Abstract is missing.
- Pervasive Social Computing: Augmenting Five Facets of Human IntelligenceJiehan Zhou, Jun-Zhao Sun, Kumaripaba Athukorala, Dinesh Wijekoon. 1-6 [doi]
- Toward a Smart Home Environment for Elder People Based on Situation AnalysisXing Zhang, Haipeng Wang, Zhiwen Yu. 7-12 [doi]
- Providing Real-Time Guarantees to Smart CarJie Sun 0005, Yongping Zhang, Jianbo Fan. 13-17 [doi]
- MSOrgm©: Emergent Techniques for Kinetic ArtifactScottie Chih-Chieh Huang, Shen-Guan Shih. 18-23 [doi]
- A Comparison of Programming Skills by Genders of Hungarian Grammar School StudentsGábor Kiss. 24-30 [doi]
- An Improved Multi-Scale Retinex Algorithm for Vehicle Shadow Elimination Based on Variational KimmelQi-sheng Wu, Xiang-long Luo, Han Li, Pan-zhi Liu. 31-34 [doi]
- Reliability Analysis of a Multiview Multi-description Video Streaming SystemIvan Lee. 35-39 [doi]
- QoS Control Framework for Ubiquitous Multimedia ComputingK. L. Eddie Law, Sunny So. 40-44 [doi]
- A Walkthrough System with Improved Map Projection Panoramas from Omni Directional ImagesChao Liu, Susumu Shibusawa, Tatsuhiro Yonekura. 45-51 [doi]
- Toward a Programming Model for Safer Pervasive SpacesChao Chen, Sumi Helal. 52-57 [doi]
- Multilevel Image Thresholding Selection Based on the Firefly AlgorithmMing-Huwi Horng, Ting-Wei Jiang. 58-63 [doi]
- A Study of Video Coding by Reusing Compressive Sensing MeasurementsZhenglin Wang, Ivan Lee. 64-69 [doi]
- Water Quality Monitoring with Ubiquitous ComputingYo-Ping Huang, Change-Tse Chou, Jung-Shian Jau, Frode Eika Sandnes. 70-75 [doi]
- A Mobile Agent-Based Software Intelligence Framework in Ubiquitous EnvironmentYue-Shan Chang, Chih-Tien Fan. 76-81 [doi]
- Sweep Coverage Mechanism for Wireless Sensor Networks with Approximate Patrol TimesHung-Chi Chu, Wei-Kai Wang, Yong-Hsun Lai. 82-87 [doi]
- Personal Smart Spaces as a Basis for Identifying Users in Pervasive SystemsElizabeth Papadopoulou, Sarah Gallacher, Nick K. Taylor, M. Howard Williams. 88-93 [doi]
- Performance on Adaptive Path Selection Scheme for Cooperative Communication NetworksYung-Fa Huang, Cing-Chia Lai, Ling-Cheng Hsu, Tan-Hsu Tan. 94-98 [doi]
- Ubiquitous Community Care Using Sensor Network and Mobile Agent TechnologyChuan-Jun Su, Bo-Jung Chen. 99-104 [doi]
- A Macro-observation Approach of Intelligence Video Surveillance for Real-Time Unusual Event DetectionDu-Ming Tsai, Wei-Yao Chiu. 105-110 [doi]
- Research on Pervasive Computing SecurityLong Zhao Hua, Jia Zhen, Li Tao. 111-115 [doi]
- An Advanced ECC ID-Based Remote Mutual Authentication Scheme for Mobile DevicesTien-Ho Chen, Yen-Chiu Chen, Wei Kuan Shih. 116-120 [doi]
- Visual Scoping of Private Information Displayed on Shared Tabletop SurfacesSimen Hagen, Frode Eika Sandnes. 121-125 [doi]
- Improved Identity Based Online/Offline Signature SchemeYang Ming, YuMin Wang. 126-131 [doi]
- A Method of Privacy Preserving in Mobile Wireless EnvironmentsYaHui Li, Yadi Zhang, Wen Sheng Niu. 132-137 [doi]
- A New Image Registration Method Using Intensity Difference Data on Overlapped ImageShu-Kai S. Fan, Yu-Chiang Chuang. 138-141 [doi]
- Adaptive Wireless Mesh Networks Routing ProtocolsSaaidal Razalli Azzuhri, Marius Portmann, Wee Lum Tan. 142-147 [doi]
- Media Access Control Protocol Based on Hybrid Antennas in Ad Hoc NetworksYanrong Ding, Xiaodong Wang, Hu Shen, Pengyu Guo. 148-153 [doi]
- A Dynamic Risk Assessment Framework Using Principle Component Analysis with Projection Pursuit in Ad Hoc NetworksCai Fu, Jihang Ye, Li Zhang, Yunhe Zhang, Lansheng Han. 154-159 [doi]
- Dynamic Adaptive Self-Configurable Network ProcessorA. Satheesh, D. Kumar, S. Krishnaveni. 160-164 [doi]
- An Adaptive Cross-Layer Mechanism of Multi-channel Multi-interface Wireless Networks for Real-Time Video StreamingJian Liu, Fangmin Li, Fei Dou, Xu He, Zhigang Luo, Hong Xiong. 165-170 [doi]
- An Trace Based Vehicular Mobility Model for Simulation of Vehicular Delay Tolerant NetworksWei-dong Yang, Ji-Zhao Liu, Xin-yun Zhou. 171-174 [doi]
- A Link Quality Prediction Mechanism for WSNs Based on Time Series ModelLinlan Liu, Youlei Fan, Jian Shu, Kun Yu. 175-179 [doi]
- Message Publish/Subscribe Scheme Based on Opportunistic NetworksJianwei Niu, Feifei Wu, Da Huo, Kai Hu. 180-184 [doi]
- RANC: Opportunistic Multi-path Routing Protocol in WSNs Using Reality-Aware Network CodingJia Liu, Junzhao Du, Jie Zhang, Xiaojun Li, Hui Liu. 185-190 [doi]
- Epidemic-Based Controlled Flooding and Adaptive Multicast for Delay Tolerant NetworksZhigang Jin, Jia Wang, Sainan Zhang, Yantai Shu. 191-194 [doi]
- BiBUBBLE: Social-based Forwarding in Pocket Switched NetworksTong Hu, Feng Hong, Xiqing Zhang, Zhongwen Guo. 195-199 [doi]
- Energy-Efficient Clustering Rumor Routing Protocol for Wireless Sensor NetworksZhong-hua Wang, Kai Chen, Mei Lin, Min Yu. 200-205 [doi]
- Asymptotic Stability Criterion for the Networked Control Systems Based on Time-Delay SystemXi Min Zhang, Ya Di Zhang. 206-210 [doi]
- Hierarchical Probabilistic Network-Based System for Traffic Accident Detection at IntersectionsJu-Won Hwang, Youngseol Lee, Sung-Bae Cho. 211-216 [doi]
- Seamless Mobility Support for Adaptive Applications in Heterogeneous Wireless NetworksJiannong Cao, Weigang Wu, Xuan Liu. 217-222 [doi]
- Heterogeneous Multi-layer Wireless Networking for Mobile CPSJia Shen, Fei Xu, Xiangyou Lu, Huafei Li. 223-227 [doi]
- R-CA: A Routing-Based Dynamic Channel Assignment Algorithm in Wireless Mesh NetworksWeifeng Sun, Rong Cong, Feng Xia, Xiao Chen, Zhenquan Qin. 228-232 [doi]
- An ECG-Based Signal Key Establishment Protocol in Body Area NetworksLin Yao, Bing Liu, Kai Yao, Guowei Wu, Jia Wang. 233-238 [doi]
- Design and Implementation of a Wireless Sensor Network for Smart HomesMing Xu, Longhua Ma, Feng Xia, Tengkai Yuan, Jixin Qian, Meng Shao. 239-243 [doi]
- A Mobile Context Sharing System Using Activity and Emotion Recognition with Bayesian NetworksKeunhyun Oh, Han-Saem Park, Sung-Bae Cho. 244-249 [doi]
- Net-in-Net: Interaction Modeling for Smart Community Cyber-Physical SystemLonghua Ma, Jun Yao, Ming Xu, Tengkai Yuan, Meng Shao. 250-255 [doi]
- DISG: Decentralized Inter-user Interference Suppression in Body Sensor Networks with Non-cooperative GameGuowei Wu, Jiankang Ren, Feng Xia, Lin Yao, Zichuan Xu. 256-261 [doi]
- TouchInteract: An Interaction Technique with Large Displays Using Touchscreen-PhoneHanqing Ruan, Yi Qian, Yong Zhang, Min Zhou. 262-265 [doi]
- Haptic u-Table: A Believable Feedback System with a Quasi-tangible Tabletop InterfaceYoungTae Roh, Jun Lee, Jee-In Kim, YoungSeok Ahn, HyungSeok Kim, Mingyu Lim. 266-271 [doi]
- Testing of Component-Based Software: A Metamorphic Testing MethodologyXiao-li Lu, Yun-wei Dong, Chao Luo. 272-276 [doi]
- Experiments on Test Case Reuse of Test Coverage CriteriaYunwei Dong, Yuying Wang, M. F. Lau, Si-yu Lin. 277-281 [doi]
- A Measurement of Software Trustworthiness Based on Approximation AlgorithmsJie Zhou, Hong Zhu. 282-287 [doi]
- An Integrated PLC Smart Home System in Pervasive ComputingYunwei Dong, Bo Zhang, Kang Dong. 288-291 [doi]
- Trustworthiness Expectation of Real-Time Web ServicesXinxing Wu, Yixiang Chen. 292-298 [doi]
- Security Model Oriented Attestation on Dynamically Reconfigurable Component-Based SystemsLiang Gu, Guangdong Bai, Yao Guo, Xiangqun Chen, Hong Mei. 299-304 [doi]
- Formal Definitions for Trust in Trusted ComputingXinmao Gai, Yong Li, Yasha Chen, ChangXiang Shen. 305-310 [doi]
- Assurance Networks: Concepts, Technologies, and Case StudiesYoshiaki Kakuda. 311-315 [doi]
- Sensitivity Analysis of Random Port HoppingKousaburou Hari, Tadashi Dohi. 316-321 [doi]
- Autonomous Community Construction Technology for Timely Transmitting Emergency InformationFan Wei, Md. Emdadul Haque, Yukihiro Fukunaga, Takehiro Gouda, Xiaodong Lu, Kinji Mori. 322-327 [doi]
- File Diffusion Control on Super-Seed Mode Over BitTorrent-Like P2P NetworksYuki Kuwabara, Junichi Funasaka, Kenji Ishida. 328-333 [doi]
- An Extended Micro Loop Routing for Adapting to Energy ConsumptionMario Takeuchi, Eitaro Kohno, Tomoyuki Ohta, Yoshiaki Kakuda. 334-339 [doi]
- Improvement of the Security Against Node Capture Attacks Using Dispersed Data Transmission for Wireless Sensor NetworksEitaro Kohno, Tomoya Okazaki, Mario Takeuchi, Tomoyuki Ohta, Yoshiaki Kakuda, Masaki Aida. 340-345 [doi]
- Architecture-Oriented Assurance Technology in MicrogridTianhu Ma, Peng Li, Yanbo Wang, Yongdong Tan. 346-351 [doi]
- Application of Deterministic Annealing EM Algorithm to Markovian Arrival Process Parameter EstimationHiroyuki Okamura, Hidenari Kishikawa, Tadashi Dohi. 352-357 [doi]
- Dual-EigenRep: A Reputation-Based Trust Model for P2P File-Sharing NetworksXinxin Fan, MingChu Li, Yizhi Ren, Jianhua Ma. 358-363 [doi]
- On Alternation and Information Sharing among Cooperating Autonomous Management AgentsSiri Fagernes, Alva L. Couch. 364-369 [doi]
- Autonomic Fault Identification for Ubiquitous Self Healing SystemsJunaid Ahsenali Chaudhry, Muhammad Imran. 370-374 [doi]
- An SVM Based Automatic Segmentation Method for Brain Magnetic Resonance Image SeriesBofeng Zhang, Wenhao Zhu, Hui Zhu, Anping Song, Wu Zhang. 375-379 [doi]
- Verification of a Sub-ontology Update Mechanism for the Semantic GridToshihiro Uchibayashi, Bernady O. Apduhan, Norio Shiratori, J. Wenny Rahayu, David Taniar. 380-385 [doi]
- A Framework of Organic Streams: Integrating Dynamically Diversified Contents into Ubiquitous Personal StudyHong Chen, Xiaokang Zhou, Haifeng Man, Yan Wu, Ashraf Uddin Ahmed, Qun Jin. 386-391 [doi]
- Making Architectural Decisions Based on Requirements: Analysis and Combination of Risk-Based and Quality Attribute-Based MethodsBingfeng Xu, Zhiqiu Huang, Ou Wei. 392-397 [doi]
- Monitoring Spatially Referenced Entities in Wireless Sensor NetworksFarhana Jabeen, Alvaro A. A. Fernandes. 398-403 [doi]
- An Idle-Time Eliminating Channel Transmission Scheme in EPON SystemJianhua Shen, Hongmei Guo, Zhengkun Mi. 404-409 [doi]
- Cloud Computing Landscape and Research Challenges Regarding Trust and ReputationSheikh Mahbub Habib, Sebastian Ries, Max Mühlhäuser. 410-415 [doi]
- A Flexible Multi-Source Web Service's QoS Acquisition Framework and ImplementationJunfeng Zhao, Lingshuang Shao, Zhiwen Cheng, Bing Xie. 416-421 [doi]
- Towards Trustworthy Composite Service Through Business Process Model VerificationWenjia Huai, Xudong Liu, Hailong Sun 0001. 422-427 [doi]
- Formal Analysis of Behavioural Equivalence for Trustworthy and Composite Web ServicesYongwang Zhao, Chunyang Hu, Min Liu, Dianfu Ma. 428-433 [doi]
- DS Theory-Based Software Trustworthiness Classification AssessmentBen Wang, Xingshe Zhou, Gang Yang, Yalei Yang. 434-438 [doi]
- Static Detection Unsafe Use of variables In JavaXiaoquan Wu, Jun Wei. 439-443 [doi]
- Mining Frequent Development Patterns of roles in Open Source SoftwareLin Yuan, Huaimin Wang, Gang Yin, Dianxi Shi, Xiang Li, Bixin Liu. 444-448 [doi]
- Checking Compliance to Coding Standards for x86 ExecutablesZiying Dai, Xiaoguang Mao, Dianlin Wang, Donghong Liu, Jie Zhang. 449-455 [doi]
- User-Centered Trust Model Visibility of Trust TechnologiesHao Jiang, Yang Li, Yongjun Xu. 456-459 [doi]
- MiniMASC: A Framework for Diverse Autonomic Adaptations of Web Service CompositionsQinghua Lu, Vladimir Tosic. 460-468 [doi]
- PCR-a Position-and-Connectivity-Based Routing Protocol for VANETsLei Lin, Xiaoqiang Xiao, Ming Xu, Liqi Wei. 469-473 [doi]
- MiniMASC+MiniZinc: An Autonomic Business-Driven Decision Making Middleware for Adaptation of Web Service CompositionsQinghua Lu, Vladimir Tosic. 474-477 [doi]
- Exploration on Integrated Development Environment of Trusted Data Processing Oriented Software Product Line for WEB ApplicationHongwen Huang, Xinyu Zhang, Li Zheng, Shulan Zhao. 478-480 [doi]
- An Indoor Location-Based Social Network for Managing Office Resource and Connecting PeopleHao Wang 0020, Lijun Zhu, Alvin Chin. 481-483 [doi]
- Drive Smartly as a Taxi DriverYu Zheng 0004, Jing Yuan, Wenlei Xie, Xing Xie 0001, Guangzhong Sun. 484-486 [doi]
- HouseGenie: Universal Monitor and Controller of Networked Devices on Touchscreen Phone in Smart HomeYue Suo, Chenjun Wu, Yongqiang Qin, Chun Yu, Yu Zhong, Yuanchun Shi. 487-489 [doi]
- A-CUBE: A Tangible Tabletop Application to Support Safe and Independent Chemistry ExperimentsAkifumi Sokan, Kaori Fujinami. 490-493 [doi]
- Fall Detecting and Alarming Based on Mobile PhoneZhongtang Zhao, Yiqiang Chen, Junfa Liu, Zhongtang Zhao. 494-497 [doi]
- Taxi-Viewer: Around the Corner Taxis Are!Ke Hu, Zhangguang He, Yang Yue. 498-500 [doi]
- Directional Wi-Fi Based Indoor Location System for EmergencyMi Zhao, Hua Yang, Junfa Liu, Yiqiang Chen, Jingye Zhou. 501-502 [doi]
- Speech and Auditory Interfaces for Ubiquitous, Immersive and Personalized ApplicationsLei Xie 0001, Wenhuai Zhao, Xiangzeng Zhou, Xiaohai Tian, Bingfeng Li, Naicai Sun, Yali Zhao, Yanning Zhang. 503-505 [doi]
- GeeAir: Waving in the Air to Control Home AppliancesJiahui Wu, Gang Pan, Shijian Li, Zhaohui Wu, Daqing Zhang. 506-508 [doi]