Peng Wang

Learn More
By posing the problem of bandwidth allocation as a constrained maximization problem, it is possible to study various features of optimal bandwidth allocation, and hence the capacity of the network. However, since the typical approach to this problem requires optimizing over a space that is exponential in the number of links, the problem has appeared to be(More)
It is well known that the maximum weighted independent set (MWIS) problem is NP-complete. Moreover, optimal scheduling in wireless networks requires solving a MWIS problem. Consequently, it is widely believed that optimal scheduling cannot be solved in practical networks. However , there are many cases where there is a significant difference between(More)
Commodity software components are intrinsically untrustworthy and it is highly insecure to use them directly in mission critical systems. The trustworthiness of a system can be only vaguely specified or achieved without a quantifiable level of assurance measurement of the components used in the system. While large amounts of research efforts have been(More)
At present, the adjustment of train operation plans is undertaken generally before a comparatively long planning horizon such as 3 hours by the dispatchers via the workstation of train scheduling, which can not meet the requirements of optimization and real-time processing in the networked operation with medium- and high-speed trains. This paper establishes(More)
There has been extensive research focused on maximizing the throughput of wireless networks in general and mesh networks in particular. Recently, techniques have been developed that reliably compute the maximum throughput of mesh networks. However, different approaches to throughput optimization make different assumptions on the physical layer's abilities.(More)
Interference and collisions greatly limit the throughput of mesh networks that use contention-based MAC protocols such as IEEE 802.11. Significantly higher throughput is achievable if transmissions are scheduled. However, traditional methods to compute optimal schedules are computationally intractable (unless co-channel interference is neglected). This(More)
The very long instruction word (VLIW) architecture is considered to be one of the promising methods of increasing performance beyond standard reduced instruction set computing (RISC) architectures. However, few generally-accepted VLIW simulation environments are available for us in exploring the VLIW instruction set architectures (ISA) and their(More)
Interference and collisions greatly limited the throughput of mesh networks that used contention-based MAC protocols such as 802.11. Significantly higher throughput is achievable if transmissions are scheduled. However, traditional methods to compute such schedules are so computationally complex that they can only be used on relatively small networks. This(More)