STROKE MUNG CHIANG “You Never Know How Strong You Are Until Being Dr

Total Page:16

File Type:pdf, Size:1020Kb

STROKE MUNG CHIANG “You Never Know How Strong You Are Until Being Dr 6 Indy Asian American Times Friday, May 05, 2017 Community 社区 2017 年 05月 05日 星期五 PURDUE NAMES STROKE MUNG CHIANG “You never know how strong you are until being Dr. Patrick Lau was strong is your only choice.” ~Bob Marley born in Hong Kong and ENGINEERING DEAN immigrated to the U.S. after high school. He said Purdue President Mitch Daniels. “Dr. Chiang’s retired from the VA personal research achievements, entrepreneurial Northern Indiana Heath success record, and international reputation, combined Care System where he served as Chief Radiologist with our recent major investments in our College of and moved to Florida Engineering, truly positions us for world leadership.” with his wife in 2011. He Chiang comes to Purdue from Princeton University, was an active member & He is the Arthur LeGrand Doty Professor of Electrical contributor of IACA and Engineering at Princeton University, where in 2013 May is National Stroke Awareness Month. Stroke ICMA while in Indiana. he received the National Science Foundation Alan T. is the fifth leading cause of death, killing almost Dr. Lau is also a scholar Waterman Award. Purdue says the award is one of the 135,000 Americans annually. And approximately of art and literature and highest honors given to young scientists and engineers 795,000 people suffer from a stroke every year. It is a a prolific writer, he has in the country. leading cause of serious disability; almost one in three been a dedicated columnist survivors is permanently disabled, and many more for Indy Asian American “Purdue’s College of Engineering is one of the Times since 2010. strongest and one of the largest in the country,” said necessitate long-term care. Chiang. “Its recent growth is remarkable, and its future A stroke occurs when the blood supply to part of the Arms. Ask the person to raise both arms. Does one even brighter. I am humbled by the honor to serve brain is blocked (an ischemic stroke) or when a blood arm drift downward? Or is one arm unable to raise up? vessel of the brain bursts (a hemorrhagic stroke). this outstanding college, one that is part of a public Speech. Ask the person to repeat a simple phrase. Is Ischemic Stroke.It accounts for about 85% of all university under the visionary leadership of President the speech slurred or strange? Purdue University has named Mung Chiang dean of strokes; there are 2 types of ischemic strokes: Time. If you observe any of these symptoms, it’s the College of Engineering. Chiang, who will begin his Daniels. I am eager to start by listening carefully to 1. Thrombotic stroke occurs when a thrombus the faculty, students, staff and alumni of Purdue time to call 911 immediately.A stroke is a medical new role in July, will succeed Leah Jamieson, who is (blood clot) forms in one of the arteries supplying emergency, prompt treatment can minimize brain Engineering.” stepping down to assume full-time faculty duties in the blood to the brain. A blood clot can arise at a spot of damage, disability and other complications. Purdue School of Electrical and Computer Engineering. Purdue says Chiang main research focus is on already narrowed arteries damaged by the buildup of Lifestyle risk factorsof stroke include: Cigarette Chiang was one of three finalists for the position computing and networking, and information sciences a cholesterol-filled plaque (atherosclerosis), blocking smoking or exposure to secondhand smoke; Being blood flow to part of the brain. Within minutes, brain selected after a national search. He was ultimately and systems. overweight or obese; Physical inactivity; A salty diet; cells in this area begin to die, leading to permanent chosen for the position by a 15-member search Mung Chiang was born in 1977 in Tianjin, China, Heavy or binge drinking; Use of illicit drugs such according to online reports. He received bachelor’s physical or mental damage. as cocaine and methamphetamines; Use of anabolic committee after each finalist visited the campus in late 2. Embolic stroke occurs when an embolus (blood March and early April. and advanced degrees from Stanford University and steroids and other drugs, caffeine and pseudoephedrine has been awarded about 20 U.S. patents for various clot or a fragment of plaque) originates elsewhere in decongestants have been suspected of boosting stroke “Purdue has recruited one of the genuine superstars the circulatory system usually the heart or the carotid technological innovations. risk. of American engineering and higher education,” artery in the neck, traveling through the bloodstream Medical risk factorsof stroke include: High blood and becomes wedged in a brain artery, shutting off the pressure is the #1 cause of stroke, it increases the risk of blood supply to a brain region. stroke 4-6 times, treatment can decrease stroke by 38% PURDUE HYDRAULIC BIKE Transient ischemic attack TIA (also known as a and decrease stroke fatality by 40%; High cholesterol ministroke) is a brief episode of stroke-like symptoms level;Diabetes; Cardiovascular diseases including DESIGN WINS NATIONAL that often last for a few minutes to a few hours; then heart failure, heart valve diseases, heart defects, the symptoms completely resolve. It occurs when a atrial fibrillation AFib(irregular heartbeat, 15–20% blood clot or debris temporarily blocks blood flow of people who have strokes have AFib), and carotid COMPETITION to part of the brain. It raises the possibility there is artery disease (carotid arteries in the neck that lead to a partially blocked or narrowed artery leading to the brain damaged and narrowed by a buildup of plaque brain, or a blood clot often originated from the heart. may become blocked by a blood clot causing a stroke, In patients who have a TIA, the incidence of stroke is it’s a major cause of stroke); Atherosclerosis;Personal as high as 11% over the next 7 days and 24-29% over or family history of stroke, heart attack or TIA; Being the following 5 years. age 55 or older; Genetic or congenital conditions, Hemorrhagic Stroke. It accounts for 15% of all particularly vascular malformation; Obstructive sleep strokes, but it is responsible for about 40% of all apnea; African-Americans; Certain blood disorders stroke deaths. It occurs when an artery which supplies such as sickle cell anemia; Men have a higher risk of blood to part of the brain develops a tear or ruptures. strokes, women have deadlier strokes. It destroys brain cells by disrupting the brain’s blood Emerging medical risk factors may include migraine; supply and the leaking blood exerts pressure on brain gum disease;elevated lipoprotein (a); elevated High- tissues.There are 2 types of hemorrhagic stroke: sensitivity C-reactive protein; certain infections and 1. Intracerebral hemorrhage (bleeding inside the inflammatory diseases. brain). Anartery within the brain tears or ruptures A healthy lifestyle can reduce the risk of stroke by and spews blood into the surrounding brain tissue. 80%. Don’t smoke; If you drink alcohol, do so in It is usually caused by uncontrolled high blood moderation; Exercise regularly; Maintain a healthy pressure; other causes include trauma, overtreatment weight, lose weight if needed and keep your body mass with anticoagulants (blood-thinning medications), index (BMI) at 25 or less; Eat a healthy diet low in and arteriovenous malformation AVM (a tangle of sodium (salt) and rich in potassium; Avoid trans fats abnormally formed blood vessels). and foods with high cholesterol and high saturated 2. Subarachnoid hemorrhage.An artery on or near fats; Eat at least 5 servings of fruits and vegetables the surface of the brain bursts and spills blood between every day, one serving of fish 2 times per week, and layers of the brain’s protective outer membranes. The several servings of whole grains daily. most common cause not associated with trauma is Control blood pressure, if needed, take anti- from a rupture of an aneurysm. hypertensive medicines; Control cholesterol levels, Symptoms of stroke include: Sudden weakness, if indicated, take cholesterol-lowering medications numbness, tingling or paralysis of the face, arm such as statins; If you have diabetes, control blood or leg especially on one side of the body; Sudden sugar level; If you have had TIA or a stroke, you confusion, trouble talking, slurred speech, loss of may be treated with aspirin or other antiplatelet or speech or understanding speech; Sudden visual anticoagulant drugs; If you have cardiovascular disease disturbance including blurry, dimness, double vision particularly heart valve diseases, atrial fibrillation or or loss of vision in one or both eyes; Sudden difficulty carotid artery disease, get it treated; Treat obstructive The team also developed a smartphone app into the bicycle design. walking, dizziness, staggering, loss of balance, loss of sleep apnea, if present; and Avoid illicit drugs.Discuss coordination or falling; Sudden, lasting excruciating A Purdue University student team’s design of a and agricultural and biological engineering Andrea with your physician to evaluate your risk for stroke and headache which may be accompanied by neck stiffness help you control your risk factors. bicycle powered by motors and hydraulic pumps has Vacca says a rider can hand-pump the accumulator vomiting, dizziness or altered consciousness taken first place in a national competition. The Purdue beforehand, allowing for “about 500 meters of travel F.A.S.T. test can tell if a person might be having a Sources:American Stroke Association, Mayo Clinic, Tracer, which won first place at the National Fluid without pedaling.” stroke: Power Association Fluid Power Vehicle Challenge, is The team also developed a smartphone app into the Face. Ask the person to smile. Does one side of the Harvard, Cleveland Clinic, National Institute of designed to be powered without pedaling.
Recommended publications
  • Fog Computing and Networking: Part 2
    GUEST EDITORIAL FOG COMPUTING AND NETWORKING: PART 2 Mung Chiang Sangtae Ha Chih-Lin I Fulvio Risso Tao Zhang ue to the large number of submissions responding to the “A Fog Operating System for User-Oriented IoT Services: Chal- Call for Papers on “Fog Computing and Networking,” the lenges and Research Directions” presents the high-level introduc- Guest Editors selected additional papers based on reviewer tion of a fog computing architecture for IoT services, FogOS. It is Dcomments that are now published in Part 2. The overview provided composed of service/resource abstraction, a resource manager, an by the Guest Editors in the form of Q&A was published in Part 1 in application manager, and edge resource identification/registration. April. Here, in this August issue of the magazine, we continue to see The article further identifies some of the challenges facing IoT services a range of perspectives, some qualitative and others quantitative. and possible solutions through FogOS; notably, how the diversity and Collectively, they expand the scope of edge research labs that started heterogeneity of IoT services and edge devices can be managed. a decade ago to the current momentum in fog research and deploy- In “A Hierarchical Game Framework for Resource Management ment and academia-industry collaboration such as the OpenFog Con- in Fog Computing,” the authors consider a scenario with three types sortium. In the following, we briefly overview the articles in this issue. of entities: fog nodes (FNs), authorized data service subscribers In “Architectural Imperatives for Fog Computing,” the author (ADSSs), and data service operators (DSOs).
    [Show full text]
  • Fall 2019 Newsletter
    CHEMICAL ENGINEERING NEWSLETTER Purdue Chemical Engineering Hosts Varma Memorial Symposium FALL 2019 CHARLES D. DAVIDSON Excellence Excellence at Scale SCHOOL OF CHEMICAL ENGINEERING Cost-Effective Excellence at Scale MESSAGE FROM THE HEAD The words “pinnacle of excellence at scale” continue as the hallmark of Chemical Engineering at Purdue. With over 800 undergraduate and graduate students enrolled in our School, our major moves and initiatives such as eight consecutive years of frozen tuition and enlistment of 94% of the graduating seniors as AICHE professional members, move the needle—literally and figuratively altering the trajectory of chemical engineering in the nation and the world. In this issue, we honor the memory and legacy of one man–Arvind Varma–who has done more than anyone else in the past 15 years to position Purdue Chemical Engineering to have such an impact. Highlights from the Arvind Varma Memorial Symposium and memorable moments from Arvind’s career are featured on pages 4‑8 of this newsletter. Arvind leaves a great void and will be missed by the entire Purdue Chemical Engineering community. Purdue Chemical Engineering Undergraduate Class of 2019 Graduating Seniors - 139 Sangtae "Sang" Kim Distinguished Professor Number of Women - 55 Jay and Cynthia Ihlenfeld Head of Chemical Engineering Number of Men - 84 Average Starting Salary - $76,934 As Purdue Grows, So Grows Chemical Engineering Enrollment at Purdue University's West Lafayette campus is the highest ever at 44,551 students, with 33,646 undergraduates. The Fall 2019 incoming class numbered 8,056 students, with 4,057 Indiana residents. Based on the high level of academic achievements and preparation, this year's class is Purdue's best to date.
    [Show full text]
  • From Technological Networks to Social Networks Kwang-Cheng Chen, Fellow, IEEE Mung Chiang, Fellow, IEEE and H
    548 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS/SUPPLEMENT, VOL. 31, NO. 9, SEPTEMBER 2013 From Technological Networks to Social Networks Kwang-Cheng Chen, Fellow, IEEE Mung Chiang, Fellow, IEEE and H. Vincent Poor, Fellow, IEEE Abstract—Social networks overlaid on technological networks information acquisition for physical layer topology played a account for a significant fraction of Internet use. Through graph key role in the early stages of Internet development [10], [11]. theoretic and functionality models, this paper examines social Comprehensive reviews of work on network topologies and network analysis and potential implications for the design of technological networks, and vice versa. Such interplay between ways to infer and model Internet systems can be found in social networks and technological networks suggests new direc- [12] and [13]. A key message from the community has been tions for future research in networking. that the interplay between technological and social networks is Index Terms—Social networks, network science, random much richer than simply common features in their topological graph, Internet, big data, statistical information processing, properties, but rather extends well into the study of robustness, networked data, data analysis, social behavior, network economy, protocols, measurements, dynamics, and functionalities [14]. information epidemics, statistical communication theory. In the early stages of the Internet age, portals such as Yahoo played a key role in attracting users’ attention and provided a I. INTRODUCTION focal point for advertising and e-commerce marketing. Web EEDLESS to say, the Internet is one of the most 2.0 enabled an interactive user experience to dramatically N important inventions in the field of information and advance Internet services such as Google and Facebook, which communication technology (ICT), and has enabled a highly, involve certain kinds of relationships among either individuals globally, and somewhat unexpectedly connected world which or data.
    [Show full text]
  • (609) 258-1816 Princeton University Email: [email protected] Princeton, NJ 08544 USA Web
    December 2016 HAROLD VINCENT POOR CONTACT INFORMATION: Department of Electrical Engineering Phone: +1 (609) 258-1816 Princeton University Email: [email protected] Princeton, NJ 08544 USA Web: www.princeton.edu/poor EDUCATION: Princeton University, Princeton, New Jersey Ph.D. in Electrical Engineering and Computer Science, 1977 M.A. in Electrical Engineering, 1976 Auburn University, Auburn, Alabama M.S. in Electrical Engineering, 1974 B.E.E. with Highest Honor, 1972 EMPLOYMENT AND EXPERIENCE: Principal Employment Princeton University Michael Henry Strater University Professor of Electrical Engineering, 2005 - present Professor of Electrical Engineering, 1990 - present Associated Faculty, Andlinger Center for Energy and the Environment, 2012 - present Associated Faculty, Princeton Environmental Institute, 2006 - present Associated Faculty, Department of Operations Research & Financial Eng'g, 2001 - present Associated Faculty, Program in Applied and Computational Mathematics, 1996 - present Dean, School of Engineering and Applied Science, 2006-16 Founding Director, (Keller) Center for Innovation in Engineering Education, 2005-06 George Van Ness Lothrop Professor in Engineering, 2003-05 University of Illinois at Urbana-Champaign Beckman Associate, Center for Advanced Study, 1989-90 Professor, Beckman Institute for Advanced Science and Technology, 1988-90 Professor of Electrical and Computer Engineering, 1984-90 Research Professor in the Coordinated Science Laboratory, 1984-90 Assistant, then Associate, Professor of Electrical Engineering,
    [Show full text]
  • Geometric Programming for Communication Systems
    Geometric Programming for Communication Systems Geometric Programming for Communication Systems Mung Chiang Electrical Engineering Department Princeton University, Princeton New Jersey 08544, USA [email protected] Boston – Delft Foundations and TrendsR in Communications and Information Theory Published, sold and distributed by: now Publishers Inc. PO Box 1024 Hanover, MA 02339 USA Tel. +1 781 871 0245 www.nowpublishers.com [email protected] Outside North America: now Publishers Inc. PO Box 179 2600 AD Delft The Netherlands Tel. +31-6-51115274 A Cataloging-in-Publication record is available from the Library of Congress Printed on acid-free paper ISBN: 1-933019-09-3; ISSNs: Paper version 1567-2190; Electronic ver- sion 1567-2328 c 2005 M. Chiang All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, mechanical, photocopying, recording or otherwise, without prior written permission of the publishers. now Publishers Inc. has an exclusive license to publish this mate- rial worldwide. Permission to use this content must be obtained from the copyright license holder. Please apply to now Publishers, PO Box 179, 2600 AD Delft, The Netherlands, www.nowpublishers.com; e-mail: [email protected] Contents 1 Introduction 1 1.1 Geometric Programming and Applications 1 1.2 Nonlinear Optimization of Communication Systems 3 1.3 Overview 5 1.4 Notation 6 2 Geometric Programming 9 2.1 Formulations 9 2.2 Extensions 20 2.3 Algorithms 35 3 Applications in Communication
    [Show full text]
  • Networked Life: 20 Questions and Answers Mung Chiang Frontmatter More Information
    Cambridge University Press 978-1-107-02494-6 - Networked Life: 20 Questions and Answers Mung Chiang Frontmatter More information Networked Life How does Google sell ad space and rank webpages? How does Netflix recommend movies, and Amazon rank products? How can you influence people on Facebook and Twitter, and can you really reach anyone in six steps? Why doesn’t the Internet collapse under congestion, and does it have an Achilles’ heel? Why are you charged per gigabyte for mobile data, and how can Skype and BitTorrent be free? How big is the “cloud” of cloud services, and why is WiFi slower at hotspots than at home? Driven by 20 real-world questions about our networked lives, this book explores the technology behind the multi-trillion dollar Internet, wireless and online media indus- tries. Providing easily understandable answers for the casually curious, alongside de- tailed explanations for those looking for in-depth discussion, this thought-provoking book is essential reading for students in engineering, science and economics, for net- work industry professionals, and for anyone curious about how technological and social networks really work. Mung Chiang is a Professor of Electrical Engineering at Princeton University, and Director of the Princeton EDGE Lab. He has received the IEEE Kiyo Tomiyasu Award, and a US Presidential Early Career Award for Scientists and Engineers, for his re- search on networking. A co-founder and advisor to several startups, he also received a Technology Review TR35 Award for his contributions to network technology innova- tion. He is a fellow of the IEEE. © in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-1-107-02494-6 - Networked Life: 20 Questions and Answers Mung Chiang Frontmatter More information “We are entering a new Internet era – the era of the likes of Google, Amazon, Netflix, and Facebook – with entirely new types of problems.
    [Show full text]
  • Fog Computing and Networking: Part 2
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by PORTO Publications Open Repository TOrino Politecnico di Torino Porto Institutional Repository [Article] Fog Computing and Networking: Part 2 Original Citation: Mung, Chiang; Sangtae, Ha; Chih-Lin, I; Fulvio, Risso; Tao, Zhang (2017). Fog Computing and Networking: Part 2. In: IEEE COMMUNICATIONS MAGAZINE, vol. 55 n. 8, p. 13. - ISSN 0163- 6804 Availability: This version is available at : http://porto.polito.it/2679591/ since: September 2017 Publisher: IEEE Published version: DOI:10.1109/MCOM.2017.8004147 Terms of use: This article is made available under terms and conditions applicable to Open Access Policy Article ("Public - All rights reserved") , as described at http://porto.polito.it/terms_and_conditions. html Porto, the institutional repository of the Politecnico di Torino, is provided by the University Library and the IT-Services. The aim is to enable open access to all the world. Please share with us how this access benefits you. Your story matters. (Article begins on next page) Guest Editorial Fog Computing and Networking: Part 1 Mung Chiang, Sangtae Ha, Chih-Lin I, Fulvio Risso, Tao Zhang Due to the large number of submissions responding to the Call for Papers on “Fog Computing and Networking,” the Guest Editors selected additional papers based on reviewer comments that are now published in Part 2. The overview provided by the Guest Editors in the form of Q&A was published in Part 1 in April. Here, in this August issue of the magazine, we continue to see a range of perspectives, some qualitative and others quantitative.
    [Show full text]
  • NSF Workshop Report on Grand Challenges in Edge Computing
    NSF Workshop Report on Grand Challenges in Edge Computing October 26, 2016 Washington, DC Sponsored by National Science Foundation NSF Edge Computing Workshop Committee Workshop Co-Chairs • Mung Chiang, Princeton University Edge Lab • Weisong Shi, Wayne State University Steering Committee • Helder Antunes, Cisco • Victor Bahl, Microsoft Research • Mung Chiang, Princeton University • Bruce Maggs, AKamai Technologies/DuKe University • John Smee, Qualcomm • Weisong Shi, Wayne State University Breakout Session Leads • Applications o Chunming Qiao, University at Buffalo (SUNY) o Athina Makopoulouo, University of California Irvine • Architecture o Fred Douglis, Dell EMC o Lin Zhong, Rice University • Capabilities/Services o Arun Iyengar, IBM Research o Steven Ko, University at Buffalo (SUNY) o Tian Lan, George Washington University 2 Executive Summary The Internet has witnessed two radical changes in the past decade: rapidly growing cloud computing and pervasive mobile devices, sensors and Internet of Everything (IoE). Cloud Computing, an alternative to the traditional model of owning and managing private resources by customers, provided centralized computing services and pay-as-you-use convenience to the clients. However, due to the often unpredictable networK latency, expensive bandwidth, and privacy concerns, especially in a mobile environment, cloud computing often cannot meet the stringent requirements of applications, for example latency-sensitive, security/privacy- sensitive, or geographically constrained applications. The growing amount of data generated by end devices, things and systems can also become impractical or resource-prohibitive to transport over networKs to remote clouds. To this end, "Edge computing" is a paradigm in which the resources for communication, computation, control and storage are placed at the edge of the Internet, in close proximity to mobile devices, sensors, actuators, connected things and end users.
    [Show full text]
  • Layering As Optimization Decomposition: a Mathematical
    INVITED PAPER Layering as Optimization Decomposition: A Mathematical Theory of Network Architectures There are various ways that network functionalities can be allocated to different layers and to different network elements, some being more desirable than others. The intellectual goal of the research surveyed by this article is to provide a theoretical foundation for these architectural decisions in networking. By Mung Chiang, Member IEEE, Steven H. Low, Senior Member IEEE, A. Robert Calderbank, Fellow IEEE, and John C. Doyle ABSTRACT | Network protocols in layered architectures have layering architectures. This paper surveys the current status of historically been obtained on an ad hoc basis, and many of the horizontal decomposition into distributed computation, and recent cross-layer designs are also conducted through piece- vertical decomposition into functional modules such as con- meal approaches. Network protocol stacks may instead be gestion control, routing, scheduling, random access, power holistically analyzed and systematically designed as distributed control, and channel coding. Key messages and methods solutions to some global optimization problems. This paper arising from many recent works are summarized, and open presents a survey of the recent efforts towards a systematic issues discussed. Through case studies, it is illustrated how understanding of Blayering[ as Boptimization decomposition,[ BLayering as Optimization Decomposition[ provides a common where the overall communication network is modeled by a language to think about modularization in the face of complex, generalized network utility maximization problem, each layer networked interactions, a unifying, top-down approach to corresponds to a decomposed subproblem, and the interfaces design protocol stacks, and a mathematical theory of network among layers are quantified as functions of the optimization architectures.
    [Show full text]
  • MARIA GORLATOVA Maria.Gorlatova.Com/Bio
    MARIA GORLATOVA maria.gorlatova.com/bio EDUCATION COLUMBIA UNIVERSITY, New York, NY Ph.D., Electrical Engineering 2008 – 2013 M.Phil., Electrical Engineering 2011 Ph.D. Thesis: Energy Harvesting Networked Nodes: Measurements, Algorithms, and Prototyping Advised by Prof. Gil Zussman GPA: 4.18/4.0 UNIVERSITY OF OTTAWA, Ottawa, ON, Canada M.Sc., Electrical Engineering; Concentration: Computer Networks and System Security 2005 – 2007 M.Sc. Thesis: Wormhole Attack Detection in Wireless Ad Hoc Networks Advised by Prof. Peter Mason and Prof. Ramiro Liscano GPA: 98/100 B.Sc., Electrical Engineering, Concentration: Systems Engineering 2000 – 2004 Summa Cum Laude; GPA: 92/100; Major GPA: 98/100 SELECTED AWARDS AND HONORS IEEE Communications Society Young Author Best Paper Award 2016 Columbia University Jury Award for Outstanding Achievement in Communications 2013 MIT EECS Rising Star 2013 Google Inc. Anita Borg USA Fellowship 2012 ACM SenSys Best Student Demonstration Award 2011 IEEE Communications Society Award for Advances in Communications 2011 ACM MobiSys Ph.D. Forum Best Speaker Award 2011 Finalist, Microsoft Research Ph.D. Fellowship 2011 Columbia University Presidential Fellowship 2008 – 2013 Alexander Graham Bell Canada Graduate NSERC CGS-D Scholarship, Ph.D. studies 2008 – 2010 Canada Graduate NSERC CGS-M Scholarship, M.Sc. studies 2005 – 2007 Ontario Graduate Fellowship (declined) 2005 – 2007 Xerox Canada Inc. Fellowship 2004 SELECTED EXPERIENCE PRINCETON UNIVERSITY, Princeton, NJ 2016 – present Associate Director, Princeton EDGE Lab (2017 – present) Associate Research Scholar, Electrical Engineering Department Senior member of the EDGE lab led by Prof. Mung Chiang. Defining architectures and algorithms for fog computing, an emerging paradigm in which computing is placed at multiple locations between the endpoint Internet of Things devices and the cloud.
    [Show full text]
  • Networked Life
    Networked Life How does Google sell ad space and rank webpages? How does Netflix recommend movies, and Amazon rank products? How can you influence people on Facebook and Twitter, and can you really reach anyone in six steps? Why doesn’t the Internet collapse under congestion, and does it have an Achilles’ heel? Why are you charged per gigabyte for mobile data, and how can Skype and BitTorrent be free? How big is the “cloud” of cloud services, and why is WiFi slower at hotspots than at home? Driven by 20 real-world questions about our networked lives, this book explores the technology behind the multi-trillion dollar Internet, wireless and online media indus- tries. Providing easily understandable answers for the casually curious, alongside de- tailed explanations for those looking for in-depth discussion, this thought-provoking book is essential reading for students in engineering, science and economics, for net- work industry professionals, and for anyone curious about how technological and social networks really work. Mung Chiang is a Professor of Electrical Engineering at Princeton University, and Director of the Princeton EDGE Lab. He has received the IEEE Kiyo Tomiyasu Award, and a US Presidential Early Career Award for Scientists and Engineers, for his re- search on networking. A co-founder and advisor to several startups, he also received a Technology Review TR35 Award for his contributions to network technology innova- tion. He is a fellow of the IEEE. “We are entering a new Internet era – the era of the likes of Google, Amazon, Netflix, and Facebook – with entirely new types of problems.
    [Show full text]
  • POLITECNICO DI TORINO Repository ISTITUZIONALE
    POLITECNICO DI TORINO Repository ISTITUZIONALE Fog Computing and Networking: Part 1 [Guest editorial] Original Fog Computing and Networking: Part 1 [Guest editorial] / Mung, Chiang; Sangtae, Ha; Chih Lin, I; Risso, FULVIO GIOVANNI OTTAVIO; Tao, Zhang. - In: IEEE COMMUNICATIONS MAGAZINE. - ISSN 0163-6804. - STAMPA. - 55:4(2017), pp. 16-17. [10.1109/MCOM.2017.7901469] Availability: This version is available at: 11583/2679590 since: 2017-09-10T02:40:20Z Publisher: IEEE Published DOI:10.1109/MCOM.2017.7901469 Terms of use: openAccess This article is made available under terms and conditions as specified in the corresponding bibliographic description in the repository Publisher copyright (Article begins on next page) 30 September 2021 Guest Editorial Fog Computing and Networking: Part 1 Mung Chiang, Sangtae Ha, Chih-Lin I, Fulvio Risso, Tao Zhang Fog rises as cloud descends to be closer to the end users. Building on the foundation of past work in related areas and driven by emerging new applications and capabilities, fog computing and networking is now presenting unique opportunities to university researchers and the industry. This Feature Topic in IEEE Communications Magazine consists of overview articles that span much of this growing terrain of fog. Due to a much higher volume of submissions than expected, we could only accept a small portion of the submitted manuscripts even after expanding the Feature Topic into two parts, Part 1 in April and Part 2 in August. An exciting new area often faces questions about its scope. In a separate short article immediately following this editorial, the guest editors together provide a tutorial in the form of a Q&A.
    [Show full text]