A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques (English)
- New search for: Wu, H.-C.
- New search for: Yeh, C.-P.
- New search for: Tsai, C.-S.
- New search for: Wu, H.-C.
- New search for: Yeh, C.-P.
- New search for: Tsai, C.-S.
- New search for: Gavrilova, Marina L.
In:
International Conference on Computational Science and its Applications
;
406-415
;
2006
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:A Semi-fragile Watermarking Scheme Based on SVD and VQ Techniques
-
Contributors:
-
Conference:International Conference on Computational Science and its Applications ; 2006 ; Glasgow
-
Published in:LECTURE NOTES IN COMPUTER SCIENCE ; 3982 ; 406-415
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin
-
Publication date:2006-01-01
-
Size:10 pages
-
Remarks:Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Resource Demand Prediction-Based Grid Resource Transaction Network Model in Grid Computing EnvironmentKim, I. K. / Lee, J. S. et al. | 2006
- 1
-
A Security Requirement Management Database Based on ISO/IEC 15408Morimoto, S. / Horie, D. / Cheng, J. et al. | 2006
- 10
-
A CGM Algorithm Solving the Longest Increasing Subsequence ProblemSeme, D. et al. | 2006
- 11
-
Development of Committee Neural Network for Computer Access Security SystemAnagun, A. S. et al. | 2006
- 21
-
C-TOBI-Based Pitch Accent Prediction Using Maximum-Entropy ModelKim, B. / Lee, G. G. et al. | 2006
- 22
-
Computer Assisted Source-Code ParallelisationVidler, P. J. / Pont, M. J. et al. | 2006
- 31
-
Design and Fabrication of Security and Home Automation SystemKim, E. S. / Kim, M. S. et al. | 2006
- 32
-
A Template Language for Agent ConstructionXiaohong, L. / Zhiyong, F. / tie, L. / Li, L. et al. | 2006
- 38
-
PGNIDS(Pattern-Graph Based Network Intrusion Detection System) DesignLee, B.-k. / Yang, S.-h. / Kwon, D.-H. / Kim, D.-Y. et al. | 2006
- 39
-
Efficient Parallel Processing for K-Nearest-Neighbor Search in Spatial DatabasesGao, Y. / Chen, L. / Chen, G. / Chen, C. et al. | 2006
- 48
-
Experiments and Hardware Countermeasures on Power Analysis AttacksAhn, M. / Lee, H. et al. | 2006
- 49
-
An Adaptive Mobile System Using Mobile Grid Computing in Wireless NetworkOh, J. / Lee, S. / Lee, E. et al. | 2006
- 54
-
Information System Modeling for Analysis of Propagation Effects and Levels of DamageKim, I. / Chung, Y. / Lee, Y. / Im, E. G. / Won, D. et al. | 2006
- 58
-
Comparison of Allocation Algorithms for Mesh Structured Networks with Using Multistage SimulationKoszalka, L. / Lisowski, D. / Pozniak-Koszalka, I. et al. | 2006
- 64
-
A Belt-Zone Method for Decreasing Control Messages in Ad Hoc NetworksKim, Y. / Jung, J. / Lee, S. / Kim, C. et al. | 2006
- 68
-
The Election Problem in Asynchronous Distributed Systems with Bounded Faulty ProcessesPark, S. et al. | 2006
- 73
-
A VLSM Address Management Method for Variable IP SubnettingCheon, S. / Jin, D. / Kim, C. et al. | 2006
- 78
-
Improving the Genetic Algorithms Performance in Simple Assembly Line BalancingTasan, S. O. / Tunali, S. et al. | 2006
- 84
-
SDSEM: Software Development Success Evolution ModelKim, H.-K. / Byun, S.-Y. et al. | 2006
- 88
-
Reformulation and Solution Approaches for an Integrated Scheduling ModelJodlbauer, H. / Reitner, S. / Weidenhiller, A. et al. | 2006
- 93
-
A Robust Routing Protocol by a Substitute Local Path in Ad Hoc NetworksWu, M. / Jung, S. / Lee, S. / Kim, C. et al. | 2006
- 98
-
Safety of a Client-Based Version Vector Consistency Protocol of Session GuaranteesBrzezinski, J. / Sobaniec, C. / Wawrzyniak, D. et al. | 2006
- 104
-
Power Efficient Wireless LAN Using 16-State Trellis-Coded Modulation for Infrared CommunicationsKim, H. G. et al. | 2006
- 108
-
A New I/O Architecture for Improving the Performance in Large Scale ClustersGarcia, L. M. S. / Isaila, F. D. / Carballeira, F. G. / Perez, J. C. / Rabenseifner, R. / Adamidis, P. et al. | 2006
- 115
-
The Design and Implementation of Real-Time Environment Monitoring Systems Based on Wireless Sensor NetworksJung, K.-H. / Lee, S.-C. / Hwang, H.-S. / Kim, C.-S. et al. | 2006
- 118
-
Performance Modeling of a Fully Adaptive and Fault-Tolerant Wormhole Switching Strategy in 2-D MeshSafaei, F. / Fathy, M. / Khonsari, A. / Ould-Khaoua, M. et al. | 2006
- 125
-
Ontology-Based Information Search in the Real World Using Web ServicesHwang, H.-S. / Park, K.-S. / Kim, C.-S. et al. | 2006
- 129
-
Parallelization of Simulations for Various Magnetic System Models on Small-Sized Cluster Computers with MPISchurz, F. / Fey, D. / Berkov, D. et al. | 2006
- 134
-
An Active Node Set Maintenance Scheme for Distributed Sensor NetworksByun, T.-Y. / Kim, M. / Hwang, S. / Jeon, S.-E. et al. | 2006
- 139
-
A New Reflective and Reliable Context-Oriented Event Service Architecture for Pervasive ComputingSong, S. K. / Youn, H. Y. / Kim, U. et al. | 2006
- 144
-
Intelligent Information Search Mechanism Using Filtering and NFC Based on Multi-agents in the Distributed EnvironmentYi, S. / Gerardo, B. D. / Lee, Y.-S. / Lee, J. et al. | 2006
- 149
-
X-Torus: A Variation of Torus Topology with Lower Diameter and Larger Bisection WidthGu, H. / Xie, Q. / Wang, K. / Zhang, J. / Li, Y. et al. | 2006
- 154
-
Network Anomaly Behavior Detection Using an Adaptive Multiplex DetectorKim, M. / Seo, J. et al. | 2006
- 158
-
Feedback Vertex Sets in Rotator GraphsHsu, C.-C. / Lin, H.-R. / Chang, H.-C. / Lin, K.-K. et al. | 2006
- 163
-
Applying Product Line to the Embedded SystemsKim, H.-K. et al. | 2006
- 165
-
Efficient Longest Common Subsequence Computation Using Bulk-Synchronous ParallelismKrusche, P. / Tiskin, A. et al. | 2006
- 172
-
Enhanced Fuzzy Single Layer Learning Algorithm Using Automatic Tuning of ThresholdKim, K.-B. / Lee, B.-K. / Kim, S.-H. et al. | 2006
- 175
-
Simulation of Internet Transport Protocols for High Bandwidth-Delay NetworksLee, J. et al. | 2006
- 178
-
Optimization of Location Management in the Distributed Location-Based Services Using Collaborative AgentsMateo, R. M. A. / Lee, J. / Yang, H. et al. | 2006
- 185
-
Performance Evaluation of Parallel Systems Employing Roll-Forward Checkpoint SchemesPark, G.-L. / Youn, H. Y. / Lee, J. / Kim, C. S. / Lee, B. / Lee, S. J. / Song, W.-C. / Byun, Y.-C. et al. | 2006
- 188
-
Design of H.264/AVC-Based Software Decoder for Mobile PhoneJeon, H.-S. / Noh, H.-M. / Yoo, C.-J. / Chang, O.-B. et al. | 2006
- 192
-
A Purely Distributed Approach for Coupling Scientific and Engineering ApplicationsBerbegall, V. / Drummond, L. A. / Verdu, G. / Vidal, V. et al. | 2006
- 198
-
Transforming a Legacy System into ComponentsKim, H.-K. / Chung, Y.-K. et al. | 2006
- 202
-
A Monitoring and Visualization Tool and Its Application for a Network Enabled Server PlatformBolze, R. / Caron, E. / Desprez, F. / Hoesch, G. / Pontvieux, C. et al. | 2006
- 206
-
Pseudorandom Number Generator Using Optimal Normal BasisJang, I. / Yoo, H. S. et al. | 2006
- 213
-
Efficient Nonce-Based Authentication Scheme Using Token-UpdateShi, W. / Yoo, H. S. et al. | 2006
- 214
-
Parallel Hash Join Algorithms for Dynamic Load Balancing in a Shared Disks ClusterMoon, A. / Cho, H. et al. | 2006
- 222
-
An Efficient Management of Network Traffic Performance Using Framework-Based Performance Management ToolChoi, S.-M. / Yoo, C.-J. / Chang, O.-B. et al. | 2006
- 224
-
Towards Reliable and Trustworthy Cooperation in Grid: A Pre-evaluating Set Based Trust ModelQu, X. / Zhong, J. / Yang, X. et al. | 2006
- 234
-
A Prediction Method of Network Traffic Using Time Series ModelsJung, S. / Kim, C. / Chung, Y. et al. | 2006
- 236
-
A Spreading MIMO-OFDM Transmission Scheme for Wireless Mobile EnvironmentPark, S. S. / Hwang, T. J. / Cho, J. / Baik, H. K. et al. | 2006
- 243
-
A Security Auditing Approach Based on Mobile Agent in Grid EnvironmentsXiao, Z. / Huang, C. / Xu, F. et al. | 2006
- 244
-
An Obstacle Avoidence Method for Chaotic Robots Using Angular Degree LimitionsBae, Y. / Lee, M. / Gatton, T. M. et al. | 2006
- 251
-
XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed ComputingPark, N. / Kim, H. / Chung, K. / Sohn, S. / Won, D. et al. | 2006
- 251
-
Intersection Simulation System Based on Traffic Flow Control FrameworkShin, C.-S. / Ahn, D.-I. / Yoe, H. / Joo, S.-C. et al. | 2006
- 260
-
Optimization of a Simulation for 300mm FAB Semiconductor ManufacturingPark, D. / Han, Y. / Lee, C. et al. | 2006
- 261
-
A HIICA(Highly-Improved Intra CA) Design for M-CommerceLee, B.-k. / Kim, C.-m. / Shin, D.-w. / Yang, S.-h. et al. | 2006
- 269
-
Highly Reliable Synchronous Stream Cipher System for Link EncryptionLee, H. et al. | 2006
- 269
-
Performance Analysis Using the Two Kinds of Receiving Gain of Smart Antenna in IS20001X SystemAhn, S. / Kim, M. / Lee, J. et al. | 2006
- 276
-
An Improved Popescu's Authenticated Key Agreement ProtocolYoon, E.-J. / Yoo, K.-Y. et al. | 2006
- 279
-
Recognition of Concrete Surface Cracks Using ART2-Based Radial Basis Function Neural NetworkKim, K.-B. / Yang, H.-K. / Ahn, S.-H. et al. | 2006
- 284
-
SVM Based False Alarm Minimization Scheme on Intrusion Prevention SystemKim, G.-H. / Lee, H.-W. et al. | 2006
- 287
-
Hybrid Image Mosaic Construction Using the Hierarchical MethodKang, O.-H. / Lee, J.-H. / Rhee, Y.-W. et al. | 2006
- 294
-
Lightweight Wireless Intrusion Detection Systems Against DDoS AttackLee, H.-W. et al. | 2006
- 298
-
Public Key Encryption with Keyword Search Based on K-Resilient IBEKhader, D. et al. | 2006
- 303
-
One-Time Password Authentication Scheme Using Smart Cards Providing User AnonymityYoon, E.-J. / Yoo, K.-Y. et al. | 2006
- 309
-
A Generic Construction of Secure Signatures Without Random OraclesLi, J. / Chan, Y.-Y. / Wang, Y. et al. | 2006
- 312
-
Loss Reduction in Distribution Networks Using Cyclic Best First SearchChoi, S.-Y. / Shin, M.-C. / Cha, J.-S. et al. | 2006
- 318
-
A Separation Between Selective and Full-Identity Security Notions for Identity-Based EncryptionGalindo, D. et al. | 2006
- 322
-
Short-Term Power Demand Forecasting Using Information Technology Based Data Mining MethodChoi, S.-Y. et al. | 2006
- 327
-
Traceable Signature: Better Efficiency and BeyondGe, H. / Tate, S. R. et al. | 2006
- 331
-
A Design of the Flexible Mobile Agents Based on WebNa, Y. J. / Ko, I. S. / Han, G. H. et al. | 2006
- 338
-
A Sales Agent Using Case-Based Reasoning and Rule-Based Reasoning for E-Commerce SystemNa, Y. J. / Ko, I. S. / Kwak, J. M. et al. | 2006
- 338
-
On the TYS Signature SchemeJoye, M. / Lin, H.-M. et al. | 2006
- 345
-
Efficient Partially Blind Signatures with Provable SecurityWu, Q. / Susilo, W. / Mu, Y. / Zhang, F. et al. | 2006
- 346
-
A New Ciphering Method Associated with Evolutionary AlgorithmOmary, F. / Mouloudi, A. / Tragha, A. / Bellaachia, A. et al. | 2006
- 355
-
A Framework for Robust Group Key AgreementBohli, J.-M. et al. | 2006
- 355
-
Power Distribution Automation System Using Information Technology Based Web Active DatabaseChoi, S.-Y. et al. | 2006
- 365
-
BGN Authentication and Its Extension to Convey Message CommitmentsChan, Y.-Y. / Li, J. et al. | 2006
- 365
-
Alternative Target Density Functions for Radar ImagingDemirkol, A. et al. | 2006
- 375
-
A Novel Image Restoration Algorithm Based on High-Dimensional Space GeometryCao, W. / Xie, M.-f. / Wang, S. et al. | 2006
- 375
-
New Security Problem in RFID Systems "Tag Killing"Han, D.-G. / Takagi, T. / Kim, H. W. / Chung, K. I. et al. | 2006
- 384
-
A Fast Image Retrieval System Based on Color-Space and Color-Texture FeaturesLin, C.-H. / Chen, K.-H. / Chan, Y.-K. et al. | 2006
- 385
-
A Model for Security Vulnerability PatternKang, H. / Kim, K. / Hong, S. / Lee, D. H. et al. | 2006
- 394
-
Generation of Dynamic Heart Model Based on 4D Echocardiographic ImagesChlebiej, M. / Mikolajczak, P. / Nowinski, K. / Scislo, P. / Bala, P. et al. | 2006
- 395
-
A New Timestamping Scheme Based on Skip ListsBlibech, K. / Gabillon, A. et al. | 2006
- 404
-
Object-Based Image Retrieval Using Dominant Color Pairs Between Adjacent RegionsPark, K. T. / Moon, Y. S. et al. | 2006
- 406
-
A Semi-fragile Watermarking Scheme Based on SVD and VQ TechniquesWu, H.-C. / Yeh, C.-P. / Tsai, C.-S. et al. | 2006
- 412
-
Real-Time Vision Tracking AlgorithmArce-Santana, E. R. / Luna-Rivera, J. M. / Campos-Delgado, D. U. / Pineda-Rico, U. et al. | 2006
- 416
-
New Constructions of Universal Hash Functions Based on Function SumsKhoo, K. / Heng, S.-H. et al. | 2006
- 422
-
Efficient Method to Perform Isomorphism Testing of Labeled GraphsHsieh, S.-M. / Hsu, C.-C. / Hsu, L.-F. et al. | 2006
- 426
-
Analysis of Fast Blockcipher-Based Hash FunctionsStanek, M. et al. | 2006
- 432
-
Camera Motion Parameter Estimation Technique Using 2D Homography and LM Method Based on Projective and Permutation Invariant FeaturesCha, J. / Kim, G. et al. | 2006
- 436
-
Application of LFSRs for Parallel Sequence Generation in Cryptologic AlgorithmsMukhopadhyay, S. / Sarkar, P. et al. | 2006
- 441
-
Automatic Generation Technique of Three-Dimensional Model Corresponding to Individual VesselsLee, N.-Y. / Kim, G.-Y. / Choi, H.-I. et al. | 2006
- 446
-
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential CryptanalysisLee, C. / Kim, J. / Sung, J. / Hong, S. / Lee, S. et al. | 2006
- 450
-
Modulating Energy Distribution of Reflected Light Based on ImagesLi, Z. / Duan, G. / Sun, J. / Sun, L. / Lv, X. et al. | 2006
- 456
-
Design and Implementation of an FPGA-Based 1.452-Gbps Non-pipelined AES ArchitectureAlgredo-Badillo, I. / Feregrino-Uribe, C. / Cumplido, R. et al. | 2006
- 457
-
Aerodynamic Analysis on the Supersonic Separation of Air-Launching Rocker from the Mother PlaneJi, Y. M. / Kim, Y. S. / Lee, J. W. / Byun, Y. H. / Park, J. S. et al. | 2006
- 466
-
Security Weaknesses in Two Proxy Signature SchemesLu, J. et al. | 2006
- 467
-
Effect of Grid Resolution on the Statistics of Passive Scalar in an Injection-Driven ChannelNa, Y. / Shin, D. / Lee, S. et al. | 2006
- 476
-
Test of Large Eddy Simulation in Complex Flow with High Schmidt NumberNa, Y. / Lee, S. et al. | 2006
- 476
-
A Proposal of Extension of FMS-Based Mechanism to Find Attack PathsKim, B.-R. / Kim, K.-C. et al. | 2006
- 484
-
High-End Modeling and Simulation of Cookoff of HMX-Based Energetic MaterialsYoh, J. J.-i. et al. | 2006
- 486
-
Comparative Analysis of IPv6 VPN Transition in NEMO EnvironmentsLim, H.-J. / Lee, D.-Y. / Chung, T.-M. et al. | 2006
- 491
-
Multiobjective Optimization Using Adjoint Gradient Enhanced Approximation Models for Genetic AlgorithmsKim, S. / Chung, H.-S. et al. | 2006
- 497
-
A Short-Lived Key Selection Approach to Authenticate Data Origin of Multimedia StreamKang, N. / Kim, Y. et al. | 2006
- 503
-
Development of Automated Generation Algorithm for Skipped Surface in Die DesignLee, S.-J. / Lee, S.-S. / Kim, J.-H. / Kwon, Y.-J. et al. | 2006
- 507
-
Weakest Link Attack on Single Sign-On and Its Case in SAML V2.0 Web SSOChan, Y.-Y. et al. | 2006
- 512
-
Development of Requirement Driven Design Concept Selection Process in Aerospace SystemPark, H.-U. / Park, M.-Y. / Lee, S.-J. / Lee, J.-W. / Byun, Y.-H. et al. | 2006
- 517
-
An Inter-domain Key Agreement Protocol Using Weak PasswordsLee, Y. / Nam, J. / Won, D. et al. | 2006
- 522
-
A TMO-Based Tele-operation Model: Supporting Real-Time Applications in Grid EnvironmentsKim, C. / Jeong, K. / Lee, H. / Kim, M. / Cho, K. / Jeon, S. / Ahn, J. / Ju, H. et al. | 2006
- 527
-
A Practical Solution for Distribution Rights Protection in Multicast EnvironmentsPegueroles, J. / Fernandez, M. / Rico-Novella, F. / Soriano, M. et al. | 2006
- 531
-
Design Trade-Offs and Power Reduction Techniques for High Performance Circuits and SystemJeong, T. T. / Ambler, A. P. et al. | 2006
- 537
-
Cavitation Flow Analysis of Axisymmetric Bodies Moving in the WaterLee, C. / Byun, D. et al. | 2006
- 537
-
Audit-Based Access Control in Nomadic Wireless EnvironmentsPalmieri, F. / Fiore, U. et al. | 2006
- 546
-
Cost - Time Trade Off Models Application to Crashing Flow Shop Scheduling ProblemsBagherpour, M. / Noori, S. / Sadjadi, S. J. et al. | 2006
- 546
-
Design and Implementation of Semantic Web Search System Using Ontology and Anchor TextCho, N.-d. / Lee, E.-s. et al. | 2006
- 554
-
The ASALB Problem with Processing Alternatives Involving Different Tasks: Definition, Formalization and ResolutionCapacho, L. / Pastor, R. et al. | 2006
- 555
-
Design Progress Management for Security Requirements in Ubiquitous Computing Using COQUALMOLee, E. S. / Lee, S. H. et al. | 2006
- 564
-
Satisfying Constraints for Locating Export Containers in Port Container TerminalsKim, K. H. / Lee, J.-S. et al. | 2006
- 565
-
Web Document Classification Using Changing Training Data SetPark, G. / Kim, S. et al. | 2006
- 574
-
A Price Discrimination Modeling Using Geometric ProgrammingSadjadi, S. J. / Ziaee, M. et al. | 2006
- 575
-
Study on Contents Protection in M-Learning EnvironmentSong, J. / Kang, M. / Kim, S. et al. | 2006
- 581
-
Hybrid Evolutionary Algorithms for the Rectilinear Steiner Tree Problem Using Fitness EstimationYang, B. et al. | 2006
- 584
-
Design of Security Session Reuse in Content-Based Load Distribution ServerKim, S. / Han, K. et al. | 2006
- 590
-
Data Reduction for Instance-Based Learning Using Entropy-Based PartitioningSon, S.-H. / Kim, J.-Y. et al. | 2006
- 591
-
Design of POC System in Ubiquitous EnvironmentKim, S. / Park, G. et al. | 2006
- 600
-
The Performance Evaluation of OFDM/HL-16QAM System for Optimizing Image Transmission Quality in Wireless FadingKwak, J.-m. / Lee, Y.-s. / Cho, S.-e. et al. | 2006
- 600
-
Coordinated Inventory Models with Compensation Policy in a Three Level Supply ChainLee, J. H. / Moon, I. K. et al. | 2006
- 609
-
Reliable Evaluations of URL NormalizationKim, S. J. / Jeong, H. S. / Lee, S. H. et al. | 2006
- 610
-
Using Constraint Satisfaction Approach to Solve the Capacity Allocation Problem for Photolithography AreaChung, S.-H. / Huang, C.-Y. / Lee, A. H.-I. et al. | 2006
- 618
-
Enhanced Misuse Case Model: A Security Requirement Analysis and Specification ModelChoi, S.-s. / Kim, S.-y. / Lee, G.-s. et al. | 2006
- 621
-
Scheduling an R&D Project with Quality-Dependent Time SlotsVanhoucke, M. et al. | 2006
- 626
-
An Analysis of Policy Provisioning Complexity in Accordance with the Application Attributes of the Policy-Based NetworkLim, H.-J. / Kim, M. / Lee, D.-Y. / Chung, T.-M. et al. | 2006
- 631
-
The Bottleneck Tree Alignment ProblemsChen, Y. H. / Tang, C. Y. et al. | 2006
- 635
-
Privacy Preserving Unsupervised Clustering over Vertically Partitioned DataTasoulis, D. K. / Laskari, E. C. / Meletiou, G. C. / Vrahatis, M. N. et al. | 2006
- 638
-
Performance Study of a Genetic Algorithm for Sequencing in Mixed Model Non-permutation Flowshops Using Constrained BuffersFarber, G. / Moreno, A. M. C. et al. | 2006
- 644
-
Process Development Methodology for U-Integrated Management SystemChoi, S.-M. / Lee, M. / Yoo, C.-J. / Chang, O.-B. et al. | 2006
- 649
-
Optimizing Relative Weights of Alternatives with Fuzzy Comparative JudgmentYeh, C.-H. / Chang, Y.-H. et al. | 2006
- 655
-
A Study on Agent-Based Integrated Security Management System for Managing Heterogeneous Firewall SystemsLee, D.-Y. / Lim, H.-J. / Chung, T. M. et al. | 2006
- 659
-
Model and Solution for the Multilevel Production-Inventory System Before Ironmaking in Shanghai Baoshan Iron and Steel ComplexLiu, G. / Tang, L. et al. | 2006
- 665
-
Optimization of Fuzzy Rules: Integrated Approach for Classification ProblemsKang, Y. / Lee, M. / Lee, Y. / Gatton, T. M. et al. | 2006
- 668
-
A Coordination Algorithm for Deciding Order-Up-To Level of a Serial Supply Chain in an Uncertain EnvironmentWang, K.-J. / Chih, W.-H. / Hwang, K. et al. | 2006
- 675
-
A Cooperation Model Using Reinforcement Learning for Multi-agentLee, M. / Lee, J. / Jeong, H.-J. / Lee, Y. / Choi, S. / Gatton, T. M. et al. | 2006
- 678
-
Optimization of Performance of Genetic Algorithm for 0-1 Knapsack Problems Using Taguchi MethodAnagun, A. S. / Sarac, T. et al. | 2006
- 682
-
Development of Network Event Analysis Algorithm Applying Association RuleHan, S. / Soh, W. et al. | 2006
- 688
-
Truck Dock Assignment Problem with Time Windows and Capacity Constraint in Transshipment Network Through CrossdocksLim, A. / Ma, H. / Miao, Z. et al. | 2006
- 690
-
A New Secure Oblivious Transfer ProtocolKim, S.-g. / Kang, H.-j. et al. | 2006
- 698
-
An Entropy Based Group Setup Strategy for PCB AssemblyJeong, I.-J. et al. | 2006
- 700
-
Analysis of Security Session Reusing in Distribution Server SystemKim, T.-h. / Kim, S. / Park, H.-U. / Kim, M.-s. et al. | 2006
- 708
-
Cross-Facility Production and Transportation Planning Problem with Perishable InventoryEksioglu, S. D. / Jin, M. et al. | 2006
- 708
-
Clustered OFDMA in the Multi-path Fading ChannelLee, K. et al. | 2006
- 717
-
Distribution Antenna Diversity System According to Adaptive Correlation Method for OFDM-DS/CDMA in a Frequency Selective Fading ChannelLee, K. / Huh, E. et al. | 2006
- 718
-
A Unified Framework for the Analysis of M/G/1 Queue Controlled by WorkloadLee, H. W. / Lee, S. W. / Seo, W. J. / Cheon, S. H. / Jeon, J. et al. | 2006
- 725
-
MIDAS: Detection of Non-technical Losses in Electrical Consumption Using Neural Networks and Statistical TechniquesMonedero, I. / Biscarri, F. / Leon, C. / Biscarri, J. / Millan, R. et al. | 2006
- 728
-
Tabu Search Heuristics for Parallel Machine Scheduling with Sequence-Dependent Setup and Ready TimesKim, S.-I. / Choi, H.-S. / Lee, D.-H. et al. | 2006
- 735
-
Hyperbolic Voronoi DiagramNilforoushan, Z. / Mohades, A. et al. | 2006
- 738
-
The Maximum Integer Multiterminal Flow ProblemBentz, C. et al. | 2006
- 743
-
Effects of Confinement on Chemical Reaction Equilibrium in Nanoporous MaterialsSmith, W. R. / Lisal, M. / Brennan, J. K. et al. | 2006
- 748
-
Routing with Early Ordering for Just-In-Time Manufacturing SystemsJin, M. / Liu, K. / Eksioglu, B. et al. | 2006
- 752
-
Multi-channel Estimation in Multiple Antenna MB-OFDM UWB System for Home Entertainment NetworkBaek, M.-S. / Yeo, S.-Y. / Jang, B.-J. / You, Y.-H. / Song, H.-K. et al. | 2006
- 757
-
A Variant of the Constant Step Rule for Approximate Subgradient Methods over Nonlinear NetworksMijangos, E. et al. | 2006
- 762
-
Compiler-Optimized Kernels: An Efficient Alternative to Hand-Coded Inner KernelsHerrero, J. R. / Navarro, J. J. et al. | 2006
- 767
-
On the Optimal Buffer Allocation of an FMS with Finite In-Process BuffersKwon, S.-T. et al. | 2006
- 772
-
Noise Subspace Fuzzy C-Means Clustering for Robust Speech RecognitionGorriz, J. M. / Ramirez, J. / Segura, J. C. / Puntonet, C. G. / Gonzalez, J. J. et al. | 2006
- 777
-
Optimization Problems in the Simulation of Multifactor Portfolio Credit RiskKang, W. / Lee, K. et al. | 2006
- 780
-
Using Box-Muller with Low Discrepancy PointsPillards, T. / Cools, R. et al. | 2006
- 785
-
Two-Server Network Disconnection ProblemChoi, B.-C. / Hong, S.-P. et al. | 2006
- 789
-
A Fast Integration Method and Its Application in a Medical Physics ProblemLi, S. / de Doncker, E. / Kaugars, K. / Li, H. S. et al. | 2006
- 793
-
One-Sided Monge TSP Is NP-HardDeineko, V. / Tiskin, A. et al. | 2006
- 798
-
Payment in a Kiosk Centric Model with Mobile and Low Computational Power DevicesIsaac, J. T. / Camara, J. S. / Manzanares, A. I. / Castro, M. C. et al. | 2006
- 802
-
On Direct Methods for Lexicographic Min-Max OptimizationOgryczak, W. / Sliwinski, T. et al. | 2006
- 808
-
Survivable Mechanism for IEEE 802.11 WLAN Improvementsde Deus, F. E. / Puttini, R. S. / Molinaro, L. / Kabara, J. / Villalba, L. J. G. et al. | 2006
- 812
-
Multivariate Convex Approximation and Least-Norm Convex Data-SmoothingSiem, A. Y. D. / Hertog, D. d. / Hoffmann, A. L. et al. | 2006
- 819
-
Proposal of a System for Searching and Indexing Heterogeneous Vulnerabilities Databasesde Oliveira, R. / Buiati, F. / Villalba, L. J. G. / Almendra, D. / Pulcineli, L. / de Sousa, R. / Abbas, C. J. B. et al. | 2006
- 822
-
Linear Convergence of Tatonnement in a Bertrand OligopolyGallego, G. / Huh, W. T. / Kang, W. / Phillips, R. et al. | 2006
- 829
-
Performance Analysis of Dynamic Host Isolation System in Wireless Mobile NetworksKim, H. / Ahn, S. / Choi, J. et al. | 2006
- 832
-
Design for Using Purpose of Assembly-GroupMok, H.-S. / Han, C.-H. / Lim, C.-H. / Hong, J.-H. / Cho, J.-R. et al. | 2006
- 839
-
Meta-model Driven Collaborative Object Analysis Process for Production Planning and Scheduling DomainKim, C. O. / Baek, J.-G. / Jun, J. et al. | 2006
- 841
-
A Conditional Gaussian Martingale Algorithm for Global OptimizationEsquivel, M. L. et al. | 2006
- 851
-
Response Against Hacking and Malicious Code in P2PLee, W. / Kim, S. / Kim, B. et al. | 2006
- 852
-
Finding the Number of Clusters Minimizing Energy Consumption of Wireless Sensor NetworksKim, H. / Youn, H. Y. et al. | 2006
- 858
-
Two Efficient and Secure Authentication Schemes Using Smart CardsLee, Y. / Nam, J. / Kim, S. / Won, D. et al. | 2006
- 862
-
A Two-Echelon Deteriorating Production-Inventory Newsboy Model with Imperfect Production ProcessWee, H.-M. / Chung, C.-J. et al. | 2006
- 867
-
Location-Aware Agent Using Data Mining for the Distributed Location-Based ServicesLee, J. / Mateo, R. M. A. / Gerardo, B. D. / Go, S.-H. et al. | 2006
- 875
-
Mathematical Modeling and Tabu Search Heuristic for the Traveling Tournament ProblemLee, J. H. / Lee, Y. H. et al. | 2006
- 877
-
An Empirical Development Case of a Software-Intensive System Based on the Rational Unified ProcessLee, K. et al. | 2006
- 885
-
An Integrated Production-Inventory Model for Deteriorating Items with Imperfect Quality and Shortage Backordering ConsiderationsWee, H. M. / Yu, J. C. P. / Wang, K. J. et al. | 2006
- 887
-
Color Preference and Personality Modeling Using Fuzzy Reasoning RuleOh, A.-S. / Lho, T.-J. / Kwon, J.-W. / Kim, K.-B. et al. | 2006
- 895
-
The Development of Reliability Verification Tool of RFID Tag for Effective Product Control SystemsKim, K.-U. / Hwang, H.-S. / Kim, B.-J. / Jeong, S.-H. / Kim, C.-S. et al. | 2006
- 898
-
A Clustering Algorithm Using the Ordered Weight Sum of Self-Organizing Feature MapsLee, J.-S. / Kang, M.-K. et al. | 2006
- 905
-
Avoidance of State Explosion Using Dependency Analysis in Model Checking Control Flow ModelPark, S. / Kwon, G. et al. | 2006
- 908
-
Global Optimization of the Scenario Generation and Portfolio Selection ProblemsParpas, P. / Rustem, B. et al. | 2006
- 912
-
Design and Implementation of Web Usage Mining System Using Page ScrollKim, I. L. / Choi, B.-J. / Park, K.-S. et al. | 2006
- 918
-
A Generalized Fuzzy Optimization Framework for R&D Project Selection Using Real Options ValuationKarsak, E. E. et al. | 2006
- 922
-
A Security Architecture for Adapting Multiple Access Control Models to Operating SystemsKim, J.-S. / Lee, S. / Kim, M. / Seo, J.-H. / Noh, B.-N. et al. | 2006
- 928
-
Supply Chain Network Design and Transshipment Hub Location for Third Party Logistics ProvidersKwon, S. / Park, K. / Lee, C. / Kim, S.-S. / Kim, H.-J. / Liang, Z. et al. | 2006
- 932
-
Rotor Design for the Performance Optimization of Canard Rotor/Wing AircraftLee, J.-W. / Jeon, K.-S. / Kim, M.-J. / Byun, Y.-H. / Kim, C. J. / Yu, Y. H. et al. | 2006
- 934
-
A Group Search Optimizer for Neural Network TrainingHe, S. / Wu, Q. H. / Saunders, J. R. et al. | 2006
- 942
-
Process Decomposition and Choreography for Distributed Scientific Workflow EnactmentJung, J.-Y. / Lee, W. / Kang, S.-H. et al. | 2006
- 944
-
Application of Two-Stage Stochastic Linear Program for Portfolio Selection ProblemChang, K.-H. / Chen, H. / Lin, C.-F. et al. | 2006
- 952
-
Adaptive Multi-carrier Direct-Sequence CDMA System Using Fast-Frequency-HoppingLee, K. / Lee, G. et al. | 2006
- 954
-
Hierarchical Clustering Algorithm Based on Mobility in Mobile Ad Hoc NetworksSung, S. / Seo, Y. / Shin, Y. et al. | 2006
- 958
-
Object Modeling for Mapping XML Document Represented in XML-GDM to UML Class DiagramPark, D.-H. / Yoo, C.-S. / Kim, Y.-S. / Yeom, S.-J. et al. | 2006
- 964
-
An Alternative Approach to the Standard Enterprise Resource Planning Life Cycle: Enterprise Reference MetamodelingGutierrez, M. / Duran, A. / Cocho, P. et al. | 2006
- 968
-
A Two-Phase Local Server Security Model Based on XML CertificateKim, Y.-H. / Kim, J.-S. / Kim, Y.-S. / Shim, J.-S. et al. | 2006
- 974
-
Static Analysis Based Software Architecture RecoveryGuo, J. / Liao, Y. / Pamula, R. et al. | 2006
- 979
-
Integrated Object Modeling for Web-Based XML Application DocumentsYoo, C.-S. / Kim, J.-S. / Kim, Y.-S. / Shim, J.-S. et al. | 2006
- 984
-
A First Approach to a Data Quality Model for Web PortalsCaro, A. / Calero, C. / Caballero, I. / Piattini, M. et al. | 2006
- 990
-
Model of Generating SMIL Document Using Temporal Scripts of Animation ComponentYoo, C.-S. / Eun, H.-J. / Kim, Y.-S. / Shim, J.-S. et al. | 2006
- 994
-
Design for Environment-Friendly ProductMok, H.-S. / Cho, J.-R. / Moon, K.-S. et al. | 2006
- 1001
-
Marginal Bone Destructions in Dental Radiography Using Multi-template Based on Internet ServicesAhn, Y. / Chae, O. et al. | 2006
- 1004
-
Performance of HECC Coprocessors Using Inversion-Free FormulaeWollinger, T. / Bertoni, G. / Breveglieri, L. / Paar, C. et al. | 2006
- 1010
-
The Band Selection Algorithm in Supervised Classification Using Mixed-Pixels and Canonical Correlation AnalysisChang, H. / Yoo, H.-H. / Kim, H. S. et al. | 2006
- 1013
-
Metrics of Password Management PolicyVillarrubia, C. / Fernandez-Medina, E. / Piattini, M. et al. | 2006
- 1018
-
Domain Analysis for Components Based DevelopmentsHwang, H.-J. et al. | 2006
- 1024
-
Using UML Packages for Designing Secure Data WarehousesVillarroel, R. / Soler, E. / Fernandez-Medina, E. / Trujillo, J. / Piattini, M. et al. | 2006
- 1035
-
Practical Attack on the Shrinking GeneratorCaballero-Gil, P. / Fuster-Sabater, A. et al. | 2006
- 1044
-
A Comparative Study of Proposals for Establishing Security Requirements for the Development of Secure Information SystemsMellado, D. / Fernandez-Medina, E. / Piattini, M. et al. | 2006
- 1054
-
Stochastic Simulation Method for the Term Structure Models with JumpPark, K. / Kim, M. / Kim, S. et al. | 2006
- 1064
-
The Ellipsoidal l~p Norm Obnoxious Facility Location ProblemXia, Y. et al. | 2006
- 1073
-
On the Performance of Recovery Rate ModelingBaixauli, J. S. / Alvarez, S. et al. | 2006
- 1081
-
Using Performance Profiles to Evaluate Preconditioners for Iterative MethodsLazzareschi, M. / Chen, T.-Y. et al. | 2006
- 1090
-
Multicast omega-Trees Based on Statistical AnalysisKim, M. / Bang, Y.-C. / Choo, H. et al. | 2006
- 1100
-
The Gateways Location and Topology Assignment Problem in Hierarchical Wide Area Networks: Algorithms and Computational ResultsRyba, P. / Kasprzak, A. et al. | 2006
- 1110
-
Developing an Intelligent Supplier Chain System Collaborating with Customer Relationship ManagementHong, G. H. / Ha, S. H. et al. | 2006
- 1119
-
The Three-Criteria Servers Replication and Topology Assignment Problem in Wide Area NetworksMarkowski, M. / Kasprzak, A. et al. | 2006
- 1129
-
An Efficient Multicast Tree with Delay and Delay Variation ConstraintsKim, M. / Bang, Y.-C. / Yang, J. S. / Choo, H. et al. | 2006
- 1137
-
Algorithms on Extended (delta,gamma)-MatchingLee, I. / Clifford, R. / Kim, S.-R. et al. | 2006
- 1143
-
SOM and Neural Gas as Graduated Nonconvexity AlgorithmsGonzalez, A. I. / D Anjou, A. / Garcia-Sebastian, M. T. / Grana, M. et al. | 2006
- 1153
-
Analysis of Multi-domain Complex Simulation StudiesGattiker, J. R. / Lawrence, E. / Higdon, D. et al. | 2006
- 1163
-
A Fast Method for Detecting Moving Vehicles Using Plane Constraint of Geometric InvarianceKang, D.-J. / Ha, J.-E. / Lho, T.-J. et al. | 2006
- 1172
-
Robust Fault Matched Optical Flow Detection Using 2D HistogramChon, J. / Kim, H. et al. | 2006
- 1180
-
Iris Recognition: Localization, Segmentation and Feature Extraction Based on Gabor TransformNoruzi, M. / Vafadoost, M. / Moin, M. S. et al. | 2006
- 1190
-
Optimal Edge Detection Using Perfect Sharpening of Ramp EdgesKim, E. M. / Pahk, C. S. / Lee, J. G. et al. | 2006
- 1200
-
Eye Tracking Using Neural Network and Mean-ShiftKim, E. Y. / Kang, S. K. et al. | 2006
- 1210
-
The Optimal Feature Extraction Procedure for Statistical Pattern RecognitionKurzynski, M. / Puchala, E. et al. | 2006
- 1216
-
A New Approach for Human Identification Using Gait RecognitionEkinci, M. et al. | 2006