EUC C

127 papers

YearTitle / Authors
2010A Cloud Architecture of Virtual Trusted Platform Modules.
Dongxi Liu, Jack Lee, Julian Jang, Surya Nepal, John Zic
2010A Connection-assured Many-to-one Communication of Wireless Sensors with Two Transmission Ranges.
Wan Yeon Lee, Hyung Goo Paek, Jeong-Mo Yeo, Kyong Hoon Kim
2010A Deterministic Key Management Scheme for Securing Cluster-Based Sensors Networks.
Mandicou Ba, Ibrahima Niang, Bamba Gueye, Thomas Noël
2010A Distributed Trust Model for Securing Mobile Ad Hoc Networks.
Pushpita Chatterjee, Indranil Sengupta, Soumya Kanti Ghosh
2010A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks.
Junqi Zhang, Rajan Shankaran, Mehmet A. Orgun, Vijay Varadharajan, Abdul Sattar
2010A Fast Heuristic for Solving the D1EC Coloring Problem.
Fabio Campoccia, Vincenzo Mancuso
2010A Fault-tolerant Architecture with Error Correcting Code for the Instruction-level Temporal Redundancy.
Chao Yan, Hongjun Dai, Tianzhou Chen, Meikang Qiu
2010A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks.
Biming Tian, Song Han, Sazia Parvin, Tharam S. Dillon
2010A Light Reasoning Infrastructure to Enable Context-aware Mobile Applications.
Josué Iglesias, Ana M. Bernardos, Alejandro Álvarez, Marcos Sacristán
2010A Method for Dimensioning Micro-Scale Solar Energy Harvesting Systems Based on Energy Level Simulations.
Sebastian Bader, Torsten Schölzel, Bengt Oelmann
2010A Novel Secure Bilinear Pairing Based Remote User Authentication Scheme with Smart Card.
Majid Bayat, Mohammad Sabzinejad Farash, Amirvala Movahed
2010A Reflective Service Gateway for Integrating Evolvable Sensor-Actuator Networks with Pervasive Infrastructure.
Seong Hoon Kim, Daeyoung Kim, Jeong Seok Kang, Hong Seong Park
2010A Routing Algorithm Based on Trustworthy Core Tree for WSN.
Jiang-Tao Wang, Li-miao Li, Zhigang Chen
2010A Scalable Encryption Scheme for Multi-Privileged Group Communications.
Qiushuang Du, Guojun Wang, Qin Liu
2010A Secure Self-Destructing Scheme for Electronic Data.
Fengshun Yue, Guojun Wang, Qin Liu
2010A Study on the Underwater Acoustic Communication with Direct Sequence Spread Spectrum.
Jeong-Woo Han, Se-Young Kim, Ki-Man Kim, Wonseok Choi, Minjae Kim, Seung-Yong Chun, Kwon Son
2010Above the Trust and Security in Cloud Computing: A Notion Towards Innovation.
Mahbub Ahmed, Yang Xiang, A. B. M. Shawkat Ali
2010Adaptive GTS Allocation Scheme based on IEEE 802.15.4 for Underwater Acoustic Sensor Networks.
Jung-Il Namgung, Soo Young Shin, Nam-Yeol Yun, Soo-Hyun Park
2010Ambient Intelligence, Smart Objects and Sensor Networks: Practical Experiences.
Elisabetta Farella
2010An Access Control Architecture for Distributing Trust in Pervasive Computing Environments.
Raquel L. Hill, Jalal Al-Muhtadi, William E. Byrd
2010An Application Framework for Loosely Coupled Networked Cyber-Physical Systems.
Minyoung Kim, Mark-Oliver Stehr, Jinwoo Kim, Soonhoi Ha
2010An Efficient Clustering Algorithm Using Evolutionary HMM in Wireless Sensor Networks.
Rouhollah Goudarzi, Behrouz Jedari, Masoud Sabaei
2010An Environment for Design Software and Hardware Aspects of Clock Synchronization and Communication in DRTES.
Brahim Hamid, Adel Ziani
2010An OSGi Based RFID Complex Event Processing System.
Weifeng Hou, Di Hou, Juan Chen
2010Analysis of Property Based Attestation in Trusted Platforms.
Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens
2010Architectural Support for Reducing Parallel Processing Overhead in an Embedded Multiprocessor.
Jian Wang, Joar Sohl, Dake Liu
2010Automated Software Protection through Program Externalization on Memory-Limited Secure Devices.
Serge Chaumette, Olivier Ly, Renaud Tabary
2010Avoidance of Blind Period for Node Coverage Grouping on Wireless Sensor Networks.
Chow-Sing Lin, Chih-Chung Chen
2010Bearings-only Tracking Systems with Distributed Floating Beacons in Underwater Sensor Networks.
Eunchan Kim, Sangho Lee, Chungsan Kim, Kiseon Kim
2010Capability-Role-Based Delegation in Workflow Systems.
Koji Hasebe, Mitsuhiro Mabuchi
2010Co-Simulation of Self-Adaptive Automotive Embedded Systems.
Marc Zeller, Gereon Weiss, Dirk Eilers, Rudi Knorr
2010Combined Authentication and Quality of Service in Cooperative Communication Networks.
Ramya Ramamoorthy, F. Richard Yu, Helen Tang, Peter C. Mason
2010Communication in a Behavior-based Approach to Target Detection and Tracking with Autonomous Underwater Vehicles.
Laura Sorbi, Laura Toni, Graziano Pio De Capua, Lorenzo Rossi
2010Context Awareness Aims at Novel Fruition Models: Augmented Reality May be the Killer Application for Context Awareness.
Claudio Vemezia, Marco Marengo
2010CredibilityRank: A Framework for the Design and Evaluation of Rank-based Credibility Models for Web Applications.
Sara Guimaraes, Arlei Silva, Wagner Meira Jr., Adriano C. M. Pereira
2010Defending Malicious Collision Attacks in Wireless Sensor Networks.
Phillip Reindl, Kendall E. Nygard, Xiaojiang Du
2010Design and Implementation of the Test-bed for Underwater Acoustic Sensor Network Based on ARM9 Processor.
Yung-Pyo Kim, Jung-Il Namgung, Nam-Yeol Yun, Hui-Jin Cho, Imtiaz Ahmed Khan, Soo-Hyun Park
2010Designing Security Protocols Adapted to the Constraints of Mobile Environments.
Michel Kamel, Karima Boudaoud, Sylvain Lequeux, Michel Riveill
2010Detecting Security Attacks in Trusted Virtual Domains.
Udaya Kiran Tupakula, Vijay Varadharajan
2010Detection and Prevention of Routing Intrusions in Mobile Ad Hoc Networks.
Pradeep Moradiya, Srinivas Sampalli
2010Efficient Data Delivery in Wireless Sensor Networks with Ubiquitous Mobile Data Collectors.
Weiwei Jiao, Long Cheng, Yimin Chen, Canfeng Chen, Jian Ma
2010Efficient RFID Authentication Scheme for Supply Chain Applications.
Fei Bi, Yi Mu
2010Empirical Evaluation of Content-based Pub/Sub Systems over Cloud Infrastructure.
Biao Zhang, Beihong Jin, Haibiao Chen, Ziyuan Qin
2010Energy Balanced Routing Strategy in Wireless Sensor Networks.
Xiaoguang Zhang, Zheng Da Wu
2010Experimental Results of Single Carrier Digital Modulation for Underwater Sensor Networks.
Se-Young Kim, Jeong-Woo Han, Ki-Man Kim, Sanghoon Baek, Hyungchul Kim, Changhwa Kim
2010Extending a Key-Chain Based Certified Email Protocol with Transparent TTP.
Zhiyuan Liu, Jun Pang, Chenyi Zhang
2010Formal Trust Specification in Service Workflows.
Wattana Viriyasitavat, Andrew P. Martin
2010GEDS: GPU Execution of Continuous Queries on Spatio-Temporal Data Streams.
Jonathan Cazalas, Ratan K. Guha
2010Guess and Determine Attack on Trivium Family.
Neda Rohani, Zainab Noferesti, Javad Mohajeri, Mohammad Reza Aref
2010Handling Mobility on a QoS-Aware Service-based Framework for Mobile Systems.
Joel Gonçalves, Luis Lino Ferreira, Luís Miguel Pinho, Guilherme D. Silva
2010Hierarchical Certificateless Signatures.
Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin
2010Hierarchical Cooperative Data Caching for Wireless Mesh Networks.
Weigang Wu, Yifei Huang
2010Hierarchical Real-Time Scheduling Framework for Imprecise Computations.
Guy Martin Tchamgoue, Kyong Hoon Kim, Yong-Kee Jun, Wan Yeon Lee
2010IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, EUC 2010, Hong Kong, China, 11-13 December 2010
2010IOT Gateway: BridgingWireless Sensor Networks into Internet of Things.
Qian Zhu, Ruicong Wang, Qi Chen, Yan Liu, Weijun Qin
2010Implementation of Cloud Computing Environment for Discrete Event System Simulation using Service Oriented Architecture.
Chungman Seo, Youngshin Han, Hae Young Lee, Jason J. Jung, Chilgee Lee
2010Implementation of a Floating Point Adder and Subtracter in NoGAP, A Comparative Case Study.
Per Karlström, Wenbiao Zhou, Dake Liu
2010Improving the Accuracy of Object Tracking in Three Dimensional WSNs Using Bayesian Estimation Methods.
Junzhao Du, Lei Mao, Hui Liu, Bo Wu, Deke Guo
2010Interference Minimization in Wireless Networks.
Hakob Aslanyan, José D. P. Rolim
2010Isolating System Faults on Vehicular Network Gateways Using Virtualization.
Sung-Moon Chung, Hyun-Wook Jin
2010Key Sharing in Hierarchical Wireless Sensor Networks.
Yanan Liu, Jian Wang, He Du, Liang Zhang
2010LocaToR: Locating Passive RFID Tags with the Relative Neighborhood Graph.
Yiyang Zhao, Shing-Chi Cheung, Lionel M. Ni
2010Localization with a Mobile Beacon in Underwater Sensor Networks.
Sangho Lee, Kiseon Kim
2010M-Trust: A Trust Management Scheme for Mobile P2P Networks.
Basit Qureshi, Geyong Min, Demetres D. Kouvatsos
2010Middleware Support for Context-awareness in Asynchronous Pervasive Computing Environments.
Jianping Yu, Yu Huang, Jiannong Cao, XianPing Tao
2010Modeling and Robust Control for Trusted Web Server.
Bing Du, Chun Ruan
2010Modelling Smart Card Security Protocols in SystemC TLM.
Aisha Fouad Bushager, Mark Zwolinski
2010Monitoring Library Function-based Intrusion Prevention System with Continuing Execution Mechanism.
Yudai Kato, Yuji Makimoto, Hironori Shirai, Hiromi Shimizu, Yusuke Furuya, Shoichi Saito, Hiroshi Matsuo
2010Multi-resolution Next Location Prediction for Distributed Virtual Environments.
Jaroslav Pribyl, Pavel Zemcík
2010Node Trust Assessment in Mobile Ad Hoc Networks Based on Multi-dimensional Fuzzy Decision Making.
Feng Zhang, Zhiping Jia, Xin Li, Hui Xia
2010OCO: A Multi-channel MAC Protocol with Opportunistic Cooperation for Wireless Sensor Networks.
Jinbao Li, Desheng Zhang, Longjiang Guo
2010OST: A Transaction Based Online Social Trust Model for Social Network and File Sharing Security.
Ming Li, Alessio Bonti, Wanlei Zhou
2010On Efficient Clock Drift Prediction Means and their Applicability to IEEE 802.15.4.
Marcin Brzozowski, Hendrik Salomon, Peter Langendörfer
2010On the Security of Non-Linear HB (NLHB) Protocol against Passive Attack.
Mohammad Reza Sohizadeh Abyaneh
2010On the Sender Cover Traffic Countermeasure against an Improved Statistical Disclosure Attack.
Rajiv Bagai, Huabo Lu, Bin Tang
2010Online Personal Connection Presentation System for Communication Assistance.
Ryota Ayaki, Hideki Shimada, Kenya Sato
2010Optimized Schedule Synthesis under Real-Time Constraints for the Dynamic Segment of FlexRay.
Reinhard Schneider, Unmesh D. Bordoloi, Dip Goswami, Samarjit Chakraborty
2010Optimizing Runtime Reconfiguration Decisions.
Thilo Pionteck, Steffen Sammann, Carsten Albrecht
2010PBTrust: A Priority-Based Trust Model for Service Selection in General Service-Oriented Environments.
Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim
2010PDVDS: A Pattern-Driven Software Vulnerability Detection System.
Shaoyin Cheng, Jinding Wang, Jiajie Wang, Jun Yang, Fan Jiang
2010Partitioning Detection and Connectivity Restoration Algorithm for Wireless Sensor and Actor Networks.
Muhammad Imran, Mohamed F. Younis, Abas Md Said, Halabi Hasbullah
2010Passive Worm and Malware Detection in Peer-to-Peer Networks.
Sahar Fahimian, Amirvala Movahed, Mehdi Kharrazi
2010Phase Characterization and Classification for Micro-architecture Soft Error.
Yu Cheng, Anguo Ma, Yuxing Tang, Minxuan Zhang
2010Power Management in Real Time Embedded Systems through Online and Adaptive Interplay of DPM and DVFS Policies.
Muhammad Khurram Bhatti, Cécile Belleudy, Michel Auguin
2010Predictive Power Control for Mobile Wireless Networks with Time-Varying Delay.
Cunwu Han, Dehui Sun, Zhijun Li, Mingyue Zhao
2010Preemption Control Using Frequency Scaling in Fixed Priority Scheduling.
Abhilash Thekkilakattil, Anju S. Pillai, Radu Dobrin, Sasikumar Punnekkat
2010Probabilistic Analysis on Mesh Network Fault Tolerance: Deterministic vs. Stochastic.
Gaocai Wang, Taoshen Li, Jianer Chen
2010RISN: An Efficient, Dynamically Tasked and Interoperable Sensor Network Overlay.
Evens Jean, Robert T. Collins, Ali R. Hurson, Sahra Sedigh, Yu Jiao
2010RWPAD: A Mobility Model for DTN Routing Performance Evaluation.
Yong Wang, Wei Peng, Xilong Mao, Zhenghu Gong
2010Real-Time Constrained Task Scheduling in 3D Chip Multiprocessor to Reduce Peak Temperature.
Jiayin Li, Meikang Qiu, Jianwei Niu, Tianzhou Chen, Yongxin Zhu
2010Real-time Enhancement for Xen Hypervisor.
Peijie Yu, Mingyuan Xia, Qian Lin, Min Zhu, Shang Gao, Zhengwei Qi, Kai Chen, Haibing Guan
2010Repair Policies of Coverage Holes Based Dynamic Node Activation in Wireless Sensor Networks.
Xiao-heng Deng, Chu-Gui Xu, Fu-Yao Zhao, Yi Liu
2010Replay Debugging for Multi-threaded Embedded Software.
Yann-Hang Lee, Young Wn Song, Rohit Girme, Sagar Zaveri, Yan Chen
2010Robot Control Using an Underwater Acoustic Modem.
Jun-Ho Jeon, Chang-Gi Hong, Sung-Joon Park, Changhwa Kim, Sangkyung Kim
2010Rule-based Approach for Context Inconsistency Management Scheme in Ubiquitous Computing.
Yong-Jae Lee, Jaehyoung Lim, Soon J. Hyun, Dongman Lee
2010S-Kcore: A Social-aware Kcore Decomposition Algorithm in Pocket Switched Networks.
Ming Li, Longxiang Gao, Wanlei Zhou
2010Schedule Swapping: A Technique for Temperature Management of Distributed Embedded Systems.
Farzad Samie Ghahfarokhi, Alireza Ejlali
2010Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks.
Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry
2010Secure Mobile Business Information Processing.
Nicolai Kuntze, Roland Rieke, Günther Diederich, Richard Sethmann, Karsten Sohr, Tanveer Mustafa, Kai-Oliver Detken
2010Security of the TCG Privacy-CA Solution.
Liqun Chen, Bogdan Warinschi
2010Semantic Device Bus for Internet of Things.
Kun Yang, Shijian Li, Li Zhang, Gang Pan
2010Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme.
Marc Stöttinger, Sorin A. Huss, Sascha Mühlbach, Andreas Koch
2010SimTrust: A New Method of Trust Network Generation.
Touhid Bhuiyan, Yue Xu, Audun Jøsang
2010Simulator Problem in User Centric Smart Card Ownership Model.
Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes
2010Spatio-Temporal Events in the Internet of Things.
Beihong Jin, Haibiao Chen
2010Spray and Routing for Message Delivery in Challenged Networks.
Wanrong Yu, Chunqing Wu, Xiaofeng Hu
2010TARo: Trusted Anonymous Routing for MANETs.
Jiefeng (Terence) Chen, Roksana Boreli, Vijay Sivaraman
2010The Architecture of Surface Gateway for Underwater Acoustic Sensor Networks.
Youngjun Jo, Jungyoungj Bae, Hyunjae Shin, Heungwoo Nam, Sae-Young Ahn, Sunshin An
2010The Cost of Altruistic Punishment in Indirect Reciprocity-based Cooperation in Mobile Ad Hoc Networks.
Marcin Seredynski, Pascal Bouvry
2010The Deficit and Dynamics of Trust.
Abhaya C. Nayak
2010Towards Precise Synchronisation in Wireless Sensor Networks.
Lawrence Cheng, Stephen Hailes, Alan Wilson
2010Trading Conditional Execution for More Registers on ARM Processors.
Huang-Jia Cheng, Yuan-Shin Hwang, Rong-Guey Chang, Cheng-Wei Chen
2010Transferring Ontologies between Mobile Devices and Knowledge-Based Systems.
Xiang Su, Jukka Riekki
2010Trick Play Function for VOD with SVC source.
Peng Zhu, Hideya Yoshiuchi, Satoshi Yoshizawa
2010Trust Management in Wireless Mobile Networks with Cooperative Communications.
Reyhaneh Changiz, Hassan Halabian, F. Richard Yu, Ioannis Lambadaris, Helen Tang
2010Trust Measurement Methods in Organic Computing Systems by Direct Observation.
Rolf Kiefhaber, Benjamin Satzger, Julia Schmitt, Michael Roth, Theo Ungerer
2010Trust-Based Authentication for Secure Communication in Cognitive Radio Networks.
Sazia Parvin, Song Han, Biming Tian, Farookh Khadeer Hussain
2010Trusted Computing Platform in Your Pocket.
Surya Nepal, John Zic, Dongxi Liu, Julian Jang
2010Trusted Risk Evaluation and Attribute Analysis in Ad-Hoc Networks Security Mechanism based on Projection Pursuit Principal Component Analysis.
Jihang Ye, Mengyao Liu, Cai Fu
2010Trusted Routing for Resource-Constrained Wireless Sensor Networks.
Khaled Daabaj, Mike Dixon, Terry Koziniec, Kevin Lee
2010Two-Tier Cluster Based Routing Protocol for Wireless Sensor Networks.
Asif U. Khattak, Ghalib A. Shah, M. Ahsan
2010UbiCloud: A Cloud Computing System for Ubiquitous Terminals Based on End User Virtualization.
Yuanfei Chen, Zhenmin Zhu, Yi Zeng, Zhe He
2010Uncertainty Reasoning on Fuzziness and Randomness in Challenged Networks.
Yang Li, Jing Wang, Yaowen Yuan, Xiumei Fan, Qian He
2010User-Level Network Protocol Stacks for Automotive Infotainment Systems.
Mu-Youl Lee, Hyun-Wook Jin
2010Video Streaming over Wireless Mesh Networks with Multi-Gateway Support.
Huali Cui, Depei Qian, Xingjun Zhang, Yi Liu
2010Virtual Brokers for Large-Scale Publish/Subscribe in Wireless Sensor Networks.
Yang Liu, Boon-Chong Seet, Adnan Al-Anbuky
2010When Ambient Intelligence Meets Internet Protocol Stack: User Layer Design.
Yu Lu, Mehul Motani, Wai-Choong Wong