default search action
6th NCM 2010: Seoul, Korea
- International Conference on Networked Computing and Advanced Information Management, NCM 2010, Sixth International Joint Conference on INC, IMS and IDC: INC 2010: International Conference on Networked Computing, IMS 2010: International Conference on Advanced Information Management and Service, IDC 2010: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 16-18, 2010. IEEE Computer Society 2010, ISBN 978-1-4244-7671-8
- Yutaka Okaie, Tadashi Nakano:
Simulating the network dynamics in market-oriented overlay networks. 1-4 - Xiaomi An, Wang Wang:
Towards comprehensive integration management of business continuity, records and knowledge. 5-10 - Suhaas Kaul, Udita Shukla, S. Karthik Sriharsha, Vishal Sonkar, Krishna Kant:
Robustness analysis of a new distributed scheduling approach - Relprox model using Mosix. 11-16 - Qingwei Yang, Zukuan Wei, Jaehong Kim:
A hot backup sip server system based on VRRP. 17-20 - K. Saitou, S. Sakurai, H. Suzuki:
On identification of pseudo uniform grounds based on similarity of settlement history. 21-26 - Zhiming Liu, Jichang Sha, Xiaohua Yang, Yaping Wan:
Fault detection for high availability RAID system. 27-32 - Chien-Min Wu, Hui-Kai Su, Wang-Hsai Yang, Yueh-Sheng Chien, Pai-Kun Huang:
Neighbor-aware dynamic backoff algorithm for wireless multihop ad hoc networks. 33-38 - T. Bilski:
Network performance issues in IP transition phase. 39-44 - Saumay Pushp, Priya Ranjan:
A practical incentive towards efficient data sharing in large scale enterprise. 45-50 - Jiazao Lin, Yi Yang, Zhili Zhao, Caihong Li, Lian Li, Xining Li:
A new service reservation approach for workflow management. 51-56 - Naveed Anwer, Ayesha Rashid, Syed Hassan:
Feature based opinion mining of online free format customer reviews using frequency distribution and Bayesian statistics. 57-62 - Tekaya Karima, Abdelaziz Abdellatif, Habib Ounalli:
Data mining based fragmentation technique for distributed data warehouses environment Using predicate construction technique. 63-68 - Wei Xia, Xiaodong Mu, Yiping Yao, Bing Wang, Fei Xing:
Research on technologies of Event Graph based Parallel Discrete Event Simulation. 69-74 - Nen-Fu Huang, Yih-Jou Tzang, Hong-Yi Chang, Chih-Shun Ma:
Construction of an efficient ring-tree-based Peer-to-Peer streaming platform. 75-80 - Shahidan M. Abdullah, Azizah A. Manaf, Mazdak Zamani:
Capacity and quality improvement in reversible image watermarking approach. 81-85 - Pardeep Kumar, Md. Iftekhar Salam, Sanggon Lee, Hoon-Jae Lee:
Addressing secure data routing scheme for heterogeneous sensor networks. 86-90 - Tien-Hsiung Weng, Sheng-Wei Huang, Won Woo Ro, Kuan-Ching Li:
Implementing FFT using SPMD style of OpenMP. 91-96 - Bo Hu, Keqing He, Peng Liang, Rong Li:
REMO: A RGPS-based requirements modeling process for service oriented Architecture. 97-102 - Bo Wu, Lei Wang:
Application of SOA-based Business Process Management in Outage Management System. 103-106 - Tongyu Zhu, Yuan Zhang, Fei Wang, Weifeng Lv:
A location-based push service architecture with clustering method. 107-112 - Shanping Li, Jiaqi Tong:
A collaborative performance tuning approach for Portal-based web sites. 113-117 - Wei He, Yongqing Zheng, Li-zhen Cui:
An efficient service search strategy in decentralized e-business environments. 118-122 - Lin Guo, Zhi-hai Yu, Hai-Bo Li, Lejun Zhang, Jianpei Zhang:
A remote data disaster recovery system model based on Undo. 123-128 - Wei-You Liu, Shan-Ping Chuang:
Vehicle routing planning for logistics. 129-132 - Yang Su, Jun Qin:
Approach on modeling crosscutting features in concurrent system. 133-138 - Yang Su:
Extracting traversing features at requirements level from software legacy system. 139-144 - Yang Su:
Understanding crosscutting concerns from various perspectives in software reverse engineering. 145-150 - Yuan-Chih Yu, Shing-chern D. You, Dwen-Ren Tsai:
A calendar oriented service for smart home. 151-156 - Wei Zhang, Jian Jun Luo:
Speed and rotor flux estimation of induction motors based on extended kalman filter. 157-160 - Xiaoping Li, Jinghui Chen, Yinxing Li, Qiong Xu:
The study of network layer topology discovery algorithm for optimization problem based on SNMP. 161-163 - Xiaoping Li, Hu Xu, Hao Lu:
A node cooperation based random linear network coding algorithm for wireless sensor networks. 164-168 - Yinxiang Li, Xiaoping Li, Xinxin Sun, Qiong Xu:
The application of one-time password technology in the security of electronic accounting system. 169-171 - Yinxiang Li, Xiaoping Li, Lizhi Zhong, Yuhuan Jing:
Research on the S / KEY one-time password authentication system and its application in banking and financial systems. 172-175 - Xiaoping Li, Kai Wu:
The key technology of the next generation distance education mobile platform. 176-178 - Xiaoping Li, Kai Wu:
Research of mobile IP tunneling mechanism. 179-182 - Jun-cheng Yang, Hao-peng Chen:
A behavior-aware matchmaking model for semantic Web services discovery. 183-188 - Nittaya Muangnak, Wannapa Pukdee, Thapani Hengsanunkun:
Classification students with learning disabilities using Naïve Bayes Classifier and Decision Tree. 189-192 - Jing Luo, Xiao-chun Jin, Anrong Dang:
Study of ecological sustainable development for urban built environment based on GIS and RS. 193-196 - Alfonso Farruggia, Marco Ortolani, Giuseppe Lo Re:
FDAE: A failure detector for asynchronous events. 197-202 - Juan Zhou, