Xia Zhang’s research while affiliated with Wuhan University of Technology and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (5)


Adaptive Data Transmission and Task Scheduling for High-Definition Map Update
  • Chapter

September 2021

·

13 Reads

Lecture Notes in Computer Science

Jiaxi Liu

·

Zhen Wang

·

·

[...]

·

Xia Zhang

In recent years, high-definition (HD) maps are considered to be significant complements to the on-board sensors of autonomous vehicles. Due to the highly dynamic characteristic of HD map, how to update HD maps fast and efficiently has become the pivotal issue which attracts great attentions. Currently, most of the research on this issue focuses on the crowdsourcing protocol design or specific updating method meanwhile disregarding the need of communication and computing resource in HD map update. Therefore, in this paper, we propose an integrated update framework including both an adaptive data transmission scheme and an adaptive task scheduling scheme to realize fast data collection and fast data processing for HD map update. To the best of our knowledge, this is the first work that addresses the problem of HD map update which takes the need of communication and computing resource into consideration. In this paper, we firstly illustrate the system architecture of our HD map update framework. Based on that, to realize fast data collection, we propose an adaptive data transmission scheme, which optimizes the transmission rate on different links of each vehicle considering the wireless channel capacity and fronthaul link capacity of the access points. Besides, to realize fast data processing, we propose an adaptive task scheduling scheme, which enables cooperative computing between the edge nodes and cloud computing server, considering the constraints of computing capacity and backhaul link capacity. To the end, we carry out simulations to verify the effectiveness of our proposed policies.





Citations (3)


... Additionally, verifiable query processing methods verify query results based on techniques such as authenticated data structure (ADS) [24][25][26][27][28], trusted hardware [29][30][31][32], as well as some cryptographic mechanisms containing multi-signature [9], and database fingerprint [33]. ...

Reference:

Improving query processing in blockchain systems by using a multi-level sharding mechanism
An Efficient Query Scheme for Privacy-Preserving Lightweight Bitcoin Client with Intel SGX
  • Citing Conference Paper
  • December 2019

... Further research is required to apply the load balancing technique [22] to maximize transfer throughput and avoid overload. Furthermore, the addition of performance tests on cloud security parameters is also necessary, such as firewall management [23], security, which is an important area in the cloud [24], and turnaround time to maximize cloud performance. ...

Privacy-Preserving Cloud-Based Firewall for IaaS-based Enterprise
  • Citing Conference Paper
  • July 2016

... Our mechanism does not focus on simultaneous delay and bandwidth optimization. The next mechanism described in [25] concentrates on communication between the controller and the switches in order to minimize signaling overhead. A separate pool of tags is used for various paths tagging (one per sourcedestination pair). ...

Using Path Label Routing in Wide Area Software-Defined Networks with OpenFlow
  • Citing Conference Paper
  • July 2016