2. ICIS 2009: Seoul, Korea
Sungwon Sohn, Ling Chen, Soonwook Hwang, Kyungeun Cho, Shigeo Kawata, Kyhyun Um, Franz I. S. Ko, Kae-Dal Kwack, Jong Hyung Lee, Gang Kou, Kiyoshi Nakamura, Alvis Cheuk M. Fong, Patrick C. M. Ma (Eds.): Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human 2009, Seoul, Korea, 24-26 November 2009. ACM 2009 ACM International Conference Proceeding Series 403 ISBN 978-1-60558-710-3
Kosheek Sewchurran, Elsje Scott: Learning and making sense of project phenomena in information systems education. 1-8
Yasuko Kanno, Masato Terada, Hidehiro Yajima, Toshinari Kamamura, Norihisa Doi: A comparative study on structure of the motivation for information security by security incident experiences. 9-16
Aika Mukai, Toshiyuki Yamamoto, Makoto J. Hirayama: A study of correlation between transitions and sound effects in a fairy tale movie. 17-20
Rogayah Abd Majid, Nor Laila Md. Noor, Wan Adilah Wan Adnan, Suria Mansor: A survey on HCI considerations in the software development life cycle: from practitioner's perspective. 21-24
Dhananjay Singh, Hoon Jae Lee: Database design for global patient monitoring applications using WAP. 25-31
Norhaida Abdullah, Mohd Shafry, Mohd Rahim, Ismail Mat Amin: Measuring fish length from digital images (FiLeDI). 38-43
Umesh Hodeghatta Rao, Sanjay Mohapatra: Mobile technology for irrigation problems in rural India. 44-46
Shengling Wang, Yong Cui, Ke Xu, Jian-Hui Huang, Dapeng Liu: Proportional fairness of call blocking probability. 47-52
Toshihiko Yamakami: Star economy in the user generated content: a new perspective for digital ecosystems. 59-62
Rattiporn Luanrattana, Khin Than Win: The deployment of PDA accessible clinical-log for medical education in PBL-approach. 63-68
Wan Norizan Wan Hashim, Nor Laila Md. Noor, Wan Adilah Wan Adnan: The design of aesthetic interaction: towards a graceful interaction framework. 69-75
Atif Latif, Muhammad Tanvir Afzal, Patrick Höfler, Anwar Us Saeed, Klaus Tochtermann: Turning keywords into URIs: simplified user interfaces for exploring linked data. 76-81
A. Murali M. Rao: Web-enabled user support services system in distance learning. 86-90
Hyun-Jong Kim, Jeong Yun Kim, Seong Gon Choi: A method to support multiple interfaces mobile nodes in PMIPv6 domain. 91-96
Zhao-Zhi Pan, Yu Hong, Jian-Min Yao: A multiple bayes classification solution to word sense disambiguation. 97-99
Jianbo Ye, Qingbo Zhang, Guogang Huang: A multiuser diversity based time-frequency two dimensional adaptive resource allocation algorithm for WiMAX. 100-103
Alessandra De Paola, Salvatore Gaglio, Giuseppe Lo Re, Marco Ortolani: An ambient intelligence architecture for extracting knowledge from distributed sensors. 104-109
Weiping Li: An analysis of new features for workflow system in the SaaS software. 110-114
Chin-Hung Wang, Tzu-Chieh Wei, Po-Chin Lee, Chia-Chun Wu: An improvement of secure authentication scheme with full anonymity for wireless communications. 115-118
Junmin Zhu: Approximation for minimum total dominating set. 119-124
Pham Thi Thu Thuy, Young-Koo Lee, Sungyoung Lee: DTD2OWL: automatic transforming XML documents into OWL ontology. 125-131
Ruey-Ming Chao, Hsien-Chu Wu, Zi-Chun Chen: Image segmentation by automatic histogram thresholding. 136-141
Elise de Doncker, Karlis Kaugars, Shujun Li, Haisen S. Li, Yoshimitsu Shimizu, Junpei Fujimoto, Fukuko Yuasa, Tadashi Ishikawa, Nobuyuki Hamaguchi: Interdisciplinary applications of mathematical modeling. 142-148
Mangal Sain, Hoon Jae Lee, Wan-Young Chung: Middleware in ubiquitous computing system with MedRec architecture. 149-154
Hong-Hao Chen, Cheng-Chi Lee, Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai: Multi-level visual secret sharing scheme with smooth-looking. 155-160
Mahshid S. Ehsaei, Abolfazl Toroghi Haghighat: Pattern-based planning system for complex environments. 161-167
Yoon-Ho Cho, Sang-Hyun Park, SangKeun Lee: PhraseRank for document clustering: reweighting the weight of phrase. 168-174
Abdul Majid, Yeon Soo Lee: Predicting lattice constant of cubic perovskites using support vector regression. 175-183
Oliver Zweigle, René van de Molengraft, Raffaello D'Andrea, Kai Häussermann: RoboEarth: connecting robots worldwide. 184-191
Muhammad Usman Khan, Shoab Ahmed Khan: Social networks identification and analysis using call detail records. 192-196
Oliver Zweigle, Kai Häussermann, Uwe-Philipp Käppeler, Paul Levi: Supervised learning algorithm for automatic adaption of situation templates using uncertain data. 197-200
Vincenza Carchiolo, Alessandro Longheu, Michele Malgeri, Giuseppe Mangioni: The effect of malicious peers in a gossip-based reputation system. 201-205
Toshihiko Yamakami: Foundation-based mobile platform software engineering: implications to convergence to open source software. 206-211
Toshihiko Yamakami: An interactivity model of mobile interactive TV: a oneseg case for mobile glue. 212-217
Youngkon Lee: Double layered SOA test architecture based on BPA - simulation event. 218-223
Tzong-Heng Chi, Chia-Chien Lin, Wei-Chen Lin: Intraorganizational power verified interactive genetic algorithms for the design of logistics network. 224-229
Mira Kajko-Mattsson: Laying out the scope of developers' risk management responsibilities. 230-235
Makoto J. Hirayama, Toshiyuki Yamamoto: Network response analyzer system for interactive lectures in classroom or distance learning. 236-239
Mira Kajko-Mattsson: SLA management process model. 240-249
Zhao Xinyan, Ge Wei, Lu Tingjie: Study on consumer demands and merchant participation motives of mobile payment services in China. 250-255
Pardeep Kumar, Sang il Cho, Hoon Jae Lee: PingPong-MAC: secure ubiquitous sensor network with authenticated encryption. 256-260
Ok-Hue Cho, Jae-Joon Cho, Kil-Sang Yoo, Won-Hyung Lee: A study on bio feedback based interactive work for expressing human cytochemism in real-time. 261-264
Qian Wei, Jingsha He, Huiying Shao: A directed signature scheme and its application to group key initial distribution. 265-269
Wonyoung Kim, Joonsuk Ryu, Kyu Il Kim, Ung-Mo Kim: A method for opinion mining of product reviews using association rules. 270-274
Hoang-Anh Pham, Van-Hieu Bui, Anh-Vu Dinh-Duc: An adaptive, memory-efficient and fast algorithm for Huffman decoding and its implementation. 275-279
Ki-Il Kim, Hye-Jin Lee, Sangjoon Park, Hyeon Park: New link estimation for reliability in wireless sensor networks. 283-286
Peisheng Wang, Haiyang Quan, Fuqiang Zhang, Zhiyong Hu: A novel fully-differential switched capacitor chopper stabilized cascade sigma-delta modulator for MEMS gyroscope. 291-294
Jinhee Park, Jinwook Chung: Network selection based on network service zone for macro mobility. 295-299
Ibrahim Furkan Ince, Yucel Batu Salman, Mustafa Eren Yildirim: A user study: the effects of mobile phone prototypes and task complexities on usability. 300-302
Xiuhua Jiang, Yuxia Wang, Caihong Wang: No-reference video quality assessment for MPEG-2 video streams using BP neural networks. 307-311
Yucel Batu Salman, Ibrahim Furkan Ince, Ji Young Kim, Hong-In Cheng, Mustafa Eren Yildirim: Participatory design and evaluation of e-learning system for Korean language training. 312-319
Chengying Mao: Experiences in security testing for web-based applications. 326-330
Fatemeh Saghafi, Fatemeh NasserEslami, Maryam Esmaili: Ranking secure technologies in security provision financial transactions mobile commerce. 331-336
Li Wenyi: Financial performance evaluation of China's listed steel companies from creditors' perspective. 337-341
Jia Zhang, Hong Pan, Zhen-ming Yuan: A novel spatial index for case based geographic retrieval. 342-347
Dongming Chen: An effective solution for community identification. 348-351


Jingdong Chen, Wei Han: The research on the service marketing strategies and empirical based on the product value. 369-374
Jingdong Chen, Qisong Zhu: The theory and empirical research of differentiation benefit positioning based on product value. 375-380
Jingdong Chen, Xiaoqian Gao: The theory and empirical research of network marketing based on relational value. 381-385
Hong-qin Zhang, Song-lin Yang, Yong-cheng An, Jun-jie Zhao, Wu-xing He: Information processing of the hull structure oriented to ship structure knowledge-type military specification. 386-389
Song-lin Yang, Hong-qin Zhang, Yong-cheng An, Hai-bian Cheng, Wu-xing He: Ship structure knowledge-based military specification virtual test system's design. 390-393
Chung-Hsin Liu, Wei-Yu Chen: The effectiveness of the handheld devices based on mobiles learning. 400-405
Chung-Hsin Liu, Sheng-Shiang Chang, Zhao-Cheng Ye: The study for the optimal routing of Bluetooth Piconet. 406-411
Chung-Hsin Liu, Po-Cheng Teng, Chun-Lin Lo, Kuo-Hao Lee: The study of the wireless network DoS attack. 418-421
Zhiyong Zeng, Zhiqiang Yao, Shigang Liu: An efficient and effective image representation for region-based image retrieval. 429-434
Zhiyong Zeng, Xuemei Ding, Shigang Liu: An efficient region-based image representation using Legendre color distribution moments. 435-439
Gaoshou Zhai, Yufeng Zhang, Chengyu Liu, Na Yang, Minli Tian, Hengsheng Yang: Automatic identification of covert channels inside Linux kernel based on source codes. 440-445
Gaoshou Zhai, Wenlin Ma, Minli Tian, Na Yang, Chengyu Liu, Hengsheng Yang: Design and implementation of a tool for analyzing SELinux secure policy. 446-451
Selim Mimaroglu, A. Murat Yagci: A binary method for fast computation of inter and intra cluster similarities for combining multiple clusterings. 452-456
K. Aldrawiesh, A. Al-Ajlan, Y. Al-Saawy, A. Bajahzar: A comparative study between computer programming languages for developing distributed systems in web environment. 457-461
Qiang Sun, Shasha Cao, Nianshen Chen: A maximum network lifetime QoS routing algorithm in MANETs. 462-467
S. C. Wang, K. Q. Yan, S. S. Wang, C. P. Huang: Achieving high efficient agreement with malicious faulty nodes on a cloud computing environment. 468-473
Hamad I. Alsawalqah, Komi S. Abotsi, Danhyung Lee: An automated mechanism for organizing and retrieving core asset artifacts for product derivation in SPL. 480-485
Munkhbat Luvsanbyamba, In Keun Chung: An empirical study of success factors on business-to-business e-marketplaces from buyers' and sellers' perspectives. 486-491
Jun Pyo Park, Chang-Sup Park, Min Kyoung Sung, Yon Dohn Chung: Attribute summarization: a technique for wireless XML streaming. 492-496
The-Dung Pham, Hung Quoc Ngo, Sungyoung Lee, Young-Koo Lee: Averaging approach for distributed event detection in wireless sensor networks. 497-501
Chin-Bang Yao: Context-aware customization e-learning system with intelligent on-line examination mechanism. 502-507
Hazim Iscan, Oguz Findik, Halife Kodaz, Ali Erdi: Designing a special purpose e-commerce website. 508-513
Yun-Hong Noh, Do-Un Jeong: Development and estimation of ubiquitous unconstrained BCG monitoring system using wireless sensor node. 514-520
Md. Rakibul Haque, Md. Ashik Faisal Khan, Md. Atiqul Islam, Mahmuda Naznin: DPUid: distributed algorithm for proximity-based unique id in wireless sensor networks. 521-525
Mohammad Zeynali, Leili Mohammad Khanli, Amir Mollanejad: EDARP: novel energy and distance-aware routing protocol in wireless sensor network. 526-533
Pattaraporn Klangpraphant, Pattarasinee Bhattarakosol: e-mail authentication system: a spam filtering for smart senders. 534-538
Dhananjay Singh, Hoon Jae Lee, Wan-Young Chung: An energy consumption technique for global healthcare monitoring applications. 539-542
Diana Poovathingal Lazar, Navrati Saxena, Hari Mohan Gupta, Swades De: Handover support for converged inter-RAT networks. 543-549
Seifu Tatek Yazhy, Seung-Kyu Park: Hierarchical service-oriented routing of queries in wireless sensor networks. 550-554
Sang-Ho Na, Kyu-Jin Kim, Mohammad Mehedi Hassan, Eui-nam Huh: Identity-based secure protocol scheme for wireless sensor network. 555-560
Tyrone Edwards, Suresh Sankaranarayanan: Intelligent agent based hospital search & appointment system. 561-567
Mariano Perez Pelaez, Toshiya Fujii, Wonsuk Nam, Masaki Yachiune, Ikuro Choh: Legible+: integrated system for remote collaboration through document creation. 568-570
S. Britto R. Kumar, S. Albert Rabara, J. Ronald Martin: MPCS: a secure Mobile Payment Consortia System for higher educational institutions. 571-579
J. G. R. Sathiaseelan, S. Albert Rabara, J. Ronald Martin: Multi-Level Secure Framework (MLSF) for composite web services. 580-585
Yongxu Piao, Wooseok Ryu, Haipeng Zhang, Bonghee Hong: Optimization of continuous query processing for RFID sensor tag data stream. 586-591
Toru Yazawa, Tomoo Katsuyama: Premature ventricular contractions, a typical extra-systole arrhythmia, lowers the scaling exponent: DFA as a beneficial biomedical computation. 599-604
Jong-Moon Chung, Myungjun Choi, Yong-Suk Park, Ho Kim, Hyundo Kim: Relative navigation and situation awareness information distribution for GPS information deficient situations. 605-609
Md. Monzur Morshed, Md. Habibur Rahman, Md. Rezaur Rahman Mazumder, K. A. M. Lutfullah: Simulation and analysis of ad-hoc on-demand distance vector routing protocol. 610-614
Hathairat Ketmaneechairat, Phoemphun Oothongsap, Anirach Mingkhwan: Smart buffer management for different start video broadcasting. 615-619
Shaishav Agrawal, Tanveer j Siddiqui: Using syntactic and contextual information for sentiment polarity analysis. 620-623
Hsein-Ping Kew, Do-Un Jeong: Wearable patch-type ECG using ubiquitous wireless sensor network for healthcare monitoring application. 624-630

E. R. Naganathan, P. Eugene Xavier: Architecting autonomic computing systems through Probabilistic Software Stability Model (PSSM). 643-648
Yo-Ping Huang, Vu Thi Thanh Hoa: General criteria on building decision trees for data classification. 649-654
Nicolás Macia, Paula Venosa, Luis Marrone: Requirements for troubleshooting wi-fi network security through location technologies. 658-663
Mohammad Shoyaib, Jo Moo Youl, Mohammad Abdullah-Al-Wadud, Oksam Chae: A framework for digital cosmetic system. 664-669
Yunsick Sung, Kyungeun Cho, Kyhyun Um: A reward field model generation in Q-learning by dynamic programming. 674-679
Supatach Chaksaen, Chanboon Sathitwiriyawong: Buffer and loss monitoring for the control of multimedia data streaming rate on mobile ad hoc networks. 680-684
Yan Zhang, Zhou Zhaoxing, Xiao Han: Category specific SIFT descriptor and its combination with color information for content-based image retrieval. 685-690
MyoungHee Cha, Kyungeun Cho, Kyhyun Um: Design of memory architecture for autonomous virtual characters using visual attention and quad-graph. 691-696
Korakot Prachumrak: Weighted Finite Automata encoding over Thai language. 697-701
Berdakh Abibullaev, Hee Don Seo, Won-Seok Kang, Jinung An: A wavelet based method for detecting and localizing epileptic neural spikes in EEG. 702-707
Hyontai Sug: An empirical improvement of the accuracy of RBF networks. 708-712
Jungkuk Kim, Minkyu Kim, Daesun Kim, Jaehyun Park, Woong Huh: An event detection algorithm in ECG with 60Hz interference and baseline wandering. 713-716
Chenghe Shi, Renquan Liu, Yuhao Zhao, Xiujuan Wang: Applying complex system entropy cluster algorithm to mining principle of herbal combinations in traditional Chinese medicine. 717-721
Ismail Babaoglu, Oguz Findik, Erkan Ülker: Effects of discretization on determination of coronary artery disease using support vector machine. 726-729
Saleh Ahmed, Shamim Ahmad, Md. Omar Faruqe, Md. Rashedul Islam: EMG signal decomposition using wavelet transformation with respect to different wavelet and a comparative study. 730-735
Huang-Cheng Kuo, Kuan-Yu Su, Ping-Lin Ong, Jen-Peng Huang: Learning a prediction model for protein-protein recognition. 736-741
Hong-Seok Na, Youn-Sik Choi, Tae-Soo Park: Mobile robot for personal exercise training in ubiquitous healthcare environment. 742-744
Thinn Mya Mya Swe, Nan Sai Moon Kham: Ontology-based medical diagnostic knowledge structuring using case-based reasoning methodology. 745-749
Luigi Gallo, Antonio Coronato: Pervasive distributed volume rendering in a lightweight multi-agent platform. 750-755
Halife Kodaz, Ismail Babaoglu, Hazim Iscan: Thyroid disease diagnosis using Artificial Immune Recognition System (AIRS). 756-761
Seena Biju, Sreekumaran Nair: A literature review for a 6-sigma perception of academic quality. 762-767
Muhammad Saleem, Rasheed Hussain, Yasir Ismail, Shaikh Mohsin: Cost effective software engineering using program slicing techniques. 768-772
Jian Wang, Rui Chen, Pengyan Zhang, Ningjie Yu: Fault tree analysis in city lifeline system operations and management-theory and application. 773-777
Shan-yan Huang, Han-yuh Liu: A perspective of two-dimensional process integration customer relationship management driven business model. 778-783
Jihah Nah, JongWeon Kim, Jaeseok Kim: A new robust forensic marking using peak position modulation for video. 784-789
Guowei Xue, Yan Zhang, Jia Li: An improved backprojection algorithm for spiral cone-beam CT with an improved ray traverse algorithm. 790-795
Porawat Visutsak, Veera Boonjing, Korakot Prachumrak: Knowledge-based approach for 3D skeleton extraction. 796-801
Semin Kim, Hyun-seok Min, Jaehyun Jeon, Yong Man Ro, Seungwan Han: Malicious content filtering based on semantic features. 802-806
Juryon Paik, Junghyun Nam, Wonyoung Kim, Joonsuk Ryu, Ung-Mo Kim: Mining association rules in tree structured XML data. 807-811
Saeed Reza Aghabozorgi, Ying Wah Teh: Recommender systems: incremental clustering on web log data. 812-818
Huy Thao Vu, Minh Thiep Ha, Jong-myung Rhee: A Localized Software-based approach for Fault-Tolerant Ethernet (LSFTE). 819-823
HwangSoo Park, Jin YouLin, Sang Boem Lim, Jung-Hun Woo, Suhyang Kim, Young Sunwoo, Minghe Piao: Design issues of integrated subway air quality management system base on particulate matter measurements. 830-834
Hui Liu, Yeong-Sam Kim, Seong-Hyun Jang, Jong-Wha Chong: Efficient implementation of hybrid automatic gain control algorithm for chirp spread spectrum. 835-838
Seungmin Han, Mohammad Mehedi Hassan, Changwoo Yoon, Eui-nam Huh: Efficient service recommendation system for cloud computing market. 839-845
Li Xia, Zhong Cheng, Qu Zeng-Yan: Multi-round scheduling for divisible loads on the heterogeneous cluster systems of multi-core computers. 846-852
Su Su Hlaing: Ontology based schema matching and mapping approach for structured databases. 853-859
Rishi Pal Singh, D. K. Lobiyal: Performance modeling of slotted MACA-BI MAC protocol for mobile ad hoc networks. 860-862
Dong Kyoo Kim, Dong Yong Kwak: Performance of Phase-Silence-Shift-Keying for additive white Gaussian noise and fading channels. 863-865
Ting Chen, Yongjian Wang, Yinan Ren, Cheng Luo, Depei Qian, Zhongzhi Luan: R-ECS: reliable elastic computing services for building virtual computing environment. 866-872
Samad S. Kolahi, Zhang Qu, Burjiz K. Soorty, Navneet Chand: The performance of IPv4 and IPv6 using UDP on IEEE 802.11n WLANs with WPA2 security. 873-876
Ali Asghar Khavasi, Nastooh Taheri Javan: Using zone-disjoint multi-path routing algorithm for video transmission over ad-hoc networks. 877-882
Fayçal Bessayah, Ana R. Cavalli, Eliane Martins: A formal approach for specification and verification of fault injection process. 883-890
Supachai Tangwongsan, Sathaporn Kassuvan: A highly effective model for security protection against eavesdropping exploits. 891-895
JeaHoon Park, KiSeok Bae, Sang-Jae Moon, DooHo Choi, YouSung Kang, JaeCheol Ha: A new fault cryptanalysis on montgomery ladder exponentiation algorithm. 896-899
Minoru Kuribayashi: A study of traceability of CDMA-based fingerprinting scheme. 900-905
Chuanfu Chen, Yushuang Fu, Dan Wu, Congjing Ran, Kai Sun, Gang Wu: Access to culture and information through library: a perspective on Chinese copyright law reformation. 906-911
Ali Mohammed Noori Hasan: Design and simulation of a modified perturbed digital chaotic signal generator for secure data communication. 918-922
Jungyeop Kim, Sungeon Hong: Development of digital watermarking technology to protect cadastral map information. 923-929
Mati Pinyathinun, Chanboon Sathitwiriyawong: Dynamic policy model for target based intrusion detection system. 930-934
Yasuyuki Murakami, Tatsuo Douzono, Takeshi Nasako: Relationship between weight of plaintext and successful attacks in knapsack cryptosystems. 935-939
Misagh Mohammadizadeh, Ali Movaghar, Seyad Mohammad Safi: SEAODV: secure efficient AODV routing protocol for MANETs networks. 940-944
Oguz Findik, Ismail Babaoglu, Erkan Ülker: Watermarking schema using an artificial immune system in spatial domain. 945-950
Chien-Yuan Lai, Hsiu-Sen Chiang, Ching-Chiang Chen, Shih-Hao Chou: Web service description for mobile phone virus. 951-956
I. S. Amrutha, S. S. Shylaja, S. Natarajan, K. N. Balasubramanya Murthy: A smart automatic thumbnail cropping based on attention driven regions of interest extraction. 957-962
Lavare Henry, Suresh Sankaranarayanan: Application of intelligent agents for mobile tutoring. 963-969
Wenlin Peng, Xiaohu Yang, Feng Zhu: Automation technique of software internationalization and localization based on lexical analysis. 970-975
Songpol Ongwattanakul, Dararat Srisai: Contrast enhanced dynamic time warping distance for time series shape averaging classification. 976-981
Hau-Dong Tsui, Chong-Yen Lee, Tsang-Yean Lee: From the bricks to the clicks: knowledge management in e-government. 986-991
Kenji Higuchi, Fumiko Harada, Hiromitsu Shimakawa: Making links between goal and tasks to retrieve information from web browsing histories. 992-994
Olga Yugay, Lee Tae Kyung, Franz I. S. Ko: Reinforcement learning coordination with combined heuristics in multi-agent environment for university timetabling. 995-1000
Yo-Ping Huang, Jung-Shian Jau, Frode Eika Sandnes: Temporal-spatial association analysis of ocean salinity and temperature variations. 1001-1006
Erkan Ülker, Ahmet Arslan: The approximation of interval Bezier curves by a fuzzy rule-based system. 1007-1012

Peter D. Dawoud, Dawoud S. Dawoud, R. Peplow: A proposal for secure vehicular communications. 1026-1032
Sangwook Bae, Keo Oudom, Young-Guk Ha, Sunyoung Han: LBS system using online map in 3G networks environment. 1033-1037
Wenna Li, Jianwei Leng, Zhibo Niu: An approach to combining ActiveX with MATLAB in power electronics education. 1038-1043
Wenying Zeng, Yuelong Zhao, Kairi Ou, Wei Song: Research on cloud storage architecture and key technologies. 1044-1048
Marie Kim, Hwang Jae Gak, Cheol Sig Pyo: Practical RFID + sensor convergence toward context-aware X-reality. 1049-1055
Hai Zhang, Xuyang Zhu, Wenming Guo: TCP portscan detection based on single packet flows and entropy. 1056-1060
Jinhee Park, Jinwook Chung: Virtual shared network for WBANs communication with different RF channel. 1061-1065
Hyeon-Seok Kim, Chan Jung Park, Seong Baeg Kim: Improvement of Jeju National Museum service using mobile RFID. 1066-1071
Chun-Ying Liu, Huan-Sen Li, Jin-Xiang Dong: A new dots homogenization algorithm in digital screening technology. 1072-1076
Min-Chul Park, Kyung Joo Cheoi: A perceptive viewpoint controller for the Free-Viewpoint TV. 1077-1080
Mohd Helmy Abd Wahab, Danial Md. Nor, Afizah Abdoll Mutalib, Ayob Johari, Rahmat Sanudin: Development of integrated e-parcel management system with GSM network. 1081-1085
Mi Zhang, Guang Hu, Shi-liang Tu, ZhiLei Chai: Dynamic Electronic Design Automation concept, benefit and framework. 1086-1090
Jihye Lee, Yong-Ik Yoon: A harmonized media service middleware using the emotional knowledge. 1091-1094
Shi-Huang Chen, Shih-Hao Chen: Content-based music genre classification using timbral feature vectors and support vector machine. 1095-1101
J. Wang, Y. C. Jeung, J. W. Chong: Improved block truncation coding using low cost approach for color image compression. 1106-1109
Byungsung Lee, Junchul Chun: Manipulation of virtual objects in marker-less AR system by fingertip tracking and hand gesture recognition. 1110-1115
Sung-Soo Kim, Joo-Haeng Lee, Seung-Woo Nam: Realistic rendering system using the measured BRDFs. 1116-1121
Joon-Ho Lim, Soo-Jun Park, Hyunchul Jang, Sunhee Park: BioProber2.0: a unified biomedical workbench with mining and probing literatures. 1122-1125
Jianting Zhou, Jianxi Yang, Diankun Wu: A method for analysis linear correlation for multi-sensor of bridge monitoring system. 1126-1129
Leonardo S. Kury A. Mendes, Anselmo Cardoso de Paiva, Cláudio de Souza Baptista, Aristófanes Corrêa Silva: Content based mammography images retrieval using Ripley's K function. 1130-1135
Myungho Lee, Jin-hong Jeon, Jongwoo Bae, Hyuk-Soo Jang: Parallel implementation of a financial application on a GPU. 1136-1141
Jaehwan Kim, Jung-Yeol Oh, Hyung-Soo Lee, Jae-Young Kim: Modified phase silence shift keying with phase offset for WBAN systems. 1149-1151
Tae-Sub Kim, Ryong Oh, Sangjoon Lee, Suk-Ho Yoon, Choong-Ho Cho, Seungwan Ryu: Vertical handover between LTE and wireless LAN systems based on common resource management (CRRM) and generic link layer (GLL). 1160-1166
Do-Yoon Ha, Hwan-Kuk Kim, KyoungHee Ko, Chang-Yong Lee, JeongWook Kim, Hyun Cheol Jeong: Design and implementation of SIP-aware DDoS attack detection system. 1167-1171
Wiboonsak Watthayu, Puchong Praekhao: A concept in error correction of text editors: case study Thai-English set. 1176-1180
Min-Chul Park, Kyung Joo Cheoi: Automatic focusing attention for a stereo pair of image sequence. 1185-1190
Ho-Sub Yoon, Hong-Chang Lee, Jaeyeon Lee: Automatic number plate detection for Korean vehicles. 1191-1195
Hyunsuk Kim, Sunghan Lim: Before and after evaluation of highway ITS based infrastructure project. 1196-1200
Heon Gyu Lee, Yonghoon Choi, Jin-Ho Shin: Spatio-temporal mining for power load forecasting in GIS-AMR load analysis model. 1201-1206
Haifen Chen, Guangming Lu, Rui Wang: A new palm vein matching method based on ICP algorithm. 1207-1211
Xiao Jia, Yuan Wenming, Wang Dong: Complex event processing model for distributed RFID network. 1219-1222
Wang PeiFeng, Li Yang, Cai MingWei, Wang JiChao, Li QingRu: Non-model self-learning control of nonlinear system. 1223-1226
B. K. Tripathy, G. K. Panda: On some properties of covering based approximations of classifications of sets. 1227-1232
Jiangning Cui, Bihui Duan, Hong Liu, Taoying Liu: ILemo: a web platform to integrate personal data and services. 1233-1238
Guoqiang Cai, Dechen Yao, Jianwei Yang, Yong Qin: Adaptive control of response in a rotor with loose foundation. 1239-1243
Jiuchun Ren, Dilin Mao, ZhiWei Wang: A neural network based model for VoIP speech quality prediction. 1244-1248
Zengjie Cao, Yuanyuan Lin: The usage of coarse wordage: a study of the mob rule on China's internet. 1249-1252
Amna Ali, Ali Tufail, Umer Khan, Minkoo Kim: A survey of prediction models for breast cancer survivability. 1259-1262
Zhang Ying, Dongxiu Niu: Characteristics of firms with effective internal control: evidence from Chinese companies. 1263-1268
Tangjianfeng, Zhangxianing, Wangjicheng: Research of computer simulation system based on SOA. 1269-1273
Tangjianfeng, Huangxianbin, Wangjicheng: Research of mainframe CICS application integration using CICS SCA. 1274-1277
Yujuan Yang, Sidan Du: A stereo algorithm using edge-based orthogonal dynamic programming. 1278-1283

Jingfeng Xue, Changzhen Hu, Kunsheng Wang, Rui Ma, Jiaxin Zou: Metamorphic malware detection technology based on aggregating emerging patterns. 1293-1296
Vivaksha J. Jariwala, Devesh C. Jinwala: A taxonomy of security attacks on the advanced encryption standard. 1302-1305
Weihui Dai, Yue Yu, Bin Deng: BinText steganography based on Markov state transferring probability. 1306-1311
Janderson R. Oliveira, Edson A. S. Filho, Roseli A. F. Romero: Mathematical morphology filters applied to an image skeletonization method to generation of topological maps. 1312-1317
Rahul Kala, Anupam Shukla, Ritu Tiwari: Robotic path planning using multi neuron heuristic search. 1318-1323
Fang Yuan, Ping Xiao, Qixin Liu, Xiaolong Fu: Digital campus information portal content organization based on "information architecture". 1330-1334
Di Xie, Ruofeng Tong, Hongsen Wu: Multi-channel video-based parallel fire detection acceleration method using multi-cores. 1335-1340
Hu Jian-feng: Multifeature biometric system based on EEG signals. 1341-1345
Chi-Yen Yin, Yau-Jung Lee, Jiann-Min Yang: Ontology: the historical review and literature productivity analysis using bibliometric methodology from 1956 to 2008. 1346-1350
Chi-Yen Yin, Jan-Shan Lin, Jiann-Min Yang: A study on the productivity review for management of technology using bibliometric methodology. 1351-1356
Xumin Liu, Weixiang Xu, Yong Guan, Yuanyuan Shang: Trigonometric polynomial uniform B-spline surface with shape parameter. 1357-1363
Hengwu Li: Approximation algorithm and scheme for RNA structure prediction. 1364-1367
Yong Wang, Huihui Zhao, Wenjing Chuo, Jianxin Chen, Shuzhen Guo, Wei Wang: The study on the relationship between inflammatory factors and cardiac function based on chronic myocardial ischemia (syndrome of blood stasis model). 1368-1371
Chongwon Lee: Adapting and adjusting test process reflecting characteristics of embedded software and industrial properties based on referential models. 1372-1377
Yawei Tian, Li Zhang: Anatomic model on web customer satisfaction based on customer behavior. 1378-1381
Junfeng Gao, Jiancheng Sun, Pan Lin, Chongxun Zheng, Pei Wang: A template-based isomap algorithm for real-time removal of ocular artifacts from EEG signals. 1382-1388
Jun Sun, Huazhu Song: Feature extraction and reconstruction of particles reinforced metal matrix composite microstructure. 1393-1397
Wang Zi Yang, Qin Yong, Jia Li Min: Design of variable pitch controller for large wind turbine. 1398-1400
Cuibo Yu, Xuerong Gou, Shasha Chai, Xunan Wang, Yunhan Xie: Modifying Erlang B table based upon data mining. 1406-1409
Yerbol Nisanbayev, Huiseong Na, Dongwook Lim, Franz Ko: Designing an electronic medical records system using design patterns. 1410-1415
Anour F. A. Dafa-Alla, Gyoyong Sohn, Keun Ho Ryu: Employing PRBAC for privacy preserving data publishing. 1416-1421
K. H. Choi: A research analysis on the concept of converging technology and converging types of information technology. 1422-1426
B. Paramasivan, Mohaideen Pitchai, D. Usha, Radha Krishnan: Coverage preserved optimal routing protocol for improving the quality of service in wireless sensor networks. 1427-1431
Beom-Il Nam, Byeungwoo Jeon: Mobile based digital contents conversion service implementation. 1432-1436
Jung-Yeol Oh, Jae-Hwan Kim, Hyung-Soo Lee, Jae-Young Kim: A pi/4-shifted differential 8PSSK modulation for high data rate WBAN system. 1437-1440
Sadhana Yogesh Ghalsasi: Critical success factors for event driven service oriented architecture. 1441-1446
Xinyan Zhao, Wei Ge, Tingjie Lu: Study on consumer demands and merchant participation motives of mobile payment services in China. 1447-1451
Chao-fan Dai, Ming-li Wang: Distributed requirement elicitation and negotiation based on the hall for workshop of meta-synthetic engineering. 1452-1456
D. Kaur, A. Holland: Comparative Analysis of ANN trained with Back Propagation and Genetic Algorithm for Implementation of Exclusive-OR Problem. 1457-1460
Jong Won Yang, Kim Jae Hum, Kim Soo Hyun, Young-Hwan Bang, Sang Dong Lee: Design and Proposal of a Next Generation Digital Cable Broadcasting Service-Based System Using Cloud Storage Computing Environments. 1461-1465
Tomohiro Shintani, Ryuichi Sakai: Cryptanalysis on 2 Dimensional Subset-sum Public Key Cryptosystem. 1466-1469



