This book constitutes the refereed proceedings of the EUC 2006 workshops held in conjunction with the IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2006, in Seoul, Korea in August 2006.
The 102 revised full papers presented were carefully reviewed and selected from 375 submissions. Topics covered by the six workshops are network-centric ubiquitous systems (NCUS 2006), security in ubiquitous computing systems (SecUbiq 2006), RFID and ubiquitous sensor networks (USN 2006), trustworthiness, reliability and services in ubiquitous and sensor networks (TRUST 2006), embedded software optimization (ESO 2006), and multimedia solution and the assurance in the ubiquitous information systems (MSA 2006).
Author(s): Kensuke Tanaka, Noriko Matsumoto, Norihiko Yoshida (auth.), Xiaobo Zhou, Oleg Sokolsky, Lu Yan, Eun-Sun Jung, Zili Shao, Yi Mu, Dong Chun Lee, Dae Young Kim, Young-Sik Jeong, Cheng-Zhong Xu (eds.)
Series: Lecture Notes in Computer Science 4097 : Information Systems and Applications, incl. Internet/Web, and HCI
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006
Language: English
Pages: 1034
Tags: Computer Communication Networks; Special Purpose and Application-Based Systems; Information Systems Applications (incl.Internet); Data Encryption; User Interfaces and Human Computer Interaction; Computers and Society
Front Matter....Pages -
Adaptive Router Promotion in Ad-Hoc Networks....Pages 1-10
A Utility-Based Auction Cooperation Incentive Mechanism in Peer-to-Peer Networks....Pages 11-21
UbiqStor: Server and Proxy for Remote Storage of Mobile Devices....Pages 22-31
Packet Length Adaptation for Energy-Proportional Routing in Clustered Sensor Networks....Pages 32-42
A New Context Script Language for Developing Context-Aware Application Systems in Ubiquitous Computing....Pages 43-52
Dynamic Replication Strategies for Object Storage Systems....Pages 53-61
A Cost-Effective Mobility Modelling in Nested Network Mobility....Pages 62-71
Completing UML Model of Component-Based System with Middleware for Performance Evaluation....Pages 72-82
Energy Efficient PNC Selection Procedure for the IEEE 802.15.3-Based HR-WPAN....Pages 83-92
An Efficient Multicast Routing Protocol in Multi-rate Wireless Ad Hoc Networks....Pages 93-102
WPAN Platform Design in Handset Integrating Cellular Network and Its Application to Mobile Games....Pages 103-111
Reliable Transporting and Optimal Routing on Rate-Based for Ad Hoc Networks....Pages 112-121
Automatic Extraction of Conversation Protocols from a Choreography Specification of Ubiquitous Web Services....Pages 122-132
Inter-sector Interference Mitigation Method in Triple-Sectored OFDMA Systems....Pages 133-143
File Correspondences Dictionary Construction in Multilingual P2P File Sharing Systems....Pages 144-152
Lightweight Messages: True Zero-Copy Communication for Commodity Gigabit Ethernet....Pages 153-162
Evaluation of Models for Analyzing Unguided Search in Unstructured Networks....Pages 163-172
Wapee: A Fault-Tolerant Semantic Middleware in Ubiquitous Computing Environments....Pages 173-182
Security in P2P Networks: Survey and Research Directions....Pages 183-192
HYWINMARC: An Autonomic Management Architecture for Hybrid Wireless Networks....Pages 193-202
Prediction Efficiency in Predictive p -CSMA/CD....Pages 203-212
A Situation Aware Personalization in Ubiquitous Mobile Computing Environments....Pages 213-223
A Network and Data Link Layer QoS Model to Improve Traffic Performance....Pages 224-233
A GML-Based Mobile Device Trace Monitoring System....Pages 234-243
Impact of High-Mobility Radio Jamming in Large-Scale Wireless Sensor Networks....Pages 244-251
A Scalable and Untraceable Authentication Protocol for RFID....Pages 252-261
Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005....Pages 262-270
Reliable Broadcast Message Authentication in Wireless Sensor Networks....Pages 271-280
Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks....Pages 281-290
A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks....Pages 291-301
Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol....Pages 302-311
Ubiquitous Authorization Scheme Based on Device Profile....Pages 312-321
An Efficient Certificateless Signature Scheme....Pages 322-331
Universal Designated Verifier Ring Signature (Proof) Without Random Oracles....Pages 332-341
An Identity-Based Signcryption Scheme with Short Ciphertext from Pairings....Pages 342-351
A Strong Identity Based Key-Insulated Cryptosystem....Pages 352-361
A New Hierarchical ID-Based Cryptosystem and CCA-Secure PKE....Pages 362-371
Energy Comparison of AES and SHA-1 for Ubiquitous Computing....Pages 372-381
Performance Analysis of Tag Anti-collision Algorithms for RFID Systems....Pages 382-391
Perturbative Time and Frequency Allocations for RFID Reader Networks....Pages 392-402
An Enhanced Dynamic Framed Slotted ALOHA Anti-collision Algorithm....Pages 403-412
DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers....Pages 413-422
Design and Implementation of a High-Speed RFID Data Filtering Engine....Pages 423-434
Authorized Tracking and Tracing for RFID Tags....Pages 435-444
An Energy-Efficient MAC Protocol for Delay-Sensitive Wireless Sensor Networks....Pages 445-454
A Data-Centric Self-organization Scheme for Energy-Efficient Wireless Sensor Networks....Pages 455-464
Optimized Clustering for Maximal Lifetime of Wireless Sensor Networks....Pages 465-474
Maximize the Coverage Lifetime of Sensor Networks....Pages 475-484
An Active Tracking System Using IEEE 802.15.4-Based Ultrasonic Sensor Devices....Pages 485-494
LWOS: A Localization Method Without On-Body Sensor in Wireless Sensor Networks....Pages 495-504
Research Directions in the Area of USN (Ubiquitous Sensor Network) Towards Practical UE (Ubiquitous Environments)....Pages 505-510
On Building a Lightweight Security Architecture for Sensor Networks....Pages 511-521
A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks....Pages 522-531
Algorithms for Service Differentiation in MAC Layer over MANETs....Pages 532-539
A Power-Aware Routing Protocol Using Multi-Route Transmission for Mobile Ad Hoc Networks....Pages 540-549
A Novel Multicasting Scheme over Wireless LAN Systems by Using Relay....Pages 550-559
An Adaptive Concurrency Control QOS Agent for Ubiquitous Computing Environments....Pages 560-569
An Efficient End-to-End QoS Supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-Back for Ubiquitous and Distributed Applications....Pages 570-578
An RFID System Based MCLT System with Improved Privacy....Pages 579-590
QT-CBP: A New RFID Tag Anti-collision Algorithm Using Collision Bit Positioning....Pages 591-600
An RFID-Based Access and Location Service for Pervasive Grids....Pages 601-608
Autonomous Management of Large-Scale Ubiquitous Sensor Networks....Pages 609-618
A Privacy-Aware Service Protocol for Ubiquitous Computing Environments....Pages 619-628
A Neural Network Model for Detection Systems Based on Data Mining and False Errors....Pages 629-638
An Analysis on the Web Technologies for Dynamically Generating Web-Based User Interfaces in Ubiquitous Spaces....Pages 639-649
A Policy Description Language for Context-Based Access Control and Adaptation in Ubiquitous Environment....Pages 650-659
C-i UMS: Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous Home....Pages 660-670
A Lightweight IP Traceback Mechanism on IPv6....Pages 671-680
Enable a Trustworthy Network by Source Address Spoofing Prevention Routers: A Formal Description....Pages 681-691
A Flexible Bound Admission Control Algorithm for Vertical Handover in Ubiquitous Environment....Pages 692-701
Network Probabilistic Connectivity: Using Node Cuts....Pages 702-709
Fast Mounting and Recovery for NAND Flash Memory Based Embedded Systems....Pages 710-720
Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments....Pages 721-730
A Robust Verifiably Encrypted Signature Scheme....Pages 731-740
Instruction Re-selection for Iterative Modulo Scheduling on High Performance Multi-issue DSPs....Pages 741-754
Predictability of Least Laxity First Scheduling Algorithm on Multiprocessor Real-Time Systems....Pages 755-764
Saving Register-File Leakage Power by Monitoring Instruction Sequence in ROB....Pages 765-774
Run-Time Memory Optimization for DDMB Architecture Through a CCB Algorithm....Pages 775-784
Code Generation and Optimization for Java-to-C Compilers....Pages 785-794
Modelling and Analysis of Power Consumption for Component-Based Embedded Software....Pages 795-804
Design of a Programmable Vertex Processing Unit for Mobile Platforms....Pages 805-814
An Energy-Aware Whole-System Dynamic Emulator – SkyEye....Pages 815-824
Optimizing Scheduling Stability for Runtime Data Alignment....Pages 825-835
A Chinese Mobile Phone Input Method Based on the Dynamic and Self-study Language Model....Pages 836-847
An ID -Based Watermarking Scheme for Java Programs....Pages 848-857
Data-Layout Optimization Using Reuse Distance Distribution....Pages 858-867
Co-optimization of Performance and Power in a Superscalar Processor Design....Pages 868-878
FAST: An Efficient Flash Translation Layer for Flash Memory....Pages 879-887
A Novel Discrete Hopfield Neural Network Approach for Hardware-Software Partitioning of RTOS in the SoC....Pages 888-897
UML Based Evaluation of Reconfigurable Shape Adaptive DCT for Embedded Stream Processing....Pages 898-907
A High Performance Buffering of Java Objects for Java Card Systems with Flash Memory....Pages 908-918
Predictive Prefetching of Context-Aware Information in Mobile Networks....Pages 919-927
Digital Ortho-image Production for Web GIS Applications....Pages 928-935
Multimedia Contents Security by Wireless Authentication....Pages 936-945
Traffic Actuated Car Navigation Systems in Mobile Communication Networks....Pages 946-952
Analytic Model of the Collision Resolution Protocol with Voice/Data in Mobile Networks....Pages 953-961
Security Enhancement by Detecting Network Address Translation Based on Instant Messaging....Pages 962-971
A New Authentication Scheme of Binding Update Protocol on Handover in Mobile IPv6 Networks....Pages 972-978
A Solution for the Dropout Problem in Adaptive Cruise Control Range Sensors....Pages 979-987
An Architecture Framework for Measuring and Evaluating Packet-Switched Voice....Pages 988-997
HOIDS-Based Detection Method of Vicious Event in Large Networks....Pages 998-1005
New Handoff Control Method Using Fuzzy Multi-Criteria Decision Making in Micro/Pico-cellular Networks....Pages 1006-1011
Test of IR-DSRC in Measuring Vehicle Speed for ITS Applications....Pages 1012-1020
A Grid Routing Scheme Considering Node Lifetime in Ubiquitous Sensor Networks....Pages 1021-1030
Back Matter....Pages -