


default search action
UIC/ATC 2012: Fukuoka, Japan
- Bernady O. Apduhan, Ching-Hsien Hsu, Tadashi Dohi, Kenji Ishida, Laurence Tianruo Yang, Jianhua Ma:

9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, UIC/ATC 2012, Fukuoka, Japan, September 4-7, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-3084-8
The Ninth IEEE International Conference on Ubiquitous Intelligence and Computing (IEEE UIC 2012)
Ubiquitous and Intelligent Systems
- Aravind Kota Gopalakrishna

, Tanir Özçelebi, Antonio Liotta
, Johan J. Lukkien:
Treatment of Missing Data in Intelligent Lighting Applications. 1-8 - Ji-Jer Huang, Sheng-I Yu, Hao-Yi Syu:

Development of the Smart Toilet Equipment with Measurements of Physiological Parameters. 9-16 - Yasuaki Sumida, Masaki Hayashi, Kazuaki Goshi, Katsuya Matsunaga:

Development of a Route Finding System for Manual Wheelchair Users Based on Actual Measurement Data. 17-23 - Young-Mok Min, Joon-Young Paik, Eun-Sun Cho

:
A Lingustic Approach for Robustness in Context Aware Applications. 24-31
Wireless and Ad-Hoc Network
- Chung-Chih Kuo, Hung-Yi Teng, Ren-Hung Hwang

:
Downlink Scheduling and Resource Allocation in EPON-WiMAX Integrated Networks. 32-39 - Muhammad Ashad Kabir

, Jun Han, Alan W. Colman
, Jian Yu
:
SocioTelematics: Leveraging Interaction-Relationships in Developing Telematics Systems to Support Cooperative Convoys. 40-47 - Hua-Wen Tsai, Tzung-Shi Chen, Bing-Hong Tsai, Cheng-Hao Chu, Jeng-Shian Tsai:

Data Gathering in a Hybrid Wireless Sensor Network. 48-55 - Satoru Ohta, Shingo Toda:

Anycast Routing Based on Connectivity Metric for Sensor and Ad Hoc Networks. 56-63
Vehicle Ad-Hoc Network
- Fusang Zhang, Beihong Jin, Wei Zhuo, Zhaoyang Wang, Lifeng Zhang:

A Content-Based Publish/Subscribe System for Efficient Event Notification over Vehicular Ad Hoc Networks. 64-71 - Hassan Abid, TaeChoong Chung, Sungyoung Lee, Saad B. Qaisar

:
Performance Analysis of LTE Smartphones-Based Vehicle-to-Infrastrcuture Communication. 72-78 - Jianbin Jia, Yingwen Chen, Ming Xu, Gu Yu:

Improving the Estimation of Residual Delay based Forwarding Method in Opportunistic Vehicular Networks. 79-86
Smart Environment
- Kang-Wook Kim, Myung-Gon Park, Takao Hishikawa, Junghee Han, Chang-Gun Lee:

Exploiting Ultrasonic Reflections for Improving Accuracy of Indoor Location Tracking. 87-95 - Yibing Xiong, Huiping Lin:

Routine Based Analysis for User Classification and Location Prediction. 96-103 - Hugo Cruz-Sanchez, Lionel Havet, Moutie Chehaider, Yeqiong Song

:
MPIGate: A Solution to Use Heterogeneous Networks for Assisted Living Applications. 104-111 - Abdelsalam Helal

, Kyungeun Cho, Wonsik Lee, Yunsick Sung, Jaewoong Lee, Eunju Kim:
3D Modeling and Simulation of Human Activities in Smart Spaces. 112-119
Wireless Sensor Network
- Xing Liu, Xunxing Diao, Kun Mean Hou, Hailun Zhu, Xin Liu, Yazhou Wang, Wei Jia:

Java Virtual Machine Based Infrastructure for Decent Wireless Sensor Network Development Environment. 120-127 - Lei Tang, Xingshe Zhou, Christian Becker

, Zhiwen Yu, Gregor Schiele:
Situation-Based Design: A Rapid Approach for Pervasive Application Development. 128-135 - Meng-Yen Hsieh, Hua-Yi Lin, Ching-Hung Yeh, Kuan-Ching Li

, Bo-Shiung Wu:
A Mobile Application Framework for Rapid Integration of Ubiquitous Web Services. 136-142
Intelligent and Social Computing
- Akihito Yoshii, Tatsuo Nakajima:

Study of a Conversational Agent System Encouraging "Real" Answers of Individuals in a Group of Acquaintances. 143-150 - Sarah Gallacher, Elizabeth Papadopoulou, Nick K. Taylor

, Fraser R. Blackmun, M. Howard Williams:
Intelligent Systems that Combine Pervasive Computing and Social Networking. 151-158 - Toshihiko Yamakami:

A Four-Stage Gate-Keeper Model of Social Service Engineering: Lessons from Golden Rules of Mobile Social Game Design. 159-163 - Haoyi Xiong

, Daqing Zhang, Daqiang Zhang, Vincent Gauthier
:
Predicting Mobile Phone User Locations by Exploiting Collective Behavioral Patterns. 164-171
Ubiquitous Systems and Applications
- Wei Hu, Yaoxue Zhang, Yuezhi Zhou, Zhi Xue:

Contribution-Based User Reputation Modeling in Collaborative Recommender Systems. 172-179 - Yi-Ting Chiang, Jane Yung-jen Hsu:

Knowledge Transfer in Activity Recognition Using Sensor Profile. 180-187 - Bin Guo, Zhiwen Yu, Xingshe Zhou, Daqing Zhang:

Hybrid SN: Interlinking Opportunistic and Online Communities to Augment Information Dissemination. 188-195 - Anh Lê Tuán

, Hoan Nguyen Mau Quoc, Martin Serrano, Manfred Hauswirth, John Soldatos
, Thanasis G. Papaioannou
, Karl Aberer:
Global Sensor Modeling and Constrained Application Methods Enabling Cloud-Based Open Space Smart Services. 196-203
Energy Efficient and Green Computing
- Si-Hyuk Yi, Sung-Bae Cho:

A Battery-Aware Energy-Efficient Android Phone with Bayesian Networks. 204-209 - Wen-Hwa Liao, Ssu-Chi Kuai:

An Energy-Efficient Data Collection Mechanism with a Mobile Sink for Wireless Sensor Networks. 210-216 - Cheng-Jen Tang, Miau Ru Dai:

Demand Response Control Strategies for On-campus Small Data Centers. 217-224 - Yih-Chuan Lin, Jia-Hong Zhong:

Hilbert-Chain Topology for Energy Conservation in Large-Scale Wireless Sensor Networks. 225-232
Security and Intelligent Systems
- Sarah Gallacher, Elizabeth Papadopoulou, Nick K. Taylor

, M. Howard Williams:
The Challenge of Preparational Behaviours in Preference Learning for Ubiquitous Systems. 233-239 - Shunsuke Tokumoto, Tadashi Dohi

:
Risk-Based Intelligent Software Release Planning. 240-247 - Yao-Chung Fan

, Xingjie Liu, Wang-Chien Lee, Arbee L. P. Chen:
Efficient Time Series Disaggregation for Non-intrusive Appliance Load Monitoring. 248-255 - Frode Eika Sandnes

, Xiaoli Zhang:
User Identification Based on Touch Dynamics. 256-263
P2P and RFID
- Rei Endo, Kazuyuki Takayama, Yoshiki Sakata, Hiroshi Shigeno:

Neighbor Selection Method Based on Sending Capacity for P2P Live Streaming with Layer Coding. 264-271 - Chiu-Kuo Liang, Hsin-Mo Lin:

Using Dynamic Slots Collision Tracking Tree Technique Towards an Efficient Tag Anti-collision Algorithm in RFID Systems. 272-277 - Yufeng Wang, Xiangming Li, Qun Jin, Jianhua Ma:

AB-Chord: An Efficient Approach for Resource Location in Structured P2P Networks. 278-284 - Jung-Min Yun, Peom Park:

Development of Industrial Safety Management System for Shipbuilding Industry Using RFID/USN. 285-291
Wireless Sensor Network and Mobile Computing
- Chao Gao, Ilkka Kivelä, Xinyu Tan

, Ismo Hakala
:
A Transmission Scheduling for Data-Gathering Wireless Sensor Networks. 292-297 - Alireza Masoum, Nirvana Meratnia, Paul J. M. Havinga:

A Decentralized Quality Aware Adaptive Sampling Strategy in Wireless Sensor Networks. 298-305 - Weigang Wu, Jiannong Cao

, Hejun Wu, Jingjing Li:
Robust and Dynamic Data Aggregation in Wireless Sensor Networks: A Cross-Layer Approach. 306-313 - Ing-Chau Chang, Chien-Hsun Li, Cheng-Fu Chou:

The IG-Ferry Protocol to Support Efficient Controlled Replication in Vehicular Delay Tolerant Network. 314-321
Intelligent Systems, Software, and Objects
- Muhammad Usman, Vallipuram Muthukkumarasamy, Xin-Wen Wu

, Surraya Khanum:
Wireless Smart Home Sensor Networks: Mobile Agent Based Anomaly Detection. 322-329 - Chin-Yu Chang, Chang-Hong Lin:

An Efficient Method for Lane-Mark Extraction in Complex Conditions. 330-336 - Teng-Hui Tseng, Chin-Lun Lai

, Sheng-Ta Hsieh, Jun-Horng Chen:
An Intelligent Accessing Control System Based on Human Intention Analysis. 337-341 - Youngjae Lim, Jaekyu Park

, Eui S. Jung, David Ho Chung, Taeil Kim, Kwangsoo Choi, Seunghun Lee:
Comparative Study on Advanced TV Interface Types in the Smart Media World. 342-348
Theory and Applications
- Hyung Ku Kang, Dae-Gun Kim, Hwi Woon Jeong, Geon Yong Park, Hee Yong Youn:

A Novel Interval Grey Number and Entropy-based Solution for Multiple-Criteria Group Decision Making Problem. 349-356 - Ching-Hsien Hsu, Chia-Hao Yu, Chun-Yao Chung, Chao-Tung Yang

, Chih-Hsun Chou:
An Overlap Aware Technique for Redundant Reader Elimination. 357-360 - Xin Lai, Cong Liu, Zhiying Wang, Quanyou Feng:

Backlog Bounds Analysis of Different On-chip Cache Coherence Policies: A Network Calculus-Based Approch. 361-365 - Lucas A. Almeida, Fabricio Nogueira Buzeto, Ana H. O. R. Castillo, Carla Denise Castanho, Ricardo Pezzuol Jacobi

:
Hydra: An Ubiquitous Application for Service Rerouting. 366-373
Security and Fault Management
- Yao-Tang Chang, Chuen-Ching Wang:

Confidential Enhancement with Multi-code Keying Reconfiguration over Time-Shifted CHPC-based 2D OCDMA Networks. 374-381 - Radosveta Sokullu

, Ozlem Karaca
:
Fault Management for Smart Wireless Sensor Networks. 382-387 - Ching-Hung Yeh, Meng-Yen Hsieh, Kuan-Ching Li

:
An Efficient Clustering Authentication Mechanism for Mobile Ad Hoc Networks. 388-393 - Ahmed Mohamed, Christophe Jacquet, Yacine Bellik:

A Fault Detection and Diagnosis Framework for Ambient Intelligent Systems. 394-401
Demo Session
- Kazuaki Goshi, Masaki Hayashi, Katsuya Matsunaga:

Safe Driving Education System ASSIST - Education Anywhere, Anytime. 402-404 - Koki Morii, Koji Taketa, Yuichiro Mori, Hideharu Kojima

, Eitaro Kohno, Shinji Inoue, Tomoyuki Ohta, Yoshiaki Kakuda:
A New Generation Children Tracking System Using Bluetooth MANET Composed of Android Mobile Terminals. 405-407
The Ninth IEEE International Conference on Autonomic and Trusted Computing (IEEE ATC 2012)
AC/OC Architectures and Systems, Components, and Modules
- Ryo Hamamoto

, Chisa Takano, Kenji Ishida, Masaki Aida:
Guaranteeing Asymptotic Stability of Clustering by Autonomous Decentralized Structure Formation. 408-414 - Tarak Chaari, Kaouthar Fakhfakh:

Semantic Modeling and Reasoning at Runtime for Autonomous Systems Engineering. 415-422 - Luís Assunção

, Carlos Gonçalves
, José C. Cunha:
Autonomic Activities in the Execution of Scientific Workflows: Evaluation of the AWARD Framework. 423-430 - Ramon Nou

, Jacobo Giralt, Toni Cortes
:
Automatic I/O Scheduler Selection through Online Workload Analysis. 431-438
Trust Models and Specifications, Tools, and Interfaces
- Kevin S. Chan, Jin-Hee Cho, Sibel Adali:

Composite Trust Model for an Information Sharing Scenario. 439-446 - Jorge Munoz-Gama

, Isao Echizen:
Insuring Sensitive Processes through Process Mining. 447-454 - Bo Sun, Yunwei Dong, Hong Ye:

On Enhancing Adaptive Random Testing for AADL Model. 455-461 - Junjun Zheng

, Hiroyuki Okamura
, Tadashi Dohi
:
Component Importance Analysis of Virtualized System. 462-469
Trusted Reliable and Dependable Systems I
- Yuan Gao, Yaoxue Zhang, Yuezhi Zhou:

Performance Analysis of Virtual Disk System for Transparent Computing. 470-477 - Tadashi Dohi

, Hiroyuki Okamura
, Kishor S. Trivedi:
Optimizing Software Rejuvenation Policies under Interval Reliability Criteria. 478-485 - Fumio Machida, Jianwen Xiang, Kumiko Tadano, Yoshiharu Maeno:

Combined Server Rejuvenation in a Virtualized Data Center. 486-493
Trusted Reliable and Dependable Systems II
- Chao Luo, Hiroyuki Okamura

, Tadashi Dohi
:
Model-Based Performance Optimization of Generalized Snapshot Isolation in Database System. 494-500 - Masaya Yamada, Saneyasu Yamaguchi:

Filesystem Layout Reorganization in Virtualized Environment. 501-508 - Wenting Wang, Haopeng Chen, Xi Chen:

An Availability-Aware Virtual Machine Placement Approach for Dynamic Scaling of Cloud Applications. 509-516
AC/OC Communication and Services, Tools, and Interfaces
- Yonggang Wang, Ennan Zhai, Eng Keong Lua, Jian-bin Hu, Zhong Chen:

iSac: Intimacy Based Access Control for Social Network Sites. 517-524 - Tao Yang, Lingbo Kong, Yinyang Wang, Jian-bin Hu, Zhong Chen:

PKU-STRAW-L: A Simulative Platform Evaluate the Power-Saving Rate of the Intelligent Street Lamp System. 525-532 - Toshiaki Hayashi, Satoru Ohta:

Performance Management of Virtual Machines via Passive Measurement and Machine Learning. 533-538
Trust-Related Security and Privacy
- Kenichi Kourai

, Takeshi Azumi, Shigeru Chiba:
A Self-Protection Mechanism against Stepping-Stone Attacks for IaaS Clouds. 539-546 - Felix Musau, Guojun Wang, Song Guo

, Muhammad Bashir Abdullahi
:
Neighbor Similarity Trust against Sybil Attack in P2P E-commerce. 547-554 - Hiroaki Kikuchi, Yoshiki Aoki, Masayuki Terada

, Kazuhiko Ishii, Kimihiko Sekino:
Accuracy of Privacy-Preserving Collaborative Filtering Based on Quasi-homomorphic Similarity. 555-562
Trustworthy Services and Applications
- Wei Chen, Xiaoqiang Qiao, Jun Wei, Tao Huang:

A Two-Level Virtual Machine Self-Reconfiguration Mechanism for the Cloud Computing Platforms. 563-570 - Shen-Chuan Tai, Chuen-Ching Wang, Chien-Shiang Hong, Chih-Pei Yeh, Yao-Tang Chang:

A Frame Rate Up-Conversion Algorithm for 3-D Video. 571-577 - Kyosuke Nagata, Saneyasu Yamaguchi, Hisato Ogawa:

A Power Saving Method with Consideration of Performance in Android Terminals. 578-585
The Third International Symposium on Multidisciplinary Emerging Networks and Systems (MENS 2012)
Modeling of Multidisciplinary Emerging Networks and Systems
- Kousaburo Hari, Tadashi Dohi

:
Dependability Modeling and Analysis of Random Port Hopping. 586-593 - Mario Takeuchi, Anri Kimura, Eitaro Kohno, Tomoyuki Ohta, Yoshiaki Kakuda:

An Assurance Enhanced Route-Split Routing for Non-uniform Node Density in Mobile Ad Hoc Networks. 594-599 - Nobuo Funabiki, Wataru Maruyama, Toru Nakanishi, Kan Watanabe:

An Extension of Routing Tree Algorithm Considering Link Speed Change in IEEE 802.11n Protocol for Wireless Mesh Network. 600-605 - Masaki Aida, Chisa Takano, Masayuki Murata

, Makoto Imase:
Quasi-static Approach for Analyzing Interactions between Networks and Users Based on Decomposition of Timescales. 606-611
Application of Multidisciplinary Emerging Networks and Systems
- Kazuhiro Nakao, Yukikazu Nakamoto:

Toward Remote Service Invocation in Android. 612-617 - Tatsuhiro Tsuchiya

:
Achieving High Availability of Consistent Data in the Presence of Network Partitions. 618-620 - Takahide Uemori, Eitaro Kohno, Yoshiaki Kakuda:

A Routing ID-based Node-disjoint Multipath Scheme for Ad Hoc Networks. 621-626 - Leonardo A. Martucci, Albin Zuccato, Ben J. M. Smeets, Sheikh Mahbub Habib

, Thomas Johansson, Nahid Shahmehri:
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry. 627-632
The 2012 International Workshop on Ubiquitous Information Processing and Management (UIPM 2012)
- Huang-Chi Chen, Yu-Wen Chang, Rey-Chue Hwang:

The Modulation Method Based on Reed-Solomon Code for Watermarking. 633-637 - Fu-Hau Hsu, Min-Hao Wu, Shiuh-Jeng Wang:

Dual-Watermarking by QR-code Applications in Image Processing. 638-643 - Cheng-Ta Huang, Wei-Jen Wang, Min-Yi Tsai, Chin-Feng Lee:

Employing LSB and VQ for Undetectable Secret Data Hiding. 644-649 - Ching-Lung Chang, Chang-Hsuan Hung:

The Design and Realization of Video Phone System in Embedded Platform. 650-654 - Chia Feng Lin, Shyan-Ming Yuan

, Muh-Chyi Leu, Ching-Tsorng Tsai:
A Framework for Scalable Cloud Video Recorder System in Surveillance Environment. 655-660 - Yu-Sheng Wu, Yue-Shan Chang, Tong-Ying Juang, Jing-Shyang Yen:

An Architecture for Video Surveillance Service Based on P2P and Cloud Computing. 661-666 - Yen-Lin Chen

, Chuan-Yen Chiang, Yo-Ping Huang, Shyan-Ming Yuan
:
A Project-Based Curriculum for Teaching C++ Object-Oriented Programming. 667-672 - Sheng-Ta Hsieh, Chih-Dao Chen, Jun-Horng Chen, Chin-Lun Lai

, Yu-Long Syu:
An Expert System Application for Respiratory Infection Diagnostic. 673-678 - Wei-Jen Wang, I-Fan Hsieh, Chun-Chuan Chen

