


default search action
12th CSE 2009: Vanoucer, BC, Canada - Volume 2
- Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009. IEEE Computer Society 2009, ISBN 978-1-4244-5334-4

The 7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2009)
Embedded Systems and HW/SW Codesign
- Sebastian Hessel, David Szczesny, Shadi Traboulsi, Attila Bilgic, Josef Hausner:

On the Design of a Suitable Hardware Platform for Protocol Stack Processing in LTE Terminals. 1-8 - Sheng-Wei Huang, Yung-Chang Chiu, Zhong-Ho Chen, Ce-Kuen Shieh, Alvin Wen-Yu Su, Tyng-Yeu Liang:

A Region-Based Allocation Approach for Page-Based Scratch-Pad Memory in Embedded Systems. 9-16 - Joseph Reddington, Gregory Z. Gutin, Adrian Johnstone, Elizabeth Scott, Anders Yeo:

Better Than Optimal: Fast Identification of Custom Instruction Candidates. 17-24
Multimedia and Data Management
- Xingang Liu, Wei Zhu, Kook-Yeol Yoo:

Fast Inter Mode Decision Algorithm Based on the MB Activity for MPEG-2 to H.264/AVC Transcoding. 25-30 - Yi-Chi Chen, Hui-Chin Yang, Chung-Ping Chung, Wei-Ting Wang:

Dynamic Reconfigurable Shaders with Load Balancing for Embedded Graphics Processing. 31-36 - Fei Hao, Zhenjiang Miao, Ping Guo, Zhan Xu

:
Real Time Multiple Object Tracking Using Tracking Matrix. 37-41 - Soad Ibrahim, Michael Wirth:

Visible and IR Data Fusion Technique Using the Contourlet Transform. 42-47
Power-Aware Computing
- Meikang Qiu, Laurence Tianruo Yang, Edwin Hsing-Mean Sha:

Rotation Scheduling and Voltage Assignment to Minimize Energy for SoC. 48-55 - Mu-Kai Huang, J. Morris Chang, Wei-Mei Chen:

Grouping-Based Dynamic Power Management for Multi-threaded Programs in Chip-Multiprocessors. 56-63 - Mahmood Ahmadi

, Stephan Wong:
K-Stage Pipelined Bloom Filter for Packet Classification. 64-70
Sensor Networks
- Alan Marchiori, Qi Han:

A Two-Stage Bootloader to Support Multi-application Deployment and Switching in Wireless Sensor Networks. 71-78 - Long Cheng, Canfeng Chen, Jian Ma, Lei Shu

, Hongyang Chen
, Laurence Tianruo Yang:
Residual Time Aware Forwarding for Randomly Duty-Cycled Wireless Sensor Networks. 79-86 - Ying Zhu, Qi Han:

The More Relay Nodes, the More Energy Efficient? 87-92 - Sudha Krishnamurthy, Geethapriya Thamilarasu, Christian Bauckhage

:
MALADY: A Machine Learning-Based Autonomous Decision-Making System for Sensor Networks. 93-100 - Hyun-Sung Park, Jong-Deok Kim:

Design of an RFID Air Protocol Filtering Technique. 101-108 - Marcin Brzozowski, Hendrik Salomon, Peter Langendörfer

:
Completely Distributed Low Duty Cycle Communication for Long-Living Sensor Networks. 109-116
Wireless Communications
- Naixue Xiong, Laurence Tianruo Yang, Yuanyuan Zeng, Chao Ma, Jong Hyuk Park:

Implementation of Rate Control in Distributed Wireless Multicast by Neural Network Prediction. 117-124 - Dineshbalu Balakrishnan, Amiya Nayak

, Pulak Dhar:
Adaptive and Intelligent Route Learning for Mobile Assets Using Geo-tracking and Context Profiles. 125-132 - Divya Sardana, Qing-An Zeng:

