Proposal for Easily Detachable Proxy for Personal Information Leakage Detection (English)
- New search for: Hayakawa, Tomokazu
- New search for: Hikita, Teruo
- New search for: Park, James J. (Jong Hyuk)
- New search for: Stojmenovic, Ivan
- New search for: Jeong, Hwa Young
- New search for: Yi, Gangman
- New search for: Hayakawa, Tomokazu
- New search for: Hikita, Teruo
In:
Computer Science and its Applications
: Ubiquitous Information Technologies
;
Chapter: 4
;
21-27
;
2015
- Article/Chapter (Book) / Electronic Resource
-
Title:Proposal for Easily Detachable Proxy for Personal Information Leakage Detection
-
Additional title:Lect. Notes Electrical Eng.
-
Contributors:Park, James J. (Jong Hyuk) ( editor ) / Stojmenovic, Ivan ( editor ) / Jeong, Hwa Young ( editor ) / Yi, Gangman ( editor ) / Hayakawa, Tomokazu ( author ) / Hikita, Teruo ( author )
-
Published in:Computer Science and its Applications : Ubiquitous Information Technologies ; Chapter: 4 ; 21-27Lecture Notes in Electrical Engineering ; 330 ; 21-27
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2015-01-01
-
Size:7 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Maneuvering Target Tracking Algorithm for Adaptive Estimation on Measurement Noise Variance MatrixWang, Rong / Feng, Xinxi / Zhou, Hang et al. | 2015
- 2
-
Performance of a Hybrid DCT SVD Visually Imperceptible Digital Watermarking against Signal Processing AttacksIslam, Md. Saiful / Chong, Uipil et al. | 2015
- 3
-
A Simplified Hybrid Navigation System Design of a Mobile Robot Using Kalman FilterKim, Min Ji / Bae, Seol B. / Joo, Moon G. et al. | 2015
- 4
-
Proposal for Easily Detachable Proxy for Personal Information Leakage DetectionHayakawa, Tomokazu / Hikita, Teruo et al. | 2015
- 5
-
Adaptive Transformation Engine Supporting Multi-Screen Services Using Smart DevicesBae, Yuseok / Park, Jongyoul et al. | 2015
- 6
-
The Improved 16th-Order Differential Attack on 10- Round Variant of Block Cipher PRESENTIgarashi, Yasutaka / Kaneko, Toshinobu / Setoguchi, Satoshi / Fukushima, Seiji / Hachino, Tomohiro et al. | 2015
- 7
-
Implementation of Stereo Camera Module for Hand Gesture RecognitionLee, Kyung-Taek / Park, Seho / Park, Yong-Suk et al. | 2015
- 8
-
Social Network Recommendation Based on Hybrid Suffix Tree ClusteringZhang, Jianhao / Ma, Xun / Li, Weimin / Jin, Qun et al. | 2015
- 9
-
A Reputation-Based Adaptive Trust Management System for Vehicular CloudsLee, Eun-Ju / Bae, Ihn-Han et al. | 2015
- 10
-
Semi-automatic Construction of a Named Entity Dictionary Based on Active LearningSong, Yeongkil / Kim, Harksoo et al. | 2015
- 11
-
Research on Privacy Protection of WHOIS Information in DNSZhang, Wei / Wang, Wei / Zhang, Xinchang / Shi, Huiling et al. | 2015
- 12
-
Fuzzy Logic-Driven Resource Evaluation Method for Automated Negotiation with Resource Allocation in Distributed EnvironmentKim, Jaekwon / Kim, Taeyoung / Moon, Sunghwan / Lee, Jongsik et al. | 2015
- 13
-
ERAGHC: Enhanced Reliable Authenticated Group Head CommunicationZafar, Lubna / Hadi, Fazle et al. | 2015
- 14
-
Transaction Authentication Using HMAC-Based One-Time Password and QR CodeSubpratatsavee, Puchong / Kuacharoen, Pramote et al. | 2015
- 15
-
New Secure LEACH Protocol Using Hierarchy-Based Preshared Key SchemeGoto, Shinichi / Saito, Soma / Kang, Hyunho / Iwamura, Keiichi et al. | 2015
- 16
-
Secrecy Multiplication Based on a (k, n)-Threshold Secret-Sharing Scheme Using Only k ServersWatanabe, Taihei / Iwamura, Keiichi / Kaneda, Kitahiro et al. | 2015
- 17
-
Hierarchical-Structured Key Exchange Scheme for Large-Scale Mesh-Type Wireless Sensor NetworksKaneko, Ryo / Iwamura, Keiichi / Kaneda, Kitahiro et al. | 2015
- 18
-
Detecting Abnormal Behavior in SCADA Networks Using Normal Traffic Pattern LearningKim, Byoung-Koo / Kang, Dong-Ho / Na, Jung-Chan / Chung, Tai-Myoung et al. | 2015
- 19
-
A Multimodal Sensing System for Elder Fall DetectionShih, Chihhsiong et al. | 2015
- 20
-
A Study on ENC Data Translation for Mobile DeviceSong, Moon-Sub / Lim, Dong-Sun / Jang, Byung-Tae / Ro, Soonghwan et al. | 2015
- 21
-
Exploring Tactics in Team Sports TrainingSun, Hao / Chen, Jim X. et al. | 2015
- 22
-
Adaptive CAP Assignment Approach for IEEE 802.15.3cKim, Eui-Jik / Jung, Jai-Jin et al. | 2015
- 23
-
Content Awareness-Based Fast Block Motion Estimation Algorithm for H.264/AVC Encoding SystemBeak, Ryong / Jang, Kyung-Soon / Kim, Byung-Gyu / Lee, Kye-Shin et al. | 2015
- 24
-
Real-Time Projection Mapping for Performance ArtsLee, Jaewoon / Kim, Yeonjin / Heo, Myeong-Hyeon / Kim, Dongho / Shin, Byeong-Seok et al. | 2015
- 25
-
Ranking Method for Book Reviews Based on Estimated Discussion QualityRyang, Heungmo / Yun, Unil et al. | 2015
- 26
-
Mining Frequent Graph Patterns Considering Both Different Importance and Rarity of Graph ElementsLee, Gangin / Yun, Unil et al. | 2015
- 27
-
Vehicle Data Generating Technique Considering Vehicles with Incrementally Changing States Based on Growth and Decline FunctionsYun, Unil / Ryang, Heungmo / Kim, Jiwon et al. | 2015
- 28
-
Correlated Blog-Page Retrieval with Structural CharacteristicsYun, Unil / Lee, Gangin / Pyun, Gwangbum et al. | 2015
- 29
-
A Topic-Oriented Information Retrieval Algorithm in the BlogosphereKim, Jiwon / Yun, Unil et al. | 2015
- 30
-
Fast HEVC Intra Mode Decision Based on Bayesian Classification Framework with Relative SATDGwon, Daehyeok / Choi, Yoonseuk / Choi, Haechul et al. | 2015
- 31
-
Best Practices in Software Engineering for SaaS-Cloud EraPark, Soojin / Lee, Sangeun / Park, Young B. et al. | 2015
- 32
-
The Effects of Mental Model on Intention to Use Smartphone ApplicationsJung, Wonjin / Yim, Hyung-Rok et al. | 2015
- 33
-
A Trie-Based Approach to Fast and Scalable Flow Recognition for OpenFlowShen, Tong / Zhang, Dafang / Li, Yanbiao / Li, Guo et al. | 2015
- 34
-
Accelerate Packet Classification Using GPU: A Case Study on HiCutsZheng, Jintao / Zhang, Dafang / Li, Yanbiao / Li, Guo et al. | 2015
- 35
-
Time Division Broadcasting Scheme for Congestion Control in Vehicle-to-Vehicle CommunicationChang, Sang-woo / Cao, Shengbin / Lee, Sang-sun et al. | 2015
- 36
-
Approximating Dependency for Efficient Multi-label Feature SelectionLim, Hyunki / Lee, Jaesung / Kim, Dae-Won et al. | 2015
- 37
-
Investigating Relation of Music Data: Emotion and Audio SignalsLee, Jaesung / Jo, Jin-Hyuk / Lim, Hyunki / Chae, Jong-Hoon / Lee, Sang-Uk / Kim, Dae-Won et al. | 2015
- 38
-
An Approach to Develop Architecture of ARINC653-Based Avionic SoftwareWang, Lei / Ma, Dianfu / Zhao, Yongwang / Zhao, Xianqi / Wang, Ying et al. | 2015
- 39
-
Personal Information Access Control Scheme for Secure NFC Integrated PaymentKang, Jungho / Kim, Kyounghun / Suk, Sangkee et al. | 2015
- 40
-
Light-Weight Distance-Bounding Mutual Authentication Security Scheme for Group Sensor ManagementKim, Hyungjoo / Jun, Moonseog / Kim, Jaesoo et al. | 2015
- 41
-
EEG Analysis by Pupil MovementsChong, Uipil et al. | 2015
- 42
-
Enhanced Direct Mode Coding for Bi-predictive PicturesYan, Bi / Liu, Da et al. | 2015
- 43
-
Error Resilient Dual Frame Motion Compensation with Uneven Quality ProtectionLiu, Da / Wang, Li / Xu, Long / Yang, Zhiyun / Zhang, Jun et al. | 2015
- 44
-
Multi-view with Extended Dual Frame Motion CompensationLiu, Da / Wang, Li / Liu, Yunpeng / Zhang, Peng / Wu, Yun et al. | 2015
- 45
-
The Method of Estimating of Frequency of the Harmonic Trend in Measuring SignalChye, En Un / Levenets, Alexey et al. | 2015
- 46
-
Discrete-Analog Haar Wavelet Filter for Real Time ApplicationsChye, En Un / Antonov, Roman / Ivanov, Victor et al. | 2015
- 47
-
Hardware Architecture for Real-Time Face Detection on Embedded Analog Video CamerasKim, Mooseop / Kim, Ki-Young et al. | 2015
