Default Cover Image

Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on

July 7 2009 to July 9 2009

Brisbane, Australia

ISBN: 978-0-7695-3737-5

Table of Contents

Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xiii
Conference InformationFreely available from IEEE.pp. xiv-xlvi
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Context and Adaptivity in Context-Aware Pervasive Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 94-101
Papers
An Efficient Mechanism for Mobile Target Tracking in Grid-Based Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
Space Time Codes to Achieve Generalized Optimal Diversity for Higher Rate Wireless NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 7-11
Papers
Biologically Inspired Ant-Based Routing in Mobile Ad hoc Networks (MANET): A SurveyFull-text access may be available. Sign in or learn about subscription options.pp. 12-15
Papers
A Routing Algorithm Based on Mobile Agent for Mine MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 16-21
Papers
RFID-Based, Anonymous Authentication SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 22-27
Papers
Trust in Distributed Small Sized Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 28-33
Papers
An Analysis of Trust Transitivity Taking Base Rate into AccountFull-text access may be available. Sign in or learn about subscription options.pp. 34-39
Papers
Improving Prediction Accuracy Using Entropy Weighting in Collaborative FilteringFull-text access may be available. Sign in or learn about subscription options.pp. 40-45
Papers
Trust Management in Swarm-Based Autonomic Computing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 46-53
Papers
50 Years of IsolationFull-text access may be available. Sign in or learn about subscription options.pp. 54-60
Papers
Deriving a Good Trade-off Between System Availability and Time RedundancyFull-text access may be available. Sign in or learn about subscription options.pp. 61-67
Papers
Multidimensional Monitoring of Computer SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 68-74
Papers
Ubiquitous Computing and Time DimensionFull-text access may be available. Sign in or learn about subscription options.pp. 83-87
Papers
An Open Framework for Distributed Context Management in Ubiquitous EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 88-93
Papers
A Situated Display for Local Community Participation: The Design and Use of NnubFull-text access may be available. Sign in or learn about subscription options.pp. 102-107
Papers
Adaptive Interface for Collaborative Environments: AICEFull-text access may be available. Sign in or learn about subscription options.pp. 108-113
Papers
Human Activity Recognizer for Mobile Devices with Multiple SensorsFull-text access may be available. Sign in or learn about subscription options.pp. 114-119
Papers
An Event-driven Context Model in Elderly Health MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 120-124
Papers
Agenda Driven Home Automation - Towards High Level Context Aware SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 125-130
Papers
User Location Estimation Based on Stereo Audio-VisionFull-text access may be available. Sign in or learn about subscription options.pp. 131-136
Papers
An Automatic Algorithm of Dangerous Construction Warning SystemFull-text access may be available. Sign in or learn about subscription options.pp. 137-142
Papers
Using the iDTV for Managing Services in the Ubiquitous Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 143-148
Papers
Context-awareness Handoff Planning in Ubiquitous NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 155-160
Papers
A Grid-Based Distributed Computing Environment for Automatic Concept Extraction and Content Supporting ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 161-166
Papers
Correspondence Analysis to Screening the Implementation of One Village One Product Programs in TaiwanFull-text access may be available. Sign in or learn about subscription options.pp. 167-171
Papers
Multiple Objective Compromise Optimization Method to Analyze the Strategies of Nanotechnology in TaiwanFull-text access may be available. Sign in or learn about subscription options.pp. 172-177
Papers
Limiting Sybil Attacks on Bayesian Trust Models in Open SOA EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 178-183
Papers
Toward an OSGi-Based Infrastructure for Smart Home ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 184-188
Papers
Bird Species Recognition by Wavelet Transformation of a Section of BirdsongFull-text access may be available. Sign in or learn about subscription options.pp. 189-193
Papers
Fast Intra/Inter Mode Decision for H.264/AVC Using the Spatial-Temporal Prediction SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 194-199
Papers
Urban Search and Rescue Robots in Test Arenas: Scaled Modeling of Disasters to Test Intelligent Robot PrototypingFull-text access may be available. Sign in or learn about subscription options.pp. 200-205
Papers
Augmented Isometric Board Games: Linking the Physical Playing Field with Intelligent Non-Player FeedbackFull-text access may be available. Sign in or learn about subscription options.pp. 206-211
Papers
A TCP Performance Improved mechanism for Wireless NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 212-216
Papers
An Adaptive Anti-Collision Algorithm towards Efficient RFID Tag IdentificationFull-text access may be available. Sign in or learn about subscription options.pp. 217-222
Embedded Semantics Empowering Context-Aware Pervasive Computing EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 310-317
Papers
An Accelerometer Based Approach for Indoor LocalizationFull-text access may be available. Sign in or learn about subscription options.pp. 223-227
Papers
ConPlan: A Context-Aware Ad-hoc Meeting Plan ProgramFull-text access may be available. Sign in or learn about subscription options.pp. 228-233
Papers
Energy-Efficient Structuralized Clustering for Sensor-Based Cyber Physical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 234-239
Papers
The Clustering Algorithm for Enhancing Network Lifetime in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 240-245
Papers
Using HMAC for Error Correction over a Wireless ChannelFull-text access may be available. Sign in or learn about subscription options.pp. 252-256
Papers
Routing Algorithm for Balancing Network Lifetime and Reliable Packet Delivery in Mobile Ad hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 257-262
Papers
Recurrent Grid Based Voting Approach for Location Estimation in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 263-267
Papers
