


default search action
2. ICIS 2009: Seoul, Korea
- Sungwon Sohn, Ling Chen, Soonwook Hwang, Kyungeun Cho, Shigeo Kawata, Kyhyun Um, Franz I. S. Ko, Kae-Dal Kwack, Jong Hyung Lee, Gang Kou, Kiyoshi Nakamura, Alvis Cheuk M. Fong, Patrick C. M. Ma:

Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009. ACM International Conference Proceeding Series 403, ACM 2009, ISBN 978-1-60558-710-3 - Kosheek Sewchurran

, Elsje Scott:
Learning and making sense of project phenomena in information systems education. 1-8 - Yasuko Kanno, Masato Terada, Hidehiro Yajima, Toshinari Kamamura, Norihisa Doi:

A comparative study on structure of the motivation for information security by security incident experiences. 9-16 - Aika Mukai, Toshiyuki Yamamoto, Makoto J. Hirayama:

A study of correlation between transitions and sound effects in a fairy tale movie. 17-20 - Rogayah Abdul Majid, Nor Laila Md. Noor, Wan Adilah Wan Adnan, Suria Mansor:

A survey on HCI considerations in the software development life cycle: from practitioner's perspective. 21-24 - Dhananjay Singh

, Hoon-Jae Lee:
Database design for global patient monitoring applications using WAP. 25-31 - Ahmed Mustafa Mahmoud, Wan Haslina Hassan:

Determinism in speech pitch relation to emotion. 32-37 - Norhaida Abdullah, Mohd Shafry, Mohd Rahim, Ismail Mat Amin:

Measuring fish length from digital images (FiLeDI). 38-43 - Umesh Hodeghatta Rao Xavier, Sanjay Mohapatra

:
Mobile technology for irrigation problems in rural India. 44-46 - Shengling Wang, Yong Cui, Ke Xu, Jian-Hui Huang, Dapeng Liu:

Proportional fairness of call blocking probability. 47-52 - Gia Kim, Siu Man Lui:

Relationship of blink, affect, and usability of graph reading tasks. 53-58 - Toshihiko Yamakami:

Star economy in the user generated content: a new perspective for digital ecosystems. 59-62 - Rattiporn Luanrattana, Khin Than Win

:
The deployment of PDA accessible clinical-log for medical education in PBL-approach. 63-68 - Wan Norizan Wan Hashim, Nor Laila Md. Noor, Wan Adilah Wan Adnan:

The design of aesthetic interaction: towards a graceful interaction framework. 69-75 - Atif Latif, Muhammad Tanvir Afzal

, Patrick Höfler
, Anwar Us Saeed, Klaus Tochtermann:
Turning keywords into URIs: simplified user interfaces for exploring linked data. 76-81 - Yu Cheng, Tao Zhang

, Song Chen:
VisionSynaptics: a system convert hand-writing and image symbol into computer symbol. 82-85 - A. Murali M. Rao:

Web-enabled user support services system in distance learning. 86-90 - Hyun-Jong Kim, Jeong Yun Kim, Seong Gon Choi:

A method to support multiple interfaces mobile nodes in PMIPv6 domain. 91-96 - Zhao-Zhi Pan, Yu Hong, Jian-Min Yao:

A multiple bayes classification solution to word sense disambiguation. 97-99 - Jianbo Ye, Qingbo Zhang, Guogang Huang:

A multiuser diversity based time-frequency two dimensional adaptive resource allocation algorithm for WiMAX. 100-103 - Alessandra De Paola

, Salvatore Gaglio, Giuseppe Lo Re
, Marco Ortolani
:
An ambient intelligence architecture for extracting knowledge from distributed sensors. 104-109 - Weiping Li:

An analysis of new features for workflow system in the SaaS software. 110-114 - Chin-Hung Wang, Tzu-Chieh Wei, Po-Chin Lee, Chia-Chun Wu:

An improvement of secure authentication scheme with full anonymity for wireless communications. 115-118 - Junmin Zhu:

Approximation for minimum total dominating set. 119-124 - Pham Thi Thu Thuy, Young-Koo Lee, Sungyoung Lee:

DTD2OWL: automatic transforming XML documents into OWL ontology. 125-131 - Weili Li, Lixin Yu:

Efficient line buffer instruction cache scheme with prefetch. 132-135 - Ruey-Ming Chao, Hsien-Chu Wu, Zi-Chun Chen:

Image segmentation by automatic histogram thresholding. 136-141 - Elise de Doncker, Karlis Kaugars, Shujun Li, Haisen S. Li, Yoshimitsu Shimizu, Junpei Fujimoto, Fukuko Yuasa

, Tadashi Ishikawa
, Nobuyuki Hamaguchi:
Interdisciplinary applications of mathematical modeling. 142-148 - Mangal Sain

, Hoon-Jae Lee, Wan-Young Chung:
Middleware in ubiquitous computing system with MedRec architecture. 149-154 - Hong-Hao Chen, Cheng-Chi Lee

, Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai:
Multi-level visual secret sharing scheme with smooth-looking. 155-160 - Mahshid S. Ehsaei, Abolfazl Toroghi Haghighat:

Pattern-based planning system for complex environments. 161-167 - Yoon-Ho Cho, Sang-Hyun Park, SangKeun Lee:

PhraseRank for document clustering: reweighting the weight of phrase. 168-174 - Abdul Majid, Yeon Soo Lee:

Predicting lattice constant of cubic perovskites using support vector regression. 175-183 - Oliver Zweigle, René van de Molengraft, Raffaello D'Andrea, Kai Häussermann:

RoboEarth: connecting robots worldwide. 184-191 - Muhammad Usman Khan, Shoab Ahmed Khan:

Social networks identification and analysis using call detail records. 192-196 - Oliver Zweigle, Kai Häussermann, Uwe-Philipp Käppeler, Paul Levi:

Supervised learning algorithm for automatic adaption of situation templates using uncertain data. 197-200 - Vincenza Carchiolo

, Alessandro Longheu
, Michele Malgeri, Giuseppe Mangioni:
The effect of malicious peers in a gossip-based reputation system. 201-205 - Toshihiko Yamakami:

Foundation-based mobile platform software engineering: implications to convergence to open source software. 206-211 - Toshihiko Yamakami:

An interactivity model of mobile interactive TV: a oneseg case for mobile glue. 212-217 - Youngkon Lee:

Double layered SOA test architecture based on BPA - simulation event. 218-223 - Tzong-Heng Chi, Chia-Chien Lin, Wei-Chen Lin:

Intraorganizational power verified interactive genetic algorithms for the design of logistics network. 224-229 - Mira Kajko-Mattsson:

Laying out the scope of developers' risk management responsibilities. 230-235 - Makoto J. Hirayama, Toshiyuki Yamamoto:

Network response analyzer system for interactive lectures in classroom or distance learning. 236-239 - Mira Kajko-Mattsson:

SLA management process model. 240-249 - Xinyan Zhao, Ge Wei, Lu Tingjie:

Study on consumer demands and merchant participation motives of mobile payment services in China. 250-255 - Pardeep Kumar

, Sang il Cho, Hoon-Jae Lee:
PingPong-MAC: secure ubiquitous sensor network with authenticated encryption. 256-260 - Ok-Hue Cho, Jae-Joon Cho, Kil-Sang Yoo, Won-Hyung Lee:

A study on bio feedback based interactive work for expressing human cytochemism in real-time. 261-264 - Qian Wei, Jingsha He

, Huiying Shao:
A directed signature scheme and its application to group key initial distribution. 265-269 - Wonyoung Kim, Joonsuk Ryu, Kyu Il Kim, Ung-Mo Kim:

A method for opinion mining of product reviews using association rules. 270-274 - Hoang-Anh Pham, Van-Hieu Bui, Anh-Vu Dinh-Duc:

An adaptive, memory-efficient and fast algorithm for Huffman decoding and its implementation. 275-279 - Zheng Min, Li Yang:

An extended version of scaled small gain condition. 280-282 - Ki-Il Kim

, Hye-Jin Lee, Sangjoon Park, Hyeon Park:
New link estimation for reliability in wireless sensor networks. 283-286 - Joonsuk Ryu, Wonyoung Kim, Kyu Il Kim, Ung-Mo Kim:

Mining opinions from messenger. 287-290 - Peisheng Wang, Haiyang Quan, Fuqiang Zhang, Zhiyong Hu:

A novel fully-differential switched capacitor chopper stabilized cascade sigma-delta modulator for MEMS gyroscope. 291-294 - Jinhee Park, Jinwook Chung:

Network selection based on network service zone for macro mobility. 295-299 - Ibrahim Furkan Ince

, Yücel Batu Salman, Mustafa Eren Yildirim:
A user study: the effects of mobile phone prototypes and task complexities on usability. 300-302 - Mingjie Zhou, Li Wang

, Jianxin Zhang:
Developing a computer system for health assessment. 303-306 - Xiuhua Jiang, Yuxia Wang, Caihong Wang:

No-reference video quality assessment for MPEG-2 video streams using BP neural networks. 307-311 - Yücel Batu Salman, Ibrahim Furkan Ince

, Ji Young Kim, Hong-In Cheng, Mustafa Eren Yildirim:
Participatory design and evaluation of e-learning system for Korean language training. 312-319 - Junfeng Tian, Yuzhen Lu, Peng Yuan:

A weighted closeness-based trust combination model. 320-325 - Chengying Mao

:
Experiences in security testing for web-based applications. 326-330 - Fatemeh Saghafi, Fatemeh NasserEslami, Maryam Esmaili:

Ranking secure technologies in security provision financial transactions mobile commerce. 331-336 - Li Wenyi:

Financial performance evaluation of China's listed steel companies from creditors' perspective. 337-341 - Jia Zhang, Hong Pan, Zhenming Yuan

:
A novel spatial index for case based geographic retrieval. 342-347 - Dongming Chen:

An effective solution for community identification. 348-351 - Wang Liu, Chunhui Zhao:

Digital watermarking for volume data based on 3D-DWT and 3D-DCT. 352-357 - Yujie Yao, Haopeng Chen:

QoS-aware service composition using NSGA-II1. 358-363 - Bin Chen, Bin Li, Zhisong Pan:

SVDD regularized with area under the ROC. 364-368 - Jingdong Chen, Wei Han:

The research on the service marketing strategies and empirical based on the product value. 369-374 - Jingdong Chen, Qisong Zhu:

The theory and empirical research of differentiation benefit positioning based on product value. 375-380 - Jingdong Chen, Xiaoqian Gao:

The theory and empirical research of network marketing based on relational value. 381-385 - Hong-qin Zhang, Song-lin Yang, Yong-cheng An, Jun-jie Zhao, Wu-xing He:

Information processing of the hull structure oriented to ship structure knowledge-type military specification. 386-389 - Song-lin Yang, Hong-qin Zhang, Yong-cheng An, Hai-bian Cheng, Wu-xing He:

Ship structure knowledge-based military specification virtual test system's design. 390-393 - Chung-Hsin Liu, Chun-Lin Lo:

The analysis of DDoS attack for the video transmission. 394-399 - Chung-Hsin Liu, Wei-Yu Chen:

The effectiveness of the handheld devices based on mobiles learning. 400-405 - Chung-Hsin Liu, Sheng-Shiang Chang, Zhao-Cheng Ye:

The study for the optimal routing of Bluetooth Piconet. 406-411 - Chung-Hsin Liu, Sheng-Shiang Chang:

The study of effectiveness for ad-hoc wireless network. 412-417 - Chung-Hsin Liu, Po-Cheng Teng, Chun-Lin Lo, Kuo-Hao Lee:

The study of the wireless network DoS attack. 418-421 - Chung-Hsin Liu, Chien-Yun Lo:

The study of WSN routing. 422-428 - Zhiyong Zeng, Zhiqiang Yao, Shigang Liu:

An efficient and effective image representation for region-based image retrieval. 429-434 - Zhiyong Zeng, Xuemei Ding, Shigang Liu:

An efficient region-based image representation using Legendre color distribution moments. 435-439 - Gaoshou Zhai, Yufeng Zhang, Chengyu Liu, Na Yang, Minli Tian, Hengsheng Yang:

Automatic identification of covert channels inside Linux kernel based on source codes. 440-445 - Gaoshou Zhai, Wenlin Ma, Minli Tian, Na Yang, Chengyu Liu, Hengsheng Yang:

Design and implementation of a tool for analyzing SELinux secure policy. 446-451 - Selim Mimaroglu, A. Murat Yagci

:
A binary method for fast computation of inter and intra cluster similarities for combining multiple clusterings. 452-456 - Khalid Aldrawiesh, Ajlan Suliman Al-Ajlan, Yazed Al-Saawy, Abdullah Bajahzar

:
A comparative study between computer programming languages for developing distributed systems in web environment. 457-461 - Qiang Sun, Shasha Cao, Nianshen Chen:

A maximum network lifetime QoS routing algorithm in MANETs. 462-467 - Shu-Ching Wang, Kua-Qin Yan, Shun-Sheng Wang, C. P. Huang:

Achieving high efficient agreement with malicious faulty nodes on a cloud computing environment. 468-473 - Svetlana Kim, Yongik Yoon:

Adaptation e-learning contents in mobile environment. 474-479 - Hamad I. Alsawalqah, Komi S. Abotsi, Danhyung Lee:

An automated mechanism for organizing and retrieving core asset artifacts for product derivation in SPL. 480-485 - Munkhbat Luvsanbyamba, In Keun Chung:

An empirical study of success factors on business-to-business e-marketplaces from buyers' and sellers' perspectives. 486-491 - Jun Pyo Park, Chang-Sup Park, Min Kyoung Sung, Yon Dohn Chung:

Attribute summarization: a technique for wireless XML streaming. 492-496 - The-Dung Pham, Hung Quoc Ngo, Sungyoung Lee, Young-Koo Lee:

Averaging approach for distributed event detection in wireless sensor networks. 497-501 - Chin-Bang Yao:

Context-aware customization e-learning system with intelligent on-line examination mechanism. 502-507 - Hazim Iscan, Oguz Findik

, Halife Kodaz
, Ali Erdi:
Designing a special purpose e-commerce website. 508-513 - Yun-Hong Noh, Do-Un Jeong:

Development and estimation of ubiquitous unconstrained BCG monitoring system using wireless sensor node. 514-520 - Md. Rakibul Haque, Md. Ashik Faisal Khan, Md. Atiqul Islam, Mahmuda Naznin

:
DPUid: distributed algorithm for proximity-based unique id in wireless sensor networks. 521-525 - Mohammad Zeynali

, Leili Mohammad Khanli
, Amir Mollanejad
:
EDARP: novel energy and distance-aware routing protocol in wireless sensor network. 526-533 - Pattaraporn Klangpraphant, Pattarasinee Bhattarakosol

:
e-mail authentication system: a spam filtering for smart senders. 534-538 - Dhananjay Singh

, Hoon-Jae Lee, Wan-Young Chung:
An energy consumption technique for global healthcare monitoring applications. 539-542 - Diana Poovathingal Lazar, Navrati Saxena, Hari Mohan Gupta, Swades De

:
Handover support for converged inter-RAT networks. 543-549 - Seifu Tatek Yazhy, Seung-Kyu Park:

Hierarchical service-oriented routing of queries in wireless sensor networks. 550-554 - Sang-Ho Na, Kyu-Jin Kim, Mohammad Mehedi Hassan, Eui-nam Huh:

Identity-based secure protocol scheme for wireless sensor network. 555-560 - Tyrone Edwards, Suresh Sankaranarayanan

:
Intelligent agent based hospital search & appointment system. 561-567 - Mariano Perez Pelaez, Toshiya Fujii, Wonsuk Nam, Masaki Yachiune, Ikuro Choh:

Legible+: integrated system for remote collaboration through document creation. 568-570 - S. Britto R. Kumar

, S. Albert Rabara, J. Ronald Martin:
MPCS: a secure Mobile Payment Consortia System for higher educational institutions. 571-579 - J. G. R. Sathiaseelan, S. Albert Rabara, J. Ronald Martin:

Multi-Level Secure Framework (MLSF) for composite web services. 580-585 - Yongxu Piao, Wooseok Ryu, Haipeng Zhang, Bonghee Hong:

Optimization of continuous query processing for RFID sensor tag data stream. 586-591 - Duklon Stenett, Suresh Sankaranarayanan:

Personal mobile information system. 592-598 - Toru Yazawa, Tomoo Katsuyama:

Premature ventricular contractions, a typical extra-systole arrhythmia, lowers the scaling exponent: DFA as a beneficial biomedical computation. 599-604 - Jong-Moon Chung, Myungjun Choi, Yong-Suk Park, Ho Kim, Hyundo Kim:

Relative navigation and situation awareness information distribution for GPS information deficient situations. 605-609 - Md. Monzur Morshed, Md. Habibur Rahman, Md. Rezaur Rahman Mazumder, K. A. M. Lutfullah:

Simulation and analysis of ad-hoc on-demand distance vector routing protocol. 610-614 - Hathairat Ketmaneechairat, Phoemphun Oothongsap, Anirach Mingkhwan:

Smart buffer management for different start video broadcasting. 615-619 - Shaishav Agrawal, Tanveer J. Siddiqui

:
Using syntactic and contextual information for sentiment polarity analysis. 620-623 - Hsein-Ping Kew, Do-Un Jeong:

Wearable patch-type ECG using ubiquitous wireless sensor network for healthcare monitoring application. 624-630 - Ke Zuo, Quanyuan Wu:

6DMPP: small worlds in mobile peer-to-peer networks. 631-636 - R. Lakshmi Priya

, Nabendu Chaki
:
A study on QoS issues for mobile ad-hoc networks. 637-642 - E. R. Naganathan, P. Eugene Xavier:

Architecting autonomic computing systems through Probabilistic Software Stability Model (PSSM). 643-648 - Yo-Ping Huang, Vu Thi Thanh Hoa:

General criteria on building decision trees for data classification. 649-654 - Farah Layouni, Yann Pollet:

QoS implementation in a federated identities system. 655-657 - Nicolás Macia, Paula Venosa, Luis Marrone:

Requirements for troubleshooting wi-fi network security through location technologies. 658-663 - Mohammad Shoyaib, Jo Moo Youl, Mohammad Abdullah-Al-Wadud

, Oksam Chae:
A framework for digital cosmetic system. 664-669 - Ricardo Alexandre, Paula Prata

, Abel João Padrão Gomes
:
A grid infrastructure for online games. 670-673 - Yunsick Sung, Kyungeun Cho, Kyhyun Um:

A reward field model generation in Q-learning by dynamic programming. 674-679 - Supatach Chaksaen, Chanboon Sathitwiriyawong:

Buffer and loss monitoring for the control of multimedia data streaming rate on mobile ad hoc networks. 680-684 - Yan Zhang, Zhou Zhaoxing, Xiao Han:

Category specific SIFT descriptor and its combination with color information for content-based image retrieval. 685-690 - MyoungHee Cha, Kyungeun Cho, Kyhyun Um:

Design of memory architecture for autonomous virtual characters using visual attention and quad-graph. 691-696 - Korakot Prachumrak:

Weighted Finite Automata encoding over Thai language. 697-701 - Berdakh Abibullaev

, Hee Don Seo, Won-Seok Kang
, Jinung An:
A wavelet based method for detecting and localizing epileptic neural spikes in EEG. 702-707 - Hyontai Sug:

An empirical improvement of the accuracy of RBF networks. 708-712 - Jungkuk Kim, Minkyu Kim, Daesun Kim, Jaehyun Park, Woong Huh:

An event detection algorithm in ECG with 60Hz interference and baseline wandering. 713-716 - Chenghe Shi, Renquan Liu, Yuhao Zhao, Xiujuan Wang:

Applying complex system entropy cluster algorithm to mining principle of herbal combinations in traditional Chinese medicine. 717-721 - Mohammad Abdullah-Al-Wadud

, Yoojin Chung:
Detecting mitochondria in fluorescence images. 722-725 - Ismail Babaoglu, Oguz Findik

, Erkan Ülker
:
Effects of discretization on determination of coronary artery disease using support vector machine. 726-729 - Saleh Ahmed, Shamim Ahmad, Md. Omar Faruqe, Md. Rashedul Islam

:
EMG signal decomposition using wavelet transformation with respect to different wavelet and a comparative study. 730-735 - Huang-Cheng Kuo, Kuan-Yu Su, Ping-Lin Ong, Jen-Peng Huang:

Learning a prediction model for protein-protein recognition. 736-741 - Hong-Seok Na, Youn-Sik Choi, Tae-Soo Park:

Mobile robot for personal exercise training in ubiquitous healthcare environment. 742-744 - Thinn Mya Mya Swe, Nan Sai Moon Kham:

Ontology-based medical diagnostic knowledge structuring using case-based reasoning methodology. 745-749 - Luigi Gallo

, Antonio Coronato
:
Pervasive distributed volume rendering in a lightweight multi-agent platform. 750-755 - Halife Kodaz

, Ismail Babaoglu, Hazim Iscan:
Thyroid disease diagnosis using Artificial Immune Recognition System (AIRS). 756-761 - Seena Biju, Sreekumaran Nair:

A literature review for a 6-sigma perception of academic quality. 762-767 - Muhammad Saleem, Rasheed Hussain, Yasir Ismail, Shaikh Mohsin:

Cost effective software engineering using program slicing techniques. 768-772 - Jian Wang, Rui Chen, Pengyan Zhang, Ningjie Yu:

Fault tree analysis in city lifeline system operations and management-theory and application. 773-777 - Shan-yan Huang

, Han-yuh Liu:
A perspective of two-dimensional process integration customer relationship management driven business model. 778-783 - Jihah Nah, JongWeon Kim, Jaeseok Kim:

A new robust forensic marking using peak position modulation for video. 784-789 - Guowei Xue, Yan Zhang, Jia Li:

An improved backprojection algorithm for spiral cone-beam CT with an improved ray traverse algorithm. 790-795 - Porawat Visutsak

, Veera Boonjing, Korakot Prachumrak:
Knowledge-based approach for 3D skeleton extraction. 796-801 - Semin Kim

, Hyun-seok Min
, Jaehyun Jeon, Yong Man Ro
, Seungwan Han:
Malicious content filtering based on semantic features. 802-806 - Juryon Paik

, Junghyun Nam, Wonyoung Kim, Joonsuk Ryu, Ung-Mo Kim:
Mining association rules in tree structured XML data. 807-811 - Saeed Reza Aghabozorgi, Ying Wah Teh

:
Recommender systems: incremental clustering on web log data. 812-818 - Huy Thao Vu, Minh Thiep Ha, Jong-myung Rhee:

A Localized Software-based approach for Fault-Tolerant Ethernet (LSFTE). 819-823 - Madhusudan Singh

, Sanggon Lee:
Decentralized Hybrid Wireless Mesh Protocol. 824-829 - HwangSoo Park, Jin YouLin, Sang Boem Lim, Jung-Hun Woo

, Suhyang Kim, Young Sunwoo, Minghe Piao:
Design issues of integrated subway air quality management system base on particulate matter measurements. 830-834 - Hui Liu, Yeong-Sam Kim, Seong-Hyun Jang, Jong-Wha Chong:

Efficient implementation of hybrid automatic gain control algorithm for chirp spread spectrum. 835-838 - Seungmin Han, Mohammad Mehedi Hassan, Changwoo Yoon, Eui-nam Huh:

Efficient service recommendation system for cloud computing market. 839-845 - Li Xia, Zhong Cheng, Qu Zeng-Yan:

Multi-round scheduling for divisible loads on the heterogeneous cluster systems of multi-core computers. 846-852 - Su Su Hlaing:

Ontology based schema matching and mapping approach for structured databases. 853-859 - Rishi Pal Singh, D. K. Lobiyal

:
Performance modeling of slotted MACA-BI MAC protocol for mobile ad hoc networks. 860-862 - Dong Kyoo Kim, Dong Yong Kwak:

Performance of Phase-Silence-Shift-Keying for additive white Gaussian noise and fading channels. 863-865 - Ting Chen, Yongjian Wang, Yinan Ren, Cheng Luo, Depei Qian, Zhongzhi Luan:

R-ECS: reliable elastic computing services for building virtual computing environment. 866-872 - Samad S. Kolahi, Zhang Qu, Burjiz K. Soorty, Navneet Chand:

The performance of IPv4 and IPv6 using UDP on IEEE 802.11n WLANs with WPA2 security. 873-876 - Ali Asghar Khavasi, Nastooh Taheri Javan

:
Using zone-disjoint multi-path routing algorithm for video transmission over ad-hoc networks. 877-882 - Fayçal Bessayah, Ana R. Cavalli

, Eliane Martins:
A formal approach for specification and verification of fault injection process. 883-890 - Supachai Tangwongsan, Sathaporn Kassuvan:

A highly effective model for security protection against eavesdropping exploits. 891-895 - JeaHoon Park, KiSeok Bae, Sang-Jae Moon, Dooho Choi

, You Sung Kang, JaeCheol Ha:
A new fault cryptanalysis on montgomery ladder exponentiation algorithm. 896-899 - Minoru Kuribayashi

:
A study of traceability of CDMA-based fingerprinting scheme. 900-905 - Chuanfu Chen, Yushuang Fu, Dan Wu, Congjing Ran, Kai Sun, Gang Wu:

Access to culture and information through library: a perspective on Chinese copyright law reformation. 906-911 - Heng-Sheng Chen, Tsang-Yean Lee, Huey-Ming Lee:

Collect and broadcast news in security. 912-917 - Ali Mohammed Noori Hasan:

Design and simulation of a modified perturbed digital chaotic signal generator for secure data communication. 918-922 - Jungyeop Kim, Sungeon Hong:

Development of digital watermarking technology to protect cadastral map information. 923-929 - Mati Pinyathinun, Chanboon Sathitwiriyawong:

Dynamic policy model for target based intrusion detection system. 930-934 - Yasuyuki Murakami, Tatsuo Douzono, Takeshi Nasako:

Relationship between weight of plaintext and successful attacks in knapsack cryptosystems. 935-939 - Misagh Mohammadizadeh, Ali Movaghar

, Seyad Mohammad Safi:
SEAODV: secure efficient AODV routing protocol for MANETs networks. 940-944 - Oguz Findik

, Ismail Babaoglu, Erkan Ülker
:
Watermarking schema using an artificial immune system in spatial domain. 945-950 - Chien-Yuan Lai, Hsiu-Sen Chiang, Ching-Chiang Chen, Shih-Hao Chou:

Web service description for mobile phone virus. 951-956 - I. S. Amrutha, S. S. Shylaja, S. Natarajan, K. N. Balasubramanya Murthy:

A smart automatic thumbnail cropping based on attention driven regions of interest extraction. 957-962 - Lavare Henry, Suresh Sankaranarayanan

:
Application of intelligent agents for mobile tutoring. 963-969 - Wenlin Peng, Xiaohu Yang, Feng Zhu:

Automation technique of software internationalization and localization based on lexical analysis. 970-975 - Songpol Ongwattanakul, Dararat Srisai:

Contrast enhanced dynamic time warping distance for time series shape averaging classification. 976-981 - Deliang Jiang, Xiaohu Yang:

Converting PDF to HTML approach based on text detection. 982-985 - Hau-Dong Tsui, Chong-Yen Lee, Tsang-Yean Lee:

From the bricks to the clicks: knowledge management in e-government. 986-991 - Kenji Higuchi, Fumiko Harada, Hiromitsu Shimakawa:

Making links between goal and tasks to retrieve information from web browsing histories. 992-994 - Olga Yugay, Lee Tae Kyung, Franz I. S. Ko:

Reinforcement learning coordination with combined heuristics in multi-agent environment for university timetabling. 995-1000 - Yo-Ping Huang, Jung-Shian Jau, Frode Eika Sandnes

:
Temporal-spatial association analysis of ocean salinity and temperature variations. 1001-1006 - Erkan Ülker

, Ahmet Arslan:
The approximation of interval Bezier curves by a fuzzy rule-based system. 1007-1012 - Miran Han, Peom Park:

A study of interface design for widgets in web services through usability evaluation. 1013-1018 - Wong Seng Yue

, Nor Azan Mat Zin
:
Usability evaluation for history educational games. 1019-1025 - Peter D. Dawoud, Dawoud S. Dawoud, R. Peplow:

A proposal for secure vehicular communications. 1026-1032 - Sangwook Bae, Keo Oudom, Young-Guk Ha, Sunyoung Han:

LBS system using online map in 3G networks environment. 1033-1037 - Wenna Li, Jianwei Leng, Zhibo Niu:

An approach to combining ActiveX with MATLAB in power electronics education. 1038-1043 - Wenying Zeng, Yuelong Zhao, Kairi Ou, Wei Song:

Research on cloud storage architecture and key technologies. 1044-1048 - Marie Kim, Hwang Jae Gak, Cheol Sig Pyo:

Practical RFID + sensor convergence toward context-aware X-reality. 1049-1055 - Hai Zhang, Xuyang Zhu, Wenming Guo:

TCP portscan detection based on single packet flows and entropy. 1056-1060 - Jinhee Park, Jinwook Chung:

Virtual shared network for WBANs communication with different RF channel. 1061-1065 - Hyeon-Seok Kim, Chan Jung Park, Seong Baeg Kim:

Improvement of Jeju National Museum service using mobile RFID. 1066-1071 - Chun-Ying Liu, Huan-Sen Li, Jin-Xiang Dong:

A new dots homogenization algorithm in digital screening technology. 1072-1076 - Min-Chul Park

, Kyung Joo Cheoi:
A perceptive viewpoint controller for the Free-Viewpoint TV. 1077-1080 - Mohd Helmy Abd Wahab

, Danial Md. Nor
, Afizah Abdoll Mutalib, Ayob Johari, Rahmat Sanudin
:
Development of integrated e-parcel management system with GSM network. 1081-1085 - Mi Zhang, Guang Hu, Shi-liang Tu, ZhiLei Chai:

Dynamic Electronic Design Automation concept, benefit and framework. 1086-1090 - Jihye Lee, Yong-Ik Yoon:

A harmonized media service middleware using the emotional knowledge. 1091-1094 - Shi-Huang Chen, Shih-Hao Chen:

Content-based music genre classification using timbral feature vectors and support vector machine. 1095-1101 - Wei Xiong, Xiuyan Jiang, Dejian Ye:

Disk I/O based load balancing in VOD system. 1102-1105 - J. Wang, Y. C. Jeung, J. W. Chong:

Improved block truncation coding using low cost approach for color image compression. 1106-1109 - Byungsung Lee, Junchul Chun:

Manipulation of virtual objects in marker-less AR system by fingertip tracking and hand gesture recognition. 1110-1115 - Sung-Soo Kim, Joo-Haeng Lee, Seung-Woo Nam:

Realistic rendering system using the measured BRDFs. 1116-1121 - Joon-Ho Lim, Soo-Jun Park, Hyunchul Jang, Sunhee Park:

BioProber2.0: a unified biomedical workbench with mining and probing literatures. 1122-1125 - Jianting Zhou, Jianxi Yang, Diankun Wu:

A method for analysis linear correlation for multi-sensor of bridge monitoring system. 1126-1129 - Leonardo S. Kury A. Mendes, Anselmo Cardoso de Paiva

, Cláudio de Souza Baptista, Aristófanes Corrêa Silva
:
Content based mammography images retrieval using Ripley's K function. 1130-1135 - Myungho Lee, Jin-hong Jeon, Jongwoo Bae, Hyuk-Soo Jang:

Parallel implementation of a financial application on a GPU. 1136-1141 - Zhenhan Liu, Xiaoxuan Meng, Lu Xu:

Lock management in blue whale file system. 1142-1147 - Jaehwan Kim, Jung-Yeol Oh, Hyung-Soo Lee, Jae-Young Kim:

Modified phase silence shift keying with phase offset for WBAN systems. 1149-1151 - Jun Li, Zhenjing Chen:

Sliding-window caching algorithm for streaming media server. 1152-1159 - Tae-Sub Kim, Ryong Oh, Sangjoon Lee, Suk-Ho Yoon, Choong-Ho Cho, Seungwan Ryu:

Vertical handover between LTE and wireless LAN systems based on common resource management (CRRM) and generic link layer (GLL). 1160-1166 - Do-Yoon Ha, Hwankuk Kim

, KyoungHee Ko, Chang-Yong Lee, JeongWook Kim, Hyun-Cheol Jeong:
Design and implementation of SIP-aware DDoS attack detection system. 1167-1171 - Xiaohu Lv, Yongxin Liu:

A bionic gait programming algorithm for hexapod robot. 1172-1175 - Wiboonsak Watthayu, Puchong Praekhao:

A concept in error correction of text editors: case study Thai-English set. 1176-1180 - Sunghan Lim, Hyunsuk Kim:

Analysis of effect of highway ITS incident management system. 1181-1184 - Min-Chul Park

, Kyung Joo Cheoi:
Automatic focusing attention for a stereo pair of image sequence. 1185-1190 - Ho-Sub Yoon, Hong-Chang Lee, Jae-Yeon Lee:

Automatic number plate detection for Korean vehicles. 1191-1195 - Hyunsuk Kim, Sunghan Lim:

Before and after evaluation of highway ITS based infrastructure project. 1196-1200 - Heon Gyu Lee, Yonghoon Choi, Jin-Ho Shin:

Spatio-temporal mining for power load forecasting in GIS-AMR load analysis model. 1201-1206 - Haifen Chen, Guangming Lu, Rui Wang:

A new palm vein matching method based on ICP algorithm. 1207-1211 - Aurobi Das, V. Balakrishnan:

A next generation smart energy technology. 1212-1218 - Xiao Jia, Yuan Wenming, Wang Dong:

Complex event processing model for distributed RFID network. 1219-1222 - Wang PeiFeng, Li Yang, Cai MingWei, Wang JiChao, Li QingRu:

Non-model self-learning control of nonlinear system. 1223-1226 - B. K. Tripathy

, G. K. Panda:
On some properties of covering based approximations of classifications of sets. 1227-1232 - Jiangning Cui, Bihui Duan, Hong Liu, Taoying Liu:

ILemo: a web platform to integrate personal data and services. 1233-1238 - Guoqiang Cai, Dechen Yao, Jianwei Yang, Yong Qin:

Adaptive control of response in a rotor with loose foundation. 1239-1243 - Jiuchun Ren, Dilin Mao, Zhiwei Wang:

A neural network based model for VoIP speech quality prediction. 1244-1248 - Zengjie Cao, Yuanyuan Lin:

The usage of coarse wordage: a study of the mob rule on China's internet. 1249-1252 - Jiajun Wen, Yinwei Zhan

:
Vision-based two hand detection and tracking. 1253-1258 - Amna Ali

, Ali Tufail
, Umer Khan, Minkoo Kim:
A survey of prediction models for breast cancer survivability. 1259-1262 - Ying Zhang, Dongxiu Niu:

Characteristics of firms with effective internal control: evidence from Chinese companies. 1263-1268 - Tangjianfeng, Zhangxianing, Wangjicheng:

Research of computer simulation system based on SOA. 1269-1273 - Tangjianfeng, Huangxianbin, Wangjicheng:

Research of mainframe CICS application integration using CICS SCA. 1274-1277 - Yujuan Yang, Sidan Du:

A stereo algorithm using edge-based orthogonal dynamic programming. 1278-1283 - Cheng Zhou, Haopeng Chen:

An objective and automatic feedback model for QoS evaluation. 1284-1289 - Dingju Zhu, Jianping Fan:

Parallel integration model. 1290-1292 - Jingfeng Xue, Changzhen Hu, Kunsheng Wang, Rui Ma, Jiaxin Zou:

Metamorphic malware detection technology based on aggregating emerging patterns. 1293-1296 - Amit Kumar Choudhary, Akhilesh Swarup:

Neural network approach for intrusion detection. 1297-1301 - Vivaksha J. Jariwala

, Devesh C. Jinwala
:
A taxonomy of security attacks on the advanced encryption standard. 1302-1305 - Weihui Dai

, Yue Yu, Bin Deng:
BinText steganography based on Markov state transferring probability. 1306-1311 - Janderson R. Oliveira, Edson A. S. Filho, Roseli A. F. Romero:

Mathematical morphology filters applied to an image skeletonization method to generation of topological maps. 1312-1317 - Rahul Kala

, Anupam Shukla
, Ritu Tiwari
:
Robotic path planning using multi neuron heuristic search. 1318-1323 - Chong Fu, Zhiliang Zhu:

An image denoising method by using hybrid fractal-wavelet coding. 1324-1329 - Fang Yuan, Ping Xiao, Qixin Liu, Xiaolong Fu:

Digital campus information portal content organization based on "information architecture". 1330-1334 - Di Xie, Ruofeng Tong, Hongsen Wu:

Multi-channel video-based parallel fire detection acceleration method using multi-cores. 1335-1340 - Jian-Feng Hu

:
Multifeature biometric system based on EEG signals. 1341-1345 - Chi-Yen Yin, Yau-Jung Lee, Jiann-Min Yang:

Ontology: the historical review and literature productivity analysis using bibliometric methodology from 1956 to 2008. 1346-1350 - Chi-Yen Yin, Jan-Shan Lin, Jiann-Min Yang:

A study on the productivity review for management of technology using bibliometric methodology. 1351-1356 - Xumin Liu, Weixiang Xu, Yong Guan, Yuanyuan Shang:

Trigonometric polynomial uniform B-spline surface with shape parameter. 1357-1363 - Hengwu Li:

Approximation algorithm and scheme for RNA structure prediction. 1364-1367 - Yong Wang, Huihui Zhao

, Wenjing Chuo, Jianxin Chen, Shuzhen Guo, Wei Wang:
The study on the relationship between inflammatory factors and cardiac function based on chronic myocardial ischemia (syndrome of blood stasis model). 1368-1371 - Chongwon Lee:

Adapting and adjusting test process reflecting characteristics of embedded software and industrial properties based on referential models. 1372-1377 - Yawei Tian, Li Zhang:

Anatomic model on web customer satisfaction based on customer behavior. 1378-1381 - Junfeng Gao, Jiancheng Sun, Pan Lin, Chongxun Zheng, Pei Wang:

A template-based isomap algorithm for real-time removal of ocular artifacts from EEG signals. 1382-1388 - Yunxin Wang, Hongyu Li:

Annotating WSDL by CIDOC CRM. 1389-1392 - Jun Sun, Huazhu Song:

Feature extraction and reconstruction of particles reinforced metal matrix composite microstructure. 1393-1397 - Wang Zi Yang, Qin Yong, Jia Li Min:

Design of variable pitch controller for large wind turbine. 1398-1400 - B. Prasanalakshmi

, A. Kannammal:
A secure cryptosystem from palm vein biometrics. 1401-1405 - Cuibo Yu, Xuerong Gou, Shasha Chai, Xunan Wang, Yunhan Xie:

Modifying Erlang B table based upon data mining. 1406-1409 - Yerbol Nisanbayev, Huiseong Na, Dongwook Lim, Franz Ko:

Designing an electronic medical records system using design patterns. 1410-1415 - Anour F. A. Dafa-Alla, Gyoyong Sohn, Keun Ho Ryu:

Employing PRBAC for privacy preserving data publishing. 1416-1421 - K. H. Choi:

A research analysis on the concept of converging technology and converging types of information technology. 1422-1426 - B. Paramasivan, Mohaideen Pitchai, D. Usha, Radha Krishnan:

Coverage preserved optimal routing protocol for improving the quality of service in wireless sensor networks. 1427-1431 - Beom-Il Nam, Byeungwoo Jeon

:
Mobile based digital contents conversion service implementation. 1432-1436 - Jung-Yeol Oh, Jae-Hwan Kim, Hyung-Soo Lee, Jae-Young Kim:

A pi/4-shifted differential 8PSSK modulation for high data rate WBAN system. 1437-1440 - Sadhana Yogesh Ghalsasi:

Critical success factors for event driven service oriented architecture. 1441-1446 - Xinyan Zhao, Wei Ge, Tingjie Lu:

Study on consumer demands and merchant participation motives of mobile payment services in China. 1447-1451 - Chaofan Dai, Mingli Wang:

Distributed requirement elicitation and negotiation based on the hall for workshop of meta-synthetic engineering. 1452-1456 - Devinder Kaur, A. Holland:

Comparative Analysis of ANN trained with Back Propagation and Genetic Algorithm for Implementation of Exclusive-OR Problem. 1457-1460 - Jong Won Yang, Kim Jae Hum, Kim Soo Hyun, Young-Hwan Bang, Sang Dong Lee:

Design and Proposal of a Next Generation Digital Cable Broadcasting Service-Based System Using Cloud Storage Computing Environments. 1461-1465 - Tomohiro Shintani, Ryuichi Sakai:

Cryptanalysis on 2 Dimensional Subset-sum Public Key Cryptosystem. 1466-1469

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