- 48
-
The Issue of Data Transfer for the Embedded SE on Mobile DevicesJu, HongIl / Jeon, YongSung / Kim, JeongNyeo et al. | 2015
- 49
-
Ways of Improving the Acoustic-Emission Method of Investigation of Properties of Ceramic MaterialsOvcharuk, Valeryi N. et al. | 2015
- 50
-
Experience in Application of New Methods for Analyzing the Properties of Acoustic Emission Ceramic Materials and ProductsOvcharuk, Valeryi N. / Chye, En Un et al. | 2015
- 51
-
Self-certified Privacy-Preserving Scheme for Vehicle-to-Vehicle CommunicationsCho, Kwantae / Lee, Byung-Gil / Lee, Dong Hoon et al. | 2015
- 52
-
Implementation of Side Channel Analysis Evaluation Boards for Cryptographic Software of Embedded SystemsChoi, Yongje / Choi, Dooho / Ryu, Jaechul et al. | 2015
- 53
-
Robust Control for Multimedia TCP/AQM Flows Case StudyEremin, Eugenie L. / Okhotnikov, Sergey S. / Telichenko, Denis A. et al. | 2015
- 54
-
The Effects of Multiple Scattering on Performance of Ballistic Channel Strained-Si DiodesGhupur, Yasenjan / Geni, Mamtimin / Mamat, Mamatrishat / Abudureheman, Abudukelimu et al. | 2015
- 55
-
Texture Extraction from Video and Image Warping for AR Coloring Book*Lee, Youngho / Choi, Jongmyung et al. | 2015
- 56
-
Framework for Evaluation of Information Systems Utilization and Its Application in the ROK-MNDKim, Sungtae / Lee, Hanjun / Kwon, Hyuckjin / Lee, Sangho et al. | 2015
- 57
-
Compensation of Directional and Rotational Mismatch of Separate Stereo Cameras by Vanishing Point and LinesBang, Min-Suk / Jung, Gwang-Hoon / Kang, Dong-Wook / Jung, Kyeong-Hoon et al. | 2015
- 58
-
Symmetric Key-Based Authentication and the Session Key Agreement Scheme in IoT EnvironmentPark, Namje / Kim, Marie / Bang, Hyo-Chan et al. | 2015
- 59
-
Design for Most Compatible Booting Model of Integrated Memory-Disk Based on ARM LinuxJo, Ye-Jin / Nam, Sang-Jae / Ko, So-Hyang / Kim, Shin-Dug et al. | 2015
- 60
-
Designing a Smart Multisensor Framework Based on Beaglebone Black BoardChianese, Angelo / Piccialli, Francesco / Riccio, Giuseppe et al. | 2015
- 61
-
Calculation of CO2 Exhausting Volumes by EMME/3 Program SimulationJin, Jangwon et al. | 2015
- 62
-
Implementing a Touch Projection System That Is Not Dependent on Sensor PositionCho, Sungwoo / Um, Kyhyun / Jung, Seung-Won / Cho, Kyungeun et al. | 2015
- 63
-
Secure Filesystem for Trusted Virtual Domain in Mobile DevicePark, Su-Wan / Lee, Deok Gyu / Kim, Jeong Nyeo et al. | 2015
- 64
-
A Middleware for Developing Context-Aware Mobile Applications in Low-Cost Acquisition DevicesPinheiro, Dejailson Nascimento / Teles, Ariel Soares / de Tácio Pereira Gomes, Berto / da Silva e Silva, Francisco José et al. | 2015
- 65
-
Personalized Information Gathering Using Implicit User Feedback in a Multiple Personal Device EnvironmentJeon, Hocheol et al. | 2015
- 66
-
Rich-Media Technologies and Their Using in Crisis Management CommunicationMartiník, Ivo et al. | 2015
- 67
-
Effective Purchase Pattern Mining with Weight Based on FRAT Analysis for Recommender in e-CommerceCho, Young Sung / Kim, Kyung Ah / Moon, Song Chul / Park, Soo Ho / Ryu, Keun Ho et al. | 2015
- 68
-
Voice Control of Technical Functions in Smart Home with KNX TechnologyVanus, Jan / Smolon, Marek / Koziorek, Jiri / Martinek, Radek et al. | 2015
- 69
-
Development of IR MEMS Sensor Connected to Smart Phone via Earphone JackShin, Gi-woong / Kim, Young-hyung / Lee, Yong-hwan et al. | 2015
- 70
-
Implementation of a Conditional Searchable Encryption System for Data StorageRahman, Diego Aulia / Heng, Swee-Huay / Yau, Wei-Chuen / Tan, Syh-Yuan et al. | 2015
- 71
-
Formal Specification of Malware Models in the Form of Colored Petri NetsJasiul, Bartosz / Szpyrka, Marcin / Śliwa, Joanna et al. | 2015
- 72
-
