Search For:

Displaying 1-50 out of 92 total
Data Consistency for Cooperative Caching in Mobile Environments
Found in: Computer
By Jiannong Cao, Yang Zhang, Guohong Cao, Li Xie
Issue Date:April 2007
pp. 60-66
A 3D framework provides a basis for designing, analyzing, and evaluating strategies to address data consistency issues in mobile wireless environments. A proposed relay-peer-based cache consistency protocol offers a generic and flexible method for carrying...
 
Consistency of Cooperative Caching in Mobile Peer-to-Peer Systems over MANET
Found in: Distributed Computing Systems Workshops, International Conference on
By Jiannong Cao, Yang Zhang, Li Xie, Guohong Cao
Issue Date:June 2005
pp. 573-579
Caching consistency is an important issue for cooperative caching in mobile environments but has not been adequately addressed for mobile ad hoc networks (MANETs). In this paper, we proposed a novel approach, called RPCC (Relay Peer-based Caching Consisten...
 
Robust Topology Control in Multi-Hop Cognitive Radio Networks
Found in: IEEE Transactions on Mobile Computing
By Jing Zhao,Guohong Cao
Issue Date:November 2014
pp. 2634-2647
The opening of under-utilized spectrum creates the opportunity of substantial performance improvement through cognitive radio techniques. However, the real network performance may be limited since unlicensed users must vacate and switch to other available ...
 
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing
Found in: IEEE Transactions on Dependable and Secure Computing
By Qinghua Li,Guohong Cao,Thomas F. La Porta
Issue Date:March 2014
pp. 115-129
The proliferation and ever-increasing capabilities of mobile devices such as smart phones give rise to a variety of mobile sensing applications. This paper studies how an untrusted aggregator in mobile sensing can periodically obtain desired statistics ove...
 
Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks
Found in: IEEE Transactions on Mobile Computing
By Wei Gao,Guohong Cao,Arun Iyengar,Mudhakar Srivatsa
Issue Date:March 2014
pp. 611-625
Disruption tolerant networks (DTNs) are characterized by low node density, unpredictable node mobility, and lack of global network information. Most of current research efforts in DTNs focus on data forwarding, but only limited work has been done on provid...
 
An Incentive Framework for Cellular Traffic Offloading
Found in: IEEE Transactions on Mobile Computing
By Xuejun Zhuo,Wei Gao,Guohong Cao,Sha Hua
Issue Date:March 2014
pp. 541-555
Cellular networks (e.g., 3G) are currently facing severe traffic overload problems caused by excessive traffic demands. Offloading part of the cellular traffic through other forms of networks, such as Delay Tolerant Networks (DTNs) and WiFi hotspots, is a ...
 
Energy-Aware Web Browsing in 3G Based Smartphones
Found in: 2013 IEEE 33rd International Conference on Distributed Computing Systems (ICDCS)
By Bo Zhao, Qiang Zheng, Guohong Cao,Sateesh Addepalli
Issue Date:July 2013
pp. 165-175
Smartphone based web browsing wastes a lot of power when downloading webpages due to the special characteristics of the 3G radio interface. In this paper, we identify these special characteristics, and address power consumption issues through two novel tec...
 
Mobility-Assisted Energy-Aware User Contact Detection in Mobile Social Networks
Found in: 2013 IEEE 33rd International Conference on Distributed Computing Systems (ICDCS)
By Wenjie Hu, Guohong Cao,Srikanth V. Krishanamurthy,Prasant Mohapatra
Issue Date:July 2013
pp. 155-164
Many practical problems in mobile social networks such as routing, community detection, and social behavior analysis, rely on accurate user contact detection. The frequently used method for detecting user contact is through Bluetooth on smartphones. Howeve...
 
To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks
Found in: IEEE Transactions on Dependable and Secure Computing
By Qinghua Li,Wei Gao,Sencun Zhu,Guohong Cao
Issue Date:May 2013
pp. 168-182
Disruption Tolerant Networks (DTNs) utilize the mobility of nodes and the opportunistic contacts among nodes for data communications. Due to the limitation in network resources such as contact opportunity and buffer space, DTNs are vulnerable to flood atta...
 
Minimizing Probing Cost and Achieving Identifiability in Probe-Based Network Link Monitoring
Found in: IEEE Transactions on Computers
By Qiang Zheng,Guohong Cao
Issue Date:March 2013
pp. 510-523
Continuously monitoring link performance is important to network diagnosis. In this paper, we address the problem of minimizing the probing cost and achieving identifiability in probe-based network link monitoring. Given a set of links to monitor, our obje...
 
Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System
Found in: IEEE Transactions on Mobile Computing
By Zhichao Zhu,Guohong Cao
Issue Date:January 2013
pp. 51-64
Today's location-sensitive service relies on user's mobile device to determine the current location. This allows malicious users to access a restricted resource or provide bogus alibis by cheating on their locations. To address this issue, we propose A Pri...
 
On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks
Found in: IEEE Transactions on Mobile Computing
By Wei Gao,Guohong Cao,Tom La Porta,Jiawei Han
Issue Date:January 2013
pp. 151-165
Unpredictable node mobility, low node density, and lack of global information make it challenging to achieve effective data forwarding in Delay-Tolerant Networks (DTNs). Most of the current data forwarding schemes choose the nodes with the best cumulative ...
 
Efficient and privacy-preserving data aggregation in mobile sensing
Found in: 2012 20th IEEE International Conference on Network Protocols (ICNP)
By Qinghua Li,Guohong Cao
Issue Date:October 2012
pp. 1-10
The proliferation and ever-increasing capabilities of mobile devices such as smart phones give rise to a variety of mobile sensing applications. This paper studies how an untrusted aggregator in mobile sensing can periodically obtain desired statistics ove...
 
Adaptive algorithms for diagnosing large-scale failures in computer networks
Found in: 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Srikar Tati,Bong Jun Ko,Guohong Cao,Ananthram Swami,Thomas La Porta
Issue Date:June 2012
pp. 1-12
In this paper, we propose an algorithm to efficiently diagnose large-scale clustered failures. The algorithm, Cluster-MAX-COVERAGE (CMC), is based on greedy approach. We address the challenge of determining faults with incomplete symptoms. CMC makes novel ...
   
A cross-layer approach for IP network protection
Found in: 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Qiang Zheng, Jing Zhao,Guohong Cao
Issue Date:June 2012
pp. 1-12
Backup paths are widely used to protect IP links from failures. Existing solutions such as the commonly used independent and Shared Risk Link Group models do not accurately reflect the correlation between IP link failures, and thus may not choose reliable ...
   
Optimal Recovery from Large-Scale Failures in IP Networks
Found in: 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS)
By Qiang Zheng,Guohong Cao,Tom La Porta,Ananthram Swami
Issue Date:June 2012
pp. 295-304
Quickly recovering IP networks from failures is critical to enhancing Internet robustness and availability. Due to their serious impact on network routing, large-scale failures have received increasing attention in recent years. We propose an approach call...
 
Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks
Found in: 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS)
By Wei Gao,Guohong Cao,Mudhakar Srivatsa,Arun Iyengar
Issue Date:June 2012
pp. 132-141
Opportunistic mobile networks consist of personal mobile devices which are intermittently connected with each other. Data access can be provided to these devices via cooperative caching without support from the cellular network infrastructure, but only lim...
 
Social-Based Cooperative Caching in DTNs: A Contact Duration Aware Approach
Found in: Mobile Ad-Hoc and Sensor Systems, IEEE International Conference on
By Xuejun Zhuo,Qinghua Li,Guohong Cao,Yiqi Dai,Boleslaw Szymanski,Tom La Porta
Issue Date:October 2011
pp. 92-101
Data access is an important issue in Delay Tolerant Networks (DTNs), and a common technique to improve the performance of data access is cooperative caching. However, due to the unpredictable node mobility in DTNs, traditional caching schemes cannot be dir...
 
netCSI: A Generic Fault Diagnosis Algorithm for Large-Scale Failures in Computer Networks
Found in: Reliable Distributed Systems, IEEE Symposium on
By Srikar Tati,Scott Rager,Bong Jun Ko,Guohong Cao,Ananthram Swami,Thomas La Porta
Issue Date:October 2011
pp. 167-176
In this paper we present a framework and a set of algorithms for determining faults in networks when large scale outages occur. The design principles of our algorithm, netCSI, are motivated by the fact that failures are geographically clustered in such cas...
 
