166 results on '"Ni, Lionel"'
Search Results
2. Lite DETR : An Interleaved Multi-Scale Encoder for Efficient DETR
- Author
-
Li, Feng, Zeng, Ailing, Liu, Shilong, Zhang, Hao, Li, Hongyang, Zhang, Lei, and Ni, Lionel M.
- Subjects
FOS: Computer and information sciences ,Computer Vision and Pattern Recognition (cs.CV) ,Computer Science - Computer Vision and Pattern Recognition - Abstract
Recent DEtection TRansformer-based (DETR) models have obtained remarkable performance. Its success cannot be achieved without the re-introduction of multi-scale feature fusion in the encoder. However, the excessively increased tokens in multi-scale features, especially for about 75\% of low-level features, are quite computationally inefficient, which hinders real applications of DETR models. In this paper, we present Lite DETR, a simple yet efficient end-to-end object detection framework that can effectively reduce the GFLOPs of the detection head by 60\% while keeping 99\% of the original performance. Specifically, we design an efficient encoder block to update high-level features (corresponding to small-resolution feature maps) and low-level features (corresponding to large-resolution feature maps) in an interleaved way. In addition, to better fuse cross-scale features, we develop a key-aware deformable attention to predict more reliable attention weights. Comprehensive experiments validate the effectiveness and efficiency of the proposed Lite DETR, and the efficient encoder strategy can generalize well across existing DETR-based models. The code will be available in \url{https://github.com/IDEA-Research/Lite-DETR}., CVPR 2023
- Published
- 2023
3. Mask DINO: Towards A Unified Transformer-based Framework for Object Detection and Segmentation
- Author
-
Li, Feng, Zhang, Hao, xu, Huaizhe, Liu, Shilong, Zhang, Lei, Ni, Lionel M., and Shum, Heung-Yeung
- Subjects
FOS: Computer and information sciences ,Computer Vision and Pattern Recognition (cs.CV) ,Computer Science - Computer Vision and Pattern Recognition - Abstract
In this paper we present Mask DINO, a unified object detection and segmentation framework. Mask DINO extends DINO (DETR with Improved Denoising Anchor Boxes) by adding a mask prediction branch which supports all image segmentation tasks (instance, panoptic, and semantic). It makes use of the query embeddings from DINO to dot-product a high-resolution pixel embedding map to predict a set of binary masks. Some key components in DINO are extended for segmentation through a shared architecture and training process. Mask DINO is simple, efficient, and scalable, and it can benefit from joint large-scale detection and segmentation datasets. Our experiments show that Mask DINO significantly outperforms all existing specialized segmentation methods, both on a ResNet-50 backbone and a pre-trained model with SwinL backbone. Notably, Mask DINO establishes the best results to date on instance segmentation (54.5 AP on COCO), panoptic segmentation (59.4 PQ on COCO), and semantic segmentation (60.8 mIoU on ADE20K) among models under one billion parameters. Code is available at \url{https://github.com/IDEACVR/MaskDINO}.
- Published
- 2022
4. DINO: DETR with Improved DeNoising Anchor Boxes for End-to-End Object Detection
- Author
-
Zhang, Hao, Li, Feng, Liu, Shilong, Zhang, Lei, Su, Hang, Zhu, Jun, Ni, Lionel M., and Shum, Heung-Yeung
- Subjects
FOS: Computer and information sciences ,Computer Vision and Pattern Recognition (cs.CV) ,Computer Science - Computer Vision and Pattern Recognition - Abstract
We present DINO (\textbf{D}ETR with \textbf{I}mproved de\textbf{N}oising anch\textbf{O}r boxes), a state-of-the-art end-to-end object detector. % in this paper. DINO improves over previous DETR-like models in performance and efficiency by using a contrastive way for denoising training, a mixed query selection method for anchor initialization, and a look forward twice scheme for box prediction. DINO achieves $49.4$AP in $12$ epochs and $51.3$AP in $24$ epochs on COCO with a ResNet-50 backbone and multi-scale features, yielding a significant improvement of $\textbf{+6.0}$\textbf{AP} and $\textbf{+2.7}$\textbf{AP}, respectively, compared to DN-DETR, the previous best DETR-like model. DINO scales well in both model size and data size. Without bells and whistles, after pre-training on the Objects365 dataset with a SwinL backbone, DINO obtains the best results on both COCO \texttt{val2017} ($\textbf{63.2}$\textbf{AP}) and \texttt{test-dev} (\textbf{$\textbf{63.3}$AP}). Compared to other models on the leaderboard, DINO significantly reduces its model size and pre-training data size while achieving better results. Our code will be available at \url{https://github.com/IDEACVR/DINO}.
- Published
- 2022
5. Popularity adaptive search in hybrid P2P systems
- Author
-
Shi, Xiaoqiu, Han, Jinsong, Liu, Yunhao, and Ni, Lionel M.
- Published
- 2009
- Full Text
- View/download PDF
6. ANTS: efficient vehicle locating based on ant search in ShanghaiGrid
- Author
-
Li, Minglu, Zhu, Hongzi, Zhu, Yanmin, and Ni, Lionel M.
- Subjects
Intelligent vehicle-highway systems -- Design and construction ,Public transportation -- Technology application ,Peer to peer computing -- Usage ,Radio frequency identification (RFID) -- Design and construction ,Radio frequency identification (RFID) -- Usage ,Radio frequency identification ,Technology application ,Business ,Electronics ,Electronics and electrical industries ,Transportation industry - Published
- 2009
7. HERO: online real-time vehicle tracking
- Author
-
Hongzi Zhu, Minglu Li, Yanmin Zhu, and Ni, Lionel M.
