default search action
SUTC 2006: Taichung, Taiwan
- IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), 5-7 June 2006, Taichung, Taiwan. IEEE Computer Society 2006, ISBN 0-7695-2553-9
Volume 1
Introduction
- General Co-Chairs' Foreword.
- Message from the Conference Program Co-Chairs.
- Program Committee Members.
- Additional Reviewers.
Session 1A: Wireless Communications
- Yosi Ben-Asher, Moran Feldman, Sharoni Feldman:
Ad-Hoc Routing Using Virtual Coordinates Based on Rooted Trees. 6-13 - Baihua Zheng, Ken C. K. Lee, Wang-Chien Lee:
Transitive Nearest Neighbor Search in Mobile Environments. 14-21 - Chonggang Wang, Kazem Sohraby, Victor B. Lawrence, Bo Li, Yueming Hu:
Priority-based Congestion Control in Wireless Sensor Networks. 22-31
Session 1B: Embedded Systems Design
- Chang Hong Lin, Wayne H. Wolf, Andrew Dixon, Xenofon D. Koutsoukos, Janos Sztipanovits:
Design and Implementation of Ubiquitous Smart Cameras. 32-39 - Guang-yao Jin, Xiao-Yi Lu, Myong-Soon Park:
An Indoor Localization Mechanism Using Active RFID Tag. 40-43 - Chen-Shie Ho, Kuo-Cheng Chiang:
Reconfigurable and power-saving integrated operating system design for supporting mobile nodes in sensor networks. 44-51
Session 1C: Reconfiguration and Optimization
- Sandip Bapat, Anish Arora:
Stabilizing Reconfiguration in Wireless Sensor Networks. 52-59 - Shangping Ren, Limin Shen, Jeffrey J. P. Tsai:
Reconfigurable Coordination Model for Dynamic Autonomous Real-Time Systems. 60-67 - D. Deng, Phillip C.-Y. Sheu:
Optimization of Object Relational Rules for Sensor Networks. 68-77
Session 2A: Trust Management
- Chuk-Yang Seng, William A. Arbaugh:
A Secure Trust Establishment Model. 78-85 - Yoshio Nakajima, Kenichi Watanabe, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa, S. Misbah Deen:
Trustworthiness in Peer-to-Peer Overlay Networks. 86-93 - Edith C. H. Ngai, Michael R. Lyu:
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation. 94-103
Session 2B: Design Issues in Mobile Hand-held Devices
- Valeria Loscrì, Salvatore Marano:
A new bi-processor SmartPhone. 104-111 - Hung-Cheng Shih, Kuochen Wang:
An Adaptive Hybrid Dynamic Power Management Method. 112-117 - Yi-Lin Tsai, Jen-Wei Hsieh, Tei-Wei Kuo:
Configurable NAND Flash Translation Layer. 118-127
Session 2C: Power and Energy Awareness
- Yunhuai Liu, Hoilun Ngan, Lionel M. Ni:
Power-aware Node Deployment in Wireless Sensor Networks. 128-135 - Antonio G. Ruzzelli, Gregory M. P. O'Hare, Richard Tynan, P. Cotan, Paul J. M. Havinga:
Protocol assessment issues in low duty cycle sensor networks: The switching energy. 136-143 - N. A. Vasanthi, S. Annadurai:
AWS: Asynchronous Wakeup Schedule to Minimize Latency in Wireless Sensor Networks. 144-151
Session 3A: Context-Aware and Location-Aware Computing
- Hsien-Chou Liao, Chia-Chun Yu:
An Image-based Approach to Generate Direction Information for Context-Aware Computing. 152-159 - Garima Pathak, Spandan Tiwari, Sanjay Madria:
Generalized Distance Metric as a Robust Similarity Measure for Mobile Object Trajectories. 160-167 - Chih-Chieh Geoff Chang, Wesley E. Snyder, Cliff Wang:
Robust Localization of Multiple Events in Sensor Networks. 168-177
Session 3B: Special Session On C*ISR Challenges in Sensor WEBS
- Steve A. Chien, Benjamin Cichy, Ashley Davies, Daniel Tran, Gregg R. Rabideau, Rebecca Castaño, Rob Sherwood, Son V. Nghiem, Ronald Greeley, Thomas Doggett, Victor R. Baker, James M. Dohm, Felipe Ip, Dan Mandl, Stuart Frye, Seth Shulman, Stephen G. Ungar, Thomas Brakke, Lawrence Ong, Jacques Descloitres, Jeremy Jones, Sandy Grosvenor, Rob Wright, Luke Flynn, Andy Harris, G. Robert Brakenridge, Sebastien Cacquard:
An Autonomous Earth Observing Sensorweb. 178-185 - Kirk Martinez, Paritosh Padhy, Ahmed Elsaify, Gang Zou, A. Riddoch, Jane K. Hart, H. L. R. Ong:
Deploying a Sensor Network in an Extreme Environment. 186-193 - Pedro DeLima, George York, Daniel J. Pack:
Localization of Ground Targets Using a Flying Sensor Network. 194-199 - Michael L. Talbert, Guna Seetharaman:
When Sensor Webs Start Being Taken Seriously. 200-207
Keynote Speaker
- Thomas Weigert:
Practical Experiences in Using Model-Driven Engineering to Develop Trustworthy Computing Systems. 208-217
Session 4A: Location Techniques
- Jang-Ping Sheu, Jian-Ming Li, Chih-Shun Hsu:
A Distributed Location Estimating Algorithm for Wireless Sensor Networks. 218-225 - Karim Zerioh, Robert Laurini:
Prototyping a Prefetching Scheme for Location-Dependent Systems. 226-233 - Jang-Ping Sheu, Yu-Cheng Liu, Shin-Chih Tu:
Location-Based IP Assignment Protocol for Ad Hoc Networks. 234-243
Session 4B: Access Control
- Kirk H. M. Wong, Yuan Zheng, Jiannong Cao, Shengwei Wang:
A Dynamic User Authentication Scheme for Wireless Sensor Networks. 244-251 - Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Prasenjit Mitra, Wang-Chien Lee, Chao-Hsien Chu:
In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems. 252-259 - Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo:
The Computational Complexity of Enforceability Validation for Generic Access Control Rules. 260-267
Session 4C: Tools and Application Systems
- Jui-Fa Chen, Hua-Sheng Bai, Hsiao-Chuan Chao, Wei-Chuan Lin:
A Reinforcement Self-Learning Model on an Intelligent Behavior Avatar in a Virtual World. 268-274 - Chih-Heng Ke, Cheng-Han Lin, Ce-Kuen Shieh, Wen-Shyang Hwang:
A Novel Realistic Simulation Tool for Video Transmission over Wireless Network. 275-283
Session 5: Short Presentations
- Eduardo Souto, Reinaldo Gomes, Djamel Sadok, Judith Kelner:
Sampling Energy Consumption in Wireless Sensor Networks. 284-287 - Yuh-Ren Tsai, Tien-Yu Lin, Kai-Jie Yang:
Sensing Coverage for Randomly Distributed Wireless Sensor Networks in Shadowed Environments. 288-291 - Yi-Ling Hsieh, Kuochen Wang:
Efficient Localization in Mobile Wireless Sensor Networks. 292-297
Session 6A: Short Presentations
- Wei-Zu Yang, Liang-Chang Yu, Po-Chou Chen, Tai-Liang Chen:
The Design of Multimedia Web-based Phone and Billing System with Freeware over the VoIP Network. 298-301 - Yang Wang, Vijay Viradharajan:
DynamicTrust: The Trust Development in Peer-to-Peer Environments. 302-305 - Meenakshi Balasubramanian, Namit Chaturvedi, Atish Datta Chowdhury, Arul Ganesh:
A framework for rapid-prototyping of context based ubiquitous computing applications. 306-311
Session 6B: Short Presentations
- Fekri M. Abduljalil, Shrikant K. Bodhe:
Integrated Routing Protocol (IRP) for Integration of Cellular IP and Mobile Ad Hoc Networks. 312-315 - Eric Jui-Lin Lu, Shu-Chiu Lu, Ying-Sheng Lee:
The Design of a P2P Application Routing Protocol for Heterogeneous Networks. 316-320 - Nirav Shah, Farokh B. Bastani, I-Ling Yen:
A Real-Time Scheduling Based Framework for Traffic Coordination Systems. 321-325
Session 7A: Industry Papers
- Yao-Jung Wen, Jessica Granderson, Alice M. Agogino:
Towards Embedded Wireless-Networked Intelligent Daylighting Systems for Commercial Buildings. 326-331 - Cheng-Ming Jimmy Li:
An Integrated Software Platform for RFID-Enabled Application Development. 332-335 - Seng-Yong Lau, Ting-Hao Chang, Shu-Yu Hu, Hsing-Jung Huang, Lung-de Shyu, Chui-Ming Chiu, Polly Huang:
Sensor Networks for Everyday Use: The BL-Live Experience. 336-343
Session 7B: Optimization Strategies
- Kun-Feng Lin, Chuan-Ming Liu:
Schedules with Minimized Access Latency for Disseminating Dependent Information on Multiple Channels. 344-351 - Yung-Tsung Hou, Tzu-Chen Lee, Chia-Mei Chen, Bingchiang Jeng:
Node Placement for Optimal Coverage in Sensor Networks. 352-357 - Jian-Jia Chen, Chuan-Yue Yang, Tei-Wei Kuo:
Slack Reclamation for Real-Time Task Scheduling over Dynamic Voltage Scaling Multiprocessors. 358-367
Session 7C: Security and Assurance
- Hung-Ta Pai, Yunghsiang S. Han:
Power-Efficient Data Fusion Assurance Using Direct Voting Mechanism in Wireless Sensor Networks. 368-375 - Jian Yin, Sanjay Kumar Madria:
A Hierarchical Secure Routing Protocol against Black Hole Attacks in Sensor Networks. 376-383 - Biswajit Panja, Sanjay Kumar Madria, Bharat K. Bhargava:
Energy and Communication Efficient Group Key Management Protocol for Hierarchical Sensor Networks. 384-393
Session 8A: Dependability Issues for Sensor and Mobile Networks
- Kevin A. Kwiat, Shangping Ren:
A Coordination Model for Improving Software System Attack-tolerance and Survivability in Open Hostile Environments. 394-402 - Douglas Herbert, Yung-Hsiang Lu, Saurabh Bagchi, Zhiyuan Li:
Detection and Repair of Software Errors in Hierarchical Sensor Networks. 403-410 - Ing-Ray Chen, Jin-Hee Cho, Ding-Chau Wang:
Performance Characteristics of Region-Based Group Key Management in Mobile Ad Hoc Networks. 411-419
Session 8B: Motion and Tracking
- Panagiotis Karras, Nikos Mamoulis:
Detecting the Direction of Motion in a Binary Sensor Network. 420-427 - Sam Phu Manh Tran, T. Andrew Yang:
OCO: Optimized Communication & Organization for Target Tracking in Wireless Sensor Networks. 428-435 - Yingqi Xu, Wang-Chien Lee:
DTTC: Delay-Tolerant Trajectory Compression for Object Tracking Sensor Networks. 436-445
Session 8C: Reliability
- Zongxing Xie, Thiago Quirino, Mei-Ling Shyu, Shu-Ching Chen, LiWu Chang:
