default search action
2. ICIS 2009: Seoul, Korea
- Sungwon Sohn, Ling Chen, Soonwook Hwang, Kyungeun Cho, Shigeo Kawata, Kyhyun Um, Franz I. S. Ko, Kae-Dal Kwack, Jong Hyung Lee, Gang Kou, Kiyoshi Nakamura, Alvis Cheuk M. Fong, Patrick C. M. Ma:
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009. ACM International Conference Proceeding Series 403, ACM 2009, ISBN 978-1-60558-710-3 - Kosheek Sewchurran, Elsje Scott:
Learning and making sense of project phenomena in information systems education. 1-8 - Yasuko Kanno, Masato Terada, Hidehiro Yajima, Toshinari Kamamura, Norihisa Doi:
A comparative study on structure of the motivation for information security by security incident experiences. 9-16 - Aika Mukai, Toshiyuki Yamamoto, Makoto J. Hirayama:
A study of correlation between transitions and sound effects in a fairy tale movie. 17-20 - Rogayah Abdul Majid, Nor Laila Md. Noor, Wan Adilah Wan Adnan, Suria Mansor:
A survey on HCI considerations in the software development life cycle: from practitioner's perspective. 21-24 - Dhananjay Singh, Hoon-Jae Lee:
Database design for global patient monitoring applications using WAP. 25-31 - Ahmed Mustafa Mahmoud, Wan Haslina Hassan:
Determinism in speech pitch relation to emotion. 32-37 - Norhaida Abdullah, Mohd Shafry, Mohd Rahim, Ismail Mat Amin:
Measuring fish length from digital images (FiLeDI). 38-43 - Umesh Hodeghatta Rao Xavier, Sanjay Mohapatra:
Mobile technology for irrigation problems in rural India. 44-46 - Shengling Wang, Yong Cui, Ke Xu, Jian-Hui Huang, Dapeng Liu:
Proportional fairness of call blocking probability. 47-52 - Gia Kim, Siu Man Lui:
Relationship of blink, affect, and usability of graph reading tasks. 53-58 - Toshihiko Yamakami:
Star economy in the user generated content: a new perspective for digital ecosystems. 59-62 - Rattiporn Luanrattana, Khin Than Win:
The deployment of PDA accessible clinical-log for medical education in PBL-approach. 63-68 - Wan Norizan Wan Hashim, Nor Laila Md. Noor, Wan Adilah Wan Adnan:
The design of aesthetic interaction: towards a graceful interaction framework. 69-75 - Atif Latif, Muhammad Tanvir Afzal, Patrick Höfler, Anwar Us Saeed, Klaus Tochtermann:
Turning keywords into URIs: simplified user interfaces for exploring linked data. 76-81 - Yu Cheng, Tao Zhang, Song Chen:
VisionSynaptics: a system convert hand-writing and image symbol into computer symbol. 82-85 - A. Murali M. Rao:
Web-enabled user support services system in distance learning. 86-90 - Hyun-Jong Kim, Jeong Yun Kim, Seong Gon Choi:
A method to support multiple interfaces mobile nodes in PMIPv6 domain. 91-96 - Zhao-Zhi Pan, Yu Hong, Jian-Min Yao:
A multiple bayes classification solution to word sense disambiguation. 97-99 - Jianbo Ye, Qingbo Zhang, Guogang Huang:
A multiuser diversity based time-frequency two dimensional adaptive resource allocation algorithm for WiMAX. 100-103 - Alessandra De Paola, Salvatore Gaglio, Giuseppe Lo Re, Marco Ortolani:
An ambient intelligence architecture for extracting knowledge from distributed sensors. 104-109 - Weiping Li:
An analysis of new features for workflow system in the SaaS software. 110-114 - Chin-Hung Wang, Tzu-Chieh Wei, Po-Chin Lee, Chia-Chun Wu:
An improvement of secure authentication scheme with full anonymity for wireless communications. 115-118 - Junmin Zhu:
Approximation for minimum total dominating set. 119-124 - Pham Thi Thu Thuy, Young-Koo Lee, Sungyoung Lee:
DTD2OWL: automatic transforming XML documents into OWL ontology. 125-131 - Weili Li, Lixin Yu:
Efficient line buffer instruction cache scheme with prefetch. 132-135 - Ruey-Ming Chao, Hsien-Chu Wu, Zi-Chun Chen:
Image segmentation by automatic histogram thresholding. 136-141 - Elise de Doncker, Karlis Kaugars, Shujun Li, Haisen S. Li, Yoshimitsu Shimizu, Junpei Fujimoto, Fukuko Yuasa, Tadashi Ishikawa, Nobuyuki Hamaguchi:
Interdisciplinary applications of mathematical modeling. 142-148 - Mangal Sain, Hoon-Jae Lee, Wan-Young Chung:
Middleware in ubiquitous computing system with MedRec architecture. 149-154 - Hong-Hao Chen, Cheng-Chi Lee, Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai:
Multi-level visual secret sharing scheme with smooth-looking. 155-160 - Mahshid S. Ehsaei, Abolfazl Toroghi Haghighat:
Pattern-based planning system for complex environments. 161-167 - Yoon-Ho Cho, Sang-Hyun Park, SangKeun Lee:
PhraseRank for document clustering: reweighting the weight of phrase. 168-174 - Abdul Majid, Yeon Soo Lee:
Predicting lattice constant of cubic perovskites using support vector regression. 175-183 - Oliver Zweigle, René van de Molengraft, Raffaello D'Andrea, Kai Häussermann:
RoboEarth: connecting robots worldwide. 184-191 - Muhammad Usman Khan, Shoab Ahmed Khan:
Social networks identification and analysis using call detail records. 192-196 - Oliver Zweigle, Kai Häussermann, Uwe-Philipp Käppeler, Paul Levi:
Supervised learning algorithm for automatic adaption of situation templates using uncertain data. 197-200 - Vincenza Carchiolo, Alessandro Longheu, Michele Malgeri, Giuseppe Mangioni:
The effect of malicious peers in a gossip-based reputation system. 201-205 - Toshihiko Yamakami:
Foundation-based mobile platform software engineering: implications to convergence to open source software. 206-211 - Toshihiko Yamakami:
An interactivity model of mobile interactive TV: a oneseg case for mobile glue. 212-217 - Youngkon Lee:
Double layered SOA test architecture based on BPA - simulation event. 218-223 - Tzong-Heng Chi, Chia-Chien Lin, Wei-Chen Lin:
Intraorganizational power verified interactive genetic algorithms for the design of logistics network. 224-229 - Mira Kajko-Mattsson:
Laying out the scope of developers' risk management responsibilities. 230-235 - Makoto J. Hirayama, Toshiyuki Yamamoto:
Network response analyzer system for interactive lectures in classroom or distance learning. 236-239 - Mira Kajko-Mattsson:
SLA management process model. 240-249 - Xinyan Zhao, Ge Wei, Lu Tingjie:
Study on consumer demands and merchant participation motives of mobile payment services in China. 250-255 - Pardeep Kumar, Sang il Cho, Hoon-Jae Lee:
PingPong-MAC: secure ubiquitous sensor network with authenticated encryption. 256-260 - Ok-Hue Cho, Jae-Joon Cho, Kil-Sang Yoo, Won-Hyung Lee:
A study on bio feedback based interactive work for expressing human cytochemism in real-time. 261-264 - Qian Wei, Jingsha He, Huiying Shao:
A directed signature scheme and its application to group key initial distribution. 265-269 - Wonyoung Kim, Joonsuk Ryu, Kyu Il Kim, Ung-Mo Kim:
A method for opinion mining of product reviews using association rules. 270-274 - Hoang-Anh Pham, Van-Hieu Bui, Anh-Vu Dinh-Duc:
An adaptive, memory-efficient and fast algorithm for Huffman decoding and its implementation. 275-279 - Zheng Min, Li Yang:
An extended version of scaled small gain condition. 280-282 - Ki-Il Kim, Hye-Jin Lee, Sangjoon Park, Hyeon Park:
New link estimation for reliability in wireless sensor networks. 283-286 - Joonsuk Ryu, Wonyoung Kim, Kyu Il Kim, Ung-Mo Kim:
Mining opinions from messenger. 287-290 - Peisheng Wang, Haiyang Quan, Fuqiang Zhang, Zhiyong Hu:
A novel fully-differential switched capacitor chopper stabilized cascade sigma-delta modulator for MEMS gyroscope. 291-294 - Jinhee Park, Jinwook Chung:
Network selection based on network service zone for macro mobility. 295-299 - Ibrahim Furkan Ince, Yücel Batu Salman, Mustafa Eren Yildirim:
A user study: the effects of mobile phone prototypes and task complexities on usability. 300-302 - Mingjie Zhou, Li Wang, Jianxin Zhang:
Developing a computer system for health assessment. 303-306 - Xiuhua Jiang, Yuxia Wang, Caihong Wang:
No-reference video quality assessment for MPEG-2 video streams using BP neural networks. 307-311 - Yücel Batu Salman, Ibrahim Furkan Ince, Ji Young Kim, Hong-In Cheng, Mustafa Eren Yildirim:
Participatory design and evaluation of e-learning system for Korean language training. 312-319 - Junfeng Tian, Yuzhen Lu, Peng Yuan:
A weighted closeness-based trust combination model. 320-325 - Chengying Mao:
Experiences in security testing for web-based applications. 326-330 - Fatemeh Saghafi, Fatemeh NasserEslami, Maryam Esmaili:
Ranking secure technologies in security provision financial transactions mobile commerce. 331-336 - Li Wenyi:
Financial performance evaluation of China's listed steel companies from creditors' perspective. 337-341 - Jia Zhang, Hong Pan, Zhenming Yuan:
A novel spatial index for case based geographic retrieval. 342-347 - Dongming Chen:
An effective solution for community identification. 348-351 - Wang Liu, Chunhui Zhao:
Digital watermarking for volume data based on 3D-DWT and 3D-DCT. 352-357 - Yujie Yao, Haopeng Chen:
QoS-aware service composition using NSGA-II1. 358-363 - Bin Chen, Bin Li, Zhisong Pan:
SVDD regularized with area under the ROC. 364-368 - Jingdong Chen, Wei Han:
The research on the service marketing strategies and empirical based on the product value. 369-374 - Jingdong Chen, Qisong Zhu:
The theory and empirical research of differentiation benefit positioning based on product value. 375-380 - Jingdong Chen, Xiaoqian Gao:
The theory and empirical research of network marketing based on relational value. 381-385 - Hong-qin Zhang, Song-lin Yang, Yong-cheng An, Jun-jie Zhao, Wu-xing He:
Information processing of the hull structure oriented to ship structure knowledge-type military specification. 386-389 - Song-lin Yang, Hong-qin Zhang, Yong-cheng An, Hai-bian Cheng, Wu-xing He:
Ship structure knowledge-based military specification virtual test system's design. 390-393 - Chung-Hsin Liu, Chun-Lin Lo:
The analysis of DDoS attack for the video transmission. 394-399 - Chung-Hsin Liu, Wei-Yu Chen:
The effectiveness of the handheld devices based on mobiles learning. 400-405 - Chung-Hsin Liu, Sheng-Shiang Chang, Zhao-Cheng Ye:
The study for the optimal routing of Bluetooth Piconet. 406-411 - Chung-Hsin Liu, Sheng-Shiang Chang:
The study of effectiveness for ad-hoc wireless network. 412-417 - Chung-Hsin Liu, Po-Cheng Teng, Chun-Lin Lo, Kuo-Hao Lee:
The study of the wireless network DoS attack. 418-421 - Chung-Hsin Liu, Chien-Yun Lo:
The study of WSN routing. 422-428 - Zhiyong Zeng, Zhiqiang Yao, Shigang Liu:
An efficient and effective image representation for region-based image retrieval. 429-434 - Zhiyong Zeng, Xuemei Ding, Shigang Liu:
An efficient region-based image representation using Legendre color distribution moments. 435-439 - Gaoshou Zhai, Yufeng Zhang, Chengyu Liu, Na Yang, Minli Tian, Hengsheng Yang:
Automatic identification of covert channels inside Linux kernel based on source codes. 440-445 - Gaoshou Zhai, Wenlin Ma, Minli Tian, Na Yang, Chengyu Liu, Hengsheng Yang:
Design and implementation of a tool for analyzing SELinux secure policy. 446-451 - Selim Mimaroglu, A. Murat Yagci:
A binary method for fast computation of inter and intra cluster similarities for combining multiple clusterings. 452-456 - Khalid Aldrawiesh, Ajlan Suliman Al-Ajlan, Yazed Al-Saawy, Abdullah Bajahzar:
A comparative study between computer programming languages for developing distributed systems in web environment. 457-461 - Qiang Sun, Shasha Cao, Nianshen Chen:
A maximum network lifetime QoS routing algorithm in MANETs. 462-467 - Shu-Ching Wang, Kua-Qin Yan, Shun-Sheng Wang, C. P. Huang:
Achieving high efficient agreement with malicious faulty nodes on a cloud computing environment. 468-473 - Svetlana Kim, Yongik Yoon:
Adaptation e-learning contents in mobile environment. 474-479 - Hamad I. Alsawalqah, Komi S. Abotsi, Danhyung Lee:
An automated mechanism for organizing and retrieving core asset artifacts for product derivation in SPL. 480-485 - Munkhbat Luvsanbyamba, In Keun Chung:
An empirical study of success factors on business-to-business e-marketplaces from buyers' and sellers' perspectives. 486-491 - Jun Pyo Park, Chang-Sup Park, Min Kyoung Sung, Yon Dohn Chung:
