default search action
2. ICIS 2009: Seoul, Korea
- Sungwon Sohn, Ling Chen, Soonwook Hwang, Kyungeun Cho, Shigeo Kawata, Kyhyun Um, Franz I. S. Ko, Kae-Dal Kwack, Jong Hyung Lee, Gang Kou, Kiyoshi Nakamura, Alvis Cheuk M. Fong, Patrick C. M. Ma:
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009. ACM International Conference Proceeding Series 403, ACM 2009, ISBN 978-1-60558-710-3 - Kosheek Sewchurran, Elsje Scott:
Learning and making sense of project phenomena in information systems education. 1-8 - Yasuko Kanno, Masato Terada, Hidehiro Yajima, Toshinari Kamamura, Norihisa Doi:
A comparative study on structure of the motivation for information security by security incident experiences. 9-16 - Aika Mukai, Toshiyuki Yamamoto, Makoto J. Hirayama:
A study of correlation between transitions and sound effects in a fairy tale movie. 17-20 - Rogayah Abdul Majid, Nor Laila Md. Noor, Wan Adilah Wan Adnan, Suria Mansor:
A survey on HCI considerations in the software development life cycle: from practitioner's perspective. 21-24 - Dhananjay Singh, Hoon-Jae Lee:
Database design for global patient monitoring applications using WAP. 25-31 - Ahmed Mustafa Mahmoud, Wan Haslina Hassan:
Determinism in speech pitch relation to emotion. 32-37 - Norhaida Abdullah, Mohd Shafry, Mohd Rahim, Ismail Mat Amin:
Measuring fish length from digital images (FiLeDI). 38-43 - Umesh Hodeghatta Rao Xavier, Sanjay Mohapatra:
Mobile technology for irrigation problems in rural India. 44-46 - Shengling Wang, Yong Cui, Ke Xu, Jian-Hui Huang, Dapeng Liu:
Proportional fairness of call blocking probability. 47-52 - Gia Kim, Siu Man Lui:
Relationship of blink, affect, and usability of graph reading tasks. 53-58 - Toshihiko Yamakami:
Star economy in the user generated content: a new perspective for digital ecosystems. 59-62 - Rattiporn Luanrattana, Khin Than Win:
The deployment of PDA accessible clinical-log for medical education in PBL-approach. 63-68 - Wan Norizan Wan Hashim, Nor Laila Md. Noor, Wan Adilah Wan Adnan:
The design of aesthetic interaction: towards a graceful interaction framework. 69-75 - Atif Latif, Muhammad Tanvir Afzal, Patrick Höfler, Anwar Us Saeed, Klaus Tochtermann:
Turning keywords into URIs: simplified user interfaces for exploring linked data. 76-81 - Yu Cheng, Tao Zhang, Song Chen:
VisionSynaptics: a system convert hand-writing and image symbol into computer symbol. 82-85 - A. Murali M. Rao:
Web-enabled user support services system in distance learning. 86-90 - Hyun-Jong Kim, Jeong Yun Kim, Seong Gon Choi:
A method to support multiple interfaces mobile nodes in PMIPv6 domain. 91-96 - Zhao-Zhi Pan, Yu Hong, Jian-Min Yao:
A multiple bayes classification solution to word sense disambiguation. 97-99 - Jianbo Ye, Qingbo Zhang, Guogang Huang:
A multiuser diversity based time-frequency two dimensional adaptive resource allocation algorithm for WiMAX. 100-103 - Alessandra De Paola, Salvatore Gaglio, Giuseppe Lo Re, Marco Ortolani:
An ambient intelligence architecture for extracting knowledge from distributed sensors. 104-109 - Weiping Li:
An analysis of new features for workflow system in the SaaS software. 110-114 - Chin-Hung Wang, Tzu-Chieh Wei, Po-Chin Lee, Chia-Chun Wu:
An improvement of secure authentication scheme with full anonymity for wireless communications. 115-118 - Junmin Zhu:
Approximation for minimum total dominating set. 119-124 - Pham Thi Thu Thuy, Young-Koo Lee, Sungyoung Lee:
DTD2OWL: automatic transforming XML documents into OWL ontology. 125-131 - Weili Li, Lixin Yu:
Efficient line buffer instruction cache scheme with prefetch. 132-135 - Ruey-Ming Chao, Hsien-Chu Wu, Zi-Chun Chen:
Image segmentation by automatic histogram thresholding. 136-141 - Elise de Doncker, Karlis Kaugars, Shujun Li, Haisen S. Li, Yoshimitsu Shimizu, Junpei Fujimoto, Fukuko Yuasa, Tadashi Ishikawa, Nobuyuki Hamaguchi:
Interdisciplinary applications of mathematical modeling. 142-148 - Mangal Sain, Hoon-Jae Lee, Wan-Young Chung:
Middleware in ubiquitous computing system with MedRec architecture. 149-154 - Hong-Hao Chen, Cheng-Chi Lee, Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai:
Multi-level visual secret sharing scheme with smooth-looking. 155-160 - Mahshid S. Ehsaei, Abolfazl Toroghi Haghighat:
Pattern-based planning system for complex environments. 161-167 - Yoon-Ho Cho, Sang-Hyun Park, SangKeun Lee:
PhraseRank for document clustering: reweighting the weight of phrase. 168-174 - Abdul Majid, Yeon Soo Lee:
Predicting lattice constant of cubic perovskites using support vector regression. 175-183 - Oliver Zweigle, René van de Molengraft, Raffaello D'Andrea, Kai Häussermann:
RoboEarth: connecting robots worldwide. 184-191 - Muhammad Usman Khan, Shoab Ahmed Khan:
Social networks identification and analysis using call detail records. 192-196 - Oliver Zweigle, Kai Häussermann, Uwe-Philipp Käppeler, Paul Levi:
Supervised learning algorithm for automatic adaption of situation templates using uncertain data. 197-200 - Vincenza Carchiolo, Alessandro Longheu, Michele Malgeri, Giuseppe Mangioni:
The effect of malicious peers in a gossip-based reputation system. 201-205 - Toshihiko Yamakami:
Foundation-based mobile platform software engineering: implications to convergence to open source software. 206-211 - Toshihiko Yamakami:
An interactivity model of mobile interactive TV: a oneseg case for mobile glue. 212-217 - Youngkon Lee:
Double layered SOA test architecture based on BPA - simulation event. 218-223 - Tzong-Heng Chi, Chia-Chien Lin, Wei-Chen Lin:
Intraorganizational power verified interactive genetic algorithms for the design of logistics network. 224-229 - Mira Kajko-Mattsson:
Laying out the scope of developers' risk management responsibilities. 230-235 - Makoto J. Hirayama, Toshiyuki Yamamoto:
Network response analyzer system for interactive lectures in classroom or distance learning. 236-239 - Mira Kajko-Mattsson:
SLA management process model. 240-249 - Xinyan Zhao, Ge Wei, Lu Tingjie:
Study on consumer demands and merchant participation motives of mobile payment services in China. 250-255 - Pardeep Kumar, Sang il Cho, Hoon-Jae Lee:
PingPong-MAC: secure ubiquitous sensor network with authenticated encryption. 256-260 - Ok-Hue Cho, Jae-Joon Cho, Kil-Sang Yoo, Won-Hyung Lee:
A study on bio feedback based interactive work for expressing human cytochemism in real-time. 261-264 - Qian Wei, Jingsha He, Huiying Shao:
A directed signature scheme and its application to group key initial distribution. 265-269 - Wonyoung Kim, Joonsuk Ryu, Kyu Il Kim, Ung-Mo Kim:
A method for opinion mining of product reviews using association rules. 270-274 - Hoang-Anh Pham, Van-Hieu Bui, Anh-Vu Dinh-Duc:
An adaptive, memory-efficient and fast algorithm for Huffman decoding and its implementation. 275-279 - Zheng Min, Li Yang:
An extended version of scaled small gain condition. 280-282 - Ki-Il Kim, Hye-Jin Lee, Sangjoon Park, Hyeon Park:
New link estimation for reliability in wireless sensor networks. 283-286 - Joonsuk Ryu, Wonyoung Kim, Kyu Il Kim, Ung-Mo Kim:
Mining opinions from messenger. 287-290 - Peisheng Wang, Haiyang Quan, Fuqiang Zhang, Zhiyong Hu:
A novel fully-differential switched capacitor chopper stabilized cascade sigma-delta modulator for MEMS gyroscope. 291-294 - Jinhee Park, Jinwook Chung:
Network selection based on network service zone for macro mobility. 295-299 - Ibrahim Furkan Ince, Yücel Batu Salman, Mustafa Eren Yildirim:
A user study: the effects of mobile phone prototypes and task complexities on usability. 300-302 - Mingjie Zhou, Li Wang, Jianxin Zhang:
Developing a computer system for health assessment. 303-306 - Xiuhua Jiang, Yuxia Wang, Caihong Wang:
No-reference video quality assessment for MPEG-2 video streams using BP neural networks. 307-311 - Yücel Batu Salman, Ibrahim Furkan Ince, Ji Young Kim, Hong-In Cheng, Mustafa Eren Yildirim:
Participatory design and evaluation of e-learning system for Korean language training. 312-319 - Junfeng Tian, Yuzhen Lu, Peng Yuan:
A weighted closeness-based trust combination model. 320-325 - Chengying Mao:
Experiences in security testing for web-based applications. 326-330 - Fatemeh Saghafi, Fatemeh NasserEslami, Maryam Esmaili:
Ranking secure technologies in security provision financial transactions mobile commerce. 331-336 - Li Wenyi:
Financial performance evaluation of China's listed steel companies from creditors' perspective. 337-341 - Jia Zhang, Hong Pan, Zhenming Yuan:
A novel spatial index for case based geographic retrieval. 342-347 - Dongming Chen:
An effective solution for community identification. 348-351 - Wang Liu, Chunhui Zhao:
Digital watermarking for volume data based on 3D-DWT and 3D-DCT. 352-357 - Yujie Yao, Haopeng Chen:
QoS-aware service composition using NSGA-II1. 358-363 - Bin Chen, Bin Li, Zhisong Pan:
SVDD regularized with area under the ROC. 364-368 - Jingdong Chen, Wei Han:
The research on the service marketing strategies and empirical based on the product value. 369-374 - Jingdong Chen, Qisong Zhu:
The theory and empirical research of differentiation benefit positioning based on product value. 375-380 - Jingdong Chen, Xiaoqian Gao:
The theory and empirical research of network marketing based on relational value. 381-385 - Hong-qin Zhang, Song-lin Yang, Yong-cheng An, Jun-jie Zhao, Wu-xing He:
Information processing of the hull structure oriented to ship structure knowledge-type military specification. 386-389 - Song-lin Yang, Hong-qin Zhang, Yong-cheng An, Hai-bian Cheng, Wu-xing He:
Ship structure knowledge-based military specification virtual test system's design. 390-393 - Chung-Hsin Liu, Chun-Lin Lo:
The analysis of DDoS attack for the video transmission. 394-399 - Chung-Hsin Liu, Wei-Yu Chen:
The effectiveness of the handheld devices based on mobiles learning. 400-405 - Chung-Hsin Liu, Sheng-Shiang Chang, Zhao-Cheng Ye:
The study for the optimal routing of Bluetooth Piconet. 406-411 - Chung-Hsin Liu, Sheng-Shiang Chang:
The study of effectiveness for ad-hoc wireless network. 412-417 - Chung-Hsin Liu, Po-Cheng Teng, Chun-Lin Lo, Kuo-Hao Lee:
The study of the wireless network DoS attack. 418-421 - Chung-Hsin Liu, Chien-Yun Lo:
The study of WSN routing. 422-428 - Zhiyong Zeng, Zhiqiang Yao, Shigang Liu:
An efficient and effective image representation for region-based image retrieval. 429-434 - Zhiyong Zeng, Xuemei Ding, Shigang Liu:
An efficient region-based image representation using Legendre color distribution moments. 435-439 - Gaoshou Zhai, Yufeng Zhang, Chengyu Liu, Na Yang, Minli Tian, Hengsheng Yang:
Automatic identification of covert channels inside Linux kernel based on source codes. 440-445 - Gaoshou Zhai, Wenlin Ma, Minli Tian, Na Yang, Chengyu Liu, Hengsheng Yang:
Design and implementation of a tool for analyzing SELinux secure policy. 446-451 - Selim Mimaroglu, A. Murat Yagci:
A binary method for fast computation of inter and intra cluster similarities for combining multiple clusterings. 452-456 - Khalid Aldrawiesh, Ajlan Suliman Al-Ajlan, Yazed Al-Saawy, Abdullah Bajahzar:
A comparative study between computer programming languages for developing distributed systems in web environment. 457-461 - Qiang Sun, Shasha Cao, Nianshen Chen:
A maximum network lifetime QoS routing algorithm in MANETs. 462-467 - Shu-Ching Wang, Kua-Qin Yan, Shun-Sheng Wang, C. P. Huang:
Achieving high efficient agreement with malicious faulty nodes on a cloud computing environment. 468-473 - Svetlana Kim, Yongik Yoon:
Adaptation e-learning contents in mobile environment. 474-479 - Hamad I. Alsawalqah, Komi S. Abotsi, Danhyung Lee:
An automated mechanism for organizing and retrieving core asset artifacts for product derivation in SPL. 480-485 - Munkhbat Luvsanbyamba, In Keun Chung:
An empirical study of success factors on business-to-business e-marketplaces from buyers' and sellers' perspectives. 486-491 - Jun Pyo Park, Chang-Sup Park, Min Kyoung Sung, Yon Dohn Chung:
Attribute summarization: a technique for wireless XML streaming. 492-496 - The-Dung Pham, Hung Quoc Ngo, Sungyoung Lee, Young-Koo Lee:
Averaging approach for distributed event detection in wireless sensor networks. 497-501 - Chin-Bang Yao:
Context-aware customization e-learning system with intelligent on-line examination mechanism. 502-507 - Hazim Iscan, Oguz Findik, Halife Kodaz, Ali Erdi:
Designing a special purpose e-commerce website. 508-513 - Yun-Hong Noh, Do-Un Jeong:
Development and estimation of ubiquitous unconstrained BCG monitoring system using wireless sensor node. 514-520 - Md. Rakibul Haque, Md. Ashik Faisal Khan, Md. Atiqul Islam, Mahmuda Naznin:
DPUid: distributed algorithm for proximity-based unique id in wireless sensor networks. 521-525 - Mohammad Zeynali, Leili Mohammad Khanli, Amir Mollanejad:
EDARP: novel energy and distance-aware routing protocol in wireless sensor network. 526-533 - Pattaraporn Klangpraphant, Pattarasinee Bhattarakosol:
e-mail authentication system: a spam filtering for smart senders. 534-538 - Dhananjay Singh, Hoon-Jae Lee, Wan-Young Chung:
An energy consumption technique for global healthcare monitoring applications. 539-542 - Diana Poovathingal Lazar, Navrati Saxena, Hari Mohan Gupta, Swades De:
Handover support for converged inter-RAT networks. 543-549 - Seifu Tatek Yazhy, Seung-Kyu Park:
Hierarchical service-oriented routing of queries in wireless sensor networks. 550-554 - Sang-Ho Na, Kyu-Jin Kim, Mohammad Mehedi Hassan, Eui-nam Huh:
Identity-based secure protocol scheme for wireless sensor network. 555-560 - Tyrone Edwards, Suresh Sankaranarayanan:
Intelligent agent based hospital search & appointment system. 561-567 - Mariano Perez Pelaez, Toshiya Fujii, Wonsuk Nam, Masaki Yachiune, Ikuro Choh:
Legible+: integrated system for remote collaboration through document creation. 568-570 - S. Britto R. Kumar, S. Albert Rabara, J. Ronald Martin:
MPCS: a secure Mobile Payment Consortia System for higher educational institutions. 571-579 - J. G. R. Sathiaseelan, S. Albert Rabara, J. Ronald Martin:
Multi-Level Secure Framework (MLSF) for composite web services. 580-585 - Yongxu Piao, Wooseok Ryu, Haipeng Zhang, Bonghee Hong:
Optimization of continuous query processing for RFID sensor tag data stream. 586-591 - Duklon Stenett, Suresh Sankaranarayanan:
Personal mobile information system. 592-598 - Toru Yazawa, Tomoo Katsuyama:
Premature ventricular contractions, a typical extra-systole arrhythmia, lowers the scaling exponent: DFA as a beneficial biomedical computation. 599-604 - Jong-Moon Chung, Myungjun Choi, Yong-Suk Park, Ho Kim, Hyundo Kim:
Relative navigation and situation awareness information distribution for GPS information deficient situations. 605-609 - Md. Monzur Morshed, Md. Habibur Rahman, Md. Rezaur Rahman Mazumder, K. A. M. Lutfullah:
Simulation and analysis of ad-hoc on-demand distance vector routing protocol. 610-614 - Hathairat Ketmaneechairat, Phoemphun Oothongsap, Anirach Mingkhwan:
Smart buffer management for different start video broadcasting. 615-619 - Shaishav Agrawal, Tanveer J. Siddiqui:
Using syntactic and contextual information for sentiment polarity analysis. 620-623 - Hsein-Ping Kew, Do-Un Jeong:
Wearable patch-type ECG using ubiquitous wireless sensor network for healthcare monitoring application. 624-630 - Ke Zuo, Quanyuan Wu:
6DMPP: small worlds in mobile peer-to-peer networks. 631-636 - R. Lakshmi Priya, Nabendu Chaki:
A study on QoS issues for mobile ad-hoc networks. 637-642 - E. R. Naganathan, P. Eugene Xavier:
Architecting autonomic computing systems through Probabilistic Software Stability Model (PSSM). 643-648 - Yo-Ping Huang, Vu Thi Thanh Hoa:
General criteria on building decision trees for data classification. 649-654 - Farah Layouni, Yann Pollet:
QoS implementation in a federated identities system. 655-657 - Nicolás Macia, Paula Venosa, Luis Marrone:
Requirements for troubleshooting wi-fi network security through location technologies. 658-663 - Mohammad Shoyaib, Jo Moo Youl, Mohammad Abdullah-Al-Wadud, Oksam Chae:
A framework for digital cosmetic system. 664-669 - Ricardo Alexandre, Paula Prata, Abel João Padrão Gomes:
A grid infrastructure for online games. 670-673 - Yunsick Sung, Kyungeun Cho, Kyhyun Um:
A reward field model generation in Q-learning by dynamic programming. 674-679 - Supatach Chaksaen, Chanboon Sathitwiriyawong:
Buffer and loss monitoring for the control of multimedia data streaming rate on mobile ad hoc networks. 680-684 - Yan Zhang, Zhou Zhaoxing, Xiao Han:
Category specific SIFT descriptor and its combination with color information for content-based image retrieval. 685-690 - MyoungHee Cha, Kyungeun Cho, Kyhyun Um:
Design of memory architecture for autonomous virtual characters using visual attention and quad-graph. 691-696 - Korakot Prachumrak:
Weighted Finite Automata encoding over Thai language. 697-701 - Berdakh Abibullaev, Hee Don Seo, Won-Seok Kang, Jinung An:
A wavelet based method for detecting and localizing epileptic neural spikes in EEG. 702-707 - Hyontai Sug:
An empirical improvement of the accuracy of RBF networks. 708-712 - Jungkuk Kim, Minkyu Kim, Daesun Kim, Jaehyun Park, Woong Huh:
An event detection algorithm in ECG with 60Hz interference and baseline wandering. 713-716 - Chenghe Shi, Renquan Liu, Yuhao Zhao, Xiujuan Wang:
Applying complex system entropy cluster algorithm to mining principle of herbal combinations in traditional Chinese medicine. 717-721 - Mohammad Abdullah-Al-Wadud, Yoojin Chung:
Detecting mitochondria in fluorescence images. 722-725 - Ismail Babaoglu, Oguz Findik, Erkan Ülker:
Effects of discretization on determination of coronary artery disease using support vector machine. 726-729 - Saleh Ahmed, Shamim Ahmad, Md. Omar Faruqe, Md. Rashedul Islam:
EMG signal decomposition using wavelet transformation with respect to different wavelet and a comparative study. 730-735 - Huang-Cheng Kuo, Kuan-Yu Su, Ping-Lin Ong, Jen-Peng Huang:
Learning a prediction model for protein-protein recognition. 736-741 - Hong-Seok Na, Youn-Sik Choi, Tae-Soo Park:
Mobile robot for personal exercise training in ubiquitous healthcare environment. 742-744 - Thinn Mya Mya Swe, Nan Sai Moon Kham:
Ontology-based medical diagnostic knowledge structuring using case-based reasoning methodology. 745-749 - Luigi Gallo, Antonio Coronato:
Pervasive distributed volume rendering in a lightweight multi-agent platform. 750-755 - Halife Kodaz, Ismail Babaoglu, Hazim Iscan:
Thyroid disease diagnosis using Artificial Immune Recognition System (AIRS). 756-761 - Seena Biju, Sreekumaran Nair:
A literature review for a 6-sigma perception of academic quality. 762-767 - Muhammad Saleem, Rasheed Hussain, Yasir Ismail, Shaikh Mohsin:
Cost effective software engineering using program slicing techniques. 768-772 - Jian Wang, Rui Chen, Pengyan Zhang, Ningjie Yu:
Fault tree analysis in city lifeline system operations and management-theory and application. 773-777 - Shan-yan Huang, Han-yuh Liu:
A perspective of two-dimensional process integration customer relationship management driven business model. 778-783 - Jihah Nah, JongWeon Kim, Jaeseok Kim:
A new robust forensic marking using peak position modulation for video. 784-789 - Guowei Xue, Yan Zhang, Jia Li:
An improved backprojection algorithm for spiral cone-beam CT with an improved ray traverse algorithm. 790-795 - Porawat Visutsak, Veera Boonjing, Korakot Prachumrak:
Knowledge-based approach for 3D skeleton extraction. 796-801 - Semin Kim, Hyun-seok Min, Jaehyun Jeon, Yong Man Ro, Seungwan Han:
Malicious content filtering based on semantic features. 802-806 - Juryon Paik, Junghyun Nam, Wonyoung Kim, Joonsuk Ryu, Ung-Mo Kim:
Mining association rules in tree structured XML data. 807-811 - Saeed Reza Aghabozorgi, Ying Wah Teh:
Recommender systems: incremental clustering on web log data. 812-818 - Huy Thao Vu, Minh Thiep Ha, Jong-myung Rhee:
A Localized Software-based approach for Fault-Tolerant Ethernet (LSFTE). 819-823 - Madhusudan Singh, Sanggon Lee:
Decentralized Hybrid Wireless Mesh Protocol. 824-829 - HwangSoo Park, Jin YouLin, Sang Boem Lim, Jung-Hun Woo, Suhyang Kim, Young Sunwoo, Minghe Piao:
Design issues of integrated subway air quality management system base on particulate matter measurements. 830-834 - Hui Liu, Yeong-Sam Kim, Seong-Hyun Jang, Jong-Wha Chong:
Efficient implementation of hybrid automatic gain control algorithm for chirp spread spectrum. 835-838 - Seungmin Han, Mohammad Mehedi Hassan, Changwoo Yoon, Eui-nam Huh:
Efficient service recommendation system for cloud computing market. 839-845 - Li Xia, Zhong Cheng, Qu Zeng-Yan:
Multi-round scheduling for divisible loads on the heterogeneous cluster systems of multi-core computers. 846-852 - Su Su Hlaing:
Ontology based schema matching and mapping approach for structured databases. 853-859 - Rishi Pal Singh, D. K. Lobiyal:
Performance modeling of slotted MACA-BI MAC protocol for mobile ad hoc networks. 860-862 - Dong Kyoo Kim, Dong Yong Kwak:
Performance of Phase-Silence-Shift-Keying for additive white Gaussian noise and fading channels. 863-865 - Ting Chen, Yongjian Wang, Yinan Ren, Cheng Luo, Depei Qian, Zhongzhi Luan:
R-ECS: reliable elastic computing services for building virtual computing environment. 866-872 - Samad S. Kolahi, Zhang Qu, Burjiz K. Soorty, Navneet Chand:
The performance of IPv4 and IPv6 using UDP on IEEE 802.11n WLANs with WPA2 security. 873-876 - Ali Asghar Khavasi, Nastooh Taheri Javan:
Using zone-disjoint multi-path routing algorithm for video transmission over ad-hoc networks. 877-882 - Fayçal Bessayah, Ana R. Cavalli, Eliane Martins:
A formal approach for specification and verification of fault injection process. 883-890 - Supachai Tangwongsan, Sathaporn Kassuvan:
A highly effective model for security protection against eavesdropping exploits. 891-895 - JeaHoon Park, KiSeok Bae, Sang-Jae Moon, Dooho Choi, You Sung Kang, JaeCheol Ha:
A new fault cryptanalysis on montgomery ladder exponentiation algorithm. 896-899 - Minoru Kuribayashi:
A study of traceability of CDMA-based fingerprinting scheme. 900-905 - Chuanfu Chen, Yushuang Fu, Dan Wu, Congjing Ran, Kai Sun, Gang Wu:
Access to culture and information through library: a perspective on Chinese copyright law reformation. 906-911 - Heng-Sheng Chen, Tsang-Yean Lee, Huey-Ming Lee:
Collect and broadcast news in security. 912-917 - Ali Mohammed Noori Hasan:
Design and simulation of a modified perturbed digital chaotic signal generator for secure data communication. 918-922 - Jungyeop Kim, Sungeon Hong:
Development of digital watermarking technology to protect cadastral map information. 923-929 - Mati Pinyathinun, Chanboon Sathitwiriyawong:
Dynamic policy model for target based intrusion detection system. 930-934 - Yasuyuki Murakami, Tatsuo Douzono, Takeshi Nasako:
Relationship between weight of plaintext and successful attacks in knapsack cryptosystems. 935-939 - Misagh Mohammadizadeh, Ali Movaghar, Seyad Mohammad Safi:
SEAODV: secure efficient AODV routing protocol for MANETs networks. 940-944 - Oguz Findik, Ismail Babaoglu, Erkan Ülker:
Watermarking schema using an artificial immune system in spatial domain. 945-950 - Chien-Yuan Lai, Hsiu-Sen Chiang, Ching-Chiang Chen, Shih-Hao Chou:
Web service description for mobile phone virus. 951-956 - I. S. Amrutha, S. S. Shylaja, S. Natarajan, K. N. Balasubramanya Murthy:
A smart automatic thumbnail cropping based on attention driven regions of interest extraction. 957-962 - Lavare Henry, Suresh Sankaranarayanan:
Application of intelligent agents for mobile tutoring. 963-969 - Wenlin Peng, Xiaohu Yang, Feng Zhu:
Automation technique of software internationalization and localization based on lexical analysis. 970-975 - Songpol Ongwattanakul, Dararat Srisai:
Contrast enhanced dynamic time warping distance for time series shape averaging classification. 976-981 - Deliang Jiang, Xiaohu Yang:
Converting PDF to HTML approach based on text detection. 982-985 - Hau-Dong Tsui, Chong-Yen Lee, Tsang-Yean Lee:
From the bricks to the clicks: knowledge management in e-government. 986-991 - Kenji Higuchi, Fumiko Harada, Hiromitsu Shimakawa:
Making links between goal and tasks to retrieve information from web browsing histories. 992-994 - Olga Yugay, Lee Tae Kyung, Franz I. S. Ko:
Reinforcement learning coordination with combined heuristics in multi-agent environment for university timetabling. 995-1000 - Yo-Ping Huang, Jung-Shian Jau, Frode Eika Sandnes:
Temporal-spatial association analysis of ocean salinity and temperature variations. 1001-1006 - Erkan Ülker, Ahmet Arslan:
The approximation of interval Bezier curves by a fuzzy rule-based system. 1007-1012 - Miran Han, Peom Park:
A study of interface design for widgets in web services through usability evaluation. 1013-1018 - Wong Seng Yue, Nor Azan Mat Zin:
Usability evaluation for history educational games. 1019-1025 - Peter D. Dawoud, Dawoud S. Dawoud, R. Peplow:
A proposal for secure vehicular communications. 1026-1032 - Sangwook Bae, Keo Oudom, Young-Guk Ha, Sunyoung Han:
LBS system using online map in 3G networks environment. 1033-1037 - Wenna Li, Jianwei Leng, Zhibo Niu:
An approach to combining ActiveX with MATLAB in power electronics education. 1038-1043 - Wenying Zeng, Yuelong Zhao, Kairi Ou, Wei Song:
Research on cloud storage architecture and key technologies. 1044-1048 - Marie Kim, Hwang Jae Gak, Cheol Sig Pyo:
Practical RFID + sensor convergence toward context-aware X-reality. 1049-1055 - Hai Zhang, Xuyang Zhu, Wenming Guo:
TCP portscan detection based on single packet flows and entropy. 1056-1060 - Jinhee Park, Jinwook Chung:
Virtual shared network for WBANs communication with different RF channel. 1061-1065 - Hyeon-Seok Kim, Chan Jung Park, Seong Baeg Kim:
Improvement of Jeju National Museum service using mobile RFID. 1066-1071 - Chun-Ying Liu, Huan-Sen Li, Jin-Xiang Dong:
A new dots homogenization algorithm in digital screening technology. 1072-1076 - Min-Chul Park, Kyung Joo Cheoi:
A perceptive viewpoint controller for the Free-Viewpoint TV. 1077-1080 - Mohd Helmy Abd Wahab, Danial Md. Nor, Afizah Abdoll Mutalib, Ayob Johari, Rahmat Sanudin:
Development of integrated e-parcel management system with GSM network. 1081-1085 - Mi Zhang, Guang Hu, Shi-liang Tu, ZhiLei Chai:
Dynamic Electronic Design Automation concept, benefit and framework. 1086-1090 - Jihye Lee, Yong-Ik Yoon:
A harmonized media service middleware using the emotional knowledge. 1091-1094 - Shi-Huang Chen, Shih-Hao Chen:
Content-based music genre classification using timbral feature vectors and support vector machine. 1095-1101 - Wei Xiong, Xiuyan Jiang, Dejian Ye:
Disk I/O based load balancing in VOD system. 1102-1105 - J. Wang, Y. C. Jeung, J. W. Chong:
Improved block truncation coding using low cost approach for color image compression. 1106-1109 - Byungsung Lee, Junchul Chun:
Manipulation of virtual objects in marker-less AR system by fingertip tracking and hand gesture recognition. 1110-1115 - Sung-Soo Kim, Joo-Haeng Lee, Seung-Woo Nam:
Realistic rendering system using the measured BRDFs. 1116-1121 - Joon-Ho Lim, Soo-Jun Park, Hyunchul Jang, Sunhee Park:
BioProber2.0: a unified biomedical workbench with mining and probing literatures. 1122-1125 - Jianting Zhou, Jianxi Yang, Diankun Wu:
A method for analysis linear correlation for multi-sensor of bridge monitoring system. 1126-1129 - Leonardo S. Kury A. Mendes, Anselmo Cardoso de Paiva, Cláudio de Souza Baptista, Aristófanes Corrêa Silva:
Content based mammography images retrieval using Ripley's K function. 1130-1135 - Myungho Lee, Jin-hong Jeon, Jongwoo Bae, Hyuk-Soo Jang:
Parallel implementation of a financial application on a GPU. 1136-1141 - Zhenhan Liu, Xiaoxuan Meng, Lu Xu:
Lock management in blue whale file system. 1142-1147 - Jaehwan Kim, Jung-Yeol Oh, Hyung-Soo Lee, Jae-Young Kim:
Modified phase silence shift keying with phase offset for WBAN systems. 1149-1151 - Jun Li, Zhenjing Chen:
Sliding-window caching algorithm for streaming media server. 1152-1159 - Tae-Sub Kim, Ryong Oh, Sangjoon Lee, Suk-Ho Yoon, Choong-Ho Cho, Seungwan Ryu:
Vertical handover between LTE and wireless LAN systems based on common resource management (CRRM) and generic link layer (GLL). 1160-1166 - Do-Yoon Ha, Hwan-Kuk Kim, KyoungHee Ko, Chang-Yong Lee, JeongWook Kim, Hyun-Cheol Jeong:
Design and implementation of SIP-aware DDoS attack detection system. 1167-1171 - Xiaohu Lv, Yongxin Liu:
A bionic gait programming algorithm for hexapod robot. 1172-1175 - Wiboonsak Watthayu, Puchong Praekhao:
A concept in error correction of text editors: case study Thai-English set. 1176-1180 - Sunghan Lim, Hyunsuk Kim:
Analysis of effect of highway ITS incident management system. 1181-1184 - Min-Chul Park, Kyung Joo Cheoi:
Automatic focusing attention for a stereo pair of image sequence. 1185-1190 - Ho-Sub Yoon, Hong-Chang Lee, Jae-Yeon Lee:
Automatic number plate detection for Korean vehicles. 1191-1195 - Hyunsuk Kim, Sunghan Lim:
Before and after evaluation of highway ITS based infrastructure project. 1196-1200 - Heon Gyu Lee, Yonghoon Choi, Jin-Ho Shin:
Spatio-temporal mining for power load forecasting in GIS-AMR load analysis model. 1201-1206 - Haifen Chen, Guangming Lu, Rui Wang:
A new palm vein matching method based on ICP algorithm. 1207-1211 - Aurobi Das, V. Balakrishnan:
A next generation smart energy technology. 1212-1218 - Xiao Jia, Yuan Wenming, Wang Dong:
Complex event processing model for distributed RFID network. 1219-1222 - Wang PeiFeng, Li Yang, Cai MingWei, Wang JiChao, Li QingRu:
Non-model self-learning control of nonlinear system. 1223-1226 - B. K. Tripathy, G. K. Panda:
On some properties of covering based approximations of classifications of sets. 1227-1232 - Jiangning Cui, Bihui Duan, Hong Liu, Taoying Liu:
ILemo: a web platform to integrate personal data and services. 1233-1238 - Guoqiang Cai, Dechen Yao, Jianwei Yang, Yong Qin:
Adaptive control of response in a rotor with loose foundation. 1239-1243 - Jiuchun Ren, Dilin Mao, Zhiwei Wang:
A neural network based model for VoIP speech quality prediction. 1244-1248 - Zengjie Cao, Yuanyuan Lin:
The usage of coarse wordage: a study of the mob rule on China's internet. 1249-1252 - Jiajun Wen, Yinwei Zhan:
Vision-based two hand detection and tracking. 1253-1258 - Amna Ali, Ali Tufail, Umer Khan, Minkoo Kim:
A survey of prediction models for breast cancer survivability. 1259-1262 - Ying Zhang, Dongxiu Niu:
Characteristics of firms with effective internal control: evidence from Chinese companies. 1263-1268 - Tangjianfeng, Zhangxianing, Wangjicheng:
Research of computer simulation system based on SOA. 1269-1273 - Tangjianfeng, Huangxianbin, Wangjicheng:
Research of mainframe CICS application integration using CICS SCA. 1274-1277 - Yujuan Yang, Sidan Du:
A stereo algorithm using edge-based orthogonal dynamic programming. 1278-1283 - Cheng Zhou, Haopeng Chen:
An objective and automatic feedback model for QoS evaluation. 1284-1289 - Dingju Zhu, Jianping Fan:
Parallel integration model. 1290-1292 - Jingfeng Xue, Changzhen Hu, Kunsheng Wang, Rui Ma, Jiaxin Zou:
Metamorphic malware detection technology based on aggregating emerging patterns. 1293-1296 - Amit Kumar Choudhary, Akhilesh Swarup:
Neural network approach for intrusion detection. 1297-1301 - Vivaksha J. Jariwala, Devesh C. Jinwala:
A taxonomy of security attacks on the advanced encryption standard. 1302-1305 - Weihui Dai, Yue Yu, Bin Deng:
BinText steganography based on Markov state transferring probability. 1306-1311 - Janderson R. Oliveira, Edson A. S. Filho, Roseli A. F. Romero:
Mathematical morphology filters applied to an image skeletonization method to generation of topological maps. 1312-1317 - Rahul Kala, Anupam Shukla, Ritu Tiwari:
Robotic path planning using multi neuron heuristic search. 1318-1323 - Chong Fu, Zhiliang Zhu:
An image denoising method by using hybrid fractal-wavelet coding. 1324-1329 - Fang Yuan, Ping Xiao, Qixin Liu, Xiaolong Fu:
Digital campus information portal content organization based on "information architecture". 1330-1334 - Di Xie, Ruofeng Tong, Hongsen Wu:
Multi-channel video-based parallel fire detection acceleration method using multi-cores. 1335-1340 - Jian-Feng Hu:
Multifeature biometric system based on EEG signals. 1341-1345 - Chi-Yen Yin, Yau-Jung Lee, Jiann-Min Yang:
Ontology: the historical review and literature productivity analysis using bibliometric methodology from 1956 to 2008. 1346-1350 - Chi-Yen Yin, Jan-Shan Lin, Jiann-Min Yang:
A study on the productivity review for management of technology using bibliometric methodology. 1351-1356 - Xumin Liu, Weixiang Xu, Yong Guan, Yuanyuan Shang:
Trigonometric polynomial uniform B-spline surface with shape parameter. 1357-1363 - Hengwu Li:
Approximation algorithm and scheme for RNA structure prediction. 1364-1367 - Yong Wang, Huihui Zhao, Wenjing Chuo, Jianxin Chen, Shuzhen Guo, Wei Wang:
The study on the relationship between inflammatory factors and cardiac function based on chronic myocardial ischemia (syndrome of blood stasis model). 1368-1371 - Chongwon Lee:
Adapting and adjusting test process reflecting characteristics of embedded software and industrial properties based on referential models. 1372-1377 - Yawei Tian, Li Zhang:
Anatomic model on web customer satisfaction based on customer behavior. 1378-1381 - Junfeng Gao, Jiancheng Sun, Pan Lin, Chongxun Zheng, Pei Wang:
A template-based isomap algorithm for real-time removal of ocular artifacts from EEG signals. 1382-1388 - Yunxin Wang, Hongyu Li:
Annotating WSDL by CIDOC CRM. 1389-1392 - Jun Sun, Huazhu Song:
Feature extraction and reconstruction of particles reinforced metal matrix composite microstructure. 1393-1397 - Wang Zi Yang, Qin Yong, Jia Li Min:
Design of variable pitch controller for large wind turbine. 1398-1400 - B. Prasanalakshmi, A. Kannammal:
A secure cryptosystem from palm vein biometrics. 1401-1405 - Cuibo Yu, Xuerong Gou, Shasha Chai, Xunan Wang, Yunhan Xie:
Modifying Erlang B table based upon data mining. 1406-1409 - Yerbol Nisanbayev, Huiseong Na, Dongwook Lim, Franz Ko:
Designing an electronic medical records system using design patterns. 1410-1415 - Anour F. A. Dafa-Alla, Gyoyong Sohn, Keun Ho Ryu:
Employing PRBAC for privacy preserving data publishing. 1416-1421 - K. H. Choi:
A research analysis on the concept of converging technology and converging types of information technology. 1422-1426 - B. Paramasivan, Mohaideen Pitchai, D. Usha, Radha Krishnan:
Coverage preserved optimal routing protocol for improving the quality of service in wireless sensor networks. 1427-1431 - Beom-Il Nam, Byeungwoo Jeon:
Mobile based digital contents conversion service implementation. 1432-1436 - Jung-Yeol Oh, Jae-Hwan Kim, Hyung-Soo Lee, Jae-Young Kim:
A pi/4-shifted differential 8PSSK modulation for high data rate WBAN system. 1437-1440 - Sadhana Yogesh Ghalsasi:
Critical success factors for event driven service oriented architecture. 1441-1446 - Xinyan Zhao, Wei Ge, Tingjie Lu:
Study on consumer demands and merchant participation motives of mobile payment services in China. 1447-1451 - Chaofan Dai, Mingli Wang:
Distributed requirement elicitation and negotiation based on the hall for workshop of meta-synthetic engineering. 1452-1456 - Devinder Kaur, A. Holland:
Comparative Analysis of ANN trained with Back Propagation and Genetic Algorithm for Implementation of Exclusive-OR Problem. 1457-1460 - Jong Won Yang, Kim Jae Hum, Kim Soo Hyun, Young-Hwan Bang, Sang Dong Lee:
Design and Proposal of a Next Generation Digital Cable Broadcasting Service-Based System Using Cloud Storage Computing Environments. 1461-1465 - Tomohiro Shintani, Ryuichi Sakai:
Cryptanalysis on 2 Dimensional Subset-sum Public Key Cryptosystem. 1466-1469
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.