default search action
EUC 2008: Shanghai, China
- Cheng-Zhong Xu, Minyi Guo:
2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume I. IEEE Computer Society 2008, ISBN 978-0-7695-3492-3
Keynote Speeches
- Yaoxue Zhang:
The Challenges and Opportunities in Transparent Computing. 3 - Xiaodong Zhang:
Research Issues and Challenges to Advance System Software for Multicore Processors and Data-Intensive Applications. 4 - Tarek F. Abdelzaher:
Research Challenges in Distributed Cyber-Physical Systems. 5
Hardware/Software Co-Design
- Archana Kalyansundar, Rita Chattopadhyay:
A Novel Approach to Hardware Architecture Design and Advanced Optimization Techniques for Time Critical Applications. 9-15 - Hiroki Hoshino, Ben A. Abderazek, Kenichi Kuroda:
Advanced Optimization and Design Issues of a 32-Bit Embedded Processor Based on Produced Order Queue Computation Model. 16-22 - Zhe Peng, Longhua Ma, Feng Xia:
A Low-Cost Embedded Controller for Complex Control Systems. 23-29 - Taichi Maekawa, Ben A. Abderazek, Kenichi Kuroda:
Single Instruction Dual-Execution Model Processor Architecture. 30-36 - Anderson Kuei-An Ku, Jenny Yi-Chun Kuo, Jingling Xue:
Hardware Support for Efficient Sparse Matrix Vector Multiplication. 37-43 - Koji Shigemoto, Kensuke Kawakami, Koji Nakano:
Accelerating Montgomery Modulo Multiplication for Redundant Radix-64k Number System on the FPGA Using Dual-Port Block RAMs. 44-51 - Linfeng Pan, Minyi Guo, Yanqin Yang, Meng Wang, Zili Shao:
A State-Based Predictive Approach for Leakage Reduction of Functional Units. 52-58 - Robert Günzel:
Automatic Integration of Non-Bus Hardware IP into SoC-Platforms for Use by Software. 59-65 - Mostafa Jafari-Nodoushan, Seyed Ghassem Miremadi, Alireza Ejlali:
Control-Flow Checking Using Branch Instructions. 66-72
Real-Time and Cyber-Physical Systems
- Sojan Markose, Xiaoqing Frank Liu, Bruce M. McMillin:
A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems. 75-81 - Shinpei Kato, Nobuyuki Yamasaki:
Scheduling Aperiodic Tasks Using Total Bandwidth Server on Multiprocessors. 82-89 - Bing Du, Chun Ruan:
Robust Feedback Control Scheduling in Distributed Embedded Real-Time Systems. 90-96 - Fei Huang, Binoy Ravindran, E. Douglas Jensen:
RT-P2P: A Scalable Real-Time Peer-to-Peer System with Probabilistic Timing Assurances. 97-103 - Mingsong Lv, Zonghua Gu, Nan Guan, Qingxu Deng, Ge Yu:
Performance Comparison of Techniques on Static Path Analysis of WCET. 104-111 - Kohta Nakamura, Masahiro Ogawa, Takahiro Koita, Kenya Sato:
Implementation and Evaluation of Caching Method to Increase the Speed of UPnP Gateway. 112-118 - Driss Choujaa, Naranker Dulay:
TRAcME: Temporal Activity Recognition Using Mobile Phone Data. 119-126
Embedded Software Optimization
- Chin-Chen Chang, Chin-Feng Lee, Yi-Ren Wang:
An Improved EMD Embedding Scheme Based on Secret Image Difference. 129-135 - Lei Sun, Tatsuo Nakajima:
A Lightweight Detection and Recovery Infrastructure of Kernel Objects for Embedded Systems. 136-143 - Wataru Kanda, Yu Yumura, Yuki Kinebuchi, Kazuo Makijima, Tatsuo Nakajima:
SPUMONE: Lightweight CPU Virtualization Layer for Embedded Systems. 144-151 - Shih-Hao Hung, Chien-Cheng Wu, Chia-Heng Tu:
Optimizing the Embedded Caching and Prefetching Software on a Network-Attached Storage System. 152-161 - Maobing Dai, Toshihiro Matsui, Yutaka Ishikawa:
A Light Lock Management Mechanism for Optimizing Real-Time and Non-Real-Time Performance in Embedded Linux. 162-168 - Dong-Heon Jung, Soo-Mook Moon, Sung-Hwan Bae:
Design and Optimization of a Java Ahead-of-Time Compiler for Embedded Systems. 169-175 - Chantana Phongpensri, Krisana Sripanomwan:
Different Fuzzy Parameter Selection Based on Multiple Criteria for Microcontroller. 176-182
Power-Aware Computing
- Yu Sun, Wei Zhang:
Adaptive Drowsy Cache Control for Java Applications. 185-191 - Meikang Qiu, Jiande Wu, Jingtong Hu, Yi He, Edwin Hsing-Mean Sha:
Dynamic and Leakage Power Minimization with Loop Voltage Scheduling and Assignment. 192-198 - Seyed Mohammad Hossein Shekarian, Alireza Ejlali, Seyed Ghassem Miremadi:
A Low Power Error Detection Technique for Floating-Point Units in Embedded Applications. 199-205 - Gang Zeng, Hiroyuki Tomiyama, Hiroaki Takada, Tohru Ishihara:
A Generalized Framework for System-Wide Energy Savings in Hard Real-Time Embedded Systems. 206-213 - Yu Zhou, Hui Guo:
Application Specific Low Power ALU Design. 214-220
Wireless Networks
- Yahya M. Tashtoush, Mohammed A. Okour:
Fuzzy Self-Clustering for Wireless Sensor Networks. 223-229 - David A. Knox, Thomas Kunz:
Secure Authentication in Wireless Sensor Networks Using RF Fingerprints. 230-237 - Romeo Said, Yves Mahéo:
Toward a Platform for Service Discovery and Invocation in Disconnected Mobile Ad Hoc Networks. 238-244 - Liqiang Zhang, Yu-Jen Cheng, Xiaobo Zhou:
RADAR: Rate-Alert Dynamic RTS/CTS Exchange for Performance Enhancement in Multi-Rate Wireless Networks. 245-251 - Qiuxia Chen, Dik Lun Lee, Wang-Chien Lee:
Rule-Based WiFi Localization Methods. 252-258 - Majun Zheng, Jing Xie, Zhigang Mao, Yongxin Zhu:
A Hybrid Anti-Collision Algorithm for RFID with Enhanced Throughput and Reduced Memory Consumption. 259-265 - Murad Khalid, In-ho Ra, Young Hoon Joo, Ravi Sankar:
A Scenario-based Directional Communication Performance in Wireless Ad hoc Networks. 266-271 - Yuanyuan Zhang, Dawu Gu, Bart Preneel:
Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks. 272-279
Sensor Networks
- Chao Wang, Yan Sun, Huadong Ma:
Analysis of Data Delivery Delay in Acoustic Sensor Networks. 283-287 - Yunpei Yan, Guihai Chen, Sajal K. Das:
A Collaboration-based Storage Management Scheme in Multimedia Sensor Networks. 288-294 - Weijia Li, Yu Du, Youtao Zhang, Bruce R. Childers, Ping Zhou, Jun Yang:
Adaptive Buffer Management for Efficient Code Dissemination in Multi-Application Wireless Sensor Networks. 295-301 - Hongyang Chen, Marcelo H. T. Martins, Pei Huang, Hing-Cheung So, Kaoru Sezaki:
Cooperative Node Localization for Mobile Sensor Networks. 302-308 - Yu-Kai Huang, Pi-Cheng Hsiu, Wei-Ni Chu, Kuan-Chang Hung, Ai-Chun Pang, Tei-Wei Kuo, Min Di, Hua-Wei Fang:
An Integrated Deployment Tool for ZigBee-Based Wireless Sensor Networks. 309-315 - Chih-Min Chao, Yi-Wei Lee:
Quorum-Based Energy Saving MAC Protocol Design for Wireless Sensor Networks. 316-322 - Junfeng Xu, Keqiu Li, Yanming Shen, Jian Liu:
An Energy-Efficient Waiting Caching Algorithm in Wireless Sensor Networks. 323-329 - Wenjun Liu, Yue Sun, Jiguo Yu, Baoxiang Cao:
A Grid-Based Distributed Multi-Hop Routing Protocol for Wireless Sensor Networks. 330-336
Network Protocols
- (Withdrawn) Research on a Novel Multicast Routing Hybrid Optimization Algorithm and Its Application. 339-345
- Xinfeng Ye:
Countering DDoS and XDoS Attacks against Web Services. 346-352 - Canwen Xiao, Minxuan Zhang, Yong Dou, Zhitong Zhao:
Dimensional Bubble Flow Control and Fully Adaptive Routing in the 2-D Mesh Network on Chip. 353-358 - Ze Li, Haiying Shen:
A Direction Based Geographic Routing Scheme for Intermittently Connected Mobile Networks. 359-365 - Ehsan Mousavi Khaneghah, Seyedeh Leili Mirtaheri, Mohsen Sharifi:
Evaluating the Effect of Inter Process Communication Efficiency on High Performance Distributed Scientific Computing. 366-372 - Shijun Lin, Li Su, Haibo Su, Depeng Jin, Lieguang Zeng:
Hierarchical Cluster-Based Irregular Topology Customization for Networks-on-Chip. 373-377 - Naixue Xiong, Laurence Tianruo Yang, Yaoxue Zhang, Yuezhi Zhou, Yingshu Li:
Design and Analysis of a Stable Queue Control Scheme for the Internet. 378-384
Context-Aware Computing
- Yu Huang, Xiang Ma, XianPing Tao, Jiannong Cao, Jian Lu:
A Probabilistic Approach to Consistency Checking for Pervasive Context. 387-393 - Sébastien Duval, Christian Hoareau, Hiromichi Hashizume:
Human Universality in Ubiquitous Computing: Maslow, Where Are You? 394-400 - Jorge L. V. Barbosa, Rodrigo Hahn, Débora Nice Ferrari Barbosa, Cláudio Fernando Resin Geyer:
Learning in Small and Large Ubiquitous Computing Environments. 401-407 - Jingde Cheng:
Testing and Debugging Persistent Computing Systems: A New Challenge in Ubiquitous Computing. 408-414
Middleware and Peer-to-Peer
- Hung-Chang Hsiao, I-Ta Lin, Hao Liao:
Load Balancing in Peer-to-Peer Networks Based on Sampling System States. 417-423 - Guowei Huang, Zhi Chen, Ying Wu, Gongyi Wu:
The Effect of Routing-Load Dispersion on Congestion Control in Structured P2P Networks. 424-430 - Liang Zhang, Beihong Jin, Jiannong Cao:
AMBP: An Adaptive Mailbox Based Protocol for Mobile Agent Communication. 431-437 - Yuhong Feng, Jiannong Cao, Ivan Lau, Xuan Liu:
A Self-configuring Personal Agent Platform for Pervasive Computing. 438-444
Multiagent Systems
- Jindian Su, Shanshan Yu, Heqing Guo:
Dynamic Substitutability Analysis of Web Service Composition via Extended Pi-Calculus. 447-452 - Ting Yuan, Jianqing Ma, YiPing Zhong, Shiyong Zhang:
Efficient Self-Healing Key Distribution with Limited Group Membership for Communication-Constrained Networks. 453-458 - Beihong Jin, Zhi Zang, Liang Zhang:
An Empirical Study on Interoperability between Service Discovery Protocols. 459-466 - Zhuojun Zhuang, Yuan Luo, Minglu Li, Chuliang Weng:
A Reasonable Approach for Defining Load Index in Parallel Computing. 467-473
Multimedia and Data Management
- Xiaochun Wang, Yuanchun Shi:
UMDD: User Model Driven Software Development. 477-483 - Ashraf Armoush, Falk Salewski, Stefan Kowalewski:
A Hybrid Fault Tolerance Method for Recovery Block with a Weak Acceptance Test. 484-491 - Wenwei Xue, Hung Keng Pung, Wen Long Ng, Tao Gu:
Data Management for Context-Aware Computing. 492-498 - Weiwei Sun, Zhuoyao Zhang, Ping Yu, Yongrui Qin:
Efficient Data Scheduling for Multi-item Queries in On-Demand Broadcast. 499-505 - Chin-Chen Chang, Wei-Liang Tai, Kuo-Nan Chen:
Lossless Data Hiding Based on Histogram Modification for Image Authentication. 506-511 - Wenbin Jiang, Chong Huang, Hai Jin, Xiaofei Liao:
A New Proxy Scheme for Large-Scale P2P VoD System. 512-518 - Rong-Jhang Liao, Pei-Lun Suei, Yung-Feng Lu, Tei-Wei Kuo, Chun-Sho Lee:
A Signature-based Grid Index Design for RFID Main-Memory Databases. 519-525
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.