Home | Committee | Program | Venue | Keynotes | Registration | Tourism ATC2010


 

Program in PDF

UIC-09 and ATC-09 Program at a glance

Tuesday, July 7
08:30-18:00 Registration (Abel Smith)
09:30-10:00 Opening ceremony (Abel Smith)
10:00-11:00 Keynote 1: Web of Things as a Framework for Ubiquitous Intelligence and Computing
Professor Tharam S. Dillon, Curtin University of Technology, Australia

(Abel Smith)
11:00-11:30 Coffee break (Holt Room)
11:30-12:30 Keynote 2: Design for Trust in Ambient & Ubiquitous Computing
Professor Jean Camp, Indiana University, USA

(Abel Smith)
12:30-13:00 Organisational remarks (Abel Smith)
13:00-14:00 Lunch (Holt Room)
14:00-15:00 Keynote 3: Distributed Computing in Opportunistic Environments
Professor Mohan Kumar, The University of Texas at Arlington, USA

(Abel Smith)
15:00-15:30 Coffee break (Holt Room)
15:30-17:30 UIC session 1/7
(Abel Smith)
ATC session 1/5
(Innes Room)
UFirst session 6/6
(GP North 217)
ICA session 1/1
(GP North 216)
PerMedia session 1/1
(GP North 115)
CPSC session 1/3
(GP North 116)
17:30-19:30 Reception (Innes Room)

 

Wednesday, July 8
08:00-17:30 Registration (Holt Room)
08:30-10:30 UIC session 2/7
(Innes Room)
ATC session 2/5
(SocialSciences S402)
UFirst session 2/6
(GP North 217)
USST session 1/2
(GP North 216)
WiMo session 1/2
(GP North 115)
CPSC session 2/3
(GP North 116)
10:30-11:00 Coffee break (Holt Room)
11:00-13:00 UIC session 3/7
(Innes Room)
ATC session 3/5
(SocialSciences S402)
UFirst session 3/6
(GP North 217)
USST session 2/2
(GP North 216)
WiMo session 2/2
(GP North 115)
CPSC session 3/3
(GP North 116)
13:00-14:00 Lunch (Holt Room)
14:00-15:30 Panel discussion
(Innes Room)
15:30-15:45 UIC-2010/ATC-2010 Announcement
15:45-16:15 Coffee break (Holt Room)
16:15-17:15 ICA-IN-WIRELESS Invited talk:
Scheduling and Data Management Techniques in Wireless Mesh Networks: A Cross-layer Approach
Assoc/Prof Mieso Denko, University of Guelph, Canada
(Innes Room)
19:00-22:00 Dinner cruise
Kookaburra River Queen - Paddlewheeler (Eagle Street Pier | GoogleMap)

 

Thursday, July 9
08:30-13:00 Registration (Holt Room)
09:00-11:00 UIC session 4/7
(Innes Room)
ATC session 4/5
(SocialSciences S402)
UFirst session 4/6
(GP North 217)
CPI session 1/3
(GP North 216)
MANS session 1/3
(GP North 115)
CTC session 1/3
(GP North 116)
11:00-11:30 Coffee break (Holt Room)
11:30-13:30 UIC session 5/7
(Innes Room)
ATC session 5/5
(SocialSciences S402)
UFirst session 5/6
(GP North 217)
CPI session 2/3
(GP North 216)
MANS session 2/3
(GP North 115)
CTC session 2/3
(GP North 116)
13:30-14:30 Lunch (Holt Room)
14:30-16:30 UIC session 7/7
(Innes Room)
UIC session 6/7
(SocialSciencesS402)
UFirst session 1/6
(GP North 217)
CPI session 3/3
(GP North 216)
MANS session 3/3
(GP North 115)
CTC session 3/3
(GP North 116)
16:30-17:00 Coffee break (Holt Room)
17:00 END OF CONFERENCE --- THANK YOU


 

 

 

 

 

 


Program for the UIC'09 and ATC'09

  Tuesday, July 7, 09:30-10:00 Opening ceremony
Chair: Jadwiga Indulska (General chair, UIC'09/ATC'09)

Terry Caelli (Director, NICTA Queensland Research Lab)
Paul Bailes (Head of School, ITEE, The University of Queensland)
Daqing Zhang (Program chair, UIC'09)
Juan Gonzalez Nieto (Program chair, ATC'09)
Robert C. H. Hsu (Workshop chair)

Back to Program at a glance

 

  Tuesday, July 7, 10:00-11:00 Keynote 1
Chair: Jadwiga Indulska
Web of Things as a Framework for Ubiquitous Intelligence and Computing
Professor Tharam S. Dillon, Curtin University of Technology, Australia

Back to Program at a glance

 

  Tuesday, July 7, 11:30-12:30 Keynote 2
Chair: Juan Gonzales Nieto
Design for Trust in Ambient & Ubiquitous Computing
Professor Jean Camp, Indiana University, USA

Back to Program at a glance

 

  Tuesday, July 7, 12:30-13:00 Organisational remarks
Chair: Jadwiga Indulska
 

Back to Program at a glance

 

  Tuesday, July 7, 14:00-15:00 Keynote 3
Chair: Marius Portmann
Distributed Computing in Opportunistic Environments
Professor Mohan Kumar, The University of Texas at Arlington, USA

Back to Program at a glance

 


 

Program for the UIC'09 and ATC'09 sessions

  Tuesday, July 7, 15:30-17:30 Parallel sessions
UIC session 1/7:
Context Awareness
ATC session 1/5:
Organic & Autonomic Computing
UFirst session 6/6:
Smart Environments and Autonomous Systems
ICA session 1/1: PerMedia session 1/1: CPSC session 1/3:
Cyber Intelligence and Safety
Chair: Stephen Yau Chair: Hartmut Schmeck Chair: Ren-Hung Hwang Chair: Dhammika Jayalath Chair: Lei Ye Chair: Furong Wang
Inferring Human Interactions in Meetings: A Multimodal Approach
Zhiwen Yu, Zhiyong Yu, Yusa Ko, Xingshe Zhou, Yuichi Nakamura
Towards an Organic Network Control System
Sven Tomforde, Marcel Steffen, Jörg Hähner, Christian Müller-Schloer
Agenda Driven Home Automation - Towards High Level Context Aware Systems
Fano Ramparany, Yazid Benazzouz, Marta Bel Martin
Cooperative Routing for Wireless Networks with Multiple Shared Channels
Xiaoqin Chen, Dhammika Jayalath, Leif Hanlen
RFID-Based Personalized Behavior Modeling
Hui-Huang Hsu, Zixue Cheng, Timothy K. Shih, Chien-Chen
Chen
In silico Consciousness: The Goal of Ambient Intelligent Computing
V.K. Murthy, E.V. Krishnamurthy
Gesture Recognition with a 3-D Accelerometer
Jiahui Wu, Gang Pan, Daqing Zhang, Guande Qi, Shijian Li
A universal self-organization mechanism for role-based Organic Computing systems
Florian Nafz, Frank Ortmeier, Hella Seebach, Jan-Philipp Steghöfer, Wolfgang Reif
User Location Estimation
Based on Stereo Audio-Vision
Sang-Hyeon Jin, Dong-Ju Kim, Chee-Hyun Park, Kwang-Seok Hong
Node Localisation in Mobile Ad Hoc Networks Using Double Time Difference of Arrival
HuiYao Zhang, Garry Einicke, Marek Bialkowski, John
Homer
Ranking Method for Optimizing Precision/Recall of Content- Based Image Retrieval
Jun Zhang, Lei Ye
A Novel Relay Encryption
Scheme for Mobile Ad hoc Networks
Duan Hu, Furong Wang, Chen Huang, Chunming Rong
Context-Aware Activity Recognitionthrough a Combination of Ontological and Statistical Reasoning
Daniele Riboni, Claudio Bettini
Towards Self-Organization in Automotive Embedded Systems
Gereon Weiss, Marc Zeller, Dirk Eilers, Rudi Knorr
An Automatic Algorithm of
Dangerous Construction
Warning System
Che-Jen Chen, Lee-Kuo Lin, Wei-Sheng Wu
Distributed WSN Data Stream Mining Based on Fuzzy Clustering
Hakilo Sabit, Adnan Al-Anbuky, Hamid Gholam-Hosseini
Digital Watermarking Method Based on Image Size Invariant Visual Cryptographic Scheme
Shu-Fen Tu, Ching-Sheng Hsu
Underwater Vehicle Noise Source Recognition Using
Structure Dynamic
Adjustable SVM

Zhihua Gao, Kerong Ben, Lilin Cui
Context-Aware Path Planning in Ubiquitous Network
Chiung-Ying Wang a Ren-Hung Hwang
Analyzing the Behavior of an Artificial Hormone System for Task Allocation
Uwe Brinkschulte, Alexander von Renteln
Using the iDTV for Managing Services in the Ubiquitous Computing Environment
Orlewilson B. Maia, Nairon S. Viana, Vicente F. de Lucena
Júnior
Adaptive Determination of
Data Granularity for QoS Constraint Data Gathering in Wireless Sensor Networks
Jun-Zhao Sun
CADBA: A Context-aware Architecture Based on Context Database for Mobile Computing
Been-Chian Chien, Hsin-Chan Tsai, Yuen-Kuei Hsueh
 
    Exploiting Semantics for
Indoor Navigation and User- Tracking

Emmanouil Nikoloudakis,
Manolis Kritsotakis, Antonis Bikakis, Theodore Patkos,
Grigoris Antoniou, Dimitris Plexousakis
Challenges and Evaluation of the State of the Art Routing Protocols for Wireless Mesh Networks
Shivanajay Marwaha, Jadwiga Indulska, Marius Portmann
Human Motion Analysis
Joseph C. Tsai, Tzu-Lin Wong, Hsing-Ying Zhong, Shih-Ming Chang, Timothy K.
Shih
 
        A User Location-Aware Music Playing System
Youhei Katori, Jianhua Ma, Tomomi Kawashima, Runhe Huang, Bernady O. Apduhan, Qun Jin
 

Back to Program at a glance

 


Program for the UIC'09 and ATC'09 sessions

  Wednesday, July 8, 08:30-10:30 Parallel sessions
UIC session 2/7:
Middleware and Services
ATC session 2/5:
Organic & Autonomic Computing
UFirst session 2/6:
Trusted Computing I
USST session 1/2: WiMo session 1/2: CPSC session 2/3:
Social Computing and Networking
Chair: Max Mühlhäuser Chair: Christian Müller-Schloer Chair: Lin-Huang Chang Chair: Shang-Lin Hsieh Chair: Ahmad S. Al-Mogren Chair: Lai Tu
An Efficient Approach to Situation-Aware Service Discovery in Pervasive Service Computing Environments
Stephen.S. Yau, Gautam G. Pohare
A Software Test Case Automated Generation Algorithm Based on Immune Principle
Junmin Ye, Zemei Zhan, Cong Jin, Qingguo Zhang
RFID-Based, Anonymous Authentication Scheme
Hung-Yu Chien, Chieh-Shian Tu, Tzong-Chen Wu
QR Code Data Type Encoding for Ubiquitous Information Transfer Across Different Platforms
Yo-Ping Huang, Yueh-Tsun Chang, Frode Eika Sandnes
The Clustering Algorithm for Enhancing Network Lifetime in Wireless Sensor Networks
Wibhada Naruephiphat, Chalermpol Charnsripinyo
Expression and Analysis of Emotions: Survey and Experiment
Changrong Yu, Jiehan Zhou, Jukka Riekki
Printing in Ubiquitous Computing Environments
Athanasios Karapantelakis, Alisa Devlic, Mohammad Zarify, Saltanat Khamit
Management Without (Detailed) Models
Alva Couch, Mark Burgess, Marc Chiarini
Trust in Distributed Small Sized Data Centers
Nicolai Kuntze, Carsten Rudolph
Toward a NFC Phone-Driven Context Awareness Smart Environment
Yue-Shan Chang, Yung-Shuan Hung, Ching-Lung Chang, Tong-Ying Juang
On the Use of Anisotropic Mesh Technique (AMT) in Transverse Wave Approach (TWA) for the EM Analysis of Microwave Circuits in Wireless
Applications

Mohamed Ayari, Taoufik Aguili, Helmi Temimi, Henri Baudrand
Social Behavior Association and Influence in Social Networks
Bin Xie, Anup Kumar, Padmanabhan
Ramaswamy, Laurence T. Yang, Sanjuli Agrawal
The Å Publish/Subscribe Framework
Clint Heyer
Formal development of self-organising systems
Graeme Smith, Jeffrey Sanders
An Analysis of Trust Transitivity Taking Base Rate into Account
Touhid Bhuiyan, Audun Jøsang, Yue Xu
Human Activity Inference for Ubiquitous RFID-Based Applications
Jingwen Xiong, Boon-Chong Seet, Judith Symonds
Using HMAC for Error Correction over a Wireless Channel
Natasa Živic, Obaidur Ur Rehman, Christoph Ruland
Hidden Community Mining under the RST/POSL Framework
Hong Feng Lai
Mining and Visualizing Mobile Social Network Based on Bayesian
Probabilistic Model
Jun-Ki Min, Su-Hyung Jang, Sung-Bae Cho
Using Reinforcement Learning for Multi-Policy Optimization in Decentralized Autonomic Systems - An Experimental Evaluation
Ivana Dusparic, Vinny Cahill
Improving Prediction Accuracy Using Entropy Weighting in Collaborative Filtering
Hyeong-Joon Kwon, Tae-Hoon Lee, Jung-Hyun Kim, Kwang-Seok Hong
Embedded Semantics Empowering Context-Aware Pervasive Computing
Ahmet Soylu, Patrick De Causmaecker
Routing Algorithm for Balancing Network Lifetime and Reliable Packet Delivery in Mobile Ad hoc Networks
Wibhada Naruephiphat, Chalermpol Charnsripinyo
Trust Management in Three Generations of Web-Based Social Networks
Guanfeng Liu, Yan Wang, Lei Li
      RSP: A Remote OSGi Service Sharing Scheme
Eunhoe Kim, Kihyun Yun, Jaeyoung Choi
Recurrent Grid Based Voting Approach for Location Estimation in Wireless Sensor Networks
Amit Gupta, Shashikala Tapaswi, Vinod Jain
 

Back to Program at a glance

 


Program for the UIC'09 and ATC'09 sessions

  Wednesday, July 8, 11:00-13:00 Parallel sessions
UIC session 3/7:
Routing and Sensor Networks
ATC session 3/5:
Trusted Computing and WSNs
UFirst session 3/6:
Trusted Computing II
USST session 2/2: WiMo session 2/2: CPSC session 3/3:
Cyber Physical Systems, Computational and Network System
Chair: Laurence Yang Chair: Juan Gonzales Nieto Chair: Been-Chian Chien Chair: Yue-Shan Chang Chair: Karoly Farkas Chair: Jiaping Liao
SMSR: A Scalable Multipath Source Routing Protocol for Wireless Sensor Networks
Sutaek Oh, Dongkyun Kim, Hyunwoo Kang, Hong-Jong Jeong
SAConf: Semantic Attestation of Software Configurations
Hua Wang, Yao Guo, Xiangqun Chen
Trust Management in Swarm-Based Autonomic Computing Systems
Wendy M. Maiden, Jereme N. Haack, Glenn A. Fink, David McKinnon, Errin W. Fulp
A Level-Based Energy Efficiency Clustering Approach for Wireless Sensor Networks
Hung-Chi Chu, Ying-
Hsiang Liao, Lin-Huang
Chang, Fang-Lin Chao
Optimizing Wireless Channels through a Push-Based System
Ahmad S. Al-Mogren
Measurement and Feedback Scheme for CAC in Cellular Networks
Hao Wang, Zhe Guo, Jialun Huang, Lai Tu
A Framework to Calibrate a MEMS Sensor Network
Kahina Boutoustous, Eugen Dedu, Julien Bourgeois
ALOPA: Authorization Logic for Property Attestation in Trusted Platforms
Aarthi Nagarajan, Vijay Varadharajan and Michael Hitchens
50 Years of Isolation
Nuwan A. Goonasekera, William J. Caelli, Tony Sahama
Mobility Management of
VoIP Services Using SCTP Handoff Mechanism

Lin-Huang Chang, Po-
Hsun Huang, Hung-Chi Chu, Huai-Hsinh Tsai
Effective Top-down Clustering Algorithms for Location Database Systems
Kwang-Jo Lee, Jin-Woo Song, Sung-Bong Yang
Joint Optimal Congestion Control and Channel Assignment for Multi-Radio Multi-Channel Wireless Networks in Cyber-Physical Systems
Kewei Li, Qingwei Liu, Furong Wang, Xu Xie
Application Domain Driven Data Visualisation Framework for Wireless Sensor Networks
Mohammad Hammoudeh, Robert Newman, Christopher Dennett, Sarah Mount
Employed BPN to multi-sensors data fusion for environment monitoring services
Wen-Tsai Sung
Deriving a Good Trade-off Between System Availability and Time Redundancy
Nils Müllner, Abhishek Dhama Oliver Theel
The Steady Clustering Scheme for Heterogeneous
Wireless Sensor Networks
Jiun-Jian Liaw, Chen-Yi Dai, Yi-Jie Wang
Comparison of Service Management Architectures in MANETs
Károly Farkas
Mobile Network Optimization Using Fuzzy Case-Based Reasoning for GSM
Zeng Ma, Jun Hu, Shi Zhao, Jialun Huang
Hybrid Bluetooth Scatternet Routing
Karl E. Persson, D. Manivannan
Argus: A Light-Weighted Secure Localization Scheme for Sensor Networks
Wen Tao Zhu, Yang Xiang
Multidimensional Monitoring of Computer Systems
Marcin Krol, Janusz Sosnowski
An Image Copyright Protection Scheme with Tamper Detection Capability
Shang-Lin Hsieh, Chung-Ping Yeh, I-Ju Tsai
Wireless Sensor Networks
Performance Measurements and Monitoring
Yaqoob J. AL-Raeisi, Nazar Elfadil
A Distributed IPS Model Based on Neighbor Distance
Jian Zhang, Wanhua Cao, Huan Zhang, Li Feng, Duan Hu
          On-line Fault Diagnosis Model of the Hydropower Units Based on MAS
Jiaping Liao, Bo Fu, Yu Chen
          Synchronized Multi-Channel Cognitive MAC Protocol with Efficient Solutions for Second Spectrum Access
Sarah Eljack, Benxiong Huang, Lai Tu, Peng Zhang

Back to Program at a glance

 

  Wednesday, July 8, 14:00-15:30 UIC/ATC Panel
Chairs: Christian Müller-Schloer, Max Mühlhäuser
Do we really need autonomous Ubiquitous Systems?

Panelists
Prof. Neil Bergmann, University of Queensland, Australia
Prof. Yo-Ping Huang, Natl. Taipei University of Technology Taiwan
Prof. Peter Lindsay, University of Queensland, Australia
Prof. Wolfgang Reif, University of Augsburg, Germany
Prof. Hartmut Schmeck, KIT/University of Karlsruhe, Germany
Prof. Stephen Yau, Arizona State University, U.S.A.

Back to Program at a glance

  Wednesday, July 8, 15:30-15:45 UIC-2010/ATC-2010 Announcement
Chairs: Daqing Zhang, Zhiwen Yu


Back to Program at a glance

  Wednesday, July 8, 16:15-17:15 ICA-IN-WIRELESS Invited talk
Chair: Shivanajay Marwaha
Scheduling and Data Management Techniques in Wireless Mesh Networks: A Cross-layer Approach
Assoc/Prof Mieso Denko, University of Guelph, Canada

Back to Program at a glance

 


Program for the UIC'09 and ATC'09 sessions

  Thursday, July 9, 09:00-11:00 Parallel sessions
UIC session 4/7:
Ubiquitous Networks and Devices
ATC session 4/5:
Trusted Computing I
UFirst session 4/6:
Ubiquitous Computing and Applications I
CPI session 1/3:
Service Oriented Architecture, Ubiquitous Technologies and Services
MANS session 1/3:
Multidisciplinary Models for Autonomous Networks and Systems
CTC session 1/3:
Profiling
Chair: Zhiwen Yu Chair: Wolfgang Reif Chair: Mieso Denko Chair: Chu-Sing Yang Chair: Jiehan Zhou Chair: Paul Watters
Self-Estimation of Neighborhood Density for Mobile Wireless Nodes
Junji Hamada, Akira Uchiyama, Hirozumi Yamaguchi, Shinji Kusumoto, Teruo Higashino
A Methodology towards Usable Trust Management
Zheng Yan, Valtteri Niemi
MoWeT: A Configurable
Framework to Support Ubiquitous Location-Aware Applications
Ugo Barchetti, Alberto
Bucciero, Tania A. De
Benedittis, Francesca
Macchia, Luca Mainetti, Antonio Tamborino
Context-awareness Handoff Planning in Ubiquitous Network
Hsiao-Yun Huang, Chiung-Ying Wang, Ren-Hung Hwang
4-MASCLE - Improved Coverage Aware Clustering with Self Healing Abilities
Jakob Salzmann, Ralf
Behnke, Martin Gag, Dirk Timmermann
A Preliminary Profiling of
Internet Money Mules: An
Australian Perspective
Manuel Aston, Stephen McCombie, Ben Reardon, Paul Watters
MeshVision: An Adaptive Wireless Mesh Network Video Surveillance
System
Peizhao Hu, Ryan Wishart, Jimmy Ti, Marius Portmann, Jadwiga Indulska
Formalizing Trust Based on Usage Behaviours for
Mobile Applications
Zheng Yan, Rong Yan
Ubiquitous Computing and Time Dimension
Mauro Marcelo Mattos
A Grid-Based Distributed
Computing Environment
for Automatic Concept Extraction and Content Supporting Service

Chih-Ming Wang, Ming-Chao Chiang, Chu-Sing Yang
Frontier Research on Pervasive Emotion Computing
Jiehan Zhou, Changrong Yu, Jukka Riekki
Using Differencing to Increase Distinctiveness for Phishing Website Clustering
Robert Layton, Simon
Brown, Paul Watters
SDEC: A P2P Semantic Distance Embedding Based on Virtual
Coordinate System
Yufeng Wang, Akihiro Nakao, Jianhua Ma
Fuzzy Regression Based Trust Prediction in Service-Oriented Applications
Lei Li, Yan Wang, Vijay Varadharajan
An Open Framework for
Distributed Context Management in Ubiquitous Environment
Jun-Hong Lu, Chiung-Ying Wang, Ren-Hung Hwang
Correspondence Analysis
to Screening the Implementation of One Village One Product Programs in Taiwan
Hua-Kai Chiou, Gia-Shie Liu, Yen-Wen Wang, Tse-Jung Chen
A Random Group Mobility Model for Mobile Networks
Lai Tu, Fan Zhang, Furong Wang, Xinmei Wang
Detecting Phishing Emails Using Hybrid Features
Liping Ma, Bahadorrezda
Ofoghi, Paul Watters,
Simon Brown
Dynamic Integration of Zigbee Devices into Residential Gateways for Ubiquitous Home Services
Young-Guk Ha
Theories of Trust for Communication Protocols
Ji Ma, Mehmet Orgun, Abdul Sattar
Context and Adaptivity in
Context-Aware Pervasive
Computing Environments
Ahmet Soylu, Patrick De Causmaecker, Piet Desmet
Multiple Objective Compromise Optimization
Method to Analyze
the Strategies of Nanotechnology in Taiwan
Hua-Kai Chiou, Gia-Shie Liu, Gwo-Hshiung Tzeng,
Chien-Pin Wang
  Spam and Social Effects
Man Qi, Denis Edgar-Nevill, Reza Mousoli
      Limiting Sybil Attacks on
Bayesian Trust Models in
Open SOA Environments
Sebastian Ries, Erwin Aitenbichler
   

Back to Program at a glance

 


Program for the UIC'09 and ATC'09 sessions

  Thursday, July 9, 11:30-13:30 Parallel sessions
UIC session 5/7:
Location-Based Services
ATC session 5/5:
Trusted Computing II
UFirst session 5/6:
Ubiquitous Computing and Applications II
CPI session 2/3:
Multimedia Technologies and Smart Objects
MANS session 2/3:
Interdisciplinary and Integrated System Design and Implementation
CTC session 2/3:
Technical Countermeasures
Chair: Daqing Zhang Chair: Zheng Yan Chair: Jianhua Ma Chair: Andrew Chiou Chair: Yufeng Wang Chair: Ben Reardon
Fine-Grained Evaluation of Local Positioning Systems for Specific Target Applications
Erwin Aitenbichler, Fernando Lyardet, Aristotelis Hadjakos, Max Mühlhäuser
Toward Trustworthy Semantic Web Service Discovery and Selection
Jing Li, Dianfu Ma, Jun Han, Xiang Long
A Situated Display for Local Community Participation:
The Design and Use of Nnub
Fiona Redhead, Andrew Dekker, Margot Brereton
Toward an OSGi-Based Infrastructure for Smart Home Applications
Szu-Chi Wang, Kai-Peng Chen, Tung-Yen Lu, Chi-Yi Lin
Comparing and Evaluating Collection Strategies in Trust-Based Reputation Systems in Distributed Environments
Bo Zong, Feng Xu, Jing Pan, Jian Lv
A Trust Enhanced Email Application Using Trusted Computing
Julian Jang, Surya Nepal, John Zic
Indoor Positioning System Using Beacon Devices for Practical Pedestrian Navigation on Mobile Phone
Yutaka Inoue, Akio Sashima, Koichi Kurumatani

Trust and Reputation Policy-Based Mechanisms for Self-Protection in Autonomic Communications
Martin Serrano, John Strassner, Sven van der Meer, Stefano De Paoli,
Aphra Kerr, Cristiano Storni

Adaptive Interface for Collaborative Environments: AICE
Youssef Roummieh, Parisa Ghodous
Bird Species Recognition by Wavelet Transformation of a Section of Birdsong
Chih-Hsun Chou, Pang-Hsin Liu
An Improved DSSS-Based Flow Marking Technique for Anonymous Communication Traceback
Lu Zhang, Junzhou Luo, Ming Yang
Understanding the Construction Mechanism of Botnets
Xuefeng Li, Haixin Duan, Wu Liu, Jianping Wu
NavTag: An Inter-working Framework Based on Tags for Symbolic Location Coordinates for Smart Spaces
V. Stirbu
  Human Activity Recognizer for Mobile Devices with Multiple Sensors
Kenta Cho, Naoki Iketani, Hisao Setoguchi, Masanori Hattori
Fast Intra/Inter Mode Decision for H.264/AVC Using the Spatial-Temporal Prediction Scheme
Cheng-Chang Lien, Chih-Chang Chen, Yang-Kai Chang
Enhancing Cooperative Behavior for Online Reputation Systems by Group Selection
Yizhi Ren, Mingchu Li, Yongrui Cui, Cheng Guo, Kouichi Sakurai
IPGroupRep: A Novel Reputation Based System for Anti-Spam
Hong Zhang, Haixin Duan, Wu Liu, Jianping Wu
Mobile Web 2.0-Oriented Five Senses Multimedia Technology with
LBS-Based Intelligent Agent
Jung-Hyun Kim, Hyeong-Joon Kwon, Hyo-Haeng Lee, Kwang-Seok Hong
  An Event-driven Context Model in Elderly Health Monitoring
Yuanyuan Cao, Linmi Tao, Guangyou Xu
Urban Search and Rescue Robots in Test Arenas: Scaled Modeling of Disasters to Test Intelligent Robot Prototyping
Andrew Chiou, Carol Wynn
  H6Proxy: ICMPv6 Weakness Analysis and Implementation of IPv6 Attacking Test Proxy
Liu Wu, Duan Hai-xin, Lin Tao, Li Xing, Wu Jian-ping
      Augmented Isometric Board Games: Linking the Physical Playing Field
with Intelligent Non-Player Feedback
Andrew Chiou
   

Back to Program at a glance

 


Program for the UIC'09 and ATC'09 sessions

  Thursday, July 9, 14:30-16:30 Parallel sessions
UIC session 7/7:
Ubiquitous Intelligence
UIC session 6/7:
Security and Privacy
UFirst session 1/6:
Wireless and Sensor Networks
CPI session 3/3:
Wireless Sensor Networks, Ad-Hoc Networks and RFID
MANS session 3/3:
Novel Interdisciplinary System Design
CTC session 3/3:
Scams and Crime
Chair: Jianhua Ma Chair: Marius Portmann Chair: Judith Symonds Chair: Robert C. H. Hsu Chair: Yizhi Ren Chair: Stephen McCombie
Using RFID to Overcome Inventory Control Challenges: A Proof of
Concept
Dane Hamilton, Katina Michael, Samuel Fosso Wamba
Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks
Honglong Chen, Wei Lou, Zhi Wang
An Efficient Mechanism for Mobile Target Tracking in Grid-Based Wireless Sensor Networks
Ying-Hong Wang, Kuo-Feng Huang, Ting-Wei Chang
A TCP Performance
Improved mechanism for
Wireless Network
Ling Xiao, Zhitang Li, Na Zhao
Decentralized Task Allocation in an Organic Real-Time Middleware - An Auction-Based Approach
Manuel Nickschas, Uwe Brinkschulte
The Case for a Consistent
Cyberscam Classification
Framework (CCCF)
Amber Stabek, Simon Brown, Paul Watters
Anticipative Wrap-Around Inquiry Method towards Efficient RFID Tag Identification
Ching-Hsien Hsu, Wei-Jau Chen, Yeh-Ching Chung

Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings
Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li

Space Time Codes to Achieve Generalized Optimal Diversity for Higher Rate Wireless Networking
Jia Hou
An Adaptive Anti-Collision Algorithm towards Efficient RFID Tag Identification
Bo-Yu Chen, Ching-Hsien Hsu, Kuan-Ching Li
The Optimal Choice by Resource Consumers in Grid Market
Laiping Zhao, Mingchu
Li, Weifeng Sun, Kouichi Sakurai, Yizhi Ren
Data Loss in the British Government: A Bounty of
Credentials for Organised Crime
Paul Watters
A Probabilistic Semantic Based Mixture Collaborative Filtering
Linkai Weng, Yaoxue Zhang, Yuezhi Zhou, Laurance T. Yang, Pengwei Tian, Ming Zhong
Implicit User Re-authentication for Mobile Devices
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheuermann
Biologically Inspired Ant-Based Routing In Mobile Ad hoc Networks (MANET): A Survey
Shivanajay Marwaha, Jadwiga Indulska and Marius Portmann
An Accelerometer Based Approach for Indoor Localization
Ching-Hsien Hsu, Chia-Hao Yu
Secure Information Flow by Model Checking Pushdown System
Cong Sun, Liyong Tang,
Zhong Chen
 
  Lattice Based Privacy Negotiation Rule Generation for Context-Aware Service
Yonnim Lee, Debashis Sarangi, Ohbyung Kwon, Min-Yong Kim
A Routing Algorithm Based on Mobile Agent for Mine Monitoring
Qianping Wang, Yan Zhao, Yu’e Su, Hongmei Liao, Ke
Wang
ConPlan: A Context-Aware Ad-hoc Meeting Plan Program
Ling Feng
   
      Energy-Efficient Structuralized Clustering for Sensor-Based Cyber Physical Systems
Jierui Cao, Huan Li
   

Back to Program at a glance