default search action
6th ICUIMC 2012: Kuala Lumpur, Malaysia
- Suk-Han Lee, Lajos Hanzo, Roslan Ismail, Dongsoo S. Kim, Min Young Chung, Sang-Won Lee:
The 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC '12, Kuala Lumpur, Malaysia, February 20-22, 2012. ACM 2012, ISBN 978-1-4503-1172-4
Radio resource management
- BeomSeok Kim, Jinsung Cho:
A novel priority-based channel access algorithm for contention-based MAC protocol in WBANs. 1:1-1:5 - Van-Duc Nguyen, Duyen Trung Ha, Van Tien Pham, Trung Dung Nguyen, Nga Nguyen Thu, Hyunseung Choo:
OFDMA-based MAC protocol for adhoc and multihop networks. 2:1-2:7 - Sangtae Lee, Chunsoo Ahn, Taemin Cho, Jiho Park, Jitae Shin:
Dynamic frequency allocation of femtocells for guaranteed macrocell throughput in OFDMA networks. 3:1-3:5 - Saransh Malik, Dahee No, Daejin Kim, Sangmi Moon, Se Young Kim, Intae Hwang, Bora Kim, Jin Lee:
Smart cooperative relay schemes in LTE-advanced system. 4:1-4:7
Web and social computing
- Eunsoo Shim, Varun Singla, Venkatesh Krishnaswamy:
Application frameworks and methods for assisting tracking of actionable items. 5:1-5:7 - Elham Hoseini, Sattar Hashemi, Ali Hamzeh:
A levelwise spectral co-clustering algorithm for collaborative filtering. 6:1-6:6 - Ken Kuroiwa, Ryuya Uda:
A low cost privacy protection method for SNS by using Bloom filter. 7:1-7:7 - Chao Chen, Liang He, Xin Lin:
REV: extracting entity relations from world wide web. 8:1-8:5
Knowledge from information
- Damien Eklou, Yasuhito Asano, Masatoshi Yoshikawa:
How the web can help Wikipedia: a study on information complementation of Wikipedia by the web. 9:1-9:10 - Su-Do Kim, Seon-Yeong Kim, Hwan-Gue Cho:
A model for popularity dynamics to predict hot articles in discussion blog. 10:1-10:8 - Junpei Yamaguchi, Ryuya Uda:
Proposal of privacy protection system for web forms using Bloom filter. 11:1-11:6 - Nansu Zong, Dong-Hyuk Im, Sung-Kwon Yang, Hyun Namgoong, Hong-Gee Kim:
Dynamic generation of concepts hierarchies for knowledge discovering in bio-medical linked data sets. 12:1-12:5
Wireless sensor networks
- Wei Min, Keecheon Kim, Ping Wang:
A traffic management scheme using multi-channel sniffer for secure wireless networks. 13:1-13:8 - Parkpoom Manoyut, Wannarat Suntiamorntut:
Modified local repair in AODV for LoWPANs. 14:1-14:5 - Lih-Chyau Wuu, Chi-Hsiang Hung, Chia-Ming Chang:
Quorum-based key management scheme in wireless sensor networks. 15:1-15:6 - Sajal K. Das, A. Di Saverio, Giacomo Ghidini, Alfredo Navarra, Maria Cristina Pinotti:
Broadcast analysis in dense duty-cycle sensor networks. 16:1-16:8
A little bit of everything
- Chi-Yao Weng, Chun-I Fan, Chin-Feng Lee, Shiuh-Jeng Wang:
Predictive pixel differencing expansion in data reversibility scheme. 17:1-17:7 - Hyun-Kyo Oh, Seok-Ho Yoon, Sang-Wook Kim:
Hierarchical clustering and outlier detection for effective image data organization. 18:1-18:5 - Ju-Geon Pak, Kee-Hyun Park:
Efficient message encoding method for personal health device monitoring system. 19:1-19:7 - Yasuhiro Nakamura, Ryuya Uda, Yusuke Watanabe:
Proposal of document protection system by poisoning. 20:1-20:7
Computer vision and machine learning
- Nguyen Tran Lan Anh, Young-Chul Kim, Gueesang Lee:
Morphological gradient applied to new active contour model for color image segmentation. 21:1-21:8 - Sukhan Lee, Khanh Trong Mai, WoongJi Jeong:
Virtual high dynamic range imaging for robust recognition. 22:1-22:6 - Nguyen Cao Truong Hai, Do-Yeon Kim, Hyuk-Ro Park:
Scale and orientation matching for texture analysis and recognition. 23:1-23:7 - Hai-Trieu Pham, Yonggwan Won, Jung-Ja Kim:
Controlling multi-class error rates for MLP classifier by bias adjustment based on penalty matrix. 24:1-24:9
Smart communication in mobile device
- Kwanghwi Kim, Sora Kim, Hwan-Gue Cho:
A compact photo browser for smartphone imaging system with content-sensitive overlapping layout. 25:1-25:8 - Shoko Wakamiya, Ryong Lee, Kazutoshi Sumiya:
Crowd-sourced urban life monitoring: urban area characterization based crowd behavioral patterns from Twitter. 26:1-26:9 - Seon-Yeong Kim, Sung-Hwan Kim, Hwan-Gue Cho:
Developing a system for searching a shop name on a mobile device using voice recognition and GPS information. 27:1-27:8 - Pengyan Yao, Zheng Hu, Zhenzhen Zhao, Noël Crespi:
A study of social behavior in collaborative user generated services. 28:1-28:6 - Weiwei Yuan, Sungyoung Lee, Yongkoo Han, Donghai Guan, Young-Koo Lee:
Efficient routing on finding recommenders for trust-aware recommender systems. 29:1-29:6
System software I (next-generation wireless networks)
- Jaheon Gu, Sueng Jae Bae, Bum-Gon Choi, Min Young Chung:
Mode selection scheme considering transmission power for improving performance of device-to-device communication in cellular networks. 30:1-30:6 - Jun Lee, Sungwon Lee, Choong Seon Hong, Thant Zin Oo, Heeyoung Jung:
Design of handover scheme for IEEE 802.22 WRAN. 31:1-31:9 - Jun Suk Kim, Inshil Doh, Bum-Gon Choi, Min Young Chung:
Downlink scheduling scheme based on estimation of channel quality at the crossed timeslot for effective resource allocation in LTE-advanced system. 32:1-32:6 - InJae Song, Sungwon Lee:
Seamless link quality guaranteed handover scheme over experimental IEEE 802.21 MIH testbed. 33:1-33:5 - Jongho Park, Jaeyoung Lee, Heesun Han, Tae-Jin Lee:
Adaptive line code selection by identification efficiency for RFID systems. 34:1-34:4 - Youngjoo Han, Chan-Hyun Youn, Dong-Ki Kang:
Adaptive management framework for scientific workflow applications. 35:1-35:5
Information infrastructure
- Jaein Kim, Pilsun Choi, Buhyun Hwang:
Real-time sequential pattern mining for USN system. 36:1-36:6 - Dongsoo S. Kim, James P. Walsh:
Modelling irregular samples for analyzing the risk of complications of diabetes mellitus. 37:1-37:5 - G. Subrahmanya V. R. K. Rao, Vivek Diwanji, Jinka Parthasarathi:
Application case study of machine learning techniques towards a fault diagnosis system for a manufacturing plant environment. 38:1-38:4 - Yu Liu, Li Hao, Dongjie Zhao:
Feature selection in text categorization based on cloud model. 39:1-39:4 - Yun-Jung Lee, Changkwon Cho, Gyun Woo:
IssueGalaxy: interactive visualizing tools for the current issues in an internet discussion site. 40:1-40:5
System software II (cloud computing and information management)
- Biao Song, Wei Tang, Eui-nam Huh:
Novel isolation technology and remote display protocol for mobile thin client computing. 41:1-41:7 - Junghoon Kim, Inhyuk Kim, Young Ik Eom:
Code-based cache partitioning for improving hardware cache performance. 42:1-42:5 - Jong-Phil Kim, Jang-Eui Hong, Jae-Young Choi, Young-Hwa Cho:
Dynamic service orchestration for SaaS application in web environment. 43:1-43:6 - Sunju Oh, Heon Young Yeom:
A social network extraction based on relation analysis. 44:1-44:5 - Seungmin Kang, Shin Gyu Kim, Hyeonsang Eom, Heon Young Yeom:
Towards workload-aware virtual machine consolidation on cloud platforms. 45:1-45:4 - Dongwoo Lee, Hyung Kook Jun, Wontae Kim, Young Ik Eom:
DyKA: light-weight dynamic kernel analyzing framework based on binary translation method. 46:1-46:4
Network management and applications
- Sangbae Shin, Weidong Su, Jinsung Cho:
A game theory model to support QoS in overlapped WBAN environment. 47:1-47:4 - Audie Sumaray, S. Kami Makki:
A comparison of data serialization formats for optimal efficiency on a mobile platform. 48:1-48:6 - Murlikrishna Viswanathan, Myung-Kyu Yi, Sung-Yeol Yun, Seok-Cheon Park, Young-Kyu Yang:
A novel local mobility anchor selection scheme for proxy mobile IPv6 networks. 49:1-49:5
Modulation and coding
- Hong-Chuan Yang, Sung Sik Nam, Dong In Kim:
Exact performance analysis of joint partial RAKE receiver and adaptive modulation subject to self-interference. 50:1-50:4 - Toqeer Ali Syed, Roslan Ismail, Shahrulniza Musa, Mohammad Nauman, Sohail Khan:
A sense of others: behavioral attestation of UNIX processes on remote platforms. 51:1-51:7 - Yichao Xu, Kouichi Sakurai:
Cooperatively securing network coding against pollution attacks with incentive mechanism. 52:1-52:10
High performance data computing
- Jaeseok Myung, Sang-goo Lee:
Matrix chain multiplication via multi-way join algorithms in MapReduce. 53:1-53:5 - Tuan A. Trieu, Yoshitoshi Kunieda:
An improvement for dEclat algorithm. 54:1-54:6 - Min-hee Yoo, Bo-Kyeong Kim, Dong-Ho Lee:
Hybrid hash index for NAND flash memory-based storage systems. 55:1-55:5 - Shariful Islam, Anna Fariha, Chowdhury Farhan Ahmed, Byeong-Soo Jeong:
EGDIM: evolving graph database indexing method. 56:1-56:10 - Vyacheslav V. Zalyubovskiy, Tatiana Aldyn-ool, Jaehyoun Kim, Hyunseung Choo:
Energy-efficient model for guaranteed area coverage in sensor networks with random deployed sensors. 57:1-57:4
Network security
- (Withdrawn) Securing SCADA communication using hybrid cryptography. 58:1-58:11
- Tran Khanh Dang, Chan Nam Ngo, Trong Nhan Phan, Nguyen Nhat Minh Ngo:
An open design privacy-enhancing platform supporting location-based applications. 59:1-59:10 - Mohammad Nauman, Sohail Khan, Abu Talib Othman, Shahrulniza Musa, Najeeb Ur Rehman:
POAuth: privacy-aware open authorization for native apps on smartphone platforms. 60:1-60:8 - Qi Zhang, Hai Jin, Xiaofei Liao, Dingding Li, Wei Deng:
FIOS: a flexible virtualized I/O subsystem to alleviate interference among virtual machines. 61:1-61:10 - Yu-Cheng Tso, Shiuh-Jeng Wang, Cheng-Ta Huang, Wei-Jen Wang:
iPhone social networking for evidence investigations using iTunes forensics. 62:1-62:7 - Vladimir V. Shakhov, Sangyep Nam, Seung-Jung Shin, Hyunseung Choo:
Potential intrusions in wireless networks. 63:1-63:5
Information management and collaboration
- Sayed Aziz Sayed Hussin, Mohd Nazri Ismail, Hannah Sofian:
Intelligent flood information system via SMS (IFIS). 64:1-64:6 - Hanjae Jeong, Seungjoo Kim, Dongho Won:
On the security of an novel protocol for downloadable CAS. 65:1-65:5 - Jae Yoel Yoon, Iee Joon Kim, Ji Yeon Lim, Seung Kwan Kim, Ung-Mo Kim:
Research to recommend influencially product group about interest through the TKMA (Transformed K-Means Algorithm). 66:1-66:4 - Sang-il Song, Sangkeun Lee, Sungchan Park, Sang-goo Lee:
Determining user expertise for improving recommendation performance. 67:1-67:5 - Muhammad Asif, John Krogstie:
Identifying problem frames for location-based services. 68:1-68:6 - Zafar Khaydarov, Teemu Henrikki Laine, Silvia Gaiani, Jinchul Choi, Chaewoo Lee:
Context-aware agriculture organizer. 69:1-69:9 - Marek Golinski, Magdalena Graczyk, Maciej Szafranski, Waldemar Prussak, Tomasz Skawinski:
Technological and organizational determinants of information management in the urban space (based on scientific research). 70:1-70:10 - Philip DePalo, Yeong-Tae Song:
Healthcare interoperability through enterprise architecture. 71:1-71:6 - Toan Nguyen Dinh, Jeong Hwan Kim, Gueesang Lee:
Automatic restoration of corrupted regions in images using object width transform. 72:1-72:5 - Heemoon Chae, Jooik Jung, Jong-Hyuk Lee, Kyong-Ho Lee:
An efficient access control based on role attributes in service oriented environments. 73:1-73:7 - Dong-Hyuk Im, Nansu Zong, Eung-Hee Kim, Seokchan Yun, Hong-Gee Kim:
A hypergraph-based storage policy for RDF version management system. 74:1-74:5 - Ming-Yen Lin, Cheng-Tai Fu, Sue-Chen Hsueh:
Incremental update on probabilistic frequent itemsets in uncertain databases. 75:1-75:8 - Ming-Yen Lin, Pei-Yu Lee, Sue-Chen Hsueh:
Apriori-based frequent itemset mining algorithms on MapReduce. 76:1-76:8 - Jaein Kim, Pilsun Choi, Buhyun Hwang:
Real-time pattern map mining for USN application. 77:1-77:5 - Peng Gao, Hao Han:
From toys to products: a step towards supporting the robust reuse and integration on the web. 78:1-78:9 - Muhammad Bilal Amin, Wajahat Ali Khan, Ammar Ahmad Awan, Sungyoung Lee:
Intercloud message exchange middleware. 79:1-79:7 - Jinhee Park, Sungwoo Lee, Hye-Wuk Jung, Jee-Hyong Lee:
Topic word selection for blogs by topic richness using web search result clustering. 80:1-80:6 - Tsozen Yeh, Yenlin Pan:
Improving the performance of the web proxy server through group prefetching. 81:1-81:8 - Seung Hyun Yoon, Kyung Min Lee, Yong Seok Kim, Seong Jin Cho, Dong Won Choi, Key Ho Kwon, Kil Jae Kim, Jong Hyun Park, Jae Wook Jeon:
The profiling method in multicore processor for effective performance improvement. 82:1-82:4 - Peng Gao, Hao Han, Takehiro Tokuda:
IAAS: an integrity assurance service for web page via a fragile watermarking chain module. 83:1-83:10 - Lars Frank, A. V. Senthil Kumar:
Architecture for mobile control functions in supplier deliveries for distributed integrated ERP modules. 84:1-84:8
Intelligent information processing & social interaction
- Adidah Lajis, Normaziah Abdul Aziz:
NL scoring and Bloom competency test: an experimental result. 85:1-85:5 - Asmatullah Chaudhry, Mehdi Hassan, Asifullah Khan, Jin Young Kim, Tran Anh Tuan:
Image clustering using improved spatial fuzzy C-means. 86:1-86:7 - Jinka Parthasarathi, G. Subrahmanya V. R. K. Rao, Karthik Sundararaman:
ClaimPerfect: an application case study of machine learning techniques towards a fraud management system for warranty claims processing. 87:1-87:6 - Dong Won Kang, Jin-Seung Choi, Han-Su Kim, Ho Sang Oh, Jeong Woo Seo, Jeong-Whan Lee, Gye Rae Tack:
Wireless gait event detection system based on single gyroscope. 88:1-88:4 - Jaesung Yoo, Hanjae Jeong, Dongho Won:
A method for secure and efficient block cipher using white-box cryptography. 89:1-89:8 - Hamidah Jantan, Abdul Razak Hamdan, Zulaiha Ali Othman:
Intelligent DSS for talent management: a proposed architecture using knowledge discovery approach. 90:1-90:7 - Toshiaki Miyazaki, Yuki Kasama:
Estimation of the number of humans and their movement paths in a room using binary infrared sensors. 91:1-91:7 - Jong-Hwan Kim, Jin Whan Kang, Sang Yun Shin, Min Jang, Vu Thi Trang, Sang-Hyo Kim:
Rate-adaptive polar codes for distributed source coding. 92:1-92:5 - Hao-Kuan Tso, Der-Chyuan Lou:
Medical image protection using secret sharing scheme. 93:1-93:4 - Akika Yamashita, Saeko Iwaki, Masato Oguchi:
An evaluation of input data quality of lifelog analysis application with a framework based on quantitative index. 94:1-94:8 - Do Yen, Soo-Hyung Kim, Sang-Cheol Park, Ha Le, Yanjuan Chen, Sun Hwa Jeong, In Seop Na:
Generation of training database using a noise model for OCR systems. 95:1-95:6 - Murlikrishna Viswanathan, Zhen-Xing Zhang, Xue-Wei Tian, Joon S. Lim:
Emotional-speech recognition using the neuro-fuzzy network. 96:1-96:5 - Qian Zhang, Sung-Jong Eun, Hyeonjin Kim, Taeg Keun Whangbo:
An object recognition method using the improved snake algorithm. 97:1-97:5 - Kulwadee Somboonviwat:
Web community analysis and its application to language specific crawling. 98:1-98:5 - Bernhard Scholz, Sang-Min Choi, Sang-Ki Ko, Hae-Sung Eom, Yo-Sub Han:
A recommendation system based on a subset of raters. 99:1-99:9 - Jong-Hyun Lee, Hyun-Tae Kim, Chang Wook Ahn:
Foraging swarm robots system adopting honey bee swarm for improving energy efficiency. 100:1-100:4 - Wajahat Ali Khan, Asad Masood Khattak, Sungyoung Lee, Maqbool Hussain, Muhammad Bilal Amin, Khalid Latif:
Achieving interoperability among healthcare standards: building semantic mappings at models level. 101:1-101:9 - Jungsik Hwang, Kwangsu Cho:
Designing vibrotactile devices for teaching English intonation. 102:1-102:4 - Hamzah Asyrani Sulaiman, Abdullah Bade, Mohd Harun Abdullah:
Development of real-time virtual environment with hierarchical construction. 103:1-103:6 - Iee Joon Kim, Jae Yoel Yoon, Ji Yeon Lim, Seung Kwan Kim, Ung-Mo Kim:
Integration of opinion mining service flow with anonymous information. 104:1-104:4 - Dong Hee Shin, Tayang Kim:
Enabling the smart city: the progress of u-city in Korea. 105:1-105:7 - Dahlan Bin, Abdul Ghani:
Dissemination of "Seri Rama" Shadow Play puppet as a cultural heritage through Capcom's Street Fighter IV. 106:1-106:7 - Alton Yeow-Kuan Chua:
Social computing in tourism websites. 107:1-107:4
Networking & distributed computing
- Zilong Jin, Jinsung Cho:
An analysis on adaptive cluster ratio in wireless sensor networks. 108:1-108:4 - Daegil Yoon, Jihoon Kim, Sungho Hwang, Chunghee Lee:
Adaptive ED scan for 802.15.4 based wireless personal area networks. 109:1-109:8 - Muhammad Alam, Mohd Su'ud Mazliham, Patrice Boursier, Shahrulniza Musa, Jawahir Che Mustapha Yusuf:
Terrain/clutter based location prediction by using multi-condition Bayesian decision theory. 110:1-110:9 - Kyung-Hoon Lee, Won-Joon Hwang, Hyung-Jin Choi:
An enhanced ranging algorithm for fixed wireless communication system. 111:1-111:5 - Dongyul Lee, Hyunchul Shin, Chaewoo Lee:
Game theory-based resource allocation strategy for clustering based wireless sensor network. 112:1-112:5 - Klaithem Al Nuaimi, Mariam Al Nuaimi, Nader Mohamed, Imad Jawhar, Khaled Shuaib:
Web-based wireless sensor networks: a survey of architectures and applications. 113:1-113:9 - Jong-Tae Park, Seung-Man Chun:
Simple mobility management protocol based on P2P for global IP mobility support. 114:1-114:6 - Dmitry Podkorytov, Alexey S. Rodionov, Hyunseung Choo:
Agent-based simulation system AGNES* for networks modeling: review and researching. 115:1-115:4 - Sangdeok Kim, Seong-Hyun Jang, Jong-Wha Chong:
Hybrid RSS/TOA wireless positioning with a mobile anchor in wireless sensor networks. 116:1-116:8 - Usman Mansoor, Taekkyeun Lee, Usman Mehmood, Ki-Hyung Kim:
Cluster-based AAA architecture for wireless sensor and WiMax networks. 117:1-117:10 - Md. Ali-Al-Mamun, Md. Motaharul Islam, Seung-Un Choe, Eui-nam Huh:
SCTP based protocol architecture for multihomed thin client. 118:1-118:5 - Saeko Iwaki, Tutomu Murase, Masato Oguchi:
Throughput analysis and measurement on real terminal in multi-rate wireless LAN. 119:1-119:5 - Tamal Adhikary, Amit Kumar Das, Md. Abdur Razzaque, Md. Obaidur Rahman, Choong Seon Hong:
A distributed wake-up scheduling algorithm for base stations in green cellular networks. 120:1-120:7 - Youngpo Lee, Jong In Park, Seokho Yoon:
Pilot-assisted IFO estimation schemes for DVB-T systems. 121:1-121:4 - P. N. Ali Fahmi, Vo Quang Viet, Deokjai Choi:
Semi-supervised fall detection algorithm using fall indicators in smartphone. 122:1-122:9 - Sung-Yeol Yun, Seok-Cheon Park:
Design and implementation of quality measurement tools in wireless data services. 123:1-123:7 - Seong Jin Cho, Kyung Min Lee, Yong Seok Kim, Seung Hyun Yoon, Dong Won Choi, Key Ho Kwon, Kil Jae Kim, Jong Hyun Park, Jae Wook Jeon:
Real user-environment migration between heterogeneous ISA platforms. 124:1-124:9 - Xinmiao Zhang, Jea Hack Lee, Myung Hoon Sunwoo:
Phase recovery for QPSK transmission without using complex multipliers. 125:1-125:4 - Shin-Hun Kang, Jae-Hyun Kim:
Multi-connection selection scheme in heterogeneous wireless networks. 126:1-126:5 - Ju-Yeon Jo, Yoohwan Kim, Kyu-Hwan Lee, Sung Hyun Cho, Jae-Hyun Kim:
The energy saving strategy using the network coding in the wireless mesh network. 127:1-127:4 - Taha A. Khalaf, Young Jin Chun, Dong In Kim:
MIMO relaying in random linear coded multiple-access relay network. 128:1-128:5 - Ekram Hossain, Dong In Kim:
Constrained weighted sum rate maximization for multicast service in downlink OFDMA. 129:1-129:6 - Denis A. Migov, Olga K. Rodionova:
Calculating two-terminal reliability in a diameter constrained network with cutnodes. 130:1-130:6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.