National Chiao Tung University

Displaying 1-40 of 49 results

  • White Papers // Apr 2013

    Exploiting Neigborhood Similarity for Virtual Machine Migration Over Wide-Area Network

    Conventional Virtual Machine (VM) migration focuses on transferring a VM's memory and CPU states across host machines. The VM's disk image has to remain accessible to both the source and destination host machines through shared storage during the migration. As a result, conventional virtual machine migration is limited to host...

    Provided By National Chiao Tung University

  • White Papers // Apr 2013

    EagleEye: Towards Mandatory Security Monitoring in Virtualized Datacenter Environment

    Virtualized DataCenter (VDC) has become a popular approach to large-scale system consolidation and the enabling technology for infrastructure-as-a-service cloud computing. The consolidation inevitably aggregates the security threats once faced by individual systems towards a VDC, and a VDC operator should remain vigilant of the threats at all times. The authors...

    Provided By National Chiao Tung University

  • White Papers // Apr 2013

    CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing

    Cloud services are blooming recently. They provide a convenient way for data accessing, sharing, and processing. A key ingredient for successful cloud services is to control data access while considering the specific features of cloud services. The specific features include great quantity of outsourced data, large number of users, honest-but-curious...

    Provided By National Chiao Tung University

  • White Papers // Nov 2012

    UNCLE: A Unified Unicast and Multicast Label Forwarding Architecture in MANETs

    This paper presents a novel cross-layer forwarding scheme, called UNified unicast and multiCast LabEling (UNCLE), for Mobile Ad hoc NETworks (MANETs). Unlike traditional unicast and multicast forwarding schemes requiring two different protocol stacks, the proposed UNCLE forwarding method requires only one single protocol stack, and thus avoid the need of...

    Provided By National Chiao Tung University

  • White Papers // Nov 2012

    A Trust Mechanism for Web Services Registries Data Exchanging

    In recent years, Web Services (WS) have been becoming more popular, as more people realize its benefits. However, the WS-Security specification only guarantees the security on end-to-end level. The authors propose the architecture of Trust-based Web Services Registries Data Exchanging (TWSRDE) which is four-tier architecture composed of the users, Web...

    Provided By National Chiao Tung University

  • White Papers // Oct 2012

    Robust Linear Beamformer Designs for CoMP AF Relaying in Downlink Multi-Cell Networks

    Robust beam forming methods are studied to support relay-assisted Coordinated Multi-Point (CoMP) retransmissions in downlink multi-cell networks. Linear Beam-Formers (BFers) for relay stations of different cells are jointly designed to maintain, in a CoMP Amplify-and-Forward (AF) relaying manner, the target Signal to Interference-plus-Noise Ratios (SINR) at the cellular boundaries of...

    Provided By National Chiao Tung University

  • White Papers // May 2012

    Channel-Aware Distributed Best-Linear-Unbiased Estimation With Reduced Communication Overheads

    Energy consumption in wireless sensor networks is dominated by intra-network communication dedicated to coordination and information exchange between sensor nodes and the fusion center. The design of distributed estimation algorithms with reduced communication overheads is thus rather crucial. For amplify-and-forward sensor networks over flat fading channels, this paper proposes a...

    Provided By National Chiao Tung University

  • White Papers // May 2012

    A User-Differentiation-Based Resource Allocation Scheme for OFDMA Downlink Systems

    This paper proposes a new User-Differentiation based Resource Allocation (UDRA) scheme for OFDMA downlink systems. The UDRA scheme can strike a good balance between Quality-of-Service (QoS) requirement guarantee and system throughput enhancement, whereas conventional schemes cannot explicitly and accurately control this tradeoff. The UDRA scheme first performs a utility-based resource...

    Provided By National Chiao Tung University

  • White Papers // Apr 2012

    Performance Evaluation of Inter-Processor Communication for an Embedded Heterogeneous Multi-Core Processor

    Embedded systems often use a heterogeneous multi-core processor to improve performance and energy efficiency. This multi-core processor is composed of a General Purpose Processor (GPP), which manages the program flow and I/O, and a Digital signal Processor (DSP), which processes mass data. An Inter-Processor Communication (IPC) mechanism is thus required...

