IO Cost Evaluation of OLAP Query Processing with MapReduce (Englisch)
- Neue Suche nach: Kang, W.L.
- Neue Suche nach: Kim, H.G.
- Neue Suche nach: Lee, Y.J.
- Neue Suche nach: Kang, W.L.
- Neue Suche nach: Kim, H.G.
- Neue Suche nach: Lee, Y.J.
- Neue Suche nach: Park, James J.
- Neue Suche nach: Stojmenovic, Ivan
- Neue Suche nach: Jeong, Hwa-Young
In:
Computer science and its applications; Computer science and its applications: ubiquitous information technologies /
;
997-1002
;
2015
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:IO Cost Evaluation of OLAP Query Processing with MapReduce
-
Beteiligte:Kang, W.L. ( Autor:in ) / Kim, H.G. ( Autor:in ) / Lee, Y.J. ( Autor:in ) / Park, James J. / Stojmenovic, Ivan / Jeong, Hwa-Young
-
Kongress:International conference; 6th, Computer science and its applications; Computer science and its applications: ubiquitous information technologies / ; 2014 ; Guam
-
Erschienen in:LECTURE NOTES IN ELECTRICAL ENGINEERING ; 330 ; 997-1002
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Heidelberg
-
Erscheinungsdatum:01.01.2015
-
Format / Umfang:6 pages
-
Anmerkungen:Also known as CSA-14. "ISSN 1876-1119 (electronic)" --Title page verso. Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Maneuvering Target Tracking Algorithm for Adaptive Estimation on Measurement Noise Variance MatrixWang, R. / Feng, X. / Zhou, H. et al. | 2015
- 7
-
Performance of a Hybrid DCT SVD Visually Imperceptible Digital Watermarking against Signal Processing AttacksIslam, M.S. / Chong, U. et al. | 2015
- 15
-
A Simplified Hybrid Navigation System Design of a Mobile Robot Using Kalman FilterKim, M.J. / Bae, S.B. / Joo, M.G. et al. | 2015
- 21
-
Proposal for Easily Detachable Proxy for Personal Information Leakage DetectionHayakawa, T. / Hikita, T. et al. | 2015
- 29
-
Adaptive Transformation Engine Supporting Multi-Screen Services Using Smart DevicesBae, Y. / Park, J. et al. | 2015
- 35
-
The Improved 16th-Order Differential Attack on 10-Round Variant of Block Cipher PRESENTIgarashi, Y. / Kaneko, T. / Setoguchi, S. / Fukushima, S. / Hachino, T. et al. | 2015
- 41
-
Implementation of Stereo Camera Module for Hand Gesture RecognitionLee, K.-T. / Park, S. / Park, Y.-S. et al. | 2015
- 47
-
Social Network Recommendation Based on Hybrid Suffix Tree ClusteringZhang, J. / Ma, X. / Li, W. / Jin, Q. et al. | 2015
- 55
-
A Reputation-Based Adaptive Trust Management System for Vehicular CloudsLee, E.-J. / Bae, I.-H. et al. | 2015
- 65
-
Semi-automatic Construction of a Named Entity Dictionary Based on Active LearningSong, Y. / Kim, H. et al. | 2015
- 71
-
Research on Privacy Protection of WHOIS Information in DNSZhang, W. / Wang, W. / Zhang, X. / Shi, H. et al. | 2015
- 77
-
Fuzzy Logic-Driven Resource Evaluation Method for Automated Negotiation with Resource Allocation in Distributed EnvironmentKim, J. / Kim, T. / Moon, S. / Lee, J. et al. | 2015
- 83
-
ERAGHC: Enhanced Reliable Authenticated Group Head CommunicationZafar, L. / Hadi, F. et al. | 2015
- 93
-
Transaction Authentication Using HMAC-Based One-Time Password and QR CodeSubpratatsavee, P. / Kuacharoen, P. et al. | 2015
- 99
-
New Secure LEACH Protocol Using Hierarchy-Based Preshared Key SchemeGoto, S. / Saito, S. / Kang, H. / Iwamura, K. et al. | 2015
- 107
-
Secrecy Multiplication Based on a (k, n)-Threshold Secret-Sharing Scheme Using Only k ServersWatanabe, T. / Iwamura, K. / Kaneda, K. et al. | 2015
- 113
-
Hierarchical-Structured Key Exchange Scheme for Large-Scale Mesh-Type Wireless Sensor NetworksKaneko, R. / Iwamura, K. / Kaneda, K. et al. | 2015
- 121
-
Detecting Abnormal Behavior in SCADA Networks Using Normal Traffic Pattern LearningKim, B.-K. / Kang, D.-H. / Na, J.-C. / Chung, T.-M. et al. | 2015
- 127
-
A Multimodal Sensing System for Elder Fall DetectionShih, C. et al. | 2015
- 135
-
A Study on ENC Data Translation for Mobile DeviceSong, M.-S. / Lim, D.-S. / Jang, B.-T. / Ro, S. et al. | 2015
- 141
-
Exploring Tactics in Team Sports TrainingSun, H. / Chen, J.X. et al. | 2015
- 149
-
Adaptive CAP Assignment Approach for IEEE 802.15.3cKim, E.-J. / Jung, J.-J. et al. | 2015
- 155
-
Content Awareness-Based Fast Block Motion Estimation Algorithm for H.264/AVC Encoding SystemBeak, R. / Jang, K.-S. / Kim, B.-G. / Lee, K.-S. et al. | 2015
- 163
-
Real-Time Projection Mapping for Performance ArtsLee, J. / Kim, Y. / Heo, M.-H. / Kim, D. / Shin, B.-S. et al. | 2015
- 171
-
Ranking Method for Book Reviews Based on Estimated Discussion QualityRyang, H. / Yun, U. et al. | 2015
- 179
-
Mining Frequent Graph Patterns Considering Both Different Importance and Rarity of Graph ElementsLee, G. / Yun, U. et al. | 2015
- 185
-
Vehicle Data Generating Technique Considering Vehicles with Incrementally Changing States Based on Growth and Decline FunctionsYun, U. / Ryang, H. / Kim, J. et al. | 2015
- 191
-
Correlated Blog-Page Retrieval with Structural CharacteristicsYun, U. / Lee, G. / Pyun, G. et al. | 2015
- 197
-
A Topic-oriented Information Retrieval Algorithm in the BlogosphereKim, J. / Yun, U. et al. | 2015
- 203
-
Fast HEVC Intra Mode Decision Based on Bayesian Classification Framework with Relative SATDGwon, D. / Choi, Y. / Choi, H. et al. | 2015
- 211
-
Best Practices in Software Engineering for SaaS-Cloud EraPark, S. / Lee, S. / Park, Y.B. et al. | 2015
- 217
-
The Effects of Mental Model on Intention to Use Smartphone ApplicationsJung, W. / Yim, H.-R. et al. | 2015
- 223
-
A Trie-Based Approach to Fast and Scalable Flow Recognition for OpenFlowShen, T. / Zhang, D. / Li, Y. / Li, G. et al. | 2015
- 231
-
Accelerate Packet Classification Using GPU: A Case Study on HiCutsZheng, J. / Zhang, D. / Li, Y. / Li, G. et al. | 2015
- 239
-
Time Division Broadcasting Scheme for Congestion Control in Vehicle-to-Vehicle CommunicationChang, S.-w. / Cao, S. / Lee, S.-s. et al. | 2015
- 245
-
Approximating Dependency for Efficient Multi-label Feature SelectionLim, H. / Lee, J. / Kim, D.-W. et al. | 2015
- 251
-
Investigating Relation of Music Data: Emotion and Audio SignalsLee, J. / Jo, J.-H. / Lim, H. / Chae, J.-H. / Lee, S.-U. / Kim, D.-W. et al. | 2015
- 257
-
An Approach to Develop Architecture of ARINC653-Based Avionic SoftwareWang, L. / Ma, D. / Zhao, Y. / Zhao, X. / Wang, Y. et al. | 2015
- 263
-
Personal Information Access Control Scheme for Secure NFC Integrated PaymentKang, J. / Kim, K. / Suk, S. et al. | 2015
- 269
-
Light-Weight Distance-Bounding Mutual Authentication Security Scheme for Group Sensor ManagementKim, H. / Jun, M. / Kim, J. et al. | 2015
- 275
-
EEG Analysis by Pupil MovementsChong, U. et al. | 2015
- 281
-
Enhanced Direct Mode Coding for Bi-predictive PicturesYan, B. / Liu, D. et al. | 2015
- 287
-
Error Resilient Dual Frame Motion Compensation with Uneven Quality ProtectionLiu, D. / Wang, L. / Xu, L. / Yang, Z. / Zhang, J. et al. | 2015
- 293
-
Multi-view with Extended Dual Frame Motion CompensationLiu, D. / Wang, L. / Liu, Y. / Zhang, P. / Wu, Y. et al. | 2015
- 299
-
The Method of Estimating of Frequency of the Harmonic Trend in Measuring SignalChye, E.U. / Levenets, A. et al. | 2015
- 305
-
Discrete-Analog Haar Wavelet Filter for Real Time ApplicationsChye, E.U. / Antonov, R. / Ivanov, V. et al. | 2015
- 311
-
Hardware Architecture for Real-Time Face Detection on Embedded Analog Video CamerasKim, M. / Kim, K.-Y. et al. | 2015
- 317
-
The Issue of Data Transfer for the Embedded SE on Mobile DevicesJu, H. / Jeon, Y. / Kim, J. et al. | 2015
- 323
-
Ways of Improving the Acoustic-Emission Method of Investigation of Properties of Ceramic MaterialsOvcharuk, V.N. et al. | 2015
- 329
-
Experience in Application of New Methods for Analyzing the Properties of Acoustic Emission Ceramic Materials and ProductsOvcharuk, V.N. / Chye, E.U. et al. | 2015
- 335
-
Self-certified Privacy-Preserving Scheme for Vehicle-to-Vehicle CommunicationsCho, K. / Lee, B.-G. / Lee, D.H. et al. | 2015
- 343
-
Implementation of Side Channel Analysis Evaluation Boards for Cryptographic Software of Embedded SystemsChoi, Y. / Choi, D. / Ryu, J. et al. | 2015
- 349
-
Robust Control for Multimedia TCP/AQM Flows Case StudyEremin, E.L. / Okhotnikov, S.S. / Telichenko, D.A. et al. | 2015
- 355
-
The Effects of Multiple Scattering on Performance of Ballistic Channel Strained-Si DiodesGhupur, Y. / Geni, M. / Mamat, M. / Abudureheman, A. et al. | 2015
- 361
-
Texture Extraction from Video and Image Warping for AR Coloring BookLee, Y. / Choi, J. et al. | 2015
- 367
-
Framework for Evaluation of Information Systems Utilization and Its Application in the ROK-MNDKim, S. / Lee, H. / Kwon, H. / Lee, S. et al. | 2015
- 373
-
Compensation of Directional and Rotational Mismatch of Separate Stereo Cameras by Vanishing Point and LinesBang, M.-S. / Jung, G.-H. / Kang, D.-W. / Jung, K.-H. et al. | 2015
- 379
-
Symmetric Key-Based Authentication and the Session Key Agreement Scheme in IoT EnvironmentPark, N. / Kim, M. / Bang, H.-C. et al. | 2015
- 385
-
Design for Most Compatible Booting Model of Integrated Memory-Disk Based on ARM LinuxJo, Y.-J. / Nam, S.-J. / Ko, S.-H. / Kim, S.-D. et al. | 2015
- 391
-
Designing a Smart Multisensor Framework Based on Beaglebone Black BoardChianese, A. / Piccialli, F. / Riccio, G. et al. | 2015
- 399
-
Calculation of CO2 Exhausting Volumes by EMME/3 Program SimulationJin, J. et al. | 2015
- 405
-
Implementing a Touch Projection System That Is Not Dependent on Sensor PositionCho, S. / Um, K. / Jung, S.-W. / Cho, K. et al. | 2015
- 411
-
Secure Filesystem for Trusted Virtual Domain in Mobile DevicePark, S.-W. / Lee, D.G. / Kim, J.N. et al. | 2015
- 419
-
A Middleware for Developing Context-Aware Mobile Applications in Low-Cost Acquisition DevicesPinheiro, D.N. / Teles, A.S. / de Tacio Pereira Gomes, B. / da Silva e Silva, F.J. et al. | 2015
- 425
-
Personalized Information Gathering Using Implicit User Feedback in a Multiple Personal Device EnvironmentJeon, H. et al. | 2015
- 437
-
Rich-Media Technologies and Their Using in Crisis Management CommunicationMartinik, I. et al. | 2015
- 443
-
Effective Purchase Pattern Mining with Weight Based on FRAT Analysis for Recommender in e-CommerceCho, Y.S. / Kim, K.A. / Moon, S.C. / Park, S.H. / Ryu, K.H. et al. | 2015
- 455
-
Voice Control of Technical Functions in Smart Home with KNX TechnologyVanus, J. / Smolon, M. / Koziorek, J. / Martinek, R. et al. | 2015
- 463
-
Development of IR MEMS Sensor Connected to Smart Phone via Earphone JackShin, G.-w. / Kim, Y.-h. / Lee, Y.-h. et al. | 2015
- 469
-
Implementation of a Conditional Searchable Encryption System for Data StorageRahman, D.A. / Heng, S.-H. / Yau, W.-C. / Tan, S.-Y. et al. | 2015
- 475
-
Formal Specification of Malware Models in the Form of Colored Petri NetsJasiul, B. / Szpyrka, M. / Sliwa, J. et al. | 2015
- 483
-
Semantic Description of the Context of the Service CallSliwa, J. / Gleba, K. et al. | 2015
- 491
-
Automatic Identification of Spatio-temporal Highway Congestion Patterns Using Historic DatabasePark, E. / Oh, H. et al. | 2015
- 499
-
Definition of Attack in the Context of Low-Level Interaction Server HoneypotsSokol, P. / Zuzcak, M. / Sochor, T. et al. | 2015
- 505
-
Practical Biometrics On-Card Matching for Remote User Authentication Using Smart CardsWong, K.-S. / Kang, M. / Lee, S. / Kim, M.H. et al. | 2015
- 511
-
Quantifying Overt Hardware Attacks: Using ART SchemaMoein, S. / Gebali, F. et al. | 2015
- 517
-
Linear and Differential Properties of Randomly Generated DES-Like Substitution BoxesAlSalami, Y. / Martin, T. / Yeun, C. et al. | 2015
- 525
-
Modelling of APGAS Programming Systems with Using of P/T Petri Process NetsMartinik, I. et al. | 2015
- 533
-
A Semantic Social Bookmarking System Based on a Wiki-Like ApproachSanna, G. / Angius, A. / Concas, G. / Manca, D. / Pani, F.E. et al. | 2015
- 539
-
A Kanban-Based Methodology to Define Taxonomies and Folksonomies in KMSBuschettu, A. / Concas, G. / Pani, F.E. / Sanna, D. et al. | 2015
- 545
-
Research on Development Stage of Service Model in Big Data IndustryYoo, S. / Choi, K. et al. | 2015
- 555
-
Robust link-Oriented Routing Protocol (ROR) for Vehicular Ad Hoc NetworksKim, S.-i. / Kahng, H.K. / Cheung, S. et al. | 2015
- 567
-
Wireless Chest-Based ECG BiometricsDerawi, M. et al. | 2015
- 581
-
Development of a Visualisation Software, Implemented with Comfort Smart Home Wireless Control SystemVanus, J. / Kucera, P. / Koziorek, J. / Machacek, Z. / Martinek, R. et al. | 2015
- 591
-
De-word Classification Algorithm Based on the Electric Power of Large Data Library RetrievalGuo, X. / Sun, H. / Wang, L. / Qu, Z. / Ding, W. et al. | 2015
- 603
-
Development of an HMI Evaluation Tool Supporting Test of Interaction with IoT-Based SystemsLee, Y. / Lee, S. et al. | 2015
- 615
-
Multi-Focus Image Fusion by Using a Pixel-Based SML Comparison MapLee, S.-H. / Jung, K.-H. / Kang, D.-W. et al. | 2015
- 623
-
Performance Analysis of Matching Cost for Stereo Matching with CUDAHong, G.-S. / Hoe, W. / Kim, B.-G. et al. | 2015
- 631
-
Application Research of University Decision Support System Based on Data WarehouseGao, L. / Chen, Y. et al. | 2015
- 639
-
A Rapid Development Framework of Enterprise Information System Based on Components and JavaEEWarig, Z. et al. | 2015
- 647
-
DynamoRIO-Based Malware Detection System under 10G Network EnvironmentXiong, Y. / Wu, S. / Zhang, T. / Deng, Y. / Liu, W. / Xu, Y. et al. | 2015
- 655
-
Category-Based an Intelligent Search System Using a Variety of Recommendation DataKim, K.-Y. / Jeong, S.-Y. / Jung, Y.-I. / Lee, S.-H. et al. | 2015
- 661
-
Efficient Evaluation of Window Join Aggregates in Data Stream ProcessingYu, Y.W. / Kim, H.G. et al. | 2015
- 669
-
Cost Analysis of Time-Slide Window JoinsKim, H.G. et al. | 2015
- 677
-
TAC Reconfiguration for Paging Optimization in LTE-Based Mobile Communication SystemsKang, H.-W. / Koh, S.-J. / Lim, S.-K. / Kang, T.-G. et al. | 2015
- 683
-
A Testing and Treatment System Model for Unilateral Neglect Patient Based on Visual Feedback TrainingLee, H. / Lee, H.-G. / Yang, S.-M. / Hong, J.-H. et al. | 2015
- 691
-
Security Issues on Smarthome in IoT EnvironmentYoon, S. / Park, H. / Yoo, H.S. et al. | 2015
- 697
-
Extraction of Object Position Information Using the Natural Image MarkerPark, K.-J. / Moon, M.-S. / Lee, K.-J. et al. | 2015
- 705
-
Energy-Aware GPU-RAID Scheduling for Reducing Energy Consumption in Cloud Storage SystemsPirahandeh, M. / Kim, D.-H. et al. | 2015
- 713
-
Meanshift Segmentation Guided Spatially Adaptive Histogram EqualizationKunnath, N.X. / Lee, S.-H. et al. | 2015
- 719
-
Three-Dimensional Target Recognition under Photon-Starved Conditions Using Photon Counting Axially Distributed Sensing and Nonlinear CorrelationCho, M. et al. | 2015
- 725
-
Cache View Based Top-k Query Processing for Encrypted Data AnalysisJang, M. / Cho, A. / Chang, J. et al. | 2015
- 731
-
Interactive Mobile Learning Environment for Processing Computational Science Simulation TaskPark, S.-R. / Lee, J.R. / Cho, K.W. et al. | 2015
- 737
-
An Optimal Recovery Time Method in Cloud ComputingHung, P.P. / Bui, T.-A. / Huh, E.-N. et al. | 2015
- 747
-
Design of Interaction Coordination in Electric Vehicle Information Service FrameworksLee, J. / Park, G.-L. et al. | 2015
- 751
-
Tag Interference Based Mobile Object Tracking with Passive UHF RFID SystemChoi, J.S. / Kang, W.S. / Son, C.S. / Son, B.R. / Lee, D.H. et al. | 2015
- 759
-
Privacy Protection of Medical Imagery Using Reversible WatermakingLee, H.-Y. / Kim, S. et al. | 2015
- 759
-
Privacy Protection of Medical Imagery Using Reversible WatermarkingLee, Hae-Yeoun / Kim, Sunmyeng et al. | 2015
- 765
-
A Flexible Page Storage Model for Mixed OLAP and OLTP WorkloadsPark, K. / Mai, H.T. / Lee, M. / Won, H.S. et al. | 2015
- 771
-
Cooperative Communication Protocol Based on EDCA in IEEE 802.11e WLANsKim, S. / Lee, H.-Y. et al. | 2015
- 777
-
Data Processing Framework for Electric Vehicle-Generated Streams Using HadoopLee, J. / Park, G.-L. / Cho, Y.-I. / Kim, H. / Koh, Y. / Kang, M.-J. / Kwak, H.-Y. / Lee, S. et al. | 2015
- 783
-
Efficient Indexing for OLAP Query Processing with MapReduceKang, W.L. / Kim, H.G. / Lee, Y.J. et al. | 2015
- 789
-
Exploring Millennial Generation Behavior of Gamification Contents Converging with ICT and Sharing Economy: Hierarchical Clustering AnalysisChoi, J.W. / Lee, J.H. / Kim, K.Y. et al. | 2015
- 795
-
A Study of Burst Transfer GenerationCho, J. / Cho, D. / Ko, K. / Paek, Y. / Youn, J. et al. | 2015
- 803
-
Mitigation of Selfish Carrier-Sense Behavior in Wi-Fi NetworksChoi, J. et al. | 2015
- 809
-
The Real-Time Monitoring System of Social Big Data for Disaster ManagementChoi, S. / Bae, B. et al. | 2015
- 817
-
MAST: Multi-Level Associated Sector Translation for NAND Flash Memory-Based Storage SystemKim, J. / Kang, D.H. / Ha, B. / Cho, H. / Eom, Y.I. et al. | 2015
- 823
-
Remote-Launch: Borrowing Secure TCB for Constructing Trustworthy Computing PlatformKim, J. / Kim, T. / Kim, I. / Min, C. / Eom, Y.I. et al. | 2015
- 831
-
Human Action Recognition Using Product Manifold Theory and Procrustes Shape AnalysisCho, W. / Kang, S. / Kim, S. / Park, S. et al. | 2015
- 837
-
Zombie PC Detection and Treatment Model on Software-Defined NetworkBae, H.-B. / Park, M.-W. / Kim, S.-H. / Chung, T.-M. et al. | 2015
- 845
-
Design and Implementation of System for Assets and Insolvency Prediction Applied to Industries Based on AHP and Forensic ReadinessKim, J. / Son, Y. / Chung, M. et al. | 2015
- 851
-
Profiling-Based Energy-Aware Recommendation System for Cloud PlatformsAmin, M.B. / Hussain, S. / Han, M. / Kang, B.H. / Ik, Y.Y. / Jun, S. / Lee, S. et al. | 2015
- 861
-
Path Information Based Packet Verification for Authentication of SDN Network ManagerLee, J. / Park, M.-w. / Chung, T.-m. et al. | 2015
- 867
-
Detection Methods for Disaster by Lexical PatternsBae, B. / Ko, M. / Choi, S. et al. | 2015
- 875
-
GUI Programming Scheme for Low Storage Usage in Lightweight. Computing EnvironmentHong, W.-K. / Yoon, S. / Cha, K.-A. et al. | 2015
- 883
-
The Right to be Forgotten: Standard on Deleting the Exposed Personal Information on the InternetLee, H.J. / Yun, J.H. / Yoon, H.S. / Lee, K.H. et al. | 2015
- 891
-
Position Estimation of Multiple Light Sources for Augmented RealityLiu, Y. / Kwak, Y.S. / Jung, S.K. et al. | 2015
- 899
-
A Testing Method for AUTOSAR Software Components Using Virtual Prototyping by Modification of OSEK Operating SystemRyu, H. / Jeong, S. / Lee, W.J. et al. | 2015
- 907
-
A Compensation-Based Cooperative Mechanism to Improve the Performance of IEEE 802.11 WLANsOh, H. / Ahn, S. et al. | 2015
- 913
-
RUDP Design and Implementation Using OPNET SimulationHuh, J.-H. / Seo, K. et al. | 2015
- 921
-
Provisioning Virtual Infrastructure to Cloud Service Consumer in Perspective of Brokering VM PlacementLee, J. / Kim, J. / Kang, D. et al. | 2015
- 927
-
Method of Graph Node Fusion and Its Application on Bus Information SystemsYim, J. / Han, C. et al. | 2015
- 933
-
Tracking Model for Abnormal Behavior from Multiple Network CCTV Using the Kalman FilterYoon, Y.-I. / Chun, J.-A. et al. | 2015
- 941
-
Application Authentication and Secure Key Management Scheme Using MTMHan, J.-H. / Jeon, Y. / Kim, J. et al. | 2015
- 947
-
Energy Saving Mechanism for Web ServicesJang, S. / On, J. / An, B. / Lee, B. / Jun, S. et al. | 2015
- 953
-
Awareness Home Automation System Based on User Behavior through Mobile SensingMafrur, R. / Muthohar, M.F. / Bang, G.H. / Lee, D.K. / Choi, D. et al. | 2015
- 961
-
A Brokering Service Design for Vehicle-To-Grid Electricity TradesLee, J. / Park, G.-L. et al. | 2015
- 967
-
Fractional Frequency Reuse (FFR) Based Overlap Resource Power Control for Interference Mitigation in an LTE-Advanced Network with Device-to-Device CommunicationChhorn, S. / Seo, S.-o. / Kim, S.-Y. / Lee, K.-H. / Cho, C.-h. et al. | 2015
- 975
-
A Repeated Non-Cooperative Game Theoretic Approach to Energy-Efficiency of Cellular NetworksJiao, Y. / Joe, I. et al. | 2015
- 983
-
On QoS Provisioning Based on User Mobility Patterns for Proxy Mobile IPv6 NetworksChoi, J.-Y. / Yang, S. / Jeong, J. et al. | 2015
- 991
-
Design of an Android App for Gyeongju Smart TourismPark, B. / Yim, J. et al. | 2015
- 997
-
IO Cost Evaluation of OLAP Query Processing with MapReduceKang, W.L. / Kim, H.G. / Lee, Y.J. et al. | 2015
- 1003
-
A Two-Layer Cluster Head Selection Based on Distance in Wireless Sensor NetworksLee, S.-L. / Park, J. / Shon, J.G. et al. | 2015
- 1009
-
The Dynamic Group Authentication Scheme for P2P Based Mobile CommerceYun, S. / Lim, H. et al. | 2015
- 1017
-
Stable HPC Cluster Management Scheme through Performance EvaluationYoon, J. / Hong, T. / Park, C. / Yu, H. et al. | 2015
- 1025
-
Effects on Mapping the VCPUs to the Physical CPUs in Para-VirtualizationLyoo, T. / Choi, H. / Kang, J. / Lim, J. / Jung, D. / Song, S. / Gil, J.-M. / Chung, K.-S. / Yu, H. et al. | 2015
- 1031
-
Development of Teaching-Learning Model with Project-Based Learning Using Smart Learning Contents Authoring ToolBae, J.-H. / Lee, H. et al. | 2015
- 1037
-
Digital Forensic Analysis on Window8 Style UI Instant Messenger ApplicationsLee, C. / Chung, M. et al. | 2015
- 1043
-
Smart Emergency Rescue System Based on Biometric AuthenticationYun, S. / Jung, H. et al. | 2015
- 1049
-
A Study on Diffusion Dynamics of Intelligence-Driven Cloud Solutions in Law Enforcement AuthoritiesNasridinov, A. / Marakhimov, A. / Park, Y.-H. et al. | 2015
- 1055
-
A Structural Synthesis of Information Computer Networks of Automated Control Systems Based on Genetic AlgorithmsMarakhimov, A.R. / Siddikov, I.H. / Nasridinov, A. / Byun, J.-Y. et al. | 2015
- 1065
-
A Music Recommendation Method with Emotion Recognition Using Ranked AttributesPark, S.-H. / Ihm, S.-Y. / Jang, W.-I. / Nasridinov, A. / Park, Y.-H. et al. | 2015
- 1071
-
Research of Object Recognition and Tracking Based on Feature MatchingAhn, H. / Rhee, S.-B. et al. | 2015
- 1077
-
Test-Sheet Composition Using Genetic Algorithm for Controlling Item ExposureKim, B.W. / Shon, J.G. et al. | 2015
- 1085
-
The Implementation of Defect Detector Using Efficient Thresholding MethodPak, M. / Park, J. / Kim, S. et al. | 2015
- 1093
-
Evaluation of the Synchronous Mobile Learning System Supporting Tablets for Instructor and StudentLee, J.H. et al. | 2015
- 1101
-
On Designing an Effective Training Set for Information ExtractionKim, Y.-M. / Song, S.-k. / Shin, S. / Seon, C.-N. / Hong, S. / Jung, H. et al. | 2015
- 1109
-
Application of SNS for a Satisfaction Analysis of School MealsHwang, M. / Yeom, H.-n. / Hwang, M.-N. / Jung, H. / Kim, H.J. et al. | 2015
- 1117
-
Real-Time Vision Based Camera Moving and Displacement Detection AlgorithmJeong, H.-J. / Ha, Y.-G. et al. | 2015
- 1123
-
Prescriptive Analytics for Planning Research-Performance StrategyCho, M. / Song, S.-K. / Weber, J. / Jung, H. / Lee, M. et al. | 2015
- 1131
-
XOnto-Apriori: An Effective Association Rule Mining Algorithm for Personalized Recommendation SystemsGim, J. / Jung, H. / Jeong, D.-H. et al. | 2015
- 1139
-
MapReduce-Based Bulk-Loading Algorithm for Fast Search for Billions of TriplesUm, J.-H. / Lee, S. / Kim, T.-H. / Jeong, C.-H. / Seo, K. / Park, J. / Jung, H. et al. | 2015
- 1147
-
Inspecting Retrieval Engines Based on Term's WeightSong, S.-k. / Shin, S. / Kim, Y.-M. / Seon, C.-N. / Hong, S. / Jung, H. et al. | 2015
- 1153
-
An Enhanced Signal-Driven PMIPv6 for Distributed Mobility ControlKong, K.-S. et al. | 2015
- 1159
-
Unconstrained Continuous Infants Monitoring System Based on Mattress-Type Force Sensing Platform: A Pilot StudyShin, H. / Choi, H. / Park, S. et al. | 2015
- 1167
-
Preliminary Study for Driver's Posture Correction Support System Based on Seat-Embedded Pressure Sensing PlatformShin, H. / Kim, K. / Son, J. / Kim, M. et al. | 2015
- 1175
-
A Congestion Degree Index Based Bandwidth Estimation Method Using Pair Packet DelayPark, J.-s. / Park, B.-y. / Kim, S.-h. / Cho, G.-h. et al. | 2015
- 1181
-
International Research Networking of KRLight Supporting Data-Intensive ScienceCho, B. / Lee, W. / Chung, J.-w. et al. | 2015
- 1189
-
Design of National Research Network for Strengthening of Supporting an Advanced Research ActivitiesLee, W. / Cho, B. / Ahn, S. et al. | 2015
- 1195
-
Deployment Status of Global and Domestic WiFi Roaming Technology in KoreaWang, G. / Cho, J. / Kim, D. / Kim, S. et al. | 2015
- 1201
-
Analysis on Study Trend and Technical Feature of Software-Defined NetworkingPark, J. / Cho, H. / Gil, J.-M. / Yun, B.-J. et al. | 2015
- 1209
-
Design and Construction of Sinknet for KREONET Attack DetectionCho, J. / Kim, S. / Cho, H. / Cho, G. et al. | 2015
- 1215
-
Depth Image Based System for Notifying Human Keeping Appropriate Distance from Screen - ImplementChen, Y.-H. / Wang, J.-w. et al. | 2015
- 1225
-
A Framework for Continuous Real-Time Collaborative EditingJoe, I. / Lee, S. et al. | 2015
- 1233
-
A Robust Faint Situation Recognition and Response System Based on Object Tracking Algorithms Using Thermal CameraLee, J. / Jiang, X. / Hong, K. et al. | 2015
- 1245
-
Strong Identification and Authentication Using Dynamic Biometric SignatureSmejkal, V. / Kodl, J. / Novak, D. / Schneider, J. et al. | 2015
- 1253
-
An Implementation of Automatic Software Testing on Cloud Computing EnvironmentKoong, C.-S. / Yang, T.-I. / Wu, C.-C. et al. | 2015
- 1261
-
Exchangeable Humanoid Animation Using H-Anim and Motion Capture DataLee, M.W. / Jung, C.H. / Lee, M. / Brutzman, D. et al. | 2015
- 1271
-
Wearable Computing Connecting Gas Sensor to Detector Harmful Air - ImplementChen, Y.-H. / Wang, J.-W. et al. | 2015
- 1281
-
The Non-linear Relationship between Economic and Life Insurance Development in Asia: A Panel Threshold Regression AnalysisYang, S.-Y. / Li, H.-A. / Fang, H.-C. et al. | 2015
- 1291
-
Comparative Study of Singing Voice Detection MethodsYou, S.D. / Wu, Y.-C. et al. | 2015
- 1299
-
A Feature Selection Technique for Hand Gesture Recognition in Music Display SystemLee, J.-Y. / Kim, J.-Y. / Min, J.-S. / Kim, H.-J. et al. | 2015
- 1307
-
An Approach for Applying Social Networks Information to Information RecommendationKim, Y. / Lee, M. et al. | 2015
- 1315
-
Preference Measurement Using User Response ElectroencephalogramKim, Y. / Kang, K. / Lee, H. / Bae, C. et al. | 2015
- 1325
-
Development of ISMEE: An Information Security Management Engineering EnvironmentSuhaimi, A.I.H. / Bao, D. / Goto, Y. / Cheng, J. et al. | 2015
- 1331
-
Usefulness of ISMEE for Supporting Organizations with ISMSsSuhaimi, A.I.H. / Bao, D. / Chen, H. / Cheng, J. et al. | 2015
- 1337
-
Novel Key Management for Secure Information of Ubiquitous Healthcare Domains to APT AttackKim, D. / Soh, W. / Kim, S. et al. | 2015
- 1345
-
A Model for a Physical and Virtual Environment for Extreme Feedback in the Development of the Metacognition Supported by TICS: The Computer Engineer Career as Case of StudyLevano, M. / Fernandez, C. et al. | 2015
- 1353
-
Predicting New Attacks for Information SecurityBao, D. / Goto, Y. / Cheng, J. et al. | 2015
- 1359
-
A Supporting Environment for IT System Security Evaluation Based on ISO/IEC 15408 and ISO/IEC 18045Chen, H. / Bao, D. / Goto, Y. / Cheng, J. et al. | 2015
- 1367
-
Cryptanalysis of Advanced Biometric-Based User Authentication Scheme for Wireless Sensor NetworksChoi, Y. / Nam, J. / Lee, Y. / Jung, S. / Won, D. et al. | 2015
- 1377
-
A MapReduce-Based Algorithm for Nearest Neighbor Search with KeywordsKim, D. / Youn, H.Y. / Kim, U.-M. et al. | 2015
- 1385
-
A Method for Distinguishing between Shopper's Intentions: Whether Their Purchase Is ``Planned Buying'' or ``Impulse Buying'' Utilizing the Shopper's Behavior Process ModelTokudome, S. / Muramatsu, S. / Yoshida, K. / Kobayashi, K. / Shirahama, H. / Nakajima, M. / Hashimoto, H. / Suzuki, S. et al. | 2015
- 1395
-
A New Antenna Selection Algorithm for Indoor Distributed Antenna Systems EnvironmentShi, Z. / Zhang, C. / Zhao, Y. / Huang, L. / Chang, Y.-C. et al. | 2015
- 1401
-
An Emotion Assessment Method Based on Supported Vector Data DescriptionWu, Q. / Zhou, H. / Zhou, Y. et al. | 2015
- 1407
-
Improved Mean Representation Based Classification for Face RecognitionFeng, Q. / Pan, T.-S. / Pan, J.-S. / Tang, L.-L. et al. | 2015
- 1413
-
Functional Considerations in Military-Grade Security Platform Using a Mobile HypervisorLim, K.-S. / Park, S.-W. / Kim, J.-N. / Lee, D.-G. et al. | 2015