default search action
UIC 2011: Banff, Canada
- Ching-Hsien Hsu, Laurence Tianruo Yang, Jianhua Ma, Chunsheng Zhu:
Ubiquitous Intelligence and Computing - 8th International Conference, UIC 2011, Banff, Canada, September 2-4, 2011. Proceedings. Lecture Notes in Computer Science 6905, Springer 2011, ISBN 978-3-642-23640-2
Keynote Speech
- Han-Chieh Chao:
Internet of Things and Cloud Computing for Future Internet. 1 - Victor C. M. Leung:
Networking of Vehicles - Applications, Challenges and Some Recent Results. 2
Smart Systems and Services
- Ying Zhang, Marshall W. Bern, Juan Liu, Kurt Partridge, Bo Begole, Bob Moore, Jim Reich, Koji Kishimoto:
Ubiquitous Meeting Facilitator with Playful Real-Time User Interface. 3-11 - Chih-Yang Tsai, Yu-Fan Chen, Hsu-Cheng Lu, Chi-Hung Lin, Jyh-Cherng Shieh, Chung-Wei Yen, Jeng-Lung Huang, Yung-Shun Lin, Ching-Lu Hsieh, Joe-Air Jiang:
An Application of the Wireless Sensor Network Technology for Foehn Monitoring in Real Time. 12-24 - Tatsuo Nakajima, Tetsuo Yamabe, Mizuki Sakamoto:
Proactive Ambient Social Media for Supporting Human Decision Making. 25-39 - Zhiwen Yu, Xingshe Zhou, Zhiyong Yu, Christian Becker, Yuichi Nakamura:
Social Interaction Mining in Small Group Discussion Using a Smart Meeting System. 40-51 - Xiwei Zhang, Jia Yu:
Probabilistic Path Selection in Mobile Wireless Sensor Networks for Stochastic Events Detection. 52-63 - Mikko Perttunen, Oleksiy Mazhelis, Fengyu Cong, Mikko Kauppila, Teemu Leppänen, Jouni Kantola, Jussi Collin, Susanna Pirttikangas, Janne Haverinen, Tapani Ristaniemi, Jukka Riekki:
Distributed Road Surface Condition Monitoring Using Mobile Phones. 64-78 - Pei-Yu Lin:
Verifiable and Lossless Distributed Media Content Sharing. 79-93 - Chun-Yi Lin, Cheng-Ting Chang, Meng-Tsen Chen, Zoeh Ruan, Alan Hsueh, Yi-Yang Chang, Ren-Hung Hwang:
NuNote: An Augmented Reality Social Note Posting Service. 94-108 - Hung-Yi Teng, Ren-Hung Hwang, Chang-Fu Tsai:
A Context-Aware Seamless Handover Mechanism for Mass Rapid Transit System. 109-123
Smart Objects and Environments
- Toshihiro Tamura, Runhe Huang, Jianhua Ma, Shiqin Yang:
Individual Activity Data Mining and Appropriate Advice Giving towards Greener Lifestyles and Routines. 124-136 - Basel Magableh, Stephen Barrett:
Adaptive Context Oriented Component-Based Application Middleware (COCA-Middleware). 137-151 - Thomas Schlebusch, Steffen Leonhardt:
Intelligent Toilet System for Health Screening. 152-160 - Ting-Yun Chi, Chun-Hao Chen, Han-Chieh Chao, Sy-Yen Kuo:
An Efficient Earthquake Early Warning Message Delivery Algorithm Using an in Time Control-Theoretic Approach. 161-173 - Sung Il Kim, Jae Young Jun, Jong-Kook Kim, Kyung-Chan Lee, Gyu Seong Kang, Taek-Soo Kim, Hee Kyoung Moon, Hye Chan Yoon, Hyungmin Kim, Sang-Hoon Lee:
Dynamic Resource Management for a Cell-Based Distributed Mobile Computing Environment. 174-184 - Chih-Hsun Chou, Hui-Yu Ko:
Automatic Birdsong Recognition with MFCC Based Syllable Feature Extraction. 185-196 - Yufeng Wang, Athanasios V. Vasilakos, Jianhua Ma:
Punishment or Reward: It Is a Problem in Anonymous, Dynamic and Autonomous Networking Environments. 197-208 - Adrian Hornsby, Tapani Leppänen:
event.Hub: An Event-Driven Information Hub for Mobile Devices. 209-223
Cloud and Services Computing
- Yu Bai, Yaoxue Zhang, Yuezhi Zhou, Laurence Tianruo Yang:
A Non-functional Property Based Service Selection and Service Verification Model. 224-236 - Beihong Jin, Fusang Zhang, Haibin Weng:
