Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, by Xiaobo ZhouEmerging Directions in Embedded and Ubiquitous Computing: EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, by Xiaobo Zhou

Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006 Workshops: NCUS, SecUbiq, USN…

byXiaobo ZhouEditorOleg Sokolsky, Lu Yan

Paperback | July 24, 2006

Pricing and Purchase Info


Earn 1,650 plum® points

Prices and offers may vary in store


In stock online

Ships free on orders over $25

Not available in stores


Here are the refereed proceedings of the EUC 2006 workshops, held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Computing in Seoul, Korea, August 2006.

The book presents 102 revised papers spanning six workshops: network-centric ubiquitous systems (NCUS 2006), security in ubiquitous computing systems (SecUbiq 2006), RFID and ubiquitous sensor networks (USN 2006), trustworthiness, reliability and services in ubiquitous and sensor networks (TRUST 2006), embedded software optimization (ESO 2006), and multimedia solution and assurance in ubiquitous information systems (MSA 2006).

Title:Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006 Workshops: NCUS, SecUbiq, USN…Format:PaperbackDimensions:1034 pages, 23.5 × 15.5 × 1.73 inPublished:July 24, 2006Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540368507

ISBN - 13:9783540368502

Look for similar items by category:


Table of Contents

NCUS 2006 Symposium.- Adaptive Router Promotion in Ad-Hoc Networks.- A Utility-Based Auction Cooperation Incentive Mechanism in Peer-to-Peer Networks.- UbiqStor: Server and Proxy for Remote Storage of Mobile Devices.- Packet Length Adaptation for Energy-Proportional Routing in Clustered Sensor Networks.- A New Context Script Language for Developing Context-Aware Application Systems in Ubiquitous Computing.- Dynamic Replication Strategies for Object Storage Systems.- A Cost-Effective Mobility Modelling in Nested Network Mobility.- Completing UML Model of Component-Based System with Middleware for Performance Evaluation.- Energy Efficient PNC Selection Procedure for the IEEE 802.15.3-Based HR-WPAN.- An Efficient Multicast Routing Protocol in Multi-rate Wireless Ad Hoc Networks.- WPAN Platform Design in Handset Integrating Cellular Network and Its Application to Mobile Games.- Reliable Transporting and Optimal Routing on Rate-Based for Ad Hoc Networks.- Automatic Extraction of Conversation Protocols from a Choreography Specification of Ubiquitous Web Services.- Inter-sector Interference Mitigation Method in Triple-Sectored OFDMA Systems.- File Correspondences Dictionary Construction in Multilingual P2P File Sharing Systems.- Lightweight Messages: True Zero-Copy Communication for Commodity Gigabit Ethernet.- Evaluation of Models for Analyzing Unguided Search in Unstructured Networks.- Wapee: A Fault-Tolerant Semantic Middleware in Ubiquitous Computing Environments.- Security in P2P Networks: Survey and Research Directions.- HYWINMARC: An Autonomic Management Architecture for Hybrid Wireless Networks.- Prediction Efficiency in Predictive p-CSMA/CD.- A Situation Aware Personalization in Ubiquitous Mobile Computing Environments.- A Network and Data Link Layer QoS Model to Improve Traffic Performance.- A GML-Based Mobile Device Trace Monitoring System.- Impact of High-Mobility Radio Jamming in Large-Scale Wireless Sensor Networks.- SecUbiq 2006 Workshop.- A Scalable and Untraceable Authentication Protocol for RFID.- Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005.- Reliable Broadcast Message Authentication in Wireless Sensor Networks.- Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks.- A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks.- Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol.- Ubiquitous Authorization Scheme Based on Device Profile.- An Efficient Certificateless Signature Scheme.- Universal Designated Verifier Ring Signature (Proof) Without Random Oracles.- An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings.- A Strong Identity Based Key-Insulated Cryptosystem.- A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE.- Energy Comparison of AES and SHA-1 for Ubiquitous Computing.- USN 2006 Workshop.- Performance Analysis of Tag Anti-collision Algorithms for RFID Systems.- Perturbative Time and Frequency Allocations for RFID Reader Networks.- An Enhanced Dynamic Framed Slotted ALOHA Anti-collision Algorithm.- DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers.- Design and Implementation of a High-Speed RFID Data Filtering Engine.- Authorized Tracking and Tracing for RFID Tags.- An Energy-Efficient MAC Protocol for Delay-Sensitive Wireless Sensor Networks.