


default search action
AST/UCMA/ISA/ACN 2010: Miyazaki, Japan
- Tai-Hoon Kim, Hojjat Adeli:

Advances in Computer Science and Information Technology, AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings. Lecture Notes in Computer Science 6059, Springer 2010, ISBN 978-3-642-13576-7
Information Security and Assurance
- Nurzaini Mohamad Zain, Ganthan Narayana Samy

, Rabiah Ahmad, Zuraini Ismail
, Azizah Bt Abdul Manaf:
Fuzzy Based Threat Analysis in Total Hospital Information System. 1-14 - Bo Zhang

, Qiuliang Xu:
An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model. 15-27 - Yingqi Lu, Cheng Lu, Miao Qi, Shuyan Wang:

A Supervised Locality Preserving Projections Based Local Matching Algorithm for Face Recognition. 28-37 - Moussa Ouedraogo, Haralambos Mouratidis

, Eric Dubois
, Djamel Khadraoui:
Information Systems Security Criticality and Assurance Evaluation. 38-54 - Muhammad Khurram Khan

, Khaled Alghathbar:
Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'. 55-60 - Debnath Bhattacharyya

, Arup Kumar Bhaumik, Minkyu Choi, Tai-Hoon Kim:
Directed Graph Pattern Synthesis in LSB Technique on Video Steganography. 61-69 - Dakshina Ranjan Kisku

, Phalguni Gupta, Jamuna Kanta Sing:
Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-Based Improved K-Medoids Partitioning. 70-81 - Pierre-Louis Cayrel, Mohammed Meziani:

Post-quantum Cryptography: Code-Based Signatures. 82-99 - Danilo Valeros Bernardo, Doan B. Hoang:

Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol. 100-114 - Bo Li, Jianxin Li, Tianyu Wo, Xudong Wu, Junaid Arshad, Wantao Liu:

A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems. 115-128 - Neminath Hubballi, S. Roopa, Ritesh Ratti, Ferdous A. Barbhuiya, Santosh Biswas, Arijit Sur

, Sukumar Nandi
, Vivek Ramachandran:
An Active Intrusion Detection System for LAN Specific Attacks. 129-142 - Huo-Chong Ling

, Raphael C.-W. Phan
, Swee-Huay Heng:
Analysis on the Improved SVD-Based Watermarking Scheme. 143-149
Advanced Communication and Networking
- Zhian Zheng, Dang Hai Pham, Tomohisa Wada:

Applications of Adaptive Belief Propagation Decoding for Long Reed-Solomon Codes. 150-158 - Seong-Yong Choi, Jinsu Kim, Seung-Jin Han, Jun Hyeog Choi, Kee-Wook Rim, Jung-Hyun Lee:

Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks. 159-174 - Marek R. Ogiela, Urszula Ogiela:

Grammar Encoding in DNA-Like Secret Sharing Infrastructure. 175-182 - Zhiqiang Zhou, Lin Cong, Guohan Lu, Beixing Deng, Xing Li:

HATS: High Accuracy Timestamping System Based on NetFPGA. 183-195 - Junghoon Lee, Cheolmin Kim:

A Roadside Unit Placement Scheme for Vehicular Telematics Networks. 196-202 - Md. Amiruzzaman

, Hassan Peyravi, Mohammad Abdullah-Al-Wadud
, Yoojin Chung:
Concurrent Covert Communication Channels. 203-213 - Husnain Naqvi, Stevan M. Berber

, Zoran A. Salcic
:
Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks. 214-227 - Sejin Park, Yong Kim, Inchul Song, Kichul Han, Jookwang Kim, Kyungho Kim:

High Performance MAC Architecture for 3GPP Modem. 228-238 - Zhian Zheng, Yoshitomo Kaneda, Dang Hai Pham, Tomohisa Wada:

Modified Structures of Viterbi Alogrithm for Forced-State Method in Concatenated Coding System of ISDB-T. 239-249 - Nadir Shah, Depei Qian:

A New Cross-Layer Unstructured P2P File Sharing Protocol over Mobile Ad Hoc Network. 250-263 - Oladayo Salami, Antoine B. Bagula

, H. Anthony Chan:
A Model for Interference on Links in Inter-working Multi-hop Wireless Networks. 264-278 - Mahdi Khosravy, Mohammad Reza Alsharif, Katsumi Yamashita:

An Optimum ICA Based Multiuser Data Separation for Short Message Service. 279-286
Advanced Computer Science and Information Technology
- Eunjung Lee, Kyong-Jin Seo:

Multiple Asynchronous Requests on a Client-Based Mashup Page. 287-299 - Rujiang Bai, Xiaoyue Wang, Junhua Liao:

Using an Integrated Ontology Database to Categorize Web Pages. 300-309 - Yonghui Wu, Yuxin Ding, Xiaolong Wang, Jun Xu:

Topic Detection by Topic Model Induced Distance Using Biased Initiation. 310-323 - Zailani Abdullah

, Tutut Herawan
, Mustafa Mat Deris:
Mining Significant Least Association Rules Using Fast SLP-Growth Algorithm. 324-336 - Phalguni Gupta, Dakshina Ranjan Kisku

, Jamuna Kanta Sing, Massimo Tistarelli
:
Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition. 337-344 - Praveen Ranjan Srivastava, Tai-Hoon Kim:

Agent Based Approach to Regression Testing. 345-355 - Lianbo Gao, Jianming Shi

:
A Numerical Study on B&B Algorithms for Solving Sum-Of-Ratios Problem. 356-362 - Mihye Kim, Kwan-Hee Yoo, Chan Park, Jae-Soo Yoo:

Development of a Digital Textbook Standard Format Based on XML. 363-377 - Hao Xu:

A Pattern-Based Representation Approach for Online Discourses. 378-384 - Woonsuk Suh, Boo-Mann Choung, Eunseok Lee

:
A Fault Tolerant Architecture for Transportation Information Services of E-Government. 385-396 - Pavan Kumar Pandey, G. P. Biswas:

Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS. 397-408 - Rujiang Bai, Xiaoyue Wang, Junhua Liao:

Extract Semantic Information from WordNet to Improve Text Classification Performance. 409-420 - Hao Xu:

Managing Ubiquitous Scientific Knowledge on Semantic Web. 421-430 - Hao Xu:

A Semantic Pattern Approach to Managing Scientific Publications. 431-434 - Mitsuhiro Kimura, Takaji Fujiwara:

A Bootstrap Software Reliability Assessment Method to Squeeze Out Remaining Faults. 435-446 - Bo Zhou, Hiroyuki Okamura

, Tadashi Dohi
:
Markov Chain Monte Carlo Random Testing. 447-456 - Osamu Mizuno

, Hideaki Hata
:
An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics. 457-468
Ubiquitous Computing and Multimedia Applications
- Yingqi Lu, Cheng Lu, Miao Qi:

An Effective Video Steganography Method for Biometric Identification. 469-479 - Bibhas Chandra Dhara, Sanjoy Kumar Saha, Bhabatosh Chanda:

A Video Coding Technique Using Octagonal Motion Search and BTC-PF Method for Fast Reconstruction. 480-490 - Soumya Banerjee, Hameed Al-Qaheri, El-Sayed A. El-Dahshan

, Aboul Ella Hassanien
:
Rough Set Approach in Ultrasound Biomicroscopy Glaucoma Analysis. 491-498 - Debabrata Dutta, Sanjoy Kumar Saha, Bhabatosh Chanda:

Video Copy Detection: Sequence Matching Using Hypothesis Test. 499-508 - Mihye Kim, Kwan-Hee Yoo, Chan Park, Jae-Soo Yoo, Hoseung Byun, Wanyoung Cho, Jeeheon Ryu, Namgyun Kim:

An XML-Based Digital Textbook and Its Educational Effectiveness. 509-523 - Kevin Bouchard

, Amir Ajroud, Bruno Bouchard, Abdenour Bouzouane:
SIMACT: A 3D Open Source Smart Home Simulator for Activity Recognition. 524-533 - Junghoon Lee, Gyung-Leen Park:

Design of an Efficient Message Collecting Scheme for the Slot-Based Wireless Mesh Network. 534-543 - Xiaohong Yang, Qingcai Chen, Xiaolong Wang:

A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by Humming. 544-557 - Byeongchang Kim:

Chinese Prosody Generation Based on C-ToBI Representation for Text-To-Speech. 558-571 - Yongyun Cho

, Hyun Yoe, Haeng-Kon Kim:
CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculture. 572-585 - Ho-chul Lee, Jeong-Hwan Hwang, Meong-hun Lee, Haeng-Kon Kim, Hyun Yoe:

A Power Control Scheme for an Energy-Efficient MAC Protocol. 586-596 - Iftikhar Ahmad, Azween B. Abdullah, Abdullah Sharaf Alghamdi:

Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks. 597-602

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














