


default search action
5th NCM 2009: Seoul, Korea
- Jinhwa Kim, Dursun Delen, Jinsoo Park, Franz Ko, Chen Rui, Jong Hyung Lee, Jian Wang, Gang Kou:

International Conference on Networked Computing and Advanced Information Management, NCM 2009, Fifth International Joint Conference on INC, IMS and IDC: INC 2009: International Conference on Networked Computing, IMS 2009: International Conference on Advanced Information Management and Service, IDC 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3769-6
INC 2009: International Conference on Networked Computing
- Hao-peng Chen, Guang Yang, Can Zhang:

A Closed-Loop Mechanism for Service Evaluating and Discovering on the Internet. 1-8 - Kiyong Kim, Yeonseung Ryu, Semog Kim, Jong Myung Rhee:

A Leader Management Scheme for Fault-Tolerant Multiple Subnets. 9-12 - Nandagopal Malarvizhi

, V. Rhymend Uthariaraj:
A Minimum Time to Release Job Scheduling Algorithm in Computational Grid Environment. 13-18 - B. N. Bhramar Ray, Alok Ranjan Tripathy

, Shakti Prasad Mohanty:
A New Interconnection Network for Parallel Computers. 19-24 - Bin Wu, Shoubao Yang, Xiaoqian Liu:

A Resource Service Risk Based Scheduling Algorithm in Grid Market. 25-30 - John Sanabria, Wilson Rivera

, Domingo Rodríguez, Yuji Yunes, Gail Ross, Cesar Sandoval:
A Sensor Grid Framework for Acoustic Surveillance Applications. 31-38 - Jianhua Wang, Jun Zhang, Weidong Ji, Long Zhang:

A Solving Model of Network Resource. 39-43 - Bhaskar Prasad Rimal

, Eunmi Choi, Ian Lumb
:
A Taxonomy and Survey of Cloud Computing Systems. 44-51 - Srimathi Chandrasekaran

, Eunmi Choi, Venkat Viswanadh:
An Agent-Based Migration Transparency and Fault Tolerance in Computational Grid. 52-57 - Min-Woo Park, Jin-Young Choi, Young-Ju Han, Tai-Myoung Chung:

An Energy Efficient Concentric Clustering Scheme in Wireless Sensor Networks. 58-61 - Hu Song, Shoubao Yang, Bin Wu, Xiaoqian Liu, Liangmin Guo:

An Optimal Algorithm for Scheduling Tasks within Deadline and Budget Constraints. 62-65 - Wenxiao Feng, Tiejun Lu, Zongmin Wang:

Analysis and Design of Fully Differential Gain-Boosted Op-amp for 14bit 100MS/s Pipelined Analog-to-Digital Converter. 66-69 - Dongmei Xing, Hong Zhu:

Approximation Strategy Based on Data Merging for Static Data Management in Networks. 70-75 - Maryam Homayouni, Seyed Vahid Azhari, Mojataba Jahanbakhsh, Ahmad Akbari

, Alireza Mansoori, Nahid Amani:
Configuration of a SIP Signaling Network: An Experimental Analysis. 76-81 - Dal-Hwan Yoon, Long Chen, Teng Lian, Jong-Hwa Yoon, Jong-Uk Yoon:

Development of Zig System for Evaluating an Oscillator Performance. 82-85 - Nibedita Adhikari

, Chitta Ranjan Tripathy:
Extended Crossed Cube: An Improved Fault Tolerant Interconnection Network. 86-91 - Hai Zhang, Zhuxu Yang, Wenming Guo:

Flow Byte Sizes Estimation from Simple Random Packet Sampling. 92-96 - Chen-Shu Wang, Hsin-Chang Li:

General Model for Ubiquitous Networking Deployment Constructed Recommendation. 97-102 - Yao Yu, Yu Zhou, Sidan Du:

Impact of Interference on Multicast Throughput over Ad Hoc Networks. 103-110 - Yongtao Hao

, Wenjing Han:
Intelligent Design-Oriented Product Functional Decomposition Iterative Model. 111-116 - Shakti Mishra

, Dharmender Singh Kushwaha, Arun Kumar Misra:
Jingle-Mingle: A Hybrid Reliable Load Balancing Approach for a Trusted Distributed Environment. 117-122 - Alvin Chew HouMing, Koh Kim Leng:

Network Stochastic Optimization for Large Virtual Environment. 123-129 - Xiaoyong Lu, Liqing Li, Xiaogang Zhou:

Reduction Method of Order-Cycle Column Remove Based on Indiscernibility Relation. 130-133 - Dianchuan Jin, Xuebin Chen, Zhaohua Qian:

Resolution and Reconstruction of an Algorithm by a Modified Mobius Transformation in Signal Processing. 134-137 - Inwhee Joe, Sijia Yan:

SCTP Throughput Improvement with Best Load Sharing Based on Multihoming. 138-142 - Xiaoan Bao, Na Zhang, Zuohua Ding:

Test Case Generation of Concurrent Programs Based on Event Graph. 143-149 - Yongbin Zhang, Liangbin Zheng, Fucheng You:

The Design and Implementation of Behavior-Driven Artificial Neural Network Computing System. 150-153 - Chung-Hsin Liu, Ping-Shin Tsai:

The Study for Wireless Network Packet Transmission. 154-157 - Kazi Md. Abdullah Al Mamun, Md. Kawsar Habib, Nazmus Sakib, Al-Amin Pervez:

Wireless Bandwidth Estimation Technique (WBET) to Maintain the Quality of Service (QoS) of IEEE 802.11e Network. 158-160 - Min Xiang, Ping Wang, Zhiyong Luo, Young Han Kim, Yan Jin:

A New Data Gathering Algorithm Based on Mutual Supportability and Grey Prediction in Wireless Sensor Networks. 161-165 - SungHee Jeon, JoonGoo Park:

A RFID Reader Configuration with an Enhanced Recognition Property for Indoor Positioning. 166-169 - Yi Zhao, Wenlong Huang:

Adaptive Distributed Load Balancing Algorithm Based on Live Migration of Virtual Machines in Cloud. 170-175 - Shufen Zhang, Xuebin Chen, Hongcan Yan, Shuai Zhang:

Collision Detection and Conflict Solution Research in Modern Collaborative Design. 176-181 - Yu-Feng Lan, Shin-Ming Huang:

Designing an Efficient Collaborative Learning Model to Construct a Consensus Based on Binary Tree Structure. 182-187 - Colin Lemmon, Siu Man Lui, Ickjai Lee

:
Geographic Forwarding and Routing for Ad-hoc Wireless Network: A Survey. 188-195 - Ik-Hyun Jhin, Nak-Min Choi, Eun-Sun Cho

:
Integration of RDF Processing into a Programming Language. 196-199 - Bo Dong, Qinghua Zheng, Lingzhi Xu, Haifei Li, Jie Yang, Mu Qiao:

Jampots: A Mashup System towards an E-learning Ecosystem. 200-205 - Zuohua Ding, Mingyue Jiang:

Rebuilding Web Application Requirements Based on User Navigation. 206-213 - Minglu Li, Jianping Li

, Hao Song, Dengsheng Wu
:
Risk Management in the Trustworthy Software Process: A Novel Risk and Trustworthiness Measurement Model Framework. 214-219 - Lican Huang

:
Semantic P2P Network for Healthcare. 220-225 - Sameer Abufardeh, Kenneth Magel:

Software Internationalization: Testing Methods for Bidirectional Software. 226-231 - Hun-Jung Lim, Tai-Myoung Chung:

The Bias Routing Tree Avoiding Technique for Hierarchical Routing Protocol over 6LoWPAN. 232-235 - Yu-Feng Lan, Yu-Cheng Jiang:

Using Instant Messaging and Annotation Services to Improve Undergraduate Programming Courses in Web-Based Collaborative Learning. 236-241 - Lin Liu, Yuanfu Zhao, Suge Yue:

3D Simulation of Charge Collection and MNU in Highly-Scaled SRAM Design. 242-246 - Jinpei Pan, Mingchu Li, Weifeng Sun, Jing Hu:

A Mediated RSA-Based End Entity Certificates Revocation Mechanism in Grid. 247-250 - Wan Haslina Hassan, Ahmed Mustafa Mahmood, Norsheila Fisal:

An Agent-Based Mobility Protocol for Improved Mobile QoS in Next Generation IP Networks. 251-256 - Xin Liu, Neng Wang:

Anti-misbehavior System for Tor Network. 257-261 - Wen-Yau Liang:

Apply Rough Set Theory into the Information Extraction. 262-266 - Huan Li, Bo Liu:

Collective Behavior of Dynamic Swarm with General Topology and Complex Communication Time-Delays. 267-271 - Xing Wang, Xin Wang, Zhaonan Sun:

Comparison on Confidence Bands of Decision Boundary between SVM and Logistic Regression. 272-277 - Tzu-Yen Wang, Chin-Hsiung Wu, Chu-Cheng Hsieh:

Detecting Unknown Malicious Executables Using Portable Executable Headers. 278-284 - Aung Nway Oo, Ni Lar Thein:

DLP Based Proxy Blind Signature Scheme with Low-Computation. 285-288 - Iraj Mahdavi, Shima Mohebbi, Namjae Cho, Rasoul Shafaei, Mahdi Zandakbari:

Dynamic Information Flow for Designing Simultaneous Coordination Model in E-Supply Network. 289-296 - Michael Hermano, Shirley B. Chu, Daniel Pua, Stephen Tan, Andrei Victor:

EVOGENTS: Evolving Agents. 297-302 - Hieu Trung Huynh, Yonggwan Won:

Extreme Learning Machine with Fuzzy Activation Function. 303-307 - Hua-Yi Lin:

High-Effect Key Management Associated with Secure Data Transmission Approaches in Sensor Networks Using a Hierarchical-Based Cluster Elliptic Curve Key Agreement. 308-314 - Mohd Najib B. Mohd Salleh

, Nazri Mohd Nawi
, Patrice Boursier
:
Incomplete Information of Decision Support System for Planting Material Selection. 315-319 - Alvin Chew HouMing, Koh Kim Leng, Xu Ke:

Providing a Heuristic Method to Simplify Behaviour Authoring. 320-324 - Yongtao Hao

, Dinghou Huang, Xiulian Qiu:
Research of Part Geometry Model and Gene Coding Based on Semantic Relationship. 325-328 - Guozheng Wang, Jijie Zheng, Haiyan Wu, Ying Tang:

Research of the Enterprise Application Integration Platform Based on Multi-agent. 329-331 - Chong-Yen Lee, Tsang-Yean Lee, Homer Wu, Hau-Dong Tsui, Heng-Sheng Chen:

Secure Site Authentication and Message Transmission Based on Grid Environment. 332-337 - Zhaohui Huang, Huajun Chen, Tong Yu, Hao Sheng, Zhaobo Luo, Yuxin Mao:

Semantic Text Mining with Linked Data. 338-343 - X. B. Tan, Longxin Cheng, Xiumei Xu:

Test Data Generation Using Annealing Immune Genetic Algorithm. 344-348 - Shufen Zhang, Xuebin Chen, Shuai Zhang, Hongcan Yan:

The Research on the Principle of Covert Communication and Defense Strategy Based on Sniffer. 349-352 - Xinyuan Zhang, Limin Jia, Honghui Dong, Zhuo Wang, Ke Wang, Yong Qin:

Analysis and Evaluation of Connectivity Reliability for Dynamic Transportation Network. 353-356 - Kuo-Hwa Chang, Yang-Shu Lu, Rong-Cheng Chang:

Performance Evaluation on Base-Stock Levels in a Single-Station Production System. 357-362 - Shenping Hu, Quangen Fang, Cunqiang Cai:

Formal Risk Assessment of Vessel Traffic at Coastal Waters. 363-368 - Kevin Miller, Suresh Sankaranarayanan

:
Role of Intelligent Agents and Wireless Body Sensor Mesh Networks in Patient Health Monitoring. 369-375 - Seunghyun Yoon, Namhee Park, Jinwon Choi:

A BIM-Based Design Method for Energy-Efficient Building. 376-381 - Jumphon Lertlakkhanakul, Yongzhi Li, Jinwon Choi, Soyoung Bu:

GongPath: Development of BIM Based Indoor Pedestrian Navigation System. 382-388 - Wonsuk Park, Kwan-Soon Park, Dong-Ho Ha, Jinkyo F. Choo:

Preference Based Genetic Algorithm for the Optimum Design of Integrated Structural Control System. 389-392 - Ali Barati

, Mohammad Ali Khosh Kholghi, Ali Movaghar
:
Recovery of Sensors in Wireless Sensor Networks. 393-396 - Alejandro Fernández-Montes

, Juan Antonio Ortega, Juan Antonio Álvarez
, Luis González Abril
:
Smart Environment Software Reference Architecture. 397-403 - Inwhee Joe, Jaeyoung Kim:

A Novel IP Paging Scheme with Dynamic Paging Areas according to the Mobile Velocity. 404-408 - Sang-seok Oh, Hyon-Young Choi, Sung-Gi Min:

A Route Optimization Scheme Based on Roaming in PMIPv6 (pROR). 409-415 - Mi-Young Choi, Eun-Ae Cho, Dae-Ha Park, Jong-Youn Bae, Chang-Joo Moon

, Doo-Kwon Baik:
A Synchronization Algorithm of Mobile Database for Ubiquitous Computing. 416-419 - Mirali Sharifi, Fatemeh Toossi, Tofig Kazimov

:
An Approach for Selecting Active Nodes in Wireless Sensor Networks by Using Genetic Algorithms. 420-424 - Youngkon Lee:

An Implementation Case Study: Business Oriented SOA Execution Test Framework. 425-430 - Jong-Kuk Shin, Min-Sook Park, Mi-Ok Oh:

Effects of Customer Participation Level on Customers' Attributions, Emotions, and Behaviors in Case of Internet Service Failure. 431-436 - Sang Man Seong, Tae Whan Kim, Ick Ho Whang:

Estimation with Intermittent Observation Using Both a Priori and a Posteriori Information. 437-440 - Mario Köppen, Kaori Yoshida, Masato Tsuru, Yuji Oie:

Fairness-Based Global Optimization of User-Centric Networks. 441-443 - Gang Yin, Dian-xi Shi, Pinbo Sui, Huaimin Wang:

Towards General Access Control Management for Middleware Security. 444-448 - Fei Ge

, Liansheng Tan, Yuan-ni Wang:
Traffic Modeling with Bernoulli Shift Map. 449-452 - Ying Liu, Zhihong Qian, Dan Liu, Hui Zhong:

A DV-Hop Positioning Algorithm for Wireless Sensor Network Based on Detection Probability. 453-456 - Yao Yu, Lei Guo, Xingwei Wang, Jun Liu, Weigang Hou, Yan Li:

A New Node Role-Based Reputation Model in Hierarchical Ad Hoc Networks. 457-461 - Weigang Hou, Lei Guo, Xingwei Wang, Jiannong Cao, Jingjing Wu, Yan Li:

A New Routing Algorithm Based on Integrated Grooming Auxiliary Graph in Multi-granularity Optical Networks. 462-467 - Sisi Cheng, Qing Li, Qi Chen:

A New Routing Strategy to Improve Traffic Congestion for Scale-Free Network. 468-470 - Xin Zhao, Yuqin Lv, Tet Hin Yeap, Bin Hou:

A Novel Authentication and Key Agreement Scheme for Wireless Mesh Networks. 471-474 - Chunhui Song, Shulei Wu, Huandong Chen, Jinmei Zhan, Juntao Chen:

A Probe into the Concept of Multimedia. 475-478 - Chaonian Guo, Xiangxue Li, Dong Zheng, Shengli Liu, Jianhua Li:

AE-BP: Adaptive Erasure Belief Propagation Decoding Algorithm of LDPC Codes. 479-483 - Xiang Zheng, Zheng Qin, Jiankuan Xing:

An Approach to Distribute Replicas among Decentralized Tuple Space Nodes. 484-488 - Wonhyuk Lee, Joon Woo, Hyuncheol Kim, Jinwook Chung:

Design and Implementation of Computer and Network Resource Optimization for Linking High-Performance Computing Resources. 489-493 - Yang Tao, Shudan Zhang:

Dormancy Scheduling Algorithm Based on Node's Self-Adaptive Density in WSN. 494-500 - Young-Hyun Choi, Tai-Myoung Chung:

Enhanced Light Weight Route Optimization in Proxy Mobile IPv6. 501-504 - Ruibo Wang

, Kai Lu:
Hierarchical Conflict Detection for Cluster's Transactional Memory. 505-507 - Wonhyuk Lee, Seunghae Kim, Hyuncheol Kim, Jinwook Chung:

Proposal for Deploying PCE Architecture to Optimize a Path Based on GMPLS Network. 508-510 - Fagui Liu, Zexiang Wu, Weipeng Mai:

Renewal-Theory-Based Hard Disk Power Management Strategy Optimization. 511-515 - Qing Ding, Ming Jiang, Xi Li, Xuehai Zhou:

RePro: A Reputation-based Proactive Routing Protocol for the Wireless Mesh Backbone. 516-521 - Feng Xu, Likun Jia, Rongyan Jiang:

The Design of a Component Description Language in the Environment of Internet. 522-526 - Inwhee Joe, Wooyeob Lee:

A Selective MAP Binding Scheme Based on the Mobile Speed. 527-530 - Inwhee Joe, Jaehyung Lee:

An Enhanced TCP Protocol for Wired/Wireless Networks. 531-533 - Weiwei Xia, Liang He, Junzhong Gu, Keqin He:

Effective Collaborative Filtering Approaches Based on Missing Data Imputation. 534-537 - Wuu-Yee Chen, Tsang-Yean Lee, Nai-Wen Kuo, Yuan-Hwa Mei, Shan-Kai Chen, Yu-Chen Yan:

Job Schedule Model Based on Grid Environment. 538-543 - Su-Hwan Ko, Jung-Kyu Lee:

Limited Contention Scheme (LCS) to Reduce Collision in LR-WPAN. 544-548 - Youn-Gyou Kook, Jae-Oh Lee:

Personalized Recommendation Service in the IMS Environments. 549-554 - Soo-Duek Kim, Jong-Hyouk Lee, Tai-Myoung Chung:

Secure Fast Handover Scheme of Proxy Mobile IPv6. 555-558 - Wen Xiong, Cong Wang:

A Hybrid Improved Ant Colony Optimization and Random Forests Feature Selection Method for Microarray Data. 559-563 - Jing Wu, Yanheng Liu, Rong Lv, Guo-xin Cao:

A Method of Network Traffic Analysis Based on Multiple-Combination Model. 564-568 - Hecheng Li, Yuping Wang:

A Mixed-Encoding Genetic Algorithm for Nonlinear Bilevel Programming Problems. 569-573 - Bayalagmaa Davaanaym, Young-Sil Lee, Hoon-Jae Lee, Sanggon Lee, Hyotaek Lim:

A Ping Pong Based One-Time-Passwords Authentication System. 574-579 - Ruijuan Zheng, Meiyu Xu, Jiexin Pu, Qingtao Wu:

A System Service Optimization Model Based on Martingale Difference Approximation. 580-583 - Yinzhao Li, Dongxu Yang, Jiadong Ren, Changzhen Hu:

An Approach for Database Intrusion Detection Based on the Event Sequence Clustering. 584-588 - Yuan Huang, Xing Wang, Ben-Chang Shia:

Efficiency and Consistency Study on Carma. 589-594 - JinKyoung Heo:

Encipherment Key Management System for Massive Web Contents. 595-599 - JongHo Ryu, JungChan Na:

Hash Function with Variable Output Length. 600-605 - Ming-Chang Lee, Mei-Wen Han:

Knowledge Value Chain Model Implemented for Supply Chain Management Performance. 606-611 - Johannes K. Chiang

, Wen-Chin Wu, Wei-Cheng Liao, Chi-Yen Yin:
Machine Learning Trend Anticipation by Text Mining Methodology Based on SSCI Database. 612-617 - Heasuk Jo, Yunho Lee, Mijin Kim

, Seungjoo Kim
, Dongho Won:
Off-Line Password-Guessing Attack to Yang's and Huang's Authentication Schemes for Session Initiation Protocol. 618-621 - Yongtao Hao, Chong Ma, Cheng Xin:

Research of Product Function Gene Model Based on Behavior Semantic Web. 622-627 - Honghui Dong, Limin Jia, Xiaoliang Sun, Chenxi Li, Yong Qin, Min Guo:

Road Traffic State Prediction with a Maximum Entropy Method. 628-630 - Ling Ji, Dantong Ouyang, Yuxin Ye:

SHOIQD System an Approach to Integrate Description Logic SHOIQ with Nonmonotonic Rules. 631-634 - JungMin Kang, KiWook Sohn, Soonyoung Jung:

WebVaccine: A Client-Side Realtime Prevention System against Obfuscated Malicious Web Pages. 635-637 - Jia-jun Wei:

Algorithm to Arrange Storage Locations for Export Containers in the Yard. 638-641 - Xiao-Fan Zhi, Zhi-Cheng Liao, Yi Sun:

An Intersection-Centric IBF* Algorithm for Traffic Simulation Routing Guidance. 642-646 - Jianting Zhou, Jianxi Yang:

Analysis on Non-linear Characteristics of Bridge Health Monitoring Based on Time-Delayed Transfer Entropy and Mutual Information. 647-652 - Tao Yu, Zhou Jiang, Yi Chen:

Research on Chinese Urban Growth Path Based on the Conception of Sustainable Development. 653-656 - Yaying Zhang:

RFID-Based Tracking in Supporting Real-Time Urban Traffic Information. 657-659 - Xintao Liao, Ligang Dong, Chuanhuang Li:

A Generic Transaction Model for ForCES-Based Distributed Systems. 660-664 - Hyun Lee, Young Ran Lee, Jae Sung Choi, Ramez Elmasri:

A Reliable Data Capture in Multi-RFID Reader Environments. 665-668 - Xiaoqing Yan, Weiming Wang, Fenggen Jia:

Design and Implement of IPsec VPN Service Mapping Layer Based on the ForCES Framework. 669-672 - Yung Bok Kim:

u-Healthcare Service Based on a USN Middleware Platform. 673-678 - Guo Bin Wu, Huo Song Xia:

Warning System Construction Research Based on Emergency Diffusion. 679-681 - Jinkyo F. Choo, Dong-Ho Ha, Hyun-Moo Koh:

A Neural Network-Based Damage Detection Algorithm Using Dynamic Responses Measured in Civil Structures. 682-685 - Junping Liu, Ke Zhou, Liping Pang, Zhikun Wang, Yuhui Deng, Dan Feng:

A Novel Cost-Effective Disk Scrubbing Scheme. 686-691 - Chengshi Zhao, Sangjun Bae, Mingrui Zou, Bin Shen, Kyungsup Kwak:

An Efficient Power Allocation Algorithm for Peak-Power Constrained Multicarrier Systems. 692-695 - Kevin F. R. Liu, Che-Fan Lu:

BBN-Based Decision Support for Health Risk Analysis. 696-702 - Guo Bin Wu, Huo Song Xia:

Case Study of Public Emergency Diffusion Based on SD Simulation. 703-705 - Jinsuo Lu, Tinglin Huang:

Data Mining on Forecast Raw Water Quality from Online Monitoring Station Based on Decision-Making Tree. 706-709 - Cheol-Kyun Heo, Dong Ryeol Shin:

Dynamic Power Management Based Call Pattern Recognition for Telecommunication Equipments. 710-712 - Qin Li, Xi Chen, Frank Veroustraete, Anming Bao

, Qinghan Dong, Tie Liu:
Estimation of Evaporative Fraction from Remotely Sensed in Arid/Semi-arid Regions. 713-718 - Yangting Wang, Yongxia Yu:

Gain Experiences from Process Improvement in School. 719-723 - Itrat Fatema, V. M. Thakare:

Clustered Agent Base Frame Work for Ad-hoc Networks. 724-728 - Deng Lu, Shanping Li, Liheng Zhao:

ETC-Based Methodology on Data Processing Validation. 729-732 - Chunjing Mao, Yong Guan, David Jungwirth

:
Research and Design of On-board Dynamic Reconfigurable Router. 733-738 - Marie Kim, Hyochan Bang, Hwang Jae Gak, Cheol Sig Pyo:

The Access Control Model in Ubiquitous Sensor Network Environment. 739-744
IMS 2009: International Conference on Advanced Information Management and Service
- Zhengwei Qi, Alei Liang, Haibing Guan, Ming Wu, Zheng Zhang:

A Hybrid Model Checking and Runtime Monitoring Method for C++ Web Services. 745-750 - Junren Wang, Qingzhong Li, Yongquan Dong:

A Method of Schema Matching Based on Top-K Mapping and User Feedback. 751-756 - Weiguo Li, Yongfu Wang, He Huang:

A New Model for Software Reliability. 757-760 - Lingjuan He, Lianchen Liu, Cheng Wu:

A Revised Service Group Model for Web Service Availability Management. 761-766 - Baohua Fan, Heying Zhang, Wenhua Dou:

A Time Varying Network Calculus. 767-772 - Chia-Hui Huang:

An Efficient Piecewise Linearization Method in Fuzzy Multi-objective Programs. 773-779 - Bei Hu, Rongzhi Liu:

An Empirical Analysis on the Peasant Entrepreneurs Influence on the Industrial Cluster in Rural China. 780-784 - ChangKug Kim, UngHan Yoon, GangSeob Lee, DoWon Yun, SeongHan Park, SukMan Kim, Yong-Hwan Kim:

An Integrated Analysis System for Agricultural Biotechnology Information and Web Service. 785-787 - Youngkon Lee:

Business-Centric SOA Test Framework Based on BPA-Simulated Event. 788-793 - Yan-jie Dong, Xue-hua Wang, Jun Zhou:

CostBP Algorithm and its Application in Customer Churn Prediction. 794-797 - Yogesh Singh, Anjana Gosain, Manoj Kumar

:
From Early Requirements to Late Requirements Modeling for a Data Warehouse. 798-804 - Yu Wang, Dong-Mei Chen, Xiao-Min Zhang:

HeXie Mechanism Design on Interest Distribution in Virtual Enterprises. 805-808 - Wei Tan, Xi-fan Yao, Bin Wang, Shan-Jun Zhang:

Model of Intellectual Information Management in Manufacture Enterprise Web Services-Oriented. 809-814 - Nurul Huda Ahmad Zahari, Mohd. Najib Mohd. Salleh

, Muhaini Othman
:
The Design of Payment Model for Financial Transaction Using MyKad. 815-819 - Tae-You Lee, Yong-Ki Ku, Choon-Sung Nam, Dong Ryeol Shin:

The Microkernel Concept Based Dependable System Architecture. 820-823 - Kyeongrim Ahn, Keunyoung Youn, SunHo Park:

The Study of Interface Standard for Single Window System. 824-828 - Mustarum Musaruddin

, Rastko Zivanovic:
Web Services for Automated Fault Analysis in Electrical Power System. 829-832 - Mi-Young Choi, Jong-Youn Bae, Chang-Joo Moon

, Doo-Kwon Baik:
A Methodology for Developing Data Taxonomy for Data Architecture. 833-838 - Chunyong Yin, Ruxia Sun, Shuoben Bi:

A Model of Information Security Based on Office Automation. 839-841 - Sohaimi Zakaria, Azrilah Abdul Aziz:

Online Information Satisfaction: A Rasch Model Measurement of Information Management Experience within the Malaysian Agricultural Extension Services. 842-848 - Shan-yan Huang

, Han-yuh Liu:
Applying Double-Loop Knowledge Management Model on Customer Self-Service Systems for Taiwan's E-government. 849-854 - Yongbin Zhang, Fucheng You, Huaqun Liu:

Behavior-Based Credit Card Fraud Detecting Model. 855-858 - Suphakit Niwattanakul

, Michel Eboueya, Philippe Martin:
DOCINER: A Document Indexation Tool for Learning Objects. 859-863 - Deepak Dahiya

, Usha Batra
:
Enterprise Knowledge Management Systems: Role of Aspects and Distributed Middleware Framework. 864-869 - Minsoo Kim, Minkoo Kim:

Handling Exceptions in Situation-Driven Agent Systems. 870-875 - Christian Bettinger, Andreas Baumann, Frank Hausen, Georg Schneider

, Hermann Schloss:
HERA: Design Framework for Decentralized Distributed Virtual Environments and Games. 876-881 - Deepak Dahiya

, Usha Batra
:
Improving Software Design Using Aspects in Distributed Computing. 882-887 - Jinlin Wang, Xi Chen, Kefa Zhou:

Research on a Scalable Parallel Data Mining Algorithm. 888-893 - Mengbo Hou, Qiuliang Xu:

Secure and Efficient Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme. 894-897 - Reinhard Keil, Jonas Schulte, Ingo Döpke:

Security Management for Flexibility in Virtual Knowledge Spaces. 898-906 - Ming-Che Lee, Jia Wei Zhang, Wen Xiang Lee, Heng Yu Ye:

Sentence Similarity Computation Based on POS and Semantic Nets. 907-912 - Gang Yin, Dianxi Shi, Min Guo, Huaimin Wang:

SRDL: A Simple Role-Based Delegation Logic. 913-916 - Ka-Kyung Oh, Tae-You Lee, Choon-Sung Nam, Dong Ryeol Shin:

Strong Authentication and Key Agreement Protocol in UMTS. 917-920 - Tommy King Lun Choy

, Harry K. H. Chow, Karen Ka-Leung Moon, Alvis C. K. Cheng:
The Knowledge Based System to Support the Subjective Hand Evaluation Process of Fabric Swatch Selection in Fashion and Textile Industry. 921-925 - Lei Shi, Lei Fan, Zhenzhen Meng:

The Research of Using Jena in the Semantic-Based Online Learning Intelligent Behavior Analysis System. 926-929 - Ji-Hyun Hwang, Youn-Gyou Kook, Jae-Oh Lee:

A Dynamic Routing Algorithm for Managing CSCF Agents in the IMS Network. 930-935 - Hee-Yeon Cho, Choon-Sung Nam, Hyung-Rok Seo, Dong Ryeol Shin:

A Railroad Integration of Services Based on OSGi Platform. 936-938 - Jong-Wan Yoon, Hyung-Rok Seo, Choon-Sung Nam, Dong Ryeol Shin:

Agent Based Sensor Network Middleware Sporting Heterogeneous Environments. 939-942 - Nam-gi Kang, Jae-sun Park, Tae-min Hong, Yang Dam Eo, Byoung-kil Lee

, Mu-wook Pyeon:
Development of RTLS Access Point Allocation Prototype for Location Tracking in Construction Sites. 943-948 - Jae Hyoung Cho, Jae-Oh Lee:

IMS Based PoC Service Deployment. 949-954 - Muhammad Rafi, Hilal Qureshi, Hasina Khatoon:

Ontology Maintenance via Multi-agents. 955-959 - Weihong Han, Yan Jia, Shuqiang Yang:

Research of Massive Internet Text Data Real-Time Loading and Index System. 960-965 - Fei Ma, Wenan Zhou, Junde Song, Guang-xian Xu:

Research on Handoff Mechanism Based on Capability Adaptation in Heterogeneous Network Platform. 966-969 - Bipin Upadhyaya, Eunmi Choi:

Social Overlay: P2P Infrastructure for Social Networks. 970-976 - Mei Song, Lijie Wang:

Study on Groundwater Optimization Model Based on GIS. 977-980 - Chia-yen Wu, Han-yuh Liu, Yi-ting Wang:

Business Blogs for Interactive Storytelling: An Interpretive Interactionism Perspective. 981-985 - Fathia Lahwal

, Mohamed Amaimin, Ajlan Suliman Al-Ajlan:
Perception Cultural Impacts: Principles for Trainer's Skills for E-learning. 986-993 - Mira Kajko-Mattsson, Kristoffer Sjokvist, Joakim Soderstrom, Dag Krogdahl:

DRiMaP--A Model of Distributed Risk Management Process. 994-1000 - José Crispín Zavala Díaz, Dalia V. Garcia-Villagomez, Jorge A. Ruiz-Vanoye

, Ocotlán Díaz-Parra
:
Selection of an Investment Portfolio by Means of a Mathematical Model of Optimization Applied to Mexican Stock-Market in Period of Debacle. 1001-1006 - Ping Wang, Yuncheng Huang, YuanSu Wang:

Support Vector Regression Model of Currency Options Pricing with Stochastic Volatility Models and Forward Exchange Rate. 1007-1012 - Sadaf Ashtari, Jamshid Nazemi

:
Sustainable Development via Value Based Management System. 1013-1018 - Wen-Chih Tsai, Chiung-Fen Huang, An-Pin Chen:

Using Extended Classifier System for Portfolio Allocation of MSCI Index Component Stocks. 1019-1024 - Joonhyun Bae

, Sangwook Kim:
A Global Social Graph as a Hybrid Hypergraph. 1025-1031 - Hong Chen

, Hui Qi, Ruyin Long
:
Behavior Safety Integration Management and Control System for Coal Enterprises. 1032-1040 - Chi-Yen Yin, Johannes K. Chiang

:
Social Capital: The Literature Productivity Review and Trend Forecast Using Bibliometric Methodology from 1959 to 2008. 1041-1046 - Chi-Chang Chang

, Pei-Ran Sun, Sun-Long Cheng, Ruey-Shin Chen, Kuo-Hsiung Liao:
Developing a Risk Analysis Framework for Hospital Information Security Management. 1047-1052 - Peom Park, You Min Shin, Ho-Young Byun, JaeSoo Yang:

Preliminary Children Health Care Service Using Ubiquitous Technology. 1053-1057 - Youngkon Lee:

2-Layered SOA Test Framework Based on BPA-Simulated Event. 1058-1063 - Han-yuh Liu, Shih-yu Fang:

An Approach to Explore Effective Customer-Centric E-government. 1064-1069 - Seong-Pil Kong, Yang Dam Eo, Chang Jae Kim:

