


default search action
4th ICUIMC 2010: Suwon, Korea
- Kwan-Ho You, Sang-Won Lee, Won Kim, Dongho Won:

Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2010, Suwon, Republic of Korea, January 14-15, 2010. ACM 2010, ISBN 978-1-60558-893-3
Wireless LAN and mesh networks
- Tomoki Yoshihisa, Shojiro Nishio:

A sensor data collection method for rounding sink. 1 - Poongup Lee, Jangkeun Jeong, Yohan Kim, Jitae Shin:

Physical cell identity reservation for 3GPP LTE femtocell. 2 - Hwan Min Park, Jung-Su Han, Hyung-Jin Choi:

Enhanced detection method for 3GPP LTE QO-SFBC system in frequency selective Rayleigh fading channel environment. 3 - Dong-Yul Lee, Chaewoo Lee:

Dual token bucket based HCCA scheduler for IEEE 802.11e WLAN. 4
Sensor networks
- Le Xuan Hung, Ravi Sankar

, Murad Khalid, Sungyoung Lee:
Public key cryptography-based security scheme for wireless sensor networks in healthcare. 5 - Ga-Won Lee, Tien-Dung Nguyen, Eui-nam Huh:

Reliable transmission on wireless sensor networks with delegated acknowledgement. 6 - Hong Va Leong

:
Privacy enhancement in mobile data broadcasting environments. 7 - Dang Tu Nguyen, Wook Choi, Minh Thiep Ha, Hyunseung Choo:

MGR: a multicandidate greedy routing scheme in wireless sensor networks. 8
Telecommunication networks
- Satoshi Imai, Kazumasa Ushiki, Nobutsugu Fujino, Mamoru Machida, Masayoshi Moriya, Seii Sai:

Quality analysis of CSMA/CA communications in inter-vehicle communication services. 9 - Toru Shiraki, Yuuichi Teranishi, Susumu Takeuchi, Kaname Harumoto, Shojiro Nishio:

Proposal and evaluation of a Bloom filter-based user search method for movement records on P2P network. 10 - Hyun-Jin Lee, Kyu-Hwan Lee

, Jae-Hyun Kim:
A QoS provisioning mechanisms based on effective bandwidth for the polling based WLAN system. 11 - Young-Sun Seo, Dae-Young Kim, Jinsung Cho, Ben Lee:

OCDP: a WBAN MAC protocol for contention-based medical and CE applications. 12
Multimedia processing I
- Chin-Chen Chang, Kuo-Nan Chen, Zhi-Hui Wang, Mingchu Li:

A technique of embedding digital data in an image compression code reversibly. 13 - Chia-Chen Lin

, Pei-Feng Shiu:
Reversible data hiding scheme with high payload for JPEG images. 14 - Chunyu Wang, Ni-Shan Shiao, Hong-Hao Chen, Chwei-Shyong Tsai:

Enhance the visual quality of shares and recovered secret on meaningful shares visual secret sharing. 15 - Ruey-Ming Chao, Ching-Hao Lai, Hsien-Chu Wu:

A novel color palette image authentication scheme. 16 - Lijun Yan, Jeng-Shyang Pan

:
Directional two-dimensional principal component analysis for face recognition. 17
Systems and applications I
- Qing Li

, Wei Chen, Lijuan Yu:
Community-based recipe recommendation and adaptation in peer-to-peer networks. 18 - Chad Lin

, Ying Chieh Liu, Feng-Chia Li, Geoffrey Jalleh
, Yu-An Huang, Zong-Ru Jhuang:
B2B e-commerce adoption and implementation constraints and critical success factors in the healthcare organizations. 19 - Ying Chieh Liu, Chad Lin

, Feng-Chia Li:
A model of transiting individual efforts to the outcomes of virtual team. 20 - Mika Luimula

, Joni Jämsä, Pertti Verronen, Mika Pahkasalo, Joni Heikkilä, Juha Yli-Hemminki:
In situ measurement of geosensors in low-rate networks. 21 - Masami Takahashi, Atsuyuki Morishima, Hiroyuki Kitagawa

, Shigeo Sugimoto:
A constraint-based tool for data integrity management on the web. 22
Web technology
- Katsumi Tanaka, Hiroaki Ohshima

, Adam Jatowt
, Satoshi Nakamura
, Yusuke Yamamoto
, Kazutoshi Sumiya, Ryong Lee, Daisuke Kitayama, Takayuki Yumoto, Yukiko Kawai, Jianwei Zhang, Shinsuke Nakajima, Yoichi Inagaki:
Evaluating credibility of web information. 23 - Naoto Asahi, Takehiro Yamamoto, Satoshi Nakamura

, Katsumi Tanaka:
Discovering intermediate entities from two examples by using web search engine indices. 24 - Hideki Kawai, Adam Jatowt

, Katsumi Tanaka, Kazuo Kunieda, Keiji Yamada:
ChronoSeeker: search engine for future and past events. 25 - Manabu Ohta, Ryoji Fujita:

A prediction search based on changes of queries and search results. 26 - Makoto Nakatani, Adam Jatowt

, Katsumi Tanaka:
Adaptive ranking of search results by considering user's comprehension. 27 - Tieyun Qian

, Jiangbo Liu:
Influence maximization through identifying seed nodes from implicit social networks. 28
Information management
- Jun-Bao Li, Shu-Chuan Chu

, Jeng-Shyang Pan:
Dimensionality reduction based on nonparametric discriminant analysis with kernels for feature extraction and recognition. 29 - Yuanping Li, Ling Feng:

Bridging the gap between web service-based context suppliers and ontology-based context consumers. 30 - Hyun Jung La, Sang Hun Oh, Soo Dong Kim:

Methods to utilizing cloud computing in developing mobile internet device (MID) applications. 31 - Yun-Sam Kim, Eun-Sun Cho

, We-Duke Cho:
Context data abstraction framework using RDF. 32 - Sang-Hyun Park, Jee-Hyong Lee, Hye-Wuk Jung, Sung-Woo Bang:

Game behavior pattern modeling for game bots detection in MMORPG. 33 - Seunghoon Lee, Sung-Woo Bang, Bo-Keong Kim, Jaekwang Kim

, Jee-Hyong Lee:
A partitioning method for high dimensional data. 34
Data and web mining
- Ming-Yen Lin

, Sue-Chen Hsueh, Chien-Hsiang Tung:
Interactive stream mining of maximal frequent itemsets allowing flexible time intervals and support thresholds. 35 - Tatsuya Fujisaka, Ryong Lee, Kazutoshi Sumiya:

Discovery of user behavior patterns from geo-tagged micro-blogs. 36 - Taichi Katayama, Takayuki Yoshinaka, Takehito Utsuro, Yasuhide Kawada, Tomohiro Fukuhara:

Detecting splogs using similarities of splog HTML structures. 37 - Jöran Beel, Bela Gipp

:
Link analysis in mind maps: a new approach to determining document relatedness. 38
Intelligent systems I
- Abhishek Prateek, Hridayesh Gupta, Sanjiva Prasad:

Universal rich presence framework for intelligent call management. 39 - Soungwoong Yoon, Adam Jatowt

, Katsumi Tanaka:
Intent feature discovery using Q&A corpus and web data. 40 - Kaori Kobayashi, Ryong Lee, Kazutoshi Sumiya:

Systematic measurement of human map-reading ability with street-view based navigation systems. 41 - Ken Kuroiwa, Ryuya Uda:

Proposal of electronic commerce system with cellular phones for digital forensics. 42 - Ig-hoon Lee

, Jae-Won Lee, Junho Shim
, Sang-goo Lee:
Cache conscious trees on modern microprocessors. 43
Multimedia processing II
- Zhi-Hui Wang, Chin-Chen Chang, Mingchu Li, Tzu-Chuen Lu:

A simple image encoding method with data lossless information hiding. 44 - Makoto P. Kato, Satoshi Oyama, Hiroaki Ohshima

, Katsumi Tanaka:
Query by example for geographic entity search with implicit negative feedback. 45 - Jungil Jung, Jinsoo Cho:

Detailed-information browsing to form centralized mesh structure in region of interest. 46 - Wei-Jen Wang, Cheng-Ta Huang, Shiuh-Jeng Wang:

Reversible data hiding using neighboring block in VQ-compressed images. 47
Systems and applications II
- Masato Oguchi, Reika Higa, Kosuke Matsubara, Takao Okamawari, Saneyasu Yamaguchi:

Performance improvement of iSCSI remote storage access. 48 - Yuki Tanimoto, Manabu Ohta:

A proposal of visualizing reputation using evaluative expression dictionaries. 49 - Kuo-Chang Chen, Jih-Tso Chang, Jeng-Shyang Pan, Hsiang-Cheh Huang

