Abstract is missing.
- A Secure Service Framework for Handling Security Critical Data on the Public CloudGi Hwan Cho, Seung-Ah Lee. 3-12 [doi]
- The Understanding of Building Trust Model on Smartphone Application: Focusing on Users' MotivationHun Choi, Yoo-Jung Choi, Ki-Mun Kim. 13-20 [doi]
- Towards Understanding Deterrence: Information Security Managers' PerspectiveSangseo Park, Anthonie B. Ruighaver, Sean B. Maynard, Atif Ahmad. 21-37 [doi]
- Design of Attribute-Based Access Control in Cloud Computing EnvironmentByungRae Cha, JaeHyun Seo, JongWon Kim 0001. 41-50 [doi]
- Realizing Security Requirements with Physical Properties: A Case Study on Paper VotingAndré van Cleeff, Trajce Dimkov, Wolter Pieters, Roel Wieringa. 51-67 [doi]
- Controlling Decryption of Personal Health Records in the CloudYi-Chang Hsu, Jing-Jang Hwang. 69-79 [doi]
- Access Control Mechanism for XML DocumentSun-Moon Jo, Kyung-Yong Chung. 81-90 [doi]
- A Collaborative Intrusion Detection System Framework for Cloud ComputingNguyen Doan Man, Eui-nam Huh. 91-109 [doi]
- Criteria for Comparing Cyberwarfare CapabilityHyung-Jun Seo, Yoon-Cheol Choy. 111-120 [doi]
- A RSSI-Based Approach for Localization of Wireless Sensor Network in IndoorHyochang Ahn, Yong-Hwan Lee, Han-Jin Cho, Sang-Burm Rhee, June-Hwan Lee. 123-127 [doi]
- Semantic Search and Retrieval System for Learning ObjectsM. Arshad Awan, A. Sattar, Cheong-Ghil Kim, Chung-Pyo Hong, Shin-Dug Kim. 129-143 [doi]
- Wear Leveling for PCM Using Hot Data IdentificationInhwan Choi, Dongkun Shin. 145-149 [doi]
- Monitoring and Feedback Tools for Realtime Workloads for Xen Virtual MachineByung Ki Kim, Jae-Hyeok Jang, Kyung Woo Hur, Jeong-Gun Lee, Young Woong Ko. 151-161 [doi]
- HARD: Host-Level Address Remapping Driver for Solid-State DiskYoung-Joon Jang, Dongkun Shin. 163-168 [doi]
- Ubiquitous Based Personalized Hypertension Monitoring SystemJong-Hun Kim, Sihoon Ahn, Jaeyoung Soh, Daesung Lee 0001, Kyung-Yong Chung. 169-177 [doi]
- Customized IPTV Content Recommendation Service Model Based on Personal PreferenceSi-Jung Kim, Do-Eun Cho, Bong-Han Kim. 179-189 [doi]
- A Study on the Touch Process of Android Smartphone on Froyo and GingerbreadYeong-Gyu Lim, Cheong-Ghil Kim, Shin-Dug Kim. 191-204 [doi]
- Case Study of QoS-Assured Convergence Service Overlay in Open Service Platform EnvironmentNam-Kyung Lee, Hyun-Woo Lee, Won Ryu. 205-216 [doi]
- Aspect Oriented Software Development Using Requirement EngineeringSeung-Hyung Lee, Young-Jae Song. 217-221 [doi]
- A Review of Accelerometer-Based Physical Activity MeasurementYao Meng, Hee-Cheol Kim. 223-237 [doi]
- A Group Data Synchronization Protocol in Mobile EnvironmentsJu-Geon Pak, Kee-Hyun Park. 239-251 [doi]
- Efficient Transmission Method for Mobile Data Synchronization Based on Data CharacteristicsKee-Hyun Park, Ju-Geon Pak. 253-263 [doi]
- A Dynamic Buffer Management of Hybrid Solid State Disk for Media ApplicationsIn-Pyo Cho, So-Hyang Ko, Hoon-Mo Yang, Cheong-Ghil Kim, Shin-Dug Kim. 267-279 [doi]
- An Efficient Live Stream Community Management Scheme for the MobileChung-Pyo Hong, Muhammad Arshad Awan, Cheong-Ghil Kim, Shin-Dug Kim. 281-293 [doi]
- Development of Real-Time Gesture Recognition System Using Visual InteractionSung Kwan Kang, Kyung-Yong Chung, Kee-Wook Rim, Jung-Hyun Lee. 295-306 [doi]
- Architecture of Image Encryption Hardware Using Two Dimensional Cellular AutomataAbdul Raouf Khan. 307-315 [doi]
- Simulation of 3D Information VisualizationGui-Jung Kim, Jung-Soo Han. 317-323 [doi]
- Group Based Vehicular Machine to Machine Communication Scheme in Cellular NetworksKyu Chul Kim, Chan Jung Park, Ronny Yongho Kim. 325-329 [doi]
- Development of Real-Time Location-Based Multimedia Style Slop Information Retrieval SystemSung-Ho Kim. 331-335 [doi]
- Augmented Reality-Based Role-Playing Contents for EducationSukhyun Lim, Hyung-Keun Jee, Jinyoung Youn, Junsuk Lee. 337-344 [doi]
