Abstract is missing.
- Resource Discovery in Ubiquitous Health CareGautham V. Pallapa, Sajal K. Das. 1-6 [doi]
- Managing Privacy in LBAC SystemsClaudio Agostino Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati. 7-12 [doi]
- Pervasive Computing with Frugal ObjectsBenoît Garbinato, Rachid Guerraoui, Jarle Hulaas, Maxime Monod, Jesper Honig Spring. 13-18 [doi]
- A Secure MANET Routing Protocol with Resilience against Byzantine Behaviours of Malicious or Selfish NodesClaude Crépeau, Carlton R. Davis, Muthucumaru Maheswaran. 19-26 [doi]
- Trust Enhanced Secure Mobile Ad-Hoc Network RoutingVenkatesan Balakrishnan, Vijay Varadharajan, Phillip Lucs, Udaya Kiran Tupakula. 27-33 [doi]
- A Protocol for Macro Mobility and Multihoming Notification in Wireless Mesh NetworksRainer Baumann, Olga Bondareva, Simon Heimlicher, Martin May. 34-37 [doi]
- VOICE: A Framework for Speech-Based Mobile SystemsAdam Sharp, Stan Kurkovsky. 38-43 [doi]
- A Context-Based Delegation Access Control Model for Pervasive ComputingRamiro Liscano, Kaining Wang. 44-51 [doi]
- The Community Stack: Concept and PrototypeTuan Nguyen, Seng Wai Loke, Torab Torabi. 52-58 [doi]
- A Ubiquitous Fashionable Computer with an i-Throw Device on a Location-Based Service EnvironmentJupyung Lee, Seung Ho Lim, Jong-Woon Yoo, Ki-Woong Park, Hyun-Jin Choi, Kyu Ho Park. 59-65 [doi]
- Self-Organizing Spatial Regions for Sensor Network InfrastructuresNicola Bicocchi, Marco Mamei, Franco Zambonelli. 66-71 [doi]
- Multi-channel Busy-tone Multiple Access for Scalable Wireless Mesh NetworkHairong Zhou, Chi-Hsiang Yeh, Hussein T. Mouftah. 72-76 [doi]
- Secure Real-Time Traffic in Hybrid Mobile Ad Hoc NetworksIlkka Uusitalo, Teemu Vaisanen, Juhani Latvakoski. 77-84 [doi]
- RODMRP: Resilient On-Demand Multicast Routing ProtocolDhammika Pathirana, Minseok Kwon. 85-92 [doi]
- Building Pervasive Services Using Flock Sensor Network and Flock Container MiddlewareArne Munch-Ellingsen, Bjørn Thorstensen, Dan Peder Eriksen, Anders Andersen. 93-98 [doi]
- A Password-Based Authentication and Key Establishment Scheme for Mobile EnvironmentJun Liu, Jianxin Liao, Xiaomin Zhu. 99-104 [doi]
- pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained DevicesKi-Woong Park, Hyunchul Seok, Kyu Ho Park. 105-112 [doi]
- Mobile Wireless Sensor Network: Architecture and Enabling Technologies for Ubiquitous ComputingSaad Ahmed Munir, Biao Ren, Weiwei Jiao, Bin Wang, Dongliang Xie, Jian Ma. 113-120 [doi]
- Minimum Energy Range Assignment in Heterogeneous Ad-Hoc NetworksMiriam Di Ianni, Gianluca Rossi. 121-126 [doi]
- A Group-Based Dynamic Key Management Scheme in Wireless Sensor NetworksGuorui Li, Jingsha He, Yingfang Fu. 127-132 [doi]
- An Agent-Based Architecture for Context-Aware CommunicationRomelia Plesa, Luigi Logrippo. 133-138 [doi]
- Towards Device-Blending: Model and ChallengesHarinder Seera, Seng Wai Loke, Torab Torabi. 139-146 [doi]
- A Modular Architecture for Context SensingJulián Grigera, Andres Fortier, Gustavo Rossi, Silvia E. Gordillo. 147-152 [doi]
- Performance Evaluation of RFID Anti-Collision Algorithm with FPGA ImplementationHuansheng Ning, Yu Cong, Z.-Q. Xu, T. Hong, J.-C. Zhao, Yan Zhang. 153-158 [doi]
- Simulation Study of AODV Performance over IEEE 802.15.4 MAC in WSN with Mobile SinksCanfeng Chen, Jian Ma. 159-164 [doi]
- Cross Layer Routing for Multihop Cellular NetworksGovindan Kannan, Shabbir N. Merchant, Uday B. Desai. 165-170 [doi]
- An Efficient Online/Offline Signcryption Scheme for MANETZhong Xu, Guanzhong Dai, Deming Yang. 171-176 [doi]
- An Optimal Node Selection Scheme in Multi-hop Wireless NetworkJian Jiang, Jian Ma. 177-181 [doi]
- A Robust Lightweight Solution for RFID SecurityAnahita Vyas, Sheikh Iqbal Ahamed, Munirul M. Haque, Madhavi V. S. Jayanthi. 182-187 [doi]
- Profile-Based Sustained Service Lookup in Areas of Sudden Dense PopulationSherif G. Aly, Amal El-Nahas. 188-194 [doi]
- P2P-Leveraged Mobile Live StreamingJinfeng Zhang, Jianwei Niu, Rui He, Jianping Hu, Limin Sun. 195-200 [doi]
- PEAN: A Probabilistic Energy Aware Neighbor Monitoring Protocol for Mobile Ad Hoc NetworksHung-Yuan Hsu, Ali R. Hurson. 201-206 [doi]
- An Adaptable Crash Faults Detector for Mobile Ad-Hoc NetworksMourad Elhadef, Fahim Abdun-Nur. 207-212 [doi]
- A Parallel Multi-Path Routing Algorithm for Flexible Transmission in Wireless Sensor NetworksZhendong Wu, Shanping Li. 213-218 [doi]
- Design and Implementation of EPARK Wireless Parking Payment System Using Pervasive ComputingDarrel A. Mazzari, Patrick Seraphine, Sheikh Iqbal Ahamed, Sreekanth G. Balasubramanian. 219-224 [doi]
- Friend Pointer Registration Strategy and Its Scheme for Mobile Location ManagementDaqing Xu, Hisao Kameda. 225-230 [doi]
- Analytic Model of IEEE 802.15.4 with Download TrafficTae Ok Kim, Jin Soo Park, Bong Dae Choi. 231-235 [doi]
- TMBT: An Efficient Index Allocation Method for Multi-Channel Data BroadcastShuoi Wang, Hsing-Lung Chen. 236-242 [doi]
- Dynamic Bandwidth Management for Handoffs with RSVP in 802.16/WLAN EnvironmentYen-Wen Chen, I-Hsuan Peng, Shiu-Tsuen Guan. 243-248 [doi]
- Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial VehiclesM. T. Hyland, Barry E. Mullins, Rusty O. Baldwin, Michael A. Temple. 249-256 [doi]
- Mining Concept Drifts from Data Streams Based on Multi-ClassifiersYue Sun, Guojun Mao, Xu Liu, Chunnian Liu. 257-263 [doi]
- Interface Adaptation Based on User ExpectationXiaoyan Peng, Daniel L. Silver. 264-269 [doi]
- A Comparative Analysis of Personalization Techniques for a Mobile ApplicationPetteri Nurmi, Marja Hassinen, Kun Chang Lee. 270-275 [doi]
- Context-Aware Elevator SchedulingThomas Strang, Christian Bauer. 276-281 [doi]
- A Location-Aware Mobile Call Handling AssistantIbrahim Bokharouss, Wayne Wobcke, Yiu-Wa Chan, Andrew Limaru, Anna Wong. 282-289 [doi]
- Context Inferring in the Smart Home: An SWRL ApproachVincent Ricquebourg, David Durand, David Menga, Bruno Marhic, Laurent Delahoche, Christophe Logé, Anne-Marie Jolly-Desodt. 290-295 [doi]
- Fuzzy Logic-Based Event Notification in Sparse MANETsAnna K. Lekova, Katrine Stemland Skjelsvik, Thomas Plagemann, Vera Goebel. 296-301 [doi]
- Performance Analysis of Location Estimation Algorithm in ZigBee Networks Using Received Signal StrengthHyunggi Cho, Myungseok Kang, Jong Hyuk Park, Byungsung Park, Hagbae Kim. 302-306 [doi]
- Service Discovery Reliability and Network Neighbor Knowledge in Pervasive Computing EnvironmentsMichael S. Thompson, Scott F. Midkiff. 307-313 [doi]
- Cost-Function-Based Network Selection Strategy in Integrated Wireless and Mobile NetworksWei Shen, Qing-An Zeng. 314-319 [doi]
- Informing the Design of User Studies on Conceptual Interference FrameworksRicardo Morla, Nigel Davies. 320-325 [doi]
- Domain Modelling for Ubiquitous Computing ApplicationsAnthony Harrington, Vinny Cahill. 326-333 [doi]
- A Novel Adaptive Scheme to Improve the Performance of the IEEE 802.11n WLANsSangheetha Salai Parthasarathy, Qing-An Zeng. 334-339 [doi]
- A Dynamic Retargettable Multi-Protocol RFID Reader/WriterShinsuke Kobayashi, Ken Sakamura, Tatsushi Morokuma. 340-346 [doi]
- Speaker Tracking and Identifying Based on Indoor Localization System and Microphone ArrayXiaojie Chen, Yuanchun Shi, Wenfeng Jiang. 347-352 [doi]
- Java (J2ME) Front-End for Distributed Speech RecognitionDmitry Zaykovskiy, Alexander Schmitt. 353-357 [doi]
- Design of a Digital Baseband Processor for UWB Transceiver on RFID TagYuechao Niu, Majid Baghaei Nejad, Hannu Tenhunen, Li-Rong Zheng. 358-361 [doi]
- Service Configuration Management for Ambient Intelligence: The COMANCHE ApproachSara Grilli, Effie Makri, Konrad Steblovnik, Sofoklis Efremidis, Nikos Mouratidis, Petri Mähönen, Elena Meshkova. 362-367 [doi]
- Phygital Map: Accessing Digital Multimedia from Physical MapJin Nakazawa, Hideyuki Tokuda. 368-373 [doi]
- Using Mobile Agent-Based Middleware to Support Distributed Coordination for Vehicle TelematicsJinhua Guo, Guangming Xing. 374-379 [doi]
- On the Problem of Energy Efficiency of Multi-Hop vs One-Hop Routing in Wireless Sensor NetworksSzymon Fedor, Martin Collier. 380-385 [doi]
- A Robust Error Concealment Algorithm in Wireless NetworksJianwei Niu, Congying Wei, Rui He, Jian Ma. 386-389 [doi]
- Role Assignment for Data Aggregation in Wireless Sensor NetworksMaulin Patel, S. Venkatesan, Doug Weiner. 390-395 [doi]
- Networks of Sensors in Public Spaces: Combining Technology with ArtSameer Pai, Philip Kuryloski, Henry Yip, Srikant Yennamandra, Stephen B. Wicker, Kirsten Boehner, Geri Gay. 396-402 [doi]
- Verifying Identifier-Authenticity in Ubiquitous Computing EnvironmentTetsuo Kamina, Toshinori Aoki, Yoshiteru Eto, Noboru Koshizuka, Jun Yamada, Ken Sakamura. 403-408 [doi]
- A Routing Metric for Load-Balancing in Wireless Mesh NetworksLiang Ma, Mieso K. Denko. 409-414 [doi]
- Design and Optimization of Wireless Sensor Network with Mobile GatewayMukesh Shakya, Jianhua Zhang, Ping Zhang, Mattias Lampe. 415-420 [doi]
- mCoupons: An Application for Near Field Communication (NFC)Sandra Dominikus, Manfred Josef Aigner. 421-428 [doi]
- A Distributed Efficient Architecture for Wireless Sensor NetworksChuan Lin, Yanxiang He, Chao Peng, Laurence Tianruo Yang. 429-434 [doi]
- Functional Safety Problems in the Ubiquitous EnvironmentLei Jing, Zixue Cheng. 435-439 [doi]
- A Verifiable Lightweight Escape Analysis Supporting Creational Design PatternsGilles Grimaud, Yann Hodique, Isabelle Simplot-Ryl. 440-447 [doi]
- Password-Based Access Control Scheme with Remote User Authentication Using Smart CardsChen Yang, Wenping Ma, Benxiong Huang, Xinmei Wang. 448-452 [doi]
- Flexible and Manageable Delegation of Authority in RBACTuan-Anh Nguyen, Linying Su, George Inman, David W. Chadwick. 453-458 [doi]
- The Dual Ownership Model: Using Organizational Relationships for Access Control in Safety Supply ChainsAlexander Ilic, Florian Michahelles, Elgar Fleisch. 459-466 [doi]
- S3PAS: A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication SchemeHuanyu Zhao, Xiaolin Li. 467-472 [doi]
