


default search action
Journal of Digital Content Technology and its Applications, Volume 2
Volume 2, Number 1, March 2008
- Kyung-Min Min, Nam-Hyuk Ham, Ju-Hyung Kim, Yoon-Sun Lee, Jae-Jun Kim:

An Application Strategy for PLM in Construction Industry. 4-10 - Hyung Rim Choi, Yavuz Keceli, Min Je Cho:

An Analysis Present Condition of Information Systems in Turkish Ports and Direction of Improvement. 11-19 - Suk-hyung Hwang, Yu-Kyung Kang:

Hierarchical Triadic Context Analysis for Folksonomy-Based Web Applications. 20-27 - Mohammad Shirali-Shahreza:

M-Brochure. 28-34 - Liang Li, Bin Li, Junwu Zhu:

Towards a Coordination Infrastructure for Pervasive Computing Environment Based on Tuplespace and Semantic Web. 35-45 - Xiuxiu Dong, Tiejun Lu, Guicai Hu:

Design and Simulation of Novel Single-Input Sampling Instance Control Circuit. 46-50 - Haining Lee, Jaeil Park, Peom Park, Dongmin Shin:

Specifying a WS-ECA Working Framework for Ubiquitous Web Services in Object-Process Methodology. 51-60 - Yoon-Su Jeong, Yong-Tae Kim, Gil-Cheol Park, Sang Ho Lee:

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN. 61-66 - C. J. Lim, Younghwan Pan, Jane Lee:

Human Factors and Design Issues in Multimodal (Speech/Gesture) Interface. 67-77
Volume 2, Number 2, July 2008
- Robin A. Christian, Ravindra K. Lad, Ashok W. Deshpande, N. G. Desai:

Fuzzy MCDM approach for addressing composite index of water and air pollution potential of industries. 64-71 - Fatemeh NasserEslami, Mehdi Fasanghari, H. R. Khodabandeh, Ali Abdollahi:

Classification of IT Governance Tools for Selecting the Suitable One in an Enterprise. 4-10 - Tsang-Yean Lee, Huey-Ming Lee, Wuu-Yee Chen, Heng-Sheng Chen:

Processing Logical Access Control Command in Computer System. 11-15 - Young S. Han:

A Non Scale Free Attribute of Convergent Address Window for Private Messaging. 16-19 - Nik Ghazali Nik Daud, Wan Adilah Wan Adnan, Nor Laila Md. Noor:

Information Visualization Techniques and Decision Style: The Effects in Decision Support Environments. 20-24 - Chiew Kang Leng, Jane Labadin, Sarah Flora Samson Juan:

Steganography: DCT Coefficients Reparation Technique in JPEG Image. 35-41 - Usman Qayyum:

Efficiency Enhancement of Neural Network with Phase Only Correlation. 42-47 - Do-Un Jeong, Wan-Young Chung:

Development and Validation of a New Method for Noninvasive Diagnosis of LUTS. 48-54 - Hyung Moo Kim, Hoon Sung Kwak, Jae Soo Yoo:

Improved Clustering Algorithm for Change Detection in Remote Sensing. 55-59 - Hyontai Sug:

A Rule Set Generation Technique for Better Decision Making. 60-63
Volume 2, Number 3, December 2008
- Shafiullah Khan, Noor Mast, Kok-Keong Loo, Ayesha Salahuddin:

Passive Security Threats and Consequences in IEEE 802.11 Wireless Mesh Networks. 4-8 - Sana Ullah, Henry Higgins, Young-Woo Choi, Hyung-Soo Lee, Kyung Sup Kwak:

Towards RF Communication and Multiple Access Protocols in a Body Sensor Network. 9-16 - Shu-Ching Wang, Tzu-Chih Chung, Kuo-Qin Yan:

DVRC-iTV: Download Variable Remote Control for Interactive TV. 26-35 - Nam-Kyun Kim, Mu-wook Pyeon, Jae-sun Park, Kyu-Shick Lee, Byung-Sun Yoo:

Disaster Management Design in Tunnels for u-City Embodiment. 36-39 - Hieu Trung Huynh, Yonggwan Won:

Weighted Least Squares Scheme for Reducing Effects of Outliers in Regression based on Extreme Learning Machine. 40-46 - B. Sasikumar, V. Vasudevan:

An agent based TCP/IP for Wireless Networks. 47-52 - Wenli Dong:

Translation from GDMO/ASN.1 to tML/Schema. 17-25

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














