RESTful Web Service Composition (English)
- New search for: Choi, M.
- New search for: Choi, M.
- New search for: Park, James J.
In:
Future information technology, application, and service: FutureTech 2012
;
569-576
;
2012
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:RESTful Web Service Composition
-
Contributors:Choi, M. ( author ) / Park, James J.
-
Conference:Conference, Future information technology, application, and service: FutureTech 2012 ; 2012 ; Vancouver, B.C.
-
Published in:LECTURE NOTES IN ELECTRICAL ENGINEERING ; 164 ; 569-576
-
Publisher:
- New search for: Springer
-
Place of publication:Dordrecht
-
Publication date:2012-01-01
-
Size:8 pages
-
Remarks:Papers from FutureTech 2012, the 7the FTRA International Conference on Future Information Technology, to be held in Vancouver, Canada, June 2012. Includes bibliographical references and index. Also available in electronic format.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
A New Proxy Electronic Voting Scheme Based on Proxy SignaturesLee, C.-C. / Chen, T.-Y. / Lin, S.-C. / Hwang, M.-S. et al. | 2012
- 13
-
Cellular Automata for Topology Control in Wireless Sensor Networks Using MatlabAthanassopoulos, S. / Kaklamanis, C. / Kalfountzos, G. / Papaioannou, E. et al. | 2012
- 23
-
Energy Efficient Complete Coverage Path Planning for Vacuum Cleaning RobotsPark, E. / Kim, K.J. / del Pobil, A.P. et al. | 2012
- 33
-
Education Embedded System for Remote ControlChoi, K.S. / Han, S. / Lee, S. / Lim, J. / Kim, D. / Dal, A. / Jeon, C.W. / Woo, S. / Jeon, H. et al. | 2012
- 43
-
Novel Two Factor User Authentication Scheme over WSNsKim, H. / Chen, X.-Y. et al. | 2012
- 53
-
BAN Logic-Based Security Proof for Mobile OTP Authentication SchemeAlkatheiri, M.S. / Eldefrawy, M.H. / Khan, M.K. et al. | 2012
- 61
-
VLSI Design of a Hardware Efficient FFT ProcessorLiu, D. / Liu, H. / Zhang, J. / Zhang, B. / Zhou, L. et al. | 2012
- 71
-
Arithmetic P System Without Priority RulesGuo, P. / Chen, H. et al. | 2012
- 81
-
Multipath-Based Reliable Routing Protocol with Fast-Recovery of Failures on MANETsKim, M.-K. / Ngo, H.P. et al. | 2012
- 91
-
Novel Hybrid Silicon/CNT 4T SRAM Cell DesignWang, W. / Nan, H. / Choi, K. et al. | 2012
- 101
-
Storage-Efficient Data Prefetching for High Performance ComputingChen, Y. / Zhu, H. / Jin, H. / Sun, X.-H. et al. | 2012
- 111
-
A New Data Sieving Approach for High Performance I/OLu, Y. / Chen, Y. / Amritkar, P. / Thakur, R. / Zhuang, Y. et al. | 2012
- 123
-
Destination Guided Mobility Models for Mobile Ad Hoc NetworksAravind, A. / Manickam, V. et al. | 2012
- 135
-
Development of a Web-Based Educational Java Applet for Understanding Concepts and Principles of Digital Logic CircuitsKim, D. / Cha, J. / Han, S. / Lee, S. / Choi, K. / Lim, J. et al. | 2012
- 151
-
Detecting and Modeling the Structure of a Large-Scale MicroblogGuo, Z. / Li, Z. / Tu, H. / Xie, D. et al. | 2012
- 161
-
Research on the Query Subsystem for Large Information System Based on Decision-MakingLiu, H. / Zhao, X.-H. / Liu, L. / Zhang, L. / Liu, Y.-Z. et al. | 2012
- 171
-
HOTP-Based Key Agreement Protocol Over Home NetworkKim, H. / Kim, H.J. et al. | 2012
- 181
-
Smartcard-Based User Authentication Protocol over Home NetworkKim, H. / Jung, H. et al. | 2012
- 191
-
QoE Management in a Video Conferencing ApplicationVakili, A. / Gregoire, J.-C. et al. | 2012
- 203
-
Extended OTP Mechanism Based on Graphical Password MethodKu, Y. / Choi, O. / Kim, K. / Shon, T. / Hong, M. / Yeh, H. / Kim, J.-H. et al. | 2012
- 213
-
Multi-Dimensional Analysis of Political LanguageGifu, D. / Cristea, D. et al. | 2012
- 223
-
Multiple Vehicle Speed Detection and Fusion Technology on the Road Network: A Case Study from TaiwanChang, J.-Y. / Wang, T.-W. / Chen, S.-H. et al. | 2012
- 231
-
WiMAX Application for E-Police Patrolling SystemLin, W.-Y. / Chang, R.-Y. / Chen, Y.-C. / Lee, C.-L. et al. | 2012
- 239
-
Development of LED Irradiation System for Cell Proliferation of Medical ApplicationsCheon, M.-W. / Kim, T.-G. / Lee, Y.-S. et al. | 2012
- 249
-
The Study on the Mobile Diagnostic X-ray Device of Frequency Modulation Method by PI ControlledKim, Y.-P. / Kim, T.-G. / Park, Y.-P. / Cheon, M.-W. / Lee, Y.-S. et al. | 2012
- 259
-
Trusted Routing in AODV Protocol Against Wormhole AttackHazra, S. / Setua, S.K. et al. | 2012
- 271
-
Algorithms Based on Finite Automata for Testing of Omega-CodesQuyet, T.D. / Dinh, H.N. / Trung, H.P. et al. | 2012
- 281
-
An Opinion Mining Technique For Chinese BlogsZeng, Y.-C. / Klyuev, V. / Wu, S.-H. et al. | 2012
- 291
-
Graduation Project: Development of an Automation System for Filter Quality Test Using LabVIEWChoi, K.S. / Han, S. / Lee, S. / Lim, J. / Kim, D. / Dal, A. / Jeon, C.W. / Woo, S. / Jeon, H. et al. | 2012
- 305
-
Context-Awareness Middleware for Highly Reliable Application Services in GreenhouseLee, M.B. / Lee, Y.W. / Park, I.G. / Park, C.Y. / Park, J.W. / Cho, Y.Y. / Shin, C.S. et al. | 2012
- 317
-
A Distributed and Intelligent Power Control Scheme in LTE-Advanced Femtocell NetworksLee, B.-B. / Yu, J. / Kim, S.-J. et al. | 2012
- 327
-
Cryptanalysis on An Efficient Anonymous Authentication Protocol for Mobile Pay-TVKim, H.S. et al. | 2012
- 335
-
RFID Antenna: Performance Analysis for Multimedia ServicesAlnomay, I.S. / Alhammad, J.Y. et al. | 2012
- 339
-
Designing Medical Integra Interface with u-RPMS and HISKim, Y.-H. / Lim, I.-K. / Lee, J.-G. / Lee, J.-P. / Lee, J.-K. et al. | 2012
- 349
-
Minimizing Metadata Size for File Synchronization Using Variable-Length ChunkingJung, H.M. / Park, J.M. / Song, C.G. / Kim, S.J. / Chun, S.H. / Ko, Y.W. et al. | 2012
- 359
-
Cryptanalysis of An Identity-Based Strong Designated Verifier Signature SchemeRasslan, M. et al. | 2012
- 367
-
User-Centric Identification Management for Cross Realm Cloud and Ubiquitous ComputingWang, R.-C. et al. | 2012
- 379
-
Z-CRS: A ZigBee Cluster Reformation Scheme for Connectivity EnhancementWang, R.-C. / Chang, R.-S. / Lee, P.-I. et al. | 2012
- 393
-
A Lock Screen Scheme with Improved Security and Convenience Using 8-Way Points for SmartphonesLee, J.Y. / Park, J.S. / Yi, K.J. / Park, J.H. et al. | 2012
- 399
-
NFC-LMS: Design and Implementation of Lost article Management System with NFCPark, I.H. / Lee, J.G. / Park, J.S. / Kim, S.J. / Park, J.H. et al. | 2012
- 407
-
Differential Fault Analysis on the Block Cipher HIGHTLee, Y. / Kim, J. / Park, J.H. / Hong, S. et al. | 2012
- 417
-
Study on Development of Appraisal Business Performance IndicatorKim, Y. / Kang, J. / Na, Y. / Chang, H. et al. | 2012
- 425
-
An Efficient Method of Extracting Strings from Unfixed-Form DataJeon, S. / Park, J. / Lee, K.-g. / Lee, S. et al. | 2012
- 435
-
Forensic Analysis of Android Phone Using Ext4 File System Journal LogKim, D. / Park, J. / Lee, K.-g. / Lee, S. et al. | 2012
- 449
-
A Study on Performance Evaluation of 7-Step QRcode Authentication FrameworkOh, D.-S. / Kim, B.-H. / Lee, J.-K. et al. | 2012
- 459
-
ADL-Driven Simulator Generation for Energy Dissipation Tracing and MonitoringKo, K. et al. | 2012
- 467
-
Public Key Infrastructure of Using the Fingerprint Information in Electronic Bidding SystemPark, S.-A. / Oh, Y.-C. / Kim, Y.-H. / Lim, I.-K. / Lee, J.-K. et al. | 2012
- 477
-
A Seamless Multimedia Service in Wireless NetworkLee, S. / Kim, I. / Park, J. / Woo, Y. et al. | 2012
- 485
-
Efficient Soft-Output Demapping Method for MIMO-OFDM WLAN SystemYoon, C. / Lee, H. et al. | 2012
- 493
-
A Study on Creative Engineering Design for Convergence Education Using Rube Goldberg DeviceYeo, S.-S. / Kang, A.-N. / Chung, S.-C. et al. | 2012
- 503
-
Evaluation of University Online Classes Compared to Offline Classes: Perceived Satisfaction and FidelityNam, S.-Z. et al. | 2012
- 511
-
The Multi-object Tracking Based on Gradient and Depth Information in the Stereo VisionLim, H.-Y. / Moon, Y.-D. / Kang, D.-S. et al. | 2012
- 519
-
Prediction System of the Situation Using the Fast Object Detection and ProfilingPark, S.-J. / Moon, Y.-D. / Kang, D.-S. et al. | 2012
- 527
-
PAPR Estimation of HC-OFDM in Dispersive Fading EnvironmentsYeo, S.-S. / Kang, H.-J. et al. | 2012
- 537
-
Implementation of Extendable n-by-n FUA and Its Performance Analysis for Transform of H.264/AVCPark, K.-H. / Ju, W.-k. / Kim, Y.-H. et al. | 2012
- 547
-
A New Approach to Digital Assets Management System after Death of a UserKim, J.-M. / Jeong, H.-Y. / Yeo, S.-S. et al. | 2012
- 559
-
An Efficient Trust Evaluation Approach in Attacker Dominated Networks in Internet of ThingsLiu, W. / Yin, L. / Fang, B. / Yu, X. et al. | 2012
- 569
-
RESTful Web Service CompositionChoi, M. et al. | 2012
- 577
-
Implementation of Map Reduce Model for Disk Forensic Computing AnalysisLim, S.-H. et al. | 2012
- 585
-
Management Server Architecture for REST Web Service CompositionChoi, M. / Lee, W. et al. | 2012
- 597
-
Analysis of Irregular Penetration of Laser WeldCho, J.-H. et al. | 2012
- 603
-
Laser Beam Scattering Analysis Inside Porous Materials by FEMChoi, H.W. et al. | 2012
- 615
-
Microstructure Predictability by Voronoi DiagramCho, J.-H. et al. | 2012
- 621
-
The Method to Measure Heart Motion Data of Animal for Medical Robotic ResearchHwang, M.J. et al. | 2012
- 629
-
Simulation Analysis on BER Patterns Based Maritime Ad-hoc NetworksYun, N.-S. / Park, Y.-Y. / Jung, K.-H. / Jang, B.T. / Lim, D.S. / Kim, J.M. et al. | 2012
- 637
-
A Study on Open Cloud Platform Based on Intelligent Application Development StudioSin, J.-I. / Kang, J. / Hwang, S.M. et al. | 2012
- 643
-
A Study on Maturity Level for Open Source SoftwareLee, E.-S. et al. | 2012
- 649
-
Linux Based Real-Time Feature Supporting Method and Evaluation for Information DevicesJung, Y. / Lim, D. / Lim, C. / Lee, E.-S. et al. | 2012
- 657
-
An Agricultural Expert Cloud for a Smart FarmCho, Y. / Cho, K. / Shin, C. / Park, J. / Lee, E.-S. et al. | 2012
- 663
-
An Intelligent Service Architecture Based on Community ComputingCho, Y. / Cho, K. / Shin, C. / Park, J. / Lee, E.-S. et al. | 2012
- 669
-
Get-Me-Out Puzzle as One Player Reachability GameKwon, G. et al. | 2012
- 677
-
A Microscopic Study on Group Dynamics of the Tencent-MicroblogsZhao, Z. / Zhang, Y. / Huang, J.Z. / Feng, S. / Fan, J. et al. | 2012
- 687
-
A Novel Opinion Analysis Scheme Using Social Relationships on MicroblogFu, M.-H. / Chen, L.-Y. / Lee, K.-R. / Kuo, Y.-H. et al. | 2012
- 697
-
Computing Event Relatedness Based on a Novel Evaluation of Social-Media StreamsLee, C.-H. / Wu, C.-H. / Yang, H.-C. / Wen, W.-S. et al. | 2012
- 709
-
A Requirements-Driven Approach Towards Decentralized Social NetworksThiel, S. / Bourimi, M. / Gimenez, R. / Scerri, S. / Schuller, A. / Valla, M. / Wrobel, S. / Fra, C. / Hermann, F. et al. | 2012
- 721
-
Silhouette: Volume Shadow Copy AnalyzerBang, J. / Lee, S. et al. | 2012
- 731
-
New Approach to Anonymity of User Information on Social Networking ServicesNguyen-Son, H.-Q. / Nguyen, Q.-B. / Tran, M.-T. / Nguyen, D.-T. / Yoshiura, H. / Echizen, I. et al. | 2012
- 741
-
Cloud Digital Investigations Based on a Virtual Machine Computer History ModelThorpe, S. / Ray, I. / Grandison, T. / Barbir, A. et al. | 2012
- 747
-
Differential Fault Analysis on Block Cipher LED-64Jeong, K. / Lee, C. et al. | 2012
- 757
-
Stimuli for Gaze Based Intrusion DetectionBiedert, R. / Frank, M. / Martinovic, I. / Song, D. et al. | 2012