National Taiwan University

Displaying 1-40 of 115 results

  • White Papers // Jul 2013

    A Virtual Storage Environment for SSDs and HDDs in Xen Hypervisor

    Now-a-days, virtualization is a popular technology to provide an abstract hardware emulation due to the increasing hardware speed and capabilities such as multi-core CPUs, large-size main memory, and high-bandwidth networking. Virtualization technology enables multiple virtual machines to run on a physical machine, where each virtual machine can run independently and...

    Provided By National Taiwan University

  • White Papers // Mar 2013

    An Evaluation of RFID Door Security System at Taipei Arena Ice Land Based on Technology Acceptance Model

    In the service industry nowadays, creating customer value remains an important issue. RFID is capable of creating potential customer value for companies and allowing them to respond to customer needs with new services. However, in the process of introducing RFID systems, the degree of service quality, system quality, and information...

    Provided By National Taiwan University

  • White Papers // Feb 2013

    Password Cracking Based on Learned Patterns From Disclosed Passwords

    Password-based authentication systems are still the most commonly used mechanism for protecting sensitive information despite being vulnerable to dictionary based attacks. To guard against such attacks, many organizations enforce complicated password-creation rules and require that passwords include numeric and special characters. This paper demonstrates that as long as passwords are...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    MIMO Communications Based on Molecular Diffusion

    Diffusion-based communication refers to the transfer of information using molecules as message carriers whose propagation is based on the law of molecular diffusion. Path loss can have a major impact on the link quality in molecular communication as the signal strength is shown inversely proportional to the cube of the...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Markov Chain Performance Model for IEEE 802.11 Devices With Energy Harvesting Source

    Research on energy harvesting networks has attracted an increasing attention lately. Nevertheless, few research of energy harvesting network follows the IEEE 802.11 protocol, whose Medium Access Control (MAC) mechanism, called Distributed Coordination Function (DCF), is based on the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) algorithm and binary exponential...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    DeepSleep: IEEE 802.11 Enhancement for Energy-Harvesting Machine-to-Machine Communications

    As future M2M (Machine-To-Machine) communications aim at supporting wireless networks which feature long range, long operating duration and large device number, the IEEE 802.11ah Task Group is going to specify a global WLAN standard that utilizes carrier frequencies below 1GHz. To power the M2M devices, harvesting energy from ambient environment...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    A New Paradigm for Channel Coding in Diffusion-Based Molecular Communications: Molecular Coding Distance Function

    The emerging diffusion-based molecular communications is a promising scheme for nano-machine communications. Nevertheless, the Brownian motion model, which describes the behavior of molecules, makes the physical channel different from the channel in conventional wireless communications. In particular, the crossovers in time caused by the late arrivals of the molecules severely...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Optimal Detection for Diffusion-Based Communications in the Presence of ISI

    Communications based on diffusion refers to the transfer of information using molecules as message carriers whose propagation is governed by the laws of Brownian motion. Molecular communication is considered to be one of the most promising approaches for the end-to-end communication between nano-scale devices. In this paper, both an optimal...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Signal Detection and ISI Cancellation for Quantity-Based Amplitude Modulation in Diffusion-Based Molecular Communications

    Diffusion-based molecular communications has becoming a promising approach for end-to-end communication between nano-machines. However, due to the randomness nature of molecule diffusions, the arriving time of each molecule is hard to predict and the late coming molecules will become a source of interference when doing detection. This effect will cause...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Are All Games Equally Cloud-Gaming-Friendly? an Electromyographic Approach

    Cloud gaming now makes any computer game playable on a thin client without the previous worries and frustrations about the hardware requirements. It frees players from the need to frequently upgrade their computers as they can now play games that are hosted on remote servers with a broadband Internet connection...

    Provided By National Taiwan University

  • White Papers // Sep 2012

    Efficient Mutual Authentication and Key Agreement with User Anonymity for Roaming Services in Global Mobility Networks

    Global mobility networks provide effective global roaming services for personal communication users. Through the universal roaming technology, legitimate mobile users can enjoy the ubiquitous services. Mutual authentication and key agreement between mobile users and roaming servers is the primary security issue of many commercial mo-bile networks. In this paper, the...

