0 | -- | 0 | Hyunwoo Kim, Mye M. Sohn, Hyun Jung Lee. Personalized recommendation framework based on CBR and CSP using ontology in a ubiquitous computing environment |
0 | -- | 0 | Huachun Zhou, Hongke Zhang, Fei Song. Mobility management analysis of internet based on the splitting mechanism |
0 | -- | 0 | Zhenqian Feng, Bing Bai, BaoKang Zhao, Jinshu Su. ICTree: discovering the underlying connections of your rental virtual machines in the public clouds |
0 | -- | 0 | Jongsuk R. Lee, Don McNickle, Krzysztof Pawlikowski, Hae-Duck Joshua Jeong. Self-similar properties of malicious teletraffic |
0 | -- | 0 | Ilsun You, Jinshu Su. Editorial |
0 | -- | 0 | Youngsang Song, Jongmoo Choi. A java card security framework: requirement analysis and enforcing techniques |
0 | -- | 0 | Sun-Ho Lee, Kang Bin Yim, In-Yeong Lee. A secure solution with a password recovery feature for USB flash drives |
0 | -- | 0 | Hsing-Chung Chen, Yung-Fa Huang, Shu-Hong Lee, Chi-Tung Chen, Ho-Lung Hung. A mobile location-based with time-constraint RBAC associated database management model |