Adaptive router promotion in ad-hoc networks | p. 1 |
A utility-based auction cooperation incentive mechanism in peer-to-peer networks | p. 11 |
UbiqStor : server and proxy for remote storage of mobile devices | p. 22 |
Packet length adaptation for energy-proportional routing in clustered sensor networks | p. 32 |
A new context script language for developing context-aware application systems in ubiquitous computing | p. 43 |
Dynamic replication strategies for object storage systems | p. 53 |
A cost-effective mobility modelling in nested network mobility | p. 62 |
Completing UML model of component-based system with middleware for performance evaluation | p. 72 |
Energy efficient PNC selection procedure for the IEEE 802.15.3-based HR-WPAN | p. 83 |
An efficient multicast routing protocol in multi-rate wireless ad hoc networks | p. 93 |
WPAN platform design in handset integrating cellular network and its application to mobile games | p. 103 |
Reliable transporting and optimal routing on rate-based for ad hoc networks | p. 112 |
Automatic extraction of conversation protocols from a choreography specification of ubiquitous Web services | p. 122 |
Inter-sector interference mitigation method in triple-sectored OFDMA systems | p. 133 |
File correspondences dictionary construction in multilingual P2P file sharing systems | p. 144 |
Lightweight messages : true zero-copy communication for commodity gigabit ethernet | p. 153 |
Evaluation of models for analyzing unguided search in unstructured networks | p. 163 |
Wapee : a fault-tolerant semantic middleware in ubiquitous computing environments | p. 173 |
Security in P2P networks : survey and research directions | p. 183 |
HYWINMARC : an autonomic management architecture for hybrid wireless networks | p. 193 |
Prediction efficiency in predictive p-CSMA/CD | p. 203 |
A situation aware personalization in ubiquitous mobile computing environments | p. 213 |
A network and data link layer QoS model to improve traffic performance | p. 224 |
A GML-based mobile device trace monitoring system | p. 234 |
Impact of high-mobility radio jamming in large-scale wireless sensor networks | p. 244 |
A scalable and untraceable authentication protocol for RFID | p. 252 |
Vulnerability of an RFID authentication protocol proposed in at SecUbiq 2005 | p. 262 |
Reliable broadcast message authentication in wireless sensor networks | p. 271 |
Message and its origin authentication protocol for data aggregation in sensor networks | p. 281 |
A new security protocol based on elliptic curve cryptosystems for securing wireless sensor networks | p. 291 |
Resource requirement analysis for a predictive-hashing based multicast authentication protocol | p. 302 |
Ubiquitous authorization scheme based on device profile | p. 312 |
An efficient certificateless signature scheme | p. 322 |
Universal designated verifier ring signature (proof) without random Oracles | p. 332 |
An identity-based signcryption scheme with short ciphertext from pairings | p. 342 |
A strong identity based key-insulated cryptosystem | p. 352 |
A new hierarchical ID-based cryptosystem and CCA-secure PKE | p. 362 |
Energy comparison of AES and SHA-1 for ubiquitous computing | p. 372 |
Performance analysis of tag anti-collision algorithms for RFID systems | p. 382 |
Perturbative time and frequency allocations for RFID reader networks | p. 392 |
An enhanced dynamic framed slotted ALOHA anti-collision algorithm | p. 403 |
DiCa : distributed tag access with collision-avoidance among mobile RFID readers | p. 413 |
Design and implementation of a high-speed RFID data filtering engine | p. 423 |
Authorized tracking and tracing for RFID tags | p. 435 |
An energy-efficient MAC protocol for delay-sensitive wireless sensor networks | p. 445 |
A data-centric self-organization scheme for energy-efficient wireless sensor networks | p. 455 |
Optimized clustering for maximal lifetime of wireless sensor networks | p. 465 |
Maximize the coverage lifetime of sensor networks | p. 475 |
An active tracking system using IEEE 802.15.4-based ultrasonic sensor devices | p. 485 |
LWOS : a localization method without on-body sensor in wireless sensor networks | p. 495 |
Research directions in the area of USN (ubiquitous sensor network) towards practical UE (ubiquitous environments) | p. 505 |
On building a lightweight security architecture for sensor networks | p. 511 |
A reverse AODV routing protocol in ad hoc mobile networks | p. 522 |
Algorithms for service differentiation in MAC layer over MANETs | p. 532 |
A power-aware routing protocol using multi-route transmission for mobile ad hoc networks | p. 540 |
A novel multicasting scheme over wireless LAN systems by using relay | p. 550 |
An adaptive concurrency control QOS agent for ubiquitous computing environments | p. 560 |
An efficient end-to-end QoS supporting algorithm in NGN using optimal flows and measurement feed-back for ubiquitous and distributed applications | p. 570 |
An RFID system based MCLT system with improved privacy | p. 579 |
QT-CBP : a new RFID tag anti-collision algorithm using collision bit positioning | p. 591 |
An RFID-based access and location service for pervasive grids | p. 601 |
Autonomous management of large-scale ubiquitous sensor networks | p. 609 |
A privacy-aware service protocol for ubiquitous computing environments | p. 619 |
A neural network model for detection systems based on data mining and false errors | p. 629 |
An analysis on the Web technologies for dynamically generating Web-based user interfaces in ubiquitous spaces | p. 639 |
A policy description language for context-based access control and adaptation in ubiquitous environment | p. 650 |
C-iUMS : context based smart and secure multimedia service in intelligent ubiquitous home | p. 660 |
A lightweight IP traceback mechanism on IPv6 | p. 671 |
Enable a trustworthy network by source address spoofing prevention routers : a formal description | p. 681 |
A flexible bound admission control algorithm for vertical handover in ubiquitous environment | p. 692 |
Network probabilistic connectivity : using node cuts | p. 702 |
Fast mounting and recovery for NAND flash memory based embedded systems | p. 710 |
Broadcast encryption using efficient key distribution and renewal for ubiquitous environments | p. 721 |
A robust verifiably encrypted signature scheme | p. 731 |
Instruction re-selection for iterative modulo scheduling on high performance multi-issue DSPs | p. 741 |
Predictability of least laxity first scheduling algorithm on multiprocessor real-time systems | p. 755 |
Saving register-file leakage power by monitoring instruction sequence in ROB | p. 765 |
Run-time memory optimization for DDMB architecture through a CCB algorithm | p. 775 |
Code generation and optimization for Java-to-C compilers | p. 785 |
Modelling and analysis of power consumption for component-based embedded software | p. 795 |
Design of a programmable vertex processing unit for mobile platforms | p. 805 |
An energy-aware whole-system dynamic emulator - SkyEye | p. 815 |
Optimizing scheduling stability for runtime data alignment | p. 825 |
A Chinese mobile phone input method based on the dynamic and self-study language model | p. 836 |
An ID-based watermarking scheme for Java programs | p. 848 |
Data-layout optimization using reuse distance distribution | p. 858 |
Co-optimization of performance and power in a superscalar processor design | p. 868 |
FAST : an efficient flash translation layer for flash memory | p. 879 |
A novel discrete Hopfield neural network approach for hardware-software partitioning of RTOS in the SoC | p. 888 |
UML based evaluation of reconfigurable shape adaptive DCT for embedded stream processing | p. 898 |
A high performance buffering of Java objects for Java card systems with flash memory | p. 908 |
Predictive prefetching of context-aware information in mobile networks | p. 919 |
Digital ortho-image production for Web GIS applications | p. 928 |
Multimedia contents security by wireless authentication | p. 936 |
Traffic actuated car navigation systems in mobile communication networks | p. 946 |
Analytic model of the collision resolution protocol with voice/data in mobile networks | p. 953 |
Security enhancement by detecting network address translation based on instant messaging | p. 962 |
A new authentication scheme of binding update protocol on handover in mobile IPv6 networks | p. 972 |
A solution for the dropout problem in adaptive cruise control range sensors | p. 979 |
An architecture framework for measuring and evaluating packet-switched voice | p. 988 |
HOIDS-based detection method of vicious event in large networks | p. 998 |
New handoff control method using fuzzy multi-criteria decision making in micro/pico-cellular networks | p. 1006 |
Test of IR-DSRC in measuring vehicle speed for ITS applications | p. 1012 |
A grid routing scheme considering node lifetime in ubiquitous sensor networks | p. 1021 |
Table of Contents provided by Blackwell. All Rights Reserved. |