default search action
I-Hsuan Peng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j9]I-Hsuan Peng, Pei-Chun Lee, Chen-Kang Tien, Jyun-Sen Tong:
Development of a cycling safety services system and its deep learning bicycle crash model. J. Commun. Networks 24(2): 246-263 (2022) - 2021
- [j8]I-Hsuan Peng, Yu-Chun Tai, Pei-Chun Lee:
Design, implementation, and evaluation of a shared LoRa network application architecture. Int. J. Ad Hoc Ubiquitous Comput. 37(3): 137-150 (2021)
2010 – 2019
- 2017
- [j7]Cui-Yu Kong, I-Hsuan Peng:
Tradeoff design of radio resource scheduling for power and spectrum utilizations in LTE uplink systems. J. Netw. Comput. Appl. 78: 116-124 (2017) - 2016
- [c13]Hsueh-Wen Tseng, Wan-Chi Chang, I-Hsuan Peng, Pei-Shan Chen:
A Cross-Layer Flow Schedule with Dynamical Grouping for Avoiding TCP Incast Problem in Data Center Networks. RACS 2016: 91-96 - 2015
- [c12]I-Hsuan Peng, Yen-Chieh Lee, Yuan-Hsing Ho:
Study of multicast video streaming in cloud computing environment. APCC 2015: 416-421 - [c11]I-Hsuan Peng, Yen-Chieh Lee, Kuang-Lun Yeh, Pin-Man Huang:
Implementation of resource integration and application of grouped mobile devices using Wi-Fi Direct. QSHINE 2015: 1-4 - 2014
- [j6]Yen-Wen Chen, Yen-Yin Chu, I-Hsuan Peng:
Energy-saving centric uplink scheduling scheme for broadband wireless access networks. EURASIP J. Wirel. Commun. Netw. 2014: 70 (2014) - [c10]Cui-Yu Kong, Yen-Wen Chen, I-Hsuan Peng:
Referential bounds analysis of uplink radio resource scheduling in LTE network. CCNC 2014: 519-524 - 2013
- [j5]I-Hsuan Peng, Yen-Wen Chen:
Energy consumption bounds analysis and its applications for grid based wireless sensor networks. J. Netw. Comput. Appl. 36(1): 444-451 (2013) - [c9]Ching-I Hsin, I-Hsuan Peng:
The Graph Painting Mobile Game. CISIS 2013: 629-633 - [c8]I-Hsuan Peng, Yen-Yin Chu, Cui-Yu Kong, Yu-Sheng Su:
Implementation of Indoor VOC Air Pollution Monitoring System with Sensor Network. CISIS 2013: 639-643 - [c7]I-Hsuan Peng, Meng-Hsien Lin, Yen-Wen Chen, Fong-Ming Yang, Addison Y. S. Su:
Improvement of Streaming Video in Differential Service Networks by Using Opportunity RED Mechanism. CISIS 2013: 644-648 - 2012
- [c6]Yen-Wen Chen, I-Hsuan Peng, Chien-Yu Lai:
Study of Radio Resource Allocation Scheme for Single Carrier FDMA in LTE Network. VTC Spring 2012: 1-5 - 2011
- [c5]I-Hsuan Peng, Yen-Wen Chen, Chang-Wu Chen, Yu-Chin Huang:
Management of multiplexed ATM connection over WiMax network. APNOMS 2011: 1-5
2000 – 2009
- 2009
- [j4]I-Hsuan Peng, Yen-Wen Chen, Hsiang-Ru Peng:
A Systematic Wavelength Assign Algorithm for Multicast in WDM Networks with Sparse Conversion Nodes. J. Inf. Sci. Eng. 25(2): 559-574 (2009) - [j3]I-Hsuan Peng, Yen-Wen Chen, Po-Wei Wu:
A connectivity-based approach for the construction of hierarchical WDM network topology. Photonic Netw. Commun. 18(1): 116-121 (2009) - 2008
- [j2]Yen-Wen Chen, I-Hsuan Peng:
Study of multicast wavelength arrangement for maximizing network capacity in WDM networks with sparse wavelength converters. Photonic Netw. Commun. 15(2): 141-152 (2008) - [c4]Yen-Wen Chen, Hwa-Chun Ma, I-Hsuan Peng, Ta-En Chang:
Study of Cluster-Based Data Forwarding in Sensor Networks with Limited High-Power Mobile Nodes. ISPAN 2008: 93-98 - 2007
- [c3]I-Hsuan Peng, Kuo-Wei Peng, Yen-Wen Chen:
Cross Layer Routing for Reliable Connections in IP over WDM Networks. AINA Workshops (1) 2007: 130-135 - [c2]Yen-Wen Chen, I-Hsuan Peng, Shiu-Tsuen Guan:
Dynamic Bandwidth Management for Handoffs with RSVP in 802.16/WLAN Environment. AINA Workshops (2) 2007: 243-248 - 2006
- [j1]Yen-Wen Chen, I-Hsuan Peng:
Shared protection of lightpath with guaranteed switching time over DWDM networks. J. Commun. Networks 8(2): 228-233 (2006) - [c1]Yen-Wen Chen, Yuan-Long Lee, I-Hsuan Peng:
Connection Control by Virtual Admission in Wireless LAN Environment. WASA 2006: 14-25
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint