Abstract is missing.
- Face hallucination based on locally linear embedding and local correlationVinh Nguyen, Chih-Cheng Hung, Xiang Ma. 1-6 [doi]
- DC charger selection scheme for electric vehicle-based tours visiting multiple destinationsJunghoon Lee, Gyung-Leen Park. 7-11 [doi]
- On statistical modeling and forecasting of energy usage in smart gridWei Yu, Dou An, David W. Griffith, Qingyu Yang, Guobin Xu. 12-17 [doi]
- Post ranking in a blogosphereWon-Seok Hwang, Sang-Wook Kim. 18-22 [doi]
- P-adic parallel implementationXinkai Li, Chao Lu, Jon A. Sjogren. 23-28 [doi]
- A semantic weighting method for document classification based on Markov logic networksEunji Lee, Jeongin Kim, Junho Choi, Chang Choi, Byeong-Kyu Ko, PanKoo Kim. 29-33 [doi]
- A proposal for a taxonomy of semantic editing devices to support semantic classificationMarkus Rickert, Maximilian Eibl. 34-39 [doi]
- Unsupervised detection of obfuscated diverse attacks in recommender systemsSaad Sajid Hashmi, Sang-Wook Kim. 40-45 [doi]
- A study of ensemble based evolutionary classifiers for detecting unsolicited emailsShrawan Kumar Trivedi, Shubhamoy Dey. 46-51 [doi]
- Adaptive cache compression for non-volatile memories in embedded systemJu Hee Choi, Jong Wook Kwak, Seong Tae Jhang, Chu Shik Jhon. 52-57 [doi]
- Measuring similarities among intrusion detection rules on the MapReduce environmentInbok Lee, Phuong Do, Lan Do, Sung-Ryul Kim. 58-60 [doi]
- Content type based adaptation in collaborative recommendationYong Suk Choi. 61-65 [doi]
- PriSN: a privacy protection framework for healthcare social networking sitesFarzana Rahman, Ivor D. Addo, Sheikh Iqbal Ahamed. 66-71 [doi]
- Metadata based combined approach for effective collaborative recommendationKyung Soo Kim, Jun Yeop Lee, Yong Suk Choi. 72-76 [doi]
- Recommendation of newly published research papers using belief propagationJiwoon Ha, Soon-Hyoung Kwon, Sang-Wook Kim, Dongwon Lee. 77-81 [doi]
- An efficient mobile social search methodHe Li, Minje Ahn, Jongtae Lim, Kyoungsoo Bok, Hansuk Choi, Jaesoo Yoo. 82-85 [doi]
- Integrated financial trading system based on distributed in-memory databaseByung-Kun Park, Wone-Wung Jung, Joonhyouk Jang. 86-87 [doi]
- A multi-paradigm object tracker for robot navigation assisted by external computer visionMarcel-Titus Marginean, Chao Lu. 88-94 [doi]
- Fast image filtering via adaptive noise detectionTuan-Anh Nguyen, Jong-Geun Oh, Min-Cheol Hong. 95-99 [doi]
- Directional hole filling algorithm in new view synthesis for 3D video using local segmentationHuu-Noi Doan, Tuan-Anh Nguyen, Beomsu Kim, Min-Cheol Hong. 100-104 [doi]
- Robust background subtraction via online robust PCA using image decompositionSajid Javed, Seon Ho Oh, JunHyeok Heo, Soon Ki Jung. 105-110 [doi]
- An optimized support vector machine classifier to extract abnormal features from breast microwave tomography dataSamaneh Aminikhanghahi, Sung Y. Shin, Wei Wang, Seong H. Son, Soon-Ik Jeon. 111-115 [doi]
- Stixels estimation through stereo matching of road scenesKwang Hee Won, Joonwoo Son, Soon Ki Jung. 116-120 [doi]
- Shape based medical image retrieval method using irregularity chain code similarityByung K. Jung, Sung Y. Shin, Seong H. Son, Jeong K. Pack. 121-125 [doi]
- A reversible data hiding scheme based on histogram shifting using edge direction predictorDae-Soo Kim, Gil-Je Lee, Kee-Young Yoo. 126-131 [doi]
- An online multi-object tracking by detection approach based on particle filtering frameworkZhenhai Wang, Kicheon Hong. 132-137 [doi]
- Visual tracking with multiple representative models based on sparse prototypesDeqian Fu, Seong Tae Jhang. 138-143 [doi]
- Pedestrian detection of road scenes using depth and intensity featuresSisay Shimelis Gurmu, Min Woo Park, Soon Ki Jung. 144-148 [doi]
- FAMOUS: a novel fast multi-constrained multicast routing algorithmJun Huang, Xiang Li, Yin-Ying, Yi Sun, Qiang Duan, Cong-Cong Xing. 149-154 [doi]
- Energy-aware resource allocation based on margin adaptive principle for OFDMA systemsKaijian Liu, Haibo Zhang, Jiaoyang Peng, Fangwei Li. 155-160 [doi]
- Reducing scanning latency in WiMAX enabled VANETsSyed Hassan Ahmed, Safdar Hussain Bouk, Dongkyun Kim. 161-165 [doi]
- Meta-routing over heterogeneous networks in M2M systemsChi-Sheng Shih, Guan-Fan Wu. 166-173 [doi]
- Experimental approach: energy-and-bandwidth spectrum sensing using GNU radio and USRPYanxiao Zhao, Jems Pradhan, Jun Huang, Hui Sun. 174-179 [doi]
- The proposal for SDN supported future 5G networksSyed M. Raza, Dongsoo S. Kim, Hyunseung Choo. 180-185 [doi]
