default search action
ICCSA 2005: Singapore
- Osvaldo Gervasi, Marina L. Gavrilova, Vipin Kumar, Antonio Laganà, Heow Pueh Lee, Youngsong Mun, David Taniar, Chih Jeng Kenneth Tan:
Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part II. Lecture Notes in Computer Science 3481, Springer 2005, ISBN 3-540-25861-2
Approaches or Methods of Security Engineering Workshop
- Hae Sool Yang, Jung-Hun Hong, Seok-Hyung Hwang, Haeng-Kon Kim:
Implementation of Short Message Service System to Be Based Mobile Wireless Internet. 1-9 - Ju-In Youn, He-Jue Eun, Yong-Sung Kim:
Fuzzy Clustering for Documents Based on Optimization of Classifier Using the Genetic Algorithm. 10-20 - Hua Su, Kil To Chong, Alexander G. Parlos:
A Neural Network Method for Induction Machine Fault Detection with Vibration Signal. 1293-1302 - Sun-Myung Hwang:
P2P Protocol Analysis and Blocking Algorithm. 21-30 - Jin-Sung Kim, Chun-Sik Yoo, Mi-Kyung Lee, Yong-Sung Kim:
Object Modeling of RDF Schema for Converting UML Class Diagram. 31-41 - Gu-Beom Jeong, Guk-Boh Kim:
A Framework for Security Assurance in Component Based Development. 42-51 - Haeng-Kon Kim, Hae Sool Yang:
Security Framework to Verify the Low Level Implementation Codes. 52-61 - Haeng-Kon Kim:
A Study on Evaluation of Component Metric Suites. 62-70 - Bobby D. Gerardo, Jaewan Lee, Yeon-Sung Choi, Malrey Lee:
The K-Means Clustering Architecture in the Multi-stage Data Mining Process. 71-81 - Hyang-Chang Choi, YongHoon Yi, Jae-Hyun Seo, BongNam Noh, HyungHyo Lee:
A Privacy Protection Model in ID Management Using Access Control. 82-91 - InJung Kim, Yoon Jung Chung, YoungGyo Lee, Dongho Won:
A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems. 92-101 - Injoo Jang, Hyeong Seon Yoo:
Efficient Multi-bit Shifting Algorithm in Multiplicative Inversion Problems. 102-110 - Joungho Lee, Injoo Jang, Hyeong Seon Yoo:
Modified Token-Update Scheme for Site Authentication. 111-116 - Dae-Hee Seo, Im-Yeong Lee, Hee-Un Park:
A Study on Secure SDP of RFID Using Bluetooth Communication. 117-126 - Jong Woo Kim, Ju-Yeon Kim, Hyun-Suk Hwang, Sung-Seok Park, Chang Soo Kim, Sung-gi Park:
The Semantic Web Approach in Location Based Services. 127-136 - Haeng-Kon Kim, Oh-Hyun Kwon:
SCTE: Software Component Testing Environments. 137-146 - Jongwoo Chae, Jungkyu Kwon, Mokdong Chung:
Computer Security Management Model Using MAUT and SNMP. 147-156 - Young-Tak Kim, Hae-Sun Kim, Hyun-Ho Shin:
Session and Connection Management for QoS-Guaranteed Multimedia Service Provisioning on IP/MPLS Networks. 157-168 - Ihn-Han Bae, Sun-Jin Oh:
A GQS-Based Adaptive Mobility Management Scheme Considering the Gravity of Locality in Ad-Hoc Networks. 169-176 - Seo-Il Kang, Im-Yeong Lee:
A Study on the E-Cash System with Anonymity and Divisibility. 177-186 - Yonghwan Lee, Eunmi Choi, Dugki Min:
An Authenticated Key Exchange Mechanism Using One-Time Shared Key. 187-194 - Oh-Hyung Kang, Seong-Yoon Shin:
Creation of Soccer Video Highlight Using the Caption Information. 195-204 - Jaeseon Ko, Bobby D. Gerardo, Jaewan Lee, Jae-Jeong Hwang:
The Information Search System Using Neural Network and Fuzzy Clustering Based on Mobile Agent. 205-214 - Sung-Ja Choi, Yeon-hee Kang, Gang-Soo Lee:
A Security Evaluation and Testing Methodology for Open Source Software Embedded Information Security System. 215-224 - Minsoo Kim, Jae-Hyun Seo, Seungyong Lee, BongNam Noh, Jung-Taek Seo, Eung Ki Park, Choonsik Park:
An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification. 225-234 - Mi-Og Park, Dea-Woo Park:
A New Stream Cipher Using Two Nonlinear Functions. 235-244 - Hwankoo Kim, Bongjoo Park, JaeCheol Ha, Byoungcheon Lee, DongGook Park:
New Key Management Systems for Multilevel Security. 245-253 - ByungRae Cha, Kyung-Woo Park, JaeHyun Seo:
Neural Network Techniques for Host Anomaly Intrusion Detection Using Fixed Pattern Transformation. 254-263 - Kyeongmo Park:
The Role of Secret Sharing in the Distributed MARE Protocols. 264-273 - Yoon Jung Chung, InJung Kim, Namhoon Lee, Taek Lee, Hoh Peter In:
Security Risk Vector for Quantitative Asset Assessment. 274-283 - Seong-Yoon Shin, Oh-Hyung Kang:
A Remote Video Study Evaluation System Using a User Profile. 284-294 - Hae Geun Kim:
Performance Enhancement of Wireless LAN Based on Infrared Communications Using Multiple-Subcarrier Modulation. 295-303 - Ha Jin Hwang:
Modeling Virtual Network Collaboration in Supply Chain Management. 304-313 - Mun-Kyu Lee:
SPA-Resistant Simultaneous Scalar Multiplication. 314-321 - Byung kwan Lee, Am Sok Oh, Eun-Hee Jeong:
HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment. 322-331 - Chang Dae Yoon, Seung-Yeon Lee, Myong-Chul Shin, Ho-Sung Jung, Jae Sang Cha:
A Fault Distance Estimation Method Based on an Adaptive Data Window for Power Network Security. 332-340 - Sang-Yule Choi, Myong-Chul Shin, Nam-Young Hur, Jong-Boo Kim, Tai-Hoon Kim, Jae Sang Cha:
Distribution Data Security System Based on Web Based Active Database. 341-352 - JaeYong Jeong, Yongsu Park, Yookun Cho:
Efficient DoS Resistant Multicast Authentication Schemes. 353-362 - Eun-Ser Lee, Malrey Lee:
Development System Security Process of ISO/IEC TR 15504 and Security Considerations for Software Process Improvement. 363-372 - Jae Sang Cha, Kyungsup Kwak, Chang Dae Yoon, Chong Hyun Lee:
Flexible ZCD-UWB with High QoS or High Capacity Using Variable ZCD Factor Code Sets. 373-380 - Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun:
Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme. 381-390 - Sung-Hyun Yun, Hyung-Woo Lee:
The Large Scale Electronic Voting Scheme Based on Undeniable Multi-signature Scheme. 391-400 - Hyung-Woo Lee, Sung-Hyun Yun, Jae-Sung Kim, Nam-Ho Oh, Do-Hyung Kim:
IPv6/IPsec Conformance Test Management System with Formal Description Technique. 401-410 - Chong Hyun Lee, Jae Sang Cha:
Interference Cancellation Algorithm Development and Implementation for Digital Television. 411-419 - Malrey Lee, Dong-Ju Im, Young Keun Lee, Jae-deuk Lee, Suwon Lee, Keun Kwang Lee, HeeJo Kang:
Algorithm for ABR Traffic Control and Formation Feedback Information. 420-428 - Jae Sang Cha, Kyungsup Kwak, Sang-Yule Choi, Tai-Hoon Kim, Chang Dae Yoon, Chong Hyun Lee:
Interference-Free ZCD-UWB for Wireless Home Network Applications. 429-441 - Hoon Ko, Bangyong Sohn, Hayoung Park, Yongtae Shin:
Safe Authentication Method for Security Communication in Ubiquitous. 442-448 - Chong Hyun Lee, Jae Sang Cha:
Pre/Post Rake Receiver Design for Maximum SINR in MIMO Communication System. 449-457 - Sang-Soo Choi, Soo-young Chae, Gang-Soo Lee:
SRS-Tool: A Security Functional Requirement Specification Development Tool for Application Information System of Organization. 458-467 - Tai-Hoon Kim, Seung-youn Lee:
Design Procedure of IT Systems Security Countermeasures. 468-473 - Dong-Ju Im, Malrey Lee, Young Keun Lee, Tae-eun Kim, Suwon Lee, Jaewan Lee, Keun Kwang Lee, Kyung Dal Cho:
Similarity Retrieval Based on Self-organizing Maps. 474-482 - Malrey Lee, Eun-Ser Lee, HeeJo Kang, HeeSook Kim:
An Expert System Development for Operating Procedure Monitoring of PWR Plants. 483-490 - Tai-Hoon Kim, Seung-youn Lee:
Security Evaluation Targets for Enhancement of IT Systems Assurance. 491-498 - Seung-youn Lee, Myong-Chul Shin:
Protection Profile for Software Development Site. 499-507
Information Security and Hiding (ISH 2005) Workshop
- Xiangyang Luo, Bin Liu, Fenlin Liu:
Improved RS Method for Detection of LSB Steganography. 508-516 - Ryszard Grzaslewicz, Jaroslaw Kutylowski, Miroslaw Kutylowski, Wojciech Pietkiewicz:
Robust Undetectable Interference Watermarks. 517-526 - Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau:
Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms. 527-536 - Kwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim:
Color Cube Analysis for Detection of LSB Steganography in RGB Color Images. 537-546 - Sheng Tang, Jin-Tao Li, Yong-Dong Zhang:
Compact and Robust Image Hashing. 547-556 - Suk Hwan Lee, Ki-Ryong Kwon:
Watermarking for 3D Mesh Model Using Patch CEGIs. 557-566 - Jaemin Choi, Jongsung Kim, Jaechul Sung, Sangjin Lee, Jongin Lim:
Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. 567-576 - Kai Wirt:
Fault Attack on the DVB Common Scrambling Algorithm. 577-584 - Byung kwan Lee, Am Sok Oh, Eun-Hee Jeong:
HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment. 585-594 - Zhiping Wu, Jintai Ding, Jason E. Gower, Dingfeng Ye:
Perturbed Hidden Matrix Cryptosystems. 595-602 - Kaoru Kurosawa, Swee-Huay Heng:
Identity-Based Identification Without Random Oracles. 603-613 - Joseph K. Liu, Duncan S. Wong:
Linkable Ring Signatures: Security Models and New Schemes. 614-623 - Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau:
Practical Scenarios for the Van Trung-Martirosyan Codes. 624-633 - Ammar Alkassar, Thomas Nicolay, Markus Rohe:
Obtaining True-Random Binary Numbers from a Weak Radioactive Source. 634-646 - Dong Jin Yang, Chang Han Kim, Young-Ho Park, Yongtae Kim, Jongin Lim:
Modified Sequential Normal Basis Multipliers for Type II Optimal Normal Bases. 647-656 - Shi Cui, Pu Duan, Choong Wah Chan:
A New Method of Building More Non-supersingular Elliptic Curves. 657-664 - Stefan Tillich, Johann Großschädl:
Accelerating AES Using Instruction Set Extensions for Elliptic Curve Cryptography. 665-675 - Hyuncheol Kim, Seong-Jin Ahn, Younghwan Lim, Youngsong Mun:
Access Control Capable Integrated Network Management System for TCP/IP Networks. 676-685
Modeling of Location Management in Mobile Information Systems Workshop
- Shen Zhang, Amitava Datta:
A Directional-Antenna Based MAC Protocol for Wireless Sensor Networks. 686-695 - Jahwan Koo, Seong-Jin Ahn:
An Extended Framework for Proportional Differentiation: Performance Metrics and Evaluation Considerations. 696-703 - Zheng Wan, Xuezeng Pan, Lingdi Ping:
QoS Provisioning in an Enhanced FMIPv6 Architecture. 704-713 - Sun Hur, Jeong Kee Kim, Dong Chun Lee:
Delay of the Slotted ALOHA Protocol with Binary Exponential Backoff Algorithm. 714-722 - Kwang Ho Chun, Seung-hyun Min, Myoung-ho Seong, Myoung Seob Lim:
Design and Implementation of Frequency Offset Estimation, Symbol Timing and Sampling Clock Offset Control for an IEEE 802.11a Physical Layer. 723-731 - Yonghak Ahn, Oksam Chae:
Automatic Subtraction Radiography Algorithm for Detection of Periodontal Disease in Internet Environment. 732-740 - Dong Chun Lee, Hyo Young Shin, Joung Chul Ahn, Jae-Young Koh:
Improved Authentication Scheme in W-CDMA Networks. 741-748 - Gi Yean Hwang, Jia Hou, Kwang Ho Chun, Moon Ho Lee:
Memory Reused Multiplication Implementation for Cryptography System. 749-753 - Jin Soh, Sung Man Jang, Geuk Lee:
Scheme for the Information Sharing Between IDSs Using JXTA. 754-761 - Sang-Young Lee, Yung-Hyeon Lee, Jeom Goo Kim, Dong Chun Lee:
Workflow System Modeling in the Mobile Healthcare B2B Using Semantic Information. 762-770 - Hong-Gyoo Sohn, Yeong-Sun Song, Gi-Hong Kim:
Detecting Water Area During Flood Event from SAR Image. 771-780 - Jongchan Lee, Sok-Pal Cho, Hong-Jin Kim:
Position Based Handover Control Method. 781-788 - Hyung Jin Kim, Bongsoo Son, Soobeom Lee, Joowon Park:
Improving Yellow Time Method of Left-Turning Traffic Flow at Signalized Intersection Networks by ITS. 789-797
Intelligent Multimedia Services and Synchronization in Mobile Multimedia Networks Workshop
- Kwang-Hyoung Lee, HeeSook Kim, Keun-Wang Lee:
A Multimedia Database System Using Dependence Weight Values for a Mobile Environment. 798-805 - Wen Chen, Feiyu Lei, Weinong Wang:
A General Framework for Analyzing the Optimal Call Admission Control in DS-CDMA Cellular Network. 806-815 - Sangsoo Lee, Sei-Chang Oh, Bongsoo Son:
Heuristic Algorithm for Traffic Condition Classification with Loop Detector Data. 816-821 - Yingwei Luo, Guomin Xiong, Xiaolin Wang, Zhuoqun Xu:
Spatial Data Channel in a Mobile Navigation System. 822-831 - Hyeon-Seob Cho, Keun-Wang Lee:
A Video Retrieval System for Electrical Safety Education Based on a Mobile Agent. 832-838 - Gi-sung Lee:
Fuzzy Multi-criteria Decision Making-Based Mobile Tracking. 839-847 - Jahwan Koo, Seong-Jin Ahn, Younghwan Lim, Youngsong Mun:
Evaluation of Network Blocking Algorithm Based on ARP Spoofing and Its Application. 848-855 - Keun-Wang Lee, Jong-Hee Lee:
Design and Implementation of Mobile-Learning System for Environment Education. 856-862 - Bongsoo Son, Taewan Kim, Yongjae Lee:
A Simulation Model of Congested Traffic in the Waiting Line. 863-869 - Seung-Jae Yoo:
Core Technology Analysis and Development for the Virus and Hacking Prevention. 870-879 - Soobeom Lee, Tai Sik Lee, Hyung Jin Kim, YoungKyun Lee:
Development of Traffic Accidents Prediction Model with Intelligent System Theory. 880-888 - Jin Ah Yoo, In Seon Choi, Dong Chun Lee:
Prefetching Scheme Considering Mobile User's Preference in Mobile Networks. 889-895 - Byoung-Muk Min, Sok-Pal Cho, Hong-Jin Kim, Dong Chun Lee:
System Development of Security Vulnerability Diagnosis in Wireless Internet Networks. 896-903 - Jin-Mook Kim, In-Sung Han, Hwang-Bin Ryou:
An Active Node Management System for Secure Active Networks. 904-913
Ubiquitous Web Systems and Intelligence Workshop
- Vicky Nassis, Rajagopal Rajugan, Tharam S. Dillon, J. Wenny Rahayu:
A Systematic Design Approach for XML-View Driven Web Document Warehouses. 914-924 - Jeong Hee Hwang, Keun Ho Ryu:
Clustering and Retrieval of XML Documents by Structure. 925-935 - Juryon Paik, Hee Yong Youn, Ung-Mo Kim:
A New Method for Mining Association Rules from a Collection of XML Documents. 936-945 - Bing Xu, Mingmin Zhang, Zhigeng Pan, Hongwei Yang:
Content-Based Recommendation in E-Commerce. 946-955 - Rowena Chau, Chung-Hsing Yeh, Kate A. Smith:
A Personalized Multilingual Web Content Miner: PMWeb Miner. 956-965 - Jeong Hee Hwang, Mi Sug Gu, Keun Ho Ryu:
Context-Based Recommendation Service in Ubiquitous Commerce. 966-976 - Jeong Hee Chi, Sang Ho Kim, Keun Ho Ryu:
A New Continuous Nearest Neighbor Technique for Query Processing on Mobile Environments. 977-987 - Robert Baumgartner, Christian Enzi, Nicola Henze, Marc Herrlich, Marcus Herzog, Matthias Kriesell, Kai Tomaschewski:
Semantic Web Enabled Information Systems: Personalized Views on Web Data. 988-997 - Eung-Jae Lee, Keun Ho Ryu:
Design of Vehicle Information Management System for Effective Retrieving of Vehicle Location. 998-1007 - Joohyun Han, Yongyun Cho, Jaeyoung Choi:
