


default search action
EUC 2010: Hong Kong, China
- IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, EUC 2010, Hong Kong, China, 11-13 December 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4322-2

Embedded Systems Software and Optimization
- Farzad Samie Ghahfarokhi, Alireza Ejlali:

Schedule Swapping: A Technique for Temperature Management of Distributed Embedded Systems. 1-6 - Mu-Youl Lee, Hyun-Wook Jin:

User-Level Network Protocol Stacks for Automotive Infotainment Systems. 7-14 - Yann-Hang Lee, Young Wn Song, Rohit Girme, Sagar Zaveri, Yan Chen:

Replay Debugging for Multi-threaded Embedded Software. 15-22 - Peijie Yu, Mingyuan Xia, Qian Lin, Min Zhu

, Shang Gao, Zhengwei Qi, Kai Chen, Haibing Guan:
Real-time Enhancement for Xen Hypervisor. 23-30
Embedded Systems and Hardware/Software Co-Design
- Reinhard Schneider, Unmesh D. Bordoloi, Dip Goswami, Samarjit Chakraborty

:
Optimized Schedule Synthesis under Real-Time Constraints for the Dynamic Segment of FlexRay. 31-38 - Thilo Pionteck

, Steffen Sammann, Carsten Albrecht:
Optimizing Runtime Reconfiguration Decisions. 39-46 - Jian Wang, Joar Sohl, Dake Liu:

Architectural Support for Reducing Parallel Processing Overhead in an Embedded Multiprocessor. 47-52 - Huang-Jia Cheng, Yuan-Shin Hwang, Rong-Guey Chang, Cheng-Wei Chen:

Trading Conditional Execution for More Registers on ARM Processors. 53-59 - Brahim Hamid

, Adel Ziani:
An Environment for Design Software and Hardware Aspects of Clock Synchronization and Communication in DRTES. 60-67 - Per Karlström, Wenbiao Zhou, Dake Liu:

Implementation of a Floating Point Adder and Subtracter in NoGAP, A Comparative Case Study. 68-72 - Marc Zeller, Gereon Weiss, Dirk Eilers, Rudi Knorr:

Co-Simulation of Self-Adaptive Automotive Embedded Systems. 73-80
Middleware for Ubiquitous and Autonomous Computing
- Biao Zhang, Beihong Jin, Haibiao Chen, Ziyuan Qin:

Empirical Evaluation of Content-based Pub/Sub Systems over Cloud Infrastructure. 81-88 - Seong Hoon Kim, Daeyoung Kim, Jeong Seok Kang, Hong Seong Park:

A Reflective Service Gateway for Integrating Evolvable Sensor-Actuator Networks with Pervasive Infrastructure. 89-96 - Joel Gonçalves, Luis Lino Ferreira

, Luís Miguel Pinho
, Guilherme D. Silva:
Handling Mobility on a QoS-Aware Service-based Framework for Mobile Systems. 97-104 - Rolf Kiefhaber, Benjamin Satzger, Julia Schmitt, Michael Roth, Theo Ungerer:

Trust Measurement Methods in Organic Computing Systems by Direct Observation. 105-111
Mobile and Context-aware Computing
- Jonathan Cazalas, Ratan K. Guha:

GEDS: GPU Execution of Continuous Queries on Spatio-Temporal Data Streams. 112-119 - Yong-Jae Lee, Jaehyoung Lim, Soon J. Hyun, Dongman Lee:

Rule-based Approach for Context Inconsistency Management Scheme in Ubiquitous Computing. 120-126 - Xiang Su, Jukka Riekki

:
Transferring Ontologies between Mobile Devices and Knowledge-Based Systems. 127-135 - Jianping Yu, Yu Huang, Jiannong Cao

, XianPing Tao:
Middleware Support for Context-awareness in Asynchronous Pervasive Computing Environments. 136-143
Cyber-Physical Systems and the Internet of Things
- Minyoung Kim, Mark-Oliver Stehr, Jinwoo Kim, Soonhoi Ha:

An Application Framework for Loosely Coupled Networked Cyber-Physical Systems. 144-153 - Yiyang Zhao, Shing-Chi Cheung

, Lionel M. Ni:
LocaToR: Locating Passive RFID Tags with the Relative Neighborhood Graph. 154-161 - Weifeng Hou, Di Hou, Juan Chen:

An OSGi Based RFID Complex Event Processing System. 162-169
Power-Aware Computing
- Jiayin Li, Meikang Qiu, Jianwei Niu

, Tianzhou Chen, Yongxin Zhu:
Real-Time Constrained Task Scheduling in 3D Chip Multiprocessor to Reduce Peak Temperature. 170-176 - Junzhao Du, Lei Mao, Hui Liu, Bo Wu, Deke Guo:

Improving the Accuracy of Object Tracking in Three Dimensional WSNs Using Bayesian Estimation Methods. 177-183 - Muhammad Khurram Bhatti, Cécile Belleudy, Michel Auguin:

Power Management in Real Time Embedded Systems through Online and Adaptive Interplay of DPM and DVFS Policies. 184-191 - Wan Yeon Lee, Hyung Goo Paek, Jeong-Mo Yeo, Kyong Hoon Kim:

A Connection-assured Many-to-one Communication of Wireless Sensors with Two Transmission Ranges. 192-199
Sensor Networks
- Muhammad Imran, Mohamed F. Younis, Abas Md Said, Halabi Hasbullah:

Partitioning Detection and Connectivity Restoration Algorithm for Wireless Sensor and Actor Networks. 200-207 - Lawrence Cheng, Stephen Hailes, Alan Wilson

:
Towards Precise Synchronisation in Wireless Sensor Networks. 208-215 - Marcin Brzozowski, Hendrik Salomon, Peter Langendörfer

:
On Efficient Clock Drift Prediction Means and their Applicability to IEEE 802.15.4. 216-223 - Evens Jean, Robert T. Collins, Ali R. Hurson

, Sahra Sedigh
, Yu Jiao:
RISN: An Efficient, Dynamically Tasked and Interoperable Sensor Network Overlay. 224-231 - Weiwei Jiao, Long Cheng, Yimin Chen, Canfeng Chen, Jian Ma:

Efficient Data Delivery in Wireless Sensor Networks with Ubiquitous Mobile Data Collectors. 232-239 - Yang Liu, Boon-Chong Seet, Adnan Al-Anbuky

:
Virtual Brokers for Large-Scale Publish/Subscribe in Wireless Sensor Networks. 240-246
Multimedia and Data Management
- Jaroslav Pribyl, Pavel Zemcík

:
Multi-resolution Next Location Prediction for Distributed Virtual Environments. 247-254 - Peng Zhu, Hideya Yoshiuchi, Satoshi Yoshizawa:

Trick Play Function for VOD with SVC source. 255-259 - Jinbao Li, Desheng Zhang, Longjiang Guo:

OCO: A Multi-channel MAC Protocol with Opportunistic Cooperation for Wireless Sensor Networks. 260-267 - Huali Cui, Depei Qian, Xingjun Zhang, Yi Liu:

Video Streaming over Wireless Mesh Networks with Multi-Gateway Support. 268-272
Real-Time Systems and Wireless Mesh Networks
- Guy Martin Tchamgoue

, Kyong Hoon Kim, Yong-Kee Jun, Wan Yeon Lee:
Hierarchical Real-Time Scheduling Framework for Imprecise Computations. 273-280 - Abhilash Thekkilakattil, Anju S. Pillai

, Radu Dobrin, Sasikumar Punnekkat
:
Preemption Control Using Frequency Scaling in Fixed Priority Scheduling. 281-288 - Weigang Wu, Yifei Huang:

Hierarchical Cooperative Data Caching for Wireless Mesh Networks. 289-296
Workshops/ Symposiums 2010
UnderWater Acoustic Sensor Network 2010 (UUWSN 2010)
UUWSN - 1: Architecture Design
- Jung-Il Namgung, Soo Young Shin, Nam-Yeol Yun

, Soo-Hyun Park:
Adaptive GTS Allocation Scheme based on IEEE 802.15.4 for Underwater Acoustic Sensor Networks. 297-301 - Yung-Pyo Kim, Jung-Il Namgung, Nam-Yeol Yun

, Hui-Jin Cho, Imtiaz Ahmed Khan, Soo-Hyun Park:
Design and Implementation of the Test-bed for Underwater Acoustic Sensor Network Based on ARM9 Processor. 302-306 - Youngjun Jo, Jungyoungj Bae, Hyunjae Shin, Heungwoo Nam, Sae-Young Ahn, Sunshin An:

The Architecture of Surface Gateway for Underwater Acoustic Sensor Networks. 307-310
UUWSN - 2: Tracking and Localization
- Eunchan Kim, Sangho Lee, Chungsan Kim, Kiseon Kim:

Bearings-only Tracking Systems with Distributed Floating Beacons in Underwater Sensor Networks. 311-315 - Sangho Lee, Kiseon Kim:

Localization with a Mobile Beacon in Underwater Sensor Networks. 316-319 - Laura Sorbi, Laura Toni, Graziano Pio De Capua, Lorenzo Rossi:

Communication in a Behavior-based Approach to Target Detection and Tracking with Autonomous Underwater Vehicles. 320-325
UUWSN - 3: Communication and Implementation
- Se-Young Kim, Jeong-Woo Han, Ki-Man Kim, Sanghoon Baek, Hyungchul Kim, Changhwa Kim:

Experimental Results of Single Carrier Digital Modulation for Underwater Sensor Networks. 326-330 - Jun-Ho Jeon, Chang-Gi Hong, Sung-Joon Park, Changhwa Kim, Sangkyung Kim:

Robot Control Using an Underwater Acoustic Modem. 331-336 - Jeong-Woo Han, Se-Young Kim, Ki-Man Kim, Wonseok Choi, Minjae Kim, Seung-Yong Chun, Kwon Son:

A Study on the Underwater Acoustic Communication with Direct Sequence Spread Spectrum. 337-340
The International Workshop on Constructing Software for Internet of Things (CSIOT 2010)
CSIOT - 1: Software Design for Internet of Things
- Kun Yang, Shijian Li, Li Zhang, Gang Pan:

Semantic Device Bus for Internet of Things. 341-346 - Qian Zhu, Ruicong Wang, Qi Chen, Yan Liu, Weijun Qin:

IOT Gateway: BridgingWireless Sensor Networks into Internet of Things. 347-352 - Beihong Jin, Haibiao Chen:

Spatio-Temporal Events in the Internet of Things. 353-358 - Chungman Seo, Youngshin Han, Hae Young Lee, Jason J. Jung

, Chilgee Lee:
Implementation of Cloud Computing Environment for Discrete Event System Simulation using Service Oriented Architecture. 359-362 - Yuanfei Chen, Zhenmin Zhu, Yi Zeng, Zhe He:

UbiCloud: A Cloud Computing System for Ubiquitous Terminals Based on End User Virtualization. 363-367
The 3rd International Workshop on Sensor Networks and Ambient Intelligence (SeNAmI 2010)
SeNAmI - 1: Communication and Energy Consumption
- Xiao-heng Deng, Chu-Gui Xu, Fu-Yao Zhao, Yi Liu:

Repair Policies of Coverage Holes Based Dynamic Node Activation in Wireless Sensor Networks. 368-371 - Sebastian Bader, Torsten Schölzel, Bengt Oelmann:

A Method for Dimensioning Micro-Scale Solar Energy Harvesting Systems Based on Energy Level Simulations. 372-379 - Ryota Ayaki, Hideki Shimada, Kenya Sato

:
Online Personal Connection Presentation System for Communication Assistance. 380-385
SeNAmI - 2: Context-aware Design
- Josué Iglesias

