標題: Titlebook: Emerging Directions in Embedded and Ubiquitous Computing; EUC 2007 Workshops: Mieso K. Denko,Chi-sheng Shih,Jong Hyuk Park Conference proc [打印本頁] 作者: POL 時間: 2025-3-21 17:58
書目名稱Emerging Directions in Embedded and Ubiquitous Computing影響因子(影響力)
書目名稱Emerging Directions in Embedded and Ubiquitous Computing影響因子(影響力)學科排名
書目名稱Emerging Directions in Embedded and Ubiquitous Computing網(wǎng)絡公開度
書目名稱Emerging Directions in Embedded and Ubiquitous Computing網(wǎng)絡公開度學科排名
書目名稱Emerging Directions in Embedded and Ubiquitous Computing被引頻次
書目名稱Emerging Directions in Embedded and Ubiquitous Computing被引頻次學科排名
書目名稱Emerging Directions in Embedded and Ubiquitous Computing年度引用
書目名稱Emerging Directions in Embedded and Ubiquitous Computing年度引用學科排名
書目名稱Emerging Directions in Embedded and Ubiquitous Computing讀者反饋
書目名稱Emerging Directions in Embedded and Ubiquitous Computing讀者反饋學科排名
作者: cortex 時間: 2025-3-21 21:12
Security Technologies Based on Home Gateway for Making Smart Home Secureoarder of each home and regarded to be a core entity providing services and controlling traffic. So in this paper, we propose a security system guaranteeing security, availability, and reliability based on the secure home gateway and describe our implementation on home network including authentication, authorization, and security policy.作者: LAP 時間: 2025-3-22 01:50
Fabrizio Macagno,Douglas Walton could guarantee authenticity and confidentiality of the data exchanged among the nodes in the network. In this paper, we propose a new key management scheme based on loop topology. Comparing with cluster-based key management schemes, loop-based scheme is proved to be more efficient, cost-saving and safe.作者: 公理 時間: 2025-3-22 05:54 作者: 貧窮地活 時間: 2025-3-22 10:34
Keynes and the Bear Necessitiese is compatible to EPCglobal Class-1 Generation-2 RFID standards because only simple cryptographic primitives such as pseudo-random number generator and cyclic redundancy check are required to be implemented in RFID tags.作者: IDEAS 時間: 2025-3-22 13:00 作者: IDEAS 時間: 2025-3-22 19:04
,Legal Obligation in Plato’s ,,ve conducted a comprehensive simulation to study performance improvement. The simulation results indicate that the performance is increased and the number of the dropped packets due to unnecessary collisions can be significantly reduced as much as a half.作者: 類人猿 時間: 2025-3-23 01:15 作者: uncertain 時間: 2025-3-23 02:02 作者: 昏迷狀態(tài) 時間: 2025-3-23 07:54
UPS – An Ubiquitous Proximity eService for Trust Collaborationice makes it possible for users to collaborate with the nearby user groups for establishing a reliable and trustworthy interaction environment. It also facilitates and empowers the potential benefits of various ubiquitous e-service applications.作者: Intersect 時間: 2025-3-23 11:51 作者: theta-waves 時間: 2025-3-23 16:58 作者: chronology 時間: 2025-3-23 21:50
The Multiple Roles of Military Interpreters,bles us to both diagnose problems on the underlying system status and predict potential problems at run time via probabilities propagation throughout network. A demonstration focusing on system reliability in distributed system management is given to prove the availability of proposed mechanism, and thereby achieving self-managing capability.作者: Circumscribe 時間: 2025-3-23 23:59 作者: 衍生 時間: 2025-3-24 04:59
Stefano Bellucci,Massimo Zaccaviaher perform the sensitivity analysis of the model parameters through numerical experiments. The results obtained here would be also useful to design ubiquitous systems subject to external malicious attacks.作者: 琺瑯 時間: 2025-3-24 06:46 作者: Bronchial-Tubes 時間: 2025-3-24 13:56
Interpreting the Electrocardiogramation probability is selected as the serving peer. Through simulation results, we show that the proposed algorithm can achieve a good streaming quality and low communication overhead. In addition to these characteristics, the proposed model also comes with the fairness property.作者: Digitalis 時間: 2025-3-24 17:47 作者: 陳列 時間: 2025-3-24 19:52
Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-Markov Cost Moher perform the sensitivity analysis of the model parameters through numerical experiments. The results obtained here would be also useful to design ubiquitous systems subject to external malicious attacks.作者: deadlock 時間: 2025-3-25 00:03
A MAC Protocol with Little Idle Listening for Wireless Sensor Networksriod. The data latency is reduced through reserving the channel in polling period. Analyses and simulations reveal that the proposed protocol outperforms S-MAC and LPL in energy conservation and latency.作者: hedonic 時間: 2025-3-25 05:39
Layered Peer to Peer Streaming Using Hidden Markov Modelsation probability is selected as the serving peer. Through simulation results, we show that the proposed algorithm can achieve a good streaming quality and low communication overhead. In addition to these characteristics, the proposed model also comes with the fairness property.作者: Subjugate 時間: 2025-3-25 11:11 作者: 整體 時間: 2025-3-25 15:32 作者: Phagocytes 時間: 2025-3-25 16:33
978-3-540-77089-3Springer-Verlag Berlin Heidelberg 2007作者: 木訥 時間: 2025-3-25 22:15 作者: 枯燥 時間: 2025-3-26 00:26 作者: 輕快走過 時間: 2025-3-26 07:57 作者: 表被動 時間: 2025-3-26 09:38 作者: infantile 時間: 2025-3-26 14:21 作者: Hyperalgesia 時間: 2025-3-26 16:50 作者: 結(jié)果 時間: 2025-3-26 23:52 作者: 使人煩燥 時間: 2025-3-27 03:45 作者: 人充滿活力 時間: 2025-3-27 08:27
Problems with Regression Analysesnment. The ubiquitous proximity e-service highlights the collective effort focused on collecting the user group’s power as the reference for ubiquitous trust decisions. In this paper, we define the ubiquitous proximity e-service and discuss the significance of ubiquitous proximity e-service. Simulat作者: 獎牌 時間: 2025-3-27 10:10 作者: 直覺沒有 時間: 2025-3-27 15:19 作者: 和諧 時間: 2025-3-27 20:07
Minna Vuohelainen,Arthur Chapmaneir handheld computers as if they were using it in real life, by simulating the actions and responses of the product. This new type of digital content can be used extensively to make sales personnel training manuals, sales tools, user manuals and user trouble shooting documents. In this paper, we pr作者: LAVE 時間: 2025-3-27 23:56 作者: 繼承人 時間: 2025-3-28 05:10
Interpreting in the Community and Workplacea node should turn off its radio as long as possible. We propose a MAC protocol with little idle listening. The sensor node periodically turns on its radio in polling period and checks for a wake-up signal by sampling the energy on the channel. After polling period, the node enters the long sleep pe作者: GEST 時間: 2025-3-28 08:29 作者: 權(quán)宜之計 時間: 2025-3-28 13:14
Interpreting the Electrocardiogramthe time-varying features of shared resources between peers, an adaptive method is required to select suitable peers. In this paper, we use Hidden Markov Models (HMMs) to model each peer to reflect the variation of resources. Among peers with different HMMs, the one which produces the maximum observ作者: Working-Memory 時間: 2025-3-28 16:20 作者: 鴿子 時間: 2025-3-28 19:35
The Multiple Roles of Military Interpreters,s and solves them. Many Artificial Intelligent techniques are presented to support problem determination. In this paper, a mechanism for problem localization based on analyzing real-time streams of system performance for automated system management is proposed. We use Bayesian network to construct a作者: 有節(jié)制 時間: 2025-3-29 00:30 作者: Bumptious 時間: 2025-3-29 04:59
https://doi.org/10.1007/978-1-4842-7045-5ome key baseband signal processing functions, including synchronization, channel estimation, and forward-error-correction (FEC) decoding. Further, we describe a fully software implementation of these functions employing Texas Instruments’ digital signal processors (DSPs).作者: ABYSS 時間: 2025-3-29 09:28 作者: 顯而易見 時間: 2025-3-29 12:25
Interprofessional Care and Mental Healthl allocation algorithm (DSAA) is essential for a Base Station (BS) to efficiently utilize bandwidth capacity. Conventional DSAAs usually group all subcarriers into a number of subchannels and allocate subchannels to Subscriber Stations (SS), one for each SS, according to its traffic demand and chann作者: Talkative 時間: 2025-3-29 18:05
https://doi.org/10.1007/978-1-4842-7045-5ome key baseband signal processing functions, including synchronization, channel estimation, and forward-error-correction (FEC) decoding. Further, we describe a fully software implementation of these functions employing Texas Instruments’ digital signal processors (DSPs).作者: connoisseur 時間: 2025-3-29 22:07
https://doi.org/10.1007/978-3-030-46295-6rough platform-based methods. In this design, we discuss how the cross-layer design affects radio resource management efficiency and system timing by examining system throughput. As for the platform-based design, we present a method that enables designers to estimate the allocation of hardware costs at an early design stage.作者: 事情 時間: 2025-3-30 01:59 作者: oracle 時間: 2025-3-30 04:30 作者: Eclampsia 時間: 2025-3-30 12:11 作者: Shuttle 時間: 2025-3-30 15:39
https://doi.org/10.1007/978-94-007-2269-9 multidisciplinary research in the area, and the importance that IT research receives input from other related disciplines such as law and psychology. The aim of the paper is to contribute to the on-going discourse about the nature of privacy and its role in ubiquitous environments and provide insig作者: 假設(shè) 時間: 2025-3-30 16:52
https://doi.org/10.1057/9781137389008blocking the user’s access to portable storage devices, and (5) inserting security water marks on the printed outputs. With the implementation of the ISS, the real-time information system audit environment has been securely established at the Incheon International Airport Corporation.作者: expunge 時間: 2025-3-30 23:57
The Interpretation of Classical Physicsy exchange their privacy requirements, which we term Notification of Obligations (NOB) as well as their committed obligations, which we term Signed Acceptance of Obligations (SAO). We describe some applicability of these concepts and show how they can be integrated into distributed access control sy作者: cortex 時間: 2025-3-31 03:51
Minna Vuohelainen,Arthur Chapman and functions of a product simply and directly. The solution to provide intelligent interaction between human and digital contents makes it possible to recreate digital contents by bringing interactivity and intelligence into it.作者: 殘忍 時間: 2025-3-31 07:02 作者: 空氣 時間: 2025-3-31 11:03 作者: 無法破譯 時間: 2025-3-31 13:49
A Critical Approach to Privacy Research in Ubiquitous Environments – Issues and Underlying Assumptio multidisciplinary research in the area, and the importance that IT research receives input from other related disciplines such as law and psychology. The aim of the paper is to contribute to the on-going discourse about the nature of privacy and its role in ubiquitous environments and provide insig作者: 斥責 時間: 2025-3-31 18:48 作者: Sciatica 時間: 2025-4-1 01:35
Obligations for Privacy and Confidentiality in Distributed Transactionsy exchange their privacy requirements, which we term Notification of Obligations (NOB) as well as their committed obligations, which we term Signed Acceptance of Obligations (SAO). We describe some applicability of these concepts and show how they can be integrated into distributed access control sy作者: 烤架 時間: 2025-4-1 05:38
An Intelligent Event-Driven Interface Agent for Interactive Digital Contents in Ubiquitous Environme and functions of a product simply and directly. The solution to provide intelligent interaction between human and digital contents makes it possible to recreate digital contents by bringing interactivity and intelligence into it.作者: 歸功于 時間: 2025-4-1 08:31
Optimum Power Controller for Random Number Generator in the Crypto Module of Ubiquitous Computing Enof input power. Therefore if the randomness of output bit stream is beyond limits range, it is applied the regulation of input power range to take the output bit stream, through the evaluation of randomness by constant period of output bit stream. Accordingly, this paper proposes a method for stabil作者: Flirtatious 時間: 2025-4-1 12:52
Emerging Directions in Embedded and Ubiquitous ComputingEUC 2007 Workshops: 作者: 碳水化合物 時間: 2025-4-1 16:09
Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networksrap trust, the main drawback is seen to be the large storage overhead imposed on resource-constrained devices and also these schemes are quite insecure because pre-loading global secrets onto exposed devices strengthens the incentive for attackers to compromise nodes. To overcome these drawback, we 作者: 谷類 時間: 2025-4-1 20:48 作者: 壓碎 時間: 2025-4-2 00:21