:
The open source IPTV service development environment: IPTV service execution environment. 50 - Chin-Feng Lee, Chin-Chen Chang, Chun-Yu Wu:

A reversible and multiple-layer embedding strategy with high capacity. 51 - Chi-Shiang Chan, Ching-Yun Chang:

Hiding data in parity check bit. 52
Intelligent systems II
- Zeng-Wei Hong

, Rui-Tang Huang, Kai-Yi Chin, Chia-Chi Yen, Jim-Min Lin:
An interactive agent system for supporting knowledge-based recommendation: a case study on an e-novel recommender system. 53 - Masayuki Terada

, Kozo Noaki, Kimihiko Sekino:
Smartcard-based micro-billing scheme to activate the market for user-generated content. 54 - Nanshan Du, Qing Li

, Yiwen Liang:
Actor Petri net model for scientific workflows: model, design and system. 55 - Shihono Karikome, Atsushi Fujii:

A system for supporting dietary habits: planning menus and visualizing nutritional intake balance. 56 - Jehwan Oh, Ok-Ran Jeong, Eunseok Lee

:
A personalized recommendation system based on product attribute-specific weights and improved user behavior analysis. 57
Security, privacy and personalization
- Yuko Arai, Chiemi Watanabe:

Query log perturbation method for privacy preserving query. 58 - Sangsik Lee, Donghyun Choi, Dongho Won, Seungjoo Kim

:
Security analysis on commercial online music streaming service and countermeasures. 59 - Wonik Park, Jong Hyun Park, Young-Kuk Kim

, Ji-Hoon Kang:
An efficient context-aware personalization technique in ubiquitous environments. 60 - Sun Park, Dong Un An:

Automatic query-based personalized summarization that uses pseudo relevance feedback with NMF. 61 - Qian Zhang, Taeg Keun Whangbo:

Skin surface reconstruction from stereo images. 62 - Kyu Il Kim, Wonyoung Kim, Joonsuk Ryu, Hyuk Jin Ko, Ung-Mo Kim, Woo Jun Kang:

RBAC-based access control for privacy preserving in semantic web. 63
Communication technologies
- Chien-Chou Shih, Mong-Fong Horng, Jeng-Shyang Pan:

A scaffolding M-learning framework with IMS based IPTV PVR service. 64 - Moonseo Park, Seong Keun Oh:

A minimum mean-squared error relay for three-way relay channels with network coding. 65 - Md. Shariful Islam, Muhammad Mahbub Alam, Md. Abdul Hamid

, Choong Seon Hong
:
High throughput path selection for IEEE 802.11s based wireless mesh networks. 66 - Cao Trong Hieu, Young-Cheol Bang, Jin Ho Kim, Young An Kim, Choong Seon Hong

:
A multi-rate routing protocol with connection entropy for mobile ad hoc networks. 67 - Sang-Woo Lee, Dong-Yul Lee, Chaewoo Lee:

An improved DV-Hop localization algorithm in ad hoc networks. 68
Intelligent systems III
- Hyung-Jun Yim, Yun-Young Hwang, Kyu-Chul Lee

:
A self-organizing two-way DPWS adaptor for adaptive interoperability of multiple heterogeneous services. 69 - Hyunjae Woo, Dong-Yul Lee, Chaewoo Lee:

An enhanced OLSR protocol based on link reliability. 70 - A. M. Jehad Sarkar, Young-Koo Lee, Sungyoung Lee:

ARHMAM: an activity recognition system based on hidden Markov minded activity model. 71 - Du Wan Cheun, Jae Yoo Lee, Soo Dong Kim:

A comprehensive architecture for autonomic service management. 72 - Zhen-Xing Zhang, Sang-Hong Lee, Joon S. Lim:

Comparison of feature selection methods in ECG signal classification. 73
Systems and applications III
- Yun-Young Hwang, Kyu-Chul Lee

:
Semantic operation composition according to user tasks in ubiquitous environment. 74 - Sung-Yeol Yun, Cheol-Joong Kim, Do-Yoon Ha, Hyun-Cheol Jeong, Seok-Cheon Park:

A SIP-TRW algorithm for DDoS attack detection in SIP environments. 75 - Dongjin Oh, Ickjin Kwon:

A 2.4-GHz IEEE 802.15.4 CMOS single-chip transceiver for wireless PAN applications. 76 - Jae Do Lee, Myung Hoon Sunwoo:

High-speed architecture for three-parallel Reed-Solomon decoder using S-DCME. 77

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














