Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter

    Energy Harvesting in Internet of Things

    Powering billions of connected devices has been recognized as one of the biggest hurdles in the development of Internet of Things (IoT). With such a volume of tiny and ubiquitous smart physical objects in this...

    Cheuk-Wang Yau, Tyrone Tai-On Kwok, Chi-Un Lei, Yu-Kwong Kwok in Internet of Everything (2018)

  2. No Access

    Article

    A performance study of incentive schemes in peer-to-peer file-sharing systems

    Incentive schemes are designed to promote cooperation in distributed systems, in which peers are free to decide how much to contribute. A variety of incentive schemes have been proposed in peer-to-peer file-sh...

    Dingding Guo, Yu-Kwong Kwok, **n **, Jian Deng in The Journal of Supercomputing (2016)

  3. No Access

    Chapter

    Cloud Resource Pricing Under Tenant Rationality

    With the recent emergence of the cloud market, cloud resource pricing fundamentally determines cloud revenue, cloud resource allocation and tenant demand dynamics. However, strategic interactions between cloud...

    **n **, Yu-Kwong Kwok in Handbook on Data Centers (2015)

  4. No Access

    Chapter and Conference Paper

    Game Theoretic Packet Scheduling in a Non-cooperative Wireless Environment

    In many practical scenarios, wireless devices are autonomous and thus, may exhibit non-cooperative behaviors due to self-interests. For instance, a wireless cellular device may be programmed to report bogus ch...

    Zhen Kong, Yu-Kwong Kwok in Communication and Networking (2009)

  5. No Access

    Chapter

    Autonomic Peer-to-Peer Systems: Incentive and Security Issues

    With voluntary users participating in an autonomic manner, peer-to-peer (P2P) systems have been proliferating in an unprecedented pace. Indeed, it is widely known that P2P traffic now constitutes over 60% of t...

    Yu-Kwong Kwok in Autonomic Computing and Networking (2009)

  6. No Access

    Chapter

    Energy-Efficient Resource Management Techniques in Wireless SensorNetworks

    Devices in a wireless sensor network are typically powered by limited and sometimes unchargeable batteries, which are supposed to sustain for months or even years. To enhance the lifetime of a sensor network, ...

    **ao-Hui Lin, Yu-Kwong Kwok, Hui Wang in Guide to Wireless Sensor Networks (2009)

  7. No Access

    Article

    On scheduling and clustering in hierarchical TH-PPM UWB wireless ad hoc networks

    Ultra wideband (UWB) systems are considered as the key wireless infrastructure platforms for efficient short-range communications. In particular, the UWB based mobile computing systems are envisioned to be att...

    Yang Liu, Yu-Kwong Kwok, Jiangzhou Wang in The Journal of Supercomputing (2008)

  8. No Access

    Article

    Downlink TCP performance under cross layer rate and power allocation in infrastructure TH-PPM UWB networks

    Ultra wideband (UWB) systems are currently an important wireless infrastructure for efficient short-range communications and mobile applications. To improve the system efficiency while guaranteeing the radio ...

    Yang Liu, Yu-Kwong Kwok, Jiangzhou Wang in The Journal of Supercomputing (2008)

  9. No Access

    Article

    High performance power control and opportunistic fair scheduling in TH-PPM UWB ad-hoc multimedia networks

    Ultra wideband (UWB) systems are currently an important wireless infrastructure for high performance short-range communications and mobile applications. Indeed, forming ad-hoc networks among various UWB enabled ...

    Yang Liu, Yu-Kwong Kwok, J. Wang in The Journal of Supercomputing (2008)

  10. No Access

    Article

    Practical algorithms for scheduling video data in a local area network environment

    Simultaneous transmission of multiple high quality video streams from a server to the clients is becoming an increasingly important class of traffic in a network of workstations or cluster environment. With a...

    Kelvin Yiu-Lun Tsoi, Yu-Kwong Kwok in The Journal of Supercomputing (2007)

  11. Chapter and Conference Paper

    Design and Evaluation of Parallel String Matching Algorithms for Network Intrusion Detection Systems

    Network security is very important for Internet-connected hosts because of the widespread of worms, viruses, DoS attacks, etc. As a result, a network intrusion detection system (NIDS) is typically needed to de...

    Tyrone Tai-On Kwok, Yu-Kwong Kwok in Network and Parallel Computing (2007)

  12. No Access

    Article

    High Data Rate Video Transmission Using Parallel TCP Connections: Approaches and Performance Evaluation

    In our study, we investigate a packet-level protocol parallelization approach, which works by parallel multithreading the protocol execution such that packets within and among connections are processed in para...

    Hon-Hing Wan, Yu-Kwong Kwok in The Journal of Supercomputing (2006)

  13. No Access

    Article

    Trusted Grid Computing with Security Binding and Trust Integration

    Trusted Grid computing demands robust resource allocation with security assurance at all resource sites. Large-scale Grid applications are being hindered by lack of security assurance from remote resource site...

    Shanshan Song, Kai Hwang, Yu-Kwong Kwok in Journal of Grid Computing (2005)

  14. Chapter and Conference Paper

    Energy Conservation by Peer-to-Peer Relaying in Quasi-Ad Hoc Networks

    Thanks to the highly popular dual channel capabilities (e.g., GSM plus Bluetooth) in modern handheld personal communication devices, an integrated cellular and ad hoc peer-to-peer network (i.e., a quasi-ad hoc wi...

    Andrew Ka-Ho Leung, Yu-Kwong Kwok in Network and Parallel Computing (2005)

  15. No Access

    Chapter and Conference Paper

    HAWK: Halting Anomalies with Weighted Choking to Rescue Well-Behaved TCP Sessions from Shrew DDoS Attacks

    High availability in network services is crucial for effective large-scale distributed computing. While distributed denial-of-service (DDoS) attacks through massive packet flooding have baffled researchers for...

    Yu-Kwong Kwok, Rohit Tripathi, Yu Chen, Kai Hwang in Networking and Mobile Computing (2005)

  16. No Access

    Chapter and Conference Paper

    An Efficient and Practical Greedy Algorithm for Server-Peer Selection in Wireless Peer-to-Peer File Sharing Networks

    Toward a new era of “Ubiquitous Networking” where people are interconnected in anywhere and at anytime via the wired and wireless Internet, we have witnessed an increasing level of impromptu interactions among...

    Andrew Ka Ho Leung, Yu-Kwong Kwok in Mobile Ad-hoc and Sensor Networks (2005)

  17. Chapter and Conference Paper

    GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks

    The USC GridSec project develops distributed security infrastructure and self-defense capabilities to secure wide-area networked resource sites participating in a Grid application. We report new developments i...

    Kai Hwang, Yu-Kwong Kwok, Shanshan Song in Computational Science – ICCS 2005 (2005)

  18. No Access

    Chapter and Conference Paper

    On Energy Efficient Wireless Data Access: Caching or Not?

    We consider a typical wireless data access scenario: a number of mobile clients are interested in a set of data items kept at a common server. A client sends a request to inform the server of its desired data ...

    Mark Kai Ho Yeung, Yu-Kwong Kwok in Mobile Ad-hoc and Sensor Networks (2005)

  19. No Access

    Chapter

    Time-Domain, Frequency-Domain, and Network Level Resource Management Schemes in Bluetooth Networks

    Bluetooth is becoming a ubiquitous short-range wireless technologies in that many low cost commercial devices are already very popular. However, there are still many outstanding issues not defined in the speci...

    Yu-Kwong Kwok in Resource Management in Wireless Networking (2005)

  20. No Access

    Article

    Efficient Packet Scheduling Using Channel Adaptive Fair Queueing in Distributed Mobile Computing Systems

    In a distributed mobile computing system, an efficient packet scheduling policy is a crucial component to achieve a high utilization of the precious bandwidth resources while satisfying users' QoS (quality of ...

    Li Wang, Yu-Kwong Kwok, Wing-Cheong Lau in Mobile Networks and Applications (2004)

previous disabled Page of 2