Publication List (Jehn-Ruey Jiang)


Journal Papers
  1. Jehn-Ruey Jiang, “The column protocol: a high availability and low message cost solution for managing replicated data,” International Journal of Information System, Vol. 20, No. 8, pp. 687-696, Dec. 1995. (EI, SCI)
  2. Jehn-Ruey Jiang, Shing-Tsaan Huang, and Yu-Chen Kuo, “Cohorts structures for fault-tolerant k entries to a critical section,”IEEE Transactions on Computers, Vol. 46, No. 2, pp. 222-228, Feb. 1997. (EI, SCI)
  3. Yu-Chee Tseng, Jehn-Ruey Jiang, and Jih-Hsin Lee, “Secure bootstrapping and routing in an IPv6-based ad hoc network,” Journal of Internet Technology, Vol. 5, No. 2, pp.123-130, Feb. 2004. (SCIE)
  4. Jehn-Ruey Jiang, “On the nondomination of cohorts coteries,” IEEE Transactions on Computers, Vol. 53, No. 7, pp. 922-923, July 2004. (EI, SCI)
  5. Jehn-Ruey Jiang, Bing-Rong Lin, and Yu-Chee Tseng, “Analysis of Bluetooth device discovery and some speedup mechanisms,” International Journal of Electrical Engineering,  Vol. 11, No. 4, pp. 301-310, Nov. 2004. (EI)
  6. Jehn-Ruey Jiang, Yu-Chee Tseng, Chih-Shun Hsu, and Ten-Hwang Lai, “Quorum-based asynchronous power-saving protocols for IEEE 802.11 ad hoc networks,” ACM Journal on Mobile Networks and Applications, Vol. 10,  Issue 1-2, pp. 169–181, Feb. 2005. (EI, SCI)
  7. Chi-Hung Tzeng, Jehn-Ruey Jiang, and Shing-Tsaan Huang, "A Self-Stabilizing (\Delta+4)-Edge-Coloring Algorithm for Planar Graphs in Anonymous Uniform Systems," Information Processing Letters (IPL), Vol. 101, No. 4, pp. 168-173, February 2007. (EI, SCI)
  8. Jehn-Ruey Jiang, Chau-Yuan Yang, Ting-Yao Chiou, and Shing-Tsaan Huang, "A Hybrid Power-Saving Protocol by Dual-Channel and Dual-Transmission-Range Clustering for IEEE 802.11-Based MANETs," International Journal of Pervasive Computing and Communications, Vol. 3, Issue 3, 2007.
  9. Mo-Che Chan, Shun-Yun Hu, and Jehn-Ruey Jiang, "An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-Peer Massively Multiplayer Online Games," Computer Networks, Vol. 52 ,  Issue 9,  pp. 1838-1845, June 2008. (EI, SCI)
  10. Jehn-Ruey Jiang, "Expected Quorum Overlap Sizes of Quorum Systems for Asynchronous Power-Saving in Mobile Ad Hoc Networks," Computer Networks, Volume 52, Issue 17, pp. 3296-3306, 2008. (EI, SCI)
  11. Guan-Yu Huang, Shun-Yun Hu, and Jehn-Ruey Jiang, “Scalable Reputation Management with Trustworthy User Selection for P2P MMOGs,” International Journal of Advanced Media and Communication (IJAMC), Vol. 2, Issue 4, 380-401, 2008.
  12. Jehn-Ruey Jiang, Jiun-Shiang Chiou, and Shun-Yun Hu, “Enhancing Neighborship Consistency for Peer-to-Peer Networked Virtual Environments,” Journal of Internet Technology, Vol. 10, No. 1, pp. 29-36, 2009. (EI, SCIE)  (slides)
  13. Jehn-Ruey Jiang, Chung-Ta King, Chi-Shiang Liao, and Ching-Hao Liu, “MUREX: A Mutable Replica Control Scheme for Structured Peer-to-Peer Storage Systems,” International Journal of Pervasive Computing and Communications, Vol. 5, Issue 1, pp. 9-24, 2009.
  14. Jehn-Ruey Jiang, Yu-Li Huang, and Shun-Yun Hu, “Scalable AOI-cast for Peer-to-Peer Networked Virtual Environments,” Journal of Internet Technology, Vol. 10, No. 2, pp. 119-125, 2009. (EI, SCIE) (slides)
  15. Chi-Hung Tzeng, Jehn-Ruey Jiang, and Shing-Tsaan Huang, “Self-stabilizing algorithms for the maximum planarization problem in complete bipartite networks,” Information Processing Letters (IPL), Vol. 109, Issue 10, pp. 518-522, April 2009. (EI, SCI): Impact Factor: 0.706, N/M: 74/99)
  16. Mo-Che Chan, Shun-Yun Hu, and Jehn-Ruey Jiang, “Secure Peer-to-Peer 3D Streaming,” Multimedia Tools and Applications, Vol. 45, Issue 1, pp. 369 - 384, May 2009. (EI, SCI)
  17. Ming-Kuei Yeh, Jehn-Ruey Jiang, and Shing-Tsaan Huang, “Adaptive Splitting and Pre-Signaling for RFID Tag Anti-Collision,” Computer Communications Journal, Vol. 32, Issue 17, pp. 1862-1870, Nov. 2009. (EI, SCI)
  18. Jehn-Ruey Jiang, and Tzu-Ming Sung, “Energy-Efficient Coverage and Connectivity Maintenance for Wireless Sensor Networks,” Journal of Networks, Vol. 4, No. 6, pp. 403-410, 2009. (EI)
  19. Shun-Yun Hu, Jehn-Ruey Jiang, and Bing-Yu Chen, “Peer-to-Peer 3D Streaming,” IEEE Internet Computing,  Vol. 14, No. 2, pp. 54-61, March/April 2010. (EI, SCI)
  20. Chi-Hung Tzeng, Jehn-Ruey Jiang, and Shing-Tsaan Huang, “Size-Independent Self-Stabilizing Asynchronous Phase Synchronization in General Graphs,” Journal of Information Science and Engineering, Vol. 26, No. 4, pp. 1307-1322, 2010. (EI, SCI)
  21. Jehn-Ruey Jiang, Hung-Shiang Chen, and Chao-Wei Hung, “Peer-to-Peer AOI Voice Chatting for Massively Multiplayer Online Games,” International Journal of Electrical Engineering (IJEE), Vol. 17, No. 1, pp. 43-54, 2010. (EI)
  22. Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang, and Chuan-Wei Cheng, “Bandwidth-Aware Peer-to-Peer 3D Streaming,” International Journal of Advanced Media and Communication (IJAMC), Vol. 4, Issue 4, pp. 324-342, 2010.
