| 國立交通大學 |
2020-10-05T02:02:23Z |
On Optimizing Signaling Efficiency of Retransmissions for Voice LTE
|
Hsu, Chia-An; Lin, Kate Ching-Ju; Ren, Yi; Tseng, Yu-Chee |
| 國立交通大學 |
2020-10-05T02:02:21Z |
ID-Free Multigroup Cardinality Estimation for Massive RFID Tags in IoT
|
Lee, Tsu-Kuang; Chen, Chih-Chieh; Ren, Yi; Lin, Cheng-Kuan; Tseng, Yu-Chee |
| 國立交通大學 |
2020-05-05T00:01:56Z |
Hey! I Have Something for You: Paging Cycle Based Random Access for LTE-A
|
Lin, Kate Ching-Ju; Tseng, Yu-Chee; Ren, Yi; Hsu, Chia-An |
| 國立交通大學 |
2019-12-13T01:12:51Z |
From Spotting the Difference to Spotting Your Difference
|
Chan, Tsung-Yen; Chang, Po-Yen; Ren, Yi; Tseng, Yu-Chee |
| 國立交通大學 |
2019-06-03T01:09:17Z |
ASA: Adaptive VNF Scaling Algorithm for 5G Mobile Networks
|
Ren, Yi; Tuan Phung-Duc; Liu, Yi-Kuan; Chen, Jyh-Cheng; Lin, Yi-Hao |
| 國立交通大學 |
2019-06-03T01:08:33Z |
Multi-Slot Allocation Protocols for Massive IoT Devices With Small-Size Uploading Data
|
Chan, Tsung-Yen; Ren, Yi; Tseng, Yu-Chee; Chen, Jyh-Cheng |
| 國立交通大學 |
2019-04-03T06:41:49Z |
LiPISC: A Lightweight and Flexible Method for Privacy-Aware Intersection Set Computation
|
Ren, Wei; Huang, Shiyong; Ren, Yi; Choo, Kim-Kwang Raymond |
| 國立交通大學 |
2019-04-02T06:04:34Z |
A Hint-based Random Access Protocol for mMTC in 5G Mobile Network
|
Xu, Yining; Ren, Yi; Lin, Kate Ching-Ju; Tseng, Yu-Chee |
| 國立交通大學 |
2019-04-02T06:00:44Z |
A Novel Approach to Trust Management in Unattended Wireless Sensor Networks
|
Ren, Yi; Zadorozhny, Vladimir I.; Oleshchuk, Vladimir A.; Li, Frank Y. |
| 國立交通大學 |
2019-04-02T05:59:38Z |
Impacts of S1 and X2 Interfaces on eMBMS Handover Failure: Solution and Performance Analysis
|
Ren, Yi; Chen, Jyh-Cheng; Chin, Jui-Chih |
| 國立交通大學 |
2019-04-02T05:58:27Z |
Proportional and Preemption-Enabled Traffic Offloading for IP Flow Mobility: Algorithms and Performance Evaluation
|
Ren, Yi; Tung, Chih-Wei; Chen, Jyh-Cheng; Li, Frank Y. |
| 國立交通大學 |
2018-08-21T05:57:13Z |
Flowtable-Free Routing for Data Center Networks: A Software-Defined Approach
|
Ren, Yi; Tsai, Tsung-Han; Huang, Ji-Cheng; Wu, Cheng-Wei; Tseng, Yu-Chee |
| 國立交通大學 |
2018-08-21T05:57:13Z |
Applying Machine Learning to Head Gesture Recognition using Wearables
|
Wu, Cheng-Wei; Yang, Hua-Zhi; Chen, Yan-Ann; Ensa, Bajo; Ren, Yi; Tseng, Yu-Chee |
| 國立交通大學 |
2018-08-21T05:57:07Z |
r-Hint: A Message-Efficient Random Access Response for mMTC in 5G Networks
|
Huang, Teng-Wei; Ren, Yi; Lin, Kate Ching-Ju; Tseng, Yu-Chee |
| 國立交通大學 |
2018-08-21T05:56:57Z |
iToy: A LEGO-like Solution for Small Scale IoT Applications
|
Ren, Yi; Alfiansyah, Muhammad; Wibowo, Nyoto Arif; Wu, Cheng-Wei; Geng, JieFu; Tseng, Yu-Chee |
| 國立交通大學 |
2018-08-21T05:56:53Z |
The Hint Protocol: Using a Broadcast Method to Enable ID-Free Data Transmission for Dense IoT Devices
|
Ren, Yi; Wu, Ren-Jie; Tseng, Yu-Chee |
| 國立交通大學 |
2018-08-21T05:56:47Z |
Give Me a Hint: An ID-Free Small Data Transmission Protocol for Dense IoT Devices
|
Ren, Yi; Wu, Ren-Jie; Huang, Teng-Wei; Tseng, Yu-Chee |
| 國立交通大學 |
2018-08-21T05:56:45Z |
