


default search action
EUC 2008: Shanghai, China
- Cheng-Zhong Xu, Minyi Guo:

2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume I. IEEE Computer Society 2008, ISBN 978-0-7695-3492-3
Keynote Speeches
- Yaoxue Zhang:

The Challenges and Opportunities in Transparent Computing. 3 - Xiaodong Zhang:

Research Issues and Challenges to Advance System Software for Multicore Processors and Data-Intensive Applications. 4 - Tarek F. Abdelzaher:

Research Challenges in Distributed Cyber-Physical Systems. 5
Hardware/Software Co-Design
- Archana Kalyansundar, Rita Chattopadhyay:

A Novel Approach to Hardware Architecture Design and Advanced Optimization Techniques for Time Critical Applications. 9-15 - Hiroki Hoshino, Ben A. Abderazek

, Kenichi Kuroda:
Advanced Optimization and Design Issues of a 32-Bit Embedded Processor Based on Produced Order Queue Computation Model. 16-22 - Zhe Peng, Longhua Ma, Feng Xia

:
A Low-Cost Embedded Controller for Complex Control Systems. 23-29 - Taichi Maekawa, Ben A. Abderazek

, Kenichi Kuroda:
Single Instruction Dual-Execution Model Processor Architecture. 30-36 - Anderson Kuei-An Ku, Jenny Yi-Chun Kuo, Jingling Xue

:
Hardware Support for Efficient Sparse Matrix Vector Multiplication. 37-43 - Koji Shigemoto, Kensuke Kawakami, Koji Nakano

:
Accelerating Montgomery Modulo Multiplication for Redundant Radix-64k Number System on the FPGA Using Dual-Port Block RAMs. 44-51 - Linfeng Pan, Minyi Guo, Yanqin Yang, Meng Wang, Zili Shao

:
A State-Based Predictive Approach for Leakage Reduction of Functional Units. 52-58 - Robert Günzel:

Automatic Integration of Non-Bus Hardware IP into SoC-Platforms for Use by Software. 59-65 - Mostafa Jafari-Nodoushan, Seyed Ghassem Miremadi, Alireza Ejlali:

Control-Flow Checking Using Branch Instructions. 66-72
Real-Time and Cyber-Physical Systems
- Sojan Markose, Xiaoqing Frank Liu, Bruce M. McMillin

:
A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems. 75-81 - Shinpei Kato, Nobuyuki Yamasaki:

Scheduling Aperiodic Tasks Using Total Bandwidth Server on Multiprocessors. 82-89 - Bing Du, Chun Ruan:

Robust Feedback Control Scheduling in Distributed Embedded Real-Time Systems. 90-96 - Fei Huang, Binoy Ravindran

, E. Douglas Jensen:
RT-P2P: A Scalable Real-Time Peer-to-Peer System with Probabilistic Timing Assurances. 97-103 - Mingsong Lv

, Zonghua Gu, Nan Guan
, Qingxu Deng, Ge Yu:
Performance Comparison of Techniques on Static Path Analysis of WCET. 104-111 - Kohta Nakamura, Masahiro Ogawa, Takahiro Koita, Kenya Sato

:
Implementation and Evaluation of Caching Method to Increase the Speed of UPnP Gateway. 112-118 - Driss Choujaa, Naranker Dulay:

TRAcME: Temporal Activity Recognition Using Mobile Phone Data. 119-126
Embedded Software Optimization
- Chin-Chen Chang, Chin-Feng Lee, Yi-Ren Wang:

An Improved EMD Embedding Scheme Based on Secret Image Difference. 129-135 - Lei Sun, Tatsuo Nakajima:

A Lightweight Detection and Recovery Infrastructure of Kernel Objects for Embedded Systems. 136-143 - Wataru Kanda, Yu Yumura, Yuki Kinebuchi, Kazuo Makijima, Tatsuo Nakajima:

SPUMONE: Lightweight CPU Virtualization Layer for Embedded Systems. 144-151 - Shih-Hao Hung

, Chien-Cheng Wu, Chia-Heng Tu:
Optimizing the Embedded Caching and Prefetching Software on a Network-Attached Storage System. 152-161 - Maobing Dai, Toshihiro Matsui, Yutaka Ishikawa:

A Light Lock Management Mechanism for Optimizing Real-Time and Non-Real-Time Performance in Embedded Linux. 162-168 - Dong-Heon Jung, Soo-Mook Moon, Sung-Hwan Bae:

Design and Optimization of a Java Ahead-of-Time Compiler for Embedded Systems. 169-175 - Chantana Phongpensri, Krisana Sripanomwan:

Different Fuzzy Parameter Selection Based on Multiple Criteria for Microcontroller. 176-182
Power-Aware Computing
- Yu Sun, Wei Zhang

:
Adaptive Drowsy Cache Control for Java Applications. 185-191 - Meikang Qiu, Jiande Wu, Jingtong Hu

, Yi He, Edwin Hsing-Mean Sha:
Dynamic and Leakage Power Minimization with Loop Voltage Scheduling and Assignment. 192-198 - Seyed Mohammad Hossein Shekarian

, Alireza Ejlali, Seyed Ghassem Miremadi:
A Low Power Error Detection Technique for Floating-Point Units in Embedded Applications. 199-205 - Gang Zeng, Hiroyuki Tomiyama, Hiroaki Takada, Tohru Ishihara

:
A Generalized Framework for System-Wide Energy Savings in Hard Real-Time Embedded Systems. 206-213 - Yu Zhou, Hui Guo:

Application Specific Low Power ALU Design. 214-220
Wireless Networks
- Yahya M. Tashtoush

, Mohammed A. Okour:
Fuzzy Self-Clustering for Wireless Sensor Networks. 223-229 - David A. Knox, Thomas Kunz:

Secure Authentication in Wireless Sensor Networks Using RF Fingerprints. 230-237 - Romeo Said, Yves Mahéo

:
Toward a Platform for Service Discovery and Invocation in Disconnected Mobile Ad Hoc Networks. 238-244 - Liqiang Zhang, Yu-Jen Cheng, Xiaobo Zhou:

RADAR: Rate-Alert Dynamic RTS/CTS Exchange for Performance Enhancement in Multi-Rate Wireless Networks. 245-251 - Qiuxia Chen, Dik Lun Lee

, Wang-Chien Lee:
Rule-Based WiFi Localization Methods. 252-258 - Majun Zheng, Jing Xie, Zhigang Mao, Yongxin Zhu:

A Hybrid Anti-Collision Algorithm for RFID with Enhanced Throughput and Reduced Memory Consumption. 259-265 - Murad Khalid, In-ho Ra, Young Hoon Joo

, Ravi Sankar
:
A Scenario-based Directional Communication Performance in Wireless Ad hoc Networks. 266-271 - Yuanyuan Zhang, Dawu Gu, Bart Preneel

:
Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks. 272-279
Sensor Networks
- Chao Wang, Yan Sun, Huadong Ma:

Analysis of Data Delivery Delay in Acoustic Sensor Networks. 283-287 - Yunpei Yan, Guihai Chen

, Sajal K. Das
:
A Collaboration-based Storage Management Scheme in Multimedia Sensor Networks. 288-294 - Weijia Li, Yu Du, Youtao Zhang, Bruce R. Childers, Ping Zhou, Jun Yang:

Adaptive Buffer Management for Efficient Code Dissemination in Multi-Application Wireless Sensor Networks. 295-301 - Hongyang Chen

, Marcelo H. T. Martins, Pei Huang, Hing-Cheung So, Kaoru Sezaki:
Cooperative Node Localization for Mobile Sensor Networks. 302-308 - Yu-Kai Huang, Pi-Cheng Hsiu

, Wei-Ni Chu, Kuan-Chang Hung, Ai-Chun Pang, Tei-Wei Kuo
, Min Di, Hua-Wei Fang:
An Integrated Deployment Tool for ZigBee-Based Wireless Sensor Networks. 309-315 - Chih-Min Chao, Yi-Wei Lee:

Quorum-Based Energy Saving MAC Protocol Design for Wireless Sensor Networks. 316-322 - Junfeng Xu, Keqiu Li, Yanming Shen, Jian Liu:

An Energy-Efficient Waiting Caching Algorithm in Wireless Sensor Networks. 323-329 - Wenjun Liu, Yue Sun, Jiguo Yu

, Baoxiang Cao:
A Grid-Based Distributed Multi-Hop Routing Protocol for Wireless Sensor Networks. 330-336
Network Protocols
- (Withdrawn) Research on a Novel Multicast Routing Hybrid Optimization Algorithm and Its Application. 339-345

- Xinfeng Ye:

Countering DDoS and XDoS Attacks against Web Services. 346-352 - Canwen Xiao, Minxuan Zhang, Yong Dou, Zhitong Zhao:

Dimensional Bubble Flow Control and Fully Adaptive Routing in the 2-D Mesh Network on Chip. 353-358 - Ze Li, Haiying Shen:

A Direction Based Geographic Routing Scheme for Intermittently Connected Mobile Networks. 359-365 - Ehsan Mousavi Khaneghah

, Seyedeh Leili Mirtaheri, Mohsen Sharifi
:
Evaluating the Effect of Inter Process Communication Efficiency on High Performance Distributed Scientific Computing. 366-372 - Shijun Lin, Li Su, Haibo Su, Depeng Jin, Lieguang Zeng:

Hierarchical Cluster-Based Irregular Topology Customization for Networks-on-Chip. 373-377 - Naixue Xiong, Laurence Tianruo Yang, Yaoxue Zhang, Yuezhi Zhou, Yingshu Li

:
Design and Analysis of a Stable Queue Control Scheme for the Internet. 378-384
Context-Aware Computing
- Yu Huang, Xiang Ma, XianPing Tao, Jiannong Cao

, Jian Lu:
A Probabilistic Approach to Consistency Checking for Pervasive Context. 387-393 - Sébastien Duval, Christian Hoareau, Hiromichi Hashizume:

Human Universality in Ubiquitous Computing: Maslow, Where Are You? 394-400 - Jorge L. V. Barbosa

, Rodrigo Hahn, Débora Nice Ferrari Barbosa
, Cláudio Fernando Resin Geyer:
Learning in Small and Large Ubiquitous Computing Environments. 401-407 - Jingde Cheng:

Testing and Debugging Persistent Computing Systems: A New Challenge in Ubiquitous Computing. 408-414
Middleware and Peer-to-Peer
- Hung-Chang Hsiao, I-Ta Lin, Hao Liao:

Load Balancing in Peer-to-Peer Networks Based on Sampling System States. 417-423 - Guowei Huang, Zhi Chen, Ying Wu, Gongyi Wu:

The Effect of Routing-Load Dispersion on Congestion Control in Structured P2P Networks. 424-430 - Liang Zhang, Beihong Jin, Jiannong Cao

:
AMBP: An Adaptive Mailbox Based Protocol for Mobile Agent Communication. 431-437 - Yuhong Feng, Jiannong Cao

, Ivan Lau, Xuan Liu:
A Self-configuring Personal Agent Platform for Pervasive Computing. 438-444
Multiagent Systems
- Jindian Su, Shanshan Yu, Heqing Guo:

Dynamic Substitutability Analysis of Web Service Composition via Extended Pi-Calculus. 447-452 - Ting Yuan, Jianqing Ma, YiPing Zhong, Shiyong Zhang:

Efficient Self-Healing Key Distribution with Limited Group Membership for Communication-Constrained Networks. 453-458 - Beihong Jin, Zhi Zang, Liang Zhang:

An Empirical Study on Interoperability between Service Discovery Protocols. 459-466 - Zhuojun Zhuang, Yuan Luo, Minglu Li, Chuliang Weng:

A Reasonable Approach for Defining Load Index in Parallel Computing. 467-473
Multimedia and Data Management
- Xiaochun Wang, Yuanchun Shi:

UMDD: User Model Driven Software Development. 477-483 - Ashraf Armoush, Falk Salewski, Stefan Kowalewski:

A Hybrid Fault Tolerance Method for Recovery Block with a Weak Acceptance Test. 484-491 - Wenwei Xue, Hung Keng Pung, Wen Long Ng, Tao Gu:

Data Management for Context-Aware Computing. 492-498 - Weiwei Sun, Zhuoyao Zhang, Ping Yu, Yongrui Qin

:
Efficient Data Scheduling for Multi-item Queries in On-Demand Broadcast. 499-505 - Chin-Chen Chang, Wei-Liang Tai

, Kuo-Nan Chen:
Lossless Data Hiding Based on Histogram Modification for Image Authentication. 506-511 - Wenbin Jiang

, Chong Huang, Hai Jin, Xiaofei Liao:
A New Proxy Scheme for Large-Scale P2P VoD System. 512-518 - Rong-Jhang Liao, Pei-Lun Suei, Yung-Feng Lu, Tei-Wei Kuo

, Chun-Sho Lee:
A Signature-based Grid Index Design for RFID Main-Memory Databases. 519-525

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