  23. Jehn-Ruey Jiang, Jang-Ping Sheu, Ching Tu, and Jih-Wei Wu, “Anonymous Path Routing (APR) Protocol for Wireless Sensor Networks,” Journal of Information Science and Engineering (JISE), Vol. 27, No. 4, pp. 657-680, 2011. (EI, SCI)
  24. Jehn-Ruey Jiang, “Nondominated Local Coteries for Resource Allocation in Grids and Clouds,” Information Processing Letters (IPL), Vol. 111, No. 8, pp. 379-384, 2011. (EI, SCI)
  25. Jehn-Ruey Jiang, Yung-Liang Lai, and Fu-Cheng Deng,Mobile Robot Coordination and Navigation with Directional Antennas in Positionless Wireless Sensor Networks,” International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Vol. 7, No. 4,  pp. 272-280, 2011. (EI, SCI)
  26. Ming-Kuei Yeh, and Jehn-Ruey Jiang, “ Parallel Splitting for RFID Tag Anti-Collision,” International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Vol. 8 No. 4, pp. 249-260, 2011. (EI, SCI)
  27. Yu-Chia Chang, Jehn-Ruey Jiang, and Jang-Ping Sheu, An Asynchronous Duty Cycle Adjustment MAC Protocol for Wireless Sensor Networks,Journal of Internet Technology, Vol. 13, No.3, pp. 395-404, 2012. (EI, SCIE)
  28. Jehn-Ruey Jiang, and Yung-Liang Lai, “Wireless Broadcasting with Optimized Transmission Efficiency,” Journal of Information Science and Engineering (JISE), Vol28, No.3, pp. 479-502, 2012. (EI, SCI)
  29. Yung-Liang Lai, and Jehn-Ruey Jiang, “A Genetic Algorithm for Data Mule Path Planning in Wireless Sensor Networks,” Applied Mathematics & Information Sciences (AMIS), Vol. 7, No. 1, pp. 413-419, 2013. (EI, SCI)
  30. Jehn-Ruey Jiang, Chih-Ming Lin, Feng-Yi Lin, and Shing-Tsaan Huang, "ALRD: AoA Localization with RSSI Differences of Directional Antennas for Wireless Sensor Networks," International Journal of Distributed Sensor Networks, Vol. 2013, Article ID 529489, 10 pages, 2013. (SCI)
  31. Yung-Liang Lai, and Jehn-Ruey Jiang, “A 3-dimensional broadcast protocol with optimised transmission efficiency in wireless networks,” International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Vol. 12, No. 4, pp. 205-215, 2013. (EI, SCI)
  32. Chin-Ling Chen, Yu-Chung Huang, and Jehn-Ruey Jiang, A secure ownership transfer protocol using EPCglobal Gen-2 RFID, Telecommunication Systems, Vol. 53, No. 4, pp.  387-399, 2013. (EI, SCI)
  33. Yung-Liang Lai, and Jehn-Ruey Jiang, “Pricing Resources in LTE Networks through Multi-Objective Optimization,” The Scientific World Journal, Vol. 2014, Article ID 394082, 9 pages, January 2014.  (EI, SCI)
  34. Jehn-Ruey Jiang, Chih-Ming Lin, Kai-Chao Cheng, and Shing-Tsaan Huang, "Fingerprinting Localization with Cruciate Directional Antennas for Wireless Sensor Networks," International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC),  Vol.15, No. 1/2/3, pp. 161-170, 2014. (EI, SCI)
  35. Ming-Kuei Yeh, Jehn-Ruey Jiang, and Shing-Tsaan Huang, "Four-ary query tree splitting with parallel responses for RFID tag anti-collision," International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC),  Vol. 16, No. 3, pp. 193-205, 2014. (EI, SCI)
  36. Jehn-Ruey Jiang, Jih-Wei Wu, Chi-Wen Fan, and Jie-Yi Wu, "Immersive Voice Communication for Massively Multiplayer Online Games," Peer-to-Peer Networking and Applications, published online, DOI: 10.1007/s12083-014-0312-0, 03 October, 2014. (EI, SCI)
  37. Mahardeka Tri Ananta , Jehn-Ruey Jiang, and Muhammad Aziz Muslim, "Multicasting with the Extended Dijkstra’s Shortest Path Algorithm for Software Defined Networking," International Journal of Applied Engineering Research, Vol. 9, No. 23, pp. 21017-21030, 2014.
  38. Widhi Yahya, Achmad Basuki, and Jehn Ruey Jiang, "The Extended Dijkstra’s-based Load Balancing for OpenFlow Network," International Journal of Electrical and Computer Engineering, Vol. 5, No. 2, pp. 289-296, 2015.
  39. Yung-Liang Lai, and Jehn-Ruey Jiang, “Optimizing Sink-Connected Barrier Coverage in Wireless Sensor Networks,” International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), Vol. 20, No. 1, pp. 39-48, 2015. (EI, SCI)
  40. Jehn-Ruey Jiang, and Ji-Hau Liao, “Efficient Wireless Charger Deployment for Wireless Rechargeable Sensor Networks,” Energies, Vol. 9, Issue. 9, 696; doi:10.3390/en9090696, 2016. (SCI)(IF: 2.077)
  41. Yung-Liang Lai, and Jehn-Ruey Jiang, “Optimizing Detection Quality and Transmission Quality of Barrier Coverage in Heterogeneous Wireless Sensor Networks,” Mobile Networks and Applications, Vol 21, April 2017. (SCI)(IF: 1.538)
  42. Ke-Han Yao, Jehn-Ruey Jiang, Chung-Hsien Tsai and Zong-Syun Wu, “Evolutionary Beamforming Optimization for Radio Frequency Charging in Wireless Rechargeable Sensor Networks,” Sensors, 17(8), 1918, 2017. (SCI)(IF:2.677)

International Conference Papers  

  1. Shing-Tsaan Huang, Jehn-Ruey Jiang, and Yu-Chen Kuo, k-Coteries for fault-tolerant k entries to a critical section,” in Proc. of the 13th IEEE International Conference on Distributed Computing Systems, pp.74-81, Pittsburgh, PA, May 1993. (EI)
  2. Jehn-Ruey Jiang, and Shing-Tsaan Huang,Obtaining nondominated k-coteries for fault-tolerant disributed k-mutual exclusion,” in Proc. of 1994 International Conference on Parallel and Distributed Systems, pp.582-587, Hsinchu, Dec. 1994. (EI)
  3. Jehn-Ruey Jiang,Fault-tolerant distributed mutual exclusion with O(1) message overhead,” in Proc. of the 13th International Conference on Applied Informatics, pp.228-231, Austria, Feb. 1995.
  4. Jehn-Ruey Jiang, “Scalable spin locks for k-exclusion on shared-memory multiprocessors,” in Proc. of the 8th International Conference on Parallel and Distributed Systems, pp.242-244, Chicago, IL, Oct. 1996.
  5. Jehn-Ruey Jiang, “A framework for fault-tolerant distributed mutual exclusion and replica control using grid structures,” in Proc. of the 8th International Conference on Parallel and Distributed Systems, pp.311-315, Chicago, IL, Oct. 1996.
  6. Jehn-Ruey Jiang, “Self-stabilizing, randomized k-value unison clocks for unidirectional uniform rings,” in Proc. of 11th International Conference on Parallel and Distributed Computing and Systems, Boston, MA, Nov. 1999. (EI)
  7. Jehn-Ruey Jiang, “Secret Sharing via Nondominated Write-Read Coteries," in Proc. of the 13th International Conference on Parallel and Distributed Computing and Systems, Anaheim, CA, pp. 561-565, Aug. 2001. (EI)
  8. Jehn-Ruey Jiang, “A group mutual exclusion algorithm for ad hoc mobile networks,” in Proc. of the 6th International Conference on Computer Science and Informatics, pp. 266-270, March 2002.
  9. Jehn-Ruey Jiang, “A distributed h-out of-k mutual exclusion algorithm for ad hoc mobile networks,” in Proc. of 2002 International Parallel and Distributed Processing Symposium (IPDPS’02) - 2nd International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, April 2002. (NSC90-2213-E-364-001)
  10. Jehn-Ruey Jiang, “Distributed h-out of-k mutual exclusion using k-coteries,” in Proc. of the 3rd International Conference on Parallel and Distributed Computing, Application and Technologies PDCAT’02, pp. 218-226, Sep. 2002. (NSC90-2213-E-364-001)
  11. Jehn-Ruey Jiang, “A prioritized h-out of-k mutual exclusion algorithm with maximum degree of concurrency for mobile ad hoc networks and distributed systems,” in Proc. of the 4th International Conference on Parallel and Distributed Computing, Application and Technologies PDCAT’03, 2003
  12. Jehn-Ruey Jiang, Yu-Chee Tseng, Chih-Shun Hsu, and Ten-Hwang Lai, "Quorum-Based Asynchronous Power-Saving Protocols for IEEE 802.11 Ad Hoc Networks," in Proc. of the 32nd International Conference on Parallel Processing (ICPP'03), 2003. (Best Paper Award)
  13. Yu-Chee Tseng, Jehn-Ruey Jiang, and Jih-Hsin Lee, "Secure Bootstrapping and Routing in an IPv6-Based Ad Hoc Network," in Proc. of ICPP Workshop on Wireless Security and Privacy 2003, 2003.
  14. Jehn-Ruey Jiang, Cheng-Sheng Chou, and Shing-Tsaan Huang, "Constructing Nondominated Local Coteries for Distributed Resource Allocation," in Proc. of ICPP Workshop on Compile/Runtime Techniques for Parallel Computing, 2003
  15. Jehn-Ruey Jiang, "A Group k-Mutual Exclusion Algorithm for Distributed Systems," in Proc. of International Conference on Parallel and Distributed Computing and Systems (PDCS 2003), 2003. (EI)
  16. Jehn-Ruey Jiang, "Prioritized h-out of-k Mutual Exclusion for Mobile Ad Hoc Networks and Distributed Systems," in Proc. of International Conference on Parallel and Distributed Computing and Systems (PDCS 2003), 2003. (EI)
  17. Jehn-Ruey Jiang, "A Distributed Group k-Exclusion Algorithm using k-Write-Read Coteries," in Proc. of International Computer Symposium 2004 (ICS’04), 2004.
  18. Jehn-Ruey Jiang, "A Fault-Tolerant h-out of-k Mutual Exclusion Algorithm Using Cohorts Coteries for Distributed Systems," in Proc. of the 5th International Conference on Parallel and Distributed Computing, Application and Technologies PDCAT’04, Lecture Notes in Computer Science (LNCS), vol. 3320, pp. 267-273, 2005. (SCIE)
  19. Jehn-Ruey Jiang, Chung-Ta King, Chi-Shiang Liao, and Ching-Hao Liu, "MUREX: A Mutable Replica Control Scheme for Structured Peer-to-Peer Storage Systems,"  in Proc. of International Conference on Grid and Pervasive Computing (GPC), Lecture Notes in Computer Science (LNCS), vol. 3947, pp. 93-102, 2006. (SCIE)
  20. Chi-Hung Tzeng, Jehn-Ruey Jiang, and Shing-Tsaan Huang, "Self-Stabilizing Asynchronous Phase Synchronization in General Graphs," in Proc. of the 8th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2006), Lecture Notes in Computer Science (LNCS), vol. 4280, pp. 501-515, 2006. (SCIE)
  21. Jehn-Ruey Jiang, and Wei-Jiun Ling, "SEEKER: An Adaptive and Scalable Location Service for Mobile Ad Hoc Networks," in Proc. of International Computer Symposium 2006 (ICS'06), 2006.
  22. Mo-Che Chan, Shun-Yun Hu, and Jehn-Ruey Jiang, "An Efficient and Secure Event Signature (EASES) Protocol for Peer-to-peer Massively Multiplayer Online Games ,"   in Proc. of NETWORKING 2007, 2007.
  23. Jehn-Ruey Jiang, Jiun-Shiang Chiou, and Shun-Yun Hu, "Enhancing Neighborship Consistency for Peer-to-PeerDistributed Virtual Environments," in Proc. of the 1st IEEE International Workshop on Cooperative Distributed Systems (CDS), 2007.
  24. Ming-Kuei Yeh, and Jehn-Ruey Jiang, "Adaptive k-Way Splitting and Pre-Signaling for RFID Tag Anti-Collision," in Proc. of the 33rd Annual Conference of the IEEE Industrial Electronics Society (IECON'07), 2007. 
  25. Jehn-Ruey Jiang, and Hung-Shiang Chen, "Peer-to-Peer AOI Voice Chatting for Massively Multiplayer Online Games," in Proc. of  2007 International Workshop on Peer-to-Peer Network Virtual Environments, 2007.
  26. Jehn-Ruey Jiang, and Tzu-Ming Sung, "Maintaining Connected Coverage for Wireless Sensor Networks," in Proc. of the 5th Workshop on Wireless Ad hoc and Sensor Networks (WWASN2008), 2008.
  27. Jang-Ping Sheu, Jehn-Ruey Jiang, and Ching Tu, "Anonymous Path Routing in Wireless Sensor Networks," in Proc. of 2008 IEEE International Conference on Communications (ICC2008), 2008.
  28. Shun-Yun Hu, Shao-Chen Chang, and Jehn-Ruey Jiang, "Voronoi State Management for Peer-to-Peer Massively Multiplayer Online Games," in Proc. of the 4th IEEE Int'l Workshop on Networking Issues in Multimedia Entertainment (NIME), 2008.
  29. Shun-Yun Hu, Ting-Hao Huang, Shao-Chen Chang, Wei-Lun Sung, Jehn-Ruey Jiang, and Bing-Yu Chen, "FLoD: A Framework for Peer-to-Peer 3D Streaming," in Proc. of the 27th IEEE International Conference on Computer Communications (INFOCOM 2008), 2008.
  30. Jehn-Ruey Jiang, Yu-Li Huang, and Shun-Yun Hu, "Scalable AOI-Cast for Peer-to-Peer Networked Virtual Environments," in Proc. of the Second IEEE International Workshop on Cooperative Distributed Systems (CDS'08), 2008.
  31. Guan-Yu Huang, Shun-Yun Hu, and Jehn-Ruey Jiang, "Scalable Reputation Management for P2P MMOGs," in Proc. of  IEEE Virtual Reality (IEEE VR) Workshop on Massively Multiuser Virtual Environment (MMVE), 2008.
  32. Wei-Lun Sung, Shun-Yun Hu, and Jehn-Ruey Jiang, "Selection Strategies for Peer-to-Peer 3D Streaming," in Proc. of International Workshop on Network and Operating Systems Support for Digital Audio & Video (NOSSDAV 2008), 2008.
  33. Jehn-Ruey Jiang, Yeong-Liang Lai, and Fu-Cheng Deng, "Mobile Robot Coordination and Navigation with Directional Antennas in Positionless Wireless Sensor Networks," in Proc. of 2008 ACM International Workshop on Sensor, Ad Hoc, and Mesh Networks (SAMnet 2008), 2008.
  34. Yu-Chia Chang, Jehn-Ruey Jiang, Jang-Ping Sheu, and Hsin-Yi Shih, "ADCA: An Asynchronous Duty Cycle Adjustment MAC Protocol for Wireless Sensor Networks," in Proc. of IEEE GLOBECOM 2008, 2008.
  35. Jehn-Ruey Jiang, Jih-Wei Wu, and Guan-Shien Du, "Energy-Efficient and Traffic-Dispersive Event Contour Tracking in Multi-Sink Wireless Sensor Networks," in Proc. of the 1st IEEE International Workshop on Wireless Network Algorithms (WiNA-08), 2008.
  36. Chien-Hao Chien, Shun-Yun Hu, and Jehn-Ruey Jiang, "Delaunay State Management for Large-Scale Networked Virtual Environments," in Proc. of the 2nd International Workshop on Peer-to-Peer Network Virtual Environments (P2PNVE 2008), 2008
  37. Shun-Yun Hu, and Jehn-Ruey Jiang, "Plug: Virtual Worlds for Millions of People," in Proc. of the 2nd International Workshop on Peer-to-Peer Network Virtual Environments (P2PNVE 2008), 2008.
  38. Yung-Liang Lai, and Jehn-Ruey Jiang, “Optimal Path Planning for Fault-Tolerant and Energy-Efficient Target Surveillance in Wireless Sensor and Actor Networks,” in Proc. of the 2nd International Workshop on Sensor Network Technologies for Information Explosion Era, 2009.
  39. Yung-Liang Lai, and Jehn-Ruey Jiang, “Broadcasting with Optimized Transmission Efficiency in Wireless Networks, in Proc. of the 5th International Conference on Wireless and Mobile Communications, 2009.
  40. Chien-Hao Chien, Shun-Yun Hu, and Jehn-Ruey Jiang, "Bandwidth-Aware Peer-to-Peer 3D Streaming," in Proc. of NetGames 2009, 2009.
  41. Mo-Che Chan, Jehn-Ruey Jiang, Chao-Wei Chao-Wei Hung, and Wei Tsang Ooi, "Group-Based Peer-to-Peer 3D Streaming Authentication," in Proc. of the 3rd International Workshop on Peer-to-Peer Network Virtual Environments (P2PNVE 2009), 2009.
  42. Yung-Liang Lai, and Jehn-Ruey Jiang, "Broadcasting with Optimized Transmission Efficiency in 3-Dimensional Wireless Networks," in Proc. of International Conference on Parallel and Distributed Systems (ICPADS 2009), 2009.
  43. Shun-Yun Hu, Chuan Wu, Eliya Buyukkaya, Chien-Hao Chien, Tzu-Hao Lin, Maha Abdallah, Jehn-Ruey Jiang, and Kuan-Ta Chen, "A Spatial Publish Subscribe Overlay for Massively Multiuser Virtual Environments," in Proc. of 2010 International Conference on Electronics and Information Engineering (ICEIE 2010), Aug. 2010.
  44. Jehn-Ruey Jiang, Chih-Ming Lin, and Yi-Jia Hsu, "Localization with Rotatable Directional Antennas for Wireless Sensor Networks," in Proc. of 2010 International Workshop on Applications of Wireless Ad Hoc and Sensor Networks (AWASN 2010),  2010.
  45. Yung-Liang Lai, and Jehn-Ruey Jiang, "Optimal Multipath Planning for Intrusion Detection in Smart Homes Using Wireless Sensor and Actor Networks," in Proc. of 2010 International Workshop on Applications of Wireless Ad Hoc and Sensor Networks (AWASN 2010),  2010.
  46. Jehn-Ruey Jiang, Chao-Wei Hung, and Jih-Wei Wu, "Bandwidth- and Latency-Aware Peer-to-Peer Friendcast for Online Social Networks," in Proc. of the 4th International Workshop on Peer-to-Peer Networked Virtual Environment (P2PNVE 2010), 2010.
  47. Jehn-Ruey Jiang, Ching-Chuan Huang, and Chung-Hsien Tsai, "Avatar Path Clustering in Networked Virtual Environments," in Proc. of the 4th International Workshop on Peer-to-Peer Networked Virtual Environments (P2PNVE 2010), 2010.
  48. Yung-Liang Lai, and Jehn-Ruey Jiang, "Sink-Connected Barrier Coverage Optimization for Wireless Sensor Networks," in Proc. of 2011 International Conference on Wireless and Mobile Communications (ICWMC 2011), 2011.
  49. Yung-Liang Lai, and Jehn-Ruey Jiang, "Heuristic Resource Allocation with Satisfaction for WiMAX Services," in Proc. of 2011 International Conference on Wireless Networks, 2011.
  50. Yung-Liang Lai, and Jehn-Ruey Jiang, "Optimal Multipath Planning for Neyman-Pearson Detection in Wireless Sensor Networks," in Proc. of 2011 International Workshop on Applications of Wireless Ad Hoc and Sensor Networks (AWASN 2011),  2011.
  51. Ming-Kuei Yeh, Jehn-Ruey Jiang, and Shing-Tsaan Huang, "Parallel Response Query Tree Splitting for RFID Tag Anti-Collision," in Proc. of 2011 International Workshop on Applications of Wireless Ad Hoc and Sensor Networks (AWASN 2011),  2011.
  52. Ta-Yu Huang, Chih-Ming Lin, Jehn-Ruey Jiang, Wei Tsang Ooi, Maha Abdallah, and Khaled Boussetta, "SYMA: A Synchronous Multihop Architecture for Wireless Ad Hoc Multiplayer Games," in Proc. of the 5th International Workshop on Peer-to-Peer Networked Virtual Environments (P2PNVE 2011), 2011.
  53. Chi-Wen Fann, Jehn-Ruey Jiang, and Jih-Wei Wu, "Peer-to-Peer Immersive Voice Communication for Massively Multiplayer Online Games," in Proc. of the 5th International Workshop on Peer-to-Peer Networked Virtual Environments (P2PNVE 2011), 2011.
  54. Jehn-Ruey Jiang, Chih-Ming Lin, Feng-Yi Lin, and Shing-Tsaan Huang, "ALRD: AoA Localization with RSSI Differences of Directional Antennas for Wireless Sensor Networks," in Proc. of 2012 Information Society (i-Society 2012), 2012.
  55. Yung-Liang Lai, Hsueh-Chi Shih, and Jehn-Ruey Jiang, "Strategies of Mobile Agents on Malicious Clouds," in Proc. of the 18th Americas Conference on Information Systems, Aug 9-11, 2012.
  56. Mo-Che Chan, Jehn-Ruey Jiang, and Shing-Tsaan Huang, "Fault-Tolerant and Secure Networked Storage," in Proc. of the 7th International Conference on Digital Information Management (ICDIM 2012), 2012.
  57. Jung-Shyr Wu, Shun-Fang Yang, Chia-Ming Hsu, Jiun-Yu Tu, and Jehn-Ruey Jiang, "User Satisfaction-Based Scheduling Algorithm for Uplink Transmission in Long Term Evolution System," in Proc. of the IEEE ICPADS Workshop on Distributed Communication Network System, 2012.
  58. Yu-Chung Huang, and Jehn-Ruey Jiang, "An Ultralightweight Mutual Authentication Protocol for EPC C1G2 RFID Tags," in Proc. of 2012 International Symposium on Parallel Architectures, Algorithms and Programming (PAAP'12),  2012.
  59. Yung-Liang Lai, and Jehn-Ruey Jiang, "Barrier Coverage with Optimized Quality for Wireless Sensor Networks," in Proc. of the 15th International Symposium on Wireless Personal Multimedia Communications Symposium (WPMC'12), 2012.
  60. Chi Hung Tzeng, Jehn-Ruey Jiang, Shing Tsaan Huang, and Cheng Feng Yeh, "Randomized Self-stabilization under Distributed Daemon for 6-Coloring Planar Graph," in Proc. of the International Computer Symposium 2012 (ICS 2012), 2012.
  61. Ming-Kuei Yeh, and Jehn-Ruey Jiang, "A Novel Query Tree Protocol Based on Partial Responses for RFID Tag Anti-Collision," in Proc. of the 1st International Workshop on Internet of Things Technologies (IoTT 2013), 2013.
  62. Ji-Hau Liao, and Jehn-Ruey Jiang, "Wireless Charger Deployment Optimization for Wireless Rechargeable Sensor Networks," in Proc. of the 7th International Conference on Ubi-Media Computing (UMEDIA 2014), 2014.
  63. Yu-Chung Huang, and Jehn-Ruey Jiang, "Efficient Ultralightweight RFID Mutual Authentication," in Proc. of 2014 IEEE International Conference on Internet of Things (iThings 2014), 2014.
  64. Jih-Wei Wu, Ding-Wei Chou, and Jehn-Ruey Jiang, "The Virtual Environment of Things (VEoT): A Framework for Integrating Smart Things into Networked Virtual Environments," in Proc. of  IEEE International Conference on Cyber, Physical and Social Computing 2014 (CPSCom 2014), 2014.
  65. Jehn-Ruey Jiang, Hsin-Wen Huang, Ji-Hau Liao, and Szu-Yuan Chen, "Extending Dijkstra’s Shortest Path Algorithm for Software Defined Networking," in Proc. of the 16th Asia-Pacific Network Operations and Management Symposium (APNOMS 2014), 2014.
  66. Ming-Kuei Yeh, Yung-Liang Lai, and Jehn-Ruey Jiang, "An Efficient Query Tree Protocol for RFID Tag Anti-Collision," in Proc. of the 2nd International Workshop on Internet of Things Technologies (IoTT 2014), 2014.
  67. Jehn-Ruey Jiang, Jia-Jiun Yang, and Yung-Liang Lai, "A Decreasing k-Means Algorithm for the Disk Covering Tour Problem in Wireless Sensor Networks," in Proc. of the 2nd International Workshop on Internet of Things Technologies (IoTT 2014), 2014.
  68. Jehn-Ruey Jiang, Widhi Yahya, and Mahardeka Tri Ananta, "Load Balancing and Multicasting Using the Extended Dijkstra’s Algorithm in Software Defined Networking," in Proc. of the International Computer Symposium 2014 (ICS 2014), 2014.
  69. Ji-Hau Liao, Chi-Ming Hong, and Jehn-Ruey Jiang, "An Adaptive Algorithm for Charger Deployment Optimization in Wireless Rechargeable Sensor Networks," in Proc. of the International Computer Symposium 2014 (ICS 2014), 2014.
  70. Jehn-Ruey Jiang, Chieh-Chun Huang, and Shih-Yi Chan, "Multi-Channel and Multi-Timeslot Convergecast for Barrier Coverage in Wireless Sensor Networks," in Proc. of the 2015 International Conference on Information Processing and Control Engineering (ICIPCE 2015), 2015.
  71. Jehn-Ruey Jiang, Guan-Yi Sung, and Jih-Wei Wu, "LOM: A Leader Oriented Matchmaking Algorithm for Multiplayer Online Games," in Proc. of  International Conference on Internet Studies (NETs 2015), 2015. (Distinguished Paper Award)
  72. Jehn-Ruey Jiang, and Fu-Hsiang Chang, "Multi-Server Dynamic Load Balancing for Networked Virtual Environments," in Proc. of  25th Anniversary International Conference on Computer Graphics and Vision, Scientific Visualization and Virtual Environment (GraphiCon2015), Moscow, Russia, pp. 50-55, September 22-25, 2015.
  73. Yu-Chung Huang, and Jehn-Ruey Jiang, "Ultralightweight RFID Reader-Tag Mutual Authentication," in Proc. of IEEE Computers, Software, and Applications Conference (COMPSAC 2015), 2015.
  74. Yu-Chung Huang, and Jehn-Ruey Jiang, "Ultralightweight RFID Reader-Tag Mutual Authentication Revisted," in Proc. of IEEE Mobile Services Conference (IEEE MS 2015), 2015.
  75. Pei-Chen Qiu, Whai-En Chen and Jehn-Ruey Jiang, "Traffic Offloading with Mobility in LTE HeNB Networks," in Proc. of the 3rd International Workshop on Internet of Things Technologies (IoTT 2015), 2015.
  76. Jehn-Ruey Jiang and Szu-Yuan Chen, "Constructing Multiple Steiner Trees for Software-Defined Networking Multicast," in Proc. of the 11th ACM International Conference on Future Internet Technologies (CFI 2016), pp. 1-6, 2016.
  77. Ming-Kuei Yeh, Yung-Liang Lai, and Jehn-Ruey Jiang, "Silence Coding for RFID Tag Anti-collision," in Proc. of  the 41st IEEE Conference on Local Computer Networks (LCN 2016), 2016.
  78. Yen-Chung Chen, and Jehn-Ruey Jiang, "Particle Swarm Optimization for Charger Deployment in Wireless Rechargeable Sensor Networks," in Proc. of the 26th International Telecommunication Networks and Applications Conference (ITNAC 2016), 2016.
  79. Hanas Subakti, and Jehn-Ruey Jiang, "A Marker-Based Cyber-Physical Augmented-Reality Indoor Guidance System for Smart Campuses," in Proc. of 14th IEEE International Conference on Smart City (SmartCity 2016), 2016.
  80. Jehn-Ruey Jiang, “An Improved Cyber-Physical Systems Architecture for Industry 4.0 Smart Factories,” in Proc. of IEEE International Conference on Applied System Innovation 2017 (ICASI 2017), May 2017.
  81. Jehn-Ruey Jiang and Chang-Kuei Kuo, "Enhancing Convolutional Neural Network Deep Learning for Remaining Useful Life Estimation in Smart Factory Applications," in Proc. of 2017 International Conference on Information, Communication and Engineering (ICICE), 2017. (978-1-5386-3202-4)

Local Journal Papers

  1. Jehn-Ruey Jiang, “A write-read coterie secret sharing scheme,” Journal of Hsuan Chuang College, Vol. 3, pp. 37-51, 2001.
  2. Jehn-Ruey Jiang, “Self-stabilizing k-value unison clocks for unidirectional uniform rings,” Journal of Hsuan Chuang College, Vol. 3, pp. 113-121, 2001.
  3. Jehn-Ruey Jiang, Yu-Chee Tseng and Ten-Hwang Lai, “Asynchronous power-saving protocols via quorum systems for IEEE 802.11 ad hoc networks,” Journal of Hsuan Chuang College, Vol. 7, pp. 81-108, 2003.
  4. Yu-Chee Tseng and Jehn-Ruey Jiang, “Secure autoconfiguration and routing in an IPv6-based ad hoc network,” Journal of Hsuan Chuang College, Vol. 7, pp. 233-254, 2003.
  5. Jehn-Ruey Jiang, “Prioritized h-out of-k resource allocation for mobile ad hoc networks and distributed systems,” Journal of Hsuan Chuang College, Vol. 7, pp. 143-166, 2003.
  6. Jehn-Ruey Jiang, “A distributed h-out of-k mutual exclusion algorithm with maximum degree of concurrency for mobile ad hoc networks,” Hsuan Chuang Management Journal, Vol. 2, pp. 63-86, March 2004.

Local Conference Papers

  1. Jehn-Ruey Jiang, and Shing-Tsaan Huang, “Fault-tolerant distributed k-mutual exclusion with constant expected message cost,” in Proc. of 1995 Workshop on Distributed System Technologies and Applications, pp.104-110, Tainan, July 1995.
  2. Jehn-Ruey Jiang, Bing-Rong Lin, and Yu-Chee Tseng, “A mechanisms for quick Bluetooth device discovery,” in Proc. of Mobile Computing 2004, 2004. (Excellent Paper Award)
  3. Jehn-Ruey Jiang, "Ideal and Perfect Secret Sharing for Fault-Tolerant Distributed Access Control of Secure Data via Nondominated Bicoteries," in Proc. of the 21st Workshop on Combinatorial Mathematics and Computational Theory, 2004.
  4. Jehn-Ruey Jiang, "Perfect Multi-Group Secret Sharing via Nondominated DIV k-Coteries," in Proc. of the 22nd Workshop on Combinatorial Mathematics and Computational Theory, 2005.
  5. Jehn-Ruey Jiang, "Analyzing Average-Case Neighbor Sensibilities for Quorum-Based Asynchronous Power-Saving Protocols in an IEEE 802.11 MANET," in Proc. of the 1st Workshop on Wireless, Ad hoc, and Sensor Networks, 2005.
  6. Jehn-Ruey Jiang, Chau-Yuan Yang, and Ting-Yao Chiou, "A Hybrid Power-Saving Protocol by Dual-Channel and Dual-Transmission-Range Clustering in IEEE 802.11 MANETs,"  in Proc. of the 1st Workshop on Wireless, Ad hoc, and Sensor Networks, 2005.
  7. Jehn-Ruey Jiang, and Ming-Kuei Yeh, "The Design Concept of U-Guide Ubiquitous Learning System," in Proc. of the 2nd Workshop on Wireless, Ad hoc, and Sensor Networks, 2006.
  8. Jehn-Ruey Jiang, "Energy-Efficient Coverage and Connectivity Maintenance for Wireless Sensor Networks," (in Chinese),  in Proc. of the 2nd Workshop on Wireless, Ad hoc, and Sensor Networks, 2006.
  9. Jehn-Ruey Jiang, Chi-Hsiang Liao, and Jiun-Shiang Chiou "A Mutable Replica Control Scheme for Structured P2P Storage Systems," in Proc. of 2006 Cross-Strait  
    Information Technology Conference (CSIT 2006)
    , 2006.
  10. Jehn-Ruey Jiang, I-Chuan Chen, and Fu-Cheng Deng, "3-Beacon 3D Localization for Wireless Sensor Networks," (in Chinese), in Proc. of the 3rd Workshop on Wireless, Ad hoc, and Sensor Networks, 2007.
  11. Kuan Shian Duh, and Jehn-Ruey Jiang, "Energy-Efficient Event Contour Tracking in Multi-Sink Wireless Sensor Networks," in Proc. of 2008 Cross-Strait Information Technology Conference (CSIT 2008), 2008.
  12. Jehn-Ruey Jiang, and Fu-Cheng Deng, "Mobile Robot Navigation with Directional Antennas in Positionless Wireless Sensor Networks," in Proc. of 2008 Cross-Strait Information Technology Conference (CSIT 2008), 2008.
  13. Jehn-Ruey Jiang, "Expected Quorum Overlap Sizes of Optimal Quorum Systems with the Rotation Closure Property for Asynchronous Power-Saving Algorithms in Mobile Ad Hoc Networks," in Proc. of the 25th Workshop on Combinatorial Mathematics and Computational Theory, 2008.
  14. Chien-Hao Chien, and Jehn-Ruey Jiang, "Bandwidth-Aware Peer-to-Peer 3D Streaming," in Proc. of 2009 Cross-Strait Information Technology Conference (CSIT 2009), 2009. (in Chinese)
  15. G. M. Lin, I. C. Sheu, and Jehn-Ruey Jiang, "Localization with Rotating Directional Antennas for Wireless Sensor Networks," in Proc. of the 2009 Cross-Strait Information Technology Conference (CSIT 2009), 2009. (in Chinese)
  16. Ming-Kuei Yeh, and Jehn-Ruey Jiang, “A Counter-Based RFID Anti-Collision Protocol Using Parallel Splitting,” in Proc. of the 5th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2009), 2009. (Best Paper Award)
  17. Jyun-Jie Huang, Jih-Wei Wu, and Jehn-Ruey Jiang, “IM Finder: Searching for Answers via Instant Message Networks,” in Proc. of 2009 National Computer Symposium (NCS 2009), 2009.
  18. Ming-Kuei Yeh, Shing-Tsaan Huang, and Jehn-Ruey Jiang, "Parallel Splitting and Merging for RFID Tag Anti-collision," in Proc. of 2010 Cross-Strait Information Technology Conference (CSIT 2010), 2010. (in Chinese)
  19. Chih-Ming Lin, and Jehn-Ruey Jiang, "無線感測網路的多維資料聚合與還原機制," in Proc. of the 1st National Conference on Web Intelligence and Applications (NCWIA2011), 2011
  20. Yung-Liang Lai, and Jehn-Ruey Jiang, "具有資料彙集節點連通性的邊界覆蓋之無線感測網路最佳化規劃," in Proc. of the 28th Workshop on Combinatorial Mathematics and Computational Theory, 2011.
  21. Chih-Ming Lin, Jehn-Ruey Jiang, and Shing-Tsaan Huang, "Data Recoverable Multidimensional Aggregation for Wireless Sensor Networks," in Proc. of the 7th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2011), 2011. (Best Paper Award)
  22. Chuan-Wei Cheng, and Jehn-Ruey Jiang, "非結構式同儕網路拓樸調整," in Proc. of 2011 National Computer Symposium (NCS 2011), 2011. (Best Paper Award Nomination)
  23. Yung-Liang Lai, and Jehn-Ruey Jiang, "Barrier Coverage Repairing for the Wireless Sensor Network with a Mobile Robot," in Proc. of the 8th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2012), 2012. (in Chinese)
  24. Yu-Chung Huang, Jehn-Ruey Jiang, and Shing-Tsaan Huang, "An Ultralightweight Mutual Authentication Protocol for EPC C1G2 RFID Tags," in Proc. of the 8th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2012), 2012.
  25. Jih-Wei Wu, Ding-Wei Chou, and Jehn-Ruey Jiang, "VEoT (Virtual Environment of Things): An Architecture for Inter-acting with Smart Things in Networked Virtual Environments," in Proc. of the 8th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2012), 2012.
  26. Jehn-Ruey Jiang, Chih-Ming Lin, and Ta-Yu Huang, "A Performance Study on the Synchronous Multihop Architecture for Wireless Ad Hoc Multiplayer Games," in Proc. of the 17th Mobile Computing Workshop (MC 2012), 2012.
  27. Ming-Kuei Yeh, Shing-Tsaan Huang, and Jehn-Ruey Jiang, "An RFID Tag Anti-Collision Protocol Using Parallel Splitting and Merging," in Proc. of the 9th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2013), 2013.
  28. Wei-Ting So, Yu-Shun Liu, Jiun-Yu Tu, Jehn-Ruey Jiang, and Jung-Shyr Wu, "Satisfaction-based LTE Uplink Scheduling," in Proc. of the 9th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2013), 2013. (in Chinese)
  29. Chieh-Chun Huang, Shih-Yi Chan, Jehn-Ruey Jiang, and Jiun-Yu Tu, "Multi-Channel and Time-Slot Scheduling for Barrier Coverage in WSNs," in Proc. of the 9th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2013), 2013. (in Chinese)
  30. Ji-Hau Liao, Wei-Ting So, and Jehn-Ruey Jiang, "Optimized Charger Deployment for Wireless Rechargeable Sensor Networks," in Proc. of the 9th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2013), 2013. (in Chinese) (Best Paper Award)
  31. 宋 管翊、江振瑞 "LOM: 領隊導向多人連線遊戲自動匹配演算法" in Proc. of TANET 2013, 2013.
  32. Jia-Jiun Yang, and Jehn-Ruey Jiang, "The Disk Covering Tour Problem for Wireless Sensor Networks," in Proc. of the 10th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2014), 2014. (in Chinese)
  33. Chi-Ming Hong, Ji-Hau Liao, and Jehn-Ruey Jiang, "Optimized Charger Deployment and Scheduling for Wireless Rechargeable Sensor Networks," in Proc. of the 10th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2014), 2014. (in Chinese) (Best Paper Award)
  34. Pei-Chen Qiu and Jehn-Ruey Jiang, "Traffic Offloading in LTE HeNB Networks with Mobility," in Proc. of the 19th Mobile Computing Workshop (MC 2014), 2014. (in Chinese)
  35. Jehn-Ruey Jiang, Hsin-Wen Huang, Ji-Hau Liao, and Szu-Yuan Chen, "Achieving Optimal Routing for Software Defined Networking by Extending Dijkstra’s Algorithm," in  Proc. of the 2014 Cross-Strait Information Technology Conference (CSIT 2014), 2014. (in Chinese)
  36. Yen-Chung Chen, and Jehn-Ruey Jiang, "Particle Swarm Optimization for Charger Deployment in Wireless Rechargeable Sensor Networks," Proc. of the 11th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2015), 2015. (in Chinese)
  37. Zheng-Qin Jian, Yu-Chung Huang, and Jehn-Ruey Jiang, "A Privacy Preserving NFC Guestbook System," in  Proc. of the 2015 Cross-Strait Information Technology Conference (CSIT 2015), 2015. (in Chinese)
  38. Chih-Yang Chan, and Jehn-Ruey Jiang, "An iBeacon-based Distance Estimation System for Golf Putting," in Proc. of the 12th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2016), 2016. (in Chinese)
  39. Shih-Chang Lin, and Jehn-Ruey Jiang, "Improving the Asymmetric Rabin Cryptosystem for Internet of Things," in Proc. of the 12th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2016), 2016. (in Chinese)
  40. Ke-Han Yao, and Jehn-Ruey Jiang, "Evolutionary Beamforming Optimization for Radio Frequency Charging," in Proc. of the 12th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2016), 2016. (in Chinese)(Best Paper Award Candidate)
  41. Yen-Chung Chen, and Jehn-Ruey Jiang, "Meta-optimization for Charger Deployment in Wireless Rechargeable Sensor Networks," in  Proc. of the 12th Workshop on Wireless, Ad hoc, and Sensor Networks (WASN 2016), 2016. (in Chinese)(Best Paper Award)
  42. Jehn-Ruey Jiang and Szu-Yuan Chen, "Constructing Multiple Steiner Trees for Software-Defined Networking Multicast," in Proc. of the 21st Mobile Computing Workshop (MC 2016), 2016. (in Chinese)
  43. Chia-Chun Tien, and  Jehn-Ruey Jiang, "Implementing the iBeacon-based Ad Hoc Positioning System," in Proc. of the 21st Mobile Computing Workshop (MC 2016), 2016. (in Chinese)
  44. Yu-Ming Chen, and Jehn-Ruey Jiang, "Indoor 2D and 3D Weighted Centroid Localization Using iBeacons,"  in Proc. of the 21st Mobile Computing Workshop (MC 2016), 2016. (in Chinese)
  45. Bang-Rui Pan, and Jehn-Ruey Jiang, "The Design and Implementation of RESTful Smart IoT Middleware,"  in Proc. of the 21st Mobile Computing Workshop (MC 2016), 2016. (in Chinese)
  46. Zheng-Ping Guo, and Jehn-Ruey Jiang, "An SDN-Based Hyper File System,"  in Proc. of the 21st Mobile Computing Workshop (MC 2016), 2016. (in Chinese)

Monography Papers

  1. Jehn-Ruey Jiang, Cheng-Sheng Chou and Shing-Tsaan Huang, “Distributed resource allocation using nondominated coteries,” Hsuan Chuang College Research Bulletin 2002, pp. 305-324, 2002.
  2. Jehn-Ruey Jiang, “A prioritized mutual exclusion algorithm for mobile ad hoc networks,” Hsuan Chuang College Research Bulletin 2002, pp. 325-342, 2002.
  3. Jehn-Ruey Jiang, “A distributed group k-mutual exclusion algorithm,” Hsuan Chuang College Research Bulletin 2002, pp. 343-360, 2002.
  4. Jehn-Ruey Jiang, “An h-out of-k mutual exclusion algorithm using k-coteries for distributed systems,” Hsuan Chuang College Research Bulletin 2002, pp. 361-378, 2002.
  5. Jehn-Ruey Jiang, “A token-based group mutual exclusion algorithm for mobile ad hoc networks,” Hsuan Chuang College Research Bulletin 2002, pp. 379-398, 2002.
  6. Jehn-Ruey Jiang, “A token-based h-out of-k mutual exclusion algorithm for mobile ad hoc networks,” Hsuan Chuang College Research Bulletin 2002, pp. 399-416, 2002.

Thesis and Dissertation
  1. Jehn-Ruey Jiang, “Path coherent ray tracing,” Master Thesis, Tsing Hua University, July 1989.
  2. Jehn-Ruey Jiang, “Quorum structures for fault-tolerant distributed mutual exclusion,” Ph.D. Dissertation, Tsing Hua University, July 1995.

Book Chapters
  1. Jehn-Ruey Jiang and Ming-Kuei Yeh, "Anti-collision protocols for the RFID system," RFID and Sensor Networks: Architectures, Protocols, Security and Integrations, Ed. Yan Zhang et al., Auerbach Publications, Taylor&Francis Group, USA, 2009. (ISBN:1420077775)
  2. Shing-Tsaan Huang, Chi-Hung Tzeng and Jehn-Ruey Jiang, "Self-Stabilizing Graph Coloring Algorithms," Distributed Innovations for Business, Engineering and Science,  IGI Global. (ISBN: 1466625333) (Release Date: November, 2012. Copyright © 2013. 422 pages.)

Books
  1. 江振瑞, “電腦動畫基礎與實作”, 儒林圖書公司, 1991年8月。
  2. 江振瑞, “中文Java程式設計-SIM768”, 儒林圖書公司, 2001年6月。
  3. 江振瑞, “中文Java程式設計-SIM908”, 儒林圖書公司, 2003年1月再版(2006年3月三版)。
  4. 江振瑞, “物件導向資料結構—使用Java語言”, 松崗圖書公司, 2003年9月初版(2005年8月再版)。

  回首頁