550 results on '"Yu-kwong Kwok"'
Search Results
202. FASTEST: A Practical Low-Complexity Algorithm for Compile-Time Assignment of Parallel Programs to Multiprocessors.
- Author
-
Yu-Kwong Kwok and Ishfaq Ahmad
- Published
- 1999
- Full Text
- View/download PDF
203. On Parallelizing the Multiprocessor Scheduling Problem.
- Author
-
Ishfaq Ahmad and Yu-Kwong Kwok
- Published
- 1999
- Full Text
- View/download PDF
204. Static scheduling algorithms for allocating directed task graphs to multiprocessors.
- Author
-
Yu-Kwong Kwok and Ishfaq Ahmad
- Published
- 1999
- Full Text
- View/download PDF
205. Practical design of a computation and energy efficient hardware task scheduler in embedded reconfigurable computing systems.
- Author
-
Tyrone Tai-On Kwok and Yu-Kwong Kwok
- Published
- 2006
- Full Text
- View/download PDF
206. Security-Driven Heuristics and A Fast Genetic Algorithm for Trusted Grid Job Scheduling.
- Author
-
Shanshan Song, Yu-Kwong Kwok, and Kai Hwang 0001
- Published
- 2005
- Full Text
- View/download PDF
207. On Exploiting Task Duplication in Parallel Program Scheduling.
- Author
-
Ishfaq Ahmad and Yu-Kwong Kwok
- Published
- 1998
- Full Text
- View/download PDF
208. New Invalidation Algorithms for Wireless Data Caching with Downlink Traffic and Link Adaptation.
- Author
-
Mark Kai Ho Yeung and Yu-Kwong Kwok
- Published
- 2004
- Full Text
- View/download PDF
209. Efficient Scheduling of Arbitrary TAsk Graphs to Multiprocessors Using a Parallel Genetic Algorithm.
- Author
-
Yu-Kwong Kwok and Ishfaq Ahmad
- Published
- 1997
- Full Text
- View/download PDF
210. Design and Evaluation of Data Allocation Algorithms for Distributed Multimedia Database Systems.
- Author
-
Yu-Kwong Kwok, Kamalakar Karlapalem, Ishfaq Ahmad, and Ng Moon Pun
- Published
- 1996
- Full Text
- View/download PDF
211. Dynamic Critical-Path Scheduling: An Effective Technique for Allocating Task Graphs to Multiprocessors.
- Author
-
Yu-Kwong Kwok and Ishfaq Ahmad
- Published
- 1996
- Full Text
- View/download PDF
212. On game theoretic peer selection for resilient peer-to-peer media streaming
- Author
-
Yeung, M.K.H. and Yu-Kwong Kwok
- Subjects
Bandwidth -- Measurement ,Network architecture -- Analysis ,Peer to peer computing -- Analysis ,Scalability -- Evaluation ,Bandwidth allocation ,Bandwidth technology ,Network architecture ,Business ,Computers ,Electronics ,Electronics and electrical industries - Published
- 2009
213. Process Evaluation and Experience Sharing on Utilizing Information Communication Technologies and Digital Games in a Large Community Family Health Event: Hong Kong Jockey Club SMART Family-Link Project
- Author
-
Chiu-Man Wong, Pui-Wah Yam, Yu-Kwong Kwok, Shirley Man-man Sit, Kerin Cham, Florence S W Kong, Charles K.K. Ng, Teresa Yip, Alice Wan, Wai-Yan Tang, Bell C L Wong, Terry S Y Tsui, Eliza Y.W. Lam, Judy Y W Chan, Tai Hing Lam, Hoi-Wa Wong, Tai-On Kwok, Macy Chui, Agnes Y.K. Lai, and Yiu-Lun Wong
- Subjects
Male ,020205 medical informatics ,Adolescent ,health promotion ,media_common.quotation_subject ,Social Welfare ,02 engineering and technology ,information and communication technologies ,03 medical and health sciences ,0302 clinical medicine ,Game design ,Promotion (rank) ,social services ,0202 electrical engineering, electronic engineering, information engineering ,Humans ,030212 general & internal medicine ,family happiness ,media_common ,Original Research ,Family Health ,Social work ,business.industry ,lcsh:Public aspects of medicine ,Communication ,Public Health, Environmental and Occupational Health ,lcsh:RA1-1270 ,Public relations ,Health promotion ,Information and Communications Technology ,Community health ,Hong Kong ,community event ,Female ,Public Health ,Family Relations ,Psychology ,business ,Information Technology ,Knowledge transfer - Abstract
Background: Information communication technologies (ICT) are increasingly used in health promotion, but integration is challenging and involves complex processes. Large community health promotion events are often held but the experiences and processes have rarely been evaluated and published. No reports have described and systematically evaluated an ICT-supported health promotion event using digital games.Objective: We evaluated the development and implementation of a large community family health promotion event with ICT integration to promote family happiness with collaboration between academia (The University of Hong Kong) and the social (family) service sector, and collected feedback from participants and social service workers.Methods: We (i) conducted a systematic process evaluation, (ii) administered an on-site questionnaire survey on participant satisfaction and feedback, and (iii) collected post-event qualitative feedback from social workers on using new technologies, digital game design and overall experiences.Results: Fourteen digital games were designed and run in booths at the event by 12 non-governmental social service organizations and academia. Four gaming technologies were utilized: chroma key (green screen), somatosensory (kinect and leap motion techniques), augmented reality and virtual reality. 1,365 participants joined the event, in which 1,257 from 454 families were recruited and pre-registered through 12 NGOs. About 39.3% were male and more than half (53.3%) were aged 18 years and above. About 3,487 game booth headcounts were recorded. Games using virtual reality, kinect motion and green screen technologies were most liked. The average game satisfaction score was high (4.5 out of 5). Social service workers reported positive experiences with using new technologies in health promotion, and interests in future collaborations involving more ICT.Conclusions: Our systematic evaluation showed successful integration of ICT components in the health promotion event. This event, most likely the first of its kind, served as a capacity building and knowledge transfer platform for interdisciplinary co-sharing and co-learning of new technologies. It provided a solid foundation for further academic and social service partnerships and should be a useful model for similar community events and their evaluation. Further development and integration of ICT for health promotion among social service organizations with comprehensive evaluation are warranted.
