callback( { "result":{ "query":":facetid:toc:\"db/conf/csa2/csa2017.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"69.67" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"235", "@dc":"235", "@oc":"235", "@id":"43374292", "text":":facetid:toc:db/conf/csa2/csa2017.bht" } }, "hits":{ "@total":"235", "@computed":"235", "@sent":"235", "@first":"0", "hit":[{ "@score":"1", "@id":"2682589", "info":{"authors":{"author":[{"@pid":"p/JongHyukPark","text":"James J. Park"},{"@pid":"35/3222","text":"Vincenzo Loia"},{"@pid":"54/6199","text":"Gangman Yi"},{"@pid":"22/7652","text":"Yunsick Sung"}]},"title":"Advances in Computer Science and Ubiquitous Computing - CSA/CUTE 2017, Taichung, Taiwan, 18-20 December.","venue":["CSA/CUTE","Lecture Notes in Electrical Engineering"],"volume":"474","publisher":"Springer","year":"2018","type":"Editorship","key":"conf/csa2/2017","doi":"10.1007/978-981-10-7605-3","ee":"https://doi.org/10.1007/978-981-10-7605-3","url":"https://dblp.org/rec/conf/csa2/2017"}, "url":"URL#2682589" }, { "@score":"1", "@id":"2899578", "info":{"authors":{"author":[{"@pid":"49/3283-10","text":"Wei Liu 0010"},{"@pid":"24/1518","text":"Xin Chen"},{"@pid":"90/10554","text":"Bolun Chen"},{"@pid":"92/1375-1","text":"Jin Wang 0001"},{"@pid":"17/1237-5","text":"Ling Chen 0005"}]},"title":"An Efficient Algorithm for Influence Maximization Based on Propagation Path Analysis.","venue":"CSA/CUTE","pages":"836-845","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/0010CCW017","doi":"10.1007/978-981-10-7605-3_133","ee":"https://doi.org/10.1007/978-981-10-7605-3_133","url":"https://dblp.org/rec/conf/csa2/0010CCW017"}, "url":"URL#2899578" }, { "@score":"1", "@id":"2899579", "info":{"authors":{"author":[{"@pid":"10/2603","text":"Dhiah el Diehn I. Abou-Tair"},{"@pid":"28/2562","text":"Sahel Alouneh"},{"@pid":"00/3078","text":"Alá F. Khalifeh"},{"@pid":"64/1102","text":"Roman Obermaisser"}]},"title":"A Security Framework for Systems-of-Systems.","venue":"CSA/CUTE","pages":"427-432","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/Abou-TairAKO17","doi":"10.1007/978-981-10-7605-3_70","ee":"https://doi.org/10.1007/978-981-10-7605-3_70","url":"https://dblp.org/rec/conf/csa2/Abou-TairAKO17"}, "url":"URL#2899579" }, { "@score":"1", "@id":"2899580", "info":{"authors":{"author":[{"@pid":"237/3856","text":"Wedad Ahmed"},{"@pid":"04/1597","text":"Mourad Elhadef"}]},"title":"Securing Intelligent Vehicular Ad Hoc Networks: A Survey.","venue":"CSA/CUTE","pages":"6-14","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/AhmedE17","doi":"10.1007/978-981-10-7605-3_2","ee":"https://doi.org/10.1007/978-981-10-7605-3_2","url":"https://dblp.org/rec/conf/csa2/AhmedE17"}, "url":"URL#2899580" }, { "@score":"1", "@id":"2899581", "info":{"authors":{"author":[{"@pid":"35/8866","text":"Javid Ali"},{"@pid":"160/0715","text":"Raja Wasim Ahmad"},{"@pid":"139/3147","text":"Tahir Maqsood"},{"@pid":"120/9719","text":"Junaid Shuja"},{"@pid":"139/8277","text":"Yung-Wey Chong"},{"@pid":"16/4567","text":"Soongohn Kim"},{"@pid":"189/2767","text":"Kwangman Ko"}]},"title":"Adaptive Opportunistic Routing over DTMANETS: Proposals and Issues.","venue":"CSA/CUTE","pages":"1126-1133","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/AliAMSCKK17","doi":"10.1007/978-981-10-7605-3_180","ee":"https://doi.org/10.1007/978-981-10-7605-3_180","url":"https://dblp.org/rec/conf/csa2/AliAMSCKK17"}, "url":"URL#2899581" }, { "@score":"1", "@id":"2899582", "info":{"authors":{"author":[{"@pid":"28/2562","text":"Sahel Alouneh"},{"@pid":"10/2603","text":"Dhiah el Diehn I. Abou-Tair"},{"@pid":"00/3078","text":"Alá F. Khalifeh"},{"@pid":"64/1102","text":"Roman Obermaisser"}]},"title":"Service Identification Framework for Systems of Systems Based on MPLS Technology.","venue":"CSA/CUTE","pages":"359-364","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/AlounehAKO17","doi":"10.1007/978-981-10-7605-3_59","ee":"https://doi.org/10.1007/978-981-10-7605-3_59","url":"https://dblp.org/rec/conf/csa2/AlounehAKO17"}, "url":"URL#2899582" }, { "@score":"1", "@id":"2899583", "info":{"authors":{"author":[{"@pid":"212/3648","text":"KwangEun An"},{"@pid":"212/3763","text":"SungWon Lee"},{"@pid":"212/3698","text":"Young Ju Jeong"},{"@pid":"58/2497","text":"Dongmahn Seo"}]},"title":"Pedestrian-Safe Smart Crossing System Based on IoT with Object Tracking.","venue":"CSA/CUTE","pages":"926-931","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/AnLJS17","doi":"10.1007/978-981-10-7605-3_147","ee":"https://doi.org/10.1007/978-981-10-7605-3_147","url":"https://dblp.org/rec/conf/csa2/AnLJS17"}, "url":"URL#2899583" }, { "@score":"1", "@id":"2899584", "info":{"authors":{"author":[{"@pid":"239/0106","text":"Yoonil Auh"},{"@pid":"239/0073","text":"Heejung Raina Sim"}]},"title":"Ubiquitous Learning and Digital Badges in the Age of Hyper-connectivity.","venue":"CSA/CUTE","pages":"1464-1469","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/AuhS17","doi":"10.1007/978-981-10-7605-3_233","ee":"https://doi.org/10.1007/978-981-10-7605-3_233","url":"https://dblp.org/rec/conf/csa2/AuhS17"}, "url":"URL#2899584" }, { "@score":"1", "@id":"2899585", "info":{"authors":{"author":[{"@pid":"246/4075","text":"Moonsung Bae"},{"@pid":"15/6835","text":"Byongjun Lee"}]},"title":"An Improving Algorithm of Generator Reactive Power Reserves Calculation Considering Effective Generators in IEEE-39 System.","venue":"CSA/CUTE","pages":"233-239","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/BaeL17","doi":"10.1007/978-981-10-7605-3_39","ee":"https://doi.org/10.1007/978-981-10-7605-3_39","url":"https://dblp.org/rec/conf/csa2/BaeL17"}, "url":"URL#2899585" }, { "@score":"1", "@id":"2899586", "info":{"authors":{"author":[{"@pid":"246/4075","text":"Moonsung Bae"},{"@pid":"15/6835","text":"Byongjun Lee"}]},"title":"Load Loss Coefficient and Power Loss Tracing in Power Systems.","venue":"CSA/CUTE","pages":"240-247","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/BaeL17a","doi":"10.1007/978-981-10-7605-3_40","ee":"https://doi.org/10.1007/978-981-10-7605-3_40","url":"https://dblp.org/rec/conf/csa2/BaeL17a"}, "url":"URL#2899586" }, { "@score":"1", "@id":"2899587", "info":{"authors":{"author":[{"@pid":"246/4075","text":"Moonsung Bae"},{"@pid":"15/6835","text":"Byongjun Lee"}]},"title":"A Power Generation Rescheduling Method Under Power Flow Constraints Using Power Flow Tracing.","venue":"CSA/CUTE","pages":"248-252","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/BaeL17b","doi":"10.1007/978-981-10-7605-3_41","ee":"https://doi.org/10.1007/978-981-10-7605-3_41","url":"https://dblp.org/rec/conf/csa2/BaeL17b"}, "url":"URL#2899587" }, { "@score":"1", "@id":"2899588", "info":{"authors":{"author":[{"@pid":"200/5698","text":"Seungsuk Baek"},{"@pid":"40/3016","text":"Jung-Won Lee"},{"@pid":"32/3534","text":"Byungjeong Lee"}]},"title":"Towards Recovering Fault Traceability Links by Using Information Retrieval Technique.","venue":"CSA/CUTE","pages":"1180-1185","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/BaekLL17","doi":"10.1007/978-981-10-7605-3_188","ee":"https://doi.org/10.1007/978-981-10-7605-3_188","url":"https://dblp.org/rec/conf/csa2/BaekLL17"}, "url":"URL#2899588" }, { "@score":"1", "@id":"2899589", "info":{"authors":{"author":[{"@pid":"179/7648","text":"Dusan Baek"},{"@pid":"192/3847","text":"Jong-Hwan Shin"},{"@pid":"32/3534","text":"Byungjeong Lee"},{"@pid":"40/3016","text":"Jung-Won Lee"}]},"title":"Defect Management Method for Content-based Document Artifact Test in Software R&D Project.","venue":"CSA/CUTE","pages":"1192-1198","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/BaekSLL17","doi":"10.1007/978-981-10-7605-3_190","ee":"https://doi.org/10.1007/978-981-10-7605-3_190","url":"https://dblp.org/rec/conf/csa2/BaekSLL17"}, "url":"URL#2899589" }, { "@score":"1", "@id":"2899590", "info":{"authors":{"author":[{"@pid":"246/4010","text":"Junqi Bai"},{"@pid":"246/4122","text":"Chuanwen Chang"},{"@pid":"61/372","text":"Wen Liu"}]},"title":"Stripe Noise Correction for Infrared Imaging System Using Neural Network Theory.","venue":"CSA/CUTE","pages":"677-682","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/BaiCL17","doi":"10.1007/978-981-10-7605-3_109","ee":"https://doi.org/10.1007/978-981-10-7605-3_109","url":"https://dblp.org/rec/conf/csa2/BaiCL17"}, "url":"URL#2899590" }, { "@score":"1", "@id":"2899591", "info":{"authors":{"author":[{"@pid":"58/1197","text":"Hongtao Bai"},{"@pid":"181/0413","text":"Jinwei Fang"},{"@pid":"246/4087","text":"Fengxu Zhang"},{"@pid":"53/10178","text":"Xiaomeng Sun"}]},"title":"A Parallel Adaptive Circumference Method with OpenMP.","venue":"CSA/CUTE","pages":"748-755","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/BaiFZS17","doi":"10.1007/978-981-10-7605-3_120","ee":"https://doi.org/10.1007/978-981-10-7605-3_120","url":"https://dblp.org/rec/conf/csa2/BaiFZS17"}, "url":"URL#2899591" }, { "@score":"1", "@id":"2899592", "info":{"authors":{"author":[{"@pid":"246/4116","text":"Sarah Baras"},{"@pid":"242/4471","text":"Iman Saeed"},{"@pid":"237/4066","text":"Hadeel A. Tabaza"},{"@pid":"04/1597","text":"Mourad Elhadef"}]},"title":"VANETs-Based Intelligent Transportation Systems: An Overview.","venue":"CSA/CUTE","pages":"265-273","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/BarasSTE17","doi":"10.1007/978-981-10-7605-3_44","ee":"https://doi.org/10.1007/978-981-10-7605-3_44","url":"https://dblp.org/rec/conf/csa2/BarasSTE17"}, "url":"URL#2899592" }, { "@score":"1", "@id":"2899593", "info":{"authors":{"author":[{"@pid":"246/3998","text":"Shohrukh Bekmirzaev"},{"@pid":"22/7834","text":"Byoung-Chan Lee"},{"@pid":"95/6717","text":"Tae-Hyong Kim"}]},"title":"Pairwise Relation Analysis and Quality Estimation of Classical Chinese Poetry in Ancient Korea.","venue":"CSA/CUTE","pages":"741-747","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/BekmirzaevLK17","doi":"10.1007/978-981-10-7605-3_119","ee":"https://doi.org/10.1007/978-981-10-7605-3_119","url":"https://dblp.org/rec/conf/csa2/BekmirzaevLK17"}, "url":"URL#2899593" }, { "@score":"1", "@id":"2899594", "info":{"authors":{"author":[{"@pid":"246/4037","text":"Zuzana Bouckova"},{"@pid":"75/9477","text":"Blanka Klímová"}]},"title":"Impact of the Selection of a Communication Tool on the Effectiveness of Media Outputs About the Results of Science and Research.","venue":"CSA/CUTE","pages":"287-292","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/BouckovaK17","doi":"10.1007/978-981-10-7605-3_47","ee":"https://doi.org/10.1007/978-981-10-7605-3_47","url":"https://dblp.org/rec/conf/csa2/BouckovaK17"}, "url":"URL#2899594" }, { "@score":"1", "@id":"2899595", "info":{"authors":{"author":{"@pid":"246/4000","text":"Jisun Byun"}},"title":"Delivering Historical Information Shown in Korean TV Drama Over Smart TV.","venue":"CSA/CUTE","pages":"221-226","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/Byun17","doi":"10.1007/978-981-10-7605-3_37","ee":"https://doi.org/10.1007/978-981-10-7605-3_37","url":"https://dblp.org/rec/conf/csa2/Byun17"}, "url":"URL#2899595" }, { "@score":"1", "@id":"2899596", "info":{"authors":{"author":[{"@pid":"22/4065","text":"Xingquan Cai"},{"@pid":"66/3019","text":"Chao Chen"}]},"title":"Ocean Adventure Cell Phone Adventure Game Design and Implementation.","venue":"CSA/CUTE","pages":"320-327","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/CaiC17","doi":"10.1007/978-981-10-7605-3_53","ee":"https://doi.org/10.1007/978-981-10-7605-3_53","url":"https://dblp.org/rec/conf/csa2/CaiC17"}, "url":"URL#2899596" }, { "@score":"1", "@id":"2899597", "info":{"authors":{"author":[{"@pid":"22/4065","text":"Xingquan Cai"},{"@pid":"246/4079","text":"Runbo Cai"}]},"title":"Fitness Sport Data Recording System Design and Implementation on Smart Phone.","venue":"CSA/CUTE","pages":"346-352","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/CaiC17a","doi":"10.1007/978-981-10-7605-3_57","ee":"https://doi.org/10.1007/978-981-10-7605-3_57","url":"https://dblp.org/rec/conf/csa2/CaiC17a"}, "url":"URL#2899597" }, { "@score":"1", "@id":"2899598", "info":{"authors":{"author":[{"@pid":"201/5398","text":"Danyang Cao"},{"@pid":"246/3999","text":"Lina Duan"},{"@pid":"42/6350","text":"Xue Gao"},{"@pid":"44/2139","text":"Lei Gao"}]},"title":"Limited Constraint Problems Reasoning on Computer Based on "And/Or" Tree.","venue":"CSA/CUTE","pages":"280-286","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/CaoDGG17","doi":"10.1007/978-981-10-7605-3_46","ee":"https://doi.org/10.1007/978-981-10-7605-3_46","url":"https://dblp.org/rec/conf/csa2/CaoDGG17"}, "url":"URL#2899598" }, { "@score":"1", "@id":"2899599", "info":{"authors":{"author":[{"@pid":"241/1423","text":"Jonghun Cha"},{"@pid":"50/1556","text":"Jee-Hyong Lee 0001"}]},"title":"Internet Articles Classification by Industry Types Based on TF-IDF.","venue":"CSA/CUTE","pages":"1121-1125","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ChaL17","doi":"10.1007/978-981-10-7605-3_179","ee":"https://doi.org/10.1007/978-981-10-7605-3_179","url":"https://dblp.org/rec/conf/csa2/ChaL17"}, "url":"URL#2899599" }, { "@score":"1", "@id":"2899600", "info":{"authors":{"author":[{"@pid":"246/4040","text":"Kun-Tai Chan"},{"@pid":"73/5733","text":"Raylin Tso"},{"@pid":"60/2777-1","text":"Chien-Ming Chen 0001"},{"@pid":"20/1550","text":"Mu-En Wu"}]},"title":"Reputation-Based Trust Evaluation Mechanism for Decentralized Environments and Its Applications Based on Smart Contracts.","venue":"CSA/CUTE","pages":"310-314","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ChanTCW17","doi":"10.1007/978-981-10-7605-3_51","ee":"https://doi.org/10.1007/978-981-10-7605-3_51","url":"https://dblp.org/rec/conf/csa2/ChanTCW17"}, "url":"URL#2899600" }, { "@score":"1", "@id":"2899601", "info":{"authors":{"author":{"@pid":"80/5325","text":"SooHyun Cho"}},"title":"TCP Performance of CSMA/CA Wireless Networks in Different MCS and PPP Settings.","venue":"CSA/CUTE","pages":"293-298","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/Cho17","doi":"10.1007/978-981-10-7605-3_48","ee":"https://doi.org/10.1007/978-981-10-7605-3_48","url":"https://dblp.org/rec/conf/csa2/Cho17"}, "url":"URL#2899601" }, { "@score":"1", "@id":"2899602", "info":{"authors":{"author":[{"@pid":"246/4012","text":"Ayoung Cho"},{"@pid":"55/8846","text":"Hyunwoo Lee"},{"@pid":"246/4062","text":"Hyeonsang Hwang"},{"@pid":"246/4101","text":"Youseop Jo"},{"@pid":"161/7236","text":"Mincheol Whang"}]},"title":"Embodied Emotion Recognition System.","venue":"CSA/CUTE","pages":"1371-1376","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ChoLHJW17","doi":"10.1007/978-981-10-7605-3_218","ee":"https://doi.org/10.1007/978-981-10-7605-3_218","url":"https://dblp.org/rec/conf/csa2/ChoLHJW17"}, "url":"URL#2899602" }, { "@score":"1", "@id":"2899603", "info":{"authors":{"author":[{"@pid":"09/5237","text":"Wanhyun Cho"},{"@pid":"01/8675","text":"Soonyoung Park"},{"@pid":"168/3827","text":"Sangkyoon Kim"}]},"title":"Multiclass Data Classification Using Multinomial Logistic Gaussian Process Model.","venue":"CSA/CUTE","pages":"126-130","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ChoPK17","doi":"10.1007/978-981-10-7605-3_21","ee":"https://doi.org/10.1007/978-981-10-7605-3_21","url":"https://dblp.org/rec/conf/csa2/ChoPK17"}, "url":"URL#2899603" }, { "@score":"1", "@id":"2899604", "info":{"authors":{"author":[{"@pid":"236/9575","text":"Kyeong-Rae Cho"},{"@pid":"246/4049","text":"Tae-Bok Yoon"}]},"title":"Implementation of NFC-Based Smart-Drug Information Management System.","venue":"CSA/CUTE","pages":"795-804","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ChoY17","doi":"10.1007/978-981-10-7605-3_127","ee":"https://doi.org/10.1007/978-981-10-7605-3_127","url":"https://dblp.org/rec/conf/csa2/ChoY17"}, "url":"URL#2899604" }, { "@score":"1", "@id":"2899605", "info":{"authors":{"author":{"@pid":"85/1535","text":"Jae Sung Choi"}},"title":"Impact of Passive UHF RFID Reader Antenna Locations for Immobile Object Localization.","venue":"CSA/CUTE","pages":"102-107","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/Choi17","doi":"10.1007/978-981-10-7605-3_17","ee":"https://doi.org/10.1007/978-981-10-7605-3_17","url":"https://dblp.org/rec/conf/csa2/Choi17"}, "url":"URL#2899605" }, { "@score":"1", "@id":"2899606", "info":{"authors":{"author":[{"@pid":"85/1535","text":"Jae Sung Choi"},{"@pid":"246/4038","text":"Won Jun Byoun"},{"@pid":"64/4502","text":"Ji Su Park"},{"@pid":"159/3629","text":"Min Hyung Lee"},{"@pid":"246/4056","text":"Ye Seul Kang"},{"@pid":"76/4437","text":"Hyun Lee"}]},"title":"Glove Type Air Mouse Powered by Kalman Filtering and Complementary Filtering.","venue":"CSA/CUTE","pages":"1026-1030","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ChoiBPLKL17","doi":"10.1007/978-981-10-7605-3_164","ee":"https://doi.org/10.1007/978-981-10-7605-3_164","url":"https://dblp.org/rec/conf/csa2/ChoiBPLKL17"}, "url":"URL#2899606" }, { "@score":"1", "@id":"2899607", "info":{"authors":{"author":[{"@pid":"246/4018","text":"Jeong-Hoon Choi"},{"@pid":"58/3207","text":"Jun-Ho Huh"},{"@pid":"229/5450","text":"Sunghyun Weon"}]},"title":"A Design of Scheduling Program for Diabetic Patients: A Software Engineering Approach.","venue":"CSA/CUTE","pages":"198-203","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ChoiHW17","doi":"10.1007/978-981-10-7605-3_33","ee":"https://doi.org/10.1007/978-981-10-7605-3_33","url":"https://dblp.org/rec/conf/csa2/ChoiHW17"}, "url":"URL#2899607" }, { "@score":"1", "@id":"2899608", "info":{"authors":{"author":[{"@pid":"81/11071","text":"Kyung Choi"},{"@pid":"54/1625","text":"Mihui Kim"}]},"title":"Location Privacy for HIP Based Internet of Things.","venue":"CSA/CUTE","pages":"1457-1463","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ChoiK17","doi":"10.1007/978-981-10-7605-3_232","ee":"https://doi.org/10.1007/978-981-10-7605-3_232","url":"https://dblp.org/rec/conf/csa2/ChoiK17"}, "url":"URL#2899608" }, { "@score":"1", "@id":"2899609", "info":{"authors":{"author":[{"@pid":"97/4361","text":"Jae-Young Choi"},{"@pid":"122/6108","text":"Jong-Won Ko"},{"@pid":"26/690","text":"Suntae Kim"},{"@pid":"01/11192","text":"Young-Hwa Cho"}]},"title":"Visualization Approach for R&D Monitoring - A Tracking of Research Contents Changes Perspective.","venue":"CSA/CUTE","pages":"1108-1113","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ChoiKKC17","doi":"10.1007/978-981-10-7605-3_177","ee":"https://doi.org/10.1007/978-981-10-7605-3_177","url":"https://dblp.org/rec/conf/csa2/ChoiKKC17"}, "url":"URL#2899609" }, { "@score":"1", "@id":"2899610", "info":{"authors":{"author":[{"@pid":"79/1343","text":"Kiho Choi"},{"@pid":"215/3100","text":"Seongseop Kim"},{"@pid":"09/9281","text":"Moon Gi Seok"},{"@pid":"61/4769","text":"Jeonghun Cho"},{"@pid":"119/5645","text":"Daejin Park"}]},"title":"Maximum Stack Memory Monitoring Method Assisted by Static Analysis of the Stack Usage Profile.","venue":"CSA/CUTE","pages":"756-765","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ChoiKSCP17","doi":"10.1007/978-981-10-7605-3_121","ee":"https://doi.org/10.1007/978-981-10-7605-3_121","url":"https://dblp.org/rec/conf/csa2/ChoiKSCP17"}, "url":"URL#2899610" }, { "@score":"1", "@id":"2899611", "info":{"authors":{"author":[{"@pid":"75/5350-1","text":"Woo-Sung Choi 0001"},{"@pid":"246/4031","text":"Jonghyeon Min"},{"@pid":"117/2547","text":"Taemin Lee"},{"@pid":"236/9464","text":"Kyeong-Seok Hyun"},{"@pid":"98/3358","text":"Taehyung Lim"},{"@pid":"45/3571","text":"Soonyoung Jung"}]},"title":"Deep Representation of Raw Traffic Data: An Embed-and-Aggregate Framework for High-Level Traffic Analysis.","venue":"CSA/CUTE","pages":"1383-1390","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ChoiMLHLJ17","doi":"10.1007/978-981-10-7605-3_220","ee":"https://doi.org/10.1007/978-981-10-7605-3_220","url":"https://dblp.org/rec/conf/csa2/ChoiMLHLJ17"}, "url":"URL#2899611" }, { "@score":"1", "@id":"2899612", "info":{"authors":{"author":[{"@pid":"195/3836","text":"Jung-In Choi"},{"@pid":"36/1273","text":"Seung-Hyun Seo"},{"@pid":"54/4627","text":"Taenam Cho"}]},"title":"The Congestion Control Model for Unmanned Aircraft System Traffic Management.","venue":"CSA/CUTE","pages":"1174-1179","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ChoiSC17","doi":"10.1007/978-981-10-7605-3_187","ee":"https://doi.org/10.1007/978-981-10-7605-3_187","url":"https://dblp.org/rec/conf/csa2/ChoiSC17"}, "url":"URL#2899612" }, { "@score":"1", "@id":"2899613", "info":{"authors":{"author":[{"@pid":"76/2897","text":"Wei Dai"},{"@pid":"49/3283","text":"Wei Liu"},{"@pid":"246/4032","text":"Xin-dong Zhao"},{"@pid":"56/6779","text":"Jian Shao"},{"@pid":"42/6066","text":"Qun Li"},{"@pid":"246/4045","text":"Shengkun Ma"},{"@pid":"x/NaixueXiong","text":"Neal N. Xiong"},{"@pid":"246/3997","text":"Chang-nian Lin"}]},"title":"A Model and Application of Collaborative Simulation Training System for Substation Based on Virtual Reality.","venue":"CSA/CUTE","pages":"610-616","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/DaiLZSLMXL17","doi":"10.1007/978-981-10-7605-3_100","ee":"https://doi.org/10.1007/978-981-10-7605-3_100","url":"https://dblp.org/rec/conf/csa2/DaiLZSLMXL17"}, "url":"URL#2899613" }, { "@score":"1", "@id":"2899614", "info":{"authors":{"author":[{"@pid":"49/26","text":"Sungwook Eom"},{"@pid":"58/3207","text":"Jun-Ho Huh"}]},"title":"Anonymous Signature with Signer-Controlled Opening Capability.","venue":"CSA/CUTE","pages":"878-882","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/EomH17","doi":"10.1007/978-981-10-7605-3_139","ee":"https://doi.org/10.1007/978-981-10-7605-3_139","url":"https://dblp.org/rec/conf/csa2/EomH17"}, "url":"URL#2899614" }, { "@score":"1", "@id":"2899615", "info":{"authors":{"author":[{"@pid":"49/26","text":"Sungwook Eom"},{"@pid":"58/3207","text":"Jun-Ho Huh"}]},"title":"Group Signature with Signer-Controlled Opening Capability: Separate Token Generator.","venue":"CSA/CUTE","pages":"883-887","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/EomH17a","doi":"10.1007/978-981-10-7605-3_140","ee":"https://doi.org/10.1007/978-981-10-7605-3_140","url":"https://dblp.org/rec/conf/csa2/EomH17a"}, "url":"URL#2899615" }, { "@score":"1", "@id":"2899616", "info":{"authors":{"author":[{"@pid":"206/1703","text":"Beltran Fiz"},{"@pid":"99/11357","text":"Stefan Hommes"},{"@pid":"05/6228","text":"Radu State"}]},"title":"Confirmation Delay Prediction of Transactions in the Bitcoin Network.","venue":"CSA/CUTE","pages":"534-539","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/FizHS17","doi":"10.1007/978-981-10-7605-3_88","ee":"https://doi.org/10.1007/978-981-10-7605-3_88","url":"https://dblp.org/rec/conf/csa2/FizHS17"}, "url":"URL#2899616" }, { "@score":"1", "@id":"2899617", "info":{"authors":{"author":[{"@pid":"59/10111","text":"Chao Geng"},{"@pid":"246/4071","text":"Shiyou Qu"},{"@pid":"130/4370","text":"Guoqiang Shi"},{"@pid":"62/1267","text":"Baocun Hou"},{"@pid":"65/3367","text":"Mei Wang"},{"@pid":"138/7101-1","text":"Tingyu Lin 0001"},{"@pid":"138/8496","text":"Yingying Xiao"},{"@pid":"180/6093","text":"Zhengxuan Jia"}]},"title":"A Study on the Comparison of "Internet+" Paradigm and Means and the Analysis and Evaluation of Its Typical Development Path.","venue":"CSA/CUTE","pages":"669-676","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/GengQSHWLXJ17","doi":"10.1007/978-981-10-7605-3_108","ee":"https://doi.org/10.1007/978-981-10-7605-3_108","url":"https://dblp.org/rec/conf/csa2/GengQSHWLXJ17"}, "url":"URL#2899617" }, { "@score":"1", "@id":"2899618", "info":{"authors":{"author":[{"@pid":"239/2423","text":"Chenkai Gu"},{"@pid":"01/2537-9","text":"Jin Liu 0009"},{"@pid":"94/224","text":"Lei Kong"}]},"title":"Generating Realistic Chinese Handwriting Characters via Deep Convolutional Generative Adversarial Networks.","venue":"CSA/CUTE","pages":"494-498","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/GuLK17","doi":"10.1007/978-981-10-7605-3_81","ee":"https://doi.org/10.1007/978-981-10-7605-3_81","url":"https://dblp.org/rec/conf/csa2/GuLK17"}, "url":"URL#2899618" }, { "@score":"1", "@id":"2899619", "info":{"authors":{"author":[{"@pid":"246/4082","text":"Ju-seok Ha"},{"@pid":"246/4051","text":"Kyung-mo Kim"}]},"title":"Operational Reliability Analysis of Guided Weapon Systems.","venue":"CSA/CUTE","pages":"865-871","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/HaK17","doi":"10.1007/978-981-10-7605-3_137","ee":"https://doi.org/10.1007/978-981-10-7605-3_137","url":"https://dblp.org/rec/conf/csa2/HaK17"}, "url":"URL#2899619" }, { "@score":"1", "@id":"2899620", "info":{"authors":{"author":[{"@pid":"246/4082","text":"Ju-seok Ha"},{"@pid":"246/4051","text":"Kyung-mo Kim"}]},"title":"A Study on Optimal Warranty Period for Repairable Weapon Systems.","venue":"CSA/CUTE","pages":"944-950","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/HaK17a","doi":"10.1007/978-981-10-7605-3_150","ee":"https://doi.org/10.1007/978-981-10-7605-3_150","url":"https://dblp.org/rec/conf/csa2/HaK17a"}, "url":"URL#2899620" }, { "@score":"1", "@id":"2899621", "info":{"authors":{"author":[{"@pid":"32/10891","text":"Yifeng Han"},{"@pid":"123/0646","text":"Hongbiao Gao"},{"@pid":"c/JingdeCheng","text":"Jingde Cheng"}]},"title":"A Design of Evolutionary Personal Information Partner Based on Software as a Service.","venue":"CSA/CUTE","pages":"407-412","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/HanGC17","doi":"10.1007/978-981-10-7605-3_67","ee":"https://doi.org/10.1007/978-981-10-7605-3_67","url":"https://dblp.org/rec/conf/csa2/HanGC17"}, "url":"URL#2899621" }, { "@score":"1", "@id":"2899622", "info":{"authors":{"author":[{"@pid":"238/4010","text":"Jae Hyun Han"},{"@pid":"43/2801","text":"Jinman Kim"},{"@pid":"65/3681","text":"Eui Chul Lee"}]},"title":"Single-Camera Vision-Based Vein Biometric Authentication and Heart Rate Monitoring via Infrared Imaging Analysis.","venue":"CSA/CUTE","pages":"1307-1313","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/HanKL17","doi":"10.1007/978-981-10-7605-3_208","ee":"https://doi.org/10.1007/978-981-10-7605-3_208","url":"https://dblp.org/rec/conf/csa2/HanKL17"}, "url":"URL#2899622" }, { "@score":"1", "@id":"2899623", "info":{"authors":{"author":[{"@pid":"01/4775","text":"Yuanyuan He"},{"@pid":"133/3243","text":"Chengshan Qian"},{"@pid":"x/NaixueXiong","text":"Neal N. Xiong"}]},"title":"Minimum-Cost Consensus Models for Group Decision Making Under Intuitionistic Fuzzy Environment.","venue":"CSA/CUTE","pages":"708-713","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/HeQX17","doi":"10.1007/978-981-10-7605-3_114","ee":"https://doi.org/10.1007/978-981-10-7605-3_114","url":"https://dblp.org/rec/conf/csa2/HeQX17"}, "url":"URL#2899623" }, { "@score":"1", "@id":"2899624", "info":{"authors":{"author":[{"@pid":"65/1309","text":"Jianfeng Hou"},{"@pid":"62/1539-4","text":"Wei Song 0004"},{"@pid":"246/4046","text":"MengXuan Li"}]},"title":"The Application of Augmented Reality Based on Body Parts Recognition.","venue":"CSA/CUTE","pages":"458-463","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/HouSL17","doi":"10.1007/978-981-10-7605-3_75","ee":"https://doi.org/10.1007/978-981-10-7605-3_75","url":"https://dblp.org/rec/conf/csa2/HouSL17"}, "url":"URL#2899624" }, { "@score":"1", "@id":"2899625", "info":{"authors":{"author":[{"@pid":"246/4052","text":"Jen-Ho Hsiao"},{"@pid":"73/5733","text":"Raylin Tso"},{"@pid":"60/2777-1","text":"Chien-Ming Chen 0001"},{"@pid":"20/1550","text":"Mu-En Wu"}]},"title":"Decentralized E-Voting Systems Based on the Blockchain Technology.","venue":"CSA/CUTE","pages":"305-309","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/HsiaoTCW17","doi":"10.1007/978-981-10-7605-3_50","ee":"https://doi.org/10.1007/978-981-10-7605-3_50","url":"https://dblp.org/rec/conf/csa2/HsiaoTCW17"}, "url":"URL#2899625" }, { "@score":"1", "@id":"2899626", "info":{"authors":{"author":[{"@pid":"03/785","text":"Chengquan Hu"},{"@pid":"210/1629","text":"Yu Gou"},{"@pid":"07/4227-27","text":"Tong Zhang 0027"},{"@pid":"78/2022","text":"Kai Wang"},{"@pid":"39/4772-2","text":"Lili He 0002"},{"@pid":"21/4633-6","text":"Yu Jiang 0006"}]},"title":"Analysis of Thermocline Influencing Factors Based on Decision Tree Methods.","venue":"CSA/CUTE","pages":"328-334","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/HuGZW0J17","doi":"10.1007/978-981-10-7605-3_54","ee":"https://doi.org/10.1007/978-981-10-7605-3_54","url":"https://dblp.org/rec/conf/csa2/HuGZW0J17"}, "url":"URL#2899626" }, { "@score":"1", "@id":"2899627", "info":{"authors":{"author":[{"@pid":"03/785","text":"Chengquan Hu"},{"@pid":"210/1629","text":"Yu Gou"},{"@pid":"07/4227-27","text":"Tong Zhang 0027"},{"@pid":"78/2022","text":"Kai Wang"},{"@pid":"39/4772-2","text":"Lili He 0002"},{"@pid":"21/4633-6","text":"Yu Jiang 0006"}]},"title":"Thermocline Analysis Based on Entropy Value Methods.","venue":"CSA/CUTE","pages":"335-340","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/HuGZW0J17a","doi":"10.1007/978-981-10-7605-3_55","ee":"https://doi.org/10.1007/978-981-10-7605-3_55","url":"https://dblp.org/rec/conf/csa2/HuGZW0J17a"}, "url":"URL#2899627" }, { "@score":"1", "@id":"2899628", "info":{"authors":{"author":[{"@pid":"28/441","text":"Jun Hu"},{"@pid":"85/9556","text":"Mingming Wang"},{"@pid":"94/2242","text":"Weijun Zhang"},{"@pid":"246/4119","text":"Wanqian Li"}]},"title":"A Model-Based Transformation from SCR Specification Models into Altatica3.0 Design Models.","venue":"CSA/CUTE","pages":"617-623","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/HuWZL17","doi":"10.1007/978-981-10-7605-3_101","ee":"https://doi.org/10.1007/978-981-10-7605-3_101","url":"https://dblp.org/rec/conf/csa2/HuWZL17"}, "url":"URL#2899628" }, { "@score":"1", "@id":"2899629", "info":{"authors":{"author":[{"@pid":"03/785","text":"Chengquan Hu"},{"@pid":"07/4227-27","text":"Tong Zhang 0027"},{"@pid":"92/1375","text":"Jin Wang"},{"@pid":"210/1629","text":"Yu Gou"},{"@pid":"78/2022","text":"Kai Wang"},{"@pid":"58/1197","text":"Hongtao Bai"},{"@pid":"21/4633-6","text":"Yu Jiang 0006"}]},"title":"Construction of High Resolution Thermocline Grid Data Sets.","venue":"CSA/CUTE","pages":"353-358","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/HuZWGWBJ17","doi":"10.1007/978-981-10-7605-3_58","ee":"https://doi.org/10.1007/978-981-10-7605-3_58","url":"https://dblp.org/rec/conf/csa2/HuZWGWBJ17"}, "url":"URL#2899629" }, { "@score":"1", "@id":"2899630", "info":{"authors":{"author":[{"@pid":"15/3342","text":"Zhen Hu"},{"@pid":"17/4313","text":"Yi Zuo"},{"@pid":"159/9001","text":"Zhuyin Xue"},{"@pid":"21/3317","text":"Wenting Ma"},{"@pid":"48/5081","text":"Guilin Zhang"}]},"title":"Predicting the Metro Passengers Flow by Long-Short Term Memory.","venue":"CSA/CUTE","pages":"591-595","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/HuZXMZ17","doi":"10.1007/978-981-10-7605-3_97","ee":"https://doi.org/10.1007/978-981-10-7605-3_97","url":"https://dblp.org/rec/conf/csa2/HuZXMZ17"}, "url":"URL#2899630" }, { "@score":"1", "@id":"2899631", "info":{"authors":{"author":[{"@pid":"246/4073","text":"Yong-Woon Hwang"},{"@pid":"20/2771","text":"Im-Yeong Lee"}]},"title":"A Study on Lightweight Mutual Authentication Protocol Based on Simple Operation.","venue":"CSA/CUTE","pages":"41-46","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/HwangL17","doi":"10.1007/978-981-10-7605-3_7","ee":"https://doi.org/10.1007/978-981-10-7605-3_7","url":"https://dblp.org/rec/conf/csa2/HwangL17"}, "url":"URL#2899631" }, { "@score":"1", "@id":"2899632", "info":{"authors":{"author":[{"@pid":"160/5345","text":"Sangwon Hwang"},{"@pid":"172/3669","text":"Kangwon Seo"},{"@pid":"246/4009","text":"Woncheol Ryu"},{"@pid":"67/5627","text":"Young-Kwang Nam"}]},"title":"System for the Researcher Map to Promote Convergence Research.","venue":"CSA/CUTE","pages":"1168-1173","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/HwangSRN17","doi":"10.1007/978-981-10-7605-3_186","ee":"https://doi.org/10.1007/978-981-10-7605-3_186","url":"https://dblp.org/rec/conf/csa2/HwangSRN17"}, "url":"URL#2899632" }, { "@score":"1", "@id":"2899633", "info":{"authors":{"author":[{"@pid":"246/4034","text":"Woohyuk Jang"},{"@pid":"246/4007","text":"Sehee Kim"},{"@pid":"185/5969","text":"Yoonkyoung Kim"},{"@pid":"65/3681","text":"Eui Chul Lee"}]},"title":"Automated Verification Method of Korean Word Handwriting Using Geometric