default search action
3rd ICITCS 2013: Macau, China
- 2013 International Conference on IT Convergence and Security, ICITCS 2013, Macau, China, December 16-18, 2013. IEEE Computer Society 2014, ISBN 978-1-4799-2845-3
- D. T. Long, D. T. Thu, D. N. Thuc:
A Bergman Ring Based Cryptosystem Analogue of RSA. 1-4 - Soojung Park:
A Case Study of Wellness IT: Therapeutic Horseback Riding. 1-3 - Young Chun Kwon, Nakhoon Baek:
A Celestial Map Renderer Based on 3D Graphics System. 1-3 - Abdullah A. I. Alnajem, Ning Zhang:
A Copula-Based Fraud Detection (CFD) Method for Detecting Evasive Fraud Patterns in a Corporate Mobile Banking Context. 1-4 - Jeong-Seok Jang, Min Soo Kang, Kyounghak Lee:
A Development of Prediction Program for Electric Field Strength Using the ITU-R. P.1546 Recommendation with Geographic Information. 1-4 - Ahmad A. Al-Daraiseh, Eyas El-Qawasmeh, Nazaraf Shah:
A Framework for Energy Monitoring and Management System for Educational Institutions. 1-4 - Rize Jin, Hyung-Ju Cho, Tae-Sun Chung:
A Group Based In-Block Logging for Flash Based Systems. 1-3 - Jiangwei Wu, Daobing Zhou, Guoqiang Xiao:
A Hierarchical Bag-of-Words Model Based on Local Space-Time Features for Human Action Recognition. 1-4 - Almetwally M. Mostafa, Ahmed E. Youssef:
A Leader Replacement Protocol Based on Early Discovery of Battery Power Failure in MANETs. 1-4 - Minuk Kim, Jiman Mun, Souhwan Jung, Younghan Kim:
A Mobile Device-Based Mobile AP Detection Scheme Using NAT Behavior. 1-4 - Naruemon Wattanapongsakorn, E. Wonghirunsombat, Chalermpol Charnsripinyo, T. Assawaniwed, V. Hanchana, S. Srakaew:
A Network-Based Internet Worm Intrusion Detection and Prevention System. 1-4 - Hongxin Ma, Yingjue Fang, Xiaofeng Wang:
A New Key Exchange Protocol on Thompson Groups. 1-4 - Hwan-Seok Yang, Seung-Jae Yoo:
A Novel Security Model for Robust Web Services. 1-3 - Wigi Vei A. Oliveros, Cedric Angelo M. Festin, Roel M. Ocampo:
A P2P Network Booting Scheme Using a BitTorrent-Like Protocol. 1-4 - Sahar Bayoumi, Elham AlSobky, Moneerah Al-Mohsin, Manahel Al-Twaim, Monira Alkaldi, Munera Alkahtani:
A Real-Time Fire Detection and Notification System Based on Computer Vision. 1-4 - Sumaia Mohammed Al-Ghuribi, Saleh Alshomrani:
A Simple Study of Webpage Text Classification Algorithms for Arabic and English Languages. 1-5 - Do-Heon Lee, Su-Kyoung Yoon, Cheong-Ghil Kim, Shin-Dug Kim, Jung-Geun Kim:
A Space Effective DRAM Adapter for PRAM-Based Main Memory System. 1-3 - Youngjoo Kim:
A Study of Wellness Core Technology and E-Sports. 1-3 - Sang-woo Chang, Sang-Sun Lee:
A Study on Distance-Based Multi-Hop Broadcast Scheme for Inter-Vehicle Communication. 1-4 - Young Ho Lee, Min Su Kim, Kuinam J. Kim:
A Study on Improvement Measures of Remote Diligence / Laziness Management Applying NFC. 1-3 - Byung Seok Kong, Min Su Kim, Kuinam J. Kim:
A Study on Improvement Measures of Unmanned Security System against Security Threats. 1-3 - Yun-Seok Lee, Eun Kim, Young-Sub Kim, Ha-Yong Jeon, Min-Soo Jung:
A Study on Secure Chip for Message Authentication between a Smart Meter and Home Appliances in Smart Grid. 1-3 - Eun Kim, Yun-Seok Lee, Seong-Yun Kim, Jung-Won Choi, Min-Soo Jung:
A Study on the Information Protection Modules for Secure Mobile Payments. 1-2 - Won Hyung Park, Dae Hyeob Kim, Myung-Soo Kim, Neo Park:
A Study on Trend and Detection Technology for Cyber Threats in Mobile Environment. 1-4 - Mohamed A. Hagal, Sohil F. Alshareef:
A Systematic Approach to Generate and Clarify Consistent Requirements. 1-4 - Jonghyuk Park, Nakhoon Baek:
A Text-Based User Interface Style Toolkit for Low-Tier Embedded Systems. 1-4 - Pham Phuoc Hung, Tuan-Anh Bui, Eui-Nam Huh:
A Thin-Thick Client Collaboration for Optimizing Task Scheduling in Mobile Cloud Computing. 1-4 - Wonhyuk Lee, Seunghae Kim, Minki Noh, Hyuncheol Kim:
A Virtualized Network Model for Wellness Information Technology Research. 1-3 - Sheng-Yuan Yang, Dong-Liang Lee, Lawrence Y. Deng:
A Web Services-Based Cloud Interface Agent for Intelligent YOHO Information Processing. 1-4 - Shwu-Huey Yen, Chun-Hui Wang:
Abnormal Event Detection Using HOSF. 1-4 - Chi-Hun Lim, Seok-Ho Yoon, Seung-Hwan Choi, Kwang-Hyung Lee, Choong-Ho Cho:
Adaptive Mobility Robustness Adjustment Scheme for LTE-Femto System. 1-4 - Gary Cheng, Juliana Chau:
An Approach to Identify Levels of Reflection Using Latent Semantic Analysis. 1-3 - Boon-Hock Lim, Syh-Yuan Tan, Wei-Chuen Yau:
An Enhanced Public Key Infrastructure. 1-4 - Min-Hooi Chuah, Kee-Luen Wong:
An Enterprise Business Intelligence Maturity Model: Case Study Approach. 1-4 - Do-Young Chung, Sok-Joon Lee, Sin-Hyo Kim:
An Implementation and Experiment of Wireless Attack Emulator on Windows Environment. 1-4 - Jongho Mun, Qiuyan Jin, Woongryul Jeon, Dongho Won:
An Improvement of Secure Remote User Authentication Scheme Using Smart Cards. 1-4 - Kabsu Han, Insick Son, Jeonghun Cho:
An In-Vehicle Data Management Framework for Interaction between IVI and Vehicular Networks. 1-4 - Xin Li, Nakhoon Baek:
An LRU Approach for the Virtual Texture Management. 1-3 - Donggeun Lee, Sang-Sun Lee:
Analysis of Efficient Message Relay Methods in Intervehicle Networks. 1-4 - Sung-Hwan Kim, Nam-Uk Kim, Tai-Myoung Chung:
Attribute Relationship Evaluation Methodology for Big Data Security. 1-4 - Do Van Thanh, Tore E. Jønvik, Ivar Jørstad, Do van Thuan:
Better User Protection with Mobile Identity. 1-4 - Abdulrahman Azab, Hein Meling:
Building Composite Grid Tasks Using STROLL File-System. 1-4 - Zameer Ahmed Adhoni, Husam Ahmed Al Hamad, Abdul Ahad Siddiqi, Zaheer Ahmed Adhoni:
CBQ-API: A Cloud-Based Programming Interface for Qur'anic Applications. 1-5 - Hanan Aljuaid, Dzulkifli Mohamad:
Child's Body Part Tracking Simulates Babysitter Vision Robot. 1-4 - Siham Bacha, Nadjia Benblidia:
Combining Context and Content for Automatic Image Annotation on Mobile Phones. 1-4 - Ivy Joy G. Mallare, Susan Pancho-Festin:
Combining Task- and Role-Based Access Control with Multi-Constraints for a Medical Workflow System. 1-4 - Pankaj Joshi, Divyanshu Joshi:
Comparative Study of Channel Codes for OFDM System and Judgement for Batter Peak to Average Power Ratio (PAPR). 1-4 - Mohsen Bafandehkar, Sharifah Md Yasin, Ramlan Mahmod, Zurina Mohd Hanapi:
Comparison of ECC and RSA Algorithm in Resource Constrained Devices. 1-3 - Kritsanapong Somsuk, Sumonta Kasemvilas:
Comparison Performance of MFFV2 and MVFactor for Factoring the Modulus. 1-4 - Pierre Schnarz, Joachim Wietzke, Ingo Stengel:
Co-Processor Aided Attack on Embedded Multi-OS Environments. 1-4 - Ahmed Z. Emam:
Critical Success Factors Model for Business Intelligent over ERP Cloud. 1-5 - Sang-Won Bang, Kyeong-Jin Park, Woo-Sung Kim, Geun-Duk Park, Dong-Hyuk Im:
Design and Implementation of NFC-Based Mobile Coupon for Small Traders and Enterprisers. 1-2 - Dae-Won Park, Jaeyang Park, Doowy Kwon, Hyuk-Chul Kwon, Suhyun Park:
Design of Data Structure for System ENC Kernel. 1-3 - Eunhoe Kim, Sungmin Kim, Jaeyoung Choi:
Detecting Illegally-Copied Apps on Android Devices. 1-4 - Nam-Woo Kim, HoonJae Lee:
Developing of Vision-Based Virtual Combat Simulator. 1-4 - Jung-Chul Lee, Jae-Young Kim, Seungho Lee:
Development of a Flute Self-Learning Tool Using an Electronic Flute and PC Software. 1-4 - Youzheng Chen, Baozhong Cheng, Xiaoyan Zhang, Yi Sun, Jin Xie, Kun Li:
Development of Doubango-Based IMS UE for Teaching Experiments. 1-4 - Min Soo Kang, Jeong-Seok Jang, Kyounghak Lee:
Development of Robust Sensor Node for Internet of Things. 1-4 - Safia Shaik, Y. Padmasai, V. Naveen Kumar:
Development of Telugu Text to Speech System Using OMAP 3530. 1-5 - Mohamed Ahmed Mohamed Ali, Mohd Aizaini Maarof:
Dynamic Innate Immune System Model for Malware Detection. 1-4 - James Shueyen Tai, Kin Fun Li, Haytham Elmiligi:
Dynamic Time Warping Algorithm: A Hardware Realization in VHDL. 1-4 - Mitali Halder, Anant Dev Tyagi:
English-Hindi Transliteration by Applying Finite Rules to Data before Training Using Statistical Machine Translation. 1-4 - Khadidja Ameur, Nadjia Benblidia, Saliha Oukid-Khouas:
Enhanced Visual Clustering by Reordering of Dimensions in Parallel Coordinates. 1-4 - Regin Cabacas, In-ho Ra:
Evaluating Mobility Models in Delay Tolerant Network. 1-4 - Lawrence Y. Deng, Dong-Liang Lee, Yi-Jen Liu:
Face Recognition Lock. 1-2 - Abhinav S. Mansingka, Mohamed L. Barakat, Mohammed Affan Zidan, Ahmed Gomaa Radwan, Khaled N. Salama:
Fibonacci-Based Hardware Post-Processing for Non-Autonomous Signum Hyperchaotic System. 1-4 - Sanjaa Bold, Min A. Jeong, Seong Min Jeon, Seong-Ro Lee:
FPGA Based Real Time Embedded Color Tracking Mobile Robot. 1-4 - Anu Mary Chacko, Suresh Kumar, Vinod Pathari:
Generalized Architecture to Capture End to End Provenance in a System. 1-4 - Cheng-Da Huang, Acquah Hackman, Hsiu-Hsen Yao, Syuan-Yi Chen:
Generating a Road Situation Data Warehouse Using Detectives Car Approach. 1-4 - Hwei-Jen Lin, Yue Sheng Li:
Generation of Pencil Sketch Drawing. 1-4 - Wonho Suh:
Graphical Analysis of Mobile Computing Traffic Simulation Model. 1-4 - Suthasinee Iamsa-at, Punyaphol Horata:
Handwritten Character Recognition Using Histograms of Oriented Gradient Features in Deep Learning of Artificial Neural Network. 1-5 - Akihiko Maeta, Kenichi Takahashi, Takao Kawamura, Kazunori Sugahara:
Implementation of Logging for Information Tracking on Network. 1-4 - Byeong-Ju Kim, Yun-Hong Noh, Do-Un Jeong:
Implementation of Mobile Based Multi-Function Health Monitoring System. 1-4 - Byeong-Hoon Kim, Yun-Hong Noh, Do-Un Jeong:
Implementation of Template Matching Based ECG Compression Algorithm for Mobile Application. 1-4 - Yun-Hong Noh, Jiunn Huei Yap, Do-Un Jeong:
Implementation of the Abnormal ECG Monitoring System Using Heartbeat Check Map Technique. 1-4 - Anooj P. K.:
Implementing Decision Tree Fuzzy Rules in Clinical Decision Support System after Comparing with Fuzzy Based and Neural Network Based Systems. 1-6 - Ghassan N. Mohammed, Azman Yasin, Akram M. Zeki:
Improvement of the Quality for Digital Image Watermarking Based on Dual ISB. 1-4 - Kien Nguyen, Quang Tran Minh, Shigeki Yamada:
