Sciweavers

EUC
2005
Springer
13 years 9 months ago
The Content Analyzer Supporting Interoperability of MPEG-4 Content in Heterogeneous Players
MPEG-4 supports object-based interactive multimedia applications. To compose complex multimedia scene, MPEG-4 supports BIFS and XMT as scene description. For interoperability of th...
Hyunju Lee, Sangwook Kim
EUC
2005
Springer
13 years 9 months ago
Baton: A Service Management System for Coordinating Smart Things in Smart Spaces
Smart spaces are open complex computing systems, consisting of a large variety of cooperative smart things. Central to building smart spaces is the support for sophisticated coordi...
Jingyu Li, Yuanchun Shi
EUC
2005
Springer
13 years 9 months ago
Energy-Driven Adaptive Clustering Hierarchy (EDACH) for Wireless Sensor Networks
Wireless sensor network consists of small battery powered sensors. Therefore, energy consumption is an important issue and several schemes have been proposed to improve the lifetim...
Kyung Tae Kim, Hee Yong Youn
EUC
2005
Springer
13 years 9 months ago
ANTS: An Evolvable Network of Tiny Sensors
As a promising technology that enables ubiquitous computing and leads IT industries of next generation, sensor networks (SN) are foreseen to expand and populate the globe in such a...
Daeyoung Kim, Tomás López, Seongeun ...
EUC
2005
Springer
13 years 9 months ago
An Integrated Scheme for Address Assignment and Service Location in Pervasive Environments
We propose an efficient scheme called CoReS (Configuration and Registration Scheme) that integrates address assignment and service location for ad hoc networks prevalent in pervasi...
Mijeom Kim, Mohan Kumar, Behrooz Shirazi
EUC
2005
Springer
13 years 9 months ago
Ubiquitous Organizational Information Service Framework for Large Scale Intelligent Environments
In this paper, we introduce a concrete, practical Ubiquitous Organizational Information (UOI) service framework, providing novice users intelligent and useful services with respect...
Kwang-il Hwang, Won-Hee Lee, Seok-hwan Kim, Doo Se...
EUC
2005
Springer
13 years 9 months ago
Security Analysis of Michael: The IEEE 802.11i Message Integrity Code
Jianyong Huang, Jennifer Seberry, Willy Susilo, Ma...
EUC
2005
Springer
13 years 9 months ago
Collision Attack on XTR and a Countermeasure with a Fixed Pattern
Public-key cryptosystem (PKC) is one of inevitable key technologies in order to accomplish fruitful security applications in ubiquitous computing systems. The ubiquitous computer o...
Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon...
EUC
2005
Springer
13 years 9 months ago
Development of a Microdisplay Based on the Field Emission Display Technology
We have been developing a microdisplay based on the field emission display (FED) technology, which is advantageous in power consumption, image quality and long term stability. We ...
Takahiro Fusayasu, Yoshito Tanaka, Kazuhiko Kasano...
EUC
2005
Springer
13 years 9 months ago
Anonymous Routing in Wireless Mobile Ad Hoc Networks to Prevent Location Disclosure Attacks
Wireless Ad Hoc networks are particularly vulnerable due to their fundamental characteristics such as an open medium, dynamic topology, distributed cooperation and constrained capa...
Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Le...