default search action
ICCSA 2009: Seoul, Korea
- Osvaldo Gervasi, David Taniar, Beniamino Murgante, Antonio Laganà, Youngsong Mun, Marina L. Gavrilova:
Computational Science and Its Applications - ICCSA 2009, International Conference, Seoul, Korea, June 29-July 2, 2009, Proceedings, Part II. Lecture Notes in Computer Science 5593, Springer 2009, ISBN 978-3-642-02456-6
Workshop on Software Engineering Processes and Applications (SEPA 2009)
- Chi-Lun Liu:
Ontology-Based Requirements Conflicts Analysis in Activity Diagrams. 1-12 - Supraja Doma, Larry Gottschalk, Tetsutaro Uehara, Jigang Liu:
Resource Allocation Optimization for GSD Projects. 13-28 - Jinqiang Zhao, Zhenhua Duan:
Verification of Use Case with Petri Nets in Requirement Analysis. 29-42 - Rikard Land, Jan Carlson, Stig Larsson, Ivica Crnkovic:
Towards Guidelines for a Development Process for Component-Based Embedded Systems. 43-58 - Ferid Cafer, Sanjay Misra:
Effective Project Leadership in Computer Science and Engineering. 59-69 - Sanjay Misra:
Weyuker's Properties, Language Independency and Object Oriented Metrics. 70-81
Workshop on Molecular Simulations Structures and Processes (MOSSAP 2009)
- Abdul Majid, Muhammad Farooq Ahmad, Tae-Sun Choi:
Lattice Constant Prediction of A2BB'O6 Type Double Perovskites. 82-92 - Alessandro Costantini, Noelia Faginas Lago, Antonio Laganà, Fermín Huarte-Larrañaga:
A Grid Implementation of Direct Semiclassical Calculations of Rate Coefficients. 93-103 - Alessandro Costantini, Noelia Faginas Lago, Antonio Laganà, Fermín Huarte-Larrañaga:
A Grid Implementation of Direct Quantum Calculations of Rate Coefficients. 104-114 - Antonio Laganà, Stefano Crocchianti, Alessandro Costantini, Monica Angelucci, Marco Vecchiocattivi:
A Grid Implementation of Chimere: Ozone Production in Central Italy. 115-129
Workshop on Internet Communication Security (WICS 2009)
- Sergio Pozo, Angel Jesus Varela-Vaca, Rafael M. Gasca:
MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT. 130-144 - Fernando Sánchez-Chaparro, José M. Sierra, Oscar Delgado-Mohatar, Amparo Fúster-Sabater:
Testing Topologies for the Evaluation of IPSEC Implementations. 145-154 - Miguel Viedma Astudillo, Jesús Téllez Isaac, Diego Suarez Touceda, Héctor Plaza López:
Evaluation of a Client Centric Payment Protocol Using Digital Signature Scheme with Message Recovery Using Self-Certified Public Key. 155-163
Workshop on Security and Privacy in Pervasive Computing Environments (SPPC 2009)
- Youngsook Lee, Dongho Won:
Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment. 164-172 - Junghyun Nam, Sangchul Han, Minkyu Park, Juryon Paik, Ung-Mo Kim:
Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords. 173-181 - Wansuck Yi, Seungjoo Kim, Dongho Won:
Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments. 182-190 - Kwang-Woo Lee, Yunho Lee, Seungjoo Kim, Dongho Won:
A Practical Approach to a Reliable Electronic Election. 191-203 - Mijin Kim, Heasuk Jo, Seungjoo Kim, Dongho Won:
Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key. 204-211
Workshop on Mobile Communications (MC 2009)
- Eun Cheol Kim, Jin Young Kim:
Performance of STBC PPM-TH UWB Systems with Double Binary Turbo Code in Multi-user Environments. 212-225 - Eun Cheol Kim, Jin Young Kim:
Performance Evaluation of PN Code Acquisition with Delay Diversity Receiver for TH-UWB System. 226-236 - Bum-Gon Choi, Sueng Jae Bae, Tae-Jin Lee, Min Young Chung:
Performance Analysis of Binary Negative-Exponential Backoff Algorithm in IEEE 802.11a WLAN under Erroneous Channel Condition. 237-249 - Sueng Jae Bae, Jin Ju Lee, Bum-Gon Choi, Sungoh Kwon, Min Young Chung:
A Resource-Estimated Call Admission Control Algorithm in 3GPP LTE System. 250-260 - Katarzyna Kosek, Marek Natkaniec, Luca Vollero:
Problems with Correct Traffic Differentiation in Line Topology IEEE 802.11 EDCA Networks in the Presence of Hidden and Exposed Nodes. 261-275 - Jong Sung Lee, Dong In Kim:
Adaptive and Iterative GSC/MRC Switching Techniques Based on CRC Error Detection for AF Relaying System. 276-285 - Jung-Hyun Kim, Hyeong-Joon Kwon, Kwang-Seok Hong:
WiBro Net.-Based Five Senses Multimedia Technology Using Mobile Mash-Up. 286-301 - Hyun-Su Jang, Kwangsun Ko, Young-woo Jung, Young Ik Eom:
Overlay Ring Based Secure Group Communication Scheme for Mobile Agents. 302-313 - Dahae Chong, Taeung Yoon, Youngyoon Lee, Chonghan Song, Myungsoo Lee, Seokho Yoon:
Enhanced Multiple-Shift Scheme for Rapid Code Acquisition in Optical CDMA Systems. 314-324 - Youngpo Lee, Youngyoon Lee, Taeung Yoon, Chonghan Song, Sanghun Kim, Seokho Yoon:
AltBOC and CBOC Correlation Functions for GNSS Signal Synchronization. 325-334 - Jin-Seong Kim, Tae-Jin Lee:
Performance Enhancement of IEEE 802.11b WLANs Using Cooperative MAC Protocol. 335-344 - Seong-Soo Park, Jong-Hyouk Lee, Tai-Myoung Chung:
Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks. 345-360 - Moonseong Kim, Matt W. Mutka:
On Relocation of Hopping Sensors for Balanced Migration Distribution of Sensors. 361-371 - Taekhoon Kim, Dong In Kim:
Hybrid Hard/Soft Decode-and-Forward Relaying Protocol with Distributed Turbo Code. 372-382 - Junghoon Lee, In-Hye Shin, Hye-Jin Kim, Min-Jae Kang, Sang Joon Kim:
Design of an Efficient Multicast Scheme for Vehicular Telematics Networks. 383-392 - SungJin Choi, Hyunseung Choo, MaengSoon Baik, HongSoo Kim, EunJoung Byun:
ODDUGI: Ubiquitous Mobile Agent System. 393-407 - Jin Wang, Young-Koo Lee:
Determination of the Optimal Hop Number for Wireless Sensor Networks. 408-418 - Duc Viet Le, Young-Koo Lee, Sungyoung Lee:
Localization in Sensor Networks with Fading Channels Based on Nonmetric Distance Models. 419-431 - Jin Wang, Sungyoung Lee:
A Performance Comparison of Swarm Intelligence Inspired Routing Algorithms for MANETs. 432-442 - In-Hye Shin, Gyung-Leen Park, Abhijit Saha, Ho-Young Kwak, Hanil Kim:
Analysis of Moving Patterns of Moving Objects with the Proposed Framework. 443-452 - Gap-Joo Na, Sang-Won Lee:
A User-Defined Index for Containment Queries in XML. 453-464 - Alexey S. Rodionov, Olga D. Sokolova, Anastasia N. Yurgenson, Hyunseung Choo:
On Optimal Placement of the Monitoring Devices on Channels of Communication Network. 465-478 - Seungtak Oh, Hyunseung Choo:
Low Latency Handover Scheme Based on Optical Buffering at LMA in Proxy MIPv6 Networks. 479-490 - Md. Obaidur Rahman, Muhammad Mostafa Monowar, Choong Seon Hong:
A Capacity Aware Data Transport Protocol for Wireless Sensor Network. 491-502 - Abhijit Saha, Gyung-Leen Park, Khi-Jung Ahn, Chul Soo Kim, Bongkyu Lee, Yoon-Jung Rhee:
Data Distribution of Road-Side Information Station in Vehicular Ad Hoc Networks (VANETs). 503-512 - Junwoo Jung, Hoki Baek, Jaesung Lim:
VC-GTS: Virtual Cut-Through GTS Allocation Scheme for Voice Traffic in Multihop IEEE 802.15.4 Systems. 513-524 - MoonBae Song, Hyunseung Choo:
Towards Location-Based Real-Time Monitoring Systems in u-LBS. 525-536
General Track on Computational Methods, Algorithms and Applications
- Yen Hung Chen:
A Fast Approximation Algorithm for the k Partition-Distance Problem. 537-546 - Ximing Liang, Xiang Li, Muhammet Fikret Ercan:
A PSO - Line Search Hybrid Algorithm. 547-556 - Alexey S. Rodionov, Olga K. Rodionova, Hyunseung Choo:
Using Meaning of Coefficients of the Reliability Polynomial for Their Faster Calculation. 557-571 - Saeed Behzadi, Ali A. Alesheikh, Mohammad Reza Malek:
A Novel Tree Graph Data Structure for Point Datasets. 572-579 - Beoungil Cho, Hyunsang Youn, Eunseok Lee:
Software Dependability Analysis Methodology. 580-593 - Kisoeb Park, Seki Kim, William T. Shaw:
New Approach for the Pricing of Bond Option Using the Relation between the HJM Model and the BGM Model. 594-604 - Xiaojuan Cai, Yonggen Gu:
Measuring Anonymous Systems with the Probabilistic Applied Pi Calculus. 605-620 - Luigi Nardi, Charles Sorror, Fouad Badran, Sylvie Thiria:
YAO: A Software for Variational Data Assimilation Using Numerical Models. 621-636
General Track on High Performance Technical Computing and Networks
- Yu Zhang, Yuanda Cao, Baodong Cheng:
CNP: A Protocol for Reducing Maintenance Cost of Structured P2P. 637-652 - Youqiang Guo, Zijun Zhang, Xuezhu Pei:
A Research on Instability of Small Flow in SCADA and an Optimizing Design for Control. 653-663 - Kushan Ahmadian, Marina L. Gavrilova:
On-Demand Chaotic Neural Network for Broadcast Scheduling Problem. 664-676
General Track on Advanced and Emerging Applications
- Feng Qian, Qinming He, Jiangfeng He:
Mining Spread Patterns of Spatio-temporal Co-occurrences over Zones. 677-692 - Wook-Jin Choi, Abdul Majid, Tae-Sun Choi:
Computerized Detection of Pulmonary Nodule Based on Two-Dimensional PCA. 693-702 - Adriana Vlad, Adrian Luca, Madalin Frunzete:
Computational Measurements of the Transient Time and of the Sampling Distance That Enables Statistical Independence in the Logistic Map. 703-718 - Robert Steele, Amanda Lo:
Future Personal Health Records as a Foundation for Computational Health. 719-733 - Tian Yang, Xinjie Lv, Zaifei Liao, Wei Liu, Hongan Wang:
SVM Based Decision Analysis and Its Granular-Based Solving. 734-748 - Ki-Yeol Eom, Tae-Ki Ahn, Gyu-Jin Kim, Gyu-Jin Jang, Moon-Hyun Kim:
Fast Object Tracking in Intelligent Surveillance System. 749-763 - Mohammad Shoyaib, Mohammad Abdullah-Al-Wadud, Oksam Chae:
A Reliable Skin Detection Using Dempster-Shafer Theory of Evidence. 764-779 - Ali Amiri, Mahmood Fathy:
Video Shot Boundary Detection Using Generalized Eigenvalue Decomposition. 780-790 - Kevin Chai, Vidyasagar M. Potdar, Tharam S. Dillon:
Content Quality Assessment Related Frameworks for Social Media. 791-805 - Rela Puteri Pamungkas, Siti Mariyam Hj. Shamsuddin:
Weighted Aspect Moment Invariant in Pattern Recognition. 806-818 - Geng Zhao, Kefeng Xuan, David Taniar, Maytham Safar, Marina L. Gavrilova, Bala Srinivasan:
Multiple Object Types KNN Search Using Network Voronoi Diagram. 819-834
General Track on Information Systems and Information Technologies
- Xinjie Lv, Xin Li, Tian Yang, Zaifei Liao, Wei Liu, Hongan Wang:
RRPS: A Ranked Real-Time Publish/Subscribe Using Adaptive QoS. 835-850 - Yul Chu, Amit Uppal, Jae Sok Son:
A Dynamic Packet Management in a Protocol Processor. 851-862 - Khoongming Khoo, Ford-Long Wong, Chu-Wee Lim:
On a Construction of Short Digests for Authenticating Ad Hoc Networks. 863-876 - Malik Tahir Hassan, Khurum Nazir Junejo, Asim Karim:
Learning and Predicting Key Web Navigation Patterns Using Bayesian Models. 877-887 - Junghwan Kim, Myeong-Cheol Ko, Hyun-Kyu Kang, Jinsoo Kim:
A Hybrid IP Forwarding Engine with High Performance and Low Power. 888-899 - Nilüfer Atman, Mustafa Murat Inceoglu, Burak Galip Aslan:
Learning Styles Diagnosis Based on Learner Behaviors in Web Based Learning. 900-909 - Hai Dong, Farookh Khadeer Hussain, Elizabeth Chang:
State of the Art in Semantic Focused Crawlers. 910-924 - Toshihiro Uchibayashi, Bernady O. Apduhan, J. Wenny Rahayu, David Taniar, Norio Shiratori:
Towards a Framework for Workflow Composition in Ontology Tailoring in Semantic Grid. 925-936 - Yan Wu, Ming Li, Haitao Zong, Xin Wang:
Fusion Segmentation Algorithm for SAR Images Based on HMT in Contourlet Domain and D-S Theory of Evidence. 937-951
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.