default search action
EUC Workshops 2005: Nagasaki, Japan
- Tomoya Enokido, Lu Yan, Bin Xiao, Daeyoung Kim, Yuan-Shun Dai, Laurence Tianruo Yang:
Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings. Lecture Notes in Computer Science 3823, Springer 2005, ISBN 3-540-30803-2
The Second International Symposium on Ubiquitous Intelligence and Smart Worlds (UISW 2005)
Session 1: Smart Environments and Systems I
- Naoharu Yamada, Kenji Sakamoto, Goro Kunito, Kenichi Yamazaki, Satoshi Tanaka:
Human Activity Recognition Based on Surrounding Things. 1-10 - Jingyu Li, Yuanchun Shi:
Baton: A Service Management System for Coordinating Smart Things in Smart Spaces. 11-20 - Thierry Bodhuin, Gerardo Canfora, Rosa Preziosi, Maria Tortorella:
An Extensible Ubiquitous Architecture for Networked Devices in Smart Living Environments. 21-30 - Ichiro Satoh:
A World Model for Smart Spaces. 31-40
Session 2: Agent Based Smart Computing
- Goreti Marreiros, Carlos Ramos, José Neves:
Dealing with Emotional Factors in Agent Based Ubiquitous Group Decision. 41-50 - Hongliang Gu, Yuanchun Shi, Guangyou Xu, Yu Chen:
A Multi-agent Software Platform Accommodating Location-Awareness for Smart Space. 51-60 - Flora Dilys Salim, Shonali Krishnaswamy, Seng Wai Loke, Andry Rakotonirainy:
Context-Aware Ubiquitous Data Mining Based Agent Model for Intersection Safety. 61-70 - Takao Takenouchi, Takahiro Kawamura, Akihiko Ohsuga:
Development of Knowledge-Filtering Agent Along with User Context in Ubiquitous Environment. 71-80
Session 3: Smart Computing Environments
- Alexandre Courbot, Gilles Grimaud, Jean-Jacques Vandewalle, David Simplot-Ryl:
Application-Driven Customization of an Embedded Java Virtual Machine. 81-90 - Min-Sik Jin, Won-Ho Choi, Yoon-Sim Yang, Min-Soo Jung:
A Study on Fast JCVM with New Transaction Mechanism and Caching-Buffer Based on Java Card Objects with a High Locality. 91-100 - Jhing-Fa Wang, Han-Jen Hsu, Jyun-Sian Li:
Intelligent Object Extraction Algorithm Based on Foreground/Background Classification. 101-110 - Tatsuo Takahashi, Satoshi Tanaka, Kenichi Yamazaki, Tadanori Mizuno:
Thin Client Based User Terminal Architecture for Ubiquitous Computing Environment. 111-120 - Ryohei Sagara, Yasue Kishino, Tsutomu Terada, Tomoki Yoshihisa, Masahiko Tsukamoto, Shojiro Nishio:
An Application Development Environment for Rule-Based I/O Control Devices. 121-130 - Yongyun Cho, Joohyun Han, Jaeyoung Choi, Chae Woo Yoo:
A uWDL Handler for Context-Aware Workflow Services in Ubiquitous Computing Environments. 131-140
Session 4: Smart Environments and Systems II
- Stanislav Kurkovsky, Vladimir Zanev, Anatoly Kurkovsky:
SMMART, a Context-Aware Mobile Marketing Application: Experiences and Lessons. 141-150 - Kwang-il Hwang, Won-Hee Lee, Seokhwan Kim, Doo Seop Eom, Kyeong Hur:
Ubiquitous Organizational Information Service Framework for Large Scale Intelligent Environments. 151-160 - Fran Jarnjak, Jinhyung Kim, Yixin Jing, Hoh Peter In, Dongwon Jeong, Doo-Kwon Baik:
TS-U: Temporal-Spatial Methodology for Application Checking of the Systems in the Ubiquitous Environment. 161-170 - Hsuan-Pu Chang, Wen-Chih Chang, Yun-Long Sie, Nigel H. Lin, Chun-Hong Huang, Timothy K. Shih, Qun Jin:
Ubiquitous Learning on Pocket SCORM. 171-179 - Su-Li Chin, Chun-Hong Huang, Chia-Tong Tang, Jason C. Hung:
An Application Based on Spatial-Relationship to Basketball Defensive Strategies. 180-188 - Owen Macindoe, Mary Lou Maher:
Intrinsically Motivated Intelligent Rooms. 189-197
Session 5: Smart Networking and Protocols I
- Sungbo Seo, Jaewoo Kang, Keun Ho Ryu:
Multivariate Stream Data Reduction in Sensor Network Applications. 198-207 - Mohamed Baqer, Asad I. Khan, Zubair A. Baig:
Implementing a Graph Neuron Array for Pattern Recognition Within Unstructured Wireless Sensor Networks. 208-217 - Dongyu Shi, Jinyuan You, Zhengwei Qi:
Building Graphical Model Based System in Sensor Networks. 218-227 - Cheol-Min Park, Dae-Won Kim, Jun Hwang:
Energy-Aware Broadcasting Method for Wireless Sensor Network. 228-237 - Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Leonard Barolli:
Anonymous Routing in Wireless Mobile Ad Hoc Networks to Prevent Location Disclosure Attacks. 238-247
Session 6: Smart Environments and Systems III
- Minwoo Son, Soonyong Choi, Dongil Shin, Dongkyoo Shin:
The Design and Implementation of a Location-Aware Service Bundle Manager in Smart Space Environments. 248-257 - Jae Yeol Lee, Dong Woo Seo:
A Context-Aware and Augmented Reality-Supported Service Framework in Ubiquitous Environments. 258-267 - Dilmurat Tilwaldi, Toshiya Takahashi, Yuichiro Mishima, Jun Sawamoto, Hisao Koizumi:
A Smart Method of Cooperative Learning Including Distant Lectures and Its Experimental Evaluations. 268-277 - Soo Jin Lee, Moon-hae Kim:
u-KoMIPS: A Medical Image Processing System in a Ubiquitous Environment. 278-287 - Sungjune Hong, Sunyoung Han, Kwanho Song:
The Extended PARLAY X for an Adaptive Context-Aware Personalized Service in a Ubiquitous Computing Environment. 288-297 - Wen-Yang Wang, Chih-Chieh Chuang, Yu-Sheng Lai, Ying-Hong Wang:
A Context-Aware System for Smart Home Applications. 298-305
Session 7: Smart Computing
- Shinya Okuda, Shigeo Kaneda, Hirohide Haga:
Human Position/Height Detection Using Analog Type Pyroelectric Sensors. 306-315 - Egil C. Østhus, Per-Oddvar Osland, Lill Kristiansen:
ENME: An ENriched MEdia Application Utilizing Context for Session Mobility; Technical and Human Issues. 316-325 - Huajun Chen, Zhiyong Ye, Zhaohui Wu:
DartDataFlow: Semantic-Based Sensor Grid. 326-334 - Kaori Fujinami, Tatsuo Nakajima:
Sentient Artefacts: Acquiring User's Context Through Daily Objects. 335-344 - Víctor Zamudio, Victor Callaghan, Jeannette Shiaw-Yuan Chin:
A Multi-dimensional Model for Task Representation and Allocation in Intelligent Environments. 345-354 - Ismail Khalil Ibrahim, Reinhard Kronsteiner, Gabriele Kotsis:
Norms Enforcement as a Coordination Strategy in Ubiquitous Environments. 355-364
Session 8: Smart Objects
- Kei Nakanishi, Makoto Setozaki, Jianhua Ma, Runhe Huang:
A Java-Based RFID Service Framework with Semantic Data Binding Between Real and Cyber Spaces. 365-374 - Yusuke Doi, Shirou Wakayama, Masahiro Ishiyama, Satoshi Ozaki, Atsushi Inoue:
Kallima: A Tag-Reader Protocol for Privacy Enhanced RFID System. 375-382 - JuSung Park, Jeonil Kang, DaeHun Nyang:
Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFID. 383-392 - Tsung-Hsiang Chang, Chien-Ju Ho, David Chawei Hsu, Yuan-Hsiang Lee, Min-Shieh Tsai, Mu-Chun Wang, Jane Yung-jen Hsu:
iCane - A Partner for the Visually Impaired. 393-402
Session 9: Security and Fault Tolerance of Smart Systems I
- Dan Feng, Lingfang Zeng, Fang Wang, Shunda Zhang:
ORAID: An Intelligent and Fault-Tolerant Object Storage Device. 403-412 - Rodrigo Lanka, Kentaro Oda, Takaichi Yoshida:
Architecture Based Approach to Adaptable Fault Tolerance in Distributed Object-Oriented Computing. 413-422 - Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder:
Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. 423-432 - Kenichi Takahashi, Kouichi Sakurai, Makoto Amamiya:
A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability. 433-442
Session 10: Smart Networking and Protocols II
- Giuseppe De Marco, Salvatore Loreto, Leonard Barolli:
Performance Analysis of IP Micro-mobility Protocols in Single and Simultaneous Movements Scenario. 443-451 - Ying-Hong Wang, Hung-Jen Mao, Chih-Hsiao Tsai, Chih-Chieh Chuang:
HMRP: Hierarchy-Based Multipath Routing Protocol for Wireless Sensor Networks. 452-459 - Joongheon Kim, Wonjun Lee, Eunkyo Kim, Joonmo Kim, Choonhwa Lee, Sungjin Kim, Sooyeon Kim:
On Energy-Aware Dynamic Clustering for Hierarchical Sensor Networks. 460-469 - Ji Young Choi, Chung Gu Kang, Yong-Suk Kim, Kyeong Hur:
Neighbor Node Discovery Algorithm for Energy-Efficient Clustering in Ubiquitious Sensor Networks. 470-479
Session 11: Security and Fault Tolerance of Smart Systems II
- Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen:
A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. 480-489 - YoungLok Lee, HyungHyo Lee, Seungyong Lee, HeeMan Park, BongNam Noh:
The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate. 490-498 - Chi-yau Lin, Chia-nan Ke, Shao-you Cheng, Jane Yung-jen Hsu, Hao-Hua Chu:
Object Reminder and Safety Alarm. 499-508 - Subhash Bhalla, Masaki Hasegawa:
Synchronization and Recovery in an Embedded Database System for Read-Only Transactions. 509-518
Session 12: Intelligent Computing
- Qiangfu Zhao:
Learning with Data Streams - An NNTree Based Approach. 519-528 - Kouichi Sakamoto, Qiangfu Zhao:
Generating Smart Robot Controllers Through Co-evolution. 529-537 - Masao Yokota, Genci Capi:
Integrated Multimedia Understanding for Ubiquitous Intelligence Based on Mental Image Directed Semantic Theory. 538-546
Session 13: Smart Environments and Systems IV
- Hui-Huang Hsu, Timothy K. Shih, Han-Bin Chang, Yi-Chun Liao, Chia-Tong Tang:
Hyper-Interactive Video Browsing by a Remote Controller and Hand Gestures. 547-555 - Marios C. Angelides, Anastasis A. Sofokleous, Christos N. Schizas:
Mobile Computing with MPEG-21. 556-565 - Binh An Truong, Young-Koo Lee, Sungyoung Lee:
A Unified Context Model: Bringing Probabilistic Models to Context Ontology. 566-575
IFIP International Symposium on Network-Centric Ubiquitous Systems (NCUS 2005)
- Soo-Joong Ghim, Yong-Ik Yoon, Ilkyeun Ra:
A Component-Based Adaptive Model for Context-Awareness in Ubiquitous Computing. 576-585 - Eun-Jun Yoon, Kee-Young Yoo:
Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem. 586-591 - Eric Angaman:
The Wrong Challenge of 'Pervasive Computing': The Paradigm of Sensor-Based Context-Awareness. 592-601 - Mats Neovius:
An Abstract Model for Incentive-Enhanced Trust in P2P Networks. 602-611 - Yuki Yokohata, Hiroshi Sunaga, Hiroyuki Nakamura:
Construction of Credible Ubiquitous P2P Content Exchange Communities. 612-621 - Hyuntae Cho, Yunju Baek:
Location-Based Routing Protocol for Energy Efficiency in Wireless Sensor Networks. 622-631 - Paul Simon Usher, Neil C. Audsley:
Efficient Access of Remote Resources in Embedded Networked Computer Systems. 632-641 - Jaroslaw Domaszewicz, Michal Rój:
Lightweight Ontology-Driven Representations in Pervasive Computing. 642-651 - Eiko Yoneki, Jean Bacon:
Object Tracking Using Durative Events. 652-662 - Yan Annie Ding, David Everitt:
Design of Integrated Routing System for Mobile Ad Hoc Networks Overlaying Peer-to-Peer Applications. 663-672 - Byungil Lee, Howon Kim:
A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access Control. 673-682 - Kun Myon Choi, Eui-nam Huh, Hyunseung Choo:
Efficient Resource Management Scheme of TCP Buffer Tuned Parallel Stream to Optimize System Performance. 683-692 - Eui-Jik Kim, Meejoung Kim, Sung-Kwan Youm, Seokhoon Choi, Chul-Hee Kang:
Multi-level Service Differentiation Scheme for the IEEE 802.15.4 Sensor Networks. 693-703 - YoungLok Lee, HyungHyo Lee, Seungyong Lee, InSu Kim, BongNam Noh:
Development of Event Manager and Its Application in Jini Environment. 704-713 - Ming-Hui Tsai, Tzu-Chiang Chiang, Yueh-Min Huang:
On Scalability and Mobility Management of Hierarchical Large-Scale Ad Hoc Networks. 714-723 - Xinli Huang, Wenju Zhang, Fanyuan Ma, Yin Li:
Exploring Small-World-Like Topologies Via SplitProber: Turning Power Laws into an Advantage in Unstructured Overlays. 724-733 - Woo-Jae Kim, Joo-Young Baek, Sun-Don Lee, Young-Joo Suh, Yun-Sung Kim, Jin-A Kim:
Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 802.16 System. 734-743 - Tom Chothia, Konstantinos Chatzikokolakis:
A Survey of Anonymous Peer-to-Peer File-Sharing. 744-755 - Giscard Wepiwé, Sahin Albayrak:
A Churn-Resistant Strategy for a Highly Reliable P2P System. 756-765 - Honghao Wang, Yiming Hu:
Building a Peer-to-Peer Overlay for Efficient Routing and Low Maintenance. 766-775 - Lingjun Qin, Dan Feng:
Dynamic Object Assignment in Object-Based Storage Devices. 776-784 - Sameer Tilak, Kenneth Chiu, Nael B. Abu-Ghazaleh, Tony Fountain:
Dynamic Resource Discovery for Sensor Networks. 785-796 - Ana Isabel González-Tablas Ferreres, Klaus Kursawe, Benjamín Ramos, Arturo Ribagorda:
Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services. 797-806 - Ajay D. Kshemkalyani:
Predicate Detection Using Event Streams in Ubiquitous Environments. 807-816
The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 2005)
- Hanping Hu, Yongqiang Chen:
Image Watermarking Technique Based on Two-Dimensional Chaotic Stream Encryption. 817-824 - Fangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen:
Identity-Based Universal Designated Verifier Signatures. 825-834 - Xinyi Huang, Yi Mu, Willy Susilo, Futai Zhang:
Short Designated Verifier Proxy Signature from Pairings. 835-844 - Zhiping Jia, Xinxiao Qiao:
An Embedded Gateway Based on Real-Time Database. 845-853 - Shidi Xu, Yi Mu, Willy Susilo:
Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks. 854-863 - Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Howon Kim, Kyoil Chung:
Collision Attack on XTR and a Countermeasure with a Fixed Pattern. 864-873 - Takumi Endo, Junichi Miura, Koichi Nanashima, Shoichi Morimoto, Yuichi Goto, Jingde Cheng:
Security in Persistently Reactive Systems. 874-883 - So-Young Park, Sang-Ho Lee:
ID-Based Access Control and Authority Delegations. 884-893 - Jun Anzai, Tsutomu Matsumoto:
How to Construct Secure Cryptographic Location-Based Services. 894-904 - Hoang Nam Nguyen, Hiroaki Morino:
A Key Management Scheme for Mobile Ad Hoc Networks Based on Threshold Cryptography for Providing Fast Authentication and Low Signaling Load. 905-915 - Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakurai:
Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow. 916-925 - Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee:
Authenticated Public Key Distribution Scheme Without Trusted Third Party. 926-935 - Bok-Min Goi, Raphael Chung-Wei Phan, M. U. Siddiqi:
Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004. 936-944 - Eun Young Choi, Su-Mi Lee, Dong Hoon Lee:
Efficient RFID Authentication Protocol for Ubiquitous Computing Environment. 945-954 - Eun-Jun Yoon, Kee-Young Yoo:
A New Simple Authenticated Key Agreement and Protected Password Change Protocol. 955-964 - Yunho Lee, Kwang-Woo Lee, Seungjoo Kim, Dongho Won, Hyungkyu Yang:
A Method for Deciding Quantization Steps in QIM Watermarking Schemes. 965-975 - Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Kyuhyung Cho, Jongsub Moon:
A New DDoS Detection Model Using Multiple SVMs and TRA. 976-985 - Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon:
PPF Model with CTNT to Defend Web Server from DDoS Attack. 986-995 - Sooyeon Shin, Taekyoung Kwon:
Efficient Key Agreement for Merging Clusters in Ad-Hoc Networking Environments. 996-1005 - Gunhee Lee, Wonil Kim, Dong-Kyoo Kim:
An Effective Method for Location Privacy in Ubiquitous Computing. 1006-1015 - Zhaoyu Liu, Peeyush Sharma, Jian Raymond Li:
Integrated Support for Location Aware Security Services in Enterprise Wireless Networks. 1016-1024
The 1st International Workshop on RFID and Ubiquitous Sensor Networks (USN 2005)
Session 1: RFID
- Vinay Deolalikar, John Recker, Malena R. Mesarina, Salil Pradhan:
Optimal Scheduling for Networks of RFID Readers. 1025-1035 - Shailesh M. Birari, Sridhar Iyer:
PULSE: A MAC Protocol for RFID Networks. 1036-1046 - S. Anusha, Sridhar Iyer:
RFIDcover - A Coverage Planning Tool for RFID Networks with Mobile Readers. 1047-1057 - Elaine Lai, Andrew Redfern, Paul K. Wright:
Vibration Powered Battery-Assisted Passive RFID Tag. 1058-1068 - C. Philipp Schloter, Hamid K. Aghajan:
Wireless RFID Networks for Real-Time Customer Relationship Management. 1069-1077 - Yong Hwan Lee, Hee Jung Kim, Byeong-Hee Roh, Seung W. Yoo, Y. C. Oh:
Tree-Based Classification Algorithm for Heterogeneous Unique Item ID Schemes. 1078-1087 - Sung Jin Choi, Hee Yong Youn:
An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks. 1088-1097
Session 2: USN
- Kyung Tae Kim, Hee Yong Youn:
Energy-Driven Adaptive Clustering Hierarchy (EDACH) for Wireless Sensor Networks. 1098-1107 - Jin Wang, Lei Shu, Jinsung Cho, Young-Koo Lee, Sungyoung Lee, Yonil Zhung:
A Load-Balancing and Energy-Aware Clustering Algorithm in Wireless Ad-Hoc Networks. 1108-1117 - Hyang-tack Lee, Yong-Hyun Jo, Byeong-Hee Roh, Seung W. Yoo:
Energy-Efficient Cluster Reconfiguration with Fair Cluster Formations in Sensor Networks. 1118-1127 - Lynn Choi, Kwangseok Choi, Jungsun Kim, Byung Joon Park:
Virtual Sink Rotation: Low-Energy Scalable Routing Protocol for Ubiquitous Sensor Networks. 1128-1137 - Young-Mi Song, Sung-Hee Lee, Young-Bae Ko:
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions. 1138-1147 - Sangsoo Lee, Daeyoung Kim, Sungjin Ahn, Noseong Park:
Power-Aware Position Vector Routing for Wireless Sensor Networks. 1148-1156 - Zhao Li, Wei Zhang, Hengchang Liu, Baohua Zhao, Yugui Qu:
Multicast Routing with Minimum Energy Cost and Minimum Delay in Wireless Sensor Networks. 1157-1168 - Yun Kyung Lee, Eui Hyeok Kwon, Jaesung Lim:
Self Location Estimation Scheme Using ROA in Wireless Sensor Networks. 1169-1177 - Yu Gu, Wei Zhang, Hengchang Liu, Baohua Zhao, Yugui Qu:
Energy-Efficient Target Localization Based on a Prediction Model. 1178-1190 - Wonwoo Jung, Sujeong Shin, Sukwon Choi, Hojung Cha:
Reducing Congestion in Real-Time Multi-party-tracking Sensor Network Applications. 1191-1200 - Qi Zhou, Takuya Asaka, Tatsuro Takahashi:
Variable-Radii Method Based on Probing Mechanism (VRPM): An Energy Conservation Method for Wireless Active Sensor Networks. 1201-1210
The International Workshop on Trusted and Autonomic Ubiquitous and Embedded Systems (TAUES 2005)
Session 1: Autonomic Computing
- Satoshi Yamane:
Automata-Theoretic Performance Analysis Method of Soft Real-Time Systems. 1211-1224 - Ali Sajjad, Hassan Jameel, Umar Kalim, Young-Koo Lee, Sungyoung Lee:
A Component-based Architecture for an Autonomic Middleware Enabling Mobile Access to Grid Infrastructure. 1225-1234 - Roy Sterritt, Edward Hanna, Patricia O'Hagan:
Autonomic Agents for Survivable Security Systems. 1235-1244 - Roy Sterritt, Michael G. Hinchey, James L. Rash, Walt Truszkowski, Christopher A. Rouff, Denis Gracanin:
Towards Formal Specification and Generation of Autonomic Policies. 1245-1254
Session 2: Security
- Fang-Yie Leu, Wei-Jie Yang:
Intrusion Detection with CUSUM for TCP-Based DDoS. 1255-1264 - Yun Ji Na, Il Seok Ko:
A Digital Content Distribution Using a Group-key and Multi-layered Structure Based on Web. 1265-1272 - Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan:
Access Policy Sheet for Access Control in Fine-Grained XML. 1273-1282
Session 3: Dependable Computing
- Kazuki Iwamoto, Tadashi Dohi, Naoto Kaio:
Monitoring the Health Condition of a Ubiquitous System: Rejuvenation vs. Recovery. 1283-1292 - Changyeol Choi, Sungsoo Kim:
A Dependability Management Mechanism for Ubiquitous Computing Systems. 1293-1302 - Junichiro Saito, Kenji Imamoto, Kouichi Sakurai:
Reassignment Scheme of an RFID Tag's Key for Owner Transfer. 1303-1312
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.