


default search action
2. IEEE-CSA 2009: Jeju Island, Korea
- Proceedings of the 2nd International Conference on Computer Science and its Applications, CSA 2009, Jeju Island, Korea, December 10-12, 2009. IEEE 2009, ISBN 978-1-4244-4945-3

Multimedia system and networking
- Munther Abualkibash, James Gedney, Yongbom Kim, Jeongkyu Lee:

A Hierarchical Approach to Landmarks Detection in Taekwondo Poomsae Videos. 1-6 - Nadra Ben Romdhane, Mohamed Hammami

, Hanêne Ben-Abdallah
:
An Artificial Vision-Based Lane Detection Algorithm. 1-6 - Xuehong Liu, Arnaud Casteigts, Nishith Goel, Amiya Nayak

, Ivan Stojmenovic:
Multiratecast in Wireless Fault Tolerant Sensor and Actuator Networks. 1-6 - Fang-Yie Leu, Yong-Lon Chen:

A Path Switching Scheme for SCTP Based on Round Trip Delay. 1-6 - Niakam Kazemi, Alexander L. Wijesinha, Ramesh K. Karne:

Design and Implementation of IPsec on a Bare PC. 1-8 - Md. Shohrab Hossain

, Mohammed Atiquzzaman
:
Signaling Cost Analysis of Mobility Protocols Using City Section Mobility Model. 1-6
Security and trust management
- Yuseop Lee, Jongsung Kim, Pil Joong Lee, Yeonjung Kang, Hyangjin Lee:

Impossible Collision Based Side-Channel Attacks on HIGHT with Reduced Masked Rounds. 1-4 - Hayretdin Bahsi

, Albert Levi
:
Energy Efficient Privacy Preserved Data Gathering in Wireless Sensor Networks Having Multiple Sinks. 1-8 - Jong Sik Moon, Im-Yeong Lee, Seo-Il Kang:

Group Key Management Using Device ID in Ad-hoc Network. 1-6 - Pranav Khaitan, Korra Sathya Babu

, Sanjay Kumar Jena, Banshidhar Majhi:
Approximation Algorithms for Optimizing Privacy and Utility. 1-6 - Rachid Anane

, Steven Marrocco, Behzad Bordbar:
Trusted P2P Group Interaction. 1-8 - Sung-Won Kim, Eun-Ha Song, Dong-Hwan Park, Hyeon Park, Sangjoon Park, Young-Sik Jeong:

Integrated Multi Mobile Object Scheme for Ubiquitous Sensor Network. 1-6
Database and data mining
- Liu Yang, Chunping Li, Ming Gu:

Extracting Content from Web Pages Using the Sliding Window. 1-6 - Shan-Tai Chen, Shih-Min Lin, Chi-Yii Tang, Guei-Yu Lin:

An Improved Algorithm for Completely Hiding Sensitive Association Rule Sets. 1-6 - Pranav Khaitan, Satish Kumar M, Korra Sathya Babu

, Sanjay Kumar Jena:
Improved Query Plans for Unnesting Nested SQL Queries. 1-6 - Kuo-Yuan Hwa

, Di-Shuan Chiang, Chen-Wen Yao:
Target Identification of an Antibacterial Compound from Data Mining of 2-D Gel Images. 1-6 - Yunming Ye, Xutao Li, Biao Wu, Yan Li:

Feature Weighting Information-Theoretic Co-Clustering for Document Clustering. 1-6 - Rasha Osman

, Irfan Awan, Michael E. Woodward:
Towards a Performance Evaluation Model for Database Designs. 1-6
Mobile and ubiquitous computing
- Faridah Hani Mohamed Salleh, Zaihisma Che Cob, Mohana Shanmugam, Siti Salbiah Mohamed Shariff:

Review on Mobile Workforce Management System for Electricity Supply Industries. 1-5 - Madhusoodan Parthasarathy, Min Sik Kim:

Routing in the Presence of Groups in Mobile Ad Hoc Networks. 1-8 - Kezhong Liu, Ji Xiong, Yongqiang Cui, Dong Han:

A Fine-Grained Localization Scheme Using a Mobile Beacon Node for Wireless Sensor Networks. 1-6 - Chuan Chen, Ke-Wei Lv, Yi-Xin Zhu:

A Paillier Based Threshold Signature Scheme. 1-6
Artificial intelligence
- Yeong Hyeon Gu, Seong Joon Yoo:

Mining Comparative Sentences from Korean Text Documents Using Sentential Structure Analysis Combined with Machine Learning Techniques. 1-6 - M. Arfan Jaffar, Qurat-ul-Ain Aini, Sohail Masood Bhatti

, Muhammad Amjad Iqbal, Arshad Javed, Anwar M. Mirza
:
Fuzzy Curvelet Based Fully Automated Segmentation of Brain from MR Images. 1-6 - Jungan Chen, Feng Liang, Wenxin Chen:

Hybrid Immune Detector Maturation Algorithm with LifeCycle Model. 1-6 - Shan-Tai Chen, Hong-Zhe Luo, Tsung-Chun Li, Wann-Jin Chen:

A Soft Computing Approach to Rainfall Intensity Classification Using TRMM/TMI Data. 1-6 - Kashif Zafar, Abdul Rauf Baig, Shahzad Badar Qazi, Hasnat Naveed:

Multi Agent Based Mine Detection and Route Planning Using Learning Real Time A* Algorithm. 1-7
Web and internet computing
- Chen-Chung Chi, Nai-Lung Tsao, Chin-Hwa Kuo:

A Time Influence Analysis for Web Page Recommender System. 1-6 - KwangHo Yoon, Jaekwang Kim

, Seunghoon Lee, Jee-Hyong Lee:
An Approach of Splitting Web Sequential Access Log for Accurate Web Recommendation. 1-5 - Sam Chung, Daehee Won, Seung-Ho Baeg

, Sangdeok Park:
A Model-Driven Scrum Process for Service-Oriented Software Reengineering: mScrum4SOSR. 1-8 - Zhao Wu, Naixue Xiong, Lei Yuan, Xiong Wei, Jong Hyuk Park:

Modeling and Analysis of the Execution Context in WS-BPEL. 1-6
Game and software engineering
- Kwan Yong Sim

, Chin S. Low, Fei-Ching Kuo:
Automatic Testing of Financial Charting Software Component: A Case Study on Point and Figure Chart. 1-7 - Younghee Kim, Soon Hyoung Pyo, Bonki Koo:

A Method for Immiscible Fluid Simulation. 1-4 - Zahid Halim

, Abdul Rauf Baig:
Automatic Generation of Interesting Games. 1-6 - Seyed Hossein Iranmanesh

, Seyed Mostafa Alem, Eisa Maleki Berneti:
Project Risk Assessment for Customer Relationship Management Using Adaptive Nero Fuzzy Inference System (ANFIS). 1-7
Computing and its applications
- Mohammad Rakibul Islam, Jinsang Kim:

Energy Efficient Cooperative MIMO Communication for Uncorrelated Data Transmission at Wireless Sensor Network. 1-6 - Sun-Myung Hwang:

Characteristic of Korea SW Process Certification Model. 1-4 - Dietmar Sommerfeld, Harald Richter:

A Two-Tier Approach to Grid Workflow Scheduling. 1-7 - Miao Wang, Nicolas Benoit, François Bodin:

Model-Directed Multi-Level Parallelization for Multi-Task Programs on the Cell BE. 1-6 - Danling Wang, Qin Zhang, John Morris:

Distributed Markov Chain Monte Carlo Particle Filtering. 1-5 - Xudong Zheng, Jinglei Ren, Xiaojuan Zheng, Yonglong Wei, Chen Sun:

Static Analysis of Java Source Code to Generate Security-Relevant Behavior Model Based on Extended Pushdown Automaton. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