    Provided By National Taiwan University

  • White Papers // Aug 2012

    Traffic- And Thermal-Balanced Adaptive Beltway Routing in Thermal Aware 3D NoC Systems

    The traffic and thermal problems of high performance Three-Dimensional Network-on-Chip (3D NoC) system become more unbalanced because of chip stacking and applied minimal routing algorithm. To make the temperature under a certain thermal limit, the overheat nodes are throttled by Run-time Thermal Management (RTM). Therefore, the network topology becomes a...

    Provided By National Taiwan University

  • White Papers // Aug 2012

    Cost-Effective Scalable QC-LDPC Decoder Designs for Non-Volatile Memory Systems

    Non-Volatile Memory Systems (NVMS) have been prevailed among many consumer electronic products, including mobile devices, computers, and the promising Solid-State Drives (SSDs). With the advanced manufacturing technology, the storage density of NVMS, particularly those consist of Multi-Level Cell (MLC) flash memories, grows fast since more bits are able to be...

    Provided By National Taiwan University

  • White Papers // Jul 2012

    Sempre: Secure Multicast Architecture Using Proxy Re-Encryption

    In this paper, the authors propose a novel secure multicast architecture that reduces the impact of the 1 affects n problem significantly by exploiting a cryptographic primitive, "Proxy re-encryption". Therefore, they call the proposed secure multicast architecture Sempre (SEcure Multicast architecture using Proxy Re-Encryption). Proxy re-encryption allows intermediate routers to...

    Provided By National Taiwan University

  • White Papers // Jun 2012

    Path-Diversity-Aware Adaptive Routing in Network-on-Chip Systems

    The partially adaptive routing plays an important role in the performance of Network-on-Chip (NoC). It uses information of the network to select a better path to deliver a packet. However, it may have imbalanced path diversity in different directions, which makes their tolerances of traffic load differ a lot from...

    Provided By National Taiwan University

  • White Papers // Jun 2012

    A Mobicast Routing Protocol With Carry-and-Forward in Vehicular Ad Hoc Networks

    In vehicular networks, safety and comfort applications are two quite different kinds of applications to avoid the emergency traffic accident and enjoy the non-emergency entertainment. The comfort application drives the challenges of new non-emergency entertainments for Vehicular Ad-hoc NETworks (VANETs). In this paper, the authors investigate a new mobicast protocol...

    Provided By National Taiwan University

  • White Papers // Jun 2012

    A Probabilistic Packet Marking Scheme With LT Code for IP Traceback

    Cybercrime has become an important issue in the cyber-society. Distributed Denial of Service attack is the most popular attack, which uses many zombies to attack the victim, makes victim crashed and interrupt services. The authors propose the LT Code IP Traceback scheme to reconstruct the attack graph and find the...

    Provided By National Taiwan University

  • White Papers // May 2012

    CAOR: Coding-Aware Opportunistic Routing in Wireless Ad Hoc Networks

    In this paper, the authors propose a new protocol which integrates intra-flow network coding based opportunistic routing with inter-flow network coding, called CAOR, for lossy wireless networks. In a lossy environment, each linear combination of packets in a batch may not be able to arrive at each forwarder intact. The...

    Provided By National Taiwan University

  • White Papers // May 2012

    Power Consumption Optimization for Information Exchange in Wireless-Relay Sensor Networks

    Minimization of power consumption is a critical design goal for wireless-relay networks comprised of battery powered sensor devices. Traditionally, wireless communication is optimized to minimize the total transmission power. In the paper, the authors further include the detection power and the reception power in order to minimize the overall network...

    Provided By National Taiwan University

  • White Papers // May 2012

    Stochastic Delay Guarantees in ZigBee Cluster-Tree Networks

    ZigBee, a unique communication standard designed for low-rate personal area networks, has extremely low complexity, cost, and power consumption for wireless connectivity in inexpensive, portable, and mobile devices. Among the well-known ZigBee topologies, the cluster tree is especially suitable for wireless sensor networks because of its support for power saving...

    Provided By National Taiwan University

  • White Papers // May 2012

    Formulating and Solving the Femtocell Deployment Problem in Two-Tier Heterogeneous Networks

    Recently, there has been an increasing interest in the deployment and management of femto Base Stations (BSs) to optimize the overall system performance in macro-femto heterogeneous networks. While deployment of femto BSs is typically not as planned as that of pico BSs, given a number of femto BSs to be...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    A Coalitional Game Analysis for Selfish Packet-Forwarding Networks

    In wireless packet-forwarding networks, selfish nodes always want to maximize their utilities and do not like to help others forward data streams, thus causing severe network performance degradation. To solve the packet-forwarding problem, a novel coalitional game approach based on the Selective Decode-and-Forward (SDF) relaying scheme is proposed. In the...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    ML Performance Bounds of Turbo and LDPC Codes

    To date there is no practical means to evaluate the true Word Error Probability (WEP) of a given turbo or LDPC code because typical decoders cannot achieve the performance of ML decoding. In this paper, the authors propose a viable methodology to establish tight bounds on the ML-decoding WEP for...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    A Decoding for a Block Coded Scheme With Interblock Memory

    Applying inter-block memory to binary linear block codes is a method to increase the transmission reliability by increasing the correlation among code-words. In this paper, the authors consider short block coding with inter-block memory. Since short block codes can be efficiently decoded by employing the A Algorithm, they investigate the...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    Optimal Self Boundary Recognition With Two-Hop Information for Ad Hoc Networks

    The ad hoc network is composed of multiple sensor nodes to serve various applications, such as data collection or environmental monitoring. In many applications, the sensor nodes near the boundary of the deployment region provide biased or low-quality information because they have limited number of neighboring nodes and only partial...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    Video Multicast With Heterogeneous User Interests in Multi-Rate Wireless Networks

    As mobile devices, such as smart phones and tablet PCs, become more and more ubiquitous, it is increasingly popular for users to watch online video streaming on their mobile devices. Because of the nature of wireless broadcast, a wireless router (e.g., an access point or cellular tower) can retrieve video...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    On Optimal Artificial-Noise Assisted Secure Beamforming for the Multiple-Input Multiple-Output Fading Eavesdropper Channel

    In a wiretap channel, a source node wishes to transmit confidential messages securely to a legitimate receiver and to keep the eavesdropper as ignorant of the message as possible. As a special case of the broadcast channels with confidential messages, Wyner characterized the secrecy capacity of the discrete memoryless wiretap...

    Provided By National Taiwan University

  • White Papers // Mar 2012

    An Exact Error Probability Analysis of Incremental Opportunistic Decode-and-Forward Relaying With Feedback Delay

    Incremental Opportunistic Relaying (IOR) has been proposed to increase the spectral efficiency of the two-phase cooperative transmissions by exploiting limited feedback from the destination node. Specifically, the relaying process is activated only if the source-destination channel is of insufficient quality. In this case, the feedback instructs the best relay to...

    Provided By National Taiwan University

  • White Papers // Feb 2012

    On Secrecy Rate of the Generalized Artificial-Noise Assisted Secure Beamforming for Wiretap Channels

    In this paper, the authors consider the secure transmission in fast Rayleigh fading channels with full knowledge of the main channel and only the statistics of the eavesdropper's channel state information at the transmitter. For the multiple-input, single-output, single-antenna eavesdropper systems, they generalize Goel and Negi's celebrated Artificial-Noise (AN) assisted...

    Provided By National Taiwan University

  • White Papers // Feb 2012

    A Diffusion-Based Binary Digital Communication System

    Diffusion-based communications refers to the transfer of information using particles as message carriers whose propagation is based on the law of particle diffusion. Though still at an early stage, there have been growing interests and research efforts dedicated to this communication technology. It has been identified that diffusion-based communications is...

    Provided By National Taiwan University

  • White Papers // Feb 2012

    Tame Pool-Based Pairwise Key Predistribution for Large-Scale Sensor Networks

    Due to resource constraints on sensor nodes, public key cryptography is not desirable to use in sensor networks. In this paper, the authors first develop a novel tame-based key predistribution approach, where they exploit tame automorphisms to get symmetric and two-one bivariate maps for the pair-wise key establishment. This tame-based...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Open Information Gateway for Disaster Management

    How to exchange information between parties in a mega-scale disaster management system is one of the fundamental challenges to support timely and efficient disaster response and relief. Specifically, the timeliness, scalability, and availability are three desirable features for information exchange. The authors call the framework to support information exchange with...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Improving TCP Performance Over an On-Board Multi-Homed Network

    Previously, a multi-homed NEMO architecture has been proposed to improve the reliability and aggregate the bandwidth of MR by simultaneously using multiple wireless links. In this paper, the authors propose a novel protocol called ETOM (Enhancements for TCP On a multi-homed mobile router) to improve the performance of sending a...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Interoperability Between Visual UML Design Applications and Authoring Tools for Learning Design

    A learning design is the result of the description of a teaching-learning process. It implies the consideration of aspects such as the context in which teaching is being developed, the most suitable teaching method in this context, the necessary resources, the contents of the training activity, or the assessment criteria....

    Provided By National Taiwan University

  • White Papers // Jan 2012

    The Study on General Secure Multi-Party Computation

    This paper, pertaining to the design of a new security model with multiparty computation for security, aims to study the rational model and UC (universal composability) model as well as design a security protocol for the requirements of the models. The structures of secret sharing agreement, fair computation agreement, bit...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    A Scalable Routing for Delay-Tolerant Heterogeneous Networks

    In this paper, the authors propose a prediction-based routing protocol for heterogeneous delay tolerant networks, wherein edge servers are distributed over the borders of the different network domains. First, a location prediction algorithm based on user online logs is used to intelligently estimate the most probable future location of a...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Password Cracking Based on Special Keyboard Patterns

    Passwords are still the most commonly used mechanism for user authentication. This paper proposes an efficient and effective method to attack passwords generated from some special keyboard patterns. The authors create a framework to formally describe the commonly used keyboard patterns of adjacent keys and parallel keys, called AP patterns,...

    Provided By National Taiwan University

  • White Papers // Nov 2011

    SHA-3 on ARM11 Processors

    This paper presents high-speed assembly implementations of the 256-bit-output versions of all five SHA-3 finalists and of SHA-256 for the ARM11 family of processors. The authors report new speed records for all of the six implemented functions. For example, their implementation of the round-3 version of JH-256 is 35% faster...

    Provided By National Taiwan University

  • White Papers // Oct 2011

    An Adaptive Duty-Cycle Scheme for GPS Scheduling in Mobile Location Sensing Applications

    Mobile Location Sensing Applications (MLSAs) represent an emerging genre of applications that exploit Global Positioning System (GPS) technology and facilitate location-based services. The design of MLSAs must incorporate a tradeoff between information accuracy and energy efficiency because GPS technology is energy expensive and unaffordable for most MLSA platforms, which are...

    Provided By National Taiwan University

  • White Papers // Sep 2011

    A Femtocell-Assisted Data Forwarding Protocol in Relay Enhanced LTE Networks

    The femtocell networks, which is a small cellular base station in home and small business environment, is an attractive solution for operators to improve indoor coverage and network capability. In addition, relaying is one of the proposed technique for future releases of UTRAN Long Term Evolution (LTE) networks which aims...

    Provided By National Taiwan University

  • White Papers // Jul 2013

    A Virtual Storage Environment for SSDs and HDDs in Xen Hypervisor

    Now-a-days, virtualization is a popular technology to provide an abstract hardware emulation due to the increasing hardware speed and capabilities such as multi-core CPUs, large-size main memory, and high-bandwidth networking. Virtualization technology enables multiple virtual machines to run on a physical machine, where each virtual machine can run independently and...

    Provided By National Taiwan University

  • White Papers // Jun 2007

    Efficient Fast Fourier Transform Processor Design for DVB-H System

    Fast Fourier Transform (FFT) is the demodulation kernel in the DVB-H system. In this paper, the authors propose an FFT processor that reduces the power consumption by decreasing the usage of main memory, and timely turning off the unused memory partitions in different sizes of the FFT. The triple-mode conflict-free...

    Provided By National Taiwan University

  • White Papers // May 2008

    Dual-Mode Single-Binary/Double-Binary MAP Processor Design for Wireless WAN

    With the rapid growth of multimedia services, Forward Error Correcting (FEC) code has been a regular scheme for wireless communications to have a reliable transmission over noisy channels. Single-Binary Convolutional Turbo Code (SBCTC) proposed in 1993 has been the well-known FEC code that can achieve high coding gains close to...

    Provided By National Taiwan University

  • White Papers // May 2008

    Cost-Efficient Fault-Tolerant Router Design for 2D-Mesh Based Chip Multiprocessor Systems

    Chip Multi-Processor (CMP) system is a popular design in recent years. CMP systems can perform high computation performance by operating multiple parallel processors at lower clock frequency, while still achieving the target throughput and performance. For the communication of CMP systems, On-Chip Networks (OCNs) have been proposed to overcome area...

    Provided By National Taiwan University

  • White Papers // Feb 2009

    Fault-Tolerant Router With Built-In Self-Test/self-Diagnosis and Fault-Isolation Circuits for 2D-Mesh Based Chip Multiprocessor Systems

    Chip Multi-Processor (CMP) system is a popular design in recent years. CMP systems can have high computation performance by operating multiple parallel processors at lower clock frequencies, while still achieving the target throughput and performance. For the communication of CMP systems, On-Chip Networks (OCNs) have been proposed to overcome area...

    Provided By National Taiwan University

  • White Papers // May 2010

    Buffer Depth Allocation for Thermal-Aware 3D Network-on-Chip Design

    In this paper, the authors proposed a buffer allocation algorithm to configure 3D NoC for the traffic and power migration of the thermal-aware designs. While the direct simulation is time-consuming, the proposed queuing model for 3D NoC router enables rapid detection of the performance-bottleneck layer, which buffers allocated to. With...

    Provided By National Taiwan University

  • White Papers // Aug 2011

    Design of Transport Layer Assisted Routing for Thermal-Aware 3D Network-on-Chip

    The thermal challenge of 3D Network-on-Chip (3DNoC) is severer than 2D NoC. To ensure thermal safety and avoid huge performance back-off from temperature constraint, Runtime Thermal Management (RTM) is required. However the regulation of temperature requires throttling of the near-overheated router, which makes the topology become Non-Stationary Irregular Mesh (NSI-mesh)....

    Provided By National Taiwan University

  • White Papers // Aug 2012

    Traffic- And Thermal-Balanced Adaptive Beltway Routing in Thermal Aware 3D NoC Systems

    The traffic and thermal problems of high performance Three-Dimensional Network-on-Chip (3D NoC) system become more unbalanced because of chip stacking and applied minimal routing algorithm. To make the temperature under a certain thermal limit, the overheat nodes are throttled by Run-time Thermal Management (RTM). Therefore, the network topology becomes a...

    Provided By National Taiwan University

  • White Papers // Aug 2012

    Cost-Effective Scalable QC-LDPC Decoder Designs for Non-Volatile Memory Systems

    Non-Volatile Memory Systems (NVMS) have been prevailed among many consumer electronic products, including mobile devices, computers, and the promising Solid-State Drives (SSDs). With the advanced manufacturing technology, the storage density of NVMS, particularly those consist of Multi-Level Cell (MLC) flash memories, grows fast since more bits are able to be...

    Provided By National Taiwan University

  • White Papers // Mar 2007

    A New Binomial Mapping and Optimization Algorithm for Reduced-Complexity Mesh-Based On-Chip Network

    With the increasing complexity of System-on-Chip (SoC) design, data exchange within chip is becoming more difficult. Traditional interconnection approaches cannot provide sufficient support for future giga-scale SoC design. On-Chip Network (OCN) is an approach to solve the incoming physical routing, flexibility, scalability, and reliability problems. OCN provides a possible and...

    Provided By National Taiwan University

  • White Papers // Jun 2012

    Path-Diversity-Aware Adaptive Routing in Network-on-Chip Systems

    The partially adaptive routing plays an important role in the performance of Network-on-Chip (NoC). It uses information of the network to select a better path to deliver a packet. However, it may have imbalanced path diversity in different directions, which makes their tolerances of traffic load differ a lot from...

    Provided By National Taiwan University

  • White Papers // Jul 2011

    Transport Layer Assisted Routing for Non-Stationary Irregular Mesh of Thermal-Aware 3D Network-on-Chip Systems

    Thermal issue is important for 3D Network-on-Chip (3DNoC) systems. To ensure thermal safety, run-time thermal management is required. However, the regulation of temperature requires throttling of the near-overheated router, which makes the topology become Non-Stationary Irregular mesh (NSI-mesh). To successfully deliver packet in NSI-mesh, the authors propose the Transport Layer...

    Provided By National Taiwan University

  • White Papers // Jul 2011

    Multi-Pheromone ACO-Based Routing in Network-on-Chip System Inspired by Economic Phenomenon

    Ant Colony Optimization (ACO) is a collective intelligence problem-solving paradigm. By ACO, the authors can effectively distribute the central control unit to achieve higher performance. With the scaling of Network-on-Chip (NoC) size, more complex communication problems can severely harm the system performance. Therefore, they need more efficient ACO-adaptive routing to...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Are All Games Equally Cloud-Gaming-Friendly? an Electromyographic Approach

    Cloud gaming now makes any computer game playable on a thin client without the previous worries and frustrations about the hardware requirements. It frees players from the need to frequently upgrade their computers as they can now play games that are hosted on remote servers with a broadband Internet connection...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Open Information Gateway for Disaster Management

    How to exchange information between parties in a mega-scale disaster management system is one of the fundamental challenges to support timely and efficient disaster response and relief. Specifically, the timeliness, scalability, and availability are three desirable features for information exchange. The authors call the framework to support information exchange with...

    Provided By National Taiwan University

  • White Papers // Jul 2012

    Sempre: Secure Multicast Architecture Using Proxy Re-Encryption

    In this paper, the authors propose a novel secure multicast architecture that reduces the impact of the 1 affects n problem significantly by exploiting a cryptographic primitive, "Proxy re-encryption". Therefore, they call the proposed secure multicast architecture Sempre (SEcure Multicast architecture using Proxy Re-Encryption). Proxy re-encryption allows intermediate routers to...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    MIMO Communications Based on Molecular Diffusion

    Diffusion-based communication refers to the transfer of information using molecules as message carriers whose propagation is based on the law of molecular diffusion. Path loss can have a major impact on the link quality in molecular communication as the signal strength is shown inversely proportional to the cube of the...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Markov Chain Performance Model for IEEE 802.11 Devices With Energy Harvesting Source

    Research on energy harvesting networks has attracted an increasing attention lately. Nevertheless, few research of energy harvesting network follows the IEEE 802.11 protocol, whose Medium Access Control (MAC) mechanism, called Distributed Coordination Function (DCF), is based on the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) algorithm and binary exponential...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    DeepSleep: IEEE 802.11 Enhancement for Energy-Harvesting Machine-to-Machine Communications

    As future M2M (Machine-To-Machine) communications aim at supporting wireless networks which feature long range, long operating duration and large device number, the IEEE 802.11ah Task Group is going to specify a global WLAN standard that utilizes carrier frequencies below 1GHz. To power the M2M devices, harvesting energy from ambient environment...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    A New Paradigm for Channel Coding in Diffusion-Based Molecular Communications: Molecular Coding Distance Function

    The emerging diffusion-based molecular communications is a promising scheme for nano-machine communications. Nevertheless, the Brownian motion model, which describes the behavior of molecules, makes the physical channel different from the channel in conventional wireless communications. In particular, the crossovers in time caused by the late arrivals of the molecules severely...

    Provided By National Taiwan University

  • White Papers // Nov 2012

    Optimal Detection for Diffusion-Based Communications in the Presence of ISI

    Communications based on diffusion refers to the transfer of information using molecules as message carriers whose propagation is governed by the laws of Brownian motion. Molecular communication is considered to be one of the most promising approaches for the end-to-end communication between nano-scale devices. In this paper, both an optimal...

    Provided By National Taiwan University

  • White Papers // Sep 2012

    Efficient Mutual Authentication and Key Agreement with User Anonymity for Roaming Services in Global Mobility Networks

    Global mobility networks provide effective global roaming services for personal communication users. Through the universal roaming technology, legitimate mobile users can enjoy the ubiquitous services. Mutual authentication and key agreement between mobile users and roaming servers is the primary security issue of many commercial mo-bile networks. In this paper, the...

    Provided By National Taiwan University

  • White Papers // Feb 2012

    Tame Pool-Based Pairwise Key Predistribution for Large-Scale Sensor Networks

    Due to resource constraints on sensor nodes, public key cryptography is not desirable to use in sensor networks. In this paper, the authors first develop a novel tame-based key predistribution approach, where they exploit tame automorphisms to get symmetric and two-one bivariate maps for the pair-wise key establishment. This tame-based...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Interoperability Between Visual UML Design Applications and Authoring Tools for Learning Design

    A learning design is the result of the description of a teaching-learning process. It implies the consideration of aspects such as the context in which teaching is being developed, the most suitable teaching method in this context, the necessary resources, the contents of the training activity, or the assessment criteria....

    Provided By National Taiwan University

  • White Papers // Jan 2012

    The Study on General Secure Multi-Party Computation

    This paper, pertaining to the design of a new security model with multiparty computation for security, aims to study the rational model and UC (universal composability) model as well as design a security protocol for the requirements of the models. The structures of secret sharing agreement, fair computation agreement, bit...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    A Scalable Routing for Delay-Tolerant Heterogeneous Networks

    In this paper, the authors propose a prediction-based routing protocol for heterogeneous delay tolerant networks, wherein edge servers are distributed over the borders of the different network domains. First, a location prediction algorithm based on user online logs is used to intelligently estimate the most probable future location of a...

    Provided By National Taiwan University

  • White Papers // Jan 2012

    Password Cracking Based on Special Keyboard Patterns

    Passwords are still the most commonly used mechanism for user authentication. This paper proposes an efficient and effective method to attack passwords generated from some special keyboard patterns. The authors create a framework to formally describe the commonly used keyboard patterns of adjacent keys and parallel keys, called AP patterns,...

    Provided By National Taiwan University

  • White Papers // Aug 2011

    Intelligent Resource Management Schemes for Heterogeneous Wireless Networks

    The integration of Wireless Metropolitan Area Network (WMAN) and Wireless Local Area Network (WLAN) technologies seems to be a feasible option for better and cheaper wireless coverage extension. WMAN/WLAN networks are still a challenging issue to be tackled. This paper thus incorporates a variant of the Particle Swarm Optimization (PSO)...

    Provided By National Taiwan University

  • White Papers // Jul 2011

    An Enhanced Password-Based User Authentication Scheme for Grid Computing

    Based upon Elliptic Curve Cryptosystem, a simple password user authentication scheme was proposed by Lu et al. for grid computing. In their scheme, Lu et al. not only kept the advantages of Yoon et al.'s scheme, but enhanced the efficiency of mutual authentication and at the same time avoided the...

    Provided By National Taiwan University

  • White Papers // Jun 2008

    Alternative Methods To Determine Optimal Capital Structure: Theory And Application

    In this paper, the authors review the most important and representative capital structure models. The capital structure models incorporate contingent claim valuation theory to quantitatively analyze prevailing determinants of capital structure in corporate finance literature. In capital structure models, the valuation of corporate securities and financial decisions are jointly determined....

    Provided By National Taiwan University

  • White Papers // Jan 2009

    ECM on Graphics Cards

    This paper reports record-setting performance for the elliptic-curve method of integer factorization: For example, 926.11 curves/second for ECM stage 1 with B1 = 8192 for 280-bit integers on a single PC. The state-of-the-art GMP-ECM software handles 124.71 curves/second for ECM stage 1 with B1 = 8192 for 280-bit integers using...

    Provided By National Taiwan University

  • White Papers // Dec 2009

    Secure Multidimensional Queries in Tiered Sensor Networks

    Tiered Sensor Networks. Sensor networks are expected to be deployed on some harsh or hostile regions for data collection or environment monitoring. Since there is the possibility of no stable connection between the authority and the network, in-network storage is necessary for caching or storing the data sensed by sensor...

    Provided By National Taiwan University

  • White Papers // Feb 2011

    Unsupervised Auxiliary Visual Words Discovery for Large-Scale Image Object

    Image object retrieval - locating image occurrences of specific objects in large-scale image collections - is essential for manipulating the sheer amount of photos. Current solutions, mostly based on bags-of-words model, suffer from low recall rate and do not resist noises caused by the changes in lighting, viewpoints, and even...

    Provided By National Taiwan University

  • White Papers // Jun 2009

    On Money, Social Status And Endogenous Growth

    Motivated by the substantial increase of nominal money supply in the U.S. economy since late 2008, this paper examines the equilibrium growth effect of money/inflation within a standard one-sector AK model of endogenous growth with wealth-enhanced preferences for social status and the most generalized cash-in-advance constraint. The authors show that...

    Provided By National Taiwan University

  • White Papers // Jun 2011

    Developing Collaborative Applications With Mobile Cloud - A Case Study of Speech Recognition

    While the combination of cloud computing and mobile computing, termed mobile cloud computing, started to show its effects recently with many seemingly innovative smartphone applications and cloud services surfacing to the market today, the authors believe that the real potentials of mobile cloud computing is far from been fully explored...

    Provided By National Taiwan University

  • White Papers // Dec 2008

    Practical Pairwise Key Establishment Schemes for Wireless Sensor Networks Via Constrained Random Perturbation

    A Wireless Sensor Network (WSN) is composed of a large number of sensor nodes with limited resources. Since WSNs could be deployed in a hostile environment, designing an efficient key establishment scheme is of great importance to the data security in WSNs. Unfortunately, when considering the extremely scarce resources available...

    Provided By National Taiwan University

  • White Papers // Feb 2010

    Behavior Profiling for Robust Anomaly Detection

    Internet attacks are evolving using evasion techniques such as polymorphism and stealth scanning. Conventional detection systems using signature-based and/or rule-based anomaly detection techniques no longer suffice. It is difficult to predict what form the next malware attack will take and these pose a great challenge to the design of a...

    Provided By National Taiwan University

  • White Papers // Jun 2010

    Cross-Level Behavioral Analysis for Robust Early Intrusion Detection

    The authors anticipate future attacks would evolve to become more sophisticated to outwit existing intrusion detection techniques. Existing anomaly analysis techniques and signature-based detection practices can no longer effective. They believe Intrusion Detection Systems (IDSs) of the future will need to be capable to detect or infer attacks based on...

    Provided By National Taiwan University

  • White Papers // Apr 2008

    Taxes And Foreign Investors? Trading Behavior Around Ex-Dividend Days

    Employing Taiwan data, this paper tests the tax hypothesis versus the short-term trading hypothesis by making a comparison in trading behavior between tax disadvantaged foreign investors and tax-neutral domestic institutions around ex-dividend days. The authors observe that not only do foreign investors abnormally buy more before the ex-date and sell...

    Provided By National Taiwan University

  • White Papers // Jun 2011

    Development and Testing of Integrated Bridge Disaster Prevention and Management Platform

    In recent years, global warming leads rainfall intensity stronger than before. Therefore, bridge management requires a reliable monitoring platform in current, to monitoring of bridge piers based on the variations of safety and river erosion, can be timely warming of the bridge damage, and achieving the maintenance of bridges safety...

    Provided By National Taiwan University