Search For:

Displaying 1-50 out of 129 total
An Access Control Model for Trustworthy Network
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Fujun Feng, Chuang Lin, Junshan Li
Issue Date:April 2009
pp. 308-311
Trustworthy network is the inevitable trend in the development of high trusted computing and Internet. It is beyond the traditional information security including confidentiality, integrity and availability, but on the survivability and controllability. Tr...
 
QoS-aware Scheduling Algorithm Based on Complete Matching of User Jobs and Grid Services
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Weidong Hao, Yang Yang, Chuang Lin, Zhengli Zhai
Issue Date:December 2006
pp. 433-439
Grid Services Scheduling is a challenging problem under Open Grid Service Architecture(OGSA). Grid Services running on Clusters must have mechanism and policies for establishing and supporting QoS. A graph theory formal description is introduced into the S...
 
Availability Analysis of Web-Server Clusters with QoS-Aware Load Balancing
Found in: Computational Intelligence and Design, International Symposium on
By Jianxiang Li, Chuang Lin, Fenglin Shi
Issue Date:October 2010
pp. 156-159
Based on the stochastic high level Petri net, this paper put forward a new availability model of Web-server Clusters. This model facilitates availability analysis of per service type and whole services. Through the Numerical analysis, we find that differen...
 
Formal Proof of the IDOP_SP Protocol Based on the Petri Net
Found in: Networking, Architecture, and Storage, International Conference on
By Yingjiu Guo, Chuang Lin, Hao Yin
Issue Date:June 2008
pp. 161-162
IDOP_SP (IPTV DRM interactive Operating Platform Security Protocol) protocol is a applied complicated protocol which distributes digital media content in the Internet. The flow of the protocol is based on the behavior of web service composition and the dig...
 
A Fast Multi-pattern Matching Algorithm for Deep Packet Inspection on a Network Processor
Found in: Parallel Processing, International Conference on
By Jia Ni, Chuang Lin, Zhen Chen, Peter Ungsunan
Issue Date:September 2007
pp. 16
Deep Packet Inspection (DPI) is a critical function in network security applications such as Firewalls and Intrusion Detection Systems (IDS). Signature based scanners used in DPI apply multi-pattern matching algorithms to check whether the packet payload o...
 
AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN
Found in: Local Computer Networks, Annual IEEE Conference on
By Zhen Chen, Chuang Lin, Jia Ni, Dong-Hua Ruan, Bo Zheng, Yi-Xin Jiang
Issue Date:November 2005
pp. 748-755
<p>TCP/IP protocol suite carries most application data in Internet. TCP flow retrieval has more security meanings than the IP packet payload. Hence, monitoring the TCP flow has more strength than only monitoring the IP packet payload in the AntiWorm ...
 
Hierarchical Focus+Context Heterogeneous Network Visualization
Found in: 2014 IEEE Pacific Visualization Symposium (PacificVis)
By Lei Shi, Qi Liao, Hanghang Tong, Yifan Hu, Yue Zhao, Chuang Lin
Issue Date:March 2014
pp. 89-96
Aggregation is a scalable strategy for dealing with large network data. Existing network visualizations have allowed nodes to be aggregated based on node attributes or network topology, each of which has its own advantages. However, very few previous syste...
 
PipeFlow Engine: Pipeline Scheduling with Distributed Workflow Made Simple
Found in: 2013 International Conference on Parallel and Distributed Systems (ICPADS)
By Yin Li,Chuang Lin
Issue Date:December 2013
pp. 142-149
Distributed computing system is considered as a fundamental architecture to extend resources such as computation speed, storage capacity, and network bandwidth, which are limited for a single processor. Emerging big data processing techniques like Hadoop t...
 
H-PFSP: Efficient Hybrid Parallel PFSP Protected Scheduling for MapReduce System
Found in: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
By Yin Li, Chuang Lin, Fengyuan Ren, Yifeng Geng
Issue Date:July 2013
pp. 1099-1106
MapReduce provides a data-parallel computing framework, and has emerged as a popular processing model due to the simplicity of operations for big data application developers. Data processing applications from many different domains such as search and data ...
 
Ease the Queue Oscillation: Analysis and Enhancement of DCTCP
Found in: 2013 IEEE 33rd International Conference on Distributed Computing Systems (ICDCS)
By Wen Chen, Peng Cheng, Fengyuan Ren, Ran Shu, Chuang Lin
Issue Date:July 2013
pp. 450-459
Because of the terrible performance of TCP protocol in data center environment, DCTCP has been proposed as a TCP replacement, which uses a simple marking mechanism at switches and a few amendments at end hosts to adjust congestion window based on the exten...
 
Agent-Based Green Web Service Selection and Dynamic Speed Scaling
Found in: 2013 IEEE International Conference on Web Services (ICWS)
By Jiwei Huang,Chuang Lin
Issue Date:June 2013
pp. 91-98
With the increase of the energy consumption associated with IT systems and services, energy efficiency is becoming a critical concern in the design, development and management of web service systems. In this paper, both the web service selection and server...
 
Reliability-Aware Energy Efficiency in Web Service Provision and Placement
Found in: 2013 IEEE International Conference on Web Services (ICWS)
By Ying Chen,Peng Zhang,Xiangzhen Kong,Chuang Lin
Issue Date:June 2013
pp. 411-418
Reliability is a critical concern in the provision and placement of web services. A breakdown of service would seriously reduce customers' satisfaction, and thus harm the revenue of service providers. To maintain a high reliability, the common approach is ...
 
Modeling, Analysis and Optimization of Dependability-Aware Energy Efficiency in Services Computing Systems
Found in: 2013 IEEE International Conference on Services Computing (SCC)
By Jiwei Huang,Chuang Lin,Jianxiong Wan
Issue Date:June 2013
pp. 683-690
Besides performance, dependability and energy efficiency are two critical concerns during the design, development and management of large-scale services computing systems. In this paper, we jointly consider the performance, dependability and energy efficie...
 
Attribute-Aware Data Aggregation Using Potential-Based Dynamic Routing in Wireless Sensor Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Fengyuan Ren,Jiao Zhang,Yongwei Wu,Tao He,Canfeng Chen,Chuang Lin
Issue Date:May 2013
pp. 881-892
The resources especially energy in wireless sensor networks (WSNs) are quite limited. Since sensor nodes are usually much dense, data sampled by sensor nodes have much redundancy, data aggregation becomes an effective method to eliminate redundancy, minimi...
 
Adaptive resource management for mobile multimedia communications in asymmetric wireless network
Found in: 2005 2nd International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks
By Chuang Lin, Yaya Wei, Zhiguang Shan
Issue Date:May 2013
pp. 6 pp.
In the multi-service wireless networks, the bandwidth asymmetry is the distinctive characteristic. To avoid wasting uplink and downlink bandwidth in asymmetric network, admissible region for the nonreal-time (NRT) calls has been proposed. But in that schem...
 
Prototype implementation and performance evaluation of a QoS-based Web server
Found in: IEEE International Workshop on Service-Oriented System Engineering
By Zhiguang Shan, Chuang Lin, Yaya Wei
Issue Date:May 2013
pp. 191,192,193,194,195,196
With the evolvement of the e-commerce, the Internet is undergoing substantial changes from a communication and browsing infrastructure to a medium for conducting business and selling services. These changes place the Web server at the center of the e-comme...
 
Reliability-Aware Speed Control Policy for Energy Reduction in Server Farms
Found in: 2012 IEEE International Conference on Green Computing and Communications (GreenCom)
By Yuan Tian,Chuang Lin,Jiwei Huang,Min Yao
Issue Date:November 2012
pp. 508-514
Server farms are playing an important role in large-scale computing infrastructure today. However, the increasing energy consumption of server farms makes them expensive to operate. There are many technologies aiming at reducing the power consumption of se...
 
Energy and Delay Minimization in Cluster-Based Wireless Sensor Networks
Found in: 2012 IEEE International Conference on Green Computing and Communications (GreenCom)
By Min Yao,Chuang Lin,Yuan Tian,Longfei Wu,Yarui Chen
Issue Date:November 2012
pp. 588-594
Wireless sensor networks (WSNs) usually consist of a large number of power-constrained sensors deployed to collect information in a specific sensed field. How to gather data in an energy-efficient manner is always a very important issue in WSNs. Recently, ...
 
A Distributed Fault/Intrusion-Tolerant Sensor Data Storage Scheme Based on Network Coding and Homomorphic Fingerprinting
Found in: IEEE Transactions on Parallel and Distributed Systems
By Rongfei Zeng,Yixin Jiang,Chuang Lin,Yanfei Fan,Xuemin Shen
Issue Date:October 2012
pp. 1819-1830
Recently, distributed data storage has gained increasing popularity for reliable access to data through redundancy spread over unreliable nodes in wireless sensor networks (WSNs). However, without any protection to guarantee the data integrity and availabi...
 
Dependability Analysis of Control Center Networks in Smart Grid Using Stochastic Petri Nets
Found in: IEEE Transactions on Parallel and Distributed Systems
By Rongfei Zeng,Yixin Jiang,Chuang Lin,Xuemin (Sherman) Shen
Issue Date:September 2012
pp. 1721-1730
As an indispensable infrastructure for the future life, smart grid is being implemented to save energy, reduce costs, and increase reliability. In smart grid, control center networks have attracted a great deal of attention, because their security and depe...
 
Supervised Gabor-Based Kernel Locality Preserving Projections for Face Recognition
Found in: International Conference on Internet of Things and International Conference on Cyber, Physical and Social Computing
By Chuang Lin,Xirui Sun,Kuanjiu Zhou,Feng Xia
Issue Date:October 2011
pp. 252-257
Locality Preserving Projections (LPP) is an unsupervised method which seeks to optimally preserve the neighborhood structure of the dataset. LPP has been used wildly, but it has limits to solve the classification problem, such as the ignorance of the label...
 
QoS-Aware Service Composition for Work?ow-Based Data-Intensive Applications
Found in: Web Services, IEEE International Conference on
By Yin Li,Chuang Lin
Issue Date:July 2011
pp. 452-459
Web service composition can make use of distributed services with various functions to accomplish a specific task. Service binding and composition become keywords to service computing. In the context of workflow management, service binding plays an importa...
 
Modeling and Analysis of Dependability Attributes of Service Computing Systems
Found in: Services Computing, IEEE International Conference on
By Jiwei Huang,Chuang Lin,Xiangzhen Kong,Yemei Zhu
Issue Date:July 2011
pp. 184-191
Dependability is an important consideration during the design and development of IT systems and services. But in service computing systems, the traditional definition and evaluation methods from the systems' and components' point of view meet challenges. I...
 
VM Co-scheduling: Approximation of Optimal Co-scheduling in Data Center
Found in: Advanced Information Networking and Applications, International Conference on
By Wei Yan, Li Zhou, Chuang Lin
Issue Date:March 2011
pp. 340-347
Multi-resource sharings among virtual machines (VM)are very important in data center, but also bring contentions for cache, disk and network in host server. Recent studies focus primarily on locally optimizing resource sharings in a single server, or globa...
 
EBRP: Energy-Balanced Routing Protocol for Data Gathering in Wireless Sensor Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Fengyuan Ren,Jiao Zhang,Tao He,Chuang Lin,Sajal K. Das
Issue Date:December 2011
pp. 2108-2125
Energy is an extremely critical resource for battery-powered wireless sensor networks (WSN), thus making energy-efficient protocol design a key challenging problem. Most of the existing energy-efficient routing protocols always forward packets along the mi...
 
Traffic-Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Fengyuan Ren, Tao He, Sajal K. Das, Chuang Lin
Issue Date:September 2011
pp. 1585-1599
The congestion problem in Wireless Sensor Networks (WSNs) is quite different from that in traditional networks. Most current congestion control algorithms try to alleviate the congestion by reducing the rate at which the source nodes inject packets into th...
 
Modeling and Improving TCP Performance over Cellular Link with Variable Bandwidth
Found in: IEEE Transactions on Mobile Computing
By Fengyuan Ren, Chuang Lin
Issue Date:August 2011
pp. 1057-1070
To facilitate a viable evolution of cellular networks toward extensive packet data traffic, the High Speed Downlink Packet Access (HSDPA) technology is introduced. The various link adaptation techniques employed by HSDPA augment the bandwidth variation, wh...
 
A Hybrid Modeling Approach to Microarchitecture Design Space Exploring
Found in: Grid and Cloud Computing, International Conference on
By Wei Yan, Jia Liu, Chuang Lin
Issue Date:November 2010
pp. 110-117
The micro architectural design space of a new processor is too huge for architects to handle with cycle-accurate simulators. Previous researches attack this problem by statistical learning methods such as Artificial Neural Networks (ANN) and statistical sa...
 
The Optimized Reinforcement Learning Approach to Run-Time Scheduling in Data Center
Found in: Grid and Cloud Computing, International Conference on
By Wei Yan, Chuang Lin, Shanchen Pang
Issue Date:November 2010
pp. 46-51
Warehouse data center is very large scale and complex, which constains tens of thousands servers and accomodates various applications. What’s more important, energy consumption has risen to a critical point. Scheduling needs to maintain performance and red...
 
Gabor-Based Kernel Independent Component Analysis for Face Recognition
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Yanchuan Huang, Mingchu Li, Chuang Lin, Linlin Tian
Issue Date:October 2010
pp. 376-379
In this paper, a new Gabor-based Kernel Independent Component Analysis (GKICA) method for face recognition is presented. This method first derives a Gabor feature vector from a set of down-sampled Gabor wavelet representations of face images, then reduces ...
 
A Dual-Threshold Power Saving Mechanism in WiMAX
Found in: Computer and Information Science, ACIS International Conference on
By Jia Liu, Fengyuan Ren, Chuang Lin
Issue Date:August 2010
pp. 465-470
This paper considers making balance on the tradeoff between power consumption and extra delay in WiMAX Power Saving. Though it seems quite well understood in case of Poisson traffic, the tradeoff between energy and delay has not been adequately studied in ...
 
HMM-Based Predictive Power Saving Mechanism in WiMAX
Found in: Computer and Information Science, ACIS International Conference on
By Jia Liu, Chuang Lin, Fengyuan Ren
Issue Date:August 2010
pp. 459-464
Several studies have showed that network features (e.g., packet interval and packet size) may be well modeled by a hidden Markov model (HMM) with appropriate hidden variables that capture the current state of the network. In this paper, we propose a predic...
 
Attribute-aware data aggregation using dynamic routing in wireless sensor networks
Found in: A World of Wireless, Mobile and Multimedia Networks, International Symposium on
By Jiao Zhang, Fengyuan Ren, Tao He, Chuang Lin
Issue Date:June 2010
pp. 1-9
Data aggregation has been widely recognized as an efficient method to reduce energy consumption in wireless sensor networks, which can support a wide range of applications such as monitoring temperature, humidity, level, speed etc. The data sampled by the ...
 
Modeling and Analyzing Gap-Utilized Handover in Wireless Networks
Found in: Communications and Mobile Computing, International Conference on
By Jia Liu, Chuang Lin, Fengyuan Ren
Issue Date:April 2010
pp. 503-507
Handover interruption as a critical issue has long been studied in wireless networks towards a seamless and lossless target. This paper proposes a model for gap-utilized handover, using traffic-pattern learning based on HMM, and presents the analytic detai...
 
UTM-CM: A Practical Control Mechanism Solution for UTM System
Found in: Communications and Mobile Computing, International Conference on
By Ying Zhang, Fachao Deng, Zhen Chen, Yibo Xue, Chuang Lin
Issue Date:April 2010
pp. 86-90
Since emerged in 2004, Unified Threat Management (UTM) has been used widely to enhance network security protection. Typical UTM device integrates multiple security technologies, therefore its control and management involves various interfaces, message form...
 
An Extended Stochastic Loss Bound with Moment Generating Function
Found in: Communications and Mobile Computing, International Conference on
By Yiping Deng, Chuang Lin
Issue Date:April 2010
pp. 498-502
In packet based communication networks, loss bound is a significant parameter in Quality of Service(QoS) guarantees, especially in real-time distributed applications. Unfortunately, most approaches presenting loss problem are based on the approximates of t...
 
DPLWN: A Novel Model for Designing and Implementing Dynamic Business Processes and Process Changes
Found in: Computational Science and its Applications, International Conference
By Yin Li, Chuang Lin, Shanchen Pang, Mengchu Zhou
Issue Date:March 2010
pp. 145-154
In order to adapt to the inconstancy of business environments and service requirements, a model of dynamic workflow is defined. It can be used to analyze and implement dynamic processes and process changes automatically. The dynamics of processes depends o...
 
A Scalable Per-flow Priority Scheduling Scheme for High-Speed Network
Found in: Communication Software and Networks, International Conference on
By Guodong Li, Zhen Chen, Anan Luo, Yibo Xue, Jun Li, Chuang Lin
Issue Date:February 2010
pp. 536-540
In order to provide the service differentiation for various network applications, and guarantee delay and bandwidth requirement, packet scheduling is considered as a hot research topic and a crucial module in network device. In high speed network, it is ha...
 
ELCP: An Effort-Based Least Cost Path Scheme for MANETs
Found in: Mobile Ad-hoc and Sensor Networks, International Conference on
By Xin Jiang, Chuang Lin, Yixin Jiang, Yuanzhuo Wang, Zhen Chen
Issue Date:December 2009
pp. 347-352
To weaken the selfish behavior of nodes in mobile ad hoc networks, many payment-based incentive schemes have been proposed recently, yet it is still far from achieving the expected efficiency to encourage node cooperation. In these schemes, source node sel...
 