- Vertex Propagation for Fast Ray-Casting of Digital Elevation ModelEun-Seok Lee, Jin-Hee Lee, Inwoo Jo, Byeong-Seok Shin. 345-356 [doi]
- A Study of a Network Capacity Planning by Analyzing Joint Probability of a Virtual OrganizationKyuHo Lee, Seongjin Ahn. 357-365 [doi]
- Image Registration for Sub-Pixel Using Pyramid Edge ImagesJae Young Lee, Kee-Baek Kim, Seok-Han Lee, Tae-eun Kim, Jong-Soo Choi. 367-371 [doi]
- Real-Time Camera Tracking Using Planar Object DetectionAhr-Hyun Lee, Seok-Han Lee, Jae Young Lee, Tae-eun Kim, Jong-Soo Choi. 373-378 [doi]
- Bidirectional Propagation Method for Analysis of Reflection on Radio NetworksReza Malekian, Abdul Hanan Abdullah. 379-388 [doi]
- Robust Estimation of Heights of Moving People Using a Single CameraSang Wook Park, Tae-eun Kim, Jong-Soo Choi. 389-405 [doi]
- Goal-Heuristic Analysis Method for an Adaptive Process MiningSu-Jin Baek, Jong-Won Ko, Gui-Jung Kim, Jung-Soo Han, Young-Jae Song. 409-418 [doi]
- Security Threat Modeling and Requirement Analysis Method Based on Goal-ScenarioSu-Jin Baek, Jung-Soo Han, Young-Jae Song. 419-423 [doi]
- An Effective Learning Method in Art Using Virtual Reality and OntologySang-Jin Cha, Gahee Kim, Chol-Hee Jang, GeunSik Jo. 425-434 [doi]
- Development of Pain Prescription Decision Systems for Nursing InterventionYoo Hyun, Ho-Il Jung, Kyung-Yong Chung. 435-444 [doi]
- Performance Sensibility Influence of Recommended Makeup StylesKyung-Yong Chung, Kee-Wook Rim, Jung-Hyun Lee. 445-454 [doi]
- Affective Social NetworkHyun-Jun Kim. 455-461 [doi]
- A Study on the Metadata Extraction and Repository Based on Web Service Meta BrokerSung-Ho Sim, Young-Jae Song. 463-467 [doi]
- Discovering Knowledge Flow in Social NetworkHyun-Jun Kim. 469-477 [doi]
- Model Optimization with Graph Transformation and PSO Algorithm for Model Transformation VerificationJong-Won Ko, Su-Jin Baek, Young-Jae Song. 479-487 [doi]
- Pattern Based Model Transformation Using Mapping Patterns for Model Transformation VerificationJong-Won Ko, Jung-Soo Han, Young-Jae Song. 489-493 [doi]
- Improved Performance of Emotion Extraction Through Banned WordsEunsoon You, Seung-Bo Park. 495-505 [doi]
- Potential Emotion Word in Movie DialogSeung-Bo Park, Eunsoon You, Jason J. Jung. 507-516 [doi]
- Story Modeling for Green Light Decision MakingSeung-Bo Park, Eunsoon You. 517-521 [doi]
- Reducing the Gap of Provided Services and Requires Services Based on Service ApproachHamid Mcheick, Mohamad Dbouk, Fady Dagher. 523-537 [doi]
- An Extended XML Compression Technique for XML Element RetrievalTanakorn Wichaiwong, Chuleerat Jaruskulchai. 539-554 [doi]
- Fuel Cell System Control Algorithm for Stable Operation of Residential Fuel Cell SystemSunhoe Kim. 557-560 [doi]
- Types of Fuel Cells and Applications for Electricity and Heat Co-GenerationSunhoe Kim. 561-565 [doi]
- Integrated Energy Management System Framework for the Distributed Smart Meters in Smart Grid EnvironmentYoon-Sik Yoo, Wan-Ki Park, Il-Woo Lee. 567-572 [doi]
- Malware Detection Techniques Using Artificial Immune SystemMohamed Ahmed Mohamed Ali, Mohd Aizaini Maarof. 575-587 [doi]
- A Survey on P2P Botnet DetectionKyoung-Soo Han, Eul-Gyu Im. 589-593 [doi]
- A Study on Instruction Substitution Analysis of Metamorphic MalwareKyoung-Soo Han, Kyoung-Yong Chung, Eul-Gyu Im. 595-599 [doi]
- An Analysis of Malware Attached in SpamEul-Gyu Im, Kyoung-Soo Han. 601-605 [doi]
- Detection Methods for Malware Variant Using API Call Related GraphsKyoung-Soo Han, In-Kyoung Kim, Eul-Gyu Im. 607-611 [doi]
- Malware Classification Methods Using API Sequence CharacteristicsKyoung-Soo Han, In-Kyoung Kim, Eul-Gyu Im. 613-626 [doi]
- Practical Firewall Policy Inspection Using Anomaly Detection and Its VisualizationUi-Hyong Kim, Jung-Min Kang, Jae Sung Lee, Hyong-Shik Kim. 629-639 [doi]