Contenuti:
NCUS 2006 Symposium.- Adaptive Router Promotion in Ad-Hoc Networks.- A Utility-Based Auction Cooperation Incentive Mechanism in Peer-to-Peer Networks.- UbiqStor: Server and Proxy for Remote Storage of Mobile Devices.- Packet Length Adaptation for Energy-Proportional Routing in Clustered Sensor Networks.- A New Context Script Language for Developing Context-Aware Application Systems in Ubiquitous Computing.- Dynamic Replication Strategies for Object Storage Systems.- A Cost-Effective Mobility Modelling in Nested Network Mobility.- Completing UML Model of Component-Based System with Middleware for Performance Evaluation.- Energy Efficient PNC Selection Procedure for the IEEE 802.15.3-Based HR-WPAN.- An Efficient Multicast Routing Protocol in Multi-rate Wireless Ad Hoc Networks.- WPAN Platform Design in Handset Integrating Cellular Network and Its Application to Mobile Games.- Reliable Transporting and Optimal Routing on Rate-Based for Ad Hoc Networks.- Automatic Extraction of Conversation Protocols from a Choreography Specification of Ubiquitous Web Services.- Inter-sector Interference Mitigation Method in Triple-Sectored OFDMA Systems.- File Correspondences Dictionary Construction in Multilingual P2P File Sharing Systems.- Lightweight Messages: True Zero-Copy Communication for Commodity Gigabit Ethernet.- Evaluation of Models for Analyzing Unguided Search in Unstructured Networks.- Wapee: A Fault-Tolerant Semantic Middleware in Ubiquitous Computing Environments.- Security in P2P Networks: Survey and Research Directions.- HYWINMARC: An Autonomic Management Architecture for Hybrid Wireless Networks.- Prediction Efficiency in Predictive p-CSMA/CD.- A Situation Aware Personalization in Ubiquitous Mobile Computing Environments.- A Network and Data Link Layer QoS Model to Improve Traffic Performance.- A GML-Based Mobile Device Trace Monitoring System.- Impact of High-Mobility Radio Jamming in Large-Scale Wireless Sensor Networks.- SecUbiq 2006 Workshop.- A Scalable and Untraceable Authentication Protocol for RFID.- Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005.- Reliable Broadcast Message Authentication in Wireless Sensor Networks.- Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks.- A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks.- Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol.- Ubiquitous Authorization Scheme Based on Device Profile.- An Efficient Certificateless Signature Scheme.- Universal Designated Verifier Ring Signature (Proof) Without Random Oracles.- An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings.- A Strong Identity Based Key-Insulated Cryptosystem.- A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE.- Energy Comparison of AES and SHA-1 for Ubiquitous Computing.- USN 2006 Workshop.- Performance Analysis of Tag Anti-collision Algorithms for RFID Systems.- Perturbative Time and Frequency Allocations for RFID Reader Networks.- An Enhanced Dynamic Framed Slotted ALOHA Anti-collision Algorithm.- DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers.- Design and Implementation of a High-Speed RFID Data Filtering Engine.- Authorized Tracking and Tracing for RFID Tags.- An Energy-Efficient MAC Protocol for Delay-Sensitive Wireless Sensor Networks.- A Data-Centric Self-organization Scheme for Energy-Efficient Wireless Sensor Networks.- Optimized Clustering for Maximal Lifetime of Wireless Sensor Networks.- Maximize the Coverage Lifetime of Sensor Networks.- An Active Tracking System Using IEEE 802.15.4-Based Ultrasonic Sensor Devices.- LWOS: A Localization Method Without On-Body Sensor in Wireless Sensor Networks.- TRUST 2006 Workshop.- Research Directions in the Area of USN (Ubiquitous Sensor Network) Towards Practical UE (Ubiquitous Environments).- On Building a Lightweight Security Architecture for Sensor Networks.- A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks.- Algorithms for Service Differentiation in MAC Layer over MANETs.- A Power-Aware Routing Protocol Using Multi-Route Transmission for Mobile Ad Hoc Networks.- A Novel Multicasting Scheme over Wireless LAN Systems by Using Relay.- An Adaptive Concurrency Control QOS Agent for Ubiquitous Computing Environments.- An Efficient End-to-End QoS Supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-Back for Ubiquitous and Distributed Applications.- An RFID System Based MCLT System with Improved Privacy.- QT-CBP: A New RFID Tag Anti-collision Algorithm Using Collision Bit Positioning.- An RFID-Based Access and Location Service for Pervasive Grids.- Autonomous Management of Large-Scale Ubiquitous Sensor Networks.- A Privacy-Aware Service Protocol for Ubiquitous Computing Environments.- A Neural Network Model for Detection Systems Based on Data Mining and False Errors.- An Analysis on the Web Technologies for Dynamically Generating Web-Based User Interfaces in Ubiquitous Spaces.- A Policy Description Language for Context-Based Access Control and Adaptation in Ubiquitous Environment.- C-iUMS: Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous Home.- A Lightweight IP Traceback Mechanism on IPv6.- Enable a Trustworthy Network by Source Address Spoofing Prevention Routers: A Formal Description.- A Flexible Bound Admission Control Algorithm for Vertical Handover in Ubiquitous Environment.- Network Probabilistic Connectivity: Using Node Cuts.- Fast Mounting and Recovery for NAND Flash Memory Based Embedded Systems.- Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments.- A Robust Verifiably Encrypted Signature Scheme.- ESO 2006 Workshop.- Instruction Re-selection for Iterative Modulo Scheduling on High Performance Multi-issue DSPs.- Predictability of Least Laxity First Scheduling Algorithm on Multiprocessor Real-Time Systems.- Saving Register-File Leakage Power by Monitoring Instruction Sequence in ROB.- Run-Time Memory Optimization for DDMB Architecture Through a CCB Algorithm.- Code Generation and Optimization for Java-to-C Compilers.- Modelling and Analysis of Power Consumption for Component-Based Embedded Software.- Design of a Programmable Vertex Processing Unit for Mobile Platforms.- An Energy-Aware Whole-System Dynamic Emulator – SkyEye.- Optimizing Scheduling Stability for Runtime Data Alignment.- A Chinese Mobile Phone Input Method Based on the Dynamic and Self-study Language Model.- An ID-Based Watermarking Scheme for Java Programs.- Data-Layout Optimization Using Reuse Distance Distribution.- Co-optimization of Performance and Power in a Superscalar Processor Design.- FAST: An Efficient Flash Translation Layer for Flash Memory.- A Novel Discrete Hopfield Neural Network Approach for Hardware-Software Partitioning of RTOS in the SoC.- UML Based Evaluation of Reconfigurable Shape Adaptive DCT for Embedded Stream Processing.- A High Performance Buffering of Java Objects for Java Card Systems with Flash Memory.- MSA 2006 Workshop.- Predictive Prefetching of Context-Aware Information in Mobile Networks.- Digital Ortho-image Production for Web GIS Applications.- Multimedia Contents Security by Wireless Authentication.- Traffic Actuated Car Navigation Systems in Mobile Communication Networks.- Analytic Model of the Collision Resolution Protocol with Voice/Data in Mobile Networks.- Security Enhancement by Detecting Network Address Translation Based on Instant Messaging.- A New Authentication Scheme of Binding Update Protocol on Handover in Mobile IPv6 Networks.- A Solution for the Dropout Problem in Adaptive Cruise Control Range Sensors.- An Architecture Framework for Measuring and Evaluating Packet-Switched Voice.- HOIDS-Based Detection Method of Vicious Event in Large Networks.- New Handoff Control Method Using Fuzzy Multi-Criteria Decision Making in Micro/Pico-cellular Networks.- Test of IR-DSRC in Measuring Vehicle Speed for ITS Applications.- A Grid Routing Scheme Considering Node Lifetime in Ubiquitous Sensor Networks.
Product Description:
Emerging Directions In Embedded And Ubiquitous Computing: Euc 2006 Workshops: Ncus, Secubiq, Usn, Trust, Eso, And Msa, Seoul, Korea, August 1-4, 2006, Proceedings by Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.-C., Kim, D., Jeong, Y.-S., Xu, C.-Z. (Eds.), Springer, 2006, 9783540368502
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.