On the Policy Support to Promote Intelligence Vision System Base on the Ubiquitous Community Computing. 1070-1074 - Xianpeng Huangfu, Zhen Shu, Honghui Chen, Xueshan Luo:

Research on Dynamic Service Composition Based on Object Petri Net for the Networked Information System. 1075-1080 - Yushun Li, Hui Guo, Ge Gao, Ronghuai Huang, Xiaochun Cheng

:
Ubiquitous E-learning System for Dynamic Mini-courseware Assemblying and Delivering to Mobile Terminals. 1081-1086 - Ata Farzamnia, S. M. R. Nasserzadeh, Soroosh Nalchigar:

Which Internet Marketing Mix's Has More Effect on the Passenger's Decision for Choosing Their Travel Agency in Iran?. 1087-1092 - Jiyun Xie:

A New Flex Real-Time Messaging Framework. 1093-1095 - Jun Wang, Lan-juan Liu:

A Study of Design Flow of Management Experiments Based on Software Engineering. 1096-1101 - Defen Zhang, Shixian Li, Xianming Liu:

An Approach for Model Composition and Verification. 1102-1107 - Jianghong Zhao, Yanming Wang, Ganhua Yin:

Ancient Architecture Point Cloud Data Triangulation Algorithm Integrated with Cylindrical Projection and Tangent Plane Projection. 1108-1113 - Hongjin Zhang, Xiaohu Yang:

Rule Engine Research and Implementation in Financial System. 1114-1117 - Limin Mi, Yuanxing Liu:

The Uncertainty Mathematical Methods of Economic Analysis. 1118-1122 - Lin Guo, Hai-Bo Li, Zhi-hai Yu, Lejun Zhang, Jianpei Zhang:

A Novel Security Network Storage System Based on Internet. 1123-1127 - Youngkun Min, Bogju Lee, Chansu Yu:

A Personal Memex System Using Memex Ontology and Web Services. 1128-1130 - Laila Mohamed El Fangary

:
Applying an Enhanced Algorithm for Mining Incremental Updates on an Egyptian Newspaper Website. 1131-1135 - Ying Tan, Lan Huang, Hong Qi, Yandong Zhai:

Design and Implementation of Chinese Text Clustering System. 1136-1140 - JongHo Ryu, JungChan Na:

Information-Revealing with Distributed Escrow Authorities. 1141-1146 - Qin Yuanjian, Xiao Zhixiong:

Research on a Knowledge Management Model of Modern Service Enterprises Based on Value Chain. 1147-1152 - Lejun Zhang, Jianpei Zhang, Lin Guo, Hua Huang, Yongtian Yang, Pengfei Sun:

Research on Reliable Transport Technology of Tubular Distribution Mobile Wireless Sensor Network. 1153-1156 - Sung Yong Kim, Ki Yong Kwon, Won Don Lee:

A Biological Early Warning System for Toxicity Detection. 1157-1160 - Lihua Feng, Jiahong Feng:

Analysis on the Classification Error of ANNS. 1161-1164 - Huandong Chen, Shulei Wu, Chunhui Song, Jinmei Zhan, Juntao Chen, Dong Kang:

E-learning System Model Construction Based Constructivism. 1165-1169 - Lan Huang, Guixia Liu, Rongxing Wang, Bin Yang, Chunguang Zhou:

Improved Clonal Selection Algorithm for Protein Contact Map Prediction. 1170-1175 - Yubo Deng, Jianwei Niu

, Lian Li:
Modeling of Broadcasting Based on Distance Scheme for WSN. 1176-1179 - Tae-Woong Jung, Jee-Hee Koo, Kyoung-Min Kim, Mu-Wook Pyeon:

Research on RFID System Recognition Test under the Forestry Environment for Tree Management. 1180-1184 - Huandong Chen, Shulei Wu, Chunhui Song, Mingrui Chen:

Research on the Learning Theory of E-learning. 1185-1187 - Bin Yang, Chunyang Li, Lan Huang, Ying Tan, Chunguang Zhou:

Solving One-dimensional Cutting-Stock Problem Based on Ant Colony Optimization. 1188-1191 - Marius Crisan:

Upon the Dynamic Modeling of Sentence Meaning. 1192-1197 - Cheng Lin, Zhongdong Huang:

A Flexible Metric-Driven Framework for Software Process. 1198-1202 - Tao Yu, Qiang Wu, Ying Hong:

Analysis on the Spillover Effect of Foreign Direct Investment: Case of Suzhou. 1203-1206 - Han-Ying Kao, M.-C. Liu, C.-L. Huang, Y.-C. Chang:

E-learning Systems Evaluation with Data Envelopment Analysis and Bayesian Networks. 1207-1210 - Hui Chai:

A Performance Model For E-education Project. 1211-1214 - Xiuheng Zhao, Rui Chen:

The Expansion of Information Concept. 1215-1218 - Wei Zheng, Chunhong Zhang, Cuibo Yu, Peng Yang, Yuqi Mu, Xiaohua Zhang:

Design of Presence Based Dynamic Group IM in IMS. 1219-1222 - Jong-Hun Kim, Chang-Woo Song, Jung-Hyun Lee, Kee-Wook Rim:

Design of RFID-Based Profiling Agent for Recommendation System in Smart Home. 1223-1226 - Jianwei Yin, Chunxu Lv:

Sub-order Non-duplication Event Matching Algorithm for Stateful Publish/Subscribe Systems. 1227-1233 - Yung Bok Kim:

Ubiquitous Name-Based Information Management with a Multilingual Domain Name Interface. 1234-1239
IDC 2009: International Conference on Digital Content, Multimedia Technology, and its Applications
- Shuhan Wei, Ranran Zhang, Pengyi Hao, Youdong Ding:

A Fast Texture Matching Algorithm Based on Multi-resolution and Partition. 1240-1245 - Pooya Monshizadeh Naeeni, Alireza Nasiri Avanaki, Sied Mehdi Fakhraie:

A New Approach for Combined Demosaicking and Watermarking in Digital Camera Pipeline. 1246-1250 - Yongheng Guo, Wei Cai, Tiejun Lu, Zongmin Wang:

A Novel 1GSPS Low Offset Comparator for High Speed ADC. 1251-1254 - Jiangbin Xu, Hanchen Song, Lingda Wu, Chao Yang:

A Seamless Representation of Multi-scale Clouds. 1255-1260 - Yukikazu Murakami, Nobuo Funabiki, Hidekazu Tokunaga, Kazuhiro Shigeta, Toru Nakanishi:

A Web-Based Installation Manual Management System for Open Source Software. 1261-1266 - Min Seok Kang, Kyung-Sik Kim:

An Effective Scene Manager for the Online Game 'Chungmukong's Battle on the Sea'. 1267-1270 - Chung-Pyo Hong, Eo-Hyung Lee, Shin-Dug Kim:

An Efficient Scheme to Construct Virtual Community for Multimedia Content Sharing Based on Profile in a Ubiquitous Computing Environment. 1271-1276 - Na Luo, Weiwei Hu, Jin Zhang, Tao Fu, Jun Kong:

Applying Iterative Logistic Regression and Active Learning to Relevance Feedback in Image Retrieval System. 1277-1282 - Hsin-Chang Yang

, Han-Wei Hsiao, Chung-Hong Lee:
Automatic Construction of Multilingual Web Directory Using Self-Organizing Maps. 1283-1288 - Jian Zhao, Hanchen Song, Jiangbin Xu, Lingda Wu:

Automatic Exploration Path Planning for 3D Object Observation. 1289-1294 - Conrado R. Ruiz Jr.

, Rafael Cabredo, Levi Jones Monteverde, Zhiyong Huang:
Combining Shape and Color for Retrieval of 3D Models. 1295-1300 - Yong Li, Huayi Wu:

DEM Extraction from LIDAR Data by Morphological Gradient. 1301-1306 - Yu-Chen Song, Hai-Dong Meng, Shu-Ling Wang, Michael J. O'Grady

, Gregory M. P. O'Hare
:
Dynamic and Incremental Clustering Based on Density Reachable. 1307-1310 - Conrado R. Ruiz Jr.

, Nor Hidayu Salimi
, Sujitra Chodnok, Pham Trung Ha:
Exploring Traditional Art and Culture in Modern Computer Games. 1311-1316 - Dal-Hwan Yoon, Long Chen, Ki-Hwan Seo, Jong-Uk Yoon, Jong-Hwa Yoon:

Home Control System with the Mobile. 1317-1320 - Yang Qu, Kyungmi Lee, Ickjai Lee

:
Qualitative Cluster Reasoning Framework for Decision Making. 1321-1326 - Cuijuan Li, Bo Xu:

Research on Knowledge Management of Pyramidia for E-learning System. 1327-1330 - Dwen-Ren Tsai, Wei-Yu Chen, Chia-Hao Liang, Chung-Chiang Hu:

Role-Based Access Control of Digital Right Management. 1331-1334 - Sathit Intajag, Nopparat Sukkasem:

Speckle Filtering by Generalized Gamma Distribution. 1335-1338 - Hamze Moazami Goodarzi, Saeed Seyedtabaii:

Speech Enhancement Using Spectral Subtraction Based on a Modified Noise Minimum Statistics Estimation. 1339-1343 - Li Wang, Jianghao Wang, Hanqing Ma, Yu Deng, Jian Wang, Rui Chen:

The Progress in Modeling Research of Urban Spheres of Influence in China. 1344-1347 - Porawat Visutsak

, Korakot Prachumrak:
The Smoothed 3D Skeleton for Animation. 1348-1353 - Ruhan He, Yong Zhu, Wei Zhan:

Using Local Latent Semantic Indexing with Pseudo Relevance Feedback in Web Image Retrieval. 1354-1357 - Manjit Singh Sidhu

:
Visualizing Curvilinear Cylindrical Engineering Members in 3-D Environment with Motion Path. 1358-1363 - Huan Zhao, Li-xia Zhao, Kai Zhao, Gangjin Wang:

Voice Activity Detection Based on Distance Entropy in Noisy Environment. 1364-1367 - Yusuke Gotoh, Tomoki Yoshihisa, Hideo Taniguchi, Masanori Kanazawa:

A Scheduling Method on Selective Contents Broadcasting with Node Relay Based Webcast Considering Available Bandwidth. 1368-1373 - Sang C. Suh, Sam I. Saffer, Sri Ganesh Anaparthi, Nikolay Metodiev Sirakov:

Basics of Concepts Representation for Document Summarization. 1374-1380 - Hui-Kai Su, Wen-Hsu Hsiao, Yu-Kai Lin, Kim-Joan Chen, Cheng-Shong Wu:

Design of Cluster-Based System Framework for SIP-Based Multimedia Conferencing Services. 1381-1387 - Samrand Toufani, Gholam Ali Montazer:

Evaluation of E-publishing Acceptance in Iranian Academia. 1388-1394 - Soo-Hwan Kim, SeonKwan Han, Hyeoncheol Kim:

How Can We Teach Computational Literacy to All Levels of Students?. 1395-1400 - Kia Ng:

Interactive Multimedia Interface and Multimodal Analysis for Technology-Enhanced Learning and Performance Preservation. 1401-1405 - Jeong-Hye Han, Dong-Ho Kim, Jong-Won Kim:

Physical Learning Activities with a Teaching Assistant Robot in Elementary School Music Class. 1406-1410 - Eo-Hyung Lee, Chung-Pyo Hong, Shin-Dug Kim:

Real-Time Stable Personal Broadcasting Community for Mobile Terminals. 1411-1418 - Liming Wu, Yingmin Zhang, Yaohua Deng, Xiuchun Tang:

Stroke Segmentation of Reconstruct Offline Handwriting Diagram Based on Continuous Hidden Markov Model. 1419-1424 - Jong-Hyoun Kim:

The Initiative Experiments about New Interface for a Networked Game. 1425-1427 - Zequn Huang, Songnan Bai, Jaeil Jung:

A MIH Services Based Application-Driven Vertical Handoff Scheme for Wireless Networks. 1428-1431 - Jian Wang, Rui Chen, Xin Guo, Ruilong Li, Ningjie Yu, Pengyan Zhang:

Practice of Game-Theoretical Methods and Panel Data Model in City Environmental Management. 1432-1435 - Rui Chen, Jian Wang, Li Wang, Ningjie Yu, Pengyan Zhang:

The Forecasting of China Natural Gas Consumption Based on Genetic Algorithm. 1436-1439 - Xuebin Chen, Guolin Duan, Shufen Zhang, Jin Cai, Yuee Che:

Virtual Organization Model Research in Collaborative Design Grid. 1440-1444 - Haibin Zhang, Hui Zhang:

A Security Enhancement Scheme for Image Perceptual Hashing. 1445-1448 - Songnan Bai, Zequn Huang, Jaeil Jung:

Beacon-based Cooperative Forwarding Scheme for Safety Applications in IVC. 1449-1456 - Chi-Man Pun

:
High Capacity and Robust Digital Image Watermarking. 1457-1461 - Dal-Hwan Yoon, Yong-Jin Park, Keun-Seong Choi, Se-Min Park, Jong-Hwa Yoon, Jong-Uk Yoon:

Moving Image Frame with Moble. 1462-1464 - Chi-Man Pun

, Nopporn Hemman:
Reversible Digital Watermarking with Block Linking. 1465-1468 - Qin Wang, Shouning Qu, Caiyun Dong, Kui Liu:

The Application and Research of Text Mining in Relevance about Choosing Course and Research Project by Graduate Student. 1469-1472 - Chung-Hsin Liu, Chun-Lin Lo:

The Study of the SIP for the VoIP. 1473-1478 - Youngkon Lee:

2-Layered SOA Test Framework Based on Event-Simulating Proxy. 1479-1484 - Yi Liu, Yue Gao:

Acquiring Mood Information from Songs in Large Music Database. 1485-1491 - Maria de los A. Alonso, Argelio V. de la Cruz Rivera, Grettel Barceló:

An Artificial Intelligence Based Model for Algebra Education. 1492-1498 - Woo-Jin Seo, Seung Ho Ok, Jin-Ho Ahn, Sungho Kang, Byung In Moon:

An Efficient Hardware Architecture of the A-star Algorithm for the Shortest Path Search Engine. 1499-1502 - Iwan Njoto Sandjaja

, Nelson Marcos:
Sign Language Number Recognition. 1503-1508 - Chunxiang Li, Jinhua Li

, Jianhong Shen:
Simulation of Transient Non-stationary Winds. 1509-1512 - Jun Li, Xianghui Liu:

Survivability for Wireless Sensor Network: Model, Evaluation and Experiment. 1513-1516 - Jijie Zheng, Guozheng Wang, Haiyan Wu, Ying Tang:

The Implementation of a Wired Call-out System with Quasi-digital Encoding. 1517-1519 - Chun-Ping Qin, Duoli Zhang, Gaoming Du, Minglun Gao, Yu-Kun Song:

VLSI Architecture of Video Post-Processing System for MPEG/H.26X. 1520-1525 - Seon-Ho Park, Jung-Ho Eom, Tai-Myoung Chung:

A Study on Access Control Model for Context-Aware Workflow. 1526-1531 - Joseph K. Siror, Huanye Sheng, Dong Wang, Jie Wu:

Application of RFID Technology to Curb Diversion of Transit Goods in Kenya. 1532-1539 - Mangal Sain

, Hoon-Jae Lee, Wan-Young Chung:
Personal Healthcare Information System. 1540-1545 - Chung-Hsin Liu, Jiun-Ting Chen, Chung-Min Wu, Chuen-Lung Chen:

The Analysis for the Auxiliary Telemedicine System QoS. 1546-1551 - Chung-Hsin Liu, Yun-Mou Hou:

The Study of the Bluetooth Column-Ring path. 1552-1555 - Joseph K. Siror, Huanye Sheng, Dong Wang, Jie Wu:

Use of RFID Technologies to Combat Cattle Rustling in the East Africa. 1556-1562 - Chih-Fong Tsai, Wei-Chao Lin:

A Comparative Study of Global and Local Feature Representations in Image Database Categorization. 1563-1566 - Qing-Zhong Li, Jia-Xu Liu, Ai-Yun Zang, Zhongqi Wang, Wen-Jin Wang:

A DM642-Based Underwater Video Coding System. 1567-1572 - Qing Xu, Rui Zhang, Mateu Sbert

:
A New Approach to Salt-and-Pepper Noise Removal for Color Image. 1573-1576 - Sangjin Lee, Jonghun Park:

A Scoring Function for Retrieving Photo Sets with Broad Topic Coverage. 1577-1580 - Yingjun Du, Chongchong Yu, Jie Liu:

A Study of GIS Development Based on KML and Google Earth. 1581-1585 - Zhiyong Liu, Lei Liu, Hui Kang, Shaochun Zhong, Bing Jia:

An Ontology-Based Method of Adaptive Learning. 1586-1591 - QingE Wu, Zhenyu Han, TianSong Guo:

Application of an Uncertain Reasoning Approach to Software Aging Detection. 1592-1597 - Yoo-Joo Choi, Yu-Bu Lee, We-Duke Cho:

Color Correction for Object Identification from Images with Different Color Illumination. 1598-1603 - Jianfeng Zou, Ding Rong:

Compound Block Algorithm of Moving Object and Background in H.264. 1604-1606 - Moon Sang Hwang, Jae Wook Jeon:

Design of the 3D Input Method Based on Touch Device for Mobile. 1607-1610 - Jaekyong Jeong, Chunho Park, Byeungwoo Jeon

:
Global Feature Properties by Image Modifications and Variations. 1611-1614 - Wen-hua Zhou, Zhen-jie Jiang:

Hybrid Cataclysmic Genetic Algorithm Used to Reactive Power Optimization. 1615-1618 - Jinho Lee, Jin Soo Choi, Jin Woo Hong, Haechul Choi:

Intra-mixture Prediction Mode and Enhanced Most Probable Mode Estimation for Intra Coding in H.264/AVC. 1619-1622 - Guitang Wang, Jing Ning

, Qiaofen Zhang, Wenjuan Liu, Luxin Tang:
Multifractal Spectrum Analysis on Microscope Image of Eutectic Carbides by a Quadratic Function Fitting. 1623-1627 - Laura Toni

:
Rate-Distortion Curve Evaluation for Cross-Layer Optimization in Multimedia Transmission. 1628-1631 - Peng Chen, Zhao Lu, Junzhong Gu:

Vehicle Travel Time Prediction Algorithm Based on Historical Data and Shared Location. 1632-1637 - Hsiao-Ya Chiu, Shi-Zong Wen, Chieh-Chung Sheng:

Apply Web 2.0 Tools to Constructive Collaboration Learning: A Case Study in MIS Course. 1638-1643 - Tae-Woong Jung, Jee-Hee Koo:

Developing Curriculum on U-City Education. 1644-1648 - Honghui Dong, Limin Jia, Xiaoliang Sun, Chenxi Li, Yong Qin:

Road Traffic Flow Prediction with a Time-Oriented ARIMA Model. 1649-1652 - Jee-Hee Koo, Tae-Woong Jung, Mu-Wook Pyeon:

Status of U-city Human Resource Development Business and the Direction for Education Policies. 1653-1657 - Chin-Ming Hsu, Hui-Mei Chao:

Multi-infusion Timing Controller with User-Friendly Interface for Loose Leaf Tea Brewing Service. 1658-1661 - Tianci Huang, Jingbang Qiu, Takeshi Ikenaga:

A Foreground Extraction Algorithm Based on Adaptively Adjusted Gaussian Mixture Models. 1662-1667 - Jingbang Qiu, Tianci Huang, Takeshi Ikenaga:

A FPGA-Based Dual-Pixel Processing Pipelined Hardware Accelerator for Feature Point Detection Part in SIFT. 1668-1674 - Pardeep Kumar

, Hoon-Jae Lee:
A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon Cipher. 1675-1680 - Junjian Chen, Jingning Liu, Dan Feng, Zhikun Wang, Qinhua Yan:

IBE Applied to Identity Authentication for Object-Based Storage System. 1681-1684 - Seong-Pyo Hong, Moon-Su Jung, Il-Yong Chung:

Improving Scalability for RFID Privacy Protection Using Parallelism. 1685-1688 - Naofumi Aoki:

Lossless Steganography Techniques for IP Telephony Speech Taking Account of the Redundancy of Folded Binary Code. 1689-1692 - Kamaruddin Malik Mohamad, Mustafa Mat Deris:

Single-byte-marker for Detecting JPEG JFIF Header Using FORIMAGE-JPEG. 1693-1698 - Jingxue Lin, Peilin Song:

A Class of New AC-DC-AC Matrix Converter ACCMC. 1699-1704 - Cui-Xia Li, Wei-Ming Liu

, Yi Tang:
A New 12-channel Hand-Held GPS Accelerator Design. 1705-1708 - Chin-Ming Hsu, Hui-Mei Chao:

An Autonomous Mobile Robot System for Advanced Microcontroller Education. 1709-1714 - Xiao Deng, Qitu Hu, Liang Liang, Xiaoling Zhang:

Computer Simulation on Magnetic Field Distribution of Limited Current-Carrying Solenoids. 1715-1719 - Baosen Wang, Yuzhu Hao, Dawei Hu:

Evaluation of Enterprise Managers' Performance Based on Unascertained Measurement. 1720-1723 - Yongxiang Zhang, Fang-min Chen, Jian Wang, Wei-gong Zhang, Quan Zhou:

Implementation of Gray Projection Image Stabilization Algorithm Based on TMS320DM642. 1724-1726 - Jae Sung Choi, Hyun Lee, Ramez Elmasri, Daniel W. Engels:

Localization Systems Using Passive UHF RFID. 1727-1732 - Ziting Wang, Cunfang Zheng:

Research of Image Capturing and Processing System Based on SOPC Technology. 1733-1736 - Chunxiang Li, Jinhua Li, Peng Dong:

Spline Interpolation Based FFT Simulation Algorithm. 1737-1742 - Chun-Ying Liu, Zhi-geng Pan

, Jin-xiang Dong:
Texture Content-Based Image Retrieval for Necktie Pattern. 1743-1746 - Haiyan Yan, Bo Xu:

Using of Interactive Learning Environment in Experimental Study. 1747-1751 - Jun Dai, Jun Li:

VBR MPEG Video Traffic Dynamic Prediction Based on the Modeling and Forecast of Time Series. 1752-1757 - Otgonchimeg Buyanjargal, Youngmi Kwon:

An Energy Efficient Clustering Algorithm for Event-Driven Wireless Sensor Networks (EECED). 1758-1763 - Chi-Chang Chang

, Chuen-Sheng Cheng, Pei-Ran Sun:
Bayesian Inference of Time-Dependent Behavior with Nonhomogeneous Poisson Process. 1764-1769 - Ying-hong Dong:

Study on Realization of Simulative Operation System Based on 3D Alternation Technology. 1770-1775
Invited Session
- Yu-Chen Kuo, Wen-Tien Yeh, Ching-Sung Chen:

A Lightweight Routing Protocol for Mobile Target Detection in Wireless Sensor Networks. 1776-1782 - Kee-Hyun Choi, Dong Ryeol Shin, Ho-Jin Shin, Kyung-Soo Jang:

Content Self-Protection for Digital Products Using RFID-Enable Agent Platform. 1783-1788 - Gang Kou, Yi Peng:

A New Hierarchical Document Clustering Method. 1789-1792 - Weijian Huang, Shuo Liang, Yuanyuan Shi:

A Research on Exception Monitoring and Handling. 1793-1797 - Sung-Hyuk Park

, Soon-Young Huh, Peng Zhang, Yong Shi:
A Study on Identifying Essential Hyperplanes for Constructing a Multiclass Classification Model. 1798-1804 - Okuthe Paul Kogeda

, Simbarashe Nyika:
Automating Cellular Network Faults Prediction Using Mobile Intelligent Agents. 1805-1810 - Jiafu Ren, Min Xiao, Zongfang Zhou, Fang Zhang:

Based on Improved BP Neural Network to Forecast Demand for Spare Parts. 1811-1814 - Song-lin Yang, Wei Xi, Lian-xiang Ma, Hong-qin Zhang, Zhao-long Yang:

Optimizing-Computation of Controlling Parameters of Intelligent Propulsion System of a Hydrofoil Sliding Craft Propelled by Adjustable-Pitch Screw. 1815-1818 - Hui-fen Huang:

Perceptual Image Watermarking Algorithm Based on Magic Squares Scrambling in DWT. 1819-1822 - Weijian Huang, Juwei Yan, Fei Wang:

Research on Project Target Optimization and Decision-Making Based on MAUFT and AHM. 1823-1826 - Weijian Huang, Xuqian Zhou, Nianpeng Wang:

Research on the Application of Web Mining Framework in E-commerce Based on Mobile Agent. 1827-1830 - Youxin Luo, Bin Zeng:

The Non-equal-interval Direct Verhulst GM(1, 1) Model with Two Times Fitting and its Application to Test Data Processing. 1831-1835 - Yuan-Chu Hwang, Tsung-Lin Li:

Conquer Web 2.0 Motivational Challenges from Social Context Evolution. 1836-1841 - Chen-Shu Wang, Yu-Chieh Li:

Integrated Network Management Certification Training with Computer Game: A Knowledge Placement Framework. 1842-1845 - Yongtao Hao

, Dai Le:
Shape-Match Algorithm Based on Least Single Direction Warping Works of Points. 1846-1851 - SeungBong Lee, Jewan Bang, Kyung-Soo Lim, Jongsung Kim, Sangjin Lee:

