default search action
12th CSE 2009: Vanoucer, BC, Canada - Volume 2
- Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009. IEEE Computer Society 2009, ISBN 978-1-4244-5334-4
The 7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2009)
Embedded Systems and HW/SW Codesign
- Sebastian Hessel, David Szczesny, Shadi Traboulsi, Attila Bilgic, Josef Hausner:
On the Design of a Suitable Hardware Platform for Protocol Stack Processing in LTE Terminals. 1-8 - Sheng-Wei Huang, Yung-Chang Chiu, Zhong-Ho Chen, Ce-Kuen Shieh, Alvin Wen-Yu Su, Tyng-Yeu Liang:
A Region-Based Allocation Approach for Page-Based Scratch-Pad Memory in Embedded Systems. 9-16 - Joseph Reddington, Gregory Z. Gutin, Adrian Johnstone, Elizabeth Scott, Anders Yeo:
Better Than Optimal: Fast Identification of Custom Instruction Candidates. 17-24
Multimedia and Data Management
- Xingang Liu, Wei Zhu, Kook-Yeol Yoo:
Fast Inter Mode Decision Algorithm Based on the MB Activity for MPEG-2 to H.264/AVC Transcoding. 25-30 - Yi-Chi Chen, Hui-Chin Yang, Chung-Ping Chung, Wei-Ting Wang:
Dynamic Reconfigurable Shaders with Load Balancing for Embedded Graphics Processing. 31-36 - Fei Hao, Zhenjiang Miao, Ping Guo, Zhan Xu:
Real Time Multiple Object Tracking Using Tracking Matrix. 37-41 - Soad Ibrahim, Michael Wirth:
Visible and IR Data Fusion Technique Using the Contourlet Transform. 42-47
Power-Aware Computing
- Meikang Qiu, Laurence Tianruo Yang, Edwin Hsing-Mean Sha:
Rotation Scheduling and Voltage Assignment to Minimize Energy for SoC. 48-55 - Mu-Kai Huang, J. Morris Chang, Wei-Mei Chen:
Grouping-Based Dynamic Power Management for Multi-threaded Programs in Chip-Multiprocessors. 56-63 - Mahmood Ahmadi, Stephan Wong:
K-Stage Pipelined Bloom Filter for Packet Classification. 64-70
Sensor Networks
- Alan Marchiori, Qi Han:
A Two-Stage Bootloader to Support Multi-application Deployment and Switching in Wireless Sensor Networks. 71-78 - Long Cheng, Canfeng Chen, Jian Ma, Lei Shu, Hongyang Chen, Laurence Tianruo Yang:
Residual Time Aware Forwarding for Randomly Duty-Cycled Wireless Sensor Networks. 79-86 - Ying Zhu, Qi Han:
The More Relay Nodes, the More Energy Efficient? 87-92 - Sudha Krishnamurthy, Geethapriya Thamilarasu, Christian Bauckhage:
MALADY: A Machine Learning-Based Autonomous Decision-Making System for Sensor Networks. 93-100 - Hyun-Sung Park, Jong-Deok Kim:
Design of an RFID Air Protocol Filtering Technique. 101-108 - Marcin Brzozowski, Hendrik Salomon, Peter Langendörfer:
Completely Distributed Low Duty Cycle Communication for Long-Living Sensor Networks. 109-116
Wireless Communications
- Naixue Xiong, Laurence Tianruo Yang, Yuanyuan Zeng, Chao Ma, Jong Hyuk Park:
Implementation of Rate Control in Distributed Wireless Multicast by Neural Network Prediction. 117-124 - Dineshbalu Balakrishnan, Amiya Nayak, Pulak Dhar:
Adaptive and Intelligent Route Learning for Mobile Assets Using Geo-tracking and Context Profiles. 125-132 - Divya Sardana, Qing-An Zeng:
Control-Channel-Reuse-Based Multiple-Channel MAC (CRM-MAC) for Ad Hoc Networks. 133-139
Middleware and P2P
- Xinuo Chen, Stephen A. Jarvis:
Analysing BitTorrent's Seeding Strategies. 140-149 - Xinfeng Ye, Yi Chen:
A Middleware for Controlling the Execution of Composite Services. 150-157 - Mayank Pandey, Syed Mushtaq Ahmed, Banshi Dhar Chaudhary:
2T-DHT: A Two Tier DHT for Implementing Publish/Subscribe. 158-165 - Andrej van der Zee, Alexandre Courbot, Tatsuo Nakajima:
mBrace: Action-Based Performance Monitoring of Multi-tier Web Applications. 166-173
Embedded Software and Optimization I
- Jyh-Shian Wang, I-Wei Wu, Yu-Sheng Chen, Jean Jyh-Jiun Shann, Wei-Chung Hsu:
Reducing Code Size by Graph Coloring Register Allocation and Assignment Algorithm for Mixed-Width ISA Processor. 174-181 - Takuya Azumi, Hiroaki Takada, Hiroshi Oyama:
Optimization of Component Connections for an Embedded Component System. 182-188 - Un-Keun Yoon, Han-joon Kim:
Improving Hybrid Flash-Disk Storage by Incorporating Sequential Pattern Mining into Fully-Associative Sector Translation. 189-196
Pervasive and Ubiquitous Computing I
- Rocco Aversa, Beniamino Di Martino, Salvatore Venticinque:
Distributed Agents Network for Ubiquitous Monitoring and Services Exploitation. 197-204 - Daqiang Zhang, Jiannong Cao, Jingyu Zhou, Minyi Guo:
Extended Dempster-Shafer Theory in Context Reasoning for Ubiquitous Computing Environments. 205-212 - Tomomi Kawashima, Jianhua Ma, Runhe Huang, Bernady O. Apduhan:
GUPSS: A Gateway-Based Ubiquitous Platform for Smart Space. 213-220 - Jonathan Cazalas, Kien A. Hua:
Leveraging Computation Sharing and Parallel Processing in Location-Based Services. 221-228 - Shandan Zhou, Xingshe Zhou, Zhiwen Yu, Kaibo Wang, Haipeng Wang, Hongbo Ni:
A Recommendation Framework towards Personalized Services in Intelligent Museum. 229-236
Dependable, Autonomic, Secure Computing
- James J. Treinen, Ramakrishna Thurimella:
Finding the Needle: Suppression of False Alarms in Large Intrusion Detection Data Sets. 237-244 - André Luiz B. Rodrigues, Leila N. Bezerra, Alexandre Sztajnberg, Orlando Loques:
Self-Adaptation of Fault Tolerance Requirements Using Contracts. 245-253 - Jesse Sathre, Alex Baumgarten, Joseph Zambreno:
Architectural Support for Automated Software Attack Detection, Recovery, and Prevention. 254-261
Real-Time and Cyber-Physical Systems
- Mike Holenderski, Reinder J. Bril, Johan J. Lukkien:
Swift Mode Changes in Memory Constrained Real-Time Systems. 262-269 - Mingsong Lv, Nan Guan, Yi Zhang, Rui Chen, Qingxu Deng, Ge Yu, Wang Yi:
WCET Analysis of the mC/OS-II Real-Time Kernel. 270-276 - Khurram Jawed, John Morris, Tariq Khan, Georgy L. Gimel'farb:
Real Time Rectification for Stereo Correspondence. 277-284 - Luís Nogueira, Luís Miguel Pinho, Jorge Coelho:
Coordinated Runtime Adaptations in Cooperative Open Real-Time Systems. 285-294 - Huthaifa Al-Omari, Francis G. Wolff, Christos A. Papachristou, David R. McIntyre:
Avoiding Delay Jitter in Cyber-Physical Systems Using One Way Delay Variations Model. 295-302
Pervasive and Ubiquitous Computing II
- Roman Amstutz, Oliver Amft, Brian French, Asim Smailagic, Daniel P. Siewiorek, Gerhard Tröster:
Performance Analysis of an HMM-Based Gesture Recognition Using a Wristwatch Device. 303-309 - Hyun-Sung Park, Seung-Chur Yang, Doo-Hwan Oh, Jong-Deok Kim:
Design and Implementation of WLAN-Based Automatic Vehicle Identification. 310-317 - Runhe Huang, Jianhua Ma, Qun Jin:
A Tree-Structured Intelligence Entity Pool and Its Sharing among Ubiquitous Objects. 318-325 - Yunpu Zhu, Jacqueline E. Rice:
A Lightweight Architecture for Secure Two-Party Mobile Payment. 326-333
Embedded Software and Optimization II
- Je-Hyung Lee, Soo-Mook Moon, Hyung-Kyu Choi:
Comparison of Bank Change Mechanisms for Banked Reduced Encoding Architectures. 334-341 - Joel Koshy, Raju Pandey, Ingwar Wirjawan:
Optimizing Embedded Virtual Machines. 342-351 - Chung-Wen Huang, Kun-Yuan Hsieh, Jia-Jhe Li, Jenq Kuen Lee:
Support of Paged Register Files for Improving Context Switching on Embedded Processors. 352-357 - Yanqin Yang, Meng Wang, Zili Shao, Minyi Guo:
Dynamic Scratch-Pad Memory Management with Data Pipelining for Embedded Systems. 358-365 - Fahime Moein-darbari, Ahmad Khademzadeh, Golnar Gharooni-fard:
Evaluating the Performance of a Chaos Genetic Algorithm for Solving the Network on Chip Mapping Problem. 366-373 - Yu-Hsun Lin, Xuan-Yi Lin, Yeh-Ching Chung:
Reducing Leakage Power of JPEG Image on Asymmetric SRAM. 374-381
The 2009 IEEE/IFIP International Symposium on Embedded and Pervasive Systems (EPS 2009)
Real-Time Embedded Systems
- Hugo Marcondes, Rafael Luiz Cancian, Marcelo Ricardo Stemmer, Antônio Augusto Fröhlich:
On the Design of Flexible Real-Time Schedulers for Embedded Systems. 382-387 - Maobing Dai, Yutaka Ishikawa:
Delayed Interrupt Processing Technique for Reducing Latency of Timer Interrupt in Embedded Linux. 388-393 - Mariusz Pelc, Richard Anthony, Paul Ward, James Hawthorne:
Practical Implementation of a Middleware and Software Component Architecture Supporting Reconfigurability of Real-Time Embedded Systems. 394-401
Data Management and Multimedia
- Chung-Ping Chung, Hong-Wei Chen, Hui-Chin Yang:
Blocked-Z Test for Reducing Rasterization, Z Test and Shading Workloads. 402-407 - Chih-Chieh Hsiao, Chung-Ping Chung, Hui-Chin Yang:
A Hierarchical Primitive Lists Structure for Tile-Based Rendering. 408-413 - Hsiu-ching Hsieh, Chih-Chieh Hsiao, Hui-Chin Yang, Chung-Ping Chung, Jean Jyh-Jiun Shann:
Methods for Precise False-Overlap Detection in Tile-Based Rendering. 414-419 - Chung-Ping Chung, Tung-Lin Lu, Hui-Chin Yang:
H-Buffer: An Efficient History-Based and Overflow Sharing Transparent Fragment Storage Method. 420-425 - Feiyu Lin, Christopher Henricsson, Syed Muhammad Abbas, Kurt Sandkuhl:
HyperCircle: An Efficient Broadcast Protocol for Super-Peer P2P Networks. 426-433
Wireless Communications
- Vineet Joshi, Xuefu Zhu, Qing-An Zeng:
Caching-Based Multipath Routing Protocol. 434-439 - Fang-Yie Leu, Yao-Tian Huang, Pei-Xun Leu:
A Coordinating Multiple Channel Assignment Scheme and AP Deployment in Wireless Networks. 440-445 - Hyun-Sung Park, Seung-Ho Han, Jong-Deok Kim:
Analysis of Vehicular Roaming through Multiple WLAN APs in Container Terminal. 446-451
Mobile Computing
- Antoniya Petkova, Kien A. Hua, Alexander J. Aved:
Processing Approximate Moving Range Queries in Mobile Sensor Environments. 452-457 - Kurt Geihs, Roland Reichle, Michael Wagner, Mohammad Ullah Khan:
Service-Oriented Adaptation in Ubiquitous Computing Environments. 458-463 - Amine Dhraief, Nicolas Montavont:
Rehoming Decision Algorithm: Design and Empirical Evaluation. 464-469 - Yanqin Yang, Minyi Guo, Feilong Tang, Gongwei Zhang:
Black Bridge: A Scatternet Formation Algorithm for Solving a New Emerging Problem. 470-475 - Shengrong Bu, Peter Xiaoping Liu:
Choosing Service Directory Nodes in Proposed Service Discovery Model for Mobile Ad Hoc Networks. 476-480 - Olapeju Latifat Ayoola, Eleni Mangina Phelan:
Accumulating a Personalised Ubiquitous Learning Platform for Enhancing the Third Level Educational Experience. 481-486
Reliability and Security
- Kunjan Patel, Jong Chern Lim, Chris J. Bleakley, Wim Vanderbauwhede:
MAW: A Reliable Lightweight Multi-hop Wireless Sensor Network Routing Protocol. 487-493 - Ang Gao, Wei Wei, Zhixiao Wang, Wenyao Yan:
A Hierarchical Authentication Scheme for the Different Radio Ranges Sensor Networks. 494-501 - Lonnie Langle, Ram Dantu:
Are You a Safe Driver? 502-507
Optimization and HW/SW Codesigns
- Joon-Young Paik, Eun-Sun Cho, Tae-Sun Chung:
Performance Improvement for Flash Memories Using Loop Optimization. 508-513 - Jih-Ching Chiu, Ta-Li Yeh, Mun-Kit Leong:
The Software and Hardware Integration Linker for Reconfigurable Embedded System. 520-525 - Gul N. Khan, Anika Awwal:
Codesign of Embedded Systems with Process/Module Level Real-Time Deadlines. 526-531 - Chris Wynnyk, Malik Magdon-Ismail:
Pricing the American Option Using Reconfigurable Hardware. 532-536
Power/Energy-Aware Computing
- Roy Chaoming Hsu, Cheng-Ting Liu, Kuan-Chieh Wang, Wei-Ming Lee:
QoS-Aware Power Management for Energy Harvesting Wireless Sensor Network Utilizing Reinforcement Learning. 537-542 - Kenji R. Yamamoto, Paul G. Flikkema:
Prospector: Multiscale Energy Measurement of Networked Embedded Systems with Wideband Power Signals. 543-549 - Ehssan Sakhaee, Naoki Wakamiya, Masayuki Murata:
Self-Organized Data-Energy-Aware Clustering and Routing for Wireless Sensor Networks. 550-557 - Rabindra Bista, Yong-Ki Kim, Young-Ho Choi, Jae-Woo Chang:
A New Energy-Balanced Data Aggregation Scheme in Wireless Sensor Networks. 558-563
Sensor Networks
- Tzung-Shi Chen, Hua-Wen Tsai, Chih-Wei Wei:
Dispatch of Mobile Resources in Wireless Sensor Networks. 564-569 - Abdulaziz Barnawi, Roshdy H. M. Hafez:
A Time & Energy Efficient Topology Discovery and Scheduling Protocol for Wireless Sensor Networks. 570-578 - Hyuntae Cho, Jeonsu Jung, Bongrae Cho, Youngwoo Jin, Seungwoo Lee, Yunju Baek:
Precision Time Synchronization Using IEEE 1588 for Wireless Sensor Networks. 579-586 - Stefano Abbate, Marco Avvenuti, Paolo Corsini, Alessio Vecchio:
Localization of Shipping Containers in Ports and Terminals Using Wireless Sensor Networks. 587-592 - Shahram Nourizadeh, Yeqiong Song, Jean-Pierre Thomesse:
A Failure Adapted, Load-Balanced Distributed Routing for Wireless Ad Hoc Sensor Networks. 593-596 - Chung-Horng Lung, Oliver W. W. Yang:
Evaluation of an Adaptive PI Rate Controller for Congestion Control in Wireless Ad-Hoc/Sensor Networks. 597-602
The 4th International Symposium on Cloud and Convergence Computing (2CCom 2009)
- Chang-Wu Lee, Sung-Won Kim, Heon-Jong Lee, Youn-Hee Han, Doo-Soon Park, Young-Sik Jeong:
Visualization of the Constrained Coverage of Mobile Sensor Networks Based on GML. 603-608 - HwaMin Lee, Doo-Soon Park, Min Hong, Sang-Soo Yeo, SooKyun Kim, SungHoon Kim:
A Resource Management System for Fault Tolerance in Grid Computing. 609-614 - Jin-Woo Kim, Kyeong Hur, Kwang-il Hwang, Doo Seop Eom:
A Distributed Reservation Protocol for Collision-Free Three-Hop Mobility Support in WiMedia MAC. 615-620 - Kwang-il Hwang, Sang-Soo Yeo, Jong Hyuk Park:
Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers. 621-626 - Seungku Kim, Jae-Ho Lee, Kwang-il Hwang, Kyeong Hur, Doo Seop Eom:
Reprogrammable Module-Linker for Energy-Efficient Wireless Sensor Networks. 627-632 - Eun-Jun Yoon, Kee-Young Yoo:
Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC. 633-640
The 2009 International Symposium on Trusted Computing and Communications (TrustCom 2009)
Trust Model, Propagation, and Management
- Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:
Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks. 641-650 - Lan Wang, Qishi Wu, Yaoqing Liu:
Design and Validation of PATRICIA for the Mitigation of Network Flooding Attacks. 651-658 - Marek Klonowski, Michal Przykucki, Tomasz Struminski:
Data Deletion with Time-Aware Adversary Model. 659-664 - Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka:
Obfuscation Mechanism in Conjunction with Tamper-Proof Module. 665-670 - Aimin Yu, Dengguo Feng, Ren Liu:
TBDRM: A TPM-Based Secure DRM Architecture. 671-677 - Chao Chen, Ke Wang, Shuren Liao, Qiuyan Zhang, Yiqi Dai:
A Novel Server-Based Application Execution Architecture. 678-683 - Latifa Boursas, Wolfgang Hommel:
Multidimensional Dynamic Trust Management for Federated Services. 684-689
Trusted Services and Applications
- Anderson Nunes Paiva Morais, Eliane Martins, Ana R. Cavalli, Willy Jimenez:
Security Protocol Testing Using Attack Trees. 690-697 - Maoxiang Yi, Huaguo Liang, Kaihua Zhan, Cuiyun Jiang:
Optimal LFSR-Coding Test Data Compression Based on Test Cube Dividing. 698-702 - Hui Hou, Jinzhao Wu:
Quasi-classical Semantics and Tableau Calculus of Description Logics for Paraconsistent Reasoning in the Semantic Web. 703-708 - Salman Abdul Moiz, Lakshmi Rajamani:
Concurrency Control Strategy to Reduce Frequent Rollbacks in Mobile Environments. 709-714
Cryptography and Security Protocols
- Qin Liu, Guojun Wang, Jie Wu:
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing. 715-720 - Rongwei Yu, Lina Wang, Xiaoyan Ma, Bo Kuang:
A Direct Anonymous Attestation Protocol Based on Hierarchical Group Signature. 721-726 - Zhenyu Wang, Jianhua Huang, Yu Wang, Xiangdong Li, Xuetao Sun, Ruimin Wang:
A Multi-party Contract Signing Protocol and Its Implementation via Trusted Computing. 727-731 - Yu Qin, Dengguo Feng, Zhen Xu:
An Anonymous Property-Based Attestation Protocol from Bilinear Maps. 732-738 - Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mahmud, Muhammad Khurram Khan:
Bio-chaotic Stream Cipher-Based Iris Image Encryption. 739-744
Reliability, Survivability, and Fault Tolerance
- Asmaa Adnane, Christophe Bidan, Rafael Timóteo de Sousa Júnior:
Trust-Based Countermeasures for Securing OLSR Protocol. 745-752 - Adrian P. Lauf, William H. Robinson:
Fault Tolerance in MANETs Using a Task-to-Resource Reallocation Framework. 753-758 - Wanfu Ding, Ruifeng Guo:
An Effective RM-Based Scheduling Algorithm for Fault-Tolerant Real-Time Systems. 759-764 - Gang Yin, Dian-xi Shi, Huaimin Wang, Min Guo:
RepCom: Towards Reputation Composition over Peer-to-Peer Communities. 765-771 - Zhiqian Xu, Hai Jiang:
HASS: Highly Available, Scalable and Secure Distributed Data Storage Systems. 772-780 - Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph:
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs. 781-786
Access Control and Authentication
- Fei Richard Yu, Helen Tang, Fei Wang, Victor C. M. Leung:
Distributed Node Selection for Threshold Key Management with Intrusion Detection in Mobile Ad Hoc Networks. 787-794 - Chenjia Wang, Kevin P. Monaghan, Weisong Shi:
HACK: A Health-Based Access Control Mechanism for Dynamic Enterprise Environments. 795-801 - Mohamed Ali Ayachi, Christophe Bidan, Tarek Abbes, Adel Bouhoula:
Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol. 802-808 - Wenchao Huang, Yan Xiong, Depin Chen:
DAAODV: A Secure Ad Hoc Routing Protocol Based on Direct Anonymous Attestation. 809-816