Sensor Networks, Ubiquitous, and Trustworthy Computing 2006 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


SUTC 2006: Taichung, Taiwan

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), 5-7 June 2006, Taichung, Taiwan. IEEE Computer Society 2006, ISBN 0-7695-2553-9
Volume 1
Introduction
Session 1A: Wireless Communications

Yosi Ben-Asher, Moran Feldman, Sharoni Feldman:
Ad-Hoc Routing Using Virtual Coordinates Based on Rooted Trees. 6-13

Baihua Zheng
, Ken C. K. Lee, Wang-Chien Lee:
Transitive Nearest Neighbor Search in Mobile Environments. 14-21

Chonggang Wang, Kazem Sohraby, Victor B. Lawrence, Bo Li, Yueming Hu:
Priority-based Congestion Control in Wireless Sensor Networks. 22-31
Session 1B: Embedded Systems Design

Chang Hong Lin, Wayne H. Wolf, Andrew Dixon, Xenofon D. Koutsoukos, Janos Sztipanovits:
Design and Implementation of Ubiquitous Smart Cameras. 32-39

Guang-yao Jin, Xiao-Yi Lu, Myong-Soon Park:
An Indoor Localization Mechanism Using Active RFID Tag. 40-43

Chen-Shie Ho, Kuo-Cheng Chiang:
Reconfigurable and power-saving integrated operating system design for supporting mobile nodes in sensor networks. 44-51
Session 1C: Reconfiguration and Optimization

Sandip Bapat, Anish Arora:
Stabilizing Reconfiguration in Wireless Sensor Networks. 52-59

Shangping Ren, Limin Shen, Jeffrey J. P. Tsai:
Reconfigurable Coordination Model for Dynamic Autonomous Real-Time Systems. 60-67

D. Deng, Phillip C.-Y. Sheu:
Optimization of Object Relational Rules for Sensor Networks. 68-77
Session 2A: Trust Management

Chuk-Yang Seng, William A. Arbaugh:
A Secure Trust Establishment Model. 78-85

Yoshio Nakajima, Kenichi Watanabe, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa, S. Misbah Deen:
Trustworthiness in Peer-to-Peer Overlay Networks. 86-93

Edith C. H. Ngai, Michael R. Lyu:
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation. 94-103
Session 2B: Design Issues in Mobile Hand-held Devices

Valeria Loscrì, Salvatore Marano:
A new bi-processor SmartPhone. 104-111

Hung-Cheng Shih, Kuochen Wang:
An Adaptive Hybrid Dynamic Power Management Method. 112-117

Yi-Lin Tsai, Jen-Wei Hsieh, Tei-Wei Kuo:
Configurable NAND Flash Translation Layer. 118-127
Session 2C: Power and Energy Awareness

Yunhuai Liu, Hoilun Ngan, Lionel M. Ni:
Power-aware Node Deployment in Wireless Sensor Networks. 128-135

Antonio G. Ruzzelli, Gregory M. P. O'Hare, Richard Tynan, P. Cotan, Paul J. M. Havinga:
Protocol assessment issues in low duty cycle sensor networks: The switching energy. 136-143

N. A. Vasanthi, S. Annadurai:
AWS: Asynchronous Wakeup Schedule to Minimize Latency in Wireless Sensor Networks. 144-151
Session 3A: Context-Aware and Location-Aware Computing

Hsien-Chou Liao, Chia-Chun Yu:
An Image-based Approach to Generate Direction Information for Context-Aware Computing. 152-159

Garima Pathak, Spandan Tiwari, Sanjay Madria:
Generalized Distance Metric as a Robust Similarity Measure for Mobile Object Trajectories. 160-167

Chih-Chieh Geoff Chang, Wesley E. Snyder, Cliff Wang:
Robust Localization of Multiple Events in Sensor Networks. 168-177
Session 3B: Special Session On C*ISR Challenges in Sensor WEBS

Steve A. Chien, Benjamin Cichy, Ashley Davies, Daniel Tran, Gregg R. Rabideau, Rebecca Castaño, Rob Sherwood, Son V. Nghiem, Ronald Greeley, Thomas Doggett, Victor R. Baker, James M. Dohm, Felipe Ip, Dan Mandl, Stuart Frye, Seth Shulman, Stephen G. Ungar, Thomas Brakke, Lawrence Ong, Jacques Descloitres, Jeremy Jones, Sandy Grosvenor, Rob Wright, Luke Flynn, Andy Harris, G. Robert Brakenridge, Sebastien Cacquard:
An Autonomous Earth Observing Sensorweb. 178-185

Kirk Martinez, Paritosh Padhy, Ahmed Elsaify, Gang Zou, A. Riddoch, Jane K. Hart, H. L. R. Ong:
Deploying a Sensor Network in an Extreme Environment. 186-193

Pedro DeLima, George York, Daniel J. Pack:
Localization of Ground Targets Using a Flying Sensor Network. 194-199

Michael L. Talbert, Guna Seetharaman:
When Sensor Webs Start Being Taken Seriously. 200-207
Keynote Speaker

Thomas Weigert:
Practical Experiences in Using Model-Driven Engineering to Develop Trustworthy Computing Systems. 208-217
Session 4A: Location Techniques

Jang-Ping Sheu, Jian-Ming Li, Chih-Shun Hsu:
A Distributed Location Estimating Algorithm for Wireless Sensor Networks. 218-225

Karim Zerioh, Robert Laurini:
Prototyping a Prefetching Scheme for Location-Dependent Systems. 226-233

Jang-Ping Sheu, Yu-Cheng Liu, Shin-Chih Tu:
Location-Based IP Assignment Protocol for Ad Hoc Networks. 234-243
Session 4B: Access Control

Kirk H. M. Wong, Yuan Zheng, Jiannong Cao, Shengwei Wang:
A Dynamic User Authentication Scheme for Wireless Sensor Networks. 244-251

Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee
, Prasenjit Mitra, Wang-Chien Lee, Chao-Hsien Chu:
In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems. 252-259

Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo:
The Computational Complexity of Enforceability Validation for Generic Access Control Rules. 260-267
Session 4C: Tools and Application Systems

Jui-Fa Chen, Hua-Sheng Bai, Hsiao-Chuan Chao, Wei-Chuan Lin:
A Reinforcement Self-Learning Model on an Intelligent Behavior Avatar in a Virtual World. 268-274

Chih-Heng Ke, Cheng-Han Lin, Ce-Kuen Shieh, Wen-Shyang Hwang:
A Novel Realistic Simulation Tool for Video Transmission over Wireless Network. 275-283
Session 5: Short Presentations

Eduardo Souto, Reinaldo Gomes, Djamel Sadok, Judith Kelner:
Sampling Energy Consumption in Wireless Sensor Networks. 284-287

Yuh-Ren Tsai, Tien-Yu Lin, Kai-Jie Yang:
Sensing Coverage for Randomly Distributed Wireless Sensor Networks in Shadowed Environments. 288-291

Yi-Ling Hsieh, Kuochen Wang:
Efficient Localization in Mobile Wireless Sensor Networks. 292-297
Session 6A: Short Presentations

Wei-Zu Yang, Liang-Chang Yu, Po-Chou Chen, Tai-Liang Chen:
The Design of Multimedia Web-based Phone and Billing System with Freeware over the VoIP Network. 298-301

Yang Wang, Vijay Viradharajan:
DynamicTrust: The Trust Development in Peer-to-Peer Environments. 302-305

Meenakshi Balasubramanian, Namit Chaturvedi, Atish Datta Chowdhury, Arul Ganesh:
A framework for rapid-prototyping of context based ubiquitous computing applications. 306-311
Session 6B: Short Presentations

Fekri M. Abduljalil, Shrikant K. Bodhe:
Integrated Routing Protocol (IRP) for Integration of Cellular IP and Mobile Ad Hoc Networks. 312-315

Eric Jui-Lin Lu, Shu-Chiu Lu, Ying-Sheng Lee:
The Design of a P2P Application Routing Protocol for Heterogeneous Networks. 316-320

Nirav Shah, Farokh B. Bastani, I-Ling Yen:
A Real-Time Scheduling Based Framework for Traffic Coordination Systems. 321-325
Session 7A: Industry Papers

Yao-Jung Wen, Jessica Granderson, Alice M. Agogino:
Towards Embedded Wireless-Networked Intelligent Daylighting Systems for Commercial Buildings. 326-331

Cheng-Ming Jimmy Li:
An Integrated Software Platform for RFID-Enabled Application Development. 332-335

Seng-Yong Lau, Ting-Hao Chang, Shu-Yu Hu, Hsing-Jung Huang, Lung-de Shyu, Chui-Ming Chiu, Polly Huang:
Sensor Networks for Everyday Use: The BL-Live Experience. 336-343
Session 7B: Optimization Strategies

Kun-Feng Lin, Chuan-Ming Liu:
Schedules with Minimized Access Latency for Disseminating Dependent Information on Multiple Channels. 344-351

Yung-Tsung Hou, Tzu-Chen Lee, Chia-Mei Chen, Bingchiang Jeng:
Node Placement for Optimal Coverage in Sensor Networks. 352-357

Jian-Jia Chen, Chuan-Yue Yang, Tei-Wei Kuo:
Slack Reclamation for Real-Time Task Scheduling over Dynamic Voltage Scaling Multiprocessors. 358-367
Session 7C: Security and Assurance

Hung-Ta Pai, Yunghsiang S. Han:
Power-Efficient Data Fusion Assurance Using Direct Voting Mechanism in Wireless Sensor Networks. 368-375

Jian Yin, Sanjay Kumar Madria:
A Hierarchical Secure Routing Protocol against Black Hole Attacks in Sensor Networks. 376-383

Biswajit Panja, Sanjay Kumar Madria, Bharat K. Bhargava:
Energy and Communication Efficient Group Key Management Protocol for Hierarchical Sensor Networks. 384-393
Session 8A: Dependability Issues for Sensor and Mobile Networks

Kevin A. Kwiat, Shangping Ren:
A Coordination Model for Improving Software System Attack-tolerance and Survivability in Open Hostile Environments. 394-402

Douglas Herbert, Yung-Hsiang Lu, Saurabh Bagchi, Zhiyuan Li:
Detection and Repair of Software Errors in Hierarchical Sensor Networks. 403-410

Ing-Ray Chen, Jin-Hee Cho, Ding-Chau Wang:
Performance Characteristics of Region-Based Group Key Management in Mobile Ad Hoc Networks. 411-419
Session 8B: Motion and Tracking

Panagiotis Karras, Nikos Mamoulis:
Detecting the Direction of Motion in a Binary Sensor Network. 420-427

Sam Phu Manh Tran, T. Andrew Yang:
OCO: Optimized Communication & Organization for Target Tracking in Wireless Sensor Networks. 428-435

Yingqi Xu, Wang-Chien Lee:
DTTC: Delay-Tolerant Trajectory Compression for Object Tracking Sensor Networks. 436-445
Session 8C: Reliability

Zongxing Xie, Thiago Quirino, Mei-Ling Shyu, Shu-Ching Chen, LiWu Chang:
A Distributed Agent-Based Approach to Intrusion Detection Using the Lightweight PCC Anomaly Detection Classifier. 446-453

Jinpeng Huai, Xianxian Li, Wenyi Zhang, Jun Han, Yongzhen Zhuang:
A Software Protocol of Goals and Operations Based on BDI Model. 454-461

Flavio E. de Deus, Joseph Kabara:
On Survivability of IEEE 802.11 WLAN. 462-471
Keynote Speaker

Kinji Mori:
Autonomous Decentralized System and its Applications in Ubiquitous Computing. 472-479
Session 9A: Design and Efficiency

Shiow-Yang Wu, Chao-Hong Liu, Chen-Kuang Tzeng:
Self-organization Strategies for Dynamic Context Coverage in Capability-Constrained Mobile Sensor Networks. 480-487

Si-Yu Ou, Hung-Chang Hsiao, Chi-Kuo Chiang, Chung-Ta King:
Designing Power-aware Overlays in Heterogeneous Wireless Sensor Networks. 488-495

Chih-Yu Lin, Yu-Chee Tseng, Ten-Hwang Lai:
Message-Efficient In-Network Location Management in a Multi-sink Wireless Sensor Network. 496-505
Session 9B: Risk Assessment/Security

Omar Khadeer Hussain, Elizabeth Chang, Farookh Khadeer Hussain, Tharam S. Dillon:
A Methodology for Risk Based Decision Making in a Service Oriented Environment. 506-513

Miao Wang, Cheng Zhang, Jingjing Yu:
Native API Based Windows Anomaly Intrusion Detection Method Using SVM. 514-519

Hung-Yu Chien, Ru-Yu Lin:
Identity-based Key Agreement Protocol for Mobile Ad-hoc Networks Using Bilinear Pairing. 520-529
Session 9C: Data Processing Techniques in Mobile/Sensor Envirnoments

Kun-Lung Wu, Shyh-Kwei Chen, Philip S. Yu:
On Range Query Indexing for Efficient Stream Processing. 530-539

Haiyang Liu, Jaideep Srivastava, San-Yih Hwang:
PSRA: A Data Model for Managing Data in Sensor Networks. 540-547

Winston Khoon Guan Seah, Kevin Z. Liu, Marcelo H. Ang Jr., Joo Ghee Lim, S. V. Rao:
TARANTULAS: Mobility-enhanced Wireless Sensor-Actuator Networks. 548-551

Karl Yung-Ta Huang, Yawgeng A. Chau:
On the Level Crossing Rates and the Channel Capacity of Spatial Diversity with Maximal Ratio Combining over Correlated Nakagami Fading Channels. 552-557
Poster Session

Jue-Sam Chou, Yalin Chen, Chu-Hsing Lin:
An improvement of an efficient user identification scheme based on ID-based cryptosystem. 558-561

Chia Hsing Tung, Yi Quan Chen, Zhi Mou Chen, Shuoh-Ren Tsai:
Implementation of Security Mechanism for Adhoc Wireless Networks Based on X.509 and IEEE 802.1X. 562-563

In-Hang Chung, Duo Kim, Yu-Yi Chao:
An Energy-Efficient Architecture for the Medium Access Controller of IEEE 802.11 WLANs. 564-565

Ching-Wen Chen, Chun-Liang Lai:
An Improved Efficient Performance Design with Multiple Channels and Bandwidth Allocation Strategy for Mobile Ad-Hoc Networks. 566-567

Shouyi Yin, Yongqiang Xiong, Xiaokang Lin, Qian Zhang:
Traffic-aware Routing for Real Time Communications in Wireless Multi-hop Networks. 568-569

Ying-Hong Wang, Chih-Hsiao Tsai, Hung-Jen Mao, Kuo-Feng Huang:
An Energy-Efficient Hierarchical Multiple-Choice Routing Path Protocol for Wireless Sensor Networks. 570-571

Amine Abbas, Jacques M. Bahi, Ahmed Mostefaoui:
ImprovingWireless Ad Hoc Networks Lifetime. 572-573

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