Context-Aware Workflow Language Based on Web Services for Ubiquitous Computing. 1008-1017 - Tacha Serif, George Ghinea, Andrew O. Frank:
A Ubiquitous Approach for Visualizing Back Pain Data. 1018-1027 - Sun Kook Yoo, Seok Myung Jung, B. S. Kim, H. Y. Yun, Sung Rim Kim, Dong Keun Kim:
Prototype Design of Mobile Emergency Telemedicine System. 1028-1034 - Daegeun Kim, MinHwan Ok, Myong-Soon Park:
An Intermediate Target for Quick-Relay of Remote Storage to Mobile Devices. 1035-1044 - Uzair Ahmad, S. Y. Lee, Mahrin Iqbal, Uzma Nasir, Arshad Ali, Mudeem Iqbal:
Reflective Middleware for Location-Aware Application Adaptation. 1045-1054 - Yue-Shi Lee, Min-Chi Hsieh, Show-Jane Yen:
Efficient Approach for Interactively Mining Web Traversal Patterns. 1055-1065 - Le Thi Thu Thuy, Doan Dai Duong:
Query Decomposition Using the XML Declarative Description Language. 1066-1075 - Sang Ho Lee, Sung Jin Kim, Seok-Hoo Hong:
On URL Normalization. 1076-1085 - Hui Song, Fanyuan Ma, Chen Wang:
Clustering-Based Schema Matching of Web Data for Constructing Digital Library. 1086-1095 - Maria Riaz, Saad Liaquat Kiani, Anjum Shehzad, Sungyoung Lee:
Bringing Handhelds to the Grid Resourcefully: A Surrogate Middleware Approach. 1096-1105 - Simon Fong, Edison Lai:
Mobile Mini-payment Scheme Using SMS-Credit. 1106-1114 - Faraz Rasheed, Young-Koo Lee, Sungyoung Lee:
Context Summarization and Garbage Collecting Context. 1115-1124 - Rajagopal Rajugan, William Gardner, Elizabeth Chang, Tharam S. Dillon:
EXtensible Web (xWeb): An XML-View Based Web Engineering Methodology. 1125-1135 - Eunkyu Lee, Min-Soo Kim, Mijeong Kim, Inhak Joo:
A Web Services Framework for Integrated Geospatial Coverage Data. 1136-1145 - Namje Park, Howon Kim, Seungjoo Kim, Dongho Won:
Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. 1146-1155 - David de Frutos-Escrig, Olga Marroquín Alonso, Fernando Rosa-Velardo:
Ubiquitous Systems and Petri Nets. 1156-1166 - Xiaoming Bao, See-Kiong Ng, Eng-Huat Chua, Wei-Khing For:
Virtual Lab Dashboard: Ubiquitous Monitoring and Control in a Smart Bio-laboratory. 1167-1176 - Ming Yin, Dion Hoe-Lian Goh, Ee-Peng Lim:
On Discovering Concept Entities from Web Sites. 1177-1186 - Mingzhe Liu, Ruili Wang, Ray H. Kemp:
Towards a Realistic Microscopic Traffic Simulation at an Unsignalised Intersection. 1187-1196 - Ras B. Pandey:
Complex Systems: Particles, Chains, and Sheets. 1197-1206 - Yuanliang Zhang, Hyung Jo Choi, Kil To Chong:
Discretization of Delayed Multi-input Nonlinear System via Taylor Series and Scaling and Squaring Technique. 1207-1216 - Xin Yao, Changshui Zhang, Jinwen Chen, Yanda Li:
On the Scale-Free Intersection Graphs. 1217-1224 - MoonBae Song, KwangJin Park, Ki-Sik Kong, SangKeun Lee:
A Stochastic Viewpoint on the Generation of Spatiotemporal Datasets. 1225-1234 - Jane Zhao:
A Formal Approach to the Design of Distributed Data Warehouses. 1235-1244 - Tianhai Tian, Kevin Burrage:
A Mathematical Model for Genetic Regulation of the Lactose Operon. 1245-1253 - Heather J. Ruskin, John Burns:
Network Emergence in Immune System Shape Space. 1254-1263 - Flavio Corradini, Emanuela Merelli, Marco Vita:
A Multi-agent System for Modelling Carbohydrate Oxidation in Cell. 1264-1273 - Bingcheng Hu, Jiming Liu:
Characterizing Complex Behavior in (Self-organizing) Multi-agent Systems. 1274-1283 - Sung-Hee Park, Chan Yong Park, Dae-Hee Kim, Seon Hee Park, Jeong Seop Sim:
Protein Structure Abstractionand Automatic Clustering Using Secondary Structure Element Sequences. 1284-1292
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.