Default Cover Image

Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on

Sept. 4 2012 to Sept. 7 2012

Fukuoka, Japan Japan

ISBN: 978-1-4673-3084-8

Table of Contents

Papers
A Power Saving Method with Consideration of Performance in Android TerminalsFull-text access may be available. Sign in or learn about subscription options.pp. 578-585
Papers
An Expert System Application for Respiratory Infection DiagnosticFull-text access may be available. Sign in or learn about subscription options.pp. 673-678
Papers
iSac: Intimacy Based Access Control for Social Network SitesFull-text access may be available. Sign in or learn about subscription options.pp. 517-524
Papers
Safe Driving Education System ASSIST -- Education Anywhere, AnytimeFull-text access may be available. Sign in or learn about subscription options.pp. 402-404
Papers
A Transmission Scheduling for Data-Gathering Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 292-297
Papers
Contribution-Based User Reputation Modeling in Collaborative Recommender SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 172-179
Papers
Confidential Enhancement with Multi-code Keying Reconfiguration over Time-Shifted CHPC-based 2D OCDMA NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 374-381
Papers
A Battery-Aware Energy-Efficient Android Phone with Bayesian NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 204-209
Papers
Combined Server Rejuvenation in a Virtualized Data CenterFull-text access may be available. Sign in or learn about subscription options.pp. 486-493
Papers
Autonomic Activities in the Execution of Scientific Workflows: Evaluation of the AWARD FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 423-430
Papers
Neighbor Selection Method Based on Sending Capacity for P2P Live Streaming with Layer CodingFull-text access may be available. Sign in or learn about subscription options.pp. 264-271
Papers
Neighbor Similarity Trust against Sybil Attack in P2P E-commerceFull-text access may be available. Sign in or learn about subscription options.pp. 547-554
Papers
Study of a Conversational Agent System Encouraging "Real" Answers of Individuals in a Group of AcquaintancesFull-text access may be available. Sign in or learn about subscription options.pp. 143-150
Papers
Wireless Smart Home Sensor Networks: Mobile Agent Based Anomaly DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 322-329
Papers
The Design and Realization of Video Phone System in Embedded PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 650-654
Papers
Improving the Estimation of Residual Delay based Forwarding Method in Opportunistic Vehicular NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 79-86
Papers
Squareknot: A Flexible Framework for Actuators and Controllers in Smart EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 699-706
Papers
Hybrid SN: Interlinking Opportunistic and Online Communities to Augment Information DisseminationFull-text access may be available. Sign in or learn about subscription options.pp. 188-195
Papers
An Efficient Clustering Authentication Mechanism for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 388-393
Papers
Routine Based Analysis for User Classification and Location PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 96-103
Papers
Guaranteeing Asymptotic Stability of Clustering by Autonomous Decentralized Structure FormationFull-text access may be available. Sign in or learn about subscription options.pp. 408-414
Papers
Demand Response Control Strategies for On-campus Small Data CentersFull-text access may be available. Sign in or learn about subscription options.pp. 217-224
Papers
Performance Analysis of Virtual Disk System for Transparent ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 470-477
Papers
Composite Trust Model for an Information Sharing ScenarioFull-text access may be available. Sign in or learn about subscription options.pp. 439-446
Papers
Efficient Time Series Disaggregation for Non-intrusive Appliance Load MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 248-255
Papers
Filesystem Layout Reorganization in Virtualized EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 501-508
Papers
Situation-Based Design: A Rapid Approach for Pervasive Application DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 128-135
Papers
Performance Management of Virtual Machines via Passive Measurement and Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 533-538
Papers
AB-Chord: An Efficient Approach for Resource Location in Structured P2P NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 278-284
Papers
A Two-Level Virtual Machine Self-Reconfiguration Mechanism for the Cloud Computing PlatformsFull-text access may be available. Sign in or learn about subscription options.pp. 563-570
Papers
A Content-Based Publish/Subscribe System for Efficient Event Notification over Vehicular Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 64-71
Papers
An Assurance Enhanced Route-Split Routing for Non-uniform Node Density in Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 594-599
Papers
Robust and Dynamic Data Aggregation in Wireless Sensor Networks: A Cross-Layer ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 306-313
Papers
Achieving High Availability of Consistent Data in the Presence of Network PartitionsFull-text access may be available. Sign in or learn about subscription options.pp. 618-620
Papers
A Four-Stage Gate-Keeper Model of Social Service Engineering: Lessons from Golden Rules of Mobile Social Game DesignFull-text access may be available. Sign in or learn about subscription options.pp. 159-163
Papers
Dual-Watermarking by QR-code Applications in Image ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 638-643
Papers
An Intelligent Accessing Control System Based on Human Intention AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 337-341
Papers
An Architecture for Video Surveillance Service Based on P2P and Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 661-666
Papers
Downlink Scheduling and Resource Allocation in EPON-WiMAX Integrated NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 32-39
Papers
Backlog Bounds Analysis of Different On-chip Cache Coherence Policies: A Network Calculus-Based ApprochFull-text access may be available. Sign in or learn about subscription options.pp. 361-365
Papers
FOSS4G Based Mobile Web-GIS for Field Survey in Natural Environmental StudiesFull-text access may be available. Sign in or learn about subscription options.pp. 707-712
Papers
Exploiting Ultrasonic Reflections for Improving Accuracy of Indoor Location TrackingFull-text access may be available. Sign in or learn about subscription options.pp. 87-95
Papers
Fault Management for Smart Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 382-387
Papers
A Fault Detection and Diagnosis Framework for Ambient Intelligent SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 394-401
Papers
An Energy-Efficient Data Collection Mechanism with a Mobile Sink for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 210-216
Papers
Semantic Modeling and Reasoning at Runtime for Autonomous Systems EngineeringFull-text access may be available. Sign in or learn about subscription options.pp. 415-422
Papers
MPIGate: A Solution to Use Heterogeneous Networks for Assisted Living ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 104-111
Papers
Automatic I/O Scheduler Selection through Online Workload AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 431-438
Papers
Hilbert-Chain Topology for Energy Conservation in Large-Scale Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 225-232
Papers
Component Importance Analysis of Virtualized SystemFull-text access may be available. Sign in or learn about subscription options.pp. 462-469
Papers
Insuring Sensitive Processes through Process MiningFull-text access may be available. Sign in or learn about subscription options.pp. 447-454
Papers
Risk-Based Intelligent Software Release PlanningFull-text access may be available. Sign in or learn about subscription options.pp. 240-247
Papers
Optimizing Software Rejuvenation Policies under Interval Reliability CriteriaFull-text access may be available. Sign in or learn about subscription options.pp. 478-485
Papers
Java Virtual Machine Based Infrastructure for Decent Wireless Sensor Network Development EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 120-127
Papers
Model-Based Performance Optimization of Generalized Snapshot Isolation in Database SystemFull-text access may be available. Sign in or learn about subscription options.pp. 494-500
Papers
User Identification Based on Touch DynamicsFull-text access may be available. Sign in or learn about subscription options.pp. 256-263
Papers
An Availability-Aware Virtual Machine Placement Approach for Dynamic Scaling of Cloud ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 509-516
Papers
Anycast Routing Based on Connectivity Metric for Sensor and Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 56-63
Papers
PKU-STRAW-L: A Simulative Platform Evaluate the Power-Saving Rate of the Intelligent Street Lamp SystemFull-text access may be available. Sign in or learn about subscription options.pp. 525-532
Papers
Using Dynamic Slots Collision Tracking Tree Technique Towards an Efficient Tag Anti-collision Algorithm in RFID SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 272-277
Papers
A Self-Protection Mechanism against Stepping-Stone Attacks for IaaS CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 539-546
Papers
A Mobile Application Framework for Rapid Integration of Ubiquitous Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 136-142
Papers
Accuracy of Privacy-Preserving Collaborative Filtering Based on Quasi-homomorphic SimilarityFull-text access may be available. Sign in or learn about subscription options.pp. 555-562
Papers
Development of Industrial Safety Management System for Shipbuilding Industry Using RFID/USNFull-text access may be available. Sign in or learn about subscription options.pp. 285-291
Papers
A Frame Rate Up-Conversion Algorithm for 3-D VideoFull-text access may be available. Sign in or learn about subscription options.pp. 571-577
Papers
A Lingustic Approach for Robustness in Context Aware ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 24-31
Papers
Dependability Modeling and Analysis of Random Port HoppingFull-text access may be available. Sign in or learn about subscription options.pp. 586-593
Papers
A Decentralized Quality Aware Adaptive Sampling Strategy in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 298-305
Papers
Intelligent Systems that Combine Pervasive Computing and Social NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 151-158
Papers
Toward Remote Service Invocation in AndroidFull-text access may be available. Sign in or learn about subscription options.pp. 612-617
Papers
The IG-Ferry Protocol to Support Efficient Controlled Replication in Vehicular Delay Tolerant NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 314-321
Papers
A Routing ID-based Node-disjoint Multipath Scheme for Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 621-626
Papers
Performance Analysis of LTE Smartphones-Based Vehicle-to-Infrastrcuture CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 72-78
Papers
The Modulation Method Based on Reed-Solomon Code for WatermarkingFull-text access may be available. Sign in or learn about subscription options.pp. 633-637
Papers
An Efficient Method for Lane-Mark Extraction in Complex ConditionsFull-text access may be available. Sign in or learn about subscription options.pp. 330-336
Papers
Employing LSB and VQ for Undetectable Secret Data HidingFull-text access may be available. Sign in or learn about subscription options.pp. 644-649
Papers
Predicting Mobile Phone User Locations by Exploiting Collective Behavioral PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 164-171
Papers
A Framework for Scalable Cloud Video Recorder System in Surveillance EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 655-660
Papers
Comparative Study on Advanced TV Interface Types in the Smart Media WorldFull-text access may be available. Sign in or learn about subscription options.pp. 342-348
Papers
A Project-Based Curriculum for Teaching C++ Object-Oriented ProgrammingFull-text access may be available. Sign in or learn about subscription options.pp. 667-672
Papers
Development of the Smart Toilet Equipment with Measurements of Physiological ParametersFull-text access may be available. Sign in or learn about subscription options.pp. 9-16
Papers
Accelerating Computation of DCM for ERP with GPU-Based Parallel StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 679-684
Papers
An Overlap Aware Technique for Redundant Reader EliminationFull-text access may be available. Sign in or learn about subscription options.pp. 357-360
Papers
Knowledge Transfer in Activity Recognition Using Sensor ProfileFull-text access may be available. Sign in or learn about subscription options.pp. 180-187
Papers
Hydra: An Ubiquitous Application for Service ReroutingFull-text access may be available. Sign in or learn about subscription options.pp. 366-373
Papers
Treatment of Missing Data in Intelligent Lighting ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Papers
Development of a Route Finding System for Manual Wheelchair Users Based on Actual Measurement DataFull-text access may be available. Sign in or learn about subscription options.pp. 17-23
Papers
Data Gathering in a Hybrid Wireless Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 48-55
Papers
3D Modeling and Simulation of Human Activities in Smart SpacesFull-text access may be available. Sign in or learn about subscription options.pp. 112-119
Papers
The Challenge of Preparational Behaviours in Preference Learning for Ubiquitous SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 233-239
Papers
On Enhancing Adaptive Random Testing for AADL ModelFull-text access may be available. Sign in or learn about subscription options.pp. 455-461
Showing 100 out of 183