The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Shi CHEN(4hit)

1-4hit
  • An Improvement of Tree-Based Multicasting for Irregular Switch-Based Networks with Wormhole Routing

    Nen-Chung WANG  Tzung-Shi CHEN  Chih-Ping CHU  

     
    PAPER-Computer Systems

      Vol:
    E85-D No:5
      Page(s):
    812-823

    In this paper, we propose an efficient dual-tree-based multicasting scheme with three destination-switch partition strategies on irregular switch-based networks. The dual-tree-based routing scheme supports adaptive, distributed, and deadlock-free multicast on irregular networks with double channels. We first describe a dual-tree structure constructed from the irregular networks and prove that the multicasting based on such a structure is deadlock-free. Then, an efficient multicast routing algorithm with three destination-switch partition strategies: source-switch-based partition, destination-switch-based partition, and all-switches-based partition, is proposed. Finally, we perform simulations to evaluate our proposed algorithm under various impact parameters: system size, message length, and startup time. The experimental results show that the improved tree-based multicasting scheme outperforms the usual tree-based multicasting scheme. The dual-tree-based multicasting scheme with destination-switch-based partition is shown to be the best for all situations.

  • Evolution Analysis of Parallel Concatenated Coded IDMA Systems

    Hao WANG  Shi CHEN  Xiaokang LIN  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:6
      Page(s):
    1620-1623

    The bit-error-rate (BER) performance predicted by the semi-analytical evolution technique proposed by Li Ping et al. becomes inaccurate for parallel concatenated coded interleave-division multiple-access (PCC-IDMA) systems. To solve this problem, we develop a novel evolution technique of such systems. Numerical results show that the predicted performance agrees well with the simulation results, and that this technique is useful for system optimization.

  • A New Approach to the Ball Grid Array Package Routing

    Shuenn-Shi CHEN  Jong-Jang CHEN  Trong-Yen LEE  Chia-Chun TSAI  Sao-Jie CHEN  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E82-A No:11
      Page(s):
    2599-2608

    Due to the large number of I/O's in a Ball-Grid-Array (BGA) package, routing becomes more and more an important work. A ring-based router for the BGA package is presented in this paper to interconnect each I/O pad of a chip to a corresponding ball distributed on the substrate area. The major phases for the router consist of layer assignment, topological routing, and physical routing. Using this router, we can generate an even distribution of planar and any-angle wires to improve manufacturing yield. We have also conducted various testing examples to verify the efficiency of this router. Experiments show that the router produces very good results, far better than the manual design, thus it can be applied to the practical packaging of integrated circuits.

  • Mining Traversal Patterns on the Internet

    Tzung-Shi CHEN  

     
    PAPER-Databases

      Vol:
    E86-D No:12
      Page(s):
    2722-2730

    Mining traversal patterns on the Internet is one of critical issues for exploring the user access behaviors. In this paper, we propose a new data mining scheme for mining frequent trip traversal patterns on the Internet. First, we define a trip traversal as a historical contiguous sequence of web sites or web pages, which were surfed or visited on an information-providing system by one user. Next, we derive all of the maximal trip traversals by analyzing and filtering these collected trip traversals. For mining the large trip traversals from the maximal trip traversals, we present a data mining scheme integrated with the schemes presented in. Here, the extracted large trip traversals can be thought of as the realistic frequent browsed behaviors for most of users either on a web site or on an information-providing system, such as a proxy server. Finally, we implement and design a data mining system to explore the large trip traversal patterns in order to capture user access patterns to some proxy server.