CHF225.90
Download steht sofort bereit
Inhalt
The Second International Symposium on Ubiquitous Intelligence and Smart Worlds (UISW 2005).- Human Activity Recognition Based on Surrounding Things.- Baton: A Service Management System for Coordinating Smart Things in Smart Spaces.- An Extensible Ubiquitous Architecture for Networked Devices in Smart Living Environments.- A World Model for Smart Spaces.- Dealing with Emotional Factors in Agent Based Ubiquitous Group Decision.- A Multi-agent Software Platform Accommodating Location-Awareness for Smart Space.- Context-Aware Ubiquitous Data Mining Based Agent Model for Intersection Safety.- Development of Knowledge-Filtering Agent Along with User Context in Ubiquitous Environment.- Application-Driven Customization of an Embedded Java Virtual Machine.- A Study on Fast JCVM with New Transaction Mechanism and Caching-Buffer Based on Java Card Objects with a High Locality.- Intelligent Object Extraction Algorithm Based on Foreground/Background Classification.- Thin Client Based User Terminal Architecture for Ubiquitous Computing Environment.- An Application Development Environment for Rule-Based I/O Control Devices.- A uWDL Handler for Context-Aware Workflow Services in Ubiquitous Computing Environments.- SMMART, a Context-Aware Mobile Marketing Application: Experiences and Lessons.- Ubiquitous Organizational Information Service Framework for Large Scale Intelligent Environments.- TS-U: Temporal-Spatial Methodology for Application Checking of the Systems in the Ubiquitous Environment.- Ubiquitous Learning on Pocket SCORM.- An Application Based on Spatial-Relationship to Basketball Defensive Strategies.- Intrinsically Motivated Intelligent Rooms.- Multivariate Stream Data Reduction in Sensor Network Applications.- Implementing a Graph Neuron Array for Pattern Recognition Within Unstructured Wireless Sensor Networks.- Building Graphical Model Based System in Sensor Networks.- Energy-Aware Broadcasting Method for Wireless Sensor Network.- Anonymous Routing in Wireless Mobile Ad Hoc Networks to Prevent Location Disclosure Attacks.- The Design and Implementation of a Location-Aware Service Bundle Manager in Smart Space Environments.- A Context-Aware and Augmented Reality-Supported Service Framework in Ubiquitous Environments.- A Smart Method of Cooperative Learning Including Distant Lectures and Its Experimental Evaluations.- u-KoMIPS: A Medical Image Processing System in a Ubiquitous Environment.- The Extended PARLAY X for an Adaptive Context-Aware Personalized Service in a Ubiquitous Computing Environment.- A Context-Aware System for Smart Home Applications.- Human Position/Height Detection Using Analog Type Pyroelectric Sensors.- ENME: An ENriched MEdia Application Utilizing Context for Session Mobility; Technical and Human Issues.- DartDataFlow: Semantic-Based Sensor Grid.- Sentient Artefacts: Acquiring User's Context Through Daily Objects.- A Multi-dimensional Model for Task Representation and Allocation in Intelligent Environments.- Norms Enforcement as a Coordination Strategy in Ubiquitous Environments.- A Java-Based RFID Service Framework with Semantic Data Binding Between Real and Cyber Spaces.- Kallima: A Tag-Reader Protocol for Privacy Enhanced RFID System.- Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFID.- iCane - A Partner for the Visually Impaired.- ORAID: An Intelligent and Fault-Tolerant Object Storage Device.- Architecture Based Approach to Adaptable Fault Tolerance in Distributed Object-Oriented Computing.- Security Analysis of Michael: The IEEE 802.11i Message Integrity Code.- A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability.- Performance Analysis of IP Micro-mobility Protocols in Single and Simultaneous Movements Scenario.- HMRP: Hierarchy-Based Multipath Routing Protocol for Wireless Sensor Networks.- On Energy-Aware Dynamic Clustering for Hierarchical Sensor Networks.- Neighbor Node Discovery Algorithm for Energy-Efficient Clustering in Ubiquitious Sensor Networks.- A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World.- The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate.- Object Reminder and Safety Alarm.- Synchronization and Recovery in an Embedded Database System for Read-Only Transactions.- Learning with Data Streams - An NNTree Based Approach.- Generating Smart Robot Controllers Through Co-evolution.- Integrated Multimedia Understanding for Ubiquitous Intelligence Based on Mental Image Directed Semantic Theory.- Hyper-Interactive Video Browsing by a Remote Controller and Hand Gestures.- Mobile Computing with MPEG-21.- A Unified Context Model: Bringing Probabilistic Models to Context Ontology.- IFIP International Symposium on Network-Centric Ubiquitous Systems (NCUS 2005).- A Component-Based Adaptive Model for Context-Awareness in Ubiquitous Computing.- Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem.- The Wrong Challenge of 'Pervasive Computing': The Paradigm of Sensor-Based Context-Awareness.- An Abstract Model for Incentive-Enhanced Trust in P2P Networks.- Construction of Credible Ubiquitous P2P Content Exchange Communities.- Location-Based Routing Protocol for Energy Efficiency in Wireless Sensor Networks.- Efficient Access of Remote Resources in Embedded Networked Computer Systems.- Lightweight Ontology-Driven Representations in Pervasive Computing.- Object Tracking Using Durative Events.- Design of Integrated Routing System for Mobile Ad Hoc Networks Overlaying Peer-to-Peer Applications.- A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access Control.- Efficient Resource Management Scheme of TCP Buffer Tuned Parallel Stream to Optimize System Performance.- Multi-level Service Differentiation Scheme for the IEEE 802.15.4 Sensor Networks.- Development of Event Manager and Its Application in Jini Environment.- On Scalability and Mobility Management of Hierarchical Large-Scale Ad Hoc Networks.- Exploring Small-World-Like Topologies Via SplitProber: Turning Power Laws into an Advantage in Unstructured Overlays.- Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 802.16 System.- A Survey of Anonymous Peer-to-Peer File-Sharing.- A Churn-Resistant Strategy for a Highly Reliable P2P System.- Building a Peer-to-Peer Overlay for Efficient Routing and Low Maintenance.- Dynamic Object Assignment in Object-Based Storage Devices.- Dynamic Resource Discovery for Sensor Networks.- Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services.- Predicate Detection Using Event Streams in Ubiquitous Environments.- The First International Workshop on Security in Ubiquitous Computing Systems (SecUbiq 2005).- Image Watermarking Technique Based on Two-Dimensional Chaotic Stream Encryption.- Identity-Based Universal Designated Verifier Signatures.- Short Designated Verifier Proxy Signature from Pairings.- An Embedded Gateway Based on Real-Time Database.- Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks.- Collision Attack on XTR and a Countermeasure with a Fixed Pattern.- Security in Persistently Reactive Systems.- ID-Based Access Control and Authority Delegations.- How to Construct Secure Cryptographic Location-Based Services.- A Key Management Scheme for Mobile Ad Hoc Networks Based on Threshold Cryptography for Providing Fast Authentication and Low Signaling Load.- Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow.- Authenticated Public Key Distribution Scheme Without Trusted Third Party.- Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004.- Efficient RFID Authentication Protocol for Ubiquitous Computing Environment.- A New Simple Authenticated Key Agreement and Protected Password Change Protocol.- A Method for Deciding Quantization Steps in QIM Watermarking Schemes.- A New DDoS Det…