Author image not provided
 Xiangyang Li

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article8.94
Citation Count1,796
Publication count201
Publication years2000-2016
Available for download71
Average downloads per article509.20
Downloads (cumulative)36,153
Downloads (12 Months)1,757
Downloads (6 Weeks)238
Professional ACM Member
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Advisor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


201 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 201
Result page: 1 2 3 4 5 6 7 8 9 10 >>

Sort by:

1
April 2016 IEEE/ACM Transactions on Networking (TON): Volume 24 Issue 2, April 2016
Publisher: IEEE Press
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 5,   Downloads (12 Months): 39,   Downloads (Overall): 39

Full text available: PDFPDF
Mobile crowd sensing (MCS) is a new paradigm that takes advantage of pervasive mobile devices to efficiently collect data, enabling numerous novel applications. To achieve good service quality for an MCS application, incentive mechanisms are necessary to attract more user participation. Most existing mechanisms apply only for the offline scenario ...
Keywords: crowdsourcing, incentive mechanism design, online auction, mobile crowd sensing

2
April 2016 Pervasive and Mobile Computing: Volume 27 Issue C, April 2016
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 1

Mobile Cloud Computing (MCC) enables mobile devices to use resource providers other than mobile devices themselves to host the execution of mobile applications. Various mobile cloud architectures and scheduling algorithms have been studied recently. However, how to utilize MCC to enable mobile devices to run complex real-time applications while keeping ...
Keywords: Ad-hoc network, Offloading, Task scheduling, Mobile cloud computing

3
March 2016 NSDI'16: Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation
Publisher: USENIX Association
Bibliometrics:
Citation Count: 4

The introduction of wireless transmissions into the data center has been shown to be promising in improving the performance of data center networks (DCN) cost effectively. For high transmission flexibility and performance, a fundamental challenge is to increase the wireless availability and enable fully hybrid and seamless transmissions over both ...

4 published by ACM
September 2015 MobiCom '15: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 17,   Downloads (12 Months): 119,   Downloads (Overall): 341

Full text available: PDFPDF  ePubePub
Recently a number of systems have been developed to implement and improve the visual communication over screen-camera links. In this paper we study an opposite problem: how to prevent unauthorized users from videotaping a video played on a screen, such as in a theater, while do not affect the viewing ...
Keywords: image privacy, image copyright protection, screen-camera communication

5 published by ACM
September 2015 MobiCom '15: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 11,   Downloads (12 Months): 134,   Downloads (Overall): 323

Full text available: PDFPDF  ePubePub
Through-wall tracking has gained a lot of attentions in civilian applications recently. Many applications would benefit from such device-free tracking, e.g. elderly people surveillance, intruder detection, gaming, etc. In this work, we present a system, named Tadar, for tracking moving objects without instrumenting them us- ing COTS RFID readers and ...
Keywords: see-through walls, tadar, RFID, tracking

6
April 2015 Computer Communications: Volume 60 Issue C, April 2015
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 3

Opportunistic vehicular sensing is a new paradigm which exploits variety of sensors embedded in vehicles or smartphones to collect data ubiquitously for large-scale urban sensing. Existing work lacks in-depth investigations on the coverage problem in such sensing systems: (1) how to define and measure the coverage? (2) what is the ...
Keywords: Coverage, Urban sensing, Vehicular sensor networks, Opportunistic sensing

7 published by ACM
November 2014 SenSys '14: Proceedings of the 12th ACM Conference on Embedded Network Sensor Systems
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 9,   Downloads (12 Months): 69,   Downloads (Overall): 292

Full text available: PDFPDF
The ever increasing popularity of social networks and the ever easier photo taking and sharing experience have led to unprecedented concerns on privacy infringement. Inspired by the fact that the Robot Exclusion Protocol, which regulates web crawlers' behavior according a per-site deployed robots.txt, and cooperative practices of major search service ...
Keywords: QR-code, photo sharing, privacy protection

8 published by ACM
September 2014 MobiCom '14: Proceedings of the 20th annual international conference on Mobile computing and networking
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 37,   Downloads (Overall): 238

Full text available: PDFPDF
Locating objects labeled with RFID tags is an important issue which should be addressed in many applications, such as warehouse management, goods management in supermarket and finding of lost objects. Some existing works use large numbers of reference tags which involve lots of manpower to deploy them. Others achieve high ...
Keywords: antenna, tag, radiation pattern, rfid, localization

9 published by ACM
September 2014 MobiCom '14: Proceedings of the 20th annual international conference on Mobile computing and networking
Publisher: ACM
Bibliometrics:
Citation Count: 52
Downloads (6 Weeks): 37,   Downloads (12 Months): 308,   Downloads (Overall): 2,298

Full text available: PDFPDF  ePubePub
In many applications, we have to identify an object and then locate the object to within high precision (centimeter- or millimeter-level). Legacy systems that can provide such accuracy are either expensive or suffering from performance degradation resulting from various impacts, e.g. , occlusion for computer vision based approaches. In this ...
Keywords: dah, rfid, tagoram, tracking, localization

10 published by ACM
September 2014 MobiCom '14: Proceedings of the 20th annual international conference on Mobile computing and networking
Publisher: ACM
Bibliometrics:
Citation Count: 12
Downloads (6 Weeks): 11,   Downloads (12 Months): 101,   Downloads (Overall): 1,155