- Published
- 2020
- Full Text
- View/download PDF
214. Fast and accurate traffic matrix measurement using adaptive cardinality counting.
- Author
-
Min Cai, Jianping Pan 0001, Yu-Kwong Kwok, and Kai Hwang 0001
- Published
- 2005
- Full Text
- View/download PDF
215. Large vocabulary automatic chord estimation using bidirectional long short-term memory recurrent neural network with even chance training
- Author
-
Yu-Kwong Kwok and Jun-qi Deng
- Subjects
Vocabulary ,Visual Arts and Performing Arts ,business.industry ,Computer science ,Speech recognition ,media_common.quotation_subject ,Deep learning ,Chord recognition ,02 engineering and technology ,030507 speech-language pathology & audiology ,03 medical and health sciences ,Long short term memory ,Recurrent neural network ,0202 electrical engineering, electronic engineering, information engineering ,Music information retrieval ,Chord (music) ,020201 artificial intelligence & image processing ,Artificial intelligence ,0305 other medical science ,business ,Music ,media_common - Abstract
This paper presents an argument for the necessity of a large vocabulary in automatic chord recognition systems, on the grounds of the requirements of machine musicianship. It proposes a system fram...
- Published
- 2017
- Full Text
- View/download PDF
216. On Energy Efficient Communications over Rayleigh Fading Channel with Delivery Rate and Delay Constraints in Wireless Sensor Networks.
- Author
-
Xiao-Hui Lin 0001 and Yu-Kwong Kwok
- Published
- 2007
- Full Text
- View/download PDF
217. Message from the Chairs.
- Author
-
Lorenzo Verdoscia, Laurence Tianruo Yang, Ricky Yu-Kwong Kwok, and John O'Donnell 0001
- Published
- 2005
- Full Text
- View/download PDF
218. WPSS
- Author
-
Chi-Un Lei, Xiao Hu, Yu-Kwong Kwok, and Yuqian Chai
- Subjects
Normalization (statistics) ,Training set ,Artificial neural network ,Computer science ,business.industry ,05 social sciences ,050301 education ,02 engineering and technology ,Machine learning ,computer.software_genre ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,0503 education ,computer ,Data selection - Abstract
There are existing multi-MOOC level dropout prediction research in which many MOOCs' data are involved. This generated good results, but there are two potential problems. On one hand, it is inappropriate to use which week students are in to select training data because courses are with different durations. On the other hand, using all other existing data can be computationally expensive and inapplicable in practice. To solve these problems, we propose a model called WPSS (WPercent and Subset Selection) which combines the course progress normalization parameter wpercent and subset selection. 10 MOOCs offered by The University of Hong Kong are involved and experiments are in the multi-MOOC level. The best performance of WPSS is obtained in neural network when 50% of training data is selected (average AUC of 0.9334). Average AUC is 0.8833 for traditional model without wpercent and subset selection in the same dataset.
- Published
- 2018
- Full Text
- View/download PDF
219. Balancing time and energy efficiencies with identification reliability constraint for portable reader in mobile RFID systems
- Author
-
Hui Wang, Mingjun Dai, Gong Chao Su, Yu Tan, Yu-Kwong Kwok, Xiaohui Lin, and Bin Chen
- Subjects
Mobile radio ,Identification (information) ,Computer Networks and Communications ,Computer science ,Reliability (computer networking) ,Real-time computing ,Frame (networking) ,Mobile RFID ,Energy (signal processing) ,Efficient energy use - Abstract
A mobile radio frequency identification (RFID) system consists of passive moving tags and a battery-constrained portable reader. In such a mobile RFID system, massive tags continuously enter the interrogation zone of the reader, which must quickly and reliably identify all the tags before they leave its coverage area. To meet such performance requirement, in the literature, a plethora of research works has been done in the design and optimization of anti-collision protocols, to enhance the system time efficiency and reduce the tag reading time as much as possible. However, as illustrated in this paper, optimizing the time efficiency does not necessarily lead to maximizing the energy efficiency for the reader. In fact, to efficiently utilize the limited battery energy at the reader, tag reading process should be power-aware consuming just enough energy to achieve the required performance.In this paper, we study the tradeoff between the time and energy efficiencies for tag identification. Specifically, we establish the time and energy efficiency metrics for the system and analyze the impact of frame length on the two metrics. We also consider different tag-moving scenarios, with tag density, moving velocity, prescribed identification constraint, etc., taken into consideration. We then analytically derive the most energy-efficient frame length under different tag moving scenarios. Extensive simulation results indicate that, guided by the derived numerical results, we can achieve as much as 11% improvement in energy efficiency, while satisfying the identification reliability constraint at the same time.
- Published
- 2015
- Full Text
- View/download PDF
220. Exploiting the prefix information to enhance the performance of FSA-based RFID systems
- Author
-
Bin Chen, Xiaohui Lin, Hui Wang, Li Zhang, Yu-Kwong Kwok, and Mingjun Dai
- Subjects
Prefix ,Computer Networks and Communications ,Computer science ,Aloha ,business.industry ,Real-time computing ,Estimator ,Radio-frequency identification ,Synchronizing ,Collision ,business ,Communication channel - Abstract
For a radio frequency identification (RFID) system deployed in dense environment, the reader must quickly and reliably extract information from numerous tags. To harmonize the channel access among competing tags and reduce collision probability, conventionally, framed slotted ALOHA (FSA) scheme is employed to resolve the collisions occurring when numerous tags simultaneously respond to the query of the reader. Typically, FSA algorithm consists of two parts: (i) estimating the number of available tags in vicinity, and (ii) base on the estimated value, setting the frame length accordingly. However, in the FSA scheme, when collision happens, it is impossible to estimate how many colliding tags simultaneously reply in a single slot, which, in turn, can lead to inaccuracy of the estimated cardinality and unreasonable setting of the frame length. This will further result in under-utilization of channel resource and the degradation of the system performance. The problem can be aggravated when all slots in the frame are entirely collided under a dense environment, rendering the malfunction of the estimator. To address this problem, in this paper, a prefix assisted approach, namely, PA-FSA, is proposed to enhance the estimation accuracy of the traditional FSA. Specifically, in PA-FSA, each tag appends a prefix in front of RN16 short message. When replying RN16 to the reader, a tag randomly and independently selects one bit in the prefix and sets the bit as active. By synchronizing prefixes of multiple colliding replies and counting the number of active bits in the overlapping prefixes, the reader can more precisely estimate how many tags have collided in a single slot, thus significantly improving the estimation accuracy. Extensive simulation results indicate that, compared with the traditional schemes, PA-FSA can estimate the tag cardinality more accurately and efficiently. Additionally, with PA-FSA adopted, system can reduce the communication overhead for approximately 50% and shorten the tag identification time for about 15%.