Feature.","venue":"CSA/CUTE","pages":"1340-1345","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/JangKKL17","doi":"10.1007/978-981-10-7605-3_213","ee":"https://doi.org/10.1007/978-981-10-7605-3_213","url":"https://dblp.org/rec/conf/csa2/JangKKL17"}, "url":"URL#2899633" }, { "@score":"1", "@id":"2899634", "info":{"authors":{"author":[{"@pid":"202/9196","text":"Unsoo Jang"},{"@pid":"65/3681","text":"Eui Chul Lee"}]},"title":"Convolutional Neural Network Based Serial Number Recognition Method for Indian Rupee Banknotes.","venue":"CSA/CUTE","pages":"1445-1450","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/JangL17","doi":"10.1007/978-981-10-7605-3_230","ee":"https://doi.org/10.1007/978-981-10-7605-3_230","url":"https://dblp.org/rec/conf/csa2/JangL17"}, "url":"URL#2899634" }, { "@score":"1", "@id":"2899635", "info":{"authors":{"author":[{"@pid":"246/4048","text":"Young-Hwan Jang"},{"@pid":"246/4120","text":"Seung-Su Yang"},{"@pid":"14/183","text":"Hyung-Joon Kim"},{"@pid":"60/5434","text":"Seok-Cheon Park"}]},"title":"Design of Nonlinear Data-Based Wellness Content Recommendation Algorithm.","venue":"CSA/CUTE","pages":"766-771","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/JangYKP17","doi":"10.1007/978-981-10-7605-3_122","ee":"https://doi.org/10.1007/978-981-10-7605-3_122","url":"https://dblp.org/rec/conf/csa2/JangYKP17"}, "url":"URL#2899635" }, { "@score":"1", "@id":"2899636", "info":{"authors":{"author":[{"@pid":"246/4043","text":"Do Yeon Jeon"},{"@pid":"246/4123","text":"Young Hyo Kim"},{"@pid":"246/4063","text":"Ha Yeon Park"},{"@pid":"58/3207","text":"Jun-Ho Huh"},{"@pid":"246/4068","text":"Hyeok Gyu Kwon"}]},"title":"A Design of Portable Continuous Passive Joint Mobilization Equipment System.","venue":"CSA/CUTE","pages":"215-220","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/JeonKPHK17","doi":"10.1007/978-981-10-7605-3_36","ee":"https://doi.org/10.1007/978-981-10-7605-3_36","url":"https://dblp.org/rec/conf/csa2/JeonKPHK17"}, "url":"URL#2899636" }, { "@score":"1", "@id":"2899637", "info":{"authors":{"author":[{"@pid":"246/4017","text":"Yong-Tae Jeon"},{"@pid":"76/4437","text":"Hyun Lee"},{"@pid":"85/1535","text":"Jae Sung Choi"}]},"title":"Development of 3D Surface Shape Analysis System Using White Light Scanning Interference.","venue":"CSA/CUTE","pages":"108-113","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/JeonLC17","doi":"10.1007/978-981-10-7605-3_18","ee":"https://doi.org/10.1007/978-981-10-7605-3_18","url":"https://dblp.org/rec/conf/csa2/JeonLC17"}, "url":"URL#2899637" }, { "@score":"1", "@id":"2899638", "info":{"authors":{"author":[{"@pid":"71/8765","text":"Inho Jeon"},{"@pid":"31/2986","text":"Jin Ma"},{"@pid":"90/5224","text":"Jerry H. Seo"},{"@pid":"97/3385","text":"Jongsuk Ruth Lee"},{"@pid":"88/5061","text":"Kumwon Cho"},{"@pid":"65/7209","text":"Hoon Ryu"}]},"title":"A Development on the SaaS Cloud Scientific Computing Platform for Education and Research in Nanoscience.","venue":"CSA/CUTE","pages":"951-956","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/JeonMSLCR17","doi":"10.1007/978-981-10-7605-3_151","ee":"https://doi.org/10.1007/978-981-10-7605-3_151","url":"https://dblp.org/rec/conf/csa2/JeonMSLCR17"}, "url":"URL#2899638" }, { "@score":"1", "@id":"2899639", "info":{"authors":{"author":[{"@pid":"246/4036","text":"Daehui Jeong"},{"@pid":"04/4899","text":"Gihwon Kwon"}]},"title":"An Extended Hierarchical Safety Analysis for Software-Intensive System.","venue":"CSA/CUTE","pages":"1250-1256","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/JeongK17","doi":"10.1007/978-981-10-7605-3_199","ee":"https://doi.org/10.1007/978-981-10-7605-3_199","url":"https://dblp.org/rec/conf/csa2/JeongK17"}, "url":"URL#2899639" }, { "@score":"1", "@id":"2899640", "info":{"authors":{"author":[{"@pid":"219/3123","text":"Youngjun Jeong"},{"@pid":"219/2896","text":"Kyeongsic Min"},{"@pid":"148/4264","text":"Geunseok Yang"},{"@pid":"40/3016","text":"Jung-Won Lee"},{"@pid":"32/3534","text":"Byungjeong Lee"}]},"title":"Toward Providing Automatic Program Repair by Utilizing Topic-Based Code Block Similarity.","venue":"CSA/CUTE","pages":"1257-1262","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/JeongMYLL17","doi":"10.1007/978-981-10-7605-3_200","ee":"https://doi.org/10.1007/978-981-10-7605-3_200","url":"https://dblp.org/rec/conf/csa2/JeongMYLL17"}, "url":"URL#2899640" }, { "@score":"1", "@id":"2899641", "info":{"authors":{"author":[{"@pid":"246/4114","text":"Yi-Siou Jheng"},{"@pid":"73/5733","text":"Raylin Tso"},{"@pid":"60/2777-1","text":"Chien-Ming Chen 0001"},{"@pid":"20/1550","text":"Mu-En Wu"}]},"title":"Password-Based Authenticated Key Exchange from Lattices for Client/Server Model.","venue":"CSA/CUTE","pages":"315-319","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/JhengTCW17","doi":"10.1007/978-981-10-7605-3_52","ee":"https://doi.org/10.1007/978-981-10-7605-3_52","url":"https://dblp.org/rec/conf/csa2/JhengTCW17"}, "url":"URL#2899641" }, { "@score":"1", "@id":"2899642", "info":{"authors":{"author":[{"@pid":"246/4013","text":"Hyunjung Ji"},{"@pid":"246/4044-2","text":"Donghwa Kim 0002"},{"@pid":"57/2855","text":"Dongkyoo Shin"},{"@pid":"85/2364","text":"Dongil Shin"}]},"title":"A Study on Comparison of KDD CUP 99 and NSL-KDD Using Artificial Neural Network.","venue":"CSA/CUTE","pages":"452-457","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/JiKSS17","doi":"10.1007/978-981-10-7605-3_74","ee":"https://doi.org/10.1007/978-981-10-7605-3_74","url":"https://dblp.org/rec/conf/csa2/JiKSS17"}, "url":"URL#2899642" }, { "@score":"1", "@id":"2899643", "info":{"authors":{"author":[{"@pid":"246/4013","text":"Hyunjung Ji"},{"@pid":"227/0892","text":"Gyeongil Shin"},{"@pid":"85/2364","text":"Dongil Shin"},{"@pid":"57/2855","text":"Dongkyoo Shin"}]},"title":"Study on Customer Rating Using RFM and K-Means.","venue":"CSA/CUTE","pages":"823-828","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/JiSSS17","doi":"10.1007/978-981-10-7605-3_131","ee":"https://doi.org/10.1007/978-981-10-7605-3_131","url":"https://dblp.org/rec/conf/csa2/JiSSS17"}, "url":"URL#2899643" }, { "@score":"1", "@id":"2899644", "info":{"authors":{"author":{"@pid":"68/3340","text":"Xin Jin"}},"title":"Simulation Game System: A Possible Way to Realize Intelligent Command and Control.","venue":"CSA/CUTE","pages":"560-565","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/Jin17","doi":"10.1007/978-981-10-7605-3_92","ee":"https://doi.org/10.1007/978-981-10-7605-3_92","url":"https://dblp.org/rec/conf/csa2/Jin17"}, "url":"URL#2899644" }, { "@score":"1", "@id":"2899645", "info":{"authors":{"author":[{"@pid":"86/8241","text":"Youngho Jo"},{"@pid":"137/3638","text":"Heajin Kim"},{"@pid":"214/9427","text":"Hana Lee"},{"@pid":"161/7236","text":"Mincheol Whang"}]},"title":"Classification of Web Content by Category Generation in Social Life Logging.","venue":"CSA/CUTE","pages":"1358-1363","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/JoKLW17","doi":"10.1007/978-981-10-7605-3_216","ee":"https://doi.org/10.1007/978-981-10-7605-3_216","url":"https://dblp.org/rec/conf/csa2/JoKLW17"}, "url":"URL#2899645" }, { "@score":"1", "@id":"2899646", "info":{"authors":{"author":[{"@pid":"246/4101","text":"Youseop Jo"},{"@pid":"55/8846","text":"Hyunwoo Lee"},{"@pid":"246/4012","text":"Ayoung Cho"},{"@pid":"161/7236","text":"Mincheol Whang"}]},"title":"Emotion Recognition Through Cardiovascular Response in Daily Life Using KNN Classifier.","venue":"CSA/CUTE","pages":"1451-1456","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/JoLCW17","doi":"10.1007/978-981-10-7605-3_231","ee":"https://doi.org/10.1007/978-981-10-7605-3_231","url":"https://dblp.org/rec/conf/csa2/JoLCW17"}, "url":"URL#2899646" }, { "@score":"1", "@id":"2899647", "info":{"authors":{"author":[{"@pid":"48/5700-3","text":"Jun Shen 0003"},{"@pid":"151/6915","text":"Xuan Shen"},{"@pid":"g/WenGao-9","text":"Wen Gao 0009"},{"@pid":"66/4615","text":"Yong Zhang"}]},"title":"Simulation and Verification of Software Architecture for Loosely-Coupled Distributed System.","venue":"CSA/CUTE","pages":"624-630","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/JunXWY17","doi":"10.1007/978-981-10-7605-3_102","ee":"https://doi.org/10.1007/978-981-10-7605-3_102","url":"https://dblp.org/rec/conf/csa2/JunXWY17"}, "url":"URL#2899647" }, { "@score":"1", "@id":"2899648", "info":{"authors":{"author":{"@pid":"55/2233","text":"Wonjin Jung"}},"title":"An Examination of the Effect of the Contextual UI Design Quality of Mobile Shopping Applications on the Loyalty of Users to the Applications.","venue":"CSA/CUTE","pages":"1-5","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/Jung17","doi":"10.1007/978-981-10-7605-3_1","ee":"https://doi.org/10.1007/978-981-10-7605-3_1","url":"https://dblp.org/rec/conf/csa2/Jung17"}, "url":"URL#2899648" }, { "@score":"1", "@id":"2899649", "info":{"authors":{"author":{"@pid":"55/2233","text":"Wonjin Jung"}},"title":"The Effect of the Intrinsic Quality of UI of Mobile Apps on the Behavioral Intention to Use the Apps.","venue":"CSA/CUTE","pages":"253-257","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/Jung17a","doi":"10.1007/978-981-10-7605-3_42","ee":"https://doi.org/10.1007/978-981-10-7605-3_42","url":"https://dblp.org/rec/conf/csa2/Jung17a"}, "url":"URL#2899649" }, { "@score":"1", "@id":"2899650", "info":{"authors":{"author":[{"@pid":"135/2531","text":"Jong-jin Jung"},{"@pid":"79/4908","text":"Yun Cui"},{"@pid":"13/4065","text":"Myungjin Kim"}]},"title":"User Targeting SaaS Application Interworking Service Framework Using Complex Context and Rule-Matrix.","venue":"CSA/CUTE","pages":"641-647","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/JungCK17","doi":"10.1007/978-981-10-7605-3_104","ee":"https://doi.org/10.1007/978-981-10-7605-3_104","url":"https://dblp.org/rec/conf/csa2/JungCK17"}, "url":"URL#2899650" }, { "@score":"1", "@id":"2899651", "info":{"authors":{"author":[{"@pid":"223/2410","text":"Namyong Jung"},{"@pid":"39/1801-1","text":"Jinkyu Lee 0001"}]},"title":"Improved Schedulability Analysis of Fixed-Priority for Mixed-Criticality Real-Time Multiprocessor Systems.","venue":"CSA/CUTE","pages":"1403-1409","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/JungL17","doi":"10.1007/978-981-10-7605-3_223","ee":"https://doi.org/10.1007/978-981-10-7605-3_223","url":"https://dblp.org/rec/conf/csa2/JungL17"}, "url":"URL#2899651" }, { "@score":"1", "@id":"2899652", "info":{"authors":{"author":[{"@pid":"190/6162","text":"Jinyeong Kang"},{"@pid":"58/4172","text":"Inwhee Joe"}]},"title":"Multi-level Key Establishment with Space-Time Graphs for Delay Tolerant Networks.","venue":"CSA/CUTE","pages":"1186-1191","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KangJ17","doi":"10.1007/978-981-10-7605-3_189","ee":"https://doi.org/10.1007/978-981-10-7605-3_189","url":"https://dblp.org/rec/conf/csa2/KangJ17"}, "url":"URL#2899652" }, { "@score":"1", "@id":"2899653", "info":{"authors":{"author":[{"@pid":"246/4054","text":"Suk-kyoon Kang"},{"@pid":"44/1701","text":"Kiejin Park"}]},"title":"Improving Top-K Contents Recommendation Performance by Considering Bandwagon Effect: Using Hadoop-Spark Framework.","venue":"CSA/CUTE","pages":"137-142","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KangP17","doi":"10.1007/978-981-10-7605-3_23","ee":"https://doi.org/10.1007/978-981-10-7605-3_23","url":"https://dblp.org/rec/conf/csa2/KangP17"}, "url":"URL#2899653" }, { "@score":"1", "@id":"2899654", "info":{"authors":{"author":[{"@pid":"94/303","text":"YunHee Kang"},{"@pid":"246/4011","text":"Younhoon Park"},{"@pid":"246/4093","text":"Jonghee Yoon"},{"@pid":"246/4072","text":"KwngMan Ko"}]},"title":"Adverstise Based Adaptive Model for IoT Device in Network Virtualization Environment.","venue":"CSA/CUTE","pages":"1004-1007","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KangPYK17","doi":"10.1007/978-981-10-7605-3_160","ee":"https://doi.org/10.1007/978-981-10-7605-3_160","url":"https://dblp.org/rec/conf/csa2/KangPYK17"}, "url":"URL#2899654" }, { "@score":"1", "@id":"2899655", "info":{"authors":{"author":{"@pid":"74/5921","text":"Masashi Katsumata"}},"title":"ICN Based Disaster Area Network Platform.","venue":"CSA/CUTE","pages":"1301-1306","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/Katsumata17","doi":"10.1007/978-981-10-7605-3_207","ee":"https://doi.org/10.1007/978-981-10-7605-3_207","url":"https://dblp.org/rec/conf/csa2/Katsumata17"}, "url":"URL#2899655" }, { "@score":"1", "@id":"2899656", "info":{"authors":{"author":[{"@pid":"246/4090","text":"Akhmedov Khumoyun"},{"@pid":"79/4908","text":"Yun Cui"},{"@pid":"44/7538","text":"Myoungjin Kim"},{"@pid":"42/5725","text":"Hanku Lee"}]},"title":"Performance Analysis of Spark-DLF: Spark Based Distributed Deep Learning Framework for Article Headline Generation.","venue":"CSA/CUTE","pages":"47-52","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KhumoyunCKL17","doi":"10.1007/978-981-10-7605-3_8","ee":"https://doi.org/10.1007/978-981-10-7605-3_8","url":"https://dblp.org/rec/conf/csa2/KhumoyunCKL17"}, "url":"URL#2899656" }, { "@score":"1", "@id":"2899657", "info":{"authors":{"author":[{"@pid":"15/3994","text":"Svetlana Kim"},{"@pid":"66/5082-1","text":"Yongik Yoon 0001"}]},"title":"Hybrid Sensing and Behavior-Aware in Pedestrian Hazard Detection.","venue":"CSA/CUTE","pages":"1114-1120","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/Kim017","doi":"10.1007/978-981-10-7605-3_178","ee":"https://doi.org/10.1007/978-981-10-7605-3_178","url":"https://dblp.org/rec/conf/csa2/Kim017"}, "url":"URL#2899657" }, { "@score":"1", "@id":"2899658", "info":{"authors":{"author":{"@pid":"45/3062","text":"Pyung Soo Kim"}},"title":"Continuous-Time Estimation Filtering with Incorporation of Temporary Model Uncertainty.","venue":"CSA/CUTE","pages":"998-1003","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/Kim17","doi":"10.1007/978-981-10-7605-3_159","ee":"https://doi.org/10.1007/978-981-10-7605-3_159","url":"https://dblp.org/rec/conf/csa2/Kim17"}, "url":"URL#2899658" }, { "@score":"1", "@id":"2899659", "info":{"authors":{"author":{"@pid":"45/8383","text":"Geun-Hyung Kim"}},"title":"Multi-screen Patterns and Multi-device Experiences in a Multi-screen Ecosystem.","venue":"CSA/CUTE","pages":"1051-1056","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/Kim17a","doi":"10.1007/978-981-10-7605-3_168","ee":"https://doi.org/10.1007/978-981-10-7605-3_168","url":"https://dblp.org/rec/conf/csa2/Kim17a"}, "url":"URL#2899659" }, { "@score":"1", "@id":"2899660", "info":{"authors":{"author":{"@pid":"54/1625","text":"Mihui Kim"}},"title":"Path Privacy Preservation Using Threshold Secret Sharing via Distributed Obfuscators in Directions Search.","venue":"CSA/CUTE","pages":"1141-1146","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/Kim17b","doi":"10.1007/978-981-10-7605-3_182","ee":"https://doi.org/10.1007/978-981-10-7605-3_182","url":"https://dblp.org/rec/conf/csa2/Kim17b"}, "url":"URL#2899660" }, { "@score":"1", "@id":"2899661", "info":{"authors":{"author":{"@pid":"26/10595","text":"Hae-Jung Kim"}},"title":"Image-Based Malware Classification Using Convolutional Neural Network.","venue":"CSA/CUTE","pages":"1352-1357","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/Kim17c","doi":"10.1007/978-981-10-7605-3_215","ee":"https://doi.org/10.1007/978-981-10-7605-3_215","url":"https://dblp.org/rec/conf/csa2/Kim17c"}, "url":"URL#2899661" }, { "@score":"1", "@id":"2899662", "info":{"authors":{"author":{"@pid":"122/6432","text":"Jeongyun Kim"}},"title":"Service Aware Orchestration for Dynamic Network Slicing in 5G Networks.","venue":"CSA/CUTE","pages":"1397-1402","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/Kim17d","doi":"10.1007/978-981-10-7605-3_222","ee":"https://doi.org/10.1007/978-981-10-7605-3_222","url":"https://dblp.org/rec/conf/csa2/Kim17d"}, "url":"URL#2899662" }, { "@score":"1", "@id":"2899663", "info":{"authors":{"author":[{"@pid":"88/9471","text":"Yonghoon Kim"},{"@pid":"76/6406","text":"Mokdong Chung"}]},"title":"An Efficient Clustering Technique for Unstructured Data Utilizing Latent Semantic Analysis.","venue":"CSA/CUTE","pages":"227-232","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimC17","doi":"10.1007/978-981-10-7605-3_38","ee":"https://doi.org/10.1007/978-981-10-7605-3_38","url":"https://dblp.org/rec/conf/csa2/KimC17"}, "url":"URL#2899663" }, { "@score":"1", "@id":"2899664", "info":{"authors":{"author":[{"@pid":"88/9471","text":"Yonghoon Kim"},{"@pid":"76/6406","text":"Mokdong Chung"}]},"title":"Traffic Prediction System Utilizing Application and Control of Environmental Information.","venue":"CSA/CUTE","pages":"1043-1050","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimC17a","doi":"10.1007/978-981-10-7605-3_167","ee":"https://doi.org/10.1007/978-981-10-7605-3_167","url":"https://dblp.org/rec/conf/csa2/KimC17a"}, "url":"URL#2899664" }, { "@score":"1", "@id":"2899665", "info":{"authors":{"author":[{"@pid":"84/379","text":"Doohwan Kim"},{"@pid":"h/JangEuiHong","text":"Jang-Eui Hong"}]},"title":"The microComponent and Its Extension Patterns for Flexible Reuse of Software Artifacts.","venue":"CSA/CUTE","pages":"1084-1090","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimH17","doi":"10.1007/978-981-10-7605-3_173","ee":"https://doi.org/10.1007/978-981-10-7605-3_173","url":"https://dblp.org/rec/conf/csa2/KimH17"}, "url":"URL#2899665" }, { "@score":"1", "@id":"2899666", "info":{"authors":{"author":[{"@pid":"26/690","text":"Suntae Kim"},{"@pid":"246/4039","text":"Joongi Hong"},{"@pid":"241/2427","text":"Seounghan Song"},{"@pid":"216/3083","text":"Sangchul Choi"},{"@pid":"36/6732","text":"JeongAh Kim"},{"@pid":"97/4361","text":"Jae-Young Choi"},{"@pid":"01/11192","text":"Young-Hwa Cho"}]},"title":"Toward Offline Contents Based Software R&D Support System.","venue":"CSA/CUTE","pages":"1097-1101","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimHSCKCC17","doi":"10.1007/978-981-10-7605-3_175","ee":"https://doi.org/10.1007/978-981-10-7605-3_175","url":"https://dblp.org/rec/conf/csa2/KimHSCKCC17"}, "url":"URL#2899666" }, { "@score":"1", "@id":"2899667", "info":{"authors":{"author":[{"@pid":"203/9898","text":"Jinseong Kim"},{"@pid":"98/4065","text":"Im Young Jung"}]},"title":"Private Data Protection of Android Application.","venue":"CSA/CUTE","pages":"1470-1475","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimJ17","doi":"10.1007/978-981-10-7605-3_234","ee":"https://doi.org/10.1007/978-981-10-7605-3_234","url":"https://dblp.org/rec/conf/csa2/KimJ17"}, "url":"URL#2899667" }, { "@score":"1", "@id":"2899668", "info":{"authors":{"author":[{"@pid":"137/3638","text":"Heajin Kim"},{"@pid":"86/8241","text":"Youngho Jo"},{"@pid":"214/9427","text":"Hana Lee"},{"@pid":"161/7236","text":"Mincheol Whang"}]},"title":"The Two Dimensional Model of Social Emotion Based on Social Life Logging.","venue":"CSA/CUTE","pages":"1422-1427","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimJLW17","doi":"10.1007/978-981-10-7605-3_226","ee":"https://doi.org/10.1007/978-981-10-7605-3_226","url":"https://dblp.org/rec/conf/csa2/KimJLW17"}, "url":"URL#2899668" }, { "@score":"1", "@id":"2899669", "info":{"authors":{"author":[{"@pid":"27/471","text":"Jiyong Kim"},{"@pid":"199/2521","text":"Hyunsu Jeong"},{"@pid":"199/2579","text":"Azure Yvette Pham"},{"@pid":"65/7965","text":"Changhyeon Lee"},{"@pid":"199/2843","text":"Thiha Soe"},{"@pid":"39/4251","text":"Pilwoo Lee"},{"@pid":"67/10733","text":"Mingu Lee"},{"@pid":"199/2558","text":"Seong Woo Kim"},{"@pid":"199/2826","text":"Juhyun Eune"}]},"title":"Introduction of an Interactive Growing Robot/Toy for Babies.","venue":"CSA/CUTE","pages":"120-125","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimJPLSLLKE17","doi":"10.1007/978-981-10-7605-3_20","ee":"https://doi.org/10.1007/978-981-10-7605-3_20","url":"https://dblp.org/rec/conf/csa2/KimJPLSLLKE17"}, "url":"URL#2899669" }, { "@score":"1", "@id":"2899670", "info":{"authors":{"author":[{"@pid":"208/0761","text":"Chorwon Kim"},{"@pid":"141/9955","text":"Seungryong Kim"},{"@pid":"05/6022-1","text":"JongWon Kim 0001"}]},"title":"Understanding Automated Continuous Integration for Containerized Smart Energy IoT-Cloud Service.","venue":"CSA/CUTE","pages":"1275-1280","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimK017","doi":"10.1007/978-981-10-7605-3_203","ee":"https://doi.org/10.1007/978-981-10-7605-3_203","url":"https://dblp.org/rec/conf/csa2/KimK017"}, "url":"URL#2899670" }, { "@score":"1", "@id":"2899671", "info":{"authors":{"author":[{"@pid":"36/6732","text":"Jeong Ah Kim"},{"@pid":"246/4064","text":"Dae Young Ko"}]},"title":"Survey of On-Line & Block Programming Language-Scratch: On Perspective of Educational Achievements.","venue":"CSA/CUTE","pages":"35-40","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimK17","doi":"10.1007/978-981-10-7605-3_6","ee":"https://doi.org/10.1007/978-981-10-7605-3_6","url":"https://dblp.org/rec/conf/csa2/KimK17"}, "url":"URL#2899671" }, { "@score":"1", "@id":"2899672", "info":{"authors":{"author":[{"@pid":"246/4024","text":"Guk-Il Kim"},{"@pid":"166/6499","text":"Jonghyeon Kim"}]},"title":"A Simulated Infiltration Test for Network in Virtual Environment Using VMware Virtualization Technique.","venue":"CSA/CUTE","pages":"204-209","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimK17a","doi":"10.1007/978-981-10-7605-3_34","ee":"https://doi.org/10.1007/978-981-10-7605-3_34","url":"https://dblp.org/rec/conf/csa2/KimK17a"}, "url":"URL#2899672" }, { "@score":"1", "@id":"2899673", "info":{"authors":{"author":[{"@pid":"246/4024","text":"Guk-Il Kim"},{"@pid":"166/6499","text":"Jonghyeon Kim"}]},"title":"Development of Network Cyber Attack Training Curriculum for Security Staff.","venue":"CSA/CUTE","pages":"210-214","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimK17b","doi":"10.1007/978-981-10-7605-3_35","ee":"https://doi.org/10.1007/978-981-10-7605-3_35","url":"https://dblp.org/rec/conf/csa2/KimK17b"}, "url":"URL#2899673" }, { "@score":"1", "@id":"2899674", "info":{"authors":{"author":[{"@pid":"246/4091","text":"Deuk-Hun Kim"},{"@pid":"07/2050","text":"Jin Kwak"}]},"title":"A Framework for Preventing Illegitimate e-Prescribing Practices.","venue":"CSA/CUTE","pages":"648-653","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimK17c","doi":"10.1007/978-981-10-7605-3_105","ee":"https://doi.org/10.1007/978-981-10-7605-3_105","url":"https://dblp.org/rec/conf/csa2/KimK17c"}, "url":"URL#2899674" }, { "@score":"1", "@id":"2899675", "info":{"authors":{"author":[{"@pid":"51/1969","text":"Jonghoon Kim"},{"@pid":"80/1745","text":"Incheol Kim"}]},"title":"Scalable Distributed Temporal Reasoning.","venue":"CSA/CUTE","pages":"829-835","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimK17d","doi":"10.1007/978-981-10-7605-3_132","ee":"https://doi.org/10.1007/978-981-10-7605-3_132","url":"https://dblp.org/rec/conf/csa2/KimK17d"}, "url":"URL#2899675" }, { "@score":"1", "@id":"2899676", "info":{"authors":{"author":[{"@pid":"02/112","text":"Yong-Hwan Kim"},{"@pid":"29/1848","text":"Ki-Hyeon Kim"},{"@pid":"91/2995","text":"Joon-Min Gil"},{"@pid":"66/2701","text":"Dongkyun Kim"}]},"title":"Seamless Reconfiguration of Virtual Dedicate Network Based on Software Defined Network.","venue":"CSA/CUTE","pages":"161-167","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimKGK17","doi":"10.1007/978-981-10-7605-3_27","ee":"https://doi.org/10.1007/978-981-10-7605-3_27","url":"https://dblp.org/rec/conf/csa2/KimKGK17"}, "url":"URL#2899676" }, { "@score":"1", "@id":"2899677", "info":{"authors":{"author":[{"@pid":"46/3639-5","text":"Jihun Kim 0005"},{"@pid":"189/2767","text":"Kwangman Ko"},{"@pid":"17/2716","text":"Jonghee M. Youn"}]},"title":"Building the De-obfuscation Platform Based on LLVM.","venue":"CSA/CUTE","pages":"1269-1274","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimKY17","doi":"10.1007/978-981-10-7605-3_202","ee":"https://doi.org/10.1007/978-981-10-7605-3_202","url":"https://dblp.org/rec/conf/csa2/KimKY17"}, "url":"URL#2899677" }, { "@score":"1", "@id":"2899678", "info":{"authors":{"author":[{"@pid":"246/4108","text":"Kwan Soo Kim"},{"@pid":"226/9603","text":"Hyun Ho Kang"},{"@pid":"179/0799","text":"Sung Hyun You"},{"@pid":"32/8511","text":"Choon Ki Ahn"}]},"title":"Vision-Based Humanoid Robot Control Using FIR Filter.","venue":"CSA/CUTE","pages":"1289-1294","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimKYA17","doi":"10.1007/978-981-10-7605-3_205","ee":"https://doi.org/10.1007/978-981-10-7605-3_205","url":"https://dblp.org/rec/conf/csa2/KimKYA17"}, "url":"URL#2899678" }, { "@score":"1", "@id":"2899679", "info":{"authors":{"author":[{"@pid":"45/6898","text":"Suhyun Kim"},{"@pid":"20/2771","text":"Imyeong Lee"}]},"title":"Secure Multicast Using Proxy Re-encryption in IoT Environment.","venue":"CSA/CUTE","pages":"66-70","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimL17","doi":"10.1007/978-981-10-7605-3_11","ee":"https://doi.org/10.1007/978-981-10-7605-3_11","url":"https://dblp.org/rec/conf/csa2/KimL17"}, "url":"URL#2899679" }, { "@score":"1", "@id":"2899680", "info":{"authors":{"author":[{"@pid":"40/8949","text":"Yong-Kyun Kim"},{"@pid":"03/280","text":"Seoung-Hyeon Lee"}]},"title":"An Implementation of Unidirectional Security Gateway to Guarantees Inter-VTS Exchange Service Security.","venue":"CSA/CUTE","pages":"790-794","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimL17a","doi":"10.1007/978-981-10-7605-3_126","ee":"https://doi.org/10.1007/978-981-10-7605-3_126","url":"https://dblp.org/rec/conf/csa2/KimL17a"}, "url":"URL#2899680" }, { "@score":"1", "@id":"2899681", "info":{"authors":{"author":[{"@pid":"77/5080","text":"Ki-Jin Kim"},{"@pid":"58/4230","text":"Seung-Ho Lim"}]},"title":"Compression and Variable-Sized ECC Scheme for the Reliable Flash Memory System.","venue":"CSA/CUTE","pages":"1232-1236","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimL17b","doi":"10.1007/978-981-10-7605-3_196","ee":"https://doi.org/10.1007/978-981-10-7605-3_196","url":"https://dblp.org/rec/conf/csa2/KimL17b"}, "url":"URL#2899681" }, { "@score":"1", "@id":"2899682", "info":{"authors":{"author":[{"@pid":"246/4005","text":"Taehyuk Kim"},{"@pid":"144/4723","text":"Minseok Lee"},{"@pid":"20/6792","text":"Doo-Ho Choi"},{"@pid":"27/276","text":"Taek-Young Youn"}]},"title":"A Solution for Reducing Redistribution Costs of HAIL.","venue":"CSA/CUTE","pages":"973-978","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimLCY17","doi":"10.1007/978-981-10-7605-3_155","ee":"https://doi.org/10.1007/978-981-10-7605-3_155","url":"https://dblp.org/rec/conf/csa2/KimLCY17"}, "url":"URL#2899682" }, { "@score":"1", "@id":"2899683", "info":{"authors":{"author":[{"@pid":"07/69","text":"Ki-Hwan Kim"},{"@pid":"230/0650","text":"Dong-il Lee"},{"@pid":"46/8957","text":"Yong-Tae Shin"}]},"title":"Research on Cloud-Based on Web Application Malware Detection Methods.","venue":"CSA/CUTE","pages":"817-822","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimLS17","doi":"10.1007/978-981-10-7605-3_130","ee":"https://doi.org/10.1007/978-981-10-7605-3_130","url":"https://dblp.org/rec/conf/csa2/KimLS17"}, "url":"URL#2899683" }, { "@score":"1", "@id":"2899684", "info":{"authors":{"author":[{"@pid":"53/2880","text":"Jinah Kim"},{"@pid":"82/6840","text":"Nammee Moon"}]},"title":"Design of Consumer Behavior Analysis by Region Through Reflecting Social Atmosphere Based on SNS.","venue":"CSA/CUTE","pages":"1020-1025","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimM17","doi":"10.1007/978-981-10-7605-3_163","ee":"https://doi.org/10.1007/978-981-10-7605-3_163","url":"https://dblp.org/rec/conf/csa2/KimM17"}, "url":"URL#2899684" }, { "@score":"1", "@id":"2899685", "info":{"authors":{"author":[{"@pid":"20/2447","text":"Dae-Won Kim"},{"@pid":"55/1595","text":"Soo-Cheol Oh"},{"@pid":"246/4030","text":"Jae-Geun Cha"},{"@pid":"97/9794","text":"JiHyeok Choi"},{"@pid":"45/8376","text":"Sunwook Kim"},{"@pid":"70/263","text":"Seongwoon Kim"}]},"title":"Fast Provisioning Service in Shared-Storage Based VDI According to User's Type.","venue":"CSA/CUTE","pages":"71-76","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimOCCKK17","doi":"10.1007/978-981-10-7605-3_12","ee":"https://doi.org/10.1007/978-981-10-7605-3_12","url":"https://dblp.org/rec/conf/csa2/KimOCCKK17"}, "url":"URL#2899685" }, { "@score":"1", "@id":"2899686", "info":{"authors":{"author":[{"@pid":"15/5695","text":"Jeong-Dong Kim"},{"@pid":"122/3594","text":"Min-Gyu Park"},{"@pid":"246/4105","text":"Do-Yeon Ki"},{"@pid":"246/4111","text":"Bum-Hee Cho"},{"@pid":"145/4435","text":"Gil-Yong Lee"},{"@pid":"07/6461","text":"Bongjae Kim"}]},"title":"IoT-Based VR Service Model to Improve Exercise Capacity.","venue":"CSA/CUTE","pages":"1037-1042","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimPKCLK17","doi":"10.1007/978-981-10-7605-3_166","ee":"https://doi.org/10.1007/978-981-10-7605-3_166","url":"https://dblp.org/rec/conf/csa2/KimPKCLK17"}, "url":"URL#2899686" }, { "@score":"1", "@id":"2899687", "info":{"authors":{"author":[{"@pid":"246/4097","text":"DongYeop Kim"},{"@pid":"192/3779","text":"Ye-Seul Park"},{"@pid":"32/3534","text":"Byungjeong Lee"},{"@pid":"40/3016","text":"Jung-Won Lee"}]},"title":"Association-Based Process Integration for Compliance with Core Standards in Development of Medical Software.","venue":"CSA/CUTE","pages":"1220-1226","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimPLL17","doi":"10.1007/978-981-10-7605-3_194","ee":"https://doi.org/10.1007/978-981-10-7605-3_194","url":"https://dblp.org/rec/conf/csa2/KimPLL17"}, "url":"URL#2899687" }, { "@score":"1", "@id":"2899688", "info":{"authors":{"author":[{"@pid":"222/3816","text":"Nam Yong Kim"},{"@pid":"235/6395","text":"Kyung Yeob Park"},{"@pid":"p/JongHyukPark","text":"Jong Hyuk Park"}]},"title":"DOTP-AaaS: Dynamic One Time Password Matching-Based Authentication as a Service.","venue":"CSA/CUTE","pages":"962-966","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimPP17","doi":"10.1007/978-981-10-7605-3_153","ee":"https://doi.org/10.1007/978-981-10-7605-3_153","url":"https://dblp.org/rec/conf/csa2/KimPP17"}, "url":"URL#2899688" }, { "@score":"1", "@id":"2899689", "info":{"authors":{"author":[{"@pid":"68/469","text":"Hyon Hee Kim"},{"@pid":"246/4078","text":"Ki Yon Rhew"}]},"title":"A Machine Learning Approach to Classification of Case Reports on Adverse Drug Reactions Using Text Mining of Expert Opinions.","venue":"CSA/CUTE","pages":"1072-1077","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimR17","doi":"10.1007/978-981-10-7605-3_171","ee":"https://doi.org/10.1007/978-981-10-7605-3_171","url":"https://dblp.org/rec/conf/csa2/KimR17"}, "url":"URL#2899689" }, { "@score":"1", "@id":"2899690", "info":{"authors":{"author":[{"@pid":"07/6461","text":"Bongjae Kim"},{"@pid":"305/9804","text":"Hyeontae Seo"},{"@pid":"15/5695","text":"Jeong-Dong Kim"}]},"title":"Design and Implementation of a Wearable Device for the Blind by Using Deep Learning Based Object Recognition.","venue":"CSA/CUTE","pages":"1008-1013","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimSK17","doi":"10.1007/978-981-10-7605-3_161","ee":"https://doi.org/10.1007/978-981-10-7605-3_161","url":"https://dblp.org/rec/conf/csa2/KimSK17"}, "url":"URL#2899690" }, { "@score":"1", "@id":"2899691", "info":{"authors":{"author":[{"@pid":"94/10472","text":"Doyeon Kim"},{"@pid":"57/2855","text":"Dongkyoo Shin"},{"@pid":"85/2364","text":"Dongil Shin"}]},"title":"Data Set Construction and Performance Comparison of Machine Learning Algorithm for Detection of Unauthorized AP.","venue":"CSA/CUTE","pages":"910-914","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimSS17","doi":"10.1007/978-981-10-7605-3_144","ee":"https://doi.org/10.1007/978-981-10-7605-3_144","url":"https://dblp.org/rec/conf/csa2/KimSS17"}, "url":"URL#2899691" }, { "@score":"1", "@id":"2899692", "info":{"authors":{"author":[{"@pid":"246/4022","text":"SangHyong Kim"},{"@pid":"45/1653","text":"Yoojae Won"}]},"title":"Frame Rate Control Buffer Management Technique for High-Quality Real-Time Video Conferencing System.","venue":"CSA/CUTE","pages":"777-783","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KimW17","doi":"10.1007/978-981-10-7605-3_124","ee":"https://doi.org/10.1007/978-981-10-7605-3_124","url":"https://dblp.org/rec/conf/csa2/KimW17"}, "url":"URL#2899692" }, { "@score":"1", "@id":"2899693", "info":{"authors":{"author":[{"@pid":"177/3035","text":"Taehoon Koh"},{"@pid":"88/9471","text":"Yonghoon Kim"},{"@pid":"246/4117","text":"Kamyoung Park"},{"@pid":"125/0315","text":"Jeongho Lee"},{"@pid":"49/6206","text":"Kyungryong Seo"}]},"title":"Communication System of e-Navigation Between Vessel and Shore Utilizing Representational State Transfer at Sea.","venue":"CSA/CUTE","pages":"990-997","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KohKPLS17","doi":"10.1007/978-981-10-7605-3_158","ee":"https://doi.org/10.1007/978-981-10-7605-3_158","url":"https://dblp.org/rec/conf/csa2/KohKPLS17"}, "url":"URL#2899693" }, { "@score":"1", "@id":"2899694", "info":{"authors":{"author":[{"@pid":"168/1843","text":"Qiuming Kuang"},{"@pid":"92/9454","text":"Xuebing Yang"},{"@pid":"94/6627-2","text":"Wensheng Zhang 0002"},{"@pid":"99/6600","text":"Guoping Zhang"},{"@pid":"x/NaixueXiong","text":"Naixue Xiong"}]},"title":"An Effective High Resolution Rainfall Estimation Based on Spatiotemporal Modeling.","venue":"CSA/CUTE","pages":"721-726","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KuangYZZX17","doi":"10.1007/978-981-10-7605-3_116","ee":"https://doi.org/10.1007/978-981-10-7605-3_116","url":"https://dblp.org/rec/conf/csa2/KuangYZZX17"}, "url":"URL#2899694" }, { "@score":"1", "@id":"2899695", "info":{"authors":{"author":[{"@pid":"236/9450","text":"Sojung Kwak"},{"@pid":"80/6955","text":"Jieun Kwon"}]},"title":"Usability Improvement of Life-Logging Contents Based on Gamification Factors.","venue":"CSA/CUTE","pages":"1326-1331","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KwakK17","doi":"10.1007/978-981-10-7605-3_211","ee":"https://doi.org/10.1007/978-981-10-7605-3_211","url":"https://dblp.org/rec/conf/csa2/KwakK17"}, "url":"URL#2899695" }, { "@score":"1", "@id":"2899696", "info":{"authors":{"author":[{"@pid":"195/3491","text":"Jeonghoon Kwak"},{"@pid":"22/7652","text":"Yunsick Sung"}]},"title":"Gesture-Based User Interface Design for UAV Controls.","venue":"CSA/CUTE","pages":"985-989","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KwakS17","doi":"10.1007/978-981-10-7605-3_157","ee":"https://doi.org/10.1007/978-981-10-7605-3_157","url":"https://dblp.org/rec/conf/csa2/KwakS17"}, "url":"URL#2899696" }, { "@score":"1", "@id":"2899697", "info":{"authors":{"author":[{"@pid":"246/4025","text":"Yejin Kwon"},{"@pid":"71/8765","text":"Inho Jeon"},{"@pid":"209/2622","text":"Sik Lee"},{"@pid":"88/5061","text":"Kumwon Cho"},{"@pid":"90/5224","text":"Jerry H. Seo"}]},"title":"Development of Virtual Workbench to Solve Computational Science Problem.","venue":"CSA/CUTE","pages":"895-900","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KwonJLCS17","doi":"10.1007/978-981-10-7605-3_142","ee":"https://doi.org/10.1007/978-981-10-7605-3_142","url":"https://dblp.org/rec/conf/csa2/KwonJLCS17"}, "url":"URL#2899697" }, { "@score":"1", "@id":"2899698", "info":{"authors":{"author":[{"@pid":"221/7327","text":"Yea-Hoon Kwon"},{"@pid":"246/4055","text":"Yiyan Nan"},{"@pid":"46/1853","text":"Shin-Dug Kim"}]},"title":"Transformation of EEG Signal for Emotion Analysis and Dataset Construction for DNN Learning.","venue":"CSA/CUTE","pages":"96-101","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KwonNK17","doi":"10.1007/978-981-10-7605-3_16","ee":"https://doi.org/10.1007/978-981-10-7605-3_16","url":"https://dblp.org/rec/conf/csa2/KwonNK17"}, "url":"URL#2899698" }, { "@score":"1", "@id":"2899699", "info":{"authors":{"author":[{"@pid":"246/4002","text":"Byung Wook Kwon"},{"@pid":"p/JongHyukPark","text":"Jong Hyuk Park"}]},"title":"EEG Based Smart Driving for Intelligent Accident Management.","venue":"CSA/CUTE","pages":"957-961","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KwonP17","doi":"10.1007/978-981-10-7605-3_152","ee":"https://doi.org/10.1007/978-981-10-7605-3_152","url":"https://dblp.org/rec/conf/csa2/KwonP17"}, "url":"URL#2899699" }, { "@score":"1", "@id":"2899700", "info":{"authors":{"author":[{"@pid":"246/4121","text":"Min-Woo Kwon"},{"@pid":"22/6869","text":"JunWeon Yoon"},{"@pid":"73/2296","text":"Taeyoung Hong"},{"@pid":"225/1850","text":"ChanYeol Park"}]},"title":"Accelerated Purge Processes of Parallel File System on HPC by Using MPI Programming.","venue":"CSA/CUTE","pages":"1134-1140","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/KwonYHP17","doi":"10.1007/978-981-10-7605-3_181","ee":"https://doi.org/10.1007/978-981-10-7605-3_181","url":"https://dblp.org/rec/conf/csa2/KwonYHP17"}, "url":"URL#2899700" }, { "@score":"1", "@id":"2899701", "info":{"authors":{"author":[{"@pid":"246/4015","text":"Tung La-Ngoc"},{"@pid":"04/4899","text":"Gihwon Kwon"}]},"title":"Comparing the Effectiveness of SFMEA and STPA in Software-Intensive Railway Level Crossing System.","venue":"CSA/CUTE","pages":"1281-1288","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/La-NgocK17","doi":"10.1007/978-981-10-7605-3_204","ee":"https://doi.org/10.1007/978-981-10-7605-3_204","url":"https://dblp.org/rec/conf/csa2/La-NgocK17"}, "url":"URL#2899701" }, { "@score":"1", "@id":"2899702", "info":{"authors":{"author":[{"@pid":"88/4988","text":"Andy Shui-Yu Lai"},{"@pid":"246/4104","text":"Anson Man-Sing Ma"}]},"title":"Designing Network-Attached Storage Architecture for Small and Medium Enterprise Applications.","venue":"CSA/CUTE","pages":"274-279","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LaiM17","doi":"10.1007/978-981-10-7605-3_45","ee":"https://doi.org/10.1007/978-981-10-7605-3_45","url":"https://dblp.org/rec/conf/csa2/LaiM17"}, "url":"URL#2899702" }, { "@score":"1", "@id":"2899703", "info":{"authors":{"author":[{"@pid":"55/8846","text":"Hyunwoo Lee"},{"@pid":"246/4012","text":"Ayoung Cho"},{"@pid":"246/4101","text":"Youseop Jo"},{"@pid":"161/7236","text":"Mincheol Whang"}]},"title":"The Relationships Between Behavioral Patterns and Emotions in Daily Life.","venue":"CSA/CUTE","pages":"1332-1339","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LeeCJW17","doi":"10.1007/978-981-10-7605-3_212","ee":"https://doi.org/10.1007/978-981-10-7605-3_212","url":"https://dblp.org/rec/conf/csa2/LeeCJW17"}, "url":"URL#2899703" }, { "@score":"1", "@id":"2899704", "info":{"authors":{"author":[{"@pid":"214/9427","text":"Hana Lee"},{"@pid":"86/8241","text":"Youngho Jo"},{"@pid":"137/3638","text":"Heajin Kim"},{"@pid":"161/7236","text":"Mincheol Whang"}]},"title":"Patterns of Cardiovascular and Behavioral Movements in Life-Logging According to Social Emotions.","venue":"CSA/CUTE","pages":"1377-1382","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LeeJKW17","doi":"10.1007/978-981-10-7605-3_219","ee":"https://doi.org/10.1007/978-981-10-7605-3_219","url":"https://dblp.org/rec/conf/csa2/LeeJKW17"}, "url":"URL#2899704" }, { "@score":"1", "@id":"2899705", "info":{"authors":{"author":[{"@pid":"246/4028","text":"Hoon-Gi Lee"},{"@pid":"246/4016","text":"Hie-Sik Kim"}]},"title":"Implementation of Redundant Digital Excitation Control System Algorithm.","venue":"CSA/CUTE","pages":"131-136","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LeeK17","doi":"10.1007/978-981-10-7605-3_22","ee":"https://doi.org/10.1007/978-981-10-7605-3_22","url":"https://dblp.org/rec/conf/csa2/LeeK17"}, "url":"URL#2899705" }, { "@score":"1", "@id":"2899706", "info":{"authors":{"author":[{"@pid":"246/4028","text":"Hoon-Gi Lee"},{"@pid":"246/4016","text":"Hie-Sik Kim"}]},"title":"A Method for Replacing Protective Relay at Kanudi Power Plant and Validation.","venue":"CSA/CUTE","pages":"143-148","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LeeK17a","doi":"10.1007/978-981-10-7605-3_24","ee":"https://doi.org/10.1007/978-981-10-7605-3_24","url":"https://dblp.org/rec/conf/csa2/LeeK17a"}, "url":"URL#2899706" }, { "@score":"1", "@id":"2899707", "info":{"authors":{"author":[{"@pid":"72/6418","text":"Jaeyong Lee"},{"@pid":"246/4083","text":"Kyong-Ah Kim"},{"@pid":"19/4633","text":"Yoo-Joo Choi"}]},"title":"Multi-scale Surface Curvature Based on Mesh Simplification.","venue":"CSA/CUTE","pages":"1078-1083","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LeeKC17","doi":"10.1007/978-981-10-7605-3_172","ee":"https://doi.org/10.1007/978-981-10-7605-3_172","url":"https://dblp.org/rec/conf/csa2/LeeKC17"}, "url":"URL#2899707" }, { "@score":"1", "@id":"2899708", "info":{"authors":{"author":[{"@pid":"14/10806","text":"Kunyoung Lee"},{"@pid":"65/3681","text":"Eui Chul Lee"}]},"title":"Comparison of 2D&3D Performances of Facial Feature Analysis Using RGB-D Vision Sensor.","venue":"CSA/CUTE","pages":"1416-1421","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LeeL17","doi":"10.1007/978-981-10-7605-3_225","ee":"https://doi.org/10.1007/978-981-10-7605-3_225","url":"https://dblp.org/rec/conf/csa2/LeeL17"}, "url":"URL#2899708" }, { "@score":"1", "@id":"2899709", "info":{"authors":{"author":[{"@pid":"45/11072","text":"Sangdo Lee"},{"@pid":"246/4099","text":"Hoanh-Su Le"},{"@pid":"58/3207","text":"Jun-Ho Huh"}]},"title":"A Keyword-Based Big Data Analysis for Individualized Health Activity Using Keyword Analysis Technique: A Methodological Approach Using National Health Data.","venue":"CSA/CUTE","pages":"1237-1243","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LeeLH17","doi":"10.1007/978-981-10-7605-3_197","ee":"https://doi.org/10.1007/978-981-10-7605-3_197","url":"https://dblp.org/rec/conf/csa2/LeeLH17"}, "url":"URL#2899709" }, { "@score":"1", "@id":"2899710", "info":{"authors":{"author":[{"@pid":"52/11532","text":"Jae-Gwang Lee"},{"@pid":"03/280","text":"Seoung-Hyeon Lee"},{"@pid":"60/1721","text":"Jae-Kwang Lee"}]},"title":"Positioning Model Design Using Beacon and Geomagnetic Sensor of Smartphone.","venue":"CSA/CUTE","pages":"192-197","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LeeLL17","doi":"10.1007/978-981-10-7605-3_32","ee":"https://doi.org/10.1007/978-981-10-7605-3_32","url":"https://dblp.org/rec/conf/csa2/LeeLL17"}, "url":"URL#2899710" }, { "@score":"1", "@id":"2899711", "info":{"authors":{"author":[{"@pid":"231/8676","text":"Hyun-Seong Lee"},{"@pid":"03/280","text":"Seoung-Hyeon Lee"},{"@pid":"52/11532","text":"Jae-Gwang Lee"},{"@pid":"60/1721","text":"Jae-Kwang Lee"}]},"title":"Design of Beacon-Based Positioning System Using RF and Sound Wave in Smartphone.","venue":"CSA/CUTE","pages":"180-186","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LeeLLL17","doi":"10.1007/978-981-10-7605-3_30","ee":"https://doi.org/10.1007/978-981-10-7605-3_30","url":"https://dblp.org/rec/conf/csa2/LeeLLL17"}, "url":"URL#2899711" }, { "@score":"1", "@id":"2899712", "info":{"authors":{"author":[{"@pid":"144/5555","text":"Sunmin Lee"},{"@pid":"82/6840","text":"Nammee Moon"}]},"title":"An Indoor Positioning System Using RSSI and BSSID.","venue":"CSA/CUTE","pages":"1031-1036","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LeeM17","doi":"10.1007/978-981-10-7605-3_165","ee":"https://doi.org/10.1007/978-981-10-7605-3_165","url":"https://dblp.org/rec/conf/csa2/LeeM17"}, "url":"URL#2899712" }, { "@score":"1", "@id":"2899713", "info":{"authors":{"author":[{"@pid":"246/4115","text":"Suhyoo Lee"},{"@pid":"220/8825","text":"Junhoo Park"},{"@pid":"74/1775","text":"Jaecheol Ryou 0001"}]},"title":"Method to Modify the Hex of Android Manifest File in Android Apps for Dynamic Analysis.","venue":"CSA/CUTE","pages":"784-789","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LeePR17","doi":"10.1007/978-981-10-7605-3_125","ee":"https://doi.org/10.1007/978-981-10-7605-3_125","url":"https://dblp.org/rec/conf/csa2/LeePR17"}, "url":"URL#2899713" }, { "@score":"1", "@id":"2899714", "info":{"authors":{"author":[{"@pid":"145/8179","text":"Soonyong Lee"},{"@pid":"64/4502","text":"Ji Su Park"},{"@pid":"41/4403","text":"Jin Gon Shon"}]},"title":"SBraille: A New Braille Input Method for Mobile Devices.","venue":"CSA/CUTE","pages":"528-533","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LeePS17","doi":"10.1007/978-981-10-7605-3_87","ee":"https://doi.org/10.1007/978-981-10-7605-3_87","url":"https://dblp.org/rec/conf/csa2/LeePS17"}, "url":"URL#2899714" }, { "@score":"1", "@id":"2899715", "info":{"authors":{"author":[{"@pid":"51/1210","text":"Seung-Hoon Lee"},{"@pid":"246/4127","text":"Chang-Hyeok Seok"}]},"title":"A Critical Review on Operation and Management System of Doping Control Officer in Korea Anti-Doping Agency.","venue":"CSA/CUTE","pages":"149-154","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LeeS17","doi":"10.1007/978-981-10-7605-3_25","ee":"https://doi.org/10.1007/978-981-10-7605-3_25","url":"https://dblp.org/rec/conf/csa2/LeeS17"}, "url":"URL#2899715" }, { "@score":"1", "@id":"2899716", "info":{"authors":{"author":[{"@pid":"51/1210","text":"Seung-Hoon Lee"},{"@pid":"246/4127","text":"Chang-Hyeok Seok"}]},"title":"The Issues of Media and Public Ethics on Doping Problems.","venue":"CSA/CUTE","pages":"155-160","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LeeS17a","doi":"10.1007/978-981-10-7605-3_26","ee":"https://doi.org/10.1007/978-981-10-7605-3_26","url":"https://dblp.org/rec/conf/csa2/LeeS17a"}, "url":"URL#2899716" }, { "@score":"1", "@id":"2899717", "info":{"authors":{"author":[{"@pid":"78/6080","text":"Jaeho Lee"},{"@pid":"246/4053","text":"Bong-Ki Son"}]},"title":"A Novel for Light-Weighted Indoor Positioning Algorithm with Hybridizing Trilateration and Fingerprinting Method Considering Bluetooth Low Energy Environment.","venue":"CSA/CUTE","pages":"174-179","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LeeS17b","doi":"10.1007/978-981-10-7605-3_29","ee":"https://doi.org/10.1007/978-981-10-7605-3_29","url":"https://dblp.org/rec/conf/csa2/LeeS17b"}, "url":"URL#2899717" }, { "@score":"1", "@id":"2899718", "info":{"authors":{"author":[{"@pid":"45/11072","text":"Sangdo Lee"},{"@pid":"82/2993","text":"Yongtae Shin"}]},"title":"A Study of Service Quality in Multi Cloud Computing.","venue":"CSA/CUTE","pages":"811-816","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LeeS17c","doi":"10.1007/978-981-10-7605-3_129","ee":"https://doi.org/10.1007/978-981-10-7605-3_129","url":"https://dblp.org/rec/conf/csa2/LeeS17c"}, "url":"URL#2899718" }, { "@score":"1", "@id":"2899719", "info":{"authors":{"author":[{"@pid":"45/11072","text":"Sangdo Lee"},{"@pid":"82/2993","text":"Yongtae Shin"}]},"title":"The Direction of Information Security Control Analysis Using Artificial Intelligence.","venue":"CSA/CUTE","pages":"872-877","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LeeS17d","doi":"10.1007/978-981-10-7605-3_138","ee":"https://doi.org/10.1007/978-981-10-7605-3_138","url":"https://dblp.org/rec/conf/csa2/LeeS17d"}, "url":"URL#2899719" }, { "@score":"1", "@id":"2899720", "info":{"authors":{"author":[{"@pid":"246/4042","text":"JoongHoon Lee"},{"@pid":"246/4058","text":"HyuckJoong Yoon"},{"@pid":"38/4232","text":"Tae-Sun Chung"}]},"title":"A Study on Traffic Signal Waiting Model Using Queuing Theory.","venue":"CSA/CUTE","pages":"1391-1396","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LeeYC17","doi":"10.1007/978-981-10-7605-3_221","ee":"https://doi.org/10.1007/978-981-10-7605-3_221","url":"https://dblp.org/rec/conf/csa2/LeeYC17"}, "url":"URL#2899720" }, { "@score":"1", "@id":"2899721", "info":{"authors":{"author":[{"@pid":"144/6303","text":"Dae Hyun Lee"},{"@pid":"246/4019","text":"Yen-Woo You"},{"@pid":"54/7041","text":"Yong Kim"}]},"title":"An Analysis of Online Learning Tools Based on Participatory Interaction: Focused on an Analysis of the Minerva School Case.","venue":"CSA/CUTE","pages":"1199-1206","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LeeYK17","doi":"10.1007/978-981-10-7605-3_191","ee":"https://doi.org/10.1007/978-981-10-7605-3_191","url":"https://dblp.org/rec/conf/csa2/LeeYK17"}, "url":"URL#2899721" }, { "@score":"1", "@id":"2899722", "info":{"authors":{"author":{"@pid":"05/2053","text":"Tingting Li"}},"title":"Analysis and Inspiration to Intelligent Command and Control.","venue":"CSA/CUTE","pages":"579-585","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/Li17","doi":"10.1007/978-981-10-7605-3_95","ee":"https://doi.org/10.1007/978-981-10-7605-3_95","url":"https://dblp.org/rec/conf/csa2/Li17"}, "url":"URL#2899722" }, { "@score":"1", "@id":"2899723", "info":{"authors":{"author":[{"@pid":"124/3254","text":"De Li"},{"@pid":"26/8959","text":"Lihua Cui"}]},"title":"Robust Animation Zero Watermarking Based on Visual Cryptography