The SCEAS System
Navigation Menu

Conferences in DBLP

Embedded and Ubiquitous Computing (euc)
2005 (conf/euc/2005w)

  1. Naoharu Yamada, Kenji Sakamoto, Goro Kunito, Kenichi Yamazaki, Satoshi Tanaka
    Human Activity Recognition Based on Surrounding Things. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1-10 [Conf]
  2. Jingyu Li, Yuanchun Shi
    Baton: A Service Management System for Coordinating Smart Things in Smart Spaces. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:11-20 [Conf]
  3. Thierry Bodhuin, Gerardo Canfora, Rosa Preziosi, Maria Tortorella
    An Extensible Ubiquitous Architecture for Networked Devices in Smart Living Environments. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:21-30 [Conf]
  4. Ichiro Satoh
    A World Model for Smart Spaces. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:31-40 [Conf]
  5. Goreti Marreiros, Carlos Ramos, José Neves
    Dealing with Emotional Factors in Agent Based Ubiquitous Group Decision. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:41-50 [Conf]
  6. Hongliang Gu, Yuanchun Shi, Guangyou Xu, Yu Chen
    A Multi-agent Software Platform Accommodating Location-Awareness for Smart Space. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:51-60 [Conf]
  7. Flora Dilys Salim, Shonali Krishnaswamy, Seng Wai Loke, Andry Rakotonirainy
    Context-Aware Ubiquitous Data Mining Based Agent Model for Intersection Safety. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:61-70 [Conf]
  8. Takao Takenouchi, Takahiro Kawamura, Akihiko Ohsuga
    Development of Knowledge-Filtering Agent Along with User Context in Ubiquitous Environment. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:71-80 [Conf]
  9. Alexandre Courbot, Gilles Grimaud, Jean-Jacques Vandewalle, David Simplot-Ryl
    Application-Driven Customization of an Embedded Java Virtual Machine. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:81-90 [Conf]
  10. Min-Sik Jin, Won-Ho Choi, Yoon-Sim Yang, Min-Soo Jung
    A Study on Fast JCVM with New Transaction Mechanism and Caching-Buffer Based on Java Card Objects with a High Locality. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:91-100 [Conf]
  11. Jhing-Fa Wang, Han-Jen Hsu, Jyun-Sian Li
    Intelligent Object Extraction Algorithm Based on Foreground/Background Classification. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:101-110 [Conf]
  12. Tatsuo Takahashi, Satoshi Tanaka, Kenichi Yamazaki, Tadanori Mizuno
    Thin Client Based User Terminal Architecture for Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:111-120 [Conf]
  13. Ryohei Sagara, Yasue Kishino, Tsutomu Terada, Tomoki Yoshihisa, Masahiko Tsukamoto, Shojiro Nishio
    An Application Development Environment for Rule-Based I/O Control Devices. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:121-130 [Conf]
  14. Yongyun Cho, Joohyun Han, Jaeyoung Choi, Chae Woo Yoo
    A uWDL Handler for Context-Aware Workflow Services in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:131-140 [Conf]
  15. Stanislav Kurkovsky, Vladimir Zanev, Anatoly Kurkovsky
    SMMART, a Context-Aware Mobile Marketing Application: Experiences and Lessons. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:141-150 [Conf]
  16. Kwang-il Hwang, Won-Hee Lee, Seok-hwan Kim, Doo Seop Eom, Kyeong Hur
    Ubiquitous Organizational Information Service Framework for Large Scale Intelligent Environments. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:151-160 [Conf]
  17. Fran Jarnjak, Jinhyung Kim, Yixin Jing, Hoh Peter In, Dongwon Jeong, Doo-Kwon Baik
    TS-U: Temporal-Spatial Methodology for Application Checking of the Systems in the Ubiquitous Environment. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:161-170 [Conf]
  18. Hsuan-Pu Chang, Wen-Chih Chang, Yun-Long Sie, Nigel H. Lin, Chun-Hong Huang, Timothy K. Shih, Qun Jin
    Ubiquitous Learning on Pocket SCORM. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:171-179 [Conf]
  19. Su-Li Chin, Chun-Hong Huang, Chia-Tong Tang, Jason C. Hung
    An Application Based on Spatial-Relationship to Basketball Defensive Strategies. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:180-188 [Conf]
  20. Owen Macindoe, Mary Lou Maher
    Intrinsically Motivated Intelligent Rooms. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:189-197 [Conf]
  21. Sungbo Seo, Jaewoo Kang, Keun Ho Ryu
    Multivariate Stream Data Reduction in Sensor Network Applications. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:198-207 [Conf]
  22. Mohamed Baqer, Asad I. Khan, Zubair A. Baig
    Implementing a Graph Neuron Array for Pattern Recognition Within Unstructured Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:208-217 [Conf]
  23. Dongyu Shi, Jinyuan You, Zhengwei Qi
    Building Graphical Model Based System in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:218-227 [Conf]
  24. Cheol-Min Park, Dae-Won Kim, Jun Hwang
    Energy-Aware Broadcasting Method for Wireless Sensor Network. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:228-237 [Conf]
  25. Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Leonard Barolli
    Anonymous Routing in Wireless Mobile Ad Hoc Networks to Prevent Location Disclosure Attacks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:238-247 [Conf]
  26. Minwoo Son, Soonyong Choi, Dongil Shin, Dongkyoo Shin
    The Design and Implementation of a Location-Aware Service Bundle Manager in Smart Space Environments. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:248-257 [Conf]
  27. Jae Yeol Lee, Dong Woo Seo
    A Context-Aware and Augmented Reality-Supported Service Framework in Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:258-267 [Conf]
  28. Dilmurat Tilwaldi, Toshiya Takahashi, Yuichiro Mishima, Jun Sawamoto, Hisao Koizumi
    A Smart Method of Cooperative Learning Including Distant Lectures and Its Experimental Evaluations. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:268-277 [Conf]
  29. Soo Jin Lee, Moon-hae Kim
    u-KoMIPS: A Medical Image Processing System in a Ubiquitous Environment. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:278-287 [Conf]
  30. Sungjune Hong, Sunyoung Han, Kwanho Song
    The Extended PARLAY X for an Adaptive Context-Aware Personalized Service in a Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:288-297 [Conf]
  31. Wen-Yang Wang, Chih-Chieh Chuang, Yu-Sheng Lai, Ying-Hong Wang
    A Context-Aware System for Smart Home Applications. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:298-305 [Conf]
  32. Shinya Okuda, Shigeo Kaneda, Hirohide Haga
    Human Position/Height Detection Using Analog Type Pyroelectric Sensors. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:306-315 [Conf]
  33. Egil C. Østhus, Per-Oddvar Osland, Lill Kristiansen
    ENME: An ENriched MEdia Application Utilizing Context for Session Mobility; Technical and Human Issues. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:316-325 [Conf]
  34. Huajun Chen, Zhiyong Ye, Zhaohui Wu
    DartDataFlow: Semantic-Based Sensor Grid. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:326-334 [Conf]
  35. Kaori Fujinami, Tatsuo Nakajima
    Sentient Artefacts: Acquiring User's Context Through Daily Objects. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:335-344 [Conf]
  36. Victor Zamudio, Victor Callaghan, Jeannette Shiaw-Yuan Chin
    A Multi-dimensional Model for Task Representation and Allocation in Intelligent Environments. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:345-354 [Conf]
  37. Ismail Khalil Ibrahim, Reinhard Kronsteiner, Gabriele Kotsis
    Norms Enforcement as a Coordination Strategy in Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:355-364 [Conf]
  38. Kei Nakanishi, Makoto Setozaki, Jianhua Ma, Runhe Huang
    A Java-Based RFID Service Framework with Semantic Data Binding Between Real and Cyber Spaces. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:365-374 [Conf]
  39. Yusuke Doi, Shirou Wakayama, Masahiro Ishiyama, Satoshi Ozaki, Atsushi Inoue
    Kallima: A Tag-Reader Protocol for Privacy Enhanced RFID System. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:375-382 [Conf]
  40. JuSung Park, Jeonil Kang, DaeHun Nyang
    Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFID. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:383-392 [Conf]
