Name:
Jehn-Ruey Jiang
Designation:
Professor Dr
Qualification:
BSc in Computer Science, Tung-Hai University, Taiwan.
MSc in Computer Science, National Tsing-Hua University, Taiwan.
PhD in Computer Science, National Tsing-Hua University, Taiwan.
Organization:
National Central University
Email:
jiangjr@utar.edu.my
Email2:
jrjiang@csie.ncu.edu.tw
Tel no. :
886-3-4227151
Fax no. :
886-3-4222681
URL:
http://www.csie.ncu.edu.tw/~jrjiang/
Profile
Involvement with UTAR in academic & research


Contact Person:
  - Dr Liew Soung Yue
(Faculty of Information and Communication Technology)

Employment

  • Professor (2004 - current) Department of Computer Science and Information Engineering ,National Central University
  • Associate Professor (1998 - 2004) Department of Information Management,  Hsuan Chuang University
  • Chairman (1999 – 2001) Department of Information Management, Hsuan Chuang University
  • Director (1999 – 2002) Computer Center,Hsuan Chuang University
  • Director (1998 – 1999) Library,Hsuan Chuang University
  • Associate Professor (1995 – 1996) Department of Information Management ,Chung-Yuan Christian University
  • Instructor (1991 – 1995)Department of Information Management,Chung-Yuan Christian University
  • Instructor (1989 – 1991) Computer Center, Yuan-Pei University

Teaching & Administration

  •  Algorithmics
  • Peer-to-Peer Networking
  • Pervasive Computing
  • Principles of Programming Languages
  • Network Programming
  • Basic Computer Concepts
  • Data Structures
  • Computer Networks
  • Programming Languages
  • Distributed and Mobile Computing Seminar
  • Business Data Communications
  • Java Programming Languages
  • Database Applications
  • Database Programming

Research Interests

1.    Distributed Algorithms
2.    Mobile Ad Hoc Networks (MANETs)
3.    Wireless Sensor Networks (WSNs)
4.    Internet of Things (IoT)
5.    Peer-to-Peer (P2P) Networks
6.    Software Defined Networking (SDN)

Publications & Presentations

 

Journal Papers

 

1.   Ming-Kuei Yeh, Jehn-Ruey Jiang, and Shing-Tsaan Huang, Four-ary query tree splitting with parallel responses for RFID tag anti-collision,International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), to appear. (EI, SCI)

 

2.   Jehn-Ruey Jiang, Chih-Ming Lin, Kai-Chao Cheng and Shing-Tsaan Huang, Fingerprinting Localization with Cruciate Directional Antennas for Wireless Sensor Networks, International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), to appear. (EI, SCI)

 

3.    Yung-Liang Lai and Jehn-Ruey Jiang, Pricing Resources in LTE Networks through Multi-

Objective Optimization,” The Scientific World Journal, to appear. (EI, SCI)

 

4.   Jehn-Ruey  Jiang  and  Yung-Liang Lai,  Optimizing Sink-Connected Barrier  Coverage  in Wireless Sensor Networks,” International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), to appear. (EI, SCI)

 

5.    Yung-Liang Lai and Jehn-Ruey Jiang, A Genetic Algorithm for Data Mule Path Planning in

Wireless Sensor Networks,” Applied Mathematics & Information Sciences (AMIS), Vol. 7, No.

1, pp. 413-419, 2013. (EI, SCI)

 

6.   Jehn-Ruey  Jiang,  Chih-Ming  Lin,  Feng-Yi  Lin,  and  Shing-Tsaan  Huang,  “ALRD:  AoA Localization with RSSI Differences of Directional Antennas for Wireless Sensor Networks,International Journal of Distributed Sensor Networks, Vol. 2013, Article ID 529489, 10 pages,

2013. (SCI)

 

7.   Yung-Liang Lai and Jehn-Ruey Jiang, A 3-dimensional broadcast protocol with optimised transmission  efficiency  in  wireless  networks,”  International  Journal  of  Ad  Hoc  and Ubiquitous Computing (IJAHUC), Vol. 12, No. 4, pp. 205-215, 2013. (EI, SCI)

 

8.    Chin-Ling  Chen,  Yu-Chung  Huang  and  Jehn-Ruey  Jiang,  A  secure  ownership  transfer

protocol using EPCglobal Gen-2 RFID,” Telecommunication Systems, Vol. 53, No. 4, pp.

387-399, 2013. (EI, SCI)

 

9.   Yu-Chia  Chang,  Jehn-Ruey  Jiang  and  Jang-Ping  Sheu,  “An  Asynchronous  Duty  Cycle Adjustment MAC Protocol for Wireless Sensor Networks,” Journal of Internet Technology, Vol. 13, No.3, pp. 395-404, 2012. (EI, SCIE)

 

10.  Jehn-Ruey Jiang and Yung-Liang Lai, Wireless Broadcasting with Optimized Transmission

Efficiency,” Journal of Information Science and Engineering (JISE), Vol. 28, No. 3, pp. 479-

502, 2012. (EI, SCI)

 

11.  Ming-Kuei  Yeh  and  Jehn-Ruey Jiang,  Parallel  Splitting  for  RFID  Tag  Anti-Collision,”

International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Vol. 8, No. 4, pp.

249-260, 2011. (EI, SCI)

 

12.  Jehn-Ruey Jiang, Jang-Ping Sheu, Ching Tu, Jih-Wei Wu, Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks,” Journal of Information Science and Engineering (JISE), Vol. 27, No. 4, pp. 657-680, 2011. (EI, SCI; IF=0.270)

 

13.  Jehn-Ruey  Jiang,  Nondominated  Local  Coteries  for  Resource  Allocation  in  Grids  and Clouds,” Information Processing Letters (IPL), Vol. 111, No. 8, pp. 379-384, 2011. (EI, SCI; IF=0.612)

 

14.  Jehn-Ruey Jiang, Yung-Liang Lai and Fu-Cheng Deng, Mobile Robot Coordination and Navigation   with   Directional   Antennas   in   Positionless   Wireless   Sensor   Networks,” International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Vol. 7, No. 4, pp.

272-280, 2011. (EI, SCIE; IF=0.435)

 

15.  Shun-Yun Hu,  Jehn-Ruey Jiang and  Bing-Yu Chen,  Peer-to-Peer 3D  Streaming,” IEEE Internet Computing, Vol. 14, No. 2, pp. 54-61, March/April 2010. (EI; SCI; IF=2.514)

 

16.  Chi-Hung  Tzeng,   Jehn-Ruey  Jiang   and   Shing-Tsaan  Huang,   Size-Independent  Self- Stabilizing Asynchronous Phase Synchronization in General Graphs,” Journal of Information Science and Engineering, Vol. 26, No. 4, pp. 1307-1322, 2010. (EI; SCI; IF=0.270)

 

17.  Jehn-Ruey Jiang, Hung-Shiang Chen and Chao-Wei Hung, Peer-to-Peer AOI Voice Chatting for Massively Multiplayer Online Games,” International Journal of Electrical Engineering (IJEE), Vol. 17, No. 1, pp. 43-54, 2010. (EI)

 

18.  Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang and Chuan-Wei Cheng, Bandwidth-Aware Peer-to-Peer 3D Streaming,” International Journal of Advanced Media and Communication (IJAMC), Vol. 4, Issue 4, pp. 324-342, 2010.

 

19. Jehn-Ruey Jiang and  Tzu-Ming Sung, Energy-Efficient Coverage and  Connectivity Maintenance for Wireless Sensor Networks,” Journal of Networks, Vol. 4, No. 6, pp. 403-410, August 2009. (EI)

 

20.  Ming-Kuei Yeh,  Jehn-Ruey Jiang  and  Shing-Tsaan Huang,  “Adaptive Splitting and  Pre- Signaling for RFID Tag Anti-Collision,” Computer Communications Journal, Vol. 32, Issue

17, pp. 1862-1870, Nov. 2009. (EI, SCI; IF=0.816)

 

21.  Mo-Che Chan, Shun-Yun Hu, and Jehn-Ruey Jiang, Secure Peer-to-Peer 3D Streaming,” Multimedia Tools and Applications, Vol. 45, Issue 1, pp. 369-384, May 2009. (EI, SCI; IF=0.914)

 

22.  Chi-Hung Tzeng, Jehn-Ruey Jiang, and Shing-Tsaan Huang, Self-stabilizing algorithms for the maximum planarization problem in complete bipartite networks,” Information Processing Letters (IPL), Vol. 109, Issue 10, pp. 518-522, April 2009. (EI, SCI; IF=0.612)

 

23.  Jehn-Ruey  Jiang,  Yu-Li  Huang  and  Shun-Yun  Hu,  Scalable  AOI-cast  for  Peer-to-Peer

Networked Virtual Environments,” Journal of Internet Technology, Vol. 10, No. 2, pp. 119-

125, 2009. (EI; SCIE; IF=0.448)

 

24.  Jehn-Ruey Jiang, Chung-Ta King, Chi-Shiang Liao and Ching-Hao Liu, MUREX: A Mutable Replica Control Scheme for Structured Peer-to-Peer Storage Systems,” International Journal of Pervasive Computing and Communications, Vol. 5, Issue 1, pp. 9-24, 2009.

 

25.  Jehn-Ruey Jiang, Jiun-Shiang Chiou and Shun-Yun Hu, Enhancing Neighborship Consistency for Peer-to-Peer Networked Virtual Environments,” Journal of Internet Technology, Vol. 10, No. 1, pp. 477-484, 2009. (EI; SCIE; IF=0.448)

 

26.  Guan-Yu Huang, Shun-Yun Hu and Jehn-Ruey Jiang, Scalable Reputation Management with Trustworthy User Selection for P2P MMOGs,” International Journal of Advanced Media and Communication (IJAMC), Vol. 2, Issue 4, 380-401, 2008.

 

27.  Jehn-Ruey Jiang, Expected Quorum Overlap Sizes of Quorum Systems for Asynchronous

Power-Saving in Mobile Ad Hoc Networks,” Computer Networks, Volume 52, Issue 17, pp.

3296-3306, 2008. (EI, SCI; IF=1.176)

 

28. Mo-Che Chan, Shun-Yun Hu, Jehn-Ruey Jiang, “An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games,” Computer Networks, Vol. 52, Issue 9, pp. 1838-1845, June 2008. (EI, SCI; IF=1.176)

 

29. Jehn-Ruey Jiang, Chau-Yuan Yang, Ting-Yao Chiou and Shing-Tsaan Huang, A Hybrid

Power-Saving Protocol by Dual-Channel and Dual-Transmission-Range Clustering for IEEE

802.11-Based    MANETs,”    International    Journal    of    Pervasive    Computing    and

Communications, Vol. 3, Issue 3, pp. 227-242, 2007.

