default search action
6th ICITCS 2016: Prague, Czech Republic
- 6th International Conference on IT Convergence and Security, ICITCS 2016, Prague, Czech Republic, September 26, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-3765-0
- Yuangang Yao, Lei Zhang, Jin Yi, Yong Peng, Weihua Hu, Lei Shi:
A Framework for Big Data Security Analysis and the Semantic Technology. 1-4 - Myungcheol Lee, Miyoung Lee, Changsoo Kim:
A JIT Compilation-Based Unified SQL Query Optimization System. 1-2 - Jinyoung Moon, Yongjin Kwon, Kyuchang Kang, Jongyoul Park, Yong-Jin Han, Young-Wha Lee:
A Knowledge-Driven Approach to Interactive Event Recognition for Semantic Video Understanding. 1-3 - Simen Steig, André Årnes, Thanh Van Do, Hai Thanh Nguyen:
A Network Based IMSI Catcher Detection. 1-6 - (Withdrawn) A Secure Agent Based Architecture for Resource Allocation in Cloud Computing. 1-6
- Byoung-Jun Park, Jeong-Woo Lee, Changrak Yoon, Kyong-Ho Kim:
A Study on Augmented Reality of a Vehicle Information Using Head-Up Display. 1-2 - SeongSang Yu, Kyung Ho Lee, Byeong Wook Nam, Yuepeng Wu:
A Study on Pipe Spool Considering Workspace Based on Genetic Algorithm. 1-4 - Muhammad Zubair, Jinsul Kim, Changwoo Yoon:
An Automated ECG Beat Classification System Using Convolutional Neural Networks. 1-5 - Byeonguk Im, Nakhoon Baek, Joongin Lee:
An Efficient Implenentation of LiDAR Data and its Geometric Representation Extraction. 1-4 - Dong-Hyun Kim, Jae-Young Jang, Jong-Deok Kim:
Analysis of Characteristics of Video Quality for Unequal Loss Protection in Wi-Fi Based Broadcasting System. 1-4 - Jirí Sebek, Tomás Cerný:
AOP-Based Approach for Local Data Management in Adaptive Interfaces. 1-5 - Filip Rysavy, Tomás Cerný, Martin Tomásek:
Aspect-Oriented User Interfaces Design Integration to Angular 2 Framework. 1-3 - Kristoffer Jensen, Thanh Van Do, Hai Thanh Nguyen, André Årnes:
Better Protection of SS7 Networks with Machine Learning. 1-7 - Gokul Kannan Sadasivam, Chittaranjan Hota, Bhojan Anand:
Classification of SSH Attacks Using Machine Learning Algorithms. 1-6 - Dae-Won Park, Kwangil Lee, Suhyun Park:
Common Vocabulary Set for Support of Interoperability of Data Contents of Maritime Equipment and Systems in E-Navigation Services. 1-4 - David Fernández Llorca, Raúl Quintero, Ignacio Parra, Mario Jimenez, Carlos Fernández, Rubén Izquierdo, Miguel Ángel Sotelo:
Comparison between UHF RFID and BLE for Stereo-Based Tag Association in Outdoor Scenarios. 1-5 - Martin Tomásek, Tomás Cerný:
Context-Aware User Interface Field Classification. 1-5 - Mihwa Song:
Cooperative Spectrum Sensing Scheme for Femtocell Network. 1-2 - Nakhoon Baek, Woo Suk Shin:
CUDA-Based Acceleration Techniques for Image Filtering. 1-2 - Marius Rata, Aurelian Florentin Draghia, Radu Drobot, Raluca Burtila:
Decision Support System for Pro-Active Flood Control on Jijia River (Romania). 1-5 - Fotis Kitsios, Maria Kamariotou:
Decision Support Systems and Business Strategy: A Conceptual Framework for Strategic Information Systems Planning. 1-5 - (Withdrawn) Design Semantic Framework for Software Requirement Specification. 1-5
- Jongmun Jeong, Mintae Hwang:
Development of a Security Application based on User-Centric Evaluation. 1-4 - Moohun Lee, Mingyu Kim:
Development of Real-Time Road Surface Condition Determination Algorithm Using an Automatic Weather System. 1-2 - Karel Cemus, Filip Klimes, Ondrej Kratochvil, Tomás Cerný:
Distributed Multi-Platform Context-Aware User Interface for Information Systems. 1-4 - Yoonsook Hwang, Kyong-Ho Kim:
Effects of the Displaying Augmented-Reality Information on the Driving Behavior of the Drivers with Specific Psychological Characteristics. 1-2 - Jan Helbich, Tomás Cerný:
Energy Impact of Web User Interface Technology on Mobile Devices. 1-3 - Seda Kul, Süleyman Eken, Ahmet Sayar:
Evaluation of Real-Time Performance for BGSLibrary Algorithms: A Case Study on Traffic Surveillance Video. 1-4 - Dohyung Kim, Minsu Jang, Jaehong Kim:
Example-Based Retrieval System for Human Motion Data. 1-2 - Yuuki Takano, Ryosuke Miura:
FARIS: Fast and Memory-Efficient URL Filter by Domain Specific Machine. 1-7 - Ondrej Grunt, Jan Plucar, Lukas Kapicak:
Fault Analysis of Data Upload Process in Ostrava, Czech Republic Using Measured Network Parameters. 1-5 - Nasir Uddin, Mohammad Jabr:
File Upload Security and Validation in Context of Software as a Service Cloud Model. 1-5 - Chun-I Fan, Jian-Sheng Wang, Jheng-Jia Huang, Yi-Fan Tseng, Wen-Shenq Juang, Hiroaki Kikuchi:
Flexible Authentication Protocol with Key Reconstruction in WBAN Environments. 1-5 - Raúl Mazo, Christophe Feltus:
Framework for Engineering Complex Security Requirements Patterns. 1-5 - DoHyung Kim, Ho-Sub Yoon, Jaehong Kim:
Framework of Sensor Network for Perception of Human Behavior and Identification. 1-2 - Jinho Choi:
Full-Duplexing Jamming Attack for Active Eavesdropping. 1-5 - (Withdrawn) Functionality versus Complexity Analysis of Project Management Software in Kingdom of Bahrain. 1-6
- Wonhyuk Lee, Kuinam J. Kim, Hyuncheol Kim:
Hierarchical Cluster Network for Wellness Sports Industry. 1-4 - (Withdrawn) Holistic-Based Feature Extraction And Error Correcting Code Biometric Template Protection Technique. 1-4
- TaeYeon Kim, BhumCheol Lee:
Holistic Service Orchestration over Distributed Micro Data Center. 1-5 - Michal Trnka, Tomás Cerný:
Identity Management of Devices in Internet of Things Environment. 1-4 - Jiyoung Yoon, Nakhoon Baek, Cheolhwan Kim, Hwanyong Lee:
Implement of Stereo Image Correction for 3D Optical Microscope and Design Hardware System. 1-5 - Lina Chato, Shahram Latifi:
Improving the Classifier Performance in Detecting People Based on Denoising Wavelet Transform. 1-6 - Shuichiro Yamamoto, Shuji Morisaki:
IT Demand Governance using Business Goal Structuring Notation. 1-5 - Yu-Cheol Lee, Jaeyeon Lee:
Kinematic Constraint Method for Human Gesture Recognition Based on Weighted Dynamic Time Warping. 1-5 - Dongwoo Kim, Yunja Choi:
Light-Weight API-Call Safety Checking for Automotive Control Software Using Constraint Patterns. 1-5 - Ari Barmawi:
Linguistic Based Steganography Using Lexical Substitution and Syntactical Transformation. 1-6 - Shahab Tayeb, Miresmaeil Mirnabibaboli, Shahram Latifi:
Load Balancing in WSNs using a Novel Markov Decision Process Based Routing Algorithm. 1-5 - Dong-Hyun Kim, Jun Young Lim, Jong-Deok Kim:
Low-Power, Long-Range, High-Data Transmission Using Wi-Fi and LoRa. 1-3 - Byungjo Kim, Jae-Mo Kang, Hyung-Myung Kim, Joohyun Lee:
Max-Min Energy-Efficiency Optimization in Wireless Powered Communication Network with Harvest-Then-Transmit Protocol. 1-5 - Cheolhwan Kim, Jiyoung Yoon, Yun-Jung Lee:
Medical Image Segmentation by More Sensitive Adaptive Thresholding. 1-3 - Karel Frajták, Miroslav Bures, Ivan Jelínek:
Model-Based Testing and Exploratory Testing: Is Synergy Possible? 1-6 - Lacezar Licev, Jakub Hendrych, Radim Kuncicky:
Neural Stegoclassifier. 1-3 - (Withdrawn) New Proposed Z-Transform Based Encryption Algorithm. 1-5
- Tomás Jirsík, Milan Cermák, Pavel Celeda:
On Information Value of Top N Statistics. 1-5 - Zdenek Brabec, Tomás Cerný, Jirí Sebek:
On Metadata Extension to Derive Data Presentations with Angular 2. 1-4 - Anna Epishkina, Konstantin Kogos:
Packet Length Covert Channel Capacity Estimation. 1-4 - Jinhyun Ahn, Dong-Hyuk Im, Taewhi Lee, Hong-Gee Kim:
Parallel Prime Number Labeling of Large XML Data Using MapReduce. 1-2 - Taewhi Lee, Moonyoung Chung, Sung-Soo Kim, Hyewon Song, Jongho Won:
Partial Materialization for Data Integration in SQL-on-Hadoop Engines. 1-2 - Nur Syuhada Selamat, Fakariah Hani Mohd Ali, Noor Ashitah Abu Othman:
Polymorphic Malware Detection. 1-5 - Young-Chul Kim, Seok-Hyun Lee, Jin-Soo Jang:
Power-Aware Data Structure Using Memory Allocation Techniques in EPS-Based Motion Recognition Systems. 1-4 - Igor Velbitskiy:
Programming without Programming Languages New Graphic Polyglot Concept of Programming. 1-6 - (Withdrawn) Repulsion-Propulsion Firefly Algorithm with Fast Convergence to Solve Highly Multi-Modal Problems. 1-6
- Suhairi Mohd Jawi, Fakariah Hani Mohd Ali:
Rules and Results for SSL/TLS Nonintrusive Proxy Based on JSON Data. 1-5 - Jamel Miri, Bechir Nsiri, Ridha Bouallegue:
Secure Distance Bounding Protocol on TH-UWB. 1-5 - Dakshi T. K. Geeganage, Darshika N. Koggalahewa, Jayantha L. Amararachchi, Asoka S. Karunananda:
Sentence Based Mathematical Problem Solving Approach via Ontology Modeling. 1-5 - V. Nagarjana Devi Duvvuri, V. Rajanikanth Thatiparthi, Rajashekar Pantangi, Akhil Gangavarapu:
Sentiment Analysis Using Harn Algorithm. 1-5 - Miroslav Bures, Martin Filipsky:
SmartDriver: Extension of Selenium WebDriver to Create More Efficient Automated Tests. 1-4 - Abdullah J. Alzahrani, Ali A. Ghorbani:
SMS-Based Mobile Botnet Detection Module. 1-7 - Keun-Chang Kwak, Myungwon Lee:
Speech Enhancement Using ES Information and Phase-Error Based Filters. 1-3 - Jung Min Lee, Kyung Ho Lee, Byeong Wook Nam, Yuepeng Wu:
Study on Image-Based Ship Detection for AR Navigation. 1-4 - Tomás Cerný, Michael J. Donahoo:
Survey on Second Screen Systems. 1-5 - Hwai-Tsu Hu, Jieh-Ren Chang, Chun-Chi Chen, Sheng-Yu Lai:
Synchronized Blind Audio Watermarking via Multilevel DWT and Windowed Vector Modulation. 1-5 - Peng Liu, Guohua Jiang, Yuqing Liu, Ming An:
The Utility Evaluation of the Astronaut Virtual Training System in Layout Familiarization Training. 1-4 - Jin-Suk Ma, Hak-Young Kim, Young-Woo Kim:
The Virtualization and Performance Comparison with LXC-LXD in ARM64bit Server. 1-4 - Min-Gyu Kim, Moo Hun Lee:
Visualization Method for Efficient Expression of Spatial Information. 1-2 - Muhammad Shafiq, Xiangzhan Yu, Asif Ali Laghari:
WeChat Text Messages Service Flow Traffic Classification Using Machine Learning Technique. 1-5 - Shahab Tayeb, Shahram Latifi:
Will an Emerging Standard Take Over the Routing Realm? An Evaluative Analysis of DUAL and SPF. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.