Abstract is missing.
- Implementation of Short Message Service System to Be Based Mobile Wireless InternetHae Sool Yang, Jung-Hun Hong, Seok-Hyung Hwang, Haeng-Kon Kim. 1-9 [doi]
- Fuzzy Clustering for Documents Based on Optimization of Classifier Using the Genetic AlgorithmJu-In Youn, He-Jue Eun, Yong-Sung Kim. 10-20 [doi]
- P2P Protocol Analysis and Blocking AlgorithmSun-Myung Hwang. 21-30 [doi]
- Object Modeling of RDF Schema for Converting UML Class DiagramJin-Sung Kim, Chun-Sik Yoo, Mi-Kyung Lee, Yong-Sung Kim. 31-41 [doi]
- A Framework for Security Assurance in Component Based DevelopmentGu-Beom Jeong, Guk-Boh Kim. 42-51 [doi]
- Security Framework to Verify the Low Level Implementation CodesHaeng-Kon Kim, Hae Sool Yang. 52-61 [doi]
- A Study on Evaluation of Component Metric SuitesHaeng-Kon Kim. 62-70 [doi]
- The K-Means Clustering Architecture in the Multi-stage Data Mining ProcessBobby D. Gerardo, Jaewan Lee, Yeon-Sung Choi, Malrey Lee. 71-81 [doi]
- A Privacy Protection Model in ID Management Using Access ControlHyang-Chang Choi, YongHoon Yi, Jae-Hyun Seo, BongNam Noh, HyungHyo Lee. 82-91 [doi]
- A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network SystemsIn-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Dongho Won. 92-101 [doi]
- Efficient Multi-bit Shifting Algorithm in Multiplicative Inversion ProblemsInjoo Jang, Hyeong Seon Yoo. 102-110 [doi]
- Modified Token-Update Scheme for Site AuthenticationJoungho Lee, Injoo Jang, Hyeong Seon Yoo. 111-116 [doi]
- A Study on Secure SDP of RFID Using Bluetooth CommunicationDae-Hee Seo, Im-Yeong Lee, Hee-Un Park. 117-126 [doi]
- The Semantic Web Approach in Location Based ServicesJong Woo Kim, Ju-Yeon Kim, Hyun-Suk Hwang, Sung-Seok Park, Chang Soo Kim, Sung-gi Park. 127-136 [doi]
- SCTE: Software Component Testing EnvironmentsHaeng-Kon Kim, Oh-Hyun Kwon. 137-146 [doi]
- Computer Security Management Model Using MAUT and SNMPJongwoo Chae, Jungkyu Kwon, Mokdong Chung. 147-156 [doi]
- Session and Connection Management for QoS-Guaranteed Multimedia Service Provisioning on IP/MPLS NetworksYoung-Tak Kim, Hae-Sun Kim, Hyun-Ho Shin. 157-168 [doi]
- A GQS-Based Adaptive Mobility Management Scheme Considering the Gravity of Locality in Ad-Hoc NetworksIhn-Han Bae, Sun-Jin Oh. 169-176 [doi]
- A Study on the E-Cash System with Anonymity and DivisibilitySeo-Il Kang, Im-Yeong Lee. 177-186 [doi]
- An Authenticated Key Exchange Mechanism Using One-Time Shared KeyYonghwan Lee, Eunmi Choi, Dugki Min. 187-194 [doi]
- Creation of Soccer Video Highlight Using the Caption InformationOh-Hyung Kang, Seong-Yoon Shin. 195-204 [doi]
- The Information Search System Using Neural Network and Fuzzy Clustering Based on Mobile AgentJaeseon Ko, Bobby D. Gerardo, Jaewan Lee, Jae-Jeong Hwang. 205-214 [doi]
- A Security Evaluation and Testing Methodology for Open Source Software Embedded Information Security SystemSung-Ja Choi, Yeon-hee Kang, Gang-Soo Lee. 215-224 [doi]
- An Effective Method for Analyzing Intrusion Situation Through IP-Based ClassificationMinsoo Kim, Jae-Hyun Seo, Seungyong Lee, BongNam Noh, Jung-Taek Seo, Eung Ki Park, Choonsik Park. 225-234 [doi]
- A New Stream Cipher Using Two Nonlinear FunctionsMi-Og Park, Dea-Woo Park. 235-244 [doi]
- New Key Management Systems for Multilevel SecurityHwankoo Kim, Bongjoo Park, JaeCheol Ha, Byoungcheon Lee, DongGook Park. 245-253 [doi]
- Neural Network Techniques for Host Anomaly Intrusion Detection Using Fixed Pattern TransformationByungRae Cha, KyungWoo Park, JaeHyun Seo. 254-263 [doi]
- The Role of Secret Sharing in the Distributed MARE ProtocolsKyeongmo Park. 264-273 [doi]
- Security Risk Vector for Quantitative Asset AssessmentYoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Lee, Hoh Peter In. 274-283 [doi]
- A Remote Video Study Evaluation System Using a User ProfileSeong-Yoon Shin, Oh-Hyung Kang. 284-294 [doi]
- Performance Enhancement of Wireless LAN Based on Infrared Communications Using Multiple-Subcarrier ModulationHae Geun Kim. 295-303 [doi]
- Modeling Virtual Network Collaboration in Supply Chain ManagementHa Jin Hwang. 304-313 [doi]
- SPA-Resistant Simultaneous Scalar MultiplicationMun-Kyu Lee. 314-321 [doi]
- HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce EnvironmentByung kwan Lee, Am Sok Oh, Eun-Hee Jeong. 322-331 [doi]
- A Fault Distance Estimation Method Based on an Adaptive Data Window for Power Network SecurityChang Dae Yoon, Seung-Yeon Lee, Myong-chul Shin, Ho-Sung Jung, Jae Sang Cha. 332-340 [doi]
- Distribution Data Security System Based on Web Based Active DatabaseSang-Yule Choi, Myong-chul Shin, Nam-Young Hur, Jong-Boo Kim, Tai-Hoon Kim, Jae Sang Cha. 341-352 [doi]
- Efficient DoS Resistant Multicast Authentication SchemesJaeYong Jeong, Yongsu Park, Yookun Cho. 353-362 [doi]
- Development System Security Process of ISO/IEC TR 15504 and Security Considerations for Software Process ImprovementEun-ser Lee, Malrey Lee. 363-372 [doi]
- Flexible ZCD-UWB with High QoS or High Capacity Using Variable ZCD Factor Code SetsJae Sang Cha, Kyungsup Kwak, Chang Dae Yoon, Chong Hyun Lee. 373-380 [doi]
- Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature SchemeHak Soo Ju, Dae Youb Kim, Dong-Hoon Lee, Jongin Lim, Kilsoo Chun. 381-390 [doi]
- The Large Scale Electronic Voting Scheme Based on Undeniable Multi-signature SchemeSung-Hyun Yun, Hyung-Woo Lee. 391-400 [doi]
- IPv6/IPsec Conformance Test Management System with Formal Description TechniqueHyung-Woo Lee, Sung-Hyun Yun, Jae-Sung Kim, Nam-Ho Oh, Do-Hyung Kim. 401-410 [doi]
- Interference Cancellation Algorithm Development and Implementation for Digital TelevisionChong Hyun Lee, Jae Sang Cha. 411-419 [doi]
- Algorithm for ABR Traffic Control and Formation Feedback InformationMalrey Lee, Dong-Ju Im, Young Keun Lee, Jae-deuk Lee, Suwon Lee, Keun Kwang Lee, HeeJo Kang. 420-428 [doi]
- Interference-Free ZCD-UWB for Wireless Home Network ApplicationsJae Sang Cha, Kyungsup Kwak, Sang-Yule Choi, Tai-Hoon Kim, Chang Dae Yoon, Chong Hyun Lee. 429-441 [doi]
- Safe Authentication Method for Security Communication in UbiquitousHoon Ko, Bangyong Sohn, Hayoung Park, Yongtae Shin. 442-448 [doi]
- Pre/Post Rake Receiver Design for Maximum SINR in MIMO Communication SystemChong Hyun Lee, Jae Sang Cha. 449-457 [doi]
- SRS-Tool: A Security Functional Requirement Specification Development Tool for Application Information System of OrganizationSang-soo Choi, Soo-young Chae, Gang-Soo Lee. 458-467 [doi]
- Design Procedure of IT Systems Security CountermeasuresTai-Hoon Kim, Seung-youn Lee. 468-473 [doi]
- Similarity Retrieval Based on Self-organizing MapsDong-Ju Im, Malrey Lee, Young Keun Lee, Tae-eun Kim, Suwon Lee, Jaewan Lee, Keun Kwang Lee, Kyung Dal Cho. 474-482 [doi]
- An Expert System Development for Operating Procedure Monitoring of PWR PlantsMalrey Lee, Eun-ser Lee, HeeJo Kang, HeeSook Kim. 483-490 [doi]
- Security Evaluation Targets for Enhancement of IT Systems AssuranceTai-Hoon Kim, Seung-youn Lee. 491-498 [doi]
- Protection Profile for Software Development SiteSeung-youn Lee, Myong-chul Shin. 499-507 [doi]
- Improved RS Method for Detection of LSB SteganographyXiangyang Luo, Bin Liu, Fenlin Liu. 508-516 [doi]
- Robust Undetectable Interference WatermarksRyszard Grzaslewicz, Jaroslaw Kutylowski, Miroslaw Kutylowski, Wojciech Pietkiewicz. 517-526 [doi]
- Equidistant Binary Fingerprinting Codes Existence and Identification AlgorithmsMarcel Fernandez, Miguel Soriano, Josep Cotrina Navau. 527-536 [doi]
- Color Cube Analysis for Detection of LSB Steganography in RGB Color ImagesKwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim. 537-546 [doi]
- Compact and Robust Image HashingSheng Tang, Jin-Tao Li, Yong-Dong Zhang. 547-556 [doi]
- Watermarking for 3D Mesh Model Using Patch CEGIsSuk Hwan Lee, Ki-Ryong Kwon. 557-566 [doi]
- Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXEJaemin Choi, Jongsung Kim, Jaechul Sung, Sangjin Lee, Jongin Lim. 567-576 [doi]
- Fault Attack on the DVB Common Scrambling AlgorithmKai Wirt. 577-584 [doi]
- HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce EnvironmentByung kwan Lee, Am Sok Oh, Eun-Hee Jeong. 585-594 [doi]
- Perturbed Hidden Matrix CryptosystemsZhiping Wu, Jintai Ding, Jason E. Gower, Dingfeng Ye. 595-602 [doi]
- Identity-Based Identification Without Random OraclesKaoru Kurosawa, Swee-Huay Heng. 603-613 [doi]
- Linkable Ring Signatures: Security Models and New SchemesJoseph K. Liu, Duncan S. Wong. 614-623 [doi]
- Practical Scenarios for the Van Trung-Martirosyan CodesMarcel Fernandez, Miguel Soriano, Josep Cotrina Navau. 624-633 [doi]
- Obtaining True-Random Binary Numbers from a Weak Radioactive SourceAmmar Alkassar, Thomas Nicolay, Markus Rohe. 634-646 [doi]
- Modified Sequential Normal Basis Multipliers for Type II Optimal Normal BasesDong Jin Yang, Chang-Han Kim, Young-Ho Park, Yongtae Kim, Jongin Lim. 647-656 [doi]
- A New Method of Building More Non-supersingular Elliptic CurvesShi Cui, Pu Duan, Choong Wah Chan. 657-664 [doi]
- Accelerating AES Using Instruction Set Extensions for Elliptic Curve CryptographyStefan Tillich, Johann Großschädl. 665-675 [doi]
- Access Control Capable Integrated Network Management System for TCP/IP NetworksHyuncheol Kim, Seong-Jin Ahn, Younghwan Lim, Youngsong Mun. 676-685 [doi]
- A Directional-Antenna Based MAC Protocol for Wireless Sensor NetworksShen Zhang, Amitava Datta. 686-695 [doi]
- An Extended Framework for Proportional Differentiation: Performance Metrics and Evaluation ConsiderationsJahwan Koo, Seong-Jin Ahn. 696-703 [doi]
- QoS Provisioning in an Enhanced FMIPv6 ArchitectureZheng Wan, Xuezeng Pan, Lingdi Ping. 704-713 [doi]
- Delay of the Slotted ALOHA Protocol with Binary Exponential Backoff AlgorithmSun Hur, Jeong Kee Kim, Dong Chun Lee. 714-722 [doi]
- Design and Implementation of Frequency Offset Estimation, Symbol Timing and Sampling Clock Offset Control for an IEEE 802.11a Physical LayerKwang Ho Chun, Seung-hyun Min, Myoung-ho Seong, Myoung-Seob Lim. 723-731 [doi]
- Automatic Subtraction Radiography Algorithm for Detection of Periodontal Disease in Internet EnvironmentYonghak Ahn, Oksam Chae. 732-740 [doi]
- Improved Authentication Scheme in W-CDMA NetworksDong Chun Lee, Hyo Young Shin, Joung Chul Ahn, Jae-Young Koh. 741-748 [doi]
- Memory Reused Multiplication Implementation for Cryptography SystemGi Yean Hwang, Jia Hou, Kwang Ho Chun, Moon Ho Lee. 749-753 [doi]
- Scheme for the Information Sharing Between IDSs Using JXTAJin Soh, Sung Man Jang, Geuk Lee. 754-761 [doi]
- Workflow System Modeling in the Mobile Healthcare B2B Using Semantic InformationSang-Young Lee, Yung-Hyeon Lee, Jeom Goo Kim, Dong Chun Lee. 762-770 [doi]
- Detecting Water Area During Flood Event from SAR ImageHong-Gyoo Sohn, Yeong-Sun Song, Gi-Hong Kim. 771-780 [doi]
- Position Based Handover Control MethodJongchan Lee, Sok-Pal Cho, Hong-Jin Kim. 781-788 [doi]
- Improving Yellow Time Method of Left-Turning Traffic Flow at Signalized Intersection Networks by ITSHyung Jin Kim, Bongsoo Son, Soobeom Lee, Joowon Park. 789-797 [doi]
- A Multimedia Database System Using Dependence Weight Values for a Mobile EnvironmentKwang-Hyoung Lee, HeeSook Kim, Keun-Wang Lee. 798-805 [doi]
- A General Framework for Analyzing the Optimal Call Admission Control in DS-CDMA Cellular NetworkWen Chen, Feiyu Lei, Weinong Wang. 806-815 [doi]
- Heuristic Algorithm for Traffic Condition Classification with Loop Detector DataSangsoo Lee, Sei-Chang Oh, Bongsoo Son. 816-821 [doi]
- Spatial Data Channel in a Mobile Navigation SystemYingwei Luo, Guomin Xiong, Xiaolin Wang, Zhuoqun Xu. 822-831 [doi]
- A Video Retrieval System for Electrical Safety Education Based on a Mobile AgentHyeon-Seob Cho, Keun-Wang Lee. 832-838 [doi]
- Fuzzy Multi-criteria Decision Making-Based Mobile TrackingGi-sung Lee. 839-847 [doi]
- Evaluation of Network Blocking Algorithm Based on ARP Spoofing and Its ApplicationJahwan Koo, Seong-Jin Ahn, Younghwan Lim, Youngsong Mun. 848-855 [doi]
- Design and Implementation of Mobile-Learning System for Environment EducationKeun-Wang Lee, Jong-Hee Lee. 856-862 [doi]
- A Simulation Model of Congested Traffic in the Waiting LineBongsoo Son, Taewan Kim, Yongjae Lee. 863-869 [doi]
- Core Technology Analysis and Development for the Virus and Hacking PreventionSeung-Jae Yoo. 870-879 [doi]
- Development of Traffic Accidents Prediction Model with Intelligent System TheorySoobeom Lee, TaiSik Lee, Hyung Jin Kim, YoungKyun Lee. 880-888 [doi]
- Prefetching Scheme Considering Mobile User s Preference in Mobile NetworksJin Ah Yoo, In Seon Choi, Dong Chun Lee. 889-895 [doi]
- System Development of Security Vulnerability Diagnosis in Wireless Internet NetworksByoung-Muk Min, Sok-Pal Cho, Hong-Jin Kim, Dong Chun Lee. 896-903 [doi]
- An Active Node Management System for Secure Active NetworksJin-Mook Kim, In-sung Han, Hwang-bin Ryou. 904-913 [doi]
- A Systematic Design Approach for XML-View Driven Web Document WarehousesVicky Nassis, Rajagopal Rajugan, Tharam S. Dillon, J. Wenny Rahayu. 914-924 [doi]
- Clustering and Retrieval of XML Documents by StructureJeong Hee Hwang, Keun Ho Ryu. 925-935 [doi]
- A New Method for Mining Association Rules from a Collection of XML DocumentsJuryon Paik, Hee Yong Youn, Ung-Mo Kim. 936-945 [doi]
- Content-Based Recommendation in E-CommerceBing Xu, Mingmin Zhang, Zhigeng Pan, Hongwei Yang. 946-955 [doi]
- A Personalized Multilingual Web Content Miner: PMWeb MinerRowena Chau, Chung-Hsing Yeh, Kate A. Smith. 956-965 [doi]
- Context-Based Recommendation Service in Ubiquitous CommerceJeong Hee Hwang, Mi Sug Gu, Keun Ho Ryu. 966-976 [doi]
- A New Continuous Nearest Neighbor Technique for Query Processing on Mobile EnvironmentsJeong Hee Chi, Sang-Ho Kim, Keun Ho Ryu. 977-987 [doi]
- Semantic Web Enabled Information Systems: Personalized Views on Web DataRobert Baumgartner, Christian Enzi, Nicola Henze, Marc Herrlich, Marcus Herzog, Matthias Kriesell, Kai Tomaschewski. 988-997 [doi]
- Design of Vehicle Information Management System for Effective Retrieving of Vehicle LocationEung-Jae Lee, Keun Ho Ryu. 998-1007 [doi]
- Context-Aware Workflow Language Based on Web Services for Ubiquitous ComputingJoohyun Han, Yongyun Cho, Jaeyoung Choi. 1008-1017 [doi]
- A Ubiquitous Approach for Visualizing Back Pain DataTacha Serif, George Ghinea, Andrew O. Frank. 1018-1027 [doi]
- Prototype Design of Mobile Emergency Telemedicine SystemSun K. Yoo, S. M. Jung, B. S. Kim, H. Y. Yun, Sung Rim Kim, Dong Keun Kim. 1028-1034 [doi]
- An Intermediate Target for Quick-Relay of Remote Storage to Mobile DevicesDaegeun Kim, MinHwan Ok, Myong-Soon Park. 1035-1044 [doi]
- Reflective Middleware for Location-Aware Application AdaptationUzair Ahmad, S. Y. Lee, Mahrin Iqbal, Uzma Nasir, Arshad Ali, Mudeem Iqbal. 1045-1054 [doi]
- Efficient Approach for Interactively Mining Web Traversal PatternsYue-Shi Lee, Min-Chi Hsieh, Show-Jane Yen. 1055-1065 [doi]
- Query Decomposition Using the XML Declarative Description LanguageLe Thi Thu Thuy, Doan Dai Duong. 1066-1075 [doi]
- On URL NormalizationSang Ho Lee, Sung Jin Kim, Seok-Hoo Hong. 1076-1085 [doi]
- Clustering-Based Schema Matching of Web Data for Constructing Digital LibraryHui Song, Fanyuan Ma, Chen Wang. 1086-1095 [doi]
- Bringing Handhelds to the Grid Resourcefully: A Surrogate Middleware ApproachMaria Riaz, Saad Liaquat Kiani, Anjum Shehzad, Sungyoung Lee. 1096-1105 [doi]
- Mobile Mini-payment Scheme Using SMS-CreditSimon Fong, Edison Lai. 1106-1114 [doi]
- Context Summarization and Garbage Collecting ContextFaraz Rasheed, Young-Koo Lee, Sungyoung Lee. 1115-1124 [doi]
- EXtensible Web (::::xWeb::::): An XML-View Based Web Engineering MethodologyRajagopal Rajugan, William Gardner, Elizabeth Chang, Tharam S. Dillon. 1125-1135 [doi]
- A Web Services Framework for Integrated Geospatial Coverage DataEunkyu Lee, Minsoo Kim, Mijeong Kim, Inhak Joo. 1136-1145 [doi]
- Open Location-Based Service Using Secure Middleware Infrastructure in Web ServicesNamje Park, Howon Kim, Seungjoo Kim, Dongho Won. 1146-1155 [doi]
- Ubiquitous Systems and Petri NetsDavid de Frutos-Escrig, Olga Marroquín Alonso, Fernando Rosa Velardo. 1156-1166 [doi]
- Virtual Lab Dashboard: Ubiquitous Monitoring and Control in a Smart Bio-laboratoryXiaoming Bao, See-Kiong Ng, Eng-Huat Chua, Wei-Khing For. 1167-1176 [doi]
- On Discovering Concept Entities from Web SitesMing Yin, Dion Hoe-Lian Goh, Ee-Peng Lim. 1177-1186 [doi]
- Towards a Realistic Microscopic Traffic Simulation at an Unsignalised IntersectionMingzhe Liu, Ruili Wang, Ray H. Kemp. 1187-1196 [doi]
- Complex Systems: Particles, Chains, and SheetsR. B. Pandey. 1197-1206 [doi]
- Discretization of Delayed Multi-input Nonlinear System via Taylor Series and Scaling and Squaring TechniqueYuanliang Zhang, Hyung Jo Choi, Kil To Chong. 1207-1216 [doi]
- On the Scale-Free Intersection GraphsXin Yao, Changshui Zhang, Jinwen Chen, Yanda Li. 1217-1224 [doi]
- A Stochastic Viewpoint on the Generation of Spatiotemporal DatasetsMoonBae Song, KwangJin Park, Ki-Sik Kong, SangKeun Lee. 1225-1234 [doi]
- A Formal Approach to the Design of Distributed Data WarehousesJane Zhao. 1235-1244 [doi]
- A Mathematical Model for Genetic Regulation of the Lactose OperonTianhai Tian, Kevin Burrage. 1245-1253 [doi]
- Network Emergence in Immune System Shape SpaceHeather J. Ruskin, John Burns. 1254-1263 [doi]
- A Multi-agent System for Modelling Carbohydrate Oxidation in CellFlavio Corradini, Emanuela Merelli, Marco Vita. 1264-1273 [doi]
- Characterizing Complex Behavior in (Self-organizing) Multi-agent SystemsBingcheng Hu, Jiming Liu. 1274-1283 [doi]
- Protein Structure Abstractionand Automatic Clustering Using Secondary Structure Element SequencesSung-Hee Park, Chan Yong Park, Dae-Hee Kim, Seon Hee Park, Jeong Seop Sim. 1284-1292 [doi]
- A Neural Network Method for Induction Machine Fault Detection with Vibration SignalHua Su, Kil To Chong, Alexander G. Parlos. 1293-1302 [doi]