- Subjects
Distributed processing (Computers) -- Analysis ,Peer to peer computing -- Evaluation ,Radio frequency identification (RFID) -- Evaluation ,Real-time control -- Analysis ,Real-time systems -- Analysis ,Distributed processing (Computers) ,Radio frequency identification ,Real-time system ,Business ,Computers ,Electronics ,Electronics and electrical industries - Published
- 2009
8. Unsupervised Learning for Human Mobility Behaviors.
- Author
-
Liu, Siyuan, Tang, Shaojie, Zheng, Jiangchuan, and Ni, Lionel M.
- Subjects
LEARNING ,MOBILE learning ,DATA mining - Abstract
Learning human mobility behaviors from location-sensing data are crucial to mobility data mining because of its potential to address a range of analytical purposes in mobile context reasoning, including exploration, inference, and prediction. However, existing approaches suffer from two practical problems: temporal and spatial sparsity. To address these shortcomings, we present two unsupervised learning methods to model the mobility behaviors of multiple users (i.e., a population), considering efficiency and accuracy. These methods intelligently overcome the sparsity in individual data by seeking temporal commonality among users' heterogeneous location behaviors. The advantages of our models are highlighted through experiments on several real-world mobility data sets, which also show how our methods can realize the three analytical purposes in a unified manner. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
9. Pseudo trust: zero-knowledge authentication in anonymous P2Ps
- Author
-
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Huai, Ni, Lionel M., and Jian Ma
- Subjects
Parallel computers -- Analysis ,Peer to peer computing -- Evaluation ,Scalability -- Evaluation ,Business ,Computers ,Electronics ,Electronics and electrical industries - Abstract
The Pseudo Trust (PT) protocol is designed, in which each peer generates an unforgeable and verifiable pseudonym by using a one-way hash function. The results of trace-driven simulations have shown that PT is scalable in both static and dynamic environments.
- Published
- 2008
10. Incentive-based scheduling for market-like computational grids
- Author
-
Lijuan Xiao, Yanmin Zhu, Ni, Lionel M., and Zhiwei Xu
- Subjects
Peer to peer computing -- Analysis ,Business ,Computers ,Electronics ,Electronics and electrical industries - Abstract
A novel incentive-based scheduling scheme for grid computing is presented. Results suggest the achievement of highly successful job execution and fair profit allocation.
- Published
- 2008
11. Scalable live streaming service based on interoverlay optimization
- Author
-
Xiaofei Liao, Hai Jin, Yunhao Liu, and Ni, Lionel M.
- Subjects
Distributed processing (Computers) -- Design and construction ,Distributed processing (Computers) -- Comparative analysis ,Distributed processing (Computers) ,Quality of service ,Business ,Computers ,Electronics ,Electronics and electrical industries - Abstract
An interoverlay optimization scheme (IOO) is proposed for providing scalable live streaming services. Findings reveal the excellent performance of IOO in terms of resource utilization and the quality of service (QoS) of streaming services.
- Published
- 2007
12. Private and secure service discovery via progressive and probabilistic exposure
- Author
-
Feng Zhu, Wei Zhu, Mutka, Matt W., and Ni, Lionel M.
- Subjects
Application service providers -- Management ,User groups -- Management ,Transmission Control Protocol/Internet Protocol (Computer network protocol) -- Analysis ,Application service provider ,User group ,TCP/IP ,Company business management ,Business ,Computers ,Electronics ,Electronics and electrical industries - Abstract
A progressive and probabilistic approach is presented for the effective protection of sensitive information and for preserving privacy for users and service providers. Findings reveal the efficient running of the approach on PDAs.
- Published
- 2007
13. Building Efficient Overlays
- Author
-
Liu, Yunhao, Xiao, Li, Ni, Lionel M., and Liu, Yunhuai
- Published
- 2004
- Full Text
- View/download PDF
14. Improving unstructured peer-to peer systems by Adaptive Connection Establishment
- Author
-
Li Xiao, Yunhao Liu, and Ni, Lionel M.
- Subjects
Peer to peer computing -- Analysis ,Algebraic topology -- Analysis ,Topology -- Analysis ,Mathematical optimization -- Analysis - Published
- 2005
15. Facilitating secure ad hoc service discovery in public environments
- Author
-
Feng Zhu, Mutka, Matt, and Ni, Lionel
- Subjects
Wireless technology ,Data transfer rate ,Transmission speed ,Protocol ,Mobile communication systems -- Safety and security measures ,Mobile communication systems -- Models ,Wireless communication systems -- Safety and security measures ,Wireless communication systems -- Models ,Computer network protocols -- Research ,Data transfer rate -- Research ,Transmission speed -- Research - Published
- 2005
16. EMPOWER: A cluster architecture supporting networks emulation
- Author
-
Pei Zheng and Ni, Lionel M.
- Subjects
Mobile communication systems -- Analysis ,Wireless communication systems -- Analysis ,Clustering (Computers) -- Analysis ,Wide area networks -- Analysis ,Wireless technology ,Server clustering ,WAN ,Business ,Computers ,Electronics ,Electronics and electrical industries - Abstract
A distributed IP network emulator cluster EMPOWER ( Emulation of the performance of wide area networks ) is presented. It can be used to emulate a large network with a limited number of commodity computers and can generate user-defined arbitrary network conditions and traffic dynamics at packet level for specific test scenarios.
- Published
- 2004
17. Prioritized overlay multicast in mobile ad hoc environments
- Author
-
Li Xiao, Patil, Abhishek, Liu, Yunhao, Ni, Lionel M., and Esfahanian, Abdol-Hossein
- Subjects
Company business planning ,Ad hoc networks (Computer networks) -- Planning ,Ad hoc networks (Computer networks) -- Evaluation - Published
- 2004
18. Novel Techniques for Analysis and Design of Cross-Layer Optimized Wireless Sensor Networks
- Author
-
Dohler, Mischa, Znati, Taieb, Toumpis, Stavros, and Ni, Lionel M.
- Published
- 2007
- Full Text
- View/download PDF
19. Facilitating secure ad hoc service discovery in public environments
- Author
-
Zhu, Feng, Mutka, Matt, and Ni, Lionel
- Published
- 2005
- Full Text
- View/download PDF
20. Generalizing from a Few Examples: A Survey on Few-shot Learning.
- Author
-
YAQING WANG, QUANMING YAO, KWOK, JAMES T., and NI, LIONEL M.
- Abstract
Machine learning has been highly successful in data-intensive applications but is often hampered when the data set is small. Recently, Few-shot Learning (FSL) is proposed to tackle this problem. Using prior knowledge, FSL can rapidly generalize to new tasks containing only a few samples with supervised information. In this article, we conduct a thorough survey to fully understand FSL. Starting from a formal definition of FSL, we distinguish FSL from several relevant machine learning problems. We then point out that the core issue in FSL is that the empirical risk minimizer is unreliable. Based on how prior knowledge can be used to handle this core issue, we categorize FSL methods from three perspectives: (i) data, which uses prior knowledge to augment the supervised experience; (ii) model, which uses prior knowledge to reduce the size of the hypothesis space; and (iii) algorithm, which uses prior knowledge to alter the search for the best hypothesis in the given hypothesis space. With this taxonomy, we review and discuss the pros and cons of each category. Promising directions, in the aspects of the FSL problem setups, techniques, applications, and theories, are also proposed to provide insights for future research. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
21. Online Convolutional Sparse Coding with Sample-Dependent Dictionary
- Author
-
Wang, Yaqing, Yao, Quanming, Kwok, James T., and Ni, Lionel M.
- Subjects
FOS: Computer and information sciences ,Computer Vision and Pattern Recognition (cs.CV) ,Computer Science - Computer Vision and Pattern Recognition - Abstract
Convolutional sparse coding (CSC) has been popularly used for the learning of shift-invariant dictionaries in image and signal processing. However, existing methods have limited scalability. In this paper, instead of convolving with a dictionary shared by all samples, we propose the use of a sample-dependent dictionary in which filters are obtained as linear combinations of a small set of base filters learned from the data. This added flexibility allows a large number of sample-dependent patterns to be captured, while the resultant model can still be efficiently learned by online learning. Extensive experimental results show that the proposed method outperforms existing CSC algorithms with significantly reduced time and space requirements., Accepted by ICML-2018
- Published
- 2018
22. Novel Techniques for Analysis and Design of Cross-Layer Optimized Wireless Sensor Networks
- Author
-
Znati Taieb, Ni Lionel M, Toumpis Stavros, and Dohler Mischa
- Subjects
Telecommunication ,TK5101-6720 ,Electronics ,TK7800-8360 - Published
- 2007
23. Generalized Convolutional Sparse Coding With Unknown Noise.
- Author
-
Wang, Yaqing, Kwok, James T., and Ni, Lionel M.
- Subjects
GAUSSIAN mixture models ,PROBABILITY density function ,EXPECTATION-maximization algorithms ,RANDOM noise theory ,NOISE - Abstract
Convolutional sparse coding (CSC) can learn representative shift-invariant patterns from data. However, existing CSC methods assume the Gaussian noise, which can be restrictive in some challenging applications. In this paper, we propose a generalized CSC model capable of handling complicated unknown noise. The noise is modeled by the Gaussian mixture model, which can approximate any continuous probability density function. The Expectation-Maximization algorithm is used to solve the resultant learning problem. For efficient optimization, the crux is to speed up the convolution in the frequency domain while keeping the other computations involving the weight matrix in the spatial domain. We design an efficient solver for the weighted CSC problem in the M-step. The dictionary and codes are updated simultaneously by an efficient nonconvex accelerated proximal gradient algorithm. The resultant procedure, called generalized convolutional sparse coding (GCSC), obtains the same space complexity and a smaller running time than existing CSC methods (which are limited to the Gaussian noise). Extensive experiments on synthetic and real-world noisy data sets validate that GCSC can model the noise effectively and obtain high-quality filters and representations. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
24. A practical approach for providing QoS in the internet backbone
- Author
-
Xiao, XiPeng, Telkamp, Thomas, Fineberg, Victoria, Chen, Cheng, and Ni, Lionel M.
- Subjects
Company business management ,Internet ,Quality of service ,Internet -- Quality management - Published
- 2003
25. A Novel Scheme Based on the Diffusion to Edge Detection.
- Author
-
He, Yuesheng and Ni, Lionel M.
- Subjects
- *
EDGE detection (Image processing) , *MACHINE learning , *DIGITAL image processing , *ARTIFICIAL neural networks , *BIG data - Abstract
A novel scheme of edge detection based on the physical law of diffusion is presented in this paper. Though the most current studies are using data based methods such as deep neural networks, these methods on machine learning need big data of labeled ground truth as well as a large amount of resources for training. On the other hand, the widely used traditional methods are based on the gradient of the grayscale or color of images with using different sorts of mathematical tools to accomplish the mission. Instead of treating the outline of an object in an image as a kind of gradient of grayscale or color, our scheme deals with the edge detection as a character of an energy diffusing in the space of media such as charge-coupled device. By using the characteristic function of diffusion, the information of the energy will be extracted. The scheme preserves the structural information of images very well. Because it comes from the inhere law of images’ physical property, it has a unified mathematical framework for images’ edge detection under different conditions, for example, multiscales, diferent light conditions, and so on. Moreover, it has low computational complexity. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
26. Efficient Detection of Soft Concatenation Mapping.
- Author
-
Liu, Hao, Xiao, Jiang, Tan, Haoyu, Luo, Qiong, Zhao, Jintao, and Ni, Lionel M.
- Subjects
DATA warehousing ,DATA mining ,BIG data ,DATA compression ,EMAIL ,DATA integration - Abstract
In modern big data warehouse systems, we observe a common phenomenon that a column of data values can be derived from one or several other columns by transforming and concatenating these columns. We call this relationship between columns a Soft Concatenation Mapping (SCM). SCMs imply significant redundancy in the schema or data, and therefore can be exploited for data integration or data compression. In this paper, we formalize the problem of SCM detection and prove it is NP-hard. We then propose efficient approximate algorithms to detect all SCMs or an optimal set of SCMs in a table. Our experiments on both real-world and synthetic datasets show promising results. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
27. The turn model for adaptive routing.
- Author
-
Glass, Christopher J. and Ni, Lionel M.
- Published
- 1994
- Full Text
- View/download PDF
28. A practical approach for providing QoS in the internet backbone
- Author
-
Xiao, XiPeng, Telkamp, Thomas, Fineberg, Victoria, Chen, Cheng, and Ni, Lionel M.
- Subjects
Company business management ,Internet service provider ,Quality of service ,Internet service providers -- Management ,Internet service providers -- Economic aspects - Published
- 2002
29. On partitioning and mapping for hypercube computing
- Author
-
Ni, Lionel M. and King, Chung-Ta
- Published
- 1988
- Full Text
- View/download PDF
30. Simulation and Experimentation Platforms for Underwater Acoustic Sensor Networks: Advancements and Challenges.
- Author
-
LUO, HANJIANG, WU, KAISHUN, RUBY, RUKHSANA, HONG, FENG, GUO, ZHONGWEN, and NI, LIONEL M.
- Subjects
UNDERWATER acoustic instruments ,SENSOR networks ,CYBER physical systems ,COMPUTER systems ,COMPUTER simulation - Abstract
Ocean and water basically cover the major parts of our planet. To obtain the best utilization of the underlying resources on these parts of the Earth, people have made some research advancements. Specifically, the research on underwater wireless acoustic sensor networks (UWA-SNs) has made great progress. However, wide deployment of UWA-SNs is far from a reality due to several reasons. One important reason is that offshore deployment and field-level experiments of ocean-centric applications are both expensive and labor intensive. Other alternatives to attain this objective are to conduct simulation or experimentation that can reduce cost and accelerate the research activities and their outcomes. However, designing efficient and reliable simulation and experimentation platforms have proven to be more challenging beyond the expectation. In this article, we explore the main techniques (including their pros and cons) and components to develop simulation and experimentation platforms and provide a comprehensive survey report in this area. We classify simulation and experimentation platforms based on some typical criteria and then provide useful guidelines for researchers on choosing suitable platforms in accordance with their requirements. Finally, we address some open and un-resolved issues in this context and provide some suggestions on future research. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
31. Real-time action scheduling in pervasive computing
- Author
-
Lou, Qiong, Ni, Lionel M., and Xue, Wenwei
- Published
- 2011
32. Wi-Fi Radar: Recognizing Human Behavior with Commodity Wi-Fi.
- Author
-
Zou, Yongpan, Liu, Weifeng, Wu, Kaishun, and Ni, Lionel M.
- Subjects
WIRELESS Internet ,WIRELESS communications ,IEEE 802.11 (Standard) ,INTERNET of things ,WIRELESS LANs ,DATA plans - Abstract
Wi-Fi, which enables convenient wireless access to Internet services, has become integral to our modern lives. With widely-deployed Wi-Fi infrastructure, modern people can enjoy a variety of online services such as web browsing, online shopping, social interaction, and e-commerce almost at any time and any place. Traditionally, the most significant functionality of Wi-Fi is to enable high-throughput data communication between terminal devices and the Internet. However, beyond that, we observe that a novel type of system based on commodity Wi-Fi is increasingly attracting intense academic interest. Without hardware modification and redeployment, researchers are exploiting channel state information output by commodity Wi-Fi and transforming existing Wi-Fi systems into radar-like ones that can recognize human behavior along with data communication. This fancy functionality is tremendously expanding the boundaries of Wi-Fi to a new realm and triggering revolutionary applications in the context of the Internet of Things. In this article, we provide a guide to and introduce the impressive landscape of this new realm. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
33. Localization for Drifting Restricted Floating Ocean Sensor Networks.
- Author
-
Luo, Hanjiang, Wu, Kaishun, Gong, Yue-Jiao, and Ni, Lionel M.
- Subjects
WIRELESS sensor networks ,MARINE communication ,GLOBAL Positioning System ,SENSOR placement ,ALGORITHMS - Abstract
Deploying wireless sensor networks in the ocean poses many challenges due to the harsh conditions of the ocean and the nonnegligible node mobility. In this paper, we propose hybrid ocean sensor networks called drifting restricted floating ocean sensor networks (DR-OSNs) for long-term maritime surveillance monitoring tasks, which combines both the advantages of wireless sensor networks and underwater wireless acoustic sensor networks. We present a localization scheme termed localization for double-head maritime sensor networks (LDSN) for DR-OSNs, which leverages the unique characteristics of DR-OSNs to establish the whole localization system after the network is deployed from a plane or a ship, and it does not need the presence of designated anchor nodes deployed underwater. The whole localization process consists of three steps with algorithms self-moored node localization (SML), underwater sensor localization (USD), and floating-node localization algorithm (FLA). The first step is for the super group nodes to localize their underwater moored nodes via an SML algorithm by leveraging the free-drifting movement of their surface nodes. Once the moored nodes in the super group nodes have localized themselves, they turn into anchor nodes underwater. Thus, in the second step, with the help of these new anchor nodes, the unlocalized underwater moored nodes use the USD algorithm to localize their positions. In the last step, when the free-drifting floating nodes without a Global Positioning System (GPS) module need to know their instant position, they apply the FLA to figure out their position. We conduct extensive simulations to evaluate the scheme, with the results indicating that LDSN achieves high localization accuracy and is an effective localization scheme for DR-OSNs. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
34. A Survey on Wireless Indoor Localization from the Device Perspective.
- Author
-
JIANG XIAO, ZIMU ZHOU, YOUWEN YI, and NI, LIONEL M.
- Subjects
INDOOR positioning systems ,WIRELESS channels ,WIRELESS communications ,SMARTPHONES ,COMPUTER networks - Abstract
With the marvelous development of wireless techniques and ubiquitous deployment of wireless systems indoors, myriad indoor location-based services (ILBSs) have permeated into numerous aspects of modern life. The most fundamental functionality is to pinpoint the location of the target via wireless devices. According to how wireless devices interact with the target, wireless indoor localization schemes roughly fall into two categories: device based and device free. In device-based localization, a wireless device (e.g., a smartphone) is attached to the target and computes its location through cooperation with other deployed wireless devices. In device-free localization, the target carries no wireless devices, while the wireless infrastructure deployed in the environment determines the target's location by analyzing its impact on wireless signals. This article is intended to offer a comprehensive state-of-the-art survey on wireless indoor localization from the device perspective. In this survey, we review the recent advances in both modes by elaborating on the underlying wireless modalities, basic localization principles, and data fusion techniques, with special emphasis on emerging trends in (1) leveraging smartphones to integrate wireless and sensor capabilities and extend to the social context for device-based localization, and (2) extracting specific wireless features to trigger novel human-centric device-free localization. We comprehensively compare each scheme in terms of accuracy, cost, scalability, and energy efficiency. Furthermore, we take a first look at intrinsic technical challenges in both categories and identify several open research issues associated with these new challenges. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
35. TMC: Exploiting Trajectories for Multicast in Sparse Vehicular Networks.
- Author
-
Jiang, Ruobing, Zhu, Yanmin, Wang, Xin, and Ni, Lionel M.
- Subjects
VEHICULAR ad hoc networks ,MULTICASTING (Computer networks) ,INFORMATION resources management ,DECISION support systems ,UNCERTAINTY (Information theory) - Abstract
Multicast is a crucial routine operation for vehicular networks, which underpins important functions such as message dissemination and group coordination. As vehicles may distribute over a vast area, the number of vehicles in a given region can be limited which results in sparse node distribution in part of the vehicular network. This poses several great challenges for efficient multicast, such as network disconnection, scarce communication opportunities and mobility uncertainty. Existing multicast schemes proposed for vehicular networks typically maintain a forwarding structure assuming the vehicles have a high density and move at low speed while these assumptions are often invalid in a practical vehicular network. As more and more vehicles are equipped with GPS enabled navigation systems, the trajectories of vehicles are becoming increasingly available. In this work, we propose an approach called TMC to exploit vehicle trajectories for efficient multicast in vehicular networks. The novelty of TMC includes a message forwarding metric that characterizes the capability of a vehicle to forward a given message to destination nodes, and a method of predicting the chance of inter-vehicle encounter between two vehicles based only on their trajectories without accurate timing information. TMC is designed to be a distributed approach. Vehicles make message forwarding decisions based on vehicle trajectories shared through inter-vehicle exchanges without the need of central information management. We have performed extensive simulations based on real vehicular GPS traces and compared our proposed TMC scheme with other existing approaches. The performance results demonstrate that our approach can achieve a delivery ratio close to that of the flooding-based approach while the cost is reduced by over 80 percent. [ABSTRACT FROM PUBLISHER]
- Published
- 2015
- Full Text
- View/download PDF
36. Exploiting Trajectory-Based Coverage for Geocast in Vehicular Networks.
- Author
-
Jiang, Ruobing, Zhu, Yanmin, He, Tian, Liu, Yunhuai, and Ni, Lionel M.
- Subjects
VEHICULAR ad hoc networks ,GLOBAL Positioning System ,RANDOM variables ,GAMMA distributions ,PROBABILITY density function ,SPACE vehicle tracking - Abstract
Geocast in vehicular networks aims to deliver a message to a target geographical region, which is useful for many applications such as geographic advertising. This is a highly challenging task in vehicular network environments due to the rare encounter opportunities and uncertainty caused by vehicular mobility. As more vehicles are equipped with on-board navigation systems, vehicle trajectories are ready for exploitation. We observe that a vehicle has a higher capability of delivering a message to the target region if its own future trajectory or trajectories of those vehicles to be encountered overlap the target region. Motivated by this observation, we develop a message forwarding metric, called coverage capability, to characterize the capability of a vehicle to successfully geocast the message. When calculating the coverage capability, we are facing the major challenge raised by the absence of accurate vehicle arrival time. Through an empirical study using real vehicular GPS traces of 2,600 taxis, we verify that the travel time of a vehicle, which is modeled as a random variable, follows the Gamma distribution. The travel time modeling helps us to make accurate predictions for inter-vehicle encounters. We perform extensive trace-driven simulations and the results show that our approach achieves 37.4 percent higher delivery ratio and 43.1 percent lower transmission overhead comparing with GPSR which is a representative geographic routing protocol. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
37. MODLoc: Localizing Multiple Objects in Dynamic Indoor Environment.
- Author
-
Guo, Xiaonan, Zhang, Dian, Wu, Kaishun, and Ni, Lionel M.
- Subjects
RADIO frequency ,RADIO transmitters & transmission ,WIRELESS communications ,GLOBAL environmental change ,CALIBRATION - Abstract
Radio frequency (RF) based technologies play an important role in indoor localization, since Radio Signal Strength (RSS) can be easily measured by various wireless devices without additional cost. Among these, radio map based technologies (also referred as fingerprinting technologies) are attractive due to high accuracy and easy deployment. However, these technologies have not been extensively applied on real environment for two fatal limitations. First, it is hard to localize multiple objects. When the number of target objects is unknown, constructing a radio map of multiple objects is almost impossible. Second, environment changes will generate different multipath signals and severely disturb the RSS measurement, making laborious retraining inevitable. Motivated by these, in this paper, we propose a novel approach, called Line-of-sight radio map matching, which only reserves the LOS signal among nodes. It leverages frequency diversity to eliminate the multipath behavior, making RSS more reliable than before. We implement our system MODLoc based on TelosB sensor nodes and commercial 802.11 NICs with Channel State Information (CSI) as well. Through extensive experiments, it shows that the accuracy does not decrease when localizing multiple targets in a dynamic environment. Our work outperforms the traditional methods by about 60 percent. More importantly, no calibration is required in such environment. Furthermore, our approach presents attractive flexibility, making it more appropriate for general RF-based localization studies than just the radio map based localization. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
38. Fine-Grained Localization for Multiple Transceiver-Free Objects by using RF-Based Technologies.
- Author
-
Zhang, Dian, Lu, Kezhong, Mao, Rui, Feng, Yuhong, Liu, Yunhuai, Ming, Zhong, and Ni, Lionel M.
- Subjects
RADIO transmitter-receivers ,RADIO frequency identification systems ,WIRELESS sensor nodes ,HEURISTIC algorithms ,WIRELESS communications ,UBIQUITOUS computing - Abstract
In traditional radio-based localization methods, the target object has to carry a transmitter (e.g., active RFID), a receiver (e.g., 802.11\times detector), or a transceiver (e.g., sensor node). However, in some applications, such as safe guard systems, it is not possible to meet this precondition. In this paper, we propose a model of signal dynamics to allow the tracking of a transceiver-free object. Based on radio signal strength indicator (RSSI), which is readily available in wireless communication, three centralized tracking algorithms, and one distributed tracking algorithm are proposed to eliminate noise behaviors and improve accuracy. The midpoint and intersection algorithms can be applied to track a single object without calibration, while the best-cover algorithm has higher tracking accuracy but requires calibration. The probabilistic cover algorithm is based on distributed dynamic clustering. It can dramatically improve the localization accuracy when multiple objects are present. Our experimental test-bed is a grid sensor array based on MICA2 sensor nodes. The experimental results show that the localization accuracy for single object can reach about 0.8 m and for multiple objects is about 1 m. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
39. CUTS: Improving Channel Utilization in Both Time and Spatial Domain in WLANs.
- Author
-
Li, Haochao, Wu, Kaishun, Zhang, Qian, and Ni, Lionel M.
- Subjects
WIRELESS channels ,WIRELESS communications ,WIRELESS LANs ,ORTHOGONAL frequency division multiplexing ,MIMO systems - Abstract
Improving channel utilization is a well-known issue in wireless networks. In traditional point-to-point wireless communication, significant efforts had been made by the existing studies on enhancing the utilization of the channel access time. However, in the emerging wireless network using MU-MIMO, considering only the time domain in channel utilization is not sufficient. As multiple transmitters are allowed to transmit packets simultaneously to the same AP, allowing more antennas at AP would lead to higher channel utilization. Thus, the channel utilization in MU-MIMO should consider both time and spatial domains, i.e., the channel access time and the antenna usage, which have not been considered in the existing methods. In this paper, we point out that the fundamental problem is lacking of the antenna information of contention nodes in channel contention. To address this issue, we propose a new MAC-PHY architecture design, CUTS, to allow distributed nodes effectively contend for the channel and utilize the channel in both domains. Particularly, CUTS adopts interference nulling to attach the antenna information in channel contention. Meanwhile, techniques such as channel contention in frequency domain and ACK in frequency domain using self-jamming are adopted. Through the software defined radio-based real experiments and extensive simulations, we demonstrate the feasibility of our design and illustrate that CUTS provides better channel utilization with the gain over IEEE 802.11 reaching up to 470 percent. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
40. How to Conduct Distributed IncompletePattern Matching.
- Author
-
Liu, Siyuan, Kang, Lei, Chen, Lei, and Ni, Lionel
- Subjects
COMPUTER networks ,TELECOMMUNICATION systems ,CUMULATIVE distribution function ,MATHEMATICAL proofs ,EMPIRICAL research ,COMPUTER workstation clusters - Abstract
In this paper, we first propose a very interesting and practical problem, pattern matching in a distributed mobile environment. Pattern matching is a well-known problem and extensive research has been conducted for performing effective and efficient search. However, previous proposed approaches assume that data are centrally stored, which is not the case in a mobile environment (e.g., mobile phone networks), where one person's pattern could be separately stored in a number of different stations, and such a local pattern is incomplete compared with the global pattern. A simple solution to pattern matching over a mobile environment is to collect all the data distributed in base stations to a data center and conduct pattern matching at the data center afterwards. Clearly, such a simple solution will raise huge amount of communication traffic, which could cause the communication bottleneck brought by the limited wireless bandwidth to be even worse. Therefore, a communication efficient and search effective solution is necessary. In our work, we present a novel solution which is based on our well-designed weighted bloom filter (WBF), called, D istributed Incomplete pattern matching ( DI-matching), to find target patterns over a distributed mobile environment. Specifically, to save communication cost and ensure pattern matching in distributed incomplete patterns, we use WBF to encode a query pattern and disseminate the encoded data to each base station. Each base station conducts a local pattern search according to the received WBF. Only qualified IDs and corresponding weights in each base station are sent to the data center for aggregation and verification. Through non-trivial theoretical analysis and extensive empirical experiments on a real city-scale mobile networks data set, we demonstrate the effectiveness and efficiency of our proposed solutions. [ABSTRACT FROM PUBLISHER]
