default search action
EUC Workshops 2006: Seoul, Korea
- Xiaobo Zhou, Oleg Sokolsky, Lu Yan, Eun-Sun Jung, Zili Shao, Yi Mu, Dong Chun Lee, Daeyoung Kim, Young-Sik Jeong, Cheng-Zhong Xu:
Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings. Lecture Notes in Computer Science 4097, Springer 2006, ISBN 3-540-36850-7
NCUS 2006 Symposium
- Kensuke Tanaka, Noriko Matsumoto, Norihiko Yoshida:
Adaptive Router Promotion in Ad-Hoc Networks. 1-10 - Jiujun Cheng, Yuhong Li, Weiwei Jiao, Jian Ma:
A Utility-Based Auction Cooperation Incentive Mechanism in Peer-to-Peer Networks. 11-21 - MinHwan Ok, Daegeun Kim, Myong-Soon Park:
UbiqStor: Server and Proxy for Remote Storage of Mobile Devices. 22-31 - Chao-Lieh Chen, Chia-Yu Yu, Chien-Chung Su, Mong-Fong Horng, Yau-Hwang Kuo:
Packet Length Adaptation for Energy-Proportional Routing in Clustered Sensor Networks. 32-42 - Jae-Woo Chang, Yong-Ki Kim:
A New Context Script Language for Developing Context-Aware Application Systems in Ubiquitous Computing. 43-52 - Zhipeng Tan, Dan Feng:
Dynamic Replication Strategies for Object Storage Systems. 53-61 - Hye-Young Kim:
A Cost-Effective Mobility Modelling in Nested Network Mobility. 62-71 - Yong Zhang, Ningjiang Chen, Jun Wei, Tao Huang:
Completing UML Model of Component-Based System with Middleware for Performance Evaluation. 72-82 - Eunchang Choi, Jae-Doo Huh, Soo-Joong Kim, WoongChul Choi:
Energy Efficient PNC Selection Procedure for the IEEE 802.15.3-Based HR-WPAN. 83-92 - Kyung-Jin Bae, Dong-Hee Kwon, Woo-Jae Kim, Young-Joo Suh:
An Efficient Multicast Routing Protocol in Multi-rate Wireless Ad Hoc Networks. 93-102 - In-Hwan Kim, Hoo-Jong Kim, Gu-Min Jeong:
WPAN Platform Design in Handset Integrating Cellular Network and Its Application to Mobile Games. 103-111 - Ming-Hui Tsai, Tzu-Chiang Chiang, Yueh-Min Huang:
Reliable Transporting and Optimal Routing on Rate-Based for Ad Hoc Networks. 112-121 - Jonghun Park, Byung-Hyun Ha:
Automatic Extraction of Conversation Protocols from a Choreography Specification of Ubiquitous Web Services. 122-132 - Jung-Ryun Lee, Keunyoung Kim, YongHoon Lim:
Inter-sector Interference Mitigation Method in Triple-Sectored OFDMA Systems. 133-143 - Hongding Wang, Shaohua Tan, Shiwei Tang, Dongqing Yang, Yunhai Tong:
File Correspondences Dictionary Construction in Multilingual P2P File Sharing Systems. 144-152 - Hai Jin, Minghu Zhang, Pengliu Tan:
Lightweight Messages: True Zero-Copy Communication for Commodity Gigabit Ethernet. 153-162 - Bin Wu, Ajay D. Kshemkalyani:
Evaluation of Models for Analyzing Unguided Search in Unstructured Networks. 163-172 - Yoonhee Kim, Eun-Kyung Kim, Beom-Jun Jeon, In-Young Ko, Sung-Yong Park:
Wapee: A Fault-Tolerant Semantic Middleware in Ubiquitous Computing Environments. 173-182 - Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda:
Security in P2P Networks: Survey and Research Directions. 183-192 - Shafique Ahmad Chaudhry, Ali Hammad Akbar, Ki-Hyung Kim, Suk-Kyo Hong, Won-Sik Yoon:
HYWINMARC: An Autonomic Management Architecture for Hybrid Wireless Networks. 193-202 - Marek Miskowicz:
Prediction Efficiency in Predictive p-CSMA/CD. 203-212 - Heeseo Chae, Do-Hoon Kim, Dongwon Jeong, Hoh Peter In:
A Situation Aware Personalization in Ubiquitous Mobile Computing Environments. 213-223 - Jesús Arturo Pérez Díaz, Victor Hugo Zárate Silva, Christian Cabrera:
A Network and Data Link Layer QoS Model to Improve Traffic Performance. 224-233 - Eun-Ha Song, Sung-Kook Han, Laurence Tianruo Yang, Minyi Guo, Young-Sik Jeong:
A GML-Based Mobile Device Trace Monitoring System. 234-243 - Chulho Won, Jong-Hoon Youn, Hesham H. Ali:
Impact of High-Mobility Radio Jamming in Large-Scale Wireless Sensor Networks. 244-251
SecUbiq 2006 Workshop
- Youngjoon Seo, Hyunrok Lee, Kwangjo Kim:
A Scalable and Untraceable Authentication Protocol for RFID. 252-261 - Daesung Kwon, Daewan Han, Jooyoung Lee, Yongjin Yeom:
Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005. 262-270 - Taketsugu Yao, Shigeru Fukunaga, Toshihisa Nakai:
Reliable Broadcast Message Authentication in Wireless Sensor Networks. 271-280 - HongKi Lee, DaeHun Nyang, JooSeok Song:
Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks. 281-290 - Seog Chung Seo, Hyung Chan Kim, Rudrapatna S. Ramakrishna:
A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks. 291-301 - Seonho Choi, Yanggon Kim:
Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol. 302-311 - Kevin Tham, Mark Looi, Ernest Foo:
Ubiquitous Authorization Scheme Based on Device Profile. 312-321 - Wun-She Yap, Swee-Huay Heng, Bok-Min Goi:
An Efficient Certificateless Signature Scheme. 322-331 - Jin Li, Yanming Wang:
Universal Designated Verifier Ring Signature (Proof) Without Random Oracles. 332-341 - Huiyan Chen, Shuwang Lü, Zhenhua Liu, Qing Chen:
An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings. 342-351 - Jin Li, Fangguo Zhang, Yanming Wang:
A Strong Identity Based Key-Insulated Cryptosystem. 352-361 - Jin Li, Fangguo Zhang, Yanming Wang:
A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE. 362-371 - Jens-Peter Kaps, Berk Sunar:
Energy Comparison of AES and SHA-1 for Ubiquitous Computing. 372-381
USN 2006 Workshop
- Cheng-Hao Quan, Won-Kee Hong, Hiecheol Kim:
Performance Analysis of Tag Anti-collision Algorithms for RFID Systems. 382-391 - Vinay Deolalikar, Malena R. Mesarina, John Recker, Salil Pradhan:
Perturbative Time and Frequency Allocations for RFID Reader Networks. 392-402 - Su-Ryun Lee, Chae-Woo Lee:
An Enhanced Dynamic Framed Slotted ALOHA Anti-collision Algorithm. 403-412 - Kwang-il Hwang, Kyung Tae Kim, Doo Seop Eom:
DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers. 413-422 - Hyunsung Park, Jongdeok Kim:
Design and Implementation of a High-Speed RFID Data Filtering Engine. 423-434 - Ming-Yang Chen, Ching-Nung Yang, Chi-Sung Laih:
Authorized Tracking and Tracing for RFID Tags. 435-444 - Changsu Suh, Deepesh Man Shrestha, Young-Bae Ko:
An Energy-Efficient MAC Protocol for Delay-Sensitive Wireless Sensor Networks. 445-454 - Sung-Hyup Lee, Young-Soo Choi, Hee-Dong Park, Yoon-Young An, You Ze Cho:
A Data-Centric Self-organization Scheme for Energy-Efficient Wireless Sensor Networks. 455-464 - Kyung Tae Kim, Hyunsoo Kim, Hee Yong Youn:
Optimized Clustering for Maximal Lifetime of Wireless Sensor Networks. 465-474 - Minh-Long Pham, Daeyoung Kim, Taehong Kim, Seongeun Yoo:
Maximize the Coverage Lifetime of Sensor Networks. 475-484 - Shinyoung Yi, Hojung Cha:
An Active Tracking System Using IEEE 802.15.4-Based Ultrasonic Sensor Devices. 485-494 - Shuangquan Wang, Ningjiang Chen, Xin Chen, Jie Yang, Jun Lu:
LWOS: A Localization Method Without On-Body Sensor in Wireless Sensor Networks. 495-504
TRUST 2006 Workshop
- Young Yong Kim:
Research Directions in the Area of USN (Ubiquitous Sensor Network) Towards Practical UE (Ubiquitous Environments). 505-510 - Taejoon Park, Kang G. Shin:
On Building a Lightweight Security Architecture for Sensor Networks. 511-521 - Chonggun Kim, Elmurod Talipov, Byoungchul Ahn:
A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks. 522-531 - Kwan-Woong Kim, Sung-Hwan Bae, Dae-Ik Kim:
Algorithms for Service Differentiation in MAC Layer over MANETs. 532-539 - Kuang-Han Fei, Sheng-Yan Chuang, Sheng-De Wang:
A Power-Aware Routing Protocol Using Multi-Route Transmission for Mobile Ad Hoc Networks. 540-549 - Kang Jin Yoon, Tae Sung Kim, Young Yong Kim:
A Novel Multicasting Scheme over Wireless LAN Systems by Using Relay. 550-559 - Eung Nam Ko:
An Adaptive Concurrency Control QOS Agent for Ubiquitous Computing Environments. 560-569 - Se Youn Ban, Seong Gon Choi, Jun Kyun Choi:
An Efficient End-to-End QoS Supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-Back for Ubiquitous and Distributed Applications. 570-578 - Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won:
An RFID System Based MCLT System with Improved Privacy. 579-590 - Hyunji Lee, Jongdeok Kim:
QT-CBP: A New RFID Tag Anti-collision Algorithm Using Collision Bit Positioning. 591-600 - Antonio Coronato, Gennaro Della Vecchia, Giuseppe De Pietro:
An RFID-Based Access and Location Service for Pervasive Grids. 601-608 - Jong-Eon Lee, Si-Ho Cha, Dae-Young Kim, Kuk-Hyun Cho:
Autonomous Management of Large-Scale Ubiquitous Sensor Networks. 609-618 - Gunhee Lee, Song-hwa Chae, Inwhan Hwang, Manpyo Hong:
A Privacy-Aware Service Protocol for Ubiquitous Computing Environments. 619-628 - Se-Yul Lee, Bong-Hwan Lee, Yeong-Deok Kim, Dong-Myung Shin, Chan-Hyun Youn:
A Neural Network Model for Detection Systems Based on Data Mining and False Errors. 629-638 - Ilsun You, Chel Park:
An Analysis on the Web Technologies for Dynamically Generating Web-Based User Interfaces in Ubiquitous Spaces. 639-649 - Joonseon Ahn, Byeong-Mo Chang, Kyung-Goo Doh:
A Policy Description Language for Context-Based Access Control and Adaptation in Ubiquitous Environment. 650-659 - Jong Hyuk Park, Sangjin Lee, Sung Hee Hong:
C-iUMS: Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous Home. 660-670 - Syed Obaid Amin, Myung Soo Kang, Choong Seon Hong:
A Lightweight IP Traceback Mechanism on IPv6. 671-680 - Jun Bi, Jianping Wu, Miao Zhang:
Enable a Trustworthy Network by Source Address Spoofing Prevention Routers: A Formal Description. 681-691 - Jong Min Lee, Ok Sik Yang, Seong Gon Choi, Jun Kyun Choi:
A Flexible Bound Admission Control Algorithm for Vertical Handover in Ubiquitous Environment. 692-701 - Denis A. Migov, Olga K. Rodionova, Alexey S. Rodionov, Hyunseung Choo:
Network Probabilistic Connectivity: Using Node Cuts. 702-709 - Song-Hwa Park, Tae-Hoon Kim, Tae-Hoon Lee, Ki-Dong Chung:
Fast Mounting and Recovery for NAND Flash Memory Based Embedded Systems. 710-720 - Deok-Gyu Lee, Jang-Su Park, Im-Yeong Lee:
Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments. 721-730 - Jianhong Zhang, Wei Zou:
A Robust Verifiably Encrypted Signature Scheme. 731-740
ESO 2006 Workshop
- Doosan Cho, Ravi Ayyagari, Gang-Ryung Uh, Yunheung Paek:
Instruction Re-selection for Iterative Modulo Scheduling on High Performance Multi-issue DSPs. 741-754 - Sangchul Han, Minkyu Park:
Predictability of Least Laxity First Scheduling Algorithm on Multiprocessor Real-Time Systems. 755-764 - Wann-Yun Shieh, Hsin-Dar Chen:
Saving Register-File Leakage Power by Monitoring Instruction Sequence in ROB. 765-774 - Jeonghun Cho, Yunheung Paek:
Run-Time Memory Optimization for DDMB Architecture Through a CCB Algorithm. 775-784 - Youngsun Han, Shinyoung Kim, Hokwon Kim, Seokjoong Hwang, Seon Wook Kim:
Code Generation and Optimization for Java-to-C Compilers. 785-794 - Jun Hu, Xuandong Li, Guoliang Zheng, Chenghua Wang:
Modelling and Analysis of Power Consumption for Component-Based Embedded Software. 795-804 - Tae-Young Kim, Kyoung-Su Oh:
Design of a Programmable Vertex Processing Unit for Mobile Platforms. 805-814 - Cheng Yu, Kang Suo, Ren Jie, Zhu Hui, Shi Yuan Chun:
An Energy-Aware Whole-System Dynamic Emulator - SkyEye. 815-824 - Ching-Hsien Hsu, Chao-Yang Lan, Shih-Chang Chen:
Optimizing Scheduling Stability for Runtime Data Alignment. 825-835 - Qiaoming Zhu, Peifeng Li, Ping Gu, Peide Qian:
A Chinese Mobile Phone Input Method Based on the Dynamic and Self-study Language Model. 836-847 - Zheng Yuan, Qiaoyan Wen, Wenling Wu, Qing Zhang:
An ID-Based Watermarking Scheme for Java Programs. 848-857 - Xiong Fu, Yu Zhang, Yiyun Chen:
Data-Layout Optimization Using Reuse Distance Distribution. 858-867 - Yongxin Zhu, Weng-Fai Wong, Stefan Andrei:
Co-optimization of Performance and Power in a Superscalar Processor Design. 868-878 - Sang-Won Lee, Won-Kyoung Choi, Dong-Joo Park:
FAST: An Efficient Flash Translation Layer for Flash Memory. 879-887 - Bing Guo, Yan Shen, Yue Huang, Zhishu Li:
A Novel Discrete Hopfield Neural Network Approach for Hardware-Software Partitioning of RTOS in the SoC. 888-897 - Xianhui He, Yongxin Zhu, Zhenxin Sun, Yuzhuo Fu:
UML Based Evaluation of Reconfigurable Shape Adaptive DCT for Embedded Stream Processing. 898-907 - Min-Sik Jin, Min-Soo Jung:
A High Performance Buffering of Java Objects for Java Card Systems with Flash Memory. 908-918
MSA 2006 Workshop
- In Seon Choi, Gi Hwan Cho:
Predictive Prefetching of Context-Aware Information in Mobile Networks. 919-927 - Hong-Gyoo Sohn, Hyo-Keun Park, Choung-Hwan Park, Joon Heo:
Digital Ortho-image Production for Web GIS Applications. 928-935 - Jung-Jae Kim, Kwang-Hyoung Lee, So Yeon Min, Jeong Gyu Jee:
Multimedia Contents Security by Wireless Authentication. 936-945 - Seungjae Lee, Chungwon Lee, Taehee Kim, Jeong Hyun Kim:
Traffic Actuated Car Navigation Systems in Mobile Communication Networks. 946-952 - Dong Chun Lee:
Analytic Model of the Collision Resolution Protocol with Voice/Data in Mobile Networks. 953-961 - Jun Bi, Miao Zhang, Lei Zhao:
Security Enhancement by Detecting Network Address Translation Based on Instant Messaging. 962-971 - Jung Doo Koo, Jungsook Koo, Dong Chun Lee:
A New Authentication Scheme of Binding Update Protocol on Handover in Mobile IPv6 Networks. 972-978 - Bongsoo Son, Taehyung Kim, YongEun Shin:
A Solution for the Dropout Problem in Adaptive Cruise Control Range Sensors. 979-987 - Hyuncheol Kim, Seong-Jin Ahn, Jun Kyun Choi:
An Architecture Framework for Measuring and Evaluating Packet-Switched Voice. 988-997 - Dong Hwi Lee, Jeom Goo Kim, Kuinam J. Kim:
HOIDS-Based Detection Method of Vicious Event in Large Networks. 998-1005 - Jongchan Lee, Dong Li, Ki Hong Park, Hong-Jin Kim:
New Handoff Control Method Using Fuzzy Multi-Criteria Decision Making in Micro/Pico-cellular Networks. 1006-1011 - Hyung Jin Kim, Jin-Tae Kim, Kee Yeon Hwang:
Test of IR-DSRC in Measuring Vehicle Speed for ITS Applications. 1012-1020 - Sangjoon Park, Sok-Pal Cho, Byunggi Kim:
A Grid Routing Scheme Considering Node Lifetime in Ubiquitous Sensor Networks. 1021-1030
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.