callback( { "result":{ "query":":facetid:toc:\"db/conf/sucoms/sucoms2011.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"184.97" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"38", "@dc":"38", "@oc":"38", "@id":"43427797", "text":":facetid:toc:db/conf/sucoms/sucoms2011.bht" } }, "hits":{ "@total":"38", "@computed":"38", "@sent":"38", "@first":"0", "hit":[{ "@score":"1", "@id":"4751028", "info":{"authors":{"author":[{"@pid":"32/8354","text":"Maricel O. Balitanas"},{"@pid":"99/7631","text":"Rosslin John Robles"},{"@pid":"k/TaiHoonKim","text":"Tai-Hoon Kim"}]},"title":"Retrofit to CAIN Issues for Critical Infrastructures.","venue":"SUComS","pages":"114-124","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/BalitanasRK11","doi":"10.1007/978-3-642-23948-9_14","ee":"https://doi.org/10.1007/978-3-642-23948-9_14","url":"https://dblp.org/rec/conf/sucoms/BalitanasRK11"}, "url":"URL#4751028" }, { "@score":"1", "@id":"4751029", "info":{"authors":{"author":[{"@pid":"237/1870","text":"Srividya Bhat"},{"@pid":"194/5670","text":"Nandini S. Sidnal"},{"@pid":"18/1365","text":"Sunilkumar S. Manvi"}]},"title":"Agent Based Approach in Accessing Distributed Health Care Services.","venue":"SUComS","pages":"212-221","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/BhatSM11","doi":"10.1007/978-3-642-23948-9_24","ee":"https://doi.org/10.1007/978-3-642-23948-9_24","url":"https://dblp.org/rec/conf/sucoms/BhatSM11"}, "url":"URL#4751029" }, { "@score":"1", "@id":"4751030", "info":{"authors":{"author":[{"@pid":"08/7207","text":"Kai-Di Chang"},{"@pid":"27/2588","text":"Chi-Yuan Chen"},{"@pid":"01/3133","text":"Jiann-Liang Chen"},{"@pid":"c/HanChiehChao","text":"Han-Chieh Chao"}]},"title":"Internet of Things and Cloud Computing for Future Internet.","venue":"SUComS","pages":"1-10","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/ChangCCC11","doi":"10.1007/978-3-642-23948-9_1","ee":"https://doi.org/10.1007/978-3-642-23948-9_1","url":"https://dblp.org/rec/conf/sucoms/ChangCCC11"}, "url":"URL#4751030" }, { "@score":"1", "@id":"4751031", "info":{"authors":{"author":[{"@pid":"24/1211","text":"Chien-Hung Chen"},{"@pid":"118/1083","text":"Tai-Shan Liao"},{"@pid":"118/1096","text":"Chi-Hung Hwang"}]},"title":"Implementation of a Large Data Processing Method for Embedded System and CMOS SNR Application.","venue":"SUComS","pages":"28-36","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/ChenLH11","doi":"10.1007/978-3-642-23948-9_5","ee":"https://doi.org/10.1007/978-3-642-23948-9_5","url":"https://dblp.org/rec/conf/sucoms/ChenLH11"}, "url":"URL#4751031" }, { "@score":"1", "@id":"4751032", "info":{"authors":{"author":[{"@pid":"69/6875","text":"Rung-Shiang Cheng"},{"@pid":"158/8171","text":"Chun-Yu Ke"},{"@pid":"237/1826","text":"Chung-Ying Tsai"},{"@pid":"26/7768","text":"Chien-Jen Wang"}]},"title":"A Mobile Homecare Application Combining with Alarm Clock and GPS Positioning Function.","venue":"SUComS","pages":"259-268","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/ChengKTW11","doi":"10.1007/978-3-642-23948-9_29","ee":"https://doi.org/10.1007/978-3-642-23948-9_29","url":"https://dblp.org/rec/conf/sucoms/ChengKTW11"}, "url":"URL#4751032" }, { "@score":"1", "@id":"4751033", "info":{"authors":{"author":[{"@pid":"42/902","text":"Ming-Huang Guo"},{"@pid":"48/1160","text":"Horng-Twu Liaw"},{"@pid":"237/1770","text":"Jui-Kheng Tang"},{"@pid":"34/7442","text":"Chih-Ta Yen"}]},"title":"High Security Authentication Mechanism for Mobile Networks.","venue":"SUComS","pages":"287-296","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/GuoLTY11","doi":"10.1007/978-3-642-23948-9_32","ee":"https://doi.org/10.1007/978-3-642-23948-9_32","url":"https://dblp.org/rec/conf/sucoms/GuoLTY11"}, "url":"URL#4751033" }, { "@score":"1", "@id":"4751034", "info":{"authors":{"author":{"@pid":"38/6823","text":"Mounir Hamdi"}},"title":"Building Next Generation Massive Data Centers.","venue":"SUComS","pages":"11","year":"2011","type":"Conference and Workshop Papers","access":"open","key":"conf/sucoms/Hamdi11","doi":"10.1007/978-3-642-23948-9_2","ee":"https://doi.org/10.1007/978-3-642-23948-9_2","url":"https://dblp.org/rec/conf/sucoms/Hamdi11"}, "url":"URL#4751034" }, { "@score":"1", "@id":"4751035", "info":{"authors":{"author":[{"@pid":"15/1187","text":"Gu-Min Jeong"},{"@pid":"237/1732","text":"Wan-Sik Choi"},{"@pid":"237/1784","text":"Gyu Young Han"},{"@pid":"237/1833","text":"Dong-Kwon Suh"},{"@pid":"48/10584","text":"Jong-Yun Yeo"}]},"title":"Paradigm Shift and the State of the Art of LBS in the Advent of Smartphone.","venue":"SUComS","pages":"251-258","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/JeongCHSY11","doi":"10.1007/978-3-642-23948-9_28","ee":"https://doi.org/10.1007/978-3-642-23948-9_28","url":"https://dblp.org/rec/conf/sucoms/JeongCHSY11"}, "url":"URL#4751035" }, { "@score":"1", "@id":"4751036", "info":{"authors":{"author":[{"@pid":"171/6758","text":"Shun-Yu Jhong"},{"@pid":"57/6844","text":"Chun-Cheng Lin"},{"@pid":"28/5500-2","text":"Wan-Yu Liu 0002"},{"@pid":"24/891-1","text":"Weidong Huang 0001"}]},"title":"Rectangular Cartogram Visualization Interface for Social Networks.","venue":"SUComS","pages":"336-347","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/JhongLL011","doi":"10.1007/978-3-642-23948-9_37","ee":"https://doi.org/10.1007/978-3-642-23948-9_37","url":"https://dblp.org/rec/conf/sucoms/JhongLL011"}, "url":"URL#4751036" }, { "@score":"1", "@id":"4751037", "info":{"authors":{"author":[{"@pid":"35/4102","text":"Fu-Chien Kao"},{"@pid":"237/1861","text":"Wei-De Li"},{"@pid":"01/1577","text":"Ting-Hao Huang"}]},"title":"The Design of Ubiquitous Learning System with Computing Context-Aware Function.","venue":"SUComS","pages":"37-46","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/KaoLH11","doi":"10.1007/978-3-642-23948-9_6","ee":"https://doi.org/10.1007/978-3-642-23948-9_6","url":"https://dblp.org/rec/conf/sucoms/KaoLH11"}, "url":"URL#4751037" }, { "@score":"1", "@id":"4751038", "info":{"authors":{"author":[{"@pid":"50/1289","text":"Pao-Lien Lai"},{"@pid":"08/3388","text":"Ming-Yi Chiu"}]},"title":"Uniform Disjoint Cycle Covers on a Hierarchical Multicomputer System.","venue":"SUComS","pages":"141-148","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/LaiC11","doi":"10.1007/978-3-642-23948-9_17","ee":"https://doi.org/10.1007/978-3-642-23948-9_17","url":"https://dblp.org/rec/conf/sucoms/LaiC11"}, "url":"URL#4751038" }, { "@score":"1", "@id":"4751039", "info":{"authors":{"author":[{"@pid":"22/5355","text":"Guanling Lee"},{"@pid":"23/6936","text":"Yi-Chun Chen"},{"@pid":"30/1658","text":"Sheng-Lung Peng"},{"@pid":"70/11038","text":"Jyun-Hao Lin"}]},"title":"Solving the Sensitive Itemset Hiding Problem Whilst Minimizing Side Effects on a Sanitized Database.","venue":"SUComS","pages":"104-113","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/LeeCPL11","doi":"10.1007/978-3-642-23948-9_13","ee":"https://doi.org/10.1007/978-3-642-23948-9_13","url":"https://dblp.org/rec/conf/sucoms/LeeCPL11"}, "url":"URL#4751039" }, { "@score":"1", "@id":"4751040", "info":{"authors":{"author":[{"@pid":"92/2068","text":"Junghoon Lee"},{"@pid":"42/2572-4","text":"Hye-Jin Kim 0004"},{"@pid":"68/10237-2","text":"Jason Cho 0002"}]},"title":"Charging Station Advertisement on Digital Multimedia Broadcasting Platform.","venue":"SUComS","pages":"12-18","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/LeeKC11","doi":"10.1007/978-3-642-23948-9_3","ee":"https://doi.org/10.1007/978-3-642-23948-9_3","url":"https://dblp.org/rec/conf/sucoms/LeeKC11"}, "url":"URL#4751040" }, { "@score":"1", "@id":"4751041", "info":{"authors":{"author":[{"@pid":"92/2068","text":"Junghoon Lee"},{"@pid":"42/2572-4","text":"Hye-Jin Kim 0004"},{"@pid":"13/2624","text":"Jin-hee Ko"},{"@pid":"18/7975","text":"Youngshin Hong"}]},"title":"Carousel Scheduling of Advertisement Contents on Digital Multimedia Broadcasting.","venue":"SUComS","pages":"47-53","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/LeeKKH11","doi":"10.1007/978-3-642-23948-9_7","ee":"https://doi.org/10.1007/978-3-642-23948-9_7","url":"https://dblp.org/rec/conf/sucoms/LeeKKH11"}, "url":"URL#4751041" }, { "@score":"1", "@id":"4751042", "info":{"authors":{"author":[{"@pid":"22/5355","text":"Guanling Lee"},{"@pid":"189/2455","text":"Yu-tang Zhu"},{"@pid":"23/6936","text":"Yi-Chun Chen"}]},"title":"Summarizing Association Itemsets by Pattern Interestingness in a Data Stream Environment.","venue":"SUComS","pages":"74-83","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/LeeZC11","doi":"10.1007/978-3-642-23948-9_10","ee":"https://doi.org/10.1007/978-3-642-23948-9_10","url":"https://dblp.org/rec/conf/sucoms/LeeZC11"}, "url":"URL#4751042" }, { "@score":"1", "@id":"4751043", "info":{"authors":{"author":[{"@pid":"57/6844","text":"Chun-Cheng Lin"},{"@pid":"03/6476","text":"Yeong-Sheng Chen"},{"@pid":"30/4028","text":"Der-Jiunn Deng"}]},"title":"On Adaptive Multi-channel MAC Protocol for MANETs.","venue":"SUComS","pages":"269-276","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/LinCD11","doi":"10.1007/978-3-642-23948-9_30","ee":"https://doi.org/10.1007/978-3-642-23948-9_30","url":"https://dblp.org/rec/conf/sucoms/LinCD11"}, "url":"URL#4751043" }, { "@score":"1", "@id":"4751044", "info":{"authors":{"author":[{"@pid":"123/9695","text":"Tzong-Shyan Lin"},{"@pid":"57/6844","text":"Chun-Cheng Lin"}]},"title":"A Framework of a Recommendation System Utilizing Expert Groups on a Social Network.","venue":"SUComS","pages":"297-306","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/LinL11","doi":"10.1007/978-3-642-23948-9_33","ee":"https://doi.org/10.1007/978-3-642-23948-9_33","url":"https://dblp.org/rec/conf/sucoms/LinL11"}, "url":"URL#4751044" }, { "@score":"1", "@id":"4751045", "info":{"authors":{"author":[{"@pid":"33/5230","text":"Yuan-Hsiang Lin"},{"@pid":"64/9938","text":"Zhe-Min Lin"},{"@pid":"121/1364","text":"Ya-Ting Hsu"},{"@pid":"237/1841","text":"Hau-Ying Ku"}]},"title":"A Mobile Intelligent Blood Pressure Monitor Based on the Android Smartphone.","venue":"SUComS","pages":"178-187","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/LinLHK11","doi":"10.1007/978-3-642-23948-9_21","ee":"https://doi.org/10.1007/978-3-642-23948-9_21","url":"https://dblp.org/rec/conf/sucoms/LinLHK11"}, "url":"URL#4751045" }, { "@score":"1", "@id":"4751046", "info":{"authors":{"author":[{"@pid":"33/5230","text":"Yuan-Hsiang Lin"},{"@pid":"05/8176","text":"Chih-Fong Lin"},{"@pid":"46/8176","text":"He-Zhong You"}]},"title":"A Driver's Physiological Monitoring System Based on a Wearable PPG Sensor and a Smartphone.","venue":"SUComS","pages":"326-335","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/LinLY11","doi":"10.1007/978-3-642-23948-9_36","ee":"https://doi.org/10.1007/978-3-642-23948-9_36","url":"https://dblp.org/rec/conf/sucoms/LinLY11"}, "url":"URL#4751046" }, { "@score":"1", "@id":"4751047", "info":{"authors":{"author":[{"@pid":"66/1781","text":"Chih-Hao Liu"},{"@pid":"11/1184","text":"Jason Jen-Yen Chen"}]},"title":"Role-Based Mobile Agent for Group Task Collaboration in Pervasive Environment.","venue":"SUComS","pages":"234-240","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/LiuC11","doi":"10.1007/978-3-642-23948-9_26","ee":"https://doi.org/10.1007/978-3-642-23948-9_26","url":"https://dblp.org/rec/conf/sucoms/LiuC11"}, "url":"URL#4751047" }, { "@score":"1", "@id":"4751048", "info":{"authors":{"author":[{"@pid":"237/1772","text":"Hide Nakayama"},{"@pid":"237/1733","text":"Kentaro Iwasawa"},{"@pid":"237/1845","text":"Chen Chi Wu"},{"@pid":"237/1739","text":"Takuo Fugunaga"}]},"title":"Performance Evaluation of BONET with PCI Express 2.0.","venue":"SUComS","pages":"125-130","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/NakayamaIWF11","doi":"10.1007/978-3-642-23948-9_15","ee":"https://doi.org/10.1007/978-3-642-23948-9_15","url":"https://dblp.org/rec/conf/sucoms/NakayamaIWF11"}, "url":"URL#4751048" }, { "@score":"1", "@id":"4751049", "info":{"authors":{"author":[{"@pid":"237/1725","text":"Siriphat Oumtrakul"},{"@pid":"237/1736","text":"Natharin Chanuntawaree"},{"@pid":"g/JerryZeyuGao","text":"Jerry Gao 0002"}]},"title":"AdTouch: A 2D-Barcode Mobile Advertising Service System.","venue":"SUComS","pages":"188-202","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/OumtrakulCG11","doi":"10.1007/978-3-642-23948-9_22","ee":"https://doi.org/10.1007/978-3-642-23948-9_22","url":"https://dblp.org/rec/conf/sucoms/OumtrakulCG11"}, "url":"URL#4751049" }, { "@score":"1", "@id":"4751050", "info":{"authors":{"author":[{"@pid":"151/6417","text":"Koninika Pal"},{"@pid":"192/1737","text":"Prajna Devi Upadhyay"},{"@pid":"78/3624","text":"Animesh Datta"}]},"title":"A Petri Net Based Model for Multipoint Multistream Synchronization in Multimedia Conferencing.","venue":"SUComS","pages":"64-73","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/PalUD11","doi":"10.1007/978-3-642-23948-9_9","ee":"https://doi.org/10.1007/978-3-642-23948-9_9","url":"https://dblp.org/rec/conf/sucoms/PalUD11"}, "url":"URL#4751050" }, { "@score":"1", "@id":"4751051", "info":{"authors":{"author":[{"@pid":"99/7631","text":"Rosslin John Robles"},{"@pid":"32/8354","text":"Maricel O. Balitanas"},{"@pid":"k/TaiHoonKim","text":"Tai-Hoon Kim"}]},"title":"Security Encryption Schemes for Internet SCADA: Comparison of the Solutions.","venue":"SUComS","pages":"19-27","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/RoblesBK11","doi":"10.1007/978-3-642-23948-9_4","ee":"https://doi.org/10.1007/978-3-642-23948-9_4","url":"https://dblp.org/rec/conf/sucoms/RoblesBK11"}, "url":"URL#4751051" }, { "@score":"1", "@id":"4751052", "info":{"authors":{"author":[{"@pid":"68/4011","text":"Bowonsak Seisungsittisunti"},{"@pid":"n/JuggapongNatwichai","text":"Juggapong Natwichai"}]},"title":"Achieving k-Anonymity for Associative Classification in Incremental-Data Scenarios.","venue":"SUComS","pages":"54-63","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/Seisungsittisunti11","doi":"10.1007/978-3-642-23948-9_8","ee":"https://doi.org/10.1007/978-3-642-23948-9_8","url":"https://dblp.org/rec/conf/sucoms/Seisungsittisunti11"}, "url":"URL#4751052" }, { "@score":"1", "@id":"4751053", "info":{"authors":{"author":[{"@pid":"53/7975","text":"Cheng-Jen Tang"},{"@pid":"38/7974","text":"Miau Ru Dai"}]},"title":"Energy Cost-Effectiveness of Cloud Service Datacenters.","venue":"SUComS","pages":"94-103","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/TangD11","doi":"10.1007/978-3-642-23948-9_12","ee":"https://doi.org/10.1007/978-3-642-23948-9_12","url":"https://dblp.org/rec/conf/sucoms/TangD11"}, "url":"URL#4751053" }, { "@score":"1", "@id":"4751054", "info":{"authors":{"author":[{"@pid":"38/2272","text":"Pei-Chen Tseng"},{"@pid":"237/1756","text":"Jai-Yan Tsai"},{"@pid":"04/4953","text":"Wen-Shyang Hwang"}]},"title":"WiMAX DBA Algorithm Using a 2-Tier Max-Min Fair Sharing Policy.","venue":"SUComS","pages":"277-286","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/TsengTH11","doi":"10.1007/978-3-642-23948-9_31","ee":"https://doi.org/10.1007/978-3-642-23948-9_31","url":"https://dblp.org/rec/conf/sucoms/TsengTH11"}, "url":"URL#4751054" }, { "@score":"1", "@id":"4751055", "info":{"authors":{"author":[{"@pid":"140/1805","text":"Teng-Hui Wang"},{"@pid":"57/2258","text":"Ming-Yi Shih"},{"@pid":"30/4028","text":"Der-Jiunn Deng"}]},"title":"Quality-of-Service in Wireless Personal Area Networks.","venue":"SUComS","pages":"307-316","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/WangSD11","doi":"10.1007/978-3-642-23948-9_34","ee":"https://doi.org/10.1007/978-3-642-23948-9_34","url":"https://dblp.org/rec/conf/sucoms/WangSD11"}, "url":"URL#4751055" }, { "@score":"1", "@id":"4751056", "info":{"authors":{"author":[{"@pid":"79/6694","text":"Chao-Chin Wu"},{"@pid":"65/4237","text":"Lien Fu Lai"},{"@pid":"56/1515","text":"Liang-Tsung Huang"},{"@pid":"y/ChaoTungYang","text":"Chao-Tung Yang"},{"@pid":"29/11460","text":"Chung Lu"}]},"title":"The Performance Impact of Different Master Nodes on Parallel Loop Self-scheduling Schemes for Rule-Based Expert Systems.","venue":"SUComS","pages":"149-158","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/WuLHYL11","doi":"10.1007/978-3-642-23948-9_18","ee":"https://doi.org/10.1007/978-3-642-23948-9_18","url":"https://dblp.org/rec/conf/sucoms/WuLHYL11"}, "url":"URL#4751056" }, { "@score":"1", "@id":"4751057", "info":{"authors":{"author":[{"@pid":"237/1762","text":"Chiung-Yi Wu"},{"@pid":"59/6501","text":"Kuo-Ping Wu"},{"@pid":"237/1724","text":"Jason Shih"},{"@pid":"18/2674","text":"Hahn-Ming Lee"}]},"title":"VoIPS: VoIP Secure Encryption VoIP Solution.","venue":"SUComS","pages":"84-93","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/WuWSL11","doi":"10.1007/978-3-642-23948-9_11","ee":"https://doi.org/10.1007/978-3-642-23948-9_11","url":"https://dblp.org/rec/conf/sucoms/WuWSL11"}, "url":"URL#4751057" }, { "@score":"1", "@id":"4751058", "info":{"authors":{"author":[{"@pid":"237/1741","text":"Yi-Sian Wu"},{"@pid":"37/2613","text":"Chia-Hung Yeh"},{"@pid":"61/6120","text":"Wen-Yu Tseng"},{"@pid":"50/4913","text":"Wan-Jen Huang"},{"@pid":"48/3357","text":"Min-Kuan Chang"},{"@pid":"81/6585","text":"Ruey-Nan Yeh"},{"@pid":"237/1799","text":"Chiu-Lan Chu"},{"@pid":"70/712","text":"Po-Yi Sung"}]},"title":"MIMO Relay Selection with Suboptimal Power Allocation Transmission over Cooperative Communication Networks.","venue":"SUComS","pages":"203-211","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/WuYTHCYCS11","doi":"10.1007/978-3-642-23948-9_23","ee":"https://doi.org/10.1007/978-3-642-23948-9_23","url":"https://dblp.org/rec/conf/sucoms/WuYTHCYCS11"}, "url":"URL#4751058" }, { "@score":"1", "@id":"4751059", "info":{"authors":{"author":[{"@pid":"14/5580","text":"Yi Xu"},{"@pid":"89/5901-5","text":"Jun Yan 0005"}]},"title":"A Cloud Based Information Integration Platform for Smart Cars.","venue":"SUComS","pages":"241-250","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/XuY11","doi":"10.1007/978-3-642-23948-9_27","ee":"https://doi.org/10.1007/978-3-642-23948-9_27","url":"https://dblp.org/rec/conf/sucoms/XuY11"}, "url":"URL#4751059" }, { "@score":"1", "@id":"4751060", "info":{"authors":{"author":{"@pid":"34/3081","text":"Toshihiko Yamakami"}},"title":"Gate Opening Effect: Toward Understanding Mobile-Specific Service Evolution.","venue":"SUComS","pages":"169-177","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/Yamakami11","doi":"10.1007/978-3-642-23948-9_20","ee":"https://doi.org/10.1007/978-3-642-23948-9_20","url":"https://dblp.org/rec/conf/sucoms/Yamakami11"}, "url":"URL#4751060" }, { "@score":"1", "@id":"4751061", "info":{"authors":{"author":{"@pid":"34/3081","text":"Toshihiko Yamakami"}},"title":"Hybrid Service Integration Engineering: Implications from a Game-Story-Combined Mobile Social Game.","venue":"SUComS","pages":"317-325","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/Yamakami11a","doi":"10.1007/978-3-642-23948-9_35","ee":"https://doi.org/10.1007/978-3-642-23948-9_35","url":"https://dblp.org/rec/conf/sucoms/Yamakami11a"}, "url":"URL#4751061" }, { "@score":"1", "@id":"4751062", "info":{"authors":{"author":[{"@pid":"y/ChaoTungYang","text":"Chao-Tung Yang"},{"@pid":"84/6728","text":"Chu-Hsing Lin"},{"@pid":"237/1811","text":"Guey-Luen Chang"}]},"title":"Implementation of Image Watermarking Processes on Cloud Computing Environments.","venue":"SUComS","pages":"131-140","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/YangLC11","doi":"10.1007/978-3-642-23948-9_16","ee":"https://doi.org/10.1007/978-3-642-23948-9_16","url":"https://dblp.org/rec/conf/sucoms/YangLC11"}, "url":"URL#4751062" }, { "@score":"1", "@id":"4751063", "info":{"authors":{"author":[{"@pid":"08/5449","text":"Sheng-Yuan Yang"},{"@pid":"38/4548","text":"Dong-Liang Lee"},{"@pid":"72/8477","text":"Kune-Yao Chen"},{"@pid":"14/5864","text":"Chun-Liang Hsu"}]},"title":"Energy-Saving Information Multi-agent System with Web Services for Cloud Computing.","venue":"SUComS","pages":"222-233","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/YangLCH11","doi":"10.1007/978-3-642-23948-9_25","ee":"https://doi.org/10.1007/978-3-642-23948-9_25","url":"https://dblp.org/rec/conf/sucoms/YangLCH11"}, "url":"URL#4751063" }, { "@score":"1", "@id":"4751064", "info":{"authors":{"author":[{"@pid":"y/ChaoTungYang","text":"Chao-Tung Yang"},{"@pid":"40/10203","text":"Chung-Che Lai"},{"@pid":"85/7451","text":"Wei-Sheng Chen"},{"@pid":"96/5377","text":"Jung-Chun Liu"},{"@pid":"c/WilliamCChu","text":"William C. Chu"}]},"title":"Implementation of a Smart Grid System with SOA-based Service on Cloud.","venue":"SUComS","pages":"159-168","year":"2011","type":"Conference and Workshop Papers","access":"closed","key":"conf/sucoms/YangLCLC11","doi":"10.1007/978-3-642-23948-9_19","ee":"https://doi.org/10.1007/978-3-642-23948-9_19","url":"https://dblp.org/rec/conf/sucoms/YangLCLC11"}, "url":"URL#4751064" }, { "@score":"1", "@id":"4768227", "info":{"authors":{"author":[{"@pid":"36/4322","text":"Ruay-Shiung Chang"},{"@pid":"k/TaiHoonKim","text":"Tai-Hoon Kim"},{"@pid":"30/1658","text":"Sheng-Lung Peng"}]},"title":"Security-Enriched Urban Computing and Smart Grid - Second International Conference, SUComS 2011, Hualien, Taiwan, September 21-23, 2011. Proceedings","venue":["SUComS","Communications in Computer and Information Science"],"volume":"223","publisher":"Springer","year":"2011","type":"Editorship","key":"conf/sucoms/2011","doi":"10.1007/978-3-642-23948-9","ee":"https://doi.org/10.1007/978-3-642-23948-9","url":"https://dblp.org/rec/conf/sucoms/2011"}, "url":"URL#4768227" } ] } } } )