3. ICUIMC 2009:
Suwon,
Korea
Won Kim, Hyung-Jin Choi, Dongho Won (Eds.):
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009.
ACM 2009, ISBN 978-1-60558-405-8
Wireless LAN and mesh networks
Data search I
Telecommunication networks
- Qing Li, An Liu, Hai Liu, Baoping Lin, Liusheng Huang, Naijie Gu:
Web services provision: solutions, challenges and opportunities (invited paper).
80-87
- Li-Hua Li, Fu-Ming Lee, Yu-Chun Chen, Chieh-Yu Cheng:
A multi-stage collaborative filtering approach for mobile recommendation.
88-97
- Djelloul Boukhelef, Hiroyuki Kitagawa:
Dynamic load balancing in RCAN content addressable network.
98-106
- Kai Liu, Victor C. S. Lee:
COS: client oriented scheduling for multi-channel on-demand broadcast.
107-114
Data search II
- Akiko Hino, Katsumi Tanaka:
Small knowledge: a concept of enhanced bookmarks with personal context.
115-122
- Akira Takahashi, Masashi Tatedoko, Hiroko Kinutani, Masatoshi Yoshikawa:
Metadata management for integration and analysis of earth observation data.
123-130
- Ken C. K. Lee, Wang-Chien Lee, Hong Va Leong, Brandon Unger, Baihua Zheng:
Efficient valid scope computation for location-dependent spatial queries in mobile and wireless environments.
131-140
- Xinzhong Zhu, Jianmin Zhao, Jie Yuan, Huiying Xu:
A fuzzy quantization approach to image retrieval based on color and texture.
141-149
Systems and applicataions I
Ad-hoc networks
Security I
- Wen-Ya Chiang, Shiuh-Jeng Wang, Chi-Yao Weng, Cheng-Hsing Yang:
Robustness-set in watermarking embedding systems using codebook classifications.
207-215
- Chu-Hsing Lin, Fuu-Cheng Jiang, Wei-Shen Lai, Wei-Yuah Lee, Wei-Cheng Hsu:
Counteract SYN flooding using second chance packet filtering.
216-220
- Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho:
Secure RFID authentication scheme for EPC class Gen2.
221-227
- Chin-Feng Lee, Kuo-Hua Wang, Chin-Chen Chang, Yu-Lin Huang:
A reversible data hiding scheme based on dual steganographic images.
228-237
- Rung Ching Chen, Chia-Fen Hsieh, Yung-Fa Huang:
A new method for intrusion detection on hierarchical wireless sensor networks.
238-245
- Chi-Shiang Chan, Ching-Yun Chang:
An information hiding scheme by applying the dynamic programming strategy to LSB matching revisited.
246-250
- Hsing-Bai Chen, Wei-Bin Lee, Yong-Hong Zhao, Yin-Long Chen:
Enhancement of the RFID security method with ownership transfer.
251-254
- Kyu Il Kim, Won Gil Choi, Eun-Ju Lee, Ung-Mo Kim:
RBAC-based access control for privacy protection in pervasive environments.
255-259
Communication technologies
- Mong-Fong Horng, Yau-Hwang Kuo, Liang-Chien Huang, Yi-Ting Chien:
An effective approach to adaptive bandwidth allocation with QoS enhanced on IP networks.
260-264
- Dahae Chong, Sangho Ahn, Youngpo Lee, Seokho Yoon:
New synchronization schemes for UWB systems.
265-271
- Eun Cheol Kim, Jin Young Kim:
Performance of double binary turbo coded UWB systems with antenna diversity.
272-277
- Choongyong Shin, Jinsung Cho:
A preliminary study on common radio resource management in heterogeneous wireless networks.
278-282
- Jae Sung Park, Jin Young Kim:
Performance analysis of STBC-UWB systems with double binary turbo code.
283-289
- Eun-Ae Cho, Chang-Joo Moon, Hyun-Soo Im, Doo-Kwon Baik:
An anonymous communication model for privacy-enhanced location based service using an echo agent.
290-297
- Kwang-Chun Go, Jae-Hyun Kim, Seong-Hwan Oh, Kyeong-Deok Moon, Kwang-Il Lee:
Resource allocation algorithm considering a priority of service classes for WiMedia UWB system.
298-301
- Jae Hee Han, Myung Hoon Sunwoo:
Simplified sum-product algorithm using piecewise linear function approximation for low complexity LDPC decoding.
302-308
Security II
Intelligent systems
Systems and applications II
Systems and applicataions III
- Hai Jin, Guofu Xiang, Feng Zhao, Deqing Zou, Min Li, Lei Shi:
VMFence: a customized intrusion prevention system in distributed virtual computing environment.
391-399
- Keisuke Takemori, Masahiko Fujinaga, Toshiya Sayama, Masakatsu Nishigaki:
Host-based traceback; tracking bot and C&C server.
400-405
- Yuko Kamiya, Toshihiko Shimokawa, Norihiko Yoshida:
Scalable server system based on virtual machine duplication in wide area.
406-410
- Chang-Yu Wang, Tsair-Fwu Lee, Chun-Hsiung Fang:
A multimodality image registration framework for synchronous visualization of radiotherapy plans with longitudinal imaging studies.
411-415
- Brian J. d'Auriol, Yu Niu, Sungyoung Lee, Young-Koo Lee:
The plasma free space optical model for ubiquitous systems.
416-425
Data analysis and mining I
- Jieh-Shan Yeh, Szu-Chen Lin:
A new data structure for asynchronous periodic pattern mining.
426-431
- Tomomi Miyazaki, Toshiki Watanabe, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:
Keyword search considering user's preference in P2P networks.
432-440
- Hiroaki Ohshima, Katsumi Tanaka:
Real time extraction of related terms by bi-directional lexico-syntactic patterns from the web.
441-449
- Ok-Ran Jeong, Sang-Won Lee:
An efficient clustering framework for relevant web information.
450-456
- Hideyuki Ohtani, Takuya Kida, Takeaki Uno, Hiroki Arimura:
Efficient serial episode mining with minimal occurrences.
457-464
- Kenta Oku, Shinsuke Nakajima, Jun Miyazaki, Shunsuke Uemura, Hirokazu Kato:
A recommendation method considering users' time series contexts.
465-470
- Imam Machdi, Toshiyuki Amagasa, Hiroyuki Kitagawa:
XML data partitioning strategies to improve parallelism in parallel holistic twig joins.
471-480
Signal processing & OFDM
- Kwang Yoon Kim, Jin Young Kim:
Cyclic delay diversity for V-BLAST OFDM system.
481-487
- Kyung Hoon Won, Jung-Su Han, Hyung-Jin Choi, BonYoung Koo:
Noise insensitive sampling frequency offset estimation methods for DVB-T/H systems.
488-493
- Youngyoon Lee, Taeung Yoon, Sanghun Kim, Seokho Yoon:
New schemes of carrier frequency offset estimation for DVB systems.
494-498
- Myung-Jin Chung, Jung-Su Han, Hyung-Jin Choi, Seok-Joong Kim:
An enhanced ECCM method using OFCDM in WiBro system.
499-503
- Sang-Hun Yoon, Jin-Doo Jeong, Jong-Wha Chong:
An area reduction method for digital filter using redundancy of SD number system.
504-508
- Yeong-Sam Kim, Jong-Wha Chong:
A new filtering method for chirp spread spectrum.
509-512
- JaeHwan Kim, SungHwan Park, JongWha Chong:
Peak power control algorithm for multi-processor SoC.
513-515
Systems and applications IV
- Soichiro Tokuhisa, Kunihiko Kaneko:
Representative slice method for viscous fluid registration of three-dimensional whole-body human images.
516-523
- Zeng-Wei Hong, Kai-Yi Chin, Jim-Min Lin:
Developing embodied agent-based user interface by using interactive drama markup language.
524-528
- Takanori Ueda, Yu Hirate, Hayato Yamana:
Exploiting idle CPU cores to improve file access performance.
529-535
- Daisuke Kitayama, Ryong Lee, Kazutoshi Sumiya:
A credibility analyzing method of geographical objects from digital maps.
536-543
- Long-Sheng Chen, Chun-Chin Hsu, Yu-Shan Chang:
MDS: a novel method for class imbalance learning.
544-549
- Yu-lung Lo, Ling-yi Tsai:
Real-valued feature indexing for music databases.
550-556
Sensor networks
- Gicheol Wang, Deokjai Choi, Daewook Kang:
A lightweight key renewal scheme for clustered sensor networks.
557-565
- Yuichi Sei, Shinichi Honiden:
Reporter node determination of replicated node detection in wireless sensor networks.
566-573
- Ji-Wook Kwon, Mun-Soo Park, Dongkyoung Chwa:
Localization of the mobile agent using indirect Kalman filter in distributed sensor networks.
574-579
- Soo Young Moon, Tae Ho Cho:
Energy efficient filtering method in sensor networks.
580-585
- Jaekwang Kim, KwangHo Yoon, Seunghoon Lee, Je-hee Jung, Jee-Hyong Lee:
An m-EVBT algorithm for energy efficient routing in wireless sensor networks.
586-591
- YongHwan Kim, SungSoo Kim, SeongJoon Lee, KwangSeon Ahn:
An anti-collision algorithm without idle cycle using 4-ary tree in RFID system.
592-596
- Sang Jin Lee, Hae Young Lee, Tae Ho Cho:
Adaptive threshold determination method for the dynamic filtering in wireless sensor networks using fuzzy logic.
597-601
- Riaz Ahmed Shaikh, Young-Koo Lee, Sungyoung Lee:
Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks.
602-606
Systems and applicataions V
- Jaekyong Jeong, Chijung Hwang, Byeungwoo Jeon:
An efficient method of image identification by combining image features.
607-611
- Heejin Kim, Byoungju Choi, Seokjin Yoon:
Performance testing based on test-driven development for mobile applications.
612-617
- Mohammad Mehedi Hassan, Biao Song, Eui-nam Huh:
A framework of sensor-cloud integration opportunities and challenges.
618-626
- Moonju Park, Hong Jin Yoo, Jinseok Chae:
Analysis on quantum-based fixed priority scheduling of real-time tasks.
627-634
- Jihyun Kim, Yujung Jung, Yoonsun Lim, Myung Kim, Sunsook Noh:
An e-learning framework supporting personalization and collaboration.
635-638
- Eunyoung Cheon, JoongHo Ahn:
Virtual community 101: know your virtual community and members.
639-643
Data analysis and mining II
- Myungha Jang, Arang Rhie, Jiyoung Whang, Sanduk Yang, Hyun S. Park:
A statistical analysis of relation degree of compound pair on online biological pathway databases.
644-649
- Jaeseok Myung, Jung-Yeon Yang, Sang-goo Lee:
PicAChoo: a tool for customizable feature extraction utilizing characteristics of textual data.
650-655
- Chowdhury Farhan Ahmed, Syed Khairuzzaman Tanbeer, Byeong-Soo Jeong, Young-Koo Lee:
Mining high utility patterns in incremental databases.
656-663
- Minsoo Lee, Yoonkyoung Lee, Boyeon Meang, Okju Choi:
A clustering algorithm using particle swarm optimization for DNA chip data analysis.
664-668
- Donghai Guan, Young-Koo Lee, Sungyoung Lee:
Activity recognition with the aid of unlabeled samples.
670-674
Copyright © Tue Mar 16 02:14:18 2010
by Michael Ley (ley@uni-trier.de)