Default Cover Image

Communications and Mobile Computing, International Conference on

Apr. 12 2010 to Apr. 14 2010

Shenzhen, China

ISBN: 978-0-7695-3989-8

Volume:

Table of Contents

Papers
Title Page i - Volume 1Freely available from IEEE.pp. i
Papers
Title Page iii - Volume 1Freely available from IEEE.pp. iii
Papers
[Copyright notice - Volume 1]Freely available from IEEE.pp. iv
Papers
Table of contents - Volume 1Freely available from IEEE.pp. v-xiii
Papers
Preface - Volume 1Freely available from IEEE.pp. xiv
Papers
Conference Committee - Volume 1Freely available from IEEE.pp. xv
Papers
Technical Program Committee - Volume 1Freely available from IEEE.pp. xvi-xx
Papers
list-reviewerFreely available from IEEE.pp. xxi-xxii
Papers
Rapid Human-Eye Detection Based on an Integrated MethodFull-text access may be available. Sign in or learn about subscription options.pp. 3-7
Papers
TFS: A Novel File System for Mobile Multimedia SystemFull-text access may be available. Sign in or learn about subscription options.pp. 8-12
Papers
A Self-Synchronized Image Hash AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 13-15
Papers
An Image Encryption Algorithm Based on Alternating Subsection-Disordered Diploid Chaotic SequencesFull-text access may be available. Sign in or learn about subscription options.pp. 16-20
Papers
An Ordered Multisignature without Random OraclesFull-text access may be available. Sign in or learn about subscription options.pp. 21-25
Papers
Efficient Round-Optimal Secure Two-Party Computation from Sigma-protocolFull-text access may be available. Sign in or learn about subscription options.pp. 26-30
Information-Disturbance Tradeoff of Individual Attack Against BBM92 ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 31-34
Papers
New Signcryption from q-Diffie-Hellman ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 35-40
Papers
Perfect Zero-Knowledge Argument of Knowledge with Negligible Error Probability in Two-Round for NP from Any One-Way PermutationFull-text access may be available. Sign in or learn about subscription options.pp. 41-45
Papers
Research on Pairing-Based Batch VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 46-50
Papers
Yet Another Efficient and Provably-Secure Certificateless Public Key Signature Scheme without PairingFull-text access may be available. Sign in or learn about subscription options.pp. 51-55
Papers
A Multiple Hierarchies RBAC ModelFull-text access may be available. Sign in or learn about subscription options.pp. 56-60
Papers
An S-box Construction Algorithm Based on Spatiotemporal ChaosFull-text access may be available. Sign in or learn about subscription options.pp. 61-65
Colour Image Watermarking Algorithm Based on the Arnold TransformFull-text access may be available. Sign in or learn about subscription options.pp. 66-69
Papers
HIDS-DT: An Effective Hybrid Intrusion Detection System Based on Decision TreeFull-text access may be available. Sign in or learn about subscription options.pp. 70-75
Papers
Multi-agent Based Distributed Secure Information RetrievalFull-text access may be available. Sign in or learn about subscription options.pp. 76-79
Papers
Privacy Preserving Density-Based Outlier DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 80-85
Papers
UTM-CM: A Practical Control Mechanism Solution for UTM SystemFull-text access may be available. Sign in or learn about subscription options.pp. 86-90
Papers
A DoS Attack Effect Evaluation Method Based on Multi-source Data FusionFull-text access may be available. Sign in or learn about subscription options.pp. 91-96
Papers
A Model Based on Hybrid Support Vector Machine and Self-Organizing Map for Anomaly DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 97-101
Papers
Application Sandbox Model Based on System Call ContextFull-text access may be available. Sign in or learn about subscription options.pp. 102-106
Papers
Attribute Reduction Method Applied to IDSFull-text access may be available. Sign in or learn about subscription options.pp. 107-110
Papers
Detecting Software Keyloggers with Dendritic Cell AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 111-115
Papers
Research on Packet Tagging Using the Attributes of Data StreamFull-text access may be available. Sign in or learn about subscription options.pp. 116-120
Papers
A Man-in-the-Middle Attack on 3G-WLAN InterworkingFull-text access may be available. Sign in or learn about subscription options.pp. 121-125
Papers
A New Design of Low Cost Security Coprocessor for Portable Electronic DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 126-131
Papers
A New Method to Discriminate Wireless Location under Noisy CircumstanceFull-text access may be available. Sign in or learn about subscription options.pp. 132-136
Papers
A Personalized Location Privacy Protection Solution in Wireless NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 137-141
Papers
A Security Routing Mechanism Against Sybil Attack for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 142-146
Papers
An Attack Based IMS Vulnerability Validate PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 147-151
Papers
APUC: A Novel Authentication Protocol for Ubiquitous Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 152-156
Papers
Initial Distribution of Group Keys for Confidential Group CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 157-161
Papers
Security in Underwater Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 162-168
Papers
A Dynamic Replica Placement Mechanism Based on Response Time MeasureFull-text access may be available. Sign in or learn about subscription options.pp. 169-173
Papers
Analysis on the Potential of Creating Low-Carbon Society in ChinaFull-text access may be available. Sign in or learn about subscription options.pp. 174-178
Papers
Design of Communication System for Deep Sea Remote Robotically Controlled SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 179-182
Papers
GSSK: A Generalization Step Safe Algorithm in Anonymizing DataFull-text access may be available. Sign in or learn about subscription options.pp. 183-187
Papers
Node Importance Evaluation Based on Network HeterogeneityFull-text access may be available. Sign in or learn about subscription options.pp. 188-194
Papers
Optimal Power Flow Optimization Based on Bio-inspired ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 195-199
Papers
Study on Steering Actuator Transfer Function of Picking Mobile RobotFull-text access may be available. Sign in or learn about subscription options.pp. 200-204
Papers
A New SDVS Based on NTRUSignFull-text access may be available. Sign in or learn about subscription options.pp. 205-207
Papers
A N-party Diffie-Hellman Key Exchange Protocol Based on VerifierFull-text access may be available. Sign in or learn about subscription options.pp. 208-212
Papers
Distributed Oblivious Transfer with Adaptive QueriesFull-text access may be available. Sign in or learn about subscription options.pp. 213-217
Papers
MailTrust: A Mail Reputation Mechanism Based on Improved TrustGuardFull-text access may be available. Sign in or learn about subscription options.pp. 218-222
Papers
Trusted Channels with Password-Based Authentication and TPM-Based AttestationFull-text access may be available. Sign in or learn about subscription options.pp. 223-227
Papers
Unlinkable Multi-party Concurrent SignaturesFull-text access may be available. Sign in or learn about subscription options.pp. 228-232
Papers
Research of Two-stage Consumers' Trust Model Based on B2C E-businessFull-text access may be available. Sign in or learn about subscription options.pp. 233-236
Papers
Text Mining and the Future ExplorationFull-text access may be available. Sign in or learn about subscription options.pp. 237-241
Papers
Design and Implementation of Reconfigurable Discrete Hilbert Transform Based on Systolic-ArraysFull-text access may be available. Sign in or learn about subscription options.pp. 245-249
Papers
Design of a Remote Distributed Control System Based on GRPS and InternetFull-text access may be available. Sign in or learn about subscription options.pp. 250-252
Papers
Dynamic Dispatching Tasks Management for H.264 Encoder on Heterogeneous Dual-Core Embedded SystemFull-text access may be available. Sign in or learn about subscription options.pp. 253-257
Papers
Embedded System Memory Management Mechanism Based on uC / OS-IIFull-text access may be available. Sign in or learn about subscription options.pp. 258-262
Papers
Energy- and Latency-Aware NoC Mapping Based on Chaos Discrete Particle Swarm OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 263-268
Papers
Mobile Cartography Base on Cache of CGMLFull-text access may be available. Sign in or learn about subscription options.pp. 269-273
Papers
Research on Automatic Testing Technology Oriented Intelligent Mobile Terminal SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 274-278
Papers
Research on Interconnection and Correspondence Between Relational Database and Embedded Database SQLiteFull-text access may be available. Sign in or learn about subscription options.pp. 279-283
Papers
The Cascade Decision-Tree Improvement Algorithm Based on Unbalanced Data SetFull-text access may be available. Sign in or learn about subscription options.pp. 284-288
Papers
A Cloud-Based Recommendatory Trust Processing Method for Trust Management System of GridFull-text access may be available. Sign in or learn about subscription options.pp. 289-293
Papers
A Parallel Reconstruction Algorithm for Spiral Cone-Beam Transmission CTFull-text access may be available. Sign in or learn about subscription options.pp. 294-298
Papers
