default search action
AST/UCMA/ISA/ACN 2010: Miyazaki, Japan
- Tai-Hoon Kim, Hojjat Adeli:
Advances in Computer Science and Information Technology, AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings. Lecture Notes in Computer Science 6059, Springer 2010, ISBN 978-3-642-13576-7
Information Security and Assurance
- Nurzaini Mohamad Zain, Ganthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail, Azizah Bt Abdul Manaf:
Fuzzy Based Threat Analysis in Total Hospital Information System. 1-14 - Bo Zhang, Qiuliang Xu:
An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model. 15-27 - Yingqi Lu, Cheng Lu, Miao Qi, Shuyan Wang:
A Supervised Locality Preserving Projections Based Local Matching Algorithm for Face Recognition. 28-37 - Moussa Ouedraogo, Haralambos Mouratidis, Eric Dubois, Djamel Khadraoui:
Information Systems Security Criticality and Assurance Evaluation. 38-54 - Muhammad Khurram Khan, Khaled Alghathbar:
Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'. 55-60 - Debnath Bhattacharyya, Arup Kumar Bhaumik, Minkyu Choi, Tai-Hoon Kim:
Directed Graph Pattern Synthesis in LSB Technique on Video Steganography. 61-69 - Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing:
Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-Based Improved K-Medoids Partitioning. 70-81 - Pierre-Louis Cayrel, Mohammed Meziani:
Post-quantum Cryptography: Code-Based Signatures. 82-99 - Danilo Valeros Bernardo, Doan B. Hoang:
Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol. 100-114 - Bo Li, Jianxin Li, Tianyu Wo, Xudong Wu, Junaid Arshad, Wantao Liu:
A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems. 115-128 - Neminath Hubballi, S. Roopa, Ritesh Ratti, Ferdous A. Barbhuiya, Santosh Biswas, Arijit Sur, Sukumar Nandi, Vivek Ramachandran:
An Active Intrusion Detection System for LAN Specific Attacks. 129-142 - Huo-Chong Ling, Raphael C.-W. Phan, Swee-Huay Heng:
Analysis on the Improved SVD-Based Watermarking Scheme. 143-149
Advanced Communication and Networking
- Zhian Zheng, Dang Hai Pham, Tomohisa Wada:
Applications of Adaptive Belief Propagation Decoding for Long Reed-Solomon Codes. 150-158 - Seong-Yong Choi, Jinsu Kim, Seung-Jin Han, Jun Hyeog Choi, Kee-Wook Rim, Jung-Hyun Lee:
Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks. 159-174 - Marek R. Ogiela, Urszula Ogiela:
Grammar Encoding in DNA-Like Secret Sharing Infrastructure. 175-182 - Zhiqiang Zhou, Lin Cong, Guohan Lu, Beixing Deng, Xing Li:
HATS: High Accuracy Timestamping System Based on NetFPGA. 183-195 - Junghoon Lee, Cheolmin Kim:
A Roadside Unit Placement Scheme for Vehicular Telematics Networks. 196-202 - Md. Amiruzzaman, Hassan Peyravi, Mohammad Abdullah-Al-Wadud, Yoojin Chung:
Concurrent Covert Communication Channels. 203-213 - Husnain Naqvi, Stevan M. Berber, Zoran A. Salcic:
Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks. 214-227 - Sejin Park, Yong Kim, Inchul Song, Kichul Han, Jookwang Kim, Kyungho Kim:
High Performance MAC Architecture for 3GPP Modem. 228-238 - Zhian Zheng, Yoshitomo Kaneda, Dang Hai Pham, Tomohisa Wada:
Modified Structures of Viterbi Alogrithm for Forced-State Method in Concatenated Coding System of ISDB-T. 239-249 - Nadir Shah, Depei Qian:
A New Cross-Layer Unstructured P2P File Sharing Protocol over Mobile Ad Hoc Network. 250-263 - Oladayo Salami, Antoine B. Bagula, H. Anthony Chan:
A Model for Interference on Links in Inter-working Multi-hop Wireless Networks. 264-278 - Mahdi Khosravy, Mohammad Reza Alsharif, Katsumi Yamashita:
An Optimum ICA Based Multiuser Data Separation for Short Message Service. 279-286
Advanced Computer Science and Information Technology
- Eunjung Lee, Kyong-Jin Seo:
Multiple Asynchronous Requests on a Client-Based Mashup Page. 287-299 - Rujiang Bai, Xiaoyue Wang, Junhua Liao:
Using an Integrated Ontology Database to Categorize Web Pages. 300-309 - Yonghui Wu, Yuxin Ding, Xiaolong Wang, Jun Xu:
Topic Detection by Topic Model Induced Distance Using Biased Initiation. 310-323 - Zailani Abdullah, Tutut Herawan, Mustafa Mat Deris:
Mining Significant Least Association Rules Using Fast SLP-Growth Algorithm. 324-336 - Phalguni Gupta, Dakshina Ranjan Kisku, Jamuna Kanta Sing, Massimo Tistarelli:
Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition. 337-344 - Praveen Ranjan Srivastava, Tai-Hoon Kim:
Agent Based Approach to Regression Testing. 345-355 - Lianbo Gao, Jianming Shi:
A Numerical Study on B&B Algorithms for Solving Sum-Of-Ratios Problem. 356-362 - Mihye Kim, Kwan-Hee Yoo, Chan Park, Jae-Soo Yoo:
Development of a Digital Textbook Standard Format Based on XML. 363-377 - Hao Xu:
A Pattern-Based Representation Approach for Online Discourses. 378-384 - Woonsuk Suh, Boo-Mann Choung, Eunseok Lee:
A Fault Tolerant Architecture for Transportation Information Services of E-Government. 385-396 - Pavan Kumar Pandey, G. P. Biswas:
Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS. 397-408 - Rujiang Bai, Xiaoyue Wang, Junhua Liao:
Extract Semantic Information from WordNet to Improve Text Classification Performance. 409-420 - Hao Xu:
Managing Ubiquitous Scientific Knowledge on Semantic Web. 421-430 - Hao Xu:
A Semantic Pattern Approach to Managing Scientific Publications. 431-434 - Mitsuhiro Kimura, Takaji Fujiwara:
A Bootstrap Software Reliability Assessment Method to Squeeze Out Remaining Faults. 435-446 - Bo Zhou, Hiroyuki Okamura, Tadashi Dohi:
Markov Chain Monte Carlo Random Testing. 447-456 - Osamu Mizuno, Hideaki Hata:
An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics. 457-468
Ubiquitous Computing and Multimedia Applications
- Yingqi Lu, Cheng Lu, Miao Qi:
An Effective Video Steganography Method for Biometric Identification. 469-479 - Bibhas Chandra Dhara, Sanjoy Kumar Saha, Bhabatosh Chanda:
A Video Coding Technique Using Octagonal Motion Search and BTC-PF Method for Fast Reconstruction. 480-490 - Soumya Banerjee, Hameed Al-Qaheri, El-Sayed A. El-Dahshan, Aboul Ella Hassanien:
Rough Set Approach in Ultrasound Biomicroscopy Glaucoma Analysis. 491-498 - Debabrata Dutta, Sanjoy Kumar Saha, Bhabatosh Chanda:
Video Copy Detection: Sequence Matching Using Hypothesis Test. 499-508 - Mihye Kim, Kwan-Hee Yoo, Chan Park, Jae-Soo Yoo, Hoseung Byun, Wanyoung Cho, Jeeheon Ryu, Namgyun Kim:
An XML-Based Digital Textbook and Its Educational Effectiveness. 509-523 - Kevin Bouchard, Amir Ajroud, Bruno Bouchard, Abdenour Bouzouane:
SIMACT: A 3D Open Source Smart Home Simulator for Activity Recognition. 524-533 - Junghoon Lee, Gyung-Leen Park:
Design of an Efficient Message Collecting Scheme for the Slot-Based Wireless Mesh Network. 534-543 - Xiaohong Yang, Qingcai Chen, Xiaolong Wang:
A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by Humming. 544-557 - Byeongchang Kim:
Chinese Prosody Generation Based on C-ToBI Representation for Text-To-Speech. 558-571 - Yongyun Cho, Hyun Yoe, Haeng-Kon Kim:
CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculture. 572-585 - Ho-chul Lee, Jeong-Hwan Hwang, Meong-hun Lee, Haeng-Kon Kim, Hyun Yoe:
A Power Control Scheme for an Energy-Efficient MAC Protocol. 586-596 - Iftikhar Ahmad, Azween B. Abdullah, Abdullah Sharaf Alghamdi:
Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks. 597-602
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.