:
Accelerating Computation of DCM for ERP with GPU-Based Parallel Strategy. 679-684 - Leandro Oliveira Freitas

, Giovani Rubert Librelotto
, Henrique G. G. Pereira, Jeferson Kasper, Ricardo Giuliani Martini, Bruno Augusti Mozzaquatro, Rafael T. Pereira
:
Applying Pervasive Computing in an Architecture for Homecare Environments. 685-692 - Hsien-Cheng Lin, Chen-Chia Chen, Echo Huang, Yang Ya-Hui, Cheng-Yuan Chiu:

Assessing the Relationships between IS Success with Intellectual Capital for International Medical Services Centers in Taiwan - The Perspective of Physicians. 693-698 - Takeru Ujinawa, Naohiro Hayashibara:

Squareknot: A Flexible Framework for Actuators and Controllers in Smart Environment. 699-706 - Yu Nakayama

, Suguru Mori:
FOSS4G Based Mobile Web-GIS for Field Survey in Natural Environmental Studies. 707-712 - Wen-Feng Hsu, Guo-Heng Luo, Shyan-Ming Yuan

, Ching-Tsorng Tsai:
Constructing Private Cloud Storage Using Network Attatched Storage. 713-718
The 2012 International Workshop on Ubiquitous Service Models and Applications (USMAP 2012)
- Hong-Jin Chen, Yo-Ping Huang, Yun-Kai Ke:

Ubiquitous Computing and Evaluation of Water Quality by Grey Relational Analysis. 719-724 - Hung-Chi Chu, Wei-Tai Wu, Fang-Lin Chao

, Liza Lee
:
Design and Implementation of an Assisted Body Movement System for Visually Impaired Children. 725-728 - Chih-Tien Fan, Yue-Shan Chang, Wei-Jen Wang, Shyan-Ming Yuan

:
Execution Time Prediction Using Rough Set Theory in Hybrid Cloud. 729-734 - Shang-Lin Hsieh, Ming Hsiung Su, Lu Feng Liu, Wey-Wen Jiang:

A Finite State Machine-Based Fall Detection Mechanism on Smartphones. 735-739 - En-Yu Lin, Don-Lin Yang

, Ming-Chuan Hung:
System Design of an Intelligent Nutrition Consultation and Recommendation Model. 740-745 - Xianyang Jiang, Deshi Li, Shaobo Nie, Jing Luo, Zhonghai Lu:

An Enhanced IOT Gateway in a Broadcast System. 746-751 - Junwei Han, Jianwei Niu

, Alvin Chin, Wei Wang, Chao Tong, Xia Wang:
How Online Social Network Affects Offline Events: A Case Study on Douban. 752-757 - Yi-Lin Yu:

Mixed-Style Print Advertising Combining Fashion Photography and Digital Illustrations: Examining the Print Advertising of Consumer Products in Taiwan. 758-763
The 2012 International Symposium on UbiCom Frontiers - Innovative Research, Systems, and Technologies (UFirst 2012)
- W. P. Liao, Yi-Zong Ou, Edward T.-H. Chu, Chi-Sheng Shih

, Jane W.-S. Liu:
Ubiquitous Smart Devices and Applications for Disaster Preparedness. 764-770 - Yi-Ping Wu, Jun-Horng Chen:

A Surveillance System Designed for the Correction of Sitting Posture in Writing. 771-773 - Ming-Hseng Tseng

, Hsueh-Chen Hsu, Che-Chia Chang, Hua Ting, Hui-Ching Wu
, Ping-Hung Tang:
Development of an Intelligent App for Obstructive Sleep Apnea Prediction on Android Smartphone Using Data Mining Approach. 774-779 - Maryam Bagheri, Seyed-Hassan Mirian-Hosseinabadi, Hoda Mashayekhi

, Jafar Habibi:
Mining Distributed Frequent Itemsets Using a Gossip Based Protocol. 780-785 - Jun-Horng Chen, Teng-Hui Tseng, Chin-Lun Lai

, Sheng-Ta Hsieh:
An Intelligent Virtual Fence Security System for the Detection of People Invading. 786-791 - Toshihiko Yamakami:

From User Experience to Social Experience: A New Perspective for Mobile Social Game Design. 792-796 - Pintsang Chang:

A Distributed Integrated Fare Collection and Accounting System for Metropolitan Railway Transit. 797-802 - Feng Guo, Ying Lin, Shaozi Li, Ying Dai:

Interval-Valued Cloud Model Based Personal Sub-health Status Diagnosing Prototype System on TCM Syndrome Data. 803-810 - Wen-Tzu Chen:

A New RFID Anti-collision Algorithm for the EPCglobal UHF Class-1 Generation-2 Standard. 811-815 - Jin-Neng Wu, Chia-Ching Chan, Ping-Yu Chen, Cheng-Lung Chu:

Design and Implementation of an Auto-Configuration and Cooperation Generation of Web Service User Interface Based on TR-069 Protocol. 816-821
The 2012 International Workshop on Embedded Intelligence and Smart Systems (WEISS 2012)
- Hiroyuki Sakuma, Tetsuo Yamabe, Tatsuo Nakajima:

Enhancing Traditional Games with Augmented Reality Technologies. 822-825 - Eun-Sun Cho

, Sumi Helal
:
Toward Efficient Detection of Semantic Exceptions in Context-Aware Systems. 826-831 - Shih-Chieh Huang, Chien-Chuan Lin, Ming-Shi Wang:

A Vision-Based Vehicle Speed Warning System. 832-834 - Shin-Lu Lien, Mei-Ling Chiang

:
Recovery Mechanism for Diff-based Reprogramming in WSNs. 835-840 - Cheng-Yu Lee, Jen-Chieh Chang, Rong-Guey Chang:

Compiler Optimization to Reduce Cache Power with Victim Cache. 841-844 - Yuan-Cheng Lee, Tang-Hsun Tu, Chih-wen Hsueh:

F-VT: A Friendly Virtualization Framework. 845-850 - Dongfang Li, Zhenglin Liu, Yizhi Zhao:

HeapDefender: A Mechanism of Defending Embedded Systems against Heap Overflow via Hardware. 851-856
The Fourth International Workshop on Wireless Network Algorithm and Theory (WiNA 2012)
- Xin-Qing Yan, Rui-Xia Zhang, Bin Li:

Smart Trend-Traversal Protocol with Shortcutting for Memory-less RFID Tag Collision Resolution. 857-862 - Che-Lun Mak, Chuan-Ming Liu, Wei-Chi Yeh:

Reverse Nearest Neighbors Search in Wireless Broadcast Environments. 863-868 - Chengjun Wang, Baokang Zhao, Wanrong Yu, Chunqing Wu, Zhenghu Gong:

SARM: A Congestion Control Algorithm for DTN. 869-875 - Wen Ouyang, Chang-Wu Yu

, Kun-Ming Yu, Ko-Jui Lin, Jo-Heng Yu, Hsin-Wen Chang, Lin-Li Tai, Chung-Han Lin:
Station Decision Problem in Bicycle Ad Hoc Networks. 876-881 - Wen Ouyang, Yu-Ting Liu, Yu-Wei Lin, Yi-Hao Chen:

Entropy-Based Distributed Fault-Tolerant Event Boundary Detection Algorithm for Wireless Sensor Networks. 882-887
The 2012 International Workshop on Infrastructure, Technologies, and Applications for Distributed Data Collection, Processing, and Dissemination (DDCP 2012)
- Chia-Hui Huang, Kai-Wei Ke, Ho-Ting Wu:

The Design of Multisource Application Layer Multicast with Fast Route Recovery. 888-893 - Takanori Takehira, Hiroaki Higaki:

IRDT-GEDIR: Next-Hop Selection in Intermittent Wireless Multihop Sensor Networks. 894-899 - Chia-Jung Chen, Yi-Sheng Liu, Rong-Guey Chang:

