Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icitcs/icitcs2011.bht:"
@proceedings{DBLP:conf/icitcs/2011, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-94-007-2911-7}, doi = {10.1007/978-94-007-2911-7}, isbn = {978-94-007-2910-0}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/AhnLCRL11, author = {Hyochang Ahn and Yong{-}Hwan Lee and Han{-}Jin Cho and Sang{-}Burm Rhee and June{-}Hwan Lee}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {A RSSI-Based Approach for Localization of Wireless Sensor Network in Indoor}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {123--127}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_10}, doi = {10.1007/978-94-007-2911-7\_10}, timestamp = {Tue, 01 Feb 2022 08:29:46 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/AhnLCRL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/AliM11, author = {Mohamed Ahmed Mohamed Ali and Mohd Aizaini Maarof}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Malware Detection Techniques Using Artificial Immune System}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {575--587}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_55}, doi = {10.1007/978-94-007-2911-7\_55}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/AliM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/AwanSKHK11, author = {Muhammad Arshad Awan and Abdul Sattar and Cheong Ghil Kim and Chung{-}Pyo Hong and Shin{-}Dug Kim}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Semantic Search and Retrieval System for Learning Objects}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {129--143}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_11}, doi = {10.1007/978-94-007-2911-7\_11}, timestamp = {Thu, 05 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/AwanSKHK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/BaekHS11, author = {Su{-}Jin Baek and Jung{-}Soo Han and Young{-}Jae Song}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Security Threat Modeling and Requirement Analysis Method Based on Goal-Scenario}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {419--423}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_38}, doi = {10.1007/978-94-007-2911-7\_38}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/BaekHS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/BaekKKHS11, author = {Su{-}Jin Baek and Jong{-}Won Ko and Gui{-}Jung Kim and Jung{-}Soo Han and Young{-}Jae Song}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Goal-Heuristic Analysis Method for an Adaptive Process Mining}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {409--418}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_37}, doi = {10.1007/978-94-007-2911-7\_37}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/BaekKKHS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ChaKJJ11, author = {Sang{-}Jin Cha and Gahee Kim and Chol{-}Hee Jang and GeunSik Jo}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {An Effective Learning Method in Art Using Virtual Reality and Ontology}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {425--434}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_39}, doi = {10.1007/978-94-007-2911-7\_39}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/ChaKJJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ChaS011, author = {ByungRae Cha and JaeHyun Seo and JongWon Kim}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Design of Attribute-Based Access Control in Cloud Computing Environment}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {41--50}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_4}, doi = {10.1007/978-94-007-2911-7\_4}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/ChaS011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ChoKYKK11, author = {In{-}Pyo Cho and So{-}Hyang Ko and Hoon{-}Mo Yang and Cheong{-}Ghil Kim and Shin{-}Dug Kim}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {A Dynamic Buffer Management of Hybrid Solid State Disk for Media Applications}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {267--279}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_23}, doi = {10.1007/978-94-007-2911-7\_23}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/ChoKYKK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ChoL11, author = {Gi{-}Hwan Cho and Seung{-}Ah Lee}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {A Secure Service Framework for Handling Security Critical Data on the Public Cloud}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {3--12}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_1}, doi = {10.1007/978-94-007-2911-7\_1}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/ChoL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ChoiCK11, author = {Hun Choi and Yoo{-}Jung Choi and Ki{-}Mun Kim}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {The Understanding of Building Trust Model on Smartphone Application: Focusing on Users' Motivation}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {13--20}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_2}, doi = {10.1007/978-94-007-2911-7\_2}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/ChoiCK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ChoiS11, author = {Inhwan Choi and Dongkun Shin}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Wear Leveling for {PCM} Using Hot Data Identification}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {145--149}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_12}, doi = {10.1007/978-94-007-2911-7\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/ChoiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ChungRL11, author = {Kyung{-}Yong Chung and Kee{-}Wook Rim and Jung{-}Hyun Lee}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Performance Sensibility Influence of Recommended Makeup Styles}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {445--454}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_41}, doi = {10.1007/978-94-007-2911-7\_41}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/ChungRL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/CleeffDPW11, author = {Andr{\'{e}} van Cleeff and Trajce Dimkov and Wolter Pieters and Roel J. Wieringa}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Realizing Security Requirements with Physical Properties: {A} Case Study on Paper Voting}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {51--67}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_5}, doi = {10.1007/978-94-007-2911-7\_5}, timestamp = {Thu, 14 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/CleeffDPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/HanCI11, author = {Kyoung{-}Soo Han and Kyoung{-}Yong Chung and Eul Gyu Im}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {A Study on Instruction Substitution Analysis of Metamorphic Malware}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {595--599}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_57}, doi = {10.1007/978-94-007-2911-7\_57}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/HanCI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/HanI11, author = {Kyoung{-}Soo Han and Eul Gyu Im}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {A Survey on {P2P} Botnet Detection}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {589--593}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_56}, doi = {10.1007/978-94-007-2911-7\_56}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/HanI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/HanKI11, author = {Kyoung{-}Soo Han and In{-}Kyoung Kim and Eul Gyu Im}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Detection Methods for Malware Variant Using {API} Call Related Graphs}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {607--611}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_59}, doi = {10.1007/978-94-007-2911-7\_59}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/HanKI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/HanKI11a, author = {Kyoung{-}Soo Han and In{-}Kyoung Kim and Eul Gyu Im}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Malware Classification Methods Using {API} Sequence Characteristics}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {613--626}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_60}, doi = {10.1007/978-94-007-2911-7\_60}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/HanKI11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/HongAKK11, author = {Chung{-}Pyo Hong and Muhammad Arshad Awan and Cheong{-}Ghil Kim and Shin{-}Dug Kim}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {An Efficient Live Stream Community Management Scheme for the Mobile}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {281--293}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_24}, doi = {10.1007/978-94-007-2911-7\_24}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/HongAKK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/HsuH11, author = {Yi{-}Chang Hsu and Jing{-}Jang Hwang}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Controlling Decryption of Personal Health Records in the Cloud}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {69--79}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_6}, doi = {10.1007/978-94-007-2911-7\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/HsuH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/HyunJC11, author = {Hyun Yoo and Hoill Jung and Kyung{-}Yong Chung}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Development of Pain Prescription Decision Systems for Nursing Intervention}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {435--444}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_40}, doi = {10.1007/978-94-007-2911-7\_40}, timestamp = {Tue, 12 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/HyunJC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ImH11, author = {Eul Gyu Im and Kyoung{-}Soo Han}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {An Analysis of Malware Attached in Spam}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {601--605}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_58}, doi = {10.1007/978-94-007-2911-7\_58}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/ImH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/JangS11, author = {Young{-}Joon Jang and Dongkun Shin}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {{HARD:} Host-Level Address Remapping Driver for Solid-State Disk}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {163--168}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_14}, doi = {10.1007/978-94-007-2911-7\_14}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/JangS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/JoC11, author = {Sun{-}Moon Jo and Kyung{-}Yong Chung}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Access Control Mechanism for {XML} Document}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {81--90}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_7}, doi = {10.1007/978-94-007-2911-7\_7}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/JoC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KangCRL11, author = {Sung{-}Kwan Kang and Kyung{-}Yong Chung and Kee{-}Wook Rim and Jung{-}Hyun Lee}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Development of Real-Time Gesture Recognition System Using Visual Interaction}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {295--306}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_25}, doi = {10.1007/978-94-007-2911-7\_25}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/KangCRL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Khan11, author = {Abdul Raouf Khan}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Architecture of Image Encryption Hardware Using Two Dimensional Cellular Automata}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {307--315}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_26}, doi = {10.1007/978-94-007-2911-7\_26}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/Khan11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Kim11, author = {Sung{-}Ho Kim}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Development of Real-Time Location-Based Multimedia Style Slop Information Retrieval System}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {331--335}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_29}, doi = {10.1007/978-94-007-2911-7\_29}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/Kim11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Kim11a, author = {Hyun{-}Jun Kim}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Affective Social Network}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {455--461}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_42}, doi = {10.1007/978-94-007-2911-7\_42}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/Kim11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Kim11b, author = {Hyun{-}Jun Kim}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Discovering Knowledge Flow in Social Network}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {469--477}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_44}, doi = {10.1007/978-94-007-2911-7\_44}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/Kim11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Kim11c, author = {Sunhoe Kim}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Fuel Cell System Control Algorithm for Stable Operation of Residential Fuel Cell System}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {557--560}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_52}, doi = {10.1007/978-94-007-2911-7\_52}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/Kim11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/Kim11d, author = {Sunhoe Kim}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Types of Fuel Cells and Applications for Electricity and Heat Co-Generation}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {561--565}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_53}, doi = {10.1007/978-94-007-2911-7\_53}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/Kim11d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KimASLC11, author = {Jong{-}Hun Kim and Sihoon Ahn and Jaeyoung Soh and Daesung Lee and Kyung{-}Yong Chung}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Ubiquitous Based Personalized Hypertension Monitoring System}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {169--177}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_15}, doi = {10.1007/978-94-007-2911-7\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/KimASLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KimCK11, author = {Si{-}Jung Kim and Do{-}Eun Cho and Bong{-}Han Kim}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Customized {IPTV} Content Recommendation Service Model Based on Personal Preference}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {179--189}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_16}, doi = {10.1007/978-94-007-2911-7\_16}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/KimCK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KimH11, author = {Gui{-}Jung Kim and Jung{-}Soo Han}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Simulation of 3D Information Visualization}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {317--323}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_27}, doi = {10.1007/978-94-007-2911-7\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/KimH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KimJHLK11, author = {Byung Ki Kim and Jae Hyeok Jang and Kyung Woo Hur and Jeong{-}Gun Lee and Young Woong Ko}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Monitoring and Feedback Tools for Realtime Workloads for Xen Virtual Machine}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {151--161}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_13}, doi = {10.1007/978-94-007-2911-7\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/KimJHLK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KimKLK11, author = {Ui{-}Hyong Kim and Jung{-}Min Kang and Jae{-}Sung Lee and Hyong{-}Shik Kim}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Practical Firewall Policy Inspection Using Anomaly Detection and Its Visualization}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {629--639}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_61}, doi = {10.1007/978-94-007-2911-7\_61}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/KimKLK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KimPK11, author = {Kyu Chul Kim and Chan Jung Park and Ronny Yongho Kim}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Group Based Vehicular Machine to Machine Communication Scheme in Cellular Networks}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {325--329}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_28}, doi = {10.1007/978-94-007-2911-7\_28}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/KimPK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KoBS11, author = {Jong{-}Won Ko and Su{-}Jin Baek and Young{-}Jae Song}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Model Optimization with Graph Transformation and {PSO} Algorithm for Model Transformation Verification}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {479--487}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_45}, doi = {10.1007/978-94-007-2911-7\_45}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/KoBS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/KoHS11, author = {Jong{-}Won Ko and Jung{-}Soo Han and Young{-}Jae Song}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Pattern Based Model Transformation Using Mapping Patterns for Model Transformation Verification}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {489--493}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_46}, doi = {10.1007/978-94-007-2911-7\_46}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/KoHS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/LeeA11, author = {Kyuho Lee and Seongjin Ahn}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {A Study of a Network Capacity Planning by Analyzing Joint Probability of a Virtual Organization}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {357--365}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_32}, doi = {10.1007/978-94-007-2911-7\_32}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/LeeA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/LeeKLKC11, author = {Jae{-}Young Lee and Kee{-}Baek Kim and Seok{-}Han Lee and Tae{-}eun Kim and Jong{-}Soo Choi}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Image Registration for Sub-Pixel Using Pyramid Edge Images}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {367--371}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_33}, doi = {10.1007/978-94-007-2911-7\_33}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/LeeKLKC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/LeeLJS11, author = {Eun{-}Seok Lee and Jin{-}Hee Lee and Inwoo Jo and Byeong{-}Seok Shin}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Vertex Propagation for Fast Ray-Casting of Digital Elevation Model}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {345--356}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_31}, doi = {10.1007/978-94-007-2911-7\_31}, timestamp = {Wed, 09 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/LeeLJS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/LeeLLKC11, author = {Ahr{-}Hyun Lee and Seok{-}Han Lee and Jae{-}Young Lee and Tae{-}eun Kim and Jong{-}Soo Choi}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Real-Time Camera Tracking Using Planar Object Detection}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {373--378}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_34}, doi = {10.1007/978-94-007-2911-7\_34}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/LeeLLKC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/LeeLR11, author = {Nam{-}Kyung Lee and Hyun{-}Woo Lee and Won Ryu}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Case Study of QoS-Assured Convergence Service Overlay in Open Service Platform Environment}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {205--216}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_18}, doi = {10.1007/978-94-007-2911-7\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/LeeLR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/LeeS11, author = {Seung{-}Hyung Lee and Young{-}Jae Song}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Aspect Oriented Software Development Using Requirement Engineering}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {217--221}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_19}, doi = {10.1007/978-94-007-2911-7\_19}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/LeeS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/LimJYL11, author = {Sukhyun Lim and Hyung{-}Keun Jee and Jinyoung Youn and Junsuk Lee}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Augmented Reality-Based Role-Playing Contents for Education}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {337--344}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_30}, doi = {10.1007/978-94-007-2911-7\_30}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/LimJYL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/LimKK11, author = {Yeong{-}Gyu Lim and Cheong Ghil Kim and Shin{-}Dug Kim}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {A Study on the Touch Process of Android Smartphone on Froyo and Gingerbread}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {191--204}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_17}, doi = {10.1007/978-94-007-2911-7\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/LimKK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/MalekianA11, author = {Reza Malekian and Abdul Hanan Abdullah}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Bidirectional Propagation Method for Analysis of Reflection on Radio Networks}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {379--388}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_35}, doi = {10.1007/978-94-007-2911-7\_35}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/MalekianA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ManH11, author = {Man Doan Nguyen and Eui{-}Nam Huh}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {A Collaborative Intrusion Detection System Framework for Cloud Computing}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {91--109}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_8}, doi = {10.1007/978-94-007-2911-7\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/ManH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/McheickDD11, author = {Hamid Mcheick and Mohamad Dbouk and Fady Dagher}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Reducing the Gap of Provided Services and Requires Services Based on Service Approach}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {523--537}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_50}, doi = {10.1007/978-94-007-2911-7\_50}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/McheickDD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/MengK11, author = {Yao Meng and Hee{-}Cheol Kim}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {A Review of Accelerometer-Based Physical Activity Measurement}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {223--237}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_20}, doi = {10.1007/978-94-007-2911-7\_20}, timestamp = {Tue, 14 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icitcs/MengK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/PakP11, author = {Ju{-}Geon Pak and Kee{-}Hyun Park}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {A Group Data Synchronization Protocol in Mobile Environments}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {239--251}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_21}, doi = {10.1007/978-94-007-2911-7\_21}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/PakP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ParkKC11, author = {Sang{-}Wook Park and Tae{-}eun Kim and Jong{-}Soo Choi}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Robust Estimation of Heights of Moving People Using a Single Camera}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {389--405}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_36}, doi = {10.1007/978-94-007-2911-7\_36}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/ParkKC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ParkP11, author = {Kee{-}Hyun Park and Ju{-}Geon Pak}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Efficient Transmission Method for Mobile Data Synchronization Based on Data Characteristics}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {253--263}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_22}, doi = {10.1007/978-94-007-2911-7\_22}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/ParkP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ParkRMA11, author = {Sangseo Park and Anthonie B. Ruighaver and Sean B. Maynard and Atif Ahmad}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Towards Understanding Deterrence: Information Security Managers' Perspective}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {21--37}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_3}, doi = {10.1007/978-94-007-2911-7\_3}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/ParkRMA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ParkY11, author = {Seung{-}Bo Park and Eunsoon You}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Story Modeling for Green Light Decision Making}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {517--521}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_49}, doi = {10.1007/978-94-007-2911-7\_49}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/ParkY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/ParkYJ11, author = {Seung{-}Bo Park and Eunsoon You and Jason J. Jung}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Potential Emotion Word in Movie Dialog}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {507--516}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_48}, doi = {10.1007/978-94-007-2911-7\_48}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/ParkYJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/SeoC11, author = {Hyung{-}Jun Seo and Yoon{-}Cheol Choy}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Criteria for Comparing Cyberwarfare Capability}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {111--120}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_9}, doi = {10.1007/978-94-007-2911-7\_9}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/SeoC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/SimS11, author = {Sung{-}Ho Sim and Young{-}Jae Song}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {A Study on the Metadata Extraction and Repository Based on Web Service Meta Broker}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {463--467}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_43}, doi = {10.1007/978-94-007-2911-7\_43}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/SimS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/WichaiwongJ11, author = {Tanakorn Wichaiwong and Chuleerat Jaruskulchai}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {An Extended {XML} Compression Technique for {XML} Element Retrieval}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {539--554}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_51}, doi = {10.1007/978-94-007-2911-7\_51}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/WichaiwongJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/YooPL11, author = {Yoon{-}Sik Yoo and Wan{-}Ki Park and Il{-}Woo Lee}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Integrated Energy Management System Framework for the Distributed Smart Meters in Smart Grid Environment}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {567--572}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_54}, doi = {10.1007/978-94-007-2911-7\_54}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/YooPL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitcs/YouP11, author = {Eunsoon You and Seung{-}Bo Park}, editor = {Kuinam J. Kim and Seong{-}Jin Ahn}, title = {Improved Performance of Emotion Extraction Through Banned Words}, booktitle = {Proceedings of the International Conference on {IT} Convergence and Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011}, series = {Lecture Notes in Electrical Engineering}, volume = {120}, pages = {495--505}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-94-007-2911-7\_47}, doi = {10.1007/978-94-007-2911-7\_47}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitcs/YouP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.