Search dblp for Publications

export results for "toc:db/conf/icitcs/icitcs2011.bht:"

 download as .bib file

@proceedings{DBLP:conf/icitcs/2011,
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-94-007-2911-7},
  doi          = {10.1007/978-94-007-2911-7},
  isbn         = {978-94-007-2910-0},
  timestamp    = {Tue, 01 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/AhnLCRL11,
  author       = {Hyochang Ahn and
                  Yong{-}Hwan Lee and
                  Han{-}Jin Cho and
                  Sang{-}Burm Rhee and
                  June{-}Hwan Lee},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {A RSSI-Based Approach for Localization of Wireless Sensor Network
                  in Indoor},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {123--127},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_10},
  doi          = {10.1007/978-94-007-2911-7\_10},
  timestamp    = {Tue, 01 Feb 2022 08:29:46 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/AhnLCRL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/AliM11,
  author       = {Mohamed Ahmed Mohamed Ali and
                  Mohd Aizaini Maarof},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Malware Detection Techniques Using Artificial Immune System},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {575--587},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_55},
  doi          = {10.1007/978-94-007-2911-7\_55},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/AliM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/AwanSKHK11,
  author       = {Muhammad Arshad Awan and
                  Abdul Sattar and
                  Cheong Ghil Kim and
                  Chung{-}Pyo Hong and
                  Shin{-}Dug Kim},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Semantic Search and Retrieval System for Learning Objects},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {129--143},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_11},
  doi          = {10.1007/978-94-007-2911-7\_11},
  timestamp    = {Thu, 05 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/AwanSKHK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/BaekHS11,
  author       = {Su{-}Jin Baek and
                  Jung{-}Soo Han and
                  Young{-}Jae Song},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Security Threat Modeling and Requirement Analysis Method Based on
                  Goal-Scenario},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {419--423},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_38},
  doi          = {10.1007/978-94-007-2911-7\_38},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/BaekHS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/BaekKKHS11,
  author       = {Su{-}Jin Baek and
                  Jong{-}Won Ko and
                  Gui{-}Jung Kim and
                  Jung{-}Soo Han and
                  Young{-}Jae Song},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Goal-Heuristic Analysis Method for an Adaptive Process Mining},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {409--418},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_37},
  doi          = {10.1007/978-94-007-2911-7\_37},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/BaekKKHS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ChaKJJ11,
  author       = {Sang{-}Jin Cha and
                  Gahee Kim and
                  Chol{-}Hee Jang and
                  GeunSik Jo},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {An Effective Learning Method in Art Using Virtual Reality and Ontology},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {425--434},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_39},
  doi          = {10.1007/978-94-007-2911-7\_39},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/ChaKJJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ChaS011,
  author       = {ByungRae Cha and
                  JaeHyun Seo and
                  JongWon Kim},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Design of Attribute-Based Access Control in Cloud Computing Environment},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {41--50},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_4},
  doi          = {10.1007/978-94-007-2911-7\_4},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/ChaS011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ChoKYKK11,
  author       = {In{-}Pyo Cho and
                  So{-}Hyang Ko and
                  Hoon{-}Mo Yang and
                  Cheong{-}Ghil Kim and
                  Shin{-}Dug Kim},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {A Dynamic Buffer Management of Hybrid Solid State Disk for Media Applications},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {267--279},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_23},
  doi          = {10.1007/978-94-007-2911-7\_23},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/ChoKYKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ChoL11,
  author       = {Gi{-}Hwan Cho and
                  Seung{-}Ah Lee},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {A Secure Service Framework for Handling Security Critical Data on
                  the Public Cloud},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {3--12},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_1},
  doi          = {10.1007/978-94-007-2911-7\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/ChoL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ChoiCK11,
  author       = {Hun Choi and
                  Yoo{-}Jung Choi and
                  Ki{-}Mun Kim},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {The Understanding of Building Trust Model on Smartphone Application:
                  Focusing on Users' Motivation},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {13--20},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_2},
  doi          = {10.1007/978-94-007-2911-7\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/ChoiCK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ChoiS11,
  author       = {Inhwan Choi and
                  Dongkun Shin},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Wear Leveling for {PCM} Using Hot Data Identification},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {145--149},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_12},
  doi          = {10.1007/978-94-007-2911-7\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/ChoiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ChungRL11,
  author       = {Kyung{-}Yong Chung and
