A New Lightweight Protection Method against Impersonation Attack on SIP (Englisch)
- Neue Suche nach: Koh, Y.M.
- Neue Suche nach: Kwon, K.H.
- Neue Suche nach: Koh, Y.M.
- Neue Suche nach: Kwon, K.H.
- Neue Suche nach: Jeong, Hwa-Young
- Neue Suche nach: Obaidat, Mohammad S.
- Neue Suche nach: Yen, Neil Y.
In:
Advanced in computer science and its applications: CSA 2013 /
;
273-278
;
2014
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:A New Lightweight Protection Method against Impersonation Attack on SIP
-
Beteiligte:Koh, Y.M. ( Autor:in ) / Kwon, K.H. ( Autor:in ) / Jeong, Hwa-Young / Obaidat, Mohammad S. / Yen, Neil Y.
-
Kongress:5th, Advanced in computer science and its applications: CSA 2013 / ; 2013 ; Danang, Vietnam
-
Erschienen in:LECTURE NOTES IN ELECTRICAL ENGINEERING ; 279 ; 273-278
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Heidelberg
-
Erscheinungsdatum:01.01.2014
-
Format / Umfang:6 pages
-
Anmerkungen:"ISSN 1876-1119 (electronic)" --Title page verso. Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Fast Mode Decision Algorithm Based on Adaptive Search Direction for Combined Scalability in Scalable Video CodingKim, T.-J. / Jeong, Y.-K. / Kim, B.-G. / Hong, G.-S. et al. | 2014
- 7
-
Monitoring and Automatic Control for Heating System of the PlantKuznetsov, R. / Chipulis, V. et al. | 2014
- 13
-
Distributed Sensor-Driven Web Applications through Multi-device Usage PatternsDesruelle, H. / Gielen, F. et al. | 2014
- 19
-
Touch Logger Resistant Mobile Authentication Scheme Using Multimodal SensorsYi, H. / Piao, Y. / Yi, J.H. et al. | 2014
- 27
-
Commodity Recommendation Algorithm Based on Social NetworkYin, Z. / Yu, X. / Zhang, H. et al. | 2014
- 35
-
A Layered View Model of Social Experience Design: Beyond Single-User User ExperienceYamakami, T. et al. | 2014
- 43
-
A New Schedule Strategy of Embedded Multi-core SoCQiu, T. / Liu, F. / Xia, F. / Qiao, R. et al. | 2014
- 51
-
A Power-Aware Scheduler Exploiting All Slacks under EDF SchedulingSeol, Y.-I. / Kim, J.-U. / Kim, Y.-K. et al. | 2014
- 59
-
Network-Threatening Element Extraction and Quantification FrameworkJung, S. / Kim, D. / Kim, S. et al. | 2014
- 65
-
Document Clustering Based on a Weighted Exponential MeasurementTaheri, S. / Sim, A.T.H. / Ghorashi, S.H. et al. | 2014
- 71
-
A Robust Feature Selection Method for Classification of Cognitive States with fMRI DataDo, L.-N. / Yang, H.-J. et al. | 2014
- 77
-
Adaptive Networking for Continuous and Reliable Data Delivery in Wireless Sensor NetworksLee, J.-J. / Kang, J. / Lim, J. et al. | 2014
- 83
-
Model Transformation for Cyber Physical SystemsFeng, S. / Zhang, L. et al. | 2014
- 89
-
Load Balancing Improvement Methods in Video Conferencing Based on H.323 StandardNguyen, V.T. / Anh, H.T. / Hien, V.T. et al. | 2014
- 95
-
A Combination of Clonal Selection Algorithm and Artificial Neural Networks for Virus DetectionNguyen, V.T. / Anh, N.P. / Khang, M.T. / Ngan, N.H. / Thai, N.Q. / Quoc, N.T. et al. | 2014
- 101
-
Muti-dimensional Architecture Modeling for Cyber Physical SystemsXu, B. / Zhang, L. et al. | 2014
- 107
-
An Algorithm of Group Scheduling with Void Filling in OBS Core NodesQuoc, N.H. / Nhat, V.V.M. / Son, N.H. et al. | 2014
- 115
-
A Fast TRW Algorithm Using Binary PatternPark, J.-Y. / Cho, C.-S. et al. | 2014
- 125
-
Efficient Descriptor-Filtering Algorithm for Speeded Up Robust Features MatchingKim, M. / Kim, D. / Kim, K. / Ro, W.W. et al. | 2014
