SDCoR: software defined cognitive routing for internet of vehicles

C Wang, L Zhang, Z Li, C Jiang - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
The Internet of Vehicles (IoV) is a subapplication of the Internet of Things in the automotive
field. Large amounts of sensor data require to be transferred in real-time. Most of the routing …

Motion-Fi: Recognizing and counting repetitive motions with passive wireless backscattering

N Xiao, P Yang, Y Yan, H Zhou… - IEEE INFOCOM 2018 …, 2018 - ieeexplore.ieee.org
Recently several ground-breaking RF-based motion-recognition systems were proposed to
detect and/or recognize macro/micro human movements. These systems often suffer from …

An online learning approach to network application optimization with guarantee

K Cai, X Liu, YZJ Chen, JCS Lui - IEEE INFOCOM 2018-IEEE …, 2018 - ieeexplore.ieee.org
Network application optimization is essential for improving the performance of the
application as well as its user experience. The network application parameters are crucial in …

Learning with guarantee via constrained multi-armed bandit: Theory and network applications

K Cai, X Liu, YZJ Chen, JCS Lui - IEEE Transactions on Mobile …, 2022 - ieeexplore.ieee.org
There have been studies that consider optimizing network applications in an online learning
context using multi-armed bandit models. However, existing frameworks are problematic as …

Socially-optimal mechanism design for incentivized online learning

Z Wang, L Gao, J Huang - IEEE INFOCOM 2022-IEEE …, 2022 - ieeexplore.ieee.org
Multi-arm bandit (MAB) is a classic online learning framework that studies the sequential
decision-making in an uncertain environment. The MAB framework, however, overlooks the …

On improving wireless channel utilization: A collision tolerance-based approach

X Ji, Y He, J Wang, K Wu, D Liu, K Yi… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Packet corruption caused by collision is a critical problem that hurts the performance of
wireless networks. Conventional medium access control (MAC) protocols resort to collision …

Efficient algorithms for multi-armed bandits with additional feedbacks: Modeling and algorithms

H Xie, H Gu, Z Qi - Information Sciences, 2023 - Elsevier
Multi-armed bandits (MAB) are widely applied to optimize networking applications such as
crowdsensing and mobile edge computing. Additional feedbacks (or partial feedbacks) on …

Reinforcement learning techniques for outer loop link adaptation in 4G/5G systems

SK Pulliyakode, S Kalyani - arXiv preprint arXiv:1708.00994, 2017 - arxiv.org
Wireless systems perform rate adaptation to transmit at highest possible instantaneous
rates. Rate adaptation has been increasingly granular over generations of wireless systems …

Motion-Fi: Recognizing and Counting Repetitive Motions With Wireless Backscattering

N Xiao, P Yang, Y Yan, H Zhou, XY Li… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Driven by a wide range of real-world applications, several ground-breaking RF-based
motion-recognition systems were proposed to detect and/or recognize macro/micro human …

Minimizing File Transfer Time in Opportunistic Spectrum Access Model

J Hu, V Doshi - IEEE Transactions on Mobile Computing, 2022 - ieeexplore.ieee.org
We study the file transfer problem in opportunistic spectrum access (OSA) model, which has
been widely studied in throughput-oriented applications for max-throughput strategies and …