Abstract is missing.
- Schedule Swapping: A Technique for Temperature Management of Distributed Embedded SystemsFarzad Samie Ghahfarokhi, Alireza Ejlali. 1-6 [doi]
- User-Level Network Protocol Stacks for Automotive Infotainment SystemsMu-Youl Lee, Hyun-Wook Jin. 7-14 [doi]
- Replay Debugging for Multi-threaded Embedded SoftwareYann-Hang Lee, Young Wn Song, Rohit Girme, Sagar Zaveri, Yan Chen. 15-22 [doi]
- Real-time Enhancement for Xen HypervisorPeijie Yu, Mingyuan Xia, Qian Lin, Min Zhu, Shang Gao, Zhengwei Qi, Kai Chen 0006, Haibing Guan. 23-30 [doi]
- Optimized Schedule Synthesis under Real-Time Constraints for the Dynamic Segment of FlexRayReinhard Schneider, Unmesh D. Bordoloi, Dip Goswami, Samarjit Chakraborty. 31-38 [doi]
- Optimizing Runtime Reconfiguration DecisionsThilo Pionteck, Steffen Sammann, Carsten Albrecht. 39-46 [doi]
- Architectural Support for Reducing Parallel Processing Overhead in an Embedded MultiprocessorJian Wang, Joar Sohl, Dake Liu. 47-52 [doi]
- Trading Conditional Execution for More Registers on ARM ProcessorsHuang-Jia Cheng, Yuan-Shin Hwang, Rong-Guey Chang, Cheng-Wei Chen. 53-59 [doi]
- An Environment for Design Software and Hardware Aspects of Clock Synchronization and Communication in DRTESBrahim Hamid, Adel Ziani. 60-67 [doi]
- Implementation of a Floating Point Adder and Subtracter in NoGAP, A Comparative Case StudyPer Karlström, Wenbiao Zhou, Dake Liu. 68-72 [doi]
- Co-Simulation of Self-Adaptive Automotive Embedded SystemsMarc Zeller, Gereon Weiss, Dirk Eilers, Rudi Knorr. 73-80 [doi]
- Empirical Evaluation of Content-based Pub/Sub Systems over Cloud InfrastructureBiao Zhang, Beihong Jin, Haibiao Chen, Ziyuan Qin. 81-88 [doi]
- A Reflective Service Gateway for Integrating Evolvable Sensor-Actuator Networks with Pervasive InfrastructureSeong-Hoon Kim, Daeyoung Kim, Jeong Seok Kang, Hong Seong Park. 89-96 [doi]
- Handling Mobility on a QoS-Aware Service-based Framework for Mobile SystemsJoel Gonçalves, Luis Lino Ferreira, Luís Miguel Pinho, Guilherme D. Silva. 97-104 [doi]
- Trust Measurement Methods in Organic Computing Systems by Direct Observation Rolf Kiefhaber, Benjamin Satzger, Julia Schmitt, Michael Roth, Theo Ungerer. 105-111 [doi]
- GEDS: GPU Execution of Continuous Queries on Spatio-Temporal Data StreamsJonathan Cazalas, Ratan Guha. 112-119 [doi]
- Rule-based Approach for Context Inconsistency Management Scheme in Ubiquitous ComputingYong Jae Lee, Jaehyoung Lim, Soon J. Hyun, Dongman Lee. 120-126 [doi]
- Transferring Ontologies between Mobile Devices and Knowledge-Based SystemsXiang Su, Jukka Riekki. 127-135 [doi]
- Middleware Support for Context-awareness in Asynchronous Pervasive Computing EnvironmentsJianping Yu, Yu Huang 0002, Jiannong Cao, XianPing Tao. 136-143 [doi]
- An Application Framework for Loosely Coupled Networked Cyber-Physical SystemsMinyoung Kim, Mark-Oliver Stehr, Jinwoo Kim, Soonhoi Ha. 144-153 [doi]
- LocaToR: Locating Passive RFID Tags with the Relative Neighborhood GraphYiyang Zhao, S. C. Cheung, Lionel M. Ni. 154-161 [doi]
- An OSGi Based RFID Complex Event Processing SystemHou Weifeng, Hou Di, Chen Juan. 162-169 [doi]
- Real-Time Constrained Task Scheduling in 3D Chip Multiprocessor to Reduce Peak TemperatureJiayin Li, Meikang Qiu, Jianwei Niu, Tianzhou Chen, Yongxin Zhu. 170-176 [doi]
- Improving the Accuracy of Object Tracking in Three Dimensional WSNs Using Bayesian Estimation MethodsJunzhao Du, Lei Mao, Hui Liu, Bo Wu, Deke Guo. 177-183 [doi]
- Power Management in Real Time Embedded Systems through Online and Adaptive Interplay of DPM and DVFS PoliciesMuhammad Khurram Bhatti, Cécile Belleudy, Michel Auguin. 184-191 [doi]
- A Connection-assured Many-to-one Communication of Wireless Sensors with Two Transmission RangesWan Yeon Lee, Hyung Goo Paek, Jeong-Mo Yeo, Kyong Hoon Kim. 192-199 [doi]
- Partitioning Detection and Connectivity Restoration Algorithm for Wireless Sensor and Actor NetworksMuhammad Imran, Mohamed Younis, Abas Md Said, Halabi Hasbullah. 200-207 [doi]
- Towards Precise Synchronisation in Wireless Sensor NetworksLawrence Cheng, Stephen Hailes, Alan Wilson. 208-215 [doi]
- On Efficient Clock Drift Prediction Means and their Applicability to IEEE 802.15.4Marcin Brzozowski, Hendrik Salomon, Peter Langendörfer. 216-223 [doi]
- RISN: An Efficient, Dynamically Tasked and Interoperable Sensor Network OverlayEvens Jean, Robert T. Collins, Ali R. Hurson, Sahra Sedigh, Yu Jiao. 224-231 [doi]
- Efficient Data Delivery in Wireless Sensor Networks with Ubiquitous Mobile Data CollectorsWeiwei Jiao, Long Cheng, Yimin Chen, Canfeng Chen, Jian Ma. 232-239 [doi]
- Virtual Brokers for Large-Scale Publish/Subscribe in Wireless Sensor NetworksYang Liu, Boon-Chong Seet, Adnan Al-Anbuky. 240-246 [doi]
- Multi-resolution Next Location Prediction for Distributed Virtual EnvironmentsJaroslav Pribyl, Pavel Zemcík. 247-254 [doi]
- Trick Play Function for VOD with SVC sourcePeng Zhu, Hideya Yoshiuchi, Satoshi Yoshizawa. 255-259 [doi]
- OCO: A Multi-channel MAC Protocol with Opportunistic Cooperation for Wireless Sensor NetworksJinbao Li, Desheng Zhang, Longjiang Guo. 260-267 [doi]
- Video Streaming over Wireless Mesh Networks with Multi-Gateway SupportHuali Cui, Depei Qian, Xingjun Zhang, Yi Liu. 268-272 [doi]
- Hierarchical Real-Time Scheduling Framework for Imprecise ComputationsGuy Martin Tchamgoue, Kyong Hoon Kim, Yong-Kee Jun, Wan Yeon Lee. 273-280 [doi]
- Preemption Control Using Frequency Scaling in Fixed Priority SchedulingAbhilash Thekkilakattil, Anju S. Pillai, Radu Dobrin, Sasikumar Punnekkat. 281-288 [doi]
- Hierarchical Cooperative Data Caching for Wireless Mesh NetworksWeigang Wu, Yifei Huang. 289-296 [doi]
- Adaptive GTS Allocation Scheme based on IEEE 802.15.4 for Underwater Acoustic Sensor NetworksJung-Il Namgung, Soo Young Shin, Nam-Yeol Yun, Soo-Hyun Park. 297-301 [doi]
- Design and Implementation of the Test-bed for Underwater Acoustic Sensor Network Based on ARM9 ProcessorYung-Pyo Kim, Jung-Il Namgung, Nam-Yeol Yun, Hui-Jin Cho, Imtiaz A. Khan, Soo-Hyun Park. 302-306 [doi]
- The Architecture of Surface Gateway for Underwater Acoustic Sensor NetworksYoungjun Jo, Jungyoungj Bae, Hyunjae Shin, Heungwoo Nam, Sae-Young Ahn, Sunshin An. 307-310 [doi]
- Bearings-only Tracking Systems with Distributed Floating Beacons in Underwater Sensor NetworksEunchan Kim, Sangho Lee, Chungsan Kim, Kiseon Kim. 311-315 [doi]
- Localization with a Mobile Beacon in Underwater Sensor NetworksSangho Lee, Kiseon Kim. 316-319 [doi]
- Communication in a Behavior-based Approach to Target Detection and Tracking with Autonomous Underwater VehiclesLaura Sorbi, Laura Toni, Graziano Pio De Capua, Lorenzo Rossi. 320-325 [doi]
- Experimental Results of Single Carrier Digital Modulation for Underwater Sensor NetworksSe-Young Kim, Jeong-woo Han, Ki-Man Kim, Sanghoon Baek, Hyungchul Kim, Changhwa Kim. 326-330 [doi]
- Robot Control Using an Underwater Acoustic ModemJun-Ho Jeon, Chang-Gi Hong, Sung-Joon Park, Changhwa Kim, Sangkyung Kim. 331-336 [doi]
- A Study on the Underwater Acoustic Communication with Direct Sequence Spread SpectrumJeong-woo Han, Se-Young Kim, Ki-Man Kim, Won-Seok Choi, Min-jae Kim, Seung-Yong Chun, Kwon Son. 337-340 [doi]
- Semantic Device Bus for Internet of ThingsKun Yang, Shijian Li, Li Zhang, Gang Pan. 341-346 [doi]
- IOT Gateway: BridgingWireless Sensor Networks into Internet of ThingsQian Zhu, Ruicong Wang, Qi Chen, Yan Liu, Weijun Qin. 347-352 [doi]
- Spatio-Temporal Events in the Internet of ThingsBeihong Jin, Haibiao Chen. 353-358 [doi]
- Implementation of Cloud Computing Environment for Discrete Event System Simulation using Service Oriented ArchitectureChungman Seo, Youngshin Han, Haeyoung Lee, Jason J. Jung, Chilgee Lee. 359-362 [doi]
- UbiCloud: A Cloud Computing System for Ubiquitous Terminals Based on End User VirtualizationYuanfei Chen, Zhenmin Zhu, Yi Zeng, Zhe He. 363-367 [doi]
- Repair Policies of Coverage Holes Based Dynamic Node Activation in Wireless Sensor NetworksXiao-heng Deng, Chu-Gui Xu, Fu-Yao Zhao, Yi Liu. 368-371 [doi]
- A Method for Dimensioning Micro-Scale Solar Energy Harvesting Systems Based on Energy Level SimulationsSebastian Bader, Torsten Schölzel, Bengt Oelmann. 372-379 [doi]
- Online Personal Connection Presentation System for Communication AssistanceRyota Ayaki, Hideki Shimada, Kenya Sato. 380-385 [doi]
- A Light Reasoning Infrastructure to Enable Context-aware Mobile ApplicationsJosué Iglesias, Ana M. Bernardos, Alejandro Álvarez, Marcos Sacristán. 386-391 [doi]
- Context Awareness Aims at Novel Fruition Models: Augmented Reality May be the Killer Application for Context AwarenessClaudio Vemezia, Marco Marengo. 392-396 [doi]
- When Ambient Intelligence Meets Internet Protocol Stack: User Layer DesignYu Lu, Mehul Motani, Wai-Choong Wong. 397-402 [doi]
- An Efficient Clustering Algorithm Using Evolutionary HMM in Wireless Sensor NetworksRouhollah Goudarzi, Behrouz Jedari, Masoud Sabaei. 403-409 [doi]
- Two-Tier Cluster Based Routing Protocol for Wireless Sensor NetworksAsif U. Khattak, Ghalib A. Shah, M. Ahsan. 410-415 [doi]
- Ambient Intelligence, Smart Objects and Sensor Networks: Practical ExperiencesElisabetta Farella. 416-421 [doi]
- A Deterministic Key Management Scheme for Securing Cluster-Based Sensors NetworksMandicou Ba, Ibrahima Niang, Bamba Gueye, Thomas Noël. 422-427 [doi]
- A Fast Heuristic for Solving the D1EC Coloring ProblemFabio Campoccia, Vincenzo Mancuso. 428-435 [doi]
- Energy Balanced Routing Strategy in Wireless Sensor NetworksXiaoguang Zhang, Zheng Da Wu. 436-443 [doi]
- Interference Minimization in Wireless NetworksHakob Aslanyan, José D. P. Rolim. 444-449 [doi]
- Avoidance of Blind Period for Node Coverage Grouping on Wireless Sensor NetworksChow-Sing Lin, Chih-Chung Chen. 450-455 [doi]
- Predictive Power Control for Mobile Wireless Networks with Time-Varying DelayCunwu Han, Dehui Sun, Zhijun Li, Mingyue Zhao. 456-459 [doi]
- RWPAD: A Mobility Model for DTN Routing Performance EvaluationYong Wang, Wei Peng, Xilong Mao, Zhenghu Gong. 460-465 [doi]
- Uncertainty Reasoning on Fuzziness and Randomness in Challenged NetworksYang Li, Jing Wang, Yaowen Yuan, Xiumei Fan, Qian He. 466-471 [doi]
- Spray and Routing for Message Delivery in Challenged NetworksWanrong Yu, Chunqing Wu, Xiaofeng Hu. 472-475 [doi]
- M-Trust: A Trust Management Scheme for Mobile P2P NetworksBasit Qureshi, Geyong Min, Demetres D. Kouvatsos. 476-483 [doi]
- A Dynamic Trust Establishment and Management Framework for Wireless Sensor NetworksJunqi Zhang, Rajan Shankaran, Mehmet A. Orgun, Vijay Varadharajan, Abdul Sattar. 484-491 [doi]
- Trusted Risk Evaluation and Attribute Analysis in Ad-Hoc Networks Security Mechanism based on Projection Pursuit Principal Component AnalysisJihang Ye, Mengyao Liu, Cai Fu. 492-497 [doi]
- Trust Management in Wireless Mobile Networks with Cooperative CommunicationsReyhaneh Changiz, Hassan Halabian, F. Richard Yu, Ioannis Lambadaris, Helen Tang. 498-503 [doi]
- CredibilityRank: A Framework for the Design and Evaluation of Rank-based Credibility Models for Web ApplicationsSara Guimaraes, Arlei Silva, Wagner Meira Jr., Adriano M. Pereira. 504-510 [doi]
- Node Trust Assessment in Mobile Ad Hoc Networks Based on Multi-dimensional Fuzzy Decision MakingZhang Feng, Jia Zhi-ping, Li Xin, Xia Hui. 511-516 [doi]
- The Deficit and Dynamics of TrustAbhaya C. Nayak. 517-522 [doi]
- On the Security of Non-Linear HB (NLHB) Protocol against Passive AttackMohammad Reza Sohizadeh Abyaneh. 523-528 [doi]
- Detecting Security Attacks in Trusted Virtual DomainsUdaya Kiran Tupakula, Vijay Varadharajan. 529-535 [doi]
- PDVDS: A Pattern-Driven Software Vulnerability Detection SystemShaoyin Cheng, Jinding Wang, Jiajie Wang, Jun Yang, Fan Jiang. 536-541 [doi]
- Detection and Prevention of Routing Intrusions in Mobile Ad Hoc NetworksPradeep Moradiya, Srinivas Sampalli. 542-547 [doi]
- Monitoring Library Function-based Intrusion Prevention System with Continuing Execution MechanismYudai Kato, Yuji Makimoto, Hironori Shirai, Hiromi Shimizu, Yusuke Furuya, Shoichi Saito, Hiroshi Matsuo. 548-554 [doi]
- On the Sender Cover Traffic Countermeasure against an Improved Statistical Disclosure AttackRajiv Bagai, Huabo Lu, Bin Tang. 555-560 [doi]
- Passive Worm and Malware Detection in Peer-to-Peer NetworksSahar Fahimian, Amirvala Movahed, Mehdi Kharrazi. 561-565 [doi]
- Combined Authentication and Quality of Service in Cooperative Communication NetworksRamya Ramamoorthy, F. Richard Yu, Helen Tang, Peter C. Mason. 566-571 [doi]
- Hierarchical Certificateless SignaturesLei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin. 572-577 [doi]
- A Novel Secure Bilinear Pairing Based Remote User Authentication Scheme with Smart CardMajid Bayat, Mohammad Sabzinejad Farash, Amirvala Movahed. 578-582 [doi]
- Efficient RFID Authentication Scheme for Supply Chain ApplicationsFei Bi, Yi Mu. 583-588 [doi]
- Trust-Based Authentication for Secure Communication in Cognitive Radio NetworksSazia Parvin, Song Han, Biming Tian, Farookh Khadeer Hussain. 589-596 [doi]
- A Scalable Encryption Scheme for Multi-Privileged Group CommunicationsQiushuang Du, Guojun Wang, Qin Liu. 597-602 [doi]
- Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography SchemeMarc Stöttinger, Sorin A. Huss, Sascha Mühlbach, Andreas Koch. 603-608 [doi]
- Security of the TCG Privacy-CA SolutionLiqun Chen, Bogdan Warinschi. 609-616 [doi]
- A Key Management Protocol for Multiphase Hierarchical Wireless Sensor NetworksBiming Tian, Song Han, Sazia Parvin, Tharam S. Dillon. 617-623 [doi]
- Designing Security Protocols Adapted to the Constraints of Mobile EnvironmentsMichel Kamel, Karima Boudaoud, Sylvain Lequeux, Michel Riveill. 624-629 [doi]
- Extending a Key-Chain Based Certified Email Protocol with Transparent TTPZhiyuan Liu, Jun Pang, Chenyi Zhang. 630-636 [doi]
- Modelling Smart Card Security Protocols in SystemC TLMAisha Bushager, Mark Zwolinski. 637-643 [doi]
- Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area NetworksSyed Taha Ali, Vijay Sivaraman, Diethelm Ostry. 644-650 [doi]
- A Secure Self-Destructing Scheme for Electronic DataFengshun Yue, Guojun Wang, Qin Liu. 651-658 [doi]
- Modeling and Robust Control for Trusted Web ServerBing Du, Chun Ruan. 659-665 [doi]
- Trusted Routing for Resource-Constrained Wireless Sensor NetworksKhaled Daabaj, Mike Dixon, Terry Koziniec, Kevin Lee. 666-671 [doi]
- Secure Mobile Business Information ProcessingNicolai Kuntze, Roland Rieke, Günther Diederich, Richard Sethmann, Karsten Sohr, Tanveer Mustafa, Kai-Oliver Detken. 672-678 [doi]
- Simulator Problem in User Centric Smart Card Ownership ModelRaja Naeem Akram, Konstantinos Markantonakis, Keith Mayes. 679-686 [doi]
- Phase Characterization and Classification for Micro-architecture Soft ErrorYu Cheng, Anguo Ma, YuXing Tang, Minxuan Zhang. 687-694 [doi]
- An Access Control Architecture for Distributing Trust in Pervasive Computing EnvironmentsRaquel L. Hill, Jalal Al-Muhtadi, William E. Byrd. 695-702 [doi]
- Formal Trust Specification in Service WorkflowsWattana Viriyasitavat, Andrew Martin. 703-710 [doi]
- Capability-Role-Based Delegation in Workflow SystemsKoji Hasebe, Mitsuhiro Mabuchi. 711-717 [doi]
- SimTrust: A New Method of Trust Network GenerationTouhid Bhuiyan, Yue Xu, Audun Jøsang. 718-722 [doi]
- Above the Trust and Security in Cloud Computing: A Notion Towards InnovationMahbub Ahmed, Yang Xiang, A. B. M. Shawkat Ali. 723-730 [doi]
- Probabilistic Analysis on Mesh Network Fault Tolerance: Deterministic vs. StochasticGaocai Wang, Taoshen Li, Jianer Chen. 731-736 [doi]
- S-Kcore: A Social-aware Kcore Decomposition Algorithm in Pocket Switched NetworksMing Li, Longxiang Gao, Wanlei Zhou. 737-742 [doi]
- Key Sharing in Hierarchical Wireless Sensor NetworksYa-nan Liu, Jian Wang, He Du, Liang Zhang. 743-748 [doi]
- The Cost of Altruistic Punishment in Indirect Reciprocity-based Cooperation in Mobile Ad Hoc NetworksMarcin Seredynski, Pascal Bouvry. 749-755 [doi]
- TARo: Trusted Anonymous Routing for MANETsJiefeng Chen, Roksana Boreli, Vijay Sivaraman. 756-762 [doi]
- A Routing Algorithm Based on Trustworthy Core Tree for WSNJiang-tao Wang, Li-miao Li, Zhi-Gang Chen. 763-770 [doi]
- Defending Malicious Collision Attacks in Wireless Sensor NetworksPhillip Reindl, Kendall E. Nygard, Xiaojiang Du. 771-776 [doi]
- Automated Software Protection through Program Externalization on Memory-Limited Secure DevicesSerge Chaumette, Olivier Ly, Renaud Tabary. 777-784 [doi]
- Guess and Determine Attack on Trivium FamilyNeda Rohani, Zainab Noferesti, Javad Mohajeri, Mohammad Reza Aref. 785-790 [doi]
- Isolating System Faults on Vehicular Network Gateways Using VirtualizationSung-Moon Chung, Hyun-Wook Jin. 791-796 [doi]
- A Fault-tolerant Architecture with Error Correcting Code for the Instruction-level Temporal RedundancyChao Yan, Hongjun Dai, Tianzhou Chen, Meikang Qiu. 797-803 [doi]
- A Cloud Architecture of Virtual Trusted Platform ModulesDongxi Liu, Jack Lee, Julian Jang, Surya Nepal, John Zic. 804-811 [doi]
- Trusted Computing Platform in Your PocketSurya Nepal, John Zic, Dongxi Liu, Julian Jang. 812-817 [doi]
- A Distributed Trust Model for Securing Mobile Ad Hoc NetworksPushpita Chatterjee, Indranil Sengupta, Soumya Kanti Ghosh. 818-825 [doi]
- OST: A Transaction Based Online Social Trust Model for Social Network and File Sharing SecurityMing Li, Alessio Bonti, Wanlei Zhou. 826-832 [doi]
- Analysis of Property Based Attestation in Trusted PlatformsAarthi Nagarajan, Vijay Varadharajan, Michael Hitchens. 833-840 [doi]
- PBTrust: A Priority-Based Trust Model for Service Selection in General Service-Oriented EnvironmentsXing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim. 841-848 [doi]