Default Cover Image

2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC '08)

June 11 2008 to June 13 2008

Taichung

Table of Contents

Papers
Table of contentsFreely available from IEEE.pp. v-xii
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Title Page iv - Copyright PageFreely available from IEEE.pp. iv
ForewordFreely available from IEEE.pp. xiii-xiv
Papers
Welcome from the Conference Program Co-ChairsFreely available from IEEE.pp. xv
Papers
CommitteesFreely available from IEEE.pp. xvi-xxi
Papers
Cyber-Physical Systems: A New FrontierFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Papers
Security Enforcement Model for Distributed Usage ControlFull-text access may be available. Sign in or learn about subscription options.pp. 10-18
Papers
China's National Research Project on Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 19
Papers
Strong QoS and Collision Control in WLAN Mesh and Ubiquitous NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 20-27
Papers
Construct Small Worlds in Wireless Networks Using Data MulesFull-text access may be available. Sign in or learn about subscription options.pp. 28-35
Papers
Load Awareness Multi-Channel MAC Protocol Design for Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 36-43
Papers
A Reactive Local Positioning System for Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 44-51
Papers
A Novel Distributed Authentication Framework for Single Sign-On ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 52-58
Papers
A Study on Digital Audio Watermarking Internet ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 59-66
Papers
An Enhanced Trust Model Based on Reputation for P2P NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 67-73
Papers
On the Security of the Full-Band Image Watermark for Copyright ProtectionFull-text access may be available. Sign in or learn about subscription options.pp. 74-80
Papers
Using Body Sensor Networks for Increased Safety in Bomb Disposal MissionsFull-text access may be available. Sign in or learn about subscription options.pp. 81-89
Papers
A Cloaking Algorithm Based on Spatial Networks for Location PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 90-97
Papers
Controlled Disclosure of Context Information across Ubiquitous Computing DomainsFull-text access may be available. Sign in or learn about subscription options.pp. 98-105
Papers
Efficient Proxy Signatures For Ubiquitous ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 106-113
Papers
Sub-optimal Step-by-Step Node Deployment Algorithm for User Localization in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 114-121
Papers
Neighborhood-Aware Density Control in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 122-129
Papers
Two-Way Beacon Scheduling in ZigBee Tree-Based Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 130-137
Papers
Kuka: An Architecture for Associating an Augmented Artefact with Its User Using Wearable SensorsFull-text access may be available. Sign in or learn about subscription options.pp. 154-161
Papers
Generating a Tailored Middleware for Wireless Sensor Network ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 162-169
Papers
Energy Efficient Object Tracking in Sensor Networks by Mining Temporal Moving PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 170-176
Papers
A Space-Time Network Optimization Model for Traffic Coordination and Its EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 177-184
Papers
Fair Broadcasting Schedules on Dependent Data in Wireless EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 185-192
Papers
Hovering Information - Self-Organising Information that Finds Its Own StorageFull-text access may be available. Sign in or learn about subscription options.pp. 193-200
Papers
EvAnT: Analysis and Checking of Event Traces for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 201-208
Papers
Power-Aware Real-Time Scheduling upon Identical Multiprocessor PlatformsFull-text access may be available. Sign in or learn about subscription options.pp. 209-216
Papers
Finding Similar Answers in Data-Centric Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 217-224
Papers
Energy-Efficient Real-Time Co-scheduling of Multimedia DSP JobsFull-text access may be available. Sign in or learn about subscription options.pp. 225-232
Papers
An Automated Bacterial Colony Counting SystemFull-text access may be available. Sign in or learn about subscription options.pp. 233-240
Papers
LOFT: Low-Overhead Freshness Transmission in Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 241-248
Papers
Inter-domain Authentication for Seamless Roaming in Heterogeneous Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 249-255
Papers
Structural Videotext Regions Completion with Temporal-Spatial ConsistencyFull-text access may be available. Sign in or learn about subscription options.pp. 256-261
Papers
Effective Feature Space Reduction with Imbalanced Data for Semantic Concept DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 262-269
Papers
Wireless Sensor Network Industrial View? What Will Be the Killer Apps for Wireless Sensor Network?Full-text access may be available. Sign in or learn about subscription options.pp. 270
Papers
Sensor Network, Where Is It Going to Be?Full-text access may be available. Sign in or learn about subscription options.pp. 271
Papers
A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 272-279
Papers
Mobile Intelligence for Delay Tolerant Logistics and Supply Chain ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 280-284
Papers
Towards Scalable Deployment of Sensors and Actuators for Industrial ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 285-290
Papers
An Environment Sensor Fusion Application on Smart Building SkinsFull-text access may be available. Sign in or learn about subscription options.pp. 291-295
Papers
Automated Management of Assets Based on RFIDFull-text access may be available. Sign in or learn about subscription options.pp. 296-301
Papers
ZigBee Source Route Technology in Home ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 302-305
Papers
Two Practical Considerations of Beacon Deployment for Ultrasound-Based Indoor Localization SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 306-311
Papers
A Measurement-Based Method for Improving Data Center Energy EfficiencyFull-text access may be available. Sign in or learn about subscription options.pp. 312-313
Papers
Solution Templates Tool for Enterprise Business Applications IntegrationFull-text access may be available. Sign in or learn about subscription options.pp. 314-319
Papers
A Fuzzy-Based Transport Protocol for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 320-325
Papers
Region-Based Sensor Selection for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 326-331
Papers
CRT-MAC: A Power-Saving Multicast Protocol in the Asynchronous Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 332-337
A Multi-layered Approach to the Polysemy Problems in a Chinese to Taiwanese SystemFull-text access may be available. Sign in or learn about subscription options.pp. 428-435
Papers
Adaptive Bandwidth Management and Reservation Scheme in Heterogeneous Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 338-342
Papers
WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 343-348
Papers
Performance of a Hierarchical Cluster-Based Wireless Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 349-354
Papers
Ad Hoc Collaborative Filtering for Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 355-360
Papers
A Reconfigurable Distributed Broker Infrastructure for Publish Subscribe Based MANETFull-text access may be available. Sign in or learn about subscription options.pp. 361-366
Papers
A Hilbert Curve-Based Distributed Index for Window Queries in Wireless Data Broadcast SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 367-372
Papers
An Efficient Quorum-Based Fault-Tolerant Approach for Mobility Agents in Wireless Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 373-378
Papers
PNECOS: A Peer-to-Peer Network Coding Streaming SystemFull-text access may be available. Sign in or learn about subscription options.pp. 379-384
Papers
A Common Concept Description of Natural Language Texts as the Foundation of Semantic Computing on the WebFull-text access may be available. Sign in or learn about subscription options.pp. 385
Papers
Comparing the Conceptual Graphs Extracted from Patent ClaimsFull-text access may be available. Sign in or learn about subscription options.pp. 394-399
Papers
Semantic Enforcement of Privacy Protection Policies via the Combination of Ontologies and RulesFull-text access may be available. Sign in or learn about subscription options.pp. 400-407
Papers
Development of an Integrated Platform for Social Collaborations Based on Semantic Peer NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 408-409
Papers
Adaptive Automatic Segmentation of HEp-2 Cells in Indirect Immunofluorescence ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 418-422
Papers
Outline Detection for the HEp-2 Cell in Indirect Immunofluorescence Images Using Watershed SegmentationFull-text access may be available. Sign in or learn about subscription options.pp. 423-427
Papers
Extracting Alternative Splicing Information from Captions and Abstracts Using Natural Language ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 436-438
Papers
New Frontiers of Microcontroller Education: Introducing SiLabs ToolStick University Daughter CardFull-text access may be available. Sign in or learn about subscription options.pp. 439-444
Papers
An Embedded Computing Platform for RobotFull-text access may be available. Sign in or learn about subscription options.pp. 445-450
Papers
Actuation Design of Two-Dimensional Self-Reconfigurable RobotsFull-text access may be available. Sign in or learn about subscription options.pp. 451-456
Papers
Fabrication of Microfluidic Pump Using Conducting Polymer ActuatorFull-text access may be available. Sign in or learn about subscription options.pp. 457-463
Papers
Calibration and Data Integration of Multiple Optical Flow Sensors for Mobile Robot LocalizationFull-text access may be available. Sign in or learn about subscription options.pp. 464-469
Papers
A Combined Platform of Wireless Sensors and Actuators Based on Embedded ControllerFull-text access may be available. Sign in or learn about subscription options.pp. 470-474
Papers
A Novel Multiphysics Sensoring Method Based on Thermal and EC Techniques and Its Application for Crack InspectionFull-text access may be available. Sign in or learn about subscription options.pp. 475-479
Papers
Training Data Compression Algorithms and Reliability in Large Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 480-485
Papers
[Publisher's information]Freely available from IEEE.pp. 580
Papers
Video Summarization Based on Semantic Feature Analysis and User PreferenceFull-text access may be available. Sign in or learn about subscription options.pp. 486-491
Papers
Intelligent Multimedia Recommender by Integrating Annotation and Association MiningFull-text access may be available. Sign in or learn about subscription options.pp. 492-499
Papers
Speech Watermarking Based on Wavelet Transform and BCH CodingFull-text access may be available. Sign in or learn about subscription options.pp. 507-512
Papers
QoS-Based Learning Services Composition for Ubiquitous LearningFull-text access may be available. Sign in or learn about subscription options.pp. 513-518
Papers
A Computer-Assisted Approach for Designing Context-Aware Ubiquitous Learning ActivitiesFull-text access may be available. Sign in or learn about subscription options.pp. 524-530
Papers
Usability Comparison of Pen-Based Input for Young Children on Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 531-536
Papers
Evaluation of the Learning of Scientific English in Podcasting PCs, MP3s, and MP4s ScenariosFull-text access may be available. Sign in or learn about subscription options.pp. 537-542
Papers
The Study of Using Sure Stream to Construct Ubiquitous Learning EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 543-548
Papers
Interest-Based Peer Selection in P2P NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 549-554
Papers
Free-Form Annotation Tool for CollaborationFull-text access may be available. Sign in or learn about subscription options.pp. 555-560
Papers
Hands-On Training for Chemistry Laboratory in a Ubiquitous Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 561-563
Papers
A Progress Report and a Proposal: Interactivity in Ubiquitous Learning Enhanced by Virtual Tutors in e-Learning ContentsFull-text access may be available. Sign in or learn about subscription options.pp. 564-568
Papers
Collaborative Interpretative Service Assisted Design System Based on Hierarchical Case Based ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 569-576
Papers
Author IndexFreely available from IEEE.pp. 577-579
Showing 100 out of 100