Author image not provided
 John C S Lui

Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article5.57
Citation Count39
Publication count7
Publication years2008-2017
Available for download2
Average downloads per article31.00
Downloads (cumulative)62
Downloads (12 Months)52
Downloads (6 Weeks)8
Arrow RightAuthor only

See all colleagues of this author


7 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 7 of 7
Sort by:

1 published by ACM
July 2017 ASONAM '17: Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017
Publisher: ACM
Citation Count: 0
Downloads (6 Weeks): 6,   Downloads (12 Months): 41,   Downloads (Overall): 41

Full text available: PDFPDF
Counting small connected subgraph patterns called graphlets is emerging as a powerful tool for exploring topological structure of networks and for analysis of roles of individual nodes. Graphlets have numerous applications ranging from biology to network science. Computing graphlet counts for "dynamic graphs" is highly challenging due to the streaming ...

August 2016 IEEE/ACM Transactions on Networking (TON): Volume 24 Issue 4, August 2016
Publisher: IEEE Press
Citation Count: 0
Downloads (6 Weeks): 2,   Downloads (12 Months): 11,   Downloads (Overall): 21

Full text available: PDFPDF
In this paper, we propose a highly efficient scheme, SLICE a scalable and low stretch routing scheme, enabling greedy routing for wireless sensor networks WSNs deployed in complex-connected 3-D settings, whose topologies are often theoretically modeled as high genus 3-D WSNs. Compared to previous 3-D greedy embedding techniques, SLICE improves ...

April 2016 IEEE Transactions on Computers: Volume 65 Issue 4, April 2016
Publisher: IEEE Computer Society
Citation Count: 4

Solid-state drives (SSDs) have been widely deployed in desktops and data centers. However, SSDs suffer from bit errors, and the bit error rate is time dependent since it increases as an SSD wears down. Traditional storage systems mainly use parity-based RAID to provide reliability guarantees by striping redundancy across multiple ...

January 2015 Journal of Network and Computer Applications: Volume 47 Issue C, January 2015
Publisher: Academic Press Ltd.
Citation Count: 0

As the hidden backbone of today's Internet, the Domain Name System (DNS) provides name resolution service for almost every networked application. To exploit the rich DNS query information for traffic engineering or user behavior analysis, both passive capturing and active probing techniques have been proposed in recent years. Despite its ...
Keywords: DNS query characteristics, Active probing, DNS

November 2012 IEEE Transactions on Dependable and Secure Computing: Volume 9 Issue 6, November 2012
Publisher: IEEE Computer Society Press
Citation Count: 23

We can now outsource data backups off-site to third-party cloud storage services so as to reduce data management costs. However, we must provide security guarantees for the outsourced data, which is now maintained by third parties. We design and implement FADE, a secure overlay cloud storage system that achieves fine-grained, ...
Keywords: Cloud computing,Access control,Encryption,Secure storage,Peer to peer computing,cloud storage,Access control,assured deletion,backup/recovery

September 2011 ICPPW '11: Proceedings of the 2011 40th International Conference on Parallel Processing Workshops
Publisher: IEEE Computer Society
Citation Count: 9

Cloud storage is an emerging service model that enables individuals and enterprises to outsource the storage of data backups to remote cloud providers at a low cost. However, cloud clients must enforce security guarantees of their outsourced data backups. We present Fade Version, a secure cloud backup system that serves ...

September 2008 IEEE Journal on Selected Areas in Communications: Volume 26 Issue 7, September 2008
Publisher: IEEE Press
Citation Count: 2

In this work, we seek to understand the interaction between different tiers of ISPs. The lower tier ISPs can transmit traffic to each other, either by purchasing the service from higher tier ISPs, or by setting "private peering links" between themselves. Higher tier ISPs cannot charge the transit service at ...
Keywords: competition, ISP interaction, peering, pricing

The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us