    Provided By National Chiao Tung University

  • White Papers // Mar 2012

    Predictive Interference-Based Scheduling Mechanism for Direct Communications in IEEE 802.16 Networks

    The Point-to-Multi-Point (PMP) mode is considered a well-adopted transmission type that is supported by the IEEE 802.16 standard. The Base Station (BS) is served as a centralized coordinator to control and forward packets for Mobile Stations (MSs) within the network. With the consideration of direct communications, the required bandwidth and...

    Provided By National Chiao Tung University

  • White Papers // Mar 2012

    A GA-Based Optimization for Frequency-Selective Scheduling in Downlink OFDMA Systems With Cyclic-Delay Diversity

    CDD (Cyclic-Delay Diversity) aided frequency-selective scheduling has been known as an effective technique to increase system capacity of the OFDMA (Orthogonal Frequency-Division Multiple Access) systems. By increasing the channels' frequency selectivity with cyclic delays, the merit of multi-user diversity can be exploited more effectively in the system. In this paper,...

    Provided By National Chiao Tung University

  • White Papers // Mar 2012

    Compressive-Domain Interference Cancellation Via Orthogonal Projection: How Small the Restricted Isometry Constant of the Effective Sensing Matrix Can Be?

    Knowledge of the achievable Restricted Isometry Constant (RIC) of the sensing matrix is crucial for assessing the signal reconstruction performance of compressive sensing systems. In this paper, the authors consider compressive-domain interference cancellation via orthogonal projection, and study the achievable RIC of the effective sensing matrix, namely, the product of...

    Provided By National Chiao Tung University

  • White Papers // Mar 2012

    Resource Allocations for MISO Based Cognitive Radio OFDMA Systems

    The authors propose an optimal and a suboptimal resource allocation algorithms for sum rate maximization in an MISOOFDMA based cognitive radio network subject to a primary user outage constraint. By converting the outage constraint into user and subcarrier dependent peak power constraints, they obtain the optimal joint subcarrier assignment and...

    Provided By National Chiao Tung University

  • White Papers // Mar 2012

    Green Resource Allocation for MIMO-OFDM Relay Networks

    This paper studies the joint resource allocation problem of antenna, sub-channel, transmission power, and phase duration for the relay-enhanced bidirectional Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) networks. The goal of resource allocation is to minimize the transmission energy in the networks with multiple Relay Stations (RSs) under the data...

    Provided By National Chiao Tung University

  • White Papers // Mar 2012

    Prediction-Based Handover Schemes for Relay-Enhanced LTE-A Systems

    Relay Nodes (RN) have been suggested to be placed near the edge of a cellular network in order to improve link qualities of cell edge User Equipments (UEs). Compared to conventional homogeneous networks, system performance for the relay-enhanced network can be significantly degraded if handovers between the RNs and evolved...

    Provided By National Chiao Tung University

  • White Papers // Sep 2011

    A O.6V 200kHz Silicon Oscillator With Temperature Compensation for Wireless Sensing Applications

    Recent advances in silicon sensors and circuit technology have enabled various wireless sensing applications. The deployed wireless sensors are highly integrated with limited power sources to reduce cost. Systems relying on batteries or energy scavenging from the environment operate at low frequencies (sub-MHz) to save power. Nevertheless, most of functions...

    Provided By National Chiao Tung University

  • White Papers // Sep 2011

    Mobile-Gateway Routing for Vehicular Networks

    Development of Vehicular Ad hoc NETworks (VANETs) has drawn intensive attention in recent years. Designing routing protocols for Vehicle-To-Vehicle (V2V) communication in VANET may suffer from frequent link change and disconnection. Vehicle-To-Infrastructure (V2I) communication can overcome the challenge by relaying packets through the backbone network, but is limited to those...

    Provided By National Chiao Tung University

  • White Papers // Mar 2011

    Reliability and Security of Large Scale Data Storage in Cloud Computing

    In this paper, the authors will present new challenges to the large scale cloud computing, namely reliability and security. Recent progress in the research area will be briefly reviewed. It has been proved that it is impossible to satisfy consistency, availability, and partitioned-tolerance simultaneously. Tradeoff becomes crucial among these factors...

    Provided By National Chiao Tung University

  • White Papers // Jan 2011

    Excess Cash Holdings And Investment: The Moderating Roles Of Financial Constraints And Managerial Entrenchment

    The authors study investigates the relationship between excess cash holdings and investment behavior, under both financial constraints and managerial entrenchment, based upon a sample of Taiwanese firms, which are in the environment characterized by poor legal protection for investors, with the data covering the years 2000 to 2006. They find...

