Abstract is missing.
- Multi-objective optimization of dispatching strategies for situation-adaptive AGV operation in an automated container terminalJeongmin Kim, Ri Choe, Kwang Ryel Ryu. 1-6 [doi]
- A better edit distance measure allowing for block swapsNhauo Davuth, Sung-Ryul Kim. 7-11 [doi]
- Performance consequences of introducing an internal penalty function to a genetic algorithm for schedulingMichael Doherty, Chih-Cheng Hung. 12-15 [doi]
- Finding overlaps within regular expressions with variable-length gapsJuan Mendivelso, Yoan J. Pinzon, Inbok Lee. 16-21 [doi]
- Developing a real-time inference approach for rule-based reasoning systemsYing Qiao, Chang Leng, Hongan Wang, Jian Liu. 22-27 [doi]
- A boosted SVM based sentiment analysis approach for online opinionated textAnuj Sharma, Shubhamoy Dey. 28-34 [doi]
- Effect of feature selection methods on machine learning classifiers for detecting email spamsShrawan Kumar Trivedi, Shubhamoy Dey. 35-40 [doi]
- Towards of complex natural disasters systems frameworkHamid Mcheick, Karam Mustapha, Sehl Mellouli. 41-42 [doi]
- An efficient bit-parallel algorithm for IDSSung-il Oh, Min Sik Kim, Inbok Lee. 43-44 [doi]
- Graph based M2M optimization in an IoT environmentAnand Paul. 45-46 [doi]
- Electronic systems integration of a locomotion rehabilitation platform with ANFIS simulationAdolfo Avila Barón, Margareth Lorena Alfonso, Pedro Enrique Jimenez. 47-50 [doi]
- A system framework and API for run-time adaptable parallel softwareMikyung Kang, Dong-In Kang, SeungWon Lee, Jaedon Lee. 51-56 [doi]
- Two mechanisms for generating infinite families of pairing bijectionsPaul Tarau. 57-62 [doi]
- CUBIT: compact bitmap profiling for dynamic data dependence analysisHyoyoung Kim, Sungtae Ryu, Hwansoo Han. 63-68 [doi]
- Scheduling data processing flows under budget constraint on the cloudFei Cao, Dabin Ding, Dunren Che, Mengxia Michelle Zhu, Wen-Chi Hou. 69-74 [doi]
- Efficient integrity auditing services for cloud computing using raptor codesM. Newlin Rajkumar, V. Venkatesa Kumar, R. Sivaramakrishnan. 75-78 [doi]
- A locality-aware home migration for software distributed shared memorySanghoon Choi, Jinman Jung. 79-81 [doi]
- Using hamming similarity to map ontology learning: a new data mining systemChoukri Djellali. 82-87 [doi]
- A new on-line digital conceptual model oriented corporate memory constructing: taking unstructured text as a caseChoukri Djellali. 88-93 [doi]
- A semantic similarity measure in document databases: an earth mover's distance-based approachMin-Hee Jang, Tae-Hwan Eom, Sang-Wook Kim, Young-Sup Hwang. 94-99 [doi]
- Index selection: a query pattern mining based approachJunping Sun, Jiman Hong. 100-106 [doi]
- Monitoring social relationship among Twitter users by using NodeXLJeongin Kim, Eunji Lee, Junho Choi, Yonggeun Bae, Miah Ko, PanKoo Kim. 107-110 [doi]
- On combining text-based and link-based similarity measures for scientific papersMasoud Reyhani Hamedani, Sang-Chul Lee, Sang-Wook Kim. 111-115 [doi]
- Recommendation in online shopping malls: results and experiencesSang-Chul Lee, Sang-Wook Kim, Sunju Park. 116-117 [doi]
- Evaluation of media analysis and information retrieval solutions for audio-visual content through their integration in realistic workflows of the broadcast industryMarkus Rickert, Maximilian Eibl. 118-121 [doi]
- A novel method of artificial caption detection in videos using temporal and spatial informationSung-Il Joo, Sun-Hee Weon, Hyung-Il Choi. 122-127 [doi]
- Visual tracking with representative templates based on low-rank matrixDeqian Fu, Shunbo Hu, Seong Tae Jhang. 128-133 [doi]
- A new approach for adaptive background object tracking based on Kalman filter and mean shiftZhenhai Wang, Kicheon Hong. 134-139 [doi]
- Improved pre-processing algorithm in spatial scalability for scalable video codingK. Bharanitharan. 140-145 [doi]
- An association-based multi-target tracking methodAi Min Li, Pil Seong Park. 146-151 [doi]
- MRF-based adaptive detection approach: a framework for restoring image degraded by Gaussian noiseTuan-Anh Nguyen, Beomsu Kim, Min-Cheol Hong. 152-156 [doi]
- A real-time system of lane detection and tracking based on optimized RANSAC B-spline fittingJiayong Deng, Youngjoon Han. 157-164 [doi]
- Adaptive retinex back-light compensation algorithm using skewness information of imageJong-Geun Oh, Min-Cheol Hong. 165-170 [doi]
- Real-time vehicle detection using equi-height mosaicking imageMin Woo Park, Jung Pil Park, Soon Ki Jung. 171-176 [doi]
- Enhanced roughness index for breast cancer benign/malignant measurement using Gaussian mixture modelZhe Li, Wei Wang, Sung Y. Shin, Hyung Do Choi. 177-181 [doi]
- Magnetic resonance image retrieval based on contour to centroid triangulation with shape feature similarityByung K. Jung, Seong H. Son, Jeong K. Pack. 182-186 [doi]
- SVM-based Harris corner detection for breast mammogram image normal/abnormal classificationHyun I. Kim, Sung Y. Shin, Wei Wang, Soon-Ik Jeon. 187-191 [doi]
- Image enhancement and post-processing for low-resolution compressed videoMyoung Jin Kim, Beomsu Kim, Min-Cheol Hong. 192-195 [doi]
- Node joining and grouping scheme for avoiding hidden node problem in IEEE 802.15.4 wireless sensor networksHsueh-Wen Tseng, Shiann-Tsong Sheu, Shiau-Yi Ou. 196-201 [doi]
- On simulation study of mesh-based protocols for smart grid communication networksPaul Moulema, Wei Yu, Guobin Xu, David W. Griffith, Nada Golmie, Chao Lu, David H. Su. 202-207 [doi]
- Predictive handover scheme using mobility history in PMIPv6Geumsan Jo, Hyun Jung Choe, Hyunseung Choo. 208-213 [doi]
- A path-generation framework for real-time query processing in wireless sensor networksYung-Feng Lu, Jun Wu, Chin-Fu Kuo. 214-219 [doi]
- RAT selection for heterogeneous wireless networks using support vector machineWei-Te Wong, Ai-Chun Pang, Miao-Ru Hsu. 220-225 [doi]
- Bayesian-based localization in inhomogeneous transmission mediaEsmaeil S. Nadimi, Victoria Blanes-Vidal, Per Michael Johansen. 226-231 [doi]
- The BGP monitoring and alarming system to detect and prevent anomaly IP prefix advertisementJekuk Yun, Beomseok Hong, Yanggon Kim. 232-236 [doi]
- C2-CODER: coverage-controlled network CODEd repetition for vehicular ad-hoc networksHongseok Yoo, Dongkyun Kim. 237-241 [doi]
- Fault-tolerant circulant digraphs networksA. (Zizo) Farrag. 242-247 [doi]
- An overlay network construction method using swarm intelligence for an application-level multicast serviceJaesung Park, Yujin Lim. 248-253 [doi]
- Energy aware error control in cooperative communication in wireless sensor networksBasit Manzoor, Nadeem Javaid, Obaid Ur Rehman, Safdar Hussain Bouk, Syed Hassan Ahmed, Se Hyun Park, Dongkyun Kim. 254-260 [doi]
- Architectural design of cloud gateway in smart surveillance systemJaeseok Shim, Yujin Lim, Jaesung Park. 261-266 [doi]
- A distortion estimation based packet scheduling strategy for H.264 video over wireless networksDanyang Zhang, Fan Li, Zhou Su. 267-272 [doi]
- Fast retransmit for flooding-based routing in underwater wireless sensor networksSungwon Lee, Dongkyun Kim. 273-276 [doi]
- Global network connectivity assessment via local data exchange for underwater acoustic sensor networksMohammad Mehdi Asadi, Amir Ajorlou, Amir G. Aghdam, Stephane Blouin. 277-282 [doi]
- A framework for analyzing the performance of distributed lifetime-efficient routing schemes in wireless sensor networksJalal Habibi, Amir G. Aghdam, Ali Ghrayeb. 283-288 [doi]
- A worm-containing strategy using a social network and PageRankDonghwa Kang, Daeshin Park, Yookun Cho. 289-292 [doi]
- A novel passive worm defense model for multimedia sharingHaokun Tang, Jun Huang, Wei Wang. 293-299 [doi]
- A threat monitoring system for smart mobiles in enterprise networksWei Yu, Zhijiang Chen, Guobin Xu, Sixiao Wei, Nnanna Ekedebe. 300-305 [doi]
- An efficient protection scheme of digital contents under mobile devicesYounsik Jeong, Seongje Cho, Moonju Park, Jeonguk Ko, Hyungjoon Shim, Joonmo Kim, Sangchul Han, Minkyu Park. 306-311 [doi]
- Combining principal component analysis, decision tree and naïve Bayesian algorithm for adaptive intrusion detectionZhi-guo Chen, Sung-Ryul Kim. 312-316 [doi]
- Malware analysis method using visualization of binary filesKyoung-Soo Han, Jae Hyun Lim, Eul-Gyu Im. 317-321 [doi]
- Function matching-based binary-level software similarity calculationYeo Reum Lee, Boojoong Kang, Eul-Gyu Im. 322-327 [doi]
- Software behaviour correlation in a redundant and diverse environment using the concept of trace abstractionAbdelwahab Hamou-Lhadj, Syed Shariyar Murtaza, Waseem Fadel, Ali Mehrabian, Mario Couture, Raphael Khoury. 328-335 [doi]
- Measuring similarity of android applications via reversing and K-gram birthmarkingJeonguk Ko, Hyungjoon Shim, Dong Jin Kim, Younsik Jeong, Seongje Cho, Minkyu Park, Sangchul Han, Seong Baeg Kim. 336-341 [doi]
- Memory hacking analysis in mobile devices for hybrid model of copyright protection for Android appsHo Kwon Lee, Hyung Soon Chung, Sung-Ryul Kim. 342-346 [doi]
- Improved signature based intrusion detection using clustering rule for decision treePhuong Do, Ho Seok Kang, Sung-Ryul Kim. 347-348 [doi]
- Android malware classification method: Dalvik bytecode frequency analysisByeongho Kang, Boojoong Kang, Jungtae Kim, Eul-Gyu Im. 349-350 [doi]
- Real-time malware detection framework in intrusion detection systemsSunwoo Kim, Taeguen Kim, Eul-Gyu Im. 351-352 [doi]
- Rule-based anti-anti-debugging systemJaeKeun Lee, Boojoong Kang, Eul-Gyu Im. 353-354 [doi]
- An effective API extraction scheme for dynamic binary similarity comparisonYoungsu Park, Jiman Hong. 355-356 [doi]
- Filtering illegal Android application based on feature informationMinwoo Jang, Daeho Kim. 357-358 [doi]
- Impact of multiple watermarks for protecting copyright of applications on smart mobile devicesBongjae Kim, Jinman Jung. 359-360 [doi]
- Impact of software watermarking on smart devicesJoonhyouk Jang, Bongjae Kim, Yookun Cho. 361-362 [doi]
- Design of a mobile inspector for detecting illegal Android applications using fingerprintingHyunho Ji, WooChur Kim. 363-364 [doi]
- Ontology driven creational design patterns: creating objects on the flyAmrita Chaturvedi, T. V. Prabhakar. 365-372 [doi]
- Towards effective adaptive user interfaces designTomás Cerný, Michael J. Donahoo, Eunjee Song. 373-380 [doi]
- Value-deterministic search-based replay for android multithreaded applicationsAjay Kumar Jha, Sooyong Jeong, Woo Jin Lee. 381-386 [doi]
- An interactive graph-based automation assistant: a case study to manage the GIPSY's distributed multi-tier run-time systemSleiman Rabah, Serguei A. Mokhov, Joey Paquet. 387-394 [doi]
- Towards of service-oriented design architecture methodHamid Mcheick, Youcef Baghdadi, Naoufel Kraïem. 395-396 [doi]
- Fault localization using forward slicing spectrumAnupama Surendran, Philip Samuel. 397-398 [doi]
- Evaluation of prediction error effects in wind energy-based electric vehicle chargingJunghoon Lee, Gyung-Leen Park, Il-Woo Lee, Wan-Ki Park. 399-403 [doi]
- A systematic methodology for OS benchmark characterizationShuo-Hung Chen, Hsiao-Mei Lin, Kuo-Yi Chen, Yuan-Hao Chang, Pen-Chung Yew, Chien-Chung Ho. 404-409 [doi]
- Scheduling algorithm with energy-response trade-off considerations for mixed task setsChin-Fu Kuo, Lieng-Cheng Chien, Yung-Feng Lu. 410-415 [doi]
- PMCD: a parallel multi-controller design for solid-state drivesMaw-Yi Chou, Chin-Hsien Wu. 416-421 [doi]
- Data filter cache with word selection cache for low power embedded processorJu Hee Choi, Jong Wook Kwak, Seong Tae Jhang, Chu Shik Jhon. 422-427 [doi]
- Towards optimal priority assignments for the transactional event handlers of P-FRPYuanfeng Wen, Chaitanya Belwal, Albert M. K. Cheng. 428-433 [doi]
- smartPrediction: a real-time smartphone-based fall risk prediction and prevention systemAkm Jahangir Alam Majumder, Ishmat Zerin, Miftah Uddin, Sheikh Iqbal Ahamed, Roger O. Smith. 434-439 [doi]
- Variable voltage scheduling with the priority-based functional reactive programming languageChaitanya Belwal, Albert M. K. Cheng, Jim Ras, Yuanfeng Wen. 440-445 [doi]
- Shadow phone: context aware device replication for disaster managementChi-Sheng Shih, Trang-Khon Trieu. 446-453 [doi]
- Towards in situ affect detection in mobile devices: a multimodal approachMohammad Adibuzzaman, Niharika Jain, Nicholas Steinhafel, Munirul M. Haque, Ferdaus Ahmed Kawsar, Sheikh Iqbal Ahamed, Richard Love. 454-460 [doi]
- Joint management of performance-predictable virtualized storage devices with hard disk and flash memoryPo-Chun Huang, Yuan-Hao Chang, Tei-Wei Kuo, Chien-Chung Ho, Hyunseung Choo. 461-466 [doi]
- Effect of page frame allocation pattern on bank conflicts in multi-core systemsDongwoo Kang, Heekwon Park, Jongmoo Choi. 467-472 [doi]
- Buddy2GuessWho: a smartphone application in on-line social network platformYan-Ru Chen, Yien-Chang Liao, Pi-Chen Chiu, Ai-Chun Pang. 473-478 [doi]
- In-memory file system for non-volatile memoryHyunjun Kim, Joonwook Ahn, Sungtae Ryu, Jungsik Choi, Hwansoo Han. 479-484 [doi]
- Viewer generated audio-visual communication system using Braille metaphorJeeHyun Yang, Kyujung Kim, George Legrady. 485-486 [doi]
- Enhancing lookup performance of key-value stores using cuckoo hashingJoonhyouk Jang, Yookun Cho, Jinman Jung, Gwangil Jeon. 487-489 [doi]
- Design and implementation of the fusion simulator based on multi-shader GPUJae-Hoon An, Younghwan Kim, Kiman Jeon. 490-491 [doi]
- XpeedQ: a reliable and efficient application level message queueByung-Kun Park, Sang-Hee Yoon, Kyung-Seop Kim, Woon-Mook Kim. 492-494 [doi]
- Hardware acceleration for proton beam Monte Carlo simulationMin-yu Tsai, Shih-Hao Hung. 495-496 [doi]
- A service-control framework based on digital watermarks for music streaming on smart devicesEunseok Choi, Minwoo Jang. 497-498 [doi]
- An efficient patient monitoring systemBong Joo Kim, PanKoo Kim, Hong Min, Chang Oan Sung, Jung-Yeop Kim, Eunseok Choi. 499-500 [doi]