Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
UMC
UMC 2008
Generate Citations
Ubiquitous Multimedia Computing, International Symposium on
Oct. 13 2008 to Oct. 15 2008
ISBN: 978-0-7695-3427-5
Table of Contents
Papers
[Publisher's information]
Freely available from IEEE.
pp. 270
Papers
Program Committee
Freely available from IEEE.
pp. xiii-xiv
Papers
Table of contents
Freely available from IEEE.
pp. v-viii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
RBTree: A New and Scalable P2P Model Based on Gossiping
Full-text access may be available. Sign in or learn about subscription options.
pp. 7-12
by
Zhiwei Gao
,
Zhimin Gu
,
Ping Luo
Papers
Title page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Message from General Chairs
Freely available from IEEE.
pp. ix
Papers
Message from Program Co-chairs
Freely available from IEEE.
pp. x
Papers
Message from the MUCASS 2008 Organizers
Freely available from IEEE.
pp. xi
Papers
Organizing Committee
Freely available from IEEE.
pp. xii
A Web Image Retrieval Re-ranking Scheme with Cross-Modal Association Rules
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-86
by
Yong Zhu
,
Naixue Xiong
,
Jong Hyuk Park
,
R. He
Papers
Optimal Matrix Computing Using Vector Division with Sub-word Parallel
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-6
by
Xin-biao Gan
,
Kui Dai
,
Li Shen
,
Zhi-ying Wang
Papers
P2P-Based Video Streaming Using Multi-peer Aggregation Technique
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-16
by
Zhang Wang
,
Jixian Zhang
,
Caifang Zhang
Papers
Security Model of Group Message Transfer Using a Trigger
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-22
by
Young-Soo Kim
,
Seok-Soo Kim
Papers
Separation of Concerns Security Model for Extension of Component Reuse
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-28
by
Young-Soo Kim
,
Sang-Ho Lee
Papers
Efficient Perfectly Periodic Scheduling for Data Broadcasting
Full-text access may be available. Sign in or learn about subscription options.
pp. 29-34
by
Wei-Mei Chen
,
Mu-Kai Huang
Papers
Efficient Modeling for Animating Human Face
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-38
by
Soo-Kyun Kim
,
Sung-Og An
,
Hoon-Tai Kim
,
Min Hong
Papers
Smart Fridges with Multimedia Capability for Better Nutrition and Health
Full-text access may be available. Sign in or learn about subscription options.
pp. 39-44
by
Suhuai Luo
,
Hongfeng Xia
,
Yuan Gao
,
Jesse S. Jin
,
Rukshan Athauda
Papers
GITA: New Architectures for Interactive Fruition of Historical and Artistic Contents on Wireless Multi-technology Platform
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-50
by
Pasquale Pace
,
Gianluca Aloi
,
Antonio Palmacci
Papers
Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 51-56
by
William Shaw
,
Yifeng He
,
Ivan Lee
Papers
Ubiquitous Computing in Prospect: A Bibliographic Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 57-62
by
Tsung Teng Chen
,
Maria Lee
Papers
Design of New OTP System Using Homomorphic Graph by Changed Location and Angle of Fingerprint Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-68
by
ByungRae Cha
,
HyungJong Kim
,
DongSeob Lee
Papers
Secure Mobile Content Delivery Architecture in Hybrid Network Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-72
by
Chih-Lin Hu
,
Chien-An Cho
,
Po-Jung Wang
Papers
From Knowledge Visualization Techniques to Trends in Ubiquitous Multimedia Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-78
by
Maria R. Lee
,
Tsung Teng Chen
Papers
A Time-Sensitive Path Selection Algorithm for Connectionless Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 79-82
by
P. Calduwel Newton
,
L. Arockiam
,
Tai-hoon Kim
Papers
Pattern Recognition from Segmented Images in Automated Inspection Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-92
by
Mira Park
,
Jesse S. Jin
,
Sherlock L. Au
,
Suhuai Luo
Papers
Feature Extraction for Classification from Images: A Look at the Retina
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-98
by
Foon Chi Francis Chui
,
Ivan Bindoff
,
Raymond Williams
,
Byeong Ho Kang
Papers
Smart Environment Authentication: Multi-domain Authentication, Authorization, Security Policy for Pervasive Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-104
by
Deok Gyu Lee
,
Geon Woo Kim
,
Jong Wook Han
,
Young-Sik Jeong
,
Doo-Soon Park
Papers
Analytical Model Medium Access Control Multiprotocol Architecture for Mobile Multimedia Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-111
by
A. Saravanan
,
B. Parthasarathy
Papers
From Centralized to Decentralized Video Streaming Using Multiple Descriptions Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-117
by
Ivan Lee
,
Yifeng He
,
Ling Guan
Papers
Research of a Channel Estimation Using the Receiving Gain in Smart Antenna System
Full-text access may be available. Sign in or learn about subscription options.
pp. 118-123
by
Sungsoo Ahn
,
Junghwan Ko
Papers
A Certificateless Authenticated Group Key Agreement Protocol Providing Forward Secrecy
Full-text access may be available. Sign in or learn about subscription options.
pp. 124-129
by
Eun-Jung Lee
,
Sang-Eon Lee
,
Kee-Young Yoo
Papers
A New LSB Based Digital Watermarking Scheme with Random Mapping Function
Full-text access may be available. Sign in or learn about subscription options.
pp. 130-134
by
Gil-Je Lee
,
Eun-Jun Yoon
,
Kee-Young Yoo
Papers
Histogram Based Corner Angle Representation for Object Retrieval
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-140
by
Nishat Ahmad
,
Yongseon Moon
,
Jongan Park
Papers
Mobile Network Service Using Ticket Issuance in the AAA System
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-144
by
Seo-Il Kang
,
Deok-Gyu Lee
,
Im-Yeong Lee
Papers
A Robotic Interface to a Medication Review Expert System
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-150
by
Claire D'Este
,
Daniel Reid
,
Byeong Ho Kang
Papers
Wireless Systems Integration through MAC
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-153
by
Jahangir Dadkhah Chimeh
,
Seyed Mohammadreza Hashemiannejad
Papers
Modeling Small-World Trust Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 154-159
by
Xianchen Guo
,
Xinyou Li
,
Yan Qin
,
Chen Chen
Papers
Service Assignment Problem: Exploiting Group Context Information in Service Discovery for Multi-user Multi-service Ubiquitous Computing Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-165
by
XuanTung Hoang
,
Dongman Lee
,
Younghee Lee
Papers
The Study on Designing Killer Service for U City
Full-text access may be available. Sign in or learn about subscription options.
pp. 166-170
by
Hangbae Chang
,
Hyuk-Jun Kwon
,
GyungJun Kim
,
Gu-Beom Jeong
,
GukBoh Kim
Papers
Application of Role-Based Access Control for Web Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 171-174
by
Rosslin John Robles
,
Min-Kyu Choi
,
Sang-Soo Yeo
,
Tai-hoon Kim
Papers
Robust and Secure Voice Transmission over Wireless Mobile Ad Hoc Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-180
by
Binod Vaidya
,
Jongan Park
,
SeungJo Han
Malware and Antivirus Deployment for Enterprise IT Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-255
by
Nadejda Belbus Vasilyevna
,
Sang-Soo Yeo
,
Eun-Suk Cho
,
Jeon-Ah Kim
Papers
Evaluation of Secure Multimedia Services over Wireless Access Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-184
by
Binod Vaidya
,
SangDuck Lee
,
Jongan Park
,
SeungJo Han
Papers
Video Trans-coding in Smart Camera for Ubiquitous Multimedia Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-189
by
Ekta Rai Chutani
,
Santanu Chaudhury
Papers
Why Google Cannot Beat Baidu in China Search Engine Market
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-194
by
Zhaoli Meng
,
Meiyun Zuo
,
Jina Fu
Papers
Hierarchical Policy Model for Managing Heterogeneous Security Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-199
by
Dong-Young Lee
,
Minsoo Kim
Papers
A Time Balanced Job Scheduling Using Divisibility Property for High Throughput Computing in Hybrid Peer-to-Peer Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 200-205
by
Yong-Hyuk Moon
,
Jae-Hoon Nah
,
Chan-Hyun Youn
Papers
Watermarked Data Hiding for Binary Images by Two Stage Referencing
Full-text access may be available. Sign in or learn about subscription options.
pp. 206-209
by
Ki-Hyun Jung
,
Geum Dal Park
,
Kee Young Yoo
Papers
Image Steganographic Method with Variable Embedding Length
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-213
by
Ki-Jong Kim
,
Ki-Hyun Jung
,
Kee-Young Yoo
Papers
Strategy for IT Security in E-enterprise Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-217
by
Rosslin John Robles
,
Young-Sik Jeong
,
Jong Hyuk Park
,
Tai-hoon Kim
Papers
SOX Act and IT Security Governance
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-221
by
Na-yun Kim
,
Rosslin John Robles
,
Sung-Eon Cho
,
Yang-Seon Lee
,
Tai-hoon Kim
Papers
Addressing Security Issues by Means of Intrusion Confinement
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-225
by
Rosslin John Robles
,
Tai-hoon Kim
Papers
Design and Implementation of Device with Alterable Functions for Ubiquitous Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 226-231
by
Shoji Sano
,
Tomoki Yoshihisa
,
Masahiko Tsukamoto
Papers
A Communication Framework Supporting Cross-Layer Design for Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-237
by
Byounghoon Kim
,
Sungwoo Tak
Papers
A Reconfigurable NoC Platform Incorporating Real-Time Task Management Technique for H/W-S/W Codesign of Network Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 238-243
by
Byounghoon Kim
,
Youngmann Kim
,
Donggeon Lee
,
Sungwoo Tak
Papers
Advanced Security Policy Implementation for Information Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 244-247
by
Sattarova Feruza Yusufovna
Papers
Security Design for E-business Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-251
by
Nadejda Belbus Vasilyevna
Papers
Integrating Intrusion Detection System and Data Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 256-259
by
Sattarova Feruza Yusufovna
Papers
An RBAC Design with Discretionary and Mandatory Features
Full-text access may be available. Sign in or learn about subscription options.
pp. 260-263
by
Nadejda Belbus Vasilyevna
Papers
Improved Data Hiding Method by Exploiting Modification Direction
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-266
by
Jin-Yong Byun
,
Ki-Hyun Jung
,
Kee-Young Yoo
Papers
Author Index
Freely available from IEEE.
pp. 267-268
Showing 63 out of 63