Skip to main content

Showing 1–17 of 17 results for author: Ma, R T B

.
  1. arXiv:2206.13170  [pdf, other

    cs.LG cs.AI

    Measuring and Improving the Use of Graph Information in Graph Neural Networks

    Authors: Yifan Hou, Jian Zhang, James Cheng, Kaili Ma, Richard T. B. Ma, Hongzhi Chen, Ming-Chang Yang

    Abstract: Graph neural networks (GNNs) have been widely used for representation learning on graph data. However, there is limited understanding on how much performance GNNs actually gain from graph data. This paper introduces a context-surrounding GNN framework and proposes two smoothness metrics to measure the quantity and quality of information obtained from graph data. A new GNN model, called CS-GNN, is… ▽ More

    Submitted 27 June, 2022; originally announced June 2022.

    Comments: This paper has been published in ICLR 2020. Code and Dataset can be found here: https://github.com/yifan-h/CS-GNN

  2. arXiv:2012.03293  [pdf, other

    cs.NI

    DiffPerf: Towards Performance Differentiation and Optimization with SDN Implementation

    Authors: Walid Aljoby, Xin Wang, Dinil Mon Divakaran, Tom Z. J. Fu, Richard T. B. Ma

    Abstract: Continuing the current trend, Internet traffic is expected to grow significantly over the coming years, with video traffic consuming the biggest share. On the one hand, this growth poses challenges to access providers (APs), who have to upgrade their infrastructure to meet the growing traffic demands as well as find new ways to monetize their network resources. On the other hand, despite numerous… ▽ More

    Submitted 6 December, 2020; originally announced December 2020.

  3. arXiv:1811.04377  [pdf

    cs.NI

    On SDN-Enabled Online and Dynamic Bandwidth Allocation for Stream Analytics

    Authors: Walid Aljoby, Xin Wang, Tom Z. J. Fu, Richard T. B. Ma

    Abstract: Data communication in cloud-based distributed stream data analytics often involves a collection of parallel and pipelined TCP flows. As the standard TCP congestion control mechanism is designed for achieving "fairness" among competing flows and is agnostic to the application layer contexts, the bandwidth allocation among a set of TCP flows traversing bottleneck links often leads to sub-optimal app… ▽ More

    Submitted 7 August, 2019; v1 submitted 11 November, 2018; originally announced November 2018.

    Comments: IEEE Journal On Selected Areas In Communications, VOL. 37, NO. 8, August 2019

  4. arXiv:1804.04777  [pdf, other

    cs.DS

    Optimizing Bloom Filter: Challenges, Solutions, and Comparisons

    Authors: Lailong Luo, Deke Guo, Richard T. B. Ma, Ori Rottenstreich, Xueshan Luo

    Abstract: Bloom filter (BF) has been widely used to support membership query, i.e., to judge whether a given element x is a member of a given set S or not. Recent years have seen a flourish design explosion of BF due to its characteristic of space-efficiency and the functionality of constant-time membership query. The existing reviews or surveys mainly focus on the applications of BF, but fall short in cove… ▽ More

    Submitted 6 January, 2019; v1 submitted 12 April, 2018; originally announced April 2018.

  5. arXiv:1801.00095  [pdf, other

    cs.NI

    Paid Peering, Settlement-Free Peering, or Both?

    Authors: Xin Wang, Yinlong Xu, Richard T. B. Ma

    Abstract: With the rapid growth of congestion-sensitive and data-intensive applications, traditional settlement-free peering agreements with best-effort delivery often do not meet the QoS requirements of content providers (CPs). Meanwhile, Internet access providers (IAPs) feel that revenues from end-users are not sufficient to recoup the upgrade costs of network infrastructures. Consequently, some IAPs have… ▽ More

    Submitted 30 December, 2017; originally announced January 2018.