Comprehensive Analysis of Performance, Fault-Tolerance and Scalability in Grid Resource Management System
Found in: Grid and Cloud Computing, International Conference on
By Xiangzhen Kong, Jiwei Huang, Chuang Lin
Issue Date:August 2009
pp. 83-90
The management of the large scale heterogeneous resources is a critical issue in Grid computing. The resource management system (RMS) is an essential component of Grids. To ensure the QoS of the upper layer service, it raises high requirement for the perfo...
 
Proxy-Based Security Audit System for Remote Desktop Access
Found in: Computer Communications and Networks, International Conference on
By Shi-hai Huang, Chuang Lin, An'an Luo, Zhen Chen, Xin Jiang, Kai Wang, Hui Zhang, Xue-hai Peng
Issue Date:August 2009
pp. 1-5
No summary available.
 
Insight into the P2P-VoD System: Performance Modeling and Analysis
Found in: Computer Communications and Networks, International Conference on
By Kai Wang, Chuang Lin
Issue Date:August 2009
pp. 1-6
No summary available.
 
Modeling the Effects of Variable Bandwidth on TCP Throughput
Found in: Computer Communications and Networks, International Conference on
By Jia Zhou, Fengyuan Ren, Chuang Lin
Issue Date:August 2009
pp. 1-7
No summary available.
 
Performance, Fault-Tolerance and Scalability Analysis of Virtual Infrastructure Management System
Found in: Parallel and Distributed Processing with Applications, International Symposium on
By Xiangzhen Kong, Jiwei Huang, Chuang Lin, Peter D. Ungsunan
Issue Date:August 2009
pp. 282-289
The virtual infrastructure has become more and more popular in the Grid and Cloud computing. With the aggrandizement scale, the management of the resources in virtual infrastructure faces a great technical challenge. To support the upper services effective...
 
Quality of Protection with Performance Analysis in IP Multimedia Subsystem
Found in: Computer and Information Science, ACIS International Conference on
By Kai Wang, Chuang Lin, Fangqin Liu
Issue Date:June 2009
pp. 234-239
IP Multimedia Subsystem (IMS) is considered as the main solution to the next generation multimedia communication.By examining potential security threats to IMS, we initiate a set of security policies for choice and consider their Quality of Protection (QoP...
 
Throughput Analysis of Wireless Multi-hop Chain Networks
Found in: Computer and Information Science, ACIS International Conference on
By Fangqin Liu, Chuang Lin, Hao Wen, Peter Ungsunan
Issue Date:June 2009
pp. 834-839
It is important but challenging to understand the throughput performance in wireless multi-hop networks. Most previous works show that the M/M/1 model is accurate enough for throughput analysis most of the time. However, we notice that without considering ...
 
Model-Driven Dependability Analysis of Virtualization Systems
Found in: Computer and Information Science, ACIS International Conference on
By Xu Zhang, Chuang Lin, Xiangzhen Kong
Issue Date:June 2009
pp. 199-204
After many years of silence, virtualization recently became a hot topic once again, especially in the field of system dependability. Current researches mostly focus on more technical methods without taking into account the problem of how to verify the depe...
 
P2P Accelerated Mass Data Distribution over Booming Internet: Effectiveness and Bottlenecks
Found in: Distributed Computing Systems Workshops, International Conference on
By Zhijia Chen, Yang Zhao, Chuang Lin, Xin Miao, Qingbo Wang
Issue Date:June 2009
pp. 239-244
With the explosive growth of data-concentrated applications over Internet, the distribution of huge data in large scales with guarantee of Quality of Service (QoS), remains an elusive goal in both current and future Internet. The potential integration of P...
 
A Novel Cookie-Based DDoS Protection Scheme and its Performance Analysis
Found in: Advanced Information Networking and Applications, International Conference on
By Rongfei Zeng, Chuang Lin, Hongkun Yang, Yuanzhuo Wang, Yang Wang, Peter Ungsunan
Issue Date:May 2009
pp. 861-867
Seamless handover is one of the most attractive research fields in B3G systems. Many mechanisms are proposed to provide certain QoS guarantees in handovers of mobile systems, which would also introduce new threats, such as DoS and DDOS attacks. In this pap...
 
Network processing performability evaluation on heterogeneous reliability multicore processors using SRN model
Found in: Parallel and Distributed Processing Symposium, International
By Peter D. Ungsunan,Chuang Lin,Yang Wang,Yi Gai
Issue Date:May 2009
pp. 1-6
Future network systems and embedded infrastructure devices in ubiquitous environments will need to consume low power and process large amounts of network packet traffic. In order to meet necessary high processing efficiency requirements, future processors ...
 
 1  2 Next >>