Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
UIC-ATC
UIC-ATC 2009
Generate Citations
Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on
July 7 2009 to July 9 2009
Brisbane, Australia
ISBN: 978-0-7695-3737-5
Table of Contents
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-xiii
Conference Information
Freely available from IEEE.
pp. xiv-xlvi
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Context and Adaptivity in Context-Aware Pervasive Computing Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-101
by
Ahmet Soylu
,
Patrick De Causmaecker
,
Piet Desmet
Papers
An Efficient Mechanism for Mobile Target Tracking in Grid-Based Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Ying-Hong Wang
,
Kuo-Feng Huang
,
Ting-Wei Chang
Papers
Space Time Codes to Achieve Generalized Optimal Diversity for Higher Rate Wireless Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-11
by
Jia Hou
Papers
Biologically Inspired Ant-Based Routing in Mobile Ad hoc Networks (MANET): A Survey
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-15
by
Shivanajay Marwaha
,
Jadwiga Indulska
,
Marius Portmann
Papers
A Routing Algorithm Based on Mobile Agent for Mine Monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 16-21
by
Qianping Wang
,
Yan Zhao
,
Yu'e Su
,
Hongmei Liao
,
Ke Wang
Papers
RFID-Based, Anonymous Authentication Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 22-27
by
Hung-Yu Chien
,
Chieh-Shian Tu
,
Tzong-Chen Wu
Papers
Trust in Distributed Small Sized Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 28-33
by
Nicolai Kuntze
,
Carsten Rudolph
Papers
An Analysis of Trust Transitivity Taking Base Rate into Account
Full-text access may be available. Sign in or learn about subscription options.
pp. 34-39
by
Touhid Bhuiyan
,
Audun Jøsang
,
Yue Xu
Papers
Improving Prediction Accuracy Using Entropy Weighting in Collaborative Filtering
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-45
by
Hyeong-Joon Kwon
,
Tae-Hoon Lee
,
Jung-Hyun Kim
,
Kwang-Seok Hong
Papers
Trust Management in Swarm-Based Autonomic Computing Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 46-53
by
Wendy M. Maiden
,
Jereme N. Haack
,
Glenn A. Fink
,
David McKinnon
,
Errin W. Fulp
Papers
50 Years of Isolation
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-60
by
Nuwan A. Goonasekera
,
William J. Caelli
,
Tony Sahama
Papers
Deriving a Good Trade-off Between System Availability and Time Redundancy
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-67
by
Nils Müllner
,
Abhishek Dhama
,
Oliver Theel
Papers
Multidimensional Monitoring of Computer Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 68-74
by
Marcin Król
,
Janusz Sosnowski
Papers
MoWeT: A Configurable Framework to Support Ubiquitous Location-Aware Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-82
by
Ugo Barchetti
,
Alberto Bucciero
,
Tania A. De Benedittis
,
Francesca Macchia
,
Luca Mainetti
,
Antonio Tamborino
Papers
Ubiquitous Computing and Time Dimension
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-87
by
Mauro Marcelo Mattos
Papers
An Open Framework for Distributed Context Management in Ubiquitous Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 88-93
by
Jun-Hong Lu
,
Chiung-Ying Wang
,
Ren-Hung Hwang
Papers
A Situated Display for Local Community Participation: The Design and Use of Nnub
Full-text access may be available. Sign in or learn about subscription options.
pp. 102-107
by
Fiona Redhead
,
Andrew Dekker
,
Margot Brereton
Papers
Adaptive Interface for Collaborative Environments: AICE
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-113
by
Youssef Roummieh
,
Parisa Ghodous
Papers
Human Activity Recognizer for Mobile Devices with Multiple Sensors
Full-text access may be available. Sign in or learn about subscription options.
pp. 114-119
by
Kenta Cho
,
Naoki Iketani
,
Hisao Setoguchi
,
Masanori Hattori
Papers
An Event-driven Context Model in Elderly Health Monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-124
by
Yuanyuan Cao
,
Linmi Tao
,
Guangyou Xu
Papers
Agenda Driven Home Automation - Towards High Level Context Aware Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-130
by
Fano Ramparany
,
Yazid Benazzouz
,
Marta Bel Martin
Papers
User Location Estimation Based on Stereo Audio-Vision
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-136
by
Sang-Hyeon Jin
,
Dong-Ju Kim
,
Chee-Hyun Park
,
Kwang-Seok Hong
Papers
An Automatic Algorithm of Dangerous Construction Warning System
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-142
by
Che-Jen Chen
,
Lee-Kuo Lin
,
Wei-Sheng Wu
Papers
Using the iDTV for Managing Services in the Ubiquitous Computing Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-148
by
Orlewilson B. Maia
,
Nairon S. Viana
,
Vicente F. de Lucena Júnior
Papers
Exploiting Semantics for Indoor Navigation and User-Tracking
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-154
by
Emmanouil Nikoloudakis
,
Manolis Kritsotakis
,
Antonis Bikakis
,
Theodore Patkos
,
Grigoris Antoniou
,
Dimitris Plexousakis
Papers
Context-awareness Handoff Planning in Ubiquitous Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 155-160
by
Hsiao-Yun Huang
,
Chiung-Ying Wang
,
Ren-Hung Hwang
Papers
A Grid-Based Distributed Computing Environment for Automatic Concept Extraction and Content Supporting Service
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-166
by
Chih-Ming Wang
,
Ming-Chao Chiang
,
Chu-Sing Yang
Papers
Correspondence Analysis to Screening the Implementation of One Village One Product Programs in Taiwan
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-171
by
Hua-Kai Chiou
,
Gia-Shie Liu
,
Yen-Wen Wang
,
Tse-Jung Chen
Papers
Multiple Objective Compromise Optimization Method to Analyze the Strategies of Nanotechnology in Taiwan
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-177
by
Hua-Kai Chiou
,
Gia-Shie Liu
,
Gwo-Hshiung Tzeng
,
Chien-Pin Wang
Papers
Limiting Sybil Attacks on Bayesian Trust Models in Open SOA Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 178-183
by
Sebastian Ries
,
Erwin Aitenbichler
Papers
Toward an OSGi-Based Infrastructure for Smart Home Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-188
by
Szu-Chi Wang
,
Kai-Peng Chen
,
Tung-Yen Lu
,
Chi-Yi Lin
Papers
Bird Species Recognition by Wavelet Transformation of a Section of Birdsong
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-193
by
Chih-Hsun Chou
,
Pang-Hsin Liu
Papers
Fast Intra/Inter Mode Decision for H.264/AVC Using the Spatial-Temporal Prediction Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-199
by
Cheng-Chang Lien
,
Chih-Chang Chen
,
Yang-Kai Chang
Papers
Urban Search and Rescue Robots in Test Arenas: Scaled Modeling of Disasters to Test Intelligent Robot Prototyping
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-205
by
Andrew Chiou
,
Carol Wynn
Papers
Augmented Isometric Board Games: Linking the Physical Playing Field with Intelligent Non-Player Feedback
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-211
by
Andrew Chiou
Papers
A TCP Performance Improved mechanism for Wireless Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 212-216
by
Ling Xiao
,
Zhitang Li
,
Na Zhao
Papers
An Adaptive Anti-Collision Algorithm towards Efficient RFID Tag Identification
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-222
by
Bo-Yu Chen
,
Ching-Hsien Hsu
,
Kuan-Ching Li
Embedded Semantics Empowering Context-Aware Pervasive Computing Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 310-317
by
Ahmet Soylu
,
Patrick De Causmaecker
Papers
An Accelerometer Based Approach for Indoor Localization
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-227
by
Ching-Hsien Hsu
,
Chia-Hao Yu
Papers
ConPlan: A Context-Aware Ad-hoc Meeting Plan Program
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-233
by
Ling Feng
Papers
Energy-Efficient Structuralized Clustering for Sensor-Based Cyber Physical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 234-239
by
Jierui Cao
,
Huan Li
Papers
The Clustering Algorithm for Enhancing Network Lifetime in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-245
by
Wibhada Naruephiphat
,
Chalermpol Charnsripinyo
Papers
On the Use of Anisotropic Mesh Technique (AMT) in Transverse Wave Approach (TWA) for the EM Analysis of Microwave Circuits in Wireless Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-251
by
Mohamed Ayari
,
Taoufik Aguili
,
Helmi Temimi
,
Henri Baudrand
Papers
Using HMAC for Error Correction over a Wireless Channel
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-256
by
Natasa
,
Obaidur Ur Rehman
,
Christoph Ruland
Papers
Routing Algorithm for Balancing Network Lifetime and Reliable Packet Delivery in Mobile Ad hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 257-262
by
Wibhada Naruephiphat
,
Chalermpol Charnsripinyo
Papers
Recurrent Grid Based Voting Approach for Location Estimation in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-267
by
Amit Gupta
,
Shashikala Tapaswi
,
Vinod Jain
Papers
Optimizing Wireless Channels through a Push-Based System
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-272
by
Ahmad S. Al-Mogren
Papers
Effective Top-down Clustering Algorithms for Location Database Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 273-279
by
Kwang-Jo Lee
,
Jin-Woo Song
,
Sung-Bong Yang
Papers
Comparison of Service Management Architectures in MANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 280-285
by
Károly Farkas
Papers
Wireless Sensor Networks Performance Measurements and Monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-291
by
Yaqoob J. AL-Raeisi
,
Nazar Elfadil
Papers
QR Code Data Type Encoding for Ubiquitous Information Transfer Across Different Platforms
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-297
by
Yo-Ping Huang
,
Yueh-Tsun Chang
,
Frode Eika Sandnes
Papers
Toward a NFC Phone-Driven Context Awareness Smart Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-303
by
Yue-Shan Chang
,
Yung-Shuan Hung
,
Ching-Lung Chang
,
Tong-Ying Juang
Papers
Human Activity Inference for Ubiquitous RFID-Based Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-309
by
Jingwen Xiong
,
Boon-Chong Seet
,
Judith Symonds
Papers
RSP: A Remote OSGi Service Sharing Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 318-323
by
Eunhoe Kim
,
Kihyun Yun
,
Jaeyoung Choi
Papers
A Level-Based Energy Efficiency Clustering Approach for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 324-329
by
Hung-Chi Chu
,
Ying-Hsiang Liao
,
Lin-Huang Chang
,
Fang-Lin Chao
Papers
Mobility Management of VoIP Services Using SCTP Handoff Mechanism
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-335
by
Lin-Huang Chang
,
Po-Hsun Huang
,
Hung-Chi Chu
,
Huai-Hsinh Tsai
Papers
The Steady Clustering Scheme for Heterogeneous Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-341
by
Jiun-Jian Liaw
,
Chen-Yi Dai
,
Yi-Jie Wang
Papers
An Image Copyright Protection Scheme with Tamper Detection Capability
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-349
by
Shang-Lin Hsieh
,
Chung-Ping Yeh
,
I-Ju Tsai
Papers
RFID-Based Personalized Behavior Modeling
Full-text access may be available. Sign in or learn about subscription options.
pp. 350-355
by
Hui-Huang Hsu
,
Zixue Cheng
,
Timothy K. Shih
,
Chien-Chen Chen
Papers
Ranking Method for Optimizing Precision/Recall of Content-Based Image Retrieval
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-361
by
Jun Zhang
,
Lei Ye
Papers
Digital Watermarking Method Based on Image Size Invariant Visual Cryptographic Scheme
Full-text access may be available. Sign in or learn about subscription options.
pp. 362-366
by
Shu-Fen Tu
,
Ching-Sheng Hsu
Papers
CADBA: A Context-aware Architecture Based on Context Database for Mobile Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 367-372
by
Been-Chian Chien
,
Hsin-Chan Tsai
,
Yuen-Kuei Hsueh
Papers
Human Motion Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 373-376
by
Joseph C. Tsai
,
Tzu-Lin Wong
,
Hsing-Ying Zhong
,
Shih-Ming Chang
,
Timothy K. Shih
Papers
A User Location-Aware Music Playing System
Full-text access may be available. Sign in or learn about subscription options.
pp. 377-382
by
Youhei Katori
,
Jianhua Ma
,
Tomomi Kawashima
,
Runhe Huang
,
Bernady O. Apduhan
,
Qun Jin
Papers
Cooperative Routing for Wireless Networks with Multiple Shared Channels
Full-text access may be available. Sign in or learn about subscription options.
pp. 383-388
by
Xiaoqin Chen
,
Dhammika Jayalath
,
Leif Hanlen
Papers
Node Localisation in Mobile Ad Hoc Networks Using Double Time Difference of Arrival
Full-text access may be available. Sign in or learn about subscription options.
pp. 389-394
by
HuiYao Zhang
,
Garry Einicke
,
Marek Bialkowski
,
John Homer
Papers
Distributed WSN Data Stream Mining Based on Fuzzy Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 395-400
by
Hakilo Sabit
,
Adnan Al-Anbuky
,
Hamid Gholam-Hosseini
Papers
Adaptive Determination of Data Granularity for QoS-Constraint Data Gathering in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 401-405
by
Jun-Zhao Sun
Papers
Challenges and Evaluation of the State of the Art Routing Protocols for Wireless Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 406-410
by
Shivanajay Marwaha
,
Jadwiga Indulska
,
Marius Portmann
Papers
In silico Consciousness: The Goal of Ambient Intelligent Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 411-416
by
V.K. Murthy
,
E.V. Krishnamurthy
Papers
A Novel Relay Encryption Scheme for Mobile Ad hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 417-422
by
Duan Hu
,
Furong Wang
,
Chen Huang
,
Chunming Rong
Papers
Underwater Vehicle Noise Source Recognition Using Structure Dynamic Adjustable SVM
Full-text access may be available. Sign in or learn about subscription options.
pp. 423-427
by
Zhihua Gao
,
Kerong Ben
,
Lilin Cui
Papers
Expression and Analysis of Emotions: Survey and Experiment
Full-text access may be available. Sign in or learn about subscription options.
pp. 428-433
by
Changrong Yu
,
Jiehan Zhou
,
Jukka Riekki
Papers
Social Behavior Association and Influence in Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 434-439
by
Bin Xie
,
Anup Kumar
,
Padmanabhan Ramaswamy
,
Laurence T. Yang
,
Sanjuli Agrawal
Papers
Hidden Community Mining under the RST/POSL Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 440-445
by
Hong Feng Lai
Papers
Trust Management in Three Generations of Web-Based Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 446-451
by
Guanfeng Liu
,
Yan Wang
,
Lei Li
Papers
Measurement and Feedback Scheme for CAC in Cellular Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 452-455
by
Hao Wang
,
Zhe Guo
,
Jialun Huang
,
Lai Tu
Papers
Joint Optimal Congestion Control and Channel Assignment for Multi-Radio Multi-Channel Wireless Networks in Cyber-Physical Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 456-460
by
Kewei Li
,
Qingwei Liu
,
Furong Wang
,
Xu Xie
Papers
Mobile Network Optimization Using Fuzzy Case-Based Reasoning for GSM
Full-text access may be available. Sign in or learn about subscription options.
pp. 461-464
by
Zeng Ma
,
Jun Hu
,
Shi Zhao
,
Jialun Huang
Papers
A Distributed IPS Model Based on Neighbor Distance
Full-text access may be available. Sign in or learn about subscription options.
pp. 465-469
by
Jian Zhang
,
Wanhua Cao
,
Huan Zhang
,
Li Feng
,
Duan Hu
Papers
On-line Fault Diagnosis Model of the Hydropower Units Based on MAS
Full-text access may be available. Sign in or learn about subscription options.
pp. 470-476
by
Liao Jiaping
,
Fu Bo
,
Chen Yu
Papers
Synchronized Multi-Channel Cognitive MAC Protocol with Efficient Solutions for Second Spectrum Access
Full-text access may be available. Sign in or learn about subscription options.
pp. 477-481
by
Sarah Eljack
,
Benxiong Huang
,
Lai Tu
,
Peng Zhang
Papers
A Preliminary Profiling of Internet Money Mules: An Australian Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 482-487
by
Manuel Aston
,
Stephen McCombie
,
Ben Reardon
,
Paul Watters
Papers
Using Differencing to Increase Distinctiveness for Phishing Website Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 488-492
by
Robert Layton
,
Simon Brown
,
Paul Watters
Papers
Detecting Phishing Emails Using Hybrid Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 493-497
by
Liping Ma
,
Bahadorrezda Ofoghi
,
Paul Watters
,
Simon Brown
Papers
Spam and Social Effects
Full-text access may be available. Sign in or learn about subscription options.
pp. 498-501
by
Man Qi
,
Denis Edgar-Nevill
,
Reza Mousoli
Papers
[Publisher's information]
Freely available from IEEE.
pp. 596
Papers
A Trust Enhanced Email Application Using Trusted Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 502-507
by
Julian Jang
,
Surya Nepal
,
John Zic
Papers
Understanding the Construction Mechanism of Botnets
Full-text access may be available. Sign in or learn about subscription options.
pp. 508-512
by
Xuefeng Li
,
Haixin Duan
,
Wu Liu
,
Jianping Wu
Papers
IPGroupRep: A Novel Reputation Based System for Anti-Spam
Full-text access may be available. Sign in or learn about subscription options.
pp. 513-518
by
Hong Zhang
,
Haixin Duan
,
Wu Liu
,
Jianping Wu
Papers
H6Proxy: ICMPv6 Weakness Analysis and Implementation of IPv6 Attacking Test Proxy
Full-text access may be available. Sign in or learn about subscription options.
pp. 519-524
by
Liu Wu
,
Duan Hai-xin
,
Lin Tao
,
Li Xing
,
Wu Jian-ping
Papers
The Case for a Consistent Cyberscam Classification Framework (CCCF)
Full-text access may be available. Sign in or learn about subscription options.
pp. 525-530
by
Amber Stabek
,
Simon Brown
,
Paul Watters
Papers
Data Loss in the British Government: A Bounty of Credentials for Organised Crime
Full-text access may be available. Sign in or learn about subscription options.
pp. 531-536
by
Paul Watters
Papers
4-MASCLE - Improved Coverage Aware Clustering with Self Healing Abilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 537-543
by
Jakob Salzmann
,
Ralf Behnke
,
Martin Gag
,
Dirk Timmermann
Papers
Frontier Research on Pervasive Emotion Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 544-550
by
Jiehan Zhou
,
Changrong Yu
,
Jukka Riekki
Showing 100 out of 108
Load More
Load All