callback( { "result":{ "query":":facetid:toc:\"db/conf/euc/euc2004.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"197.59" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"109", "@dc":"109", "@oc":"109", "@id":"43380582", "text":":facetid:toc:db/conf/euc/euc2004.bht" } }, "hits":{ "@total":"109", "@computed":"109", "@sent":"109", "@first":"0", "hit":[{ "@score":"1", "@id":"6033869", "info":{"authors":{"author":[{"@pid":"11/5157","text":"Francesco Agostaro"},{"@pid":"g/AlessandroGenco","text":"Alessandro Genco"},{"@pid":"88/4766","text":"Salvatore Sorce"}]},"title":"A Collaborative Environment for Service Providing in Cultural Heritage Sites.","venue":"EUC","pages":"765-775","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/AgostaroGS04","doi":"10.1007/978-3-540-30121-9_73","ee":"https://doi.org/10.1007/978-3-540-30121-9_73","url":"https://dblp.org/rec/conf/euc/AgostaroGS04"}, "url":"URL#6033869" }, { "@score":"1", "@id":"6033870", "info":{"authors":{"author":[{"@pid":"68/5982","text":"Robson de Oliveira Albuquerque"},{"@pid":"s/RTdeSousaJ","text":"Rafael T. de Sousa Jr."},{"@pid":"87/503","text":"Tamer Américo da Silva"},{"@pid":"46/6088","text":"Ricardo Staciarini Puttini"},{"@pid":"121/9602","text":"Cláudia J. Barenco Abbas"}]},"title":"Survivability for a Network Service and Load Balancing Using Intelligent Agents Software.","venue":"EUC","pages":"734-744","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/AlbuquerqueSSPA04","doi":"10.1007/978-3-540-30121-9_70","ee":"https://doi.org/10.1007/978-3-540-30121-9_70","url":"https://dblp.org/rec/conf/euc/AlbuquerqueSSPA04"}, "url":"URL#6033870" }, { "@score":"1", "@id":"6033871", "info":{"authors":{"author":[{"@pid":"06/1861","text":"Patroklos G. Argyroudis"},{"@pid":"73/55","text":"Donal O'Mahony"}]},"title":"Securing Communications in the Smart Home.","venue":"EUC","pages":"891-902","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ArgyroudisO04","doi":"10.1007/978-3-540-30121-9_85","ee":"https://doi.org/10.1007/978-3-540-30121-9_85","url":"https://dblp.org/rec/conf/euc/ArgyroudisO04"}, "url":"URL#6033871" }, { "@score":"1", "@id":"6033872", "info":{"authors":{"author":[{"@pid":"86/5420","text":"Nitin Auluck"},{"@pid":"a/DharmaPAgrawal","text":"Dharma P. Agrawal"}]},"title":"An Integrated Scheduling Algorithm for Precedence Constrained Hard and Soft Real-Time Tasks on Heterogeneous Multiprocessors.","venue":"EUC","pages":"196-206","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/AuluckA04","doi":"10.1007/978-3-540-30121-9_19","ee":"https://doi.org/10.1007/978-3-540-30121-9_19","url":"https://dblp.org/rec/conf/euc/AuluckA04"}, "url":"URL#6033872" }, { "@score":"1", "@id":"6033873", "info":{"authors":{"author":[{"@pid":"87/5334","text":"Seung-Jin Baek"},{"@pid":"42/957-1","text":"Jong-Tae Park 0001"}]},"title":"Efficient Micro-Mobility Support for Wireless Network Using Improved Host-Based Routing.","venue":"EUC","pages":"548-557","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/BaekP04","doi":"10.1007/978-3-540-30121-9_52","ee":"https://doi.org/10.1007/978-3-540-30121-9_52","url":"https://dblp.org/rec/conf/euc/BaekP04"}, "url":"URL#6033873" }, { "@score":"1", "@id":"6033874", "info":{"authors":{"author":[{"@pid":"24/5637","text":"Moez Bellamine"},{"@pid":"66/3538","text":"Norihiro Abe"},{"@pid":"27/3086","text":"Kazuaki Tanaka"},{"@pid":"27/7017-2","text":"Peng Chen 0002"},{"@pid":"97/3378","text":"Hirokazu Taki"}]},"title":"A Virtual Reality Based System for Remote Maintenance of Rotating Machinery.","venue":"EUC","pages":"164-173","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/BellamineATCT04","doi":"10.1007/978-3-540-30121-9_16","ee":"https://doi.org/10.1007/978-3-540-30121-9_16","url":"https://dblp.org/rec/conf/euc/BellamineATCT04"}, "url":"URL#6033874" }, { "@score":"1", "@id":"6033875", "info":{"authors":{"author":[{"@pid":"51/4676","text":"Damien Bright"},{"@pid":"94/4272","text":"Rudi Vernik"}]},"title":"LiveSpaces: An Interactive Ubiquitous Workspace Architecture for the Enterprise.","venue":"EUC","pages":"982-993","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/BrightV04","doi":"10.1007/978-3-540-30121-9_94","ee":"https://doi.org/10.1007/978-3-540-30121-9_94","url":"https://dblp.org/rec/conf/euc/BrightV04"}, "url":"URL#6033875" }, { "@score":"1", "@id":"6033876", "info":{"authors":{"author":[{"@pid":"23/1253","text":"Fábio Buiati"},{"@pid":"46/6088","text":"Ricardo Staciarini Puttini"},{"@pid":"s/RTdeSousaJ","text":"Rafael T. de Sousa Jr."},{"@pid":"121/9602","text":"Cláudia J. Barenco Abbas"},{"@pid":"g/LJavierGarciaVillalba","text":"L. Javier García-Villalba"}]},"title":"Authentication and Autoconfiguration for MANET Nodes.","venue":"EUC","pages":"41-52","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/BuiatiPSAG04","doi":"10.1007/978-3-540-30121-9_5","ee":"https://doi.org/10.1007/978-3-540-30121-9_5","url":"https://dblp.org/rec/conf/euc/BuiatiPSAG04"}, "url":"URL#6033876" }, { "@score":"1", "@id":"6033877", "info":{"authors":{"author":[{"@pid":"c/JiannongCao","text":"Jiannong Cao 0001"},{"@pid":"35/1025","text":"Kwok Ming Chan"},{"@pid":"51/4603","text":"Geoffrey Yu-Kai Shea"},{"@pid":"99/6797","text":"Minyi Guo"}]},"title":"Location-Aware Information Retrieval for Mobile Computing.","venue":"EUC","pages":"450-459","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/CaoCSG04","doi":"10.1007/978-3-540-30121-9_43","ee":"https://doi.org/10.1007/978-3-540-30121-9_43","url":"https://dblp.org/rec/conf/euc/CaoCSG04"}, "url":"URL#6033877" }, { "@score":"1", "@id":"6033878", "info":{"authors":{"author":[{"@pid":"c/CChantrapornchai","text":"Chantana Chantrapornchai"},{"@pid":"03/6334","text":"Wanlop Surakumpolthorn"},{"@pid":"27/2376","text":"Edwin Hsing-Mean Sha"}]},"title":"Efficient Scheduling for Design Exploration with Imprecise Latency and Register Constraints.","venue":"EUC","pages":"259-270","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ChantrapornchaiSS04","doi":"10.1007/978-3-540-30121-9_25","ee":"https://doi.org/10.1007/978-3-540-30121-9_25","url":"https://dblp.org/rec/conf/euc/ChantrapornchaiSS04"}, "url":"URL#6033878" }, { "@score":"1", "@id":"6033879", "info":{"authors":{"author":[{"@pid":"26/4121","text":"Ching-Wen Chen"},{"@pid":"71/5069","text":"Phui-Si Gan"},{"@pid":"18/3239","text":"Chao-Hsiang Yang"}]},"title":"A Rapid Service Discovery Mechanism with Low Bandwidth Requirement in Decentralized Peer-to-Peer Network.","venue":"EUC","pages":"1065-1074","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ChenGY04","doi":"10.1007/978-3-540-30121-9_102","ee":"https://doi.org/10.1007/978-3-540-30121-9_102","url":"https://dblp.org/rec/conf/euc/ChenGY04"}, "url":"URL#6033879" }, { "@score":"1", "@id":"6033880", "info":{"authors":{"author":[{"@pid":"88/615","text":"Weisong Chen"},{"@pid":"44/3271","text":"Cho-Li Wang"},{"@pid":"l/FrancisChiMoonLau","text":"Francis C. M. Lau 0001"}]},"title":"A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment.","venue":"EUC","pages":"962-971","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ChenWL04","doi":"10.1007/978-3-540-30121-9_92","ee":"https://doi.org/10.1007/978-3-540-30121-9_92","url":"https://dblp.org/rec/conf/euc/ChenWL04"}, "url":"URL#6033880" }, { "@score":"1", "@id":"6033881", "info":{"authors":{"author":{"@pid":"80/723","text":"Eric Y. Cheng"}},"title":"User's Perception of Conventional Web Multimedia User Interfaces: An Exploratory Experiment.","venue":"EUC","pages":"702-711","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/Cheng04","doi":"10.1007/978-3-540-30121-9_67","ee":"https://doi.org/10.1007/978-3-540-30121-9_67","url":"https://dblp.org/rec/conf/euc/Cheng04"}, "url":"URL#6033881" }, { "@score":"1", "@id":"6033882", "info":{"authors":{"author":[{"@pid":"89/3076","text":"Chi-Hung Chi"},{"@pid":"40/1491","text":"Xiang Li"},{"@pid":"85/1720","text":"Hongguang Wang"}]},"title":"Evaluation of Data Streaming Effect on Real-Time Content Transformation in Active Proxies.","venue":"EUC","pages":"1055-1064","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ChiLW04","doi":"10.1007/978-3-540-30121-9_101","ee":"https://doi.org/10.1007/978-3-540-30121-9_101","url":"https://dblp.org/rec/conf/euc/ChiLW04"}, "url":"URL#6033882" }, { "@score":"1", "@id":"6033883", "info":{"authors":{"author":[{"@pid":"31/5454","text":"Tae-uk Choi"},{"@pid":"36/508","text":"Ki-Dong Chung"}]},"title":"A Session Mobility Scheme for Seamless VOD Service in Ubiquitous Environments.","venue":"EUC","pages":"652-661","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ChoiC04","doi":"10.1007/978-3-540-30121-9_62","ee":"https://doi.org/10.1007/978-3-540-30121-9_62","url":"https://dblp.org/rec/conf/euc/ChoiC04"}, "url":"URL#6033883" }, { "@score":"1", "@id":"6033884", "info":{"authors":{"author":[{"@pid":"93/6509","text":"Li-Der Chou"},{"@pid":"05/514","text":"Huang-Ju Hsieh"},{"@pid":"65/3073","text":"Jui-Ming Chen"}]},"title":"Multicast with QoS Support in Heterogeneous Wireless Networks.","venue":"EUC","pages":"581-590","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ChouHC04","doi":"10.1007/978-3-540-30121-9_55","ee":"https://doi.org/10.1007/978-3-540-30121-9_55","url":"https://dblp.org/rec/conf/euc/ChouHC04"}, "url":"URL#6033884" }, { "@score":"1", "@id":"6033885", "info":{"authors":{"author":[{"@pid":"78/6916","text":"Po-Jen Chuang"},{"@pid":"45/4606","text":"Shien-Da Chang"},{"@pid":"93/424","text":"Tun-Hao Chao"}]},"title":"An Enhanced Caching Strategy for Location Tracking in PCS Networks.","venue":"EUC","pages":"419-428","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ChuangCC04","doi":"10.1007/978-3-540-30121-9_40","ee":"https://doi.org/10.1007/978-3-540-30121-9_40","url":"https://dblp.org/rec/conf/euc/ChuangCC04"}, "url":"URL#6033885" }, { "@score":"1", "@id":"6033886", "info":{"authors":{"author":[{"@pid":"76/6693","text":"Jim Chung"},{"@pid":"38/3583","text":"Kuochen Wang"},{"@pid":"83/4992","text":"Hung-Cheng Shih"}]},"title":"An Integrated Multichannel Selection and Dynamic Power Control Scheme for IEEE 802.11 Wireless Ad Hoc Networks.","venue":"EUC","pages":"207-216","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ChungWS04","doi":"10.1007/978-3-540-30121-9_20","ee":"https://doi.org/10.1007/978-3-540-30121-9_20","url":"https://dblp.org/rec/conf/euc/ChungWS04"}, "url":"URL#6033886" }, { "@score":"1", "@id":"6033887", "info":{"authors":{"author":{"@pid":"d/SajalKDas","text":"Sajal K. Das 0001"}},"title":"Mobility and Resource Management in Smart Home Environments (Extended Abstract).","venue":"EUC","pages":"1109-1111","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/Das04","doi":"10.1007/978-3-540-30121-9_107","ee":"https://doi.org/10.1007/978-3-540-30121-9_107","url":"https://dblp.org/rec/conf/euc/Das04"}, "url":"URL#6033887" }, { "@score":"1", "@id":"6033888", "info":{"authors":{"author":[{"@pid":"d/JessieDedecker","text":"Jessie Dedecker"},{"@pid":"59/2864","text":"Werner Van Belle"}]},"title":"Actors for Mobile Ad-Hoc Networks.","venue":"EUC","pages":"482-494","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/DedeckerB04","doi":"10.1007/978-3-540-30121-9_46","ee":"https://doi.org/10.1007/978-3-540-30121-9_46","url":"https://dblp.org/rec/conf/euc/DedeckerB04"}, "url":"URL#6033888" }, { "@score":"1", "@id":"6033889", "info":{"authors":{"author":[{"@pid":"59/3821","text":"Yu Endo"},{"@pid":"86/2392","text":"Jun Sawamoto"},{"@pid":"79/2746","text":"Hisao Koizumi"}]},"title":"A Hardware/Software Co-design Method and Its Evaluation to ITS Image Processing and Driver-Support Systems.","venue":"EUC","pages":"249-258","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/EndoSK04","doi":"10.1007/978-3-540-30121-9_24","ee":"https://doi.org/10.1007/978-3-540-30121-9_24","url":"https://dblp.org/rec/conf/euc/EndoSK04"}, "url":"URL#6033889" }, { "@score":"1", "@id":"6033890", "info":{"authors":{"author":[{"@pid":"02/2386","text":"Tore Fjellheim"},{"@pid":"m/StephenMilliner","text":"Stephen Milliner"},{"@pid":"d/MarlonDumas","text":"Marlon Dumas"},{"@pid":"34/6792","text":"Kim Elms"}]},"title":"The 3DMA Middleware for Mobile Applications.","venue":"EUC","pages":"312-323","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/FjellheimMDE04","doi":"10.1007/978-3-540-30121-9_30","ee":"https://doi.org/10.1007/978-3-540-30121-9_30","url":"https://dblp.org/rec/conf/euc/FjellheimMDE04"}, "url":"URL#6033890" }, { "@score":"1", "@id":"6033891", "info":{"authors":{"author":[{"@pid":"70/2373","text":"Seiichiro Fujii"},{"@pid":"71/108","text":"Toshinori Sato"}]},"title":"Non-uniform Set-Associative Caches for Power-Aware Embedded Processors.","venue":"EUC","pages":"217-226","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/FujiiS04","doi":"10.1007/978-3-540-30121-9_21","ee":"https://doi.org/10.1007/978-3-540-30121-9_21","url":"https://dblp.org/rec/conf/euc/FujiiS04"}, "url":"URL#6033891" }, { "@score":"1", "@id":"6033892", "info":{"authors":{"author":[{"@pid":"194/1465","text":"Zhenguo Gao"},{"@pid":"94/3266","text":"Xiao-Zong Yang"},{"@pid":"26/1568","text":"Tian-yi Ma"},{"@pid":"63/1102","text":"Shao-Bin Cai"}]},"title":"RICFFP: An Efficient Service Discovery Protocol for MANETs.","venue":"EUC","pages":"786-795","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/GaoYMC04","doi":"10.1007/978-3-540-30121-9_75","ee":"https://doi.org/10.1007/978-3-540-30121-9_75","url":"https://dblp.org/rec/conf/euc/GaoYMC04"}, "url":"URL#6033892" }, { "@score":"1", "@id":"6033893", "info":{"authors":{"author":[{"@pid":"121/9602","text":"Cláudia J. Barenco Abbas"},{"@pid":"g/LJavierGarciaVillalba","text":"L. Javier García-Villalba"}]},"title":"A Simulation-Based Performance Analysis of Dynamic Routing Protocols for Mobile Ad Hoc Networks.","venue":"EUC","pages":"914-922","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/Garcia-Villalba04","doi":"10.1007/978-3-540-30121-9_87","ee":"https://doi.org/10.1007/978-3-540-30121-9_87","url":"https://dblp.org/rec/conf/euc/Garcia-Villalba04"}, "url":"URL#6033893" }, { "@score":"1", "@id":"6033894", "info":{"authors":{"author":[{"@pid":"84/4108","text":"John Goh"},{"@pid":"t/DavidTaniar","text":"David Taniar"}]},"title":"Mining Physical Parallel Pattern From Mobile Users.","venue":"EUC","pages":"324-332","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/GohT04","doi":"10.1007/978-3-540-30121-9_31","ee":"https://doi.org/10.1007/978-3-540-30121-9_31","url":"https://dblp.org/rec/conf/euc/GohT04"}, "url":"URL#6033894" }, { "@score":"1", "@id":"6033895", "info":{"authors":{"author":[{"@pid":"44/5944","text":"Tiecheng Gu"},{"@pid":"69/5116","text":"Baoliu Ye"},{"@pid":"99/6797","text":"Minyi Guo"},{"@pid":"37/5760","text":"Daoxu Chen"}]},"title":"Implementing Cooperative Caching in Distributed Streaming Media Server Clusters.","venue":"EUC","pages":"807-817","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/GuYGC04","doi":"10.1007/978-3-540-30121-9_77","ee":"https://doi.org/10.1007/978-3-540-30121-9_77","url":"https://dblp.org/rec/conf/euc/GuYGC04"}, "url":"URL#6033895" }, { "@score":"1", "@id":"6033896", "info":{"authors":{"author":[{"@pid":"255/3257","text":"Feng Hong 0001"},{"@pid":"l/MingluLi","text":"Minglu Li 0001"},{"@pid":"64/3735","text":"Xinda Lu"},{"@pid":"67/6649-1","text":"Yi Wang 0001"},{"@pid":"85/3615","text":"Jiadi Yu"},{"@pid":"22/1805-13","text":"Ying Li 0013"}]},"title":"VChord: Constructing Peer-to-Peer Overlay Network by Exploiting Heterogeneity.","venue":"EUC","pages":"1096-1106","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/HongLLWYL04","doi":"10.1007/978-3-540-30121-9_105","ee":"https://doi.org/10.1007/978-3-540-30121-9_105","url":"https://dblp.org/rec/conf/euc/HongLLWYL04"}, "url":"URL#6033896" }, { "@score":"1", "@id":"6033897", "info":{"authors":{"author":[{"@pid":"61/1094","text":"Fangyong Hou"},{"@pid":"w/ZhiyingWang","text":"Zhiying Wang"},{"@pid":"41/556","text":"Yuhua Tang"},{"@pid":"58/5738","text":"Jifeng Liu"}]},"title":"Verify Memory Integrity Basing on Hash Tree and MAC Combined Approach.","venue":"EUC","pages":"869-878","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/HouWTL04","doi":"10.1007/978-3-540-30121-9_83","ee":"https://doi.org/10.1007/978-3-540-30121-9_83","url":"https://dblp.org/rec/conf/euc/HouWTL04"}, "url":"URL#6033897" }, { "@score":"1", "@id":"6033898", "info":{"authors":{"author":[{"@pid":"26/748","text":"Hung-Chang Hsiao"},{"@pid":"k/ChungTaKing","text":"Chung-Ta King"},{"@pid":"34/5381","text":"Shih-Yen Gao"}]},"title":"Making Exploitation of Peer Heterogeneity as a First Class Citizen for Resource Discovery in Peer-to-Peer Networks.","venue":"EUC","pages":"952-961","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/HsiaoKG04","doi":"10.1007/978-3-540-30121-9_91","ee":"https://doi.org/10.1007/978-3-540-30121-9_91","url":"https://dblp.org/rec/conf/euc/HsiaoKG04"}, "url":"URL#6033898" }, { "@score":"1", "@id":"6033899", "info":{"authors":{"author":[{"@pid":"94/6830","text":"Pao-Ann Hsiung"},{"@pid":"55/4730-1","text":"Shang-Wei Lin 0001"}]},"title":"Automatic Synthesis and Verification of Real-Time Embedded Software.","venue":"EUC","pages":"12-21","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/HsiungL04","doi":"10.1007/978-3-540-30121-9_2","ee":"https://doi.org/10.1007/978-3-540-30121-9_2","url":"https://dblp.org/rec/conf/euc/HsiungL04"}, "url":"URL#6033899" }, { "@score":"1", "@id":"6033900", "info":{"authors":{"author":[{"@pid":"233/0688","text":"Kien A. Hua"},{"@pid":"41/6543","text":"Rui Peng"},{"@pid":"55/4874","text":"Georgiana L. Hamza-Lup"}]},"title":"Dissemination of Sensor Data over the Internet.","venue":"EUC","pages":"745-754","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/HuaPH04","doi":"10.1007/978-3-540-30121-9_71","ee":"https://doi.org/10.1007/978-3-540-30121-9_71","url":"https://dblp.org/rec/conf/euc/HuaPH04"}, "url":"URL#6033900" }, { "@score":"1", "@id":"6033901", "info":{"authors":{"author":[{"@pid":"41/4547","text":"Leping Huang"},{"@pid":"31/6272","text":"Hongyuan Chen"},{"@pid":"47/756","text":"T. V. L. N. Sivakumar"},{"@pid":"54/6393","text":"Tsuyoshi Kashima"},{"@pid":"46/2349","text":"Kaoru Sezaki"}]},"title":"Impact of Topology on Multi-hop Bluetooth Personal Area Network.","venue":"EUC","pages":"495-506","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/HuangCSKS04","doi":"10.1007/978-3-540-30121-9_47","ee":"https://doi.org/10.1007/978-3-540-30121-9_47","url":"https://dblp.org/rec/conf/euc/HuangCSKS04"}, "url":"URL#6033901" }, { "@score":"1", "@id":"6033902", "info":{"authors":{"author":[{"@pid":"79/6466","text":"Tsung-Chuan Huang"},{"@pid":"48/916","text":"Liang-Cheng Shiu"},{"@pid":"58/5073","text":"Yan-Feng Chen"}]},"title":"A Power-Based Clustering Algorithm for Wireless Ad-Hoc Networks.","venue":"EUC","pages":"591-600","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/HuangSC04","doi":"10.1007/978-3-540-30121-9_56","ee":"https://doi.org/10.1007/978-3-540-30121-9_56","url":"https://dblp.org/rec/conf/euc/HuangSC04"}, "url":"URL#6033902" }, { "@score":"1", "@id":"6033903", "info":{"authors":{"author":[{"@pid":"51/1845","text":"So-Young Hwang"},{"@pid":"12/6766","text":"Dong-Hui Yu"},{"@pid":"86/4984","text":"Ki-Joune Li"}]},"title":"Embedded System Design for Network Time Synchronization.","venue":"EUC","pages":"96-106","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/HwangYL04","doi":"10.1007/978-3-540-30121-9_10","ee":"https://doi.org/10.1007/978-3-540-30121-9_10","url":"https://dblp.org/rec/conf/euc/HwangYL04"}, "url":"URL#6033903" }, { "@score":"1", "@id":"6033904", "info":{"authors":{"author":[{"@pid":"i/HohPeterIn","text":"Hoh Peter In"},{"@pid":"18/5467","text":"ChangHwa Kim"},{"@pid":"51/247","text":"Stephen S. Yau"}]},"title":"Q-MAR: An Adaptive QoS Management Model for Situation-Aware Middleware.","venue":"EUC","pages":"972-981","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/InKY04","doi":"10.1007/978-3-540-30121-9_93","ee":"https://doi.org/10.1007/978-3-540-30121-9_93","url":"https://dblp.org/rec/conf/euc/InKY04"}, "url":"URL#6033904" }, { "@score":"1", "@id":"6033905", "info":{"authors":{"author":[{"@pid":"09/1776","text":"Shuuhei Ishikawa"},{"@pid":"45/4645-2","text":"Michael Cohen 0002"},{"@pid":"57/1366","text":"Kazuhiko Sawahata"}]},"title":"A Mobile Way-Finding Application Controlling Internet-Distributed Signaling Devices via LAN Concento.","venue":"EUC","pages":"131-142","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/IshikawaCS04","doi":"10.1007/978-3-540-30121-9_13","ee":"https://doi.org/10.1007/978-3-540-30121-9_13","url":"https://dblp.org/rec/conf/euc/IshikawaCS04"}, "url":"URL#6033905" }, { "@score":"1", "@id":"6033906", "info":{"authors":{"author":[{"@pid":"12/3240","text":"James Jayaputera"},{"@pid":"t/DavidTaniar","text":"David Taniar"}]},"title":"Defining Scope of Query for Location-Dependent Information Services.","venue":"EUC","pages":"366-376","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/JayaputeraT04","doi":"10.1007/978-3-540-30121-9_35","ee":"https://doi.org/10.1007/978-3-540-30121-9_35","url":"https://dblp.org/rec/conf/euc/JayaputeraT04"}, "url":"URL#6033906" }, { "@score":"1", "@id":"6033907", "info":{"authors":{"author":[{"@pid":"12/3240","text":"James Jayaputera"},{"@pid":"t/DavidTaniar","text":"David Taniar"}]},"title":"Invalidation for CORBA Caching in Wireless Devices.","venue":"EUC","pages":"460-471","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/JayaputeraT04a","doi":"10.1007/978-3-540-30121-9_44","ee":"https://doi.org/10.1007/978-3-540-30121-9_44","url":"https://dblp.org/rec/conf/euc/JayaputeraT04a"}, "url":"URL#6033907" }, { "@score":"1", "@id":"6033908", "info":{"authors":{"author":[{"@pid":"30/5726","text":"Moon-Sang Jeong"},{"@pid":"42/957-1","text":"Jong-Tae Park 0001"}]},"title":"Hierarchical Mobile Network Routing: Route Optimization and Micro-Mobility Support for NEMO.","venue":"EUC","pages":"571-580","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/JeongP04","doi":"10.1007/978-3-540-30121-9_54","ee":"https://doi.org/10.1007/978-3-540-30121-9_54","url":"https://dblp.org/rec/conf/euc/JeongP04"}, "url":"URL#6033908" }, { "@score":"1", "@id":"6033909", "info":{"authors":{"author":[{"@pid":"64/2570","text":"Hwa-Young Jeong"},{"@pid":"92/2438","text":"Young-Jae Song"}]},"title":"Component Composition Tools: Process Call Scheduling According to the Priority in Connector.","venue":"EUC","pages":"107-118","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/JeongS04","doi":"10.1007/978-3-540-30121-9_11","ee":"https://doi.org/10.1007/978-3-540-30121-9_11","url":"https://dblp.org/rec/conf/euc/JeongS04"}, "url":"URL#6033909" }, { "@score":"1", "@id":"6033910", "info":{"authors":{"author":[{"@pid":"26/4000","text":"Jongil Jeong"},{"@pid":"57/2855","text":"Dongkyoo Shin"},{"@pid":"85/2364","text":"Dongil Shin"},{"@pid":"55/225","text":"Hyun-Mok Oh"}]},"title":"A Study on the XML-Based Single Sign-On System Supporting Mobile and Ubiquitous Service Environments.","venue":"EUC","pages":"903-913","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/JeongSSO04","doi":"10.1007/978-3-540-30121-9_86","ee":"https://doi.org/10.1007/978-3-540-30121-9_86","url":"https://dblp.org/rec/conf/euc/JeongSSO04"}, "url":"URL#6033910" }, { "@score":"1", "@id":"6033911", "info":{"authors":{"author":[{"@pid":"57/1667-1","text":"Weijia Jia 0001"},{"@pid":"21/3023","text":"Yingjie Fu"},{"@pid":"75/2669-1","text":"Jianxin Wang 0001"}]},"title":"Analysis of Connectivity for Sensor Networks Using Geometrical Probability.","venue":"EUC","pages":"601-611","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/JiaFW04","doi":"10.1007/978-3-540-30121-9_57","ee":"https://doi.org/10.1007/978-3-540-30121-9_57","url":"https://dblp.org/rec/conf/euc/JiaFW04"}, "url":"URL#6033911" }, { "@score":"1", "@id":"6033912", "info":{"authors":{"author":[{"@pid":"75/4813","text":"Mohamed Khedr"},{"@pid":"34/4894","text":"Ahmed Karmouch"}]},"title":"A Context-Sensitive Middleware for Managing Embedded Pervasive Environments.","venue":"EUC","pages":"1085-1095","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/KhedrK04","doi":"10.1007/978-3-540-30121-9_104","ee":"https://doi.org/10.1007/978-3-540-30121-9_104","url":"https://dblp.org/rec/conf/euc/KhedrK04"}, "url":"URL#6033912" }, { "@score":"1", "@id":"6033913", "info":{"authors":{"author":[{"@pid":"44/823","text":"Saehwa Kim"},{"@pid":"44/2076","text":"Michael Buettner"},{"@pid":"28/2039","text":"Mark Hermeling"},{"@pid":"73/5284","text":"Seongsoo Hong"}]},"title":"Experimental Assessment of Scenario-Based Multithreading for Real-Time Object-Oriented Models: A Case Study with PBX Systems.","venue":"EUC","pages":"143-152","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/KimBHH04","doi":"10.1007/978-3-540-30121-9_14","ee":"https://doi.org/10.1007/978-3-540-30121-9_14","url":"https://dblp.org/rec/conf/euc/KimBHH04"}, "url":"URL#6033913" }, { "@score":"1", "@id":"6033914", "info":{"authors":{"author":[{"@pid":"59/6639","text":"Hye-Young Kim"},{"@pid":"96/4145","text":"Chong-Sun Hwang"}]},"title":"An Efficient Binding Update Scheme for the Same Mobility Nodes Group.","venue":"EUC","pages":"398-408","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/KimH04","doi":"10.1007/978-3-540-30121-9_38","ee":"https://doi.org/10.1007/978-3-540-30121-9_38","url":"https://dblp.org/rec/conf/euc/KimH04"}, "url":"URL#6033914" }, { "@score":"1", "@id":"6033915", "info":{"authors":{"author":[{"@pid":"67/4385","text":"Kyung-jun Kim"},{"@pid":"h/KJHan","text":"Ki Jun Han"}]},"title":"A Multi-channel MAC Protocol with Route Relay Capability for Mobile Ad Hoc Networks.","venue":"EUC","pages":"429-438","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/KimH04a","doi":"10.1007/978-3-540-30121-9_41","ee":"https://doi.org/10.1007/978-3-540-30121-9_41","url":"https://dblp.org/rec/conf/euc/KimH04a"}, "url":"URL#6033915" }, { "@score":"1", "@id":"6033916", "info":{"authors":{"author":[{"@pid":"31/4577","text":"Cheol Hong Kim"},{"@pid":"57/2505","text":"Jong Wook Kwak"},{"@pid":"79/5180","text":"Seong Tae Jhang"},{"@pid":"15/3421","text":"Chu Shik Jhon"}]},"title":"Adaptive Block Management for Victim Cache by Exploiting L1 Cache History Information.","venue":"EUC","pages":"1-11","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/KimKJJ04","doi":"10.1007/978-3-540-30121-9_1","ee":"https://doi.org/10.1007/978-3-540-30121-9_1","url":"https://dblp.org/rec/conf/euc/KimKJJ04"}, "url":"URL#6033916" }, { "@score":"1", "@id":"6033917", "info":{"authors":{"author":[{"@pid":"85/597","text":"Hyun-Ok Kim"},{"@pid":"59/4948","text":"Woo-Jae Kim"},{"@pid":"91/4495","text":"Young-Joo Suh"}]},"title":"Distance and Direction Based Location Update with Sectional Ring Paging Scheme.","venue":"EUC","pages":"859-868","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/KimKS04","doi":"10.1007/978-3-540-30121-9_82","ee":"https://doi.org/10.1007/978-3-540-30121-9_82","url":"https://dblp.org/rec/conf/euc/KimKS04"}, "url":"URL#6033917" }, { "@score":"1", "@id":"6033918", "info":{"authors":{"author":[{"@pid":"45/115","text":"Gunhee Kim"},{"@pid":"57/2855","text":"Dongkyoo Shin"},{"@pid":"85/2364","text":"Dongil Shin"}]},"title":"An Effective Adaptation of Encryption on MPEG-4 Video Streams for Digital Rights Management in an Ubiquitous Computing Environment.","venue":"EUC","pages":"642-651","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/KimSS04","doi":"10.1007/978-3-540-30121-9_61","ee":"https://doi.org/10.1007/978-3-540-30121-9_61","url":"https://dblp.org/rec/conf/euc/KimSS04"}, "url":"URL#6033918" }, { "@score":"1", "@id":"6033919", "info":{"authors":{"author":[{"@pid":"45/115","text":"Gunhee Kim"},{"@pid":"57/2855","text":"Dongkyoo Shin"},{"@pid":"85/2364","text":"Dongil Shin"}]},"title":"Design of a Middleware and HIML (Human Interaction Markup Language) for Context Aware Services in a Ubiquitous Computing Environment.","venue":"EUC","pages":"682-691","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/KimSS04a","doi":"10.1007/978-3-540-30121-9_65","ee":"https://doi.org/10.1007/978-3-540-30121-9_65","url":"https://dblp.org/rec/conf/euc/KimSS04a"}, "url":"URL#6033919" }, { "@score":"1", "@id":"6033920", "info":{"authors":{"author":[{"@pid":"17/1804","text":"C. Y. Kong"},{"@pid":"44/3271","text":"Cho-Li Wang"},{"@pid":"l/FrancisChiMoonLau","text":"Francis C. M. Lau 0001"}]},"title":"Ontology Mapping in Pervasive Computing Environment.","venue":"EUC","pages":"1014-1023","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/KongWL04","doi":"10.1007/978-3-540-30121-9_97","ee":"https://doi.org/10.1007/978-3-540-30121-9_97","url":"https://dblp.org/rec/conf/euc/KongWL04"}, "url":"URL#6033920" }, { "@score":"1", "@id":"6033921", "info":{"authors":{"author":{"@pid":"57/4610","text":"Henry Larkin"}},"title":"Wireless Signal Strength Topology Maps in Mobile Adhoc Networks.","venue":"EUC","pages":"538-547","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/Larkin04","doi":"10.1007/978-3-540-30121-9_51","ee":"https://doi.org/10.1007/978-3-540-30121-9_51","url":"https://dblp.org/rec/conf/euc/Larkin04"}, "url":"URL#6033921" }, { "@score":"1", "@id":"6033922", "info":{"authors":{"author":[{"@pid":"31/6029","text":"Seung-Won Lee"},{"@pid":"93/4265","text":"Hyeon-Ok Hong"},{"@pid":"62/6962","text":"Seong-Ho Park"},{"@pid":"34/2336","text":"Yong Woon Park"},{"@pid":"36/508","text":"Ki-Dong Chung"}]},"title":"An Improved Handoff Technique for a Seamless Multimedia Services.","venue":"EUC","pages":"634-641","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/LeeHPPC04","doi":"10.1007/978-3-540-30121-9_60","ee":"https://doi.org/10.1007/978-3-540-30121-9_60","url":"https://dblp.org/rec/conf/euc/LeeHPPC04"}, "url":"URL#6033922" }, { "@score":"1", "@id":"6033923", "info":{"authors":{"author":[{"@pid":"94/2698","text":"Kwai Ki Leung"},{"@pid":"n/KamWingNg","text":"Kam-Wing Ng"}]},"title":"Detection of Malicious Host Attacks by Tracing with Randomly Selected Hosts.","venue":"EUC","pages":"839-848","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/LeungN04","doi":"10.1007/978-3-540-30121-9_80","ee":"https://doi.org/10.1007/978-3-540-30121-9_80","url":"https://dblp.org/rec/conf/euc/LeungN04"}, "url":"URL#6033923" }, { "@score":"1", "@id":"6033924", "info":{"authors":{"author":{"@pid":"75/6627","text":"Ke Li"}},"title":"A General Equilibrium Analysis on Impersonal Networking Decisions, E-commerce, and Bundling Pricing.","venue":"EUC","pages":"818-828","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/Li04","doi":"10.1007/978-3-540-30121-9_78","ee":"https://doi.org/10.1007/978-3-540-30121-9_78","url":"https://dblp.org/rec/conf/euc/Li04"}, "url":"URL#6033924" }, { "@score":"1", "@id":"6033925", "info":{"authors":{"author":[{"@pid":"30/6930","text":"Baiyan Li"},{"@pid":"25/2624","text":"Ruonan Rao"},{"@pid":"l/MingluLi","text":"Minglu Li 0001"},{"@pid":"34/4792","text":"Jinyuan You"}]},"title":"A Grid-Based Application Delivery Toolkit for Ubiquitous Computing.","venue":"EUC","pages":"1034-1043","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/LiRLY04","doi":"10.1007/978-3-540-30121-9_99","ee":"https://doi.org/10.1007/978-3-540-30121-9_99","url":"https://dblp.org/rec/conf/euc/LiRLY04"}, "url":"URL#6033925" }, { "@score":"1", "@id":"6033926", "info":{"authors":{"author":[{"@pid":"82/0","text":"Min Li"},{"@pid":"25/539","text":"Xiaobo Wu"},{"@pid":"65/5158","text":"Menglian Zhao"},{"@pid":"39/721","text":"Hui Wang"},{"@pid":"40/4081","text":"Xiaolang Yan"}]},"title":"Power Consumption of Wireless NIC and Its Impact on Joint Routing and Power Control in Ad Hoc Network.","venue":"EUC","pages":"238-248","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/LiWZWY04","doi":"10.1007/978-3-540-30121-9_23","ee":"https://doi.org/10.1007/978-3-540-30121-9_23","url":"https://dblp.org/rec/conf/euc/LiWZWY04"}, "url":"URL#6033926" }, { "@score":"1", "@id":"6033927", "info":{"authors":{"author":[{"@pid":"82/0","text":"Min Li"},{"@pid":"25/539","text":"Xiaobo Wu"},{"@pid":"65/5158","text":"Menglian Zhao"},{"@pid":"39/721","text":"Hui Wang"},{"@pid":"40/4081","text":"Xiaolang Yan"}]},"title":"Heterogeneous Grid Computing for Energy Constrained Mobile Device.","venue":"EUC","pages":"356-365","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/LiWZWY04a","doi":"10.1007/978-3-540-30121-9_34","ee":"https://doi.org/10.1007/978-3-540-30121-9_34","url":"https://dblp.org/rec/conf/euc/LiWZWY04a"}, "url":"URL#6033927" }, { "@score":"1", "@id":"6033928", "info":{"authors":{"author":[{"@pid":"56/4402","text":"Xiaofei Liao"},{"@pid":"98/4156","text":"Hai Jin 0001"},{"@pid":"86/475-2","text":"Hao Chen 0002"}]},"title":"Lemming: A Novel Resource Lookup Scheme for Peer-to-Peer Networks.","venue":"EUC","pages":"1024-1033","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/LiaoJC04","doi":"10.1007/978-3-540-30121-9_98","ee":"https://doi.org/10.1007/978-3-540-30121-9_98","url":"https://dblp.org/rec/conf/euc/LiaoJC04"}, "url":"URL#6033928" }, { "@score":"1", "@id":"6033929", "info":{"authors":{"author":[{"@pid":"11/6210","text":"Fang-Chang Lin"},{"@pid":"08/1373","text":"Hou-Hsin Liu"}]},"title":"MASPG: Searching the Shortest Communication Path with the Guarantee of the Message Delivery Between Manager and Mobile Agent.","venue":"EUC","pages":"755-764","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/LinL04","doi":"10.1007/978-3-540-30121-9_72","ee":"https://doi.org/10.1007/978-3-540-30121-9_72","url":"https://dblp.org/rec/conf/euc/LinL04"}, "url":"URL#6033929" }, { "@score":"1", "@id":"6033930", "info":{"authors":{"author":[{"@pid":"87/2611","text":"Wilfred W. K. Lin"},{"@pid":"60/3796","text":"Allan K. Y. Wong"},{"@pid":"25/4706","text":"Tharam S. Dillon"}]},"title":"A Novel Adaptive Fuzzy Logic Controller (A-FLC) to Reduce Retransmission and Service Roundtrip Time for Logical TCP Channels over the Internet.","venue":"EUC","pages":"942-951","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/LinWD04","doi":"10.1007/978-3-540-30121-9_90","ee":"https://doi.org/10.1007/978-3-540-30121-9_90","url":"https://dblp.org/rec/conf/euc/LinWD04"}, "url":"URL#6033930" }, { "@score":"1", "@id":"6033931", "info":{"authors":{"author":[{"@pid":"92/432","text":"Francisca Losavio"},{"@pid":"18/6032","text":"Nicole Lévy"},{"@pid":"62/1160","text":"Amar Ramdane-Cherif"}]},"title":"Architectural Design for a Wireless Environment.","venue":"EUC","pages":"558-570","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/LosavioLR04","doi":"10.1007/978-3-540-30121-9_53","ee":"https://doi.org/10.1007/978-3-540-30121-9_53","url":"https://dblp.org/rec/conf/euc/LosavioLR04"}, "url":"URL#6033931" }, { "@score":"1", "@id":"6033932", "info":{"authors":{"author":[{"@pid":"l/HanpingLufei","text":"Hanping Lufei"},{"@pid":"s/WeisongShi","text":"Weisong Shi"},{"@pid":"72/56","text":"Lucia Zamorano"}]},"title":"On the Effects of Bandwidth Reduction Techniques in Distributed Applications.","venue":"EUC","pages":"796-806","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/LufeiSZ04","doi":"10.1007/978-3-540-30121-9_76","ee":"https://doi.org/10.1007/978-3-540-30121-9_76","url":"https://dblp.org/rec/conf/euc/LufeiSZ04"}, "url":"URL#6033932" }, { "@score":"1", "@id":"6033933", "info":{"authors":{"author":[{"@pid":"90/2151","text":"J. Hamilton Ortiz Monedero"},{"@pid":"g/LJavierGarciaVillalba","text":"L. Javier García-Villalba"}]},"title":"Integration of Protocols in Order to Provide Quality of Service in IP Mobile Networks.","venue":"EUC","pages":"22-29","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/MonederoG04","doi":"10.1007/978-3-540-30121-9_3","ee":"https://doi.org/10.1007/978-3-540-30121-9_3","url":"https://dblp.org/rec/conf/euc/MonederoG04"}, "url":"URL#6033933" }, { "@score":"1", "@id":"6033934", "info":{"authors":{"author":[{"@pid":"63/403","text":"Son-Hong Ngo"},{"@pid":"67/5160-1","text":"Xiaohong Jiang 0001"},{"@pid":"71/996","text":"Susumu Horiguchi"},{"@pid":"99/6797","text":"Minyi Guo"}]},"title":"Dynamic Routing and Wavelength Assignment in WDM Networks with Ant-Based Agents.","venue":"EUC","pages":"829-838","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/NgoJHG04","doi":"10.1007/978-3-540-30121-9_79","ee":"https://doi.org/10.1007/978-3-540-30121-9_79","url":"https://dblp.org/rec/conf/euc/NgoJHG04"}, "url":"URL#6033934" }, { "@score":"1", "@id":"6033935", "info":{"authors":{"author":[{"@pid":"05/5897","text":"Hung Quoc Ngo 0001"},{"@pid":"77/1638","text":"Anjum Shehzad"},{"@pid":"35/3218","text":"Saad Liaquat Kiani"},{"@pid":"61/1663","text":"Maria Riaz"},{"@pid":"08/5736","text":"Sungyoung Lee"}]},"title":"Developing Context-Aware Ubiquitous Computing Systems with a Unified Middleware Framework.","venue":"EUC","pages":"672-681","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/NgoSLRL04","doi":"10.1007/978-3-540-30121-9_64","ee":"https://doi.org/10.1007/978-3-540-30121-9_64","url":"https://dblp.org/rec/conf/euc/NgoSLRL04"}, "url":"URL#6033935" }, { "@score":"1", "@id":"6033936", "info":{"authors":{"author":[{"@pid":"72/4325","text":"Ignacio Nieto-Carvajal"},{"@pid":"b/JuanABotia","text":"Juan A. Botía"},{"@pid":"22/5330","text":"Pedro M. Ruiz"},{"@pid":"g/AFGomezSkarmeta","text":"Antonio Fernandez Gómez-Skarmeta"}]},"title":"Implementation and Evaluation of a Location-Aware Wireless Multi-agent System.","venue":"EUC","pages":"528-537","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/Nieto-CarvajalBRG04","doi":"10.1007/978-3-540-30121-9_50","ee":"https://doi.org/10.1007/978-3-540-30121-9_50","url":"https://dblp.org/rec/conf/euc/Nieto-CarvajalBRG04"}, "url":"URL#6033936" }, { "@score":"1", "@id":"6033937", "info":{"authors":{"author":[{"@pid":"84/7021","text":"Akira Ohtsubo"},{"@pid":"40/1389","text":"Daisuke Takemoto"},{"@pid":"77/5669","text":"Shigeaki Tagashira"},{"@pid":"64/623","text":"Satoshi Fujita"}]},"title":"The Power of Shortcuts in Greedy Routing in Content Addressable Networks.","venue":"EUC","pages":"994-1003","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/OhtsuboTTF04","doi":"10.1007/978-3-540-30121-9_95","ee":"https://doi.org/10.1007/978-3-540-30121-9_95","url":"https://dblp.org/rec/conf/euc/OhtsuboTTF04"}, "url":"URL#6033937" }, { "@score":"1", "@id":"6033938", "info":{"authors":{"author":[{"@pid":"61/3672","text":"Shuichi Oikawa"},{"@pid":"24/1640","text":"Hiroo Ishikawa"},{"@pid":"90/3031","text":"Masatoshi Iwasaki"},{"@pid":"77/6979","text":"Tatsuo Nakajima"}]},"title":"Providing Protected Execution Environments for Embedded Operating Systems Using a µ-Kernel.","venue":"EUC","pages":"153-163","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/OikawaIIN04","doi":"10.1007/978-3-540-30121-9_15","ee":"https://doi.org/10.1007/978-3-540-30121-9_15","url":"https://dblp.org/rec/conf/euc/OikawaIIN04"}, "url":"URL#6033938" }, { "@score":"1", "@id":"6033939", "info":{"authors":{"author":[{"@pid":"46/7028","text":"Yi Pan"},{"@pid":"66/3538","text":"Norihiro Abe"},{"@pid":"27/3086","text":"Kazuaki Tanaka"},{"@pid":"97/3378","text":"Hirokazu Taki"}]},"title":"The Virtual Debugging System for Developing Embedded Software Using Virtual Machinery.","venue":"EUC","pages":"85-95","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/PanATT04","doi":"10.1007/978-3-540-30121-9_9","ee":"https://doi.org/10.1007/978-3-540-30121-9_9","url":"https://dblp.org/rec/conf/euc/PanATT04"}, "url":"URL#6033939" }, { "@score":"1", "@id":"6033940", "info":{"authors":{"author":[{"@pid":"31/1182","text":"Minkyu Park"},{"@pid":"56/5987","text":"Sangchul Han"},{"@pid":"35/1788","text":"Heeheon Kim"},{"@pid":"39/1718","text":"Seongje Cho"},{"@pid":"92/4612","text":"Yookun Cho"}]},"title":"Comparison of Tie-Breaking Policies for Real-Time Scheduling on Multiprocessor.","venue":"EUC","pages":"174-182","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ParkHKCC04","doi":"10.1007/978-3-540-30121-9_17","ee":"https://doi.org/10.1007/978-3-540-30121-9_17","url":"https://dblp.org/rec/conf/euc/ParkHKCC04"}, "url":"URL#6033940" }, { "@score":"1", "@id":"6033941", "info":{"authors":{"author":[{"@pid":"17/153","text":"Jaesung Park"},{"@pid":"88/1505","text":"Beomjoon Kim"},{"@pid":"55/2494","text":"Yong-Hoon Choi"}]},"title":"A Performance Evaluation of PPP Multiplexing Within UTRAN.","venue":"EUC","pages":"472-481","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ParkKC04","doi":"10.1007/978-3-540-30121-9_45","ee":"https://doi.org/10.1007/978-3-540-30121-9_45","url":"https://dblp.org/rec/conf/euc/ParkKC04"}, "url":"URL#6033941" }, { "@score":"1", "@id":"6033942", "info":{"authors":{"author":[{"@pid":"45/5799","text":"Chong-Won Park"},{"@pid":"28/5179","text":"Seong-Woon Kim"},{"@pid":"56/4544","text":"Jin-Won Park"}]},"title":"System Architecture of a Multimedia Streaming Server for the Next Generation Internet.","venue":"EUC","pages":"662-671","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ParkKP04","doi":"10.1007/978-3-540-30121-9_63","ee":"https://doi.org/10.1007/978-3-540-30121-9_63","url":"https://dblp.org/rec/conf/euc/ParkKP04"}, "url":"URL#6033942" }, { "@score":"1", "@id":"6033943", "info":{"authors":{"author":[{"@pid":"41/2400","text":"Sangsoo Park"},{"@pid":"18/5208","text":"Yonghee Lee"},{"@pid":"08/4789","text":"Heonshik Shin"}]},"title":"Experimental Performance Evaluation of Embedded Linux Using Alternative CPU Core Organizations.","venue":"EUC","pages":"119-130","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ParkLS04","doi":"10.1007/978-3-540-30121-9_12","ee":"https://doi.org/10.1007/978-3-540-30121-9_12","url":"https://dblp.org/rec/conf/euc/ParkLS04"}, "url":"URL#6033943" }, { "@score":"1", "@id":"6033944", "info":{"authors":{"author":[{"@pid":"60/4239","text":"Marcelo Trierveiler Pereira"},{"@pid":"43/6521","text":"Antônio Augusto Fröhlich"},{"@pid":"17/6221","text":"Hugo Marcondes"}]},"title":"RIFFS: Reverse Indirect Flash File System.","venue":"EUC","pages":"30-40","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/PereiraFM04","doi":"10.1007/978-3-540-30121-9_4","ee":"https://doi.org/10.1007/978-3-540-30121-9_4","url":"https://dblp.org/rec/conf/euc/PereiraFM04"}, "url":"URL#6033944" }, { "@score":"1", "@id":"6033945", "info":{"authors":{"author":[{"@pid":"49/2320","text":"Fauze Valério Polpeta"},{"@pid":"43/6521","text":"Antônio Augusto Fröhlich"}]},"title":"Hardware Mediators: A Portability Artifact for Component-Based Systems.","venue":"EUC","pages":"271-280","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/PolpetaF04","doi":"10.1007/978-3-540-30121-9_26","ee":"https://doi.org/10.1007/978-3-540-30121-9_26","url":"https://dblp.org/rec/conf/euc/PolpetaF04"}, "url":"URL#6033945" }, { "@score":"1", "@id":"6033946", "info":{"authors":{"author":[{"@pid":"02/4164","text":"Yeonseung Ryu"},{"@pid":"06/2835","text":"Seok Won Hong"},{"@pid":"54/2552","text":"Hyuk Soo Jang"},{"@pid":"54/612","text":"Sehyeong Cho"},{"@pid":"94/4036","text":"Chung Ki Lee"}]},"title":"An Admission Control Algorithm for Scheduling Mixed Traffic in Ubiquitous Environment.","venue":"EUC","pages":"849-858","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/RyuHJCL04","doi":"10.1007/978-3-540-30121-9_81","ee":"https://doi.org/10.1007/978-3-540-30121-9_81","url":"https://dblp.org/rec/conf/euc/RyuHJCL04"}, "url":"URL#6033946" }, { "@score":"1", "@id":"6033947", "info":{"authors":{"author":[{"@pid":"63/3401","text":"Junichiro Saito"},{"@pid":"74/1775","text":"Jae-Cheol Ryou 0001"},{"@pid":"16/3865","text":"Kouichi Sakurai"}]},"title":"Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags.","venue":"EUC","pages":"879-890","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/SaitoRS04","doi":"10.1007/978-3-540-30121-9_84","ee":"https://doi.org/10.1007/978-3-540-30121-9_84","url":"https://dblp.org/rec/conf/euc/SaitoRS04"}, "url":"URL#6033947" }, { "@score":"1", "@id":"6033948", "info":{"authors":{"author":[{"@pid":"08/6845","text":"Zili Shao"},{"@pid":"73/1987","text":"Qingfeng Zhuge"},{"@pid":"07/3433","text":"Meilin Liu"},{"@pid":"27/2376","text":"Edwin Hsing-Mean Sha"},{"@pid":"43/5134-1","text":"Bin Xiao 0001"}]},"title":"Loop Scheduling for Real-Time DSPs with Minimum Switching Activities on Multiple-Functional-Unit Architectures.","venue":"EUC","pages":"53-63","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ShaoZLSX04","doi":"10.1007/978-3-540-30121-9_6","ee":"https://doi.org/10.1007/978-3-540-30121-9_6","url":"https://dblp.org/rec/conf/euc/ShaoZLSX04"}, "url":"URL#6033948" }, { "@score":"1", "@id":"6033949", "info":{"authors":{"author":[{"@pid":"01/510","text":"Sung-Hoon Shim"},{"@pid":"31/4577","text":"Cheol Hong Kim"},{"@pid":"57/2505","text":"Jong Wook Kwak"},{"@pid":"15/3421","text":"Chu Shik Jhon"}]},"title":"Hybrid Technique for Reducing Energy Consumption in High Performance Embedded Processor.","venue":"EUC","pages":"74-84","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ShimKKJ04","doi":"10.1007/978-3-540-30121-9_8","ee":"https://doi.org/10.1007/978-3-540-30121-9_8","url":"https://dblp.org/rec/conf/euc/ShimKKJ04"}, "url":"URL#6033949" }, { "@score":"1", "@id":"6033950", "info":{"authors":{"author":[{"@pid":"75/5253","text":"Chang-Sun Shin"},{"@pid":"43/4736","text":"Chang-Won Jeong"},{"@pid":"96/1233","text":"Su-Chong Joo"}]},"title":"Construction of Distributed Object Group Framework and Its Execution Analysis Using Distributed Application Simulation.","venue":"EUC","pages":"724-733","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ShinJJ04","doi":"10.1007/978-3-540-30121-9_69","ee":"https://doi.org/10.1007/978-3-540-30121-9_69","url":"https://dblp.org/rec/conf/euc/ShinJJ04"}, "url":"URL#6033950" }, { "@score":"1", "@id":"6033951", "info":{"authors":{"author":[{"@pid":"05/3861","text":"Dongkun Shin"},{"@pid":"74/2683","text":"Jihong Kim 0001"}]},"title":"Power-Aware Scheduling of Mixed Task Sets in Priority-Driven Systems.","venue":"EUC","pages":"227-237","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ShinK04","doi":"10.1007/978-3-540-30121-9_22","ee":"https://doi.org/10.1007/978-3-540-30121-9_22","url":"https://dblp.org/rec/conf/euc/ShinK04"}, "url":"URL#6033951" }, { "@score":"1", "@id":"6033952", "info":{"authors":{"author":[{"@pid":"15/3090","text":"Jin Wook Shin"},{"@pid":"58/6231","text":"Sook Yoon"},{"@pid":"42/3944","text":"Jin-Young Chang"},{"@pid":"08/9173","text":"Dong Sun Park"}]},"title":"Automatic Gateway Selection in Bluetooth Scatternet.","venue":"EUC","pages":"507-514","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ShinYCP04","doi":"10.1007/978-3-540-30121-9_48","ee":"https://doi.org/10.1007/978-3-540-30121-9_48","url":"https://dblp.org/rec/conf/euc/ShinYCP04"}, "url":"URL#6033952" }, { "@score":"1", "@id":"6033953", "info":{"authors":{"author":[{"@pid":"94/4112","text":"Makoto Shizuka"},{"@pid":"49/1832-2","text":"Jianhua Ma 0002"},{"@pid":"27/2739","text":"Jeneung Lee"},{"@pid":"88/3076","text":"Yoichiro Miyoshi"},{"@pid":"56/2767","text":"Katsuhiro Takata"}]},"title":"A P2P Ubiquitous System for Testing Network Programs.","venue":"EUC","pages":"1004-1013","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ShizukaMLMT04","doi":"10.1007/978-3-540-30121-9_96","ee":"https://doi.org/10.1007/978-3-540-30121-9_96","url":"https://dblp.org/rec/conf/euc/ShizukaMLMT04"}, "url":"URL#6033953" }, { "@score":"1", "@id":"6033954", "info":{"authors":{"author":[{"@pid":"62/735","text":"Pauline P. L. Siu"},{"@pid":"54/2271","text":"Nalini Moti Belaramani"},{"@pid":"44/3271","text":"Cho-Li Wang"},{"@pid":"l/FrancisChiMoonLau","text":"Francis C. M. Lau 0001"}]},"title":"Context-Aware State Management for Ubiquitous Applications.","venue":"EUC","pages":"776-785","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/SiuBWL04","doi":"10.1007/978-3-540-30121-9_74","ee":"https://doi.org/10.1007/978-3-540-30121-9_74","url":"https://dblp.org/rec/conf/euc/SiuBWL04"}, "url":"URL#6033954" }, { "@score":"1", "@id":"6033955", "info":{"authors":{"author":[{"@pid":"44/1664","text":"Mee Young Sung"},{"@pid":"39/2874","text":"Jong Hyuk Lee"}]},"title":"Desirable Mobile Networking Method for Formulating an Efficient Mobile Conferencing Application.","venue":"EUC","pages":"377-386","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/SungL04","doi":"10.1007/978-3-540-30121-9_36","ee":"https://doi.org/10.1007/978-3-540-30121-9_36","url":"https://dblp.org/rec/conf/euc/SungL04"}, "url":"URL#6033955" }, { "@score":"1", "@id":"6033956", "info":{"authors":{"author":[{"@pid":"54/3918","text":"Evi Syukur"},{"@pid":"l/SengWaiLoke","text":"Seng Wai Loke"},{"@pid":"52/2435","text":"Peter Stañski"}]},"title":"A Policy Based Framework for Context Aware Ubiquitous Services.","venue":"EUC","pages":"346-355","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/SyukurLS04","doi":"10.1007/978-3-540-30121-9_33","ee":"https://doi.org/10.1007/978-3-540-30121-9_33","url":"https://dblp.org/rec/conf/euc/SyukurLS04"}, "url":"URL#6033956" }, { "@score":"1", "@id":"6033957", "info":{"authors":{"author":{"@pid":"41/679","text":"Hideyuki Tokuda"}},"title":"Smart Furniture: A Platform for Creating Context-Aware Ubiquitous Applications Everywhere.","venue":"EUC","pages":"1112","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/Tokuda04","doi":"10.1007/978-3-540-30121-9_108","ee":"https://doi.org/10.1007/978-3-540-30121-9_108","url":"https://dblp.org/rec/conf/euc/Tokuda04"}, "url":"URL#6033957" }, { "@score":"1", "@id":"6033958", "info":{"authors":{"author":[{"@pid":"57/2355","text":"Agustinus Borgy Waluyo"},{"@pid":"90/377-2","text":"Bala Srinivasan 0002"},{"@pid":"t/DavidTaniar","text":"David Taniar"}]},"title":"Allocation of Data Items for Multi Channel Data Broadcasting in a Mobile Computing Environment.","venue":"EUC","pages":"409-418","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/WaluyoST04","doi":"10.1007/978-3-540-30121-9_39","ee":"https://doi.org/10.1007/978-3-540-30121-9_39","url":"https://dblp.org/rec/conf/euc/WaluyoST04"}, "url":"URL#6033958" }, { "@score":"1", "@id":"6033959", "info":{"authors":{"author":[{"@pid":"57/2355","text":"Agustinus Borgy Waluyo"},{"@pid":"90/377-2","text":"Bala Srinivasan 0002"},{"@pid":"t/DavidTaniar","text":"David Taniar"}]},"title":"Optimizing Query Access Time over Broadcast Channel in a Mobile Computing Environment.","venue":"EUC","pages":"439-449","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/WaluyoST04a","doi":"10.1007/978-3-540-30121-9_42","ee":"https://doi.org/10.1007/978-3-540-30121-9_42","url":"https://dblp.org/rec/conf/euc/WaluyoST04a"}, "url":"URL#6033959" }, { "@score":"1", "@id":"6033960", "info":{"authors":{"author":[{"@pid":"76/6381","text":"Sheng-De Wang"},{"@pid":"26/293","text":"Hsuen-Ling Ko"},{"@pid":"129/9800","text":"Yung-Yu Zhuang"}]},"title":"Japster: An Improved Peer-to-Peer Network Architecture.","venue":"EUC","pages":"1044-1054","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/WangKZ04","doi":"10.1007/978-3-540-30121-9_100","ee":"https://doi.org/10.1007/978-3-540-30121-9_100","url":"https://dblp.org/rec/conf/euc/WangKZ04"}, "url":"URL#6033960" }, { "@score":"1", "@id":"6033961", "info":{"authors":{"author":[{"@pid":"71/3536","text":"Tzone I. Wang"},{"@pid":"36/4695","text":"Kun Hua Tsai"},{"@pid":"11/2804","text":"Y. H. Lee"}]},"title":"Crown: An Efficient and Stable Distributed Resource Lookup Protocol.","venue":"EUC","pages":"1075-1084","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/WangTL04","doi":"10.1007/978-3-540-30121-9_103","ee":"https://doi.org/10.1007/978-3-540-30121-9_103","url":"https://dblp.org/rec/conf/euc/WangTL04"}, "url":"URL#6033961" }, { "@score":"1", "@id":"6033962", "info":{"authors":{"author":[{"@pid":"99/4694-1","text":"Xingwei Wang 0001"},{"@pid":"11/446","text":"Changqing Yuan"},{"@pid":"44/1356-1","text":"Min Huang 0001"}]},"title":"A Fuzzy-Tower-Based QoS Unicast Routing Algorithm.","venue":"EUC","pages":"923-930","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/WangYH04","doi":"10.1007/978-3-540-30121-9_88","ee":"https://doi.org/10.1007/978-3-540-30121-9_88","url":"https://dblp.org/rec/conf/euc/WangYH04"}, "url":"URL#6033962" }, { "@score":"1", "@id":"6033963", "info":{"authors":{"author":[{"@pid":"77/934","text":"Yasuhiro Watanabe"},{"@pid":"51/5377","text":"Koichi Nishimura"},{"@pid":"41/3771","text":"Saori Sugiyama"},{"@pid":"66/3538","text":"Norihiro Abe"},{"@pid":"27/3086","text":"Kazuaki Tanaka"},{"@pid":"97/3378","text":"Hirokazu Taki"},{"@pid":"34/995","text":"Tetsuya Yagi"}]},"title":"Man and Machine Bidirectional Communication Interface Using Voice and Pointing Action.","venue":"EUC","pages":"622-633","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/WatanabeNSATTY04","doi":"10.1007/978-3-540-30121-9_59","ee":"https://doi.org/10.1007/978-3-540-30121-9_59","url":"https://dblp.org/rec/conf/euc/WatanabeNSATTY04"}, "url":"URL#6033963" }, { "@score":"1", "@id":"6033964", "info":{"authors":{"author":{"@pid":"w/WayneWolf","text":"Wayne H. Wolf"}},"title":"Smart Cameras and Pervasive Information Systems.","venue":"EUC","pages":"1107-1108","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/Wolf04","doi":"10.1007/978-3-540-30121-9_106","ee":"https://doi.org/10.1007/978-3-540-30121-9_106","url":"https://dblp.org/rec/conf/euc/Wolf04"}, "url":"URL#6033964" }, { "@score":"1", "@id":"6033965", "info":{"authors":{"author":[{"@pid":"x/ChunJasonXue","text":"Chun Xue"},{"@pid":"08/6845","text":"Zili Shao"},{"@pid":"27/2376","text":"Edwin Hsing-Mean Sha"},{"@pid":"43/5134-1","text":"Bin Xiao 0001"}]},"title":"Optimizing Address Assignment for Scheduling Embedded DSPs.","venue":"EUC","pages":"64-73","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/XueSSX04","doi":"10.1007/978-3-540-30121-9_7","ee":"https://doi.org/10.1007/978-3-540-30121-9_7","url":"https://dblp.org/rec/conf/euc/XueSSX04"}, "url":"URL#6033965" }, { "@score":"1", "@id":"6033966", "info":{"authors":{"author":[{"@pid":"83/6915","text":"Ganesh Yadav"},{"@pid":"99/3649","text":"R. K. Singh"},{"@pid":"c/VipinChaudhary","text":"Vipin Chaudhary"}]},"title":"On Implementation of MPEG-2 Like Real-Time Parallel Media Applications on MDSP SoC Cradle Architecture.","venue":"EUC","pages":"281-290","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/YadavSC04","doi":"10.1007/978-3-540-30121-9_27","ee":"https://doi.org/10.1007/978-3-540-30121-9_27","url":"https://dblp.org/rec/conf/euc/YadavSC04"}, "url":"URL#6033966" }, { "@score":"1", "@id":"6033967", "info":{"authors":{"author":[{"@pid":"77/4380","text":"Yutaka Yamada"},{"@pid":"59/1558","text":"Hideharu Amano"},{"@pid":"66/4132","text":"Michihiro Koibuchi"},{"@pid":"04/5242","text":"Akiya Jouraku"},{"@pid":"33/2566","text":"Kenichiro Anjo"},{"@pid":"67/6694","text":"Katsunobu Nishimura"}]},"title":"Folded Fat H-Tree: An Interconnection Topology for Dynamically Reconfigurable Processor Array.","venue":"EUC","pages":"301-311","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/YamadaAKJAN04","doi":"10.1007/978-3-540-30121-9_29","ee":"https://doi.org/10.1007/978-3-540-30121-9_29","url":"https://dblp.org/rec/conf/euc/YamadaAKJAN04"}, "url":"URL#6033967" }, { "@score":"1", "@id":"6033968", "info":{"authors":{"author":{"@pid":"34/3081","text":"Toshihiko Yamakami"}},"title":"Ubiquitous Computing Literacy: A New Challenge for Social Computing.","venue":"EUC","pages":"712-723","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/Yamakami04","doi":"10.1007/978-3-540-30121-9_68","ee":"https://doi.org/10.1007/978-3-540-30121-9_68","url":"https://dblp.org/rec/conf/euc/Yamakami04"}, "url":"URL#6033968" }, { "@score":"1", "@id":"6033969", "info":{"authors":{"author":[{"@pid":"64/3841","text":"Satoshi Yamane"},{"@pid":"82/3929","text":"Takashi Kanatani"}]},"title":"Deductive Probabilistic Verification Methods for Embedded and Ubiquitous Computing.","venue":"EUC","pages":"183-195","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/YamaneK04","doi":"10.1007/978-3-540-30121-9_18","ee":"https://doi.org/10.1007/978-3-540-30121-9_18","url":"https://dblp.org/rec/conf/euc/YamaneK04"}, "url":"URL#6033969" }, { "@score":"1", "@id":"6033970", "info":{"authors":{"author":[{"@pid":"78/360","text":"Myung-Kyu Yi"},{"@pid":"96/4145","text":"Chong-Sun Hwang"}]},"title":"A Pointer Forwarding Strategy for Minimizing Signaling Cost in Hierarchical Mobile IPv6 Networks.","venue":"EUC","pages":"333-345","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/YiH04","doi":"10.1007/978-3-540-30121-9_32","ee":"https://doi.org/10.1007/978-3-540-30121-9_32","url":"https://dblp.org/rec/conf/euc/YiH04"}, "url":"URL#6033970" }, { "@score":"1", "@id":"6033971", "info":{"authors":{"author":[{"@pid":"70/1135","text":"Song-Yi Yi"},{"@pid":"08/4789","text":"Heonshik Shin"},{"@pid":"85/1173","text":"Sungwon Jung"}]},"title":"Enhanced Cost Effective Cache Invalidation for Mobile Clients in Stateless Server Environments.","venue":"EUC","pages":"387-397","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/YiSJ04","doi":"10.1007/978-3-540-30121-9_37","ee":"https://doi.org/10.1007/978-3-540-30121-9_37","url":"https://dblp.org/rec/conf/euc/YiSJ04"}, "url":"URL#6033971" }, { "@score":"1", "@id":"6033972", "info":{"authors":{"author":[{"@pid":"35/87","text":"Keun Soo Yim"},{"@pid":"74/2683","text":"Jihong Kim 0001"},{"@pid":"94/6868","text":"Kern Koh"}]},"title":"An Energy-Efficient Routing and Reporting Scheme to Exploit Data Similarities in Wireless Sensor Networks.","venue":"EUC","pages":"515-527","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/YimKK04","doi":"10.1007/978-3-540-30121-9_49","ee":"https://doi.org/10.1007/978-3-540-30121-9_49","url":"https://dblp.org/rec/conf/euc/YimKK04"}, "url":"URL#6033972" }, { "@score":"1", "@id":"6033973", "info":{"authors":{"author":[{"@pid":"77/6762","text":"Jeff Young"},{"@pid":"s/RonSass","text":"Ron Sass"}]},"title":"FERP Interface and Interconnect Cores for Stream Processing Applications.","venue":"EUC","pages":"291-300","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/YoungS04","doi":"10.1007/978-3-540-30121-9_28","ee":"https://doi.org/10.1007/978-3-540-30121-9_28","url":"https://dblp.org/rec/conf/euc/YoungS04"}, "url":"URL#6033973" }, { "@score":"1", "@id":"6033974", "info":{"authors":{"author":[{"@pid":"05/575","text":"Donghui Yu"},{"@pid":"93/3699","text":"Yongho Kim"},{"@pid":"85/1172","text":"Soyoung Hwang"}]},"title":"A Stable Estimation Model for Time Synchronization on the Internet Using Kalman Filtering.","venue":"EUC","pages":"931-941","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/YuKH04","doi":"10.1007/978-3-540-30121-9_89","ee":"https://doi.org/10.1007/978-3-540-30121-9_89","url":"https://dblp.org/rec/conf/euc/YuKH04"}, "url":"URL#6033974" }, { "@score":"1", "@id":"6033975", "info":{"authors":{"author":[{"@pid":"50/2675","text":"Sherali Zeadally"},{"@pid":"67/992","text":"Aarti Kumar"},{"@pid":"89/218","text":"Aruna Banda"}]},"title":"Seamless Bluetooth Connectivity to IPv6 Networks.","venue":"EUC","pages":"612-621","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ZeadallyKB04","doi":"10.1007/978-3-540-30121-9_58","ee":"https://doi.org/10.1007/978-3-540-30121-9_58","url":"https://dblp.org/rec/conf/euc/ZeadallyKB04"}, "url":"URL#6033975" }, { "@score":"1", "@id":"6033976", "info":{"authors":{"author":[{"@pid":"42/2112","text":"Degan Zhang"},{"@pid":"08/5313","text":"Yuanchun Shi"},{"@pid":"22/6316","text":"Enyi Chen"},{"@pid":"x/GuangyouXu","text":"Guangyou Xu"},{"@pid":"22/3524","text":"Baopeng Zhang"}]},"title":"Context-Aware Computing During Seamless Transfer Based on Random Set Theory for Active Space.","venue":"EUC","pages":"692-701","year":"2004","type":"Conference and Workshop Papers","access":"closed","key":"conf/euc/ZhangSCXZ04","doi":"10.1007/978-3-540-30121-9_66","ee":"https://doi.org/10.1007/978-3-540-30121-9_66","url":"https://dblp.org/rec/conf/euc/ZhangSCXZ04"}, "url":"URL#6033976" }, { "@score":"1", "@id":"6095235", "info":{"authors":{"author":[{"@pid":"y/LaurenceTianruoYang","text":"Laurence Tianruo Yang"},{"@pid":"99/6797","text":"Minyi Guo"},{"@pid":"g/GuangRGao","text":"Guang R. Gao"},{"@pid":"j/NirajKJha","text":"Niraj K. Jha"}]},"title":"Embedded and Ubiquitous Computing, International Conference EUC 2004, Aizu-Wakamatsu City, Japan, August 25-27, 2004, Proceedings","venue":["EUC","Lecture Notes in Computer Science"],"volume":"3207","publisher":"Springer","year":"2004","type":"Editorship","key":"conf/euc/2004","doi":"10.1007/B100039","ee":"https://doi.org/10.1007/b100039","url":"https://dblp.org/rec/conf/euc/2004"}, "url":"URL#6095235" } ] } } } )