By Topic

IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06)

5-7 June 2006

Go

Filter Results

Displaying Results 1 - 25 of 56
  • IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing - Vol 2 - Workshops - Cover

    Publication Year: 2006, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (185 KB)
    Freely Available from IEEE
  • IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing - Vol 2 - Workshops - Title Page

    Publication Year: 2006, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (41 KB)
    Freely Available from IEEE
  • IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing - Vol 2 - Workshops - Copyright

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • AHUC - Table of contents

    Publication Year: 2006, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • CAUL: Table of contents

    Publication Year: 2006, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • MTUC: Table of contents

    Publication Year: 2006, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • WCDSN: Table of contents

    Publication Year: 2006, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • Message from AHUC-2006 Workshop Co-Chairs

    Publication Year: 2006, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (35 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from CAUL 2006 Workshop Organizers

    Publication Year: 2006, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • Message from MTUC-06 Workshop Chairs

    Publication Year: 2006, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (36 KB) | HTML iconHTML
    Freely Available from IEEE
  • WCDSN Preface

    Publication Year: 2006, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (29 KB) | HTML iconHTML
    Freely Available from IEEE
  • Adaptive Retransmission for Distributed Detection in Wireless Sensor Networks

    Publication Year: 2006, Page(s):2 - 7
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    An approach combining distributed detection with error-correcting codes has recently been proposed to design a fault-tolerant classification system in wireless sensor networks. The detection result of each sensor must be transmitted to a fusion center for making a final decision. The mis-classification probability using this approach is high when the transmission channel is highly noisy. This work... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gathering-Load-Balanced Tree Protocol for Wireless Sensor Networks

    Publication Year: 2006, Page(s):8 - 13
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB) | HTML iconHTML

    Wireless communications and digital electronics have enabled the development of low-power, low-cost, multifunctional sensors. The functionality of sensor network mainly is the measurement collection. The previous proposed protocols mainly focus on broadcasting tree structure, but it may not be efficient in data gathering. In this paper, we propose novel tree architecture that is a dynamic, adjusta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault Estimation and Fault Map Construction on Cluster-based Wireless Sensor Network

    Publication Year: 2006, Page(s):14 - 19
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    Most applications of wireless sensor networks (WSNs) the sensors are deployed on unfavorable environment such as chemical reactor or battlefield that with high temperature, noise, and interference, could probably incur sensor nodes sense, compute, or communicate improperly. Those also raise error responds to the data collectors. In this paper, a fault estimation model is proposed and can be used t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Energy Efficient Data Storage Policy for Object Tracking Wireless Sensor Network

    Publication Year: 2006, Page(s):20 - 25
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (525 KB) | HTML iconHTML

    In wireless sensor networks, storage policy of sensed event affects the number of required control messages. If the number of control message can be reduced, the network lifetime can be increased because transmitting unnecessary control message requires extra energy consumption. In this paper, a local storage method with small control overhead is proposed for object tracking application in wireles... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Passive Self-Configuration MAC Protocol for IEEE 802.11-Based Multi-Hop MANETs

    Publication Year: 2006, Page(s):26 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    The paper proposes a passive self-configuration MAC protocol (PSC-MAC) for IEEE 802.11-based multi-hop MANETs. PSC-MAC focuses on determining multiple supervising sets, each of which consists of some power-rich stations, supervisors, to be in charge of the network management. Supervisor determination in PSC-MAC is achieved by a passive manner due to less communication overhead. The main idea of PS... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting Time Intervals forResource Availability in MANETs

    Publication Year: 2006, Page(s):32 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    In emergency and rescue operations MANETs can help to improve the efficiency of the collaborative work. The goal is to increase the availability of services and information through resource awareness. The work described in this paper, presents our approach towards prediction of current and future resources available on remote devices. Our resource prediction algorithm is based on information extra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Method of Selecting Stable Paths in Mobile Ad Hoc Networks

    Publication Year: 2006, Page(s):38 - 45
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB) | HTML iconHTML

    Node mobility is one of dominant factors causing decreased performance in mobile ad hoc networks and restricting network scalability. Selecting stable paths is an effective way to reduce the impact of node mobility. Current methods of selecting stable paths suffer from several shortcomings. They may need a hardware function support for geographical position location or cross-layer function support... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing Calibration Effort for WLAN Location and Tracking System using Segment Technique

    Publication Year: 2006, Page(s):46 - 51
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (435 KB) | HTML iconHTML

    As mobile computing technology becomes more and more mature, people feel great interest on context-aware applications and services. Referring to context, location-aware system is one of the most important components. This paper presents a precise indoor RF-based (IEEE 802.11) locating system named precise indoor locating system (PILS). In order to acquire high level of location estimation result, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Intention-Aware Interface for Services Access Enhancement

    Publication Year: 2006, Page(s):52 - 57
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (401 KB) | HTML iconHTML

    An intention-aware services query tool is proposed to enhance the access of services-oriented systems in more efficient and convenient way. The user can request the services by entering a phrase to interact with the system. The system capabilities are represented by a goal structure composed of computable goal models. The request string will be parsed, interpreted and mapped to candidate goal mode... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simple Multi-Secret Sharing Schemes to Achieve the Optimal Maximum Improvement Ratio

    Publication Year: 2006, Page(s):58 - 63
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Secret sharing scheme is a way to distribute a secret among several participants in such a way that only qualified subsets of the participants can reconstruct the secret and unqualified subsets have no information about the secret. A multi-secret sharing scheme is the extension of a secret sharing scheme to the case in which there are many secrets need to be shared, and each secret may with differ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Implementation of AES Algorithm with the Multiple Spaces Random Key Pre-Distribution Scheme on MOTE-KIT 5040

    Publication Year: 2006, Page(s):64 - 71
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    Wireless sensor networks introduce a new way for us to interact with the physical environment. Since wireless sensor networks use radio frequency as the communication medium, chances for the information retrieved by unexpected people are becoming easier and easier. In wireless sensor networks the resources are limited; it seems that AES is a good solution for this communication problem. Beside, a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Criteria and Strategies of Ubiquitous Learning

    Publication Year: 2006, Page(s):72 - 77
    Cited by:  Papers (22)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (191 KB) | HTML iconHTML

    Recent progress of wireless technologies has initiated a new trend in learning environments, called ubiquitous learning (u-learning), which is able to sense the situation of the learners, and hence provide more adaptive supports. Many researchers have investigated the development of such learning environments; nevertheless, the criteria of establishing a u-learning environment have not been clearl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context Model and Context Acquisition for Ubiquitous Content Access in ULearning Environments

    Publication Year: 2006, Page(s):78 - 83
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    Context aware ubiquitous access is an interactive model between the context of learners and the content in ubiquitous learning environments. We envision that providing context aware learning content is the first step toward ubiquitous learning by finding right collaborative learners, right learning content and right learning services in the right place at the right time. The major contributions of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ubiquitous Collaborative Learning in Knowledge-Aware Virtual Communities

    Publication Year: 2006, Page(s):84 - 89
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (623 KB) | HTML iconHTML

    In this paper, we applied peer-to-peer (P2P) and instant messenger (IM) approaches to provide a seamless integration of learning resources. The learning resources contain three categories, namely learning collaborators, content, and services. This seamless learning environment aimed for knowledge sharing in collaboration supported virtual learning communities. Content found by peer-to-peer network... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.