Abstract is missing.
- An LCoS Microdisplay for Video Conference on Wireless NetworkHoon-Ju Chung, Sang-bong Byun, Hyun-woong Ju, Yun-seon Do, Dae-Hwan Kim, Byeong-dae Choi, Yong-Hwan Lee. 3-6 [doi]
- Extended Role-Based Security System Using Context InformationXun Li, Sang Bong Yoo. 7-12 [doi]
- Access Control of RFID Middleware Using Extended Usage Control ModelWoochul Shin, Xun Li, Sang Bong Yoo. 13-18 [doi]
- A Design and Implementation of USN-Based Mobile Web Services FrameworkYong-Tae Kim, Yoon-Su Jeong, Jung Hwan Hwang, Kijeong Lee, Randy S. Tolentino, Sang Ho Lee, Gil Cheol Park. 19-23 [doi]
- Performance Comparison of Time-Frequency Analysis Methods for Radar Signature AnalysisIn-Sik Choi, Ill-Keun Rhee. 24-27 [doi]
- Sensing and Motion Control of Virtual Objects for Web Camera-Based GameDae Ho Lee, Young Jae Lee. 28-33 [doi]
- Representation and Comparison of Fuseki Patterns of Go-GamesWoo-Jun Park. 34-37 [doi]
- Region Based Features for Image Analysis and Retrieval Using Local Histogram RefinementHui Zhao, Kwangjai Lee, Seungjin Park, Jong-Hun Chun, Jong-An Park. 38-45 [doi]
- Shape from Focus through Laplacian Using 3D WindowYoungeun An, Gwangwon Kang, Il-Jung Kim, Hyunsook Chung, Jong-An Park. 46-50 [doi]
- A Low Power Communication Circuit Design Using Selective Glitch Removal MethodKwan-Houng Lee, Jin-Gu Kang, Nam-Seo Park, Choong-Mo Yun, Jae-Jin Kim. 51-56 [doi]
- FPGA Low Power Technology Mapping for Reuse Module Design under the Time ConstraintJae-Jin Kim, Hyeon-Mi Yang, Keun Ho Ryu, Hi-Seok Kim. 57-61 [doi]
- Performance Analysis of Hybrid Fingerprint Matching MethodsJong Ku Kim, Seung-Hoon Chae, Sung Jin Lim, Sung Bum Pan, Daesung Moon. 66-69 [doi]
- Dual Watermarking Method for Integrity of Medical ImagesSung Jin Lim, Hae-Min Moon, Seung-Hoon Chae, Sung Bum Pan, Yongwha Chung, Min Hyuk Chang. 70-73 [doi]
- Design of a Scalable RSA Cryptoprocessor Embedded with an Efficient MAC UnitSangook Moon. 74-77 [doi]
- Performance Analysis of the pi/4-DQPSK-OFDM System with Equalizer for the Wireless Multimedia CommunicationKyung-chul Cho, Young-Chang Kang, Sun-hyung Kim. 78-81 [doi]
- The Performance Improvement of License Plate Recognition System Using Composite Color and Artificial Hippocampus AlgorithmHye-Youn Lim, Young-do Lim, Dae-Seong Kang. 82-85 [doi]
- Development of Home Network Gateway Supporting both Wire and Wireless CommunicationJaeyong Han, Sunheum Lee, Sunhyung Kim, Sangmin Han. 86-89 [doi]
- Method of Profile Storage for Improving Recommendation Accuracy on Ubiquitous ComputingChangbok Jang, Jeongseok Kim, Hyokyung Chang, Eui-in Choi, Bong-hoi Kim, Gang-Soo Lee. 90-94 [doi]
- Performance Evaluation and Modeling for Korea Standard of PLC MACByung-Seok Park, Cheoul-Shin Kang, Young Hoon Lee. 95-98 [doi]
- XML Schema Design for Web Service Quality ManagementSungHeun Nam, YunHee Kang. 99-102 [doi]
- Design of Novel On-Chip Antennas with Multi-band for UWB ApplicationsDong-Hee Park, Yoonsik Kwak. 103-105 [doi]
- Modeling and Analysis of CC-Based Security Assurance for Composed SystemsKab-Seung Kou, Gang-Soo Lee. 106-111 [doi]
- Automatic Milled Rice Quality AnalysisOliver C. Agustin, Byung-Joo Oh. 112-115 [doi]
- A Multi-level Grid-Based Air Indexing Scheme for Window Query Processing in Wireless Data Broadcast EnvironmentsSeokJin Im, JinTak Choi, Seiseung Park, Jinsong Ouyang. 116-119 [doi]
- Investigating Authentication Architecture Based on Mobility in Heterogeneous NetworkAnish Prasad Shrestha, Dong-You Choi, Joon Lee, Seung Jo Han, Soon-Suck Jarng. 120-123 [doi]
- System-Level Development and Verification of the FlexRay Communication Controller Model Based on SystemCWoo-Sik Kim, Hyun-Ah Kim, Jin-Ho Ahn, Byung-In Moon. 124-127 [doi]
- Performance of Expanding Ring Search Scheme in AODV Routing AlgorithmWoonkang Heo, Minseok Oh. 128-132 [doi]
- Energy Efficient Data Centric Storage for Sensor Networks Employing Multilevel Grid TechniquesYul Pyo Hong, Young Jae Choi, Tae Goo Kim, Yun Sik Kwak, Ki Hyung Joe, Hyung-Il Kang, Seok Il Song. 133-136 [doi]
- A Number Plate Recognition System for Abnormal DataLunman Deng, Jeong-Young Song. 137-140 [doi]
- Online Games and Security IssuesRosslin John Robles, Sang-Soo Yeo, Young-Deuk Moon, Gilcheol Park, Seoksoo Kim. 145-148 [doi]
- Question Classification Based on Incremental Modified BayesYingwei Li, Zhengtao Yu, Xiangyan Meng, Wen-Gang Che, Cunli Mao. 149-152 [doi]
- Word Sense Disambiguation Based on Bayes Model and Information GainZhengtao Yu, Bin Deng, Bo Hou, Lu Han, Jianyi Guo. 153-157 [doi]
- Fast Method for Multiple Human Face Segmentation in Color ImageRudy Adipranata, Eddy, Cherry G. Ballangan, Ronald P. Ongkodjojo. 158-161 [doi]
- Research on Grid Resource Allocation Algorithm Based on Fuzzy ClusteringFuFang Li, Deyu Qi. 162-166 [doi]
- Index Weight Decision Technique for Search Reliable DocumentsHye-Jin Jeong, Yong-Sung Kim. 167-172 [doi]
- The Research of Reconfiguration Technology in Mobile Ad Hoc NetworkYongxin Feng, Yuntao Zhao, Chengsheng Pan. 173-177 [doi]
- A Study on Structure for Monitoring and Detecting VoIP Abnormal TrafficChang-Yong Lee, Hwan Kuk Kim, Kyounghee Ko, Jeongwook Kim, Hyun-Cheol Jeong. 178-182 [doi]
- Anonymous ID Signature Scheme with Provable IdentityXiaodong Liu, Xiang Gao. 183-186 [doi]
- An Adaptive Energy Efficient Topology for Wireless Sensor NetworksFei Ge, Yuan-ni Wang. 187-192 [doi]
- A Multi-modal Authentication Method Based on Human Face and PalmprintYinghua Lu, Yao Fu, Jinsong Li, Xiaolu Li, Jun Kong. 193-196 [doi]
- Security Enhancement for a Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID SystemsHan-Cheng Hsiang, Hsiang-Chou Kuo, Wei Kuan Shih. 197-200 [doi]
- Formalism of the Access Control Model Based on the Marqued Petri NetsAbderrahim Ghadi, Driss Mammass, Maurice Mignotte, Alain Sartout. 201-204 [doi]
- A New Weighted Association Rule Suitable for Causes and Effects AnalysisZhefu Yu, Huibiao Lu, Chuanying Jia. 205-208 [doi]
- Watermarking Using the Local Relation of Wavelet CoefficientKi-Hong Park, Yoon Ho Kim, Joo-shin Lee. 209-212 [doi]
- A Practical Dynamic Frequency Scaling Scheduling Algorithm for General Purpose Embedded Operating SystemTianzhou Chen, Jiangwei Huang, Liangxiang Xiang, Zhenwei Zheng. 213-216 [doi]
- On Designing and Verifying Smart Home Embedded Software Model Based on AADLWei Song, Yun-wei Dong. 217-221 [doi]
- Coordinating System Software for Power SavingsLingxiang Xiang, Jiangwei Huang, Tianzhou Chen. 222-225 [doi]
- A Java Development Platform in Mobile System for Smart HomeJian Chen, Degui Feng, Wei Hu, Tianzhou Chen. 226-229 [doi]
- Experimental Study on Neuronal Spike Sorting MethodsJianhua Dai, Xiaochun Liu, Yu Yi, Huaijian Zhang, Jingjing Wang, Shaomin Zhang, Xiaoxiang Zheng. 230-233 [doi]
- e-Gov Net Based Emergency Management ServiceYoon Ho Kim, Young Park. 237-240 [doi]
- A Study of the Effect of Very High Voltage 345kV T/L on Broadcasting Radio Wave and Human BodyHwang-bin Yim, Nam-gyu Ko. 241-244 [doi]
- An Open Software Approach for Multimedia Services System Based on RFIDWoon-Yong Kim, Jae-Pil Chung. 245-248 [doi]
- A Network Security Risk Assessment Framework Based on Game TheoryWei He, Chunhe Xia, Cheng Zhang, Yi Ji, Xinyi Ma. 249-253 [doi]
- Agent-Based Data Gathering System for Simulation in APCYoun-Gyou Kook, Woon-Yong Kim, Jae-Oh Lee. 254-257 [doi]
- The Proposed UMA Mode in DMB CAS Authentication ProcessSe-Kab Oh, Jae-Myeong Choi, Nam Sung Kim, Heau-Jo Kang. 258-262 [doi]
- A Study on the Wireless Body Area Network Applications and Channel ModelsJae-Myeong Choi, Heau-Jo Kang, Yong-Seok Choi. 263-266 [doi]
- A Study on the Performance of OFDM Transmission Scheme for QAM Data SymbolLong Bora, Heau-Jo Kang. 267-270 [doi]
- Towards an Estimation of the Accuracy of TCP Reassembly in Network ForensicsGérard Wagener, Alexandre Dulaunoy, Thomas Engel. 273-278 [doi]
- USB PassOn: Secure USB Thumb Drive Forensic ToolkitKeun-Gi Lee, Hye-Won Lee, Chang-Wook Park, Jewan Bang, Kwon-youp Kim, Sangjin Lee. 279-282 [doi]
- A Methodology for Forensic Analysis of Embedded SystemsKyung-Soo Lim, Sangjin Lee. 283-286 [doi]
- An Auxiliary Ground Station Based Traffic Load Balancing Scheme for LEO Satellite SystemsHao Wang, Furong Wang, Xu Xie, Laurence Tianruo Yang. 289-292 [doi]
- Object Tracking of Mobile Robot Using Moving Color and Shape Information for the Aged WalkingSanghoon Kim, Sangmu Lee, Seungjong Kim. 293-297 [doi]
- Optimization of Face Recognition Algorithms for Ubiquitous Computing EnvironmentKanghun Jeong, Dongil Han, Yong-Guk Kim, Hyeonjoon Moon. 298-301 [doi]
- Activity Recognition Using Wearable Sensors for Elder CareYu-Jin Hong, Ig-Jae Kim, Sang Chul Ahn, Hyoung-Gon Kim. 302-305 [doi]
- Design of A Power-, Delay-, and Emergency-Efficient Protocol of Ubiquitous Sensor Network Systems for Silver Town ApplicationsSeong Ho Choi, Hyung-Kun Park, Nam-Ho Kim, Sang-Hoon Kim, YunSeop Yu. 306-309 [doi]
- Object Tracking Using a Bio-inspired Wireless Sensor NetworkHenry Y. K. Lau, Tommy W. C. Lai. 313-318 [doi]
- Data Compression Algorithm Based on Hierarchical Cluster Model for Sensor NetworksTongsen Wang, Lei Wang, Zhijun Xie, Ronghua Yang. 319-323 [doi]
- Implementation of Energy-Efficient Node Management in Wireless Sensor NetworksKyoungbok Ji, Changhwa Kim, Sangkyung Kim. 324-327 [doi]
- Application of Distributed Wireless Sensor Network on Humanitarian Search and Rescue SystemsAlbert Ko, Henry Y. K. Lau, Rex P. S. Sham. 328-333 [doi]
- Directional Antennas Based MAC Mechanism for Spatial ReuseHaejung Kim, Sangkyung Kim, Changhwa Kim, Chanjung Park. 334-337 [doi]
- Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor NetworksXin Zhao, Xiaodong Wang. 338-342 [doi]
- Query Optimization with Metadata Routing Tables on Nano-Q+ Sensor Network with Heterogeneous SensorsYoung-Kwang Nam, Kwang Yong Lee, Byoung-Dai Lee. 343-347 [doi]
- Extending the UbiMDR Supporting Situation-Aware Access ControlJeong-Dong Kim, Dongwon Jeong, Doo-Kwon Baik. 348-351 [doi]
- SS-RBAC: Secure Query Processing Model for Semantic Sensor NetworksDongwon Jeong, Hyejin Jeong, Young-Sik Jeong. 352-355 [doi]
- A Vision: RDB-Based XML Security Models Considering Data LevelsJinhyung Kim, Dongwon Jeong, Doo-Kwon Baik. 356-361 [doi]
- Transportation Telematics Using Mobile Phone Position InformationKaryn Wei-Ju Khoo, K. Daniel Wong. 365-368 [doi]
- A Reliable Robust Fully Ad Hoc Data Dissemination Mechanism for Vehicular NetworksKaveh Shafiee, Victor C. M. Leung. 369-373 [doi]
- Tracking a Vessel by Combining Video and AIS ReportsJinhai Chen, Qinyou Hu, Renyu Zhao, Peng Guojun, Chun Yang. 374-378 [doi]
- Distributed Cooperative Dynamic Spectrum Management Schemes for Industrial Wireless Sensor NetworksHai Hu, Yutang Min, Xianzhong Xie, Furong Wang, Jun Yuan. 381-386 [doi]
- Dynamic Sleeping Algorithm Based on AHP for Wireless Sensor NetworksYutang Min, Laurence Tianruo Yang, Furong Wang, Wenqing Wang. 387-392 [doi]
- 433MHz Wireless Network Technology for Wireless ManufacturingQingyun Dai, Hong Bao, Yihong Liu, Zexi Liu, Ke Zhou, Jin Wang. 393-397 [doi]
- Adaptive Multi-channel MAC Protocol for Dense VANET Using Directional AntennasXu Xie, Furong Wang, Hao Wang, Kewei Li. 398-401 [doi]
- Dynamic Threshold Multi-secret Sharing Scheme Using Elliptic Curve and Bilinear MapsShiuh-Jeng Wang, Yuh-Ren Tsai, Jian-Jhih Shen. 405-410 [doi]
- Personalization in Smart Homes for Disabled PeopleRachid Kadouche, Mounir Mokhtari, Sylvain Giroux, Bessam Abdulrazak. 411-415 [doi]
- Handling Activity Conflicts in Reminding System for Elders with DementiaKejun Du, Daqing Zhang, Muzaaliff W. Musa, Mounir Mokhtari, Xingshe Zhou. 416-421 [doi]
- Browsing of Large Video Collections on Personal Video Recorders with Remote Control Navigation KeysFrode Eika Sandnes, Yo-Ping Huang, Yueh-Min Huang. 422-427 [doi]
- Deriving Safety Properties for Home Network System Based on Goal-Oriented Hazard Analysis ModelBen Yan, Masahide Nakamura, Ken-ichi Matsumoto. 428-436 [doi]
- A Context-Sensitive Rule-Based Architecture for a Smart Building EnvironmentJohn Herbert, John O Donoghue, Xiang Chen. 437-440 [doi]
- Environment Recognition Based on Human Actions Using Probability NetworksHiroshi Miki, Atsuhiro Kojima, Koichi Kise. 441-446 [doi]
- Achieving Socio-technical Confidentiality Using Security Pattern in Smart HomesPierre Busnel, Paul El Khoury, Sylvain Giroux, Keqin Li. 447-452 [doi]
- Discovering InhabitantHongbo Ni, Xingshe Zhou, Daqing Zhang, Kejian Miao. 453-456 [doi]
- The Aware CommunityHoward D. Wactlar, Robert Walters, John Bertoty, Alexander G. Hauptmann. 457-462 [doi]
- Toward a Self-Configuration Middleware for Smart SpacesCharles Gouin-Vallerand, Sylvain Giroux, Bessam Abdulrazak, Mounir Mokhtari. 463-468 [doi]
- Unobtrusive Assistant for Elders with Memory DeclineHaipeng Wang, Xingshe Zhou, Tao Zhang. 469-472 [doi]
- Quality of Service in the Home NetworkDan Jiang, Mo Li. 473-476 [doi]