callback( { "result":{ "query":":facetid:toc:\"db/conf/euc/euc2008-1.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"217.38" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"74", "@dc":"74", "@oc":"74", "@id":"43380586", "text":":facetid:toc:db/conf/euc/euc2008-1.bht" } }, "hits":{ "@total":"74", "@computed":"74", "@sent":"74", "@first":"0", "hit":[{ "@score":"1", "@id":"5343332", "info":{"authors":{"author":{"@pid":"a/TarekFAbdelzaher","text":"Tarek F. Abdelzaher"}},"title":"Research Challenges in Distributed Cyber-Physical Systems.","venue":"EUC","pages":"5","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/Abdelzaher08","doi":"10.1109/EUC.2008.190","ee":"https://doi.org/10.1109/EUC.2008.190","url":"https://dblp.org/rec/conf/euc/Abdelzaher08"}, "url":"URL#5343332" }, { "@score":"1", "@id":"5343333", "info":{"authors":{"author":[{"@pid":"83/610","text":"Ashraf Armoush"},{"@pid":"57/2807","text":"Falk Salewski"},{"@pid":"k/StefanKowalewski","text":"Stefan Kowalewski"}]},"title":"A Hybrid Fault Tolerance Method for Recovery Block with a Weak Acceptance Test.","venue":"EUC","pages":"484-491","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ArmoushSK08","doi":"10.1109/EUC.2008.102","ee":"https://doi.org/10.1109/EUC.2008.102","url":"https://dblp.org/rec/conf/euc/ArmoushSK08"}, "url":"URL#5343333" }, { "@score":"1", "@id":"5343337", "info":{"authors":{"author":[{"@pid":"72/3050","text":"Jorge L. V. Barbosa"},{"@pid":"80/6793","text":"Rodrigo Hahn"},{"@pid":"86/3148","text":"Débora Nice Ferrari Barbosa"},{"@pid":"b/ClaudioFernandoResinGeyer","text":"Cláudio Fernando Resin Geyer"}]},"title":"Learning in Small and Large Ubiquitous Computing Environments.","venue":"EUC","pages":"401-407","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/BarbosaHBG08","doi":"10.1109/EUC.2008.89","ee":"https://doi.org/10.1109/EUC.2008.89","url":"https://dblp.org/rec/conf/euc/BarbosaHBG08"}, "url":"URL#5343337" }, { "@score":"1", "@id":"5343340", "info":{"authors":{"author":[{"@pid":"11/7448","text":"Canwen Xiao"},{"@pid":"81/3147","text":"Minxuan Zhang"},{"@pid":"76/305","text":"Yong Dou"},{"@pid":"28/7448","text":"Zhitong Zhao"}]},"title":"Dimensional Bubble Flow Control and Fully Adaptive Routing in the 2-D Mesh Network on Chip.","venue":"EUC","pages":"353-358","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/CanwenMYZ08","doi":"10.1109/EUC.2008.49","ee":"https://doi.org/10.1109/EUC.2008.49","url":"https://dblp.org/rec/conf/euc/CanwenMYZ08"}, "url":"URL#5343340" }, { "@score":"1", "@id":"5343342", "info":{"authors":{"author":[{"@pid":"c/ChinChenChang","text":"Chin-Chen Chang 0001"},{"@pid":"77/6612","text":"Chin-Feng Lee"},{"@pid":"91/1059","text":"Yi-Ren Wang"}]},"title":"An Improved EMD Embedding Scheme Based on Secret Image Difference.","venue":"EUC","pages":"129-135","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ChangLW08","doi":"10.1109/EUC.2008.38","ee":"https://doi.org/10.1109/EUC.2008.38","url":"https://dblp.org/rec/conf/euc/ChangLW08"}, "url":"URL#5343342" }, { "@score":"1", "@id":"5343343", "info":{"authors":{"author":[{"@pid":"c/ChinChenChang","text":"Chin-Chen Chang 0001"},{"@pid":"06/183","text":"Wei-Liang Tai"},{"@pid":"49/2705","text":"Kuo-Nan Chen"}]},"title":"Lossless Data Hiding Based on Histogram Modification for Image Authentication.","venue":"EUC","pages":"506-511","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ChangTC08","doi":"10.1109/EUC.2008.20","ee":"https://doi.org/10.1109/EUC.2008.20","url":"https://dblp.org/rec/conf/euc/ChangTC08"}, "url":"URL#5343343" }, { "@score":"1", "@id":"5343344", "info":{"authors":{"author":[{"@pid":"88/1490","text":"Chih-Min Chao"},{"@pid":"63/7448","text":"Yi-Wei Lee"}]},"title":"Quorum-Based Energy Saving MAC Protocol Design for Wireless Sensor Networks.","venue":"EUC","pages":"316-322","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ChaoL08","doi":"10.1109/EUC.2008.99","ee":"https://doi.org/10.1109/EUC.2008.99","url":"https://dblp.org/rec/conf/euc/ChaoL08"}, "url":"URL#5343344" }, { "@score":"1", "@id":"5343348", "info":{"authors":{"author":[{"@pid":"31/5547","text":"Qiuxia Chen"},{"@pid":"l/DikLunLee","text":"Dik Lun Lee"},{"@pid":"14/716","text":"Wang-Chien Lee"}]},"title":"Rule-Based WiFi Localization Methods.","venue":"EUC","pages":"252-258","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ChenLL08","doi":"10.1109/EUC.2008.51","ee":"https://doi.org/10.1109/EUC.2008.51","url":"https://dblp.org/rec/conf/euc/ChenLL08"}, "url":"URL#5343348" }, { "@score":"1", "@id":"5343350", "info":{"authors":{"author":[{"@pid":"13/3715","text":"Hongyang Chen"},{"@pid":"71/6287","text":"Marcelo H. T. Martins"},{"@pid":"59/1856-1","text":"Pei Huang 0001"},{"@pid":"09/461","text":"Hing-Cheung So"},{"@pid":"46/2349","text":"Kaoru Sezaki"}]},"title":"Cooperative Node Localization for Mobile Sensor Networks.","venue":"EUC","pages":"302-308","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ChenMHSS08","doi":"10.1109/EUC.2008.166","ee":"https://doi.org/10.1109/EUC.2008.166","url":"https://dblp.org/rec/conf/euc/ChenMHSS08"}, "url":"URL#5343350" }, { "@score":"1", "@id":"5343354", "info":{"authors":{"author":{"@pid":"c/JingdeCheng","text":"Jingde Cheng"}},"title":"Testing and Debugging Persistent Computing Systems: A New Challenge in Ubiquitous Computing.","venue":"EUC","pages":"408-414","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/Cheng08","doi":"10.1109/EUC.2008.173","ee":"https://doi.org/10.1109/EUC.2008.173","url":"https://dblp.org/rec/conf/euc/Cheng08"}, "url":"URL#5343354" }, { "@score":"1", "@id":"5343355", "info":{"authors":{"author":[{"@pid":"97/1604","text":"Driss Choujaa"},{"@pid":"70/3064","text":"Naranker Dulay"}]},"title":"TRAcME: Temporal Activity Recognition Using Mobile Phone Data.","venue":"EUC","pages":"119-126","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ChoujaaD08","doi":"10.1109/EUC.2008.33","ee":"https://doi.org/10.1109/EUC.2008.33","url":"https://dblp.org/rec/conf/euc/ChoujaaD08"}, "url":"URL#5343355" }, { "@score":"1", "@id":"5343357", "info":{"authors":{"author":[{"@pid":"85/7448","text":"Maobing Dai"},{"@pid":"83/1351","text":"Toshihiro Matsui"},{"@pid":"97/6217","text":"Yutaka Ishikawa"}]},"title":"A Light Lock Management Mechanism for Optimizing Real-Time and Non-Real-Time Performance in Embedded Linux.","venue":"EUC","pages":"162-168","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/DaiMI08","doi":"10.1109/EUC.2008.56","ee":"https://doi.org/10.1109/EUC.2008.56","url":"https://dblp.org/rec/conf/euc/DaiMI08"}, "url":"URL#5343357" }, { "@score":"1", "@id":"5343361", "info":{"authors":{"author":[{"@pid":"61/4591","text":"Bing Du"},{"@pid":"41/3665","text":"Chun Ruan"}]},"title":"Robust Feedback Control Scheduling in Distributed Embedded Real-Time Systems.","venue":"EUC","pages":"90-96","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/DuR08","doi":"10.1109/EUC.2008.107","ee":"https://doi.org/10.1109/EUC.2008.107","url":"https://dblp.org/rec/conf/euc/DuR08"}, "url":"URL#5343361" }, { "@score":"1", "@id":"5343362", "info":{"authors":{"author":[{"@pid":"08/4501","text":"Sébastien Duval"},{"@pid":"28/3357","text":"Christian Hoareau"},{"@pid":"13/3814","text":"Hiromichi Hashizume"}]},"title":"Human Universality in Ubiquitous Computing: Maslow, Where Are You?","venue":"EUC","pages":"394-400","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/DuvalHH08","doi":"10.1109/EUC.2008.120","ee":"https://doi.org/10.1109/EUC.2008.120","url":"https://dblp.org/rec/conf/euc/DuvalHH08"}, "url":"URL#5343362" }, { "@score":"1", "@id":"5343365", "info":{"authors":{"author":[{"@pid":"84/485","text":"Yuhong Feng"},{"@pid":"c/JiannongCao","text":"Jiannong Cao 0001"},{"@pid":"00/7449","text":"Ivan Lau"},{"@pid":"13/5407-1","text":"Xuan Liu 0001"}]},"title":"A Self-configuring Personal Agent Platform for Pervasive Computing.","venue":"EUC","pages":"438-444","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/FengCLL08","doi":"10.1109/EUC.2008.163","ee":"https://doi.org/10.1109/EUC.2008.163","url":"https://dblp.org/rec/conf/euc/FengCLL08"}, "url":"URL#5343365" }, { "@score":"1", "@id":"5343368", "info":{"authors":{"author":{"@pid":"84/6518","text":"Robert Günzel"}},"title":"Automatic Integration of Non-Bus Hardware IP into SoC-Platforms for Use by Software.","venue":"EUC","pages":"59-65","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/Guenzel08","doi":"10.1109/EUC.2008.140","ee":"https://doi.org/10.1109/EUC.2008.140","url":"https://dblp.org/rec/conf/euc/Guenzel08"}, "url":"URL#5343368" }, { "@score":"1", "@id":"5343375", "info":{"authors":{"author":[{"@pid":"36/7448","text":"Hiroki Hoshino"},{"@pid":"82/4497","text":"Ben A. Abderazek"},{"@pid":"87/711","text":"Kenichi Kuroda"}]},"title":"Advanced Optimization and Design Issues of a 32-Bit Embedded Processor Based on Produced Order Queue Computation Model.","venue":"EUC","pages":"16-22","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/HoshinoAK08","doi":"10.1109/EUC.2008.118","ee":"https://doi.org/10.1109/EUC.2008.118","url":"https://dblp.org/rec/conf/euc/HoshinoAK08"}, "url":"URL#5343375" }, { "@score":"1", "@id":"5343376", "info":{"authors":{"author":[{"@pid":"26/748","text":"Hung-Chang Hsiao"},{"@pid":"27/7448","text":"I-Ta Lin"},{"@pid":"74/1078","text":"Hao Liao"}]},"title":"Load Balancing in Peer-to-Peer Networks Based on Sampling System States.","venue":"EUC","pages":"417-423","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/HsiaoLL08","doi":"10.1109/EUC.2008.12","ee":"https://doi.org/10.1109/EUC.2008.12","url":"https://dblp.org/rec/conf/euc/HsiaoLL08"}, "url":"URL#5343376" }, { "@score":"1", "@id":"5343378", "info":{"authors":{"author":[{"@pid":"18/1730","text":"Guowei Huang"},{"@pid":"05/1539-27","text":"Zhi Chen 0027"},{"@pid":"64/5840-6","text":"Ying Wu 0006"},{"@pid":"62/4018","text":"Gongyi Wu"}]},"title":"The Effect of Routing-Load Dispersion on Congestion Control in Structured P2P Networks.","venue":"EUC","pages":"424-430","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/HuangCWW08","doi":"10.1109/EUC.2008.131","ee":"https://doi.org/10.1109/EUC.2008.131","url":"https://dblp.org/rec/conf/euc/HuangCWW08"}, "url":"URL#5343378" }, { "@score":"1", "@id":"5343379", "info":{"authors":{"author":[{"@pid":"92/590","text":"Yu-Kai Huang"},{"@pid":"73/4832","text":"Pi-Cheng Hsiu"},{"@pid":"08/7449","text":"Wei-Ni Chu"},{"@pid":"76/7448","text":"Kuan-Chang Hung"},{"@pid":"73/2927","text":"Ai-Chun Pang"},{"@pid":"07/3181","text":"Tei-Wei Kuo"},{"@pid":"26/7448","text":"Min Di"},{"@pid":"97/4822","text":"Hua-Wei Fang"}]},"title":"An Integrated Deployment Tool for ZigBee-Based Wireless Sensor Networks.","venue":"EUC","pages":"309-315","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/HuangHCHPKDF08","doi":"10.1109/EUC.2008.87","ee":"https://doi.org/10.1109/EUC.2008.87","url":"https://dblp.org/rec/conf/euc/HuangHCHPKDF08"}, "url":"URL#5343379" }, { "@score":"1", "@id":"5343382", "info":{"authors":{"author":[{"@pid":"h/YuHuang2","text":"Yu Huang 0002"},{"@pid":"52/7004","text":"Xiang Ma"},{"@pid":"88/484","text":"XianPing Tao"},{"@pid":"c/JiannongCao","text":"Jiannong Cao 0001"},{"@pid":"38/5132","text":"Jian Lu 0001"}]},"title":"A Probabilistic Approach to Consistency Checking for Pervasive Context.","venue":"EUC","pages":"387-393","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/HuangMTCL08","doi":"10.1109/EUC.2008.129","ee":"https://doi.org/10.1109/EUC.2008.129","url":"https://dblp.org/rec/conf/euc/HuangMTCL08"}, "url":"URL#5343382" }, { "@score":"1", "@id":"5343383", "info":{"authors":{"author":[{"@pid":"h/FeiHuang-1","text":"Fei Huang 0001"},{"@pid":"61/2985","text":"Binoy Ravindran"},{"@pid":"92/2777","text":"E. Douglas Jensen"}]},"title":"RT-P2P: A Scalable Real-Time Peer-to-Peer System with Probabilistic Timing Assurances.","venue":"EUC","pages":"97-103","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/HuangRJ08","doi":"10.1109/EUC.2008.24","ee":"https://doi.org/10.1109/EUC.2008.24","url":"https://dblp.org/rec/conf/euc/HuangRJ08"}, "url":"URL#5343383" }, { "@score":"1", "@id":"5343385", "info":{"authors":{"author":[{"@pid":"04/1410","text":"Shih-Hao Hung"},{"@pid":"30/4156","text":"Chien-Cheng Wu"},{"@pid":"79/3912","text":"Chia-Heng Tu"}]},"title":"Optimizing the Embedded Caching and Prefetching Software on a Network-Attached Storage System.","venue":"EUC","pages":"152-161","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/HungWT08","doi":"10.1109/EUC.2008.119","ee":"https://doi.org/10.1109/EUC.2008.119","url":"https://dblp.org/rec/conf/euc/HungWT08"}, "url":"URL#5343385" }, { "@score":"1", "@id":"5343388", "info":{"authors":{"author":[{"@pid":"04/7449","text":"Mostafa Jafari-Nodoushan"},{"@pid":"80/4361","text":"Seyed Ghassem Miremadi"},{"@pid":"e/AlirezaEjlali","text":"Alireza Ejlali"}]},"title":"Control-Flow Checking Using Branch Instructions.","venue":"EUC","pages":"66-72","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/Jafari-NodoushanME08","doi":"10.1109/EUC.2008.44","ee":"https://doi.org/10.1109/EUC.2008.44","url":"https://dblp.org/rec/conf/euc/Jafari-NodoushanME08"}, "url":"URL#5343388" }, { "@score":"1", "@id":"5343389", "info":{"authors":{"author":[{"@pid":"96/5583","text":"Wenbin Jiang"},{"@pid":"14/5759","text":"Chong Huang"},{"@pid":"98/4156","text":"Hai Jin 0001"},{"@pid":"56/4402","text":"Xiaofei Liao"}]},"title":"A New Proxy Scheme for Large-Scale P2P VoD System.","venue":"EUC","pages":"512-518","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/JiangHJL08","doi":"10.1109/EUC.2008.148","ee":"https://doi.org/10.1109/EUC.2008.148","url":"https://dblp.org/rec/conf/euc/JiangHJL08"}, "url":"URL#5343389" }, { "@score":"1", "@id":"5343391", "info":{"authors":{"author":[{"@pid":"75/1099","text":"Beihong Jin"},{"@pid":"42/5506","text":"Zhi Zang"},{"@pid":"50/6759-27","text":"Liang Zhang 0027"}]},"title":"An Empirical Study on Interoperability between Service Discovery Protocols.","venue":"EUC","pages":"459-466","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/JinZZ08","doi":"10.1109/EUC.2008.155","ee":"https://doi.org/10.1109/EUC.2008.155","url":"https://dblp.org/rec/conf/euc/JinZZ08"}, "url":"URL#5343391" }, { "@score":"1", "@id":"5343393", "info":{"authors":{"author":[{"@pid":"66/2256","text":"Dong-Heon Jung"},{"@pid":"37/4764","text":"Soo-Mook Moon"},{"@pid":"97/1028","text":"Sung-Hwan Bae"}]},"title":"Design and Optimization of a Java Ahead-of-Time Compiler for Embedded Systems.","venue":"EUC","pages":"169-175","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/JungMB08","doi":"10.1109/EUC.2008.80","ee":"https://doi.org/10.1109/EUC.2008.80","url":"https://dblp.org/rec/conf/euc/JungMB08"}, "url":"URL#5343393" }, { "@score":"1", "@id":"5343394", "info":{"authors":{"author":[{"@pid":"22/4317","text":"Archana Kalyansundar"},{"@pid":"19/2835","text":"Rita Chattopadhyay"}]},"title":"A Novel Approach to Hardware Architecture Design and Advanced Optimization Techniques for Time Critical Applications.","venue":"EUC","pages":"9-15","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/KalyansundarC08","doi":"10.1109/EUC.2008.113","ee":"https://doi.org/10.1109/EUC.2008.113","url":"https://dblp.org/rec/conf/euc/KalyansundarC08"}, "url":"URL#5343394" }, { "@score":"1", "@id":"5343395", "info":{"authors":{"author":[{"@pid":"46/3733","text":"Wataru Kanda"},{"@pid":"02/7449","text":"Yu Yumura"},{"@pid":"29/1596","text":"Yuki Kinebuchi"},{"@pid":"83/7448","text":"Kazuo Makijima"},{"@pid":"77/6979","text":"Tatsuo Nakajima"}]},"title":"SPUMONE: Lightweight CPU Virtualization Layer for Embedded Systems.","venue":"EUC","pages":"144-151","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/KandaYKMN08","doi":"10.1109/EUC.2008.157","ee":"https://doi.org/10.1109/EUC.2008.157","url":"https://dblp.org/rec/conf/euc/KandaYKMN08"}, "url":"URL#5343395" }, { "@score":"1", "@id":"5343398", "info":{"authors":{"author":[{"@pid":"87/7044","text":"Shinpei Kato"},{"@pid":"68/5967","text":"Nobuyuki Yamasaki"}]},"title":"Scheduling Aperiodic Tasks Using Total Bandwidth Server on Multiprocessors.","venue":"EUC","pages":"82-89","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/KatoY08","doi":"10.1109/EUC.2008.28","ee":"https://doi.org/10.1109/EUC.2008.28","url":"https://dblp.org/rec/conf/euc/KatoY08"}, "url":"URL#5343398" }, { "@score":"1", "@id":"5343399", "info":{"authors":{"author":[{"@pid":"71/7379","text":"Murad Khalid"},{"@pid":"29/7380","text":"In-ho Ra"},{"@pid":"57/2671","text":"Young Hoon Joo"},{"@pid":"96/785","text":"Ravi Sankar"}]},"title":"A Scenario-based Directional Communication Performance in Wireless Ad hoc Networks.","venue":"EUC","pages":"266-271","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/KhalidRJS08","doi":"10.1109/EUC.2008.72","ee":"https://doi.org/10.1109/EUC.2008.72","url":"https://dblp.org/rec/conf/euc/KhalidRJS08"}, "url":"URL#5343399" }, { "@score":"1", "@id":"5343400", "info":{"authors":{"author":[{"@pid":"98/1668","text":"Ehsan Mousavi Khaneghah"},{"@pid":"76/3579","text":"Seyedeh Leili Mirtaheri"},{"@pid":"15/4626","text":"Mohsen Sharifi"}]},"title":"Evaluating the Effect of Inter Process Communication Efficiency on High Performance Distributed Scientific Computing.","venue":"EUC","pages":"366-372","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/KhaneghahMS08","doi":"10.1109/EUC.2008.11","ee":"https://doi.org/10.1109/EUC.2008.11","url":"https://dblp.org/rec/conf/euc/KhaneghahMS08"}, "url":"URL#5343400" }, { "@score":"1", "@id":"5343404", "info":{"authors":{"author":[{"@pid":"00/3984","text":"David A. Knox"},{"@pid":"k/ThomasKunz","text":"Thomas Kunz"}]},"title":"Secure Authentication in Wireless Sensor Networks Using RF Fingerprints.","venue":"EUC","pages":"230-237","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/KnoxK08","doi":"10.1109/EUC.2008.114","ee":"https://doi.org/10.1109/EUC.2008.114","url":"https://dblp.org/rec/conf/euc/KnoxK08"}, "url":"URL#5343404" }, { "@score":"1", "@id":"5343407", "info":{"authors":{"author":[{"@pid":"64/4103","text":"Anderson Kuei-An Ku"},{"@pid":"94/3917","text":"Jenny Yi-Chun Kuo"},{"@pid":"x/JinglingXue","text":"Jingling Xue"}]},"title":"Hardware Support for Efficient Sparse Matrix Vector Multiplication.","venue":"EUC","pages":"37-43","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/KuKX08","doi":"10.1109/EUC.2008.154","ee":"https://doi.org/10.1109/EUC.2008.154","url":"https://dblp.org/rec/conf/euc/KuKX08"}, "url":"URL#5343407" }, { "@score":"1", "@id":"5343412", "info":{"authors":{"author":[{"@pid":"22/3539","text":"Weijia Li"},{"@pid":"27/6228","text":"Yu Du"},{"@pid":"z/YoutaoZhang","text":"Youtao Zhang"},{"@pid":"00/91","text":"Bruce R. Childers"},{"@pid":"43/909","text":"Ping Zhou"},{"@pid":"y/JunYang2","text":"Jun Yang 0002"}]},"title":"Adaptive Buffer Management for Efficient Code Dissemination in Multi-Application Wireless Sensor Networks.","venue":"EUC","pages":"295-301","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/LiDZCZY08","doi":"10.1109/EUC.2008.160","ee":"https://doi.org/10.1109/EUC.2008.160","url":"https://dblp.org/rec/conf/euc/LiDZCZY08"}, "url":"URL#5343412" }, { "@score":"1", "@id":"5343413", "info":{"authors":{"author":[{"@pid":"72/6271","text":"Ze Li"},{"@pid":"15/5579","text":"Haiying Shen"}]},"title":"A Direction Based Geographic Routing Scheme for Intermittently Connected Mobile Networks.","venue":"EUC","pages":"359-365","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/LiS08","doi":"10.1109/EUC.2008.159","ee":"https://doi.org/10.1109/EUC.2008.159","url":"https://dblp.org/rec/conf/euc/LiS08"}, "url":"URL#5343413" }, { "@score":"1", "@id":"5343416", "info":{"authors":{"author":[{"@pid":"96/7448","text":"Rong-Jhang Liao"},{"@pid":"15/7448","text":"Pei-Lun Suei"},{"@pid":"68/2876","text":"Yung-Feng Lu"},{"@pid":"07/3181","text":"Tei-Wei Kuo"},{"@pid":"32/7448","text":"Chun-Sho Lee"}]},"title":"A Signature-based Grid Index Design for RFID Main-Memory Databases.","venue":"EUC","pages":"519-525","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/LiaoSLKL08","doi":"10.1109/EUC.2008.105","ee":"https://doi.org/10.1109/EUC.2008.105","url":"https://dblp.org/rec/conf/euc/LiaoSLKL08"}, "url":"URL#5343416" }, { "@score":"1", "@id":"5343418", "info":{"authors":{"author":[{"@pid":"28/4496","text":"Shijun Lin"},{"@pid":"05/365-1","text":"Li Su 0001"},{"@pid":"67/4447","text":"Haibo Su"},{"@pid":"46/5770","text":"Depeng Jin"},{"@pid":"44/681","text":"Lieguang Zeng"}]},"title":"Hierarchical Cluster-Based Irregular Topology Customization for Networks-on-Chip.","venue":"EUC","pages":"373-377","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/LinSSJZ08","doi":"10.1109/EUC.2008.9","ee":"https://doi.org/10.1109/EUC.2008.9","url":"https://dblp.org/rec/conf/euc/LinSSJZ08"}, "url":"URL#5343418" }, { "@score":"1", "@id":"5343421", "info":{"authors":{"author":[{"@pid":"99/3717","text":"Wenjun Liu"},{"@pid":"69/4248","text":"Yue Sun"},{"@pid":"34/25","text":"Jiguo Yu"},{"@pid":"43/4570","text":"Baoxiang Cao"}]},"title":"A Grid-Based Distributed Multi-Hop Routing Protocol for Wireless Sensor Networks.","venue":"EUC","pages":"330-336","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/LiuSYC08","doi":"10.1109/EUC.2008.53","ee":"https://doi.org/10.1109/EUC.2008.53","url":"https://dblp.org/rec/conf/euc/LiuSYC08"}, "url":"URL#5343421" }, { "@score":"1", "@id":"5343424", "info":{"authors":{"author":[{"@pid":"23/4249","text":"Mingsong Lv"},{"@pid":"93/1025","text":"Zonghua Gu 0001"},{"@pid":"45/5411","text":"Nan Guan"},{"@pid":"95/63","text":"Qingxu Deng"},{"@pid":"49/6363","text":"Ge Yu 0001"}]},"title":"Performance Comparison of Techniques on Static Path Analysis of WCET.","venue":"EUC","pages":"104-111","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/LvGGDY08","doi":"10.1109/EUC.2008.178","ee":"https://doi.org/10.1109/EUC.2008.178","url":"https://dblp.org/rec/conf/euc/LvGGDY08"}, "url":"URL#5343424" }, { "@score":"1", "@id":"5343426", "info":{"authors":{"author":[{"@pid":"70/7448","text":"Taichi Maekawa"},{"@pid":"82/4497","text":"Ben A. Abderazek"},{"@pid":"87/711","text":"Kenichi Kuroda"}]},"title":"Single Instruction Dual-Execution Model Processor Architecture.","venue":"EUC","pages":"30-36","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/MaekawaAK08","doi":"10.1109/EUC.2008.116","ee":"https://doi.org/10.1109/EUC.2008.116","url":"https://dblp.org/rec/conf/euc/MaekawaAK08"}, "url":"URL#5343426" }, { "@score":"1", "@id":"5343428", "info":{"authors":{"author":[{"@pid":"00/353","text":"Sojan Markose"},{"@pid":"48/2518","text":"Xiaoqing Frank Liu"},{"@pid":"91/2733","text":"Bruce M. McMillin"}]},"title":"A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems.","venue":"EUC","pages":"75-81","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/MarkoseLM08","doi":"10.1109/EUC.2008.92","ee":"https://doi.org/10.1109/EUC.2008.92","url":"https://dblp.org/rec/conf/euc/MarkoseLM08"}, "url":"URL#5343428" }, { "@score":"1", "@id":"5343432", "info":{"authors":{"author":[{"@pid":"90/7448","text":"Kohta Nakamura"},{"@pid":"22/4154","text":"Masahiro Ogawa"},{"@pid":"78/3906","text":"Takahiro Koita"},{"@pid":"14/2582","text":"Kenya Sato"}]},"title":"Implementation and Evaluation of Caching Method to Increase the Speed of UPnP Gateway.","venue":"EUC","pages":"112-118","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/NakamuraOKS08","doi":"10.1109/EUC.2008.15","ee":"https://doi.org/10.1109/EUC.2008.15","url":"https://dblp.org/rec/conf/euc/NakamuraOKS08"}, "url":"URL#5343432" }, { "@score":"1", "@id":"5343437", "info":{"authors":{"author":[{"@pid":"39/5564","text":"Linfeng Pan"},{"@pid":"99/6797","text":"Minyi Guo"},{"@pid":"32/5167","text":"Yanqin Yang"},{"@pid":"93/6765-5","text":"Meng Wang 0005"},{"@pid":"08/6845","text":"Zili Shao"}]},"title":"A State-Based Predictive Approach for Leakage Reduction of Functional Units.","venue":"EUC","pages":"52-58","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/PanGYWS08","doi":"10.1109/EUC.2008.175","ee":"https://doi.org/10.1109/EUC.2008.175","url":"https://dblp.org/rec/conf/euc/PanGYWS08"}, "url":"URL#5343437" }, { "@score":"1", "@id":"5343441", "info":{"authors":{"author":[{"@pid":"36/2205","text":"Zhe Peng"},{"@pid":"17/3091","text":"Longhua Ma"},{"@pid":"62/3147","text":"Feng Xia 0001"}]},"title":"A Low-Cost Embedded Controller for Complex Control Systems.","venue":"EUC","pages":"23-29","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/PengMX08","doi":"10.1109/EUC.2008.40","ee":"https://doi.org/10.1109/EUC.2008.40","url":"https://dblp.org/rec/conf/euc/PengMX08"}, "url":"URL#5343441" }, { "@score":"1", "@id":"5343446", "info":{"authors":{"author":[{"@pid":"c/CChantrapornchai","text":"Chantana Phongpensri"},{"@pid":"16/7448","text":"Krisana Sripanomwan"}]},"title":"Different Fuzzy Parameter Selection Based on Multiple Criteria for Microcontroller.","venue":"EUC","pages":"176-182","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/PhongpensriS08","doi":"10.1109/EUC.2008.146","ee":"https://doi.org/10.1109/EUC.2008.146","url":"https://dblp.org/rec/conf/euc/PhongpensriS08"}, "url":"URL#5343446" }, { "@score":"1", "@id":"5343448", "info":{"authors":{"author":[{"@pid":"q/MeikangQiu","text":"Meikang Qiu"},{"@pid":"39/3731","text":"Jiande Wu"},{"@pid":"37/3401","text":"Jingtong Hu"},{"@pid":"65/425-1","text":"Yi He 0001"},{"@pid":"27/2376","text":"Edwin Hsing-Mean Sha"}]},"title":"Dynamic and Leakage Power Minimization with Loop Voltage Scheduling and Assignment.","venue":"EUC","pages":"192-198","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/QiuWHHS08","doi":"10.1109/EUC.2008.90","ee":"https://doi.org/10.1109/EUC.2008.90","url":"https://dblp.org/rec/conf/euc/QiuWHHS08"}, "url":"URL#5343448" }, { "@score":"1", "@id":"5343451", "info":{"authors":{"author":[{"@pid":"24/622","text":"Romeo Said"},{"@pid":"15/4345","text":"Yves Mahéo"}]},"title":"Toward a Platform for Service Discovery and Invocation in Disconnected Mobile Ad Hoc Networks.","venue":"EUC","pages":"238-244","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/SaidM08","doi":"10.1109/EUC.2008.58","ee":"https://doi.org/10.1109/EUC.2008.58","url":"https://dblp.org/rec/conf/euc/SaidM08"}, "url":"URL#5343451" }, { "@score":"1", "@id":"5343454", "info":{"authors":{"author":[{"@pid":"47/7448","text":"Seyed Mohammad Hossein Shekarian"},{"@pid":"e/AlirezaEjlali","text":"Alireza Ejlali"},{"@pid":"80/4361","text":"Seyed Ghassem Miremadi"}]},"title":"A Low Power Error Detection Technique for Floating-Point Units in Embedded Applications.","venue":"EUC","pages":"199-205","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ShekarianEM08","doi":"10.1109/EUC.2008.108","ee":"https://doi.org/10.1109/EUC.2008.108","url":"https://dblp.org/rec/conf/euc/ShekarianEM08"}, "url":"URL#5343454" }, { "@score":"1", "@id":"5343455", "info":{"authors":{"author":[{"@pid":"63/2498","text":"Koji Shigemoto"},{"@pid":"21/2413","text":"Kensuke Kawakami"},{"@pid":"47/6038","text":"Koji Nakano"}]},"title":"Accelerating Montgomery Modulo Multiplication for Redundant Radix-64k Number System on the FPGA Using Dual-Port Block RAMs.","venue":"EUC","pages":"44-51","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ShigemotoKN08","doi":"10.1109/EUC.2008.30","ee":"https://doi.org/10.1109/EUC.2008.30","url":"https://dblp.org/rec/conf/euc/ShigemotoKN08"}, "url":"URL#5343455" }, { "@score":"1", "@id":"5343459", "info":{"authors":{"author":[{"@pid":"60/5921","text":"Jindian Su"},{"@pid":"72/6111","text":"Shanshan Yu"},{"@pid":"95/5608","text":"Heqing Guo"}]},"title":"Dynamic Substitutability Analysis of Web Service Composition via Extended Pi-Calculus.","venue":"EUC","pages":"447-452","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/SuYG08","doi":"10.1109/EUC.2008.106","ee":"https://doi.org/10.1109/EUC.2008.106","url":"https://dblp.org/rec/conf/euc/SuYG08"}, "url":"URL#5343459" }, { "@score":"1", "@id":"5343462", "info":{"authors":{"author":[{"@pid":"02/2264","text":"Lei Sun"},{"@pid":"77/6979","text":"Tatsuo Nakajima"}]},"title":"A Lightweight Detection and Recovery Infrastructure of Kernel Objects for Embedded Systems.","venue":"EUC","pages":"136-143","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/SunN08","doi":"10.1109/EUC.2008.78","ee":"https://doi.org/10.1109/EUC.2008.78","url":"https://dblp.org/rec/conf/euc/SunN08"}, "url":"URL#5343462" }, { "@score":"1", "@id":"5343463", "info":{"authors":{"author":[{"@pid":"62/3689-6","text":"Yu Sun 0006"},{"@pid":"z/WeiZhang2","text":"Wei Zhang 0002"}]},"title":"Adaptive Drowsy Cache Control for Java Applications.","venue":"EUC","pages":"185-191","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/SunZ08","doi":"10.1109/EUC.2008.88","ee":"https://doi.org/10.1109/EUC.2008.88","url":"https://dblp.org/rec/conf/euc/SunZ08"}, "url":"URL#5343463" }, { "@score":"1", "@id":"5343464", "info":{"authors":{"author":[{"@pid":"63/6566-8","text":"Weiwei Sun 0008"},{"@pid":"10/709","text":"Zhuoyao Zhang"},{"@pid":"72/1358-1","text":"Ping Yu 0001"},{"@pid":"16/262","text":"Yongrui Qin"}]},"title":"Efficient Data Scheduling for Multi-item Queries in On-Demand Broadcast.","venue":"EUC","pages":"499-505","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/SunZYQ08","doi":"10.1109/EUC.2008.133","ee":"https://doi.org/10.1109/EUC.2008.133","url":"https://dblp.org/rec/conf/euc/SunZYQ08"}, "url":"URL#5343464" }, { "@score":"1", "@id":"5343466", "info":{"authors":{"author":[{"@pid":"29/3066","text":"Yahya M. Tashtoush"},{"@pid":"94/7448","text":"Mohammed A. Okour"}]},"title":"Fuzzy Self-Clustering for Wireless Sensor Networks.","venue":"EUC","pages":"223-229","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/TashtoushO08","doi":"10.1109/EUC.2008.98","ee":"https://doi.org/10.1109/EUC.2008.98","url":"https://dblp.org/rec/conf/euc/TashtoushO08"}, "url":"URL#5343466" }, { "@score":"1", "@id":"5343476", "info":{"authors":{"author":[{"@pid":"74/5696","text":"Xiaochun Wang"},{"@pid":"08/5313","text":"Yuanchun Shi"}]},"title":"UMDD: User Model Driven Software Development.","venue":"EUC","pages":"477-483","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/WangS08","doi":"10.1109/EUC.2008.59","ee":"https://doi.org/10.1109/EUC.2008.59","url":"https://dblp.org/rec/conf/euc/WangS08"}, "url":"URL#5343476" }, { "@score":"1", "@id":"5343477", "info":{"authors":{"author":[{"@pid":"188/7759","text":"Chao Wang"},{"@pid":"181/2323-4","text":"Yan Sun 0004"},{"@pid":"04/6217","text":"Huadong Ma"}]},"title":"Analysis of Data Delivery Delay in Acoustic Sensor Networks.","venue":"EUC","pages":"283-287","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/WangSM08","doi":"10.1109/EUC.2008.21","ee":"https://doi.org/10.1109/EUC.2008.21","url":"https://dblp.org/rec/conf/euc/WangSM08"}, "url":"URL#5343477" }, { "@score":"1", "@id":"5343482", "info":{"authors":{"author":[{"@pid":"x/NaixueXiong","text":"Naixue Xiong"},{"@pid":"y/LaurenceTianruoYang","text":"Laurence Tianruo Yang"},{"@pid":"99/4094","text":"Yaoxue Zhang"},{"@pid":"69/5468","text":"Yuezhi Zhou"},{"@pid":"22/393","text":"Yingshu Li"}]},"title":"Design and Analysis of a Stable Queue Control Scheme for the Internet.","venue":"EUC","pages":"378-384","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/XiongYZZL08","doi":"10.1109/EUC.2008.179","ee":"https://doi.org/10.1109/EUC.2008.179","url":"https://dblp.org/rec/conf/euc/XiongYZZL08"}, "url":"URL#5343482" }, { "@score":"1", "@id":"5343483", "info":{"authors":{"author":[{"@pid":"96/6747","text":"Junfeng Xu"},{"@pid":"21/6280","text":"Keqiu Li"},{"@pid":"51/3800","text":"Yanming Shen"},{"@pid":"35/295","text":"Jian Liu"}]},"title":"An Energy-Efficient Waiting Caching Algorithm in Wireless Sensor Networks.","venue":"EUC","pages":"323-329","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/XuLSL08","doi":"10.1109/EUC.2008.39","ee":"https://doi.org/10.1109/EUC.2008.39","url":"https://dblp.org/rec/conf/euc/XuLSL08"}, "url":"URL#5343483" }, { "@score":"1", "@id":"5343487", "info":{"authors":{"author":[{"@pid":"16/5875","text":"Wenwei Xue"},{"@pid":"91/6061","text":"Hung Keng Pung"},{"@pid":"75/7391","text":"Wen Long Ng"},{"@pid":"65/4916","text":"Tao Gu"}]},"title":"Data Management for Context-Aware Computing.","venue":"EUC","pages":"492-498","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/XuePNG08","doi":"10.1109/EUC.2008.27","ee":"https://doi.org/10.1109/EUC.2008.27","url":"https://dblp.org/rec/conf/euc/XuePNG08"}, "url":"URL#5343487" }, { "@score":"1", "@id":"5343488", "info":{"authors":{"author":[{"@pid":"72/7448","text":"Yunpei Yan"},{"@pid":"51/1742","text":"Guihai Chen"},{"@pid":"d/SajalKDas","text":"Sajal K. Das 0001"}]},"title":"A Collaboration-based Storage Management Scheme in Multimedia Sensor Networks.","venue":"EUC","pages":"288-294","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/YanCD08","doi":"10.1109/EUC.2008.85","ee":"https://doi.org/10.1109/EUC.2008.85","url":"https://dblp.org/rec/conf/euc/YanCD08"}, "url":"URL#5343488" }, { "@score":"1", "@id":"5343490", "info":{"authors":{"author":{"@pid":"80/2877","text":"Xinfeng Ye"}},"title":"Countering DDoS and XDoS Attacks against Web Services.","venue":"EUC","pages":"346-352","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/Ye08","doi":"10.1109/EUC.2008.61","ee":"https://doi.org/10.1109/EUC.2008.61","url":"https://dblp.org/rec/conf/euc/Ye08"}, "url":"URL#5343490" }, { "@score":"1", "@id":"5343494", "info":{"authors":{"author":[{"@pid":"53/6470","text":"Ting Yuan"},{"@pid":"32/1821","text":"Jianqing Ma"},{"@pid":"44/6482","text":"YiPing Zhong"},{"@pid":"05/692","text":"Shiyong Zhang"}]},"title":"Efficient Self-Healing Key Distribution with Limited Group Membership for Communication-Constrained Networks.","venue":"EUC","pages":"453-458","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/YuanMZZ08","doi":"10.1109/EUC.2008.23","ee":"https://doi.org/10.1109/EUC.2008.23","url":"https://dblp.org/rec/conf/euc/YuanMZZ08"}, "url":"URL#5343494" }, { "@score":"1", "@id":"5343497", "info":{"authors":{"author":[{"@pid":"98/3076","text":"Gang Zeng"},{"@pid":"68/1314","text":"Hiroyuki Tomiyama"},{"@pid":"40/5811","text":"Hiroaki Takada"},{"@pid":"29/4628","text":"Tohru Ishihara"}]},"title":"A Generalized Framework for System-Wide Energy Savings in Hard Real-Time Embedded Systems.","venue":"EUC","pages":"206-213","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ZengTTI08","doi":"10.1109/EUC.2008.101","ee":"https://doi.org/10.1109/EUC.2008.101","url":"https://dblp.org/rec/conf/euc/ZengTTI08"}, "url":"URL#5343497" }, { "@score":"1", "@id":"5343498", "info":{"authors":{"author":{"@pid":"99/4094","text":"Yaoxue Zhang"}},"title":"The Challenges and Opportunities in Transparent Computing.","venue":"EUC","pages":"3","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/Zhang08","doi":"10.1109/EUC.2008.188","ee":"https://doi.org/10.1109/EUC.2008.188","url":"https://dblp.org/rec/conf/euc/Zhang08"}, "url":"URL#5343498" }, { "@score":"1", "@id":"5343499", "info":{"authors":{"author":{"@pid":"37/4356-1","text":"Xiaodong Zhang 0001"}},"title":"Research Issues and Challenges to Advance System Software for Multicore Processors and Data-Intensive Applications.","venue":"EUC","pages":"4","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/Zhang08a","doi":"10.1109/EUC.2008.189","ee":"https://doi.org/10.1109/EUC.2008.189","url":"https://dblp.org/rec/conf/euc/Zhang08a"}, "url":"URL#5343499" }, { "@score":"1", "@id":"5343500", "info":{"authors":{"author":[{"@pid":"96/5556-2","text":"Liqiang Zhang 0002"},{"@pid":"73/4412","text":"Yu-Jen Cheng"},{"@pid":"13/6395-2","text":"Xiaobo Zhou 0002"}]},"title":"RADAR: Rate-Alert Dynamic RTS/CTS Exchange for Performance Enhancement in Multi-Rate Wireless Networks.","venue":"EUC","pages":"245-251","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ZhangCZ08","doi":"10.1109/EUC.2008.19","ee":"https://doi.org/10.1109/EUC.2008.19","url":"https://dblp.org/rec/conf/euc/ZhangCZ08"}, "url":"URL#5343500" }, { "@score":"1", "@id":"5343501", "info":{"authors":{"author":[{"@pid":"23/6185-2","text":"Yuanyuan Zhang 0002"},{"@pid":"72/1963","text":"Dawu Gu"},{"@pid":"p/BartPreneel","text":"Bart Preneel"}]},"title":"Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks.","venue":"EUC","pages":"272-279","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ZhangGP08","doi":"10.1109/EUC.2008.10","ee":"https://doi.org/10.1109/EUC.2008.10","url":"https://dblp.org/rec/conf/euc/ZhangGP08"}, "url":"URL#5343501" }, { "@score":"1", "@id":"5343503", "info":{"authors":{"author":[{"@pid":"50/6759-27","text":"Liang Zhang 0027"},{"@pid":"75/1099","text":"Beihong Jin"},{"@pid":"c/JiannongCao","text":"Jiannong Cao 0001"}]},"title":"AMBP: An Adaptive Mailbox Based Protocol for Mobile Agent Communication.","venue":"EUC","pages":"431-437","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ZhangJC08","doi":"10.1109/EUC.2008.26","ee":"https://doi.org/10.1109/EUC.2008.26","url":"https://dblp.org/rec/conf/euc/ZhangJC08"}, "url":"URL#5343503" }, { "@score":"1", "@id":"5343510", "info":{"authors":{"author":[{"@pid":"99/7448","text":"Majun Zheng"},{"@pid":"56/2373-10","text":"Jing Xie 0010"},{"@pid":"37/5644","text":"Zhigang Mao"},{"@pid":"27/3343-1","text":"Yongxin Zhu 0001"}]},"title":"A Hybrid Anti-Collision Algorithm for RFID with Enhanced Throughput and Reduced Memory Consumption.","venue":"EUC","pages":"259-265","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ZhengXMZ08","doi":"10.1109/EUC.2008.103","ee":"https://doi.org/10.1109/EUC.2008.103","url":"https://dblp.org/rec/conf/euc/ZhengXMZ08"}, "url":"URL#5343510" }, { "@score":"1", "@id":"5343513", "info":{"authors":{"author":[{"@pid":"36/2728","text":"Yu Zhou"},{"@pid":"70/2221","text":"Hui Guo"}]},"title":"Application Specific Low Power ALU Design.","venue":"EUC","pages":"214-220","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ZhouG08","doi":"10.1109/EUC.2008.81","ee":"https://doi.org/10.1109/EUC.2008.81","url":"https://dblp.org/rec/conf/euc/ZhouG08"}, "url":"URL#5343513" }, { "@score":"1", "@id":"5343515", "info":{"authors":{"author":[{"@pid":"79/7448","text":"Zhuojun Zhuang"},{"@pid":"90/6959-3","text":"Yuan Luo 0003"},{"@pid":"l/MingluLi","text":"Minglu Li 0001"},{"@pid":"81/6809","text":"Chuliang Weng"}]},"title":"A Reasonable Approach for Defining Load Index in Parallel Computing.","venue":"EUC","pages":"467-473","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ZhuangLLW08","doi":"10.1109/EUC.2008.83","ee":"https://doi.org/10.1109/EUC.2008.83","url":"https://dblp.org/rec/conf/euc/ZhuangLLW08"}, "url":"URL#5343515" }, { "@score":"1", "@id":"5428057", "info":{"authors":{"author":[{"@pid":"x/ChengZhongXu","text":"Cheng-Zhong Xu 0001"},{"@pid":"99/6797","text":"Minyi Guo"}]},"title":"2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume I","venue":"EUC","publisher":"IEEE Computer Society","year":"2008","type":"Editorship","key":"conf/euc/2008-1","ee":"https://ieeexplore.ieee.org/xpl/conhome/4755182/proceeding","url":"https://dblp.org/rec/conf/euc/2008-1"}, "url":"URL#5428057" }, { "@score":"1", "@id":"5437358", "info":{"title":"Research on a Novel Multicast Routing Hybrid Optimization Algorithm and Its Application.","venue":"EUC","pages":"339-345","year":"2008","type":"Withdrawn Items","access":"withdrawn","key":"conf/euc/ShiJX08","doi":"10.1109/EUC.2008.191","ee":"https://doi.org/10.1109/EUC.2008.191","url":"https://dblp.org/rec/conf/euc/ShiJX08"}, "url":"URL#5437358" } ] } } } )