Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings

Front Cover
Xiaobo Zhou, Oleg Sokolsky, Eun-Sun Jung, Lu Yan, Zili Shao, Dong-Chun Lee, Yi Mu, Young-Sik Jeong, Daeyoung Kim, Cheng-Zhong Xu
Springer Science & Business Media, Jul 24, 2006 - Computers - 1034 pages

Here are the refereed proceedings of the EUC 2006 workshops, held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Computing in Seoul, Korea, August 2006.

The book presents 102 revised papers spanning six workshops: network-centric ubiquitous systems (NCUS 2006), security in ubiquitous computing systems (SecUbiq 2006), RFID and ubiquitous sensor networks (USN 2006), trustworthiness, reliability and services in ubiquitous and sensor networks (TRUST 2006), embedded software optimization (ESO 2006), and multimedia solution and assurance in ubiquitous information systems (MSA 2006).

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Adaptive Router Promotion in AdHoc Networks
1
A UtilityBased Auction Cooperation Incentive Mechanism in PeertoPeer Networks
11
Server and Proxy for Remote Storage of Mobile Devices
22
Packet Length Adaptation for EnergyProportional Routing in Clustered Sensor Networks
32
A New Context Script Language for Developing ContextAware Application Systems in Ubiquitous Computing
43
Dynamic Replication Strategies for Object Storage Systems
53
A CostEffective Mobility Modelling in Nested Network Mobility
62
Completing UML Model of ComponentBased System with Middleware for Performance Evaluation
72
Algorithms for Service Differentiation in MAC Layer over MANETs
532
A PowerAware Routing Protocol Using MultiRoute Transmission for Mobile Ad Hoc Networks
540
A Novel Multicasting Scheme over Wireless LAN Systems by Using Relay
550
An Adaptive Concurrency Control QOS Agent for Ubiquitous Computing Environments
560
An Efficient EndtoEnd QoS Supporting Algorithm in NGN Using Optimal Flows and Measurement FeedBack for Ubiquitous and Distributed Applic...
570
An RFID System Based MCLT System with Improved Privacy
579
A New RFID Tag Anticollision Algorithm Using Collision Bit Positioning
591
An RFIDBased Access and Location Service for Pervasive Grids
601

