


default search action
4th ICITCS 2014: Beijing, China
- 2014 International Conference on IT Convergence and Security, 10.1109/ICITCS.2014, Beijing, China, October 28-30, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-6541-0

- Jaeho Lee, Inkyung Byun, Kyoungro Yoon

:
A Case Study of Visual Analytic Method on Behavior Modification by Movement Therapy. 1-4 - Jang-Yoon Kim, Michael Vogl, Shin-Dug Kim:

A Code Based Fruit Recognition Method Via Image Convertion Using Multiple Features. 1-4 - Lin Li, Songnian Lu, Shenghong Li, Zhengmin Xia:

A Community Divisive Algorithm Using Local Weak Links. 1-5 - Qun Zhang, Lirong Wei, Rui Hu:

A General Transfer Station Location Model in Relay Delivery Considering Carbon Footprint. 1-4 - Chao Liu, Changkai Zhang, Hong Yao, Deze Zeng, Qingzhong Liang, Chengyu Hu

:
A GPS Information Sharing System Based on Bluetooth Technology. 1-2 - Goanghun Kim, Nakhoon Baek

:
A Height-Map Based Terrain Rendering with Tessellation Hardware. 1-4 - Hanqiu Mo, Yasuaki Inoue:

A Magnetic Resonant Coupling Wireless Power Transmission System under Different Load Conditions. 1-4 - Soojin Park, Young B. Park:

A Multi-Core Architectural Pattern Selection Method for the Transition from Single-Core to Multi-Core Architecture. 1-5 - Hong Jun Choi, Dong Oh Son, Cheol Hong Kim, Jong Myron Kim Kim:

A Novel Prefetch Technique for High Performance Embedded System. 1-3 - Sufian Sudeng, Naruemon Wattanapongsakorn:

A Preference-Based Multi-Objective Evolutionary Algorithm for Redundancy Allocation Problem. 1-4 - Khikmatullo Kudratov, Liu Cheng:

A Research on Expatriate Cross- Cultural Adjustment and Job Performance in MNCs. 1-4 - Lu Bo, TaegKeun Whangbo:

A SIFT-Color Moments Descriptor for Object Recognition. 1-3 - Apiradee Ampawasiri, Chompoo Suppatoomsin, BongJin Baek, JoonHo Ryu, SangWoon Lee, Cheong-Ghil Kim:

A Study of High Efficiency Video Coding File Format. 1-2 - SangWoon Lee, BongJin Baek, Cheong-Ghil Kim:

A Study on Audio Levels and Loudness Standard for Digital Broadcasting Program. 1-3 - Insick Son, Kabsu Han, Daejin Park, Meng Di Yin, Jeonghun Cho:

A Study on Implementation of IVI Applications for Connected Vehicle Using HTML5. 1-4 - Young-Jin Shin:

A Study on Privacy Protection Tasks for Cross-Border Data Transfers. 1-4 - Juraj Camaj

, Jana Lalinska
, Jaroslav Masek
:
Simulations of continental logistics center from the perspective of technologist. 1-4 - Hwan-Seok Yang, Seung-Jae Yoo:

A Study on Secure Element for Smartwork. 1-3 - Shamsul Kamal Ahmad Khalid

, Mustafa Mat Deris, Kamaruddin Malik Mohamad:
A Systematic Redundancy Approach in Watermarking Using Sudoku. 1-5 - Do van Thuan, Pranas Butkus, Do Van Thanh:

A User Centric Identity Management for Internet of Things. 1-4 - Jong-Yeon Park

, Jung-Nyeo Kim, Jae-Dock Lim, Dong-Guk Han:
A Whitebox Cryptography Application for Mobile Device Security against Whitebox Attacks - How to Apply WBC on Mobile Device. 1-5 - Murat Ogul, Selçuk Baktir

, Emin Islam Tatli:
Abused Android Permissions by Advertising Networks. 1-4 - Jin-Chun Piao

, Chang-Woo Cho, Cheong-Ghil Kim, Bernd Burgstaller, Shin-Dug Kim:
An Adaptive LOD Setting Methodology with OpenGL ES Library on Mobile Devices. 1-4 - Rui Zhu, Tong Li, Fei Dai, Qi Mo, Leilei Lin, Yun He, Yeting Chen:

An Approach to Detecting Software Process Deviations. 1-4 - Changhee Cho, Sanghyun Park, Jinsul Kim, Sangjoon Lee:

An Efficient Moving Detection Methodology in Mobile Cloud Environment. 1-3 - Bing Li, Xin Fang, Ruifeng Sun, Xue Luo, Wei-Hao Chang:

An Enhanced TAC/AA Competition Model Designed for Sponsored Search Market. 1-4 - Mohamad Farhan Mohamad Mohsin

, Abdul Razak Hamdan, Azuraliza Abu Bakar:
An Evaluation of Feature Selection Technique for Dendrite Cell Algorithm. 1-5 - Jin-Woo Kim, Jin Gwan Park, Min A. Jeong, Seong-Ro Lee:

An Interference Avoidance System Using Energy Contour Line for Coexistence with Ieee 802.11 Networks in Wireless Sensor Networks. 1-4 - Seokmo Kim, Young B. Park:

An Object Pool Realization of Whitelist Strategies to Neutralize Injection Flaws. 1-5 - Juanxi Lin, Mengnan Song, Jinglu Hu:

An SMO Approach to Fast SVM for Classification of Large Scale Data. 1-4 - Muhammad Usman, Shoaib Hassan:

Analysing Different Threats Levels in NGN and Ensuring Its Security with Quality of Services. 1-5 - Hyuk-Kyu Lim, Je-Ho Park, Han Auk Kim:

Analysis of Effect of Luminance Space on Face Detection. 1-2 - Namburu Swetha

, Panyam Narahari Sastry, Yandra Rajasree Rao:
Analysis of Spectrum Sensing Based on Energy Detection Method in Cognitive Radio Networks. 1-4 - Dong Oh Son, Hong Jun Choi, Jong-Myon Kim, Cheol Hong Kim:

Analysis on the Power Efficiency of Mobile Systems Varying Device Parameters. 1-3 - Feng-Hsiag Hsiao, Guang-Wei Liou:

Application of Advanced Encryption Standard to Chaotic Synchronization Systems: Using an Improved Genetic Algorithm as Auxiliary. 1-4 - Yongmin Park, Seokjun Lee, Jongwan Kim, Taeshik Shon:

Applying Digital Forensics in Various Application Fields: Required Elements for Having Legal Force. 1-4 - Do-Young Chung, Sok-Joon Lee, Sin-Hyo Kim:

Attacks about Channel Bonding on WLAN. 1-3 - Hwan-Seok Yang, Seung-Jae Yoo:

Authentication Techniques for Improving the Reliability of the Nodes in the MANET. 1-3 - Soojin Park, Jeongwon Byeon, Mansoo Whang, Young B. Park:

Bad Symptoms for Usability of Mobile Applications. 1-4 - John Owen F. Ilagan, Ma. Regina E. Estuar:

Barriers to Community-Based Computing in the Philippines. 1-4 - Shankar Ganesh Manikandan, Siddarth Ravi:

Big Data Analysis Using Apache Hadoop. 1-4 - Sung-Jong Eun, Taeg Keun Whangbo:

Brain Segmentation Using Susceptibility Weighted Imaging Method. 1-3 - Seong-Ro Lee, Beom-mu Kim, Min A. Jeong, Jin-Woo Kim:

Building UWB Based Smart Home Network for Wireless IPTV. 1-4 - Mait Rungi, Valeria Stulova:

Choosing How Tight to Bond: The Interplay between Corporate Combinations, Alliances and Networks. 1-4 - Mohammad Ahangar Kiasari, Seung You Na, Jin Young Kim:

Classification of Human Postures Using Ultra-Wide Band Radar Based on Neural Networks. 1-4 - Seungae Kang, Youngjoo Kim:

Cluster Business Model for Wellness IT. 1-2 - Tran Thi Thu Ha, Jaehyung Park, Yonggwan Won, Jinsul Kim:

Combining STUN Protocol and UDP Hole Punching Technique for Peer-To-Peer Communication across Network Address Translation. 1-4 - Ji-Yong Jung, Chan-Il Yoo, Kyung-Ah Kim, Soo-Kyung Bok

, Bong-Ok Kim, Yonggwan Won, Jung-Ja Kim:
Correlation Analysis between Idiopathic Scoliosis and Pelvic Asymmetry Using Sitting Posture Measurement System. 1-4 - Feng He, Xiaoning Xu, Liyun Zhu:

Data Perturbations for All DMUs in DEA with Interval Uncertainty. 1-6 - Sai Krishna Pallimalli

, Arshad Shaik:
Defense Methodologies of AV Evasion for Access Control and Information Assurance in Industrial Distributed Control Systems and SCADA Systems. 1-5 - GeunHong Park, Dae-Won Park, Suhyun Park:

Design and Implementation of Display Module for Electronic Navigational Chart Data. 1-3 - Byoung U. Kim, Nakhoon Baek

:
Developing an Audio-Based Game. 1-3 - Tao Liu, Hui Guo:

Dynamic Encryption Key Design and Its Security Evaluation for Memory Data Protection in Embedded Systems. 1-4 - Sung-Hwa Lim, Jai-Hoon Kim:

Dynamic Security Level Changing Strategy Using Attack Predictions - Case Study of TCP SYN Attacks. 1-4 - Maysoon S. Aldekhail:

Effect of Knowledge Management Based Error Mitigation Techniques in Medical and Diagnostic Applications. 1-6 - Young Cheul Kim, Jongik Kim, Hyung-Ju Cho, Tae-Sun Chung:

Efficient Method for Processing Consecutive Events over Streams with a Negation Link. 1-4 - Bing Li, Ruifeng Sun, Xin Fang, Xue Luo, Wei-Hao Chang:

Emergent Challenges and IPDS for Anti-Phishing Attack. 1-4 - Tan Dat Trinh

, Jin Young Kim, Seung You Na:
Enhanced Face Recognition by Fusion of Global and Local Features under Varying Illumination. 1-4 - Muhammad Usman, Usman Akram:

Ensuring Data Security by AES for Global Software Development in Cloud Computing. 1-7 - Je-Ho Park, Changwon Kang:

Entropy Based Image Identifier Generation. 1-2 - Feng He, Liyun Zhu, Wei Jiang:

Environmental Efficiency Evaluation with Undesirable Outputs-A Study on China's Iron and Steel Industry. 1-4 - Jung-Kyu Choi, Chan-Il Yoo, Kyung-Ah Kim, Yonggwan Won, Jung-Ja Kim:

Evaluation of Custom-Made Insoles on Pes Cavus During Walking. 1-4 - Ji-Yong Jung, Chan-Il Yoo, Kyung-Ah Kim, Soo-Kyung Bok

, Bong-Ok Kim, Yonggwan Won, Jung-Ja Kim:
Evaluation of Sitting Balance in Adolescent Idiopathic Scoliosis Patients with Pelvic Rotation Using Balance Board System with Accelerometer. 1-4 - Seungae Kang, Sunyoung Kang, Hyuncheol Kim:

Fitness Image Model for Individual with Disabled. 1-3 - Thuong-Khanh Tran, Ngoc Nam Bui, Jin Young Kim:

Foreground Extraction in Video Based on Edge-Based Robust Principal Component Analysis. 1-2 - Satish K. Shah, Sonal J. Rane, Dharmistha D. Vishwakarma

:
GTS Allocation Strategy for IEEE 802.15.4 WSN. 1-5 - Sung-Joon Yoon, Yang-Byung Park:

Heuristics for the Vendor-Managed Inventory Problem of Convenience Stores. 1-3 - Ngoc Nam Bui, Thuong-Khanh Tran, Chenlin Hu, Jin-Young Kim, Hyoung-Gook Kim:

Human Detection and Tracking Using Poselet with Weighted Motion Block Particle Filters. 1-5 - Thuong-Khanh Tran, Ngoc Nam Bui, Jin-Young Kim:

Human Detection in Video Using Poselet Combine with Gradient Local Auto Correlation Classifier. 1-4 - Hong Jun Choi, Dong Oh Son, Cheol Hong Kim, Jong Myron Kim Kim:

Impact of Clock Frequency and Number of Cores on GPU Performance. 1-4 - Se-Yeol Yang, Jung-Ja Kim:

Implementation of a Reading Assistive Computer System Using Image Processing Techniques. 1-4 - Christina Muro, Leonard James Mselle:

Implementation of Mobile-Phone Services in Preventing Mother-To-Child Transmission of HIV (PMTCT). 1-4 - Dong Chun Lee, Kuinam J. Kim:

Improved Authentication Scheme of Binding Update Protocol in Mobile IPv6 Networks. 1-4 - Yungang Wei, Lei Wu, Bo Sun, Xiaoming Zhu:

Improved QEM Simplification Algorithm Based on Discrete Curvature and a Sparseness Coefficient. 1-5 - Siti Sarah Maidin

, Marini Othman, Mohammad Nazir Ahmad
:
Information Sharing in Governance of Flood Management in Malaysia: COBIT Based Framework. 1-5 - Werner Jauk:

Intuitive Gestural Interfaces / Adaptive Environments and Mobile Devices / Apps.: Playing Music and the Musical Work as a Role Model for Personalized Gestural Interaction in Social Environments. 1-4 - Byungyeon Park, Wonhyuk Lee, Hyuncheol Kim:

IT Technology and Exercise Rehabilitation. 1-2 - Min-Uk Kim, Kyoungro Yoon

:
JPEG-AR Standard Enabling Augmented Marketing. 1-2 - Shihao Yan

, Robert A. Malaney
:
Line-Of-Sight Based Beamforming for Security Enhancements in Wiretap Channels. 1-4 - Ong Sing Goh, Mohd Khanapi Abd. Ghani, Yogan Jaya Kumar

, Yun-Huoy Choo
, Azah Kamilah Muda
:
Massive Open Online Course (MOOC) with Learning Objects and Intelligent Agent Technologies. 1-4 - Wonhyuk Lee, Seunghae Kim, TaeYeon Kim, Hyuncheol Kim:

Micro-Datacenter Management Architecture for Mobile Wellness Information. 1-4 - Yasutaka Matsuoka, Hua-An Zhao:

Multi-Objective Optimization Techniques for VLSI Placements. 1-4 - Seunghae Kim, Wonhyuk Lee, Hyuncheol Kim:

Network Stability Based on Node Weight. 1-3 - Alemu Molla, Yenewondim Biadgie, Kyung-Ah Sohn

:
Network-Based Visualization of Opinion Mining and Sentiment Analysis on Twitter. 1-4 - Geetha Baskaran

, Andrzej Bargiela, Rong Qu
:
New Solution for a Benchmark Nurse Scheduling Problem Using Integer Programming. 1-4 - Ashok Sharma, Sangjae Nam, Cheong-Ghil Kim, Shin-Dug Kim:

Non-Volatile Unified Memory Page Management for Improving Performance. 1-4 - Rozanawati Darman

, Norafida Ithnin
:
Object Tracking Methods in Wireless Sensor Network: Network Structure Classification. 1-3 - Azhar Javed, Monis Akhlaq:

On the Approach of Static Feature Extraction in Trojans to Combat against Zero-Day Threats. 1-5 - Daejin Park, Meng Di Yin, Jeonghun Cho:

On-Chip Event Debugger (OCeD) with Automated Code Execution Engine for Control Flow Detection. 1-3 - Tan Loc Nguyen, Yonggwan Won:

Performance Comparison of Multilayer Neural Networks for Sleep Snoring Detection. 1-3 - Sohyun Koo, Se Jin Kwon

, Sungsoo Kim, Tae-Sun Chung:
PLGC: Partial Linked GC for Datacenter. 1-3 - Selçuk Baktir

:
Privacy Preserving Smart Grid Management in the Cloud. 1-4 - John Noel C. Victorino

, Maria Regina Justina E. Estuar:
Profiling Flood Risk through Crowdsourced Flood Level Reports. 1-4 - Tipwimol Sooktip, Naruemon Wattanapongsakorn:

Pruning Algorithm for Multi-Objective Optimization with Decision Maker's Preferences of System Redundancy Allocation Problem. 1-4 - Yogiraj S. Jadhav, Baeho Lee, Jinsul Kim:

QoE Oriented Analysis for Video Quality Assessment. 1-4 - Marlene M. De Leon, Ma. Regina E. Estuar:

Rapid Application Development of Ebayanihan Patroller: A Crowdsourcing SMS Service and Web Visualization Disaster Reporting System. 1-4 - Jhoanna T. Isla, Ma. Regina E. Estuar:

Real-Time Visualization of Disaster Behavior. 1-4 - Youzheng Chen, Baozhong Cheng, Xiaoyan Zhang:

Research and Implementation of an IMS-Based AS/MRFC Model for IVR Services. 1-5 - Shamsiya Kudratova, Xiaoxia Huang, Khikmatullo Kudratov:

Risk Management & Assessment on Road Safety Concerns: Case of Road Rehabilitation Project. 1-4 - Takaaki Ishikawa, Je-Ho Park:

