Fulu Li

Fulu Li
  • PhD
  • Massachusetts Institute of Technology

About

37
Publications
2,766
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
848
Citations
Current institution
Massachusetts Institute of Technology

Publications

Publications (37)
Conference Paper
We introduce community coding, where information systems meet social networks. Community coding is an emerging field of social computation and coding theory, which provides a method of aggregating resources from a community to maximize the sum of their utilities by allowing the community members to coordinate their contributions of resources. Commu...
Conference Paper
We investigate the problem of image sensing under unfavorable photographic conditions in a wireless image sensor network. In the scenes with deflective and/or reflective medium such as fogs, mirrors, glasses, degraded images are captured by those image sensors. Such degraded images often lack perceptual vividness and they offer a poor visibility of...
Conference Paper
With the availability of ever-increasing gene sequence data across a large number of species, reconstruction of phylogenetic trees to reveal the evolution relationship among those species becomes more and more important. In this paper, we present a novel proof of the NP-completeness of the large parsimony problem by reduction from a newly-proved NP...
Conference Paper
Full-text available
Photo tourism [11] is a platform that allows users to transform unstructured online digital photos into a 3D experience. Nowadays, image sensors are being extensively used to allow images to be taken automatically and remotely, which facilitates the opportunity for live update of photo mosaics. In this paper, we present a novel framework for live p...
Conference Paper
Full-text available
We investigate the problem of image sensing under unfavorable photographic conditions in a wireless image sensor network. In the scenes with deflective and/or reflective medium such as fogs, mirrors, glasses, degraded images are captured by those image sensors. Such degraded images often lack perceptual vividness and they offer a poor visibility of...
Chapter
Full-text available
Although CDMA EVDO Rev. A provides significant improvements over EVDO Release 0 that make it well suited for VoIP-like applications [3], it remains unclear about its performance in terms of quantitative evaluations with different real implementation scenarios. To understand the system design tradeoffs, we first investigate the traffic characteristi...
Conference Paper
With the availability of ever-increasing gene sequence data across a large number of species, reconstruction of phylogenetic trees to reveal the evolution relationship among those species becomes more and more important. In this paper, we focus on the construction of the most parsimonious phylogenetic trees given sequence data of a group of species...
Article
Photo tourism [5] is a platform that allows users to transform unstructured online digital photos into a 3D experience. Nowadays, image sensors are being extensively used to allow images to be taken automatically and remotely, which facilitates the opportunity for live update of photo mosaics. In this paper, we present a novel framework for live ph...
Article
In this paper we study the probabilistic view coverage problem for image sensing in wireless sensor networks. The view coverage of an image sensor network determines the quality of the surveillance services that an image sensor network can provide. In this paper, we present an indepth analysis on probabilistic view coverage in an image sensor netwo...
Article
We study the routing problem in all-wireless networks based on cooperative transmissions. We model the minimum-energy cooperative path (MECP) problem and prove that this problem is NP-complete. We hence design an approximation algorithm called cooperative shortest path (CSP) algorithm that uses Dijkstra's algorithm as the basic building block and u...
Conference Paper
In this paper, we present a networking perspective of cooperative spectrum sharing in wireless networks. For unlicensed band like WiFi, e.g., 2.4 GHz, it is particularly critical that network nodes share the same spectrum cooperatively and efficiently. We discuss several cooperative techniques for spectrum sharing in wireless networks including str...
Conference Paper
Full-text available
Information storage and storage sharing are key components of modern networked computer systems. Mobile devices such as PDAs and cell phones normally have very limited storage capacities compared with PCs or laptops, while storing a large number of media objects (such as e-books, pictures and videos, etc.) on mobile devices could take a lot of spac...
Conference Paper
Full-text available
Recent advancement in peer-to-peer (P2P) technologies has enabled a wide range of new applications. In this paper, we present mixed integer programming (MIP) formulations to analyze multiple interior-disjoint-tree-based and mesh-based P2P media streaming for application level multicast (ALM). Network optimization is the key to simultaneously satisf...
Conference Paper
In this paper, we derive the formula to count broadcast trees based on the number of internal nodes in the tree. To the best of our knowledge, it is the first time that tree enumeration formulas based on the number of internal nodes in the tree have been explored and addressed. In addition, we give a new proof of Cayley's famous formula for countin...
Conference Paper
Expanders are potential mathematic tools to design robust computer networks and to analyze the formation and expansion of today's Internet. In this paper, we derive lower bounds regarding the expansion rate of Margulis expanders, lower bounds and upper bounds regarding the expansion rate of LPS expanders, for vertex set Z times Z . The two types of...
Conference Paper
Interference and energy-restriction are two of the most important technical challenges in the design of networking protocols in wireless ad hoc networks. The interference is an inherent problem for wireless communication and it is not easy to control. On the other hand, the lifetime of an ad hoc network totally relies on the power consumption of th...
Conference Paper
Voice traffic is not efficiently supported by CDMA EVDO Rev. A from its original design, but an efficient approach is needed to support voice traffic over CDMA EVDO Rev. A for graceful migration from CDMA2000 1x to CDMA EVDO Rev. A as voice service revenue is still the dominant income source for cellular service providers. To understand the system...
Conference Paper
Full-text available
Global flooding and expanding ring search are two commonly used methods in search for an interested object in multi-hop wireless networks. While global flooding is simple, it is not scalable for large networks. To take advantage of expanding ring search, a critical question must be answered: what is the best initial TTL (time-to-live) value for the...
Conference Paper
In this paper, we present a network-aware source coding (NASC) approach for wireless broadcast channels with multiple sources. The proposed NSAC approach takes into account the information of the network topology during the source coding process and the cross-layer design approach may be beneficial for wireless networks. We derive the optimal bound...
Article
Wireless communication has fundamental impairments due to multi-path fading, attenuation, reflections, obstructions, and noise. More importantly, it has historically been designed to mimic a physical wire; in concept other communicators in the same region are viewed as crossed wires. Many systems overcome these limitations by either speaking more l...
Conference Paper
ABSTRCT We conducted an empirical study of the clustering behavior of spammers and explored the group-based anti-spam strategies. We propose to block spammers as groups instead of dealing with each spam individually. We empirically observe that, with a certain grouping criteria such as having the same URL in the spam mail, the relationship among th...
Conference Paper
We study the routing problem for multi-hop wireless ad hoc networks based on cooperative transmission. We prove that the minimum energy cooperative path (MECP) routing problem, i.e., using cooperative radio transmission to find the best route with the minimum energy cost from a source node to a destination node, is NP-complete. We thus propose a co...
Conference Paper
We study the problem of minimum energy cooperative path (MECP) routing in wireless networks. The joint problem of cooperative routing in wireless networks that combines route selection and the transmit diversity was recently presented in A. Khandani et al. (2003). Several heuristic algorithms were also proposed in A. Khandani et al. (2003) to appro...
Article
Wireless sensor networks consist of a large number of tiny sensors that have only limited energy supply. One of the major challenges in constructing such networks is to main-tain long network lifetime as well as sufficient sensing areas. To achieve this goal, a broadly-used method is to turn off redundant sensors. In this paper, the problem of esti...
Article
Wireless sensor networks consist of a large number of tiny sensors that have only limited energy supply. One of the major challenges in constructing such networks is to maintain long network lifetime as well as su#cient sensing area. To achieve this goal, a broadly-used method is to turn o# redundant sensors. In this paper, the problem of estimatin...
Article
We study optimization methods for source-initiated energy-efficient broadcast in all-wireless networks. Past studies on energy-efficient broadcast (1,3,5) focus on deterministic optimization to construct an energy-efficient broadcast tree. We present a Random Tree Optimization (RTO) approach that transforms the deterministic optimization problem in...
Conference Paper
Real-time, mission-critical applications in mobile ad hoc networks, e.g., wireless sensor networks, have been seen for military battlefield operations, emergency relief for terrorist attacks, patient condition-monitoring in medical systems. We study fault-tolerant and distributed network protocols that support reliable, energy-efficient broadcastin...
Conference Paper
We study the construction of the source-initiated (one-to-all) wireless broadcast tree to minimize the total required power for a given source node, a group of intended destination nodes and a given propagation constant, ie, the power attenuation constant λ. The minimum energy broadcasting (MEB) problem has received much attention recently due to t...
Conference Paper
Full-text available
The conventional wisdom has been that IP is the natural protocol layer for implementing multicast related functionality. However, ten years after its initial proposal, IP Multicast is still plagued with concerns pertaining to scalability, network management, ...
Conference Paper
The IETF is currently focused on differentiated services (Diffserv) as the architecture to provide quality of service in IP networks (IP-QoS). The Diffserv architecture consists of two key components: traffic conditioning at the edge and per hop behaviour (PHB) at the core. Traffic conditioners are realized through various building blocks such as c...
Article
Periodic broadcast schemes have been proposed as a scalable solution for the implementation of Video--on-- Demand (VoD) systems. Efficient periodic broadcast schemes fragment each video into a number of segments assuming that the videos are encoded using Constant Bit Rate (CBR) coders. We focus instead on the more efficient and commonplace class of...
Conference Paper
Full-text available
Several proposals for video-on-demand (VoD) systems assume batching of the user requests and subsequent multicasting of the selected videos. We propose that the waiting time, which is essential for the sake of batching, can be overlapped with a more elaborate call admission scheme. The call admission scheme provides sufficient bandwidth at any poin...
Article
Full-text available
We study peer–to–peer (P2P) multicast streaming protocols for high bandwidth streams to large numbers of heterogeneous and transient users. First, the shortcomings of tree–based P2P schemes are discussed. Subsequently, a scalable swarm–based scheme is introduced that avoids maintaining a rigid logical topology. Peers self–organize into an unstructu...
Article
Full-text available
Periodic broadcast schemes have been proposed to solve the Media-on-Demand (MoD) distribution problem for the set of the most frequently requested media objects. Most of the current proposals for periodic broadcast schemes assume Constant-Bit-Rate (CBR) encoded media objects [1,2,5,9]. The few existing proposals for support of the bandwidth-efficie...
Article
We have conducted an empirical study of the community behavior of spammers, which has revealed various clustering structures among their population. Based on those structures (discovered solely by processing sighted spam mail), we propose a family of new spam-blocking techniques exploiting group membership of perceived spam sources. In particular,...
Article
Thesis (M.Sc.)--University of Alberta, 2000. Includes bibliographical references.

Network

Cited By