Embedded and Ubiquitous Computing – EUC 2005 Workshops: EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the EUC 2005 workshops held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2005, in Nagasaki, Japan in December 2005.

The 132 revised full papers presented were carefully reviewed and selected from 352 submissions. Topics covered by the five workshops are ubiquitous intelligence and smart worlds (UISW 2005), network-centric ubiquitous systems (NCUS 2005), security in ubiquitous computing systems (SecUbiq 2005), RFID and ubiquitous sensor networks (USN 2005), and trusted and autonomic ubiquitous and embedded systems (TAUES 2005).

Author(s): Naoharu Yamada, Kenji Sakamoto, Goro Kunito, Kenichi Yamazaki, Satoshi Tanaka (auth.), Tomoya Enokido, Lu Yan, Bin Xiao, Daeyoung Kim, Yuanshun Dai, Laurence T. Yang (eds.)
Series: Lecture Notes in Computer Science 3823 : Information Systems and Applications, incl. Internet/Web, and HCI
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2005

Language: English
Pages: 1317
Tags: Computer Communication Networks; Special Purpose and Application-Based Systems; Information Systems Applications (incl.Internet); Data Encryption; User Interfaces and Human Computer Interaction; Computers and Society

Front Matter....Pages -
Human Activity Recognition Based on Surrounding Things....Pages 1-10
Baton: A Service Management System for Coordinating Smart Things in Smart Spaces....Pages 11-20
An Extensible Ubiquitous Architecture for Networked Devices in Smart Living Environments....Pages 21-30
A World Model for Smart Spaces....Pages 31-40
Dealing with Emotional Factors in Agent Based Ubiquitous Group Decision....Pages 41-50
A Multi-agent Software Platform Accommodating Location-Awareness for Smart Space....Pages 51-60
Context-Aware Ubiquitous Data Mining Based Agent Model for Intersection Safety....Pages 61-70
Development of Knowledge-Filtering Agent Along with User Context in Ubiquitous Environment....Pages 71-80
Application-Driven Customization of an Embedded Java Virtual Machine....Pages 81-90
A Study on Fast JCVM with New Transaction Mechanism and Caching-Buffer Based on Java Card Objects with a High Locality....Pages 91-100
Intelligent Object Extraction Algorithm Based on Foreground/Background Classification....Pages 101-110
Thin Client Based User Terminal Architecture for Ubiquitous Computing Environment....Pages 111-120
An Application Development Environment for Rule-Based I/O Control Devices....Pages 121-130
A uWDL Handler for Context-Aware Workflow Services in Ubiquitous Computing Environments....Pages 131-140
SMMART, a Context-Aware Mobile Marketing Application: Experiences and Lessons....Pages 141-150
Ubiquitous Organizational Information Service Framework for Large Scale Intelligent Environments....Pages 151-160
TS-U: Temporal-Spatial Methodology for Application Checking of the Systems in the Ubiquitous Environment....Pages 161-170
Ubiquitous Learning on Pocket SCORM....Pages 171-179
An Application Based on Spatial-Relationship to Basketball Defensive Strategies....Pages 180-188
Intrinsically Motivated Intelligent Rooms....Pages 189-197
Multivariate Stream Data Reduction in Sensor Network Applications....Pages 198-207
Implementing a Graph Neuron Array for Pattern Recognition Within Unstructured Wireless Sensor Networks....Pages 208-217
Building Graphical Model Based System in Sensor Networks....Pages 218-227
Energy-Aware Broadcasting Method for Wireless Sensor Network....Pages 228-237
Anonymous Routing in Wireless Mobile Ad Hoc Networks to Prevent Location Disclosure Attacks....Pages 238-247
The Design and Implementation of a Location-Aware Service Bundle Manager in Smart Space Environments....Pages 248-257
A Context-Aware and Augmented Reality-Supported Service Framework in Ubiquitous Environments....Pages 258-267
A Smart Method of Cooperative Learning Including Distant Lectures and Its Experimental Evaluations....Pages 268-277
u-KoMIPS: A Medical Image Processing System in a Ubiquitous Environment....Pages 278-287
The Extended PARLAY X for an Adaptive Context-Aware Personalized Service in a Ubiquitous Computing Environment....Pages 288-297
A Context-Aware System for Smart Home Applications....Pages 298-305
Human Position/Height Detection Using Analog Type Pyroelectric Sensors....Pages 306-315
ENME: An ENriched MEdia Application Utilizing Context for Session Mobility; Technical and Human Issues....Pages 316-325
