default search action
Fuu-Cheng Jiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j17]Chih-Hung Chang, Fuu-Cheng Jiang, Chao-Tung Yang, Sheng-Cang Chou:
On construction of a big data warehouse accessing platform for campus power usages. J. Parallel Distributed Comput. 133: 40-50 (2019) - 2018
- [c15]Sheng-Cang Chou, Chao-Tung Yang, Fuu-Cheng Jiang, Chih-Hung Chang:
The Implementation of a Data-Accessing Platform Built from Big Data Warehouse of Electric Loads. COMPSAC (2) 2018: 87-92 - 2017
- [j16]Fuu-Cheng Jiang, Ching-Hsien Hsu:
Fault-tolerant system design on cloud logistics by greener standbys deployment with Petri net model. Neurocomputing 256: 90-100 (2017) - [j15]Fuu-Cheng Jiang, Ching-Hsien Hsu, Shangguang Wang:
Logistic Support Architecture with Petri Net Design in Cloud Environment for Services and Profit Optimization. IEEE Trans. Serv. Comput. 10(6): 879-888 (2017) - 2016
- [j14]Chao-Tung Yang, Wen-Chung Shih, Chih-Lin Huang, Fuu-Cheng Jiang, William Cheng-Chung Chu:
On construction of a distributed data storage system in cloud. Computing 98(1-2): 93-118 (2016) - [j13]Fuu-Cheng Jiang, Ilsun You, Fang-Yie Leu:
Approaching green sensor field using queue-based optimization technique. J. Netw. Comput. Appl. 66: 128-136 (2016) - 2015
- [j12]Chao-Tung Yang, Wen-Chung Shih, Lung-Teng Chen, Cheng-Ta Kuo, Fuu-Cheng Jiang, Fang-Yie Leu:
Accessing medical image file with co-allocation HDFS in cloud. Future Gener. Comput. Syst. 43-44: 61-73 (2015) - [j11]Fang-Yie Leu, Chin-Yu Liu, Jung-Chun Liu, Fuu-Cheng Jiang, Heru Susanto:
S-PMIPv6: An intra-LMA model for IPv6 mobility. J. Netw. Comput. Appl. 58: 180-191 (2015) - [c14]Fuu-Cheng Jiang, Chao-Tung Yang, Yung-Hsin Chen, Wei-Tao Huang, Hsin-Yu Chao:
Decision Support for Cloud Logistics by Optimizing the Quantities of Standby Servers in Cloud Environment. CCBD 2015: 169-172 - [c13]Yao-Yu Yang, Wei-Hsun Cheng, Chao-Tung Yang, Shuo-Tsung Chen, Fuu-Cheng Jiang:
The Implementation of Real-Time Network Traffic Monitoring Service with Network Functions Virtualization. CCBD 2015: 279-286 - [c12]Yao-Yu Yang, Chao-Tung Yang, Shuo-Tsung Chen, Wei-Hsun Cheng, Fuu-Cheng Jiang:
Implementation of Network Traffic Monitor System with SDN. COMPSAC Workshops 2015: 631-634 - 2014
- [j10]Fuu-Cheng Jiang, Chu-Hsing Lin, Hsiang-Wei Wu:
Lifetime elongation of ad hoc networks under flooding attack using power-saving technique. Ad Hoc Networks 21: 84-96 (2014) - [j9]Chao-Tung Yang, Jung-Chun Liu, Kuan-Lung Huang, Fuu-Cheng Jiang:
A method for managing green power of a virtual machine cluster in cloud. Future Gener. Comput. Syst. 37: 26-36 (2014) - 2013
- [j8]Fuu-Cheng Jiang, Hsiang-Wei Wu, Fang-Yie Leu, Chao-Tung Yang:
Toward green sensor field by optimizing power efficiency using D-policy M/G/1 queuing systems. Mob. Inf. Syst. 9(3): 241-260 (2013) - [c11]Chao-Tung Yang, Yu-Tso Liu, Jung-Chun Liu, Chih-Liang Chuang, Fuu-Cheng Jiang:
Implementation of a Cloud IaaS with Dynamic Resource Allocation Method Using OpenStack. PDCAT 2013: 71-78 - 2012
- [j7]Fang-Yie Leu, Fuu-Cheng Jiang, Chih-Cheng Lien, Sen-Tarng Lai, Shiuan-You Chiou:
A rate-allocation based multi-path control scheme for event-driven wireless sensor networks on constant event packet rates. Comput. Syst. Sci. Eng. 27(5) (2012) - [j6]Fuu-Cheng Jiang, Der-Chen Huang, Chao-Tung Yang, Chu-Hsing Lin, Kuo-Hsiung Wang:
Design strategy for optimizing power consumption of sensor node with Min(N, T) policy M/G/1 queuing models. Int. J. Commun. Syst. 25(5): 652-671 (2012) - [j5]Fuu-Cheng Jiang, Chu-Hsing Lin, Der-Chen Huang, Chao-Tung Yang:
Dual paths node-disjoint routing for data salvation in mobile ad hoc. J. Supercomput. 59(1): 268-296 (2012) - [j4]Fuu-Cheng Jiang, Der-Chen Huang, Chao-Tung Yang, Fang-Yie Leu:
Lifetime elongation for wireless sensor network using queue-based approaches. J. Supercomput. 59(3): 1312-1335 (2012) - [j3]Fuu-Cheng Jiang, Hsiang-Wei Wu, Chao-Tung Yang:
Traffic load analysis and its application to enhancing longevity on IEEE 802.15.4/ZigBee Sensor Network. J. Supercomput. 62(2): 895-915 (2012) - [c10]Fuu-Cheng Jiang, Chao-Tung Yang, Ching-Hsien Hsu, Yi-Ju Chiang:
Optimization technique on logistic economy for cloud computing using finite-source queuing systems. CloudCom 2012: 827-832 - 2011
- [j2]Fang-Yie Leu, Fenq-Lin Jenq, Fuu-Cheng Jiang:
A path switching scheme for SCTP based on round trip delays. Comput. Math. Appl. 62(9): 3504-3523 (2011) - [c9]Fuu-Cheng Jiang, Chao-Tung Yang, Ching-Hsien Hsu, Kuo-Hsiung Wang, Yi-Ju Chiang:
Longevity Enhancement Technique on IEEE 802.15.4/ZigBee Sensor Network Using D-Policy M/G/1 Queuing Model. CSE 2011: 106-113 - 2010
- [j1]Fang-Yie Leu, Chao-Tung Yang, Fuu-Cheng Jiang:
Improving reliability of a heterogeneous grid-based intrusion detection platform using levels of redundancies. Future Gener. Comput. Syst. 26(4): 554-568 (2010) - [c8]Fuu-Cheng Jiang, Hsiang-Wei Wu, Der-Chen Huang, Chu-Hsing Lin:
Lifetime Security Improvement in Wireless Sensor Network Using Queue-Based Techniques. BWCCA 2010: 469-474 - [c7]Fuu-Cheng Jiang, Chao-Tung Yang, Shih-Meng Teng, Hsiang-Wei Wu, Yi-Ju Chiang:
Modeling and Prolonging Techniques on Operational Lifetime of Wireless Sensor Networks. CSE 2010: 6-13
2000 – 2009
- 2009
- [c6]Chu-Hsing Lin, Fuu-Cheng Jiang, Wei-Shen Lai, Wei-Yuah Lee, Wei-Cheng Hsu:
Counteract SYN flooding using second chance packet filtering. ICUIMC 2009: 216-220 - [c5]Fuu-Cheng Jiang, Der-Chen Huang, Kuo-Hsiung Wang:
Design approaches for optimizing power consumption of sensor node with N-policy M/G/1 queuing model. QTNA 2009: 3:1-3:8 - 2008
- [c4]Chu-Hsing Lin, Jung-Chun Liu, Fuu-Cheng Jiang, Chien-Ting Kuo:
An Effective Priority Queue-Based Scheme to Alleviate Malicious Packet Flows from Distributed DoS Attacks. IIH-MSP 2008: 1371-1374 - [c3]Chu-Hsing Lin, Fuu-Cheng Jiang, Jen-Chieh Chang, Frode Eika Sandnes:
Node-Disjoint Alternative Dual-Path Routing for Data Salvation in Mobile Ad hoc Networks. PDCAT 2008: 342-349 - 2007
- [c2]Fang-Yie Leu, Fuu-Cheng Jiang, Ming-Chang Li, Jia-Chun Lin:
An Enhanced DGIDE Platform for Intrusion Detection. ATC 2007: 559-568 - [c1]Fang-Yie Leu, Kai-Wei Hu, Fuu-Cheng Jiang:
Intrusion Detection and Identification System Using Data Mining and Forensic Techniques. IWSEC 2007: 137-152
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint