Search For:

Displaying 1-50 out of 63 total
A Novel Dynamic Multiple Rings-Based Local Restoration for One-to-Multipoint Multicast Traffic in WDM Mesh Networks
Found in: International Conference on Networking
By I-Shyan Hwang, Ren-Yuan Cheng, Zen-Der Shyu
Issue Date:April 2007
pp. 80
A novel ring-based local fault recovery mechanism, Multiple Rings-based Local Restoration (MRLR), for one-point to multi-point multicast traffic based on the minimum spanning tree (MST) in WDM mesh networks is proposed in this paper. The MRLR mechanism dis...
Building Long-Distance Health Care Network Using Minimized Portable Sensors and Active Alert System
Found in: 2013 16th International Conference on Network-Based Information Systems (NBiS)
By Chun-Che Shih, Kuang-Yi Chou, Huan-Chao Keh, Yuan-Cheng Cheng, Po-Yuan Yu, Nan-Ching Huang
Issue Date:September 2013
pp. 401-404
The accelerated aging population around the world will be more obvious. In the USA, there will be about 72 million people aged 65 by 2030, There will have nearly 36.98% of the elderly population in Taiwan until 2050. Those people will need health care too....
Using Decision Tree to Analyze Patient of Aortic Aneurysm with Chronic Diseases in Clinical Application
Found in: 2013 16th International Conference on Network-Based Information Systems (NBiS)
By Kuang-Yi Chou, Chun-Che Shih, Huan-Chao Keh, Po-Yuan Yu, Yuan-Cheng Cheng, Nan-Ching Huang
Issue Date:September 2013
pp. 405-409
Aortic aneurysm is caused by sclerosis of aortic wall. However, bad habits and chronic disease would be caused sclerosis of aortic wall. Therefore, bad habits and chronic diseases would possible affect aortic aneurysm, even after surgery. In this study, we...
A Research of Applying Cognitive Load Theory to Science Education Webpage
Found in: 2012 IEEE 12th International Conference on Advanced Learning Technologies (ICALT)
By Chia-Ju Liu,Yuan-Cheng Lin,Bao-Yuan Liu,Yu-Yi Chang
Issue Date:July 2012
pp. 77-79
This study employed three units, ¡§Air and Combustion¡¨, ¡§Heat Effects toward Substances¡¨, and ¡§Healthy Diet¡¨, from the Science Education Website set by the Ministry of Education (Tainan) to assist students¡¦ learning. This multifunctional website offe...
A Novel Man-Machine Cooperative Intelligent Reduction Algorithm
Found in: Information and Computing Science, International Conference on
By Junpeng Yuan, Cheng Su, Jie Su
Issue Date:May 2009
pp. 281-284
Although the rough set theory can be deal with uncertain and incomplete knowledge with knowledge reasoning, but for complex systems and some new technology fields, simply rely on the machines learning, the results is not reliable. Absorb the expert knowled...
A Framework for Amazon EC2 Bidding Strategy under SLA Constraints
Found in: IEEE Transactions on Parallel and Distributed Systems
By Shaojie Tang,Jing Yuan,Cheng Wang,Xiang-Yang Li
Issue Date:January 2014
pp. 2-11
With the recent introduction of Spot Instances in the Amazon Elastic Compute Cloud (EC2), users can bid for resources and, thus, control the balance of reliability versus monetary costs. Mechanisms and tools that deal with the cost-reliability tradeoffs un...
Test Coverage Optimization for Large Code Problems
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Ying-Dar Lin,Chi-Heng Chou,Yuan-Cheng Lai,Tse-Yau Huang,Simon Chung,Jui-Tsun Hung,Frank C. Lin
Issue Date:March 2012
pp. 215-220
Because running all previous tests for the regression testing of a system is time-consuming, the size of a test suite of the system must be reduced intelligently with adequate test coverage and without compromising its fault detection capability. Five algo...
On the Accuracy, Efficiency, and Reusability of Automated Test Oracles for Android Devices
Found in: IEEE Transactions on Software Engineering
By Ying-Dar Lin,Jose F. Rojas,Edward T.-H. Chu,Yuan-Cheng Lai
Issue Date:October 2014
pp. 1-1
Automated GUI testing consists of simulating user events and validating the changes in the GUI in order to determine if an Android application meets specifications. Traditional record-replay testing tools mainly focus on facilitating the test case writing ...
Improving the Accuracy of Automated GUI Testing for Embedded Systems
Found in: IEEE Software
By Ying-Dar Lin,Edward T.-H. Chu,Shang-Che Yu,Yuan-Cheng Lai
Issue Date:January 2014
pp. 39-45
Automated GUIs test application user interfaces and verify their functionalities. However, due to the uncertainty of runtime execution environments, the device under test (DUT) might not reproduce GUI operations on time, resulting in test failures. The Sma...
A Novel Query Tree Protocol with Bit Tracking in RFID Tag Identification
Found in: IEEE Transactions on Mobile Computing
By Yuan-Cheng Lai,Ling-Yen Hsiao,Hong-Jie Chen,Ching-Neng Lai,Jian-Wei Lin
Issue Date:October 2013
pp. 2063-2075
Tag anticollision has long been an important issue in RFID systems. To accelerate tag identification, some researchers have recently adopted bit tracking technology that allows the reader to detect the locations of collided bits in a collision slot. Howeve...
Research of Ontology and Semantic Web Apply for Building Information Model
Found in: 2013 IEEE 10th International Conference on e-Business Engineering (ICEBE)
By Ding-Yuan Cheng, Tzu-Chin Chao, Chi-Chun Lo, Chi-Hua Chen
Issue Date:September 2013
pp. 358-363
Building Information Modeling (BIM) and Industry Foundation Classes (IFC) data model are used widely in construction to increase communication and team efficiencies while working toward a building construction management. This research presents a semantic ...
In-Kernel Relay for Scalable One-to-Many Streaming
Found in: IEEE MultiMedia
By Ying-Dar Lin,Chia-Yu Ku,Yuan-Cheng Lai,Chia-Fon Hung
Issue Date:January 2013
pp. 69-79
The in-kernel One-to-Many Streaming Splicing (OMSS) relay method can help improve the relay data paths of critical nodes to reduce computing power for UDP and TCP streams and enhance the subscriber capacity.
Two Couple-Resolution Blocking Protocols on Adaptive Query Splitting for RFID Tag Identification
Found in: IEEE Transactions on Mobile Computing
By Yuan-Cheng Lai,Chih-Chung Lin
Issue Date:October 2012
pp. 1450-1463
How to accelerate tag identification is an important issue in Radio Frequency Identification (RFID) systems. In some cases, the RFID reader repeatedly identifies the same tags since these tags always stay in its communication range. An anticollision protoc...
Credit Risk Measurement on Customers of B2B Market
Found in: 2012 International Conference on Business Computing and Global Informatization (BCGIN)
By Jun Yuan,Cheng Yang
Issue Date:October 2012
pp. 83-86
By selecting customers' credit risk indicators of the domestic textile industry on the electronic trading market in China and using factor analysis method, clustering method, and ordered-logit model, it can be concluded that the comprehensive evaluation of...
F-VT: A Friendly Virtualization Framework
Found in: 2012 IEEE 9th Int'l Conference on Ubiquitous Intelligence & Computing / 9th Int'l Conference on Autonomic & Trusted Computing (UIC/ATC)
By Yuan-Cheng Lee,Tang-Hsun Tu,Chih-Wen Hsueh
Issue Date:September 2012
pp. 845-850
Recently, virtualization attracts a lot of attention from server-side and client-side applications, even on embedded systems. Virtualization is adopted on client-side machines to enhance both user experience and collaboration with cloud servers. The charac...
A Channel Quality Aware Algorithm for IEEE 802.16 Uplink Burst Construction
Found in: Advanced Information Networking and Applications, International Conference on
By Yuan-Cheng Lai,Yen-Hung Chen,Ching-Neng Lai
Issue Date:March 2012
pp. 207-214
Many burst construction algorithms for Orthogonal Frequency Division Multiple Access (OFDMA) were proposed. However, these algorithms do not meet the uplink burst characteristics specified in the IEEE 802.16 standard. This paper therefore proposes the Best...
Session Level Flow Classification by Packet Size Distribution and Session Grouping
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Chun-Nan Lu,Ying-Dar Lin,Chun-Ying Huang,Yuan-Cheng Lai
Issue Date:March 2012
pp. 221-226
Classifying traffic into specific network applications is essential for application-aware network management and it becomes more challenging because modern applications obscure their network behaviors. While port number-based classifiers work only for some...
Automatic identification of Frankfurt plane and mid-sagittal plane of skull
Found in: Applications of Computer Vision, IEEE Workshop on
By Yuan Cheng, Wee Kheng Leow, Thiam Chye Lim
Issue Date:January 2012
pp. 233-238
Automatic identification of the Frankfurt plane (FP) and mid-sagittal plane (MSP) of a human skull is a very important task. These planes are used to define important landmarks on the skull for surgery planning and guidance, forensic reconstruction, and an...
A Novel Energy-Efficient Routing Algorithm in Multi-sink Wireless Sensor Networks
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Zhiwu Huang,Yuan Cheng,Weirong Liu
Issue Date:November 2011
pp. 1646-1651
In wireless sensor networks, node energy resources are so limited that how to reduce energy consumption and prolong network lifetime become the primary factor that should be taken into account for the design of wireless sensor network routing protocols. In...
Improving dual V
Found in: Computer-Aided Design, International Conference on
By Junjun Gu,Gang Qu,Lin Yuan,Cheng Zhuo
Issue Date:November 2011
pp. 732-735
Process-induced mechanical stress is used to enhance carrier mobility and drive current in contemporary CMOS technologies. Stressed cells have reduced delay but larger leakage consumption. Its efficient power/delay trading ratio makes mechanical stress an ...
ACON: Activity-Centric Access Control for Social Computing
Found in: Availability, Reliability and Security, International Conference on
By Jaehong Park,Ravi Sandhu,Yuan Cheng
Issue Date:August 2011
pp. 242-247
With increasing amount of sensitive user data stored in social computing systems (SCSs) and lack of consensus on how it should be protected under meaningful control by the average user, security and privacy has become a pressing problem that must be addres...
Inline Emulation for Paravirtualization Environment on Embedded Systems
Found in: Real-Time Computing Systems and Applications, International Workshop on
By Yuan-Cheng Lee,Chih-Wen Hsueh,Rong-Guey Chang
Issue Date:August 2011
pp. 388-392
Virtualization has been widely adopted on servers for various purposes such as server consolidation, cloud computing, and so on. Recent years, the trend spreads on embedded systems, although it once seemed to be an impractical idea because of the limited c...
A User-Activity-Centric Framework for Access Control in Online Social Networks
Found in: IEEE Internet Computing
By Jaehong Park,Ravi Sandhu,Yuan Cheng
Issue Date:September 2011
pp. 62-65
Today's ever-evolving online social networks (OSNs) need an effective and usable access control framework. OSN users typically have discretionary control over their content, relationships, and interactions, while the OSN's policies consolidate these indivi...
A New Data Clustering Algorithm
Found in: International Conference on Internet Computing in Science and Engineering
By Yuan Cheng,Shaobin Huang,Tianyang Lv,Guofeng Liu
Issue Date:November 2010
pp. 106-111
Induction is a logical method to understand things, however, induction often can't sufficient reflect the necessity and the regularity of things, so it needs to be complemented by deduction. The traditional clustering algorithms add the categories based on...
Hierarchical Data Management for Spatial-Temporal Information in WSNs
Found in: Sensor Technologies and Applications, International Conference on
By Kai-Chao Yang, Yuan-Cheng Yang, Chun-Lung Lin, Jia-Shung Wang
Issue Date:July 2010
pp. 435-440
Wireless sensor networks (WSNs) comprise a large number sensor devices with limited power and resource. One of the key design challenges in the sensor networks is to efficiently utilize limited local storage capacity at individual sensor nodes to store his...
Correcting over-exposure in photographs
Found in: Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
By Dong Guo, Yuan Cheng, Shaojie Zhuo, Terence Sim
Issue Date:June 2010
pp. 515-521
This paper introduces a method to correct over-exposure in an existing photograph by recovering the color and lightness separately. First, the dynamic range of well exposed region is slightly compressed to make room for the recovered lightness of the over-...
P-GAS: Parallelizing a Cycle-Accurate Event-Driven Many-Core Processor Simulator Using Parallel Discrete Event Simulation
Found in: Parallel and Distributed Simulation, Workshop on
By Huiwei Lv, Yuan Cheng, Lu Bai, Mingyu Chen, Dongrui Fan, Ninghui Sun
Issue Date:May 2010
pp. 1-8
Multi-core processors are commonly available now, but most traditional computer architectural simulators still use single-thread execution. In this paper we use parallel discrete event simulation (PDES) to speedup a cycle-accurate event-driven many-core pr...
A Hybrid Algorithm of Backward Hashing and Automaton Tracking for Virus Scanning
Found in: IEEE Transactions on Computers
By Po-Ching Lin, Ying-Dar Lin, Yuan-Cheng Lai
Issue Date:April 2011
pp. 594-601
Virus scanning involves computationally intensive string matching against a large number of signatures of different characteristics. Matching a variety of signatures challenges the selection of matching algorithms, as each approach has better performance t...
Hardware-Software Codesign for High-Speed Signature-based Virus Scanning
Found in: IEEE Micro
By Ying-Dar Lin, Po-Ching Lin, Yuan-Cheng Lai, Tai-Ying Liu
Issue Date:September 2009
pp. 56-65
<p>High-speed network content security applications often offload signature matching to hardware. In such systems, the throughput of the overall system, rather than the hardware engine alone, is significant. The authors offload virus scanning in the ...
An Evolutionary Fuzzy Behaviour Controller Using Genetic Algorithm in RoboCup Soccer Game
Found in: Hybrid Intelligent Systems, International Conference on
By Jong-Yih Kuo, Yuan Cheng Ou
Issue Date:August 2009
pp. 281-286
The problem of an effective behavior learning of autonomous robots is one of the most important tasks of the modern robotics. In fact, it is well known that the learning to optimize actions of autonomous agents in a dynamic environment is one of the most c...
Sleep Scheduling That Minimizes State Transitions for IEEE 802.16e Mobile Subscriber Stations
Found in: New Trends in Information and Service Science, International Conference on
By Li-Hsing Yen, Chih-Yuan Cheng, Chun-Hsin Wang
Issue Date:July 2009
pp. 1341-1346
IEEE 802.16e devices may enter sleep mode to conserve energy. There has been some work studying how to schedule device's packet transmissions to maximize the device's sleep period while meeting associated QoS (quality of service) requirements. This paper p...
Research on developing healthy-life map guiding system
Found in: International Conference on Services Systems and Services Management
By Chi-Chun Lo, Chi-Hua Chen, Hsiang-Ting Kao, Chih-Chien Lu, Ding-Yuan Cheng
Issue Date:June 2009
pp. 746-751
Healthy-Life tourism services are the trend of the future. In this paper, we propose an effective decision support systems (DSS), the Healthy-Life Map Guiding System (HMGS), which provides the introduction and commentaries of Healthy-Life scenic spots with...
Designing and Implementing an IEEE 802.16 Network Simulator for Performance Evaluation of Bandwidth Allocation Algorithms
Found in: High Performance Computing and Communications, 10th IEEE International Conference on
By Yuan-Cheng Lai, Yen-Hung Chen
Issue Date:June 2009
pp. 432-437
IEEE 802.16 technology is a promising technology to solve the last mile problem by its wireless, long distance, and high-bandwidth transmission. However, there isn't any suitable simulator to evaluate the performance between different IEEE 802.16 bandwidth...
An multiuser Undo/Redo method for replicated collaborative modeling systems
Found in: International Conference on Computer Supported Cooperative Work in Design
By Yuan Cheng, Fazhi He, Shuxu Jing, Zhiyong Huang
Issue Date:April 2009
pp. 185-190
Undo/Redo can help rolling the whole system back to some previous state. However, many group Undo/Redo researches are based on co-edit system of text object. This paper firstly addresses the Undo/Redo in 3D collaborative solid modeling system. After analys...
A Semantic Web Methodology for Situation-Aware Curative Food Service Recommendation System
Found in: Computer Science and Software Engineering, International Conference on
By Chi-Chun Lo,Ding-Yuan Cheng,Chi-Hua Chen
Issue Date:December 2008
pp. 444-447
Recently curative food is becoming more popular, as more people realize its benefits. Based on the theory of Chinese medicine, food itself is medicine. The Curative food which is an ideal nutritious food can help to loss weight, increase immunity and is al...
Using String Matching for Deep Packet Inspection
Found in: Computer
By Po-Ching Lin, Ying-Dar Lin, Yuan-Cheng Lai, Tsern-Huei Lee
Issue Date:April 2008
pp. 23-28
String matching has sparked renewed research interest due to its usefulness for deep packet inspection in applications such as intrusion detection, virus scanning, and Internet content filtering. Matching expressive pattern specifications with a scalable a...
Multiple-Resource Request Scheduling for Differentiated QoS at Website Gateway
Found in: Advanced Information Networking and Applications, International Conference on
By Ying-Dar Lin, Ching-Ming Tien, Shih-Chiang Tsao, Ruo-Hua Feng, Yuan-Cheng Lai
Issue Date:March 2008
pp. 433-440
Differentiated quality of service is a way for a website operator to provide different service levels to its clients. Traditional HTTP request scheduling schemes can achieve this, but they schedule requests to manage only one server resource, such as CPU o...
A Study on Representation of QoS in UDDI for Web Services Composition
Found in: Complex, Intelligent and Software Intensive Systems, International Conference
By Chi-Chun Lo, Ding-Yuan Cheng, Ping-Chi Lin, Kuo-Ming Chao
Issue Date:March 2008
pp. 423-428
With the increasing popularity of deploying web services, quality of service (QoS) becomes a significant concern for service consumers and providers for service selection. However, representing and storing the values of QoS attributes are problematic, as t...
A Channel Quality and QoS Aware Bandwidth Allocation Algorithm for IEEE 802.16 Base Stations
Found in: Advanced Information Networking and Applications, International Conference on
By Yuan-Cheng Lai, Yen-Hung Chen
Issue Date:March 2008
pp. 472-479
In an IEEE 802.16 network, mobile stations locating different places will encounter various interferences during transmission, leading that their communication channels experience different packet loss conditions and adopt suitable modulations. Thus, an ex...
A Cross-Layer Fine-Tuning Scheduling Scheme to Provide Proportional Delay Differentiation in a Wireless LAN
Found in: Advanced Information Networking and Applications, International Conference on
By Yuan Cheng Lai, Arthur Chang, Ching-Neng Lai, Chih-Chung Lin
Issue Date:March 2008
pp. 271-278
This paper addresses how to provide the proportional delay differentiation (PDD) in a wireless LAN (WLAN) and proposes a cross-layer fine-tuning scheduling (CFS) scheme with the goal to maintain PDD among all wireless stations while improving performance i...
Thread Allocation in Chip Multiprocessor Based Multithreaded Network Processors
Found in: Advanced Information Networking and Applications, International Conference on
By Yi-Neng Lin, Ying-Dar Lin, Yuan-Cheng Lai
Issue Date:March 2008
pp. 718-725
This work tries to derive ideas for thread allocation in Chip Multiprocessor (CMP)-based network processors performing general applications by Continuous-Time Markov Chain modeling and Petri net simulations. The concept of P-M ratio, where P and M indicate...