Full text available: PDFPDF  ePubePub
In this work, we explore a new networking mechanism with smart glasses, through which users can express their interest and connect to a target simply by a gaze. Doing this, we attempt to let wearable devices understand human attention and intention, and pair devices carried by users according to such ...
Keywords: attention driven networking, smart glasses, gaze tracking, device paring

11 published by ACM
September 2014 MobiCom '14: Proceedings of the 20th annual international conference on Mobile computing and networking
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 20,   Downloads (Overall): 251

Full text available: PDFPDF
In this demo, we propose a proof-of-concept networking system for smart glasses, through which users can express their interest and connect to a target simply by a gaze. Our system iGaze is a visual attention driven networking suite: an iGaze glass (hardware) and a networking protocol VAN (software). Our glass ...
Keywords: device paring, attention driven networking, smart glasses, gaze tracking

12 published by ACM
September 2014 MobiCom '14: Proceedings of the 20th annual international conference on Mobile computing and networking
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 48,   Downloads (Overall): 354

Full text available: PDFPDF
In many applications, we have to identify an object and then locate the object to within high precision (centimeter- or millimeter-level). Tracking mobile RFID tags in real time has been a daunting task, especially challenging for achieving high precision. We achieve these three goals by leveraging the phase value of ...
Keywords: rfid, tracking, localization

13
July 2014 IEEE Transactions on Parallel and Distributed Systems: Volume 25 Issue 7, July 2014
Publisher: IEEE Press
Bibliometrics:
Citation Count: 3

Wireless sensor networks (WSNs) consist of a large number of battery-powered wireless sensor nodes, and one key issue in WSNs is to reduce the energy consumption while maintaining the normal functions of WSNs. Data aggregation, as a typical operation in data gathering applications, can cause a lot of energy wastage ...

14
June 2014 IEEE Transactions on Computers: Volume 63 Issue 6, June 2014
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 3

A critical function of wireless sensor networks (WSNs) is data gathering. One is often only interested in collecting a specific function of the sensor measurements at a sink node, rather than downloading all the raw data from all the sensors. In this paper, we study the capacity of computing and ...

15
December 2013 IEEE/ACM Transactions on Networking (TON): Volume 21 Issue 6, December 2013
Publisher: IEEE Press
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 1,   Downloads (12 Months): 4,   Downloads (Overall): 147

Full text available: PDFPDF
Constructive interference-based flooding (CIBF) is a latency-optimal flooding protocol, which can realize millisecond network flooding latency and submicrosecond time synchronization accuracy, require no network state information, and be adapted to topology changes. However, constructive interference (CI) has a precondition to function, i.e., the maximum temporal displacement Δ of concurrent packet ...
Keywords: network flooding, concurrent transmissions, constructive interference (CI), topology control, wireless networks

16 published by ACM
October 2013 CRAB '13: Proceedings of the 1st ACM workshop on Cognitive radio architectures for broadband
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 6,   Downloads (12 Months): 17,   Downloads (Overall): 128

Full text available: PDFPDF
Understanding the asymptotic network capacity has been one of the heavily investigated research problems that are instrumental to network design and planning. The majority of the past efforts has been focusing on a single technology network without dynamic channel states and dynamic channel access. In this talk, we will discuss ...
Keywords: MIMO, capacity, coexistence, cognitive, wireless, physical layer, sensor networks

17 published by ACM
September 2013 MobiCom '13: Proceedings of the 19th annual international conference on Mobile computing & networking
Publisher: ACM
Bibliometrics:
Citation Count: 20
Downloads (6 Weeks): 9,   Downloads (12 Months): 173,   Downloads (Overall): 829

Full text available: PDFPDF
In this work, we present SilentSense, a framework to authenticate users silently and transparently by exploiting the user touch behavior biometrics and leveraging the integrated sensors to capture the micro-movement of the device caused by user's screen-touch actions. By tracking the fine-detailed touch actions of the user, we build a ...
Keywords: identification, mobile device, SilentSense

18 published by ACM
September 2013 MobiCom '13: Proceedings of the 19th annual international conference on Mobile computing & networking
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 4,   Downloads (12 Months): 78,   Downloads (Overall): 566

Full text available: PDFPDF
In this work, we address a critical task of detecting the user behavior of driving and texting simultaneously using smartphones. We propose, design, and implement TEXIVE which achieves the goal of distinguishing drivers and passengers, and detecting texting operations during driving utilizing irregularities and rich micro-movements of users. Without relying ...
Keywords: classification, smartphone, texive

19 published by ACM
September 2013 MobiCom '13: Proceedings of the 19th annual international conference on Mobile computing & networking
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 4,   Downloads (12 Months): 47,   Downloads (Overall): 537

Full text available: PDFPDF
We present SmartLoc , a localization system to estimate the location and the traveling distance by leveraging the lower-power inertial sensors embedded in smartphones as a supplementary to GPS. To minimize the negative impact of sensor noises, SmartLoc exploits the intermittent strong GPS signals and uses the linear regression to ...
Keywords: smartloc, localization, inertial sensor

20 published by ACM
July 2013 MobiHoc '13: Proceedings of the fourteenth ACM international symposium on Mobile ad hoc networking and computing
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 15,   Downloads (Overall): 242

Full text available: PDFPDF
Information propagation in delay tolerant networks (DTN) is difficult due to the lack of continues connectivity. Most of previous work put their focus on the information propagation in static network. In this work, we examine two closely related problems on information propagation in predicable DTN. In particular, we assume that ...
Keywords: temporal, DTN, propagation, submodular



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2017 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us