National Taiwan University

Displaying 41-80 of 113 results

  • White Papers // Sep 2011

    A Femtocell-Assisted Data Forwarding Protocol in Relay Enhanced LTE Networks

    The femtocell networks, which is a small cellular base station in home and small business environment, is an attractive solution for operators to improve indoor coverage and network capability. In addition, relaying is one of the proposed technique for future releases of UTRAN Long Term Evolution (LTE) networks which aims...

    Provided By National Taiwan University

  • White Papers // Aug 2011

    Design of Transport Layer Assisted Routing for Thermal-Aware 3D Network-on-Chip

    The thermal challenge of 3D Network-on-Chip (3DNoC) is severer than 2D NoC. To ensure thermal safety and avoid huge performance back-off from temperature constraint, Runtime Thermal Management (RTM) is required. However the regulation of temperature requires throttling of the near-overheated router, which makes the topology become Non-Stationary Irregular Mesh (NSI-mesh)....

    Provided By National Taiwan University

  • White Papers // Aug 2011

    A Rapid Method for Detecting Geographically Disconnected Areas After Disasters

    In this paper, the authors present a novel solution called Internet Footprint Investigation (IFI) for the rapid detection of network outages after a natural or man-made disaster. IFI is comprised of two components: the Active Network Probing (ANP) module, which proactively probes the network infrastructure to detect geographic areas that...

    Provided By National Taiwan University

  • White Papers // Aug 2011

    Intelligent Resource Management Schemes for Heterogeneous Wireless Networks

    The integration of Wireless Metropolitan Area Network (WMAN) and Wireless Local Area Network (WLAN) technologies seems to be a feasible option for better and cheaper wireless coverage extension. WMAN/WLAN networks are still a challenging issue to be tackled. This paper thus incorporates a variant of the Particle Swarm Optimization (PSO)...

    Provided By National Taiwan University

  • White Papers // Jul 2011

    An Integrated Network Mobility Management and Call Admission Control Scheme for Internet Access on High-Speed Trains

    Automotive telematics has become an important capability of high-speed rail systems, which are increasingly popular in the era of green technology. As train speeds increase, communications between devices on the train and devices outside the train encounter difficulties, and maintaining high quality communication is a major challenge. Moreover, handovers on...

    Provided By National Taiwan University

  • White Papers // Jul 2011

    Transport Layer Assisted Routing for Non-Stationary Irregular Mesh of Thermal-Aware 3D Network-on-Chip Systems

    Thermal issue is important for 3D Network-on-Chip (3DNoC) systems. To ensure thermal safety, run-time thermal management is required. However, the regulation of temperature requires throttling of the near-overheated router, which makes the topology become Non-Stationary Irregular mesh (NSI-mesh). To successfully deliver packet in NSI-mesh, the authors propose the Transport Layer...

    Provided By National Taiwan University

  • White Papers // Jul 2011

    Creating Added Value for Smart Card Applications: The University as a Case Study

    Studies on smart card applications, in addition to focusing on instrumentality and practicality, should also consider the importance of social construction. The implications of actors with different roles on technology directly influence the developmental direction of smart card applications. This study examines smart card applications, using a private university in...

    Provided By National Taiwan University

  • White Papers // Jul 2011

    Multi-Pheromone ACO-Based Routing in Network-on-Chip System Inspired by Economic Phenomenon

    Ant Colony Optimization (ACO) is a collective intelligence problem-solving paradigm. By ACO, the authors can effectively distribute the central control unit to achieve higher performance. With the scaling of Network-on-Chip (NoC) size, more complex communication problems can severely harm the system performance. Therefore, they need more efficient ACO-adaptive routing to...

    Provided By National Taiwan University

  • White Papers // Jul 2011

    An Enhanced Password-Based User Authentication Scheme for Grid Computing

    Based upon Elliptic Curve Cryptosystem, a simple password user authentication scheme was proposed by Lu et al. for grid computing. In their scheme, Lu et al. not only kept the advantages of Yoon et al.'s scheme, but enhanced the efficiency of mutual authentication and at the same time avoided the...