  6. arXiv:1711.01046  [pdf, other

    cs.DB

    Elasticutor: Rapid Elasticity for Realtime Stateful Stream Processing

    Authors: Li Wang, Tom Z. J. Fu, Richard T. B. Ma, Marianne Winslett, Zhenjie Zhang

    Abstract: Elasticity is highly desirable for stream processing systems to guarantee low latency against workload dynamics, such as surges in data arrival rate and fluctuations in data distribution. Existing systems achieve elasticity following a resource-centric approach that uses dynamic key partitioning across the parallel instances, i.e. executors, to balance the workload and scale operators. However, su… ▽ More

    Submitted 3 November, 2017; originally announced November 2017.

    Comments: 14 pages, 16 figures

  7. arXiv:1704.03641  [pdf, other

    cs.NI cs.GT

    On Optimal Two-Sided Pricing of Congested Networks

    Authors: Xin Wang, Richard T. B. Ma, Yinlong Xu

    Abstract: Traditionally, Internet Access Providers (APs) only charge end-users for Internet access services; however, to recoup infrastructure costs and increase revenues, some APs have recently adopted two-sided pricing schemes under which both end-users and content providers are charged. Meanwhile, with the rapid growth of traffic, network congestion could seriously degrade user experiences and influence… ▽ More

    Submitted 12 June, 2017; v1 submitted 12 April, 2017; originally announced April 2017.

    Comments: A typo in the proof of Theorem 3.6 is corrected

  8. arXiv:1701.04076  [pdf, other

    cs.NI

    On Optimal Service Differentiation in Congested Network Markets

    Authors: Mao Zou, Richard T. B. Ma, Xin Wang, Yinlong Xu

    Abstract: As Internet applications have become more diverse in recent years, users having heavy demand for online video services are more willing to pay higher prices for better services than light users that mainly use e-mails and instant messages. This encourages the Internet Service Providers (ISPs) to explore service differentiations so as to optimize their profits and allocation of network resources. M… ▽ More

    Submitted 15 January, 2017; originally announced January 2017.

  9. arXiv:1612.03312  [pdf, other

    cs.CR

    Monet: A User-oriented Behavior-based Malware Variants Detection System for Android

    Authors: Mingshen Sun, Xiaolei Li, John C. S. Lui, Richard T. B. Ma, Zhenkai Liang

    Abstract: Android, the most popular mobile OS, has around 78% of the mobile market share. Due to its popularity, it attracts many malware attacks. In fact, people have discovered around one million new malware samples per quarter, and it was reported that over 98% of these new malware samples are in fact "derivatives" (or variants) from existing malware families. In this paper, we first show that runtime be… ▽ More

    Submitted 10 December, 2016; originally announced December 2016.

  10. arXiv:1503.01514  [pdf, other

    cs.NI cs.GT

    The Role of Data Cap in Optimal Two-part Network Pricing

    Authors: Xin Wang, Richard T. B. Ma, Yinlong Xu

    Abstract: Internet services are traditionally priced at flat rates; however, many Internet service providers (ISPs) have recently shifted towards two-part tariffs where a data cap is imposed to restrain data demand from heavy users. Although the two-part tariff could generally increase the revenue for ISPs and has been supported by the US FCC, the role of data cap and its optimal pricing structures are not… ▽ More

    Submitted 25 November, 2017; v1 submitted 4 March, 2015; originally announced March 2015.

    Comments: Erratum of the Papers "The Role of Data Cap in Optimal Two-part Network Pricing" which was published in WWW2015 and "The role of data cap in two-part pricing under market competition" which was published in SDP2015&IEEE Network Vol. 30(2), 2016

  11. arXiv:1501.03619  [pdf

    cs.DC

    Optimal Operator State Migration for Elastic Data Stream Processing

    Authors: Jianbing Ding, Tom Z. J. Fu, Richard T. B. Ma, Marianne Winslett, Yin Yang, Zhenjie Zhang, Hongyang Chao

    Abstract: A cloud-based data stream management system (DSMS) handles fast data by utilizing the massively parallel processing capabilities of the underlying platform. An important property of such a DSMS is elasticity, meaning that nodes can be dynamically added to or removed from an application to match the latter's workload, which may fluctuate in an unpredictable manner. For an application involving stat… ▽ More

    Submitted 26 April, 2015; v1 submitted 15 January, 2015; originally announced January 2015.

