


default search action
ICCSA 2009: Seoul, Korea
- Osvaldo Gervasi, David Taniar, Beniamino Murgante, Antonio Laganà, Youngsong Mun, Marina L. Gavrilova:

Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part II. Lecture Notes in Computer Science 5593, Springer 2009, ISBN 978-3-642-02456-6
Workshop on Software Engineering Processes and Applications (SEPA 2009)
- Chi-Lun Liu:

Ontology-Based Requirements Conflicts Analysis in Activity Diagrams. 1-12 - Supraja Doma, Larry Gottschalk, Tetsutaro Uehara

, Jigang Liu:
Resource Allocation Optimization for GSD Projects. 13-28 - Jinqiang Zhao, Zhenhua Duan:

Verification of Use Case with Petri Nets in Requirement Analysis. 29-42 - Rikard Land, Jan Carlson

, Stig Larsson, Ivica Crnkovic
:
Towards Guidelines for a Development Process for Component-Based Embedded Systems. 43-58 - Ferid Cafer, Sanjay Misra

:
Effective Project Leadership in Computer Science and Engineering. 59-69 - Sanjay Misra

:
Weyuker's Properties, Language Independency and Object Oriented Metrics. 70-81
Workshop on Molecular Simulations Structures and Processes (MOSSAP 2009)
- Abdul Majid, Muhammad Farooq Ahmad, Tae-Sun Choi

:
Lattice Constant Prediction of A2BB'O6 Type Double Perovskites. 82-92 - Alessandro Costantini

, Noelia Faginas Lago
, Antonio Laganà, Fermín Huarte-Larrañaga
:
A Grid Implementation of Direct Semiclassical Calculations of Rate Coefficients. 93-103 - Alessandro Costantini

, Noelia Faginas Lago
, Antonio Laganà, Fermín Huarte-Larrañaga
:
A Grid Implementation of Direct Quantum Calculations of Rate Coefficients. 104-114 - Antonio Laganà, Stefano Crocchianti, Alessandro Costantini

, Monica Angelucci, Marco Vecchiocattivi:
A Grid Implementation of Chimere: Ozone Production in Central Italy. 115-129
Workshop on Internet Communication Security (WICS 2009)
- Sergio Pozo

, Angel Jesus Varela-Vaca
, Rafael M. Gasca
:
MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT. 130-144 - Fernando Sánchez-Chaparro, José M. Sierra, Oscar Delgado-Mohatar, Amparo Fúster-Sabater:

Testing Topologies for the Evaluation of IPSEC Implementations. 145-154 - Miguel Viedma Astudillo, Jesús Téllez Isaac, Diego Suarez Touceda

, Héctor Plaza López:
Evaluation of a Client Centric Payment Protocol Using Digital Signature Scheme with Message Recovery Using Self-Certified Public Key. 155-163
Workshop on Security and Privacy in Pervasive Computing Environments (SPPC 2009)
- Youngsook Lee, Dongho Won:

Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment. 164-172 - Junghyun Nam, Sangchul Han, Minkyu Park, Juryon Paik

, Ung-Mo Kim:
Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords. 173-181 - Wansuck Yi, Seungjoo Kim

, Dongho Won:
Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments. 182-190 - Kwang-Woo Lee, Yunho Lee, Seungjoo Kim

, Dongho Won:
A Practical Approach to a Reliable Electronic Election. 191-203 - Mijin Kim

, Heasuk Jo, Seungjoo Kim
, Dongho Won:
Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key. 204-211
Workshop on Mobile Communications (MC 2009)
- Eun Cheol Kim, Jin Young Kim:

Performance of STBC PPM-TH UWB Systems with Double Binary Turbo Code in Multi-user Environments. 212-225 - Eun Cheol Kim, Jin Young Kim:

Performance Evaluation of PN Code Acquisition with Delay Diversity Receiver for TH-UWB System. 226-236 - Bum-Gon Choi, Sueng Jae Bae, Tae-Jin Lee, Min Young Chung:

Performance Analysis of Binary Negative-Exponential Backoff Algorithm in IEEE 802.11a WLAN under Erroneous Channel Condition. 237-249 - Sueng Jae Bae, Jin Ju Lee, Bum-Gon Choi, Sungoh Kwon

, Min Young Chung:
A Resource-Estimated Call Admission Control Algorithm in 3GPP LTE System. 250-260 - Katarzyna Kosek, Marek Natkaniec, Luca Vollero:

Problems with Correct Traffic Differentiation in Line Topology IEEE 802.11 EDCA Networks in the Presence of Hidden and Exposed Nodes. 261-275 - Jong Sung Lee, Dong In Kim

:
Adaptive and Iterative GSC/MRC Switching Techniques Based on CRC Error Detection for AF Relaying System. 276-285 - Jung-Hyun Kim, Hyeong-Joon Kwon, Kwang-Seok Hong:

WiBro Net.-Based Five Senses Multimedia Technology Using Mobile Mash-Up. 286-301 - Hyun-Su Jang, Kwangsun Ko, Young-woo Jung, Young Ik Eom:

Overlay Ring Based Secure Group Communication Scheme for Mobile Agents. 302-313 - Dahae Chong, Taeung Yoon, Youngyoon Lee, Chonghan Song, Myungsoo Lee, Seokho Yoon:

Enhanced Multiple-Shift Scheme for Rapid Code Acquisition in Optical CDMA Systems. 314-324 - Youngpo Lee, Youngyoon Lee, Taeung Yoon, Chonghan Song, Sanghun Kim, Seokho Yoon:

AltBOC and CBOC Correlation Functions for GNSS Signal Synchronization. 325-334 - Jin-Seong Kim, Tae-Jin Lee:

Performance Enhancement of IEEE 802.11b WLANs Using Cooperative MAC Protocol. 335-344 - Seong-Soo Park, Jong-Hyouk Lee, Tai-Myoung Chung:

Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks. 345-360 - Moonseong Kim, Matt W. Mutka

:
On Relocation of Hopping Sensors for Balanced Migration Distribution of Sensors. 361-371 - Taekhoon Kim, Dong In Kim

:
Hybrid Hard/Soft Decode-and-Forward Relaying Protocol with Distributed Turbo Code. 372-382 - Junghoon Lee, In-Hye Shin, Hye-Jin Kim, Min-Jae Kang, Sang Joon Kim:

Design of an Efficient Multicast Scheme for Vehicular Telematics Networks. 383-392 - SungJin Choi, Hyunseung Choo, MaengSoon Baik, HongSoo Kim, EunJoung Byun:

ODDUGI: Ubiquitous Mobile Agent System. 393-407 - Jin Wang, Young-Koo Lee:

Determination of the Optimal Hop Number for Wireless Sensor Networks. 408-418 - Duc Viet Le, Young-Koo Lee, Sungyoung Lee:

Localization in Sensor Networks with Fading Channels Based on Nonmetric Distance Models. 419-431 - Jin Wang, Sungyoung Lee:

A Performance Comparison of Swarm Intelligence Inspired Routing Algorithms for MANETs. 432-442 - In-Hye Shin, Gyung-Leen Park, Abhijit Saha

, Ho-Young Kwak, Hanil Kim:
Analysis of Moving Patterns of Moving Objects with the Proposed Framework. 443-452 - Gap-Joo Na, Sang-Won Lee:

A User-Defined Index for Containment Queries in XML. 453-464 - Alexey S. Rodionov

, Olga D. Sokolova
, Anastasia N. Yurgenson, Hyunseung Choo:
On Optimal Placement of the Monitoring Devices on Channels of Communication Network. 465-478 - Seungtak Oh, Hyunseung Choo:

Low Latency Handover Scheme Based on Optical Buffering at LMA in Proxy MIPv6 Networks. 479-490 - Md. Obaidur Rahman, Muhammad Mostafa Monowar, Choong Seon Hong

:
A Capacity Aware Data Transport Protocol for Wireless Sensor Network. 491-502 - Abhijit Saha

, Gyung-Leen Park, Khi-Jung Ahn, Chul Soo Kim, Bongkyu Lee, Yoon-Jung Rhee:
Data Distribution of Road-Side Information Station in Vehicular Ad Hoc Networks (VANETs). 503-512 - Junwoo Jung

, Hoki Baek
, Jaesung Lim:
VC-GTS: Virtual Cut-Through GTS Allocation Scheme for Voice Traffic in Multihop IEEE 802.15.4 Systems. 513-524 - MoonBae Song, Hyunseung Choo:

Towards Location-Based Real-Time Monitoring Systems in u-LBS. 525-536
General Track on Computational Methods, Algorithms and Applications
- Yen Hung Chen:

A Fast Approximation Algorithm for the k Partition-Distance Problem. 537-546 - Ximing Liang, Xiang Li, Muhammet Fikret Ercan

:
A PSO - Line Search Hybrid Algorithm. 547-556 - Alexey S. Rodionov

, Olga K. Rodionova, Hyunseung Choo:
Using Meaning of Coefficients of the Reliability Polynomial for Their Faster Calculation. 557-571 - Saeed Behzadi, Ali A. Alesheikh

, Mohammad Reza Malek
:
A Novel Tree Graph Data Structure for Point Datasets. 572-579 - Beoungil Cho, Hyunsang Youn, Eunseok Lee

:
Software Dependability Analysis Methodology. 580-593 - Kisoeb Park, Seki Kim, William T. Shaw:

New Approach for the Pricing of Bond Option Using the Relation between the HJM Model and the BGM Model. 594-604 - Xiaojuan Cai, Yonggen Gu:

Measuring Anonymous Systems with the Probabilistic Applied Pi Calculus. 605-620 - Luigi Nardi, Charles Sorror, Fouad Badran, Sylvie Thiria:

YAO: A Software for Variational Data Assimilation Using Numerical Models. 621-636
General Track on High Performance Technical Computing and Networks
- Yu Zhang, Yuanda Cao, Baodong Cheng:

CNP: A Protocol for Reducing Maintenance Cost of Structured P2P. 637-652 - Youqiang Guo, Zijun Zhang, Xuezhu Pei:

A Research on Instability of Small Flow in SCADA and an Optimizing Design for Control. 653-663 - Kushan Ahmadian, Marina L. Gavrilova:

On-Demand Chaotic Neural Network for Broadcast Scheduling Problem. 664-676
General Track on Advanced and Emerging Applications
- Feng Qian

, Qinming He, Jiangfeng He:
Mining Spread Patterns of Spatio-temporal Co-occurrences over Zones. 677-692 - Wook-Jin Choi

, Abdul Majid, Tae-Sun Choi
:
Computerized Detection of Pulmonary Nodule Based on Two-Dimensional PCA. 693-702 - Adriana Vlad, Adrian Luca

, Madalin Frunzete:
Computational Measurements of the Transient Time and of the Sampling Distance That Enables Statistical Independence in the Logistic Map. 703-718 - Robert Steele, Amanda Lo:

Future Personal Health Records as a Foundation for Computational Health. 719-733 - Tian Yang, Xinjie Lv, Zaifei Liao, Wei Liu, Hongan Wang:

SVM Based Decision Analysis and Its Granular-Based Solving. 734-748 - Ki-Yeol Eom, Tae-Ki Ahn, Gyu-Jin Kim, Gyu-Jin Jang, Moon-Hyun Kim:

Fast Object Tracking in Intelligent Surveillance System. 749-763 - Mohammad Shoyaib, Mohammad Abdullah-Al-Wadud

, Oksam Chae:
A Reliable Skin Detection Using Dempster-Shafer Theory of Evidence. 764-779 - Ali Amiri, Mahmood Fathy:

Video Shot Boundary Detection Using Generalized Eigenvalue Decomposition. 780-790 - Kevin Chai

, Vidyasagar M. Potdar
, Tharam S. Dillon:
Content Quality Assessment Related Frameworks for Social Media. 791-805 - Rela Puteri Pamungkas, Siti Mariyam Hj. Shamsuddin:

Weighted Aspect Moment Invariant in Pattern Recognition. 806-818 - Geng Zhao, Kefeng Xuan, David Taniar, Maytham Safar, Marina L. Gavrilova

, Bala Srinivasan:
Multiple Object Types KNN Search Using Network Voronoi Diagram. 819-834
General Track on Information Systems and Information Technologies
- Xinjie Lv, Xin Li, Tian Yang, Zaifei Liao, Wei Liu, Hongan Wang:

RRPS: A Ranked Real-Time Publish/Subscribe Using Adaptive QoS. 835-850 - Yul Chu, Amit Uppal, Jae Sok Son:

A Dynamic Packet Management in a Protocol Processor. 851-862 - Khoongming Khoo, Ford-Long Wong, Chu-Wee Lim:

On a Construction of Short Digests for Authenticating Ad Hoc Networks. 863-876 - Malik Tahir Hassan

, Khurum Nazir Junejo, Asim Karim:
Learning and Predicting Key Web Navigation Patterns Using Bayesian Models. 877-887 - Junghwan Kim, Myeong-Cheol Ko, Hyun-Kyu Kang, Jinsoo Kim:

A Hybrid IP Forwarding Engine with High Performance and Low Power. 888-899 - Nilüfer Atman

, Mustafa Murat Inceoglu
, Burak Galip Aslan:
Learning Styles Diagnosis Based on Learner Behaviors in Web Based Learning. 900-909 - Hai Dong

, Farookh Khadeer Hussain, Elizabeth Chang
:
State of the Art in Semantic Focused Crawlers. 910-924 - Toshihiro Uchibayashi

, Bernady O. Apduhan, J. Wenny Rahayu, David Taniar, Norio Shiratori:
Towards a Framework for Workflow Composition in Ontology Tailoring in Semantic Grid. 925-936 - Yan Wu, Ming Li, Haitao Zong, Xin Wang:

Fusion Segmentation Algorithm for SAR Images Based on HMT in Contourlet Domain and D-S Theory of Evidence. 937-951

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














