for P2P Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

On Modeling Clustering Indexes of BT-Like Systems.
Proceedings of IEEE International Conference on Communications, 2009

Hack-proof Synchronization Protocol for Multi-player Online Games.
Proceedings of the Handbook of Multimedia for Digital Entertainment and Arts, 2009

2008
Interaction of ISPs: Distributed Resource Allocation and Revenue Maximization.
IEEE Trans. Parallel Distributed Syst., 2008

A revenue-rewarding scheme of providing incentive for cooperative proxy caching for media streaming systems.
ACM Trans. Multim. Comput. Commun. Appl., 2008

A Precise Termination Condition of the Probabilistic Packet Marking Algorithm.
IEEE Trans. Dependable Secur. Comput., 2008

A stochastic model for BitTorrent-like systems.
SIGMETRICS Perform. Evaluation Rev., 2008

Dynamic Bayesian approach for detecting cheats in multi-player online games.
Multim. Syst., 2008

On the Interaction and Competition among Internet Service Providers.
IEEE J. Sel. Areas Commun., 2008

Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching.
Int. J. Netw. Secur., 2008

Understanding the Paradox of Power Control on the Capacity of Wireless Networks
CoRR, 2008

A game-theoretic analysis of the implications of overlay network traffic on ISP peering.
Comput. Networks, 2008

Mathematical modeling of incentive policies in p2p systems.
Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, 2008

Interconnecting eyeballs to content: a shapley value perspective on isp peering and settlement.
Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, 2008

Challenges, design and analysis of a large-scale p2p-vod system.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

Application Identification Based on Network Behavioral Profiles.
Proceedings of the 16th International Workshop on Quality of Service, 2008

How Many Packets Can We Encode? - An Analysis of Practical Wireless Network Coding.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

ISP uplink pricing in a competitive market.
Proceedings of the 2008 International Conference on Telecommunications, 2008

The shapley value: Its use and implications on internet economics.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008

Design and analysis of ISP-friendly file distribution protocols.
Proceedings of the 46th Annual Allerton Conference on Communication, 2008

2007
A Distributed Throttling Approach for Handling High Bandwidth Aggregates.
IEEE Trans. Parallel Distributed Syst., 2007

COPACC: An Architecture of Cooperative Proxy-Client Caching System for On-Demand Media Streaming.
IEEE Trans. Parallel Distributed Syst., 2007

Multiclass Multiserver Threshold-Based Systems: A Study of Noninstantaneous Server Activation.
IEEE Trans. Parallel Distributed Syst., 2007

Inter-AS Inbound Traffic Engineering via ASPP.
IEEE Trans. Netw. Serv. Manag., 2007

On the Access Pricing and Network Scaling Issues of Wireless Mesh Networks.
IEEE Trans. Computers, 2007

Stochastic analysis of file-swarming systems.
Perform. Evaluation, 2007

SEAL: A secure communication library for building dynamic group key agreement applications.
J. Syst. Softw., 2007

Markov Chain Modelling of the Probabilistic Packet Marking Algorithm.
Int. J. Netw. Secur., 2007

Balancing Throughput and Fairness for TCP Flows in Multihop Ad-Hoc Networks.
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007

Performance metrics and configuration strategies for group network communication.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

A Simple Model for Analyzing P2P Streaming Protocols.
Proceedings of the IEEE International Conference on Network Protocols, 2007

Towards Coding-Efficient Link-Scheduling and Coding-Aware Routing in Wireless Networks.
Proceedings of the IEEE International Conference on Network Protocols, 2007

2006
Incentive and service differentiation in P2P networks: a game theoretic approach.
IEEE/ACM Trans. Netw., 2006

Distributed collaborative key agreement and authentication protocols for dynamic peer groups.
IEEE/ACM Trans. Netw., 2006

On the Effectiveness of Movement Prediction to Reduce Energy Consumption in Wireless Communication.
IEEE Trans. Mob. Comput., 2006

P2P Computing Systems.
Perform. Evaluation, 2006

Achieving Multi-Class Service Differentiation in WDM Optical Burst Switching Networks: A Probabilistic Preemptive Burst Segmentation Scheme.
IEEE J. Sel. Areas Commun., 2006

Distributed mechanism in detecting and defending against the low-rate TCP attack.
Comput. Networks, 2006

Small-world overlay P2P networks: Construction, management and handling of dynamic flash crowds.
Comput. Networks, 2006

Quality of service provisioning for composable routing elements.
Comput. Networks, 2006

An Efficient Distributed Algorithm to Identify and Traceback DDoS Traffic.
Comput. J., 2006

Determining the end-to-end throughput capacity in multi-hop networks: methodology and applications.
Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, 2006

Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Entropy Based Flow Aggregation.
Proceedings of the NETWORKING 2006, 2006

Modeling the Peering and Routing Tussle between ISPs and P2P Applications.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

A Case of TCP-Friendly Admission Control.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

Stochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

Performance Modeling on the Interaction of ISPs.
Proceedings of the Performability Has its Price, 2006

On the Practical and Security Issues of Batch Content Distribution Via Network Coding.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

Interplay of ISPs: Distributed Resource Allocation and Revenue Maximization.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

On the Access Pricing Issues of Wireless Mesh Networks.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

Stochastic Differential Equation Approach to Model BitTorrent-like P2P Systems.
Proceedings of IEEE International Conference on Communications, 2006

Detecting cheaters for multiplayer games: theory, design and implementation[1].
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

2005
You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers.
IEEE Trans. Parallel Distributed Syst., 2005

Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles.
IEEE/ACM Trans. Netw., 2005

A multikey secure multimedia proxy using asymmetric reversible parametric sequences: theory, design, and implementation.
IEEE Trans. Multim., 2005

Interaction of overlay networks: properties and implications.
SIGMETRICS Perform. Evaluation Rev., 2005

On the interaction of multiple overlay routing.
Perform. Evaluation, 2005

Multi-path streaming: Optimization of load distribution.
Perform. Evaluation, 2005

OPERA: An open-source extensible router architecture for adding new network services and protocols.
J. Syst. Softw., 2005

An opportunistic scheduler to balance performance measures and energy consumption in wireless networks: design and implementation.
Proceedings of the 1st International ICST Conference on Wireless Internet, 2005

Toward Picture-perfect Streaming on the Internet.
Proceedings of the Second International Conference on the Quantitative Evaluaiton of Systems (QEST 2005), 2005

COPACC: A Cooperative Proxy-Client Caching System for On-Demand Media Streaming.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

The Fundamental Role of Hop Distance in IEEE802.11 Multi-Hop Ad Hoc Networks.
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005

Handling High-Bandwidth Traffic Aggregates by Receiver-Driven Feedback Control.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2004
A Proportional-Delay DiffServ-Enabled Web Server: Admission Control and Dynamic Adaptation.
IEEE Trans. Parallel Distributed Syst., 2004

Composition of Java-based router elements and its application to generalized video multicast.
IEEE Netw., 2004

End system multicast: an architectural infrastructure and topological optimization.
Comput. Commun., 2004

Picture-perfect streaming over the Internet: is there hope?
IEEE Commun. Mag., 2004

A game theoretic approach to provide incentive and service differentiation in P2P networks.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004

On service replication strategy for service overlay networks.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

Distributed Algorithm for Service Replication in Service Overlay Network.
Proceedings of the NETWORKING 2004, 2004

Small world overlay P2P networks.
Proceedings of the Quality of Service, 2004

Defending Against Low-Rate TCP Attacks: Dynamic Detection and Protection.
Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), 2004

On the Robustness of Soft State Protocols.
Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), 2004

An Incentive Mechanism for P2P Networks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

Achieving proportional loss differentiation using probabilistic preemptive burst segmentation in optical burst switching WDM networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Incentive P2P networks: a protocol to encourage information sharing and contribution.
SIGMETRICS Perform. Evaluation Rev., 2003

Performance Tradeoffs in Scheduling Techniques for Mixed Workloads.
Multim. Tools Appl., 2003

On the effectiveness of movement prediction to reduce energy consumption in wireless communication.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2003

2002
An Efficient Partitioning Algorithm for Distributed Virtual Environment Systems.
IEEE Trans. Parallel Distributed Syst., 2002

Automatic Recovery from Disk Failure in Continuous-Media Servers.
IEEE Trans. Parallel Distributed Syst., 2002

Use of Analytical Performance Models for System Sizing and Resource Allocation in Interactive Video-on-Demand Systems Employing Data Sharing Techniques.
IEEE Trans. Knowl. Data Eng., 2002

Bounding of Performance Measures for Threshold-Based Queuing Systems: Theory and Application to Dynamic Resource Management in Video-on-Demand Servers.
IEEE Trans. Computers, 2002

Multi-path streaming: is it worth the trouble?
SIGMETRICS Perform. Evaluation Rev., 2002

Multi-path continuous media streaming: what are the benefits?
Perform. Evaluation, 2002

Design of Scalable Continuous Media Servers.
Multim. Tools Appl., 2002

Admission control and dynamic adaptation for a proportional-delay diffserv-enabled web server.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2002

A case for a multi-key secure video proxy: theory, design, and implementation.
Proceedings of the 10th ACM International Conference on Multimedia 2002, 2002

An Architectural Infrastructure and Topological Optimization for End System Multicast.
Proceedings of the 10th International Workshop on Modeling, 2002

You Can Run, But You Can't Hide: An Effective Methodology to Traceback DDoS Attackers.
Proceedings of the 10th International Workshop on Modeling, 2002

Providing Throughput Differentiation for TCP Flows Using Adaptive TwoColor Marking and Multi-Level AQM.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups.
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP 2002), 2002

2001
Adaptive proportional delay differentiated services: characterization and performance evaluation.
IEEE/ACM Trans. Netw., 2001

Constructing Communication Subgraphs and Deriving an Optimal Synchronization Interval for Distributed Virtual Environment Systems.
IEEE Trans. Knowl. Data Eng., 2001