 

30. Chi-Hung Tzeng, Jehn-Ruey Jiang and Shing-Tsaan Huang, A Self-Stabilizing (+4)-Edge- Coloring Algorithm for Planar Graphs in Anonymous Uniform Systems,” Information Processing Letters (IPL), Vol. 101, No. 4, pp. 168-173, February 2007. (EI, SCI; IF=0.612)

 

31. Jehn-Ruey  Jiang,  Yu-Chee  Tseng,  Chih-Shun  Hsu  and  Ten-Hwang  Lai,  Quorum-based asynchronous power-saving protocols for IEEE 802.11 ad hoc networks,” ACM Journal on Mobile Networks and Applications, Vol. 10, Issue 1-2, pp. 169–181, Feb. 2005. (EI, SCI; IF=0.683)

 

32. Jehn-Ruey  Jiang,  Bing-Rong  Lin,  and  Yu-Chee  Tseng,  “Analysis  of  Bluetooth  device discovery and some speedup mechanisms,” International Journal of Electrical Engineering, Vol. 11, No. 4, pp. 301-310, Nov. 2004. (EI)

 

33. Jehn-Ruey  Jiang,  On  the  nondomination  of  cohorts  coteries,”  IEEE  Transactions  on

Computers, Vol. 53, No. 7, pp. 922-923, July 2004. (EI, SCI; IF=1.608)

 

34. Yu-Chee Tseng, Jehn-Ruey Jiang, and Jih-Hsin Lee, Secure bootstrapping and routing in an

IPv6-based ad hoc network,” Journal of Internet Technology, Vol. 5, No. 2, pp.123-130, Feb.

2004. (EI; SCIE; IF=0.448)

 

35. Jehn-Ruey Jiang, Shing-Tsaan Huang and Yu-Chen Kuo, Cohorts structures for fault-tolerant k entries to a critical section,” IEEE Transactions on Computers, Vol. 46, No. 2, pp. 222-228, Feb. 1997. (EI; SCI; IF=1.608)

 

36. Jehn-Ruey Jiang, The column protocol: a high availability and low message cost solution for managing replicated data, International Journal of Information Systems, Vol. 20, No. 8, pp.

687-696, Dec. 1995. (EI; SCI IF=1.595)

 

International Conference Papers

 

1.   Ming-Kuei  Yeh  and  Jehn-Ruey Jiang,  A  Novel  Query Tree  Protocol  Based  on  Partial Responses for RFID Tag Anti-Collision, Proc. of the 1st International Workshop on Internet of Things Technologies (IoTT 2013), 2013.

 

2.   Jehn-Ruey  Jiang,  Chih-Ming  Lin,  Feng-Yi  Lin  and  Shing-Tsaan  Huang,  “ALRD:  AoA Localization with RSSI Differences of Directional Antennas for Wireless Sensor Networks,” in Proc. of 2012 Information Society (i-Society 2012), 2012.

 

3.    Yung-Liang Lai, Hsueh-Chi Shih and Jehn-Ruey Jiang, Strategies of Mobile Agents on

Malicious Clouds, Proc. of the 18th Americas Conference on Information Systems, Aug 9-11,

2012.

 

4.   Mo-Che  Chan,  Jehn-Ruey  Jiang  and  Shing-Tsaan  Huang,  Fault-Tolerant  and  Secure Networked Storage, Proc. of the 7th International Conference on Digital Information Management (ICDIM 2012), 2012.

 

5.   Jung-Shyr Wu, Shun-Fang Yang, Chia-Ming Hsu, Jiun-Yu Tu and Jehn-Ruey Jiang, User Satisfaction-Based Scheduling Algorithm for Uplink Transmission in Long Term Evolution System, Proc. of  the  IEEE ICPADS Workshop on  Distributed Communication Network System, 2012.

 

6.   Yu-Chung Huang and Jehn-Ruey Jiang, “An Ultralightweight Mutual Authentication Protocol for EPC C1G2 RFID Tags, Proc. of 2012 International Symposium on Parallel Architectures, Algorithms and Programming (PAAP'12), 2012.

 

7.   Yung-Liang Lai and Jehn-Ruey Jiang, Barrier Coverage with Optimized Quality for Wireless Sensor Networks, Proc. of the 15th International Symposium on Wireless Personal Multimedia Communications Symposium (WPMC'12), 2012.

 

8.   Yung-Liang Lai and Jehn-Ruey Jiang, Sink-Connected Barrier Coverage Optimization for Wireless Sensor Networks,Proc. of 2011 International Conference on Wireless and Mobile Communications (ICWMC 2011), 2011.

 

9.    Yung-Liang Lai and Jehn-Ruey Jiang, Heuristic Resource Allocation with Satisfaction for

WiMAX Services, Proc. of 2011 International Conference on Wireless Networks, 2011.

 

10.  Yung-Liang Lai  and  Jehn-Ruey Jiang, Optimal Multipath Planning for  Neyman-Pearson Detection in Wireless Sensor Networks, Proc. of 2011 International Workshop on Applications of Wireless Ad Hoc and Sensor Networks (AWASN 2011), 2011.

 

11.  Ming-Kuei Yeh, Jehn-Ruey Jiang, and Shing-Tsaan Huang, Parallel Response Query Tree Splitting  for   RFID   Tag   Anti-Collision, Proc.   of   2011  International  Workshop  on Applications of Wireless Ad Hoc and Sensor Networks (AWASN 2011), 2011.

 

12.  Ta-Yu Huang, Chih-Ming Lin, Jehn-Ruey Jiang, Wei Tsang Ooi, Maha Abdallah, and Khaled Boussetta, SYMA: A Synchronous Multihop Architecture for Wireless Ad Hoc Multiplayer Games,” Proc. of 5th International Workshop on Peer-to-Peer Networked Virtual Environments (P2PNVE 2011), 2011.

 

13. Chi-Wen  Fann,  Jehn-Ruey Jiang  and  Jih-Wei  Wu,  Peer-to-Peer Immersive Voice Communication for Massively Multiplayer Online Games, Proc. of 5th International Workshop on Peer-to-Peer Networked Virtual Environments (P2PNVE 2011), 2011.

 

14.  Shun-Yun Hu, Chuan Wu, Eliya Buyukkaya, Chien-Hao Chien, Tzu-Hao Lin, Maha Abdallah, Jehn-Ruey Jiang, and Kuan-Ta Chen, A Spatial Publish Subscribe Overlay for Massively Multiuser Virtual Environments, Proc. of 2010 International Conference on Electronics and Information Engineering (ICEIE 2010), Aug. 2010.

 

15.  Jehn-Ruey Jiang, Chih-Ming Lin and Yi-Jia Hsu, “Localization with Rotatable Directional Antennas for Wireless Sensor Networks, Proc. of 2010 International Workshop on Applications of Wireless Ad Hoc and Sensor Networks (AWASN 2010), 2010.

 

16.  Yung-Liang Lai and Jehn-Ruey Jiang, Optimal Multipath Planning for Intrusion Detection in Smart  Homes  Using  Wireless  Sensor  and  Actor  Networks, Proc  of  2010  International Workshop on Applications of Wireless Ad Hoc and Sensor Networks (AWASN 2010), 2010.

 

17.  Jehn-Ruey Jiang, Chao-Wei Hung, and Jih-Wei Wu, Bandwidth- and Latency-Aware Peer-to- Peer Friendcast for Online Social Networks, Proc. of 4th International Workshop on Peer-to- Peer Networked Virtual Environments (P2P-NVE 2010), 2010.

 

18.  Jehn-Ruey Jiang, Ching-Chuan Huang, and Chung-Hsien Tsai, “Avatar Path Clustering in Networked Virtual Environments, Proc. of  4th  International Workshop on Peer-to-Peer Networked Virtual Environment (P2P-NVE 2010), 2010.

 

19.  Yung-Liang Lai and Jehn-Ruey Jiang, Broadcasting with Optimized Transmission Efficiency in 3-Dimensional Wireless Networks,” Proc. of International Conference on Parallel and Distributed Systems (ICPADS 2009), 2009.

 

20.  Mo-Che Chan, Jehn-Ruey Jiang, Chao-Wei Chao-Wei Hung, and Wei Tsang Ooi, Group- Based Peer-to-Peer 3D Streaming Authentication,” Proc. of 3rd International Workshop on Peer-to-Peer Network Virtual Environments (P2PNVE 2009), 2009.

 

21.  Chien-Hao Chien, Shun-Yun Hu and Jehn-Ruey Jiang, Bandwidth-Aware Peer-to-Peer 3D

Streaming,” Proc. of NetGames 2009, 2009.

 

22.  Yung-Liang Lai and Jehn-Ruey Jiang, Broadcasting with Optimized Transmission Efficiency in Wireless Networks,” Proc. of 5th International Conference on Wireless and Mobile Communications (ICWMC 2009), 2009.

 

23.  Yung-Liang Lai and Jehn-Ruey Jiang, Optimal Path Planning for Fault-Tolerant and Energy- Efficient Target Surveillance in Wireless Sensor and Actor Networks,” Proc. of 2nd International Workshop on Sensor Network Technologies for Information Explosion Era,

2009.

 

24.  Shun-Yun Hu and Jehn-Ruey Jiang, Plug: Virtual Worlds for Millions of People, Proc. of

2nd International Workshop on Peer-to-Peer Network Virtual Environments (P2P-NVE 2008),

2008.

 

25.  Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang, Delaunay State Management for Large- Scale Networked Virtual Environments,” Proc. of 2nd International Workshop on Peer-to- Peer Network Virtual Environments (P2P-NVE 2008), 2008

 

26.  Jehn-Ruey Jiang, Jih-Wei Wu, and Guan-Shien Du, Energy-Efficient and Traffic-Dispersive Event Contour Tracking in Multi-Sink Wireless Sensor Networks,” Proc. of 1st IEEE International Workshop on Wireless Network Algorithms (WiNA’08), 2008.

 

27.  Yu-Chia  Chang,   Jehn-Ruey  Jiang,   Jang-Ping  Sheu   and   Hsin-Yi  Shih,  “ADCA:  An

Asynchronous Duty Cycle Adjustment MAC Protocol for Wireless Sensor Networks,” Proc. of

2008 IEEE Global Telecommunications Conference (GLOBECOM’08 ), 2008.

 

28.  Jehn-Ruey Jiang, Yeong-Liang Lai and Fu-Cheng Deng, Mobile Robot Coordination and

Navigation with Directional Antennas in Positionless Wireless Sensor Networks,” Proc. of

2008 ACM International Workshop on Sensor, Ad Hoc, and Mesh Networks (SAMnet 2008), 2008.

 

29.  Wei-Lun Sung, Shun-Yun Hu and Jehn-Ruey Jiang, Selection Strategies for Peer-to-Peer 3D Streaming,” Proc. of International Workshop on Network and Operating Systems Support for Digital Audio & Video (NOSSDAV 2008), 2008.

 

30.  Guan-Yu Huang, Shun-Yun Hu, and Jehn-Ruey Jiang, Scalable Reputation Management for P2P MMOGs,” Proc. of IEEE Virtual Reality (IEEE VR) Workshop on Massively Multiuser Virtual Environment (MMVE), 2008.

 

31.  Jehn-Ruey Jiang,  Yu-Li  Huang  and  Shun-Yun  Hu,  Scalable  AOI-Cast  for  Peer-to-Peer Networked   Virtual   Environments,”   Proc.   of   2nd   IEEE   International   Workshop   on Cooperative Distributed Systems (CDS'08) in conjunction with 28th International Conference on Distributed Computing Systems, 2008.

 

32.  Shun-Yun Hu, Ting-Hao Huang, Shao-Chen Chang, Wei-Lun Sung, Jehn-Ruey Jiang, and Bing-Yu Chen, FLoD: A Framework for Peer-to-Peer 3D Streaming,” Proc. of 27th IEEE International Conference on Computer Communications (INFOCOM 2008), 2008.

 

33.  Shun-Yun Hu, Shao-Chen Chang, and Jehn-Ruey Jiang, Voronoi State Management for Peer- to-Peer Massively Multiplayer Online Games,”  Proc. of 4th IEEE International Workshop on Networking Issues in Multimedia Entertainment (NIME’08) in conjunction with 5th IEEE Consumer Communications and Networking Conference (CCNC’08), 2008.

 

34.  Jang-Ping Sheu, Jehn-Ruey Jiang, and Ching Tu, “Anonymous Path Routing in Wireless

Sensor Networks,” Proc. of 2008 IEEE International Conference on Communications (ICC

2008), 2008.

 

35.  Jehn-Ruey Jiang and Tzu-Ming Sung, Maintaining Connected Coverage for Wireless Sensor Networks,” Proc. of 5th Workshop on Wireless Ad hoc and Sensor Networks (WWASN 2008) in conjunction with 28th International Conference on Distributed Computing Systems (ICDCS’08), 2008.

 

36.  Jehn-Ruey Jiang and Hung-Shiang Chen, Peer-to-Peer AOI Voice Chatting for Massively Multiplayer Online Games,”  Proc. of 1st International Workshop on Peer-to-Peer Network Virtual Environments (P2P-NVE2007) in conjunction with 2007 International Conference on Parallel and Distributed Systems (ICPADS’07), 2007.

 

37.  Ming-Kuei Yeh and Jehn-Ruey Jiang, “Adaptive k-Way Splitting and Pre-Signaling for RFID Tag Anti-Collision,” Proc. of 33rd Annual Conference of the IEEE Industrial Electronics Society (IECON'07), 2007.

 

38.  Jehn-Ruey Jiang, Jiun-Shiang Chiou and Shun-Yun Hu, Enhancing Neighborship Consistency for  Peer-to-Peer  Distributed  Virtual  Environments,”     Proc.  of  1st  IEEE  International Workshop on Cooperative Distributed Systems (CDS’07), 2007.

 

39.  Mo-Che Chan, Shun-Yun Hu, Jehn-Ruey Jiang, “An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-peer Massively Multiplayer Online Games ,”   Proc. of NETWORKING 2007, 2007.

 

40.  Jehn-Ruey Jiang and Wei-Jiun Ling, SEEKER: An Adaptive and Scalable Location Service

for Mobile Ad Hoc Networks,” Proc. of International Computer Symposium 2006 (ICS 2006),

2006.

 

41.  Chi-Hung Tzeng, Jehn-Ruey Jiang, and Shing-Tsaan Huang, Self-Stabilizing Asynchronous Phase Synchronization in General Graphs,” Proc. of 8th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2006), Lecture Notes in Computer Science (LNCS), vol. 4280, pp. 501-515, 2006.

 

42.  Jehn-Ruey Jiang, Chung-Ta King, Chi-Shiang Liao, MUREX: A Mutable Replica Control Scheme for Structured Peer-to-Peer Storage Systems,” Proc. of 1st International Conference on Grid and Pervasive Computing (GPC’06), Lecture Notes in Computer Science (LNCS), vol.

3947, pp. 93-102, 2006.

 

43.  Jehn-Ruey Jiang, A Fault-Tolerant h-out of-k Mutual Exclusion Algorithm Using Cohorts Coteries for Distributed Systems,” Proc. of 5th International Conference on Parallel and Distributed Computing, Application and Technologies PDCAT’04, Lecture Notes in Computer Science (LNCS), vol. 3320, pp. 267-273, 2004.

 

44.  Jehn-Ruey Jiang, A Distributed Group k-Exclusion Algorithm using k-Write-Read Coteries,” Proc. of International Computer Symposium 2004 (ICS’04), 2004.

 

45.  Jehn-Ruey Jiang, Prioritized h-out of-k Mutual Exclusion for Mobile Ad Hoc Networks and Distributed Systems,” Proc. of 15th International Conference on Parallel and Distributed Computing and Systems (PDCS 2003), 2003.

 

46.  Jehn-Ruey Jiang, A Group k-Mutual Exclusion Algorithm for Distributed Systems,” Proc. of

15th International Conference on Parallel and Distributed Computing and Systems (PDCS

2003), 2003.

 

47.  Jehn-Ruey Jiang, Cheng-Sheng Chou and Shing-Tsaan Huang, Constructing Nondominated Local Coteries for Distributed Resource Allocation,”   Proc. of ICPP Workshop on Compile/Runtime Techniques for Parallel Computing, 2003.

 

48.  Yu-Chee Tseng, Jehn-Ruey Jiang, and Jih-Hsin Lee, Secure Bootstrapping and Routing in an

IPv6-Based Ad Hoc Network,” Proc. of ICPP Workshop on Wireless Security and Privacy

2003, 2003.

 

49.  Jehn-Ruey  Jiang,  Yu-Chee  Tseng,  Chih-Shun  Hsu  and  Ten-Hwang Lai,  Quorum-Based Asynchronous Power-Saving Protocols for IEEE 802.11 Ad Hoc Networks,” Proc. of International Conference on Parallel Processing 2003 (ICPP'03), 2003. (Best Paper Award)

 

50.  Jehn-Ruey Jiang, A prioritized h-out of-k mutual exclusion algorithm with maximum degree of  concurrency  for  mobile  ad  hoc  networks  and  distributed  systems,”  Proc.  of  4th International Conference on Parallel and Distributed Computing, Application and Technologies (PDCAT’03), 2003.

 

51.  Jehn-Ruey Jiang, Distributed h-out of-k mutual exclusion using k-coteries,” Proc. of 3rd International Conference on Parallel and Distributed Computing, Application and Technologies (PDCAT’02), pp. 218-226, Sep. 2002.

 

52.  Jehn-Ruey Jiang, A distributed h-out of-k mutual exclusion algorithm for ad hoc mobile networks,”  Proc.  of  2002  International Parallel  and  Distributed  Processing  Symposium (IPDPS’02) - 2nd International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, April 2002.

 

53.  Jehn-Ruey Jiang, A group mutual exclusion algorithm for ad hoc mobile networks, Proc. of

6th International Conference on Computer Science and Informatics, pp. 266-270, March 2002.

 

54.  Jehn-Ruey Jiang, Secret Sharing via Nondominated Write-Read Coteries, Proc. of  13th International Conference on Parallel and Distributed Computing and Systems (PDCS’01), Anaheim, CA, pp. 561-565, Aug. 2001.

 

55.  Jehn-Ruey  Jiang,  Self-stabilizing,  randomized  k-value  unison  clocks  for  unidirectional uniform  rings,”  Proc.  of  11th  International  Conference  on  Parallel  and  Distributed Computing and Systems (PDCS’99), Boston, MA, Nov. 1999.

 

56.  Jehn-Ruey Jiang, A framework for fault-tolerant distributed mutual exclusion and replica control using grid structures,” Proc. of 8th International Conference on Parallel and Distributed Computing and Systems (PDCS’96), pp.311-315, Chicago, IL, Oct. 1996.

 

57.  Jehn-Ruey Jiang, Scalable spin locks for k-exclusion on shared-memory multiprocessors,” Proc. of 8th International Conference on Parallel and Distributed Computing and Systems (PDCS’96), pp.242-244, Chicago, IL, Oct. 1996.


58.  Jehn-Ruey Jiang, Fault-tolerant distributed mutual exclusion with O(1) message overhead,”

Proc. of 13th International Conference on Applied Informatics, pp.228-231, Austria, Feb.

1995.

 

59.  Jehn-Ruey  Jiang  and  Shing-Tsaan Huang,  Obtaining  nondominated  k-coteries  for  fault- tolerant disributed k-mutual exclusion,” Proc. of International Conference on Parallel and Distributed Systems 1994 (ICPADS’94), pp.582-587, Hsinchu, Dec. 1994.

 

60.  Shing-Tsaan Huang,  Jehn-Ruey Jiang  and  Yu-Chen Kuo,  k-Coteries for  fault-tolerant k entries to a critical section,” Proc. of 13th IEEE International Conference on Distributed Computing Systems, pp.74-81, Pittsburgh, PA, May 1993.

 

 

 

Local Journal Papers

 

1.   Jehn-Ruey Jiang, A distributed h-out of-k mutual exclusion algorithm with maximum degree

of concurrency for mobile ad hoc networks,” Hsuan Chuang Management Journal, Vol. 2, pp.

63-86, March 2004.

 

2.   Jehn-Ruey Jiang, Prioritized h-out of-k resource allocation for mobile ad hoc networks and

distributed systems,Journal of Hsuan Chuang College, Vol. 7, pp. 143-166, 2003.

 

3.   Yu-Chee Tseng and Jehn-Ruey Jiang, Secure autoconfiguration and routing in an IPv6-based

ad hoc network,” Journal of Hsuan Chuang College, Vol. 7, pp. 233-254, 2003.

 

4.   Jehn-Ruey Jiang, Yu-Chee Tseng and Ten-Hwang Lai, “Asynchronous power-saving protocols via quorum systems for IEEE 802.11 ad hoc networks,” Journal of Hsuan Chuang College, Vol. 7, pp. 81-108, 2003.

 

5.   Jehn-Ruey Jiang, Self-stabilizing k-value unison clocks for unidirectional uniform rings,”

Journal of Hsuan Chuang College, Vol. 3, pp. 113-121, 2001.

 

6.   Jehn-Ruey Jiang, A write-read coterie secret sharing scheme, Journal of Hsuan Chuang

College, Vol. 3, pp. 37-51, 2001.

 

 

 

Local Conference Papers

 

1.   Ji-Hau  Liao,  Wei-Ting  So,  and  Jehn-Ruey  Jiang,  Optimized  Charger  Deployment  for Wireless Rechargeable Sensor Networks, Proc. of the 9th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2013), 2013. (in Chinese) (Best Paper Award)

 

2.   Ming-Kuei Yeh, Shing-Tsaan Huang, and Jehn-Ruey Jiang, “An RFID Tag Anti-Collision Protocol Using Parallel Splitting and Merging, Proc. of the 9th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2013), 2013.

 

3.   Wei-Ting So, Yu-Shun Liu, Jiun-Yu Tu, Jehn-Ruey Jiang, and Jung-Shyr Wu, Satisfaction- based LTE Uplink Scheduling,Proc. of the 9th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2013), 2013. (in Chinese)

 

4.   Chieh-Chun Huang, Shih-Yi Chan, Jehn-Ruey Jiang, and Jiun-Yu Tu, Multi-Channel and Time-Slot Scheduling for Barrier Coverage in WSNs, Proc. of the 9th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2013), 2013. (in Chinese)

 

5.   Yung-Liang Lai and Jehn-Ruey Jiang, Barrier Coverage Repairing for the Wireless Sensor Network with a Mobile Robot, Proc. of the 8th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2012), 2012. (in Chinese)

 

6.   Yu-Chung Huang, Jehn-Ruey Jiang and Shing-Tsaan Huang, “An Ultralightweight Mutual Authentication Protocol for EPC C1G2 RFID Tags, Proc. of the 8th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2012), 2012.

 

7.   Jih-Wei Wu, Ding-Wei Chou and Jehn-Ruey Jiang, VEoT (Virtual Environment of Things): An Architecture for Inter-acting with Smart Things in Networked Virtual Environments, Proc. of the 8th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2012), 2012.

 

8.    Jehn-Ruey  Jiang,  Chih-Ming  Lin,  and  Ta-Yu  Huang,  A  Performance  Study  on  the

Synchronous Multihop Architecture for Wireless Ad Hoc Multiplayer Games, Proc. of the

17th Mobile Computing Workshop, 2012.

 

9.   Chih-Ming    Lin,    Jehn-Ruey    Jiang    and    Shing-Tsaan    Huang,    Data    Recoverable Multidimensional Aggregation for Wireless Sensor Networks, Proc. of 7th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2011), 2011. (Best Paper Award)

 

10.  Chuan-Wei Cheng and Jehn-Ruey Jiang, 非結構式同儕網路拓樸調, Proc. of National

Computer Symposium (NCS 2011), 2011. (Best Paper Award Nomination)

 

11.  Yung-Liang Lai and Jehn-Ruey Jiang, 具有資料彙集節點連通性的邊界覆蓋之無線感

網路最佳化規 , Proc.  of  28th  Workshop  on  Combinatorial  Mathematics  and

Computational Theory, 2011.

 

12.  Chih-Ming Lin and Jehn-Ruey Jiang, 無線感測網路的多維資料聚合與還原機, Proc. of the 1st National Conference on Web Intelligence and Applications (NCWIA2011), 2011

 

13.  Ming-Kuei Yeh, Shing-Tsaan Huang and Jehn-Ruey Jiang, Parallel Splitting and Merging for RFID Tag Anti-collision,Proc. of 2010 Cross-Strait Information Technology Conference (CSIT 2010), 2010. (in Chinese)

 

14.  Jyun-Jie Huang, Jih-Wei Wu and Jehn-Ruey Jiang, IM Finder: Searching for Answers via

Instant Message Networks,” Proc. of National Computer Symposium (NCS 2009), 2009.

 

15.  Ming-Kuei Yeh and Jehn-Ruey Jiang, A Counter-Based RFID Anti-Collision Protocol Using

Parallel Splitting,” Proc. of 5th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN

2009), 2009. (Best Paper Award)

 

16.  G. M. Lin, I. C. Sheu and Jehn-Ruey Jiang, “Localization with Rotating Directional Antennas for Wireless Sensor Networks,” Proc. of 2009 Cross-Strait Information Technology Conference (CSIT 2009), 2009. (in Chinese)

 

17.  Chien-Hao Chien and Jehn-Ruey Jiang, Bandwidth-Aware Peer-to-Peer 3D Streaming,” Proc. of 2009 Cross-Strait Information Technology Conference (CSIT 2009), 2009. (in Chinese)

 

18.  Jehn-Ruey Jiang, Expected Quorum Overlap Sizes of Optimal Quorum Systems with the Rotation Closure Property for Asynchronous Power-Saving Algorithms in Mobile Ad Hoc Networks,”  Proc.  of  25th  Workshop  on  Combinatorial Mathematics and  Computational Theory, 2008.

 

19.  Jehn-Ruey Jiang and Fu-Cheng Deng,Mobile Robot Navigation with Directional Antennas in Positionless Wireless Sensor Networks,” Proc. of 2008 Cross-Strait Information Technology Conference (CSIT 2008), 2008.

 

20.  Kuan Shian Duh and Jehn-Ruey Jiang, Energy-Efficient Event Contour Tracking in Multi- Sink Wireless Sensor Networks,” Proc. of 2008 Cross-Strait Information Technology Conference (CSIT 2008), 2008.

 

21.  Jehn-Ruey Jiang, I-Chuan Chen and Fu-Cheng Deng, 3-Beacon 3D Localization for Wireless Sensor Networks,” (in Chinese), Proc. of 3rd Workshop on Wireless, Ad hoc, and Sensor Networks, 2007.

 

22.  Jehn-Ruey Jiang,  Chi-Hsiang Liao,  and  Jiun-Shiang Chiou,  A  Mutable Replica Control Scheme  for  Structured  P2P  Storage  Systems,”  Proc.  of  2006  Cross-Strait Information Technology Conference (CSIT 2006), 2006.

 

23.  Jehn-Ruey Jiang, Energy-Efficient Coverage and  Connectivity Maintenance for Wireless Sensor Networks,” (in Chinese), Proc. of 2nd Workshop on Wireless, Ad hoc, and Sensor Networks, 2006.

 

24.  Jehn-Ruey Jiang and Ming-Kuei Yeh, The Design Concept of U-Guide Ubiquitous Learning

System,” Proc. of 2nd Workshop on Wireless, Ad hoc, and Sensor Networks, 2006.

 

25.  Jehn-Ruey Jiang, Chau-Yuan Yang, and Ting-Yao Chiou, A Hybrid Power-Saving Protocol by Dual-Channel and Dual-Transmission-Range Clustering in IEEE 802.11 MANETs,” Proc. of Workshop on Wireless, Ad hoc, and Sensor Networks, 2005.

 

26. Jehn-Ruey Jiang, “Analyzing Average-Case Neighbor Sensibilities for Quorum-Based Asynchronous Power-Saving Protocols in an IEEE 802.11 MANET,” Proc. of Workshop on Wireless, Ad hoc, and Sensor Networks, 2005.

 

27.  Jehn-Ruey Jiang, Perfect Multi-Group Secret Sharing via Nondominated DIV k-Coteries,”

Proc. of 22nd Workshop on Combinatorial Mathematics and Computational Theory, 2005.

 

28.  Jehn-Ruey Jiang, Ideal and Perfect Secret Sharing for Fault-Tolerant Distributed Access Control of Secure Data via Nondominated Bicoteries,” Proc. of 21st Workshop on Combinatorial Mathematics and Computational Theory, 2004.

 

29.  Jehn-Ruey Jiang, Bing-Rong Lin, and Yu-Chee Tseng, A mechanisms for quick Bluetooth device discovery,” Proc. of Mobile Computing 2004, 2004. (Excellent Paper Award)

 

30.  Jehn-Ruey Jiang and Shing-Tsaan Huang, Fault-tolerant distributed k-mutual exclusion with constant   expected   message   cost,”   Proc.   of   1995   Workshop   on   Distributed   System Technologies and Applications, pp.104-110, Tainan, July 1995.

 

 

 

Monography Papers

 

1.   Jehn-Ruey Jiang, A token-based h-out of-k mutual exclusion algorithm for mobile ad hoc

networks,” Hsuan Chuang College Research Bulletin 2002, pp. 399-416, 2002.

 

2.   Jehn-Ruey  Jiang,  A  token-based  group  mutual  exclusion  algorithm  for  mobile  ad  hoc

networks,” Hsuan Chuang College Research Bulletin 2002, pp. 379-398, 2002.

 

3.   Jehn-Ruey Jiang, “An h-out of-k mutual exclusion algorithm using k-coteries for distributed

systems,” Hsuan Chuang College Research Bulletin 2002, pp. 361-378, 2002.

 

4.   Jehn-Ruey Jiang, A distributed group k-mutual exclusion algorithm,” Hsuan Chuang College

Research Bulletin 2002, pp. 343-360, 2002.

 

5.   Jehn-Ruey Jiang, A prioritized mutual exclusion algorithm for mobile ad hoc networks,”

Hsuan Chuang College Research Bulletin 2002, pp. 325-342, 2002.

 

6.   Jehn-Ruey  Jiang,   Cheng-Sheng  Chou  and   Shing-Tsaan  Huang,  Distributed  resource allocation using nondominated coteries,” Hsuan Chuang College Research Bulletin 2002, pp.

305-324, 2002.


 

Book Chapters

 

1.   Jehn-Ruey Jiang and Ming-Kuei Yeh, “Anti-collision protocols for the RFID system,” RFID and Sensor Networks: Architectures, Protocols, Security and Integrations, Ed. Yan Zhang et al.,  Auerbach  Publications,  Taylor&Francis Group,  USA,  2009.  (ISBN-10:  1420077775, ISBN-13: 978-1420077773)

 

2.   Shing-Tsaan Huang, Chi-Hung Tzeng and Jehn-Ruey Jiang, Self-Stabilizing Graph Coloring Algorithms,” Distributed Innovations for Business, Engineering and Science, IGI Global. (ISBN: 1466625333) (Release Date: November, 2012. Copyright    2013. 422 pages.)