


default search action
6th ICITCS 2016: Prague, Czech Republic
- 6th International Conference on IT Convergence and Security, ICITCS 2016, Prague, Czech Republic, September 26, 2016. IEEE Computer Society 2016, ISBN 978-1-5090-3765-0

- Yuangang Yao, Lei Zhang, Jin Yi, Yong Peng, Weihua Hu, Lei Shi:

A Framework for Big Data Security Analysis and the Semantic Technology. 1-4 - Myungcheol Lee, Miyoung Lee, Changsoo Kim:

A JIT Compilation-Based Unified SQL Query Optimization System. 1-2 - Jinyoung Moon, Yongjin Kwon, Kyuchang Kang, Jongyoul Park, Yong-Jin Han, Young-Wha Lee:

A Knowledge-Driven Approach to Interactive Event Recognition for Semantic Video Understanding. 1-3 - Simen Steig, André Årnes, Thanh Van Do, Hai Thanh Nguyen:

A Network Based IMSI Catcher Detection. 1-6 - (Withdrawn) A Secure Agent Based Architecture for Resource Allocation in Cloud Computing. 1-6

- Byoung-Jun Park, Jeong-Woo Lee, Changrak Yoon, Kyong-Ho Kim:

A Study on Augmented Reality of a Vehicle Information Using Head-Up Display. 1-2 - SeongSang Yu, Kyung Ho Lee, Byeong Wook Nam, Yuepeng Wu:

A Study on Pipe Spool Considering Workspace Based on Genetic Algorithm. 1-4 - Muhammad Zubair

, Jinsul Kim, Changwoo Yoon:
An Automated ECG Beat Classification System Using Convolutional Neural Networks. 1-5 - Byeonguk Im, Nakhoon Baek

, Joongin Lee:
An Efficient Implenentation of LiDAR Data and its Geometric Representation Extraction. 1-4 - Dong-Hyun Kim, Jae-Young Jang, Jong-Deok Kim:

Analysis of Characteristics of Video Quality for Unequal Loss Protection in Wi-Fi Based Broadcasting System. 1-4 - Jirí Sebek, Tomás Cerný

:
AOP-Based Approach for Local Data Management in Adaptive Interfaces. 1-5 - Filip Rysavy, Tomás Cerný

, Martin Tomásek:
Aspect-Oriented User Interfaces Design Integration to Angular 2 Framework. 1-3 - Kristoffer Jensen, Thanh Van Do, Hai Thanh Nguyen, André Årnes:

Better Protection of SS7 Networks with Machine Learning. 1-7 - Gokul Kannan Sadasivam

, Chittaranjan Hota
, Bhojan Anand:
Classification of SSH Attacks Using Machine Learning Algorithms. 1-6 - Dae-Won Park, Kwangil Lee, Suhyun Park:

Common Vocabulary Set for Support of Interoperability of Data Contents of Maritime Equipment and Systems in E-Navigation Services. 1-4 - David Fernández Llorca, Raúl Quintero, Ignacio Parra

, Mario Jimenez, Carlos Fernández
, Rubén Izquierdo
, Miguel Ángel Sotelo:
Comparison between UHF RFID and BLE for Stereo-Based Tag Association in Outdoor Scenarios. 1-5 - Martin Tomásek, Tomás Cerný

:
Context-Aware User Interface Field Classification. 1-5 - Mihwa Song:

Cooperative Spectrum Sensing Scheme for Femtocell Network. 1-2 - Nakhoon Baek

, Woo Suk Shin
:
CUDA-Based Acceleration Techniques for Image Filtering. 1-2 - Marius Rata, Aurelian Florentin Draghia, Radu Drobot, Raluca Burtila:

Decision Support System for Pro-Active Flood Control on Jijia River (Romania). 1-5 - Fotis Kitsios

, Maria Kamariotou:
Decision Support Systems and Business Strategy: A Conceptual Framework for Strategic Information Systems Planning. 1-5 - (Withdrawn) Design Semantic Framework for Software Requirement Specification. 1-5

- Jongmun Jeong, Mintae Hwang:

Development of a Security Application based on User-Centric Evaluation. 1-4 - Moohun Lee, Mingyu Kim:

Development of Real-Time Road Surface Condition Determination Algorithm Using an Automatic Weather System. 1-2 - Karel Cemus, Filip Klimes, Ondrej Kratochvil, Tomás Cerný

:
Distributed Multi-Platform Context-Aware User Interface for Information Systems. 1-4 - Yoonsook Hwang, Kyong-Ho Kim:

Effects of the Displaying Augmented-Reality Information on the Driving Behavior of the Drivers with Specific Psychological Characteristics. 1-2 - Jan Helbich, Tomás Cerný

:
Energy Impact of Web User Interface Technology on Mobile Devices. 1-3 - Seda Kul, Süleyman Eken, Ahmet Sayar

:
Evaluation of Real-Time Performance for BGSLibrary Algorithms: A Case Study on Traffic Surveillance Video. 1-4 - Dohyung Kim, Minsu Jang, Jaehong Kim:

Example-Based Retrieval System for Human Motion Data. 1-2 - Yuuki Takano, Ryosuke Miura:

FARIS: Fast and Memory-Efficient URL Filter by Domain Specific Machine. 1-7 - Ondrej Grunt

, Jan Plucar, Lukas Kapicak:
Fault Analysis of Data Upload Process in Ostrava, Czech Republic Using Measured Network Parameters. 1-5 - Nasir Uddin, Mohammad Jabr:

File Upload Security and Validation in Context of Software as a Service Cloud Model. 1-5 - Chun-I Fan, Jian-Sheng Wang, Jheng-Jia Huang, Yi-Fan Tseng, Wen-Shenq Juang, Hiroaki Kikuchi:

Flexible Authentication Protocol with Key Reconstruction in WBAN Environments. 1-5 - Raúl Mazo, Christophe Feltus

:
Framework for Engineering Complex Security Requirements Patterns. 1-5 - DoHyung Kim, Ho-Sub Yoon, Jaehong Kim:

Framework of Sensor Network for Perception of Human Behavior and Identification. 1-2 - Jinho Choi

:
Full-Duplexing Jamming Attack for Active Eavesdropping. 1-5 - (Withdrawn) Functionality versus Complexity Analysis of Project Management Software in Kingdom of Bahrain. 1-6

- Wonhyuk Lee, Kuinam J. Kim, Hyuncheol Kim:

Hierarchical Cluster Network for Wellness Sports Industry. 1-4 - (Withdrawn) Holistic-Based Feature Extraction And Error Correcting Code Biometric Template Protection Technique. 1-4

- TaeYeon Kim, BhumCheol Lee:

Holistic Service Orchestration over Distributed Micro Data Center. 1-5 - Michal Trnka, Tomás Cerný

:
Identity Management of Devices in Internet of Things Environment. 1-4 - Jiyoung Yoon, Nakhoon Baek

, Cheolhwan Kim, Hwanyong Lee
:
Implement of Stereo Image Correction for 3D Optical Microscope and Design Hardware System. 1-5 - Lina Chato, Shahram Latifi:

Improving the Classifier Performance in Detecting People Based on Denoising Wavelet Transform. 1-6 - Shuichiro Yamamoto, Shuji Morisaki:

IT Demand Governance using Business Goal Structuring Notation. 1-5 - Yu-Cheol Lee

, Jaeyeon Lee:
Kinematic Constraint Method for Human Gesture Recognition Based on Weighted Dynamic Time Warping. 1-5 - Dongwoo Kim, Yunja Choi:

Light-Weight API-Call Safety Checking for Automotive Control Software Using Constraint Patterns. 1-5 - Ari Barmawi:

Linguistic Based Steganography Using Lexical Substitution and Syntactical Transformation. 1-6 - Shahab Tayeb, Miresmaeil Mirnabibaboli, Shahram Latifi:

Load Balancing in WSNs using a Novel Markov Decision Process Based Routing Algorithm. 1-5 - Dong-Hyun Kim, Jun Young Lim, Jong-Deok Kim:

Low-Power, Long-Range, High-Data Transmission Using Wi-Fi and LoRa. 1-3 - Byungjo Kim, Jae-Mo Kang, Hyung-Myung Kim, Joohyun Lee:

Max-Min Energy-Efficiency Optimization in Wireless Powered Communication Network with Harvest-Then-Transmit Protocol. 1-5 - Cheolhwan Kim, Jiyoung Yoon, Yun-Jung Lee:

Medical Image Segmentation by More Sensitive Adaptive Thresholding. 1-3 - Karel Frajták, Miroslav Bures, Ivan Jelínek:

Model-Based Testing and Exploratory Testing: Is Synergy Possible? 1-6 - Lacezar Licev, Jakub Hendrych, Radim Kuncicky:

Neural Stegoclassifier. 1-3 - (Withdrawn) New Proposed Z-Transform Based Encryption Algorithm. 1-5

- Tomás Jirsík

, Milan Cermák
, Pavel Celeda
:
On Information Value of Top N Statistics. 1-5 - Zdenek Brabec, Tomás Cerný

, Jirí Sebek:
On Metadata Extension to Derive Data Presentations with Angular 2. 1-4 - Anna Epishkina, Konstantin Kogos

:
Packet Length Covert Channel Capacity Estimation. 1-4 - Jinhyun Ahn

, Dong-Hyuk Im, Taewhi Lee, Hong-Gee Kim:
Parallel Prime Number Labeling of Large XML Data Using MapReduce. 1-2 - Taewhi Lee, Moonyoung Chung, Sung-Soo Kim, Hyewon Song, Jongho Won:

Partial Materialization for Data Integration in SQL-on-Hadoop Engines. 1-2 - Nur Syuhada Selamat, Fakariah Hani Mohd Ali

, Noor Ashitah Abu Othman:
Polymorphic Malware Detection. 1-5 - Young-Chul Kim, Seok-Hyun Lee, Jin-Soo Jang:

Power-Aware Data Structure Using Memory Allocation Techniques in EPS-Based Motion Recognition Systems. 1-4 - Igor Velbitskiy:

Programming without Programming Languages New Graphic Polyglot Concept of Programming. 1-6 - (Withdrawn) Repulsion-Propulsion Firefly Algorithm with Fast Convergence to Solve Highly Multi-Modal Problems. 1-6

- Suhairi Mohd Jawi, Fakariah Hani Mohd Ali

:
Rules and Results for SSL/TLS Nonintrusive Proxy Based on JSON Data. 1-5 - Jamel Miri, Bechir Nsiri, Ridha Bouallegue

:
Secure Distance Bounding Protocol on TH-UWB. 1-5 - Dakshi T. K. Geeganage, Darshika N. Koggalahewa, Jayantha L. Amararachchi, Asoka S. Karunananda:

Sentence Based Mathematical Problem Solving Approach via Ontology Modeling. 1-5 - V. Nagarjana Devi Duvvuri, V. Rajanikanth Thatiparthi, Rajashekar Pantangi, Akhil Gangavarapu:

Sentiment Analysis Using Harn Algorithm. 1-5 - Miroslav Bures, Martin Filipsky:

SmartDriver: Extension of Selenium WebDriver to Create More Efficient Automated Tests. 1-4 - Abdullah J. Alzahrani, Ali A. Ghorbani:

SMS-Based Mobile Botnet Detection Module. 1-7 - Keun-Chang Kwak, Myungwon Lee:

Speech Enhancement Using ES Information and Phase-Error Based Filters. 1-3 - Jung Min Lee, Kyung Ho Lee, Byeong Wook Nam, Yuepeng Wu:

Study on Image-Based Ship Detection for AR Navigation. 1-4 - Tomás Cerný

, Michael J. Donahoo:
Survey on Second Screen Systems. 1-5 - Hwai-Tsu Hu, Jieh-Ren Chang, Chun-Chi Chen, Sheng-Yu Lai:

Synchronized Blind Audio Watermarking via Multilevel DWT and Windowed Vector Modulation. 1-5 - Peng Liu, Guohua Jiang, Yuqing Liu, Ming An:

The Utility Evaluation of the Astronaut Virtual Training System in Layout Familiarization Training. 1-4 - Jin-Suk Ma, Hak-Young Kim, Young-Woo Kim:

The Virtualization and Performance Comparison with LXC-LXD in ARM64bit Server. 1-4 - Min-Gyu Kim, Moo Hun Lee:

Visualization Method for Efficient Expression of Spatial Information. 1-2 - Muhammad Shafiq

, Xiangzhan Yu, Asif Ali Laghari
:
WeChat Text Messages Service Flow Traffic Classification Using Machine Learning Technique. 1-5 - Shahab Tayeb, Shahram Latifi:

Will an Emerging Standard Take Over the Routing Realm? An Evaluative Analysis of DUAL and SPF. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














