default search action
5th NCM 2009: Seoul, Korea
- Jinhwa Kim, Dursun Delen, Jinsoo Park, Franz Ko, Chen Rui, Jong Hyung Lee, Jian Wang, Gang Kou:
International Conference on Networked Computing and Advanced Information Management, NCM 2009, Fifth International Joint Conference on INC, IMS and IDC: INC 2009: International Conference on Networked Computing, IMS 2009: International Conference on Advanced Information Management and Service, IDC 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3769-6
INC 2009: International Conference on Networked Computing
- Hao-peng Chen, Guang Yang, Can Zhang:
A Closed-Loop Mechanism for Service Evaluating and Discovering on the Internet. 1-8 - Kiyong Kim, Yeonseung Ryu, Semog Kim, Jong Myung Rhee:
A Leader Management Scheme for Fault-Tolerant Multiple Subnets. 9-12 - Nandagopal Malarvizhi, V. Rhymend Uthariaraj:
A Minimum Time to Release Job Scheduling Algorithm in Computational Grid Environment. 13-18 - B. N. Bhramar Ray, Alok Ranjan Tripathy, Shakti Prasad Mohanty:
A New Interconnection Network for Parallel Computers. 19-24 - Bin Wu, Shoubao Yang, Xiaoqian Liu:
A Resource Service Risk Based Scheduling Algorithm in Grid Market. 25-30 - John Sanabria, Wilson Rivera, Domingo Rodríguez, Yuji Yunes, Gail Ross, Cesar Sandoval:
A Sensor Grid Framework for Acoustic Surveillance Applications. 31-38 - Jianhua Wang, Jun Zhang, Weidong Ji, Long Zhang:
A Solving Model of Network Resource. 39-43 - Bhaskar Prasad Rimal, Eunmi Choi, Ian Lumb:
A Taxonomy and Survey of Cloud Computing Systems. 44-51 - Srimathi Chandrasekaran, Eunmi Choi, Venkat Viswanadh:
An Agent-Based Migration Transparency and Fault Tolerance in Computational Grid. 52-57 - Min-Woo Park, Jin-Young Choi, Young-Ju Han, Tai-Myoung Chung:
An Energy Efficient Concentric Clustering Scheme in Wireless Sensor Networks. 58-61 - Hu Song, Shoubao Yang, Bin Wu, Xiaoqian Liu, Liangmin Guo:
An Optimal Algorithm for Scheduling Tasks within Deadline and Budget Constraints. 62-65 - Wenxiao Feng, Tiejun Lu, Zongmin Wang:
Analysis and Design of Fully Differential Gain-Boosted Op-amp for 14bit 100MS/s Pipelined Analog-to-Digital Converter. 66-69 - Dongmei Xing, Hong Zhu:
Approximation Strategy Based on Data Merging for Static Data Management in Networks. 70-75 - Maryam Homayouni, Seyed Vahid Azhari, Mojataba Jahanbakhsh, Ahmad Akbari, Alireza Mansoori, Nahid Amani:
Configuration of a SIP Signaling Network: An Experimental Analysis. 76-81 - Dal-Hwan Yoon, Long Chen, Teng Lian, Jong-Hwa Yoon, Jong-Uk Yoon:
Development of Zig System for Evaluating an Oscillator Performance. 82-85 - Nibedita Adhikari, Chitta Ranjan Tripathy:
Extended Crossed Cube: An Improved Fault Tolerant Interconnection Network. 86-91 - Hai Zhang, Zhuxu Yang, Wenming Guo:
Flow Byte Sizes Estimation from Simple Random Packet Sampling. 92-96 - Chen-Shu Wang, Hsin-Chang Li:
General Model for Ubiquitous Networking Deployment Constructed Recommendation. 97-102 - Yao Yu, Yu Zhou, Sidan Du:
Impact of Interference on Multicast Throughput over Ad Hoc Networks. 103-110 - Yongtao Hao, Wenjing Han:
Intelligent Design-Oriented Product Functional Decomposition Iterative Model. 111-116 - Shakti Mishra, Dharmender Singh Kushwaha, Arun Kumar Misra:
Jingle-Mingle: A Hybrid Reliable Load Balancing Approach for a Trusted Distributed Environment. 117-122 - Alvin Chew HouMing, Koh Kim Leng:
Network Stochastic Optimization for Large Virtual Environment. 123-129 - Xiaoyong Lu, Liqing Li, Xiaogang Zhou:
Reduction Method of Order-Cycle Column Remove Based on Indiscernibility Relation. 130-133 - Dianchuan Jin, Xuebin Chen, Zhaohua Qian:
Resolution and Reconstruction of an Algorithm by a Modified Mobius Transformation in Signal Processing. 134-137 - Inwhee Joe, Sijia Yan:
SCTP Throughput Improvement with Best Load Sharing Based on Multihoming. 138-142 - Xiaoan Bao, Na Zhang, Zuohua Ding:
Test Case Generation of Concurrent Programs Based on Event Graph. 143-149 - Yongbin Zhang, Liangbin Zheng, Fucheng You:
The Design and Implementation of Behavior-Driven Artificial Neural Network Computing System. 150-153 - Chung-Hsin Liu, Ping-Shin Tsai:
The Study for Wireless Network Packet Transmission. 154-157 - Kazi Md. Abdullah Al Mamun, Md. Kawsar Habib, Nazmus Sakib, Al-Amin Pervez:
Wireless Bandwidth Estimation Technique (WBET) to Maintain the Quality of Service (QoS) of IEEE 802.11e Network. 158-160 - Min Xiang, Ping Wang, Zhiyong Luo, Young Han Kim, Yan Jin:
A New Data Gathering Algorithm Based on Mutual Supportability and Grey Prediction in Wireless Sensor Networks. 161-165 - SungHee Jeon, JoonGoo Park:
A RFID Reader Configuration with an Enhanced Recognition Property for Indoor Positioning. 166-169 - Yi Zhao, Wenlong Huang:
Adaptive Distributed Load Balancing Algorithm Based on Live Migration of Virtual Machines in Cloud. 170-175 - Shufen Zhang, Xuebin Chen, Hongcan Yan, Shuai Zhang:
Collision Detection and Conflict Solution Research in Modern Collaborative Design. 176-181 - Yu-Feng Lan, Shin-Ming Huang:
Designing an Efficient Collaborative Learning Model to Construct a Consensus Based on Binary Tree Structure. 182-187 - Colin Lemmon, Siu Man Lui, Ickjai Lee:
Geographic Forwarding and Routing for Ad-hoc Wireless Network: A Survey. 188-195 - Ik-Hyun Jhin, Nak-Min Choi, Eun-Sun Cho:
Integration of RDF Processing into a Programming Language. 196-199 - Bo Dong, Qinghua Zheng, Lingzhi Xu, Haifei Li, Jie Yang, Mu Qiao:
Jampots: A Mashup System towards an E-learning Ecosystem. 200-205 - Zuohua Ding, Mingyue Jiang:
Rebuilding Web Application Requirements Based on User Navigation. 206-213 - Minglu Li, Jianping Li, Hao Song, Dengsheng Wu:
Risk Management in the Trustworthy Software Process: A Novel Risk and Trustworthiness Measurement Model Framework. 214-219 - Lican Huang:
Semantic P2P Network for Healthcare. 220-225 - Sameer Abufardeh, Kenneth Magel:
Software Internationalization: Testing Methods for Bidirectional Software. 226-231 - Hun-Jung Lim, Tai-Myoung Chung:
The Bias Routing Tree Avoiding Technique for Hierarchical Routing Protocol over 6LoWPAN. 232-235 - Yu-Feng Lan, Yu-Cheng Jiang:
Using Instant Messaging and Annotation Services to Improve Undergraduate Programming Courses in Web-Based Collaborative Learning. 236-241 - Lin Liu, Yuanfu Zhao, Suge Yue:
3D Simulation of Charge Collection and MNU in Highly-Scaled SRAM Design. 242-246 - Jinpei Pan, Mingchu Li, Weifeng Sun, Jing Hu:
A Mediated RSA-Based End Entity Certificates Revocation Mechanism in Grid. 247-250 - Wan Haslina Hassan, Ahmed Mustafa Mahmood, Norsheila Fisal:
An Agent-Based Mobility Protocol for Improved Mobile QoS in Next Generation IP Networks. 251-256 - Xin Liu, Neng Wang:
Anti-misbehavior System for Tor Network. 257-261 - Wen-Yau Liang:
Apply Rough Set Theory into the Information Extraction. 262-266 - Huan Li, Bo Liu:
Collective Behavior of Dynamic Swarm with General Topology and Complex Communication Time-Delays. 267-271 - Xing Wang, Xin Wang, Zhaonan Sun:
Comparison on Confidence Bands of Decision Boundary between SVM and Logistic Regression. 272-277 - Tzu-Yen Wang, Chin-Hsiung Wu, Chu-Cheng Hsieh:
Detecting Unknown Malicious Executables Using Portable Executable Headers. 278-284 - Aung Nway Oo, Ni Lar Thein:
DLP Based Proxy Blind Signature Scheme with Low-Computation. 285-288 - Iraj Mahdavi, Shima Mohebbi, Namjae Cho, Rasoul Shafaei, Mahdi Zandakbari:
Dynamic Information Flow for Designing Simultaneous Coordination Model in E-Supply Network. 289-296 - Michael Hermano, Shirley B. Chu, Daniel Pua, Stephen Tan, Andrei Victor:
EVOGENTS: Evolving Agents. 297-302 - Hieu Trung Huynh, Yonggwan Won:
Extreme Learning Machine with Fuzzy Activation Function. 303-307 - Hua-Yi Lin:
High-Effect Key Management Associated with Secure Data Transmission Approaches in Sensor Networks Using a Hierarchical-Based Cluster Elliptic Curve Key Agreement. 308-314 - Mohd Najib B. Mohd Salleh, Nazri Mohd Nawi, Patrice Boursier:
Incomplete Information of Decision Support System for Planting Material Selection. 315-319 - Alvin Chew HouMing, Koh Kim Leng, Xu Ke:
Providing a Heuristic Method to Simplify Behaviour Authoring. 320-324 - Yongtao Hao, Dinghou Huang, Xiulian Qiu:
Research of Part Geometry Model and Gene Coding Based on Semantic Relationship. 325-328 - Guozheng Wang, Jijie Zheng, Haiyan Wu, Ying Tang:
Research of the Enterprise Application Integration Platform Based on Multi-agent. 329-331 - Chong-Yen Lee, Tsang-Yean Lee, Homer Wu, Hau-Dong Tsui, Heng-Sheng Chen:
Secure Site Authentication and Message Transmission Based on Grid Environment. 332-337 - Zhaohui Huang, Huajun Chen, Tong Yu, Hao Sheng, Zhaobo Luo, Yuxin Mao:
Semantic Text Mining with Linked Data. 338-343 - X. B. Tan, Longxin Cheng, Xiumei Xu:
Test Data Generation Using Annealing Immune Genetic Algorithm. 344-348 - Shufen Zhang, Xuebin Chen, Shuai Zhang, Hongcan Yan:
The Research on the Principle of Covert Communication and Defense Strategy Based on Sniffer. 349-352 - Xinyuan Zhang, Limin Jia, Honghui Dong, Zhuo Wang, Ke Wang, Yong Qin:
Analysis and Evaluation of Connectivity Reliability for Dynamic Transportation Network. 353-356 - Kuo-Hwa Chang, Yang-Shu Lu, Rong-Cheng Chang:
Performance Evaluation on Base-Stock Levels in a Single-Station Production System. 357-362 - Shenping Hu, Quangen Fang, Cunqiang Cai:
Formal Risk Assessment of Vessel Traffic at Coastal Waters. 363-368 - Kevin Miller, Suresh Sankaranarayanan:
Role of Intelligent Agents and Wireless Body Sensor Mesh Networks in Patient Health Monitoring. 369-375 - Seunghyun Yoon, Namhee Park, Jinwon Choi:
A BIM-Based Design Method for Energy-Efficient Building. 376-381 - Jumphon Lertlakkhanakul, Yongzhi Li, Jinwon Choi, Soyoung Bu:
GongPath: Development of BIM Based Indoor Pedestrian Navigation System. 382-388 - Wonsuk Park, Kwan-Soon Park, Dong-Ho Ha, Jinkyo F. Choo:
Preference Based Genetic Algorithm for the Optimum Design of Integrated Structural Control System. 389-392 - Ali Barati, Mohammad Ali Khosh Kholghi, Ali Movaghar:
Recovery of Sensors in Wireless Sensor Networks. 393-396 - Alejandro Fernández-Montes, Juan Antonio Ortega, Juan Antonio Álvarez, Luis González Abril:
Smart Environment Software Reference Architecture. 397-403 - Inwhee Joe, Jaeyoung Kim:
A Novel IP Paging Scheme with Dynamic Paging Areas according to the Mobile Velocity. 404-408 - Sang-seok Oh, Hyon-Young Choi, Sung-Gi Min:
A Route Optimization Scheme Based on Roaming in PMIPv6 (pROR). 409-415 - Mi-Young Choi, Eun-Ae Cho, Dae-Ha Park, Jong-Youn Bae, Chang-Joo Moon, Doo-Kwon Baik:
A Synchronization Algorithm of Mobile Database for Ubiquitous Computing. 416-419 - Mirali Sharifi, Fatemeh Toossi, Tofig Kazimov:
An Approach for Selecting Active Nodes in Wireless Sensor Networks by Using Genetic Algorithms. 420-424 - Youngkon Lee:
An Implementation Case Study: Business Oriented SOA Execution Test Framework. 425-430 - Jong-Kuk Shin, Min-Sook Park, Mi-Ok Oh:
Effects of Customer Participation Level on Customers' Attributions, Emotions, and Behaviors in Case of Internet Service Failure. 431-436 - Sang Man Seong, Tae Whan Kim, Ick Ho Whang:
Estimation with Intermittent Observation Using Both a Priori and a Posteriori Information. 437-440 - Mario Köppen, Kaori Yoshida, Masato Tsuru, Yuji Oie:
Fairness-Based Global Optimization of User-Centric Networks. 441-443 - Gang Yin, Dian-xi Shi, Pinbo Sui, Huaimin Wang:
Towards General Access Control Management for Middleware Security. 444-448 - Fei Ge, Liansheng Tan, Yuan-ni Wang:
Traffic Modeling with Bernoulli Shift Map. 449-452 - Ying Liu, Zhihong Qian, Dan Liu, Hui Zhong:
A DV-Hop Positioning Algorithm for Wireless Sensor Network Based on Detection Probability. 453-456 - Yao Yu, Lei Guo, Xingwei Wang, Jun Liu, Weigang Hou, Yan Li:
A New Node Role-Based Reputation Model in Hierarchical Ad Hoc Networks. 457-461 - Weigang Hou, Lei Guo, Xingwei Wang, Jiannong Cao, Jingjing Wu, Yan Li:
A New Routing Algorithm Based on Integrated Grooming Auxiliary Graph in Multi-granularity Optical Networks. 462-467 - Sisi Cheng, Qing Li, Qi Chen:
A New Routing Strategy to Improve Traffic Congestion for Scale-Free Network. 468-470 - Xin Zhao, Yuqin Lv, Tet Hin Yeap, Bin Hou:
A Novel Authentication and Key Agreement Scheme for Wireless Mesh Networks. 471-474 - Chunhui Song, Shulei Wu, Huandong Chen, Jinmei Zhan, Juntao Chen:
A Probe into the Concept of Multimedia. 475-478 - Chaonian Guo, Xiangxue Li, Dong Zheng, Shengli Liu, Jianhua Li:
AE-BP: Adaptive Erasure Belief Propagation Decoding Algorithm of LDPC Codes. 479-483 - Xiang Zheng, Zheng Qin, Jiankuan Xing:
An Approach to Distribute Replicas among Decentralized Tuple Space Nodes. 484-488 - Wonhyuk Lee, Joon Woo, Hyuncheol Kim, Jinwook Chung:
Design and Implementation of Computer and Network Resource Optimization for Linking High-Performance Computing Resources. 489-493 - Yang Tao, Shudan Zhang:
Dormancy Scheduling Algorithm Based on Node's Self-Adaptive Density in WSN. 494-500 - Young-Hyun Choi, Tai-Myoung Chung:
Enhanced Light Weight Route Optimization in Proxy Mobile IPv6. 501-504 - Ruibo Wang, Kai Lu:
Hierarchical Conflict Detection for Cluster's Transactional Memory. 505-507 - Wonhyuk Lee, Seunghae Kim, Hyuncheol Kim, Jinwook Chung:
Proposal for Deploying PCE Architecture to Optimize a Path Based on GMPLS Network. 508-510 - Fagui Liu, Zexiang Wu, Weipeng Mai:
Renewal-Theory-Based Hard Disk Power Management Strategy Optimization. 511-515 - Qing Ding, Ming Jiang, Xi Li, Xuehai Zhou:
RePro: A Reputation-based Proactive Routing Protocol for the Wireless Mesh Backbone. 516-521 - Feng Xu, Likun Jia, Rongyan Jiang:
The Design of a Component Description Language in the Environment of Internet. 522-526 - Inwhee Joe, Wooyeob Lee:
A Selective MAP Binding Scheme Based on the Mobile Speed. 527-530 - Inwhee Joe, Jaehyung Lee:
An Enhanced TCP Protocol for Wired/Wireless Networks. 531-533 - Weiwei Xia, Liang He, Junzhong Gu, Keqin He:
Effective Collaborative Filtering Approaches Based on Missing Data Imputation. 534-537 - Wuu-Yee Chen, Tsang-Yean Lee, Nai-Wen Kuo, Yuan-Hwa Mei, Shan-Kai Chen, Yu-Chen Yan:
Job Schedule Model Based on Grid Environment. 538-543 - Su-Hwan Ko, Jung-Kyu Lee:
Limited Contention Scheme (LCS) to Reduce Collision in LR-WPAN. 544-548 - Youn-Gyou Kook, Jae-Oh Lee:
Personalized Recommendation Service in the IMS Environments. 549-554 - Soo-Duek Kim, Jong-Hyouk Lee, Tai-Myoung Chung:
Secure Fast Handover Scheme of Proxy Mobile IPv6. 555-558 - Wen Xiong, Cong Wang:
A Hybrid Improved Ant Colony Optimization and Random Forests Feature Selection Method for Microarray Data. 559-563 - Jing Wu, Yanheng Liu, Rong Lv, Guo-xin Cao:
A Method of Network Traffic Analysis Based on Multiple-Combination Model. 564-568 - Hecheng Li, Yuping Wang:
A Mixed-Encoding Genetic Algorithm for Nonlinear Bilevel Programming Problems. 569-573 - Bayalagmaa Davaanaym, Young-Sil Lee, Hoon-Jae Lee, Sanggon Lee, Hyotaek Lim:
A Ping Pong Based One-Time-Passwords Authentication System. 574-579 - Ruijuan Zheng, Meiyu Xu, Jiexin Pu, Qingtao Wu:
A System Service Optimization Model Based on Martingale Difference Approximation. 580-583 - Yinzhao Li, Dongxu Yang, Jiadong Ren, Changzhen Hu:
An Approach for Database Intrusion Detection Based on the Event Sequence Clustering. 584-588 - Yuan Huang, Xing Wang, Ben-Chang Shia:
Efficiency and Consistency Study on Carma. 589-594 - JinKyoung Heo:
Encipherment Key Management System for Massive Web Contents. 595-599 - JongHo Ryu, JungChan Na:
Hash Function with Variable Output Length. 600-605 - Ming-Chang Lee, Mei-Wen Han:
Knowledge Value Chain Model Implemented for Supply Chain Management Performance. 606-611 - Johannes K. Chiang, Wen-Chin Wu, Wei-Cheng Liao, Chi-Yen Yin:
Machine Learning Trend Anticipation by Text Mining Methodology Based on SSCI Database. 612-617 - Heasuk Jo, Yunho Lee, Mijin Kim, Seungjoo Kim, Dongho Won:
Off-Line Password-Guessing Attack to Yang's and Huang's Authentication Schemes for Session Initiation Protocol. 618-621 - Yongtao Hao, Chong Ma, Cheng Xin:
Research of Product Function Gene Model Based on Behavior Semantic Web. 622-627 - Honghui Dong, Limin Jia, Xiaoliang Sun, Chenxi Li, Yong Qin, Min Guo:
Road Traffic State Prediction with a Maximum Entropy Method. 628-630 - Ling Ji, Dantong Ouyang, Yuxin Ye:
SHOIQD System an Approach to Integrate Description Logic SHOIQ with Nonmonotonic Rules. 631-634 - JungMin Kang, KiWook Sohn, Soonyoung Jung:
WebVaccine: A Client-Side Realtime Prevention System against Obfuscated Malicious Web Pages. 635-637 - Jia-jun Wei:
Algorithm to Arrange Storage Locations for Export Containers in the Yard. 638-641 - Xiao-Fan Zhi, Zhi-Cheng Liao, Yi Sun:
An Intersection-Centric IBF* Algorithm for Traffic Simulation Routing Guidance. 642-646 - Jianting Zhou, Jianxi Yang:
Analysis on Non-linear Characteristics of Bridge Health Monitoring Based on Time-Delayed Transfer Entropy and Mutual Information. 647-652 - Tao Yu, Zhou Jiang, Yi Chen:
Research on Chinese Urban Growth Path Based on the Conception of Sustainable Development. 653-656 - Yaying Zhang:
RFID-Based Tracking in Supporting Real-Time Urban Traffic Information. 657-659 - Xintao Liao, Ligang Dong, Chuanhuang Li:
A Generic Transaction Model for ForCES-Based Distributed Systems. 660-664 - Hyun Lee, Young Ran Lee, Jae Sung Choi, Ramez Elmasri:
A Reliable Data Capture in Multi-RFID Reader Environments. 665-668 - Xiaoqing Yan, Weiming Wang, Fenggen Jia:
Design and Implement of IPsec VPN Service Mapping Layer Based on the ForCES Framework. 669-672 - Yung Bok Kim:
u-Healthcare Service Based on a USN Middleware Platform. 673-678 - Guo Bin Wu, Huo Song Xia:
Warning System Construction Research Based on Emergency Diffusion. 679-681 - Jinkyo F. Choo, Dong-Ho Ha, Hyun-Moo Koh:
A Neural Network-Based Damage Detection Algorithm Using Dynamic Responses Measured in Civil Structures. 682-685 - Junping Liu, Ke Zhou, Liping Pang, Zhikun Wang, Yuhui Deng, Dan Feng:
A Novel Cost-Effective Disk Scrubbing Scheme. 686-691 - Chengshi Zhao, Sangjun Bae, Mingrui Zou, Bin Shen, Kyungsup Kwak:
An Efficient Power Allocation Algorithm for Peak-Power Constrained Multicarrier Systems. 692-695 - Kevin F. R. Liu, Che-Fan Lu:
BBN-Based Decision Support for Health Risk Analysis. 696-702 - Guo Bin Wu, Huo Song Xia:
Case Study of Public Emergency Diffusion Based on SD Simulation. 703-705 - Jinsuo Lu, Tinglin Huang:
Data Mining on Forecast Raw Water Quality from Online Monitoring Station Based on Decision-Making Tree. 706-709 - Cheol-Kyun Heo, Dong Ryeol Shin:
Dynamic Power Management Based Call Pattern Recognition for Telecommunication Equipments. 710-712 - Qin Li, Xi Chen, Frank Veroustraete, Anming Bao, Qinghan Dong, Tie Liu:
Estimation of Evaporative Fraction from Remotely Sensed in Arid/Semi-arid Regions. 713-718 - Yangting Wang, Yongxia Yu:
Gain Experiences from Process Improvement in School. 719-723 - Itrat Fatema, V. M. Thakare:
Clustered Agent Base Frame Work for Ad-hoc Networks. 724-728 - Deng Lu, Shanping Li, Liheng Zhao:
ETC-Based Methodology on Data Processing Validation. 729-732 - Chunjing Mao, Yong Guan, David Jungwirth:
Research and Design of On-board Dynamic Reconfigurable Router. 733-738 - Marie Kim, Hyochan Bang, Hwang Jae Gak, Cheol Sig Pyo:
The Access Control Model in Ubiquitous Sensor Network Environment. 739-744
IMS 2009: International Conference on Advanced Information Management and Service
- Zhengwei Qi, Alei Liang, Haibing Guan, Ming Wu, Zheng Zhang:
A Hybrid Model Checking and Runtime Monitoring Method for C++ Web Services. 745-750 - Junren Wang, Qingzhong Li, Yongquan Dong:
A Method of Schema Matching Based on Top-K Mapping and User Feedback. 751-756 - Weiguo Li, Yongfu Wang, He Huang:
A New Model for Software Reliability. 757-760 - Lingjuan He, Lianchen Liu, Cheng Wu:
A Revised Service Group Model for Web Service Availability Management. 761-766 - Baohua Fan, Heying Zhang, Wenhua Dou:
A Time Varying Network Calculus. 767-772 - Chia-Hui Huang:
An Efficient Piecewise Linearization Method in Fuzzy Multi-objective Programs. 773-779 - Bei Hu, Rongzhi Liu:
An Empirical Analysis on the Peasant Entrepreneurs Influence on the Industrial Cluster in Rural China. 780-784 - ChangKug Kim, UngHan Yoon, GangSeob Lee, DoWon Yun, SeongHan Park, SukMan Kim, Yong-Hwan Kim:
An Integrated Analysis System for Agricultural Biotechnology Information and Web Service. 785-787 - Youngkon Lee:
Business-Centric SOA Test Framework Based on BPA-Simulated Event. 788-793 - Yan-jie Dong, Xue-hua Wang, Jun Zhou:
CostBP Algorithm and its Application in Customer Churn Prediction. 794-797 - Yogesh Singh, Anjana Gosain, Manoj Kumar:
From Early Requirements to Late Requirements Modeling for a Data Warehouse. 798-804 - Yu Wang, Dong-Mei Chen, Xiao-Min Zhang:
HeXie Mechanism Design on Interest Distribution in Virtual Enterprises. 805-808 - Wei Tan, Xi-fan Yao, Bin Wang, Shan-Jun Zhang:
Model of Intellectual Information Management in Manufacture Enterprise Web Services-Oriented. 809-814 - Nurul Huda Ahmad Zahari, Mohd. Najib Mohd. Salleh, Muhaini Othman:
The Design of Payment Model for Financial Transaction Using MyKad. 815-819 - Tae-You Lee, Yong-Ki Ku, Choon-Sung Nam, Dong Ryeol Shin:
The Microkernel Concept Based Dependable System Architecture. 820-823 - Kyeongrim Ahn, Keunyoung Youn, SunHo Park:
The Study of Interface Standard for Single Window System. 824-828 - Mustarum Musaruddin, Rastko Zivanovic:
Web Services for Automated Fault Analysis in Electrical Power System. 829-832 - Mi-Young Choi, Jong-Youn Bae, Chang-Joo Moon, Doo-Kwon Baik:
A Methodology for Developing Data Taxonomy for Data Architecture. 833-838 - Chunyong Yin, Ruxia Sun, Shuoben Bi:
A Model of Information Security Based on Office Automation. 839-841 - Sohaimi Zakaria, Azrilah Abdul Aziz:
Online Information Satisfaction: A Rasch Model Measurement of Information Management Experience within the Malaysian Agricultural Extension Services. 842-848 - Shan-yan Huang, Han-yuh Liu:
Applying Double-Loop Knowledge Management Model on Customer Self-Service Systems for Taiwan's E-government. 849-854 - Yongbin Zhang, Fucheng You, Huaqun Liu:
Behavior-Based Credit Card Fraud Detecting Model. 855-858 - Suphakit Niwattanakul, Michel Eboueya, Philippe Martin:
DOCINER: A Document Indexation Tool for Learning Objects. 859-863 - Deepak Dahiya, Usha Batra:
Enterprise Knowledge Management Systems: Role of Aspects and Distributed Middleware Framework. 864-869 - Minsoo Kim, Minkoo Kim:
Handling Exceptions in Situation-Driven Agent Systems. 870-875 - Christian Bettinger, Andreas Baumann, Frank Hausen, Georg Schneider, Hermann Schloss:
HERA: Design Framework for Decentralized Distributed Virtual Environments and Games. 876-881 - Deepak Dahiya, Usha Batra:
Improving Software Design Using Aspects in Distributed Computing. 882-887 - Jinlin Wang, Xi Chen, Kefa Zhou:
Research on a Scalable Parallel Data Mining Algorithm. 888-893 - Mengbo Hou, Qiuliang Xu:
Secure and Efficient Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme. 894-897 - Reinhard Keil, Jonas Schulte, Ingo Döpke:
Security Management for Flexibility in Virtual Knowledge Spaces. 898-906 - Ming-Che Lee, Jia Wei Zhang, Wen Xiang Lee, Heng Yu Ye:
Sentence Similarity Computation Based on POS and Semantic Nets. 907-912 - Gang Yin, Dianxi Shi, Min Guo, Huaimin Wang:
SRDL: A Simple Role-Based Delegation Logic. 913-916 - Ka-Kyung Oh, Tae-You Lee, Choon-Sung Nam, Dong Ryeol Shin:
Strong Authentication and Key Agreement Protocol in UMTS. 917-920 - Tommy King Lun Choy, Harry K. H. Chow, Karen Ka-Leung Moon, Alvis C. K. Cheng:
The Knowledge Based System to Support the Subjective Hand Evaluation Process of Fabric Swatch Selection in Fashion and Textile Industry. 921-925 - Lei Shi, Lei Fan, Zhenzhen Meng:
The Research of Using Jena in the Semantic-Based Online Learning Intelligent Behavior Analysis System. 926-929 - Ji-Hyun Hwang, Youn-Gyou Kook, Jae-Oh Lee:
A Dynamic Routing Algorithm for Managing CSCF Agents in the IMS Network. 930-935 - Hee-Yeon Cho, Choon-Sung Nam, Hyung-Rok Seo, Dong Ryeol Shin:
A Railroad Integration of Services Based on OSGi Platform. 936-938 - Jong-Wan Yoon, Hyung-Rok Seo, Choon-Sung Nam, Dong Ryeol Shin:
Agent Based Sensor Network Middleware Sporting Heterogeneous Environments. 939-942 - Nam-gi Kang, Jae-sun Park, Tae-min Hong, Yang Dam Eo, Byoung-kil Lee, Mu-wook Pyeon:
Development of RTLS Access Point Allocation Prototype for Location Tracking in Construction Sites. 943-948 - Jae Hyoung Cho, Jae-Oh Lee:
IMS Based PoC Service Deployment. 949-954 - Muhammad Rafi, Hilal Qureshi, Hasina Khatoon:
Ontology Maintenance via Multi-agents. 955-959 - Weihong Han, Yan Jia, Shuqiang Yang:
Research of Massive Internet Text Data Real-Time Loading and Index System. 960-965 - Fei Ma, Wenan Zhou, Junde Song, Guang-xian Xu:
Research on Handoff Mechanism Based on Capability Adaptation in Heterogeneous Network Platform. 966-969 - Bipin Upadhyaya, Eunmi Choi:
Social Overlay: P2P Infrastructure for Social Networks. 970-976 - Mei Song, Lijie Wang:
Study on Groundwater Optimization Model Based on GIS. 977-980 - Chia-yen Wu, Han-yuh Liu, Yi-ting Wang:
Business Blogs for Interactive Storytelling: An Interpretive Interactionism Perspective. 981-985 - Fathia Lahwal, Mohamed Amaimin, Ajlan Suliman Al-Ajlan:
Perception Cultural Impacts: Principles for Trainer's Skills for E-learning. 986-993 - Mira Kajko-Mattsson, Kristoffer Sjokvist, Joakim Soderstrom, Dag Krogdahl:
DRiMaP--A Model of Distributed Risk Management Process. 994-1000 - José Crispín Zavala Díaz, Dalia V. Garcia-Villagomez, Jorge A. Ruiz-Vanoye, Ocotlán Díaz-Parra:
Selection of an Investment Portfolio by Means of a Mathematical Model of Optimization Applied to Mexican Stock-Market in Period of Debacle. 1001-1006 - Ping Wang, Yuncheng Huang, YuanSu Wang:
Support Vector Regression Model of Currency Options Pricing with Stochastic Volatility Models and Forward Exchange Rate. 1007-1012 - Sadaf Ashtari, Jamshid Nazemi:
Sustainable Development via Value Based Management System. 1013-1018 - Wen-Chih Tsai, Chiung-Fen Huang, An-Pin Chen:
Using Extended Classifier System for Portfolio Allocation of MSCI Index Component Stocks. 1019-1024 - Joonhyun Bae, Sangwook Kim:
A Global Social Graph as a Hybrid Hypergraph. 1025-1031 - Hong Chen, Hui Qi, Ruyin Long:
Behavior Safety Integration Management and Control System for Coal Enterprises. 1032-1040 - Chi-Yen Yin, Johannes K. Chiang:
Social Capital: The Literature Productivity Review and Trend Forecast Using Bibliometric Methodology from 1959 to 2008. 1041-1046 - Chi-Chang Chang, Pei-Ran Sun, Sun-Long Cheng, Ruey-Shin Chen, Kuo-Hsiung Liao:
Developing a Risk Analysis Framework for Hospital Information Security Management. 1047-1052 - Peom Park, You Min Shin, Ho-Young Byun, JaeSoo Yang:
Preliminary Children Health Care Service Using Ubiquitous Technology. 1053-1057 - Youngkon Lee:
2-Layered SOA Test Framework Based on BPA-Simulated Event. 1058-1063 - Han-yuh Liu, Shih-yu Fang:
An Approach to Explore Effective Customer-Centric E-government. 1064-1069 - Seong-Pil Kong, Yang Dam Eo, Chang Jae Kim:
On the Policy Support to Promote Intelligence Vision System Base on the Ubiquitous Community Computing. 1070-1074 - Xianpeng Huangfu, Zhen Shu, Honghui Chen, Xueshan Luo:
Research on Dynamic Service Composition Based on Object Petri Net for the Networked Information System. 1075-1080 - Yushun Li, Hui Guo, Ge Gao, Ronghuai Huang, Xiaochun Cheng:
Ubiquitous E-learning System for Dynamic Mini-courseware Assemblying and Delivering to Mobile Terminals. 1081-1086 - Ata Farzamnia, S. M. R. Nasserzadeh, Soroosh Nalchigar:
Which Internet Marketing Mix's Has More Effect on the Passenger's Decision for Choosing Their Travel Agency in Iran?. 1087-1092 - Jiyun Xie:
A New Flex Real-Time Messaging Framework. 1093-1095 - Jun Wang, Lan-juan Liu:
A Study of Design Flow of Management Experiments Based on Software Engineering. 1096-1101 - Defen Zhang, Shixian Li, Xianming Liu:
An Approach for Model Composition and Verification. 1102-1107 - Jianghong Zhao, Yanming Wang, Ganhua Yin:
Ancient Architecture Point Cloud Data Triangulation Algorithm Integrated with Cylindrical Projection and Tangent Plane Projection. 1108-1113 - Hongjin Zhang, Xiaohu Yang:
Rule Engine Research and Implementation in Financial System. 1114-1117 - Limin Mi, Yuanxing Liu:
The Uncertainty Mathematical Methods of Economic Analysis. 1118-1122 - Lin Guo, Hai-Bo Li, Zhi-hai Yu, Lejun Zhang, Jianpei Zhang:
A Novel Security Network Storage System Based on Internet. 1123-1127 - Youngkun Min, Bogju Lee, Chansu Yu:
A Personal Memex System Using Memex Ontology and Web Services. 1128-1130 - Laila Mohamed El Fangary:
Applying an Enhanced Algorithm for Mining Incremental Updates on an Egyptian Newspaper Website. 1131-1135 - Ying Tan, Lan Huang, Hong Qi, Yandong Zhai:
Design and Implementation of Chinese Text Clustering System. 1136-1140 - JongHo Ryu, JungChan Na:
Information-Revealing with Distributed Escrow Authorities. 1141-1146 - Qin Yuanjian, Xiao Zhixiong:
Research on a Knowledge Management Model of Modern Service Enterprises Based on Value Chain. 1147-1152 - Lejun Zhang, Jianpei Zhang, Lin Guo, Hua Huang, Yongtian Yang, Pengfei Sun:
Research on Reliable Transport Technology of Tubular Distribution Mobile Wireless Sensor Network. 1153-1156 - Sung Yong Kim, Ki Yong Kwon, Won Don Lee:
A Biological Early Warning System for Toxicity Detection. 1157-1160 - Lihua Feng, Jiahong Feng:
Analysis on the Classification Error of ANNS. 1161-1164 - Huandong Chen, Shulei Wu, Chunhui Song, Jinmei Zhan, Juntao Chen, Dong Kang:
E-learning System Model Construction Based Constructivism. 1165-1169 - Lan Huang, Guixia Liu, Rongxing Wang, Bin Yang, Chunguang Zhou:
Improved Clonal Selection Algorithm for Protein Contact Map Prediction. 1170-1175 - Yubo Deng, Jianwei Niu, Lian Li:
Modeling of Broadcasting Based on Distance Scheme for WSN. 1176-1179 - Tae-Woong Jung, Jee-Hee Koo, Kyoung-Min Kim, Mu-Wook Pyeon:
Research on RFID System Recognition Test under the Forestry Environment for Tree Management. 1180-1184 - Huandong Chen, Shulei Wu, Chunhui Song, Mingrui Chen:
Research on the Learning Theory of E-learning. 1185-1187 - Bin Yang, Chunyang Li, Lan Huang, Ying Tan, Chunguang Zhou:
Solving One-dimensional Cutting-Stock Problem Based on Ant Colony Optimization. 1188-1191 - Marius Crisan:
Upon the Dynamic Modeling of Sentence Meaning. 1192-1197 - Cheng Lin, Zhongdong Huang:
A Flexible Metric-Driven Framework for Software Process. 1198-1202 - Tao Yu, Qiang Wu, Ying Hong:
Analysis on the Spillover Effect of Foreign Direct Investment: Case of Suzhou. 1203-1206 - Han-Ying Kao, M.-C. Liu, C.-L. Huang, Y.-C. Chang:
E-learning Systems Evaluation with Data Envelopment Analysis and Bayesian Networks. 1207-1210 - Hui Chai:
A Performance Model For E-education Project. 1211-1214 - Xiuheng Zhao, Rui Chen:
The Expansion of Information Concept. 1215-1218 - Wei Zheng, Chunhong Zhang, Cuibo Yu, Peng Yang, Yuqi Mu, Xiaohua Zhang:
Design of Presence Based Dynamic Group IM in IMS. 1219-1222 - Jong-Hun Kim, Chang-Woo Song, Jung-Hyun Lee, Kee-Wook Rim:
Design of RFID-Based Profiling Agent for Recommendation System in Smart Home. 1223-1226 - Jianwei Yin, Chunxu Lv:
Sub-order Non-duplication Event Matching Algorithm for Stateful Publish/Subscribe Systems. 1227-1233 - Yung Bok Kim:
Ubiquitous Name-Based Information Management with a Multilingual Domain Name Interface. 1234-1239
IDC 2009: International Conference on Digital Content, Multimedia Technology, and its Applications
- Shuhan Wei, Ranran Zhang, Pengyi Hao, Youdong Ding:
A Fast Texture Matching Algorithm Based on Multi-resolution and Partition. 1240-1245 - Pooya Monshizadeh Naeeni, Alireza Nasiri Avanaki, Sied Mehdi Fakhraie:
A New Approach for Combined Demosaicking and Watermarking in Digital Camera Pipeline. 1246-1250 - Yongheng Guo, Wei Cai, Tiejun Lu, Zongmin Wang:
A Novel 1GSPS Low Offset Comparator for High Speed ADC. 1251-1254 - Jiangbin Xu, Hanchen Song, Lingda Wu, Chao Yang:
A Seamless Representation of Multi-scale Clouds. 1255-1260 - Yukikazu Murakami, Nobuo Funabiki, Hidekazu Tokunaga, Kazuhiro Shigeta, Toru Nakanishi:
A Web-Based Installation Manual Management System for Open Source Software. 1261-1266 - Min Seok Kang, Kyung-Sik Kim:
An Effective Scene Manager for the Online Game 'Chungmukong's Battle on the Sea'. 1267-1270 - Chung-Pyo Hong, Eo-Hyung Lee, Shin-Dug Kim:
An Efficient Scheme to Construct Virtual Community for Multimedia Content Sharing Based on Profile in a Ubiquitous Computing Environment. 1271-1276 - Na Luo, WeiWei Hu, Jin Zhang, Tao Fu, Jun Kong:
Applying Iterative Logistic Regression and Active Learning to Relevance Feedback in Image Retrieval System. 1277-1282 - Hsin-Chang Yang, Han-Wei Hsiao, Chung-Hong Lee:
Automatic Construction of Multilingual Web Directory Using Self-Organizing Maps. 1283-1288 - Jian Zhao, Hanchen Song, Jiangbin Xu, Lingda Wu:
Automatic Exploration Path Planning for 3D Object Observation. 1289-1294 - Conrado R. Ruiz Jr., Rafael Cabredo, Levi Jones Monteverde, Zhiyong Huang:
Combining Shape and Color for Retrieval of 3D Models. 1295-1300 - Yong Li, Huayi Wu:
DEM Extraction from LIDAR Data by Morphological Gradient. 1301-1306 - Yu-Chen Song, Hai-Dong Meng, Shu-Ling Wang, Michael J. O'Grady, Gregory M. P. O'Hare:
Dynamic and Incremental Clustering Based on Density Reachable. 1307-1310 - Conrado R. Ruiz Jr., Nor Hidayu Salimi, Sujitra Chodnok, Pham Trung Ha:
Exploring Traditional Art and Culture in Modern Computer Games. 1311-1316 - Dal-Hwan Yoon, Long Chen, Ki-Hwan Seo, Jong-Uk Yoon, Jong-Hwa Yoon:
Home Control System with the Mobile. 1317-1320 - Yang Qu, Kyungmi Lee, Ickjai Lee:
Qualitative Cluster Reasoning Framework for Decision Making. 1321-1326 - Cuijuan Li, Bo Xu:
Research on Knowledge Management of Pyramidia for E-learning System. 1327-1330 - Dwen-Ren Tsai, Wei-Yu Chen, Chia-Hao Liang, Chung-Chiang Hu:
Role-Based Access Control of Digital Right Management. 1331-1334 - Sathit Intajag, Nopparat Sukkasem:
Speckle Filtering by Generalized Gamma Distribution. 1335-1338 - Hamze Moazami Goodarzi, Saeed Seyedtabaii:
Speech Enhancement Using Spectral Subtraction Based on a Modified Noise Minimum Statistics Estimation. 1339-1343 - Li Wang, Jianghao Wang, Hanqing Ma, Yu Deng, Jian Wang, Rui Chen:
The Progress in Modeling Research of Urban Spheres of Influence in China. 1344-1347 - Porawat Visutsak, Korakot Prachumrak:
The Smoothed 3D Skeleton for Animation. 1348-1353 - Ruhan He, Yong Zhu, Wei Zhan:
Using Local Latent Semantic Indexing with Pseudo Relevance Feedback in Web Image Retrieval. 1354-1357 - Manjit Singh Sidhu:
Visualizing Curvilinear Cylindrical Engineering Members in 3-D Environment with Motion Path. 1358-1363 - Huan Zhao, Li-xia Zhao, Kai Zhao, Gangjin Wang:
Voice Activity Detection Based on Distance Entropy in Noisy Environment. 1364-1367 - Yusuke Gotoh, Tomoki Yoshihisa, Hideo Taniguchi, Masanori Kanazawa:
A Scheduling Method on Selective Contents Broadcasting with Node Relay Based Webcast Considering Available Bandwidth. 1368-1373 - Sang C. Suh, Sam I. Saffer, Sri Ganesh Anaparthi, Nikolay Metodiev Sirakov:
Basics of Concepts Representation for Document Summarization. 1374-1380 - Hui-Kai Su, Wen-Hsu Hsiao, Yu-Kai Lin, Kim-Joan Chen, Cheng-Shong Wu:
Design of Cluster-Based System Framework for SIP-Based Multimedia Conferencing Services. 1381-1387 - Samrand Toufani, Gholam Ali Montazer:
Evaluation of E-publishing Acceptance in Iranian Academia. 1388-1394 - Soo-Hwan Kim, SeonKwan Han, Hyeoncheol Kim:
How Can We Teach Computational Literacy to All Levels of Students?. 1395-1400 - Kia Ng:
Interactive Multimedia Interface and Multimodal Analysis for Technology-Enhanced Learning and Performance Preservation. 1401-1405 - Jeong-Hye Han, Dong-Ho Kim, Jong-Won Kim:
Physical Learning Activities with a Teaching Assistant Robot in Elementary School Music Class. 1406-1410 - Eo-Hyung Lee, Chung-Pyo Hong, Shin-Dug Kim:
Real-Time Stable Personal Broadcasting Community for Mobile Terminals. 1411-1418 - Liming Wu, Yingmin Zhang, Yaohua Deng, Xiuchun Tang:
Stroke Segmentation of Reconstruct Offline Handwriting Diagram Based on Continuous Hidden Markov Model. 1419-1424 - Jong-Hyoun Kim:
The Initiative Experiments about New Interface for a Networked Game. 1425-1427 - Zequn Huang, Songnan Bai, Jaeil Jung:
A MIH Services Based Application-Driven Vertical Handoff Scheme for Wireless Networks. 1428-1431 - Jian Wang, Rui Chen, Xin Guo, Ruilong Li, Ningjie Yu, Pengyan Zhang:
Practice of Game-Theoretical Methods and Panel Data Model in City Environmental Management. 1432-1435 - Rui Chen, Jian Wang, Li Wang, Ningjie Yu, Pengyan Zhang:
The Forecasting of China Natural Gas Consumption Based on Genetic Algorithm. 1436-1439 - Xuebin Chen, Guolin Duan, Shufen Zhang, Jin Cai, Yuee Che:
Virtual Organization Model Research in Collaborative Design Grid. 1440-1444 - Haibin Zhang, Hui Zhang:
A Security Enhancement Scheme for Image Perceptual Hashing. 1445-1448 - Songnan Bai, Zequn Huang, Jaeil Jung:
Beacon-based Cooperative Forwarding Scheme for Safety Applications in IVC. 1449-1456 - Chi-Man Pun:
High Capacity and Robust Digital Image Watermarking. 1457-1461 - Dal-Hwan Yoon, Yong-Jin Park, Keun-Seong Choi, Se-Min Park, Jong-Hwa Yoon, Jong-Uk Yoon:
Moving Image Frame with Moble. 1462-1464 - Chi-Man Pun, Nopporn Hemman:
Reversible Digital Watermarking with Block Linking. 1465-1468 - Qin Wang, Shouning Qu, Caiyun Dong, Kui Liu:
The Application and Research of Text Mining in Relevance about Choosing Course and Research Project by Graduate Student. 1469-1472 - Chung-Hsin Liu, Chun-Lin Lo:
The Study of the SIP for the VoIP. 1473-1478 - Youngkon Lee:
2-Layered SOA Test Framework Based on Event-Simulating Proxy. 1479-1484 - Yi Liu, Yue Gao:
Acquiring Mood Information from Songs in Large Music Database. 1485-1491 - Maria de los A. Alonso, Argelio V. de la Cruz Rivera, Grettel Barceló:
An Artificial Intelligence Based Model for Algebra Education. 1492-1498 - Woo-Jin Seo, Seung Ho Ok, Jin-Ho Ahn, Sungho Kang, Byung In Moon:
An Efficient Hardware Architecture of the A-star Algorithm for the Shortest Path Search Engine. 1499-1502 - Iwan Njoto Sandjaja, Nelson Marcos:
Sign Language Number Recognition. 1503-1508 - Chunxiang Li, Jinhua Li, Jianhong Shen:
Simulation of Transient Non-stationary Winds. 1509-1512 - Jun Li, Xianghui Liu:
Survivability for Wireless Sensor Network: Model, Evaluation and Experiment. 1513-1516 - Jijie Zheng, Guozheng Wang, Haiyan Wu, Ying Tang:
The Implementation of a Wired Call-out System with Quasi-digital Encoding. 1517-1519 - Chun-Ping Qin, Duoli Zhang, Gaoming Du, Minglun Gao, Yu-Kun Song:
VLSI Architecture of Video Post-Processing System for MPEG/H.26X. 1520-1525 - Seon-Ho Park, Jung-Ho Eom, Tai-Myoung Chung:
A Study on Access Control Model for Context-Aware Workflow. 1526-1531 - Joseph K. Siror, Huanye Sheng, Dong Wang, Jie Wu:
Application of RFID Technology to Curb Diversion of Transit Goods in Kenya. 1532-1539 - Mangal Sain, Hoon-Jae Lee, Wan-Young Chung:
Personal Healthcare Information System. 1540-1545 - Chung-Hsin Liu, Jiun-Ting Chen, Chung-Min Wu, Chuen-Lung Chen:
The Analysis for the Auxiliary Telemedicine System QoS. 1546-1551 - Chung-Hsin Liu, Yun-Mou Hou:
The Study of the Bluetooth Column-Ring path. 1552-1555 - Joseph K. Siror, Huanye Sheng, Dong Wang, Jie Wu:
Use of RFID Technologies to Combat Cattle Rustling in the East Africa. 1556-1562 - Chih-Fong Tsai, Wei-Chao Lin:
A Comparative Study of Global and Local Feature Representations in Image Database Categorization. 1563-1566 - Qing-Zhong Li, Jia-Xu Liu, Ai-Yun Zang, Zhongqi Wang, Wen-Jin Wang:
A DM642-Based Underwater Video Coding System. 1567-1572 - Qing Xu, Rui Zhang, Mateu Sbert:
A New Approach to Salt-and-Pepper Noise Removal for Color Image. 1573-1576 - Sangjin Lee, Jonghun Park:
A Scoring Function for Retrieving Photo Sets with Broad Topic Coverage. 1577-1580 - Yingjun Du, Chongchong Yu, Jie Liu:
A Study of GIS Development Based on KML and Google Earth. 1581-1585 - Zhiyong Liu, Lei Liu, Hui Kang, Shaochun Zhong, Bing Jia:
An Ontology-Based Method of Adaptive Learning. 1586-1591 - QingE Wu, Zhenyu Han, TianSong Guo:
Application of an Uncertain Reasoning Approach to Software Aging Detection. 1592-1597 - Yoo-Joo Choi, Yu-Bu Lee, We-Duke Cho:
Color Correction for Object Identification from Images with Different Color Illumination. 1598-1603 - Jianfeng Zou, Ding Rong:
Compound Block Algorithm of Moving Object and Background in H.264. 1604-1606 - Moon Sang Hwang, Jae Wook Jeon:
Design of the 3D Input Method Based on Touch Device for Mobile. 1607-1610 - Jaekyong Jeong, Chunho Park, Byeungwoo Jeon:
Global Feature Properties by Image Modifications and Variations. 1611-1614 - Wen-hua Zhou, Zhen-jie Jiang:
Hybrid Cataclysmic Genetic Algorithm Used to Reactive Power Optimization. 1615-1618 - Jinho Lee, Jin Soo Choi, Jin Woo Hong, Haechul Choi:
Intra-mixture Prediction Mode and Enhanced Most Probable Mode Estimation for Intra Coding in H.264/AVC. 1619-1622 - Guitang Wang, Jing Ning, Qiaofen Zhang, Wenjuan Liu, Luxin Tang:
Multifractal Spectrum Analysis on Microscope Image of Eutectic Carbides by a Quadratic Function Fitting. 1623-1627 - Laura Toni:
Rate-Distortion Curve Evaluation for Cross-Layer Optimization in Multimedia Transmission. 1628-1631 - Peng Chen, Zhao Lu, Junzhong Gu:
Vehicle Travel Time Prediction Algorithm Based on Historical Data and Shared Location. 1632-1637 - Hsiao-Ya Chiu, Shi-Zong Wen, Chieh-Chung Sheng:
Apply Web 2.0 Tools to Constructive Collaboration Learning: A Case Study in MIS Course. 1638-1643 - Tae-Woong Jung, Jee-Hee Koo:
Developing Curriculum on U-City Education. 1644-1648 - Honghui Dong, Limin Jia, Xiaoliang Sun, Chenxi Li, Yong Qin:
Road Traffic Flow Prediction with a Time-Oriented ARIMA Model. 1649-1652 - Jee-Hee Koo, Tae-Woong Jung, Mu-Wook Pyeon:
Status of U-city Human Resource Development Business and the Direction for Education Policies. 1653-1657 - Chin-Ming Hsu, Hui-Mei Chao:
Multi-infusion Timing Controller with User-Friendly Interface for Loose Leaf Tea Brewing Service. 1658-1661 - Tianci Huang, Jingbang Qiu, Takeshi Ikenaga:
A Foreground Extraction Algorithm Based on Adaptively Adjusted Gaussian Mixture Models. 1662-1667 - Jingbang Qiu, Tianci Huang, Takeshi Ikenaga:
A FPGA-Based Dual-Pixel Processing Pipelined Hardware Accelerator for Feature Point Detection Part in SIFT. 1668-1674 - Pardeep Kumar, Hoon-Jae Lee:
A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon Cipher. 1675-1680 - Junjian Chen, Jingning Liu, Dan Feng, Zhikun Wang, Qinhua Yan:
IBE Applied to Identity Authentication for Object-Based Storage System. 1681-1684 - Seong-Pyo Hong, Moon-Su Jung, Il-Yong Chung:
Improving Scalability for RFID Privacy Protection Using Parallelism. 1685-1688 - Naofumi Aoki:
Lossless Steganography Techniques for IP Telephony Speech Taking Account of the Redundancy of Folded Binary Code. 1689-1692 - Kamaruddin Malik Mohamad, Mustafa Mat Deris:
Single-byte-marker for Detecting JPEG JFIF Header Using FORIMAGE-JPEG. 1693-1698 - Jingxue Lin, Peilin Song:
A Class of New AC-DC-AC Matrix Converter ACCMC. 1699-1704 - Cui-Xia Li, Wei-Ming Liu, Yi Tang:
A New 12-channel Hand-Held GPS Accelerator Design. 1705-1708 - Chin-Ming Hsu, Hui-Mei Chao:
An Autonomous Mobile Robot System for Advanced Microcontroller Education. 1709-1714 - Xiao Deng, Qitu Hu, Liang Liang, Xiaoling Zhang:
Computer Simulation on Magnetic Field Distribution of Limited Current-Carrying Solenoids. 1715-1719 - Baosen Wang, Yuzhu Hao, Dawei Hu:
Evaluation of Enterprise Managers' Performance Based on Unascertained Measurement. 1720-1723 - Yong-xiang Zhang, Fang-min Chen, Jian Wang, Wei-gong Zhang, Quan Zhou:
Implementation of Gray Projection Image Stabilization Algorithm Based on TMS320DM642. 1724-1726 - Jae Sung Choi, Hyun Lee, Ramez Elmasri, Daniel W. Engels:
Localization Systems Using Passive UHF RFID. 1727-1732 - Ziting Wang, Cunfang Zheng:
Research of Image Capturing and Processing System Based on SOPC Technology. 1733-1736 - Chunxiang Li, Jinhua Li, Peng Dong:
Spline Interpolation Based FFT Simulation Algorithm. 1737-1742 - Chun-Ying Liu, Zhi-geng Pan, Jin-xiang Dong:
Texture Content-Based Image Retrieval for Necktie Pattern. 1743-1746 - Haiyan Yan, Bo Xu:
Using of Interactive Learning Environment in Experimental Study. 1747-1751 - Jun Dai, Jun Li:
VBR MPEG Video Traffic Dynamic Prediction Based on the Modeling and Forecast of Time Series. 1752-1757 - Otgonchimeg Buyanjargal, Youngmi Kwon:
An Energy Efficient Clustering Algorithm for Event-Driven Wireless Sensor Networks (EECED). 1758-1763 - Chi-Chang Chang, Chuen-Sheng Cheng, Pei-Ran Sun:
Bayesian Inference of Time-Dependent Behavior with Nonhomogeneous Poisson Process. 1764-1769 - Ying-hong Dong:
Study on Realization of Simulative Operation System Based on 3D Alternation Technology. 1770-1775
Invited Session
- Yu-Chen Kuo, Wen-Tien Yeh, Ching-Sung Chen:
A Lightweight Routing Protocol for Mobile Target Detection in Wireless Sensor Networks. 1776-1782 - Kee-Hyun Choi, Dong Ryeol Shin, Ho-Jin Shin, Kyung-Soo Jang:
Content Self-Protection for Digital Products Using RFID-Enable Agent Platform. 1783-1788 - Gang Kou, Yi Peng:
A New Hierarchical Document Clustering Method. 1789-1792 - Weijian Huang, Shuo Liang, Yuanyuan Shi:
A Research on Exception Monitoring and Handling. 1793-1797 - Sung-Hyuk Park, Soon-Young Huh, Peng Zhang, Yong Shi:
A Study on Identifying Essential Hyperplanes for Constructing a Multiclass Classification Model. 1798-1804 - Okuthe Paul Kogeda, Simbarashe Nyika:
Automating Cellular Network Faults Prediction Using Mobile Intelligent Agents. 1805-1810 - Jiafu Ren, Min Xiao, Zongfang Zhou, Fang Zhang:
Based on Improved BP Neural Network to Forecast Demand for Spare Parts. 1811-1814 - Song-lin Yang, Wei Xi, Lian-xiang Ma, Hong-qin Zhang, Zhao-long Yang:
Optimizing-Computation of Controlling Parameters of Intelligent Propulsion System of a Hydrofoil Sliding Craft Propelled by Adjustable-Pitch Screw. 1815-1818 - Hui-fen Huang:
Perceptual Image Watermarking Algorithm Based on Magic Squares Scrambling in DWT. 1819-1822 - Weijian Huang, Juwei Yan, Fei Wang:
Research on Project Target Optimization and Decision-Making Based on MAUFT and AHM. 1823-1826 - Weijian Huang, Xuqian Zhou, Nianpeng Wang:
Research on the Application of Web Mining Framework in E-commerce Based on Mobile Agent. 1827-1830 - Youxin Luo, Bin Zeng:
The Non-equal-interval Direct Verhulst GM(1, 1) Model with Two Times Fitting and its Application to Test Data Processing. 1831-1835 - Yuan-Chu Hwang, Tsung-Lin Li:
Conquer Web 2.0 Motivational Challenges from Social Context Evolution. 1836-1841 - Chen-Shu Wang, Yu-Chieh Li:
Integrated Network Management Certification Training with Computer Game: A Knowledge Placement Framework. 1842-1845 - Yongtao Hao, Dai Le:
Shape-Match Algorithm Based on Least Single Direction Warping Works of Points. 1846-1851 - SeungBong Lee, Jewan Bang, Kyung-Soo Lim, Jongsung Kim, Sangjin Lee:
A Stepwise Methodology for Tracing Computer Usage. 1852-1857 - Jewan Bang, Byeongyeong Yoo, Jongsung Kim, Sangjin Lee:
Analysis of Time Information for Digital Investigation. 1858-1864 - Antonio Savoldi, Paolo Gubian, Isao Echizen:
How to Deal with Blurriness in Live Forensics: A Case of Study. 1865-1871 - Chun-Jung Chen, Chun-Chia Chang, Tai-Ning Yang, Chih-Jen Lee, Allen Y. Chang, Chang-Lung Tsai:
A New Strategy for Handling Global Feedback Loops in Selective-Tracing Waveform Relaxation Algorithm for Large Scale MOSFET Circuit Simulation. 1872-1875 - Hui An Sang, Dwen-Ren Tsai:
Analyzing Strategies of Integrating ICT into Teaching Activities Using Innovation Diffusion Theory. 1876-1878 - Chung-Hsin Liu, Ping-Shin Tsai:
Efficiency Evaluation for the 3G and WiMAX. 1879-1883 - Weiya Wang, Chao Li:
Integrated Application of WBAN and WSN. 1884-1888 - Jung-Hong Hong, Hsiung-Peng Liao:
Interoperable Map Interface towards the Sharing and Integration of Internet Geospatial Resource: A Metadata Perspective. 1889-1895 - Allen Y. Chang, Dwen-Ren Tsai, Tsung-Chi Liu, Chun-Jung Chen, I-Horng Jeng:
Performance Evaluation of Real-Time Indoor Positioning with Active-RFID and CSS-Based Nano Lock System. 1896-1898 - Allen Y. Chang, Chang-Sung Yu, Sheng-Chi Lin, Yin-Yih Chang, Pei-Chi Ho:
Search, Identification and Positioning of the Underground Manhole with RFID Ground Tag. 1899-1903 - Sheng-Hsuan Hsu, Ching-Chi Hsu, Shun-Shii Lin, Ferng-Ching Lin:
The Analysis of a Multi-channel MAC Protocol Using Maximal Matching for Ad Hoc Networks. 1904-1909 - Wei-Yu Chen, Dwen-Ren Tsai:
The Creative Commons Based Digital Right Management Model. 1910-1912 - Chung-Hsin Liu, Chun-Lin Lo:
The Simulation for the SIP DDoS Attack. 1913-1917
Workshop
- Syed Muhammad Khaliq-ur-Rahman Raazi, Sungyoung Lee, Young-Koo Lee:
A Novel Architecture for Efficient Key Management in Humanware Applications. 1918-1922 - Binlu Feng, Yunhua Zhou:
A Uniform Construction of New Exact Travelling Wave Solutions and its Applications. 1923-1928 - Yang Zhang:
An Efficient Anonymous Authentication Protocol with Pseudonym Revocability. 1929-1934 - Mohammad Anbar, Deo Prakash Vidyarthi:
GA-Based on Demand Bandwidth Reservation for Real-Time Traffic in Cellular IP Network. 1935-1942 - Yi Zhang, Jun Zhang, XingZu Shu, Lei Guo, Yong Shi, XinBo Liu:
Optimization of Intelligent Compactness Control Rule of Vibratory Roller Based on Genetic Algorithm Method. 1943-1947 - Giovanni Ciccarese, Mario De Blasi, Pierluigi Marra, Vincenzo Mighali, Cosimo Palazzo, Luigi Patrono, Maria Laura Stefanizzi:
Vertical Handover Algorithm for Heterogeneous Wireless Networks. 1948-1954 - Scott Heard, Jing Huang:
Kernel-Perfection through the Push Operation. 1955-1957 - Muhammad Usman, Sohail Asghar, Simon Fong:
A Conceptual Model for Combining Enhanced OLAP and Data Mining Systems. 1958-1963 - Yang Hang, Simon Fong:
A Framework of Business Intelligence-Driven Data Mining for E-business. 1964-1970 - Simon Fong, Jackie Tai:
The Application of Trend Following Strategies in Stock Market Trading. 1971-1976 - Xin Wang, Hua Jiang, Zhenrong Deng:
A Controllable and Adaptable Computer Virus Detection Model. 1977-1981 - Wenming Huang, Peizhi Wen, Xianli Zeng, Zhenrong Deng:
A Trust Rating Model of Recommendation in Grid. 1982-1985 - Zhenrong Deng, Wenming Huang, Zhenbo Tang:
Design and Development of SIP-Based Billing Application Server System. 1986-1989 - Guoyong Cai, Baifa Luo, Zhenrong Deng, Weizhi Liao:
Policy-Driven Service-Augmented Agents toward Developing Flexible E-business Institution. 1990-1995 - Hua Jiang, GuiLin Xu, Zhenrong Deng:
Research of Multi-objective Optimization Based on Hybrid Genetic Algorithm. 1996-1999 - Abdullah S. Al-Mudimigh, Zahid Ullah, Farrukh Saleem, Fahad N. Al-Aboud:
Data Mining for Customer Queries in ERP Model. 2000-2005 - Wei-Cheng Liao, Don-Lin Yang, Jungpin Wu, Ming-Chuan Hung:
Fast and Effective Generation of Candidate-Sequences for Sequential Pattern Mining. 2006-2009 - Jin-Sung Kim, Young-Gue Park:
Mapping Method of SCORM Content Aggregation Model for E-learning Content Design. 2010-2015 - Li-Shiang Tsay, Seunghyun Im:
Mining Generalized Actionable Rules Using Concept Hierarchies. 2016-2023 - Ji Eun Bae, Jin Wook Kim, Hang Joon Kim, Hyun-Soo Park:
Estimation of 3-D Trajectory of the Golf Ball Using Dual Linear Sensor. 2024-2030 - Yuchao Ma:
Empirical Study on Relationship between Independent Director System and Profitability of Listed Companies in China. 2031-2034 - Shu Quan Lu, Shiyu Xie, Takao Ito:
Estimation of the Rigidity and Expectational Model. 2035-2039 - Li Wenyi:
Financial Performance Evaluation of China's Listed Steel Companies from Shareholders' Perspective. 2040-2043 - Fuh-Gwo Jeng, Tzer-Long Chen, Tzer-Shyong Chen:
A Blind Signature Scheme Based on Elliptic Curve Cryptosystem. 2044-2049 - Jung-San Lee, Bo Li, Yung-Chen Chou:
A Brand-New Mobile Value-Added Service: M-Check. 2050-2055 - Chen-Hua Shih, Yaw-Chung Chen:
A Cross-Layering IPv6 Fast Handover Scheme for Real-Time Applications in IEEE 802.16e Network. 2056-2061 - Chung-Wei Chen, Shiuh-Jeng Wang, Yuh-Ren Tsai, Hsing-Chung Chen:
A Framework of Multicast Key Agreement for Distributed User on 3G-WLAN. 2062-2068 - Kuan-Chieh Liao, Wei-Hsun Lee, Min-Hsuan Sung, Ting-Ching Lin:
A One-Time Password Scheme with QR-Code Based on Mobile Phone. 2069-2071 - Yun Cheol Kim, Young Gon Kim, Bo Kyung Lee:
A Safe and Quick Partially-Encrypted Handover Method. 2072-2078 - Jyu-Wei Wang, Hsing-Chung Chen, Yi-Ping Lin:
A Secure DSDV Routing Protocol for Ad Hoc Mobile Networks. 2079-2084 - Yung-Fa Huang, Jhao-Wei Guo, Young-Long Chen:
An Energy Efficient Clustering for Cluster-Based Wireless Sensor Networks. 2085-2088 - Shen-Ho Lin, Jung-Hui Chiu, Sung-Shiou Shen:
Authentication Schemes Based on the EAP-SIM Mechanism in GSM-WLAN Heterogeneous Mobile Networks. 2089-2094 - Jong-Shin Chen, Yu-Nan Tsai, San-Hui Chuang, Zeng-Wen Hong:
Efficient Mission-Oriented Coordination Selection Methods for Hierarchal Wireless Sensor Networks. 2095-2099 - Rui-Yen Chang, Chin-Lung Lee:
IP Video Surveillance Applications over WiMAX Wireless Broadband Technology. 2100-2102 - Yung-Fa Huang, Chin-Wei Hsu, Fu-Bin Gao, Hsing-Chung Chen:
Performance of Adaptive Vertical Handoff in Heterogeneous Networks of WLAN and WCDMA Systems. 2103-2107 - Ya-Fen Chang, Hung-Chin Chang:
Security of Dynamic ID-Based Remote User Authentication Scheme. 2108-2110 - Hsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen, Chung-Wei Chen:
Temporal and Location-Based RBAC Model. 2111-2116
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.