Energy Efficient PNC Selection Procedure for the IEEE 802153Based HRWPAN
83
An Efficient Multicast Routing Protocol in Multirate Wireless Ad Hoc Networks
93
WPAN Platform Design in Handset Integrating Cellular Network and Its Application to Mobile Games
103
Reliable Transporting and Optimal Routing on RateBased for Ad Hoc Networks
112
Automatic Extraction of Conversation Protocols from a Choreography Specification of Ubiquitous Web Services
122
Intersector Interference Mitigation Method in TripleSectored OFDMA Systems
133
File Correspondences Dictionary Construction in Multilingual P2P File Sharing Systems
144
True ZeroCopy Communication for Commodity Gigabit Ethernet
153
Evaluation of Models for Analyzing Unguided Search in Unstructured Networks
163
A FaultTolerant Semantic Middleware in Ubiquitous Computing Environments
173
Survey and Research Directions
183
An Autonomic Management Architecture for Hybrid Wireless Networks
193
Prediction Efficiency in Predictive pCSMACD
203
A Situation Aware Personalization in Ubiquitous Mobile Computing Environments
213
A Network and Data Link Layer QoS Model to Improve Traffic Performance
224
A GMLBased Mobile Device Trace Monitoring System
234
Impact of HighMobility Radio Jamming in LargeScale Wireless Sensor Networks
244
A Scalable and Untraceable Authentication Protocol for RFID
252
Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005
262
Reliable Broadcast Message Authentication in Wireless Sensor Networks
271
Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks
281
A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks
291
Resource Requirement Analysis for a PredictiveHashing Based Multicast Authentication Protocol
302
Ubiquitous Authorization Scheme Based on Device Profile
312
An Efficient Certificateless Signature Scheme
322
Universal Designated Verifier Ring Signature Proof Without Random Oracles
332
An IdentityBased Signcryption Scheme with Short Ciphertext from Pairings
342
A Strong Identity Based KeyInsulated Cryptosystem
352
A New Hierarchical IDBased Cryptosystem and CCASecure PKE
362
Energy Comparison of AES and SHA1 for Ubiquitous Computing
372
Performance Analysis of Tag Anticollision Algorithms for RFID Systems
382
Perturbative Time and Frequency Allocations for RFID Reader Networks
392
An Enhanced Dynamic Framed Slotted ALOHA Anticollision Algorithm
403
Distributed Tag Access with CollisionAvoidance Among Mobile RFID Readers
413
Design and Implementation of a HighSpeed RFID Data Filtering Engine
423
Authorized Tracking and Tracing for RFID Tags
435
An EnergyEfficient MAC Protocol for DelaySensitive Wireless Sensor Networks
445
A DataCentric Selforganization Scheme for EnergyEfficient Wireless Sensor Networks
455
Optimized Clustering for Maximal Lifetime of Wireless Sensor Networks
465
Maximize the Coverage Lifetime of Sensor Networks
475
An Active Tracking System Using IEEE 802154Based Ultrasonic Sensor Devices
485
A Localization Method Without OnBody Sensor in Wireless Sensor Networks
495
Research Directions in the Area of USN Ubiquitous Sensor Network Towards Practical UE Ubiquitous Environments
505
On Building a Lightweight Security Architecture for Sensor Networks
511
A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks
522
Autonomous Management of LargeScale Ubiquitous Sensor Networks
609
A PrivacyAware Service Protocol for Ubiquitous Computing Environments
619
A Neural Network Model for Detection Systems Based on Data Mining and False Errors
629
An Analysis on the Web Technologies for Dynamically Generating WebBased User Interfaces in Ubiquitous Spaces
639
A Policy Description Language for ContextBased Access Control and Adaptation in Ubiquitous Environment
650
Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous Home
660
A Lightweight IP Traceback Mechanism on IPv6
671
A Formal Description
681
A Flexible Bound Admission Control Algorithm for Vertical Handover in Ubiquitous Environment
692
Using Node Cuts
702
Fast Mounting and Recovery for NAND Flash Memory Based Embedded Systems
710
Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments
721
A Robust Verifiably Encrypted Signature Scheme
731
Instruction Reselection for Iterative Modulo Scheduling on High Performance Multiissue DSPs
741
Predictability of Least Laxity First Scheduling Algorithm on Multiprocessor RealTime Systems
755
Saving RegisterFile Leakage Power by Monitoring Instruction Sequence in ROB
765
RunTime Memory Optimization for DDMB Architecture Through a CCB Algorithm
775
Code Generation and Optimization for JavatoC Compilers
785
Modelling and Analysis of Power Consumption for ComponentBased Embedded Software
795
Design of a Programmable Vertex Processing Unit for Mobile Platforms
805
An EnergyAware WholeSystem Dynamic Emulator SkyEye
815
Optimizing Scheduling Stability for Runtime Data Alignment
825
A Chinese Mobile Phone Input Method Based on the Dynamic and Selfstudy Language Model
836
An IDBased Watermarking Scheme for Java Programs
848
DataLayout Optimization Using Reuse Distance Distribution
858
Cooptimization of Performance and Power in a Superscalar Processor Design
868
An Efficient Flash Translation Layer for Flash Memory
879
A Novel Discrete Hopfield Neural Network Approach for HardwareSoftware Partitioning of RTOS in the SoC
888
UML Based Evaluation of Reconfigurable Shape Adaptive DCT for Embedded Stream Processing
898
A High Performance Buffering of Java Objects for Java Card Systems with Flash Memory
908
Predictive Prefetching of ContextAware Information in Mobile Networks
919
Digital Orthoimage Production for Web GIS Applications
928
Multimedia Contents Security by Wireless Authentication
936
Traffic Actuated Car Navigation Systems in Mobile Communication Networks
946
Analytic Model of the Collision Resolution Protocol with VoiceData in Mobile Networks
953
Security Enhancement by Detecting Network Address Translation Based on Instant Messaging
962
A New Authentication Scheme of Binding Update Protocol on Handover in Mobile IPv6 Networks
972
A Solution for the Dropout Problem in Adaptive Cruise Control Range Sensors
979
An Architecture Framework for Measuring and Evaluating PacketSwitched Voice
988
HOIDSBased Detection Method of Vicious Event in Large Networks
998
New Handoff Control Method Using Fuzzy MultiCriteria Decision Making in MicroPicocellular Networks
1006
Test of IRDSRC in Measuring Vehicle Speed for ITS Applications
1012
A Grid Routing Scheme Considering Node Lifetime in Ubiquitous Sensor Networks
1021
Author Index
1031
Copyright

Other editions - View all

Common terms and phrases