National Chiao Tung University

Displaying 1-40 of 49 results

  • White Papers // Apr 2013

    Exploiting Neigborhood Similarity for Virtual Machine Migration Over Wide-Area Network

    Conventional Virtual Machine (VM) migration focuses on transferring a VM's memory and CPU states across host machines. The VM's disk image has to remain accessible to both the source and destination host machines through shared storage during the migration. As a result, conventional virtual machine migration is limited to host...

    Provided By National Chiao Tung University

  • White Papers // Apr 2013

    EagleEye: Towards Mandatory Security Monitoring in Virtualized Datacenter Environment

    Virtualized DataCenter (VDC) has become a popular approach to large-scale system consolidation and the enabling technology for infrastructure-as-a-service cloud computing. The consolidation inevitably aggregates the security threats once faced by individual systems towards a VDC, and a VDC operator should remain vigilant of the threats at all times. The authors...

    Provided By National Chiao Tung University

  • White Papers // Apr 2013

    CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing

    Cloud services are blooming recently. They provide a convenient way for data accessing, sharing, and processing. A key ingredient for successful cloud services is to control data access while considering the specific features of cloud services. The specific features include great quantity of outsourced data, large number of users, honest-but-curious...

    Provided By National Chiao Tung University

  • White Papers // Nov 2012

    UNCLE: A Unified Unicast and Multicast Label Forwarding Architecture in MANETs

    This paper presents a novel cross-layer forwarding scheme, called UNified unicast and multiCast LabEling (UNCLE), for Mobile Ad hoc NETworks (MANETs). Unlike traditional unicast and multicast forwarding schemes requiring two different protocol stacks, the proposed UNCLE forwarding method requires only one single protocol stack, and thus avoid the need of...

    Provided By National Chiao Tung University

  • White Papers // Nov 2012

    A Trust Mechanism for Web Services Registries Data Exchanging

    In recent years, Web Services (WS) have been becoming more popular, as more people realize its benefits. However, the WS-Security specification only guarantees the security on end-to-end level. The authors propose the architecture of Trust-based Web Services Registries Data Exchanging (TWSRDE) which is four-tier architecture composed of the users, Web...

    Provided By National Chiao Tung University

  • White Papers // Oct 2012

    A Flexible Remote User Authentication Sheme Using Smart Cards

    In 1999, Hwang and Li proposed a new user authentication scheme using smartcards. The scheme does not need any password or verification table. Later, Sun proposed an efficient remote user authentication scheme to improve the efficiency of the Hwang-Li scheme. However, these two schemes do not allow users to freely...

    Provided By National Chiao Tung University

  • White Papers // Oct 2012

    Robust Linear Beamformer Designs for CoMP AF Relaying in Downlink Multi-Cell Networks

    Robust beam forming methods are studied to support relay-assisted Coordinated Multi-Point (CoMP) retransmissions in downlink multi-cell networks. Linear Beam-Formers (BFers) for relay stations of different cells are jointly designed to maintain, in a CoMP Amplify-and-Forward (AF) relaying manner, the target Signal to Interference-plus-Noise Ratios (SINR) at the cellular boundaries of...

    Provided By National Chiao Tung University

  • White Papers // Aug 2012

    A New Timing Synchronization and Cell Search Procedure Resistant to Carrier Frequency Offsets for 3GPP-LTE Downlink

    A timing synchronization and cell search procedure for the 3rd Generation Partnership Project Long Term Evolution (3GPP-LTE) standard is proposed. First, initial timing detection utilizing the secondary synchronization signal (SSS) is performed and the Fractional Carrier Frequency Offset (FCFO) is compensated. Second, joint synchronization based on Primary Synchronization Signal (PSS)...

    Provided By National Chiao Tung University

  • White Papers // May 2012

    Channel-Aware Distributed Best-Linear-Unbiased Estimation With Reduced Communication Overheads

    Energy consumption in wireless sensor networks is dominated by intra-network communication dedicated to coordination and information exchange between sensor nodes and the fusion center. The design of distributed estimation algorithms with reduced communication overheads is thus rather crucial. For amplify-and-forward sensor networks over flat fading channels, this paper proposes a...

    Provided By National Chiao Tung University

  • White Papers // May 2012

    A User-Differentiation-Based Resource Allocation Scheme for OFDMA Downlink Systems

    This paper proposes a new User-Differentiation based Resource Allocation (UDRA) scheme for OFDMA downlink systems. The UDRA scheme can strike a good balance between Quality-of-Service (QoS) requirement guarantee and system throughput enhancement, whereas conventional schemes cannot explicitly and accurately control this tradeoff. The UDRA scheme first performs a utility-based resource...

    Provided By National Chiao Tung University

  • White Papers // Apr 2012

    Performance Evaluation of Inter-Processor Communication for an Embedded Heterogeneous Multi-Core Processor

    Embedded systems often use a heterogeneous multi-core processor to improve performance and energy efficiency. This multi-core processor is composed of a General Purpose Processor (GPP), which manages the program flow and I/O, and a Digital signal Processor (DSP), which processes mass data. An Inter-Processor Communication (IPC) mechanism is thus required...

    Provided By National Chiao Tung University

  • White Papers // Mar 2012

    Robust MMSE Transceiver Design in Amplify-and-Forward MIMO Relay System With Tomlinson-Harashima Source Precoding

    Most nonlinear transceiver designs in Amplify-and-Forward (AF) Multiple-Input-Multiple-Output (MIMO) relay systems assume that instantaneous perfect Channel State Informations (CSIs) are available. Transceiver design with imperfect CSIs has rarely been addressed. In this paper, the authors consider an AF MIMO system in which a Tomlinson-Harashima Pre-coder (THP) is used at the...

    Provided By National Chiao Tung University

  • White Papers // Mar 2012

    Green Resource Allocation for MIMO-OFDM Relay Networks

    This paper studies the joint resource allocation problem of antenna, sub-channel, transmission power, and phase duration for the relay-enhanced bidirectional Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) networks. The goal of resource allocation is to minimize the transmission energy in the networks with multiple Relay Stations (RSs) under the data...

    Provided By National Chiao Tung University

  • White Papers // Mar 2012

    Compressive-Domain Interference Cancellation Via Orthogonal Projection: How Small the Restricted Isometry Constant of the Effective Sensing Matrix Can Be?

    Knowledge of the achievable Restricted Isometry Constant (RIC) of the sensing matrix is crucial for assessing the signal reconstruction performance of compressive sensing systems. In this paper, the authors consider compressive-domain interference cancellation via orthogonal projection, and study the achievable RIC of the effective sensing matrix, namely, the product of...

    Provided By National Chiao Tung University

  • White Papers // Mar 2012

    Resource Allocations for MISO Based Cognitive Radio OFDMA Systems

    The authors propose an optimal and a suboptimal resource allocation algorithms for sum rate maximization in an MISOOFDMA based cognitive radio network subject to a primary user outage constraint. By converting the outage constraint into user and subcarrier dependent peak power constraints, they obtain the optimal joint subcarrier assignment and...

    Provided By National Chiao Tung University

  • White Papers // Mar 2012

    Prediction-Based Handover Schemes for Relay-Enhanced LTE-A Systems

    Relay Nodes (RN) have been suggested to be placed near the edge of a cellular network in order to improve link qualities of cell edge User Equipments (UEs). Compared to conventional homogeneous networks, system performance for the relay-enhanced network can be significantly degraded if handovers between the RNs and evolved...

    Provided By National Chiao Tung University

  • White Papers // Mar 2012

    Predictive Interference-Based Scheduling Mechanism for Direct Communications in IEEE 802.16 Networks

    The Point-to-Multi-Point (PMP) mode is considered a well-adopted transmission type that is supported by the IEEE 802.16 standard. The Base Station (BS) is served as a centralized coordinator to control and forward packets for Mobile Stations (MSs) within the network. With the consideration of direct communications, the required bandwidth and...

    Provided By National Chiao Tung University

  • White Papers // Mar 2012

    A GA-Based Optimization for Frequency-Selective Scheduling in Downlink OFDMA Systems With Cyclic-Delay Diversity

    CDD (Cyclic-Delay Diversity) aided frequency-selective scheduling has been known as an effective technique to increase system capacity of the OFDMA (Orthogonal Frequency-Division Multiple Access) systems. By increasing the channels' frequency selectivity with cyclic delays, the merit of multi-user diversity can be exploited more effectively in the system. In this paper,...

    Provided By National Chiao Tung University

  • White Papers // Sep 2011

    A O.6V 200kHz Silicon Oscillator With Temperature Compensation for Wireless Sensing Applications

    Recent advances in silicon sensors and circuit technology have enabled various wireless sensing applications. The deployed wireless sensors are highly integrated with limited power sources to reduce cost. Systems relying on batteries or energy scavenging from the environment operate at low frequencies (sub-MHz) to save power. Nevertheless, most of functions...

    Provided By National Chiao Tung University

  • White Papers // Sep 2011

    Mobile-Gateway Routing for Vehicular Networks

    Development of Vehicular Ad hoc NETworks (VANETs) has drawn intensive attention in recent years. Designing routing protocols for Vehicle-To-Vehicle (V2V) communication in VANET may suffer from frequent link change and disconnection. Vehicle-To-Infrastructure (V2I) communication can overcome the challenge by relaying packets through the backbone network, but is limited to those...

    Provided By National Chiao Tung University

  • White Papers // Jul 2011

    An Energy-Efficient OFDM-Based Baseband Transceiver Design for Ubiquitous Healthcare Monitoring Applications

    Wireless Body Area Network (WBAN) is an emerging technology which is specifically designed for the applications of body signal gathering and monitoring to provide reliable physical information. A typical WBAN consists of multiple of Wireless Sensor Nodes (WSNs) and Central Processing Node (CPN). The CPN is integrated in a portable...

    Provided By National Chiao Tung University

  • White Papers // Jun 2011

    A 1kb 9T Subthreshold SRAM with Bit-interleaving Scheme in 65nm CMOS

    Sub-threshold SRAM is a significant approach to reduce power consumption in energy-constrained SoC design. For the ultra-low power consideration, the primary concerns of SRAM are stability and reliability instead of performance. In this paper, the proposed 9T bit-cell enhances write ability by cutting off the positive feedback loop of inverter...

    Provided By National Chiao Tung University

  • White Papers // Mar 2011

    Reliability and Security of Large Scale Data Storage in Cloud Computing

    In this paper, the authors will present new challenges to the large scale cloud computing, namely reliability and security. Recent progress in the research area will be briefly reviewed. It has been proved that it is impossible to satisfy consistency, availability, and partitioned-tolerance simultaneously. Tradeoff becomes crucial among these factors...

    Provided By National Chiao Tung University

  • White Papers // Jan 2011

    Excess Cash Holdings And Investment: The Moderating Roles Of Financial Constraints And Managerial Entrenchment

    The authors study investigates the relationship between excess cash holdings and investment behavior, under both financial constraints and managerial entrenchment, based upon a sample of Taiwanese firms, which are in the environment characterized by poor legal protection for investors, with the data covering the years 2000 to 2006. They find...

    Provided By National Chiao Tung University

  • White Papers // Jan 2011

    The Effects of Using Roadside Wireless Repeaters on Extending Path Lifetime in Vehicle-Formed Mobile Ad Hoc Networks on Highways

    Intelligent Transportation Systems (ITS) is an important research topic. One goal of ITS is to exchange information among vehicles in a timely and efficient manner. In the ITS research community, Inter-Vehicle Communications (IVC) is considered a way that could achieve this goal without infrastructure support. An information network built on...

    Provided By National Chiao Tung University

  • White Papers // Jan 2011

    Facilitating the Network Entry and Link Establishment Processes of IEEE 802.16 Mesh Networks

    The IEEE 802.16 standard is a promising next-generation broadband technology. It contains two operational modes - PMP and mesh. The PMP mode defines one-hop communication between a Base Station (BS) and a Subscriber Station (SS), while the mesh mode allows traffic to be directly exchanged and forwarded among neighboring SSs....

    Provided By National Chiao Tung University

  • White Papers // Jan 2011

    Role of Channel Estimation in Physical Layer Protocol Design of OFDM Wireless Systems and Relay-Type Cooperative Communication

    The authors consider the role of physical-layer signal processing functions in the design of physical-layer protocols for OFDM point-to-point and relay-type cooperative wireless communication systems. In particular, they examine the role of the channel estimation function to some depth. To effect a pointed discussion, they employ the IEEE 802.16e/WiMAX OFDMA...

    Provided By National Chiao Tung University

  • White Papers // Jul 2010

    VPN Gateways Over Network Processors: Implementation and Evaluation

    Networking applications, such as VPN and content filtering, demand extra computing power in order to meet the throughput requirement nowadays. In addition to pure ASIC solutions, network processor architecture is emerging as an alternative to scale up data-plane processing while retaining design flexibility. This paper, rather than proposing new algorithms,...

    Provided By National Chiao Tung University

  • White Papers // Jun 2010

    Mini-Slot Scheduling for IEEE 802.16d Chain and Grid Mesh Networks

    This paper considers the mini-slot scheduling problem in IEEE 802.16d Wireless Mesh Networks (WMNs). An efficient mini-slot scheduling needs to take into account the transmission overhead, the scheduling complexity, and the signaling overhead to broadcast the scheduling results. The authors are interested in chain and grid WMNs, which are the...

    Provided By National Chiao Tung University

  • White Papers // May 2010

    Frame-Aggregated Link Adaptation Protocol for Next Generation Wireless Local Area Networks

    The performance of wireless networks is affected by channel conditions. Link Adaptation techniques have been proposed to improve the degraded network performance by adjusting the design parameters, for example, the modulation and coding schemes, in order to adapt to the dynamically changing channel conditions. Furthermore, due to the advancement of...

    Provided By National Chiao Tung University

  • White Papers // Apr 2010

    An Open Architecture for Monitoring and Measuring QoS Indicators in Wireless Community Networks

    Wireless Community Networks (WCNs) are wide-area wireless networks whose nodes are owned and managed by volunteers. These networks are rarely supported by any infrastructure for measuring network performance indicators. In this paper, the authors present the design, the implementation and the experimental evaluation of KIXEM, an open agent-based architecture, whose...

    Provided By National Chiao Tung University

  • White Papers // Apr 2010

    A Simulation Mechanism for Video Delivery Researches

    At present, video delivery over the wired or wireless packet-switched networks has been motivating a series of researches into video encoding, Quality of Service (QoS), multimedia communication, and service models of networks. However, most of researchers lack a suitable video delivery simulation platform closer to the real video delivery system....

    Provided By National Chiao Tung University

  • White Papers // Apr 2010

    A Low-Power All-Digital Signal Component Separator for OFDM LINC Systems

    LINC can achieve linear amplification by using high-efficiency amplifiers. This paper presents an all-digital LINC Signal Component Separator (SCS) including the phase calculation digital signal processing and two Digital-Control Phase Shifters (DCPSs). With the duplicate DCPSs, a pre-calibration scheme is introduced to guarantee the codeword-to-phase linearity and accuracy under different...

    Provided By National Chiao Tung University

  • White Papers // Feb 2010

    Extracting Attack Sessions From Real Traffic With Intrusion Prevention Systems

    False Positive (FP) and False Negative (FN) happen to every Intrusion Prevention System (IPS). No one could do better judgment than others all the time. This paper proposes a system of Attack Session Extraction (ASE) to create a pool of traffic traces which cause possible FNs and FPs to IPSs....

    Provided By National Chiao Tung University

  • White Papers // Jan 2010

    Autonomous Light Control by Wireless Sensor and Actuator Networks

    Recently, Wireless Sensor and Actuator Networks (WSANs) have been widely discussed in many applications. In this paper, the authors propose an autonomous light control system based on the feedback from light sensors carried by users. Their design focuses on meeting users' preferences and energy efficiency. Both whole and local lighting...

    Provided By National Chiao Tung University

  • White Papers // Jan 2010

    Bandwidth Routing in Multi-Hop Packet Radio Environment

    This paper propose a bandwidth routing algorithm in a multi-hop packet radio environment, which is not necessarily a cellular structure network and could have no fixed base stations. Each mobile station has the responsibility to transfer packets for others. The wireless network can be either stand-alone, or connected to the...

    Provided By National Chiao Tung University

  • White Papers // Jan 2010

    Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Code

    A new method for software program protection by information sharing and authentication techniques using invisible ASCII control codes is proposed. A scheme for sharing a secret source program written in Visual C++ among a group of participants, each holding a camouflage program to hide a share, is first proposed for...

    Provided By National Chiao Tung University

  • White Papers // Jan 2010

    Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes

    A new method for software program protection by information sharing and authentication techniques using invisible ASCII control codes is proposed. A scheme for sharing a secret source program written in Visual C++ among a group of participants, each holding a camouflage program to hide a share, is first proposed for...

    Provided By National Chiao Tung University

  • White Papers // Oct 2009

    Dynamic Power Management in Cognitive Radio Networks Based on Constrained Stochastic Games

    Recent studies have been conducted to indicate the ineffective usage of licensed bands due to the static spectrum allocation. In order to improve the spectrum utilization, the Cognitive Radio is therefore suggested to dynamically exploit the opportunistic primary frequency spectrums. The interference from the secondary users to the primary user...

    Provided By National Chiao Tung University

  • White Papers // Oct 2009

    Realization of Greedy Anti-Void Routing Protocol for Wireless Sensor Networks

    The void problem causing the routing failure is the main challenge of the greedy routing in the Wireless Sensor Networks. The current research paper still cannot fully deal with the void problem since the excessive control overheads should be consumed so as to guarantee the delivery of packets. In the...

    Provided By National Chiao Tung University