12. CSE 2009:
Vanoucer,
BC,
Canada - Volume 2
Proceedings IEEE CSE'09, 12th IEEE International Conference on Computational Science and Engineering, August 29-31, 2009, Vancouver, BC, Canada.
IEEE Computer Society 2009
The 7th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2009)
Embedded Systems and HW/SW Codesign
- Sebastian Hessel, David Szczesny, Shadi Traboulsi, Attila Bilgic, Josef Hausner:
On the Design of a Suitable Hardware Platform for Protocol Stack Processing in LTE Terminals.
1-8
- Sheng-Wei Huang, Yung-Chang Chiu, Zhong-Ho Chen, Ce-Kuen Shieh, Alvin Wen-Yu Su, Tyng-Yeu Liang:
A Region-Based Allocation Approach for Page-Based Scratch-Pad Memory in Embedded Systems.
9-16
- Joseph Reddington, Gregory Gutin, Adrian Johnstone, Elizabeth Scott, Anders Yeo:
Better Than Optimal: Fast Identification of Custom Instruction Candidates.
17-24
Multimedia and Data Management
Power-Aware Computing
Sensor Networks
- Alan Marchiori, Qi Han:
A Two-Stage Bootloader to Support Multi-application Deployment and Switching in Wireless Sensor Networks.
71-78
- Long Cheng, Canfeng Chen, Jian Ma, Lei Shu, Hongyang Chen, Laurence Tianruo Yang:
Residual Time Aware Forwarding for Randomly Duty-Cycled Wireless Sensor Networks.
79-86
- Ying Zhu, Qi Han:
The More Relay Nodes, the More Energy Efficient?
87-92
- Sudha Krishnamurthy, Geethapriya Thamilarasu, Christian Bauckhage:
MALADY: A Machine Learning-Based Autonomous Decision-Making System for Sensor Networks.
93-100
- Hyun-Sung Park, Jong-Deok Kim:
Design of an RFID Air Protocol Filtering Technique.
101-108
- Marcin Brzozowski, Hendrik Salomon, Peter Langendoerfer:
Completely Distributed Low Duty Cycle Communication for Long-Living Sensor Networks.
109-116
Wireless Communications
Middleware and P2P
Embedded Software and Optimization I
Pervasive and Ubiquitous Computing I
- Rocco Aversa, Beniamino Di Martino, Salvatore Venticinque:
Distributed Agents Network for Ubiquitous Monitoring and Services Exploitation.
197-204
- Daqiang Zhang, Jiannong Cao, Jingyu Zhou, Minyi Guo:
Extended Dempster-Shafer Theory in Context Reasoning for Ubiquitous Computing Environments.
205-212
- Tomomi Kawashima, Jianhua Ma, Runhe Huang, Bernady O. Apduhan:
GUPSS: A Gateway-Based Ubiquitous Platform for Smart Space.
213-220
- Jonathan Cazalas, Kien A. Hua:
Leveraging Computation Sharing and Parallel Processing in Location-Based Services.
221-228
- Shandan Zhou, Xingshe Zhou, Zhiwen Yu, Kaibo Wang, Haipeng Wang, Hongbo Ni:
A Recommendation Framework towards Personalized Services in Intelligent Museum.
229-236
Dependable,
Autonomic,
Secure Computing
Real-Time and Cyber-Physical Systems
- Mike Holenderski, Reinder J. Bril, Johan J. Lukkien:
Swift Mode Changes in Memory Constrained Real-Time Systems.
262-269
- Mingsong Lv, Nan Guan, Yi Zhang, Rui Chen, Qingxu Deng, Ge Yu, Wang Yi:
WCET Analysis of the mC/OS-II Real-Time Kernel.
270-276
- Khurram Jawed, John Morris, Tariq Khan, Georgy L. Gimel'farb:
Real Time Rectification for Stereo Correspondence.
277-284
- Luís Nogueira, Luís Miguel Pinho, Jorge Coelho:
Coordinated Runtime Adaptations in Cooperative Open Real-Time Systems.
285-294
- Huthaifa Al-Omari, Francis G. Wolff, Christos A. Papachristou, David R. McIntyre:
Avoiding Delay Jitter in Cyber-Physical Systems Using One Way Delay Variations Model.
295-302
Pervasive and Ubiquitous Computing II
- Roman Amstutz, Oliver Amft, Brian French, Asim Smailagic, Daniel P. Siewiorek, Gerhard Tröster:
Performance Analysis of an HMM-Based Gesture Recognition Using a Wristwatch Device.
303-309
- Hyun-Sung Park, Seung-Chur Yang, Doo-Hwan Oh, Jong-Deok Kim:
Design and Implementation of WLAN-Based Automatic Vehicle Identification.
310-317
- Runhe Huang, Jianhua Ma, Qun Jin:
A Tree-Structured Intelligence Entity Pool and Its Sharing among Ubiquitous Objects.
318-325
- Yunpu Zhu, Jacqueline E. Rice:
A Lightweight Architecture for Secure Two-Party Mobile Payment.
326-333
Embedded Software and Optimization II
- Je-Hyung Lee, Soo-Mook Moon, Hyung-Kyu Choi:
Comparison of Bank Change Mechanisms for Banked Reduced Encoding Architectures.
334-341
- Joel Koshy, Raju Pandey, Ingwar Wirjawan:
Optimizing Embedded Virtual Machines.
342-351
- Chung-Wen Huang, Kun-Yuan Hsieh, Jia-Jhe Li, Jenq Kuen Lee:
Support of Paged Register Files for Improving Context Switching on Embedded Processors.
352-357
- Yanqin Yang, Meng Wang, Zili Shao, Minyi Guo:
Dynamic Scratch-Pad Memory Management with Data Pipelining for Embedded Systems.
358-365
- Fahime Moein-darbari, Ahmad Khademzadeh, Golnar Gharooni-fard:
Evaluating the Performance of a Chaos Genetic Algorithm for Solving the Network on Chip Mapping Problem.
366-373
- Yu-Hsun Lin, Xuan-Yi Lin, Yeh-Ching Chung:
Reducing Leakage Power of JPEG Image on Asymmetric SRAM.
374-381
The 2009 IEEE/IFIP International Symposium on Embedded and Pervasive Systems (EPS 2009)
Real-Time Embedded Systems
Data Management and Multimedia
- Chung-Ping Chung, Hong-Wei Chen, Hui-Chin Yang:
Blocked-Z Test for Reducing Rasterization, Z Test and Shading Workloads.
402-407
- Chih-Chieh Hsiao, Chung-Ping Chung, Hui-Chin Yang:
A Hierarchical Primitive Lists Structure for Tile-Based Rendering.
408-413
- Hsiu-ching Hsieh, Chih-Chieh Hsiao, Hui-Chin Yang, Chung-Ping Chung, Jean Jyh-Jiun Shann:
Methods for Precise False-Overlap Detection in Tile-Based Rendering.
414-419
- Chung-Ping Chung, Tung-Lin Lu, Hui-Chin Yang:
H-Buffer: An Efficient History-Based and Overflow Sharing Transparent Fragment Storage Method.
420-425
- Feiyu Lin, Christopher Henricsson, Syed Muhammad Abbas, Kurt Sandkuhl:
HyperCircle: An Efficient Broadcast Protocol for Super-Peer P2P Networks.
426-433
Wireless Communications
Mobile Computing
- Antoniya Petkova, Kien A. Hua, Alexander J. Aved:
Processing Approximate Moving Range Queries in Mobile Sensor Environments.
452-457
- Kurt Geihs, Roland Reichle, Michael Wagner, Mohammad Ullah Khan:
Service-Oriented Adaptation in Ubiquitous Computing Environments.
458-463
- Amine Dhraief, Nicolas Montavont:
Rehoming Decision Algorithm: Design and Empirical Evaluation.
464-469
- Yanqin Yang, Minyi Guo, Feilong Tang, Gongwei Zhang:
Black Bridge: A Scatternet Formation Algorithm for Solving a New Emerging Problem.
470-475
- Shengrong Bu, Peter Liu:
Choosing Service Directory Nodes in Proposed Service Discovery Model for Mobile Ad Hoc Networks.
476-480
- Olapeju Latifat Ayoola, Eleni Mangina Phelan:
Accumulating a Personalised Ubiquitous Learning Platform for Enhancing the Third Level Educational Experience.
481-486
Reliability and Security
Optimization and HW/SW Codesigns
Power/Energy-Aware Computing
Sensor Networks
- Tzung-Shi Chen, Hua-Wen Tsai, Chih-Wei Wei:
Dispatch of Mobile Resources in Wireless Sensor Networks.
564-569
- Abdulaziz Barnawi, Roshdy H. M. Hafez:
A Time & Energy Efficient Topology Discovery and Scheduling Protocol for Wireless Sensor Networks.
570-578
- Hyuntae Cho, Jeonsu Jung, Bongrae Cho, Youngwoo Jin, Seung-Woo Lee, Yunju Baek:
Precision Time Synchronization Using IEEE 1588 for Wireless Sensor Networks.
579-586
- Stefano Abbate, Marco Avvenuti, Paolo Corsini, Alessio Vecchio:
Localization of Shipping Containers in Ports and Terminals Using Wireless Sensor Networks.
587-592
- Shahram Nourizadeh, Yeqiong Song, Jean-Pierre Thomesse:
A Failure Adapted, Load-Balanced Distributed Routing for Wireless Ad Hoc Sensor Networks.
593-596
- Chung-Horng Lung, Oliver W. W. Yang:
Evaluation of an Adaptive PI Rate Controller for Congestion Control in Wireless Ad-Hoc/Sensor Networks.
597-602
The 4th International Symposium on Cloud and Convergence Computing (2CCom 2009)
- Chang-Wu Lee, Sung-Won Kim, Heon-Jong Lee, Youn-Hee Han, Doo-Soon Park, Young-Sik Jeong:
Visualization of the Constrained Coverage of Mobile Sensor Networks Based on GML.
603-608
- HwaMin Lee, Doo-Soon Park, Min Hong, Sang-Soo Yeo, SooKyun Kim, SungHoon Kim:
A Resource Management System for Fault Tolerance in Grid Computing.
609-614
- Jin-Woo Kim, Kyeong Hur, Kwang-il Hwang, Doo Seop Eom:
A Distributed Reservation Protocol for Collision-Free Three-Hop Mobility Support in WiMedia MAC.
615-620
- Kwang-il Hwang, Sang-Soo Yeo, Jong Hyuk Park:
Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers.
621-626
- Seung-Ku Kim, Jae-Ho Lee, Kwang-il Hwang, Kyeong Hur, Doo Seop Eom:
Reprogrammable Module-Linker for Energy-Efficient Wireless Sensor Networks.
627-632
- Eun-Jun Yoon, Kee-Young Yoo:
Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECC.
633-640
The 2009 International Symposium on Trusted Computing and Communications (TrustCom 2009)
Trust Model,
Propagation,
and Management
- Jin-Hee Cho, Ananthram Swami, Ing-Ray Chen:
Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks.
641-650
- Lan Wang, Qishi Wu, Yaoqing Liu:
Design and Validation of PATRICIA for the Mitigation of Network Flooding Attacks.
651-658
- Marek Klonowski, Michal Przykucki, Tomasz Struminski:
Data Deletion with Time-Aware Adversary Model.
659-664
- Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka:
Obfuscation Mechanism in Conjunction with Tamper-Proof Module.
665-670
- Aimin Yu, Dengguo Feng, Ren Liu:
TBDRM: A TPM-Based Secure DRM Architecture.
671-677
- Chao Chen, Ke Wang, Shuren Liao, Qiuyan Zhang, Yiqi Dai:
A Novel Server-Based Application Execution Architecture.
678-683
- Latifa Boursas, Wolfgang Hommel:
Multidimensional Dynamic Trust Management for Federated Services.
684-689
Trusted Services and Applications
Cryptography and Security Protocols
- Qin Liu, Guojun Wang, Jie Wu:
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing.
715-720
- Rong-wei Yu, Li-na Wang, Xiao-yan Ma, Bo Kuang:
A Direct Anonymous Attestation Protocol Based on Hierarchical Group Signature.
721-726
- Zhenyu Wang, Jianhua Huang, Yu Wang, Xiangdong Li, Xuetao Sun, Ruimin Wang:
A Multi-party Contract Signing Protocol and Its Implementation via Trusted Computing.
727-731
- Yu Qin, Dengguo Feng, Zhen Xu:
An Anonymous Property-Based Attestation Protocol from Bilinear Maps.
732-738
- Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mahmud, Muhammad Khurram Khan:
Bio-chaotic Stream Cipher-Based Iris Image Encryption.
739-744
Reliability,
Survivability,
and Fault Tolerance
- Asmaa Adnane, Christophe Bidan, Rafael Timóteo de Sousa Júnior:
Trust-Based Countermeasures for Securing OLSR Protocol.
745-752
- Adrian P. Lauf, William H. Robinson:
Fault Tolerance in MANETs Using a Task-to-Resource Reallocation Framework.
753-758
- Wanfu Ding, Ruifeng Guo:
An Effective RM-Based Scheduling Algorithm for Fault-Tolerant Real-Time Systems.
759-764
- Gang Yin, Dian-xi Shi, Huaimin Wang, Min Guo:
RepCom: Towards Reputation Composition over Peer-to-Peer Communities.
765-771
- Zhiqian Xu, Hai Jiang:
HASS: Highly Available, Scalable and Secure Distributed Data Storage Systems.
772-780
- Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph:
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs.
781-786
Access Control and Authentication
- Fei Richard Yu, Helen Tang, Fei Wang, Victor C. M. Leung:
Distributed Node Selection for Threshold Key Management with Intrusion Detection in Mobile Ad Hoc Networks.
787-794
- Chenjia Wang, Kevin P. Monaghan, Weisong Shi:
HACK: A Health-Based Access Control Mechanism for Dynamic Enterprise Environments.
795-801
- Mohamed Ali Ayachi, Christophe Bidan, Tarek Abbes, Adel Bouhoula:
Misbehavior Detection Using Implicit Trust Relations in the AODV Routing Protocol.
802-808
- Wenchao Huang, Yan Xiong, Depin Chen:
DAAODV: A Secure Ad Hoc Routing Protocol Based on Direct Anonymous Attestation.
809-816
- Honglei Gao, Guolong Chen, Wenzhong Guo:
A GEP-Based Anomaly Detection Scheme in Wireless Sensor Networks.
817-822
- Hao Hu, Hao Li, Dengguo Feng:
L-UCON: Towards Layered Access Control with UCON.
823-829
Trusted Computing Platform and Software
- Eugen Leontie, Gedare Bloom, Bhagirath Narahari, Rahul Simha, Joseph Zambreno:
Hardware Containers for Software Components: A Trusted Platform for COTS-Based Systems.
830-836
- Sarosh Hashmi, John Brooke:
A Software Based Approach for Trusted Agent Execution on Malicious Host.
837-846
- Céline Thuillet, Philippe Andouard, Olivier Ly:
A Smart Card Power Analysis Simulator.
847-852
- Chang-ai Sun, Baobao Zhang, Jin Li:
TSGen: A UML Activity Diagram-Based Test Scenario Generation Tool.
853-858
- Wen-Fu Kao, Shyhtsun Felix Wu:
Lightweight Hardware Return Address and Stack Frame Tracking to Prevent Function Return Address Attack.
859-866
- Jinwei Hu, Ruixuan Li, Zhengding Lu:
RBAC-Based Secure Interoperation Using Constraint Logic Programming.
867-872
The 2nd International Workshop on Adaptation in Wireless Sensor Networks (AWSN 2009)
- Sushmita Ruj, Jennifer Seberry, Bimal K. Roy:
Key Predistribution Schemes Using Block Designs in Wireless Sensor Networks.
873-878
- Antonio J. Jara, Miguel A. Zamora, Antonio Fernandez Gómez-Skarmetaa:
HWSN6: Hospital Wireless Sensor Networks Based on 6LoWPAN Technology: Mobility and Fault Tolerance Management.
879-884
- Antonio G. Ruzzelli, Conor Muldoon, Anthony Schoofs, Tiziana Campana, Gregory M. P. O'Hare, Richard Tynan:
Autonomous Management and Control of Sensor Network-Based Applications.
885-890
- Richard Tynan, Anthony Schoofs, Conor Muldoon, Gregory M. P. O'Hare, Ciarán O. Conaire, Philip Kelly, Noel E. O'Connor:
Intelligent Middleware for Adaptive Sensing of Tennis Coaching Sessions.
891-896
- Chung-Hsien Kuo, Jia-Wun Siao:
Petri Net Based Reconfigurable Wireless Sensor Networks for Intelligent Monitoring Systems.
897-902
The 2009 International Workshop on Reconfigurable and Multicore Embedded Systems (WoRMES 2009)
The First International Workshop on Pervasive Multimedia Sensor Networks (PMSN 2009)
- Min Li, Naixue Xiong, Chao Ma:
A Fast H.264 Spatial Downscaling Transcoder for Wireless Communication.
932-936
- Heng Chen, Depei Qian, Weiguo Wu, Weiwei Fang:
Link-Aware Geographic Routing in Wireless Sensor Networks.
937-942
- Moufida Maimour, CongDuc Pham, Doan B. Hoang:
A Congestion Control Framework for Handling Video Surveillance Traffics on WSN.
943-948
- Bing Jiang, Wei Zhang, Pan Zhang:
Research on an Improved Genetic Algorithm Which Can Improve the Node Positioning Optimized Solution of Wireless Sensor Networks.
949-954
- Lin Xiang, Xiaohu Ge, Ke Zhang, Chuang Liu:
A Self-Similarity Frame Traffic Model Based on the Frame Components in 802.11 Networks.