Open problems for threshold-based systems.
SIGMETRICS Perform. Evaluation Rev., 2001

2000
Threshold-Based Dynamic Replication in Large-Scale Video-on-Demand Systems.
Multim. Tools Appl., 2000

A fast and accurate iterative solution of a multi-class threshold-based queueing system with hysteresis.
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 2000

A Performance Study of Dynamic Replication Techniques in Continuous Media Servers.
Proceedings of the MASCOTS 2000, Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 29 August, 2000

An Admission Control Algorithm for Providing Quality-of-Service Guarantee for Individual Connection in a Video-on-Demand System.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000

Characterization and Performance Evaluation for Proportional Delay Differentiated Services.
Proceedings of the Eighth Annual International Conference on Network Protocols, 2000

Striping Doesn't Scale: How to Achieve Scalability for Continuous Media Servers with Replication.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

1999
Efficient Support for Interactive Service in Multi-Resolution VOD Systems.
VLDB J., 1999

Analytical Models for Mixed Workload Multimedia Storage Servers.
Perform. Evaluation, 1999

Stochastic Complement Analysis of Multi-Server Threshold Queues with Histeresis.
Perform. Evaluation, 1999

Distributed Caching and Broadcast in a Wireless Mobile Computing Environment.
Comput. J., 1999

Deriving an Optimal Synchronization Interval for Supporting View Consistency in a Distributed Virtual Environment.
Proceedings of the MIS '99, 1999

Location Updates and Probabilistic Tracking Algorithms for Mobile Cellular Networks.
Proceedings of the 1999 International Symposium on Parallel Architectures, 1999

Deriving Communication Sub-Graph and Optimal Synchronizing Interval for a Distributed Virtual Environment System.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

Evaluation of Tradeoffs in Resource Management Techniques for Multimedia Storage Servers.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

1998
Computing Performance Bounds of Fork-Join Parallel Programs Under a Multiprocessing Environment.
IEEE Trans. Parallel Distributed Syst., 1998

A Survey of Approaches to Fault Tolerant Design of VOD Servers: Techniques, Analysis and Comparison.
Parallel Comput., 1998

Merging Video Streams in Multimedia Storage Server: Complexity and Heuristics.
Multim. Syst., 1998

Introduction: Multimedia computing systems.
Int. J. Intell. Syst., 1998

Balancing Workload and Communication Cost for a Distributed Virtual Environment.
Proceedings of the Advances in Multimedia Information Systems, 4th International Workshop, 1998

Transient Performance Analysis for Location Update Protocols in Cellular Networks.
Proceedings of the MASCOTS 1998, 1998

NFS/M: An Open Platform Mobile File System.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

1997
Scheduling and Data Layout Policies for a Near-Line Multimedia Storage Architecture.
Multim. Syst., 1997

Designing a Hierarchical Multimedia Storage Server.
Comput. J., 1997

Bounding of Performance Measures for a Threshold-based Queueing System with Hysteresis.
Proceedings of the 1997 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 1997

Buffer and I/O Resource Pre-allocation for Implementing Batching and Buffering Techniques for Video-on-Demand Systems.
Proceedings of the Thirteenth International Conference on Data Engineering, 1997

Quantifying Complexity and Performance Gains of Distributed Caching in a Wireless Mobile Computing Environment.
Proceedings of the Thirteenth International Conference on Data Engineering, 1997

1996
Adaptive Piggybacking: A Novel Technique for Data Sharing in Video-on-Demand Storage Servers.
Multim. Syst., 1996

Distributed Scheduling Framework - A Load Distribution Facility on Mach.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1996

Performance analysis of a new updating rule for TD(λ) learning in feedforward networks for position evaluation in Go game.
Proceedings of International Conference on Neural Networks (ICNN'96), 1996

1995
Bounding the Mean Response Time of the Minimum Expected Delay Routing Policy: An Algorithmic Approach.
IEEE Trans. Computers, 1995

I/O Stream Sharing for Continous Media Systems.
IEEE Data Eng. Bull., 1995

Reducing I/O Demand in Video-On-Demand Storage Servers.
Proceedings of the 1995 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, 1995

A Novel Video-On-Demand Storage Architecture for Supporting Constant Frame Rate with Variable Bit Rate Retrieval.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 1995

An Eclectic Survey of Bounding Methods for Markov Chain Models.
Proceedings of the MASCOTS '95, 1995

A Cost-effective Near-line Storage Server for Multimedia System.
Proceedings of the Eleventh International Conference on Data Engineering, 1995

1994
Computing Bounds on Steady State Availability of Repairable Computer Systems.
J. ACM, 1994

1992
Algorithmic Approach to Bounding the Mean Response Time of a Minimum Expected Delay Routing System.
Proceedings of the 1992 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, 1992

Chained Declustering: Load Balancing and Robustness to Skew and Failures.
Proceedings of the RIDE-TQP '92, 1992

1990
Performance Analysis of Disk Arrays under Failure.
Proceedings of the 16th International Conference on Very Large Data Bases, 1990


  Loading...