default search action
EUC Workshops 2007: Taipei, Taiwan
- Mieso K. Denko, Chi-Sheng Shih, Kuan-Ching Li, Shiao-Li Tsao, Qing-An Zeng, Soo-Hyun Park, Young-Bae Ko, Shih-Hao Hung, Jong Hyuk Park:
Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings. Lecture Notes in Computer Science 4809, Springer 2007, ISBN 978-3-540-77089-3
Trustworthiness, Reliability and Services in Ubiquitous and Sensor Networks
- Firdous Kausar, Sajid Hussain, Tai-Hoon Kim, Ashraf Masood:
Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks. 1-11 - Maria Karyda, Stefanos Gritzalis, Jong Hyuk Park:
A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions. 12-21 - Hangbae Chang, Moonoh Kim, Hyuk-Jun Kwon, Byungwan Han:
The Case Study of Information Security System for International Airports. 22-30 - Toshikazu Uemura, Tadashi Dohi:
Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-Markov Cost Models. 31-42 - Nai-Wei Lo, Kuo-Hui Yeh:
An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. 43-56 - Yuanchu Hwang, Soe-Tsyr Yuan:
UPS - An Ubiquitous Proximity eService for Trust Collaboration. 57-68 - Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, Anne Anderson:
Obligations for Privacy and Confidentiality in Distributed Transactions. 69-81 - YongSuk Lee, WoongChul Choi, SukJoong Kang, Seongje Cho:
Multi-channel Enhancements for IEEE 802.11-Based Multi-hop Ad-Hoc Wireless Networks. 82-92 - Sukhoon Kang, Seokhoon Bae:
An Intelligent Event-Driven Interface Agent for Interactive Digital Contents in Ubiquitous Environments. 93-102 - YingZhi Zeng, Baokang Zhao, Jinshu Su, Xia Yan, Zili Shao:
A Loop-Based Key Management Scheme for Wireless Sensor Networks. 103-114 - Chaoguang Men, Yongqian Lu, Dongsheng Wang:
A MAC Protocol with Little Idle Listening for Wireless Sensor Networks. 115-123 - Geon Woo Kim, Deok-Gyu Lee, Jong Wook Han, Sang Wook Kim:
Security Technologies Based on Home Gateway for Making Smart Home Secure. 124-135 - Sheng-De Wang, Zheng Yi Huang:
Layered Peer to Peer Streaming Using Hidden Markov Models. 136-145 - Jinkeun Hong, Kihong Kim:
Optimum Power Controller for Random Number Generator in the Crypto Module of Ubiquitous Computing Environment. 146-157 - Shunshan Piao, Jeongmin Park, Eunseok Lee:
Problem Localization for Automated System Management in Ubiquitous Computing. 158-168
System and Software for Wireless SoC
- Anand Mohan, Aladin Zayegh, Aleksandar Stojcevski:
A High Speed Analog to Digital Converter for Ultra Wide Band Applications. 169-180 - Hai-Wei Wang, David W. Lin, Kun-Chien Hung, Youn-Tai Lee:
Design and DSP Software Implementation of Mobile WiMAX Baseband Transceiver Functions. 181-192 - Li-chuan Tseng, Kuan-yin Chen, ChingYao Huang:
Cross-Layer Design for IEEE 802.16-2005 System Using Platform-Based Methodologies. 193-204 - Shiann-Tsong Sheu, Chih-Cheng Yang, Hsu-Sheng Chang:
A Dynamic Frequency Allocation Scheme for IEEE 802.16 OFDMA-Based WMANs Using Hungary Algorithm. 205-214 - Li-Der Chou, Shih-Yao Cheng, Chien-Yi Li, Shing-Kuang Chen:
Wireless Network Management System for WiMAX / Wi-Fi Mesh Networks. 215-225 - Chang-Yang Ho, Hsi-Lu Chao:
An Implementation of QoS Framework for Heterogeneous Networks. 226-236 - Yu-Kai Huang, Sze-Wei Huang, Ai-Chun Pang:
An Energy-Efficient MAC Design for IEEE 802.15.4-Based Wireless Sensor Networks. 237-248 - Yung-Chien Shih, Kai-Cheng Hsu, Chien-Chao Tseng:
A Cross-Layer Signaling and Middleware Platform for Multi-interface Mobile Devices. 249-260 - Sixian Zheng, Kuochen Wang, Shiao-Li Tsao, Pochun Lin:
Enhanced Sleep Mode Operations for Energy Saving in IEEE 802.16e. 261-272 - Wilson M. Yeung, JunYang Zhou, Joseph K. Ng:
Enhanced Fingerprint-Based Location Estimation System in Wireless LAN Environment. 273-284 - Shiao-Li Tsao, Ya-Lien Cheng:
Improving Channel Scanning Procedures for WLAN Handoffs. 285-296
Network Centric Ubiquitous Systems
- Chun-Chuan Yang, Jeng-Yueng Chen, Li-Sheng Yu:
A Multicast Extension for Enhanced Mobile IP by Home Agent Handover. 297-308 - Merdan Atajanov, Toshihiko Shimokawa, Norihiko Yoshida:
Autonomic Multi-server Distribution in Flash Crowds Alleviation Network. 309-320 - Chao-Lieh Chen, Jeng-Wei Lee, Cheng-Zh Lin, Yi-Tsung Chen, Jar-Shone Ker, Yau-Hwang Kuo:
Generic Energy-Efficient Geographic Routing for Ad-Hoc Wireless Networks. 321-332 - Yu Song, Qi Chen:
Description of a New Feature Meta-model. 333-340 - Zhipeng Tan, Dan Feng, Fei He, Ke Zhou:
Studying of Multi-dimensional Based Replica Management in Object Storage System. 341-354 - Takashi Kinoshima, Kazutaka Kobayashi, Nurul Azma Zakaria, Masahiro Kimura, Noriko Matsumoto, Norihiko Yoshida:
Communication Model Exploration for Distributed Embedded Systems and System Level Interpretations. 355-364 - Ing-Chau Chang, Shi-Feng Chen:
An End-to-End QoS Adaptation Architecture for the Integrated IntServ and DiffServ Networks. 365-376 - Mianxiong Dong, Kaoru Ota, Minyi Guo, Zixue Cheng:
Ubiquitous Laboratory: A Research Support Environment for Ubiquitous Learning Based on Sensor Networks. 377-388 - Senol Zafer Erdogan, Sajid Hussain, Jong Hyuk Park:
Intelligent Monitoring Using Wireless Sensor Networks. 389-400 - Junn-Yen Hu, Cheng-Fu Chou, Min-Shi Sha, Ing-Chau Chang, Chung-Yi Lai:
On the Design of Micro-mobility for Mobile Network. 401-412 - Chih-Cheng Hsu, Ming-Hung Chen, Cheng-Fu Chou, Wei-Chieh Chi, Chung-Yi Lai:
ANSWER: Adaptive Network Selection in WLAN/UMTS EnviRonment. 413-424 - Hyoungshick Kim, S. Jae Oh:
Self-authorized Public Key Management for Home Networks. 425-434 - Pang-Chieh Wang, Yi-Hsuan Hung, Ting-Wei Hou:
A Cross-Layered Diagnostician in OSGi Platform for Home Network. 435-444
Ubiquitous Underwater Acoustic-Sensor Network
- Eunchan Kim, Seok Woo, Chungsan Kim, Kiseon Kim:
LaMSM: Localization Algorithm with Merging Segmented Maps for Underwater Sensor Networks. 445-454 - Phil-Jung Yun, Changhwa Kim, Sangkyung Kim, Seungjae Lee, Yong-Man Cho:
TinyOS-Based Gateway for Underwater Acoustics/Radio Frequency Communication. 455-466 - Yong-Man Cho, Seungjae Lee, Changhwa Kim, Sangkyung Kim:
An Energy Scheduling Algorithm for Ensuring the Pre-determined Lifetime in Sensor Network. 467-473 - Dale Green:
Underwater Acoustic Communication and Modem-Based Navigation Aids. 474-481 - Hung Trong Nguyen, Soo Young Shin, Soo-Hyun Park:
State-of-the-Art in MAC Protocols for Underwater Acoustics Sensor Networks. 482-493 - Heungwoo Nam, Sunshin An:
An Ultrasonic Sensor Based Low-Power Acoustic Modem for Underwater Communication in Underwater Wireless Sensor Networks. 494-504 - Soo Young Shin, Soo-Hyun Park:
UWA-NAV - Energy Efficient Error Control Scheme for Underwater Acoustic Sensor Network. 505-514 - Seung-Yong Chun, Se-Young Kim, Ki-Man Kim:
Underwater Wideband Source Localization Using the Interference Pattern Matching. 515-522 - Seungjae Lee, Changhwa Kim, Sangkyung Kim:
A New Virtual Select Database Operation for Wireless Sensor Networks. 523-530 - Soo Young Shin, Soo-Hyun Park:
GT2 - Reduced Wastes Time Mechanism for Underwater Acoustic Sensor Network. 531-537
RFID and Ubiquitous Sensor Networks
- Jihoon Choi, Wonjun Lee:
Comparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks. 538-549 - Hui-Feng Huang:
An Efficient Mutual Authentication Protocol on RFID Tags. 550-556 - JaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd:
HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System. 557-567 - Youngsoo Kim, Daeyoung Kim, Taehong Kim, Jongwoo Sung, Seongeun Yoo:
Target Classification in Sparse Sampling Acoustic Sensor Networks Using IDDC Algorithm. 568-578 - Thomas Haenselmann, Thomas King, Marcel Busse, Wolfgang Effelsberg, Markus Fuchs:
Scriptable Sensor Network Based Home-Automation. 579-591 - Su Te Lei, Kang Zhang, Edwin Hsing-Mean Sha:
Applying Situation Awareness to Mobile Proactive Information Delivery. 592-603
Embedded Software Optimization
- Yung-Hen Lee, Jian-Jia Chen, Tei-Wei Kuo:
Energy-Efficiency on a Variable-Bitrate Device. 604-616 - Ming-Haw Jing, Jian-Hong Chen, Zih-Heng Chen, Yaotsu Chang:
The Secure DAES Design for Embedded System Application. 617-626 - Matthias Grumer, Manuel Wendt, Stefan Lickl, Christian Steger, Reinhold Weiss, Ulrich Neffe, Andreas Mühlberger:
Software Power Peak Reduction on Smart Card Systems Based on Iterative Compiling. 627-637 - Wei-Ting Yen, Shih-Hsu Huang, Chun-Hua Cheng:
Simultaneous Operation Scheduling and Operation Delay Selection to Minimize Cycle-by-Cycle Power Differential. 638-647 - Kai-chao Yao:
A Simple Approach to Robust Optimal Pole Assignment of Decentralized Stochastic Singularly-Perturbed Computer Controlled Systems. 648-659 - Binoy Ravindran, Edward Curley, Jonathan Stephen Anderson, E. Douglas Jensen:
Assured-Timeliness Integrity Protocols for Distributable Real-Time Threads with in Dynamic Distributed Systems. 660-673 - Augustin Kebemou, Ina Schieferdecker:
Evaluating Modeling Solutions on Their Ability to Support the Partitioning of Automotive Embedded Systems. 674-685
Security in Ubiquitous Computing
- Je Hong Park, Bo Gyeong Kang:
Security Analysis of the Certificateless Signature Scheme Proposed at SecUbiq 2006. 686-691 - Lei Zhang, Futai Zhang, Fangguo Zhang:
New Efficient Certificateless Signature Scheme. 692-703 - Zhu Wang, Huiyan Chen:
A Practical Identity-Based Signature Scheme from Bilinear Map. 704-715 - Dong Zheng, Xiangxue Li, Kefei Chen, Jianhua Li:
Linkable Ring Signatures from Linear Feedback Shift Register. 716-727 - Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei:
A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem. 728-744 - Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ashraf Masood:
A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks. 745-757 - Eun-Jun Yoon, Kee-Young Yoo:
Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. 758-769 - Ping Li, Yaping Lin, Jiaying Wu:
Two Approaches on Pairwise Key Path Establishment for Sensor Networks. 770-780 - Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. 781-794 - JaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd:
Low-Cost and Strong-Security RFID Authentication Protocol. 795-807 - Ilsun You:
A Ticket Based Binding Update Authentication Method for Trusted Nodes in Mobile IPv6 Domain. 808-819
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.