Attribute summarization: a technique for wireless XML streaming. 492-496 - The-Dung Pham, Hung Quoc Ngo, Sungyoung Lee, Young-Koo Lee:
Averaging approach for distributed event detection in wireless sensor networks. 497-501 - Chin-Bang Yao:
Context-aware customization e-learning system with intelligent on-line examination mechanism. 502-507 - Hazim Iscan, Oguz Findik, Halife Kodaz, Ali Erdi:
Designing a special purpose e-commerce website. 508-513 - Yun-Hong Noh, Do-Un Jeong:
Development and estimation of ubiquitous unconstrained BCG monitoring system using wireless sensor node. 514-520 - Md. Rakibul Haque, Md. Ashik Faisal Khan, Md. Atiqul Islam, Mahmuda Naznin:
DPUid: distributed algorithm for proximity-based unique id in wireless sensor networks. 521-525 - Mohammad Zeynali, Leili Mohammad Khanli, Amir Mollanejad:
EDARP: novel energy and distance-aware routing protocol in wireless sensor network. 526-533 - Pattaraporn Klangpraphant, Pattarasinee Bhattarakosol:
e-mail authentication system: a spam filtering for smart senders. 534-538 - Dhananjay Singh, Hoon-Jae Lee, Wan-Young Chung:
An energy consumption technique for global healthcare monitoring applications. 539-542 - Diana Poovathingal Lazar, Navrati Saxena, Hari Mohan Gupta, Swades De:
Handover support for converged inter-RAT networks. 543-549 - Seifu Tatek Yazhy, Seung-Kyu Park:
Hierarchical service-oriented routing of queries in wireless sensor networks. 550-554 - Sang-Ho Na, Kyu-Jin Kim, Mohammad Mehedi Hassan, Eui-nam Huh:
Identity-based secure protocol scheme for wireless sensor network. 555-560 - Tyrone Edwards, Suresh Sankaranarayanan:
Intelligent agent based hospital search & appointment system. 561-567 - Mariano Perez Pelaez, Toshiya Fujii, Wonsuk Nam, Masaki Yachiune, Ikuro Choh:
Legible+: integrated system for remote collaboration through document creation. 568-570 - S. Britto R. Kumar, S. Albert Rabara, J. Ronald Martin:
MPCS: a secure Mobile Payment Consortia System for higher educational institutions. 571-579 - J. G. R. Sathiaseelan, S. Albert Rabara, J. Ronald Martin:
Multi-Level Secure Framework (MLSF) for composite web services. 580-585 - Yongxu Piao, Wooseok Ryu, Haipeng Zhang, Bonghee Hong:
Optimization of continuous query processing for RFID sensor tag data stream. 586-591 - Duklon Stenett, Suresh Sankaranarayanan:
Personal mobile information system. 592-598 - Toru Yazawa, Tomoo Katsuyama:
Premature ventricular contractions, a typical extra-systole arrhythmia, lowers the scaling exponent: DFA as a beneficial biomedical computation. 599-604 - Jong-Moon Chung, Myungjun Choi, Yong-Suk Park, Ho Kim, Hyundo Kim:
Relative navigation and situation awareness information distribution for GPS information deficient situations. 605-609 - Md. Monzur Morshed, Md. Habibur Rahman, Md. Rezaur Rahman Mazumder, K. A. M. Lutfullah:
Simulation and analysis of ad-hoc on-demand distance vector routing protocol. 610-614 - Hathairat Ketmaneechairat, Phoemphun Oothongsap, Anirach Mingkhwan:
Smart buffer management for different start video broadcasting. 615-619 - Shaishav Agrawal, Tanveer J. Siddiqui:
Using syntactic and contextual information for sentiment polarity analysis. 620-623 - Hsein-Ping Kew, Do-Un Jeong:
Wearable patch-type ECG using ubiquitous wireless sensor network for healthcare monitoring application. 624-630 - Ke Zuo, Quanyuan Wu:
6DMPP: small worlds in mobile peer-to-peer networks. 631-636 - R. Lakshmi Priya, Nabendu Chaki:
A study on QoS issues for mobile ad-hoc networks. 637-642 - E. R. Naganathan, P. Eugene Xavier:
Architecting autonomic computing systems through Probabilistic Software Stability Model (PSSM). 643-648 - Yo-Ping Huang, Vu Thi Thanh Hoa:
General criteria on building decision trees for data classification. 649-654 - Farah Layouni, Yann Pollet:
QoS implementation in a federated identities system. 655-657 - Nicolás Macia, Paula Venosa, Luis Marrone:
Requirements for troubleshooting wi-fi network security through location technologies. 658-663