Willkommen, schön sind Sie da!
Logo Ex Libris

Embedded and Ubiquitous Computing - EUC 2005 Workshops

  • E-Book (pdf)
  • 1317 Seiten
(0) Erste Bewertung abgeben
Bewertungen
(0)
(0)
(0)
(0)
(0)
Alle Bewertungen ansehen
Inhalt The Second International Symposium on Ubiquitous Intelligence and Smart Worlds (UISW 2005).- Human Activity Recognition Bas... Weiterlesen
E-Books ganz einfach mit der kostenlosen Ex Libris-Reader-App lesen. Hier erhalten Sie Ihren Download-Link.
CHF 225.50
Download steht sofort bereit
Informationen zu E-Books
E-Books eignen sich auch für mobile Geräte (sehen Sie dazu die Anleitungen).
E-Books von Ex Libris sind mit Adobe DRM kopiergeschützt: Erfahren Sie mehr.
Weitere Informationen finden Sie hier.
Bestellung & Lieferung in eine Filiale möglich

Beschreibung

Inhalt

The Second International Symposium on Ubiquitous Intelligence and Smart Worlds (UISW 2005).- Human Activity Recognition Based on Surrounding Things.- Baton: A Service Management System for Coordinating Smart Things in Smart Spaces.- An Extensible Ubiquitous Architecture for Networked Devices in Smart Living Environments.- A World Model for Smart Spaces.- Dealing with Emotional Factors in Agent Based Ubiquitous Group Decision.- A Multi-agent Software Platform Accommodating Location-Awareness for Smart Space.- Context-Aware Ubiquitous Data Mining Based Agent Model for Intersection Safety.- Development of Knowledge-Filtering Agent Along with User Context in Ubiquitous Environment.- Application-Driven Customization of an Embedded Java Virtual Machine.- A Study on Fast JCVM with New Transaction Mechanism and Caching-Buffer Based on Java Card Objects with a High Locality.- Intelligent Object Extraction Algorithm Based on Foreground/Background Classification.- Thin Client Based User Terminal Architecture for Ubiquitous Computing Environment.- An Application Development Environment for Rule-Based I/O Control Devices.- A uWDL Handler for Context-Aware Workflow Services in Ubiquitous Computing Environments.- SMMART, a Context-Aware Mobile Marketing Application: Experiences and Lessons.- Ubiquitous Organizational Information Service Framework for Large Scale Intelligent Environments.- TS-U: Temporal-Spatial Methodology for Application Checking of the Systems in the Ubiquitous Environment.- Ubiquitous Learning on Pocket SCORM.- An Application Based on Spatial-Relationship to Basketball Defensive Strategies.- Intrinsically Motivated Intelligent Rooms.- Multivariate Stream Data Reduction in Sensor Network Applications.- Implementing a Graph Neuron Array for Pattern Recognition Within Unstructured Wireless Sensor Networks.- Building Graphical Model Based System in Sensor Networks.- Energy-Aware Broadcasting Method for Wireless Sensor Network.- Anonymous Routing in Wireless Mobile Ad Hoc Networks to Prevent Location Disclosure Attacks.- The Design and Implementation of a Location-Aware Service Bundle Manager in Smart Space Environments.- A Context-Aware and Augmented Reality-Supported Service Framework in Ubiquitous Environments.- A Smart Method of Cooperative Learning Including Distant Lectures and Its Experimental Evaluations.- u-KoMIPS: A Medical Image Processing System in a Ubiquitous Environment.- The Extended PARLAY X for an Adaptive Context-Aware Personalized Service in a Ubiquitous Computing Environment.- A Context-Aware System for Smart Home Applications.- Human Position/Height Detection Using Analog Type Pyroelectric Sensors.- ENME: An ENriched MEdia Application Utilizing Context for Session Mobility; Technical and Human Issues.- DartDataFlow: Semantic-Based Sensor Grid.- Sentient Artefacts: Acquiring User's Context Through Daily Objects.- A Multi-dimensional Model for Task Representation and Allocation in Intelligent Environments.- Norms Enforcement as a Coordination Strategy in Ubiquitous Environments.- A Java-Based RFID Service Framework with Semantic Data Binding Between Real and Cyber Spaces.- Kallima: A Tag-Reader Protocol for Privacy Enhanced RFID System.- Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFID.- iCane - A Partner for the Visually Impaired.- ORAID: An Intelligent and Fault-Tolerant Object Storage Device.- Architecture Based Approach to Adaptable Fault Tolerance in Distributed Object-Oriented Computing.- Security Analysis of Michael: The IEEE 802.11i Message Integrity Code.- A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability.- Performance Analysis of IP Micro-mobility Protocols in Single and Simultaneous Movements Scenario.- HMRP: Hierarchy-Based Multipath Routing Protocol for Wireless Sensor Networks.- On Energy-Aware Dynamic Clustering for Hierarchical Sensor Networks.- Neighbor Node Discovery Algorithm for Energy-Efficient Clustering in Ubiquitious Sensor Networks.- A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World.- The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate.- Object Reminder and Safety Alarm.- Synchronization and Recovery in an Embedded Database System for Read-Only Transactions.- Learning with Data Streams - An NNTree Based Approach.- Generating Smart Robot Controllers Through Co-evolution.- Integrated Multimedia Understanding for Ubiquitous Intelligence Based on Mental Image Directed Semantic Theory.- Hyper-Interactive Video Browsing by a Remote Controller and Hand Gestures.- Mobile Computing with MPEG-21.- A Unified Context Model: Bringing Probabilistic Models to Context Ontology.- IFIP International Symposium on Network-Centric Ubiquitous Systems (NCUS 2005).- A Component-Based Adaptive Model for Context-Awareness in Ubiquitous Computing.- Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem.- The Wrong Challenge of 'Pervasive Computing': The Paradigm of Sensor-Based Context-Awareness.- An Abstract Model for Incentive-Enhanced Trust in P2P Networks.- Construction of Credible Ubiquitous P2P Content Exchange Communities.- Location-Based Routing Protocol for Energy Efficiency in Wireless Sensor Networks.- Efficient Access of Remote Resources in Embedded Networked Computer Systems.- Lightweight Ontology-Driven Representations in Pervasive Computing.- Object Tracking Using Durative Events.- Design of Integrated Routing System for Mobile Ad Hoc Networks Overlaying Peer-to-Peer Applications.- A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access Control.- Efficient Resource Management Scheme of TCP Buffer Tuned Parallel Stream to Optimize System Performance.- Multi-level Service Differentiation Scheme for the IEEE 802.15.4 Sensor Networks.- Development of Event Manager and Its Application in Jini Environment.- On Scalability and Mobility Management of Hierarchical Large-Scale Ad Hoc Networks.- Exploring Small-World-Like Topologies Via SplitProber: Turning Power Laws into an Advantage in Unstructured Overlays.- Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 802.16 System.- A Survey of Anonymous Peer-to-Peer File-Sharing.- A Churn-Resistant Strategy for a Highly Reliable P2P System.- Building a Peer-to-Peer Overlay for Efficient Routing and Low Maintenance.- Dynamic Object Assignment in Object-Based Storage Devices.- Dynamic Resource Discovery for Sensor Networks.- Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services.- Predicate Detection Using Event Streams in Ubiquitous Environments.- The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 2005).- Image Watermarking Technique Based on Two-Dimensional Chaotic Stream Encryption.- Identity-Based Universal Designated Verifier Signatures.- Short Designated Verifier Proxy Signature from Pairings.- An Embedded Gateway Based on Real-Time Database.- Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks.- Collision Attack on XTR and a Countermeasure with a Fixed Pattern.- Security in Persistently Reactive Systems.- ID-Based Access Control and Authority Delegations.- How to Construct Secure Cryptographic Location-Based Services.- A Key Management Scheme for Mobile Ad Hoc Networks Based on Threshold Cryptography for Providing Fast Authentication and Low Signaling Load.- Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow.- Authenticated Public Key Distribution Scheme Without Trusted Third Party.- Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004.- Efficient RFID Authentication Protocol for Ubiquitous Computing Environment.- A New Simple Authenticated Key Agreement and Protected Password Change Protocol.- A Method for Deciding Quantization Steps in QIM Watermarking Schemes.- A New DDoS Detection Model Using Multiple SVMs and TRA.- PPF Model with CTNT to Defend Web Server from DDoS Attack.- Efficient Key Agreement for Merging Clusters in Ad-Hoc Networking Environments.- An Effective Method for Location Privacy in Ubiquitous Computing.- Integrated Support for Location Aware Security Services in Enterprise Wireless Networks.- The 1st International Workshop on RFID and Ubiquitous Sensor Networks (USN 2005).- Optimal Scheduling for Networks of RFID Readers.- PULSE: A MAC Protocol for RFID Networks.- RFIDcover - A Coverage Planning Tool for RFID Networks with Mobile Readers.- Vibration Powered Battery-Assisted Passive RFID Tag.- Wireless RFID Networks for Real-Time Customer Relationship Management.- Tree-Based Classification Algorithm for Heterogeneous Unique Item ID Schemes.- An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks.- Energy-Driven Adaptive Clustering Hierarchy (EDACH) for Wireless Sensor Networks.- A Load-Balancing and Energy-Aware Clustering Algorithm in Wireless Ad-Hoc Networks.- Energy-Efficient Cluster Reconfiguration with Fair Cluster Formations in Sensor Networks.- Virtual Sink Rotation: Low-Energy Scalable Routing Protocol for Ubiquitous Sensor Networks.- FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions.- Power-Aware Position Vector Routing for Wireless Sensor Networks.- Multicast Routing with Minimum Energy Cost and Minimum Delay in Wireless Sensor Networks.- Self Location Estimation Scheme Using ROA in Wireless Sensor Networks.- Energy-Efficient Target Localization Based on a Prediction Model.- Reducing Congestion in Real-Time Multi-party-tracking Sensor Network Applications.- Variable-Radii Method Based on Probing Mechanism (VRPM): An Energy Conservation Method for Wireless Active Sensor Networks.- The International Workshop on Trusted and Autonomic Ubiquitous and Embedded Systems (TAUES 2005).- Automata-Theoretic Performance Analysis Method of Soft Real-Time Systems.- A Component-based Architecture for an Autonomic Middleware Enabling Mobile Access to Grid Infrastructure.- Autonomic Agents for Survivable Security Systems.- Towards Formal Specification and Generation of Autonomic Policies.- Intrusion Detection with CUSUM for TCP-Based DDoS.- A Digital Content Distribution Using a Group-key and Multi-layered Structure Based on Web.- Access Policy Sheet for Access Control in Fine-Grained XML.- Monitoring the Health Condition of a Ubiquitous System: Rejuvenation vs. Recovery.- A Dependability Management Mechanism for Ubiquitous Computing Systems.- Reassignment Scheme of an RFID Tag's Key for Owner Transfer.

Produktinformationen

Titel: Embedded and Ubiquitous Computing - EUC 2005 Workshops
Untertitel: EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 8-9, 2005
Editor:
EAN: 9783540322962
Digitaler Kopierschutz: Wasserzeichen
Format: E-Book (pdf)
Hersteller: Springer Berlin Heidelberg
Genre: Betriebssysteme
Anzahl Seiten: 1317
Veröffentlichung: 25.11.2005
Dateigrösse: 25.9 MB

Weitere Bände aus der Buchreihe "Lecture Notes in Computer Science"