John C. S. Lui

According to our database1, John C. S. Lui
  • authored at least 332 papers between 1990 and 2018.
  • has a "Dijkstra number"2 of four.

Awards

IEEE Fellow

IEEE Fellow 2010, "For contributions to performance modeling and analysis of storage communication systems and peer-to-peer networks".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Incentive Mechanism and Rating System Design for Crowdsourcing Systems: Analysis, Tradeoffs and Inference.
IEEE Trans. Services Computing, 2018

Information Spreading Forensics via Sequential Dependent Snapshots.
IEEE/ACM Trans. Netw., 2018

MOSS-5: A Fast Method of Approximating Counts of 5-Node Graphlets in Large Graphs.
IEEE Trans. Knowl. Data Eng., 2018

Enhancing Reputation via Price Discounts in E-Commerce Systems: A Data-Driven Approach.
TKDD, 2018

Boosting Information Spread: An Algorithmic Approach.
IEEE Trans. Comput. Social Systems, 2018

Beyond the Click-Through Rate: Web Link Selection with Multi-level Feedback.
CoRR, 2018

Joint cache resource allocation and request routing for in-network caching services.
Computer Networks, 2018

On the Theory of Function Placement and Chaining for Network Function Virtualization.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018

Modeling the Assimilation-Contrast Effects in Online Product Rating Systems: Debiasing and Recommendations.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Beyond the Click-Through Rate: Web Link Selection with Multi-level Feedback.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

2017
eBA: Efficient Bandwidth Guarantee Under Traffic Variability in Datacenters.
IEEE/ACM Trans. Netw., 2017

Cocoa: Dynamic Container-Based Group Buying Strategies for Cloud Computing.
TOMPECS, 2017

The Economics of the Cloud.
TOMPECS, 2017

Monet: A User-Oriented Behavior-Based Malware Variants Detection System for Android.
IEEE Trans. Information Forensics and Security, 2017

Workload-Aware Elastic Striping With Hot Data Identification for SSD RAID Arrays.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2017

I/O-efficient calculation of H-group closeness centrality over disk-resident graphs.
Inf. Sci., 2017

Joint Cache Resource Allocation and Request Routing for In-network Caching Services.
CoRR, 2017

G-thinker: Big Graph Mining Made Easier and Faster.
CoRR, 2017

Multi-level Feedback Web Links Selection Problem: Learning and Optimization.
CoRR, 2017

Tracking Triadic Cardinality Distributions for Burst Detection in High-Speed Multigraph Streams.
CoRR, 2017

Sampling Online Social Networks by Random Walk with Indirect Jumps.
CoRR, 2017

Towards Efficient Node Discoverability Optimization on Large Networks.
CoRR, 2017

Accurate Learning or Fast Mixing? Dynamic Adaptability of Caching Algorithms.
CoRR, 2017

SmartMD: A High Performance Deduplication Engine with Mixed Pages.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Pricing Intra-Datacenter Networks with Over-Committed Bandwidth Guarantee.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Modeling the Assimilation-Contrast Effects in Online Product Rating Systems: Debiasing and Recommendations.
Proceedings of the Eleventh ACM Conference on Recommender Systems, 2017

Mining Customer Valuations to Optimize Product Bundling Strategy.
Proceedings of the 2017 IEEE International Conference on Data Mining, 2017

Multi-level Feedback Web Links Selection Problem: Learning and Optimization.
Proceedings of the 2017 IEEE International Conference on Data Mining, 2017

Boosting Information Spread: An Algorithmic Approach.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Joint Optimization of Chain Placement and Request Scheduling for Network Function Virtualization.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

On the Feasibility of Inter-Domain Routing via a Small Broker Set.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Measuring and Maximizing Influence via Random Walk in Social Activity Networks.
Proceedings of the Database Systems for Advanced Applications, 2017

A Unified Framework to Estimate Global and Local Graphlet Counts for Streaming Graphs.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
BLOW-UP: Toward Distributed and Scalable Space Filling Curve Construction in 3D Volumetric WSNs.
TOSN, 2016

SLICE: Enabling Greedy Routing in High Genus 3-D WSNs With General Topologies.
IEEE/ACM Trans. Netw., 2016

Fair Network Bandwidth Allocation in IaaS Datacenters via a Cooperative Game Approach.
IEEE/ACM Trans. Netw., 2016

Design and Analysis of Incentive and Reputation Mechanisms for Online Crowdsourcing Systems.
TOMPECS, 2016

VENUS: A System for Streamlined Graph Computation on a Single PC.
IEEE Trans. Knowl. Data Eng., 2016

Product Selection Problem: Improve Market Share by Learning Consumer Behavior.
TKDD, 2016

