Page 75 - profile2012.indd
P. 75
Research Faculty 研究人員
副研究員 副研究員
陳昇瑋 Sheng-Wei (Kuan-Ta) Chen 陳伶志 Ling-Jyh Chen
Associate Research Fellow Associate Research Fellow
Ph.D., Electrical Engineering, National Taiwan University Ph.D., Computer Science, University of California at Los Angeles
Tel: +886-2-2788-3799 ext. 1712 Fax: +886-2-2782-4814 Tel: +886-2-2788-3799 ext. 1702 Fax: +886-2-2782-4814
Email: swc@iis.sinica.edu.tw Email: cclljj@iis.sinica.edu.tw
http://www.iis.sinica.edu.tw/~swc http://www.iis.sinica.edu.tw/cclljj/
● Associate Research Fellow, IIS, Academia Sinica (2011 - ) ● Best Paper Award, International Workshop on Security (IWSEC ● Associate Research Fellow, IIS, Academia Sinica (2011 - ) ● M.S., Computer Science, University of California at Los Angeles
● Assistant Research Fellow, IIS, Academia Sinica (2006 - 2011) 2008) ● Assistant Research Fellow, IIS, Academia Sinica (2005 – 2011) (2002)
● Young Investigator Merit Award, National Science Council, Tai- ● Ph.D., Department of Electrical Engineering, National Taiwan ● Ph.D., Computer Science, University of California at Los Angeles ● B.Ed., Information and Computer Education, National Taiwan
wan (2011 - 2014) University (2002 - 2006) (2005) Normal University (1998)
● Outstanding Young Electrical Engineer Award, Taiwan (2010) ● M.S., Department of Computer Science, National Tsing Hua Uni-
● K. T. Li Distinguished Young Scholar Award, ACM Taipei/Taiwan versity (1998 - 2000)
Chapter (2009) Research Description Publications
Research Description Publications My research interests lie in the area of computer network 1. Rohit Kapoor, Ling-Jyh Chen, Li Lao, Mario Gerla, and M. Y.
systems and applications. The primary objectives of my Sanadidi. CapProbe: A Simple and Accurate Capacity Estima-
My general research area is multimedia networking, with 1. Chien-Ju Ho, Chen-Chi Wu, Kuan-Ta Chen, and Chin-Luang research are 1) to understand the fundamental proper- tion Technique. ACM SIGCOMM 2004, Portland, USA, 2004.
an aim to improve users’ perceptions of service quality. Lei, “DevilTyper: A Game for CAPTCHA Usability Evalua- ties of mobile and wireless networks; and 2) to investigate 2. Ling-Jyh Chen, Yung-Chih Chen, Tony Sun, Paruveli Sreede-
Computer networks are now almost ubiquitous, and the tion,” ACM Computers in Entertainment, volume 9, number feasible solutions that facilitate more enjoyable network vi, Kuan-Ta Chen, Chen-Hung Yu, and Hao-hua Chu. Find-
ing Self-Similarities in Opportunistic People Networks. IEEE
“anytime-anywhere” communication is becoming a reality 1, April 2011. experience for end users. Conference on Computer Communications (Infocom’07), An-
for billions of people. However, many people still have to 2. Chien-Ju Ho, Tao-Hsuan Chang, Jong-Chuan Lee, Jane Yung- Speci cally, we research networked sensing systems in chorage, Alaska, USA, 2007.
struggle with various obstacles in using Internet services, jen Hsu, and Kuan-Ta Chen, “KissKissBan: A Competitive hostile environments. We perform analytical study to 3. Ling-Jyh Chen, Chen-Hung Yu, Cheng-Long Tseng, Hao-hua
such as unexpected disconnections and spam mails. My Human Computation Game for Image Annotation,” ACM model network mobility and design fault-tolerant mech- Chu, and Cheng-Fu Chou. A Content-Centric Framework for
goal is to make Internet a seamless part of everyday life, SIGKDD Explorations, June 2010. anisms to facilitate reliable sensing data harvesting in Effective Data Dissemination in Opportunistic Networks.
which is the reason that I dedicate to improving the qual- 3. Kuan-Ta Chen, Chi-Jui Chang, Chen-Chi Wu, Yu-Chun Chang, challenged environments. Moreover, we prototype our IEEE Journal of Selected Areas in Communications, volume
26, number 5, pp. 761-772, June, 2008.
ity of Internet services and making the medium more us- and Chin-Laung Lei, “Quadrant of Euphoria: A Crowdsourc- research results and conduct real-world deployment. For
er-friendly. ing Platform for QoE Assessment,” IEEE Network, volume 4. Ling-Jyh Chen, Tony Sun, Bo-Chun Wang, M. Y. Sanadidi,
24, number 2, March 2010. instance, we have deployed the YushanNet system for hik- and Mario Gerla. PBProbe: A Capacity Estimation Tool for
One of my research directions is quality of experience 4. Hsing-Kuo Pao, Kuan-Ta Chen, Hong-Chung Chang, “Game er tracking, search, and rescuing in Yushan National Park, High Speed Networks. Computer Communications Journal,
(QoE) management. I hope that network systems will Bot Detection via Avatar Trajectory Analysis,” IEEE Transac- and the system will soon become a regular service of the Elsevier, volume 31, number 17, pp. 3883-3893, November,
2008.
become smarter and more responsive to people’s needs. tions on Computational Intelligence and AI in Games, 2010. national park.
For example, if people nd the network quality is unac- 5. Kuan-Ta Chen, Yu-Chun Chang, Po-Han Tseng, Chun-Ying In addition, we investigate emerging social computing 5. Ling-Jyh Chen, Tony Sun, Guang Yang, M. Y. Sanadidi, and
Mario Gerla. AdHoc Probe: End to end Capacity Probing in
ceptable when attending a video conference or playing an Huang, and Chin-Laung Lei, “Measuring The Latency of systems with a focus on human computation. The ration- Ad Hoc Networks. Wireless Networks, ACM/Springer, vol-
online game, the systems will “perceive” this situation and Cloud Gaming Systems,” Proceedings of ACM Multimedia ale behind human computation is to outsource certain ume 15, number 1, pp. 111-126, January, 2009.
know how to adjust the parameters and re-balance the 2011, November 2011. steps of computational processes to humans and solve 6. Ling-Jyh Chen, Bo-Chun Wang, and Kuan-Ta Chen. The De-
network resources to mitigate the problem. I am working 6. Shao-Yu Wu, Ming-Hung Wang, and Kuan-Ta Chen, “Privacy the problems that are intuitive to humans, but computer sign of Puzzle Selection Strategies for GWAP Systems. Con-
on the measurement and modeling of human perceptions Crisis due to Crisis Response on the Web,” Proceedings of technologies cannot solve completely by far. We develop currency and Computation: Practice and Experience, John
with the hope to design such smart systems. IEEE TrustCom 2011, November 2011. a generic analysis framework to investigate intrinsic prop- Wiley & Sons Ltd., volume 22, number 7, pp. 890-908, May,
2010.
Meanwhile, I also work on improving the quality of on- 7. Kuan-Ta Chen, Chen-Chi Wu, Yu-Chun Chang, and Chin- erties of such systems, and conduct a set of system strate- 7. Jyh-How Huang, Ying-Yu Chen, Yu-Te Huang, Po-Yen Lin,
line games. When playing online games, users are often Laung Lei, “Quantifying QoS Requirements of Network Ser- gies to improve its system performance in terms of e - Yi-Chao Chen, Yi-Fu Lin, Shih-Ching Yen, Polly Huang, and
vices: A Cheat-Proof Framework,” Proceedings of ACM Mul-
bugged by serious network lags; and they may have to tol- timedia Systems 2011, February 2011. ciency and quality. Moreover, we have implemented and Ling-Jyh Chen. Rapid Prototyping for Wildlife and Ecological
erate seeing the characters of cheaters wearing sparkling veri ed the designed strategies in real-world systems; and Monitoring. IEEE Systems Journal, volume 4, number 2, pp.
198-209, June, 2010.
armor ghting mighty dragons while their own characters 8. Shao-Yu Wu, Ruck Thawonmas, and Kuan-Ta Chen, “Video we have released the source codes and game traces to the
can only wear secondhand scale armor and defeat wild Summarization via Crowdsourcing,” Proceedings of ACM research community. 8. Ling-Jyh Chen, Bo-Chun Wang, and Wen-Yuan Zhu. The De-
CHI (Works-in-Progress Program), 2011.
rats. Moreover, some players may nd that their charac- My ongoing research focuses on human-centric mobile sign of Puzzle Selection Strategies for ESP-like GWAP Sys-
tems. IEEE Transactions on Computational Intelligence and
ters’ valuable virtual goods have been ripped o by mali- 9. Ching-Hsiang Hsu, Chun-Ying Huang, and Kuan-Ta Chen, sensing system and its applications. We intend to apply AI in Games, volume 2, number 2, pp. 120-130, June, 2010.
cious users when they log into a game. I am teaming up “Fast-Flux Bot Detection in Real Time,” Proceedings of RAID our research results to real-world networked sensing sys- 9. Ling-Jyh Chen, Yu-Song Syu, Hung-Chia Chen, and Wang-
2010, September 2010.
with online game companies to work out the problems re- tems, such as participatory sensing for urban pro ling, Chien Lee. The Design and Evaluation of Task Assignment
garding the performance, fairness, and security from the 10. Yeng-Ting Lee and Kuan-Ta Chen, “Is Server Consolidation mobile human computation, and context-aware perva- Algorithms for GWAP-based Geospatial Tagging Systems.
aspect of game mechanisms and human behavior. Beneficial to MMORPG? A Case Study of World of Warcraft,” sive systems. Moreover, we wish to incorporate our re- Accepted for publication in Mobile Networks and Applica-
Proceedings of IEEE CLOUD 2010, July 2010.
tions, ACM/Springer.
search results with emerging social computing systems as 10. Bo-Chun Wang, Chien-Wei Lin, Kuan-Ta Chen, and Ling-Jyh
a whole to facilitate cyber-physical social network systems Chen. An Analytical Model for Generalized ESP Games. Ac-
in the future. cepted for publication in Knowledge-Based Systems, Elsevier.
研究人員
74 Research Faculty
75