- Graph Matching Based Authorization Model for Efficient Secure XML QueryingSeunghan Chang, Artem Chebotko, Shiyong Lu, Farshad Fotouhi. 473-478 [doi]
- Certificate Chain Discovery in Web of Trust for Ad Hoc NetworksHisashi Mohri, Ikuya Yasuda, Yoshiaki Takata, Hiroyuki Seki. 479-485 [doi]
- Mobile Agents and the Deus Ex MachinaShane Balfe, Eimear Gallery. 486-492 [doi]
- Presumptive Selection of Trust Evidences: A Non Invasive Application-Contained SolutionPierpaolo Dondio, Stephen Barrett. 493-499 [doi]
- Integrating Fault Recovery and Quality of Security in Real-Time SystemsKiranmai Bellam, Ziliang Zong, Mohammed I. Alghamdi, Mais Nijim, Xiao Qin. 500-505 [doi]
- Itinerary-Based Access Control for Mobile Tasks in Scientific WorkflowsZijiang Yang, Shiyong Lu, Ping Yang. 506-511 [doi]
- Pattern Templates for Automating Business Choreography on Web ServicesIncheon Paik, Hiroto Suzuki. 512-517 [doi]
- Advanced OSGi Security LayerChi-Chih Huang, Pang-Chieh Wang, Ting-Wei Hou. 518-523 [doi]
- QoS-LI: QoS Loss Inference in Disadvantaged NetworksVidyaraman Sankaranarayanan, Shambhu J. Upadhyaya, Kevin A. Kwiat. 524-529 [doi]
- U&I Aware: A Framework Using Data Mining and Collision Detection to Increase Awareness for Intersection UsersFlora Dilys Salim, Seng Wai Loke, Andry Rakotonirainy, Shonali Krishnaswamy. 530-535 [doi]
- Interaction Analysis of Heterogeneous Monitoring Data for Autonomic Problem DeterminationMohammad Ahmad Munawar, Kevin Quan, Paul A. S. Ward. 536-542 [doi]
- Integration of Data Compression and Cryptography: Another Way to Increase the Information SecurityChuanfeng Lv, Qiangfu Zhao. 543-547 [doi]
- Determining Configuration Probabilities of Safety-Critical Adaptive SystemsRasmus Adler, Marc Forster, Mario Trapp. 548-555 [doi]
- A Utility-Based Adaptivity Model for Mobile ApplicationsMourad Alia, Viktor S. Wold Eide, Nearchos Paspallis, Frank Eliassen, Svein O. Hallsteinsen, George A. Papadopoulos. 556-563 [doi]
- AEGIS: A Proactive Methodology to Shield against Zero-Day ExploitsMadhusudhanan Chandrasekaran, Mukarram Baig, Shambhu J. Upadhyaya. 556-563 [doi]
- A Versioning Model for Enterprise ServicesRainer Weinreich, Thomas Ziebermayr, Dirk Draheim. 570-575 [doi]
- Formalizing Web Service Choreography InterfaceYu Huang, Chunxiang Xu, Hanpin Wang, Yunni Xia, Jiaqi Zhu, Cheng Zhu. 576-581 [doi]
- Research Issues of Privacy Access Control Model for Mobile Ad Hoc Healthcare Applications with XACMLPatrick C. K. Hung, Jude Andrade, Yongming Chen, Ranny Huang, Miguel Vargas Martin, Yi Zheng. 582-587 [doi]
- Using Argumentative Agents to Manage Communities of Web ServicesJamal Bentahar, Zakaria Maamar, Djamal Benslimane, Philippe Thiran. 588-593 [doi]
- QoS-Broker for Transactional WorkloadsCelso Rafael Santos, João Pedro Costa, Pedro Furtado. 594-599 [doi]
- Building Web-Base SIP Analyzer with Ajax ApproachQuincy Wu, Yan-Hsiang Wang. 600-604 [doi]
- Performance Evaluation of Agent Network Topologies Based on the AOCD ArchitectureHao Lan Zhang, Clement H. C. Leung, Gitesh K. Raikundalia. 605-610 [doi]
- Learning Business Strategies for Competitive Electronic MarketplacesIsabel Praça, Maria João Viamonte, Carlos Ramos, Zita A. Vale. 611-616 [doi]
- Mobile Phone as an Inspections Tool--Experiences with a Service for Field ForceTeemu Jalava, Jukka K. Nurminen. 617-622 [doi]
- Mobile Devices for Personal Smart SpacesIvan Marsá-Maestre, Miguel A. López-Carmona, Juan R. Velasco, Alvaro Paricio. 623-628 [doi]
- On the Integration of Mobility in a Fault-Tolerant e-Health Web Information SystemFlorencia Balbastro, Alfredo Capozucca, Nicolas Guelfi. 629-634 [doi]
- Multi-Agent System for Directed Diffusion in Wireless Sensor NetworksHaroon Malik, Elhadi Shakshuki, Travis Dewolf, Mieso K. Denko. 635-640 [doi]
- On Slave-Slave Bridging with Non-Acknowledged GTS Access in 802.15.4 Beacon Enabled NetworksJelena V. Misic. 641-646 [doi]
- A Novel Model for User Mobility in Wireless Sensor NetworksSang-Sik Kim, Aesoon Park. 647-652 [doi]
- A Novel Distributed Topology Control Algorithm for Ad Hoc NetworksPeng He, Jiandong Li, Wei Dong. 653-658 [doi]
- Efficient Hybrid Channel Access for Data Intensive Sensor NetworksChih-Kuang Lin, Vladimir Zadorozhny, Prashant Krishnamurthy. 659-664 [doi]
- E-ITRC Protocol with Long & Adjustable Range on Underwater Acoustic Sensor NetworkDonghoon Kim, Yong-Man Cho, Changhwa Kim, Sangkyung Kim, Soo-Hyun Park, Tae-Won Kang. 665-672 [doi]
- Dynamic Route Selection Policy Protocol in MANETFang Jing, Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naohisa Takahashi. 673-678 [doi]
- Comparative Study of Reactive and Proactive Routing Protocols Performance in Mobile Ad Hoc NetworksConsolee Mbarushimana, Alireza Shahrabi. 679-684 [doi]
- A Geo-Routing Algorithm in Planar Graph for Ad Hoc Wireless NetworksRashid Bin Muhammad. 685-689 [doi]
- Hierarchical Communications for BattlefieldsMimoza Durresi, Arjan Durresi, Leonard Barolli. 690-695 [doi]
- Energy Efficient Query Processing in Wireless Sensor NetworkMd. Ashiqur Rahman, Sajid Hussain. 696-700 [doi]
- A Routing Method by Reactive Energy Decision in Wireless Sensor NetworksYing-Hong Wang, Chih-Peng Hsu, Yi-Chien Lin, Chien-Shan Kuo, Hsin-Yi Ho. 701-706 [doi]
- Power-Efficient and Path-Stable Broadcasting Scheme for Wireless Ad Hoc NetworksYeim-Kuan Chang, Yi-Wei Ting, Shang-Chun Wu. 707-712 [doi]
- Evaluation of Reliable Data Transmission Protocol in Wireless Sensor-Actuator NetworkKiyohiro Morita, Keiji Ozaki, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa. 713-718 [doi]
- Energy Efficient Spatial Query Processing in Wireless Sensor NetworksKyungseo Park, Byoungyong Lee, Ramez Elmasri. 719-724 [doi]
- DSSP: A Dynamic Sleep Scheduling Protocol for Prolonging the Lifetime of Wireless Sensor NetworksEyuphan Bulut, Ibrahim Korpeoglu. 725-730 [doi]
- A Testbed with a Practical Smart Antenna for Directional MAC Protocols in Ad hoc NetworksHikaru Mitsuhashi, Masahiro Watanabe, Sadao Obana, Masaki Bandai, Takashi Watanabe. 731-736 [doi]
- Secure Mobile Ad hoc RoutingXu Li, Amiya Nayak, Isabelle Ryl, David Simplot, Ivan Stojmenovic. 737-742 [doi]
- A Data Dissemination Method for Information Sharing Based on Inter-Vehicle CommunicationHiroyuki Sago, Masako Shinohara, Takahiro Hara, Shojiro Nishio. 743-748 [doi]
- A Scheme for Low Path Loss in Object Monitoring with Sensor NetworkThanh Hai Trinh, Ji-Hoon Kim, Hee Yong Youn. 749-753 [doi]
- Smart Carpet: A Footstep Tracking InterfaceDomnic Savio, Thomas Ludwig 0002. 754-760 [doi]
- Prediction Models for a Smart Home Based Health Care SystemVikramaditya R. Jakkula, Diane J. Cook, Gaurav Jain. 761-765 [doi]
- Wearable System-on-a-Chip Pulse Radar Sensors for the Health Care: System OverviewDomenico Zito, Domenico Pepe, Bruno Neri, Danilo De Rossi, Antonio Lanata. 766-769 [doi]
- Services Driven Cross-Layer Routing Protocol for Mobile Ad Hoc NetworksJun Ren, Xiaolin Zhang, Yunhui Liu. 770-775 [doi]
- Towards Integrated Services for Health MonitoringChunming Rong, Hein Meling, Dagfinn Waage. 776-781 [doi]
- Multi-Stage Real Time Health Monitoring via ZigBee in Smart HomesS. Dagtas, G. Pekhteryev, Zafer Sahinoglu. 782-786 [doi]
- Location Learning for Smart HomesEric D. Manley, Jitender S. Deogun. 787-792 [doi]
- Bayesian Filtering and Anonymous Sensors for Localization in a Smart HomeYoucef Rahal, Philippe Mabilleau, Hélène Pigot. 793-797 [doi]
- Addressing Context Awareness Techniques in Body Sensor NetworksBarbara T. Korel, Simon G. M. Koo. 798-803 [doi]
- Engineering Tele-Health Solutions in the Ambient Assisted Living LabEric Ras, Martin Becker, Jan Koch. 804-809 [doi]
- Wireless Sensor Network Applications in Urban TelehealthPatricia Morreale. 810-814 [doi]
- Multimodal Home Monitoring of Elderly People--First Results from the LASS StudyMichael Marschollek, Wolfram Ludwig, Ines Schapiewksi, Elin Schriever, Rainer Schubert, Hartmut Dybowski, Hubertus Meyer zu Schwabedissen, Jürgen Howe, Reinhold Haux. 815-819 [doi]
- Integration of Smart Home Technologies in a Health Monitoring System for the ElderlyAmaya Arcelus, Megan Howell Jones, Rafik Goubran, Frank Knoefel. 820-825 [doi]
- Low Cost HIV Testing System for Tele-Health ApplicationsAli El Kateeb, Lubna Al Azzawi. 826-831 [doi]
- Wireless Sensor Networks for Home Health CareChris R. Baker, Kenneth Armijo, Simon Belka, Merwan Benhabib, Vikas Bhargava, Nathan Burkhart, Artin Der Minassians, Gunes Dervisoglu, Lilia Gutnik, M. Brent Haick, Christine Ho, Mike Koplow, Jennifer Mangold, Stefanie Robinson, Matt Rosa, Miclas Schwartz, Christo Sims, Hanns Stoffregen, Andrew Waterbury, Eli S. Leland, Trevor Pering, Paul K. Wright. 832-837 [doi]
- An Ontology-Based Context Model for Home Health Monitoring and Alerting in Chronic Patient Care NetworksFederica Paganelli, Dino Giuli. 838-845 [doi]
- OWL-Based Context-Dependent Task Modeling and DeducingHongbo Ni, Xingshe Zhou, Zhiwen Yu, Kejian Miao. 846-851 [doi]
- Tangible User Interfaces for Cognitive AssistanceBaptiste Boussemart, Sylvain Giroux. 852-857 [doi]
- An Evidentiary Study of the Uses of Automated Behavioral MonitoringAnthony P. Glascock, David M. Kutzik. 858-862 [doi]
- Sensor/Actuator Networks in Smart Homes for Supporting Elderly and Handicapped PeopleSebastian Dengler, Abdalkarim Awad, Falko Dressler. 863-868 [doi]
- Linearized Transformation of RF Data for Capsule Tracking in Wireless TelemetryKhalil Arshak, Francis Adepoju. 869-874 [doi]
- Fall Detection from Human Shape and Motion History Using Video SurveillanceCaroline Rougier, Jean Meunier, Alain St-Arnaud, Jacqueline Rousseau. 875-880 [doi]
- Applicability and Usability of Off-the-Shelf Smart Appliances in Tele-CareGerhard Leitner, Martin Hitz, David Ahlström. 881-886 [doi]
- Analysis of MPR Selection in the OLSR ProtocolDang Nguyen, Pascale Minet. 887-892 [doi]
- Stochastic Modeling and Performance Evaluation of Fading Channel for Wireless Network DesignAnjana Jain, Raksha Upadhyay, P. D. Vyavahare, L. D. Arya. 893-898 [doi]
- An Analytical Model for Evaluating IEEE 802.15.4 CSMA/CA Protocol in Low-Rate Wireless ApplicationZhijia Chen, Chuang Lin, Hao Wen, Hao Yin. 899-904 [doi]
- FP/EDF versus FP/FIFO Local Scheduling and Probabilistic QoS Guarantees in a Bluetooth PiconetKarima Maâlaoui, Leïla Azouz Saïdane. 905-910 [doi]
- Reference Path Ad Hoc Routing MechanismFabricio L. Figueiredo, Paulo Cardieri, Marcel C. de Castro, Marcos A. Siqueira. 911-917 [doi]
- An Adaptive Real-Time Routing Scheme for Wireless Sensor NetworksHan Peng, Zhou Xi, Li Ying, Chen Xun, Gao Chuanshan. 918-922 [doi]
- Coverage Based Intercluster Communication for Load Balancing in Wireless Sensor NetworksNauman Israr, Irfan Awan. 923-928 [doi]
- Profiling Delay and Throughput Characteristics of Interactive Multimedia Traffic over WLANs Using OPNETSuhaimi Bin Abd Latif, M. A. Rashid, F. Alam. 929-933 [doi]
- A New Adaptive Congestion Control Mechanism for the Internet Based on REDF. Al-Raddady, Michael E. Woodward. 934-939 [doi]
- The Effect of the RTS/CTS Handshake on TCPStylianos Papanastasiou, Mohamed Ould-Khaoua, Vassilis Charissis. 940-946 [doi]
- Distance Learning in Tele-Immersion EnvironmentTetsuro Ogi, Hiroaki Sakon. 947-952 [doi]
- Tele-Immersive Collaboration Using High-Resolution Video in Tiled Displays EnvironmentYasuo Ebara, Nobuyuki Kukimoto, Jason Leigh, Koji Koyamada. 953-958 [doi]
- VR Interaction in Real-Time between Avatar with Voice and Gesture Recognition SystemShunji Uchino, Norihiro Abe, Kazuaki Tanaka, Tetsuya Yagi, Hirokazu Taki, Shoujie He. 959-964 [doi]
- Design and Construction of Virtual Spaces for CommunicationsYuki Sogabe. 965-970 [doi]
- An Implementation and Experimentation of a Composite Video StreamingKaoru Sugita, Masao Yokota. 971-976 [doi]
- Asynchronous CVE Support System by Continuous VR Space ArchiverHiroki Ogasawara, Yoshitaka Shibata. 977-980 [doi]
- Collaborative Virtual Environments Using Traditional Japanese Crafting Objects over the Ultra High-Speed NetworkTomoyuki Ishida, Go Chiba, Akihiro Miyakawa, Yoshitaka Shibata. 981-986 [doi]
- A Theoretical Consideration on Artificial Imitation Based on Mental Image Directed Semantic TheoryMasao Yokota. 987-992 [doi]
- Resource-Oriented Computing: Towards a Univeral Virtual WorkspaceJing-Ying Chen. 993-1000 [doi]
- Middleware for Ubiquitous Service-Oriented Spaces on the WebGeert Vanderhulst, Kris Luyten, Karin Coninx. 1001-1006 [doi]
- Providing More Customized Services for Online Games Using Service Oriented Architecture and Three-Tier Views: A Case Study Mankind Alan Y. S. Chiang, Dickson K. W. Chiu, Patrick C. K. Hung, Yi Zheng. 1007-1012 [doi]
- Decentralized Information Retrieval Systems Based on Contents Information for Ubiquitous ServicesTakeshi Tsuchiya, Hirokazu Yoshinaga, Kei ichi Koyanagi. 1013-1016 [doi]
- An Implementation of Understanding Information Management System for Real-Time Interactive Distance Education EnvironmentAiguo He. 1017-1022 [doi]
- Enhanced Semantic Question Answering System for e-Learning EnvironmentYing-Hong Wang, Wen-Nan Wang, Chu-Chi Huang. 1023-1028 [doi]
- A Prediction Mechanism of Adaptive Learning Content in the Scalable E-Learning EnvironmentChih-Ping Chu, Yi-Chun Chang. 1029-1034 [doi]
- Functional Safety Problems in the Ubiquitous EnvironmentLei Jing, Zixue Cheng. 1035-1040 [doi]