Search For:

Displaying 1-19 out of 19 total
Performance Modeling and Analysis of the Booting Process in a Transparent Computing Environment
Found in: Future Generation Communication and Networking
By Guanfei Guo, Yaoxue Zhang, Yuezhi Zhou, Laurence T. Yang, Li Wei, Pengwei Tian
Issue Date:December 2008
pp. 83-88
In a transparent computing environment, clients load their Operating Systems (OSes) from a remote central server, thus the boot time of clients is a significant performance metric for customers. With the rapid evolution of systems based on transparent comp...
 
A Bare-Metal and Asymmetric Partitioning Approach to Client Virtualization
Found in: IEEE Transactions on Services Computing
By Yuezhi Zhou,Yaoxue Zhang,Hao Liu,Naixue Xiong,Athanasios V. Vasilakos
Issue Date:January 2014
pp. 40-53
Advancements in cloud computing enable the easy deployment of numerous services. However, the analysis of cloud service access platforms from a client perspective shows that maintaining and managing clients remain a challenge for end users. In this paper, ...
 
Receiving Buffer Adaptation for High-Speed Data Transfer
Found in: IEEE Transactions on Computers
By Hao Liu,Yaoxue Zhang,Yuezhi Zhou,Xiaoming Fu,Laurence T. Yang
Issue Date:November 2013
pp. 2278-2291
New applications based on cloud computing, such as data synchronization for large chain departmental stores and bank transaction records, require very high-speed data transport. Although a number of high-bandwidth networks have been built, existing transpo...
 
Outage Performance for Secure Communication over Correlated Fading Channels with Partial CSI
Found in: 2012 IEEE Asia-Pacific Services Computing Conference (APSCC)
By Jinxiao Zhu,Xiaohong Jiang,Yuezhi Zhou,Yaoxue Zhang,Osamu Takahashi,Norio Shiratori
Issue Date:December 2012
pp. 257-262
This paper considers the transmission of confidential data over a quasi-static fading wiretap channel where the main and eavesdropper channels are correlated. Assuming that before transmission the transmitter knows the channel state information (CSI) of th...
 
Contribution-Based User Reputation Modeling in Collaborative Recommender Systems
Found in: 2012 IEEE 9th Int'l Conference on Ubiquitous Intelligence & Computing / 9th Int'l Conference on Autonomic & Trusted Computing (UIC/ATC)
By Wei Hu,Yaoxue Zhang,Yuezhi Zhou,Zhi Xue
Issue Date:September 2012
pp. 172-179
User reputation is an important factor in collaborative filtering approaches, in which every user may be another's nearest neighbor and may provide recommendations. In order to generate accurate results, the recommender system assigns different weights to ...
 
Performance Analysis of Virtual Disk System for Transparent Computing
Found in: 2012 IEEE 9th Int'l Conference on Ubiquitous Intelligence & Computing / 9th Int'l Conference on Autonomic & Trusted Computing (UIC/ATC)
By Yuan Gao,Yaoxue Zhang,Yuezhi Zhou
Issue Date:September 2012
pp. 470-477
TransCom is a transparent computing platform based on a virtual disk system that supports heterogeneous services of the operating platform and their above applications. In TransCom, OS and software which run in the client are stored on the centralized serv...
 
A Self-tuning Failure Detection Scheme for Cloud Computing Service
Found in: 2012 IEEE International Symposium on Parallel & Distributed Processing (IPDPS)
By Naixue Xiong,Athanasios V. Vasilakos,Jie Wu,Y. Richard Yang,Andy Rindos,Yuezhi Zhou,Wen-Zhan Song,Yi Pan
Issue Date:May 2012
pp. 668-679
Cloud computing is an increasingly important solution for providing services deployed in dynamically scalable cloud networks. Services in the cloud computing networks may be virtualized with specific servers which host abstracted details. Some of the serve...
 
SC-OA: A Secure and Efficient Scheme for Origin Authentication of Interdomain Routing in Cloud Computing Networks
Found in: Parallel and Distributed Processing Symposium, International
By Zhongjian Le,Naixue Xiong,Bo Yang,Yuezhi Zhou
Issue Date:May 2011
pp. 243-254
IP prefix hijacking is one of the top threats in the cloud computing Internets. Based on cryptography, many schemes for preventing prefix hijacks have been proposed. Securing binding between IP prefix and its owner underlies these schemes. We believe that ...
 
Design and Analysis of a Stable Queue Control Scheme for the Internet
Found in: Embedded and Ubiquitous Computing, IEEE/IFIP International Conference on
By Naixue Xiong, Laurence T. Yang, Yaoxue Zhang, Yuezhi Zhou, Yingshu Li
Issue Date:December 2008
pp. 378-384
The recently proposed Active Queue Management (AQM) is an effective method used in Internet routers for congestion control, and to achieve a tradeoff between link utilization and delay. The de facto standard, the Random Early Detection (RED) AQM scheme, an...
 
UCSI Towards a User-Centric Service Integration Approach
Found in: Asia-Pacific Software Engineering Conference
By Pengwei Tian, Yaoxue Zhang, Yuezhi Zhou, Ming Zhong, Cunhao Fang
Issue Date:December 2007
pp. 568
No summary available.
   
An Architecture for On-Demand Desktop Computing in a Network Environment
Found in: Convergence Information Technology, International Conference on
By Guangbin Xu,Yaoxue Zhang,Yuezhi Zhou,Wenyuan Kuang
Issue Date:November 2007
pp. 556-561
Transparent Computing [1] is a novel, pervasive computing applied paradigm in which users can transparently utilize operating systems and upper software resource as a disposable resource while obtaining a full desktop computing experience. This paper prese...
 
A Unified-Index Based Distributed Specification for Heterogeneous Components Management
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Ming Zhong, Yaoxue Zhang, Pengwei Tian, Cunhao Fang, Yuezhi Zhou
Issue Date:August 2007
pp. 599-604
With the development of service-oriented architecture (SOA) and component-based software engineering (CBSE), the number of various heterogeneous service components increases rapidly. They are stored in traditional repositories of different organization and...
 
4VP: A Novel Meta OS Approach for Streaming Programs in Ubiquitous Computing
Found in: Advanced Information Networking and Applications, International Conference on
By Yaoxue Zhang, Yuezhi Zhou
Issue Date:May 2007
pp. 394-403
<p>With the rapid improvements in hardware, software and networks, the computing paradigm has also shifted from mainframe computing to ubiquitous or pervasive computing, in which users can focus on their desired services rather than specific computin...
 
Leveraging the Tail Time for Saving Energy in Cellular Networks
Found in: IEEE Transactions on Mobile Computing
By Di Zhang,Yaoxue Zhang,Yuezhi Zhou,Hao Liu
Issue Date:July 2014
pp. 1-1
In cellular networks, inactivity timers are used to control the release of radio resources. However, during the timeout period of inactivity timers, known as the tail time, a large proportion of energy in user devices and a considerable amount of radio res...
 
Age Effects in Tagging Communities
Found in: 2013 International Conference on Cloud Computing and Big Data (CloudCom-Asia)
By Wei Hu,Yaoxue Zhang,Yuezhi Zhou,Chao Wu
Issue Date:December 2013
pp. 534-537
Age affects people's ideologies and behaviors. People in different ages have various online behavioral tendencies. This paper explores age differences in a tagging community. We developed a model of age differences and performed a relationship study betwee...
 
Leveraging the Tail Time for Saving Energy in Cellular Networks
Found in: IEEE Transactions on Mobile Computing
By Di Zhang,Yaoxue Zhang,Yuezhi Zhou,Hao Liu
Issue Date:October 2013
pp. 1
In cellular networks, inactivity timers are used to control the release of radio resources. However, during the timeout period of inactivity timers, known as the tail time, a large proportion of energy in user devices and a considerable amount of radio res...
 
Query by document via a decomposition-based two-level retrieval approach
Found in: Proceedings of the 34th international ACM SIGIR conference on Research and development in Information (SIGIR '11)
By Laurence T. Yang, Lei Zhang, Linkai Weng, Rui Cai, Yaoxue Zhang, Yuezhi Zhou, Zhiwei Li
Issue Date:July 2011
pp. 505-514
Retrieving similar documents from a large-scale text corpus according to a given document is a fundamental technique for many applications. However, most of existing indexing techniques have difficulties to address this problem due to special properties of...
     
TailTheft: leveraging the wasted time for saving energy in cellular communications
Found in: Proceedings of the sixth international workshop on MobiArch (MobiArch '11)
By Hao Liu, Yaoxue Zhang, Yuezhi Zhou
Issue Date:June 2011
pp. 31-36
A notion in cellular communications (e.g., GSM, 3G) is called Tail Time, namely the period of high power state after the completion of a transmission. This Tail Time can alleviate the overhead of switching from the low to the high power state, in case ther...
     
Virtual disk based centralized management for enterprise networks
Found in: Proceedings of the 2006 SIGCOMM workshop on Internet network management (INM '06)
By Yaoxue Zhang, Yinglian Xie, Yuezhi Zhou
Issue Date:September 2006
pp. 23-28
The rapid advances in hardware, software, and networks have made the management of enterprise network systems an increasingly challenging task. Due to the tight coupling between hardware, software, and data, every one of the hundreds or thousands of PCs th...
     
 1