Huawei Huang

Huawei Huang
Sun Yat-Sen University | SYSU · School of Software Engineering

PhD.
Associate Professor, Sun Yat-Sen University

About

138
Publications
91,795
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,725
Citations
Introduction
Huawei Huang earned his Ph.D. in Computer Science and Engineering from the University of Aizu, Japan. He is currently an Associate Professor at Sun Yat-Sen University, China. His research interests include Blockchains, Web3, and Metaverse Computing. He has served as a research fellow of JSPS, a visiting scholar with Hong Kong Polytechnic University, and a program-specific Assistant Professor with Kyoto University. He is a senior member of IEEE. Lab page: http://xintelligence.pro
Additional affiliations
April 2018 - March 2019
Kyoto University
Position
  • Program-specific Assistant Professor
May 2017 - March 2018
The Hong Kong Polytechnic University
Position
  • Researcher
October 2016 - March 2018
The University of Aizu
Position
  • PostDoc Position
Description
  • I have served a JSPS Post-Doctoral Research Fellow, on the JSPS-sponsored project titled "Joint Optimization of Routing and Protection for Software-Defined Networking". URL: https://kaken.nii.ac.jp/grant/KAKENHI-PROJECT-16J07062/

Publications

Publications (138)
Conference Paper
Full-text available
State-of-the-art blockchain sharding solutions, say Monoxide, can induce imbalanced transaction (TX) distributions among all blockchain shards due to their account deployment mechanisms. Imbalanced TX distributions can then cause hot shards, in which the cross-shard TXs may experience an unlimited length of confirmation latency. Thus, how to addres...
Article
Full-text available
This paper studies the PBFT-based sharded permissioned blockchain, which executes in either a local datacenter or a rented cloud platform. In such permissioned blockchain, the transaction (TX) assignment strategy could be malicious such that the network shards may possibly receive imbalanced transactions or even bursty-TX injection attacks. An imba...
Article
Full-text available
In a sharded blockchain, transactions are processed by a number of parallel committees. Thus, the transaction throughput can be largely boosted. A problem is that some groups of blockchain nodes consume large latency to form committees at the beginning of each epoch. Moreover, the heterogeneous processing capabilities of different committees also r...
Conference Paper
Full-text available
Sharding is one of the most promising techniques for improving blockchain scalability. In blockchain state sharding, account migration across shards is crucial to the low ratio of cross-shard transactions and cross-shard workload balance. Through reviewing state-of-the-art protocols proposed to reconfigure blockchain shards via account shuffling, w...
Conference Paper
Full-text available
Cross-shard Transactions (CTXs) widely exist in sharded blockchains. CTXs have to endure large confirmation latency because they need to participate in consensus in both their source and destination shards. To diminish CTXs, plenty of state-of-the-art blockchain protocols have been proposed. For example, in BrokerChain [1], some intermediary broker...
Article
Full-text available
As Metaverse emerges as the next-generation Internet paradigm, the ability to efficiently generate content is paramount. AI-Generated Content (AIGC) emerges as a key solution, yet the resource-intensive nature of large Generative AI (GAI) models presents challenges. To address this issue, we introduce an AIGC-as-a-Service (AaaS) architecture, which...
Article
Full-text available
Federated Learning (FL), as a promising distributed learning paradigm, is proposed to solve the contradiction between the data hunger of modern machine learning and the increasingly stringent need for data privacy. However, clients naturally present different distributions of their local data and inconsistent local optima, which leads to poor model...
Article
With the popularity of the mobile Internet, data is increasingly becoming a new resource. Therefore, the trading of such data resources has become an increasing demand. In this paper, we propose a fair privacy-preserving data trading protocol based on blockchain. Firstly, our data trading protocol achieves fairness by carefully combining the probab...
Article
WiFi-based human activity recognition has gained ever-growing attention in the field of wireless sensor networks. As a promising technology, it has large application potential for smart homes and elderly activity monitoring. ExistingWiFi-based activity recognition methods mainly exploit two-dimensional convolutional neural networks, which focus on...
Conference Paper
Full-text available
A number of promising blockchain scalability technologies such as Rollups, facilitate the fast and cost-effective asset transfer by offloading transactions from a mainchain to sidechains. The proposed broker-based decentralized application (dApp) in this paper, named BrokerFi, also employs a sidechain approach that works as a Layer2 solution on top...
Preprint
Full-text available
p>As Metaverse emerges as the next-generation Internet paradigm, the ability to efficiently generate content is paramount. AIGenerated Content (AIGC) emerges as a key solution, yet the resourceintensive nature of large Generative AI (GAI) models presents challenges. To address this issue, we introduce an AIGC-as-a-Service (AaaS) architecture, which...
Article
Full-text available
The internet of things, privacy, and technical constraints increase the demand for edge-based data-driven services, which is one of the major goals of Industry 4.0 and Society 5.0. Big data analysis (BDA) is the preferred approach to unleash hidden knowledge. However, BDA consumes excessive resources and time. These limitations hamper the meaningfu...
Chapter
Consensus is unnecessary when the truth is available. In this paper, we present a new perspective of rebuilding the blockchain without consensus. When the consensus phase is eliminated from a blockchain, transactions could be canonized quickly using a well-defined universal rule without consuming hashing power. Thus, the transactions per second (TP...
Article
Full-text available
Economic systems play pivotal roles in the metaverse. However, we have not yet found an overview that systematically introduces economic systems for the metaverse. Therefore, we review the state-of-the-art solutions, architectures, and systems related to economic systems. When investigating those state-of-the-art studies, we keep two questions in m...
Article
Various metaverse applications have entered our daily life and show a promising trend that will occupy people's attention in the era of Web3. This makes interoperability across metaverses become one of the fundamental technologies in the context of multiple metaverse platforms. The aim of interoperability is to provide a seamless service for users...
Chapter
In this chapter, we summarize the implication of Web3 & metaverse. In the first section, we discuss how Web3 enables other fields. Specifically, we show our understanding of the correlations among the concepts of Web3, blockchain, DAO, NFT, and metaverse. In the next section, we then summarize how to participate in metaverse from the perspective of...
Chapter
This chapter briefly explains metaverse, Web3, and their relationship. To better understand Web3 and metaverse, we introduce some crucial concepts, such as blockchains, smart contracts, digital assets and tokens, decentralized applications, and DID. Finally, we also discuss the typical applications related to Web3 and metaverse such as games, virtu...
Chapter
Metaverse as the latest buzzword has attracted great attention from both industry and academia. Metaverse seamlessly integrates the real world with the virtual world and allows avatars to carry out rich activities including creation, display, entertainment, social networking, and trading. Thus, it is promising to build an exciting digital world and...
Chapter
Economic systems play pivotal roles in the metaverse. However, we have not yet found an overview that systematically introduces economic systems for the metaverse. Therefore, we review the state-of-the-art solutions, architectures, and systems related to economic systems. When investigating those state-of-the-art studies, we keep two questions in o...
Article
Full-text available
The metaverse, a virtual world closely intertwined with reality, represents the next-generation form of the Internet and encompasses advanced sociability and interaction. With the rapid growth of users and virtual products within this environment, the importance of recommendation systems becomes paramount. This article presents a comprehensive surv...
Conference Paper
Full-text available
Sharding is one of the most promising techniques that can improve the scalability and storage issues of blockchain systems. In the past few years, many sharding protocols have been proposed to contribute to the technique matrix of blockchain sharding such as the coordination mechanisms of blockchain shards, the handling of cross-shard transactions,...
Chapter
The concept of metaverse has sparked widespread attention from the public to major industries. With the rapid development of blockchain and Web3 technologies, the decentralized metaverse ecosystem has attracted a large influx of users and capital. Due to the absence of industry standards and regulatory rules, the Web3-empowered metaverse ecosystem...
Chapter
Full-text available
This chapter briefly explains metaverse, Web3, and their relationship. To better understand Web3 and metaverse, we introduce some crucial concepts, such as blockchains, smart contracts, digital assets and tokens, decentralized applications, and DID. Finally, we also discuss the typical applications related to Web3 and metaverse such as games, virtu...
Chapter
Full-text available
Web3 has attracted a considerable amount of attention due to its unique decentralized characteristics. The digital economy is a driver of high-quality economic development and is currently in a rapid development stage. In digital economy scenarios, the centralized nature of the Internet and other characteristics usually bring about security issues...
Chapter
Economic systems play pivotal roles in the metaverse. However, we have not yet found an overview that systematically introduces economic systems for the metaverse. Therefore, we review the state-of-the-art solutions, architectures, and systems related to economic systems. When investigating those state-of-the-art studies, we keep two questions in o...
Chapter
Constructing globally distributed file systems (DFS) has received great attention. Traditional peer-to-peer (P2P) distributed file systems have inevitable drawbacks such as instability and lacking auditing and incentive mechanisms. Thus, Inter-Planetary File Systems (IPFS) and Swarm, as the representative DFSs which integrate with blockchain techno...
Chapter
This chapter introduces how to organize Web3 participants, which include Web3 educators, investors, developers, and other users who are interested in Web3. Decentralized autonomous organizations (DAOs) are believed to play a significant role in our future Web3-featured society governed in a decentralized way. In this chapter, we first explain the d...
Article
Blockchain databases have attracted widespread attention but suffer from poor scalability due to underlying non-scalable blockchains. While blockchain sharding is necessary for a scalable blockchain database, it poses a new challenge named on-chain cross-shard database services. Each cross-shard database service (e.g., cross-shard queries or inter-...
Article
Full-text available
Previous state-of-the-art studies have proposed various analytical models to understand the double-spending attacks (DSA) occurred in Proof-of-Work (PoW) based Blockchains. Although many insights behind the double-spending attacks have been disclosed, we still believe that advanced versions of DSA can be developed to create new threats for PoW-base...
Preprint
Many applications, e.g., digital twins, rely on sensing data from Internet of Things (IoT) networks, which is used to infer event(s) and initiate actions to affect an environment. This gives rise to concerns relating to data integrity and provenance. One possible solution to address these concerns is to employ blockchain. However, blockchain has hi...
Preprint
Full-text available
As Metaverse emerges as the next-generation Internet paradigm, the ability to efficiently generate content is paramount. AI-Generated Content (AIGC) offers a promising solution to this challenge. However, the training and deployment of large AI models necessitate significant resources. To address this issue, we introduce an AIGC-as-a-Service (AaaS)...
Chapter
In the fifth-generation (5G) networks and the beyond, communication latency and network bandwidth will be no more bottleneck to mobile users. Thus, almost every mobile device can participate in the distributed learning. That is, the availability issue of distributed learning can be eliminated. However, the model safety will become a challenge. This...
Chapter
Blockchains have been deeply diving into multiple applications, such as blockchain-assisted Internet of Things (IoT), business applications, security-enabled solutions, and many other applications in diverse fields. However, we think that a comprehensive survey towards the essentials of blockchains by exploiting the state-of-the-art theoretical mod...
Chapter
This chapter studies the PBFT-based sharded permissioned blockchain, which executes in either a local datacenter or a rented cloud platform. In such permissioned blockchain, the transaction (TX) assignment strategy could be malicious such that the network shards may possibly receive imbalanced transactions or even bursty-TX injection attacks. An im...
Chapter
Blockchain-based decentralized cryptocurrencies have drawn much attention and been widely-deployed in recent years. Bitcoin, the first application of blockchain, achieves great success and promotes more development in this field. However, Bitcoin encounters performance problems of low throughput and high transaction latency. Other cryptocurrencies...
Preprint
Full-text available
With the rapid evolution of metaverse technologies, numerous metaverse applications have arisen for various purposes and scenarios. This makes interoperability across meta-verses becomes one of the fundamental technology enablers in the metaverse space. The aim of interoperability is to provide a seamless experience for users to interact with metav...
Article
Full-text available
At present, the concept of metaverse has sparked widespread attention from the public to major industries. With the rapid development of blockchain and Web3 technologies, the decentralized metaverse ecology has attracted a large influx of users and capital. Due to the lack of industry standards and regulatory rules, the Web3-empowered metaverse eco...
Preprint
Full-text available
At present, the concept of metaverse has sparked widespread attention from the public to major industries. With the rapid development of blockchain and Web3 technologies, the decentralized metaverse ecology has attracted a large influx of users and capital. Due to the lack of industry standards and regulatory rules, the Web3-empowered metaverse eco...
Preprint
Full-text available
Economic systems play pivotal roles in the metaverse. However, we have not yet found an overview that systematically introduces economic systems for the metaverse. Therefore, we review the state-of-the-art solutions, architectures, and systems related to economic systems. When investigating those state-of-the-art studies, we keep two questions in o...
Preprint
Full-text available
Blockchain technology is becoming the cornerstone for the development and deployment of other technologies like Federated Learning (FL) and Internet of Things (IoT), as it plays a critical role in data sharing and incentives. Blockchains supports decentralization, data-privacy protection, security, and reliability. Assuring secure data sharing in m...
Chapter
As the foundation of a blockchain, consensus algorithm significantly affects the blockchain system’s performance. To a consortium blockchain, Practical Byzantine Fault Tolerance (PBFT) has been widely believed as a good candidate consensus due to its many advantages. However, PBFT is not particularly designed for a consortium blockchain. Thus, ther...
Preprint
Full-text available
With the continuous development of web technology, Web3.0 has attracted a considerable amount of attention due to its unique decentralized characteristics. The digital economy is an important driver of high-quality economic development and is currently in a rapid development stage. In the digital economy scenario, the centralized nature of the Inte...
Conference Paper
Full-text available
Sharding technique is viewed as the most promising solution to improving blockchain scalability. However, to implement a sharded blockchain, developers have to address two major challenges. The first challenge is that the ratio of cross-shard transactions (TXs) across blockchain shards is very high. This issue significantly degrades the throughput...
Article
Full-text available
Internet of Drones (IoD) is a critical paradigm of future networks used for complex cooperative tasks. Due to its heterogeneity, high mobility, and exposed connectivity, it inevitably suffers from the crucial security threats of nodes failure, malicious tampering, and anonymous attacks. Specifically, federated transfer learning (FTL) and blockchain...
Preprint
Full-text available
Consensus is unnecessary when the truth is available. In this paper, we present a new perspective on rebuilding the blockchain without consensus. When the consensus phase is eliminated from a blockchain, transactions could be canonized quickly using a well-defined universal rule without consuming hashing power. Thus, the transactions per second (TP...
Conference Paper
Full-text available
Federated Learning (FL) suffers from Low-quality model training in mobile edge computing, due to the dynamic environment of mobile clients. To the best of our knowledge, most FL frameworks follow the \textit{reactive} client scheduling, in which the FL parameter server selects participants according to the currently-observed state of clients. Thus,...
Preprint
Full-text available
(Please download the latest version of this survey article from arXiv: https://arxiv.org/abs/2201.03201 ) As the latest buzzword, Metaverse has attracted great attention from both industry and academia. Metaverse seamlessly integrates the real world with the virtual world and allows avatars to carry out rich activities including creation, display,...
Article
Full-text available
As the latest buzzword, Metaverse has attracted great attention from both industry and academia. Metaverse seamlessly integrates the real world with the virtual world and allows avatars to carry out rich activities including creation, display, entertainment, social networking, and trading. Thus, it is promising to build an exciting digital world an...
Article
Full-text available
With the continuous development of web technology, Web 3.0 has attracted a considerable amount of attention due to its unique decentralized characteristics. The digital economy is an important driver of high-quality economic development and is currently in a rapid development stage. In the digital economy scenario, the centralized nature of the Int...
Article
Federated Learning (FL) is believed as a promising manner of distributed machine learning for 5G and future 6G networks in the context of mobile edge computing (MEC). From the worker’s viewpoint, a problem is that no incentive drives them to participate in FL. Thus, different from the conventional server-centric model allocation methods, we study t...
Conference Paper
Full-text available
In a large-scale sharded blockchain, transactions are processed by a number of parallel committees collaboratively. Thus, the blockchain throughput can be strongly boosted. A problem is that some groups of blockchain nodes consume large latency to form committees at the beginning of each epoch. Furthermore, the heterogeneous processing capabilities...
Conference Paper
Full-text available
Bitcoin is currently the cryptocurrency with the largest market share. Many previous studies have explored the security of Bitcoin from the perspective of blockchain mining. Especially on the double-spending attacks (DSA), some state-of-the-art studies have proposed various analytical models, aiming to understand the insights behind the double-spen...
Article
Full-text available
Decentralized Autonomous Organization (DAO) is believed to play a significant role in our future society governed in a decentralized way. In this article, we first explain the definitions and preliminaries of DAO. Then, we conduct a literature review of the existing studies of DAO published in the recent few years. Through the literature review, we...
Article
As the first decentralized peer-to-peer (P2P) cryptocurrency system allowing people to trade with pseudonymous addresses, Bitcoin has become increasingly popular in recent years. However, the P2P and pseudonymous nature of Bitcoin make transactions on this platform very difficult to track, thus triggering the emergence of various illegal activities...
Article
Full-text available
To draw a roadmap of current research activities of the blockchain community, we first conduct a brief overview of state-of-the-art blockchain surveys published in the recent 5 years. We found that those surveys are basically studying the blockchain-based applications, such as blockchain-assisted Internet of Things (IoT), business applications, sec...
Preprint
Full-text available
Decentralized Autonomous Organization (DAO) is believed to play a significant role in our future society governed in a decentralized way. In this article, we first explain the definitions and preliminaries of DAO. Then, we conduct a literature review of the existing studies of DAO published in the recent few years. Through the literature review, we...
Article
Full-text available
With the advancements of wireless network transmission technology, 2D video is hard to satisfy people's requirement for multimedia. Therefore, the high-definition 3D video that can bring a whole new viewing experience is starting to enter people's vision. However, when a tremendously large number of users play 3D video, it puts enormous computation...
Chapter
Federated Learning (FL) advocates training a global model using a large-scale of distributed devices such that the collaborative model training can be benefited from the rich local datasets, while preserving the privacy of local training dataset in each participant. This is because only the training results, i.e., the updated model parameters and m...
Article
Full-text available
in fifth-generation (5G) networks and beyond, communication latency and network bandwidth will be no longer be bottlenecks to mobile users. Thus, almost every mobile device can participate in distributed learning. That is, the availability issue of distributed learning can be eliminated. However, model safety will become a challenge. This is becaus...
Conference Paper
Full-text available
Network Function Virtualization (NFV) technology is viewed as a significant component of both the fifth-generation (5G) communication networks and edge computing. In this paper, through reviewing the state-of-the-art work on applying NFV to edge computing, we identify that an urgent research challenge is to provide the proactive failure recovery me...
Chapter
Emergency communication networks (ECNs) are designed to provide reliable communications under emergent scenarios. Recently, smartphone based networks have attracted remarkable attentions on the management of ECNs. In this topic, we first review the state-of-the-art research efforts devoted to the establishment and management of smartphone based ECN...
Article
Full-text available
Device-free localization (DFL) locates targets without equipping with wireless devices or tag under the Internet-of-Things (IoT) architectures. As an emerging technology, DFL has spawned extensive applications in IoT environment, such as intrusion detection, mobile robot localization, and location-based services. Current DFL-related machine learnin...
Preprint
Full-text available
To draw a roadmap of current research activities of the blockchain community, we first conduct a brief overview of state-of-the-art blockchain surveys published in the recent 5 years. We found that those surveys are basically studying the blockchain-based applications, such as blockchain-assisted Internet of Things (IoT), business applications, sec...
Conference Paper
Full-text available
In isolated network domains, the global trustworthiness (e.g., consistent network views, etc) is critical to the multiple-party business partners who aim to perform the trusted corporations depending on each isolated network view. However, to achieve such global trustworthiness over distributed network domains is a challenge. This is because when m...
Article
As urban traffic condition is diverse and complicated, applying reinforcement learning to reduce traffic congestion becomes one of the hot and promising topics. Especially, how to coordinate the traffic light controllers of multiple intersections is a key challenge for multi-agent reinforcement learning (MARL). Most existing MARL studies are based...
Article
Unmanned Aerial Vehicle (UAV) swarms are widely applied for service provisioning in many domains such as topographic mapping and traffic monitoring. These UAV applications are complicated as they demand not only huge computational resources but also strict latency requirements. However, due to the limited onboard resources of UAVs as well as variou...
Article
In MENs, the task offloading services are expected to free MUs from complex tasks, which contributes to reduce the service latency and thus improves the QoS. Although the well-proven cooperative task offloading proposals effectively address such requirements by encouraging the cooperation among MUs and edges, the QoE from MUs' perspective still rem...
Preprint
Full-text available
Federated learning has been widely studied and applied to various scenarios. In mobile computing scenarios, federated learning protects users from exposing their private data, while cooperatively training the global model for a variety of real-world applications. However, the security of federated learning is increasingly being questioned, due to t...
Preprint
Full-text available
Constructing globally distributed file systems (DFS) has received great attention. Traditional Peer-to-Peer (P2P) distributed file systems have inevitable drawbacks such as instability, lacking auditing and incentive mechanisms. Thus, Inter-Planetary File System (IPFS) and Swarm, as the representative DFSs which integrate with blockchain technologi...
Article
Recent decades have seen a significant increase in the frequency, intensity, and impact of natural disasters and other emergencies, forcing the governments around the world to make emergency response and disaster management national priorities. The growth of extremely large and complex datasets — commonly referred to as big data — and various advan...
Data
This dataset and processing-code are free to download for your experiments. The related papers are: #1. ``Machine Fault Detection for Intelligent Self-Driving Networks"; #2. ``Real-Time Fault-Detection for IIoT Facilities using GBRBM-based DNN". ------------------------------------------------------ Please feel free to download the dataset and th...
Preprint
Although the challenge of the device connection is much relieved in 5G networks, the training latency is still an obstacle preventing Federated Learning (FL) from being largely adopted. One of the most fundamental problems that lead to large latency is the bad candidate-selection for FL. In the dynamic environment, the mobile devices selected by th...
Chapter
Full-text available
In distributed networks, the consistent network views (e.g., network events, network topology, and device information, etc) are critical to the network operators and service providers who aim to perform the global network/service optimizations depending on the overall network views. However, to achieve the consensus over distributed networks is a c...
Preprint
Full-text available
Blockchain-based decentralized cryptocurrencies have drawn much attention and been widely-deployed in recent years. Bitcoin, the first application of blockchain, achieves great success and promotes more development in this field. However, Bitcoin encounters performance problems of low throughput and high transaction latency. Other cryptocurrencies...
Preprint
As the first decentralized peer-to-peer (P2P) cryptocurrency system allowing people to trade with pseudonymous addresses, Bitcoin has become increasingly popular in recent years. However, the P2P and pseudonymous nature of Bitcoin make transactions on this platform very difficult to track, thus triggering the emergence of various illegal activities...
Preprint
Full-text available
In the fifth-generation (5G) networks and the beyond, communication latency and network bandwidth will be no more bottleneck to mobile users. Thus, almost every mobile device can participate in the distributed learning. That is, the availability issue of distributed learning can be eliminated. However, the model safety will become a challenge. This...
Article
Instead of deploying network functions on proprietary and dedicated hardware, Network Function Virtualization (NFV) enables to deploy network functions on virtual instances, such as virtual machines and containers. With the advance of 5G technologies, recent studies [1, 2] have shown that NFV has great potential to provide low-cost as well as ultra...
Article
Full-text available
To build the mechanism of a Self-Driving Network (SelfDN) is becoming an emerging direction for the future Internet of Things (IoT). The detection of device status, such as fault or normal, is a very fundamental module in SelfDN. In this article, we first review recent studies devoted to applying fault detection techniques in IoT networks. Taking t...
Article
Full-text available
Fault-detection is a fundamental requirement for industrial Internet-of-Things (IIoT), such as the process industry sammaknejad2019review. This paper first reviews recent studies focusing on applying fault-detection techniques to IIoT networks. However, we find out that numerous studies focus on resource utilization and workload allocation. The fau...
Article
Full-text available
As a critical supplementary to terrestrial communication networks, low-earth-orbit (LEO) satellite based communication networks have been gaining growing attention in recent years. In this paper, we focus on data collection from geo-distributed Internet-of-Things (IoT) networks via LEO satellites. Normally, the power supply in IoT data-gathering ga...
Article
Full-text available
Satellite-based communication technology regains much attention in the past few years, where satellites play mainly the supplementary roles as relay devices to terrestrial communication networks. Unlike previous work, we treat the low-earth-orbit (LEO) satellites as secure data storage mediums [1]. We focus on data acquisition from an LEO satellite...
Article
Full-text available
The concept of the industrial Internet of things (IIoT) is being widely applied to service provisioning in many domains, including smart healthcare, intelligent transportation, autopilot, and the smart grid. However, because of the IIoT devices' limited onboard resources, supporting resource-intensive applications, such as 3D sensing, navigation, A...
Article
(FullText-Download: https://authors.elsevier.com/c/1ZTYC4xsUrvgGQ ) Network Function Virtualization (NFV) allows to deploy network functions at low cost and high flexibility. Usually traffic needs to pass through several network functions in a particular order, which is known as network function chaining. Due to capacity limitation, one instance of...
Article
Deploying NFV technologies to the edge networks has attracted growing attention in the state-of-the-art studies. In this article, we first review the most recent work on the topic of applying NFV to edge networks. Then, we identify that an urgent research challenge is to provide proactive failure recovery (shorten as failover hereafter) mechanism f...
Article
In this article, we propose a hybrid computing model, UAV-Edge-Cloud, bringing edge/cloud computing and UAV swarm together to achieve high quality of service (QoS) guarantees. First, we design this novel hybrid computing framework to provide powerful resources to support resource-intensive applications and real-time tasks at edge networks. Next, we...
Article
Full-text available
Computation offloading is a promising solution to extend the capacity of robot swarms for computation-intensive applications because it allows robot swarms to benefit from the powerful computing resources of modern data centers. However, the existing computation-offloading approaches still face challenges: 1) multi-hop cooperative computation offlo...
Conference Paper
Full-text available
With the widely adoption of innovative Software-defined Networking (SDN) and Network Function Virtualiza-tion (NFV) technologies, wireless network management is much simplified and network resources are possibly allocated in an optimal manner. In software-defined NFV networks, when unicast session flows are required to get across multiple instances...
Article
In the last decade, network data communication has experienced a rapid growth, which has led to explosive congestion in heterogeneous networks. Moreover, the emerging industrial applications such as automatic driving put forward higher requirements on both networks and devices. On the contrary, running computation-intensive industrial applications...

Network

Cited By