Control-Channel-Reuse-Based Multiple-Channel MAC (CRM-MAC) for Ad Hoc Networks. 133-139
Middleware and P2P
- Xinuo Chen, Stephen A. Jarvis

:
Analysing BitTorrent's Seeding Strategies. 140-149 - Xinfeng Ye, Yi Chen:

A Middleware for Controlling the Execution of Composite Services. 150-157 - Mayank Pandey

, Syed Mushtaq Ahmed, Banshi Dhar Chaudhary:
2T-DHT: A Two Tier DHT for Implementing Publish/Subscribe. 158-165 - Andrej van der Zee, Alexandre Courbot, Tatsuo Nakajima:

mBrace: Action-Based Performance Monitoring of Multi-tier Web Applications. 166-173
Embedded Software and Optimization I
- Jyh-Shian Wang, I-Wei Wu, Yu-Sheng Chen, Jean Jyh-Jiun Shann, Wei-Chung Hsu

:
Reducing Code Size by Graph Coloring Register Allocation and Assignment Algorithm for Mixed-Width ISA Processor. 174-181 - Takuya Azumi, Hiroaki Takada, Hiroshi Oyama:

Optimization of Component Connections for an Embedded Component System. 182-188 - Un-Keun Yoon, Han-joon Kim:

Improving Hybrid Flash-Disk Storage by Incorporating Sequential Pattern Mining into Fully-Associative Sector Translation. 189-196
Pervasive and Ubiquitous Computing I
- Rocco Aversa, Beniamino Di Martino

, Salvatore Venticinque
:
Distributed Agents Network for Ubiquitous Monitoring and Services Exploitation. 197-204 - Daqiang Zhang, Jiannong Cao

, Jingyu Zhou, Minyi Guo:
Extended Dempster-Shafer Theory in Context Reasoning for Ubiquitous Computing Environments. 205-212 - Tomomi Kawashima, Jianhua Ma, Runhe Huang, Bernady O. Apduhan:

GUPSS: A Gateway-Based Ubiquitous Platform for Smart Space. 213-220 - Jonathan Cazalas, Kien A. Hua:

Leveraging Computation Sharing and Parallel Processing in Location-Based Services. 221-228 - Shandan Zhou, Xingshe Zhou, Zhiwen Yu, Kaibo Wang, Haipeng Wang, Hongbo Ni:

A Recommendation Framework towards Personalized Services in Intelligent Museum. 229-236
Dependable, Autonomic, Secure Computing
- James J. Treinen, Ramakrishna Thurimella:

Finding the Needle: Suppression of False Alarms in Large Intrusion Detection Data Sets. 237-244 - André Luiz B. Rodrigues, Leila N. Bezerra, Alexandre Sztajnberg

, Orlando Loques:
Self-Adaptation of Fault Tolerance Requirements Using Contracts. 245-253 - Jesse Sathre, Alex Baumgarten, Joseph Zambreno:

Architectural Support for Automated Software Attack Detection, Recovery, and Prevention. 254-261
Real-Time and Cyber-Physical Systems
- Mike Holenderski, Reinder J. Bril

, Johan J. Lukkien:
Swift Mode Changes in Memory Constrained Real-Time Systems. 262-269 - Mingsong Lv

, Nan Guan
, Yi Zhang, Rui Chen, Qingxu Deng, Ge Yu, Wang Yi:
WCET Analysis of the mC/OS-II Real-Time Kernel. 270-276 - Khurram Jawed, John Morris, Tariq Khan, Georgy L. Gimel'farb:

Real Time Rectification for Stereo Correspondence. 277-284 - Luís Nogueira

, Luís Miguel Pinho
, Jorge Coelho
:
Coordinated Runtime Adaptations in Cooperative Open Real-Time Systems. 285-294 - Huthaifa Al-Omari, Francis G. Wolff, Christos A. Papachristou

, David R. McIntyre:
Avoiding Delay Jitter in Cyber-Physical Systems Using One Way Delay Variations Model. 295-302
Pervasive and Ubiquitous Computing II
- Roman Amstutz, Oliver Amft

, Brian French, Asim Smailagic, Daniel P. Siewiorek
, Gerhard Tröster:
Performance Analysis of an HMM-Based Gesture Recognition Using a Wristwatch Device. 303-309 - Hyun-Sung Park, Seung-Chur Yang, Doo-Hwan Oh, Jong-Deok Kim:

Design and Implementation of WLAN-Based Automatic Vehicle Identification. 310-317 - Runhe Huang, Jianhua Ma, Qun Jin:

A Tree-Structured Intelligence Entity Pool and Its Sharing among Ubiquitous Objects. 318-325 - Yunpu Zhu, Jacqueline E. Rice:

A Lightweight Architecture for Secure Two-Party Mobile Payment. 326-333
Embedded Software and Optimization II
- Je-Hyung Lee, Soo-Mook Moon, Hyung-Kyu Choi:

Comparison of Bank Change Mechanisms for Banked Reduced Encoding Architectures. 334-341 - Joel Koshy, Raju Pandey, Ingwar Wirjawan:

Optimizing Embedded Virtual Machines. 342-351 - Chung-Wen Huang, Kun-Yuan Hsieh, Jia-Jhe Li, Jenq Kuen Lee:

Support of Paged Register Files for Improving Context Switching on Embedded Processors. 352-357 - Yanqin Yang, Meng Wang, Zili Shao

, Minyi Guo:
Dynamic Scratch-Pad Memory Management with Data Pipelining for Embedded Systems. 358-365 - Fahime Moein-darbari, Ahmad Khademzadeh, Golnar Gharooni-fard

:
Evaluating the Performance of a Chaos Genetic Algorithm for Solving the Network on Chip Mapping Problem. 366-373 - Yu-Hsun Lin, Xuan-Yi Lin, Yeh-Ching Chung:

Reducing Leakage Power of JPEG Image on Asymmetric SRAM. 374-381
The 2009 IEEE/IFIP International Symposium on Embedded and Pervasive Systems (EPS 2009)
Real-Time Embedded Systems
- Hugo Marcondes, Rafael Luiz Cancian

, Marcelo Ricardo Stemmer
, Antônio Augusto Fröhlich
:
On the Design of Flexible Real-Time Schedulers for Embedded Systems. 382-387 - Maobing Dai, Yutaka Ishikawa:

Delayed Interrupt Processing Technique for Reducing Latency of Timer Interrupt in Embedded Linux. 388-393 - Mariusz Pelc

, Richard Anthony, Paul Ward, James Hawthorne:
Practical Implementation of a Middleware and Software Component Architecture Supporting Reconfigurability of Real-Time Embedded Systems. 394-401
Data Management and Multimedia
- Chung-Ping Chung, Hong-Wei Chen, Hui-Chin Yang:

Blocked-Z Test for Reducing Rasterization, Z Test and Shading Workloads. 402-407 - Chih-Chieh Hsiao, Chung-Ping Chung, Hui-Chin Yang:

A Hierarchical Primitive Lists Structure for Tile-Based Rendering. 408-413 - Hsiu-ching Hsieh, Chih-Chieh Hsiao, Hui-Chin Yang, Chung-Ping Chung, Jean Jyh-Jiun Shann:

Methods for Precise False-Overlap Detection in Tile-Based Rendering. 414-419 - Chung-Ping Chung, Tung-Lin Lu, Hui-Chin Yang:

H-Buffer: An Efficient History-Based and Overflow Sharing Transparent Fragment Storage Method. 420-425 - Feiyu Lin, Christopher Henricsson, Syed Muhammad Abbas, Kurt Sandkuhl

:
HyperCircle: An Efficient Broadcast Protocol for Super-Peer P2P Networks. 426-433
Wireless Communications
- Vineet Joshi, Xuefu Zhu, Qing-An Zeng:

Caching-Based Multipath Routing Protocol. 434-439 - Fang-Yie Leu, Yao-Tian Huang, Pei-Xun Leu:

A Coordinating Multiple Channel Assignment Scheme and AP Deployment in Wireless Networks. 440-445 - Hyun-Sung Park, Seung-Ho Han, Jong-Deok Kim:

Analysis of Vehicular Roaming through Multiple WLAN APs in Container Terminal. 446-451
Mobile Computing
- Antoniya Petkova, Kien A. Hua, Alexander J. Aved

:
Processing Approximate Moving Range Queries in Mobile Sensor Environments. 452-457 - Kurt Geihs

, Roland Reichle, Michael Wagner
, Mohammad Ullah Khan:
Service-Oriented Adaptation in Ubiquitous Computing Environments. 458-463 - Amine Dhraief

, Nicolas Montavont:
Rehoming Decision Algorithm: Design and Empirical Evaluation. 464-469 - Yanqin Yang, Minyi Guo, Feilong Tang, Gongwei Zhang:

Black Bridge: A Scatternet Formation Algorithm for Solving a New Emerging Problem. 470-475 - Shengrong Bu, Peter Xiaoping Liu:

Choosing Service Directory Nodes in Proposed Service Discovery Model for Mobile Ad Hoc Networks. 476-480 - Olapeju Latifat Ayoola, Eleni Mangina Phelan:

Accumulating a Personalised Ubiquitous Learning Platform for Enhancing the Third Level Educational Experience. 481-486
Reliability and Security
- Kunjan Patel, Jong Chern Lim, Chris J. Bleakley

, Wim Vanderbauwhede:
MAW: A Reliable Lightweight Multi-hop Wireless Sensor Network Routing Protocol. 487-493 - Ang Gao, Wei Wei, Zhixiao Wang, Wenyao Yan:

A Hierarchical Authentication Scheme for the Different Radio Ranges Sensor Networks. 494-501 - Lonnie Langle, Ram Dantu:

Are You a Safe Driver? 502-507
Optimization and HW/SW Codesigns
- Joon-Young Paik, Eun-Sun Cho

, Tae-Sun Chung:
Performance Improvement for Flash Memories Using Loop Optimization. 508-513 - Jih-Ching Chiu, Ta-Li Yeh, Mun-Kit Leong:

The Software and Hardware Integration Linker for Reconfigurable Embedded System. 520-525 - Gul N. Khan

, Anika Awwal:
Codesign of Embedded Systems with Process/Module Level Real-Time Deadlines. 526-531 - Chris Wynnyk, Malik Magdon-Ismail:

Pricing the American Option Using Reconfigurable Hardware. 532-536
Power/Energy-Aware Computing
- Roy Chaoming Hsu, Cheng-Ting Liu, Kuan-Chieh Wang, Wei-Ming Lee:

QoS-Aware Power Management for Energy Harvesting Wireless Sensor Network Utilizing Reinforcement Learning. 537-542 - Kenji R. Yamamoto, Paul G. Flikkema:

Prospector: Multiscale Energy Measurement of Networked Embedded Systems with Wideband Power Signals. 543-549 - Ehssan Sakhaee, Naoki Wakamiya, Masayuki Murata

:
Self-Organized Data-Energy-Aware Clustering and Routing for Wireless Sensor Networks. 550-557 - Rabindra Bista

, Yong-Ki Kim
, Young-Ho Choi, Jae-Woo Chang:
A New Energy-Balanced Data Aggregation Scheme in Wireless Sensor Networks. 558-563
Sensor Networks
- Tzung-Shi Chen, Hua-Wen Tsai, Chih-Wei Wei:

Dispatch of Mobile Resources in Wireless Sensor Networks. 564-569 - Abdulaziz Barnawi, Roshdy H. M. Hafez:

A Time & Energy Efficient Topology Discovery and Scheduling Protocol for Wireless Sensor Networks. 570-578 - Hyuntae Cho, Jeonsu Jung, Bongrae Cho, Youngwoo Jin, Seungwoo Lee, Yunju Baek:

Precision Time Synchronization Using IEEE 1588 for Wireless Sensor Networks. 579-586 - Stefano Abbate, Marco Avvenuti

, Paolo Corsini, Alessio Vecchio:
Localization of Shipping Containers in Ports and Terminals Using Wireless Sensor Networks. 587-592 - Shahram Nourizadeh, Yeqiong Song, Jean-Pierre Thomesse:

A Failure Adapted, Load-Balanced Distributed Routing for Wireless Ad Hoc Sensor Networks. 593-596 - Chung-Horng Lung, Oliver W. W. Yang:

Evaluation of an Adaptive PI Rate Controller for Congestion Control in Wireless Ad-Hoc/Sensor Networks. 597-602
The 4th International Symposium on Cloud and Convergence Computing (2CCom 2009)
- Chang-Wu Lee, Sung-Won Kim, Heon-Jong Lee, Youn-Hee Han, Doo-Soon Park, Young-Sik Jeong:

Visualization of the Constrained Coverage of Mobile Sensor Networks Based on GML. 603-608 - HwaMin Lee

, Doo-Soon Park, Min Hong, Sang-Soo Yeo
, SooKyun Kim
, SungHoon Kim:
A Resource Management System for Fault Tolerance in Grid Computing. 609-614 - Jin-Woo Kim, Kyeong Hur, Kwang-il Hwang, Doo Seop Eom:

A Distributed Reservation Protocol for Collision-Free Three-Hop Mobility Support in WiMedia MAC. 615-620 - Kwang-il Hwang, Sang-Soo Yeo

, Jong Hyuk Park:
Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers. 621-626 - Seungku Kim, Jae-Ho Lee, Kwang-il Hwang, Kyeong Hur, Doo Seop Eom:

Reprogrammable Module-Linker for Energy-Efficient Wireless Sensor Networks. 627-632 - Eun-Jun Yoon, Kee-Young Yoo:

Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC. 633-640
The 2009 International Symposium on Trusted Computing and Communications (TrustCom 2009)
Trust Model, Propagation, and Management
- Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:

Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks. 641-650 - Lan Wang, Qishi Wu, Yaoqing Liu:

Design and Validation of PATRICIA for the Mitigation of Network Flooding Attacks. 651-658 - Marek Klonowski, Michal Przykucki

, Tomasz Struminski:
Data Deletion with Time-Aware Adversary Model. 659-664 - Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka:

Obfuscation Mechanism in Conjunction with Tamper-Proof Module. 665-670 - Aimin Yu, Dengguo Feng, Ren Liu:

TBDRM: A TPM-Based Secure DRM Architecture. 671-677 - Chao Chen, Ke Wang, Shuren Liao, Qiuyan Zhang, Yiqi Dai:

A Novel Server-Based Application Execution Architecture. 678-683 - Latifa Boursas, Wolfgang Hommel:

Multidimensional Dynamic Trust Management for Federated Services. 684-689
Trusted Services and Applications
- Anderson Nunes Paiva Morais, Eliane Martins, Ana R. Cavalli, Willy Jimenez:

Security Protocol Testing Using Attack Trees. 690-697 - Maoxiang Yi, Huaguo Liang, Kaihua Zhan, Cuiyun Jiang:

Optimal LFSR-Coding Test Data Compression Based on Test Cube Dividing. 698-702 - Hui Hou, Jinzhao Wu:

Quasi-classical Semantics and Tableau Calculus of Description Logics for Paraconsistent Reasoning in the Semantic Web. 703-708 - Salman Abdul Moiz

, Lakshmi Rajamani:
Concurrency Control Strategy to Reduce Frequent Rollbacks in Mobile Environments. 709-714
Cryptography and Security Protocols
- Qin Liu, Guojun Wang, Jie Wu:

An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing. 715-720 - Rongwei Yu, Lina Wang, Xiaoyan Ma, Bo Kuang:

A Direct Anonymous Attestation Protocol Based on Hierarchical Group Signature. 721-726 - Zhenyu Wang, Jianhua Huang, Yu Wang, Xiangdong Li, Xuetao Sun, Ruimin Wang:

A Multi-party Contract Signing Protocol and Its Implementation via Trusted Computing. 727-731 - Yu Qin, Dengguo Feng, Zhen Xu:

An Anonymous Property-Based Attestation Protocol from Bilinear Maps. 732-738 - Abdullah Sharaf Alghamdi, Hanif Ullah

, Maqsood Mahmud
, Muhammad Khurram Khan
:
Bio-chaotic Stream Cipher-Based Iris Image Encryption. 739-744
Reliability, Survivability, and Fault Tolerance
- Asmaa Adnane

, Christophe Bidan, Rafael Timóteo de Sousa Júnior
:
Trust-Based Countermeasures for Securing OLSR Protocol. 745-752 - Adrian P. Lauf

, William H. Robinson
:
Fault Tolerance in MANETs Using a Task-to-Resource Reallocation Framework. 753-758 - Wanfu Ding, Ruifeng Guo

:
An Effective RM-Based Scheduling Algorithm for Fault-Tolerant Real-Time Systems. 759-764 - Gang Yin, Dian-xi Shi, Huaimin Wang, Min Guo:

RepCom: Towards Reputation Composition over Peer-to-Peer Communities. 765-771 - Zhiqian Xu, Hai Jiang:

HASS: Highly Available, Scalable and Secure Distributed Data Storage Systems. 772-780 - Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph

:
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs. 781-786
Access Control and Authentication
- Fei Richard Yu

, Helen Tang, Fei Wang, Victor C. M. Leung
:
Distributed Node Selection for Threshold Key Management with Intrusion Detection in Mobile Ad Hoc Networks. 787-794 - Chenjia Wang, Kevin P. Monaghan, Weisong Shi:

HACK: A Health-Based Access Control Mechanism for Dynamic Enterprise Environments. 795-801 - Mohamed Ali Ayachi, Christophe Bidan, Tarek Abbes, Adel Bouhoula

:
Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol. 802-808 - Wenchao Huang, Yan Xiong, Depin Chen:

DAAODV: A Secure Ad Hoc Routing Protocol Based on Direct Anonymous Attestation. 809-816 - Honglei Gao, Guolong Chen, Wenzhong Guo:

A GEP-Based Anomaly Detection Scheme in Wireless Sensor Networks. 817-822 - Hao Hu, Hao Li, Dengguo Feng:

L-UCON: Towards Layered Access Control with UCON. 823-829
Trusted Computing Platform and Software
- Eugen Leontie, Gedare Bloom, Bhagirath Narahari, Rahul Simha, Joseph Zambreno:

Hardware Containers for Software Components: A Trusted Platform for COTS-Based Systems. 830-836 - Sarosh Hashmi, John Brooke:

A Software Based Approach for Trusted Agent Execution on Malicious Host. 837-846 - Céline Thuillet, Philippe Andouard, Olivier Ly:

A Smart Card Power Analysis Simulator. 847-852 - Chang-Ai Sun, Baobao Zhang, Jin Li:

TSGen: A UML Activity Diagram-Based Test Scenario Generation Tool. 853-858 - Wen-Fu Kao, Shyhtsun Felix Wu:

Lightweight Hardware Return Address and Stack Frame Tracking to Prevent Function Return Address Attack. 859-866 - Jinwei Hu, Ruixuan Li, Zhengding Lu:

RBAC-Based Secure Interoperation Using Constraint Logic Programming. 867-872
The 2nd International Workshop on Adaptation in Wireless Sensor Networks (AWSN 2009)
- Sushmita Ruj, Jennifer Seberry, Bimal K. Roy:

Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks. 873-878 - Antonio J. Jara, Miguel A. Zamora, Antonio Fernandez Gómez-Skarmeta:

HWSN6: Hospital Wireless Sensor Networks Based on 6LoWPAN Technology: Mobility and Fault Tolerance Management. 879-884 - Antonio G. Ruzzelli, Conor Muldoon, Anthony Schoofs, Tiziana Campana, Gregory M. P. O'Hare

, Richard Tynan:
Autonomous Management and Control of Sensor Network-Based Applications. 885-890 - Richard Tynan, Anthony Schoofs, Conor Muldoon, Gregory M. P. O'Hare

, Ciarán Ó Conaire, Philip Kelly, Noel E. O'Connor
:
Intelligent Middleware for Adaptive Sensing of Tennis Coaching Sessions. 891-896 - Chung-Hsien Kuo, Jia-Wun Siao:

Petri Net Based Reconfigurable Wireless Sensor Networks for Intelligent Monitoring Systems. 897-902
The 2009 International Workshop on Reconfigurable and Multicore Embedded Systems (WoRMES 2009)
- Pil Woo Chun, Lev Kirischian:

Architecture Synthesis Methodology for Run-Time Reconfigurable Systems. 903-908 - Victor Dumitriu, Dennis Marcantonio, Lev Kirischian:

Run-Time Component Relocation in Partially-Reconfigurable FPGAs. 909-914 - Amit Pande, Joseph Zambreno:

Efficient Translation of Algorithmic Kernels on Large-Scale Multi-cores. 915-920 - Chun-Hsien Lu, Hsiao-Win Liao, Pao-Ann Hsiung

:
Multi-objective Placement of Reconfigurable Hardware Tasks in Real-Time System. 921-925 - Marco D. Santambrogio

:
From Reconfigurable Architectures to Self-Adaptive Autonomic Systems. 926-931
The First International Workshop on Pervasive Multimedia Sensor Networks (PMSN 2009)
- Min Li, Naixue Xiong, Chao Ma

:
A Fast H.264 Spatial Downscaling Transcoder for Wireless Communication. 932-936 - Heng Chen, Depei Qian, Weiguo Wu, Weiwei Fang:

Link-Aware Geographic Routing in Wireless Sensor Networks. 937-942 - Moufida Maimour

, CongDuc Pham, Doan B. Hoang:
A Congestion Control Framework for Handling Video Surveillance Traffics on WSN. 943-948 - Bing Jiang, Wei Zhang, Pan Zhang:

Research on an Improved Genetic Algorithm Which Can Improve the Node Positioning Optimized Solution of Wireless Sensor Networks. 949-954 - Lin Xiang

, Xiaohu Ge
, Ke Zhang, Chuang Liu:
A Self-Similarity Frame Traffic Model Based on the Frame Components in 802.11 Networks. 955-960 - Lei Shu

, Manfred Hauswirth, Lei Wang, Yan Zhang, Jong Hyuk Park:
Cross-Layer Optimized Data Gathering in Wireless Multimedia Sensor Networks. 961-966 - Qinghua Zou, Li Chen, Naixue Xiong, Shengzhong Zou, Chuanbing Wang:

Prediction and Key Computer Programming of Mechanical Properties of Hot Rolled Plate Based on BP Neural Network. 967-971
The 3rd International Workshop on Ubiquitous UnderWater Sensor Networks (UUWSN 2009)
- Seung-Joo Lee, Jung-Il Namgung, Soo-Hyun Park:

Efficient UDD Architecture for Underwater Wireless Acoustic Sensor Network. 972-977 - Tae-Hee Won, Jun-Ho Jeon, Sung-Joon Park:

An Underwater Communication Modem Using TMS320C6416 DSK. 978-981 - Nam-Yeol Yun

, Hui-Jin Cho, Soo-Hyun Park:
Neighbor Nodes Aware MAC Scheduling Scheme in Underwater Acoustic Sensor Networks. 982-987 - Jeong-Woo Han, Se-Young Kim, Ki-Man Kim, Seung-Yong Chun, Kwon Son:

Design of OFDM System for High Speed Underwater Communication. 988-992
The 2009 International Workshop on Ubiquitous Network Computing (UNC 2009)
Ubiquitous Network Systems
- Yan Niu, Lala Li:

An Improved Chinese Segmentation Algorithm Based on New Dictionary Construction. 993-996 - Yong Su:

Network Bandwidth Allocation Based on QoS in iSCSI OSD Storage System. 997-1001 - Jing Liang, Yinqin Wu:

Wireless ECG Monitoring System Based on OMAP. 1002-1006
Network Algorithms
- Zimian Hao, Xiong Wei, Naixue Xiong, Yuhan He:

Routing in 802.11-Based Wireless Mesh Networks. 1007-1012 - Xubing Zhang, Yong Zhu, Jianhong Fu:

An Improved SPECK Algorithm with Bit Plane Lifting and the Optimal Single Value Prediction. 1013-1018 - Xiong Wei, Xianbin Xu, Naixue Xiong, Ruhan He:

A Research on the Self-Applicable Network Virtual Storage Data Distribution Arithmetic. 1019-1023
Ubiquitous Multimedia Computing
- Ruhan He, Yong Zhu, Naixue Xiong, Wei Zhan, Yanjun Zhao:

Mobile Agent-Based Data Gathering for Web Image Retrieval. 1024-1029 - Yean Yin, WenBing Lu, Ke Zhang:

A Videoconference System on the Campus Networks Based on H.323 Protocol. 1030-1033 - Yong Zhu, Ruhan He, Naixue Xiong, Pu Shi, Zhiguang Zhang:

Edge Detection Based on Fast Adaptive Mean Shift Algorithm. 1034-1039
Ubiquitous Applications
- Weiguang Kong, Yong Zhu, Yuan Wang:

Implementation of Unlimited Integer. 1040-1043 - H. X. Yang, F. M. Chen:

Ride Comfort Simulation Based on the Vibration Characteristics of the Two-Mass System of Vehicle Body and Wheels. 1044-1049 - Xiaoqin Du, Qinghua Li, Jianjun Han:

An Analysis and Hierarchical Decomposition for HAMs. 1050-1054 - Qinghua Zou, Li Chen, Naixue Xiong, Shengzhong Zou, Chuanbing Wang:

Computer Calculation and Plotting on Dynamical Phase Diagrams of Carbon Steel. 1055-1064 - Naixue Xiong, Yan Yang, Ming Cao, Jing He, Lei Shu

:
A Survey on Fault-Tolerance in Distributed Network Systems. 1065-1070
The 2009 International Workshop on Ubiquitous Computing, Management, and Embedded Applications in Healthcare (UbiHealth 2009)
- Ning Yu, Kyu Hong Cho, Qiang Cheng, Rafael A. Tesorero:

A Hybrid Computational Approach for the Prediction of Small Non-coding RNAs from Genome Sequences. 1071-1076 - Hongbo Zhou, Hong-Ju Yang, Haiyun Xu, Qiang Cheng:

A New Computational Tool for the Post Session Analysis of the Prepulse Inhibition Test in Neural Science. 1077-1080 - Huyu Qu, Jie Cheng, Qiang Cheng

, Le Yi Wang:
WiFi-Based Telemedicine System: Signal Accuracy and Security. 1081-1085 - Hongbo Zhou, Qiang Cheng, Mehdi R. Zargham:

Fast Fusion of Medical Images Based on Bayesian Risk Minimization and Pixon Map. 1086-1091 - André Luiz B. Rodrigues, Izabela C. Gomes, Leila N. Bezerra, Alexandre Sztajnberg

, Sérgio T. Carvalho
, Alessandro Copetti, Orlando Loques:
Using Discovery and Monitoring Services to Support Context-Aware Remote Assisted Living Applications. 1092-1097

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