Analysis of Reliability Dynamics of SSD RAID.
IEEE Trans. Computers, 2016

Generalization of Information Spreading Forensics via Sequential Dependent Snapshots.
SIGMETRICS Performance Evaluation Review, 2016

A General-Purpose Query-Centric Framework for Querying Big Graphs.
PVLDB, 2016

A General Framework for Estimating Graphlet Statistics via Random Walk.
PVLDB, 2016

SAND: A fault-tolerant streaming architecture for network traffic analytics.
Journal of Systems and Software, 2016

Block-structured supermarket models.
Discrete Event Dynamic Systems, 2016

Impact of Online Activities on Influence Maximization: A Random Walk Approach.
CoRR, 2016

Quegel: A General-Purpose Query-Centric Framework for Querying Big Graphs.
CoRR, 2016

A Fast Sampling Method of Exploring Graphlet Degrees of Large Directed and Undirected Graphs.
CoRR, 2016

Monet: A User-oriented Behavior-based Malware Variants Detection System for Android.
CoRR, 2016

PowerWalk: Scalable Personalized PageRank via Random Walks with Vertex-Centric Decomposition.
CoRR, 2016

Boosting Information Spread: An Algorithmic Approach.
CoRR, 2016

Stochastic Modeling of Hybrid Cache Systems.
CoRR, 2016

A Unified Framework for Information Consumption Based on Markov Chains.
CoRR, 2016

Taming Energy Cost of Disk Encryption Software on Data-Intensive Mobile Devices.
CoRR, 2016

A General Framework for Estimating Graphlet Statistics via Random Walk.
CoRR, 2016

Trading Discount for Reputation?: On the Design and Analysis of E-Commerce Discount Mechanisms.
Proceedings of the 2016 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Science, 2016

Blender: Self-randomizing Address Space Layout for Android Apps.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Stochastic Modeling of Hybrid Cache Systems.
Proceedings of the 24th IEEE International Symposium on Modeling, 2016

Diversified Temporal Subgraph Pattern Mining.
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016

Mining Graphlet Counts in Online Social Networks.
Proceedings of the IEEE 16th International Conference on Data Mining, 2016

Minfer: A method of inferring motif statistics from sampled edges.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Taming Energy Cost of Disk Encryption Software on Data-Intensive Mobile Devices.
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016

PowerWalk: Scalable Personalized PageRank via Random Walks with Vertex-Centric Decomposition.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Evolution of the Internet Economic Ecosystem.
IEEE/ACM Trans. Netw., 2015

Mathematical Modeling and Analysis of Product Rating with Partial Information.
TKDD, 2015

Unbiased Characterization of Node Pairs over Large Graphs.
TKDD, 2015

AppATP: An Energy Conserving Adaptive Mobile-Cloud Transmission Protocol.
IEEE Trans. Computers, 2015

Walking in the Cloud: Parallel SimRank at Scale.
PVLDB, 2015

Modeling eBay-like reputation systems: Analysis, characterization and insurance mechanism design.
Perform. Eval., 2015

Analyzing competitive influence maximization problems with partial information: An approximation algorithmic framework.
Perform. Eval., 2015

Accurate DNS query characteristics estimation via active probing.
J. Network and Computer Applications, 2015

Mathematical Modeling of Insurance Mechanisms for E-commerce Systems.
CoRR, 2015

Minfer: Inferring Motif Statistics From Sampled Edges.
CoRR, 2015

Impact of Data Locality on Garbage Collection in SSDs: A General Analytical Study.
Proceedings of the 6th ACM/SPEC International Conference on Performance Engineering, Austin, TX, USA, January 31, 2015

DroidEagle: seamless detection of visually similar Android apps.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

Incentive and reputation mechanisms for online crowdsourcing systems.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

A Data Driven Approach to Uncover Deficiencies in Online Reputation Systems.
Proceedings of the 2015 IEEE International Conference on Data Mining, 2015

A tale of three graphs: Sampling design on hybrid social-affiliation networks.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

VENUS: Vertex-centric streamlined graph computation on a single PC.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

A Mechanism Approach to Reduce New Seller Ramp-Up Time in eBay-Like Reputation Systems.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Tracking Triadic Cardinality Distributions for Burst Detection in Social Activity Streams.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

Enpublic Apps: Security Threats Using iOS Enterprise and Developer Certificates.
Proceedings of the 10th ACM Symposium on Information, 2015

I/O Efficient Algorithms for Exact Distance Queries on Disk-Resident Dynamic Graphs.
Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2015

2014
Distributed Caching via Rewarding: An Incentive Scheme Design in P2P-VoD Systems.
IEEE Trans. Parallel Distrib. Syst., 2014

Efficiently Estimating Motif Statistics of Large Networks.
TKDD, 2014

Friends or Foes: Distributed and Randomized Algorithms to Determine Dishonest Recommenders in Online Social Networks.
IEEE Trans. Information Forensics and Security, 2014

Single Disk Failure Recovery forX-Code-Based Parallel Storage Systems.
IEEE Trans. Computers, 2014

Modeling crowdsourcing systems: design and analysis of incentive mechanism and rating system.
SIGMETRICS Performance Evaluation Review, 2014

The economics of the cloud: price competition and congestion.
SIGMETRICS Performance Evaluation Review, 2014

The economics of the cloud: price competition and congestion.
SIGecom Exchanges, 2014

Stochastic modeling and optimization of garbage collection algorithms in solid-state drive systems.
Queueing Syst., 2014

Security adoption and influence of cyber-insurance markets in heterogeneous networks.
Perform. Eval., 2014

Mathematical modeling of group product recommendation with partial information: How many ratings do we need?
Perform. Eval., 2014

The mean-field computation in a supermarket model with server multiple vacations.
Discrete Event Dynamic Systems, 2014

Tracking Triadic Cardinality Distributions for Burst Detection in Social Activity Streams.
CoRR, 2014

Design of Efficient Sampling Methods on Hybrid Social-Affiliation Networks.
CoRR, 2014

Algorithmic Design for Competitive Influence Maximization Problems.
CoRR, 2014

Friends or Foes: Distributed and Randomized Algorithms to Determine Dishonest Recommenders in Online Social Networks.
CoRR, 2014

Block-Structured Supermarket Models.
CoRR, 2014

Modelling multi-state diffusion process in complex networks: theory and applications.
J. Complex Networks, 2014

Whom to follow: Efficient followee selection for cascading outbreak detection on online social networks.
Computer Networks, 2014

Measuring and maximizing group closeness centrality over disk-resident graphs.
Proceedings of the 23rd International World Wide Web Conference, 2014

A provable algorithmic approach to product selection problems for market entry and sustainability.
Proceedings of the Conference on Scientific and Statistical Database Management, 2014

Multi-dimensional network security game: How do attacker and defender battle on parallel targets?
Proceedings of the 7th International Conference on NETwork Games, COntrol and OPtimization, 2014

Mathematical Modeling of Crowdsourcing Systems: Incentive Mechanism and Rating System Design.
Proceedings of the IEEE 22nd International Symposium on Modelling, 2014

Product selection problem: improve market share by learning consumer behavior.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

DroidTrace: A ptrace based Android dynamic analysis system with forward execution capability.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Exploring bundling sale strategy in online service markets with network effects.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

On efficient bandwidth allocation for traffic variability in datacenters.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Combinatorial Partial Monitoring Game with Linear Feedback and Its Applications.
Proceedings of the 31th International Conference on Machine Learning, 2014

Keynote speakers: Big data science and social networks - Accelerating insights and building value.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

DroidRay: a security evaluation system for customized android firmwares.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Incentive mechanism and protocol design for crowdsourcing systems.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

Design and implementation of an Android host-based intrusion prevention system.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Epidemic Attacks in Network-Coding-Enabled Wireless Mesh Networks: Detection, Identification, and Evaluation.
IEEE Trans. Mob. Comput., 2013

Phase transition of multi-state diffusion process in networks.
SIGMETRICS Performance Evaluation Review, 2013

Price differentiation and control in the Kelly mechanism.
Perform. Eval., 2013

Social Sensor Placement in Large Scale Networks: A Graph Sampling Perspective
CoRR, 2013

Mathematical Modeling of Product Rating: Sufficiency, Misbehavior and Aggregation Rules
CoRR, 2013

Stochastic Analysis on RAID Reliability for Solid-State Drives
CoRR, 2013

Stochastic Modeling of Large-Scale Solid-State Storage Systems: Analysis, Design Tradeoffs and Optimization
CoRR, 2013

DroidAnalytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware
CoRR, 2013

Sampling Content Distributed Over Graphs.
CoRR, 2013

Practical Characterization of Large Networks Using Neighborhood Information.
CoRR, 2013

Efficiently Estimating Subgraph Statistics of Large Networks in the Dark.
CoRR, 2013

On incentivizing upload capacity in P2P-VoD systems: Design, analysis and evaluation.
Computer Networks, 2013

On the credit evolution of credit-based incentive protocols in wireless mesh networks.
Computer Networks, 2013

On the evolution of the internet economic ecosystem.
Proceedings of the 22nd International World Wide Web Conference, 2013

Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Stochastic Analysis on RAID Reliability for Solid-State Drives.
Proceedings of the IEEE 32nd Symposium on Reliable Distributed Systems, 2013

Modeling Multi-state Diffusion Process in Complex Networks: Theory and Applications.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Stochastic modeling of large-scale solid-state storage systems: analysis, design tradeoffs and optimization.
Proceedings of the ACM SIGMETRICS / International Conference on Measurement and Modeling of Computer Systems, 2013

A peek into smartphones, cloud services and their security.
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013

Carbon-Aware Load Balancing for Geo-distributed Cloud Services.
Proceedings of the 2013 IEEE 21st International Symposium on Modelling, 2013

A cooperative game based allocation for sharing data center networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Falloc: Fair network bandwidth allocation in IaaS datacenters via a bargaining game approach.
Proceedings of the 2013 21st IEEE International Conference on Network Protocols, 2013

Sampling node pairs over large graphs.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Secure Cache Provision: Provable DDOS Prevention for Randomly Partitioned Services with Replication.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Modeling Hierarchical Caches in Content-Centric Networks.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

2012
Exploring the Optimal Replication Strategy in P2P-VoD Systems: Characterization and Evaluation.
IEEE Trans. Parallel Distrib. Syst., 2012

A Mathematical Framework for Analyzing Adaptive Incentive Protocols in P2P Networks.
IEEE/ACM Trans. Netw., 2012

On Modeling Product Advertisement in Large-Scale Online Social Networks.
IEEE/ACM Trans. Netw., 2012

Secure Overlay Cloud Storage with Access Control and Assured Deletion.
IEEE Trans. Dependable Sec. Comput., 2012

On the Security and Efficiency of Content Distribution via Network Coding.
IEEE Trans. Dependable Sec. Comput., 2012

Price differentiation in the kelly mechanism.
SIGMETRICS Performance Evaluation Review, 2012

ANOC: Anonymous Network-Coding-Based Communication with Efficient Cooperation.
IEEE Journal on Selected Areas in Communications, 2012

Using contracts to induce cooperation in large scale P2P communication networks: algorithms, stability and applications.
IJCNDS, 2012

On the Evolution of the Internet Economic Ecosystem
CoRR, 2012

Mathematical Modeling of Competitive Group Recommendation Systems with Application to Peer Review Systems
CoRR, 2012

A game theoretic analysis on incentive mechanisms for wireless ad hoc VoD systems.
Proceedings of the 10th International Symposium on Modeling and Optimization in Mobile, 2012

Security Adoption in Heterogeneous Networks: the Influence of Cyber-Insurance Market.
Proceedings of the NETWORKING 2012, 2012

A Panoramic View of 3G Data/Control-Plane Traffic: Mobile Device Perspective.
Proceedings of the NETWORKING 2012, 2012

On incentivizing caching for P2P-VoD systems.
Proceedings of the 2012 Proceedings IEEE INFOCOM Workshops, 2012

ADAM: An Automatic and Extensible Platform to Stress Test Android Anti-virus Systems.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2012

On detecting malicious behaviors in interactive networks: Algorithms and analysis.
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012

Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
A Hybrid Approach to Failed Disk Recovery Using RAID-6 Codes: Algorithms and Performance Evaluation.
TOS, 2011

A simple model for chunk-scheduling strategies in P2P streaming.
IEEE/ACM Trans. Netw., 2011

On cooperative settlement between content, transit, and eyeball internet service providers.
IEEE/ACM Trans. Netw., 2011

Investigating the effect of node heterogeneity and network externality on security adoption.
SIGMETRICS Performance Evaluation Review, 2011

Online Robust Subspace Tracking from Partial Information
CoRR, 2011

Super-Exponential Solution for a Retrial Supermarket Model
CoRR, 2011

A Matrix-Analytic Solution for Randomized Load Balancing Models with Phase-Type Service Times
CoRR, 2011

Analyzing credit evolution for credit-based incentive schemes in wireless mesh networks.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

Live Deduplication Storage of Virtual Machine Images in an Open-Source Cloud.
Proceedings of the Middleware 2011, 2011

Identity attack and anonymity protection for P2P-VoD systems.
Proceedings of the 19th International Workshop on Quality of Service, 2011

Exploring the optimal replication strategy in P2P-VoD systems: Characterization and evaluation.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

A Secure Cloud Backup System with Assured Deletion and Version Control.
Proceedings of the 2011 International Conference on Parallel Processing Workshops, 2011

Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Friends or Foes: Detecting Dishonest Recommenders in Online Social Networks.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Incentivizing Upload Capacity in P2P-VoD Systems: A Game Theoretic Analysis.
Proceedings of the Game Theory for Networks - 2nd International ICST Conference, 2011

2010
An ISP-Friendly File Distribution Protocol: Analysis, Design, and Implementation.
IEEE Trans. Parallel Distrib. Syst., 2010

Internet Economics: The Use of Shapley Value for ISP Settlement.
IEEE/ACM Trans. Netw., 2010

On the Performance Bounds of Practical Wireless Network Coding.
IEEE Trans. Mob. Comput., 2010

DCAR: Distributed Coding-Aware Routing in Wireless Networks.
IEEE Trans. Mob. Comput., 2010

Stochastic analysis of a randomized detection algorithm for pollution attack in P2P live streaming systems.
Perform. Eval., 2010

On oligopoly spectrum allocation game in cognitive radio networks with capacity constraints.
Computer Networks, 2010

An online framework for catching top spreaders and scanners.
Computer Networks, 2010

Optimal recovery of single disk failure in RDP code storage systems.
Proceedings of the SIGMETRICS 2010, 2010

FADE: Secure Overlay Cloud Storage with File Assured Deletion.
Proceedings of the Security and Privacy in Communication Networks, 2010

A Matrix-Analytic Solution for Randomized Load Balancing Models with PH Service Times.
Proceedings of the Performance Evaluation of Computer and Communication Systems. Milestones and Future Challenges, 2010

2009
Cross-Layer QoS Scheduling for Layered Multicast Streaming in OFDMA Wireless Networks.
Wireless Personal Communications, 2009

Characterizing the capacity gain of stream control scheduling in MIMO wireless mesh networks.
Wireless Communications and Mobile Computing, 2009

Understanding the paradoxical effects of power control on the capacity of wireless networks.
IEEE Trans. Wireless Communications, 2009

Entropy based adaptive flow aggregation.
IEEE/ACM Trans. Netw., 2009

The design trade-offs of BitTorrent-like file sharing protocols.
IEEE/ACM Trans. Netw., 2009

On modeling product advertisement in social networks.
SIGMETRICS Performance Evaluation Review, 2009

Hack-proof synchronization protocol for multi-player online games.
Multimedia Tools Appl., 2009

On Oligopoly Spectrum Allocation Game in Cognitive Radio Networks with Capacity Constraints
CoRR, 2009

Analysis and scheduling of practical network coding in OFDMA relay networks.
Computer Networks, 2009

Profiling and identification of P2P traffic.
Computer Networks, 2009

Improving energy efficiency via probabilistic rate combination in 802.11 multi-rate wireless networks.
Ad Hoc Networks, 2009

PBS: Periodic Behavioral Spectrum of P2P Applications.
Proceedings of the Passive and Active Network Measurement, 10th International Conference, 2009

Exploring the Optimal Chunk Selection Policy for Data-Driven P2P Streaming Systems.
Proceedings of the Proceedings P2P 2009, 2009

Analysis of Adaptive Incentive Protocols for P2P Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

On Modeling Clustering Indexes of BT-Like Systems.
Proceedings of IEEE International Conference on Communications, 2009

2008
Interaction of ISPs: Distributed Resource Allocation and Revenue Maximization.
IEEE Trans. Parallel Distrib. Syst., 2008

A revenue-rewarding scheme of providing incentive for cooperative proxy caching for media streaming systems.
TOMCCAP, 2008

A Precise Termination Condition of the Probabilistic Packet Marking Algorithm.
IEEE Trans. Dependable Sec. Comput., 2008

A stochastic model for BitTorrent-like systems.
SIGMETRICS Performance Evaluation Review, 2008

Dynamic Bayesian approach for detecting cheats in multi-player online games.
Multimedia Syst., 2008

On the Interaction and Competition among Internet Service Providers.
IEEE Journal on Selected Areas in Communications, 2008

Secure Real-Time Streaming Protocol (RTSP) for Hierarchical Proxy Caching.
I. J. Network Security, 2008

Understanding the Paradox of Power Control on the Capacity of Wireless Networks
CoRR, 2008

A game-theoretic analysis of the implications of overlay network traffic on ISP peering.
Computer Networks, 2008

Mathematical modeling of incentive policies in p2p systems.
Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, 2008

Interconnecting eyeballs to content: a shapley value perspective on isp peering and settlement.
Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, 2008

Challenges, design and analysis of a large-scale p2p-vod system.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

Application Identification Based on Network Behavioral Profiles.
Proceedings of the 16th International Workshop on Quality of Service, 2008

How Many Packets Can We Encode? - An Analysis of Practical Wireless Network Coding.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

DCAR: Distributed Coding-Aware Routing in Wireless Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

On cooperative settlement between content, transit and eyeball internet service providers.
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

2007
A Distributed Throttling Approach for Handling High Bandwidth Aggregates.
IEEE Trans. Parallel Distrib. Syst., 2007

COPACC: An Architecture of Cooperative Proxy-Client Caching System for On-Demand Media Streaming.
IEEE Trans. Parallel Distrib. Syst., 2007

Multiclass Multiserver Threshold-Based Systems: A Study of Noninstantaneous Server Activation.
IEEE Trans. Parallel Distrib. Syst., 2007

Inter-AS Inbound Traffic Engineering via ASPP.
IEEE Trans. Network and Service Management, 2007

On the Access Pricing and Network Scaling Issues of Wireless Mesh Networks.
IEEE Trans. Computers, 2007

Stochastic analysis of file-swarming systems.
Perform. Eval., 2007

SEAL: A secure communication library for building dynamic group key agreement applications.
Journal of Systems and Software, 2007

Markov Chain Modelling of the Probabilistic Packet Marking Algorithm.
I. J. Network Security, 2007

Balancing Throughput and Fairness for TCP Flows in Multihop Ad-Hoc Networks.
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007

Characterizing the Capacity Gain of Stream Control Scheduling in MIMO Wireless Mesh Networks.
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007

Performance metrics and configuration strategies for group network communication.
Proceedings of the Fifteenth IEEE International Workshop on Quality of Service, 2007

A Simple Model for Analyzing P2P Streaming Protocols.
Proceedings of the IEEE International Conference on Network Protocols, 2007

Towards Coding-Efficient Link-Scheduling and Coding-Aware Routing in Wireless Networks.
Proceedings of the IEEE International Conference on Network Protocols, 2007

Internet economics: the use of Shapley value for ISP settlement.
Proceedings of the 2007 ACM Conference on Emerging Network Experiment and Technology, 2007

2006
Incentive and service differentiation in P2P networks: a game theoretic approach.
IEEE/ACM Trans. Netw., 2006

Distributed collaborative key agreement and authentication protocols for dynamic peer groups.
IEEE/ACM Trans. Netw., 2006

On the Effectiveness of Movement Prediction to Reduce Energy Consumption in Wireless Communication.
IEEE Trans. Mob. Comput., 2006

P2P Computing Systems.
Perform. Eval., 2006

Achieving Multi-Class Service Differentiation in WDM Optical Burst Switching Networks: A Probabilistic Preemptive Burst Segmentation Scheme.
IEEE Journal on Selected Areas in Communications, 2006

Distributed mechanism in detecting and defending against the low-rate TCP attack.
Computer Networks, 2006

Small-world overlay P2P networks: Construction, management and handling of dynamic flash crowds.
Computer Networks, 2006

Quality of service provisioning for composable routing elements.
Computer Networks, 2006

An Efficient Distributed Algorithm to Identify and Traceback DDoS Traffic.
Comput. J., 2006

Determining the end-to-end throughput capacity in multi-hop networks: methodology and applications.
Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, 2006

Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks.
Proceedings of the Management of Integrated End-to-End Communications and Services, 2006

Entropy Based Flow Aggregation.
Proceedings of the NETWORKING 2006, 2006

Modeling the Peering and Routing Tussle between ISPs and P2P Applications.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

A Case of TCP-Friendly Admission Control.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

Stochastic Analysis and File Availability Enhancement for BT-like File Sharing Systems.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

Performance Modeling on the Interaction of ISPs.
Proceedings of the Performability Has its Price, 2006

On the Practical and Security Issues of Batch Content Distribution Via Network Coding.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

The Delicate Tradeoffs in BitTorrent-like File Sharing Protocol Design.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

Interplay of ISPs: Distributed Resource Allocation and Revenue Maximization.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

On the Access Pricing Issues of Wireless Mesh Networks.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

Stochastic Differential Equation Approach to Model BitTorrent-like P2P Systems.
Proceedings of IEEE International Conference on Communications, 2006

2005
You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers.
IEEE Trans. Parallel Distrib. Syst., 2005

Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles.
IEEE/ACM Trans. Netw., 2005

A multikey secure multimedia proxy using asymmetric reversible parametric sequences: theory, design, and implementation.
IEEE Trans. Multimedia, 2005

Interaction of overlay networks: properties and implications.
SIGMETRICS Performance Evaluation Review, 2005

On the interaction of multiple overlay routing.
Perform. Eval., 2005

Multi-path streaming: Optimization of load distribution.
Perform. Eval., 2005

OPERA: An open-source extensible router architecture for adding new network services and protocols.
Journal of Systems and Software, 2005