- Chunks and power allocation in OFDMA systems based on transient chaotic neural networkHaibo Zhang, Kaijian Liu, Lixiong Mu, Fangwei Li. 186-191 [doi]
- Fairness-oriented spectrum sharing for ODFC-based WRANMd Nashid Anjum, Jun Huang, Yanxiao Zhao, Wei Wang. 192-197 [doi]
- Evaluating the performance impact of RTR-BIRD in origin validationKyoungha Kim, Ik-hyeon Jang, Yanggon Kim. 198-203 [doi]
- Cross-layer design for optimal throughput of wireless networksKun Hua, Yuenong Zhu, Wei Wang, Honggang Wang. 204-208 [doi]
- Optimized data transmission using cooperative devices in clustered D2D communicationAwais Ahmad, Alfred Daniel, Anand Paul. 209-214 [doi]
- HILF: hybrid indoor locating frameworkDaeho Kim, Taegyu Hwang, Sanghoon Choi, Ikhyun Cho, Jiman Hong. 215-217 [doi]
- Implicit graphical password mutual authentication using mirror-image encryptionReddy A. Goutham, Dae-Soo Kim, Kee-Young Yoo. 218-223 [doi]
- Detecting binary theft via static major-path birthmarksSeongSoo Park, Hyunjun Kim, Jaeju Kim, Hwansoo Han. 224-229 [doi]
- Investigating gesture-based password: usability and vulnerability to shoulder-surfing attacksLakshmidevi Sreeramareddy, Sheng Miao, Jinjuan Heidi Feng. 230-235 [doi]
- Similarity calculation method for user-define functions to detect malware variantsTaeguen Kim, Jung Bin Park, In Gyeom Cho, Boojoong Kang, Eul-Gyu Im, Sooyong Kang. 236-241 [doi]
- Application of sim-hash algorithm and big data analysis in spam email detection systemPhuc-Tran Ho, Hee-Sun Kim, Sung-Ryul Kim. 242-246 [doi]
- DroidDolphin: a dynamic Android malware detection framework using big data and machine learningWen-Chieh Wu, Shih-Hao Hung. 247-252 [doi]
- A robust and efficient birthmark-based android application filtering systemSeongWook Kang, Hyungjoon Shim, Seongje Cho, Minkyu Park, Sangchul Han. 253-257 [doi]
- FSM watermarks based on ordering of flip flopsEdward Jung, Chih-Cheng Hung, Seonho Choi. 258-262 [doi]
- The optimized grouping value for precise similarity comparison of dynamic birthmarkDaeshin Park, Youngsu Park, John Kim, Jiman Hong. 263-265 [doi]
- On iteration optimization for non-cross-functional teams in ScrumFabian Sobiech, Beate Eilermann, Andreas Rauch. 266-271 [doi]
- TASEL: dynamic taint analysis with selective control dependencyByeongho Kang, Taeguen Kim, Boojoong Kang, Eul-Gyu Im, Minsoo Ryu. 272-277 [doi]
- SSVCheckerMichael Smith, Josh Dehlinger. 278-283 [doi]
- An experimental analysis of DAG scheduling methods in hard real-time multiprocessor systemsManar Qamhieh, Serge Midonnet. 284-290 [doi]
- On cascading failures and countermeasures based on energy storage in the smart gridXing Chen, Wei Yu, David W. Griffith, Nada Golmie, Guobin Xu. 291-296 [doi]
- Real-time priority assignment for autosar-based systems with time-driven synchronizationHyunmin Yoon, Minsoo Ryu. 297-302 [doi]
- Comparative study of microwave tomography segmentation techniques based on GMM and KNN in breast cancer detectionChunqiu Wang, Wei Wang, Sung Y. Shin, Soon-Ik Jeon. 303-308 [doi]
- GPU-based matrix multiplication methods for social networks analysisYong-Yeon Jo, Sang-Wook Kim, Duck-Ho Bae. 309-313 [doi]
- Energy-efficient assignment for tasks on non-dvs heterogeneous multiprocessor systemChin-Fu Kuo, Yung-Feng Lu. 314-319 [doi]
- An effective VM migration scheme for reducing resource fragments in cloud data centersHsueh-Wen Tseng, Ruei-Yu Wu, Tien-Shih Chang. 320-325 [doi]
- 3: discarding dispensable data for efficient live migration of virtual machinesMyunghoon Oh, Seungjae Baek, Dongwoo Kang, Jongmoo Choi. 326-331 [doi]
- A classification-based prefetching scheme for hibernation of embedded computing systemsChien-Chung Ho, Yu-Ming Chang, Yuan-Hao Chang, Sheng-Yen Hong, Che-Wei Chang, Tei-Wei Kuo. 332-337 [doi]
- Adapting byte addressable memory storage to user-level file system servicesShuichi Oikawa. 338-343 [doi]
- A cost-efficient mechanism for dynamic VM provisioning in cloud computingYeongho Choi, Yujin Lim. 344-349 [doi]
- Real-time process synchronization for systems with acceleratorsKuan-Chung Huang, Yu-Chen Wu, Che-Wei Chang, Tei-Wei Kuo, Chi-Sheng Shih, Qingxu Deng. 350-355 [doi]
- Concurrency control scheme for key-value stores based on InfiniBandJoonhyouk Jang, Yookun Cho, Jinman Jung, Sanghee Yoon. 356-358 [doi]
- Design of data backup on distributed memory system based on key-value store using hot/cold data managementWooChur Kim, Ikhyun Cho, Donghee Min, Chris Sung. 359-361 [doi]
- Evaluation of high-frequency financial transaction processing in distributed memory systemsWooChur Kim, Jungmee Yun, Hyedong Jung. 362-364 [doi]