


default search action
3rd ICUIMC 2009: Suwon, Korea
- Won Kim, Hyung-Jin Choi, Dongho Won:

Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009. ACM 2009, ISBN 978-1-60558-405-8
Wireless LAN and mesh networks
- Wei Kuang Lai, Chin-Shiuh Shieh, Chih-Shiuan Jiang:

Performance enhancement for IEEE 802.11e networks by adaptive adjustment of the HCCA/EDCA ratio. 1-6 - Shih Tsung Liang:

Machanisms for the maintenance of MP proxy tables in IEEE 802.11s mesh networks. 7-11 - Masaaki Kuwabara, Nobuhiko Nishio:

Wi-Fi based radio map for location sensing by hypothesizing existence of barriers. 12-17 - Masashi Ito, Toshihiro Shikama, Akira Watanabe:

Proposal and evaluation of multiple gateways distribution method for wireless mesh network. 18-25 - Yuh-Chung Lin

, Wei Kuang Lai, Feng-Jung Liu:
ARP-like direct link transmission scheme in WLAN. 26-31 - Miseon Choi, Wonik Park, Young-Kuk Kim

:
Two-phase mobile transaction validation in wireless broadcast environments. 32-38
Data search I
- Katsumi Tanaka:

Web search and information credibility analysis: bridging the gap between Web1.0 and Web2.0. 39-44 - PaiTzu Chang:

An efficient hash-based searching for specimens in the museum's exhibit. 45-50 - Sujeet Pradhan:

Towards an integrated framework for querying collection of heterogeneous data. 51-57 - Hyunja Lee, Junho Shim

:
Pivoted table index for querying product-property-value information. 58-62 - Shun Hattori, Katsumi Tanaka:

Object-name search by visual appearance and spatio-temporal descriptions. 63-70 - Masumi Shirakawa, Kotaro Nakayama, Takahiro Hara, Shojiro Nishio:

Concept vector extraction from Wikipedia category network. 71-79
Telecommunication networks
- Qing Li

, An Liu, Hai Liu, Baoping Lin, Liusheng Huang, Naijie Gu:
Web services provision: solutions, challenges and opportunities (invited paper). 80-87 - Li-Hua Li, Fu-Ming Lee, Yu-Chun Chen, Chieh-Yu Cheng:

A multi-stage collaborative filtering approach for mobile recommendation. 88-97 - Djelloul Boukhelef, Hiroyuki Kitagawa

:
Dynamic load balancing in RCAN content addressable network. 98-106 - Kai Liu, Victor C. S. Lee

:
COS: client oriented scheduling for multi-channel on-demand broadcast. 107-114
Data search II
- Akiko Hino, Katsumi Tanaka:

Small knowledge: a concept of enhanced bookmarks with personal context. 115-122 - Akira Takahashi, Masashi Tatedoko, Hiroko Kinutani, Masatoshi Yoshikawa:

Metadata management for integration and analysis of earth observation data. 123-130 - Ken C. K. Lee, Wang-Chien Lee, Hong Va Leong, Brandon Unger, Baihua Zheng

:
Efficient valid scope computation for location-dependent spatial queries in mobile and wireless environments. 131-140 - Xinzhong Zhu, Jianmin Zhao, Jie Yuan, Huiying Xu:

A fuzzy quantization approach to image retrieval based on color and texture. 141-149
Systems and applicataions I
- Iwen Huang:

The effects of personality factors on participation in online learning. 150-156 - Satoshi Nishimura, Mutsuo Sano, Katsuo Ikeda:

The design and implementation of an extensible network backup system in realtime. 157-163 - Pei-Ju Chao, Tsair-Fwu Lee, Te-Jen Su, Fu-Min Fang:

Quantitative evaluation between rival planning systems with dosimetric indices. 164-167 - Chih-Yen Wu, Shih-Hao Huang, Peng-Liang Peng, Gwo-Jia Jong:

Automatic vehicle parking system using gyroscope. 168-171
Ad-hoc networks
- Takashi Osawa, Tokuya Inagaki, Susumu Ishihara

:
Implementation of hierarchical GAF, a cooperative power saving scheme for sensor networks. 172-179 - Sho Fujita, Hiroshi Esaki:

ATMOS: A middleware for Transparent MObile ad-hoc networking Systems. 180-184 - Hideya Ochiai, Hiroshi Esaki:

Message routing on potential-fields in forwarding-based DTNs. 185-193 - Ngoc Duy Pham

, Hyunseung Choo:
Efficient location-aided flooding scheme initiated by receiver for MANETs. 194-199 - Khac Tiep Mai, Dongkun Shin, Hyunseung Choo:

Connectivity-based clustering with stretching technique in MANETs. 200-206
Security I
- Wen-Ya Chiang, Shiuh-Jeng Wang, Chi-Yao Weng, Cheng-Hsing Yang:

Robustness-set in watermarking embedding systems using codebook classifications. 207-215 - Chu-Hsing Lin, Fuu-Cheng Jiang, Wei-Shen Lai, Wei-Yuah Lee, Wei-Cheng Hsu:

Counteract SYN flooding using second chance packet filtering. 216-220 - Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho:

Secure RFID authentication scheme for EPC class Gen2. 221-227 - Chin-Feng Lee, Kuo-Hua Wang, Chin-Chen Chang, Yu-Lin Huang:

A reversible data hiding scheme based on dual steganographic images. 228-237 - Rung Ching Chen, Chia-Fen Hsieh, Yung-Fa Huang

:
A new method for intrusion detection on hierarchical wireless sensor networks. 238-245 - Chi-Shiang Chan, Ching-Yun Chang:

An information hiding scheme by applying the dynamic programming strategy to LSB matching revisited. 246-250 - Hsing-Bai Chen, Wei-Bin Lee, Yong-Hong Zhao, Yin-Long Chen:

Enhancement of the RFID security method with ownership transfer. 251-254 - Kyu Il Kim, Won Gil Choi, Eun Ju Lee, Ung-Mo Kim:

RBAC-based access control for privacy protection in pervasive environments. 255-259
Communication technologies
- Mong-Fong Horng, Yau-Hwang Kuo, Liang-Chien Huang, Yi-Ting Chien:

An effective approach to adaptive bandwidth allocation with QoS enhanced on IP networks. 260-264 - Dahae Chong, Sangho Ahn, Youngpo Lee, Seokho Yoon:

New synchronization schemes for UWB systems. 265-271 - Eun Cheol Kim, Jin Young Kim:

Performance of double binary turbo coded UWB systems with antenna diversity. 272-277 - Choongyong Shin, Jinsung Cho:

A preliminary study on common radio resource management in heterogeneous wireless networks. 278-282 - Jae Sung Park, Jin Young Kim:

Performance analysis of STBC-UWB systems with double binary turbo code. 283-289 - Eun-Ae Cho, Chang-Joo Moon

, Hyun-Soo Im, Doo-Kwon Baik:
An anonymous communication model for privacy-enhanced location based service using an echo agent. 290-297 - Kwang-Chun Go, Jae-Hyun Kim, Seong-Hwan Oh, Kyeong-Deok Moon, Kwangil Lee:

Resource allocation algorithm considering a priority of service classes for WiMedia UWB system. 298-301 - Jae Hee Han, Myung Hoon Sunwoo:

Simplified sum-product algorithm using piecewise linear function approximation for low complexity LDPC decoding. 302-308
Security II
- Chin-Chen Chang, Shih-Chang Chang:

The design of e-traveler's check with efficiency and mutual authentication. 309-316 - Shu-Chuan Chu

, Lakhmi C. Jain, Hsiang-Cheh Huang
, Jeng-Shyang Pan:
The triple-watermarking algorithm with multiple description coding over lossy communication networks. 317-326 - Chia-Chen Lin

, Pei-Feng Shiu:
DCT-based reversible data hiding scheme. 327-335 - Kuo-Nan Chen, Chin-Feng Lee, Chin-Chen Chang:

Embedding secret messages based on chaotic map and Huffman coding. 336-341 - Tzu-Chuen Lu, Ying-Hsuan Huang:

An efficient block-based lossless information hiding technique. 342-347
Intelligent systems
- Xiangfeng Luo, Yi Du, Fangfang Liu

, Zhian Yu, Weimin Xu:
Merging element fuzzy cognitive maps. 348-355 - Al-Sakib Khan Pathan

, Choong Seon Hong
:
Bilinear-pairing-based remote user authentication schemes using smart cards. 356-361 - Eun Ho Kim, Sonya S. Kwak, Jeonghye Han, Yoon Keun Kwak:

Evaluation of the expressions of robotic emotions of the emotional robot, "Mung". 362-365
Systems and applications II
- Masato Oguchi:

Research works on cluster computing and storage area network. 366-375 - Li Zhao, Qing Li

, Xiaoli Liu, Nanshan Du:
A modeling method based on CCS for workflow. 376-384 - Dingding Li, Hai Jin, Yingzhe Shao, Xiaofei Liao:

A high-efficient inter-domain data transferring system for virtual machines. 385-390
Systems and applicataions III
- Hai Jin, Guofu Xiang, Feng Zhao, Deqing Zou, Min Li, Lei Shi:

VMFence: a customized intrusion prevention system in distributed virtual computing environment. 391-399 - Keisuke Takemori, Masahiko Fujinaga, Toshiya Sayama, Masakatsu Nishigaki

:
Host-based traceback; tracking bot and C&C server. 400-405 - Yuko Kamiya, Toshihiko Shimokawa, Norihiko Yoshida:

Scalable server system based on virtual machine duplication in wide area. 406-410 - Chang-Yu Wang, Tsair-Fwu Lee, Chun-Hsiung Fang:

A multimodality image registration framework for synchronous visualization of radiotherapy plans with longitudinal imaging studies. 411-415 - Brian J. d'Auriol

, Yu Niu, Sungyoung Lee, Young-Koo Lee:
The plasma free space optical model for ubiquitous systems. 416-425
Data analysis and mining I
- Jieh-Shan Yeh, Szu-Chen Lin:

A new data structure for asynchronous periodic pattern mining. 426-431 - Tomomi Miyazaki, Toshiki Watanabe, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:

Keyword search considering user's preference in P2P networks. 432-440 - Hiroaki Ohshima

, Katsumi Tanaka:
Real time extraction of related terms by bi-directional lexico-syntactic patterns from the web. 441-449 - Ok-Ran Jeong, Sang-Won Lee:

An efficient clustering framework for relevant web information. 450-456 - Hideyuki Ohtani, Takuya Kida, Takeaki Uno, Hiroki Arimura:

Efficient serial episode mining with minimal occurrences. 457-464 - Kenta Oku, Shinsuke Nakajima, Jun Miyazaki, Shunsuke Uemura, Hirokazu Kato

:
A recommendation method considering users' time series contexts. 465-470 - Imam Machdi, Toshiyuki Amagasa

, Hiroyuki Kitagawa
:
XML data partitioning strategies to improve parallelism in parallel holistic twig joins. 471-480
Signal processing & OFDM
- Kwang Yoon Kim, Jin Young Kim:

Cyclic delay diversity for V-BLAST OFDM system. 481-487 - Kyung Hoon Won, Jung-Su Han, Hyung-Jin Choi, BonYoung Koo:

Noise insensitive sampling frequency offset estimation methods for DVB-T/H systems. 488-493 - Youngyoon Lee, Taeung Yoon, Sanghun Kim, Seokho Yoon:

New schemes of carrier frequency offset estimation for DVB systems. 494-498 - Myung-Jin Chung, Jung-Su Han, Hyung-Jin Choi, Seok-Joong Kim:

An enhanced ECCM method using OFCDM in WiBro system. 499-503 - Sang-Hun Yoon, Jin-Doo Jeong, Jong-Wha Chong:

An area reduction method for digital filter using redundancy of SD number system. 504-508 - Yeong-Sam Kim, Jong-Wha Chong:

A new filtering method for chirp spread spectrum. 509-512 - Jaehwan Kim, SungHwan Park, Jong-Wha Chong:

Peak power control algorithm for multi-processor SoC. 513-515
Systems and applications IV
- Soichiro Tokuhisa, Kunihiko Kaneko:

Representative slice method for viscous fluid registration of three-dimensional whole-body human images. 516-523 - Zeng-Wei Hong

, Kai-Yi Chin, Jim-Min Lin:
Developing embodied agent-based user interface by using interactive drama markup language. 524-528 - Takanori Ueda

, Yu Hirate, Hayato Yamana
:
Exploiting idle CPU cores to improve file access performance. 529-535 - Daisuke Kitayama, Ryong Lee, Kazutoshi Sumiya:

A credibility analyzing method of geographical objects from digital maps. 536-543 - Long-Sheng Chen

, Chun-Chin Hsu, Yu-Shan Chang:
MDS: a novel method for class imbalance learning. 544-549 - Yu-lung Lo, Ling-yi Tsai:

Real-valued feature indexing for music databases. 550-556
Sensor networks
- Gicheol Wang, Deokjai Choi, Daewook Kang:

A lightweight key renewal scheme for clustered sensor networks. 557-565 - Yuichi Sei

, Shinichi Honiden:
Reporter node determination of replicated node detection in wireless sensor networks. 566-573 - Ji-Wook Kwon, Mun-Soo Park, Dongkyoung Chwa

:
Localization of the mobile agent using indirect Kalman filter in distributed sensor networks. 574-579 - Soo Young Moon, Tae Ho Cho:

Energy efficient filtering method in sensor networks. 580-585 - Jaekwang Kim

, KwangHo Yoon, Seunghoon Lee, Je-hee Jung, Jee-Hyong Lee:
An m-EVBT algorithm for energy efficient routing in wireless sensor networks. 586-591 - YongHwan Kim, Sungsoo Kim, Seongjoon Lee, Kwangseon Ahn:

An anti-collision algorithm without idle cycle using 4-ary tree in RFID system. 592-596 - Sang Jin Lee, Hae Young Lee, Tae Ho Cho:

Adaptive threshold determination method for the dynamic filtering in wireless sensor networks using fuzzy logic. 597-601 - Riaz Ahmed Shaikh

, Young-Koo Lee, Sungyoung Lee:
Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks. 602-606
Systems and applicataions V
- Jaekyong Jeong, Chijung Hwang, Byeungwoo Jeon

:
An efficient method of image identification by combining image features. 607-611 - Heejin Kim, Byoungju Choi, Seokjin Yoon:

Performance testing based on test-driven development for mobile applications. 612-617 - Mohammad Mehedi Hassan, Biao Song, Eui-nam Huh:

A framework of sensor-cloud integration opportunities and challenges. 618-626 - Moonju Park, Hong Jin Yoo, Jinseok Chae:

Analysis on quantum-based fixed priority scheduling of real-time tasks. 627-634 - Jihyun Kim, Yujung Jung, Yoonsun Lim, Myung Kim, Sunsook Noh:

An e-learning framework supporting personalization and collaboration. 635-638 - Eunyoung Cheon, JoongHo Ahn

:
Virtual community 101: know your virtual community and members. 639-643
Data analysis and mining II
- Myungha Jang, Arang Rhie, Joyce Jiyoung Whang, Sanduk Yang

, Hyun Seok Park:
A statistical analysis of relation degree of compound pair on online biological pathway databases. 644-649 - Jaeseok Myung, Jung-Yeon Yang, Sang-goo Lee:

PicAChoo: a tool for customizable feature extraction utilizing characteristics of textual data. 650-655 - Chowdhury Farhan Ahmed, Syed Khairuzzaman Tanbeer, Byeong-Soo Jeong, Young-Koo Lee:

Mining high utility patterns in incremental databases. 656-663 - Minsoo Lee, Yoonkyoung Lee, Boyeon Meang, Okju Choi:

A clustering algorithm using particle swarm optimization for DNA chip data analysis. 664-668 - Donghai Guan, Young-Koo Lee, Sungyoung Lee:

Activity recognition with the aid of unlabeled samples. 670-674

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














