Abstract is missing.
- SA-TCP: A Secure and Adaptive TCP for Wireless Ad Hoc NetworksWaleed S. Alnumay, Uttam Ghosh, Pushpita Chatterjee. 1-9 [doi]
- IPAS: User Test Phase and EvaluationSadiq Almuairfi, Prakash Veeraraghavan, Naveen Chilamkurti. 11-20 [doi]
- Coding DNA Sequence WatermarkingSuk Hwan Lee, Won-Joo Hwang, Eung-Joo Lee, Ki-Ryong Kwon. 21-27 [doi]
- Exclusive Region Based Scheduling for MB-OFDM UWB Using Hidden Pilot SequencesByung Wook Kim, Byung-Gyu Kim. 29-35 [doi]
- The Digital Video Frame Obfuscation Method in Consideration of Human Visual System for Intellectual Property Protection and AuthenticationHeehyung Bu, Jonghwa Kim, Sungho Kim. 37-42 [doi]
- Fuzzy-Based Resource Reallocation Scheduling Model in Cloud ComputingJaekwon Kim, Taeyoung Kim, Minoh Park, Youngshin Han, Jongsik Lee. 43-48 [doi]
- An Efficient Algorithm for High Utility Sequential Pattern MiningJun-Zhe Wang, Zong-Hua Yang, Jiun-Long Huang. 49-56 [doi]
- Simulated Annealing for the Design of Location Management System and Relation MapSi-hwan Jang, Sung-Soo Kim, Sanghyun Joo. 57-63 [doi]
- A Simple, Flexible and Adaptable Solution to Enable Information Exchange for Specific Business ProcessesMert Biçakçi, Mehmet Ulas Çakir. 65-74 [doi]
- User Authentication with Distributed Cluster Formation in Wireless Sensor NetworksDong Hoon Kim, Youn-Sik Hong, Ki-Young Lee. 75-85 [doi]
- Comparative Study of Cyber Security Characteristics for Nuclear SystemsJinsoo Shin, Hanseong Son, Gyunyoung Heo. 87-93 [doi]
- Optical Computing for Digital Signal Process in Incoherent Fiber System Using Positive RealizationKyungsup Kim, Jaecheol Ryou, Woo-Tak Jung. 95-102 [doi]
- Optimization of Non-fuzzy Neural Networks Based on Crisp Rules in Scatter PartitionKeon-Jun Park, Byun-Gon Kim, Kwan-Woong Kim, Jung-Won Choi, Yong-Kab Kim. 103-109 [doi]
- LBG-Based Non-fuzzy Inference System for Nonlinear ProcessKeon-Jun Park, Kwan-Woong Kim, Byun-Gon Kim, Jung-Won Choi, Yong-Kab Kim. 111-117 [doi]
- An Efficient Embedded System for the Detection and Recognition of Speed-Limit SignsHsing-Lung Chen, Ming-Sze Chen, Shu-Hua Hu. 119-126 [doi]
- Future Enterprise Computing Looking into 2020Yung-Chin Fang, Yuxiang Gao, Cindy Stap. 127-134 [doi]
- Implementation of a Multi-core Prototyping System for a Video-Based Fire Detection AlgorithmYong Hun Park, Myeongsu Kang, Jong Myon Kim. 135-144 [doi]
- A Novel Spectrum Sensing Scheme Based on Wavelet Denoising with Fuzzy for Cognitive Radio Sensor NetworksHiep-Vu Van, Insoo Koo. 145-151 [doi]
- Accelerating a Bellman-Ford Routing Algorithm Using GPUIn-Kyu Jeong, Jia Uddin, Myeongsu Kang, Cheol Hong Kim, Jong Myon Kim. 153-160 [doi]
- Early Fire Detection Using Multi-Stage Pattern Recognition Techniques in Video SequencesDongkoo Shon, Myeongsu Kang, Junsang Seo, Jong Myon Kim. 161-168 [doi]
- Energy Efficient Backoff-Free Fragment Retransmission Fragmentation Scheme for IEEE 802.11 WLANProsper Mafole, Yuki Manabe 0001, Teruaki Kitasuka, Masayoshi Aritsugi. 169-176 [doi]
- Fault Classification of an Induction Motor Using Texture Features of Vibration SignalsWon-Chul Jang, Myeongsu Kang, Jong Myon Kim. 177-183 [doi]
- An Efficient Audit Scheme for Cloud StorageOhmin Kwon, Dongyoung Koo, Yongjoo Shin, Hyunsoo Yoon. 185-192 [doi]
- High-Performance Cluster Estimation Using Many-Core ModelsJunsang Seo, Myeongsu Kang, Cheol Hong Kim, Jong Myon Kim. 193-201 [doi]
- Dynamic Processing of Floating Continuous Query for Cold Chain ManagementBonghee Hong, Kyungmin Lee, Yongxu Piao. 203-209 [doi]
- A New Approach for Task Scheduling Optimization in Mobile Cloud ComputingPham Phuoc Hung, Tuan-Anh Bui, Eui-nam Huh. 211-220 [doi]
- Study on Encryption of Wireless Network-Based Mobility Energy-Enterprise Security ManagementYoung-Hyuk Kim, Il-Kwon Lim, Jae-Pil Lee, Jae-Gwang Lee, Hyun Nam-Gung, Jae Kwang Lee. 221-227 [doi]
- Secure and Efficient Deduplication over Encrypted Data with Dynamic Updates in Cloud StorageDongyoung Koo, Junbeom Hur, Hyunsoo Yoon. 229-235 [doi]
- Tool Selection: A Cloud-Based ApproachChirpreet Singh, Qun Shao, Yuqian Lu, Xun Xu 0001, Xinfeng Ye. 237-245 [doi]
- The Self-induction System for Fuel-Efficient Driving Using OBD IIWonang Jang, JinGwan Park, JuWan Kweon, Changyong Lee, DoHoon Lee. 247-252 [doi]
- Intuitive Hand Motion Recognition and NUI/NUX FrameworkGwanghyung Lee, Dongil Shin, Dongkyoo Shin. 253-259 [doi]
- Evaluating Skin Hereditary Traits Based on Daily ActivitiesJehyeok Rew, Young-Hwan Choi, Daehoon Kim, Seungmin Rho, Eenjun Hwang. 261-270 [doi]
- A New Fast Encoding Algorithm Based on Motion Activity for High Efficiency Video Coding (HEVC)Jong-Hyeok Lee, Kalyan Goswami, Byung-Gyu Kim. 271-278 [doi]
- Smart Network Services Using Ticket Issuance in the TSM (Trusted Software Monitor) SystemSu-Wan Park, Jeong-Nyeo Kim. 279-287 [doi]
- Macro Modeling Approach for Semi-digital Smart Integrated CircuitsZaniar Hoseini, Kye-Shin Lee, Byung-Gyu Kim. 289-296 [doi]
- Hybrid Performance with Pixel Values' Transition and Curve Fitting for Improved Stereo MatchingKwang-Mu Shin, Daekeun Kim, Ki-Dong Chung. 297-304 [doi]
- ActiveSTB: Scalable Scheme Over Wireless NetworksHeung Ki Lee, Kyung Jin Ahn, Jaehee Jung, Gangman Yi. 305-312 [doi]
- Rhythm-Based Authentication Scheme on Smart DevicesJae-dong Lee, Won Min Kang, Chang Hyun Moon, Hwa-Young Jeong, Young-Sik Jeong, Jai-Jin Jung, Jong Hyuk Park. 313-319 [doi]
- Cloud Services Aided e-Tourism: In the Case of Low-Cost Airlines for BackpackingQingguo Zhou, Jason C. Hung, Jun Hu, Huaming Chen, Rui Zhou 0005, Ji Qi, Lei Yang 0021, Xuan Wang. 321-327 [doi]
- Modified Cat Swarm Optimization Algorithm for Feature Selection of Support Vector MachinesKuan-Cheng Lin, Yi-Hung Huang, Jason C. Hung, Yung-Tso Lin. 329-336 [doi]
- Using Affective Computing to Detect Emotions with ColorMin-Feng Lee, Guey-Shya Chen, Jen-Chieh Wang. 337-345 [doi]
- Bucket Index Ordering Problem in Range QueriesTaek-Young Youn, Nam-Su Jho, Ku-Young Chang, Dowon Hong. 347-355 [doi]
- Signal Interference of Ubiquitous Wireless Networks on Data ThroughputJie Zhang, Goo Yeon Lee, Hwa Jong Kim, Yong Lee 0002. 357-364 [doi]
- Privacy-Preserving Data Collection with Self-Awareness ProtectionKok Seng Wong, Myung Ho Kim. 365-371 [doi]
- User-Centric Security Service Model for Cloud StorageSeongMin Yoo, PyungKoo Park, Jinseop Shin, Hoyong Ryu, Jaecheol Ryou. 373-382 [doi]
- Continuity Labeling Technique of Multiple Face in Multiple FrameHyun-jung Kim, Il-Yong Weon, Chang Hun Lee. 383-391 [doi]
- Audio Classification Using GA-Based Fuzzy C-MeansMyeongsu Kang, Jong Myon Kim. 393-400 [doi]
- Anonymous Editing Prevention Method for Depth-Image-Based Rendering Stereoscopic VideoJi Won Lee, Hae-Yeoun Lee, Sang-Hyun Joo. 401-407 [doi]
- Different Knowledge Modeling Approach for Clinical Decision Supporting Service in u-Health ContextJeong Ah Kim. 409-413 [doi]
- Formal Verification for Inter-Partitions Communication of RTOS Supporting IMASachoun Park, Gihwon Kwon. 415-421 [doi]
- 3D Face Representation Using Inverse Compositional Image Alignment for Multimodal Face RecognitionKanghun Jeong, Hyeonjoon Moon, Sanghoon Kim. 423-429 [doi]
- Simulating Synthesized Automata from Decentralized Specifications in LTLRyoungkwo Kwon, Gihwon Kwon. 431-437 [doi]
- Peers-Based Location of Mobile DevicesMordechai Guri, Anatoly Krasner, Yuval Elovici. 439-445 [doi]
- Platform Design for Data SharingYun-Hee Son, Min-A Kang, Woo-Seung Jo, Kyu-Jin Choi, Kyu-Chul Lee. 447-452 [doi]
- Reasonable Resolution of Fingerprint Wi-Fi Radio Map for Dense Map InterpolationWonsun Bong, Yong Cheol Kim. 453-459 [doi]
- Sensor Based Ubiquitous Application Modeling Using Process Definition LanguageSang-Young Lee. 461-466 [doi]
- Smart Device Locking System Provides Handy and Improved SecurityHyun Woo Kim, Young-Sik Jeong. 467-472 [doi]
- A Study on the Efficient Management of Android Apps Using a WhitelistUijin Jang, Changjin Suh, Hyungmin Lim. 473-482 [doi]
- A Workflow Scheduling Technique to Consider Task Processing Rate in Spot Instance-Based CloudDaeyong Jung, JongBeom Lim, Heon-Chang Yu. 483-494 [doi]
- Enhanced Beacon Scheduling of IEEE802.15.4e DSMESung-wook Nam, Kwang-il Hwang. 495-503 [doi]
- Building Recognition Guided by Wi-Fi Based LocalizationWonsun Bong, Yong Cheol Kim. 505-513 [doi]
- Context Aware Based Access Control Model in Cloud Data Center EnvironmentYun Sang Byun, Jin Kwak. 515-524 [doi]
- Whitelist Generation Technique for Industrial Firewall in SCADA NetworksDong-ho Kang, Byoung-Koo Kim, Jung-Chan Na, Kyoung-Sun Jhang. 525-534 [doi]
- Design of Industrial Firewall System Based on Multiple Access Control FilterByoung-Koo Kim, Dong-ho Kang, Jung-Chan Na, Beom-Hwan Chang, Tai-Myoung Chung. 535-544 [doi]
- The Improvement for Performance of Inter-VTS Data Exchange Format Protocol in VTS SystemNamje Park. 545-551 [doi]
- Abnormal Behavior Detection Technique Based on Big DataHyunjoo Kim, Ikkyun Kim, Tai-Myoung Chung. 553-563 [doi]
- Rotational Bridge Priority Masking for Building Equal-Cost Multi-treeChangjin Suh, Uijin Jang. 565-573 [doi]
- Linear SVM-Based Android Malware DetectionHyo-Sik Ham, Hwan-Hee Kim, Myung-Sup Kim, Mi-Jung Choi. 575-585 [doi]
- A Study on Authentication Mechanism to Ensure the Reliability of Content Distribution Using Log Monitoring and Encoding of OPSsByoung-Soo Koh, Sangho Seo, ByungOk Jung. 587-596 [doi]
- Virtual Agent Learning for NUI/NUX-Based GamesDaxing Jin, Seoungjae Cho, Yunsick Sung, Kyungeun Cho, Kyhyun Um. 597-604 [doi]
- An Analysis of the Korea National DNS Using Big Data TechnologyEuihyun Jung, JoonHyung Lim, Juyoung Kim. 605-613 [doi]
- Development of Bio-Signal Based Continuous Intensity Wearable Input DeviceJinuk Kim, Jihye Kwon, Subin Im, Seongyoon Lee, Jaehyo Kim. 615-631 [doi]
- Speaker Adaptive Real-Time Korean Single Vowel Recognition for an Animation ProducingSun-Min Whang, Bok-Hee Song, Han-Kyung Yun. 633-641 [doi]
- Social Network Service Real Time Data Analysis Process ResearchYu-Jong Jang, Jin Kwak. 643-652 [doi]
- A Database Design for Pre-ordering System Based on Prediction of Customer Arrival TimeAziz Nasridinov, Sangeun Yoon, Young-Ho Park 0002. 653-659 [doi]
- Behavior Execution Method for a Robot Using an Online Development ApproachSeungyoub Ssin, Seoungjae Cho, Kyhyun Um, Kyungeun Cho. 661-667 [doi]
- Smart Logistics Service Model Based on Context InformationKyungHun Kwak, Namjin Bae, Yongyun Cho. 669-676 [doi]
- Auto-configuration of the Initial Contour Using Level-Set Method for Lung Segmentation on Chest CT ImagesSeung-Hoon Chae, Hae-Min Moon, Yongwha Chung, Sung Bum Pan. 677-686 [doi]
- Suction Based Wall Climbing Robot for Edge MovementJeesoo Lee, Sanghoon Kim. 687-696 [doi]
- Improving Data Hiding Capacity Based on Hamming CodeCheonshik Kim, Ching-Nung Yang. 697-706 [doi]
- Analysis of the Dynamic Characteristics of a Torque-Assist System Using the Model-Based Design MethodKim Gyoung Eun, Kim Byeung Woo. 707-717 [doi]
- Improved Branch Prediction for Just-in-Time Decompression of Canonical Huffman Bytecode StreamsChisoon Jeong, Su Hang, Bernd Burgstaller. 719-729 [doi]
- Effective Path Modification Using Intuitive GesturesHongzhe Liu, Seoungjae Cho, Yulong Xi, Kyungeun Cho, Kyhyun Um. 731-738 [doi]
- DSRC Based Self-Adaptive Navigation System: Aiming Spread Out the Vehicles for Alleviating Traffic CongestionHohyeon Jeong, Jung-Won Lee, Jaehoon (Paul) Jeong, Eunseok Lee. 739-749 [doi]
- A Two-Tier Routing Algorithm Based on Geographical Zone in VANETSeung Hwan Lee, Seung-Joon Seok. 751-761 [doi]
- Analysis of Vehicle Surroundings Monitoring System Based on Vehicle-to-Vehicle CommunicationHong Cho, Byeong-Woo Kim. 763-771 [doi]
- The Energy-Efficient Probabilistic Routing in MANETsSang-Hyun Park, Jung-Ryun Lee. 773-784 [doi]
- Functional Annotation of Proteins by a Novel Method Using Weight and Feature SelectionJaehee Jung, Heung Ki Lee, Gangman Yi. 785-797 [doi]
- Gaze Behavior Analysis System Based on Objects Using Trajectory InformationJung-Min Oh, Sangjin Hong, Nammee Moon. 799-808 [doi]
- The Crack Width Calculation Program for Structural Concrete Members Based on a Limit State DesignHwaMin Lee, Doo-Soon Park, Giyeol Lee. 809-820 [doi]
- Novel Real-Time Automobile Detection Algorithm for Blind Spot AreaSeung-Hun Yang, Gwang-Soo Hong, Beak Ryong, Byung-Gyu Kim. 821-832 [doi]
- Environment Control Model of Intelligent Plant Factory Using Context Based of Sensing DataNamjin Bae, KyungHun Kwak, Yongyun Cho. 833-842 [doi]
- Implementation of an Integrated Log Analysis System Through Statistics-Based Prediction TechniquesKwangman Ko. 843-851 [doi]
- The Comparison of Pricing Schemes for Cloud ServicesSe-Hak Chun, Byong-Sam Choi, Young Woong Ko, Soon-Hak Hwang. 853-861 [doi]
- Platform Design for Co-creationSoongoo Hong, Hyung Rim Choi, Hyun Jong Kim, Chang-Hyun Park, Hyun-Mi Lee. 863-874 [doi]
- Towards the Implementation of an Ubiquitous Car Park Availability Detection SystemIan K. T. Tan, Poo Kuan Hoong, Chee Ken Hong, Low Zhi Wen. 875-884 [doi]
- Improvised Classification Model for Cloud Based Authentication Using Keystroke DynamicsT. Senthil Kumar, Abhijit Suresh, Aadarsh Karumathil. 885-893 [doi]