Semantic Description of the Context of the Service CallŚliwa, Joanna / Gleba, Kamil et al. | 2015
- 73
-
Automatic Identification of Spatio-temporal Highway Congestion Patterns Using Historic DatabasePark, Eunmi / Oh, Hyunsun et al. | 2015
- 74
-
Definition of Attack in the Context of Low-Level Interaction Server HoneypotsSokol, Pavol / Zuzčák, Matej / Sochor, Tomáš et al. | 2015
- 75
-
Practical Biometrics On-Card Matching for Remote User Authentication Using Smart CardsWong, Kok-Seng / Kang, Minsu / Lee, Sangjun / Ho Kim, Myung et al. | 2015
- 76
-
Quantifying Overt Hardware Attacks: Using ART SchemaMoein, Samer / Gebali, Fayez et al. | 2015
- 77
-
Linear and Differential Properties of Randomly Generated DES-Like Substitution BoxesAlSalami, Yousuf / Martin, Thomas / Yeun, Chan et al. | 2015
- 78
-
Modelling of APGAS Programming Systems with Using of P/T Petri Process NetsMartiník, Ivo et al. | 2015
- 79
-
A Semantic Social Bookmarking System Based on a Wiki-Like ApproachSanna, Georgia / Angius, Antonello / Concas, Giulio / Manca, Dino / Pani, Filippo Eros et al. | 2015
- 80
-
A Kanban-Based Methodology to Define Taxonomies and Folksonomies in KMSBuschettu, Alberto / Concas, Giulio / Pani, Filippo Eros / Sanna, Daniele et al. | 2015
- 81
-
Research on Development Stage of Service Model in Big Data IndustryYoo, Soonduck / Choi, Kwangdon et al. | 2015
- 82
-
Robust link-oriented Routing Protocol (ROR) for Vehicular Ad Hoc NetworksKim, Sun-il / Kahng, Hyun Kook. / Cheung, Sweungwon et al. | 2015
- 83
-
Wireless Chest-Based ECG BiometricsDerawi, Mohammad et al. | 2015
- 84
-
Development of a Visualisation Software, Implemented with Comfort Smart Home Wireless Control SystemVanus, Jan / Kucera, Pavel / Koziorek, Jiri / Machacek, Zdenek / Martinek, Radek et al. | 2015
- 85
-
De-word Classification Algorithm Based on the Electric Power of Large Data Library RetrievalGuo, Xiaoli / Sun, Huiyu / Wang, Ling / Qu, Zhaoyang / Ding, Wei et al. | 2015
- 86
-
Development of an HMI Evaluation Tool Supporting Test of Interaction with IoT-Based SystemsLee, YoungRan / Lee, SangJoon et al. | 2015
- 87
-
Multi-Focus Image Fusion by Using a Pixel-Based SML Comparison MapLee, Seung-Hyun / Jung, Kwang-Hoon / Kang, Dong-Wook / Jung, Kyeong-Hoon et al. | 2015
- 88
-
Performance Analysis of Matching Cost for Stereo Matching with CUDAHong, Gwang-Soo / Hoe, Woong / Kim, Byung-Gyu et al. | 2015
- 89
-
Application Research of University Decision Support System Based on Data WarehouseGao, Liang / Chen, Yun et al. | 2015
- 90
-
A Rapid Development Framework of Enterprise Information System Based on Components and JavaEEWang, Zhenwu et al. | 2015
- 91
-
DynamoRIO-Based Malware Detection System under 10G Network EnvironmentXiong, Yongping / Wu, Shizhong / Zhang, Tao / Deng, Yubo / Liu, Wei / Xu, Yongwei et al. | 2015
- 92
-
Category-Based an Intelligent Search System Using a Variety of Recommendation DataKim, Kwang-Young / Jeong, Seo-Young / Jung, Young-Im / Lee, Seok-Hyoung et al. | 2015
- 93
-
Efficient Evaluation of Window Join Aggregates in Data Stream ProcessingYu, Yang Woo / Kim, Hyeon Gyu et al. | 2015
- 94
-
Cost Analysis of Time-Slide Window JoinsKim, Hyeon Gyu et al. | 2015
- 95
-
TAC Reconfiguration for Paging Optimization in LTE-Based Mobile Communication SystemsKang, Hyung-Woo / Koh, Seok-Joo / Lim, Sang-Kyu / Kang, Tae-Gyu et al. | 2015
- 96
-
A Testing and Treatment System Model for Unilateral Neglect Patient Based on Visual Feedback TrainingLee, Hyun / Lee, Hyeon-Gi / Yang, Sung-Min / Hong, Ji-Heon et al. | 2015
- 97
-
Security Issues on Smarthome in IoT EnvironmentYoon, Seokung / Park, Haeryong / Yoo, Hyeong Seon et al. | 2015
- 98
-
Extraction of Object Position Information Using the Natural Image MarkerPark, Kyung-Je / Moon, Min-Soo / Lee, Ki-Jung et al. | 2015
- 99
-
Energy-Aware GPU-RAID Scheduling for Reducing Energy Consumption in Cloud Storage SystemsPirahandeh, Mehdi / Kim, Deok-Hwan et al. | 2015
- 100
-
Meanshift Segmentation Guided Spatially Adaptive Histogram EqualizationKunnath, Neeth Xavier / Lee, Suk-Ho et al. | 2015
- 101
-
Three-Dimensional Target Recognition Under Photon-Starved Conditions Using Photon Counting Axially Distributed Sensing and Nonlinear CorrelationCho, Myungjin et al. | 2015
- 102
-
Cache View Based Top-k Query Processing for Encrypted Data AnalysisJang, Miyoung / Cho, Ahra / Chang, Jaewoo et al. | 2015
- 103
-
Interactive Mobile Learning Environment for Processing Computational Science Simulation TaskPark, Sun-Rae / Lee, Jongsuk Ruth / Cho, Kum Won et al. | 2015
- 104
-
An Optimal Recovery Time Method in Cloud ComputingHung, Pham Phuoc / Bui, Tuan-Anh / Huh, Eui-Nam et al. | 2015
- 105
-
Design of Interaction Coordination in Electric Vehicle Information Service FrameworksLee, Junghoon / Park, Gyung-Leen et al. | 2015
- 106
-
Tag Interference Based Mobile Object Tracking with Passive UHF RFID SystemChoi, Jae Sung / Kang, Won Seok / Son, Chang Sik / Son, Byung Rak / Lee, Dong Ha et al. | 2015
- 107
-
Privacy Protection of Medical Imagery Using Reversible WatermarkingLee, Hae-Yeoun / Kim, Sunmyeng et al. | 2015
- 108
-
A Flexible Page Storage Model for Mixed OLAP and OLTP WorkloadsPark, Kyounghyun / Mai, Hai Thanh / Lee, Miyoung / Won, Hee Sun et al. | 2015
- 109
-
Cooperative Communication Protocol Based on EDCA in IEEE 802.11e WLANsKim, Sunmyeng / Lee, Hae-Yeoun et al. | 2015
- 110
-
Data Processing Framework for Electric Vehicle-Generated Streams Using HadoopLee, Junghoon / Park, Gyung-Leen / Cho, Young-In / Kim, Hyobin / Koh, Yongtae / Kang, Min-Jae / Kwak, Ho-Young / Lee, Sangjoon et al. | 2015
- 111
-
Efficient Indexing for OLAP Query Processing with MapReduceKang, Woo Lam / Kim, Hyeon Gyu / Lee, Yoon Joon et al. | 2015
- 112
-
Exploring Millennial Generation Behavior of Gamification Contents Converging with ICT and Sharing Economy: Hierarchical Clustering AnalysisChoi, Jae Won / Lee, Jae Heon / Kim, Ki Youn et al. | 2015
- 113
-
A Study of Burst Transfer GenerationCho, Jungseok / Cho, Doosan / Ko, Kwangman / Paek, Yunheung / Youn, Jonghee et al. | 2015
- 114
-
Mitigation of Selfish Carrier-Sense Behavior in Wi-Fi NetworksChoi, Jaehyuk et al. | 2015
- 115
-
The Real-Time Monitoring System of Social Big Data for Disaster ManagementChoi, Seonhwa / Bae, Byunggul et al. | 2015
- 116
-
MAST: Multi-Level Associated Sector Translation for NAND Flash Memory-Based Storage SystemKim, Jeehong / Kang, Dong Hyun / Ha, Byungmin / Cho, Hyunjin / Eom, Young Ik et al. | 2015
- 117
-
Remote-Launch: Borrowing Secure TCB for Constructing Trustworthy Computing PlatformKim, Jeehong / Kim, Taehyoung / Kim, Inhyeok / Min, Changwoo / Eom, Young Ik et al. | 2015
- 118
-
Human Action Recognition Using Product Manifold Theory and Procrustes Shape AnalysisCho, Wanhyun / Kang, Soonja / Kim, Sangkyoon / Park, Soonyoung et al. | 2015
- 119
-
Zombie PC Detection and Treatment Model on Software-Defined NetworkBae, Hyo-Bin / Park, Min-Woo / Kim, Sung-Hwan / Chung, Tai-Myoung et al. | 2015
- 120
-
Design and Implementation of System for Assets and Insolvency Prediction Applied to Industries Based on AHP and Forensic ReadinessKim, Jaechun / Son, Youngjun / Chung, Mokdong et al. | 2015
- 121
-
Profiling-Based Energy-Aware Recommendation System for Cloud PlatformsAmin, Muhammad Bilal / Hussain, Shujaat / Han, Manhyung / Kang, Byeong Ho / Ik, Yoon Yong / Jun, SungIk / Lee, Sungyoung et al. | 2015
- 122
-
Path Information Based Packet Verification for Authentication of SDN Network ManagerLee, Jina / Park, Min-woo / Chung, Tai-myoung et al. | 2015
- 123
-
Detection Methods for Disaster by Lexical PatternsBae, Byunggul / Ko, Myunghyun / Choi, Seonhwa et al. | 2015
- 124
-
GUI Programming Scheme for Low Storage Usage in Lightweight Computing EnvironmentHong, Won-Kee / Yoon, Seongwook / Cha, Kyung-Ae et al. | 2015
- 125
-
The Right to be Forgotten: Standard on Deleting the Exposed Personal Information on the InternetLee, Hee Joo / Yun, Jang Ho / Yoon, Hyun Sik / Lee, Kyung Ho et al. | 2015
- 126
-
Position Estimation of Multiple Light Sources for Augmented RealityLiu, Yanhong / Kwak, Yoon Suk / Jung, Soon Ki et al. | 2015
- 127
-
A Testing Method for AUTOSAR Software Components Using Virtual Prototyping by Modification of OSEK Operating SystemRyu, Hodong / Jeong, Sooyong / Lee, Woo Jin et al. | 2015
- 128
-
A Compensation-Based Cooperative Mechanism to Improve the Performance of IEEE 802.11 WLANsOh, Hayoung / Ahn, Sanghyun et al. | 2015
- 129
-
RUDP Design and Implementation Using OPNET SimulationHuh, Jun-Ho / Seo, Kyungryong et al. | 2015
- 130
-
Provisioning Virtual Infrastructure to Cloud Service Consumer in Perspective of Brokering VM PlacementLee, Jihyun / Kim, Jinmee / Kang, Dongjae et al. | 2015
- 131
-
Method of Graph Node Fusion and Its Application on Bus Information SystemsYim, Jaegeol / Han, Changyong et al. | 2015
- 132
-
Tracking Model for Abnormal Behavior from Multiple Network CCTV Using the Kalman FilterYoon, Yong-Ik / Chun, Jee-Ae et al. | 2015
- 133
-
Application Authentication and Secure Key Management Scheme Using MTMHan, Jin-Hee / Jeon, YongSeong / Kim, Jeongnyeo et al. | 2015
- 134
-
Energy Saving Mechanism for Web ServicesJang, Sumin / On, Jinho / An, Baiksong / Lee, Byunggyu / Jun, SungIk et al. | 2015
- 135
-
Awareness Home Automation System Based on User Behavior through Mobile SensingMafrur, Rischan / Muthohar, M. Fiqri / Bang, Gi Hyun / Kyeong Lee, Do / Choi, Deokjai et al. | 2015
- 136
-
A Brokering Service Design for Vehicle-To-Grid Electricity TradesLee, Junghoon / Park, Gyung-Leen et al. | 2015
- 137
-
Fractional Frequency Reuse (FFR) Based Overlap Resource Power Control for Interference Mitigation in an LTE-Advanced Network with Device-to-Device CommunicationChhorn, Sok / Seo, Si-o / Kim, Seung-Yeon / Lee, Kwang-Hyung / Cho, Choong-ho et al. | 2015
- 138
-
A Repeated Non-Cooperative Game Theoretic Approach to Energy-Efficiency of Cellular NetworksJiao, Yan / Joe, Inwhee et al. | 2015
- 139
-
On QoS Provisioning Based on User Mobility Patterns for Proxy Mobile IPv6 NetworksChoi, Jae-Young / Yang, Seungbo / Jeong, Jongpil et al. | 2015
- 140
-
Design of an Android App for Gyeongju Smart TourismPark, Byunghoon / Yim, Jaegeol et al. | 2015
- 141
-
IO Cost Evaluation of OLAP Query Processing with MapReduceKang, Woo Lam / Kim, Hyeon Gyu / Lee, Yoon Joon et al. | 2015
- 142
-
A Two-Layer Cluster Head Selection Based on Distance in Wireless Sensor NetworksLee, Seong-Lyong / Park, JiSu / Shon, Jin Gon et al. | 2015
- 143
-
The Dynamic Group Authentication Scheme for P2P Based Mobile CommerceYun, Sunghyun / Lim, Heuiseok et al. | 2015
- 144
-
Stable HPC Cluster Management Scheme through Performance EvaluationYoon, JunWeon / Hong, TaeYeong / Park, ChanYeol / Yu, HeonChang et al. | 2015
- 145
-
Effects on Mapping the VCPUs to the Physical CPUs in Para-VirtualizationLyoo, TaeMuk / Choi, HeeSeok / Kang, Jihun / Lim, JongBeom / Jung, Daeyong / Song, SungJin / Gil, Joon-Min / Chung, Kwang-Sik / Yu, Heonchang et al. | 2015
- 146
-
Development of Teaching-Learning Model with Project-Based Learning Using Smart Learning Contents Authoring ToolBae, Ji-Hye / Lee, Hyun et al. | 2015
- 147
-
Digital Forensic Analysis on Window8 Style UI Instant Messenger ApplicationsLee, Chanjin / Chung, Mokdong et al. | 2015
- 148
-
Smart Emergency Rescue System Based on Biometric AuthenticationYun, Sangjin / Jung, Hyunwoo / Yun, Sunghyun et al. | 2015
- 149
-
A Study on Diffusion Dynamics of Intelligence-Driven Cloud Solutions in Law Enforcement AuthoritiesNasridinov, Aziz / Marakhimov, Azizbek / Park, Young-Ho et al. | 2015
