default search action
9th IMCOM 2015: Bali, Indonesia
- Dongsoo S. Kim, Sang-Wook Kim, Suk-Han Lee, Lajos Hanzo, Roslan Ismail:
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, IMCOM 2015, Bali, Indonesia, January 08 - 10, 2015. ACM 2015, ISBN 978-1-4503-3377-1 - Bruno V. Coutinho, Emílio C. G. Wille, Hermes Irineu Del Monego:
Performance of routing protocols for VANETs: a realistic analysis format. 1:1-1:6 - Dongxu Jin, Fei Shi, JooSeok Song:
Cluster based emergency message dissemination scheme for vehicular ad hoc networks. 2:1-2:8 - Sujata Pal, Sudip Misra:
Contact-based routing in DTNs. 3:1-3:6 - Nga Ly-Tu, Thuong Le-Tien, Phuong Vo-Thi-Luu, Linh Mai:
Particle filter through Kullback-Leibler distance resampling with adjusted variance and gradient data for wireless biomedical sensor networks. 4:1-4:5 - Nozomi Takeuchi, Ryuya Uda:
Password security enhancement method by flick input with considering the floor shake. 5:1-5:8 - Mahmood Ahmad, Byeong Ho Kang, Sungyoung Lee:
ReSet: a protocol for private matching. 6:1-6:6 - Pankaj Thorat, Syed M. Raza, Dung T. Nguyen, Giyeol Im, Hyunseung Choo, Dongsoo S. Kim:
Optimized self-healing framework for software defined networks. 7:1-7:6 - Teh FarahinAzahar, Manmeet Mahinderjit Singh, Rohail Hassan:
RFID-enabled supply chain detection using clustering algorithms. 8:1-8:8 - Kifayat-Ullah Khan, Waqas Nawaz, Young-Koo Lee:
Lossless graph summarization using dense subgraphs discovery. 9:1-9:7 - Jieun Lee, BeomSeok Kim, Jinsung Cho:
A distributed multi-coloring algorithm for coexistence mitigation in WBANs. 10:1-10:5 - Dong Hun Lee, Kyung-Hoon Lee, Hyung-Jin Choi:
An iterative sort based resource scheduling for long distance airborne tactical communication in hub network. 11:1-11:4 - Vladimir V. Shakhov, Denis A. Migov, Alexey S. Rodionov:
Operation strategy for energy harvesting wireless sensor networks. 12:1-12:5 - Hyun Lee, Ho-Jin Hwang, Thang Le Duc, Min Han Shon, Hyunseung Choo, Dongsoo S. Kim:
Restructuring binomial trees for delay-aware and energy-efficient data aggregation in wireless sensor networks. 13:1-13:4 - Yasmin Yahya, Roslan Ismail:
Application of principal component analysis (PCA) in taxonomy research to derive plant functional types for use in dynamics models. 14:1-14:6 - Zahoor Ahmad, Musarrat Hussain, Abdur Rehman, Usman Qamar, Muhammad Afzal:
Impact minimization of requirements change in software project through requirements classification. 15:1-15:5 - Shahrinaz Ismail, Mohd Sharifuddin Ahmad:
A goal-based framework on contextual requirements modelling for agent-mediated continual quality improvement (aCQI) in curriculum design. 16:1-16:8 - Firas Layth Khaleel, Noraidah Sahari Ashaari, Tengku Siti Meriam, Tengku Wook, Amirah Ismail:
The study of gamification application architecture for programming language course. 17:1-17:5 - Ali Abbas, Chung-Jae Lee, Ki-Il Kim:
Delay bounded spray and wait in delay tolerant networks. 18:1-18:4 - Jung Wan Shin, Jun Suk Kim, Syed Tariq Shah, JungSook Bae, Min Young Chung:
Performance analysis with dynamic beam control using millimeter-wave band on 5G mobile communications. 19:1-19:6 - William Aiken, Jungwoo Ryoo, Hyoungshick Kim:
KaaSP: keying as a service provider for small and medium enterprises using untrusted cloud services. 20:1-20:6 - Faouzi Jaïdi, Faten Labbene Ayachi:
The problem of integrity in RBAC-based policies within relational databases: synthesis and problem study. 21:1-21:8 - Chuan Pham, Nguyen Hoang Tran, Cuong T. Do, Choong Seon Hong:
Live consolidation for data centers in cloud environment. 22:1-22:7 - Cong-Thinh Huynh, Huu-Quoc Nguyen, Xuan-Qui Pham, Tien-Dung Nguyen, Eui-Nam Huh:
Cloud-based real-time location tracking and messaging system: a child-care case study. 23:1-23:7 - Hayun Kim, Juhee Suh, Jaeyeon Ahn, Jungwha Kim:
Constructing a semantic wiki for living cultural heritage: case study of Korean tea culture. 24:1-24:4 - Rita Zaharah Wan-Chik:
Information credibility assessment of Islamic and Quranic information on the web. 25:1-25:7 - Dahlan Bin Abdul Ghani:
Wayang fighters: preserving the art of wayang kulit (shadow puppets) through game application. 26:1-26:7 - Shamsul Anuar Mokhtar, Siti Mashitah Shamsul Anuar:
Learning application for Malaysian sign language: content design, user interface and usability. 27:1-27:6 - Myzan Binti Noor:
The interactive technological devices: play or learn? 28:1-28:9 - Tung Duy Ta, Duc Anh Le, Mai Thi Le, Toan Van Tran, Tuan Trong Do, Van-Duc Nguyen, Chien Van Trinh, Byeungwoo Jeon:
Automatic number plate recognition on electronic toll collection systems for Vietnamese conditions. 29:1-29:5 - Seyoung Park, Dong-Hee Shin:
Effects of text input system on learner's memory: handwriting versus typing on tablet PC. 30:1-30:4 - Ahsanullah, Suziah Sulaiman, Ahmad Kamil Mahmood, Muzafar Khan:
Investigation of fingertip contact area and shape for precise target selection on multi-touch screen. 31:1-31:6 - Farahwahida Mohd, Ezri Hielmi Che Daud, Ibrahim Elzibair:
The usage of online assessment towards self-efficacy readiness in learning. 32:1-32:4 - Shingo Yokoyama, Ryuya Uda:
A proposal of preventive measure of pursuit using a browser fingerprint. 33:1-33:7 - Dung T. Tran, Anh N. Nguyen:
New filter techniques to improve the accuracy of available bandwidth measurement. 34:1-34:8 - José Costa-Requena, Vicent Ferrer Guasch, Jesus Llorente Santos:
Software defined networks based 5G backhaul architecture. 35:1-35:5 - Kenji Takahashi, Hiroyasu Obata, Tutomu Murase, Kenji Ishida:
Throughput improvement method exploiting capture effect in densely placed WLANs. 36:1-36:6 - Ai Hayakawa, Saneyasu Yamaguchi, Masato Oguchi:
Reducing the TCP ACK packet backlog at the WLAN access point. 37:1-37:8 - Misako Goto, Toru Shirato, Ryuya Uda:
HTK analysis of text-based CAPTCHA using phonemic restoration effect and similar pronunciation with an Asian accent. 38:1-38:8 - Mitra Dirin, Amir Dirin, Teemu Henrikki Laine:
User-centered design of a context-aware nurse assistant (CANA) at Finnish elderly houses. 39:1-39:8 - Youhyun Shin, Yeonchan Ahn, Hyuntak Kim, Sang-goo Lee:
Exploiting synonymy to measure semantic similarity of sentences. 40:1-40:4 - Omaima Almatrafi, Suhem Parack, Bravim Chavan:
Application of location-based sentiment analysis using Twitter for identifying trends towards Indian general elections 2014. 41:1-41:5 - Kseniya A. Nechunaeva, Denis A. Migov:
Speeding up of genetic algorithm for network topology optimization with use of cumulative updating of network reliability. 42:1-42:4 - G.-A. Lusilao Zodi, Gerhard P. Hancke, Gerhard P. Hancke, Antoine B. Bagula:
Enhanced centroid localization of wireless sensor nodes using linear and neighbor weighting mechanisms. 43:1-43:8 - Stepan Khapugin, Alexey S. Rodionov:
Modeling grouped failures in network reliability analysis. 44:1-44:5 - Young Min Kwon, Syed Tariq Shah, Min Young Chung, JaeSheung Shin, Aesoon Park:
Performance analysis of small-cell base station with cellular and WiFi RATs. 45:1-45:5 - Taras Maksymyuk, Stepan Dumych, Olena Krasko, Minho Jo:
Software defined optical switching for cloud computing transport systems. 46:1-46:2 - Phuong Luu Vo, Tuan-Anh Le, Choong Seon Hong, Seung Il Moon, Sungwon Lee, Nga Ly-Tu:
Cooperative caching for adaptive bit rate streaming in content delivery networks. 47:1-47:5 - Thien Huynh-The, Oresti Banos, Sungyoung Lee, Yongik Yoon, Thuong Le-Tien:
A novel watermarking scheme for image authentication in social networks. 48:1-48:8 - Kisung Park, Yongkoo Han, Tae Ho Hur, Young-Koo Lee:
Correlated subgraph search for multiple query graphs in graph streams. 49:1-49:7 - Jeongho Kim, Jonghee Park, Eunseok Lee:
A new hybrid algorithm for software fault localization. 50:1-50:8 - Prabir Saha, Deepak Kumar, Abhijit Sharma:
Implementation of high speed processor for computing convolution sum for DSP applications. 51:1-51:6 - Deepak Kumar, Abhijit Sharma, Prabir Saha:
Integer division technique for signal processing applications. 52:1-52:4 - Hyunku Lee, Junghoon Kim, Donghyun Kang, Young Ik Eom:
Minimizing consistency-control overhead with rollback-recovery for storage class memory. 53:1-53:6 - Venki Balasubramanian, Andrew Stranieri, Ranjit Kaur:
AppA: assistive patient monitoring cloud platform for active healthcare applications. 54:1-54:8 - Syed Rizvi, Jungwoo Ryoo, John Kissell, Bill Aiken:
A stakeholder-oriented assessment index for cloud security auditing. 55:1-55:7 - Atsuko Takefusa, Hidemoto Nakada, Tsutomu Ikegami, Yoshio Tanaka:
A highly available distributed self-scheduler for exascale computing. 56:1-56:8 - Kihong Lee, Dongwoo Lee, Young Ik Eom:
Power-efficient and high-performance block I/O framework for mobile virtualization systems. 57:1-57:7 - Sung-Hwan Kim, Hwan-Gue Cho:
A new approach for approximate text search using genomic short-read mapping model. 58:1-58:8 - Taketoshi Ushiama, Noboru Matsuo:
A method for finding similes to support final selection from search results. 59:1-59:4 - Won-Seok Hwang, Jung Park, Sang-Wook Kim:
A method for recommending the latest news articles via MinHash and LSH. 60:1-60:6 - Koichi Iguchi, Yoshinori Hijikata, Shogo Nishida:
Individualizing user profile from viewing logs of several people for TV program recommendation. 61:1-61:8 - Kyung-Wook Park, Dong-Ho Lee:
Visual saliency detection via hypergraph based re-ranking using background priors. 62:1-62:4 - Hanjae Park, Seho Bae, Seongbeak Yoon, Lei Li, Jixuan Liu, Juneho Yi:
Discriminating between metal and near-metal pixels in X-ray CT images. 63:1-63:4 - Sang-Min Lee, Jinkwan Park, Dae-Geon Kwon, Bokuk Park, Hwan-Gue Cho, Do-Hoon Lee:
A new visualization method for pairwise time-series data with random walk plot. 64:1-64:8 - Jue-Min Lu, Jin-Chun Piao, Shin-Dug Kim:
Optimizing on real-time fluid 3D effect in mobile environment. 65:1-65:8 - Kang Han Oh, Soo-Hyung Kim, Young-Chul Kim:
Salient object detection by combining multiple color clustering. 66:1-66:8 - Tam Nguyen, Vo Quang Nhat, Young-Chul Kim, Gueesang Lee:
Tensor voting, hough transform and SVM integrated in chess playing robot. 67:1-67:7 - Huynh Trung Manh, Jungyeon Yeo, Gueesang Lee:
Saliency detection by tensor voting based Gaussian modeling. 68:1-68:8 - Minh Hieu Nguyen, HyunSu Choi, Gueesang Lee:
Text detection in scene images based on feature detection and tensor voting. 69:1-69:6 - Hyun Jae Jeon, Sang Beom Nam, Sung Un Park, Jun Hyuk Park, ChangKyoo Yoo, Jeong Tai Kim, Tae-Seong Kim:
Unsupervised 3D human pose recognition from a single depth human silhouette using a geodesic map and kinematic body model. 70:1-70:4 - Yubu Lee, KangWoo Lee:
Combining eye fixation and context-directed saliency for attentive object segmentation. 71:1-71:4 - Rahman Ali, Muhammad Hameed Siddiqi, Byeong Ho Kang, Sungyoung Lee:
KARE: a hybrid reasoning approach for promoting active lifestyle. 72:1-72:5 - Naho Iimura, Norifumi Nishikawa, Miyuki Nakano, Masato Oguchi:
A proposal of storage power control method with data placement in an environment using many HDDs. 73:1-73:8 - Byeongdae Woo, Youngjung Uh, Kwangyong Lim, Yeongwoo Choi, Hyeran Byun:
Illumination invariant color segmentation method based on cluster center tree for traffic sign detection. 74:1-74:5 - Ahmed M. Naguib, Sukhan Lee:
An adaptive evidence structure for Bayesian recognition of 3D objects. 75:1-75:8 - Taro Yabuki, Takeshi Morita, Yoshifumi Masunaga:
Formulation and verification of the body of knowledge of new discipline using WikiBOK. 76:1-76:8 - Yuki Nishi, Saneyasu Yamaguchi, Aki Kobayashi:
Video search in video sharing site based on public video lists. 77:1-77:6 - Tuan Anh Tran, In Seop Na, Soo-Hyung Kim:
Hybrid page segmentation using multilevel homogeneity structure. 78:1-78:6 - Nurdatillah Hasim, Norhaidah Abu Haris:
A study of open-source data mining tools for forecasting. 79:1-79:4 - Kyung Soo Kim, Yong Suk Choi:
Incremental iteration method for fast PageRank computation. 80:1-80:5 - GiWoong Nam, DongEun Kim, JongHyeok Lee, Hee Yong Youn, Ung-Mo Kim:
Efficient batch processing of proximity queries with MapReduce. 81:1-81:4 - Eiad Yafi, Megat F. Zuhairi:
Mining social media data: discovering contradictedness quantities. 82:1-82:4 - Toyohide Watanabe:
A proposal of smart means to retrieve impressively-referred document-page. 83:1-83:8 - Seung-Jun Cha, Yun-Jeong Choi, Kyu-Chul Lee:
Development of preservation format and archiving tool for the long-term preservation of the database. 84:1-84:4 - Suriyati Harun, Yasmin Yahya, Nurashikin Saaludin, Wan Suriyani Che Wan Ahmad:
Comparison of ordinary least square and mixed-effect regression models for estimation of tree diameter increment: a case study for dipterocarpacea in Siem Reap, Cambodia. 85:1-85:6 - Rischan Mafrur, I Gde Dharma Nugraha, Deokjai Choi:
Concept, design and implementation of sensing as a service framework. 86:1-86:4 - Saima Hassan, Abbas Khosravi, Jafreezal Jaafar:
Training of interval type-2 fuzzy logic system using extreme learning machine for load forecasting. 87:1-87:5 - Snehasish Banerjee, Alton Yeow-Kuan Chua, Jung-Jae Kim:
Using supervised learning to classify authentic and fake online reviews. 88:1-88:7 - Kyung-Eun Lee, Hyun-Seok Park:
Identifying genomic signatures of N-gram nucleotide sequences to classify the chromatin states of broad histone track. 89:1-89:7 - Azmi Ahmad, Faizah Shaari, Awang L. Zalizah:
Mining meaningful outlier using rough-negative association algorithm in heartdisease dataset. 90:1-90:7 - Azunda Zahari, Jafreezal Jaafar:
A novel approach of hidden Markov model for time series forecasting. 91:1-91:5 - Phong Nguyen Tran, Dang Tuan Nguyen:
Mapping expansion of natural language entities to DBpedia's components for querying linked data. 92:1-92:5 - Hyun Joon Kim, Sang-goo Lee:
StdSort: efficient pre-processing for faster vector similarity join using standard deviation. 93:1-93:5 - HyoungMin Ham, InHwan Kim, JooSeok Song:
An efficient offline grouping proof protocol using multiple types of tags. 94:1-94:8 - Abdul Wahid, Yasushi Sengoku, Masahiro Mambo:
Toward constructing a secure online examination system. 95:1-95:8 - Jiyi Li:
Domain specific commonsense relation extraction from bag of concepts metadata. 96:1-96:4 - Mahmood Ahmad, Zeeshan Pervez, Sungyoung Lee, Byeong Ho Kang:
Task-oriented access model for secure data sharing over cloud. 97:1-97:7 - Shafaet Ashraf, Sheikh Muhammad Sarwar, Md. Abeed Hassan, Saifuddin Md. Tareeq, Anna Fariha:
An efficient method for extracting subtrees against forest query. 98:1-98:7 - Hong Quy Nguyen, Hyung-Jeong Yang, Thao Nguyen Thieu:
Feature extraction from covariance by using kernel method for classifying polysomnographys data. 99:1-99:7 - Kyu-Yean Lee, Seong Jin Cho, Seung Hyun Yoon, Jae Wook Jeon:
Roofline measurement application. 100:1-100:6 - Faridah Sh Ismail, Nordin Abu Bakar:
Adaptive mechanism for GA-NN to enhance prediction model. 101:1-101:5 - Jaedong Lee, Noo-Ri Kim, Jee-Hyong Lee:
An over-sampling technique with rejection for imbalanced class learning. 102:1-102:6 - Han Nguyen Ho, Eunseok Lee:
Model-based reinforcement learning approach for planning in self-adaptive software system. 103:1-103:8 - Ake Osothongs, Vorapong Suppakitpaisan, Noboru Sonehara:
Evaluating the importance of personal information attributes using graph mining technique. 104:1-104:8 - Irfan Ali, Sang-Wook Kim:
Group recommendations: approaches and evaluation. 105:1-105:6 - Jungryul Seo, Yutsai Chiang, Teemu Henrikki Laine, Adil Mehmood Khan:
Step counting on smartphones using advanced zero-crossing and linear regression. 106:1-106:7 - Zeeshan Hameed Mir, Sajida Imran, Young-Bae Ko:
Neighbor-assisted data delivery to mobile sink in wireless sensor networks. 107:1-107:8 - Dabin Kim, Young-Bae Ko:
A novel message broadcasting strategy for reliable content retrieval in multi-hop wireless content centric networks. 108:1-108:8
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.