International Collaborative Partner of UTAR Global Research Network



Name Jehn-Ruey Jiang
Designation Professor Dr
Qualification BSc in Computer Science, Tung-Hai University, Taiwan.
MSc in Computer Science, National Tsing-Hua University, Taiwan.
PhD in Computer Science, National Tsing-Hua University, Taiwan.
Organization National Central University
Email jrjiang@csie.ncu.edu.tw
Tel No. 886-3-4227151
Fax No. 886-3-4222681
URL http://www.csie.ncu.edu.tw/~jrjiang/
UTAR Contact Person Dr Liew Soung Yue, syliew@utar.edu.my


Employment
  • Professor (2004 - current) Department of Computer Science and Information Engineering ,National Central University
  • Associate Professor (1998 - 2004) Department of Information Management, Hsuan Chuang University
  • Chairman (1999 – 2001) Department of Information Management, Hsuan Chuang University
  • Director (1999 – 2002) Computer Center,Hsuan Chuang University
  • Director (1998 – 1999) Library,Hsuan Chuang University
  • Associate Professor (1995 – 1996) Department of Information Management ,Chung-Yuan Christian University
  • Instructor (1991 – 1995)Department of Information Management,Chung-Yuan Christian University
  • Instructor (1989 – 1991) Computer Center, Yuan-Pei University
Teaching & Administration
  • Algorithmics
  • Peer-to-Peer Networking
  • Pervasive Computing
  • Principles of Programming Languages
  • Network Programming
  • Basic Computer Concepts
  • Data Structures
  • Computer Networks
  • Programming Languages
  • Distributed and Mobile Computing Seminar
  • Business Data Communications
  • Java Programming Languages
  • Database Applications
  • Database Programming
Research Interests
  • Distributed Algorithms
  • Mobile Ad Hoc Networks (MANETs)
  • Wireless Sensor Networks (WSNs)
  • Internet of Things (IoT)
  • Peer-to-Peer (P2P) Networks
  • Software Defined Networking (SDN)
Publications & Presentation
  • Ming-Kuei Yeh, Jehn-Ruey Jiang, and Shing-Tsaan Huang, “Four-ary query tree splitting with parallel responses for RFID tag anti-collision,” International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), to appear. (EI, SCI)
  • Jehn-Ruey Jiang, Chih-Ming Lin, Kai-Chao Cheng and Shing-Tsaan Huang, “Fingerprinting Localization with Cruciate DirectionalAntennas for Wireless Sensor Networks,” International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), to appear. (EI, SCI)
  • Yung-Liang Lai and Jehn-Ruey Jiang, “Pricing Resources in LTE Networks through Multi-Objective Optimization,” The Scientific World Journal, to appear. (EI, SCI)
  • Jehn-Ruey Jiang and Yung-Liang Lai, “Optimizing Sink-Connected Barrier Coverage in Wireless Sensor Networks,”International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), to appear. (EI, SCI)
  • Yung-Liang Lai and Jehn-Ruey Jiang, “A Genetic Algorithm for Data Mule Path Planning in Wireless Sensor Networks,” Applied Mathematics & Information Sciences (AMIS), Vol. 7, No.1, pp. 413-419, 2013. (EI, SCI)
  • Jehn-Ruey Jiang, Chih-Ming Lin, Feng-Yi Lin, and Shing-Tsaan Huang, “ALRD: AoA Localization with RSSI Differences ofDirectional Antennas for Wireless Sensor Networks,” International Journal of Distributed Sensor Networks, Vo 2013, Article ID529489, 10 pages, 2013.(SCI)
  • Yung-Liang Lai and Jehn-Ruey Jiang, “A 3-dimensional broadcast protocol with optimised transmission efficiency in wireless networks,” International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Vo 12, No. 4, pp. 205-215, 2013. (EI,SCI)
  • Chin-Ling Chen, Yu Chung Huang and Jehn Ruey Jiang, “A secure ownership transfer protocol using EPC global Gen-2 RFID,” Telecommunication Systems, Vol. 53, No. 4, pp. 387-399, 2013. (EI, SCI)
  • Yu-Chia Chang, Jehn-Ruey Jiang and Jang-Ping Sheu, “An Asynchronous Duty Cycle Adjustment MAC Protocol forWireless Sensor Networks,” Journal of Internet Technology, Vo 13, No.3, pp. 395-404, 2012. (EI, SCIE)
  • Jehn-Ruey Jiang and Yung-Liang Lai, “Wireless Broadcasting with Optimized Transmission Efficiency,” Journal of Information Science and Engineering (JISE), Vol. 28, No. 3, pp. 479- 502, 2012. (EI, SCI)
  • Ming-Kuei Yeh and Jehn-Ruey Jiang, “Parallel Splitting for RFID Tag Anti-Collision,” International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Vol. 8, No. 4, pp. 249-260, 2011. (EI, SCI)
  • Jehn-Ruey Jiang, Jang-Ping Sheu, Ching Tu, Jih-Wei Wu, “Anonymous Path Routing (APR) Protocol for Wireless SensorNetworks,” Journal of Information Science and Engineering (JISE), Vo 27, No. 4, pp. 657-680, 2011. (EI, SCI; IF=0.270)
  • Jehn-Ruey Jiang, “Nondominated Local Coteries for Resource Allocation in Grids and Clouds,” Information ProcessingLetters (IPL), Vo 111, No. 8, pp. 379 384, 2011. (EI, SCI; IF=0.612)
  • Jehn-Ruey Jiang, Yung-Liang Lai and Fu-Cheng Deng, “Mobile Robot Coordination and Navigation with Directional Antennas in Positionless Wireless Sensor Networks,”International Journal of Ad Hoc and Ubiquitous Computing(IJAHUC), Vo 7, No. 4, pp. 272-280, 2011. (EI, SCIE; IF=0.435)
  • Shun-Yun Hu, Jehn-Ruey Jiang and Bing-Yu Chen, “Peer-to-Peer 3D Streaming,” IEEE Internet Computing, Vo 14, No. 2,pp. 54-61, March/April 2010. (EI; SCI; IF=2.514)
  • Chi-Hung Tzeng, Jehn-Ruey Jiang and Shing-Tsaan Huang, “Size-Independent Self- Stabilizing Asynchronous PhaseSynchronization in General Graphs,” Journal of Information Science and Engineering, Vo 26, No. 4, pp. 1307-1322, 2010. (EI;SCI; IF=0.270)
  • Jehn-Ruey Jiang, Hung-Shiang Chen and Chao-Wei Hung, “Peer-to-Peer AOI Voice Chatting for Massively Multiplayer OnlineGames,” International Journal of Electrical Engineering (IJEE), Vo 17, No. 1, pp. 43-54, 2010. (EI)
  • Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang and Chuan-Wei Cheng, “Bandwidth-Aware Peer-to-Peer 3D Streaming,”International Journal of Advanced Media and Communication (IJAMC), Vo 4, Issue 4, pp. 324-342, 2010.
  • Jehn-RueyJiang and Tzu-Ming Sung, “Energy-Efficient Coverage and Connectivity Maintenance for Wireless Sensor Networks,”Journal of Networks, Vo 4, No. 6, pp. 403-410, August 2009. (EI)
  • Ming-Kuei Yeh, Jehn-Ruey Jiang and Shing-Tsaan Huang, “Adaptive Splitting and Pre- Signaling for RFID Tag Anti-Collision,” Computer Communications Journal, Vo 32, Issue 17, pp. 1862-1870, Nov. 2009. (EI, SCI; IF=0.816)
  • Mo-Che Chan, Shun-Yun Hu, and Jehn-Ruey Jiang, “Secure Peer-to-Peer 3D Streaming,” Multimedia Tools and Applications, Vo 45, Issue 1, pp. 369-384, May 2009. (EI, SCI; IF=0.914)
  • Chi-Hung Tzeng, Jehn-Ruey Jiang, and Shing-Tsaan Huang, “Self-stabilizing algorithms for the maximum planarization problemin complete bipartite networks,” Information Processing Letters (IPL), Vo 109, Issue 10, pp. 518-522, April 2009. (EI, SCI;IF=0.612)
  • Jehn-Ruey Jiang, Yu-Li Huang and Shun-Yun Hu, “Scalable AOI-cast for Peer-to-Peer Networked Virtual Environments,” Journal of Internet Technology, Vol. 10, No. 2, pp. 119-125, 2009. (EI; SCIE; IF=0.448)
  • Jehn-Ruey Jiang, Chung-Ta King, Chi-Shiang Liao and Ching-Hao Liu, “MUREX: A Mutable Replica Control Scheme for StructuredPeer-to-Peer Storage Systems,” International Journal of Pervasive Computing and Communications, Vo 5, Issue 1, pp. 9-24,2009.
  • Jehn-Ruey Jiang, Jiun-Shiang Chiou and Shun-Yun Hu, “Enhancing Neighborship Consistency for Peer-to-Peer Networked VirtualEnvironments,” Journal of Internet Technology, Vo 10, No. 1, pp. 477-484, 2009. (EI; SCIE; IF=0.448)
  • Guan-Yu Huang, Shun-Yun Hu and Jehn-Ruey Jiang, “Scalable Reputation Management with Trustworthy User Selection for P2PMMOGs,” International Journal of Advanced Media and Communication (IJAMC), Vo 2, Issue 4, 380-401, 2008.
  • Jehn-Ruey Jiang, “Expected Quorum Overlap Sizes of Quorum Systems for Asynchronous Power-Saving in Mobile Ad Hoc Networks,” Computer Networks, Volume 52, Issue 17, pp.3296-3306, 2008. (EI, SCI; IF=1.176)
  • Mo-CheChan, Shun-Yun Hu, Jehn-Ruey Jiang, An Efficient and Secure Event Signature(EASES) Protocol for Peer-to-PeerMassively Multiplayer Online Games,Computer Networks, Vol. 52, Issue 9, pp. 1838-1845, June 2008. (EI, SCI; IF=1.176)
  • Jehn-Ruey Jiang, Chau-Yuan Yang, Ting-Yao Chiou and Shing-Tsaan Huang, ;A Hybrid Power-Saving Protocol by Dual-Channel and Dual-Transmission-Range Clustering for IEEE 802.11-Based MANETs,International Journal of Pervasive Computing and Communications, Vol. 3, Issue 3, pp. 227-242, 2007.
  • Chi-Hung Tzeng, Jehn-Ruey Jiang and Shing-Tsaan Huang, “A Self-Stabilizing (+4)-Edge- Coloring Algorithm for Planar Graphsin Anonymous Uniform Systems,” Information Processing Letters (IPL), Vol. 101, No. 4, pp. 168-173, February 2007. (EI, SCI;IF=0.612)
  • Jehn-Ruey Jiang, Yu-Chee Tseng, Chih-Shun Hsu and Ten-Hwang Lai, “Quorum-based asynchronous power-saving protocolsfor IEEE 802.11 ad hoc networks,” ACM Journal on Mobile Networks and Applications, Vol. 10, Issue 1-2, pp. 169–181, Feb.2005. (EI, SCI; IF=0.683)
  • Jehn-Ruey Jiang, Bing-Rong Lin, and Yu-Chee Tseng, “Analysis of Bluetooth device discovery and some speedupmechanisms,”International Journal of Electrical Engineering, Vol. 11, No. 4, pp. 301-310, Nov. 2004. (EI)
  • Jehn-Ruey Jiang, “On the nondomination of cohorts coteries,” IEEE Transactions on Computers, Vol. 53, No. 7, pp. 922-923, July 2004. (EI, SCI; IF=1.608)
  • Yu-Chee Tseng, Jehn-Ruey Jiang, and Jih-Hsin Lee, “Secure bootstrapping and routing in an IPv6-based ad hoc network,” Journal of Internet Technology, Vol. 5, No. 2, pp.123-130, Feb. 2004.(EI;SCIE; IF=0.448)
  • Jehn-Ruey Jiang, Shing-Tsaan Huang and Yu-Chen Kuo, “Cohorts structures for fault-tolerant k entries to a critical section,” IEEETransactions on Computers, Vol. 46, No. 2, pp. 222-228, Feb. 1997. (EI; SCI; IF=1.608)
  • Jehn-Ruey Jiang, “The column protocol: a high availability and low message cost solution for managing replicated data,”International Journal of Information Systems, Vol. 20, No. 8, pp.687-696, Dec. 1995. (EI; SCI IF=1.595)
International Conference Papers
  • Ming-Kuei Yeh and Jehn-Ruey Jiang, “A Novel Query Tree Protocol Based on Partial Responses for RFID Tag Anti-Collision,” Proc. of the 1st International Workshop on Internet of Things Technologies (IoTT 2013), 2013.
  • Jehn-Ruey Jiang, Chih-Ming Lin, Feng-Yi Lin and Shing-Tsaan Huang, “ALRD: AoA Localization with RSSI Differences ofDirectional Antennas for Wireless Sensor Networks,” in Proc. of 2012 Information Society (i-Society 2012), 2012.
  • Yung-Liang Lai, Hsueh-Chi Shih and Jehn-Ruey Jiang, “Strategies of Mobile Agents on Malicious Clouds,” Proc. of the 18th Americas Conference on Information Systems, Aug 9-11,2012.
  • Mo-Che Chan, Jehn-Ruey Jiang and Shing-Tsaan Huang, “Fault-Tolerant and Secure Networked Storage,” Proc. of the7th International Conference on Digital Information Management (ICDIM 2012), 2012.
  • Jung-Shyr Wu, Shun-Fang Yang, Chia-Ming Hsu, Jiun-Yu Tu and Jehn-Ruey Jiang, “User Satisfaction-Based SchedulingAlgorithm for Uplink Transmission in Long Term Evolution System,” Proc. of the IEEE ICPADS Workshop on DistributedCommunication Network System, 2012.
  • Yu-Chung Huang and Jehn-Ruey Jiang, “An Ultralightweight Mutual Authentication Protocol for EPC C1G2 RFID Tags,” Proc. of 2012International Symposium on Parallel Architectures, Algorithms and Programming (PAAP'12), 2012.
  • Yung-Liang Lai and Jehn-Ruey Jiang, “Barrier Coverage with Optimized Quality for Wireless Sensor Networks,” Proc. of the 15thInternational Symposium on Wireless Personal Multimedia Communications Symposium (WPMC'12), 2012.
  • Yung-Liang Lai and Jehn-Ruey Jiang, “Sink-Connected Barrier Coverage Optimization for Wireless Sensor Networks,” Proc. of2011 International Conference on Wireless and Mobile Communications (ICWMC 2011), 2011.
  • Yung-Liang Lai and Jehn-Ruey Jiang, “Heuristic Resource Allocation with Satisfaction for WiMAX Services,” Proc. of 2011 International Conference on Wireless Networks, 2011.
  • Yung-Liang Lai and Jehn-Ruey Jiang, “Optimal Multipath Planning for Neyman-Pearson Detection in Wireless SensorNetworks,” Proc. of 2011 International Workshop on Applications of Wireless Ad Hoc and Sensor Networks (AWASN 2011), 2011.
  • Ming-Kuei Yeh, Jehn-Ruey Jiang, and Shing-Tsaan Huang, “Parallel Response Query Tree Splitting for RFID Tag Anti-Collision,” Proc. of 2011 International Workshop on Applications of Wireless Ad Hoc and Sensor Networks (AWASN 2011),2011.
  • Ta-Yu Huang, Chih-Ming Lin, Jehn-Ruey Jiang, Wei Tsang Ooi, Maha Abdallah, and Khaled Boussetta, “SYMA: A Synchronous Multihop Architecture for Wireless Ad Hoc Multiplayer Games,” Proc. of 5th International Workshop on Peer-to-Peer NetworkedVirtual Environments (P2PNVE 2011), 2011.
  • Chi-Wen Fann, Jehn-Ruey Jiang and Jih-Wei Wu, “Peer-to-Peer Immersive Voice Communication for Massively MultiplayerOnline Games,” Proc. of 5th International Workshop on Peer-to-Peer Networked Virtual Environments (P2PNVE 2011), 2011.
  • Shun-Yun Hu, Chuan Wu, Eliya Buyukkaya, Chien-Hao Chien, Tzu-Hao Lin, Maha Abdallah, Jehn-Ruey Jiang, and Kuan-Ta Chen,“A Spatial Publish Subscribe Overlay for Massively Multiuser Virtual Environments,” Proc. of 2010 International Conference onElectronics and Information Engineering (ICEIE 2010), Aug. 2010.
  • Jehn-Ruey Jiang, Chih-Ming Lin and Yi-Jia Hsu, “Localization with Rotatable Directional Antennas for Wireless SensorNetworks,” Proc. of 2010 International Workshop on Applications of Wireless Ad Hoc and Sensor Networks (AWASN 2010), 2010.
  • Yung-Liang Lai and Jehn-Ruey Jiang, “Optimal Multipath Planning for Intrusion Detection in Smart Homes Using Wireless Sensor and Actor Networks,” Proc of 2010 International Workshop on Applications of Wireless Ad Hoc and Sensor Networks(AWASN 2010), 2010.
  • Jehn-Ruey Jiang, Chao-Wei Hung, and Jih-Wei Wu, “Bandwidth- and Latency-Aware Peer-to- Peer Friendcast for Online SocialNetworks,” Proc. of 4th International Workshop on Peer-to- Peer Networked Virtual Environments (P2P-NVE 2010), 2010.
  • Jehn-Ruey Jiang, Ching-Chuan Huang, and Chung-Hsien Tsai, “Avatar Path Clustering in Networked Virtual Environments,”Proc. of 4th International Workshop on Peer-to-Peer Networked Virtual Environment (P2P-NVE 2010), 2010.
  • Yung-Liang Lai and Jehn-Ruey Jiang, “Broadcasting with Optimized Transmission Efficiency in 3-Dimensional Wireless Networks,”Proc. of International Conference on Parallel and Distributed Systems (ICPADS 2009), 2009.
  • Mo-Che Chan, Jehn-Ruey Jiang, Chao-Wei Chao-Wei Hung, and Wei Tsang Ooi, “Group- Based Peer-to-Peer 3D StreamingAuthentication,” Proc. of 3rd International Workshop on Peer-to-Peer Network Virtual Environments (P2PNVE 2009), 2009.
  • Chien-Hao Chien, Shun-Yun Hu and Jehn-Ruey Jiang, “Bandwidth-Aware Peer-to-Peer 3D Streaming,” Proc. of NetGames 2009, 2009.
  • Yung-Liang Lai and Jehn-Ruey Jiang, “Broadcasting with Optimized Transmission Efficiency in Wireless Networks,” Proc. of 5thInternational Conference on Wireless and Mobile Communications (ICWMC 2009), 2009.
  • Yung-Liang Lai and Jehn-Ruey Jiang, “Optimal Path Planning for Fault-Tolerant and Energy- Efficient Target Surveillance inWireless Sensor and Actor Networks,” Proc. of 2nd International Workshop on Sensor Network Technologies for InformationExplosion Era,2009.
  • Shun-Yun Hu and Jehn-Ruey Jiang, “Plug: Virtual Worlds for Millions of People,” Proc. of 2nd International Workshop on Peer-to-Peer Network Virtual Environments (P2P-NVE 2008), 2008.
  • Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang, “Delaunay State Management for Large- Scale Networked VirtualEnvironments,” Proc. of 2nd International Workshop on Peer-to- Peer Network Virtual Environments (P2P-NVE 2008), 2008
  • Jehn-Ruey Jiang, Jih-Wei Wu, and Guan-Shien Du, “Energy-Efficient and Traffic-Dispersive Event Contour Tracking in Multi-Sink Wireless Sensor Networks,” Proc. of 1st IEEE International Workshop on Wireless Network Algorithms (WiNA’08), 2008.
  • Yu-Chia Chang, Jehn-Ruey Jiang, Jang-Ping Sheu and Hsin-Yi Shih, “ADCA: An Asynchronous Duty Cycle Adjustment MAC Protocol for Wireless Sensor Networks,” Proc. of 2008 IEEE Global Telecommunications Conference (GLOBECOM’08 ), 2008.
  • Jehn-Ruey Jiang, Yeong-Liang Lai and Fu-Cheng Deng, “Mobile Robot Coordination and Navigation with Directional Antennas in Positionless Wireless Sensor Networks,” Proc. of2008 ACM International Workshop on Sensor, Ad Hoc, and Mesh Networks (SAMnet 2008), 2008.
  • Wei-Lun Sung, Shun-Yun Hu and Jehn-Ruey Jiang, “Selection Strategies for Peer-to-Peer 3D Streaming,” Proc. of InternationalWorkshop on Network and Operating Systems Support for Digital Audio & Video (NOSSDAV 2008), 2008.
  • Guan-Yu Huang, Shun-Yun Hu, and Jehn-Ruey Jiang, “Scalable Reputation Management for P2P MMOGs,” Proc. of IEEE Virtual Reality (IEEE VR) Workshop on Massively Multiuser Virtual Environment (MMVE), 2008.
  • Jehn-Ruey Jiang, Yu-Li Huang and Shun-Yun Hu, “Scalable AOI-Cast for Peer-to-Peer Networked Virtual Environments,” Proc. of 2nd IEEE International Workshop on Cooperative Distributed Systems (CDS'08) in conjunction with 28thInternational Conference on Distributed Computing Systems, 2008.
  • Shun-Yun Hu, Ting-Hao Huang, Shao-Chen Chang, Wei-Lun Sung, Jehn-Ruey Jiang, and Bing-Yu Chen, “FLoD: A Framework for Peer-to-Peer 3D Streaming,” Proc. of 27th IEEE International Conference on Computer Communications (INFOCOM 2008),2008.
  • Shun-Yun Hu, Shao-Chen Chang, and Jehn-Ruey Jiang, “Voronoi State Management for Peer- to-Peer Massively Multiplayer Online Games,” Proc. of 4th IEEE International Workshop on Networking Issues in Multimedia Entertainment (NIME’08) in conjunctionwith 5th IEEE Consumer Communications and Networking Conference (CCNC’08), 2008.
  • Jang-Ping Sheu, Jehn-Ruey Jiang, and Ching Tu, “Anonymous Path Routing in Wireless Sensor Networks,” Proc. of 2008 IEEE International Conference on Communications (ICC2008), 2008.
  • Jehn-Ruey Jiang and Tzu-Ming Sung, “Maintaining Connected Coverage for Wireless Sensor Networks,” Proc. of 5th Workshop onWireless Ad hoc and Sensor Networks (WWASN 2008) in conjunction with 28th International Conference on DistributedComputing Systems (ICDCS’08), 2008.
  • Jehn-Ruey Jiang and Hung-Shiang Chen, “Peer-to-Peer AOI Voice Chatting for Massively Multiplayer Online Games,” Proc. of1st International Workshop on Peer-to-Peer Network Virtual Environments (P2P-NVE2007) in conjunction with 2007International Conference on Parallel and Distributed Systems (ICPADS’07), 2007.
  • Ming-Kuei Yeh and Jehn-Ruey Jiang, “Adaptive k-Way Splitting and Pre-Signaling for RFID Tag Anti-Collision,” Proc. of 33rdAnnual Conference of the IEEE Industrial Electronics Society (IECON'07), 2007.
  • Jehn-Ruey Jiang, Jiun-Shiang Chiou and Shun-Yun Hu, “Enhancing Neighborship Consistency for Peer-to-Peer Distributed Virtual Environments,” Proc. of 1st IEEE International Workshop on Cooperative Distributed Systems (CDS’07), 2007.
  • Mo-Che Chan, Shun-Yun Hu, Jehn-Ruey Jiang, “An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-peerMassively Multiplayer Online Games ,” Proc. of NETWORKING 2007, 2007.
  • Jehn-Ruey Jiang and Wei-Jiun Ling, “SEEKER: An Adaptive and Scalable Location Service for Mobile Ad Hoc Networks,” Proc. of International Computer Symposium 2006 (ICS 2006), 2006.
  • Chi-Hung Tzeng, Jehn-Ruey Jiang, and Shing-Tsaan Huang, “Self-Stabilizing Asynchronous Phase Synchronization in GeneralGraphs,” Proc. of 8th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2006),Lecture Notes in Computer Science (LNCS), vol. 4280, pp. 501-515, 2006.
  • Jehn-Ruey Jiang, Chung-Ta King, Chi-Shiang Liao, “MUREX: A Mutable Replica Control Scheme for Structured Peer-to-PeerStorage Systems,” Proc. of 1st International Conference on Grid and Pervasive Computing (GPC’06), Lecture Notes in ComputerScience (LNCS), vol. 3947, pp. 93-102, 2006.
  • Jehn-Ruey Jiang, “A Fault-Tolerant h-out of-k Mutual Exclusion Algorithm Using Cohorts Coteries for Distributed Systems,” Proc.of 5th International Conference on Parallel and Distributed Computing, Application and Technologies PDCAT’04, Lecture Notes inComputer Science (LNCS), vol. 3320, pp. 267-273, 2004.
  • Jehn-Ruey Jiang, “A Distributed Group k-Exclusion Algorithm using k-Write-Read Coteries,” Proc. of International ComputerSymposium 2004 (ICS’04), 2004.
  • Jehn-Ruey Jiang, “Prioritized h-out of-k Mutual Exclusion for Mobile Ad Hoc Networks and Distributed Systems,” Proc. of 15thInternational Conference on Parallel and Distributed Computing and Systems (PDCS 2003), 2003.
  • Jehn-Ruey Jiang, “A Group k-Mutual Exclusion Algorithm for Distributed Systems,” Proc. of 15th International Conference on Parallel and Distributed Computing and Systems (PDCS 2003), 2003.
  • Jehn-Ruey Jiang, Cheng-Sheng Chou and Shing-Tsaan Huang, “Constructing Nondominated Local Coteries for DistributedResource Allocation,” Proc. of ICPP Workshop on Compile/Runtime Techniques for Parallel Computing, 2003.
  • Yu-Chee Tseng, Jehn-Ruey Jiang, and Jih-Hsin Lee, “Secure Bootstrapping and Routing in an IPv6 Based Ad Hoc Network,” Proc. of ICPP Workshop on Wireless Security and Privacy2003, 2003.
  • Jehn-Ruey Jiang, Yu-Chee Tseng, Chih-Shun Hsu and Ten-Hwang Lai, “Quorum-Based Asynchronous Power-Saving Protocols for IEEE 802.11 Ad Hoc Networks,” Proc. of International Conference oParallel Processing 2003 (ICPP'03), 2003.(Best Paper Award)
  • Jehn-Ruey Jiang, “A prioritized h-out of-k mutual exclusion algorithm with maximum degree of concurrency for mobile ad hoc networks and distributed systems,” Proc. of 4th International Conference on Parallel and Distributed Computing, Application and Technologies (PDCAT’03), 2003.
  • Jehn-Ruey Jiang, “Distributed h-out of-k mutual exclusion using k-coteries,” Proc. of 3rd International Conference on Paralleland Distributed Computing, Application and Technologies (PDCAT’02), pp. 218-226, Sep. 2002.
  • Jehn-Ruey Jiang, “A distributed h-out of-k mutual exclusion algorithm for ad hoc mobile networks,” Proc. of 2002 International Parallel and Distributed Processing Symposium (IPDPS’02) - 2nd International Workshop on Parallel andDistributed Computing Issues in Wireless Networks and Mobile Computing, April 2002.
  • Jehn-Ruey Jiang, “A group mutual exclusion algorithm for ad hoc mobile networks,” Proc. of 6th International Conference on Computer Science and Informatics, pp. 266-270, March 2002.
  • Jehn-Ruey Jiang, “Secret Sharing via Nondominated Write-Read Coteries,” Proc. of 13th International Conference onParallel and Distributed Computing and Systems (PDCS’01), Anaheim, CA, pp. 561-565, Aug. 2001.
  • Jehn-Ruey Jiang, “Self-stabilizing, randomized k-value unison clocks for unidirectional uniform rings,” Proc. of 11th International Conference on Parallel and Distributed Computing and Systems (PDCS’99), Boston, MA, Nov. 1999.
  • Jehn-Ruey Jiang, “A framework for fault-tolerant distributed mutual exclusion and replica control using grid structures,” Proc.of 8th International Conference on Parallel and Distributed Computing and Systems (PDCS’96), pp.311-315, Chicago, IL, Oct.1996.
  • Jehn-Ruey Jiang, “Scalable spin locks for k-exclusion on shared-memory multiprocessors,” Proc. of 8th International Conference on Parallel and Distributed Computing and Systems (PDCS’96), pp.242-244, Chicago, IL, Oct. 1996.
  • Jehn-Ruey Jiang, “Fault-tolerant distributed mutual exclusion with O(1) message overhead,” Proc. of 13th International Conference on Applied Informatics, pp.228-231, Austria, Feb.1995.
  • Jehn-Ruey Jiang and Shing-Tsaan Huang, “Obtaining nondominated k-coteries for fault- tolerant disributed k-mutualexclusion,” Proc. of International Conference on Parallel and Distributed Systems 1994 (ICPADS’94), pp.582-587, Hsinchu, Dec.1994.
  • Shing-Tsaan Huang, Jehn-Ruey Jiang and Yu-Chen Kuo, “k-Coteries for fault-tolerant k entries to a critical section,” Proc. of13th IEEE International Conference on Distributed Computing Systems, pp.74-81, Pittsburgh, PA, May 1993.
Local Journal Papers
  • Jehn-Ruey Jiang, “A distributed h-out of-k mutual exclusion algorithm with maximum degree of concurrency for mobile ad hoc networks,” Hsuan Chuang Management Journal, Vol. 2, pp. 63-86, March 2004.
  • Jehn-Ruey Jiang, “Prioritized h-out of-k resource allocation for mobile ad hoc networks and distributed systems,”Journal of Hsuan Chuang College, Vol. 7, pp. 143-166, 2003.
  • Yu-Chee Tseng and Jehn-Ruey Jiang, “Secure autoconfiguration and routing in an IPv6-based ad hoc network,” Journal of Hsuan Chuang College, Vol. 7, pp. 233-254, 2003.
  • Jehn-Ruey Jiang, Yu-Chee Tseng and Ten-Hwang Lai, “Asynchronous power-saving protocols via quorum systems for IEEE 802.11ad hoc networks,” Journal of Hsuan Chuang College, Vol. 7, pp. 81-108, 2003.
  • Jehn-Ruey Jiang, “Self-stabilizing k-value unison clocks for unidirectional uniform rings,” Journal of Hsuan Chuang College, Vol. 3, pp. 113-121, 2001.
  • Jehn-Ruey Jiang, “A write-read coterie secret sharing scheme,” Journal of Hsuan Chuang College, Vol. 3, pp. 37-51, 2001.
Local Conference Papers
  • Ji-Hau Liao, Wei-Ting So, and Jehn-Ruey Jiang, “Optimized Charger Deployment for Wireless Rechargeable SensorNetworks,” Proc. of the 9th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2013), 2013. (in Chinese) (BestPaper Award)
  • Ming-Kuei Yeh, Shing-Tsaan Huang, and Jehn-Ruey Jiang, “An RFID Tag Anti-Collision Protocol Using Parallel Splitting andMerging,” Proc. of the 9th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2013), 2013.
  • Wei-Ting So, Yu-Shun Liu, Jiun-Yu Tu, Jehn-Ruey Jiang, and Jung-Shyr Wu, “Satisfaction- based LTE Uplink Scheduling,” Proc. ofthe 9th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2013), 2013. (in Chinese)
  • Chieh-Chun Huang, Shih-Yi Chan, Jehn-Ruey Jiang, and Jiun-Yu Tu, “Multi-Channel and Time-Slot Scheduling for BarrierCoverage in WSNs,” Proc. of the 9th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2013), 2013. (in Chinese)
  • Yung-Liang Lai and Jehn-Ruey Jiang, “Barrier Coverage Repairing for the Wireless Sensor Network with a Mobile Robot,” Proc.of the 8th Workshop on Wireless, Ad hoc, and SensorNetworks (WASN 2012), 2012. (in Chinese)
  • Yu-Chung Huang, Jehn-Ruey Jiang and Shing-Tsaan Huang, “An Ultralightweight Mutual Authentication Protocol for EPC C1G2RFID Tags,” Proc. of the 8th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2012), 2012.
  • Jih-Wei Wu, Ding-Wei Chou and Jehn-Ruey Jiang, “VEoT (Virtual Environment of Things): An Architecture for Inter-acting withSmart Things in Networked Virtual Environments,” Proc. of the 8th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN2012), 2012.
  • Jehn-Ruey Jiang, Chih-Ming Lin, and Ta-Yu Huang, “A Performance Study on the Synchronous Multihop Architecture for Wireless Ad Hoc Multiplayer Games,” Proc. of the 17th Mobile Computing Workshop, 2012.
  • Chih-Ming Lin, Jehn-Ruey Jiang and Shing-Tsaan Huang, “Data Recoverable Multidimensional Aggregation forWireless Sensor Networks,” Proc. of 7th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2011), 2011. (Best PaperAward)
  • Chuan-Wei Cheng and Jehn-Ruey Jiang, “非結構式同儕網路拓樸調整,” Proc. of National Computer Symposium (NCS 2011), 2011. (Best Paper Award Nomination)
  • Yung-Liang Lai and Jehn-Ruey Jiang, “具有資料彙集節點連通性的邊界覆蓋之無線感測網路最佳化規劃 ,” Proc. of 28th Workshop on Combinatorial Mathematics and Computational Theory, 2011.
  • Chih-Ming Lin and Jehn-Ruey Jiang, “無線感測網路的多維資料聚合與還原機制,” Proc. of the 1st National Conference on Web Intelligence and Applications (NCWIA2011), 2011
  • Ming-Kuei Yeh, Shing-Tsaan Huang and Jehn-Ruey Jiang, “Parallel Splitting and Merging for RFID Tag Anti-collision,” Proc. of2010 Cross-Strait Information Technology Conference (CSIT 2010), 2010. (in Chinese)
  • Jyun-Jie Huang, Jih-Wei Wu and Jehn-Ruey Jiang, “IM Finder: Searching for Answers via Instant Message Networks,” Proc. of National Computer Symposium (NCS 2009), 2009.
  • Ming-Kuei Yeh and Jehn-Ruey Jiang, “A Counter-Based RFID Anti-Collision Protocol Using Parallel Splitting,” Proc. of 5th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2009), 2009. (Best Paper Award)
  • G. M. Lin, I. C. Sheu and Jehn-Ruey Jiang, “Localization with Rotating Directional Antennas for Wireless Sensor Networks,” Proc.of 2009 Cross-Strait Information Technology Conference (CSIT 2009), 2009. (in Chinese)
  • Chien-Hao Chien and Jehn-Ruey Jiang, “Bandwidth-Aware Peer-to-Peer 3D Streaming,” Proc. of 2009 Cross-Strait InformationTechnology Conference (CSIT 2009), 2009. (in Chinese)
  • Jehn-Ruey Jiang, “Expected Quorum Overlap Sizes of Optimal Quorum Systems with the Rotation Closure Property forAsynchronous Power-Saving Algorithms in Mobile Ad Hoc Networks,” Proc. of 25th Workshop on Combinatorial Mathematicsand Computational Theory, 2008.
  • Jehn-Ruey Jiang and Fu-Cheng Deng, “Mobile Robot Navigation with Directional Antennas in Positionless Wireless SensorNetworks,” Proc. of 2008 Cross-Strait Information Technology Conference (CSIT 2008), 2008.
  • Kuan Shian Duh and Jehn-Ruey Jiang, “Energy-Efficient Event Contour Tracking in Multi- Sink Wireless Sensor Networks,” Proc.of 2008 Cross-Strait Information Technology Conference (CSIT 2008), 2008.
  • Jehn-Ruey Jiang, I-Chuan Chen and Fu-Cheng Deng, “3-Beacon 3D Localization for Wireless Sensor Networks,” (in Chinese),Proc. of 3rd Workshop on Wireless, Ad hoc, and Sensor Networks, 2007.
  • Jehn-Ruey Jiang, Chi-Hsiang Liao, and Jiun-Shiang Chiou, “A Mutable Replica Control Scheme for Structured P2P Storage Systems,” Proc. of 2006 Cross-Strait Information Technology Conference (CSIT 2006), 2006.
  • Jehn-Ruey Jiang, “Energy-Efficient Coverage and Connectivity Maintenance for Wireless Sensor Networks,” (in Chinese), Proc.of 2nd Workshop on Wireless, Ad hoc, and Sensor Networks, 2006.
  • Jehn-Ruey Jiang and Ming-Kuei Yeh, “The Design Concept of U-Guide Ubiquitous Learning System,” Proc. of 2nd Workshop on Wireless, Ad hoc, and Sensor Networks, 2006.
  • Jehn-Ruey Jiang, Chau-Yuan Yang, and Ting-Yao Chiou, “A Hybrid Power-Saving Protocol by Dual-Channel and Dual-Transmission-Range Clustering in IEEE 802.11 MANETs,” Proc. of Workshop on Wireless, Ad hoc, and Sensor Networks, 2005.
  • Jehn-Ruey Jiang, “Analyzing Average-Case Neighbor Sensibilities for Quorum-Based Asynchronous Power-Saving Protocols inan IEEE 802.11 MANET,” Proc. of Workshop on Wireless, Ad hoc, andSensor Networks, 2005.
  • Jehn-Ruey Jiang, “Perfect Multi-Group Secret Sharing via Nondominated DIV k-Coteries,” Proc. of 22nd Workshop on Combinatorial Mathematics and Computational Theory, 2005.
  • Jehn-Ruey Jiang, “Ideal and Perfect Secret Sharing for Fault-Tolerant Distributed Access Control of Secure Data viaNondominated Bicoteries,” Proc. of 21st Workshop on Combinatorial Mathematics and Computational Theory, 2004.
  • Jehn-Ruey Jiang, Bing-Rong Lin, and Yu Chee Tseng, “A mechanisms for quick Bluetooth device discovery,” Proc. of MobileComputing 2004, 2004. (Excellent Paper Award)
  • Jehn-Ruey Jiang and Shing-Tsaan Huang, “Fault-tolerant distributed k-mutual exclusion with constant expected message cost,” Proc. of 1995 Workshop on Distributed System Technologies and Applications, pp.104-110, Tainan, July 1995.
Monography Papers
Quarterly Activites
January - March 2018
  • The Faculty is nominating Prof. Jiang to be the external examiner for the Master's student Jacqueline Ang Lee Fang, who has passed her work completion seminar
  • An MoU draft for Mutual Credit Recognition with NCU has been sent through Prof. Jiang to the current HoD Prof. Fu-Hau Hsu for NCU's review
October - December 2017
  • No report received.
July - September 2017
  • Through email communication to discuss the dual Master's and PhD degrees with the Department of Computer Science and Information Engineering at National Central University, Taiwan
April - June 2017
  • Report to follow
January - March 2017
  • Through email communication to discuss the dual Master's and PhD degrees with the Department of Computer Science and Information Engineering at National Central University, Taiwan
October - December 2016
  • Through email communication to discuss the dual Master's and PhD degrees with the Department of Computer Science and Information Engineering at National Central University, Taiwan
July - September 2016
  • No report received from contact person
April - June 2016
  • Jointly organizing focus session in Progress in Electromagnetics Research Symposium (PIERS) in Shanghai 2016).
January - March 2016
  • Jointly organizing focus session in Progress in Electromagnetics Research Symposium (PIERS) in Shanghai 2016).
October - December 2015
  • We jointly organized a focused session in the Progress in Electromagnetics Research Symposium, Shanghai, China, 8-11 August, 2016.
July - September 2015
  • Prof. Du Yang, Zhejiang University. Jointly organize with me a focus session in Progress in Electromagnetic Research Symposium PIERS (Shanghai)
April - June 2015
  • Jointly organising conference session at Progress in Electromagetics research Symposium (PIERS) ,6-9 July, Prague, Chezh Republic
January - March 2015
  • Prof Yang Du & Prof Ewe is organizing a conference session for Progress in Electromagnectis Research Symposium, in Prague, Czech Republic, 6-9 July 2015.
October - December 2014
  • Prof. Du Yang, we jointly organize a conference session during the coming Progress in Electromagnetics Research Symposium (PIERS) in Prague, July 2015.
July - September 2014
  • Submission of a book chapter for compilation by ICP to publish a book on remote sensing
April - June 2014
  • Finalizing of book chapter edited by Porf Du YangA joint scientific paper manuscript on a research study on bacteria diversity in disused mining ponds in Kampar under MTSF grant has been accepted by World Journal of Microbiology and Biotechnology (ISI indexed)
January - March 2014
  • Submission of Book Chapter for publication. (Feb, 2014)
October - December 2013
  • ICP has invited Utar staff to contribute in book chapter edited by him.
  • ICP has presented paper in ISMOT 2013 organized by Utar
July - September 2013
  • Joint publication of book chapters on Electromagnetic Fields (June 2013 - April 2014).
April - June 2013
  • Jointly organizing conference session in Progress in Electromagnetics Research Symposium (PIERS)
January - March 2013
  • Co-Organizing and co-session chair in Progress in Electromagnetics Research Symposium in Taipei, Taiwan, 25-28 March, 2013.
October - December 2012
  • Joint organizing of technical session for PIERS conference 2013 in Taipei. Working together on the publication of a book on remote sensing
July - September 2012
  • Co-organizing of session, Progress in Electromagnetics Research Symposium (PIERS), March 2013, Taipei
  • Planning of book chapter on microwave remote sensing
April - June 2012
  • Continuous collaborations
  • Co-organized with me a technical session in 31st Progress in Electromgnetics Research Symposium, Kuala Lumpur, March 27-30, 2012
January - March 2012
  • Joint organizing of session in Progress in Electromagnetic Research Symposium 2012 in Kuala Lumpur (26-30, March 2012).
October - December 2011
  • Joint organize coming session in Progress in Electromagnetic Research Symposium in Kuala Lumpur
July - September 2011
  • Joint organizing of session in Progress in Electromagnetic Research Symposium 2011 in Suzhou (14-17, Sept 2011).
April - June 2011
  • Discussion of PIERS conference session organizing and exchange of research ideas.
January - March 2011
  • Co-organizing a session in the coming Progress in Electromagnectics Research Symposium (September 2011) in Suzhou, China.
October - December 2010
  • Co-organized a session in Progress in Electromagnetics Research Symposium in Suzhou, China in September 2011
July - September 2010
  • Joint organizing a session in Progress in Electromagnetics Research Symposium, Sept 2010
April - June 2010
  • Joint Research Project (Multiple Scattering of Cylinders)
  • Joint organizing of international conference session
January - March 2010
  • Joint Conference paper presentation and meeting discussion in conference
March - August 2009
  • Discussion on Research Project: Microwave Remote Sensing, July 8, 2009, 10.00 am, Shanghai.
  • Presentation of research paper in IEEE IGARSS 2009.
  • Wenzhe Yan, Dawei Liu, H.T. Ewe and Du Yang, "Electromagnetic Scattering from Multiple Cylinders," International Geoscience and Remote Sensing Symposium, July 12-17 2009, Cape Town, South Africa.