eHint: An Efficient Protocol for Uploading Small-Size IoT Data
|
Chan, Tsung-Yen; Ren, Yi; Tseng, Yu-Chee; Chen, Jyh-Cheng |
| 國立交通大學 |
2018-08-21T05:56:44Z |
Dynamic Auto Scaling Algorithm (DASA) for 5G Mobile Networks
|
Ren, Yi; Phung-Duc, Tuan; Chen, Jyh-Cheng; Yu, Zheng-Wei |
| 國立交通大學 |
2018-08-21T05:56:44Z |
Congestion Control for Machine-Type Communications in LTE-A Networks
|
Chang, Chia-Wei; Lin, Yi-Hao; Ren, Yi; Chen, Jyh-Cheng |
| 國立交通大學 |
2018-08-21T05:56:38Z |
Design and Analysis of Deadline and Budget Constrained Autoscaling (DBCA) Algorithm for 5G Mobile Networks
|
Than Phung-Duc; Ren, Yi; Chen, Jyh-Cheng; Yu, Zheng-Wei |
| 國立交通大學 |
2018-08-21T05:53:58Z |
Modeling and Analysis of Channel Holding Time and Handoff Rate for Packet Sessions in All-IP Cellular Networks
|
Ku, Bying-He; Ren, Yi; Weng, Jeng-Feng; Chen, Jyh-Cheng; Chen, Wen-Tsuen |
| 國立交通大學 |
2018-08-21T05:53:20Z |
How to Reduce Unexpected eMBMS Session Disconnection: Design and Performance Analysis
|
Chan, Tsung-Yen; Ren, Yi; Tseng, Yu-Chee; Chen, Jyh-Cheng |
| 國立交通大學 |
2018-01-01 |
On Scalable Service Function Chainingng with O(1) Flowtable Entries
|
Tseng, Yu-Chee; Lin, Kate Ching-Ju; Huang, Tzu-Ming; Ren, Yi |
| 國立交通大學 |
2017-04-21T06:56:44Z |
Design and Analysis of the Key Management Mechanism in Evolved Multimedia Broadcast/Multicast Service
|
Ren, Yi; Chen, Jyh-Cheng; Chin, Jui-Chih; Tseng, Yu-Chee |
| 國立交通大學 |
2017-04-21T06:49:44Z |
A Robust and Flexible Access Control Scheme for Cloud-IoT Paradigm with Application to Remote Mobile Medical Monitoring
|
Ren, Wei; Ren, Yi; Wu, Mu-En; Lee, Chia-Jung |
| 國立交通大學 |
2017-04-21T06:48:17Z |
Design and Analysis of a Threshold Offloading (TO) Algorithm for LTE Femtocell/Macrocell Networks
|
Chen, Wei-Han; Ren, Yi; Chen, Jyh-Cheng |
| 國立交通大學 |
2016-03-28T00:04:15Z |
RISE: A RelIable and SEcure Scheme for Wireless Machine to Machine Communications
|
Ren, Wei; Yu, Linchen; Ma, Liangli; Ren, Yi |
| 國立交通大學 |
2015-07-21T08:31:28Z |
A Feasiblity Study on Developing IoT/M2M Applications over ETSI M2M Architecture
|
Lin, Fuchun Joseph; Ren, Yi; Cerritos, Eduardo |
| 國立交通大學 |
2014-12-08T15:36:34Z |
A Novel Approach to Trust Management in Unattended Wireless Sensor Networks
|
Ren, Yi; Zadorozhny, Vladimir I.; Oleshchuk, Vladimir A.; Li, Frank Y. |
| 國立交通大學 |
2014-12-08T15:36:00Z |
Design of a Self-Portrait Application with Sensor-Assisted Guiding for Smart Devices
|
Lo, Chi-Chung; Huang, Sz-Pin; Ren, Yi; Tseng, Yu-Chee |
| 國立交通大學 |
2014-12-08T15:33:18Z |
LIRT: A Lightweight Scheme for Indistinguishability, Reachability, and Timeliness in Wireless Sensor Control Networks
|
Ren, Wei; Ma, Liangli; Ren, Yi |
| 國立交通大學 |
2014-12-08T15:31:43Z |
APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks
|
Ren, Wei; Ma, Liangli; Ren, Yi |
| 國立交通大學 |
2014-12-08T15:30:30Z |
Perturbation-Based Schemes with Ultra-Lightweight Computation to Protect User Privacy in Smart Grid
|
Ren, Wei; Ma, Liangli; Ren, Yi |
| 國立交通大學 |
2014-12-08T15:29:35Z |
How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack
|
Ren, Wei; Yu, Linchen; Ma, Liangli; Ren, Yi |