


Остановите войну!
for scientists:


default search action
5th NCM 2009: Seoul, Korea
- Jinhwa Kim, Dursun Delen, Jinsoo Park, Franz Ko, Chen Rui, Jong Hyung Lee, Jian Wang, Gang Kou:
International Conference on Networked Computing and Advanced Information Management, NCM 2009, Fifth International Joint Conference on INC, IMS and IDC: INC 2009: International Conference on Networked Computing, IMS 2009: International Conference on Advanced Information Management and Service, IDC 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3769-6
INC 2009: International Conference on Networked Computing
- Hao-peng Chen, Guang Yang, Can Zhang:
A Closed-Loop Mechanism for Service Evaluating and Discovering on the Internet. 1-8 - Kiyong Kim, Yeonseung Ryu, Semog Kim, Jong Myung Rhee:
A Leader Management Scheme for Fault-Tolerant Multiple Subnets. 9-12 - Nandagopal Malarvizhi
, V. Rhymend Uthariaraj:
A Minimum Time to Release Job Scheduling Algorithm in Computational Grid Environment. 13-18 - B. N. Bhramar Ray, Alok Ranjan Tripathy
, Shakti Prasad Mohanty:
A New Interconnection Network for Parallel Computers. 19-24 - Bin Wu, Shoubao Yang, Xiaoqian Liu:
A Resource Service Risk Based Scheduling Algorithm in Grid Market. 25-30 - John Sanabria, Wilson Rivera
, Domingo Rodríguez, Yuji Yunes, Gail Ross, Cesar Sandoval:
A Sensor Grid Framework for Acoustic Surveillance Applications. 31-38 - Jianhua Wang, Jun Zhang, Weidong Ji, Long Zhang:
A Solving Model of Network Resource. 39-43 - Bhaskar Prasad Rimal
, Eunmi Choi, Ian Lumb:
A Taxonomy and Survey of Cloud Computing Systems. 44-51 - Srimathi Chandrasekaran
, Eunmi Choi, Venkat Viswanadh:
An Agent-Based Migration Transparency and Fault Tolerance in Computational Grid. 52-57 - Min-Woo Park, Jin-Young Choi, Young-Ju Han, Tai-Myoung Chung:
An Energy Efficient Concentric Clustering Scheme in Wireless Sensor Networks. 58-61 - Hu Song, Shoubao Yang, Bin Wu, Xiaoqian Liu, Liangmin Guo:
An Optimal Algorithm for Scheduling Tasks within Deadline and Budget Constraints. 62-65 - Wenxiao Feng, Tiejun Lu, Zongmin Wang:
Analysis and Design of Fully Differential Gain-Boosted Op-amp for 14bit 100MS/s Pipelined Analog-to-Digital Converter. 66-69 - Dongmei Xing, Hong Zhu:
Approximation Strategy Based on Data Merging for Static Data Management in Networks. 70-75 - Maryam Homayouni, Seyed Vahid Azhari, Mojataba Jahanbakhsh, Ahmad Akbari
, Alireza Mansoori, Nahid Amani:
Configuration of a SIP Signaling Network: An Experimental Analysis. 76-81 - Dal-Hwan Yoon, Long Chen, Teng Lian, Jong-Hwa Yoon, Jong-Uk Yoon:
Development of Zig System for Evaluating an Oscillator Performance. 82-85 - Nibedita Adhikari
, Chitta Ranjan Tripathy:
Extended Crossed Cube: An Improved Fault Tolerant Interconnection Network. 86-91 - Hai Zhang, Zhuxu Yang, Wenming Guo:
Flow Byte Sizes Estimation from Simple Random Packet Sampling. 92-96 - Chen-Shu Wang, Hsin-Chang Li:
General Model for Ubiquitous Networking Deployment Constructed Recommendation. 97-102 - Yao Yu, Yu Zhou, Sidan Du:
Impact of Interference on Multicast Throughput over Ad Hoc Networks. 103-110 - Yongtao Hao
, Wenjing Han:
Intelligent Design-Oriented Product Functional Decomposition Iterative Model. 111-116 - Shakti Mishra
, Dharmender Singh Kushwaha, Arun Kumar Misra:
Jingle-Mingle: A Hybrid Reliable Load Balancing Approach for a Trusted Distributed Environment. 117-122 - Alvin Chew HouMing, Koh Kim Leng:
Network Stochastic Optimization for Large Virtual Environment. 123-129 - Xiaoyong Lu, Liqing Li, Xiaogang Zhou:
Reduction Method of Order-Cycle Column Remove Based on Indiscernibility Relation. 130-133 - Dianchuan Jin, Xuebin Chen, Zhaohua Qian:
Resolution and Reconstruction of an Algorithm by a Modified Mobius Transformation in Signal Processing. 134-137 - Inwhee Joe, Sijia Yan:
SCTP Throughput Improvement with Best Load Sharing Based on Multihoming. 138-142 - Xiaoan Bao, Na Zhang, Zuohua Ding:
Test Case Generation of Concurrent Programs Based on Event Graph. 143-149 - Yongbin Zhang, Liangbin Zheng, Fucheng You:
The Design and Implementation of Behavior-Driven Artificial Neural Network Computing System. 150-153 - Chung-Hsin Liu, Ping-Shin Tsai:
The Study for Wireless Network Packet Transmission. 154-157 - Kazi Md. Abdullah Al Mamun, Md. Kawsar Habib, Nazmus Sakib, Al-Amin Pervez:
Wireless Bandwidth Estimation Technique (WBET) to Maintain the Quality of Service (QoS) of IEEE 802.11e Network. 158-160 - Min Xiang, Ping Wang, Zhiyong Luo, Young Han Kim, Yan Jin:
A New Data Gathering Algorithm Based on Mutual Supportability and Grey Prediction in Wireless Sensor Networks. 161-165 - SungHee Jeon, JoonGoo Park:
A RFID Reader Configuration with an Enhanced Recognition Property for Indoor Positioning. 166-169 - Yi Zhao, Wenlong Huang:
Adaptive Distributed Load Balancing Algorithm Based on Live Migration of Virtual Machines in Cloud. 170-175 - Shufen Zhang, Xuebin Chen, Hongcan Yan, Shuai Zhang:
Collision Detection and Conflict Solution Research in Modern Collaborative Design. 176-181 - Yu-Feng Lan, Shin-Ming Huang:
Designing an Efficient Collaborative Learning Model to Construct a Consensus Based on Binary Tree Structure. 182-187 - Colin Lemmon, Siu Man Lui, Ickjai Lee
:
Geographic Forwarding and Routing for Ad-hoc Wireless Network: A Survey. 188-195 - Ik-Hyun Jhin, Nak-Min Choi, Eun-Sun Cho
:
Integration of RDF Processing into a Programming Language. 196-199 - Bo Dong, Qinghua Zheng, Lingzhi Xu, Haifei Li, Jie Yang, Mu Qiao:
Jampots: A Mashup System towards an E-learning Ecosystem. 200-205 - Zuohua Ding, Mingyue Jiang:
Rebuilding Web Application Requirements Based on User Navigation. 206-213 - Minglu Li, Jianping Li
, Hao Song, Dengsheng Wu
:
Risk Management in the Trustworthy Software Process: A Novel Risk and Trustworthiness Measurement Model Framework. 214-219 - Lican Huang
:
Semantic P2P Network for Healthcare. 220-225 - Sameer Abufardeh, Kenneth Magel:
Software Internationalization: Testing Methods for Bidirectional Software. 226-231 - Hun-Jung Lim, Tai-Myoung Chung:
The Bias Routing Tree Avoiding Technique for Hierarchical Routing Protocol over 6LoWPAN. 232-235 - Yu-Feng Lan, Yu-Cheng Jiang:
Using Instant Messaging and Annotation Services to Improve Undergraduate Programming Courses in Web-Based Collaborative Learning. 236-241 - Lin Liu, Yuanfu Zhao, Suge Yue:
3D Simulation of Charge Collection and MNU in Highly-Scaled SRAM Design. 242-246 - Jinpei Pan, Mingchu Li, Weifeng Sun, Jing Hu:
A Mediated RSA-Based End Entity Certificates Revocation Mechanism in Grid. 247-250 - Wan Haslina Hassan, Ahmed Mustafa Mahmood, Norsheila Fisal:
An Agent-Based Mobility Protocol for Improved Mobile QoS in Next Generation IP Networks. 251-256 - Xin Liu, Neng Wang:
Anti-misbehavior System for Tor Network. 257-261 - Wen-Yau Liang:
Apply Rough Set Theory into the Information Extraction. 262-266 - Huan Li, Bo Liu:
Collective Behavior of Dynamic Swarm with General Topology and Complex Communication Time-Delays. 267-271 - Xing Wang, Xin Wang, Zhaonan Sun:
Comparison on Confidence Bands of Decision Boundary between SVM and Logistic Regression. 272-277 - Tzu-Yen Wang, Chin-Hsiung Wu, Chu-Cheng Hsieh:
Detecting Unknown Malicious Executables Using Portable Executable Headers. 278-284 - Aung Nway Oo, Ni Lar Thein:
DLP Based Proxy Blind Signature Scheme with Low-Computation. 285-288 - Iraj Mahdavi, Shima Mohebbi, Namjae Cho, Rasoul Shafaei, Mahdi Zandakbari:
Dynamic Information Flow for Designing Simultaneous Coordination Model in E-Supply Network. 289-296 - Michael Hermano, Shirley B. Chu, Daniel Pua, Stephen Tan, Andrei Victor:
EVOGENTS: Evolving Agents. 297-302 - Hieu Trung Huynh, Yonggwan Won:
Extreme Learning Machine with Fuzzy Activation Function. 303-307 - Hua-Yi Lin:
High-Effect Key Management Associated with Secure Data Transmission Approaches in Sensor Networks Using a Hierarchical-Based Cluster Elliptic Curve Key Agreement. 308-314 - Mohd Najib B. Mohd Salleh
, Nazri Mohd Nawi
, Patrice Boursier
:
Incomplete Information of Decision Support System for Planting Material Selection. 315-319 - Alvin Chew HouMing, Koh Kim Leng, Xu Ke:
Providing a Heuristic Method to Simplify Behaviour Authoring. 320-324 - Yongtao Hao
, Dinghou Huang, Xiulian Qiu:
Research of Part Geometry Model and Gene Coding Based on Semantic Relationship. 325-328 - Guozheng Wang, Jijie Zheng, Haiyan Wu, Ying Tang:
Research of the Enterprise Application Integration Platform Based on Multi-agent. 329-331 - Chong-Yen Lee, Tsang-Yean Lee, Homer Wu, Hau-Dong Tsui, Heng-Sheng Chen:
Secure Site Authentication and Message Transmission Based on Grid Environment. 332-337 - Zhaohui Huang, Huajun Chen, Tong Yu, Hao Sheng, Zhaobo Luo, Yuxin Mao:
Semantic Text Mining with Linked Data. 338-343 - X. B. Tan, Longxin Cheng, Xiumei Xu:
Test Data Generation Using Annealing Immune Genetic Algorithm. 344-348 - Shufen Zhang, Xuebin Chen, Shuai Zhang, Hongcan Yan:
The Research on the Principle of Covert Communication and Defense Strategy Based on Sniffer. 349-352 - Xinyuan Zhang, Limin Jia, Honghui Dong, Zhuo Wang, Ke Wang, Yong Qin:
Analysis and Evaluation of Connectivity Reliability for Dynamic Transportation Network. 353-356 - Kuo-Hwa Chang, Yang-Shu Lu, Rong-Cheng Chang:
Performance Evaluation on Base-Stock Levels in a Single-Station Production System. 357-362 - Shenping Hu, Quangen Fang, Cunqiang Cai:
Formal Risk Assessment of Vessel Traffic at Coastal Waters. 363-368 - Kevin Miller, Suresh Sankaranarayanan
:
Role of Intelligent Agents and Wireless Body Sensor Mesh Networks in Patient Health Monitoring. 369-375 - Seunghyun Yoon, Namhee Park, Jinwon Choi:
A BIM-Based Design Method for Energy-Efficient Building. 376-381 - Jumphon Lertlakkhanakul, Yongzhi Li, Jinwon Choi, Soyoung Bu:
GongPath: Development of BIM Based Indoor Pedestrian Navigation System. 382-388 - Wonsuk Park, Kwan-Soon Park, Dong-Ho Ha, Jinkyo F. Choo:
Preference Based Genetic Algorithm for the Optimum Design of Integrated Structural Control System. 389-392 - Ali Barati
, Mohammad Ali Khosh Kholghi, Ali Movaghar
:
Recovery of Sensors in Wireless Sensor Networks. 393-396 - Alejandro Fernández-Montes
, Juan Antonio Ortega, Juan Antonio Álvarez
, Luis González Abril
:
Smart Environment Software Reference Architecture. 397-403 - Inwhee Joe, Jaeyoung Kim:
A Novel IP Paging Scheme with Dynamic Paging Areas according to the Mobile Velocity. 404-408 - Sang-seok Oh, Hyon-Young Choi, Sung-Gi Min:
A Route Optimization Scheme Based on Roaming in PMIPv6 (pROR). 409-415 - Mi-Young Choi, Eun-Ae Cho, Dae-Ha Park, Jong-Youn Bae, Chang-Joo Moon
, Doo-Kwon Baik:
A Synchronization Algorithm of Mobile Database for Ubiquitous Computing. 416-419 - Mirali Sharifi, Fatemeh Toossi, Tofig Kazimov:
An Approach for Selecting Active Nodes in Wireless Sensor Networks by Using Genetic Algorithms. 420-424 - Youngkon Lee:
An Implementation Case Study: Business Oriented SOA Execution Test Framework. 425-430 - Jong-Kuk Shin, Min-Sook Park, Mi-Ok Oh:
Effects of Customer Participation Level on Customers' Attributions, Emotions, and Behaviors in Case of Internet Service Failure. 431-436 - Sang Man Seong, Tae Whan Kim, Ick Ho Whang:
Estimation with Intermittent Observation Using Both a Priori and a Posteriori Information. 437-440 - Mario Köppen, Kaori Yoshida, Masato Tsuru, Yuji Oie:
Fairness-Based Global Optimization of User-Centric Networks. 441-443 - Gang Yin, Dian-xi Shi, Pinbo Sui, Huaimin Wang:
Towards General Access Control Management for Middleware Security. 444-448 - Fei Ge
, Liansheng Tan, Yuan-ni Wang:
Traffic Modeling with Bernoulli Shift Map. 449-452 - Ying Liu, Zhihong Qian, Dan Liu, Hui Zhong:
A DV-Hop Positioning Algorithm for Wireless Sensor Network Based on Detection Probability. 453-456 - Yao Yu, Lei Guo, Xingwei Wang, Jun Liu, Weigang Hou, Yan Li:
A New Node Role-Based Reputation Model in Hierarchical Ad Hoc Networks. 457-461 - Weigang Hou, Lei Guo, Xingwei Wang, Jiannong Cao, Jingjing Wu, Yan Li:
A New Routing Algorithm Based on Integrated Grooming Auxiliary Graph in Multi-granularity Optical Networks. 462-467 - Sisi Cheng, Qing Li, Qi Chen:
A New Routing Strategy to Improve Traffic Congestion for Scale-Free Network. 468-470 - Xin Zhao, Yuqin Lv, Tet Hin Yeap, Bin Hou:
A Novel Authentication and Key Agreement Scheme for Wireless Mesh Networks. 471-474 - Chunhui Song, Shulei Wu, Huandong Chen, Jinmei Zhan, Juntao Chen:
A Probe into the Concept of Multimedia. 475-478 - Chaonian Guo, Xiangxue Li, Dong Zheng, Shengli Liu, Jianhua Li:
AE-BP: Adaptive Erasure Belief Propagation Decoding Algorithm of LDPC Codes. 479-483 - Xiang Zheng, Zheng Qin, Jiankuan Xing:
An Approach to Distribute Replicas among Decentralized Tuple Space Nodes. 484-488 - Wonhyuk Lee, Joon Woo, Hyuncheol Kim, Jinwook Chung:
Design and Implementation of Computer and Network Resource Optimization for Linking High-Performance Computing Resources. 489-493 - Yang Tao, Shudan Zhang:
Dormancy Scheduling Algorithm Based on Node's Self-Adaptive Density in WSN. 494-500 - Young-Hyun Choi, Tai-Myoung Chung:
Enhanced Light Weight Route Optimization in Proxy Mobile IPv6. 501-504 - Ruibo Wang
, Kai Lu:
Hierarchical Conflict Detection for Cluster's Transactional Memory. 505-507 - Wonhyuk Lee, Seunghae Kim, Hyuncheol Kim, Jinwook Chung:
Proposal for Deploying PCE Architecture to Optimize a Path Based on GMPLS Network. 508-510 - Fagui Liu, Zexiang Wu, Weipeng Mai:
Renewal-Theory-Based Hard Disk Power Management Strategy Optimization. 511-515 - Qing Ding, Ming Jiang, Xi Li, Xuehai Zhou:
RePro: A Reputation-based Proactive Routing Protocol for the Wireless Mesh Backbone. 516-521 - Feng Xu, Likun Jia, Rongyan Jiang:
The Design of a Component Description Language in the Environment of Internet. 522-526 - Inwhee Joe, Wooyeob Lee:
A Selective MAP Binding Scheme Based on the Mobile Speed. 527-530 - Inwhee Joe, Jaehyung Lee:
An Enhanced TCP Protocol for Wired/Wireless Networks. 531-533 - Weiwei Xia, Liang He, Junzhong Gu, Keqin He:
Effective Collaborative Filtering Approaches Based on Missing Data Imputation. 534-537 - Wuu-Yee Chen, Tsang-Yean Lee, Nai-Wen Kuo, Yuan-Hwa Mei, Shan-Kai Chen, Yu-Chen Yan:
Job Schedule Model Based on Grid Environment. 538-543 - Su-Hwan Ko, Jung-Kyu Lee:
Limited Contention Scheme (LCS) to Reduce Collision in LR-WPAN. 544-548 - Youn-Gyou Kook, Jae-Oh Lee:
Personalized Recommendation Service in the IMS Environments. 549-554 - Soo-Duek Kim, Jong-Hyouk Lee, Tai-Myoung Chung:
Secure Fast Handover Scheme of Proxy Mobile IPv6. 555-558 - Wen Xiong, Cong Wang:
A Hybrid Improved Ant Colony Optimization and Random Forests Feature Selection Method for Microarray Data. 559-563 - Jing Wu, Yan-heng Liu, Rong Lv, Guo-xin Cao:
A Method of Network Traffic Analysis Based on Multiple-Combination Model. 564-568 - Hecheng Li, Yuping Wang:
A Mixed-Encoding Genetic Algorithm for Nonlinear Bilevel Programming Problems. 569-573 - Bayalagmaa Davaanaym, Young-Sil Lee, Hoon-Jae Lee, Sanggon Lee, Hyotaek Lim:
A Ping Pong Based One-Time-Passwords Authentication System. 574-579 - Ruijuan Zheng, Meiyu Xu, Jiexin Pu, Qingtao Wu:
A System Service Optimization Model Based on Martingale Difference Approximation. 580-583 - Yinzhao Li, Dongxu Yang, Jiadong Ren, Changzhen Hu:
An Approach for Database Intrusion Detection Based on the Event Sequence Clustering. 584-588 - Yuan Huang, Xing Wang, Ben-Chang Shia:
Efficiency and Consistency Study on Carma. 589-594 - JinKyoung Heo:
Encipherment Key Management System for Massive Web Contents. 595-599 - JongHo Ryu, JungChan Na:
Hash Function with Variable Output Length. 600-605 - Ming-Chang Lee, Mei-Wen Han:
Knowledge Value Chain Model Implemented for Supply Chain Management Performance. 606-611 - Johannes K. Chiang
, Wen-Chin Wu, Wei-Cheng Liao, Chi-Yen Yin:
Machine Learning Trend Anticipation by Text Mining Methodology Based on SSCI Database. 612-617 - Heasuk Jo, Yunho Lee, Mijin Kim, Seungjoo Kim
, Dongho Won:
Off-Line Password-Guessing Attack to Yang's and Huang's Authentication Schemes for Session Initiation Protocol. 618-621