Search For:

Displaying 1-40 out of 40 total
On the Access Pricing and Network Scaling Issues of Wireless Mesh Networks
Found in: IEEE Transactions on Computers
By Ray K. Lam, Dah-Ming Chiu, John C.S. Lui
Issue Date:November 2007
pp. 1456-1469
Distributed wireless mesh network technology isready for public deployment in the near future. Yet without anincentive system, one should not assume private, self-interestedwireless nodes would participate in such a public network andcooperate in the packe...
 
Constructing Communication Subgraphs and Deriving an Optimal Synchronization Interval for Distributed Virtual Environment Systems
Found in: IEEE Transactions on Knowledge and Data Engineering
By John C.S. Lui
Issue Date:September 2001
pp. 778-792
<p><b>Abstract</b>—In this paper, we consider problems of constructing a communication subgraph and deriving an optimal synchronization interval for a distributed virtual environment system (DVE). In general, a DVE system is a distributed...
 
Exploring the Optimal Replication Strategy in P2P-VoD Systems: Characterization and Evaluation
Found in: IEEE Transactions on Parallel and Distributed Systems
By Weijie Wu,John C.S. Lui
Issue Date:August 2012
pp. 1492-1503
P2P-Video-on-Demand (P2P-VoD) is a popular Internet service which aims to provide a scalable and high-quality service to users. At the same time, content providers of P2P-VoD services also need to make sure that the service is operated with a manageable op...
 
Toward Picture-perfect Streaming on the Internet
Found in: Quantitative Evaluation of Systems, International Conference on
By Alix L.H. Chow, Leana Golubchik, John C.S. Lui
Issue Date:September 2005
pp. 63-73
<p>Quality of service (QoS) in streaming of continuous media over the Internet is poor, which is partly due to variations in delays, bandwidth limitations, and packet losses. Although continuous media applications can tolerate some missing data, non-...
 
Buffer and I/O Resource Pre-allocation for Implementing Batching and Buffering Techniques for Video-on-Demand Systems
Found in: Data Engineering, International Conference on
By Mary Y.Y. Leung, John C.S. Lui, Leana Golubchik
Issue Date:April 1997
pp. 344
To design a cost effective VOD server, it is important to carefully manage the system resources so that the number of concurrent viewers can be maximized. Previous research results use data sharing techniques, such as batching, buffering and piggybacking, ...
 
A Proportional-Delay DiffServ-Enabled Web Server: Admission Control and Dynamic Adaptation
Found in: IEEE Transactions on Parallel and Distributed Systems
By Sam C.M. Lee, John C.S. Lui, David K.Y. Yau
Issue Date:May 2004
pp. 385-400
<p><b>Abstract</b>—We consider a Web server that can provide differentiated services to clients with different quality of service (QoS) requirements. The Web server can provide <tmath>N \geq 1</tmath> classes of proportional-d...
 
On the Access Pricing Issues of Wireless Mesh Networks
Found in: Distributed Computing Systems, International Conference on
By Ray K. Lam, John C.S. Lui, Dah-Ming Chiu
Issue Date:July 2006
pp. 61
This paper studies the use of pricing as an incentive mechanism to encourage private, self-interested nodes to participate in a public wireless mesh network and cooperate in the packet forwarding service. Our focus is on the
 
Distributed Caching via Rewarding: An Incentive Scheme Design in P2P-VoD Systems
Found in: IEEE Transactions on Parallel and Distributed Systems
By Weijie Wu,Richard T.B. Ma,John C.S. Lui
Issue Date:March 2014
pp. 612-621
Peer-to-peer (P2P) systems rely on peers' cooperation to provide a more robust and scalable service as compared to the traditional client-server architecture. However, the peers might be selfish in nature--they would like to receive services from others, b...
 
Modeling Multi-state Diffusion Process in Complex Networks: Theory and Applications
Found in: 2013 International Conference on Signal-Image Technology & Internet-Based Systems (SITIS)
By Yishi Lin,John C.S. Lui,Kyomin Jung,Sungsu Lim
Issue Date:December 2013
pp. 506-513
There is a growing interest to understand the fundamental principles of how epidemic, ideas or information spread over large networks (e.g., the Internet or online social networks). Conventional approach is to use SIS models (or its derivatives). However, ...
 
Epidemic Attacks in Network-Coding-Enabled Wireless Mesh Networks: Detection, Identification, and Evaluation
Found in: IEEE Transactions on Mobile Computing
By Yongkun Li,John C.S. Lui
Issue Date:November 2013
pp. 2219-2232
Epidemic attack is a severe security problem in network-coding-enabled wireless mesh networks (WMNs). Malicious nodes can easily launch such form of attack to create an epidemic spreading of polluted packets and deplete network resources. The contribution ...
 
Carbon-Aware Load Balancing for Geo-distributed Cloud Services
Found in: 2013 IEEE 21st International Symposium on Modelling, Analysis & Simulation of Computer and Telecommunication Systems (MASCOTS)
By Zhi Zhou,Fangming Liu,Yong Xu,Ruolan Zou,Hong Xu,John C.S. Lui,Hai Jin
Issue Date:August 2013
pp. 232-241
Recently, data center carbon emission has become an emerging concern for the cloud service providers. Previous works are limited on cutting down the power consumption of the data centers to defuse such a concern. In this paper, we show how the spatial and ...
 
Secure Overlay Cloud Storage with Access Control and Assured Deletion
Found in: IEEE Transactions on Dependable and Secure Computing
By Yang Tang,Patrick P.C. Lee,John C.S. Lui,Radia Perlman
Issue Date:November 2012
pp. 903-916
We can now outsource data backups off-site to third-party cloud storage services so as to reduce data management costs. However, we must provide security guarantees for the outsourced data, which is now maintained by third parties. We design and implement ...
 
On the Security and Efficiency of Content Distribution via Network Coding
Found in: IEEE Transactions on Dependable and Secure Computing
By Qiming Li,John C.S. Lui,Dah-Ming Chiu
Issue Date:March 2012
pp. 211-221
Content distribution via network coding has received a lot of attention lately. However, direct application of network coding may be insecure. In particular, attackers can inject
 
On the Performance Bounds of Practical Wireless Network Coding
Found in: IEEE Transactions on Mobile Computing
By Jilin Le, John C.S. Lui, Dah-Ming Chiu
Issue Date:August 2010
pp. 1134-1146
Network coding is an attracting technology that has been shown to be able to improve the throughput of wireless networks. However, there still lacks fundamental understanding on how network coding works under realistic scenarios. In this paper, we examine ...
 
An ISP-Friendly File Distribution Protocol: Analysis, Design, and Implementation
Found in: IEEE Transactions on Parallel and Distributed Systems
By Minghong Lin, John C.S. Lui, Dah-Ming Chiu
Issue Date:September 2010
pp. 1317-1329
In the past few years, P2P file distribution applications (e.g., BitTorrent) are becoming so popular that they are the dominating source of Internet traffic. This creates significant problems to Internet Service Providers (ISPs), not only because of the ad...
 
DCAR: Distributed Coding-Aware Routing in Wireless Networks
Found in: IEEE Transactions on Mobile Computing
By Jilin Le, John C.S. Lui, Dah-Ming Chiu
Issue Date:April 2010
pp. 596-608
Recently, there has been a growing interest of using network coding to improve the performance of wireless networks, for example, authors of [1] proposed the practical wireless network coding system called COPE, which demonstrated the throughput gain achie...
 
A Simple Model for Analyzing P2P Streaming Protocols
Found in: Network Protocols, IEEE International Conference on
By Yipeng Zhou, Dah Ming Chiu, John C.S. Lui
Issue Date:October 2007
pp. 226-235
P2P streaming tries to achieve scalability (like P2P file distribution) and at the same time meet real-time playback requirements. It is a challenging problem still not well understood. In this paper, we describe a simple stochastic model that can be used ...
 
Towards Coding-Efficient Link-Scheduling and Coding-Aware Routing in Wireless Networks
Found in: Network Protocols, IEEE International Conference on
By Jilin Le, John C.S. Lui, Dah Ming Chiu
Issue Date:October 2007
pp. 326-327
No summary available.
 
Interaction of ISPs: Distributed Resource Allocation and Revenue Maximization
Found in: IEEE Transactions on Parallel and Distributed Systems
By Sam C.M. Lee, Joe W.J. Jiang, Dah-Ming Chiu Chiu, John C.S. Lui
Issue Date:February 2008
pp. 204-218
The Internet is a hierarchical architecture comprising heterogeneousentities of privately owned infrastructures, where higherlevel Internet service providers (ISPs) supply connectivity to the localISPs and charge the local ISPs for the transit services. On...
 
On the Practical and Security Issues of Batch Content Distribution Via Network Coding
Found in: Network Protocols, IEEE International Conference on
By Qiming Li, Dah-ming Chiu, John C.S. Lui
Issue Date:November 2006
pp. 158-167
File distribution via network coding has received a lot of attention lately. However, direct application of network coding may have security problems. In particular, attackers can inject
 
On the Effectiveness of Movement Prediction to Reduce Energy Consumption in Wireless Communication
Found in: IEEE Transactions on Mobile Computing
By Srijan Chakraborty, Yu Dong, David K.Y. Yau, John C.S. Lui
Issue Date:February 2006
pp. 157-169
Node movement can be exploited to reduce the energy consumption of wireless network communication. The strategy consists in delaying communication until a mobile node moves close to its target peer node within an application-imposed deadline. We evaluate t...
 
The Fundamental Role of Hop Distance in IEEE802.11 Multi-Hop Ad Hoc Networks
Found in: Network Protocols, IEEE International Conference on
By Yan Gao, Dah-Ming Chiu, John C.S. Lui
Issue Date:November 2005
pp. 75-84
<p>In wireless networks, it is well understood what throughput can be achieved by nodes who can hear each other (i.e. nodes within a single cell)[1, 3]. The effects of nodes beyond the sensing range (known as hidden nodes) on a sender are complicated...
 
You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers
Found in: IEEE Transactions on Parallel and Distributed Systems
By Terence K.T. Law, John C.S. Lui, David K.Y. Yau
Issue Date:September 2005
pp. 799-813
<p><b>Abstract</b>—There is currently an urgent need for effective solutions against distributed denial-of-service (DDoS) attacks directed at many well-known Web sites. Because of increased sophistication and severity of these attacks, th...
 
Automatic Recovery from Disk Failure in Continuous-Media Servers
Found in: IEEE Transactions on Parallel and Distributed Systems
By Jack Y.B. Lee, John C.S. Lui
Issue Date:May 2002
pp. 499-515
<p>Continuous-media (CM) servers have been around for some years. Apart from server capacity, another important issue in the deployment of CM servers is reliability. This study investigates rebuild algorithms for automatically rebuilding data stored ...
 
A Performance Study of Dynamic Replication Techniques in Continuous Media Servers
Found in: Modeling, Analysis, and Simulation of Computer Systems, International Symposium on
By Cheng-Fu Chou, Leana Golubchik, John C.S. Lui
Issue Date:September 2000
pp. 256
The stringent requirements of multimedia applications make design of cost-effective and scalable systems difficult; thus, efficient adaptive and dynamic resource management techniques can be of great help in improving performance and scalability characteri...
 
An Admission Control Algorithm for Providing Quality-of-Service Guarantee for Individual Connection in a Video-on-Demand System
Found in: Computers and Communications, IEEE Symposium on
By John C.S. Lui, X.Q. Wang
Issue Date:July 2000
pp. 456
In this paper, we consider a theoretical framework for performing admission control in a video-on-demand (VOD) system. Unlike previous work on the admission control on VOD system guaranteed quality-of-service (QoS) on the aggregated traffic, our admission ...
 
Striping Doesn't Scale: How to Achieve Scalability for Continuous Media Servers with Replication
Found in: Distributed Computing Systems, International Conference on
By Cheng-Fu Chou, Leana Golubchik, John C.S. Lui
Issue Date:April 2000
pp. 64
Multimedia applications place high demands for QoS, performance, and reliability on storage servers and communication networks. These, often stringent, requirements make design of cost-effective and scalable continuous media (CM) servers difficult. In part...
 
Computing Performance Bounds of Fork-Join Parallel Programs Under a Multiprocessing Environment
Found in: IEEE Transactions on Parallel and Distributed Systems
By John C.S. Lui, Richard R. Muntz, Don Towsley
Issue Date:March 1998
pp. 295-311
<p><b>Abstract</b>—We study a multiprocessing computer system which accepts parallel programs that have a fork-join computational paradigm. The multiprocessing computer system under study is modeled as <it>K</it> homogeneous s...
 
Bounding the Mean Response Time of the Minimum Expected Delay Routing Policy: An Algorithmic Approach
Found in: IEEE Transactions on Computers
By Richard R. Muntz, John C.S. Lui, Don Towsley
Issue Date:December 1995
pp. 1371-1382
<p><it>Abstract</it>—Balancing loads in a multi-server system can have a significant impact on performance. In this paper, we model such a system as a heterogeneous multi-server queueing system. We study the behavior of such a system oper...
 
Stochastic Analysis on RAID Reliability for Solid-State Drives
Found in: 2013 IEEE 32nd International Symposium on Reliable Distributed Systems (SRDS)
By Yongkun Li,Patrick P.C. Lee,John C.S. Lui
Issue Date:September 2013
pp. 71-80
Solid-state drives (SSDs) have been widely deployed in desktops and data centers. However, SSDs suffer from bit errors, and the bit error rate is time dependent since it increases as an SSD wears down. Traditional storage systems mainly use parity-based RA...
 
