scispace - formally typeset
Search or ask a question
Author

Wen-Hsing Kuo

Bio: Wen-Hsing Kuo is an academic researcher from Yuan Ze University. The author has contributed to research in topics: Resource allocation & Wireless network. The author has an hindex of 13, co-authored 51 publications receiving 785 citations. Previous affiliations of Wen-Hsing Kuo include National Taiwan University & Industrial Technology Research Institute.


Papers
More filters
Journal ArticleDOI
01 May 2015
TL;DR: This survey introduces necessary background and fundamentals to understand current efforts in IoT, WoT and SWoT by reviewing key enabling technologies and addresses associated challenges and highlight potential research to be perused in future.
Abstract: Currently, a large number of smart objects and different types of devices are interconnected and communicate via Internet Protocol that creates a worldwide ubiquitous and pervasive network called the Internet of Things (IoT). With an increase in the deployment of smart objects, IoT is expected to have a significant impact on human life in the near future. A majorbreakthrough in bridging the gap between virtual and physical worlds came from the vision of the Web of Things (WoT), which employs open Web standards in achieving information sharing and objects interoperability. Social Web of Things (SWoT) further extends WoT to integrate smart objects with social networks and is observed to not only bridge between physical and virtual worlds but also facilitate continued interaction between physical devices and human. This makes SWoT the most promising approach and has now become an active research area.This survey introduces necessary background and fundamentals to understand current efforts in IoT, WoT and SWoT by reviewing key enabling technologies. These efforts are investigated in detail from several different perspectives such as architecture design, middleware, platform, systems implementation, and application in hand. Moreover, a large number of platforms and applications are analyzed and evaluated from various alternatives have become popular during the past decade. Finally, we address associated challenges and highlight potential research to be perused in future.

243 citations

Journal ArticleDOI
TL;DR: The results show that optimal wireless resource allocation is dependent on traffic types, total available resource, and channel quality, rather than solely dependent on the channel quality or traffic types as assumed in most existing work.
Abstract: In this paper, we study utility-based maximization for resource allocation in the downlink direction of centralized wireless networks We consider two types of traffic, ie, best effort and hard QoS, and develop some essential theorems for optimal wireless resource allocation We then propose three allocation schemes The performance of the proposed schemes is evaluated via simulations The results show that optimal wireless resource allocation is dependent on traffic types, total available resource, and channel quality, rather than solely dependent on the channel quality or traffic types as assumed in most existing work

79 citations

Journal ArticleDOI
TL;DR: The results show that the proposed sub-optimal, polynomial time solution can adapt to any types of soft QoS flows and acts like a hard QoS system and allocates resource in a fairness-oriented manner when the utility functions of flows are unit-step functions.
Abstract: In this paper, we study utility-based resource allocation for soft QoS traffic in infrastructure-based wireless networks. Soft QoS traffic here refers to the traffic which demands certain amount of bandwidth for normal operation but allows some flexibility when the given bandwidth is close to the preferred value. The resource requirement of soft QoS traffic can be described with sigmoid utility function. Our objective is to maximize the total utility of all soft QoS flows without going through a wireless bidding process. We develop essential theorems as the design guidelines for this problem, and then propose a sub-optimal, polynomial time solution based on the developed theorems. We prove that the difference in the performance of our mechanism and the optimal solution is bounded. The performance of the proposed solution is evaluated via simulations. The results show that our solution can adapt to any types of soft QoS flows. Specifically, it acts like a hard QoS system and allocates resource in a fairness-oriented manner when the utility functions of flows are unit-step functions; on the other hand, when the utility functions are concave, it behaves like a best effort system and allocates resource in a throughput-oriented way.

76 citations

Proceedings ArticleDOI
24 Jun 2007
TL;DR: A utility-based resource allocation scheme for layer-encoded IPTV multicast streaming service over IEEE 802.16 WiMAX networks is proposed, and it is proved that this problem is NP-hard, and that the fairness of the system can be guaranteed.
Abstract: In this paper, we propose a utility-based resource allocation scheme for layer-encoded IPTV multicast streaming service over IEEE 802.16 WiMAX networks. Unlike existing utility-based schemes, this mechanism is designed for wireless networks which support adaptive modulation and coding. Each video stream (or program) is encoded into different layers. Then, our mechanism adjusts the number of each user's received layers dynamically according to its channel condition and the available network bandwidth, so as to maximize total utility. We prove that this problem is NP-hard, and show that our scheme is bounded in performance to the optimal solution and can run in polynomial time. The simulation results show that this scheme can allocate resource flexibly according to the utility function of each program, the popularity of each program (i.e., the number of users receiving each program), and the amount of total available resource in the network. The result also shows that the fairness of the system can be guaranteed.

67 citations

Journal ArticleDOI
TL;DR: DFC improves the positioning accuracy of base fingerprinting algorithms, including the Bayesian approach and a neural network model, and is applied to an actual GSM network with realistic measurements.
Abstract: This paper proposes a dynamic fingerprinting combination (DFC) algorithm that improves mobile localization by dynamically weighting the spatial correlation from multiple location fingerprinting systems. This DFC algorithm first extracts the complementary advantages of fingerprinting functions to construct a fusion profile, and then dynamically combines individual outputs based on the fusion profile surrounding the test sample. The proposed algorithm generates more accurate location estimates and reduces the risk of selecting a poorly-performing fingerprinting approach. This study applies DFC to an actual GSM network with realistic measurements. Experimental results show that DFC improves the positioning accuracy of base fingerprinting algorithms, including the Bayesian approach and a neural network model.

62 citations


Cited by
More filters
01 Jan 2007
TL;DR: In this paper, the authors provide updates to IEEE 802.16's MIB for the MAC, PHY and asso-ciated management procedures in order to accommodate recent extensions to the standard.
Abstract: This document provides updates to IEEE Std 802.16's MIB for the MAC, PHY and asso- ciated management procedures in order to accommodate recent extensions to the standard.

1,481 citations

Journal ArticleDOI
TL;DR: This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human life, especially for the differently abled and the elderly.
Abstract: The Internet of Things (IoT) is defined as a paradigm in which objects equipped with sensors, actuators, and processors communicate with each other to serve a meaningful purpose. In this paper, we survey state-of-the-art methods, protocols, and applications in this new emerging area. This survey paper proposes a novel taxonomy for IoT technologies, highlights some of the most important technologies, and profiles some applications that have the potential to make a striking difference in human life, especially for the differently abled and the elderly. As compared to similar survey papers in the area, this paper is far more comprehensive in its coverage and exhaustively covers most major technologies spanning from sensors to applications.

1,025 citations

Journal ArticleDOI
TL;DR: An interesting relationship among the communication capability, connectivity, and mobility of vehicles is unveiled, and the characteristics about the pattern of parking behavior are found, which benefits from the understanding of utilizing the vehicular resources.
Abstract: With the emergence of ever-growing advanced vehicular applications, the challenges to meet the demands from both communication and computation are increasingly prominent. Without powerful communication and computational support, various vehicular applications and services will still stay in the concept phase and cannot be put into practice in the daily life. Thus, solving this problem is of great importance. The existing solutions, such as cellular networks, roadside units (RSUs), and mobile cloud computing, are far from perfect because they highly depend on and bear the cost of additional infrastructure deployment. Given tremendous number of vehicles in urban areas, putting these underutilized vehicular resources into use offers great opportunity and value. Therefore, we conceive the idea of utilizing vehicles as the infrastructures for communication and computation, named vehicular fog computing (VFC), which is an architecture that utilizes a collaborative multitude of end-user clients or near-user edge devices to carry out communication and computation, based on better utilization of individual communication and computational resources of each vehicle. By aggregating abundant resources of individual vehicles, the quality of services and applications can be enhanced greatly. In particular, by discussing four types of scenarios of moving and parked vehicles as the communication and computational infrastructures, we carry on a quantitative analysis of the capacities of VFC. We unveil an interesting relationship among the communication capability, connectivity, and mobility of vehicles, and we also find out the characteristics about the pattern of parking behavior, which benefits from the understanding of utilizing the vehicular resources. Finally, we discuss the challenges and open problems in implementing the proposed VFC system as the infrastructures. Our study provides insights for this novel promising paradigm, as well as research topics about vehicular information infrastructures.

801 citations

Proceedings ArticleDOI
01 Dec 2015
TL;DR: An overview of security principles, technological and security challenges, proposed countermeasures, and the future directions for securing the IoT is presented.
Abstract: The paper presents a survey and analysis on the current status and concerns of Internet of things (IoT) security. The IoT framework aspires to connect anyone with anything at anywhere. IoT typically has a three layers architecture consisting of Perception, Network, and Application layers. A number of security principles should be enforced at each layer to achieve a secure IoT realization. The future of IoT framework can only be ensured if the security issues associated with it are addressed and resolved. Many researchers have attempted to address the security concerns specific to IoT layers and devices by implementing corresponding countermeasures. This paper presents an overview of security principles, technological and security challenges, proposed countermeasures, and the future directions for securing the IoT.

518 citations

01 Jan 2008

443 citations