A Distributed Agent-Based Approach to Intrusion Detection Using the Lightweight PCC Anomaly Detection Classifier. 446-453 - Jinpeng Huai, Xianxian Li, Wenyi Zhang, Jun Han, Yongzhen Zhuang:
A Software Protocol of Goals and Operations Based on BDI Model. 454-461 - Flavio E. de Deus, Joseph Kabara:
On Survivability of IEEE 802.11 WLAN. 462-471
Keynote Speaker
- Kinji Mori:
Autonomous Decentralized System and its Applications in Ubiquitous Computing. 472-479
Session 9A: Design and Efficiency
- Shiow-Yang Wu, Chao-Hong Liu, Chen-Kuang Tzeng:
Self-organization Strategies for Dynamic Context Coverage in Capability-Constrained Mobile Sensor Networks. 480-487 - Si-Yu Ou, Hung-Chang Hsiao, Chi-Kuo Chiang, Chung-Ta King:
Designing Power-aware Overlays in Heterogeneous Wireless Sensor Networks. 488-495 - Chih-Yu Lin, Yu-Chee Tseng, Ten-Hwang Lai:
Message-Efficient In-Network Location Management in a Multi-sink Wireless Sensor Network. 496-505
Session 9B: Risk Assessment/Security
- Omar Khadeer Hussain, Elizabeth Chang, Farookh Khadeer Hussain, Tharam S. Dillon:
A Methodology for Risk Based Decision Making in a Service Oriented Environment. 506-513 - Miao Wang, Cheng Zhang, Jingjing Yu:
Native API Based Windows Anomaly Intrusion Detection Method Using SVM. 514-519 - Hung-Yu Chien, Ru-Yu Lin:
Identity-based Key Agreement Protocol for Mobile Ad-hoc Networks Using Bilinear Pairing. 520-529
Session 9C: Data Processing Techniques in Mobile/Sensor Envirnoments
- Kun-Lung Wu, Shyh-Kwei Chen, Philip S. Yu:
On Range Query Indexing for Efficient Stream Processing. 530-539 - Haiyang Liu, Jaideep Srivastava, San-Yih Hwang:
PSRA: A Data Model for Managing Data in Sensor Networks. 540-547 - Winston Khoon Guan Seah, Kevin Z. Liu, Marcelo H. Ang Jr., Joo Ghee Lim, S. V. Rao:
TARANTULAS: Mobility-enhanced Wireless Sensor-Actuator Networks. 548-551 - Karl Yung-Ta Huang, Yawgeng A. Chau:
On the Level Crossing Rates and the Channel Capacity of Spatial Diversity with Maximal Ratio Combining over Correlated Nakagami Fading Channels. 552-557
Poster Session
- Jue-Sam Chou, Yalin Chen, Chu-Hsing Lin:
An improvement of an efficient user identification scheme based on ID-based cryptosystem. 558-561 - Chia Hsing Tung, Yi Quan Chen, Zhi Mou Chen, Shuoh-Ren Tsai:
Implementation of Security Mechanism for Adhoc Wireless Networks Based on X.509 and IEEE 802.1X. 562-563 - In-Hang Chung, Duo Kim, Yu-Yi Chao:
An Energy-Efficient Architecture for the Medium Access Controller of IEEE 802.11 WLANs. 564-565 - Ching-Wen Chen, Chun-Liang Lai:
An Improved Efficient Performance Design with Multiple Channels and Bandwidth Allocation Strategy for Mobile Ad-Hoc Networks. 566-567 - Shouyi Yin, Yongqiang Xiong, Xiaokang Lin, Qian Zhang:
Traffic-aware Routing for Real Time Communications in Wireless Multi-hop Networks. 568-569 - Ying-Hong Wang, Chih-Hsiao Tsai, Hung-Jen Mao, Kuo-Feng Huang:
An Energy-Efficient Hierarchical Multiple-Choice Routing Path Protocol for Wireless Sensor Networks. 570-571 - Amine Abbas, Jacques M. Bahi, Ahmed Mostefaoui:
ImprovingWireless Ad Hoc Networks Lifetime. 572-573
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.