


default search action
21st AINA Workshops 2007: Niagara Falls, Canada
- 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 2, May 21-23, 2007, Niagara Falls, Canada. IEEE Computer Society 2007
PCAC 2007 Symposium on Pervasive Computing and Ad Hoc Communications
Session 1: Pervasive Systems, Computing and Communications I
- Gautham V. Pallapa, Sajal K. Das
:
Resource Discovery in Ubiquitous Health Care. 1-6 - Claudio Agostino Ardagna
, Marco Cremonini
, Ernesto Damiani
, Sabrina De Capitani di Vimercati
, Pierangela Samarati
:
Managing Privacy in LBAC Systems. 7-12 - Benoît Garbinato, Rachid Guerraoui
, Jarle Hulaas
, Maxime Monod, Jesper Honig Spring:
Pervasive Computing with Frugal Objects. 13-18
Session 2: Wireless Ad Hoc, Sensor and Mesh Networking I
- Claude Crépeau, Carlton R. Davis, Muthucumaru Maheswaran:
A Secure MANET Routing Protocol with Resilience against Byzantine Behaviours of Malicious or Selfish Nodes. 19-26 - Venkatesan Balakrishnan, Vijay Varadharajan
, Phillip Lucs, Udaya Kiran Tupakula:
Trust Enhanced Secure Mobile Ad-Hoc Network Routing. 27-33 - Rainer Baumann, Olga Bondareva, Simon Heimlicher, Martin May:
A Protocol for Macro Mobility and Multihoming Notification in Wireless Mesh Networks. 34-37
Session 3: Pervasive Systems, Computing and Communications II
- Adam Sharp, Stan Kurkovsky
:
VOICE: A Framework for Speech-Based Mobile Systems. 38-43 - Ramiro Liscano, Kaining Wang:
A Context-Based Delegation Access Control Model for Pervasive Computing. 44-51 - Tuan A. Nguyen
, Seng Wai Loke, Torab Torabi:
The Community Stack: Concept and Prototype. 52-58 - Jupyung Lee, Seung-Ho Lim, Jong-Woon Yoo, Ki-Woong Park, Hyun-Jin Choi, Kyu Ho Park:
A Ubiquitous Fashionable Computer with an i-Throw Device on a Location-Based Service Environment. 59-65
Session 4: Wireless Ad Hoc, Sensor and Mesh Networking II
- Nicola Bicocchi
, Marco Mamei
, Franco Zambonelli
:
Self-Organizing Spatial Regions for Sensor Network Infrastructures. 66-71 - Hairong Zhou, Chi-Hsiang Yeh, Hussein T. Mouftah:
Multi-channel Busy-tone Multiple Access for Scalable Wireless Mesh Network. 72-76 - Ilkka Uusitalo, Teemu Väisänen, Juhani Latvakoski:
Secure Real-Time Traffic in Hybrid Mobile Ad Hoc Networks. 77-84 - Dhammika Pathirana, Minseok Kwon:
RODMRP: Resilient On-Demand Multicast Routing Protocol. 85-92
Session 5: Pervasive Systems, Computing and Communications III
- Arne Munch-Ellingsen, Bjørn Thorstensen, Dan Peder Eriksen, Anders Andersen:
Building Pervasive Services Using Flock Sensor Network and Flock Container Middleware. 93-98 - Jun Liu, Jianxin Liao, Xiaomin Zhu:
A Password-Based Authentication and Key Establishment Scheme for Mobile Environment. 99-104 - Ki-Woong Park, Hyunchul Seok, Kyu Ho Park:
pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices. 105-112
Session 6: Wireless Ad Hoc, Sensor and Mesh Networking III
- Saad Ahmed Munir, Biao Ren, Weiwei Jiao, Bin Wang, Dongliang Xie, Jian Ma:
Mobile Wireless Sensor Network: Architecture and Enabling Technologies for Ubiquitous Computing. 113-120 - Miriam Di Ianni, Gianluca Rossi
:
Minimum Energy Range Assignment in Heterogeneous Ad-Hoc Networks. 121-126 - Guorui Li, Jingsha He, Yingfang Fu:
A Group-Based Dynamic Key Management Scheme in Wireless Sensor Networks. 127-132
Session 7: Pervasive Systems, Computing and Communications IV
- Romelia Plesa, Luigi Logrippo:
An Agent-Based Architecture for Context-Aware Communication. 133-138 - Harinder Seera, Seng Wai Loke, Torab Torabi:
Towards Device-Blending: Model and Challenges. 139-146 - Julián Grigera
, Andres Fortier, Gustavo Rossi
, Silvia E. Gordillo:
A Modular Architecture for Context Sensing. 147-152 - Huansheng Ning
, Yu Cong, Zhi-Qiang Xu, Tao Hong, Jingcheng Zhao, Yan Zhang:
Performance Evaluation of RFID Anti-Collision Algorithm with FPGA Implementation. 153-158
Session 8: Wireless Ad Hoc, Sensor and Mesh Networking IV
- Canfeng Chen, Jian Ma:
Simulation Study of AODV Performance over IEEE 802.15.4 MAC in WSN with Mobile Sinks. 159-164 - Kannan Govindan
, Shabbir N. Merchant, Uday B. Desai:
Cross Layer Routing for Multihop Cellular Networks. 165-170 - Zhong Xu, Guanzhong Dai, Deming Yang:
An Efficient Online/Offline Signcryption Scheme for MANET. 171-176 - Jian Jiang, Jian Ma:
An Optimal Node Selection Scheme in Multi-hop Wireless Network. 177-181
Session 9: Pervasive Systems, Computing and Communications V
- Anahita Vyas, Sheikh Iqbal Ahamed, Munirul M. Haque, Madhavi V. S. Jayanthi:
A Robust Lightweight Solution for RFID Security. 182-187 - Sherif G. Aly, Amal El-Nahas:
Profile-Based Sustained Service Lookup in Areas of Sudden Dense Population. 188-194 - Jinfeng Zhang, Jianwei Niu, Rui He, Jianping Hu, Limin Sun:
P2P-Leveraged Mobile Live Streaming. 195-200
Session 10: Wireless Ad Hoc, Sensor and Mesh Networking V
- Hung-Yuan Hsu, Ali R. Hurson
:
PEAN: A Probabilistic Energy Aware Neighbor Monitoring Protocol for Mobile Ad Hoc Networks. 201-206 - Mourad Elhadef, Fahim Abdun-Nur:
An Adaptable Crash Faults Detector for Mobile Ad-Hoc Networks. 207-212 - Zhendong Wu, Shanping Li:
A Parallel Multi-Path Routing Algorithm for Flexible Transmission in Wireless Sensor Networks. 213-218
Session 11: Pervasive Systems and Wireless Networks I
- Darrel A. Mazzari, Patrick Seraphine, Sheikh Iqbal Ahamed, Sreekanth G. Balasubramanian:
Design and Implementation of EPARK Wireless Parking Payment System Using Pervasive Computing. 219-224 - Daqing Xu, Hisao Kameda:
Friend Pointer Registration Strategy and Its Scheme for Mobile Location Management. 225-230 - Tae Ok Kim, Jin Soo Park, Bong Dae Choi:
Analytic Model of IEEE 802.15.4 with Download Traffic. 231-235 - Shuoi Wang, Hsing-Lung Chen:
TMBT: An Efficient Index Allocation Method for Multi-Channel Data Broadcast. 236-242
Session 12: Pervasive Systems and Wireless Networks II
- Yen-Wen Chen, I-Hsuan Peng, Shiu-Tsuen Guan:
Dynamic Bandwidth Management for Handoffs with RSVP in 802.16/WLAN Environment. 243-248 - M. T. Hyland, Barry E. Mullins, Rusty O. Baldwin, Michael A. Temple:
Simulation-Based Performance Evaluation of Mobile Ad Hoc Routing Protocols in a Swarm of Unmanned Aerial Vehicles. 249-256
UCI 2007 Symposium on Ubiquitous Computing and Intelligence
Session 1: Adaptive and Learning Systems
- Yue Sun, Guojun Mao, Xu Liu, Chunnian Liu:
Mining Concept Drifts from Data Streams Based on Multi-Classifiers. 257-263 - Xiaoyan Peng, Daniel L. Silver:
Interface Adaptation Based on User Expectation. 264-269 - Petteri Nurmi, Marja Hassinen, Kun Chang Lee:
A Comparative Analysis of Personalization Techniques for a Mobile Application. 270-275
Session 2: Context-Aware Computing
- Thomas Strang, Christian Bauer:
Context-Aware Elevator Scheduling. 276-281 - Ibrahim Bokharouss, Wayne Wobcke, Yiu-Wa Chan, Andrew Limaru, Anna Wong:
A Location-Aware Mobile Call Handling Assistant. 282-289 - Vincent Ricquebourg, David Durand
, David Menga, Bruno Marhic
, Laurent Delahoche, Christophe Logé, Anne-Marie Jolly-Desodt:
Context Inferring in the Smart Home: An SWRL Approach. 290-295
Session 3: Mobile Computing
- Anna K. Lekova
, Katrine Stemland Skjelsvik, Thomas Plagemann, Vera Goebel:
Fuzzy Logic-Based Event Notification in Sparse MANETs. 296-301 - Hyunggi Cho, Myungseok Kang, Jong Hyuk Park, Byungsung Park, Hagbae Kim:
Performance Analysis of Location Estimation Algorithm in ZigBee Networks Using Received Signal Strength. 302-306 - Michael S. Thompson, Scott F. Midkiff
:
Service Discovery Reliability and Network Neighbor Knowledge in Pervasive Computing Environments. 307-313 - Wei Shen, Qing-An Zeng:
Cost-Function-Based Network Selection Strategy in Integrated Wireless and Mobile Networks. 314-319
Session 4: Ubiquitous and Pervasive Computing I
- Ricardo Morla
, Nigel Davies:
Informing the Design of User Studies on Conceptual Interference Frameworks. 320-325 - Anthony Harrington, Vinny Cahill:
Domain Modelling for Ubiquitous Computing Applications. 326-333 - Sangheetha Salai Parthasarathy, Qing-An Zeng:
A Novel Adaptive Scheme to Improve the Performance of the IEEE 802.11n WLANs. 334-339 - Shinsuke Kobayashi, Ken Sakamura, Tatsushi Morokuma:
A Dynamic Retargettable Multi-Protocol RFID Reader/Writer. 340-346
Session 5: Novel Applications and Systems
- Xiaojie Chen, Yuanchun Shi, Wenfeng Jiang:
Speaker Tracking and Identifying Based on Indoor Localization System and Microphone Array. 347-352 - Dmitry Zaykovskiy, Alexander Schmitt:
Java (J2ME) Front-End for Distributed Speech Recognition. 353-357 - Yuechao Niu, Majid Baghaei Nejad
, Hannu Tenhunen, Li-Rong Zheng:
Design of a Digital Baseband Processor for UWB Transceiver on RFID Tag. 358-361
Session 6: Intelligent Environments
- Sara Grilli, Effie Makri, Konrad Steblovnik, Sofoklis Efremidis, Nikos Mouratidis, Petri Mähönen, Elena Meshkova:
Service Configuration Management for Ambient Intelligence: The COMANCHE Approach. 362-367 - Jin Nakazawa, Hideyuki Tokuda:
Phygital Map: Accessing Digital Multimedia from Physical Map. 368-373 - Jinhua Guo, Guangming Xing:
Using Mobile Agent-Based Middleware to Support Distributed Coordination for Vehicle Telematics. 374-379
Session 7: Sensor Networks
- Szymon Fedor
, Martin Collier
:
On the Problem of Energy Efficiency of Multi-Hop vs One-Hop Routing in Wireless Sensor Networks. 380-385 - Jianwei Niu, Congying Wei, Rui He, Jian Ma:
A Robust Error Concealment Algorithm in Wireless Networks. 386-389 - Maulin Patel, S. Venkatesan, Doug Weiner:
Role Assignment for Data Aggregation in Wireless Sensor Networks. 390-395 - Sameer Pai, Philip Kuryloski, Henry Yip, Srikant Yennamandra, Stephen B. Wicker, Kirsten Boehner, Geri Gay:
Networks of Sensors in Public Spaces: Combining Technology with Art. 396-402
Session 8: Ubiquitous and Pervasive Computing II
- Tetsuo Kamina, Toshinori Aoki, Yoshiteru Eto, Noboru Koshizuka, Jun Yamada, Ken Sakamura:
Verifying Identifier-Authenticity in Ubiquitous Computing Environment. 403-408 - Liang Ma, Mieso K. Denko:
A Routing Metric for Load-Balancing in Wireless Mesh Networks. 409-414 - Mukesh Shakya, Jianhua Zhang, Ping Zhang, Mattias Lampe:
Design and Optimization of Wireless Sensor Network with Mobile Gateway. 415-420
UbiSafe 2007 Symposium on Ubisafe Computing
Session 1: Security in Ubiquitous and Embedded Environments
- Sandra Dominikus, Manfred Josef Aigner:
mCoupons: An Application for Near Field Communication (NFC). 421-428 - Chuan Lin, Yanxiang He, Chao Peng, Laurence Tianruo Yang:
A Distributed Efficient Architecture for Wireless Sensor Networks. 429-434 - Lei Jing, Zixue Cheng:
Functional Safety Problems in the Ubiquitous Environment. 435-439 - Gilles Grimaud, Yann Hodique, Isabelle Simplot-Ryl:
A Verifiable Lightweight Escape Analysis Supporting Creational Design Patterns. 440-447
Session 2: Authentication, Authorization, and Access Control
- Chen Yang, Wenping Ma, Benxiong Huang, Xinmei Wang:
Password-Based Access Control Scheme with Remote User Authentication Using Smart Cards. 448-452 - Tuan-Anh Nguyen, Linying Su, George Inman, David W. Chadwick
:
Flexible and Manageable Delegation of Authority in RBAC. 453-458 - Alexander Ilic, Florian Michahelles, Elgar Fleisch:
The Dual Ownership Model: Using Organizational Relationships for Access Control in Safety Supply Chains. 459-466 - Huanyu Zhao, Xiaolin Li:
S3PAS: A Scalable Shoulder-Surfing Resistant Textual-Graphical Password Authentication Scheme. 467-472 - Seunghan Chang, Artem Chebotko, Shiyong Lu, Farshad Fotouhi:
Graph Matching Based Authorization Model for Efficient Secure XML Querying. 473-478
Session 3: Trusted and Dependable Computing
- Hisashi Mohri, Ikuya Yasuda, Yoshiaki Takata, Hiroyuki Seki:
Certificate Chain Discovery in Web of Trust for Ad Hoc Networks. 479-485 - Shane Balfe, Eimear Gallery:
Mobile Agents and the Deus Ex Machina. 486-492 - Pierpaolo Dondio
, Stephen Barrett:
Presumptive Selection of Trust Evidences: A Non Invasive Application-Contained Solution. 493-499 - Kiranmai Bellam, Ziliang Zong, Mohammed I. Alghamdi
, Mais Nijim, Xiao Qin:
Integrating Fault Recovery and Quality of Security in Real-Time Systems. 500-505
Session 4: Grid, Workflow, and Web Services
- Zijiang Yang, Shiyong Lu, Ping Yang:
Itinerary-Based Access Control for Mobile Tasks in Scientific Workflows. 506-511 - Incheon Paik, Hiroto Suzuki:
Pattern Templates for Automating Business Choreography on Web Services. 512-517 - Chi-Chih Huang, Pang-Chieh Wang, Ting-Wei Hou:
Advanced OSGi Security Layer. 518-523 - Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya, Kevin A. Kwiat:
QoS-LI: QoS Loss Inference in Disadvantaged Networks. 524-529
Session 5: Intelligence and Data Mining
- Flora Dilys Salim
, Seng Wai Loke, Andry Rakotonirainy
, Shonali Krishnaswamy:
U&I Aware: A Framework Using Data Mining and Collision Detection to Increase Awareness for Intersection Users. 530-535 - Mohammad Ahmad Munawar, Kevin Quan, Paul A. S. Ward:
Interaction Analysis of Heterogeneous Monitoring Data for Autonomic Problem Determination. 536-542 - Chuanfeng Lv, Qiangfu Zhao:
Integration of Data Compression and Cryptography: Another Way to Increase the Information Security. 543-547
Session 6: Autonomic and Agent Systems
- Rasmus Adler, Marc Forster, Mario Trapp:
Determining Configuration Probabilities of Safety-Critical Adaptive Systems. 548-555 - Mourad Alia, Viktor S. Wold Eide, Nearchos Paspallis
, Frank Eliassen, Svein O. Hallsteinsen, George A. Papadopoulos
:
A Utility-Based Adaptivity Model for Mobile Applications. 556-563 - Madhusudhanan Chandrasekaran, Mukarram Baig, Shambhu J. Upadhyaya:
AEGIS: A Proactive Methodology to Shield against Zero-Day Exploits. 556-563
WAMIS 2007 Workshop on Web and Mobile Information Services
Session 1: Service Modelling and Coordination
- Rainer Weinreich
, Thomas Ziebermayr, Dirk Draheim
:
A Versioning Model for Enterprise Services. 570-575 - Yu Huang, Chunxiang Xu, Hanpin Wang, Yunni Xia, Jiaqi Zhu, Cheng Zhu:
Formalizing Web Service Choreography Interface. 576-581 - Patrick C. K. Hung, Jude Andrade, Yongming Chen, Ranny Huang, Miguel Vargas Martin, Yi Zheng:
Research Issues of Privacy Access Control Model for Mobile Ad Hoc Healthcare Applications with XACML. 582-587 - Jamal Bentahar, Zakaria Maamar, Djamal Benslimane, Philippe Thiran:
Using Argumentative Agents to Manage Communities of Web Services. 588-593
Session 2: Advanced Techniques for Service Provisioning
- Celso Rafael Santos, João Pedro Costa, Pedro Furtado
:
QoS-Broker for Transactional Workloads. 594-599 - Quincy Wu, Yan-Hsiang Wang:
Building Web-Base SIP Analyzer with Ajax Approach. 600-604 - Hao Lan Zhang
, Clement H. C. Leung, Gitesh K. Raikundalia:
Performance Evaluation of Agent Network Topologies Based on the AOCD Architecture. 605-610 - Isabel Praça
, Maria João Viamonte
, Carlos Ramos
, Zita A. Vale
:
Learning Business Strategies for Competitive Electronic Marketplaces. 611-616
Session 3: Mobile Services
- Teemu Jalava, Jukka K. Nurminen:
Mobile Phone as an Inspections Tool--Experiences with a Service for Field Force. 617-622 - Ivan Marsá-Maestre, Miguel A. López-Carmona, Juan R. Velasco, Alvaro Paricio
:
Mobile Devices for Personal Smart Spaces. 623-628 - Florencia Balbastro, Alfredo Capozucca
, Nicolas Guelfi:
On the Integration of Mobility in a Fault-Tolerant e-Health Web Information System. 629-634
HWISE 2007 Workshop on Heterogeneous Wireless Networks
Session 1: Architecture of Heterogeneous Wireless Networks
- Haroon Malik, Elhadi M. Shakshuki
, Travis DeWolf, Mieso K. Denko:
Multi-Agent System for Directed Diffusion in Wireless Sensor Networks. 635-640 - Jelena V. Misic:
On Slave-Slave Bridging with Non-Acknowledged GTS Access in 802.15.4 Beacon Enabled Networks. 641-646 - Sang-Sik Kim, Aesoon Park:
A Novel Model for User Mobility in Wireless Sensor Networks. 647-652
Session 2: Design of Heterogeneous Wireless Networks
- Peng He, Jiandong Li, Wei Dong:
A Novel Distributed Topology Control Algorithm for Ad Hoc Networks. 653-658 - Chih-Kuang Lin, Vladimir Zadorozhny, Prashant Krishnamurthy:
Efficient Hybrid Channel Access for Data Intensive Sensor Networks. 659-664 - Donghoon Kim, Yong-Man Cho, Changhwa Kim, Sangkyung Kim, Soo-Hyun Park, Tae-Won Kang:
E-ITRC Protocol with Long & Adjustable Range on Underwater Acoustic Sensor Network. 665-672
Session 3: Networking on Heterogeneous Networks
- Fang Jing, Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naohisa Takahashi:
Dynamic Route Selection Policy Protocol in MANET. 673-678 - Consolee Mbarushimana, Alireza Shahrabi
:
Comparative Study of Reactive and Proactive Routing Protocols Performance in Mobile Ad Hoc Networks. 679-684 - Rashid Bin Muhammad
:
A Geo-Routing Algorithm in Planar Graph for Ad Hoc Wireless Networks. 685-689 - Mimoza Durresi, Arjan Durresi, Leonard Barolli:
Hierarchical Communications for Battlefields. 690-695
Session 4: Energy-Aware Protocols I
- Md. Ashiqur Rahman, Sajid Hussain:
Energy Efficient Query Processing in Wireless Sensor Network. 696-700 - Ying-Hong Wang, Chih-Peng Hsu, Yi-Chien Lin, Chien-Shan Kuo, Hsin-Yi Ho:
A Routing Method by Reactive Energy Decision in Wireless Sensor Networks. 701-706 - Yeim-Kuan Chang, Yi-Wei Ting, Shang-Chun Wu:
Power-Efficient and Path-Stable Broadcasting Scheme for Wireless Ad Hoc Networks. 707-712 - Kiyohiro Morita, Keiji Ozaki, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa
:
Evaluation of Reliable Data Transmission Protocol in Wireless Sensor-Actuator Network. 713-718
Session 5: Energy-Aware Protocols II
- Kyungseo Park, Byoungyong Lee, Ramez Elmasri:
Energy Efficient Spatial Query Processing in Wireless Sensor Networks. 719-724 - Eyuphan Bulut, Ibrahim Korpeoglu
:
DSSP: A Dynamic Sleep Scheduling Protocol for Prolonging the Lifetime of Wireless Sensor Networks. 725-730 - Hikaru Mitsuhashi, Masahiro Watanabe, Sadao Obana, Masaki Bandai
, Takashi Watanabe
:
A Testbed with a Practical Smart Antenna for Directional MAC Protocols in Ad hoc Networks. 731-736
Session 6: Applications of Heterogeneous Wireless Networks
- Xu Li, Amiya Nayak
, Isabelle Ryl, David Simplot, Ivan Stojmenovic:
Secure Mobile Ad hoc Routing. 737-742 - Hiroyuki Sago, Masako Shinohara, Takahiro Hara, Shojiro Nishio:
A Data Dissemination Method for Information Sharing Based on Inter-Vehicle Communication. 743-748