Wenbing Zhao

Wenbing ZhaoDr. Zhao received the Ph.D. degree in Electrical and Computer Engineering from the University of California, Santa Barbara, in 2002. Currently, he is an associate professor in the Department of Electrical and Computer Engineering at Cleveland State University. His current research interests include distributed systems, computer networks, fault tolerance and security, and smart and connected health. Dr. Zhao has more than 120 academic publications.

Publications

Consistency Is Not Enough in Byzantine Fault Tolerance
Wenbing Zhao. © 2019. 12 pages.
The use of good random numbers is crucial to the security of many mission-critical systems. However, when such systems are replicated for Byzantine fault tolerance, a serious...
Enhancing the Resiliency of Smart Grid Monitoring and Control
Wenbing Zhao. © 2019. 12 pages.
In this chapter, the authors present the justification and a feasibility study of applying the Byzantine fault tolerance (BFT) technology to electric power grid health...
Kinect Applications in Healthcare
Roanna Lun, Wenbing Zhao. © 2019. 12 pages.
Microsoft Kinect is one of the most popular inexpensive gadgets released in recent years. Kinect is equipped with a color camera, a depth camera, and a microphone array. The...
A Validation Study of Rehabilitation Exercise Monitoring Using Kinect
Wenbing Zhao, Deborah D. Espy, Ann Reinthal. © 2019. 17 pages.
In this chapter, the authors present their work on a validation study of using Microsoft Kinect to monitor rehabilitation exercises. Differing from other validation efforts, the...
Cyber Security Protection for Online Gaming Applications
Wenbing Zhao. © 2019. 11 pages.
In this chapter, the authors point out the threats to online gaming applications and present two strategies that can be used to build secure and dependable online gaming...
Intrusion Tolerance Techniques
Wenbing Zhao. © 2019. 11 pages.
The authors believe that the research and development of intrusion tolerant systems will gain more momentum as more and more services are offered online. The expectation of such...
Toward Trustworthy Web Services Coordination
Wenbing Zhao. © 2019. 12 pages.
In this chapter, the authors present an overview of recent works on enhancing the trustworthiness of web services coordination for business activities and transactions. The...
Consistency Is Not Enough in Byzantine Fault Tolerance
Wenbing Zhao. © 2018. 10 pages.
The use of good random numbers is crucial to the security of many mission-critical systems. However, when such systems are replicated for Byzantine fault tolerance, a serious...
Cyber Security Protection for Online Gaming Applications
Wenbing Zhao. © 2018. 9 pages.
In this article, we point out the threats to online gaming applications and present two strategies that can be used to build secure and dependable online gaming applications....
Enhancing the Resiliency of Smart Grid Monitoring and Control
Wenbing Zhao. © 2018. 10 pages.
In this chapter, we present the justification and a feasibility study of applying the Byzantine fault tolerance (BFT) technology to electric power grid health monitoring. We...
Intrusion Tolerance Techniques
Wenbing Zhao. © 2018. 10 pages.
We believe that the research and development of intrusion tolerant systems will gain more momentum as more and more services are offered online. The expectation of such services...
Kinect Applications in Healthcare
Roanna Lun, Wenbing Zhao. © 2018. 10 pages.
Microsoft Kinect is one of the most popular inexpensive gadgets released in recent years. Kinect is equipped with a color camera, a depth camera, and a microphone array. The...
A Validation Study of Rehabilitation Exercise Monitoring Using Kinect
Wenbing Zhao, Deborah D. Espy, Ann Reinthal. © 2018. 14 pages.
In this article, we present our work on a validation study of using Microsoft Kinect to monitor rehabilitation exercises. Differing from other validation efforts, we focus on a...
Toward Trustworthy Web Services Coordination
Wenbing Zhao. © 2018. 10 pages.
In this article, we present an overview of our recent works on enhancing the trustworthiness of Web services coordination for business activities and transactions. The approach...
International Journal of Distributed Systems and Technologies (IJDST)
Nik Bessis. Est. 2010.
The International Journal of Distributed Systems and Technologies (IJDST) focuses on integration techniques, methods, and tools employed in applied distributed computing systems...
A Reservation-Based Extended Transaction Protocol for Coordination of Web Services within Business Activities
Wenbing Zhao, Firat Kart, L. E. Moser, P. M. Melliar-Smith. © 2010. 30 pages.
This chapter describes a novel reservation-based extended transaction protocol for coordination of tasks within a business activity. With the advance of Web Services, it is...
A Reservation-based Extended Transaction Protocol for Coordination of Web Services
Wenbing Zhao, Firat Kart, L.E. Moser, P.M. Melliar-Smith. © 2008. 32 pages.
Web services can be used to automate business activities that span multiple enterprises over the Internet. Such business activities require a coordination protocol to reach...