Pyramid codes: Flexible schemes to trade space for access efficiency in reliable data storage systems C Huang, M Chen, J Li ACM Transactions on Storage (TOS) 2013, 2013 | 507 | 2013 |
Joint VM placement and routing for data center traffic engineering JW Jiang, T Lan, S Ha, M Chen, M Chiang 2012 Proceedings IEEE INFOCOM, 2876-2880, 2012 | 445 | 2012 |
Rate control for streaming video over wireless M Chen, A Zakhor INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and …, 2004 | 247 | 2004 |
Markov approximation for combinatorial network optimization M Chen, SC Liew, Z Shao, C Kai IEEE Transactions on Information Theory 59 (10), 6301-6327, 2013 | 237 | 2013 |
Moving big data to the cloud: an online cost-minimizing approach L Zhang, C Wu, Z Li, C Guo, M Chen, FCM Lau IEEE Journal on Selected Areas in Communications 31 (12), 2710-2721, 2013 | 198* | 2013 |
Hiding privacy information in video surveillance system W Zhang, SS Cheung, M Chen IEEE International Conference on Image Processing 2005 3, II-868-71, 2005 | 187 | 2005 |
Migration towards cloud-assisted live media streaming F Wang, J Liu, M Chen, H Wang Proceedings IEEE INFOCOM, 2012, 2012 | 185* | 2012 |
Understanding Performance of Edge Content Caching for Mobile Video Streaming G Ma, Z Wang, M Zhang, J Ye, M Chen, W Zhu IEEE Journal on Selected Areas in Communications 35 (5), 1076-1089, 2017 | 165 | 2017 |
Erasure-resilient codes having multiple protection groups C Huang, M Chen, J Li US Patent 7,930,611, 2011 | 147 | 2011 |
Utility maximization in peer-to-peer systems M Chen, M Ponec, S Sengupta, J Li, PA Chou ACM SIGMETRICS Performance Evaluation Review 36 (1), 169-180, 2008 | 143 | 2008 |
Enabling multi-level trust in privacy preserving data mining Y Li, M Chen, Q Li, W Zhang IEEE Transactions on Knowledge and Data Engineering, 2012 | 142 | 2012 |
Propagation-based social-aware replication for social video contents Z Wang, L Sun, X Chen, W Zhu, J Liu, M Chen, S Yang Proceedings of the 20th ACM international conference on Multimedia, 29-38, 2012 | 139* | 2012 |
Predicting positive and negative links in signed social networks by transfer learning J Ye, H Cheng, Z Zhu, M Chen Proceedings of the 22nd international conference on World Wide Web, 1477-1488, 2013 | 137 | 2013 |
RIPPLE authentication for network coding Y Li, H Yao, M Chen, S Jaggi, A Rosen 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 127 | 2010 |
Application aware rate control J Li, PA Chou, M Chen US Patent App. 11/961,900, 2009 | 126 | 2009 |
Exploring indoor white spaces in metropolises X Ying, J Zhang, L Yan, G Zhang, M Chen, R Chandra ACM MobiCom, 2013 | 119* | 2013 |
Online energy generation scheduling for microgrids with intermittent energy sources and co-generation L Lu, J Tu, CK Chau, M Chen, X Lin ACM SIGMETRICS Performance Evaluation Review 41 (1), 53-66, 2013 | 119 | 2013 |
Simple and effective dynamic provisioning for power-proportional data centers T Lu, M Chen, LLH Andrew IEEE Transactions on Parallel and Distributed Systems 24 (6), 1161-1171, 2012 | 108 | 2012 |
A fragile watermark error detection scheme for wireless video communications M Chen, Y He, RL Lagendijk Multimedia, IEEE Transactions on 7 (2), 201-211, 2005 | 100 | 2005 |
BASIC Codes: Low-Complexity Regenerating Codes for Distributed Storage Systems H Hou, KW Shum, M Chen, H Li IEEE Transactions on Information Theory 62 (6), 3053-3069, 2016 | 95* | 2016 |