Abstract is missing.
- Optimal task allocation on non-volatile memory based hybrid main memoryWanyong Tian, Jianhua Li, Yingchao Zhao, Chun Jason Xue, Minming Li, Enhong Chen. 1-6 [doi]
- RTRP: right time right place kernel analysis toolYongsuk Choi, Jongmoo Choi, Eun Yong Ha. 7-12 [doi]
- QoS optimization for thermal-aware cyber-physical systemsJain-Yu Ou, Ya-Shu Chen. 13-19 [doi]
- Throttling capacity sharing in private L2 caches of CMPsYoung-Sik Eom, Seong Tae Jhang, Chu Shik Jhon. 20-24 [doi]
- Selective word reading for high performance and low power processorYun Kyo Cho, Seong Tae Jhang, Chu Shik Jhon. 25-30 [doi]
- Building a scalable and portable message-passing library for embedded multicore systemsShih-Hao Hung, Po-Hsun Chiu, Chi-Sheng Shih. 31-37 [doi]
- Exploration of CPU/GPU co-execution: from the perspective of performance, energy, and temperatureSeung Gu Kang, Hong Jun Choi, Cheol Hong Kim, Sung Woo Chung, Dongseop Kwon, Joong Chae Na. 38-43 [doi]
- Fine-grained analysis and design of ASIP instruction set for application of encryptionJinbin Ju, Quan Jinguo, Qian Chen, Yan Zhang. 44-49 [doi]
- FlashB-tree: a novel B-tree index scheme for solid state drivesRize Jin, Se Jin Kwon, Tae-Sun Chung. 50-55 [doi]
- MetaService: an object transfer platform between Android applicationsHwayoung Choe, Jihun Baek, Hoeheon Jeong, Sangwon Park. 56-60 [doi]
- An algorithm for solving massive matrix inversion in cloud computing systemsDo Hyun Bae, Munkhbayar Bayartsogt, Jin Suk Kim. 61-66 [doi]
- A fourth-order PLL design for high-voltage converter in airbag electronic safetyYu Du, Hongbing Xiao, Chunyu Bai, Kang Yen. 67-70 [doi]
- Robust partitioning for real-time multiprocessor systems with shared resourcesFrédéric Fauberteau, Serge Midonnet. 71-76 [doi]
- Cost-minimal pre-allocation of software tasks under real-time constraintsBrian Clark, Ingo Stierand, Eike Thaden. 77-83 [doi]
- A new real-time location tracking techniques using Doppler radar and bio-sensors in WSNSeung-Jin Moon, Hong-Kyu Kim, Suk-Jun Oh, Sanghoon Lee. 84-89 [doi]
- An efficient checkpoint scheme for the fast mount of flash file systemJoongjin Kook, Sanghoon Choi, Kanghee Kim, Jiman Hong. 90-92 [doi]
- Design and implementation of embedded MVB-ethernet interfaceSu Goog Shon, Hee-Jung Byun. 93-96 [doi]
- SPRS: standby power reduction system for efficient power managementSukil Hong, Eunseok Choi, Hong Min, Sangho Yi, Junyoung Heo, Jiman Hong. 97-99 [doi]
- Design and implementation of energy saving systemKwang-Soon Choi, Eunseok Choi, Ha-Bong Chung. 100-103 [doi]
- The performance analysis of ARM NEON technology for mobile platformsMinwoo Jang, Kukhyun Kim, Kanghee Kim. 104-106 [doi]
- Optimal power reduction based on DVFS algorithm for video decodersSeungho Jeong, Heejune Ahn. 107-109 [doi]
- Fast scheduling policy for electric vehicle charging stations in smart transportationJunghoon Lee, Gyung-Leen Park, Hye-Jin Kim, Hongbeom Jeon. 110-112 [doi]
- Adaptive best-M feedback scheduling in multiuser OFDMA systemsGiang Hai Tong, Subodh Pudasaini, Seokjoo Shin. 113-117 [doi]
- Delay-bandwidth normalized service sharing with service rate guaranteesJuhyun Lee, Hoyoung Hwang, KyeongHo Park, Chang-Gun Lee, Sung-Soo Lim. 118-123 [doi]
- An efficient clustering method for unstructured mobile peer-to-peer networksHe Li, Kyoung Soo Bok, Jaesoo Yoo. 124-129 [doi]
- An internet protocol stack for high-speed transmission in a non-OS environmentJoonhyouk Jang, Jinman Jung, Yookun Cho, Kyujin Choi, Gwangil Jeon, Yoojin Chung, Jinsoup Joung. 130-134 [doi]
- Adaptive duty-cycling based on group size for energy balance of sensor nodes in wireless sensor networksMyungsu Cha, Mihui Kim, Moonseong Kim, Hyunseung Choo. 135-140 [doi]
- Quality-assured energy balancing for multi-hop wireless multimedia networks via 2-D channel coding rate allocationLin Xing, Wei Wang, Gensheng Zhang, Feifei Gao, Xuewen Liao, Tigang Jiang. 141-145 [doi]
- Light-weight adaptive task offloading from smartphones to nearby computational resourcesShigeru Imai, Carlos A. Varela. 146-152 [doi]
- Localization of mobile nodes based on inaccurate round-trip-time measurements using Bayesian inferenceEsmaeil S. Nadimi, Victoria Blanes-Vidal, Vahid Tarokh. 152-157 [doi]
- Path quality aware fair load distribution for data aggregation in unreliable wireless sensor networksMinjoon Ahn, Dongsoo S. Kim, Moonseong Kim, Hyunseung Choo. 158-163 [doi]
- A reliable multi-grid routing protocol for tactical MANETsDeepesh Man Shrestha, Cheolgi Kim, Young-Bae Ko. 164-169 [doi]
- Proxy protocol and PMIPv6 based mobility management for IEEE 802.11s wireless mesh networksHong-Jong Jeong, Sungwon Lee, Dongkyun Kim, Kyungshik Lim, Jungsoo Park. 170-176 [doi]
- Characterization of the line configuration in wired communication networksKazi Moinul Islam, Mohammad Salehizadeh, Amir G. Aghdam. 177-182 [doi]
- Sensor redundancy check without geometric informationPeter Brass, Hyeon-Suk Na. 183-186 [doi]
- An empirical study on the effectiveness of hyperspectral image classification algorithms with dimensionality reductionYang Zhang, Mojia Sun, Chih-Cheng Hung, Edward Jung. 187-191 [doi]
- UML-based enhanced rich form generationTomás Cerný, Eunjee Song. 192-199 [doi]
- User behavior augmented software testing for user-centered GUIKuan-Chun Chuang, Chi-Sheng Shih, Shih-Hao Hung. 200-208 [doi]
- Safena and QBPM: a proposition for modeling and enacting processes in supply chain networkKatarzyna Antosz, Slawomir Swirad, Dorota Niec, Piotr Osinski, Katarzyna Zapart. 209-215 [doi]
- A research on the method to select promising scientific technologies in the condensed matter physics by using journal's editing preferenceJae-Min Lee, Oh-Jin Kwon, Ho-Shin Lee, B. Y. Coh, Y. W. Park. 216-219 [doi]
- Agglomerated feature extractionin medical images for breast cancer and its characteristic pattern generationJucheol Moon, Sung Y. Shin, Donghoon Kang, Soon-Ik Jeon, Hyung Do Choi, Jung Y. Kim. 220-225 [doi]
- An improved method of breast MRI segmentation with simplified K-means clustered imagesDonghoon Kang, Sung Y. Shin, Chang Oan Sung, Jung Y. Kim, Jeong-Ki Pack, Hyung Do Choi. 226-231 [doi]
- A review of breast tissue classification in mammogramsGensheng Zhang, Wei Wang, Jucheol Moon, Jeong K. Pack, Soon-Ik Jeon. 232-237 [doi]
- A study on a system for measuring curvature and slope through edge information extraction of an electric pole partially hidden by an obstacleBum-Geun Heo, Nara Shin, Kicheon Hong. 238-240 [doi]
- Design and implementation of a simple 3D-orthodontia simulation system for malocclusion treatmentChulhun Kim, Junghoon Shin, Sangjun Lee. 241-244 [doi]
- Personalized mobile e-commerce system using DISC psychological modelWonik Park, Sanggil Kang, Young-Kuk Kim. 245-248 [doi]
- Effect of inter-enterprise collaboration on the value of enterpriseW. Shim, Kang-hoe Kim, K. H. Kim, Y. H. Moon, Oh-Jin Kwon. 249-251 [doi]
- Systematic monitoring of competitors' patents using 2-dimensional hybrid similarity methodJongseok Kang, Hyuck Jai Lee, Yeongho Moon. 252-254 [doi]
- A half-key key management scheme for wireless sensor networksYung-Feng Lu, Chin-Fu Kuo, Ai-Chun Pang. 255-260 [doi]
- The investigation of the structural properties of machines for the design of secure and trustworthy systemsEdward Jung, Chih-Cheng Hung, Guangzhi Ma, Seonho Choi. 261-265 [doi]
- An efficient visitation algorithm to improve the detection speed of high-interaction client honeypotsHongGeun Kim, Dong Jin Kim, Seongje Cho, Moonju Park, Minkyu Park. 266-271 [doi]
- A unified design method utilizing decomposability and composability for secure systemsEdward Jung, Chih-Cheng Hung, Guangzhi Ma, Seonho Choi. 272-276 [doi]
- Regularized recursive least squares for anomaly detection in sparse channel tracking applicationsBehtash Babadi, Vahid Tarokh. 277-281 [doi]
- Performance analysis of security enforcement on Android operating systemJiyeon Park, Bongjae Kim, Sung-Ryul Kim, Jin-Hyun Yoon, Yookun Cho. 282-286 [doi]
- Fast malware family detection method using control flow graphsBoojoong Kang, Hye Seon Kim, Taeguen Kim, Heejun Kwon, Eul-Gyu Im. 287-292 [doi]
- Towards TTP-free lightweight solution for location privacy using location-based anonymity predictionSheikh Iqbal Ahamed, Chowdhury Sharif Hasan, Md. M. Haque, Md. O. Gani. 293-297 [doi]
- Malware classification using instruction frequenciesKyoung-Soo Han, Boojoong Kang, Eul-Gyu Im. 298-300 [doi]
- Semantic relation extraction for automatically building domain ontology using a link grammarJunho Choi, Chang Choi, Dongjin Choi, Jingwang Koh, PanKoo Kim. 301-306 [doi]
- More convenient more overhead: the performance evaluation of Hadoop streamingMengwei Ding, Long Zheng, Yanchao Lu, Li Li, Song Guo, Minyi Guo. 307-313 [doi]
- Accelerating loops for coarse grained reconfigurable architectures using instruction extensionsJungsik Choi, Seonggun Kim, Hwansoo Han. 314-318 [doi]
- A design of dynamically simultaneous search GA-based fuzzy neural networks: comparative analysis of FS and FR-based rulesSung-Kwun Oh, Wook-Dong Kim, Byoung-Jun Park. 319-324 [doi]
- A multi-classifier system for text categorizationShubhamoy Dey. 325-329 [doi]
- A comparative study of information granulation-based fuzzy inference systems developed by means of space optimization algorithm (SOA) and genetic algorithmsWei Huang, Sung-Kwun Oh, Keon-Jun Park, Yong-Kab Kim. 330-335 [doi]