Abstract is missing.
- A sensor data collection method for rounding sinkTomoki Yoshihisa, Shojiro Nishio. 1 [doi]
- Physical cell identity reservation for 3GPP LTE femtocellPoongup Lee, Jangkeun Jeong, Yohan Kim, Jitae Shin. 2 [doi]
- Enhanced detection method for 3GPP LTE QO-SFBC system in frequency selective Rayleigh fading channel environmentHwan Min Park, Jung-Su Han, Hyung-Jin Choi. 3 [doi]
- Dual token bucket based HCCA scheduler for IEEE 802.11e WLANDong-Yul Lee, Chae-Woo Lee. 4 [doi]
- Public key cryptography-based security scheme for wireless sensor networks in healthcareLe Xuan Hung, Ravi Sankar, Murad Khalid, Sungyoung Lee. 5 [doi]
- Reliable transmission on wireless sensor networks with delegated acknowledgementGa-won Lee, Tien Dung Nguyen, Eui-nam Huh. 6 [doi]
- Privacy enhancement in mobile data broadcasting environmentsHong Va Leong. 7 [doi]
- MGR: a multicandidate greedy routing scheme in wireless sensor networksDang Tu Nguyen, Wook Choi, Minh Thiep Ha, Hyunseung Choo. 8 [doi]
- Quality analysis of CSMA/CA communications in inter-vehicle communication servicesSatoshi Imai, Kazumasa Ushiki, Nobutsugu Fujino, Mamoru Machida, Masayoshi Moriya, Seii Sai. 9 [doi]
- Proposal and evaluation of a Bloom filter-based user search method for movement records on P2P networkToru Shiraki, Yuuichi Teranishi, Susumu Takeuchi, Kaname Harumoto, Shojiro Nishio. 10 [doi]
- A QoS provisioning mechanisms based on effective bandwidth for the polling based WLAN systemHyun-Jin Lee, Kyu-Hwan Lee, Jae-Hyun Kim. 11 [doi]
- OCDP: a WBAN MAC protocol for contention-based medical and CE applicationsYoung-Sun Seo, Dae-Young Kim 0001, Jinsung Cho, Ben Lee. 12 [doi]
- A technique of embedding digital data in an image compression code reversiblyChin-Chen Chang, Kuo-Nan Chen, Zhi-Hui Wang, MingChu Li. 13 [doi]
- Reversible data hiding scheme with high payload for JPEG imagesChia-Chen Lin, Pei-Feng Shiu. 14 [doi]
- Enhance the visual quality of shares and recovered secret on meaningful shares visual secret sharingChun-yu Wang, Ni-Shan Shiao, Hong-Hao Chen, Chwei-Shyong Tsai. 15 [doi]
- A novel color palette image authentication schemeRuey-Ming Chao, Ching-Hao Lai, Hsien-Chu Wu. 16 [doi]
- Directional two-dimensional principal component analysis for face recognitionLijun Yan, Jeng-Shyang Pan. 17 [doi]
- Community-based recipe recommendation and adaptation in peer-to-peer networksQing Li, Wei Chen 0004, Lijuan Yu. 18 [doi]
- B2B e-commerce adoption and implementation constraints and critical success factors in the healthcare organizationsChad Lin, Ying-Chieh Liu, Feng-Chia Li, Geoffrey Jalleh, Yu-An Huang, Zong-Ru Jhuang. 19 [doi]
- A model of transiting individual efforts to the outcomes of virtual teamYing-Chieh Liu, Chad Lin, Feng-Chia Li. 20 [doi]
- In situ measurement of geosensors in low-rate networksMika Luimula, Joni Jämsä, Pertti Verronen, Mika Pahkasalo, Joni Heikkilä, Juha Yli-Hemminki. 21 [doi]
- A constraint-based tool for data integrity management on the webMasami Takahashi, Atsuyuki Morishima, Hiroyuki Kitagawa, Shigeo Sugimoto. 22 [doi]
- Evaluating credibility of web informationKatsumi Tanaka, Hiroaki Ohshima, Adam Jatowt, Satoshi Nakamura, Yusuke Yamamoto, Kazutoshi Sumiya, Ryong Lee, Daisuke Kitayama, Takayuki Yumoto, Yukiko Kawai, Jianwei Zhang 0002, Shinsuke Nakajima, Yoichi Inagaki. 23 [doi]
- Discovering intermediate entities from two examples by using web search engine indicesNaoto Asahi, Takehiro Yamamoto, Satoshi Nakamura, Katsumi Tanaka. 24 [doi]
- ChronoSeeker: search engine for future and past eventsHideki Kawai, Adam Jatowt, Katsumi Tanaka, Kazuo Kunieda, Keiji Yamada. 25 [doi]
- A prediction search based on changes of queries and search resultsManabu Ohta, Ryoji Fujita. 26 [doi]
- Adaptive ranking of search results by considering user's comprehensionMakoto Nakatani, Adam Jatowt, Katsumi Tanaka. 27 [doi]
- Influence maximization through identifying seed nodes from implicit social networksTieyun Qian, Jiangbo Liu. 28 [doi]
- Dimensionality reduction based on nonparametric discriminant analysis with kernels for feature extraction and recognitionJun-Bao Li, Shu-Chuan Chu, Jeng-Shyang Pan. 29 [doi]
- Bridging the gap between web service-based context suppliers and ontology-based context consumersYuanping Li, Ling Feng. 30 [doi]
- Methods to utilizing cloud computing in developing mobile internet device (MID) applicationsHyun Jung La, Sang-Hun Oh, Soo Dong Kim. 31 [doi]
- Context data abstraction framework using RDFYun-Sam Kim, Eun-Sun Cho, We-Duke Cho. 32 [doi]
- Game behavior pattern modeling for game bots detection in MMORPGSang-Hyun Park, Jee-Hyong Lee, Hye-Wuk Jung, Sung-Woo Bang. 33 [doi]
- A partitioning method for high dimensional dataSeunghoon Lee, Sung-Woo Bang, Bo-Keong Kim, Jaekwang Kim, Jee-Hyong Lee. 34 [doi]
- Interactive stream mining of maximal frequent itemsets allowing flexible time intervals and support thresholdsMing-Yen Lin, Sue-Chen Hsueh, Chien-Hsiang Tung. 35 [doi]
- Discovery of user behavior patterns from geo-tagged micro-blogsTatsuya Fujisaka, Ryong Lee, Kazutoshi Sumiya. 36 [doi]
- Detecting splogs using similarities of splog HTML structuresTaichi Katayama, Takayuki Yoshinaka, Takehito Utsuro, Yasuhide Kawada, Tomohiro Fukuhara. 37 [doi]
- Link analysis in mind maps: a new approach to determining document relatednessJöran Beel, Bela Gipp. 38 [doi]
- Universal rich presence framework for intelligent call managementAbhishek Prateek, Hridayesh Gupta, Sanjiva Prasad. 39 [doi]
- Intent feature discovery using Q&A corpus and web dataSoungwoong Yoon, Adam Jatowt, Katsumi Tanaka. 40 [doi]
- Systematic measurement of human map-reading ability with street-view based navigation systemsKaori Kobayashi, Ryong Lee, Kazutoshi Sumiya. 41 [doi]
- Proposal of electronic commerce system with cellular phones for digital forensicsKen Kuroiwa, Ryuya Uda. 42 [doi]
- Cache conscious trees on modern microprocessorsIg-hoon Lee, Jae-Won Lee, Junho Shim, Sang-goo Lee. 43 [doi]
- A simple image encoding method with data lossless information hidingZhi-Hui Wang, Chin-Chen Chang, MingChu Li, Tzu-Chuen Lu. 44 [doi]
- Query by example for geographic entity search with implicit negative feedbackMakoto P. Kato, Satoshi Oyama, Hiroaki Ohshima, Katsumi Tanaka. 45 [doi]
- Detailed-information browsing to form centralized mesh structure in region of interestJungil Jung, Jinsoo Cho. 46 [doi]
- Reversible data hiding using neighboring block in VQ-compressed imagesWei-Jen Wang, Cheng-Ta Huang, Shiuh-Jeng Wang. 47 [doi]
- Performance improvement of iSCSI remote storage accessMasato Oguchi, Reika Higa, Kosuke Matsubara, Takao Okamawari, Saneyasu Yamaguchi. 48 [doi]
- A proposal of visualizing reputation using evaluative expression dictionariesYuki Tanimoto, Manabu Ohta. 49 [doi]
- The open source IPTV service development environment: IPTV service execution environmentKuo-Chang Chen, Jih-Tso Chang, Jeng-Shyang Pan, Hsiang-Cheh Huang. 50 [doi]
- A reversible and multiple-layer embedding strategy with high capacityChin-Feng Lee, Chin-Chen Chang, Chun-Yu Wu. 51 [doi]
- Hiding data in parity check bitChi-Shiang Chan, Ching-Yun Chang. 52 [doi]
- An interactive agent system for supporting knowledge-based recommendation: a case study on an e-novel recommender systemZeng-Wei Hong, Rui-Tang Huang, Kai-Yi Chin, Chia-Chi Yen, Jim-Min Lin. 53 [doi]
- Smartcard-based micro-billing scheme to activate the market for user-generated contentMasayuki Terada, Kozo Noaki, Kimihiko Sekino. 54 [doi]
- Actor Petri net model for scientific workflows: model, design and systemNanshan Du, Qing Li, Yiwen Liang. 55 [doi]
- A system for supporting dietary habits: planning menus and visualizing nutritional intake balanceShihono Karikome, Atsushi Fujii. 56 [doi]
- A personalized recommendation system based on product attribute-specific weights and improved user behavior analysisJehwan Oh, Ok-Ran Jeong, Eunseok Lee. 57 [doi]
- Query log perturbation method for privacy preserving queryYuko Arai, Chiemi Watanabe. 58 [doi]
- Security analysis on commercial online music streaming service and countermeasuresSangsik Lee, Donghyun Choi, Dongho Won, Seungjoo Kim. 59 [doi]
- An efficient context-aware personalization technique in ubiquitous environmentsWonik Park, Jong Hyun Park, Young-Kuk Kim, Ji-Hoon Kang. 60 [doi]
- Automatic query-based personalized summarization that uses pseudo relevance feedback with NMFSun Park, Dong Un An. 61 [doi]
- Skin surface reconstruction from stereo imagesQian Zhang, Taeg Keun Whangbo. 62 [doi]
- RBAC-based access control for privacy preserving in semantic webKyu Il Kim, Wonyoung Kim, Joonsuk Ryu, Hyuk Jin Ko, Ung-Mo Kim, Woo Jun Kang. 63 [doi]
- A scaffolding M-learning framework with IMS based IPTV PVR serviceChien-Chou Shih, Mong-Fong Horng, Jeng-Shyang Pan. 64 [doi]
- A minimum mean-squared error relay for three-way relay channels with network codingMoonSeo Park, Seong Keun Oh. 65 [doi]
- High throughput path selection for IEEE 802.11s based wireless mesh networksMd. Shariful Islam, Muhammad Mahbub Alam, Md. Abdul Hamid, Choong Seon Hong. 66 [doi]
- A multi-rate routing protocol with connection entropy for mobile ad hoc networksCao Trong Hieu, Young-Cheol Bang, Jin-Ho Kim, Young An Kim, Choong Seon Hong. 67 [doi]
- An improved DV-Hop localization algorithm in ad hoc networksSang-Woo Lee, Dong-Yul Lee, Chae-Woo Lee. 68 [doi]
- A self-organizing two-way DPWS adaptor for adaptive interoperability of multiple heterogeneous servicesHyung-Jun Yim, Yun-Young Hwang, Kyu-Chul Lee. 69 [doi]
- An enhanced OLSR protocol based on link reliabilityHyun Jae Woo, Dong-Yul Lee, Chae-Woo Lee. 70 [doi]
- ARHMAM: an activity recognition system based on hidden Markov minded activity modelA. M. Jehad Sarkar, Young-Koo Lee, Sungyoung Lee. 71 [doi]
- A comprehensive architecture for autonomic service managementDu Wan Cheun, Jae Yoo Lee, Soo Dong Kim. 72 [doi]
- Comparison of feature selection methods in ECG signal classificationZhen-Xing Zhang, Sang-Hong Lee, Joon S. Lim. 73 [doi]
- Semantic operation composition according to user tasks in ubiquitous environmentYun-Young Hwang, Kyu-Chul Lee. 74 [doi]
- A SIP-TRW algorithm for DDoS attack detection in SIP environmentsSung-Yeol Yun, Cheol-Joong Kim, Do-Yoon Ha, Hyun-Cheol Jeong, Seok Cheon Park. 75 [doi]
- A 2.4-GHz IEEE 802.15.4 CMOS single-chip transceiver for wireless PAN applicationsDongjin Oh, Ickjin Kwon. 76 [doi]
- High-speed architecture for three-parallel Reed-Solomon decoder using S-DCMEJae Do Lee, Myung Hoon Sunwoo. 77 [doi]