Abstract is missing.
- Adaptive Router Promotion in Ad-Hoc NetworksKensuke Tanaka, Noriko Matsumoto, Norihiko Yoshida. 1-10 [doi]
- A Utility-Based Auction Cooperation Incentive Mechanism in Peer-to-Peer NetworksJiujun Cheng, Yuhong Li, Weiwei Jiao, Jian Ma. 11-21 [doi]
- UbiqStor: Server and Proxy for Remote Storage of Mobile DevicesMinHwan Ok, Daegeun Kim, Myong-Soon Park. 22-31 [doi]
- Packet Length Adaptation for Energy-Proportional Routing in Clustered Sensor NetworksChao-Lieh Chen, Chia-Yu Yu, Chien-Chung Su, Mong-Fong Horng, Yau-Hwang Kuo. 32-42 [doi]
- A New Context Script Language for Developing Context-Aware Application Systems in Ubiquitous ComputingJae-Woo Chang, Yong-Ki Kim. 43-52 [doi]
- Dynamic Replication Strategies for Object Storage SystemsTan Zhipeng, Feng Dan. 53-61 [doi]
- A Cost-Effective Mobility Modelling in Nested Network MobilityHye-Young Kim. 62-71 [doi]
- Completing UML Model of Component-Based System with Middleware for Performance EvaluationYong Zhang, Ningjiang Chen, Jun Wei, Tao Huang. 72-82 [doi]
- Energy Efficient PNC Selection Procedure for the IEEE 802.15.3-Based HR-WPANEunchang Choi, Jae-Doo Huh, Soo-Joong Kim, WoongChul Choi. 83-92 [doi]
- An Efficient Multicast Routing Protocol in Multi-rate Wireless Ad Hoc NetworksKyung-Jin Bae, Dong-Hee Kwon, Woo-Jae Kim, Young-Joo Suh. 93-102 [doi]
- WPAN Platform Design in Handset Integrating Cellular Network and Its Application to Mobile GamesIn-Hwan Kim, Hoo-Jong Kim, Gu-Min Jeong. 103-111 [doi]
- Reliable Transporting and Optimal Routing on Rate-Based for Ad Hoc NetworksMing-Hui Tsai, Tzu-Chiang Chiang, Yueh-Min Huang. 112-121 [doi]
- Automatic Extraction of Conversation Protocols from a Choreography Specification of Ubiquitous Web ServicesJonghun Park, Byung-Hyun Ha. 122-132 [doi]
- Inter-sector Interference Mitigation Method in Triple-Sectored OFDMA SystemsJungRyun Lee, Keunyoung Kim, YongHoon Lim. 133-143 [doi]
- File Correspondences Dictionary Construction in Multilingual P2P File Sharing SystemsHongding Wang, Shaohua Tan, Shiwei Tang, Dongqing Yang, Yunhai Tong. 144-152 [doi]
- Lightweight Messages: True Zero-Copy Communication for Commodity Gigabit EthernetHai Jin, Minghu Zhang, Pengliu Tan. 153-162 [doi]
- Evaluation of Models for Analyzing Unguided Search in Unstructured NetworksBin Wu, Ajay D. Kshemkalyani. 163-172 [doi]
- Wapee: A Fault-Tolerant Semantic Middleware in Ubiquitous Computing EnvironmentsYoonhee Kim, Eun-kyung Kim, Beom-Jun Jeon, In-Young Ko, Sung-Yong Park. 173-182 [doi]
- Security in P2P Networks: Survey and Research DirectionsEsther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda. 183-192 [doi]
- HYWINMARC: An Autonomic Management Architecture for Hybrid Wireless NetworksShafique Ahmad Chaudhry, Ali Hammad Akbar, Ki-Hyung Kim, Suk-Kyo Hong, Won-Sik Yoon. 193-202 [doi]
- Prediction Efficiency in Predictive ::::p::::-CSMA/CDMarek Miskowicz. 203-212 [doi]
- A Situation Aware Personalization in Ubiquitous Mobile Computing EnvironmentsHeeseo Chae, Do-Hoon Kim, Dongwon Jeong, Hoh Peter In. 213-223 [doi]
- A Network and Data Link Layer QoS Model to Improve Traffic PerformanceJesús Arturo Pérez Díaz, Victor Hugo Zárate Silva, Christian Cabrera. 224-233 [doi]
- A GML-Based Mobile Device Trace Monitoring SystemEun-Ha Song, Sung-Kook Han, Laurence Tianruo Yang, Minyi Guo, Young-Sik Jeong. 234-243 [doi]
- Impact of High-Mobility Radio Jamming in Large-Scale Wireless Sensor NetworksChulho Won, Jong-Hoon Youn, Hesham H. Ali. 244-251 [doi]
- A Scalable and Untraceable Authentication Protocol for RFIDYoungjoon Seo, Hyunrok Lee, Kwangjo Kim. 252-261 [doi]
- Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005Daesung Kwon, Daewan Han, Jooyoung Lee, Yongjin Yeom. 262-270 [doi]
- Reliable Broadcast Message Authentication in Wireless Sensor NetworksTaketsugu Yao, Shigeru Fukunaga, Toshihisa Nakai. 271-280 [doi]
- Message and Its Origin Authentication Protocol for Data Aggregation in Sensor NetworksHongKi Lee, DaeHun Nyang, JooSeok Song. 281-290 [doi]
- A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor NetworksSeog Chung Seo, Hyung Chan Kim, R. S. Ramakrishna. 291-301 [doi]
- Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication ProtocolSeonho Choi, Yanggon Kim. 302-311 [doi]
- Ubiquitous Authorization Scheme Based on Device ProfileKevin Tham, Mark Looi, Ernest Foo. 312-321 [doi]
- An Efficient Certificateless Signature SchemeWun-She Yap, Swee-Huay Heng, Bok-Min Goi. 322-331 [doi]
- Universal Designated Verifier Ring Signature (Proof) Without Random OraclesJin Li, Yanming Wang. 332-341 [doi]
- An Identity-Based Signcryption Scheme with Short Ciphertext from PairingsHuiyan Chen, Shuwang Lü, Zhenhua Liu, Qing Chen. 342-351 [doi]
- A Strong Identity Based Key-Insulated CryptosystemJin Li, Fangguo Zhang, Yanming Wang. 352-361 [doi]
- A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKEJin Li, Fangguo Zhang, Yanming Wang. 362-371 [doi]
- Energy Comparison of AES and SHA-1 for Ubiquitous ComputingJens-Peter Kaps, Berk Sunar. 372-381 [doi]
- Performance Analysis of Tag Anti-collision Algorithms for RFID SystemsCheng-Hao Quan, Won-Kee Hong, Hiecheol Kim. 382-391 [doi]
- Perturbative Time and Frequency Allocations for RFID Reader NetworksVinay Deolalikar, Malena R. Mesarina, John Recker, Salil Pradhan. 392-402 [doi]
- An Enhanced Dynamic Framed Slotted ALOHA Anti-collision AlgorithmSu-Ryun Lee, Chae-Woo Lee. 403-412 [doi]
- DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID ReadersKwang-il Hwang, Kyung Tae Kim, Doo Seop Eom. 413-422 [doi]
- Design and Implementation of a High-Speed RFID Data Filtering EngineHyunsung Park, Jongdeok Kim. 423-434 [doi]
- Authorized Tracking and Tracing for RFID TagsMing-Yang Chen, Ching-Nung Yang, Chi-Sung Laih. 435-444 [doi]
- An Energy-Efficient MAC Protocol for Delay-Sensitive Wireless Sensor NetworksChangsu Suh, Deepesh Man Shrestha, Young-Bae Ko. 445-454 [doi]
- A Data-Centric Self-organization Scheme for Energy-Efficient Wireless Sensor NetworksSung-Hyup Lee, Young-Soo Choi, Hee-Dong Park, Yoon-Young An, You Ze Cho. 455-464 [doi]
- Optimized Clustering for Maximal Lifetime of Wireless Sensor NetworksKyung Tae Kim, Hyunsoo Kim, Hee Yong Youn. 465-474 [doi]
- Maximize the Coverage Lifetime of Sensor NetworksMinh-Long Pham, Daeyoung Kim, Taehong Kim, Seongeun Yoo. 475-484 [doi]
- An Active Tracking System Using IEEE 802.15.4-Based Ultrasonic Sensor DevicesShinyoung Yi, Hojung Cha. 485-494 [doi]
- LWOS: A Localization Method Without On-Body Sensor in Wireless Sensor NetworksShuangquan Wang, Ningjiang Chen, Xin Chen, Jie Yang, Jun Lu. 495-504 [doi]
- Research Directions in the Area of USN (Ubiquitous Sensor Network) Towards Practical UE (Ubiquitous Environments)Young Yong Kim. 505-510 [doi]
- On Building a Lightweight Security Architecture for Sensor NetworksTaejoon Park, Kang G. Shin. 511-521 [doi]
- A Reverse AODV Routing Protocol in Ad Hoc Mobile NetworksChonggun Kim, Elmurod Talipov, Byoungchul Ahn. 522-531 [doi]
- Algorithms for Service Differentiation in MAC Layer over MANETsKwan-Woong Kim, Sung-Hwan Bae, Dae-Ik Kim. 532-539 [doi]
- A Power-Aware Routing Protocol Using Multi-Route Transmission for Mobile Ad Hoc NetworksKuang-Han Fei, Sheng-Yan Chuang, Sheng-De Wang. 540-549 [doi]
- A Novel Multicasting Scheme over Wireless LAN Systems by Using RelayKang Jin Yoon, Tae Sung Kim, Young Yong Kim. 550-559 [doi]
- An Adaptive Concurrency Control QOS Agent for Ubiquitous Computing EnvironmentsEung Nam Ko. 560-569 [doi]
- An Efficient End-to-End QoS Supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-Back for Ubiquitous and Distributed ApplicationsSe Youn Ban, Seong Gon Choi, Jun Kyun Choi. 570-578 [doi]
- An RFID System Based MCLT System with Improved PrivacyJin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won. 579-590 [doi]
- QT-CBP: A New RFID Tag Anti-collision Algorithm Using Collision Bit PositioningHyunji Lee, Jongdeok Kim. 591-600 [doi]
- An RFID-Based Access and Location Service for Pervasive GridsAntonio Coronato, Gennaro Della Vecchia, Giuseppe De Pietro. 601-608 [doi]
- Autonomous Management of Large-Scale Ubiquitous Sensor NetworksJong-Eon Lee, Si-Ho Cha, Dae Young Kim, Kuk-Hyun Cho. 609-618 [doi]
- A Privacy-Aware Service Protocol for Ubiquitous Computing EnvironmentsGunhee Lee, Song-hwa Chae, Inwhan Hwang, Manpyo Hong. 619-628 [doi]
- A Neural Network Model for Detection Systems Based on Data Mining and False ErrorsSe-Yul Lee, Bong-Hwan Lee, Yeong-Deok Kim, Dong-Myung Shin, Chan-Hyun Youn. 629-638 [doi]
- An Analysis on the Web Technologies for Dynamically Generating Web-Based User Interfaces in Ubiquitous SpacesIlsun You, Chel Park. 639-649 [doi]
- A Policy Description Language for Context-Based Access Control and Adaptation in Ubiquitous EnvironmentJoonseon Ahn, Byeong-Mo Chang, Kyung-Goo Doh. 650-659 [doi]
- ::::C-i::::UMS: Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous HomeJong Hyuk Park, Sangjin Lee, Sung Hee Hong. 660-670 [doi]
- A Lightweight IP Traceback Mechanism on IPv6Syed Obaid Amin, Myung Soo Kang, Choong Seon Hong. 671-680 [doi]
- Enable a Trustworthy Network by Source Address Spoofing Prevention Routers: A Formal DescriptionJun Bi, Jianping Wu, Miao Zhang. 681-691 [doi]
- A Flexible Bound Admission Control Algorithm for Vertical Handover in Ubiquitous EnvironmentJong-Min Lee, Ok Sik Yang, Seong Gon Choi, Jun Kyun Choi. 692-701 [doi]
- Network Probabilistic Connectivity: Using Node CutsDenis A. Migov, Olga K. Rodionova, Alexey S. Rodionov, Hyunseung Choo. 702-709 [doi]
- Fast Mounting and Recovery for NAND Flash Memory Based Embedded SystemsSong-Hwa Park, Tae Hoon Kim, Tae Hoon Lee, Ki-Dong Chung. 710-720 [doi]
- Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous EnvironmentsDeok-Gyu Lee, Jang-Su Park, Im-Yeong Lee. 721-730 [doi]
- A Robust Verifiably Encrypted Signature SchemeJianhong Zhang, Wei Zou. 731-740 [doi]
- Instruction Re-selection for Iterative Modulo Scheduling on High Performance Multi-issue DSPsDoosan Cho, Ravi Ayyagari, Gang-Ryung Uh, Yunheung Paek. 741-754 [doi]
- Predictability of Least Laxity First Scheduling Algorithm on Multiprocessor Real-Time SystemsSangchul Han, Minkyu Park. 755-764 [doi]
- Saving Register-File Leakage Power by Monitoring Instruction Sequence in ROBWann-Yun Shieh, Hsin-Dar Chen. 765-774 [doi]
- Run-Time Memory Optimization for DDMB Architecture Through a CCB AlgorithmJeonghun Cho, Yunheung Paek. 775-784 [doi]
- Code Generation and Optimization for Java-to-C CompilersYoungsun Han, Shinyoung Kim, Hokwon Kim, Seokjoong Hwang, Seon Wook Kim. 785-794 [doi]
- Modelling and Analysis of Power Consumption for Component-Based Embedded SoftwareJun Hu, Xuandong Li, Guoliang Zheng, Chenghua Wang. 795-804 [doi]
- Design of a Programmable Vertex Processing Unit for Mobile PlatformsTae-young Kim, Kyoung-Su Oh. 805-814 [doi]
- An Energy-Aware Whole-System Dynamic Emulator - SkyEyeCheng Yu, Kang Suo, Ren Jie, Zhu Hui, Shi Yuan Chun. 815-824 [doi]
- Optimizing Scheduling Stability for Runtime Data AlignmentChing-Hsien Hsu, Chao-Yang Lan, Shih-Chang Chen. 825-835 [doi]
- A Chinese Mobile Phone Input Method Based on the Dynamic and Self-study Language ModelQiaoming Zhu, Peifeng Li, Gu Ping, Peide Qian. 836-847 [doi]
- An ::::ID::::-Based Watermarking Scheme for Java ProgramsZheng Yuan, Qiaoyan Wen, Wenling Wu, Qing Zhang. 848-857 [doi]
- Data-Layout Optimization Using Reuse Distance DistributionXiong Fu, Yu Zhang, Yiyun Chen. 858-867 [doi]
- Co-optimization of Performance and Power in a Superscalar Processor DesignYongxin Zhu, Weng-Fai Wong, Stefan Andrei. 868-878 [doi]
- FAST: An Efficient Flash Translation Layer for Flash MemorySang-Won Lee, Won-Kyoung Choi, Dong-Joo Park. 879-887 [doi]
- A Novel Discrete Hopfield Neural Network Approach for Hardware-Software Partitioning of RTOS in the SoCBing Guo, Yan Shen, Yue Huang, Zhishu Li. 888-897 [doi]
- UML Based Evaluation of Reconfigurable Shape Adaptive DCT for Embedded Stream ProcessingXianhui He, Yongxin Zhu, Zhenxin Sun, Yuzhuo Fu. 898-907 [doi]
- A High Performance Buffering of Java Objects for Java Card Systems with Flash MemoryMin-Sik Jin, Min-Soo Jung. 908-918 [doi]
- Predictive Prefetching of Context-Aware Information in Mobile NetworksIn Seon Choi, Gi Hwan Cho. 919-927 [doi]
- Digital Ortho-image Production for Web GIS ApplicationsHong-Gyoo Sohn, Hyo-Keun Park, Choung-Hwan Park, Joon Heo. 928-935 [doi]
- Multimedia Contents Security by Wireless AuthenticationJung-jae Kim, Kwang-Hyoung Lee, So Yeon Min, Jeong Gyu Jee. 936-945 [doi]
- Traffic Actuated Car Navigation Systems in Mobile Communication NetworksSeungjae Lee, Chungwon Lee, Taehee Kim, Jeong Hyun Kim. 946-952 [doi]
- Analytic Model of the Collision Resolution Protocol with Voice/Data in Mobile NetworksDong Chun Lee. 953-961 [doi]
- Security Enhancement by Detecting Network Address Translation Based on Instant MessagingJun Bi, Miao Zhang, Lei Zhao. 962-971 [doi]
- A New Authentication Scheme of Binding Update Protocol on Handover in Mobile IPv6 NetworksJung-Doo Koo, Jungsook Koo, Dong Chun Lee. 972-978 [doi]
- A Solution for the Dropout Problem in Adaptive Cruise Control Range SensorsBongsoo Son, Taehyung Kim, YongEun Shin. 979-987 [doi]
- An Architecture Framework for Measuring and Evaluating Packet-Switched VoiceHyuncheol Kim, Seong-Jin Ahn, Jun Kyun Choi. 988-997 [doi]
- HOIDS-Based Detection Method of Vicious Event in Large NetworksDong Hwi Lee, Jeom Goo Kim, Kuinam J. Kim. 998-1005 [doi]
- New Handoff Control Method Using Fuzzy Multi-Criteria Decision Making in Micro/Pico-cellular NetworksJong Chan Lee, Dong Li, Ki-Hong Park, Hong-Jin Kim. 1006-1011 [doi]
- Test of IR-DSRC in Measuring Vehicle Speed for ITS ApplicationsHyung Jin Kim, Jin Tae Kim, Kee Yeon Hwang. 1012-1020 [doi]
- A Grid Routing Scheme Considering Node Lifetime in Ubiquitous Sensor NetworksSangjoon Park, Sok-Pal Cho, Byunggi Kim. 1021-1030 [doi]