Abstract is missing.
- Human Activity Recognition Based on Surrounding ThingsNaoharu Yamada, Kenji Sakamoto, Goro Kunito, Kenichi Yamazaki, Satoshi Tanaka. 1-10 [doi]
- Baton: A Service Management System for Coordinating Smart Things in Smart SpacesJingyu Li, Yuanchun Shi. 11-20 [doi]
- An Extensible Ubiquitous Architecture for Networked Devices in Smart Living EnvironmentsThierry Bodhuin, Gerardo Canfora, Rosa Preziosi, Maria Tortorella. 21-30 [doi]
- A World Model for Smart SpacesIchiro Satoh. 31-40 [doi]
- Dealing with Emotional Factors in Agent Based Ubiquitous Group DecisionGoreti Marreiros, Carlos Ramos, José Neves. 41-50 [doi]
- A Multi-agent Software Platform Accommodating Location-Awareness for Smart SpaceHongliang Gu, Yuanchun Shi, Guangyou Xu, Yu Chen. 51-60 [doi]
- Context-Aware Ubiquitous Data Mining Based Agent Model for Intersection SafetyFlora Dilys Salim, Shonali Krishnaswamy, Seng Wai Loke, Andry Rakotonirainy. 61-70 [doi]
- Development of Knowledge-Filtering Agent Along with User Context in Ubiquitous EnvironmentTakao Takenouchi, Takahiro Kawamura, Akihiko Ohsuga. 71-80 [doi]
- Application-Driven Customization of an Embedded Java Virtual MachineAlexandre Courbot, Gilles Grimaud, Jean-Jacques Vandewalle, David Simplot-Ryl. 81-90 [doi]
- A Study on Fast JCVM with New Transaction Mechanism and Caching-Buffer Based on Java Card Objects with a High LocalityMin-Sik Jin, Won Ho Choi, Yoon-Sim Yang, Min-Soo Jung. 91-100 [doi]
- Intelligent Object Extraction Algorithm Based on Foreground/Background ClassificationJhing-Fa Wang, Han-Jen Hsu, Jyun-Sian Li. 101-110 [doi]
- Thin Client Based User Terminal Architecture for Ubiquitous Computing EnvironmentTatsuo Takahashi, Satoshi Tanaka, Kenichi Yamazaki, Tadanori Mizuno. 111-120 [doi]
- An Application Development Environment for Rule-Based I/O Control DevicesRyohei Sagara, Yasue Kishino, Tsutomu Terada, Tomoki Yoshihisa, Masahiko Tsukamoto, Shojiro Nishio. 121-130 [doi]
- A uWDL Handler for Context-Aware Workflow Services in Ubiquitous Computing EnvironmentsYongyun Cho, Joohyun Han, Jaeyoung Choi, Chae Woo Yoo. 131-140 [doi]
- SMMART, a Context-Aware Mobile Marketing Application: Experiences and LessonsStanislav Kurkovsky, Vladimir Zanev, Anatoly Kurkovsky. 141-150 [doi]
- Ubiquitous Organizational Information Service Framework for Large Scale Intelligent EnvironmentsKwang-il Hwang, Won-Hee Lee, Seok-hwan Kim, Doo Seop Eom, Kyeong Hur. 151-160 [doi]
- TS-U: Temporal-Spatial Methodology for Application Checking of the Systems in the Ubiquitous EnvironmentFran Jarnjak, Jinhyung Kim, Yixin Jing, Hoh Peter In, Dongwon Jeong, Doo-Kwon Baik. 161-170 [doi]
- Ubiquitous Learning on Pocket SCORMHsuan-Pu Chang, Wen-Chih Chang, Yun-Long Sie, Nigel H. Lin, Chun-Hong Huang, Timothy K. Shih, Qun Jin. 171-179 [doi]
- An Application Based on Spatial-Relationship to Basketball Defensive StrategiesSu-Li Chin, Chun-Hong Huang, Chia-Tong Tang, Jason C. Hung. 180-188 [doi]
- Intrinsically Motivated Intelligent RoomsOwen Macindoe, Mary Lou Maher. 189-197 [doi]
- Multivariate Stream Data Reduction in Sensor Network ApplicationsSungbo Seo, Jaewoo Kang, Keun Ho Ryu. 198-207 [doi]
- Implementing a Graph Neuron Array for Pattern Recognition Within Unstructured Wireless Sensor NetworksMohamed Baqer, Asad I. Khan, Zubair A. Baig. 208-217 [doi]
- Building Graphical Model Based System in Sensor NetworksDongyu Shi, Jinyuan You, Zhengwei Qi. 218-227 [doi]
- Energy-Aware Broadcasting Method for Wireless Sensor NetworkCheol-Min Park, Dae Won Kim, Jun Hwang. 228-237 [doi]
- Anonymous Routing in Wireless Mobile Ad Hoc Networks to Prevent Location Disclosure AttacksArjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Leonard Barolli. 238-247 [doi]
- The Design and Implementation of a Location-Aware Service Bundle Manager in Smart Space EnvironmentsMinwoo Son, Soonyong Choi, Dongil Shin, Dongkyoo Shin. 248-257 [doi]
- A Context-Aware and Augmented Reality-Supported Service Framework in Ubiquitous EnvironmentsJae Yeol Lee, Dong Woo Seo. 258-267 [doi]
- A Smart Method of Cooperative Learning Including Distant Lectures and Its Experimental EvaluationsDilmurat Tilwaldi, Toshiya Takahashi, Yuichiro Mishima, Jun Sawamoto, Hisao Koizumi. 268-277 [doi]
- u-KoMIPS: A Medical Image Processing System in a Ubiquitous EnvironmentSoo Jin Lee, Moon-hae Kim. 278-287 [doi]
- The Extended PARLAY X for an Adaptive Context-Aware Personalized Service in a Ubiquitous Computing EnvironmentSungjune Hong, Sunyoung Han, Kwanho Song. 288-297 [doi]
- A Context-Aware System for Smart Home ApplicationsWen-Yang Wang, Chih-Chieh Chuang, Yu-Sheng Lai, Ying-Hong Wang. 298-305 [doi]
- Human Position/Height Detection Using Analog Type Pyroelectric SensorsShinya Okuda, Shigeo Kaneda, Hirohide Haga. 306-315 [doi]
- ENME: An ENriched MEdia Application Utilizing Context for Session Mobility; Technical and Human IssuesEgil C. Østhus, Per-Oddvar Osland, Lill Kristiansen. 316-325 [doi]
- DartDataFlow: Semantic-Based Sensor GridHuajun Chen, Zhiyong Ye, Zhaohui Wu. 326-334 [doi]
- Sentient Artefacts: Acquiring User s Context Through Daily ObjectsKaori Fujinami, Tatsuo Nakajima. 335-344 [doi]
- A Multi-dimensional Model for Task Representation and Allocation in Intelligent EnvironmentsVictor Zamudio, Victor Callaghan, Jeannette Shiaw-Yuan Chin. 345-354 [doi]
- Norms Enforcement as a Coordination Strategy in Ubiquitous EnvironmentsIsmail Khalil Ibrahim, Reinhard Kronsteiner, Gabriele Kotsis. 355-364 [doi]
- A Java-Based RFID Service Framework with Semantic Data Binding Between Real and Cyber SpacesKei Nakanishi, Makoto Setozaki, Jianhua Ma, Runhe Huang. 365-374 [doi]
- Kallima: A Tag-Reader Protocol for Privacy Enhanced RFID SystemYusuke Doi, Shirou Wakayama, Masahiro Ishiyama, Satoshi Ozaki, Atsushi Inoue. 375-382 [doi]
- Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFIDJuSung Park, Jeonil Kang, DaeHun Nyang. 383-392 [doi]
- ::::iCane:::: - A Partner for the Visually ImpairedTsung-Hsiang Chang, Chien-Ju Ho, David Chawei Hsu, Yuan-Hsiang Lee, Min-Shieh Tsai, Mu-Chun Wang, Jane Yung-jen Hsu. 393-402 [doi]
- ORAID: An Intelligent and Fault-Tolerant Object Storage DeviceDan Feng, Lingfang Zeng, Fang Wang, Shunda Zhang. 403-412 [doi]
- Architecture Based Approach to Adaptable Fault Tolerance in Distributed Object-Oriented ComputingRodrigo Lanka, Kentaro Oda, Takaichi Yoshida. 413-422 [doi]
- Security Analysis of Michael: The IEEE 802.11i Message Integrity CodeJianyong Huang, Jennifer Seberry, Willy Susilo, Martin W. Bunder. 423-432 [doi]
- A Framework for Protecting Private Information Through User-Trusted-Program and Its RealizabilityKenichi Takahashi, Kouichi Sakurai, Makoto Amamiya. 433-442 [doi]
- Performance Analysis of IP Micro-mobility Protocols in Single and Simultaneous Movements ScenarioGiuseppe De Marco, Salvatore Loreto, Leonard Barolli. 443-451 [doi]
- HMRP: Hierarchy-Based Multipath Routing Protocol for Wireless Sensor NetworksYing-Hong Wang, Hung-Jen Mao, Chih-Hsiao Tsai, Chih-Chieh Chuang. 452-459 [doi]
- On Energy-Aware Dynamic Clustering for Hierarchical Sensor NetworksJoongheon Kim, Wonjun Lee, Eunkyo Kim, Joonmo Kim, Choonhwa Lee, Sungjin Kim, SooYeon Kim. 460-469 [doi]
- Neighbor Node Discovery Algorithm for Energy-Efficient Clustering in Ubiquitious Sensor NetworksJi-Young Choi, Chung Gu Kang, Yong-Suk Kim, Kyeong Hur. 470-479 [doi]
- A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous WorldXinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen. 480-489 [doi]
- The Design and Implementation of Secure Event Manager Using SPKI/SDSI CertificateYoungLok Lee, HyungHyo Lee, Seungyong Lee, HeeMan Park, BongNam Noh. 490-498 [doi]
- Object Reminder and Safety AlarmChi-yau Lin, Chia-nan Ke, Shao-you Cheng, Jane Yung-jen Hsu, Hao-Hua Chu. 499-508 [doi]
- Synchronization and Recovery in an Embedded Database System for Read-Only TransactionsSubhash Bhalla, Masaki Hasegawa. 509-518 [doi]
- Learning with Data Streams - An NNTree Based ApproachQiangfu Zhao. 519-528 [doi]
- Generating Smart Robot Controllers Through Co-evolutionKouichi Sakamoto, Qiangfu Zhao. 529-537 [doi]
- Integrated Multimedia Understanding for Ubiquitous Intelligence Based on Mental Image Directed Semantic TheoryMasao Yokota, Genci Capi. 538-546 [doi]
- Hyper-Interactive Video Browsing by a Remote Controller and Hand GesturesHui-Huang Hsu, Timothy K. Shih, Han-Bin Chang, Yi-Chun Liao, Chia-Tong Tang. 547-555 [doi]
- Mobile Computing with MPEG-21Marios C. Angelides, Anastasis A. Sofokleous, Christos Schizas. 556-565 [doi]
- A Unified Context Model: Bringing Probabilistic Models to Context OntologyBinh An Truong, Young-Koo Lee, Sungyoung Lee. 566-575 [doi]
- Improvement of an Efficient User Identification Scheme Based on ID-Based CryptosystemEun-Jun Yoon, Kee-Young Yoo. 586-591 [doi]
- The Wrong Challenge of Pervasive Computing : The Paradigm of Sensor-Based Context-AwarenessEric Angaman. 592-601 [doi]
- An Abstract Model for Incentive-Enhanced Trust in P2P NetworksMats Neovius. 602-611 [doi]
- Construction of Credible Ubiquitous P2P Content Exchange CommunitiesYuki Yokohata, Hiroshi Sunaga, Hiroyuki Nakamura. 612-621 [doi]
- Location-Based Routing Protocol for Energy Efficiency in Wireless Sensor NetworksHyuntae Cho, Yunju Baek. 622-631 [doi]
- Efficient Access of Remote Resources in Embedded Networked Computer SystemsPaul S. Usher, Neil C. Audsley. 632-641 [doi]
- Lightweight Ontology-Driven Representations in Pervasive ComputingJaroslaw Domaszewicz, Michal Rój. 642-651 [doi]
- Object Tracking Using Durative EventsEiko Yoneki, Jean Bacon. 652-662 [doi]
- Design of Integrated Routing System for Mobile Ad Hoc Networks Overlaying Peer-to-Peer ApplicationsYan Annie Ding, David Everitt. 663-672 [doi]
- A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access ControlByungil Lee, Howon Kim. 673-682 [doi]
- Efficient Resource Management Scheme of TCP Buffer Tuned Parallel Stream to Optimize System PerformanceKun Myon Choi, Eui-nam Huh, Hyunseung Choo. 683-692 [doi]
- Multi-level Service Differentiation Scheme for the IEEE 802.15.4 Sensor NetworksEuijik Kim, Meejoung Kim, Sung-Kwan Youm, Seokhoon Choi, Chul-Hee Kang. 693-703 [doi]
- Development of Event Manager and Its Application in Jini EnvironmentYoungLok Lee, HyungHyo Lee, Seungyong Lee, Insu Kim, BongNam Noh. 704-713 [doi]
- On Scalability and Mobility Management of Hierarchical Large-Scale Ad Hoc NetworksMing-Hui Tsai, Tzu-Chiang Chiang, Yueh-Min Huang. 714-723 [doi]
- Exploring Small-World-Like Topologies Via SplitProber: Turning Power Laws into an Advantage in Unstructured OverlaysXinli Huang, Wenju Zhang, Fanyuan Ma, Yin Li. 724-733 [doi]
- Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 802.16 SystemWoo-Jae Kim, Joo-Young Baek, Sun-Don Lee, Young-Joo Suh, Yun-Sung Kim, Jin-A Kim. 734-743 [doi]
- A Survey of Anonymous Peer-to-Peer File-SharingTom Chothia, Konstantinos Chatzikokolakis. 744-755 [doi]
- A Churn-Resistant Strategy for a Highly Reliable P2P SystemGiscard Wepiwé, Sahin Albayrak. 756-765 [doi]
- Building a Peer-to-Peer Overlay for Efficient Routing and Low MaintenanceHonghao Wang, Yiming Hu. 766-775 [doi]
- Dynamic Object Assignment in Object-Based Storage DevicesLingjun Qin, Dan Feng. 776-784 [doi]
- Dynamic Resource Discovery for Sensor NetworksSameer Tilak, Kenneth Chiu, Nael B. Abu-Ghazaleh, Tony Fountain. 785-796 [doi]
- Survey on Location Authentication Protocols and Spatial-Temporal Attestation ServicesAna Isabel González-Tablas Ferreres, K. Kursawe, BenjamÃn Ramos, Arturo Ribagorda. 797-806 [doi]
- Predicate Detection Using Event Streams in Ubiquitous EnvironmentsAjay D. Kshemkalyani. 807-816 [doi]
- Identity-Based Universal Designated Verifier SignaturesFangguo Zhang, Willy Susilo, Yi Mu, Xiaofeng Chen. 825-834 [doi]
- Short Designated Verifier Proxy Signature from PairingsXinyi Huang, Yi Mu, Willy Susilo, Futai Zhang. 835-844 [doi]
- An Embedded Gateway Based on Real-Time DatabaseZhiping Jia, Xinxiao Qiao. 845-853 [doi]
- Efficient Authentication Scheme for Routing in Mobile Ad Hoc NetworksShidi Xu, Yi Mu, Willy Susilo. 854-863 [doi]
- Collision Attack on XTR and a Countermeasure with a Fixed PatternDong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon Kim, Kyoil Chung. 864-873 [doi]
- Security in Persistently Reactive SystemsTakumi Endo, Junichi Miura, Koichi Nanashima, Shoichi Morimoto, Yuichi Goto, Jingde Cheng. 874-883 [doi]
- ID-Based Access Control and Authority DelegationsSo-Young Park, Sang Ho Lee. 884-893 [doi]
- How to Construct Secure Cryptographic Location-Based ServicesJun Anzai, Tsutomu Matsumoto. 894-904 [doi]
- A Key Management Scheme for Mobile Ad Hoc Networks Based on Threshold Cryptography for Providing Fast Authentication and Low Signaling LoadHoang Nam Nguyen, Hiroaki Morino. 905-915 [doi]
- Program Obfuscation Scheme Using Random Numbers to Complicate Control FlowTatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakurai. 916-925 [doi]
- Authenticated Public Key Distribution Scheme Without Trusted Third PartyJae Hyung Koo, Bum Han Kim, Dong-Hoon Lee. 926-935 [doi]
- Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004Bok-Min Goi, Raphael Chung-Wei Phan, M. U. Siddiqi. 936-944 [doi]
- Efficient RFID Authentication Protocol for Ubiquitous Computing EnvironmentEun Young Choi, Su-Mi Lee, Dong-Hoon Lee. 945-954 [doi]
- A New Simple Authenticated Key Agreement and Protected Password Change ProtocolEun-Jun Yoon, Kee-Young Yoo. 955-964 [doi]
- A Method for Deciding Quantization Steps in QIM Watermarking SchemesYunho Lee, Kwang-Woo Lee, Seungjoo Kim, Dongho Won, Hyungkyu Yang. 965-975 [doi]
- A New DDoS Detection Model Using Multiple SVMs and TRAJung-Taek Seo, Cheolho Lee, Taeshik Shon, Kyuhyung Cho, Jongsub Moon. 976-985 [doi]
- PPF Model with CTNT to Defend Web Server from DDoS AttackJung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon. 986-995 [doi]
- Efficient Key Agreement for Merging Clusters in Ad-Hoc Networking EnvironmentsSooyeon Shin, Taekyoung Kwon. 996-1005 [doi]
- An Effective Method for Location Privacy in Ubiquitous ComputingGunhee Lee, Wonil Kim, Dong Kyoo Kim. 1006-1015 [doi]
- Integrated Support for Location Aware Security Services in Enterprise Wireless NetworksZhaoyu Liu, Peeyush Sharma, Jian Raymond Li. 1016-1024 [doi]
- Optimal Scheduling for Networks of RFID ReadersVinay Deolalikar, John Recker, Malena R. Mesarina, Salil Pradhan. 1025-1035 [doi]
- PULSE: A MAC Protocol for RFID NetworksShailesh M. Birari, Sridhar Iyer. 1036-1046 [doi]
- ::::RFIDcover:::: - A Coverage Planning Tool for RFID Networks with Mobile ReadersS. Anusha, Sridhar Iyer. 1047-1057 [doi]
- Vibration Powered Battery-Assisted Passive RFID TagElaine Lai, Andrew Redfern, Paul K. Wright. 1058-1068 [doi]
- Wireless RFID Networks for Real-Time Customer Relationship ManagementC. Philipp Schloter, Hamid K. Aghajan. 1069-1077 [doi]
- Tree-Based Classification Algorithm for Heterogeneous Unique Item ID SchemesYong-Hwan Lee, Hee Jung Kim, Byeong-hee Roh, Seung W. Yoo, Y. C. Oh. 1078-1087 [doi]
- An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor NetworksSung Jin Choi, Hee Yong Youn. 1088-1097 [doi]
- Energy-Driven Adaptive Clustering Hierarchy (EDACH) for Wireless Sensor NetworksKyung Tae Kim, Hee Yong Youn. 1098-1107 [doi]
- A Load-Balancing and Energy-Aware Clustering Algorithm in Wireless Ad-Hoc NetworksJin Wang, Shu Lei, Jinsung Cho, Young-Koo Lee, Sungyoung Lee, Yonil Zhung. 1108-1117 [doi]
- Energy-Efficient Cluster Reconfiguration with Fair Cluster Formations in Sensor NetworksHyang-tack Lee, Yong-hyun Jo, Byeong-hee Roh, Seung W. Yoo. 1118-1127 [doi]
- Virtual Sink Rotation: Low-Energy Scalable Routing Protocol for Ubiquitous Sensor NetworksLynn Choi, Kwangseok Choi, Jungsun Kim, Byung-Joon Park. 1128-1137 [doi]
- FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target RegionsYoung-Mi Song, Sung Hee Lee, Young-Bae Ko. 1138-1147 [doi]
- Power-Aware Position Vector Routing for Wireless Sensor NetworksSangsoo Lee, Daeyoung Kim, Sungjin Ahn, Noseong Park. 1148-1156 [doi]
- Multicast Routing with Minimum Energy Cost and Minimum Delay in Wireless Sensor NetworksZhao Li, Wei Zhang, Hengchang Liu, Baohua Zhao, Yugui Qu. 1157-1168 [doi]
- Self Location Estimation Scheme Using ROA in Wireless Sensor NetworksYun-kyung Lee, Eui Hyeok Kwon, Jae-Sung Lim. 1169-1177 [doi]
- Energy-Efficient Target Localization Based on a Prediction ModelYu Gu, Wei Zhang, Hengchang Liu, Baohua Zhao, Yugui Qu. 1178-1190 [doi]
- Reducing Congestion in Real-Time Multi-party-tracking Sensor Network ApplicationsWonwoo Jung, Sujeong Shin, Sukwon Choi, Hojung Cha. 1191-1200 [doi]
- Variable-Radii Method Based on Probing Mechanism (VRPM): An Energy Conservation Method for Wireless Active Sensor NetworksQi Zhou, Takuya Asaka, Tatsuro Takahashi. 1201-1210 [doi]
- Automata-Theoretic Performance Analysis Method of Soft Real-Time SystemsSatoshi Yamane. 1211-1224 [doi]
- A Component-based Architecture for an Autonomic Middleware Enabling Mobile Access to Grid InfrastructureAli Sajjad, Hassan Jameel, Umar Kalim, Young-Koo Lee, Sungyoung Lee. 1225-1234 [doi]
- Autonomic Agents for Survivable Security SystemsRoy Sterritt, Grainne Garrity, Edward Hanna, Patricia O Hagan. 1235-1244 [doi]
- Towards Formal Specification and Generation of Autonomic PoliciesRoy Sterritt, Michael G. Hinchey, James L. Rash, Walt Truszkowski, Christopher Rouff, Denis Gracanin. 1245-1254 [doi]
- Intrusion Detection with CUSUM for TCP-Based DDoSFang-Yie Leu, Wei-Jie Yang. 1255-1264 [doi]
- A Digital Content Distribution Using a Group-key and Multi-layered Structure Based on WebYun Ji Na, Il Seok Ko. 1265-1272 [doi]
- Access Policy Sheet for Access Control in Fine-Grained XMLJing Wu, Yi Mu, Jennifer Seberry, Chun Ruan. 1273-1282 [doi]
- Monitoring the Health Condition of a Ubiquitous System: Rejuvenation vs. RecoveryKazuki Iwamoto, Tadashi Dohi, Naoto Kaio. 1283-1292 [doi]
- A Dependability Management Mechanism for Ubiquitous Computing SystemsChangyeol Choi, Sungsoo Kim. 1293-1302 [doi]
- Reassignment Scheme of an RFID Tag s Key for Owner TransferJunichiro Saito, Kenji Imamoto, Kouichi Sakurai. 1303-1312 [doi]