


default search action
ICCSA 2006: Glasgow, UK
- Marina L. Gavrilova, Osvaldo Gervasi, Vipin Kumar, Chih Jeng Kenneth Tan, David Taniar, Antonio Laganà, Youngsong Mun, Hyunseung Choo:

Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part IV. Lecture Notes in Computer Science 3983, Springer 2006, ISBN 3-540-34077-7
Workshop on Ubiquitous Web Systems and Intelligence (UWSI 2006)
- Sang Yong Park, Hee Yong Youn:

Message Transport Interface for Efficient Communication Between Agent Framework and Event Service. 1-10 - Eunhoe Kim, Jaeyoung Choi:

An Ontology-Based Context Model in a Smart Home. 11-20 - Seungkeun Lee, Intae Kim, Ki-Wook Rim, Jeonghyun Lee:

Service Mobility Manager for OSGi Framework. 21-29 - Joohyun Han, Yongyun Cho, Eunhoe Kim, Jaeyoung Choi:

A Ubiquitous Workflow Service Framework. 30-39 - Kwangcheol Shin, Ajith Abraham, Sang-Yong Han:

Self Organizing Sensor Networks Using Intelligent Clustering. 40-49 - Olivia Graciela Fragoso Diaz, René Santaolaya Salgado, Ismael Solís Moreno, Guillermo Rodríguez-Ortiz:

Searching and Selecting Web Services Using Case Based Reasoning. 50-57 - Sang Hoon Chi, Tae Ho Cho:

Fuzzy Logic Based Propagation Limiting Method for Message Routing in Wireless Sensor Networks. 58-67 - Backhyun Kim, Iksoo Kim:

Content Delivery with Spatial Caching Scheme in Mobile Wireless Networks. 68-77 - Carla Teixeira Lopes

, Gabriel David
:
Higher Education Web Information System Usage Analysis with a Data Webhouse. 78-87 - Fuyu Liu, Erdogan Dogdu:

A User Management System for Federated Databases Using Web Services. 88-97 - Anders Magnus Andersen, Torab Torabi:

A Dynamic Evaluation Framework for Mobile Applications. 98-107 - Juan Ignacio Vázquez

, Diego López de Ipiña
, Iñigo Sedano
:
SOAM: An Environment Adaptation Model for the Pervasive Semantic Web. 108-117 - Marios C. Angelides, Anastasis A. Sofokleous, Christos N. Schizas

:
Implementing the MPEG-21 Adaptation Quality of Service in Dynamic Environments. 118-127 - Kugsang Jeong, Deokjai Choi, Soo-Hyung Kim, Gueesang Lee:

A Middleware Architecture Determining Application Context Using Shared Ontology. 128-137 - Evi Syukur, Seng Wai Loke:

Context-Aware Regulation of Context-Aware Mobile Services in Pervasive Computing Environments. 138-147 - Cecilia Challiol

, Gustavo Rossi
, Silvia E. Gordillo, Valeria De Cristófolo:
Designing and Implementing Physical Hypermedia Applications. 148-157 - Fernando Rosa-Velardo

, David de Frutos-Escrig
, Olga Marroquín Alonso:
Replicated Ubiquitous Nets. 158-168 - Joaquín Pérez Ortega, Maricela Bravo, Rodolfo A. Pazos Rangel, Gerardo Reyes Salgado, Juan Frausto Solís

, Víctor Jesús Sosa Sosa, Máximo López:
Design of a Shared Ontology Used for Translating Negotiation Primitives. 169-178 - Jun Lai, Ben Soh, Chai Fei:

A Web Page Ranking Method by Analyzing Hyperlink Structure and K-Elements. 179-186 - Eung Ju Lee, Hee Yong Youn:

Efficient Scheduling by Incorporating Bin Packing with Limited and Weighted Round Robin for Bluetooth. 187-196 - DongWoo Lee, SeongHoon Lee, Yongjin Lee:

ECA Rule Component for Timely Collaboration of Web-Based Distributed Business Systems. 197-206 - Dung Xuan Thi Le, J. Wenny Rahayu, Eric Pardede

:
Dynamic Approach for Integrating Web Data Warehouses. 207-216 - Saqib Ali, Torab Torabi, Hassan Ali:

Location Aware Business Process Deployment. 217-225 - Youngbong Kim, Mikyeong Moon, Keunhyuk Yeom:

A Framework for Rapid Development of RFID Applications. 226-235
Workshop on Ubiquitous Application and Security Service (UASS 2006)
- Jong Hyuk Park, Sangjin Lee, Byoung-Soo Koh:

A Flexible DRM System Considering Ubiquitous Environment. 236-244 - Jong Hyuk Park, Jungsuk Song, Sangjin Lee, Byoung-Soo Koh, In-Hwa Hong:

User Centric Intelligent IPMPS in Ubi-Home. 245-254 - Hangbae Chang, Kyung-kyu Kim, Hosin David Lee, Jungduk Kim:

The Design and Development of a Secure Keystroke System for u Business. 255-261 - Jianhong Zhang, Tao Wei, Jianyu Zhang, Wei Zou:

Linkability of a Blind Signature Scheme and Its Improved Scheme. 262-270 - Minseong Ju, Seoksoo Kim, Yeong-Deok Kim, Sukhoon Kang:

A Noble Structural Model for e-Learning Services in Ubiquitous Environment. 271-278 - Wonjoon Choi, Byeong-Hee Roh:

Backward Channel Protection Method for RFID Security Schemes Based on Tree-Walking Algorithms. 279-287 - Bo-Hee Lee, Kyu-Tae Seo, Jung-Shik Kong, Jin-Geol Kim:

Design of the Configurable Clothes Using Mobile Actuator-Sensor Network. 288-295 - Jia Zhai, Chang Mok Park, Gi-Nam Wang:

Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification Procedure. 296-305 - Oh-Heum Kwon, Ha-Joo Song:

Counting-Based Distance Estimations and Localizations in Wireless Sensor Networks. 306-315 - Jeong Su Park, Su-Mi Lee, Eun Young Choi, Dong Hoon Lee:

Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID System. 316-325 - Deok-Gyu Lee, Seo-Il Kang, Dae-Hee Seo, Im-Yeong Lee:

Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification. 326-335 - Ilsun You:

Improving the CGA-OMIPv6 Protocol for Low-Power Mobile Nodes. 336-343 - Gwanghoon Kim, Soyeon Hwang, Deokgyu Lee:

Tracking Illegal System Access in a Ubiquitous Environment - Proposal for ATS, a Traceback System Using STOP. 344-351 - Bo Zhou, Qi Shi, Madjid Merabti:

Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach. 352-359 - Jin-Bum Hwang, Jong Wook Han:

A Security Model for Home Networks with Authority Delegation. 360-369 - Deok-Gyu Lee, Jang-Su Park, Im-Yeong Lee, Yong-Seok Park, Jung-Chul Ahn:

An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast Encryption. 370-379 - Jihyung Lim, DaeHun Nyang, Jeonil Kang, KyungHee Lee, Hyotaek Lim:

Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol. 380-387 - Sangjin Kim, Taewook Ahn, Heekuck Oh:

An Efficient Hierarchical Group Key Management Protocol for a Ubiquitous Computing Environment. 388-395 - Wen-Shenq Juang:

Efficient User Authentication and Key Agreement in Ubiquitous Computing. 396-405 - Yuen-Yan Chan, Sebastian Fleissner, Joseph K. Liu

, Jin Li:
Single Sign-On and Key Establishment for Ubiquitous Smart Environments. 406-415 - Ilsun You, Eun-Sun Jung:

A Light Weight Authentication Protocol for Digital Home Networks. 416-423 - Chee-Seng Leong, Bok-Min Goi

:
Smart Home Microcontroller: Telephone Interfacing. 424-431 - Soo-Jin Park, Young-Shin Park, Yong-Rak Choi, Sukhoon Kang:

SPAD: A Session Pattern Anomaly Detector for Pre-alerting Intrusions in Home Network. 432-439 - Hayoung Oh, Jiyoung Lim, Kijoon Chae, Jung-Chan Na:

Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks. 440-447 - Chul-Yong Uhm, Su-Nam Kim, Kyeong-Hoon Jung, Dong Wook Kang, Ki-Doo Kim:

The Performance Analysis of UWB System for the HD Multimedia Communication in a Home Network. 448-455 - Juryon Paik

, Hee Yong Youn, Ung-Mo Kim:
Extraction of Implicit Context Information in Ubiquitous Computing Environments. 456-465 - Jae Yeol Lee, Gue Won Rhee, Hyun Kim, Kang-Woo Lee, Young-Ho Suh, Kwangsoo Kim:

Convergence of Context-Awareness and Augmented Reality for Ubiquitous Services and Immersive Interactions. 466-474 - Eung-Nam Ko:

An Adaptive Fault Tolerance System for Ubiquitous Computing Environments: AFTS. 475-482 - Kyu Lee, Hyung-Jun Kim, Ho-Jin Shin, Dong Ryeol Shin:

Design and Implementation of Middleware for Context-Aware Service Discovery in Ubiquitous Computing Environments. 483-490 - SeongHoon Lee, DongWoo Lee, Donghee Shim, Dongyoung Cho, Wankwon Lee:

A Dynamic Channel Allocation Mechanism in Cellular Mobile Networks for Ubiquitous Environments Based on Time Constraints. 491-498
Workshop on Embedded System for Ubiquitous Computing (ESUC 2006)
- Sangho Yi, Hong Min, Junyoung Heo

, Boncheol Gu, Yookun Cho, Jiman Hong, Jin Won Kim, Kwangyong Lee, Seungmin Park:
Performance Analysis of Task Schedulers in Operating Systems for Wireless Sensor Networks. 499-508 - Kee-Young Shin, Jin Won Kim, Ilgon Park, Pyeong Soo Mah:

Wireless Sensor Networks: A Scalable Time Synchronization. 509-518 - Hyung Su Lee, Kyung Tae Kim, Hee Yong Youn:

A New Cluster Head Selection Scheme for Long Lifetime of Wireless Sensor Networks. 519-528 - Pengliu Tan, Hai Jin, Minghu Zhang:

Two-Dimensional Priority Scheduling Scheme for Open Real-Time Systems. 529-538 - Feng Xia

, Youxian Sun:
An Enhanced Dynamic Voltage Scaling Scheme for Energy-Efficient Embedded Real-Time Control Systems. 539-548 - Geunyoung Park, Boncheol Gu, Junyoung Heo, Sangho Yi, Jungkyu Han, Jaemin Park, Hong Min, Xuefeng Piao, Yookun Cho, Chang-Won Park, Ha Joong Chung, Bongkyu Lee, Sangjun Lee:

Adaptive Load Balancing Mechanism for Server Cluster. 549-557 - Junghoon Lee, Mikyung Kang, Eui-young Kang, Gyung-Leen Park, Hanil Kim, Cheolmin Kim, Seongbaeg Kim, Jiman Hong:

Design and Performance Analysis of a Message Scheduling Scheme for WLAN-Based Cluster Computing. 558-566 - Sungsuk Kim, Chang Choi, Junho Choi, Pankoo Kim, Hanil Kim:

A Method for Efficient Malicious Code Detection Based on Conceptual Similarity. 567-576 - MoonJoon Kim, JeongMin Lee, WonGi Hong, Hoon Chang:

A Minimized Test Pattern Generation Method for Ground Bounce Effect and Delay Fault Detection. 577-583 - Mun-Kyu Lee, Howon Kim, Dowon Hong

, Kyoil Chung:
Efficient Exponentiation in GF(pm) Using the Frobenius Map. 584-593 - DoHyung Han, JeongWoo Jwa, Hanil Kim:

A Dual-Channel MAC Protocol Using Directional Antennas in Location Aware Ad Hoc Networks. 594-602 - Hyukjun Oh, Heejune Ahn, Jiman Hong:

A Power-Efficient Design Employing an Extreme Condition Detector for Embedded Systems. 603-611 - Ki-Young Kim, Seung-Yong Kim, Seok-Yoon Kim:

An Efficient Delay Metric on RC Interconnects Under Saturated Ramp Inputs. 612-621 - Seong-Won Lee, Neungsoo Park, Jean-Luc Gaudiot:

Low Power Microprocessor Design for Embedded Systems. 622-630 - Jong Wook Kwak, Seong Tae Jhang, Chu Shik Jhon:

History Length Adjustable gshare Predictor for High-Performance Embedded Processor. 631-638
Workshop on Information Engineering and Applications in Ubiquitous Computing Environments (IEAUCE 2006)
- Sangkyun Kim, Hong Joo Lee:

Security Engineering Methodology Based on Problem Solving Theory. 639-648 - Guiyi Wei, Jun Yu, Yun Ling, Jun Liu:

Design and Implementation of an Ontology Algorithm for Web Documents Classification. 649-658 - Kyung Cheol Choi, Gun Ho Lee:

Automatic Test Approach of Web Application for Security (AutoInspect). 659-668 - Min Chan Kim, Sung Jo Kim:

A Scenario-Based User-Oriented Integrated Architecture for Supporting Interoperability Among Heterogeneous Home Network Middlewares. 669-678 - Jeong-Mi Lim, Chang-Seop Park:

Session Key Agreement Protocol for End-to-End Security in MANET. 679-686 - Yongsik Kim, Taesoo Lim, Dongsoo Kim, Cheol Jung, Honggee Jin:

Process-Oriented DFM System for Ubiquitous Devices. 687-696 - Yong Gu Ji

, Chiwoo Park
, Minsoo Kim:
A Study on the Application of BPM Systems for Implementation of RosettaNet Based e-Logistics. 697-706 - Hangbae Chang, Jungduk Kim, Sungjun Lim:

Information Security Management System for SMB in Ubiquitous Computing. 707-715 - Hong Joo Lee, Choon Seong Leem, Sangkyun Kim:

A Study on the Development of Usability Evaluation Framework (Focusing on Digital TV). 716-725
Workshop on Component Based Software Engineering and Software Process Model (CBSE 2006)
- Rogelio N. Limón Cordero, Isidro Ramos Salavert, José Torres-Jiménez

:
Designing Aspectual Architecture Views in Aspect-Oriented Software Development. 726-735 - Hyun Gi Min, Soo Dong Kim:

Process and Techniques to Generate Components in MDA/CB-PIM for Automation. 736-745 - Yucong Duan, Xiaolan Fu, Qingwu Hu, Yuqing Gu:

An Ontology Definition Framework for Model Driven Development. 746-755 - Xiaoqin Xie, Kaiyun Chen:

An AHP-Based Evaluation Model for Service Composition. 756-766 - Ha-Yong Lee, Hae Sool Yang, Suk-hyung Hwang:

Construction of Quality Test and Certification System for Package Software. 767-776 - Yoon Jung Chung, InJung Kim, Chulsoo Lee, Eul-Gyu Im

, Dongho Won:
Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model. 777-786 - Daerae Cho, Changmin Kim, Moonwon Choo, Suk-Ho Kang, Wookey Lee:

Goal Programming Approach to Compose the Web Service Quality of Service. 787-797 - Chang-Sun Shin, Chung-Sub Lee, Su-Chong Joo:

Healthcare Home Service System Based on Distributed Object Group Framework. 798-807 - Byungdo Choi, Chonggun Kim:

A Learning Attitude Evaluation System for Learning Concentration on Distance Education. 808-817 - Mary Wu, Chonggun Kim:

A Calculation Method for Direction Based Handover Rate in Cell Based Mobile Networks. 818-827 - Wan-Kyoo Choi, Sung-Joo Lee, Ilyong Chung, Yonggeun Bae:

The Classification of the Software Quality by Employing the Tolerence Class. 828-834 - Jea-Youn Park, Gui-Jung Kim, Young-Jae Song:

Components Searching System Using Component Identifiers and Request Specifics. 835-843 - Haeng-Kon Kim:

Software Architecture Generation on UML. 844-852 - Chang-Won Jeong, Dong-Seok Kim, Geon-Yeob Lee, Su-Chong Joo:

Distributed Programming Developing Tool Based on Distributed Object Group Framework. 853-863 - Young-Jun Seo, Young-Jae Song:

A Study on Automatic Code Generation Tool from Design Patterns Based on the XMI. 864-872 - Ki-Won Song, Haeng-Kon Kim, Kyung-Whan Lee:

Design of Opportunity Tree for Organization's Process Strategy Decision-Making Based on SPICE Assessment Experience. 873-882 - Mi-Og Park, Dea-Woo Park:

SUALPPA Scheme: Enhanced Solution for User Authentication in the GSM System. 883-892 - Hye-Min Noh, Sa-Kyun Jeong, Cheol-Jung Yoo, Ok-Bae Chang, Eun Mi Kim, Jong-Ryeol Choi:

Design of Mobile Video Player Based on the WIPI Platform. 893-898 - Bobby D. Gerardo

, Jaewan Lee, Su-Chong Joo:
Discovering Patterns Based on Fuzzy Logic Theory. 899-908 - Sun-Myung Hwang, Hee-Gyun Yeom:

Metrics Design for Software Process Assessment Based on ISO/IEC 15504. 909-916 - Kilsup Lee, Sung Jong Lee:

A Quantitative Evaluation Model Using the ISO/IEC 9126 Quality Model in the Component Based Development Process. 917-926 - Haeng-Kon Kim, Eun-Ju Park:

Component Specification Model for the Web Services. 927-936 - Suk-hyung Hwang, Hong-Gee Kim

, Myeng-Ki Kim, Sung-Hee Choi, Hae Sool Yang:
A Data-Driven Approach to Constructing an Ontological Concept Hierarchy Based on the Formal Concept Analysis. 937-946 - Malrey Lee, Eun-Kwan Kang, Thomas M. Gatton:

Web-Document Filtering Using Concept Graph. 947-954 - Seong-Man Choi, Cheol-Jung Yoo, Ok-Bae Chang:

Development of Integrated DAO Pattern Applying Iterator Pattern. 955-965 - Misook Choi, Seojeong Lee:

A Coupling Metric Applying the Characteristics of Components. 966-975 - Haeng-Kon Kim, Hae Sool Yang:

Software Process Improvement Environment. 976-984 - Eun Sook Cho, So Yeon Min

, Chul Jin Kim:
A Design Technique of CBD Meta-model Based on Graph Theory. 985-993 - Jihyun Lee, Dan Lee:

Description Technique for Component Composition Focusing on Black-Box View. 994-1002 - Kwang Moon Cho:

XML Security Model for Secure Information Exchange in E-Commerce. 1003-1011 - Chang-Mog Lee:

Design and Implementation of B2Bi Collaboration Workflow Tool Based on J2EE. 1012-1021 - Sangjoon Jung, Mary Wu, Youngsuk Jung, Chonggun Kim:

Traffic-Predicting A Routing Algorithm Using Time Series Models. 1022-1031 - Gu-Beom Jeong, Guk-Boh Kim:

A Study on Software Architecture Evaluation. 1032-1041 - Jungkyu Kwon, Mokdong Chung:

RFID-Based ALE Application Framework Using Context-Based Security Service. 1042-1051 - Hye-Jung Jung, Won-Tae Jung, Hae Sool Yang:

A Study on the Standard of Software Quality Testing. 1052-1059 - Kyong-Cheol Ko, Oh-Hyung Kang, Chang-Woo Lee, Ki-Hong Park, Yang-Won Rhee:

Scene Change Detection Using the Weighted Chi-Test and Automatic Threshold Decision Algorithm. 1060-1069 - Eun-Ser Lee, Sang Ho Lee:

Design Opportunity Tree for Schedule Management and Evaluation by COQUALMO. 1070-1080 - Taehoon Lee, Gihwon Kwon, Hyuksoo Han:

CTL Model Checking for Boolean Program. 1081-1089
General Tracks
- Yincui Hu, Yong Xue, Guoyin Cai, Chaolin Wu, Jianping Guo

, Ying Luo, Wei Wan, Lei Zheng:
Grid Service Implementation of Aerosol Optical Thickness Retrieval over Land from MODIS. 1090-1097 - M. Francisca Hinarejos

, Jordi Forné
:
Revocation Scheme for PMI Based Upon the Tracing of Certificates Chains. 1098-1106 - Kuan-Ching Li, Chiou-Nan Chen, Chia-Hsien Wen, Ching-Wen Yang, Joung-Liang Lan:

Nailfold Capillary Microscopy High-Resolution Image Analysis Framework for Connective Tissue Disease Diagnosis Using Grid Computing Technology. 1107-1115 - Sangdong Jang, Wu Woon Kim:

EFH: An Edge-Based Fast Handover for Mobile IPv6 in IEEE 802.11b WLAN. 1116-1125 - Yong-Il Jang, Ho Seok Kim, Soon-Young Park, Jae-dong Lee, Hae-Young Bae:

An Extendible Hashing Based Recovery Method in a Shared-Nothing Spatial Database Cluster. 1126-1135 - José Daniel García

, Jesús Carretero
, Félix García, Javier Fernández
, Alejandro Calderón
, David E. Singh:
A Quantitative Justification to Partial Replication of Web Contents. 1136-1145 - Backhyun Kim, Iksoo Kim:

Content Distribution Strategy Using Web-Cached Multicast Technique. 1146-1155 - Dongmahn Seo, Joahyoung Lee, Yoon Kim, Changyeol Choi, Hwang Kyu Choi, Inbum Jung:

Load Distribution Strategies in Cluster-Based Transcoding Servers for Mobile Clients. 1156-1165 - Jerzy Brzezinski

, Anna Kobusinska
:
Safety of Recovery Protocol Preserving MW Session Guarantee in Mobile Systems. 1166-1174

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














