Search For:

Displaying 1-12 out of 12 total
A cost-based heterogeneous recovery scheme for distributed storage systems with RAID-6 codes
Found in: 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Yunfeng Zhu,Patrick P. C. Lee,Liping Xiang,Yinlong Xu, Lingling Gao
Issue Date:June 2012
pp. 1-12
Modern distributed storage systems provide large-scale, fault-tolerant data storage. To reduce the probability of data unavailability, it is important to recover the lost data of any failed storage node efficiently. In practice, storage nodes are of hetero...
   
Modeling time correlation in passive network loss tomography
Found in: Dependable Systems and Networks, International Conference on
By Jin Cao,Aiyou Chen,Patrick P. C. Lee
Issue Date:June 2011
pp. 550-561
We consider the problem of inferring link loss rates using passive measurements. Prior inference approaches are mainly built on the time correlation nature of packet losses. However, passive inference generally has limited control over the measurement proc...
 
Single Disk Failure Recovery for X-Code-Based Parallel Storage Systems
Found in: IEEE Transactions on Computers
By Silei Xu, Runhui Li,Patrick P. C. Lee, Yunfeng Zhu, Liping Xiang, Yinlong Xu,John C. S. Lui
Issue Date:April 2014
pp. 995-1007
In modern parallel storage systems (e.g., cloud storage and data centers), it is important to provide data availability guarantees against disk (or storage node) failures via redundancy coding schemes. One coding scheme is X-code, which is double-fault tol...
 
Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups
Found in: Network Protocols, IEEE International Conference on
By Patrick P. C. Lee, John C. S. Lui, David K. Y. Yau
Issue Date:November 2002
pp. 322
We consider several distributed collaborative key agreement protocols for dynamic peer groups. This problem has several important characteristics which make it different from traditional secure group communication. They are (1) distributed nature in which ...
 
A Privacy-Preserving Defense Mechanism against Request Forgery Attacks
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Ben S. Y. Fung,Patrick P. C. Lee
Issue Date:November 2011
pp. 45-52
One top vulnerability in today's web applications is request forgery, in which an attacker triggers an unintentional request from a client browser to a target website and exploits the client's privileges on the website. To defend against a general class of...
 
On the Speedup of Recovery in Large-Scale Erasure-Coded Storage Systems
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yunfeng Zhu,Patrick P. C. Lee,Yinlong Xu,Yuchong Hu,Liping Xiang
Issue Date:July 2014
pp. 1830-1840
Modern storage systems stripe redundant data across multiple nodes to provide availability guarantees against node failures. One form of data redundancy is based on XOR-based erasure codes, which use only XOR operations for encoding and decoding. In additi...
 
A Tunable Version Control System for Virtual Machines in an Open-Source Cloud
Found in: IEEE Transactions on Services Computing
By Chung Pan Tang,Patrick P. C. Lee,Tsz Yeung Wong
Issue Date:February 2014
pp. 1
Open-source cloud platforms provide a feasible alternative of deploying cloud computing in low-cost commodity hardware and operating systems. To enhance the reliability of an open-source cloud, we design and implement CloudVS, a practical add-on system tha...
 
CORE: Augmenting regenerating-coding-based recovery for single and concurrent failures in distributed storage systems
Found in: 2013 IEEE 29th Symposium on Mass Storage Systems and Technologies (MSST)
By Runhui Li,Jian Lin,Patrick P. C. Lee
Issue Date:May 2013
pp. 1-6
Data availability is critical in distributed storage systems, especially when node failures are prevalent in real life. A key requirement is to minimize the amount of data transferred among nodes when recovering the lost or unavailable data of failed nodes...
   
Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service
Found in: Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC '12)
By Jing Tao, John C. S. Lui, Patrick P. C. Lee, Shuang Zhao, Xiaobo Ma, Xiaohong Guan
Issue Date:December 2012
pp. 119-128
Given the popularity of smartphones and mobile devices, mobile botnets are becoming an emerging threat to users and network operators. We propose a new form of cloud-based push-styled mobile botnets that exploits today's push notification services as a mea...
     
Enhancing the trust of internet routing with lightweight route attestation
Found in: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS '11)
By Jianping Wu, Ke Xu, Mingwei Xu, Patrick P. C. Lee, Qi Li, Xinwen Zhang
Issue Date:March 2011
pp. 92-101
The weak trust model in Border Gateway Protocol (BGP) introduces severe vulnerabilities for Internet routing including active malicious attacks and unintended misconfigurations. Although various secure BGP solutions have been proposed, they share similar w...
     
A lock-free, cache-efficient shared ring buffer for multi-core architectures
Found in: Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS '09)
By Girish Chandranmenon, Patrick P. C. Lee, Tian Bu
Issue Date:October 2010
pp. 78-79
We propose MCRingBuffer, a lock-free, cache-efficient shared ring buffer that provides fast data accesses among threads running in multi-core architectures. MCRingBuffer seeks to reduce the cost of inter-core communication by allowing concurrent lock-free ...
     
Opportunistic use of client repeaters to improve performance of WLANs
Found in: Proceedings of the 2008 ACM CoNEXT Conference (CONEXT '08)
By Dan Rubenstein, Jitendra Padhye, Paramvir Bahl, Patrick P. C. Lee, Ranveer Chandra, Vishal Misra, Yan Yu
Issue Date:December 2008
pp. 1-12
Currently deployed IEEE 802.11 WLANs (Wi-Fi networks) share access point (AP) bandwidth on a per-packet basis. However, the various stations communicating with the AP often have different signal qualities, resulting in different transmission rates. This in...
     
 1