- 131
-
Towards Effective 3D Model Management on HadoopLuan, H. / Fan, Y. / Zhou, M. / Wang, X. et al. | 2014
- 141
-
Double Hot/Cold Clustering for Solid State DrivesJung, T. / Lee, Y. / Woo, J. / Shin, I. et al. | 2014
- 147
-
A Case Study for Cyber Physical System with Hybrid Relation CalculusFeng, S. / Zhang, L. et al. | 2014
- 153
-
Optimizing Functional Link Neural Network Learning Using Modified Bee Colony on Multi-class ClassificationsHassim, Y.M.M. / Ghazali, R. et al. | 2014
- 161
-
Adult Contents Analysis and Remote Management Framework for Parental Control Based on Android PlatformLim, J.-D. / Choi, B.-C. / Han, S.-W. / Kim, J.-N. et al. | 2014
- 167
-
A Dual Approach of GeneralMatch in Time-Series Subsequence MatchingKim, H.-S. / Lee, M. / Moon, Y.-S. et al. | 2014
- 173
-
An Approximate Multi-step kappa -NN Search in Time-Series DatabasesLee, S. / Kim, B.-S. / Choi, M.-J. / Moon, Y.-S. et al. | 2014
- 173
-
An Approximate Multi-step k-NN Search in Time-Series DatabasesLee, Sanghun / Kim, Bum-Soo / Choi, Mi-Jung / Moon, Yang-Sae et al. | 2014
- 179
-
The Role of Graph Theory in Solving Euclidean Shortest Path Problems in 2D and 3DAn, P.T. / Hai, N.N. / Van Hoai, T. et al. | 2014
- 185
-
Illumination-Robust Local Pattern Descriptor for Face RecognitionKim, D.-J. / Lee, S.-H. / Shon, M.-K. / Kim, H. / Ryu, N. et al. | 2014
- 191
-
MAP: An Optimized Energy-Efficient Cluster Header Selection Technique for Wireless Sensor NetworksUdompongsuk, K. / So-In, C. / Phaudphut, C. / Rujirakul, K. / Soomlek, C. / Waikham, B. et al. | 2014
- 201
-
MRP-NEP: A Non-Equal-Probability Multicast Routing Protocol for Target Tracking in Wireless Sensor NetworksDiao, B. / Li, P. / An, Z. / Wang, F. / Xu, Y. et al. | 2014
- 209
-
Predicting Osteoporosis by Analyzing Fracture Risk Factors and Trabecular Microarchitectures of the Proximal Femur from DXA ImagesJo, E.B. / Lee, J.H. / Park, S.Y. / Kim, S.M. et al. | 2014
- 217
-
Malicious Web Page Detection: A Machine Learning ApproachSirageldin, A. / Baharudin, B.B. / Jung, L.T. et al. | 2014
- 225
-
Proposal for Virtual Web Browser by Using HTML5Hayakawa, T. / Hikita, T. et al. | 2014
- 233
-
Design and Implementation of Task Context-Aware E-mail Platform for Collaborative TasksKatsumata, M. et al. | 2014
- 241
-
Empirical Analysis on the Users' Reply Behaviors of Online ForumsChen, G. / Cai, W. / Chen, A. / Xu, H. / Wang, R. et al. | 2014
- 249
-
On Companding Transform Techniques for OFDM Visible Light Communication over Indoor Dispersive ChannelsBandara, K. / Niroopan, P. / Chung, Y.H. et al. | 2014
- 255
-
Head Pose Estimation Based on Random Forests with Binary Pattern Run Length MatrixKim, H. / Lee, S.-H. / Sohn, M.-K. / Kim, D.-J. / Ryu, N. et al. | 2014
- 261
-
Triggers That Increase Co-Creation Risks: A Consumer PerspectivePalma, F. / Hong, S.G. et al. | 2014
- 273
-
A New Lightweight Protection Method against Impersonation Attack on SIPKoh, Y.M. / Kwon, K.H. et al. | 2014
- 279
-
Measuring Syntactic Sugar Usage in Programming Languages: An Empirical Study of C# and Java ProjectsKim, D. / Yi, G. et al. | 2014
- 285
-
Log Pre-processor for Security VisualizationSeo, J. / Kwak, J. et al. | 2014
- 293
-
Fast Coding Unit (CU) Depth Decision Algorithm for High Efficiency Video Coding (HEVC)Park, C.-s. / Kim, B.-G. / Hong, G.-S. / Kim, S.-K. et al. | 2014
- 301
-
