Default Cover Image

Ubiquitous Multimedia Computing, International Symposium on

Oct. 13 2008 to Oct. 15 2008

ISBN: 978-0-7695-3427-5

Table of Contents

Papers
[Publisher's information]Freely available from IEEE.pp. 270
Papers
Program CommitteeFreely available from IEEE.pp. xiii-xiv
Papers
Table of contentsFreely available from IEEE.pp. v-viii
[Copyright notice]Freely available from IEEE.pp. iv-iv
RBTree: A New and Scalable P2P Model Based on GossipingFull-text access may be available. Sign in or learn about subscription options.pp. 7-12
Papers
Title page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Message from General ChairsFreely available from IEEE.pp. ix
Papers
Message from Program Co-chairsFreely available from IEEE.pp. x
Papers
Message from the MUCASS 2008 OrganizersFreely available from IEEE.pp. xi
Papers
Organizing CommitteeFreely available from IEEE.pp. xii
A Web Image Retrieval Re-ranking Scheme with Cross-Modal Association RulesFull-text access may be available. Sign in or learn about subscription options.pp. 83-86
Papers
Optimal Matrix Computing Using Vector Division with Sub-word ParallelFull-text access may be available. Sign in or learn about subscription options.pp. 3-6
Papers
P2P-Based Video Streaming Using Multi-peer Aggregation TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 13-16
Papers
Security Model of Group Message Transfer Using a TriggerFull-text access may be available. Sign in or learn about subscription options.pp. 17-22
Papers
Separation of Concerns Security Model for Extension of Component ReuseFull-text access may be available. Sign in or learn about subscription options.pp. 23-28
Papers
Efficient Perfectly Periodic Scheduling for Data BroadcastingFull-text access may be available. Sign in or learn about subscription options.pp. 29-34
Papers
Efficient Modeling for Animating Human FaceFull-text access may be available. Sign in or learn about subscription options.pp. 35-38
Papers
Smart Fridges with Multimedia Capability for Better Nutrition and HealthFull-text access may be available. Sign in or learn about subscription options.pp. 39-44
Papers
Mobile Sink to Track Multiple Targets in Wireless Visual Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 51-56
Papers
Ubiquitous Computing in Prospect: A Bibliographic StudyFull-text access may be available. Sign in or learn about subscription options.pp. 57-62
Papers
Design of New OTP System Using Homomorphic Graph by Changed Location and Angle of Fingerprint FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 63-68
Papers
Secure Mobile Content Delivery Architecture in Hybrid Network EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 69-72
Papers
From Knowledge Visualization Techniques to Trends in Ubiquitous Multimedia ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 73-78
Papers
A Time-Sensitive Path Selection Algorithm for Connectionless NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 79-82
Papers
Pattern Recognition from Segmented Images in Automated Inspection SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 87-92
Papers
Feature Extraction for Classification from Images: A Look at the RetinaFull-text access may be available. Sign in or learn about subscription options.pp. 93-98
Papers
Analytical Model Medium Access Control Multiprotocol Architecture for Mobile Multimedia NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 105-111
Papers
From Centralized to Decentralized Video Streaming Using Multiple Descriptions CodingFull-text access may be available. Sign in or learn about subscription options.pp. 112-117
Papers
Research of a Channel Estimation Using the Receiving Gain in Smart Antenna SystemFull-text access may be available. Sign in or learn about subscription options.pp. 118-123
Papers
A Certificateless Authenticated Group Key Agreement Protocol Providing Forward SecrecyFull-text access may be available. Sign in or learn about subscription options.pp. 124-129
Papers
A New LSB Based Digital Watermarking Scheme with Random Mapping FunctionFull-text access may be available. Sign in or learn about subscription options.pp. 130-134
Papers
Histogram Based Corner Angle Representation for Object RetrievalFull-text access may be available. Sign in or learn about subscription options.pp. 135-140
Papers
Mobile Network Service Using Ticket Issuance in the AAA SystemFull-text access may be available. Sign in or learn about subscription options.pp. 141-144
Papers
A Robotic Interface to a Medication Review Expert SystemFull-text access may be available. Sign in or learn about subscription options.pp. 145-150
Papers
Wireless Systems Integration through MACFull-text access may be available. Sign in or learn about subscription options.pp. 151-153
Papers
Modeling Small-World Trust NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 154-159
Papers
The Study on Designing Killer Service for U CityFull-text access may be available. Sign in or learn about subscription options.pp. 166-170
Papers
Application of Role-Based Access Control for Web EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 171-174
Papers
Robust and Secure Voice Transmission over Wireless Mobile Ad Hoc NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 175-180
Malware and Antivirus Deployment for Enterprise IT SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 252-255
Papers
Evaluation of Secure Multimedia Services over Wireless Access NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 181-184
Papers
Video Trans-coding in Smart Camera for Ubiquitous Multimedia EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 185-189
Papers
Why Google Cannot Beat Baidu in China Search Engine MarketFull-text access may be available. Sign in or learn about subscription options.pp. 190-194
Papers
Hierarchical Policy Model for Managing Heterogeneous Security SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 195-199
Papers
Watermarked Data Hiding for Binary Images by Two Stage ReferencingFull-text access may be available. Sign in or learn about subscription options.pp. 206-209
Papers
Image Steganographic Method with Variable Embedding LengthFull-text access may be available. Sign in or learn about subscription options.pp. 210-213
Papers
Strategy for IT Security in E-enterprise EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 214-217
Papers
SOX Act and IT Security GovernanceFull-text access may be available. Sign in or learn about subscription options.pp. 218-221
Papers
Addressing Security Issues by Means of Intrusion ConfinementFull-text access may be available. Sign in or learn about subscription options.pp. 222-225
Papers
Design and Implementation of Device with Alterable Functions for Ubiquitous ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 226-231
Papers
A Communication Framework Supporting Cross-Layer Design for Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 232-237
Papers
Advanced Security Policy Implementation for Information SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 244-247
Papers
Security Design for E-business ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 248-251
Papers
Integrating Intrusion Detection System and Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 256-259
Papers
An RBAC Design with Discretionary and Mandatory FeaturesFull-text access may be available. Sign in or learn about subscription options.pp. 260-263
Papers
Improved Data Hiding Method by Exploiting Modification DirectionFull-text access may be available. Sign in or learn about subscription options.pp. 264-266
Papers
Author IndexFreely available from IEEE.pp. 267-268
Showing 63 out of 63