Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Xiaoming Li is active.

Publication


Featured researches published by Xiaoming Li.


acm/ieee international conference on mobile computing and networking | 2014

Jigsaw: indoor floor plan reconstruction via mobile crowdsensing

Ruipeng Gao; Mingmin Zhao; Tao Ye; Fan Ye; Yizhou Wang; Kaigui Bian; Tao Wang; Xiaoming Li

The lack of floor plans is a critical reason behind the current sporadic availability of indoor localization service. Service providers have to go through effort-intensive and time-consuming business negotiations with building operators, or hire dedicated personnel to gather such data. In this paper, we propose Jigsaw, a floor plan reconstruction system that leverages crowdsensed data from mobile users. It extracts the position, size and orientation information of individual landmark objects from images taken by users. It also obtains the spatial relation between adjacent landmark objects from inertial sensor data, then computes the coordinates and orientations of these objects on an initial floor plan. By combining user mobility traces and locations where images are taken, it produces complete floor plans with hallway connectivity, room sizes and shapes. Our experiments on 3 stories of 2 large shopping malls show that the 90-percentile errors of positions and orientations of landmark objects are about 1~2m and 5~9°, while the hallway connectivity is 100% correct.


international conference on computer communications | 2014

Towards ubiquitous indoor localization service leveraging environmental physical features

Yang Tian; Ruipeng Gao; Kaigui Bian; Fan Ye; Tao Wang; Yizhou Wang; Xiaoming Li

Mainstream indoor localization technologies rely on RF signatures that require extensive human efforts to measure and periodically re-calibrate. Although recent crowdsourcing based work has started to address the issue, incentives are still lacking for wide user adoption. Thus the progress to ubiquitous localization remains slow. In this paper, we explore an alternative approach that leverages environmental physical features such as store logos or wall posters. A user uses a smartphone to obtain relative position measurements to such static reference points for the system to triangulate the user location. We study the principle of such localization, determine the suitable sensor, and devise guidelines for the user to choose reference points for better accuracy. To enable fast deployment, we propose a lightweight site survey method for service providers to quickly estimate the coordinates of reference points. We incorporate and enhance image matching algorithms with a heuristic technique to automatically identify chosen reference points at high accuracy. Extensive experiments have shown that the prototype achieves 4-5m accuracy at 80-percentile, comparable to the industry state-of-the-art, while covering a 150×75m mall and 300×200m train station requires a one time investment of only 2-3 man-hours from service providers.


mobile ad hoc networking and computing | 2014

A group-theoretic framework for rendezvous in heterogeneous cognitive radio networks

Lin Chen; Kaigui Bian; Cong Liu; Jung-Min Jerry Park; Xiaoming Li

In cognitive radio (CR) networks, a pair of CR nodes have to ``rendezvous on a common channel for link establishment. Channel hopping (CH) protocols have been proposed for creating rendezvous over multiple channels to reduce the possibility of rendezvous failures caused by the detection of primary user signals. Rendezvous within a minimal bounded time over multiple channels is a challenging problem in heterogeneous CR networks where two CR nodes may have asynchronous clocks, different sensing capabilities, no common universal channel set, and heterogeneous channel index systems. In this paper, we present a systematic approach using group theory for designing CH protocols that guarantee the maximum number of rendezvous channels and the minimal time-to-rendezvous (TTR) in heterogeneous environments. We derive the minimum upper bound of TTR, and propose two types of rendezvous protocols that are independent of environmental heterogeneity. Analytical and simulation results show that these protocols are resistant to rendezvous failures under various network conditions.