- Published
- 2014
- Full Text
- View/download PDF
41. Fraud Detection From Taxis' Driving Behaviors.
- Author
-
Liu, Siyuan, Ni, Lionel M., and Krishnan, Ramayya
- Subjects
- *
TAXICABS , *AUTOMOTIVE transportation , *AUTOMOBILE driving , *MOTOR vehicle driving , *VEHICLE detectors - Abstract
Taxi is a major transportation in the urban area, offering great benefits and convenience to our daily life. However, one of the major business fraud in taxis is the charging fraud, specifically overcharging for the actual distance. In practice, it is hard for us to always monitor taxis and detect such fraud. Due to the Global Positioning System (GPS) embedded in taxis, we can collect the GPS reports from the taxis' locations, and thus, it is possible for us to retrieve their traces. Intuitively, we can utilize such information to construct taxis' trajectories, compute the actual service distance on the city map, and detect fraudulent behaviors. However, in practice, due to the extremely limited reports, notable location errors, complex city map, and road networks, our task to detect taxi fraud faces significant challenges, and the previous methods cannot work well. In this paper, we have a critical and interesting observation that fraudulent taxis always play a secret trick, i.e., modifying the taximeter to a smaller scale. As a result, it not only makes the service distance larger but also makes the reported taxi speed larger. Fortunately, the speed information collected from the GPS reports is accurate. Hence, we utilize the speed information to design a system, which is called the Speed-based Fraud Detection System (SFDS), to model taxi behaviors and detect taxi fraud. Our method is robust to the location errors and independent of the map information and road networks. At the same time, the experiments on real-life data sets confirm that our method has better accuracy, scalability, and more efficient computation, compared with the previous related methods. Finally, interesting findings of our work and discussions on potential issues are provided in this paper for future city transportation and human behavior research. [ABSTRACT FROM PUBLISHER]
- Published
- 2014
- Full Text
- View/download PDF
42. CSI-Based Indoor Localization.
- Author
-
Wu, Kaishun, Xiao, Jiang, Yi, Youwen, Chen, Dihu, Luo, Xiaonan, and Ni, Lionel M.
- Subjects
INFORMATION theory ,BANDWIDTHS ,PERFORMANCE evaluation ,COMPUTER systems ,ESTIMATION theory ,COMPARATIVE studies - Abstract
Indoor positioning systems have received increasing attention for supporting location-based services in indoor environments. WiFi-based indoor localization has been attractive due to its open access and low cost properties. However, the distance estimation based on received signal strength indicator (RSSI) is easily affected by the temporal and spatial variance due to the multipath effect, which contributes to most of the estimation errors in current systems. In this work, we analyze this effect across the physical layer and account for the undesirable RSSI readings being reported. We explore the frequency diversity of the subcarriers in orthogonal frequency division multiplexing systems and propose a novel approach called FILA, which leverages the channel state information (CSI) to build a propagation model and a fingerprinting system at the receiver. We implement the FILA system on commercial 802.11 NICs, and then evaluate its performance in different typical indoor scenarios. The experimental results show that the accuracy and latency of distance calculation can be significantly enhanced by using CSI. Moreover, FILA can significantly improve the localization accuracy compared with the corresponding RSSI approach. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
43. ASAP: Scalable Collision Arbitration for Large RFID Systems.
- Author
-
Qian, Chen, Liu, Yunhuai, Ngan, Raymond Hoilun, and Ni, Lionel M.
- Subjects
MOBILE communication systems ,IMPACT (Mechanics) ,RADIO frequency identification systems ,COMPUTER network protocols ,EMAIL systems ,COMPUTER simulation - Abstract
The growing importance of operations such as identification, location sensing, and object tracking has led to increasing interests in contactless Radio Frequency Identification (RFID) systems. Enjoying the low cost of RFID tags, modern RFID systems tend to be deployed for large-scale mobile objects. Both the theoretical and experimental results suggest that when tags are in large numbers, most existing collision arbitration protocols do not satisfy the scalability and time-efficiency requirements of many applications. To address this problem, we propose Adaptively Splitting-based Arbitration Protocol (ASAP), a scheme that provides efficient RFID identification for both small and large deployment of RFID tags, in terms of time and energy cost. Theoretical analysis and simulation evaluation show that the performance of ASAP is better than most existing collision-arbitration solutions and the time efficiency is close to the theoretically optimal values. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
44. Detecting Crowdedness Spot in City Transportation.
- Author
-
Liu, Siyuan, Liu, Yunhuai, Ni, Lionel, Li, Minglu, and Fan, Jianping
- Subjects
DATA mining ,INTELLIGENT transportation systems ,ELECTRONICS in transportation ,WIRELESS communications ,ALGORITHMS - Abstract
Crowdedness spot is a crowded area with an abnormal number of objects. Detecting the crowdedness spots of moving vehicles in an urban area is essential to many applications. An intuitive method is to cluster the objects in areas to get the density information. Unfortunately, the data capturing vehicle mobility possesses some new features, such as highly mobile environments, supremely limited size of sample objects, and nonuniform biased samples, and all these features have raised new challenges that make traditional density-based clustering algorithms fail to retrieve the real clustering property of objects, making the results less meaningful. In this paper, we propose a novel nondensity-based approach called mobility-based clustering. The key idea is that sample objects are employed as “sensors” to perceive the vehicle crowdedness in nearby areas using their instant mobility rather than the “object representatives.” As such, the mobility of samples is naturally incorporated. Several key factors beyond the vehicle crowdedness have been identified, and techniques to compensate these effects are accordingly proposed. Furthermore, taking the detected crowdedness spots as a label of the taxi, we can identify one particular taxi to be a crowdedness taxi that crosses a number of different crowdedness spots. We evaluate the performance of our methods and baseline approaches based on real traffic situations (to retrieve the real traffic crowdedness) and real-life data sets. Finally, the interesting findings are provided for further discussions. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
45. RASS: A Real-Time, Accurate, and Scalable System for Tracking Transceiver-Free Objects.
- Author
-
Zhang, Dian, Liu, Yunhuai, Guo, Xiaonan, and Ni, Lionel M.
- Subjects
RADIO transmitter-receivers ,OBJECT monitors (Computer software) ,WIRELESS sensor nodes ,WIRELESS sensor networks ,TRACKING control systems ,REAL-time control ,UBIQUITOUS computing ,ACCURACY - Abstract
Transceiver-free object tracking is to trace a moving object that does not carry any communication device in an environment with some monitoring nodes predeployed. Among all the tracking technologies, RF-based technology is an emerging research field facing many challenges. Although we proposed the original idea, until now there is no method achieving scalability without sacrificing latency and accuracy. In this paper, we put forward a real-time tracking system RASS, which can achieve this goal and is promising in the applications like the safeguard system. Our basic idea is to divide the tracking field into different areas, with adjacent areas using different communication channels. So, the interference among different areas can be prevented. For each area, three communicating nodes are deployed on the ceiling as a regular triangle to monitor this area. In each triangle area, we use a Support Vector Regression (SVR) model to locate the object. This model simulates the relationship between the signal dynamics caused by the object and the object position. It not only considers the ideal case of signal dynamics caused by the object, but also utilizes their irregular information. As a result, it can reach the tracking accuracy to around 1 m by just using three nodes in a triangle area with 4 m in each side. The experiments show that the tracking latency of the proposed RASS system is bounded by only about 0.26 m. Our system scales well to a large deployment field without sacrificing the latency and accuracy. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
46. Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems.
- Author
-
Lu, Li, Han, Jinsong, Hu, Lei, and Ni, Lionel M.
- Subjects
RADIO frequency identification systems ,SEARCH algorithms ,LEAKS (Disclosure of information) - Abstract
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking the private information of tags. In previous designs, the RFID tags issue encrypted authentication messages to the RFID reader, and the reader searches the key space to identify the tags. Without key updating, those schemes are vulnerable to many active attacks, especially the compromising attack. We propose a strong and lightweight RFID private authentication protocol, SPA. By designing a novel key updating method, we achieve the forward secrecy in SPA with an efficient key search algorithm. We also show that, compared with existing designs, (SPA) is able to effectively defend against both passive and active attacks, including compromising attacks. Through prototype implementation, we demonstrate that SPA is practical and scalable for current RFID infrastructures. [ABSTRACT FROM AUTHOR]
- Published
- 2012
- Full Text
- View/download PDF
47. Real-Time Action Scheduling in Pervasive Computing.
- Author
-
Wenwei Xue, Qiong Luo, and Ni, Lionel M.
- Subjects
REAL-time control ,SCHEDULING ,UBIQUITOUS computing ,VIDEO surveillance ,ROBOT control systems ,HEURISTIC algorithms ,SIMULATION methods & models - Abstract
Pervasive computing applications, such as video surveillance and robot control, involve diversified operations on physical devices. We call a sequence of operations on a device an action and study how to schedule real-time actions on the devices in pervasive computing. We identify a number of novel characteristics of this pervasive action scheduling problem and develop a dynamic, heuristic algorithm for the problem. The algorithm performs priority-based action scheduling whenever some device becomes free and does not reply on any system-defined scheduling interval. We have implemented our proposed action scheduling algorithm in a pervasive query processing system named Aorta and evaluated its performance using actions in a pervasive lab monitoring application. Our simulation results demonstrate the algorithm ensures small dropping rate of actions and has tiny computation cost. [ABSTRACT FROM AUTHOR]
- Published
- 2011
48. TSS: Efficient Term Set Search in Large Peer-to-Peer Textual Collections.
- Author
-
Hanhua Chen, Jun Yan, Hai Jin, Yunhao Liu, and Ni, Lionel M.
- Subjects
INDUSTRIAL costs ,SIMULATION methods & models ,SEARCH engines ,SEARCH engine optimization ,DATA mining - Abstract
Previous multikeyword search in DHT-based P2P systems often relies on multiple single keyword search operations, suffering from unacceptable traffic cost and poor accuracy. Precomputing term-set-based index can significantly reduce the cost but needs exponentially growing index size. Based on our observations that 1) queries are typically short and 2) users usually have limited interests, we propose a novel index pruning method, called TSS. By solely publishing the most relevant term sets from documents on the peers, TSS provides comparable search performance with a centralized solution, while the index size is reduced from exponential to the scale of O(nlog(n)). We evaluate this design through comprehensive trace-driven simulations using the TREC WT10G data collection and the query log of a major commercial search engine. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
49. Opportunity-Based Topology Control in Wireless Sensor Networks.
- Author
-
Liu, Yunhuai, Zhang, Qian, and Ni, Lionel M.
- Subjects
WIRELESS sensor networks ,ENERGY consumption ,DISTRIBUTED algorithms ,TRANSMITTERS (Communication) ,ELECTRIC network topology - Abstract
Topology control is an effective method to improve the energy efficiency of wireless sensor networks (WSNs). Traditional approaches are based on the assumption that a pair of nodes is either "connected" or "disconnected." These approaches are called connectivity-based topology control. In real environments, however, there are many intermittently connected wireless links called lossy links. Taking a succeeded lossy link as an advantage, we are able to construct more energy-efficient topologies. Toward this end, we propose a novel opportunity-based topology control. We show that opportunity-based topology control is a problem of NP-hard. To address this problem in a practical way, we design a fully distributed algorithm called CONREAP based on reliability theory. We prove that CONREAP has a guaranteed performance. The worst running time is O(∣E∣), where E is the link set of the original topology, and the space requirement for individual nodes is O(d), where d is the node degree. To evaluate the performance of CONREAP, we design and implement a prototype system consisting of 50 Berkeley Mica2 motes. We also conducted comprehensive simulations. Experimental results show that compared with the connectivity-based topology control algorithms, CONREAP can improve the energy efficiency of a network up to six times. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
50. Secure prophet address allocation for MANETs.
- Author
-
Zhou, Hongbo, Mutka, Matt W., and Ni, Lionel M.
- Published
- 2010
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.