Author image not provided
 Yin Zhang

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article25.87
Citation Count2,354
Publication count91
Publication years1990-2014
Available for download55
Average downloads per article676.49
Downloads (cumulative)37,207
Downloads (12 Months)1,134
Downloads (6 Weeks)201
SEARCH
ROLE
Arrow RightAuthor only
· Advisor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


80 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 80
Result page: 1 2 3 4 5

Sort by:

1 published by ACM
August 2012 SIGCOMM '12: Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication
Publisher: ACM
Bibliometrics:
Citation Count: 25
Downloads (6 Weeks): 3,   Downloads (12 Months): 41,   Downloads (Overall): 545

Full text available: PDFPDF
Advertising plays a vital role in supporting free websites and smartphone apps. Click-spam, i.e., fraudulent or invalid clicks on online ads where the user has no actual interest in the advertiser's site, results in advertising revenue being misappropriated by click-spammers. While ad networks take active measures to block click-spam today, ...
Keywords: advertising fraud, click fraud, click-spam, invalid clicks, traffic quality

2 published by ACM
June 2012 SIGMETRICS '12: Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 4,   Downloads (12 Months): 14,   Downloads (Overall): 401

Full text available: PDFPDF
The explosive growth of social networks has created numerous exciting research opportunities. A central concept in the analysis of social networks is a proximity measure, which captures the closeness or similarity between nodes in the network. Despite much research on proximity measures, there is a lack of techniques to efficiently ...
Keywords: missing link inference, social network, proximity estimation, graph clustering, link prediction, graph embedding
Also published in:
June 2012  ACM SIGMETRICS Performance Evaluation Review - Performance evaluation review: Volume 40 Issue 1, June 2012

3 published by ACM
December 2011 CoNEXT '11: Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies
Publisher: ACM
Bibliometrics:
Citation Count: 12
Downloads (6 Weeks): 3,   Downloads (12 Months): 15,   Downloads (Overall): 138

Full text available: PDFPDF
Service quality in operational IP networks can be impacted due to planned or unplanned maintenance. During any maintenance activity, the responsibility of the operations team is to complete the work order and perform a check-up to ensure there are no unexpected service disruptions. Once the maintenance is complete, it is ...
Keywords: robust change detection, service performance

4 published by ACM
November 2011 IMC '11: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Publisher: ACM
Bibliometrics:
Citation Count: 13
Downloads (6 Weeks): 1,   Downloads (12 Months): 9,   Downloads (Overall): 205

Full text available: PDFPDF
In large-scale IPTV systems, it is essential to maintain high service quality while providing a wider variety of service features than typical traditional TV. Thus service quality assessment systems are of paramount importance as they monitor the user-perceived service quality and alert when issues occurs. For IPTV systems, however, there ...
Keywords: IPTV, QoE, analysis, assessment, quality, service, video

5 published by ACM
September 2011 MobiCom '11: Proceedings of the 17th annual international conference on Mobile computing and networking
Publisher: ACM
Bibliometrics:
Citation Count: 18
Downloads (6 Weeks): 1,   Downloads (12 Months): 12,   Downloads (Overall): 860

Full text available: PDFPDF
Efficiently sharing spectrum among multiple users is critical to wireless network performance. In this paper, we propose a novel spectrum sharing protocol called Collision-Resistant Multiple Access (CRMA) to achieve high efficiency. In CRMA, each transmitter views the OFDM physical layer as multiple orthogonal but sharable channels, and independently selects a ...
Keywords: CDMA, CSMA, OFDM, collision decoding, mac protocol

6 published by ACM
August 2011 HomeNets '11: Proceedings of the 2nd ACM SIGCOMM workshop on Home networks
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2,   Downloads (12 Months): 5,   Downloads (Overall): 119

Full text available: PDFPDF
Recent advances in residential broadband access technologies have led to a wave of commercial IPTV deployments. As IPTV services are rolled out at scale, it is essential for IPTV systems to maintain ultra-high reliability and performance. A major issue that disrupts IPTV service is the crash of the set-top box ...
Keywords: analysis, crash, home networks, iptv, set-top box, video

7 published by ACM
June 2011 SIGMETRICS '11: Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 0,   Downloads (12 Months): 4,   Downloads (Overall): 353

Full text available: PDFPDF
Opportunistic routing aims to improve wireless performance by exploiting communication opportunities arising by chance. A key challenge in opportunistic routing is how to achieve good, predictable performance despite the incidental nature of such communication opportunities and the complicated effects of wireless interference in IEEE 802.11 networks. To address the challenge, ...
Keywords: model-driven optimization, opportunistic routing, wireless interference, wireless mesh networks, wireless network model

8 published by ACM
June 2011 ACM SIGMETRICS Performance Evaluation Review - Performance evaluation review: Volume 39 Issue 1, June 2011
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 2,   Downloads (Overall): 132

Full text available: PDFPDF
Opportunistic routing aims to improve wireless performance by exploiting communication opportunities arising by chance. A key challenge in opportunistic routing is how to achieve good, predictable performance despite the incidental nature of such communication opportunities and the complicated effects of wireless interference in IEEE 802.11 networks. To address the challenge, ...
Keywords: model-driven optimization, opportunistic routing, wireless interference, wireless mesh networks, wireless network model

9 published by ACM
November 2010 Co-NEXT '10: Proceedings of the 6th International COnference
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 1,   Downloads (12 Months): 6,   Downloads (Overall): 209

Full text available: PDFPDF
We present VCD, a novel system for enabling high-bandwidth content distribution in vehicular networks. In VCD, a vehicle opportunistically communicates with nearby access points (APs) to download the content of interest. To fully take advantage of such transient contact with APs, we proactively push content to the APs that the ...

10 published by ACM
September 2010 MobiCom '10: Proceedings of the sixteenth annual international conference on Mobile computing and networking
Publisher: ACM
Bibliometrics:
Citation Count: 21
Downloads (6 Weeks): 1,   Downloads (12 Months): 10,   Downloads (Overall): 788

Full text available: PDFPDF
Localization is a fundamental operation for many wireless networks. While GPS is widely used for location determination, it is unavailable in many environments either due to its high cost or the lack of line of sight to the satellites ( e.g ., indoors, under the ground, or in a downtown ...
Keywords: localization, low-rank structure, mobility, temporal stability

11 published by ACM
August 2010 SIGCOMM '10: Proceedings of the ACM SIGCOMM 2010 conference
Publisher: ACM
Bibliometrics:
Citation Count: 14
Downloads (6 Weeks): 10,   Downloads (12 Months): 26,   Downloads (Overall): 487

Full text available: PDFPDF
Network resiliency is crucial to IP network operations. Existing techniques to recover from one or a series of failures do not offer performance predictability and may cause serious congestion. In this paper, we propose Resilient Routing Reconfiguration (R3), a novel routing protection scheme that is (i) provably congestion-free under a ...
Keywords: network resiliency, routing, routing protection
Also published in:
August 2010  ACM SIGCOMM Computer Communication Review - SIGCOMM '10: Volume 40 Issue 4, October 2010

12 published by ACM
August 2010 SIGCOMM '10: Proceedings of the ACM SIGCOMM 2010 conference
Publisher: ACM
Bibliometrics:
Citation Count: 18
Downloads (6 Weeks): 3,   Downloads (12 Months): 28,   Downloads (Overall): 600

Full text available: PDFPDF
Networks continue to change to support new applications, improve reliability and performance and reduce the operational cost. The changes are made to the network in the form of upgrades such as software or hardware upgrades, new network or service features and network configuration changes. It is crucial to monitor the ...
Keywords: change detection, network upgrades, performance impact, statistical data mining
Also published in:
August 2010  ACM SIGCOMM Computer Communication Review - SIGCOMM '10: Volume 40 Issue 4, October 2010

13 published by ACM
November 2009 IMC '09: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement
Publisher: ACM
Bibliometrics:
Citation Count: 29
Downloads (6 Weeks): 7,   Downloads (12 Months): 47,   Downloads (Overall): 1,228

Full text available: PDFPDF
Proximity measures quantify the closeness or similarity between nodes in a social network and form the basis of a range of applications in social sciences, business, information technology, computer networks, and cyber security. It is challenging to estimate proximity measures in online social networks due to their massive scale (with ...
Keywords: embedding, link prediction, proximity measure, sketch, matrix factorization, social network

14 published by ACM
August 2009 SIGCOMM '09: Proceedings of the ACM SIGCOMM 2009 conference on Data communication
Publisher: ACM
Bibliometrics:
Citation Count: 40
Downloads (6 Weeks): 5,   Downloads (12 Months): 48,   Downloads (Overall): 874

Full text available: PDFPDF
IPTV is increasingly being deployed and offered as a commercial service to residential broadband customers. Compared with traditional ISP networks, an IPTV distribution network (i) typically adopts a hierarchical instead of mesh-like structure, (ii) imposes more stringent requirements on both reliability and performance, (iii) has different distribution protocols (which make ...
Keywords: network diagnosis, IPTV
Also published in:
August 2009  ACM SIGCOMM Computer Communication Review - SIGCOMM '09: Volume 39 Issue 4, October 2009

15 published by ACM
August 2009 SIGCOMM '09: Proceedings of the ACM SIGCOMM 2009 conference on Data communication
Publisher: ACM
Bibliometrics:
Citation Count: 61
Downloads (6 Weeks): 21,   Downloads (12 Months): 112,   Downloads (Overall): 1,473

Full text available: PDFPDF
Many basic network engineering tasks (e.g., traffic engineering, capacity planning, anomaly detection) rely heavily on the availability and accuracy of traffic matrices. However, in practice it is challenging to reliably measure traffic matrices. Missing values are common. This observation brings us into the realm of compressive sensing, a generic technique ...
Keywords: traffic matrix, compressive sensing, tomography, interpolation, prediction, anomaly detection
Also published in:
August 2009  ACM SIGCOMM Computer Communication Review - SIGCOMM '09: Volume 39 Issue 4, October 2009

16
March 2009 ICDE '09: Proceedings of the 2009 IEEE International Conference on Data Engineering
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 4

We present SMART, a self-tuning, bandwidth-aware monitoring system that maximizes result precision of continuous aggregate queries over dynamic data streams. While prior approaches minimize bandwidth cost under fixed precision constraints, they may still overload a monitoring system during traffic bursts. To facilitate practical deployment of monitoring systems, SMART therefore bounds ...
Keywords: Data streams, self-tuning monitoring, bandwidth-aware, query precision, DHTs, arithmetic filtering, temporal batching, arithmetic imprecision, temporal imprecision

17
February 2009 IEEE/ACM Transactions on Networking (TON): Volume 17 Issue 1, February 2009
Publisher: IEEE Press
Bibliometrics:
Citation Count: 7
Downloads (6 Weeks): 1,   Downloads (12 Months): 6,   Downloads (Overall): 309

Full text available: PDFPDF
In this paper, we present NetQuest, a flexible framework for large-scale network measurement. We apply Bayesian experimental design to select active measurements that maximize the amount of information we gain about the network path properties subject to given resource constraints. We then apply network inference techniques to reconstruct the properties ...
Keywords: Bayesian experimental design, network tomography, network measurement, network inference

18 published by ACM
December 2008 CoNEXT '08: Proceedings of the 2008 ACM CoNEXT Conference
Publisher: ACM
Bibliometrics:
Citation Count: 21
Downloads (6 Weeks): 2,   Downloads (12 Months): 13,   Downloads (Overall): 379

Full text available: PDFPDF
Chronic network conditions are caused by performance impairing events that occur intermittently over an extended period of time. Such conditions can cause repeated performance degradation to customers, and sometimes can even turn into serious hard failures. It is therefore critical to troubleshoot and repair chronic network conditions in a timely ...
Keywords: chronic condition, correlation, network troubleshooting

19
December 2008 OSDI'08: Proceedings of the 8th USENIX conference on Operating systems design and implementation
Publisher: USENIX Association
Bibliometrics:
Citation Count: 17

This paper introduces a new consistency metric, Network Imprecision (NI), to address a central challenge in largescale monitoring systems: safeguarding accuracy despite node and network failures. To implement NI, an overlay that monitors a set of attributes also monitors its own state so that queries return not only attribute values ...

20
November 2008 International Journal of Bioinformatics Research and Applications: Volume 4 Issue 4, November 2008
Publisher: Inderscience Publishers
Bibliometrics:
Citation Count: 0

The double digestion problem for DNA restriction mapping has been proved to be NP-complete and intractable if the numbers of the DNA fragments become large. Several approaches to the problem have been tested and proved to be effective only for small problems. In this paper, we formulate the problem as ...
Keywords: MILP, bioinformatics, DNA restriction mapping, mixed integer linear programming, double digestion problem, genomic sequencing



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2019 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us