Win-Coupon: An incentive framework for 3G traffic offloading
Found in: Network Protocols, IEEE International Conference on
By Xuejun Zhuo,Wei Gao,Guohong Cao,Yiqi Dai
Issue Date:October 2011
pp. 206-215
3G networks are currently facing severe traffic overload problems caused by excessive demands of mobile users. Offloading part of the 3G traffic through other forms of networks, such as Delay Tolerant Networks (DTNs), WiFi hotspots, and Femtocells, is a pr...
 
Contact duration aware data replication in Delay Tolerant Networks
Found in: Network Protocols, IEEE International Conference on
By Xuejun Zhuo,Qinghua Li,Wei Gao,Guohong Cao,Yiqi Dai
Issue Date:October 2011
pp. 236-245
The recent popularization of hand-held mobile devices, such as smartphones, enables the inter-connectivity among mobile users without the support of Internet infrastructure. When mobile users move and contact each other opportunistically, they form a Delay...
 
Balancing the Trade-Offs between Query Delay and Data Availability in MANETs
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yang Zhang,Liangzhong Yin,Jing Zhao,Guohong Cao
Issue Date:April 2012
pp. 643-650
In mobile ad hoc networks (MANETs), nodes move freely and link/node failures are common, which leads to frequent network partitions. When a network partition occurs, mobile nodes in one partition are not able to access data hosted by nodes in other partiti...
 
Reducing the Delay and Power Consumption of Web Browsing on Smartphones in 3G Networks
Found in: Distributed Computing Systems, International Conference on
By Bo Zhao, Byung Chul Tak, Guohong Cao
Issue Date:June 2011
pp. 413-422
Smart phone is becoming a key element in providing greater user access to the mobile Internet. Many complex applications, which are used to be only on PCs, have been developed and run on smart phones. These applications extend the functionalities of smart ...
 
Supporting Cooperative Caching in Disruption Tolerant Networks
Found in: Distributed Computing Systems, International Conference on
By Wei Gao, Guohong Cao, Arun Iyengar, Mudhakar Srivatsa
Issue Date:June 2011
pp. 151-161
Disruption Tolerant Networks (DTNs) are characterized by the low node density, unpredictable node mobility and lack of global network information. Most of current research efforts in DTNs focus on data forwarding, but only limited work has been done on pro...
 
On exploiting transient contact patterns for data forwarding in Delay Tolerant Networks
Found in: Network Protocols, IEEE International Conference on
By Wei Gao, Guohong Cao
Issue Date:October 2010
pp. 193-202
Effective data forwarding in Delay Tolerant Networks (DTNs) is challenging, due to the low node density, unpredictable node mobility and lack of global information in such networks. Most of the current data forwarding schemes choose the nodes with the best...
 
Spatial-Temporal Coverage Optimization in Wireless Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Changlei Liu, Guohong Cao
Issue Date:April 2011
pp. 465-478
Mission-driven sensor networks usually have special lifetime requirements. However, the density of the sensors may not be large enough to satisfy the coverage requirement while meeting the lifetime constraint at the same time. Sometimes, coverage has to be...
 
Minimizing Probing Cost and Achieving Identifiability in Network Link Monitoring
Found in: Distributed Computing Systems, International Conference on
By Qiang Zheng, Guohong Cao
Issue Date:June 2010
pp. 675-684
Continuously monitoring the link performance is important to network diagnosis. Recently, active probes sent between end systems are widely used to monitor the link performance. In this paper, we address the problem of minimizing the probing cost and achie...
 
oCast: Optimal multicast routing protocol for wireless sensor networks
Found in: 2009 17th IEEE International Conference on Network Protocols. ICNP 2009
By Lu Su, Bolin Ding, Yong Yang,T.F. Abdelzaher, Guohong Cao,J.C. Hou
Issue Date:October 2009
pp. 151-160
In this paper, we describe oCast, an energy-optimal multicast routing protocol for wireless sensor networks. The general minimum-energy multicast problem is NP-hard. Intermittent connectivity that results from duty-cycling further complicates the problem. ...
 
Path-Centric On-Demand Rate Adaptation for Mobile Ad Hoc Networks
Found in: Computer Communications and Networks, International Conference on
By Saehoon Kang, Chansu Yu, Chita R. Das, Guohong Cao
Issue Date:August 2009
pp. 1-6
No summary available.
 
