Shaoyong Guo
Applied Filters
- Shaoyong Guo
- AuthorRemove filter
People
Roles
Publication
Journal/Magazine Names
- Wireless Communications & Mobile Computing (5)
- Computer Networks: The International Journal of Computer and Telecommunications Networking (3)
- IEEE Network: The Magazine of Global Internetworking (2)
- IEEE Transactions on Network and Service Management (2)
- IEEE Communications Magazine (1)
- IEEE Journal on Selected Areas in Communications (1)
- IEEE Transactions on Computers (1)
- IEEE Transactions on Mobile Computing (1)
- IEEE Transactions on Parallel and Distributed Systems (1)
- IEEE Transactions on Wireless Communications (1)
- International Journal of Network Management (1)
- Mobile Networks and Applications (1)
- Security and Communication Networks (1)
Proceedings/Book Names
- NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium (7)
- Artificial Intelligence and Security (3)
- 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) (2)
- Artificial Intelligence and Security (2)
- NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium (2)
- Artificial Intelligence and Security (1)
- Artificial Intelligence and Security (1)
- Artificial Intelligence and Security (1)
- CNSM '12: Proceedings of the 8th International Conference on Network and Service Management (1)
- ICCNT '10: Proceedings of the 2010 Second International Conference on Computer and Network Technology (1)
- ICIT '19: Proceedings of the 2019 7th International Conference on Information Technology: IoT and Smart City (1)
- NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium (1)
- Wireless Algorithms, Systems, and Applications (1)
- Wireless Algorithms, Systems, and Applications (1)
Publication Date
Export Citations
Publications
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-article
STAR-RIS Aided Covert Communication in UAV Air-Ground Networks
Qunshu Wang
School of Information and Communication Engineering, Dalian University of Technology, Dalian, China
,Shaoyong Guo
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
,Celimuge Wu
Department of Computer and Network Engineering, The University of Electro-Communications, Chofu, Tokyo, Japan
,Chengwen Xing
School of Information and Electronics, Beijing Institute of Technology, Beijing, China
,Nan Zhao
School of Information and Communication Engineering, Dalian University of Technology, Dalian, China
,Dusit Niyato
College of Computing and Data Science, Nanyang Technological University, Jurong West, Singapore
,George K. Karagiannidis
Department of Electrical and Computer Engineering, Aristotle University of Thessaloniki, Thessaloniki, Greece
IEEE Journal on Selected Areas in Communications, Volume 43, Issue 1•Jan. 2025, pp 245-259 • https://doi.org/10.1109/JSAC.2024.3460079The combination of a simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) and an unmanned aerial vehicle (UAV) can further improve channel quality and extend coverage. However, the high-quality air-to-ground link is ...
- 0Citation
MetricsTotal Citations0
- research-article
DPU-Enhanced Multi-Agent Actor-Critic Algorithm for Cross-Domain Resource Scheduling in Computing Power Network
Shuaichao Wang
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
,Shaoyong Guo
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
,Jiakai Hao
State Grid Beijing Information & Telecommunication Company, State Grid Beijing Electric Power Company, Beijing, China
,Yinlin Ren
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
,Feng Qi
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
IEEE Transactions on Network and Service Management, Volume 21, Issue 6•Dec. 2024, pp 6008-6025 • https://doi.org/10.1109/TNSM.2024.3434997The distribution of computing resources in the Computing Power Network (CPN) is uneven, leading to an imbalance in resource supply and demand within domains, necessitating cross-domain resource scheduling. To address the cross-domain resource scheduling ...
- 0Citation
MetricsTotal Citations0
- research-article
Dynamic ISAC Beamforming Design for UAV-Enabled Vehicular Networks
Xiaowei Pang
School of Information and Communication Engineering, Dalian University of Technology, Dalian, China
,Shaoyong Guo
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
,Jie Tang
School of Electronic and Information Engineering, South China University of Technology, Guangzhou, China
,Nan Zhao
School of Information and Communication Engineering, Dalian University of Technology, Dalian, China
,Naofal Al-Dhahir
Department of Electrical and Computer Engineering, The University of Texas at Dallas, Richardson, TX, USA
IEEE Transactions on Wireless Communications, Volume 23, Issue 11_Part_2•Nov. 2024, pp 16852-16864 • https://doi.org/10.1109/TWC.2024.3447779Utilizing unmanned aerial vehicles (UAVs) as aerial platforms to provide both sensing and communication services is envisioned as a promising paradigm, due to their inherent flexibility and maneuverability. In this paper, we propose a UAV-enabled sensing-...
- 0Citation
MetricsTotal Citations0
- research-article
End-to-End Network SLA Quality Assurance for C-RAN: A Closed-Loop Management Method Based on Digital Twin Network
Yinlin Ren
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
,Shaoyong Guo
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
,Bin Cao
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
,Xuesong Qiu
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
IEEE Transactions on Mobile Computing, Volume 23, Issue 5•May 2024, pp 4405-4422 • https://doi.org/10.1109/TMC.2023.3291012To enable intelligent and low-cost End-to-End (E2E) network service deployment and Service Level Agreement (SLA) quality management in the two-level Cloud Radio Access Network (C-RAN), this paper studies a DTN-based SLA quality closed-loop management ...
- 1Citation
MetricsTotal Citations1
- research-article
Resource sharing for collaborative edge learning: A privacy-aware incentive mechanism combined with demand prediction
Shiyou Chen
State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications, Beijing, 100876, China
,Lanlan Rui
State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications, Beijing, 100876, China
,Zhipeng Gao
State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications, Beijing, 100876, China
,Yang Yang
State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications, Beijing, 100876, China
,Xuesong Qiu
State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications, Beijing, 100876, China
,Shaoyong Guo
State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications, Beijing, 100876, China
Computer Networks: The International Journal of Computer and Telecommunications Networking, Volume 243, Issue C•Apr 2024 • https://doi.org/10.1016/j.comnet.2024.110302AbstractEdge intelligence benefits from ubiquitous resource capabilities by numerous edge devices. However, interest concerns and privacy issues caused by the openness of the edge network make smart devices reluctant to participate in collaborative edge ...
- 0Citation
MetricsTotal Citations0
- research-article
A multi-keyword searchable encryption sensitive data trusted sharing scheme in multi-user scenario
Miaomiao Wang
State Key Laboratory of Networking & Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
,Lanlan Rui
State Key Laboratory of Networking & Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
,Siya Xu
State Key Laboratory of Networking & Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
,Zhipeng Gao
State Key Laboratory of Networking & Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
,Huiyong Liu
State Key Laboratory of Networking & Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
,Shaoyong Guo
State Key Laboratory of Networking & Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
Computer Networks: The International Journal of Computer and Telecommunications Networking, Volume 237, Issue C•Dec 2023 • https://doi.org/10.1016/j.comnet.2023.110045AbstractSearchable encryption technology provides a solution for the trusted sharing of sensitive data. A large amount of encrypted data stored in data sharing servers can support keyword search without exposing data privacy, which has attracted more and ...
- 0Citation
MetricsTotal Citations0
- research-article
Multi-Agent Cooperative Game Based Task Computing Mechanism for UAV-Assisted 6G NTN
Sujie Shao
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Xitucheng Road 10, 100876, Beijing, Aisa, China
,Lili Su
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Xitucheng Road 10, 100876, Beijing, Aisa, China
,Shaoyong Guo
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Xitucheng Road 10, 100876, Beijing, Aisa, China
,Peng Yu
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Xitucheng Road 10, 100876, Beijing, Aisa, China
,Xuesong Qiu
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Xitucheng Road 10, 100876, Beijing, Aisa, China
Mobile Networks and Applications, Volume 28, Issue 4•Aug 2023, pp 1510-1518 • https://doi.org/10.1007/s11036-023-02264-xAbstractUnmanned Aerial Vehicle (UAV)-Assisted becomes promising prospects for the development of 6G non-terrestrial networks (NTN) due to their low cost, low latency, flexible coverage, and support for emergency response. UAVs utilize close-range multi-...
- 0Citation
MetricsTotal Citations0
- research-article
SFC Orchestration Method for Edge Cloud and Central Cloud Collaboration: QoS and Energy Consumption Joint Optimization Combined With Reputation Assessment
Lanlan Rui
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
,Shiyou Chen
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
,Shuyun Wang
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
,Zhipeng Gao
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
,Xuesong Qiu
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
,Wenjing Li
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
,Shaoyong Guo
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
IEEE Transactions on Parallel and Distributed Systems, Volume 34, Issue 10•Oct. 2023, pp 2735-2748 • https://doi.org/10.1109/TPDS.2023.3301670Network function virtualization (NFV) is an emerging technology that uses virtualization technology to provide various services in enterprise networks and reduce costs. However, in cloud edge networks, effective virtual network function (VNF) ...
- 0Citation
MetricsTotal Citations0
- research-article
IEEE 802.11ax Meet Edge Computing: AP Seamless Handover for Multi-Service Communications in Industrial WLAN
Sujie Shao
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunication, Beijing, China
,Juntao Zheng
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunication, Beijing, China
,Cheng Zhong
Plan and Design Center, Xiong’an New District Power Supply Company of State Grid Hebei Electric Power Company Ltd., Xiong’an, China
,Pengcheng Lu
Plan and Design Center, Xiong’an New District Power Supply Company of State Grid Hebei Electric Power Company Ltd., Xiong’an, China
,Shaoyong Guo
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunication, Beijing, China
,Xiande Bu
Information and Communication Research Institute, Global Energy Interconnection Research Institute Company Ltd., Nanjing, China
IEEE Transactions on Network and Service Management, Volume 20, Issue 3•Sept. 2023, pp 3396-3412 • https://doi.org/10.1109/TNSM.2023.3239404IEEE 802.11ax, as a new generation of wireless local area network (WLAN) standard, has great development potential for multi-service access in industrial WLAN with its characteristics of low-cost, quick-deployment and high-efficiency. However, it still ...
- 3Citation
MetricsTotal Citations3
- research-article
Blockchain-Assisted Privacy-Preserving Data Computing Architecture for Web3
Shaoyong Guo
Beijing University of Posts and Telecommunications,China
,Fan Zhang
Beijing University of Posts and Telecommunications,China
,Song Guo
Hong Kong Polytechnic University,Hong Kong
,Siya Xu
Beijing University of Posts and Telecommunications,China
,Feng Qi
Beijing University of Posts and Telecommunications,China
IEEE Communications Magazine, Volume 61, Issue 8•August 2023, pp 28-34 • https://doi.org/10.1109/MCOM.001.2200408Web3 has received a lot of attention since its emergence. It aims to provide users with more diverse and vivid web services as well as the complete control over their own data. To support the development of Web3, privacy-preserving decentralized data ...
- 1Citation
MetricsTotal Citations1
- research-article
Multi task dynamic edge–end computing collaboration for urban Internet of Vehicles
Sujie Shao
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
,Lili Su
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
,Qinghang Zhang
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
,Shuang Wu
State Grid Ningxia Electric Power CO.LTD., Yinchuan, Ningxia 750001, China
,Shaoyong Guo
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
,Feng Qi
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
Computer Networks: The International Journal of Computer and Telecommunications Networking, Volume 227, Issue C•May 2023 • https://doi.org/10.1016/j.comnet.2023.109690AbstractAs the future trend, more and more vehicles access to the Internet of Vehicles, which means that a huge number of tasks of the vehicle terminals need to be transformed and completed on the network. Edge computing makes the tasks executed on the ...
- 3Citation
MetricsTotal Citations3
- research-article
Decentralized AI-Enabled Trusted Wireless Network: A New Collaborative Computing Paradigm for Internet of Things
Sujie Shao
Beijing University of Posts and Telecommunications
,Juntao Zheng
Beijing University of Posts and Telecommunications
,Shaoyong Guo
Beijing University of Posts and Telecommunications
,Feng Qi
Beijing University of Posts and Telecommunications
,I Xuesong Qiu
Beijing University of Posts and Telecommunications
IEEE Network: The Magazine of Global Internetworking, Volume 37, Issue 2•March/April 2023, pp 54-61 • https://doi.org/10.1109/MNET.002.2200391With the innovative technology development and wide application in industrial Internet, internet of things (IoT) is increasingly showing the characteristics of regional autonomy and distributed decentralized interconnection. For its large-coverage and ...
- 2Citation
MetricsTotal Citations2
- Article
Federated Learning Meets Edge Computing: A Hierarchical Aggregation Mechanism for Mobile Devices
Jiewei Chen
State Key Laboratory of Networking and Switching Technology, Beijing University of Post and Telecommunications, Beijing, China
,Wenjing Li
State Grid Information and Communication Industry Co., Ltd., Beijing, China
,Guoming Yang
State Key Laboratory of Networking and Switching Technology, Beijing University of Post and Telecommunications, Beijing, China
,Xuesong Qiu
State Key Laboratory of Networking and Switching Technology, Beijing University of Post and Telecommunications, Beijing, China
,Shaoyong Guo
State Key Laboratory of Networking and Switching Technology, Beijing University of Post and Telecommunications, Beijing, China
Wireless Algorithms, Systems, and Applications•November 2022, pp 456-467• https://doi.org/10.1007/978-3-031-19211-1_38AbstractFederated learning (FL) has been proposed and applied in edge computing scenarios. However, the complex edge environment of wireless networks, such as limited device computing resources and unstable signals, leads to increase communication ...
- 0Citation
MetricsTotal Citations0
- Article
Multi-level Federated Learning Mechanism with Reinforcement Learning Optimizing in Smart City
Shaoyong Guo
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, 100876, Beijing, People’s Republic of China
,Baoyu Xiang
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, 100876, Beijing, People’s Republic of China
,Liandong Chen
Information and Telecommunication Branch, Stat Grid HeBei Electric Power Company Co., Ltd., Shijiazhuang, People’s Republic of China
,Huifeng Yang
Information and Telecommunication Branch, Stat Grid HeBei Electric Power Company Co., Ltd., Shijiazhuang, People’s Republic of China
,Dongxiao Yu
School Computer Science and Technology, Shandong University, Qingdao, People’s Republic of China
Artificial Intelligence and Security•July 2022, pp 441-454• https://doi.org/10.1007/978-3-031-06791-4_35AbstractWhile taking account into data privacy protection, federated learning can mine local data knowledge and gather data value, which has been widely concerned by the Smart city and Internet of Things. At present, a large amount of data is generated by ...
- 0Citation
MetricsTotal Citations0
- Article
Efficient Management and Analysis Mechanism of Power Internet of Things Resources Based on Blockchain
Liandong Chen
ICT Branch of State Grid Hebei Electric Power Co., Ltd., 050022, Hebei, China
,Rui Xin
ICT Branch of State Grid Hebei Electric Power Co., Ltd., 050022, Hebei, China
,Kai Cheng
ICT Branch of State Grid Hebei Electric Power Co., Ltd., 050022, Hebei, China
,Jing Lin
ICT Branch of State Grid Hebei Electric Power Co., Ltd., 050022, Hebei, China
,Shaoyong Guo
Beijing University of Posts and Telecommunications, 100876, Beijing, China
Artificial Intelligence and Security•July 2022, pp 550-559• https://doi.org/10.1007/978-3-031-06788-4_46AbstractIn order to solve the problems of low efficiency and insecurity in the analysis of heterogeneous network resources, this paper proposes a blockchain-based efficient management and analysis mechanism for power Internet of Things resources to ...
- 0Citation
MetricsTotal Citations0
- research-article
Federated Learning Empowered Edge Collaborative Content Caching Mechanism for Internet of Vehicles
Jingye Chi
Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology,Beijing,China
,Siya Xu
Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology,Beijing,China
,Shaoyong Guo
Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology,Beijing,China
,Peng Yu
Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology,Beijing,China
,Xuesong Qiu
Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology,Beijing,China
NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium•April 2022, pp 1-5• https://doi.org/10.1109/NOMS54207.2022.9789836With the development of smart traffic and assisted driving, the mobile edge computing and artificial intelligence technologies are seen as the key solutions in the internet of vehicles. However, the limited edge network resources and leakage of vehicle ...
- 0Citation
MetricsTotal Citations0
- research-article
Endogenous Trusted DRL-Based Service Function Chain Orchestration for IoT
Shaoyong Guo
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
,Yuanyuan Qi
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
,Yi Jin
State Grid Henan Information & Telecommunication Company (Data Center), Zhengzhou, Chain
,Wenjing Li
State Grid Information and Communication Industry Group Company Ltd., Beijing, China
,Xuesong Qiu
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
,Luoming Meng
State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China
IEEE Transactions on Computers, Volume 71, Issue 2•Feb. 2022, pp 397-406 • https://doi.org/10.1109/TC.2021.3051681With the development of the Internet of Things, trust has become a limited factor in the integration of heterogeneous IoT networks. In this regard, we use the combination of blockchain technology and SDN/NFV to build a heterogeneous IoT network resource ...
- 6Citation
MetricsTotal Citations6
- research-article
A System for Trusted Recovery of Data Based on Blockchain and Coding Techniques
Chi-Hua Chen,
Jinqian Chen
State Key Laboratory of Networking & Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing 100876Chinabupt.edu.cn
,Yong Yan
Electric Power Research InstituteZhejiang Electric Power CorporationHangzhou 310007Chinazepcc.com
,Shaoyong Guo
State Key Laboratory of Networking & Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing 100876Chinabupt.edu.cn
,Yinlin Ren
State Key Laboratory of Networking & Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing 100876Chinabupt.edu.cn
,Feng Qi
State Key Laboratory of Networking & Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing 100876Chinabupt.edu.cn
With the continuous development of information technology, the Internet of Things has also been widely used. At the same time, in the power Internet of Things environment, reliable data is essential for data use and accurate analysis. Data security has ...
- 3Citation
MetricsTotal Citations3
- research-article
Power IoT System Architecture Integrating Trusted Computing and Blockchain
Chi-Hua Chen,
Yong Yan
State Grid Zhejiang Electric Power Research InstituteHangzhouChina310014bupt.edu.cn
,Jinqian Chen
State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijingChina100876bupt.edu.cn
,Ying Yao
State Grid Zhejiang Electric Power Research InstituteHangzhouChina310014bupt.edu.cn
,Shaoyong Guo
State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijingChina100876bupt.edu.cn
,Ao Xiong
State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijingChina100876bupt.edu.cn
,Wang Zhang
State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijingChina100876bupt.edu.cn
With the construction of power Internet of Things, the network scale is constantly expanding, the network structure is increasingly complex, and the number of terminals is increasing rapidly, resulting in huge pressure on network security protection, and ...
- 1Citation
MetricsTotal Citations1
- research-article
Edge In-Network Computing Meets Blockchain: A Multi-Domain Heterogeneous Resource Trust Management Architecture
Linna Ruan
Beijing University of Posts and Telecommunications,China
,Shaoyong Guo
Beijing University of Posts and Telecommunications,China
,Xuesong Qiu
Beijing University of Posts and Telecommunications,China
,Luoming Meng
Beijing University of Posts and Telecommunications,China
,Shuang Wu
Ningxia Xintong Network Technology Co., Ltd,China
,Rajkumar Buyya
University of Melbourne,Australia
IEEE Network: The Magazine of Global Internetworking, Volume 35, Issue 5•September/October 2021, pp 50-57 • https://doi.org/10.1109/MNET.110.2100029In-network computing indicates the convergence of computing and network, which can be further considered as computing-based networking and network-enabled computing, from which comes the edge in-network computing paradigm. In this newly proposed paradigm, ...
- 0Citation
MetricsTotal Citations0
Author Profile Pages
- Description: The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM bibliographic database, the Guide. Coverage of ACM publications is comprehensive from the 1950's. Coverage of other publishers generally starts in the mid 1980's. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community.
Please see the following 2007 Turing Award winners' profiles as examples: - History: Disambiguation of author names is of course required for precise identification of all the works, and only those works, by a unique individual. Of equal importance to ACM, author name normalization is also one critical prerequisite to building accurate citation and download statistics. For the past several years, ACM has worked to normalize author names, expand reference capture, and gather detailed usage statistics, all intended to provide the community with a robust set of publication metrics. The Author Profile Pages reveal the first result of these efforts.
- Normalization: ACM uses normalization algorithms to weigh several types of evidence for merging and splitting names.
These include:- co-authors: if we have two names and cannot disambiguate them based on name alone, then we see if they have a co-author in common. If so, this weighs towards the two names being the same person.
- affiliations: names in common with same affiliation weighs toward the two names being the same person.
- publication title: names in common whose works are published in same journal weighs toward the two names being the same person.
- keywords: names in common whose works address the same subject matter as determined from title and keywords, weigh toward being the same person.
The more conservative the merging algorithms, the more bits of evidence are required before a merge is made, resulting in greater precision but lower recall of works for a given Author Profile. Many bibliographic records have only author initials. Many names lack affiliations. With very common family names, typical in Asia, more liberal algorithms result in mistaken merges.
Automatic normalization of author names is not exact. Hence it is clear that manual intervention based on human knowledge is required to perfect algorithmic results. ACM is meeting this challenge, continuing to work to improve the automated merges by tweaking the weighting of the evidence in light of experience.
- Bibliometrics: In 1926, Alfred Lotka formulated his power law (known as Lotka's Law) describing the frequency of publication by authors in a given field. According to this bibliometric law of scientific productivity, only a very small percentage (~6%) of authors in a field will produce more than 10 articles while the majority (perhaps 60%) will have but a single article published. With ACM's first cut at author name normalization in place, the distribution of our authors with 1, 2, 3..n publications does not match Lotka's Law precisely, but neither is the distribution curve far off. For a definition of ACM's first set of publication statistics, see Bibliometrics
- Future Direction:
The initial release of the Author Edit Screen is open to anyone in the community with an ACM account, but it is limited to personal information. An author's photograph, a Home Page URL, and an email may be added, deleted or edited. Changes are reviewed before they are made available on the live site.
ACM will expand this edit facility to accommodate more types of data and facilitate ease of community participation with appropriate safeguards. In particular, authors or members of the community will be able to indicate works in their profile that do not belong there and merge others that do belong but are currently missing.
A direct search interface for Author Profiles will be built.
An institutional view of works emerging from their faculty and researchers will be provided along with a relevant set of metrics.
It is possible, too, that the Author Profile page may evolve to allow interested authors to upload unpublished professional materials to an area available for search and free educational use, but distinct from the ACM Digital Library proper. It is hard to predict what shape such an area for user-generated content may take, but it carries interesting potential for input from the community.
Bibliometrics
The ACM DL is a comprehensive repository of publications from the entire field of computing.
It is ACM's intention to make the derivation of any publication statistics it generates clear to the user.
- Average citations per article = The total Citation Count divided by the total Publication Count.
- Citation Count = cumulative total number of times all authored works by this author were cited by other works within ACM's bibliographic database. Almost all reference lists in articles published by ACM have been captured. References lists from other publishers are less well-represented in the database. Unresolved references are not included in the Citation Count. The Citation Count is citations TO any type of work, but the references counted are only FROM journal and proceedings articles. Reference lists from books, dissertations, and technical reports have not generally been captured in the database. (Citation Counts for individual works are displayed with the individual record listed on the Author Page.)
- Publication Count = all works of any genre within the universe of ACM's bibliographic database of computing literature of which this person was an author. Works where the person has role as editor, advisor, chair, etc. are listed on the page but are not part of the Publication Count.
- Publication Years = the span from the earliest year of publication on a work by this author to the most recent year of publication of a work by this author captured within the ACM bibliographic database of computing literature (The ACM Guide to Computing Literature, also known as "the Guide".
- Available for download = the total number of works by this author whose full texts may be downloaded from an ACM full-text article server. Downloads from external full-text sources linked to from within the ACM bibliographic space are not counted as 'available for download'.
- Average downloads per article = The total number of cumulative downloads divided by the number of articles (including multimedia objects) available for download from ACM's servers.
- Downloads (cumulative) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server since the downloads were first counted in May 2003. The counts displayed are updated monthly and are therefore 0-31 days behind the current date. Robotic activity is scrubbed from the download statistics.
- Downloads (12 months) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 12-month period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (12-month download counts for individual works are displayed with the individual record.)
- Downloads (6 weeks) = The cumulative number of times all works by this author have been downloaded from an ACM full-text article server over the last 6-week period for which statistics are available. The counts displayed are usually 1-2 weeks behind the current date. (6-week download counts for individual works are displayed with the individual record.)
ACM Author-Izer Service
Summary Description
ACM Author-Izer is a unique service that enables ACM authors to generate and post links on both their homepage and institutional repository for visitors to download the definitive version of their articles from the ACM Digital Library at no charge.
Downloads from these sites are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to definitive version of ACM articles should reduce user confusion over article versioning.
ACM Author-Izer also extends ACM’s reputation as an innovative “Green Path” publisher, making ACM one of the first publishers of scholarly works to offer this model to its authors.
To access ACM Author-Izer, authors need to establish a free ACM web account. Should authors change institutions or sites, they can utilize the new ACM service to disable old links and re-authorize new links for free downloads from a different site.
How ACM Author-Izer Works
Authors may post ACM Author-Izer links in their own bibliographies maintained on their website and their own institution’s repository. The links take visitors to your page directly to the definitive version of individual articles inside the ACM Digital Library to download these articles for free.
The Service can be applied to all the articles you have ever published with ACM.
Depending on your previous activities within the ACM DL, you may need to take up to three steps to use ACM Author-Izer.
For authors who do not have a free ACM Web Account:
- Go to the ACM DL http://dl.acm.org/ and click SIGN UP. Once your account is established, proceed to next step.
For authors who have an ACM web account, but have not edited their ACM Author Profile page:
- Sign in to your ACM web account and go to your Author Profile page. Click "Add personal information" and add photograph, homepage address, etc. Click ADD AUTHOR INFORMATION to submit change. Once you receive email notification that your changes were accepted, you may utilize ACM Author-izer.
For authors who have an account and have already edited their Profile Page:
- Sign in to your ACM web account, go to your Author Profile page in the Digital Library, look for the ACM Author-izer link below each ACM published article, and begin the authorization process. If you have published many ACM articles, you may find a batch Authorization process useful. It is labeled: "Export as: ACM Author-Izer Service"
ACM Author-Izer also provides code snippets for authors to display download and citation statistics for each “authorized” article on their personal pages. Downloads from these pages are captured in official ACM statistics, improving the accuracy of usage and impact measurements. Consistently linking to the definitive version of ACM articles should reduce user confusion over article versioning.
Note: You still retain the right to post your author-prepared preprint versions on your home pages and in your institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library. But any download of your preprint versions will not be counted in ACM usage statistics. If you use these AUTHOR-IZER links instead, usage by visitors to your page will be recorded in the ACM Digital Library and displayed on your page.
FAQ
- Q. What is ACM Author-Izer?
A. ACM Author-Izer is a unique, link-based, self-archiving service that enables ACM authors to generate and post links on either their home page or institutional repository for visitors to download the definitive version of their articles for free.
- Q. What articles are eligible for ACM Author-Izer?
- A. ACM Author-Izer can be applied to all the articles authors have ever published with ACM. It is also available to authors who will have articles published in ACM publications in the future.
- Q. Are there any restrictions on authors to use this service?
- A. No. An author does not need to subscribe to the ACM Digital Library nor even be a member of ACM.
- Q. What are the requirements to use this service?
- A. To access ACM Author-Izer, authors need to have a free ACM web account, must have an ACM Author Profile page in the Digital Library, and must take ownership of their Author Profile page.
- Q. What is an ACM Author Profile Page?
- A. The Author Profile Page initially collects all the professional information known about authors from the publications record as known by the ACM Digital Library. The Author Profile Page supplies a quick snapshot of an author's contribution to the field and some rudimentary measures of influence upon it. Over time, the contents of the Author Profile page may expand at the direction of the community. Please visit the ACM Author Profile documentation page for more background information on these pages.
- Q. How do I find my Author Profile page and take ownership?
- A. You will need to take the following steps:
- Create a free ACM Web Account
- Sign-In to the ACM Digital Library
- Find your Author Profile Page by searching the ACM Digital Library for your name
- Find the result you authored (where your author name is a clickable link)
- Click on your name to go to the Author Profile Page
- Click the "Add Personal Information" link on the Author Profile Page
- Wait for ACM review and approval; generally less than 24 hours
- Q. Why does my photo not appear?
- A. Make sure that the image you submit is in .jpg or .gif format and that the file name does not contain special characters
- Q. What if I cannot find the Add Personal Information function on my author page?
- A. The ACM account linked to your profile page is different than the one you are logged into. Please logout and login to the account associated with your Author Profile Page.
- Q. What happens if an author changes the location of his bibliography or moves to a new institution?
- A. Should authors change institutions or sites, they can utilize ACM Author-Izer to disable old links and re-authorize new links for free downloads from a new location.
- Q. What happens if an author provides a URL that redirects to the author’s personal bibliography page?
- A. The service will not provide a free download from the ACM Digital Library. Instead the person who uses that link will simply go to the Citation Page for that article in the ACM Digital Library where the article may be accessed under the usual subscription rules.
However, if the author provides the target page URL, any link that redirects to that target page will enable a free download from the Service.
- Q. What happens if the author’s bibliography lives on a page with several aliases?
- A. Only one alias will work, whichever one is registered as the page containing the author’s bibliography. ACM has no technical solution to this problem at this time.
- Q. Why should authors use ACM Author-Izer?
- A. ACM Author-Izer lets visitors to authors’ personal home pages download articles for no charge from the ACM Digital Library. It allows authors to dynamically display real-time download and citation statistics for each “authorized” article on their personal site.
- Q. Does ACM Author-Izer provide benefits for authors?
- A. Downloads of definitive articles via Author-Izer links on the authors’ personal web page are captured in official ACM statistics to more accurately reflect usage and impact measurements.
Authors who do not use ACM Author-Izer links will not have downloads from their local, personal bibliographies counted. They do, however, retain the existing right to post author-prepared preprint versions on their home pages or institutional repositories with DOI pointers to the definitive version permanently maintained in the ACM Digital Library.
- Q. How does ACM Author-Izer benefit the computing community?
- A. ACM Author-Izer expands the visibility and dissemination of the definitive version of ACM articles. It is based on ACM’s strong belief that the computing community should have the widest possible access to the definitive versions of scholarly literature. By linking authors’ personal bibliography with the ACM Digital Library, user confusion over article versioning should be reduced over time.
In making ACM Author-Izer a free service to both authors and visitors to their websites, ACM is emphasizing its continuing commitment to the interests of its authors and to the computing community in ways that are consistent with its existing subscription-based access model.
- Q. Why can’t I find my most recent publication in my ACM Author Profile Page?
- A. There is a time delay between publication and the process which associates that publication with an Author Profile Page. Right now, that process usually takes 4-8 weeks.
- Q. How does ACM Author-Izer expand ACM’s “Green Path” Access Policies?
- A. ACM Author-Izer extends the rights and permissions that authors retain even after copyright transfer to ACM, which has been among the “greenest” publishers. ACM enables its author community to retain a wide range of rights related to copyright and reuse of materials. They include:
- Posting rights that ensure free access to their work outside the ACM Digital Library and print publications
- Rights to reuse any portion of their work in new works that they may create
- Copyright to artistic images in ACM’s graphics-oriented publications that authors may want to exploit in commercial contexts
- All patent rights, which remain with the original owner