default search action
4th ITCS 2012: Gwangju, Korea
- James Jong Hyuk Park, Jongsung Kim, Deqing Zou, Yang Sun Lee:
Information Technology Convergence, Secure and Trust Computing, and Data Management - ITCS 2012 & STA 2012, Gwangju, Korea, September 6-8, 2012. Lecture Notes in Electrical Engineering 180, Springer 2012, ISBN 978-94-007-5082-1 - Carlos Juiz, Mercedes Gómez, M. Isabel Barceló:
Implementing Business/IT Projects Alignment through the Project Portfolio Approval Process. 1-8 - Hyunjoong Kang, Junwook Lee, Hyochan Bang, Sungsoo Kang:
A Design of IoT Based Agricultural Zone Management System. 9-14 - Dae-Heon Park, Kyo-Hoon Son, Se-Han Kim:
A Design of Plant Factory Environment Control System. 15-20 - Yoon-Sik Yoo, Jaehak Yu, Byung-Bog Lee, Hyo-Chan Bang:
A Study on Ubiquitous Business Process Management for Real-Time Open USN Mash-Up Services. 21-27 - Yong-chul Lee, Sok-Kyu Lee, Woong Cho:
Adaptive Auto Bias Control in Wireless Communication Systems. 29-34 - Min Woo Cheon, Tae Gon Kim, Dae-Hwan Youn, Ki-Won Nam, Chang-Su Na, Young-Eok Kim, Jung-Chul Lee:
Comparison of Temperature in the Deep Part of the Dummy by the Electronic Moxibustion and the Gu-Gwan Moxibustion. 35-40 - Yang Sun Lee, Tae Gon Kim, Min Woo Cheon:
Wound Healing Effect by 633 nm Wavelength Using LED Irradiator. 41-46 - Jungsik Hwang, Kyungmi Chung, Jinshil Hyun, Jeha Ryu, Kwangsu Cho:
Development and Evaluation of an In-Vehicle Haptic Navigation System. 47-53 - Babar Shah, Ki-Il Kim:
Modeling of Energy Consumption for K-Coverage in Wireless Sensor Networks. 55-61 - Namseok Lee, Kwangsu Cho:
Natural Language Processing for Modeling Stable Writing Characteristics of Users. 63-70 - Sung Yeon Kim, Kwangsu Cho:
Electronic Cane Usability for Visually Impaired People. 71-78 - Hongwei Ge, Qiaoxia Zhang, Fan Wang:
Solving Traffic Assignment Problem by an Improved Particle Swarm Optimization and a Segmented Impedance Function. 79-86 - Yanjun Chen, Wangmeng Zuo, Zhaoxin Li, Kuanquan Wang:
3D Reconstruction for Internal Organs Based on Improved Gray-Coded Structured Light. 87-93 - Moonsik Kang, Kilhung Lee:
Adaptive Resource Control Strategy over Cognitive Networks for Multimedia Services. 95-102 - Deng Chuan:
Towards a Trusted Vehicular Routing in VANET. 103-117 - Muhammad Yasin, Muhammad Abulaish, Muhammad Nour Naeem Elmogy:
Forensic Analysis of Digsby Log Data to Trace Suspected User Activities. 119-126 - Longbo Ran, Hai Jin:
SDSPF: A Secure Data Storage and Processing Framework for Cloud Computing Systems. 127-133 - Guoying Li, Bin Dong, Xiuqiao Li, Qimeng Wu, Qianqian Zhong, Mingfa Zhu, Limin Xiao, Li Ruan:
Data Consistency for Self-acting Load Balancing of Parallel File System. 135-143 - Hongfeng Wu, Rongquan Feng:
Isomorphism Classes of Jacobi Quartic Curve over Finite Fields. 145-153 - Heesook Choi, Phyllis Reuther:
Fingerprinting Data Based on Secret Mask. 155-162 - Hae-Jong Joo, Bong-Hwa Hong, Euy-Soo Lee, Hae-Kil Choi:
Packet-Based Quality Measurement and Analysis for Mobile VoIP Service. 163-170 - Hai-Cheng Chu, Szu-Wei Yang, Shiuh-Jeng Wang, Jong Hyuk Park:
The Partial Digital Evidence Disclosure in Respect to the Instant Messaging Embedded in Viber Application Regarding an Android Smart Phone. 171-178 - Yee-Lee Er, Wei-Chuen Yau, Syh-Yuan Tan, Bok-Min Goi:
Email Encryption System Using Certificateless Public Key Encryption Scheme. 179-186 - Sooyoung Park, Hyunji Chung, Changhoon Lee, Sangjin Lee:
Methodology for Digital Investigation of Illegal Sharing Using BitTorrent. 187-195 - Jeehee Lee, Hyunji Chung, Changhoon Lee, Sangjin Lee:
Methodology for Digital Forensic Investigation of iCloud. 197-206 - Jong-Hyun Choi, Keun-Gi Lee, Jungheum Park, Changhoon Lee, Sangjin Lee:
Analysis Framework to Detect Artifacts of Portable Web Browser. 207-214 - Neeraj Kumar, Jongsung Kim:
Performance Analysis of Zone Based Routing by Varying Radius of Zone Using Ant Colony in MANET. 215-223 - Woongryul Jeon, Jeeyeon Kim, Youngsook Lee, Dongho Won:
Security Analysis of Authentication Scheme for Wireless Communications with User Anonymity. 225-231 - Mijin Kim, Namje Park, Dongho Won:
Weaknesses of a Dynamic ID-Based Remote User Authentication Scheme with Session Key Agreement for Multi-server Environment. 233-240 - Youngsook Lee, Jeeyeon Kim, Woongryul Jeon, Dongho Won:
Design of a Simple User Authentication Scheme Using QR-Code for Mobile Device. 241-247 - Youngsoo Kim, Namje Park:
Customizing Data Analysis Using Forensic Approach in Personalized RFID for Access Control of Student's Harmful Contents. 249-256 - Yilip Kim, Namje Park:
Elementary Education of Creativity Improvement Using Rube Goldberg's Invention. 257-263 - Namje Park:
Mobile RFID/NFC Linkage Based on UHF/HF Dual Band's Integration in U-Sensor Network Era. 265-271 - Ada Hui-Chuan Chen, Huei-Chung Chu, Sou-Chein Wu:
Security Balancing for IT-Enabled Service Innovation. 273-277 - Huei-Chung Chu, Ada Hui-Chuan Chen:
The Electronic Bidding System Based on Public Key Infrastructure. 279-283 - Wen-Chung Kuo, Yi-Heng Chen, Yu-Chih Huang:
High-Capacity Steganographic Method Based on Division Arithmetic and LSB Replacement. 285-291
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.