Search For:

Displaying 1-21 out of 21 total
Multiple Objectives Optimization Problems in Supply Chain Management under Dynamic and Stochastic Circumstance
Found in: Business and Information Management, International Seminar on
By Huan Xu, Wei Liu, Huan Chen
Issue Date:December 2008
pp. 339-342
The supply chain nowadays is more dynamic than before partly due to the information techniques and changes of consumer behaviors. This proposal analyzes the multiple objective optimization problems existing in the supply chain management, and the stochasti...
 
A Multi-level Fuzzy Comprehensive Evaluation Approach for Message Verification in VANETs
Found in: 2012 Third FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing (MUSIC)
By Bo-Chao Cheng,Guo-Tan Liao,Chun-Yu Chen,Huan Chen
Issue Date:June 2012
pp. 176-181
Vehicular ad-hoc networks (VANETs) are a promising new research area with the potential to revolutionize intelligent transportation systems (ITS) in the near future. Equipping vehicles with computers and wireless communication devices, VANETs have led to n...
 
GreenSensing: A Fine Grained Power Monitoring System for a Network of Computers
Found in: 2013 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS)
By Yao-Chung Fan,Huan Chen
Issue Date:May 2013
pp. 295-297
Recent studies have shown the necessity of fine grained power usage visibility to encourage user behavior energy conservation. Existing works toward this direction are mainly focused on residential monitoring scenarios. This study considers another importa...
 
A Distortion-Aware Intelligent Context Aggregation Agent for Smart Environments
Found in: IEEE Intelligent Systems
By Huan Chen, Chih-Chuan Cheng
Issue Date:May 2011
pp. 42-49
<p>The proposed intelligent context-aggregation agent (ICAA) can adapt to environmental contexts and effectively suppress transmission redundancies, increasing energy effectiveness and prolonging a network's lifetime.</p>
 
A Theoretical Security Model for Access Control and Security Assurance
Found in: Information Assurance and Security, International Symposium on
By Bo-Chao Cheng, Huan Chen, Ryh-Yuh Tseng
Issue Date:August 2007
pp. 137-142
Advanced hacker techniques make the effective defense at the network security perimeters impossible. Many security solutions are proposed by researchers and practitioners in recent years, most of them focus on how to enhance the functionality and capabilit...
 
Energy Residue Aware (ERA) Clustering Algorithm for Leach-based Wireless Sensor Networks
Found in: Systems and Networks Communication, International Conference on
By Huan Chen, Cheng-Shong Wu, Yuan-Sun Chu, Chih-Chuan Cheng, Li-Kuang Tsai
Issue Date:August 2007
pp. 40
Many energy efficient routing protocols have been proposed in sensor networks for different scenarios and various applications in literature. One of the efficient way is to group sensors in the neighboring into clusters and send aggregate data by a designa...
 
Smart Home Sensor Networks Pose Goal-Driven Solutions to Wireless Vacuum Systems
Found in: Hybrid Information Technology, International Conference on
By Huan Chen, Bo-Chao Cheng, Chih-Chuan Cheng, Li-Kuang Tsai
Issue Date:November 2006
pp. 364-373
Home sensor nodes are devices embedded in home appliances and are designed to sense environments, to process collected information, to perform a specific task, and to cooperate with other units. The advances of VLSI technologies and wireless sensor network...
 
Context-Aware Gateway for Ubiquitous SIP-Based Services in Smart Homes
Found in: Hybrid Information Technology, International Conference on
By Bo-Chao Cheng, Huan Chen, Ryh-Yuh Tseng
Issue Date:November 2006
pp. 374-381
The smart home concept brings innovation and convenience to our every day's life style at home. Without context awareness, smart home applications cannot offer services that can adapt to users? dynamic situations; they also fail to give preferential treatm...
 
LocalSense: An Infrastructure-Mediated Sensing Method for Locating Appliance Usage Events in Homes
Found in: 2013 International Conference on Parallel and Distributed Systems (ICPADS)
By Hung-Yuan Chen,Chien-Liang Lai,Huan Chen,Lun-Chia Kuo,Hsi-Chuan Chen,Jyh-Shyan Lin,Yao-Chung Fan
Issue Date:December 2013
pp. 587-592
In this paper, we introduce a novel technique called Local Sense for detecting appliance usage events in a household by leveraging existing home power infrastructure. Specifically, the Local Sense technique works by purely analyzing the records taken from ...
 
Data Aggregation and Routing in Wireless Sensor Networks Using Improved Ant Colony Algorithm
Found in: Computer Science-Technology and Applications, International Forum on
By Wang Jinghua, He Huan, Chen Bo, Chen Yuanyuan, Guan Tingting
Issue Date:December 2009
pp. 215-218
A wireless sensor network consists of a large number of sensor nodes scattered in the region of the network which have limited energy and limited computational and sensing ability. Data aggregation is important in this kind of network which can make use of...
 
A Resource-based Reputation Rating Mechanism for Peer-to-Peer Networks
Found in: Grid and Cloud Computing, International Conference on
By Huan Chen, Guihai Chen
Issue Date:August 2007
pp. 535-541
As various kinds of peer-to-peer (P2P) applications become popular and widely known to people all around the world, research on P2P networks has received considerable interest. Recent studies show that various problems like free-riding and content pollutio...
 
The Pharmacokinetics Study of Gossypol-acetate Enantiomers in Rat
Found in: Biomedical Engineering and Biotechnology, International Conference on
By Huan Chen,Hui Tang,Xue Ying,Xudong Wu,Manjing Jia
Issue Date:May 2012
pp. 607-611
To establish a sensitive HPLC method for determination of gossypol-acetate (GA) enantiomers in rat plasma. The study involved administration of oral and intravenous to rats. Plasma samples were collected before and during the predetermined time intervals f...
 
QBf-based boolean function bi-decomposition
Found in: 2012 Design, Automation & Test in Europe Conference & Exhibition (DATE 2012)
By Huan Chen,M. Janota,J. Marques-Silva
Issue Date:March 2012
pp. 816-819
Boolean function bi-decomposition is ubiquitous in logic synthesis. It entails the decomposition of a Boolean function using two-input simple logic gates. Existing solutions for bi-decomposition are often based on BDDs and, more recently, on Boolean Satisf...
 
Vector Polygon Blind Watermarking Based on Canonical Correlation Analysis
Found in: Multimedia Information Networking and Security, International Conference on
By Guangling Sun, Zhoubiao Shen, Huan Chen
Issue Date:November 2009
pp. 544-548
A vector polygon blind watermarking algorithm based on canonical correlation analysis (CCA) is proposed for protecting the copyright of vector polygon. In embedding, vertices of a polygon are separated into two groups according to odd-even properties of th...
 
A Framework and Language Support for Automatic Dynamic Testing of Workflow Management Systems
Found in: Theoretical Aspects of Software Engineering, Joint IEEE/IFIP Symposium on
By Gwan-Hwan Hwang, Che-Sheng Lin, Li-Te Tsao, Kuei-Huan Chen, Yan-You Li
Issue Date:July 2009
pp. 139-146
We propose a framework for the automatic dynamic testing of workflow management systems (WfMSs). We first classify faults that can occur during the execution of a WfMS and then describe a systematic testing scheme that provides the following advantages. Fi...
 
Semiformal Verification of Embedded Software in Medical Devices Considering Stringent Hardware Constraints
Found in: Embedded Software and Systems, Second International Conference on
By Lucas Cordeiro, Bernd Fischer, Huan Chen, Joao Marques-Silva
Issue Date:May 2009
pp. 396-403
In recent days, the complexity of software has increased significantly in embedded products in such a way that the verification of Embedded Software (ESW) now plays an important role to ensure the product's quality. Embedded systems engineers usually face ...
 
Planning Locative Media within Physical Space and Collaborative Workspace
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Rung-Huei Liang, Yin-Huan Chen
Issue Date:December 2008
pp. 863-868
As internet technology develops, we transfer more and more physical activities into cyberspace. On the other hand, mobile technology frees the location of cyberspace participants, and therefore, the situation and context of an avatar come back to the physi...
 
United-FS: A Logical File System Providing a Single Image of Multiple Physical File Systems on NFS Server
Found in: Parallel and Distributed Processing Symposium, International
By Huan Chen, Yi Zhao, Jin Xiong, Jie Ma, Ninghui Sun
Issue Date:March 2007
pp. 368
NFS is considered to be the bottleneck in cluster computing environment because of its limited resources and centralized data management. With the development of hardware, NFS server has more than one I/O channel, more storage space and more powerful CPU. ...
 
Research on Key Technologies of Load Balancing for NFS Server with Multiple Network Paths
Found in: Grid and Cooperative Computing Workshops, International Conference on
By Huan Chen, Rongfeng Tang, Yi Zhao, Jin Xiong, Jie Ma, Ninghui Sun
Issue Date:October 2006
pp. 407-411
NFS server is designed to run on a single node. Even if NFS server is configured with multiple network interfaces, each client can only access NFS server through one network interface of the server. In this paper, we design and implement the Multi-path loa...
 
An Energy and Load-Based Routing Algorithm in Wireless Sensor Network
Found in: Computational Intelligence and Design, International Symposium on
By Wang Jinghua, Guan Tingting, He Huan, Chen Yuanyuan
Issue Date:December 2009
pp. 284-287
In wireless sensor networks, limiting energy consumption of sensors and prolonging the network lifetime have been important reasons to evaluate routing protocol’s performance. This paper proposes a routing metric, which takes into remaining energy and load...
 
Map search via a factor graph model
Found in: Proceedings of the 22nd ACM international conference on Conference on information & knowledge management (CIKM '13)
By Huan Chen, Qi Zhang, Xuanjing Huang, Yaqian Zhou, Yeyun Gong, Jihua Kang
Issue Date:October 2013
pp. 69-78
Map search has received considerable attention in recent years. With map search, users can specify target locations with textual queries. However, these queries do not always include well-formed addresses or place names. They may contain transpositions, mi...
     
 1