1. Adventsüberraschung: 10% Rabatt auf alle Filme! Jetzt mehr erfahren.
Willkommen, schön sind Sie da!
Logo Ex Libris

Emerging Directions in Embedded and Ubiquitous Computing

  • Kartonierter Einband
  • 1034 Seiten
(0) Erste Bewertung abgeben
Alle Bewertungen ansehen
Here are the refereed proceedings of the EUC 2006 workshops, held in conjunction with the IFIP International Conference on Embedde... Weiterlesen
CHF 223.00
Exemplar wird für Sie besorgt.
Kein Rückgaberecht!
Bestellung & Lieferung in eine Filiale möglich


Here are the refereed proceedings of the EUC 2006 workshops, held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Computing in Seoul, Korea, August 2006.

The book presents 102 revised papers spanning six workshops: network-centric ubiquitous systems (NCUS 2006), security in ubiquitous computing systems (SecUbiq 2006), RFID and ubiquitous sensor networks (USN 2006), trustworthiness, reliability and services in ubiquitous and sensor networks (TRUST 2006), embedded software optimization (ESO 2006), and multimedia solution and assurance in ubiquitous information systems (MSA 2006).

Proceedings of the EUC 2006 workshops, held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Computing

Presents 102 revised full papers, covering six workshops in the conference

Covers network-centric ubiquitous systems ; security in ubiquitous computing systems; RFID and ubiquitous sensor networks; trustworthiness, reliability and services in ubiquitous and sensor networks; embedded software optimization; and multimedia solution and assurance in ubiquitous information systems

NCUS 2006 Symposium.- Adaptive Router Promotion in Ad-Hoc Networks.- A Utility-Based Auction Cooperation Incentive Mechanism in Peer-to-Peer Networks.- UbiqStor: Server and Proxy for Remote Storage of Mobile Devices.- Packet Length Adaptation for Energy-Proportional Routing in Clustered Sensor Networks.- A New Context Script Language for Developing Context-Aware Application Systems in Ubiquitous Computing.- Dynamic Replication Strategies for Object Storage Systems.- A Cost-Effective Mobility Modelling in Nested Network Mobility.- Completing UML Model of Component-Based System with Middleware for Performance Evaluation.- Energy Efficient PNC Selection Procedure for the IEEE 802.15.3-Based HR-WPAN.- An Efficient Multicast Routing Protocol in Multi-rate Wireless Ad Hoc Networks.- WPAN Platform Design in Handset Integrating Cellular Network and Its Application to Mobile Games.- Reliable Transporting and Optimal Routing on Rate-Based for Ad Hoc Networks.- Automatic Extraction of Conversation Protocols from a Choreography Specification of Ubiquitous Web Services.- Inter-sector Interference Mitigation Method in Triple-Sectored OFDMA Systems.- File Correspondences Dictionary Construction in Multilingual P2P File Sharing Systems.- Lightweight Messages: True Zero-Copy Communication for Commodity Gigabit Ethernet.- Evaluation of Models for Analyzing Unguided Search in Unstructured Networks.- Wapee: A Fault-Tolerant Semantic Middleware in Ubiquitous Computing Environments.- Security in P2P Networks: Survey and Research Directions.- HYWINMARC: An Autonomic Management Architecture for Hybrid Wireless Networks.- Prediction Efficiency in Predictive p-CSMA/CD.- A Situation Aware Personalization in Ubiquitous Mobile Computing Environments.- A Network and Data Link Layer QoS Model to Improve Traffic Performance.- A GML-Based Mobile Device Trace Monitoring System.- Impact of High-Mobility Radio Jamming in Large-Scale Wireless Sensor Networks.- SecUbiq 2006 Workshop.- A Scalable and Untraceable Authentication Protocol for RFID.- Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005.- Reliable Broadcast Message Authentication in Wireless Sensor Networks.- Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks.- A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks.- Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol.- Ubiquitous Authorization Scheme Based on Device Profile.- An Efficient Certificateless Signature Scheme.- Universal Designated Verifier Ring Signature (Proof) Without Random Oracles.- An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings.- A Strong Identity Based Key-Insulated Cryptosystem.- A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE.- Energy Comparison of AES and SHA-1 for Ubiquitous Computing.- USN 2006 Workshop.- Performance Analysis of Tag Anti-collision Algorithms for RFID Systems.- Perturbative Time and Frequency Allocations for RFID Reader Networks.- An Enhanced Dynamic Framed Slotted ALOHA Anti-collision Algorithm.- DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers.- Design and Implementation of a High-Speed RFID Data Filtering Engine.- Authorized Tracking and Tracing for RFID Tags.- An Energy-Efficient MAC Protocol for Delay-Sensitive Wireless Sensor Networks.- A Data-Centric Self-organization Scheme for Energy-Efficient Wireless Sensor Networks.- Optimized Clustering for Maximal Lifetime of Wireless Sensor Networks.- Maximize the Coverage Lifetime of Sensor Networks.- An Active Tracking System Using IEEE 802.15.4-Based Ultrasonic Sensor Devices.- LWOS: A Localization Method Without On-Body Sensor in Wireless Sensor Networks.- TRUST 2006 Workshop.- Research Directions in the Area of USN (Ubiquitous Sensor Network) Towards Practical UE (Ubiquitous Environments).- On Building a Lightweight Security Architecture for Sensor Networks.- A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks.- Algorithms for Service Differentiation in MAC Layer over MANETs.- A Power-Aware Routing Protocol Using Multi-Route Transmission for Mobile Ad Hoc Networks.- A Novel Multicasting Scheme over Wireless LAN Systems by Using Relay.- An Adaptive Concurrency Control QOS Agent for Ubiquitous Computing Environments.- An Efficient End-to-End QoS Supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-Back for Ubiquitous and Distributed Applications.- An RFID System Based MCLT System with Improved Privacy.- QT-CBP: A New RFID Tag Anti-collision Algorithm Using Collision Bit Positioning.- An RFID-Based Access and Location Service for Pervasive Grids.- Autonomous Management of Large-Scale Ubiquitous Sensor Networks.- A Privacy-Aware Service Protocol for Ubiquitous Computing Environments.- A Neural Network Model for Detection Systems Based on Data Mining and False Errors.- An Analysis on the Web Technologies for Dynamically Generating Web-Based User Interfaces in Ubiquitous Spaces.- A Policy Description Language for Context-Based Access Control and Adaptation in Ubiquitous Environment.- C-iUMS: Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous Home.- A Lightweight IP Traceback Mechanism on IPv6.- Enable a Trustworthy Network by Source Address Spoofing Prevention Routers: A Formal Description.- A Flexible Bound Admission Control Algorithm for Vertical Handover in Ubiquitous Environment.- Network Probabilistic Connectivity: Using Node Cuts.- Fast Mounting and Recovery for NAND Flash Memory Based Embedded Systems.- Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments.- A Robust Verifiably Encrypted Signature Scheme.- ESO 2006 Workshop.- Instruction Re-selection for Iterative Modulo Scheduling on High Performance Multi-issue DSPs.- Predictability of Least Laxity First Scheduling Algorithm on Multiprocessor Real-Time Systems.- Saving Register-File Leakage Power by Monitoring Instruction Sequence in ROB.- Run-Time Memory Optimization for DDMB Architecture Through a CCB Algorithm.- Code Generation and Optimization for Java-to-C Compilers.- Modelling and Analysis of Power Consumption for Component-Based Embedded Software.- Design of a Programmable Vertex Processing Unit for Mobile Platforms.- An Energy-Aware Whole-System Dynamic Emulator SkyEye.- Optimizing Scheduling Stability for Runtime Data Alignment.- A Chinese Mobile Phone Input Method Based on the Dynamic and Self-study Language Model.- An ID-Based Watermarking Scheme for Java Programs.- Data-Layout Optimization Using Reuse Distance Distribution.- Co-optimization of Performance and Power in a Superscalar Processor Design.- FAST: An Efficient Flash Translation Layer for Flash Memory.- A Novel Discrete Hopfield Neural Network Approach for Hardware-Software Partitioning of RTOS in the SoC.- UML Based Evaluation of Reconfigurable Shape Adaptive DCT for Embedded Stream Processing.- A High Performance Buffering of Java Objects for Java Card Systems with Flash Memory.- MSA 2006 Workshop.- Predictive Prefetching of Context-Aware Information in Mobile Networks.- Digital Ortho-image Production for Web GIS Applications.- Multimedia Contents Security by Wireless Authentication.- Traffic Actuated Car Navigation Systems in Mobile Communication Networks.- Analytic Model of the Collision Resolution Protocol with Voice/Data in Mobile Networks.- Security Enhancement by Detecting Network Address Translation Based on Instant Messaging.- A New Authentication Scheme of Binding Update Protocol on Handover in Mobile IPv6 Networks.- A Solution for the Dropout Problem in Adaptive Cruise Control Range Sensors.- An Architecture Framework for Measuring and Evaluating Packet-Switched Voice.- HOIDS-Based Detection Method of Vicious Event in Large Networks.- New Handoff Control Method Using Fuzzy Multi-Criteria Decision Making in Micro/Pico-cellular Networks.- Test of IR-DSRC in Measuring Vehicle Speed for ITS Applications.- A Grid Routing Scheme Considering Node Lifetime in Ubiquitous Sensor Networks.


Titel: Emerging Directions in Embedded and Ubiquitous Computing
Untertitel: EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings
EAN: 9783540368502
ISBN: 978-3-540-36850-2
Format: Kartonierter Einband
Herausgeber: Springer, Berlin
Genre: Informatik
Anzahl Seiten: 1034
Gewicht: 1575g
Größe: H59mm x B235mm x T151mm
Jahr: 2006
Untertitel: Englisch
Auflage: 2006

Weitere Produkte aus der Reihe "Lecture Notes in Computer Science"