default search action
12th CSE 2009: Vanoucer, BC, Canada - Volume 2
- Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009. IEEE Computer Society 2009, ISBN 978-1-4244-5334-4
The 7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2009)
Embedded Systems and HW/SW Codesign
- Sebastian Hessel, David Szczesny, Shadi Traboulsi, Attila Bilgic, Josef Hausner:
On the Design of a Suitable Hardware Platform for Protocol Stack Processing in LTE Terminals. 1-8 - Sheng-Wei Huang, Yung-Chang Chiu, Zhong-Ho Chen, Ce-Kuen Shieh, Alvin Wen-Yu Su, Tyng-Yeu Liang:
A Region-Based Allocation Approach for Page-Based Scratch-Pad Memory in Embedded Systems. 9-16 - Joseph Reddington, Gregory Z. Gutin, Adrian Johnstone, Elizabeth Scott, Anders Yeo:
Better Than Optimal: Fast Identification of Custom Instruction Candidates. 17-24
Multimedia and Data Management
- Xingang Liu, Wei Zhu, Kook-Yeol Yoo:
Fast Inter Mode Decision Algorithm Based on the MB Activity for MPEG-2 to H.264/AVC Transcoding. 25-30 - Yi-Chi Chen, Hui-Chin Yang, Chung-Ping Chung, Wei-Ting Wang:
Dynamic Reconfigurable Shaders with Load Balancing for Embedded Graphics Processing. 31-36 - Fei Hao, Zhenjiang Miao, Ping Guo, Zhan Xu:
Real Time Multiple Object Tracking Using Tracking Matrix. 37-41 - Soad Ibrahim, Michael Wirth:
Visible and IR Data Fusion Technique Using the Contourlet Transform. 42-47
Power-Aware Computing
- Meikang Qiu, Laurence Tianruo Yang, Edwin Hsing-Mean Sha:
Rotation Scheduling and Voltage Assignment to Minimize Energy for SoC. 48-55 - Mu-Kai Huang, J. Morris Chang, Wei-Mei Chen:
Grouping-Based Dynamic Power Management for Multi-threaded Programs in Chip-Multiprocessors. 56-63 - Mahmood Ahmadi, Stephan Wong:
K-Stage Pipelined Bloom Filter for Packet Classification. 64-70
Sensor Networks
- Alan Marchiori, Qi Han:
A Two-Stage Bootloader to Support Multi-application Deployment and Switching in Wireless Sensor Networks. 71-78 - Long Cheng, Canfeng Chen, Jian Ma, Lei Shu, Hongyang Chen, Laurence Tianruo Yang:
Residual Time Aware Forwarding for Randomly Duty-Cycled Wireless Sensor Networks. 79-86 - Ying Zhu, Qi Han:
The More Relay Nodes, the More Energy Efficient? 87-92 - Sudha Krishnamurthy, Geethapriya Thamilarasu, Christian Bauckhage:
MALADY: A Machine Learning-Based Autonomous Decision-Making System for Sensor Networks. 93-100 - Hyun-Sung Park, Jong-Deok Kim:
Design of an RFID Air Protocol Filtering Technique. 101-108 - Marcin Brzozowski, Hendrik Salomon, Peter Langendörfer:
Completely Distributed Low Duty Cycle Communication for Long-Living Sensor Networks. 109-116
Wireless Communications
- Naixue Xiong, Laurence Tianruo Yang, Yuanyuan Zeng, Chao Ma, Jong Hyuk Park:
Implementation of Rate Control in Distributed Wireless Multicast by Neural Network Prediction. 117-124 - Dineshbalu Balakrishnan, Amiya Nayak, Pulak Dhar:
Adaptive and Intelligent Route Learning for Mobile Assets Using Geo-tracking and Context Profiles. 125-132 - Divya Sardana, Qing-An Zeng:
Control-Channel-Reuse-Based Multiple-Channel MAC (CRM-MAC) for Ad Hoc Networks. 133-139
Middleware and P2P
- Xinuo Chen, Stephen A. Jarvis:
Analysing BitTorrent's Seeding Strategies. 140-149 - Xinfeng Ye, Yi Chen:
A Middleware for Controlling the Execution of Composite Services. 150-157 - Mayank Pandey, Syed Mushtaq Ahmed, Banshi Dhar Chaudhary:
2T-DHT: A Two Tier DHT for Implementing Publish/Subscribe. 158-165 - Andrej van der Zee, Alexandre Courbot, Tatsuo Nakajima:
mBrace: Action-Based Performance Monitoring of Multi-tier Web Applications. 166-173
Embedded Software and Optimization I
- Jyh-Shian Wang, I-Wei Wu, Yu-Sheng Chen, Jean Jyh-Jiun Shann, Wei-Chung Hsu:
Reducing Code Size by Graph Coloring Register Allocation and Assignment Algorithm for Mixed-Width ISA Processor. 174-181 - Takuya Azumi, Hiroaki Takada, Hiroshi Oyama:
Optimization of Component Connections for an Embedded Component System. 182-188 - Un-Keun Yoon, Han-joon Kim:
Improving Hybrid Flash-Disk Storage by Incorporating Sequential Pattern Mining into Fully-Associative Sector Translation. 189-196
Pervasive and Ubiquitous Computing I
- Rocco Aversa, Beniamino Di Martino, Salvatore Venticinque:
Distributed Agents Network for Ubiquitous Monitoring and Services Exploitation. 197-204 - Daqiang Zhang, Jiannong Cao, Jingyu Zhou, Minyi Guo:
Extended Dempster-Shafer Theory in Context Reasoning for Ubiquitous Computing Environments. 205-212 - Tomomi Kawashima, Jianhua Ma, Runhe Huang, Bernady O. Apduhan:
GUPSS: A Gateway-Based Ubiquitous Platform for Smart Space. 213-220 - Jonathan Cazalas, Kien A. Hua:
Leveraging Computation Sharing and Parallel Processing in Location-Based Services. 221-228 - Shandan Zhou, Xingshe Zhou, Zhiwen Yu, Kaibo Wang, Haipeng Wang, Hongbo Ni:
A Recommendation Framework towards Personalized Services in Intelligent Museum. 229-236
Dependable, Autonomic, Secure Computing
- James J. Treinen, Ramakrishna Thurimella:
Finding the Needle: Suppression of False Alarms in Large Intrusion Detection Data Sets. 237-244 - André Luiz B. Rodrigues, Leila N. Bezerra, Alexandre Sztajnberg, Orlando Loques:
Self-Adaptation of Fault Tolerance Requirements Using Contracts. 245-253 - Jesse Sathre, Alex Baumgarten, Joseph Zambreno:
Architectural Support for Automated Software Attack Detection, Recovery, and Prevention. 254-261
Real-Time and Cyber-Physical Systems
- Mike Holenderski, Reinder J. Bril, Johan J. Lukkien:
Swift Mode Changes in Memory Constrained Real-Time Systems. 262-269 - Mingsong Lv, Nan Guan, Yi Zhang, Rui Chen, Qingxu Deng, Ge Yu, Wang Yi:
WCET Analysis of the mC/OS-II Real-Time Kernel. 270-276 - Khurram Jawed, John Morris, Tariq Khan, Georgy L. Gimel'farb:
Real Time Rectification for Stereo Correspondence. 277-284 - Luís Nogueira, Luís Miguel Pinho, Jorge Coelho:
Coordinated Runtime Adaptations in Cooperative Open Real-Time Systems. 285-294 - Huthaifa Al-Omari, Francis G. Wolff, Christos A. Papachristou, David R. McIntyre:
Avoiding Delay Jitter in Cyber-Physical Systems Using One Way Delay Variations Model. 295-302
Pervasive and Ubiquitous Computing II