, Ana M. Bernardos
, Alejandro Álvarez, Marcos Sacristán:
A Light Reasoning Infrastructure to Enable Context-aware Mobile Applications. 386-391 - Claudio Vemezia, Marco Marengo:

Context Awareness Aims at Novel Fruition Models: Augmented Reality May be the Killer Application for Context Awareness. 392-396 - Yu Lu

, Mehul Motani
, Wai-Choong Wong
:
When Ambient Intelligence Meets Internet Protocol Stack: User Layer Design. 397-402
SeNAmI - 3: Cluster and Ambient Intelligence
- Rouhollah Goudarzi, Behrouz Jedari

, Masoud Sabaei:
An Efficient Clustering Algorithm Using Evolutionary HMM in Wireless Sensor Networks. 403-409 - Asif U. Khattak, Ghalib A. Shah, M. Ahsan:

Two-Tier Cluster Based Routing Protocol for Wireless Sensor Networks. 410-415 - Elisabetta Farella

:
Ambient Intelligence, Smart Objects and Sensor Networks: Practical Experiences. 416-421
The 3rd International Workshop on Wireless Network Algorithm and Theory (WiNA 2010)
WiNA - 1: Secured and Efficient Sensor Networks
- Mandicou Ba

, Ibrahima Niang, Bamba Gueye
, Thomas Noël:
A Deterministic Key Management Scheme for Securing Cluster-Based Sensors Networks. 422-427 - Fabio Campoccia, Vincenzo Mancuso

:
A Fast Heuristic for Solving the D1EC Coloring Problem. 428-435 - Xiaoguang Zhang, Zheng Da Wu:

Energy Balanced Routing Strategy in Wireless Sensor Networks. 436-443
WiNA - 2: Interference, Coverage and Power Control
- Hakob Aslanyan, José D. P. Rolim:

Interference Minimization in Wireless Networks. 444-449 - Chow-Sing Lin, Chih-Chung Chen:

Avoidance of Blind Period for Node Coverage Grouping on Wireless Sensor Networks. 450-455 - Cunwu Han, Dehui Sun, Zhijun Li, Mingyue Zhao:

Predictive Power Control for Mobile Wireless Networks with Time-Varying Delay. 456-459
The International Workshop on Challenged Network Architecture (ICNA 2010)
ICNA10-1: Mobility and Routing
- Yong Wang, Wei Peng

, Xilong Mao, Zhenghu Gong:
RWPAD: A Mobility Model for DTN Routing Performance Evaluation. 460-465 - Yang Li, Jing Wang, Yaowen Yuan, Xiumei Fan, Qian He:

Uncertainty Reasoning on Fuzziness and Randomness in Challenged Networks. 466-471 - Wanrong Yu, Chunqing Wu, Xiaofeng Hu:

Spray and Routing for Message Delivery in Challenged Networks. 472-475
International Symposium on Trusted Computing and Communications (TRUSTCOM 2010)
Trust Management and Evaluation
- Basit Qureshi

, Geyong Min, Demetres D. Kouvatsos:
M-Trust: A Trust Management Scheme for Mobile P2P Networks. 476-483 - Junqi Zhang, Rajan Shankaran

, Mehmet A. Orgun
, Vijay Varadharajan
, Abdul Sattar
:
A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks. 484-491 - Jihang Ye, Mengyao Liu, Cai Fu:

Trusted Risk Evaluation and Attribute Analysis in Ad-Hoc Networks Security Mechanism based on Projection Pursuit Principal Component Analysis. 492-497 - Reyhaneh Changiz, Hassan Halabian, F. Richard Yu

, Ioannis Lambadaris, Helen Tang:
Trust Management in Wireless Mobile Networks with Cooperative Communications. 498-503 - Sara Guimaraes, Arlei Silva, Wagner Meira Jr., Adriano C. M. Pereira

:
CredibilityRank: A Framework for the Design and Evaluation of Rank-based Credibility Models for Web Applications. 504-510 - Feng Zhang, Zhiping Jia, Xin Li, Hui Xia:

Node Trust Assessment in Mobile Ad Hoc Networks Based on Multi-dimensional Fuzzy Decision Making. 511-516 - Abhaya C. Nayak

