National Chiao Tung University

Displaying 1-40 of 57 results

  • White Papers // Aug 2009

    XOR-Forwarding for Wireless Networks

    This paper proposes a localized network-coding-based packet forwarding protocol for wireless networks, called Opportunistic A Synchronous Information diSsemination (OASIS), based on COPE. OASIS not only inherents two features from COPE, opportunistic listening and opportunistic coding, but also introduces a new one, opportunistic information dissemination, which aggressively encodes as many packets...

    Provided By National Chiao Tung University

  • White Papers // Jul 2009

    Indoor Localization: Automatically Constructing Today's Radio Map by iRobot and RFIDs

    For outdoor localization, GPS already provides a satisfactory solution. For indoor localization, however, a globally usable solution is still missing. One promising direction that is proposed recently is the fingerprinting-based solution. It involves a training phase to collect the Radio Signal Strength (RSS) patterns in fields where localization is needed...

    Provided By National Chiao Tung University

  • White Papers // Jan 2010

    Bandwidth Routing in Multi-Hop Packet Radio Environment

    This paper propose a bandwidth routing algorithm in a multi-hop packet radio environment, which is not necessarily a cellular structure network and could have no fixed base stations. Each mobile station has the responsibility to transfer packets for others. The wireless network can be either stand-alone, or connected to the...

    Provided By National Chiao Tung University

  • White Papers // Apr 2010

    An Open Architecture for Monitoring and Measuring QoS Indicators in Wireless Community Networks

    Wireless Community Networks (WCNs) are wide-area wireless networks whose nodes are owned and managed by volunteers. These networks are rarely supported by any infrastructure for measuring network performance indicators. In this paper, the authors present the design, the implementation and the experimental evaluation of KIXEM, an open agent-based architecture, whose...

    Provided By National Chiao Tung University

  • White Papers // Apr 2010

    A Simulation Mechanism for Video Delivery Researches

    At present, video delivery over the wired or wireless packet-switched networks has been motivating a series of researches into video encoding, Quality of Service (QoS), multimedia communication, and service models of networks. However, most of researchers lack a suitable video delivery simulation platform closer to the real video delivery system....

    Provided By National Chiao Tung University

  • White Papers // Jul 2010

    VPN Gateways Over Network Processors: Implementation and Evaluation

    Networking applications, such as VPN and content filtering, demand extra computing power in order to meet the throughput requirement nowadays. In addition to pure ASIC solutions, network processor architecture is emerging as an alternative to scale up data-plane processing while retaining design flexibility. This paper, rather than proposing new algorithms,...

    Provided By National Chiao Tung University

  • White Papers // Feb 2010

    Extracting Attack Sessions From Real Traffic With Intrusion Prevention Systems

    False Positive (FP) and False Negative (FN) happen to every Intrusion Prevention System (IPS). No one could do better judgment than others all the time. This paper proposes a system of Attack Session Extraction (ASE) to create a pool of traffic traces which cause possible FNs and FPs to IPSs....

    Provided By National Chiao Tung University

  • White Papers // Jan 2011

    Excess Cash Holdings And Investment: The Moderating Roles Of Financial Constraints And Managerial Entrenchment

    The authors study investigates the relationship between excess cash holdings and investment behavior, under both financial constraints and managerial entrenchment, based upon a sample of Taiwanese firms, which are in the environment characterized by poor legal protection for investors, with the data covering the years 2000 to 2006. They find...

    Provided By National Chiao Tung University

  • White Papers // Jun 2009

    A Hyper-Domain Image Watermarking Method Based on Macro Edge Block and Wavelet Transform for Digital Signal Processor

    In order to protect original data, watermarking is first consideration direction for digital information copyright. In addition, to achieve high quality image, the algorithm maybe cannot run on embedded system because the computation is very complexity. However, almost nowadays algorithms need to build on consumer production because integrator circuit has...

    Provided By National Chiao Tung University

  • White Papers // Jan 2011

    Role of Channel Estimation in Physical Layer Protocol Design of OFDM Wireless Systems and Relay-Type Cooperative Communication

    The authors consider the role of physical-layer signal processing functions in the design of physical-layer protocols for OFDM point-to-point and relay-type cooperative wireless communication systems. In particular, they examine the role of the channel estimation function to some depth. To effect a pointed discussion, they employ the IEEE 802.16e/WiMAX OFDMA...

    Provided By National Chiao Tung University

  • White Papers // Sep 2011

    Mobile-Gateway Routing for Vehicular Networks

    Development of Vehicular Ad hoc NETworks (VANETs) has drawn intensive attention in recent years. Designing routing protocols for Vehicle-To-Vehicle (V2V) communication in VANET may suffer from frequent link change and disconnection. Vehicle-To-Infrastructure (V2I) communication can overcome the challenge by relaying packets through the backbone network, but is limited to those...

    Provided By National Chiao Tung University

  • White Papers // Jun 2010

    Mini-Slot Scheduling for IEEE 802.16d Chain and Grid Mesh Networks

    This paper considers the mini-slot scheduling problem in IEEE 802.16d Wireless Mesh Networks (WMNs). An efficient mini-slot scheduling needs to take into account the transmission overhead, the scheduling complexity, and the signaling overhead to broadcast the scheduling results. The authors are interested in chain and grid WMNs, which are the...

    Provided By National Chiao Tung University

  • White Papers // Jul 2009

    A Multi-Camera Tracking System That Can Always Select a Better View to Perform Tracking

    In this paper, the authors propose a new multiple-camera people tracking system that is equipped with the following functions: can handle long-term occlusions, complete occlusions, and unpredictable motions; can detect arbitrary sized foreground objects; can detect objects with much faster speed. The main contribution of our method is twofold: an...

    Provided By National Chiao Tung University

  • White Papers // Sep 2011

    A O.6V 200kHz Silicon Oscillator With Temperature Compensation for Wireless Sensing Applications

    Recent advances in silicon sensors and circuit technology have enabled various wireless sensing applications. The deployed wireless sensors are highly integrated with limited power sources to reduce cost. Systems relying on batteries or energy scavenging from the environment operate at low frequencies (sub-MHz) to save power. Nevertheless, most of functions...

    Provided By National Chiao Tung University

  • White Papers // Apr 2010

    A Low-Power All-Digital Signal Component Separator for OFDM LINC Systems

    LINC can achieve linear amplification by using high-efficiency amplifiers. This paper presents an all-digital LINC Signal Component Separator (SCS) including the phase calculation digital signal processing and two Digital-Control Phase Shifters (DCPSs). With the duplicate DCPSs, a pre-calibration scheme is introduced to guarantee the codeword-to-phase linearity and accuracy under different...

    Provided By National Chiao Tung University

  • White Papers // Jul 2011

    An Energy-Efficient OFDM-Based Baseband Transceiver Design for Ubiquitous Healthcare Monitoring Applications

    Wireless Body Area Network (WBAN) is an emerging technology which is specifically designed for the applications of body signal gathering and monitoring to provide reliable physical information. A typical WBAN consists of multiple of Wireless Sensor Nodes (WSNs) and Central Processing Node (CPN). The CPN is integrated in a portable...

    Provided By National Chiao Tung University

  • White Papers // May 2010

    Frame-Aggregated Link Adaptation Protocol for Next Generation Wireless Local Area Networks

    The performance of wireless networks is affected by channel conditions. Link Adaptation techniques have been proposed to improve the degraded network performance by adjusting the design parameters, for example, the modulation and coding schemes, in order to adapt to the dynamically changing channel conditions. Furthermore, due to the advancement of...

    Provided By National Chiao Tung University

  • White Papers // Jan 2010

    Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes

    A new method for software program protection by information sharing and authentication techniques using invisible ASCII control codes is proposed. A scheme for sharing a secret source program written in Visual C++ among a group of participants, each holding a camouflage program to hide a share, is first proposed for...

    Provided By National Chiao Tung University

  • White Papers // Jan 2010

    Autonomous Light Control by Wireless Sensor and Actuator Networks

    Recently, Wireless Sensor and Actuator Networks (WSANs) have been widely discussed in many applications. In this paper, the authors propose an autonomous light control system based on the feedback from light sensors carried by users. Their design focuses on meeting users' preferences and energy efficiency. Both whole and local lighting...

    Provided By National Chiao Tung University

  • White Papers // Jan 2011

    The Effects of Using Roadside Wireless Repeaters on Extending Path Lifetime in Vehicle-Formed Mobile Ad Hoc Networks on Highways

    Intelligent Transportation Systems (ITS) is an important research topic. One goal of ITS is to exchange information among vehicles in a timely and efficient manner. In the ITS research community, Inter-Vehicle Communications (IVC) is considered a way that could achieve this goal without infrastructure support. An information network built on...

    Provided By National Chiao Tung University

  • White Papers // Jan 2011

    Facilitating the Network Entry and Link Establishment Processes of IEEE 802.16 Mesh Networks

    The IEEE 802.16 standard is a promising next-generation broadband technology. It contains two operational modes - PMP and mesh. The PMP mode defines one-hop communication between a Base Station (BS) and a Subscriber Station (SS), while the mesh mode allows traffic to be directly exchanged and forwarded among neighboring SSs....

    Provided By National Chiao Tung University

  • White Papers // Jan 2010

    Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Code

    A new method for software program protection by information sharing and authentication techniques using invisible ASCII control codes is proposed. A scheme for sharing a secret source program written in Visual C++ among a group of participants, each holding a camouflage program to hide a share, is first proposed for...

    Provided By National Chiao Tung University

  • White Papers // Jul 2009

    An Energy-Aware, Cluster-Based Routing Algorithm for Wireless Sensor Networks

    Cluster-based routing protocols have special advantages that help enhance both scalability and efficiency of the routing protocol. Likewise, finding the best way to arrange clustering so as to maximize the network's lifetime is now an important research topic in the field of wireless sensor networks. In this paper, the authors...

    Provided By National Chiao Tung University

  • White Papers // Jun 2011

    A 1kb 9T Subthreshold SRAM with Bit-interleaving Scheme in 65nm CMOS

    Sub-threshold SRAM is a significant approach to reduce power consumption in energy-constrained SoC design. For the ultra-low power consideration, the primary concerns of SRAM are stability and reliability instead of performance. In this paper, the proposed 9T bit-cell enhances write ability by cutting off the positive feedback loop of inverter...

    Provided By National Chiao Tung University

  • White Papers // Apr 2012

    Performance Evaluation of Inter-Processor Communication for an Embedded Heterogeneous Multi-Core Processor

    Embedded systems often use a heterogeneous multi-core processor to improve performance and energy efficiency. This multi-core processor is composed of a General Purpose Processor (GPP), which manages the program flow and I/O, and a Digital signal Processor (DSP), which processes mass data. An Inter-Processor Communication (IPC) mechanism is thus required...

    Provided By National Chiao Tung University

  • White Papers // Jun 2008

    Filtering of Unnecessary Branch Predictor Lookups for Low-Power Processor Architecture

    Efforts to reduce power consumption of processors have gained much attention recently. Dynamic branch predictor, including BTB, is exercised in every instruction cycle, yet branch instructions only constitute a small percentage of instructions during program execution. This paper proposes a novel method to collect the next branch distances of the...

    Provided By National Chiao Tung University

  • White Papers // Aug 2007

    Event-Driven Dynamic Workload Scaling for Uniprocessor Real-Time Embedded Systems

    Many embedded systems are designed to take timely reactions to the occurrences of particular scenarios. For example, an automobile controlling system should simultaneously control cruising, traction, the brake system, and the engine. A real-time surveillance system in a shopping mall could track a number of moving people and evaluate pre-defined...

    Provided By National Chiao Tung University

  • White Papers // Dec 2007

    A Novel Approach to Comparison-Based Diagnosis for Hypercube-Like Systems

    Interconnection network has been an active research area for parallel and distributed computer systems. The diagnosability is one of the important issues in the reliability of interconnection networks. In this paper, a novel idea on system diagnosis called local diagnosability is presented. The concept of local diagnosability is strongly related...

    Provided By National Chiao Tung University

  • White Papers // Dec 2008

    Energy Efficient Intra-Task Dynamic Voltage Scaling for Realistic CPUs of Mobile Devices

    It is not energy efficient to run a CPU at full speed all the time for all kinds of tasks in mobile devices. This paper proposes two energy efficient intra-task Dynamic Voltage Scaling (DVS) algorithms for CPUs. There are three main contributions in this paper. Firstly, unlike the tedious derivation...

    Provided By National Chiao Tung University

  • White Papers // Dec 2007

    Thread Allocation in Chip Multiprocessor Based Multithreaded Network Processors

    In this paper, the authors try to derive ideas for thread allocation in Chip Multi-Processor (CMP)-based network processors performing general applications by continuous-time markov chain modeling and petri net simulations. The concept of P-M ratio, where P and M indicate the computational and memory access overhead when processing a packet,...

    Provided By National Chiao Tung University

  • White Papers // Jun 2009

    Efficient k-out-of-n Oblivious Transfer Schemes

    Oblivious transfer is an important cryptographic protocol in various security applications. For example, in on-line transactions, a k-out-of-n oblivious transfer scheme allows a buyer to privately choose k out of n digital goods from a merchant without learning information about other n-k goods. In this paper, the authors propose several...

    Provided By National Chiao Tung University

  • White Papers // Jul 2009

    Efficient Nonce-based Authentication Scheme for Session Initiation Protocol

    In recent years, Session Initiation Protocol (SIP) is more and more popular. However, there are many security problems in the Session Initiation Protocol. In 2005, Yang et al. proposed a secure authentication scheme for Session Initiation Protocol. This authentication scheme is based on Diffe-Hellman concept, so the computation cost of...

    Provided By National Chiao Tung University

  • White Papers // Apr 2013

    EagleEye: Towards Mandatory Security Monitoring in Virtualized Datacenter Environment

    Virtualized DataCenter (VDC) has become a popular approach to large-scale system consolidation and the enabling technology for infrastructure-as-a-service cloud computing. The consolidation inevitably aggregates the security threats once faced by individual systems towards a VDC, and a VDC operator should remain vigilant of the threats at all times. The authors...

    Provided By National Chiao Tung University

  • White Papers // Apr 2013

    Exploiting Neigborhood Similarity for Virtual Machine Migration Over Wide-Area Network

    Conventional Virtual Machine (VM) migration focuses on transferring a VM's memory and CPU states across host machines. The VM's disk image has to remain accessible to both the source and destination host machines through shared storage during the migration. As a result, conventional virtual machine migration is limited to host...

    Provided By National Chiao Tung University

  • White Papers // Jul 2008

    A Quasi-Delay-Insensitive Microprocessor Core Implementation for Microcontrollers

    Microcontrollers are widely used on simple systems; thus, how to keep them operating with high robustness and low power consumption are the two most important issues. It is widely known that asynchronous circuit is the best solution to address these two issues at the same time. However, it's not very...

    Provided By National Chiao Tung University

  • White Papers // Oct 2012

    A Flexible Remote User Authentication Sheme Using Smart Cards

    In 1999, Hwang and Li proposed a new user authentication scheme using smartcards. The scheme does not need any password or verification table. Later, Sun proposed an efficient remote user authentication scheme to improve the efficiency of the Hwang-Li scheme. However, these two schemes do not allow users to freely...

    Provided By National Chiao Tung University

  • White Papers // Jul 2006

    A Study on Information Security Evaluation Testing Laboratory Planning - Illustration of PKI

    The security of information system impacts national security and social order. Just like a chain, the durability of the information security depends on its weakest part. People are so familiar with the news coverage saying that Microsoft's products fell into hackers' prey. A number of viruses, such as \"Code red...

    Provided By National Chiao Tung University

  • White Papers // Jul 2009

    Performance Gains for Spectrum Utilization in Cognitive Radio Networks With Spectrum Handoff

    Cognitive Radio (CR) can improve spectrum utilization by allowing the secondary users to temporarily access the primary users' unutilized licensed spectrum. In order to guarantee Quality of Service (QoS) of the secondary users, spectrum handoff mechanism must be implemented in CR networks. Spectrum handoff procedures aim to help the secondary...

    Provided By National Chiao Tung University

  • White Papers // Aug 2012

    A New Timing Synchronization and Cell Search Procedure Resistant to Carrier Frequency Offsets for 3GPP-LTE Downlink

    A timing synchronization and cell search procedure for the 3rd Generation Partnership Project Long Term Evolution (3GPP-LTE) standard is proposed. First, initial timing detection utilizing the secondary synchronization signal (SSS) is performed and the Fractional Carrier Frequency Offset (FCFO) is compensated. Second, joint synchronization based on Primary Synchronization Signal (PSS)...

    Provided By National Chiao Tung University

  • White Papers // May 2012

    Channel-Aware Distributed Best-Linear-Unbiased Estimation With Reduced Communication Overheads

    Energy consumption in wireless sensor networks is dominated by intra-network communication dedicated to coordination and information exchange between sensor nodes and the fusion center. The design of distributed estimation algorithms with reduced communication overheads is thus rather crucial. For amplify-and-forward sensor networks over flat fading channels, this paper proposes a...

    Provided By National Chiao Tung University