I-Ling Yen's research while affiliated with University of Texas at Dallas and other places

Publications (231)

Preprint
Full-text available
Vehicle arrival time prediction has been studied widely. With the emergence of IoT devices and deep learning techniques, estimated time of arrival (ETA) has become a critical component in intelligent transportation systems. Though many tools exist for ETA, ETA for special vehicles, such as ambulances, fire engines, etc., is still challenging due to...
Preprint
Full-text available
In this paper, we consider the IoT data discovery problem in very large and growing scale networks. Through analysis, examples, and experimental studies, we show the importance of peer-to-peer, unstructured routing for IoT data discovery and point out the space efficiency issue that has been overlooked in keyword-based routing algorithms in unstruc...
Preprint
Full-text available
In this paper, we consider the IoT data discovery data objects to specific nodes in the network. They are very problem in very large and growing scale networks. Specifically, we investigate in depth the routing table summarization techniques to support effective and space-efficient IoT data discovery routing. Novel summarization algorithms, includi...
Preprint
Full-text available
In the last decade, many semantic-based routing protocols had been designed for peer-to-peer systems. However, they are not suitable for IoT systems, mainly due to their high demands in memory and computing power which are not available in many IoT devices. In this paper, we develop a semantic-based routing protocol for dynamic IoT systems to facil...
Article
Workload prediction has been widely researched in the literature. However, existing techniques are per‐job based and useful for service‐like tasks whose workloads exhibit seasonality and trend. But cloud jobs have many different workload patterns and some do not exhibit recurring workload patterns. We consider job‐pool‐based workload estimation, wh...
Conference Paper
Inter-vehicle communication has the potential to significantly improve driving safety, but also raises security concerns. The fundamental mechanism to govern information sharing behaviors is access control. Since vehicular networks have a highly dynamic and open nature, access control becomes very challenging. Existing works are not applicable to t...
Preprint
Many IoT systems are data intensive and are for the purpose of monitoring for fault detection and diagnosis of critical systems. A large volume of data steadily come out of a large number of sensors in the monitoring system. Thus, we need to consider how to store and manage these data. Existing time series databases (TSDBs) can be used for monitori...
Conference Paper
Full-text available
Many existing IoT systems are built with predefined tasks and system architecture. To make better use of the large number of “things” vailability in the IoT infrastructure, we consider to dynamically discover and compose IoT capabilities in the IoT network for new or dynamically arising tasks. To achieve the goal, we develop a semantic-based routi...
Conference Paper
Service ontology models have been applied to many application domains to facilitate the semantic rich specifications of various types of services, including the business processes, health care, manufacturing processes, etc. Recently, many service models for the Internet of Things (IoT) domain have been proposed. However, these models are still most...
Conference Paper
Full-text available
Internet of Things (IoT) interconnects billions of smart sensors, devices, actuators, as well as people, over a distributed environment to work together towards a better and smarter physical world. However, technologies are still under development to allow us to most effectively make use of the ubiquitous “smart things” to accomplish the desired go...
Article
Full-text available
The ability to find strong solutions to fully observable nondeterministic (FOND) planning problems, if they exist, is desirable because unlike weak and strong-cyclic solutions, strong solutions are guaranteed to achieve the goal. However, only limited work has been done on FOND planning with strong solutions. In this paper, we present a sound and c...
Article
The papers in this special section focus on cyber-physical systems and applications for their use. A cyber-physical system (CPS) integrates a vast variety of static and mobile resources, including sensor and actuator networks, swarms of robots, remote-controlled vehicles, critical infrastructures, control and decision software, static data and just...
Conference Paper
In cloud computing, good resource management can benefit both cloud users as well as cloud providers. Workload prediction is a crucial step towards achieving good resource management. While it is possible to estimate the workloads of long-running tasks based on the periodicity in their historical workloads, it is difficult to do so for tasks which...
Article
A key feature with service-oriented-architecture is to allow flexible composition of services into a business process. Although previous works related to service composition have paved the way for automatic composition, the techniques have limited applicability when it comes to composing complex workflows based on functional requirements, partly du...
Article
Socioeconomic needs combined with technological advances are creating a demand for an increasing number of systems for which high-assurance is an essential attribute. These system designs, which increasingly include semantic computing components, span a broad spectrum of applications. They are incredibly diverse and their complexity is growing. The...
Article
Role-based access control (RBAC) has been widely adopted in industrial and government. However, RBAC is only suitable for closed enterprise environment. Role mapping can be a tedious task for the security officers if it is done fully manually. Yet, performing role mapping automatically incur security risks. In this paper, we introduce a semiautomat...
Chapter
The collaboration of cyber physical systems poses many real-world challenges, such as knowledge restriction, resource contention, and communication limitation. Service oriented architecture has been proven effective in solving interoperability issues in the software engineering field. The semantic web service helps to automate service discovery and...
Article
This study, for the first time, presents a proxy blind signature scheme with message recovery. The proposed scheme is based on Tan et al.'s proxy blind signature scheme and Abe and Okamoto's signature scheme with message recovery.When practical hash functions are used in the place of truly random functions,the scheme is almost as efficient as the e...
Conference Paper
Full-text available
We present a planner for addressing a difficult, yet under-investigated class of planning problems: Fully Observable Non-Deterministic planning problems with strong solutions. Our strong planner employs a new data structure, MRDAG (multi-root directed acyclic graph), to define how the solution space should be expanded. We further equip a MRDAG with...
Conference Paper
Although previous works pertaining to Web service composition have paved the way for resolving the automatic composition issue with considering single IOPE goal, functional flexibility of service composition with complex workflow is not well-addressed. In this paper, we propose a novel service type, namely prospect service that possesses nondetermi...
Article
Enforcing access control in composite services is essential in distributed multidomain environment. Many advanced access control models have been developed to secure web services at execution time. However, they do not consider access control validation at composition time, resulting in high execution-time failure rate of composite services due to...
Conference Paper
Existing share access protocols require the client to retrieve all shares even for read accesses in order to achieve atomic semantics. In cloud storage with widely distributed servers, this implies significant communication latency (from client to the farthest server) and additional network traffic. In this paper, we consider a nearby share retriev...
Conference Paper
As the green house gas emission becomes a serious problem, a lot of researches now focus on how to monitor and manage carbon footprint (CF) of a production process or transportation, especially in the supply chain. Usually, most of the carbon footprint management systems are based on databases. But database is not sufficient in describing the produ...
Conference Paper
Many real-world applications are too complex to be specified by single goals. In this paper, we investigate the issues on how to compose such systems from existing services. First, we develop a multi-purpose model to specify the multiple goals of the system. Second, we develop planning techniques to achieve automated service composition and derive...
Article
In distributed systems, data may be correlated due to accesses from clients and the correlation has some impact on date placement, and existing research works focus on independent data objects. In this paper, we address both the scalability and the stability of the data placement solutions in internet environment. We first show that replica allocat...
Conference Paper
A lot of research works have devoted to automated web services composition. An important aspect of the composition procedure is exception handling. Due to the very large number of possible exceptions need to be considered, it is difficult and tedious to produce the exception handling steps manually in the composition process. However, the exception...
Conference Paper
Full-text available
Artificial intelligence (AI) planners have been widely used in many fields, such as intelligent agents, autonomous robots, web service compositions, etc. However, existing AI planners share a common problem: When given a problem to solve, they either return a solution if one exists or report that no solution is found. However, simply reporting fail...
Conference Paper
For deployed systems, software fault detection can be challenging. Generally, faulty behaviors are detected based on execution logs, which may contain a large volume of execution traces, making analysis extremely difficult. This paper investigates and compares the effectiveness and efficiency of various data mining techniques for software fault det...
Conference Paper
Although reuse is the main goal of SOA, composing existing services to realize different user requirements is still a difficult and time-consuming task. Research on workflow templates and design patterns can facilitate reuse and assist with the service composition task. Nevertheless, workflow templates are too specific, whereas design patterns may...
Article
In this paper, we consider the design issues in building robotic swarm systems as a service and develop a multi-level service-oriented robotic swarm (SORS) framework. First we consider how to support easy composition of services into workflows to accomplish user tasks. We identify a set of primitive virtual services for this purpose. Virtual servic...
Article
Information is an important element in all decision making processes. Also, the quality of information has to be assured in order to support proper decision making in critical systems. In this paper, we present a comprehensive solution to information assurance. First we develop an ontology of information quality metrics, which can be used in assess...
Article
Full-text available
The development of third-party hosting, IT outsourcing, service clouds, etc. raises important security concerns. It would be safer to encrypt critical data hosted by a third-parity, but meanwhile, the database should be able to process queries on encrypted data. Many research works have been developed to support search query processing on encrypted...
Chapter
In recent years, security issues in web service environments have been widely studied and various security standards and models have been proposed. However, most of these standards and models focus on individual web services and do not consider the security issues in composite services. In this article, the authors propose an enhanced security mode...
Article
Full-text available
The homomorphic encryption problem has been an open one for three decades. Recently, Gentry has proposed a full solution. Subsequent works have made improvements on it. However, the time complexities of these algorithms are still too high for practical use. For example, Gentry's homomorphic encryption scheme takes more than 900 seconds to add two 3...
Article
With limited economic and physical resources, it is not feasible to continually expand transportation infrastructure to adequately support the rapid growth in its usage. This is especially true for traffic coordination systems where the expansion of road infrastructure has not been able to keep pace with the increasing number of vehicles, thereby r...
Article
With the wide adoption of service computing, an extensive range of applications are being developed or converted into service-oriented paradigm. Some of the service based systems require video streaming during the interaction with their users. To facilitate a better viewing experience, this paper presents a dynamic adaption solution to provide best...
Conference Paper
Service-oriented architecture (SOA) has been widely adopted in the development of many net-centric application systems. In SOA, services potentially from different domains are composed together to accomplish critical tasks. In these systems, security and trustworthiness are the major concerns that have not been well addressed. Many access control m...
Conference Paper
The current trend in the silicon industry has been a steady migration towards Chip Multicore Processor (CMP) system to harvest more throughputs. However, chip multicore processors report higher values of soft errors, thereby degrading the overall system reliability. Hence, engineers have been wary of using CMP architectures for safety-critical embe...
Conference Paper
A swarm of robots deployed in dynamic, hostile environments may encounter situations that can prevent them from achieving optimality or completing certain tasks. To resolve these situations, the robots must have an adaptive software system that can proactively cope with changes. This adaptive system should emulate the intelligence of human reasonin...
Conference Paper
Full-text available
Model-driven development (MDD) drastically changes the traditional view of software modeling, which no longer serves merely as documentation that will be put aside at a certain point during the development. Instead, MDD has made models an integral part of the development process. As a result, software designers and developers can focus on high-leve...
Conference Paper
Full-text available
We propose a QoS and power management (QPM) framework for mobile devices making use of the service cloud. Several techniques for the realization of the QPM framework have been developed. First, we develop a function pool based prediction model to predict the power and QoS behaviors of the task activated by a mobile device. Based on the prediction,...
Conference Paper
Service cloud provides added value to customers by allowing them to compose services from multiple providers. Most existing web service security models focus on the protection of individual web services. When multiple services from different domains are composed together, it is critical to ensure the proper information flow on the chain of services...
Conference Paper
Robotic swarm systems have many important applications, such as assisting with search and rescue missions, exploring space-based environments, etc. They provide the capability of performing tasks that may be beyond the means of individual robots, such as carrying heavy loads, maneuvering over complex terrains, etc. For mission-critical and/or safet...
Article
Service-oriented architecture provides a framework for achieving rapid system composition and deployment. To satisfy different system QoS requirements, it is possible to select an appropriate set of concrete services and compose them to achieve the QoS goals. In addition, some of the services may be reconfigurable and provide various QoS tradeoffs....
Conference Paper
Full-text available
In a large-scale collaborative filtering system, pair wise similarity between users is usually measured by users' ratings on the whole set of items. However, this measurement may not be well defined due to the sparsity problem, i.e., the lack of adequate ratings on items for calculating accurate predictions. In fact, most correlated users have simi...
Conference Paper
Full-text available
We address a difficult, yet under-investigated class of planning problems: fully-observable nondeterministic (FOND) planning problems with strong cyclic solutions. The difficulty of these strong cyclic FOND planning problems stems from the large size of the state space. Hence, to achieve efficient planning, a planner has to cope with the explosion...
Article
The collaboration of cyber physical systems poses many real-world challenges, such as knowledge restriction, resource contention, and communication limitation. Service oriented architecture has been proven effective in solving interoperability issues in the software engineering field. The semantic web service helps to automate service discovery and...
Conference Paper
Full-text available
There have been works considering protocols for accessing partitioned data. Most of these works assume the local cluster based environment and their designs target atomic semantics. However, when considering widely distributed cloud storage systems, these existing protocols may not scale well. In this paper, we analyze the requirements of access pr...
Conference Paper
Full-text available
Most existing works on data partitioning techniques simply consider to partition data objects and distribute the shares to servers. Such pure data partitioning approaches may bring potential performance and scalability problems when used in widely distributed systems. First, it is difficult to apply lazy update. Second, the share consistency verifi...
Conference Paper
In this paper we develop a SCADA key management system to provide better security, performance, and scalability. Conventional symmetric key based approaches have several problems. We adopt public key based approaches due to its flexibility in authentication and access control and efficiency in rekeying. However, existing public key based approaches...
Conference Paper
Many research and development efforts have been devoted towards the design of dependable storage systems, but the effort in evaluating and comparing different designs for widely distributed environment is limited. In this paper, we develop models to evaluate the availability, security, and access performance of various storage designs for the cloud...
Conference Paper
Full-text available
In cloud computing, data, software, and hardware are wrapped as services, which are made available on demand. Given a demand, the associated services need to interact with each other to fulfill the task. As a result, service reuse and composition are inevitable. The current prevailing Web service composition paradigms follow the bottom-up manner, i...
Article
Full-text available
Ensuring secure information flow is a critical task for service composition in multi-domain systems. Research in security-aware service composition provides some preliminary solutions to this problem, but there are still issues to be addressed. In this paper, we develop a service composition mechanism specifically focusing on the secure information...
Conference Paper
Distributed governance is the process for individual entities in the system to make autonomous decisions in response to special situations. It is an important principle in governing the actions in cyber physical systems to achieve operation responsiveness. In this paper, we extend the widely adopted service-oriented architecture (SOA) paradigm to b...
Conference Paper
Service-oriented computing has become the most promising paradigm for system integration and interoperation. Many different models and mechanisms have been proposed to achieve security, dependability, real-time, etc. capabilities in service composition and execution. To facilitate the evaluation of these mechanisms, especially their performance imp...