


default search action
UIC/ATC Workshops 2010: Xi'an, China
- Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing: 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing, UIC-ATC 2010, 26-29 October 2010, Xi'an, China. IEEE Computer Society 2010, ISBN 978-0-7695-4272-0

- Jiehan Zhou

, Jun-Zhao Sun, Kumaripaba Athukorala, Dinesh Wijekoon:
Pervasive Social Computing: Augmenting Five Facets of Human Intelligence. 1-6 - Xing Zhang, Haipeng Wang, Zhiwen Yu:

Toward a Smart Home Environment for Elder People Based on Situation Analysis. 7-12 - Jie Sun

, Yongping Zhang, Jianbo Fan:
Providing Real-Time Guarantees to Smart Car. 13-17 - Scottie Chih-Chieh Huang, Shen-Guan Shih:

MSOrgm©: Emergent Techniques for Kinetic Artifact. 18-23 - Gábor Kiss

:
A Comparison of Programming Skills by Genders of Hungarian Grammar School Students. 24-30 - Qi-sheng Wu, Xiang-long Luo, Han Li, Pan-zhi Liu:

An Improved Multi-Scale Retinex Algorithm for Vehicle Shadow Elimination Based on Variational Kimmel. 31-34 - Ivan Lee

:
Reliability Analysis of a Multiview Multi-description Video Streaming System. 35-39 - K. L. Eddie Law, Sunny So:

QoS Control Framework for Ubiquitous Multimedia Computing. 40-44 - Chao Liu, Susumu Shibusawa, Tatsuhiro Yonekura:

A Walkthrough System with Improved Map Projection Panoramas from Omni Directional Images. 45-51 - Chao Chen, Sumi Helal

:
Toward a Programming Model for Safer Pervasive Spaces. 52-57 - Ming-Huwi Horng, Ting-Wei Jiang:

Multilevel Image Thresholding Selection Based on the Firefly Algorithm. 58-63 - Zhenglin Wang, Ivan Lee

:
A Study of Video Coding by Reusing Compressive Sensing Measurements. 64-69 - Yo-Ping Huang, Change-Tse Chou, Jung-Shian Jau, Frode Eika Sandnes

:
Water Quality Monitoring with Ubiquitous Computing. 70-75 - Yue-Shan Chang, Chih-Tien Fan:

A Mobile Agent-Based Software Intelligence Framework in Ubiquitous Environment. 76-81 - Hung-Chi Chu, Wei-Kai Wang, Yong-Hsun Lai:

Sweep Coverage Mechanism for Wireless Sensor Networks with Approximate Patrol Times. 82-87 - Elizabeth Papadopoulou, Sarah Gallacher, Nick K. Taylor

, M. Howard Williams:
Personal Smart Spaces as a Basis for Identifying Users in Pervasive Systems. 88-93 - Yung-Fa Huang

, Cing-Chia Lai, Ling-Cheng Hsu, Tan-Hsu Tan:
Performance on Adaptive Path Selection Scheme for Cooperative Communication Networks. 94-98 - Chuan-Jun Su, Bo-Jung Chen:

Ubiquitous Community Care Using Sensor Network and Mobile Agent Technology. 99-104 - Du-Ming Tsai, Wei-Yao Chiu:

A Macro-observation Approach of Intelligence Video Surveillance for Real-Time Unusual Event Detection. 105-110 - Long Zhao Hua, Jia Zhen, Li Tao:

Research on Pervasive Computing Security. 111-115 - Tien-Ho Chen, Yen-Chiu Chen, Wei-Kuan Shih:

An Advanced ECC ID-Based Remote Mutual Authentication Scheme for Mobile Devices. 116-120 - Simen Hagen, Frode Eika Sandnes

:
Visual Scoping of Private Information Displayed on Shared Tabletop Surfaces. 121-125 - Yang Ming, Yumin Wang:

Improved Identity Based Online/Offline Signature Scheme. 126-131 - Yahui Li, Yadi Zhang, Wen Sheng Niu:

A Method of Privacy Preserving in Mobile Wireless Environments. 132-137 - Shu-Kai S. Fan, Yu-Chiang Chuang:

A New Image Registration Method Using Intensity Difference Data on Overlapped Image. 138-141 - Saaidal Razalli Azzuhri

, Marius Portmann
, Wee Lum Tan
:
Adaptive Wireless Mesh Networks Routing Protocols. 142-147 - Yanrong Ding, Xiaodong Wang, Hu Shen, Pengyu Guo:

Media Access Control Protocol Based on Hybrid Antennas in Ad Hoc Networks. 148-153 - Cai Fu, Jihang Ye, Li Zhang, Yunhe Zhang, Lansheng Han:

A Dynamic Risk Assessment Framework Using Principle Component Analysis with Projection Pursuit in Ad Hoc Networks. 154-159 - Satheesh Abimannan

, D. Kumar, S. Krishnaveni:
Dynamic Adaptive Self-Configurable Network Processor. 160-164 - Jian Liu, Fangmin Li

, Fei Dou, Xu He, Zhigang Luo, Hong Xiong:
An Adaptive Cross-Layer Mechanism of Multi-channel Multi-interface Wireless Networks for Real-Time Video Streaming. 165-170 - Wei-dong Yang, Ji-Zhao Liu, Xinyun Zhou:

An Trace Based Vehicular Mobility Model for Simulation of Vehicular Delay Tolerant Networks. 171-174 - Linlan Liu, Youlei Fan, Jian Shu, Kun Yu:

A Link Quality Prediction Mechanism for WSNs Based on Time Series Model. 175-179 - Jianwei Niu

, Feifei Wu, Da Huo, Kai Hu:
Message Publish/Subscribe Scheme Based on Opportunistic Networks. 180-184 - Jia Liu, Junzhao Du, Jie Zhang, Xiaojun Li, Hui Liu:

RANC: Opportunistic Multi-path Routing Protocol in WSNs Using Reality-Aware Network Coding. 185-190 - Zhigang Jin, Jia Wang, Sainan Zhang, Yantai Shu:

Epidemic-Based Controlled Flooding and Adaptive Multicast for Delay Tolerant Networks. 191-194 - Tong Hu, Feng Hong

, Xiqing Zhang, Zhongwen Guo:
BiBUBBLE: Social-based Forwarding in Pocket Switched Networks. 195-199 - Zhong-Hua Wang, Kai Chen, Mei Lin, Min Yu:

Energy-Efficient Clustering Rumor Routing Protocol for Wireless Sensor Networks. 200-205 - Xi-min Zhang, Ya-di Zhang:

Asymptotic Stability Criterion for the Networked Control Systems Based on Time-Delay System. 206-210 - Ju-Won Hwang, Youngseol Lee, Sung-Bae Cho:

Hierarchical Probabilistic Network-Based System for Traffic Accident Detection at Intersections. 211-216 - Jiannong Cao

, Weigang Wu, Xuan Liu:
Seamless Mobility Support for Adaptive Applications in Heterogeneous Wireless Networks. 217-222 - Jia Shen, Fei Xu, Xiangyou Lu, Huafei Li:

Heterogeneous Multi-layer Wireless Networking for Mobile CPS. 223-227 - Weifeng Sun, Rong Cong, Feng Xia

, Xiao Chen, Zhenquan Qin
:
R-CA: A Routing-Based Dynamic Channel Assignment Algorithm in Wireless Mesh Networks. 228-232 - Lin Yao, Bing Liu, Kai Yao, Guowei Wu, Jia Wang:

An ECG-Based Signal Key Establishment Protocol in Body Area Networks. 233-238 - Ming Xu, Longhua Ma, Feng Xia

, Tengkai Yuan, Jixin Qian, Meng Shao:
Design and Implementation of a Wireless Sensor Network for Smart Homes. 239-243 - Keunhyun Oh, Han-Saem Park, Sung-Bae Cho:

A Mobile Context Sharing System Using Activity and Emotion Recognition with Bayesian Networks. 244-249 - Longhua Ma, Jun Yao, Ming Xu, Tengkai Yuan, Meng Shao:

Net-in-Net: Interaction Modeling for Smart Community Cyber-Physical System. 250-255 - Guowei Wu, Jiankang Ren, Feng Xia

, Lin Yao, Zichuan Xu:
DISG: Decentralized Inter-user Interference Suppression in Body Sensor Networks with Non-cooperative Game. 256-261 - Hanqing Ruan, Yi Qian, Yong Zhang, Min Zhou:

TouchInteract: An Interaction Technique with Large Displays Using Touchscreen-Phone. 262-265 - YoungTae Roh, Jun Lee, Jee-In Kim, YoungSeok Ahn, HyungSeok Kim

, Mingyu Lim
:
Haptic u-Table: A Believable Feedback System with a Quasi-tangible Tabletop Interface. 266-271 - Xiao-li Lu, Yun-wei Dong, Chao Luo:

Testing of Component-Based Software: A Metamorphic Testing Methodology. 272-276 - Yunwei Dong, Yuying Wang, M. F. Lau, Si-yu Lin:

Experiments on Test Case Reuse of Test Coverage Criteria. 277-281 - Jie Zhou, Hong Zhu:

A Measurement of Software Trustworthiness Based on Approximation Algorithms. 282-287 - Yunwei Dong, Bo Zhang, Kang Dong:

An Integrated PLC Smart Home System in Pervasive Computing. 288-291 - Xinxing Wu

, Yixiang Chen:
Trustworthiness Expectation of Real-Time Web Services. 292-298 - Liang Gu, Guangdong Bai, Yao Guo

, Xiangqun Chen, Hong Mei:
Security Model Oriented Attestation on Dynamically Reconfigurable Component-Based Systems. 299-304 - Xinmao Gai, Yong Li, Yasha Chen, Changxiang Shen:

Formal Definitions for Trust in Trusted Computing. 305-310 - Yoshiaki Kakuda:

Assurance Networks: Concepts, Technologies, and Case Studies. 311-315 - Kousaburou Hari, Tadashi Dohi

:
Sensitivity Analysis of Random Port Hopping. 316-321 - Fan Wei, Md. Emdadul Haque, Yukihiro Fukunaga, Takehiro Gouda, Xiaodong Lu, Kinji Mori:

Autonomous Community Construction Technology for Timely Transmitting Emergency Information. 322-327 - Yuki Kuwabara, Junichi Funasaka, Kenji Ishida:

File Diffusion Control on Super-Seed Mode Over BitTorrent-Like P2P Networks. 328-333 - Mario Takeuchi, Eitaro Kohno, Tomoyuki Ohta, Yoshiaki Kakuda:

An Extended Micro Loop Routing for Adapting to Energy Consumption. 334-339 - Eitaro Kohno, Tomoya Okazaki, Mario Takeuchi, Tomoyuki Ohta, Yoshiaki Kakuda, Masaki Aida:

Improvement of the Security Against Node Capture Attacks Using Dispersed Data Transmission for Wireless Sensor Networks. 340-345 - Tianhu Ma, Peng Li, Yanbo Wang, Yongdong Tan:

Architecture-Oriented Assurance Technology in Microgrid. 346-351 - Hiroyuki Okamura

, Hidenari Kishikawa, Tadashi Dohi
:
Application of Deterministic Annealing EM Algorithm to Markovian Arrival Process Parameter Estimation. 352-357 - Xinxin Fan, Mingchu Li, Yizhi Ren, Jianhua Ma:

Dual-EigenRep: A Reputation-Based Trust Model for P2P File-Sharing Networks. 358-363 - Siri Fagernes, Alva L. Couch:

On Alternation and Information Sharing among Cooperating Autonomous Management Agents. 364-369 - Junaid Ahsenali Chaudhry, Muhammad Imran

:
Autonomic Fault Identification for Ubiquitous Self Healing Systems. 370-374 - Bofeng Zhang, Wenhao Zhu, Hui Zhu, Anping Song, Wu Zhang:

An SVM Based Automatic Segmentation Method for Brain Magnetic Resonance Image Series. 375-379 - Toshihiro Uchibayashi

, Bernady O. Apduhan, Norio Shiratori, J. Wenny Rahayu, David Taniar
:
Verification of a Sub-ontology Update Mechanism for the Semantic Grid. 380-385 - Hong Chen

, Xiaokang Zhou, Haifeng Man, Yan Wu, Ashraf Uddin Ahmed, Qun Jin:
A Framework of Organic Streams: Integrating Dynamically Diversified Contents into Ubiquitous Personal Study. 386-391 - Bingfeng Xu, Zhiqiu Huang, Ou Wei:

Making Architectural Decisions Based on Requirements: Analysis and Combination of Risk-Based and Quality Attribute-Based Methods. 392-397 - Farhana Jabeen

