researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2008
2009
2010
Filter by Tag
[+]
OR
AND
NOT
1
C++
Meta-Environment
analysis
architecture
data-flow
design
e-science
meta-model
meta-objects
mobile
modeling
open-source
optimization
protocol
routing
rule-based
security
source-to-source
systematic-approach
wireless sensor networks
Filter by Author
[+]
OR
AND
NOT
1
Allen Y. Chang
Behrouz Minaei-Bidgoli
Chen-Shu Wang
Choon-Sung Nam
Chung-Hsin Liu
Dong Ryeol Shin
Doo-Kwon Baik
Dwen-Ren Tsai
Eunmi Choi
Hoon Jae Lee
Hsing-Chung Chen
Inwhee Joe
Limin Jia
Mu-wook Pyeon
Seong Gon Choi
Tae-Woong Jung
Tai-Myoung Chung
Xiaoping Li
Xinming Zhang
Yang-dam Eo
Filter by Top terms
[+]
OR
AND
NOT
1
algorithm
analysis
approach
data
design
information
management
method
mobile
model
network
networks
research
scheme
sensor
service
study
system
using
wireless
NCM (ncm)
Editions
Publications
Viewing Publication 1 - 100 from 792
2010
International Conference on Networked Computing and Advanced Information Management, NCM 2010, Sixth International Joint Conference on INC, IMS and IDC: INC 2010: International Conference on Networked Computing, IMS 2010: International Conference on Advan
IEEE Computer Society,
2010.
Capacity and quality improvement in reversible image watermarking approach
Shahidan M. Abdullah
,
Azizah A. Manaf
,
Mazdak Zamani
.
ncm 2010
:
81-85
[doi]
Fractal attractor based digital signature
Nadia M. G. Al-Saidi
,
Mohamad Rushdan Md. Said
.
ncm 2010
:
446-449
[doi]
Towards comprehensive integration management of business continuity, records and knowledge
Xiaomi An
,
Wang Wang
.
ncm 2010
:
5-10
[doi]
Feature based opinion mining of online free format customer reviews using frequency distribution and Bayesian statistics
Naveed Anwer
,
Ayesha Rashid
,
Syed Hassan
.
ncm 2010
:
57-62
[doi]
On the SaaS servers and their service-selection strategies
Suresh Byanjankar
,
Pinata Winoto
,
Woojin Paik
.
ncm 2010
:
440-445
[doi]
Applied Social Network Anaysis to Project Curriculum
Wen-Chih Chang
,
Hsiao-Wen Lin
,
Lai-Chi Wu
.
ncm 2010
:
710-715
[doi]
Exploring the distribution and relationship between MSN and the physical world
Wen-Chih Chang
,
Te-Hua Wang
,
Yen-Ching Huang
.
ncm 2010
:
716-721
[doi]
Technology Acceptance of videoconferencing
Allen Y. Chang
,
Cheng-Hua Liu
,
Jenn-Dong Sun
,
Chang-Lung Tsai
.
ncm 2010
:
650-652
[doi]
Game-based digital learning system assists and motivates C programming language learners
Wen-Chih Chang
,
Yu-Min Chou
,
Kuen-Chi Chen
.
ncm 2010
:
704-709
[doi]
Study on the random characteristics of joint FBC and CFO in an asynchronous MC-CDMA system
Joy Iong-Zong Chen
,
Kao-Ming Liu
,
Meng-Ta Lu
,
Yu-Ju Liu
,
Ching-Chuan Chiu
.
ncm 2010
:
450-454
[doi]
Exploring stock market dynamism in multi-nations with genetic algorithm, support vector regression, and optimal technical analysis
Deng-Yiv Chiu
,
Shin-Yi Chian
.
ncm 2010
:
694-699
[doi]
A deployment platform the SDP using enablers in presence service
Jae Hyoung Cho
,
Jae-Oh Lee
.
ncm 2010
:
381-384
[doi]
Interoperability between a relational data model and an RDF data model
Mi Young Choi
,
Chang-Joo Moon
,
Doo-Kwon Baik
,
Young-Jun Wie
,
Joong-Hee Park
.
ncm 2010
:
335-340
[doi]
AODV protocol with scheduling priority flow in MAC layer (AODV-SPF)
So-Tsung Chou
,
Hann-Tzong Chern
,
Cheng-Mu Shiao
.
ncm 2010
:
612-617
[doi]
FDAE: A failure detector for asynchronous events
Alfonso Farruggia
,
Marco Ortolani
,
Giuseppe Lo Re
.
ncm 2010
:
197-202
[doi]
Fire monitoring system based on Open Map API
Kyung Jun Gil
,
Radius Bhayu Prasetiyo
,
Hyun-Ju Park
,
Sang Boem Lim
,
Yang-dam Eo
.
ncm 2010
:
600-605
[doi]
Construction of an efficient ring-tree-based Peer-to-Peer streaming platform
Nen-Fu Huang
,
Yih-Jou Tzang
,
Hong-Yi Chang
,
Chih-Shun Ma
.
ncm 2010
:
75-80
[doi]
An interference cancellation scheme-based carrier frequency offset estimation for OFDM uplink transmissions
Ho-Lung Hung
,
Chien-Chi Chao
,
You-Hao Lin
,
Shih-Ping Huang
,
Chin-Hung Wu
,
Gwo-Ruey Lee
.
ncm 2010
:
756-760
[doi]
A personalized healthcare service on aged stroke-precaution
Yuan-Chu Hwang
,
Weng-Ting Lin
.
ncm 2010
:
700-703
[doi]
A hierarchical approach to traffic anomaly detection using image processing technique
Chi-Yoon Jeong
,
Beom-Hwan Chang
,
Jung-Chan Na
.
ncm 2010
:
592-594
[doi]
Capturing order book dynamics with Kalman filters
Jian Jiang
,
Wing Lon Ng
.
ncm 2010
:
428-433
[doi]
A soft handover approach using multiple network interfaces for QoS support
Inwhee Joe
,
Juhyeon Han
.
ncm 2010
:
268-271
[doi]
Mobility management for mobile sinks using soft handover in large-scale sensor fields
Inwhee Joe
,
Sang-Woo Kim
.
ncm 2010
:
272-275
[doi]
U-forest based service model derived strategy
Tae-Woong Jung
,
Sang Moo Lee
,
Mu-wook Pyeon
,
Jee-Hee Koo
.
ncm 2010
:
581-585
[doi]
High frequency trading strategy using the Hilbert transform
A. Kablan
,
W. L. Ng
.
ncm 2010
:
466-471
[doi]
Data mining based fragmentation technique for distributed data warehouses environment Using predicate construction technique
Tekaya Karima
,
Abdelaziz Abdellatif
,
Habib Ounalli
.
ncm 2010
:
63-68
[doi]
Robustness analysis of a new distributed scheduling approach - Relprox model using Mosix
Suhaas Kaul
,
Udita Shukla
,
S. Karthik Sriharsha
,
Vishal Sonkar
,
Krishna Kant
.
ncm 2010
:
11-16
[doi]
Direction to support ubiquitous city input/output system with geospatial image
Sun-woong Kim
,
Shin Kim
,
Tae-Woong Jung
,
Mu-wook Pyeon
,
Seong-Pil Kong
,
Yang-dam Eo
.
ncm 2010
:
569-574
[doi]
Vector map digital watermarking using angles
Jungyeop Kim
.
ncm 2010
:
417-423
[doi]
A study new challenge for billing system in converged service platform
Soo-Duek Kim
,
Seon-Ho Park
,
ChangSup Keum
,
Tai-Myoung Chung
.
ncm 2010
:
390-395
[doi]
Automated DCI compliance test system for Digital Cinema Entities
Taehyun Kim
,
Dongho Won
,
Kwang-Woo Lee
,
Hogab Kang
,
Seungjoo Kim
.
ncm 2010
:
434-439
[doi]
A framework of PBL strategy integrated in LMS and a ubiquitous learning environment
D. T. Ku
,
Chiung-Sui Chang
.
ncm 2010
:
722-726
[doi]
Addressing secure data routing scheme for heterogeneous sensor networks
Pardeep Kumar
,
Md. Iftekhar Salam
,
Sanggon Lee
,
Hoon Jae Lee
.
ncm 2010
:
86-90
[doi]
Secure health monitoring using medical wireless sensor networks
Pardeep Kumar
,
Young-Dong Lee
,
Hoon Jae Lee
.
ncm 2010
:
491-494
[doi]
IT applications in Healthcare Information System - A case study of medical center in Taiwan
Nai-Wen Kuo
.
ncm 2010
:
495-500
[doi]
Towards a holistic customer experience
Nai-Wen Kuo
.
ncm 2010
:
641-644
[doi]
Fingerprint identification using local Gabor filters
Chih-Jen Lee
,
Tai-Ning Yang
,
Chun-Jung Chen
,
Allen Y. Chang
,
Sheng-Hsuan Hsu
.
ncm 2010
:
626-631
[doi]
Combining Gradientfaces, principal component analysis, and Fisher linear discriminant for face recognition
Chih-Jen Lee
,
Tzu-Yin Chen
,
Jenn-Dong Sun
,
Tai-Ning Yang
,
Allen Y. Chang
.
ncm 2010
:
622-625
[doi]
The earthwork plan application of 3D Geospatial data
Jin-nyung Lee
,
Moo-uk Pyun
,
Byung-kil Lee
,
Yang-dam Eo
.
ncm 2010
:
547-552
[doi]
Novel dummy sequence generator for PAPR reduction by DSI in OFDM systems
Shu-Hong Lee
.
ncm 2010
:
662-664
[doi]
An advanced approach for vehicle routing problem with time windows
C.-Y. Lee
,
S. W. Lin
,
K. C. Ying
,
M. R. Yang
.
ncm 2010
:
408-411
[doi]
A hybrid algorithm applied to classify unbalanced data
C.-Y. Lee
,
M. R. Yang
,
L.-Y. Chang
,
Z. J. Lee
.
ncm 2010
:
618-621
[doi]
An advanced H.264/AVC CAVLC decoding architecture for low power implementation
Byung-Yup Lee
,
Kwang-Ki Ryoo
.
ncm 2010
:
484-487
[doi]
Selected mapping applied scheme for PAPR reduction in OFDM communication systems
Gwo-Ruey Lee
,
Chia-Hsin Cheng
,
Ho-Lung Hung
.
ncm 2010
:
752-755
[doi]
Cross referencing algorithm for identifying group completeness in RFID system
Chong-Yen Lee
,
Hau-Dong Tsui
,
Ching-Bang Ya
,
Hsin-Ju Lin
,
Yuei-Dah Wang
.
ncm 2010
:
461-465
[doi]
A collaborative performance tuning approach for Portal-based web sites
Shanping Li
,
Jiaqi Tong
.
ncm 2010
:
113-117
[doi]
Internal forwarding scheme for consistent event transmission in distributed multi-user systems
Mingyu Lim
.
ncm 2010
:
563-568
[doi]
VoIP network forensic analysis with digital evidence procedure
I-Long Lin
,
Yun-Sheng Yen
,
Bo-Lin Wu
,
Hsiang-Yu Wang
.
ncm 2010
:
236-241
[doi]
Vehicle routing planning for logistics
Wei-You Liu
,
Shan-Ping Chuang
.
ncm 2010
:
129-132
[doi]
Two-dimensional bar code mobile commerce - Implementation and performance analysis
Chung-Hsin Liu
,
Chia-Hong Chou
.
ncm 2010
:
632-635
[doi]
The study for the WLAN with ZigBee positioning system
Chung-Hsin Liu
,
Jian-Yun Lo
.
ncm 2010
:
520-525
[doi]
The study of Botnet attack on VoIP
Chung-Hsin Liu
,
You-Sheng Li
.
ncm 2010
:
636-640
[doi]
The safety design of the laboratory monitoring system
Chung-Hsin Liu
,
Po-Cheng Teng
.
ncm 2010
:
509-513
[doi]
The analysis on the effectiveness for the handoff of WLAN and Bluetooth
Chung-Hsin Liu
,
Sheng-Shiang Chang
.
ncm 2010
:
514-519
[doi]
The study of video conference transmission security as an example on Windows Live
Chung-Hsin Liu
,
Wu-Fan Hsu
.
ncm 2010
:
505-508
[doi]
Fault detection for high availability RAID system
Zhiming Liu
,
Jichang Sha
,
Xiaohua Yang
,
Yaping Wan
.
ncm 2010
:
27-32
[doi]
Modeling Chinese stock markets volatility
Shu Quan Lu
,
Shiyu Xie
,
Takao Ito
.
ncm 2010
:
540-541
[doi]
The outliers of Chinese stock markets
Shu Quan Lu
,
Takao Ito
.
ncm 2010
:
542-546
[doi]
Leakage-resilient identity-based encryption scheme
Xizhao Luo
,
Peide Qian
,
Yanqin Zhu
,
Shangping Wang
.
ncm 2010
:
324-329
[doi]
Study of ecological sustainable development for urban built environment based on GIS and RS
Jing Luo
,
Xiao-chun Jin
,
Anrong Dang
.
ncm 2010
:
193-196
[doi]
A comparison of data encryption algorithms with the proposed algorithm: Wireless security
Shadi Masadeh
,
Shadi Aljawarneh
,
Nedal Turab
,
Aymen M. Abuerrub
.
ncm 2010
:
341-345
[doi]
Providing every student with an iPad as a means of helping develop Korean EFL Digital Literacy
Robert C. Meurant
.
ncm 2010
:
242-247
[doi]
Automatic damaged-function alternation among wireless sensor nodes
Toshiaki Miyazaki
,
Daiki Shitara
.
ncm 2010
:
557-562
[doi]
Classification students with learning disabilities using Naïve Bayes Classifier and Decision Tree
Nittaya Muangnak
,
Wannapa Pukdee
,
Thapani Hengsanunkun
.
ncm 2010
:
189-192
[doi]
Performance enhancement of tunneling protocol in mobile network with mobile router
Rama Mohan Babu K. N
,
Prathima Mabel J
,
K. N. Balasubramanya Murthy
,
Mamatha
.
ncm 2010
:
254-257
[doi]
CAOWL-SAI: Context aware OWL based semantic association inference
Saqib Nazir
,
Muhammad Tanvir Afzal
,
Muhammad Abdul Qadir
,
Hermann A. Maurer
.
ncm 2010
:
746-751
[doi]
A dynamic ID-based authentication scheme
Tien Dung Nguyen
,
Aymen Abdullah Al-Saffar
,
Eui-nam Huh
.
ncm 2010
:
248-253
[doi]
Development platform in the design of embedded automotive electronics
Santiago Otero
,
Francisco Poza
,
Miguel Angel DomÃnguez
,
Perfecto Mariño Espiñeira
.
ncm 2010
:
575-580
[doi]
Computer-assisted audit techniques based on an enhanced rough set model
Ping-Feng Pai
,
Ming-Fu Hsu
,
Ming-Chieh Wang
.
ncm 2010
:
207-212
[doi]
Maintenance system of mail sorting machine
Jeong-Hyun Park
,
Hoyon Kim
,
Jong-heung Park
.
ncm 2010
:
586-591
[doi]
A practical incentive towards efficient data sharing in large scale enterprise
Saumay Pushp
,
Priya Ranjan
.
ncm 2010
:
45-50
[doi]
On identification of pseudo uniform grounds based on similarity of settlement history
K. Saitou
,
S. Sakurai
,
H. Suzuki
.
ncm 2010
:
21-26
[doi]
An efficient key pre-distribution scheme for wireless sensor network using public key cryptography
Md. Iftekhar Salam
,
Pardeep Kumar
,
Hoon Jae Lee
.
ncm 2010
:
402-407
[doi]
Knowledge-first web services an E-Government example
Peter Salhofer
,
Bernd Stadlhofer
.
ncm 2010
:
218-223
[doi]
A study on secure and fair escrow services for digital commerce
Min-Hua Shao
,
Shu-Hui Wen
.
ncm 2010
:
396-401
[doi]
The most frequent closed sequence mining
Panida Songram
,
Sasitorn Kaewman
.
ncm 2010
:
213-217
[doi]
Extracting traversing features at requirements level from software legacy system
Yang Su
.
ncm 2010
:
139-144
[doi]
Understanding crosscutting concerns from various perspectives in software reverse engineering
Yang Su
.
ncm 2010
:
145-150
[doi]
Trusted business system model using context sensitiveness
Chandrasekaran Subramaniam
,
Sankarbharathy Ponnusamy
,
Agilan Ravi
,
Hanumanth Praveen Ravindran
.
ncm 2010
:
455-460
[doi]
Design of conceptual search engine using hierarchy of attributes and concepts
Sang C. Suh
,
Sri Ganesh Anaparthi
,
Gayatri Appana
.
ncm 2010
:
359-365
[doi]
The research of information security risk assessment method based on fault tree
Huang Xiao Tao
,
Cai Liang
,
Wu Chi
,
Huang Li Qun
.
ncm 2010
:
370-375
[doi]
Information security issue of enterprises adopting the application of cloud computing
Chang-Lung Tsai
,
Uei-Chin Lin
,
Allen Y. Chang
,
Chun-Jung Chen
.
ncm 2010
:
645-649
[doi]
Information security risks in a customer service call center infrastructure. Guidelines for security managers
Manuel Tupia
.
ncm 2010
:
262-264
[doi]
Adaptive signal management using event processing networks
Cesar D. Velandia-Brinez
,
S. Don
,
Na-Yun Cho
,
Eunmi Choi
,
Dugki Min
.
ncm 2010
:
738-745
[doi]
IT/IM academic network in Taiwan via social networks analyze of conference committees
Chen-Shu Wang
,
Yu-Chieh Li
.
ncm 2010
:
733-737
[doi]
Integrated baby-care recommender platform based on hybrid commonsense reasoning and case-based reasoning algorithms
Chen-Shu Wang
,
Chun-Yi Li
.
ncm 2010
:
676-681
[doi]
Emergency service warning system using SIP for integrated media
Narongrit Waraporn
,
Tuul Triyason
,
Chinnapong Angsuchotmetee
,
Patchara Tilkanont
.
ncm 2010
:
312-317
[doi]
Using threshold method to separate the edge, coating and body of tongue in automatic tongue diagnosis
C. C. Wei
,
C. H. Wang
,
S. W. Huang
.
ncm 2010
:
653-656
[doi]
Research of Flex-based WebGIS application
Zukuan Wei
,
Jae-Hong Kim
,
JingRong Zhao
.
ncm 2010
:
376-380
[doi]
Implementing FFT using SPMD style of OpenMP
Tien-hsiung Weng
,
Sheng-Wei Huang
,
Won Woo Ro
,
Kuan-Ching Li
.
ncm 2010
:
91-96
[doi]
A dynamic navigation scheme for vehicular ad hoc networks
Yan-Jing Wu
,
Wei-Cheng Sung
.
ncm 2010
:
231-235
[doi]
Neighbor-aware dynamic backoff algorithm for wireless multihop ad hoc networks
Chien-Min Wu
,
Hui-Kai Su
,
Wang-Hsai Yang
,
Yueh-Sheng Chien
,
Pai-Kun Huang
.
ncm 2010
:
33-38
[doi]
IT capability, strategic flexibility and enterprise performance: The empirical evidence from the manufacturing enterprises in Pearl River Delta
Weihong Xie
,
Luan Jiang
,
Yongjian Wang
,
Guangyu Zhang
.
ncm 2010
:
306-311
[doi]
An automated semantic annotation based-on Wordnet ontology
Che-Yu Yang
,
Hua-Yi Lin
.
ncm 2010
:
682-687
[doi]
A hot backup sip server system based on VRRP
Qingwei Yang
,
Zukuan Wei
,
Jae-Hong Kim
.
ncm 2010
:
17-20
[doi]
Item selection strategic via social network analyze
Ming-Hsiung Ying
,
Hao-Hsuan Huang
.
ncm 2010
:
727-732
[doi]
Research of ship oil spill risk monitoring & evaluation system in Shanghai Yangshan Port water area
Sun Yongming
,
Han Houde
.
ncm 2010
:
412-416
[doi]
A calendar oriented service for smart home
Yuan-Chih Yu
,
Shing-chern D. You
,
Dwen-Ren Tsai
.
ncm 2010
:
151-156
[doi]
Cardinality constraint analyse and implementation in access control model
Zhikun Zhang
,
Youping Geng
,
Jianguo Xiao
.
ncm 2010
:
265-267
[doi]
Sign in
or
sign up
to see more results.