955-960
- Lei Shu, Manfred Hauswirth, Lei Wang, Yan Zhang, Jong Hyuk Park:
Cross-Layer Optimized Data Gathering in Wireless Multimedia Sensor Networks.
961-966
- Qinghua Zou, Li Chen, Naixue Xiong, Shengzhong Zou, Chuanbing Wang:
Prediction and Key Computer Programming of Mechanical Properties of Hot Rolled Plate Based on BP Neural Network.
967-971
The 3rd International Workshop on Ubiquitous UnderWater Sensor Networks (UUWSN 2009)
- Seung-Joo Lee, Jung-Il Namgung, Soo-Hyun Park:
Efficient UDD Architecture for Underwater Wireless Acoustic Sensor Network.
972-977
- Tae-Hee Won, Jun-Ho Jeon, Sung-Joon Park:
An Underwater Communication Modem Using TMS320C6416 DSK.
978-981
- Nam-Yeol Yun, Hui-Jin Cho, Soo-Hyun Park:
Neighbor Nodes Aware MAC Scheduling Scheme in Underwater Acoustic Sensor Networks.
982-987
- Jeong-woo Han, Se-Young Kim, Ki-Man Kim, Seung-Yong Chun, Kwon Son:
Design of OFDM System for High Speed Underwater Communication.
988-992
The 2009 International Workshop on Ubiquitous Network Computing (UNC 2009)
Ubiquitous Network Systems
- Yan Niu, Lala Li:
An Improved Chinese Segmentation Algorithm Based on New Dictionary Construction.
993-996
- Yong Su:
Network Bandwidth Allocation Based on QoS in iSCSI OSD Storage System.
997-1001
- Jing Liang, Yinqin Wu:
Wireless ECG Monitoring System Based on OMAP.
1002-1006
Network Algorithms
Ubiquitous Multimedia Computing
- Ruhan He, Yong Zhu, Naixue Xiong, Wei Zhan, Yanjun Zhao:
Mobile Agent-Based Data Gathering for Web Image Retrieval.
1024-1029
- Yean Yin, WenBing Lu, Ke Zhang:
A Videoconference System on the Campus Networks Based on H.323 Protocol.
1030-1033
- Yong Zhu, Ruhan He, Naixue Xiong, Pu Shi, Zhiguang Zhang:
Edge Detection Based on Fast Adaptive Mean Shift Algorithm.
1034-1039
Ubiquitous Applications
- Weiguang Kong, Yong Zhu, Yuan Wang:
Implementation of Unlimited Integer.
1040-1043
- H. X. Yang, F. M. Chen:
Ride Comfort Simulation Based on the Vibration Characteristics of the Two-Mass System of Vehicle Body and Wheels.
1044-1049
- Xiaoqin Du, Qinghua Li, Jianjun Han:
An Analysis and Hierarchical Decomposition for HAMs.
1050-1054
- Qinghua Zou, Li Chen, Naixue Xiong, Shengzhong Zou, Chuanbing Wang:
Computer Calculation and Plotting on Dynamical Phase Diagrams of Carbon Steel.
1055-1064
- Naixue Xiong, Yan Yang, Ming Cao, Jing He, Lei Shu:
A Survey on Fault-Tolerance in Distributed Network Systems.
1065-1070
The 2009 International Workshop on Ubiquitous Computing,
Management,
and Embedded Applications in Healthcare (UbiHealth 2009)
- Ning Yu, Kyu Hong Cho, Qiang Cheng, Rafael A. Tesorero:
A Hybrid Computational Approach for the Prediction of Small Non-coding RNAs from Genome Sequences.
1071-1076
- Hongbo Zhou, Hong-Ju Yang, Haiyun Xu, Qiang Cheng:
A New Computational Tool for the Post Session Analysis of the Prepulse Inhibition Test in Neural Science.
1077-1080
- Huyu Qu, Jie Cheng, Qiang Cheng, Le Yi Wang:
WiFi-Based Telemedicine System: Signal Accuracy and Security.
1081-1085
- Hongbo Zhou, Qiang Cheng, Mehdi Zargham:
Fast Fusion of Medical Images Based on Bayesian Risk Minimization and Pixon Map.
1086-1091
- André Luiz B. Rodrigues, Izabela C. Gomes, Leila N. Bezerra, Alexandre Sztajnberg, Sérgio T. Carvalho, Alessandro Copetti, Orlando Loques:
Using Discovery and Monitoring Services to Support Context-Aware Remote Assisted Living Applications.
1092-1097
Copyright © Fri Mar 12 17:08:46 2010
by Michael Ley (ley@uni-trier.de)