, Alvaro A. A. Fernandes:
Monitoring Spatially Referenced Entities in Wireless Sensor Networks. 398-403 - Jianhua Shen, Hongmei Guo, Zhengkun Mi:

An Idle-Time Eliminating Channel Transmission Scheme in EPON System. 404-409 - Sheikh Mahbub Habib

, Sebastian Ries, Max Mühlhäuser
:
Cloud Computing Landscape and Research Challenges Regarding Trust and Reputation. 410-415 - Junfeng Zhao, Lingshuang Shao, Zhiwen Cheng, Bing Xie:

A Flexible Multi-Source Web Service's QoS Acquisition Framework and Implementation. 416-421 - Wenjia Huai, Xudong Liu, Hailong Sun:

Towards Trustworthy Composite Service Through Business Process Model Verification. 422-427 - Yongwang Zhao, Chunyang Hu, Min Liu, Dianfu Ma:

Formal Analysis of Behavioural Equivalence for Trustworthy and Composite Web Services. 428-433 - Ben Wang, Xingshe Zhou, Gang Yang, Yalei Yang:

DS Theory-Based Software Trustworthiness Classification Assessment. 434-438 - Xiaoquan Wu, Jun Wei:

Static Detection Unsafe Use of variables In Java. 439-443 - Lin Yuan, Huaimin Wang, Gang Yin, Dianxi Shi, Xiang Li, Bixin Liu:

Mining Frequent Development Patterns of roles in Open Source Software. 444-448 - Ziying Dai, Xiaoguang Mao

, Dianlin Wang, Donghong Liu, Jie Zhang:
Checking Compliance to Coding Standards for x86 Executables. 449-455 - Hao Jiang, Yang Li, Yongjun Xu:

User-Centered Trust Model Visibility of Trust Technologies. 456-459 - Qinghua Lu, Vladimir Tosic:

MiniMASC: A Framework for Diverse Autonomic Adaptations of Web Service Compositions. 460-468 - Lei Lin, Xiaoqiang Xiao, Ming Xu, Liqi Wei:

PCR-a Position-and-Connectivity-Based Routing Protocol for VANETs. 469-473 - Qinghua Lu, Vladimir Tosic:

MiniMASC+MiniZinc: An Autonomic Business-Driven Decision Making Middleware for Adaptation of Web Service Compositions. 474-477 - Hongwen Huang, Xinyu Zhang, Li Zheng, Shulan Zhao:

Exploration on Integrated Development Environment of Trusted Data Processing Oriented Software Product Line for WEB Application. 478-480 - Hao Wang, Lijun Zhu, Alvin Chin:

An Indoor Location-Based Social Network for Managing Office Resource and Connecting People. 481-483 - Yu Zheng, Jing Yuan, Wenlei Xie, Xing Xie, Guangzhong Sun:

Drive Smartly as a Taxi Driver. 484-486 - Yue Suo, Chenjun Wu, Yongqiang Qin, Chun Yu, Yu Zhong, Yuanchun Shi:

HouseGenie: Universal Monitor and Controller of Networked Devices on Touchscreen Phone in Smart Home. 487-489 - Akifumi Sokan, Kaori Fujinami:

A-CUBE: A Tangible Tabletop Application to Support Safe and Independent Chemistry Experiments. 490-493 - Zhongtang Zhao, Yiqiang Chen

, Junfa Liu, Zhongtang Zhao:
Fall Detecting and Alarming Based on Mobile Phone. 494-497 - Ke Hu, Zhangguang He, Yang Yue

:
Taxi-Viewer: Around the Corner Taxis Are! 498-500 - Mi Zhao, Hua Yang, Junfa Liu, Yiqiang Chen

, Jingye Zhou:
Directional Wi-Fi Based Indoor Location System for Emergency. 501-502 - Lei Xie, Wenhuai Zhao, Xiangzeng Zhou, Xiaohai Tian, Bingfeng Li, Naicai Sun, Yali Zhao, Yanning Zhang:

Speech and Auditory Interfaces for Ubiquitous, Immersive and Personalized Applications. 503-505 - Jiahui Wu, Gang Pan, Shijian Li, Zhaohui Wu, Daqing Zhang:

GeeAir: Waving in the Air to Control Home Appliances. 506-508

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














