default search action
Smart Computing Review, Volume 2
Volume 2, Number 1, February 2012
- Amine Dhraief, Abdelfettah Belghith:
An Experimental Investigation of the Impact of Mobile IPv6 Handover on Transport Protocols. 1-17 - Chuho Yi, Seungdo Jeong, Jungwon Cho:
Map Representation for Robots. 18-27 - Ching-Hao Lai:
A Tripartite Edge Histogram Scheme for a License Plate Recognition System. 28-41 - Farah Jahan, Mohammad Khairul Islam, Joong-Hwan Baek:
Person Detection, Re-identification and Tracking Using Spatio-Color-based Model for Non-Overlapping Multi-Camera Surveillance Systems. 42-59 - Mohd Kamir Yusof, Ahmad Faisal Amri Abidin, Mat Atar Mat Amin:
An Architecture for Securing a Private Instant Messenger. 60-70 - Asvhini a/p Subramaniam, Junaid Ahsenali Chaudhry, Mudassar Ahmad:
A Study on Elliptic Curve Digital Signature Algorithm (ECDSA) for Reliable E-Commerce Applications. 71-78 - Armaghan Behnia, Rafhana Abd Rashid, Junaid Ahsenali Chaudhry:
A Survey of Information Security Risk Analysis Methods. 79-94
Volume 2, Number 2, April 2012
- L. Boroumand, Rashid Hafeez Khokhar, Leily A. Bakhtiar, Mehran Pourvahab:
A Review of Techniques to Resolve the Hidden Node Problem in Wireless Networks. 95-110 - Javier Carmona-Murillo, José Luis González Sánchez, Francisco J. Rodríguez-Pérez, David Cortés-Polo:
Localized Mobility Management in MPLS based Access Networks. 111-124 - Kuk-Hyun Cho, Min-Woo Ryu:
A Survey of Greedy Routing Protocols for Vehicular Ad Hoc Networks. 125-137 - Muhammad Tahir, Muhammad Arshad Awan, Aniqa Hafeez, Mohsin Yazdanie, Sheikh Ziauddin:
Interactive Slide Navigation: An Approach for Manipulation Slides with Augmented Reality Markers. 138-148 - Dongwan Shin, Rodrigo Lopes, Seok-Woo Jang:
An Efficient Scheme for User-controlled Attribute Sharing in Federated Identity. 149-162 - Mohd Kamir Yusof, Nor Surayati Mohamad Usop, Ahmad Faisal Amri Abidin:
A Secure and Reliable Chat Room Application via Embedded Chaotic Encryption. 163-170 - Anatoliy O. Melnyk, Inna Iakovlieva:
OCA-Graphical System for Algorithm Structure Analysis and Processing. 171-184
Volume 2, Number 3, June 2012
- Sang-Min Lim:
Implementation of Intelligent Preferred Goods Recommendation System using Customer Profiles and Interest Measurments based on RFID. 185-194 - Min-Woo Ryu, Jaeho Kim, Sang-Shin Lee, Min-Hwan Song:
Survey on Internet of Things: Toward Case Study. 195-202 - Chun-Kai Chen:
Energy Consumption Analysis and Algorithms Based on Energy Efficiency for Cooperative Networks. 203-210 - Yong-Hoon Jung, Jeong-Hyo Park, Kwang-Hyung Lee:
Convenient Move of Digital Content Using RFID in Home Networks. 211-219 - Enzhan Zhang, Yujun Kuang, Jerry John Kponyo:
A Time and Area Limited Epidemic Forwarding Method for Alleviating Vehicular Traffic Congestion. 220-230 - Tae-Sub Chung:
A Study of Immersive Display Technologies. 231-239 - Weiguo Yuan, Yun Liu, JingJing Yang:
Empirical Analysis of User Interaction Behavior in Microblogging. 240-253
Volume 2, Number 4, August 2012
- Myoung-Kwan Oh:
An RFID-based System for Tracking Shopping Location and Moving Lines. 254-261 - Jong-Cheon Park:
Mechanism of Character Region Detection Using Structural Features of Hangul Vowels. 262-268 - Il Ho Park:
Implementation of a PC Security System using RF Transmitter-Receivers. 269-277 - Jaiganesh M., A. Vincent Antony Kumar:
SOV2C2: Secure Orthogonal View of Virtualization in Cloud Computing. 278-285 - Chanik Park, Min-Woo Ryu, Kuk-Hyun Cho:
Survey of MAC Protocols for Vehicular Ad Hoc Networks. 286-295 - Sou-Young Jin, Young-Seob Jeong, Chankyu Park, KyoJoong Oh, Ho-Jin Choi:
An Intelligent Multi-Sensor Surveillance System for Elderly Care. 296-307
Volume 2, Number 5, October 2012
- Debajyoti Mukhopadhyay, Saurabh Deochake, Shashank Kanth, Subhadip Chakraborty, Suresh Sarode:
MAINWAVE: Multi Agents and Issues Negotiation for Web using Alliance Virtual Engine. 308-317 - Walter Foreman, Soojeong Lee, Myeongseok Ko, Sangchul Bae, Sanghoon Han:
Effects of an educational game with a situated learning strategy on Korean students' English writing abilities. 318-326 - Obeten O. Ekabua, Ifeoma U. Ohaeri:
Design and Implementation of Intrusion Detection and Response Model to Enhance Security in Cognitive Radio Networks. 327-338 - Ali Ziya Alkar, John Sefik Roach:
A Load Balancing Protocol for IP Based Pervasive Networks. 339-348 - Bo Mao, Jie Cao, Zhiang Wu:
Web-based Visualization of Generalized 3D City Models using HTML5 and X3DOM. 349-359 - Nguyen Duy Tan, Longzhe Han, Nguyen Dinh Viet, Minho Jo:
An Improved LEACH Routing Protocol for Energy-Efficiency of Wireless Sensor Networks. 360-369 - Sami S. Al-Wakeel, Musaed A. Alhussein, Muhammad Ammad-uddin:
Performance analysis of Centralized, Distributed and Hybrid Demand Load Control architecture for Smart power Grid. 370-378
Volume 2, Number 6, December 2012
- S. Sridevi Sathya Priya, P. Karthigaikumar, N. M. Siva Mangai, P. T. Vanathi:
Survey on Efficient, Low-power, AES Image Encryption and Bio-cryptography Schemes. 379-390 - Farhan Aadil, Zeshan Iqbal, Adeel Akram:
Implementation of VANET-based Warning Generation System using Cellular Networks, GPS, and Passive RFID Tags. 391-399 - Tsui-Ping Chang:
Fast Discovery of Frequent Itemsets through Clustering and Decomposition. 400-411 - Si-Young No, Jong Chan Lee:
Forensic Mechanism for Data Integrity. 412-419 - Gi Sung Lee:
Method for Collecting Context Information in Mobile Communication Networks. 420-427 - Ashok Kumar P. S., Gopal Krishna C.:
A Pragmatic Approach of CRUD in Dynamic Composition of Web Services. 428-440
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.