Shengbin Liao

Learn More
Wireless sensor networks (WSNs) are energy-constrained, as a result, energy allocation and data transmission on sensor nodes are always considered together. However, current approaches ignore the multiple-hop nature of sensor networks, which results in the lack of modeling energy consumption in data relaying process. In this paper, we illustrate the(More)
Wireless sensor networks (WSNs) are energy- constrained in nature, in this paper, we formulate the problem of data transport in sensor networks as a network utility maximization (NUM) problem, but we argue that each source utility not only depends on its source rate, but also on the consumed energy, this leads to a coupled utility model, where the utilities(More)
In this paper, a model of network utility maximization (NUM) is presented for random access control in multi-hop wireless networks. Different from the classical NUM framework, our model considers the queueing stability. We propose a distributed iterative prices and link probabilities adaption algorithm by using dual decomposition techniques, which only(More)
Network utility maximization provides an important method for network architecture and distributed algorithm design. This method is often used in previous work as a determining utility model, but in practice the utility model of users in networks is stochastic. In this paper, stochastic network utility maximization is transform into determining model by(More)
Delay requirement becomes a key problem for the time sensitive applications in ad hoc wireless networks. This paper proposes a novel Network Utility Maximization (NUM) model with constrained delay for real-time applications in ad hoc wireless networks. By using dual decomposition techniques, we present a distributed iterative price and rate adaption(More)
With the rapid advancement in the network and communication technologies, intrusion detection becomes a very troublesome problem. An important method for intrusion detection is to model the dynamic behavior of network user based on Hidden Markov Models (HMM), but the HMM model requires strong independence assumptions between the observation sequences of the(More)
The rapid development of social networking has been observed in recent years. Social networking provides an online platform for building relationships, sharing some interested things, and interaction with other people. Due to these characteristics of social networking, this also brings a great chance for the interactive learning, which will be called(More)
Delay requirement becomes a key problem for the time sensitive applications in wireless sensor networks besides the power conservation issue. This paper proposes a novel Network Utility Maximization (NUM) model with constrained delay for real-time applications in wireless sensor networks. By using dual decomposition techniques, we present a distributed(More)
This paper presents a fast algorithm to locate and remove overlaid video timestamps for panorama video surveillance. The timestamp removal for panorama video surveillance is a challenge research problem because it allows a very short processing time and it requires to recovery the covered objects. And the existing general object localization methods cannot(More)
Computer-assisted instruction systems have been broadly applied to help students solve math problems, One of the challenges of intelligent instruction systems is how to make the machine automatically understand and recognize arithmetic operator characters. In this paper, we study the problem of automatic recognition of arithmetic operator characters based(More)