The Implication of Environmental Costs on Air Passenger Demand for Airline Networks (Englisch)
- Neue Suche nach: Kim, B.-J.
- Neue Suche nach: Yoo, K.-E.
- Neue Suche nach: Kim, B.-J.
- Neue Suche nach: Yoo, K.-E.
In:
Computer Science and its Applications
;
587-594
;
2012
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:The Implication of Environmental Costs on Air Passenger Demand for Airline Networks
-
Beteiligte:Kim, B.-J. ( Autor:in ) / Yoo, K.-E. ( Autor:in )
-
Kongress:Conference, Computer Science and its Applications ; 2009 ; Jeju Island, Korea
-
Erschienen in:Computer Science and its Applications ; 587-594LECTURE NOTES IN ELECTRICAL ENGINEERING ; 203 ; 587-594
-
Verlag:
- Neue Suche nach: Springer Netherlands
-
Erscheinungsort:Dordrecht
-
Erscheinungsdatum:01.01.2012
-
Format / Umfang:8 pages
-
Anmerkungen:The 4th FTRA International Conference on Computer Science and its Applications (CSA-12) was held in Jeju, Korea on November 22~25, 2012. Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Utilizing TPM Functionalities on Remote ServerAziz, N.A. / Khalid, P.S. et al. | 2012
- 13
-
Security and QoS relationships in Mobile PlatformsNieto, A. / Lopez, J. et al. | 2012
- 23
-
A Hybrid Natural Computing Approach for the VRP Problem Based on PSO, GA and Quantum ComputationZeng, K. / Peng, G. / Cai, Z. / Huang, Z. / Yang, X. et al. | 2012
- 29
-
Finger Triggered Virtual Musical InstrumentsNg, C.K. / Fam, J.G. / Noordin, N.K. et al. | 2012
- 39
-
A Low Complexity Multi-Layered Space Frequency Coding Detection Algorithm for MIMO-OFDMChong, J.H. / Ng, C.K. / Noordin, N.K. / Ali, B.M. et al. | 2012
- 49
-
Dynamic Transmit Antenna Shuffling Scheme for MIMO Wireless Communication SystemsChong, J.H. / Ng, C.K. / Noordin, N.K. / Ali, B.M. et al. | 2012
- 59
-
A Low Complexity V-BLAST/STBC Detection Algorithm for MIMO-SystemChong, J.H. / Ng, C.K. / Noordin, N.K. / Ali, B.M. et al. | 2012
- 69
-
A Grid-Based Cloaking Scheme for Continuous Location-Based Services in Distributed SystemsKim, H.-I. / Chang, J.-W. et al. | 2012
- 79
-
Occluded and Low Resolution Face Detection with Hierarchical Deformable ModelYang, X. / Peng, G. / Cai, Z. / Zeng, K. et al. | 2012
- 87
-
Negotiated Economic Grid Brokering for Quality of ServiceKavanagh, R. / Djemame, K. et al. | 2012
- 97
-
Differential Fault Analysis on HAS-160 Compression FunctionKang, J. / Jeong, K. / Sung, J. / Hong, S. et al. | 2012
- 107
-
A New Energy-Efficient Routing Protocol Based on Clusters for Wireless Sensor NetworksYoon, M. / Chang, J.-W. et al. | 2012
- 121
-
MIDI-to-Singing Online Karaoke for English M-LearningShen, H.-C. / Lee, C.-N. et al. | 2012
- 129
-
A New Cloaking Method Based on Weighted Adjacency Graph for Preserving User Location Privacy in LBSJang, M. / Chang, J.-W. et al. | 2012
- 139
-
Simulation Videos for Understanding Occlusion Effects on Kernel Based Object TrackingLee, B.Y. / Liew, L.H. / Cheah, W.S. / Wang, Y.C. et al. | 2012
- 149
-
Originator Recognition (or) Path Recovery Mechanism for Load-Based Routing ProtocolEe, G.K. / Ng, C.K. / Hashim, F. / Noordin, N.K. / Ali, B.M. et al. | 2012
- 159
-
Analysis of Correlation Peak Position ModulationNah, J. / Kim, J. et al. | 2012
- 169
-
Simulation Study on Distribution of Control Points for Aerial Images RectificationLiew, L.H. / Lee, B.Y. / Wang, Y.C. / Cheah, W.S. et al. | 2012
- 179
-
A Secure Image Watermarking Using Visual CryptographyJin, X. / Kim, J. et al. | 2012
- 189
-
Bit Error Rate Analysis of Partial Packets in Ad hoc Wireless NetworksLu, J. / Gan, X. / Han, G. / Li, B. / Dou, W. et al. | 2012
- 197
-
An Interaction System Architecture and Design between Smart Computing and Cloud ComputingLee, T.-G. / Lee, S.-H. / Chung, G.-S. et al. | 2012
- 207
-
A Virtual Machine Scheduling Algorithm for Resource Cooperation in a Private CloudChang, R.-S. / Chang, Y.-C. / Ye, R.-C. et al. | 2012
- 217
-
Heterogeneous Core Network Architecture for Next-Generation Mobile Communication NetworksChang, Y.-C. et al. | 2012
- 231
-
A Novel Learning Algorithm Based on a Multi-Agent Structure for Solving Multi-Mode Resource-Constrained Project Scheduling ProblemMirzaei, O. / Akbarzadeh-T, M.-R. et al. | 2012
- 243
-
Security Analysis of the Keyschedule of ARIA-128Kang, H. / Lee, Y. / Jeong, K. / Sung, J. / Hong, S. et al. | 2012
- 253
-
Estimating Number of Columns in Mixing Matrix for Under-Determined ICA Using Observed Signal Clustering and Exponential FilteringSaengpratch, C. / Lursinsap, C. et al. | 2012
- 261
-
Realization of Coordinative Control Between Multi Readers and Multi RF-SIM Cards Under Mobile RF-SIM ModeYu, S. / Peng, Y. / Huang, X. et al. | 2012
- 271
-
Effects of Smart Home Dataset Characteristics on Classifiers Performance for Human Activity RecognitionFatima, I. / Fahim, M. / Lee, Y.-K. / Lee, S. et al. | 2012
- 283
-
Activity Recognition Based on SVM Kernel Fusion in Smart HomeFahim, M. / Fatima, I. / Lee, S. / Lee, Y.-K. et al. | 2012
- 291
-
Secure Anonymous Conditional Purchase Order Payment MechanismWu, W.-C. / Liaw, H.-T. et al. | 2012
- 301
-
Trustworthiness Inference of Multi-tenant Component Services in Service CompositionsElshaafi, H. / Botvich, D. et al. | 2012
- 313
-
Enhanced Middleware for Collaborative Privacy in Community Based Recommendations ServicesElmisery, A.M. / Doolin, K. / Roussaki, I. / Botvich, D. et al. | 2012
- 329
-
A New k-NN Query Processing Algorithm Using a Grid Structure for Mobile Objects in Location-Based ServicesHong, S. / Chang, J. et al. | 2012
- 339
-
An Immune System-Inspired Byte Permutation Function to Improve Confusion Performance of Round Transformation in Symmetric Encryption SchemeAriffin, S. / Mahmod, R. / Jaafar, A. / Rezal, M. / Ariffin, K. et al. | 2012
- 353
-
New Bilateral Error Concealment Method of Entire Depth Frame Loss for 3DTV and Virtual 3D Videoconferencing SystemsLi, F. / Jiang, G. / Yu, M. / Wang, X. / Shao, F. / Peng, Z. et al. | 2012
- 361
-
A REST Open API for Preventing Income Tax Over-Payment by Auditing Year-End Tax SettlementChoi, M. / Yeo, S.-S. et al. | 2012
- 371
-
BAT: Bimodal Cryptographic Algorithm Suitable for Various EnvironmentsLee, J. / Jeong, K. / Kang, J. / Lee, Y. / Sung, J. / Chang, K.-Y. / Hong, S. et al. | 2012
- 389
-
Applying Forensic Approach to Live Investigation Using XeBagLim, K.-S. / Lee, C. et al. | 2012
- 399
-
The Development of an Internet-Based Knowledge Management System for Adapted Physical Education Service DeliveryBae, J.-J. / Lee, J.-C. / Cheon, M.-W. / Choi, S.-O. et al. | 2012
- 409
-
Intangible Capital, Opportunity Exploitation and Institutional Endorsement in Emerging IT IndustryYoungkeun, C. et al. | 2012
- 421
-
A Virtualization Security Framework for Public Cloud ComputingPark, J.H. et al. | 2012
- 429
-
Environmental Awareness in Green Supply Chain and Green Business Practices: Application to Small and Medium-Sized EnterprisesChun, S.-H. / Hwang, H.J. / Byun, Y.-H. et al. | 2012
- 437
-
Computational Analysis of the Bargaining Power and Channel Strategies in Supply Chain RelationshipChun, S.-H. et al. | 2012
- 445
-
New Hybrid Data Model for XML Document Management in Electronic CommerceKim, E.-Y. / Chun, S.-H. et al. | 2012
- 453
-
A Study on Advanced Penetration Testing and Defensive Schemes for Web Service Vulnerability AnalysesPark, J.S. / Mun, C.-H. / Shin, C.H. / Park, J.H. et al. | 2012
