The SCEAS System
Navigation Menu

Conferences in DBLP

Embedded and Ubiquitous Computing (euc)
2006 (conf/euc/2006w)

  1. Kensuke Tanaka, Noriko Matsumoto, Norihiko Yoshida
    Adaptive Router Promotion in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:1-10 [Conf]
  2. Jiujun Cheng, Yuhong Li, Weiwei Jiao, Jian Ma
    A Utility-Based Auction Cooperation Incentive Mechanism in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:11-21 [Conf]
  3. MinHwan Ok, Daegeun Kim, Myong-Soon Park
    UbiqStor: Server and Proxy for Remote Storage of Mobile Devices. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:22-31 [Conf]
  4. Chao-Lieh Chen, Chia-Yu Yu, Chien-Chung Su, Mong-Fong Horng, Yau-Hwang Kuo
    Packet Length Adaptation for Energy-Proportional Routing in Clustered Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:32-42 [Conf]
  5. Jae-Woo Chang, Yong-Ki Kim
    A New Context Script Language for Developing Context-Aware Application Systems in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:43-52 [Conf]
  6. Tan Zhipeng, Feng Dan
    Dynamic Replication Strategies for Object Storage Systems. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:53-61 [Conf]
  7. Hye-Young Kim
    A Cost-Effective Mobility Modelling in Nested Network Mobility. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:62-71 [Conf]
  8. Yong Zhang, Ningjiang Chen, Jun Wei, Tao Huang
    Completing UML Model of Component-Based System with Middleware for Performance Evaluation. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:72-82 [Conf]
  9. Eunchang Choi, Jae-Doo Huh, Soo-Joong Kim, WoongChul Choi
    Energy Efficient PNC Selection Procedure for the IEEE 802.15.3-Based HR-WPAN. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:83-92 [Conf]
  10. Kyung-Jin Bae, Dong-Hee Kwon, Woo-Jae Kim, Young-Joo Suh
    An Efficient Multicast Routing Protocol in Multi-rate Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:93-102 [Conf]
  11. In-Hwan Kim, Hoo-Jong Kim, Gu-Min Jeong
    WPAN Platform Design in Handset Integrating Cellular Network and Its Application to Mobile Games. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:103-111 [Conf]
  12. Ming-Hui Tsai, Tzu-Chiang Chiang, Yueh-Min Huang
    Reliable Transporting and Optimal Routing on Rate-Based for Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:112-121 [Conf]
  13. Jonghun Park, Byung-Hyun Ha
    Automatic Extraction of Conversation Protocols from a Choreography Specification of Ubiquitous Web Services. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:122-132 [Conf]
  14. JungRyun Lee, Keunyoung Kim, YongHoon Lim
    Inter-sector Interference Mitigation Method in Triple-Sectored OFDMA Systems. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:133-143 [Conf]
  15. Hongding Wang, Shaohua Tan, Shiwei Tang, Dongqing Yang, Yunhai Tong
    File Correspondences Dictionary Construction in Multilingual P2P File Sharing Systems. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:144-152 [Conf]
  16. Hai Jin, Minghu Zhang, Pengliu Tan
    Lightweight Messages: True Zero-Copy Communication for Commodity Gigabit Ethernet. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:153-162 [Conf]
  17. Bin Wu, Ajay D. Kshemkalyani
    Evaluation of Models for Analyzing Unguided Search in Unstructured Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:163-172 [Conf]
  18. Yoonhee Kim, Eun-kyung Kim, Beom-Jun Jeon, In-Young Ko, Sung-Yong Park
    Wapee: A Fault-Tolerant Semantic Middleware in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:173-182 [Conf]
  19. Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
    Security in P2P Networks: Survey and Research Directions. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:183-192 [Conf]
  20. Shafique Ahmad Chaudhry, Ali Hammad Akbar, Ki-Hyung Kim, Suk-Kyo Hong, Won-Sik Yoon
    HYWINMARC: An Autonomic Management Architecture for Hybrid Wireless Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:193-202 [Conf]
  21. Marek Miskowicz
    Prediction Efficiency in Predictive p-CSMA/CD. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:203-212 [Conf]
  22. Heeseo Chae, Do-Hoon Kim, Dongwon Jeong, Hoh Peter In
    A Situation Aware Personalization in Ubiquitous Mobile Computing Environments. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:213-223 [Conf]
  23. Jesús Arturo Pérez Díaz, Victor Hugo Zárate Silva, Christian Cabrera
    A Network and Data Link Layer QoS Model to Improve Traffic Performance. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:224-233 [Conf]
  24. Eun-Ha Song, Sung-Kook Han, Laurence Tianruo Yang, Minyi Guo, Young-Sik Jeong
    A GML-Based Mobile Device Trace Monitoring System. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:234-243 [Conf]
  25. Chulho Won, Jong-Hoon Youn, Hesham Ali
    Impact of High-Mobility Radio Jamming in Large-Scale Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:244-251 [Conf]
  26. Youngjoon Seo, Hyunrok Lee, Kwangjo Kim
    A Scalable and Untraceable Authentication Protocol for RFID. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:252-261 [Conf]
  27. Daesung Kwon, Daewan Han, JooYoung Lee, Yongjin Yeom
    Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:262-270 [Conf]
  28. Taketsugu Yao, Shigeru Fukunaga, Toshihisa Nakai
    Reliable Broadcast Message Authentication in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:271-280 [Conf]
  29. HongKi Lee, DaeHun Nyang, JooSeok Song
    Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:281-290 [Conf]
  30. Seog Chung Seo, Hyung Chan Kim, R. S. Ramakrishna
    A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:291-301 [Conf]
  31. Seonho Choi, Yanggon Kim
    Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:302-311 [Conf]
  32. Kevin Tham, Mark Looi, Ernest Foo
    Ubiquitous Authorization Scheme Based on Device Profile. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:312-321 [Conf]
  33. Wun-She Yap, Swee-Huay Heng, Bok-Min Goi
    An Efficient Certificateless Signature Scheme. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:322-331 [Conf]
  34. Jin Li, Yanming Wang
    Universal Designated Verifier Ring Signature (Proof) Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:332-341 [Conf]
  35. Huiyan Chen, Shuwang Lü, Zhenhua Liu, Qing Chen
    An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:342-351 [Conf]
  36. Jin Li, Fangguo Zhang, Yanming Wang
    A Strong Identity Based Key-Insulated Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:352-361 [Conf]
  37. Jin Li, Fangguo Zhang, Yanming Wang
    A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:362-371 [Conf]
  38. Jens-Peter Kaps, Berk Sunar
    Energy Comparison of AES and SHA-1 for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:372-381 [Conf]
  39. Cheng-Hao Quan, Won-Kee Hong, Hiecheol Kim
    Performance Analysis of Tag Anti-collision Algorithms for RFID Systems. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:382-391 [Conf]
  40. Vinay Deolalikar, Malena R. Mesarina, John Recker, Salil Pradhan
    Perturbative Time and Frequency Allocations for RFID Reader Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:392-402 [Conf]
  41. Su-Ryun Lee, Chae-Woo Lee
    An Enhanced Dynamic Framed Slotted ALOHA Anti-collision Algorithm. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:403-412 [Conf]
  42. Kwang-il Hwang, Kyung Tae Kim, Doo Seop Eom
    DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:413-422 [Conf]
  43. Hyunsung Park, Jongdeok Kim
    Design and Implementation of a High-Speed RFID Data Filtering Engine. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:423-434 [Conf]
  44. Ming-Yang Chen, Ching-Nung Yang, Chi-Sung Laih
    Authorized Tracking and Tracing for RFID Tags. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:435-444 [Conf]
  45. Changsu Suh, Deepesh Man Shrestha, Young-Bae Ko
    An Energy-Efficient MAC Protocol for Delay-Sensitive Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:445-454 [Conf]
  46. Sung-Hyup Lee, Young-Soo Choi, Hee-Dong Park, Yoon-Young An, You Ze Cho
    A Data-Centric Self-organization Scheme for Energy-Efficient Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:455-464 [Conf]
  47. Kyung Tae Kim, Hyunsoo Kim, Hee Yong Youn
    Optimized Clustering for Maximal Lifetime of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:465-474 [Conf]
  48. Minh-Long Pham, Daeyoung Kim, Taehong Kim, Seongeun Yoo
    Maximize the Coverage Lifetime of Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:475-484 [Conf]
  49. Shinyoung Yi, Hojung Cha
    An Active Tracking System Using IEEE 802.15.4-Based Ultrasonic Sensor Devices. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:485-494 [Conf]
  50. Shuangquan Wang, Ningjiang Chen, Xin Chen, Jie Yang, Jun Lu
    LWOS: A Localization Method Without On-Body Sensor in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:495-504 [Conf]
  51. Young Yong Kim
    Research Directions in the Area of USN (Ubiquitous Sensor Network) Towards Practical UE (Ubiquitous Environments). [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:505-510 [Conf]
  52. Taejoon Park, Kang G. Shin
    On Building a Lightweight Security Architecture for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:511-521 [Conf]
  53. Chonggun Kim, Elmurod Talipov, Byoungchul Ahn
    A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:522-531 [Conf]
  54. Kwan-Woong Kim, Sung-Hwan Bae, Dae-Ik Kim
    Algorithms for Service Differentiation in MAC Layer over MANETs. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:532-539 [Conf]
  55. Kuang-Han Fei, Sheng-Yan Chuang, Sheng-De Wang
    A Power-Aware Routing Protocol Using Multi-Route Transmission for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:540-549 [Conf]
  56. Kang Jin Yoon, Tae Sung Kim, Young Yong Kim
    A Novel Multicasting Scheme over Wireless LAN Systems by Using Relay. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:550-559 [Conf]
  57. Eung Nam Ko
    An Adaptive Concurrency Control QOS Agent for Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:560-569 [Conf]
  58. Se Youn Ban, Seong Gon Choi, Jun Kyun Choi
    An Efficient End-to-End QoS Supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-Back for Ubiquitous and Distributed Applications. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:570-578 [Conf]
  59. Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won
    An RFID System Based MCLT System with Improved Privacy. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:579-590 [Conf]
  60. Hyunji Lee, Jongdeok Kim
    QT-CBP: A New RFID Tag Anti-collision Algorithm Using Collision Bit Positioning. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:591-600 [Conf]
  61. Antonio Coronato, Gennaro Della Vecchia, Giuseppe De Pietro
    An RFID-Based Access and Location Service for Pervasive Grids. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:601-608 [Conf]
  62. Jong-Eon Lee, Si-Ho Cha, Dae Young Kim, Kuk-Hyun Cho
    Autonomous Management of Large-Scale Ubiquitous Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:609-618 [Conf]
  63. Gunhee Lee, Song-hwa Chae, Inwhan Hwang, Manpyo Hong
    A Privacy-Aware Service Protocol for Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:619-628 [Conf]
  64. Se-Yul Lee, Bong-Hwan Lee, Yeong-Deok Kim, Dong-Myung Shin, Chan-Hyun Youn
    A Neural Network Model for Detection Systems Based on Data Mining and False Errors. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:629-638 [Conf]
  65. Ilsun You, Chel Park
    An Analysis on the Web Technologies for Dynamically Generating Web-Based User Interfaces in Ubiquitous Spaces. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:639-649 [Conf]
  66. Joonseon Ahn, Byeong-Mo Chang, Kyung-Goo Doh
    A Policy Description Language for Context-Based Access Control and Adaptation in Ubiquitous Environment. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:650-659 [Conf]
  67. Jong Hyuk Park, Sangjin Lee, Sung Hee Hong
    C-iUMS: Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous Home. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:660-670 [Conf]
  68. Syed Obaid Amin, Myung Soo Kang, Choong Seon Hong
    A Lightweight IP Traceback Mechanism on IPv6. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:671-680 [Conf]
  69. Jun Bi, Jianping Wu, Miao Zhang
    Enable a Trustworthy Network by Source Address Spoofing Prevention Routers: A Formal Description. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:681-691 [Conf]
  70. Jong Min Lee, Ok Sik Yang, Seong Gon Choi, Jun Kyun Choi
    A Flexible Bound Admission Control Algorithm for Vertical Handover in Ubiquitous Environment. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:692-701 [Conf]
  71. Denis A. Migov, Olga K. Rodionova, Alexey S. Rodionov, Hyunseung Choo
    Network Probabilistic Connectivity: Using Node Cuts. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:702-709 [Conf]
  72. Song-Hwa Park, Tae-Hoon Kim, Tae-Hoon Lee, Ki-Dong Chung
    Fast Mounting and Recovery for NAND Flash Memory Based Embedded Systems. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:710-720 [Conf]
  73. Deok-Gyu Lee, Jang-Su Park, Im-Yeong Lee
    Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:721-730 [Conf]
  74. Jianhong Zhang, Wei Zou
    A Robust Verifiably Encrypted Signature Scheme. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:731-740 [Conf]
  75. Doosan Cho, Ravi Ayyagari, Gang-Ryung Uh, Yunheung Paek
    Instruction Re-selection for Iterative Modulo Scheduling on High Performance Multi-issue DSPs. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:741-754 [Conf]
  76. Sangchul Han, Minkyu Park
    Predictability of Least Laxity First Scheduling Algorithm on Multiprocessor Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:755-764 [Conf]
  77. Wann-Yun Shieh, Hsin-Dar Chen
    Saving Register-File Leakage Power by Monitoring Instruction Sequence in ROB. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:765-774 [Conf]
  78. Jeonghun Cho, Yunheung Paek
    Run-Time Memory Optimization for DDMB Architecture Through a CCB Algorithm. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:775-784 [Conf]
  79. Youngsun Han, Shinyoung Kim, Hokwon Kim, Seokjoong Hwang, Seon Wook Kim
    Code Generation and Optimization for Java-to-C Compilers. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:785-794 [Conf]
  80. Jun Hu, Xuandong Li, Guoliang Zheng, Chenghua Wang
    Modelling and Analysis of Power Consumption for Component-Based Embedded Software. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:795-804 [Conf]
  81. Tae-Young Kim, Kyoung-su Oh
    Design of a Programmable Vertex Processing Unit for Mobile Platforms. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:805-814 [Conf]
  82. Cheng Yu, Kang Suo, Ren Jie, Zhu Hui, Shi Yuan Chun
    An Energy-Aware Whole-System Dynamic Emulator - SkyEye. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:815-824 [Conf]
  83. Ching-Hsien Hsu, Chao-Yang Lan, Shih-Chang Chen
    Optimizing Scheduling Stability for Runtime Data Alignment. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:825-835 [Conf]
  84. Qiaoming Zhu, Peifeng Li, Gu Ping, Peide Qian
    A Chinese Mobile Phone Input Method Based on the Dynamic and Self-study Language Model. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:836-847 [Conf]
  85. Zheng Yuan, Qiaoyan Wen, Wenling Wu, Qing Zhang
    An ID-Based Watermarking Scheme for Java Programs. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:848-857 [Conf]
  86. Xiong Fu, Yu Zhang, Yiyun Chen
    Data-Layout Optimization Using Reuse Distance Distribution. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:858-867 [Conf]
  87. Yongxin Zhu, Weng-Fai Wong, Stefan Andrei
    Co-optimization of Performance and Power in a Superscalar Processor Design. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:868-878 [Conf]
  88. Sang-Won Lee, Won-Kyoung Choi, Dong-Joo Park
    FAST: An Efficient Flash Translation Layer for Flash Memory. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:879-887 [Conf]
  89. Bing Guo, Yan Shen, Yue Huang, Zhishu Li
    A Novel Discrete Hopfield Neural Network Approach for Hardware-Software Partitioning of RTOS in the SoC. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:888-897 [Conf]
  90. Xianhui He, Yongxin Zhu, Zhenxin Sun, Yuzhuo Fu
    UML Based Evaluation of Reconfigurable Shape Adaptive DCT for Embedded Stream Processing. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:898-907 [Conf]
  91. Min-Sik Jin, Min-Soo Jung
    A High Performance Buffering of Java Objects for Java Card Systems with Flash Memory. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:908-918 [Conf]
  92. In Seon Choi, Gi Hwan Cho
    Predictive Prefetching of Context-Aware Information in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:919-927 [Conf]
  93. Hong-Gyoo Sohn, Hyo-Keun Park, Choung-Hwan Park, Joon Heo
    Digital Ortho-image Production for Web GIS Applications. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:928-935 [Conf]
  94. Jung Jae Kim, Kwang-Hyoung Lee, So Yeon Min, Jeong Gyu Jee
    Multimedia Contents Security by Wireless Authentication. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:936-945 [Conf]
  95. Seungjae Lee, Chungwon Lee, Taehee Kim, Jeong Hyun Kim
    Traffic Actuated Car Navigation Systems in Mobile Communication Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:946-952 [Conf]
  96. Dong Chun Lee
    Analytic Model of the Collision Resolution Protocol with Voice/Data in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:953-961 [Conf]
  97. Jun Bi, Miao Zhang, Lei Zhao
    Security Enhancement by Detecting Network Address Translation Based on Instant Messaging. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:962-971 [Conf]
  98. Jung Doo Koo, Jungsook Koo, Dong Chun Lee
    A New Authentication Scheme of Binding Update Protocol on Handover in Mobile IPv6 Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:972-978 [Conf]
  99. Bongsoo Son, Taehyung Kim, YongEun Shin
    A Solution for the Dropout Problem in Adaptive Cruise Control Range Sensors. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:979-987 [Conf]
  100. Hyuncheol Kim, Seong-Jin Ahn, Jun Kyun Choi
    An Architecture Framework for Measuring and Evaluating Packet-Switched Voice. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:988-997 [Conf]
  101. Dong Hwi Lee, Jeom Goo Kim, Kuinam J. Kim
    HOIDS-Based Detection Method of Vicious Event in Large Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:998-1005 [Conf]
  102. Jong Chan Lee, Dong Li, Ki Hong Park, Hong-Jin Kim
    New Handoff Control Method Using Fuzzy Multi-Criteria Decision Making in Micro/Pico-cellular Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:1006-1011 [Conf]
  103. Hyung Jin Kim, Jin-Tae Kim, Kee Yeon Hwang
    Test of IR-DSRC in Measuring Vehicle Speed for ITS Applications. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:1012-1020 [Conf]
  104. Sangjoon Park, Sok-Pal Cho, Byunggi Kim
    A Grid Routing Scheme Considering Node Lifetime in Ubiquitous Sensor Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:1021-1030 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002