did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540368502

Emerging Directions in Embedded and Ubiquitous Computing : EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings

by ; ; ; ; ; ;
  • ISBN13:

    9783540368502

  • ISBN10:

    3540368507

  • Format: Paperback
  • Copyright: 2006-08-15
  • Publisher: Springer-Verlag New York Inc

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

List Price: $239.00 Save up to $185.34
  • Buy Used
    $179.25
    Add to Cart Free Shipping Icon Free Shipping

    USUALLY SHIPS IN 2-4 BUSINESS DAYS

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the EUC 2006 workshops held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2006, in Seoul, Korea in August 2006.The 102 revised full papers presented were carefully reviewed and selected from 375 submissions. Topics covered by the six workshops are network-centric ubiquitous systems (NCUS 2006), security in ubiquitous computing systems (SecUbiq 2006), RFID and ubiquitous sensor networks (USN 2006), trustworthiness, reliability and services in ubiquitous and sensor networks (TRUST 2006), embedded software optimization (ESO 2006), and multimedia solution and the assurance in the ubiquitous information systems (MSA 2006).

Table of Contents

Adaptive router promotion in ad-hoc networksp. 1
A utility-based auction cooperation incentive mechanism in peer-to-peer networksp. 11
UbiqStor : server and proxy for remote storage of mobile devicesp. 22
Packet length adaptation for energy-proportional routing in clustered sensor networksp. 32
A new context script language for developing context-aware application systems in ubiquitous computingp. 43
Dynamic replication strategies for object storage systemsp. 53
A cost-effective mobility modelling in nested network mobilityp. 62
Completing UML model of component-based system with middleware for performance evaluationp. 72
Energy efficient PNC selection procedure for the IEEE 802.15.3-based HR-WPANp. 83
An efficient multicast routing protocol in multi-rate wireless ad hoc networksp. 93
WPAN platform design in handset integrating cellular network and its application to mobile gamesp. 103
Reliable transporting and optimal routing on rate-based for ad hoc networksp. 112
Automatic extraction of conversation protocols from a choreography specification of ubiquitous Web servicesp. 122
Inter-sector interference mitigation method in triple-sectored OFDMA systemsp. 133
File correspondences dictionary construction in multilingual P2P file sharing systemsp. 144
Lightweight messages : true zero-copy communication for commodity gigabit ethernetp. 153
Evaluation of models for analyzing unguided search in unstructured networksp. 163
Wapee : a fault-tolerant semantic middleware in ubiquitous computing environmentsp. 173
Security in P2P networks : survey and research directionsp. 183
HYWINMARC : an autonomic management architecture for hybrid wireless networksp. 193
Prediction efficiency in predictive p-CSMA/CDp. 203
A situation aware personalization in ubiquitous mobile computing environmentsp. 213
A network and data link layer QoS model to improve traffic performancep. 224
A GML-based mobile device trace monitoring systemp. 234
Impact of high-mobility radio jamming in large-scale wireless sensor networksp. 244
A scalable and untraceable authentication protocol for RFIDp. 252
Vulnerability of an RFID authentication protocol proposed in at SecUbiq 2005p. 262
Reliable broadcast message authentication in wireless sensor networksp. 271
Message and its origin authentication protocol for data aggregation in sensor networksp. 281
A new security protocol based on elliptic curve cryptosystems for securing wireless sensor networksp. 291
Resource requirement analysis for a predictive-hashing based multicast authentication protocolp. 302
Ubiquitous authorization scheme based on device profilep. 312
An efficient certificateless signature schemep. 322
Universal designated verifier ring signature (proof) without random Oraclesp. 332
An identity-based signcryption scheme with short ciphertext from pairingsp. 342
A strong identity based key-insulated cryptosystemp. 352
A new hierarchical ID-based cryptosystem and CCA-secure PKEp. 362
Energy comparison of AES and SHA-1 for ubiquitous computingp. 372
Performance analysis of tag anti-collision algorithms for RFID systemsp. 382
Perturbative time and frequency allocations for RFID reader networksp. 392
An enhanced dynamic framed slotted ALOHA anti-collision algorithmp. 403
DiCa : distributed tag access with collision-avoidance among mobile RFID readersp. 413
Design and implementation of a high-speed RFID data filtering enginep. 423
Authorized tracking and tracing for RFID tagsp. 435
An energy-efficient MAC protocol for delay-sensitive wireless sensor networksp. 445
A data-centric self-organization scheme for energy-efficient wireless sensor networksp. 455
Optimized clustering for maximal lifetime of wireless sensor networksp. 465
Maximize the coverage lifetime of sensor networksp. 475
An active tracking system using IEEE 802.15.4-based ultrasonic sensor devicesp. 485
LWOS : a localization method without on-body sensor in wireless sensor networksp. 495
Research directions in the area of USN (ubiquitous sensor network) towards practical UE (ubiquitous environments)p. 505
On building a lightweight security architecture for sensor networksp. 511
A reverse AODV routing protocol in ad hoc mobile networksp. 522
Algorithms for service differentiation in MAC layer over MANETsp. 532
A power-aware routing protocol using multi-route transmission for mobile ad hoc networksp. 540
A novel multicasting scheme over wireless LAN systems by using relayp. 550
An adaptive concurrency control QOS agent for ubiquitous computing environmentsp. 560
An efficient end-to-end QoS supporting algorithm in NGN using optimal flows and measurement feed-back for ubiquitous and distributed applicationsp. 570
An RFID system based MCLT system with improved privacyp. 579
QT-CBP : a new RFID tag anti-collision algorithm using collision bit positioningp. 591
An RFID-based access and location service for pervasive gridsp. 601
Autonomous management of large-scale ubiquitous sensor networksp. 609
A privacy-aware service protocol for ubiquitous computing environmentsp. 619
A neural network model for detection systems based on data mining and false errorsp. 629
An analysis on the Web technologies for dynamically generating Web-based user interfaces in ubiquitous spacesp. 639
A policy description language for context-based access control and adaptation in ubiquitous environmentp. 650
C-iUMS : context based smart and secure multimedia service in intelligent ubiquitous homep. 660
A lightweight IP traceback mechanism on IPv6p. 671
Enable a trustworthy network by source address spoofing prevention routers : a formal descriptionp. 681
A flexible bound admission control algorithm for vertical handover in ubiquitous environmentp. 692
Network probabilistic connectivity : using node cutsp. 702
Fast mounting and recovery for NAND flash memory based embedded systemsp. 710
Broadcast encryption using efficient key distribution and renewal for ubiquitous environmentsp. 721
A robust verifiably encrypted signature schemep. 731
Instruction re-selection for iterative modulo scheduling on high performance multi-issue DSPsp. 741
Predictability of least laxity first scheduling algorithm on multiprocessor real-time systemsp. 755
Saving register-file leakage power by monitoring instruction sequence in ROBp. 765
Run-time memory optimization for DDMB architecture through a CCB algorithmp. 775
Code generation and optimization for Java-to-C compilersp. 785
Modelling and analysis of power consumption for component-based embedded softwarep. 795
Design of a programmable vertex processing unit for mobile platformsp. 805
An energy-aware whole-system dynamic emulator - SkyEyep. 815
Optimizing scheduling stability for runtime data alignmentp. 825
A Chinese mobile phone input method based on the dynamic and self-study language modelp. 836
An ID-based watermarking scheme for Java programsp. 848
Data-layout optimization using reuse distance distributionp. 858
Co-optimization of performance and power in a superscalar processor designp. 868
FAST : an efficient flash translation layer for flash memoryp. 879
A novel discrete Hopfield neural network approach for hardware-software partitioning of RTOS in the SoCp. 888
UML based evaluation of reconfigurable shape adaptive DCT for embedded stream processingp. 898
A high performance buffering of Java objects for Java card systems with flash memoryp. 908
Predictive prefetching of context-aware information in mobile networksp. 919
Digital ortho-image production for Web GIS applicationsp. 928
Multimedia contents security by wireless authenticationp. 936
Traffic actuated car navigation systems in mobile communication networksp. 946
Analytic model of the collision resolution protocol with voice/data in mobile networksp. 953
Security enhancement by detecting network address translation based on instant messagingp. 962
A new authentication scheme of binding update protocol on handover in mobile IPv6 networksp. 972
A solution for the dropout problem in adaptive cruise control range sensorsp. 979
An architecture framework for measuring and evaluating packet-switched voicep. 988
HOIDS-based detection method of vicious event in large networksp. 998
New handoff control method using fuzzy multi-criteria decision making in micro/pico-cellular networksp. 1006
Test of IR-DSRC in measuring vehicle speed for ITS applicationsp. 1012
A grid routing scheme considering node lifetime in ubiquitous sensor networksp. 1021
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program