- 461
-
Orthogonal Unified Buffer with Memory EfficiencySeo, S. / Choi, J. et al. | 2012
- 469
-
The Study on Smart Sensor Network Based Production Management Service DesignChang, H. et al. | 2012
- 477
-
R&D Intensity and Productivity: Evidence from IT Firms versus Non-IT Firms in KOSDAQ MarketKim, S. et al. | 2012
- 485
-
An Improved CRT-Based Broadcast Authentication Scheme in WSNsZhu, Y. / Shen, Y. et al. | 2012
- 493
-
Evaluation and Exploration of Optimal Deployment for RFID Services in Smart Campus FrameworkChang, Y.-C. et al. | 2012
- 503
-
Towards Analyzing Family Misconfiguration in Tor NetworkWang, X. / Shi, J. / Li, G. et al. | 2012
- 515
-
Intelligent Heterogeneous Network Worms Propagation Modeling and AnalysisGuo, W. / Zhai, L. / Ren, Y. / Guo, L. et al. | 2012
- 525
-
The Design of Remote Control Car Using Smartphone for Intrusion DetectionRyu, C.-J. et al. | 2012
- 537
-
The Impact of Systems Engineering on Program Performance: A Case Study of the Boeing CompanySon, S.K. / Kim, S.-K. et al. | 2012
- 547
-
IT Framework and User Requirement Analysis for Smart AirportsSohn, S.-C. / Kim, K.-W. / Lee, C. et al. | 2012
- 557
-
The Framework Development of a RFID-Based Baggage Handling System for AirportsKim, C.-g. / Kim, K.-w. / Choi, Y.-C. et al. | 2012
- 567
-
A Modified Carbon Calculator for Enhanced Accuracy, Reliability and UnderstandabilityLee, G.-Y. / Yoo, K.-E. / Kim, K.-W. / Kim, B.-M. et al. | 2012
- 577
-
A Framework for Developing Internet-Based Global Integrated Logistics Management SystemHong, H.-S. / Hong, K.-s. / Kim, K.-w. / Lee, C. et al. | 2012
- 587
-
The Implication of Environmental Costs on Air Passenger Demand for Airline NetworksKim, B.-J. / Yoo, K.-E. et al. | 2012
- 595
-
An Empirical Study on the Design Peak Hourly Traffic at a Major International AirportLee, S.-k. / Kim, K.-W. / Choi, Y.-C. et al. | 2012
- 605
-
Review of CRS in the Airline Industry: New Categorization with Previous LiteraturesBang, S.O. / Lee, J. / Kim, K.-w. / Lee, C. et al. | 2012
- 613
-
Simulation Analysis for the Design of the Airport Security SystemSim, Y.-t. / Park, S.-b. / Choi, Y.-c. et al. | 2012
- 623
-
Measuring Asia Airport Productivity Considering the Undesirable OutputPark, S. / Lee, C. et al. | 2012
- 633
-
A Study on Aviation Technology Forecast for Sustainable (Green) Aviation Using Patent AnalysisKwon, H. / Lee, C. et al. | 2012
- 645
-
A Vision-Based Universal Control System for Home AppliancesHsieh, C.-H. / Huang, P.S. / Weng, S.-K. / Huang, C.-P. / Yeh, J.-S. / Lee, Y.-B. et al. | 2012
- 655
-
An IMU-Based Positioning System Using QR-Code Assisting for Indoor NavigationChiou, Y.-S. / Tsai, F. / Yeh, S.-C. / Hsu, W.-H. et al. | 2012
- 667
-
A Visual-Audio Assisting System for Senior Citizen ReadingLi, Y.-Q. / Liu, J.-J. / Huang, S.-Y. / Yang, C.-K. / Chang, C.-C. / Wang, L.-T. / Hsiao, K.-F. et al. | 2012
- 677
-
Automated Text Detection and Text-Line Construction in Natural ImagesYu, C.-C. / Chen, Y.-N. / Hsu, W.-H. / Chuang, T.C. et al. | 2012
- 687
-
Security Weakness of a Dynamic ID-Based User Authentication Scheme with Key AgreementKim, M. / Park, N. / Won, D. et al. | 2012
- 693
-
Development and Application of STEAM Teaching Model Based on the Rube Goldberg's InventionKim, Y. / Park, N. et al. | 2012
- 699
-
Security Enhancement of User Authentication Scheme Using IVEF in Vessel Traffic Service SystemPark, N. / Cho, S. / Kim, B.-D. / Lee, B. / Won, D. et al. | 2012
- 707
-
Weakness of Tan's Two-Factor User Authentication Scheme in Wireless Sensor NetworksLee, Y. / Kim, J. / Won, D. et al. | 2012
- 715
-
Design of Mobile NFC Extension Protocol for Various Ubiquitous Sensor Network EnvironmentsLee, J.W. / Bang, H. / Park, N. et al. | 2012
- 723
-
Experimentation and Validation of Web Application's Vulnerability Using Security Testing MethodLee, T. / Won, G. / Cho, S. / Park, N. / Won, D. et al. | 2012
- 733
-
Teaching-Learning Methodology of STS Based on Computer and CAI in Information Science EducationHong, J. / Park, N. et al. | 2012
- 739
-
Encryption Scheme Supporting Range Queries on Encrypted Privacy Databases in Big Data Service EraLee, J.W. / Park, N. et al. | 2012
- 749
-
A Congested Route Discrimination Scheme Through the Analysis of Moving Object TrajectoriesLi, H. / Park, H. / Park, Y. / Bok, K. / Yoo, J. et al. | 2012
- 757
-
An Efficient Hierarchical Multi-Hop Clustering Scheme in Non-uniform Large Wireless Sensor NetworksLee, C. / Kim, E. / Park, J. / Seong, D. / Yoo, J. et al. | 2012
- 767
-
An Energy-Efficient Data Compression and Transmission Scheme in Wireless Multimedia Sensor NetworksPark, J. / Seong, D.-o. / Lee, B.-y. / Yoo, J. et al. | 2012
- 773
-
A Sensor Positioning Scheme in Irregular Wireless Sensor NetworksPark, H. / Hwang, D. / Park, J. / Seong, D.-o. / Yoo, J. et al. | 2012
- 781
-
Secure Multipath Routing for WMSNLee, S. / Park, J. / Seong, D. / Yoo, J. et al. | 2012
- 791
-
Dynamic TDMA Scheduling for Data Compression in Wireless Sensor NetworksYeo, M. / Yoo, J. et al. | 2012
- 799
-
A Study of Forest Fire Correlation to Based on Meteorological FactorsChung, Y.-S. / Kim, J.-M. / Park, K.-R. et al. | 2012
- 805
-
A Study on the Improvement of Interoperability in Rok C4I System for Future WarfareCha, H.-J. / Kim, J.-M. / Ryou, H.-B. / Jeong, H.-Y. et al. | 2012
- 813
-
Development Direction for Information Security in Network-Centric WarfareYang, H.-K. / Kim, J.-M. / Ryou, H.-B. / Park, J.-H. et al. | 2012
- 821
-
An IHD Authentication Protocol in Smart GridHsu, M.-Y. / Chen, Y.-H. / Chen, S.-S. / Tang, W. / Sun, H.-M. / Cheng, B.-C. et al. | 2012
- 831
-
Flexible Network Design for Wide Area Measurement Protection and ControlCao, D. / Dysko, A. / Michie, C. / Andonovic, I. et al. | 2012
- 843
-
Green Communication and Corporate Sustainability of Computer Aided Audit Techniques and Fraud DetectionAriwa, E. / Olasanmi, O.O. / Mauri, J.L. et al. | 2012
- 863
-
Green Communication and Consumer Electronics Sustainability in Delivering Cost Benefit Business Federation in Professional Service FirmsAriwa, E. / Syvertsen, C.M. / Mauri, J.L. et al. | 2012
- 875
-
SMATT: Smart Meter ATTestation Using Multiple Target Selection and Copy-Proof MemoryPark, H. / Seo, D. / Lee, H. / Perrig, A. et al. | 2012
- 891
-
Design of a Structured Plug-in Smart Education SystemJo, J. / Yang, Y. / Lim, H. et al. | 2012
- 903
-
Impact of Background Utilization and Background Traffic on the Foreground Applications in a Wide Area NetworkUddin, J. / Kim, J.M. et al. | 2012
- 917
-
Load Balancing in Grid Computing Using AI TechniquesInam, N.T. / Awan, M.D. / Afzal, S.S. et al. | 2012
- 929
-
LiQR: A QR Code-Based Smart Phone Application Supporting Digital MarketingPark, J.-E. / Park, J. / Lee, M.-J. et al. | 2012
- 943
-
Ensuring Minimal Communication Overhead in Low Bandwidth Network FileHabib, M.A. / Nasar, W. / Ch, S.A. / Khan, A.J. et al. | 2012
- 953
-
Preventing Blackhole Attack in DSR-Based Wireless Ad Hoc NetworksShi, F. / Liu, W. / Jin, D. et al. | 2012
- 971
-
Fundamental Tradeoffs for Ubiquitous Wireless Service: A QoE, Energy and Spectral PerspectiveZhang, Y. / Liu, F. / Peng, Y. / Long, H. / Wang, W. et al. | 2012
- 981
-
Multi-Policy Collaborative Access Control Model for Composite ServicesYu, B. / Yang, L. / Wang, Y. / Zhang, B. / Ma, L. / Cao, Y. et al. | 2012