- Roman Amstutz, Oliver Amft, Brian French, Asim Smailagic, Daniel P. Siewiorek, Gerhard Tröster:
Performance Analysis of an HMM-Based Gesture Recognition Using a Wristwatch Device. 303-309 - Hyun-Sung Park, Seung-Chur Yang, Doo-Hwan Oh, Jong-Deok Kim:
Design and Implementation of WLAN-Based Automatic Vehicle Identification. 310-317 - Runhe Huang, Jianhua Ma, Qun Jin:
A Tree-Structured Intelligence Entity Pool and Its Sharing among Ubiquitous Objects. 318-325 - Yunpu Zhu, Jacqueline E. Rice:
A Lightweight Architecture for Secure Two-Party Mobile Payment. 326-333
Embedded Software and Optimization II
- Je-Hyung Lee, Soo-Mook Moon, Hyung-Kyu Choi:
Comparison of Bank Change Mechanisms for Banked Reduced Encoding Architectures. 334-341 - Joel Koshy, Raju Pandey, Ingwar Wirjawan:
Optimizing Embedded Virtual Machines. 342-351 - Chung-Wen Huang, Kun-Yuan Hsieh, Jia-Jhe Li, Jenq Kuen Lee:
Support of Paged Register Files for Improving Context Switching on Embedded Processors. 352-357 - Yanqin Yang, Meng Wang, Zili Shao, Minyi Guo:
Dynamic Scratch-Pad Memory Management with Data Pipelining for Embedded Systems. 358-365 - Fahime Moein-darbari, Ahmad Khademzadeh, Golnar Gharooni-fard:
Evaluating the Performance of a Chaos Genetic Algorithm for Solving the Network on Chip Mapping Problem. 366-373 - Yu-Hsun Lin, Xuan-Yi Lin, Yeh-Ching Chung:
Reducing Leakage Power of JPEG Image on Asymmetric SRAM. 374-381
The 2009 IEEE/IFIP International Symposium on Embedded and Pervasive Systems (EPS 2009)
Real-Time Embedded Systems
- Hugo Marcondes, Rafael Luiz Cancian, Marcelo Ricardo Stemmer, Antônio Augusto Fröhlich:
On the Design of Flexible Real-Time Schedulers for Embedded Systems. 382-387 - Maobing Dai, Yutaka Ishikawa:
Delayed Interrupt Processing Technique for Reducing Latency of Timer Interrupt in Embedded Linux. 388-393 - Mariusz Pelc, Richard Anthony, Paul Ward, James Hawthorne:
Practical Implementation of a Middleware and Software Component Architecture Supporting Reconfigurability of Real-Time Embedded Systems. 394-401
Data Management and Multimedia
- Chung-Ping Chung, Hong-Wei Chen, Hui-Chin Yang:
Blocked-Z Test for Reducing Rasterization, Z Test and Shading Workloads. 402-407 - Chih-Chieh Hsiao, Chung-Ping Chung, Hui-Chin Yang:
A Hierarchical Primitive Lists Structure for Tile-Based Rendering. 408-413 - Hsiu-ching Hsieh, Chih-Chieh Hsiao, Hui-Chin Yang, Chung-Ping Chung, Jean Jyh-Jiun Shann:
Methods for Precise False-Overlap Detection in Tile-Based Rendering. 414-419 - Chung-Ping Chung, Tung-Lin Lu, Hui-Chin Yang:
H-Buffer: An Efficient History-Based and Overflow Sharing Transparent Fragment Storage Method. 420-425 - Feiyu Lin, Christopher Henricsson, Syed Muhammad Abbas, Kurt Sandkuhl:
HyperCircle: An Efficient Broadcast Protocol for Super-Peer P2P Networks. 426-433
Wireless Communications
- Vineet Joshi, Xuefu Zhu, Qing-An Zeng:
Caching-Based Multipath Routing Protocol. 434-439 - Fang-Yie Leu, Yao-Tian Huang, Pei-Xun Leu:
A Coordinating Multiple Channel Assignment Scheme and AP Deployment in Wireless Networks. 440-445 - Hyun-Sung Park, Seung-Ho Han, Jong-Deok Kim:
Analysis of Vehicular Roaming through Multiple WLAN APs in Container Terminal. 446-451
Mobile Computing
- Antoniya Petkova, Kien A. Hua, Alexander J. Aved:
Processing Approximate Moving Range Queries in Mobile Sensor Environments. 452-457 - Kurt Geihs, Roland Reichle, Michael Wagner, Mohammad Ullah Khan:
Service-Oriented Adaptation in Ubiquitous Computing Environments. 458-463 - Amine Dhraief, Nicolas Montavont:
Rehoming Decision Algorithm: Design and Empirical Evaluation. 464-469 - Yanqin Yang, Minyi Guo, Feilong Tang, Gongwei Zhang:
Black Bridge: A Scatternet Formation Algorithm for Solving a New Emerging Problem. 470-475 - Shengrong Bu, Peter Xiaoping Liu:
Choosing Service Directory Nodes in Proposed Service Discovery Model for Mobile Ad Hoc Networks. 476-480 - Olapeju Latifat Ayoola, Eleni Mangina Phelan:
Accumulating a Personalised Ubiquitous Learning Platform for Enhancing the Third Level Educational Experience. 481-486
Reliability and Security
- Kunjan Patel, Jong Chern Lim, Chris J. Bleakley, Wim Vanderbauwhede:
MAW: A Reliable Lightweight Multi-hop Wireless Sensor Network Routing Protocol. 487-493 - Ang Gao, Wei Wei, Zhixiao Wang, Wenyao Yan:
A Hierarchical Authentication Scheme for the Different Radio Ranges Sensor Networks. 494-501 - Lonnie Langle, Ram Dantu:
Are You a Safe Driver? 502-507
Optimization and HW/SW Codesigns
- Joon-Young Paik, Eun-Sun Cho, Tae-Sun Chung:
Performance Improvement for Flash Memories Using Loop Optimization. 508-513 - Jih-Ching Chiu, Ta-Li Yeh, Mun-Kit Leong:
The Software and Hardware Integration Linker for Reconfigurable Embedded System. 520-525 - Gul N. Khan, Anika Awwal:
Codesign of Embedded Systems with Process/Module Level Real-Time Deadlines. 526-531 - Chris Wynnyk, Malik Magdon-Ismail:
Pricing the American Option Using Reconfigurable Hardware. 532-536
Power/Energy-Aware Computing
- Roy Chaoming Hsu, Cheng-Ting Liu, Kuan-Chieh Wang, Wei-Ming Lee:
QoS-Aware Power Management for Energy Harvesting Wireless Sensor Network Utilizing Reinforcement Learning. 537-542 - Kenji R. Yamamoto, Paul G. Flikkema:
Prospector: Multiscale Energy Measurement of Networked Embedded Systems with Wideband Power Signals. 543-549 - Ehssan Sakhaee, Naoki Wakamiya, Masayuki Murata:
Self-Organized Data-Energy-Aware Clustering and Routing for Wireless Sensor Networks. 550-557 - Rabindra Bista, Yong-Ki Kim, Young-Ho Choi, Jae-Woo Chang:
A New Energy-Balanced Data Aggregation Scheme in Wireless Sensor Networks. 558-563
Sensor Networks
- Tzung-Shi Chen, Hua-Wen Tsai, Chih-Wei Wei:
Dispatch of Mobile Resources in Wireless Sensor Networks. 564-569 - Abdulaziz Barnawi, Roshdy H. M. Hafez:
A Time & Energy Efficient Topology Discovery and Scheduling Protocol for Wireless Sensor Networks. 570-578 - Hyuntae Cho, Jeonsu Jung, Bongrae Cho, Youngwoo Jin, Seungwoo Lee, Yunju Baek:
Precision Time Synchronization Using IEEE 1588 for Wireless Sensor Networks. 579-586 - Stefano Abbate, Marco Avvenuti, Paolo Corsini, Alessio Vecchio:
Localization of Shipping Containers in Ports and Terminals Using Wireless Sensor Networks. 587-592 - Shahram Nourizadeh, Yeqiong Song, Jean-Pierre Thomesse:
A Failure Adapted, Load-Balanced Distributed Routing for Wireless Ad Hoc Sensor Networks. 593-596 - Chung-Horng Lung, Oliver W. W. Yang:
Evaluation of an Adaptive PI Rate Controller for Congestion Control in Wireless Ad-Hoc/Sensor Networks. 597-602
The 4th International Symposium on Cloud and Convergence Computing (2CCom 2009)
- Chang-Wu Lee, Sung-Won Kim, Heon-Jong Lee, Youn-Hee Han, Doo-Soon Park, Young-Sik Jeong:
Visualization of the Constrained Coverage of Mobile Sensor Networks Based on GML. 603-608 - HwaMin Lee, Doo-Soon Park, Min Hong, Sang-Soo Yeo, SooKyun Kim, SungHoon Kim:
A Resource Management System for Fault Tolerance in Grid Computing. 609-614 - Jin-Woo Kim, Kyeong Hur, Kwang-il Hwang, Doo Seop Eom:
A Distributed Reservation Protocol for Collision-Free Three-Hop Mobility Support in WiMedia MAC. 615-620 - Kwang-il Hwang, Sang-Soo Yeo, Jong Hyuk Park:
Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers. 621-626 - Seungku Kim, Jae-Ho Lee, Kwang-il Hwang, Kyeong Hur, Doo Seop Eom:
Reprogrammable Module-Linker for Energy-Efficient Wireless Sensor Networks. 627-632 - Eun-Jun Yoon, Kee-Young Yoo:
Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC. 633-640
The 2009 International Symposium on Trusted Computing and Communications (TrustCom 2009)
Trust Model, Propagation, and Management
- Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:
Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks. 641-650 - Lan Wang, Qishi Wu, Yaoqing Liu:
Design and Validation of PATRICIA for the Mitigation of Network Flooding Attacks. 651-658 - Marek Klonowski, Michal Przykucki, Tomasz Struminski:
Data Deletion with Time-Aware Adversary Model. 659-664 - Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka:
Obfuscation Mechanism in Conjunction with Tamper-Proof Module. 665-670 - Aimin Yu, Dengguo Feng, Ren Liu:
TBDRM: A TPM-Based Secure DRM Architecture. 671-677 - Chao Chen, Ke Wang, Shuren Liao, Qiuyan Zhang, Yiqi Dai:
A Novel Server-Based Application Execution Architecture. 678-683 - Latifa Boursas, Wolfgang Hommel:
Multidimensional Dynamic Trust Management for Federated Services. 684-689
Trusted Services and Applications
- Anderson Nunes Paiva Morais, Eliane Martins, Ana R. Cavalli, Willy Jimenez:
Security Protocol Testing Using Attack Trees. 690-697 - Maoxiang Yi, Huaguo Liang, Kaihua Zhan, Cuiyun Jiang:
Optimal LFSR-Coding Test Data Compression Based on Test Cube Dividing. 698-702 - Hui Hou, Jinzhao Wu:
Quasi-classical Semantics and Tableau Calculus of Description Logics for Paraconsistent Reasoning in the Semantic Web. 703-708 - Salman Abdul Moiz, Lakshmi Rajamani:
Concurrency Control Strategy to Reduce Frequent Rollbacks in Mobile Environments. 709-714
Cryptography and Security Protocols
- Qin Liu, Guojun Wang, Jie Wu:
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing. 715-720 - Rongwei Yu, Lina Wang, Xiaoyan Ma, Bo Kuang:
A Direct Anonymous Attestation Protocol Based on Hierarchical Group Signature. 721-726 - Zhenyu Wang, Jianhua Huang, Yu Wang, Xiangdong Li, Xuetao Sun, Ruimin Wang:
A Multi-party Contract Signing Protocol and Its Implementation via Trusted Computing. 727-731 - Yu Qin, Dengguo Feng, Zhen Xu:
An Anonymous Property-Based Attestation Protocol from Bilinear Maps. 732-738 - Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mahmud, Muhammad Khurram Khan:
Bio-chaotic Stream Cipher-Based Iris Image Encryption. 739-744
Reliability, Survivability, and Fault Tolerance
- Asmaa Adnane, Christophe Bidan, Rafael Timóteo de Sousa Júnior:
Trust-Based Countermeasures for Securing OLSR Protocol. 745-752 - Adrian P. Lauf, William H. Robinson:
Fault Tolerance in MANETs Using a Task-to-Resource Reallocation Framework. 753-758 - Wanfu Ding, Ruifeng Guo:
An Effective RM-Based Scheduling Algorithm for Fault-Tolerant Real-Time Systems. 759-764 - Gang Yin, Dian-xi Shi, Huaimin Wang, Min Guo:
RepCom: Towards Reputation Composition over Peer-to-Peer Communities. 765-771 - Zhiqian Xu, Hai Jiang:
HASS: Highly Available, Scalable and Secure Distributed Data Storage Systems. 772-780 - Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph:
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs. 781-786
Access Control and Authentication
- Fei Richard Yu, Helen Tang, Fei Wang, Victor C. M. Leung:
Distributed Node Selection for Threshold Key Management with Intrusion Detection in Mobile Ad Hoc Networks. 787-794 - Chenjia Wang, Kevin P. Monaghan, Weisong Shi:
HACK: A Health-Based Access Control Mechanism for Dynamic Enterprise Environments. 795-801 - Mohamed Ali Ayachi, Christophe Bidan, Tarek Abbes, Adel Bouhoula:
Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol. 802-808 - Wenchao Huang, Yan Xiong, Depin Chen:
DAAODV: A Secure Ad Hoc Routing Protocol Based on Direct Anonymous Attestation. 809-816 - Honglei Gao, Guolong Chen, Wenzhong Guo:
A GEP-Based Anomaly Detection Scheme in Wireless Sensor Networks. 817-822 - Hao Hu, Hao Li, Dengguo Feng:
L-UCON: Towards Layered Access Control with UCON. 823-829
Trusted Computing Platform and Software
- Eugen Leontie, Gedare Bloom, Bhagirath Narahari, Rahul Simha, Joseph Zambreno:
Hardware Containers for Software Components: A Trusted Platform for COTS-Based Systems. 830-836 - Sarosh Hashmi, John Brooke:
A Software Based Approach for Trusted Agent Execution on Malicious Host. 837-846 - Céline Thuillet, Philippe Andouard, Olivier Ly:
A Smart Card Power Analysis Simulator. 847-852 - Chang-Ai Sun, Baobao Zhang, Jin Li:
TSGen: A UML Activity Diagram-Based Test Scenario Generation Tool. 853-858 - Wen-Fu Kao, Shyhtsun Felix Wu:
Lightweight Hardware Return Address and Stack Frame Tracking to Prevent Function Return Address Attack. 859-866 - Jinwei Hu, Ruixuan Li, Zhengding Lu:
RBAC-Based Secure Interoperation Using Constraint Logic Programming. 867-872
The 2nd International Workshop on Adaptation in Wireless Sensor Networks (AWSN 2009)
- Sushmita Ruj, Jennifer Seberry, Bimal K. Roy:
Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks. 873-878 - Antonio J. Jara, Miguel A. Zamora, Antonio Fernandez Gómez-Skarmeta:
HWSN6: Hospital Wireless Sensor Networks Based on 6LoWPAN Technology: Mobility and Fault Tolerance Management. 879-884 - Antonio G. Ruzzelli, Conor Muldoon, Anthony Schoofs, Tiziana Campana, Gregory M. P. O'Hare, Richard Tynan:
Autonomous Management and Control of Sensor Network-Based Applications. 885-890 - Richard Tynan, Anthony Schoofs, Conor Muldoon, Gregory M. P. O'Hare, Ciarán Ó Conaire, Philip Kelly, Noel E. O'Connor:
Intelligent Middleware for Adaptive Sensing of Tennis Coaching Sessions. 891-896 - Chung-Hsien Kuo, Jia-Wun Siao:
Petri Net Based Reconfigurable Wireless Sensor Networks for Intelligent Monitoring Systems. 897-902
The 2009 International Workshop on Reconfigurable and Multicore Embedded Systems (WoRMES 2009)
- Pil Woo Chun, Lev Kirischian:
Architecture Synthesis Methodology for Run-Time Reconfigurable Systems. 903-908 - Victor Dumitriu, Dennis Marcantonio, Lev Kirischian:
Run-Time Component Relocation in Partially-Reconfigurable FPGAs. 909-914 - Amit Pande, Joseph Zambreno:
Efficient Translation of Algorithmic Kernels on Large-Scale Multi-cores. 915-920 - Chun-Hsien Lu, Hsiao-Win Liao, Pao-Ann Hsiung:
Multi-objective Placement of Reconfigurable Hardware Tasks in Real-Time System. 921-925 - Marco D. Santambrogio:
From Reconfigurable Architectures to Self-Adaptive Autonomic Systems. 926-931
The First International Workshop on Pervasive Multimedia Sensor Networks (PMSN 2009)
- Min Li, Naixue Xiong, Chao Ma:
A Fast H.264 Spatial Downscaling Transcoder for Wireless Communication. 932-936 - Heng Chen, Depei Qian, Weiguo Wu, Weiwei Fang:
Link-Aware Geographic Routing in Wireless Sensor Networks. 937-942 - Moufida Maimour, CongDuc Pham, Doan B. Hoang:
A Congestion Control Framework for Handling Video Surveillance Traffics on WSN. 943-948 - Bing Jiang, Wei Zhang, Pan Zhang:
Research on an Improved Genetic Algorithm Which Can Improve the Node Positioning Optimized Solution of Wireless Sensor Networks. 949-954 - Lin Xiang, Xiaohu Ge, Ke Zhang, Chuang Liu:
A Self-Similarity Frame Traffic Model Based on the Frame Components in 802.11 Networks. 955-960 - Lei Shu, Manfred Hauswirth, Lei Wang, Yan Zhang, Jong Hyuk Park:
Cross-Layer Optimized Data Gathering in Wireless Multimedia Sensor Networks. 961-966 - Qinghua Zou, Li Chen, Naixue Xiong, Shengzhong Zou, Chuanbing Wang:
Prediction and Key Computer Programming of Mechanical Properties of Hot Rolled Plate Based on BP Neural Network. 967-971
The 3rd International Workshop on Ubiquitous UnderWater Sensor Networks (UUWSN 2009)
- Seung-Joo Lee, Jung-Il Namgung, Soo-Hyun Park:
Efficient UDD Architecture for Underwater Wireless Acoustic Sensor Network. 972-977 - Tae-Hee Won, Jun-Ho Jeon, Sung-Joon Park:
An Underwater Communication Modem Using TMS320C6416 DSK. 978-981 - Nam-Yeol Yun, Hui-Jin Cho, Soo-Hyun Park:
Neighbor Nodes Aware MAC Scheduling Scheme in Underwater Acoustic Sensor Networks. 982-987 - Jeong-Woo Han, Se-Young Kim, Ki-Man Kim, Seung-Yong Chun, Kwon Son:
Design of OFDM System for High Speed Underwater Communication. 988-992
The 2009 International Workshop on Ubiquitous Network Computing (UNC 2009)
Ubiquitous Network Systems
- Yan Niu, Lala Li:
An Improved Chinese Segmentation Algorithm Based on New Dictionary Construction. 993-996 - Yong Su:
Network Bandwidth Allocation Based on QoS in iSCSI OSD Storage System. 997-1001 - Jing Liang, Yinqin Wu:
Wireless ECG Monitoring System Based on OMAP. 1002-1006
Network Algorithms
- Zimian Hao, Xiong Wei, Naixue Xiong, Yuhan He:
Routing in 802.11-Based Wireless Mesh Networks. 1007-1012 - Xubing Zhang, Yong Zhu, Jianhong Fu:
An Improved SPECK Algorithm with Bit Plane Lifting and the Optimal Single Value Prediction. 1013-1018 - Xiong Wei, Xianbin Xu, Naixue Xiong, Ruhan He:
A Research on the Self-Applicable Network Virtual Storage Data Distribution Arithmetic. 1019-1023
Ubiquitous Multimedia Computing
- Ruhan He, Yong Zhu, Naixue Xiong, Wei Zhan, Yanjun Zhao:
Mobile Agent-Based Data Gathering for Web Image Retrieval. 1024-1029 - Yean Yin, WenBing Lu, Ke Zhang:
A Videoconference System on the Campus Networks Based on H.323 Protocol. 1030-1033 - Yong Zhu, Ruhan He, Naixue Xiong, Pu Shi, Zhiguang Zhang:
Edge Detection Based on Fast Adaptive Mean Shift Algorithm. 1034-1039
Ubiquitous Applications
- Weiguang Kong, Yong Zhu, Yuan Wang:
Implementation of Unlimited Integer. 1040-1043 - H. X. Yang, F. M. Chen:
Ride Comfort Simulation Based on the Vibration Characteristics of the Two-Mass System of Vehicle Body and Wheels. 1044-1049 - Xiaoqin Du, Qinghua Li, Jianjun Han:
An Analysis and Hierarchical Decomposition for HAMs. 1050-1054 - Qinghua Zou, Li Chen, Naixue Xiong, Shengzhong Zou, Chuanbing Wang:
Computer Calculation and Plotting on Dynamical Phase Diagrams of Carbon Steel. 1055-1064 - Naixue Xiong, Yan Yang, Ming Cao, Jing He, Lei Shu:
A Survey on Fault-Tolerance in Distributed Network Systems. 1065-1070
The 2009 International Workshop on Ubiquitous Computing, Management, and Embedded Applications in Healthcare (UbiHealth 2009)
- Ning Yu, Kyu Hong Cho, Qiang Cheng, Rafael A. Tesorero:
A Hybrid Computational Approach for the Prediction of Small Non-coding RNAs from Genome Sequences. 1071-1076 - Hongbo Zhou, Hong-Ju Yang, Haiyun Xu, Qiang Cheng:
A New Computational Tool for the Post Session Analysis of the Prepulse Inhibition Test in Neural Science. 1077-1080 - Huyu Qu, Jie Cheng, Qiang Cheng, Le Yi Wang:
WiFi-Based Telemedicine System: Signal Accuracy and Security. 1081-1085 - Hongbo Zhou, Qiang Cheng, Mehdi R. Zargham:
Fast Fusion of Medical Images Based on Bayesian Risk Minimization and Pixon Map. 1086-1091 - André Luiz B. Rodrigues, Izabela C. Gomes, Leila N. Bezerra, Alexandre Sztajnberg, Sérgio T. Carvalho, Alessandro Copetti, Orlando Loques:
Using Discovery and Monitoring Services to Support Context-Aware Remote Assisted Living Applications. 1092-1097
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.