Embedded and Ubiquitous Computing 2005 Workshops
(Sprache: Englisch)
Welcome to the proceedings of the EUC 2005 workshops, held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Comp- ing in Nagasaki, Japan, December 6-9, 2005. The objective of these workshops is to extend the spectrum of the...
Leider schon ausverkauft
versandkostenfrei
Buch
167.99 €
Produktdetails
Produktinformationen zu „Embedded and Ubiquitous Computing 2005 Workshops “
Klappentext zu „Embedded and Ubiquitous Computing 2005 Workshops “
Welcome to the proceedings of the EUC 2005 workshops, held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Comp- ing in Nagasaki, Japan, December 6-9, 2005. The objective of these workshops is to extend the spectrum of the main conference by providing a premier international forum for researchers and pr- titioners from both industry and academia, to discuss hot topics and emerging areas, to share recent progress and latest results, and to promote cutting-edge research and future cooperation on embedded and ubiquitous computing. To meet this objective, we featured ?ve workshops: - UISW 2005: The Second International Symposium on Ubiquitous Intel- gence and Smart Worlds - NCUS 2005: IFIP International Symposium on Network-Centric Ubiquitous Systems - SecUbiq 2005: The First International Workshop on Security in Ubiquitous Computing Systems - USN 2005: The First International Workshop on RFID and Ubiquitous S- sor Networks - TAUES2005:TheInternationalWorkshoponTrustedandAutonomicUb- uitous and Embedded Systems They address ?ve state-of-the-art research directions in embedded and ub- uitous computing: - UISW 2005: Following ubiquitous computers, networks, information, s- vices,etc. ,isaroadtowardsasmartworld(SW)createdonbothcyberspaces and real spaces. A SW is characterized mainly by ubiquitous intelligence (UI) or computational intelligence pervasive in the physical world, ?lled with ubiquitous intelligent or smart real things, that are capable of c- puting, communicating, and behaving smartly with some intelligence.
Inhaltsverzeichnis zu „Embedded and Ubiquitous Computing 2005 Workshops “
The Second International Symposium on Ubiquitous Intelligence and Smart Worlds (UISW 2005).- Human Activity Recognition Based on Surrounding Things.- Baton: A Service Management System for Coordinating Smart Things in Smart Spaces.- An Extensible Ubiquitous Architecture for Networked Devices in Smart Living Environments.- A World Model for Smart Spaces.- Dealing with Emotional Factors in Agent Based Ubiquitous Group Decision.- A Multi-agent Software Platform Accommodating Location-Awareness for Smart Space.- Context-Aware Ubiquitous Data Mining Based Agent Model for Intersection Safety.- Development of Knowledge-Filtering Agent Along with User Context in Ubiquitous Environment.- Application-Driven Customization of an Embedded Java Virtual Machine.- A Study on Fast JCVM with New Transaction Mechanism and Caching-Buffer Based on Java Card Objects with a High Locality.- Intelligent Object Extraction Algorithm Based on Foreground/Background Classification.- Thin Client Based User Terminal Architecture for Ubiquitous Computing Environment.- An Application Development Environment for Rule-Based I/O Control Devices.- A uWDL Handler for Context-Aware Workflow Services in Ubiquitous Computing Environments.- SMMART, a Context-Aware Mobile Marketing Application: Experiences and Lessons.- Ubiquitous Organizational Information Service Framework for Large Scale Intelligent Environments.- TS-U: Temporal-Spatial Methodology for Application Checking of the Systems in the Ubiquitous Environment.- Ubiquitous Learning on Pocket SCORM.- An Application Based on Spatial-Relationship to Basketball Defensive Strategies.- Intrinsically Motivated Intelligent Rooms.- Multivariate Stream Data Reduction in Sensor Network Applications.- Implementing a Graph Neuron Array for Pattern Recognition Within Unstructured Wireless Sensor Networks.- Building Graphical Model Based System in Sensor Networks.- Energy-Aware Broadcasting Method for Wireless Sensor Network.- Anonymous Routing in Wireless Mobile
... mehr
Ad Hoc Networks to Prevent Location Disclosure Attacks.- The Design and Implementation of a Location-Aware Service Bundle Manager in Smart Space Environments.- A Context-Aware and Augmented Reality-Supported Service Framework in Ubiquitous Environments.- A Smart Method of Cooperative Learning Including Distant Lectures and Its Experimental Evaluations.- u-KoMIPS: A Medical Image Processing System in a Ubiquitous Environment.- The Extended PARLAY X for an Adaptive Context-Aware Personalized Service in a Ubiquitous Computing Environment.- A Context-Aware System for Smart Home Applications.- Human Position/Height Detection Using Analog Type Pyroelectric Sensors.- ENME: An ENriched MEdia Application Utilizing Context for Session Mobility; Technical and Human Issues.- DartDataFlow: Semantic-Based Sensor Grid.- Sentient Artefacts: Acquiring User's Context Through Daily Objects.- A Multi-dimensional Model for Task Representation and Allocation in Intelligent Environments.- Norms Enforcement as a Coordination Strategy in Ubiquitous Environments.- A Java-Based RFID Service Framework with Semantic Data Binding Between Real and Cyber Spaces.- Kallima: A Tag-Reader Protocol for Privacy Enhanced RFID System.- Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFID.- iCane - A Partner for the Visually Impaired.- ORAID: An Intelligent and Fault-Tolerant Object Storage Device.- Architecture Based Approach to Adaptable Fault Tolerance in Distributed Object-Oriented Computing.- Security Analysis of Michael: The IEEE 802.11i Message Integrity Code.- A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability.- Performance Analysis of IP Micro-mobility Protocols in Single and Simultaneous Movements Scenario.- HMRP: Hierarchy-Based Multipath Routing Protocol for Wireless Sensor Networks.- On Energy-Aware Dynamic Clustering for Hierarchical Sensor Networks.- Neighbor Node Discovery Algorithm for Energy-Efficient Clustering in Ubiquitious Sensor Networks.- A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World.- The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate.- Object Reminder and Safety Alarm.- Synchronization and Recovery in an Embedded Database System for Read-Only Transactions.- Learning with Data Streams - An NNTree Based Approach.- Generating Smart Robot Controllers Through Co-evolution.- Integrated Multimedia Understanding for Ubiquitous Intelligence Based on Mental Image Directed Semantic Theory.- Hyper-Interactive Video Browsing by a Remote Controller and Hand Gestures.- Mobile Computing with MPEG-21.- A Unified Context Model: Bringing Probabilistic Models to Context Ontology.- IFIP International Symposium on Network-Centric Ubiquitous Systems (NCUS 2005).- A Component-Based Adaptive Model for Context-Awareness in Ubiquitous Computing.- Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem.- The Wrong Challenge of 'Pervasive Computing': The Paradigm of Sensor-Based Context-Awareness.- An Abstract Model for Incentive-Enhanced Trust in P2P Networks.- Construction of Credible Ubiquitous P2P Content Exchange Communities.- Location-Based Routing Protocol for Energy Efficiency in Wireless Sensor Networks.- Efficient Access of Remote Resources in Embedded Networked Computer Systems.- Lightweight Ontology-Driven Representations in Pervasive Computing.- Object Tracking Using Durative Events.- Design of Integrated Routing System for Mobile Ad Hoc Networks Overlaying Peer-to-Peer Applications.- A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access Control.- Efficient Resource Management Scheme of TCP Buffer Tuned Parallel Stream to Optimize System Performance.- Multi-level Service Differentiation Scheme for the IEEE 802.15.4 Sensor Networks.- Development of Event Manager and Its Application in Jini Environment.- On Scalability and Mobility Management of Hierarchical Large-Scale Ad Hoc Networks.- Exploring Small-World-Like Topologies Via SplitProber: Turning Power Laws into an Advantage in Unstructured Overlays.- Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 802.16 System.- A Survey of Anonymous Peer-to-Peer File-Sharing.- A Churn-Resistant Strategy for a Highly Reliable P2P System.- Building a Peer-to-Peer Overlay for Efficient Routing and Low Maintenance.- Dynamic Object Assignment in Object-Based Storage Devices.- Dynamic Resource Discovery for Sensor Networks.- Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services.- Predicate Detection Using Event Streams in Ubiquitous Environments.- The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 2005).- Image Watermarking Technique Based on Two-Dimensional Chaotic Stream Encryption.- Identity-Based Universal Designated Verifier Signatures.- Short Designated Verifier Proxy Signature from Pairings.- An Embedded Gateway Based on Real-Time Database.- Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks.- Collision Attack on XTR and a Countermeasure with a Fixed Pattern.- Security in Persistently Reactive Systems.- ID-Based Access Control and Authority Delegations.- How to Construct Secure Cryptographic Location-Based Services.- A Key Management Scheme for Mobile Ad Hoc Networks Based on Threshold Cryptography for Providing Fast Authentication and Low Signaling Load.- Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow.- Authenticated Public Key Distribution Scheme Without Trusted Third Party.- Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004.- Efficient RFID Authentication Protocol for Ubiquitous Computing Environment.- A New Simple Authenticated Key Agreement and Protected Password Change Protocol.- A Method for Deciding Quantization Steps in QIM Watermarking Schemes.- A New DDoS Detection Model Using Multiple SVMs and TRA.- PPF Model with CTNT to Defend Web Server from DDoS Attack.- Efficient Key Agreement for Merging Clusters in Ad-Hoc Networking Environments.- An Effective Method for Location Privacy in Ubiquitous Computing.- Integrated Support for Location Aware Security Services in Enterprise Wireless Networks.- The 1st International Workshop on RFID and Ubiquitous Sensor Networks (USN 2005).- Optimal Scheduling for Networks of RFID Readers.- PULSE: A MAC Protocol for RFID Networks.- RFIDcover - A Coverage Planning Tool for RFID Networks with Mobile Readers.- Vibration Powered Battery-Assisted Passive RFID Tag.- Wireless RFID Networks for Real-Time Customer Relationship Management.- Tree-Based Classification Algorithm for Heterogeneous Unique Item ID Schemes.- An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks.- Energy-Driven Adaptive Clustering Hierarchy (EDACH) for Wireless Sensor Networks.- A Load-Balancing and Energy-Aware Clustering Algorithm in Wireless Ad-Hoc Networks.- Energy-Efficient Cluster Reconfiguration with Fair Cluster Formations in Sensor Networks.- Virtual Sink Rotation: Low-Energy Scalable Routing Protocol for Ubiquitous Sensor Networks.- FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions.- Power-Aware Position Vector Routing for Wireless Sensor Networks.- Multicast Routing with Minimum Energy Cost and Minimum Delay in Wireless Sensor Networks.- Self Location Estimation Scheme Using ROA in Wireless Sensor Networks.- Energy-Efficient Target Localization Based on a Prediction Model.- Reducing Congestion in Real-Time Multi-party-tracking Sensor Network Applications.- Variable-Radii Method Based on Probing Mechanism (VRPM): An Energy Conservation Method for Wireless Active Sensor Networks.- The International Workshop on Trusted and Autonomic Ubiquitous and Embedded Systems (TAUES 2005).- Automata-Theoretic Performance Analysis Method of Soft Real-Time Systems.- A Component-based Architecture for an Autonomic Middleware Enabling Mobile Access to Grid Infrastructure.- Autonomic Agents for Survivable Security Systems.- Towards Formal Specification and Generation of Autonomic Policies.- Intrusion Detection with CUSUM for TCP-Based DDoS.- A Digital Content Distribution Using a Group-key and Multi-layered Structure Based on Web.- Access Policy Sheet for Access Control in Fine-Grained XML.- Monitoring the Health Condition of a Ubiquitous System: Rejuvenation vs. Recovery.- A Dependability Management Mechanism for Ubiquitous Computing Systems.- Reassignment Scheme of an RFID Tag's Key for Owner Transfer.
... weniger
Bibliographische Angaben
- XXXII, 1317 Seiten, Maße: 15,5 x 23,5 cm, Kartoniert (TB), Englisch
- Herausgegeben: Tomoya Enokido, Lu Yan, Bin Xiao, Daeyoung Kim, Yuanshun Dai, Laurence Tianruo Yang
- Verlag: Springer Berlin
- ISBN-10: 3540308032
- ISBN-13: 9783540308034
- Erscheinungsdatum: 24.11.2005
Sprache:
Englisch
Kommentar zu "Embedded and Ubiquitous Computing 2005 Workshops"
0 Gebrauchte Artikel zu „Embedded and Ubiquitous Computing 2005 Workshops“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Embedded and Ubiquitous Computing 2005 Workshops".
Kommentar verfassen