    Comments: The latest version with a few modifications

  12. arXiv:1501.03610  [pdf, ps, other

    cs.DC

    DRS: Dynamic Resource Scheduling for Real-Time Analytics over Fast Streams

    Authors: Tom Z. J. Fu, Jianbing Ding, Richard T. B. Ma, Marianne Winslett, Yin Yang, Zhenjie Zhang

    Abstract: In a data stream management system (DSMS), users register continuous queries, and receive result updates as data arrive and expire. We focus on applications with real-time constraints, in which the user must receive each result update within a given period after the update occurs. To handle fast data, the DSMS is commonly placed on top of a cloud infrastructure. Because stream properties such as a… ▽ More

    Submitted 23 April, 2015; v1 submitted 15 January, 2015; originally announced January 2015.

    Comments: This is the our latest version with certain modification

  13. arXiv:1501.02905  [pdf, other

    cs.SI

    Sampling Online Social Networks via Heterogeneous Statistics

    Authors: Xin Wang, Richard T. B. Ma, Yinlong Xu, Zhipeng Li

    Abstract: Most sampling techniques for online social networks (OSNs) are based on a particular sampling method on a single graph, which is referred to as a statistics. However, various realizing methods on different graphs could possibly be used in the same OSN, and they may lead to different sampling efficiencies, i.e., asymptotic variances. To utilize multiple statistics for accurate measurements, we form… ▽ More

    Submitted 18 December, 2015; v1 submitted 13 January, 2015; originally announced January 2015.

  14. arXiv:1406.2516  [pdf, other

    cs.NI cs.CY

    Subsidization Competition: Vitalizing the Neutral Internet

    Authors: Richard T. B. Ma

    Abstract: Unlike telephone operators, which pay termination fees to reach the users of another network, Internet Content Providers (CPs) do not pay the Internet Service Providers (ISPs) of users they reach. While the consequent cross subsidization to CPs has nurtured content innovations at the edge of the Internet, it reduces the investment incentives for the access ISPs to expand capacity. As potential cha… ▽ More

    Submitted 10 June, 2014; originally announced June 2014.

  15. arXiv:1310.3584  [pdf

    cs.NI

    Selection Policy: Fighting against Filter Effect in Network of Caches

    Authors: Saeid Montazeri Shahtouri, Richard T. B. Ma

    Abstract: Many Information Centric Networking (ICN) proposals use a network of caches to bring the contents closer to the consumers, reduce the load on producers and decrease the unnecessary retransmission for ISPs. Nevertheless, the existing cache management scheme for the network of caches obtain poor performance. The main reason for performance degradation in a network of caches is the filter effect of t… ▽ More

    Submitted 14 October, 2013; originally announced October 2013.

    Comments: 9 pages, 8 figures, submitted to Infocom 2014

  16. arXiv:1211.5852  [pdf, other

    cs.NI

    On the Evolution of the Internet Economic Ecosystem

    Authors: Richard T. B. Ma, John C. S. Lui, Vishal Misra

    Abstract: The evolution of the Internet has manifested itself in many ways: the traffic characteristics, the interconnection topologies and the business relationships among the autonomous components. It is important to understand why (and how) this evolution came about, and how the interplay of these dynamics may affect future evolution and services. We propose a network aware, macroscopic model that captur… ▽ More

    Submitted 25 November, 2012; originally announced November 2012.

    Comments: 25 pages, 18 Figures

  17. arXiv:1106.3242  [pdf, other

    cs.NI cs.GT

    The Public Option: a Non-regulatory Alternative to Network Neutrality

    Authors: Richard T. B. Ma, Vishal Misra

    Abstract: Network neutrality and the role of regulation on the Internet have been heavily debated in recent times. Amongst the various definitions of network neutrality, we focus on the one which prohibits paid prioritization of content and we present an analytical treatment of the topic. We develop a model of the Internet ecosystem in terms of three primary players: consumers, ISPs and content providers. O… ▽ More

    Submitted 1 July, 2011; v1 submitted 16 June, 2011; originally announced June 2011.