default search action
3rd ICUIMC 2009: Suwon, Korea
- Won Kim, Hyung-Jin Choi, Dongho Won:
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009. ACM 2009, ISBN 978-1-60558-405-8
Wireless LAN and mesh networks
- Wei Kuang Lai, Chin-Shiuh Shieh, Chih-Shiuan Jiang:
Performance enhancement for IEEE 802.11e networks by adaptive adjustment of the HCCA/EDCA ratio. 1-6 - Shih Tsung Liang:
Machanisms for the maintenance of MP proxy tables in IEEE 802.11s mesh networks. 7-11 - Masaaki Kuwabara, Nobuhiko Nishio:
Wi-Fi based radio map for location sensing by hypothesizing existence of barriers. 12-17 - Masashi Ito, Toshihiro Shikama, Akira Watanabe:
Proposal and evaluation of multiple gateways distribution method for wireless mesh network. 18-25 - Yuh-Chung Lin, Wei Kuang Lai, Feng-Jung Liu:
ARP-like direct link transmission scheme in WLAN. 26-31 - Miseon Choi, Wonik Park, Young-Kuk Kim:
Two-phase mobile transaction validation in wireless broadcast environments. 32-38
Data search I
- Katsumi Tanaka:
Web search and information credibility analysis: bridging the gap between Web1.0 and Web2.0. 39-44 - PaiTzu Chang:
An efficient hash-based searching for specimens in the museum's exhibit. 45-50 - Sujeet Pradhan:
Towards an integrated framework for querying collection of heterogeneous data. 51-57 - Hyunja Lee, Junho Shim:
Pivoted table index for querying product-property-value information. 58-62 - Shun Hattori, Katsumi Tanaka:
Object-name search by visual appearance and spatio-temporal descriptions. 63-70 - Masumi Shirakawa, Kotaro Nakayama, Takahiro Hara, Shojiro Nishio:
Concept vector extraction from Wikipedia category network. 71-79
Telecommunication networks
- Qing Li, An Liu, Hai Liu, Baoping Lin, Liusheng Huang, Naijie Gu:
Web services provision: solutions, challenges and opportunities (invited paper). 80-87 - Li-Hua Li, Fu-Ming Lee, Yu-Chun Chen, Chieh-Yu Cheng:
A multi-stage collaborative filtering approach for mobile recommendation. 88-97 - Djelloul Boukhelef, Hiroyuki Kitagawa:
Dynamic load balancing in RCAN content addressable network. 98-106 - Kai Liu, Victor C. S. Lee:
COS: client oriented scheduling for multi-channel on-demand broadcast. 107-114
Data search II
- Akiko Hino, Katsumi Tanaka:
Small knowledge: a concept of enhanced bookmarks with personal context. 115-122 - Akira Takahashi, Masashi Tatedoko, Hiroko Kinutani, Masatoshi Yoshikawa:
Metadata management for integration and analysis of earth observation data. 123-130 - Ken C. K. Lee, Wang-Chien Lee, Hong Va Leong, Brandon Unger, Baihua Zheng:
Efficient valid scope computation for location-dependent spatial queries in mobile and wireless environments. 131-140 - Xinzhong Zhu, Jianmin Zhao, Jie Yuan, Huiying Xu:
A fuzzy quantization approach to image retrieval based on color and texture. 141-149
Systems and applicataions I
- Iwen Huang:
The effects of personality factors on participation in online learning. 150-156 - Satoshi Nishimura, Mutsuo Sano, Katsuo Ikeda:
The design and implementation of an extensible network backup system in realtime. 157-163 - Pei-Ju Chao, Tsair-Fwu Lee, Te-Jen Su, Fu-Min Fang:
Quantitative evaluation between rival planning systems with dosimetric indices. 164-167 - Chih-Yen Wu, Shih-Hao Huang, Peng-Liang Peng, Gwo-Jia Jong:
Automatic vehicle parking system using gyroscope. 168-171
Ad-hoc networks
- Takashi Osawa, Tokuya Inagaki, Susumu Ishihara:
Implementation of hierarchical GAF, a cooperative power saving scheme for sensor networks. 172-179 - Sho Fujita, Hiroshi Esaki:
ATMOS: A middleware for Transparent MObile ad-hoc networking Systems. 180-184 - Hideya Ochiai, Hiroshi Esaki:
Message routing on potential-fields in forwarding-based DTNs. 185-193 - Ngoc Duy Pham, Hyunseung Choo:
Efficient location-aided flooding scheme initiated by receiver for MANETs. 194-199 - Khac Tiep Mai, Dongkun Shin, Hyunseung Choo:
Connectivity-based clustering with stretching technique in MANETs. 200-206
Security I
- Wen-Ya Chiang, Shiuh-Jeng Wang, Chi-Yao Weng, Cheng-Hsing Yang:
Robustness-set in watermarking embedding systems using codebook classifications. 207-215 - Chu-Hsing Lin, Fuu-Cheng Jiang, Wei-Shen Lai, Wei-Yuah Lee, Wei-Cheng Hsu:
Counteract SYN flooding using second chance packet filtering. 216-220 - Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho:
Secure RFID authentication scheme for EPC class Gen2. 221-227 - Chin-Feng Lee, Kuo-Hua Wang, Chin-Chen Chang, Yu-Lin Huang:
A reversible data hiding scheme based on dual steganographic images. 228-237 - Rung Ching Chen, Chia-Fen Hsieh, Yung-Fa Huang:
A new method for intrusion detection on hierarchical wireless sensor networks. 238-245 - Chi-Shiang Chan, Ching-Yun Chang:
An information hiding scheme by applying the dynamic programming strategy to LSB matching revisited. 246-250 - Hsing-Bai Chen, Wei-Bin Lee, Yong-Hong Zhao, Yin-Long Chen:
Enhancement of the RFID security method with ownership transfer. 251-254 - Kyu Il Kim, Won Gil Choi, Eun-Ju Lee, Ung-Mo Kim:
RBAC-based access control for privacy protection in pervasive environments. 255-259
Communication technologies
- Mong-Fong Horng, Yau-Hwang Kuo, Liang-Chien Huang, Yi-Ting Chien:
An effective approach to adaptive bandwidth allocation with QoS enhanced on IP networks. 260-264 - Dahae Chong, Sangho Ahn, Youngpo Lee, Seokho Yoon:
New synchronization schemes for UWB systems. 265-271 - Eun Cheol Kim, Jin Young Kim:
Performance of double binary turbo coded UWB systems with antenna diversity. 272-277 - Choongyong Shin, Jinsung Cho:
A preliminary study on common radio resource management in heterogeneous wireless networks. 278-282 - Jae Sung Park, Jin Young Kim:
Performance analysis of STBC-UWB systems with double binary turbo code. 283-289 - Eun-Ae Cho, Chang-Joo Moon, Hyun-Soo Im, Doo-Kwon Baik:
An anonymous communication model for privacy-enhanced location based service using an echo agent. 290-297 - Kwang-Chun Go, Jae-Hyun Kim, Seong-Hwan Oh, Kyeong-Deok Moon, Kwangil Lee:
Resource allocation algorithm considering a priority of service classes for WiMedia UWB system. 298-301 - Jae Hee Han, Myung Hoon Sunwoo:
Simplified sum-product algorithm using piecewise linear function approximation for low complexity LDPC decoding. 302-308
Security II
- Chin-Chen Chang, Shih-Chang Chang:
The design of e-traveler's check with efficiency and mutual authentication. 309-316 - Shu-Chuan Chu, Lakhmi C. Jain, Hsiang-Cheh Huang, Jeng-Shyang Pan:
The triple-watermarking algorithm with multiple description coding over lossy communication networks. 317-326 - Chia-Chen Lin, Pei-Feng Shiu:
DCT-based reversible data hiding scheme. 327-335 - Kuo-Nan Chen, Chin-Feng Lee, Chin-Chen Chang:
Embedding secret messages based on chaotic map and Huffman coding. 336-341 - Tzu-Chuen Lu, Ying-Hsuan Huang:
An efficient block-based lossless information hiding technique. 342-347
Intelligent systems
- Xiangfeng Luo, Yi Du, Fangfang Liu, Zhian Yu, Weimin Xu:
Merging element fuzzy cognitive maps. 348-355 - Al-Sakib Khan Pathan, Choong Seon Hong:
Bilinear-pairing-based remote user authentication schemes using smart cards. 356-361 - Eun Ho Kim, Sonya S. Kwak, Jeonghye Han, Yoon Keun Kwak:
Evaluation of the expressions of robotic emotions of the emotional robot, "Mung". 362-365
Systems and applications II
- Masato Oguchi:
Research works on cluster computing and storage area network. 366-375 - Li Zhao, Qing Li, Xiaoli Liu, Nanshan Du:
A modeling method based on CCS for workflow. 376-384 - Dingding Li, Hai Jin, Yingzhe Shao, Xiaofei Liao:
A high-efficient inter-domain data transferring system for virtual machines. 385-390
Systems and applicataions III
- Hai Jin, Guofu Xiang, Feng Zhao, Deqing Zou, Min Li, Lei Shi:
VMFence: a customized intrusion prevention system in distributed virtual computing environment. 391-399 - Keisuke Takemori, Masahiko Fujinaga, Toshiya Sayama, Masakatsu Nishigaki:
Host-based traceback; tracking bot and C&C server. 400-405 - Yuko Kamiya, Toshihiko Shimokawa, Norihiko Yoshida:
Scalable server system based on virtual machine duplication in wide area. 406-410 - Chang-Yu Wang, Tsair-Fwu Lee, Chun-Hsiung Fang:
A multimodality image registration framework for synchronous visualization of radiotherapy plans with longitudinal imaging studies. 411-415 - Brian J. d'Auriol, Yu Niu, Sungyoung Lee, Young-Koo Lee:
The plasma free space optical model for ubiquitous systems. 416-425
Data analysis and mining I
- Jieh-Shan Yeh, Szu-Chen Lin:
A new data structure for asynchronous periodic pattern mining. 426-431 - Tomomi Miyazaki, Toshiki Watanabe, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:
Keyword search considering user's preference in P2P networks. 432-440 - Hiroaki Ohshima, Katsumi Tanaka:
Real time extraction of related terms by bi-directional lexico-syntactic patterns from the web. 441-449 - Ok-Ran Jeong, Sang-Won Lee:
An efficient clustering framework for relevant web information. 450-456 - Hideyuki Ohtani, Takuya Kida, Takeaki Uno, Hiroki Arimura:
Efficient serial episode mining with minimal occurrences. 457-464 - Kenta Oku, Shinsuke Nakajima, Jun Miyazaki, Shunsuke Uemura, Hirokazu Kato:
A recommendation method considering users' time series contexts. 465-470 - Imam Machdi, Toshiyuki Amagasa, Hiroyuki Kitagawa:
XML data partitioning strategies to improve parallelism in parallel holistic twig joins. 471-480
Signal processing & OFDM
- Kwang Yoon Kim, Jin Young Kim:
Cyclic delay diversity for V-BLAST OFDM system. 481-487 - Kyung Hoon Won, Jung-Su Han, Hyung-Jin Choi, BonYoung Koo:
Noise insensitive sampling frequency offset estimation methods for DVB-T/H systems. 488-493 - Youngyoon Lee, Taeung Yoon, Sanghun Kim, Seokho Yoon:
New schemes of carrier frequency offset estimation for DVB systems. 494-498 - Myung-Jin Chung, Jung-Su Han, Hyung-Jin Choi, Seok-Joong Kim:
An enhanced ECCM method using OFCDM in WiBro system. 499-503 - Sang-Hun Yoon, Jin-Doo Jeong, Jong-Wha Chong:
An area reduction method for digital filter using redundancy of SD number system. 504-508 - Yeong-Sam Kim, Jong-Wha Chong:
A new filtering method for chirp spread spectrum. 509-512 - Jaehwan Kim, SungHwan Park, Jong-Wha Chong:
Peak power control algorithm for multi-processor SoC. 513-515
Systems and applications IV
- Soichiro Tokuhisa, Kunihiko Kaneko:
Representative slice method for viscous fluid registration of three-dimensional whole-body human images. 516-523 - Zeng-Wei Hong, Kai-Yi Chin, Jim-Min Lin:
Developing embodied agent-based user interface by using interactive drama markup language. 524-528 - Takanori Ueda, Yu Hirate, Hayato Yamana:
Exploiting idle CPU cores to improve file access performance. 529-535 - Daisuke Kitayama, Ryong Lee, Kazutoshi Sumiya:
A credibility analyzing method of geographical objects from digital maps. 536-543 - Long-Sheng Chen, Chun-Chin Hsu, Yu-Shan Chang:
MDS: a novel method for class imbalance learning. 544-549 - Yu-lung Lo, Ling-yi Tsai:
Real-valued feature indexing for music databases. 550-556
Sensor networks
- Gicheol Wang, Deokjai Choi, Daewook Kang:
A lightweight key renewal scheme for clustered sensor networks. 557-565 - Yuichi Sei, Shinichi Honiden:
Reporter node determination of replicated node detection in wireless sensor networks. 566-573 - Ji-Wook Kwon, Mun-Soo Park, Dongkyoung Chwa:
Localization of the mobile agent using indirect Kalman filter in distributed sensor networks. 574-579 - Soo Young Moon, Tae Ho Cho:
Energy efficient filtering method in sensor networks. 580-585 - Jaekwang Kim, KwangHo Yoon, Seunghoon Lee, Je-hee Jung, Jee-Hyong Lee:
An m-EVBT algorithm for energy efficient routing in wireless sensor networks. 586-591 - YongHwan Kim, Sungsoo Kim, Seongjoon Lee, Kwangseon Ahn:
An anti-collision algorithm without idle cycle using 4-ary tree in RFID system. 592-596 - Sang Jin Lee, Hae Young Lee, Tae Ho Cho:
Adaptive threshold determination method for the dynamic filtering in wireless sensor networks using fuzzy logic. 597-601 - Riaz Ahmed Shaikh, Young-Koo Lee, Sungyoung Lee:
Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks. 602-606
Systems and applicataions V
- Jaekyong Jeong, Chijung Hwang, Byeungwoo Jeon:
An efficient method of image identification by combining image features. 607-611 - Heejin Kim, Byoungju Choi, Seokjin Yoon:
Performance testing based on test-driven development for mobile applications. 612-617 - Mohammad Mehedi Hassan, Biao Song, Eui-nam Huh:
A framework of sensor-cloud integration opportunities and challenges. 618-626 - Moonju Park, Hong Jin Yoo, Jinseok Chae:
Analysis on quantum-based fixed priority scheduling of real-time tasks. 627-634 - Jihyun Kim, Yujung Jung, Yoonsun Lim, Myung Kim, Sunsook Noh:
An e-learning framework supporting personalization and collaboration. 635-638 - Eunyoung Cheon, JoongHo Ahn:
Virtual community 101: know your virtual community and members. 639-643
Data analysis and mining II
- Myungha Jang, Arang Rhie, Joyce Jiyoung Whang, Sanduk Yang, Hyun Seok Park:
A statistical analysis of relation degree of compound pair on online biological pathway databases. 644-649 - Jaeseok Myung, Jung-Yeon Yang, Sang-goo Lee:
PicAChoo: a tool for customizable feature extraction utilizing characteristics of textual data. 650-655 - Chowdhury Farhan Ahmed, Syed Khairuzzaman Tanbeer, Byeong-Soo Jeong, Young-Koo Lee:
Mining high utility patterns in incremental databases. 656-663 - Minsoo Lee, Yoonkyoung Lee, Boyeon Meang, Okju Choi:
A clustering algorithm using particle swarm optimization for DNA chip data analysis. 664-668 - Donghai Guan, Young-Koo Lee, Sungyoung Lee:
Activity recognition with the aid of unlabeled samples. 670-674
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.