    Provided By National Taiwan University

  • White Papers // Jun 2011

    Improving the Throughput of Sensor Network Wake-Up Radios Using Block Orthogonal Codes

    The authors propose the use of a block orthogonal code to reduce the symbol error rate, and therefore improve the throughput, of wake-up radios used in sensor networks. Currently proposed wake-up radios that use, for example, on-off keying modulation focus on integrated circuit design for low power operation. However, they...

    Provided By National Taiwan University

  • White Papers // Jun 2011

    Pulsed-Latch-Based Clock Tree Migration for Dynamic Power Reduction

    Minimizing the clock tree has been known as an effective approach to reduce power dissipation in modern circuit designs. However, most existing power-aware clock tree synthesis algorithms still focus on optimizing power in flip-flops, which might have limited power savings. In this paper, the authors explore the pulsed-latch utilization in...

    Provided By National Taiwan University

  • White Papers // Jun 2011

    Development and Testing of Integrated Bridge Disaster Prevention and Management Platform

    In recent years, global warming leads rainfall intensity stronger than before. Therefore, bridge management requires a reliable monitoring platform in current, to monitoring of bridge piers based on the variations of safety and river erosion, can be timely warming of the bridge damage, and achieving the maintenance of bridges safety...

    Provided By National Taiwan University

  • White Papers // Jun 2011

    Developing Bridge Monitor Platform Using GPS and Communication Technology

    In order to maintain security of the bridge and prevent life and property losses caused by earthquakes, typhoons, erosion and other disasters, it is worthwhile to explore the installation of monitoring and management system for bridges. However, in the current bridge management process, most of the discussion is divided into...

    Provided By National Taiwan University

  • White Papers // Jun 2011

    Developing Collaborative Applications With Mobile Cloud - A Case Study of Speech Recognition

    While the combination of cloud computing and mobile computing, termed mobile cloud computing, started to show its effects recently with many seemingly innovative smartphone applications and cloud services surfacing to the market today, the authors believe that the real potentials of mobile cloud computing is far from been fully explored...

    Provided By National Taiwan University

  • White Papers // Jun 2011

    Distributed Throughput Optimization for ZigBee Cluster-Tree Networks

    ZigBee, a unique communication standard designed for low-rate wireless personal area networks, has extremely low complexity, cost, and power consumption for wireless connectivity in inexpensive, portable, and mobile devices. Among the well-known ZigBee topologies, ZigBee cluster-tree is especially suitable for low-power and low-cost wireless sensor networks because it supports power...

    Provided By National Taiwan University

  • White Papers // May 2011

    Utility-Based Resource Allocation for Layer-Encoded IPTV Multicast Service in Wireless Relay Networks

    IPTV multi-casting is an important service for residential users. In this paper, the authors explore how to allocate resources to different layer-encoded IPTV programs using multi-cast services in relay-assisted centralized wireless access networks. They consider the scenario of two-hop relay stations, and the MAC protocol is OFDMA-based, as in IEEE...

    Provided By National Taiwan University

  • White Papers // Apr 2011

    Multi-Path Routing With End-to-End Statistical QoS Provisioning in Underlay Cognitive Radio Networks

    Since the radio access of secondary users is typically confined to ensure sufficient operation for primary users in underlay Cognitive Radio Networks (CRNs), the inevitably induced latency and interference pose new challenges on existing routing schemes for Quality-of-Service (QoS) provisioning. Due to stringent accessing and interference constraints, secondary users appeal...

    Provided By National Taiwan University

  • White Papers // Mar 2011

    An ID-Based Access Control in a Hierarchical Key Management for Mobile Agent

    The related techniques and applications on e-commerce have been concerned by a great number of researchers. The use of a mobile agent, in particular, is an important breakthrough on the e-commerce applications. With the abilities of higher autonomy and mobility, a mobile agent can move freely among different execution environments,...

    Provided By National Taiwan University

  • White Papers // Feb 2011

    Unsupervised Auxiliary Visual Words Discovery for Large-Scale Image Object

    Image object retrieval - locating image occurrences of specific objects in large-scale image collections - is essential for manipulating the sheer amount of photos. Current solutions, mostly based on bags-of-words model, suffer from low recall rate and do not resist noises caused by the changes in lighting, viewpoints, and even...

    Provided By National Taiwan University

  • White Papers // Jan 2011

    PMI-Based MIMO OFDM PHY Integrated Key Exchange (P-MOPI) Scheme

    In this paper, the authors have proposed the MIMO-OFDM PHY Integrated (MOPI) scheme for achieving physical-layer security in practice without using any cryptographic ciphers. The MOPI scheme uses channel sounding and Physical-layer Network Coding (PNC) to prevent eavesdroppers from learning the Channel State Information (CSI). Nevertheless, due to the use...

    Provided By National Taiwan University

  • White Papers // Jan 2011

    Cognitive Relay Protocol: Design, Implementation and Evaluation

    In this paper, the authors design and implement a Cognitive Relay protocol (CogRelay) in MAC layer to efficiently relay data packets. The proposed scheme chooses high quality relay links to prevent unnecessary relay, thereby enhancing relay efficiency and acquiring higher throughput. The relaying overhead is light since there is no...

    Provided By National Taiwan University

  • White Papers // Nov 2010

    Multicasting Homogeneous and Heterogeneous Quantum States in Quantum Networks

    In this paper, the authors target the practical implementation issues of quantum multicast networks. First, they design a recursive lossless compression that allows them to control the trade-off between the circuit complexity and the dimension of the compressed quantum state. They give a formula that describes the trade-off, and further...

    Provided By National Taiwan University

  • White Papers // Oct 2010

    Cognitive Radio Network Tomography of Spectrum Map Using Learning and Random Set Theory

    Cognitive radio network tomography identifies transmission opportunities by actively or passively obtaining link-level or network-level information, to enable networking cognitive radios. Beyond the spectrum holes, radio resource with location information that is known as spectrum map, can easily facilitate network functions such as multi-hop cooperative routing. However, it is not...

    Provided By National Taiwan University

  • White Papers // Oct 2010

    Improving Online Game Performance Over IEEE 802.11n Networks

    Multi-player online gaming is one of the most popular applications on the Internet nowadays. Due to the mobility requirements and the growing popularity of Wi-Fi services, a significant number of users access the Internet through IEEE 802.11 Wireless LAN. Hence, the performance of highly interactive real-time online game under wireless...

    Provided By National Taiwan University

  • White Papers // Jul 2010

    MobiCom 2009 Poster: DANCE: A Game-Theoretical Femtocell Channel Exchange Mechanism

    The femtocell system is an efficient solution to increase the wireless systems coverage. However, femtocells may experience spatially diverse interferences. A proper exchange on the channels between femtocells can improve the transmission experience. The authors proposed game-theoretical DANCE mechanism to derive the optimal allocation in the femtocell channel allocation problem....

    Provided By National Taiwan University

  • White Papers // Jul 2010

    MobiCom 2009 Poster: Accelerometer-Assisted Power Efficient Wi-Fi Networking on Public Transportation System

    Using mobile devices to access the network service over public transportation system provides ubiquitous network access. Accelerometer has become standard equipment in mobile handheld devices. The authors proposed a power saving mechanism, AAPS, which integrates accelerometer and Wi-Fi devices to facilitate opportunistic communication while conserving power. In the scenario of...

    Provided By National Taiwan University

  • White Papers // Jul 2010

    Homomorphic Encryption-Based Secure SIFT for Privacy-Preserving Feature Extraction

    Privacy has received much attention but is still largely ignored in the multimedia community. Consider a cloud computing scenario, where the server is resource-abundant and is capable of finishing the designated tasks, it is envisioned that secure media retrieval and search with privacy-preserving will be seriously treated. In view of...

    Provided By National Taiwan University

  • White Papers // Jun 2010

    Cross-Level Behavioral Analysis for Robust Early Intrusion Detection

    The authors anticipate future attacks would evolve to become more sophisticated to outwit existing intrusion detection techniques. Existing anomaly analysis techniques and signature-based detection practices can no longer effective. They believe Intrusion Detection Systems (IDSs) of the future will need to be capable to detect or infer attacks based on...

    Provided By National Taiwan University

  • White Papers // May 2010

    Buffer Depth Allocation for Thermal-Aware 3D Network-on-Chip Design

    In this paper, the authors proposed a buffer allocation algorithm to configure 3D NoC for the traffic and power migration of the thermal-aware designs. While the direct simulation is time-consuming, the proposed queuing model for 3D NoC router enables rapid detection of the performance-bottleneck layer, which buffers allocated to. With...

    Provided By National Taiwan University

  • White Papers // Apr 2010

    Congestion Control of Transmission Control Protocol Based on Bandwidth Estimation

    This paper presents a framework for TCP congestion control, called "Bandwidth-based TCP", which differs from most TCP algorithms by using the bandwidth estimation as the congestion measure to control the window size increment. It tries to predict the equilibrium point of window size then make the congestion window approach this...

    Provided By National Taiwan University

  • White Papers // Apr 2010

    Holography: A Hardware Virtualization Tool for Malware Analysis

    Behavior-based detection methods have the ability to detect unknown malicious software (malware). The success of behavior-based detection methods must depend on sufficient number of abnormal behavior models. Insufficient number of abnormal behavior models can lead to high false positive and/or false negative rates. The majority of abnormal behavior models can...

    Provided By National Taiwan University

  • White Papers // Mar 2010

    Acquiring Authentic Data in Unattended Wireless Sensor Networks

    An Unattended Wireless Sensor Network (UWSN) can be used in many applications to collect valuable data. Nevertheless, due to the unattended nature, the sensors could be compromised and the sensor readings would be maliciously altered so that the sink accepts the falsified sensor readings. Unfortunately, few attentions have been given...

    Provided By National Taiwan University

  • White Papers // Mar 2010

    Job Scheduling Techniques for Distributed Systems with Heterogeneous Processor Cardinality

    In this paper, the authors propose scheduling algorithms for assigning jobs with different release time and execution time, to machines with heterogeneous processor cardinality. They show that this scheduling problem is NP-complete, and propose dynamic programming to find the optimal schedules. Since the dynamic programming is time-consuming they propose techniques...

    Provided By National Taiwan University

  • White Papers // Feb 2010

    Behavior Profiling for Robust Anomaly Detection

    Internet attacks are evolving using evasion techniques such as polymorphism and stealth scanning. Conventional detection systems using signature-based and/or rule-based anomaly detection techniques no longer suffice. It is difficult to predict what form the next malware attack will take and these pose a great challenge to the design of a...

    Provided By National Taiwan University

  • White Papers // Feb 2010

    Dynamic Auction Mechanism for Cloud Resource Allocation

    The authors propose a dynamic auction mechanism to solve the allocation problem of computation capacity in the environment of cloud computing. Truth-telling property holds when they apply a second-priced auction mechanism into the resource allocation problem. Thus, the Cloud Service Provider (CSP) can assure reasonable profit and efficient allocation of...

    Provided By National Taiwan University

  • White Papers // Feb 2010

    Multi-Group Wireless Multicast Broadcast Services Using Adaptive Modulation and Coding: Modeling and Analysis

    Adaptive Modulation and Coding (AMC) is attracting research interest in wireless Multicast Broadcast Services (MBS). AMC increases the system throughput by utilizing possible good channel states instead of using robust modulation and coding schemes. A model for the AMC in an MBS system with multiple MBS groups is provided, and...

    Provided By National Taiwan University

  • White Papers // Feb 2010

    Power Control Game With SINR-Pricing in Variable-Demand Wireless Data Networks

    Game theory has been applied to model power control in wireless systems for years. Conventional power control games tend to consider unlimited backlogged user traffic. Different from the conventional methodology, this paper aims to investigate limited backlogged data traffic and construct a game-theoretic model tackling both one-shot and repeated power...

    Provided By National Taiwan University

  • White Papers // Feb 2010

    Cross-Layer Adaptive H.264/AVC Streaming Over IEEE 802.11e Experimental Testbed

    In recent years, the rapid development of wireless communication allows one to enjoy more multimedia services via wireless network. However, due to lack of QoS support and characteristics of wireless channel, there are still many challenges in wireless video streaming. In this paper, the authors implement a cross-layer architecture to...

    Provided By National Taiwan University

  • White Papers // Feb 2010

    Pseudo Random Network Coding Design for IEEE 802.16m Enhanced Multicast and Broadcast Service

    Applying network coding on broadcasting service is known to reduce times of transmission in the process of recovering the loss packets. In previous design, coding coefficients are put in the packet headers so that MSs can decode the coded packets. However, it causes extra overhead. Moreover, since many mechanisms depend...

    Provided By National Taiwan University

  • White Papers // Jan 2010

    Visualizing Data Trend and Relation for Exploring Knowledge

    When making decisions, it is often critical to understand the trends and relationships in the task-related information. Complicating matters is the time-varying nature of this information. Specifically, topics gain or lose prominence over time and relationships within the data grow, fade, or disappear altogether. This paper presents a novel visualization...

    Provided By National Taiwan University

  • White Papers // Feb 2012

    A Diffusion-Based Binary Digital Communication System

    Diffusion-based communications refers to the transfer of information using particles as message carriers whose propagation is based on the law of particle diffusion. Though still at an early stage, there have been growing interests and research efforts dedicated to this communication technology. It has been identified that diffusion-based communications is...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Improving TCP Performance Over an On-Board Multi-Homed Network

    Previously, a multi-homed NEMO architecture has been proposed to improve the reliability and aggregate the bandwidth of MR by simultaneously using multiple wireless links. In this paper, the authors propose a novel protocol called ETOM (Enhancements for TCP On a multi-homed mobile router) to improve the performance of sending a...

    Provided By National Taiwan University

  • White Papers // Jul 2011

    An Integrated Network Mobility Management and Call Admission Control Scheme for Internet Access on High-Speed Trains

    Automotive telematics has become an important capability of high-speed rail systems, which are increasingly popular in the era of green technology. As train speeds increase, communications between devices on the train and devices outside the train encounter difficulties, and maintaining high quality communication is a major challenge. Moreover, handovers on...

    Provided By National Taiwan University

  • White Papers // Dec 2009

    C-SWF Incremental Mining Algorithm for Firewall Policy Management

    As the number of security incidents had been sharply growing, the issue of security-defense draws more and more attention from network community in past years. Firewall is known as one of the most popular security-defense mechanism for corporations. It is the first defense-line for security infrastructure of corporations to against...

    Provided By National Taiwan University

  • White Papers // Jan 2010

    Visualizing Data Trend and Relation for Exploring Knowledge

    When making decisions, it is often critical to understand the trends and relationships in the task-related information. Complicating matters is the time-varying nature of this information. Specifically, topics gain or lose prominence over time and relationships within the data grow, fade, or disappear altogether. This paper presents a novel visualization...

    Provided By National Taiwan University

  • White Papers // Mar 2009

    Convergence To Market Efficiency Of NASDAQ Hedging Stock

    For a long time, the trading volume has been playing an important role in the stock market. Furthermore, investors usually utilize order imbalance as an indicator to earn abnormal returns. Among previous studies, Chordia and Subrahmanyzm (2004) found the positive relationship between order imbalances and stock returns. However, this relation...

    Provided By National Taiwan University

  • White Papers // May 2009

    A New Global Brand Positioning Strategy- The Process Of Horizontal And Vertical Segment Combination

    This paper conducts an in-depth case study of a young and successful global brand company to explore the global brand positioning process. Evidence shows that generation of global brand positioning is a process of harmonization. There are at least three pairs of seemingly contrasting elements need to be harmonized to...

    Provided By National Taiwan University

  • White Papers // Mar 2009

    A Multicast Mechanism for Mobile Multimedia Messaging Service

    Based on the cell broadcast service architecture, this paper proposes an efficient multicast mechanism for the universal mobile telecommunications system to support Multimedia Messaging Service (MMS). The authors define a new interface between the serving GPRS support node and the cell broadcast center to track the current locations of the...

    Provided By National Taiwan University

  • White Papers // Dec 2009

    Adaptive Routing Protocol for Reliable Sensor Network Applications

    The existing routing protocol for sensor networking can be divided into proactive routing protocol, reactive routing protocol and hybrid routing protocol. Each routing protocol has its merits and shortcomings. The lifetime will end when the working routing protocol can no longer support the whole wireless sensor network. An adaptive method...

    Provided By National Taiwan University

  • White Papers // Jun 2009

    Wage Inequality, Outsourcing, and Education

    This paper present a simple model to explain why wage inequality in the U.S. increased in the 1980s but decreased in the 1970s, in which the authors argue that educational investment might deteriorate wage inequality temporarily, but permanently decrease it. A country would not necessarily present the Kuznets inversed-U curve...

    Provided By National Taiwan University

  • White Papers // Apr 2009

    Development of an Ontology-Based Service Oriented Architecture Framework for National Geographic Information System in Taiwan

    Spatial Data Infrastructure (SDI) is currently being set up with regions, countries, and across national borders to facilitate management and access to geospatial information. GIS services include GIS data services and geoprocessing services which are the main components of SDI to provide remote, standard, and reusable geospatial data and function...

    Provided By National Taiwan University

  • White Papers // Dec 2009

    Secure Multidimensional Queries in Tiered Sensor Networks

    Tiered Sensor Networks. Sensor networks are expected to be deployed on some harsh or hostile regions for data collection or environment monitoring. Since there is the possibility of no stable connection between the authority and the network, in-network storage is necessary for caching or storing the data sensed by sensor...

    Provided By National Taiwan University

  • White Papers // Feb 2011

    Unsupervised Auxiliary Visual Words Discovery for Large-Scale Image Object

    Image object retrieval - locating image occurrences of specific objects in large-scale image collections - is essential for manipulating the sheer amount of photos. Current solutions, mostly based on bags-of-words model, suffer from low recall rate and do not resist noises caused by the changes in lighting, viewpoints, and even...

    Provided By National Taiwan University

  • White Papers // Jun 2009

    On Money, Social Status And Endogenous Growth

    Motivated by the substantial increase of nominal money supply in the U.S. economy since late 2008, this paper examines the equilibrium growth effect of money/inflation within a standard one-sector AK model of endogenous growth with wealth-enhanced preferences for social status and the most generalized cash-in-advance constraint. The authors show that...

    Provided By National Taiwan University

  • White Papers // Jun 2011

    Developing Collaborative Applications With Mobile Cloud - A Case Study of Speech Recognition

    While the combination of cloud computing and mobile computing, termed mobile cloud computing, started to show its effects recently with many seemingly innovative smartphone applications and cloud services surfacing to the market today, the authors believe that the real potentials of mobile cloud computing is far from been fully explored...

    Provided By National Taiwan University

  • White Papers // Feb 2010

    Behavior Profiling for Robust Anomaly Detection

    Internet attacks are evolving using evasion techniques such as polymorphism and stealth scanning. Conventional detection systems using signature-based and/or rule-based anomaly detection techniques no longer suffice. It is difficult to predict what form the next malware attack will take and these pose a great challenge to the design of a...

    Provided By National Taiwan University

  • White Papers // Jun 2010

    Cross-Level Behavioral Analysis for Robust Early Intrusion Detection

    The authors anticipate future attacks would evolve to become more sophisticated to outwit existing intrusion detection techniques. Existing anomaly analysis techniques and signature-based detection practices can no longer effective. They believe Intrusion Detection Systems (IDSs) of the future will need to be capable to detect or infer attacks based on...

    Provided By National Taiwan University

  • White Papers // Jun 2011

    Development and Testing of Integrated Bridge Disaster Prevention and Management Platform

    In recent years, global warming leads rainfall intensity stronger than before. Therefore, bridge management requires a reliable monitoring platform in current, to monitoring of bridge piers based on the variations of safety and river erosion, can be timely warming of the bridge damage, and achieving the maintenance of bridges safety...

    Provided By National Taiwan University

  • White Papers // Jun 2011

    Developing Bridge Monitor Platform Using GPS and Communication Technology

    In order to maintain security of the bridge and prevent life and property losses caused by earthquakes, typhoons, erosion and other disasters, it is worthwhile to explore the installation of monitoring and management system for bridges. However, in the current bridge management process, most of the discussion is divided into...

    Provided By National Taiwan University

  • White Papers // Jun 2011

    Distributed Throughput Optimization for ZigBee Cluster-Tree Networks

    ZigBee, a unique communication standard designed for low-rate wireless personal area networks, has extremely low complexity, cost, and power consumption for wireless connectivity in inexpensive, portable, and mobile devices. Among the well-known ZigBee topologies, ZigBee cluster-tree is especially suitable for low-power and low-cost wireless sensor networks because it supports power...

    Provided By National Taiwan University

  • White Papers // Jan 2011

    PMI-Based MIMO OFDM PHY Integrated Key Exchange (P-MOPI) Scheme

    In this paper, the authors have proposed the MIMO-OFDM PHY Integrated (MOPI) scheme for achieving physical-layer security in practice without using any cryptographic ciphers. The MOPI scheme uses channel sounding and Physical-layer Network Coding (PNC) to prevent eavesdroppers from learning the Channel State Information (CSI). Nevertheless, due to the use...

    Provided By National Taiwan University

  • White Papers // Oct 2010

    Cognitive Radio Network Tomography of Spectrum Map Using Learning and Random Set Theory

    Cognitive radio network tomography identifies transmission opportunities by actively or passively obtaining link-level or network-level information, to enable networking cognitive radios. Beyond the spectrum holes, radio resource with location information that is known as spectrum map, can easily facilitate network functions such as multi-hop cooperative routing. However, it is not...

    Provided By National Taiwan University

  • White Papers // Apr 2011

    Multi-Path Routing With End-to-End Statistical QoS Provisioning in Underlay Cognitive Radio Networks

    Since the radio access of secondary users is typically confined to ensure sufficient operation for primary users in underlay Cognitive Radio Networks (CRNs), the inevitably induced latency and interference pose new challenges on existing routing schemes for Quality-of-Service (QoS) provisioning. Due to stringent accessing and interference constraints, secondary users appeal...

    Provided By National Taiwan University

  • White Papers // Dec 2009

    Paging and Location Management in IEEE 802.16j Multihop Relay Network

    IEEE 802.16j is an emerging wireless broadband networking standard that integrates infrastructure base stations with multihop relay technology. Based on the idle mode operation in IEEE 802.16j, the authors propose a novel location management and paging scheme. It integrates the paging area-based and the timer-based location update mechanism. In paging...

    Provided By National Taiwan University

  • White Papers // Feb 2010

    Cross-Layer Adaptive H.264/AVC Streaming Over IEEE 802.11e Experimental Testbed

    In recent years, the rapid development of wireless communication allows one to enjoy more multimedia services via wireless network. However, due to lack of QoS support and characteristics of wireless channel, there are still many challenges in wireless video streaming. In this paper, the authors implement a cross-layer architecture to...

    Provided By National Taiwan University

  • White Papers // Feb 2010

    Multi-Group Wireless Multicast Broadcast Services Using Adaptive Modulation and Coding: Modeling and Analysis

    Adaptive Modulation and Coding (AMC) is attracting research interest in wireless Multicast Broadcast Services (MBS). AMC increases the system throughput by utilizing possible good channel states instead of using robust modulation and coding schemes. A model for the AMC in an MBS system with multiple MBS groups is provided, and...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Are All Games Equally Cloud-Gaming-Friendly? an Electromyographic Approach

    Cloud gaming now makes any computer game playable on a thin client without the previous worries and frustrations about the hardware requirements. It frees players from the need to frequently upgrade their computers as they can now play games that are hosted on remote servers with a broadband Internet connection...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Open Information Gateway for Disaster Management

    How to exchange information between parties in a mega-scale disaster management system is one of the fundamental challenges to support timely and efficient disaster response and relief. Specifically, the timeliness, scalability, and availability are three desirable features for information exchange. The authors call the framework to support information exchange with...

    Provided By National Taiwan University

  • White Papers // Jul 2012

    Sempre: Secure Multicast Architecture Using Proxy Re-Encryption

    In this paper, the authors propose a novel secure multicast architecture that reduces the impact of the 1 affects n problem significantly by exploiting a cryptographic primitive, "Proxy re-encryption". Therefore, they call the proposed secure multicast architecture Sempre (SEcure Multicast architecture using Proxy Re-Encryption). Proxy re-encryption allows intermediate routers to...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    MIMO Communications Based on Molecular Diffusion

    Diffusion-based communication refers to the transfer of information using molecules as message carriers whose propagation is based on the law of molecular diffusion. Path loss can have a major impact on the link quality in molecular communication as the signal strength is shown inversely proportional to the cube of the...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Markov Chain Performance Model for IEEE 802.11 Devices With Energy Harvesting Source

    Research on energy harvesting networks has attracted an increasing attention lately. Nevertheless, few research of energy harvesting network follows the IEEE 802.11 protocol, whose Medium Access Control (MAC) mechanism, called Distributed Coordination Function (DCF), is based on the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) algorithm and binary exponential...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    DeepSleep: IEEE 802.11 Enhancement for Energy-Harvesting Machine-to-Machine Communications

    As future M2M (Machine-To-Machine) communications aim at supporting wireless networks which feature long range, long operating duration and large device number, the IEEE 802.11ah Task Group is going to specify a global WLAN standard that utilizes carrier frequencies below 1GHz. To power the M2M devices, harvesting energy from ambient environment...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    A New Paradigm for Channel Coding in Diffusion-Based Molecular Communications: Molecular Coding Distance Function

    The emerging diffusion-based molecular communications is a promising scheme for nano-machine communications. Nevertheless, the Brownian motion model, which describes the behavior of molecules, makes the physical channel different from the channel in conventional wireless communications. In particular, the crossovers in time caused by the late arrivals of the molecules severely...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Optimal Detection for Diffusion-Based Communications in the Presence of ISI

    Communications based on diffusion refers to the transfer of information using molecules as message carriers whose propagation is governed by the laws of Brownian motion. Molecular communication is considered to be one of the most promising approaches for the end-to-end communication between nano-scale devices. In this paper, both an optimal...

    Provided By National Taiwan University

  • White Papers // Sep 2012

    Efficient Mutual Authentication and Key Agreement with User Anonymity for Roaming Services in Global Mobility Networks

    Global mobility networks provide effective global roaming services for personal communication users. Through the universal roaming technology, legitimate mobile users can enjoy the ubiquitous services. Mutual authentication and key agreement between mobile users and roaming servers is the primary security issue of many commercial mo-bile networks. In this paper, the...

    Provided By National Taiwan University

  • White Papers // Feb 2012

    Tame Pool-Based Pairwise Key Predistribution for Large-Scale Sensor Networks

    Due to resource constraints on sensor nodes, public key cryptography is not desirable to use in sensor networks. In this paper, the authors first develop a novel tame-based key predistribution approach, where they exploit tame automorphisms to get symmetric and two-one bivariate maps for the pair-wise key establishment. This tame-based...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Interoperability Between Visual UML Design Applications and Authoring Tools for Learning Design

    A learning design is the result of the description of a teaching-learning process. It implies the consideration of aspects such as the context in which teaching is being developed, the most suitable teaching method in this context, the necessary resources, the contents of the training activity, or the assessment criteria....

    Provided By National Taiwan University

  • White Papers // Jan 2012

    The Study on General Secure Multi-Party Computation

    This paper, pertaining to the design of a new security model with multiparty computation for security, aims to study the rational model and UC (universal composability) model as well as design a security protocol for the requirements of the models. The structures of secret sharing agreement, fair computation agreement, bit...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    A Scalable Routing for Delay-Tolerant Heterogeneous Networks

    In this paper, the authors propose a prediction-based routing protocol for heterogeneous delay tolerant networks, wherein edge servers are distributed over the borders of the different network domains. First, a location prediction algorithm based on user online logs is used to intelligently estimate the most probable future location of a...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Password Cracking Based on Special Keyboard Patterns

    Passwords are still the most commonly used mechanism for user authentication. This paper proposes an efficient and effective method to attack passwords generated from some special keyboard patterns. The authors create a framework to formally describe the commonly used keyboard patterns of adjacent keys and parallel keys, called AP patterns,...

    Provided By National Taiwan University