DartDataFlow: Semantic-Based Sensor Grid....Pages 326-334
Sentient Artefacts: Acquiring User’s Context Through Daily Objects....Pages 335-344
A Multi-dimensional Model for Task Representation and Allocation in Intelligent Environments....Pages 345-354
Norms Enforcement as a Coordination Strategy in Ubiquitous Environments....Pages 355-364
A Java-Based RFID Service Framework with Semantic Data Binding Between Real and Cyber Spaces....Pages 365-374
Kallima: A Tag-Reader Protocol for Privacy Enhanced RFID System....Pages 375-382
Selective Collision Based Medium Access Control Protocol for Proactive Protection of Privacy for RFID....Pages 383-392
Learning with Data Streams – An NNTree Based Approach....Pages 519-528
Generating Smart Robot Controllers Through Co-evolution....Pages 529-537
Integrated Multimedia Understanding for Ubiquitous Intelligence Based on Mental Image Directed Semantic Theory....Pages 538-546
iCane – A Partner for the Visually Impaired....Pages 393-402
A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World....Pages 480-489
The Design and Implementation of Secure Event Manager Using SPKI/SDSI Certificate....Pages 490-498
Object Reminder and Safety Alarm....Pages 499-508
Synchronization and Recovery in an Embedded Database System for Read-Only Transactions....Pages 509-518
ORAID: An Intelligent and Fault-Tolerant Object Storage Device....Pages 403-412
Architecture Based Approach to Adaptable Fault Tolerance in Distributed Object-Oriented Computing....Pages 413-422
Security Analysis of Michael: The IEEE 802.11i Message Integrity Code....Pages 423-432
A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability....Pages 433-442
Hyper-Interactive Video Browsing by a Remote Controller and Hand Gestures....Pages 547-555
Mobile Computing with MPEG-21....Pages 556-565
A Unified Context Model: Bringing Probabilistic Models to Context Ontology....Pages 566-575
Performance Analysis of IP Micro-mobility Protocols in Single and Simultaneous Movements Scenario....Pages 443-451
HMRP: Hierarchy-Based Multipath Routing Protocol for Wireless Sensor Networks....Pages 452-459
On Energy-Aware Dynamic Clustering for Hierarchical Sensor Networks....Pages 460-469
Neighbor Node Discovery Algorithm for Energy-Efficient Clustering in Ubiquitious Sensor Networks....Pages 470-479
A Component-Based Adaptive Model for Context-Awareness in Ubiquitous Computing....Pages 576-585
Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem....Pages 586-591
The Wrong Challenge of ‘Pervasive Computing’: The Paradigm of Sensor-Based Context-Awareness....Pages 592-601
An Abstract Model for Incentive-Enhanced Trust in P2P Networks....Pages 602-611
Construction of Credible Ubiquitous P2P Content Exchange Communities....Pages 612-621
Location-Based Routing Protocol for Energy Efficiency in Wireless Sensor Networks....Pages 622-631
Efficient Access of Remote Resources in Embedded Networked Computer Systems....Pages 632-641
Lightweight Ontology-Driven Representations in Pervasive Computing....Pages 642-651
Object Tracking Using Durative Events....Pages 652-662
Design of Integrated Routing System for Mobile Ad Hoc Networks Overlaying Peer-to-Peer Applications....Pages 663-672
A Design of Privacy Conscious RFID System Using Customizing Privacy Policy Based Access Control....Pages 673-682
Efficient Resource Management Scheme of TCP Buffer Tuned Parallel Stream to Optimize System Performance....Pages 683-692
Multi-level Service Differentiation Scheme for the IEEE 802.15.4 Sensor Networks....Pages 693-703
Development of Event Manager and Its Application in Jini Environment....Pages 704-713
On Scalability and Mobility Management of Hierarchical Large-Scale Ad Hoc Networks....Pages 714-723
Exploring Small-World-Like Topologies Via SplitProber: Turning Power Laws into an Advantage in Unstructured Overlays....Pages 724-733
Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 802.16 System....Pages 734-743
A Survey of Anonymous Peer-to-Peer File-Sharing....Pages 744-755
A Churn-Resistant Strategy for a Highly Reliable P2P System....Pages 756-765
Building a Peer-to-Peer Overlay for Efficient Routing and Low Maintenance....Pages 766-775
Dynamic Object Assignment in Object-Based Storage Devices....Pages 776-784
Dynamic Resource Discovery for Sensor Networks....Pages 785-796
Survey on Location Authentication Protocols and Spatial-Temporal Attestation Services....Pages 797-806
Predicate Detection Using Event Streams in Ubiquitous Environments....Pages 807-816
Image Watermarking Technique Based on Two-Dimensional Chaotic Stream Encryption....Pages 817-824
Identity-Based Universal Designated Verifier Signatures....Pages 825-834
Short Designated Verifier Proxy Signature from Pairings....Pages 835-844
An Embedded Gateway Based on Real-Time Database....Pages 845-853
Efficient Authentication Scheme for Routing in Mobile Ad Hoc Networks....Pages 854-863
Collision Attack on XTR and a Countermeasure with a Fixed Pattern....Pages 864-873
Security in Persistently Reactive Systems....Pages 874-883
ID-Based Access Control and Authority Delegations....Pages 884-893
How to Construct Secure Cryptographic Location-Based Services....Pages 894-904
A Key Management Scheme for Mobile Ad Hoc Networks Based on Threshold Cryptography for Providing Fast Authentication and Low Signaling Load....Pages 905-915
Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow....Pages 916-925
Authenticated Public Key Distribution Scheme Without Trusted Third Party....Pages 926-935
Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004....Pages 936-944
Efficient RFID Authentication Protocol for Ubiquitous Computing Environment....Pages 945-954
A New Simple Authenticated Key Agreement and Protected Password Change Protocol....Pages 955-964
A Method for Deciding Quantization Steps in QIM Watermarking Schemes....Pages 965-975
A New DDoS Detection Model Using Multiple SVMs and TRA....Pages 976-985
PPF Model with CTNT to Defend Web Server from DDoS Attack....Pages 986-995
Efficient Key Agreement for Merging Clusters in Ad-Hoc Networking Environments....Pages 996-1005
An Effective Method for Location Privacy in Ubiquitous Computing....Pages 1006-1015
Integrated Support for Location Aware Security Services in Enterprise Wireless Networks....Pages 1016-1024
Optimal Scheduling for Networks of RFID Readers....Pages 1025-1035
PULSE: A MAC Protocol for RFID Networks....Pages 1036-1046
RFIDcover – A Coverage Planning Tool for RFID Networks with Mobile Readers....Pages 1047-1057
Vibration Powered Battery-Assisted Passive RFID Tag....Pages 1058-1068
Wireless RFID Networks for Real-Time Customer Relationship Management....Pages 1069-1077
Tree-Based Classification Algorithm for Heterogeneous Unique Item ID Schemes....Pages 1078-1087
An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks....Pages 1088-1097
Energy-Driven Adaptive Clustering Hierarchy (EDACH) for Wireless Sensor Networks....Pages 1098-1107
A Load-Balancing and Energy-Aware Clustering Algorithm in Wireless Ad-Hoc Networks....Pages 1108-1117
Energy-Efficient Cluster Reconfiguration with Fair Cluster Formations in Sensor Networks....Pages 1118-1127
Virtual Sink Rotation: Low-Energy Scalable Routing Protocol for Ubiquitous Sensor Networks....Pages 1128-1137
FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions....Pages 1138-1147
Power-Aware Position Vector Routing for Wireless Sensor Networks....Pages 1148-1156
Multicast Routing with Minimum Energy Cost and Minimum Delay in Wireless Sensor Networks....Pages 1157-1168
Self Location Estimation Scheme Using ROA in Wireless Sensor Networks....Pages 1169-1177
Energy-Efficient Target Localization Based on a Prediction Model....Pages 1178-1190
Reducing Congestion in Real-Time Multi-party-tracking Sensor Network Applications....Pages 1191-1200
Variable-Radii Method Based on Probing Mechanism (VRPM): An Energy Conservation Method for Wireless Active Sensor Networks....Pages 1201-1210
Automata-Theoretic Performance Analysis Method of Soft Real-Time Systems....Pages 1211-1224
A Component-based Architecture for an Autonomic Middleware Enabling Mobile Access to Grid Infrastructure....Pages 1225-1234
Autonomic Agents for Survivable Security Systems....Pages 1235-1244
Towards Formal Specification and Generation of Autonomic Policies....Pages 1245-1254
Intrusion Detection with CUSUM for TCP-Based DDoS....Pages 1255-1264
A Digital Content Distribution Using a Group-key and Multi-layered Structure Based on Web....Pages 1265-1272
Access Policy Sheet for Access Control in Fine-Grained XML....Pages 1273-1282
Monitoring the Health Condition of a Ubiquitous System: Rejuvenation vs. Recovery....Pages 1283-1292
A Dependability Management Mechanism for Ubiquitous Computing Systems....Pages 1293-1302
Reassignment Scheme of an RFID Tag’s Key for Owner Transfer....Pages 1303-1312
Back Matter....Pages -