By Topic

Intelligent Pervasive Computing, 2007. IPC. The 2007 International Conference on

Date 11-13 Oct. 2007

Filter Results

Displaying Results 1 - 25 of 120
  • The 2007 International Conference on Intelligent Pervasive Computing - Cover

    Publication Year: 2007 , Page(s): c1
    Request Permissions | PDF file iconPDF (238 KB)  
    Freely Available from IEEE
  • The 2007 International Conference on Intelligent Pervasive Computing - Title page

    Publication Year: 2007 , Page(s): i - iii
    Request Permissions | PDF file iconPDF (39 KB)  
    Freely Available from IEEE
  • The 2007 International Conference on Intelligent Pervasive Computing - Copyright

    Publication Year: 2007 , Page(s): iv
    Request Permissions | PDF file iconPDF (44 KB)  
    Freely Available from IEEE
  • The 2007 International Conference on Intelligent Pervasive Computing - Table of contents

    Publication Year: 2007 , Page(s): v - x
    Request Permissions | PDF file iconPDF (145 KB)  
    Freely Available from IEEE
  • Welcome Message from the IPC 2007 General Chairs

    Publication Year: 2007 , Page(s): xi
    Request Permissions | PDF file iconPDF (35 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Welcome Message from the IPC 2007 Program Chairs

    Publication Year: 2007 , Page(s): xii
    Request Permissions | PDF file iconPDF (28 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Welcome Message from the IPC 2007 Workshop Co-Chairs

    Publication Year: 2007 , Page(s): xiii
    Request Permissions | PDF file iconPDF (38 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Welcome Message from the IUCE 2007 Workshop Co-Chairs

    Publication Year: 2007 , Page(s): xiv
    Request Permissions | PDF file iconPDF (36 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Welcome Message from the IHS 2007 Workshop Co-Chairs

    Publication Year: 2007 , Page(s): xv
    Request Permissions | PDF file iconPDF (33 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Welcome Message from the IPM/ESA/RFID 2007 Workshop Co-Chairs

    Publication Year: 2007 , Page(s): xvi
    Request Permissions | PDF file iconPDF (48 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2007 , Page(s): xx
    Request Permissions | PDF file iconPDF (44 KB)  
    Freely Available from IEEE
  • An Improvement on Authenticated Key Agreement Scheme

    Publication Year: 2007 , Page(s): 3 - 6
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (91 KB) |  | HTML iconHTML  

    Over the insecure network environment, key agreement is essential for protecting the messages exchanged between two communication parties. And to achieve high security requirements, key agreement schemes providing mutual authentication are commonly used in modern information security systems. In 2005, Lee and Lee proposed a novel authentication with key agreement scheme. But we find that Lee-Lee's... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reliable and Configurable E-commerce Mechanism Based on Mobile Agents in Mobile Wireless Environments

    Publication Year: 2007 , Page(s): 7 - 10
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (229 KB) |  | HTML iconHTML  

    Because of the limited capability of mobile devices and lower bandwidth of wireless network, web-based e-commerce in mobile wireless environments suffers more challenges and it needs an efficient and reliable mechanism to support the process. This paper presents a flexible and configurable mechanism, which uses mobile agents as brokers of mobile device to communicate with Web server, thus to reduc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Personalized Semantic Search Method for Intelligent e-Learning

    Publication Year: 2007 , Page(s): 11 - 14
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (243 KB) |  | HTML iconHTML  

    In intelligent e-Learning, personalized search support becomes even more and more important now. This paper shows how to achieve the personalized search in e-learning environments. We present a semantic-based search method for personalized e- Learning. In the method, learning resources ontology and learner ontology are designed for semantic analysis and algorithm for ontology learning. The method ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cognitive Computing in Analysis of 2D/3D Medical Images

    Publication Year: 2007 , Page(s): 15 - 18
    Request Permissions | Click to expandAbstract | PDF file iconPDF (374 KB) |  | HTML iconHTML  

    This paper will present some possibilities of appli- cation of mathematical linguistic formalisms, in the form of structural pattern recognition, in development a new class of intelligent medical diagnosis-support and image recognition systems. Such methods are aimed to facilitate a semantic analysis of the meaning for some selected medical patterns, especially in the form of 2D spinal cord and le... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fast Intra MB Mode Decision Method for the MPEG-2 to H.264 Transcoder

    Publication Year: 2007 , Page(s): 19 - 22
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (292 KB) |  | HTML iconHTML  

    In this paper we propose an Intra mode decision method for the MPEG-2 to H.264/AVC transcoders to reduce the huge computational complexity. The DCT coefficients from the MPEG-2 decoder are used for the intra mode decision of H.264/AVC encoder. Based on the spatial activity analysis with the coefficients, early mode decision method between Intra16x16 and Intra4x4 modes and the Intra prediction dire... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Intrusion Detection in Wireless Sensor Networks

    Publication Year: 2007 , Page(s): 23 - 28
    Request Permissions | Click to expandAbstract | PDF file iconPDF (314 KB) |  | HTML iconHTML  

    Security is a significant concern for many sensor network applications. Intrusion detection is one method of defending against attacks. However, standard intrusion detection is not suitable for sensor networks with limited battery power, memory and processing resources. This paper compares several approaches to intrusion detection in sensor networks. We investigate accuracy of detection of attacks... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increasing Polynomial Regression Complexity for Data Anonymization

    Publication Year: 2007 , Page(s): 29 - 34
    Request Permissions | Click to expandAbstract | PDF file iconPDF (318 KB) |  | HTML iconHTML  

    Pervasive computing and the increasing networking needs usually demand from publishing data without revealing sensible information. Among several data protection methods proposed in the literature, those based on linear regression are widely used for numerical data. However, no attempts have been made to study the effect of using more complex polynomial regression methods. In this paper, we presen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Target Coverage With QoS Requirements in Wireless Sensor Networks

    Publication Year: 2007 , Page(s): 35 - 38
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (173 KB) |  | HTML iconHTML  

    It has been a challenging problem to support target coverage with QoS requirements in wireless sensor networks, because we need to consider both energy constraint and so-called target Q-coverage requirement, i.e. different targets may require different sensing quality in terms of the number of transducers, data sampling rate, etc. First we prove that this problem is NP- complete, then we fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Rapid Development Approach for Signal Strength Based Location Systems

    Publication Year: 2007 , Page(s): 39 - 44
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (551 KB) |  | HTML iconHTML  

    Location systems are core technologies for enabling pervasive computing smart spaces. Signal strength based location estimation offers economical viability and sufficient accuracy for numerous location based services. Despite extensive research being carried out in this positioning method, tedious and lengthy development life cycle prohibits wide scale deployment of these systems. We present a new... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Leakage Current Reduction in Data Caches on Embedded Systems

    Publication Year: 2007 , Page(s): 45 - 50
    Cited by:  Papers (1)  |  Patents (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (303 KB) |  | HTML iconHTML  

    Nowadays, embedded systems can be found in a wide range of pervasive devices (e.g., smart phones, PDAs, or video/digital cameras). These devices contain large cache memories, whose power consumption can reach about 50% of the total spent energy, from which leakage energy is the predominant fraction in current technologies. This paper proposes a technique to reduce leakage energy consumption in dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Context-Aware Access Control Model for Pervasive Computing Environments

    Publication Year: 2007 , Page(s): 51 - 56
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (238 KB) |  | HTML iconHTML  

    In pervasive computing environments, a user can access resources and services from any where and at any time; thus a key security challenge in these environments is the design of an effective access control model which is aware of context modifications. Changes in context may trigger changes in authorizations. In this paper, we propose a new context-aware access control model based on role-based a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Ventricular Arrhythmia Nonlinear Analysis

    Publication Year: 2007 , Page(s): 57 - 61
    Request Permissions | Click to expandAbstract | PDF file iconPDF (312 KB) |  | HTML iconHTML  

    This paper presents a new nonlinear method to analyse ventricular arrhythmia (ventricular flutter (VFL), ventricular fibrillation(VF) and ventricular tachycardia(VT)) mixed in sinus rhythms(SR) from the raw electrocardiogram (ECG) data. The method has a three step processing. First, calculating the slope of permutation entropy (PE) to detect the onset of ventricular arrhythmia; Second, using regul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic Tolerance Relation-Based Image Representation and Classification

    Publication Year: 2007 , Page(s): 62 - 67
    Request Permissions | Click to expandAbstract | PDF file iconPDF (334 KB) |  | HTML iconHTML  

    The nature of the concepts regarding images in many domains are imprecise, and the interpretation of finding similar images is also ambiguous and subjective on the level of human perception. To solve these problems, in this paper, images' semantic categories and the tolerance degree between them are defined systematically, and the approach of modeling tolerance relations between the semantic class... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of Leukocytes from In vivo Videos

    Publication Year: 2007 , Page(s): 68 - 71
    Request Permissions | Click to expandAbstract | PDF file iconPDF (370 KB) |  | HTML iconHTML  

    Leukocyte migration is an important phenomenon in the inflammatory tissue. The migration process includes the rolling velocity decreasing and the leukocytes adhesion. However, the analysis of in vivo microscopy video is a labor-intensive and time consuming task. Several approaches have been proposed for tracking leukocyte movements. However, these approaches can either only track leukocytes that r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.