A Study on Using OWC with Battery Storage for Providing Power to Sensor Nodes in a Fish FarmChowdhury, O.R. / Kim, H.-G. / Park, D.-H. / Shin, C.-S. / Cho, Y.-Y. / Park, J.-W. et al. | 2014
- 309
-
Location-Based Intelligent Robot Management Service Model Using RGPSi with AoA for Vertical FarmKim, H.-G. / Park, D.-H. / Chowdhury, O.R. / Shin, C.-S. / Cho, Y.-Y. / Park, J.-W. et al. | 2014
- 315
-
Design and Implementation of Intelligent Video Surveillance System Using Dual CamerasYoo, S.-H. / Park, M.-J. / Lim, C.-G. / Jeong, H. / Kim, E.-K. et al. | 2014
- 321
-
Context-Aware Control Service Model Based on Ontology for Greenhouse EnvironmentBae, N.-J. / Kwak, K.-H. / Sivamani, S. / Shin, C.-S. / Park, J.-W. / Cho, K. / Cho, Y.-Y. et al. | 2014
- 327
-
An OWL-Based Ontology Model for Intelligent Service in Vertical FarmSivamani, S. / Bae, N.-J. / Shin, C.-S. / Park, J.-W. / Cho, Y.-Y. et al. | 2014
- 333
-
Parallel Genetic Algorithm for Solving the Multilayer Survivable Optical Network Design ProblemBinh, H.T.T. / Tung, N.X. et al. | 2014
- 339
-
A Context-Aware Collaborative Filtering Algorithm through Identifying Similar Preference Trends in Different Contextual InformationDo, P. / Le, H. / Nguyen, V.T. / Dung, T.N. et al. | 2014
- 345
-
Survivable Flows Routing in Large Scale Network Design Using Genetic AlgorithmBinh, H.T.T. / Ngo, S.H. et al. | 2014
- 353
-
Belief Propagation in Bayesian NetworkChung, J.R. / Yi, G. et al. | 2014
- 363
-
A Method of Search Scope Compaction for Image IndexesLee, S.S. et al. | 2014
- 369
-
Efficient Locking Scheme with OPOF on Smart DevicesKim, H.-W. / Kang, A. / Barolli, L. / Jeong, Y.-S. et al. | 2014
- 379
-
A Requirement Analysis of Awareness-Based Vessel Traffic Service System for Maritime SafetyLee, B. / Park, N. / Kim, J. et al. | 2014
- 385
-
Analysis of Open Interface Function in USN Service Middleware SystemKim, Y. / Park, D.-H. / Bang, H.-C. / Park, N. et al. | 2014
- 391
-
Security Controls Based on K-ISMS in Cloud Computing ServiceMun, J. / Jung, Y. / Kim, J. / Lee, Y. / Park, K. / Won, D. et al. | 2014
- 405
-
Implementation of Smart Grid Educational ApplicationKo, Y. / Park, N. et al. | 2014
- 411
-
Development of Open Service Interface's Instructional Design Model in USN Middleware Platform EnvironmentKim, J. / Park, D.-H. / Bang, H.-C. / Park, N. et al. | 2014
- 417
-
The Analysis of Case Result and Satisfaction of Digital Textbooks for Elementary School StudentsKim, J. / Park, N. et al. | 2014
- 423
-
Cryptanalysis of Encrypted Remote User Authentication Scheme by Using Smart CardMun, J. / Kim, J. / Jeon, W. / Lee, Y. / Won, D. et al. | 2014
- 429
-
The Development of Convergent STEAM Program Focused on Rube Goldberg for Improvement of Engineer Career Awareness of Elementary School StudentsKim, Y. / Park, N. et al. | 2014
- 435
-
Key Management Scheme Using Dynamic Identity-Based Broadcast Encryption for Social Network ServicesJung, Y. / Nam, Y. / Kim, J. / Jeon, W. / Lee, H. / Won, D. et al. | 2014
- 445
-
Protecting Mobile Devices from Adversarial User by Fine-Grained Analysis of User BehaviorKim, Y. / Kwon, O. / Kim, S. / Jeong, B. / Yoon, H. et al. | 2014
- 453
-
Design of an RDFizer for Online Social Network ServicesHwang, J. / Jung, H. / Yoo, S. / Park, S. et al. | 2014
- 459
-
A High Performance and Bandwidth Efficient IDMA Scheme with Large Receiver MIMO TechnologiesNiroopan, P. / Bandara, K. / Chung, Y.-h. et al. | 2014
- 467
-
Security Considerations for Smart Phone Smishing AttacksKang, A. / Lee, J.D. / Kang, W.M. / Barolli, L. / Park, J.H. et al. | 2014
- 475
-
Technology Venture Startup Invigoration Strategy for Building Infrastructures for the Business Startup EcosystemKim, H.-S. / Lee, Y. / Kim, H.-R. et al. | 2014
- 483
-
Smart-Contents Visualization of Vehicle Big Data Using Vehicle Navigation Status InformationJoo, H.-J. / Hong, S.-J. / Park, D.-S. et al. | 2014
- 489
-
A Model for Analyzing the Effectiveness of Smart Mobile Communication Quality MeasurementHong, B.-H. / Joo, H.-J. / Kim, S.-S. et al. | 2014
- 497
-
Characteristics Analysis and Library Development for Common Lamps by Using PSPICE ModelingKim, Y.-C. / Cho, M.-T. / Song, H.-B. / Kim, O.-H. et al. | 2014
- 503
-
A Study on Brake Torque for Traction Motors by Using the Electric BrakeKim, Y.-C. / Cho, M.-T. / Song, H.-B. et al. | 2014
- 509
-
A Virtual Cluster Scheme Technology for Efficient Wireless Sensor NetworksCho, S. / Shrestha, B. / Kim, Y.-g. / Hong, B.-H. et al. | 2014
- 515
-
Implementation of Wireless Electronic Acupuncture SystemHong, Y.-S. / Hong, B.-H. / Kim, B.-K. et al. | 2014
- 523
-
Network Based Intelligent Agent for Ubiquitous EnvironmentsKim, D.W. / Lee, H.-D. / Park, S.-W. / Park, J.-W. et al. | 2014
- 531
-
A Study on the Clustering Scheme for Node Mobility in Mobile Ad-hoc NetworkCha, H.-J. / Kim, J.-M. / Ryou, H.-B. et al. | 2014
- 537
-
Design of User Access Authentication and Authorization System for VoIP ServiceYang, H.-K. / Kim, J.-M. / Ryou, H.-B. et al. | 2014
- 543
-
Approach of Secure Authentication System for Hybrid Cloud ServiceKim, J.-M. / Moon, J.-K. et al. | 2014
- 551
-
Intelligent Inference System for Smart Electronic AcupunctureHong, Y.-S. / Choi, C.-H. / Kim, B.-K. et al. | 2014
- 559
-
Electric Braking Control System to Secure Braking Force in the Wide Speed Range of Traction MotorKim, Y.-C. / Cho, M.-T. / Kim, O.-H. et al. | 2014
- 565
-
Optimized Design of Charger for Electric Vehicles with Enabled Efficient CCCV Mode MovementChun, J.-Y. / Kim, Y.-C. / Cho, M.-T. et al. | 2014
- 571
-
Ubiquitous Mobile Computing on Cloud InfrastructureSeo, D. / Jung, I.-Y. / Park, J.H. / Jeong, C.-S. et al. | 2014
- 577
-
Identifying Invalid Data within Operating System for Higher Flash UtilizationKim, J.Y. / Lim, S.-H. et al. | 2014
- 583
-
Moving Human Detection Using Motion Depth in Depth Image SequencesHong, B.-H. / Park, K. et al. | 2014
- 591
-
Microbial Fuel Cell for STEAM Teaching Tools and MethodKo, Y. / Park, N. et al. | 2014
- 597
-
Research on Educational Use of Smart-phone Applications with Smart Clicker TechniqueBae, J.-H. / Kim, S.-K. et al. | 2014
- 603
-
Hierarchical Customization Method for Ubiquitous Web ApplicationsLee, W. / Lee, H.-W. / Choi, M. / Park, J.H. / Jeong, Y.-S. et al. | 2014
- 609
-
PV System for Medical Devices in the HospitalKim, Y.-C. / Cho, M.-T. / Kim, O.-H. et al. | 2014
- 615
-
Color Image Retrieval Using Fuzzy Measure Hamming and S-TreeVan, T.T. / Le, T.M. et al. | 2014
- 621
-
Pipeline Verification via Closed-Loop FeedbackWang, D. / Li, Y. / Huang, X. et al. | 2014
- 627
-
Fuzzy Rule-Based to Predict the Minimum Surface Roughness in the Laser Assisted Machining (LAM)Adnan, M.R.H.M. / Zain, A.M. / Haron, H. et al. | 2014
- 633
-
GRT-Multigraphs for Communication Networks: A Fuzzy Theoretical ModelBiswas, S.S. / Alam, B. / Doja, M.N. et al. | 2014
- 643
-
Exploring the Key Determinants of Successful ICT Innovation Adoption: A Case Study of a Fishing Community in ThailandLee, H.W. / Sabudin, M. / Idrus, R. / Osman, M.A. / Kruahong, T. / Leanjay, N. et al. | 2014
- 649
-
Dynamic Bandwidth Allocation Algorithm for Ethernet Passive Optical Networks Based on Traffic PredictionXiao, C. / Fan, H. / Liu, D. et al. | 2014
- 655
-
Game Based Learning for Teaching Electrical and Electronic EngineeringCallaghan, M. / Cullen, M. et al. | 2014
- 661
-
Mobile WiMAX Resource Allocation Design Goals: Key Features/Factors/IssuesAli, Z.G. / Ahmad, R.B. / Yahya, A. / Hassnawi, L.A. et al. | 2014
- 669
-
Hybrid Trust Framework for Loss of Control in Cloud ComputingLi, T.J. / Singh, M.M. et al. | 2014
- 677
-
Secure Authorized Proxy Signature Scheme for Value-Added Service in Vehicular Ad Hoc NetworksLin, I.-C. / Chen, C.-H. / Linh, P.T. et al. | 2014
- 685
-
The Computer-Aided System for Promoting Judgments of UmpiresChen, C.-F. / Wu, C.-C. / Dang, D.-T. / Lin, I.-C. et al. | 2014
- 695
-
A Distributed Model to Analyzed QoS Parameters Performance Improvement for Fixed WiMAX NetworksIbrahim, A.L. / Said, A.M. / Nisar, K. / Shah, P.A. / Mu azu, A.A. et al. | 2014
- 703
-
A Hybrid of Fixed-Size and Dynamic-Size Tile Algorithm for Panoramic View on Mobile DevicesLim, C.K. / Tan, K.L. / Talib, A.Z. et al. | 2014
- 709
-
A Relationship Strength-Aware Topic Model for Communities Discovery in Online Social NetworksBi, J. / Huang, J. / Qin, Z. et al. | 2014
- 717
-
Replication in Data Grid: Determining Important ResourcesYusof, Y. et al. | 2014
- 723
-
Backpropagation Neural Network for Sex Determination from Patella in Forensic AnthropologyAfrianty, I. / Nasien, D. / Kadir, M.R.A. / Haron, H. et al. | 2014
- 729
-
Learning History Using Role-Playing Game (RPG) on Mobile PlatformLee, G.H. / Talib, A.Z. / Zainon, W.M.N.W. / Lim, C.K. et al. | 2014
- 735
-
Experiment on Modified Artificial Bee Colony for Better Global OptimisationShahrudin, M.S. / Mahmuddin, M. et al. | 2014
-
Ontology-Supported Development for Drug Analysis Laboratory Corresponding to the ISO/IEC 17025 StandardApirakkan, O. / Sirisangtragul, W. / Seresangtakul, P. et al. | 2014
- 751
-
Modeling the Natural Capital Investment on Tourism Industry Using a Predator-Prey ModelCai, Z. / Wang, Q. / Liu, G. et al. | 2014
- 757
-
Study on Tracking Derivative Based Method for DC System Grounding Fault DetectionPeng, W. / Huashun, L. / Ning, W. / Linkui, Q. / Yin, Y. et al. | 2014
- 763
-
Towards a VLIW Architecture for the 32-Bit Digital Signal Processor CoreLe-Huu, K.-N. / Vu, T.T. / Ho, D.N. / Dinh-Duc, A.-V. et al. | 2014
- 769
-
Application and Effectiveness of Cooperative Teaching Strategies in Entrepreneurship EducationShen, C.-H. / Chou, C.-M. / Hsiao, H.-C. et al. | 2014
- 775
-
Isarn Dharma Alphabets to Thai Language Translation by ATNsLakkhawannakun, P. / Seresangtakul, P. et al. | 2014
- 783
-
Simulation and Analysis of Space Station RedockingChen, R. / Tang, S. / Sun, G. et al. | 2014
- 791
-
Campus Mobile Navigation System Based on Shortest-Path Algorithm and Users CollaborationsLer, S.N. / Zainon, W.M.N.W. et al. | 2014
- 799
-
Tracking Multiple Fish in a Single Tank Using an Improved Particle FilterLee, W.P. / Osman, M.A. / Talib, A.Z. / Ogier, J.-M. / Yahya, K. et al. | 2014
- 805
-
Efficient 3D Model Visualization System of Design Drawing Based on Mobile Augmented RealityOh, Y.-J. / Kim, E.-K. et al. | 2014
- 811
-
A New Co-evolutionary Immune Algorithm for Flow Shop with Zero WaitXu, Z. / Zhang, S. / Gu, X. et al. | 2014
- 819
-
Design and Implementation of Safety Verification for Civil Aviation Processing System Based on BPMNWang, L. / Zhang, Q. et al. | 2014
- 829
-
A Survey on Ontology Mapping TechniquesHooi, Y.K. / Hassan, M.F. / Shariff, A.M. et al. | 2014
- 837
-
The Parametric Design and Automatic Assembly of Hydrostatic Rotary Table Based on Pro/EngineerCheng, Q. / Wu, C. / Liu, Z. / Wang, J. / Gu, P. et al. | 2014
- 843
-
Modeling and Simulation of China's Competition Strategy for Highly Educated Talents Based on System DynamicGuo, W. / Dai, F. et al. | 2014
- 853
-
Kernelized-QEMU: A Study of System-Level Virtual Layer in Linux KernelXu, Y. / Chen, X. / Chen, H.-P. / Wang, H. et al. | 2014
- 863
-
A Multi-pattern Matching Algorithm Based on Double Array TrieHou, M. / Song, Y.H. / Xu, D. / Zhang, H. et al. | 2014
- 869
-
Lower Bound Estimation for Required Number of Nodes in the Opportunistic Communication - Based Wireless Sensor NetworkDeng, Y. / Wu, S. / Li, S. / Xiong, Y. / Zhang, T. et al. | 2014
- 877
-
Potential Attacks against k-Anonymity on LBS and Solutions for Defending the AttacksJuncheng, P. / Huimin, D. / Yinghui, S. / Dong, L. et al. | 2014
- 885
-
To Practice Management Innovation and Reinforce the Foundation of Intellectual Property StrategySun, W.-L. / Ma, Y.-F. / Chen, L.-W. / Yu, S. et al. | 2014
- 893
-
Research of Intranet Security Audit in E-government Management Website Group Based on Multi-agentsBing, H. / Bo, W. et al. | 2014
- 901
-
Simulation of Three-Phase Voltage-Source PWM Rectifier with LCL FilterHui, L. / Chao, X. / Chen, C. / Yibing, W. et al. | 2014
- 911
-
The Research on the Computer Control Technology of Tobacco ProductionZhekun, L. / Yanhong, S. / Yusheng, Z. / Mingyi, W. / Geyi, L. et al. | 2014
- 919
-
A Study on the Application of Financial Engineering in Supply Chain Risk ManagementJianhua, H. / Wenliang, S. / Liwen, C. / Zhanchang, Y. et al. | 2014
- 929
-
Logical Symmetry Based K-means Algorithm with Self-adaptive Distance MetricZu-Feng, W. / Xiao-Fan, M. / Qiao, L. / Zhi-guang, Q. et al. | 2014
- 937
-
Modeling and Simulation of Network-Based C2 System Based on AOAHuo, B. / Yang, X.-r. et al. | 2014
- 943
-
Application Study of Spatiotemporal Chaotic Sequence in Code Division Multiple Access Communication SystemNan, L. / Quan-bin, T. et al. | 2014
- 951
-
OPRF Secure Computation for Safety Neighbor Verification Protocols of Wireless Sensor NetworksMeng, M. / Zhongwei, X. / Yujun, Z. et al. | 2014
- 957
-
Texture Terrain Based on Land Cover DistributionJinlian, D. / Lifei, X. / Song, W. et al. | 2014
- 967
-
Text Mining for Information Screen in Risk Assessment of Environmental Endocrine Disruptive ChemicalsChen, Y. / Wang, Y. / Duan, X. / Zhang, H. / Jia, Y. et al. | 2014
- 973
-
The Choices of Issued Inventory Valuation Methods Based on Different Accounting Standards at Home and AbroadShusheng, G. et al. | 2014
- 981
-
Formal Constraints Research of Military Conceptual Model ElementsXiao-Jian, D. / Bin, X. et al. | 2014
- 989
-
Leaf Lesion Detection Method Using Artificial Bee Colony AlgorithmAhmad, F. / Airuddin, A. et al. | 2014
- 997
-
The Accurate Positioning Method of Data Matrix Code Image Marked in Cylinder GlassHe, W.-p. / Guo, G.-f. / Wang, W. / Cao, X.-z. et al. | 2014
- 1007
-
Analysis of Urban Traffic Based on Taxi GPS DataMeng, L. / Ru-tong, L. / Yong, X. / Zhi-guang, Q. et al. | 2014
- 1017
-
Research and Application of Embedded System Development Based on Petri NetsYu, C. et al. | 2014
- 1023
-
CloStor: A Cloud Storage System for Fast Large-Scale Data I/OYing, W. / Dongri, Y. / Peng, L. et al. | 2014
- 1031
-
Nonnegative Variable Weight Based Auto Parts Combination Demand Forecasting Model ResearchGong, J. / Lu, C. / Liu, X. et al. | 2014
- 1039
-
A Data-Hiding Method Based on TCP/IP ChecksumLiu, Z. / Jiang, Y. / Qian, P. et al. | 2014
- 1045
-
A Parallel Full-System Emulator for Risc Architure HostJiang, X.-W. / Chen, X.-L. / Wang, H. / Chen, H.-P. et al. | 2014
- 1053
-
Density Based Active Self-training for Cross-Lingual Sentiment ClassificationHajmohammadi, M.S. / Ibrahim, R. / Selamat, A. et al. | 2014
- 1061
-
Constructing 3D Model Based on Panoramic ImagesLi, J. / Sheng, Y. / Duan, P. / Zhang, S. / Lv, H. et al. | 2014
- 1067
-
QoE Evaluation Model of Anti-Spam Allergy Problem Based on Fuzzy Entropy Method and Hidden Markov ModelLin, H. / Wang, J. et al. | 2014
- 1073
-
Topic Identification Strategy for English Academic ResourcesHuang, Li / Hu, Qing / Xiong, Xin / Hua, Lijun et al. | 2014
- 1073
-
Topic Identification Stratgy for English Academic ResourcesLi, H. / Qing, H. / Xin, X. / Lijun, H. et al. | 2014
- 1079
-
Performance Comparison between MLP Neural Network and Exponential Curve Fitting on Airwaves DataAbdulkarim, M. / Shafie, A. / Ahmad, W.F.W. / Razali, R. et al. | 2014
- 1089
-
A Private Cloud Storage System Based on Multithread OptimizationWei, Z. / Tao, X. / Kun, L. et al. | 2014
- 1097
-
Cloud Storage-Based Medical Data Integration TechnologyZhan, H. / Zhang, W. et al. | 2014
- 1103
-
The Operation and Maintenance Management System of the Cloud Computing Data Center Based on ITILZhan, H. / Zhang, W. et al. | 2014
- 1109
-
Underwater Object Detection by Combining the Spectral Residual and Three-Frame AlgorithmChen, Z. / Wang, H. / Shen, J. / Dong, X. et al. | 2014
- 1115
-
The Data Mining of Breast Cancer Based-on K-MeansRuilan, Z. / Zhixin, F. et al. | 2014
- 1121
-
Compositional Modeling for Underwater Warfare Simulation Based on HLA and FlamesLiang, H. / Kang, F. / Zeng, Y. et al. | 2014
- 1129
-
Spot Electricity Price Dynamics of Indian Electricity MarketGirish, G.P. / Vijayalakshmi, S. et al. | 2014
- 1137
-
Guaranteed QoS for UDP and TCP Flows to Measure Throughput in VANETsMu azu, A.A. / Jung, L.T. / Hasbullah, H. / Lowal, I.A. / Shah, P.A. et al. | 2014
- 1145
-
Detecting People Using Histogram of Oriented Gradients: A Step towards Abnormal Human Activity DetectionYussiff, A.-L. / Yong, S.-P. / Baharudin, B.B. et al. | 2014
- 1151
-
Research of Touchscreen Terminals Gesture Operation Error Based on Kansei EngineeringQin, R. / Chen, D. et al. | 2014
- 1159
-
Heart Sound Feature Extraction Based on Wavelet Singular EntropyLu, Z. et al. | 2014
- 1165
-
Research on MTMP Structure Chlorine Dosing Decoupling ControlPeizhang, X. / Xingpeng, Z. et al. | 2014
- 1171
-
Development of Ontology for the Diseases of SpineKim, G.-H. / Kang, M.-J. / Jung, C.Y. / Jung, J.-Y. / Jung, S.E. / Kim, J.-S. / Jeong, J.-S. / Kim, D.-H. / Yoo, K.-H. / Seo, D. et al. | 2014
- 1179
-
