


default search action
Smart Computing Review, Volume 2
Volume 2, Number 1, February 2012
- Amine Dhraief

, Abdelfettah Belghith:
An Experimental Investigation of the Impact of Mobile IPv6 Handover on Transport Protocols. 1-17 - Chuho Yi, Seungdo Jeong, Jungwon Cho:

Map Representation for Robots. 18-27 - Ching-Hao Lai:

A Tripartite Edge Histogram Scheme for a License Plate Recognition System. 28-41 - Farah Jahan, Mohammad Khairul Islam, Joong-Hwan Baek:

Person Detection, Re-identification and Tracking Using Spatio-Color-based Model for Non-Overlapping Multi-Camera Surveillance Systems. 42-59 - Mohd Kamir Yusof, Ahmad Faisal Amri Abidin, Mat Atar Mat Amin:

An Architecture for Securing a Private Instant Messenger. 60-70 - Asvhini a/p Subramaniam, Junaid Ahsenali Chaudhry, Mudassar Ahmad:

A Study on Elliptic Curve Digital Signature Algorithm (ECDSA) for Reliable E-Commerce Applications. 71-78 - Armaghan Behnia, Rafhana Abd Rashid, Junaid Ahsenali Chaudhry:

A Survey of Information Security Risk Analysis Methods. 79-94
Volume 2, Number 2, April 2012
- L. Boroumand, Rashid Hafeez Khokhar, Leily A. Bakhtiar, Mehran Pourvahab

:
A Review of Techniques to Resolve the Hidden Node Problem in Wireless Networks. 95-110 - Javier Carmona-Murillo

, José Luis González Sánchez, Francisco J. Rodríguez-Pérez, David Cortés-Polo:
Localized Mobility Management in MPLS based Access Networks. 111-124 - Kuk-Hyun Cho, Min-Woo Ryu:

A Survey of Greedy Routing Protocols for Vehicular Ad Hoc Networks. 125-137 - Muhammad Tahir, Muhammad Arshad Awan

, Aniqa Hafeez, Mohsin Yazdanie, Sheikh Ziauddin:
Interactive Slide Navigation: An Approach for Manipulation Slides with Augmented Reality Markers. 138-148 - Dongwan Shin, Rodrigo Lopes, Seok-Woo Jang:

An Efficient Scheme for User-controlled Attribute Sharing in Federated Identity. 149-162 - Mohd Kamir Yusof, Nor Surayati Mohamad Usop, Ahmad Faisal Amri Abidin:

A Secure and Reliable Chat Room Application via Embedded Chaotic Encryption. 163-170 - Anatoliy O. Melnyk, Inna Iakovlieva:

OCA-Graphical System for Algorithm Structure Analysis and Processing. 171-184
Volume 2, Number 3, June 2012
- Sang-Min Lim:

Implementation of Intelligent Preferred Goods Recommendation System using Customer Profiles and Interest Measurments based on RFID. 185-194 - Min-Woo Ryu, Jaeho Kim, Sang-Shin Lee, Min-Hwan Song:

Survey on Internet of Things: Toward Case Study. 195-202 - Chun-Kai Chen:

Energy Consumption Analysis and Algorithms Based on Energy Efficiency for Cooperative Networks. 203-210 - Yong-Hoon Jung, Jeong-Hyo Park, Kwang-Hyung Lee:

Convenient Move of Digital Content Using RFID in Home Networks. 211-219 - Enzhan Zhang, Yujun Kuang, Jerry John Kponyo:

A Time and Area Limited Epidemic Forwarding Method for Alleviating Vehicular Traffic Congestion. 220-230 - Tae-Sub Chung:

A Study of Immersive Display Technologies. 231-239 - Weiguo Yuan, Yun Liu, JingJing Yang:

Empirical Analysis of User Interaction Behavior in Microblogging. 240-253
Volume 2, Number 4, August 2012
- Myoung-Kwan Oh:

An RFID-based System for Tracking Shopping Location and Moving Lines. 254-261 - Jong-Cheon Park:

Mechanism of Character Region Detection Using Structural Features of Hangul Vowels. 262-268 - Il Ho Park:

Implementation of a PC Security System using RF Transmitter-Receivers. 269-277 - Jaiganesh M., A. Vincent Antony Kumar:

SOV2C2: Secure Orthogonal View of Virtualization in Cloud Computing. 278-285 - Chanik Park, Min-Woo Ryu, Kuk-Hyun Cho:

Survey of MAC Protocols for Vehicular Ad Hoc Networks. 286-295 - Sou-Young Jin, Young-Seob Jeong, Chankyu Park, KyoJoong Oh, Ho-Jin Choi:

An Intelligent Multi-Sensor Surveillance System for Elderly Care. 296-307
Volume 2, Number 5, October 2012
- Debajyoti Mukhopadhyay, Saurabh Deochake, Shashank Kanth, Subhadip Chakraborty, Suresh Sarode:

MAINWAVE: Multi Agents and Issues Negotiation for Web using Alliance Virtual Engine. 308-317 - Walter Foreman, Soojeong Lee, Myeongseok Ko, Sangchul Bae, Sanghoon Han:

Effects of an educational game with a situated learning strategy on Korean students' English writing abilities. 318-326 - Obeten O. Ekabua, Ifeoma U. Ohaeri:

Design and Implementation of Intrusion Detection and Response Model to Enhance Security in Cognitive Radio Networks. 327-338 - Ali Ziya Alkar, John Sefik Roach:

A Load Balancing Protocol for IP Based Pervasive Networks. 339-348 - Bo Mao, Jie Cao, Zhiang Wu:

Web-based Visualization of Generalized 3D City Models using HTML5 and X3DOM. 349-359 - Nguyen Duy Tan

, Longzhe Han, Nguyen Dinh Viet, Minho Jo:
An Improved LEACH Routing Protocol for Energy-Efficiency of Wireless Sensor Networks. 360-369 - Sami S. Al-Wakeel, Musaed A. Alhussein, Muhammad Ammad-uddin:

Performance analysis of Centralized, Distributed and Hybrid Demand Load Control architecture for Smart power Grid. 370-378
Volume 2, Number 6, December 2012
- S. Sridevi Sathya Priya, P. Karthigaikumar, N. M. Siva Mangai, P. T. Vanathi:

Survey on Efficient, Low-power, AES Image Encryption and Bio-cryptography Schemes. 379-390 - Farhan Aadil

, Zeshan Iqbal
, Adeel Akram:
Implementation of VANET-based Warning Generation System using Cellular Networks, GPS, and Passive RFID Tags. 391-399 - Tsui-Ping Chang:

Fast Discovery of Frequent Itemsets through Clustering and Decomposition. 400-411 - Si-Young No, Jong Chan Lee:

Forensic Mechanism for Data Integrity. 412-419 - Gi Sung Lee:

Method for Collecting Context Information in Mobile Communication Networks. 420-427 - Ashok Kumar P. S., Gopal Krishna C.:

A Pragmatic Approach of CRUD in Dynamic Composition of Web Services. 428-440

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














