National Taiwan University

Displaying 1-40 of 115 results

  • White Papers // Jul 2013

    A Virtual Storage Environment for SSDs and HDDs in Xen Hypervisor

    Now-a-days, virtualization is a popular technology to provide an abstract hardware emulation due to the increasing hardware speed and capabilities such as multi-core CPUs, large-size main memory, and high-bandwidth networking. Virtualization technology enables multiple virtual machines to run on a physical machine, where each virtual machine can run independently and...

    Provided By National Taiwan University

  • White Papers // Mar 2013

    An Evaluation of RFID Door Security System at Taipei Arena Ice Land Based on Technology Acceptance Model

    In the service industry nowadays, creating customer value remains an important issue. RFID is capable of creating potential customer value for companies and allowing them to respond to customer needs with new services. However, in the process of introducing RFID systems, the degree of service quality, system quality, and information...

    Provided By National Taiwan University

  • White Papers // Feb 2013

    Password Cracking Based on Learned Patterns From Disclosed Passwords

    Password-based authentication systems are still the most commonly used mechanism for protecting sensitive information despite being vulnerable to dictionary based attacks. To guard against such attacks, many organizations enforce complicated password-creation rules and require that passwords include numeric and special characters. This paper demonstrates that as long as passwords are...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    MIMO Communications Based on Molecular Diffusion

    Diffusion-based communication refers to the transfer of information using molecules as message carriers whose propagation is based on the law of molecular diffusion. Path loss can have a major impact on the link quality in molecular communication as the signal strength is shown inversely proportional to the cube of the...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Markov Chain Performance Model for IEEE 802.11 Devices With Energy Harvesting Source

    Research on energy harvesting networks has attracted an increasing attention lately. Nevertheless, few research of energy harvesting network follows the IEEE 802.11 protocol, whose Medium Access Control (MAC) mechanism, called Distributed Coordination Function (DCF), is based on the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) algorithm and binary exponential...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    DeepSleep: IEEE 802.11 Enhancement for Energy-Harvesting Machine-to-Machine Communications

    As future M2M (Machine-To-Machine) communications aim at supporting wireless networks which feature long range, long operating duration and large device number, the IEEE 802.11ah Task Group is going to specify a global WLAN standard that utilizes carrier frequencies below 1GHz. To power the M2M devices, harvesting energy from ambient environment...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    A New Paradigm for Channel Coding in Diffusion-Based Molecular Communications: Molecular Coding Distance Function

    The emerging diffusion-based molecular communications is a promising scheme for nano-machine communications. Nevertheless, the Brownian motion model, which describes the behavior of molecules, makes the physical channel different from the channel in conventional wireless communications. In particular, the crossovers in time caused by the late arrivals of the molecules severely...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Optimal Detection for Diffusion-Based Communications in the Presence of ISI

    Communications based on diffusion refers to the transfer of information using molecules as message carriers whose propagation is governed by the laws of Brownian motion. Molecular communication is considered to be one of the most promising approaches for the end-to-end communication between nano-scale devices. In this paper, both an optimal...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Signal Detection and ISI Cancellation for Quantity-Based Amplitude Modulation in Diffusion-Based Molecular Communications

    Diffusion-based molecular communications has becoming a promising approach for end-to-end communication between nano-machines. However, due to the randomness nature of molecule diffusions, the arriving time of each molecule is hard to predict and the late coming molecules will become a source of interference when doing detection. This effect will cause...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Are All Games Equally Cloud-Gaming-Friendly? an Electromyographic Approach

    Cloud gaming now makes any computer game playable on a thin client without the previous worries and frustrations about the hardware requirements. It frees players from the need to frequently upgrade their computers as they can now play games that are hosted on remote servers with a broadband Internet connection...

    Provided By National Taiwan University

  • White Papers // Sep 2012

    Efficient Mutual Authentication and Key Agreement with User Anonymity for Roaming Services in Global Mobility Networks

    Global mobility networks provide effective global roaming services for personal communication users. Through the universal roaming technology, legitimate mobile users can enjoy the ubiquitous services. Mutual authentication and key agreement between mobile users and roaming servers is the primary security issue of many commercial mo-bile networks. In this paper, the...

    Provided By National Taiwan University

  • White Papers // Aug 2012

    Traffic- And Thermal-Balanced Adaptive Beltway Routing in Thermal Aware 3D NoC Systems

    The traffic and thermal problems of high performance Three-Dimensional Network-on-Chip (3D NoC) system become more unbalanced because of chip stacking and applied minimal routing algorithm. To make the temperature under a certain thermal limit, the overheat nodes are throttled by Run-time Thermal Management (RTM). Therefore, the network topology becomes a...

    Provided By National Taiwan University

  • White Papers // Aug 2012

    Cost-Effective Scalable QC-LDPC Decoder Designs for Non-Volatile Memory Systems

    Non-Volatile Memory Systems (NVMS) have been prevailed among many consumer electronic products, including mobile devices, computers, and the promising Solid-State Drives (SSDs). With the advanced manufacturing technology, the storage density of NVMS, particularly those consist of Multi-Level Cell (MLC) flash memories, grows fast since more bits are able to be...

    Provided By National Taiwan University

  • White Papers // Jul 2012

    Sempre: Secure Multicast Architecture Using Proxy Re-Encryption

    In this paper, the authors propose a novel secure multicast architecture that reduces the impact of the 1 affects n problem significantly by exploiting a cryptographic primitive, "Proxy re-encryption". Therefore, they call the proposed secure multicast architecture Sempre (SEcure Multicast architecture using Proxy Re-Encryption). Proxy re-encryption allows intermediate routers to...

    Provided By National Taiwan University

  • White Papers // Jun 2012

    Path-Diversity-Aware Adaptive Routing in Network-on-Chip Systems

    The partially adaptive routing plays an important role in the performance of Network-on-Chip (NoC). It uses information of the network to select a better path to deliver a packet. However, it may have imbalanced path diversity in different directions, which makes their tolerances of traffic load differ a lot from...

    Provided By National Taiwan University

  • White Papers // Jun 2012

    A Mobicast Routing Protocol With Carry-and-Forward in Vehicular Ad Hoc Networks

    In vehicular networks, safety and comfort applications are two quite different kinds of applications to avoid the emergency traffic accident and enjoy the non-emergency entertainment. The comfort application drives the challenges of new non-emergency entertainments for Vehicular Ad-hoc NETworks (VANETs). In this paper, the authors investigate a new mobicast protocol...

    Provided By National Taiwan University

  • White Papers // Jun 2012

    A Probabilistic Packet Marking Scheme With LT Code for IP Traceback

    Cybercrime has become an important issue in the cyber-society. Distributed Denial of Service attack is the most popular attack, which uses many zombies to attack the victim, makes victim crashed and interrupt services. The authors propose the LT Code IP Traceback scheme to reconstruct the attack graph and find the...

    Provided By National Taiwan University

  • White Papers // May 2012

    CAOR: Coding-Aware Opportunistic Routing in Wireless Ad Hoc Networks

    In this paper, the authors propose a new protocol which integrates intra-flow network coding based opportunistic routing with inter-flow network coding, called CAOR, for lossy wireless networks. In a lossy environment, each linear combination of packets in a batch may not be able to arrive at each forwarder intact. The...

    Provided By National Taiwan University

  • White Papers // May 2012

    Power Consumption Optimization for Information Exchange in Wireless-Relay Sensor Networks

    Minimization of power consumption is a critical design goal for wireless-relay networks comprised of battery powered sensor devices. Traditionally, wireless communication is optimized to minimize the total transmission power. In the paper, the authors further include the detection power and the reception power in order to minimize the overall network...

    Provided By National Taiwan University

  • White Papers // May 2012

    Stochastic Delay Guarantees in ZigBee Cluster-Tree Networks

    ZigBee, a unique communication standard designed for low-rate personal area networks, has extremely low complexity, cost, and power consumption for wireless connectivity in inexpensive, portable, and mobile devices. Among the well-known ZigBee topologies, the cluster tree is especially suitable for wireless sensor networks because of its support for power saving...

    Provided By National Taiwan University

  • White Papers // May 2012

    Formulating and Solving the Femtocell Deployment Problem in Two-Tier Heterogeneous Networks

    Recently, there has been an increasing interest in the deployment and management of femto Base Stations (BSs) to optimize the overall system performance in macro-femto heterogeneous networks. While deployment of femto BSs is typically not as planned as that of pico BSs, given a number of femto BSs to be...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    A Coalitional Game Analysis for Selfish Packet-Forwarding Networks

    In wireless packet-forwarding networks, selfish nodes always want to maximize their utilities and do not like to help others forward data streams, thus causing severe network performance degradation. To solve the packet-forwarding problem, a novel coalitional game approach based on the Selective Decode-and-Forward (SDF) relaying scheme is proposed. In the...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    ML Performance Bounds of Turbo and LDPC Codes

    To date there is no practical means to evaluate the true Word Error Probability (WEP) of a given turbo or LDPC code because typical decoders cannot achieve the performance of ML decoding. In this paper, the authors propose a viable methodology to establish tight bounds on the ML-decoding WEP for...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    A Decoding for a Block Coded Scheme With Interblock Memory

    Applying inter-block memory to binary linear block codes is a method to increase the transmission reliability by increasing the correlation among code-words. In this paper, the authors consider short block coding with inter-block memory. Since short block codes can be efficiently decoded by employing the A Algorithm, they investigate the...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    Optimal Self Boundary Recognition With Two-Hop Information for Ad Hoc Networks

    The ad hoc network is composed of multiple sensor nodes to serve various applications, such as data collection or environmental monitoring. In many applications, the sensor nodes near the boundary of the deployment region provide biased or low-quality information because they have limited number of neighboring nodes and only partial...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    Video Multicast With Heterogeneous User Interests in Multi-Rate Wireless Networks

    As mobile devices, such as smart phones and tablet PCs, become more and more ubiquitous, it is increasingly popular for users to watch online video streaming on their mobile devices. Because of the nature of wireless broadcast, a wireless router (e.g., an access point or cellular tower) can retrieve video...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    On Optimal Artificial-Noise Assisted Secure Beamforming for the Multiple-Input Multiple-Output Fading Eavesdropper Channel

    In a wiretap channel, a source node wishes to transmit confidential messages securely to a legitimate receiver and to keep the eavesdropper as ignorant of the message as possible. As a special case of the broadcast channels with confidential messages, Wyner characterized the secrecy capacity of the discrete memoryless wiretap...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    An Exact Error Probability Analysis of Incremental Opportunistic Decode-and-Forward Relaying With Feedback Delay

    Incremental Opportunistic Relaying (IOR) has been proposed to increase the spectral efficiency of the two-phase cooperative transmissions by exploiting limited feedback from the destination node. Specifically, the relaying process is activated only if the source-destination channel is of insufficient quality. In this case, the feedback instructs the best relay to...

    Provided By National Taiwan University

  • White Papers // Feb 2012

    On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels

    In this paper, the authors consider the secure transmission in fast Rayleigh fading channels with full knowledge of the main channel and only the statistics of the eavesdropper's channel state information at the transmitter. For the multiple-input, single-output, single-antenna eavesdropper systems, they generalize Goel and Negi's celebrated Artificial-Noise (AN) assisted...

    Provided By National Taiwan University

  • White Papers // Feb 2012

    A Diffusion-Based Binary Digital Communication System

    Diffusion-based communications refers to the transfer of information using particles as message carriers whose propagation is based on the law of particle diffusion. Though still at an early stage, there have been growing interests and research efforts dedicated to this communication technology. It has been identified that diffusion-based communications is...

    Provided By National Taiwan University

  • White Papers // Feb 2012

    Tame Pool-Based Pairwise Key Predistribution for Large-Scale Sensor Networks

    Due to resource constraints on sensor nodes, public key cryptography is not desirable to use in sensor networks. In this paper, the authors first develop a novel tame-based key predistribution approach, where they exploit tame automorphisms to get symmetric and two-one bivariate maps for the pair-wise key establishment. This tame-based...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Open Information Gateway for Disaster Management

    How to exchange information between parties in a mega-scale disaster management system is one of the fundamental challenges to support timely and efficient disaster response and relief. Specifically, the timeliness, scalability, and availability are three desirable features for information exchange. The authors call the framework to support information exchange with...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Improving TCP Performance Over an On-Board Multi-Homed Network

    Previously, a multi-homed NEMO architecture has been proposed to improve the reliability and aggregate the bandwidth of MR by simultaneously using multiple wireless links. In this paper, the authors propose a novel protocol called ETOM (Enhancements for TCP On a multi-homed mobile router) to improve the performance of sending a...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Interoperability Between Visual UML Design Applications and Authoring Tools for Learning Design

    A learning design is the result of the description of a teaching-learning process. It implies the consideration of aspects such as the context in which teaching is being developed, the most suitable teaching method in this context, the necessary resources, the contents of the training activity, or the assessment criteria....

    Provided By National Taiwan University

  • White Papers // Jan 2012

    The Study on General Secure Multi-Party Computation

    This paper, pertaining to the design of a new security model with multiparty computation for security, aims to study the rational model and UC (universal composability) model as well as design a security protocol for the requirements of the models. The structures of secret sharing agreement, fair computation agreement, bit...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    A Scalable Routing for Delay-Tolerant Heterogeneous Networks

    In this paper, the authors propose a prediction-based routing protocol for heterogeneous delay tolerant networks, wherein edge servers are distributed over the borders of the different network domains. First, a location prediction algorithm based on user online logs is used to intelligently estimate the most probable future location of a...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Password Cracking Based on Special Keyboard Patterns

    Passwords are still the most commonly used mechanism for user authentication. This paper proposes an efficient and effective method to attack passwords generated from some special keyboard patterns. The authors create a framework to formally describe the commonly used keyboard patterns of adjacent keys and parallel keys, called AP patterns,...

    Provided By National Taiwan University

  • White Papers // Nov 2011

    SHA-3 on ARM11 Processors

    This paper presents high-speed assembly implementations of the 256-bit-output versions of all five SHA-3 finalists and of SHA-256 for the ARM11 family of processors. The authors report new speed records for all of the six implemented functions. For example, their implementation of the round-3 version of JH-256 is 35% faster...

    Provided By National Taiwan University

  • White Papers // Oct 2011

    An Adaptive Duty-Cycle Scheme for GPS Scheduling in Mobile Location Sensing Applications

    Mobile Location Sensing Applications (MLSAs) represent an emerging genre of applications that exploit Global Positioning System (GPS) technology and facilitate location-based services. The design of MLSAs must incorporate a tradeoff between information accuracy and energy efficiency because GPS technology is energy expensive and unaffordable for most MLSA platforms, which are...

    Provided By National Taiwan University

  • White Papers // Sep 2011

    A Femtocell-Assisted Data Forwarding Protocol in Relay Enhanced LTE Networks

    The femtocell networks, which is a small cellular base station in home and small business environment, is an attractive solution for operators to improve indoor coverage and network capability. In addition, relaying is one of the proposed technique for future releases of UTRAN Long Term Evolution (LTE) networks which aims...

    Provided By National Taiwan University

  • White Papers // Jul 2013

    A Virtual Storage Environment for SSDs and HDDs in Xen Hypervisor

    Now-a-days, virtualization is a popular technology to provide an abstract hardware emulation due to the increasing hardware speed and capabilities such as multi-core CPUs, large-size main memory, and high-bandwidth networking. Virtualization technology enables multiple virtual machines to run on a physical machine, where each virtual machine can run independently and...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Are All Games Equally Cloud-Gaming-Friendly? an Electromyographic Approach

    Cloud gaming now makes any computer game playable on a thin client without the previous worries and frustrations about the hardware requirements. It frees players from the need to frequently upgrade their computers as they can now play games that are hosted on remote servers with a broadband Internet connection...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Open Information Gateway for Disaster Management

    How to exchange information between parties in a mega-scale disaster management system is one of the fundamental challenges to support timely and efficient disaster response and relief. Specifically, the timeliness, scalability, and availability are three desirable features for information exchange. The authors call the framework to support information exchange with...

    Provided By National Taiwan University

  • White Papers // Jul 2012

    Sempre: Secure Multicast Architecture Using Proxy Re-Encryption

    In this paper, the authors propose a novel secure multicast architecture that reduces the impact of the 1 affects n problem significantly by exploiting a cryptographic primitive, "Proxy re-encryption". Therefore, they call the proposed secure multicast architecture Sempre (SEcure Multicast architecture using Proxy Re-Encryption). Proxy re-encryption allows intermediate routers to...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    MIMO Communications Based on Molecular Diffusion

    Diffusion-based communication refers to the transfer of information using molecules as message carriers whose propagation is based on the law of molecular diffusion. Path loss can have a major impact on the link quality in molecular communication as the signal strength is shown inversely proportional to the cube of the...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Markov Chain Performance Model for IEEE 802.11 Devices With Energy Harvesting Source

    Research on energy harvesting networks has attracted an increasing attention lately. Nevertheless, few research of energy harvesting network follows the IEEE 802.11 protocol, whose Medium Access Control (MAC) mechanism, called Distributed Coordination Function (DCF), is based on the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) algorithm and binary exponential...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    DeepSleep: IEEE 802.11 Enhancement for Energy-Harvesting Machine-to-Machine Communications

    As future M2M (Machine-To-Machine) communications aim at supporting wireless networks which feature long range, long operating duration and large device number, the IEEE 802.11ah Task Group is going to specify a global WLAN standard that utilizes carrier frequencies below 1GHz. To power the M2M devices, harvesting energy from ambient environment...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    A New Paradigm for Channel Coding in Diffusion-Based Molecular Communications: Molecular Coding Distance Function

    The emerging diffusion-based molecular communications is a promising scheme for nano-machine communications. Nevertheless, the Brownian motion model, which describes the behavior of molecules, makes the physical channel different from the channel in conventional wireless communications. In particular, the crossovers in time caused by the late arrivals of the molecules severely...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Optimal Detection for Diffusion-Based Communications in the Presence of ISI

    Communications based on diffusion refers to the transfer of information using molecules as message carriers whose propagation is governed by the laws of Brownian motion. Molecular communication is considered to be one of the most promising approaches for the end-to-end communication between nano-scale devices. In this paper, both an optimal...

    Provided By National Taiwan University

  • White Papers // Sep 2012

    Efficient Mutual Authentication and Key Agreement with User Anonymity for Roaming Services in Global Mobility Networks

    Global mobility networks provide effective global roaming services for personal communication users. Through the universal roaming technology, legitimate mobile users can enjoy the ubiquitous services. Mutual authentication and key agreement between mobile users and roaming servers is the primary security issue of many commercial mo-bile networks. In this paper, the...

    Provided By National Taiwan University

  • White Papers // Feb 2012

    Tame Pool-Based Pairwise Key Predistribution for Large-Scale Sensor Networks

    Due to resource constraints on sensor nodes, public key cryptography is not desirable to use in sensor networks. In this paper, the authors first develop a novel tame-based key predistribution approach, where they exploit tame automorphisms to get symmetric and two-one bivariate maps for the pair-wise key establishment. This tame-based...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Interoperability Between Visual UML Design Applications and Authoring Tools for Learning Design

    A learning design is the result of the description of a teaching-learning process. It implies the consideration of aspects such as the context in which teaching is being developed, the most suitable teaching method in this context, the necessary resources, the contents of the training activity, or the assessment criteria....

    Provided By National Taiwan University

  • White Papers // Jan 2012

    The Study on General Secure Multi-Party Computation

    This paper, pertaining to the design of a new security model with multiparty computation for security, aims to study the rational model and UC (universal composability) model as well as design a security protocol for the requirements of the models. The structures of secret sharing agreement, fair computation agreement, bit...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    A Scalable Routing for Delay-Tolerant Heterogeneous Networks

    In this paper, the authors propose a prediction-based routing protocol for heterogeneous delay tolerant networks, wherein edge servers are distributed over the borders of the different network domains. First, a location prediction algorithm based on user online logs is used to intelligently estimate the most probable future location of a...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Password Cracking Based on Special Keyboard Patterns

    Passwords are still the most commonly used mechanism for user authentication. This paper proposes an efficient and effective method to attack passwords generated from some special keyboard patterns. The authors create a framework to formally describe the commonly used keyboard patterns of adjacent keys and parallel keys, called AP patterns,...

    Provided By National Taiwan University

  • White Papers // Aug 2011

    Intelligent Resource Management Schemes for Heterogeneous Wireless Networks

    The integration of Wireless Metropolitan Area Network (WMAN) and Wireless Local Area Network (WLAN) technologies seems to be a feasible option for better and cheaper wireless coverage extension. WMAN/WLAN networks are still a challenging issue to be tackled. This paper thus incorporates a variant of the Particle Swarm Optimization (PSO)...

    Provided By National Taiwan University

  • White Papers // Jul 2011

    An Enhanced Password-Based User Authentication Scheme for Grid Computing

    Based upon Elliptic Curve Cryptosystem, a simple password user authentication scheme was proposed by Lu et al. for grid computing. In their scheme, Lu et al. not only kept the advantages of Yoon et al.'s scheme, but enhanced the efficiency of mutual authentication and at the same time avoided the...

    Provided By National Taiwan University

  • White Papers // Jun 2008

    Alternative Methods To Determine Optimal Capital Structure: Theory And Application

    In this paper, the authors review the most important and representative capital structure models. The capital structure models incorporate contingent claim valuation theory to quantitatively analyze prevailing determinants of capital structure in corporate finance literature. In capital structure models, the valuation of corporate securities and financial decisions are jointly determined....

    Provided By National Taiwan University

  • White Papers // Jan 2009

    ECM on Graphics Cards

    This paper reports record-setting performance for the elliptic-curve method of integer factorization: For example, 926.11 curves/second for ECM stage 1 with B1 = 8192 for 280-bit integers on a single PC. The state-of-the-art GMP-ECM software handles 124.71 curves/second for ECM stage 1 with B1 = 8192 for 280-bit integers using...

    Provided By National Taiwan University

  • White Papers // Dec 2009

    Secure Multidimensional Queries in Tiered Sensor Networks

    Tiered Sensor Networks. Sensor networks are expected to be deployed on some harsh or hostile regions for data collection or environment monitoring. Since there is the possibility of no stable connection between the authority and the network, in-network storage is necessary for caching or storing the data sensed by sensor...

    Provided By National Taiwan University

  • White Papers // Feb 2011

    Unsupervised Auxiliary Visual Words Discovery for Large-Scale Image Object

    Image object retrieval - locating image occurrences of specific objects in large-scale image collections - is essential for manipulating the sheer amount of photos. Current solutions, mostly based on bags-of-words model, suffer from low recall rate and do not resist noises caused by the changes in lighting, viewpoints, and even...

    Provided By National Taiwan University

  • White Papers // Jun 2009

    On Money, Social Status And Endogenous Growth

    Motivated by the substantial increase of nominal money supply in the U.S. economy since late 2008, this paper examines the equilibrium growth effect of money/inflation within a standard one-sector AK model of endogenous growth with wealth-enhanced preferences for social status and the most generalized cash-in-advance constraint. The authors show that...

    Provided By National Taiwan University

  • White Papers // Jun 2011

    Developing Collaborative Applications With Mobile Cloud - A Case Study of Speech Recognition

    While the combination of cloud computing and mobile computing, termed mobile cloud computing, started to show its effects recently with many seemingly innovative smartphone applications and cloud services surfacing to the market today, the authors believe that the real potentials of mobile cloud computing is far from been fully explored...

    Provided By National Taiwan University

  • White Papers // Dec 2008

    Practical Pairwise Key Establishment Schemes for Wireless Sensor Networks Via Constrained Random Perturbation

    A Wireless Sensor Network (WSN) is composed of a large number of sensor nodes with limited resources. Since WSNs could be deployed in a hostile environment, designing an efficient key establishment scheme is of great importance to the data security in WSNs. Unfortunately, when considering the extremely scarce resources available...

    Provided By National Taiwan University

  • White Papers // Feb 2010

    Behavior Profiling for Robust Anomaly Detection

    Internet attacks are evolving using evasion techniques such as polymorphism and stealth scanning. Conventional detection systems using signature-based and/or rule-based anomaly detection techniques no longer suffice. It is difficult to predict what form the next malware attack will take and these pose a great challenge to the design of a...

    Provided By National Taiwan University

  • White Papers // Jun 2010

    Cross-Level Behavioral Analysis for Robust Early Intrusion Detection

    The authors anticipate future attacks would evolve to become more sophisticated to outwit existing intrusion detection techniques. Existing anomaly analysis techniques and signature-based detection practices can no longer effective. They believe Intrusion Detection Systems (IDSs) of the future will need to be capable to detect or infer attacks based on...

    Provided By National Taiwan University

  • White Papers // Apr 2008

    Taxes And Foreign Investors? Trading Behavior Around Ex-Dividend Days

    Employing Taiwan data, this paper tests the tax hypothesis versus the short-term trading hypothesis by making a comparison in trading behavior between tax disadvantaged foreign investors and tax-neutral domestic institutions around ex-dividend days. The authors observe that not only do foreign investors abnormally buy more before the ex-date and sell...

    Provided By National Taiwan University

  • White Papers // Jun 2011

    Development and Testing of Integrated Bridge Disaster Prevention and Management Platform

    In recent years, global warming leads rainfall intensity stronger than before. Therefore, bridge management requires a reliable monitoring platform in current, to monitoring of bridge piers based on the variations of safety and river erosion, can be timely warming of the bridge damage, and achieving the maintenance of bridges safety...

    Provided By National Taiwan University

  • White Papers // Jun 2011

    Developing Bridge Monitor Platform Using GPS and Communication Technology

    In order to maintain security of the bridge and prevent life and property losses caused by earthquakes, typhoons, erosion and other disasters, it is worthwhile to explore the installation of monitoring and management system for bridges. However, in the current bridge management process, most of the discussion is divided into...

    Provided By National Taiwan University

  • White Papers // Jun 2011

    Distributed Throughput Optimization for ZigBee Cluster-Tree Networks

    ZigBee, a unique communication standard designed for low-rate wireless personal area networks, has extremely low complexity, cost, and power consumption for wireless connectivity in inexpensive, portable, and mobile devices. Among the well-known ZigBee topologies, ZigBee cluster-tree is especially suitable for low-power and low-cost wireless sensor networks because it supports power...

    Provided By National Taiwan University

  • White Papers // Jan 2011

    PMI-Based MIMO OFDM PHY Integrated Key Exchange (P-MOPI) Scheme

    In this paper, the authors have proposed the MIMO-OFDM PHY Integrated (MOPI) scheme for achieving physical-layer security in practice without using any cryptographic ciphers. The MOPI scheme uses channel sounding and Physical-layer Network Coding (PNC) to prevent eavesdroppers from learning the Channel State Information (CSI). Nevertheless, due to the use...

    Provided By National Taiwan University

  • White Papers // Jun 2008

    Performance Modeling on Handover Latency in Mobile IP Regional Registration

    The Authentication, Authorization, Accounting (AAA) infrastructure in Mobile IP network is designed to distribute keys to network entities for signaling message protection. In Mobile IP network, Regional Registration is employed to migrate the high signaling delay when a mobile user moves between network agents within the same visited domain. How...

    Provided By National Taiwan University

  • White Papers // Dec 2008

    Routing for Cognitive Radio Networks Consisting of Opportunistic Links

    Cognitive Radio (CR) has been considered a key technology to enhance overall spectrum utilization by opportunistic transmissions in CR transmitter-receiver link(s). However, CRs must form a Cognitive Radio Network (CRN) so that the messages can be forwarded from source to destination, on top of a number of opportunistic links from...

    Provided By National Taiwan University

  • White Papers // Oct 2010

    Cognitive Radio Network Tomography of Spectrum Map Using Learning and Random Set Theory

    Cognitive radio network tomography identifies transmission opportunities by actively or passively obtaining link-level or network-level information, to enable networking cognitive radios. Beyond the spectrum holes, radio resource with location information that is known as spectrum map, can easily facilitate network functions such as multi-hop cooperative routing. However, it is not...

    Provided By National Taiwan University

  • White Papers // Apr 2011

    Multi-Path Routing With End-to-End Statistical QoS Provisioning in Underlay Cognitive Radio Networks

    Since the radio access of secondary users is typically confined to ensure sufficient operation for primary users in underlay Cognitive Radio Networks (CRNs), the inevitably induced latency and interference pose new challenges on existing routing schemes for Quality-of-Service (QoS) provisioning. Due to stringent accessing and interference constraints, secondary users appeal...

    Provided By National Taiwan University

  • White Papers // May 2008

    Multiple Systems Sensing for Cognitive Radio Networks Over Rayleigh Fading Channel

    Cognitive Radios (CRs) with capability of spectrum sensing to fully utilize radio spectrum have been considered as a key technology toward future wireless communications. The authors can further leverage CRs to form Cognitive Radio Networks (CRNs). When they consider sensing for CRNs, it is critical to identify the potential primary...

    Provided By National Taiwan University

  • White Papers // Dec 2009

    Paging and Location Management in IEEE 802.16j Multihop Relay Network

    IEEE 802.16j is an emerging wireless broadband networking standard that integrates infrastructure base stations with multihop relay technology. Based on the idle mode operation in IEEE 802.16j, the authors propose a novel location management and paging scheme. It integrates the paging area-based and the timer-based location update mechanism. In paging...

    Provided By National Taiwan University

  • White Papers // Feb 2010

    Cross-Layer Adaptive H.264/AVC Streaming Over IEEE 802.11e Experimental Testbed

    In recent years, the rapid development of wireless communication allows one to enjoy more multimedia services via wireless network. However, due to lack of QoS support and characteristics of wireless channel, there are still many challenges in wireless video streaming. In this paper, the authors implement a cross-layer architecture to...

    Provided By National Taiwan University

  • White Papers // Feb 2010

    Multi-Group Wireless Multicast Broadcast Services Using Adaptive Modulation and Coding: Modeling and Analysis

    Adaptive Modulation and Coding (AMC) is attracting research interest in wireless Multicast Broadcast Services (MBS). AMC increases the system throughput by utilizing possible good channel states instead of using robust modulation and coding schemes. A model for the AMC in an MBS system with multiple MBS groups is provided, and...

    Provided By National Taiwan University

  • White Papers // Feb 2010

    Power Control Game With SINR-Pricing in Variable-Demand Wireless Data Networks

    Game theory has been applied to model power control in wireless systems for years. Conventional power control games tend to consider unlimited backlogged user traffic. Different from the conventional methodology, this paper aims to investigate limited backlogged data traffic and construct a game-theoretic model tackling both one-shot and repeated power...

    Provided By National Taiwan University