By Topic

2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07)

Date 26-28 April 2007

Filter Results

Displaying Results 1 - 25 of 221
  • 2007 International Conference on Multimedia and Ubiquitous Engineering - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • 2007 International Conference on Multimedia and Ubiquitous Engineering - Title Page

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • 2007 International Conference on Multimedia and Ubiquitous Engineering - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • 2007 International Conference on Multimedia and Ubiquitous Engineering - Table of contents

    Publication Year: 2007, Page(s):v - xvii
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • Message from the General Chairs

    Publication Year: 2007, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (24 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2007, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (24 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organizing Committee

    Publication Year: 2007, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2007, Page(s): xxi
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • Workshop Organizing Committee

    Publication Year: 2007, Page(s): xxiv
    Request permission for commercial reuse | PDF file iconPDF (27 KB)
    Freely Available from IEEE
  • Analysis of Sound Features for Music Timbre Recognition

    Publication Year: 2007, Page(s):3 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    Recently, communication, digital music creation, and computer storage technology has led to the dynamic increasing of online music repositories in both number and size, where automatic content-based indexing is critical for users to identify possible favorite music pieces. Timbre recognition is one of the important subtasks for such an indexing purpose. Lots of research has been carried out in exp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Context-Aware Multimedia Middleware Solutions for Counteracting IEEE 802.11 Performance Anomaly

    Publication Year: 2007, Page(s):9 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (657 KB) | HTML iconHTML

    Multimedia provisioning over Wi-Fi networks is a complex task that should consider also novel issues stemming from the specific behavior of IEEE 802.11 protocols. In particular, we claim the need for visibility of context data about the IEEE 802.11 performance anomaly, i.e., the situation where even a single node located at the borders of the coverage area of a Wi-Fi access point produces a releva... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Task Dispatching Method in Heterogeneous Networks

    Publication Year: 2007, Page(s):17 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Grid technology has been recognized as an efficient solution to coordinate large-scale shared resources and execute complex applications in heterogeneous network environments. In this paper, we present an efficient task scheduling strategy for distributing tasks onto computing nodes in the underlying heterogeneous networks. The contribution of the proposed technique is to minimize average turnarou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing the Pharmaceutical Supply Chain using RFID

    Publication Year: 2007, Page(s):23 - 28
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) while simultaneously supporting privacy. In this paper we discuss how RFID can be applied to increase integrity in the pharmaceutical supply chain. A secured pharmaceutical supply chain will increase integrity, improve consum... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A proposal of efficient scheme of key management using ID-based encryption and Biometrics

    Publication Year: 2007, Page(s):29 - 34
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (469 KB) | HTML iconHTML

    In the information exchange through network, the security risks always exists, that is eavesdropping, defacing, and spoofing by the attacker. Crypthography, digital signature, and authentication are techniques oppose such attacker. PKI (public key infrastructure) enables such technique. In PKI, the public key certificate is used. This public key certificate is issued and distributed by certificate... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Approach of Program Analysis Prevention for Information Protection

    Publication Year: 2007, Page(s):35 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (173 KB) | HTML iconHTML

    The evolution of mobile technologies will enable us to realize the ubiquitous computing environment. In such environment, a user's mobile terminal manages his sensitive information and assists in his activities. At the same time, information leakage will become more serious social problems. In this paper, we propose a framework which protects user's sensitive information according to a way the use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Autonomy, Heterogeneity and Trust in Mobile P2P environments

    Publication Year: 2007, Page(s):41 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (211 KB) | HTML iconHTML

    Mobile P2P environments are emerging as a result of rapid expansion of portable terminals that are able to establish direct wireless communication links among themselves. These kinds of terminals are under the control of persons and allowing interactions between their terminals is subject to trust between the individuals and their desire to preserve various aspects of autonomy against each other. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Neighbor Caching Mechanism for Handoff in IEEE 802.11 Wireless Networks

    Publication Year: 2007, Page(s):48 - 53
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (413 KB) | HTML iconHTML

    Seamless handover in IEEE 802.11 for quality of service (QoS) demanding applications is one of the critical issues because of handover latency. In this paper, we proposed the neighbor graph cache (NGC) mechanism to reduce scanning latency while a mobile station tries to make a link-layer handover. The handoff latency can be greatly reduced through NGC algorithm. We use OPNET modeler as the simulat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PKTown: A Peer-to-Peer Middleware to Support Multiplayer Online Games

    Publication Year: 2007, Page(s):54 - 59
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (423 KB) | HTML iconHTML

    Peer-to-peer (P2P) system can support service for lots of end users with little hardware investment, which suits for the efforts to lower down the service cost for multiplayer online games (MOG). In this paper, we introduce PKTown, a P2P middleware inserted into Star Craft and the network layer. PKTown captures all packets generated by Star Craft. We apply application layer multicast (ALM) to tran... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission

    Publication Year: 2007, Page(s):60 - 65
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (771 KB) | HTML iconHTML

    Securing multimedia transmission has become a challenging issue due to the popularization of real-time multimedia applications such as video surveillance, satellite communication and web cams. However, previous security algorithms do not always guarantee a satisfactory degree of media quality and latency. In order to provide both security and media QoS, a viable security mechanism must consider th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Predictive Fault Tolerance Agent based on Ubiquitous Computing for A Home Study System

    Publication Year: 2007, Page(s):66 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    DOORAE (Distance Object Oriented Collaboration Environment) is a framework for supporting development on multimedia collaborative environment. It provides functions well capable of developing multimedia distance education system for students as well as teachers. It includes session management, access control, concurrency control and handling late comers. There are two approaches to software archit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sensor Node Activity Scheduling Approach

    Publication Year: 2007, Page(s):72 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    Sensor networks, once deployed, are expected to continue to function unmanned. However, energy of the sensors is typically unrenewable thus making it a very scarce resource. Therefore, in order to extend the life of the sensor networks for the duration of a particular mission, energy has to be managed wisely. In this paper, we consider the problem of energy conservation for grid-based sensor netwo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Clustering Algorithm for 2D Multi-density Dataset in Large Database

    Publication Year: 2007, Page(s):78 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    Spatial clustering is an important component of spatial data mining. The requirement of detecting clusters of points arises in many applications. One of the challenges in spatial clustering is to find clusters on multi-density dataset. In this paper, a grid-based density-confidence-interval clustering algorithm for 2-dimensional multi-density dataset is proposed, called GDCIC. The proposed algorit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Common Interest Share Model for On-line Peer Communities

    Publication Year: 2007, Page(s):83 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    On-line communities on the Internet are highly self- organizing, dynamic and ubiquitous. The prime interest of peers in this community is often sharing common interest, even when compromising privacy. This paper presents a peer coordination strategy and a data sharing process for peers on the Internet which allows them to discover their common interest in terms of sets of frequently visited URLs. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User Authentication for Multi Domain in Home Network Environments

    Publication Year: 2007, Page(s):89 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (381 KB) | HTML iconHTML

    The Home Network environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the home network environment that user provides context awareness that is wanted computing environment. This Home Network contains much especially weak side i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multi Layer Approach to Defend DDoS Attacks Caused by Spam

    Publication Year: 2007, Page(s):97 - 102
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (377 KB) | HTML iconHTML

    Corporate mail services are designed to perform better than public mail services. Fast mail delivery, large size file transfer as an attachments, high level spam and virus protection, commercial advertisement free environment are some of the advantages worth to mention. But these mail services are frequent target of hackers and spammers. Distributed denial of service attacks are becoming more comm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.