


default search action
8th ICUIMC 2014: Siem Reap, Cambodia
- Suk-Han Lee, Sang-Wook Kim, Lajos Hanzo, Roslan Ismail:

The 8th International Conference on Ubiquitous Information Management and Communication, ICUIMC '14, Siem Reap, Cambodia - January 09 - 11, 2014. ACM 2014, ISBN 978-1-4503-2644-5 - Toshiaki Miyazaki, Hiroki Iwata, Koji Kobayashi, Shoichi Yamaguchi, Deze Zeng, Song Guo

, Junji Kitamichi, Takafumi Hayashi
, Tsuneo Tsukahara:
DASN: demand-addressable sensor network for active information acquisition. 1:1-1:7 - Hoo-Rock Lee, Kyung-Yul Chung, Kyoung-Son Jhang:

TDMA implementation for simultaneous signal acquisition of machine condition in wireless sensor networks. 2:1-2:4 - Hideya Ochiai, Yuuichi Teranishi, Hiroshi Esaki:

InNetTC: in-network traffic control for full IP sensor-actuator networks. 3:1-3:7 - Xudong Zhu, Jun Li, Yuanfang Xia, Xiaofeng Gao, Guihai Chen

:
An efficient distributed node clustering protocol for high dimensional large-scale wireless sensor networks. 4:1-4:8 - Youngsung Choi

, Donghoon Lee, Woongryul Jeon, Dongho Won:
Password-based single-file encryption and secure data deletion for solid-state drive. 5:1-5:7 - Junggab Son, Hyunbum Kim, Donghyun Kim, Heekuck Oh:

On secure data sharing in cloud environment. 6:1-6:7 - Aamir Shahzad, Shahrulniza Musa

, Abdulaziz Aborujilah
, Muhammad Irfan:
Industrial control systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption. 7:1-7:6 - Jatin Thakkar, Daniel Ali, Jung-Min "Jerry" Park, Sangook Moon:

Securing a distributed policy-based cognitive radio. 8:1-8:8 - Jaheon Gu, Sueng Jae Bae, Min Young Chung:

Evolutionary algorithm for proportional fair scheduling of device-to-device communications underlaying multi-carrier cellular networks. 9:1-9:7 - Nga Nguyen

, Bach Tran, Quoc Khuong Nguyen
, Van Duc Nguyen
, Byeungwoo Jeon
:
An investigation of the spatial correlation influence on coded MIMO-OFDM system. 10:1-10:7 - Pham Phuoc Hung, Mohammad Aazam

, Tien-Dung Nguyen, Eui-Nam Huh:
A solution for optimizing recovery time in cloud computing. 11:1-11:8 - Ayesha Kanwal, Rahat Masood

, Muhammad Awais Shibli:
Evaluation and establishment of trust in cloud federation. 12:1-12:8 - Syed M. Raza

, Dongsoo S. Kim, Hyunseung Choo:
Leveraging PMIPv6 with SDN. 13:1-13:8 - Annanda Thavymony Rath, Jean-Noël Colin:

Modeling and expressing purpose validation policy for privacy-aware usage control in distributed environment. 14:1-14:8 - Kunryun Cho, Zilong Jin, Jinsung Cho:

Design and implementation of a single radio multi-channel MAC protocol on IEEE 802.15.4 for WBAN. 15:1-15:8 - Duc Ngoc Minh Dang

, Phuong Luu Vo, Chi Kwang Hwang, Choong Seon Hong
:
Mitigating starvation in wireless ad hoc networks: multi-channel MAC and power control. 16:1-16:8 - Kyung-Hoon Lee, Wi-Pil Kang, Hyung-Jin Choi:

A practical channel estimation and feedback method for device-to-device communication in 3GPP LTE system. 17:1-17:4 - Uyen C. Nguyen, Dung T. Tran, Giang V. Nguyen:

A taxonomy of applying filter techniques to improve the available bandwidth estimations. 18:1-18:8 - Young Min Kwon, JaeSheung Shin, Jun Suk Kim, Sung-Min Oh, Min Young Chung, Aesoon Park:

Development of system level simulator for evaluating performance of moving personalcell network. 19:1-19:6 - Phearin Sok, Keecheon Kim:

PRoPHET routing based on distance mechanism in disruption-tolerant network. 20:1-20:6 - Sungwoo Tak, Taehoon Kim, Donglyul Kim, Yougyung Kim:

Modeling and performance study of AP placement framework for indoor location-awareness and network performance. 21:1-21:8 - Mingye Chen, Lingxi Li

, Dongsoo Kim, Yaobin Chen
:
Performance evaluation of routing protocols based on realistic traces from driving simulator. 22:1-22:7 - Taqdir Ali, Maqbool Hussain, Wajahat Ali Khan

, Muhammad Afzal
, Sungyoung Lee:
Customized clinical domain ontology extraction for knowledge authoring tool. 23:1-23:7 - Byeong Ho Kang

, Do Hyeong Kim, Hyunsuk Chung:
What issue spread on the web: analyze the web trends. 24:1-24:7 - Jaedong Lee, Sora Hong, Jee-Hyong Lee:

An efficient prediction for heavy rain from big weather data using genetic algorithm. 25:1-25:7 - Najeeb Elahi, Randi Karlsen:

Relation based image retrival in online social network. 26:1-26:7 - Naoko Hishinuma, Atsuko Takefusa, Hidemoto Nakada

, Masato Oguchi:
Implementation of data affinity-based distributed parallel processing on a distributed key value store. 27:1-27:8 - Kwanho In, HaRim Jung, DongEun Kim, GiWoong Nam, Ung-Mo Kim:

Distributed processing of continuous range queries. 28:1-28:4 - Rize Jin, Hyung-Ju Cho, Tae-Sun Chung:

A group round robin based b-tree index storage scheme for flash memory devices. 29:1-29:6 - Lars Frank, Rasmus Ulslev Pedersen:

Managing consistency anomalies in distributed integrated databases with relaxed ACID properties. 30:1-30:7 - Amna Saad

, Mohd Izzat Mohamat Roseli, Muhammad Saufi Zullkeply:
A smart e-voting system using RFID authentication method for a campus electoral. 31:1-31:7 - Dongwoo Kim, Jaecheol Ryou

:
SecureSMS: prevention of SMS interception on Android platform. 32:1-32:6 - Sung-Hwan Kim, Dae-Geon Kwon, Hwan-Gue Cho:

Privacy-enhanced string matching with wordwise positional sampling. 33:1-33:8 - Takahiro Hara, Yuki Arase, Ayana Yamamoto, Xing Xie

, Mayu Iwata, Shojiro Nishio:
Location anonymization using real car trace data for location based services. 34:1-34:8 - Delina Beh Mei Yin, Herny Ramadhani, Mohd Syafiq Mohd Salleh:

Smart lock and smart alarm: alert and protect your lost USB flash drive. 35:1-35:6 - Roslan Ismail, Toqeer Ali Syed

, Shahrulniza Musa
:
Design and implementation of an efficient framework for behaviour attestation using n-call slides. 36:1-36:8 - Kyoungha Kim, Yanggon Kim:

The security appliance to BIRD software router. 37:1-37:8 - Seho Lee, Junghoon Kim, Minho Lee, Hyunku Lee, Young Ik Eom:

Last block logging mechanism for improving performance and lifetime on SCM-based file system. 38:1-38:4 - Dongjin Kim, Jeongoh Moon, Seong-je Cho, Jongmoo Choi, Minkyu Park, Sangchul Han, Lawrence Chung:

A birthmark-based method for intellectual software asset management. 39:1-39:6 - Yu-Ming Chang, Yuan-Hao Chang

, Po-Chun Huang, Shou-Chieh Hsu, Tei-Wei Kuo
:
Adaptive range-based address mapping for the flash storage devices with explosive capacity. 40:1-40:8 - Shashwat Garg, Krishna Kishore Dhara, Venkatesh Krishnaswamy:

Predicting relevant documents for enterprise communication contexts. 41:1-41:8 - Amit Kumar Das

, Tamal Adhikary, Md. Abdur Razzaque, Eung Jun Cho, Choong Seon Hong
:
A QoS and profit aware cloud confederation model for IaaS service providers. 42:1-42:7 - Hyoungshick Kim:

Don't count the number of friends when you are spreading information in social networks. 43:1-43:7 - Taketoshi Ushiama, Kazushige Tominaga:

A method for personalized ranking of items based on similarity between Twitter users. 44:1-44:4 - Dong-Hee Shin, Jae-Gil Lee

, Hong-seok Yoon, Myunggoon Choi:
How does interactivity contribute to a smart TV user experience? 45:1-45:6 - Wan Liyana Binti Wan Osman, Ryuya Uda:

A translator website for dyslexic children. 46:1-46:5 - Philip DePalo, Kyung Eun Park, Yeong-Tae Song:

Improving patient care in transport medicine through an ontological approach. 47:1-47:8 - Yuan Tian, Biao Song, Mznah Al-Rodhaan, Abdullah Al-Dhelaan, Eui-Nam Huh:

Threat-based evaluation for context-aware multimedia surveillance system. 48:1-48:8 - Dung Phan, In Seop Na

, Soo-Hyung Kim:
Local features and histogram based planar object recognition. 49:1-49:4 - Elyor Kodirov, Sejin Han, Gueesang Lee, Young-Chul Kim:

Music with harmony: chord separation and recognition in printed music score images. 50:1-50:8 - Mohammed H. Sinky, Ben Lee, Tae-Wook Lee, Chang-Gone Kim, Jone-Keun Shin:

DRAS.264: a dynamic retry adaptation scheme to improve transmission of H.264 HD video over 802.11 peer-to-peer networks. 51:1-51:8 - Weiwei Yuan, Donghai Guan, Sungyoung Lee:

Extract reputable users for trust-aware applications. 52:1-52:7 - Mark Beattie, Huiru Zheng

, Chris D. Nugent
, Paul J. McCullagh
:
Self-management of COPD: a technology driven paradigm. 53:1-53:8 - Xinshuang Zhao, Ahmed M. Naguib, Sukhan Lee:

Octree segmentation based calling gesture recognition for elderly care robot. 54:1-54:8 - Noormadinah Allias

, Megat Norulazmi Megat, Mohamed Noor, Mohd Nazri Ismail
:
A hybrid Gini PSO-SVM feature selection based on Taguchi method: an evaluation on email filtering. 55:1-55:5 - Md. Golam Rabiul Alam

, Eung Jun Cho, Eui-Nam Huh, Choong Seon Hong
:
Cloud based mental state monitoring system for suicide risk reconnaissance using wearable bio-sensors. 56:1-56:6 - Sungwoo Tak, Taehoon Kim, Donglyul Kim, Yougyung Kim:

Performance study of real-time scheduling schemes in configurable component-based sensor node platforms. 57:1-57:8 - Hyun Jung Choe, Hyunseung Choo:

QoS-aware adaptive data collection in wireless sensor networks. 58:1-58:8 - Yunmin Kim, Chul Wan Park, Tae-Jin Lee:

MAC protocol for energy-harvesting users in cognitive radio networks. 59:1-59:4 - Irma Syarlina Hj Che Ilias, Mohamad Sahimi Ibrahim:

Performance analysis of audio video codecs over Wi-Fi/WiMAX network. 60:1-60:5 - Dien Nguyen Van, Tuan Nguyen Anh, Tu Tran Ngoc, Van Duc Nguyen, Byeungwoo Jeon

, Tien Hoa Nguyen
:
A real-time COFDM transmission system based on the GNU radio: USRP N210 platform. 61:1-61:5 - Jaewook Jung, Woongryul Jeon, Dongho Won:

An enhanced remote user authentication scheme using smart card. 62:1-62:5 - Yeong-Jun Kim, Seong Jin Cho, Seung Hyun Yoon, Eun Hye Hwang, Jae Wook Jeon:

Fast and accurate power estimation method based on a PMU counter. 63:1-63:7 - Hai Quang Hong Dam, Tin Quoc Phan, Quang Nguyen Nhat To:

Simulation software using unicast and broadcast real-time streaming for online learning. 64:1-64:5 - Dong-Ki Kang, Seong-Hwan Kim, Chan-Hyun Youn, Min Chen:

Cost adaptive workflow scheduling in cloud computing. 65:1-65:8 - Yalew Zelalem Jembre, Rajib Paul

, Young-June Choi, Kyung-Yul Cheon, Chang-Joo Kim:
Channel assignment and jammer mitigation for military MANETs with multiple interfaces and multiple channels. 66:1-66:6 - Hui-Seon Gang, Jae-Young Pyun, Suk-Seung Hwang:

Error resilient motion estimation in multiple reference frame video coding. 67:1-67:7 - Yoonjeong Han, Zilong Jin, Jinsung Cho, Tae-Seong Kim:

A prediction algorithm for coexistence problem in multiple WBANs environment. 68:1-68:7 - Haibin Huang, Susanto Rahardja

:
A new R-D estimation method for compressed domain MP3/AAC bit-rate reduction. 69:1-69:4 - Gyusun Yi, Sungwon Lee:

Fully distributed handover based on SDN in heterogeneous wireless networks. 70:1-70:7 - Rim Haw, Choong Seon Hong

, Sungwon Lee:
An efficient content delivery framework for SDN based LTE network. 71:1-71:6 - Seungryeol Go, Sangdeok Kim, Jong-Wha Chong:

An efficient non-line-of-sight error mitigation method for TOA measurement in indoor environments. 72:1-72:5 - Jongkyu Seo, Haesung Tak, Hwan-Gue Cho:

Multi-level sequence alignment: a trade-off between speed and accuracy in similar text searching. 73:1-73:8 - Khu Phi Nguyen, Hong Tuyet Tu:

Locality mutual clustering for document retrieval. 74:1-74:6 - Yuya Hirano, Qiang Ma

, Masatoshi Yoshikawa:
Linkage of compound objects for supporting maintenance of large-scale web sites. 75:1-75:8 - Snehasish Banerjee

, Alton Y. K. Chua:
A study of manipulative and authentic negative reviews. 76:1-76:6 - Duck-Ho Bae, Seok-Ho Yoon, Tae-Hwan Eom, Jiwoon Ha, Young-Sup Hwang, Sang-Wook Kim:

Computing paper similarity based on latent dirichlet allocation. 77:1-77:6 - Lars Frank, Rasmus Ulslev Pedersen, Christian Havnø Frank, N. Jesper Larsson:

The CAP theorem versus databases with relaxed ACID properties. 78:1-78:7 - Tran Khanh Dang

, Dinh Long Vu, Van Nghiem Nguyen:
BdHCO-tree: integrating location privacy protection algorithms for frequent updates of moving objects. 79:1-79:6 - Aekavute Sujarae, Chutiporn Anutariya

:
A framework for in-class teaching assistant platform. 80:1-80:4 - Kyungeun Park, Yanggon Kim, Juno Chang:

Interoperable context sharing in an ontology-enabled collaboration framework. 81:1-81:8 - Norhatta Mohd, Siti Mistima Maat, Salwah Che Mat:

Factors influencing entrepreneurial intention among engineering technology students. 82:1-82:6 - Yuta Nakamura, Kyosuke Nagata, Shun Nomura, Saneyasu Yamaguchi:

I/O scheduling in Android devices with flash storage. 83:1-83:7 - Motoki Kitahara, Junpei Kawamoto, Kouichi Sakurai:

A method of digital rights management based on Bitcoin protocol. 84:1-84:6 - Kooktae Choi, Shin Gyu Kim, Hyeonsang Eom, Heon Y. Yeom:

Improving writeback performance of memory-based storage devices. 85:1-85:5 - Phuoc Vinh Tran, Hong Thi Nguyen, Trung Vinh Tran:

Approaching multi-dimensional cube for visualization-based epidemic warning system - dengue fever. 86:1-86:8 - Shuhei Kobata, Shin Tezuka, Ryuya Uda:

Personal identification by flick input with acceleration sensor. 87:1-87:6 - Pham Thi Thu Thuy, Nguyen Duc Thuan, Yongkoo Han, Kisung Park, Young-Koo Lee:

RDB2RDF: completed transformation from relational database into RDF ontology. 88:1-88:7 - Nurashikin Saaludin

, Yasmin Yahya, Suriyati Harun
, Wan Suriyani Che Wan Ahmad:
Modeling individual tree diameter increment for dipterocarpaceae and non-dipterocarpaceae in tropical rainforest. 89:1-89:7 - Jae-Hwan Ryu, Deok-Hwan Kim:

Multiple gait phase recognition using boosted classifiers based on sEMG signal and classification matrix. 90:1-90:4 - Yasmin Yahya, Roslan Ismail, Samreth Vanna, Khorn Saret:

Using data mining techniques for predicting individual tree mortality in tropical rain forest: logistic regression and decision trees approach. 91:1-91:5 - Kwangyong Lim, Taewoo Lee, Changmok Shin, Soonwook Chung, Yeongwoo Choi, Hyeran Byun:

Real-time illumination-invariant speed-limit sign recognition based on a modified census transform and support vector machines. 92:1-92:5 - Won J. Jeon, Gustavo Adrian Ruiz Sanchez, Taewoo Lee, Yeongwoo Choi, Byeongdae Woo, Kwangyong Lim, Hyeran Byun:

Real-time detection of speed-limit traffic signs on the real road using Haar-like features and boosted cascade. 93:1-93:5 - Hongoak Yun, Yunju Nam

, Byeong-Taek Lee:
Expectation-based sentence comprehension in Korean: evidence from behavioral and neurological studies. 94:1-94:8 - Younghyun Joo, Dongwoo Lee, Young Ik Eom:

Delegating OpenGL commands to host for hardware support in virtualized environments. 95:1-95:4 - Taeyeon Kim, Jaekwang Kim

, Jaedong Lee, Jee-Hyong Lee:
A tweet summarization method based on a keyword graph. 96:1-96:8 - Khoa Anh Tran, Vo Quang Nhat, Gueesang Lee:

A novel clustering algorithm based Gaussian mixture model for image segmentation. 97:1-97:5 - Hong Quy Nguyen

, Hyung Jeong Yang, Soo-Hyung Kim, Gueesang Lee:
Automatic touching detection and recognition of music chord using auto-encoding and softmax. 98:1-98:6 - Vo Quang Nhat, Gueesang Lee:

Adaptive line fitting for staff detection in handwritten music score images. 99:1-99:6 - Junggi Yang, Ji-In Woo, M.-H. Jang, Young-Ho Lee:

Study on a HDSS-based PEI model for chronic disease management. 100:1-100:3 - Toyohide Watanabe, Masatoshi Takamiya:

Police patrol routing on network voronoi diagram. 101:1-101:8 - Qiang Li, Liang He, Xin Lin:

Improved categorical distribution difference feature selection for Chinese document categorization. 102:1-102:7 - Jingjing Wang, Satoshi Oyama, Masahito Kurihara, Hisashi Kashima:

Learning an accurate entity resolution model from crowdsourced labels. 103:1-103:8 - Toan Duc Bui, Chunsoo Ahn, Yongwoo Lee, Jitae Shin:

Fully automatic segmentation based on localizing active contour method. 104:1-104:5 - Tran Tuan Anh, Pham The Bao, Hung Tuan Nguyen

:
Identification of bacillus species using support vector machine and codon pair relative frequency. 105:1-105:4 - Suliman Mohamed Fati, Rahmat Budiarto, Putra Sumari

:
Provisioning virtual IPTV delivery networks using hybrid genetic algorithm. 106:1-106:6 - Kang Han Oh, Soo-Hyung Kim, In Seop Na

:
Saliency detection using centroid weight map. 107:1-107:4 - Azmi Ahmad, Faizah Shaari, Zalizah Awang Long:

Outlier detection method based on hybrid rough: negative using PSO algorithm. 108:1-108:5 - Mohd Nizam Husen

, Sukhan Lee:
Indoor human localization with orientation using WiFi fingerprinting. 109:1-109:6 - Teruyuki Iijima, Shin Tezuka, Ryuya Uda:

Method for extraction of characteristics of personal characters from life log. 110:1-110:8 - Aedah Abd Rahman

:
Requirements engineering approach for real-time and embedded systems: a case study of android-based smart phone devices. 111:1-111:5 - Abu Talib Othman, Mohammad Nauman

, Shahrulniza Musa
, Sohail Khan
:
Transforming high-level requirements to executable policies for Android. 112:1-112:8 - Tuan A. Nguyen

, Don Nguyen, Phu Nguyen:
UIT-ANPR: toward an open framework for automatic number plate recognition on smartphones. 113:1-113:5 - Daeyong Kim, Daehoon Kim, Siwan Kim, Minho Jo

, Eenjun Hwang:
SNS-based issue detection and related news summarization scheme. 114:1-114:7 - Junbeom Park, Hongseok Lee, Kang-Woo Lee, Dongsoo S. Kim, Sangyep Nam, Hyunseung Choo:

No similarity attraction effect of ads on the ambivert, but interaction effect between ads and product personalities. 115:1-115:6 - SungHo Myoung, Dongsoo S. Kim, Hyunseung Choo, Mihui Kim:

Degree-based link scheduling for collision avoidance in distributed wireless sensor networks. 116:1-116:6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














