


default search action
RACS 2011: Miami, FL, USA
- Rex E. Gantenbein, Tei-Wei Kuo:

Research in Applied Computation Symposium, RACS '11, Miami, FL, USA, October 19-22, 2011. ACM 2011, ISBN 978-1-4503-1087-1
System software
- Wanyong Tian, Jianhua Li, Yingchao Zhao

, Chun Jason Xue
, Minming Li
, Enhong Chen:
Optimal task allocation on non-volatile memory based hybrid main memory. 1-6 - Yongsuk Choi, Jongmoo Choi, Eun-Yong Ha:

RTRP: right time right place kernel analysis tool. 7-12 - Jain-Yu Ou, Ya-Shu Chen:

QoS optimization for thermal-aware cyber-physical systems. 13-19 - Young-Sik Eom, Seong Tae Jhang, Chu-Shik Jhon:

Throttling capacity sharing in private L2 caches of CMPs. 20-24 - Yun Kyo Cho, Seong Tae Jhang, Chu Shik Jhon:

Selective word reading for high performance and low power processor. 25-30 - Shih-Hao Hung

, Po-Hsun Chiu, Chi-Sheng Shih
:
Building a scalable and portable message-passing library for embedded multicore systems. 31-37 - Seung Gu Kang, Hong Jun Choi, Cheol Hong Kim, Sung Woo Chung, Dongseop Kwon, Joong Chae Na:

Exploration of CPU/GPU co-execution: from the perspective of performance, energy, and temperature. 38-43 - Jinbin Ju, Quan Jinguo, Qian Chen, Yan Zhang:

Fine-grained analysis and design of ASIP instruction set for application of encryption. 44-49 - Rize Jin, Se Jin Kwon

, Tae-Sun Chung:
FlashB-tree: a novel B-tree index scheme for solid state drives. 50-55 - Hwayoung Choe, Jihun Baek, Hoeheon Jeong, Sangwon Park:

MetaService: an object transfer platform between Android applications. 56-60 - Do Hyun Bae, Munkhbayar Bayartsogt, Jin Suk Kim:

An algorithm for solving massive matrix inversion in cloud computing systems. 61-66 - Yu Du, Hongbing Xiao, Chunyu Bai, Kang Yen:

A fourth-order PLL design for high-voltage converter in airbag electronic safety. 67-70 - Frédéric Fauberteau

, Serge Midonnet:
Robust partitioning for real-time multiprocessor systems with shared resources. 71-76 - Brian Clark, Ingo Stierand, Eike Thaden

:
Cost-minimal pre-allocation of software tasks under real-time constraints. 77-83 - Seung-Jin Moon, Hong-Kyu Kim, Suk-Jun Oh, Sanghoon Lee:

A new real-time location tracking techniques using Doppler radar and bio-sensors in WSN. 84-89 - Joongjin Kook

, Sanghoon Choi, Kanghee Kim, Jiman Hong:
An efficient checkpoint scheme for the fast mount of flash file system. 90-92 - Su Goog Shon, Hee-Jung Byun:

Design and implementation of embedded MVB-ethernet interface. 93-96 - Sukil Hong, Eunseok Choi, Hong Min, Sangho Yi, Junyoung Heo

, Jiman Hong:
SPRS: standby power reduction system for efficient power management. 97-99 - Kwang-Soon Choi, Eunseok Choi, Ha-Bong Chung:

Design and implementation of energy saving system. 100-103 - Minwoo Jang, Kukhyun Kim, Kanghee Kim:

The performance analysis of ARM NEON technology for mobile platforms. 104-106 - Seungho Jeong, Heejune Ahn:

Optimal power reduction based on DVFS algorithm for video decoders. 107-109 - Junghoon Lee, Gyung-Leen Park, Hye-Jin Kim, Hongbeom Jeon:

Fast scheduling policy for electric vehicle charging stations in smart transportation. 110-112
Network computing
- Giang Hai Tong, Subodh Pudasaini, Seokjoo Shin:

Adaptive best-M feedback scheduling in multiuser OFDMA systems. 113-117 - JuHyun Lee, Hoyoung Hwang, KyeongHo Park, Chang-Gun Lee, Sung-Soo Lim:

Delay-bandwidth normalized service sharing with service rate guarantees. 118-123 - He Li, Kyoung Soo Bok, Jaesoo Yoo:

An efficient clustering method for unstructured mobile peer-to-peer networks. 124-129 - Joonhyouk Jang, Jinman Jung, Yookun Cho, Kyujin Choi, Gwangil Jeon, Yoojin Chung, Jinsoup Joung:

An internet protocol stack for high-speed transmission in a non-OS environment. 130-134 - Myungsu Cha, Mihui Kim, Moonseong Kim, Hyunseung Choo:

Adaptive duty-cycling based on group size for energy balance of sensor nodes in wireless sensor networks. 135-140 - Lin Xing, Wei Wang, Gensheng Zhang, Feifei Gao, Xuewen Liao, Tigang Jiang:

Quality-assured energy balancing for multi-hop wireless multimedia networks via 2-D channel coding rate allocation. 141-145 - Shigeru Imai, Carlos A. Varela:

Light-weight adaptive task offloading from smartphones to nearby computational resources. 146-152 - Esmaeil S. Nadimi

, Victoria Blanes-Vidal, Vahid Tarokh:
Localization of mobile nodes based on inaccurate round-trip-time measurements using Bayesian inference. 152-157 - Minjoon Ahn, Dongsoo S. Kim, Moonseong Kim, Hyunseung Choo:

Path quality aware fair load distribution for data aggregation in unreliable wireless sensor networks. 158-163 - Deepesh Man Shrestha, Cheolgi Kim, Young-Bae Ko:

A reliable multi-grid routing protocol for tactical MANETs. 164-169 - Hong-Jong Jeong, Sungwon Lee, Dongkyun Kim, Kyungshik Lim, Jungsoo Park:

Proxy protocol and PMIPv6 based mobility management for IEEE 802.11s wireless mesh networks. 170-176 - Kazi Moinul Islam, Mohammad Salehizadeh

, Amir G. Aghdam:
Characterization of the line configuration in wired communication networks. 177-182 - Peter Brass

, Hyeon-Suk Na:
Sensor redundancy check without geometric information. 183-186
Information convergence
- Yang Zhang, Mojia Sun, Chih-Cheng Hung, Edward Jung:

An empirical study on the effectiveness of hyperspectral image classification algorithms with dimensionality reduction. 187-191 - Tomás Cerný

, Eunjee Song:
UML-based enhanced rich form generation. 192-199 - Kuan-Chun Chuang, Chi-Sheng Shih

, Shih-Hao Hung
:
User behavior augmented software testing for user-centered GUI. 200-208 - Katarzyna Antosz, Slawomir Swirad, Dorota Niec, Piotr Osinski, Katarzyna Zapart:

Safena and QBPM: a proposition for modeling and enacting processes in supply chain network. 209-215 - Jae-Min Lee, Oh-Jin Kwon, Ho-Shin Lee, Byoung-Yul Coh, Y. W. Park:

A research on the method to select promising scientific technologies in the condensed matter physics by using journal's editing preference. 216-219 - Jucheol Moon, Sung Y. Shin, Donghoon Kang, Soon-Ik Jeon, Hyung Do Choi, Jung-Yeop Kim:

Agglomerated feature extractionin medical images for breast cancer and its characteristic pattern generation. 220-225 - Donghoon Kang, Sung Y. Shin, Chang Oan Sung, Jung-Yeop Kim, Jeong-Ki Pack, Hyung Do Choi:

An improved method of breast MRI segmentation with simplified K-means clustered images. 226-231 - Gensheng Zhang, Wei Wang, Jucheol Moon, Jeong-Ki Pack, Soon-Ik Jeon:

A review of breast tissue classification in mammograms. 232-237 - Bum-Geun Heo, Nara Shin, Kicheon Hong:

A study on a system for measuring curvature and slope through edge information extraction of an electric pole partially hidden by an obstacle. 238-240 - Chulhun Kim, Junghoon Shin, Sangjun Lee:

Design and implementation of a simple 3D-orthodontia simulation system for malocclusion treatment. 241-244 - Wonik Park, Sanggil Kang, Young-Kuk Kim

:
Personalized mobile e-commerce system using DISC psychological model. 245-248 - W. Shim, Kang-hoe Kim, Keun-hwan Kim

, Yeongho Moon, Oh-Jin Kwon:
Effect of inter-enterprise collaboration on the value of enterprise. 249-251 - Jongseok Kang, Hyuck Jai Lee, Yeongho Moon:

Systematic monitoring of competitors' patents using 2-dimensional hybrid similarity method. 252-254
Reliable computing
- Yung-Feng Lu, Chin-Fu Kuo, Ai-Chun Pang:

A half-key key management scheme for wireless sensor networks. 255-260 - Edward Jung, Chih-Cheng Hung, Guangzhi Ma, Seonho Choi:

The investigation of the structural properties of machines for the design of secure and trustworthy systems. 261-265 - HongGeun Kim, Dong-Jin Kim, Seong-je Cho, Moonju Park, Minkyu Park:

An efficient visitation algorithm to improve the detection speed of high-interaction client honeypots. 266-271 - Edward Jung, Chih-Cheng Hung, Guangzhi Ma, Seonho Choi:

A unified design method utilizing decomposability and composability for secure systems. 272-276 - Behtash Babadi, Vahid Tarokh:

Regularized recursive least squares for anomaly detection in sparse channel tracking applications. 277-281 - Jiyeon Park, Bongjae Kim

, Sung-Ryul Kim, Jin-Hyun Yoon, Yookun Cho:
Performance analysis of security enforcement on Android operating system. 282-286 - Boojoong Kang, Hye Seon Kim, TaeGuen Kim, Heejun Kwon, Eul Gyu Im

:
Fast malware family detection method using control flow graphs. 287-292 - Sheikh Iqbal Ahamed, Chowdhury Sharif Hasan, Md Munirul Haque, Md. Osman Gani:

Towards TTP-free lightweight solution for location privacy using location-based anonymity prediction. 293-297 - Kyoung-Soo Han, Boojoong Kang, Eul Gyu Im

:
Malware classification using instruction frequencies. 298-300
Programming languages
- Junho Choi, Chang Choi

, Dongjin Choi, Jingwang Koh, Pankoo Kim:
Semantic relation extraction for automatically building domain ontology using a link grammar. 301-306 - Mengwei Ding, Long Zheng, Yanchao Lu, Li Li, Song Guo

, Minyi Guo:
More convenient more overhead: the performance evaluation of Hadoop streaming. 307-313 - Jungsik Choi

, Seonggun Kim, Hwansoo Han:
Accelerating loops for coarse grained reconfigurable architectures using instruction extensions. 314-318
Artificial intelligence
- Sung-Kwun Oh, Wook-Dong Kim, Byoung-Jun Park:

A design of dynamically simultaneous search GA-based fuzzy neural networks: comparative analysis of FS and FR-based rules. 319-324 - Shubhamoy Dey:

A multi-classifier system for text categorization. 325-329 - Wei Huang, Sung-Kwun Oh, Keon-Jun Park, Yong-Kab Kim:

A comparative study of information granulation-based fuzzy inference systems developed by means of space optimization algorithm (SOA) and genetic algorithms. 330-335

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














