Effect of Grid Resolution on the Statistics of Passive Scalar in an Injection-Driven Channel (English)
- New search for: Na, Y.
- New search for: Shin, D.
- New search for: Lee, S.
- New search for: Na, Y.
- New search for: Shin, D.
- New search for: Lee, S.
- New search for: Gavrilova, Marina L.
In:
International Conference on Computational Science and its Applications; Computational science and its applications: ICCSA 2006; Part V
3984
;
467-475
;
2006
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Effect of Grid Resolution on the Statistics of Passive Scalar in an Injection-Driven Channel
-
Contributors:
-
Conference:International Conference on Computational Science and its Applications; Computational science and its applications: ICCSA 2006; Part V ; 2006 ; Glasgow
-
Published in:International Conference on Computational Science and its Applications; Computational science and its applications: ICCSA 2006; Part V , 3984 ; 467-475LECTURE NOTES IN COMPUTER SCIENCE , 3984 ; 467-475
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin
-
Publication date:2006-01-01
-
Size:9 pages
-
Remarks:Part 5 of 5 See also numb 3980-3983. Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Upper Bound on Dilation of Triangulations of Cyclic PolygonsAmarnadh, N. / Mitra, P. et al. | 2006
- 1
-
Resource Demand Prediction-Based Grid Resource Transaction Network Model in Grid Computing EnvironmentKim, I. K. / Lee, J. S. et al. | 2006
- 1
-
Message Transport Interface for Efficient Communication Between Agent Framework and Event ServicePark, S. Y. / Youn, H. Y. et al. | 2006
- 1
-
Efficient Algorithm for the Extraction of Association Rules in Data MiningMitra, P. / Chaudhuri, C. et al. | 2006
- 1
-
A Security Requirement Management Database Based on ISO/IEC 15408Morimoto, S. / Horie, D. / Cheng, J. et al. | 2006
- 10
-
A CGM Algorithm Solving the Longest Increasing Subsequence ProblemSeme, D. et al. | 2006
- 10
-
Optimal Guard Placement Problem Under L-VisibilityBardhan, D. / Roy, S. / Das, S. et al. | 2006
- 11
-
An Ontology-Based Context Model in a Smart HomeKim, E. / Choi, J. et al. | 2006
- 11
-
A Robust Digital Fingerprinting Mechanism for Digital Copyright ProtectionKim, S. / Yoon, H. / Lee, W. et al. | 2006
- 11
-
Development of Committee Neural Network for Computer Access Security SystemAnagun, A. S. et al. | 2006
- 18
-
SoapFS: A Multiplatform File SystemSosa, V. J. / Pazos, R. / Gonzalez, J. G. / Caceres, S. / Cruz, L. / Guillen, M. et al. | 2006
- 20
-
Visibility Maps of Segments and Triangles in 3DMoet, E. / Knauer, C. / van Kreveld, M. et al. | 2006
- 21
-
Service Mobility Manager for OSGi FrameworkLee, S. / Kim, I. / Rim, K. / Lee, J. et al. | 2006
- 21
-
C-TOBI-Based Pitch Accent Prediction Using Maximum-Entropy ModelKim, B. / Lee, G. G. et al. | 2006
- 22
-
Computer Assisted Source-Code ParallelisationVidler, P. J. / Pont, M. J. et al. | 2006
- 28
-
An Application-Independent Multimedia Adaptation Framework for the Mobile WebChon, S. / Lim, Y. / Kim, K. et al. | 2006
- 30
-
Non-euclidean Metrics and Chordal Space StructuresSeveriano, J. A. D. / Gonzalez, C. O. / Fernandez, R. T. / del Val, C. M. et al. | 2006
- 30
-
A Ubiquitous Workflow Service FrameworkHan, J. / Cho, Y. / Kim, E. / Choi, J. et al. | 2006
- 31
-
Design and Fabrication of Security and Home Automation SystemKim, E. S. / Kim, M. S. et al. | 2006
- 32
-
A Template Language for Agent ConstructionXiaohong, L. / Zhiyong, F. / tie, L. / Li, L. et al. | 2006
- 38
-
PGNIDS(Pattern-Graph Based Network Intrusion Detection System) DesignLee, B.-k. / Yang, S.-h. / Kwon, D.-H. / Kim, D.-Y. et al. | 2006
- 39
-
Efficient Parallel Processing for K-Nearest-Neighbor Search in Spatial DatabasesGao, Y. / Chen, L. / Chen, G. / Chen, C. et al. | 2006
- 40
-
Self Organizing Sensor Networks Using Intelligent ClusteringShin, K. / Abraham, A. / Han, S. Y. et al. | 2006
- 40
-
Effort Prediction Model Using Similarity for Embedded Software DevelopmentIwata, K. / Anan, Y. / Nakashima, T. / Ishii, N. et al. | 2006
- 40
-
Algorithms for Rectangular Covering ProblemsPorschen, S. et al. | 2006
- 48
-
Experiments and Hardware Countermeasures on Power Analysis AttacksAhn, M. / Lee, H. et al. | 2006
- 49
-
An Adaptive Mobile System Using Mobile Grid Computing in Wireless NetworkOh, J. / Lee, S. / Lee, E. et al. | 2006
- 49
-
A Component Cohesion Metric Applying the Properties of Linear Increment by Dynamic Dependency Relationships Between ClassesChoi, M. / Lee, J. / Ha, J. et al. | 2006
- 50
-
Searching and Selecting Web Services Using Case Based ReasoningDiaz, O. G. F. / Salgado, R. S. / Moreno, I. S. / Ortiz, G. R. et al. | 2006
- 50
-
Backward Error Analysis in Computational GeometryJiang, D. / Stewart, N. F. et al. | 2006
- 54
-
Information System Modeling for Analysis of Propagation Effects and Levels of DamageKim, I. / Chung, Y. / Lee, Y. / Im, E. G. / Won, D. et al. | 2006
- 58
-
Fuzzy Logic Based Propagation Limiting Method for Message Routing in Wireless Sensor NetworksChi, S. H. / Cho, T. H. et al. | 2006
- 58
-
Comparison of Allocation Algorithms for Mesh Structured Networks with Using Multistage SimulationKoszalka, L. / Lisowski, D. / Pozniak-Koszalka, I. et al. | 2006
- 59
-
The Maximum Capacity and Minimum Detectable Capacity of Information Hiding in Digital ImagesZhang, F. / Liu, X. / Li, J. / Zhang, X. et al. | 2006
- 60
-
Reply to "Backward Error Analysis..."Kettner, L. / Mehlhorn, K. / Pion, S. / Schirra, S. / Yap, C. et al. | 2006
- 61
-
Two Map Labeling Algorithms for GIS ApplicationsGavrilova, M. L. et al. | 2006
- 64
-
A Belt-Zone Method for Decreasing Control Messages in Ad Hoc NetworksKim, Y. / Jung, J. / Lee, S. / Kim, C. et al. | 2006
- 67
-
BEAST: A Buffer Replacement Algorithm Using Spatial and Temporal LocalityMin, J.-K. et al. | 2006
- 68
-
Content Delivery with Spatial Caching Scheme in Mobile Wireless NetworksKim, B. / Kim, I. et al. | 2006
- 68
-
The Election Problem in Asynchronous Distributed Systems with Bounded Faulty ProcessesPark, S. et al. | 2006
- 71
-
Surface Reconstruction from Large Point Clouds Using Virtual Shared Memory ManagerKohout, J. / Varnuska, M. / Kolingerova, I. et al. | 2006
- 73
-
A VLSM Address Management Method for Variable IP SubnettingCheon, S. / Jin, D. / Kim, C. et al. | 2006
- 77
-
Performance Evaluation of the Flow-Based Router Using Intel IXP2800 Network ProcessorsPark, J. / Jung, M. H. / Chang, S. / Choi, S.-i. / Chung, M. Y. / Ahn, B. J. et al. | 2006
- 78
-
Improving the Genetic Algorithms Performance in Simple Assembly Line BalancingTasan, S. O. / Tunali, S. et al. | 2006
- 78
-
Higher Education Web Information System Usage Analysis with a Data WebhouseLopes, C. T. / David, G. et al. | 2006
- 81
-
Computing Terrain Multi-visibility Maps for a Set of View Segments Using Graphics HardwareColl, N. / Fort, M. / Madern, N. / Sellares, J. A. et al. | 2006
- 84
-
SDSEM: Software Development Success Evolution ModelKim, H.-K. / Byun, S.-Y. et al. | 2006
- 87
-
Robust 3D Face Data Acquisition Using a Sequential Color-Coded Pattern and Stereo Camera SystemKim, I. / Kim, S. / Yu, S. / Lee, S. et al. | 2006
- 88
-
Reformulation and Solution Approaches for an Integrated Scheduling ModelJodlbauer, H. / Reitner, S. / Weidenhiller, A. et al. | 2006
- 88
-
A User Management System for Federated Databases Using Web ServicesLiu, F. / Dogdu, E. et al. | 2006
- 91
-
Fast Intersections for Subdivision SurfacesSevern, A. / Samavati, F. et al. | 2006
- 93
-
A Robust Routing Protocol by a Substitute Local Path in Ad Hoc NetworksWu, M. / Jung, S. / Lee, S. / Kim, C. et al. | 2006
- 96
-
Robust Design of Face Recognition SystemsYu, S. / Lee, H. / Kim, J. / Lee, S. et al. | 2006
- 98
-
A Dynamic Evaluation Framework for Mobile ApplicationsAndersen, A. M. / Torabi, T. et al. | 2006
- 98
-
Safety of a Client-Based Version Vector Consistency Protocol of Session GuaranteesBrzezinski, J. / Sobaniec, C. / Wawrzyniak, D. et al. | 2006
- 101
-
A beta-Shape from the Voronoi Diagram of Atoms for Protein Structure AnalysisSeo, J. / Kim, D. / Cho, C.-H. / Kim, D.-S. et al. | 2006
- 104
-
Power Efficient Wireless LAN Using 16-State Trellis-Coded Modulation for Infrared CommunicationsKim, H. G. et al. | 2006
- 106
-
Transmission Rate Prediction of VBR Motion Image Using the Kalman FilterKim, W. / Jang, H.-J. / Kim, G.-Y. et al. | 2006
- 108
-
SOAM: An Environment Adaptation Model for the Pervasive Semantic WebVazquez, J. I. / de Ipina, D. L. / Sedano, I. et al. | 2006
- 108
-
A New I/O Architecture for Improving the Performance in Large Scale ClustersGarcia, L. M. S. / Isaila, F. D. / Carballeira, F. G. / Perez, J. C. / Rabenseifner, R. / Adamidis, P. et al. | 2006
- 111
-
Reduction of the Search Space in the Edge-Tracing Algorithm for the Voronoi Diagram of 3D BallsCho, Y. / Kim, D. / Lee, H. C. / Park, J. Y. / Kim, D.-S. et al. | 2006
- 114
-
A Modeling and Similarity Measure Function for Multiple Trajectories in Moving DatabasesShim, C.-B. / Kim, J. et al. | 2006
- 115
-
The Design and Implementation of Real-Time Environment Monitoring Systems Based on Wireless Sensor NetworksJung, K.-H. / Lee, S.-C. / Hwang, H.-S. / Kim, C.-S. et al. | 2006
- 118
-
Implementing the MPEG-21 Adaptation Quality of Service in Dynamic EnvironmentsAngelides, M. C. / Sofokleous, A. A. / Schizas, C. N. et al. | 2006
- 118
-
Performance Modeling of a Fully Adaptive and Fault-Tolerant Wormhole Switching Strategy in 2-D MeshSafaei, F. / Fathy, M. / Khonsari, A. / Ould-Khaoua, M. et al. | 2006
- 121
-
Routing Properties of the Localized Delaunay Triangulation over Heterogeneous Ad-Hoc Wireless NetworksWatson, M. D. / Keil, J. M. et al. | 2006
- 125
-
Distributed Processing of Context-Aware Authorization in Ubiquitous Computing EnvironmentsShim, Y.-C. et al. | 2006
- 125
-
Ontology-Based Information Search in the Real World Using Web ServicesHwang, H.-S. / Park, K.-S. / Kim, C.-S. et al. | 2006
- 128
-
A Middleware Architecture Determining Application Context Using Shared OntologyJeong, K. / Choi, D. / Kim, S. H. / Lee, G. et al. | 2006
- 129
-
Parallelization of Simulations for Various Magnetic System Models on Small-Sized Cluster Computers with MPISchurz, F. / Fey, D. / Berkov, D. et al. | 2006
- 131
-
A Speculative Approach to Clipping Line SegmentsDevai, F. et al. | 2006
- 134
-
An Active Node Set Maintenance Scheme for Distributed Sensor NetworksByun, T.-Y. / Kim, M. / Hwang, S. / Jeon, S.-E. et al. | 2006
- 135
-
An Evaluation and Analysis for IP VPN Model in IPv6 Transition EnvironmentLim, H.-J. / Lee, D.-Y. / Kim, T.-K. / Chung, T.-M. et al. | 2006
- 138
-
Context-Aware Regulation of Context-Aware Mobile Services in Pervasive Computing EnvironmentsSyukur, E. / Loke, S. W. et al. | 2006
- 139
-
A New Reflective and Reliable Context-Oriented Event Service Architecture for Pervasive ComputingSong, S. K. / Youn, H. Y. / Kim, U. et al. | 2006
- 141
-
An Efficient Algorithm for Mobile Guarded Guards in Simple GridsKosowski, A. / Malafiejski, M. / Zylinski, P. et al. | 2006
- 144
-
Intelligent Information Search Mechanism Using Filtering and NFC Based on Multi-agents in the Distributed EnvironmentYi, S. / Gerardo, B. D. / Lee, Y.-S. / Lee, J. et al. | 2006
- 145
-
Hybrid Storage Design for NC-94 Database Within the Parametric Data Model FrameworkNoh, S.-Y. et al. | 2006
- 148
-
Designing and Implementing Physical Hypermedia ApplicationsChalliol, C. / Rossi, G. / Gordillo, S. / De Cristofolo, V. et al. | 2006
- 149
-
X-Torus: A Variation of Torus Topology with Lower Diameter and Larger Bisection WidthGu, H. / Xie, Q. / Wang, K. / Zhang, J. / Li, Y. et al. | 2006
- 151
-
Approximation of Optimal Moving Paths of Huge Robot Reclaimer with a 3D Range FinderLee, K.-H. / Bae, H.-J. / Hong, S.-J. et al. | 2006
- 154
-
Network Anomaly Behavior Detection Using an Adaptive Multiplex DetectorKim, M. / Seo, J. et al. | 2006
- 155
-
A Unified Index for Moving-Objects DatabasesPark, J. / Hong, B. / An, K. / Jung, J. et al. | 2006
- 158
-
Replicated Ubiquitous NetsRosa-Velardo, F. / de Frutos-Escrig, D. / Marroquin-Alonso, O. et al. | 2006
- 158
-
Feedback Vertex Sets in Rotator GraphsHsu, C.-C. / Lin, H.-R. / Chang, H.-C. / Lin, K.-K. et al. | 2006
- 161
-
Fault Tolerant Guarding of GridsKosowski, A. / Malafiejski, M. / Zylinski, P. et al. | 2006
- 163
-
Applying Product Line to the Embedded SystemsKim, H.-K. et al. | 2006
- 165
-
Efficient Longest Common Subsequence Computation Using Bulk-Synchronous ParallelismKrusche, P. / Tiskin, A. et al. | 2006
- 165
-
A Semantic Context-Aware Access Control in Pervasive EnvironmentsKo, H. J. / Won, D. H. / Shin, D. R. / Choo, H. S. / Kim, U. M. et al. | 2006
- 169
-
Design of a Shared Ontology Used for Translating Negotiation PrimitivesPerez, J. / Bravo, M. / Pazos, R. / Reyes, G. / Frausto, J. / Sosa, V. / Lopez, M. et al. | 2006
- 171
-
Tunable Bounding Volumes for Monte Carlo ApplicationsTsai, Y.-Y. / Wang, C.-M. / Chang, C.-H. / Cheng, Y.-M. et al. | 2006
- 172
-
Enhanced Fuzzy Single Layer Learning Algorithm Using Automatic Tuning of ThresholdKim, K.-B. / Lee, B.-K. / Kim, S.-H. et al. | 2006
- 175
-
Simulation of Internet Transport Protocols for High Bandwidth-Delay NetworksLee, J. et al. | 2006
- 175
-
Design and Implementation of an Index Structure Using Fixed Intervals for Tracing of RFID TagsAhn, S. / Hong, B. / Ban, C. / Lee, K. et al. | 2006
- 178
-
Optimization of Location Management in the Distributed Location-Based Services Using Collaborative AgentsMateo, R. M. A. / Lee, J. / Yang, H. et al. | 2006
- 179
-
A Web Page Ranking Method by Analyzing Hyperlink Structure and K-ElementsLai, J. / Soh, B. / Fei, C. et al. | 2006
- 181
-
A Data Hiding Algorithm for Point-Sampled GeometryCheng, Y.-M. / Wang, C.-M. / Tsai, Y.-Y. et al. | 2006
- 185
-
Performance Evaluation of Parallel Systems Employing Roll-Forward Checkpoint SchemesPark, G.-L. / Youn, H. Y. / Lee, J. / Kim, C. S. / Lee, B. / Lee, S. J. / Song, W.-C. / Byun, Y.-C. et al. | 2006
- 186
-
GARPAN: Gateway-Assisted Inter-PAN Routing for 6LoWPANsAkbar, A. H. / Kim, K.-H. / Jung, W.-D. / Bashir, A. K. / Yoo, S.-W. et al. | 2006
- 187
-
Efficient Scheduling by Incorporating Bin Packing with Limited and Weighted Round Robin for BluetoothLee, E. J. / Youn, H. Y. et al. | 2006
- 188
-
Design of H.264/AVC-Based Software Decoder for Mobile PhoneJeon, H.-S. / Noh, H.-M. / Yoo, C.-J. / Chang, O.-B. et al. | 2006
- 192
-
An Algorithm for Rendering Vertexes and Edges of Polyhedron with High Order Geometric ContinuityLu, X. et al. | 2006
- 192
-
A Purely Distributed Approach for Coupling Scientific and Engineering ApplicationsBerbegall, V. / Drummond, L. A. / Verdu, G. / Vidal, V. et al. | 2006
- 195
-
Design and Performance Analysis of Multimedia Teachware Making System Using 2D BarcodeKim, D. / Mun, Y. et al. | 2006
- 197
-
ECA Rule Component for Timely Collaboration of Web-Based Distributed Business SystemsLee, D. W. / Lee, S. / Lee, Y. et al. | 2006
- 198
-
Transforming a Legacy System into ComponentsKim, H.-K. / Chung, Y.-K. et al. | 2006
- 202
-
A Monitoring and Visualization Tool and Its Application for a Network Enabled Server PlatformBolze, R. / Caron, E. / Desprez, F. / Hoesch, G. / Pontvieux, C. et al. | 2006
- 202
-
Sim VIZ - A Desktop Virtual Environment for Visualization and Analysis of Protein Multiple Simulation TrajectoriesCzekster, R. M. / de Souza, O. N. et al. | 2006
- 204
-
A Traffic Conditioning Algorithm for Enhancing the Fairness Between TCP and UDP Flows in DiffServLee, S. / Goh, S. / Jang, M. et al. | 2006
- 206
-
Pseudorandom Number Generator Using Optimal Normal BasisJang, I. / Yoo, H. S. et al. | 2006
- 207
-
Dynamic Approach for Integrating Web Data WarehousesLe, D. X. / Rahayu, J. W. / Pardede, E. et al. | 2006
- 212
-
Immersive Molecular Virtual Reality Based on X3D and Web ServicesGervasi, O. / Tasso, S. / Lagana, A. et al. | 2006
- 213
-
Efficient Nonce-Based Authentication Scheme Using Token-UpdateShi, W. / Yoo, H. S. et al. | 2006
- 214
-
Parallel Hash Join Algorithms for Dynamic Load Balancing in a Shared Disks ClusterMoon, A. / Cho, H. et al. | 2006
- 214
-
Adaptive Mode Switching for Internetworking of MANET and WLAN Based on HMIPv6Lee, H. K. / Kim, G. / Mun, Y. et al. | 2006
- 217
-
Location Aware Business Process DeploymentAli, S. / Torabi, T. / Ali, H. et al. | 2006
- 222
-
An Efficient Management of Network Traffic Performance Using Framework-Based Performance Management ToolChoi, S.-M. / Yoo, C.-J. / Chang, O.-B. et al. | 2006
- 222
-
Yeast Naked DNA Spatial Organization Predisposes to Transcriptional RegulationMatte-Tailliez, O. / Herisson, J. / Ferey, N. / Magneau, O. / Gros, P. E. / Kepes, F. / Gherbi, R. et al. | 2006
- 224
-
Towards Reliable and Trustworthy Cooperation in Grid: A Pre-evaluating Set Based Trust ModelQu, X. / Zhong, J. / Yang, X. et al. | 2006
- 224
-
Automated Keyword Extraction Using Category Correlation of DataWoo, Y.-H. / Nam, D.-H. / Hur, T.-S. / Park, Y.-B. / Huh, W. / Woo, Y.-S. / Min, H.-K. et al. | 2006
- 226
-
A Framework for Rapid Development of RFID ApplicationsKim, Y. / Moon, M. / Yeom, K. et al. | 2006
- 231
-
On Cognitive Role of Negative SchemaTae, K. S. / Lee, S. S. et al. | 2006
- 232
-
Interactive Real-Time 3D Visualization of Grid Portal for Quantum MechanicsByun, S.-W. / Lee, Y.-K. / Jeong, C.-S. et al. | 2006
- 234
-
A Prediction Method of Network Traffic Using Time Series ModelsJung, S. / Kim, C. / Chung, Y. et al. | 2006
- 236
-
A Spreading MIMO-OFDM Transmission Scheme for Wireless Mobile EnvironmentPark, S. S. / Hwang, T. J. / Cho, J. / Baik, H. K. et al. | 2006
- 236
-
A Flexible DRM System Considering Ubiquitous EnvironmentPark, J. H. / Lee, S. / Koh, B.-S. et al. | 2006
- 239
-
Qualitative Method-Based the Effective Risk Mitigation Method in the Risk ManagementEom, J.-H. / Lee, S.-H. / Lim, H.-J. / Chung, T.-M. et al. | 2006
- 241
-
Development of a Virtual Reality Bicycle Simulator for Rehabilitation Training of Postural BalanceKim, N.-G. / Kim, Y.-Y. / Kwon, T.-K. et al. | 2006
- 243
-
A Security Auditing Approach Based on Mobile Agent in Grid EnvironmentsXiao, Z. / Huang, C. / Xu, F. et al. | 2006
- 244
-
An Obstacle Avoidence Method for Chaotic Robots Using Angular Degree LimitionsBae, Y. / Lee, M. / Gatton, T. M. et al. | 2006
- 245
-
User Centric Intelligent IPMPS in Ubi-HomePark, J. H. / Song, J. / Lee, S. / Koh, B.-S. / Hong, I.-H. et al. | 2006
- 249
-
A Real-Time Web Contents Adaptation for Mobile UserHong, Y.-S. / Lee, K.-Y. et al. | 2006
- 251
-
XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed ComputingPark, N. / Kim, H. / Chung, K. / Sohn, S. / Won, D. et al. | 2006
- 251
-
Virtual Reality Edutainment: Cost-Effective Development of Personalised Software ApplicationsVirvou, M. / Manos, K. / Katsionis, G. et al. | 2006
- 251
-
Intersection Simulation System Based on Traffic Flow Control FrameworkShin, C.-S. / Ahn, D.-I. / Yoe, H. / Joo, S.-C. et al. | 2006
- 255
-
The Design and Development of a Secure Keystroke System for u BusinessChang, H. / Kim, K.-K. / Lee, H. / Kim, J. et al. | 2006
- 259
-
STMPE: An Efficient Movement Pattern Extraction Algorithm for Spatio-temporal Data MiningKim, D.-O. / Kang, H.-K. / Hong, D.-S. / Yun, J.-K. / Han, K.-J. et al. | 2006
- 260
-
Optimization of a Simulation for 300mm FAB Semiconductor ManufacturingPark, D. / Han, Y. / Lee, C. et al. | 2006
- 261
-
3D Panoramic Mosaicking to Suppress the Ghost Effect at Far-Range Scene for Urban Area VisualizationChon, J. / Shimizu, E. / Shibasaki, R. et al. | 2006
- 261
-
A HIICA(Highly-Improved Intra CA) Design for M-CommerceLee, B.-k. / Kim, C.-m. / Shin, D.-w. / Yang, S.-h. et al. | 2006
- 262
-
Linkability of a Blind Signature Scheme and Its Improved SchemeZhang, J. / Wei, T. / Zhang, J. Y. / Zou, W. et al. | 2006
- 268
-
VR Based Knowledge Transfer in Medical Technology and TechniquesSchoor, W. / Mecke, R. / Rehfeld, M. et al. | 2006
- 269
-
Performance Analysis Using the Two Kinds of Receiving Gain of Smart Antenna in IS20001X SystemAhn, S. / Kim, M. / Lee, J. et al. | 2006
- 269
-
Highly Reliable Synchronous Stream Cipher System for Link EncryptionLee, H. et al. | 2006
- 270
-
Return on Security Investment Against Cyber Attacks on AvailabilityMin, B. J. / Yoo, S. H. / Ryu, J. H. / Seo, D. I. et al. | 2006
- 271
-
A Noble Structural Model for e-Learning Services in Ubiquitous EnvironmentJu, M. / Kim, S. / Kim, Y.-D. / Kang, S. et al. | 2006
- 276
-
An Improved Popescu's Authenticated Key Agreement ProtocolYoon, E.-J. / Yoo, K.-Y. et al. | 2006
- 278
-
A Diagnostic Model Using a Clustering SchemeKim, S. B. / Yang, K. M. / Kim, C. M. et al. | 2006
- 279
-
Recognition of Concrete Surface Cracks Using ART2-Based Radial Basis Function Neural NetworkKim, K.-B. / Yang, H.-K. / Ahn, S.-H. et al. | 2006
- 279
-
An Approach for Document Fragment Retrieval and Its Formatting Issue in Engineering Information ManagementLiu, S. / McMahon, C. A. / Darlington, M. J. / Culley, S. J. / Wild, P. J. et al. | 2006
- 279
-
Backward Channel Protection Method for RFID Security Schemes Based on Tree-Walking AlgorithmsChoi, W. / Roh, B.-h. et al. | 2006
- 284
-
SVM Based False Alarm Minimization Scheme on Intrusion Prevention SystemKim, G.-H. / Lee, H.-W. et al. | 2006
- 287
-
Hybrid Image Mosaic Construction Using the Hierarchical MethodKang, O.-H. / Lee, J.-H. / Rhee, Y.-W. et al. | 2006
- 288
-
Design of the Configurable Clothes Using Mobile Actuator-Sensor NetworkLee, B.-H. / Seo, K.-T. / Kong, J.-S. / Kim, J.-G. et al. | 2006
- 288
-
Minimum Cost Multicast Routing Based on High Utilization MC Nodes Suited to Sparse-Splitting Optical NetworksCho, S.-H. / Lee, T.-J. / Chung, M. Y. / Choo, H. et al. | 2006
- 288
-
Ontology-Based Edutainment SystemKim, C. M. / Kim, H. S. / Kim, S. B. et al. | 2006
- 294
-
Lightweight Wireless Intrusion Detection Systems Against DDoS AttackLee, H.-W. et al. | 2006
- 296
-
Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification ProcedureZhai, J. / Park, C. M. / Wang, G.-N. et al. | 2006
- 298
-
Public Key Encryption with Keyword Search Based on K-Resilient IBEKhader, D. et al. | 2006
- 298
-
Refinement Method of Post-processing and Training for Improvement of Automated Text ClassificationChoi, Y. J. / Park, S. S. et al. | 2006
- 298
-
A Fast Video Encoding Algorithm by Skipping the Operations on Zero-Valued DCT CoefficientsYoo, K.-Y. et al. | 2006
- 303
-
One-Time Password Authentication Scheme Using Smart Cards Providing User AnonymityYoon, E.-J. / Yoo, K.-Y. et al. | 2006
- 306
-
Counting-Based Distance Estimations and Localizations in Wireless Sensor NetworksKwon, O.-H. / Song, H.-J. et al. | 2006
- 307
-
Efficient Block Matching for Ray-Space Predictive Coding in Free-Viewpoint Television SystemsJiang, G. / Shao, F. / Yu, M. / Chen, K. / Choi, T.-Y. et al. | 2006
- 309
-
A Generic Construction of Secure Signatures Without Random OraclesLi, J. / Chan, Y.-Y. / Wang, Y. et al. | 2006
- 309
-
An Implementation of the Vectorizing-Based Automatic Nesting Software NSTLho, T.-J. / Kang, D.-J. / Oh, A.-S. / Kwon, J.-W. / Bae, S.-T. / Lee, K.-H. et al. | 2006
- 312
-
Loss Reduction in Distribution Networks Using Cyclic Best First SearchChoi, S.-Y. / Shin, M.-C. / Cha, J.-S. et al. | 2006
- 316
-
Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID SystemPark, J. S. / Lee, S. M. / Choi, E. Y. / Lee, D. H. et al. | 2006
- 317
-
New Approach to Complexity Reduction of Intra Prediction in Advanced Multimedia CompressionYu, M. / Jiang, G. / Li, S. / Li, F. / Choi, T.-y. et al. | 2006
- 318
-
A Separation Between Selective and Full-Identity Security Notions for Identity-Based EncryptionGalindo, D. et al. | 2006
- 319
-
A Resource Balancing Scheme in Heterogeneous Mobile NetworksPark, S. / Kim, Y. / Bang, H. / Kim, K. / Mun, Y. / Kim, B. et al. | 2006
- 322
-
Short-Term Power Demand Forecasting Using Information Technology Based Data Mining MethodChoi, S.-Y. et al. | 2006
- 326
-
Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute CertificationLee, D.-G. / Kang, S.-I. / Seo, D.-H. / Lee, I.-Y. et al. | 2006
- 326
-
Reduction of Mode Decision Complexity in H.264/AVC Using Adaptive Selection of Reference Frame and Intra Prediction ModeLee, W. / Lee, J. / Cho, I.-h. / Jeong, D. et al. | 2006
- 327
-
Traceable Signature: Better Efficiency and BeyondGe, H. / Tate, S. R. et al. | 2006
- 330
-
Fast BU Process Method for Real Time Multimedia Traffic in MIPv6Park, W. / Kim, B. et al. | 2006
- 331
-
A Design of the Flexible Mobile Agents Based on WebNa, Y. J. / Ko, I. S. / Han, G. H. et al. | 2006
- 335
-
3D Visualization for Tele-medical DiagnosisYoo, S. K. / Key, J. / Choi, K. et al. | 2006
- 336
-
Improving the CGA-OMIPv6 Protocol for Low-Power Mobile NodesYou, I. et al. | 2006
- 338
-
A Sales Agent Using Case-Based Reasoning and Rule-Based Reasoning for E-Commerce SystemNa, Y. J. / Ko, I. S. / Kwak, J. M. et al. | 2006
- 338
-
On the TYS Signature SchemeJoye, M. / Lin, H.-M. et al. | 2006
- 340
-
Network Intrusion Detection Using Statistical Probability DistributionMun, G.-J. / Kim, Y.-M. / Kim, D. / Noh, B.-N. et al. | 2006
- 344
-
Tracking Illegal System Access in a Ubiquitous Environment - Proposal for ATS, a Traceback System Using STOPKim, G. / Hwang, S. / Lee, D. et al. | 2006
- 344
-
Content Based Image Retrieval Based on a Nonlinear Similarity ModelCha, G.-H. et al. | 2006
- 345
-
Efficient Partially Blind Signatures with Provable SecurityWu, Q. / Susilo, W. / Mu, Y. / Zhang, F. et al. | 2006
- 346
-
A New Ciphering Method Associated with Evolutionary AlgorithmOmary, F. / Mouloudi, A. / Tragha, A. / Bellaachia, A. et al. | 2006
- 349
-
Network Anomaly Detection Based on Clustering of Sequence PatternsNoh, S.-K. / Kim, Y.-M. / Kim, D. / Noh, B.-N. et al. | 2006
- 352
-
Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based ApproachZhou, B. / Shi, Q. / Merabti, M. et al. | 2006
- 354
-
Simple and Powerful Interactive E-Learning System Using VXML: Design and Implementation of Web and PSTN Linked Efficient Learning SystemShin, J.-H. / Hong, K.-S. et al. | 2006
- 355
-
A Framework for Robust Group Key AgreementBohli, J.-M. et al. | 2006
- 355
-
Power Distribution Automation System Using Information Technology Based Web Active DatabaseChoi, S.-Y. et al. | 2006
- 359
-
A Routing Protocol for Throughput Enhancement and Energy Saving in Mobile Ad Hoc NetworksKim, H. / Han, S. / Song, J. et al. | 2006
- 360
-
A Security Model for Home Networks with Authority DelegationHwang, J.-B. / Han, J.-W. et al. | 2006
- 364
-
A Web-Based Tool for Entity-Relationship ModelingPrados, F. / Boada, I. / Soler, J. / Poch, J. et al. | 2006
- 365
-
BGN Authentication and Its Extension to Convey Message CommitmentsChan, Y.-Y. / Li, J. et al. | 2006
- 365
-
Alternative Target Density Functions for Radar ImagingDemirkol, A. et al. | 2006
- 369
-
Spatial Indexing Based on the Semi-approximation Scheme of MBRKim, J. / Im, S. / Kang, S.-W. / Hwang, C.-S. et al. | 2006
- 370
-
An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast EncryptionLee, D.-G. / Park, J.-S. / Lee, I.-Y. / Park, Y.-S. / Ahn, J.-C. et al. | 2006
- 373
-
Reusable Learning Objects (RLOs) for Computer Science StudentsBalci, B. / Inceoglu, M. M. et al. | 2006
- 375
-
A Novel Image Restoration Algorithm Based on High-Dimensional Space GeometryCao, W. / Xie, M.-f. / Wang, S. et al. | 2006
- 375
-
New Security Problem in RFID Systems "Tag Killing"Han, D.-G. / Takagi, T. / Kim, H. W. / Chung, K. I. et al. | 2006
- 379
-
Workflow Clustering Method Based on Process SimilarityJung, J.-Y. / Bae, J. et al. | 2006
- 380
-
Distributed Certificate Authority Under the GRID-Location Aided Routing ProtocolLim, J. / Nyang, D. / Kang, J. / Lee, K. / Lim, H. et al. | 2006
- 383
-
WebQuest Markup Language (WQML) for Sharable Inquiry-Based LearningFleissner, S. / Chan, Y.-Y. / Yuen, T. H. / Ng, V. et al. | 2006
- 384
-
A Fast Image Retrieval System Based on Color-Space and Color-Texture FeaturesLin, C.-H. / Chen, K.-H. / Chan, Y.-K. et al. | 2006
- 385
-
A Model for Security Vulnerability PatternKang, H. / Kim, K. / Hong, S. / Lee, D. H. et al. | 2006
- 388
-
An Efficient Hierarchical Group Key Management Protocol for a Ubiquitous Computing EnvironmentKim, S. / Ahn, T. / Oh, H. et al. | 2006
- 390
-
Distributed, Scalable and Reconfigurable Inter-grid Resource Sharing FrameworkRao, I. / Huh, E.-N. / Lee, S. Y. / Chung, T. et al. | 2006
- 393
-
Practical Boolean Operations on Point-Sampled ModelsQin, X. / Wang, W. / Li, Q. et al. | 2006
- 394
-
Generation of Dynamic Heart Model Based on 4D Echocardiographic ImagesChlebiej, M. / Mikolajczak, P. / Nowinski, K. / Scislo, P. / Bala, P. et al. | 2006
- 395
-
A New Timestamping Scheme Based on Skip ListsBlibech, K. / Gabillon, A. et al. | 2006
- 396
-
Efficient User Authentication and Key Agreement in Ubiquitous ComputingJuang, W.-S. et al. | 2006
- 400
-
Scalable Mobile Internet Servers: Selecting Useful Images from the Web for Mobile ServicesPark, D. / Hong, M. / Kang, E. / Ahn, S. / Mun, Y. / Lim, Y. et al. | 2006
- 402
-
Dynamic Brush Stroke Generation for an Impressionist EffectPark, Y. / Yoon, K. et al. | 2006
- 404
-
Object-Based Image Retrieval Using Dominant Color Pairs Between Adjacent RegionsPark, K. T. / Moon, Y. S. et al. | 2006
- 406
-
Single Sign-On and Key Establishment for Ubiquitous Smart EnvironmentsChan, Y.-Y. / Fleissner, S. / Liu, J. K. / Li, J. et al. | 2006
- 406
-
A Semi-fragile Watermarking Scheme Based on SVD and VQ TechniquesWu, H.-C. / Yeh, C.-P. / Tsai, C.-S. et al. | 2006
- 410
-
Image-Based 3D Face Modeling from Stereo ImagesMin, K. / Chun, J. et al. | 2006
- 410
-
A Macro Mobility Handover Performance Improvement Scheme for HMIPv6Lee, K. / Lim, Y. / Ahn, S. / Mun, Y. et al. | 2006
- 412
-
Real-Time Vision Tracking AlgorithmArce-Santana, E. R. / Luna-Rivera, J. M. / Campos-Delgado, D. U. / Pineda-Rico, U. et al. | 2006
- 416
-
New Constructions of Universal Hash Functions Based on Function SumsKhoo, K. / Heng, S.-H. et al. | 2006
- 416
-
A Light Weight Authentication Protocol for Digital Home NetworksYou, I. / Jung, E.-S. et al. | 2006
- 420
-
Cost Evaluation of Differentiated QoS Model in Mobile IPv6 NetworksKim, M. / Mun, Y. et al. | 2006
- 420
-
Perception-Guided Simplification for Real Time Navigation of Very Large-Scale Terrain EnvironmentsLi, S. / Ji, J. / Liu, X. / Wang, G. / Wu, E. et al. | 2006
- 422
-
Efficient Method to Perform Isomorphism Testing of Labeled GraphsHsieh, S.-M. / Hsu, C.-C. / Hsu, L.-F. et al. | 2006
- 424
-
Smart Home Microcontroller: Telephone InterfacingLeong, C.-S. / Goi, B.-M. et al. | 2006
- 426
-
Analysis of Fast Blockcipher-Based Hash FunctionsStanek, M. et al. | 2006
- 430
-
Proactive Self-healing System for Application Maintenance in Ubiquitous Computing EnvironmentPark, J. / Yoo, G. / Jeong, C. / Lee, E. et al. | 2006
- 431
-
3D Building Reconstruction from LIDAR DataLuo, Y. / Gavrilova, M. L. et al. | 2006
- 432
-
Camera Motion Parameter Estimation Technique Using 2D Homography and LM Method Based on Projective and Permutation Invariant FeaturesCha, J. / Kim, G. et al. | 2006
- 432
-
SPAD: A Session Pattern Anomaly Detector for Pre-alerting Intrusions in Home NetworkPark, S.-J. / Park, Y.-S. / Choi, Y.-R. / Kang, S. et al. | 2006
- 436
-
Application of LFSRs for Parallel Sequence Generation in Cryptologic AlgorithmsMukhopadhyay, S. / Sarkar, P. et al. | 2006
- 440
-
Efficient Computation of Elliptic Gabriel GraphLee, C. / Kim, D. / Shin, H. / Kim, D.-S. et al. | 2006
- 440
-
Home Gateway with Automated Real-Time Intrusion Detection for Secure Home NetworksOh, H. / Lim, J. / Chae, K. / Nah, J. et al. | 2006
- 441
-
Automatic Generation Technique of Three-Dimensional Model Corresponding to Individual VesselsLee, N.-Y. / Kim, G.-Y. / Choi, H.-I. et al. | 2006
- 441
-
An Approach to Developing Domain Architectures Based on Variability AnalysisMoon, M. / Yeom, K. et al. | 2006
- 446
-
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential CryptanalysisLee, C. / Kim, J. / Sung, J. / Hong, S. / Lee, S. et al. | 2006
- 448
-
The Performance Analysis of UWB System for the HD Multimedia Communication in a Home NetworkUhm, C.-Y. / Kim, S.-N. / Jung, K.-H. / Kang, D.-W. / Kim, K.-D. et al. | 2006
- 449
-
Systematic Sampling in Image-SynthesisSbert, M. / Rigau, J. / Feixas, M. / Neumann, L. et al. | 2006
- 450
-
Modulating Energy Distribution of Reflected Light Based on ImagesLi, Z. / Duan, G. / Sun, J. / Sun, L. / Lv, X. et al. | 2006
- 451
-
A Technical Assessment of SoC Methodologies and Requirements for a Full-Blown MethodologyCheun, D. W. / Yu, T. K. / Chang, S. H. / Kim, S. D. et al. | 2006
- 456
-
Extraction of Implicit Context Information in Ubiquitous Computing EnvironmentsPaik, J. / Youn, H. Y. / Kim, U. M. et al. | 2006
- 456
-
Design and Implementation of an FPGA-Based 1.452-Gbps Non-pipelined AES ArchitectureAlgredo-Badillo, I. / Feregrino-Uribe, C. / Cumplido, R. et al. | 2006
- 457
-
Aerodynamic Analysis on the Supersonic Separation of Air-Launching Rocker from the Mother PlaneJi, Y. M. / Kim, Y. S. / Lee, J. W. / Byun, Y. H. / Park, J. S. et al. | 2006
- 459
-
History-Based Selective Boolean Operations for Feature-Based Multi-resolution ModelingLee, S. H. / Lee, K. / Kim, S. et al. | 2006
- 462
-
Context-Aware Home Network Environment on Grid (CAHE-G)Jung, S.-H. / Lee, T.-D. / Jeong, C.-S. et al. | 2006
- 466
-
Security Weaknesses in Two Proxy Signature SchemesLu, J. et al. | 2006
- 466
-
Convergence of Context-Awareness and Augmented Reality for Ubiquitous Services and Immersive InteractionsLee, J. Y. / Rhee, G. W. / Kim, H. / Lee, K.-W. / Suh, Y.-H. / Kim, K. et al. | 2006
- 467
-
Effect of Grid Resolution on the Statistics of Passive Scalar in an Injection-Driven ChannelNa, Y. / Shin, D. / Lee, S. et al. | 2006
- 469
-
Path Finding Method for Various ApplicationsSong, J. / Seo, M. / Onosato, M. et al. | 2006
- 471
-
An Efficient Binding Update Scheme in HMIPv6Oh, J. / Mun, Y. et al. | 2006
- 475
-
An Adaptive Fault Tolerance System for Ubiquitous Computing Environments: AFTSKo, E. N. et al. | 2006
- 476
-
A Proposal of Extension of FMS-Based Mechanism to Find Attack PathsKim, B.-R. / Kim, K.-C. et al. | 2006
- 476
-
Test of Large Eddy Simulation in Complex Flow with High Schmidt NumberNa, Y. / Lee, S. et al. | 2006
- 480
-
Natural-Textured Mesh Stream Modeling from Depth Image-Based RepresentationKim, S. M. / Park, J. C. / Lee, K. H. et al. | 2006
- 480
-
A Scheduling Algorithm for Parallel Tasks in Peer-to-Peer SystemsJo, J. W. / Kim, J. S. et al. | 2006
- 483
-
Design and Implementation of Middleware for Context-Aware Service Discovery in Ubiquitous Computing EnvironmentsLee, K. M. / Kim, H.-J. / Shin, H.-J. / Shin, D.-R. et al. | 2006
- 484
-
High-End Modeling and Simulation of Cookoff of HMX-Based Energetic MaterialsYoh, J. J.-i. et al. | 2006
- 486
-
Comparative Analysis of IPv6 VPN Transition in NEMO EnvironmentsLim, H.-J. / Lee, D.-Y. / Chung, T.-M. et al. | 2006
- 487
-
Automatic Configuration of IPv6 Tunneling in a Dual Stack HostLee, J. / Koo, J. / Chung, J. / Mun, Y. / Lim, Y. / Shin, S.-J. / Ahn, S. et al. | 2006
- 490
-
Workload Characterization in Multiplayer Online GamesMorillo, P. / Orduna, J. M. / Fernandez, M. et al. | 2006
- 491
-
A Dynamic Channel Allocation Mechanism in Cellular Mobile Networks for Ubiquitous Environments Based on Time ConstraintsLee, S. / Lee, D. / Shim, D. / Cho, D. / Lee, W. et al. | 2006
- 491
-
Multiobjective Optimization Using Adjoint Gradient Enhanced Approximation Models for Genetic AlgorithmsKim, S. / Chung, H.-S. et al. | 2006
- 495
-
Estimation of Link Speed Using Pattern Classification of GPS Probe Car DataLee, S.-H. / Lee, B.-W. / Yang, Y.-K. et al. | 2006
- 497
-
A Short-Lived Key Selection Approach to Authenticate Data Origin of Multimedia StreamKang, N. / Kim, Y. et al. | 2006
- 499
-
Performance Analysis of Task Schedulers in Operating Systems for Wireless Sensor NetworksYi, S. / Min, H. / Heo, J. / Gu, B. / Cho, Y. / Hong, J. / Kim, J. / Lee, K. / Park, S. et al. | 2006
- 500
-
Delaunay-Based Polygon Morphing Across a Change in TopologyWu, X. / Johnstone, J. K. et al. | 2006
- 503
-
Development of Automated Generation Algorithm for Skipped Surface in Die DesignLee, S.-J. / Lee, S.-S. / Kim, J.-H. / Kwon, Y.-J. et al. | 2006
- 505
-
Storing and Querying of XML Documents Without Redundant Path InformationJeong, B.-S. / Lee, Y.-K. et al. | 2006
- 507
-
Weakest Link Attack on Single Sign-On and Its Case in SAML V2.0 Web SSOChan, Y.-Y. et al. | 2006
- 509
-
Wireless Sensor Networks: A Scalable Time SynchronizationShin, K.-Y. / Kim, J. W. / Park, I. / Mah, P. S. et al. | 2006
- 510
-
Jittering Reduction in Marker-Based Augmented Reality SystemsRubio, M. / Quintana, A. / Perez-Roses, H. / Quiros, R. / Camahort, E. et al. | 2006
- 512
-
Development of Requirement Driven Design Concept Selection Process in Aerospace SystemPark, H.-U. / Park, M.-Y. / Lee, S.-J. / Lee, J.-W. / Byun, Y.-H. et al. | 2006
- 515
-
Route Optimization Problems with Local Mobile Nodes in Nested Mobile NetworksKim, Y. B. / Park, Y.-J. / Kim, S. / Huh, E.-N. et al. | 2006
- 517
-
An Inter-domain Key Agreement Protocol Using Weak PasswordsLee, Y. / Nam, J. / Won, D. et al. | 2006
- 518
-
A Bias-Variance-Complexity Trade-Off Framework for Complex System ModelingYu, L. / Lai, K. K. / Wang, S. / Huang, W. et al. | 2006
- 519
-
A New Cluster Head Selection Scheme for Long Lifetime of Wireless Sensor NetworksLee, H. S. / Kim, K. T. / Youn, H. Y. et al. | 2006
- 522
-
A TMO-Based Tele-operation Model: Supporting Real-Time Applications in Grid EnvironmentsKim, C. / Jeong, K. / Lee, H. / Kim, M. / Cho, K. / Jeon, S. / Ahn, J. / Ju, H. et al. | 2006
- 525
-
Design of Network Aware Resource Allocation System for Grid ApplicationsChoi, J. / Yu, K.-S. / Park, J. / Mun, Y. et al. | 2006
- 527
-
A Practical Solution for Distribution Rights Protection in Multicast EnvironmentsPegueroles, J. / Fernandez, M. / Rico-Novella, F. / Soriano, M. et al. | 2006
- 528
-
A Neural Network Strategy for 3D Surface RegistrationLiu, H. / Yan, J. / Zhang, D. et al. | 2006
- 529
-
Two-Dimensional Priority Scheduling Scheme for Open Real-Time SystemsTan, P. / Jin, H. / Zhang, M. et al. | 2006
- 531
-
Design Trade-Offs and Power Reduction Techniques for High Performance Circuits and SystemJeong, T. T. / Ambler, A. P. et al. | 2006
- 534
-
Traffic Groomed Multicasting in Sparse-Splitting WDM Backbone NetworksYoon, Y.-R. / Lee, T.-J. / Chung, M. Y. / Choo, H. et al. | 2006
- 537
-
Audit-Based Access Control in Nomadic Wireless EnvironmentsPalmieri, F. / Fiore, U. et al. | 2006
- 537
-
Parallel Hierarchical Methods for Complex Systems OptimizationNiewiadomska-Szynkiewicz, E. et al. | 2006
- 537
-
Cavitation Flow Analysis of Axisymmetric Bodies Moving in the WaterLee, C. / Byun, D. et al. | 2006
- 539
-
An Enhanced Dynamic Voltage Scaling Scheme for Energy-Efficient Embedded Real-Time Control SystemsXia, F. / Sun, Y. et al. | 2006
- 545
-
2-Way Text Classification for Harmful Web DocumentsKim, Y. / Nam, T. / Won, D. et al. | 2006
- 546
-
Cost - Time Trade Off Models Application to Crashing Flow Shop Scheduling ProblemsBagherpour, M. / Noori, S. / Sadjadi, S. J. et al. | 2006
- 546
-
Design and Implementation of Semantic Web Search System Using Ontology and Anchor TextCho, N.-d. / Lee, E.-s. et al. | 2006
- 547
-
Numerical Modelling of Coastal CurrentsBalas, L. / Inan, A. / Yildiz, I. et al. | 2006
- 549
-
Adaptive Load Balancing Mechanism for Server ClusterPark, G. / Gu, B. / Heo, J. / Yi, S. / Han, J. / Park, J. / Min, H. / Piao, X. / Cho, Y. / Park, C. W. et al. | 2006
- 552
-
Integration of a Structural Index with a Structural Join for Accelerating Path QueriesKim, J. / Lee, S. / Kwon, O.-C. et al. | 2006
- 554
-
The ASALB Problem with Processing Alternatives Involving Different Tasks: Definition, Formalization and ResolutionCapacho, L. / Pastor, R. et al. | 2006
- 555
-
Design Progress Management for Security Requirements in Ubiquitous Computing Using COQUALMOLee, E. S. / Lee, S. H. et al. | 2006
- 556
-
A Novel Model for Bacterial Foraging in Varying EnvironmentsTang, W. J. / Wu, Q. H. / Saunders, J. R. et al. | 2006
- 558
-
Design and Performance Analysis of a Message Scheduling Scheme for WLAN-Based Cluster ComputingLee, J. / Kang, M. / Kang, E. / Park, G. / Kim, H. / Kim, C. / Kim, S. / Hong, J. et al. | 2006
- 562
-
Thin-Client Computing for Supporting the QoS of Streaming Media in Mobile DevicesLee, J. / Seo, D. / Kim, Y. / Choi, C. / Choi, H. / Jung, I. et al. | 2006
- 564
-
Satisfying Constraints for Locating Export Containers in Port Container TerminalsKim, K. H. / Lee, J.-S. et al. | 2006
- 565
-
Web Document Classification Using Changing Training Data SetPark, G. / Kim, S. et al. | 2006
- 566
-
Stochastic Modeling of Cytoplasmic Reactions in Complex Biological SystemsGhosh, P. / Ghosh, S. / Basu, K. / Das, S. / Daefler, S. et al. | 2006
- 567
-
A Method for Efficient Malicious Code Detection Based on Conceptual SimilarityKim, S. / Choi, C. / Choi, J. / Kim, P. / Kim, H. et al. | 2006
- 572
-
MPLS Alternate Path Restoration with Guaranteed BandwidthLee, K.-H. / Kim, J.-S. et al. | 2006
- 574
-
A Price Discrimination Modeling Using Geometric ProgrammingSadjadi, S. J. / Ziaee, M. et al. | 2006
- 575
-
Study on Contents Protection in M-Learning EnvironmentSong, J. / Kang, M. / Kim, S. et al. | 2006
- 577
-
Modelling of Complex Cryptographic Systems in Terms of Simple Cellular AutomataFuster-Sabater, A. / Caballero-Gil, P. / Pazo-Robles, M. E. et al. | 2006
- 577
-
A Minimized Test Pattern Generation Method for Ground Bounce Effect and Delay Fault DetectionKim, M. / Lee, J. / Hong, W. / Chang, H. et al. | 2006
- 581
-
Hybrid Evolutionary Algorithms for the Rectilinear Steiner Tree Problem Using Fitness EstimationYang, B. et al. | 2006
- 582
-
A Study on the WBTC and NBTC for CDMA Mobile Communications NetworksNoh, S.-K. et al. | 2006
- 584
-
Design of Security Session Reuse in Content-Based Load Distribution ServerKim, S. / Han, K. et al. | 2006
- 584
-
Efficient Exponentiation in GF(p^m) Using the Frobenius MapLee, M.-K. / Kim, H. / Hong, D. / Chung, K. et al. | 2006
- 586
-
Modeling Supply Chain Complexity Using a Distributed Multi-objective Genetic AlgorithmAl-Mutawah, K. / Lee, V. / Cheung, Y. et al. | 2006
- 590
-
Data Reduction for Instance-Based Learning Using Entropy-Based PartitioningSon, S.-H. / Kim, J.-Y. et al. | 2006
- 591
-
Design of POC System in Ubiquitous EnvironmentKim, S. / Park, G. et al. | 2006
- 591
-
A Secure Multicast Routing Protocol for Ad Hoc Networks with Misbehaving NodesShim, Y.-C. et al. | 2006
- 594
-
A Dual-Channel MAC Protocol Using Directional Antennas in Location Aware Ad Hoc NetworksHan, D. / Jwa, J. / Kim, H. et al. | 2006
- 596
-
Different Responses of Two Types of Class II Neurons for Fluctuated InputsHosaka, R. / Sakai, Y. / Ikeguchi, T. / Yoshizawa, S. et al. | 2006
- 600
-
The Performance Evaluation of OFDM/HL-16QAM System for Optimizing Image Transmission Quality in Wireless FadingKwak, J.-m. / Lee, Y.-s. / Cho, S.-e. et al. | 2006
- 600
-
Coordinated Inventory Models with Compensation Policy in a Three Level Supply ChainLee, J. H. / Moon, I. K. et al. | 2006
- 601
-
Seamless and Reliable Mobile Multicast Mechanism in Next Generation NetworksRhee, C. / Han, S. et al. | 2006
- 603
-
A Power-Efficient Design Employing an Extreme Condition Detector for Embedded SystemsOh, H. / Ahn, H. / Hong, J. et al. | 2006
- 605
-
Branching Method for Computation of Probability of Given Data Stream TransmissionMurzin, M. Y. / Rodionov, A. S. et al. | 2006
- 609
-
Reliable Evaluations of URL NormalizationKim, S. J. / Jeong, H. S. / Lee, S. H. et al. | 2006
- 610
-
Using Constraint Satisfaction Approach to Solve the Capacity Allocation Problem for Photolithography AreaChung, S.-H. / Huang, C.-Y. / Lee, A. H.-I. et al. | 2006
- 611
-
Adaptive Selection of MIPv6 and Hierarchical MIPv6 for Minimizing Signaling CostKim, Y. / Mun, Y. et al. | 2006
- 612
-
An Agent-Based Approach to Immune ModellingPerrin, D. / Ruskin, H. J. / Burns, J. / Crane, M. et al. | 2006
- 612
-
An Efficient Delay Metric on RC Interconnects Under Saturated Ramp InputsKim, K.-Y. / Kim, S.-Y. et al. | 2006
- 618
-
Enhanced Misuse Case Model: A Security Requirement Analysis and Specification ModelChoi, S.-s. / Kim, S.-y. / Lee, G.-s. et al. | 2006
- 621
-
DIASCOPE: Distributed Adaptation System Using Cooperative Proxies in Ubiquitous NetworkLee, S. / Lee, E. et al. | 2006
- 621
-
Scheduling an R&D Project with Quality-Dependent Time SlotsVanhoucke, M. et al. | 2006
- 622
-
Low Power Microprocessor Design for Embedded SystemsLee, S.-W. / Park, N. / Gaudiot, J.-L. et al. | 2006
- 622
-
Comparison of Homogeneous and Heterogeneous Motorised Traffic at Signalised and Two-Way Stop Control Single Lane IntersectionDeo, P. / Ruskin, H. J. et al. | 2006
- 626
-
An Analysis of Policy Provisioning Complexity in Accordance with the Application Attributes of the Policy-Based NetworkLim, H.-J. / Kim, M. / Lee, D.-Y. / Chung, T.-M. et al. | 2006
- 631
-
The Bottleneck Tree Alignment ProblemsChen, Y. H. / Tang, C. Y. et al. | 2006
- 631
-
A Novel Method for Energy-Efficient Clustering in Wireless Sensor NetworksLee, S.-H. / Park, G.-W. / Cho, Y.-Z. et al. | 2006
- 631
-
History Length Adjustable gshare Predictor for High-Performance Embedded ProcessorKwak, J. W. / Jhang, S. T. / Jhon, C. S. et al. | 2006
- 633
-
A New Algorithm for Complex Stochastic Boolean SystemsGonzalez, L. et al. | 2006
- 635
-
Privacy Preserving Unsupervised Clustering over Vertically Partitioned DataTasoulis, D. K. / Laskari, E. C. / Meletiou, G. C. / Vrahatis, M. N. et al. | 2006
- 638
-
Performance Study of a Genetic Algorithm for Sequencing in Mixed Model Non-permutation Flowshops Using Constrained BuffersFarber, G. / Moreno, A. M. C. et al. | 2006
- 639
-
Security Engineering Methodology Based on Problem Solving TheoryKim, S. / Lee, H. J. et al. | 2006
- 641
-
iSCSI Multi-connection and Error Recovery Method for Remote Storage System in Mobile ApplianceAllayear, S. M. / Park, S. S. et al. | 2006
- 644
-
Process Development Methodology for U-Integrated Management SystemChoi, S.-M. / Lee, M. / Yoo, C.-J. / Chang, O.-B. et al. | 2006
- 644
-
Theoretical Steps Towards Modelling Resilience in Complex SystemsHawes, C. / Reed, C. et al. | 2006
- 649
-
Optimizing Relative Weights of Alternatives with Fuzzy Comparative JudgmentYeh, C.-H. / Chang, Y.-H. et al. | 2006
- 649
-
Design and Implementation of an Ontology Algorithm for Web Documents ClassificationWei, G. / Yu, J. / Ling, Y. / Liu, J. et al. | 2006
- 651
-
Distributed Coordination and QoS-Aware Fair Queueing in Wireless Ad Hoc NetworksAlam, M. M. / Mamun-or-Rashid, M. / Hong, C. S. et al. | 2006
- 654
-
Collaborative Multidiscipline/Multiscale Analysis, Modeling, Simulation and Integration in Complex Systems: System BiologyWheeler, T. J. et al. | 2006
- 655
-
A Study on Agent-Based Integrated Security Management System for Managing Heterogeneous Firewall SystemsLee, D.-Y. / Lim, H.-J. / Chung, T. M. et al. | 2006
- 659
-
Model and Solution for the Multilevel Production-Inventory System Before Ironmaking in Shanghai Baoshan Iron and Steel ComplexLiu, G. / Tang, L. et al. | 2006
- 659
-
Automatic Test Approach of Web Application for Security (AutoInspect)Choi, K. C. / Lee, G. H. et al. | 2006
- 661
-
Lightweight Bindings for Mobile RoutersAhn, Y. / Lee, T.-J. / Choo, H. et al. | 2006
- 665
-
On the Structuring of the Computational Chemistry Virtual Organization COMPCHEMLagana, A. / Riganelli, A. / Gervasi, O. et al. | 2006
- 665
-
Optimization of Fuzzy Rules: Integrated Approach for Classification ProblemsKang, Y. / Lee, M. / Lee, Y. / Gatton, T. M. et al. | 2006
- 668
-
A Coordination Algorithm for Deciding Order-Up-To Level of a Serial Supply Chain in an Uncertain EnvironmentWang, K.-J. / Chih, W.-H. / Hwang, K. et al. | 2006
- 669
-
A Scenario-Based User-Oriented Integrated Architecture for Supporting Interoperability Among Heterogeneous Home Network MiddlewaresKim, M. C. / Kim, S. J. et al. | 2006
- 671
-
A Balanced Deployment Algorithm for Mobile Sensor NetworksJang, K.-W. / Kim, B.-S. et al. | 2006
- 675
-
Computing Molecular Energy Surfaces on a GridStorchi, L. / Tarantelli, F. / Lagana, A. et al. | 2006
- 675
-
A Cooperation Model Using Reinforcement Learning for Multi-agentLee, M. / Lee, J. / Jeong, H.-J. / Lee, Y. / Choi, S. / Gatton, T. M. et al. | 2006
- 678
-
Optimization of Performance of Genetic Algorithm for 0-1 Knapsack Problems Using Taguchi MethodAnagun, A. S. / Sarac, T. et al. | 2006
- 679
-
Session Key Agreement Protocol for End-to-End Security in MANETLim, J.-M. / Park, C.-S. et al. | 2006
- 681
-
A Merging Clustering Algorithm for Mobile Ad Hoc NetworksDagdeviren, O. / Erciyes, K. / Cokuslu, D. et al. | 2006
- 682
-
Development of Network Event Analysis Algorithm Applying Association RuleHan, S. / Soh, W. et al. | 2006
- 684
-
Electronic States in Three Dimensional Quantum Dot/Wetting Layer StructuresMarkiewicz, M. / Voss, H. et al. | 2006
- 687
-
Process-Oriented DFM System for Ubiquitous DevicesKim, Y. / Lim, T. / Kim, D. / Jung, C. / Jin, H. et al. | 2006
- 688
-
Truck Dock Assignment Problem with Time Windows and Capacity Constraint in Transshipment Network Through CrossdocksLim, A. / Ma, H. / Miao, Z. et al. | 2006
- 690
-
A New Secure Oblivious Transfer ProtocolKim, S.-g. / Kang, H.-j. et al. | 2006
- 691
-
Context-Aware Cross Layered Multimedia Streaming Based on Variable Packet Size TransmissionLee, H. S. / Youn, H. Y. / Jung, H. et al. | 2006
- 694
-
A Web Based Application to Fit Potential Energy Functionals to ab Initio ValuesArteconi, L. / Lagana, A. / Pacifici, L. et al. | 2006
- 697
-
A Study on the Application of BPM Systems for Implementation of RosettaNet Based e-LogisticsJi, Y. G. / Park, C. / Kim, M. et al. | 2006
- 698
-
An Entropy Based Group Setup Strategy for PCB AssemblyJeong, I.-J. et al. | 2006
- 700
-
Analysis of Security Session Reusing in Distribution Server SystemKim, T.-h. / Kim, S. / Park, H.-U. / Kim, M.-s. et al. | 2006
- 701
-
Adaptive Mobile Checkpointing Facility for Wireless Sensor NetworksYi, S. / Heo, J. / Cho, Y. / Hong, J. et al. | 2006
- 701
-
Dynamic Load-Balancing for the STEM-II Air Quality ModelMourino, J. C. / Martin, M. J. / Gonzalez, P. / Doallo, R. et al. | 2006
- 707
-
Information Security Management System for SMB in Ubiquitous ComputingChang, H. / Kim, J. / Lim, S. et al. | 2006
- 708
-
Cross-Facility Production and Transportation Planning Problem with Perishable InventoryEksioglu, S. D. / Jin, M. et al. | 2006
- 708
-
Clustered OFDMA in the Multi-path Fading ChannelLee, K. et al. | 2006
- 710
-
NeMRI - Based Multicasting in Network MobilityKim, M. / Lee, T.-J. / Choo, H. et al. | 2006
- 711
-
New Molecular Mechanism of Dextran Extension in Single Molecule AFMNeelov, I. / Adolf, D. / McLeish, T. et al. | 2006
- 716
-
A Study on the Development of Usability Evaluation Framework (Focusing on Digital TV)Lee, H. J. / Leem, C. S. / Kim, S. et al. | 2006
- 717
-
Distribution Antenna Diversity System According to Adaptive Correlation Method for OFDM-DS/CDMA in a Frequency Selective Fading ChannelLee, K. / Huh, E. et al. | 2006
- 718
-
A Unified Framework for the Analysis of M/G/1 Queue Controlled by WorkloadLee, H. W. / Lee, S. W. / Seo, W. J. / Cheon, S. H. / Jeon, J. et al. | 2006
- 720
-
Improving TCP Throughput and Fairness over Multi-rate IEEE 802.11 Wireless LANsLee, S.-D. / Kwon, D.-H. / Kim, W.-J. / Suh, Y.-J. et al. | 2006
- 721
-
Atom-Bond Additive Potentials for Benzene-Rare Gas ClustersAlberti, M. / Lagana, A. / Pirani, F. / Porrini, M. / Cappelletti, D. et al. | 2006
- 725
-
MIDAS: Detection of Non-technical Losses in Electrical Consumption Using Neural Networks and Statistical TechniquesMonedero, I. / Biscarri, F. / Leon, C. / Biscarri, J. / Millan, R. et al. | 2006
- 726
-
Designing Aspectual Architecture Views in Aspect-Oriented Software DevelopmentCordero, R. L. / Salavert, I. R. / Torres-Jimenez, J. et al. | 2006
- 728
-
Tabu Search Heuristics for Parallel Machine Scheduling with Sequence-Dependent Setup and Ready TimesKim, S.-I. / Choi, H.-S. / Lee, D.-H. et al. | 2006
- 730
-
Local Source Routing Based Route Optimization in Nested Mobile NetworksKim, Y. / Woo, S. / Kang, S. / Park, W. / An, S. et al. | 2006
- 731
-
A Simplified Myoglobin Model for Molecular Dynamics CalculationsFilomia, F. / Lago, N. F. et al. | 2006
- 735
-
Hyperbolic Voronoi DiagramNilforoushan, Z. / Mohades, A. et al. | 2006
- 736
-
Process and Techniques to Generate Components in MDA/CB-PIM for AutomationMin, H. G. / Kim, S. D. et al. | 2006
- 738
-
Parallel Calculation of Propane Bulk PropertiesCostantini, A. / Lagana, A. / Pirani, F. et al. | 2006
- 738
-
The Maximum Integer Multiterminal Flow ProblemBentz, C. et al. | 2006
- 740
-
An Efficient Movement Management Method of Mobile Node in Mobile IPv6Shin, C. / Kim, B. / Mun, Y. et al. | 2006
- 743
-
Effects of Confinement on Chemical Reaction Equilibrium in Nanoporous MaterialsSmith, W. R. / Lisal, M. / Brennan, J. K. et al. | 2006
- 744
-
Ab-Initio Multi-reference Study of a Bistable Spiro MoleculeHelal, W. / Bories, B. / Evangelisti, S. / Leininger, T. / Maynau, D. et al. | 2006
- 746
-
An Ontology Definition Framework for Model Driven DevelopmentDuan, Y. / Fu, X. / Hu, Q. / Gu, Y. et al. | 2006
- 748
-
Routing with Early Ordering for Just-In-Time Manufacturing SystemsJin, M. / Liu, K. / Eksioglu, B. et al. | 2006
- 750
-
Homogeneous 2-Hops Broadcast in 2DDas, G. K. / Das, S. / Nandy, S. C. et al. | 2006
- 752
-
On the Algorithm of Calculation of the Equilibrium Gas-Phase Concentration at the Particle Surface in the Kinetic Models of Aerosol DynamicsStankova, E. N. et al. | 2006
- 752
-
Multi-channel Estimation in Multiple Antenna MB-OFDM UWB System for Home Entertainment NetworkBaek, M.-S. / Yeo, S.-Y. / Jang, B.-J. / You, Y.-H. / Song, H.-K. et al. | 2006
- 756
-
An AHP-Based Evaluation Model for Service CompositionXie, X. / Chen, K. et al. | 2006
- 757
-
A Variant of the Constant Step Rule for Approximate Subgradient Methods over Nonlinear NetworksMijangos, E. et al. | 2006
- 757
-
Study of the Passage of an H^+ Ion Along a Carbon Nanotube Using Quantum Wavepacket DynamicsSkouteris, D. / Lagana, A. et al. | 2006
- 760
-
A Study on the Transportation Period of the EPG Data Specification in Terrestrial DMBCho, M. / Hwang, J. / Park, G.-L. / Kim, J. / Jang, T. / Oh, J. / Chae, Y. S. et al. | 2006
- 762
-
Compiler-Optimized Kernels: An Efficient Alternative to Hand-Coded Inner KernelsHerrero, J. R. / Navarro, J. J. et al. | 2006
- 763
-
Invariance Properties of Practical Test-Functions Used for Generating Asymmetrical PulsesPusca, S. et al. | 2006
- 767
-
On the Optimal Buffer Allocation of an FMS with Finite In-Process BuffersKwon, S.-T. et al. | 2006
- 767
-
Construction of Quality Test and Certification System for Package SoftwareLee, H.-Y. / Yang, H.-S. / Hwang, S.-H. et al. | 2006
- 769
-
Cluster-Based Certificate Chain for Mobile Ad Hoc NetworksHahn, G. / Kwon, T. / Kim, S. / Song, J. et al. | 2006
- 771
-
Simulating Superradiant Laser Pulses Using Partial Fraction Decomposition and Derivative ProceduresToma, T. / Pusca, S. / Morarescu, C. et al. | 2006
- 772
-
Noise Subspace Fuzzy C-Means Clustering for Robust Speech RecognitionGorriz, J. M. / Ramirez, J. / Segura, J. C. / Puntonet, C. G. / Gonzalez, J. J. et al. | 2006
- 777
-
Design of an On-Line Intrusion Forecast System with a Weather Forecasting ModelChung, Y. / Kim, I. / Lee, C. / Im, E. G. / Won, D. et al. | 2006
- 777
-
Optimization Problems in the Simulation of Multifactor Portfolio Credit RiskKang, W. / Lee, K. et al. | 2006
- 779
-
Optimization of Base Stations Positioning in Mobile NetworksSohn, S. / Jo, G.-S. et al. | 2006
- 779
-
Simulating Delayed Pulses in Organic MaterialsLazar, B. / Sterian, A. / Pusca, S. / Paun, V. / Toma, C. / Morarescu, C. et al. | 2006
- 780
-
Using Box-Muller with Low Discrepancy PointsPillards, T. / Cools, R. et al. | 2006
- 785
-
Wave Propagation of Shannon WaveletsCattani, C. et al. | 2006
- 785
-
Two-Server Network Disconnection ProblemChoi, B.-C. / Hong, S.-P. et al. | 2006
- 787
-
Goal Programming Approach to Compose the Web Service Quality of ServiceCho, D. / Kim, C. / Choo, M. / Kang, S.-H. / Lee, W. et al. | 2006
- 788
-
Design of Maximum Remaining Energy Constrained Directed Diffusion Routing for Wireless Sensor NetworksHwang, A. K. / Lee, J. Y. / Kim, B. C. et al. | 2006
- 789
-
A Fast Integration Method and Its Application in a Medical Physics ProblemLi, S. / de Doncker, E. / Kaugars, K. / Li, H. S. et al. | 2006
- 793
-
One-Sided Monge TSP Is NP-HardDeineko, V. / Tiskin, A. et al. | 2006
- 794
-
Finite Element Analysis of the Thermoforming Manufacturing Process Using the Hyperelastic Mooney-Rivlin ModelCarlone, P. / Palazzo, G. S. et al. | 2006
- 796
-
A Timestamp-Based Optimistic Concurrency Control for Handling Mobile TransactionsChoi, H.-J. / Jeong, B.-S. et al. | 2006
- 798
-
Healthcare Home Service System Based on Distributed Object Group FrameworkShin, C.-S. / Lee, C.-S. / Joo, S.-C. et al. | 2006
- 798
-
Payment in a Kiosk Centric Model with Mobile and Low Computational Power DevicesIsaac, J. T. / Camara, J. S. / Manzanares, A. I. / Castro, M. C. et al. | 2006
- 802
-
On Direct Methods for Lexicographic Min-Max OptimizationOgryczak, W. / Sliwinski, T. et al. | 2006
- 804
-
Analysis of Compatibility with Experimental Data of Fractal Descriptions of the Fracture ParametersIordache, D. / Pusca, S. / Toma, G. / Paun, V. / Sterian, A. / Morarescu, C. et al. | 2006
- 806
-
Effects of PRF and Slot Interval on the Data Throughput of PPM-Based Ultra Wide-Band Systems in Multi-path ChannelsIm, S. / Park, T. et al. | 2006
- 808
-
Survivable Mechanism for IEEE 802.11 WLAN Improvementsde Deus, F. E. / Puttini, R. S. / Molinaro, L. / Kabara, J. / Villalba, L. J. G. et al. | 2006
- 808
-
A Learning Attitude Evaluation System for Learning Concentration on Distance EducationChoi, B. / Kim, C. et al. | 2006
- 812
-
Multivariate Convex Approximation and Least-Norm Convex Data-SmoothingSiem, A. Y. D. / Hertog, D. d. / Hoffmann, A. L. et al. | 2006
- 814
-
Inner Potential of Generating Pulses as a Consequence of Recurrent Principles and Specific Computing ArchitectureMorarescu, C. et al. | 2006
- 816
-
Hierarchical Cluster Configuration Scheme for Scalable Ad Hoc NetworksLee, K.-H. / Hwang, C.-S. et al. | 2006
- 818
-
A Calculation Method for Direction Based Handover Rate in Cell Based Mobile NetworksWu, M. / Kim, C. et al. | 2006
- 819
-
Proposal of a System for Searching and Indexing Heterogeneous Vulnerabilities Databasesde Oliveira, R. / Buiati, F. / Villalba, L. J. G. / Almendra, D. / Pulcineli, L. / de Sousa, R. / Abbas, C. J. B. et al. | 2006
- 821
-
Phenomenological and State Coefficients in Viscoanelastic Medium of Order One (with Memory)Ciancio, V. / Farsaci, F. / Bartolotta, A. et al. | 2006
- 822
-
Linear Convergence of Tatonnement in a Bertrand OligopolyGallego, G. / Huh, W. T. / Kang, W. / Phillips, R. et al. | 2006
- 827
-
A Route Optimization Via Recursive CoA Substitution for Nested Mobile NetworksKim, Y. B. / Lee, K.-Y. / Ku, H. / Huh, E.-N. et al. | 2006
- 828
-
The Classification of the Software Quality by Employing the Tolerence ClassChoi, W.-K. / Lee, S.-J. / Chung, I.-Y. / Bae, Y.-G. et al. | 2006
- 828
-
Analysis of Singularities by Short Haar Wavelet TransformCiancio, A. / Cattani, C. et al. | 2006
- 829
-
Performance Analysis of Dynamic Host Isolation System in Wireless Mobile NetworksKim, H. / Ahn, S. / Choi, J. et al. | 2006
- 832
-
Design for Using Purpose of Assembly-GroupMok, H.-S. / Han, C.-H. / Lim, C.-H. / Hong, J.-H. / Cho, J.-R. et al. | 2006
- 835
-
Components Searching System Using Component Identifiers and Request SpecificsPark, J.-Y. / Kim, G.-J. / Song, Y.-J. et al. | 2006
- 837
-
Energy-Aware Routing Algorithm Using Backup Route for Ad-Hoc NetworksJung, S.-W. / Lee, C.-W. et al. | 2006
- 839
-
Spatial Aspects of Interaction Between High-Energy Pulses and Waves Considered as Suddenly Emerging PhenomenaToma, A. / Pusca, S. / Morarescu, C. et al. | 2006
- 839
-
Meta-model Driven Collaborative Object Analysis Process for Production Planning and Scheduling DomainKim, C. O. / Baek, J.-G. / Jun, J. et al. | 2006
- 841
-
A Conditional Gaussian Martingale Algorithm for Global OptimizationEsquivel, M. L. et al. | 2006
- 844
-
Software Architecture Generation on UMLKim, H.-K. et al. | 2006
- 847
-
Noise Level Estimation Using Haar Wavelet Packet Trees for Sensor Robust Outlier DetectionMercorelli, P. / Frick, A. et al. | 2006
- 847
-
Mitigating Broadcast Storms in Stateless Address Auto-configuring MANETsMukhtar, S. / Akbar, A. H. / Chaudhry, S. A. / Yoon, W.-S. / Kim, K.-H. / Hong, S.-K. et al. | 2006
- 851
-
Response Against Hacking and Malicious Code in P2PLee, W. / Kim, S. / Kim, B. et al. | 2006
- 852
-
Finding the Number of Clusters Minimizing Energy Consumption of Wireless Sensor NetworksKim, H. / Youn, H. Y. et al. | 2006
- 853
-
Distributed Programming Developing Tool Based on Distributed Object Group FrameworkJeong, C.-W. / Kim, D.-S. / Lee, G.-Y. / Joo, S.-C. et al. | 2006
- 856
-
Routing with Maximum EDPs and Wavelength Assignment with Path Conflict GraphsYoon, W. J. / Kim, D. H. / Chung, M. Y. / Lee, T.-J. / Choo, H. et al. | 2006
- 857
-
A Theoretical Multiscale Analysis of Electrical Field for Fuel Cells Stack StructuresCattani, C. / Mercorelli, P. / Villecco, F. / Harbusch, K. et al. | 2006
- 858
-
Two Efficient and Secure Authentication Schemes Using Smart CardsLee, Y. / Nam, J. / Kim, S. / Won, D. et al. | 2006
- 862
-
A Two-Echelon Deteriorating Production-Inventory Newsboy Model with Imperfect Production ProcessWee, H.-M. / Chung, C.-J. et al. | 2006
- 864
-
A Study on Automatic Code Generation Tool from Design Patterns Based on the XMISeo, Y.-J. / Song, Y.-J. et al. | 2006
- 865
-
Tangent-Linear Models by Augmented LL-ParsersNaumann, U. / Vehreschild, A. et al. | 2006
- 866
-
Energy Conserving Security Mechanism for Wireless Sensor NetworkHamid, M. A. / Rahman, M. M. / Hong, C. S. et al. | 2006
- 867
-
Location-Aware Agent Using Data Mining for the Distributed Location-Based ServicesLee, J. / Mateo, R. M. A. / Gerardo, B. D. / Go, S.-H. et al. | 2006
- 873
-
Design of Opportunity Tree for Organization's Process Strategy Decision-Making Based on SPICE Assessment ExperienceSong, K. W. / Kim, H. K. / Lee, K. W. et al. | 2006
- 875
-
Mathematical Modeling and Tabu Search Heuristic for the Traveling Tournament ProblemLee, J. H. / Lee, Y. H. et al. | 2006
- 875
-
GIS-T Web Services: A New Design Model for Developing GIS Customized ITS Application SystemsLu, X. et al. | 2006
- 876
-
Inter-domain Security Management to Protect Legitimate User Access from DDoS AttacksKim, S. K. / Min, B. J. et al. | 2006
- 877
-
An Empirical Development Case of a Software-Intensive System Based on the Rational Unified ProcessLee, K. et al. | 2006
- 883
-
SUALPPA Scheme: Enhanced Solution for User Authentication in the GSM SystemPark, M.-O. / Park, D.-W. et al. | 2006
- 885
-
An Algorithm on Extraction of Saline-Alkalized Land by Image Segmentation Based on ETM^+ ImageJianping, L. / Bai, Z. / Shuqing, Z. / Zongming, W. et al. | 2006
- 885
-
An Integrated Production-Inventory Model for Deteriorating Items with Imperfect Quality and Shortage Backordering ConsiderationsWee, H. M. / Yu, J. C. P. / Wang, K. J. et al. | 2006
- 885
-
An Authentication Scheme Between Wireless LAN and Mobile IPv6 During HandoverMun, Y. / Kim, M. et al. | 2006
- 887
-
Color Preference and Personality Modeling Using Fuzzy Reasoning RuleOh, A.-S. / Lho, T.-J. / Kwon, J.-W. / Kim, K.-B. et al. | 2006
- 893
-
Design of Mobile Video Player Based on the WIPI PlatformNoh, H.-M. / Jeong, S.-K. / Yoo, C.-J. / Chang, O.-B. / Kim, E.-M. / Choi, J.-R. et al. | 2006
- 895
-
The Development of Reliability Verification Tool of RFID Tag for Effective Product Control SystemsKim, K.-U. / Hwang, H.-S. / Kim, B.-J. / Jeong, S.-H. / Kim, C.-S. et al. | 2006
- 895
-
Mechanism of the Secure MAP Discovery in Hierarchical MIPv6Choi, J. / Mun, Y. et al. | 2006
- 895
-
GIS Web Service Using Context Information in Mobile EnvironmentsLi, X. / Shin, W. / Li, L. / Yoo, S. B. et al. | 2006
- 898
-
A Clustering Algorithm Using the Ordered Weight Sum of Self-Organizing Feature MapsLee, J.-S. / Kang, M.-K. et al. | 2006
- 899
-
Discovering Patterns Based on Fuzzy Logic TheoryGerardo, B. D. / Lee, J. / Joo, S.-C. et al. | 2006
- 904
-
The System for Predicting the Traffic Flow with the Real-Time Traffic InformationCho, M.-G. / Yu, Y. J. / Kim, S. et al. | 2006
- 905
-
An Efficient Authentication Mechanism for Fast Mobility Service in MIPv6Lee, S.-Y. / Huh, E.-N. / Kim, Y.-W. / Lee, K. et al. | 2006
- 905
-
Avoidance of State Explosion Using Dependency Analysis in Model Checking Control Flow ModelPark, S. / Kwon, G. et al. | 2006
- 908
-
Global Optimization of the Scenario Generation and Portfolio Selection ProblemsParpas, P. / Rustem, B. et al. | 2006
- 909
-
Metrics Design for Software Process Assessment Based on ISO/IEC 15504Hwang, S.-M. / Yeom, H.-G. et al. | 2006
- 912
-
Design and Implementation of Web Usage Mining System Using Page ScrollKim, I. L. / Choi, B.-J. / Park, K.-S. et al. | 2006
- 914
-
Versioning Based Spatial Record Management Technique for Non-blocking Search Operations of Moving ObjectsKim, H. S. / Kim, H. T. / Kim, M. K. / Kim, G. B. / Bae, H. Y. et al. | 2006
- 915
-
An Improved Fingerprint-Based Remote User Authentication Scheme Using Smart CardsLee, Y. / Kwon, T. et al. | 2006
- 917
-
A Quantitative Evaluation Model Using the ISO/IEC 9126 Quality Model in the Component Based Development ProcessLee, K. / Lee, S. J. et al. | 2006
- 918
-
A Generalized Fuzzy Optimization Framework for R&D Project Selection Using Real Options ValuationKarsak, E. E. et al. | 2006
- 921
-
A Wavelet Packets Watermarking Algorithm Based on Chaos EncryptionCong, J. / Jiang, Y. / Qu, Z. / Zhang, Z. et al. | 2006
- 922
-
A Security Architecture for Adapting Multiple Access Control Models to Operating SystemsKim, J.-S. / Lee, S. / Kim, M. / Seo, J.-H. / Noh, B.-N. et al. | 2006
- 923
-
Route Optimization with AAA in Network MobilityJeong, K. / Lee, T.-J. / Lee, S. / Choo, H. et al. | 2006
- 927
-
Component Specification Model for the Web ServicesKim, H.-K. / Park, E.-J. et al. | 2006
- 928
-
Supply Chain Network Design and Transshipment Hub Location for Third Party Logistics ProvidersKwon, S. / Park, K. / Lee, C. / Kim, S.-S. / Kim, H.-J. / Liang, Z. et al. | 2006
- 929
-
On a Face Recognition by the Modified Nonsingular Discriminant Analysis for a Ubiquitous ComputingKim, J. O. / Jung, K. H. / Chung, C. H. et al. | 2006
- 932
-
Rotor Design for the Performance Optimization of Canard Rotor/Wing AircraftLee, J.-W. / Jeon, K.-S. / Kim, M.-J. / Byun, Y.-H. / Kim, C. J. / Yu, Y. H. et al. | 2006
- 934
-
Verifier-Based Home Network Security MechanismJeon, H. / Chung, M. Y. / Kim, J. / Choo, H. et al. | 2006
- 934
-
A Group Search Optimizer for Neural Network TrainingHe, S. / Wu, Q. H. / Saunders, J. R. et al. | 2006
- 937
-
A Data-Driven Approach to Constructing an Ontological Concept Hierarchy Based on the Formal Concept AnalysisHwang, S.-H. / Kim, H.-G. / Kim, M.-K. / Choi, S.-H. / Yang, H.-S. et al. | 2006
- 938
-
Rapid Determination of Compound Rifampicin Tablets Using Near Infrared Spectroscopywith Artificial Neural NetworkGuo, W. / Meng, Q. / Lu, J. / Jiang, C. / Liang, Y. / Teng, L. et al. | 2006