Increasing Resilience of OpenFlow WANs Using Multipath Communication. 1-2 - Chee Een Yap, Myung Ho Kim:
Instance-Based Ontology Matching with Rough Set Features Selection. 1-4 - Young-Min Kang, Do-Hoon Lee, Hwan-Gue Cho:
Iridescent Surface Rendering with Per-Channel Rotation of Anisotropic Microfacet Distribution. 1-4 - Kondwani Makanda, Jun-Cheol Jeon:
Key Distribution Protocol on Quantum Cryptography. 1-2 - Tomoyuki Mishima, Kenichi Takahashi, Takao Kawamura, Kazunori Sugahara:
Meeting Scheduling System Using Unpleasant Notification. 1-4 - Youngjun Jang, Jaeook Kwon, Sung Won Ahn, Chuck Yoo:
Memory Compaction Performance Improvement by Separating a Dirty Page Allocation. 1-3 - Hyeok-Joon Kwon, Jae Woo Yoon, Hong Cho, Seung-Jae Ryu, Byeong-Woo Kim:
Method of Noise Reduction for High-Voltage Systems Applied in Subsea Plants. 1-4 - Insu Song, John Vong:
Mobile Collaborative Experiential Learning (MCEL): Personalized Formative Assessment. 1-4 - Wonho Suh:
Mobile Computing Traffic Simulation Data Process. 1-4 - Wonho Suh:
Mobile Computing Traffic Simulation Framework. 1-3 - Insu Song, John Vong:
Mobile Core-Banking Server: Cashless, Branchless and Wireless Retail Banking for the Mass Market. 1-4 - D. Nikhitha, J. N. Chandra Sekhar:
Modeling and Simulation of IM Drive Performance Using PI, ANN and FLC. 1-4 - Kazuaki Aihara, Terumasa Aoki:
Motion Dense Sampling for Video Classification. 1-4 - Minseok Pyo, Sangwook Bae, Sunyoung Han:
Multicast Based Service Orchestration Protocol. 1-3 - Seokwon Yeom, Dong-Su Lee:
Multi-Level Segmentation for Concealed Object Detection with Multi-Channel Passive Millimeter Wave Imaging. 1-4 - JaeHyun Lee, Soonseok Kim, V. Scott Gordon:
National Standardization Strategy in Health Information Security Environment. 1-3 - Rouzbeh Behnia, Swee-Huay Heng:
Notes on Two Flawed Attacks on Undeniable Signature Schemes. 1-4 - Bee Bee Chua, Danilo Valeros Bernardo:
Open Source Developer Download Tiers: A Survival Framework. 1-5 - Manasarani Mandala, C. P. Gupta:
Optimal Placement of TCSC for Transmission Congestion Management Using Hybrid Optimization Approach. 1-5 - D. M. D. S. S. Dassanayake, R. A. D. D. Yasara, H. S. R. Fonseka, E. A. HeshanSandeepa, L. Seneviratne:
Panhinda - Offline Character Recognition System for Handwritten Articles. 1-4 - Min-Woo Jung, Jeonghun Cho:
Performance Evaluation for Cloud Computing in u-Health Environment. 1-4 - Min-Woo Jung, Jeonghun Cho:
Performance Evaluation of Wireless Body Area Network in u-Health Environment. 1-4 - Ilhoon Yoo, Taehyung Lee, Byeongwoo Kim, Jin Hur, Kyubong Yeon, Gyeonggeun Kim:
Performance Interpretation Method for Electrical Tractor Based on Model-Based Design. 1-4 - Ee Hung Chang, Kang-Leng Chiew, San-Nah Sze, Wei King Tiong:
Phishing Detection via Identification of Website Identity. 1-4 - Bongsup Park:
Physical Interactive Contents for the Converged Wellness Education. 1-2 - Byoungcheon Lee:
Practical Secret Signature Scheme with No Randomness Saving. 1-3 - Hiroshi Yamaguchi, Masahito Gotaishi, Phillip C.-Y. Sheu, Shigeo Tsujii:
Privacy Preserving Problem Solving Scheme. 1-4 - Mee Hong Ling, Kok-Lim Alvin Yau:
Reinforcement Learning-Based Trust and Reputation Model for Spectrum Leasing in Cognitive Radio Networks. 1-6 - Jeong Seok Kang, Young Gyu Kim, Hong Seong Park:
Remote Data Transmission Middleware for Telerobotics. 1-4 - Abel Avitesh Chandra, Yeonwoo Lee, Beom Mu Kim, Se Yeong Maeng, Sang Hyeok Park, Seong Ro Lee:
Review on Sensor Cloud and Its Integration with Arduino Based Sensor Network. 1-4 - Sang-min Lee, Haesung Tak, Kiejung Park, Hwan-Gue Cho, Do-Hoon Lee:
RNA-Seq Read Simulator Using SAM Template. 1-4 - Kuo-Hui Yeh, Kuo-Yu Tsai, Ren-Zong Kuo, Tzong-Chen Wu:
Robust Certificateless Signature Scheme without Bilinear Pairings. 1-4 - Dae-Hwan Kim, Hyeon-Sub Jung, Chung-Pyo Hong, Cheong-Ghil Kim, Shin-Dug Kim:
Rotated Object Recognition Based on Corner Feature Points for Mobile Augmented Reality Applications. 1-3 - Hyunwoo Lim, Jongbin Ko, Seokjun Lee, Jongwan Kim, Mijoo Kim, Taeshik Shon:
Security Architecture Model for Smart Grid Communication Systems. 1-4 - Feng Cheng, Amir Azodi, David Jaeger, Christoph Meinel:
Security Event Correlation Supported by Multi-Core Architecture. 1-5 - Ibrahim Patel, D. Aarti, S. Alekhya, Raghavender Kulkarni:
Sensible Heat Storage for Power Generation. 1-4 - Sanghyun Park, Tran Thi Thu Ha, Jadhav Yogiraj Shivajirao, Minsoo Hahn, Jaehyung Park, Jinsul Kim:
Smart Wheelchair Control System Using Cloud-Based Mobile Device. 1-3 - Salwa Elramly, Saeed Ashry, Abdulatief Elkouny, Ahmed Elsherbini, Hesham M. El-Badawy:
SMSHM: Secure Mesh Mode Protocol to Enhance Security of 4G Networks. 1-5 - Jaybie A. de Guzman, Roel M. Ocampo, Cedric Angelo M. Festin:
Social Graph-Based Partitioning and Distribution for OSN Content Caching and Proactive Delivery. 1-4 - Insu Cho, Heejun Park:
Spatial Information Service Model and Considerations in u-City. 1-3 - Sun-Min Hwang, Bok-Hee Song, Han-Hyung Yun:
Speaker Dependent Real-Time Vowel Recognition Algorithm for Lip Sync in Digital Contents. 1-4 - Jaemyoun Lee, Sanghwa Han, Junhee Ryu, Kyungtae Kang:
Strategy to Reduce I/O Access Time of Applications in Virtual Machines. 1-2 - Hyun-Joo Yoo, Seong-jeen Kim, Min-soo Jung:
Study of Garbage Collection Performance on Dalvik VM Heap Considering Real-Time Response. 1-3 - Radoslaw Nielek, Bogdan Ksiezopolski, Adam Wierzbicki, Lukasz Anwajler:
Surprising Consequences of Simple Privacy Protection Method. 1-5 - Jae Hoon Yoon, Jeong Seok Kang, Hong Seong Park:
Test Data Combination Strategy for Effective Test Suite Generation. 1-4 - Ji Woong Kim, Min Su Kim, Seung-Jae Yoo, Kuinam J. Kim:
The Efficient Security Management Measures Using K2-SMS in Case of Security Transport. 1-2 - Jeong-Myeong Kim, Geun-Duk Park:
The Experiment Results of Webcam Broadcasting Systems. 1-4 - Nik Ahmad Akram, Niusha Shafiabady, Dino Isa:
Using Neural Networks as Pipeline Defect Classifiers. 1-4 - Azeddien M. Sllame, Mohamed Jafaray:
Using Simulation and Modeling Tools in Teaching Computer Network Courses. 1-4 - Zdenek Silar, Martin Dobrovolny:
Utilization of Directional Properties of Optical Flow for Railway Crossing Occupancy Monitoring. 1-4 - Sunyoung Kang, Seungae Kang:
Virtual Private Network for Wellness Sports Information. 1-3 - Dong-Liang Lee, Lawrence Y. Deng, Yi-Jen Liu:
Visualization for Interest in Music Based on Plurk Social Network. 1-4 - Youngsuk Kim, Yoan Shin, Myungsik Yoo:
VLC-TDOA Using Sinusoidal Pilot Signal. 1-3 - Seungae Kang:
Wellness Contents for Disabled People's Rehabilitation. 1-3 - Anusha Bandari, D. Aarti, S. Alekhya, Ashok Shigli, Ibrahim Patel:
Wireless Radio Frequency Transmission for Bladder Pressure. 1-4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.