Kang G. SHIN教授简介

advertisement
Kang G. SHIN教授简介
KANG G. SHIN is the Kevin & Nancy O'Connor Professor of Computer
Science in the Department of Electrical Engineering and Computer Science,
the University of Michigan, Ann Arbor. His current research focuses on
computing systems and networks as well as on embedded real-time and
cyber-physical systems, all with emphasis on timeliness, security, and
dependability.
He has supervised the completion of 70 PhDs, and authored/coauthored
more than 770 technical articles (more than 270 of these are in archival
journals), one a textbook and more than 20 patents or invention disclosures,
and received numerous best paper awards, including the Best Paper Awards
from the 2011 ACM International Conference on Mobile Computing and
Networking (MobiCom’11), the 2011 IEEE International Conference on
Autonomic Computing, the 2010 and 2000 USENIX Annual Technical
Conferences, as well as the 2003 IEEE Communications Society William R.
Bennett Prize Paper Award and the 1987 Outstanding IEEE Transactions of
Automatic Control Paper Award. He has also received several institutional
awards, including the Research Excellence Award in 1989, Outstanding
Achievement Award in 1999, Distinguished Faculty Achievement Award in
2001, and Stephen Attwood Award in 2004 from The University of Michigan
(the highest honor bestowed to Michigan Engineering faculty); a
Distinguished Alumni Award of the College of Engineering, Seoul National
University in 2002; 2003 IEEE RTC Technical Achievement Award; and
2006 Ho-Am Prize in Engineering (the highest honor bestowed to
Korean-origin engineers).
He has chaired several major conferences, including 2009 ACM MobiCom,
2008 IEEE SECON, 2005 ACM/USENIX MobiSys, 2000 IEEE RTAS,
and 1987 IEEE RTSS. He is the fellow of both IEEE and ACM, and served
on editorial boards, including IEEE TPDS and ACM Transactions on
Embedded Systems. He has also served or is serving on numerous
government committees, such as the US NSF Cyber-Physical Systems
Executive Committee and the Korean Government R&D Strategy Advisory
Committee. He has also co-founded a couple of startups.
March 13, 2012 (Friday)
14:00~15:30
E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks
Kang G. Shin
Department of Electrical Engineering and Computer Science
The University of Michigan
WiFi interface is known to be a primary energy consumer in mobile devices, and idle
listening (IL) is the dominant source of energy consumption in WiFi. Most existing
protocols, such as the 802.11 power-saving mode (PSM), attempt to reduce the time
spent in IL by sleep scheduling. However, through an extensive analysis of real-world
traffic, we found more than 60% of energy is consumed in IL, even with PSM enabled.
To remedy this problem, we propose E-MiLi (Energy-Minimizing idle Listening) that
reduces the power consumption in IL, given that the time spent in IL has already been
optimized by sleep scheduling. Observing that radio power consumption decreases
proportionally to its clock-rate, E-MiLi adaptively downclocks the radio during IL, and
reverts to full clock-rate when an incoming packet is detected or a packet has to be
transmitted. E-MiLi incorporates sampling rate invariant detection (SRID), ensuring
accurate packet detection and address filtering even when the receiver's sampling
clock-rate is much lower than the signal bandwidth. Further, it employs an opportunistic
downclocking mechanism to optimize the efficiency of switching clock-rate, based on a
simple interface to existing MAC-layer scheduling protocols. We have implemented
E-MiLi on the USRP software radio platform. Our experimental evaluation shows that
E-MiLi can detect packets with close to 100% accuracy even with downclocking by a
factor of 16. When integrated with 802.11, E-MiLi can reduce energy consumption by
around 44% for 92% of users in real-world wireless networks.
(This is joint work with Xinyu Zhang and was presented at ACM MobiCom’11)
15:50~16:20
Talk 1: Bandwidth Guarantees in Wireless Networks
Abstract: Interference is the major concern for developing scheduling and
routing schemes in wireless networks. Due to interference, the path
bandwidth calculation in wireless networks is complicated than that in wired
networks. This talk gives some discussions about developing
interference-aware routing protocol in wireless networks, analyzes the affect
of the new wireless transmission techniques on the path bandwidth, and
proposes several open issue for provisioning QoS guarantees in future
wireless networks.
Presenter: Prof. Ronghui Hou
Bio: Ronghui Hou obtained her B.Eng., M. Eng., and Ph.D. degrees in
Communication Engineering from Northwestern Polytechnical University in
2002, 2005, and 2007, respectively. She worked as a Post-Doctoral Fellow in
the Department of Electrical and Electronic Engineering of the University of
Hong Kong between 2007 and 2009. Since December 2009 she has been
with Xidian University, China, where she is currently associate professor at
Department of Telecommunication Engineering. Her research interests
include network quality of service issues, routing algorithm design, and
wireless networks.
