


default search action
EUC Workshops 2007: Taipei, Taiwan
- Mieso K. Denko, Chi-Sheng Shih, Kuan-Ching Li, Shiao-Li Tsao, Qing-An Zeng, Soo-Hyun Park, Young-Bae Ko, Shih-Hao Hung

, Jong Hyuk Park:
Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings. Lecture Notes in Computer Science 4809, Springer 2007, ISBN 978-3-540-77089-3
Trustworthiness, Reliability and Services in Ubiquitous and Sensor Networks
- Firdous Kausar

, Sajid Hussain, Tai-Hoon Kim, Ashraf Masood:
Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks. 1-11 - Maria Karyda, Stefanos Gritzalis, Jong Hyuk Park:

A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions. 12-21 - Hangbae Chang, Moonoh Kim, Hyuk-Jun Kwon, Byungwan Han:

The Case Study of Information Security System for International Airports. 22-30 - Toshikazu Uemura, Tadashi Dohi:

Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-Markov Cost Models. 31-42 - Nai-Wei Lo, Kuo-Hui Yeh:

An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. 43-56 - Yuanchu Hwang, Soe-Tsyr Yuan:

UPS - An Ubiquitous Proximity eService for Trust Collaboration. 57-68 - Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, Anne Anderson:

Obligations for Privacy and Confidentiality in Distributed Transactions. 69-81 - YongSuk Lee, WoongChul Choi, SukJoong Kang, Seongje Cho:

Multi-channel Enhancements for IEEE 802.11-Based Multi-hop Ad-Hoc Wireless Networks. 82-92 - Sukhoon Kang, Seokhoon Bae:

An Intelligent Event-Driven Interface Agent for Interactive Digital Contents in Ubiquitous Environments. 93-102 - YingZhi Zeng, Baokang Zhao, Jinshu Su, Xia Yan, Zili Shao:

A Loop-Based Key Management Scheme for Wireless Sensor Networks. 103-114 - Chaoguang Men, Yongqian Lu, Dongsheng Wang:

A MAC Protocol with Little Idle Listening for Wireless Sensor Networks. 115-123 - Geon Woo Kim, Deok-Gyu Lee, Jong Wook Han, Sang Wook Kim:

Security Technologies Based on Home Gateway for Making Smart Home Secure. 124-135 - Sheng-De Wang, Zheng Yi Huang:

Layered Peer to Peer Streaming Using Hidden Markov Models. 136-145 - Jinkeun Hong, Kihong Kim:

Optimum Power Controller for Random Number Generator in the Crypto Module of Ubiquitous Computing Environment. 146-157 - Shunshan Piao, Jeongmin Park, Eunseok Lee:

Problem Localization for Automated System Management in Ubiquitous Computing. 158-168
System and Software for Wireless SoC
- Anand Mohan, Aladin Zayegh, Aleksandar Stojcevski:

A High Speed Analog to Digital Converter for Ultra Wide Band Applications. 169-180 - Hai-Wei Wang, David W. Lin, Kun-Chien Hung, Youn-Tai Lee:

Design and DSP Software Implementation of Mobile WiMAX Baseband Transceiver Functions. 181-192 - Li-chuan Tseng, Kuan-yin Chen

, ChingYao Huang:
Cross-Layer Design for IEEE 802.16-2005 System Using Platform-Based Methodologies. 193-204 - Shiann-Tsong Sheu, Chih-Cheng Yang, Hsu-Sheng Chang:

A Dynamic Frequency Allocation Scheme for IEEE 802.16 OFDMA-Based WMANs Using Hungary Algorithm. 205-214 - Li-Der Chou, Shih-Yao Cheng, Chien-Yi Li, Shing-Kuang Chen:

Wireless Network Management System for WiMAX / Wi-Fi Mesh Networks. 215-225 - Chang-Yang Ho, Hsi-Lu Chao:

An Implementation of QoS Framework for Heterogeneous Networks. 226-236 - Yu-Kai Huang, Sze-Wei Huang, Ai-Chun Pang:

An Energy-Efficient MAC Design for IEEE 802.15.4-Based Wireless Sensor Networks. 237-248 - Yung-Chien Shih, Kai-Cheng Hsu, Chien-Chao Tseng

:
A Cross-Layer Signaling and Middleware Platform for Multi-interface Mobile Devices. 249-260 - Sixian Zheng, Kuochen Wang, Shiao-Li Tsao, Pochun Lin:

Enhanced Sleep Mode Operations for Energy Saving in IEEE 802.16e. 261-272 - Wilson M. Yeung, Junyang Zhou

, Joseph K. Ng:
Enhanced Fingerprint-Based Location Estimation System in Wireless LAN Environment. 273-284 - Shiao-Li Tsao, Ya-Lien Cheng:

Improving Channel Scanning Procedures for WLAN Handoffs. 285-296
Network Centric Ubiquitous Systems
- Chun-Chuan Yang, Jeng-Yueng Chen, Li-Sheng Yu:

A Multicast Extension for Enhanced Mobile IP by Home Agent Handover. 297-308 - Merdan Atajanov, Toshihiko Shimokawa, Norihiko Yoshida:

Autonomic Multi-server Distribution in Flash Crowds Alleviation Network. 309-320 - Chao-Lieh Chen, Jeng-Wei Lee, Cheng-Zh Lin, Yi-Tsung Chen, Jar-Shone Ker, Yau-Hwang Kuo:

Generic Energy-Efficient Geographic Routing for Ad-Hoc Wireless Networks. 321-332 - Yu Song, Qi Chen:

Description of a New Feature Meta-model. 333-340 - Zhipeng Tan, Dan Feng, Fei He, Ke Zhou:

Studying of Multi-dimensional Based Replica Management in Object Storage System. 341-354 - Takashi Kinoshima, Kazutaka Kobayashi, Nurul Azma Zakaria

, Masahiro Kimura, Noriko Matsumoto, Norihiko Yoshida:
Communication Model Exploration for Distributed Embedded Systems and System Level Interpretations. 355-364 - Ing-Chau Chang, Shi-Feng Chen:

An End-to-End QoS Adaptation Architecture for the Integrated IntServ and DiffServ Networks. 365-376 - Mianxiong Dong

, Kaoru Ota
, Minyi Guo, Zixue Cheng:
Ubiquitous Laboratory: A Research Support Environment for Ubiquitous Learning Based on Sensor Networks. 377-388 - Senol Zafer Erdogan, Sajid Hussain, Jong Hyuk Park:

Intelligent Monitoring Using Wireless Sensor Networks. 389-400 - Junn-Yen Hu, Cheng-Fu Chou, Min-Shi Sha, Ing-Chau Chang, Chung-Yi Lai:

On the Design of Micro-mobility for Mobile Network. 401-412 - Chih-Cheng Hsu, Ming-Hung Chen, Cheng-Fu Chou, Wei-Chieh Chi, Chung-Yi Lai:

ANSWER: Adaptive Network Selection in WLAN/UMTS EnviRonment. 413-424 - Hyoungshick Kim, S. Jae Oh:

Self-authorized Public Key Management for Home Networks. 425-434 - Pang-Chieh Wang, Yi-Hsuan Hung, Ting-Wei Hou:

A Cross-Layered Diagnostician in OSGi Platform for Home Network. 435-444
Ubiquitous Underwater Acoustic-Sensor Network
- Eunchan Kim, Seok Woo, Chungsan Kim, Kiseon Kim:

LaMSM: Localization Algorithm with Merging Segmented Maps for Underwater Sensor Networks. 445-454 - Phil-Jung Yun, Changhwa Kim, Sangkyung Kim, Seungjae Lee

, Yong-Man Cho:
TinyOS-Based Gateway for Underwater Acoustics/Radio Frequency Communication. 455-466 - Yong-Man Cho, Seungjae Lee

, Changhwa Kim, Sangkyung Kim:
An Energy Scheduling Algorithm for Ensuring the Pre-determined Lifetime in Sensor Network. 467-473 - Dale Green:

Underwater Acoustic Communication and Modem-Based Navigation Aids. 474-481 - Hung Trong Nguyen, Soo Young Shin, Soo-Hyun Park:

State-of-the-Art in MAC Protocols for Underwater Acoustics Sensor Networks. 482-493 - Heungwoo Nam, Sunshin An:

An Ultrasonic Sensor Based Low-Power Acoustic Modem for Underwater Communication in Underwater Wireless Sensor Networks. 494-504 - Soo Young Shin, Soo-Hyun Park:

UWA-NAV - Energy Efficient Error Control Scheme for Underwater Acoustic Sensor Network. 505-514 - Seung-Yong Chun, Se-Young Kim, Ki-Man Kim:

Underwater Wideband Source Localization Using the Interference Pattern Matching. 515-522 - Seungjae Lee

, Changhwa Kim, Sangkyung Kim:
A New Virtual Select Database Operation for Wireless Sensor Networks. 523-530 - Soo Young Shin, Soo-Hyun Park:

GT2 - Reduced Wastes Time Mechanism for Underwater Acoustic Sensor Network. 531-537
RFID and Ubiquitous Sensor Networks
- Jihoon Choi, Wonjun Lee:

Comparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks. 538-549 - Hui-Feng Huang:

An Efficient Mutual Authentication Protocol on RFID Tags. 550-556 - JaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd:

HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System. 557-567 - Youngsoo Kim, Daeyoung Kim, Taehong Kim

, Jongwoo Sung, Seongeun Yoo:
Target Classification in Sparse Sampling Acoustic Sensor Networks Using IDDC Algorithm. 568-578 - Thomas Haenselmann, Thomas King, Marcel Busse, Wolfgang Effelsberg, Markus Fuchs:

Scriptable Sensor Network Based Home-Automation. 579-591 - Su Te Lei, Kang Zhang, Edwin Hsing-Mean Sha:

Applying Situation Awareness to Mobile Proactive Information Delivery. 592-603
Embedded Software Optimization
- Yung-Hen Lee, Jian-Jia Chen

, Tei-Wei Kuo
:
Energy-Efficiency on a Variable-Bitrate Device. 604-616 - Ming-Haw Jing, Jian-Hong Chen, Zih-Heng Chen, Yaotsu Chang:

The Secure DAES Design for Embedded System Application. 617-626 - Matthias Grumer, Manuel Wendt, Stefan Lickl, Christian Steger

, Reinhold Weiss, Ulrich Neffe, Andreas Mühlberger:
Software Power Peak Reduction on Smart Card Systems Based on Iterative Compiling. 627-637 - Wei-Ting Yen, Shih-Hsu Huang, Chun-Hua Cheng:

Simultaneous Operation Scheduling and Operation Delay Selection to Minimize Cycle-by-Cycle Power Differential. 638-647 - Kai-chao Yao:

A Simple Approach to Robust Optimal Pole Assignment of Decentralized Stochastic Singularly-Perturbed Computer Controlled Systems. 648-659 - Binoy Ravindran

, Edward Curley, Jonathan Stephen Anderson, E. Douglas Jensen:
Assured-Timeliness Integrity Protocols for Distributable Real-Time Threads with in Dynamic Distributed Systems. 660-673 - Augustin Kebemou, Ina Schieferdecker:

Evaluating Modeling Solutions on Their Ability to Support the Partitioning of Automotive Embedded Systems. 674-685
Security in Ubiquitous Computing
- Je Hong Park, Bo Gyeong Kang:

Security Analysis of the Certificateless Signature Scheme Proposed at SecUbiq 2006. 686-691 - Lei Zhang, Futai Zhang, Fangguo Zhang

:
New Efficient Certificateless Signature Scheme. 692-703 - Zhu Wang, Huiyan Chen:

A Practical Identity-Based Signature Scheme from Bilinear Map. 704-715 - Dong Zheng, Xiangxue Li, Kefei Chen, Jianhua Li:

Linkable Ring Signatures from Linear Feedback Shift Register. 716-727 - Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei:

A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem. 728-744 - Firdous Kausar

, Sajid Hussain, Jong Hyuk Park, Ashraf Masood:
A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks. 745-757 - Eun-Jun Yoon, Kee-Young Yoo:

Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. 758-769 - Ping Li, Yaping Lin, Jiaying Wu:

Two Approaches on Pairwise Key Path Establishment for Sensor Networks. 770-780 - Pedro Peris-Lopez

, Julio César Hernández Castro, Juan M. Estévez-Tapiador
, Arturo Ribagorda:
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. 781-794 - JaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd:

Low-Cost and Strong-Security RFID Authentication Protocol. 795-807 - Ilsun You:

A Ticket Based Binding Update Authentication Method for Trusted Nodes in Mobile IPv6 Domain. 808-819

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














