A Stream-Aware MPQUIC Scheduler for HTTP Traffic in Mobile Networks

Y Xing, K Xue, Y Zhang, J Han, J Li… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
A QUIC (Quick UDP Internet Connections) protocol is designed to improve Hypertext
Transfer Protocol (HTTP) traffic and carries a non-negligible portion of the traffic in the …

Survey of wireless big data

L Qian, J Zhu, S Zhang - Journal of Communications and …, 2017 - ieeexplore.ieee.org
Wireless big data describes a wide range of massive data that is generated, collected and
stored in wireless networks by wireless devices and users. While these data share some …

A multi-attribute handover algorithm for QoS enhancement in ultra dense network

K Sun, J Yu, W Huang, H Zhang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Ultra-dense networks (UDNs) have been known as an efficient method to satisfy tremendous
traffic demands in future mobile networks. With high density deployment of small base …

Millimeter-wave backhaul traffic minimization for CoMP over 5G cellular networks

YJ Yu, TY Hsieh, AC Pang - IEEE Transactions on Vehicular …, 2019 - ieeexplore.ieee.org
Coordinated multipoint joint transmission (JT) is a vital technique of the fifth-generation (5G)
networks to increase throughput but causes a significant burden on network backhaul …

Characterizing flow, application, and user behavior in mobile networks: A framework for mobile big data

Y Qiao, Z Xing, ZM Fadlullah, J Yang… - IEEE Wireless …, 2018 - ieeexplore.ieee.org
The recent explosion of data traffic calls for specialized systems to monitor the status of
networks. Traditionally, Internet service providers collect and analyze IP flow data as they …

Sequential message characterization for early classification of encrypted internet traffic

W Chen, F Lyu, F Wu, P Yang, G Xue… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Classifying Internet traffic is critical to many network management tasks, including malicious
attack detection, usage monitoring, load balancing, etc. As current traffic packets are often …

Secrecy outage analysis of transmit antenna selection assisted with wireless power beacon

P Yan, J Yang, M Liu, J Sun… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
This paper considers a multiple-input-multiple-output (MIMO) energy-harvesting (EH)
system, which is made up of a source (S) and a destination (D) as well as an eavesdropper …

Social media analytics in the construction industry comparison study between China and the United States

L Tang, L Griffith, M Stevens, M Hardie - … construction and architectural …, 2020 - emerald.com
Purpose The purpose of this paper is to discover similarities and differences in the
construction industry in China and the United States by using data analytic tools on data …

Human mobility prediction using sparse trajectory data

H Wang, S Zeng, Y Li, P Zhang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Human mobility prediction techniques are instrumental for many important applications
including service management and city planning. Previous work looks at the inherent …

Abnormal-trajectory detection method based on variable grid partitioning

C Chen, D Xu, Q Yu, S Gong, G Shi, H Liu… - … International Journal of …, 2023 - mdpi.com
Abnormal-trajectory detection can be used to detect fraudulent behavior by taxi drivers when
carrying passengers. Existing methods usually detect abnormal trajectories based on the …