default search action
RACS 2014: Towson, Maryland, USA
- Chao Lu, Esmaeil S. Nadimi, Sung-Ryul Kim, Wei Wang:
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, RACS 2014, Towson, Maryland, USA, October 5-8, 2014. ACM 2014, ISBN 978-1-4503-3060-2
Artificial intelligence & algorithms
- Vinh Nguyen, Chih-Cheng Hung, Xiang Ma:
Face hallucination based on locally linear embedding and local correlation. 1-6 - Junghoon Lee, Gyung-Leen Park:
DC charger selection scheme for electric vehicle-based tours visiting multiple destinations. 7-11 - Wei Yu, Dou An, David W. Griffith, Qingyu Yang, Guobin Xu:
On statistical modeling and forecasting of energy usage in smart grid. 12-17 - Won-Seok Hwang, Sang-Wook Kim:
Post ranking in a blogosphere. 18-22 - Xinkai Li, Chao Lu, Jon A. Sjogren:
Overflow detection in multiple P-adic parallel implementation. 23-28 - Eunji Lee, Jeongin Kim, Junho Choi, Chang Choi, Byeong-Kyu Ko, Pankoo Kim:
A semantic weighting method for document classification based on Markov logic networks. 29-33 - Markus Rickert, Maximilian Eibl:
A proposal for a taxonomy of semantic editing devices to support semantic classification. 34-39 - Saad Sajid Hashmi, Sang-Wook Kim:
Unsupervised detection of obfuscated diverse attacks in recommender systems. 40-45 - Shrawan Kumar Trivedi, Shubhamoy Dey:
A study of ensemble based evolutionary classifiers for detecting unsolicited emails. 46-51 - Ju Hee Choi, Jong Wook Kwak, Seong Tae Jhang, Chu Shik Jhon:
Adaptive cache compression for non-volatile memories in embedded system. 52-57
Short papers (posters)
- Inbok Lee, Phuong Do, Phuoc-Hoang-Tuong-Lan Do, Sung-Ryul Kim:
Measuring similarities among intrusion detection rules on the MapReduce environment. 58-60
Database & data mining
- Yong Suk Choi:
Content type based adaptation in collaborative recommendation. 61-65 - Farzana Rahman, Ivor D. Addo, Sheikh Iqbal Ahamed:
PriSN: a privacy protection framework for healthcare social networking sites. 66-71 - Kyung Soo Kim, Jun Yeop Lee, Yong Suk Choi:
Metadata based combined approach for effective collaborative recommendation. 72-76 - Jiwoon Ha, Soon-Hyoung Kwon, Sang-Wook Kim, Dongwon Lee:
Recommendation of newly published research papers using belief propagation. 77-81
Short paper (poster)
- He Li, Minje Ahn, Jongtae Lim, Kyoungsoo Bok, Han-Suk Choi, Jaesoo Yoo:
An efficient mobile social search method. 82-85 - Byung-Kun Park, Wone-Wung Jung, Joonhyouk Jang:
Integrated financial trading system based on distributed in-memory database. 86-87
Image processing & computer vision
- Marcel-Titus Marginean, Chao Lu:
A multi-paradigm object tracker for robot navigation assisted by external computer vision. 88-94 - Tuan-Anh Nguyen, Jong-Geun Oh, Min-Cheol Hong:
Fast image filtering via adaptive noise detection. 95-99 - Huu-Noi Doan, Tuan-Anh Nguyen, Beomsu Kim, Min-Cheol Hong:
Directional hole filling algorithm in new view synthesis for 3D video using local segmentation. 100-104 - Sajid Javed, Seon Ho Oh, JunHyeok Heo, Soon Ki Jung:
Robust background subtraction via online robust PCA using image decomposition. 105-110 - Samaneh Aminikhanghahi, Sung Y. Shin, Wei Wang, Seong-Ho Son, Soon-Ik Jeon:
An optimized support vector machine classifier to extract abnormal features from breast microwave tomography data. 111-115 - Kwang Hee Won, Joonwoo Son, Soon Ki Jung:
Stixels estimation through stereo matching of road scenes. 116-120 - Byung K. Jung, Sung Y. Shin, Seong-Ho Son, Jeong-Ki Pack:
Shape based medical image retrieval method using irregularity chain code similarity. 121-125 - Dae-Soo Kim, Gil-Je Lee, Kee-Young Yoo:
A reversible data hiding scheme based on histogram shifting using edge direction predictor. 126-131 - Zhenhai Wang, Kicheon Hong:
An online multi-object tracking by detection approach based on particle filtering framework. 132-137 - Deqian Fu, Seong Tae Jhang:
Visual tracking with multiple representative models based on sparse prototypes. 138-143 - Sisay Shimelis Gurmu, Min Woo Park, Soon Ki Jung:
Pedestrian detection of road scenes using depth and intensity features. 144-148
Network Computing
- Jun Huang, Xiang Li, Yin Ying, Yi Sun, Qiang Duan, Cong-Cong Xing:
FAMOUS: a novel fast multi-constrained multicast routing algorithm. 149-154 - Kaijian Liu, Haibo Zhang, Jiaoyang Peng, Fangwei Li:
Energy-aware resource allocation based on margin adaptive principle for OFDMA systems. 155-160 - Syed Hassan Ahmed, Safdar Hussain Bouk, Dongkyun Kim:
Reducing scanning latency in WiMAX enabled VANETs. 161-165 - Chi-Sheng Shih, Guan-Fan Wu:
Meta-routing over heterogeneous networks in M2M systems. 166-173 - Yanxiao Zhao, Jems Pradhan, Jun Huang, Hui Sun:
Experimental approach: energy-and-bandwidth spectrum sensing using GNU radio and USRP. 174-179 - Syed M. Raza, Dongsoo S. Kim, Hyunseung Choo:
The proposal for SDN supported future 5G networks. 180-185 - Haibo Zhang, Kaijian Liu, Lixiong Mu, Fangwei Li:
Chunks and power allocation in OFDMA systems based on transient chaotic neural network. 186-191 - Md Nashid Anjum, Jun Huang, Yanxiao Zhao, Wei Wang:
Fairness-oriented spectrum sharing for ODFC-based WRAN. 192-197 - Kyoungha Kim, Ik-hyeon Jang, Yanggon Kim:
Evaluating the performance impact of RTR-BIRD in origin validation. 198-203 - Kun Hua, Yuenong Zhu, Wei Wang, Honggang Wang:
Cross-layer design for optimal throughput of wireless networks. 204-208 - Awais Ahmad, Alfred Daniel, Anand Paul:
Optimized data transmission using cooperative devices in clustered D2D communication. 209-214
Short paper (poster)
- Daeho Kim, Taegyu Hwang, Sanghoon Choi, Ikhyun Cho, Jiman Hong:
HILF: hybrid indoor locating framework. 215-217
Security
- Reddy A. Goutham, Dae-Soo Kim, Kee-Young Yoo:
Implicit graphical password mutual authentication using mirror-image encryption. 218-223 - Seongsoo Park, Hyunjun Kim, Jaeju Kim, Hwansoo Han:
Detecting binary theft via static major-path birthmarks. 224-229 - Lakshmidevi Sreeramareddy, Sheng Miao, Jinjuan Heidi Feng:
Investigating gesture-based password: usability and vulnerability to shoulder-surfing attacks. 230-235 - TaeGuen Kim, Jung Bin Park, In Gyeom Cho, Boojoong Kang, Eul Gyu Im, Sooyong Kang:
Similarity calculation method for user-define functions to detect malware variants. 236-241 - Phuc-Tran Ho, Hee Sun Kim, Sung-Ryul Kim:
Application of sim-hash algorithm and big data analysis in spam email detection system. 242-246 - Wen-Chieh Wu, Shih-Hao Hung:
DroidDolphin: a dynamic Android malware detection framework using big data and machine learning. 247-252 - SeongWook Kang, Hyungjoon Shim, Seong-je Cho, Minkyu Park, Sangchul Han:
A robust and efficient birthmark-based android application filtering system. 253-257 - Edward Jung, Chih-Cheng Hung, Seonho Choi:
FSM watermarks based on ordering of flip flops. 258-262
Short paper (poster)
- Daeshin Park, Youngsu Park, John Kim, Jiman Hong:
The optimized grouping value for precise similarity comparison of dynamic birthmark. 263-265
Software engineering
- Fabian Sobiech, Beate Eilermann, Andreas Rauch:
On iteration optimization for non-cross-functional teams in Scrum. 266-271 - Byeongho Kang, TaeGuen Kim, Boojoong Kang, Eul Gyu Im, Minsoo Ryu:
TASEL: dynamic taint analysis with selective control dependency. 272-277 - Michael Smith, Josh Dehlinger:
Enabling static security vulnerability analysis in PHP applications for novice developers with SSVChecker. 278-283
System software
- Manar Qamhieh, Serge Midonnet:
An experimental analysis of DAG scheduling methods in hard real-time multiprocessor systems. 284-290 - Xing Chen, Wei Yu, David W. Griffith, Nada Golmie, Guobin Xu:
On cascading failures and countermeasures based on energy storage in the smart grid. 291-296 - Hyunmin Yoon, Minsoo Ryu:
Real-time priority assignment for autosar-based systems with time-driven synchronization. 297-302 - Chunqiu Wang, Wei Wang, Sung Y. Shin, Soon-Ik Jeon:
Comparative study of microwave tomography segmentation techniques based on GMM and KNN in breast cancer detection. 303-308 - Yong-Yeon Jo, Sang-Wook Kim, Duck-Ho Bae:
GPU-based matrix multiplication methods for social networks analysis. 309-313 - Chin-Fu Kuo, Yung-Feng Lu:
Energy-efficient assignment for tasks on non-dvs heterogeneous multiprocessor system. 314-319 - Hsueh-Wen Tseng, Ruei-Yu Wu, Tien-Shih Chang:
An effective VM migration scheme for reducing resource fragments in cloud data centers. 320-325 - Myunghoon Oh, Seungjae Baek, Dongwoo Kang, Jongmoo Choi:
D3: discarding dispensable data for efficient live migration of virtual machines. 326-331 - Chien-Chung Ho, Yu-Ming Chang, Yuan-Hao Chang, Sheng-Yen Hong, Che-Wei Chang, Tei-Wei Kuo:
A classification-based prefetching scheme for hibernation of embedded computing systems. 332-337 - Shuichi Oikawa:
Adapting byte addressable memory storage to user-level file system services. 338-343 - Yeongho Choi, Yujin Lim:
A cost-efficient mechanism for dynamic VM provisioning in cloud computing. 344-349 - Kuan-Chung Huang, Yu-Chen Wu, Che-Wei Chang, Tei-Wei Kuo, Chi-Sheng Shih, Qingxu Deng:
Real-time process synchronization for systems with accelerators. 350-355
Short papers (posters)
- Joonhyouk Jang, Yookun Cho, Jinman Jung, Sanghee Yoon:
Concurrency control scheme for key-value stores based on InfiniBand. 356-358 - Woochur Kim, Ikhyun Cho, Donghee Min, Chris Sung:
Design of data backup on distributed memory system based on key-value store using hot/cold data management. 359-361 - Woochur Kim, Jungmee Yun, Hyedong Jung:
Evaluation of high-frequency financial transaction processing in distributed memory systems. 362-364
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.