16:30~17:00
Talk 2: Full/Half Duplex Based Resource Allocations for Statistical Quality
of Service Provisioning in Wireless Relay Networks
Presenter: Dr. Wenchi Cheng
Abstract: Integrating information theory with the principle of effective
capacity, we propose the optimal resource allocation schemes for wireless
full duplex and half duplex relay networks, respectively, to support the
statistical quality-of-service (QoS) provisioning. In particular, we introduce
a new control parameter, termed cancellation coefficient, to characterize the
performance of full duplex relay transmission mode. For both
amplitude-and-forward (AF) and decode-and-forward (DF) relay networks,
we develop the dynamic hybrid resource allocation policies under full
duplex and half duplex transmission modes to maximize the network
throughput for the given delay QoS constraint measured by the QoS
exponent. The numerical results obtained verify that our proposed resource
allocation schemes can support diverse QoS requirements over wireless
relay networks under full duplex and half duplex transmission modes. Our
analysis indicates that the optimal effective capacity of perfect full duplex
transmission mode is not the just twice as much as the optimal effective
capacity of half duplex transmission mode. Our numerical analyses also
show that the hybrid transmission mode can achieve better performance than
just using full duplex or half duplex transmission mode alone.
Bio: Wenchi Cheng received the B.S. in 2008 and is currently working
towards to the Ph.D. degree under supervising of Prof. Hailin Zhang in
Xidian University.
His research interests include mobile wireless
communications and networks with emphasis on full-duplex transmission,
statistical QoS provisioning, energy efficient resource allocation, and
cognitive radio techniques. From 2010 to 2011, he worked as a visiting
scholar at Texas A&M University, College Station. He has published
multiple papers in IEEE INFOCOM, IEEE GLOBECOM, IEEE ICC, etc.
He received the student travel grants of MILCOM 2011 and
WUWNET2011.
March 16, 2012 (Monday)
08:80~10:00
Can Open WiFi Networks Be Lethal Weapons for Botnets?
Kang G. Shin
Department of Electrical Engineering and Computer Science
The University of Michigan
I will talk about the potential for highly mobile botnets to communicate and perform
nefarious actions using only open WiFi networks, which is termed mobile WiFi botnets.
We have designed and evaluated a proof-of-concept mobile WiFi botnet using
real-world mobility traces and actual open WiFi network locations for the urban
environment of San Francisco. Our extensive simulation results demonstrate that mobile
WiFi botnets can support rapid command propagation, with commands typically
reaching over 75% of the botnet only 2 hours after injection -- sometimes, within as
little as 30 minutes after injection. Our evaluation results also indicate that even a small
mobile WiFi botnet of only 536 bots can launch an effective DDoS
attack against poorly protected systems. Furthermore, mobile WiFi botnet C&C and
DDoS traffic is sufficiently distributed across multiple open WiFi networks -- with no
single network being over-utilized at any given moment -- to make detection difficult.
(This is joint work with Matt Knysz, Arun Ganesan, and Xin Hu)
10:20~10:50
Talk 1: Distributed Space-Time Coding for Full Duplex Asynchronous
Cooperative Communications
Presenter: Prof. Yi Liu
Abstract: This talk is about the design of STC for full duplex asynchronous
cooperative communications. Considering there is a loop interference
channel at the relay, we present two different methods to design STC which
can acheive asynchronous full diversity. We also investage the effects on
performance of the loop channel information error. Finally, we present some
simulation results to verify the theory.
Bio: Yi Liu received the B.S. degree in communication engineering from
Dalian Jiaotong University, Dalian, China, in 2002 and the M.S. and Ph.D.
degrees in communication engineering from Xidian University, Xi’an, China,
in 2005, and 2007, respectively. Since Jan. 2008, he has been with Xidian
University, Xi’an, China. From Mar. 2011 to Feb. 2012, he worked as a
visiting scholar in University of Delaware, USA. His research interests are in
signal processing for wireless communications, MIMO and OFDM wireless
communications, cooperative communications.
11:00~11:30
Talk 2: A Self-configuration Scheme for Power and Bandwidth Assignment
in Femtocell Networks
Presenter: Dr. Yinghong Ma
Abstract: Femtocells, as a new wireless access technology, can offload the
traffic of macrocells and help satisfy the requirements of high-data-rate
indoor wireless services. However, cross-tier interference coordination
becomes a challenge due to the unplanned deployment of large number of
Femtocells. This talk presents a novel strategy to reduce the cross-tier
interference while ensure high spectrum efficiency, which configures the
power and bandwidth of Femtocells jointly based on the estimation of QoS
requirements.
Bio: Yinghong Ma received her Ph.D. degree of Military Communications
in 2011 from Xidian University. She is now a lecturer with the School of
Telecommunications Engineering, Xidian University. She completed her
two-year research and training as a Visiting Student between Oct. 2008 and
Oct. 2010 in the Laboratory for Computational Neuroscience at University
of Pittsburgh, USA. Her current research interests include Cooperative
Communications, Cognitive Radio Networks, and Heterogeneous Wireless
Networks.
Download