did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540366799

Embedded And Ubiquitous Computing: International Conference, EUC 2006, Seoul, Korea, August 1-4, 2006, Proceedings

by ; ; ; ;
  • ISBN13:

    9783540366799

  • ISBN10:

    3540366792

  • Format: Paperback
  • Copyright: 2006-08-15
  • Publisher: Springer-Verlag New York Inc

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

List Price: $249.00 Save up to $62.25
  • Buy Used
    $186.75
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the International Conference on Embedded and Ubiquitous Computing, EUC 2006, held in Seoul, Korea in August 2006.The 113 revised full papers presented together with 3 keynote articles were carefully reviewed and selected from over 500 submissions. The papers are organized in topical sections on power aware computing, security and fault tolerance, agent and distributed computing, wireless communications, real-time systems, embedded software optimization, embedded systems, multimedia and data management, mobile computing, embedded system design automation, embedded architectures, network protocols, middleware and P2P.

Table of Contents

On securing networked real-time embedded systemsp. 1
Towards self-coordinating ubiquitons computing environmentsp. 2
Frontier of digital technology and future strategyp. 14
SAQA : spatial and attribute based query aggregation in wireless sensor networksp. 15
Efficient algorithm of energy minimization for heterogeneous wireless sensor networksp. 25
Power-aware instruction schedulingp. 35
Minimising the energy consumption of real-time tasks with precedence constraints on a single processorp. 45
Power aware H.264/AVC video player on PAC dual-core SoC platformp. 57
Dynamic repartitioning of real-time schedule on a multicore processor for energy efficiencyp. 69
A secure key agreement scheme in low-energy wireless sensor networksp. 79
Person-wise privacy level access control for personal information directory servicesp. 89
An efficient computing-checkpoint based coordinated checkpoint algorithmp. 99
A parallel GNFS algorithm based on a reliable look-ahead block Lanczos method for integer factorizationp. 110
SPDA : a security protocol for data aggregation in large-scale wireless sensor networksp. 121
Efficient and user friendly inter-domain device authentication/access control for home networksp. 131
A programming model for the automatic construction of USN applications based on nano-Qplusp. 141
Hierarchical and dynamic information management framework on grid computingp. 151
Kalman filter based dead reckoning algorithm for minimizing network traffic between mobile nodes in wireless GRIDp. 162
A conceptual framework for agent-based information resource managementp. 171
Advanced stochastic host state modeling to reliable computation in global computing environmentp. 183
Dynamic buffer allocation for conserving disk energy in clustered video servers which use replicationp. 193
LBN : load-balancing network for data gathering wireless sensor networksp. 204
Multi-user diversity for IEEE 802.11 infrastructure wireless LANp. 214
Performance analysis of DS-BPAM UWB system over fading channels-uncoded and coded schemesp. 224
Protocol design for adaptive video transmission over MANETp. 234
mSCTP-DAC : dynamic address configuration for mSCTP handoverp. 244
TCP-new veno : the energy efficient congestion control in mobile ad-hoc networksp. 254
A real-time message scheduling scheme based on optimal earliest deadline first policy for dual channel wireless networksp. 264
On multiprocessor utility accrual real-time scheduling with statistical timing assurancesp. 274
Linux/RTOS hybrid operating environment on Gandalf virtual machine monitorp. 287
Optimizing code size for embedded real-time applicationsp. 297
Dual-mode r-reliable task model for flexible scheduling in reliable real-time systemsp. 308
Securing Internet gateway discovery protocol in ubiquitous wireless Internet access networksp. 318
Data integrity related markup language and HTTP protocol support for Web intermediariesp. 328
Efficient batch verification for RSA-type digital signatures in a ubiquitous environmentp. 336
Secure user authentication mechanism in digital home network environmentsp. 345
Scalable message routing for mobile software assistantsp. 355
Grid resource management based on functional dependencyp. 365
Distributed proximity-aware peer clustering in BitTorrent-like peer-to-peer networksp. 375
Distributed invocation of composite Web servicesp. 385
System software for flash memory : a surveyp. 394
Loop striping : maximize parallelism for nested loopsp. 405
Efficient error control for scalable media transmission over 3G broadcast networksp. 415
Implementation synthesis of embedded software under operating systems supporting the hybrid scheduling modelp. 426
Designing dynamic software architecture for home service robot softwarep. 437
A processor extension for cycle-accurate real-time softwarep. 449
Next generation embedded processor architecture for personal information devicesp. 459
A secret image sharing scheme based on vector quantization mechanismp. 469
A framework for managing the solution life cycle of event-driven pervasive applicationsp. 479
A fast instruction set evaluation method for ASIP designsp. 489
An ARM-based embedded system design for speech-to-speech translationp. 499
Human computer interaction for the accelerometer-based mobile gamep. 509
Using automatic facial expression classification for contents indexing based on the emotional componentp. 519
A framework for data management and transfer in grid environmentsp. 529
MMSDS : ubiquitous computing and WWW-based multi-modal sentential dialog systemp. 539
A speech and character combined recognition engine for mobile devicesp. 549
Scalable fingerprinting scheme using statistically secure anti-collusion code for large scale contents distributionp. 560
Broadcasting group information to ensure consistency and correctness in mobile computing environmentsp. 570
A fuzzy-based service adaptation middleware for context-aware computingp. 580
Next generation mobile service environment and evolution of context aware servicesp. 591
Efficient routing protocol using virtual connection and load balancing for network mobilityp. 601
Network mobility in MIPv6 considering arrival timep. 610
Service-oriented device anycasting using quality first search in wireless personal area networkp. 620
BaseStation assisted TCP : a simple way to improve wireless TCPp. 630
Modeling asymmetric slot allocation for mobile multimedia services in microcell TDD employing FDD uplink as macrocellp. 642
Dynamic clustering for coverage-time maximization in two-tiered hierarchical sensor network architecturesp. 652
An enhanced hybrid rerouting scheme for handoff in wireless ATM networksp. 662
Bridging nodes density : a connection stability heuristic for dynamic ad-hoc networksp. 672
A base station centralized simple clustering protocol for sensor networksp. 682
Simulation cost reduction strategies for behavioral model verification in Bayesian based stopping rulep. 692
Low power hardware-software partitioning algorithm for heterogeneous distributed embedded systemsp. 702
Refactoring-based stepwise refinement in abstract system-level designp. 712
Custom instruction generation using temporal partitioning techniques for a reconfigurable functional unitp. 722
Scheduling of transactions based on extended scheduling timed petri nets for SoC system-level test-case generationp. 732
Automatic generation of hardware/software interface with product-specific debugging toolsp. 742
Fault-tolerant VLIW processor design and error coverage analysisp. 754
Interconnect estimation for mesh-based reconfigurable computingp. 766
Efficient logic circuit for network intrusion detectionp. 776
A multi-protocol baseband modem processor for a mobile RFID readerp. 785
Write back routine for JFFS2 efficient I/Op. 795
Register array structure for effective edge filtering operation of deblocking filterp. 805
Quantitative service differentiation : a square-root proportional modelp. 814
Power-efficient route discovery (PERDP) for ODMA systemsp. 824
Energy efficient routing for wireless sensor networks with grid topologyp. 834
Performance evaluation of mobile IP agents' auto-reconfiguration mechanisms in MANETp. 844
Formulas and protocols for broadcasting in mobile ad hoc networksp. 854
Traffic adaptive IEEE 802.15.4 MAC for wireless sensor networksp. 864
An efficient relay sensors placing algorithm for connectivity in wireless sensor networksp. 874
Performance analysis of IEEE 802.15.4 with non-beacon-enabled CSMA/CA in non-saturated conditionp. 884
Cross-layer duty cycle scheduling with data aggregation routing in wireless sensor networksp. 894
A link stability model and stable routing for mobile ad-hoc networksp. 904
Energy-aware routing with limited route length for multimedia applicationsp. 914
Iterative decoding-based phase estimation for OFDM systems at low operating SNRp. 924
Semi-lock : an efficient cheat-proof synchronization mechanism for peer-to-peer game systemsp. 935
A case study on message-oriented middleware for heterogeneous sensor networksp. 945
A proxy-enabled service discovery architecture to find proximity-based services in 6LoWPANp. 956
PosCFS : an advanced file management technique for the wearable computing environmentp. 966
Control of information appliances using instant messagingp. 976
Hybrid dissemination based scalable and adaptive context delivery for ubiquitous computingp. 987
A neuroscientific approach to emotion system for intelligent agentsp. 997
Automatic decision method of effective transform coefficients for face recognitionp. 1007
Finding the perfect projection system - human perception of projection quality depending on distance and projection anglep. 1017
Context reasoning technologies in ubiquitous computing environmentp. 1027
X-tree diff+ : efficient change detection algorithm in XML documentsp. 1037
Wear-UCAM : a toolkit for mobile user interactions in smart environmentsp. 1047
A sensing resolution-based energy efficient communication protocol for wireless sensor networksp. 1058
Impact of node cheating on gossip-based protocolp. 1068
Energy-efficient clustering algorithm in wireless sensor networksp. 1078
Enhanced multipath routing protocol using congestion metric in wireless ad hoc networksp. 1089
Virtual hierarchical architecture integrating mobile IPv6 and MANETs for Internet connectivityp. 1098
A comprehensive study on handover performance of hierarchical mobile IPv6p. 1108
Adaptive error recovery in cdma2000 1xEV-DO mobile broadcast networksp. 1119
A novel approach for sharing white board between PC and PDAs with multi-usersp. 1129
Semi-soft FMIPv6 for 802.11 networkp. 1139
An optimized scheme for mobile IPv6 handover between domains based on AAAp. 1148
Interoperation of home and mobile network devices employing a jini-agent systemp. 1158
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program