A Secure Cloud Backup System with Assured Deletion and Version Control
Found in: Parallel Processing Workshops, International Conference on
By Arthur Rahumed,Henry C.H. Chen,Yang Tang,Patrick P.C. Lee,John C.S. Lui
Issue Date:September 2011
pp. 160-167
Cloud storage is an emerging service model that enables individuals and enterprises to outsource the storage of data backups to remote cloud providers at a low cost. However, cloud clients must enforce security guarantees of their outsourced data backups. ...
 
Evaluation of Tradeoffs in Resource Management Techniques for Multimedia Storage Servers
Found in: Multimedia Computing and Systems, International Conference on
By Leana Golubchik, John C.S. Lui, Edmundo de Souza e Silva, H. Richard Gail
Issue Date:June 1999
pp. 292
Many modern applications can benefit from sharing of resources such as network bandwidth, disk bandwidth, and so on. In addition, information systems would like to store data that can be of use to many different classes of applications, e.g., digital libra...
 
Location Updates and Probabilistic Tracking Algorithms for Mobile Cellular Networks
Found in: Parallel Architectures, Algorithms, and Networks, International Symposium on
By John C.S. Lui, Cedric C.F. Fong, H.W. Chan
Issue Date:June 1999
pp. 432
In this work, we develop a novel mathematical model to analyze different location update protocols for mobile cellular network. Our model can capture many important features of user movements, such as geographically dependent movement, directional movement...
 
Deriving Communication Sub-graph and Optimal Synchronizing Interval for a Distributed Virtual Environment System
Found in: Multimedia Computing and Systems, International Conference on
By John C.S. Lui, Oldfield K.Y. So, Peter T.S. Tam
Issue Date:June 1999
pp. 357
Advances in the multimedia and networking technologies allow the realization of the distributed virtual environment (DVE). DVE is a distributed system which allows many clients who are located in different locations (within a LAN or across a WAN) to concur...
 
NFS/M: An Open Platform Mobile File System
Found in: Distributed Computing Systems, International Conference on
By John C.S. Lui, Oldfield K.Y. So, T.S. Tam
Issue Date:May 1998
pp. 488
With the advancement of wireless network and mobile computing, there is an increasing need to build a mobile file system that can perform efficiently and correctly for accessing online information. Previous system research on mobile file system is based on...
 
A peek into smartphones, cloud services and their security
Found in: Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing (MCC '13)
By John C.S. Lui
Issue Date:August 2013
pp. 1-2
As we embrace new technologies and services like smartphones and cloud services, we also need to understand various "security pitfalls". In this talk, I will go over the background on Android smartphones, some of the security issues and also, how malware w...
     
Stochastic modeling of large-scale solid-state storage systems: analysis, design tradeoffs and optimization
Found in: Proceedings of the ACM SIGMETRICS/international conference on Measurement and modeling of computer systems (SIGMETRICS '13)
By John C.S. Lui, Patrick P.C. Lee, Yongkun Li
Issue Date:June 2013
pp. 179-190
Solid state drives (SSDs) have seen wide deployment in mobiles, desktops,and data centers due to their high I/O performance and low energy consumption. As SSDs write data out-of-place, garbage collection (GC) is required to erase and reclaim space with inv...
     
Mathematical modeling of incentive policies in p2p systems
Found in: Proceedings of the 3rd international workshop on Economics of networked systems (NetEcon '08)
By Bridge Q. Zhao, Dah-Ming Chiu, John C.S. Lui
Issue Date:August 2008
pp. 107-112
In order to stimulate cooperation among nodes in P2P systems, some form of incentive mechanism is necessary so as to encourage service contribution. Hence, designing and evaluating the stability, robustness and performance of incentive policies is extremel...
     
Challenges, design and analysis of a large-scale p2p-vod system
Found in: Proceedings of the ACM SIGCOMM 2008 conference on Data communication (SIGCOMM '08)
By Cheng Huang, Dah-Ming Chiu, John C.S. Lui, Tom Z.J. Fu, Yan Huang
Issue Date:August 2008
pp. 325
P2P file downloading and streaming have already become very popular Internet applications. These systems dramatically reduce the server loading, and provide a platform for scalable content distribution, as long as there is interest for the content. P2P-bas...
     
Determining the end-to-end throughput capacity in multi-hop networks: methodology and applications
Found in: Proceedings of the joint international conference on Measurement and modeling of computer systems (SIGMETRICS '06/Performance '06)
By Dah-Ming Chiu, John C.S. Lui, Yan Gao
Issue Date:June 2006
pp. 1928-1929
In this paper, we present a methodology to analytically compute the throughput capacity, or the maximum end-to-end throughput of a given source and destination pair in a multi-hop wireless network. The end-to-end throughput capacity is computed by consider...
     
 1