default search action
4th ICUIMC 2010: Suwon, Korea
- Kwan-Ho You, Sang-Won Lee, Won Kim, Dongho Won:
Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2010, Suwon, Republic of Korea, January 14-15, 2010. ACM 2010, ISBN 978-1-60558-893-3
Wireless LAN and mesh networks
- Tomoki Yoshihisa, Shojiro Nishio:
A sensor data collection method for rounding sink. 1 - Poongup Lee, Jangkeun Jeong, Yohan Kim, Jitae Shin:
Physical cell identity reservation for 3GPP LTE femtocell. 2 - Hwan Min Park, Jung-Su Han, Hyung-Jin Choi:
Enhanced detection method for 3GPP LTE QO-SFBC system in frequency selective Rayleigh fading channel environment. 3 - Dong-Yul Lee, Chaewoo Lee:
Dual token bucket based HCCA scheduler for IEEE 802.11e WLAN. 4
Sensor networks
- Le Xuan Hung, Ravi Sankar, Murad Khalid, Sungyoung Lee:
Public key cryptography-based security scheme for wireless sensor networks in healthcare. 5 - Ga-Won Lee, Tien-Dung Nguyen, Eui-nam Huh:
Reliable transmission on wireless sensor networks with delegated acknowledgement. 6 - Hong Va Leong:
Privacy enhancement in mobile data broadcasting environments. 7 - Dang Tu Nguyen, Wook Choi, Minh Thiep Ha, Hyunseung Choo:
MGR: a multicandidate greedy routing scheme in wireless sensor networks. 8
Telecommunication networks
- Satoshi Imai, Kazumasa Ushiki, Nobutsugu Fujino, Mamoru Machida, Masayoshi Moriya, Seii Sai:
Quality analysis of CSMA/CA communications in inter-vehicle communication services. 9 - Toru Shiraki, Yuuichi Teranishi, Susumu Takeuchi, Kaname Harumoto, Shojiro Nishio:
Proposal and evaluation of a Bloom filter-based user search method for movement records on P2P network. 10 - Hyun-Jin Lee, Kyu-Hwan Lee, Jae-Hyun Kim:
A QoS provisioning mechanisms based on effective bandwidth for the polling based WLAN system. 11 - Young-Sun Seo, Dae-Young Kim, Jinsung Cho, Ben Lee:
OCDP: a WBAN MAC protocol for contention-based medical and CE applications. 12
Multimedia processing I
- Chin-Chen Chang, Kuo-Nan Chen, Zhi-Hui Wang, Mingchu Li:
A technique of embedding digital data in an image compression code reversibly. 13 - Chia-Chen Lin, Pei-Feng Shiu:
Reversible data hiding scheme with high payload for JPEG images. 14 - Chun-Yu Wang, Ni-Shan Shiao, Hong-Hao Chen, Chwei-Shyong Tsai:
Enhance the visual quality of shares and recovered secret on meaningful shares visual secret sharing. 15 - Ruey-Ming Chao, Ching-Hao Lai, Hsien-Chu Wu:
A novel color palette image authentication scheme. 16 - Lijun Yan, Jeng-Shyang Pan:
Directional two-dimensional principal component analysis for face recognition. 17
Systems and applications I
- Qing Li, Wei Chen, Lijuan Yu:
Community-based recipe recommendation and adaptation in peer-to-peer networks. 18 - Chad Lin, Ying Chieh Liu, Feng-Chia Li, Geoffrey Jalleh, Yu-An Huang, Zong-Ru Jhuang:
B2B e-commerce adoption and implementation constraints and critical success factors in the healthcare organizations. 19 - Ying Chieh Liu, Chad Lin, Feng-Chia Li:
A model of transiting individual efforts to the outcomes of virtual team. 20 - Mika Luimula, Joni Jämsä, Pertti Verronen, Mika Pahkasalo, Joni Heikkilä, Juha Yli-Hemminki:
In situ measurement of geosensors in low-rate networks. 21 - Masami Takahashi, Atsuyuki Morishima, Hiroyuki Kitagawa, Shigeo Sugimoto:
A constraint-based tool for data integrity management on the web. 22
Web technology
- Katsumi Tanaka, Hiroaki Ohshima, Adam Jatowt, Satoshi Nakamura, Yusuke Yamamoto, Kazutoshi Sumiya, Ryong Lee, Daisuke Kitayama, Takayuki Yumoto, Yukiko Kawai, Jianwei Zhang, Shinsuke Nakajima, Yoichi Inagaki:
Evaluating credibility of web information. 23 - Naoto Asahi, Takehiro Yamamoto, Satoshi Nakamura, Katsumi Tanaka:
Discovering intermediate entities from two examples by using web search engine indices. 24 - Hideki Kawai, Adam Jatowt, Katsumi Tanaka, Kazuo Kunieda, Keiji Yamada:
ChronoSeeker: search engine for future and past events. 25 - Manabu Ohta, Ryoji Fujita:
A prediction search based on changes of queries and search results. 26 - Makoto Nakatani, Adam Jatowt, Katsumi Tanaka:
Adaptive ranking of search results by considering user's comprehension. 27 - Tieyun Qian, Jiangbo Liu:
Influence maximization through identifying seed nodes from implicit social networks. 28
Information management
- Jun-Bao Li, Shu-Chuan Chu, Jeng-Shyang Pan:
Dimensionality reduction based on nonparametric discriminant analysis with kernels for feature extraction and recognition. 29 - Yuanping Li, Ling Feng:
Bridging the gap between web service-based context suppliers and ontology-based context consumers. 30 - Hyun Jung La, Sang Hun Oh, Soo Dong Kim:
Methods to utilizing cloud computing in developing mobile internet device (MID) applications. 31 - Yun-Sam Kim, Eun-Sun Cho, We-Duke Cho:
Context data abstraction framework using RDF. 32 - Sang-Hyun Park, Jee-Hyong Lee, Hye-Wuk Jung, Sung-Woo Bang:
Game behavior pattern modeling for game bots detection in MMORPG. 33 - Seunghoon Lee, Sung-Woo Bang, Bo-Keong Kim, Jaekwang Kim, Jee-Hyong Lee:
A partitioning method for high dimensional data. 34
Data and web mining
- Ming-Yen Lin, Sue-Chen Hsueh, Chien-Hsiang Tung:
Interactive stream mining of maximal frequent itemsets allowing flexible time intervals and support thresholds. 35 - Tatsuya Fujisaka, Ryong Lee, Kazutoshi Sumiya:
Discovery of user behavior patterns from geo-tagged micro-blogs. 36 - Taichi Katayama, Takayuki Yoshinaka, Takehito Utsuro, Yasuhide Kawada, Tomohiro Fukuhara:
Detecting splogs using similarities of splog HTML structures. 37 - Jöran Beel, Bela Gipp:
Link analysis in mind maps: a new approach to determining document relatedness. 38
Intelligent systems I
- Abhishek Prateek, Hridayesh Gupta, Sanjiva Prasad:
Universal rich presence framework for intelligent call management. 39 - Soungwoong Yoon, Adam Jatowt, Katsumi Tanaka:
Intent feature discovery using Q&A corpus and web data. 40 - Kaori Kobayashi, Ryong Lee, Kazutoshi Sumiya:
Systematic measurement of human map-reading ability with street-view based navigation systems. 41 - Ken Kuroiwa, Ryuya Uda:
Proposal of electronic commerce system with cellular phones for digital forensics. 42 - Ig-hoon Lee, Jae-Won Lee, Junho Shim, Sang-goo Lee:
Cache conscious trees on modern microprocessors. 43
Multimedia processing II
- Zhi-Hui Wang, Chin-Chen Chang, Mingchu Li, Tzu-Chuen Lu:
A simple image encoding method with data lossless information hiding. 44 - Makoto P. Kato, Satoshi Oyama, Hiroaki Ohshima, Katsumi Tanaka:
Query by example for geographic entity search with implicit negative feedback. 45 - Jungil Jung, Jinsoo Cho:
Detailed-information browsing to form centralized mesh structure in region of interest. 46 - Wei-Jen Wang, Cheng-Ta Huang, Shiuh-Jeng Wang:
Reversible data hiding using neighboring block in VQ-compressed images. 47
Systems and applications II
- Masato Oguchi, Reika Higa, Kosuke Matsubara, Takao Okamawari, Saneyasu Yamaguchi:
Performance improvement of iSCSI remote storage access. 48 - Yuki Tanimoto, Manabu Ohta:
A proposal of visualizing reputation using evaluative expression dictionaries. 49 - Kuo-Chang Chen, Jih-Tso Chang, Jeng-Shyang Pan, Hsiang-Cheh Huang:
The open source IPTV service development environment: IPTV service execution environment. 50 - Chin-Feng Lee, Chin-Chen Chang, Chun-Yu Wu:
A reversible and multiple-layer embedding strategy with high capacity. 51 - Chi-Shiang Chan, Ching-Yun Chang:
Hiding data in parity check bit. 52
Intelligent systems II
- Zeng-Wei Hong, Rui-Tang Huang, Kai-Yi Chin, Chia-Chi Yen, Jim-Min Lin:
An interactive agent system for supporting knowledge-based recommendation: a case study on an e-novel recommender system. 53 - Masayuki Terada, Kozo Noaki, Kimihiko Sekino:
Smartcard-based micro-billing scheme to activate the market for user-generated content. 54 - Nanshan Du, Qing Li, Yiwen Liang:
Actor Petri net model for scientific workflows: model, design and system. 55 - Shihono Karikome, Atsushi Fujii:
A system for supporting dietary habits: planning menus and visualizing nutritional intake balance. 56 - Jehwan Oh, Ok-Ran Jeong, Eunseok Lee:
A personalized recommendation system based on product attribute-specific weights and improved user behavior analysis. 57
Security, privacy and personalization
- Yuko Arai, Chiemi Watanabe:
Query log perturbation method for privacy preserving query. 58 - Sangsik Lee, Donghyun Choi, Dongho Won, Seungjoo Kim:
Security analysis on commercial online music streaming service and countermeasures. 59 - Wonik Park, Jong Hyun Park, Young-Kuk Kim, Ji-Hoon Kang:
An efficient context-aware personalization technique in ubiquitous environments. 60 - Sun Park, Dong Un An:
Automatic query-based personalized summarization that uses pseudo relevance feedback with NMF. 61 - Qian Zhang, Taeg Keun Whangbo:
Skin surface reconstruction from stereo images. 62 - Kyu Il Kim, Wonyoung Kim, Joonsuk Ryu, Hyuk Jin Ko, Ung-Mo Kim, Woo Jun Kang:
RBAC-based access control for privacy preserving in semantic web. 63
Communication technologies
- Chien-Chou Shih, Mong-Fong Horng, Jeng-Shyang Pan:
A scaffolding M-learning framework with IMS based IPTV PVR service. 64 - Moonseo Park, Seong Keun Oh:
A minimum mean-squared error relay for three-way relay channels with network coding. 65 - Md. Shariful Islam, Muhammad Mahbub Alam, Md. Abdul Hamid, Choong Seon Hong:
High throughput path selection for IEEE 802.11s based wireless mesh networks. 66 - Cao Trong Hieu, Young-Cheol Bang, Jin Ho Kim, Young An Kim, Choong Seon Hong:
A multi-rate routing protocol with connection entropy for mobile ad hoc networks. 67 - Sang-Woo Lee, Dong-Yul Lee, Chaewoo Lee:
An improved DV-Hop localization algorithm in ad hoc networks. 68
Intelligent systems III
- Hyung-Jun Yim, Yun-Young Hwang, Kyu-Chul Lee:
A self-organizing two-way DPWS adaptor for adaptive interoperability of multiple heterogeneous services. 69 - Hyunjae Woo, Dong-Yul Lee, Chaewoo Lee:
An enhanced OLSR protocol based on link reliability. 70 - A. M. Jehad Sarkar, Young-Koo Lee, Sungyoung Lee:
ARHMAM: an activity recognition system based on hidden Markov minded activity model. 71 - Du Wan Cheun, Jae Yoo Lee, Soo Dong Kim:
A comprehensive architecture for autonomic service management. 72 - Zhen-Xing Zhang, Sang-Hong Lee, Joon S. Lim:
Comparison of feature selection methods in ECG signal classification. 73
Systems and applications III
- Yun-Young Hwang, Kyu-Chul Lee:
Semantic operation composition according to user tasks in ubiquitous environment. 74 - Sung-Yeol Yun, Cheol-Joong Kim, Do-Yoon Ha, Hyun-Cheol Jeong, Seok-Cheon Park:
A SIP-TRW algorithm for DDoS attack detection in SIP environments. 75 - Dongjin Oh, Ickjin Kwon:
A 2.4-GHz IEEE 802.15.4 CMOS single-chip transceiver for wireless PAN applications. 76 - Jae Do Lee, Myung Hoon Sunwoo:
High-speed architecture for three-parallel Reed-Solomon decoder using S-DCME. 77
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.