The SCEAS System
Navigation Menu

Conferences in DBLP

Embedded and Ubiquitous Computing (euc)
2008 (conf/euc/2008-1)


  1. The Challenges and Opportunities in Transparent Computing. [Citation Graph (, )][DBLP]


  2. Research Issues and Challenges to Advance System Software for Multicore Processors and Data-Intensive Applications. [Citation Graph (, )][DBLP]


  3. Research Challenges in Distributed Cyber-Physical Systems. [Citation Graph (, )][DBLP]


  4. A Novel Approach to Hardware Architecture Design and Advanced Optimization Techniques for Time Critical Applications. [Citation Graph (, )][DBLP]


  5. Advanced Optimization and Design Issues of a 32-Bit Embedded Processor Based on Produced Order Queue Computation Model. [Citation Graph (, )][DBLP]


  6. A Low-Cost Embedded Controller for Complex Control Systems. [Citation Graph (, )][DBLP]


  7. Single Instruction Dual-Execution Model Processor Architecture. [Citation Graph (, )][DBLP]


  8. Hardware Support for Efficient Sparse Matrix Vector Multiplication. [Citation Graph (, )][DBLP]


  9. Accelerating Montgomery Modulo Multiplication for Redundant Radix-64k Number System on the FPGA Using Dual-Port Block RAMs. [Citation Graph (, )][DBLP]


  10. A State-Based Predictive Approach for Leakage Reduction of Functional Units. [Citation Graph (, )][DBLP]


  11. Automatic Integration of Non-Bus Hardware IP into SoC-Platforms for Use by Software. [Citation Graph (, )][DBLP]


  12. Control-Flow Checking Using Branch Instructions. [Citation Graph (, )][DBLP]


  13. A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems. [Citation Graph (, )][DBLP]


  14. Scheduling Aperiodic Tasks Using Total Bandwidth Server on Multiprocessors. [Citation Graph (, )][DBLP]


  15. Robust Feedback Control Scheduling in Distributed Embedded Real-Time Systems. [Citation Graph (, )][DBLP]


  16. RT-P2P: A Scalable Real-Time Peer-to-Peer System with Probabilistic Timing Assurances. [Citation Graph (, )][DBLP]


  17. Performance Comparison of Techniques on Static Path Analysis of WCET. [Citation Graph (, )][DBLP]


  18. Implementation and Evaluation of Caching Method to Increase the Speed of UPnP Gateway. [Citation Graph (, )][DBLP]


  19. TRAcME: Temporal Activity Recognition Using Mobile Phone Data. [Citation Graph (, )][DBLP]


  20. An Improved EMD Embedding Scheme Based on Secret Image Difference. [Citation Graph (, )][DBLP]


  21. A Lightweight Detection and Recovery Infrastructure of Kernel Objects for Embedded Systems. [Citation Graph (, )][DBLP]


  22. SPUMONE: Lightweight CPU Virtualization Layer for Embedded Systems. [Citation Graph (, )][DBLP]


  23. Optimizing the Embedded Caching and Prefetching Software on a Network-Attached Storage System. [Citation Graph (, )][DBLP]


  24. A Light Lock Management Mechanism for Optimizing Real-Time and Non-Real-Time Performance in Embedded Linux. [Citation Graph (, )][DBLP]


  25. Design and Optimization of a Java Ahead-of-Time Compiler for Embedded Systems. [Citation Graph (, )][DBLP]


  26. Different Fuzzy Parameter Selection Based on Multiple Criteria for Microcontroller. [Citation Graph (, )][DBLP]


  27. Adaptive Drowsy Cache Control for Java Applications. [Citation Graph (, )][DBLP]


  28. Dynamic and Leakage Power Minimization with Loop Voltage Scheduling and Assignment. [Citation Graph (, )][DBLP]


  29. A Low Power Error Detection Technique for Floating-Point Units in Embedded Applications. [Citation Graph (, )][DBLP]


  30. A Generalized Framework for System-Wide Energy Savings in Hard Real-Time Embedded Systems. [Citation Graph (, )][DBLP]


  31. Application Specific Low Power ALU Design. [Citation Graph (, )][DBLP]


  32. Fuzzy Self-Clustering for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  33. Secure Authentication in Wireless Sensor Networks Using RF Fingerprints. [Citation Graph (, )][DBLP]


  34. Toward a Platform for Service Discovery and Invocation in Disconnected Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  35. RADAR: Rate-Alert Dynamic RTS/CTS Exchange for Performance Enhancement in Multi-Rate Wireless Networks. [Citation Graph (, )][DBLP]


  36. Rule-Based WiFi Localization Methods. [Citation Graph (, )][DBLP]


  37. A Hybrid Anti-Collision Algorithm for RFID with Enhanced Throughput and Reduced Memory Consumption. [Citation Graph (, )][DBLP]


  38. A Scenario-based Directional Communication Performance in Wireless Ad hoc Networks. [Citation Graph (, )][DBLP]


  39. Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  40. Analysis of Data Delivery Delay in Acoustic Sensor Networks. [Citation Graph (, )][DBLP]


  41. A Collaboration-based Storage Management Scheme in Multimedia Sensor Networks. [Citation Graph (, )][DBLP]


  42. Adaptive Buffer Management for Efficient Code Dissemination in Multi-Application Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  43. Cooperative Node Localization for Mobile Sensor Networks. [Citation Graph (, )][DBLP]


  44. An Integrated Deployment Tool for ZigBee-Based Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  45. Quorum-Based Energy Saving MAC Protocol Design for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  46. An Energy-Efficient Waiting Caching Algorithm in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  47. A Grid-Based Distributed Multi-Hop Routing Protocol for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  48. Research on a Novel Multicast Routing Hybrid Optimization Algorithm and Its Application. [Citation Graph (, )][DBLP]


  49. Countering DDoS and XDoS Attacks against Web Services. [Citation Graph (, )][DBLP]


  50. Dimensional Bubble Flow Control and Fully Adaptive Routing in the 2-D Mesh Network on Chip. [Citation Graph (, )][DBLP]


  51. A Direction Based Geographic Routing Scheme for Intermittently Connected Mobile Networks. [Citation Graph (, )][DBLP]


  52. Evaluating the Effect of Inter Process Communication Efficiency on High Performance Distributed Scientific Computing. [Citation Graph (, )][DBLP]


  53. Hierarchical Cluster-Based Irregular Topology Customization for Networks-on-Chip. [Citation Graph (, )][DBLP]


  54. Design and Analysis of a Stable Queue Control Scheme for the Internet. [Citation Graph (, )][DBLP]


  55. A Probabilistic Approach to Consistency Checking for Pervasive Context. [Citation Graph (, )][DBLP]


  56. Human Universality in Ubiquitous Computing: Maslow, Where Are You? [Citation Graph (, )][DBLP]


  57. Learning in Small and Large Ubiquitous Computing Environments. [Citation Graph (, )][DBLP]


  58. Testing and Debugging Persistent Computing Systems: A New Challenge in Ubiquitous Computing. [Citation Graph (, )][DBLP]


  59. Load Balancing in Peer-to-Peer Networks Based on Sampling System States. [Citation Graph (, )][DBLP]


  60. The Effect of Routing-Load Dispersion on Congestion Control in Structured P2P Networks. [Citation Graph (, )][DBLP]


  61. AMBP: An Adaptive Mailbox Based Protocol for Mobile Agent Communication. [Citation Graph (, )][DBLP]


  62. A Self-configuring Personal Agent Platform for Pervasive Computing. [Citation Graph (, )][DBLP]


  63. Dynamic Substitutability Analysis of Web Service Composition via Extended Pi-Calculus. [Citation Graph (, )][DBLP]


  64. Efficient Self-Healing Key Distribution with Limited Group Membership for Communication-Constrained Networks. [Citation Graph (, )][DBLP]


  65. An Empirical Study on Interoperability between Service Discovery Protocols. [Citation Graph (, )][DBLP]


  66. A Reasonable Approach for Defining Load Index in Parallel Computing. [Citation Graph (, )][DBLP]


  67. UMDD: User Model Driven Software Development. [Citation Graph (, )][DBLP]


  68. A Hybrid Fault Tolerance Method for Recovery Block with a Weak Acceptance Test. [Citation Graph (, )][DBLP]


  69. Data Management for Context-Aware Computing. [Citation Graph (, )][DBLP]


  70. Efficient Data Scheduling for Multi-item Queries in On-Demand Broadcast. [Citation Graph (, )][DBLP]


  71. Lossless Data Hiding Based on Histogram Modification for Image Authentication. [Citation Graph (, )][DBLP]


  72. A New Proxy Scheme for Large-Scale P2P VoD System. [Citation Graph (, )][DBLP]


  73. A Signature-based Grid Index Design for RFID Main-Memory Databases. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002