default search action
Cheng Huang 0002
Person information
- affiliation: Microsoft Research, Redmond, WA, USA
Other persons with the same name
- Cheng Huang — disambiguation page
- Cheng Huang 0001 — University of Waterloo, Department of Electrical and Computer Engineering, Ontario, Canada
- Cheng Huang 0003 — Sichuan University, Chengdu, China
- Cheng Huang 0004 — Iowa State University, Ames, IA, USA
- Cheng Huang 0005 — Southeast University, National ASIC Center, Nanjing, China
- Cheng Huang 0006 — Harbin University of Science and Technology, Heilongjiang Provincial Key Laboratory of Complex Intelligent System and Integration, Harbin, China
- Cheng Huang 0007 — Shanghai Jiao Tong University, UM-SJTU Joint Institute, Shanghai, China
- Cheng Huang 0008 — Cranfield University, School of Aerospace, Transport and Manufacturing, Cranfield, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [c27]Yaochen Hu, Yushi Wang, Bang Liu, Di Niu, Cheng Huang:
Latency reduction and load balancing in coded storage systems. SoCC 2017: 365-377 - [c26]Yu Lin Chen, Shuai Mu, Jinyang Li, Cheng Huang, Jin Li, Aaron Ogus, Douglas Phillips:
Giza: Erasure Coding Objects across Global Data Centers. USENIX ATC 2017: 539-551 - 2015
- [c25]Aditya Akella, Theophilus Benson, Balakrishnan Chandrasekaran, Cheng Huang, Bruce M. Maggs, David A. Maltz:
A Universal Approach to Data Center Network Design. ICDCN 2015: 41:1-41:10 - 2014
- [j4]Parikshit Gopalan, Cheng Huang, Bob Jenkins, Sergey Yekhanin:
Explicit Maximally Recoverable Codes With Locality. IEEE Trans. Inf. Theory 60(9): 5245-5256 (2014) - 2013
- [j3]Cheng Huang, Minghua Chen, Jin Li:
Pyramid Codes: Flexible Schemes to Trade Space for Access Efficiency in Reliable Data Storage Systems. ACM Trans. Storage 9(1): 3 (2013) - [i6]Parikshit Gopalan, Cheng Huang, Bob Jenkins, Sergey Yekhanin:
Explicit Maximally Recoverable Codes with Locality. CoRR abs/1307.4150 (2013) - [i5]Parikshit Gopalan, Cheng Huang, Bob Jenkins, Sergey Yekhanin:
Explicit Maximally Recoverable Codes with Locality. Electron. Colloquium Comput. Complex. TR13 (2013) - 2012
- [j2]Cheng Huang, Ivan Batanov, Jin Li:
A practical solution to the client-LDNS mismatch problem. Comput. Commun. Rev. 42(2): 35-41 (2012) - [j1]Parikshit Gopalan, Cheng Huang, Huseyin Simitci, Sergey Yekhanin:
On the Locality of Codeword Symbols. IEEE Trans. Inf. Theory 58(11): 6925-6934 (2012) - [c24]Dimitris S. Papailiopoulos, Jianqiang Luo, Alexandros G. Dimakis, Cheng Huang, Jin Li:
Simple regenerating codes: Network coding for cloud storage. INFOCOM 2012: 2801-2805 - [c23]Cheng Huang, Huseyin Simitci, Yikang Xu, Aaron Ogus, Brad Calder, Parikshit Gopalan, Jin Li, Sergey Yekhanin:
Erasure Coding in Windows Azure Storage. USENIX ATC 2012: 15-26 - 2011
- [c22]Viveck R. Cadambe, Cheng Huang, Jin Li, Sanjeev Mehrotra:
Polynomial length MDS codes with optimal repair in distributed storage. ACSCC 2011: 1850-1854 - [c21]Chao Zhang, Cheng Huang, Philip A. Chou, Jin Li, Sanjeev Mehrotra, Keith W. Ross, Hao Chen, Felix Livni, Jay Thaler:
Pangolin: speeding up concurrent messaging for cloud-based social gaming. CoNEXT 2011: 23 - [c20]Angela Wang, Cheng Huang, Jin Li, Keith W. Ross:
Estimating the performance of hypothetical cloud service deployments: A measurement-based approach. INFOCOM 2011: 2372-2380 - [c19]Cheng Huang, David A. Maltz, Jin Li, Albert G. Greenberg:
Public DNS system and Global Traffic Management. INFOCOM 2011: 2615-2623 - [c18]Viveck R. Cadambe, Cheng Huang, Jin Li:
Permutation code: Optimal exact-repair of a single failed node in MDS code based distributed storage systems. ISIT 2011: 1225-1229 - [c17]Chao Zhang, Cheng Huang, Keith W. Ross, David A. Maltz, Jin Li:
Inflight Modifications of Content: Who Are the Culprits? LEET 2011 - [c16]Yong Wang, Daniel Burgener, Marcel Flores, Aleksandar Kuzmanovic, Cheng Huang:
Towards Street-Level Client-Independent IP Geolocation. NSDI 2011 - [c15]Ye Wang, Cheng Huang, Jin Li, Philip A. Chou, Yang Richard Yang:
QoSaaS: Quality of Service as a Service. Hot-ICE 2011 - [i4]Viveck R. Cadambe, Cheng Huang, Syed Ali Jafar, Jin Li:
Optimal Repair of MDS Codes in Distributed Storage via Subspace Interference Alignment. CoRR abs/1106.1250 (2011) - [i3]Parikshit Gopalan, Cheng Huang, Huseyin Simitci, Sergey Yekhanin:
On the Locality of Codeword Symbols. CoRR abs/1106.3625 (2011) - [i2]Dimitris S. Papailiopoulos, Jianqiang Luo, Alexandros G. Dimakis, Cheng Huang, Jin Li:
Simple Regenerating Codes: Network Coding for Cloud Storage. CoRR abs/1109.0264 (2011) - [i1]Parikshit Gopalan, Cheng Huang, Huseyin Simitci, Sergey Yekhanin:
On the Locality of Codeword Symbols. Electron. Colloquium Comput. Complex. TR11 (2011) - 2010
- [c14]Jianqiang Luo, Cheng Huang, Lihao Xu:
Decoding STAR code for tolerating simultaneous disk failure and silent errors. DSN 2010: 61-70 - [c13]Amit Mondal, Cheng Huang, Jin Li, Manish Jain, Aleksandar Kuzmanovic:
A Case for WiFi Relay: Improving VoIP Quality for WiFi Users. ICC 2010: 1-5 - [c12]Amit Mondal, Ross Cutler, Cheng Huang, Jin Li, Aleksandar Kuzmanovic:
SureCall: Towards glitch-free real-time audio/video conferencing. IWQoS 2010: 1-9 - [c11]Sanjeev Mehrotra, Jin Li, Cheng Huang:
RAPID: a reliable protocol for improving delay. ACM Multimedia 2010: 1499-1500 - [c10]Abhinav Pathak, Angela Wang, Cheng Huang, Albert G. Greenberg, Y. Charlie Hu, Randy Kern, Jin Li, Keith W. Ross:
Measuring and Evaluating TCP Splitting for Cloud Services. PAM 2010: 41-50 - [c9]Cheng Huang, Nic Holt, Angela Wang, Albert G. Greenberg, Jin Li, Keith W. Ross:
A DNS Reflection Method for Global Traffic Management. USENIX ATC 2010
2000 – 2009
- 2009
- [c8]Angela Wang, Cheng Huang, Jin Li, Keith W. Ross:
Queen: Estimating Packet Loss Rate between Arbitrary Internet Hosts. PAM 2009: 57-66 - 2008
- [c7]Jiajun Wang, Cheng Huang, Jin Li:
On ISP-friendly rate allocation for peer-assisted VoD. ACM Multimedia 2008: 279-288 - [c6]Cheng Huang, Angela Wang, Jin Li, Keith W. Ross:
Understanding hybrid CDN-P2P: why limelight needs its own Red Swoosh. NOSSDAV 2008: 75-80 - 2007
- [c5]Cheng Huang, Jin Li, Keith W. Ross:
Peer-Assisted VoD: Making Internet Video Distribution Cheap. IPTPS 2007 - [c4]Minghua Chen, Cheng Huang, Jin Li:
On the Maximally Recoverable Property for Multi-Protection Group Codes. ISIT 2007: 486-490 - [c3]Cheng Huang, Minghua Chen, Jin Li:
Pyramid Codes: Flexible Schemes to Trade Space for Access Efficiency in Reliable Data Storage Systems. NCA 2007: 79-86 - [c2]Cheng Huang, Jin Li, Keith W. Ross:
Can internet video-on-demand be profitable? SIGCOMM 2007: 133-144 - 2006
- [c1]Jin Li, Cheng Huang:
DISCOVR: Distributed Collaborative Video Recorder. ICME 2006: 1413-1416
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint