Emerging Directions in Embedded and Ubiquitous Computing
(Sprache: Englisch)
Here are the refereed proceedings of the EUC 2006 workshops, held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Computing in Seoul, Korea, August 2006.
Leider schon ausverkauft
versandkostenfrei
Buch
181.89 €
Produktdetails
Produktinformationen zu „Emerging Directions in Embedded and Ubiquitous Computing “
Klappentext zu „Emerging Directions in Embedded and Ubiquitous Computing “
Here are the refereed proceedings of the EUC 2006 workshops, held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Computing in Seoul, Korea, August 2006.
Inhaltsverzeichnis zu „Emerging Directions in Embedded and Ubiquitous Computing “
NCUS 2006 Symposium.- Adaptive Router Promotion in Ad-Hoc Networks.- A Utility-Based Auction Cooperation Incentive Mechanism in Peer-to-Peer Networks.- UbiqStor: Server and Proxy for Remote Storage of Mobile Devices.- Packet Length Adaptation for Energy-Proportional Routing in Clustered Sensor Networks.- A New Context Script Language for Developing Context-Aware Application Systems in Ubiquitous Computing.- Dynamic Replication Strategies for Object Storage Systems.- A Cost-Effective Mobility Modelling in Nested Network Mobility.- Completing UML Model of Component-Based System with Middleware for Performance Evaluation.- Energy Efficient PNC Selection Procedure for the IEEE 802.15.3-Based HR-WPAN.- An Efficient Multicast Routing Protocol in Multi-rate Wireless Ad Hoc Networks.- WPAN Platform Design in Handset Integrating Cellular Network and Its Application to Mobile Games.- Reliable Transporting and Optimal Routing on Rate-Based for Ad Hoc Networks.- Automatic Extraction of Conversation Protocols from a Choreography Specification of Ubiquitous Web Services.- Inter-sector Interference Mitigation Method in Triple-Sectored OFDMA Systems.- File Correspondences Dictionary Construction in Multilingual P2P File Sharing Systems.- Lightweight Messages: True Zero-Copy Communication for Commodity Gigabit Ethernet.- Evaluation of Models for Analyzing Unguided Search in Unstructured Networks.- Wapee: A Fault-Tolerant Semantic Middleware in Ubiquitous Computing Environments.- Security in P2P Networks: Survey and Research Directions.- HYWINMARC: An Autonomic Management Architecture for Hybrid Wireless Networks.- Prediction Efficiency in Predictive p-CSMA/CD.- A Situation Aware Personalization in Ubiquitous Mobile Computing Environments.- A Network and Data Link Layer QoS Model to Improve Traffic Performance.- A GML-Based Mobile Device Trace Monitoring System.- Impact of High-Mobility Radio Jamming in Large-Scale Wireless Sensor Networks.- SecUbiq 2006 Workshop.- A Scalable and
... mehr
Untraceable Authentication Protocol for RFID.- Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005.- Reliable Broadcast Message Authentication in Wireless Sensor Networks.- Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks.- A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks.- Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol.- Ubiquitous Authorization Scheme Based on Device Profile.- An Efficient Certificateless Signature Scheme.- Universal Designated Verifier Ring Signature (Proof) Without Random Oracles.- An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings.- A Strong Identity Based Key-Insulated Cryptosystem.- A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE.- Energy Comparison of AES and SHA-1 for Ubiquitous Computing.- USN 2006 Workshop.- Performance Analysis of Tag Anti-collision Algorithms for RFID Systems.- Perturbative Time and Frequency Allocations for RFID Reader Networks.- An Enhanced Dynamic Framed Slotted ALOHA Anti-collision Algorithm.- DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers.- Design and Implementation of a High-Speed RFID Data Filtering Engine.- Authorized Tracking and Tracing for RFID Tags.- An Energy-Efficient MAC Protocol for Delay-Sensitive Wireless Sensor Networks.- A Data-Centric Self-organization Scheme for Energy-Efficient Wireless Sensor Networks.- Optimized Clustering for Maximal Lifetime of Wireless Sensor Networks.- Maximize the Coverage Lifetime of Sensor Networks.- An Active Tracking System Using IEEE 802.15.4-Based Ultrasonic Sensor Devices.- LWOS: A Localization Method Without On-Body Sensor in Wireless Sensor Networks.- TRUST 2006 Workshop.- Research Directions in the Area of USN (Ubiquitous Sensor Network) Towards Practical UE (Ubiquitous Environments).- On Building a Lightweight Security Architecture for Sensor Networks.- A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks.- Algorithms for Service Differentiation in MAC Layer over MANETs.- A Power-Aware Routing Protocol Using Multi-Route Transmission for Mobile Ad Hoc Networks.- A Novel Multicasting Scheme over Wireless LAN Systems by Using Relay.- An Adaptive Concurrency Control QOS Agent for Ubiquitous Computing Environments.- An Efficient End-to-End QoS Supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-Back for Ubiquitous and Distributed Applications.- An RFID System Based MCLT System with Improved Privacy.- QT-CBP: A New RFID Tag Anti-collision Algorithm Using Collision Bit Positioning.- An RFID-Based Access and Location Service for Pervasive Grids.- Autonomous Management of Large-Scale Ubiquitous Sensor Networks.- A Privacy-Aware Service Protocol for Ubiquitous Computing Environments.- A Neural Network Model for Detection Systems Based on Data Mining and False Errors.- An Analysis on the Web Technologies for Dynamically Generating Web-Based User Interfaces in Ubiquitous Spaces.- A Policy Description Language for Context-Based Access Control and Adaptation in Ubiquitous Environment.- C-iUMS: Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous Home.- A Lightweight IP Traceback Mechanism on IPv6.- Enable a Trustworthy Network by Source Address Spoofing Prevention Routers: A Formal Description.- A Flexible Bound Admission Control Algorithm for Vertical Handover in Ubiquitous Environment.- Network Probabilistic Connectivity: Using Node Cuts.- Fast Mounting and Recovery for NAND Flash Memory Based Embedded Systems.- Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments.- A Robust Verifiably Encrypted Signature Scheme.- ESO 2006 Workshop.- Instruction Re-selection for Iterative Modulo Scheduling on High Performance Multi-issue DSPs.- Predictability of Least Laxity First Scheduling Algorithm on Multiprocessor Real-Time Systems.- Saving Register-File Leakage Power by Monitoring Instruction Sequence in ROB.- Run-Time Memory Optimization for DDMB Architecture Through a CCB Algorithm.- Code Generation and Optimization for Java-to-C Compilers.- Modelling and Analysis of Power Consumption for Component-Based Embedded Software.- Design of a Programmable Vertex Processing Unit for Mobile Platforms.- An Energy-Aware Whole-System Dynamic Emulator - SkyEye.- Optimizing Scheduling Stability for Runtime Data Alignment.- A Chinese Mobile Phone Input Method Based on the Dynamic and Self-study Language Model.- An ID-Based Watermarking Scheme for Java Programs.- Data-Layout Optimization Using Reuse Distance Distribution.- Co-optimization of Performance and Power in a Superscalar Processor Design.- FAST: An Efficient Flash Translation Layer for Flash Memory.- A Novel Discrete Hopfield Neural Network Approach for Hardware-Software Partitioning of RTOS in the SoC.- UML Based Evaluation of Reconfigurable Shape Adaptive DCT for Embedded Stream Processing.- A High Performance Buffering of Java Objects for Java Card Systems with Flash Memory.- MSA 2006 Workshop.- Predictive Prefetching of Context-Aware Information in Mobile Networks.- Digital Ortho-image Production for Web GIS Applications.- Multimedia Contents Security by Wireless Authentication.- Traffic Actuated Car Navigation Systems in Mobile Communication Networks.- Analytic Model of the Collision Resolution Protocol with Voice/Data in Mobile Networks.- Security Enhancement by Detecting Network Address Translation Based on Instant Messaging.- A New Authentication Scheme of Binding Update Protocol on Handover in Mobile IPv6 Networks.- A Solution for the Dropout Problem in Adaptive Cruise Control Range Sensors.- An Architecture Framework for Measuring and Evaluating Packet-Switched Voice.- HOIDS-Based Detection Method of Vicious Event in Large Networks.- New Handoff Control Method Using Fuzzy Multi-Criteria Decision Making in Micro/Pico-cellular Networks.- Test of IR-DSRC in Measuring Vehicle Speed for ITS Applications.- A Grid Routing Scheme Considering Node Lifetime in Ubiquitous Sensor Networks.
... weniger
Bibliographische Angaben
- XXVII, 1034 Seiten, Maße: 15,4 x 23,1 cm, Kartoniert (TB), Englisch
- Herausgegeben: Xiaobo Zhou, Oleg Sokolsky, Lu Yan, Eun-Sun Jung, Zili Shao, Yi Mu, Dong-Chun Lee, Daeyoung Kim, Young-Sik Jeong, Cheng-Zhong Xu
- Verlag: Springer Berlin
- ISBN-10: 3540368507
- ISBN-13: 9783540368502
- Erscheinungsdatum: 24.07.2006
Sprache:
Englisch
Kommentar zu "Emerging Directions in Embedded and Ubiquitous Computing"
0 Gebrauchte Artikel zu „Emerging Directions in Embedded and Ubiquitous Computing“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Emerging Directions in Embedded and Ubiquitous Computing".
Kommentar verfassen