and Complete Complementary Code.","venue":"CSA/CUTE","pages":"60-65","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LiC17","doi":"10.1007/978-981-10-7605-3_10","ee":"https://doi.org/10.1007/978-981-10-7605-3_10","url":"https://dblp.org/rec/conf/csa2/LiC17"}, "url":"URL#2899723" }, { "@score":"1", "@id":"2899724", "info":{"authors":{"author":[{"@pid":"246/4081","text":"Ruisheng Li"},{"@pid":"70/6176-20","text":"Bin Ma 0020"},{"@pid":"39/4772-2","text":"Lili He 0002"},{"@pid":"92/1375-1","text":"Jin Wang 0001"}]},"title":"Design and Implement of Intelligent Insole System.","venue":"CSA/CUTE","pages":"341-345","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LiM0W17","doi":"10.1007/978-981-10-7605-3_56","ee":"https://doi.org/10.1007/978-981-10-7605-3_56","url":"https://dblp.org/rec/conf/csa2/LiM0W17"}, "url":"URL#2899724" }, { "@score":"1", "@id":"2899725", "info":{"authors":{"author":[{"@pid":"33/5448","text":"Jian Li"},{"@pid":"03/3289","text":"Jianjun Qian"},{"@pid":"155/0258","text":"Yuhui Zheng"}]},"title":"Ensemble R-FCN for Object Detection.","venue":"CSA/CUTE","pages":"400-406","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LiQZ17","doi":"10.1007/978-981-10-7605-3_66","ee":"https://doi.org/10.1007/978-981-10-7605-3_66","url":"https://dblp.org/rec/conf/csa2/LiQZ17"}, "url":"URL#2899725" }, { "@score":"1", "@id":"2899726", "info":{"authors":{"author":[{"@pid":"38/4000","text":"Li Lin"},{"@pid":"01/2537-9","text":"Jin Liu 0009"},{"@pid":"246/3992","text":"Zhenkai Gu"},{"@pid":"133/2430","text":"Zelun Zhang"},{"@pid":"221/1170","text":"Haoliang Ren"}]},"title":"Build Chinese Language Model with Recurrent Neural Network.","venue":"CSA/CUTE","pages":"920-925","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LinLGZR17","doi":"10.1007/978-981-10-7605-3_146","ee":"https://doi.org/10.1007/978-981-10-7605-3_146","url":"https://dblp.org/rec/conf/csa2/LinLGZR17"}, "url":"URL#2899726" }, { "@score":"1", "@id":"2899727", "info":{"authors":{"author":[{"@pid":"38/4000","text":"Li Lin"},{"@pid":"01/2537-9","text":"Jin Liu 0009"},{"@pid":"155/0258","text":"Yuhui Zheng"}]},"title":"Construction and Application of Fuzzy Ontology.","venue":"CSA/CUTE","pages":"487-493","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/LinLZ17","doi":"10.1007/978-981-10-7605-3_80","ee":"https://doi.org/10.1007/978-981-10-7605-3_80","url":"https://dblp.org/rec/conf/csa2/LinLZ17"}, "url":"URL#2899727" }, { "@score":"1", "@id":"2899728", "info":{"authors":{"author":[{"@pid":"246/4057","text":"Byoungwook Min"},{"@pid":"218/4130","text":"Sung Jun Park"}]},"title":"A Smart Indoor Gardening System Using IoT Technology.","venue":"CSA/CUTE","pages":"683-687","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/MinP17","doi":"10.1007/978-981-10-7605-3_110","ee":"https://doi.org/10.1007/978-981-10-7605-3_110","url":"https://dblp.org/rec/conf/csa2/MinP17"}, "url":"URL#2899728" }, { "@score":"1", "@id":"2899729", "info":{"authors":{"author":[{"@pid":"188/5838","text":"Sunghyun Moon"},{"@pid":"246/4026","text":"Jungjoon Kim"}]},"title":"Ventricular Arrhythmia Classification Based on High-Order Statistical Features of ECG Signals.","venue":"CSA/CUTE","pages":"1227-1231","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/MoonK17","doi":"10.1007/978-981-10-7605-3_195","ee":"https://doi.org/10.1007/978-981-10-7605-3_195","url":"https://dblp.org/rec/conf/csa2/MoonK17"}, "url":"URL#2899729" }, { "@score":"1", "@id":"2899730", "info":{"authors":{"author":[{"@pid":"04/3144","text":"Jongwhoa Na"},{"@pid":"69/6381","text":"Dongwoo Lee"}]},"title":"Simulation-Based Reliability Improvement Factor for Safety-Critical Embedded Systems.","venue":"CSA/CUTE","pages":"522-527","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/NaL17","doi":"10.1007/978-981-10-7605-3_86","ee":"https://doi.org/10.1007/978-981-10-7605-3_86","url":"https://dblp.org/rec/conf/csa2/NaL17"}, "url":"URL#2899730" }, { "@score":"1", "@id":"2899731", "info":{"authors":{"author":[{"@pid":"04/3144","text":"Jongwhoa Na"},{"@pid":"69/6381","text":"Dongwoo Lee"},{"@pid":"246/4126","text":"Munkh Zorigbold"},{"@pid":"221/7953","text":"Dongmin Lee"},{"@pid":"246/4070","text":"Sungyup Moon"}]},"title":"Simple and Low-Cost Heartbeat-Based Dual Modular Redundant Systems for Wireless Sensor Networks.","venue":"CSA/CUTE","pages":"546-552","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/NaLZLM17","doi":"10.1007/978-981-10-7605-3_90","ee":"https://doi.org/10.1007/978-981-10-7605-3_90","url":"https://dblp.org/rec/conf/csa2/NaLZLM17"}, "url":"URL#2899731" }, { "@score":"1", "@id":"2899732", "info":{"authors":{"author":[{"@pid":"198/8076","text":"Taekho Nam"},{"@pid":"05/6022-1","text":"JongWon Kim 0001"}]},"title":"Prototype Implementation of Site Visibility Framework Employing IO Visor-Based Packet Tracing.","venue":"CSA/CUTE","pages":"1295-1300","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/Nam017","doi":"10.1007/978-981-10-7605-3_206","ee":"https://doi.org/10.1007/978-981-10-7605-3_206","url":"https://dblp.org/rec/conf/csa2/Nam017"}, "url":"URL#2899732" }, { "@score":"1", "@id":"2899733", "info":{"authors":{"author":[{"@pid":"239/2503","text":"Seungwoo Nam"},{"@pid":"84/379","text":"Doohwan Kim"},{"@pid":"h/JangEuiHong","text":"Jang-Eui Hong"}]},"title":"Using Code Skeleton Patterns for Open Source Reuse.","venue":"CSA/CUTE","pages":"1091-1096","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/NamKH17","doi":"10.1007/978-981-10-7605-3_174","ee":"https://doi.org/10.1007/978-981-10-7605-3_174","url":"https://dblp.org/rec/conf/csa2/NamKH17"}, "url":"URL#2899733" }, { "@score":"1", "@id":"2899734", "info":{"authors":{"author":[{"@pid":"213/8984","text":"Yunjin Nam"},{"@pid":"57/2855","text":"Dongkyoo Shin"},{"@pid":"85/2364","text":"Dongil Shin"}]},"title":"Life Log Collection and Analysis System Using Mobile Device.","venue":"CSA/CUTE","pages":"114-119","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/NamSS17","doi":"10.1007/978-981-10-7605-3_19","ee":"https://doi.org/10.1007/978-981-10-7605-3_19","url":"https://dblp.org/rec/conf/csa2/NamSS17"}, "url":"URL#2899734" }, { "@score":"1", "@id":"2899735", "info":{"authors":{"author":[{"@pid":"246/4096","text":"Kyeong Mi Noh"},{"@pid":"64/4502","text":"JiSu Park"},{"@pid":"41/4403","text":"Jin Gon Shon"}]},"title":"A New Direction-Based Routing Protocol in WSNs.","venue":"CSA/CUTE","pages":"1207-1212","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/NohPS17","doi":"10.1007/978-981-10-7605-3_192","ee":"https://doi.org/10.1007/978-981-10-7605-3_192","url":"https://dblp.org/rec/conf/csa2/NohPS17"}, "url":"URL#2899735" }, { "@score":"1", "@id":"2899736", "info":{"authors":{"author":{"@pid":"84/80","text":"Jeong Seok Oh"}},"title":"A Practical Study on Data Logger for Gas Industry.","venue":"CSA/CUTE","pages":"860-864","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/Oh17","doi":"10.1007/978-981-10-7605-3_136","ee":"https://doi.org/10.1007/978-981-10-7605-3_136","url":"https://dblp.org/rec/conf/csa2/Oh17"}, "url":"URL#2899736" }, { "@score":"1", "@id":"2899737", "info":{"authors":{"author":[{"@pid":"246/4006","text":"Gil-Tak Oh"},{"@pid":"202/6465","text":"Moon-Ki Back"},{"@pid":"36/947","text":"Kyu-Chul Lee"}]},"title":"A Design and Implementation of the CoAP Adaptor for Communication Between DDS-Based Adaptors and External Devices.","venue":"CSA/CUTE","pages":"901-909","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/OhBL17","doi":"10.1007/978-981-10-7605-3_143","ee":"https://doi.org/10.1007/978-981-10-7605-3_143","url":"https://dblp.org/rec/conf/csa2/OhBL17"}, "url":"URL#2899737" }, { "@score":"1", "@id":"2899738", "info":{"authors":{"author":[{"@pid":"15/7194","text":"Min-Woo Park"},{"@pid":"246/4062","text":"Hyeonsang Hwang"},{"@pid":"65/3681","text":"Eui Chul Lee"}]},"title":"Correlation Analysis Between Environmental Sound and Human Emotion.","venue":"CSA/CUTE","pages":"1346-1351","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ParkHL17","doi":"10.1007/978-981-10-7605-3_214","ee":"https://doi.org/10.1007/978-981-10-7605-3_214","url":"https://dblp.org/rec/conf/csa2/ParkHL17"}, "url":"URL#2899738" }, { "@score":"1", "@id":"2899739", "info":{"authors":{"author":[{"@pid":"246/4124","text":"Min-Hyung Park"},{"@pid":"246/4048","text":"Young-Hwan Jang"},{"@pid":"214/0010","text":"Yong-Wan Ju"},{"@pid":"60/5434","text":"Seok-Cheon Park"}]},"title":"Design of TensorFlow-Based Proactive Smart Home Managers.","venue":"CSA/CUTE","pages":"83-89","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ParkJJP17","doi":"10.1007/978-981-10-7605-3_14","ee":"https://doi.org/10.1007/978-981-10-7605-3_14","url":"https://dblp.org/rec/conf/csa2/ParkJJP17"}, "url":"URL#2899739" }, { "@score":"1", "@id":"2899740", "info":{"authors":{"author":[{"@pid":"74/39","text":"Young-Hoon Park"},{"@pid":"189/2767","text":"Kwangman Ko"}]},"title":"Software Defined Personal Area Network for Secure and Efficient File Management.","venue":"CSA/CUTE","pages":"1057-1065","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ParkK17","doi":"10.1007/978-981-10-7605-3_169","ee":"https://doi.org/10.1007/978-981-10-7605-3_169","url":"https://dblp.org/rec/conf/csa2/ParkK17"}, "url":"URL#2899740" }, { "@score":"1", "@id":"2899741", "info":{"authors":{"author":[{"@pid":"246/4124","text":"Min-Hyung Park"},{"@pid":"14/183","text":"Hyung-Joon Kim"},{"@pid":"246/4048","text":"Young-Hwan Jang"},{"@pid":"60/5434","text":"Seok-Cheon Park"}]},"title":"Design of TDD-Based Automation System for Android Application Test Automation.","venue":"CSA/CUTE","pages":"1440-1444","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ParkKJP17","doi":"10.1007/978-981-10-7605-3_229","ee":"https://doi.org/10.1007/978-981-10-7605-3_229","url":"https://dblp.org/rec/conf/csa2/ParkKJP17"}, "url":"URL#2899741" }, { "@score":"1", "@id":"2899742", "info":{"authors":{"author":[{"@pid":"246/3995","text":"Kyounghyun Park"},{"@pid":"73/8847","text":"Hee Sun Won"},{"@pid":"42/5655","text":"Keun Ho Ryu"}]},"title":"A Study on Subsequence Similarity Join in Time Series Data Using MapReduce.","venue":"CSA/CUTE","pages":"851-859","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ParkWR17","doi":"10.1007/978-981-10-7605-3_135","ee":"https://doi.org/10.1007/978-981-10-7605-3_135","url":"https://dblp.org/rec/conf/csa2/ParkWR17"}, "url":"URL#2899742" }, { "@score":"1", "@id":"2899743", "info":{"authors":{"author":[{"@pid":"205/7405","text":"Akash Suresh Patil"},{"@pid":"164/4760","text":"Bayu Adhi Tama"},{"@pid":"83/5601-4","text":"Youngho Park 0004"},{"@pid":"80/2281","text":"Kyung-Hyune Rhee"}]},"title":"A Framework for Blockchain Based Secure Smart Green House Farming.","venue":"CSA/CUTE","pages":"1162-1167","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/PatilT0R17","doi":"10.1007/978-981-10-7605-3_185","ee":"https://doi.org/10.1007/978-981-10-7605-3_185","url":"https://dblp.org/rec/conf/csa2/PatilT0R17"}, "url":"URL#2899743" }, { "@score":"1", "@id":"2899744", "info":{"authors":{"author":[{"@pid":"224/5205","text":"Alexander E. Prosvirin"},{"@pid":"92/6675","text":"Jaeyoung Kim"},{"@pid":"60/7993","text":"Jong-Myon Kim"}]},"title":"Bearing Fault Diagnosis Based on Convolutional Neural Networks with Kurtogram Representation of Acoustic Emission Signals.","venue":"CSA/CUTE","pages":"21-26","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ProsvirinKK17","doi":"10.1007/978-981-10-7605-3_4","ee":"https://doi.org/10.1007/978-981-10-7605-3_4","url":"https://dblp.org/rec/conf/csa2/ProsvirinKK17"}, "url":"URL#2899744" }, { "@score":"1", "@id":"2899745", "info":{"authors":{"author":[{"@pid":"148/1614","text":"Yulong Qiao"},{"@pid":"18/3173","text":"Na Li"},{"@pid":"61/5568","text":"Yufei Wang"},{"@pid":"10/264","text":"Wei Xi"}]},"title":"CHMM-Based Classification of Dynamic Textures.","venue":"CSA/CUTE","pages":"27-34","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/QiaoLWX17","doi":"10.1007/978-981-10-7605-3_5","ee":"https://doi.org/10.1007/978-981-10-7605-3_5","url":"https://dblp.org/rec/conf/csa2/QiaoLWX17"}, "url":"URL#2899745" }, { "@score":"1", "@id":"2899746", "info":{"authors":{"author":[{"@pid":"222/0407","text":"Muhammad Ahmad Rathore"},{"@pid":"159/9945","text":"Aris Cahyadi Risdianto"},{"@pid":"198/8076","text":"Taekho Nam"},{"@pid":"05/6022-1","text":"JongWon Kim 0001"}]},"title":"Comparing IO Visor and Pcap for Security Inspection of Traced Packets from SmartX Box.","venue":"CSA/CUTE","pages":"1263-1268","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/RathoreRN017","doi":"10.1007/978-981-10-7605-3_201","ee":"https://doi.org/10.1007/978-981-10-7605-3_201","url":"https://dblp.org/rec/conf/csa2/RathoreRN017"}, "url":"URL#2899746" }, { "@score":"1", "@id":"2899747", "info":{"authors":{"author":[{"@pid":"186/4793","text":"Ling Ruan"},{"@pid":"13/7834","text":"Changhua Liu"},{"@pid":"116/8378","text":"Yuling Wang"}]},"title":"A General and Effective Network Failure Ant Colony Algorithm Based on Network Fault Location Methods.","venue":"CSA/CUTE","pages":"727-733","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/RuanLW17","doi":"10.1007/978-981-10-7605-3_117","ee":"https://doi.org/10.1007/978-981-10-7605-3_117","url":"https://dblp.org/rec/conf/csa2/RuanLW17"}, "url":"URL#2899747" }, { "@score":"1", "@id":"2899748", "info":{"authors":{"author":[{"@pid":"222/3749","text":"Jung Hyun Ryu"},{"@pid":"189/7659","text":"Seo Yeon Moon"},{"@pid":"p/JongHyukPark","text":"Jong Hyuk Park"}]},"title":"The Study on Data of Smart Home System as Digital Evidence.","venue":"CSA/CUTE","pages":"967-972","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/RyuMP17","doi":"10.1007/978-981-10-7605-3_154","ee":"https://doi.org/10.1007/978-981-10-7605-3_154","url":"https://dblp.org/rec/conf/csa2/RyuMP17"}, "url":"URL#2899748" }, { "@score":"1", "@id":"2899749", "info":{"authors":{"author":[{"@pid":"138/9383","text":"Ji-Hoon Seo"},{"@pid":"246/4004","text":"EunMi Cho"},{"@pid":"246/4103","text":"Kil-Hong Joo"}]},"title":"Analysis of Agenda Prediction According to Big Data Based Creative Education Performance Factors.","venue":"CSA/CUTE","pages":"1314-1319","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/SeoCJ17","doi":"10.1007/978-981-10-7605-3_209","ee":"https://doi.org/10.1007/978-981-10-7605-3_209","url":"https://dblp.org/rec/conf/csa2/SeoCJ17"}, "url":"URL#2899749" }, { "@score":"1", "@id":"2899750", "info":{"authors":{"author":[{"@pid":"138/9383","text":"Ji-Hoon Seo"},{"@pid":"246/4103","text":"Kil-Hong Joo"}]},"title":"Analysis of the Elements of Future Development of Korean Style Software Education Through the Opinion Mining Technique.","venue":"CSA/CUTE","pages":"1410-1415","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/SeoJ17","doi":"10.1007/978-981-10-7605-3_224","ee":"https://doi.org/10.1007/978-981-10-7605-3_224","url":"https://dblp.org/rec/conf/csa2/SeoJ17"}, "url":"URL#2899750" }, { "@score":"1", "@id":"2899751", "info":{"authors":{"author":[{"@pid":"56/6779","text":"Jian Shao"},{"@pid":"49/3283","text":"Wei Liu"},{"@pid":"76/2897","text":"Wei Dai"},{"@pid":"246/4045","text":"Shengkun Ma"},{"@pid":"42/6066","text":"Qun Li"},{"@pid":"64/856","text":"Ji Wang"},{"@pid":"49/6002","text":"Jian Chen"},{"@pid":"x/NaixueXiong","text":"Neal N. Xiong"}]},"title":"Experiential Interaction Modeling for Virtual Training of Ultra-High Voltage Power System and Its Application.","venue":"CSA/CUTE","pages":"566-572","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ShaoLDMLWCX17","doi":"10.1007/978-981-10-7605-3_93","ee":"https://doi.org/10.1007/978-981-10-7605-3_93","url":"https://dblp.org/rec/conf/csa2/ShaoLDMLWCX17"}, "url":"URL#2899751" }, { "@score":"1", "@id":"2899752", "info":{"authors":{"author":[{"@pid":"197/7243","text":"Pradip Kumar Sharma"},{"@pid":"222/3731","text":"Byoung Wook Kwon"},{"@pid":"p/JongHyukPark","text":"Jong Hyuk Park"}]},"title":"DSS-SL: Dynamic Signage System Based on SDN with LiFi Communication for Smart Buildings.","venue":"CSA/CUTE","pages":"805-810","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/SharmaKP17","doi":"10.1007/978-981-10-7605-3_128","ee":"https://doi.org/10.1007/978-981-10-7605-3_128","url":"https://dblp.org/rec/conf/csa2/SharmaKP17"}, "url":"URL#2899752" }, { "@score":"1", "@id":"2899753", "info":{"authors":{"author":[{"@pid":"213/9921","text":"Jae-Sung Shim"},{"@pid":"246/4048","text":"Young-Hwan Jang"},{"@pid":"214/0010","text":"Yong-Wan Ju"},{"@pid":"60/5434","text":"Seok-Cheon Park"}]},"title":"Design of Effective Indexing Technique in Hadoop-Based Database.","venue":"CSA/CUTE","pages":"90-95","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ShimJJP17","doi":"10.1007/978-981-10-7605-3_15","ee":"https://doi.org/10.1007/978-981-10-7605-3_15","url":"https://dblp.org/rec/conf/csa2/ShimJJP17"}, "url":"URL#2899753" }, { "@score":"1", "@id":"2899754", "info":{"authors":{"author":[{"@pid":"213/9921","text":"Jae-Sung Shim"},{"@pid":"14/183","text":"Hyung-Joon Kim"},{"@pid":"221/1208","text":"Nam-Uk Lee"},{"@pid":"60/5434","text":"Seok-Cheon Park"}]},"title":"Design of Zigbee-BLE Gateway Direct Communication System for Smart Home Environment.","venue":"CSA/CUTE","pages":"1428-1433","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ShimKLP17","doi":"10.1007/978-981-10-7605-3_227","ee":"https://doi.org/10.1007/978-981-10-7605-3_227","url":"https://dblp.org/rec/conf/csa2/ShimKLP17"}, "url":"URL#2899754" }, { "@score":"1", "@id":"2899755", "info":{"authors":{"author":[{"@pid":"163/9921","text":"Sanggyu Shin"},{"@pid":"87/1441","text":"Yoichi Seto"},{"@pid":"200/3055","text":"Kei Sakamoto"},{"@pid":"200/3061","text":"Mayumi Sasaki"}]},"title":"Consideration of Privacy Risk Assessment of the My Number in the Financial Industry in Japan.","venue":"CSA/CUTE","pages":"258-264","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ShinSSS17","doi":"10.1007/978-981-10-7605-3_43","ee":"https://doi.org/10.1007/978-981-10-7605-3_43","url":"https://dblp.org/rec/conf/csa2/ShinSSS17"}, "url":"URL#2899755" }, { "@score":"1", "@id":"2899756", "info":{"authors":{"author":[{"@pid":"246/4065","text":"Kangsik Shin"},{"@pid":"45/1653","text":"Yoojae Won"}]},"title":"Study on Malicious Code Behavior Detection Using Windows Filter Driver and API Call Sequence.","venue":"CSA/CUTE","pages":"938-943","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ShinW17","doi":"10.1007/978-981-10-7605-3_149","ee":"https://doi.org/10.1007/978-981-10-7605-3_149","url":"https://dblp.org/rec/conf/csa2/ShinW17"}, "url":"URL#2899756" }, { "@score":"1", "@id":"2899757", "info":{"authors":{"author":[{"@pid":"193/0791","text":"Kamran Siddique"},{"@pid":"52/10105","text":"Zahid Akhtar"},{"@pid":"91/2596","text":"Yangwoo Kim"}]},"title":"Intrusion Detection in High-Speed Big Data Networks: A Comprehensive Approach.","venue":"CSA/CUTE","pages":"1364-1370","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/SiddiqueAK17","doi":"10.1007/978-981-10-7605-3_217","ee":"https://doi.org/10.1007/978-981-10-7605-3_217","url":"https://dblp.org/rec/conf/csa2/SiddiqueAK17"}, "url":"URL#2899757" }, { "@score":"1", "@id":"2899758", "info":{"authors":{"author":[{"@pid":"241/1079","text":"Won-Hyun So"},{"@pid":"241/1174","text":"Ha-Kyun Kim"}]},"title":"The Personal Information Overloads Effect Information Protective Responses in the Internet of Thing (IoT) Era.","venue":"CSA/CUTE","pages":"888-894","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/SoK17","doi":"10.1007/978-981-10-7605-3_141","ee":"https://doi.org/10.1007/978-981-10-7605-3_141","url":"https://dblp.org/rec/conf/csa2/SoK17"}, "url":"URL#2899758" }, { "@score":"1", "@id":"2899759", "info":{"authors":{"author":[{"@pid":"180/2534","text":"A.-Young Son"},{"@pid":"05/1693","text":"Eui-Nam Huh"}]},"title":"A Study on Resource Scaling Scheme for Energy Efficiency in Cloud Datacenter.","venue":"CSA/CUTE","pages":"1066-1071","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/SonH17","doi":"10.1007/978-981-10-7605-3_170","ee":"https://doi.org/10.1007/978-981-10-7605-3_170","url":"https://dblp.org/rec/conf/csa2/SonH17"}, "url":"URL#2899759" }, { "@score":"1", "@id":"2899760", "info":{"authors":{"author":[{"@pid":"246/4053","text":"Bong-Ki Son"},{"@pid":"78/6080","text":"Jaeho Lee"}]},"title":"Design and Implementation of Digital Doorsign System Based on E-paper Display.","venue":"CSA/CUTE","pages":"168-173","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/SonL17","doi":"10.1007/978-981-10-7605-3_28","ee":"https://doi.org/10.1007/978-981-10-7605-3_28","url":"https://dblp.org/rec/conf/csa2/SonL17"}, "url":"URL#2899760" }, { "@score":"1", "@id":"2899761", "info":{"authors":{"author":[{"@pid":"39/10116","text":"Junjie Song"},{"@pid":"01/2537-9","text":"Jin Liu 0009"},{"@pid":"155/0258","text":"Yuhui Zheng"}]},"title":"Hadoop Based Parallel Deduplication Method for Web Documents.","venue":"CSA/CUTE","pages":"499-504","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/SongLZ17","doi":"10.1007/978-981-10-7605-3_82","ee":"https://doi.org/10.1007/978-981-10-7605-3_82","url":"https://dblp.org/rec/conf/csa2/SongLZ17"}, "url":"URL#2899761" }, { "@score":"1", "@id":"2899762", "info":{"authors":{"author":[{"@pid":"204/5961","text":"Hyejin Song"},{"@pid":"82/6840","text":"Nammee Moon"}]},"title":"User Modeling Based on Smart Media Eye Tracking Depending on the Type of Interior Space.","venue":"CSA/CUTE","pages":"772-776","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/SongM17","doi":"10.1007/978-981-10-7605-3_123","ee":"https://doi.org/10.1007/978-981-10-7605-3_123","url":"https://dblp.org/rec/conf/csa2/SongM17"}, "url":"URL#2899762" }, { "@score":"1", "@id":"2899763", "info":{"authors":{"author":[{"@pid":"204/5961","text":"Hyejin Song"},{"@pid":"82/6840","text":"Nammee Moon"}]},"title":"A Preference Based Recommendation System Design Through Eye-Tracking and Social Behavior Analysis.","venue":"CSA/CUTE","pages":"1014-1019","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/SongM17a","doi":"10.1007/978-981-10-7605-3_162","ee":"https://doi.org/10.1007/978-981-10-7605-3_162","url":"https://dblp.org/rec/conf/csa2/SongM17a"}, "url":"URL#2899763" }, { "@score":"1", "@id":"2899764", "info":{"authors":{"author":[{"@pid":"99/5721","text":"Min Song"},{"@pid":"43/4443","text":"Ying Song"},{"@pid":"95/2827","text":"Zhengxian Wei"},{"@pid":"98/3467","text":"Hongbin Wang"},{"@pid":"c/AMKCheng","text":"Albert M. K. Cheng"}]},"title":"The Testing Execution Mechanism on Internetware Oriented Flow Dynamic Building.","venue":"CSA/CUTE","pages":"603-609","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/SongSWWC17","doi":"10.1007/978-981-10-7605-3_99","ee":"https://doi.org/10.1007/978-981-10-7605-3_99","url":"https://dblp.org/rec/conf/csa2/SongSWWC17"}, "url":"URL#2899764" }, { "@score":"1", "@id":"2899765", "info":{"authors":{"author":[{"@pid":"246/4047","text":"Chengbo Song"},{"@pid":"13/4745","text":"Xuefeng Yan"}]},"title":"Hidden Markov Model for Floating Car Trajectory Map Matching.","venue":"CSA/CUTE","pages":"553-559","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/SongY17","doi":"10.1007/978-981-10-7605-3_91","ee":"https://doi.org/10.1007/978-981-10-7605-3_91","url":"https://dblp.org/rec/conf/csa2/SongY17"}, "url":"URL#2899765" }, { "@score":"1", "@id":"2899766", "info":{"authors":{"author":[{"@pid":"216/2785","text":"Yuchao Sun"},{"@pid":"124/3254","text":"De Li"}]},"title":"Robust Cartoon Zero-Watermark Algorithm Based on NSST.","venue":"CSA/CUTE","pages":"53-59","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/SunL17","doi":"10.1007/978-981-10-7605-3_9","ee":"https://doi.org/10.1007/978-981-10-7605-3_9","url":"https://dblp.org/rec/conf/csa2/SunL17"}, "url":"URL#2899766" }, { "@score":"1", "@id":"2899767", "info":{"authors":{"author":[{"@pid":"78/5897-2","text":"Le Sun 0002"},{"@pid":"169/2905","text":"Yili Wang 0002"},{"@pid":"92/1375-1","text":"Jin Wang 0001"},{"@pid":"155/0258","text":"Yuhui Zheng"}]},"title":"A Novel Subspace Super-Pixel Based Low Rank Representation Method for Hyperspectral Denoising.","venue":"CSA/CUTE","pages":"464-469","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/SunWWZ17","doi":"10.1007/978-981-10-7605-3_76","ee":"https://doi.org/10.1007/978-981-10-7605-3_76","url":"https://dblp.org/rec/conf/csa2/SunWWZ17"}, "url":"URL#2899767" }, { "@score":"1", "@id":"2899768", "info":{"authors":{"author":{"@pid":"46/599","text":"Mankyu Sung"}},"title":"Fast Animation Crowds Using GPU Shaders and Motion Capture Data.","venue":"CSA/CUTE","pages":"1213-1219","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/Sung17","doi":"10.1007/978-981-10-7605-3_193","ee":"https://doi.org/10.1007/978-981-10-7605-3_193","url":"https://dblp.org/rec/conf/csa2/Sung17"}, "url":"URL#2899768" }, { "@score":"1", "@id":"2899769", "info":{"authors":{"author":[{"@pid":"222/6634","text":"Fanny Febriani Susilo"},{"@pid":"27/2294","text":"Jung-Ho Lee"},{"@pid":"70/5136","text":"Ji-Hyung Park"},{"@pid":"66/4019","text":"Jung-Min Park"}]},"title":"Cross-Cultural Touch-Based SNS Interface Design for the Elderly.","venue":"CSA/CUTE","pages":"1153-1161","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/SusiloLPP17","doi":"10.1007/978-981-10-7605-3_184","ee":"https://doi.org/10.1007/978-981-10-7605-3_184","url":"https://dblp.org/rec/conf/csa2/SusiloLPP17"}, "url":"URL#2899769" }, { "@score":"1", "@id":"2899770", "info":{"authors":{"author":[{"@pid":"215/0088","text":"Hamid Tahaei"},{"@pid":"189/2767","text":"Kwangman Ko"},{"@pid":"246/4008","text":"Wonjeong Seo"},{"@pid":"246/4086","text":"Suchong Joo"}]},"title":"A QoE Based Trustable SDN Framework for IoT Devices in Mobile Edge Computing.","venue":"CSA/CUTE","pages":"1147-1152","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/TahaeiKSJ17","doi":"10.1007/978-981-10-7605-3_183","ee":"https://doi.org/10.1007/978-981-10-7605-3_183","url":"https://dblp.org/rec/conf/csa2/TahaeiKSJ17"}, "url":"URL#2899770" }, { "@score":"1", "@id":"2899771", "info":{"authors":{"author":[{"@pid":"246/4059","text":"Anit Thapaliya"},{"@pid":"246/4036","text":"Daehui Jeong"},{"@pid":"04/4899","text":"Gihwon Kwon"}]},"title":"Failure Analysis in Safety Critical Systems Using Failure State Machine.","venue":"CSA/CUTE","pages":"540-545","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ThapaliyaJK17","doi":"10.1007/978-981-10-7605-3_89","ee":"https://doi.org/10.1007/978-981-10-7605-3_89","url":"https://dblp.org/rec/conf/csa2/ThapaliyaJK17"}, "url":"URL#2899771" }, { "@score":"1", "@id":"2899772", "info":{"authors":{"author":[{"@pid":"246/4059","text":"Anit Thapaliya"},{"@pid":"04/4899","text":"Gihwon Kwon"}]},"title":"Reliability and Control Theory: An Integration Approach for Safety Analysis.","venue":"CSA/CUTE","pages":"1244-1249","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ThapaliyaK17","doi":"10.1007/978-981-10-7605-3_198","ee":"https://doi.org/10.1007/978-981-10-7605-3_198","url":"https://dblp.org/rec/conf/csa2/ThapaliyaK17"}, "url":"URL#2899772" }, { "@score":"1", "@id":"2899773", "info":{"authors":{"author":[{"@pid":"171/2532","text":"Hoang Vu"},{"@pid":"210/6031","text":"Hieu Trong Nguyen"},{"@pid":"171/2541","text":"Phuong Chu"},{"@pid":"145/4416","text":"Seoungjae Cho"},{"@pid":"82/4257","text":"Kyungeun Cho"}]},"title":"A Ground Segmentation Method Based on Gradient Fields for 3D Point Clouds.","venue":"CSA/CUTE","pages":"388-393","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/VuNCCC17","doi":"10.1007/978-981-10-7605-3_64","ee":"https://doi.org/10.1007/978-981-10-7605-3_64","url":"https://dblp.org/rec/conf/csa2/VuNCCC17"}, "url":"URL#2899773" }, { "@score":"1", "@id":"2899774", "info":{"authors":{"author":{"@pid":"41/3241","text":"Yuan Wang"}},"title":"Finding Similar Microblogs According to Their Word Similarities and Semantic Similarities.","venue":"CSA/CUTE","pages":"371-375","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/Wang17","doi":"10.1007/978-981-10-7605-3_61","ee":"https://doi.org/10.1007/978-981-10-7605-3_61","url":"https://dblp.org/rec/conf/csa2/Wang17"}, "url":"URL#2899774" }, { "@score":"1", "@id":"2899775", "info":{"authors":{"author":[{"@pid":"78/2022","text":"Kai Wang"},{"@pid":"03/785","text":"Chengquan Hu"},{"@pid":"39/4772-2","text":"Lili He 0002"},{"@pid":"235/4515","text":"Fenglin Wei"},{"@pid":"21/4633-6","text":"Yu Jiang 0006"}]},"title":"A New Method of Arm Motion Detection Based on MEMS Sensor.","venue":"CSA/CUTE","pages":"413-419","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/WangH0WJ17","doi":"10.1007/978-981-10-7605-3_68","ee":"https://doi.org/10.1007/978-981-10-7605-3_68","url":"https://dblp.org/rec/conf/csa2/WangH0WJ17"}, "url":"URL#2899775" }, { "@score":"1", "@id":"2899776", "info":{"authors":{"author":[{"@pid":"92/1375-1","text":"Jin Wang 0001"},{"@pid":"207/8657","text":"Chunwei Ju"},{"@pid":"42/2572-3","text":"Hye-Jin Kim 0003"},{"@pid":"98/5166","text":"R. Simon Sherratt"},{"@pid":"08/5736","text":"Sungyoung Lee"}]},"title":"A PSO Based Coverage Hole Patching Scheme for WSNs.","venue":"CSA/CUTE","pages":"433-439","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/WangJKSL17","doi":"10.1007/978-981-10-7605-3_71","ee":"https://doi.org/10.1007/978-981-10-7605-3_71","url":"https://dblp.org/rec/conf/csa2/WangJKSL17"}, "url":"URL#2899776" }, { "@score":"1", "@id":"2899777", "info":{"authors":{"author":[{"@pid":"07/8577","text":"Shun Wang"},{"@pid":"97/3778","text":"Dazhou Kang"},{"@pid":"78/6098","text":"Yanhui Li"},{"@pid":"87/5809","text":"Zhe Zhang"},{"@pid":"95/2827","text":"Zhengxian Wei"}]},"title":"Research on Ontology-Based Data Fusion.","venue":"CSA/CUTE","pages":"714-720","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/WangKLZW17","doi":"10.1007/978-981-10-7605-3_115","ee":"https://doi.org/10.1007/978-981-10-7605-3_115","url":"https://dblp.org/rec/conf/csa2/WangKLZW17"}, "url":"URL#2899777" }, { "@score":"1", "@id":"2899778", "info":{"authors":{"author":[{"@pid":"49/6053","text":"Jianan Wang"},{"@pid":"01/2537-9","text":"Jin Liu 0009"},{"@pid":"94/224","text":"Lei Kong"}]},"title":"Ontology Construction Based on Deep Learning.","venue":"CSA/CUTE","pages":"505-510","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/WangLK17","doi":"10.1007/978-981-10-7605-3_83","ee":"https://doi.org/10.1007/978-981-10-7605-3_83","url":"https://dblp.org/rec/conf/csa2/WangLK17"}, "url":"URL#2899778" }, { "@score":"1", "@id":"2899779", "info":{"authors":{"author":[{"@pid":"169/2905","text":"Yili Wang 0002"},{"@pid":"78/5897-2","text":"Le Sun 0002"},{"@pid":"92/1375-1","text":"Jin Wang 0001"},{"@pid":"155/0258","text":"Yuhui Zheng"},{"@pid":"99/5043","text":"Hee Yong Youn"}]},"title":"A Novel Feature-Based Text Classification Improving the Accuracy of Twitter Sentiment Analysis.","venue":"CSA/CUTE","pages":"440-445","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/WangSWZY17","doi":"10.1007/978-981-10-7605-3_72","ee":"https://doi.org/10.1007/978-981-10-7605-3_72","url":"https://dblp.org/rec/conf/csa2/WangSWZY17"}, "url":"URL#2899779" }, { "@score":"1", "@id":"2899780", "info":{"authors":{"author":[{"@pid":"89/10775","text":"Yitao Wang"},{"@pid":"190/4357","text":"Huayang Wang"},{"@pid":"171/2044","text":"Haiming Liang"},{"@pid":"75/3190","text":"Liying Wang"}]},"title":"Research on Horizontal Damage Zone Airspace of Ship-to-Air Missile Under Cooperative Operation.","venue":"CSA/CUTE","pages":"654-660","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/WangWLW17","doi":"10.1007/978-981-10-7605-3_106","ee":"https://doi.org/10.1007/978-981-10-7605-3_106","url":"https://dblp.org/rec/conf/csa2/WangWLW17"}, "url":"URL#2899780" }, { "@score":"1", "@id":"2899781", "info":{"authors":{"author":[{"@pid":"89/10775","text":"Yitao Wang"},{"@pid":"190/4357","text":"Huayang Wang"},{"@pid":"93/10644","text":"Xinye Zhao"},{"@pid":"66/4330","text":"Kedi Huang"},{"@pid":"171/2044","text":"Haiming Liang"}]},"title":"Key Issues of Military Simulation and Analysis System.","venue":"CSA/CUTE","pages":"661-668","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/WangWZHL17","doi":"10.1007/978-981-10-7605-3_107","ee":"https://doi.org/10.1007/978-981-10-7605-3_107","url":"https://dblp.org/rec/conf/csa2/WangWZHL17"}, "url":"URL#2899781" }, { "@score":"1", "@id":"2899782", "info":{"authors":{"author":[{"@pid":"53/8348","text":"Shunfeng Wang"},{"@pid":"220/0756","text":"Jiacen Xie"},{"@pid":"155/0258","text":"Yuhui Zheng"},{"@pid":"181/2813","text":"Tao Jiang"},{"@pid":"246/4001","text":"ShuHang Xue"}]},"title":"Expected Patch Log Likelihood Based on Multi-layer Prior Information Learning.","venue":"CSA/CUTE","pages":"299-304","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/WangXZJX17","doi":"10.1007/978-981-10-7605-3_49","ee":"https://doi.org/10.1007/978-981-10-7605-3_49","url":"https://dblp.org/rec/conf/csa2/WangXZJX17"}, "url":"URL#2899782" }, { "@score":"1", "@id":"2899783", "info":{"authors":{"author":[{"@pid":"76/8875","text":"Xiaoxuan Wang"},{"@pid":"246/4084","text":"Zhenyi Zhao"}]},"title":"Research on Hierarchical Aggregation Method for Situation Assessment.","venue":"CSA/CUTE","pages":"596-602","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/WangZ17","doi":"10.1007/978-981-10-7605-3_98","ee":"https://doi.org/10.1007/978-981-10-7605-3_98","url":"https://dblp.org/rec/conf/csa2/WangZ17"}, "url":"URL#2899783" }, { "@score":"1", "@id":"2899784", "info":{"authors":{"author":[{"@pid":"95/2827","text":"Zhengxian Wei"},{"@pid":"246/4109","text":"Mingqi Fan"},{"@pid":"99/5721","text":"Min Song"},{"@pid":"98/3467","text":"Hongbin Wang"},{"@pid":"87/5809","text":"Zhe Zhang"}]},"title":"Analysis on the Technology of the Internetware Comprehensive Testing.","venue":"CSA/CUTE","pages":"573-578","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/WeiFSWZ17","doi":"10.1007/978-981-10-7605-3_94","ee":"https://doi.org/10.1007/978-981-10-7605-3_94","url":"https://dblp.org/rec/conf/csa2/WeiFSWZ17"}, "url":"URL#2899784" }, { "@score":"1", "@id":"2899785", "info":{"authors":{"author":[{"@pid":"235/4515","text":"Fenglin Wei"},{"@pid":"03/785","text":"Chengquan Hu"},{"@pid":"39/4772-2","text":"Lili He 0002"},{"@pid":"78/2022","text":"Kai Wang"},{"@pid":"21/4633-6","text":"Yu Jiang 0006"}]},"title":"Fitness Device Based on MEMS Sensor.","venue":"CSA/CUTE","pages":"420-426","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/WeiH0WJ17","doi":"10.1007/978-981-10-7605-3_69","ee":"https://doi.org/10.1007/978-981-10-7605-3_69","url":"https://dblp.org/rec/conf/csa2/WeiH0WJ17"}, "url":"URL#2899785" }, { "@score":"1", "@id":"2899786", "info":{"authors":{"author":[{"@pid":"14/2618","text":"Mei-Yu Wu"},{"@pid":"78/2188","text":"Chih-Kun Ke"},{"@pid":"246/4029","text":"Ming-Ru Lee"}]},"title":"Ubiquitous Authentication and Authorization Mechanism for Enterprise Resources Acquisition.","venue":"CSA/CUTE","pages":"1102-1107","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/WuKL17","doi":"10.1007/978-981-10-7605-3_176","ee":"https://doi.org/10.1007/978-981-10-7605-3_176","url":"https://dblp.org/rec/conf/csa2/WuKL17"}, "url":"URL#2899786" }, { "@score":"1", "@id":"2899787", "info":{"authors":{"author":[{"@pid":"12/2506","text":"Shanshan Wu"},{"@pid":"215/1872","text":"Fan Yi"}]},"title":"Research on Hybrid Storage Method of Massive Heterogeneous Data for Mobile Environment.","venue":"CSA/CUTE","pages":"631-640","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/WuY17","doi":"10.1007/978-981-10-7605-3_103","ee":"https://doi.org/10.1007/978-981-10-7605-3_103","url":"https://dblp.org/rec/conf/csa2/WuY17"}, "url":"URL#2899787" }, { "@score":"1", "@id":"2899788", "info":{"authors":{"author":[{"@pid":"204/1839","text":"Lamei Xu"},{"@pid":"01/2537-9","text":"Jin Liu 0009"},{"@pid":"01/1318","text":"Lina Wang"},{"@pid":"78/4658","text":"Chunyong Yin"}]},"title":"Aspect Based Sentiment Analysis for Online Reviews.","venue":"CSA/CUTE","pages":"475-480","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/XuLWY17","doi":"10.1007/978-981-10-7605-3_78","ee":"https://doi.org/10.1007/978-981-10-7605-3_78","url":"https://dblp.org/rec/conf/csa2/XuLWY17"}, "url":"URL#2899788" }, { "@score":"1", "@id":"2899789", "info":{"authors":{"author":[{"@pid":"159/9001","text":"Zhuyin Xue"},{"@pid":"15/3342","text":"Zhen Hu"},{"@pid":"246/4107","text":"Yunhai Jia"}]},"title":"Exploratory Search for Learning: Finding the Concept with Minimal Cognitive Load.","venue":"CSA/CUTE","pages":"586-590","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/XueHJ17","doi":"10.1007/978-981-10-7605-3_96","ee":"https://doi.org/10.1007/978-981-10-7605-3_96","url":"https://dblp.org/rec/conf/csa2/XueHJ17"}, "url":"URL#2899789" }, { "@score":"1", "@id":"2899790", "info":{"authors":{"author":[{"@pid":"246/4120","text":"Seung-Su Yang"},{"@pid":"246/4048","text":"Young-Hwan Jang"},{"@pid":"214/0010","text":"Yong-Wan Ju"},{"@pid":"60/5434","text":"Seok-Cheon Park"}]},"title":"Design of Smart Cattle Shed System Based on BLE Beacon to Improve Power Consumption.","venue":"CSA/CUTE","pages":"77-82","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/YangJJP17","doi":"10.1007/978-981-10-7605-3_13","ee":"https://doi.org/10.1007/978-981-10-7605-3_13","url":"https://dblp.org/rec/conf/csa2/YangJJP17"}, "url":"URL#2899790" }, { "@score":"1", "@id":"2899791", "info":{"authors":{"author":[{"@pid":"246/4120","text":"Seung-Su Yang"},{"@pid":"14/183","text":"Hyung-Joon Kim"},{"@pid":"221/1208","text":"Nam-Uk Lee"},{"@pid":"60/5434","text":"Seok-Cheon Park"}]},"title":"Design of Automatic Source Code Generation Based on User Pattern Definition.","venue":"CSA/CUTE","pages":"1434-1439","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/YangKLP17","doi":"10.1007/978-981-10-7605-3_228","ee":"https://doi.org/10.1007/978-981-10-7605-3_228","url":"https://dblp.org/rec/conf/csa2/YangKLP17"}, "url":"URL#2899791" }, { "@score":"1", "@id":"2899792", "info":{"authors":{"author":[{"@pid":"46/999","text":"Bo Yang"},{"@pid":"16/3790","text":"Qian Yu"}]},"title":"An Approach of Test Case Generation for Spreadsheet Cells.","venue":"CSA/CUTE","pages":"15-20","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/YangY17","doi":"10.1007/978-981-10-7605-3_3","ee":"https://doi.org/10.1007/978-981-10-7605-3_3","url":"https://dblp.org/rec/conf/csa2/YangY17"}, "url":"URL#2899792" }, { "@score":"1", "@id":"2899793", "info":{"authors":{"author":[{"@pid":"27/8595","text":"Wenxi Yao"},{"@pid":"01/2537-9","text":"Jin Liu 0009"},{"@pid":"246/4076","text":"Zehuan Cai"}]},"title":"Personal Attributes Extraction in Chinese Text Based on Distant-Supervision and LSTM.","venue":"CSA/CUTE","pages":"511-515","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/YaoLC17","doi":"10.1007/978-981-10-7605-3_84","ee":"https://doi.org/10.1007/978-981-10-7605-3_84","url":"https://dblp.org/rec/conf/csa2/YaoLC17"}, "url":"URL#2899793" }, { "@score":"1", "@id":"2899794", "info":{"authors":{"author":[{"@pid":"09/4902","text":"Xue Yao"},{"@pid":"89/6764","text":"Bin Li"},{"@pid":"246/4102","text":"Yahong Sun"}]},"title":"A User-Defined Code Reinforcement Technology Based on LLVM-Obfuscator.","venue":"CSA/CUTE","pages":"688-694","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/YaoLS17","doi":"10.1007/978-981-10-7605-3_111","ee":"https://doi.org/10.1007/978-981-10-7605-3_111","url":"https://dblp.org/rec/conf/csa2/YaoLS17"}, "url":"URL#2899794" }, { "@score":"1", "@id":"2899795", "info":{"authors":{"author":[{"@pid":"78/4658","text":"Chunyong Yin"},{"@pid":"246/4067","text":"Nimenya Stacey"},{"@pid":"246/4106","text":"Tatiana Moreira Beita"},{"@pid":"92/1375-1","text":"Jin Wang 0001"}]},"title":"Distributed Approach for the Security of P2P Wireless Network.","venue":"CSA/CUTE","pages":"915-919","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/YinSBW17","doi":"10.1007/978-981-10-7605-3_145","ee":"https://doi.org/10.1007/978-981-10-7605-3_145","url":"https://dblp.org/rec/conf/csa2/YinSBW17"}, "url":"URL#2899795" }, { "@score":"1", "@id":"2899796", "info":{"authors":{"author":[{"@pid":"78/4658","text":"Chunyong Yin"},{"@pid":"37/1431","text":"Lian Xia"},{"@pid":"92/1375-1","text":"Jin Wang 0001"}]},"title":"Data Stream Clustering Algorithm Based on Bucket Density for Intrusion Detection.","venue":"CSA/CUTE","pages":"846-850","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/YinXW17","doi":"10.1007/978-981-10-7605-3_134","ee":"https://doi.org/10.1007/978-981-10-7605-3_134","url":"https://dblp.org/rec/conf/csa2/YinXW17"}, "url":"URL#2899796" }, { "@score":"1", "@id":"2899797", "info":{"authors":{"author":[{"@pid":"29/6211","text":"Zhichao Yin"},{"@pid":"90/2913","text":"Jun Xiang"},{"@pid":"78/4658","text":"Chunyong Yin"},{"@pid":"92/1375-1","text":"Jin Wang 0001"}]},"title":"Text Classification Algorithm Based on SLAS-C.","venue":"CSA/CUTE","pages":"382-387","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/YinXYW17","doi":"10.1007/978-981-10-7605-3_63","ee":"https://doi.org/10.1007/978-981-10-7605-3_63","url":"https://dblp.org/rec/conf/csa2/YinXYW17"}, "url":"URL#2899797" }, { "@score":"1", "@id":"2899798", "info":{"authors":{"author":[{"@pid":"78/4658","text":"Chunyong Yin"},{"@pid":"195/7431","text":"Kaiwen Zhu"},{"@pid":"37/1431","text":"Lian Xia"},{"@pid":"92/1375-1","text":"Jin Wang 0001"}]},"title":"Recognizing the Adhesion Hollow Characters Based on the Closed Cutting Algorithm.","venue":"CSA/CUTE","pages":"394-399","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/YinZXW17","doi":"10.1007/978-981-10-7605-3_65","ee":"https://doi.org/10.1007/978-981-10-7605-3_65","url":"https://dblp.org/rec/conf/csa2/YinZXW17"}, "url":"URL#2899798" }, { "@score":"1", "@id":"2899799", "info":{"authors":{"author":[{"@pid":"29/6211","text":"Zhichao Yin"},{"@pid":"181/2846","text":"Hui Zhang"},{"@pid":"78/4658","text":"Chunyong Yin"},{"@pid":"92/1375-1","text":"Jin Wang 0001"}]},"title":"An Improved Trust Model Based on Time Effect.","venue":"CSA/CUTE","pages":"376-381","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/YinZYW17","doi":"10.1007/978-981-10-7605-3_62","ee":"https://doi.org/10.1007/978-981-10-7605-3_62","url":"https://dblp.org/rec/conf/csa2/YinZYW17"}, "url":"URL#2899799" }, { "@score":"1", "@id":"2899800", "info":{"authors":{"author":[{"@pid":"150/1346","text":"Minjae Yoo"},{"@pid":"45/1653","text":"Yoojae Won"}]},"title":"Study on Smart Automated Sales System with Blockchain-Based Data Storage and Management.","venue":"CSA/CUTE","pages":"734-740","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/YooW17","doi":"10.1007/978-981-10-7605-3_118","ee":"https://doi.org/10.1007/978-981-10-7605-3_118","url":"https://dblp.org/rec/conf/csa2/YooW17"}, "url":"URL#2899800" }, { "@score":"1", "@id":"2899801", "info":{"authors":{"author":[{"@pid":"246/4033","text":"Suhhee Yoo"},{"@pid":"161/7236","text":"Mincheol Whang"}]},"title":"Multimedia Design Approaches by Just Noticeable Difference (JND) of Audiovisual Modalities.","venue":"CSA/CUTE","pages":"1320-1325","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/YooW17a","doi":"10.1007/978-981-10-7605-3_210","ee":"https://doi.org/10.1007/978-981-10-7605-3_210","url":"https://dblp.org/rec/conf/csa2/YooW17a"}, "url":"URL#2899801" }, { "@score":"1", "@id":"2899802", "info":{"authors":{"author":{"@pid":"05/2794","text":"Chui Young Yoon"}},"title":"Management and Measurement of Firm Smart Business Capability.","venue":"CSA/CUTE","pages":"932-937","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/Yoon17","doi":"10.1007/978-981-10-7605-3_148","ee":"https://doi.org/10.1007/978-981-10-7605-3_148","url":"https://dblp.org/rec/conf/csa2/Yoon17"}, "url":"URL#2899802" }, { "@score":"1", "@id":"2899803", "info":{"authors":{"author":[{"@pid":"226/7163","text":"Ki-Su Yoon"},{"@pid":"03/280","text":"Seoung-Hyeon Lee"},{"@pid":"85/6812","text":"Jae-Pil Lee"},{"@pid":"60/1721","text":"Jae-Kwang Lee"}]},"title":"A Study on the Designing of a Laboratory Accident Cognition Model Using Smart Sensor Based Decision Tree.","venue":"CSA/CUTE","pages":"187-191","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/YoonLLL17","doi":"10.1007/978-981-10-7605-3_31","ee":"https://doi.org/10.1007/978-981-10-7605-3_31","url":"https://dblp.org/rec/conf/csa2/YoonLLL17"}, "url":"URL#2899803" }, { "@score":"1", "@id":"2899804", "info":{"authors":{"author":[{"@pid":"27/276","text":"Taek-Young Youn"},{"@pid":"34/1755","text":"Ku-Young Chang"}]},"title":"New User Management Technique in Storage Services for Stronger Privacy.","venue":"CSA/CUTE","pages":"979-984","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/YounC17","doi":"10.1007/978-981-10-7605-3_156","ee":"https://doi.org/10.1007/978-981-10-7605-3_156","url":"https://dblp.org/rec/conf/csa2/YounC17"}, "url":"URL#2899804" }, { "@score":"1", "@id":"2899805", "info":{"authors":{"author":[{"@pid":"246/4110","text":"Hyeonsu Youn"},{"@pid":"235/6667","text":"Duhoe Kim"},{"@pid":"15/2111","text":"Yong-Hyun Kim"},{"@pid":"57/2855","text":"Dongkyoo Shin"},{"@pid":"85/2364","text":"Dongil Shin"}]},"title":"System Information Comparison and Analysis Technology for Cyber Attacks.","venue":"CSA/CUTE","pages":"446-451","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/YounKKSS17","doi":"10.1007/978-981-10-7605-3_73","ee":"https://doi.org/10.1007/978-981-10-7605-3_73","url":"https://dblp.org/rec/conf/csa2/YounKKSS17"}, "url":"URL#2899805" }, { "@score":"1", "@id":"2899806", "info":{"authors":{"author":[{"@pid":"225/7572","text":"Jin Young Byun"},{"@pid":"25/2983","text":"Jae Wook Jeon"}]},"title":"FPGA Based Face Detection Using Local Ternary Pattern Under Variant Illumination Condition.","venue":"CSA/CUTE","pages":"365-370","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/YoungJ17","doi":"10.1007/978-981-10-7605-3_60","ee":"https://doi.org/10.1007/978-981-10-7605-3_60","url":"https://dblp.org/rec/conf/csa2/YoungJ17"}, "url":"URL#2899806" }, { "@score":"1", "@id":"2899807", "info":{"authors":{"author":[{"@pid":"133/2430","text":"Zelun Zhang"},{"@pid":"01/2537-9","text":"Jin Liu 0009"},{"@pid":"239/2423","text":"Chenkai Gu"}]},"title":"A Chinese Handwriting Word Segmentation Method via Faster R-CNN.","venue":"CSA/CUTE","pages":"470-474","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ZhangLG17","doi":"10.1007/978-981-10-7605-3_77","ee":"https://doi.org/10.1007/978-981-10-7605-3_77","url":"https://dblp.org/rec/conf/csa2/ZhangLG17"}, "url":"URL#2899807" }, { "@score":"1", "@id":"2899808", "info":{"authors":{"author":[{"@pid":"237/3849","text":"Xipu Zhang"},{"@pid":"88/1145","text":"Choonhwa Lee"},{"@pid":"246/4094","text":"Bleza Takouda"},{"@pid":"246/4125","text":"Ryu Giha"}]},"title":"An iPOJO Components-Based Workflow Architecture in Ubiquitous Cloud Environments.","venue":"CSA/CUTE","pages":"695-700","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ZhangLTG17","doi":"10.1007/978-981-10-7605-3_112","ee":"https://doi.org/10.1007/978-981-10-7605-3_112","url":"https://dblp.org/rec/conf/csa2/ZhangLTG17"}, "url":"URL#2899808" }, { "@score":"1", "@id":"2899809", "info":{"authors":{"author":[{"@pid":"246/4003","text":"Yunqing Zhao"},{"@pid":"01/2537-9","text":"Jin Liu 0009"},{"@pid":"78/4658","text":"Chunyong Yin"}]},"title":"Chinese Anaphora Resolution Based on Adaptive Forest.","venue":"CSA/CUTE","pages":"481-486","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ZhaoLY17","doi":"10.1007/978-981-10-7605-3_79","ee":"https://doi.org/10.1007/978-981-10-7605-3_79","url":"https://dblp.org/rec/conf/csa2/ZhaoLY17"}, "url":"URL#2899809" }, { "@score":"1", "@id":"2899810", "info":{"authors":{"author":[{"@pid":"87/2661","text":"Minjuan Zhong"},{"@pid":"37/2732","text":"Beiji Zou"},{"@pid":"w/LeiWang17","text":"Lei Wang 0017"},{"@pid":"138/8095","text":"Shumei Liao"},{"@pid":"x/NaixueXiong","text":"Naixue Xiong"}]},"title":"An Effective Framework for Identifying Good XML Feedback Fragments.","venue":"CSA/CUTE","pages":"701-707","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ZhongZ0LX17","doi":"10.1007/978-981-10-7605-3_113","ee":"https://doi.org/10.1007/978-981-10-7605-3_113","url":"https://dblp.org/rec/conf/csa2/ZhongZ0LX17"}, "url":"URL#2899810" }, { "@score":"1", "@id":"2899811", "info":{"authors":{"author":[{"@pid":"221/1147","text":"Mingji Zhou"},{"@pid":"01/2537-9","text":"Jin Liu 0009"},{"@pid":"155/0258","text":"Yuhui Zheng"}]},"title":"Web Pages Ranking with Domain Ontology.","venue":"CSA/CUTE","pages":"516-521","year":"2017","type":"Conference and Workshop Papers","access":"closed","key":"conf/csa2/ZhouLZ17","doi":"10.1007/978-981-10-7605-3_85","ee":"https://doi.org/10.1007/978-981-10-7605-3_85","url":"https://dblp.org/rec/conf/csa2/ZhouLZ17"}, "url":"URL#2899811" } ] } } } )