Optimizing Wireless Channels through a Push-Based SystemFull-text access may be available. Sign in or learn about subscription options.pp. 268-272
Papers
Effective Top-down Clustering Algorithms for Location Database SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 273-279
Papers
Comparison of Service Management Architectures in MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 280-285
Papers
Wireless Sensor Networks Performance Measurements and MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 286-291
Papers
QR Code Data Type Encoding for Ubiquitous Information Transfer Across Different PlatformsFull-text access may be available. Sign in or learn about subscription options.pp. 292-297
Papers
Toward a NFC Phone-Driven Context Awareness Smart EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 298-303
Papers
Human Activity Inference for Ubiquitous RFID-Based ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 304-309
Papers
RSP: A Remote OSGi Service Sharing SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 318-323
Papers
A Level-Based Energy Efficiency Clustering Approach for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 324-329
Papers
Mobility Management of VoIP Services Using SCTP Handoff MechanismFull-text access may be available. Sign in or learn about subscription options.pp. 330-335
Papers
The Steady Clustering Scheme for Heterogeneous Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 336-341
Papers
An Image Copyright Protection Scheme with Tamper Detection CapabilityFull-text access may be available. Sign in or learn about subscription options.pp. 342-349
Papers
RFID-Based Personalized Behavior ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 350-355
Papers
Ranking Method for Optimizing Precision/Recall of Content-Based Image RetrievalFull-text access may be available. Sign in or learn about subscription options.pp. 356-361
Papers
Digital Watermarking Method Based on Image Size Invariant Visual Cryptographic SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 362-366
Papers
CADBA: A Context-aware Architecture Based on Context Database for Mobile ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 367-372
Papers
Human Motion AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 373-376
Papers
A User Location-Aware Music Playing SystemFull-text access may be available. Sign in or learn about subscription options.pp. 377-382
Papers
Cooperative Routing for Wireless Networks with Multiple Shared ChannelsFull-text access may be available. Sign in or learn about subscription options.pp. 383-388
Papers
Node Localisation in Mobile Ad Hoc Networks Using Double Time Difference of ArrivalFull-text access may be available. Sign in or learn about subscription options.pp. 389-394
Papers
Distributed WSN Data Stream Mining Based on Fuzzy ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 395-400
Papers
Adaptive Determination of Data Granularity for QoS-Constraint Data Gathering in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 401-405
Papers
Challenges and Evaluation of the State of the Art Routing Protocols for Wireless Mesh NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 406-410
Papers
In silico Consciousness: The Goal of Ambient Intelligent ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 411-416
Papers
A Novel Relay Encryption Scheme for Mobile Ad hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 417-422
Papers
Underwater Vehicle Noise Source Recognition Using Structure Dynamic Adjustable SVMFull-text access may be available. Sign in or learn about subscription options.pp. 423-427
Papers
Expression and Analysis of Emotions: Survey and ExperimentFull-text access may be available. Sign in or learn about subscription options.pp. 428-433
Papers
Social Behavior Association and Influence in Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 434-439
Papers
Hidden Community Mining under the RST/POSL FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 440-445
Papers
Trust Management in Three Generations of Web-Based Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 446-451
Papers
Measurement and Feedback Scheme for CAC in Cellular NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 452-455
Papers
Mobile Network Optimization Using Fuzzy Case-Based Reasoning for GSMFull-text access may be available. Sign in or learn about subscription options.pp. 461-464
Papers
A Distributed IPS Model Based on Neighbor DistanceFull-text access may be available. Sign in or learn about subscription options.pp. 465-469
Papers
On-line Fault Diagnosis Model of the Hydropower Units Based on MASFull-text access may be available. Sign in or learn about subscription options.pp. 470-476
Papers
Synchronized Multi-Channel Cognitive MAC Protocol with Efficient Solutions for Second Spectrum AccessFull-text access may be available. Sign in or learn about subscription options.pp. 477-481
Papers
A Preliminary Profiling of Internet Money Mules: An Australian PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 482-487
Papers
Using Differencing to Increase Distinctiveness for Phishing Website ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 488-492
Papers
Detecting Phishing Emails Using Hybrid FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 493-497
Papers
Spam and Social EffectsFull-text access may be available. Sign in or learn about subscription options.pp. 498-501
Papers
[Publisher's information]Freely available from IEEE.pp. 596
Papers
A Trust Enhanced Email Application Using Trusted ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 502-507
Papers
Understanding the Construction Mechanism of BotnetsFull-text access may be available. Sign in or learn about subscription options.pp. 508-512
Papers
IPGroupRep: A Novel Reputation Based System for Anti-SpamFull-text access may be available. Sign in or learn about subscription options.pp. 513-518
Papers
H6Proxy: ICMPv6 Weakness Analysis and Implementation of IPv6 Attacking Test ProxyFull-text access may be available. Sign in or learn about subscription options.pp. 519-524
Papers
The Case for a Consistent Cyberscam Classification Framework (CCCF)Full-text access may be available. Sign in or learn about subscription options.pp. 525-530
Papers
Data Loss in the British Government: A Bounty of Credentials for Organised CrimeFull-text access may be available. Sign in or learn about subscription options.pp. 531-536
Papers
4-MASCLE - Improved Coverage Aware Clustering with Self Healing AbilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 537-543
Papers
Frontier Research on Pervasive Emotion ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 544-550
Showing 100 out of 108