                  Kee{-}Wook Rim and
                  Jung{-}Hyun Lee},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Performance Sensibility Influence of Recommended Makeup Styles},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {445--454},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_41},
  doi          = {10.1007/978-94-007-2911-7\_41},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/ChungRL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/CleeffDPW11,
  author       = {Andr{\'{e}} van Cleeff and
                  Trajce Dimkov and
                  Wolter Pieters and
                  Roel J. Wieringa},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Realizing Security Requirements with Physical Properties: {A} Case
                  Study on Paper Voting},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {51--67},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_5},
  doi          = {10.1007/978-94-007-2911-7\_5},
  timestamp    = {Thu, 14 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/CleeffDPW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/HanCI11,
  author       = {Kyoung{-}Soo Han and
                  Kyoung{-}Yong Chung and
                  Eul Gyu Im},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {A Study on Instruction Substitution Analysis of Metamorphic Malware},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {595--599},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_57},
  doi          = {10.1007/978-94-007-2911-7\_57},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/HanCI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/HanI11,
  author       = {Kyoung{-}Soo Han and
                  Eul Gyu Im},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {A Survey on {P2P} Botnet Detection},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {589--593},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_56},
  doi          = {10.1007/978-94-007-2911-7\_56},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/HanI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/HanKI11,
  author       = {Kyoung{-}Soo Han and
                  In{-}Kyoung Kim and
                  Eul Gyu Im},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Detection Methods for Malware Variant Using {API} Call Related Graphs},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {607--611},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_59},
  doi          = {10.1007/978-94-007-2911-7\_59},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/HanKI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/HanKI11a,
  author       = {Kyoung{-}Soo Han and
                  In{-}Kyoung Kim and
                  Eul Gyu Im},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Malware Classification Methods Using {API} Sequence Characteristics},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {613--626},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_60},
  doi          = {10.1007/978-94-007-2911-7\_60},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/HanKI11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/HongAKK11,
  author       = {Chung{-}Pyo Hong and
                  Muhammad Arshad Awan and
                  Cheong{-}Ghil Kim and
                  Shin{-}Dug Kim},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {An Efficient Live Stream Community Management Scheme for the Mobile},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {281--293},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_24},
  doi          = {10.1007/978-94-007-2911-7\_24},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/HongAKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/HsuH11,
  author       = {Yi{-}Chang Hsu and
                  Jing{-}Jang Hwang},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Controlling Decryption of Personal Health Records in the Cloud},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {69--79},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_6},
  doi          = {10.1007/978-94-007-2911-7\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/HsuH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/HyunJC11,
  author       = {Hyun Yoo and
                  Hoill Jung and
                  Kyung{-}Yong Chung},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Development of Pain Prescription Decision Systems for Nursing Intervention},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {435--444},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_40},
  doi          = {10.1007/978-94-007-2911-7\_40},
  timestamp    = {Tue, 12 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/HyunJC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ImH11,
  author       = {Eul Gyu Im and
                  Kyoung{-}Soo Han},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {An Analysis of Malware Attached in Spam},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {601--605},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_58},
  doi          = {10.1007/978-94-007-2911-7\_58},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/ImH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/JangS11,
  author       = {Young{-}Joon Jang and
                  Dongkun Shin},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {{HARD:} Host-Level Address Remapping Driver for Solid-State Disk},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {163--168},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_14},
  doi          = {10.1007/978-94-007-2911-7\_14},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/JangS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/JoC11,
  author       = {Sun{-}Moon Jo and
                  Kyung{-}Yong Chung},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Access Control Mechanism for {XML} Document},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {81--90},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_7},
  doi          = {10.1007/978-94-007-2911-7\_7},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/JoC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KangCRL11,
  author       = {Sung{-}Kwan Kang and
                  Kyung{-}Yong Chung and
                  Kee{-}Wook Rim and
                  Jung{-}Hyun Lee},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Development of Real-Time Gesture Recognition System Using Visual Interaction},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {295--306},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_25},
  doi          = {10.1007/978-94-007-2911-7\_25},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/KangCRL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Khan11,
  author       = {Abdul Raouf Khan},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Architecture of Image Encryption Hardware Using Two Dimensional Cellular
                  Automata},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {307--315},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_26},
  doi          = {10.1007/978-94-007-2911-7\_26},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/Khan11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Kim11,
  author       = {Sung{-}Ho Kim},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Development of Real-Time Location-Based Multimedia Style Slop Information
                  Retrieval System},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {331--335},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_29},
  doi          = {10.1007/978-94-007-2911-7\_29},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/Kim11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Kim11a,
  author       = {Hyun{-}Jun Kim},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Affective Social Network},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {455--461},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_42},
  doi          = {10.1007/978-94-007-2911-7\_42},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/Kim11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Kim11b,
  author       = {Hyun{-}Jun Kim},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Discovering Knowledge Flow in Social Network},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {469--477},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_44},
  doi          = {10.1007/978-94-007-2911-7\_44},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/Kim11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Kim11c,
  author       = {Sunhoe Kim},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Fuel Cell System Control Algorithm for Stable Operation of Residential
                  Fuel Cell System},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {557--560},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_52},
  doi          = {10.1007/978-94-007-2911-7\_52},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/Kim11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/Kim11d,
  author       = {Sunhoe Kim},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Types of Fuel Cells and Applications for Electricity and Heat Co-Generation},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {561--565},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_53},
  doi          = {10.1007/978-94-007-2911-7\_53},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/Kim11d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KimASLC11,
  author       = {Jong{-}Hun Kim and
                  Sihoon Ahn and
                  Jaeyoung Soh and
                  Daesung Lee and
                  Kyung{-}Yong Chung},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Ubiquitous Based Personalized Hypertension Monitoring System},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {169--177},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_15},
  doi          = {10.1007/978-94-007-2911-7\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/KimASLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KimCK11,
  author       = {Si{-}Jung Kim and
                  Do{-}Eun Cho and
                  Bong{-}Han Kim},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Customized {IPTV} Content Recommendation Service Model Based on Personal
                  Preference},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {179--189},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_16},
  doi          = {10.1007/978-94-007-2911-7\_16},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/KimCK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KimH11,
  author       = {Gui{-}Jung Kim and
                  Jung{-}Soo Han},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Simulation of 3D Information Visualization},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {317--323},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_27},
  doi          = {10.1007/978-94-007-2911-7\_27},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/KimH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KimJHLK11,
  author       = {Byung Ki Kim and
                  Jae Hyeok Jang and
                  Kyung Woo Hur and
                  Jeong{-}Gun Lee and
                  Young Woong Ko},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Monitoring and Feedback Tools for Realtime Workloads for Xen Virtual
                  Machine},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {151--161},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_13},
  doi          = {10.1007/978-94-007-2911-7\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/KimJHLK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KimKLK11,
  author       = {Ui{-}Hyong Kim and
                  Jung{-}Min Kang and
                  Jae{-}Sung Lee and
                  Hyong{-}Shik Kim},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Practical Firewall Policy Inspection Using Anomaly Detection and Its
                  Visualization},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {629--639},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_61},
  doi          = {10.1007/978-94-007-2911-7\_61},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/KimKLK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KimPK11,
  author       = {Kyu Chul Kim and
                  Chan Jung Park and
                  Ronny Yongho Kim},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Group Based Vehicular Machine to Machine Communication Scheme in Cellular
                  Networks},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {325--329},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_28},
  doi          = {10.1007/978-94-007-2911-7\_28},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/KimPK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KoBS11,
  author       = {Jong{-}Won Ko and
                  Su{-}Jin Baek and
                  Young{-}Jae Song},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Model Optimization with Graph Transformation and {PSO} Algorithm for
                  Model Transformation Verification},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {479--487},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_45},
  doi          = {10.1007/978-94-007-2911-7\_45},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/KoBS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/KoHS11,
  author       = {Jong{-}Won Ko and
                  Jung{-}Soo Han and
                  Young{-}Jae Song},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Pattern Based Model Transformation Using Mapping Patterns for Model
                  Transformation Verification},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {489--493},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_46},
  doi          = {10.1007/978-94-007-2911-7\_46},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/KoHS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/LeeA11,
  author       = {Kyuho Lee and
                  Seongjin Ahn},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {A Study of a Network Capacity Planning by Analyzing Joint Probability
                  of a Virtual Organization},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {357--365},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_32},
  doi          = {10.1007/978-94-007-2911-7\_32},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/LeeA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/LeeKLKC11,
  author       = {Jae{-}Young Lee and
                  Kee{-}Baek Kim and
                  Seok{-}Han Lee and
                  Tae{-}eun Kim and
                  Jong{-}Soo Choi},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Image Registration for Sub-Pixel Using Pyramid Edge Images},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {367--371},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_33},
  doi          = {10.1007/978-94-007-2911-7\_33},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/LeeKLKC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/LeeLJS11,
  author       = {Eun{-}Seok Lee and
                  Jin{-}Hee Lee and
                  Inwoo Jo and
                  Byeong{-}Seok Shin},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Vertex Propagation for Fast Ray-Casting of Digital Elevation Model},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {345--356},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_31},
  doi          = {10.1007/978-94-007-2911-7\_31},
  timestamp    = {Wed, 09 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/LeeLJS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/LeeLLKC11,
  author       = {Ahr{-}Hyun Lee and
                  Seok{-}Han Lee and
                  Jae{-}Young Lee and
                  Tae{-}eun Kim and
                  Jong{-}Soo Choi},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Real-Time Camera Tracking Using Planar Object Detection},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {373--378},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_34},
  doi          = {10.1007/978-94-007-2911-7\_34},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/LeeLLKC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/LeeLR11,
  author       = {Nam{-}Kyung Lee and
                  Hyun{-}Woo Lee and
                  Won Ryu},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Case Study of QoS-Assured Convergence Service Overlay in Open Service
                  Platform Environment},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {205--216},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_18},
  doi          = {10.1007/978-94-007-2911-7\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/LeeLR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/LeeS11,
  author       = {Seung{-}Hyung Lee and
                  Young{-}Jae Song},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Aspect Oriented Software Development Using Requirement Engineering},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {217--221},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_19},
  doi          = {10.1007/978-94-007-2911-7\_19},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/LeeS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/LimJYL11,
  author       = {Sukhyun Lim and
                  Hyung{-}Keun Jee and
                  Jinyoung Youn and
                  Junsuk Lee},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Augmented Reality-Based Role-Playing Contents for Education},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {337--344},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_30},
  doi          = {10.1007/978-94-007-2911-7\_30},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/LimJYL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/LimKK11,
  author       = {Yeong{-}Gyu Lim and
                  Cheong Ghil Kim and
                  Shin{-}Dug Kim},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {A Study on the Touch Process of Android Smartphone on Froyo and Gingerbread},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {191--204},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_17},
  doi          = {10.1007/978-94-007-2911-7\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/LimKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/MalekianA11,
  author       = {Reza Malekian and
                  Abdul Hanan Abdullah},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Bidirectional Propagation Method for Analysis of Reflection on Radio
                  Networks},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {379--388},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_35},
  doi          = {10.1007/978-94-007-2911-7\_35},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/MalekianA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ManH11,
  author       = {Man Doan Nguyen and
                  Eui{-}Nam Huh},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {A Collaborative Intrusion Detection System Framework for Cloud Computing},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {91--109},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_8},
  doi          = {10.1007/978-94-007-2911-7\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/ManH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/McheickDD11,
  author       = {Hamid Mcheick and
                  Mohamad Dbouk and
                  Fady Dagher},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Reducing the Gap of Provided Services and Requires Services Based
                  on Service Approach},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {523--537},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_50},
  doi          = {10.1007/978-94-007-2911-7\_50},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/McheickDD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/MengK11,
  author       = {Yao Meng and
                  Hee{-}Cheol Kim},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {A Review of Accelerometer-Based Physical Activity Measurement},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {223--237},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_20},
  doi          = {10.1007/978-94-007-2911-7\_20},
  timestamp    = {Tue, 14 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icitcs/MengK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/PakP11,
  author       = {Ju{-}Geon Pak and
                  Kee{-}Hyun Park},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {A Group Data Synchronization Protocol in Mobile Environments},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {239--251},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_21},
  doi          = {10.1007/978-94-007-2911-7\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/PakP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ParkKC11,
  author       = {Sang{-}Wook Park and
                  Tae{-}eun Kim and
                  Jong{-}Soo Choi},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Robust Estimation of Heights of Moving People Using a Single Camera},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {389--405},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_36},
  doi          = {10.1007/978-94-007-2911-7\_36},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/ParkKC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ParkP11,
  author       = {Kee{-}Hyun Park and
                  Ju{-}Geon Pak},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Efficient Transmission Method for Mobile Data Synchronization Based
                  on Data Characteristics},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {253--263},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_22},
  doi          = {10.1007/978-94-007-2911-7\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/ParkP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ParkRMA11,
  author       = {Sangseo Park and
                  Anthonie B. Ruighaver and
                  Sean B. Maynard and
                  Atif Ahmad},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Towards Understanding Deterrence: Information Security Managers' Perspective},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {21--37},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_3},
  doi          = {10.1007/978-94-007-2911-7\_3},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/ParkRMA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ParkY11,
  author       = {Seung{-}Bo Park and
                  Eunsoon You},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Story Modeling for Green Light Decision Making},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {517--521},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_49},
  doi          = {10.1007/978-94-007-2911-7\_49},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/ParkY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/ParkYJ11,
  author       = {Seung{-}Bo Park and
                  Eunsoon You and
                  Jason J. Jung},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Potential Emotion Word in Movie Dialog},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {507--516},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_48},
  doi          = {10.1007/978-94-007-2911-7\_48},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/ParkYJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/SeoC11,
  author       = {Hyung{-}Jun Seo and
                  Yoon{-}Cheol Choy},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Criteria for Comparing Cyberwarfare Capability},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {111--120},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_9},
  doi          = {10.1007/978-94-007-2911-7\_9},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/SeoC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/SimS11,
  author       = {Sung{-}Ho Sim and
                  Young{-}Jae Song},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {A Study on the Metadata Extraction and Repository Based on Web Service
                  Meta Broker},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {463--467},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_43},
  doi          = {10.1007/978-94-007-2911-7\_43},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/SimS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/WichaiwongJ11,
  author       = {Tanakorn Wichaiwong and
                  Chuleerat Jaruskulchai},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {An Extended {XML} Compression Technique for {XML} Element Retrieval},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {539--554},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_51},
  doi          = {10.1007/978-94-007-2911-7\_51},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/WichaiwongJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/YooPL11,
  author       = {Yoon{-}Sik Yoo and
                  Wan{-}Ki Park and
                  Il{-}Woo Lee},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Integrated Energy Management System Framework for the Distributed
                  Smart Meters in Smart Grid Environment},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {567--572},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_54},
  doi          = {10.1007/978-94-007-2911-7\_54},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/YooPL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitcs/YouP11,
  author       = {Eunsoon You and
                  Seung{-}Bo Park},
  editor       = {Kuinam J. Kim and
                  Seong{-}Jin Ahn},
  title        = {Improved Performance of Emotion Extraction Through Banned Words},
  booktitle    = {Proceedings of the International Conference on {IT} Convergence and
                  Security, {ICITCS} 2011, Suwon, Korea, December 14-16, 2011},
  series       = {Lecture Notes in Electrical Engineering},
  volume       = {120},
  pages        = {495--505},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-94-007-2911-7\_47},
  doi          = {10.1007/978-94-007-2911-7\_47},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitcs/YouP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics