Weibo Chu

Orcid: 0000-0001-5095-3596

According to our database1, Weibo Chu authored at least 17 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Joint Service Caching, Resource Allocation and Task Offloading for MEC-Based Networks: A Multi-Layer Optimization Approach.
IEEE Trans. Mob. Comput., April, 2024

Online optimal service caching for multi-access edge computing: A constrained Multi-Armed Bandit optimization approach.
Comput. Networks, 2024

On incentivizing resource allocation and task offloading for cooperative edge computing.
Comput. Networks, 2024

2023
Online Optimal Service Selection, Resource Allocation and Task Offloading for Multi-Access Edge Computing: A Utility-Based Approach.
IEEE Trans. Mob. Comput., July, 2023

2022
Pricing in the Open Market of Crowdsourced Video Edge Caching: A Newcomer Perspective.
Proceedings of the IEEE International Performance, 2022

2021
Jointly Optimizing Throughput and Content Delivery Cost Over Lossy Cache Networks.
IEEE Trans. Commun., 2021

2019
Sharing Cache Resources Among Content Providers: A Utility-Based Approach.
IEEE/ACM Trans. Netw., 2019

2018
Joint cache resource allocation and request routing for in-network caching services.
Comput. Networks, 2018

2017
Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches.
J. Comput. Sci. Technol., 2017

Sharing LRU Cache Resources among Content Providers: A Utility-Based Approach.
CoRR, 2017

2016
Network delay guarantee for differentiated services in content-centric networking.
Comput. Commun., 2016

On Allocating Cache Resources to Content Providers.
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016

2013
Real-time volume control for interactive network traffic replay.
Comput. Networks, 2013

Secure Cache Provision: Provable DDOS Prevention for Randomly Partitioned Services with Replication.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Protect sensitive sites from phishing attacks using features extractable from inaccessible phishing URLs.
Proceedings of IEEE International Conference on Communications, 2013

2012
Model-based real-time volume control for interactive network traffic replay.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

2010
Balance Based Performance Enhancement for Interactive TCP Traffic Replay.
Proceedings of IEEE International Conference on Communications, 2010


  Loading...