Abstract is missing.
- A novel priority-based channel access algorithm for contention-based MAC protocol in WBANsBeomSeok Kim, Jinsung Cho. 1 [doi]
- OFDMA-based MAC protocol for adhoc and multihop networksVan-Duc Nguyen, Duyen Trung Ha, Van Tien Pham, Trung Dung Nguyen, Thu Nga Nguyen, Hyunseung Choo. 2 [doi]
- Dynamic frequency allocation of femtocells for guaranteed macrocell throughput in OFDMA networksSangtae Lee, Chunsoo Ahn, Taemin Cho, Jiho Park, Jitae Shin. 3 [doi]
- Smart cooperative relay schemes in LTE-advanced systemSaransh Malik, Dahee No, Daejin Kim, Sangmi Moon, Se-Young Kim, Intae Hwang, Bora Kim, Jin Lee. 4 [doi]
- Application frameworks and methods for assisting tracking of actionable itemsEunsoo Shim, Varun Singla, Venkatesh Krishnaswamy. 5 [doi]
- A levelwise spectral co-clustering algorithm for collaborative filteringElham Hoseini, Sattar Hashemi, Ali Hamzeh. 6 [doi]
- A low cost privacy protection method for SNS by using Bloom filterKen Kuroiwa, Ryuya Uda. 7 [doi]
- REV: extracting entity relations from world wide webChao Chen, Liang He, Xin Lin. 8 [doi]
- How the web can help Wikipedia: a study on information complementation of Wikipedia by the webDamien Eklou, Yasuhito Asano, Masatoshi Yoshikawa. 9 [doi]
- A model for popularity dynamics to predict hot articles in discussion blogSu-Do Kim, Seon-Yeong Kim, Hwan-Gue Cho. 10 [doi]
- Proposal of privacy protection system for web forms using Bloom filterJunpei Yamaguchi, Ryuya Uda. 11 [doi]
- Dynamic generation of concepts hierarchies for knowledge discovering in bio-medical linked data setsNansu Zong, Dong-Hyuk Im, Sung-Kwon Yang, Hyun Namgoong, Hong-Gee Kim. 12 [doi]
- A traffic management scheme using multi-channel sniffer for secure wireless networksWei Min, Keecheon Kim, Wang Ping. 13 [doi]
- Modified local repair in AODV for LoWPANsParkpoom Manoyut, Wannarat Suntiamorntut. 14 [doi]
- Quorum-based key management scheme in wireless sensor networksLih-Chyau Wuu, Chi-Hsiang Hung, Chia-Ming Chang. 15 [doi]
- Broadcast analysis in dense duty-cycle sensor networksSajal K. Das, A. Di Saverio, Giacomo Ghidini, Alfredo Navarra, Maria Cristina Pinotti. 16 [doi]
- Predictive pixel differencing expansion in data reversibility schemeChi-Yao Weng, Chun-I Fan, Chin-Feng Lee, Shiuh-Jeng Wang. 17 [doi]
- Hierarchical clustering and outlier detection for effective image data organizationHyun-Kyo Oh, Seok-Ho Yoon, Sang-Wook Kim. 18 [doi]
- Efficient message encoding method for personal health device monitoring systemJu-Geon Pak, Kee-Hyun Park. 19 [doi]
- Proposal of document protection system by poisoningYasuhiro Nakamura, Ryuya Uda, Yusuke Watanabe. 20 [doi]
- Morphological gradient applied to new active contour model for color image segmentationNguyen Tran Lan Anh, Young-Chul Kim 0001, Gueesang Lee. 21 [doi]
- Virtual high dynamic range imaging for robust recognitionSukhan Lee, Khanh Trong Mai, WoongJi Jeong. 22 [doi]
- Scale and orientation matching for texture analysis and recognitionNguyen Cao Truong Hai, Do Yeon Kim, Hyuk Ro Park. 23 [doi]
- Controlling multi-class error rates for MLP classifier by bias adjustment based on penalty matrixHai-Trieu Pham, Yonggwan Won, Jung-Ja Kim. 24 [doi]
- A compact photo browser for smartphone imaging system with content-sensitive overlapping layoutKwanghwi Kim, Sora Kim, Hwan-Gue Cho. 25 [doi]
- Crowd-sourced urban life monitoring: urban area characterization based crowd behavioral patterns from TwitterShoko Wakamiya, Ryong Lee, Kazutoshi Sumiya. 26 [doi]
- Developing a system for searching a shop name on a mobile device using voice recognition and GPS informationSeon-Yeong Kim, Sung-Hwan Kim, Hwan-Gue Cho. 27 [doi]
- A study of social behavior in collaborative user generated servicesPengyan Yao, Zheng Hu, Zhenzhen Zhao, Noël Crespi. 28 [doi]
- Efficient routing on finding recommenders for trust-aware recommender systemsWeiwei Yuan, Sungyoung Lee, Yongkoo Han, Donghai Guan, Young-Koo Lee. 29 [doi]
- Mode selection scheme considering transmission power for improving performance of device-to-device communication in cellular networksJaheon Gu, Sueng Jae Bae, Bum-Gon Choi, Min Young Chung. 30 [doi]
- Design of handover scheme for IEEE 802.22 WRANJun Lee, Sungwon Lee, Choong Seon Hong, Thant Zin Oo, Heeyoung Jung. 31 [doi]
- Downlink scheduling scheme based on estimation of channel quality at the crossed timeslot for effective resource allocation in LTE-advanced systemJun Suk Kim, Inshil Doh, Bum-Gon Choi, Min Young Chung. 32 [doi]
- Seamless link quality guaranteed handover scheme over experimental IEEE 802.21 MIH testbedInjae Song, Sungwon Lee. 33 [doi]
- Adaptive line code selection by identification efficiency for RFID systemsJongho Park, Jaeyoung Lee, Heesun Han, Tae-Jin Lee. 34 [doi]
- Adaptive management framework for scientific workflow applicationsYoungjoo Han, Chan-Hyun Youn, Dong-Ki Kang. 35 [doi]
- Real-time sequential pattern mining for USN systemJaein Kim, Pilsun Choi, Buhyun Hwang. 36 [doi]
- Modelling irregular samples for analyzing the risk of complications of diabetes mellitusDongsoo S. Kim, James P. Walsh. 37 [doi]
- Application case study of machine learning techniques towards a fault diagnosis system for a manufacturing plant environmentG. Subrahmanya Vrk Rao, Vivek Diwanji, Jinka Parthasarathi. 38 [doi]
- Feature selection in text categorization based on cloud modelYu Liu, Li Hao, Dongjie Zhao. 39 [doi]
- IssueGalaxy: interactive visualizing tools for the current issues in an internet discussion siteYun-Jung Lee, Changkwon Cho, Gyun Woo. 40 [doi]
- Novel isolation technology and remote display protocol for mobile thin client computingBiao Song, Wei Tang, Eui-nam Huh. 41 [doi]
- Code-based cache partitioning for improving hardware cache performanceJunghoon Kim, Inhyuk Kim, Young Ik Eom. 42 [doi]
- Dynamic service orchestration for SaaS application in web environmentJong-Phil Kim, Jang-Eui Hong, Jae Young Choi, Young Hwa Cho. 43 [doi]
- A social network extraction based on relation analysisSunju Oh, Heon Young Yeom. 44 [doi]
- Towards workload-aware virtual machine consolidation on cloud platformsSeungmin Kang, Shin Gyu Kim, Hyeonsang Eom, Heon Young Yeom. 45 [doi]
- DyKA: light-weight dynamic kernel analyzing framework based on binary translation methodDongwoo Lee, Hyung Kook Jun, Won-Tae Kim, Young Ik Eom. 46 [doi]
- A game theory model to support QoS in overlapped WBAN environmentSangbae Shin, Weidong Su, Jinsung Cho. 47 [doi]
- A comparison of data serialization formats for optimal efficiency on a mobile platformAudie Sumaray, S. Kami Makki. 48 [doi]
- A novel local mobility anchor selection scheme for proxy mobile IPv6 networksMurlikrishna Viswanathan, Myung-Kyu Yi, Sung-Yeol Yun, Seok Cheon Park, Young-Kyu Yang. 49 [doi]
- Exact performance analysis of joint partial RAKE receiver and adaptive modulation subject to self-interferenceHong-Chuan Yang, Sung Sik Nam, Dong In Kim. 50 [doi]
- A sense of others: behavioral attestation of UNIX processes on remote platformsToqeer Ali Syed, Roslan Ismail, Shahrulniza Musa, Mohammad Nauman, Sohail Khan. 51 [doi]
- Cooperatively securing network coding against pollution attacks with incentive mechanismYichao Xu, Kouichi Sakurai. 52 [doi]
- Matrix chain multiplication via multi-way join algorithms in MapReduceJaeseok Myung, Sang-goo Lee. 53 [doi]
- An improvement for dEclat algorithmTuan A. Trieu, Yoshitoshi Kunieda. 54 [doi]
- Hybrid hash index for NAND flash memory-based storage systemsMin-hee Yoo, Bo-kyeong Kim, Dong-Ho Lee. 55 [doi]
- EGDIM: evolving graph database indexing methodShariful Islam, Anna Fariha, Chowdhury Farhan Ahmed, Byeong-Soo Jeong. 56 [doi]
- Energy-efficient model for guaranteed area coverage in sensor networks with random deployed sensorsVyacheslav V. Zalyubovskiy, Tatiana Aldyn-ool, Jaehyoun Kim, Hyunseung Choo. 57 [doi]
- Securing SCADA communication using hybrid cryptographyAamir Shahzad, Shahrulniza Musa. 58 [doi]
- An open design privacy-enhancing platform supporting location-based applicationsTran Khanh Dang, Chan Nam Ngo, Trong Nhan Phan, Nguyen Nhat Minh Ngo. 59 [doi]
- POAuth: privacy-aware open authorization for native apps on smartphone platformsMohammad Nauman, Sohail Khan, Abu Talib Othman, Shahrulniza Musa, Najeeb Ur Rehman. 60 [doi]
- FIOS: a flexible virtualized I/O subsystem to alleviate interference among virtual machinesQi Zhang, Hai Jin, Xiaofei Liao, Dingding Li, Wei Deng. 61 [doi]
- iPhone social networking for evidence investigations using iTunes forensicsYu-Cheng Tso, Shiuh-Jeng Wang, Cheng-Ta Huang, Wei-Jen Wang. 62 [doi]
- Potential intrusions in wireless networksVladimir V. Shakhov, Sangyep Nam, Seung-Jung Shin, Hyunseung Choo. 63 [doi]
- Intelligent flood information system via SMS (IFIS)Sayed Aziz Sayed Hussin, M. N. Ismail, Hannah Sofian. 64 [doi]
- On the security of an novel protocol for downloadable CASHanjae Jeong, Seungjoo Kim, Dongho Won. 65 [doi]
- Research to recommend influencially product group about interest through the TKMA (Transformed K-Means Algorithm)Jae Yoel Yoon, Iee Joon Kim, Ji Yeon Lim, Seung Kwan Kim, Ung-Mo Kim. 66 [doi]
- Determining user expertise for improving recommendation performanceSang-il Song, SangKeun Lee, Sungchan Park, Sang-goo Lee. 67 [doi]
- Identifying problem frames for location-based servicesMuhammad Asif, John Krogstie. 68 [doi]
- Context-aware agriculture organizerZafar Khaydarov, Teemu Henrikki Laine, Silvia Gaiani, Jinchul Choi, Chaewoo Lee. 69 [doi]
- Technological and organizational determinants of information management in the urban space (based on scientific research)Marek Golinski, Magdalena Graczyk, Maciej Szafranski, Waldemar Prussak, Tomasz Skawinski. 70 [doi]
- Healthcare interoperability through enterprise architecturePhilip DePalo, Yeong-Tae Song. 71 [doi]
- Automatic restoration of corrupted regions in images using object width transformToan Nguyen Dinh, Jeong Hwan Kim, Gueesang Lee. 72 [doi]
- An efficient access control based on role attributes in service oriented environmentsHeemoon Chae, Jooik Jung, Jong Hyuk Lee, Kyong-Ho Lee. 73 [doi]
- A hypergraph-based storage policy for RDF version management systemDong-Hyuk Im, Nansu Zong, Eung-Hee Kim, Seokchan Yun, Hong-Gee Kim. 74 [doi]
- Incremental update on probabilistic frequent itemsets in uncertain databasesMing-Yen Lin, Cheng-Tai Fu, Sue-Chen Hsueh. 75 [doi]
- Apriori-based frequent itemset mining algorithms on MapReduceMing-Yen Lin, Pei-Yu Lee, Sue-Chen Hsueh. 76 [doi]
- Real-time pattern map mining for USN applicationJaein Kim, Pilsun Choi, Buhyun Hwang. 77 [doi]
- From toys to products: a step towards supporting the robust reuse and integration on the webPeng Gao, Hao Han. 78 [doi]
- Intercloud message exchange middlewareMuhammad Bilal Amin, Wajahat Ali Khan, Ammar Ahmad Awan, Sungyoung Lee. 79 [doi]
- Topic word selection for blogs by topic richness using web search result clusteringJinhee Park, Sungwoo Lee, Hye-Wuk Jung, Jee-Hyong Lee. 80 [doi]
- Improving the performance of the web proxy server through group prefetchingTsozen Yeh, Yenlin Pan. 81 [doi]
- The profiling method in multicore processor for effective performance improvementSeung Hyun Yoon, Kyung Min Lee, Yong-Seok Kim, Seong Jin Cho, Dong Won Choi, Key Ho Kwon, Kil Jae Kim, Jong Hyun Park, Jae Wook Jeon. 82 [doi]
- IAAS: an integrity assurance service for web page via a fragile watermarking chain modulePeng Gao, Hao Han, Takehiro Tokuda. 83 [doi]
- Architecture for mobile control functions in supplier deliveries for distributed integrated ERP modulesLars Frank, A. V. Senthil Kumar. 84 [doi]
- NL scoring and Bloom competency test: an experimental resultAdidah Lajis, Normaziah Abdul Aziz. 85 [doi]
- Image clustering using improved spatial fuzzy C-meansAsmatullah Chaudhry, Mehdi Hassan, Asifullah Khan, Jin Young Kim, Tran Anh Tuan. 86 [doi]
- ClaimPerfect: an application case study of machine learning techniques towards a fraud management system for warranty claims processingJinka Parthasarathi, G. Subrahmanya Vrk Rao, Karthik Sundararaman. 87 [doi]
- Wireless gait event detection system based on single gyroscopeD. W. Kang, J. S. Choi, H. S. Kim, H. S. Oh, J. W. Seo, J. W. Lee, G. R. Tack. 88 [doi]
- A method for secure and efficient block cipher using white-box cryptographyJaesung Yoo, Hanjae Jeong, Dongho Won. 89 [doi]
- Intelligent DSS for talent management: a proposed architecture using knowledge discovery approachHamidah Jantan, Abdul Razak Hamdan, Zulaiha Ali Othman. 90 [doi]
- Estimation of the number of humans and their movement paths in a room using binary infrared sensorsToshiaki Miyazaki, Yuki Kasama. 91 [doi]
- Rate-adaptive polar codes for distributed source codingJong-Hwan Kim, Jin Whan Kang, Sang Yun Shin, Min Jang, Vu Thi Trang, Sang-Hyo Kim. 92 [doi]
- Medical image protection using secret sharing schemeHao-Kuan Tso, Der-Chyuan Lou. 93 [doi]
- An evaluation of input data quality of lifelog analysis application with a framework based on quantitative indexAkika Yamashita, Saeko Iwaki, Masato Oguchi. 94 [doi]
- Generation of training database using a noise model for OCR systemsDo Yen, Soo-Hyung Kim, Sang-Cheol Park, Ha Le, Yan Juan Chen, Sun Hwa Jeong, In Seop Na. 95 [doi]
- Emotional-speech recognition using the neuro-fuzzy networkMurlikrishna Viswanathan, Zhen-Xing Zhang, Xue-Wei Tian, Joon S. Lim. 96 [doi]
- An object recognition method using the improved snake algorithmQian Zhang, Sung-Jong Eun, Hyeonjin Kim, Taeg Keun Whangbo. 97 [doi]
- Web community analysis and its application to language specific crawlingKulwadee Somboonviwat. 98 [doi]
- A recommendation system based on a subset of ratersBernhard Scholz, Sang-Min Choi, Sang-Ki Ko, Hae-Sung Eom, Yo-Sub Han. 99 [doi]
- Foraging swarm robots system adopting honey bee swarm for improving energy efficiencyJong-Hyun Lee, Hyun-Tae Kim, Chang Wook Ahn. 100 [doi]
- Achieving interoperability among healthcare standards: building semantic mappings at models levelWajahat Ali Khan, Asad Masood Khattak, Sungyoung Lee, Maqbool Hussain, Muhammad Bilal Amin, Khalid Latif. 101 [doi]
- Designing vibrotactile devices for teaching English intonationJungsik Hwang, Kwangsu Cho. 102 [doi]
- Development of real-time virtual environment with hierarchical constructionHamzah Asyrani Sulaiman, Abdullah Bade, Mohd Harun Abdullah. 103 [doi]
- Integration of opinion mining service flow with anonymous informationIee Joon Kim, Jae Yoel Yoon, Ji Yeon Lim, Seung Kwan Kim, Ung-Mo Kim. 104 [doi]
- Enabling the smart city: the progress of u-city in KoreaDong-Hee Shin, Tayang Kim. 105 [doi]
- Dissemination of "Seri Rama" Shadow Play puppet as a cultural heritage through Capcom's Street Fighter IVDahlan Bin, Abdul Ghani. 106 [doi]
- Social computing in tourism websitesAlton Yeow-Kuan Chua. 107 [doi]
- An analysis on adaptive cluster ratio in wireless sensor networksZilong Jin, Jinsung Cho. 108 [doi]
- Adaptive ED scan for 802.15.4 based wireless personal area networksDaegil Yoon, Jihoon Kim, Sungho Hwang, Chunghee Lee. 109 [doi]
- Terrain/clutter based location prediction by using multi-condition Bayesian decision theoryA. Muhammad, M. S. Mazliham, Patrice Boursier, Shahrulniza Musa, Jawahir Che Mustapha Yusuf. 110 [doi]
- An enhanced ranging algorithm for fixed wireless communication systemKyung-Hoon Lee, Won-Joon Hwang, Hyung-Jin Choi. 111 [doi]
- Game theory-based resource allocation strategy for clustering based wireless sensor networkDongyul Lee, Hyunchul Shin, Chaewoo Lee. 112 [doi]
- Web-based wireless sensor networks: a survey of architectures and applicationsKlaithem Al Nuaimi, Mariam Al Nuaimi, Nader Mohamed, Imad Jawhar, Khaled Shuaib. 113 [doi]
- Simple mobility management protocol based on P2P for global IP mobility supportJong-Tae Park, Seung-Man Chun. 114 [doi]
- AGNES* for networks modeling: review and researchingDmitry Podkorytov, Alexey S. Rodionov, Hyunseung Choo. 115 [doi]
- Hybrid RSS/TOA wireless positioning with a mobile anchor in wireless sensor networksSangdeok Kim, Seong-Hyun Jang, Jong-Wha Chong. 116 [doi]
- Cluster-based AAA architecture for wireless sensor and WiMax networksUsman Mansoor, Taekkyeun Lee, Usman Mehmood, Ki-Hyung Kim. 117 [doi]
- SCTP based protocol architecture for multihomed thin clientMd. Ali-Al-Mamun, Md. Motaharul Islam, Seung-Un Choe, Eui-nam Huh. 118 [doi]
- Throughput analysis and measurement on real terminal in multi-rate wireless LANSaeko Iwaki, Tutomu Murase, Masato Oguchi. 119 [doi]
- A distributed wake-up scheduling algorithm for base stations in green cellular networksTamal Adhikary, Amit Kumar Das, Md. Abdur Razzaque, Md. Obaidur Rahman, Choong Seon Hong. 120 [doi]
- Pilot-assisted IFO estimation schemes for DVB-T systemsYoungpo Lee, Jong In Park, Seokho Yoon. 121 [doi]
- Semi-supervised fall detection algorithm using fall indicators in smartphoneP. N. Ali Fahmi, Vo Quang Viet, Deokjai Choi. 122 [doi]
- Design and implementation of quality measurement tools in wireless data servicesSung-Yeol Yun, Seok Cheon Park. 123 [doi]
- Real user-environment migration between heterogeneous ISA platformsSeong Jin Cho, Kyung Min Lee, Yong-Seok Kim, Seung Hyun Yoon, Dong Won Choi, Key Ho Kwon, Kil Jae Kim, Jong Hyun Park, Jae Wook Jeon. 124 [doi]
- Phase recovery for QPSK transmission without using complex multipliersXinmiao Zhang, Jea Hack Lee, Myung Hoon Sunwoo. 125 [doi]
- Multi-connection selection scheme in heterogeneous wireless networksShin-Hun Kang, Jae-Hyun Kim. 126 [doi]
- The energy saving strategy using the network coding in the wireless mesh networkJu-Yeon Jo, Yoohwan Kim, Kyu-Hwan Lee, Sung Hyun Cho, Jae-Hyun Kim. 127 [doi]
- MIMO relaying in random linear coded multiple-access relay networkTaha Khalaf, Young Jin Chun, Dong In Kim. 128 [doi]
- Constrained weighted sum rate maximization for multicast service in downlink OFDMAEkram Hossain, Dong In Kim. 129 [doi]
- Calculating two-terminal reliability in a diameter constrained network with cutnodesDenis A. Migov, Olga K. Rodionova. 130 [doi]