default search action
10th IMCOM 2016: Danang, Vietnam
- Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, IMCOM 2016, Danang, Vietnam, January 4-6, 2016. ACM 2016, ISBN 978-1-4503-4142-4
- Delina Beh Mei Yin, Mohamad Izzuddin Kamal, Nurul Sharaz Azmanuddin, Siti Haryani Shaikh Ali, Abu Talib Othman, Rita Zaharah Wan-Chik:
Electronic Door Access Control using MyAccess Two-Factor Authentication Scheme featuring Near-Field Communication and Eigenface-based Face Recognition using Principal Component Analysis. 1:1-1:8 - Toyohide Watanabe:
A Framework of Information Technology Supported Intelligent Learning Environment. 2:1-2:8 - Nguyen Xuan Tien, Jong Myung Rhee:
A Novel Approach for Reducing HSR Unicast Traffic Using Pre-defined Dual Paths. 3:1-3:7 - Ji Won Yoon:
An efficient geometric shape coding and representation approach to obtain both skeleton and contours. 4:1-4:8 - Priya Anand, Jungwoo Ryoo, Hyoungshick Kim, Eunhyun Kim:
Threat Assessment in the Cloud Environment: A Quantitative Approach for Security Pattern Selection. 5:1-5:8 - Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah, Ramlan Mahmod:
A Hybrid Scheme for Face Template Protection. 6:1-6:7 - Jongho Moon, Jiseon Yu, Hyungkyu Yang, Dongho Won:
Improvement of Biometrics and Smart Cards-based Authentication Scheme for Multi-Server Environments. 7:1-7:8 - Je-Gyeong Jo, Jae-Cheol Ryou:
HTML and PDF fuzzing methodology in iOS. 8:1-8:5 - Adil I. Erzin, Natalia Shabelnikova, Vyacheslav V. Zalyubovskiy:
Covering the Plane with Equal Sectors. 9:1-9:8 - Chae Hong Yi, Yong Ju Kim, Jae Wook Jeon:
Reduction of Wake-up Time for Partial Networking in Automotive System. 10:1-10:6 - Dung T. Tran, Phong T. Tran, Tu T. Tran:
A new approach to measure the utilizable bandwidth. 11:1-11:8 - Yeong-Tae Song, Tao Qiu:
Standard based Personal Mobile Health Record System. 12:1-12:8 - Hyun-Kyo Oh, Sang-Wook Kim:
Robust Features for Trustable Aggregation of Online Ratings. 13:1-13:7 - Naoki Shoji, Kazuya Matsuo, Akimitsu Kanzaki, Shojiro Nishio:
Energy-efficient topology construction for multi-attribute data gathering in WSNs. 14:1-14:8 - Tran Trung Tin, Gidong Lee, Trung Xuan Pham, Geun-Jun Kim, Dang Van Chien, Jong-Wook Kim, Bongsoon Kang:
Identification of In-Home Appliances through Analysis of Current Consumption. 15:1-15:5 - Hieu Ngoc Duong, Vu H. Nguyen, Tam M. Nguyen, Hien T. Nguyen, Václav Snásel:
The Hybrid Approaches for Forecasting Real Time Multi-step-ahead Boiler Efficiency. 16:1-16:8 - Vu H. Nguyen, Hien T. Nguyen, Hieu Ngoc Duong, Václav Snásel:
A syllable-based method for Vietnamese text compression. 17:1-17:6 - Alexander Yohan, Nai-Wei Lo, Vincentius Randy, Shih-Jen Chen, Ming-Yuan Hsu:
A Novel Authentication Protocol for Micropayment with Wearable Devices. 18:1-18:7 - Song Jung, Sangwon Lee:
Developing a Model for Continuous User Engagement in Social Media. 19:1-19:4 - Phuc H. Duong, Hien T. Nguyen, Vinh Phu Nguyen:
Evaluating Semantic Relatedness Between Concepts. 20:1-20:8 - Phong Nguyen Tran, Dang Tuan Nguyen:
A Linked Data Driven Semantic Model for Interpreting English Queries in Question Answering System. 21:1-21:5 - Doan Van Tung, Nguyen Huu Thanh, Tran Manh Nam, Nguyen Tai Hung, Nguyen Xuan Dung:
Joint Vertical Handoff and Resource Allocation in OFDMA/TDD Systems based on Software-Defined Wireless Network. 22:1-22:8 - Jaewook Jung, Donghoon Lee, Jiye Kim, Youngsook Lee, Dongwoo Kang, Dongho Won:
Cryptanalysis and Improvement of Efficient Password-Based User Authentication Scheme using Hash Function. 23:1-23:8 - Byeong-Oh Jo, Sang-Jun Lee, Jae Wook Jeon:
The Development of Hardware Architecture for Real-time Chain Code based on FPGA. 24:1-24:6 - Seong-Wook Jang, Byeong-Oh Jo, Sang-Jun Lee, Jae Wook Jeon:
The Development of the Hardware Architecture to Perform Template Matching using Distance Transform. 25:1-25:7 - Minhoon Yi, Donghyun Kang, Minho Lee, Inhyeok Kim, Young Ik Eom:
Performance Analyses of Duplicated I/O Stack in Virtualization Environment. 26:1-26:6 - Saneyasu Yamaguchi, Akihiro Nakao, Masato Oguchi, Atsuhiro Goto, Shu Yamamoto:
Monitoring Dynamic Modification of Routing Information in OpenFlow Networks. 27:1-27:7 - Chansoo Oh, Donghyun Kang, Minho Lee, Young Ik Eom:
A Buffer Cache Algorithm Using the Characteristic of Mobile Applications based on Hybrid Memory Architecture. 28:1-28:8 - Trung Xuan Pham, Chien Van Dang, Tri Minh Ngo, Ki-Je Sung, Tran Trung Tin, Jong-Wook Kim:
A Monitoring System in Real Time based on Android Platform. 29:1-29:4 - Siti Salwa Bt Hasbullah, Diana Maynard, Rita Zaharah Wan-Chik, Farahwahida Mohd, Myzan Bt Noor:
Automated Content Analysis: A Sentiment Analysis on Malaysian Government Social Media. 30:1-30:6 - Farahwahida Mohd, Myzan Bt Noor, Ezri Hielmi Che Daud, Siti Salwa Bt Hasbullah:
Mobile Games Usability Using the Idea of Mark Overmars. 31:1-31:6 - Yohan Ko, Hyunjun Kim, Hwansoo Han:
Escalating Memory Accesses to Shared Memory by Profiling Reuse. 32:1-32:8 - Kim Ryong, Park Kyung-Hye, Young-Kuk Kim:
Improving Similarity Measurement of User's Rating Value using Sigmoid Function in Personalization System. 33:1-33:4 - Wan Hazimah Wan Ismail, Herny Ramadhani Mohd Husny Hamid, Norhaiza Ya Abdullah:
Smoke Detection Alert System via Mobile Application. 34:1-34:6 - Myzan Bt Noor, Farahwahida binti Mohd, Siti Salwa Bt Hasbullah:
The Social Media Dialogue through Ubiquitous Interactivity to Children's Cognitive Development. 35:1-35:9 - Satoshi Kamaishi, Ryuya Uda:
Biometric Authentication by Handwriting Using Leap Motion. 36:1-36:5 - Shohei Miyokawa, Taiki Tokuda, Saneyasu Yamaguchi:
Elasticity Improvement of Cassandra. 37:1-37:7 - Bach Tran, Nga Nguyen Thu, Van-Duc Nguyen, Byeungwoo Jeon:
Influence of the spatial correlation properties on coded MIMO-OFDM system performance based on SCM in Urban Microcell environment. 38:1-38:6 - Young Seo Lee, Jinho Kim, Seok Jin Jang, Jae Wook Jeon:
Automotive ECU Software Reprogramming Method Based on Ethernet Backbone Network to Save Time. 39:1-39:8 - Huong Ninh, Guee-Sang Lee:
Adaptive Features for MRF based Cosegmentation. 40:1-40:5 - Nguyen Ho Minh Duy, Tran Tuan Anh, Ngo Quoc Viet, Pham The Bao:
Identifying Species based on Relative Synonymous Codon Pair Usage combining K - means and SVM: An Application for Bacillus. 41:1-41:6 - Mohd Nizam Husen, Sukhan Lee:
High Performance Indoor Location Wi-Fi Fingerprinting using Invariant Received Signal Strength. 42:1-42:6 - Jun-Ho Huh, Taehoon Koh, Kyungryong Seo:
Design of a Shipboard Outside Communication Network and the Test Bed Using PLC: for the Workers' Safety Management During Ship-Building process. 43:1-43:6 - Honglin Sun, Xiaofeng Gao, Guihai Chen, Jian Gu, Yongjian Wang:
Multiple Influence Maximization in Social Networks. 44:1-44:8 - Norhaidah Abu Haris, Munaisyah Abdullah, Nurdatillah Hasim, Fauziah Abdul Rahman:
A Study on Students Enrollment Prediction using Data Mining. 45:1-45:5 - Azmi Ahmad, Faizah Shaari:
Solving University/Polytechnics Exam Timetable Problem using Particle Swarm Optimization. 46:1-46:4 - Tomoaki Imajo, Kazutoshi Sumiya, Taketoshi Ushiama:
An SNS Based on Implicit Beneficial Social Relations in A Regional Community. 47:1-47:7 - Eita Fujishima, Saneyasu Yamaguchi:
Dynamic File Placing Control for Improving the I/O Performance in the Reduce Phase of Hadoop. 48:1-48:7 - Yasmin Yahya, Roslan Ismail:
Penetration of Sunlight in the Multilevel Crown: A Case Study in Tropical Rain Forest. 49:1-49:5 - Yusuke Inoue, Takakazu Imada, Syunya Doi, Lei Chen, Takehito Utsuro, Yasuhide Kawada:
Clustering Search Engine Suggests by Modeling Topics of Web Pages collected with Suggests. 50:1-50:7 - Takakazu Imada, Yusuke Inoue, Lei Chen, Syunya Doi, Takehito Utsuro, Yasuhide Kawada:
Analyzing Concerns on Companies through Statistics of Search Engine Suggests and its Correlation to Market Share. 51:1-51:8 - Han Jun Kim, Kyung-Hoon Lee, Hyung-Jin Choi:
A Novel Weighting Method for Multiple OTDOA based Positioning in 3GPP LTE System. 52:1-52:4 - Kouta Sawada, Ryuya Uda:
Effective CAPTCHA with Amodal Completion and Aftereffects. 53:1-53:5 - Yuko Kurosaki, Atsuko Takefusa, Hidemoto Nakada, Masato Oguchi:
A Study of Load Balancing between Sensors and the Cloud for a Real-Time Video Streaming Analysis Application Framework. 54:1-54:6 - Nurdatillah Hasim, Norhaidah Abu Haris, Aedah Abd Rahman:
Defect Density: A Review of the Calculation Based on System Size. 55:1-55:4 - Tuan Anh Pham, Nhan Le Thanh:
An Ontology-based Approach for Business Process Compliance Checking. 56:1-56:6 - Won-Jin Lee, Syed Tariq Shah, Daniyal Munir, Tae-Jin Lee, Min Young Chung:
A Mechanism on Energy Harvesting and Data Communications in Wi-Fi Network. 57:1-57:6 - Takumi Nohara, Ryuya Uda:
Personal Identification by Flick Input Using Self-Organizing Maps with Acceleration Sensor and Gyroscope. 58:1-58:6 - Yonghee Kim, HaRim Jung, JaeHee Jang, Ung-Mo Kim:
An Efficient Grid Index for Moving Objects in Indoor Environments. 59:1-59:4 - Tri D. T. Nguyen, Chan Ho Yong, Xuan-Qui Pham, Huu-Quoc Nguyen, Ton Thi Kim Loan, Eui-Nam Huh:
An Index Scheme for Similarity Search on Cloud Computing using MapReduce over Docker Container. 60:1-60:6 - Azizah Rahmat, Suzana Kassim, Mohd Hasan Selamat, Sa'adah Hassan:
Actor in Multi Product Line. 61:1-61:8 - Jusop Choi, William Aiken, Jungwoo Ryoo, Hyoungshick Kim:
Bypassing the Integrity Checking of Rights Objects in OMA DRM: a Case Study with the MelOn Music Service. 62:1-62:5 - Chenyutao Ke, Hiroaki Anada, Junpei Kawamoto, Kirill Morozov, Kouichi Sakurai:
