default search action
RACS 2013: Montreal, QC, Canada
- Ching Y. Suen, Amir G. Aghdam, Minyi Guo, Jiman Hong, Esmaeil S. Nadimi:
Research in Adaptive and Convergent Systems, RACS'13, Montreal, QC, Canada, October 1-4, 2013. ACM 2013, ISBN 978-1-4503-2348-2
Artificial intelligence & algorithm
- Jeongmin Kim, Ri Choe, Kwang Ryel Ryu:
Multi-objective optimization of dispatching strategies for situation-adaptive AGV operation in an automated container terminal. 1-6 - Nhauo Davuth, Sung-Ryul Kim:
A better edit distance measure allowing for block swaps. 7-11 - Michael Doherty, Chih-Cheng Hung:
Performance consequences of introducing an internal penalty function to a genetic algorithm for scheduling. 12-15 - Juan Mendivelso, Yoan J. Pinzón, Inbok Lee:
Finding overlaps within regular expressions with variable-length gaps. 16-21 - Ying Qiao, Chang Leng, Hongan Wang, Jian Liu:
Developing a real-time inference approach for rule-based reasoning systems. 22-27 - Anuj Sharma, Shubhamoy Dey:
A boosted SVM based sentiment analysis approach for online opinionated text. 28-34 - Shrawan Kumar Trivedi, Shubhamoy Dey:
Effect of feature selection methods on machine learning classifiers for detecting email spams. 35-40
Short papers (posters)
- Hamid Mcheick, Karam Mustapha, Sehl Mellouli:
Towards of complex natural disasters systems framework. 41-42 - Sung-il Oh, Min Sik Kim, Inbok Lee:
An efficient bit-parallel algorithm for IDS. 43-44 - Anand Paul:
Graph based M2M optimization in an IoT environment. 45-46 - Adolfo Avila Barón, Margareth Lorena Alfonso, Pedro Enrique Jimenez:
Electronic systems integration of a locomotion rehabilitation platform with ANFIS simulation. 47-50
Cloud computing & programming language
- Mikyung Kang, Dong-In Kang, Seungwon Lee, Jaedon Lee:
A system framework and API for run-time adaptable parallel software. 51-56 - Paul Tarau:
Two mechanisms for generating infinite families of pairing bijections. 57-62 - HyoYoung Kim, Sungtae Ryu, Hwansoo Han:
CUBIT: compact bitmap profiling for dynamic data dependence analysis. 63-68 - Fei Cao, Dabin Ding, Dunren Che, Mengxia Michelle Zhu, Wen-Chi Hou:
Scheduling data processing flows under budget constraint on the cloud. 69-74 - M. Newlin Rajkumar, V. Venkatesa Kumar, R. Sivaramakrishnan:
Efficient integrity auditing services for cloud computing using raptor codes. 75-78
Short paper (poster)
- Sanghoon Choi, Jinman Jung:
A locality-aware home migration for software distributed shared memory. 79-81
Database & data mining
- Choukri Djellali:
Using hamming similarity to map ontology learning: a new data mining system. 82-87 - Choukri Djellali:
A new on-line digital conceptual model oriented corporate memory constructing: taking unstructured text as a case. 88-93 - Min-Hee Jang, Tae-Hwan Eom, Sang-Wook Kim, Young-Sup Hwang:
A semantic similarity measure in document databases: an earth mover's distance-based approach. 94-99 - Junping Sun, Jiman Hong:
Index selection: a query pattern mining based approach. 100-106 - Jeongin Kim, Eunji Lee, Junho Choi, Yonggeun Bae, Miah Ko, Pankoo Kim:
Monitoring social relationship among Twitter users by using NodeXL. 107-110 - Masoud Reyhani Hamedani, Sang-Chul Lee, Sang-Wook Kim:
On combining text-based and link-based similarity measures for scientific papers. 111-115
Short papers (posters)
- Sang-Chul Lee, Sang-Wook Kim, Sunju Park:
Recommendation in online shopping malls: results and experiences. 116-117 - Markus Rickert, Maximilian Eibl:
Evaluation of media analysis and information retrieval solutions for audio-visual content through their integration in realistic workflows of the broadcast industry. 118-121
Image processing
- Sung-Il Joo, Sun-Hee Weon, Hyung Il Choi:
A novel method of artificial caption detection in videos using temporal and spatial information. 122-127 - Deqian Fu, Shunbo Hu, Seong Tae Jhang:
Visual tracking with representative templates based on low-rank matrix. 128-133 - Zhenhai Wang, Kicheon Hong:
A new approach for adaptive background object tracking based on Kalman filter and mean shift. 134-139 - K. Bharanitharan:
Improved pre-processing algorithm in spatial scalability for scalable video coding. 140-145 - Ai Min Li, Pil Seong Park:
An association-based multi-target tracking method. 146-151 - Tuan-Anh Nguyen, Beomsu Kim, Min-Cheol Hong:
MRF-based adaptive detection approach: a framework for restoring image degraded by Gaussian noise. 152-156 - Jiayong Deng, Youngjoon Han:
A real-time system of lane detection and tracking based on optimized RANSAC B-spline fitting. 157-164 - Jong-Geun Oh, Min-Cheol Hong:
Adaptive retinex back-light compensation algorithm using skewness information of image. 165-170 - Min Woo Park, Jung Pil Park, Soon Ki Jung:
Real-time vehicle detection using equi-height mosaicking image. 171-176 - Zhe Li, Wei Wang, Sung Y. Shin, Hyung Do Choi:
Enhanced roughness index for breast cancer benign/malignant measurement using Gaussian mixture model. 177-181 - Byung K. Jung, Seong-Ho Son, Jeong-Ki Pack:
Magnetic resonance image retrieval based on contour to centroid triangulation with shape feature similarity. 182-186 - Hyun I. Kim, Sung Y. Shin, Wei Wang, Soon-Ik Jeon:
SVM-based Harris corner detection for breast mammogram image normal/abnormal classification. 187-191
Short paper (poster)
- Myoung-Jin Kim, Beomsu Kim, Min-Cheol Hong:
Image enhancement and post-processing for low-resolution compressed video. 192-195
Network computing
- Hsueh-Wen Tseng, Shiann-Tsong Sheu, Shiau-Yi Ou:
Node joining and grouping scheme for avoiding hidden node problem in IEEE 802.15.4 wireless sensor networks. 196-201 - Paul Moulema, Wei Yu, Guobin Xu, David W. Griffith, Nada Golmie, Chao Lu, David H. Su:
On simulation study of mesh-based protocols for smart grid communication networks. 202-207 - Geumsan Jo, Hyun Jung Choe, Hyunseung Choo:
Predictive handover scheme using mobility history in PMIPv6. 208-213 - Yung-Feng Lu, Jun Wu, Chin-Fu Kuo:
A path-generation framework for real-time query processing in wireless sensor networks. 214-219 - Wei-Te Wong, Ai-Chun Pang, Miao-Ru Hsu:
RAT selection for heterogeneous wireless networks using support vector machine. 220-225 - Esmaeil S. Nadimi, Victoria Blanes-Vidal, Per Michael Johansen:
Bayesian-based localization in inhomogeneous transmission media. 226-231 - Jekuk Yun, Beomseok Hong, Yanggon Kim:
The BGP monitoring and alarming system to detect and prevent anomaly IP prefix advertisement. 232-236 - Hongseok Yoo, Dongkyun Kim:
C2-CODER: coverage-controlled network CODEd repetition for vehicular ad-hoc networks. 237-241 - A. (Zizo) Farrag:
Fault-tolerant circulant digraphs networks. 242-247 - Jaesung Park, Yujin Lim:
An overlay network construction method using swarm intelligence for an application-level multicast service. 248-253 - Basit Manzoor, Nadeem Javaid, Obaid Ur Rehman, Safdar Hussain Bouk, Syed Hassan Ahmed, Se Hyun Park, Dongkyun Kim:
Energy aware error control in cooperative communication in wireless sensor networks. 254-260 - Jaeseok Shim, Yujin Lim, Jaesung Park:
Architectural design of cloud gateway in smart surveillance system. 261-266 - Danyang Zhang, Fan Li, Zhou Su:
A distortion estimation based packet scheduling strategy for H.264 video over wireless networks. 267-272 - Sungwon Lee, Dongkyun Kim:
Fast retransmit for flooding-based routing in underwater wireless sensor networks. 273-276 - Mohammad Mehdi Asadi, Amir Ajorlou, Amir G. Aghdam, Stéphane Blouin:
Global network connectivity assessment via local data exchange for underwater acoustic sensor networks. 277-282 - Jalal Habibi, Amir G. Aghdam, Ali Ghrayeb:
A framework for analyzing the performance of distributed lifetime-efficient routing schemes in wireless sensor networks. 283-288
Short papers (posters)
- Donghwa Kang, Daeshin Park, Yookun Cho:
A worm-containing strategy using a social network and PageRank. 289-292
Security
- Haokun Tang, Jun Huang, Wei Wang:
A novel passive worm defense model for multimedia sharing. 293-299 - Wei Yu, Zhijiang Chen, Guobin Xu, Sixiao Wei, Nnanna Ekedebe:
A threat monitoring system for smart mobiles in enterprise networks. 300-305 - Younsik Jeong, Seong-je Cho, Moonju Park, Jeonguk Ko, Hyungjoon Shim, Joonmo Kim, Sangchul Han, Minkyu Park:
An efficient protection scheme of digital contents under mobile devices. 306-311 - Zhi-Guo Chen, Sung-Ryul Kim:
Combining principal component analysis, decision tree and naïve Bayesian algorithm for adaptive intrusion detection. 312-316 - Kyoung-Soo Han, Jae Hyun Lim, Eul Gyu Im:
Malware analysis method using visualization of binary files. 317-321 - Yeo Reum Lee, Boojoong Kang, Eul Gyu Im:
Function matching-based binary-level software similarity calculation. 322-327 - Abdelwahab Hamou-Lhadj, Syed Shariyar Murtaza, Waseem Fadel, Ali Mehrabian, Mario Couture, Raphaël Khoury:
Software behaviour correlation in a redundant and diverse environment using the concept of trace abstraction. 328-335 - Jeonguk Ko, Hyungjoon Shim, Dongjin Kim, Younsik Jeong, Seong-je Cho, Minkyu Park, Sangchul Han, Seong Baeg Kim:
Measuring similarity of android applications via reversing and K-gram birthmarking. 336-341 - Ho Kwon Lee, Hyung Soon Chung, Sung-Ryul Kim:
Memory hacking analysis in mobile devices for hybrid model of copyright protection for Android apps. 342-346
Short papers (posters)
- Phuong Do, Ho-Seok Kang, Sung-Ryul Kim:
Improved signature based intrusion detection using clustering rule for decision tree. 347-348 - Byeongho Kang, Boojoong Kang, Jungtae Kim, Eul Gyu Im:
Android malware classification method: Dalvik bytecode frequency analysis. 349-350 - Sunwoo Kim, TaeGuen Kim, Eul Gyu Im:
Real-time malware detection framework in intrusion detection systems. 351-352 - JaeKeun Lee, Boojoong Kang, Eul Gyu Im:
Rule-based anti-anti-debugging system. 353-354 - Youngsu Park, Jiman Hong:
An effective API extraction scheme for dynamic binary similarity comparison. 355-356 - Minwoo Jang, Daeho Kim:
Filtering illegal Android application based on feature information. 357-358 - Bongjae Kim, Jinman Jung:
Impact of multiple watermarks for protecting copyright of applications on smart mobile devices. 359-360 - Joonhyouk Jang, Bongjae Kim, Yookun Cho:
Impact of software watermarking on smart devices. 361-362 - Hyunho Ji, Woochur Kim:
Design of a mobile inspector for detecting illegal Android applications using fingerprinting. 363-364
Software engineering
- Amrita Chaturvedi, Tadinada Vankata Prabhakar:
Ontology driven creational design patterns: creating objects on the fly. 365-372 - Tomás Cerný, Michael J. Donahoo, Eunjee Song:
Towards effective adaptive user interfaces design. 373-380 - Ajay Kumar Jha, Sooyong Jeong, Woo Jin Lee:
Value-deterministic search-based replay for android multithreaded applications. 381-386 - Sleiman Rabah, Serguei A. Mokhov, Joey Paquet:
An interactive graph-based automation assistant: a case study to manage the GIPSY's distributed multi-tier run-time system. 387-394
Short papers (posters)
- Hamid Mcheick, Youcef Baghdadi, Naoufel Kraïem:
Towards of service-oriented design architecture method. 395-396 - Anupama Surendran, Philip Samuel:
Fault localization using forward slicing spectrum. 397-398
System software
- Junghoon Lee, Gyung-Leen Park, Il-Woo Lee, Wan-Ki Park:
Evaluation of prediction error effects in wind energy-based electric vehicle charging. 399-403 - Shuo-Hung Chen, Hsiao-Mei Lin, Kuo-Yi Chen, Yuan-Hao Chang, Pen-Chung Yew, Chien-Chung Ho:
A systematic methodology for OS benchmark characterization. 404-409 - Chin-Fu Kuo, Lieng-Cheng Chien, Yung-Feng Lu:
Scheduling algorithm with energy-response trade-off considerations for mixed task sets. 410-415 - Maw-Yi Chou, Chin-Hsien Wu:
PMCD: a parallel multi-controller design for solid-state drives. 416-421 - Ju Hee Choi, Jong Wook Kwak, Seong Tae Jhang, Chu Shik Jhon:
Data filter cache with word selection cache for low power embedded processor. 422-427 - Yuanfeng Wen, Chaitanya Belwal, Albert M. K. Cheng:
Towards optimal priority assignments for the transactional event handlers of P-FRP. 428-433 - A. K. M. Jahangir Alam Majumder, Ishmat Zerin, Md. Miftah Uddin, Sheikh Iqbal Ahamed, Roger O. Smith:
smartPrediction: a real-time smartphone-based fall risk prediction and prevention system. 434-439 - Chaitanya Belwal, Albert M. K. Cheng, Jim Ras, Yuanfeng Wen:
Variable voltage scheduling with the priority-based functional reactive programming language. 440-445 - Chi-Sheng Shih, Trang-Khon Trieu:
Shadow phone: context aware device replication for disaster management. 446-453 - Mohammad Adibuzzaman, Niharika Jain, Nicholas Steinhafel, Munirul M. Haque, Ferdaus Ahmed Kawsar, Sheikh Iqbal Ahamed, Richard Love:
Towards in situ affect detection in mobile devices: a multimodal approach. 454-460 - Po-Chun Huang, Yuan-Hao Chang, Tei-Wei Kuo, Chien-Chung Ho, Hyunseung Choo:
Joint management of performance-predictable virtualized storage devices with hard disk and flash memory. 461-466 - Dongwoo Kang, Heekwon Park, Jongmoo Choi:
Effect of page frame allocation pattern on bank conflicts in multi-core systems. 467-472 - Yan-Ru Chen, Yien-Chang Liao, Pi-Chen Chiu, Ai-Chun Pang:
Buddy2GuessWho: a smartphone application in on-line social network platform. 473-478 - Hyunjun Kim, Joonwook Ahn, Sungtae Ryu, Jungsik Choi, Hwansoo Han:
In-memory file system for non-volatile memory. 479-484
Short papers (posters)
- JeeHyun Yang, Kyujung Kim, George Legrady:
Viewer generated audio-visual communication system using Braille metaphor. 485-486 - Joonhyouk Jang, Yookun Cho, Jinman Jung, Gwangil Jeon:
Enhancing lookup performance of key-value stores using cuckoo hashing. 487-489 - Jae-Hoon An, Younghwan Kim, Kiman Jeon:
Design and implementation of the fusion simulator based on multi-shader GPU. 490-491 - Byung-Kun Park, Sang-Hee Yoon, Kyung-Seop Kim, Woon-Mook Kim:
XpeedQ: a reliable and efficient application level message queue. 492-494 - Min-Yu Tsai, Shih-Hao Hung:
Hardware acceleration for proton beam Monte Carlo simulation. 495-496 - Eunseok Choi, Minwoo Jang:
A service-control framework based on digital watermarks for music streaming on smart devices. 497-498 - Bong-Joo Kim, Pankoo Kim, Hong Min, Chang Oan Sung, Jung-Yeop Kim, Eunseok Choi:
An efficient patient monitoring system. 499-500
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.