DCSim: Design Analysis on Virtualization Data Center. 900-905
The 2012 International Workshop on Green and Pervasive Software (GreenPS 2012)
- Yang Liu, Qiang Li, Weijun Qin, Limin Sun, Yan Liu:

GreenTech: A Case Study for Using the Web of Things in Household Energy Conservation. 906-911 - Hu Song, Jing Li, Xinchun Liu:

IdleCached: An Idle Resource Cached Dynamic Scheduling Algorithm in Cloud Computing. 912-917 - A.-Jeong Jeong, Se-Mi Kim, Chae-Seok Lee, Jong-Deok Kim:

Multi-periodic Data Aggregation Scheme Based on Interest for Energy Efficiency in Wireless Sensor Network. 918-923 - Chao-Tung Yang

, Wei-Sheng Chen, Kuan-Lung Huang, Jung-Chun Liu, Wen-Hung Hsu, Ching-Hsien Hsu:
Implementation of Smart Power Management and Service System on Cloud Computing. 924-929 - Longbiao Chen

, Yaochun Li, Zeming Zheng, Li Zhang, Dan He, Xiaolong Li, Sha Zhao, Shijian Li, Gang Pan:
WaterLady: A Case Study for Connecting Physical Devices into Social Networks. 930-934 - Yan Tang, Shuangquan Wang, Yiqiang Chen

, Zhenyu Chen
:
PPCare: A Personal and Pervasive Health Care System for the Elderly. 935-939 - Beihong Jin, Jiafeng Hu:

Towards Scalable Processing for a Large-Scale Ride Sharing Service. 940-944 - Xinxin Zhang, Zhiwen Yu, Jilei Tian, Zhitao Wang, Bin Guo:

Context-Aware Mobile Web Browsing Based on HTML5. 945-950 - Yue Shi, Yuanchun Shi, Xia Wang:

Fall Detection on Mobile Phones Using Features from a Five-Phase Model. 951-956 - Jie Liu, Yuanchun Shi:

UI Portals: Sharing Arbitrary Regions of User Interfaces on Traditional and Multi-user Interactive Devices. 957-962
The 2012 International Workshop on Ubiquitous Information Security Techniques and Applications (UISTA 2012)
- Chou Chen Yang, Shin-Hao Lo, Eric Jui-Lin Lu:

A Universal Lightweight Authentication Scheme Based on Delegation Mechanism in Heterogeneous Networks. 963-966 - Kuo-Hui Yeh, Nai-Wei Lo, Chieh Wang:

A Patient Privacy-Aware E-health System Based on Passive RFID. 967-972 - Thuc Dinh Nguyen, Thach V. Bui, Van H. Dang, Deokjai Choi:

Efficiently Preserving Data Privacy Range Queries in Two-Tiered Wireless Sensor Networks. 973-978 - Xin Gu, Zhengquan Xu, Tao Wang, Yilin Fang:

Trusted Service Application Framework on Mobile Network. 979-984 - Chin-Hung Teng, Bing-Shiun Wu:

Developing QR Code Based Augmented Reality Using SIFT Features. 985-990 - Chieh Jen Chen, Chin-Hung Teng, Tsai-Yen Li:

A Web-Based Interaction Design Tool: Pattern Language Toolkit. 991-995 - Chin-Hung Teng, Jr-Yi Chen:

An Augmented Reality Environment for Learning OpenGL Programming. 996-1001 - Wei-Fan Hsieh, Pei-Yu Lin

:
Imperceptible Visible Watermarking Scheme Using Color Distribution Modulation. 1002-1005 - Yi-Hui Chen, Ci-Wei Lan:

A Self-Authentication Mechanism for a (3, 3)-threshold Secret Sharing Scheme. 1006-1008 - Ching-Hu Lu, Li-Chen Fu

:
Enhancement of Human-Preference Assisted Activity Recognition Using a Cooperative ADL Infrastructure. 1009-1014

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














