Adaptive block management for victim cache by exploiting L1 cache history information | p. 1 |
Automatic synthesis and verification of real-time embedded software | p. 12 |
Integration of protocols in order to provide quality of service in IP mobile networks | p. 22 |
RIFFS : reverse indirect flash file system | p. 30 |
Authentication and autoconfiguration for MANET nodes | p. 41 |
Loop scheduling for real-time DSPs with minimum switching activities on multiple-functional-unit architectures | p. 53 |
Optimizing address assignment for scheduling embedded DSPs | p. 64 |
Hybrid technique for reducing energy consumption in high performance embedded processor | p. 74 |
The virtual debugging system for developing embedded software using virtual machinery | p. 85 |
Embedded system design for network time synchronization | p. 96 |
Component composition tools : process call scheduling according to the priority in connector | p. 107 |
Experimental performance evaluation of embedded Linux using alternative CPU core organizations | p. 119 |
A mobile way-finding application controlling Internet-distributed signaling devices via LAN concento | p. 131 |
Experimental assessment of scenario-based multithreading for real-time object-oriented models : a case study with PBX systems | p. 143 |
Providing protected execution environments for embedded operating systems using a [mu]-kernel | p. 153 |
A virtual reality based system for remote maintenance of rotating machinery | p. 164 |
Comparison of tie-breaking policies for real-time scheduling on multiprocessor | p. 174 |
Deductive probabilistic verification methods for embedded and ubiquitous computing | p. 183 |
An integrated scheduling algorithm for precedence constrained hard and soft real-time tasks on heterogeneous multiprocessors | p. 196 |
An integrated multichannel selection and dynamic power control scheme for IEEE 802.11 wireless ad hoc networks | p. 207 |
Non-uniform set-associative caches for power-aware embedded processors | p. 217 |
Power-aware scheduling of mixed task sets in priority-driven systems | p. 227 |
Power consumption of wireless NIC and its impact on joint routing and power control in ad hoc network | p. 238 |
A hardware/software co-design method and its evaluation to ITS image processing and driver-support systems | p. 249 |
Efficient scheduling for design exploration with imprecise latency and register constraints | p. 259 |
Hardware mediators : a portability artifact for component-based systems | p. 271 |
On implementation of MPEG-2 like real-time parallel media applications on MDSP SoC cradle architecture | p. 281 |
FERP interface and interconnect cores for stream processing applications | p. 291 |
Folded fat H-tree : an interconnection topology for dynamically reconfigurable processor array | p. 301 |
The 3DMA middleware for mobile applications | p. 312 |
Mining physical parallel pattern from mobile users | p. 324 |
A pointer forwarding strategy for minimizing signaling cost in hierarchical mobile IPv6 networks | p. 333 |
A policy based framework for context aware ubiquitous services | p. 346 |
Heterogeneous grid computing for energy constrained mobile device | p. 356 |
Defining scope of query for location-dependent information services | p. 366 |
Desirable mobile networking method for formulating an efficient mobile conferencing application | p. 377 |
Enhanced cost effective cache invalidation for mobile clients in stateless server environments | p. 387 |
An efficient binding update scheme for the same mobility nodes group | p. 398 |
Allocation of data items for multi channel data broadcasting in a mobile computing environment | p. 409 |
An enhanced caching strategy for location tracking in PCS networks | p. 419 |
A multi-channel MAC protocol with route relay capability for mobile ad hoc networks | p. 429 |
Optimizing query access time over broadcast channel in a mobile computing environment | p. 439 |
Location-aware information retrieval for mobile computing | p. 450 |
Invalidation for CORBA caching in wireless devices | p. 460 |
A performance evaluation of PPP multiplexing within UTRAN | p. 472 |
Actors for mobile ad-hoc networks | p. 482 |
Impact of topology on multi-hop Bluetooth personal area network | p. 495 |
Automatic gateway selection in Bluetooth scatternet | p. 507 |
An energy-efficient routing and reporting scheme to exploit data similarities in wireless sensor networks | p. 515 |
Implementation and evaluation of a location-aware wireless multi-agent system | p. 528 |
Wireless signal strength topology maps in mobile adhoc networks | p. 538 |
Efficient micro-mobility support for wireless network using improved host-based routing | p. 548 |
Architectural design for a wireless environment | p. 558 |
Hierarchical mobile network routing : route optimization and micro-mobility support for NEMO | p. 571 |
Multicast with QoS support in heterogeneous wireless networks | p. 581 |
A power-based clustering algorithm for wireless ad-hoc networks | p. 591 |
Analysis of connectivity for sensor networks using geometrical probability | p. 601 |
Seamless Bluetooth connectivity to IPv6 networks | p. 612 |
Man and machine bidirectional communication interface using voice and pointing action | p. 622 |
An improved handoff technique for a seamless multimedia services | p. 634 |
An effective adaptation of encryption on MPEG-4 video streams for digital rights management in an ubiquitous computing environment | p. 642 |
A session mobility scheme for seamless VOD service in ubiquitous environments | p. 652 |
System architecture of a multimedia streaming server for the next generation Internet | p. 662 |
Developing context-aware ubiquitous computing systems with a unified middleware framework | p. 672 |
Design of a middleware and HIML (human interaction markup language) for context aware services in a ubiquitous computing environment | p. 682 |
Context-aware computing during seamless transfer based on random set theory for active space | p. 692 |
User's perception of conventional Web multimedia user interfaces : an exploratory experiment | p. 702 |
Ubiquitous computing literacy : a new challenge for social computing | p. 712 |
Construction of distributed object group framework and its execution analysis using distributed application simulation | p. 724 |
Survivability for a network service and load balancing using intelligent agents software | p. 734 |
Dissemination of sensor data over the Internet | p. 745 |
MASPG : searching the shortest communication path with the guarantee of the message delivery between manager and mobile agent | p. 755 |
A collaborative environment for service providing in cultural heritage sites | p. 765 |
Context-aware state management for ubiquitous applications | p. 776 |
RICFFP : an efficient service discovery protocol for MANETs | p. 786 |
On the effects of bandwidth reduction techniques in distributed applications | p. 796 |
Implementing cooperative caching in distributed streaming media server clusters | p. 807 |
A general equilibrium analysis on impersonal networking decisions, E-commerce, and bundling pricing | p. 818 |
Dynamic routing and wavelength assignment in WDM networks with ant-based agents | p. 829 |
Detection of malicious host attacks by tracing with randomly selected hosts | p. 839 |
An admission control algorithm for scheduling mixed traffic in ubiquitous environment | p. 849 |
Distance and direction based location update with sectional ring paging scheme | p. 859 |
Verify memory integrity basing on hash tree and MAC combined approach | p. 869 |
Enhancing privacy of universal re-encryption scheme for RFID tags | p. 879 |
Securing communications in the smart home | p. 891 |
A Study on the XML-based single sign-on system supporting mobile and ubiquitous service environments | p. 903 |
A simulation-based performance analysis of dynamic routing protocols for mobile ad hoc networks | p. 914 |
A fuzzy-tower-based QoS unicast routing algorithm | p. 923 |
A stable estimation model for time synchronization on the Internet using Kalman filtering | p. 931 |
A novel adaptive fuzzy logic controller (A-FLC) to reduce retransmission and service roundtrip time for logical TCP channels over the Internet | p. 942 |
Making exploitation of peer heterogeneity as a first class citizen for resource discovery in peer-to-peer networks | p. 952 |
A collaborative and semantic data management framework for ubiquitous computing environment | p. 962 |
Q-MAR : an adaptive QoS management model for situation-aware middleware | p. 972 |
LiveSpaces : an interactive ubiquitous workspace architecture for the enterprise | p. 982 |
The power of shortcuts in greedy routing in content addressable networks | p. 994 |
A P2P ubiquitous system for testing network programs | p. 1004 |
Ontology mapping in pervasive computing environment | p. 1014 |
Lemming : a novel resource lookup scheme for peer-to-peer networks | p. 1024 |
A grid-based application delivery toolkit for ubiquitous computing | p. 1034 |
Japster : an improved peer-to-peer network architecture | p. 1044 |
Evaluation of data streaming effect on real-time content transformation in active proxies | p. 1055 |
A rapid service discovery mechanism with low bandwidth requirement in decentralized peer-to-peer network | p. 1065 |
Crown : an efficient and stable distributed resource lookup protocol | p. 1075 |
A context-sensitive middleware for managing embedded pervasive environments | p. 1085 |
VChord : constructing peer-to-peer overlay network by exploiting heterogeneity | p. 1096 |
Smart cameras and pervasive information systems | p. 1107 |
Mobility and resource management in smart home environments | p. 1109 |
Smart furniture : a platform for creating context-aware ubiquitous applications everywhere | p. 1112 |
Table of Contents provided by Blackwell. All Rights Reserved. |