| 2010 | A Cloud Architecture of Virtual Trusted Platform Modules. Dongxi Liu, Jack Lee, Julian Jang, Surya Nepal, John Zic |
| 2010 | A Connection-assured Many-to-one Communication of Wireless Sensors with Two Transmission Ranges. Wan Yeon Lee, Hyung Goo Paek, Jeong-Mo Yeo, Kyong Hoon Kim |
| 2010 | A Deterministic Key Management Scheme for Securing Cluster-Based Sensors Networks. Mandicou Ba, Ibrahima Niang, Bamba Gueye, Thomas Noël |
| 2010 | A Distributed Trust Model for Securing Mobile Ad Hoc Networks. Pushpita Chatterjee, Indranil Sengupta, Soumya Kanti Ghosh |
| 2010 | A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks. Junqi Zhang, Rajan Shankaran, Mehmet A. Orgun, Vijay Varadharajan, Abdul Sattar |
| 2010 | A Fast Heuristic for Solving the D1EC Coloring Problem. Fabio Campoccia, Vincenzo Mancuso |
| 2010 | A Fault-tolerant Architecture with Error Correcting Code for the Instruction-level Temporal Redundancy. Chao Yan, Hongjun Dai, Tianzhou Chen, Meikang Qiu |
| 2010 | A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks. Biming Tian, Song Han, Sazia Parvin, Tharam S. Dillon |
| 2010 | A Light Reasoning Infrastructure to Enable Context-aware Mobile Applications. Josué Iglesias, Ana M. Bernardos, Alejandro Álvarez, Marcos Sacristán |
| 2010 | A Method for Dimensioning Micro-Scale Solar Energy Harvesting Systems Based on Energy Level Simulations. Sebastian Bader, Torsten Schölzel, Bengt Oelmann |
| 2010 | A Novel Secure Bilinear Pairing Based Remote User Authentication Scheme with Smart Card. Majid Bayat, Mohammad Sabzinejad Farash, Amirvala Movahed |
| 2010 | A Reflective Service Gateway for Integrating Evolvable Sensor-Actuator Networks with Pervasive Infrastructure. Seong Hoon Kim, Daeyoung Kim, Jeong Seok Kang, Hong Seong Park |
| 2010 | A Routing Algorithm Based on Trustworthy Core Tree for WSN. Jiang-Tao Wang, Li-miao Li, Zhigang Chen |
| 2010 | A Scalable Encryption Scheme for Multi-Privileged Group Communications. Qiushuang Du, Guojun Wang, Qin Liu |
| 2010 | A Secure Self-Destructing Scheme for Electronic Data. Fengshun Yue, Guojun Wang, Qin Liu |
| 2010 | A Study on the Underwater Acoustic Communication with Direct Sequence Spread Spectrum. Jeong-Woo Han, Se-Young Kim, Ki-Man Kim, Wonseok Choi, Minjae Kim, Seung-Yong Chun, Kwon Son |
| 2010 | Above the Trust and Security in Cloud Computing: A Notion Towards Innovation. Mahbub Ahmed, Yang Xiang, A. B. M. Shawkat Ali |
| 2010 | Adaptive GTS Allocation Scheme based on IEEE 802.15.4 for Underwater Acoustic Sensor Networks. Jung-Il Namgung, Soo Young Shin, Nam-Yeol Yun, Soo-Hyun Park |
| 2010 | Ambient Intelligence, Smart Objects and Sensor Networks: Practical Experiences. Elisabetta Farella |
| 2010 | An Access Control Architecture for Distributing Trust in Pervasive Computing Environments. Raquel L. Hill, Jalal Al-Muhtadi, William E. Byrd |
| 2010 | An Application Framework for Loosely Coupled Networked Cyber-Physical Systems. Minyoung Kim, Mark-Oliver Stehr, Jinwoo Kim, Soonhoi Ha |
| 2010 | An Efficient Clustering Algorithm Using Evolutionary HMM in Wireless Sensor Networks. Rouhollah Goudarzi, Behrouz Jedari, Masoud Sabaei |
| 2010 | An Environment for Design Software and Hardware Aspects of Clock Synchronization and Communication in DRTES. Brahim Hamid, Adel Ziani |
| 2010 | An OSGi Based RFID Complex Event Processing System. Weifeng Hou, Di Hou, Juan Chen |
| 2010 | Analysis of Property Based Attestation in Trusted Platforms. Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens |
| 2010 | Architectural Support for Reducing Parallel Processing Overhead in an Embedded Multiprocessor. Jian Wang, Joar Sohl, Dake Liu |
| 2010 | Automated Software Protection through Program Externalization on Memory-Limited Secure Devices. Serge Chaumette, Olivier Ly, Renaud Tabary |
| 2010 | Avoidance of Blind Period for Node Coverage Grouping on Wireless Sensor Networks. Chow-Sing Lin, Chih-Chung Chen |
| 2010 | Bearings-only Tracking Systems with Distributed Floating Beacons in Underwater Sensor Networks. Eunchan Kim, Sangho Lee, Chungsan Kim, Kiseon Kim |
| 2010 | Capability-Role-Based Delegation in Workflow Systems. Koji Hasebe, Mitsuhiro Mabuchi |
| 2010 | Co-Simulation of Self-Adaptive Automotive Embedded Systems. Marc Zeller, Gereon Weiss, Dirk Eilers, Rudi Knorr |
| 2010 | Combined Authentication and Quality of Service in Cooperative Communication Networks. Ramya Ramamoorthy, F. Richard Yu, Helen Tang, Peter C. Mason |
| 2010 | Communication in a Behavior-based Approach to Target Detection and Tracking with Autonomous Underwater Vehicles. Laura Sorbi, Laura Toni, Graziano Pio De Capua, Lorenzo Rossi |
| 2010 | Context Awareness Aims at Novel Fruition Models: Augmented Reality May be the Killer Application for Context Awareness. Claudio Vemezia, Marco Marengo |
| 2010 | CredibilityRank: A Framework for the Design and Evaluation of Rank-based Credibility Models for Web Applications. Sara Guimaraes, Arlei Silva, Wagner Meira Jr., Adriano C. M. Pereira |
| 2010 | Defending Malicious Collision Attacks in Wireless Sensor Networks. Phillip Reindl, Kendall E. Nygard, Xiaojiang Du |
| 2010 | Design and Implementation of the Test-bed for Underwater Acoustic Sensor Network Based on ARM9 Processor. Yung-Pyo Kim, Jung-Il Namgung, Nam-Yeol Yun, Hui-Jin Cho, Imtiaz Ahmed Khan, Soo-Hyun Park |
| 2010 | Designing Security Protocols Adapted to the Constraints of Mobile Environments. Michel Kamel, Karima Boudaoud, Sylvain Lequeux, Michel Riveill |
| 2010 | Detecting Security Attacks in Trusted Virtual Domains. Udaya Kiran Tupakula, Vijay Varadharajan |
| 2010 | Detection and Prevention of Routing Intrusions in Mobile Ad Hoc Networks. Pradeep Moradiya, Srinivas Sampalli |
| 2010 | Efficient Data Delivery in Wireless Sensor Networks with Ubiquitous Mobile Data Collectors. Weiwei Jiao, Long Cheng, Yimin Chen, Canfeng Chen, Jian Ma |
| 2010 | Efficient RFID Authentication Scheme for Supply Chain Applications. Fei Bi, Yi Mu |
| 2010 | Empirical Evaluation of Content-based Pub/Sub Systems over Cloud Infrastructure. Biao Zhang, Beihong Jin, Haibiao Chen, Ziyuan Qin |
| 2010 | Energy Balanced Routing Strategy in Wireless Sensor Networks. Xiaoguang Zhang, Zheng Da Wu |
| 2010 | Experimental Results of Single Carrier Digital Modulation for Underwater Sensor Networks. Se-Young Kim, Jeong-Woo Han, Ki-Man Kim, Sanghoon Baek, Hyungchul Kim, Changhwa Kim |
| 2010 | Extending a Key-Chain Based Certified Email Protocol with Transparent TTP. Zhiyuan Liu, Jun Pang, Chenyi Zhang |
| 2010 | Formal Trust Specification in Service Workflows. Wattana Viriyasitavat, Andrew P. Martin |
| 2010 | GEDS: GPU Execution of Continuous Queries on Spatio-Temporal Data Streams. Jonathan Cazalas, Ratan K. Guha |
| 2010 | Guess and Determine Attack on Trivium Family. Neda Rohani, Zainab Noferesti, Javad Mohajeri, Mohammad Reza Aref |
| 2010 | Handling Mobility on a QoS-Aware Service-based Framework for Mobile Systems. Joel Gonçalves, Luis Lino Ferreira, Luís Miguel Pinho, Guilherme D. Silva |
| 2010 | Hierarchical Certificateless Signatures. Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin |
| 2010 | Hierarchical Cooperative Data Caching for Wireless Mesh Networks. Weigang Wu, Yifei Huang |
| 2010 | Hierarchical Real-Time Scheduling Framework for Imprecise Computations. Guy Martin Tchamgoue, Kyong Hoon Kim, Yong-Kee Jun, Wan Yeon Lee |
| 2010 | IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, EUC 2010, Hong Kong, China, 11-13 December 2010 |
| 2010 | IOT Gateway: BridgingWireless Sensor Networks into Internet of Things. Qian Zhu, Ruicong Wang, Qi Chen, Yan Liu, Weijun Qin |
| 2010 | Implementation of Cloud Computing Environment for Discrete Event System Simulation using Service Oriented Architecture. Chungman Seo, Youngshin Han, Hae Young Lee, Jason J. Jung, Chilgee Lee |
| 2010 | Implementation of a Floating Point Adder and Subtracter in NoGAP, A Comparative Case Study. Per Karlström, Wenbiao Zhou, Dake Liu |
| 2010 | Improving the Accuracy of Object Tracking in Three Dimensional WSNs Using Bayesian Estimation Methods. Junzhao Du, Lei Mao, Hui Liu, Bo Wu, Deke Guo |
| 2010 | Interference Minimization in Wireless Networks. Hakob Aslanyan, José D. P. Rolim |
| 2010 | Isolating System Faults on Vehicular Network Gateways Using Virtualization. Sung-Moon Chung, Hyun-Wook Jin |
| 2010 | Key Sharing in Hierarchical Wireless Sensor Networks. Yanan Liu, Jian Wang, He Du, Liang Zhang |
| 2010 | LocaToR: Locating Passive RFID Tags with the Relative Neighborhood Graph. Yiyang Zhao, Shing-Chi Cheung, Lionel M. Ni |
| 2010 | Localization with a Mobile Beacon in Underwater Sensor Networks. Sangho Lee, Kiseon Kim |
| 2010 | M-Trust: A Trust Management Scheme for Mobile P2P Networks. Basit Qureshi, Geyong Min, Demetres D. Kouvatsos |
| 2010 | Middleware Support for Context-awareness in Asynchronous Pervasive Computing Environments. Jianping Yu, Yu Huang, Jiannong Cao, XianPing Tao |
| 2010 | Modeling and Robust Control for Trusted Web Server. Bing Du, Chun Ruan |
| 2010 | Modelling Smart Card Security Protocols in SystemC TLM. Aisha Fouad Bushager, Mark Zwolinski |
| 2010 | Monitoring Library Function-based Intrusion Prevention System with Continuing Execution Mechanism. Yudai Kato, Yuji Makimoto, Hironori Shirai, Hiromi Shimizu, Yusuke Furuya, Shoichi Saito, Hiroshi Matsuo |
| 2010 | Multi-resolution Next Location Prediction for Distributed Virtual Environments. Jaroslav Pribyl, Pavel Zemcík |
| 2010 | Node Trust Assessment in Mobile Ad Hoc Networks Based on Multi-dimensional Fuzzy Decision Making. Feng Zhang, Zhiping Jia, Xin Li, Hui Xia |
| 2010 | OCO: A Multi-channel MAC Protocol with Opportunistic Cooperation for Wireless Sensor Networks. Jinbao Li, Desheng Zhang, Longjiang Guo |
| 2010 | OST: A Transaction Based Online Social Trust Model for Social Network and File Sharing Security. Ming Li, Alessio Bonti, Wanlei Zhou |
| 2010 | On Efficient Clock Drift Prediction Means and their Applicability to IEEE 802.15.4. Marcin Brzozowski, Hendrik Salomon, Peter Langendörfer |
| 2010 | On the Security of Non-Linear HB (NLHB) Protocol against Passive Attack. Mohammad Reza Sohizadeh Abyaneh |
| 2010 | On the Sender Cover Traffic Countermeasure against an Improved Statistical Disclosure Attack. Rajiv Bagai, Huabo Lu, Bin Tang |
| 2010 | Online Personal Connection Presentation System for Communication Assistance. Ryota Ayaki, Hideki Shimada, Kenya Sato |
| 2010 | Optimized Schedule Synthesis under Real-Time Constraints for the Dynamic Segment of FlexRay. Reinhard Schneider, Unmesh D. Bordoloi, Dip Goswami, Samarjit Chakraborty |
| 2010 | Optimizing Runtime Reconfiguration Decisions. Thilo Pionteck, Steffen Sammann, Carsten Albrecht |
| 2010 | PBTrust: A Priority-Based Trust Model for Service Selection in General Service-Oriented Environments. Xing Su, Minjie Zhang, Yi Mu, Kwang Mong Sim |
| 2010 | PDVDS: A Pattern-Driven Software Vulnerability Detection System. Shaoyin Cheng, Jinding Wang, Jiajie Wang, Jun Yang, Fan Jiang |
| 2010 | Partitioning Detection and Connectivity Restoration Algorithm for Wireless Sensor and Actor Networks. Muhammad Imran, Mohamed F. Younis, Abas Md Said, Halabi Hasbullah |
| 2010 | Passive Worm and Malware Detection in Peer-to-Peer Networks. Sahar Fahimian, Amirvala Movahed, Mehdi Kharrazi |
| 2010 | Phase Characterization and Classification for Micro-architecture Soft Error. Yu Cheng, Anguo Ma, Yuxing Tang, Minxuan Zhang |
| 2010 | Power Management in Real Time Embedded Systems through Online and Adaptive Interplay of DPM and DVFS Policies. Muhammad Khurram Bhatti, Cécile Belleudy, Michel Auguin |
| 2010 | Predictive Power Control for Mobile Wireless Networks with Time-Varying Delay. Cunwu Han, Dehui Sun, Zhijun Li, Mingyue Zhao |
| 2010 | Preemption Control Using Frequency Scaling in Fixed Priority Scheduling. Abhilash Thekkilakattil, Anju S. Pillai, Radu Dobrin, Sasikumar Punnekkat |
| 2010 | Probabilistic Analysis on Mesh Network Fault Tolerance: Deterministic vs. Stochastic. Gaocai Wang, Taoshen Li, Jianer Chen |
| 2010 | RISN: An Efficient, Dynamically Tasked and Interoperable Sensor Network Overlay. Evens Jean, Robert T. Collins, Ali R. Hurson, Sahra Sedigh, Yu Jiao |
| 2010 | RWPAD: A Mobility Model for DTN Routing Performance Evaluation. Yong Wang, Wei Peng, Xilong Mao, Zhenghu Gong |
| 2010 | Real-Time Constrained Task Scheduling in 3D Chip Multiprocessor to Reduce Peak Temperature. Jiayin Li, Meikang Qiu, Jianwei Niu, Tianzhou Chen, Yongxin Zhu |
| 2010 | Real-time Enhancement for Xen Hypervisor. Peijie Yu, Mingyuan Xia, Qian Lin, Min Zhu, Shang Gao, Zhengwei Qi, Kai Chen, Haibing Guan |
| 2010 | Repair Policies of Coverage Holes Based Dynamic Node Activation in Wireless Sensor Networks. Xiao-heng Deng, Chu-Gui Xu, Fu-Yao Zhao, Yi Liu |
| 2010 | Replay Debugging for Multi-threaded Embedded Software. Yann-Hang Lee, Young Wn Song, Rohit Girme, Sagar Zaveri, Yan Chen |
| 2010 | Robot Control Using an Underwater Acoustic Modem. Jun-Ho Jeon, Chang-Gi Hong, Sung-Joon Park, Changhwa Kim, Sangkyung Kim |
| 2010 | Rule-based Approach for Context Inconsistency Management Scheme in Ubiquitous Computing. Yong-Jae Lee, Jaehyoung Lim, Soon J. Hyun, Dongman Lee |
| 2010 | S-Kcore: A Social-aware Kcore Decomposition Algorithm in Pocket Switched Networks. Ming Li, Longxiang Gao, Wanlei Zhou |
| 2010 | Schedule Swapping: A Technique for Temperature Management of Distributed Embedded Systems. Farzad Samie Ghahfarokhi, Alireza Ejlali |
| 2010 | Secret Key Generation Rate vs. Reconciliation Cost Using Wireless Channel Characteristics in Body Area Networks. Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry |
| 2010 | Secure Mobile Business Information Processing. Nicolai Kuntze, Roland Rieke, Günther Diederich, Richard Sethmann, Karsten Sohr, Tanveer Mustafa, Kai-Oliver Detken |
| 2010 | Security of the TCG Privacy-CA Solution. Liqun Chen, Bogdan Warinschi |
| 2010 | Semantic Device Bus for Internet of Things. Kun Yang, Shijian Li, Li Zhang, Gang Pan |
| 2010 | Side-Channel Resistance Evaluation of a Neural Network Based Lightweight Cryptography Scheme. Marc Stöttinger, Sorin A. Huss, Sascha Mühlbach, Andreas Koch |
| 2010 | SimTrust: A New Method of Trust Network Generation. Touhid Bhuiyan, Yue Xu, Audun Jøsang |
| 2010 | Simulator Problem in User Centric Smart Card Ownership Model. Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes |
| 2010 | Spatio-Temporal Events in the Internet of Things. Beihong Jin, Haibiao Chen |
| 2010 | Spray and Routing for Message Delivery in Challenged Networks. Wanrong Yu, Chunqing Wu, Xiaofeng Hu |
| 2010 | TARo: Trusted Anonymous Routing for MANETs. Jiefeng (Terence) Chen, Roksana Boreli, Vijay Sivaraman |
| 2010 | The Architecture of Surface Gateway for Underwater Acoustic Sensor Networks. Youngjun Jo, Jungyoungj Bae, Hyunjae Shin, Heungwoo Nam, Sae-Young Ahn, Sunshin An |
| 2010 | The Cost of Altruistic Punishment in Indirect Reciprocity-based Cooperation in Mobile Ad Hoc Networks. Marcin Seredynski, Pascal Bouvry |
| 2010 | The Deficit and Dynamics of Trust. Abhaya C. Nayak |
| 2010 | Towards Precise Synchronisation in Wireless Sensor Networks. Lawrence Cheng, Stephen Hailes, Alan Wilson |
| 2010 | Trading Conditional Execution for More Registers on ARM Processors. Huang-Jia Cheng, Yuan-Shin Hwang, Rong-Guey Chang, Cheng-Wei Chen |
| 2010 | Transferring Ontologies between Mobile Devices and Knowledge-Based Systems. Xiang Su, Jukka Riekki |
| 2010 | Trick Play Function for VOD with SVC source. Peng Zhu, Hideya Yoshiuchi, Satoshi Yoshizawa |
| 2010 | Trust Management in Wireless Mobile Networks with Cooperative Communications. Reyhaneh Changiz, Hassan Halabian, F. Richard Yu, Ioannis Lambadaris, Helen Tang |
| 2010 | Trust Measurement Methods in Organic Computing Systems by Direct Observation. Rolf Kiefhaber, Benjamin Satzger, Julia Schmitt, Michael Roth, Theo Ungerer |
| 2010 | Trust-Based Authentication for Secure Communication in Cognitive Radio Networks. Sazia Parvin, Song Han, Biming Tian, Farookh Khadeer Hussain |
| 2010 | Trusted Computing Platform in Your Pocket. Surya Nepal, John Zic, Dongxi Liu, Julian Jang |
| 2010 | Trusted Risk Evaluation and Attribute Analysis in Ad-Hoc Networks Security Mechanism based on Projection Pursuit Principal Component Analysis. Jihang Ye, Mengyao Liu, Cai Fu |
| 2010 | Trusted Routing for Resource-Constrained Wireless Sensor Networks. Khaled Daabaj, Mike Dixon, Terry Koziniec, Kevin Lee |
| 2010 | Two-Tier Cluster Based Routing Protocol for Wireless Sensor Networks. Asif U. Khattak, Ghalib A. Shah, M. Ahsan |
| 2010 | UbiCloud: A Cloud Computing System for Ubiquitous Terminals Based on End User Virtualization. Yuanfei Chen, Zhenmin Zhu, Yi Zeng, Zhe He |
| 2010 | Uncertainty Reasoning on Fuzziness and Randomness in Challenged Networks. Yang Li, Jing Wang, Yaowen Yuan, Xiumei Fan, Qian He |
| 2010 | User-Level Network Protocol Stacks for Automotive Infotainment Systems. Mu-Youl Lee, Hyun-Wook Jin |
| 2010 | Video Streaming over Wireless Mesh Networks with Multi-Gateway Support. Huali Cui, Depei Qian, Xingjun Zhang, Yi Liu |
| 2010 | Virtual Brokers for Large-Scale Publish/Subscribe in Wireless Sensor Networks. Yang Liu, Boon-Chong Seet, Adnan Al-Anbuky |
| 2010 | When Ambient Intelligence Meets Internet Protocol Stack: User Layer Design. Yu Lu, Mehul Motani, Wai-Choong Wong |