EUC Workshops 2006: Seoul, Korea
Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings
Xiaobo Zhou, Oleg Sokolsky, Lu Yan, Eun-Sun Jung, Zili Shao, Yi Mu, Dong Chun Lee, Daeyoung Kim, Young-Sik Jeong, Cheng-Zhong Xu
Springer, Lecture Notes in Computer Science 4097, ISBN: 3-540-36850-7
Contents
NCUS 2006 Symposium
Adaptive Router Promotion in Ad-Hoc Networks.
Kensuke Tanaka, Noriko Matsumoto, Norihiko Yoshida
1-10
A Utility-Based Auction Cooperation Incentive Mechanism in Peer-to-Peer Networks.
Jiujun Cheng, Yuhong Li, Weiwei Jiao, Jian Ma
11-21
UbiqStor: Server and Proxy for Remote Storage of Mobile Devices.
MinHwan Ok, Daegeun Kim, Myong-Soon Park
22-31
Packet Length Adaptation for Energy-Proportional Routing in Clustered Sensor Networks.
Chao-Lieh Chen, Chia-Yu Yu, Chien-Chung Su, Mong-Fong Horng, Yau-Hwang Kuo
32-42
Jae-Woo Chang, Yong-Ki Kim
43-52
Completing UML Model of Component-Based System with Middleware for Performance Evaluation.
Yong Zhang, Ningjiang Chen, Jun Wei, Tao Huang
72-82
Energy Efficient PNC Selection Procedure for the IEEE 802.15.3-Based HR-WPAN.
Eunchang Choi, Jae-Doo Huh, Soo-Joong Kim, WoongChul Choi
83-92
An Efficient Multicast Routing Protocol in Multi-rate Wireless Ad Hoc Networks.
Kyung-Jin Bae, Dong-Hee Kwon, Woo-Jae Kim, Young-Joo Suh
93-102
WPAN Platform Design in Handset Integrating Cellular Network and Its Application to Mobile Games.
In-Hwan Kim, Hoo-Jong Kim, Gu-Min Jeong
103-111
Reliable Transporting and Optimal Routing on Rate-Based for Ad Hoc Networks.
Ming-Hui Tsai, Tzu-Chiang Chiang, Yueh-Min Huang
112-121
Jonghun Park, Byung-Hyun Ha
122-132
Inter-sector Interference Mitigation Method in Triple-Sectored OFDMA Systems.
Jung-Ryun Lee, Keunyoung Kim, YongHoon Lim
133-143
File Correspondences Dictionary Construction in Multilingual P2P File Sharing Systems.
Hongding Wang, Shaohua Tan, Shiwei Tang, Dongqing Yang, Yunhai Tong
144-152
Lightweight Messages: True Zero-Copy Communication for Commodity Gigabit Ethernet.
Hai Jin, Minghu Zhang, Pengliu Tan
153-162
Evaluation of Models for Analyzing Unguided Search in Unstructured Networks.
Bin Wu, Ajay D. Kshemkalyani
163-172
Wapee: A Fault-Tolerant Semantic Middleware in Ubiquitous Computing Environments.
Yoonhee Kim, Eun-kyung Kim, Beom-Jun Jeon, In-Young Ko, Sung-Yong Park
173-182
Security in P2P Networks: Survey and Research Directions.
Esther Palomar, Juan M. Estévez-Tapiador, Julio César Hernández Castro, Arturo Ribagorda
183-192
HYWINMARC: An Autonomic Management Architecture for Hybrid Wireless Networks.
Shafique Ahmad Chaudhry, Ali Hammad Akbar, Ki-Hyung Kim, Suk-Kyo Hong, Won-Sik Yoon
193-202
A Situation Aware Personalization in Ubiquitous Mobile Computing Environments.
Heeseo Chae, Do-Hoon Kim, Dongwon Jeong, Hoh Peter In
213-223
A Network and Data Link Layer QoS Model to Improve Traffic Performance.
Jesús Arturo Pérez Díaz, Victor Hugo Zárate Silva, Christian Cabrera
224-233
A GML-Based Mobile Device Trace Monitoring System.
Eun-Ha Song, Sung-Kook Han, Laurence Tianruo Yang, Minyi Guo, Young-Sik Jeong
234-243
Impact of High-Mobility Radio Jamming in Large-Scale Wireless Sensor Networks.
Chulho Won, Jong-Hoon Youn, Hesham H. Ali
244-251
SecUbiq 2006 Workshop
A Scalable and Untraceable Authentication Protocol for RFID.
Youngjoon Seo, Hyunrok Lee, Kwangjo Kim
252-261
Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005.
Daesung Kwon, Daewan Han, Jooyoung Lee, Yongjin Yeom
262-270
Reliable Broadcast Message Authentication in Wireless Sensor Networks.
Taketsugu Yao, Shigeru Fukunaga, Toshihisa Nakai
271-280
Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks.
HongKi Lee, DaeHun Nyang, JooSeok Song
281-290
A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks.
Seog Chung Seo, Hyung Chan Kim, R. S. Ramakrishna
291-301
Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol.
Seonho Choi, Yanggon Kim
302-311
Universal Designated Verifier Ring Signature (Proof) Without Random Oracles.
Jin Li, Yanming Wang
332-341
An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings.
Huiyan Chen, Shuwang Lü, Zhenhua Liu, Qing Chen
342-351
A Strong Identity Based Key-Insulated Cryptosystem.
Jin Li 0002, Fangguo Zhang, Yanming Wang
352-361
A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE.
Jin Li 0002, Fangguo Zhang, Yanming Wang
362-371
USN 2006 Workshop
Performance Analysis of Tag Anti-collision Algorithms for RFID Systems.
Cheng-Hao Quan, Won-Kee Hong, Hiecheol Kim
382-391
Perturbative Time and Frequency Allocations for RFID Reader Networks.
Vinay Deolalikar, Malena R. Mesarina, John Recker, Salil Pradhan
392-402
An Enhanced Dynamic Framed Slotted ALOHA Anti-collision Algorithm.
Su-Ryun Lee, Chae-Woo Lee
403-412
DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers.
Kwang-il Hwang, Kyung Tae Kim, Doo Seop Eom
413-422
Design and Implementation of a High-Speed RFID Data Filtering Engine.
Hyunsung Park, Jongdeok Kim
423-434
Authorized Tracking and Tracing for RFID Tags.
Ming-Yang Chen, Ching-Nung Yang, Chi-Sung Laih
435-444
An Energy-Efficient MAC Protocol for Delay-Sensitive Wireless Sensor Networks.
Changsu Suh, Deepesh Man Shrestha, Young-Bae Ko
445-454
A Data-Centric Self-organization Scheme for Energy-Efficient Wireless Sensor Networks.
Sung-Hyup Lee, Young-Soo Choi, Hee-Dong Park, Yoon-Young An, You Ze Cho
455-464
Optimized Clustering for Maximal Lifetime of Wireless Sensor Networks.
Kyung Tae Kim, Hyunsoo Kim, Hee Yong Youn
465-474
Maximize the Coverage Lifetime of Sensor Networks.
Minh-Long Pham, Daeyoung Kim 0001, Taehong Kim, Seongeun Yoo
475-484
An Active Tracking System Using IEEE 802.15.4-Based Ultrasonic Sensor Devices.
Shinyoung Yi, Hojung Cha
485-494
LWOS: A Localization Method Without On-Body Sensor in Wireless Sensor Networks.
Shuangquan Wang, Ningjiang Chen, Xin Chen, Jie Yang 0002, Jun Lu
495-504
TRUST 2006 Workshop
Young Yong Kim
505-510
On Building a Lightweight Security Architecture for Sensor Networks.
Taejoon Park, Kang G. Shin
511-521
A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks.
Chonggun Kim, Elmurod Talipov, Byoungchul Ahn
522-531
Algorithms for Service Differentiation in MAC Layer over MANETs.
Kwan-Woong Kim, Sung-Hwan Bae, Dae-Ik Kim
532-539
A Power-Aware Routing Protocol Using Multi-Route Transmission for Mobile Ad Hoc Networks.
Kuang-Han Fei, Sheng-Yan Chuang, Sheng-De Wang
540-549
A Novel Multicasting Scheme over Wireless LAN Systems by Using Relay.
Kang Jin Yoon, Tae Sung Kim, Young Yong Kim
550-559
An Adaptive Concurrency Control QOS Agent for Ubiquitous Computing Environments.
Eung Nam Ko
560-569
Se Youn Ban, Seong Gon Choi, Jun Kyun Choi
570-578
An RFID System Based MCLT System with Improved Privacy.
Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won
579-590
QT-CBP: A New RFID Tag Anti-collision Algorithm Using Collision Bit Positioning.
Hyunji Lee, Jongdeok Kim
591-600
An RFID-Based Access and Location Service for Pervasive Grids.
Antonio Coronato, Gennaro Della Vecchia, Giuseppe De Pietro
601-608
Autonomous Management of Large-Scale Ubiquitous Sensor Networks.
Jong-Eon Lee, Si-Ho Cha, Dae-Young Kim 0002, Kuk-Hyun Cho
609-618
A Privacy-Aware Service Protocol for Ubiquitous Computing Environments.
Gunhee Lee, Song-hwa Chae, Inwhan Hwang, Manpyo Hong
619-628
A Neural Network Model for Detection Systems Based on Data Mining and False Errors.
Se-Yul Lee, Bong-Hwan Lee, Yeong-Deok Kim, Dong-Myung Shin, Chan-Hyun Youn
629-638
Ilsun You, Chel Park
639-649
Joonseon Ahn, Byeong-Mo Chang, Kyung-Goo Doh
650-659
C-iUMS: Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous Home.
Jong Hyuk Park, Sangjin Lee, Sung Hee Hong
660-670
A Lightweight IP Traceback Mechanism on IPv6.
Syed Obaid Amin, Myung Soo Kang, Choong Seon Hong
671-680
Enable a Trustworthy Network by Source Address Spoofing Prevention Routers: A Formal Description.
Jun Bi, Jianping Wu, Miao Zhang
681-691
A Flexible Bound Admission Control Algorithm for Vertical Handover in Ubiquitous Environment.
Jong Min Lee 0001, Ok Sik Yang, Seong Gon Choi, Jun Kyun Choi
692-701
Network Probabilistic Connectivity: Using Node Cuts.
Denis A. Migov, Olga K. Rodionova, Alexey S. Rodionov, Hyunseung Choo
702-709
Fast Mounting and Recovery for NAND Flash Memory Based Embedded Systems.
Song-Hwa Park, Tae-Hoon Kim, Tae-Hoon Lee, Ki-Dong Chung
710-720
Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments.
Deok-Gyu Lee, Jang-Su Park, Im-Yeong Lee
721-730
ESO 2006 Workshop
Instruction Re-selection for Iterative Modulo Scheduling on High Performance Multi-issue DSPs.
Doosan Cho, Ravi Ayyagari, Gang-Ryung Uh, Yunheung Paek
741-754
Predictability of Least Laxity First Scheduling Algorithm on Multiprocessor Real-Time Systems.
Sangchul Han, Minkyu Park
755-764
Saving Register-File Leakage Power by Monitoring Instruction Sequence in ROB.
Wann-Yun Shieh, Hsin-Dar Chen
765-774
Run-Time Memory Optimization for DDMB Architecture Through a CCB Algorithm.
Jeonghun Cho, Yunheung Paek
775-784
Code Generation and Optimization for Java-to-C Compilers.
Youngsun Han, Shinyoung Kim, Hokwon Kim, Seokjoong Hwang, Seon Wook Kim
785-794
Modelling and Analysis of Power Consumption for Component-Based Embedded Software.
Jun Hu, Xuandong Li, Guoliang Zheng, Chenghua Wang
795-804
Design of a Programmable Vertex Processing Unit for Mobile Platforms.
Tae-Young Kim, Kyoung-Su Oh
805-814
An Energy-Aware Whole-System Dynamic Emulator - SkyEye.
Cheng Yu, Kang Suo, Ren Jie, Zhu Hui, Shi Yuan Chun
815-824
Optimizing Scheduling Stability for Runtime Data Alignment.
Ching-Hsien Hsu, Chao-Yang Lan, Shih-Chang Chen
825-835
A Chinese Mobile Phone Input Method Based on the Dynamic and Self-study Language Model.
Qiaoming Zhu, Peifeng Li, Ping Gu, Peide Qian
836-847
An ID-Based Watermarking Scheme for Java Programs.
Zheng Yuan, Qiaoyan Wen, Wenling Wu, Qing Zhang
848-857
Co-optimization of Performance and Power in a Superscalar Processor Design.
Yongxin Zhu, Weng-Fai Wong, Stefan Andrei
868-878
FAST: An Efficient Flash Translation Layer for Flash Memory.
Sang-Won Lee, Won-Kyoung Choi, Dong-Joo Park
879-887
Bing Guo, Yan Shen, Yue Huang, Zhishu Li
888-897
UML Based Evaluation of Reconfigurable Shape Adaptive DCT for Embedded Stream Processing.
Xianhui He, Yongxin Zhu, Zhenxin Sun, Yuzhuo Fu
898-907
A High Performance Buffering of Java Objects for Java Card Systems with Flash Memory.
Min-Sik Jin, Min-Soo Jung
908-918
MSA 2006 Workshop
Predictive Prefetching of Context-Aware Information in Mobile Networks.
In Seon Choi, Gi Hwan Cho
919-927
Digital Ortho-image Production for Web GIS Applications.
Hong-Gyoo Sohn, Hyo-Keun Park, Choung-Hwan Park, Joon Heo
928-935
Multimedia Contents Security by Wireless Authentication.
Jung-Jae Kim, Kwang-Hyoung Lee, So Yeon Min, Jeong Gyu Jee
936-945
Traffic Actuated Car Navigation Systems in Mobile Communication Networks.
Seungjae Lee, Chungwon Lee, Taehee Kim, Jeong Hyun Kim
946-952
Analytic Model of the Collision Resolution Protocol with Voice/Data in Mobile Networks.
Dong Chun Lee
953-961
Security Enhancement by Detecting Network Address Translation Based on Instant Messaging.
Jun Bi, Miao Zhang, Lei Zhao
962-971
A New Authentication Scheme of Binding Update Protocol on Handover in Mobile IPv6 Networks.
Jung Doo Koo, Jungsook Koo, Dong Chun Lee
972-978
A Solution for the Dropout Problem in Adaptive Cruise Control Range Sensors.
Bongsoo Son, Taehyung Kim, YongEun Shin
979-987
An Architecture Framework for Measuring and Evaluating Packet-Switched Voice.
Hyuncheol Kim, Seong-Jin Ahn, Jun Kyun Choi
988-997
HOIDS-Based Detection Method of Vicious Event in Large Networks.
Dong Hwi Lee, Jeom Goo Kim, Kuinam J. Kim
998-1005
Jongchan Lee, Dong Li, Ki Hong Park, Hong-Jin Kim
1006-1011
Test of IR-DSRC in Measuring Vehicle Speed for ITS Applications.
Hyung Jin Kim, Jin-Tae Kim, Kee Yeon Hwang
1012-1020
A Grid Routing Scheme Considering Node Lifetime in Ubiquitous Sensor Networks.
Sangjoon Park, Sok-Pal Cho, Byunggi Kim
1021-1030