Rotation Invariant Detection Using Image Identifier. 1-3 - Amir Azodi, David Jaeger

, Feng Cheng, Christoph Meinel:
Runtime Updatable and Dynamic Event Processing Using Embedded ECMAScript Engines. 1-4 - SungMoon Kwon, Hyunguk Yoo, Taeshik Shon, GunWoong Lee:

Scenario-Based Attack Route on Industrial Control System. 1-3 - Daejin Park, Meng Di Yin, Jeonghun Cho:

Secure Microcontroller with On-Chip Hierarchical Code Validator for Firmware Authentication. 1-3 - Sanghyun Park, Jiseung Nam, Jinsul Kim:

SLAN-Based Next Generation User-Customized Dynamic Interface Sharing for Smart Mobile Devices. 1-3 - Mohd Helmy Abd Wahab

, Aeslina Abdul Kadir
, Mohd Razali Md Tomari
, Mohamad Hairol Jabbar:
Smart Recycle Bin: A Conceptual Approach of Smart Waste Management with Integrated Web Based System. 1-4 - Dong-dong Ma, Feng He:

Status Trend Evaluation Research on Development of Low Carbon Economy in Coal Enterprises. 1-4 - Vitruvius John D. Barayuga, William Emmanuel S. Yu:

Study of Packet Level UDP Performance of NAT44, NAT64 and IPv6 Using Iperf in the Context of IPv6 Migration. 1-6 - Seokcheol Lee, Yongmin Park, Hyunwoo Lim, Taeshik Shon:

Study on Analysis of Security Vulnerabilities and Countermeasures in ISO/IEC 15118 Based Electric Vehicle Charging Technology. 1-4 - Jung-Kyu Choi, Chan-Il Yoo, Kyung-Ah Kim, Yonggwan Won, Jung-Ja Kim:

Study on Datamining Techinique for Foot Disease Prediction. 1-4 - Panyam Narahari Sastry, Thirumala Vijaya Lakshmi

, N. V. Koteswara Rao, T. V. Rajinikanth
, Abdul Wahab:
Telugu Handwritten Character Recognition Using Zoning Features. 1-4 - Jiayang Sun, Cheng Feng, Donglin Wang, Meng Gu:

The Design of Two Versions of 3D Mouse. 1-5 - Hassan Almari, Clive Boughton:

The Five Factors Influencing Software Architecture Modeling and Evaluation Techniques. 1-8 - Jaeho Lee, Kyoungro Yoon

:
Transportation Methods of Sensory Information Using Multimedia Packet. 1-4 - Xiaoxia Huang, Hao Di:

Uncertain Portfolio Selection with Background Risk. 1-3 - Dongwook Lee, Minsoo Hahn, Sangjun Park, Seunghyung Lee:

User Position Estimation and Visualization Using Power Consumption of Home Appliances. 1-4 - Maria Regina Justina E. Estuar, Marlene M. De Leon, Maria Dianne Santos, John Owen F. Ilagan, Barbara Anne May:

Validating UI through UX in the Context of a Mobile - Web Crowdsourcing Disaster Management Application. 1-4 - Dongwook Lee, Minsoo Hahn, Sangjun Park, Seunghyung Lee:

Virtual Environment Based Graphical User Interface for Authoring and Visualization System. 1-2 - Soojung Park, Bongsup Park:

Virtual Reality Exercise Simulator. 1-2 - Yogan Jaya Kumar

, Ong Sing Goh, Mohd Khanapi Abd. Ghani, Naomie Salim, Ameer Tawfik Albaham:
Voting Models for Summary Extraction from Text Documents. 1-4 - Min-Hooi Chuah

, Kee-Luen Wong:
Web Based Enterprise Business Intelligence Maturity (EBI2M) Assessment Tool. 1-3 - Dongwook Lee, Minsoo Hahn, Sangjun Park, Seunghyung Lee:

Web Based Visualization for Sports Data Pattern. 1-2 - Seung-Jae Yoo, Jeong-Mo Yang:

Web Login Vulnerability Analysis and Countermeasures. 1-4 - Trin Thi Thu Hah, Jin Young Kim, Seung Ho Choi:

White Matter Hyperintensities Extraction Based T2-FLAIR MRI Using Non-Local Means Filter and Nearest Neighbor Algorithm. 1-4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














