The SCEAS System
Navigation Menu

Conferences in DBLP

Embedded and Ubiquitous Computing (euc)
2007 (conf/euc/2007w)

  1. Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks. [Citation Graph (, )][DBLP]

  2. A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions. [Citation Graph (, )][DBLP]

  3. The Case Study of Information Security System for International Airports. [Citation Graph (, )][DBLP]

  4. Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-Markov Cost Models. [Citation Graph (, )][DBLP]

  5. An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System. [Citation Graph (, )][DBLP]

  6. UPS - An Ubiquitous Proximity eService for Trust Collaboration. [Citation Graph (, )][DBLP]

  7. Obligations for Privacy and Confidentiality in Distributed Transactions. [Citation Graph (, )][DBLP]

  8. Multi-channel Enhancements for IEEE 802.11-Based Multi-hop Ad-Hoc Wireless Networks. [Citation Graph (, )][DBLP]

  9. An Intelligent Event-Driven Interface Agent for Interactive Digital Contents in Ubiquitous Environments. [Citation Graph (, )][DBLP]

  10. A Loop-Based Key Management Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  11. A MAC Protocol with Little Idle Listening for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  12. Security Technologies Based on Home Gateway for Making Smart Home Secure. [Citation Graph (, )][DBLP]

  13. Layered Peer to Peer Streaming Using Hidden Markov Models. [Citation Graph (, )][DBLP]

  14. Optimum Power Controller for Random Number Generator in the Crypto Module of Ubiquitous Computing Environment. [Citation Graph (, )][DBLP]

  15. Problem Localization for Automated System Management in Ubiquitous Computing. [Citation Graph (, )][DBLP]

  16. A High Speed Analog to Digital Converter for Ultra Wide Band Applications. [Citation Graph (, )][DBLP]

  17. Design and DSP Software Implementation of Mobile WiMAX Baseband Transceiver Functions. [Citation Graph (, )][DBLP]

  18. Cross-Layer Design for IEEE 802.16-2005 System Using Platform-Based Methodologies. [Citation Graph (, )][DBLP]

  19. A Dynamic Frequency Allocation Scheme for IEEE 802.16 OFDMA-Based WMANs Using Hungary Algorithm. [Citation Graph (, )][DBLP]

  20. Wireless Network Management System for WiMAX / Wi-Fi Mesh Networks. [Citation Graph (, )][DBLP]

  21. An Implementation of QoS Framework for Heterogeneous Networks. [Citation Graph (, )][DBLP]

  22. An Energy-Efficient MAC Design for IEEE 802.15.4-Based Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  23. A Cross-Layer Signaling and Middleware Platform for Multi-interface Mobile Devices. [Citation Graph (, )][DBLP]

  24. Enhanced Sleep Mode Operations for Energy Saving in IEEE 802.16e. [Citation Graph (, )][DBLP]

  25. Enhanced Fingerprint-Based Location Estimation System in Wireless LAN Environment. [Citation Graph (, )][DBLP]

  26. Improving Channel Scanning Procedures for WLAN Handoffs. [Citation Graph (, )][DBLP]

  27. A Multicast Extension for Enhanced Mobile IP by Home Agent Handover. [Citation Graph (, )][DBLP]

  28. Autonomic Multi-server Distribution in Flash Crowds Alleviation Network. [Citation Graph (, )][DBLP]

  29. Generic Energy-Efficient Geographic Routing for Ad-Hoc Wireless Networks. [Citation Graph (, )][DBLP]

  30. Description of a New Feature Meta-model. [Citation Graph (, )][DBLP]

  31. Studying of Multi-dimensional Based Replica Management in Object Storage System. [Citation Graph (, )][DBLP]

  32. Communication Model Exploration for Distributed Embedded Systems and System Level Interpretations. [Citation Graph (, )][DBLP]

  33. An End-to-End QoS Adaptation Architecture for the Integrated IntServ and DiffServ Networks. [Citation Graph (, )][DBLP]

  34. Ubiquitous Laboratory: A Research Support Environment for Ubiquitous Learning Based on Sensor Networks. [Citation Graph (, )][DBLP]

  35. Intelligent Monitoring Using Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  36. On the Design of Micro-mobility for Mobile Network. [Citation Graph (, )][DBLP]

  37. ANSWER: Adaptive Network Selection in WLAN/UMTS EnviRonment. [Citation Graph (, )][DBLP]

  38. Self-authorized Public Key Management for Home Networks. [Citation Graph (, )][DBLP]

  39. A Cross-Layered Diagnostician in OSGi Platform for Home Network. [Citation Graph (, )][DBLP]

  40. LaMSM: Localization Algorithm with Merging Segmented Maps for Underwater Sensor Networks. [Citation Graph (, )][DBLP]

  41. TinyOS-Based Gateway for Underwater Acoustics/Radio Frequency Communication. [Citation Graph (, )][DBLP]

  42. An Energy Scheduling Algorithm for Ensuring the Pre-determined Lifetime in Sensor Network. [Citation Graph (, )][DBLP]

  43. Underwater Acoustic Communication and Modem-Based Navigation Aids. [Citation Graph (, )][DBLP]

  44. State-of-the-Art in MAC Protocols for Underwater Acoustics Sensor Networks. [Citation Graph (, )][DBLP]

  45. An Ultrasonic Sensor Based Low-Power Acoustic Modem for Underwater Communication in Underwater Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  46. UWA-NAV - Energy Efficient Error Control Scheme for Underwater Acoustic Sensor Network. [Citation Graph (, )][DBLP]

  47. Underwater Wideband Source Localization Using the Interference Pattern Matching. [Citation Graph (, )][DBLP]

  48. A New Virtual Select Database Operation for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  49. GT2 - Reduced Wastes Time Mechanism for Underwater Acoustic Sensor Network. [Citation Graph (, )][DBLP]

  50. Comparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks. [Citation Graph (, )][DBLP]

  51. An Efficient Mutual Authentication Protocol on RFID Tags. [Citation Graph (, )][DBLP]

  52. HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System. [Citation Graph (, )][DBLP]

  53. Target Classification in Sparse Sampling Acoustic Sensor Networks Using IDDC Algorithm. [Citation Graph (, )][DBLP]

  54. Scriptable Sensor Network Based Home-Automation. [Citation Graph (, )][DBLP]

  55. Applying Situation Awareness to Mobile Proactive Information Delivery. [Citation Graph (, )][DBLP]

  56. Energy-Efficiency on a Variable-Bitrate Device. [Citation Graph (, )][DBLP]

  57. The Secure DAES Design for Embedded System Application. [Citation Graph (, )][DBLP]

  58. Software Power Peak Reduction on Smart Card Systems Based on Iterative Compiling. [Citation Graph (, )][DBLP]

  59. Simultaneous Operation Scheduling and Operation Delay Selection to Minimize Cycle-by-Cycle Power Differential. [Citation Graph (, )][DBLP]

  60. A Simple Approach to Robust Optimal Pole Assignment of Decentralized Stochastic Singularly-Perturbed Computer Controlled Systems. [Citation Graph (, )][DBLP]

  61. Assured-Timeliness Integrity Protocols for Distributable Real-Time Threads with in Dynamic Distributed Systems. [Citation Graph (, )][DBLP]

  62. Evaluating Modeling Solutions on Their Ability to Support the Partitioning of Automotive Embedded Systems. [Citation Graph (, )][DBLP]

  63. Security Analysis of the Certificateless Signature Scheme Proposed at SecUbiq 2006. [Citation Graph (, )][DBLP]

  64. New Efficient Certificateless Signature Scheme. [Citation Graph (, )][DBLP]

  65. A Practical Identity-Based Signature Scheme from Bilinear Map. [Citation Graph (, )][DBLP]

  66. Linkable Ring Signatures from Linear Feedback Shift Register. [Citation Graph (, )][DBLP]

  67. A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem. [Citation Graph (, )][DBLP]

  68. A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks. [Citation Graph (, )][DBLP]

  69. Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. [Citation Graph (, )][DBLP]

  70. Two Approaches on Pairwise Key Path Establishment for Sensor Networks. [Citation Graph (, )][DBLP]

  71. An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. [Citation Graph (, )][DBLP]

  72. Low-Cost and Strong-Security RFID Authentication Protocol. [Citation Graph (, )][DBLP]

  73. A Ticket Based Binding Update Authentication Method for Trusted Nodes in Mobile IPv6 Domain. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002