- Published
- 2015
- Full Text
- View/download PDF
221. Cloud Resource Pricing Under Tenant Rationality.
- Author
-
Xin Jin and Yu-Kwong Kwok
- Published
- 2015
- Full Text
- View/download PDF
222. OP-DCI: A Riskless K-Means Clustering for Influential User Identification in MOOC Forum
- Author
-
Chi-Un Lei, Yu-Kwong Kwok, and X. Hou
- Subjects
Computer science ,business.industry ,k-means clustering ,Initialization ,020206 networking & telecommunications ,02 engineering and technology ,Personalized learning ,Machine learning ,computer.software_genre ,Euclidean distance ,Identification (information) ,ComputingMethodologies_PATTERNRECOGNITION ,Local optimum ,Outlier ,0202 electrical engineering, electronic engineering, information engineering ,Unsupervised learning ,020201 artificial intelligence & image processing ,Artificial intelligence ,Cluster analysis ,business ,computer - Abstract
Massive Open Online Courses (MOOCs) have recently been highly popular among worldwide learners, while it is challenging to manage and interpret the large-scale discussion forum which is the dominant channel of online communication. K-Means clustering, one of the famous unsupervised learning algorithms, could help instructors identify influential users in MOOC forum, to better understand and improve online learning experience. However, traditional K-Means suffers from bias of outliers and risk of falling into local optimum. In this paper, OP-DCI, an optimized K-Means algorithm is proposed, using outlier post-labeling and distant centroid initialization. Outliers are not solely filtered out but extracted as distinct objects for post-labeling, and distant centroid initialization eliminates the risk of falling into local optimum. With OP-DCI, learners in MOOC forum are clustered efficiently with satisfactory interpretation, and instructors can subsequently design personalized learning strategies for different clusters.
- Published
- 2017
- Full Text
- View/download PDF
223. Energy Gatekeeper Architecture for Enabling Rapid Development of Energy-Harvesting Internet of Things
- Author
-
Tyrone Tai-On Kwok, Yu-Kwong Kwok, and Cheuk-Wang Yau
- Subjects
Rapid prototyping ,Work (electrical) ,Process (engineering) ,business.industry ,Computer science ,Circuit design ,Embedded system ,Systems architecture ,Architecture ,business ,Energy harvesting ,Task (project management) - Abstract
Energy harvesting is a promising solution to powering billions of sensing and actuation devices in the age of the Internet of Things. However, efforts required to design and implement low-power and harvesting-aware embedded systems are not insignificant. The challenging and costly development process might even inhibit the mass adoption of energy-harvesting devices. In this paper, we present an "energy gatekeeper" architecture that decouples the task of incorporating energy harvesting from application circuit design, followed by our work-in-progress implementation. This work attempts to lower the barrier of integrating energy harvesting into applications by reducing the workload of developers.
- Published
- 2017
- Full Text
- View/download PDF
224. Large Vocabulary Automatic Chord Estimation with an Even Chance Training Scheme
- Author
-
Deng, Jun-Qi and Yu-Kwong Kwok
- Abstract
[TODO] Add abstract here.
- Published
- 2017
- Full Text
- View/download PDF
225. Energy Harvesting in Internet of Things
- Author
-
Yu-Kwong Kwok, Tyrone Tai-On Kwok, Cheuk-Wang Yau, and Chi-Un Lei
- Subjects
business.industry ,Computer science ,020208 electrical & electronic engineering ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,020206 networking & telecommunications ,The Internet ,02 engineering and technology ,business ,Telecommunications ,Internet of Things ,Energy harvesting - Abstract
Powering billions of connected devices has been recognized as one of the biggest hurdles in the development of Internet of Things (IoT). With such a volume of tiny and ubiquitous smart physical objects in this new Internet paradigm, power cables or sizable battery packs are no longer a viable option to bring them online for years and decades. Energy harvesting, which enables devices to be self-sustaining, has been deemed a prominent solution to these constraints. This chapter provides a comprehensive review of IoT devices, from their roles and responsibilities, to the challenges of operating them autonomously in heterogeneous environments. The concepts, principles and design considerations for energy harvesting are introduced to aid researchers and practitioners to incorporate this key technology into their next applications.
- Published
- 2017
- Full Text
- View/download PDF
226. A Hybrid Gaussian-HMM-Deep Learning Approach for Automatic Chord Estimation with Very Large Vocabulary
- Author
-
Deng, Jun-Qi and Yu-Kwong Kwok
- Abstract
[TODO] Add abstract here.
- Published
- 2016
- Full Text
- View/download PDF
227. Automatic Chord estimation on seventhsbass Chord vocabulary using deep neural network
- Author
-
Yu-Kwong Kwok and Jun-qi Deng
- Subjects
Vocabulary ,Artificial neural network ,business.industry ,Computer science ,Speech recognition ,media_common.quotation_subject ,Pattern recognition ,02 engineering and technology ,030507 speech-language pathology & audiology ,03 medical and health sciences ,ComputingMethodologies_PATTERNRECOGNITION ,Metric (mathematics) ,0202 electrical engineering, electronic engineering, information engineering ,Chord (music) ,020201 artificial intelligence & image processing ,Artificial intelligence ,Layer (object-oriented design) ,0305 other medical science ,business ,Hidden Markov model ,media_common - Abstract
This paper proposes an automatic chord estimation (ACE) system with a two-layer architecture. The first layer performs chord smoothing with "GMM + HMM" approach. Then given the results of the first layer, the second layer performs chord estimation using a deep neural network, which is trained on a well chord-type balanced dataset. The system accepts exactly the "SeventhsBass" vocabulary. Three approaches with different configurations of the system are compared with Chordino, which is probably the only both MIREX evaluated and "SeventhsBass" acceptable ACE system. Evaluation results on "The Beatles" dataset show that the best approach outperforms Chordino in the most difficult "SeventhsBass" metric in a significant way.
- Published
- 2016
- Full Text
- View/download PDF
228. STORM: A nonlinear model order reduction method via symmetric tensor decomposition
- Author
-
Haotian Liu, Jian Deng, Ngai Wong, Kim Batselier, and Yu-Kwong Kwok
- Subjects
Pure mathematics ,Generalization ,Computation ,Structure (category theory) ,Storm ,010103 numerical & computational mathematics ,02 engineering and technology ,01 natural sciences ,020202 computer hardware & architecture ,Nonlinear system ,0202 electrical engineering, electronic engineering, information engineering ,Applied mathematics ,Symmetric matrix ,Symmetric tensor ,Tensor ,0101 mathematics ,Mathematics - Abstract
Nonlinear model order reduction has always been a challenging but important task in various science and engineering fields. In this paper, a novel symmetric tensor-based order-reduction method (STORM) is presented for simulating large-scale nonlinear systems. The multidimensional data structure of symmetric tensors, as the higher order generalization of symmetric matrices, is utilized for the effective capture of high-order nonlinearities and efficient generation of compact models. Compared to the recent tensor-based nonlinear model order reduction (TNMOR) algorithm [1], STORM shows advantages in two aspects. First, STORM avoids the assumption of the existence of a low-rank tensor approximation. Second, with the use of the symmetric tensor decomposition, STORM allows significantly faster computation and less storage complexity than TNMOR. Numerical experiments demonstrate the superior computational efficiency and accuracy of STORM against existing nonlinear model order reduction methods.