Cross-group Secret Sharing for Secure Cloud Storage Service. 63:1-63:8 - Cuong Pham, Nguyen Thi Thanh Thuy:
Real-Time Traffic Activity Detection Using Mobile Devices. 64:1-64:7 - Dinh-Mao Bui, Thien Huynh-The, Sungyoung Lee:
Fuzzy Fault Detection in IaaS Cloud Computing. 65:1-65:6 - Dinh-Quyen Nguyen, Dinh Dam Le:
Hyper Word Clouds: A Visualization Technique for Last.fm Data and Relationships Examination. 66:1-66:7 - Manh Cong Tran, Yasuhiro Nakamura:
Web Access Behaviour Model for Filtering Out HTTP Automated Software Accessed Domain. 67:1-67:4 - Tomohisa Ishikawa, Kouichi Sakurai:
A Study of Security Management with Cyber Insurance. 68:1-68:6 - JaeHee Jang, HaRim Jung, Yonghee Kim, Ung-Mo Kim:
An Efficient Method for Monitoring Continuous Top-k Queries. 69:1-69:4 - Woobin Kim, Jungha Jin, Keecheon Kim:
A Routing Protocol Method that sets up Multi-hops in the Ad-hoc network. 70:1-70:6 - Duc Duong, Toan Nguyen, Minh Dang:
Stock Market Prediction using Financial News Articles on Ho Chi Minh Stock Exchange. 71:1-71:6 - Hung Ba Ngo, Nhan Cao Tran, Loc Huu Nguyen:
Auto-Scaling to Increase Throughput of Enterprise Applications on Private Clouds. 72:1-72:7 - Thi Ngoc Hien Doan, Van Khang Nguyen, Ngoc Chien Dao:
A Textile Antenna for Wearable Applications Using RFID Technology. 73:1-73:4 - Jinhyuk Yim, Hyochun Ahn, Young-Bae Ko:
The Betweenness Centrality based Geographic Routing Protocol for Unmanned Ground Systems. 74:1-74:4 - Young-Gab Kim, Yonghan Lee:
Context Information-based Application Access Control Model. 75:1-75:5 - Zeeshan Hameed Mir, Jaebeom Kim, Young-Bae Ko, Fethi Filali:
Improved Multi-hop Routing in Integrated VANET-LTE Hybrid Vehicular Networks. 76:1-76:6 - Hiroshi Shimanuki, Yasuhiro Kinoshita, Toyohide Watanabe, Koichi Asakura, Hideki Sato:
Operational Support for Origami Beginners by Correcting Mistakes. 77:1-77:8 - Kang-Min Kim, Gyu-Jin Kim, Gyu-Jin Jang, Young-Nam Kim, Moon-Hyun Kim:
MLP based Pedestrian Counting. 78:1-78:6 - Bokuk Park, Sung-Hwan Kim, Taeyong Kim, Jinkwan Park, Hwan-Gue Cho:
Virtual Running of GPS Vehicles for Trajectory Analysis. 79:1-79:8 - Hoa T. Le, Larry A. Vea:
A Customer Emotion Recognition through Facial Expression using Kinect Sensors v1 and v2: A Comparative Analysis. 80:1-80:7 - Berihun Fekade, Taras Maksymyuk, Minho Jo:
A Virtual Server QoS Enhancement Method in Cloud Computing. 81:1-81:3 - Nguyen Dong Phuong, Vo Thi Ngoc Chau, Ho Tu Bao:
A Hybrid Semi-supervised Learning Approach to Identifying Protected Health Information in Electronic Medical Records. 82:1-82:8 - Minh T. X. Pham, Tru Hoang Cao, Huy Minh Huynh:
Candidate Searching and Key Coreference Resolution for Wikification. 83:1-83:5 - SungBaek Yoon, Seho Bae, Hanjae Park, Liu Hua, Ziqi Zheng, Juneho Yi:
Efficiently Exploiting the Context of Object-Action Context for Object Recognition. 84:1-84:4 - Chuan Pham, Nguyen Hoang Tran, Minh N. H. Nguyen, Jae Hyeok Son, Choong Seon Hong:
Hosting Virtual Machines on Distributed Datacenters. 85:1-85:5 - Tuan LeAnh, Saeed Ullah, Nguyen Hoang Tran, Sung Soo Kim, Seung Il Moon, Choong Seon Hong:
Coalitional Game Theoretic Approach for Cooperation in Heterogeneous Cognitive Wireless Networks. 86:1-86:6 - Tai Manh Ho, Nguyen Hoang Tran, S. M. Ahsan Kazmi, Seung Il Moon, Choong Seon Hong:
Distributed Pricing Power Control for Downlink Co-tier Interference Coordination in Two-Tier Heterogeneous Networks. 87:1-87:7 - Ahmad Fahmi Hj. Mohamad, Jessifa Joana Mohd Supian, Muhammad Syafiq Md Ribuan:
Digital Congkak: The Art, Play and Experience Framework. 88:1-88:6 - Min Wei, Ruixiang Chen, Shunbin He:
A Secure Data Aggregation Approach in Hierarchical Wireless Sensor Networks. 89:1-89:7 - Tae Yeong Kim, Dong In Kim:
Cluster-based Collaborative Caching for Amorphous User Cell Association. 90:1-90:6 - Hyun Young Kim, Bomyeong Kim, Jinwoo Kim:
The Naughty Drone: A Qualitative Research on Drone as Companion Device. 91:1-91:6 - Hyo-Haeng Lee, Eun-Joo Seo, Ji-Su Yang, Sang-Min Park, Kwang-Seok Hong:
Video-based Bio-Signal Measurements for a Mobile Healthcare System. 92:1-92:5 - Taeyeon Kim, Nguyen Anh Tu, Young-Koo Lee:
Efficient Content-based Image Retrieval for Multi-Image Queries. 93:1-93:6 - Jinwoo Jeon, Jun-Cheol Park, Youngjoo Jo, Changmo Nam, Kyung-Hoon Bae, Youngkyoo Hwang, Dae-Shik Kim:
A Real-time Facial Expression Recognizer using Deep Neural Network. 94:1-94:4 - Jihyun Ha, Jong-Seok Lee:
A New Under-Sampling Method Using Genetic Algorithm for Imbalanced Data Classification. 95:1-95:6 - BeomSeok Kim, Jinsung Cho, Dae-Young Kim, Ben Lee:
ACESS: Adaptive Channel Estimation and Selection Scheme for Coexistence Mitigation in WBANs. 96:1-96:4 - Changmo Nam, Jun-Cheol Park, Dae-Shik Kim:
Indoor Human Activity Recognition with Contextual Cues in Videos. 97:1-97:4 - Weiwei Yuan, Donghai Guan, Taeyeon Kim, Young-Koo Lee:
OS_Searching: Optimized Skeleton based Recommender Searching Mechanism for the Trust-Aware Recommender System. 98:1-98:4 - Youngjoo Jo, Jun-Cheol Park, Jinwoo Jeon, Changmo Nam, Junghee Han, Yongin Park, Dae-Shik Kim:
A Real-time Object Tracker equipped with Deep Object Recognizer. 99:1-99:4 - Jaesub Yun, Jihyun Ha, Jong-Seok Lee:
Automatic Determination of Neighborhood Size in SMOTE. 100:1-100:8 - Thuong Le-Tien, Thien Huynh-The, Sungyoung Lee, Yongik Yoon:
An Interactive Activity Recognition Approach Using Articulated-Body Estimation and Pose-Based Features. 101:1-101:8 - Sangjun Koo, Gary Geunbae Lee, Hwanjo Yu:
Mathematical Model for Processing Multi-user Requests on POMDP Hybrid Dialog Management. 102:1-102:4 - Duc-Tai Le, Thang Le Duc, Yechan Park, Ho-Jin Hwang, Vyacheslav V. Zalyubovskiy, Hyunseung Choo:
Parameterized Collision Tolerant Scheduling for Broadcast Latency Minimization in Duty-cycled Wireless Sensor Networks. 103:1-103:4 - Rajesh Challa, Syed M. Raza, Sangyep Nam, Hyunseung Choo:
SD-MONET: Software Defined Mobility Management in Enterprise HetNet. 104:1-104:6 - Thang Le Duc, Duc-Tai Le, Dung T. Nguyen, Byung-Seok Kang, Hyunseung Choo, Vyacheslav V. Zalyubovskiy:
A Distributed Scheme for Broadcast Scheduling in Duty-cycled Wireless Sensor Networks. 105:1-105:6 - Syed M. Raza, Donghan Park, Yongdeuk Park, Kang-Woo Lee, Hyunseung Choo:
Dynamic Load Balancing of Local Mobility Anchors in Software Defined Networking based Proxy Mobile IPv6. 106:1-106:4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.