Yinxu Tang's research while affiliated with ShanghaiTech University and other places

Publications (9)

Article
In fog-assisted Internet-of-Things systems, it is a common practice to cache popular content at the network edge to achieve high quality of service. Due to uncertainties, in practice, such as unknown file popularities, the cache placement scheme design is still an open problem with unresolved challenges: 1) how to maintain time-averaged storage cos...
Article
In software-defined networking (SDN) systems, it is a common practice to adopt a multi-controller design and control devolution techniques to improve the performance of the control plane. However, in such systems the decision-making for joint switch-controller association and control devolution often involves various uncertainties, e.g., the tempor...
Preprint
In Fog-assisted IoT systems, it is a common practice to cache popular content at the network edge to achieve high quality of service. Due to uncertainties in practice such as unknown file popularities, cache placement scheme design is still an open problem with unresolved challenges: 1) how to maintain time-averaged storage costs under budgets, 2)...
Preprint
In software-defined networking (SDN) systems, it is a common practice to adopt a multi-controller design and control devolution techniques to improve the performance of the control plane. However, in such systems, the decision-making for joint switch-controller association and control devolution often involves various uncertainties, e.g., the tempo...

Citations

... Through a review on literature one can find three different approaches. First, there is research targeting specific topics of these tiers, such as data caching [2], [3], service deployment [4], computation offloading [5], [6], resource allocation [7], scheduling [8], [9], traffic grooming [10] or service decomposition [11], among others. Second, there is research that addresses these specific topics but they are contextualized in a specific domain. ...
... The experiment was emulated in a tree topology as shown in Figure 1, consisting of one RYU Controller [21], seven Open Virtual Switch (OvS) supporting the OpenFlow v.1.3.0 [22] (S1-S7), and eight hosts (H1-H8). The emulation process utilized the mininet-IoT emulator [23]. experiment's scenario, H1 was roled as an attacker who sent LRDDoS attack packets in the form of *.pcap files [24]. ...
... Their experimental results show that network operators can obtain higher profits by using collaboration between BSs. To maintain caching costs under budgets in the long run, Gao et al. [44] formulated the caching placement problem as a combinatorial Multi-armed Bandit (MAB) problem with long-term time-average constraints when the content popularity is unknown and proposed an auxiliary caching placement scheme that combines online learning and online control. This solution can control the caching cost for a long time, thereby maximizing the quality of service (QoS) gain. ...
... To do that, the task offloading problem is modeled as a combinatorial MAB problem, and a combinatorial bandit UCB algorithm is developed. In [46], a UAV task offloading problem based on MAB is addressed. Then, a variancereduced learning-aided task offloading scheme is developed. ...