Abstract is missing.
- A comparative study of feature selection and machine learning techniques for sentiment analysisAnuj Sharma, Shubhamoy Dey. 1-7 [doi]
- Photo retrieval combining ontology with visual informationSang-Kyun Kim. 8-13 [doi]
- Developing web fully-integrated conversational assistant agentsJean-Paul Sansonnet, Daniel Werner Correa, Patrícia Augustin Jaques, Annelies Braffort, Cyril Verrecchia. 14-19 [doi]
- Design of context-FCM based RBF neural networks with the aid of data information granulationSung-Kwun Oh, Wook-Dong Kim, Byoung-Jun Park. 20-25 [doi]
- Improving a hierarchical pattern matching algorithm using cache-aware Aho-Corasick automataPhuong Do, Ho Seok Kang, Sung-Ryul Kim. 26-30 [doi]
- Deriving a robust policy for container stacking using a noise-tolerant genetic algorithmHyeonguk Jang, Ri Choe, Kwang Ryel Ryu. 31-36 [doi]
- An artificial neural network based approach for sentiment analysis of opinionated textAnuj Sharma, Shubhamoy Dey. 37-42 [doi]
- Hierarchical data organization for effective retrieval of similar shadersJung-Im Won, Sang-Wook Kim, Min-Hee Jang, Jin-Soo Cho. 43-48 [doi]
- Predicting website correctness from consensus analysisSteven O'Hara, Tom Bylander. 49-54 [doi]
- RFM analysis for detecting future core technologyDohyun Kim, June-Young Lee, Sejung Ahn, Yeongho Moon, Oh-Jin Kwon. 55-59 [doi]
- An automatic classification system for consumer regulatory focus by analyzing web shopping logsJongbum Baik, Yongbum Kim, Chungseok Han, Jayoung Choi, Eunyoung Jang, Soowon Lee. 60-64 [doi]
- A simple pattern matching algorithm for weighted sequencesInbok Lee. 65-67 [doi]
- Subject specific parameter selection for the EEG classifier using common spatial patternsKyungmin Su, Kay A. Robbins. 68-69 [doi]
- Functional evaluation and analysis of predicted miRNA-mRNA regulatory networkSaleh Tamim, Jianhua Ruan. 70-71 [doi]
- A novel approach for cancer outcome prediction using personalized classifierMd. Jamiul Jahid, Jianhua Ruan. 72-73 [doi]
- A genome-wide cis-regulatory element discovery method based on promoter sequences and gene co-expression networksZhen Gao, Ruizhe Zhao, Jianhua Ruan. 74-75 [doi]
- Automated Twitter data collecting tool for data mining in social networkChanghyun Byun, Hyeoncheol Lee, Yanggon Kim. 76-79 [doi]
- CuteCloud: putting "Credit Union" cloud computing into practiceDunren Che, Mengxia Zhu, Jason Fairfield, Mustafa Khaleel. 80-85 [doi]
- A framework for readapting and running bioinformatics applications in the cloudEdgar Sarmiento, Karin Breitman, Alberto M. R. Dávila, José Viterbo. 86-91 [doi]
- Improving vertical geo/geo disambiguation by increasing geographical feature weights of placesYoshihide Hosokawa. 92-99 [doi]
- Join processing using Bloom filter in MapReduceTaewhi Lee, Kisung Kim, Hyoung-Joo Kim. 100-105 [doi]
- Mining attribute association in query predicates for access path generationJunping Sun. 106-111 [doi]
- Design of an interactive object audio system for cloud-based consumer devicesJae-Hoon An, Choong Sang Cho, Dong-Sun Kim. 112-113 [doi]
- Design and implementation of the fault data providing system using mobile web serviceJunghoon Shin, Byung-Ju Lim, Eunseok Choi, Youngsu Park, Sangjun Lee, Kyungyul Chung, Jiman Hong. 114-115 [doi]
- l 1 minimizationDeqian Fu, Seong Tae Jhang. 116-120 [doi]
- Ellipsoidal face model-based image registration for generating facial texturesSeok-Woo Jang, Myung-Ae Chung, Gye-Young Kim. 121-125 [doi]
- An adaptive particle filter tracking method based on homography and common FOVAi Min Li, Pil Seong Park, Ye Hong Chen. 126-131 [doi]
- A new method for robust object tracking system based on scale invariant feature transform and camshiftZhenhai Wang, Kicheon Hong. 132-136 [doi]
- Fast integer-pel motion estimation on statistical properties for H.264/AVCJin-Young Noh, Min-Cheol Hong. 137-142 [doi]
- A new histogram-based breast cancer image classifier using Gaussian mixture modelZhe Li, Sung Y. Shin, Soon-Ik Jeon, Seong-Ho Son, Jeong K. Pack. 143-147 [doi]
- A support vector machine based classifier to extract abnormal features from breast magnetic resonance imagesJucheol Moon, Hyun I. Kim, Hyung Do Choi, Soon I. Jeon. 148-152 [doi]
- A new Fourier-based approach to measure irregularity of breast masses in mammogramsGensheng Zhang, Sung Y. Shin, Wei Wang, Carrie Hruska, Hyung Do Choi. 153-157 [doi]
- A quantum-modeled K-means clustering algorithm for multi-band image segmentationEllis Casper, Chih-Cheng Hung, Edward Jung, Ming Yang. 158-163 [doi]
- P-adicXinkai Li, Mu Zhao, Chao Lu, Jon A. Sjogren. 164-168 [doi]
- Application of DIBR algorithm in real-time imageYangkeun Ahn, Jiman Hong. 169-171 [doi]
- A sectorized object matching approach for breast magnetic resonance image similarity studyByung K. Jung, Wei Wang, Zhe Li, Seong H. Son, Jung-Yeop Kim. 172-175 [doi]
- Object based similarity measure for breast medical image retrieval from data warehouseHyun I. Kim, Donghoon Kang, Byung K. Jung, Chang Oan Sung. 176-179 [doi]
- MonAC: detecting missing tags for improved accuracy in computational RFID based assisted environmentsFarzana Rahman, Sheikh Iqbal Ahamed. 180-185 [doi]
- Measuring the IPv4-IPV6 IVI translation overheadAnthony K. Tsetse, Alexander L. Wijesinha, Ramesh K. Karne, Alae Loukili. 186-190 [doi]
- Semidefinite programming-based localization algorithm in networks with inhomogeneous mediaEsmaeil S. Nadimi, Victoria Blanes-Vidal, Vahid Tarokh. 191-196 [doi]
- A cross-layer judgment scheme for solving retransmission problem in IEEE 802.15.4 wireless sensor networksHsueh-Wen Tseng, Yue-Ru Chuang. 197-202 [doi]
- Delay-efficient data aggregation scheduling in duty-cycled wireless sensor networksNguyen Phan Khanh Ha, Vyacheslav V. Zalyubovskiy, Hyunseung Choo. 203-208 [doi]
- A dynamic safety interval protocol for VANETsHongseok Yoo, JinHong Kim, Dongkyun Kim. 209-214 [doi]
- Performance analysis of certain topology based routing protocols of mobile ad hoc networkN. Geetha, A. Sankar. 215-220 [doi]
- Structural controllability of multi-agent networks: importance of individual agentsMohammad Amin Rahimian, Amir G. Aghdam. 221-226 [doi]
- Reconstruction of radio map from sparse RSS data by discontinuity preserving smoothingWonsun Bong, Yong Cheol Kim. 227-231 [doi]
- Architecture of the remote routing validation tool for BGP anomaly detectionJekuk Yun, Changhyun Byun, Yanggon Kim. 232-236 [doi]
- Joint queue and sleep control for energy-efficiency and delay guarantees in wireless sensor networksHeejung Byun, Jahyun Son, Soogook Son. 237-242 [doi]
- Virtual machines placement for network isolation in cloudsGyuyeong Kim, Hoorin Park, Jieun Yu, Wonjun Lee. 243-248 [doi]
- DARC: distance adaptive robust communication scheme for IEEE 802.15.4-based wireless sensor networksYoung-Duk Kim, Won-Seok Kang, Dongkyun Kim. 249-250 [doi]
- Mobile group communication system for social networking services on smart campusYujin Lim, Sanghyun Ahn, Sanggil Kang. 251-252 [doi]
- A method for detecting illegally copied APK files on the networkSungmin Kim, Eunhoe Kim, Jaeyoung Choi. 253-256 [doi]
- Time petri nets for schedulability analysis of the transactional event handlers of P-FRPChaitanya Belwal, Albert M. K. Cheng, Yuanfeng Wen. 257-262 [doi]
- Agent spaces: a scalable architecture for distributed logic agentsPaul Tarau, Arun K. Majumdar, Paulo Moura. 263-268 [doi]
- Evaluation of embeddable graph manipulation libraries in memory constrained environmentsVladimir Sor, Satish Narayana Srirama. 269-275 [doi]
- Memory leak detection with context awarenessWoosup Lim, SeongSoo Park, Hwansoo Han. 276-281 [doi]
- Response time bounds for event handlers in the priority based functional reactive programming (P-FRP) paradigmChaitanya Belwal, Albert M. K. Cheng, Yuanfeng Wen. 282-287 [doi]
- A method for resilient graph-based comparison of executable objectsJoonhyouk Jang, Sanghoon Choi, Jiman Hong. 288-289 [doi]
- Lossless secret image sharing based on generalized: LSB replacementRuchira Naskar, Rajat Subhra Chakraborty. 290-295 [doi]
- Middleware for location privacy: an overviewAdrian Holzer, Benoît Garbinato, François Vessaz. 296-303 [doi]
- Portable tunnel establishment with a strong authentication design for secure private cloudYung-Feng Lu, Chin-Fu Kuo. 304-309 [doi]
- Detection of unknown malicious script code using a conceptual graph and SVMHayoung Kim, Junho Choi, Dongjin Choi, Hansuk Choi, PanKoo Kim. 310-315 [doi]
- Malware classification method via binary content comparisonBoojoong Kang, Taekeun Kim, Heejun Kwon, Yangseo Choi, Eul-Gyu Im. 316-321 [doi]
- Evaluating the effect of user guidelines on creating click-draw based graphical passwordsYuxin Meng, Wenjuan Li. 322-327 [doi]
- An anti-piracy mechanism based on class separation and dynamic loading for Android applicationsYounsik Jeong, Yeong-Ung Park, Jae Chan Moon, Seongje Cho, Dong Jin Kim, Minkyu Park. 328-332 [doi]
- A robust steganography-based software watermarkingCheol Jeon, Yookun Cho. 333-337 [doi]
- Android application's copyright protection technology based on forensic markSanghoon Choi, Joonhyouk Jang, Eunkyeung Jae. 338-339 [doi]
- A DCH starvation DoS attack in UMTSJiyeon Park, Bongjae Kim, Yookun Cho. 340-341 [doi]
- A hybrid design of online execution class and encryption-based copyright protection for Android appsSung-Ryul Kim, Ji Hyun Kim, Hee-Sun Kim. 342-343 [doi]
- Modified hierarchical privacy-aware role based access control modelSanjeev Arora, Eunjee Song, Yoonjeong Kim. 344-347 [doi]
- Reducing time and effort in legacy systems reengineering to MDD using metaprogrammingPaulo Eduardo Papotti, Antônio Francisco do Prado, Wanderley Lopes de Souza. 348-355 [doi]
- An aspect-oriented testability frameworkNankai Pan, Eunjee Song. 356-363 [doi]
- A framework-based approach for interactive multimedia application developmentJun Lin, Jonathan Drake, Hanil Kim, Eunjee Song. 364-370 [doi]
- Monitoring-based temporal prediction of power entities in smart grid citiesJunghoon Lee, Seong Baeg Kim, Gyung-Leen Park, Chan Jung Park. 371-375 [doi]
- Applying multi-agent systems to multi-objective simulation and control for offshore oil and gas productionLars Lindegaard Mikkelsen, Bo Nørregaard Jørgensen. 376-382 [doi]
- A scalable load-balancing scheme for advanced metering infrastructure networkJaesung Park, Yujin Lim, Seung-Jin Moon, Hong-Kyu Kim. 383-388 [doi]
- Symbolic modeling of a universal reconfigurable logic gate and its applications to circuit synthesisPaul Tarau, Brenda Luderman. 389-394 [doi]
- Adaptive page grouping for energy efficiency in hybrid PRAM-DRAM main memoryDong-Jae Shin, Sung Kyu Park, Seong-Min Kim, Kyu Ho Park. 395-402 [doi]
- Fine-grained I/O fairness analysis in virtualized environmentsSewoog Kim, Dongwoo Kang, Jongmoo Choi. 403-408 [doi]
- A VM-aware fairness scheduler on heterogenous multi-core platformsChi-Sheng Shih, Jie-Wen Wei, Shih-Hao Hung, Norman Chang, Joen Chen. 409-415 [doi]
- Sustainability in static-priority restricted-migration schedulingFrédéric Fauberteau, Serge Midonnet. 416-421 [doi]
- A multi-controller design for solid-state drivesJhih-Jian Liao, Chin-Hsien Wu. 422-427 [doi]
- An efficient locking and unlocking method of sequential systemsEdward Jung, Chih-Cheng Hung, Seonho Choi, Ming Yang. 428-433 [doi]
- A hierarchical back-end architecture for smartphone sensingHong Min, Peter Scheuermann. 434-439 [doi]
- An event-oriented inference algorithm with timing constraintsYing Qiao, Hongan Wang, Xiang Li. 440-445 [doi]
- Improving real-time performance for efficient interactive: TV services on Linux-based set-top boxesEunseok Choi, Bongjae Kim, Jinman Jung. 446-447 [doi]
- Analysis of the effects of weight distribution on proportional share schedulingAhreum Kim, Jinman Jung, Joonhyouk Jang, Sang-Cheol Kim. 448-450 [doi]
- Fast booting based on nand flash memoryYun Kyu Lee, Hyungbae Park, Cheol Jeon. 451-452 [doi]
- An off-line dynamic voltage scaling scheme in multiprocessor real-time schedulingSangchul Han, Moonju Park, Minkyu Park. 453-454 [doi]
- Performance evaluation of PRAM for storage devicesSeungcheol Ko, Jungsik Choi, Hwansoo Han. 455-456 [doi]
- A study of workload consolidation and power consumption on a multi-core processorDongyou Seo. 457-458 [doi]
- Worst case response time for real-time software transactional memoryYuanfeng Wen, Albert M. K. Cheng, Chaitanya Belwal. 459-460 [doi]