Abstract is missing.
- Message Transport Interface for Efficient Communication Between Agent Framework and Event ServiceSang Yong Park, Hee Yong Youn. 1-10 [doi]
- An Ontology-Based Context Model in a Smart HomeEunhoe Kim, Jaeyoung Choi. 11-20 [doi]
- Service Mobility Manager for OSGi FrameworkSeungkeun Lee, Intae Kim, Kiwook Rim, Jeonghyun Lee. 21-29 [doi]
- A Ubiquitous Workflow Service FrameworkJoohyun Han, Yongyun Cho, Eunhoe Kim, Jaeyoung Choi. 30-39 [doi]
- Self Organizing Sensor Networks Using Intelligent ClusteringKwangcheol Shin, Ajith Abraham, Sang-Yong Han. 40-49 [doi]
- Searching and Selecting Web Services Using Case Based ReasoningOlivia Graciela Fragoso Diaz, René Santaolaya Salgado, Ismael Solís Moreno, Guillermo Rodríguez-Ortiz. 50-57 [doi]
- Fuzzy Logic Based Propagation Limiting Method for Message Routing in Wireless Sensor NetworksSang Hoon Chi, Tae Ho Cho. 58-67 [doi]
- Content Delivery with Spatial Caching Scheme in Mobile Wireless NetworksBackhyun Kim, Iksoo Kim. 68-77 [doi]
- Higher Education Web Information System Usage Analysis with a Data WebhouseCarla Teixeira Lopes, Gabriel David. 78-87 [doi]
- A User Management System for Federated Databases Using Web ServicesFuyu Liu, Erdogan Dogdu. 88-97 [doi]
- A Dynamic Evaluation Framework for Mobile ApplicationsAnders Magnus Andersen, Torab Torabi. 98-107 [doi]
- SOAM: An Environment Adaptation Model for the Pervasive Semantic WebJuan Ignacio Vázquez, Diego López-de-Ipiña, Iñigo Sedano. 108-117 [doi]
- Implementing the MPEG-21 Adaptation Quality of Service in Dynamic EnvironmentsMarios C. Angelides, Anastasis A. Sofokleous, Christos Schizas. 118-127 [doi]
- A Middleware Architecture Determining Application Context Using Shared OntologyKugsang Jeong, Deokjai Choi, Soo-Hyung Kim, Gueesang Lee. 128-137 [doi]
- Context-Aware Regulation of Context-Aware Mobile Services in Pervasive Computing EnvironmentsEvi Syukur, Seng Wai Loke. 138-147 [doi]
- Designing and Implementing Physical Hypermedia ApplicationsCecilia Challiol, Gustavo Rossi, Silvia E. Gordillo, Valeria De Cristófolo. 148-157 [doi]
- Replicated Ubiquitous NetsFernando Rosa Velardo, David de Frutos-Escrig, Olga Marroquín Alonso. 158-168 [doi]
- Design of a Shared Ontology Used for Translating Negotiation PrimitivesJoaquín Pérez, Maricela Bravo, Rodolfo A. Pazos, Gerardo Reyes Salgado, Juan Frausto Solís, Víctor Jesús Sosa Sosa, Máximo López. 169-178 [doi]
- A Web Page Ranking Method by Analyzing Hyperlink Structure and K-ElementsJun Lai, Ben Soh, Chai Fei. 179-186 [doi]
- Efficient Scheduling by Incorporating Bin Packing with Limited and Weighted Round Robin for BluetoothEung Ju Lee, Hee Yong Youn. 187-196 [doi]
- ECA Rule Component for Timely Collaboration of Web-Based Distributed Business SystemsDongwoo Lee, SeongHoon Lee, Yongjin Lee. 197-206 [doi]
- Dynamic Approach for Integrating Web Data WarehousesD. Xuan Le, J. Wenny Rahayu, Eric Pardede. 207-216 [doi]
- Location Aware Business Process DeploymentSaqib Ali, Torab Torabi, Hassan Ali. 217-225 [doi]
- A Framework for Rapid Development of RFID ApplicationsYoungbong Kim, Mikyeong Moon, Keunhyuk Yeom. 226-235 [doi]
- A Flexible DRM System Considering Ubiquitous EnvironmentJong Hyuk Park, Sangjin Lee, Byoung-Soo Koh. 236-244 [doi]
- User Centric Intelligent IPMPS in Ubi-HomeJong Hyuk Park, Jungsuk Song, Sangjin Lee, Byoung-Soo Koh, In-Hwa Hong. 245-254 [doi]
- The Design and Development of a Secure Keystroke System for u BusinessHangbae Chang, Kyung-kyu Kim, Hosin Lee, Jungduk Kim. 255-261 [doi]
- Linkability of a Blind Signature Scheme and Its Improved SchemeJianhong Zhang, Tao Wei, Jianyu Zhang, Wei Zou. 262-270 [doi]
- A Noble Structural Model for e-Learning Services in Ubiquitous EnvironmentMinseong Ju, Seoksoo Kim, Yeong-Deok Kim, Sukhoon Kang. 271-278 [doi]
- Backward Channel Protection Method for RFID Security Schemes Based on Tree-Walking AlgorithmsWonjoon Choi, Byeong-hee Roh. 279-287 [doi]
- Design of the Configurable Clothes Using Mobile Actuator-Sensor NetworkBo-Hee Lee, Kyu-Tae Seo, Jung-Shik Kong, Jin-Geol Kim. 288-295 [doi]
- Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification ProcedureJia Zhai, Chang Mok Park, Gi-Nam Wang. 296-305 [doi]
- Counting-Based Distance Estimations and Localizations in Wireless Sensor NetworksOh-Heum Kwon, Ha-Joo Song. 306-315 [doi]
- Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID SystemJeong Su Park, Su-Mi Lee, Eun Young Choi, Dong-Hoon Lee. 316-325 [doi]
- Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute CertificationDeok-Gyu Lee, Seo-Il Kang, Dae-Hee Seo, Im-Yeong Lee. 326-335 [doi]
- Improving the CGA-OMIPv6 Protocol for Low-Power Mobile NodesIlsun You. 336-343 [doi]
- Tracking Illegal System Access in a Ubiquitous Environment - Proposal for ATS, a Traceback System Using STOPGwanghoon Kim, Soyeon Hwang, Deokgyu Lee. 344-351 [doi]
- Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based ApproachBo Zhou, Qi Shi, Madjid Merabti. 352-359 [doi]
- A Security Model for Home Networks with Authority DelegationJin-Bum Hwang, Jong-Wook Han. 360-369 [doi]
- An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast EncryptionDeok-Gyu Lee, Jang-Su Park, Im-Yeong Lee, Yong-Seok Park, Jung-Chul Ahn. 370-379 [doi]
- Distributed Certificate Authority Under the GRID-Location Aided Routing ProtocolJiHyung Lim, DaeHun Nyang, Jeonil Kang, KyungHee Lee, Hyotaek Lim. 380-387 [doi]
- An Efficient Hierarchical Group Key Management Protocol for a Ubiquitous Computing EnvironmentSangjin Kim, Taewook Ahn, Heekuck Oh. 388-395 [doi]
- Efficient User Authentication and Key Agreement in Ubiquitous ComputingWen-Shenq Juang. 396-405 [doi]
- Single Sign-On and Key Establishment for Ubiquitous Smart EnvironmentsYuen-Yan Chan, Sebastian Fleissner, Joseph K. Liu, Jin Li. 406-415 [doi]
- A Light Weight Authentication Protocol for Digital Home NetworksIlsun You, Eun-Sun Jung. 416-423 [doi]
- Smart Home Microcontroller: Telephone InterfacingChee-Seng Leong, Bok-Min Goi. 424-431 [doi]
- SPAD: A Session Pattern Anomaly Detector for Pre-alerting Intrusions in Home NetworkSoo-Jin Park, Young-Shin Park, Yong-Rak Choi, Sukhoon Kang. 432-439 [doi]
- Home Gateway with Automated Real-Time Intrusion Detection for Secure Home NetworksHayoung Oh, Jiyoung Lim, Kijoon Chae, Jungchan Nah. 440-447 [doi]
- The Performance Analysis of UWB System for the HD Multimedia Communication in a Home NetworkChul-Yong Uhm, Su Nam Kim, Kyeong-Hoon Jung, Dong Wook Kang, Ki-Doo Kim. 448-455 [doi]
- Extraction of Implicit Context Information in Ubiquitous Computing EnvironmentsJuryon Paik, Hee Yong Youn, Ung-Mo Kim. 456-465 [doi]
- Convergence of Context-Awareness and Augmented Reality for Ubiquitous Services and Immersive InteractionsJae Yeol Lee, Gue Won Rhee, Hyun Kim, Kang-Woo Lee, Young-Ho Suh, Kwangsoo Kim. 466-474 [doi]
- An Adaptive Fault Tolerance System for Ubiquitous Computing Environments: AFTSEung Nam Ko. 475-482 [doi]
- Design and Implementation of Middleware for Context-Aware Service Discovery in Ubiquitous Computing EnvironmentsKyu Lee, Hyung-Jun Kim, Ho-Jin Shin, Dong Ryeol Shin. 483-490 [doi]
- A Dynamic Channel Allocation Mechanism in Cellular Mobile Networks for Ubiquitous Environments Based on Time ConstraintsSeongHoon Lee, Dongwoo Lee, Donghee Shim, Dongyoung Cho, Wankwon Lee. 491-498 [doi]
- Performance Analysis of Task Schedulers in Operating Systems for Wireless Sensor NetworksSangho Yi, Hong Min, Junyoung Heo, Boncheol Gu, Yookun Cho, Jiman Hong, Jin Won Kim, Kwangyong Lee, Seungmin Park. 499-508 [doi]
- Wireless Sensor Networks: A Scalable Time SynchronizationKee-Young Shin, Jin Won Kim, Ilgon Park, Pyeong-Soo Mah. 509-518 [doi]
- A New Cluster Head Selection Scheme for Long Lifetime of Wireless Sensor NetworksHyung Su Lee, Kyung Tae Kim, Hee Yong Youn. 519-528 [doi]
- Two-Dimensional Priority Scheduling Scheme for Open Real-Time SystemsPengliu Tan, Hai Jin, Minghu Zhang. 529-538 [doi]
- An Enhanced Dynamic Voltage Scaling Scheme for Energy-Efficient Embedded Real-Time Control SystemsFeng Xia, Youxian Sun. 539-548 [doi]
- Adaptive Load Balancing Mechanism for Server ClusterGeunyoung Park, Boncheol Gu, Junyoung Heo, Sangho Yi, Jungkyu Han, Jaemin Park, Hong Min, Xuefeng Piao, Yookun Cho, Chang-Won Park, Ha Joong Chung, Bongkyu Lee, Sangjun Lee. 549-557 [doi]
- Design and Performance Analysis of a Message Scheduling Scheme for WLAN-Based Cluster ComputingJunghoon Lee, Mikyung Kang, Eui-young Kang, Gyung-Leen Park, Hanil Kim, Cheolmin Kim, Seongbaeg Kim, Jiman Hong. 558-566 [doi]
- A Method for Efficient Malicious Code Detection Based on Conceptual SimilaritySungSuk Kim, Chang Choi, Junho Choi, PanKoo Kim, Hanil Kim. 567-576 [doi]
- A Minimized Test Pattern Generation Method for Ground Bounce Effect and Delay Fault DetectionMoonJoon Kim, JeongMin Lee, WonGi Hong, Hoon Chang. 577-583 [doi]
- Efficient Exponentiation in ::::GF::::(::::p:::::::::::m:::::::) Using the Frobenius MapMun-Kyu Lee, Howon Kim, Dowon Hong, Kyoil Chung. 584-593 [doi]
- A Dual-Channel MAC Protocol Using Directional Antennas in Location Aware Ad Hoc NetworksDoHyung Han, JeongWoo Jwa, Hanil Kim. 594-602 [doi]
- A Power-Efficient Design Employing an Extreme Condition Detector for Embedded SystemsHyukjun Oh, Heejune Ahn, Jiman Hong. 603-611 [doi]
- An Efficient Delay Metric on RC Interconnects Under Saturated Ramp InputsKi-Young Kim, Seung-Yong Kim, Seok-Yoon Kim. 612-621 [doi]
- Low Power Microprocessor Design for Embedded SystemsSeong-Won Lee, Neungsoo Park, Jean-Luc Gaudiot. 622-630 [doi]
- History Length Adjustable ::::gshare:::: Predictor for High-Performance Embedded ProcessorJong Wook Kwak, Seong Tae Jhang, Chu Shik Jhon. 631-638 [doi]
- Security Engineering Methodology Based on Problem Solving TheorySangkyun Kim, Hong Joo Lee. 639-648 [doi]
- Design and Implementation of an Ontology Algorithm for Web Documents ClassificationGuiyi Wei, Jun Yu, Yun Ling, Jun Liu. 649-658 [doi]
- Automatic Test Approach of Web Application for Security (AutoInspect)Kyung Cheol Choi, Gun Ho Lee. 659-668 [doi]
- A Scenario-Based User-Oriented Integrated Architecture for Supporting Interoperability Among Heterogeneous Home Network MiddlewaresMin Chan Kim, Sung-Jo Kim. 669-678 [doi]
- Session Key Agreement Protocol for End-to-End Security in MANETJeong-Mi Lim, Chang-Seop Park. 679-686 [doi]
- Process-Oriented DFM System for Ubiquitous DevicesYongsik Kim, Taesoo Lim, Dongsoo Kim, Cheol Jung, Honggee Jin. 687-696 [doi]
- A Study on the Application of BPM Systems for Implementation of RosettaNet Based e-LogisticsYong Gu Ji, Chiwoo Park, Minsoo Kim. 697-706 [doi]
- Information Security Management System for SMB in Ubiquitous ComputingHangbae Chang, Jungduk Kim, Sungjun Lim. 707-715 [doi]
- A Study on the Development of Usability Evaluation Framework (Focusing on Digital TV)Hong Joo Lee, Choon Seong Leem, Sangkyun Kim. 716-725 [doi]
- Designing Aspectual Architecture Views in Aspect-Oriented Software DevelopmentRogelio N. Limón Cordero, Isidro Ramos Salavert, José Torres Jiménez. 726-735 [doi]
- Process and Techniques to Generate Components in MDA/CB-PIM for AutomationHyun Gi Min, Soo Dong Kim. 736-745 [doi]
- An Ontology Definition Framework for Model Driven DevelopmentYucong Duan, Xiaolan Fu, Qingwu Hu, Yuqing Gu. 746-755 [doi]
- An AHP-Based Evaluation Model for Service CompositionXiaoqin Xie, Kaiyun Chen. 756-766 [doi]
- Construction of Quality Test and Certification System for Package SoftwareHa-Yong Lee, Hae Sool Yang, Suk-hyung Hwang. 767-776 [doi]
- Design of an On-Line Intrusion Forecast System with a Weather Forecasting ModelYoon Jung Chung, In-Jung Kim, Chulsoo Lee, Eul-Gyu Im, Dongho Won. 777-786 [doi]
- Goal Programming Approach to Compose the Web Service Quality of ServiceDaerae Cho, Changmin Kim, Moonwon Choo, Suk-Ho Kang, Wookey Lee. 787-797 [doi]
- Healthcare Home Service System Based on Distributed Object Group FrameworkChang-Sun Shin, Chung-Sub Lee, Su-Chong Joo. 798-807 [doi]
- A Learning Attitude Evaluation System for Learning Concentration on Distance EducationByungdo Choi, Chonggun Kim. 808-817 [doi]
- A Calculation Method for Direction Based Handover Rate in Cell Based Mobile NetworksMary Wu, Chonggun Kim. 818-827 [doi]
- The Classification of the Software Quality by Employing the Tolerence ClassWan-Kyoo Choi, Sung Joo Lee, Il-Yong Chung, Yong-Geun Bae. 828-834 [doi]
- Components Searching System Using Component Identifiers and Request SpecificsJea-Youn Park, Gui-Jung Kim, Young-Jae Song. 835-843 [doi]
- Software Architecture Generation on UMLHaeng-Kon Kim. 844-852 [doi]
- Distributed Programming Developing Tool Based on Distributed Object Group FrameworkChang-Won Jeong, Dong-Seok Kim, Geon-Yeob Lee, Su-Chong Joo. 853-863 [doi]
- A Study on Automatic Code Generation Tool from Design Patterns Based on the XMIYoung-Jun Seo, Young-Jae Song. 864-872 [doi]
- Design of Opportunity Tree for Organization s Process Strategy Decision-Making Based on SPICE Assessment ExperienceKi-Won Song, Haeng-Kon Kim, Kyung-Whan Lee. 873-882 [doi]
- SUALPPA Scheme: Enhanced Solution for User Authentication in the GSM SystemMi-Og Park, Dea-Woo Park. 883-892 [doi]
- Design of Mobile Video Player Based on the WIPI PlatformHye-Min Noh, Sa-Kyun Jeong, Cheol-Jung Yoo, Ok-Bae Chang, Eun-Mi Kim, Jong-Ryeol Choi. 893-898 [doi]
- Discovering Patterns Based on Fuzzy Logic TheoryBobby D. Gerardo, Jaewan Lee, Su-Chong Joo. 899-908 [doi]
- Metrics Design for Software Process Assessment Based on ISO/IEC 15504Sun-Myung Hwang, Hee-Gyun Yeom. 909-916 [doi]
- A Quantitative Evaluation Model Using the ISO/IEC 9126 Quality Model in the Component Based Development ProcessKilsup Lee, Sung-Jong Lee. 917-926 [doi]
- Component Specification Model for the Web ServicesHaeng-Kon Kim, Eun-Ju Park. 927-936 [doi]
- A Data-Driven Approach to Constructing an Ontological Concept Hierarchy Based on the Formal Concept AnalysisSuk-hyung Hwang, Hong-Gee Kim, Myeng Ki Kim, Sung Hee Choi, Hae Sool Yang. 937-946 [doi]
- Web-Document Filtering Using Concept GraphMalrey Lee, Eun-Kwan Kang, Thomas M. Gatton. 947-954 [doi]
- Development of Integrated DAO Pattern Applying Iterator PatternSeong-Man Choi, Cheol-Jung Yoo, Ok-Bae Chang. 955-965 [doi]
- A Coupling Metric Applying the Characteristics of ComponentsMisook Choi, Seojeong Lee. 966-975 [doi]
- Software Process Improvement EnvironmentHaeng-Kon Kim, Hae Sool Yang. 976-984 [doi]
- A Design Technique of CBD Meta-model Based on Graph TheoryEun Sook Cho, So Yeon Min, Chul Jin Kim. 985-993 [doi]
- Description Technique for Component Composition Focusing on Black-Box ViewJ. H. Lee, Dan Lee. 994-1002 [doi]
- XML Security Model for Secure Information Exchange in E-CommerceKwang Moon Cho. 1003-1011 [doi]
- Design and Implementation of B2B::::i:::: Collaboration Workflow Tool Based on J2EEChang-Mog Lee. 1012-1021 [doi]
- Traffic-Predicting A Routing Algorithm Using Time Series ModelsSangjoon Jung, Mary Wu, Youngsuk Jung, Chonggun Kim. 1022-1031 [doi]
- A Study on Software Architecture EvaluationGu-Beom Jeong, Guk-Boh Kim. 1032-1041 [doi]
- RFID-Based ALE Application Framework Using Context-Based Security ServiceJungkyu Kwon, Mokdong Chung. 1042-1051 [doi]
- A Study on the Standard of Software Quality TestingHye-Jung Jung, Won-Tae Jung, Hae Sool Yang. 1052-1059 [doi]
- Scene Change Detection Using the Weighted Chi-Test and Automatic Threshold Decision AlgorithmKyong-Cheol Ko, Oh-Hyung Kang, Chang Woo Lee, Ki-Hong Park, Yang-Won Rhee. 1060-1069 [doi]
- Design Opportunity Tree for Schedule Management and Evaluation by COQUALMOEun-ser Lee, Sang Ho Lee. 1070-1080 [doi]
- CTL Model Checking for Boolean ProgramTaehoon Lee, Gihwon Kwon, Hyuksoo Han. 1081-1089 [doi]
- Grid Service Implementation of Aerosol Optical Thickness Retrieval over Land from MODISYincui Hu, Yong Xue, Guoyin Cai, Chaolin Wu, Jianping Guo, Ying Luo, Wei Wan, Lei Zheng. 1090-1097 [doi]
- Revocation Scheme for PMI Based Upon the Tracing of Certificates ChainsM. Hinarejos, Jordi Forné. 1098-1106 [doi]
- Nailfold Capillary Microscopy High-Resolution Image Analysis Framework for Connective Tissue Disease Diagnosis Using Grid Computing TechnologyKuan-Ching Li, Chiou-Nan Chen, Chia-Hsien Wen, Ching-Wen Yang, Joung-Liang Lan. 1107-1115 [doi]
- EFH: An Edge-Based Fast Handover for Mobile IPv6 in IEEE 802.11b WLANSangdong Jang, Wu Woon Kim. 1116-1125 [doi]
- An Extendible Hashing Based Recovery Method in a Shared-Nothing Spatial Database ClusterYong-Il Jang, Ho Seok Kim, Soon-Young Park, Jae-dong Lee, Hae-Young Bae. 1126-1135 [doi]
- A Quantitative Justification to Partial Replication of Web ContentsJosé Daniel García, Jesús Carretero, Félix García, Javier Fernández, Alejandro Calderón, David E. Singh. 1136-1145 [doi]
- Content Distribution Strategy Using Web-Cached Multicast TechniqueBackhyun Kim, Iksoo Kim. 1146-1155 [doi]
- Load Distribution Strategies in Cluster-Based Transcoding Servers for Mobile ClientsDongmahn Seo, Joahyoung Lee, Yoon Kim, Changyeol Choi, Hwangkyu Choi, Inbum Jung. 1156-1165 [doi]
- Safety of Recovery Protocol Preserving MW Session Guarantee in Mobile SystemsJerzy Brzezinski, Anna Kobusinska. 1166-1174 [doi]