- 150
-
A Structural Synthesis of Information Computer Networks of Automated Control Systems Based on Genetic AlgorithmsMarakhimov, Avazjon R. / Siddikov, Isomiddin H. / Nasridinov, Aziz / Byun, Jeong-Yong et al. | 2015
- 151
-
A Music Recommendation Method with Emotion Recognition Using Ranked AttributesPark, So-Hyun / Ihm, Sun-Young / Jang, Wu-In / Nasridinov, Aziz / Park, Young-Ho et al. | 2015
- 152
-
Research of Object Recognition and Tracking Based on Feature MatchingAhn, Hyochang / Rhee, Sang-Burm et al. | 2015
- 153
-
Test-Sheet Composition Using Genetic Algorithm for Controlling Item ExposureKim, Byoung Wook / Shon, Jin Gon et al. | 2015
- 154
-
The Implementation of Defect Detector Using Efficient Thresholding MethodPak, Myeongsuk / Park, Jaehan / Kim, Sanghoon et al. | 2015
- 155
-
Evaluation of the Synchronous Mobile Learning System Supporting Tablets for Instructor and StudentLee, Jang Ho et al. | 2015
- 156
-
On Designing an Effective Training Set for Information ExtractionKim, Young-Min / Song, Sa-kwang / Shin, Sungho / Seon, Choong-Nyoung / Hong, Seunggyun / Jung, Hanmin et al. | 2015
- 157
-
Application of SNS for a Satisfaction Analysis of School MealsHwang, Myunggwon / Yeom, Ha-neul / Hwang, Mi-Nyeong / Jung, Hanmin / Kim, Hyun Jung et al. | 2015
- 158
-
Real-Time Vision Based Camera Moving and Displacement Detection AlgorithmJeong, Hyeok-June / Ha, Young-Guk et al. | 2015
- 159
-
Prescriptive Analytics for Planning Research-Performance StrategyCho, Minhee / Song, Sa-Kwang / Weber, Jens / Jung, Hanmin / Lee, Mikyoung et al. | 2015
- 160
-
XOnto-Apriori: An Effective Association Rule Mining Algorithm for Personalized Recommendation SystemsGim, Jangwon / Jung, Hanmin / Jeong, Do-Heon et al. | 2015
- 161
-
MapReduce-Based Bulk-Loading Algorithm for Fast Search for Billions of TriplesUm, Jung-Ho / Lee, Seungwoo / Kim, Tae-Hong / Jeong, Chang-Hoo / Seo, Kwangik / Park, Joonho / Jung, Hanmin et al. | 2015
- 162
-
Inspecting Retrieval Engines Based on Term’s WeightSong, Sa-kwang / Shin, Sungho / Kim, Young-Min / Seon, Chung-Nyoung / Hong, Seunggyun / Jung, Hanmin et al. | 2015
- 163
-
An Enhanced Signal-Driven PMIPv6 for Distributed Mobility ControlKong, Ki-Sik et al. | 2015
- 164
-
Unconstrained Continuous Infants Monitoring System Based on Mattress-Type Force Sensing Platform: A Pilot StudyShin, Hangsik / Choi, Hwajin / Park, Sooji et al. | 2015
- 165
-
Preliminary Study for Driver’s Posture Correction Support System Based on Seat-Embedded Pressure Sensing PlatformShin, Hangsik / Kim, Kwanghyun / Son, Jeawon / Kim, Miri et al. | 2015
- 166
-
A Congestion Degree Index Based Bandwidth Estimation Method Using Pair Packet DelayPark, Jong-seon / Park, Byoung-yeon / Kim, Seung-hae / Cho, Gi-hwan et al. | 2015
- 167
-
International Research Networking of KRLight Supporting Data-Intensive ScienceCho, Buseung / Lee, Wonhyuk / Chung, Jin-wook et al. | 2015
- 168
-
Design of National Research Network for Strengthening of Supporting an Advanced Research ActivitiesLee, Wonhyuk / Cho, Buseung / Ahn, Sungjin et al. | 2015
- 169
-
Deployment Status of Global and Domestic WiFi Roaming Technology in KoreaWang, Gicheol / Cho, Jinoh / Kim, Dongkyun / Kim, Seunghae et al. | 2015
- 170
-
Analysis on Study Trend and Technical Feature of Software-Defined NetworkingPark, Jinhyung / Cho, Hyunhun / Gil, Joon-Min / Yun, Byoung-Ju et al. | 2015
- 171
-
Design and Construction of Sinknet for KREONET Attack DetectionCho, Jinoh / Kim, Seunghae / Cho, Hyunhun / Cho, Gihwan et al. | 2015
- 172
-
Depth Image Based System for Notifying Human Keeping Appropriate Distance from Screen - ImplementChen, Yung-Hui / Wang, Jyu-wei et al. | 2015
- 173
-
A Framework for Continuous Real-Time Collaborative EditingJoe, Inwhee / Lee, Soodong et al. | 2015
- 174
-
A Robust Faint Situation Recognition and Response System Based on Object Tracking Algorithms Using Thermal CameraLee, Juhyun / Jiang, Xiaoyu / Hong, Kicheon et al. | 2015
- 175
-
Strong Identification and Authentication Using Dynamic Biometric SignatureSmejkal, Vladimír / Kodl, Jindřich / Novák, Daniel / Schneider, Jakub et al. | 2015
- 176
-
An Implementation of Automatic Software Testing on Cloud Computing EnvironmentKoong, Chorng-Shiuh / Yang, Tzu-I / Wu, Chang-Chung et al. | 2015
- 177
-
Exchangeable Humanoid Animation Using H-Anim and Motion Capture DataLee, Myeong Won / Jung, Chul Hee / Lee, Mingeun / Brutzman, Don et al. | 2015
- 178
-
Wearable Computing Connecting Gas Sensor to Detector Harmful Air - ImplementChen, Yung-Hui / Wang, Jyu-Wei et al. | 2015
- 179
-
The Non-linear Relationship between Economic and Life Insurance Development in Asia: A Panel Threshold Regression AnalysisYang, Shing-Ya / Li, Hung-An / Fang, Hui-Chen et al. | 2015
- 180
-
Comparative Study of Singing Voice Detection MethodsYou, Shingchern D. / Wu, Yi-Chung et al. | 2015
- 181
-
A Feature Selection Technique for Hand Gesture Recognition in Music Display SystemLee, Jun-Yong / Kim, Ju-Youn / Min, Jee-Soo / Kim, Ho-Joon et al. | 2015
- 182
-
An Approach for Applying Social Networks Information to Information RecommendationKim, Yeunjung / Lee, Minsoo et al. | 2015
- 183
-
Preference Measurement Using User Response ElectroencephalogramKim, Youngrae / Kang, Kyuchang / Lee, Hyungjik / Bae, Changseok et al. | 2015
- 184
-
Development of ISMEE: An Information Security Management Engineering EnvironmentSuhaimi, Ahmad Iqbal Hakim / Bao, Da / Goto, Yuichi / Cheng, Jingde et al. | 2015
- 185
-
Usefulness of ISMEE for Supporting Organizations with ISMSsSuhaimi, Ahmad Iqbal Hakim / Bao, Da / Chen, Huilin / Cheng, Jingde et al. | 2015
- 186
-
Novel Key Management for Secure Information of Ubiquitous Healthcare Domains to APT AttackKim, Donghyun / Soh, Wooyoung / Kim, Seoksoo et al. | 2015
- 187
-
A Model for a Physical and Virtual Environment for Extreme Feedback in the Development of the Metacognition Supported by TICS: The Computer Engineer Career as Case of StudyLevano, Marcos / Fernández, Cesar et al. | 2015
- 188
-
Predicting New Attacks for Information SecurityBao, Da / Goto, Yuichi / Cheng, Jingde et al. | 2015
- 189
-
A Supporting Environment for IT System Security Evaluation Based on ISO/IEC 15408 and ISO/IEC 18045Chen, Huilin / Bao, Da / Goto, Yuichi / Cheng, Jingde et al. | 2015
- 190
-
Cryptanalysis of Advanced Biometric-Based User Authentication Scheme for Wireless Sensor NetworksChoi, Younsung / Nam, Junghyun / Lee, Youngsook / Jung, Seyoun / Won, Dongho et al. | 2015
- 191
-
A MapReduce-Based Algorithm for Nearest Neighbor Search with KeywordsKim, DongEun / Youn, Hee Yong / Kim, Ung-Mo et al. | 2015
- 192
-
A Method for Distinguishing between Shopper’s Intentions: Whether Their Purchase Is “Planned Buying” or “Impulse Buying” Utilizing the Shopper’s Behavior Process ModelTokudome, Satomi / Muramatsu, Shinya / Yoshida, Koji / Kobayashi, Koichi / Shirahama, Hiroaki / Nakajima, Mizuki / Hashimoto, Hiroshi / Suzuki, Satoshi et al. | 2015
- 193
-
A New Antenna Selection Algorithm for Indoor Distributed Antenna Systems EnvironmentShi, Zhiyuan / Zhang, Changzheng / Zhao, Yifeng / Huang, Lianfen / Chang, Yao-Chung et al. | 2015
- 194
-
An Emotion Assessment Method Based on Supported Vector Data DescriptionWu, Qun / Zhou, Haojie / Zhou, Yongjian et al. | 2015
- 195
-
Improved Mean Representation Based Classification for Face RecognitionFeng, Qingxiang / Pan, Tien-Szu / Pan, Jeng-Shyang / Tang, Lin-Lin et al. | 2015
- 196
-
Functional Considerations in Military-Grade Security Platform Using a Mobile HypervisorLim, Kyung-Soo / Park, Su-Wan / Kim, Jeong-Nye / Lee, Deok-Gyu et al. | 2015