Fuu-Cheng Jiang
According to our database1,
Fuu-Cheng Jiang
authored at least 32 papers
between 2007 and 2019.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2019
J. Parallel Distributed Comput., 2019
2018
The Implementation of a Data-Accessing Platform Built from Big Data Warehouse of Electric Loads.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018
2017
Logistic Support Architecture with Petri Net Design in Cloud Environment for Services and Profit Optimization.
IEEE Trans. Serv. Comput., 2017
Fault-tolerant system design on cloud logistics by greener standbys deployment with Petri net model.
Neurocomputing, 2017
2016
J. Netw. Comput. Appl., 2016
2015
Future Gener. Comput. Syst., 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
The Implementation of Real-Time Network Traffic Monitoring Service with Network Functions Virtualization.
Proceedings of the International Conference on Cloud Computing and Big Data, 2015
Decision Support for Cloud Logistics by Optimizing the Quantities of Standby Servers in Cloud Environment.
Proceedings of the International Conference on Cloud Computing and Big Data, 2015
2014
Future Gener. Comput. Syst., 2014
Lifetime elongation of ad hoc networks under flooding attack using power-saving technique.
Ad Hoc Networks, 2014
2013
Toward green sensor field by optimizing power efficiency using D-policy M/G/1 queuing systems.
Mob. Inf. Syst., 2013
Implementation of a Cloud IaaS with Dynamic Resource Allocation Method Using OpenStack.
Proceedings of the International Conference on Parallel and Distributed Computing, 2013
2012
Traffic load analysis and its application to enhancing longevity on IEEE 802.15.4/ZigBee Sensor Network.
J. Supercomput., 2012
J. Supercomput., 2012
J. Supercomput., 2012
Design strategy for optimizing power consumption of sensor node with Min(<i>N</i>, <i>T</i>) policy M/G/1 queuing models.
Int. J. Commun. Syst., 2012
A rate-allocation based multi-path control scheme for event-driven wireless sensor networks on constant event packet rates.
Comput. Syst. Sci. Eng., 2012
Optimization technique on logistic economy for cloud computing using finite-source queuing systems.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012
2011
Comput. Math. Appl., 2011
Longevity Enhancement Technique on IEEE 802.15.4/ZigBee Sensor Network Using D-Policy M/G/1 Queuing Model.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011
2010
Improving reliability of a heterogeneous grid-based intrusion detection platform using levels of redundancies.
Future Gener. Comput. Syst., 2010
Modeling and Prolonging Techniques on Operational Lifetime of Wireless Sensor Networks.
Proceedings of the 13th IEEE International Conference on Computational Science and Engineering, 2010
Lifetime Security Improvement in Wireless Sensor Network Using Queue-Based Techniques.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
2009
Design approaches for optimizing power consumption of sensor node with N-policy M/G/1 queuing model.
Proceedings of the 4th International Conference on Queueing Theory and Network Applications, 2009
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009
2008
Node-Disjoint Alternative Dual-Path Routing for Data Salvation in Mobile Ad hoc Networks.
Proceedings of the Ninth International Conference on Parallel and Distributed Computing, 2008
An Effective Priority Queue-Based Scheme to Alleviate Malicious Packet Flows from Distributed DoS Attacks.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
2007
Intrusion Detection and Identification System Using Data Mining and Forensic Techniques.
Proceedings of the Advances in Information and Computer Security, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007