    Provided By National Chiao Tung University

  • White Papers // Jan 2011

    The Effects of Using Roadside Wireless Repeaters on Extending Path Lifetime in Vehicle-Formed Mobile Ad Hoc Networks on Highways

    Intelligent Transportation Systems (ITS) is an important research topic. One goal of ITS is to exchange information among vehicles in a timely and efficient manner. In the ITS research community, Inter-Vehicle Communications (IVC) is considered a way that could achieve this goal without infrastructure support. An information network built on...

    Provided By National Chiao Tung University

  • White Papers // Jan 2011

    Facilitating the Network Entry and Link Establishment Processes of IEEE 802.16 Mesh Networks

    The IEEE 802.16 standard is a promising next-generation broadband technology. It contains two operational modes - PMP and mesh. The PMP mode defines one-hop communication between a Base Station (BS) and a Subscriber Station (SS), while the mesh mode allows traffic to be directly exchanged and forwarded among neighboring SSs....

    Provided By National Chiao Tung University

  • White Papers // Jan 2011

    Role of Channel Estimation in Physical Layer Protocol Design of OFDM Wireless Systems and Relay-Type Cooperative Communication

    The authors consider the role of physical-layer signal processing functions in the design of physical-layer protocols for OFDM point-to-point and relay-type cooperative wireless communication systems. In particular, they examine the role of the channel estimation function to some depth. To effect a pointed discussion, they employ the IEEE 802.16e/WiMAX OFDMA...

    Provided By National Chiao Tung University

  • White Papers // May 2010

    Frame-Aggregated Link Adaptation Protocol for Next Generation Wireless Local Area Networks

    The performance of wireless networks is affected by channel conditions. Link Adaptation techniques have been proposed to improve the degraded network performance by adjusting the design parameters, for example, the modulation and coding schemes, in order to adapt to the dynamically changing channel conditions. Furthermore, due to the advancement of...

    Provided By National Chiao Tung University

  • White Papers // Apr 2010

    An Open Architecture for Monitoring and Measuring QoS Indicators in Wireless Community Networks

    Wireless Community Networks (WCNs) are wide-area wireless networks whose nodes are owned and managed by volunteers. These networks are rarely supported by any infrastructure for measuring network performance indicators. In this paper, the authors present the design, the implementation and the experimental evaluation of KIXEM, an open agent-based architecture, whose...

    Provided By National Chiao Tung University

  • White Papers // Apr 2010

    A Simulation Mechanism for Video Delivery Researches

    At present, video delivery over the wired or wireless packet-switched networks has been motivating a series of researches into video encoding, Quality of Service (QoS), multimedia communication, and service models of networks. However, most of researchers lack a suitable video delivery simulation platform closer to the real video delivery system....

    Provided By National Chiao Tung University

  • White Papers // Feb 2010

    Extracting Attack Sessions From Real Traffic With Intrusion Prevention Systems

    False Positive (FP) and False Negative (FN) happen to every Intrusion Prevention System (IPS). No one could do better judgment than others all the time. This paper proposes a system of Attack Session Extraction (ASE) to create a pool of traffic traces which cause possible FNs and FPs to IPSs....

    Provided By National Chiao Tung University

  • White Papers // Jan 2010

    Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes

    A new method for software program protection by information sharing and authentication techniques using invisible ASCII control codes is proposed. A scheme for sharing a secret source program written in Visual C++ among a group of participants, each holding a camouflage program to hide a share, is first proposed for...

    Provided By National Chiao Tung University

  • White Papers // Jan 2010

    Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Code

    A new method for software program protection by information sharing and authentication techniques using invisible ASCII control codes is proposed. A scheme for sharing a secret source program written in Visual C++ among a group of participants, each holding a camouflage program to hide a share, is first proposed for...

    Provided By National Chiao Tung University

  • White Papers // Jan 2010

    Bandwidth Routing in Multi-Hop Packet Radio Environment

    This paper propose a bandwidth routing algorithm in a multi-hop packet radio environment, which is not necessarily a cellular structure network and could have no fixed base stations. Each mobile station has the responsibility to transfer packets for others. The wireless network can be either stand-alone, or connected to the...

    Provided By National Chiao Tung University

  • White Papers // Oct 2009

    Dynamic Power Management in Cognitive Radio Networks Based on Constrained Stochastic Games

    Recent studies have been conducted to indicate the ineffective usage of licensed bands due to the static spectrum allocation. In order to improve the spectrum utilization, the Cognitive Radio is therefore suggested to dynamically exploit the opportunistic primary frequency spectrums. The interference from the secondary users to the primary user...

    Provided By National Chiao Tung University

  • White Papers // Oct 2009

    Realization of Greedy Anti-Void Routing Protocol for Wireless Sensor Networks

    The void problem causing the routing failure is the main challenge of the greedy routing in the Wireless Sensor Networks. The current research paper still cannot fully deal with the void problem since the excessive control overheads should be consumed so as to guarantee the delivery of packets. In the...

    Provided By National Chiao Tung University

  • White Papers // Aug 2009

    XOR-Forwarding for Wireless Networks

    This paper proposes a localized network-coding-based packet forwarding protocol for wireless networks, called Opportunistic A Synchronous Information diSsemination (OASIS), based on COPE. OASIS not only inherents two features from COPE, opportunistic listening and opportunistic coding, but also introduces a new one, opportunistic information dissemination, which aggressively encodes as many packets...

    Provided By National Chiao Tung University

  • White Papers // Aug 2009

    An Efficient MIMO Detection Algorithm Employed in Imperfect Noise Estimation

    An efficient Multiple-Input Multiple-Output (MIMO) Detection (MD) algorithm includes novel, low-complexity, near-optimal and robust scheme is proposed in wireless communications when imperfect noise estimation is considered. By using MIMO technique, capacity increases proportionally as the number of antennas is increased, but the introduced Inter-Antenna Interference (IAI) degrades system performance. To...

    Provided By National Chiao Tung University

  • White Papers // Aug 2009

    Complexity Reduction by Using Triangular Matrix Multiplication in Computing Capacity for an Optimal Transmission

    Multiple-Input-Multiple-Output (MIMO) technique is often employed to increase capacity in comparing to systems with single antenna. In wireless MIMO communications, the design of an optimal transmission is essential in order to meet demands from a large number of simultaneous data transmissions. Bertrand et al. shows the mutual information constrained constellation...

    Provided By National Chiao Tung University

  • White Papers // Jul 2009

    An Energy-Aware, Cluster-Based Routing Algorithm for Wireless Sensor Networks

    Cluster-based routing protocols have special advantages that help enhance both scalability and efficiency of the routing protocol. Likewise, finding the best way to arrange clustering so as to maximize the network's lifetime is now an important research topic in the field of wireless sensor networks. In this paper, the authors...

    Provided By National Chiao Tung University

  • White Papers // Jul 2009

    Performance Gains for Spectrum Utilization in Cognitive Radio Networks With Spectrum Handoff

    Cognitive Radio (CR) can improve spectrum utilization by allowing the secondary users to temporarily access the primary users' unutilized licensed spectrum. In order to guarantee Quality of Service (QoS) of the secondary users, spectrum handoff mechanism must be implemented in CR networks. Spectrum handoff procedures aim to help the secondary...

    Provided By National Chiao Tung University

  • White Papers // Jul 2009

    A Multi-Camera Tracking System That Can Always Select a Better View to Perform Tracking

    In this paper, the authors propose a new multiple-camera people tracking system that is equipped with the following functions: can handle long-term occlusions, complete occlusions, and unpredictable motions; can detect arbitrary sized foreground objects; can detect objects with much faster speed. The main contribution of our method is twofold: an...

    Provided By National Chiao Tung University

  • White Papers // Jul 2009

    Efficient Nonce-based Authentication Scheme for Session Initiation Protocol

    In recent years, Session Initiation Protocol (SIP) is more and more popular. However, there are many security problems in the Session Initiation Protocol. In 2005, Yang et al. proposed a secure authentication scheme for Session Initiation Protocol. This authentication scheme is based on Diffe-Hellman concept, so the computation cost of...

    Provided By National Chiao Tung University

  • White Papers // Jun 2009

    A Hyper-Domain Image Watermarking Method Based on Macro Edge Block and Wavelet Transform for Digital Signal Processor

    In order to protect original data, watermarking is first consideration direction for digital information copyright. In addition, to achieve high quality image, the algorithm maybe cannot run on embedded system because the computation is very complexity. However, almost nowadays algorithms need to build on consumer production because integrator circuit has...

    Provided By National Chiao Tung University

  • White Papers // Jun 2009

    Efficient k-out-of-n Oblivious Transfer Schemes

    Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme allows a buyer to privately choose k out of n digital goods from a merchant without learning information about other n-k goods. In this paper, the authors propose several...

    Provided By National Chiao Tung University

  • White Papers // Nov 2012

    UNCLE: A Unified Unicast and Multicast Label Forwarding Architecture in MANETs

    This paper presents a novel cross-layer forwarding scheme, called UNified unicast and multiCast LabEling (UNCLE), for Mobile Ad hoc NETworks (MANETs). Unlike traditional unicast and multicast forwarding schemes requiring two different protocol stacks, the proposed UNCLE forwarding method requires only one single protocol stack, and thus avoid the need of...

    Provided By National Chiao Tung University

  • White Papers // Aug 2009

    An Efficient MIMO Detection Algorithm Employed in Imperfect Noise Estimation

    An efficient Multiple-Input Multiple-Output (MIMO) Detection (MD) algorithm includes novel, low-complexity, near-optimal and robust scheme is proposed in wireless communications when imperfect noise estimation is considered. By using MIMO technique, capacity increases proportionally as the number of antennas is increased, but the introduced Inter-Antenna Interference (IAI) degrades system performance. To...

    Provided By National Chiao Tung University

  • White Papers // Aug 2009

    Complexity Reduction by Using Triangular Matrix Multiplication in Computing Capacity for an Optimal Transmission

    Multiple-Input-Multiple-Output (MIMO) technique is often employed to increase capacity in comparing to systems with single antenna. In wireless MIMO communications, the design of an optimal transmission is essential in order to meet demands from a large number of simultaneous data transmissions. Bertrand et al. shows the mutual information constrained constellation...

    Provided By National Chiao Tung University

  • White Papers // Nov 2012

    A Trust Mechanism for Web Services Registries Data Exchanging

    In recent years, Web Services (WS) have been becoming more popular, as more people realize its benefits. However, the WS-Security specification only guarantees the security on end-to-end level. The authors propose the architecture of Trust-based Web Services Registries Data Exchanging (TWSRDE) which is four-tier architecture composed of the users, Web...

    Provided By National Chiao Tung University

  • White Papers // Oct 2009

    Dynamic Power Management in Cognitive Radio Networks Based on Constrained Stochastic Games

    Recent studies have been conducted to indicate the ineffective usage of licensed bands due to the static spectrum allocation. In order to improve the spectrum utilization, the Cognitive Radio is therefore suggested to dynamically exploit the opportunistic primary frequency spectrums. The interference from the secondary users to the primary user...

    Provided By National Chiao Tung University

  • White Papers // Feb 2010

    Extracting Attack Sessions From Real Traffic With Intrusion Prevention Systems

    False Positive (FP) and False Negative (FN) happen to every Intrusion Prevention System (IPS). No one could do better judgment than others all the time. This paper proposes a system of Attack Session Extraction (ASE) to create a pool of traffic traces which cause possible FNs and FPs to IPSs....

    Provided By National Chiao Tung University

  • White Papers // Apr 2010

    An Open Architecture for Monitoring and Measuring QoS Indicators in Wireless Community Networks

    Wireless Community Networks (WCNs) are wide-area wireless networks whose nodes are owned and managed by volunteers. These networks are rarely supported by any infrastructure for measuring network performance indicators. In this paper, the authors present the design, the implementation and the experimental evaluation of KIXEM, an open agent-based architecture, whose...

    Provided By National Chiao Tung University

  • White Papers // Apr 2010

    A Simulation Mechanism for Video Delivery Researches

    At present, video delivery over the wired or wireless packet-switched networks has been motivating a series of researches into video encoding, Quality of Service (QoS), multimedia communication, and service models of networks. However, most of researchers lack a suitable video delivery simulation platform closer to the real video delivery system....

    Provided By National Chiao Tung University

  • White Papers // Jan 2011

    Excess Cash Holdings And Investment: The Moderating Roles Of Financial Constraints And Managerial Entrenchment

    The authors study investigates the relationship between excess cash holdings and investment behavior, under both financial constraints and managerial entrenchment, based upon a sample of Taiwanese firms, which are in the environment characterized by poor legal protection for investors, with the data covering the years 2000 to 2006. They find...

    Provided By National Chiao Tung University

  • White Papers // Jan 2011

    The Effects of Using Roadside Wireless Repeaters on Extending Path Lifetime in Vehicle-Formed Mobile Ad Hoc Networks on Highways

    Intelligent Transportation Systems (ITS) is an important research topic. One goal of ITS is to exchange information among vehicles in a timely and efficient manner. In the ITS research community, Inter-Vehicle Communications (IVC) is considered a way that could achieve this goal without infrastructure support. An information network built on...

