UIC-09 and ATC-09 Program at a glance
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
Program for the UIC'09 and ATC'09
![]() |
Chair: Jadwiga Indulska (General chair, UIC'09/ATC'09) |
Terry Caelli (Director, NICTA Queensland Research Lab) |
![]() |
Chair: Jadwiga Indulska |
Web of Things as a Framework for Ubiquitous Intelligence and Computing Professor Tharam S. Dillon, Curtin University of Technology, Australia |
![]() |
Chair: Juan Gonzales Nieto |
Design for Trust in Ambient & Ubiquitous Computing Professor Jean Camp, Indiana University, USA |
![]() |
Chair: Jadwiga Indulska |
![]() |
Chair: Marius Portmann |
Distributed Computing in Opportunistic Environments Professor Mohan Kumar, The University of Texas at Arlington, USA |
Program for the UIC'09 and ATC'09 sessions
![]() |
|||||
UIC session 1/7: Context Awareness |
ATC session 1/5: Organic & Autonomic Computing |
UFirst session 6/6: Smart Environments and Autonomous Systems |
ICA session 1/1: | PerMedia session 1/1: | CPSC session 1/3: Cyber Intelligence and Safety |
Chair: Stephen Yau | Chair: Hartmut Schmeck | Chair: Ren-Hung Hwang | Chair: Dhammika Jayalath | Chair: Lei Ye | Chair: Furong Wang |
Inferring Human Interactions in Meetings: A Multimodal Approach |
Towards an Organic Network Control System |
Agenda Driven Home Automation - Towards High Level Context Aware Systems | Cooperative Routing for Wireless Networks with Multiple Shared Channels | RFID-Based Personalized Behavior Modeling | In silico Consciousness: The Goal of Ambient Intelligent Computing |
Gesture Recognition with a 3-D Accelerometer | A universal self-organization mechanism for role-based
Organic Computing systems |
User Location Estimation Based on Stereo Audio-Vision |
Node Localisation in Mobile Ad Hoc Networks Using Double Time Difference of Arrival HuiYao Zhang, Garry Einicke, Marek Bialkowski, John Homer |
Ranking Method for Optimizing Precision/Recall of Content- Based Image Retrieval Jun Zhang, Lei Ye |
A Novel Relay Encryption Scheme for Mobile Ad hoc Networks |
Context-Aware Activity Recognitionthrough a Combination of
Ontological and Statistical Reasoning |
Towards
Self-Organization in Automotive Embedded Systems |
An Automatic Algorithm of Dangerous Construction Warning System |
Distributed WSN Data Stream Mining Based on Fuzzy Clustering |
Digital Watermarking Method Based on Image Size Invariant Visual Cryptographic Scheme | Underwater Vehicle Noise Source Recognition Using Structure Dynamic Adjustable SVM |
Context-Aware Path Planning in Ubiquitous Network | Analyzing the Behavior of an
Artificial Hormone System for Task Allocation |
Using the iDTV for Managing Services in the Ubiquitous Computing Environment |
Adaptive Determination of Data Granularity for QoS Constraint Data Gathering in Wireless Sensor Networks |
CADBA: A Context-aware Architecture Based on Context Database for Mobile Computing | |
Exploiting Semantics for Indoor Navigation and User- Tracking |
Challenges and Evaluation of the State of the Art Routing Protocols for Wireless
Mesh Networks |
Human Motion Analysis |
|||
A User Location-Aware Music Playing System Youhei Katori, |
Program for the UIC'09 and ATC'09 sessions
![]() |
|||||
UIC session 2/7: Middleware and Services |
ATC session 2/5: Organic & Autonomic Computing |
UFirst session 2/6: Trusted Computing I |
USST session 1/2: | WiMo session 1/2: | CPSC session 2/3: Social Computing and Networking |
Chair: Max Mühlhäuser | Chair: Christian Müller-Schloer | Chair: Lin-Huang Chang | Chair: Shang-Lin Hsieh | Chair: Ahmad S. Al-Mogren | Chair: Lai Tu |
An Efficient Approach to Situation-Aware Service Discovery in
Pervasive Service Computing Environments |
A Software Test Case
Automated Generation Algorithm Based on Immune Principle |
RFID-Based, Anonymous Authentication Scheme | QR Code Data Type Encoding for Ubiquitous Information Transfer Across Different Platforms | The Clustering Algorithm for Enhancing Network Lifetime in Wireless Sensor Networks | Expression and Analysis of Emotions: Survey and Experiment |
Printing in Ubiquitous Computing Environments | Management Without
(Detailed) Models |
Trust in Distributed Small Sized Data Centers | Toward a NFC Phone-Driven Context Awareness Smart Environment |
On the Use of Anisotropic Mesh Technique (AMT) in Transverse Wave Approach (TWA) for the EM Analysis of Microwave Circuits in Wireless Applications |
Social Behavior Association and Influence in Social Networks |
The Å Publish/Subscribe Framework |
Formal development of self-organising
systems |
An Analysis of Trust Transitivity Taking Base Rate into Account |
Human Activity Inference for Ubiquitous RFID-Based Applications |
Using HMAC for Error Correction over a Wireless Channel | Hidden Community Mining under the RST/POSL Framework |
Mining and Visualizing Mobile Social Network Based on Bayesian Probabilistic Model |
Using Reinforcement Learning for
Multi-Policy Optimization in Decentralized Autonomic Systems - An
Experimental Evaluation |
Improving Prediction Accuracy Using Entropy Weighting in Collaborative Filtering |
Embedded Semantics Empowering Context-Aware Pervasive Computing |
Routing Algorithm for Balancing Network Lifetime and Reliable Packet Delivery in Mobile Ad hoc Networks | Trust Management in Three Generations of Web-Based Social Networks |
RSP: A Remote OSGi Service Sharing Scheme |
Recurrent Grid Based Voting Approach for Location Estimation in Wireless Sensor Networks |
Program for the UIC'09 and ATC'09 sessions
![]() |
|||||
UIC session 3/7: Routing and Sensor Networks |
ATC session 3/5: Trusted Computing and WSNs |
UFirst session 3/6: Trusted Computing II |
USST session 2/2: | WiMo session 2/2: | CPSC session 3/3: Cyber Physical Systems, Computational and Network System |
Chair: Laurence Yang | Chair: Juan Gonzales Nieto | Chair: Been-Chian Chien | Chair: Yue-Shan Chang | Chair: Karoly Farkas | Chair: Jiaping Liao |
SMSR: A Scalable Multipath Source Routing Protocol for Wireless Sensor Networks |
SAConf: Semantic Attestation of
Software Configurations |
Trust Management in Swarm-Based Autonomic Computing Systems | A Level-Based Energy Efficiency Clustering Approach for Wireless Sensor Networks | Optimizing Wireless Channels through a Push-Based System | Measurement and Feedback Scheme for CAC in Cellular Networks |
A Framework to Calibrate a MEMS Sensor Network | ALOPA: Authorization Logic for Property Attestation in Trusted Platforms |
50 Years of Isolation | Mobility Management of VoIP Services Using SCTP Handoff Mechanism |
Effective Top-down Clustering Algorithms for Location Database Systems | Joint Optimal Congestion Control and Channel Assignment for Multi-Radio Multi-Channel Wireless Networks in Cyber-Physical Systems |
Application Domain Driven Data Visualisation Framework for Wireless
Sensor Networks |
Employed BPN to multi-sensors data fusion for environment
monitoring services |
Deriving a Good Trade-off Between System Availability and Time Redundancy |
The Steady Clustering Scheme for Heterogeneous Wireless Sensor Networks |
Comparison of Service Management Architectures in MANETs | Mobile Network Optimization Using Fuzzy Case-Based Reasoning for GSM |
Hybrid Bluetooth Scatternet Routing | Argus: A Light-Weighted Secure Localization
Scheme for Sensor Networks |
Multidimensional Monitoring of Computer Systems |
An Image Copyright Protection Scheme with Tamper Detection Capability |
Wireless Sensor Networks Performance Measurements and Monitoring |
A Distributed IPS Model Based on Neighbor Distance |
On-line Fault Diagnosis Model of the Hydropower Units Based on MAS |
|||||
Synchronized Multi-Channel Cognitive MAC Protocol with Efficient Solutions for Second Spectrum Access |
![]() |
Chairs: Christian Müller-Schloer, Max Mühlhäuser |
Do we really need autonomous Ubiquitous Systems? Panelists |
![]() |
Chairs: Daqing Zhang, Zhiwen Yu |
|
![]() |
Chair: Shivanajay Marwaha |
Scheduling and Data Management Techniques in Wireless Mesh Networks: A Cross-layer Approach Assoc/Prof Mieso Denko, University of Guelph, Canada |
Program for the UIC'09 and ATC'09 sessions
![]() |
|||||
UIC session 4/7: Ubiquitous Networks and Devices |
ATC session 4/5: Trusted Computing I |
UFirst session 4/6: Ubiquitous Computing and Applications I |
CPI session 1/3: Service Oriented Architecture, Ubiquitous Technologies and Services |
MANS session 1/3: Multidisciplinary Models for Autonomous Networks and Systems |
CTC session 1/3: Profiling |
Chair: Zhiwen Yu | Chair: Wolfgang Reif | Chair: Mieso Denko | Chair: Chu-Sing Yang | Chair: Jiehan Zhou | Chair: Paul Watters |
Self-Estimation of Neighborhood Density for Mobile Wireless Nodes |
A Methodology towards Usable Trust
Management |
MoWeT: A Configurable Framework to Support Ubiquitous Location-Aware Applications |
Context-awareness Handoff Planning in Ubiquitous Network | 4-MASCLE - Improved Coverage Aware Clustering with Self Healing Abilities | A Preliminary Profiling of Internet Money Mules: An Australian Perspective |
MeshVision: An Adaptive Wireless Mesh Network Video Surveillance System |
Formalizing Trust Based on Usage Behaviours for Mobile Applications |
Ubiquitous Computing and Time Dimension | A Grid-Based Distributed Computing Environment for Automatic Concept Extraction and Content Supporting Service |
Frontier Research on Pervasive Emotion Computing | Using Differencing to Increase Distinctiveness for Phishing Website Clustering |
SDEC: A P2P Semantic Distance Embedding Based on Virtual Coordinate System |
Fuzzy Regression Based Trust
Prediction in Service-Oriented Applications |
An Open Framework for Distributed Context Management in Ubiquitous Environment |
Correspondence Analysis to Screening the Implementation of One Village One Product Programs in Taiwan |
A Random Group Mobility Model for Mobile Networks | Detecting Phishing Emails Using Hybrid Features |
Dynamic Integration of Zigbee Devices into Residential Gateways for Ubiquitous Home Services | Theories of Trust for
Communication Protocols |
Context and Adaptivity in Context-Aware Pervasive Computing Environments |
Multiple Objective Compromise Optimization Method to Analyze the Strategies of Nanotechnology in Taiwan |
Spam and Social Effects |
|
Limiting Sybil Attacks on Bayesian Trust Models in Open SOA Environments |
Program for the UIC'09 and ATC'09 sessions
![]() |
|||||
UIC session 5/7: Location-Based Services |
ATC session 5/5: Trusted Computing II |
UFirst session 5/6: Ubiquitous Computing and Applications II |
CPI session 2/3: Multimedia Technologies and Smart Objects |
MANS session 2/3: Interdisciplinary and Integrated System Design and Implementation |
CTC session 2/3: Technical Countermeasures |
Chair: Daqing Zhang | Chair: Zheng Yan | Chair: Jianhua Ma | Chair: Andrew Chiou | Chair: Yufeng Wang | Chair: Ben Reardon |
Fine-Grained Evaluation of Local Positioning Systems for Specific Target Applications |
Toward Trustworthy Semantic
Web Service Discovery and Selection |
A Situated Display for Local Community Participation: The Design and Use of Nnub |
Toward an OSGi-Based Infrastructure for Smart Home Applications | Comparing and Evaluating Collection Strategies in Trust-Based Reputation Systems in Distributed Environments | A Trust Enhanced Email Application Using Trusted Computing |
Indoor Positioning System Using Beacon Devices for Practical Pedestrian Navigation on Mobile Phone | Trust and Reputation Policy-Based
Mechanisms for Self-Protection in Autonomic Communications |
Adaptive Interface for Collaborative Environments: AICE | Bird Species Recognition by Wavelet Transformation of a Section of Birdsong |
An Improved DSSS-Based Flow Marking Technique for Anonymous Communication Traceback | Understanding the Construction Mechanism of Botnets |
NavTag: An Inter-working Framework Based on Tags for Symbolic
Location Coordinates for Smart Spaces |
Human Activity Recognizer for Mobile Devices with Multiple Sensors |
Fast Intra/Inter Mode Decision for H.264/AVC Using the Spatial-Temporal Prediction Scheme |
Enhancing Cooperative Behavior for Online Reputation Systems by Group Selection | IPGroupRep: A Novel Reputation Based System for Anti-Spam |
|
Mobile Web 2.0-Oriented Five Senses Multimedia Technology with LBS-Based Intelligent Agent |
An Event-driven Context Model in Elderly Health Monitoring |
Urban Search and Rescue Robots in Test Arenas: Scaled Modeling of Disasters to Test Intelligent Robot Prototyping |
H6Proxy: ICMPv6 Weakness Analysis and Implementation of IPv6 Attacking Test Proxy |
||
Augmented Isometric Board Games: Linking the Physical Playing Field with Intelligent Non-Player Feedback |
Program for the UIC'09 and ATC'09 sessions
![]() |
|||||
UIC session 7/7: Ubiquitous Intelligence |
UIC session 6/7: Security and Privacy |
UFirst session 1/6: Wireless and Sensor Networks |
CPI session 3/3: Wireless Sensor Networks, Ad-Hoc Networks and RFID |
MANS session 3/3: Novel Interdisciplinary System Design |
CTC session 3/3: Scams and Crime |
Chair: Jianhua Ma | Chair: Marius Portmann | Chair: Judith Symonds | Chair: Robert C. H. Hsu | Chair: Yizhi Ren | Chair: Stephen McCombie |
Using RFID to Overcome Inventory Control Challenges: A Proof of Concept |
Conflicting-Set-Based Wormhole Attack Resistant Localization in
Wireless Sensor Networks |
An Efficient Mechanism for Mobile Target Tracking in Grid-Based Wireless Sensor Networks | A TCP Performance Improved mechanism for Wireless Network |
Decentralized Task Allocation in an Organic Real-Time Middleware - An Auction-Based Approach | The Case for a Consistent Cyberscam Classification Framework (CCCF) |
Anticipative Wrap-Around Inquiry Method towards Efficient RFID Tag Identification | Novel and Efficient Identity-Based Authenticated Key Agreement
Protocols from Weil Pairings |
Space Time Codes to Achieve Generalized Optimal Diversity for Higher Rate Wireless Networking | An Adaptive Anti-Collision Algorithm towards Efficient RFID Tag Identification |
The Optimal Choice by Resource Consumers in Grid Market | Data Loss in the British Government: A Bounty of Credentials for Organised Crime |
A Probabilistic Semantic Based Mixture Collaborative Filtering |
Implicit User Re-authentication for Mobile Devices | Biologically Inspired Ant-Based Routing In Mobile Ad hoc Networks (MANET): A
Survey |
An Accelerometer Based Approach for Indoor Localization |
Secure Information Flow by Model Checking Pushdown System | |
Lattice Based Privacy Negotiation Rule Generation for Context-Aware
Service |
A Routing Algorithm Based on Mobile Agent for Mine Monitoring |
ConPlan: A Context-Aware Ad-hoc Meeting Plan Program |
|||
Energy-Efficient Structuralized Clustering for Sensor-Based Cyber Physical Systems |