Exploring an Adaptive Architecture for Service Discovery over MANETs. 237-251 - Tomás Knap, Irena Mlýnková:
Web Quality Assessment Model: Trust in QA Social Networks. 252-266 - Ichiro Satoh:
Context-Aware Service Composition. 267-279 - Chao-Tung Yang, Kuan-Chieh Wang, Hsiang-Yao Cheng, Cheng-Ta Kuo, Ching-Hsien Hsu:
Implementation of a Green Power Management Algorithm for Virtual Machines on Cloud Computing. 280-294
Security, Privacy and Trustworthy
- Zheng Yan, Peng Zhang:
AdPriRec: A Context-Aware Recommender System for User Privacy in MANET Services. 295-309 - Minyoung Kim, Mark-Oliver Stehr, Ashish Gehani, Carolyn L. Talcott:
Ensuring Security and Availability through Model-Based Cross-Layer Adaptation. 310-325 - Alireza Pirayesh Sabzevar, João Pedro Sousa:
Chameleon: A Model of Identification, Authorization and Accountability for Ubicomp. 326-339 - Fa-Chang Cheng, Wen-Hsing Lai:
The Safety Related Legal Issues and Privacy Protection for Intelligent Vehicle Telematics in the United States. 340-349 - Stefan Föll, Klaus Herrmann, Kurt Rothermel:
PreCon - Expressive Context Prediction Using Stochastic Model Checking. 350-364
P2P, WSN and Ad Hoc Networks
- Jau-Wu Huang, Nien-Chen Lin, Kai-Chao Yang, Chen-Lung Chan, Jia-Shung Wang:
A Virtual Channel Technique for Supporting P2P Streaming. 365-378 - Jürgen Sommer, Simon Lüders, Stephen Schmitt, Wolfgang Rosenstiel:
System-Level Power-Accuracy Trade-Off in Bluetooth Low Energy Networks. 379-392 - Fei Hao, Jin Ma, Chunsheng Zhu:
Hidden Node and Interference Aware Channel Assignment for Multi-radio Multi-channel Wireless Mesh Networks. 393-404 - Ting-Yun Chi, Wei-Cheng Wang, Sy-Yen Kuo:
uFlow: Dynamic Software Updating in Wireless Sensor Networks. 405-419 - Subir Halder, Amrita Ghosal, Aadirupa Saha, DasBit Sipra:
Energy-Balancing and Lifetime Enhancement of Wireless Sensor Network with Archimedes Spiral. 420-434 - Firoz Ahmed, Seokhoon Yoon, Hoon Oh:
Bullet-Proof Verification (BPV) Method to Detect Black Hole Attack in Mobile Ad Hoc Networks. 435-449 - Yin-Chung Hsu, Yen-Ting Chen, Chiu-Kuo Liang:
The Coverage Problem in Directional Sensor Networks with Rotatable Sensors. 450-462
Ubiquitous Intelligent Algorithms and Applications
- Hang Zhang, Fanglin Gu, Yi Xiao:
A Bayesian Approach to Blind Separation of Mixed Discrete Sources by Gibbs Sampling. 463-475 - Shuai Yue, Zhi-Hui Wang, Ching-Yun Chang, Chin-Chen Chang, Mingchu Li:
Image Data Hiding Schemes Based on Graph Coloring. 476-489 - Qianping Wang, Hongmei Liao, Ke Wang, Yuan Sang:
A Variable Weight Based Fuzzy Data Fusion Algorithm for WSN. 490-502 - Hao Zhang, Xue-rong Cui, T. Aaron Gulliver:
Threshold Selection for Ultra-Wideband TOA Estimation Based on Skewness Analysis. 503-513 - Eunju Kim, Sumi Helal:
Modeling Human Activity Semantics for Improved Recognition Performance. 514-528 - Yi-Hui Chen, Chi-Wei Lan, Zhi-Hui Wang:
A Two-Layer Steganography Scheme Using Sudoku for Digital Images. 529-535 - Sheng-De Wang, Chih-Hung Weng:
Algorithms and Hardware Architectures for Variable Block Size Motion Estimation. 536-549 - Fei Teng, Lei Yu, Frédéric Magoulès:
Reliability Comparison of Schedulability Test in Ubiquitous Computing. 550-562 - Guoqiong Liao, Linqing Wu, Changxuan Wan, Naixue Xiong:
A Practice Probability Frequent Pattern Mining Method over Transactional Uncertain Data Streams. 563-575 - Yongwen Pan, Man Lin, Laurence Tianruo Yang:
Reducing Total Energy for Reliability-Aware DVS Algorithms. 576-589
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.