:
The Deficit and Dynamics of Trust. 517-522
Attack Detection
- Mohammad Reza Sohizadeh Abyaneh:

On the Security of Non-Linear HB (NLHB) Protocol against Passive Attack. 523-528 - Udaya Kiran Tupakula, Vijay Varadharajan

:
Detecting Security Attacks in Trusted Virtual Domains. 529-535 - Shaoyin Cheng, Jinding Wang, Jiajie Wang, Jun Yang, Fan Jiang:

PDVDS: A Pattern-Driven Software Vulnerability Detection System. 536-541 - Pradeep Moradiya, Srinivas Sampalli:

Detection and Prevention of Routing Intrusions in Mobile Ad Hoc Networks. 542-547 - Yudai Kato, Yuji Makimoto, Hironori Shirai, Hiromi Shimizu, Yusuke Furuya, Shoichi Saito, Hiroshi Matsuo:

Monitoring Library Function-based Intrusion Prevention System with Continuing Execution Mechanism. 548-554 - Rajiv Bagai, Huabo Lu, Bin Tang:

On the Sender Cover Traffic Countermeasure against an Improved Statistical Disclosure Attack. 555-560 - Sahar Fahimian, Amirvala Movahed, Mehdi Kharrazi:

Passive Worm and Malware Detection in Peer-to-Peer Networks. 561-565
Authentication and Digital Signature
- Ramya Ramamoorthy, F. Richard Yu

, Helen Tang, Peter C. Mason:
Combined Authentication and Quality of Service in Cooperative Communication Networks. 566-571 - Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer

, Bo Qin:
Hierarchical Certificateless Signatures. 572-577 - Majid Bayat

, Mohammad Sabzinejad Farash
, Amirvala Movahed:
A Novel Secure Bilinear Pairing Based Remote User Authentication Scheme with Smart Card. 578-582 - Fei Bi, Yi Mu:

Efficient RFID Authentication Scheme for Supply Chain Applications. 583-588 - Sazia Parvin

, Song Han, Biming Tian, Farookh Khadeer Hussain:
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks. 589-596
Cryptography and Security Protocols
- Qiushuang Du, Guojun Wang, Qin Liu:

A Scalable Encryption Scheme for Multi-Privileged Group Communications. 597-602 - Marc Stöttinger

, Sorin A. Huss, Sascha Mühlbach, Andreas Koch:
Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme. 603-608 - Liqun Chen

, Bogdan Warinschi:
Security of the TCG Privacy-CA Solution. 609-616 - Biming Tian, Song Han, Sazia Parvin

, Tharam S. Dillon:
A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks. 617-623 - Michel Kamel, Karima Boudaoud, Sylvain Lequeux, Michel Riveill

:
Designing Security Protocols Adapted to the Constraints of Mobile Environments. 624-629 - Zhiyuan Liu, Jun Pang, Chenyi Zhang

:
Extending a Key-Chain Based Certified Email Protocol with Transparent TTP. 630-636 - Aisha Fouad Bushager

, Mark Zwolinski
:
Modelling Smart Card Security Protocols in SystemC TLM. 637-643
Trusted Services and Applications
- Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry:

Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks. 644-650 - Fengshun Yue, Guojun Wang, Qin Liu:

A Secure Self-Destructing Scheme for Electronic Data. 651-658 - Bing Du, Chun Ruan:

Modeling and Robust Control for Trusted Web Server. 659-665 - Khaled Daabaj, Mike Dixon, Terry Koziniec

, Kevin Lee
:
Trusted Routing for Resource-Constrained Wireless Sensor Networks. 666-671 - Nicolai Kuntze, Roland Rieke

, Günther Diederich, Richard Sethmann, Karsten Sohr
, Tanveer Mustafa, Kai-Oliver Detken:
Secure Mobile Business Information Processing. 672-678 - Raja Naeem Akram

, Konstantinos Markantonakis
, Keith Mayes:
Simulator Problem in User Centric Smart Card Ownership Model. 679-686 - Yu Cheng, Anguo Ma, Yuxing Tang, Minxuan Zhang:

Phase Characterization and Classification for Micro-architecture Soft Error. 687-694
Trusted Network Computing
- Raquel L. Hill, Jalal Al-Muhtadi

, William E. Byrd:
An Access Control Architecture for Distributing Trust in Pervasive Computing Environments. 695-702 - Wattana Viriyasitavat

, Andrew P. Martin
:
Formal Trust Specification in Service Workflows. 703-710 - Koji Hasebe, Mitsuhiro Mabuchi:

Capability-Role-Based Delegation in Workflow Systems. 711-717 - Touhid Bhuiyan

, Yue Xu
, Audun Jøsang
:
SimTrust: A New Method of Trust Network Generation. 718-722 - Mahbub Ahmed, Yang Xiang

, A. B. M. Shawkat Ali:
Above the Trust and Security in Cloud Computing: A Notion Towards Innovation. 723-730 - Gaocai Wang, Taoshen Li, Jianer Chen:

Probabilistic Analysis on Mesh Network Fault Tolerance: Deterministic vs. Stochastic. 731-736
Trust in Mobile and Wireless Networks
- Ming Li, Longxiang Gao, Wanlei Zhou

:
S-Kcore: A Social-aware Kcore Decomposition Algorithm in Pocket Switched Networks. 737-742 - Yanan Liu, Jian Wang, He Du, Liang Zhang:

Key Sharing in Hierarchical Wireless Sensor Networks. 743-748 - Marcin Seredynski, Pascal Bouvry

:
The Cost of Altruistic Punishment in Indirect Reciprocity-based Cooperation in Mobile Ad Hoc Networks. 749-755 - Jiefeng (Terence) Chen, Roksana Boreli, Vijay Sivaraman:

TARo: Trusted Anonymous Routing for MANETs. 756-762 - Jiang-Tao Wang

, Li-miao Li, Zhigang Chen:
A Routing Algorithm Based on Trustworthy Core Tree for WSN. 763-770
Security Protection and Reliability
- Phillip Reindl, Kendall E. Nygard, Xiaojiang Du:

Defending Malicious Collision Attacks in Wireless Sensor Networks. 771-776 - Serge Chaumette, Olivier Ly, Renaud Tabary:

Automated Software Protection through Program Externalization on Memory-Limited Secure Devices. 777-784 - Neda Rohani, Zainab Noferesti, Javad Mohajeri, Mohammad Reza Aref:

Guess and Determine Attack on Trivium Family. 785-790 - Sung-Moon Chung, Hyun-Wook Jin:

Isolating System Faults on Vehicular Network Gateways Using Virtualization. 791-796 - Chao Yan, Hongjun Dai, Tianzhou Chen, Meikang Qiu:

A Fault-tolerant Architecture with Error Correcting Code for the Instruction-level Temporal Redundancy. 797-803
Trust Model, Platform and Framework
- Dongxi Liu, Jack Lee, Julian Jang

, Surya Nepal
, John Zic
:
A Cloud Architecture of Virtual Trusted Platform Modules. 804-811 - Surya Nepal, John Zic, Dongxi Liu, Julian Jang

:
Trusted Computing Platform in Your Pocket. 812-817 - Pushpita Chatterjee

, Indranil Sengupta, Soumya Kanti Ghosh:
A Distributed Trust Model for Securing Mobile Ad Hoc Networks. 818-825 - Ming Li, Alessio Bonti

, Wanlei Zhou
:
OST: A Transaction Based Online Social Trust Model for Social Network and File Sharing Security. 826-832 - Aarthi Nagarajan, Vijay Varadharajan

, Michael Hitchens
:
Analysis of Property Based Attestation in Trusted Platforms. 833-840 - Xing Su, Minjie Zhang

, Yi Mu, Kwang Mong Sim:
PBTrust: A Priority-Based Trust Model for Service Selection in General Service-Oriented Environments. 841-848

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














