Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
UIC-ATC
UIC-ATC 2012
Generate Citations
Ubiquitous, Autonomic and Trusted Computing, Symposia and Workshops on
Sept. 4 2012 to Sept. 7 2012
Fukuoka, Japan Japan
ISBN: 978-1-4673-3084-8
Table of Contents
Papers
A Power Saving Method with Consideration of Performance in Android Terminals
Full-text access may be available. Sign in or learn about subscription options.
pp. 578-585
by
Kyosuke Nagata
,
Saneyasu Yamaguchi
,
Hisato Ogawa
Papers
An Expert System Application for Respiratory Infection Diagnostic
Full-text access may be available. Sign in or learn about subscription options.
pp. 673-678
by
Sheng-Ta Hsieh
,
Chih-Dao Chen
,
Jun-Horng Chen
,
Chin-Lun Lai
,
Yu-Long Syu
Papers
A Novel Interval Grey Number and Entropy-based Solution for Multiple-Criteria Group Decision Making Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 349-356
by
Hyung Ku Kang
,
Dae Gun Kim
,
Hwi Woon Jeong
,
Geon Yong Park
,
Hee Yong Youn
Papers
iSac: Intimacy Based Access Control for Social Network Sites
Full-text access may be available. Sign in or learn about subscription options.
pp. 517-524
by
Yonggang Wang
,
Ennan Zhai
,
Eng Keong Lua
,
Jianbin Hu
,
Zhong Chen
Papers
Safe Driving Education System ASSIST -- Education Anywhere, Anytime
Full-text access may be available. Sign in or learn about subscription options.
pp. 402-404
by
Kazuaki Goshi
,
Masaki Hayashi
,
Katsuya Matsunaga
Papers
A Transmission Scheduling for Data-Gathering Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-297
by
Chao Gao
,
Ilkka Kivela
,
Xinyu Tan
,
Ismo Hakala
Papers
Privacy, Security and Trust in Cloud Computing: The Perspective of the Telecommunication Industry
Full-text access may be available. Sign in or learn about subscription options.
pp. 627-632
by
Leonardo A. Martucci
,
Albin Zuccato
,
Ben Smeets
,
Sheikh M. Habib
,
Thomas Johansson
,
Nahid Shahmehri
Papers
Contribution-Based User Reputation Modeling in Collaborative Recommender Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 172-179
by
Wei Hu
,
Yaoxue Zhang
,
Yuezhi Zhou
,
Zhi Xue
Papers
Confidential Enhancement with Multi-code Keying Reconfiguration over Time-Shifted CHPC-based 2D OCDMA Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 374-381
by
Yao-Tang Chang
,
Chuen-Ching Wang
Papers
A Battery-Aware Energy-Efficient Android Phone with Bayesian Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-209
by
Si-Hyuk Yi
,
Sung-Bae Cho
Papers
Combined Server Rejuvenation in a Virtualized Data Center
Full-text access may be available. Sign in or learn about subscription options.
pp. 486-493
by
Fumio Machida
,
Jianwen Xiang
,
Kumiko Tadano
,
Yoshiharu Maeno
Papers
Autonomic Activities in the Execution of Scientific Workflows: Evaluation of the AWARD Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 423-430
by
Luis Assuncao
,
Carlos Goncalves
,
Jose C. Cunha
Papers
Neighbor Selection Method Based on Sending Capacity for P2P Live Streaming with Layer Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-271
by
Rei Endo
,
Kazuyuki Takayama
,
Yoshiki Sakata
,
Hiroshi Shigeno
Papers
Neighbor Similarity Trust against Sybil Attack in P2P E-commerce
Full-text access may be available. Sign in or learn about subscription options.
pp. 547-554
by
Felix Musau
,
Guojun Wang
,
Song Guo
,
Muhammad Bashir Abdullahi
Papers
Study of a Conversational Agent System Encouraging "Real" Answers of Individuals in a Group of Acquaintances
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-150
by
Akihito Yoshii
,
Tatsuo Nakajima
Papers
Quasi-static Approach for Analyzing Interactions between Networks and Users Based on Decomposition of Timescales
Full-text access may be available. Sign in or learn about subscription options.