Analysis of Computing Resource Allocation for Replicated Processes in P2P-MPIFull-text access may be available. Sign in or learn about subscription options.pp. 299-303
Papers
Building Locality-Aware P2P Topology Formation Protocol for Heterogeneous SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 304-308
Papers
Enhanced Context Searching Based on Structured P2PFull-text access may be available. Sign in or learn about subscription options.pp. 309-313
Papers
Image Semantic Classification Based on Integration of Feature SubspacesFull-text access may be available. Sign in or learn about subscription options.pp. 314-318
Papers
OSDN: A Novel Platform for Service Distribution through Overlay RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 319-323
Papers
Research on the Mesh-Based P2P Streaming Network ScaleFull-text access may be available. Sign in or learn about subscription options.pp. 324-329
Papers
RouteGuard: A Trust-Based Scheme for Guarding Routing in Structured Peer-to-Peer OverlaysFull-text access may be available. Sign in or learn about subscription options.pp. 330-334
Papers
A Method of Representing Videos Based on User Interest Model in Mobile Multimedia ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 335-339
Papers
Design Framework and Architecture of Unified Presence ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 340-344
Papers
Study of Multi-connection Mechanism in IMSFull-text access may be available. Sign in or learn about subscription options.pp. 345-349
Papers
The Decision-Making Problem of SCTP Optimal Path Based on Cognitive Optimization with Multi-parameterFull-text access may be available. Sign in or learn about subscription options.pp. 350-355
Papers
An Improved Blind Bandwidth Extension Method for Audio CodingFull-text access may be available. Sign in or learn about subscription options.pp. 356-360
Papers
Self-Adaptive Control of Video Transmission Based on Available Bandwidth EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 361-364
Papers
A Reliable Backbone-Based Location Management Scheme for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 365-369
Papers
An Online Kannada Text Transliteration System for Mobile PhonesFull-text access may be available. Sign in or learn about subscription options.pp. 376-381
Papers
Modeling the Order Relations of Events in MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 382-386
Papers
Post-Processing of Automatic Text Summarization for Domain-Specific DocumentsFull-text access may be available. Sign in or learn about subscription options.pp. 387-391
Papers
SensorWorld: Unified Touch-Based Access to Sensors WorldwideFull-text access may be available. Sign in or learn about subscription options.pp. 392-396
Papers
A Simulation Study of Dynamic Route Guidance Based on Inter-Vehicle CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 397-403
Papers
Homotopy Analysis Method of Internet Congestion Control ModelFull-text access may be available. Sign in or learn about subscription options.pp. 404-407
Papers
Multi-algorithm Hybrid Location Model Based on Data FusionFull-text access may be available. Sign in or learn about subscription options.pp. 408-412
Papers
PAM: Precise Receive Buffer Assignment Method in Transport Protocol for Concurrent Multipath TransferFull-text access may be available. Sign in or learn about subscription options.pp. 413-417
Papers
Performance Analysis of Cluster-Based and Tree-Based Routing Protocols for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 418-422
Papers
Radio Transmitter Fingerprint Identification Using a Novel Method of Weighted Multi-feature Joint Detection AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 423-427
Papers
Study on a Sea Radio-Wave Propagation Loss ModelFull-text access may be available. Sign in or learn about subscription options.pp. 428-431
Papers
A Data Dissemination Policy by Using Human Mobility Patterns for Delay-Tolerant NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 432-436
Papers
An Open Architecture for Detecting Earthquakes Using Mobile DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 437-441
Papers
Open Urban Testbed for Ubiquitous ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 442-447
Papers
pH Levels Classification by Color Quantization on a Camera PhoneFull-text access may be available. Sign in or learn about subscription options.pp. 448-452
Papers
A Fuzzy Packet Loss Differentiation Algorithm Based on Ack-Timeout Times Ratio in Heterogeneous NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 453-457
Papers
An Improvement of the Route Discovery Process in AODV for Ad Hoc NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 458-461
Papers
Formal Modeling and Analysis of HMIPv6 Using Colored Petri NetsFull-text access may be available. Sign in or learn about subscription options.pp. 462-466
Showing 100 out of 123