  41. Tsung-Hsiang Chang, Chien-Ju Ho, David Chawei Hsu, Yuan-Hsiang Lee, Min-Shieh Tsai, Mu-Chun Wang, Jane Yung-jen Hsu
    iCane - A Partner for the Visually Impaired. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:393-402 [Conf]
  42. Dan Feng, Lingfang Zeng, Fang Wang, Shunda Zhang
    ORAID: An Intelligent and Fault-Tolerant Object Storage Device. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:403-412 [Conf]
  43. Rodrigo Lanka, Kentaro Oda, Takaichi Yoshida
    Architecture Based Approach to Adaptable Fault Tolerance in Distributed Object-Oriented Computing. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:413-422 [Conf]
  44. Jianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder
    Security Analysis of Michael: The IEEE 802.11i Message Integrity Code. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:423-432 [Conf]
  45. Kenichi Takahashi, Kouichi Sakurai, Makoto Amamiya
    A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:433-442 [Conf]
  46. Giuseppe De Marco, S. Loreto, Leonard Barolli
    Performance Analysis of IP Micro-mobility Protocols in Single and Simultaneous Movements Scenario. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:443-451 [Conf]
  47. Ying-Hong Wang, Hung-Jen Mao, Chih-Hsiao Tsai, Chih-Chieh Chuang
    HMRP: Hierarchy-Based Multipath Routing Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:452-459 [Conf]
  48. Joongheon Kim, Wonjun Lee, Eunkyo Kim, Joonmo Kim, Choonhwa Lee, Sungjin Kim, Sooyeon Kim
    On Energy-Aware Dynamic Clustering for Hierarchical Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:460-469 [Conf]
  49. Ji Young Choi, Chung Gu Kang, Yong-Suk Kim, Kyeong Hur
    Neighbor Node Discovery Algorithm for Energy-Efficient Clustering in Ubiquitious Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:470-479 [Conf]
  50. Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen
    A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:480-489 [Conf]
  51. YoungLok Lee, HyungHyo Lee, Seungyong Lee, HeeMan Park, BongNam Noh
    The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:490-498 [Conf]
  52. Chi-yau Lin, Chia-nan Ke, Shao-you Cheng, Jane Yung-jen Hsu, Hao-hua Chu
    Object Reminder and Safety Alarm. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:499-508 [Conf]
  53. Subhash Bhalla, Masaki Hasegawa
    Synchronization and Recovery in an Embedded Database System for Read-Only Transactions. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:509-518 [Conf]
  54. Qiangfu Zhao
    Learning with Data Streams - An NNTree Based Approach. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:519-528 [Conf]
  55. Kouichi Sakamoto, Qiangfu Zhao
    Generating Smart Robot Controllers Through Co-evolution. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:529-537 [Conf]
  56. Masao Yokota, Genci Capi
    Integrated Multimedia Understanding for Ubiquitous Intelligence Based on Mental Image Directed Semantic Theory. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:538-546 [Conf]
  57. Hui-Huang Hsu, Timothy K. Shih, Han-Bin Chang, Yi-Chun Liao, Chia-Tong Tang
    Hyper-Interactive Video Browsing by a Remote Controller and Hand Gestures. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:547-555 [Conf]
  58. Marios C. Angelides, Anastasis A. Sofokleous, Christos Schizas
    Mobile Computing with MPEG-21. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:556-565 [Conf]
  59. Binh An Truong, Young-Koo Lee, Sungyoung Lee
    A Unified Context Model: Bringing Probabilistic Models to Context Ontology. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:566-575 [Conf]
  60. Eun-Jun Yoon, Kee-Young Yoo
    Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:586-591 [Conf]
  61. Eric Angaman
    The Wrong Challenge of 'Pervasive Computing': The Paradigm of Sensor-Based Context-Awareness. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:592-601 [Conf]
  62. Mats Neovius
    An Abstract Model for Incentive-Enhanced Trust in P2P Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:602-611 [Conf]
  63. Yuki Yokohata, Hiroshi Sunaga, Hiroyuki Nakamura
    Construction of Credible Ubiquitous P2P Content Exchange Communities. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:612-621 [Conf]
  64. Hyuntae Cho, Yunju Baek
    Location-Based Routing Protocol for Energy Efficiency in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:622-631 [Conf]
  65. Paul S. Usher, Neil C. Audsley
    Efficient Access of Remote Resources in Embedded Networked Computer Systems. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:632-641 [Conf]
  66. Jaroslaw Domaszewicz, Michal Rój
    Lightweight Ontology-Driven Representations in Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:642-651 [Conf]
  67. Eiko Yoneki, Jean Bacon
    Object Tracking Using Durative Events. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:652-662 [Conf]
  68. Yan Annie Ding, David Everitt
    Design of Integrated Routing System for Mobile Ad Hoc Networks Overlaying Peer-to-Peer Applications. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:663-672 [Conf]
  69. Byungil Lee, Howon Kim
    A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access Control. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:673-682 [Conf]
  70. Kun Myon Choi, Eui-nam Huh, Hyunseung Choo
    Efficient Resource Management Scheme of TCP Buffer Tuned Parallel Stream to Optimize System Performance. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:683-692 [Conf]
  71. Euijik Kim, Meejoung Kim, Sung-Kwan Youm, Seokhoon Choi, Chul-Hee Kang
    Multi-level Service Differentiation Scheme for the IEEE 802.15.4 Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:693-703 [Conf]
  72. YoungLok Lee, HyungHyo Lee, Seungyong Lee, InSu Kim, BongNam Noh
    Development of Event Manager and Its Application in Jini Environment. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:704-713 [Conf]
  73. Ming-Hui Tsai, Tzu-Chiang Chiang, Yueh-Min Huang
    On Scalability and Mobility Management of Hierarchical Large-Scale Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:714-723 [Conf]
  74. Xinli Huang, Wenju Zhang, Fanyuan Ma, Yin Li
    Exploring Small-World-Like Topologies Via SplitProber: Turning Power Laws into an Advantage in Unstructured Overlays. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:724-733 [Conf]
  75. Woo-Jae Kim, Joo-Young Baek, Sun-Don Lee, Young-Joo Suh, Yun-Sung Kim, Jin-A Kim
    Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 802.16 System. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:734-743 [Conf]
  76. Tom Chothia, Konstantinos Chatzikokolakis
    A Survey of Anonymous Peer-to-Peer File-Sharing. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:744-755 [Conf]
  77. Giscard Wepiwé, Sahin Albayrak
    A Churn-Resistant Strategy for a Highly Reliable P2P System. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:756-765 [Conf]
  78. Honghao Wang, Yiming Hu
    Building a Peer-to-Peer Overlay for Efficient Routing and Low Maintenance. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:766-775 [Conf]
  79. Lingjun Qin, Dan Feng
    Dynamic Object Assignment in Object-Based Storage Devices. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:776-784 [Conf]
  80. Sameer Tilak, Kenneth Chiu, Nael B. Abu-Ghazaleh, Tony Fountain
    Dynamic Resource Discovery for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:785-796 [Conf]
  81. Ana I. González-Tablas, K. Kursawe, Benjamín Ramos, Arturo Ribagorda
    Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:797-806 [Conf]
  82. Ajay D. Kshemkalyani
    Predicate Detection Using Event Streams in Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:807-816 [Conf]
  83. Fangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen
    Identity-Based Universal Designated Verifier Signatures. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:825-834 [Conf]
  84. Xinyi Huang, Yi Mu, Willy Susilo, Futai Zhang
    Short Designated Verifier Proxy Signature from Pairings. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:835-844 [Conf]
  85. Zhiping Jia, Xinxiao Qiao
    An Embedded Gateway Based on Real-Time Database. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:845-853 [Conf]
  86. Shidi Xu, Yi Mu, Willy Susilo
    Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:854-863 [Conf]
  87. Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon Kim, Kyoil Chung
    Collision Attack on XTR and a Countermeasure with a Fixed Pattern. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:864-873 [Conf]
  88. Takumi Endo, Junichi Miura, Koichi Nanashima, Shoichi Morimoto, Yuichi Goto, Jingde Cheng
    Security in Persistently Reactive Systems. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:874-883 [Conf]
  89. So-Young Park, Sang-Ho Lee
    ID-Based Access Control and Authority Delegations. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:884-893 [Conf]
  90. Jun Anzai, Tsutomu Matsumoto
    How to Construct Secure Cryptographic Location-Based Services. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:894-904 [Conf]
  91. Hoang Nam Nguyen, Hiroaki Morino
    A Key Management Scheme for Mobile Ad Hoc Networks Based on Threshold Cryptography for Providing Fast Authentication and Low Signaling Load. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:905-915 [Conf]
  92. Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakurai
    Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:916-925 [Conf]
  93. Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee
    Authenticated Public Key Distribution Scheme Without Trusted Third Party. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:926-935 [Conf]
  94. Bok-Min Goi, Raphael Chung-Wei Phan, M. U. Siddiqi
    Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:936-944 [Conf]
  95. Eun Young Choi, Su-Mi Lee, Dong Hoon Lee
    Efficient RFID Authentication Protocol for Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:945-954 [Conf]
  96. Eun-Jun Yoon, Kee-Young Yoo
    A New Simple Authenticated Key Agreement and Protected Password Change Protocol. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:955-964 [Conf]
  97. Yunho Lee, Kwang-Woo Lee, Seungjoo Kim, Dongho Won, Hyungkyu Yang
    A Method for Deciding Quantization Steps in QIM Watermarking Schemes. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:965-975 [Conf]
  98. Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Kyuhyung Cho, Jongsub Moon
    A New DDoS Detection Model Using Multiple SVMs and TRA. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:976-985 [Conf]
  99. Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon
    PPF Model with CTNT to Defend Web Server from DDoS Attack. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:986-995 [Conf]
  100. Sooyeon Shin, Taekyoung Kwon
    Efficient Key Agreement for Merging Clusters in Ad-Hoc Networking Environments. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:996-1005 [Conf]
  101. Gunhee Lee, Wonil Kim, Dong-Kyoo Kim
    An Effective Method for Location Privacy in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1006-1015 [Conf]
  102. Zhaoyu Liu, Peeyush Sharma, Jian Raymond Li
    Integrated Support for Location Aware Security Services in Enterprise Wireless Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1016-1024 [Conf]
  103. Vinay Deolalikar, John Recker, Malena R. Mesarina, Salil Pradhan
    Optimal Scheduling for Networks of RFID Readers. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1025-1035 [Conf]
  104. Shailesh M. Birari, Sridhar Iyer
    PULSE: A MAC Protocol for RFID Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1036-1046 [Conf]
  105. S. Anusha, Sridhar Iyer
    RFIDcover - A Coverage Planning Tool for RFID Networks with Mobile Readers. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1047-1057 [Conf]
  106. Elaine Lai, Andrew Redfern, Paul Wright
    Vibration Powered Battery-Assisted Passive RFID Tag. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1058-1068 [Conf]
  107. C. Philipp Schloter, Hamid K. Aghajan
    Wireless RFID Networks for Real-Time Customer Relationship Management. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1069-1077 [Conf]
  108. Yong Hwan Lee, Hee Jung Kim, Byeong-hee Roh, Seung W. Yoo, Y. C. Oh
    Tree-Based Classification Algorithm for Heterogeneous Unique Item ID Schemes. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1078-1087 [Conf]
  109. Sung Jin Choi, Hee Yong Youn
    An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1088-1097 [Conf]
  110. Kyung Tae Kim, Hee Yong Youn
    Energy-Driven Adaptive Clustering Hierarchy (EDACH) for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1098-1107 [Conf]
  111. Wang Jin, Shu Lei, Jinsung Cho, Young-Koo Lee, Sungyoung Lee, Yonil Zhung
    A Load-Balancing and Energy-Aware Clustering Algorithm in Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1108-1117 [Conf]
  112. Hyang-tack Lee, Yong-hyun Jo, Byeong-hee Roh, Seung W. Yoo
    Energy-Efficient Cluster Reconfiguration with Fair Cluster Formations in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1118-1127 [Conf]
  113. Lynn Choi, Kwangseok Choi, Jungsun Kim, Byung Joon Park
    Virtual Sink Rotation: Low-Energy Scalable Routing Protocol for Ubiquitous Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1128-1137 [Conf]
  114. Young-Mi Song, Sung-Hee Lee, Young-Bae Ko
    FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1138-1147 [Conf]
  115. Sangsoo Lee, Daeyoung Kim, Sungjin Ahn, Noseong Park
    Power-Aware Position Vector Routing for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1148-1156 [Conf]
  116. Zhao Li, Wei Zhang, Hengchang Liu, Baohua Zhao, Yugui Qu
    Multicast Routing with Minimum Energy Cost and Minimum Delay in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1157-1168 [Conf]
  117. Yun Kyung Lee, Eui Hyeok Kwon, Jae-Sung Lim
    Self Location Estimation Scheme Using ROA in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1169-1177 [Conf]
  118. Yu Gu, Wei Zhang, Hengchang Liu, Baohua Zhao, Yugui Qu
    Energy-Efficient Target Localization Based on a Prediction Model. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1178-1190 [Conf]
  119. Wonwoo Jung, Sujeong Shin, Sukwon Choi, Hojung Cha
    Reducing Congestion in Real-Time Multi-party-tracking Sensor Network Applications. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1191-1200 [Conf]
  120. Qi Zhou, Takuya Asaka, Tatsuro Takahashi
    Variable-Radii Method Based on Probing Mechanism (VRPM): An Energy Conservation Method for Wireless Active Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1201-1210 [Conf]
  121. Satoshi Yamane
    Automata-Theoretic Performance Analysis Method of Soft Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1211-1224 [Conf]
  122. Ali Sajjad, Hassan Jameel, Umar Kalim, Young-Koo Lee, Sungyoung Lee
    A Component-based Architecture for an Autonomic Middleware Enabling Mobile Access to Grid Infrastructure. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1225-1234 [Conf]
  123. Roy Sterritt, Grainne Garrity, Edward Hanna, Patricia O'Hagan
    Autonomic Agents for Survivable Security Systems. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1235-1244 [Conf]
  124. Roy Sterritt, Michael G. Hinchey, James L. Rash, Walt Truszkowski, Christopher Rouff, Denis Gracanin
    Towards Formal Specification and Generation of Autonomic Policies. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1245-1254 [Conf]
  125. Fang-Yie Leu, Wei-Jie Yang
    Intrusion Detection with CUSUM for TCP-Based DDoS. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1255-1264 [Conf]
  126. Yun Ji Na, Il Seok Ko
    A Digital Content Distribution Using a Group-key and Multi-layered Structure Based on Web. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1265-1272 [Conf]
  127. Jing Wu, Yi Mu, Jennifer Seberry, Chun Ruan
    Access Policy Sheet for Access Control in Fine-Grained XML. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1273-1282 [Conf]
  128. Kazuki Iwamoto, Tadashi Dohi, Naoto Kaio
    Monitoring the Health Condition of a Ubiquitous System: Rejuvenation vs. Recovery. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1283-1292 [Conf]
  129. Changyeol Choi, Sungsoo Kim
    A Dependability Management Mechanism for Ubiquitous Computing Systems. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1293-1302 [Conf]
  130. Junichiro Saito, Kenji Imamoto, Kouichi Sakurai
    Reassignment Scheme of an RFID Tag's Key for Owner Transfer. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1303-1312 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002