By Topic

2010 4th International Conference on Multimedia and Ubiquitous Engineering

11-13 Aug. 2010

Filter Results

Displaying Results 1 - 25 of 48
  • [Title page]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (195 KB)
    Freely Available from IEEE
  • General Chairs Message

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Program Chairs Message

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • Workshop Chairs Message

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Organization Committee

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2010, Page(s):1 - 3
    Request permission for commercial reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE
  • Welcome message from WIMUCS 2010 Organizers

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • WIMUCS 2010 Organization

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Welcome message from MCC 2010 Organizers

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • MCC 2010 Organizers

    Publication Year: 2010, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (101 KB)
    Freely Available from IEEE
  • A Backup Path Finding Scheme Using One-Hop Search in Ad Hoc Networks

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB) | HTML iconHTML

    This paper suggests a backup path setup and routing scheme for ad hoc networks. A data path is established by on-demand manner. Intermediate nodes of the established path have a routing table that has next node information for sending data packets. The primary and backup paths are made as a sequence of route control message exchange process. A backup path is a link-disjoint with the primary path, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Design-Phase Quality Model of U-Service Ontology for Evaluating Dynamic Service Composition

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB) | HTML iconHTML

    Efficient service description and modeling methodologies are essential for dynamic service composition to provide autonomous services for users in ubiquitous computing environments. In our previous research, we proposed 'u-service' ontology which is an abstract and structured concept for device operations in ubiquitous environments. One of the problems that we face during the design process is tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Linear Prediction Based Fractional-Pixel Motion Estimation Algorithm

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    In modern video coding standards, for example H.264, fractional-pixel motion estimation (ME) is implemented. Many fast integer-pixel ME algorithms have been developed to reduce the computational complexity of integer-pixel ME. With these advancements, fractional-pixel ME becomes the new bottleneck in the implementation of video encoders. For example, the conventional hierarchical fractional-pixel ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Grid Market Architecture Based on Contract-Management and Third-Party Depository Service

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (331 KB) | HTML iconHTML

    In recent years, the research to the Grid economy has become a hot spot with the development of Grid technology. Some models and middleware have been proposed to improve the application of Grid economy. One remarkable result of these is the Grid Architecture for Computational Economy (GRACE) which contains the functionality of resource discovery, resource trade and resource allocation. However, in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Approach for Efficient and Effective Mining of Mobile User Behaviors

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    Many people increasingly rely on mobile communication services to carry out daily activities. Due to the limitation of the PCS network architecture, a constantly relocating user may encounter significant delay when requesting data or value-added services. Previous research showed that this inefficiency can be effectively reduced by predicting the user's mobile patterns. However, most research mere... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Privacy-Enhanced Contents Sharing Mechanism with Secure Removable Media(SRM)

    Publication Year: 2010, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (694 KB) | HTML iconHTML

    In this paper, we propose a privacy-enhanced contents sharing mechanism with SRM. For user anonymity, our approach makes use of anonymously authenticated key exchange based on group signature schemes. In addition, our mechanism not only provides anonymous authentication and key exchange, but also supports a variety of anonymous access control. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Restorative Image Authentication Scheme with Discrimination of Tampers on Image or Watermark

    Publication Year: 2010, Page(s):1 - 5
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    Most image authentication schemes in the literature are either vulnerable to vector quantization (VQ) counterfeiting attacks or sacrifice localization accuracy to improve the security. Only a few algorithms exist to take the recovery of the tampered areas into account. This motivates us to develop a novel authentication scheme for the accurate tamper localization and restoration of the tampered ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Scheduling Based on Quality of Service in Heterogeneous Environments

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB) | HTML iconHTML

    With the emergence of grid and cloud technologies, the problem of scheduling tasks in heterogeneous distributed systems has been arousing attention. In this paper, we present two scheduling techniques for optimizing overall execution time and minimizing resource usage cost. To evaluate the effectiveness of the proposed techniques, we have implemented both techniques along with the QoS Min-Min sche... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Accuracy-Control Method for Online Trajectory Extraction in Wireless Sensor Networks

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    Trajectory extraction has been studied in many research areas, such as traditional spatio-temporal databases, advanced vehicle information systems, and military surveillance. However, extracting object trajectories from current sensor information system cannot satisfy the accuracy requirements from many application demands. In this paper, we propose the Fast Accuracy-Control Method (FACM) to gener... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Localization Scheme with Ring Overlapping by Utilizing Mobile Anchors in Wireless Sensor Networks

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (739 KB) | HTML iconHTML

    In this study, we propose an efficient localization scheme in wireless sensor networks. The proposed scheme utilizes mobile anchors and is based on ring overlapping. In a wireless sensor network, there are some nodes knowing their locations, which are called the reference nodes, and the other nodes without the knowledge of their locations are called the blind nodes. Based on the relative RSSI (Rec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Energy-Efficient Self-Deployment Scheme in Intelligent Mobile Sensor Networks

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (622 KB) | HTML iconHTML

    In traditional static wireless sensor networks, it is sometimes impossible to deploy the sensors manually when they are distributed in unexploited, hostile, or disaster areas. If each sensor has the locomotion capability, it can re-deploy itself using the location information of neighbor sensors. In our previous study, we showed that moving sensors to the centroids of their Voronoi polygon generat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blur Identification Based on Maxima Locations for Color Image Restoration

    Publication Year: 2010, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (139 KB) | HTML iconHTML

    Blind deconvolution essentially involves the determination of the original image and the blurring function given only a degraded image. This paper proposes an approach to simultaneously estimate these two quantities by utilizing a reference point spread function (RPSF) as a learning basis in the regularization cycle. This is derived from the behavior of image maxima in the presence of blurs. The e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cultural Differences in Display Design for Mobile Web-Browsing Tasks

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (421 KB) | HTML iconHTML

    Today's smart phone users spend a considerable amount of time reading texts on mobile displays. Effective readability factors encourage more users to engage themselves into mobile internet service. An investigation through relevant literature survey uncovers that a lot of mobile internet issues are still remain unanswered. The objective of this research was to investigate the impacts of font heigh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Customer-Oriented Design of Mobile Phones for Optimal Controllability

    Publication Year: 2010, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (395 KB) | HTML iconHTML

    Among numerous factors that have an effect on the controllability for the use of mobile phones, the effects of product size and control location were investigated to find the form factors which most affect customer preference while controlling the mobile phones. Moreover we made an effort to find an improvement of preference according to control location. An experiment was conducted, in which pref... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.