Search For:

Displaying 1-31 out of 31 total
Hardware-Software Codesign for High-Speed Signature-based Virus Scanning
Found in: IEEE Micro
By Ying-Dar Lin, Po-Ching Lin, Yuan-Cheng Lai, Tai-Ying Liu
Issue Date:September 2009
pp. 56-65
<p>High-speed network content security applications often offload signature matching to hardware. In such systems, the throughput of the overall system, rather than the hardware engine alone, is significant. The authors offload virus scanning in the ...
 
Unfairness of Measurement-Based Admission Controls in a Heterogeneous Environment
Found in: Parallel and Distributed Systems, International Conference on
By Yuan-Cheng Lai, Sheng-Fu Tsai
Issue Date:June 2001
pp. 0667
Abstract: Admission controls are required to determine whether new connections should be admitted to networks. These controls ensure the quality of service (QoS) for data transmission. This paper introduces three measurement-based admission control algorit...
 
Test Coverage Optimization for Large Code Problems
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Ying-Dar Lin,Chi-Heng Chou,Yuan-Cheng Lai,Tse-Yau Huang,Simon Chung,Jui-Tsun Hung,Frank C. Lin
Issue Date:March 2012
pp. 215-220
Because running all previous tests for the regression testing of a system is time-consuming, the size of a test suite of the system must be reduced intelligently with adequate test coverage and without compromising its fault detection capability. Five algo...
 
Improving the Performance of TCP Vegas in a Heterogeneous Environment
Found in: Parallel and Distributed Systems, International Conference on
By Yuan-Cheng Lai
Issue Date:June 2001
pp. 0581
Abstract: Many results indicate that TCP Vegas exhibits better throughput and higher stability than TCP Reno in homogeneous cases where a single version exists, but it performs poorly in heterogeneous cases where two versions coexist. Hence users delay, ev...
 
Guaranteed versus Controlled Load: Implications for Service Subscribers and Providers in RSVP Networks
Found in: Information Networking, International Conference on
By Yuan-Cheng Lai, Ying-Dar Lin, Chih-Yu Chen, Huan-Yun Wey
Issue Date:February 2001
pp. 487
IETF Integrated Service Working Group has specified two service classes: Guaranteed Quality (GQ) service and Controlled Load (CL) service. What concerns service sub-scribers and providers most is the cost of these two services and their performance. For se...
 
A Novel Query Tree Protocol with Bit Tracking in RFID Tag Identification
Found in: IEEE Transactions on Mobile Computing
By Yuan-Cheng Lai,Ling-Yen Hsiao,Hong-Jie Chen,Ching-Neng Lai,Jian-Wei Lin
Issue Date:October 2013
pp. 2063-2075
Tag anticollision has long been an important issue in RFID systems. To accelerate tag identification, some researchers have recently adopted bit tracking technology that allows the reader to detect the locations of collided bits in a collision slot. Howeve...
 
A Channel Quality Aware Algorithm for IEEE 802.16 Uplink Burst Construction
Found in: Advanced Information Networking and Applications, International Conference on
By Yuan-Cheng Lai,Yen-Hung Chen,Ching-Neng Lai
Issue Date:March 2012
pp. 207-214
Many burst construction algorithms for Orthogonal Frequency Division Multiple Access (OFDMA) were proposed. However, these algorithms do not meet the uplink burst characteristics specified in the IEEE 802.16 standard. This paper therefore proposes the Best...
 
A Cross-Layer Fine-Tuning Scheduling Scheme to Provide Proportional Delay Differentiation in a Wireless LAN
Found in: Advanced Information Networking and Applications, International Conference on
By Yuan Cheng Lai, Arthur Chang, Ching-Neng Lai, Chih-Chung Lin
Issue Date:March 2008
pp. 271-278
This paper addresses how to provide the proportional delay differentiation (PDD) in a wireless LAN (WLAN) and proposes a cross-layer fine-tuning scheduling (CFS) scheme with the goal to maintain PDD among all wireless stations while improving performance i...
 
On the Accuracy, Efficiency, and Reusability of Automated Test Oracles for Android Devices
Found in: IEEE Transactions on Software Engineering
By Ying-Dar Lin,Jose F. Rojas,Edward T.-H. Chu,Yuan-Cheng Lai
Issue Date:October 2014
pp. 1-1
Automated GUI testing consists of simulating user events and validating the changes in the GUI in order to determine if an Android application meets specifications. Traditional record-replay testing tools mainly focus on facilitating the test case writing ...
 
A Hybrid Algorithm of Backward Hashing and Automaton Tracking for Virus Scanning
Found in: IEEE Transactions on Computers
By Po-Ching Lin, Ying-Dar Lin, Yuan-Cheng Lai
Issue Date:April 2011
pp. 594-601
Virus scanning involves computationally intensive string matching against a large number of signatures of different characteristics. Matching a variety of signatures challenges the selection of matching algorithms, as each approach has better performance t...
 
Improving the Accuracy of Automated GUI Testing for Embedded Systems
Found in: IEEE Software
By Ying-Dar Lin,Edward T.-H. Chu,Shang-Che Yu,Yuan-Cheng Lai
Issue Date:January 2014
pp. 39-45
Automated GUIs test application user interfaces and verify their functionalities. However, due to the uncertainty of runtime execution environments, the device under test (DUT) might not reproduce GUI operations on time, resulting in test failures. The Sma...
 
In-Kernel Relay for Scalable One-to-Many Streaming
Found in: IEEE MultiMedia
By Ying-Dar Lin,Chia-Yu Ku,Yuan-Cheng Lai,Chia-Fon Hung
Issue Date:January 2013
pp. 69-79
The in-kernel One-to-Many Streaming Splicing (OMSS) relay method can help improve the relay data paths of critical nodes to reduce computing power for UDP and TCP streams and enhance the subscriber capacity.
 
Two Couple-Resolution Blocking Protocols on Adaptive Query Splitting for RFID Tag Identification
Found in: IEEE Transactions on Mobile Computing
By Yuan-Cheng Lai,Chih-Chung Lin
Issue Date:October 2012
pp. 1450-1463
How to accelerate tag identification is an important issue in Radio Frequency Identification (RFID) systems. In some cases, the RFID reader repeatedly identifies the same tags since these tags always stay in its communication range. An anticollision protoc...
 
Session Level Flow Classification by Packet Size Distribution and Session Grouping
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Chun-Nan Lu,Ying-Dar Lin,Chun-Ying Huang,Yuan-Cheng Lai
Issue Date:March 2012
pp. 221-226
Classifying traffic into specific network applications is essential for application-aware network management and it becomes more challenging because modern applications obscure their network behaviors. While port number-based classifiers work only for some...
 
Designing and Implementing an IEEE 802.16 Network Simulator for Performance Evaluation of Bandwidth Allocation Algorithms
Found in: High Performance Computing and Communications, 10th IEEE International Conference on
By Yuan-Cheng Lai, Yen-Hung Chen
Issue Date:June 2009
pp. 432-437
IEEE 802.16 technology is a promising technology to solve the last mile problem by its wireless, long distance, and high-bandwidth transmission. However, there isn't any suitable simulator to evaluate the performance between different IEEE 802.16 bandwidth...
 
Using String Matching for Deep Packet Inspection
Found in: Computer
By Po-Ching Lin, Ying-Dar Lin, Yuan-Cheng Lai, Tsern-Huei Lee
Issue Date:April 2008
pp. 23-28
String matching has sparked renewed research interest due to its usefulness for deep packet inspection in applications such as intrusion detection, virus scanning, and Internet content filtering. Matching expressive pattern specifications with a scalable a...
 
Multiple-Resource Request Scheduling for Differentiated QoS at Website Gateway
Found in: Advanced Information Networking and Applications, International Conference on
By Ying-Dar Lin, Ching-Ming Tien, Shih-Chiang Tsao, Ruo-Hua Feng, Yuan-Cheng Lai
Issue Date:March 2008
pp. 433-440
Differentiated quality of service is a way for a website operator to provide different service levels to its clients. Traditional HTTP request scheduling schemes can achieve this, but they schedule requests to manage only one server resource, such as CPU o...
 
A Channel Quality and QoS Aware Bandwidth Allocation Algorithm for IEEE 802.16 Base Stations
Found in: Advanced Information Networking and Applications, International Conference on
By Yuan-Cheng Lai, Yen-Hung Chen
Issue Date:March 2008
pp. 472-479
In an IEEE 802.16 network, mobile stations locating different places will encounter various interferences during transmission, leading that their communication channels experience different packet loss conditions and adopt suitable modulations. Thus, an ex...
 
Scalable Automaton Matching for High-Speed Deep Content Inspection
Found in: Advanced Information Networking and Applications Workshops, International Conference on
By Ying-Dar Lin, Kuo-Kun Tseng, Chen-Chou Hung, Yuan-Cheng Lai
Issue Date:May 2007
pp. 858-863
String matching plays a central role in content inspection applications such as intrusion detection, anti-virus, anti-spam and Web filtering. Because they are computation and memory intensive, software matching algorithms are insufficient in meeting the hi...
 
kP2PADM: An In-kernel Gateway Architecture for Managing P2P Traffic
Found in: Parallel and Distributed Processing Symposium, International
By Ying-Dar Lin, Po-Ching Lin, Meng-Fu Tsai, Tsao-Jiang Chang, Yuan-Cheng Lai
Issue Date:March 2007
pp. 462
This work presents an in-kernel gateway architecture on Linux, namely kP2PADM, for managing P2P traffic on dynamic ports. This design can effectively eliminate redundant data passing between the kernel space and the user space. The management functions inc...
 
Designing an Integrated Architecture for Network Content Security Gateways
Found in: Computer
By Ying-Dar Lin, Chih-Wei Jan, Po-Ching Lin, Yuan-Cheng Lai
Issue Date:November 2006
pp. 66-72
Installing multiple network security products to detect and block viruses, spam, and other intrusions introduces substantial overhead in interprocess communications and kernel/user space interactions. Tightly integrating these functions in a single gateway...
 
A Parallel Automaton String Matching with Pre-Hashing and Root-Indexing Techniques for Content Filtering Coprocessor
Found in: Application-Specific Systems, Architectures and Processors, IEEE International Conference on
By Kuo-Kun Tseng, Ying-Dar Lin, Tsern-Huei Lee, Yuan-Cheng Lai
Issue Date:July 2005
pp. 113-118
<p>We propose a new Parallel Automaton string matching approach and its hardware architecture for content filtering coprocessor. This new approach can improve the average matching time of the Parallel Automaton with Pre-Hashing and Root-Indexing tech...
 
Three remedied algorithms for Advanced Waiting Time Scheduler
Found in: Parallel and Distributed Systems, International Conference on
By Yuan-Cheng Lai, Wei-Hsi Li
Issue Date:December 2002
pp. 617
The advanced waiting time priority scheduler (AWTP), modified from the waiting time priority scheduler (WTP), was proposed to achieve proportional delay differentiation. AWTP not only achieves more accurate delay proportion than the WTP scheduler no matter...
 
A Fair Admission Control for Large-Bandwidth Multimedia Applications
Found in: Distributed Computing Systems Workshops, International Conference on
By Yuan-Cheng Lai, Yu-Dar Lin
Issue Date:July 2002
pp. 317
Current admission controls aiming to maximize network utilization create a bias against large-bandwidth calls. This paper proposes a BNP (buffer without preemption) model which will hold a call in a buffer rather than directly reject it when the residual b...
 
Characterization and control of highly correlated traffic in high speed networks
Found in: Local Computer Networks, Annual IEEE Conference on
By Ying-Dar Lin, Tian-Ren Huang, Yuan-Cheng Lai
Issue Date:November 1996
pp. 19
By assuming network traffic to be independent from each other, the analysis of network performance can be simplified. However, the real traffic sources may have some correlation which makes their behavior tend to converge or diverge. This phenomenon has a ...
 
The Performance Comparison between TCP Reno and TCP Vegas
Found in: Parallel and Distributed Systems, International Conference on
By Yuan-Cheng Lai, Chang-Li Yao
Issue Date:July 2000
pp. 61
Following the development of TCP Vegas, the performance comparison between TCP Reno and TCP Vegas has not been discussed thoroughly. The discussion of the revised TCP version, TCP Vegas, remains insufficient to decide whether or not to use it. This paper a...
 
Thread Allocation in Chip Multiprocessor Based Multithreaded Network Processors
Found in: Advanced Information Networking and Applications, International Conference on
By Yi-Neng Lin, Ying-Dar Lin, Yuan-Cheng Lai
Issue Date:March 2008
pp. 718-725
This work tries to derive ideas for thread allocation in Chip Multiprocessor (CMP)-based network processors performing general applications by Continuous-Time Markov Chain modeling and Petri net simulations. The concept of P-M ratio, where P and M indicate...
 
Performance Analysis of Rate-based Congestion Control Scheme and Choice of High and Low Thresholds
Found in: Computer Communications and Networks, International Conference on
By Yuan-Cheng Lai, Ying-Dar Lin
Issue Date:September 1997
pp. 70
The paper presents a performance analysis of a rate-based congestion control mechanism. The switching capacity of the buffer is finite to reflect real conditions. Using a differential equation approach, we get the closed-form equations of cell loss probabi...
 
A fast scalable automaton-matching accelerator for embedded content processors
Found in: ACM Transactions on Embedded Computing Systems (TECS)
By Kuo-Kun Tseng, Tsern-Huei Lee, Ying-Dar Lin, Yuan-Cheng Lai
Issue Date:April 2009
pp. 1-30
Home and office network gateways often employ a cost-effective embedded network processor to handle their network services. Such network gateways have received strong demand for applications dealing with intrusion detection, keyword blocking, antivirus and...
     
Modeling and analysis of core-centric network processors
Found in: ACM Transactions on Embedded Computing Systems (TECS)
By Kuo-Kun Tseng, Yi-Neng Lin, Ying-Dar Lin, Yuan-Cheng Lai
Issue Date:January 2009
pp. 1-15
Network processors can be categorized into two types, the coprocessors-centric model in which the data-plane is handled by coprocessors, and the core-centric model in which the core processes most of the data-plane packets yet offloading some tasks to copr...
     
Modeling and analysis of core-centric network processors
Found in: ACM Transactions on Embedded Computing Systems (TECS)
By Kuo-Kun Tseng, Yi-Neng Lin, Ying-Dar Lin, Yuan-Cheng Lai
Issue Date:July 2008
pp. 1-15
Network processors can be categorized into two types, the coprocessors-centric model in which data-plane is handled by coprocessors, and the core-centric model in which the core processes most of the data-plane packets yet offloading some tasks to coproces...
     
 1