Abstract is missing.
- 3D Morphing Techniques for Fish Growth Process System Implementation Based on Environmental FactorsEungKon Kim, NamHoon Ryu, KyeongJin Ban, JungHyun Seo, Moon-Suk Jang. 3-8 [doi]
- A Comparative Study of Classification Methods in Financial Risk DetectionYi Peng, Gang Kou. 9-12 [doi]
- A Competitive-Perspective Evaluation Framework of Software FirmsByeong Ryul Lee, Seung-Hyun Lee, Choon Seong Leem. 13-20 [doi]
- A Data Dependency Relationship Directed Graph and Block Structures Based Abstract Geospatial Information Service Chain ModelZhipeng Gui, Huayi Wu, Zun Wang. 21-27 [doi]
- A Data Sanitization Method for Privacy Preserving Data Re-publicationJoo Chang Lee, Hyuk Jin Ko, Eun-Ju Lee, Won Gil Choi, Ung-Mo Kim. 28-31 [doi]
- A Database for the Analysis of Program Change PatternsSyed Nadeem Ahsan, Javed Ferzund, Franz Wotawa. 32-39 [doi]
- A Distributed Model for Medical Treatment SystemZhao Wu, Yanxiang He, Liang Zhao, Fei Li. 40-45 [doi]
- A Domain Knowledge-Driven Framework for Multi-Criteria Optimization-Based Data Mining MethodsYi Peng, Gang Kou. 46-49 [doi]
- A Fuzzy Time Series Model to Forecast the BDIMing-Tao Chou. 50-53 [doi]
- A Genetic Multi-Agent Rule Induction System for Stream DataJinhwa Kim, Chaehwan Won, Hyeonsu Byeon. 54-58 [doi]
- A Holistic Understanding of HCI Perspectives on Smart HomeTsogzolmaa Saizmaa, Hee-Cheol Kim. 59-65 [doi]
- A Knowledge Integration Model for Corporate Dividend PredictionJinhwa Kim, Chaehwan Won, Jae Kwon Bae. 66-74 [doi]
- A Medical Information Management System Using the Semantic Web TechnologyMasaharu Hayashi, Hiroshi Horii, Insoo Kweon, Taketoshi Yoshida. 75-80 [doi]
- A Modeling Method for Web Service Composition on Business LayerZhao Wu, Yanxiang He, Liang Zhao, Xiaoming Peng. 81-86 [doi]
- A Multi-Channel Combination Method of Image Perceptual HashingHui Zhang, Haibin Zhang, Qiong Li, Xiamu Niu. 87-90 [doi]
- A New Approach to Improve the Vote-Based Classifier SelectionHamid Parvin, Hosein Alizadeh, Behrouz Minaei-Bidgoli. 91-95 [doi]
- A New Collaboration Architecture for Highly Organized Work GroupZhiqiang Zhang, Jiajun Bu, Chun Chen, Bo Jiang. 96-101 [doi]
- A New Kind of PSO--Convergent Fuzzy Particle Swarm Optimization and Performance AnalysisXuelei Meng, Limin Jia. 102-107 [doi]
- A New Normalized Similarity for Discriminating Similar DocumentsJeong-Hoon Ji, Chang-Keon Ryu, Gyun Woo, Hwan-Gue Cho. 108-113 [doi]
- A New Scheme of Global Mobility Management for Inter-VANETs Handover of Vehicles in V2V/V2I Network EnvironmentsJong-Min Lee, Myoungju Yu, Young Hun Yoo, Seong Gon Choi. 114-119 [doi]
- A Novel Way to Browse: Image Travel WizardXinghua Hu, Lei Zhang, Die Hu. 120-125 [doi]
- A Process-Oriented System Dynamics Model for Software Development Project PredictionChuen-Lung Chen, Chen-Shu Wang, Ya-Hui Lee, Yu-Min Lee. 126-131 [doi]
- A Proposed Conceptual Framework for E-Government Strategic Planning Based on ForesightKolsoom Abbasi Shahkooh, Ali Abdollahi, Mehdi Fasanghari, Mohammad Azadnia. 132-136 [doi]
- A Scalable Method for Improving the Performance of Classifiers in Multiclass Applications by Pairwise Classifiers and GAHamid Parvin, Hosein Alizadeh, Behrouz Minaei-Bidgoli, Morteza Analoui. 137-142 [doi]
- A Security Coordination Model for an Inter-Organizational Information Incidents Response Supporting Forensic ProcessKimoon Jeong, Junhyung Park, Minsoo Kim, BongNam Noh. 143-148 [doi]
- A Standard Process for Data Mining Based Software DebuggingGang Kou, Yi Peng. 149-152 [doi]
- A Study on 3D Face Modeling for Animation MatchingSunhee Weon, HyungIl Choi, Gyeyoung Kim. 153-158 [doi]
- A Study on the Willingness of Using FON in the Domain of Wireless CommunicationChiu Hung Su, Yuan-Chu Hwang, Chih Chung Yeh. 159-164 [doi]
- A Textual Dialogue Management System for Internet Chatting Over Virtual Agents CommunicationSoo-Hyun Park, Seung-Hyun Ji, Dong-Sung Ryu, Hwan-Gue Cho. 165-171 [doi]
- An Accuracy Improving Method for Three Dimensional Location SystemsMary Wu, Jaeil Kim, Kyunghwan Ahn, Chonggun Kim. 172-177 [doi]
- An Analysis on Media Projections of Information TechnologyJungwoo Lee, Sunghyuck Hong, Haejung Yun, Taehoon Kang. 183-187 [doi]
- An Efficient Algorithm for Intrusion Source IdentificationJonghyun Kim, Jungchan Na. 188-190 [doi]
- An Improved Chaos-Based Stream Cipher Algorithm and its VLSI ImplementationShubo Liu, Jing Sun, ZhengQuan Xu, Zhaohui Cai. 191-197 [doi]
- An Improved Variant of Wang-Cao s Certificate-Based Authenticated Key Agreement ProtocolMeng-Hui Lim, Sanggon Lee, Hoon Jae Lee. 198-201 [doi]
- An Incremental and Interactive Decision Tree Learning Algorithm for a Practical Diagnostic Supporting WorkbenchSam Chao, Fai Wong, Yiping Li. 202-207 [doi]
- An Integrated Authentication and Mobility Management Mechanism for Fast Handover in NGNMyoungju Yu, Jong-Min Lee, Dong Geun Yoon, Seong Gon Choi, Chang-Ho Seo. 208-213 [doi]
- An Intelligent Non Player Character Based on BDI AgentKil-Sang Yoo, Won-Hyung Lee. 214-219 [doi]
- Analysis on the Mobil IPTV Adoption and Moderator Effect Using Extended TAM ModelYonghee Shin, Hyori Jeon, Munkee Choi. 220-225 [doi]
- API and Component Based Customization of an Open Source Business Process Management System: uEngineLe Yang, Yongsun Choi, Jinyoung Jang. 226-231 [doi]
- Application of Law of Copyright Disputes of P2P File-Sharing TechnologyChuanfu Chen, Congjing Ran, Qiong Tang, Zhiqiang Wu. 232-237 [doi]
- Application of Quantitative Analysis Method in Traffic Volume PredictionGuoqiang Cai, Limin Jia, Yuquan Jia, Ye Zhang, Xi Li. 238-243 [doi]
- Applying Rough Sets to Maintain Data Consistency for High Degree RelationsHyontai Sug. 244-247 [doi]
- Applying Sheltered Instruction Observation Protocol (SIOP®) to Business/Technology Teaching In English (BTTIE) in AsiaDavid W. Deeds. 248-259 [doi]
- Approach and Application of Transportation State AnalysisYe Zhang, Limin Jia, Guoqiang Cai, Min Guo. 260-265 [doi]
- Approach of Fuzzy Classification Based on Hybrid Co-Evolution AlgorithmLimin Jia, Ruyan Zhang, Yong Zhang, Zongyi Xing, Guoqiang Cai. 266-271 [doi]
- Approach of Train Group Operation Conflict Prevention Reasoning Based on Fuzzy Time Petri NetsGuoqiang Cai, Shimin Zhao, Limin Jia, Yangdong Ye, Xi Li. 272-277 [doi]
- Assessing Intellectual Capital with Fuzzy Expert SystemMehdi Fasanghari, Maryam MohamedPour, Ali Abdollahi. 278-283 [doi]
- Authentication and Authorization Service for X-SIGMA SystemMeilan Jiang, Sang Boem Lim, Karpjoo Jeong. 284-289 [doi]
- Block Classification of a Web Page by Using a Combination of Multiple ClassifiersJinbeom Kang, Joongmin Choi. 290-295 [doi]
- Business Service Modeling in Service-Oriented EnterprisesBehrouz Minaei-Bidgoli, Laleh Rafati. 296-301 [doi]
- CCHR: Combination of Classifiers Using Heuristic RetrainingHamid Parvin, Hosein Alizadeh, Behrouz Minaei-Bidgoli, Morteza Analoui. 302-305 [doi]
- CFD Cyber Education Service Using Cyberinfrastructure for e-ScienceJongbae Moon, Chongam Kim, Yoonhee Kim, Kum Won Cho. 306-313 [doi]
- Chaos-Based Meaning ModelingMarius Crisan. 314-319 [doi]
- Classification of Feature Set Using K-means Clustering from Histogram Refinement MethodYoungeun An, Junguk Beak, Sangwook Shin, Minhyuk Chang, Jong-An Park. 320-324 [doi]
- Copyrights Expression and Secure Container of Software Source CodeByungRae Cha, Sun Park. 325-332 [doi]
- Correlation Mining between Time Series Stream and Event StreamBehrouz Minaei-Bidgoli, Seyed Behzad Lajevardi. 333-338 [doi]
- CSMD: Centralized Surface Matching Degree, a New Approach for Determining Matching Degree in Fuzzy SystemsHosein Alizadeh, Hamid Parvin, Behrouz Minaei-Bidgoli, Nasser Mozayani. 339-344 [doi]
- Decision of Semantic Similarity Using Description Logic and Vector Weight between ConceptsSu-Kyoung Kim, Ho-Jin Choi. 345-350 [doi]
- Design and Application of All Phase Pyramidal Directional Filter BankLi Li, Zhengxin Hou, Chengyou Wang, Fan He. 351-356 [doi]
- Design and Implementation of Embedded Linux Based Mobile Location-Awareness ServiceDo-Hyung Kim, Hwan-Gu Lee, Won-Tae Kim, Sun Ja Kim, Cheol-Hoon Lee. 357-360 [doi]
- Design and Implementation of Mobile Broadcasting Service which Supports Personal Mobile Broadcasting in Wireless EnvironmentsDo-Hyung Kim, Hwan-Gu Lee, Won-Tae Kim, Sun Ja Kim, Cheol-Hoon Lee. 361-364 [doi]
- Design of Ubiquitous Music Recommendation System Using MHMMJong-Hun Kim, Kyung-Yong Jung, Joong-Kyung Ryu, Un-Gu Kang, Jung-Hyun Lee. 369-374 [doi]
- Developing Graduation Screen Ontology Based on the METHONTOLOGY ApproachJinsoo Park, Kimoon Sung, Sewon Moon. 375-380 [doi]
- Developing Ubiquitous Space Information Model for Indoor GIS Service in Ubicomp EnvironmentJinwon Choi, Sung Ah Kim, Jumphon Lertlakkhanakul, Jung Ho Yeom. 381-388 [doi]
- Development of Wireless Interface Signal Control System for Dynamic and Optimal Management Based on DSRCSungDae Jung, SeungKwan Lee, Sangsun Lee, Youngjun Moon. 389-393 [doi]
- Distributed File System: Efficiency Experiments for Data Access and CommunicationBipin Upadhyaya, Fahriddin Azimov, Doan Thanh Tran, Eunmi Choi, Sangbum Kim, Pilsung Kim. 400-405 [doi]
- Distributed Many-to-Many Mapping Algorithm in the Hypercube NetworkSeung Chul Han. 406-411 [doi]
- Distributed Web-Topology Formation with Directional Antenna in Mesh EnvironmentArun Ranjitkar, Sung-Won Lee, Young-Bae Ko. 412-417 [doi]
- Double Relaxation -- GRASP Algorithm for Solve the Table Assignment Problem on Data Base Store DevicesRony Cueva, Manuel Tupia. 418-421 [doi]
- Downloadable User Interface for Mobile DevicesMinhong Yun, Jaeho Lee, Sunja Kim. 422-425 [doi]
- Effects of ON-OFF Variability in Two-State Pareto Traffic Models on Multimedia Application Transmission PerformanceI-Hui Li. 426-431 [doi]
- Efficient STMPM (Spatio-Temporal Moving Pattern Mining) Using Moving Sequence TreeYonsik Lee, Hyun Ko. 432-437 [doi]
- Experience Co-Creation on Ubiquitous Cultural e-Service Provision: A Case of Taiwan?s Hakka CultureYuan-Chu Hwang, Yuan-Chun Hwang, Chiu Hung Su. 438-443 [doi]
- Experiments on the Tactile Effects of a Sound-Specific Vibration InterfaceYonghee You, Hwanmun Lee, Mee Young Sung, Kyungkoo Jun, Jin-Suk Kang. 444-449 [doi]
- Exploring Impacts of IT Service Failure on Firm?s Market ValueSeung Ik Baek, Seung Jae Lee, Gyoo Gun Lim. 450-454 [doi]
- Extracting Temporal Behavior Patterns of Mobile UserSeung-Cheol Lee, Eun-Ju Lee, Wongil Choi, Ung-Mo Kim. 455-462 [doi]
- Face Detection Using the Improved Feature TrackerKi-Sang Kim, Gye-Young Kim, Hyung-Il Choi. 463-469 [doi]
- Formal Verification of Cryptographic Protocol for Secure RFID SystemHyun Seok Kim, Jung-Hyun Oh, Ju-Bae Kim, Yeon-Oh Jeong, Jin-Young Choi. 470-477 [doi]
- High-Speed Transmission and Quality of System for Internet Protocol Broadcasting ServicesByounghee Son, Euiseok Nahm, Hagbae Kim. 478-481 [doi]
- Hybrid Multicast Scheme for Many-to-Many VideoconferencingXuan Zhang, Chongrong Li, Xing Li. 482-487 [doi]
- Hybrid Rule and Neural Network Based Framework for Ubiquitous ComputingAndrey V. Gavrilov. 488-492 [doi]
- Implementation of Technical Method Supporting Service Mobility in Home NetworkYun Jin Choi, Jong-Min Lee, Seong Gon Choi, Sang Kwon Kim, Kyu Ouk Lee. 493-498 [doi]
- Incomplete Input Inferences on Fuzzy Expert SystemsTung-Hsiang Chou, Yu-Min Lee, Ya-Hui Lee. 499-504 [doi]
- Integrating Bi-Direction Audio and Video Transmission for UltraVNCYen-Hsiang Chen, Shu-Song Chen, Shanq-Jang Ruan. 505-508 [doi]
- Issues on Database Copyright Criteria and their SolutionsChuanfu Chen. 509-512 [doi]
- IT Governance Standard Selection Based on Two Phase Clustering MethodMehdi Fasanghari, Fatemeh NasserEslami, Mohammad Naghavi. 513-518 [doi]
- Load-Balancing Content Distribution in Structured Peer-to-Peer NetworksSeung Chul Han. 519-524 [doi]
- Merging Ontologies for Object Oriented Software EngineeringWaralak V. Siricharoen. 525-530 [doi]
- Mobile Semantic Search Using Personal Preference FilteringHochul Jeon, Taehwan Kim, Joongmin Choi. 531-534 [doi]
- Modeling and Application of Urban Dynamic Region Traffic Model Based on Information FusionYe Zhang, Limin Jia, Guoqiang Cai, Min Guo, Xiaoqing Cheng. 535-539 [doi]
- Modeling the Measurable Reliability on Complete Global Logistics SystemsYa-Hui Lee, Woo-Tsong Lin. 540-546 [doi]
- Network Based Global Mobility Management Scheme in NGNHan Gyol Kim, Myong Ju Yu, Jong-Min Lee, Yong Hun Yu, Seong Gon Choi. 547-553 [doi]
- News Keyword Extraction for Topic TrackingSungjick Lee, Han-joon Kim. 554-559 [doi]
- Nonphotorealistic Digital EtchingOk-Hue Cho, Kil-Sang Yoo, Won-Hyung Lee. 560-563 [doi]
- Optimal Selection of Loss Severity Distribution Based on LDAJian-ming Mo, Zong-Fang Zhou. 570-574 [doi]
- OSTM: A Spatiotemporal Extension to OraclePeiquan Jin, Pengfei Sun. 575-580 [doi]
- Personal Based Authentication by Face RecognitionYung-Wei Kao, Hui-Zhen Gu, Shyan-Ming Yuan. 581-585 [doi]
- Personalized Path Finding in Road NetworksElvis Rodrigues da Silva, Cláudio de Souza Baptista, Luciana Cavalcante de Menezes, Anselmo Cardoso de Paiva. 586-591 [doi]
- Policy Negotiation System Architecture for Privacy ProtectionInjoo Jang, Wenbo Shi, Hyeong Seon Yoo. 592-597 [doi]
- Practical Approach: Independently Using SPARQL-to-SQL Translation Algorithms on StorageJiseong Son, Dongwon Jeong, Doo-Kwon Baik. 598-603 [doi]
- Progressive Vector Data Transmission Based on Overall EffectsHua Liu, Weiying Yang, Songtao Yu, Yumin Chen. 604-608 [doi]
- Query-Based Multi-Document Summarization Using Non-Negative Semantic Feature and NMF ClusteringSun Park, ByungRae Cha. 609-614 [doi]
- Queueing Analysis on a MTO Production System Consisting of MTS Pre-ProductionKuo-Hwa Chang, Yang-Shu Lu. 615-620 [doi]
- Representing Spatiotemporal Information for Web PagesPeiquan Jin, Jie Zhao, Lihua Yue. 621-624 [doi]
- Research about the Magnetic Effect of the Industrial Cluster on TalentBei Hu, Fang Chen, Rongzhi Liu. 625-630 [doi]
- Research on Default Probability of Emerging Technology FirmsYing Zhang, Lin Chen, Zongfang Zhou. 631-634 [doi]
- Research on Emergency Management Information System of Qinghai-Tibet Railway LineYong Qin, Yong Jiang, Jingen Fang, Yanhui Wang, Limin Jia. 635-638 [doi]
- Research on Key Technologies for Grid-Based Network Collaborative DesignXuebin Chen, Guolin Duan, Yan Sun, Jiantao Gu. 639-644 [doi]
- Retrieval of Illegal and Objectionable MultimediaByeongCheol Choi, Jungnyeo Kim, Jaecheol Ryou. 645-647 [doi]
- SecConfig: A Pre-Active Information Security Protection TechniqueChing-Jiang Chen, Ming-Hwa Li. 648-652 [doi]
- Security Requirement for Cyber Attack TracebackJongho Ryu, Jungchan Na. 653-658 [doi]
- Sequential Pattern Mining with Inaccurate Event in Temporal SequenceJiadong Ren, Haiyan Tian. 659-664 [doi]
- Sliding-Window Filtering with Constraints of Compactness and Recency in Incremental DatabaseJiadong Ren, Haiyan Tian, Shiyong Lv. 665-669 [doi]
- Smoothing Schedule of Partial Data Dropping for MPEG-4 FGS Video Coding StreamHuey-Min Sun, Mao-Wei Weng, LihChyun Shu. 670-674 [doi]
- SPARQL Graph Pattern Rewriting for OWL-DL Inference QueryYixin Jing, Dongwon Jeong, Doo-Kwon Baik. 675-680 [doi]
- Stock Portfolio Recommendation Using Fuzzy MethodMehdi Fasanghari, Ahmad Faraahi. 685-689 [doi]
- Sum of Values of Local Histograms for Image RetrievalWaqas Rasheed, Gwangwon Kang, Jinsuk Kang, Jonghun Chun, Jong-An Park. 690-694 [doi]
- The Constraint Condition of a Word to Check the Grammatical Error in a Korean DocumentGil-Ja So, Hyuk-Chul Kwon. 695-700 [doi]
- The Design of Outsourcing Planning for Semiconductor Backend Turnkey ServiceS. H. Chung, I. P. Chung, Y. T. Tai, Y. M. Chu. 701-706 [doi]
- The Design of SOA-Based Business Collaboration SystemKyeongrim Ahn, Sangpil Park, HeeSoo Kim, Jongryel Kim, Jungchun Park. 707-712 [doi]
- The Design of Web Based Machine Translation Server Based on Grid InfrastructureFai Wong, Kwok Kit Leung. 713-718 [doi]
- The QoE Evaluation Method through the QoS-QoE Correlation ModelHyun Jong Kim, Dong Hyeon Lee, Jong-Min Lee, Kyoung Hee Lee, Won Lyu, Seong Gon Choi. 719-725 [doi]
- To Wait or Not to Wait? Analysis for the Traveler s Waiting Problem with Incomplete InformationKe Wang, James N. K. Liu, Weimin Ma. 726-731 [doi]
- Toward a Categorical Link Grammar for Knowledge Piece Generation in Emergency Decision-Making SupportQingquan Wang, Lili Rong, Kai Yu. 732-735 [doi]
- Toward Managing and Generating Hyperlinks to External ServicesHanmin Jung, Mikyoung Lee, Won-Kyung Sung. 736-739 [doi]
- Weaknesses of Voice InteractionHee-Cheol Kim. 740-745 [doi]