Search For:

Displaying 1-31 out of 31 total
A Novel Query Tree Protocol Based on Partial Responses for RFID Tag Anti-collision
Found in: 2013 International Conference on Parallel and Distributed Systems (ICPADS)
By Ming-Kuei Yeh,Jehn-Ruey Jiang
Issue Date:December 2013
pp. 617-622
In the RFID system, when two or more tags respond their IDs to the reader simultaneously, wireless signal collision occurs and no tag can be identified successfully by the reader. How to reduce such collisions in order to speed up the identification perfor...
 
Peer-to-Peer Immersive Voice Communication for Massively Multiplayer Online Games
Found in: Parallel and Distributed Systems, International Conference on
By Chi-Wen Fann,Jehn-Ruey Jiang,Jih-Wei Wu
Issue Date:December 2011
pp. 759-764
In this paper, we propose a peer-to-peer voice communication scheme, called immersive voice communication (IVC), to provide MMOG players with the immersive experience to hear the voice of neighbor players within the area of interest (AOI). IVC uses a relat...
 
User Satisfaction-Based Scheduling Algorithm for Uplink Transmission in Long Term Evolution System
Found in: 2012 IEEE 18th International Conference on Parallel and Distributed Systems (ICPADS)
By Jung-Shyr Wu,Shun-Fang Yang,Chia-Ming Hsu,Jiun-Yu Tu,Jehn-Ruey Jiang
Issue Date:December 2012
pp. 930-935
With low Peak-to-Average Power Ratio (PAPR), Single Carrier ¡V Frequency Division Multiple Access (SCFDMA) is adopted by 3GPP to be the uplink access method of the LTE system. SC-FDMA allocates continuous Resource Blocks (RBs) to each subscriber to reduce ...
 
SYMA: A Synchronous Multihop Architecture for Wireless Ad Hoc Multiplayer Games
Found in: Parallel and Distributed Systems, International Conference on
By Ta-Yu Huang,Chih-Ming Lin,Jehn-Ruey Jiang,Wei Tsang Ooi,Maha Abdallah,Khaled Boussetta
Issue Date:December 2011
pp. 793-798
In this paper, we propose a synchronous multihop architecture (SYMA) for wireless ad hoc multiplayer games. In SYMA, devices are assumed to have one-hop neighbor device information, as well as timers synchronized with good accuracy. A player, called game i...
 
Optimal Multipath Planning for Neyman-Pearson Detection in Wireless Sensor Networks
Found in: Parallel Processing Workshops, International Conference on
By Yung-Liang Lai,Jehn-Ruey Jiang
Issue Date:September 2011
pp. 57-62
Target detection is one of the most important services in wireless sensor networks (WSNs) for making decisions about the presence of specified targets by collecting sensed data from geographically distributed wireless sensors nodes. In this paper, we consi...
 
Parallel Response Query Tree Splitting for RFID Tag Anti-collision
Found in: Parallel Processing Workshops, International Conference on
By Ming-Kuei Yeh,Jehn-Ruey Jiang,Shing-Tsaan Huang
Issue Date:September 2011
pp. 6-15
In an RFID system, a tag can be identified by a reader when it moves into the interrogation zone of the reader. Collisions occur when tags using backscatter technology respond their IDs to the reader at the same carrier frequency simultaneously. The perfor...
 
Bandwidth- and Latency-Aware Peer-to-Peer Instant Friendcast for Online Social Networks
Found in: Parallel and Distributed Systems, International Conference on
By Jehn-Ruey Jiang, Chao-Wei Hung, Jih-Wei Wu
Issue Date:December 2010
pp. 829-834
Online Social Networks (OSNs) are more and more popular recently, people may through them interact with each other for the purpose of social intercourse. The client/server OSN architecture brings about the bottleneck of bandwidth and computation. It leads ...
 
Avatar Path Clustering in Networked Virtual Environments
Found in: Parallel and Distributed Systems, International Conference on
By Jehn-Ruey Jiang, Ching-Chuan Huang, Chung-Hsien Tsai
Issue Date:December 2010
pp. 845-850
With the increase of network bandwidth and the advance of 3D graphics technology, networked virtual environments (NVEs) have become popular recently. Early SIMNET and currently booming massively multiplayer online games (MMOGs), such as Second Life (SE) an...
 
Optimal Multipath Planning for Intrusion Detection in Smart Homes Using Wireless Sensor and Actor Networks
Found in: Parallel Processing Workshops, International Conference on
By Yung-Liang Lai, Jehn-Ruey Jiang
Issue Date:September 2010
pp. 562-570
Intrusion detection is one of the most important services in a smart home, which requires to monitor intrusion events and to react against them. A Wireless Sensor and Actor Network (WSAN) has a set of sensor nodes for monitoring events and a set of high ca...
 
Localization with Rotatable Directional Antennas for Wireless Sensor Networks
Found in: Parallel Processing Workshops, International Conference on
By Jehn-Ruey Jiang, Chih-Ming Lin, Yi-Jia Hsu
Issue Date:September 2010
pp. 542-548
In this paper we show the design and implementation of a novel localization scheme, called Rotatable Antenna Localization (RAL), for a wireless sensor network (WSN) with beacon nodes with directional antennas which rotate regularly. A beacon node periodica...
 
Group-Based Peer-to-Peer 3D Streaming Authentication
Found in: Parallel and Distributed Systems, International Conference on
By Mo-Che Chan, Jehn-Ruey Jiang, Chao-Wei Hung, Wei Tsang Ooi
Issue Date:December 2009
pp. 685-691
In this paper, we present an authentication scheme for group-based peer-to-peer 3D streaming that takes advantage of secure group communication to reduce computation overheads of authentication. Users of the same interest first form a group, and one of the...
 
Broadcasting with Optimized Transmission Efficiency in 3-Dimensional Wireless Networks
Found in: Parallel and Distributed Systems, International Conference on
By Yung-Liang Lai, Jehn-Ruey Jiang
Issue Date:December 2009
pp. 80-87
Broadcasting is one of the most important operations in the wireless network for disseminating information throughout the entire network. Flooding is a simple mechanism to realize broadcasting, but it has high redundancy of retransmissions, leading to low ...
 
Broadcasting with Optimized Transmission Efficiency in Wireless Networks
Found in: Wireless and Mobile Communications, International Conference on
By Yung-Liang Lai, Jehn-Ruey Jiang
Issue Date:August 2009
pp. 334-339
One of the fundamental operations in the wireless network is broadcasting, which is widely used to disseminate information throughout the network. Flooding is a simple method to realize broadcasting. However, flooding will incur a large number of redundant...
 
Peer-to-Peer 3D Streaming
Found in: IEEE Internet Computing
By Shun-Yun Hu, Jehn-Ruey Jiang, Bing-Yu Chen
Issue Date:March 2010
pp. 54-61
Virtual worlds have become very popular in recent years, with trends toward larger worlds and more user-generated content. The growth of 3D content in virtual worlds will make real-time content streaming (or 3D streaming) increasingly attractive for develo...
 
Optimal Path Planning for Fault-Tolerant and Energy-Efficient Target Surveillance in Wireless Sensor and Actor Networks
Found in: Mobile Data Management, IEEE International Conference on
By Yung-Liang Lai, Jehn-Ruey Jiang
Issue Date:May 2009
pp. 531-535
The Wireless Sensor and Actor Network (WSAN) is an extension of the wireless sensor network (WSN). Besides resource-limited sensor nodes, WSANs have resource-rich nodes, called actors, of higher capabilities to perform powerful actions. In this paper, we f...
 
Energy-Efficient and Traffic-Dispersive Event Contour Tracking in Multi-sink Wireless Sensor Networks
Found in: Asia-Pacific Conference on Services Computing. 2006 IEEE
By Jehn-Ruey Jiang, Jih-Wei Wu, Guan-Shien Du
Issue Date:December 2008
pp. 1120-1126
In this paper, we propose a distributed event contour tracking (DECT) algorithm for multi-sink wireless sensor networks. We focus on the convex-shaped area event, which has a large effect region and may trigger many sensors at the same time. An area event ...
 
Delaunay State Management for Large-Scale Networked Virtual Environments
Found in: Parallel and Distributed Systems, International Conference on
By Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang
Issue Date:December 2008
pp. 781-786
Peer-to-Peer (P2P) networks have been proposed as one promising approach to provide better scalability for Networked Virtual Environment (NVE) systems, but P2P-NVE also increases the probability of cheating by allowing users to manage the states of objects...
 
Plug: Virtual Worlds for Millions of People
Found in: Parallel and Distributed Systems, International Conference on
By Shun-Yun Hu, Jehn-Ruey Jiang
Issue Date:December 2008
pp. 787-792
We propose the design of Plug, an application to find and keep contacts with friends within many inter-connected 3D virtual worlds. Users use an instant messenger (IM)-like interface to converse with friends and find new contacts, using a virtual represent...
 
Maintaining Connected Coverage for Wireless Sensor Networks
Found in: Distributed Computing Systems Workshops, International Conference on
By Jehn-Ruey Jiang, Tzu-Ming Sung
Issue Date:June 2008
pp. 297-302
In this paper, we propose a density control algorithm for wireless sensor networks to keep as few as possible sensors in active state to achieve a connected coverage of a specific area of interest. Inactive sensors can turn off sensing modules to save ener...
 
Scalable AOI-Cast for Peer-to-Peer Networked Virtual Environments
Found in: Distributed Computing Systems Workshops, International Conference on
By Jehn-Ruey Jiang, Yu-Li Huang, Shun-Yun Hu
Issue Date:June 2008
pp. 447-452
Networked virtual environments (NVEs) are computer-generated virtual worlds where users interact by exchanging messages via network connections. Each NVE user often pays attention to only a limited visibility sphere called area of interest (AOI) where inte...
 
Message from P2P-NVE Program Chair
Found in: Parallel and Distributed Systems, International Conference on
By Jehn-Ruey Jiang
Issue Date:December 2007
pp. 1
No summary available.
   
Peer-to-Peer AOI voice chatting for massively multiplayer online games
Found in: Parallel and Distributed Systems, International Conference on
By Jehn-Ruey Jiang, Hung-Shiang Chen
Issue Date:December 2007
pp. 1-8
In recent years, massively multiplayer online games (MMOGs) have become more and more popular. Many techniques have been proposed to enhance the experience of using MMOGs, such as realistic graphics, vivid animations, and player communication tools, etc. H...
 
Enhancing Neighborship Consistency for Peer-to-Peer Distributed Virtual Environments
Found in: Distributed Computing Systems Workshops, International Conference on
By Jehn-Ruey Jiang, Jiun-Shiang Chiou, Shun-Yun Hu
Issue Date:June 2007
pp. 71
Although P2P-based DVEs can potentially solve the scalability issues, other important issues such as consistency remain unexplored. In this paper, we address neighborship consistency, which is the ratio between the number of known nodes and the number of a...
 
On the Nondomination of Cohorts Coteries
Found in: IEEE Transactions on Computers
By Jehn-Ruey Jiang
Issue Date:July 2004
pp. 922-923
<p><b>Abstract</b>—In this paper, we show that subsets of <it>Cohorts coteries</it> proposed in [CHECK END OF SENTENCE] are <it>nondominated (ND) k</it>-coteries, which are candidates to achieve the highest availab...
 
Constructing Nondominated Local Coteries for Distributed Resource Allocation
Found in: Parallel Processing Workshops, International Conference on
By Jehn-Ruey Jiang, Cheng-Sheng Chou, Shing-Tsaan Huang
Issue Date:October 2003
pp. 123
The resource allocation problem is a fundamental problem in distributed systems. In this paper, we focus on constructing nondominated (ND) local coteries to solve the problem. Distributed algorithms using coteries usually incur low communication overhead a...
 
Quorum-Based Asynchronous Power-Saving Protocols for IEEE 802.11 Ad Hoc Networks
Found in: Parallel Processing, International Conference on
By Jehn-Ruey Jiang, Yu-Chee Tseng, Chih-Shun Hsu, Ten-Hwang Lai
Issue Date:October 2003
pp. 257
This paper investigates the power mode management problem for an IEEE 802.11-based mobile ad hoc network (MANET) that allows mobile hosts to tune to the power-saving (PS) mode. We adopt an asynchronous approach proposed in [26] and correlate this problem t...
 
Secure Bootstrapping and Routing in an IPv6-Based Ad Hoc Network
Found in: Parallel Processing Workshops, International Conference on
By Yu-Chee Tseng, Jehn-Ruey Jiang, Jih-Hsin Lee
Issue Date:October 2003
pp. 375
The mobile ad hoc network (MANET), which is characterized by an infrastructureless architecture and multi-hop communication, has attracted a lot of attention recently. In the evolution of IP networks to version 6, adopting the same protocol would guarantee...
 
Cohorts Structures for Fault-Tolerant k Entries to a Critical Section
Found in: IEEE Transactions on Computers
By Jehn-Ruey Jiang, Shing-Tsaan Huang, Yu-Chen Kuo
Issue Date:February 1997
pp. 222-228
<p><b>Abstract</b>—We propose a structure named <it>Cohorts</it> to solve the problem of the access control of multiple entries to a critical section. Our solution is formalized as forming quorums in a <it>k</it>-c...
 
A Distributed h-out of -k Mutual Exclusion Algorithm for Ad Hoc Mobile Networks
Found in: Parallel and Distributed Processing Symposium, International
By Jehn-Ruey Jiang
Issue Date:April 2002
pp. 0196b
In this paper, we propose a distributed algorithm for solving the h-out of-k mutual exclusion problem for ad hoc mobile networks. The h-out of-k mutual exclusion problem is also known as the h-out of-k resource allocation problem. It concerns with how to c...
 
Mobile robot coordination and navigation with directional antennas in positionless wireless sensor networks
Found in: Proceedings of the International Conference on Mobile Technology, Applications, and Systems (Mobility '08)
By Fu-Cheng Deng, Jehn-Ruey Jiang, Yung-Liang Lai
Issue Date:September 2008
pp. 1-21
In this paper, we propose a suite of three schemes for mobile robot coordination and navigation in positionless wireless sensor networks with the help of directional antennas. When a specific node, called waiting-for-rescue (WFR) node, detects the occurren...
     
Selection strategies for peer-to-peer 3D streaming
Found in: Proceedings of the 18th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV '08)
By Jehn-Ruey Jiang, Shun-Yun Hu, Wei-Lun Sung
Issue Date:May 2008
pp. 1-21
In multi-user networked virtual environments such as Second Life, 3D streaming techniques have been used to progressively download and render 3D objects and terrain, so that a full download or prior installation is not necessary. As existing client-server ...
     
 1