default search action
Journal of Digital Content Technology and its Applications, Volume 2
Volume 2, Number 1, March 2008
- Kyung-Min Min, Nam-Hyuk Ham, Ju-Hyung Kim, Yoon-Sun Lee, Jae-Jun Kim:
An Application Strategy for PLM in Construction Industry. 4-10 - Hyung Rim Choi, Yavuz Keceli, Min Je Cho:
An Analysis Present Condition of Information Systems in Turkish Ports and Direction of Improvement. 11-19 - Suk-hyung Hwang, Yu-Kyung Kang:
Hierarchical Triadic Context Analysis for Folksonomy-Based Web Applications. 20-27 - Mohammad Shirali-Shahreza:
M-Brochure. 28-34 - Liang Li, Bin Li, Junwu Zhu:
Towards a Coordination Infrastructure for Pervasive Computing Environment Based on Tuplespace and Semantic Web. 35-45 - Xiuxiu Dong, Tiejun Lu, Guicai Hu:
Design and Simulation of Novel Single-Input Sampling Instance Control Circuit. 46-50 - Haining Lee, Jaeil Park, Peom Park, Dongmin Shin:
Specifying a WS-ECA Working Framework for Ubiquitous Web Services in Object-Process Methodology. 51-60 - Yoon-Su Jeong, Yong-Tae Kim, Gil-Cheol Park, Sang Ho Lee:
A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN. 61-66 - C. J. Lim, Younghwan Pan, Jane Lee:
Human Factors and Design Issues in Multimodal (Speech/Gesture) Interface. 67-77
Volume 2, Number 2, July 2008
- Robin A. Christian, Ravindra K. Lad, Ashok W. Deshpande, N. G. Desai:
Fuzzy MCDM approach for addressing composite index of water and air pollution potential of industries. 64-71 - Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khodabandeh, Ali Abdollahi:
Classification of IT Governance Tools for Selecting the Suitable One in an Enterprise. 4-10 - Tsang-Yean Lee, Huey-Ming Lee, Wuu-Yee Chen, Heng-Sheng Chen:
Processing Logical Access Control Command in Computer System. 11-15 - Young S. Han:
A Non Scale Free Attribute of Convergent Address Window for Private Messaging. 16-19 - Nik Ghazali Nik Daud, Wan Adilah Wan Adnan, Nor Laila Md. Noor:
Information Visualization Techniques and Decision Style: The Effects in Decision Support Environments. 20-24 - Chiew Kang Leng, Jane Labadin, Sarah Flora Samson Juan:
Steganography: DCT Coefficients Reparation Technique in JPEG Image. 35-41 - Usman Qayyum:
Efficiency Enhancement of Neural Network with Phase Only Correlation. 42-47 - Do-Un Jeong, Wan-Young Chung:
Development and Validation of a New Method for Noninvasive Diagnosis of LUTS. 48-54 - Hyung Moo Kim, Hoon Sung Kwak, Jae Soo Yoo:
Improved Clustering Algorithm for Change Detection in Remote Sensing. 55-59 - Hyontai Sug:
A Rule Set Generation Technique for Better Decision Making. 60-63
Volume 2, Number 3, December 2008
- Shafiullah Khan, Noor Mast, Kok-Keong Loo, Ayesha Salahuddin:
Passive Security Threats and Consequences in IEEE 802.11 Wireless Mesh Networks. 4-8 - Sana Ullah, Henry Higgins, Young-Woo Choi, Hyung-Soo Lee, Kyung Sup Kwak:
Towards RF Communication and Multiple Access Protocols in a Body Sensor Network. 9-16 - Shu-Ching Wang, Tzu-Chih Chung, Kuo-Qin Yan:
DVRC-iTV: Download Variable Remote Control for Interactive TV. 26-35 - Nam-Kyun Kim, Mu-wook Pyeon, Jae-sun Park, Kyu-Shick Lee, Byung-Sun Yoo:
Disaster Management Design in Tunnels for u-City Embodiment. 36-39 - Hieu Trung Huynh, Yonggwan Won:
Weighted Least Squares Scheme for Reducing Effects of Outliers in Regression based on Extreme Learning Machine. 40-46 - B. Sasikumar, V. Vasudevan:
An agent based TCP/IP for Wireless Networks. 47-52 - Wenli Dong:
Translation from GDMO/ASN.1 to tML/Schema. 17-25
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.