Scalable Automaton Matching for High-Speed Deep Content Inspection
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Ying-Dar Lin, Kuo-Kun Tseng, Chen-Chou Hung, Yuan-Cheng Lai
Issue Date:May 2007
pp. 858-863
String matching plays a central role in content inspection applications such as intrusion detection, anti-virus, anti-spam and Web filtering. Because they are computation and memory intensive, software matching algorithms are insufficient in meeting the hi...
kP2PADM: An In-kernel Gateway Architecture for Managing P2P Traffic
Found in: Parallel and Distributed Processing Symposium, International
By Ying-Dar Lin, Po-Ching Lin, Meng-Fu Tsai, Tsao-Jiang Chang, Yuan-Cheng Lai
Issue Date:March 2007
pp. 462
This work presents an in-kernel gateway architecture on Linux, namely kP2PADM, for managing P2P traffic on dynamic ports. This design can effectively eliminate redundant data passing between the kernel space and the user space. The management functions inc...
Designing an Integrated Architecture for Network Content Security Gateways
Found in: Computer
By Ying-Dar Lin, Chih-Wei Jan, Po-Ching Lin, Yuan-Cheng Lai
Issue Date:November 2006
pp. 66-72
Installing multiple network security products to detect and block viruses, spam, and other intrusions introduces substantial overhead in interprocess communications and kernel/user space interactions. Tightly integrating these functions in a single gateway...
A Parallel Automaton String Matching with Pre-Hashing and Root-Indexing Techniques for Content Filtering Coprocessor
Found in: Application-Specific Systems, Architectures and Processors, IEEE International Conference on
By Kuo-Kun Tseng, Ying-Dar Lin, Tsern-Huei Lee, Yuan-Cheng Lai
Issue Date:July 2005
pp. 113-118
<p>We propose a new Parallel Automaton string matching approach and its hardware architecture for content filtering coprocessor. This new approach can improve the average matching time of the Parallel Automaton with Pre-Hashing and Root-Indexing tech...
Three remedied algorithms for Advanced Waiting Time Scheduler
Found in: Parallel and Distributed Systems, International Conference on
By Yuan-Cheng Lai, Wei-Hsi Li
Issue Date:December 2002
pp. 617
The advanced waiting time priority scheduler (AWTP), modified from the waiting time priority scheduler (WTP), was proposed to achieve proportional delay differentiation. AWTP not only achieves more accurate delay proportion than the WTP scheduler no matter...
A Fair Admission Control for Large-Bandwidth Multimedia Applications
Found in: Distributed Computing Systems Workshops, International Conference on
By Yuan-Cheng Lai, Yu-Dar Lin
Issue Date:July 2002
pp. 317
Current admission controls aiming to maximize network utilization create a bias against large-bandwidth calls. This paper proposes a BNP (buffer without preemption) model which will hold a call in a buffer rather than directly reject it when the residual b...
Improving the Performance of TCP Vegas in a Heterogeneous Environment
Found in: Parallel and Distributed Systems, International Conference on
By Yuan-Cheng Lai
Issue Date:June 2001
pp. 0581
Abstract: Many results indicate that TCP Vegas exhibits better throughput and higher stability than TCP Reno in homogeneous cases where a single version exists, but it performs poorly in heterogeneous cases where two versions coexist. Hence users delay, ev...
Unfairness of Measurement-Based Admission Controls in a Heterogeneous Environment
Found in: Parallel and Distributed Systems, International Conference on
By Yuan-Cheng Lai, Sheng-Fu Tsai
Issue Date:June 2001
pp. 0667
Abstract: Admission controls are required to determine whether new connections should be admitted to networks. These controls ensure the quality of service (QoS) for data transmission. This paper introduces three measurement-based admission control algorit...
Guaranteed versus Controlled Load: Implications for Service Subscribers and Providers in RSVP Networks
Found in: Information Networking, International Conference on
By Yuan-Cheng Lai, Ying-Dar Lin, Chih-Yu Chen, Huan-Yun Wey
Issue Date:February 2001
pp. 487
IETF Integrated Service Working Group has specified two service classes: Guaranteed Quality (GQ) service and Controlled Load (CL) service. What concerns service sub-scribers and providers most is the cost of these two services and their performance. For se...
 1  2 Next >>