default search action
2. IEEE-CSA 2009: Jeju Island, Korea
- Proceedings of the 2nd International Conference on Computer Science and its Applications, CSA 2009, Jeju Island, Korea, December 10-12, 2009. IEEE 2009, ISBN 978-1-4244-4945-3
Multimedia system and networking
- Munther Abualkibash, James Gedney, Yongbom Kim, Jeongkyu Lee:
A Hierarchical Approach to Landmarks Detection in Taekwondo Poomsae Videos. 1-6 - Nadra Ben Romdhane, Mohamed Hammami, Hanêne Ben-Abdallah:
An Artificial Vision-Based Lane Detection Algorithm. 1-6 - Xuehong Liu, Arnaud Casteigts, Nishith Goel, Amiya Nayak, Ivan Stojmenovic:
Multiratecast in Wireless Fault Tolerant Sensor and Actuator Networks. 1-6 - Fang-Yie Leu, Yong-Lon Chen:
A Path Switching Scheme for SCTP Based on Round Trip Delay. 1-6 - Niakam Kazemi, Alexander L. Wijesinha, Ramesh K. Karne:
Design and Implementation of IPsec on a Bare PC. 1-8 - Md. Shohrab Hossain, Mohammed Atiquzzaman:
Signaling Cost Analysis of Mobility Protocols Using City Section Mobility Model. 1-6
Security and trust management
- Yuseop Lee, Jongsung Kim, Pil Joong Lee, Yeonjung Kang, Hyangjin Lee:
Impossible Collision Based Side-Channel Attacks on HIGHT with Reduced Masked Rounds. 1-4 - Hayretdin Bahsi, Albert Levi:
Energy Efficient Privacy Preserved Data Gathering in Wireless Sensor Networks Having Multiple Sinks. 1-8 - Jong Sik Moon, Im-Yeong Lee, Seo-Il Kang:
Group Key Management Using Device ID in Ad-hoc Network. 1-6 - Pranav Khaitan, Korra Sathya Babu, Sanjay Kumar Jena, Banshidhar Majhi:
Approximation Algorithms for Optimizing Privacy and Utility. 1-6 - Rachid Anane, Steven Marrocco, Behzad Bordbar:
Trusted P2P Group Interaction. 1-8 - Sung-Won Kim, Eun-Ha Song, Dong-Hwan Park, Hyeon Park, Sangjoon Park, Young-Sik Jeong:
Integrated Multi Mobile Object Scheme for Ubiquitous Sensor Network. 1-6
Database and data mining
- Liu Yang, Chunping Li, Ming Gu:
Extracting Content from Web Pages Using the Sliding Window. 1-6 - Shan-Tai Chen, Shih-Min Lin, Chi-Yii Tang, Guei-Yu Lin:
An Improved Algorithm for Completely Hiding Sensitive Association Rule Sets. 1-6 - Pranav Khaitan, Satish Kumar M, Korra Sathya Babu, Sanjay Kumar Jena:
Improved Query Plans for Unnesting Nested SQL Queries. 1-6 - Kuo-Yuan Hwa, Di-Shuan Chiang, Chen-Wen Yao:
Target Identification of an Antibacterial Compound from Data Mining of 2-D Gel Images. 1-6 - Yunming Ye, Xutao Li, Biao Wu, Yan Li:
Feature Weighting Information-Theoretic Co-Clustering for Document Clustering. 1-6 - Rasha Osman, Irfan Awan, Michael E. Woodward:
Towards a Performance Evaluation Model for Database Designs. 1-6
Mobile and ubiquitous computing
- Faridah Hani Mohamed Salleh, Zaihisma Che Cob, Mohana Shanmugam, Siti Salbiah Mohamed Shariff:
Review on Mobile Workforce Management System for Electricity Supply Industries. 1-5 - Madhusoodan Parthasarathy, Min Sik Kim:
Routing in the Presence of Groups in Mobile Ad Hoc Networks. 1-8 - Kezhong Liu, Ji Xiong, Yongqiang Cui, Dong Han:
A Fine-Grained Localization Scheme Using a Mobile Beacon Node for Wireless Sensor Networks. 1-6 - Chuan Chen, Ke-Wei Lv, Yi-Xin Zhu:
A Paillier Based Threshold Signature Scheme. 1-6
Artificial intelligence
- Yeong Hyeon Gu, Seong Joon Yoo:
Mining Comparative Sentences from Korean Text Documents Using Sentential Structure Analysis Combined with Machine Learning Techniques. 1-6 - M. Arfan Jaffar, Qurat-ul-Ain Aini, Sohail Masood Bhatti, Muhammad Amjad Iqbal, Arshad Javed, Anwar M. Mirza:
Fuzzy Curvelet Based Fully Automated Segmentation of Brain from MR Images. 1-6 - Jungan Chen, Feng Liang, Wenxin Chen:
Hybrid Immune Detector Maturation Algorithm with LifeCycle Model. 1-6 - Shan-Tai Chen, Hong-Zhe Luo, Tsung-Chun Li, Wann-Jin Chen:
A Soft Computing Approach to Rainfall Intensity Classification Using TRMM/TMI Data. 1-6 - Kashif Zafar, Abdul Rauf Baig, Shahzad Badar Qazi, Hasnat Naveed:
Multi Agent Based Mine Detection and Route Planning Using Learning Real Time A* Algorithm. 1-7
Web and internet computing
- Chen-Chung Chi, Nai-Lung Tsao, Chin-Hwa Kuo:
A Time Influence Analysis for Web Page Recommender System. 1-6 - KwangHo Yoon, Jaekwang Kim, Seunghoon Lee, Jee-Hyong Lee:
An Approach of Splitting Web Sequential Access Log for Accurate Web Recommendation. 1-5 - Sam Chung, Daehee Won, Seung-Ho Baeg, Sangdeok Park:
A Model-Driven Scrum Process for Service-Oriented Software Reengineering: mScrum4SOSR. 1-8 - Zhao Wu, Naixue Xiong, Lei Yuan, Xiong Wei, Jong Hyuk Park:
Modeling and Analysis of the Execution Context in WS-BPEL. 1-6
Game and software engineering
- Kwan Yong Sim, Chin S. Low, Fei-Ching Kuo:
Automatic Testing of Financial Charting Software Component: A Case Study on Point and Figure Chart. 1-7 - Younghee Kim, Soon Hyoung Pyo, Bonki Koo:
A Method for Immiscible Fluid Simulation. 1-4 - Zahid Halim, Abdul Rauf Baig:
Automatic Generation of Interesting Games. 1-6 - Seyed Hossein Iranmanesh, Seyed Mostafa Alem, Eisa Maleki Berneti:
Project Risk Assessment for Customer Relationship Management Using Adaptive Nero Fuzzy Inference System (ANFIS). 1-7
Computing and its applications
- Mohammad Rakibul Islam, Jinsang Kim:
Energy Efficient Cooperative MIMO Communication for Uncorrelated Data Transmission at Wireless Sensor Network. 1-6 - Sun-Myung Hwang:
Characteristic of Korea SW Process Certification Model. 1-4 - Dietmar Sommerfeld, Harald Richter:
A Two-Tier Approach to Grid Workflow Scheduling. 1-7 - Miao Wang, Nicolas Benoit, François Bodin:
Model-Directed Multi-Level Parallelization for Multi-Task Programs on the Cell BE. 1-6 - Danling Wang, Qin Zhang, John Morris:
Distributed Markov Chain Monte Carlo Particle Filtering. 1-5 - Xudong Zheng, Jinglei Ren, Xiaojuan Zheng, Yonglong Wei, Chen Sun:
Static Analysis of Java Source Code to Generate Security-Relevant Behavior Model Based on Extended Pushdown Automaton. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.