Abstract is missing.
- A Security Requirement Management Database Based on ISO/IEC 15408Shoichi Morimoto, Daisuke Horie, Jingde Cheng. 1-10 [doi]
- Development of Committee Neural Network for Computer Access Security SystemA. Sermet Anagun. 11-20 [doi]
- C-TOBI-Based Pitch Accent Prediction Using Maximum-Entropy ModelByeongchang Kim, Gary Geunbae Lee. 21-30 [doi]
- Design and Fabrication of Security and Home Automation SystemEung Soo Kim, Min Sung Kim. 31-37 [doi]
- PGNIDS(Pattern-Graph Based Network Intrusion Detection System) DesignByung kwan Lee, Seung Hae Yang, Dong-Hyuck Kwon, Dai-Youn Kim. 38-47 [doi]
- Experiments and Hardware Countermeasures on Power Analysis AttacksManKi Ahn, Hoon Jae Lee. 48-53 [doi]
- Information System Modeling for Analysis of Propagation Effects and Levels of DamageIn-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Eul-Gyu Im, Dongho Won. 54-63 [doi]
- A Belt-Zone Method for Decreasing Control Messages in Ad Hoc NetworksYoungrag Kim, JaeYoun Jung, Seunghwan Lee, Chonggun Kim. 64-72 [doi]
- A VLSM Address Management Method for Variable IP SubnettingSeongKwon Cheon, Dongxue Jin, Chonggun Kim. 73-83 [doi]
- SDSEM: Software Development Success Evolution ModelHaeng-Kon Kim, Sang-Yong Byun. 84-92 [doi]
- A Robust Routing Protocol by a Substitute Local Path in Ad Hoc NetworksMary Wu, Sangjoon Jung, Seunghwan Lee, Chonggun Kim. 93-103 [doi]
- Power Efficient Wireless LAN Using 16-State Trellis-Coded Modulation for Infrared CommunicationsHae Geun Kim. 104-114 [doi]
- The Design and Implementation of Real-Time Environment Monitoring Systems Based on Wireless Sensor NetworksKyung-Hoon Jung, Seok-Cheol Lee, Hyun-Suk Hwang, Chang Soo Kim. 115-124 [doi]
- Ontology-Based Information Search in the Real World Using Web ServicesHyun-Suk Hwang, Kyoo Seok Park, Chang Soo Kim. 125-133 [doi]
- An Active Node Set Maintenance Scheme for Distributed Sensor NetworksTae Young Byun, Min-Su Kim, Sung Ho Hwang, Sung-eok Jeon. 134-143 [doi]
- Intelligent Information Search Mechanism Using Filtering and NFC Based on Multi-agents in the Distributed EnvironmentSubong Yi, Bobby D. Gerardo, Young Seok Lee, Jaewan Lee. 144-153 [doi]
- Network Anomaly Behavior Detection Using an Adaptive Multiplex DetectorMisun Kim, Minsoo Kim, Jae-Hyun Seo. 154-162 [doi]
- Applying Product Line to the Embedded SystemsHaeng-Kon Kim. 163-171 [doi]
- Enhanced Fuzzy Single Layer Learning Algorithm Using Automatic Tuning of ThresholdKwang-Baek Kim, Byung kwan Lee, Soon-Ho Kim. 172-177 [doi]
- Optimization of Location Management in the Distributed Location-Based Services Using Collaborative AgentsRomeo Mark A. Mateo, Jaewan Lee, Hyunho Yang. 178-187 [doi]
- Design of H.264/AVC-Based Software Decoder for Mobile PhoneHyung-Su Jeon, Hye-Min Noh, Cheol-Jung Yoo, Ok-Bae Chang. 188-197 [doi]
- Transforming a Legacy System into ComponentsHaeng-Kon Kim, Youn-Ky Chung. 198-205 [doi]
- Pseudorandom Number Generator Using Optimal Normal BasisInjoo Jang, Hyeong Seon Yoo. 206-212 [doi]
- Efficient Nonce-Based Authentication Scheme Using Token-UpdateWenbo Shi, Hyeong Seon Yoo. 213-221 [doi]
- An Efficient Management of Network Traffic Performance Using Framework-Based Performance Management ToolSeong-Man Choi, Cheol-Jung Yoo, Ok-Bae Chang. 222-233 [doi]
- A Prediction Method of Network Traffic Using Time Series ModelsSangjoon Jung, Chonggun Kim, Younky Chung. 234-243 [doi]
- An Obstacle Avoidence Method for Chaotic Robots Using Angular Degree LimitionsYoungchul Bae, Malrey Lee, Thomas M. Gatton. 244-250 [doi]
- Intersection Simulation System Based on Traffic Flow Control FrameworkChang-Sun Shin, Dong-In Ahn, Hyun Yoe, Su-Chong Joo. 251-260 [doi]
- A HIICA(Highly-Improved Intra CA) Design for M-CommerceByung kwan Lee, Chang-Min Kim, Dae-won Shin, Seung Hae Yang. 261-268 [doi]
- Highly Reliable Synchronous Stream Cipher System for Link EncryptionHoon Jae Lee. 269-278 [doi]
- Recognition of Concrete Surface Cracks Using ART2-Based Radial Basis Function Neural NetworkKwang-Baek Kim, Hwang Kyu Yang, Sang-Ho Ahn. 279-286 [doi]
- Hybrid Image Mosaic Construction Using the Hierarchical MethodOh-Hyung Kang, Ji-Hyun Lee, Yang-Won Rhee. 287-297 [doi]
- Public Key Encryption with Keyword Search Based on K-Resilient IBEDalia Khader. 298-308 [doi]
- A Generic Construction of Secure Signatures Without Random OraclesJin Li, Yuen-Yan Chan, Yanming Wang. 309-317 [doi]
- A Separation Between Selective and Full-Identity Security Notions for Identity-Based EncryptionDavid Galindo. 318-326 [doi]
- Traceable Signature: Better Efficiency and BeyondHe Ge, Stephen R. Tate. 327-337 [doi]
- On the TYS Signature SchemeMarc Joye, Hung-Mei Lin. 338-344 [doi]
- Efficient Partially Blind Signatures with Provable SecurityQianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang. 345-354 [doi]
- A Framework for Robust Group Key AgreementJens-Matthias Bohli. 355-364 [doi]
- BGN Authentication and Its Extension to Convey Message CommitmentsYuen-Yan Chan, Jin Li. 365-374 [doi]
- New Security Problem in RFID Systems Tag Killing Dong-Guk Han, Tsuyoshi Takagi, Howon Kim, Kyoil Chung. 375-384 [doi]
- A Model for Security Vulnerability PatternHyungwoo Kang, Kibom Kim, Soon Jwa Hong, Dong-Hoon Lee. 385-394 [doi]
- A New Timestamping Scheme Based on Skip ListsKaouthar Blibech, Alban Gabillon. 395-405 [doi]
- A Semi-fragile Watermarking Scheme Based on SVD and VQ TechniquesHsien-Chu Wu, Chuan-Po Yeh, Chwei-Shyong Tsai. 406-415 [doi]
- New Constructions of Universal Hash Functions Based on Function SumsKhoongming Khoo, Swee-Huay Heng. 416-425 [doi]
- Analysis of Fast Blockcipher-Based Hash FunctionsMartin Stanek. 426-435 [doi]
- Application of LFSRs for Parallel Sequence Generation in Cryptologic AlgorithmsSourav Mukhopadhyay, Palash Sarkar. 436-445 [doi]
- Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential CryptanalysisChanghoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee. 446-455 [doi]
- Design and Implementation of an FPGA-Based 1.452-Gbps Non-pipelined AES ArchitectureIgnacio Algredo-Badillo, Claudia Feregrino Uribe, René Cumplido. 456-465 [doi]
- Security Weaknesses in Two Proxy Signature SchemesJiqiang Lu. 466-475 [doi]
- A Proposal of Extension of FMS-Based Mechanism to Find Attack PathsByung Ryong Kim, Ki-Chang Kim. 476-485 [doi]
- Comparative Analysis of IPv6 VPN Transition in NEMO EnvironmentsHyung-Jin Lim, Dong-Young Lee, Tai-Myoung Chung. 486-496 [doi]
- A Short-Lived Key Selection Approach to Authenticate Data Origin of Multimedia StreamNamhi Kang, Younghan Kim. 497-506 [doi]
- Weakest Link Attack on Single Sign-On and Its Case in SAML V2.0 Web SSOYuen-Yan Chan. 507-516 [doi]
- An Inter-domain Key Agreement Protocol Using Weak PasswordsYoungsook Lee, Junghyun Nam, Dongho Won. 517-526 [doi]
- A Practical Solution for Distribution Rights Protection in Multicast EnvironmentsJosep Pegueroles, Marcel Fernandez, Francisco Rico-Novella, Miguel Soriano. 527-536 [doi]
- Audit-Based Access Control in Nomadic Wireless EnvironmentsFrancesco Palmieri, Ugo Fiore. 537-545 [doi]
- Cost - Time Trade Off Models Application to Crashing Flow Shop Scheduling ProblemsMorteza Bagherpour, Siamak Noori, S. Jafar Sadjadi. 546-553 [doi]
- The ASALB Problem with Processing Alternatives Involving Different Tasks: Definition, Formalization and ResolutionLiliana Capacho, Rafael Pastor. 554-563 [doi]
- Satisfying Constraints for Locating Export Containers in Port Container TerminalsKap Hwan Kim, Jong-Sool Lee. 564-573 [doi]
- A Price Discrimination Modeling Using Geometric ProgrammingSeyed J. Sadjadi, Mohsen Ziaee. 574-580 [doi]
- Hybrid Evolutionary Algorithms for the Rectilinear Steiner Tree Problem Using Fitness EstimationByounghak Yang. 581-589 [doi]
- Data Reduction for Instance-Based Learning Using Entropy-Based PartitioningSeung-Hyun Son, Jae-Yearn Kim. 590-599 [doi]
- Coordinated Inventory Models with Compensation Policy in a Three Level Supply ChainJeong Hun Lee, Il Kyeong Moon. 600-609 [doi]
- Using Constraint Satisfaction Approach to Solve the Capacity Allocation Problem for Photolithography AreaShu-Hsing Chung, Chun-Ying Huang, Amy H. I. Lee. 610-620 [doi]
- Scheduling an R&D Project with Quality-Dependent Time SlotsMario Vanhoucke. 621-630 [doi]
- The Bottleneck Tree Alignment ProblemsYen Hung Chen, Chuan Yi Tang. 631-637 [doi]
- Performance Study of a Genetic Algorithm for Sequencing in Mixed Model Non-permutation Flowshops Using Constrained BuffersGerrit Färber, Anna M. Coves Moreno. 638-648 [doi]
- Optimizing Relative Weights of Alternatives with Fuzzy Comparative JudgmentChung-Hsing Yeh, Yu-Hern Chang. 649-658 [doi]
- Model and Solution for the Multilevel Production-Inventory System Before Ironmaking in Shanghai Baoshan Iron and Steel ComplexGuoli Liu, Lixin Tang. 659-667 [doi]
- A Coordination Algorithm for Deciding Order-Up-To Level of a Serial Supply Chain in an Uncertain EnvironmentKung-Jeng Wang, Wen-Hai Chih, Ken Hwang. 668-677 [doi]
- Optimization of Performance of Genetic Algorithm for 0-1 Knapsack Problems Using Taguchi MethodA. S. Anagun, T. Sarac. 678-687 [doi]
- Truck Dock Assignment Problem with Time Windows and Capacity Constraint in Transshipment Network Through CrossdocksAndrew Lim, Hong Ma, Zhaowei Miao. 688-697 [doi]
- An Entropy Based Group Setup Strategy for PCB AssemblyIn-Jae Jeong. 698-707 [doi]
- Cross-Facility Production and Transportation Planning Problem with Perishable InventorySandra Duni Eksioglu, Mingzhou Jin. 708-717 [doi]
- A Unified Framework for the Analysis of M/G/1 Queue Controlled by WorkloadHo Woo Lee, Se-Won Lee, Won Ju Seo, Sahng Hoon Cheon, Jongwoo Jeon. 718-727 [doi]
- Tabu Search Heuristics for Parallel Machine Scheduling with Sequence-Dependent Setup and Ready TimesSang-Il Kim, Hyun-Seon Choi, Dong-Ho Lee. 728-737 [doi]
- The Maximum Integer Multiterminal Flow ProblemCédric Bentz. 738-747 [doi]
- Routing with Early Ordering for Just-In-Time Manufacturing SystemsMingzhou Jin, Kai Liu, Burak Eksioglu. 748-756 [doi]
- A Variant of the Constant Step Rule for Approximate Subgradient Methods over Nonlinear NetworksEugenio Mijangos. 757-766 [doi]
- On the Optimal Buffer Allocation of an FMS with Finite In-Process BuffersSoo-Tae Kwon. 767-776 [doi]
- Optimization Problems in the Simulation of Multifactor Portfolio Credit RiskWanmo Kang, Kyungsik Lee. 777-784 [doi]
- Two-Server Network Disconnection ProblemByung-Cheon Choi, Sung-Pil Hong. 785-792 [doi]
- One-Sided Monge TSP Is NP-HardVladimir G. Deineko, Alexandre Tiskin. 793-801 [doi]
- On Direct Methods for Lexicographic Min-Max OptimizationWlodzimierz Ogryczak, Tomasz Sliwinski. 802-811 [doi]
- Multivariate Convex Approximation and Least-Norm Convex Data-SmoothingAlex Y. D. Siem, Dick den Hertog, Aswin L. Hoffmann. 812-821 [doi]
- Linear Convergence of Tatônnement in a Bertrand OligopolyGuillermo Gallego, Woonghee Tim Huh, Wanmo Kang, Robert Phillips. 822-831 [doi]
- Design for Using Purpose of Assembly-GroupHak-Soo Mok, Chang-Hyo Han, Chan-Hyoung Lim, John-Hee Hong, Jong-Rae Cho. 832-840 [doi]
- A Conditional Gaussian Martingale Algorithm for Global OptimizationManuel L. Esquível. 841-851 [doi]
- Finding the Number of Clusters Minimizing Energy Consumption of Wireless Sensor NetworksHyunsoo Kim, Hee Yong Youn. 852-861 [doi]
- A Two-Echelon Deteriorating Production-Inventory Newsboy Model with Imperfect Production ProcessHui-Ming Wee, Chun-Jen Chung. 862-874 [doi]
- Mathematical Modeling and Tabu Search Heuristic for the Traveling Tournament ProblemJin Ho Lee, Young Hoon Lee, Yun Ho Lee. 875-884 [doi]
- An Integrated Production-Inventory Model for Deteriorating Items with Imperfect Quality and Shortage Backordering ConsiderationsHui-Ming Wee, Jonas C. P. Yu, Kung-Jeng Wang. 885-897 [doi]
- A Clustering Algorithm Using the Ordered Weight Sum of Self-Organizing Feature MapsJong-Sub Lee, Maing-Kyu Kang. 898-907 [doi]
- Global Optimization of the Scenario Generation and Portfolio Selection ProblemsPanos Parpas, Berç Rustem. 908-917 [doi]
- A Generalized Fuzzy Optimization Framework for R&D Project Selection Using Real Options ValuationE. Ertugrul Karsak. 918-927 [doi]
- Supply Chain Network Design and Transshipment Hub Location for Third Party Logistics ProvidersSeungwoo Kwon, Kyungdo Park, Chulung Lee, Sung-Shick Kim, Hak-Jin Kim, Zhong Liang. 928-933 [doi]
- A Group Search Optimizer for Neural Network TrainingS. He, Q. H. Wu, J. R. Saunders. 934-943 [doi]
- Application of Two-Stage Stochastic Linear Program for Portfolio Selection ProblemKuo-Hwa Chang, Huifen Chen, Ching-Fen Lin. 944-953 [doi]
- Hierarchical Clustering Algorithm Based on Mobility in Mobile Ad Hoc NetworksSulyun Sung, Yuhwa Seo, Yongtae Shin. 954-963 [doi]
- An Alternative Approach to the Standard Enterprise Resource Planning Life Cycle: Enterprise Reference MetamodelingMiguel Gutiérrez, Alfonso Durán, Pedro Cocho. 964-973 [doi]
- Static Analysis Based Software Architecture RecoveryJiang Guo, Yuehong Liao, Raj Pamula. 974-983 [doi]
- A First Approach to a Data Quality Model for Web PortalsAngelica Caro, Coral Calero, Ismael Caballero, Mario Piattini. 984-993 [doi]
- Design for Environment-Friendly ProductHak-Soo Mok, Jong-Rae Cho, Kwang-Sup Moon. 994-1003 [doi]
- Performance of HECC Coprocessors Using Inversion-Free FormulaeThomas J. Wollinger, Guido Bertoni, Luca Breveglieri, Christof Paar. 1004-1012 [doi]
- Metrics of Password Management PolicyCarlos Villarrubia, Eduardo Fernández-Medina, Mario Piattini. 1013-1023 [doi]
- Using UML Packages for Designing Secure Data WarehousesRodolfo Villarroel, Emilio Soler, Eduardo Fernández-Medina, Juan Trujillo, Mario Piattini. 1024-1034 [doi]
- Practical Attack on the Shrinking GeneratorPino Caballero-Gil, Amparo Fúster-Sabater. 1035-1043 [doi]
- A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information SystemsDaniel Mellado, Eduardo Fernández-Medina, Mario Piattini. 1044-1053 [doi]
- Stochastic Simulation Method for the Term Structure Models with JumpKisoeb Park, Moonseong Kim, Seki Kim. 1054-1063 [doi]
- The Ellipsoidal ::::l::::::::::p:::::: Norm Obnoxious Facility Location ProblemYu Xia. 1064-1072 [doi]
- On the Performance of Recovery Rate ModelingJ. Samuel Baixauli, Susana Alvarez. 1073-1080 [doi]
- Using Performance Profiles to Evaluate Preconditioners for Iterative MethodsMichael Lazzareschi, Tzu-Yi Chen. 1081-1089 [doi]
- Multicast ::::omega::::-Trees Based on Statistical AnalysisMoonseong Kim, Young-Cheol Bang, Hyunseung Choo. 1090-1099 [doi]
- The Gateways Location and Topology Assignment Problem in Hierarchical Wide Area Networks: Algorithms and Computational ResultsPrzemyslaw Ryba, Andrzej Kasprzak. 1100-1109 [doi]
- Developing an Intelligent Supplier Chain System Collaborating with Customer Relationship ManagementGye Hang Hong, Sung Ho Ha. 1110-1118 [doi]
- The Three-Criteria Servers Replication and Topology Assignment Problem in Wide Area NetworksMarcin Markowski, Andrzej Kasprzak. 1119-1128 [doi]
- An Efficient Multicast Tree with Delay and Delay Variation ConstraintsMoonseong Kim, Young-Cheol Bang, Jong S. Yang, Hyunseung Choo. 1129-1136 [doi]
- Algorithms on Extended (::::delta::::, ::::gamma::::)-MatchingInbok Lee, Raphaël Clifford, Sung-Ryul Kim. 1137-1142 [doi]
- SOM and Neural Gas as Graduated Nonconvexity AlgorithmsAna Isabel González, Alicia D Anjou, M. Teresa García-Sebastian, Manuel Graña. 1143-1152 [doi]
- Analysis of Multi-domain Complex Simulation StudiesJames R. Gattiker, Earl Lawrence, David Higdon. 1153-1162 [doi]
- A Fast Method for Detecting Moving Vehicles Using Plane Constraint of Geometric InvarianceDong Joong Kang, Jong-Eun Ha, Tae-Jung Lho. 1163-1171 [doi]
- Robust Fault Matched Optical Flow Detection Using 2D HistogramJaechoon Chon, Hyongsuk Kim. 1172-1179 [doi]
- Iris Recognition: Localization, Segmentation and Feature Extraction Based on Gabor TransformMohammadreza Noruzi, Mansour Vafadoost, Mohammad Shahram Moin. 1180-1189 [doi]
- Optimal Edge Detection Using Perfect Sharpening of Ramp EdgesEun-Mi Kim, Cherl Soo Pahk, Jong Gu Lee. 1190-1199 [doi]
- Eye Tracking Using Neural Network and Mean-ShiftEun Yi Kim, Sin Kuk Kang. 1200-1209 [doi]
- The Optimal Feature Extraction Procedure for Statistical Pattern RecognitionMarek Kurzynski, Edward Puchala. 1210-1215 [doi]
- A New Approach for Human Identification Using Gait RecognitionMurat Ekinci. 1216-1225 [doi]