callback( { "result":{ "query":":facetid:toc:\"db/conf/npc/npc2012.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"78.11" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"76", "@dc":"76", "@oc":"76", "@id":"43404716", "text":":facetid:toc:db/conf/npc/npc2012.bht" } }, "hits":{ "@total":"76", "@computed":"76", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"4477177", "info":{"authors":{"author":[{"@pid":"354/7015-4","text":"Muhammad Ahmed 0004"},{"@pid":"00/2922-1","text":"Xu Huang 0001"},{"@pid":"18/3371-1","text":"Dharmendra Sharma 0001"}]},"title":"Dempster-Shafer Theory to Identify Insider Attacker in Wireless Sensor Network.","venue":"NPC","pages":"94-100","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/AhmedHS12","doi":"10.1007/978-3-642-35606-3_11","ee":"https://doi.org/10.1007/978-3-642-35606-3_11","url":"https://dblp.org/rec/conf/npc/AhmedHS12"}, "url":"URL#4477177" }, { "@score":"1", "@id":"4477178", "info":{"authors":{"author":[{"@pid":"48/474","text":"Yunji Chen"},{"@pid":"60/419-2","text":"Tianshi Chen 0002"},{"@pid":"67/398-1","text":"Qi Guo 0001"},{"@pid":"262/0620-2","text":"Zhiwei Xu 0002"},{"@pid":"64/5666-8","text":"Lei Zhang 0008"}]},"title":"An Elastic Architecture Adaptable to Millions of Application Scenarios.","venue":"NPC","pages":"188-195","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/ChenCGXZ12","doi":"10.1007/978-3-642-35606-3_22","ee":"https://doi.org/10.1007/978-3-642-35606-3_22","url":"https://dblp.org/rec/conf/npc/ChenCGXZ12"}, "url":"URL#4477178" }, { "@score":"1", "@id":"4477179", "info":{"authors":{"author":[{"@pid":"28/7034","text":"Hsing-Chung Chen"},{"@pid":"39/9354","text":"Jai-Zong Sun"},{"@pid":"67/4408","text":"Shian-Shyong Tseng"},{"@pid":"85/4513","text":"Chien-Erh Weng"}]},"title":"A New Approach for Detecting SMTPFA Based on Entropy Measurement.","venue":"NPC","pages":"349-359","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/ChenSTW12","doi":"10.1007/978-3-642-35606-3_41","ee":"https://doi.org/10.1007/978-3-642-35606-3_41","url":"https://dblp.org/rec/conf/npc/ChenSTW12"}, "url":"URL#4477179" }, { "@score":"1", "@id":"4477180", "info":{"authors":{"author":[{"@pid":"52/1483","text":"Bo-Chao Cheng"},{"@pid":"40/460","text":"Guo-Tan Liao"},{"@pid":"125/6499","text":"Ching-Kai Lin"},{"@pid":"50/3001","text":"Shih-Chun Hsu"},{"@pid":"24/5498","text":"Ping-Hai Hsu"},{"@pid":"p/JongHyukPark","text":"Jong Hyuk Park"}]},"title":"MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis.","venue":"NPC","pages":"101-109","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/ChengLLHHP12","doi":"10.1007/978-3-642-35606-3_12","ee":"https://doi.org/10.1007/978-3-642-35606-3_12","url":"https://dblp.org/rec/conf/npc/ChengLLHHP12"}, "url":"URL#4477180" }, { "@score":"1", "@id":"4477181", "info":{"authors":{"author":[{"@pid":"147/9002","text":"Li-Jia Chiu"},{"@pid":"147/8968","text":"Neng-Tang Norman Huang"}]},"title":"The Difference Analysis between Demographic Variables and Personal Attributes - The Case of Internal Auditors in Taiwan.","venue":"NPC","pages":"394-400","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/ChiuH12","doi":"10.1007/978-3-642-35606-3_46","ee":"https://doi.org/10.1007/978-3-642-35606-3_46","url":"https://dblp.org/rec/conf/npc/ChiuH12"}, "url":"URL#4477181" }, { "@score":"1", "@id":"4477182", "info":{"authors":{"author":[{"@pid":"02/129","text":"Ralph Duncan"},{"@pid":"25/6944","text":"Peder Jungck"},{"@pid":"55/8174","text":"Kenneth Ross"},{"@pid":"147/9008","text":"Dwight Mulcahy"}]},"title":"Reference Variables for Dynamic, Reliable Packet Operations.","venue":"NPC","pages":"48-60","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/DuncanJRM12","doi":"10.1007/978-3-642-35606-3_6","ee":"https://doi.org/10.1007/978-3-642-35606-3_6","url":"https://dblp.org/rec/conf/npc/DuncanJRM12"}, "url":"URL#4477182" }, { "@score":"1", "@id":"4477183", "info":{"authors":{"author":[{"@pid":"118/6818","text":"Le The Dung"},{"@pid":"57/497","text":"Beongku An"}]},"title":"A Location-Based Algorithm for Supporting Multicast Routing in Mobile Ad-Hoc Networks.","venue":"NPC","pages":"542-549","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/DungA12","doi":"10.1007/978-3-642-35606-3_64","ee":"https://doi.org/10.1007/978-3-642-35606-3_64","url":"https://dblp.org/rec/conf/npc/DungA12"}, "url":"URL#4477183" }, { "@score":"1", "@id":"4477184", "info":{"authors":{"author":[{"@pid":"17/1152","text":"Wei Feng"},{"@pid":"35/295","text":"Jian Liu"},{"@pid":"c/JiannongCao","text":"Jiannong Cao 0001"},{"@pid":"05/3933","text":"Liang Yang"},{"@pid":"99/6285-1","text":"Qin Xin 0001"}]},"title":"Estimating Available Bandwidth in Cooperative Multi-hop Wireless Networks.","venue":"NPC","pages":"225-232","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/FengLCYX12","doi":"10.1007/978-3-642-35606-3_26","ee":"https://doi.org/10.1007/978-3-642-35606-3_26","url":"https://dblp.org/rec/conf/npc/FengLCYX12"}, "url":"URL#4477184" }, { "@score":"1", "@id":"4477185", "info":{"authors":{"author":[{"@pid":"57/4436","text":"YouSik Hong"},{"@pid":"61/10172","text":"Hongkyun Kim"},{"@pid":"69/2139","text":"Cheonshik Kim"},{"@pid":"82/129","text":"Geuk Lee"}]},"title":"New Electronic Acupuncture System Using Intelligence.","venue":"NPC","pages":"524-531","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/HongKKL12","doi":"10.1007/978-3-642-35606-3_62","ee":"https://doi.org/10.1007/978-3-642-35606-3_62","url":"https://dblp.org/rec/conf/npc/HongKKL12"}, "url":"URL#4477185" }, { "@score":"1", "@id":"4477186", "info":{"authors":{"author":[{"@pid":"64/8390","text":"Wen-Hsu Hsiao"},{"@pid":"27/2053","text":"Hui-Kai Su"},{"@pid":"147/8925","text":"Yu-Siang Wei"},{"@pid":"147/8980","text":"Wei-Sheng Ho"},{"@pid":"44/5040","text":"Kim-Joan Chen"}]},"title":"A Study of SLA-Based Defense Resource Management Strategy in Network Security Defense System.","venue":"NPC","pages":"336-348","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/HsiaoSWHC12","doi":"10.1007/978-3-642-35606-3_40","ee":"https://doi.org/10.1007/978-3-642-35606-3_40","url":"https://dblp.org/rec/conf/npc/HsiaoSWHC12"}, "url":"URL#4477186" }, { "@score":"1", "@id":"4477187", "info":{"authors":{"author":[{"@pid":"98/3522","text":"Phan Trung Huy"},{"@pid":"91/8238","text":"Nguyen Hai Thanh"},{"@pid":"147/9035","text":"Cheonsick Kim"}]},"title":"Relationship between Correcting Code and Module Technique in Hiding Secret Data.","venue":"NPC","pages":"297-307","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/HuyTK12","doi":"10.1007/978-3-642-35606-3_35","ee":"https://doi.org/10.1007/978-3-642-35606-3_35","url":"https://dblp.org/rec/conf/npc/HuyTK12"}, "url":"URL#4477187" }, { "@score":"1", "@id":"4477188", "info":{"authors":{"author":{"@pid":"71/3213","text":"Kyu-Sung Hwang"}},"title":"SNR-Based Partial Relay Selection Scheme over Multiple Relay Network.","venue":"NPC","pages":"608-615","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/Hwang12","doi":"10.1007/978-3-642-35606-3_72","ee":"https://doi.org/10.1007/978-3-642-35606-3_72","url":"https://dblp.org/rec/conf/npc/Hwang12"}, "url":"URL#4477188" }, { "@score":"1", "@id":"4477189", "info":{"authors":{"author":[{"@pid":"134/6763","text":"Jianbin Jia"},{"@pid":"66/2378","text":"Yingwen Chen"},{"@pid":"43/3362-2","text":"Ming Xu 0002"}]},"title":"An Empirical View on Opportunistic Forwarding Relay Selection Using Contact Records.","venue":"NPC","pages":"256-263","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/JiaCX12","doi":"10.1007/978-3-642-35606-3_30","ee":"https://doi.org/10.1007/978-3-642-35606-3_30","url":"https://dblp.org/rec/conf/npc/JiaCX12"}, "url":"URL#4477189" }, { "@score":"1", "@id":"4477190", "info":{"authors":{"author":[{"@pid":"13/762","text":"Haitao Jiang"},{"@pid":"11/1627","text":"Yun Xu"},{"@pid":"120/1800","text":"Yin Liao"},{"@pid":"97/10036","text":"Guojie Jin"},{"@pid":"14/2048-1","text":"Guoliang Chen 0001"}]},"title":"UKCF: A New Graphics Driver Cross-Platform Translation Framework for Virtual Machines.","venue":"NPC","pages":"156-163","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/JiangXLJC12","doi":"10.1007/978-3-642-35606-3_18","ee":"https://doi.org/10.1007/978-3-642-35606-3_18","url":"https://dblp.org/rec/conf/npc/JiangXLJC12"}, "url":"URL#4477190" }, { "@score":"1", "@id":"4477191", "info":{"authors":{"author":[{"@pid":"147/8930","text":"Mouna Karmani"},{"@pid":"147/8918","text":"Chiraz Khedhiri"},{"@pid":"147/8950","text":"Belgacem Hamdi"},{"@pid":"41/923","text":"Amir-Mohammad Rahmani"},{"@pid":"m/KaLokMan","text":"Ka Lok Man"},{"@pid":"76/1847","text":"Kaiyu Wan"}]},"title":"Design of a Reliable XOR-XNOR Circuit for Arithmetic Logic Units.","venue":"NPC","pages":"516-523","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/KarmaniKHRMW12","doi":"10.1007/978-3-642-35606-3_61","ee":"https://doi.org/10.1007/978-3-642-35606-3_61","url":"https://dblp.org/rec/conf/npc/KarmaniKHRMW12"}, "url":"URL#4477191" }, { "@score":"1", "@id":"4477192", "info":{"authors":{"author":[{"@pid":"75/10660","text":"Imtiaz Ahmed Khan"},{"@pid":"73/7561","text":"Nam-Yeol Yun"},{"@pid":"58/2015","text":"Soo-Hyun Park"}]},"title":"Nibble-CRC for Underwater Acoustic Communication.","venue":"NPC","pages":"550-558","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/KhanYP12","doi":"10.1007/978-3-642-35606-3_65","ee":"https://doi.org/10.1007/978-3-642-35606-3_65","url":"https://dblp.org/rec/conf/npc/KhanYP12"}, "url":"URL#4477192" }, { "@score":"1", "@id":"4477193", "info":{"authors":{"author":[{"@pid":"43/934","text":"Do-Hoon Kim"},{"@pid":"56/8195","text":"Jungwook Wee"},{"@pid":"71/3213","text":"Kyu-Sung Hwang"}]},"title":"A Novel Time Reversal-Least Sidelobe Scheme to Minimize ISI and MUI.","venue":"NPC","pages":"599-607","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/KimWH12","doi":"10.1007/978-3-642-35606-3_71","ee":"https://doi.org/10.1007/978-3-642-35606-3_71","url":"https://dblp.org/rec/conf/npc/KimWH12"}, "url":"URL#4477193" }, { "@score":"1", "@id":"4477194", "info":{"authors":{"author":[{"@pid":"26/10595","text":"Hae-Jung Kim"},{"@pid":"08/7017","text":"Eun-Jun Yoon"}]},"title":"Cryptanalysis of Goriparthi et al.'s Bilinear Pairing Based Remote User Authentication Scheme.","venue":"NPC","pages":"581-588","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/KimY12","doi":"10.1007/978-3-642-35606-3_69","ee":"https://doi.org/10.1007/978-3-642-35606-3_69","url":"https://dblp.org/rec/conf/npc/KimY12"}, "url":"URL#4477194" }, { "@score":"1", "@id":"4477195", "info":{"authors":{"author":{"@pid":"147/8983","text":"Hui-Min Ko"}},"title":"Soft Power: A Critical Factor for the Effectiveness and Development of a School.","venue":"NPC","pages":"414-420","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/Ko12","doi":"10.1007/978-3-642-35606-3_49","ee":"https://doi.org/10.1007/978-3-642-35606-3_49","url":"https://dblp.org/rec/conf/npc/Ko12"}, "url":"URL#4477195" }, { "@score":"1", "@id":"4477196", "info":{"authors":{"author":[{"@pid":"147/8941","text":"R. Krishnaveni"},{"@pid":"59/6650","text":"Chenniappan Chellappan"},{"@pid":"60/9766","text":"Ranaganayakulu Dhanalakshmi"}]},"title":"Hybrid Obfuscated Javascript Strength Analysis System for Detection of Malicious Websites.","venue":"NPC","pages":"129-137","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/KrishnaveniCD12","doi":"10.1007/978-3-642-35606-3_15","ee":"https://doi.org/10.1007/978-3-642-35606-3_15","url":"https://dblp.org/rec/conf/npc/KrishnaveniCD12"}, "url":"URL#4477196" }, { "@score":"1", "@id":"4477197", "info":{"authors":{"author":{"@pid":"147/8994","text":"Shiang-Lan Kuo"}},"title":"Cross-Cultural Training Programs and Expatriate Adjustment Effectiveness.","venue":"NPC","pages":"409-413","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/Kuo12","doi":"10.1007/978-3-642-35606-3_48","ee":"https://doi.org/10.1007/978-3-642-35606-3_48","url":"https://dblp.org/rec/conf/npc/Kuo12"}, "url":"URL#4477197" }, { "@score":"1", "@id":"4477198", "info":{"authors":{"author":{"@pid":"47/1871","text":"Yoonsik Kwak"}},"title":"Implementation of the Integrated Monitoring System Based on an Automatic Disaster Prevention Device.","venue":"NPC","pages":"273-278","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/Kwak12","doi":"10.1007/978-3-642-35606-3_32","ee":"https://doi.org/10.1007/978-3-642-35606-3_32","url":"https://dblp.org/rec/conf/npc/Kwak12"}, "url":"URL#4477198" }, { "@score":"1", "@id":"4477199", "info":{"authors":{"author":[{"@pid":"69/7631","text":"Youngsik Kwak"},{"@pid":"88/10586","text":"YoonJung Nam"}]},"title":"The Day-of-the Week Effects for Cloud-Based Shipment Timing Support System for Stored Apples.","venue":"NPC","pages":"248-255","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/KwakN12","doi":"10.1007/978-3-642-35606-3_29","ee":"https://doi.org/10.1007/978-3-642-35606-3_29","url":"https://dblp.org/rec/conf/npc/KwakN12"}, "url":"URL#4477199" }, { "@score":"1", "@id":"4477200", "info":{"authors":{"author":[{"@pid":"81/6346","text":"Hyeog-In Kwon"},{"@pid":"147/8978","text":"Hi-Yeob Joo"},{"@pid":"76/2468","text":"Dae-Jin Kim"},{"@pid":"137/1527","text":"Jong-Seok Park"}]},"title":"The Development of Sustainable Growth Strategy Model Based on the User Tendency in the Online Game Services.","venue":"NPC","pages":"315-319","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/KwonJKP12","doi":"10.1007/978-3-642-35606-3_37","ee":"https://doi.org/10.1007/978-3-642-35606-3_37","url":"https://dblp.org/rec/conf/npc/KwonJKP12"}, "url":"URL#4477200" }, { "@score":"1", "@id":"4477201", "info":{"authors":{"author":{"@pid":"46/985","text":"Jae-Young Lee"}},"title":"A Scoring System for Short Answers on the Test in a Large Group.","venue":"NPC","pages":"42-47","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/Lee12","doi":"10.1007/978-3-642-35606-3_5","ee":"https://doi.org/10.1007/978-3-642-35606-3_5","url":"https://dblp.org/rec/conf/npc/Lee12"}, "url":"URL#4477201" }, { "@score":"1", "@id":"4477202", "info":{"authors":{"author":{"@pid":"147/8955","text":"Sooill Lee"}},"title":"Design of the Cognitive Information Display for Water Level Control of the Steam Generator in Korean Nuclear Power Reactor.","venue":"NPC","pages":"636-644","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/Lee12a","doi":"10.1007/978-3-642-35606-3_75","ee":"https://doi.org/10.1007/978-3-642-35606-3_75","url":"https://dblp.org/rec/conf/npc/Lee12a"}, "url":"URL#4477202" }, { "@score":"1", "@id":"4477203", "info":{"authors":{"author":[{"@pid":"50/11071","text":"Woo-Sik Lee 0001"},{"@pid":"52/5595","text":"Min Choi"},{"@pid":"11/3952","text":"Namgi Kim"}]},"title":"Different Characteristics of Radio Modules in Wireless Body Sensor Network Systems.","venue":"NPC","pages":"308-314","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/LeeCK12","doi":"10.1007/978-3-642-35606-3_36","ee":"https://doi.org/10.1007/978-3-642-35606-3_36","url":"https://dblp.org/rec/conf/npc/LeeCK12"}, "url":"URL#4477203" }, { "@score":"1", "@id":"4477204", "info":{"authors":{"author":[{"@pid":"21/7164","text":"Sangyong Lee"},{"@pid":"69/2139","text":"Cheonshik Kim"},{"@pid":"32/6572","text":"Seongah Chin"}]},"title":"An Optimized Sub-texture Mapping Technique for an Arbitrary Texture Considering Topology Relations.","venue":"NPC","pages":"559-564","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/LeeKC12","doi":"10.1007/978-3-642-35606-3_66","ee":"https://doi.org/10.1007/978-3-642-35606-3_66","url":"https://dblp.org/rec/conf/npc/LeeKC12"}, "url":"URL#4477204" }, { "@score":"1", "@id":"4477205", "info":{"authors":{"author":[{"@pid":"147/8986","text":"Boo-Hyoung Lee"},{"@pid":"02/4439","text":"Chi-Su Kim"},{"@pid":"147/8942","text":"Heon-Tag Kong"}]},"title":"Relative Priority Analysis of Korean IS Audit Standard Check Items Using the Constant-Sum Method.","venue":"NPC","pages":"233-240","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/LeeKK12","doi":"10.1007/978-3-642-35606-3_27","ee":"https://doi.org/10.1007/978-3-642-35606-3_27","url":"https://dblp.org/rec/conf/npc/LeeKK12"}, "url":"URL#4477205" }, { "@score":"1", "@id":"4477206", "info":{"authors":{"author":[{"@pid":"60/6955","text":"HyunJu Lee"},{"@pid":"86/2584","text":"Taehyun Kim"},{"@pid":"57/2855","text":"Dongkyoo Shin"},{"@pid":"147/8949","text":"HeeWon Park"},{"@pid":"01/7293","text":"Soohan Kim"},{"@pid":"85/2364","text":"Dongil Shin"}]},"title":"Research on a Smart Input Device Using Multimodal Bio-signal Interface.","venue":"NPC","pages":"565-574","year":"2012","type":"Conference and Workshop Papers","access":"open","key":"conf/npc/LeeKSPKS12","doi":"10.1007/978-3-642-35606-3_67","ee":"https://doi.org/10.1007/978-3-642-35606-3_67","url":"https://dblp.org/rec/conf/npc/LeeKSPKS12"}, "url":"URL#4477206" } ] } } } )