National Taiwan University of Science and Technology

Displaying 1-12 of 12 results

  • White Papers // Jan 2013

    Update-Efficient Regenerating Codes with Minimum Per-Node Storage

    Cloud storage is gaining popularity as an alternative to enterprise storage where data is stored in virtualized pools of storage typically hosted by third-party data centers. Regenerating codes provide an efficient way to recover data at failed nodes in distributed storage systems. It has been shown that regenerating codes can...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Oct 2012

    On Secure Beamforming for Wiretap Channels with Partial Channel State Information at the Transmitter

    In this paper, the authors consider the secure transmission in ergodic fast fading Multiple-Input Single-Output Single-antenna-Eavesdropper (MISOSE) wiretap channels with only the statistics of eavesdropper's Channel State Information at the Transmitter (CSIT). Two kinds of the legitimate CSIT are assumed, that is, full and statistical legitimate CSIT. With full legitimate...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Jun 2012

    Maintenance Reliability of a Computer Network with Nodes Failure in the Cloud Computing Environment

    With the development of information technology, the cloud computing ser-vice has become a new paradigm for the business and industry. In this paper, the authors propos a performance indicator, the maintenance reliability, to evaluate the capability that a CN can send d units of data from the cloud to the...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Mar 2012

    Load Balance for Mobile Sensor Patrolling in Surveillance Sensor Networks

    Wireless sensor networks have been used for a variety of purposes such as habitat monitoring, malicious target detection, and climate observation. Conventionally, stationary sensors are used to carry out sensing tasks in a region of interest. However, if the region is much larger than the sensing range of a single...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Mar 2012

    Improving Routing State Consistency and Reducing Overhead for Migration-Based Load Balance Systems in Structured Overlay Networks

    In DHT-based peer to peer systems, migration-based load balancing schemes employing virtual servers as their fundamental mechanism have been shown to be the most viable strategy for load balancing when workload may shift dynamically as time progresses. However, all previous proposals must employ a large number of virtual servers to...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Jul 2011

    Use of Hamiltonian Cycles in Cryptograph

    In cryptography, key distribution is always an important issue in establishing a symmetric key. The famous method of exchanging keys, Diffie-Hellman key exchange, is also vulnerable to a man-in-the-middle attack. Therefore, many protocols are proposed to secure the exchange such as the authenticated D-H key agreement protocol, Station-To-Station (STS) protocol...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Dec 2010

    Robust Header Compression With Load Balance and Dynamic Bandwidth Aggregation Capabilities in WLAN

    The vigorous development of WLAN in recent years has introduced various kinds of WLAN techniques and research subjects been brought up. The development of WLAN in recent years has deeply involved in the people life. Besides of applying in home and office, IEEE 802.11 is also used in medium to...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Nov 2009

    Certificateless Authenticated Group Key Agreement Protocol for Unbalanced Wireless Mobile Networks

    In 2004, Bresson et al. proposed a mutual authentication and group key agreement protocol for unbalanced wireless networks. Tseng recently proposed a novel secure protocol to improve Bresson et al.'s protocol. However, both protocols are based on certificate-based public key systems and insecure against the so-called impersonation attacks. They might...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Sep 2009

    A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks

    Traffic safety applications on Vehicular Ad hoc NETworks (VANETs) have drawn a lot of attention in recent years with their promising functions on car accident reduction, real-time traffic information support, and enhancement of comfortable driving experience on roadways. However, an inaccurate traffic warning message will impact drivers' decisions, waste drivers'...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Feb 2009

    Dynamical Properties Of Product Life Cycles: Implications To The Design And Operation Of Industrial Processes

    Life cycle assessment (LCA) offers a systematic approach in identifying the potential in reducing the environmental burden throughout the product life cycle. Generally, it deals with the steady state aspect of material and/or energy balances under the recycle structure. In this work, the dynamic behavior of the product life cycles...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Jan 2009

    Network Mobility Protocol for Vehicular Ad Hoc Networks

    The goal of the NEtwork MObility (NEMO) management is to effectively reduce the complexity of handoff procedure and keep the mobile devices connected to the Internet. Vehicle is moving so fast that it may cause the handoff and packet loss problems. Both of the problems will lower down the throughput...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Oct 2008

    Fair Sharing Using Real-Time Polling Service to Adaptive VBR Stream Transmission in a 802.16 Wireless Networks

    The Worldwide Interoperability for Microwave Access system's (WIMAX, IEEE 802.16) broadband networks is an attractive solution for high-bandwidth wireless access network. In the context of a wireless broadband access network, the term open real-time access implies the ability of multiple service BS (Base Station) to share the deployed access network...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Nov 2009

    Certificateless Authenticated Group Key Agreement Protocol for Unbalanced Wireless Mobile Networks

    In 2004, Bresson et al. proposed a mutual authentication and group key agreement protocol for unbalanced wireless networks. Tseng recently proposed a novel secure protocol to improve Bresson et al.'s protocol. However, both protocols are based on certificate-based public key systems and insecure against the so-called impersonation attacks. They might...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Oct 2008

    Fair Sharing Using Real-Time Polling Service to Adaptive VBR Stream Transmission in a 802.16 Wireless Networks

    The Worldwide Interoperability for Microwave Access system's (WIMAX, IEEE 802.16) broadband networks is an attractive solution for high-bandwidth wireless access network. In the context of a wireless broadband access network, the term open real-time access implies the ability of multiple service BS (Base Station) to share the deployed access network...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Jun 2012

    Maintenance Reliability of a Computer Network with Nodes Failure in the Cloud Computing Environment

    With the development of information technology, the cloud computing ser-vice has become a new paradigm for the business and industry. In this paper, the authors propos a performance indicator, the maintenance reliability, to evaluate the capability that a CN can send d units of data from the cloud to the...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Mar 2012

    Improving Routing State Consistency and Reducing Overhead for Migration-Based Load Balance Systems in Structured Overlay Networks

    In DHT-based peer to peer systems, migration-based load balancing schemes employing virtual servers as their fundamental mechanism have been shown to be the most viable strategy for load balancing when workload may shift dynamically as time progresses. However, all previous proposals must employ a large number of virtual servers to...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Oct 2012

    On Secure Beamforming for Wiretap Channels with Partial Channel State Information at the Transmitter

    In this paper, the authors consider the secure transmission in ergodic fast fading Multiple-Input Single-Output Single-antenna-Eavesdropper (MISOSE) wiretap channels with only the statistics of eavesdropper's Channel State Information at the Transmitter (CSIT). Two kinds of the legitimate CSIT are assumed, that is, full and statistical legitimate CSIT. With full legitimate...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Jan 2013

    Update-Efficient Regenerating Codes with Minimum Per-Node Storage

    Cloud storage is gaining popularity as an alternative to enterprise storage where data is stored in virtualized pools of storage typically hosted by third-party data centers. Regenerating codes provide an efficient way to recover data at failed nodes in distributed storage systems. It has been shown that regenerating codes can...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Feb 2009

    Dynamical Properties Of Product Life Cycles: Implications To The Design And Operation Of Industrial Processes

    Life cycle assessment (LCA) offers a systematic approach in identifying the potential in reducing the environmental burden throughout the product life cycle. Generally, it deals with the steady state aspect of material and/or energy balances under the recycle structure. In this work, the dynamic behavior of the product life cycles...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Sep 2009

    A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks

    Traffic safety applications on Vehicular Ad hoc NETworks (VANETs) have drawn a lot of attention in recent years with their promising functions on car accident reduction, real-time traffic information support, and enhancement of comfortable driving experience on roadways. However, an inaccurate traffic warning message will impact drivers' decisions, waste drivers'...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Jul 2011

    Use of Hamiltonian Cycles in Cryptograph

    In cryptography, key distribution is always an important issue in establishing a symmetric key. The famous method of exchanging keys, Diffie-Hellman key exchange, is also vulnerable to a man-in-the-middle attack. Therefore, many protocols are proposed to secure the exchange such as the authenticated D-H key agreement protocol, Station-To-Station (STS) protocol...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Dec 2010

    Robust Header Compression With Load Balance and Dynamic Bandwidth Aggregation Capabilities in WLAN

    The vigorous development of WLAN in recent years has introduced various kinds of WLAN techniques and research subjects been brought up. The development of WLAN in recent years has deeply involved in the people life. Besides of applying in home and office, IEEE 802.11 is also used in medium to...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Jan 2009

    Network Mobility Protocol for Vehicular Ad Hoc Networks

    The goal of the NEtwork MObility (NEMO) management is to effectively reduce the complexity of handoff procedure and keep the mobile devices connected to the Internet. Vehicle is moving so fast that it may cause the handoff and packet loss problems. Both of the problems will lower down the throughput...

    Provided By National Taiwan University of Science and Technology

  • White Papers // Mar 2012

    Load Balance for Mobile Sensor Patrolling in Surveillance Sensor Networks

    Wireless sensor networks have been used for a variety of purposes such as habitat monitoring, malicious target detection, and climate observation. Conventionally, stationary sensors are used to carry out sensing tasks in a region of interest. However, if the region is much larger than the sensing range of a single...

    Provided By National Taiwan University of Science and Technology