Остановите войну!
for scientists:
default search action
Yen-Wen Chen
- > Home > Persons > Yen-Wen Chen
Publications
- 2019
- [j28]Yen-Wen Chen, Yen-Yin Chu, Chun-Hsien Kung:
Dynamic group-based scheduling of machine-to-machine communication for uplink traffic in LTE networks. Int. J. Ad Hoc Ubiquitous Comput. 30(1): 48-58 (2019) - 2017
- [j25]Yen-Wen Chen, Yen-Yin Chu, Chih-Wei Lai:
Study on State Dependent Radio Resource Scheduling for Downlink Traffic in LTE Networks. Wirel. Pers. Commun. 96(3): 4709-4723 (2017) - [c28]Chang-Wu Chen, Sang-Yoon Chang, Yih-Chun Hu, Yen-Wen Chen:
Protecting vehicular networks privacy in the presence of a single adversarial authority. CNS 2017: 1-9 - 2016
- [j24]Amy H. I. Lee, Chien-Wei Wu, Yen-Wen Chen:
A modified variables repetitive group sampling plan with the consideration of preceding lots information. Ann. Oper. Res. 238(1-2): 355-373 (2016) - [j22]Chien-Wei Wu, Amy H. I. Lee, Yen-Wen Chen:
A Novel Lot Sentencing Method by Variables Inspection Considering Multiple Dependent State. Qual. Reliab. Eng. Int. 32(3): 985-994 (2016) - 2015
- [j21]Yen-Wen Chen, Meng-Hsien Lin, Min-Yan Wu:
Study of Data Placement Schemes for SNS Services in Cloud Environment. KSII Trans. Internet Inf. Syst. 9(8): 3203-3215 (2015) - [j20]Meng-Hsien Lin, Yen-Wen Chen:
Performance Analysis of Buffer Aware Scheduling for Video Services in LTE Network. KSII Trans. Internet Inf. Syst. 9(9): 3594-3610 (2015) - [j19]Yen-Wen Chen, Meng-Hsien Lin, Chen-Yu Yang, Yuan-Cheng Liang:
Analysis and Measurement of Signaling in 3G Environment for Social Networking Services. Wirel. Pers. Commun. 84(2): 867-883 (2015) - 2014
- [j18]Yen-Wen Chen, Yen-Yin Chu, I-Hsuan Peng:
Energy-saving centric uplink scheduling scheme for broadband wireless access networks. EURASIP J. Wirel. Commun. Netw. 2014: 70 (2014) - [j17]Yen-Wen Chen, Meng-Hsien Lin, Yung-Ta Su:
Power Saving Efficiency Analysis of QoS Scheduling in the LTE Network Featuring Discontinuous Reception Operation. IEICE Trans. Commun. 97-B(10): 2212-2221 (2014) - [c25]Meng-Hsien Lin, Yen-Wen Chen:
Performance study of downlink scheduling for video streaming in LTE network. APNOMS 2014: 1-6 - [c24]Cui-Yu Kong, Yen-Wen Chen, I-Hsuan Peng:
Referential bounds analysis of uplink radio resource scheduling in LTE network. CCNC 2014: 519-524 - [c23]Yen-Wen Chen, Chien-Wei Wu:
A new lot sentencing method by variables inspection. CSCWD 2014: 380-383 - [c22]Yen-Wen Chen, Pei Ying Hsu, Jung Heng Tsai, Po Yin Liao, Meng-Hsien Lin:
A Heuristic Design of Uplink Scheduler in LTE-A Networks. IIH-MSP 2014: 884-888 - [c20]Yen-Wen Chen, Meng-Hsien Lin, Cho-Chun Huang:
Study of buffer aware scheduling for video streaming in LTE network. WPMC 2014: 531-535 - 2013
- [j15]I-Hsuan Peng, Yen-Wen Chen:
Energy consumption bounds analysis and its applications for grid based wireless sensor networks. J. Netw. Comput. Appl. 36(1): 444-451 (2013) - [c19]Yen-Wen Chen, Meng-Hsien Lin, Yung-Ta Su, Addison Y. S. Su:
Comparisons of power-saving efficiency for QoS traffics in LTE network by burst scheduling. APNOMS 2013: 1-6 - [c18]I-Hsuan Peng, Meng-Hsien Lin, Yen-Wen Chen, Fong-Ming Yang, Addison Y. S. Su:
Improvement of Streaming Video in Differential Service Networks by Using Opportunity RED Mechanism. CISIS 2013: 644-648 - 2012
- [c16]Yen-Wen Chen, I-Hsuan Peng, Chien-Yu Lai:
Study of Radio Resource Allocation Scheme for Single Carrier FDMA in LTE Network. VTC Spring 2012: 1-5 - 2011
- [j12]Yen-Wen Chen, Chang-Wu Chen, Yi-Shiou Lin:
Cross-layer design for radio resource allocation based on priority scheduling in OFDMA wireless access network. EURASIP J. Wirel. Commun. Netw. 2011: 28 (2011) - [j10]Hwa-Chun Ma, Prasan Kumar Sahoo, Yen-Wen Chen:
Computational geometry based distributed coverage hole detection protocol for the wireless sensor networks. J. Netw. Comput. Appl. 34(5): 1743-1756 (2011) - [c14]I-Hsuan Peng, Yen-Wen Chen, Chang-Wu Chen, Yu-Chin Huang:
Management of multiplexed ATM connection over WiMax network. APNOMS 2011: 1-5 - 2009
- [j7]I-Hsuan Peng, Yen-Wen Chen, Hsiang-Ru Peng:
A Systematic Wavelength Assign Algorithm for Multicast in WDM Networks with Sparse Conversion Nodes. J. Inf. Sci. Eng. 25(2): 559-574 (2009) - [j6]I-Hsuan Peng, Yen-Wen Chen, Po-Wei Wu:
A connectivity-based approach for the construction of hierarchical WDM network topology. Photonic Netw. Commun. 18(1): 116-121 (2009) - 2008
- [j5]Yen-Wen Chen, I-Hsuan Peng:
Study of multicast wavelength arrangement for maximizing network capacity in WDM networks with sparse wavelength converters. Photonic Netw. Commun. 15(2): 141-152 (2008) - [c12]Yen-Wen Chen, Hwa-Chun Ma, I-Hsuan Peng, Ta-En Chang:
Study of Cluster-Based Data Forwarding in Sensor Networks with Limited High-Power Mobile Nodes. ISPAN 2008: 93-98 - [c11]Chang-Wu Chen, Ping-Jia Su, Yen-Wen Chen:
Design of path-based multicast routing protocol in MANET. PM2HW2N 2008: 131-136 - 2007
- [c10]I-Hsuan Peng, Kuo-Wei Peng, Yen-Wen Chen:
Cross Layer Routing for Reliable Connections in IP over WDM Networks. AINA Workshops (1) 2007: 130-135 - [c9]Yen-Wen Chen, I-Hsuan Peng, Shiu-Tsuen Guan:
Dynamic Bandwidth Management for Handoffs with RSVP in 802.16/WLAN Environment. AINA Workshops (2) 2007: 243-248 - 2006
- [j4]Yen-Wen Chen, I-Hsuan Peng:
Shared protection of lightpath with guaranteed switching time over DWDM networks. J. Commun. Networks 8(2): 228-233 (2006) - [c5]Yen-Wen Chen, Yuan-Long Lee, I-Hsuan Peng:
Connection Control by Virtual Admission in Wireless LAN Environment. WASA 2006: 14-25
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-21 16:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint