Atnaujinkite slapukų nuostatas

El. knyga: Ubiquitous Intelligence and Computing: 6th International Conference, UIC 2009, Brisbane, Australia, July 7-9, 2009, Proceedings

Edited by , Edited by , Edited by , Edited by
  • Formatas: PDF+DRM
  • Serija: Lecture Notes in Computer Science 5585
  • Išleidimo metai: 06-Jul-2009
  • Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Kalba: eng
  • ISBN-13: 9783642028304
  • Formatas: PDF+DRM
  • Serija: Lecture Notes in Computer Science 5585
  • Išleidimo metai: 06-Jul-2009
  • Leidėjas: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Kalba: eng
  • ISBN-13: 9783642028304

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

This volume contains the proceedings of UIC 2009, the 6th International C- ference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces. The UIC 2009 conference was technically co-sponsored by the IEEE and the IEEE Computer Society Technical Committee on Scalable Computing. The conference was also sponsored by the Australian Centre of - cellence in Information and Communication Technologies (NICTA). UIC 2009 was accompanied by six workshops on a variety of research challenges within the area of ubiquitous intelligence and computing. The conference was held in Brisbane, Australia, July 79, 2009. The event was the sixth meeting of this conference series. USW 2005 (First International Workshop on Ubiquitous Smart World), held in March 2005 in Taiwan, was the ?rst event in the series. This event was followed by UISW 2005 (Second International Symposium on Ubiquitous Intelligence and Smart Worlds) held in December 2005 in Japan. Since 2006, the conference has been held annually under the name UIC (International Conference on Ubiquitous Intelligence and Computing). UIC 2006 was held in September 2006 in Wuhan andThreeGorges,China,followedbyUIC2007heldinJuly2007inHongKong, and UIC 2008 held in June 2008 in Oslo, Norway. Ubiquitous sensors,computers, networksand informationare paving the way towardasmartworldinwhichcomputationalintelligenceisdistributedthrou- out the physical environment to provide reliable and relevant services to people.
Keynote Speeches
Distributed Computing in Opportunistic Environments (Abstract)
1(1)
Mohan Kumar
Web of Things as a Framework for Ubiquitous Intelligence and Computing
2(12)
Tharam S. Dillon
Alex Talevski
Vidyasagar Potdar
Elizabeth Chang
Context Awareness
Inferring Human Interactions in Meetings: A Multimodal Approach
14(11)
Zhiwen Yu
Zhiyong Yu
Yusa Ko
Xingshe Zhou
Yuichi Nakamura
Gesture Recognition with a 3-D Accelerometer
25(14)
Jiahui Wu
Gang Pan
Daqing Zhang
Guande Qi
Shijian Li
Context-Aware Activity Recognition through a Combination of Ontological and Statistical Reasoning
39(15)
Daniele Riboni
Claudio Bettini
Context-Aware Path Planning in Ubiquitous Network
54(14)
Chiung-Ying Wang
Ren-Hung Hwang
Middleware and Services
An Efficient Approach to Situation-Aware Service Discovery in Pervasive Service Computing Environments
68(15)
Stephen S. Yau
Gautam G. Pohare
Printing in Ubiquitous Computing Environments
83(16)
Athanasios Karapantelakis
Alisa Devlic
Mohammad Zarify
Saltanat Khamit
The A Publish/Subscribe Framework
99(12)
Clint Heyer
Mining and Visualizing Mobile Social Network Based on Bayesian Probabilistic Model
111(10)
Jun-Ki Min
Su-Hyung Jang
Sung-Bae Cho
Routing and Sensor Networks
SMSR: A Scalable Multipath Source Routing Protocol for Wireless Sensor Networks
121(15)
Sutaek Oh
Dongkyun Kim
Hyunwoo Kang
Hong-Jong Jeong
A Framework to Calibrate a MEMS Sensor Network
136(14)
Kahina Boutoustous
Eugen Dedu
Julien Bourgeois
Application Domain Driven Data Visualisation Framework for Wireless Sensor Networks
150(13)
Mohammad Hammoudeh
Robert Newman
Christopher Dennett
Sarah Mount
Hybrid Bluetooth Scatternet Routing
163(15)
Karl E. Persson
D. Manivannan
Ubiquitous Networks and Devices
Self-estimation of Neighborhood Density for Mobile Wireless Nodes
178(15)
Junji Hamada
Akira Uchiyama
Hirozumi Yamaguchi
Shinji Kusumoto
Teruo Higashino
MeshVision: An Adaptive Wireless Mesh Network Video Surveillance System
193(15)
Peizhao Hu
Ryan Wishart
Jimmy Ti
Marius Portmann
Jadwiga Indulska
SDEC: A P2P Semantic Distance Embedding Based on Virtual Coordinate System
208(13)
Yufeng Wang
Akihiro Nakao
Jianhua Ma
Dynamic Integration of Zigbee Devices into Residential Gateways for Ubiquitous Home Services
221(15)
Young-Guk Ha
Location-Based Services
Fine-Grained Evaluation of Local Positioning Systems for Specific Target Applications
236(15)
Erwin Aitenbichler
Fernando Lyardet
Aristotelis Hadjakos
Max Muhlhauser
Indoor Positioning System Using Beacon Devices for Practical Pedestrian Navigation on Mobile Phone
251(15)
Yutaka Inoue
Akio Sashima
Koichi Kurumatani
NavTag: An Inter-working Framework Based on Tags for Symbolic Location Coordinates for Smart Spaces
266(15)
Vlad Stirbu
Mobile Web 2.0-Oriented Five Senses Multimedia Technology with LBS-Based Intelligent Agent
281(15)
Jung-Hyun Kim
Hyeong-Joon Kwon
Hyo-Haeng Lee
Kwang-Seok Hong
Security and Privacy
Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks
296(14)
Honglong Chen
Wei Lou
Zhi Wang
Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings
310(15)
Hua Guo
Yi Mu
Xiyong Zhang
Zhoujun Li
Implicit User Re-authentication for Mobile Devices
325(15)
Sausan Yazji
Xi Chen
Robert P. Dick
Peter Scheuermann
Lattice Based Privacy Negotiation Rule Generation for Context-Aware Service
340(13)
Yonnim Lee
Debashis Sarangi
Ohbyung Kwon
Min-Yong Kim
Ubiquitous Intelligence
Using RFID to Overcome Inventory Control Challenges: A Proof of Concept
353(14)
Dane Hamilton
Katina Michael
Samuel Fosso Wamba
Anticipative Wrap-Around Inquiry Method towards Efficient RFID Tag Identification
367(10)
Ching-Hsien Hsu
Wei-Jau Chen
Yeh-Ching Chung
A Probabilistic Semantic Based Mixture Collaborative Filtering
377(12)
Linkai Weng
Yaoxue Zhang
Yuezhi Zhou
Laurance T. Yang
Pengwei Tian
Ming Zhong
Author Index 389