- Published
- 2016
- Full Text
- View/download PDF
229. A game theoretic approach to balancing energy consumption in heterogeneous wireless sensor networks
- Author
-
Ning Xie, Yu-Kwong Kwok, Hui Wang, and Xiaohui Lin
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,Distributed computing ,Stochastic game ,Energy consumption ,symbols.namesake ,Transmission (telecommunications) ,Nash equilibrium ,Sensor node ,symbols ,Electrical and Electronic Engineering ,business ,Wireless sensor network ,Game theory ,Energy (signal processing) ,Information Systems ,Computer network - Abstract
Energy balancing is an effective technique in enhancing the lifetime of a wireless sensor network WSN. Specifically, balancing the energy consumption among sensors can prevent losing some critical sensors prematurely due to energy exhaustion so that the WSN's coverage can be maintained. However, the heterogeneous hostile operating conditions-different transmission distances, varying fading environments, and distinct residual energy levels-have made energy balancing a highly challenging task. A key issue in energy balancing is to maintain a certain level of energy fairness in the whole WSN. To achieve energy fairness, the transmission load should be allocated among sensors such that, regardless of a sensor's working conditions, no sensor node should be unfairly overburdened. In this paper, we model the transmission load assignment in WSN as a game. With our novel utility function that can capture realistic sensors' behaviors, we have derived the Nash equilibrium NE of the energy balancing game. Most importantly, under the NE, while each sensor can maximize its own payoff, the global objective of energy balancing can also be achieved. Moreover, by incorporating a penalty mechanism, the delivery rate and delay constraints imposed by the WSN application can be satisfied. Through extensive simulations, our game theoretic approach is shown to be effective in that adequate energy balancing is achieved and, consequently, network lifetime is significantly enhanced. Copyright © 2012 John Wiley & Sons, Ltd.
- Published
- 2012
- Full Text
- View/download PDF
230. On Game Theoretic Peer Selection for Resilient Peer-to-Peer Media Streaming
- Author
-
M.K.H. Yeung and Yu-Kwong Kwok
- Subjects
Protocol (science) ,Web server ,Computer science ,business.industry ,Peer-to-peer ,computer.software_genre ,Dead Peer Detection ,Computational Theory and Mathematics ,Hardware and Architecture ,Signal Processing ,Bandwidth (computing) ,The Internet ,Upstream (networking) ,business ,computer ,Game theory ,Computer network - Abstract
Peer-to-peer (P2P) media streaming quickly emerges as an important application over the Internet. A plethora of approaches have been suggested and implemented to support P2P media streaming. In our study, we first classified existing approaches and studied their characteristics by looking at three important quantities: number of upstream peers (parents), number of downstream peers (children), and average number of links per peer. In existing approaches, peers are assigned with a fixed number of parents without regard to their contributions, measured by the amount of outgoing bandwidths. Obviously, this is an undesirable arrangement as it leads to highly inefficient use of the P2P links. This observation motivates us to model the peer selection process as a cooperative game among peers. This results in a novel peer selection protocol such that the number of upstream peers of a peer is related to its outgoing bandwidth. Specifically, peers with larger outgoing bandwidth are given more parents, which make them less vulnerable to peer dynamics. Simulation results show that the proposed protocol improves delivery ratio using similar number of links per peer, comparing with existing approaches under a wide range of system parameters.
- Published
- 2009
- Full Text
- View/download PDF
231. Cross-layer design for energy efficient communication in wireless sensor networks
- Author
-
Xiao-Hui Lin, Yu-Kwong Kwok, and Hui Wang
- Subjects
Computer Networks and Communications ,Electrical and Electronic Engineering ,Information Systems - Published
- 2009
- Full Text
- View/download PDF
232. A Low-Complexity QoS-Aware Proportional Fair Multicarrier Scheduling Algorithm for OFDM Systems
- Author
-
Jiangzhou Wang, Yu-Kwong Kwok, and Zhen Kong
- Subjects
Network scheduler ,Computer Networks and Communications ,Computer science ,Aerospace Engineering ,Throughput ,Proportionally fair ,Multiplexing ,Scheduling (computing) ,Packet switching ,Telecommunications link ,Fairness measure ,Wireless ,Resource management ,Electrical and Electronic Engineering ,Queue ,business.industry ,Network packet ,Quality of service ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Physical layer ,Automotive Engineering ,Resource allocation ,Algorithm design ,business ,Communication channel ,Computer network ,Data link layer - Abstract
Orthogonal frequency-division multiplexing (OFDM) systems are the major cellular platforms for supporting ubiquitous high-speed mobile applications. However, a number of research challenges remain to be tackled. One of the most important challenges is the design of a judicious packet scheduler that will make efficient use of the spectrum bandwidth. Due to the multicarrier nature of the OFDM systems, the applicability and performance of traditional wireless packet-scheduling algorithms, which are usually designed for single-carrier systems, are largely unknown. In th.is paper, we propose a new quality-of-service (QoS)-aware proportional fairness (QPF) packet-scheduling policy with low complexity for the downlink of multiuser OFDM systems to allocate radio resources among users. Our proposed algorithm is based on a cross-layer design in that the scheduler is aware of both the channel (i.e., physical layer) and the queue state (i.e., data link layer) information to achieve proportional fairness while maximizing each user's packet-level QoS performance. The simulation results show that the proposed QPF algorithm is efficient in terms of average system throughput, packet-dropping probability, and packet delay, while maintaining adequate fairness among users with relatively low scheduling overhead.
- Published
- 2009
- Full Text
- View/download PDF
233. On scheduling and clustering in hierarchical TH-PPM UWB wireless ad hoc networks
- Author
-
Yu-Kwong Kwok, Jiangzhou Wang, and Yang Liu
- Subjects
Vehicular ad hoc network ,Computer science ,business.industry ,Wireless ad hoc network ,Wireless network ,Mobile computing ,Throughput ,Mobile ad hoc network ,Ad hoc wireless distribution service ,Theoretical Computer Science ,Scheduling (computing) ,Optimized Link State Routing Protocol ,Hardware and Architecture ,Resource allocation ,Wireless ,Resource management ,Cluster analysis ,business ,Software ,Information Systems ,Computer network - Abstract
Ultra wideband (UWB) systems are considered as the key wireless infrastructure platforms for efficient short-range communications. In particular, the UWB based mobile computing systems are envisioned to be attractive solutions to various ad hoc networking applications. However, due to UWB's unique physical characteristics, the traditional resource management schemes for ad hoc networks cannot be applied to UWB based systems directly. In this paper, we consider the bandwidth scheduling problem in a UWB based hierarchical wireless ad hoc network, which is typically used in an enterprise-scale mobile computing environment. Based on the mathematical analysis and the computer simulations, it is demonstrated that our proposed scheduling scheme exhibits close-to-optimal performance governed by the proportional fairness (PF) constraint. Moreover, a novel self-organized clustering method is designed to improve the system throughput while meeting the PF constraint. Simulation results suggest that the proposed clustering method is effective under various system configurations.
- Published
- 2008
- Full Text
- View/download PDF
234. Incentive Issues in Peer‐to‐Peer Systems
- Author
-
Yu-Kwong Kwok
- Subjects
Incentive ,business.industry ,Internet privacy ,The Internet ,Peer-to-peer ,Computer security ,computer.software_genre ,business ,computer - Published
- 2007
- Full Text
- View/download PDF
235. High performance power control and opportunistic fair scheduling in TH-PPM UWB ad-hoc multimedia networks
- Author
-
Yu-Kwong Kwok, Jiangzhou Wang, and Yang Liu
- Subjects
business.industry ,Wireless network ,Wireless ad hoc network ,Computer science ,Mobile broadband ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Mobile computing ,Ultra-wideband ,Theoretical Computer Science ,Scheduling (computing) ,Hardware and Architecture ,Wireless ,business ,Software ,Information Systems ,Power control ,Computer network - Abstract
Ultra wideband (UWB) systems are currently an important wireless infrastructure for high performance short-range communications and mobile applications. Indeed, forming ad-hoc networks among various UWB enabled devices is considered as an important mobile data exchange operating environment. In our study, we explore the problem of jointly optimizing the power level and data rate used in the devices in such a UWB based ad-hoc network. We propose a practical optimization algorithm based on judicious power control for real-time applications and opportunistic scheduling for non-real-time applications. Simulation results indicate that our proposed techniques are effective under various practical scenarios.
- Published
- 2007
- Full Text
- View/download PDF
236. Practical channel state aware and cooperative packet scheduling disciplines for coordinating colocated Bluetooth and IEEE 802.11b devices
- Author
-
Yu-Kwong Kwok and Hoi Kit Yip
- Subjects
IEEE 802 ,IEEE 802.11u ,Computer Networks and Communications ,Wireless network ,business.industry ,Computer science ,Quality of service ,Mobile computing ,Network layer ,Scheduling (computing) ,law.invention ,Bluetooth ,Packet switching ,IEEE 802.11b-1999 ,law ,IEEE 802.1X ,business ,Communication channel ,Computer network - Abstract
Attempts to satisfy the demand for ubiquitous communications have resulted in a proliferation of hand-held short range communication devices based on the ISM (Industrial, Scientific, Medical) band technologies, most notably Bluetooth and IEEE 802.11b. However, coexistence between Bluetooth and IEEE 802.11b has become a critical issue that could severely hinder the performance achieved by user devices. In this study we performed a detailed implementation of a Linux based network access point (NAP), in which Bluetooth and IEEE 802.11b interfaces are colocated. Such an NAP is crucial in supporting ''hot-spot'' systems targeted to serve nomadic users carrying either a Bluetooth or an IEEE 802.11b device. Specifically, the goal of our study is to investigate the efficacy of a software-based interference coordination approach, through a detailed actual implementation so as to identify system issues which are difficult to obtained by simulations. We considered a wide range of common scheduling algorithms as the possible solutions in a Linux environment to estimate the interference effects as viewed from the network layer perspective. Upon our investigation, two wireless scheduling algorithms based on Channel State Independent Fair Queueing (CIFQ) were implemented in Linux to test their empirical performance under this NAP application. Finally, guided by our practical findings, we proposed and implemented two new packet scheduling algorithms in Linux to provide the best trade-offs to colocated Bluetooth and IEEE 802.11b traffics, as well as QoS support for different applications. Our results show that dynamic priorities and cooperative transmissions between Bluetooth and IEEE 802.11b traffic can effectively protect both interfaces from interference. We also compared our proposed scheme with two MAC layer approaches.
- Published
- 2007
- Full Text
- View/download PDF
237. On channel adaptive energy management with available bandwidth estimation in wireless sensor networks
- Author
-
Hui Wang, Yu-Kwong Kwok, and Xiaohui Lin
- Subjects
Computer Networks and Communications ,business.industry ,Energy management ,Computer science ,Mobile computing ,Throughput ,Energy conservation ,Key distribution in wireless sensor networks ,Bandwidth (computing) ,Wireless ,Resource management ,Electrical and Electronic Engineering ,business ,Telecommunications ,Wireless sensor network ,Information Systems ,Computer network ,Communication channel ,Data transmission ,Efficient energy use - Abstract
To enhance the lifetime of a sensor network which consists of hundreds or even thousands of resource-limited devices, energy efficient communication is mandatory. Despite that a plethora of work has been done in designing energy efficient protocols for sensor networks, the time-varying nature of wireless channel is largely unexplored. Indeed, we believe that a cross-layer design on power aware communication is necessary to further optimize energy usage. In this paper, we propose a new channel adaptive power aware protocol, called CAEM, which works by dynamically adjusting the data throughput under different channel conditions with the help of an adaptive channel coding and modulation facility. Each sensor device judiciously accesses the wireless medium in that communication activity is reduced for devices under poor channel conditions. Simulation results indicate that the proposed CAEM protocol can lead to energy conservation by as much as 30 per cent. Furthermore, CAEM is also efficient in channel utilization as it generates a higher data throughput even under heavy traffic load. Copyright © 2007 John Wiley & Sons, Ltd.
- Published
- 2007
- Full Text
- View/download PDF
238. CypherDB: a novel architecture for outsourcing secure database processing
- Author
-
Yu-Kwong Kwok, Paul Y. S. Cheung, Peter Y. K. Cheung, and Bony H. K. Chen
- Subjects
Technology ,Computer Networks and Communications ,View ,Computer science ,Cloud computing ,02 engineering and technology ,0805 Distributed Computing ,computer.software_genre ,01 natural sciences ,Database tuning ,Database testing ,Computer Science, Theory & Methods ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Mobile database ,computer architecture ,010302 applied physics ,Science & Technology ,Computer Science, Information Systems ,Database ,Distributed database ,business.industry ,secure processor ,Remote Database Access ,Database security ,Computer Science, Software Engineering ,confidentiality ,cloud security ,020202 computer hardware & architecture ,Computer Science Applications ,Hardware and Architecture ,0806 Information Systems ,Computer Science ,Benchmark (computing) ,Operating system ,hardware security ,business ,computer ,Software ,Information Systems - Abstract
CypherDB addresses the problem of protecting the confidentiality of database stored externally in a cloud and enabling efficient computation over it to thwart any curious-but-honest cloud computing service provider. It works by encrypting the entire outsourced database and executing queries over the encrypted data using our novel CypherDB secure processor architecture. To optimize computational efficiency, our proposed processor architecture provides tightly-coupled datapaths that avoid information leakage during database access and query execution. Our simulation using a well-known database benchmark TPC-H over a commercial grade Database Management System (SQLite) demonstrates that our proposed architecture incurs an average of about 10 percent overhead when compared with the same set of operations without secure database processing.
- Published
- 2015
239. Towards In Time Music Mood-Mapping for Drivers
- Author
-
Edith C.-H. Ngai, Arun Sai Krishnan, Yu-Kwong Kwok, Xiping Hu, Victor C. M. Leung, Xitong Li, Li Zhou, and Jun-qi Deng
- Subjects
Engineering ,Multimedia ,InformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.,HCI) ,Process (engineering) ,business.industry ,Cloud computing ,Recommender system ,computer.software_genre ,Context based ,Music mood ,Key (music) ,Risk analysis (engineering) ,SAFER ,Delivery system ,business ,computer - Abstract
Road safety is a huge concern due to the large number of fatalities and injuries caused by road accidents. Research has shown that fatigue can adversely affect driving performance and increase risk of road accidents. It has been shown that driving performance is enhanced by stress-relieving music which thereby promotes safer driving. Context-aware music delivery systems promote safer driving through intelligent music recommendations based on contextual knowledge. Two key aspects of situation-aware music delivery are effectiveness and efficiency of music recommendation. Efficiency is a critical aspect in real-time context based music recommendation as the music delivery system should quickly sense any change in the situation and deliver suitable music before the sensed context-data becomes obsolete. We focus on the efficiency of situation-aware music delivery systems in this paper. Music mood-mapping is a process which helps in understanding the mood of a song and is hence used in situation-aware music recommendation systems. This process requires a large processing time due to the complex calculations and large sizes of music files involved. Hence, optimizing this process is the key to improving the efficiency of context-aware music delivery systems. Here, we propose a novel cloud and crowd-sensing based approach to considerably optimize the efficiency of situation-aware music delivery systems.
- Published
- 2015
- Full Text
- View/download PDF
240. A Novel Cloud-Based Crowd Sensing Approach to Context-Aware Music Mood-Mapping for Drivers
- Author
-
Yu-Kwong Kwok, Chunsheng Zhu, Min Liang, Arun Sai Krishnan, Jun-qi Deng, Renfei Wang, Victor C. M. Leung, and Xiping Hu
- Subjects
Multimedia ,InformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.,HCI) ,business.industry ,Computer science ,Process (engineering) ,Context (language use) ,Cloud computing ,Recommender system ,computer.software_genre ,Mood ,Leverage (negotiation) ,Active listening ,business ,computer - Abstract
Millions of people are severely injured or killed in road accidents every year and most of these accidents are caused by human error. Fatigue and negative emotions such as anger adversely affect driver performance, thereby increasing the risk involved in driving. Research has shown that listening to the right kind of music in these situations can ameliorate driver performance and improve road safety. Context-aware music delivery systems succeed in delivering suitable music according to the situation through the process of music mood-mapping which identifies the mood of a song. Additionally, we can leverage the power of the cloud to enable crowd sensing of the mood-mapping of various songs and enhance the effectiveness of situation-aware music delivery for drivers. The cloud can be used to aggregate the crowd sensed music mood-mapping data and improve the effectiveness of music delivery by providing accurate mood-mappings from the aggregated data. Currently, context-aware music delivery systems consider only features from the song for music mood-mapping. In this paper, we propose a novel approach to music mood-mapping for drivers which also incorporates the social context of a driver including age, gender and cultural background to enhance the effectiveness of music delivery in context-aware music recommendation systems for drivers.
- Published
- 2015
- Full Text
- View/download PDF
241. Cloud Resource Pricing Under Tenant Rationality
- Author
-
Yu-Kwong Kwok and Xin Jin
- Subjects
Microeconomics ,Bargaining problem ,business.industry ,Stackelberg competition ,Resource allocation ,Revenue ,Perfect competition ,Workload ,Cloud computing ,Business ,Monopoly ,Industrial organization - Abstract
With the recent emergence of the cloud market, cloud resource pricing fundamentally determines cloud revenue, cloud resource allocation and tenant demand dynamics. However, strategic interactions between cloud providers and tenant users are largely unknown. In this chapter, we consider a monopoly cloud market by formulating a competitive market among tenants. A novel Stackelberg game is proposed to tractably analyze such strategic interactions for optimal cloud resource pricing. To empirically evaluate our analyses, we conduct extensive simulations driven by 40 GB of realistic workload traces from Google.
- Published
- 2015
- Full Text
- View/download PDF
242. SAfeDJ : A crowd-cloud codesign approach to situation-aware music delivery for drivers
- Author
-
Jun-qi Deng, Min Liang, Johnny Shen, Renfei Wang, Jidi Zhao, Yu-Kwong Kwok, Xitong Li, Wenyan Hu, Edith C.-H. Ngai, Victor C. M. Leung, and Xiping Hu
- Subjects
Multimedia ,Computer Networks and Communications ,business.industry ,Computer science ,Communication Systems ,Context (language use) ,Cloud computing ,Recommender system ,Communications system ,computer.software_genre ,Datorteknik ,Crowdsensing ,Mood ,Hardware and Architecture ,State (computer science) ,Computer Engineering ,business ,computer ,Kommunikationssystem - Abstract
Driving is an integral part of our everyday lives, but it is also a time when people are uniquely vulnerable. Previous research has demonstrated that not only does listening to suitable music while driving not impair driving performance, but it could lead to an improved mood and a more relaxed body state, which could improve driving performance and promote safe driving significantly. In this article, we propose SAfeDJ, a smartphone-based situation-aware music recommendation system, which is designed to turn driving into a safe and enjoyable experience. SAfeDJ aims at helping drivers to diminish fatigue and negative emotion. Its design is based on novel interactive methods, which enable in-car smartphones to orchestrate multiple sources of sensing data and the drivers' social context, in collaboration with cloud computing to form a seamless crowdsensing solution. This solution enables different smartphones to collaboratively recommend preferable music to drivers according to each driver's specific situations in an automated and intelligent manner. Practical experiments of SAfeDJ have proved its effectiveness in music-mood analysis, and mood-fatigue detections of drivers with reasonable computation and communication overheads on smartphones. Also, our user studies have demonstrated that SAfeDJ helps to decrease fatigue degree and negative mood degree of drivers by 49.09% and 36.35%, respectively, compared to traditional smartphone-based music player under similar driving situations.
- Published
- 2015
243. A game theoretic approach to power aware wireless data access
- Author
-
M.K.H. Yeung and Yu-Kwong Kwok
- Subjects
Mobile radio ,Scheme (programming language) ,Computer Networks and Communications ,Computer science ,business.industry ,Distributed computing ,Probabilistic logic ,Information access ,Mobile computing ,Energy consumption ,Data access ,Electrical and Electronic Engineering ,business ,computer ,Game theory ,Software ,Computer network ,computer.programming_language - Abstract
We consider a basic scenario in wireless data access: a number of mobile clients are interested in a set of data items kept at a common server. Each client independently sends requests to inform the server of its desired data items and the server replies with a broadcast channel. We are interested in studying the energy consumption characteristics in such a scenario. First, we define a utility function for quantifying performance. Based on the utility function, we formulate the wireless data access scenario as a noncooperative game - wireless data access (WDA) game. Although our proposed probabilistic data access scheme does not rely on client caching, game theoretical analysis shows that clients do not always need to send requests to the server. Simulation results also indicate that our proposed scheme, compared with a simple always-request one, increases the utility and lifetime of every client while reducing the number of requests sent, with a cost of slightly larger average query delay. We also compare the performance of our proposed scheme with two popular schemes that employ client caching. Our results show that caching-only benefits clients with high query rates at the expense of both shorter lifetime and smaller utility in other clients
- Published
- 2006
- Full Text
- View/download PDF
244. Risk-resilient heuristics and genetic algorithms for security-assured grid job scheduling
- Author
-
Yu-Kwong Kwok, Kai Hwang, and Shanshan Song
- Subjects
Rate-monotonic scheduling ,Job scheduler ,Job shop scheduling ,Computer science ,Distributed computing ,Preemption ,Flow shop scheduling ,Dynamic priority scheduling ,computer.software_genre ,Grid ,Job queue ,Fair-share scheduling ,Theoretical Computer Science ,Scheduling (computing) ,Fixed-priority pre-emptive scheduling ,Computational Theory and Mathematics ,Grid computing ,Hardware and Architecture ,Two-level scheduling ,Lottery scheduling ,Resource allocation ,Resource management ,Heuristics ,computer ,Software - Abstract
In scheduling a large number of user jobs for parallel execution on an open-resource grid system, the jobs are subject to system failures or delays caused by infected hardware, software vulnerability, and distrusted security policy. This paper models the risk and insecure conditions in grid job scheduling. Three risk-resilient strategies, preemptive, replication, and delay-tolerant, are developed to provide security assurance. We propose six risk-resilient scheduling algorithms to assure secure grid job execution under different risky conditions. We report the simulated grid performances of these new grid job scheduling algorithms under the NAS and PSA workloads. The relative performance is measured by the total job makespan, grid resource utilization, job failure rate, slowdown ratio, replication overhead, etc. In addition to extending from known scheduling heuristics, we developed a new space-time genetic algorithm (STGA) based on faster searching and protected chromosome formation. Our simulation results suggest that, in a wide-area grid environment, it is more resilient for the global job scheduler to tolerate some job delays instead of resorting to preemption or replication or taking a risk on unreliable resources allocated. We find that delay-tolerant min-min and STGA job scheduling have 13-23 percent higher performance than using risky or preemptive or replicated algorithms. The resource overheads for replicated job scheduling are kept at a low 15 percent. The delayed job execution is optimized with a delay factor, which is 20 percent of the total makespan. A Kiviat graph is proposed for demonstrating the quality of grid computing services. These risk-resilient job scheduling schemes can upgrade grid performance significantly at only a moderate increase in extra resources or scheduling delays in a risky grid computing environment
- Published
- 2006
- Full Text
- View/download PDF
245. High Data Rate Video Transmission Using Parallel TCP Connections: Approaches and Performance Evaluation
- Author
-
Yu-Kwong Kwok and Hon-Hing Wan
- Subjects
High data rate ,Computer science ,business.industry ,Network packet ,Transmission Control Protocol ,Parallel algorithm ,Theoretical Computer Science ,Scheduling (computing) ,Hardware and Architecture ,Multithreading ,Scalability ,business ,Software ,Information Systems ,Computer network - Abstract
In our study, we investigate a packet-level protocol parallelization approach, which works by parallel multithreading the protocol execution such that packets within and among connections are processed in parallel using distinct processors/threads. The major advantage of this approach is its high scalability--with proper scheduling, more protocol connections, and hence more requests, can be supported by using more threads. In this paper, we present results of our detailed simulations using the NS-2 platform for reliably transferring video stream data in a client-server system. Different types of parameters are used to measure the performance. The parameters include available network bandwidth, different number of TCP connections, and different video sources. Our results show that a parallel approach can indeed significantly enhance the playback quality.
- Published
- 2006
- Full Text
- View/download PDF
246. A semi-static approach to mapping dynamic iterative tasks onto heterogeneous computing systems
- Author
-
Arif Ghafoor, Yu-Kwong Kwok, Anthony A. Maciejewski, Ishfaq Ahmad, and Howard Jay Siegel
- Subjects
Artificial Intelligence ,Computer Networks and Communications ,Hardware and Architecture ,Computer science ,Iterative method ,Genetic algorithm ,Parallel algorithm ,Symmetric multiprocessor system ,Parameter space ,Algorithm ,Software ,Theoretical Computer Science ,Scheduling (computing) - Abstract
Minimization of the execution time of an iterative application in a heterogeneous parallel computing environment requires an appropriate mapping scheme for matching and scheduling the subtasks of a given application onto the processors. Often, some of the characteristics of the application subtasks are unknown a priori or change from iteration to iteration during execution-time based on the inputs being processed. In such a scenario, it may not be feasible to use the same off-line-derived mapping for each iteration of the application. One possibility is to employ a semi-static methodology that starts with an initial mapping but dynamically performs remapping between application iterations by observing the effects of the changing characteristics of the application's input data, called dynamic parameters, on the application's execution time. A contribution in this paper is to implement and evaluate a semi-static methodology involving the on-line use of off-line-derived mappings. The off-line phase is based on a genetic algorithm (GA) to generate high-quality mappings for a range of values for the dynamic parameters. A dynamic parameter space partitioning and sampling scheme is proposed that partitions the parameter space into a number of hyper-rectangles, within which the ''best'' mapping for each hyper-rectangle is stored in a mapping table. During the on-line phase, the actual dynamic parameters are observed and the off-line-derived mapping table is referenced to choose the most suitable mapping. Experimental results indicate that the semi-static approach outperforms a dynamic on-line approach and performs reasonably close to an infeasible on-line GA approach. Furthermore, the semi-static approach considerably outperforms the method of using the same mapping for all iterations.
- Published
- 2006
- Full Text
- View/download PDF
247. Trusted P2P Transactions with Fuzzy Reputation Aggregation
- Author
-
Kai Hwang, Yu-Kwong Kwok, Runfang Zhou, and Shanshan Song
- Subjects
Distrust ,Computer Networks and Communications ,Computer science ,Transaction processing ,business.industry ,media_common.quotation_subject ,Peer-to-peer ,computer.software_genre ,Computer security ,Fuzzy logic ,Reputation system ,ComputingMilieux_COMPUTERSANDSOCIETY ,The Internet ,business ,computer ,Transaction data ,Reputation ,media_common - Abstract
Internet commerce and online commodity exchanges suffer from distrust among sellers and buyers, who are often strangers to each other. The authors present a new P2P reputation system based on fuzzy logic inferences, which can better handle uncertainty, fuzziness, and incomplete information in peer trust reports. This system aggregates peer reputations with affordable message overhead. By testing the system using eBay transaction data in the public domain, the authors seek to demonstrate the efficacy and robustness of two P2P reputation systems - fuzzytrust and eigentrust - at establishing trust among the peers in P2P applications.
- Published
- 2005
- Full Text
- View/download PDF
248. Trusted Grid Computing with Security Binding and Trust Integration
- Author
-
Kai Hwang, Yu-Kwong Kwok, and Shanshan Song
- Subjects
Authentication ,Computer Networks and Communications ,Computer science ,business.industry ,Distributed computing ,Public key infrastructure ,Grid ,computer.software_genre ,Outsourcing ,Grid computing ,Hardware and Architecture ,Software security assurance ,Resource allocation ,Computational trust ,business ,computer ,Software ,Information Systems - Abstract
Trusted Grid computing demands robust resource allocation with security assurance at all resource sites. Largescale Grid applications are being hindered by lack of security assurance from remote resource sites. We developed a security-binding scheme through site reputation assessment and trust integration across Grid sites. We do not treat the trust factor deterministically. Instead, we apply fuzzy theory to handle the fuzziness or uncertainties behind all trust attributes. The binding is achieved by periodic exchange of site security information and matchmaking to satisfy user job demands. PKI-based trust model supports Grids in multi-site authentication and single sign-on operations. However, cross certificates are inadequate to assess local security conditions at Grid sites. We propose a new fuzzy-logic trust model for distributed trust aggregation through fuzzification and integration of security attributes. We introduce the trust index of a Grid site, which is determined by site reputation from its track record and self-defense capability attributed to the risk conditions and hardware and software defenses deployed at a Grid site. A Secure Grid Outsourcing (SeGO) system is designed for secure scheduling a large number of autonomous and indivisible jobs to Grid sites. Significant performance gains are observed after trust aggregation, which is evaluated by running scalable NAS and PSA workloads over simulated Grids. Our security-binding scheme scales well with increasing user jobs and Grid sites. The new scheme can guide the security upgrade of Grid sites and predict the Grid performance of large workloads under risky conditions. Nomenclature: Si ‐t heith Grid site among m sites; Ji ‐t hej th job in a stream of n user jobs; m ‐ number of Grid sites; n ‐ number of jobs submitted to the system; tij ‐ trust index of site Si assessed by site Sj ; Vi ‐ trust vector maintained at site Si; M ‐ trust matrix for the entire Grid (dimension m × m); � ‐ site reputation or job success rate at a site; � ‐ self-defense capability of a Grid site; SD ‐ security demand of a user job; TI ‐ site trust index for secure job mapping, same as tij .
- Published
- 2005
- Full Text
- View/download PDF
249. Collaborative Internet Worm Containment
- Author
-
Shanshan Song, Min Cai, Kai Hwang, Yu Chen, and Yu-Kwong Kwok
- Subjects
021110 strategic, defence & security studies ,Computer Networks and Communications ,business.industry ,Computer science ,Network security ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Internet privacy ,0211 other engineering and technologies ,Overlay network ,020206 networking & telecommunications ,Denial-of-service attack ,02 engineering and technology ,Computer security ,computer.software_genre ,Flooding (computer networking) ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,0202 electrical engineering, electronic engineering, information engineering ,The Internet ,Electrical and Electronic Engineering ,business ,Law ,computer - Abstract
Large-scale worm outbreaks that lead to distributed denial-of-service attacks pose a major threat to Internet infrastructure security. Fast worm containment is crucial for minimizing damage and preventing flooding attacks against network hosts.
- Published
- 2005
- Full Text
- View/download PDF
250. A quantitative comparison of ad hoc routing protocols with and without channel adaptation
- Author
-
Xiaohui Lin, Yu-Kwong Kwok, and Vincent K. N. Lau
- Subjects
Routing protocol ,Dynamic Source Routing ,Computer Networks and Communications ,computer.internet_protocol ,Computer science ,Wireless ad hoc network ,Distributed computing ,Mobile computing ,Wireless Routing Protocol ,Throughput ,Adaptive routing ,On Demand Routing ,Routing Information Protocol ,Wireless ,Destination-Sequenced Distance Vector routing ,Electrical and Electronic Engineering ,Ad hoc routing ,Zone Routing Protocol ,Static routing ,Vehicular ad hoc network ,Adaptive quality of service multi-hop routing ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,DSRFLOW ,Mobile ad hoc network ,Ad hoc wireless distribution service ,Distance-vector routing protocol ,Link-state routing protocol ,Optimized Link State Routing Protocol ,Geocast ,Interior gateway protocol ,business ,computer ,Software ,Computer network - Abstract
To efficiently support tetherless applications in ad hoc wireless mobile computing networks, a judicious ad hoc routing protocol is needed. Much research has been done on designing ad hoc routing protocols and some well-known protocols are also being implemented in practical situations. However; one major imperfection in existing protocols is that the time-varying nature of the wireless channels among the mobile-terminals is ignored; let alone exploited. This could be a severe design drawback because the varying channel quality can lead to very poor overall route quality in turn, resulting in low data throughput. Indeed, better performance could be achieved if a routing protocol dynamically changes the routes according to the channel conditions. In this paper, we first propose two channel adaptive routing protocols which work by using an adaptive channel coding and modulation scheme that allows a mobile terminal to dynamically adjust the data throughput via changing the amount of error protection incorporated. We then present a qualitative and quantitative comparison of the two classes of ad hoc routing protocols. Extensive simulation results indicate that channel adaptive ad hoc routing protocols are more efficient in that shorter delays and higher rates are achieved, at the expense of a higher overhead in route set-up and maintenance.
- Published
- 2005
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.