Default Cover Image

Innovative Mobile and Internet Services in Ubiquitous Computing, International Conference on

June 30 2011 to July 2 2011

Seoul, Korea

ISBN: 978-0-7695-4372-7

Table of Contents

Papers
DAD-Less MIPv6 for Reduced Handover LatencyFull-text access may be available. Sign in or learn about subscription options.pp. 353-360
Papers
Self-Similar Properties of SpamFull-text access may be available. Sign in or learn about subscription options.pp. 347-352
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xv
Papers
Message from IMIS 2011 General Co-chairsFreely available from IEEE.pp. xvi
Papers
Message from IMIS 2011 Program Committee Co-chairsFreely available from IEEE.pp. xvii-xvii
Papers
Message from IMIS 2011 International Conference Workshop Co-chairsFreely available from IEEE.pp. xviii
Papers
IMIS 2011 Organizing CommitteeFreely available from IEEE.pp. xix
Papers
IMIS 2011 Track Area ChairsFreely available from IEEE.pp. xx-xxiv
Papers
IMIS 2011 ReviewersFreely available from IEEE.pp. xxv-xxvii
Papers
IMIS 2011 Keynote TalkFreely available from IEEE.pp. xxviii
Papers
Message from ACTICS 2011 International Workshop OrganizersFreely available from IEEE.pp. xxix
Papers
ACTICS 2011 Organizing CommitteeFreely available from IEEE.pp. xxx
Papers
ACTICS 2011 ReviewersFreely available from IEEE.pp. xxxi
Papers
Message from FIMIS 2011 Workshop Co-chairsFreely available from IEEE.pp. xxxii
Papers
FIMIS 2011 Organizing CommitteeFreely available from IEEE.pp. xxxiii
Papers
FIMIS 2011 ReviewersFreely available from IEEE.pp. xxxiv
Papers
Message from FINGNet 2011 International Workshop OrganizersFreely available from IEEE.pp. xxxv
Papers
FINGNet 2011 Organizing CommitteeFreely available from IEEE.pp. xxxvi
Papers
FINGNet 2011 ReviewersFreely available from IEEE.pp. xxxvii
Papers
Message from IFSN 2011 International Workshop OrganizersFreely available from IEEE.pp. xxxviii-xxxviii
Papers
IFSN 2011 Organizing CommitteeFreely available from IEEE.pp. xxxix
Papers
IFSN 2011 ReviewersFreely available from IEEE.pp. xl-xl
Papers
Message from ITAUC 2011 International Workshop OrganizersFreely available from IEEE.pp. xli-xli
Papers
ITAUC 2011 Organizing CommitteeFreely available from IEEE.pp. xlii
Papers
ITAUC 2011 ReviewersFreely available from IEEE.pp. xliii-xliii
Papers
Message from MoMoPE 2011 International Workshop OrganizersFreely available from IEEE.pp. xliv-xliv
Papers
MoMoPE 2011 Organizing CommitteeFreely available from IEEE.pp. xlv
Papers
MoMoPE 2011 ReviewersFreely available from IEEE.pp. xlvi
Papers
Message from MCNCS 2011 International Workshop OrganizersFreely available from IEEE.pp. xlvii-xlvii
Papers
MCNCS 2011 Organizing CommitteeFreely available from IEEE.pp. xlviii
Papers
MCNCS 2011 ReviewersFreely available from IEEE.pp. xlvix
Papers
Message from WAIS 2011 International Workshop OrganizersFreely available from IEEE.pp. l-l
Papers
WAIS 2011 Organizing CommitteeFreely available from IEEE.pp. li
Papers
WAIS 2011 ReviewersFreely available from IEEE.pp. lii-lii
Papers
The Design of Video Door Phone and Control System for Home Secure ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Papers
Reversability Assessment on Secure USB MemoriesFull-text access may be available. Sign in or learn about subscription options.pp. 6-8
Papers
Keyboard Security: A Technological ReviewFull-text access may be available. Sign in or learn about subscription options.pp. 9-15
Papers
Architecture to Support Heterogeneous Devices for Video Surveillance SystemFull-text access may be available. Sign in or learn about subscription options.pp. 16-19
Papers
An Online Migration Environment for Executing Mobile Applications on the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 20-27
Papers
A Heuristic Approach for Scalability of Multi-tiers Web Application in CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 28-35
Papers
Performability Analysis of IaaS CloudFull-text access may be available. Sign in or learn about subscription options.pp. 36-43
Papers
Towards Multi-criteria Cloud Service SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 44-48
Papers
An IP Passing Protocol for Vehicular Ad Hoc Networks with Network FragmentationsFull-text access may be available. Sign in or learn about subscription options.pp. 49-56
Papers
NTC: Towards Efficient Network Coding in Delay Tolerant NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 57-64
Papers
Efficient Object Localization for Query-by-SubregionFull-text access may be available. Sign in or learn about subscription options.pp. 73-77
Papers
Short-Term Prediction-Based Optimistic Object Tracking Strategy in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 78-85
Papers
Adaptive DDoS Detector Design Using Fast Entropy Computation MethodFull-text access may be available. Sign in or learn about subscription options.pp. 86-93
Papers
A Resource Perspective to Wireless Sensor Network SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 94-99
Papers
ACSP: A Novel Security Protocol against Counting Attack for UHF RFID SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 100-105
Papers
"Variated Availability" Approach to the Services Manageable DeliveringFull-text access may be available. Sign in or learn about subscription options.pp. 106-113
Papers
A Formal Model for Dynamic Service Updates in Pervasive ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 114-119
Papers
An Effective Deadlock Prevention Mechanism for Distributed Transaction ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 120-127
"Memoxo" - Browser-Based Prototype for the Audio/Video Messages RecordingFull-text access may be available. Sign in or learn about subscription options.pp. 136-142
Papers
Task Optimization Based on CPU Pipeline Technique in Multicore SystemFull-text access may be available. Sign in or learn about subscription options.pp. 143-150
Papers
Display Verification IP Core Design Based on Star-Extraction and Star-Recognition Image Processing on FPGAFull-text access may be available. Sign in or learn about subscription options.pp. 151-155
Papers
Trying Linear Network Coding on a Network Flow ProcessorFull-text access may be available. Sign in or learn about subscription options.pp. 156-163
Papers
A Formalization of an Emulation Based Co-designed Virtual MachineFull-text access may be available. Sign in or learn about subscription options.pp. 164-168
Papers
Secure Information Management Protocol Based on Linguistic Sharing TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 169-174
Papers
Combining Static and Dynamic Analysis to Discover Software VulnerabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 175-181
Papers
Semantic Analysis Processes in UBIAS Systems for Cognitive Data InterpretationFull-text access may be available. Sign in or learn about subscription options.pp. 182-185
Papers
Information Retrieval Techniques to Grasp User Intention in Pervasive Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 186-191
Papers
Universal, Fast Method for iPad Forensics Imaging via USB AdapterFull-text access may be available. Sign in or learn about subscription options.pp. 200-207
Papers
Trust-Driven Policy Enforcement through Gate AutomataFull-text access may be available. Sign in or learn about subscription options.pp. 208-215
Papers
DDoS Attacks Detection Using GA Based Optimized Traffic MatrixFull-text access may be available. Sign in or learn about subscription options.pp. 216-220
Papers
Novel Multi-bit and Multi-image Steganography Using Adaptive Embedding Algorithms with Minimum ErrorFull-text access may be available. Sign in or learn about subscription options.pp. 221-228
Papers
Buildings and Crowds: Forming Smart Cities for More Effective Disaster ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 229-234
Papers
ICTs and Effective Communication Strategies: Specific Needs of Information before, during and after DisastersFull-text access may be available. Sign in or learn about subscription options.pp. 235-240
Papers
Ubiquitous Computing and Distributed Agent-Based SimulationFull-text access may be available. Sign in or learn about subscription options.pp. 241-247
Papers
A PCA-based Approach to Modeling Location Update and Paging for Location Area PlanningFull-text access may be available. Sign in or learn about subscription options.pp. 248-252
Papers
Circuit Emulation Services over SCTPFull-text access may be available. Sign in or learn about subscription options.pp. 253-257
Papers
Channel Allocation for a Single Cell Cognitive Radio Network Using Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 258-264
Papers
A Proposal of an Application of Life Log to Remote ConsultationFull-text access may be available. Sign in or learn about subscription options.pp. 265-270
Papers
Effect of Sink Location on Aggregation Based on Degree of Connectivity for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 271-276
Papers
Extending Wireless Sensor Network Lifetime in the LEACH-SM Protocol by Spare SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 277-282
Papers
A Game-Theoretic Resource Allocation Algorithm Based on Utility in IEEE 802.11eFull-text access may be available. Sign in or learn about subscription options.pp. 283-288
Papers
Modeling and Analysis of Cloud Computing Availability Based on Eucalyptus Platform for E-Government Data CenterFull-text access may be available. Sign in or learn about subscription options.pp. 289-296
Papers
Personalized Information Recommendataion Using Hybrid CBR and CSP in a Ubiquitous Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 297-303
Papers
A Novel Mobility Management Mechanism Based on Destination Address Overwritten and ID/Locator SeparationFull-text access may be available. Sign in or learn about subscription options.pp. 304-309
Papers
Secure Mobility Management Scheme for 6LoWPAN ID/Locator Split ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 310-315
Papers
Cost-Optimal Validation Mechanisms and Cheat-Detection for Crowdsourcing PlatformsFull-text access may be available. Sign in or learn about subscription options.pp. 316-321
Papers
Anatomy of a Crowdsourcing Platform - Using the Example of Microworkers.comFull-text access may be available. Sign in or learn about subscription options.pp. 322-329
Papers
An Evaluation of QoE in Cloud Gaming Based on Subjective TestsFull-text access may be available. Sign in or learn about subscription options.pp. 330-335
Papers
Functional Composition and Its ChallengesFull-text access may be available. Sign in or learn about subscription options.pp. 336-340
Papers
Secure Code Dissemination Using Energy-Efficient Minimal Virtual Backbone in Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 341-346
Papers
CoLib: Client Library for Effective Development of WebDAV-based Collaborative ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 361-365
Papers
Gregex: GPU Based High Speed Regular Expression Matching EngineFull-text access may be available. Sign in or learn about subscription options.pp. 366-370
Papers
A Network Security Evaluation Method Framework Based on Multiple Criteria Decision Making TheoryFull-text access may be available. Sign in or learn about subscription options.pp. 371-375
Papers
Energy Optimal Selection of Access Points in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 381-387
Papers
Building Practical Self Organization Networks on Heterogeneous Wireless ModemsFull-text access may be available. Sign in or learn about subscription options.pp. 388-393
Papers
Snail Crawling: An Enhanced Method for DTNs RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 394-397
Papers
Towards Practical IPSec over Challenged NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 398-402
Papers
Aquarius: A Tiny Hypervisor to Introspect Commodity OSes in a Non-bypassable WayFull-text access may be available. Sign in or learn about subscription options.pp. 403-407
Papers
Performance of Energy Efficient Relay and Minimum Distance Clustering for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 408-413
Showing 100 out of 144