An opportunistic scheduler to balance performance measures and energy consumption in wireless networks: design and implementation.
Proceedings of the 1st International ICST Conference on Wireless Internet, 2005

Toward Picture-perfect Streaming on the Internet.
Proceedings of the Second International Conference on the Quantitative Evaluaiton of Systems (QEST 2005), 2005

COPACC: A Cooperative Proxy-Client Caching System for On-Demand Media Streaming.
Proceedings of the NETWORKING 2005: Networking Technologies, 2005

The Fundamental Role of Hop Distance in IEEE802.11 Multi-Hop Ad Hoc Networks.
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005

Handling High-Bandwidth Traffic Aggregates by Receiver-Driven Feedback Control.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2004
A Proportional-Delay DiffServ-Enabled Web Server: Admission Control and Dynamic Adaptation.
IEEE Trans. Parallel Distrib. Syst., 2004

Composition of Java-based router elements and its application to generalized video multicast.
IEEE Network, 2004

End system multicast: an architectural infrastructure and topological optimization.
Computer Communications, 2004

Picture-perfect streaming over the Internet: is there hope?
IEEE Communications Magazine, 2004

A game theoretic approach to provide incentive and service differentiation in P2P networks.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2004

On service replication strategy for service overlay networks.
Proceedings of the Managing Next Generation Convergence Networks and Services, 2004

Distributed Algorithm for Service Replication in Service Overlay Network.
Proceedings of the NETWORKING 2004, 2004

Small world overlay P2P networks.
Proceedings of the Quality of Service, 2004

Defending Against Low-Rate TCP Attacks: Dynamic Detection and Protection.
Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), 2004

On the Robustness of Soft State Protocols.
Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), 2004

An Incentive Mechanism for P2P Networks.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

Achieving proportional loss differentiation using probabilistic preemptive burst segmentation in optical burst switching WDM networks.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
Incentive P2P networks: a protocol to encourage information sharing and contribution.
SIGMETRICS Performance Evaluation Review, 2003

Performance Tradeoffs in Scheduling Techniques for Mixed Workloads.
Multimedia Tools Appl., 2003

On the effectiveness of movement prediction to reduce energy consumption in wireless communication.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2003

2002
An Efficient Partitioning Algorithm for Distributed Virtual Environment Systems.
IEEE Trans. Parallel Distrib. Syst., 2002

Automatic Recovery from Disk Failure in Continuous-Media Servers.
IEEE Trans. Parallel Distrib. Syst., 2002

Use of Analytical Performance Models for System Sizing and Resource Allocation in Interactive Video-on-Demand Systems Employing Data Sharing Techniques.
IEEE Trans. Knowl. Data Eng., 2002

Bounding of Performance Measures for Threshold-Based Queuing Systems: Theory and Application to Dynamic Resource Management in Video-on-Demand Servers.
IEEE Trans. Computers, 2002

Multi-path streaming: is it worth the trouble?
SIGMETRICS Performance Evaluation Review, 2002

Multi-path continuous media streaming: what are the benefits?
Perform. Eval., 2002

Design of Scalable Continuous Media Servers.
Multimedia Tools Appl., 2002

Admission control and dynamic adaptation for a proportional-delay diffserv-enabled web server.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2002

A case for a multi-key secure video proxy: theory, design, and implementation.
Proceedings of the 10th ACM International Conference on Multimedia 2002, 2002

An Architectural Infrastructure and Topological Optimization for End System Multicast.
Proceedings of the 10th International Workshop on Modeling, 2002

You Can Run, But You Can't Hide: An Effective Methodology to Traceback DDoS Attackers.
Proceedings of the 10th International Workshop on Modeling, 2002

Providing Throughput Differentiation for TCP Flows Using Adaptive TwoColor Marking and Multi-Level AQM.
Proceedings of the Proceedings IEEE INFOCOM 2002, 2002

Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups.
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP 2002), 2002

2001
Adaptive proportional delay differentiated services: characterization and performance evaluation.
IEEE/ACM Trans. Netw., 2001

Constructing Communication Subgraphs and Deriving an Optimal Synchronization Interval for Distributed Virtual Environment Systems.
IEEE Trans. Knowl. Data Eng., 2001

Open problems for threshold-based systems.
SIGMETRICS Performance Evaluation Review, 2001

2000
Threshold-Based Dynamic Replication in Large-Scale Video-on-Demand Systems.
Multimedia Tools Appl., 2000

A fast and accurate iterative solution of a multi-class threshold-based queueing system with hysteresis.
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 2000

A Performance Study of Dynamic Replication Techniques in Continuous Media Servers.
Proceedings of the MASCOTS 2000, Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 29 August, 2000

An Admission Control Algorithm for Providing Quality-of-Service Guarantee for Individual Connection in a Video-on-Demand System.
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000

Characterization and Performance Evaluation for Proportional Delay Differentiated Services.
Proceedings of the Eighth Annual International Conference on Network Protocols, 2000

Striping Doesn't Scale: How to Achieve Scalability for Continuous Media Servers with Replication.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

1999
Efficient Support for Interactive Service in Multi-Resolution VOD Systems.
VLDB J., 1999

Analytical Models for Mixed Workload Multimedia Storage Servers.
Perform. Eval., 1999

Stochastic Complement Analysis of Multi-Server Threshold Queues with Histeresis.
Perform. Eval., 1999

Distributed Caching and Broadcast in a Wireless Mobile Computing Environment.
Comput. J., 1999

A Performance Study of Dynamic Replication Techniques in Continuous Media Servers.
Proceedings of the 1999 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 1999

Deriving an Optimal Synchronization Interval for Supporting View Consistency in a Distributed Virtual Environment.
Proceedings of the MIS '99, 1999

Location Updates and Probabilistic Tracking Algorithms for Mobile Cellular Networks.
Proceedings of the 1999 International Symposium on Parallel Architectures, 1999

Deriving Communication Sub-Graph and Optimal Synchronizing Interval for a Distributed Virtual Environment System.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

Evaluation of Tradeoffs in Resource Management Techniques for Multimedia Storage Servers.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1999

1998
Computing Performance Bounds of Fork-Join Parallel Programs Under a Multiprocessing Environment.
IEEE Trans. Parallel Distrib. Syst., 1998

A Survey of Approaches to Fault Tolerant Design of VOD Servers: Techniques, Analysis and Comparison.
Parallel Computing, 1998

Merging Video Streams in Multimedia Storage Server: Complexity and Heuristics.
Multimedia Syst., 1998

Introduction: Multimedia computing systems.
Int. J. Intell. Syst., 1998

Threshold-Based Dynamic Replication in Large-Scale Video-on-Demand Systems.
Proceedings of the RIDE'98, 1998

Balancing Workload and Communication Cost for a Distributed Virtual Environment.
Proceedings of the Advances in Multimedia Information Systems, 4th International Workshop, 1998

Transient Performance Analysis for Location Update Protocols in Cellular Networks.
Proceedings of the MASCOTS 1998, 1998

NFS/M: An Open Platform Mobile File System.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

1997
Scheduling and Data Layout Policies for a Near-Line Multimedia Storage Architecture.
Multimedia Syst., 1997

Designing a Hierarchical Multimedia Storage Server.
Comput. J., 1997

Bounding of Performance Measures for a Threshold-based Queueing System with Hysteresis.
Proceedings of the 1997 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 1997

Buffer and I/O Resource Pre-allocation for Implementing Batching and Buffering Techniques for Video-on-Demand Systems.
Proceedings of the Thirteenth International Conference on Data Engineering, 1997

Quantifying Complexity and Performance Gains of Distributed Caching in a Wireless Mobile Computing Environment.
Proceedings of the Thirteenth International Conference on Data Engineering, 1997

1996
Adaptive Piggybacking: A Novel Technique for Data Sharing in Video-on-Demand Storage Servers.
Multimedia Syst., 1996

Distributed Scheduling Framework - A Load Distribution Facility on Mach.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1996

1995
Bounding the Mean Response Time of the Minimum Expected Delay Routing Policy: An Algorithmic Approach.
IEEE Trans. Computers, 1995

I/O Stream Sharing for Continous Media Systems.
IEEE Data Eng. Bull., 1995

Reducing I/O Demand in Video-On-Demand Storage Servers.
Proceedings of the 1995 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, 1995

A Novel Video-On-Demand Storage Architecture for Supporting Constant Frame Rate with Variable Bit Rate Retrieval.
Proceedings of the Network and Operating System Support for Digital Audio and Video, 1995

An Eclectic Survey of Bounding Methods for Markov Chain Models.
Proceedings of the MASCOTS '95, 1995

A Cost-effective Near-line Storage Server for Multimedia System.
Proceedings of the Eleventh International Conference on Data Engineering, 1995

1994
Computing Bounds on Steady State Availability of Repairable Computer Systems.
J. ACM, 1994

1992
Algorithmic Approach to Bounding the Mean Response Time of a Minimum Expected Delay Routing System.
Proceedings of the 1992 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, 1992

Chained Declustering: Load Balancing and Robustness to Skew and Failures.
Proceedings of the RIDE-TQP '92, 1992

1990
Performance Analysis of Disk Arrays under Failure.
Proceedings of the 16th International Conference on Very Large Data Bases, 1990


  Loading...