    Provided By National Chiao Tung University

  • White Papers // Jan 2011

    Facilitating the Network Entry and Link Establishment Processes of IEEE 802.16 Mesh Networks

    The IEEE 802.16 standard is a promising next-generation broadband technology. It contains two operational modes - PMP and mesh. The PMP mode defines one-hop communication between a Base Station (BS) and a Subscriber Station (SS), while the mesh mode allows traffic to be directly exchanged and forwarded among neighboring SSs....

    Provided By National Chiao Tung University

  • White Papers // Sep 2011

    Mobile-Gateway Routing for Vehicular Networks

    Development of Vehicular Ad hoc NETworks (VANETs) has drawn intensive attention in recent years. Designing routing protocols for Vehicle-To-Vehicle (V2V) communication in VANET may suffer from frequent link change and disconnection. Vehicle-To-Infrastructure (V2I) communication can overcome the challenge by relaying packets through the backbone network, but is limited to those...

    Provided By National Chiao Tung University

  • White Papers // Jul 2009

    An Energy-Aware, Cluster-Based Routing Algorithm for Wireless Sensor Networks

    Cluster-based routing protocols have special advantages that help enhance both scalability and efficiency of the routing protocol. Likewise, finding the best way to arrange clustering so as to maximize the network's lifetime is now an important research topic in the field of wireless sensor networks. In this paper, the authors...

    Provided By National Chiao Tung University

  • White Papers // Jan 2011

    Role of Channel Estimation in Physical Layer Protocol Design of OFDM Wireless Systems and Relay-Type Cooperative Communication

    The authors consider the role of physical-layer signal processing functions in the design of physical-layer protocols for OFDM point-to-point and relay-type cooperative wireless communication systems. In particular, they examine the role of the channel estimation function to some depth. To effect a pointed discussion, they employ the IEEE 802.16e/WiMAX OFDMA...

    Provided By National Chiao Tung University

  • White Papers // May 2010

    Frame-Aggregated Link Adaptation Protocol for Next Generation Wireless Local Area Networks

    The performance of wireless networks is affected by channel conditions. Link Adaptation techniques have been proposed to improve the degraded network performance by adjusting the design parameters, for example, the modulation and coding schemes, in order to adapt to the dynamically changing channel conditions. Furthermore, due to the advancement of...

    Provided By National Chiao Tung University

  • White Papers // Jan 2010

    Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes

    A new method for software program protection by information sharing and authentication techniques using invisible ASCII control codes is proposed. A scheme for sharing a secret source program written in Visual C++ among a group of participants, each holding a camouflage program to hide a share, is first proposed for...

    Provided By National Chiao Tung University

  • White Papers // Sep 2011

    A O.6V 200kHz Silicon Oscillator With Temperature Compensation for Wireless Sensing Applications

    Recent advances in silicon sensors and circuit technology have enabled various wireless sensing applications. The deployed wireless sensors are highly integrated with limited power sources to reduce cost. Systems relying on batteries or energy scavenging from the environment operate at low frequencies (sub-MHz) to save power. Nevertheless, most of functions...

    Provided By National Chiao Tung University

  • White Papers // Oct 2008

    A Novel Embedded Bandwidth-Aware Frame Compressor for Mobile Video Applications

    To reduce the bandwidth requirement and the size of frame memory for video decoding, embedding a compressor/decompressor on the chip is a well-known solution. Video compression has been developed for a long time and numbers of algorithm have been proposed. Those algorithms show one that enhancing the complexity can reach...

    Provided By National Chiao Tung University

  • White Papers // Jul 2009

    A Multi-Camera Tracking System That Can Always Select a Better View to Perform Tracking

    In this paper, the authors propose a new multiple-camera people tracking system that is equipped with the following functions: can handle long-term occlusions, complete occlusions, and unpredictable motions; can detect arbitrary sized foreground objects; can detect objects with much faster speed. The main contribution of our method is twofold: an...

    Provided By National Chiao Tung University

  • White Papers // Jan 2010

    Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Code

    A new method for software program protection by information sharing and authentication techniques using invisible ASCII control codes is proposed. A scheme for sharing a secret source program written in Visual C++ among a group of participants, each holding a camouflage program to hide a share, is first proposed for...

    Provided By National Chiao Tung University

  • White Papers // Jul 2009

    Performance Gains for Spectrum Utilization in Cognitive Radio Networks With Spectrum Handoff

    Cognitive Radio (CR) can improve spectrum utilization by allowing the secondary users to temporarily access the primary users' unutilized licensed spectrum. In order to guarantee Quality of Service (QoS) of the secondary users, spectrum handoff mechanism must be implemented in CR networks. Spectrum handoff procedures aim to help the secondary...

    Provided By National Chiao Tung University

  • White Papers // May 2012

    Channel-Aware Distributed Best-Linear-Unbiased Estimation With Reduced Communication Overheads

    Energy consumption in wireless sensor networks is dominated by intra-network communication dedicated to coordination and information exchange between sensor nodes and the fusion center. The design of distributed estimation algorithms with reduced communication overheads is thus rather crucial. For amplify-and-forward sensor networks over flat fading channels, this paper proposes a...

    Provided By National Chiao Tung University

  • White Papers // May 2012

    A User-Differentiation-Based Resource Allocation Scheme for OFDMA Downlink Systems

    This paper proposes a new User-Differentiation based Resource Allocation (UDRA) scheme for OFDMA downlink systems. The UDRA scheme can strike a good balance between Quality-of-Service (QoS) requirement guarantee and system throughput enhancement, whereas conventional schemes cannot explicitly and accurately control this tradeoff. The UDRA scheme first performs a utility-based resource...

    Provided By National Chiao Tung University

  • White Papers // Mar 2012

    Predictive Interference-Based Scheduling Mechanism for Direct Communications in IEEE 802.16 Networks

    The Point-to-Multi-Point (PMP) mode is considered a well-adopted transmission type that is supported by the IEEE 802.16 standard. The Base Station (BS) is served as a centralized coordinator to control and forward packets for Mobile Stations (MSs) within the network. With the consideration of direct communications, the required bandwidth and...

    Provided By National Chiao Tung University

  • White Papers // Mar 2012

    A GA-Based Optimization for Frequency-Selective Scheduling in Downlink OFDMA Systems With Cyclic-Delay Diversity

    CDD (Cyclic-Delay Diversity) aided frequency-selective scheduling has been known as an effective technique to increase system capacity of the OFDMA (Orthogonal Frequency-Division Multiple Access) systems. By increasing the channels' frequency selectivity with cyclic delays, the merit of multi-user diversity can be exploited more effectively in the system. In this paper,...

    Provided By National Chiao Tung University

  • White Papers // Oct 2009

    Realization of Greedy Anti-Void Routing Protocol for Wireless Sensor Networks

    The void problem causing the routing failure is the main challenge of the greedy routing in the Wireless Sensor Networks. The current research paper still cannot fully deal with the void problem since the excessive control overheads should be consumed so as to guarantee the delivery of packets. In the...

    Provided By National Chiao Tung University

  • White Papers // Apr 2013

    CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing

    Cloud services are blooming recently. They provide a convenient way for data accessing, sharing, and processing. A key ingredient for successful cloud services is to control data access while considering the specific features of cloud services. The specific features include great quantity of outsourced data, large number of users, honest-but-curious...

    Provided By National Chiao Tung University

  • White Papers // Mar 2011

    Reliability and Security of Large Scale Data Storage in Cloud Computing

    In this paper, the authors will present new challenges to the large scale cloud computing, namely reliability and security. Recent progress in the research area will be briefly reviewed. It has been proved that it is impossible to satisfy consistency, availability, and partitioned-tolerance simultaneously. Tradeoff becomes crucial among these factors...

    Provided By National Chiao Tung University

  • White Papers // Oct 2012

    Robust Linear Beamformer Designs for CoMP AF Relaying in Downlink Multi-Cell Networks

    Robust beam forming methods are studied to support relay-assisted Coordinated Multi-Point (CoMP) retransmissions in downlink multi-cell networks. Linear Beam-Formers (BFers) for relay stations of different cells are jointly designed to maintain, in a CoMP Amplify-and-Forward (AF) relaying manner, the target Signal to Interference-plus-Noise Ratios (SINR) at the cellular boundaries of...

    Provided By National Chiao Tung University

  • White Papers // Jun 2009

    Efficient k-out-of-n Oblivious Transfer Schemes

    Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme allows a buyer to privately choose k out of n digital goods from a merchant without learning information about other n-k goods. In this paper, the authors propose several...

    Provided By National Chiao Tung University

  • White Papers // Apr 2013

    EagleEye: Towards Mandatory Security Monitoring in Virtualized Datacenter Environment

    Virtualized DataCenter (VDC) has become a popular approach to large-scale system consolidation and the enabling technology for infrastructure-as-a-service cloud computing. The consolidation inevitably aggregates the security threats once faced by individual systems towards a VDC, and a VDC operator should remain vigilant of the threats at all times. The authors...

    Provided By National Chiao Tung University

  • White Papers // Apr 2013

    Exploiting Neigborhood Similarity for Virtual Machine Migration Over Wide-Area Network

    Conventional Virtual Machine (VM) migration focuses on transferring a VM's memory and CPU states across host machines. The VM's disk image has to remain accessible to both the source and destination host machines through shared storage during the migration. As a result, conventional virtual machine migration is limited to host...

    Provided By National Chiao Tung University

  • White Papers // Jul 2009

    Efficient Nonce-based Authentication Scheme for Session Initiation Protocol

    In recent years, Session Initiation Protocol (SIP) is more and more popular. However, there are many security problems in the Session Initiation Protocol. In 2005, Yang et al. proposed a secure authentication scheme for Session Initiation Protocol. This authentication scheme is based on Diffe-Hellman concept, so the computation cost of...

    Provided By National Chiao Tung University

  • White Papers // Apr 2012

    Performance Evaluation of Inter-Processor Communication for an Embedded Heterogeneous Multi-Core Processor

    Embedded systems often use a heterogeneous multi-core processor to improve performance and energy efficiency. This multi-core processor is composed of a General Purpose Processor (GPP), which manages the program flow and I/O, and a Digital signal Processor (DSP), which processes mass data. An Inter-Processor Communication (IPC) mechanism is thus required...

    Provided By National Chiao Tung University

  • White Papers // Jun 2008

    Filtering of Unnecessary Branch Predictor Lookups for Low-Power Processor Architecture

    Efforts to reduce power consumption of processors have gained much attention recently. Dynamic branch predictor, including BTB, is exercised in every instruction cycle, yet branch instructions only constitute a small percentage of instructions during program execution. This paper proposes a novel method to collect the next branch distances of the...

    Provided By National Chiao Tung University

  • White Papers // Aug 2007

    Event-Driven Dynamic Workload Scaling for Uniprocessor Real-Time Embedded Systems

    Many embedded systems are designed to take timely reactions to the occurrences of particular scenarios. For example, an automobile controlling system should simultaneously control cruising, traction, the brake system, and the engine. A real-time surveillance system in a shopping mall could track a number of moving people and evaluate pre-defined...

    Provided By National Chiao Tung University

  • White Papers // Dec 2007

    A Novel Approach to Comparison-Based Diagnosis for Hypercube-Like Systems

    Interconnection network has been an active research area for parallel and distributed computer systems. The diagnosability is one of the important issues in the reliability of interconnection networks. In this paper, a novel idea on system diagnosis called local diagnosability is presented. The concept of local diagnosability is strongly related...

    Provided By National Chiao Tung University

  • White Papers // Dec 2008

    Energy Efficient Intra-Task Dynamic Voltage Scaling for Realistic CPUs of Mobile Devices

    It is not energy efficient to run a CPU at full speed all the time for all kinds of tasks in mobile devices. This paper proposes two energy efficient intra-task Dynamic Voltage Scaling (DVS) algorithms for CPUs. There are three main contributions in this paper. Firstly, unlike the tedious derivation...

    Provided By National Chiao Tung University

  • White Papers // Aug 2009

    XOR-Forwarding for Wireless Networks

    This paper proposes a localized network-coding-based packet forwarding protocol for wireless networks, called Opportunistic A Synchronous Information diSsemination (OASIS), based on COPE. OASIS not only inherents two features from COPE, opportunistic listening and opportunistic coding, but also introduces a new one, opportunistic information dissemination, which aggressively encodes as many packets...

    Provided By National Chiao Tung University

  • White Papers // Sep 2008

    A Mobility Management Strategy for GPRS

    In General Packet Radio Service (GPRS), a Mobile Station (MS) is tracked at the cell level during packet transmission, and is tracked at the Routing Area (RA) level when no packet is delivered. A READY Timer (RT) mechanism was proposed in 3GPP 23.060 to determine when to switch from cell...

    Provided By National Chiao Tung University