A Stepwise Methodology for Tracing Computer Usage. 1852-1857 - Jewan Bang

, Byeongyeong Yoo, Jongsung Kim, Sangjin Lee:
Analysis of Time Information for Digital Investigation. 1858-1864 - Antonio Savoldi, Paolo Gubian, Isao Echizen:

How to Deal with Blurriness in Live Forensics: A Case of Study. 1865-1871 - Chun-Jung Chen, Chun-Chia Chang, Tai-Ning Yang, Chih-Jen Lee, Allen Y. Chang, Chang-Lung Tsai:

A New Strategy for Handling Global Feedback Loops in Selective-Tracing Waveform Relaxation Algorithm for Large Scale MOSFET Circuit Simulation. 1872-1875 - Hui An Sang, Dwen-Ren Tsai:

Analyzing Strategies of Integrating ICT into Teaching Activities Using Innovation Diffusion Theory. 1876-1878 - Chung-Hsin Liu, Ping-Shin Tsai:

Efficiency Evaluation for the 3G and WiMAX. 1879-1883 - Weiya Wang, Chao Li:

Integrated Application of WBAN and WSN. 1884-1888 - Jung-Hong Hong, Hsiung-Peng Liao:

Interoperable Map Interface towards the Sharing and Integration of Internet Geospatial Resource: A Metadata Perspective. 1889-1895 - Allen Y. Chang, Dwen-Ren Tsai, Tsung-Chi Liu, Chun-Jung Chen, I-Horng Jeng:

Performance Evaluation of Real-Time Indoor Positioning with Active-RFID and CSS-Based Nano Lock System. 1896-1898 - Allen Y. Chang, Chang-Sung Yu, Sheng-Chi Lin, Yin-Yih Chang, Pei-Chi Ho:

Search, Identification and Positioning of the Underground Manhole with RFID Ground Tag. 1899-1903 - Sheng-Hsuan Hsu, Ching-Chi Hsu, Shun-Shii Lin, Ferng-Ching Lin:

The Analysis of a Multi-channel MAC Protocol Using Maximal Matching for Ad Hoc Networks. 1904-1909 - Wei-Yu Chen, Dwen-Ren Tsai:

The Creative Commons Based Digital Right Management Model. 1910-1912 - Chung-Hsin Liu, Chun-Lin Lo:

The Simulation for the SIP DDoS Attack. 1913-1917
Workshop
- Syed Muhammad Khaliq-ur-Rahman Raazi

, Sungyoung Lee, Young-Koo Lee:
A Novel Architecture for Efficient Key Management in Humanware Applications. 1918-1922 - Binlu Feng, Yunhua Zhou:

A Uniform Construction of New Exact Travelling Wave Solutions and its Applications. 1923-1928 - Yang Zhang:

An Efficient Anonymous Authentication Protocol with Pseudonym Revocability. 1929-1934 - Mohammad Anbar, Deo Prakash Vidyarthi:

GA-Based on Demand Bandwidth Reservation for Real-Time Traffic in Cellular IP Network. 1935-1942 - Yi Zhang, Jun Zhang, XingZu Shu, Lei Guo, Yong Shi, XinBo Liu:

Optimization of Intelligent Compactness Control Rule of Vibratory Roller Based on Genetic Algorithm Method. 1943-1947 - Giovanni Ciccarese

, Mario De Blasi, Pierluigi Marra, Vincenzo Mighali, Cosimo Palazzo
, Luigi Patrono
, Maria Laura Stefanizzi:
Vertical Handover Algorithm for Heterogeneous Wireless Networks. 1948-1954 - Scott Heard, Jing Huang:

Kernel-Perfection through the Push Operation. 1955-1957 - Muhammad Usman, Sohail Asghar, Simon Fong:

A Conceptual Model for Combining Enhanced OLAP and Data Mining Systems. 1958-1963 - Yang Hang, Simon Fong

:
A Framework of Business Intelligence-Driven Data Mining for E-business. 1964-1970 - Simon Fong

, Jackie Tai:
The Application of Trend Following Strategies in Stock Market Trading. 1971-1976 - Xin Wang, Hua Jiang, Zhenrong Deng:

A Controllable and Adaptable Computer Virus Detection Model. 1977-1981 - Wenming Huang, Peizhi Wen, Xianli Zeng, Zhenrong Deng:

A Trust Rating Model of Recommendation in Grid. 1982-1985 - Zhenrong Deng, Wenming Huang, Zhenbo Tang:

Design and Development of SIP-Based Billing Application Server System. 1986-1989 - Guoyong Cai, Baifa Luo, Zhenrong Deng, Weizhi Liao:

Policy-Driven Service-Augmented Agents toward Developing Flexible E-business Institution. 1990-1995 - Hua Jiang, GuiLin Xu, Zhenrong Deng:

Research of Multi-objective Optimization Based on Hybrid Genetic Algorithm. 1996-1999 - Abdullah S. Al-Mudimigh, Zahid Ullah

, Farrukh Saleem
, Fahad N. Al-Aboud:
Data Mining for Customer Queries in ERP Model. 2000-2005 - Wei-Cheng Liao, Don-Lin Yang

, Jungpin Wu, Ming-Chuan Hung:
Fast and Effective Generation of Candidate-Sequences for Sequential Pattern Mining. 2006-2009 - Jin-Sung Kim, Young-Gue Park:

Mapping Method of SCORM Content Aggregation Model for E-learning Content Design. 2010-2015 - Li-Shiang Tsay, Seunghyun Im:

Mining Generalized Actionable Rules Using Concept Hierarchies. 2016-2023 - Ji Eun Bae, Jin Wook Kim, Hang Joon Kim, Hyun-Soo Park:

Estimation of 3-D Trajectory of the Golf Ball Using Dual Linear Sensor. 2024-2030 - Yuchao Ma:

Empirical Study on Relationship between Independent Director System and Profitability of Listed Companies in China. 2031-2034 - Shu Quan Lu, Shiyu Xie, Takao Ito:

Estimation of the Rigidity and Expectational Model. 2035-2039 - Li Wenyi:

Financial Performance Evaluation of China's Listed Steel Companies from Shareholders' Perspective. 2040-2043 - Fuh-Gwo Jeng, Tzer-Long Chen, Tzer-Shyong Chen:

A Blind Signature Scheme Based on Elliptic Curve Cryptosystem. 2044-2049 - Jung-San Lee, Bo Li, Yung-Chen Chou:

A Brand-New Mobile Value-Added Service: M-Check. 2050-2055 - Chen-Hua Shih, Yaw-Chung Chen:

A Cross-Layering IPv6 Fast Handover Scheme for Real-Time Applications in IEEE 802.16e Network. 2056-2061 - Chung-Wei Chen, Shiuh-Jeng Wang, Yuh-Ren Tsai

, Hsing-Chung Chen:
A Framework of Multicast Key Agreement for Distributed User on 3G-WLAN. 2062-2068 - Kuan-Chieh Liao, Wei-Hsun Lee, Min-Hsuan Sung, Ting-Ching Lin:

A One-Time Password Scheme with QR-Code Based on Mobile Phone. 2069-2071 - Yun Cheol Kim, Young Gon Kim, Bo Kyung Lee:

A Safe and Quick Partially-Encrypted Handover Method. 2072-2078 - Jyu-Wei Wang, Hsing-Chung Chen, Yi-Ping Lin:

A Secure DSDV Routing Protocol for Ad Hoc Mobile Networks. 2079-2084 - Yung-Fa Huang

, Jhao-Wei Guo, Young-Long Chen:
An Energy Efficient Clustering for Cluster-Based Wireless Sensor Networks. 2085-2088 - Shen-Ho Lin, Jung-Hui Chiu, Sung-Shiou Shen:

Authentication Schemes Based on the EAP-SIM Mechanism in GSM-WLAN Heterogeneous Mobile Networks. 2089-2094 - Jong-Shin Chen, Yu-Nan Tsai, San-Hui Chuang, Zeng-Wen Hong

:
Efficient Mission-Oriented Coordination Selection Methods for Hierarchal Wireless Sensor Networks. 2095-2099 - Rui-Yen Chang, Chin-Lung Lee:

IP Video Surveillance Applications over WiMAX Wireless Broadband Technology. 2100-2102 - Yung-Fa Huang

, Chin-Wei Hsu, Fu-Bin Gao, Hsing-Chung Chen:
Performance of Adaptive Vertical Handoff in Heterogeneous Networks of WLAN and WCDMA Systems. 2103-2107 - Ya-Fen Chang, Hung-Chin Chang:

Security of Dynamic ID-Based Remote User Authentication Scheme. 2108-2110 - Hsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen, Chung-Wei Chen:

Temporal and Location-Based RBAC Model. 2111-2116

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