pp. 606-611
by
Masaki Aida
,
Chisa Takano
,
Masayuki Murata
,
Makoto Imase
Papers
Wireless Smart Home Sensor Networks: Mobile Agent Based Anomaly Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 322-329
by
Muhammad Usman
,
Vallipuram Muthukkumarasamy
,
Xin-Wen Wu
,
Surraya Khanum
Papers
The Design and Realization of Video Phone System in Embedded Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 650-654
by
Ching-Lung Chang
,
Chang-Hsuan Hung
Papers
Improving the Estimation of Residual Delay based Forwarding Method in Opportunistic Vehicular Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-86
by
Jia Jianbin
,
Chen Yingwen
,
Xu Ming
,
Yu Gu
Papers
Squareknot: A Flexible Framework for Actuators and Controllers in Smart Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 699-706
by
Takeru Ujinawa
,
Naohiro Hayashibara
Papers
Hybrid SN: Interlinking Opportunistic and Online Communities to Augment Information Dissemination
Full-text access may be available. Sign in or learn about subscription options.
pp. 188-195
by
Bin Guo
,
Zhiwen Yu
,
Xingshe Zhou
,
Daqing Zhang
Papers
An Efficient Clustering Authentication Mechanism for Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 388-393
by
Ching-Hung Yeh
,
Meng-Yen Hsieh
,
Kuan-Ching Li
Papers
Routine Based Analysis for User Classification and Location Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 96-103
by
Yibing Xiong
,
Huiping Lin
Papers
Guaranteeing Asymptotic Stability of Clustering by Autonomous Decentralized Structure Formation
Full-text access may be available. Sign in or learn about subscription options.
pp. 408-414
by
Ryo Hamamoto
,
Chisa Takano
,
Kenji Ishida
,
Masaki Aida
Papers
Demand Response Control Strategies for On-campus Small Data Centers
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-224
by
Cheng-Jen Tang
,
Miau-Ru Dai
Papers
Performance Analysis of Virtual Disk System for Transparent Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 470-477
by
Yuan Gao
,
Yaoxue Zhang
,
Yuezhi Zhou
Papers
Composite Trust Model for an Information Sharing Scenario
Full-text access may be available. Sign in or learn about subscription options.
pp. 439-446
by
Kevin Chan
,
Jin-Hee Cho
,
Sibel Adali
Papers
Efficient Time Series Disaggregation for Non-intrusive Appliance Load Monitoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-255
by
Yao-Chung Fan
,
Xingjie Liu
,
Wang-Chien Lee
,
Arbee L.P. Chen
Papers
Filesystem Layout Reorganization in Virtualized Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 501-508
by
Masaya Yamada
,
Saneyasu Yamaguchi
Papers
Situation-Based Design: A Rapid Approach for Pervasive Application Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 128-135
by
Lei Tang
,
Xingshe Zhou
,
Christian Becker
,
Zhiwen Yu
,
Gregor Schiele
Papers
Performance Management of Virtual Machines via Passive Measurement and Machine Learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 533-538
by
Toshiaki Hayashi
,
Satoru Ohta
Papers
AB-Chord: An Efficient Approach for Resource Location in Structured P2P Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 278-284
by
Yufeng Wang
,
Xiangming Li
,
Qun Jin
,
Jianhua Ma
Papers
A Two-Level Virtual Machine Self-Reconfiguration Mechanism for the Cloud Computing Platforms
Full-text access may be available. Sign in or learn about subscription options.
pp. 563-570
by
Wei Chen
,
Xiaoqiang Qiao
,
Jun Wei
,
Tao Huang
Papers
A Content-Based Publish/Subscribe System for Efficient Event Notification over Vehicular Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-71
by
Fusang Zhang
,
Beihong Jin
,
Wei Zhuo
,
Zhaoyang Wang
,
Lifeng Zhang
Papers
An Assurance Enhanced Route-Split Routing for Non-uniform Node Density in Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 594-599
by
Mario Takeuchi
,
Anri Kimura
,
Eitaro Kohno
,
Tomoyuki Ohta
,
Yoshiaki Kakuda
Papers
Robust and Dynamic Data Aggregation in Wireless Sensor Networks: A Cross-Layer Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 306-313
by
Weigang Wu
,
Jiannong Cao
,
Hejun Wu
,
Jingjing Li
Papers
Achieving High Availability of Consistent Data in the Presence of Network Partitions
Full-text access may be available. Sign in or learn about subscription options.
pp. 618-620
by
Tatsuhiro Tsuchiya
Papers
A Four-Stage Gate-Keeper Model of Social Service Engineering: Lessons from Golden Rules of Mobile Social Game Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-163
by
Toshihiko Yamakami
Papers
Dual-Watermarking by QR-code Applications in Image Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 638-643
by
Fu-Hau Hsu
,
Min-Hao Wu
,
Shiuh-Jeng Wang
Papers
An Intelligent Accessing Control System Based on Human Intention Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-341
by
Teng-Hui Tseng
,
Chin-Lun Lai
,
Sheng-Ta Hsieh
,
Jun-Horng Chen
Papers
An Architecture for Video Surveillance Service Based on P2P and Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 661-666
by
Yu-Sheng Wu
,
Yue-Shan Chang
,
Tong-Ying Juang
,
Jing-Shyang Yen
Papers
Downlink Scheduling and Resource Allocation in EPON-WiMAX Integrated Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 32-39
by
Chung-Chih Kuo
,
Hung-Yi Teng
,
Ren-Hung Hwang
Papers
Applying Pervasive Computing in an Architecture for Homecare Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 685-692
by
Leandro O. Freitas
,
Giovani R. Librelotto
,
Henrique G.G. Pereira
,
Jeferson Kasper
,
Ricardo G. Martini
,
Bruno Mozzaquatro
,
Rafael T. Pereira
Papers
Backlog Bounds Analysis of Different On-chip Cache Coherence Policies: A Network Calculus-Based Approch
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-365
by
Xin Lai
,
Cong Liu
,
Zhiying Wang
,
Quanyou Feng
Papers
FOSS4G Based Mobile Web-GIS for Field Survey in Natural Environmental Studies
Full-text access may be available. Sign in or learn about subscription options.
pp. 707-712
by
Yu Nakayama
,
Suguru Mori
Papers
Exploiting Ultrasonic Reflections for Improving Accuracy of Indoor Location Tracking
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-95
by
Kang-Wook Kim
,
Myung-Gon Park
,
Takao Hishikawa
,
Junghee Han
,
Chang-Gun Lee
Papers
Fault Management for Smart Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 382-387
by
Radosveta Sokullu
,
Ozlem Karaca
Papers
Global Sensor Modeling and Constrained Application Methods Enabling Cloud-Based Open Space Smart Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-203
by
Anh Le Tu'n
,
Hoan N. Mau Quoc
,
Martin Serrano
,
Manfred Hauswirth
,
John Soldatos
,
Thanasis Papaioannou
,
Karl Aberer
Papers
A Fault Detection and Diagnosis Framework for Ambient Intelligent Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 394-401
by
Ahmed Mohamed
,
Christophe Jacquet
,
Yacine Bellik
Papers
SocioTelematics: Leveraging Interaction-Relationships in Developing Telematics Systems to Support Cooperative Convoys
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-47
by
Muhammad Ashad Kabir
,
Jun Han
,
Alan Colman
,
Jian Yu
Papers
A New Generation Children Tracking System Using Bluetooth MANET Composed of Android Mobile Terminals
Full-text access may be available. Sign in or learn about subscription options.
pp. 405-407
by
Koki Morii
,
Koji Taketa
,
Yuichiro Mori
,
Hideharu Kojima
,
Eitaro Kohno
,
Shinji Inoue
,
Tomoyuki Ohta
,
Yoshiaki Kakuda
Papers
An Energy-Efficient Data Collection Mechanism with a Mobile Sink for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-216
by
Wen-Hwa Liao
,
Ssu-Chi Kuai
Papers
Semantic Modeling and Reasoning at Runtime for Autonomous Systems Engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 415-422
by
Tarak Chaari
,
Kaouthar Fakhfakh
Papers
MPIGate: A Solution to Use Heterogeneous Networks for Assisted Living Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-111
by
Hugo Cruz-S'nchez
,
Lionel Havet
,
Moutie Chehaider
,
Ye-Qiong Song
Papers
Automatic I/O Scheduler Selection through Online Workload Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 431-438
by
Ramon Nou
,
Jacobo Giralt
,
Toni Cortes
Papers
Hilbert-Chain Topology for Energy Conservation in Large-Scale Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-232
by
Yih-Chuan Lin
,
Jia-Hong Zhong
Papers
Component Importance Analysis of Virtualized System
Full-text access may be available. Sign in or learn about subscription options.
pp. 462-469
by
Junjun Zheng
,
Hiroyuki Okamura
,
Tadashi Dohi
Papers
Insuring Sensitive Processes through Process Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 447-454
by
Jorge Munoz-Gama
,
Isao Echizen
Papers
Risk-Based Intelligent Software Release Planning
Full-text access may be available. Sign in or learn about subscription options.
pp. 240-247
by
Shunsuke Tokumoto
,
Tadashi Dohi
Papers
Optimizing Software Rejuvenation Policies under Interval Reliability Criteria
Full-text access may be available. Sign in or learn about subscription options.
pp. 478-485
by
Tadashi Dohi
,
Hiroyuki Okamura
,
Kishor S. Trivedi
Papers
Java Virtual Machine Based Infrastructure for Decent Wireless Sensor Network Development Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-127
by
Xing Liu
,
Xunxing Diao
,
Kun Mean Hou
,
Hailun Zhu
,
Xin Liu
,
Yazhou Wang
,
Wei Jia
Papers
Model-Based Performance Optimization of Generalized Snapshot Isolation in Database System
Full-text access may be available. Sign in or learn about subscription options.
pp. 494-500
by
Chao Luo
,
Hiroyuki Okamura
,
Tadashi Dohi
Papers
User Identification Based on Touch Dynamics
Full-text access may be available. Sign in or learn about subscription options.
pp. 256-263
by
Frode Eika Sandnes
,
Xiaoli Zhang
Papers
An Availability-Aware Virtual Machine Placement Approach for Dynamic Scaling of Cloud Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 509-516
by
Wenting Wang
,
Haopeng Chen
,
Xi Chen
Papers
Anycast Routing Based on Connectivity Metric for Sensor and Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-63
by
Satoru Ohta
,
Shingo Toda
Papers
PKU-STRAW-L: A Simulative Platform Evaluate the Power-Saving Rate of the Intelligent Street Lamp System
Full-text access may be available. Sign in or learn about subscription options.
pp. 525-532
by
Yang Tao
,
Lingbo Kong
,
Yinyang Wang
,
Hu Jian-Bin
,
Chen Zhong
Papers
Using Dynamic Slots Collision Tracking Tree Technique Towards an Efficient Tag Anti-collision Algorithm in RFID Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 272-277
by
Chiu-Kuo Liang
,
Hsin-Mo Lin
Papers
A Self-Protection Mechanism against Stepping-Stone Attacks for IaaS Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 539-546
by
Kenichi Kourai
,
Takeshi Azumi
,
Shigeru Chiba
Papers
A Mobile Application Framework for Rapid Integration of Ubiquitous Web Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 136-142
by
Meng-Yen Hsieh
,
Hua-Yi Lin
,
Ching-Hung Yeh
,
Kuan-Ching Li
,
Bo-Shiung Wu
Papers
Accuracy of Privacy-Preserving Collaborative Filtering Based on Quasi-homomorphic Similarity
Full-text access may be available. Sign in or learn about subscription options.
pp. 555-562
by
Hiroaki Kikuchi
,
Yoshiki Aoki
,
Masayuki Terada
,
Kazuhiko Ishii
,
Kimihiko Sekino
Papers
Development of Industrial Safety Management System for Shipbuilding Industry Using RFID/USN
Full-text access may be available. Sign in or learn about subscription options.
pp. 285-291
by
Jung-Min Yun
,
Peom Park
Papers
A Frame Rate Up-Conversion Algorithm for 3-D Video
Full-text access may be available. Sign in or learn about subscription options.
pp. 571-577
by
Shen-Chuan Tai
,
Chuen-Ching Wang
,
Chien-Shiang Hong
,
Chih-Pei Yeh
,
Yao-Tang Chang
Papers
A Lingustic Approach for Robustness in Context Aware Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-31
by
Young-Mok Min
,
Joon-Young Paik
,
Eun-Sun Cho
Papers
Dependability Modeling and Analysis of Random Port Hopping
Full-text access may be available. Sign in or learn about subscription options.
pp. 586-593
by
Kousaburo Hari
,
Tadashi Dohi
Papers
A Decentralized Quality Aware Adaptive Sampling Strategy in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 298-305
by
A. Masoum
,
N. Meratnia
,
P.J.M. Havinga
Papers
An Extension of Routing Tree Algorithm Considering Link Speed Change in IEEE 802.11n Protocol for Wireless Mesh Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 600-605
by
Nobuo Funabiki
,
Wataru Maruyama
,
Toru Nakanishi
,
Kan Watanabe
Papers
Intelligent Systems that Combine Pervasive Computing and Social Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-158
by
Sarah Gallacher
,
Elizabeth Papadopoulou
,
Nick K. Taylor
,
Fraser R. Blackmun
,
M. Howard Williams
Papers
Toward Remote Service Invocation in Android
Full-text access may be available. Sign in or learn about subscription options.
pp. 612-617
by
Kazuhiro Nakao
,
Yukikazu Nakamoto
Papers
The IG-Ferry Protocol to Support Efficient Controlled Replication in Vehicular Delay Tolerant Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 314-321
by
Ing-Chau Chang
,
Chien-Hsun Li
,
Cheng-Fu Chou
Papers
A Routing ID-based Node-disjoint Multipath Scheme for Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 621-626
by
Takahide Uemori
,
Eitaro Kohno
,
Yoshiaki Kakuda
Papers
Performance Analysis of LTE Smartphones-Based Vehicle-to-Infrastrcuture Communication
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-78
by
Hassan Abid
,
Tae Choong Chung
,
Sungyoung Lee
,
Saad Qaisar
Papers
The Modulation Method Based on Reed-Solomon Code for Watermarking
Full-text access may be available. Sign in or learn about subscription options.
pp. 633-637
by
Huang-Chi Chen
,
Yu-Wen Chang
,
Rey-Chue Hwang
Papers
An Efficient Method for Lane-Mark Extraction in Complex Conditions
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-336
by
Chin-Yu Chang
,
Chang-Hong Lin
Papers
Employing LSB and VQ for Undetectable Secret Data Hiding
Full-text access may be available. Sign in or learn about subscription options.
pp. 644-649
by
Cheng-Ta Huang
,
Wei-Jen Wang
,
Min-Yi Tsai
,
Chin-Feng Lee
Papers
Predicting Mobile Phone User Locations by Exploiting Collective Behavioral Patterns
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-171
by
Haoyi Xiong
,
Daqing Zhang
,
Daqiang Zhang
,
Vincent Gauthier
Papers
A Framework for Scalable Cloud Video Recorder System in Surveillance Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 655-660
by
Chia-Feng Lin
,
Shyan-Ming Yuan
,
Muh-Chyi Leu
,
Ching-Tsorng Tsai
Papers
Comparative Study on Advanced TV Interface Types in the Smart Media World
Full-text access may be available. Sign in or learn about subscription options.
pp. 342-348
by
Youngjae Lim
,
Jaekyu Park
,
Eui S. Jung
,
David Ho Chung
,
Taeil Kim
,
Kwangsoo Choi
,
Seunghun Lee
Papers
A Project-Based Curriculum for Teaching C++ Object-Oriented Programming
Full-text access may be available. Sign in or learn about subscription options.
pp. 667-672
by
Yen-Lin Chen
,
Chuan-Yen Chiang
,
Yo-Ping Huang
,
Shyan-Ming Yuan
Papers
Development of the Smart Toilet Equipment with Measurements of Physiological Parameters
Full-text access may be available. Sign in or learn about subscription options.
pp. 9-16
by
Ji-Jer Huang
,
Sheng-I Yu
,
Hao-Yi Syu
Papers
Accelerating Computation of DCM for ERP with GPU-Based Parallel Strategy
Full-text access may be available. Sign in or learn about subscription options.
pp. 679-684
by
Wei-Jen Wang
,
I-Fan Hsieh
,
Chun-Chuan Chen
Papers
An Overlap Aware Technique for Redundant Reader Elimination
Full-text access may be available. Sign in or learn about subscription options.
pp. 357-360
by
Ching-Hsien Hsu
,
Chia-Hao Yu
,
Chun-Yao Chung
,
Chao-Tung Yang
,
Chih-Hsun Chou
Papers
Assessing the Relationships between IS Success with Intellectual Capital for International Medical Services Centers in Taiwan -- The Perspective of Physicians
Full-text access may be available. Sign in or learn about subscription options.
pp. 693-698
by
Hsien-Cheng Lin
,
Chen-Chia Chen
,
Echo Huang
,
Ya-Hui Yang
,
Cheng-Yuan Chiu
Papers
Knowledge Transfer in Activity Recognition Using Sensor Profile
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-187
by
Yi-ting Chiang
,
Jane Yung-jen Hsu
Papers
Hydra: An Ubiquitous Application for Service Rerouting
Full-text access may be available. Sign in or learn about subscription options.
pp. 366-373
by
Lucas A. Almeida
,
Fabricio N. Buzeto
,
Ana H.O.R. Castillo
,
Carla D. Castanho
,
Ricardo P. Jacobi
Papers
Treatment of Missing Data in Intelligent Lighting Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Aravind Kota Gopalakrishna
,
Tanir Ozcelebi
,
Antonio Liotta
,
Johan J. Lukkien
Papers
Development of a Route Finding System for Manual Wheelchair Users Based on Actual Measurement Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-23
by
Yasuaki Sumida
,
Masaki Hayashi
,
Kazuaki Goshi
,
Katsuya Matsunaga
Papers
Data Gathering in a Hybrid Wireless Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-55
by
Hua-Wen Tsai
,
Tzung-Shi Chen
,
Bing-Hong Tsai
,
Cheng-Hao Chu
,
Jeng-Shian Tsai
Papers
3D Modeling and Simulation of Human Activities in Smart Spaces
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-119
by
A. Helal
,
K. Cho
,
W. Lee
,
Y. Sung
,
J.W. Lee
,
E. Kim
Papers
The Challenge of Preparational Behaviours in Preference Learning for Ubiquitous Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-239
by
Sarah Gallacher
,
Eliza Papadopoulou
,
Nick K. Taylor
,
M. Howard Williams
Papers
On Enhancing Adaptive Random Testing for AADL Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 455-461
by
Bo Sun
,
Yunwei Dong
,
Hong Ye
Showing 100 out of 183
Load More
Load All