Xuemin (Sherman) Shen

University of Waterloo, Ватерлоо, Ontario, Canada

Are you Xuemin (Sherman) Shen?

Claim your profile

Publications (283)338.45 Total impact

  • Haibo Zhou · Bo Liu · Fen Hou · Tom H. Luan · Ning Zhang · Lin Gui · Quan Yu · Xuemin Sherman Shen
    [Show abstract] [Hide abstract]
    ABSTRACT: Driven by the ever-growing expectation of ubiquitous connectivity and the widespread adoption of IEEE 802.11 networks, it is not only highly demanded but also entirely possible for in-motion vehicles to establish convenient Internet access to roadside WiFi access points (APs) than ever before, which is referred to as Drive-Thru Internet. The performance of Drive-Thru Internet, however, would suffer from the high vehicle mobility, severe channel contentions, and instinct issues of the IEEE 802.11 MAC as it was originally designed for static scenarios. As an effort to address these problems, in this paper, we develop a unified analytical framework to evaluate the performance of Drive-Thru Internet, which can accommodate various vehicular traffic flow states, and to be compatible with IEEE 802.11a/b/g networks with a distributed coordination function (DCF). We first develop the mathematical analysis to evaluate the mean saturated throughput of vehicles and the transmitted data volume of a vehicle per drive-thru. We show that the throughput performance of Drive-Thru Internet can be enhanced by selecting an optimal transmission region within an AP's coverage for the coordinated medium sharing of all vehicles. We then develop a spatial access control management approach accordingly, which ensures the airtime fairness for medium sharing and boosts the throughput performance of Drive-Thru Internet in a practical, efficient, and distributed manner. Simulation results show that our optimal access control management approach can efficiently work in IEEE 802.11b and 802.11g networks. The maximal transmitted data volume per drive-thru can be enhanced by 113.1% and 59.5% for IEEE 802.11b and IEEE 802.11g networks with a DCF, respectively, compared with the normal IEEE 802.11 medium access with a DCF.
    IEEE Transactions on Intelligent Transportation Systems 10/2015; 16(5):1-14. DOI:10.1109/TITS.2015.2416257 · 2.38 Impact Factor
  • Qichao Xu · Zhou Su · Kuan Zhang · Pinyi Ren · Xuemin Sherman Shen
    [Show abstract] [Hide abstract]
    ABSTRACT: With the advancement of smartphones, mobile social networks (MSNs) have emerged where information can be shared among mobile users via opportunistic peer-to-peer links. Since the social ties and users’ behaviors in MSNs have diverse characteristics, the information dissemination in MSNs becomes a new challenge. In particular, mobile users’ interested information may vary, which can significantly affect the information dissemination. In this paper, we develop an analytical model to analyze the epidemic information dissemination in MSNs. We first adopt preimmunity and immunity to represent the features of mobile nodes when they change their interests. Then, the information dissemination mechanism is introduced with four proposed dissemination rules according to the process of the epidemic information dissemination. We develop the analytical model through ordinary differential equations to mimic epidemic information dissemination in MSNs. The trace-driven simulation demonstrates that our analytical model is more accurate to mimic epidemic information dissemination than other existing ones.
    IEEE Transactions on Emerging Topics in Computing 09/2015; 3(3):1-1. DOI:10.1109/TETC.2015.2414792
  • Source
    Ning Lu · Nan Cheng · Ning Zhang · Xuemin (Sherman) Shen · Jon W. Mark · Fan Bai
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we investigate the cost-effectiveness of Wi-Fi solution for vehicular Internet access. We define the cost-effectiveness as the cost saving by deploying and operating a low-cost Wi-Fi infrastructure instead of a costly benchmark cellular network. To characterize the service quality of Wi-Fi deployment, we also define the normalized service delay which is the service time to fulfill a data application via the Wi-Fi network normalized by that via the cellular network. To derive the service time, we analyze the average throughput capacity of a generic vehicle in the Wi-Fi network and the average downlink capacity in the cellular network. Especially, we propose deploying Wi-Fi access point at signalized intersection and study the fundamental influence of traffic signals (which yield an interrupted vehicle traffic) on Wi-Fi access. Then, we examine the tradeoff between cost-effectiveness and normalized service delay by identifying interplays between controllable (e.g., the density of Wi-Fi deployment and user's satisfaction) and uncontrollable parameters (e.g., vehicle traffic statistics). Our results are very useful for network operators to make strategic planning of Wi-Fi deployment for vehicular Internet Access.
    IEEE Transactions on Vehicular Technology 06/2015; DOI:10.1109/TVT.2015.2443808 · 1.98 Impact Factor
  • Ran Zhang · Miao Wang · Lin X. Cai · Zhongming Zheng · Xuemin (sherman) Shen · Liang-Liang Xie
    [Show abstract] [Hide abstract]
    ABSTRACT: The phenomenal growth of mobile data demand has brought about increasing scarcity in available radio spectrum. Meanwhile, mobile customers pay more attention to their own experience, especially in communication reliability and service continuity on the move. To address these issues, LTE-Unlicensed, or LTEU, is considered one of the latest groundbreaking innovations to provide high performance and seamless user experience under a unified radio technology by extending LTE to the readily available unlicensed spectrum. In this article, we offer a comprehensive overview of the LTEU technology from both operator and user perspectives, and examine its impact on the incumbent unlicensed systems. Specifically, we first introduce the implementation regulations, principles, and typical deployment scenarios of LTE-U. Potential benefits for both operators and users are then discussed. We further identify three key challenges in bringing LTE-U into reality together with related research directions. In particular, the most critical issue of LTE-U is coexistence with other unlicensed systems, such as widely deployed WiFi. The LTE/WiFi coexistence mechanisms are elaborated in time, frequency, and power aspects, respectively. Simulation results demonstrate that LTE-U can provide better user experience to LTE users while well protecting the incumbent WiFi users??? performance compared to two existing advanced technologies: cellular/WiFi interworking and licensed-only heterogeneous networks (Het-Nets).
    IEEE Wireless Communications 06/2015; 22(3):150-159. DOI:10.1109/MWC.2015.7143339 · 5.42 Impact Factor
  • Yujie Tang · Yongkang Liu · Ning Zhang · Jon W. Mark · Xuemin Sherman Shen
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, a cluster-based two-phase coordination scheme for cooperative cognitive radio networks is proposed considering both spectrum efficiency and network fairness. Specifically, candidate secondary users (SUs) are first selected by a partner selection algorithm to enter the two-phase cooperation with primary users (PUs). In phase I, the selected SUs cooperate with PUs to acquire a fraction of time slot as a reward. In phase II, all SUs including the unselected ones share the available spectrum resources in local clusters; each of which is managed by a cluster head who participated in the cooperation in phase I. To improve the total network utility of both PUs and SUs, the maximum weighted bipartite matching is adopted in partner selection. To further improve the network performance and communication reliability, network coding is exploited during the spectrum sharing within the cluster. Simulation results demonstrate that, with the proposed cluster-based coordination scheme, not only the PUs' transmission performance is improved, but also SUs achieve spectrum access opportunities. Copyright © 2015 John Wiley & Sons, Ltd.
    Wireless Communications and Mobile Computing 03/2015; DOI:10.1002/wcm.2585 · 0.86 Impact Factor
  • Tom H. Luan · Rongxing Lu · Xuemin (Sherman) Shen · Fan Bai
    [Show abstract] [Hide abstract]
    ABSTRACT: This article presents SOR, a vehicular social network to enable social communications and interactions among users on the road during their highway travels. Motivated by the limited connection to Internet contents and services, the essential goal of SOR is to encourage distributed users on the road to spontaneously contribute as the information producer, assembler, and distributer in order to provide timely and localized infotainments to each other through low-cost inter-vehicle communications. To be specific, SOR enables individual users to maintain a personal blog, similar to one on Facebook and Twitter, over which users can create and share personal content information to the public such as travel blogs with pictures and videos. By accessing each other???s SOR blogs and commenting on interesting topics, passengers can exchange messages and initiate social interactions. In the specific highway environment, SOR addresses two challenges in the context of vehicular social communications. First, vehicular social communications tend to be frequently interrupted by diverse vehicle mobility and intermittent intervehicle connections, which is annoying to users. To address this issue, SOR adopts a proactive mechanism by estimating the connection time between peer vehicles, and recommending vehicles with relatively long-lasting and stable intervehicle connections for social communications. Second, as users on the road are typically strangers to each other, they are reluctant to disclose personal information to others. This makes it challenging to identify users of shared interests and accordingly restricts the scale of users??? social interactions. To remedy that, SOR provides a secured solution to protect sensitive user information during social communications. Lastly, we use simulations to verify the performance of SOR.
    IEEE Wireless Communications 02/2015; 22(1):44-51. DOI:10.1109/MWC.2015.7054718 · 5.42 Impact Factor
  • Jian Qiao · Xuemin (Sherman) Shen · Jon W. Mark · Qinghua Shen · Yejun He · Lei Lei
    [Show abstract] [Hide abstract]
    ABSTRACT: Millimeter-wave communication is a promising technology for future 5G cellular networks to provide very high data rate (multi-gigabits-per-second) for mobile devices. Enabling D2D communications over directional mmWave networks is of critical importance to efficiently use the large bandwidth to increase network capacity. In this article, the propagation features of mmWave communication and the associated impacts on 5G cellular networks are discussed. We introduce an mmWave+4G system architecture with TDMA-based MAC structure as a candidate for 5G cellular networks. We propose an effective resource sharing scheme by allowing non-interfering D2D links to operate concurrently. We also discuss neighbor discovery for frequent handoffs in 5G cellular networks.
    IEEE Communications Magazine 01/2015; 53(1):209-215. DOI:10.1109/MCOM.2015.7010536 · 4.01 Impact Factor
  • Ying Wang · Peilong Li · Lei Jiao · Zhou Su · Nan Cheng · Xuemin(Sherman) Shen · Ping Zhang
    IEEE Wireless Communications 01/2015; · 5.42 Impact Factor
  • Xiaoxia Zhang · Xuemin Sherman Shen · Liang-Liang Xie
    IEEE Transactions on Vehicular Technology 01/2015; DOI:10.1109/TVT.2015.2416714 · 1.98 Impact Factor
  • Sandra Céspedes · Xuemin (Sherman) Shen
    [Show abstract] [Hide abstract]
    ABSTRACT: The supporting infrastructure and communications technologies for vehicular networking contexts are heterogeneous by nature. Large coverage access networks, such as 3G/4G, coexist with wireless local area networks and dedicated short-range communications. In such a scenario, we investigate the seamless provision of mobile Internet access and general IP services over the heterogeneous network, in particular for loosely coupling architectures. We propose a hybrid global mobility scheme that allows for the ongoing IP sessions to be transferred across dissimilar radio access networks that may belong to different administrative domains. In order to achieve the global mobility, our scheme combines host- and network-based mobility. The solution focuses on urban vehicular scenarios and enables seamless communications for in-vehicle networks, passengers with mobile devices, and users of public transportation commuting along the system. By means of analytical evaluations and simulations of realistic urban vehicular scenarios, we show that our hybrid scheme can achieve seamless IP communications for mobile Internet access over the heterogeneous vehicular network.
    IEEE Transactions on Intelligent Transportation Systems 01/2015; DOI:10.1109/TITS.2015.2442251 · 2.38 Impact Factor
  • Haibo Zhou · Bo Liu · Fen Hou · Ning Zhang · Lin Gui · Jiacheng Chen · Xuemin (Sherman) Shen
    [Show abstract] [Hide abstract]
    ABSTRACT: Since FCC's opening for white space (WS) utilization, database-assisted dynamic spectrum access (DSA) has become the de facto solution for the realization of dynamic spectrum sharing (DSS), due to its simplicity and compatibility with commercial off-the-shelf (COTS) devices. It is envisioned that such technology will strongly support the prosperous wireless multimedia networking (WMN) applications with satisfying QoS guarantees in the future. However, how to counter the time-frequency variant property when exploiting the WS spectrum for the provision of these services to secondary users (SUs) still remains a great challenge. In such context, a dynamic secondary access scheme for database-assisted spectrum sharing networks is proposed in this paper. In the beginning, the spectrum requirements of SUs for diverse services are modeled by considering the minimum required service data-rate and spectrum access duration. Afterwards, the spectrum demand evaluation and bidding policy are formulated based on the service classes of SUs. Furthermore, a double-phase (DP) spectrum allocation scheme, which consists of the initial resource allocation phase and resource allocation adjustment phase, is carefully designed for DSA. Finally, extensive simulations are conducted and the results demonstrate that our scheme can increase the spectrum trading revenue and adapt to varying service requirements.
    Wireless Communication over ZigBee for Automotive Inclination Measurement. China Communications 01/2015; 12(1):66-77. DOI:10.1109/CC.2015.7084384 · 0.34 Impact Factor
  • Source
    Lei Lei · Xuemin (Sherman) Shen · Mischa Dohler · Chuang Lin · Zhangdui Zhong
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we study the performance of mode selections in device-to-device (D2D) communications in terms of end-to-end average throughput, average delay, and dropping probability, considering dynamic data arrival with non-saturated buffers. We first introduce a general framework that includes three canonical routing modes, namely D2D mode, cellular mode, and hybrid mode, which can be combined with different resource allocation restrictions to represent the semi-static and dynamic selections of the three resource sharing modes. A queuing model is developed when the routing mode for every D2D connection is chosen, and an exact numerical analysis and an approximate decomposition and iteration approach are proposed. The performance measures are obtained from the decomposition approach and validated by means of simulation. We further introduce a mode selection scheme that adaptively chooses to semi-statically or dynamically select the resource sharing modes according to the estimated performance measures.
    IEEE Transactions on Wireless Communications 12/2014; 13(12):6697-6715. DOI:10.1109/TWC.2014.2335734 · 2.50 Impact Factor
  • Amila Tharaperiya Gamage · Hao Liang · Ran Zhang · Xuemin (Sherman) Shen
    [Show abstract] [Hide abstract]
    ABSTRACT: To satisfy the ever increasing wireless service demand, it is effective to form a converged network by utilizing interworking mechanisms, such that the resources of heterogeneous wireless networks can be allocated in a coordinated and efficient manner. Despite the potential advantages of a converged network, its performance needs further improvement, especially at cell edges and rural areas where only one network is available. In this article, we investigate how to leverage device-to-device, D2D, communication to further improve the performance of a converged network which consists of an LTE-A cellular network and IEEE 802.11n WLANs. Three main technical challenges that complicate resource allocation are identified: allocation of resources capturing diverse radio access technologies of the networks, selection of users' communication modes for multiple networks to maximize hop and reuse gains, and interference management. To address these challenges, we propose a resource allocation scheme that performs mode selection, allocation of WLAN resources, and allocation of LTE-A network resources in three different timescales. The resource allocation scheme is semi-distributedly implemented in the underlying converged D2D communication network, and the achievable performance improvements are demonstrated via simulation results.
    IEEE Wireless Communications 12/2014; 21(6):98-107. DOI:10.1109/MWC.2014.7000977 · 5.42 Impact Factor
  • Jianchao Zheng · Yueming Cai · Yongkang Liu · Yuhua Xu · Bowen Duan · Xuemin (Sherman) Shen
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper proposes a novel base station (BS) coordination approach for intercell interference mitigation in the orthogonal frequency-division multiple access based cellular networks. Specifically, we first propose a new performance metric for evaluating end user's quality of experience (QoE), which jointly considers spectrum efficiency, user fairness, and service satisfaction. Interference graph is applied here to capture and analyze the interactions between BSs. Then, a QoE-oriented resource allocation problem is formulated among BSs as a local cooperation game, where BSs are encouraged to cooperate with their peer nodes in the adjacent cells in user scheduling and power allocation. The existence of the joint-strategy Nash equilibrium (NE) has been proved, in which no BS player would unilaterally change its own strategy in user scheduling or power allocation. Furthermore, the NE in the formulated game is proved to lead to the global optimality of the network utility. Accordingly, we design an iterative searching algorithm to obtain the global optimum (i.e., the best NE) with an arbitrarily high probability in a decentralized manner, in which only local information exchange is needed. Theoretical analysis and simulation results both validate the convergence and optimality of the proposed algorithm with fairness improvement.
    IEEE Transactions on Wireless Communications 12/2014; 13(12):6928-6942. DOI:10.1109/TWC.2014.2334673 · 2.50 Impact Factor
  • Kuan Zhang · Xiaohui Liang · Mrinmoy Baura · Rongxing Lu · Xuemin (Sherman) Shen
    [Show abstract] [Hide abstract]
    ABSTRACT: Wireless Body Area Networks (WBANs), as a promising health-care system, can timely monitor human physiological parameters. Due to the limitation of communications, power, storage and computation in WBANs, a cloud assisted WBAN flourishes and provides more reliable, real-time, and intelligent health-care services for patients and mobile users. However, it is still critical to efficiently aggregate the different types of WBAN data to the cloud server. In addition, security and privacy concerns are also of paramount importance during the communications between WBAN and cloud. In this paper, we propose a priority based health data aggregation (PHDA) scheme with privacy preservation for cloud assisted WBANs to improve the aggregation efficiency among different types of health data. Specifically, we first explore social spots to help forward health data and enable users to select the optimal relay according to their social ties. According to different data priorities, the adjustable forwarding strategies can be selected to forward the user's health data to the cloud servers with the reasonable communication overheads. The security analysis demonstrates that the PHDA can achieve identity and data privacy preservation, and resist the forgery attacks. Finally, the performance evaluation shows that the PHDA achieves the desirable delivery ratio with reasonable communication costs and lower delay for the data in different priorities.
    Information Sciences 11/2014; 284:130-141. DOI:10.1016/j.ins.2014.06.011 · 4.04 Impact Factor
  • Khaled H. Almotairi · Xuemin Sherman Shen
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we investigate the deficiency of uncontrolled asymmetrical transmission power over multiple channels in ad hoc environments. We further propose a novel distributed transmission power control protocol called the distributed power level (DPL) protocol for multi-channel ad hoc networks without requiring clock synchronization. Specifically, different transmission power levels are assigned to different channels, and nodes search for an idle channel on the basis of the received power so that the maximum allowable power of the preferred data channel is larger than or equal to the received power. If the most preferred channel of the least maximum power is busy, the nodes are able to select the next channel and so forth. As a result, interference is reduced over channels because the nodes that require higher transmission power are separated from interfering with the nodes that require lower transmission power. Two transmission power control modes are introduced for DPL: symmetrical and asymmetrical. For the symmetrical DPL protocol (mode), nodes transmit at the same power level assigned to the selected channel. On the other hand, for the asymmetrical DPL protocol, nodes are allowed to transmit at a lower or equal power level that is assigned to the selected channel. Extensive ns-2-based simulation results are presented to demonstrate that the proposed protocols can enhance the network throughput compared with the existing uncontrolled asymmetrical transmission power protocol. Copyright (C) 2012 John Wiley & Sons, Ltd.
    Wireless Communications and Mobile Computing 10/2014; 14(14):1365-1381. DOI:10.1002/wcm.2266 · 0.86 Impact Factor
  • Peng Zhang · Chuang Lin · Yixin Jiang · Yanfei Fan · Xuemin (Sherman) Shen
    [Show abstract] [Hide abstract]
    ABSTRACT: Energy saving is an important issue in Mobile Ad Hoc Networks (MANETs). Recent studies show that network coding can help reduce the energy consumption in MANETs by using less transmissions. However, apart from transmission cost, there are other sources of energy consumption, e.g., data encryption/decryption. In this paper, we study how to leverage network coding to reduce the energy consumed by data encryption in MANETs. It is interesting that network coding has a nice property of intrinsic security, based on which encryption can be done quite efficiently. To this end, we propose P-Coding, a lightweight encryption scheme to provide confidentiality for network-coded MANETs in an energy-efficient way. The basic idea of P-Coding is to let the source randomly permute the symbols of each packet (which is prefixed with its coding vector), before performing network coding operations. Without knowing the permutation, eavesdroppers cannot locate coding vectors for correct decoding, and thus cannot obtain any meaningful information. We demonstrate that due to its lightweight nature, P-Coding incurs minimal energy consumption compared to other encryption schemes.
    IEEE Transactions on Parallel and Distributed Systems 09/2014; 25(9):2211-2221. DOI:10.1109/TPDS.2013.161 · 2.17 Impact Factor
  • Fangqin Liu · Tom H. Luan · Xuemin Sherman Shen · Chuang Lin
    [Show abstract] [Hide abstract]
    ABSTRACT: The packet loss burstiness over wireless channels is commonly acknowledged as a key impacting factor on the performance of networking protocols. An accurate evaluation of the packet loss burstiness, which reveals the characteristics and performance of the wireless channels, is crucial to the design of wireless systems and the quality-of-service provisioning to end users. In this paper, a simple yet accurate analytical framework is developed to dimension the packet loss burstiness over generic wireless channels. In specific, we first propose a novel and effective metric to characterize the packet loss burstiness, which is shown to be more compact, effective, and accurate than the metrics proposed in existing literature for the same purpose. With this metric, we then develop an analytical framework and derive the closed-form solutions of the packet loss performance, including the packet loss rate and the loss-burst/loss-gap length distributions. Lastly, as an example to show how the derived results can be applied to the design of wireless systems, we apply the analytical results to devise an adaptive packetization scheme. The proposed packetization scheme adaptively adjusts the packet length of transmissions based on the prediction of the packet loss rate and loss-burst/loss-gap lengths of the wireless channel. Via extensive simulations, we show that with the proposed packetization scheme, the channel throughput can be enhanced by more than 10% than the traditional scheme.Copyright © 2012 John Wiley & Sons, Ltd.
