National Taiwan University

Displaying 1-40 of 118 results

  • White Papers // Jan 2014

    Multiprocessor Energy-Efficient Scheduling for Real-Time Tasks with Different Power Characteristics

    In the past decades, a number of research results have been reported for energy-efficient scheduling over uniprocessor and multiprocessor environments. Different from many of the past results on the assumption for task power characteristics, the authors consider real-time scheduling of tasks with different power characteristics. The objective is to minimize...

    Provided By National Taiwan University

  • White Papers // Jul 2013

    A Virtual Storage Environment for SSDs and HDDs in Xen Hypervisor

    Now-a-days, virtualization is a popular technology to provide an abstract hardware emulation due to the increasing hardware speed and capabilities such as multi-core CPUs, large-size main memory, and high-bandwidth networking. Virtualization technology enables multiple virtual machines to run on a physical machine, where each virtual machine can run independently and...

    Provided By National Taiwan University

  • White Papers // Mar 2013

    An Evaluation of RFID Door Security System at Taipei Arena Ice Land Based on Technology Acceptance Model

    In the service industry nowadays, creating customer value remains an important issue. RFID is capable of creating potential customer value for companies and allowing them to respond to customer needs with new services. However, in the process of introducing RFID systems, the degree of service quality, system quality, and information...

    Provided By National Taiwan University

  • White Papers // Feb 2013

    Password Cracking Based on Learned Patterns From Disclosed Passwords

    Password-based authentication systems are still the most commonly used mechanism for protecting sensitive information despite being vulnerable to dictionary based attacks. To guard against such attacks, many organizations enforce complicated password-creation rules and require that passwords include numeric and special characters. This paper demonstrates that as long as passwords are...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    MIMO Communications Based on Molecular Diffusion

    Diffusion-based communication refers to the transfer of information using molecules as message carriers whose propagation is based on the law of molecular diffusion. Path loss can have a major impact on the link quality in molecular communication as the signal strength is shown inversely proportional to the cube of the...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Markov Chain Performance Model for IEEE 802.11 Devices With Energy Harvesting Source

    Research on energy harvesting networks has attracted an increasing attention lately. Nevertheless, few research of energy harvesting network follows the IEEE 802.11 protocol, whose Medium Access Control (MAC) mechanism, called Distributed Coordination Function (DCF), is based on the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) algorithm and binary exponential...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    DeepSleep: IEEE 802.11 Enhancement for Energy-Harvesting Machine-to-Machine Communications

    As future M2M (Machine-To-Machine) communications aim at supporting wireless networks which feature long range, long operating duration and large device number, the IEEE 802.11ah Task Group is going to specify a global WLAN standard that utilizes carrier frequencies below 1GHz. To power the M2M devices, harvesting energy from ambient environment...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    A New Paradigm for Channel Coding in Diffusion-Based Molecular Communications: Molecular Coding Distance Function

    The emerging diffusion-based molecular communications is a promising scheme for nano-machine communications. Nevertheless, the Brownian motion model, which describes the behavior of molecules, makes the physical channel different from the channel in conventional wireless communications. In particular, the crossovers in time caused by the late arrivals of the molecules severely...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Optimal Detection for Diffusion-Based Communications in the Presence of ISI

    Communications based on diffusion refers to the transfer of information using molecules as message carriers whose propagation is governed by the laws of Brownian motion. Molecular communication is considered to be one of the most promising approaches for the end-to-end communication between nano-scale devices. In this paper, both an optimal...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Signal Detection and ISI Cancellation for Quantity-Based Amplitude Modulation in Diffusion-Based Molecular Communications

    Diffusion-based molecular communications has becoming a promising approach for end-to-end communication between nano-machines. However, due to the randomness nature of molecule diffusions, the arriving time of each molecule is hard to predict and the late coming molecules will become a source of interference when doing detection. This effect will cause...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Are All Games Equally Cloud-Gaming-Friendly? an Electromyographic Approach

    Cloud gaming now makes any computer game playable on a thin client without the previous worries and frustrations about the hardware requirements. It frees players from the need to frequently upgrade their computers as they can now play games that are hosted on remote servers with a broadband Internet connection...

    Provided By National Taiwan University

  • White Papers // Sep 2012

    Efficient Mutual Authentication and Key Agreement with User Anonymity for Roaming Services in Global Mobility Networks

    Global mobility networks provide effective global roaming services for personal communication users. Through the universal roaming technology, legitimate mobile users can enjoy the ubiquitous services. Mutual authentication and key agreement between mobile users and roaming servers is the primary security issue of many commercial mo-bile networks. In this paper, the...

    Provided By National Taiwan University

  • White Papers // Aug 2012

    Cost-Effective Scalable QC-LDPC Decoder Designs for Non-Volatile Memory Systems

    Non-Volatile Memory Systems (NVMS) have been prevailed among many consumer electronic products, including mobile devices, computers, and the promising Solid-State Drives (SSDs). With the advanced manufacturing technology, the storage density of NVMS, particularly those consist of Multi-Level Cell (MLC) flash memories, grows fast since more bits are able to be...

    Provided By National Taiwan University

  • White Papers // Aug 2012

    Traffic- And Thermal-Balanced Adaptive Beltway Routing in Thermal Aware 3D NoC Systems

    The traffic and thermal problems of high performance Three-Dimensional Network-on-Chip (3D NoC) system become more unbalanced because of chip stacking and applied minimal routing algorithm. To make the temperature under a certain thermal limit, the overheat nodes are throttled by Run-time Thermal Management (RTM). Therefore, the network topology becomes a...

    Provided By National Taiwan University

  • White Papers // Jul 2012

    Sempre: Secure Multicast Architecture Using Proxy Re-Encryption

    In this paper, the authors propose a novel secure multicast architecture that reduces the impact of the 1 affects n problem significantly by exploiting a cryptographic primitive, "Proxy re-encryption". Therefore, they call the proposed secure multicast architecture Sempre (SEcure Multicast architecture using Proxy Re-Encryption). Proxy re-encryption allows intermediate routers to...

    Provided By National Taiwan University

  • White Papers // Jun 2012

    Path-Diversity-Aware Adaptive Routing in Network-on-Chip Systems

    The partially adaptive routing plays an important role in the performance of Network-on-Chip (NoC). It uses information of the network to select a better path to deliver a packet. However, it may have imbalanced path diversity in different directions, which makes their tolerances of traffic load differ a lot from...

    Provided By National Taiwan University

  • White Papers // Jun 2012

    A Mobicast Routing Protocol With Carry-and-Forward in Vehicular Ad Hoc Networks

    In vehicular networks, safety and comfort applications are two quite different kinds of applications to avoid the emergency traffic accident and enjoy the non-emergency entertainment. The comfort application drives the challenges of new non-emergency entertainments for Vehicular Ad-hoc NETworks (VANETs). In this paper, the authors investigate a new mobicast protocol...

    Provided By National Taiwan University

  • White Papers // Jun 2012

    A Probabilistic Packet Marking Scheme With LT Code for IP Traceback

    Cybercrime has become an important issue in the cyber-society. Distributed Denial of Service attack is the most popular attack, which uses many zombies to attack the victim, makes victim crashed and interrupt services. The authors propose the LT Code IP Traceback scheme to reconstruct the attack graph and find the...

    Provided By National Taiwan University

  • White Papers // May 2012

    CAOR: Coding-Aware Opportunistic Routing in Wireless Ad Hoc Networks

    In this paper, the authors propose a new protocol which integrates intra-flow network coding based opportunistic routing with inter-flow network coding, called CAOR, for lossy wireless networks. In a lossy environment, each linear combination of packets in a batch may not be able to arrive at each forwarder intact. The...

    Provided By National Taiwan University

  • White Papers // May 2012

    Power Consumption Optimization for Information Exchange in Wireless-Relay Sensor Networks

    Minimization of power consumption is a critical design goal for wireless-relay networks comprised of battery powered sensor devices. Traditionally, wireless communication is optimized to minimize the total transmission power. In the paper, the authors further include the detection power and the reception power in order to minimize the overall network...

    Provided By National Taiwan University

  • White Papers // May 2012

    Stochastic Delay Guarantees in ZigBee Cluster-Tree Networks

    ZigBee, a unique communication standard designed for low-rate personal area networks, has extremely low complexity, cost, and power consumption for wireless connectivity in inexpensive, portable, and mobile devices. Among the well-known ZigBee topologies, the cluster tree is especially suitable for wireless sensor networks because of its support for power saving...

    Provided By National Taiwan University

  • White Papers // May 2012

    Formulating and Solving the Femtocell Deployment Problem in Two-Tier Heterogeneous Networks

    Recently, there has been an increasing interest in the deployment and management of femto Base Stations (BSs) to optimize the overall system performance in macro-femto heterogeneous networks. While deployment of femto BSs is typically not as planned as that of pico BSs, given a number of femto BSs to be...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    A Coalitional Game Analysis for Selfish Packet-Forwarding Networks

    In wireless packet-forwarding networks, selfish nodes always want to maximize their utilities and do not like to help others forward data streams, thus causing severe network performance degradation. To solve the packet-forwarding problem, a novel coalitional game approach based on the Selective Decode-and-Forward (SDF) relaying scheme is proposed. In the...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    ML Performance Bounds of Turbo and LDPC Codes

    To date there is no practical means to evaluate the true Word Error Probability (WEP) of a given turbo or LDPC code because typical decoders cannot achieve the performance of ML decoding. In this paper, the authors propose a viable methodology to establish tight bounds on the ML-decoding WEP for...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    A Decoding for a Block Coded Scheme With Interblock Memory

    Applying inter-block memory to binary linear block codes is a method to increase the transmission reliability by increasing the correlation among code-words. In this paper, the authors consider short block coding with inter-block memory. Since short block codes can be efficiently decoded by employing the A Algorithm, they investigate the...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    Optimal Self Boundary Recognition With Two-Hop Information for Ad Hoc Networks

    The ad hoc network is composed of multiple sensor nodes to serve various applications, such as data collection or environmental monitoring. In many applications, the sensor nodes near the boundary of the deployment region provide biased or low-quality information because they have limited number of neighboring nodes and only partial...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    Video Multicast With Heterogeneous User Interests in Multi-Rate Wireless Networks

    As mobile devices, such as smart phones and tablet PCs, become more and more ubiquitous, it is increasingly popular for users to watch online video streaming on their mobile devices. Because of the nature of wireless broadcast, a wireless router (e.g., an access point or cellular tower) can retrieve video...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    On Optimal Artificial-Noise Assisted Secure Beamforming for the Multiple-Input Multiple-Output Fading Eavesdropper Channel

    In a wiretap channel, a source node wishes to transmit confidential messages securely to a legitimate receiver and to keep the eavesdropper as ignorant of the message as possible. As a special case of the broadcast channels with confidential messages, Wyner characterized the secrecy capacity of the discrete memoryless wiretap...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    An Exact Error Probability Analysis of Incremental Opportunistic Decode-and-Forward Relaying With Feedback Delay

    Incremental Opportunistic Relaying (IOR) has been proposed to increase the spectral efficiency of the two-phase cooperative transmissions by exploiting limited feedback from the destination node. Specifically, the relaying process is activated only if the source-destination channel is of insufficient quality. In this case, the feedback instructs the best relay to...

    Provided By National Taiwan University

  • White Papers // Feb 2012

    On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels

    In this paper, the authors consider the secure transmission in fast Rayleigh fading channels with full knowledge of the main channel and only the statistics of the eavesdropper's channel state information at the transmitter. For the multiple-input, single-output, single-antenna eavesdropper systems, they generalize Goel and Negi's celebrated Artificial-Noise (AN) assisted...

    Provided By National Taiwan University

  • White Papers // Feb 2012

    A Diffusion-Based Binary Digital Communication System

    Diffusion-based communications refers to the transfer of information using particles as message carriers whose propagation is based on the law of particle diffusion. Though still at an early stage, there have been growing interests and research efforts dedicated to this communication technology. It has been identified that diffusion-based communications is...

    Provided By National Taiwan University

  • White Papers // Feb 2012

    Tame Pool-Based Pairwise Key Predistribution for Large-Scale Sensor Networks

    Due to resource constraints on sensor nodes, public key cryptography is not desirable to use in sensor networks. In this paper, the authors first develop a novel tame-based key predistribution approach, where they exploit tame automorphisms to get symmetric and two-one bivariate maps for the pair-wise key establishment. This tame-based...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Open Information Gateway for Disaster Management

    How to exchange information between parties in a mega-scale disaster management system is one of the fundamental challenges to support timely and efficient disaster response and relief. Specifically, the timeliness, scalability, and availability are three desirable features for information exchange. The authors call the framework to support information exchange with...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Improving TCP Performance Over an On-Board Multi-Homed Network

    Previously, a multi-homed NEMO architecture has been proposed to improve the reliability and aggregate the bandwidth of MR by simultaneously using multiple wireless links. In this paper, the authors propose a novel protocol called ETOM (Enhancements for TCP On a multi-homed mobile router) to improve the performance of sending a...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Interoperability Between Visual UML Design Applications and Authoring Tools for Learning Design

    A learning design is the result of the description of a teaching-learning process. It implies the consideration of aspects such as the context in which teaching is being developed, the most suitable teaching method in this context, the necessary resources, the contents of the training activity, or the assessment criteria....

    Provided By National Taiwan University

  • White Papers // Jan 2012

    The Study on General Secure Multi-Party Computation

    This paper, pertaining to the design of a new security model with multiparty computation for security, aims to study the rational model and UC (universal composability) model as well as design a security protocol for the requirements of the models. The structures of secret sharing agreement, fair computation agreement, bit...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    A Scalable Routing for Delay-Tolerant Heterogeneous Networks

    In this paper, the authors propose a prediction-based routing protocol for heterogeneous delay tolerant networks, wherein edge servers are distributed over the borders of the different network domains. First, a location prediction algorithm based on user online logs is used to intelligently estimate the most probable future location of a...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Password Cracking Based on Special Keyboard Patterns

    Passwords are still the most commonly used mechanism for user authentication. This paper proposes an efficient and effective method to attack passwords generated from some special keyboard patterns. The authors create a framework to formally describe the commonly used keyboard patterns of adjacent keys and parallel keys, called AP patterns,...

    Provided By National Taiwan University

  • White Papers // Nov 2011

    SHA-3 on ARM11 Processors

    This paper presents high-speed assembly implementations of the 256-bit-output versions of all five SHA-3 finalists and of SHA-256 for the ARM11 family of processors. The authors report new speed records for all of the six implemented functions. For example, their implementation of the round-3 version of JH-256 is 35% faster...

    Provided By National Taiwan University

  • White Papers // Oct 2011

    An Adaptive Duty-Cycle Scheme for GPS Scheduling in Mobile Location Sensing Applications

    Mobile Location Sensing Applications (MLSAs) represent an emerging genre of applications that exploit Global Positioning System (GPS) technology and facilitate location-based services. The design of MLSAs must incorporate a tradeoff between information accuracy and energy efficiency because GPS technology is energy expensive and unaffordable for most MLSA platforms, which are...

    Provided By National Taiwan University

  • White Papers // Jul 2010

    Homomorphic Encryption-Based Secure SIFT for Privacy-Preserving Feature Extraction

    Privacy has received much attention but is still largely ignored in the multimedia community. Consider a cloud computing scenario, where the server is resource-abundant and is capable of finishing the designated tasks, it is envisioned that secure media retrieval and search with privacy-preserving will be seriously treated. In view of...

    Provided By National Taiwan University

  • White Papers // Nov 2008

    A Scalable Peer-to-Peer Presence Directory

    Instant Messaging (IM) has emerged as a popular communication service over the Internet. One of the themes of IM systems is to provide a presence directory that carries information on user's presence or absence to his/her friends. In this paper, the authors present new presence directory architecture and give a...

    Provided By National Taiwan University

  • White Papers // May 2012

    CAOR: Coding-Aware Opportunistic Routing in Wireless Ad Hoc Networks

    In this paper, the authors propose a new protocol which integrates intra-flow network coding based opportunistic routing with inter-flow network coding, called CAOR, for lossy wireless networks. In a lossy environment, each linear combination of packets in a batch may not be able to arrive at each forwarder intact. The...

    Provided By National Taiwan University

  • White Papers // May 2012

    Power Consumption Optimization for Information Exchange in Wireless-Relay Sensor Networks

    Minimization of power consumption is a critical design goal for wireless-relay networks comprised of battery powered sensor devices. Traditionally, wireless communication is optimized to minimize the total transmission power. In the paper, the authors further include the detection power and the reception power in order to minimize the overall network...

    Provided By National Taiwan University

  • White Papers // May 2012

    Stochastic Delay Guarantees in ZigBee Cluster-Tree Networks

    ZigBee, a unique communication standard designed for low-rate personal area networks, has extremely low complexity, cost, and power consumption for wireless connectivity in inexpensive, portable, and mobile devices. Among the well-known ZigBee topologies, the cluster tree is especially suitable for wireless sensor networks because of its support for power saving...

    Provided By National Taiwan University

  • White Papers // May 2012

    Formulating and Solving the Femtocell Deployment Problem in Two-Tier Heterogeneous Networks

    Recently, there has been an increasing interest in the deployment and management of femto Base Stations (BSs) to optimize the overall system performance in macro-femto heterogeneous networks. While deployment of femto BSs is typically not as planned as that of pico BSs, given a number of femto BSs to be...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    A Coalitional Game Analysis for Selfish Packet-Forwarding Networks

    In wireless packet-forwarding networks, selfish nodes always want to maximize their utilities and do not like to help others forward data streams, thus causing severe network performance degradation. To solve the packet-forwarding problem, a novel coalitional game approach based on the Selective Decode-and-Forward (SDF) relaying scheme is proposed. In the...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    ML Performance Bounds of Turbo and LDPC Codes

    To date there is no practical means to evaluate the true Word Error Probability (WEP) of a given turbo or LDPC code because typical decoders cannot achieve the performance of ML decoding. In this paper, the authors propose a viable methodology to establish tight bounds on the ML-decoding WEP for...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    A Decoding for a Block Coded Scheme With Interblock Memory

    Applying inter-block memory to binary linear block codes is a method to increase the transmission reliability by increasing the correlation among code-words. In this paper, the authors consider short block coding with inter-block memory. Since short block codes can be efficiently decoded by employing the A Algorithm, they investigate the...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    Optimal Self Boundary Recognition With Two-Hop Information for Ad Hoc Networks

    The ad hoc network is composed of multiple sensor nodes to serve various applications, such as data collection or environmental monitoring. In many applications, the sensor nodes near the boundary of the deployment region provide biased or low-quality information because they have limited number of neighboring nodes and only partial...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    Video Multicast With Heterogeneous User Interests in Multi-Rate Wireless Networks

    As mobile devices, such as smart phones and tablet PCs, become more and more ubiquitous, it is increasingly popular for users to watch online video streaming on their mobile devices. Because of the nature of wireless broadcast, a wireless router (e.g., an access point or cellular tower) can retrieve video...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    On Optimal Artificial-Noise Assisted Secure Beamforming for the Multiple-Input Multiple-Output Fading Eavesdropper Channel

    In a wiretap channel, a source node wishes to transmit confidential messages securely to a legitimate receiver and to keep the eavesdropper as ignorant of the message as possible. As a special case of the broadcast channels with confidential messages, Wyner characterized the secrecy capacity of the discrete memoryless wiretap...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    An Exact Error Probability Analysis of Incremental Opportunistic Decode-and-Forward Relaying With Feedback Delay

    Incremental Opportunistic Relaying (IOR) has been proposed to increase the spectral efficiency of the two-phase cooperative transmissions by exploiting limited feedback from the destination node. Specifically, the relaying process is activated only if the source-destination channel is of insufficient quality. In this case, the feedback instructs the best relay to...

    Provided By National Taiwan University

  • White Papers // Feb 2012

    On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels

    In this paper, the authors consider the secure transmission in fast Rayleigh fading channels with full knowledge of the main channel and only the statistics of the eavesdropper's channel state information at the transmitter. For the multiple-input, single-output, single-antenna eavesdropper systems, they generalize Goel and Negi's celebrated Artificial-Noise (AN) assisted...

    Provided By National Taiwan University

  • White Papers // Feb 2010

    Power Control Game With SINR-Pricing in Variable-Demand Wireless Data Networks

    Game theory has been applied to model power control in wireless systems for years. Conventional power control games tend to consider unlimited backlogged user traffic. Different from the conventional methodology, this paper aims to investigate limited backlogged data traffic and construct a game-theoretic model tackling both one-shot and repeated power...

    Provided By National Taiwan University

  • White Papers // Feb 2010

    Pseudo Random Network Coding Design for IEEE 802.16m Enhanced Multicast and Broadcast Service

    Applying network coding on broadcasting service is known to reduce times of transmission in the process of recovering the loss packets. In previous design, coding coefficients are put in the packet headers so that MSs can decode the coded packets. However, it causes extra overhead. Moreover, since many mechanisms depend...

    Provided By National Taiwan University

  • White Papers // Feb 2010

    Dynamic Auction Mechanism for Cloud Resource Allocation

    The authors propose a dynamic auction mechanism to solve the allocation problem of computation capacity in the environment of cloud computing. Truth-telling property holds when they apply a second-priced auction mechanism into the resource allocation problem. Thus, the Cloud Service Provider (CSP) can assure reasonable profit and efficient allocation of...

    Provided By National Taiwan University

  • White Papers // Nov 2009

    A Game-Theoretical Model of Cognitive Relay

    Cognitive Radio provides enhanced wireless communication performance through context-aware sensing and adaptation. Cooperative relay enhances network connection quality and improved system throughput. Applying cooperative relay communication technique on Cognitive Radio networks enables Cognitive Radio to opportunistically exploit cooperation between network nodes. This integrated design that benefits from both cognitive network...

    Provided By National Taiwan University

  • White Papers // Aug 2009

    Reliable Multi-Query Protocol for Delay-Constraint Wireless Monitoring Applications

    Designing a reliable and power-efficient protocol is critical to wireless sensor network. Recently, it is essential to practical deployment to design a wireless sensor network protocol that is reliable and easy to implement. The aim of this paper is to provide reliable and efficient wireless sensor network operation through a...

    Provided By National Taiwan University

  • White Papers // Jun 2009

    Comparative Performance Evaluation of Idle Mode Location Management Schemes for IEEE 802.16j Multihop Relay Networks

    IEEE 802.16 WiMAX is a promising technology to provide broadband wireless networking access. IEEE 802.16j Mo-bile Multihop Relay standard introduces multihop relaying to WiMAX system. Relay stations are used to extended network coverage and enhance system throughput. To reduce power consumption, an idle mode MS does not send location update...

    Provided By National Taiwan University

  • White Papers // Jul 2010

    MobiCom 2009 Poster: DANCE: A Game-Theoretical Femtocell Channel Exchange Mechanism

    The femtocell system is an efficient solution to increase the wireless systems coverage. However, femtocells may experience spatially diverse interferences. A proper exchange on the channels between femtocells can improve the transmission experience. The authors proposed game-theoretical DANCE mechanism to derive the optimal allocation in the femtocell channel allocation problem....

    Provided By National Taiwan University

  • White Papers // Jul 2010

    MobiCom 2009 Poster: Accelerometer-Assisted Power Efficient Wi-Fi Networking on Public Transportation System

    Using mobile devices to access the network service over public transportation system provides ubiquitous network access. Accelerometer has become standard equipment in mobile handheld devices. The authors proposed a power saving mechanism, AAPS, which integrates accelerometer and Wi-Fi devices to facilitate opportunistic communication while conserving power. In the scenario of...

    Provided By National Taiwan University

  • White Papers // Aug 2011

    A Rapid Method for Detecting Geographically Disconnected Areas After Disasters

    In this paper, the authors present a novel solution called Internet Footprint Investigation (IFI) for the rapid detection of network outages after a natural or man-made disaster. IFI is comprised of two components: the Active Network Probing (ANP) module, which proactively probes the network infrastructure to detect geographic areas that...

    Provided By National Taiwan University

  • White Papers // Mar 2009

    XD: A Cross-Layer Designed Data Collection Mechanism for Mission-Critical WSNs in Urban Buildings

    As the R&D experience accumulates, there is a rising interest of Wireless Sensor Network (WSN) deployment in the urban environment. For mission critical applications such as healthcare and workplace safety, in particular, it is essential that the data dissemination mechanisms satisfy two important Quality of Service (QoS) requirements: high delivery...

    Provided By National Taiwan University

  • White Papers // Oct 2011

    An Adaptive Duty-Cycle Scheme for GPS Scheduling in Mobile Location Sensing Applications

    Mobile Location Sensing Applications (MLSAs) represent an emerging genre of applications that exploit Global Positioning System (GPS) technology and facilitate location-based services. The design of MLSAs must incorporate a tradeoff between information accuracy and energy efficiency because GPS technology is energy expensive and unaffordable for most MLSA platforms, which are...

    Provided By National Taiwan University

  • White Papers // Jun 2011

    Improving the Throughput of Sensor Network Wake-Up Radios Using Block Orthogonal Codes

    The authors propose the use of a block orthogonal code to reduce the symbol error rate, and therefore improve the throughput, of wake-up radios used in sensor networks. Currently proposed wake-up radios that use, for example, on-off keying modulation focus on integrated circuit design for low power operation. However, they...

    Provided By National Taiwan University

  • White Papers // Apr 2010

    Congestion Control of Transmission Control Protocol Based on Bandwidth Estimation

    This paper presents a framework for TCP congestion control, called "Bandwidth-based TCP", which differs from most TCP algorithms by using the bandwidth estimation as the congestion measure to control the window size increment. It tries to predict the equilibrium point of window size then make the congestion window approach this...

    Provided By National Taiwan University

  • White Papers // May 2011

    Utility-Based Resource Allocation for Layer-Encoded IPTV Multicast Service in Wireless Relay Networks

    IPTV multi-casting is an important service for residential users. In this paper, the authors explore how to allocate resources to different layer-encoded IPTV programs using multi-cast services in relay-assisted centralized wireless access networks. They consider the scenario of two-hop relay stations, and the MAC protocol is OFDMA-based, as in IEEE...

    Provided By National Taiwan University

  • White Papers // Jun 2009

    Data-Bandwidth-Aware Job Scheduling Techniques in Distributed Systems

    This paper introduces techniques in scheduling jobs on a master/workers platform where the bandwidth is shared by all workers. The jobs are independent and each job requires a fixed amount of bandwidth to download input data before execution. The master can communicate with multiple workers simultaneously, provided that the bandwidth...

    Provided By National Taiwan University

  • White Papers // Dec 2009

    EMWF: A Middleware for Flexible Automation and Assistive Devices

    EMWF (EMbedded Workflow Framework) is an open source middleware for flexible (i.e., configurable, customizable and adaptable) automation and assistive devices and systems, referred to collectively as SISARL (Sensor Information Systems for Active Retirees and Assisted Living). Examples include smart medication dispensers, autonomous appliances, service robots and robotic helpers for personal...

    Provided By National Taiwan University

  • White Papers // Nov 2011

    SHA-3 on ARM11 Processors

    This paper presents high-speed assembly implementations of the 256-bit-output versions of all five SHA-3 finalists and of SHA-256 for the ARM11 family of processors. The authors report new speed records for all of the six implemented functions. For example, their implementation of the round-3 version of JH-256 is 35% faster...

    Provided By National Taiwan University

  • White Papers // Mar 2009

    Improving Opportunistic Data Dissemination Via Known Vector

    An opportunistic network is a network where each node only has connectivity with other nodes opportunistically. To disseminate data in this kind of network is a challenging task and had drawn lots of research effort. When two nodes have connectivity with each other, the data bundles stored in their memory...

    Provided By National Taiwan University

  • White Papers // Mar 2010

    Acquiring Authentic Data in Unattended Wireless Sensor Networks

    An Unattended Wireless Sensor Network (UWSN) can be used in many applications to collect valuable data. Nevertheless, due to the unattended nature, the sensors could be compromised and the sensor readings would be maliciously altered so that the sink accepts the falsified sensor readings. Unfortunately, few attentions have been given...

    Provided By National Taiwan University

  • White Papers // Jan 2010

    A Secure Relay-Assisted Handover Protocol for Proxy Mobile IPv6 in 3GPP LTE Networks

    The LTE (Long Term Evolution) technologies defined by 3GPP is the last step toward the 4th Generation (4G) of radio technologies designed to increase the capacity and speed of mobile telephone networks. Mobility management for supporting seamless handover is the key issue for the next generation wireless communication networks. The...

    Provided By National Taiwan University

  • White Papers // Jun 2012

    A Mobicast Routing Protocol With Carry-and-Forward in Vehicular Ad Hoc Networks

    In vehicular networks, safety and comfort applications are two quite different kinds of applications to avoid the emergency traffic accident and enjoy the non-emergency entertainment. The comfort application drives the challenges of new non-emergency entertainments for Vehicular Ad-hoc NETworks (VANETs). In this paper, the authors investigate a new mobicast protocol...

    Provided By National Taiwan University

  • White Papers // Sep 2011

    A Femtocell-Assisted Data Forwarding Protocol in Relay Enhanced LTE Networks

    The femtocell networks, which is a small cellular base station in home and small business environment, is an attractive solution for operators to improve indoor coverage and network capability. In addition, relaying is one of the proposed technique for future releases of UTRAN Long Term Evolution (LTE) networks which aims...

    Provided By National Taiwan University

  • White Papers // Oct 2010

    Improving Online Game Performance Over IEEE 802.11n Networks

    Multi-player online gaming is one of the most popular applications on the Internet nowadays. Due to the mobility requirements and the growing popularity of Wi-Fi services, a significant number of users access the Internet through IEEE 802.11 Wireless LAN. Hence, the performance of highly interactive real-time online game under wireless...

    Provided By National Taiwan University

  • White Papers // Nov 2010

    Multicasting Homogeneous and Heterogeneous Quantum States in Quantum Networks

    In this paper, the authors target the practical implementation issues of quantum multicast networks. First, they design a recursive lossless compression that allows them to control the trade-off between the circuit complexity and the dimension of the compressed quantum state. They give a formula that describes the trade-off, and further...

    Provided By National Taiwan University

  • White Papers // Jan 2011

    Cognitive Relay Protocol: Design, Implementation and Evaluation

    In this paper, the authors design and implement a Cognitive Relay protocol (CogRelay) in MAC layer to efficiently relay data packets. The proposed scheme chooses high quality relay links to prevent unnecessary relay, thereby enhancing relay efficiency and acquiring higher throughput. The relaying overhead is light since there is no...

    Provided By National Taiwan University

  • White Papers // Sep 2009

    Cross-Layer Mobile Chord P2P Protocol Design for VANET

    Efficient content distribution is one of the emerging applications in vehicular networks. To provide scalable content distribution in vehicular networks, Chord peer-to-peer overlay could be applied. Most P2P protocols, including Chord, are de-signed for wired-line network, and might perform poorly in mobile networks. Mobile Chord (MChord) is proposed to enhance...

    Provided By National Taiwan University