National Taiwan University

Displaying 1-40 of 114 results

  • White Papers // Mar 2014

    Spectrum Sharing for Device-to-Device Communications in Cellular Networks: A Game Theoretic Approach

    In this paper, the authors study the spectrum sharing problem between Device-To-Device (D2D) and cellular communications in a cellular network. In this network, the D2D links can access the spectrum controlled by a mobile network operator. Each D2D link can either access the sub-bands occupied by cellular subscribers or obtain...

    Provided By National Taiwan University

  • White Papers // Jan 2014

    Multiprocessor Energy-Efficient Scheduling for Real-Time Tasks with Different Power Characteristics

    In the past decades, a number of research results have been reported for energy-efficient scheduling over uniprocessor and multiprocessor environments. Different from many of the past results on the assumption for task power characteristics, the authors consider real-time scheduling of tasks with different power characteristics. The objective is to minimize...

    Provided By National Taiwan University

  • White Papers // Jul 2013

    A Virtual Storage Environment for SSDs and HDDs in Xen Hypervisor

    Now-a-days, virtualization is a popular technology to provide an abstract hardware emulation due to the increasing hardware speed and capabilities such as multi-core CPUs, large-size main memory, and high-bandwidth networking. Virtualization technology enables multiple virtual machines to run on a physical machine, where each virtual machine can run independently and...

    Provided By National Taiwan University

  • White Papers // Mar 2013

    An Evaluation of RFID Door Security System at Taipei Arena Ice Land Based on Technology Acceptance Model

    In the service industry nowadays, creating customer value remains an important issue. RFID is capable of creating potential customer value for companies and allowing them to respond to customer needs with new services. However, in the process of introducing RFID systems, the degree of service quality, system quality, and information...

    Provided By National Taiwan University

  • White Papers // Feb 2013

    Password Cracking Based on Learned Patterns From Disclosed Passwords

    Password-based authentication systems are still the most commonly used mechanism for protecting sensitive information despite being vulnerable to dictionary based attacks. To guard against such attacks, many organizations enforce complicated password-creation rules and require that passwords include numeric and special characters. This paper demonstrates that as long as passwords are...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    MIMO Communications Based on Molecular Diffusion

    Diffusion-based communication refers to the transfer of information using molecules as message carriers whose propagation is based on the law of molecular diffusion. Path loss can have a major impact on the link quality in molecular communication as the signal strength is shown inversely proportional to the cube of the...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Markov Chain Performance Model for IEEE 802.11 Devices With Energy Harvesting Source

    Research on energy harvesting networks has attracted an increasing attention lately. Nevertheless, few research of energy harvesting network follows the IEEE 802.11 protocol, whose Medium Access Control (MAC) mechanism, called Distributed Coordination Function (DCF), is based on the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) algorithm and binary exponential...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    DeepSleep: IEEE 802.11 Enhancement for Energy-Harvesting Machine-to-Machine Communications

    As future M2M (Machine-To-Machine) communications aim at supporting wireless networks which feature long range, long operating duration and large device number, the IEEE 802.11ah Task Group is going to specify a global WLAN standard that utilizes carrier frequencies below 1GHz. To power the M2M devices, harvesting energy from ambient environment...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    A New Paradigm for Channel Coding in Diffusion-Based Molecular Communications: Molecular Coding Distance Function

    The emerging diffusion-based molecular communications is a promising scheme for nano-machine communications. Nevertheless, the Brownian motion model, which describes the behavior of molecules, makes the physical channel different from the channel in conventional wireless communications. In particular, the crossovers in time caused by the late arrivals of the molecules severely...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Optimal Detection for Diffusion-Based Communications in the Presence of ISI

    Communications based on diffusion refers to the transfer of information using molecules as message carriers whose propagation is governed by the laws of Brownian motion. Molecular communication is considered to be one of the most promising approaches for the end-to-end communication between nano-scale devices. In this paper, both an optimal...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Signal Detection and ISI Cancellation for Quantity-Based Amplitude Modulation in Diffusion-Based Molecular Communications

    Diffusion-based molecular communications has becoming a promising approach for end-to-end communication between nano-machines. However, due to the randomness nature of molecule diffusions, the arriving time of each molecule is hard to predict and the late coming molecules will become a source of interference when doing detection. This effect will cause...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Are All Games Equally Cloud-Gaming-Friendly? an Electromyographic Approach

    Cloud gaming now makes any computer game playable on a thin client without the previous worries and frustrations about the hardware requirements. It frees players from the need to frequently upgrade their computers as they can now play games that are hosted on remote servers with a broadband Internet connection...

    Provided By National Taiwan University

  • White Papers // Sep 2012

    Efficient Mutual Authentication and Key Agreement with User Anonymity for Roaming Services in Global Mobility Networks

    Global mobility networks provide effective global roaming services for personal communication users. Through the universal roaming technology, legitimate mobile users can enjoy the ubiquitous services. Mutual authentication and key agreement between mobile users and roaming servers is the primary security issue of many commercial mo-bile networks. In this paper, the...

    Provided By National Taiwan University

  • White Papers // Aug 2012

    Cost-Effective Scalable QC-LDPC Decoder Designs for Non-Volatile Memory Systems

    Non-Volatile Memory Systems (NVMS) have been prevailed among many consumer electronic products, including mobile devices, computers, and the promising Solid-State Drives (SSDs). With the advanced manufacturing technology, the storage density of NVMS, particularly those consist of Multi-Level Cell (MLC) flash memories, grows fast since more bits are able to be...

    Provided By National Taiwan University

  • White Papers // Aug 2012

    Traffic- And Thermal-Balanced Adaptive Beltway Routing in Thermal Aware 3D NoC Systems

    The traffic and thermal problems of high performance Three-Dimensional Network-on-Chip (3D NoC) system become more unbalanced because of chip stacking and applied minimal routing algorithm. To make the temperature under a certain thermal limit, the overheat nodes are throttled by Run-time Thermal Management (RTM). Therefore, the network topology becomes a...

    Provided By National Taiwan University

  • White Papers // Jul 2012

    Sempre: Secure Multicast Architecture Using Proxy Re-Encryption

    In this paper, the authors propose a novel secure multicast architecture that reduces the impact of the 1 affects n problem significantly by exploiting a cryptographic primitive, "Proxy re-encryption". Therefore, they call the proposed secure multicast architecture Sempre (SEcure Multicast architecture using Proxy Re-Encryption). Proxy re-encryption allows intermediate routers to...

    Provided By National Taiwan University

  • White Papers // Jun 2012

    Path-Diversity-Aware Adaptive Routing in Network-on-Chip Systems

    The partially adaptive routing plays an important role in the performance of Network-on-Chip (NoC). It uses information of the network to select a better path to deliver a packet. However, it may have imbalanced path diversity in different directions, which makes their tolerances of traffic load differ a lot from...

    Provided By National Taiwan University

  • White Papers // Jun 2012

    A Mobicast Routing Protocol With Carry-and-Forward in Vehicular Ad Hoc Networks

    In vehicular networks, safety and comfort applications are two quite different kinds of applications to avoid the emergency traffic accident and enjoy the non-emergency entertainment. The comfort application drives the challenges of new non-emergency entertainments for Vehicular Ad-hoc NETworks (VANETs). In this paper, the authors investigate a new mobicast protocol...

    Provided By National Taiwan University

  • White Papers // Jun 2012

    A Probabilistic Packet Marking Scheme With LT Code for IP Traceback

    Cybercrime has become an important issue in the cyber-society. Distributed Denial of Service attack is the most popular attack, which uses many zombies to attack the victim, makes victim crashed and interrupt services. The authors propose the LT Code IP Traceback scheme to reconstruct the attack graph and find the...

    Provided By National Taiwan University

  • White Papers // May 2012

    CAOR: Coding-Aware Opportunistic Routing in Wireless Ad Hoc Networks

    In this paper, the authors propose a new protocol which integrates intra-flow network coding based opportunistic routing with inter-flow network coding, called CAOR, for lossy wireless networks. In a lossy environment, each linear combination of packets in a batch may not be able to arrive at each forwarder intact. The...

    Provided By National Taiwan University

  • White Papers // May 2012

    Power Consumption Optimization for Information Exchange in Wireless-Relay Sensor Networks

    Minimization of power consumption is a critical design goal for wireless-relay networks comprised of battery powered sensor devices. Traditionally, wireless communication is optimized to minimize the total transmission power. In the paper, the authors further include the detection power and the reception power in order to minimize the overall network...

    Provided By National Taiwan University

  • White Papers // May 2012

    Stochastic Delay Guarantees in ZigBee Cluster-Tree Networks

    ZigBee, a unique communication standard designed for low-rate personal area networks, has extremely low complexity, cost, and power consumption for wireless connectivity in inexpensive, portable, and mobile devices. Among the well-known ZigBee topologies, the cluster tree is especially suitable for wireless sensor networks because of its support for power saving...

    Provided By National Taiwan University

  • White Papers // May 2012

    Formulating and Solving the Femtocell Deployment Problem in Two-Tier Heterogeneous Networks

    Recently, there has been an increasing interest in the deployment and management of femto Base Stations (BSs) to optimize the overall system performance in macro-femto heterogeneous networks. While deployment of femto BSs is typically not as planned as that of pico BSs, given a number of femto BSs to be...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    ML Performance Bounds of Turbo and LDPC Codes

    To date there is no practical means to evaluate the true Word Error Probability (WEP) of a given turbo or LDPC code because typical decoders cannot achieve the performance of ML decoding. In this paper, the authors propose a viable methodology to establish tight bounds on the ML-decoding WEP for...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    A Decoding for a Block Coded Scheme With Interblock Memory

    Applying inter-block memory to binary linear block codes is a method to increase the transmission reliability by increasing the correlation among code-words. In this paper, the authors consider short block coding with inter-block memory. Since short block codes can be efficiently decoded by employing the A Algorithm, they investigate the...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    Optimal Self Boundary Recognition With Two-Hop Information for Ad Hoc Networks

    The ad hoc network is composed of multiple sensor nodes to serve various applications, such as data collection or environmental monitoring. In many applications, the sensor nodes near the boundary of the deployment region provide biased or low-quality information because they have limited number of neighboring nodes and only partial...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    Video Multicast With Heterogeneous User Interests in Multi-Rate Wireless Networks

    As mobile devices, such as smart phones and tablet PCs, become more and more ubiquitous, it is increasingly popular for users to watch online video streaming on their mobile devices. Because of the nature of wireless broadcast, a wireless router (e.g., an access point or cellular tower) can retrieve video...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    On Optimal Artificial-Noise Assisted Secure Beamforming for the Multiple-Input Multiple-Output Fading Eavesdropper Channel

    In a wiretap channel, a source node wishes to transmit confidential messages securely to a legitimate receiver and to keep the eavesdropper as ignorant of the message as possible. As a special case of the broadcast channels with confidential messages, Wyner characterized the secrecy capacity of the discrete memoryless wiretap...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    An Exact Error Probability Analysis of Incremental Opportunistic Decode-and-Forward Relaying With Feedback Delay

    Incremental Opportunistic Relaying (IOR) has been proposed to increase the spectral efficiency of the two-phase cooperative transmissions by exploiting limited feedback from the destination node. Specifically, the relaying process is activated only if the source-destination channel is of insufficient quality. In this case, the feedback instructs the best relay to...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    A Coalitional Game Analysis for Selfish Packet-Forwarding Networks

    In wireless packet-forwarding networks, selfish nodes always want to maximize their utilities and do not like to help others forward data streams, thus causing severe network performance degradation. To solve the packet-forwarding problem, a novel coalitional game approach based on the Selective Decode-and-Forward (SDF) relaying scheme is proposed. In the...

    Provided By National Taiwan University

  • White Papers // Feb 2012

    On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels

    In this paper, the authors consider the secure transmission in fast Rayleigh fading channels with full knowledge of the main channel and only the statistics of the eavesdropper's channel state information at the transmitter. For the multiple-input, single-output, single-antenna eavesdropper systems, they generalize Goel and Negi's celebrated Artificial-Noise (AN) assisted...

    Provided By National Taiwan University

  • White Papers // Feb 2012

    A Diffusion-Based Binary Digital Communication System

    Diffusion-based communications refers to the transfer of information using particles as message carriers whose propagation is based on the law of particle diffusion. Though still at an early stage, there have been growing interests and research efforts dedicated to this communication technology. It has been identified that diffusion-based communications is...

    Provided By National Taiwan University

  • White Papers // Feb 2012

    Tame Pool-Based Pairwise Key Predistribution for Large-Scale Sensor Networks

    Due to resource constraints on sensor nodes, public key cryptography is not desirable to use in sensor networks. In this paper, the authors first develop a novel tame-based key predistribution approach, where they exploit tame automorphisms to get symmetric and two-one bivariate maps for the pair-wise key establishment. This tame-based...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Open Information Gateway for Disaster Management

    How to exchange information between parties in a mega-scale disaster management system is one of the fundamental challenges to support timely and efficient disaster response and relief. Specifically, the timeliness, scalability, and availability are three desirable features for information exchange. The authors call the framework to support information exchange with...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Improving TCP Performance Over an On-Board Multi-Homed Network

    Previously, a multi-homed NEMO architecture has been proposed to improve the reliability and aggregate the bandwidth of MR by simultaneously using multiple wireless links. In this paper, the authors propose a novel protocol called ETOM (Enhancements for TCP On a multi-homed mobile router) to improve the performance of sending a...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Interoperability Between Visual UML Design Applications and Authoring Tools for Learning Design

    A learning design is the result of the description of a teaching-learning process. It implies the consideration of aspects such as the context in which teaching is being developed, the most suitable teaching method in this context, the necessary resources, the contents of the training activity, or the assessment criteria....

    Provided By National Taiwan University

  • White Papers // Jan 2012

    The Study on General Secure Multi-Party Computation

    This paper, pertaining to the design of a new security model with multiparty computation for security, aims to study the rational model and UC (universal composability) model as well as design a security protocol for the requirements of the models. The structures of secret sharing agreement, fair computation agreement, bit...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    A Scalable Routing for Delay-Tolerant Heterogeneous Networks

    In this paper, the authors propose a prediction-based routing protocol for heterogeneous delay tolerant networks, wherein edge servers are distributed over the borders of the different network domains. First, a location prediction algorithm based on user online logs is used to intelligently estimate the most probable future location of a...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Password Cracking Based on Special Keyboard Patterns

    Passwords are still the most commonly used mechanism for user authentication. This paper proposes an efficient and effective method to attack passwords generated from some special keyboard patterns. The authors create a framework to formally describe the commonly used keyboard patterns of adjacent keys and parallel keys, called AP patterns,...

    Provided By National Taiwan University

  • White Papers // Nov 2011

    SHA-3 on ARM11 Processors

    This paper presents high-speed assembly implementations of the 256-bit-output versions of all five SHA-3 finalists and of SHA-256 for the ARM11 family of processors. The authors report new speed records for all of the six implemented functions. For example, their implementation of the round-3 version of JH-256 is 35% faster...

    Provided By National Taiwan University

  • White Papers // Jul 2011

    Multi-Pheromone ACO-Based Routing in Network-on-Chip System Inspired by Economic Phenomenon

    Ant Colony Optimization (ACO) is a collective intelligence problem-solving paradigm. By ACO, the authors can effectively distribute the central control unit to achieve higher performance. With the scaling of Network-on-Chip (NoC) size, more complex communication problems can severely harm the system performance. Therefore, they need more efficient ACO-adaptive routing to...

    Provided By National Taiwan University

  • White Papers // Jul 2011

    Transport Layer Assisted Routing for Non-Stationary Irregular Mesh of Thermal-Aware 3D Network-on-Chip Systems

    Thermal issue is important for 3D Network-on-Chip (3DNoC) systems. To ensure thermal safety, run-time thermal management is required. However, the regulation of temperature requires throttling of the near-overheated router, which makes the topology become Non-Stationary Irregular mesh (NSI-mesh). To successfully deliver packet in NSI-mesh, the authors propose the Transport Layer...

    Provided By National Taiwan University

  • White Papers // Jun 2012

    Path-Diversity-Aware Adaptive Routing in Network-on-Chip Systems

    The partially adaptive routing plays an important role in the performance of Network-on-Chip (NoC). It uses information of the network to select a better path to deliver a packet. However, it may have imbalanced path diversity in different directions, which makes their tolerances of traffic load differ a lot from...

    Provided By National Taiwan University

  • White Papers // Mar 2010

    Job Scheduling Techniques for Distributed Systems with Heterogeneous Processor Cardinality

    In this paper, the authors propose scheduling algorithms for assigning jobs with different release time and execution time, to machines with heterogeneous processor cardinality. They show that this scheduling problem is NP-complete, and propose dynamic programming to find the optimal schedules. Since the dynamic programming is time-consuming they propose techniques...

    Provided By National Taiwan University

  • White Papers // Jun 2011

    Pulsed-Latch-Based Clock Tree Migration for Dynamic Power Reduction

    Minimizing the clock tree has been known as an effective approach to reduce power dissipation in modern circuit designs. However, most existing power-aware clock tree synthesis algorithms still focus on optimizing power in flip-flops, which might have limited power savings. In this paper, the authors explore the pulsed-latch utilization in...

    Provided By National Taiwan University

  • White Papers // Dec 2006

    Energy-Efficient Scheduling for Real-Time Systems on Dynamic Voltage Scaling (DVS) Platforms

    Power-aware and energy-efficient designs play an important role for modern hardware and software implementations to prolong battery lifetime or cut power bills for maintenance. Energy-efficient designs have played import roles for hardware and software implementations for a decade. With the advanced technology of VLSI circuit designs, energy-efficiency can be achieved...

    Provided By National Taiwan University

  • White Papers // Jan 2014

    Multiprocessor Energy-Efficient Scheduling for Real-Time Tasks with Different Power Characteristics

    In the past decades, a number of research results have been reported for energy-efficient scheduling over uniprocessor and multiprocessor environments. Different from many of the past results on the assumption for task power characteristics, the authors consider real-time scheduling of tasks with different power characteristics. The objective is to minimize...

    Provided By National Taiwan University

  • White Papers // Sep 2008

    Procrastination Determination for Periodic Real-Time Tasks in Leakage-Aware Dynamic Voltage Scaling Systems

    Many computing systems have adopted the Dynamic Voltage Scaling (DVS) technique to reduce energy consumption by slowing down operation speed. However, the longer a job executes the more energy in leakage current the processor consumes for the job. To reduce the power/energy consumption from the leakage current, a processor can...

    Provided By National Taiwan University

  • White Papers // Sep 2006

    Energy-Efficient Real-Time Task Scheduling for a DVS System With a Non-DVS Processing Element

    Multiple processing elements are often adopted in the current designs of embedded systems. Such configurations impose challenges on hardware/software co-designs with energy-efficient considerations. This paper targets energy-efficient real-time task scheduling of such popular configurations, in which systems are equipped with a DVS processor and a non-DVS Processing Element (PE). The...

    Provided By National Taiwan University

  • White Papers // Nov 2006

    Flow Time Minimization Under Energy Constraints

    Power-aware and energy-efficient designs play important roles for modern hardware and software designs, especially for embedded systems. This paper targets a scheduling problem on a processor with the capability of Dynamic Voltage Scaling (DVS), which could reduce the power consumption by slowing down the processor speed. The objective of the...

    Provided By National Taiwan University

  • White Papers // Mar 2014

    Spectrum Sharing for Device-to-Device Communications in Cellular Networks: A Game Theoretic Approach

    In this paper, the authors study the spectrum sharing problem between Device-To-Device (D2D) and cellular communications in a cellular network. In this network, the D2D links can access the spectrum controlled by a mobile network operator. Each D2D link can either access the sub-bands occupied by cellular subscribers or obtain...

    Provided By National Taiwan University

  • White Papers // Mar 2009

    A Novel Energy-Efficient MAC Aware Data Aggregation Routing in Wireless Sensor Networks

    Embedding data-aggregation capabilities into sensor nodes of wireless networks could save energy by reducing redundant data flow transmissions. Existing research describes the construction of data aggregation trees to maximize data aggregation times in order to reduce data transmission of redundant data. However, aggregation of more nodes on the same node...

    Provided By National Taiwan University

  • White Papers // Sep 2006

    Rapid IP Design of Variable-Length Cached-FFT Processor for OFDM-Based Communication Systems

    Fast Fourier Transform (FFT) and Inverse FFT (IFFT) are adopted as the demodulation/modulation kernels in OFDM systems. The lengths of FFT/IFFT operations may vary in different applications of OFDM systems. Moreover, due to the trend of System-on-Chip (SOC), rapid prototyping and intelligent soft IP designs are important design methodologies. In...

    Provided By National Taiwan University

  • White Papers // Jul 2013

    A Virtual Storage Environment for SSDs and HDDs in Xen Hypervisor

    Now-a-days, virtualization is a popular technology to provide an abstract hardware emulation due to the increasing hardware speed and capabilities such as multi-core CPUs, large-size main memory, and high-bandwidth networking. Virtualization technology enables multiple virtual machines to run on a physical machine, where each virtual machine can run independently and...

    Provided By National Taiwan University

  • White Papers // Feb 2009

    Fault-Tolerant Router With Built-In Self-Test/self-Diagnosis and Fault-Isolation Circuits for 2D-Mesh Based Chip Multiprocessor Systems

    Chip Multi-Processor (CMP) system is a popular design in recent years. CMP systems can have high computation performance by operating multiple parallel processors at lower clock frequencies, while still achieving the target throughput and performance. For the communication of CMP systems, On-Chip Networks (OCNs) have been proposed to overcome area...

    Provided By National Taiwan University

  • White Papers // Aug 2012

    Cost-Effective Scalable QC-LDPC Decoder Designs for Non-Volatile Memory Systems

    Non-Volatile Memory Systems (NVMS) have been prevailed among many consumer electronic products, including mobile devices, computers, and the promising Solid-State Drives (SSDs). With the advanced manufacturing technology, the storage density of NVMS, particularly those consist of Multi-Level Cell (MLC) flash memories, grows fast since more bits are able to be...

    Provided By National Taiwan University

  • White Papers // Aug 2012

    Traffic- And Thermal-Balanced Adaptive Beltway Routing in Thermal Aware 3D NoC Systems

    The traffic and thermal problems of high performance Three-Dimensional Network-on-Chip (3D NoC) system become more unbalanced because of chip stacking and applied minimal routing algorithm. To make the temperature under a certain thermal limit, the overheat nodes are throttled by Run-time Thermal Management (RTM). Therefore, the network topology becomes a...

    Provided By National Taiwan University

  • White Papers // Aug 2011

    Design of Transport Layer Assisted Routing for Thermal-Aware 3D Network-on-Chip

    The thermal challenge of 3D Network-on-Chip (3DNoC) is severer than 2D NoC. To ensure thermal safety and avoid huge performance back-off from temperature constraint, Runtime Thermal Management (RTM) is required. However the regulation of temperature requires throttling of the near-overheated router, which makes the topology become Non-Stationary Irregular Mesh (NSI-mesh)....

    Provided By National Taiwan University

  • White Papers // May 2010

    Buffer Depth Allocation for Thermal-Aware 3D Network-on-Chip Design

    In this paper, the authors proposed a buffer allocation algorithm to configure 3D NoC for the traffic and power migration of the thermal-aware designs. While the direct simulation is time-consuming, the proposed queuing model for 3D NoC router enables rapid detection of the performance-bottleneck layer, which buffers allocated to. With...

    Provided By National Taiwan University

  • White Papers // May 2008

    Cost-Efficient Fault-Tolerant Router Design for 2D-Mesh Based Chip Multiprocessor Systems

    Chip Multi-Processor (CMP) system is a popular design in recent years. CMP systems can perform high computation performance by operating multiple parallel processors at lower clock frequency, while still achieving the target throughput and performance. For the communication of CMP systems, On-Chip Networks (OCNs) have been proposed to overcome area...

    Provided By National Taiwan University

  • White Papers // May 2008

    Dual-Mode Single-Binary/Double-Binary MAP Processor Design for Wireless WAN

    With the rapid growth of multimedia services, Forward Error Correcting (FEC) code has been a regular scheme for wireless communications to have a reliable transmission over noisy channels. Single-Binary Convolutional Turbo Code (SBCTC) proposed in 1993 has been the well-known FEC code that can achieve high coding gains close to...

    Provided By National Taiwan University

  • White Papers // Jun 2007

    Efficient Fast Fourier Transform Processor Design for DVB-H System

    Fast Fourier Transform (FFT) is the demodulation kernel in the DVB-H system. In this paper, the authors propose an FFT processor that reduces the power consumption by decreasing the usage of main memory, and timely turning off the unused memory partitions in different sizes of the FFT. The triple-mode conflict-free...

    Provided By National Taiwan University

  • White Papers // Mar 2007

    A New Binomial Mapping and Optimization Algorithm for Reduced-Complexity Mesh-Based On-Chip Network

    With the increasing complexity of System-on-Chip (SoC) design, data exchange within chip is becoming more difficult. Traditional interconnection approaches cannot provide sufficient support for future giga-scale SoC design. On-Chip Network (OCN) is an approach to solve the incoming physical routing, flexibility, scalability, and reliability problems. OCN provides a possible and...

    Provided By National Taiwan University

  • White Papers // Jan 2010

    Visualizing Data Trend and Relation for Exploring Knowledge

    When making decisions, it is often critical to understand the trends and relationships in the task-related information. Complicating matters is the time-varying nature of this information. Specifically, topics gain or lose prominence over time and relationships within the data grow, fade, or disappear altogether. This paper presents a novel visualization...

    Provided By National Taiwan University

  • White Papers // Mar 2009

    Convergence To Market Efficiency Of NASDAQ Hedging Stock

    For a long time, the trading volume has been playing an important role in the stock market. Furthermore, investors usually utilize order imbalance as an indicator to earn abnormal returns. Among previous studies, Chordia and Subrahmanyzm (2004) found the positive relationship between order imbalances and stock returns. However, this relation...

    Provided By National Taiwan University

  • White Papers // May 2009

    A New Global Brand Positioning Strategy- The Process Of Horizontal And Vertical Segment Combination

    This paper conducts an in-depth case study of a young and successful global brand company to explore the global brand positioning process. Evidence shows that generation of global brand positioning is a process of harmonization. There are at least three pairs of seemingly contrasting elements need to be harmonized to...

    Provided By National Taiwan University

  • White Papers // Mar 2009

    A Multicast Mechanism for Mobile Multimedia Messaging Service

    Based on the cell broadcast service architecture, this paper proposes an efficient multicast mechanism for the universal mobile telecommunications system to support Multimedia Messaging Service (MMS). The authors define a new interface between the serving GPRS support node and the cell broadcast center to track the current locations of the...

    Provided By National Taiwan University

  • White Papers // Dec 2009

    Adaptive Routing Protocol for Reliable Sensor Network Applications

    The existing routing protocol for sensor networking can be divided into proactive routing protocol, reactive routing protocol and hybrid routing protocol. Each routing protocol has its merits and shortcomings. The lifetime will end when the working routing protocol can no longer support the whole wireless sensor network. An adaptive method...

    Provided By National Taiwan University

  • White Papers // Jun 2009

    Wage Inequality, Outsourcing, and Education

    This paper present a simple model to explain why wage inequality in the U.S. increased in the 1980s but decreased in the 1970s, in which the authors argue that educational investment might deteriorate wage inequality temporarily, but permanently decrease it. A country would not necessarily present the Kuznets inversed-U curve...

    Provided By National Taiwan University

  • White Papers // Apr 2009

    Development of an Ontology-Based Service Oriented Architecture Framework for National Geographic Information System in Taiwan

    Spatial Data Infrastructure (SDI) is currently being set up with regions, countries, and across national borders to facilitate management and access to geospatial information. GIS services include GIS data services and geoprocessing services which are the main components of SDI to provide remote, standard, and reusable geospatial data and function...

    Provided By National Taiwan University

  • White Papers // Dec 2009

    Secure Multidimensional Queries in Tiered Sensor Networks

    Tiered Sensor Networks. Sensor networks are expected to be deployed on some harsh or hostile regions for data collection or environment monitoring. Since there is the possibility of no stable connection between the authority and the network, in-network storage is necessary for caching or storing the data sensed by sensor...

    Provided By National Taiwan University

  • White Papers // Feb 2011

    Unsupervised Auxiliary Visual Words Discovery for Large-Scale Image Object

    Image object retrieval - locating image occurrences of specific objects in large-scale image collections - is essential for manipulating the sheer amount of photos. Current solutions, mostly based on bags-of-words model, suffer from low recall rate and do not resist noises caused by the changes in lighting, viewpoints, and even...

    Provided By National Taiwan University

  • White Papers // Jun 2009

    On Money, Social Status And Endogenous Growth

    Motivated by the substantial increase of nominal money supply in the U.S. economy since late 2008, this paper examines the equilibrium growth effect of money/inflation within a standard one-sector AK model of endogenous growth with wealth-enhanced preferences for social status and the most generalized cash-in-advance constraint. The authors show that...

    Provided By National Taiwan University

  • White Papers // Jun 2011

    Developing Collaborative Applications With Mobile Cloud - A Case Study of Speech Recognition

    While the combination of cloud computing and mobile computing, termed mobile cloud computing, started to show its effects recently with many seemingly innovative smartphone applications and cloud services surfacing to the market today, the authors believe that the real potentials of mobile cloud computing is far from been fully explored...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Are All Games Equally Cloud-Gaming-Friendly? an Electromyographic Approach

    Cloud gaming now makes any computer game playable on a thin client without the previous worries and frustrations about the hardware requirements. It frees players from the need to frequently upgrade their computers as they can now play games that are hosted on remote servers with a broadband Internet connection...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Open Information Gateway for Disaster Management

    How to exchange information between parties in a mega-scale disaster management system is one of the fundamental challenges to support timely and efficient disaster response and relief. Specifically, the timeliness, scalability, and availability are three desirable features for information exchange. The authors call the framework to support information exchange with...

    Provided By National Taiwan University

  • White Papers // Jul 2012

    Sempre: Secure Multicast Architecture Using Proxy Re-Encryption

    In this paper, the authors propose a novel secure multicast architecture that reduces the impact of the 1 affects n problem significantly by exploiting a cryptographic primitive, "Proxy re-encryption". Therefore, they call the proposed secure multicast architecture Sempre (SEcure Multicast architecture using Proxy Re-Encryption). Proxy re-encryption allows intermediate routers to...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    MIMO Communications Based on Molecular Diffusion

    Diffusion-based communication refers to the transfer of information using molecules as message carriers whose propagation is based on the law of molecular diffusion. Path loss can have a major impact on the link quality in molecular communication as the signal strength is shown inversely proportional to the cube of the...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Markov Chain Performance Model for IEEE 802.11 Devices With Energy Harvesting Source

    Research on energy harvesting networks has attracted an increasing attention lately. Nevertheless, few research of energy harvesting network follows the IEEE 802.11 protocol, whose Medium Access Control (MAC) mechanism, called Distributed Coordination Function (DCF), is based on the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) algorithm and binary exponential...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    DeepSleep: IEEE 802.11 Enhancement for Energy-Harvesting Machine-to-Machine Communications

    As future M2M (Machine-To-Machine) communications aim at supporting wireless networks which feature long range, long operating duration and large device number, the IEEE 802.11ah Task Group is going to specify a global WLAN standard that utilizes carrier frequencies below 1GHz. To power the M2M devices, harvesting energy from ambient environment...

    Provided By National Taiwan University