Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Xavier De Foy is active.

Publication


Featured researches published by Xavier De Foy.


IEEE Systems Journal | 2018

Mobile Edge Cloud System: Architectures, Challenges, and Approaches

Hang Liu; Fahima Eldarrat; Hanen Alqahtani; Alex Reznik; Xavier De Foy; Yanyong Zhang

Mobile edge cloud (MEC) is a model for enabling on-demand elastic access to, or an interaction with a shared pool of reconfigurable computing resources such as servers, storage, peer devices, applications, and services, at the edge of the wireless network in close proximity to mobile users. It overcomes some obstacles of traditional central clouds by offering wireless network information and local context awareness as well as low latency and bandwidth conservation. This paper presents a comprehensive survey of MEC systems, including the concept, architectures, and technical enablers. First, the MEC applications are explored and classified based on different criteria, the service models and deployment scenarios are reviewed and categorized, and the factors influencing the MEC system design are discussed. Then, the architectures and designs of MEC systems are surveyed, and the technical issues, existing solutions, and approaches are presented. The open challenges and future research directions of MEC are further discussed.


wireless algorithms systems and applications | 2018

Experimental Study on Deployment of Mobile Edge Computing to Improve Wireless Video Streaming Quality

Li-Tse Hsieh; Hang Liu; Cheng-Yu Cheng; Xavier De Foy; Robert G. Gazda

Due to the rapid increase in wireless network traffic, especially video traffic, innovative network architectures and algorithms need be developed to reduce congestion and improve the quality of service (QoS). Multi-access edge computing or mobile edge computing (MEC) is a new paradigm that integrates computing and storage capabilities at the edge of the wireless network. In this paper, we design and implement a wireless access network-aware video streaming system based on the MEC concept, called Edge-Controlled Adaptive Streaming (ECAS). ECAS employs in-network video bitrate adaptation to improve data delivery efficiency. In our design, a MEC function intercepts HTTP requests from the client, and a rate adaptation mechanism is employed to decide the best video representation for the client. Updated HTTP requests, with modified video rates based on the adaptation decision, are forwarded to the video server. We also design a resource allocation and streaming bitrate adaptation algorithm to achieve the overall optimization of multiple video streams, with fairness, subject to wireless transmission capacity constraint. This network-assisted adaptive streaming approach allows more accurate estimation of wireless network states and can enhance the QoS of multiple video streams. A prototype is implemented to prove the concept, and the experimental results demonstrate that the proposed scheme significantly improves video streaming performance compared to the de facto standard video streaming technique, Dynamic Adaptive Streaming over HTTP (DASH).


long island systems, applications and technology conference | 2014

Use of Bloom Filters to convey identity of surveillance targets

John Cartmell; Xavier De Foy

Local data offload performed at a small cell is not commercially deployed as a result of lawful interception issues. Previous work has described a solution to address these issues where a local node performs the same lawful interception functions as is done within the mobile core network for traffic that is offloaded at that local node. However, one issue with this solution is how to transfer the identities of those under surveillance to the local node. Passing the actual identities of targets of surveillance could comprise the required secretive nature of the surveillance. Another issue with the original solution is that by examining the traffic through a small cell, an unauthorized person could determine that a users traffic is not being locally offloaded; thereby perhaps indicating that person is a target of surveillance. In this paper, we propose the use of Bloom Filters to convey the identities of those subscribers who are the target of surveillance. The solution is presented and an analysis is included to demonstrate the benefits of the solution. This paper demonstrates that the use of the Bloom Filter hides the identities of the subscribers who are under surveillance. As well, the paper demonstrates that the false positives that occur with a Bloom Filter are actually a benefit from a perspective of obfuscating who is the actual target of surveillance.


Archive | 2012

Method and apparatus for distribution and reception of content

Osama Lotfallah; Hang Liu; Xavier De Foy


Archive | 2012

Content Delivery Network Interconnection (CDNI) Mechanism

Xavier De Foy; Hang Liu; Osama Lotfallah; Samir Ferdi; Martin Jolicoeur; Serhad Doken


Archive | 2012

METHOD AND APPARATUS FOR PROVIDING INTERFACING BETWEEN CONTENT DELIVERY NETWORKS

Xavier De Foy; Hang Liu; Serhad Doken; Osama Lotfallah; Shamim Akbar Rahman


international conference on networking | 2012

A multi-level DHT routing framework with aggregation

Hang Liu; Xavier De Foy; Dan Zhang


Archive | 2012

Wireless peer-to-peer network topology

Osama Lotfallah; Milan Patel; Xavier De Foy; Debashish Purkayastha; Hang Liu; Kamel M. Shaheen


Archive | 2013

Systems and Methods for Personalizing and/or Tailoring A Service Interface

Alexander Reznik; Yogendra C. Shah; Eldad Zeira; Ravikumar V. Pragada; Balaji Raghothaman; Kiran K. Vanganuru; Gregory S. Sternberg; Vinod Kumar Choyi; Xavier De Foy


Archive | 2016

METHOD AND APPARATUS FOR NAME RESOLUTION IN SOFTWARE DEFINED NETWORKING

Xavier De Foy; Hang Liu; Hao Jin

Collaboration


Dive into the Xavier De Foy's collaboration.

Top Co-Authors

Avatar

Hang Liu

The Catholic University of America

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge