Abstract is missing.
- Performance of routing protocols for VANETs: a realistic analysis formatBruno V. Coutinho, Emílio C. G. Wille, Hermes Irineu Del Monego. 1 [doi]
- Cluster based emergency message dissemination scheme for vehicular ad hoc networksDongxu Jin, Fei Shi, JooSeok Song. 2 [doi]
- Contact-based routing in DTNsSujata Pal, Sudip Misra. 3 [doi]
- Particle filter through Kullback-Leibler distance resampling with adjusted variance and gradient data for wireless biomedical sensor networksNga Ly Tu, Thuong Le-Tien, Phuong Vo-Thi-Luu, Linh Mai. 4 [doi]
- Password security enhancement method by flick input with considering the floor shakeNozomi Takeuchi, Ryuya Uda. 5 [doi]
- ReSet: a protocol for private matchingMahmood Ahmad, Byeong Ho Kang, Sungyoung Lee. 6 [doi]
- Optimized self-healing framework for software defined networksPankaj Thorat, S. M. Raza, Dung T. Nguyen, Giyeol Im, Hyunseung Choo, Dongsoo S. Kim. 7 [doi]
- RFID-enabled supply chain detection using clustering algorithmsTeh FarahinAzahar, Manmeet Mahinderjit Singh, Rohail Hassan. 8 [doi]
- Lossless graph summarization using dense subgraphs discoveryKifayat-Ullah Khan, Waqas Nawaz, Young-Koo Lee. 9 [doi]
- A distributed multi-coloring algorithm for coexistence mitigation in WBANsJieun Lee, BeomSeok Kim, Jinsung Cho. 10 [doi]
- An iterative sort based resource scheduling for long distance airborne tactical communication in hub networkDong-Hun Lee, Kyung-Hoon Lee, Hyung-Jin Choi. 11 [doi]
- Operation strategy for energy harvesting wireless sensor networksVladimir V. Shakhov, Denis A. Migov, Alexey S. Rodionov. 12 [doi]
- Restructuring binomial trees for delay-aware and energy-efficient data aggregation in wireless sensor networksHyun Lee, Ho-Jin Hwang, Thang Le Duc, Min Han Shon, Hyunseung Choo, Dongsoo S. Kim. 13 [doi]
- Application of principal component analysis (PCA) in taxonomy research to derive plant functional types for use in dynamics modelsYasmin Yahya, Roslan Ismail. 14 [doi]
- Impact minimization of requirements change in software project through requirements classificationZahoor Ahmad, Musarrat Hussain, Abdur Rehman, Usman Qamar, Muhammad Afzal. 15 [doi]
- A goal-based framework on contextual requirements modelling for agent-mediated continual quality improvement (aCQI) in curriculum designShahrinaz Ismail, Mohd Sharifuddin Ahmad. 16 [doi]
- The study of gamification application architecture for programming language courseFiras Layth Khaleel, Noraidah Sahari Ashaari, Tengku Siti Meriam, Tengku Wook, Amirah Ismail. 17 [doi]
- Delay bounded spray and wait in delay tolerant networksAli Abbas, Chung-Jae Lee, Ki-Il Kim. 18 [doi]
- Performance analysis with dynamic beam control using millimeter-wave band on 5G mobile communicationsJung Wan Shin, Jun Suk Kim, Syed Tariq Shah, Jungsook Bae, Min Young Chung. 19 [doi]
- KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud servicesWilliam Aiken, Jungwoo Ryoo, Hyoungshick Kim. 20 [doi]
- The problem of integrity in RBAC-based policies within relational databases: synthesis and problem studyFaouzi Jaïdi, Faten Labbene-Ayachi. 21 [doi]
- Live consolidation for data centers in cloud environmentChuan Pham, Nguyen H. Tran, Cuong T. Do, Choong Seon Hong. 22 [doi]
- Cloud-based real-time location tracking and messaging system: a child-care case studyCong-Thinh Huynh, Huu-Quoc Nguyen, Xuan-Qui Pham, Tien Dung Nguyen, Eui-nam Huh. 23 [doi]
- Constructing a semantic wiki for living cultural heritage: case study of Korean tea cultureHayun Kim, Juhee Suh, Jaeyeon Ahn, Jungwha Kim. 24 [doi]
- Information credibility assessment of Islamic and Quranic information on the webRita Zaharah Wan-Chik. 25 [doi]
- Wayang fighters: preserving the art of wayang kulit (shadow puppets) through game applicationDahlan Bin Abdul Ghani. 26 [doi]
- Learning application for Malaysian sign language: content design, user interface and usabilityShamsul Anuar Mokhtar, Siti Mashitah Shamsul Anuar. 27 [doi]
- The interactive technological devices: play or learn?Myzan Binti Noor. 28 [doi]
- Automatic number plate recognition on electronic toll collection systems for Vietnamese conditionsTung Duy Ta, Duc-Anh Le, Mai Thi Le, Toan Van Tran, Tuan Trong Do, Van-Duc Nguyen, Chien Van Trinh, Byeungwoo Jeon. 29 [doi]
- Effects of text input system on learner's memory: handwriting versus typing on tablet PCSeyoung Park, Donghee Shin. 30 [doi]
- Investigation of fingertip contact area and shape for precise target selection on multi-touch screenAhsanullah, Suziah Sulaiman, Ahmad Kamil Mahmood, Muzafar Khan. 31 [doi]
- The usage of online assessment towards self-efficacy readiness in learningFarahwahida Mohd, Ezri Hielmi Che Daud, Ibrahim Elzibair. 32 [doi]
- A proposal of preventive measure of pursuit using a browser fingerprintShingo Yokoyama, Ryuya Uda. 33 [doi]
- New filter techniques to improve the accuracy of available bandwidth measurementDung T. Tran, Anh N. Nguyen. 34 [doi]
- Software defined networks based 5G backhaul architectureJosé Costa-Requena, Vicent Ferrer Guasch, Jesus Llorente Santos. 35 [doi]
- Throughput improvement method exploiting capture effect in densely placed WLANsKenji Takahashi, Hiroyasu Obata, Tutomu Murase, Kenji Ishida. 36 [doi]
- Reducing the TCP ACK packet backlog at the WLAN access pointAi Hayakawa, Saneyasu Yamaguchi, Masato Oguchi. 37 [doi]
- HTK analysis of text-based CAPTCHA using phonemic restoration effect and similar pronunciation with an Asian accentMisako Goto, Toru Shirato, Ryuya Uda. 38 [doi]
- User-centered design of a context-aware nurse assistant (CANA) at Finnish elderly housesMitra Dirin, Amir Dirin, Teemu Henrikki Laine. 39 [doi]
- Exploiting synonymy to measure semantic similarity of sentencesYouhyun Shin, YeonChan Ahn, Hyuntak Kim, Sang-goo Lee. 40 [doi]
- Application of location-based sentiment analysis using Twitter for identifying trends towards Indian general elections 2014Omaima Almatrafi, Suhem Parack, Bravim Chavan. 41 [doi]
- Speeding up of genetic algorithm for network topology optimization with use of cumulative updating of network reliabilityKseniya A. Nechunaeva, Denis A. Migov. 42 [doi]
- Enhanced centroid localization of wireless sensor nodes using linear and neighbor weighting mechanismsG. A. Lusilao-Zodi, Gerhard P. Hancke, Gerhard P. Hancke, Antoine B. Bagula. 43 [doi]
- Modeling grouped failures in network reliability analysisStepan Khapugin, Alexey S. Rodionov. 44 [doi]
- Performance analysis of small-cell base station with cellular and WiFi RATsYoung Min Kwon, Syed Tariq Shah, Min Young Chung, Jaesheung Shin, Aesoon Park. 45 [doi]
- Software defined optical switching for cloud computing transport systemsTaras Maksymyuk, Stepan Dumych, Olena Krasko, Minho Jo. 46 [doi]
- Cooperative caching for adaptive bit rate streaming in content delivery networksPhuong Luu Vo, Tuan Anh Le, Choong Seon Hong, Seung-Il Moon, Sungwon Lee, Nga Ly Tu. 47 [doi]
- A novel watermarking scheme for image authentication in social networksThien Huynh-The, Oresti Banos, Sungyoung Lee, Yongik Yoon 0001, Thuong Le-Tien. 48 [doi]
- Correlated subgraph search for multiple query graphs in graph streamsKisung Park, Yongkoo Han, Tae Ho Hur, Young-Koo Lee. 49 [doi]
- A new hybrid algorithm for software fault localizationJeongho Kim, Jonghee Park, Eunseok Lee. 50 [doi]
- Implementation of high speed processor for computing convolution sum for DSP applicationsP. Saha, D. Kumar, A. Sharma. 51 [doi]
- Integer division technique for signal processing applicationsD. Kumar, A. Sharma, P. Saha. 52 [doi]
- Minimizing consistency-control overhead with rollback-recovery for storage class memoryHyunku Lee, Junghoon Kim, Donghyun Kang, Young Ik Eom. 53 [doi]
- AppA: assistive patient monitoring cloud platform for active healthcare applicationsVenki Balasubramanian, Andrew Stranieri, Ranjit Kaur. 54 [doi]
- A stakeholder-oriented assessment index for cloud security auditingSyed Rizvi, Jungwoo Ryoo, John Kissell, Bill Aiken. 55 [doi]
- A highly available distributed self-scheduler for exascale computingAtsuko Takefusa, Hidemoto Nakada, Tsutomu Ikegami, Yoshio Tanaka. 56 [doi]
- Power-efficient and high-performance block I/O framework for mobile virtualization systemsKihong Lee, Dongwoo Lee, Young Ik Eom. 57 [doi]
- A new approach for approximate text search using genomic short-read mapping modelSung-Hwan Kim, Hwan-Gue Cho. 58 [doi]
- A method for finding similes to support final selection from search resultsTaketoshi Ushiama, Noboru Matsuo. 59 [doi]
- A method for recommending the latest news articles via MinHash and LSHWon-Seok Hwang, Jung Park, Sang-Wook Kim. 60 [doi]
- Individualizing user profile from viewing logs of several people for TV program recommendationKoichi Iguchi, Yoshinori Hijikata, Shogo Nishida. 61 [doi]
- Visual saliency detection via hypergraph based re-ranking using background priorsKyung-Wook Park, Dong-Ho Lee. 62 [doi]
- Discriminating between metal and near-metal pixels in X-ray CT imagesHanjae Park, Seho Bae, Seongbeak Yoon, Lei Li, Jixuan Liu, Juneho Yi. 63 [doi]
- A new visualization method for pairwise time-series data with random walk plotSang Min Lee, Jinkwan Park, Dae-Geon Kwon, Bokuk Park, Hwan-Gue Cho, Do-Hoon Lee. 64 [doi]
- Optimizing on real-time fluid 3D effect in mobile environmentJue-min Lu, Jin-Chun Piao, Shin-Dug Kim. 65 [doi]
- Salient object detection by combining multiple color clusteringKang Han Oh, Soo-Hyung Kim, Young-Chul Kim. 66 [doi]
- Tensor voting, hough transform and SVM integrated in chess playing robotTam Nguyen, Vo Quang Nhat, Youngchul Kim, Gueesang Lee. 67 [doi]
- Saliency detection by tensor voting based Gaussian modelingHuynh Trung Manh, Jungyeon Yeo, Gueesang Lee. 68 [doi]
- Text detection in scene images based on feature detection and tensor votingMinh Hieu Nguyen, HyunSu Choi, Gueesang Lee. 69 [doi]
- Unsupervised 3D human pose recognition from a single depth human silhouette using a geodesic map and kinematic body modelHyun Jae Jeon, Sang Beom Nam, Sung Un Park, Jun Hyuk Park, ChangKyoo Yoo, Jeong Tai Kim, Tae-Seong Kim. 70 [doi]
- Combining eye fixation and context-directed saliency for attentive object segmentationYubu Lee, Kangwoo Lee. 71 [doi]
- KARE: a hybrid reasoning approach for promoting active lifestyleRahman Ali, Muhammad Hameed Siddiqi, Byeong Ho Kang, Sungyoung Lee. 72 [doi]
- A proposal of storage power control method with data placement in an environment using many HDDsNaho Iimura, Norifumi Nishikawa, Miyuki Nakano, Masato Oguchi. 73 [doi]
- Illumination invariant color segmentation method based on cluster center tree for traffic sign detectionByeongdae Woo, Youngjung Uh, Kwangyong Lim, Yeongwoo Choi, Hyeran Byun. 74 [doi]
- An adaptive evidence structure for Bayesian recognition of 3D objectsAhmed M. Naguib, Sukhan Lee. 75 [doi]
- Formulation and verification of the body of knowledge of new discipline using WikiBOKTaro Yabuki, Takeshi Morita 0001, Yoshifumi Masunaga. 76 [doi]
- Video search in video sharing site based on public video listsYuki Nishi, Saneyasu Yamaguchi, Aki Kobayashi. 77 [doi]
- Hybrid page segmentation using multilevel homogeneity structureTuan-Anh Tran, In Seop Na, Soo-Hyung Kim. 78 [doi]
- A study of open-source data mining tools for forecastingNurdatillah Hasim, Norhaidah Abu Haris. 79 [doi]
- Incremental iteration method for fast PageRank computationKyung Soo Kim, Yong Suk Choi. 80 [doi]
- Efficient batch processing of proximity queries with MapReduceGiWoong Nam, Dongeun Kim, JongHyeok Lee, Hee Yong Youn, Ung-Mo Kim. 81 [doi]
- Mining social media data: discovering contradictedness quantitiesEiad Yafi, M. Zuhairi. 82 [doi]
- A proposal of smart means to retrieve impressively-referred document-pageToyohide Watanabe. 83 [doi]
- Development of preservation format and archiving tool for the long-term preservation of the databaseSeung-Jun Cha, Yun Jeong Choi, Kyu-Chul Lee. 84 [doi]
- Comparison of ordinary least square and mixed-effect regression models for estimation of tree diameter increment: a case study for dipterocarpacea in Siem Reap, CambodiaSuriyati Harun, Yasmin Yahya, Nurashikin Saaludin, Wan Suriyani Che Wan Ahmad. 85 [doi]
- Concept, design and implementation of sensing as a service frameworkRischan Mafrur, I. Gde Dharma Nugraha, Deokjai Choi. 86 [doi]
- Training of interval type-2 fuzzy logic system using extreme learning machine for load forecastingSaima Hassan, Abbas Khosravi, Jafreezal Jaafar. 87 [doi]
- Using supervised learning to classify authentic and fake online reviewsSnehasish Banerjee, Alton Yeow-Kuan Chua, Jung-jae Kim. 88 [doi]
- Identifying genomic signatures of N-gram nucleotide sequences to classify the chromatin states of broad histone trackKyung Eun Lee, Hyun Seok Park. 89 [doi]
- Mining meaningful outlier using rough-negative association algorithm in heartdisease datasetAzmi Ahmad, Faizah Shaari, Awang L. Zalizah. 90 [doi]
- A novel approach of hidden Markov model for time series forecastingAzunda Zahari, Jafreezal Jaafar. 91 [doi]
- Mapping expansion of natural language entities to DBpedia's components for querying linked dataPhong Nguyen Tran, Dang Tuan Nguyen. 92 [doi]
- StdSort: efficient pre-processing for faster vector similarity join using standard deviationHyun Joon Kim, Sang-goo Lee. 93 [doi]
- An efficient offline grouping proof protocol using multiple types of tagsHyoungmin Ham, InHwan Kim, JooSeok Song. 94 [doi]
- Toward constructing a secure online examination systemAbdul Wahid, Yasushi Sengoku, Masahiro Mambo. 95 [doi]
- Domain specific commonsense relation extraction from bag of concepts metadataJiyi Li. 96 [doi]
- Task-oriented access model for secure data sharing over cloudMahmood Ahmad, Zeeshan Pervez, Sungyoung Lee, Byeong Ho Kang. 97 [doi]
- An efficient method for extracting subtrees against forest queryShafaet Ashraf, Sheikh Muhammad Sarwar, Md. Abeed Hassan, Saifuddin Md. Tareeq, Anna Fariha. 98 [doi]
- Feature extraction from covariance by using kernel method for classifying polysomnographys dataHong Quy Nguyen, Hyung Jeong Yang, Thao Nguyen Thieu. 99 [doi]
- Roofline measurement applicationKyu-Yean Lee, Seong Jin Cho, Seung Hyun Yoon, Jae Wook Jeon. 100 [doi]
- Adaptive mechanism for GA-NN to enhance prediction modelFaridah Sh Ismail, Nordin Abu Bakar. 101 [doi]
- An over-sampling technique with rejection for imbalanced class learningJaedong Lee, Noo-ri Kim, Jee-Hyong Lee. 102 [doi]
- Model-based reinforcement learning approach for planning in self-adaptive software systemHan Nguyen Ho, Eunseok Lee. 103 [doi]
- Evaluating the importance of personal information attributes using graph mining techniqueAke Osothongs, Vorapong Suppakitpaisan, Noboru Sonehara. 104 [doi]
- Group recommendations: approaches and evaluationIrfan Ali, Sang-Wook Kim. 105 [doi]
- Step counting on smartphones using advanced zero-crossing and linear regressionJungryul Seo, Yutsai Chiang, Teemu Henrikki Laine, Adil Mehmood Khan. 106 [doi]
- Neighbor-assisted data delivery to mobile sink in wireless sensor networksZeeshan Hameed Mir, Sajida Imran, Young-Bae Ko. 107 [doi]
- A novel message broadcasting strategy for reliable content retrieval in multi-hop wireless content centric networksDabin Kim, Young-Bae Ko. 108 [doi]