Roadcast: A Popularity Aware Content Sharing Scheme in VANETs
Found in: Distributed Computing Systems, International Conference on
By Yang Zhang, Jing Zhao, Guohong Cao
Issue Date:June 2009
pp. 223-230
Content sharing through vehicle-to-vehicle communication can help people find their interested content on the road. In VANETs, due to limited contact duration and unreliable wireless connection, a vehicle can get the useful data only when it meets another ...
 
Cooperative Caching in Wireless P2P Networks: Design, Implementation, and Evaluation
Found in: IEEE Transactions on Parallel and Distributed Systems
By Jing Zhao, Ping Zhang, Guohong Cao, Chita R. Das
Issue Date:February 2010
pp. 229-241
Some recent studies have shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. However, all these studies are at a very high level, leaving many design and implementation issues ...
 
pDCS: Security and Privacy Support for Data-Centric Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Min Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao, Yi Yang
Issue Date:August 2009
pp. 1023-1038
The demand for efficient data dissemination/access techniques to find relevant data from within a sensor network has led to the development of Data-Centric Sensor (DCS) networks, where the sensor data instead of sensor nodes are named based on attributes s...
 
Routing in intermittently connected sensor networks
Found in: 2008 IEEE International Conference on Network Protocols
By Lu Su, Changlei Liu, Hui Song, Guohong Cao
Issue Date:October 2008
pp. 278-287
To prolong the lifetime of sensor networks, various scheduling schemes have been designed to reduce the number of active sensors. However, some scheduling strategies, such as partial coverage scheduling and target coverage scheduling, may result in disconn...
 
On Cooperative Caching in Wireless P2P Networks
Found in: Distributed Computing Systems, International Conference on
By Jing Zhao, Ping Zhang, Guohong Cao
Issue Date:June 2008
pp. 731-739
Some recent studies have shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. However, all these studies are at a very high level, leaving many design and implementation issues ...
 
IP Address Passing for VANETs
Found in: Pervasive Computing and Communications, IEEE International Conference on
By Todd Arnold, Wyatt Lloyd, Jing Zhao, Guohong Cao
Issue Date:March 2008
pp. 70-79
In Vehicular Ad-hoc Networks (VANETs), vehicles cangain short connections to the Internet by using wireless accesspoints (AP). A significant part of the connection time isthe time required for acquiring an IP address via DynamicHost Configuration Protocol ...
 
Mitigating Performance Degradation in Congested Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Raju Kumar, Riccardo Crepaldi, Hosam Rowaihy, Albert F. Harris III, Guohong Cao, Michele Zorzi, Thomas F. La Porta
Issue Date:June 2008
pp. 682-697
Data generated in wireless sensor networks may not all be alike; some data may be more important than others and hence may have different delivery requirements. In this paper we address differentiated data delivery in the presence of congestion in wireless...
 
Sensor Relocation with Mobile Sensors: Design, Implementation, and Evaluation
Found in: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference
By Jie Teng, Tim Bolbrock, Guohong Cao, Tom la Porta
Issue Date:October 2007
pp. 1-9
Mobile sensors are useful in many environments because they can move to increase the sensing coverage. In this paper, we present a mobile sensor prototype in which the Mica2 sensor node is used to control the movement of the robot built with commercial off...
 
Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks
Found in: Reliable Distributed Systems, IEEE Symposium on
By Yi Yang, Xinran Wang, Sencun Zhu, Guohong Cao
Issue Date:October 2007
pp. 219-230
<p>Sensors that operate in an unattended, harsh or hostile environment are vulnerable to compromises because their low costs preclude the use of expensive tamper-resistant hardware. Thus, an adversary may reprogram them with malicious code to launch ...
 
Demo: Sensor Relocation with Mobile Sensors
Found in: Mobile and Ubiquitous Systems, Annual International Conference on
By Jie Teng, Guohong Cao, Tom La Porta
Issue Date:August 2007
pp. 1-3
Mobile sensors are useful in many environments because they can move to increase the sensing coverage. In this paper, we present a mobile sensor prototype in which the Mica2 sensor node is used to control the movement of the robot built with commercial off...
 
MobiQuitous 2007 Messages from the General Chair
Found in: 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MOBIQUITOUS 2007)
By Guohong Cao
Issue Date:August 2007
pp. nil3
No summary available.
   
Data Dissemination with Ring-Based Index for Wireless Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Wensheng Zhang, Guohong Cao, Tom La Porta
Issue Date:July 2007
pp. 832-847
In wireless sensor networks, sensor nodes are capable of not only measuring real world phenomena, but also storing, processing, and transferring these measurements. Many techniques have been proposed for disseminating sensing data. However, most of them ar...
 
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
Found in: IEEE Transactions on Mobile Computing
By Patrick Traynor, Raju Kumar, Heesook Choi, Guohong Cao, Sencun Zhu, Thomas La Porta
Issue Date:June 2007
pp. 663-677
Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained environment, symmetric-key methods coupled with a priori key distribution schemes ha...
 
Bidding Protocols for Deploying Mobile Sensors
Found in: IEEE Transactions on Mobile Computing
By Guiling (Grace) Wang, Guohong Cao, Piotr Berman, Thomas F. La Porta
Issue Date:May 2007
pp. 563-576
Constructing a sensor network with a mix of mobile and static sensors can achieve a balance between sensor coverage and sensor cost. In this paper, we design two bidding protocols to guide the movement of mobile sensors in such sensor networks to increase ...
 
rDCF: A Relay-Enabled Medium Access Control Protocol for Wireless Ad Hoc Networks
Found in: IEEE Transactions on Mobile Computing
By Hao Zhu, Guohong Cao
Issue Date:September 2006
pp. 1201-1214
It is well known that IEEE 802.11 provides a physical layer multirate capability and, hence, MAC layer mechanisms are needed to exploit this capability. Several solutions have been proposed to achieve this goal. However, these solutions only consider how t...
 
Real-Time Processing of Range-Monitoring Queries in Heterogeneous Mobile Databases
Found in: IEEE Transactions on Mobile Computing
By Ying Cai, Kien A. Hua, Guohong Cao, Toby Xu
Issue Date:July 2006
pp. 931-942
Unlike conventional range queries, a range-monitoring query is a continuous query. It requires retrieving mobile objects inside a user-defined region and providing continuous updates as the objects move into and out of the region. In this paper, we present...
 
Movement-Assisted Sensor Deployment
Found in: IEEE Transactions on Mobile Computing
By Guiling Wang, Guohong Cao, Thomas F. La Porta
Issue Date:June 2006
pp. 640-652
Adequate coverage is very important for sensor networks to fulfill the issued sensing tasks. In many working environments, it is necessary to make use of mobile sensors, which can move to the correct places to provide the required coverage. In this paper, ...
 
Supporting Cooperative Caching in Ad Hoc Networks
Found in: IEEE Transactions on Mobile Computing
By Liangzhong Yin, Guohong Cao
Issue Date:January 2006
pp. 77-89
Most researches in ad hoc networks focus on routing and not much work has been done on data access. A common technique used to improve the performance of data access is caching. Cooperative caching, which allows the sharing and coordination of cached data ...
 
On Supporting Power-Efficient Streaming Applications in Wireless Environments
Found in: IEEE Transactions on Mobile Computing
By Hao Zhu, Guohong Cao
Issue Date:July 2005
pp. 391-403
Reducing the power consumption of the wireless network interface (WNI) is an effective way to prolong the battery lifetime of the mobile terminal. It takes some time for the WNI to transit from the power-saving mode to the active mode. This transition dela...
 
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Found in: Mobile and Ubiquitous Systems, Annual International Conference on
By Wensheng Zhang, Guohong Cao
Issue Date:July 2005
pp. 22-32
<p>Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. To maintain strong cache consistency in some strategic scenarios (e.g...
 
DUP: Dynamic-Tree Based Update Propagation in Peer-to-Peer Networks
Found in: Data Engineering, International Conference on
By Liangzhong Yin, Guohong Cao
Issue Date:April 2005
pp. 258-259
In peer-to-peer networks, indices are used to map data id to nodes that host the data. The performance of data access can be improved by actively pushing indices to interested nodes. This paper proposes the Dynamic-tree based Update Propagation (DUP) schem...
   
 1  2 Next >>