Search For:

Displaying 1-50 out of 69 total
Dynamic adaptive redundancy for quality-of-service control in wireless sensor networks
Found in: Parallel and Distributed Processing Symposium, International
By Ing-Ray Chen,Anh Phan Speer,Mohamed Eltoweissy
Issue Date:May 2009
pp. 1-8
In this paper, we develop and evaluate a new concept of adaptive optimal redundancy to efficiently provide wireless sensor network (WSN) users with QoS-aware information services. Our approach to satisfying application QoS requirements while maximizing the...
 
On the Reliability of AI Planning Software in Real-Time Applications
Found in: IEEE Transactions on Knowledge and Data Engineering
By Ing-Ray Chen, Farokh B. Bastani, Ta-Wei Tsao
Issue Date:February 1995
pp. 4-13
<p><it>Abstract</it>—We define the reliability of a real-time system incorporating AI planning programs as the probability that, for each problem-solving request issued from the environment, the embedded system can successfully plan and e...
 
Performance analysis of distributed intrusion detection protocols for mobile group communication systems
Found in: Parallel and Distributed Processing Symposium, International
By Jin-Hee Cho,Ing-Ray Chen
Issue Date:May 2009
pp. 1-8
Under highly security vulnerable, resource restricted, and dynamically changing mobile ad hoc environments, it is critical to be able to maximize the system lifetime while bounding the communication response time for mission-oriented mobile groups. In this...
 
Modeling and Analysis of Concurrent Maintenance Policies for Data Structures Using Pointers
Found in: IEEE Transactions on Software Engineering
By Ing-Ray Chen, S.A. Banawan
Issue Date:September 1993
pp. 902-911
<p>We present a state reduction method that effectively reduces a two-dimensional Markov model to a one-dimensional Markov model for the performance analysis of a class of concurrent data structure maintenance policies. The reduced model allows the d...
 
Repairman Models for Replicated Data Management: A Case Study
Found in: Parallel and Distributed Information Systems, International Conference
By Ing-Ray Chen, Ding-Chau Wang
Issue Date:December 1996
pp. 0184
Abstract: Pessimistic control algorithms for replicated data permit only one partition to perform update operations at any time so as do ensure mutual exclusion of the replicated data object. Existing availability modeling and analyses of pessimistic contr...
 
Access Protocols in Data Partitioning Based Cloud Storage
Found in: 2013 IEEE 6th International Conference on Cloud Computing (CLOUD)
By Yunqi Ye, Liangliang Xiao, Yinzi Chen, I-Ling Yen,Farokh Bastani, Ing-Ray Chen
Issue Date:June 2013
pp. 398-405
Existing share access protocols require the client to retrieve all shares even for read accesses in order to achieve atomic semantics. In cloud storage with widely distributed servers, this implies significant communication latency (from client to the fart...
 
A study of self-adjusting quality of service control schemes
Found in: Winter Simulation Conference
By Sheng-Tzong Cheng, Chi-Ming Chen, Ing-Ray Chen
Issue Date:December 1998
pp. 1623-1628
We report simulation methods and results for analyzing a self-adjusting quality of service (QoS) control scheme for multimedia/telecommunication systems based on resource reservation. We study the case in which high priority clients' QoS requirement is not...
 
Performance characterization of forwarding strategies in personal communication networks
Found in: Computer Software and Applications Conference, Annual International
By Ing-Ray Chen, Tsong-Min Chen, Chiang Le
Issue Date:August 1997
pp. 137
The paper presents a framework for modeling and evaluating the performance of forwarding strategies in a personal communication services (PCS) mobile network. A forwarding strategy in the PCS network can be implemented by two mechanisms: a forwarding opera...
 
Trust Management for SOA-based IoT and Its Application to Service Composition
Found in: IEEE Transactions on Services Computing
By Ing-Ray Chen,Jia Guo,Fenye Bao
Issue Date:February 2015
pp. 1
A future Internet of Things (IoT) system will connect the physical world into cyberspace everywhere and everything via billions of smart objects. On the one hand, IoT devices are physically connected via communication networks. The service oriented archite...
 
Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing
Found in: IEEE Transactions on Parallel and Distributed Systems
By Ing-Ray Chen,Fenye Bao,MoonJeong Chang,Jin-Hee Cho
Issue Date:May 2014
pp. 1200-1210
Delay tolerant networks (DTNs) are characterized by high end-to-end latency, frequent disconnection, and opportunistic communication over unreliable wireless links. In this paper, we design and validate a dynamic trust management protocol for secure routin...
 
Trust-Based Multi-objective Optimization for Node-to-Task Assignment in Coalition Networks
Found in: 2013 International Conference on Parallel and Distributed Systems (ICPADS)
By Jin-Hee Cho,Ing-Ray Chen,Yating Wang,Kevin S. Chan
Issue Date:December 2013
pp. 372-379
A temporary coalition is often formed to pursue a common goal based on the collaboration of multiple partners who may have their own objectives. The coalition network must attain multiple objectives, under resource constraints and time deadlines. We propos...
 
Dual-Region Location Management for Mobile Ad Hoc Networks
Found in: 2013 International Conference on Parallel and Distributed Systems (ICPADS)
By Yinan Li,Ing-Ray Chen,Ding-Chau Wang
Issue Date:December 2013
pp. 388-395
We propose and analyze a novel location management scheme for mobile ad hoc networks (MANETs) called Dual-region Mobility Management (DrMoM). The basic design concept of DrMoM is to use local regions to complement existing location services in MANETs that ...
 
APPCCM: Adaptive per-user per-object cache consistency management for mobile client-server applications in wireless mesh networks
Found in: 2010 IEEE 35th Conference on Local Computer Networks (LCN 2010)
By Yinan Li, Ing-Ray Chen
Issue Date:October 2010
pp. 128-135
In this paper, we propose and analyze APPCCM: an adaptive per-user per-object cache consistency management scheme for mobile Internet client-server applications in wireless mesh networks (WMNs). The objective of the proposed scheme is two-fold: to speedup ...
 
Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks
Found in: IEEE Transactions on Mobile Computing
By Yinan Li, Ing-Ray Chen
Issue Date:March 2011
pp. 349-361
We propose efficient mobility management schemes based on pointer forwarding for wireless mesh networks (WMNs) with the objective to reduce the overall network traffic incurred by mobility management and packet delivery. The proposed schemes are per-user-b...
 
Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks
Found in: IEEE Transactions on Dependable and Secure Computing
By Ing-Ray Chen,Anh Phan Speer,Mohamed Eltoweissy
Issue Date:March 2011
pp. 161-176
Data sensing and retrieval in wireless sensor systems have a widespread application in areas such as security and surveillance monitoring, and command and control in battlefields. In query-based wireless sensor systems, a user would issue a query and expec...
 
On the Reliability of Wireless Sensors with Software-Based Attestation for Intrusion Detection
Found in: Parallel Architectures, Algorithms, and Networks, International Symposium on
By Ing-Ray Chen, Ding-Chau Wang
Issue Date:December 2009
pp. 184-189
Wireless sensor nodes are widely used in many areas, including military operation surveillance, natural phenomenon monitoring, and medical diagnosis data collection. These applications need to store and transmit sensitive or secret data, which requires int...
 
Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks
Found in: Computational Science and Engineering, IEEE International Conference on
By Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen
Issue Date:August 2009
pp. 641-650
We develop and analyze a trust management protocol for cognitive mission-driven group communication systems (GCSs) in mobile ad hoc networks (MANETs) using hierarchical modeling techniques based on stochastic Petri nets. The goal is to efficiently establis...
 
Comparative Performance Analysis of CAC Reward Optimization Algorithms in Wireless Networks
Found in: Advanced Information Networking and Applications, International Conference on
By Okan Yilmaz, Ing-Ray Chen
Issue Date:May 2009
pp. 463-470
In this paper, we perform a comparative analysis of a set of call admission control (CAC) algorithms designed for servicing multiple priority classes in wireless networks with quality of service (QoS) guarantees. We evaluate the performance of partitioning...
 
DMAP-FR: Integrated Mobility and Service Management with Failure Recovery Support for Mobile IPv6 Systems
Found in: Information Technology: New Generations, Third International Conference on
By Weiping He, Ing-Ray Chen
Issue Date:April 2009
pp. 1165-1170
In this paper, we propose and analyze DMAP-FR, a mobility and service management scheme with failure recovery control in Mobile IPv6 systems. The basic idea behind DMAP-FR is to leverage access routers (ARs) as regional mobility anchor points (MAPs) as in ...
 
Effect of Intrusion Detection on Failure Time of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Jin-Hee Cho, Ing-Ray Chen, Phu-Gui Feng
Issue Date:December 2008
pp. 289-296
In this paper, we analyze the effect of intrusion detection system (IDS) techniques on failure time of a mission-oriented group communication system consisting of mobile groups set out for mission execution in mobile ad hoc networks. Unlike the common beli...
 
Performance Analysis of Dynamic Group Communication Systems with Intrusion Detection Integrated with Batch Rekeying in Mobile Ad Hoc Networks
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Jin-Hee Cho, Ing-Ray Chen, Phu-Gui Feng
Issue Date:March 2008
pp. 644-649
We investigate performance characteristics of secure group communication systems (GCSs) in mobile ad hoc networks that employ intrusion detection techniques for dealing with insider attacks tightly coupled with rekeying techniques for dealing with outsider...
 
Spillover-Partitioning Call Admission Control for Revenue Optimization with QoS Guarantees for Multiple Service Classes in Mobile Wireless Networks
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Okan Yilmaz, Ing-Ray Chen, Gregory Kulczycki, William Frakes
Issue Date:March 2008
pp. 1299-1304
We propose and analyze spillover-partitioning call admission control (CAC) for servicing multiple service classes in mobile wireless networks for revenue optimization with quality of service (QoS) guarantees. We evaluate the performance of spillover-partit...
 
A Proxy-Based Integrated Cache Consistency and Mobility Management Scheme for Mobile IP Systems
Found in: Advanced Information Networking and Applications, International Conference on
By Weiping He, Ing-Ray Chen, Baoshan Gu
Issue Date:May 2007
pp. 354-361
In this paper, we investigate a proxy-based integrated cache consistency and mobility management scheme in Mobile IP systems. Our scheme is based on a stateful strategy by which cache invalidation messages are asynchronously sent by the server to a mobile ...
 
DMAP: A Scalable and Efficient Integrated Mobility and Service Management Scheme for Mobile IPv6 Systems
Found in: Local Computer Networks, Annual IEEE Conference on
By Ing-Ray Chen, Weiping He, Baoshan Gu
Issue Date:November 2006
pp. 753-760
We investigate an integrated mobility and service management scheme based on MIPv6 with the goal to minimize the overall network signaling cost in MIPv6 systems for serving mobility and service management related operations. Our design extends hierarchical...
 
On Optimal Path and Source Redundancy for Achieving QoS and Maximizing Lifetime of Query-Based Wireless Sensor Networks
Found in: Modeling, Analysis, and Simulation of Computer Systems, International Symposium on
By Anh Phan Speer, Ing-Ray Chen
Issue Date:September 2006
pp. 51-60
Data sensing and retrieval in wireless sensor systems have a widespread application in areas such as security and surveillance monitoring, as well as command and control in battlefield situations. In query-based sensor systems, a user would issue a query w...
   
Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks
Found in: Parallel and Distributed Systems, International Conference on
By Okan Yilmaz, Ing-Ray Chen
Issue Date:July 2006
pp. 605-612
We develop a hybrid partitioning-threshold call admission control algorithm to derive optimal pricing of multiple service classes in mobile wireless networks for revenue optimization with quality of service (QoS) guarantees. Unlike traditional admission co...
   
Performance Characteristics of Region-Based Group Key Management in Mobile Ad Hoc Networks
Found in: Sensor Networks, Ubiquitous, and Trustworthy Computing, International Conference on
By Ing-Ray Chen, Jin-Hee Cho, Ding-Chau Wang
Issue Date:June 2006
pp. 411-419
We propose and analyze a scalable and efficient region-based group key management protocol for secure group communications in mobile ad hoc networks. For scalability and dynamic reconfigurability, we take a region-based approach by which group members are ...
   
Effect of Redundancy on Mean Time to Failure of Wireless Sensor Networks
Found in: Advanced Information Networking and Applications, International Conference on
By Anh Phan Speer, Ing-Ray Chen
Issue Date:April 2006
pp. 373-382
In query-based wireless sensor networks (WSNs), the system must perform data sensing and retrieval and possibly aggregate data as a response at runtime. Since a WSN is often deployed unattended in areas where replacements of failed sensors are difficult, e...
   
On design tradeoffs between security and performance in wireless group communicating systems
Found in: IEEE Workshop on Secure Network Protocols
By Jin-Hee Cho, Ing-Ray Chen
Issue Date:November 2005
pp. 13-18
While security is of prime concern in secure group communicating systems in wireless networks, security mechanisms employed often have implication on the performance of the system. Recently model-based qualitative evaluation has been used for the evaluatio...
 
Admission Control Algorithms Integrated with Pricing for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks
Found in: Parallel and Distributed Systems, International Conference on
By Naresh Verma, Ing-Ray Chen
Issue Date:July 2004
pp. 495
We propose and analyze call admission control algorithms integrated with pricing for revenue optimization with QoS guarantee to serve multiple service classes in mobile wireless networks. Traditional admission control algorithms make acceptance decision fo...
   
Systematic Reliability Analysis of a Class of Application-Specific Embedded Software Frameworks
Found in: IEEE Transactions on Software Engineering
By Sung Kim, Farokh B. Bastani, I-Ling Yen, Ing-Ray Chen
Issue Date:April 2004
pp. 218-230
Dramatic advances in computer and communication technologies have made it economically feasible to extend the use of embedded computer systems to more and more critical applications. At the same time, these embedded computer systems are becoming more compl...
 
Survivable Systems Based on an Adaptive NMR Algorithm
Found in: Parallel and Distributed Processing Symposium, International
By Qing Kai Ma, Wei Li, I-Ling Yen, Farokh Bastani, Ing-Ray Chen
Issue Date:April 2004
pp. 68a
Due to the extensive use of computers and networks in critical systems, survivability is no longer a luxury but an essential requirement. We consider survivability assurance for critical applications where the system may incur accidental failures as well a...
   
A Hands-on Course on Wireless and Mobile Systems Design
Found in: Pervasive Computing and Communications Workshops, IEEE International Conference on
By Luiz A. DaSilva, Scott F. Midkiff, Ing-Ray Chen
Issue Date:March 2004
pp. 241
While we cannot make every student an expert on all topics from the wireless channel to mobile application design, we can provide students with a critical understanding of the context for their work in different aspects of wireless systems. This paper desc...
 
Simulation Study of a Class of Autonomous Host-Centric Mobility Prediction Algorithms for Wireless Cellular and Ad Hoc Networks
Found in: Simulation Symposium, Annual
By Ing-Ray Chen, Naresh Verma
Issue Date:April 2003
pp. 65
We propose and analyze a class of autonomous host-centric mobility prediction algorithms via simulation for predicting future movements of mobile hosts based on recent and past movement histories observed. These mobility prediction algorithms are
   
Quantitative Analysis of a Hybrid Replication with Forwarding Strategy for Efficient and Uniform Location Management in Mobile Wireless Networks
Found in: IEEE Transactions on Mobile Computing
By Ing-Ray Chen, Baoshan Gu
Issue Date:January 2003
pp. 3-15
<p><b>Abstract</b>—A location management scheme in wireless networks must effectively handle both user location update and search operations. Replication and forwarding are two well-known techniques to reduce user search and update costs,...
 
Algorithms for Supporting Disconnected Write Operations for Wireless Web Access in Mobile Client-Server Environments
Found in: IEEE Transactions on Mobile Computing
By Ing-Ray Chen, Ngoc Anh Phan, I-Ling Yen
Issue Date:January 2002
pp. 46-58
<p>In a wireless mobile client-server environment, a mobile user may voluntarily disconnect itself from the Web server to save its battery life and avoid high communication prices. To allow Web pages to be updated while the mobile user is disconnecte...
 
Performance and Stability Analysis of Multilevel Data Structures with Deferred Reorganization
Found in: IEEE Transactions on Software Engineering
By Ing-Ray Chen, Sayed A. Banawan
Issue Date:September 1999
pp. 690-700
<p><b>Abstract</b>—We develop a methodology for analyzing the performance and stability of a server that maintains a multilevel data structure to service a set of access operations for (key, value) records. A subset of the operations exec...
 
Analyzing dynamic voting using Petri nets
Found in: Reliable Distributed Systems, IEEE Symposium on
By Ing-Ray Chen, Ding-Chau Wang
Issue Date:October 1996
pp. 44
Dynamic voting is considered a promising technique for achieving high availability in distributed systems with data replication. To date, stochastic analysis of dynamic voting algorithms is restricted to either site or link Markov models, but not both, pos...
 
Warm Standby in Hierarchically Structured Process-Control Programs
Found in: IEEE Transactions on Software Engineering
By Ing-Ray Chen, F.B. Bastani
Issue Date:August 1994
pp. 658-663
<p>We classify standby redundancy design space in process-control programs into the following three categories: cold standby, warm standby, and hot standby. Design parameters of warm standby are identified and the reliability of a system using warm s...
 
A Cost-Based Admission Control Algorithm for Handling Mixed Workloads in Multimedia Server Systems
Found in: Parallel and Distributed Systems, International Conference on
By Ing-Ray Chen, Sheng-Tun Li
Issue Date:June 2001
pp. 0543
Abstract: We propose and analyze a cost-based, resource-reservation admission control algorithm for handling mixed workloads in modern multimedia systems such as a digital library multimedia system that must provide access services to heterogeneous objects...
   
User-Perceived Availability and Response-Time in Voting-Based Replicated Systems: A Case Study
Found in: Application-Specific Software Engineering and Technology, IEEE Workshop on
By Ing-Ray Chen, Ding-Chau Wang, Chih-Ping Chu
Issue Date:March 1999
pp. 103
In this paper, we develop a modeling method based on stochastic Petri nets (SPN) to allow user-perceived measures in voting-based replicated systems to be estimated. The merit of our approach is that user-arrival, maintenance, and node/link-failure or -rep...
   
Analysis of Algorithms for Supporting Disconnected Write Operations in Mobile Client-Server Environments
Found in: Autonomous Decentralized Systems, International Symposium on
By Ing-Ray Chen, Ngoc Anh Phan, I-Ling Yen
Issue Date:March 2001
pp. 456
A mobile user may voluntarily disconnect itself from the web server to save its battery life and avoid high communication prices. To allow web pages to be updated while the mobile user is disconnected from the web server, updates can be staged in the mobil...
   
Analyzing Reconfigurable Algorithms for Managing Replicated Data with Strict Consistency Requirements: A Case Study
Found in: Computer Software and Applications Conference, Annual International
By Ding-Chau Wang, Chih-Ping Chu, Ing-Ray Chen
Issue Date:October 2000
pp. 608
In this paper, we address reconfigurable algorithms for managing replicated data with strict consistency requirements, that is, whenever the user performs an update operation, the update is applied to all reachable copies as part of the update protocol. A ...
   
Response Time Behavior of Voting Schemes for Managing Replicated Data
Found in: Computer Software and Applications Conference, Annual International
By Ing-Ray Chen, Ding-Chau Wang, Chih-Ping Chu
Issue Date:October 1999
pp. 139
Voting is a simple and yet effective way of managing replicated data in distributed systems. In this paper we analyze its response time behavior. We investigate a technique for obtaining the access time distribution for requests that access replicated data...
 
Real-Time Atomic Transaction Processing Using Multi-Invariant Data Structure
Found in: High-Assurance Systems Engineering, IEEE International Symposium on
By I-Ling Yen, Biao Chen, Ing-Ray Chen
Issue Date:November 1999
pp. 161
Many multiple server systems are now being used for heavily accessed web services. Performance, availability, and real-time transaction processing are important requirements for many of these applications. In this paper, we apply the multi-invariant data s...
 
Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection
Found in: 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA)
By Ing-Ray Chen,Jia Guo
Issue Date:May 2014
pp. 49-56
In military operation or emergency response situations, very frequently a commander will need to assemble and dynamically manage Community of Interest (COI) mobile groups to achieve a critical mission assigned despite failure, disconnection or compromise o...
 
Behavior Rule Specification-based Intrusion Detection for Safety Critical Medical Cyber Physical Systems
Found in: IEEE Transactions on Dependable and Secure Computing
By Robert Mitchell,Ing-Ray Chen
Issue Date:March 2014
pp. 1
We propose and analyze a behavior-rule specification-based technique for intrusion detection of medical devices embedded in a medical cyber physical system (MCPS) in which the patient’s safety is of the utmost importance. We propose a methodology to transf...
 
Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems
Found in: 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS)
By Fenye Bao,Ing-Ray Chen,Jia Guo
Issue Date:March 2013
pp. 1-7
An Internet of Things (IoT) system connects a large amount of tags, sensors, and mobile devices to facilitate information sharing, enabling a variety of attractive applications. It challenges the design and evaluation of IoT systems to meet the scalability...
   
Dynamic multisource multipath routing for intrusion tolerance and lifetime maximization of autonomous wireless sensor networks
Found in: 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS)
By Hamid Al-Hamadi,Ing-Ray Chen
Issue Date:March 2013
pp. 1-7
Multisource multipath data routing to a remote sink node is an effective way to cope with unreliable and malicious nodes in autonomous wireless sensor networks (WSNs). In this paper we analyze the optimal amount of redundancy in terms of the number of sour...
   
Trust management for the internet of things and its application to service composition
Found in: 2012 IEEE Thirteenth International Symposium on
By Fenye Bao, Ing-Ray Chen
Issue Date:June 2012
pp. 1-6
The Internet of Things (IoT) integrates a large amount of everyday life devices from heterogeneous network environments, bringing a great challenge into security and reliability management. Recognizing that the smart objects in IoT are most likely human-ca...
   
 1  2 Next >>