By Topic

The Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, and the Second International Workshop on Collaborative Computing, Integration, and Assurance (SEUS-WCCIA'06)

27-28 April 2006

Filter Results

Displaying Results 1 - 25 of 49
  • Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems and the Second International Workshop on Collaborative Computing, Integration, and Assurance-SEUS 2006/WCCIA 2006

    Publication Year: 2006
    Request permission for commercial reuse | PDF file iconPDF (143 KB)
    Freely Available from IEEE
  • The Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, and the Second International Workshop on Collaborative Computing, Integration, and Assurance - Title

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • The Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, and the Second International Workshop on Collaborative Computing, Integration, and Assurance - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • The Fourth IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, and the Second International Workshop on Collaborative Computing, Integration, and Assurance - Table of contents

    Publication Year: 2006, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (40 KB)
    Freely Available from IEEE
  • Message from the SEUS 2006 Chairs

    Publication Year: 2006, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (29 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the WCCIA 2006 Chairs

    Publication Year: 2006, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (28 KB) | HTML iconHTML
    Freely Available from IEEE
  • SEUS 2006 Organizing Committees

    Publication Year: 2006, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • WCCIA 2006 Organizing Committees

    Publication Year: 2006, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • WCCIA 2006 reviewers

    Publication Year: 2006, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • Hierarchical situation modeling and reasoning for pervasive computing

    Publication Year: 2006
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (313 KB) | HTML iconHTML

    Situation awareness is one of the most fundamental features of entities in pervasive computing environments to dynamically adapt their behavior to situation changes to satisfy user requirements, including security and privacy. In order to support situation-aware adaptation, it is necessary to model and specify context and situation in a way such that multiple entities can easily exchange, share an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The MHS methodology: analysis and design for context-aware systems

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB) | HTML iconHTML

    This paper presents a methodology (is called MHS) for analyzing, and designing pervasive systems starting from designing pervasive environments, entities to pervasive software components. Our MHS methodology is general, in that it is not only specific to one particular domain, it is applicable to a wide range of pervasive environments, comprehensive, and in a way that it deals with pervasive envir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nimbus: a task aware/context aware mobile computing platform

    Publication Year: 2006
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    In a true pervasive world barriers among devices no longer exist. Users can access and manipulate data from anywhere at anytime using a dynamic range of computing devices as they move across different environments. Today's "computer-centric" paradigm however puts increasing demand on user attention impacting overall efficiency. Today, typically a user has to manually figure out the available resou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for supporting autonomous navigation in automobiles

    Publication Year: 2006
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (190 KB) | HTML iconHTML

    We describe a framework for designing and implementing autonomous navigation in automobiles. It integrates vehicle control, environment sensing, remote services, and navigation functions using mobile computing devices such as smartphones. We use wireless Web-service for data access and Axis2 as the SOAP engine for bounded delays in communication. A hierarchical data fusion strategy is proposed wit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic skill-based software architecture for locomotion control in shape reconfigurable mobile robots

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (431 KB) | HTML iconHTML

    This paper presents dynamic skill-based software architecture for locomotion control in shape reconfigurable mobile robots. The paper first describes multi-thread based synchronization locomotion control model, which is applied in a mobile snake robot and physically reconfigured four-legged robot. The robots share common multithreaded software architecture and hardware modules, which use the conce... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An architecture for providing Java applications with indoor and outdoor hybrid location sensing

    Publication Year: 2006
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (237 KB) | HTML iconHTML

    This paper presents a software architecture that enables either the combined and separate use of indoor and outdoor location-sensing technologies. The architecture has been implemented in compliance with the specifications of the location API for Java. It is explicitly designed to provide applications with a hybrid location information, i.e., it allows to identify the terminal position among a kno... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Motivations and support for single nested scoping in Ravenscar-Java

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (251 KB) | HTML iconHTML

    This paper presents an alternative approach to memory management in the Ravenscar-Java profile, a high integrity subset of Java and the real-time specification for Java (RTSJ). The profile was engineered for maximum predictability and reliability, which means that any features that incur run-time overheads and difficulties in analysis are cast out. This has led to a memory management model that is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fault tolerance mechanism for network intrusion detection system based on intelligent agents (NIDIA)

    Publication Year: 2006
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    The intrusion detection system (IDS) has as objective to identify individuals that try to use a system in way not authorized or those that have authorization to use but they abuse of their privileges. The IDS to accomplish its function must, in some way, to guarantee reliability and availability to its own application, so that it gets to give continuity to the services even in case of faults, main... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A data mining based genetic algorithm

    Publication Year: 2006
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    Genetic algorithms (GAs) are considered as a global search approach for optimization problems. Through the proper evaluation strategy, the best "chromosome" can be found from the numerous genetic combinations. Although the GA operations do provide the opportunity to find the optimum solution, they may fail in some cases, especially when the length of a chromosome is very long. In this paper, a dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An implementation of sentential KSSL recognition and representation system for interpersonal communication based on the post wearable PC

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (849 KB) | HTML iconHTML

    In this paper, we describe the implementation of sentential Korean standard sign language (hereinafter, "KSSL") recognition and representation system using wireless haptic devices based on the post wearable PC. The advantages of our study are as follows: 1) it improves efficiency of KSSL input module according to the technology of wireless communication, 2) it recognizes and represents continuous ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time support of flash memory file system for embedded applications

    Publication Year: 2006
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB) | HTML iconHTML

    NAND flash memory has emerged as an attractive proposition for embedded storage applications due to its properties of robustness, low price, a high number of write-erase cycles, and large capacities. To make it suitable for real-time embedded applications, this paper presents the design of a log structured file system that utilizes data redundancy and parallel operations to guarantee bounded read-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A leader election protocol for eventually synchronous shared memory systems

    Publication Year: 2006
    Cited by:  Papers (6)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (247 KB) | HTML iconHTML

    While protocols that elect an eventual common leader in asynchonous message-passing systems have been proposed, to our knowledge, no such protocol has been proposed for the shared memory communication model. This paper presents a leader election protocol suited to the shared memory model. In addition to its design simplicity, the proposed protocol has two noteworthy properties, namely, it does not... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithmic implementation and efficiency maintenance of real-time environment using low-bitrate wireless communication

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    This paper presents different issues of the real-time compression algorithms without compromising the video quality in the distributed environment. The theme of this research is to manage the critical processing stages (speed, information lost, redundancy, distortion) having better encoded ratio, without the fluctuation of quantization scale by using IP configuration. In this paper, different tech... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CALM: an intelligent agent-based middleware for community computing

    Publication Year: 2006
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (423 KB) | HTML iconHTML

    The applications for ubiquitous system require to effectively use the resources distributed in the environment for providing customized services to the users. In this paper we propose a middleware architecture displaying high scalability with event-based multi-agent platform, which allows dynamic creation of community for service oriented computing. It consists of event-based communication platfor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An objectified naming system for providing context transparency to context-aware applications

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    This paper describes the design and implementation of the objectified naming system (ONS) that provides a context-aware application with context transparent identification and rebinding of services, despite changes in its context or administrative domain. ONS treats a name as a first-class object, called a name object, which hides the name resolution and service rebinding procedures required when ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Weaving adaptation semantic specification into scudware middleware for ubiquitous computing

    Publication Year: 2006
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    The need for component-based middleware adaptation is growing, due to the complexities of increasing prevalence of ubiquitous computing. Software middleware must dynamically adapt to changing environments and conditions. Dynamic adaptation must be performed reliably and correctly. The focus of this paper regards an approach to formally specifying adaptation semantics for scudware middleware in sma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.