IEEE Transactions on Mobile Computing | 2016

Sextant: Towards Ubiquitous Indoor Localization Service by Photo-Taking of the Environment

Ruipeng Gao; Yang Tian; Fan Ye; Guojie Luo; Kaigui Bian; Yizhou Wang; Tao Wang; Xiaoming Li

Mainstream indoor localization technologies rely on RF signatures that require extensive human efforts to measure and periodically recalibrate signatures. The progress to ubiquitous localization remains slow. In this study, we explore Sextant, an alternative approach that leverages environmental reference objects such as store logos. A user uses a smartphone to obtain relative position measurements to such static reference objects for the system to triangulate the user location. Sextant leverages image matching algorithms to automatically identify the chosen reference objects by photo-taking, and we propose two methods to systematically address image matching mistakes that cause large localization errors. We formulate the benchmark image selection problem, prove its NP-completeness, and propose a heuristic algorithm to solve it. We also propose a couple of geographical constraints to further infer unknown reference objects. To enable fast deployment, we propose a lightweight site survey method for service providers to quickly estimate the coordinates of reference objects. Extensive experiments have shown that Sextant prototype achieves 2-5 m accuracy at 80-percentile, comparable to the industry state-of-the-art, while covering a 150 x 75 m mall and 300 x 200m train station requires a one time investment of only 2-3 man-hours from service providers.


IEEE Transactions on Vehicular Technology | 2014

Addressing the Hidden Terminal Problem for Heterogeneous Coexistence between TDM and CSMA Networks in White Space

Kaigui Bian; Jung-Min Park; Lin Chen; Xiaoming Li

Cognitive radio (CR) technologies have led to several wireless standards (e.g., IEEE 802.11af and IEEE 802.22) that enable secondary networks to access the TV white-space (TVWS) spectrum. Different unlicensed wireless technologies with different PHY/MAC designs are expected to coexist in the same TVWS spectrum-we refer to such a situation as heterogeneous coexistence. The heterogeneity of the PHY/MAC designs of coexisting CR networks can potentially exacerbate the hidden terminal problem. This problem cannot be addressed by the conventional handshaking/coordination mechanism between two homogeneous networks employing the same radio access technology. In this paper, we present a coexistence protocol, called Spectrum Sharing for Heterogeneous Coexistence (SHARE), that mitigates the hidden terminal problem for the coexistence between two types of networks: one that employs a time-division-multiplexing-based MAC protocol and one that employs a carrier-sense-multiple-access-based MAC protocol. Specifically, SHARE utilizes beacon transmissions and dynamic quiet periods to avoid packet collisions caused by the hidden terminals. Our analytical and simulation results show that SHARE reduces the number of packet collisions and guarantees weighted fairness in partitioning the spectrum among the coexisting secondary networks.


very large data bases | 2016

A shifting bloom filter framework for set queries

Tong Yang; Alex X. Liu; Muhammad Shahzad; Yuankun Zhong; Qiaobin Fu; Zi Li; Gaogang Xie; Xiaoming Li

Set queries are fundamental operations in computer systems and applications. This paper addresses the fundamental problem of designing a probabilistic data structure that can quickly process set queries using a small amount of memory. We propose a Shifting Bloom Filter (ShBF) framework for representing and querying sets. We demonstrate the effectiveness of ShBF using three types of popular set queries: membership, association, and multiplicity queries. The key novelty of ShBF is on encoding the auxiliary information of a set element in a location offset. In contrast, prior BF based set data structures allocate additional memory to store auxiliary information. We conducted experiments using real-world network traces, and results show that ShBF significantly advances the state-of-the-art on all three types of set queries.


international conference on computer communications | 2015

On heterogeneous neighbor discovery in wireless sensor networks

Lin Chen; Ruolin Fan; Kaigui Bian; Mario Gerla; Tao Wang; Xiaoming Li

Neighbor discovery plays a crucial role in the formation of wireless sensor networks and mobile networks where the power of sensors (or mobile devices) is constrained. Due to the difficulty of clock synchronization, many asynchronous protocols based on wake-up scheduling have been developed over the years in order to enable timely neighbor discovery between neighboring sensors while saving energy. However, existing protocols are not fine-grained enough to support all heterogeneous battery duty cycles, which can lead to a more rapid deterioration of long-term battery health for those without support. Existing research can be broadly divided into two categories according to their neighbor-discovery techniques - the quorum based protocols and the co-primality based protocols. In this paper, we propose two neighbor discovery protocols, called Hedis and Todis, that optimize the duty cycle granularity of quorum and co-primality based protocols respectively, by enabling the finest-grained control of heterogeneous duty cycles. We compare the two optimal protocols via analytical and simulation results, which show that although the optimal co-primality based protocol (Todis) is simpler in its design, the optimal quorum based protocol (Hedis) has a better performance since it has a lower relative error rate and smaller discovery delay, while still allowing the sensor nodes to wake up at a more infrequent rate.


