Browsing by Author "Zhao, Wei"
Now showing items 1-20 of 23
-
Congestion control schemes for single and parallel TCP flows in high bandwidth-delay product networks
Cho, Soohyun (Texas A&M University, 2006-08-16)In this work, we focus on congestion control mechanisms in Transmission Control Protocol (TCP) for emerging very-high bandwidth-delay product networks and suggest several congestion control schemes for parallel and single-flow ... -
A distributed hard real-time Java system for high mobility components
Rho, Sangig (Texas A&M University, 2005-02-17)In this work we propose a methodology for providing real-time capabilities to component-based, on-the-fly reconfigurable, distributed systems. In such systems, software components migrate across computational resources ... -
Dynamic resource location in peer-to-peer networks
Nathuji, Ripal Babubhai (Texas A&M University, 2004-09-30)Resource location is a necessary operation for computer applications. In large scale peer-to-peer systems, random search is a scalable approach for locating dynamic resources. Current peer-to-peer systems can be partitioned ... -
Efficient network camouflaging in wireless networks
Jiang, Shu (Texas A&M University, 2006-04-12)Camouflaging is about making something invisible or less visible. Network camouflaging is about hiding certain traffic information (e.g. traffic pattern, traffic flow identity, etc.) from internal and external eavesdroppers ... -
Energy efficient scheduling techniques for real-time embedded systems
Prathipati, Rajesh Babu (Texas A&M University, 2004-09-30)Battery-powered portable embedded systems have been widely used in many applications. These embedded systems have to concurrently perform a multitude of complex tasks under stringent time constraints. As these systems ... -
FROM PINNING TO LOCALIZATION IN GRAPHENE – ON THE STATISTICAL PROPERTIES OF RANDOMLY PINNED FLEXURAL PHONONS
Zhao, Wei (2017-12-01)We identify graphene layer on a disordered substrate as a system where Anderson localization of phonons can be observed. Generally, observation of localization for scattering waves is not simple, because the Rayleigh ... -
A generalized utilization bound test for fixed-priority real-time scheduling
Park, Dong-Won (Texas A&M University. Libraries, 1993)Liu & Layland provided a utilization bound test which is applicable to rate-monotonic priority assignment, when all tasks deadlines axe at the end of their periods. Subsequently, Lehoczky and others provided an exact ... -
Local synchronous bandwidth allocation in a token ring network
Zhao, Wei; Chen, Biao; Agrawal, Gopal (United States. Patent and Trademark OfficeTexas A&M University. Libraries, 1994-05-17)A method for real time message transmission in a token ring network is provided. The method initializes each node in the network, including setting a maximum message transmission time Hi for node i such that ##EQU1## where ... -
Modeling and control of network traffic for performance and secure communications
Xiong, Yong (Texas A&M University, 2005-02-17)The objective of this research is to develop innovative techniques for modeling and control of network congestion. Most existing network controls have discontinuous actions, but such discontinuity in control actions is ... -
Multiterminal source coding: sum-rate loss, code designs, and applications to video sensor networks
Yang, Yang (2009-05-15)Driven by a host of emerging applications (e.g., sensor networks and wireless video), distributed source coding (i.e., Slepian-Wolf coding, Wyner-Ziv coding and various other forms of multiterminal source coding), has ... -
Normalized proportional synchronous bandwidth allocation in a token ring network by setting a maximum message transmission time
Zhao, Wei; Agrawal, Gopal; Chen, Biao; Davari, Sadegh (United States. Patent and Trademark OfficeTexas A&M University. Libraries, 1995-04-04)A substantially single phase, single crystalline, highly epitaxial film of Bi2 CaSr2 Cu2 O8 superconductor which has a Tc (zero resistance) of 83K is provided on a lattice-matched substrate with no intergrowth. This film ... -
Numerical solutions of differential equations on FPGA-enhanced computers
He, Chuan (2009-05-15)Conventionally, to speed up scientific or engineering (S&E) computation programs on general-purpose computers, one may elect to use faster CPUs, more memory, systems with more efficient (though complicated) architecture, ... -
Observed 3D Structure, Generation, and Dissipation of Oceanic Mesoscale Eddies in the South China Sea
Zhang, Zhiwei; Tian, Jiwei; Qiu, Bo; Zhao, Wei; Chang, Ping; Wu, Dexing; Wan, Xiuquan (Scientific Reports, 2016) -
On countermeasures of worm attacks over the Internet
Yu, Wei (2009-05-15)Worm attacks have always been considered dangerous threats to the Internet since they can infect a large number of computers and consequently cause large-scale service disruptions and damage. Thus, research on modeling ... -
On delay-sensitive communication over wireless systems
Liu, Lingjia (2009-05-15)This dissertation addresses some of the most important issues in delay-sensitive communication over wireless systems and networks. Traditionally, the design of communication networks adopts a layered framework where each ... -
On Design and Realization of New Generation Misson-critial Application Systems
Mai, Zhibin (2011-08-08)Mission-critical system typically refers to a project or system for which the success is vital to the mission of the underlying organization. The failure or delayed completion of the tasks in mission-critical systems may ... -
On traffic analysis attacks and countermeasures
Fu, Xinwen (Texas A&M University, 2007-04-25)Security and privacy have gained more and more attention with the rapid growth and public acceptance of the Internet as a means of communication and information dissemination. Security and privacy of a computing or network ... -
On traffic analysis in anonymous communication networks
Zhu, Ye (2009-06-02)In this dissertation, we address issues related to traffic analysis attacks and the engineering in anonymous communication networks. Mixes have been used in many anonymous communication systems and are supposed to provide ... -
Privacy-preserving data mining
Zhang, Nan (2009-05-15)In the research of privacy-preserving data mining, we address issues related to extracting knowledge from large amounts of data without violating the privacy of the data owners. In this study, we first introduce an integrated ... -
Proactive communication in multi-agent teamwork
Zhang, Yu (Texas A&M University, 2007-04-25)Sharing common goals and acting cooperatively are critical issues in multiagent teamwork. Traditionally, agents cooperate with each other by inferring others' actions implicitly or explicitly, based on established norms ...