Implementation of Information Retrieval Service for Korean Spine Database with Degenerative Spinal DiseaseSeo, D. / Lee, S. / Jung, H. / Sung, W.-K. et al. | 2014
- 1185
-
Automatic Surface Mesh Intersection Algorithm of Spine and Implant FEM ModelsNam, D. / Choi, I. / Kim, Y. / Jeon, W. / Cho, K.W. et al. | 2014
- 1195
-
Simulation Program Binding Technology Based on SupercomputingPark, S.-R. / Jin, D. / Lee, K.-C. / Cho, K.W. et al. | 2014
- 1201
-
Data Security in Cloud for Health Care ApplicationsAnitha, R. / Mukherjee, S. et al. | 2014
- 1211
-
Web Service Selection Using Decision Tree Analysis in a Risky EnvironmentSandhya, P. / Lakshmi, M. et al. | 2014
- 1219
-
An Enhanced e-Voting System in Cloud Using Fingerprint AuthenticationDevi, G.U. / Anusha, K. / Rajyalakshmi, G.V. et al. | 2014
- 1225
-
Local Minima Jump PSO for Workflow Scheduling in Cloud Computing EnvironmentsChitra, S. / Madhusudhanan, B. / Sakthidharan, G.R. / Saravanan, P. et al. | 2014
- 1235
-
Respiratory Rate Estimation by Extracted PPG Signals from Embedded Smart Attire of Operation StrategistsDeivanai, K. et al. | 2014
- 1241
-
The Assessment of Information and Communication Technology (ICT) Policy in South KoreaYeo, Y.-H. / Kim, S.-K. / Bae, J.-H. / Kim, B.-G. et al. | 2014
- 1251
-
Computer Graphical Score and Music Education: Application to Music Animation Machine MIDI PlayerHwang, S.-H. / Chun, S.-H. et al. | 2014
- 1259
-
A Newton's Universal Gravitation Inspired Firefly Algorithm for Document ClusteringMohammed, A.J. / Yusof, Y. / Husni, H. et al. | 2014
- 1265
-
A Study on the Correlation between the Customers' Perceived Risks and Online Shopping TendenciesHuang, C.E. / Chen, P.K. / Chen, C.C. et al. | 2014
- 1273
-
Model Checking Probabilistic Timed Systems against Timed Automata SpecificationZhang, J. et al. | 2014
- 1279
-
Particle Filter Parallel of Improved Algorithm Based on OpenMpZhang, Y. et al. | 2014
- 1287
-
An E-commerce-System-Based Research on Trust Risk Assessment ModelsTing, M. / Yi, Z. / Qun, D. et al. | 2014
- 1295
-
An Analysis about the Security of the Operating System Trusted PlatformYi, Z. et al. | 2014
- 1337
-
FOLI Technique Algorithm for Real-Time Efficient Image ProcessingCho, S. / Son, K.C. / Lee, J. / Lee, S.H. et al. | 2014
- 1343
-
Stabilization Inverse Optimal Control of Nonlinear Systems with Structural UncertaintyLee, J.-Y. / Cho, S. et al. | 2014
- 1371
-
Desing of User Access Authentication and Authorization System for VoIP ServiceYang, H.-K. / Kim, J.-M. / Ryou, H.-B. et al. | 2014
- 1411
-
An Intelligent e-Services Composition Platform for Ubiquitous Baby Care: The Case Study of Life and Commercial Support Services for Property ManagementKe, C.-K. / Yeh, Y.-J. / Chang, C.-M. et al. | 2014
- 1417
-
An Authoring System of Creating Graphic Map for Item Search Based on Library OPACsChang, H.-P. / Chang, W.-T. / Fong, S.-P. et al. | 2014
- 1423
-
Cloud-Based Traveling Video Editing SystemTsai, J.C. / Yen, N.Y. et al. | 2014
- 1429
-
Linked Data-Based Service Publication for Service ClusteringPaik, I. / Chen, W. / Kumara, B.T.G.S. / Tanaka, T. / Li, Z. / Yaguchi, Y. et al. | 2014
- 1437
-
The Practical Quality Model for Cloud Learning SystemKang, A. / Barolli, L. / Jeong, H. / Park, J. / Choi, H.-G. et al. | 2014
- 1443
-
Realizing the Right to Be Forgotten in an SNS EnvironmentSin, C.H. / Kim, N.A. / Go, B.W. / Min, K.S. / Lee, J.D. / Park, J.H. et al. | 2014