


default search action
10th IMCOM 2016: Danang, Vietnam
- Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, IMCOM 2016, Danang, Vietnam, January 4-6, 2016. ACM 2016, ISBN 978-1-4503-4142-4

- Delina Beh Mei Yin, Mohamad Izzuddin Kamal, Nurul Sharaz Azmanuddin

, Siti Haryani Shaikh Ali, Abu Talib Othman, Rita Zaharah Wan-Chik
:
Electronic Door Access Control using MyAccess Two-Factor Authentication Scheme featuring Near-Field Communication and Eigenface-based Face Recognition using Principal Component Analysis. 1:1-1:8 - Toyohide Watanabe:

A Framework of Information Technology Supported Intelligent Learning Environment. 2:1-2:8 - Nguyen Xuan Tien

, Jong Myung Rhee:
A Novel Approach for Reducing HSR Unicast Traffic Using Pre-defined Dual Paths. 3:1-3:7 - Ji Won Yoon:

An efficient geometric shape coding and representation approach to obtain both skeleton and contours. 4:1-4:8 - Priya Anand, Jungwoo Ryoo

, Hyoungshick Kim, Eunhyun Kim:
Threat Assessment in the Cloud Environment: A Quantitative Approach for Security Pattern Selection. 5:1-5:8 - Abayomi Jegede, Nur Izura Udzir

, Azizol Abdullah
, Ramlan Mahmod:
A Hybrid Scheme for Face Template Protection. 6:1-6:7 - Jongho Moon, Jiseon Yu, Hyungkyu Yang, Dongho Won:

Improvement of Biometrics and Smart Cards-based Authentication Scheme for Multi-Server Environments. 7:1-7:8 - Je-Gyeong Jo, Jae-Cheol Ryou

:
HTML and PDF fuzzing methodology in iOS. 8:1-8:5 - Adil I. Erzin

, Natalia Shabelnikova, Vyacheslav V. Zalyubovskiy:
Covering the Plane with Equal Sectors. 9:1-9:8 - Chae Hong Yi, Yong Ju Kim, Jae Wook Jeon:

Reduction of Wake-up Time for Partial Networking in Automotive System. 10:1-10:6 - Dung T. Tran, Phong T. Tran, Tu T. Tran:

A new approach to measure the utilizable bandwidth. 11:1-11:8 - Yeong-Tae Song, Tao Qiu:

Standard based Personal Mobile Health Record System. 12:1-12:8 - Hyun-Kyo Oh, Sang-Wook Kim:

Robust Features for Trustable Aggregation of Online Ratings. 13:1-13:7 - Naoki Shoji, Kazuya Matsuo, Akimitsu Kanzaki, Shojiro Nishio:

Energy-efficient topology construction for multi-attribute data gathering in WSNs. 14:1-14:8 - Tran Trung Tin, Gidong Lee, Trung Xuan Pham, Geun-Jun Kim, Dang Van Chien, Jong-Wook Kim, Bongsoon Kang:

Identification of In-Home Appliances through Analysis of Current Consumption. 15:1-15:5 - Hieu Ngoc Duong, Vu H. Nguyen, Tam M. Nguyen, Hien T. Nguyen

, Václav Snásel:
The Hybrid Approaches for Forecasting Real Time Multi-step-ahead Boiler Efficiency. 16:1-16:8 - Vu H. Nguyen, Hien T. Nguyen

, Hieu Ngoc Duong, Václav Snásel:
A syllable-based method for Vietnamese text compression. 17:1-17:6 - Alexander Yohan

, Nai-Wei Lo, Vincentius Randy, Shih-Jen Chen, Ming-Yuan Hsu:
A Novel Authentication Protocol for Micropayment with Wearable Devices. 18:1-18:7 - Song Jung, Sangwon Lee

:
Developing a Model for Continuous User Engagement in Social Media. 19:1-19:4 - Phuc H. Duong

, Hien T. Nguyen
, Vinh Phu Nguyen
:
Evaluating Semantic Relatedness Between Concepts. 20:1-20:8 - Phong Nguyen Tran, Dang Tuan Nguyen:

A Linked Data Driven Semantic Model for Interpreting English Queries in Question Answering System. 21:1-21:5 - Doan Van Tung, Nguyen Huu Thanh

, Tran Manh Nam, Nguyen Tai Hung
, Nguyen Xuan Dung:
Joint Vertical Handoff and Resource Allocation in OFDMA/TDD Systems based on Software-Defined Wireless Network. 22:1-22:8 - Jaewook Jung, Donghoon Lee, Jiye Kim, Youngsook Lee, Dongwoo Kang, Dongho Won:

Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash Function. 23:1-23:8 - Byeong-Oh Jo, Sang-Jun Lee, Jae Wook Jeon:

The Development of Hardware Architecture for Real-time Chain Code based on FPGA. 24:1-24:6 - Seong-Wook Jang, Byeong-Oh Jo, Sang-Jun Lee, Jae Wook Jeon:

The Development of the Hardware Architecture to Perform Template Matching using Distance Transform. 25:1-25:7 - Minhoon Yi, Donghyun Kang

, Minho Lee, Inhyeok Kim, Young Ik Eom:
Performance Analyses of Duplicated I/O Stack in Virtualization Environment. 26:1-26:6 - Saneyasu Yamaguchi, Akihiro Nakao, Masato Oguchi, Atsuhiro Goto, Shu Yamamoto:

Monitoring Dynamic Modification of Routing Information in OpenFlow Networks. 27:1-27:7 - Chansoo Oh, Donghyun Kang

, Minho Lee, Young Ik Eom:
A Buffer Cache Algorithm Using the Characteristic of Mobile Applications based on Hybrid Memory Architecture. 28:1-28:8 - Trung Xuan Pham, Chien Van Dang, Tri Minh Ngo

, Ki-Je Sung, Tran Trung Tin, Jong-Wook Kim:
A Monitoring System in Real Time based on Android Platform. 29:1-29:4 - Siti Salwa Bt Hasbullah

, Diana Maynard
, Rita Zaharah Wan-Chik
, Farahwahida Mohd
, Myzan Bt Noor
:
Automated Content Analysis: A Sentiment Analysis on Malaysian Government Social Media. 30:1-30:6 - Farahwahida Mohd

, Myzan Bt Noor
, Ezri Hielmi Che Daud, Siti Salwa Bt Hasbullah
:
Mobile Games Usability Using the Idea of Mark Overmars. 31:1-31:6 - Yohan Ko, Hyunjun Kim

, Hwansoo Han:
Escalating Memory Accesses to Shared Memory by Profiling Reuse. 32:1-32:8 - Kim Ryong, Park Kyung-Hye, Young-Kuk Kim

:
Improving Similarity Measurement of User's Rating Value using Sigmoid Function in Personalization System. 33:1-33:4 - Wan Hazimah Wan Ismail, Herny Ramadhani Mohd Husny Hamid, Norhaiza Ya Abdullah:

Smoke Detection Alert System via Mobile Application. 34:1-34:6 - Myzan Bt Noor, Farahwahida binti Mohd

, Siti Salwa Bt Hasbullah
:
The Social Media Dialogue through Ubiquitous Interactivity to Children's Cognitive Development. 35:1-35:9 - Satoshi Kamaishi, Ryuya Uda:

Biometric Authentication by Handwriting Using Leap Motion. 36:1-36:5 - Shohei Miyokawa, Taiki Tokuda, Saneyasu Yamaguchi:

Elasticity Improvement of Cassandra. 37:1-37:7 - Bach Tran, Nga Nguyen Thu

, Van-Duc Nguyen, Byeungwoo Jeon
:
Influence of the spatial correlation properties on coded MIMO-OFDM system performance based on SCM in Urban Microcell environment. 38:1-38:6 - Young Seo Lee, Jinho Kim, Seok Jin Jang, Jae Wook Jeon:

Automotive ECU Software Reprogramming Method Based on Ethernet Backbone Network to Save Time. 39:1-39:8 - Huong Ninh, Guee-Sang Lee:

Adaptive Features for MRF based Cosegmentation. 40:1-40:5 - Nguyen Ho Minh Duy, Tran Tuan Anh, Ngo Quoc Viet, Pham The Bao:

Identifying Species based on Relative Synonymous Codon Pair Usage combining K - means and SVM: An Application for Bacillus. 41:1-41:6 - Mohd Nizam Husen

, Sukhan Lee:
High Performance Indoor Location Wi-Fi Fingerprinting using Invariant Received Signal Strength. 42:1-42:6 - Jun-Ho Huh

, Taehoon Koh, Kyungryong Seo:
Design of a Shipboard Outside Communication Network and the Test Bed Using PLC: for the Workers' Safety Management During Ship-Building process. 43:1-43:6 - Honglin Sun, Xiaofeng Gao, Guihai Chen

, Jian Gu, Yongjian Wang:
Multiple Influence Maximization in Social Networks. 44:1-44:8 - Norhaidah Abu Haris

, Munaisyah Abdullah
, Nurdatillah Hasim
, Fauziah Abdul Rahman
:
A Study on Students Enrollment Prediction using Data Mining. 45:1-45:5 - Azmi Ahmad, Faizah Shaari:

Solving University/Polytechnics Exam Timetable Problem using Particle Swarm Optimization. 46:1-46:4 - Tomoaki Imajo, Kazutoshi Sumiya, Taketoshi Ushiama:

An SNS Based on Implicit Beneficial Social Relations in A Regional Community. 47:1-47:7 - Eita Fujishima, Saneyasu Yamaguchi:

Dynamic File Placing Control for Improving the I/O Performance in the Reduce Phase of Hadoop. 48:1-48:7 - Yasmin Yahya, Roslan Ismail:

Penetration of Sunlight in the Multilevel Crown: A Case Study in Tropical Rain Forest. 49:1-49:5 - Yusuke Inoue, Takakazu Imada, Syunya Doi, Lei Chen, Takehito Utsuro, Yasuhide Kawada:

Clustering Search Engine Suggests by Modeling Topics of Web Pages collected with Suggests. 50:1-50:7 - Takakazu Imada, Yusuke Inoue, Lei Chen, Syunya Doi, Takehito Utsuro, Yasuhide Kawada:

Analyzing Concerns on Companies through Statistics of Search Engine Suggests and its Correlation to Market Share. 51:1-51:8 - Han Jun Kim, Kyung-Hoon Lee, Hyung-Jin Choi:

A Novel Weighting Method for Multiple OTDOA based Positioning in 3GPP LTE System. 52:1-52:4 - Kouta Sawada, Ryuya Uda:

Effective CAPTCHA with Amodal Completion and Aftereffects. 53:1-53:5 - Yuko Kurosaki, Atsuko Takefusa, Hidemoto Nakada

, Masato Oguchi:
A Study of Load Balancing between Sensors and the Cloud for a Real-Time Video Streaming Analysis Application Framework. 54:1-54:6 - Nurdatillah Hasim

, Norhaidah Abu Haris
, Aedah Abd Rahman
:
Defect Density: A Review of the Calculation Based on System Size. 55:1-55:4 - Tuan Anh Pham, Nhan Le Thanh:

An Ontology-based Approach for Business Process Compliance Checking. 56:1-56:6 - Won-Jin Lee, Syed Tariq Shah

, Daniyal Munir
, Tae-Jin Lee, Min Young Chung:
A Mechanism on Energy Harvesting and Data Communications in Wi-Fi Network. 57:1-57:6 - Takumi Nohara, Ryuya Uda:

Personal Identification by Flick Input Using Self-Organizing Maps with Acceleration Sensor and Gyroscope. 58:1-58:6 - Yonghee Kim, HaRim Jung, JaeHee Jang, Ung-Mo Kim:

An Efficient Grid Index for Moving Objects in Indoor Environments. 59:1-59:4 - Tri D. T. Nguyen, Chan Ho Yong, Xuan-Qui Pham, Huu-Quoc Nguyen, Ton Thi Kim Loan, Eui-Nam Huh:

An Index Scheme for Similarity Search on Cloud Computing using MapReduce over Docker Container. 60:1-60:6 - Azizah Rahmat

, Suzana Kassim, Mohd Hasan Selamat, Sa'adah Hassan
:
Actor in Multi Product Line. 61:1-61:8 - Jusop Choi, William Aiken, Jungwoo Ryoo, Hyoungshick Kim:

Bypassing the Integrity Checking of Rights Objects in OMA DRM: a Case Study with the MelOn Music Service. 62:1-62:5 - Chenyutao Ke, Hiroaki Anada, Junpei Kawamoto, Kirill Morozov, Kouichi Sakurai:

Cross-group Secret Sharing for Secure Cloud Storage Service. 63:1-63:8 - Cuong Pham, Nguyen Thi Thanh Thuy:

Real-Time Traffic Activity Detection Using Mobile Devices. 64:1-64:7 - Dinh-Mao Bui, Thien Huynh-The, Sungyoung Lee:

Fuzzy Fault Detection in IaaS Cloud Computing. 65:1-65:6 - Dinh-Quyen Nguyen, Dinh Dam Le:

Hyper Word Clouds: A Visualization Technique for Last.fm Data and Relationships Examination. 66:1-66:7 - Manh Cong Tran

, Yasuhiro Nakamura:
Web Access Behaviour Model for Filtering Out HTTP Automated Software Accessed Domain. 67:1-67:4 - Tomohisa Ishikawa, Kouichi Sakurai:

A Study of Security Management with Cyber Insurance. 68:1-68:6 - JaeHee Jang, HaRim Jung, Yonghee Kim, Ung-Mo Kim:

An Efficient Method for Monitoring Continuous Top-k Queries. 69:1-69:4 - Woobin Kim, Jungha Jin, Keecheon Kim:

A Routing Protocol Method that sets up Multi-hops in the Ad-hoc network. 70:1-70:6 - Duc Duong, Toan Nguyen, Minh Dang:

Stock Market Prediction using Financial News Articles on Ho Chi Minh Stock Exchange. 71:1-71:6 - Hung Ba Ngo, Nhan Cao Tran, Loc Huu Nguyen:

Auto-Scaling to Increase Throughput of Enterprise Applications on Private Clouds. 72:1-72:7 - Thi Ngoc Hien Doan

, Van Khang Nguyen, Ngoc Chien Dao:
A Textile Antenna for Wearable Applications Using RFID Technology. 73:1-73:4 - Jinhyuk Yim

, Hyochun Ahn, Young-Bae Ko:
The Betweenness Centrality based Geographic Routing Protocol for Unmanned Ground Systems. 74:1-74:4 - Young-Gab Kim

, Yonghan Lee:
Context Information-based Application Access Control Model. 75:1-75:5 - Zeeshan Hameed Mir, Jaebeom Kim, Young-Bae Ko, Fethi Filali

:
Improved Multi-hop Routing in Integrated VANET-LTE Hybrid Vehicular Networks. 76:1-76:6 - Hiroshi Shimanuki, Yasuhiro Kinoshita, Toyohide Watanabe, Koichi Asakura, Hideki Sato:

Operational Support for Origami Beginners by Correcting Mistakes. 77:1-77:8 - Kang-Min Kim, Gyu-Jin Kim, Gyu-Jin Jang, Young-Nam Kim, Moon-Hyun Kim:

MLP based Pedestrian Counting. 78:1-78:6 - Bokuk Park, Sung-Hwan Kim, Taeyong Kim, Jinkwan Park, Hwan-Gue Cho:

Virtual Running of GPS Vehicles for Trajectory Analysis. 79:1-79:8 - Hoa T. Le, Larry A. Vea:

A Customer Emotion Recognition through Facial Expression using Kinect Sensors v1 and v2: A Comparative Analysis. 80:1-80:7 - Berihun Fekade, Taras Maksymyuk

, Minho Jo
:
A Virtual Server QoS Enhancement Method in Cloud Computing. 81:1-81:3 - Nguyen Dong Phuong

, Vo Thi Ngoc Chau, Ho Tu Bao:
A Hybrid Semi-supervised Learning Approach to Identifying Protected Health Information in Electronic Medical Records. 82:1-82:8 - Minh T. X. Pham, Tru Hoang Cao, Huy Minh Huynh

:
Candidate Searching and Key Coreference Resolution for Wikification. 83:1-83:5 - SungBaek Yoon, Seho Bae, Hanjae Park, Liu Hua, Ziqi Zheng, Juneho Yi:

Efficiently Exploiting the Context of Object-Action Context for Object Recognition. 84:1-84:4 - Chuan Pham

, Nguyen Hoang Tran, Minh N. H. Nguyen, Jae Hyeok Son, Choong Seon Hong
:
Hosting Virtual Machines on Distributed Datacenters. 85:1-85:5 - Tuan LeAnh, Saeed Ullah

, Nguyen Hoang Tran, Sung Soo Kim, Seung Il Moon, Choong Seon Hong
:
Coalitional Game Theoretic Approach for Cooperation in Heterogeneous Cognitive Wireless Networks. 86:1-86:6 - Tai Manh Ho, Nguyen Hoang Tran, S. M. Ahsan Kazmi, Seung Il Moon, Choong Seon Hong

:
Distributed Pricing Power Control for Downlink Co-tier Interference Coordination in Two-Tier Heterogeneous Networks. 87:1-87:7 - Ahmad Fahmi Hj. Mohamad, Jessifa Joana Mohd Supian, Muhammad Syafiq Md Ribuan:

Digital Congkak: The Art, Play and Experience Framework. 88:1-88:6 - Min Wei, Ruixiang Chen, Shunbin He:

A Secure Data Aggregation Approach in Hierarchical Wireless Sensor Networks. 89:1-89:7 - Tae Yeong Kim, Dong In Kim

:
Cluster-based Collaborative Caching for Amorphous User Cell Association. 90:1-90:6 - Hyun Young Kim, Bomyeong Kim, Jinwoo Kim:

The Naughty Drone: A Qualitative Research on Drone as Companion Device. 91:1-91:6 - Hyo-Haeng Lee, Eun-Joo Seo, Ji-Su Yang, Sang-Min Park, Kwang-Seok Hong:

Video-based Bio-Signal Measurements for a Mobile Healthcare System. 92:1-92:5 - Taeyeon Kim, Nguyen Anh Tu

, Young-Koo Lee:
Efficient Content-based Image Retrieval for Multi-Image Queries. 93:1-93:6 - Jinwoo Jeon, Jun-Cheol Park, Youngjoo Jo, Changmo Nam, Kyung-Hoon Bae, Youngkyoo Hwang, Dae-Shik Kim:

A Real-time Facial Expression Recognizer using Deep Neural Network. 94:1-94:4 - Jihyun Ha, Jong-Seok Lee

:
A New Under-Sampling Method Using Genetic Algorithm for Imbalanced Data Classification. 95:1-95:6 - BeomSeok Kim, Jinsung Cho, Dae-Young Kim, Ben Lee:

ACESS: Adaptive Channel Estimation and Selection Scheme for Coexistence Mitigation in WBANs. 96:1-96:4 - Changmo Nam, Jun-Cheol Park, Dae-Shik Kim:

Indoor Human Activity Recognition with Contextual Cues in Videos. 97:1-97:4 - Weiwei Yuan, Donghai Guan, Taeyeon Kim, Young-Koo Lee:

OS_Searching: Optimized Skeleton based Recommender Searching Mechanism for the Trust-Aware Recommender System. 98:1-98:4 - Youngjoo Jo, Jun-Cheol Park, Jinwoo Jeon, Changmo Nam, Junghee Han, Yongin Park, Dae-Shik Kim:

A Real-time Object Tracker equipped with Deep Object Recognizer. 99:1-99:4 - Jaesub Yun, Jihyun Ha, Jong-Seok Lee

:
Automatic Determination of Neighborhood Size in SMOTE. 100:1-100:8 - Thuong Le-Tien, Thien Huynh-The, Sungyoung Lee, Yongik Yoon:

An Interactive Activity Recognition Approach Using Articulated-Body Estimation and Pose-Based Features. 101:1-101:8 - Sangjun Koo, Gary Geunbae Lee, Hwanjo Yu:

Mathematical Model for Processing Multi-user Requests on POMDP Hybrid Dialog Management. 102:1-102:4 - Duc-Tai Le

, Thang Le Duc
, Yechan Park, Ho-Jin Hwang, Vyacheslav V. Zalyubovskiy, Hyunseung Choo:
Parameterized Collision Tolerant Scheduling for Broadcast Latency Minimization in Duty-cycled Wireless Sensor Networks. 103:1-103:4 - Rajesh Challa, Syed M. Raza

, Sangyep Nam, Hyunseung Choo:
SD-MONET: Software Defined Mobility Management in Enterprise HetNet. 104:1-104:6 - Thang Le Duc

, Duc-Tai Le
, Dung T. Nguyen
, Byung-Seok Kang
, Hyunseung Choo, Vyacheslav V. Zalyubovskiy:
A Distributed Scheme for Broadcast Scheduling in Duty-cycled Wireless Sensor Networks. 105:1-105:6 - Syed M. Raza

, Donghan Park, Yongdeuk Park, Kang-Woo Lee, Hyunseung Choo:
Dynamic Load Balancing of Local Mobility Anchors in Software Defined Networking based Proxy Mobile IPv6. 106:1-106:4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