- A Data-Centric Self-organization Scheme for Energy-Efficient Wireless Sensor Networks.- Optimized Clustering for Maximal Lifetime of Wireless Sensor Networks.- Maximize the Coverage Lifetime of Sensor Networks.- An Active Tracking System Using IEEE 802.15.4-Based Ultrasonic Sensor Devices.- LWOS: A Localization Method Without On-Body Sensor in Wireless Sensor Networks.- TRUST 2006 Workshop.- Research Directions in the Area of USN (Ubiquitous Sensor Network) Towards Practical UE (Ubiquitous Environments).- On Building a Lightweight Security Architecture for Sensor Networks.- A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks.- Algorithms for Service Differentiation in MAC Layer over MANETs.- A Power-Aware Routing Protocol Using Multi-Route Transmission for Mobile Ad Hoc Networks.- A Novel Multicasting Scheme over Wireless LAN Systems by Using Relay.- An Adaptive Concurrency Control QOS Agent for Ubiquitous Computing Environments.- An Efficient End-to-End QoS Supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-Back for Ubiquitous and Distributed Applications.- An RFID System Based MCLT System with Improved Privacy.- QT-CBP: A New RFID Tag Anti-collision Algorithm Using Collision Bit Positioning.- An RFID-Based Access and Location Service for Pervasive Grids.- Autonomous Management of Large-Scale Ubiquitous Sensor Networks.- A Privacy-Aware Service Protocol for Ubiquitous Computing Environments.- A Neural Network Model for Detection Systems Based on Data Mining and False Errors.- An Analysis on the Web Technologies for Dynamically Generating Web-Based User Interfaces in Ubiquitous Spaces.- A Policy Description Language for Context-Based Access Control and Adaptation in Ubiquitous Environment.- C-iUMS: Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous Home.- A Lightweight IP Traceback Mechanism on IPv6.- Enable a Trustworthy Network by Source Address Spoofing Prevention Routers: A Formal Description.- A Flexible Bound Admission Control Algorithm for Vertical Handover in Ubiquitous Environment.- Network Probabilistic Connectivity: Using Node Cuts.- Fast Mounting and Recovery for NAND Flash Memory Based Embedded Systems.- Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments.- A Robust Verifiably Encrypted Signature Scheme.- ESO 2006 Workshop.- Instruction Re-selection for Iterative Modulo Scheduling on High Performance Multi-issue DSPs.- Predictability of Least Laxity First Scheduling Algorithm on Multiprocessor Real-Time Systems.- Saving Register-File Leakage Power by Monitoring Instruction Sequence in ROB.- Run-Time Memory Optimization for DDMB Architecture Through a CCB Algorithm.- Code Generation and Optimization for Java-to-C Compilers.- Modelling and Analysis of Power Consumption for Component-Based Embedded Software.- Design of a Programmable Vertex Processing Unit for Mobile Platforms.- An Energy-Aware Whole-System Dynamic Emulator - SkyEye.- Optimizing Scheduling Stability for Runtime Data Alignment.- A Chinese Mobile Phone Input Method Based on the Dynamic and Self-study Language Model.- An ID-Based Watermarking Scheme for Java Programs.- Data-Layout Optimization Using Reuse Distance Distribution.- Co-optimization of Performance and Power in a Superscalar Processor Design.- FAST: An Efficient Flash Translation Layer for Flash Memory.- A Novel Discrete Hopfield Neural Network Approach for Hardware-Software Partitioning of RTOS in the SoC.- UML Based Evaluation of Reconfigurable Shape Adaptive DCT for Embedded Stream Processing.- A High Performance Buffering of Java Objects for Java Card Systems with Flash Memory.- MSA 2006 Workshop.- Predictive Prefetching of Context-Aware Information in Mobile Networks.- Digital Ortho-image Production for Web GIS Applications.- Multimedia Contents Security by Wireless Authentication.- Traffic Actuated Car Navigation Systems in Mobile Communication Networks.- Analytic Model of the Collision Resolution Protocol with Voice/Data in Mobile Networks.- Security Enhancement by Detecting Network Address Translation Based on Instant Messaging.- A New Authentication Scheme of Binding Update Protocol on Handover in Mobile IPv6 Networks.- A Solution for the Dropout Problem in Adaptive Cruise Control Range Sensors.- An Architecture Framework for Measuring and Evaluating Packet-Switched Voice.- HOIDS-Based Detection Method of Vicious Event in Large Networks.- New Handoff Control Method Using Fuzzy Multi-Criteria Decision Making in Micro/Pico-cellular Networks.- Test of IR-DSRC in Measuring Vehicle Speed for ITS Applications.- A Grid Routing Scheme Considering Node Lifetime in Ubiquitous Sensor Networks.