default search action
4th ICITCS 2014: Beijing, China
- 2014 International Conference on IT Convergence and Security, 10.1109/ICITCS.2014, Beijing, China, October 28-30, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-6541-0
- Jaeho Lee, Inkyung Byun, Kyoungro Yoon:
A Case Study of Visual Analytic Method on Behavior Modification by Movement Therapy. 1-4 - Jang-Yoon Kim, Michael Vogl, Shin-Dug Kim:
A Code Based Fruit Recognition Method Via Image Convertion Using Multiple Features. 1-4 - Lin Li, Songnian Lu, Shenghong Li, Zhengmin Xia:
A Community Divisive Algorithm Using Local Weak Links. 1-5 - Qun Zhang, Lirong Wei, Rui Hu:
A General Transfer Station Location Model in Relay Delivery Considering Carbon Footprint. 1-4 - Chao Liu, Changkai Zhang, Hong Yao, Deze Zeng, Qingzhong Liang, Chengyu Hu:
A GPS Information Sharing System Based on Bluetooth Technology. 1-2 - Goanghun Kim, Nakhoon Baek:
A Height-Map Based Terrain Rendering with Tessellation Hardware. 1-4 - Hanqiu Mo, Yasuaki Inoue:
A Magnetic Resonant Coupling Wireless Power Transmission System under Different Load Conditions. 1-4 - Soojin Park, Young B. Park:
A Multi-Core Architectural Pattern Selection Method for the Transition from Single-Core to Multi-Core Architecture. 1-5 - Hong Jun Choi, Dong Oh Son, Cheol Hong Kim, Jong Myron Kim Kim:
A Novel Prefetch Technique for High Performance Embedded System. 1-3 - Sufian Sudeng, Naruemon Wattanapongsakorn:
A Preference-Based Multi-Objective Evolutionary Algorithm for Redundancy Allocation Problem. 1-4 - Khikmatullo Kudratov, Liu Cheng:
A Research on Expatriate Cross- Cultural Adjustment and Job Performance in MNCs. 1-4 - Lu Bo, TaegKeun Whangbo:
A SIFT-Color Moments Descriptor for Object Recognition. 1-3 - Apiradee Ampawasiri, Chompoo Suppatoomsin, BongJin Baek, JoonHo Ryu, SangWoon Lee, Cheong-Ghil Kim:
A Study of High Efficiency Video Coding File Format. 1-2 - SangWoon Lee, BongJin Baek, Cheong-Ghil Kim:
A Study on Audio Levels and Loudness Standard for Digital Broadcasting Program. 1-3 - Insick Son, Kabsu Han, Daejin Park, Meng Di Yin, Jeonghun Cho:
A Study on Implementation of IVI Applications for Connected Vehicle Using HTML5. 1-4 - Young-Jin Shin:
A Study on Privacy Protection Tasks for Cross-Border Data Transfers. 1-4 - Juraj Camaj, Jana Lalinska, Jaroslav Masek:
Simulations of continental logistics center from the perspective of technologist. 1-4 - Hwan-Seok Yang, Seung-Jae Yoo:
A Study on Secure Element for Smartwork. 1-3 - Shamsul Kamal Ahmad Khalid, Mustafa Mat Deris, Kamaruddin Malik Mohamad:
A Systematic Redundancy Approach in Watermarking Using Sudoku. 1-5 - Do van Thuan, Pranas Butkus, Do Van Thanh:
A User Centric Identity Management for Internet of Things. 1-4 - Jong-Yeon Park, Jung-Nyeo Kim, Jae-Dock Lim, Dong-Guk Han:
A Whitebox Cryptography Application for Mobile Device Security against Whitebox Attacks - How to Apply WBC on Mobile Device. 1-5 - Murat Ogul, Selçuk Baktir, Emin Islam Tatli:
Abused Android Permissions by Advertising Networks. 1-4 - Jin-Chun Piao, Chang-Woo Cho, Cheong-Ghil Kim, Bernd Burgstaller, Shin-Dug Kim:
An Adaptive LOD Setting Methodology with OpenGL ES Library on Mobile Devices. 1-4 - Rui Zhu, Tong Li, Fei Dai, Qi Mo, Leilei Lin, Yun He, Yeting Chen:
An Approach to Detecting Software Process Deviations. 1-4 - Changhee Cho, Sanghyun Park, Jinsul Kim, Sangjoon Lee:
An Efficient Moving Detection Methodology in Mobile Cloud Environment. 1-3 - Bing Li, Xin Fang, Ruifeng Sun, Xue Luo, Wei-Hao Chang:
An Enhanced TAC/AA Competition Model Designed for Sponsored Search Market. 1-4 - Mohamad Farhan Mohamad Mohsin, Abdul Razak Hamdan, Azuraliza Abu Bakar:
An Evaluation of Feature Selection Technique for Dendrite Cell Algorithm. 1-5 - Jin-Woo Kim, Jin Gwan Park, Min A. Jeong, Seong-Ro Lee:
An Interference Avoidance System Using Energy Contour Line for Coexistence with Ieee 802.11 Networks in Wireless Sensor Networks. 1-4 - Seokmo Kim, Young B. Park:
An Object Pool Realization of Whitelist Strategies to Neutralize Injection Flaws. 1-5 - Juanxi Lin, Mengnan Song, Jinglu Hu:
An SMO Approach to Fast SVM for Classification of Large Scale Data. 1-4 - Muhammad Usman, Shoaib Hassan:
Analysing Different Threats Levels in NGN and Ensuring Its Security with Quality of Services. 1-5 - Hyuk-Kyu Lim, Je-Ho Park, Han Auk Kim:
Analysis of Effect of Luminance Space on Face Detection. 1-2 - Namburu Swetha, Panyam Narahari Sastry, Yandra Rajasree Rao:
Analysis of Spectrum Sensing Based on Energy Detection Method in Cognitive Radio Networks. 1-4 - Dong Oh Son, Hong Jun Choi, Jong-Myon Kim, Cheol Hong Kim:
Analysis on the Power Efficiency of Mobile Systems Varying Device Parameters. 1-3 - Feng-Hsiag Hsiao, Guang-Wei Liou:
Application of Advanced Encryption Standard to Chaotic Synchronization Systems: Using an Improved Genetic Algorithm as Auxiliary. 1-4 - Yongmin Park, Seokjun Lee, Jongwan Kim, Taeshik Shon:
Applying Digital Forensics in Various Application Fields: Required Elements for Having Legal Force. 1-4 - Do-Young Chung, Sok-Joon Lee, Sin-Hyo Kim:
Attacks about Channel Bonding on WLAN. 1-3 - Hwan-Seok Yang, Seung-Jae Yoo:
Authentication Techniques for Improving the Reliability of the Nodes in the MANET. 1-3 - Soojin Park, Jeongwon Byeon, Mansoo Whang, Young B. Park:
Bad Symptoms for Usability of Mobile Applications. 1-4 - John Owen F. Ilagan, Ma. Regina E. Estuar:
Barriers to Community-Based Computing in the Philippines. 1-4 - Shankar Ganesh Manikandan, Siddarth Ravi:
Big Data Analysis Using Apache Hadoop. 1-4 - Sung-Jong Eun, Taeg Keun Whangbo:
Brain Segmentation Using Susceptibility Weighted Imaging Method. 1-3 - Seong-Ro Lee, Beom-mu Kim, Min A. Jeong, Jin-Woo Kim:
Building UWB Based Smart Home Network for Wireless IPTV. 1-4 - Mait Rungi, Valeria Stulova:
Choosing How Tight to Bond: The Interplay between Corporate Combinations, Alliances and Networks. 1-4 - Mohammad Ahangar Kiasari, Seung You Na, Jin Young Kim:
Classification of Human Postures Using Ultra-Wide Band Radar Based on Neural Networks. 1-4 - Seungae Kang, Youngjoo Kim:
Cluster Business Model for Wellness IT. 1-2 - Tran Thi Thu Ha, Jaehyung Park, Yonggwan Won, Jinsul Kim:
Combining STUN Protocol and UDP Hole Punching Technique for Peer-To-Peer Communication across Network Address Translation. 1-4 - Ji-Yong Jung, Chan-Il Yoo, Kyung-Ah Kim, Soo-Kyung Bok, Bong-Ok Kim, Yonggwan Won, Jung-Ja Kim:
Correlation Analysis between Idiopathic Scoliosis and Pelvic Asymmetry Using Sitting Posture Measurement System. 1-4 - Feng He, Xiaoning Xu, Liyun Zhu:
Data Perturbations for All DMUs in DEA with Interval Uncertainty. 1-6 - Sai Krishna Pallimalli, Arshad Shaik:
Defense Methodologies of AV Evasion for Access Control and Information Assurance in Industrial Distributed Control Systems and SCADA Systems. 1-5 - GeunHong Park, Dae-Won Park, Suhyun Park:
Design and Implementation of Display Module for Electronic Navigational Chart Data. 1-3 - Byoung U. Kim, Nakhoon Baek:
Developing an Audio-Based Game. 1-3 - Tao Liu, Hui Guo:
Dynamic Encryption Key Design and Its Security Evaluation for Memory Data Protection in Embedded Systems. 1-4 - Sung-Hwa Lim, Jai-Hoon Kim:
Dynamic Security Level Changing Strategy Using Attack Predictions - Case Study of TCP SYN Attacks. 1-4 - Maysoon S. Aldekhail:
Effect of Knowledge Management Based Error Mitigation Techniques in Medical and Diagnostic Applications. 1-6 - Young Cheul Kim, Jongik Kim, Hyung-Ju Cho, Tae-Sun Chung:
Efficient Method for Processing Consecutive Events over Streams with a Negation Link. 1-4 - Bing Li, Ruifeng Sun, Xin Fang, Xue Luo, Wei-Hao Chang:
Emergent Challenges and IPDS for Anti-Phishing Attack. 1-4 - Tan Dat Trinh, Jin Young Kim, Seung You Na:
Enhanced Face Recognition by Fusion of Global and Local Features under Varying Illumination. 1-4 - Muhammad Usman, Usman Akram:
Ensuring Data Security by AES for Global Software Development in Cloud Computing. 1-7 - Je-Ho Park, Changwon Kang:
Entropy Based Image Identifier Generation. 1-2 - Feng He, Liyun Zhu, Wei Jiang:
Environmental Efficiency Evaluation with Undesirable Outputs-A Study on China's Iron and Steel Industry. 1-4 - Jung-Kyu Choi, Chan-Il Yoo, Kyung-Ah Kim, Yonggwan Won, Jung-Ja Kim:
Evaluation of Custom-Made Insoles on Pes Cavus During Walking. 1-4 - Ji-Yong Jung, Chan-Il Yoo, Kyung-Ah Kim, Soo-Kyung Bok, Bong-Ok Kim, Yonggwan Won, Jung-Ja Kim:
Evaluation of Sitting Balance in Adolescent Idiopathic Scoliosis Patients with Pelvic Rotation Using Balance Board System with Accelerometer. 1-4 - Seungae Kang, Sunyoung Kang, Hyuncheol Kim:
Fitness Image Model for Individual with Disabled. 1-3 - Thuong-Khanh Tran, Ngoc Nam Bui, Jin Young Kim:
Foreground Extraction in Video Based on Edge-Based Robust Principal Component Analysis. 1-2 - Satish K. Shah, Sonal J. Rane, Dharmistha D. Vishwakarma:
GTS Allocation Strategy for IEEE 802.15.4 WSN. 1-5 - Sung-Joon Yoon, Yang-Byung Park:
Heuristics for the Vendor-Managed Inventory Problem of Convenience Stores. 1-3 - Ngoc Nam Bui, Thuong-Khanh Tran, Chenlin Hu, Jin-Young Kim, Hyoung-Gook Kim:
Human Detection and Tracking Using Poselet with Weighted Motion Block Particle Filters. 1-5 - Thuong-Khanh Tran, Ngoc Nam Bui, Jin-Young Kim:
Human Detection in Video Using Poselet Combine with Gradient Local Auto Correlation Classifier. 1-4 - Hong Jun Choi, Dong Oh Son, Cheol Hong Kim, Jong Myron Kim Kim:
Impact of Clock Frequency and Number of Cores on GPU Performance. 1-4 - Se-Yeol Yang, Jung-Ja Kim:
Implementation of a Reading Assistive Computer System Using Image Processing Techniques. 1-4 - Christina Muro, Leonard James Mselle:
Implementation of Mobile-Phone Services in Preventing Mother-To-Child Transmission of HIV (PMTCT). 1-4 - Dong Chun Lee, Kuinam J. Kim:
Improved Authentication Scheme of Binding Update Protocol in Mobile IPv6 Networks. 1-4 - Yungang Wei, Lei Wu, Bo Sun, Xiaoming Zhu:
Improved QEM Simplification Algorithm Based on Discrete Curvature and a Sparseness Coefficient. 1-5 - Siti Sarah Maidin, Marini Othman, Mohammad Nazir Ahmad:
Information Sharing in Governance of Flood Management in Malaysia: COBIT Based Framework. 1-5 - Werner Jauk:
Intuitive Gestural Interfaces / Adaptive Environments and Mobile Devices / Apps.: Playing Music and the Musical Work as a Role Model for Personalized Gestural Interaction in Social Environments. 1-4 - Byungyeon Park, Wonhyuk Lee, Hyuncheol Kim:
IT Technology and Exercise Rehabilitation. 1-2 - Min-Uk Kim, Kyoungro Yoon:
JPEG-AR Standard Enabling Augmented Marketing. 1-2 - Shihao Yan, Robert A. Malaney:
Line-Of-Sight Based Beamforming for Security Enhancements in Wiretap Channels. 1-4 - Ong Sing Goh, Mohd Khanapi Abd. Ghani, Yogan Jaya Kumar, Yun-Huoy Choo, Azah Kamilah Muda:
Massive Open Online Course (MOOC) with Learning Objects and Intelligent Agent Technologies. 1-4 - Wonhyuk Lee, Seunghae Kim, TaeYeon Kim, Hyuncheol Kim:
Micro-Datacenter Management Architecture for Mobile Wellness Information. 1-4 - Yasutaka Matsuoka, Hua-An Zhao:
Multi-Objective Optimization Techniques for VLSI Placements. 1-4 - Seunghae Kim, Wonhyuk Lee, Hyuncheol Kim:
Network Stability Based on Node Weight. 1-3 - Alemu Molla, Yenewondim Biadgie, Kyung-Ah Sohn:
Network-Based Visualization of Opinion Mining and Sentiment Analysis on Twitter. 1-4 - Geetha Baskaran, Andrzej Bargiela, Rong Qu:
New Solution for a Benchmark Nurse Scheduling Problem Using Integer Programming. 1-4 - Ashok Sharma, Sangjae Nam, Cheong-Ghil Kim, Shin-Dug Kim:
Non-Volatile Unified Memory Page Management for Improving Performance. 1-4 - Rozanawati Darman, Norafida Ithnin:
Object Tracking Methods in Wireless Sensor Network: Network Structure Classification. 1-3 - Azhar Javed, Monis Akhlaq:
On the Approach of Static Feature Extraction in Trojans to Combat against Zero-Day Threats. 1-5 - Daejin Park, Meng Di Yin, Jeonghun Cho:
On-Chip Event Debugger (OCeD) with Automated Code Execution Engine for Control Flow Detection. 1-3 - Tan Loc Nguyen, Yonggwan Won:
Performance Comparison of Multilayer Neural Networks for Sleep Snoring Detection. 1-3 - Sohyun Koo, Se Jin Kwon, Sungsoo Kim, Tae-Sun Chung:
PLGC: Partial Linked GC for Datacenter. 1-3 - Selçuk Baktir:
Privacy Preserving Smart Grid Management in the Cloud. 1-4 - John Noel C. Victorino, Maria Regina Justina E. Estuar:
Profiling Flood Risk through Crowdsourced Flood Level Reports. 1-4 - Tipwimol Sooktip, Naruemon Wattanapongsakorn:
Pruning Algorithm for Multi-Objective Optimization with Decision Maker's Preferences of System Redundancy Allocation Problem. 1-4 - Yogiraj S. Jadhav, Baeho Lee, Jinsul Kim:
QoE Oriented Analysis for Video Quality Assessment. 1-4 - Marlene M. De Leon, Ma. Regina E. Estuar:
Rapid Application Development of Ebayanihan Patroller: A Crowdsourcing SMS Service and Web Visualization Disaster Reporting System. 1-4 - Jhoanna T. Isla, Ma. Regina E. Estuar:
Real-Time Visualization of Disaster Behavior. 1-4 - Youzheng Chen, Baozhong Cheng, Xiaoyan Zhang:
Research and Implementation of an IMS-Based AS/MRFC Model for IVR Services. 1-5 - Shamsiya Kudratova, Xiaoxia Huang, Khikmatullo Kudratov:
Risk Management & Assessment on Road Safety Concerns: Case of Road Rehabilitation Project. 1-4 - Takaaki Ishikawa, Je-Ho Park:
Rotation Invariant Detection Using Image Identifier. 1-3 - Amir Azodi, David Jaeger, Feng Cheng, Christoph Meinel:
Runtime Updatable and Dynamic Event Processing Using Embedded ECMAScript Engines. 1-4 - SungMoon Kwon, Hyunguk Yoo, Taeshik Shon, GunWoong Lee:
Scenario-Based Attack Route on Industrial Control System. 1-3 - Daejin Park, Meng Di Yin, Jeonghun Cho:
Secure Microcontroller with On-Chip Hierarchical Code Validator for Firmware Authentication. 1-3 - Sanghyun Park, Jiseung Nam, Jinsul Kim:
SLAN-Based Next Generation User-Customized Dynamic Interface Sharing for Smart Mobile Devices. 1-3 - Mohd Helmy Abd Wahab, Aeslina Abdul Kadir, Mohd Razali Md Tomari, Mohamad Hairol Jabbar:
Smart Recycle Bin: A Conceptual Approach of Smart Waste Management with Integrated Web Based System. 1-4 - Dong-dong Ma, Feng He:
Status Trend Evaluation Research on Development of Low Carbon Economy in Coal Enterprises. 1-4 - Vitruvius John D. Barayuga, William Emmanuel S. Yu:
Study of Packet Level UDP Performance of NAT44, NAT64 and IPv6 Using Iperf in the Context of IPv6 Migration. 1-6 - Seokcheol Lee, Yongmin Park, Hyunwoo Lim, Taeshik Shon:
Study on Analysis of Security Vulnerabilities and Countermeasures in ISO/IEC 15118 Based Electric Vehicle Charging Technology. 1-4 - Jung-Kyu Choi, Chan-Il Yoo, Kyung-Ah Kim, Yonggwan Won, Jung-Ja Kim:
Study on Datamining Techinique for Foot Disease Prediction. 1-4 - Panyam Narahari Sastry, Thirumala Vijaya Lakshmi, N. V. Koteswara Rao, T. V. Rajinikanth, Abdul Wahab:
Telugu Handwritten Character Recognition Using Zoning Features. 1-4 - Jiayang Sun, Cheng Feng, Donglin Wang, Meng Gu:
The Design of Two Versions of 3D Mouse. 1-5 - Hassan Almari, Clive Boughton:
The Five Factors Influencing Software Architecture Modeling and Evaluation Techniques. 1-8 - Jaeho Lee, Kyoungro Yoon:
Transportation Methods of Sensory Information Using Multimedia Packet. 1-4 - Xiaoxia Huang, Hao Di:
Uncertain Portfolio Selection with Background Risk. 1-3 - Dongwook Lee, Minsoo Hahn, Sangjun Park, Seunghyung Lee:
User Position Estimation and Visualization Using Power Consumption of Home Appliances. 1-4 - Maria Regina Justina E. Estuar, Marlene M. De Leon, Maria Dianne Santos, John Owen F. Ilagan, Barbara Anne May:
Validating UI through UX in the Context of a Mobile - Web Crowdsourcing Disaster Management Application. 1-4 - Dongwook Lee, Minsoo Hahn, Sangjun Park, Seunghyung Lee:
Virtual Environment Based Graphical User Interface for Authoring and Visualization System. 1-2 - Soojung Park, Bongsup Park:
Virtual Reality Exercise Simulator. 1-2 - Yogan Jaya Kumar, Ong Sing Goh, Mohd Khanapi Abd. Ghani, Naomie Salim, Ameer Tawfik Albaham:
Voting Models for Summary Extraction from Text Documents. 1-4 - Min-Hooi Chuah, Kee-Luen Wong:
Web Based Enterprise Business Intelligence Maturity (EBI2M) Assessment Tool. 1-3 - Dongwook Lee, Minsoo Hahn, Sangjun Park, Seunghyung Lee:
Web Based Visualization for Sports Data Pattern. 1-2 - Seung-Jae Yoo, Jeong-Mo Yang:
Web Login Vulnerability Analysis and Countermeasures. 1-4 - Trin Thi Thu Hah, Jin Young Kim, Seung Ho Choi:
White Matter Hyperintensities Extraction Based T2-FLAIR MRI Using Non-Local Means Filter and Nearest Neighbor Algorithm. 1-4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.