    Wireless Communications and Mobile Computing 08/2014; 14(12):1160-1175. DOI:10.1002/wcm.2262 · 0.86 Impact Factor
  • Hongwei Li · Xiaodong Lin · Haomiao Yang · Xiaohui Liang · Rongxing Lu · Xuemin (Sherman) Shen
    [Show abstract] [Hide abstract]
    ABSTRACT: Smart grid has recently emerged as the next generation of power grid due to its distinguished features, such as distributed energy control, robust to load fluctuations, and close user-grid interactions. As a vital component of smart grid, demand response can maintain supply-demand balance and reduce users' electricity bills. Furthermore, it is also critical to preserve user privacy and cyber security in smart grid. In this paper, we propose an efficient privacy-preserving demand response (EPPDR) scheme which employs a homomorphic encryption to achieve privacy-preserving demand aggregation and efficient response. In addition, an adaptive key evolution technique is further investigated to ensure the users' session keys to be forward secure. Security analysis indicates that EPPDR can achieve privacy-preservation of electricity demand, forward secrecy of users' session keys, and evolution of users' private keys. In comparison with an existing scheme which also achieves forward secrecy, EPPDR has better efficiency in terms of computation and communication overheads and can adaptively control the key evolution to balance the trade-off between the communication efficiency and security level.
    IEEE Transactions on Parallel and Distributed Systems 08/2014; 25(8):2053-2064. DOI:10.1109/TPDS.2013.124 · 2.17 Impact Factor
  • Source
    Rong Jiang · Rongxing Lu · Jun Luo · Chengzhe Lai · Xuemin Sherman Shen
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, in order to simultaneously resolve the transmission security and availability in Supervisory Control And Data Acquisition (SCADA) group communications, we propose a robust and efficient group key management scheme, called LiSH+, which is characterized by developing a secure self-healing mechanism with t-revocation and collusion resistance capability. A dual direction hash chain is utilized to guarantee the backward secrecy and forward secrecy of group key. A novel self-healing mechanism is constructed to ensure availability of the group member in case of devices failure and prevent the collusive users from exploiting the group key in the proposed scheme. In addition, the compromised users can be revoked from the group dynamically by broadcasting message. Detailed security analysis shows that the proposed LiSH+ scheme meets the requirements of group communication and is secure in terms of t user collusion-free. Performance evaluation also demonstrates its efficiency in terms of low storage requirement and communication overheads. Copyright © 2014 John Wiley & Sons, Ltd.
    Security and Communication Networks 08/2014; 8(6):n/a-n/a. DOI:10.1002/sec.1057 · 0.72 Impact Factor

Publication Stats

3k Citations
338.45 Total Impact Points


  • 2003–2015
    • University of Waterloo
      • Department of Electrical & Computer Engineering
      Ватерлоо, Ontario, Canada
  • 2014
    • Umm Al-Qura University
      • Department of Computer Engineering
      Makkah, Makkah, Saudi Arabia
  • 2009
    • Northeastern University (Shenyang, China)
      • College of Information Science and Engineering
      Feng-t’ien, Liaoning, China
  • 2008
    • University of Alberta
      • Department of Electrical and Computer Engineering
      Edmonton, Alberta, Canada
    • Dalian Maritime University
      Lü-ta-shih, Liaoning, China
  • 2007
    • University of Tsukuba
      Tsukuba, Ibaraki, Japan
    • University of Victoria
      • Department of Electrical and Computer Engineering (ECE)
      Victoria, British Columbia, Canada
  • 2006
    • Microsoft
      Washington, West Virginia, United States
    • McMaster University
      • Department of Electrical and Computer Engineering
      Hamilton, Ontario, Canada