Emerging Directions in Embedded and Ubiquitous Computing: EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 1-4, 2007, ProceedingsMieso Denko, Chi-Sheng Shih, Kuan-Ching Li, Shiao-Li Tsao, Qing-An Zeng, Soo-Hyun Park, Young-Bae Ko, Shih-Hao Hung, Jong Hyuk Park Springer, 2007. gada 27. nov. - 828 lappuses This book constitutes the refereed proceedings of the EUC 2007 workshops held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2007, in Taipei, Taiwan, in December 2007. The 69 revised full papers presented together with four invited papers were carefully reviewed and selected from about 200 submissions to the seven workshops. A broad range of topics are covered. |
Lietotāju komentāri - Rakstīt atsauksmi
Ierastajās vietās neesam atraduši nevienu atsauksmi.
Saturs
1 | |
12 | |
22 | |
31 | |
43 | |
57 | |
Obligations for Privacy and Confidentiality in Distributed Transactions | 69 |
Multichannel Enhancements for IEEE 80211Based Multihop AdHoc Wireless Networks | 82 |
A CrossLayered Diagnostician in OSGi Platform for Home Network | 435 |
Localization Algorithm with Merging Segmented Maps for Underwater Sensor Networks | 445 |
TinyOSBased Gateway for Underwater AcousticsRadio Frequency Communication | 455 |
An Energy Scheduling Algorithm for Ensuring the Predetermined Lifetime in Sensor Network | 467 |
Underwater Acoustic Communication and ModemBased Navigation Aids | 474 |
StateoftheArt in MAC Protocols for Underwater Acoustics Sensor Networks | 482 |
An Ultrasonic Sensor Based LowPower Acoustic Modem for Underwater Communication in Underwater Wireless Sensor Networks | 494 |
UWANAV Energy Efficient Error Control Scheme for Underwater Acoustic Sensor Network | 505 |
An Intelligent EventDriven Interface Agent for Interactive Digital Contents in Ubiquitous Environments | 93 |
A LoopBased Key Management Scheme for Wireless Sensor Networks | 103 |
A MAC Protocol with Little Idle Listening for Wireless Sensor Networks | 115 |
Security Technologies Based on Home Gateway for Making Smart Home Secure | 124 |
Layered Peer to Peer Streaming Using Hidden Markov Models | 136 |
Optimum Power Controller for Random Number Generator in the Crypto Module of Ubiquitous Computing Environment | 146 |
Problem Localization for Automated System Management in Ubiquitous Computin | 158 |
A High Speed Analog to Digital Converter for Ultra Wide Band Applications | 169 |
Design and DSP Software Implementation of Mobile WiMAX Baseband Transceiver Functions | 181 |
CrossLayer Design for IEEE 802162005 System Using PlatformBased Methodologies | 193 |
A Dynamic Frequency Allocation Scheme for IEEE 80216 OFDMABased WMANs Using Hungary Algorithm | 205 |
Wireless Network Management System for WiMAX WiFi Mesh Networks | 215 |
An Implementation of QoS Framework for Heterogeneous Networks | 226 |
An EnergyEfficient MAC Design for IEEE 802154Based Wireless Sensor Networks | 237 |
A CrossLayer Signaling and Middleware Platform for Multiinterface Mobile Devices | 249 |
Enhanced Sleep Mode Operations for Energy Saving in IEEE 80216e | 261 |
Enhanced FingerprintBased Location Estimation System in Wireless LAN Environment | 273 |
Improving Channel Scanning Procedures for WLAN Handoffs | 285 |
A Multicast Extension for Enhanced Mobile IP by Home Agent Handover | 297 |
Autonomic Multiserver Distribution in Flash Crowds Alleviation Network | 309 |
Generic EnergyEfficient Geographic Routing for AdHoc Wireless Networks | 321 |
Description of a New Feature Metamodel | 333 |
Studying of Multidimensional Based Replica Management in Object Storage System | 341 |
Communication Model Exploration for Distributed Embedded Systems and System Level Interpretations | 355 |
An EndtoEnd QoS Adaptation Architecture for the Integrated IntServ and DiffServ Networks | 365 |
A Research Support Environment for Ubiquitous Learning Based on Sensor Networks | 377 |
Intelligent Monitoring Using Wireless Sensor Networks | 389 |
On the Design of Micromobility for Mobile Network | 401 |
Adaptive Network Selection in WLANUMTS EnviRonment | 413 |
Selfauthorized Public Key Management for Home Networks | 425 |
Underwater Wideband Source Localization Using the Interference Pattern Matching | 515 |
A New Virtual Select Database Operation for Wireless Sensor Networks | 523 |
GT2 Reduced Wastes Time Mechanism forUnderwater Acoustic Sensor Network | 531 |
Comparative Evaluation of Probabilistic and Deterministic Tag Anticollision Protocols for RFID Networks | 538 |
An Efficient Mutual Authentication Protocol on RFID Tags | 550 |
HGLAP Hierarchical GroupIndex Based Lightweight Authentication Protocol for Distributed RFID System | 557 |
Target Classification in Sparse Sampling Acoustic Sensor Networks Using IDDC Algorithm | 568 |
Scriptable Sensor Network Based HomeAutomation | 579 |
Applying Situation Awareness to Mobile Proactive Information Delivery | 592 |
EnergyEfficiency on a VariableBitrate Device | 604 |
The Secure DAES Design for Embedded System Application | 617 |
Software Power Peak Reduction on Smart Card Systems Based on Iterative Compiling | 627 |
Simultaneous Operation Scheduling and Operation Delay Selection to Minimize CyclebyCycle Power Differential | 638 |
A Simple Approach to Robust Optimal Pole Assignment of Decentralized Stochastic SingularlyPerturbed Computer Controlled Systems | 648 |
AssuredTimeliness Integrity Protocols for Distributable RealTime Threads with in Dynamic Distributed Systems | 660 |
Evaluating Modeling Solutions on Their Ability to Support the Partitioning of Automotive Embedded Systems | 674 |
Security Analysis of the Certificateless Signature Scheme Proposed at SecUbiq 2006 | 686 |
New Efficient Certificateless Signature Scheme | 692 |
A Practical IdentityBased Signature Scheme from Bilinear Map | 704 |
Linkable Ring Signatures from Linear Feedback Shift Register | 716 |
A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem | 728 |
A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks | 745 |
TokenBased Authenticated Key Establishment Protocols for ThreeParty Communication | 758 |
Two Approaches on Pairwise Key Path Establishment for Sensor Networks | 770 |
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks | 781 |
LowCost and StrongSecurity RFID Authentication Protocol | 795 |
A Ticket Based Binding Update Authentication Method for Trusted Nodes in Mobile IPv6 Domain | 808 |
Author Index | 820 |
Citi izdevumi - Skatīt visu
Bieži izmantoti vārdi un frāzes
acoustic modem adversary algorithm allocation applications architecture authentication bandwidth binding update bit-rate channel communication connections database defined Denko device DiffServ distributed efficient embedded systems energy consumption environment EUC Workshops 2007 evaluation Federation for Information flash crowds handoff hash function home network IEEE IFIP International Federation implementation Information Processing 2007 input interface IntServ latency layer LNCS MAC protocol mechanism method mobile module multicast neighbor OFDMA operation optimal OSGi packet pairwise key paper parameters performance problem proposed proxies public key query random number reader received relay replay attack request requirements RFID RFID systems scan schedule sends sensor nodes server session key signal signature scheme simulation sleep smart card subchannel Taiwan Technology traffic transmission transmitted tuple ubiquitous computing Underwater Acoustic University users Wi-Fi WiMAX wireless sensor networks WLAN