IEEE Transactions on Mobile Computing | 2016

Multi-Story Indoor Floor Plan Reconstruction via Mobile Crowdsensing

Ruipeng Gao; Mingmin Zhao; Tao Ye; Fan Ye; Guojie Luo; Yizhou Wang; Kaigui Bian; Tao Wang; Xiaoming Li

The lack of floor plans is a critical reason behind the current sporadic availability of indoor localization service. Service providers have to go through effort-intensive and time-consuming business negotiations with building operators, or hire dedicated personnel to gather such data. In this paper, we propose Jigsaw, a floor plan reconstruction system that leverages crowdsensed data from mobile users. It extracts the position, size, and orientation information of individual landmark objects from images taken by users. It also obtains the spatial relation between adjacent landmark objects from inertial sensor data, then computes the coordinates and orientations of these objects on an initial floor plan. By combining user mobility traces and locations where images are taken, it produces complete floor plans with hallway connectivity, room sizes, and shapes. It also identifies different types of connection areas (e.g., escalators and stairs) between stories, and employs a refinement algorithm to correct detection errors. Our experiments on three stories of two large shopping malls show that the 90-percentile errors of positions and orientations of landmark objects are about 1~2m and 5~9°, while the hallway connectivity and connection areas between stories are 100 percent correct.


global communications conference | 2013

Ecology-inspired coexistence of heterogeneous wireless networks

Kaigui Bian; Jung-Min Jerry Park; Xiaojiang Du; Xiaoming Li

A number of wireless standards (e.g., IEEE 802.11af and IEEE 802.22) have been developed or are currently being developed for enabling opportunistic access in TV white space (TVWS) using cognitive radio (CR) technology. When heterogeneous CR networks that are based on different wireless standards operate in the same TVWS, coexistence issues can potentially cause major problems. Enabling collaborative coexistence via direct coordination between heterogeneous CR networks is very challenging due to incompatible MAC/PHY designs of coexisting networks. Moreover, the direct coordination would require competing networks or service providers to exchange sensitive control information that may raise conflict of interest issues and customer privacy concerns. In this paper, we present an architecture for enabling collaborative coexistence of heterogeneous CR networks over TVWS, called Symbiotic Heterogeneous coexistence ARchitecturE (SHARE). By mimicking the symbiotic relationships (i.e., the interspecific competition process) between heterogeneous organisms in a stable ecosystem, SHARE establishes an indirect coordination mechanism for spectrum sharing between heterogeneous CR networks via a mediator system, which avoids the drawbacks of direct coordination. Analytical and simulation results show that SHARE allocates spectrum among coexisting networks in a weighted-fair manner without any inter-network direct coordination.


IEEE Network | 2013

Enabling fair spectrum sharing: mitigating selfish misbehaviors in spectrum contention

Kaigui Bian; Jung-Min Park; Xiaojiang Du; Xiaoming Li

Cognitive radio (CR) technology enables multiple wireless networks operating in overlapping regions to opportunistically access fallow spectrum from a common pool of spectrum. This spectrum access paradigm - referred to herein as simply spectrum sharing - holds the promise of significantly greater efficiency in spectrum utilization and alleviating the spectrum shortage problem. CRs have garnered great attention from the research community, and many security and privacy problems relevant to CR networks are being studied actively at this time. However, selfish misbehaviors that can occur in the spectrum contention process have received little attention. In this article we discuss two types of selfish misbehaviors in the context of spectrum contention: selfish spectrum contention and selfish channel negotiation. These misbehaviors deteriorate the fairness and performance of spectrum sharing mechanisms in both infrastructure-based and multi-hop CR networks. We also discuss countermeasures against these threats as well as the technical challenges that must be overcome to implement such countermeasures.

Collaboration


Dive into the Xiaoming Li's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Fan Ye

Stony Brook University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Gaogang Xie

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge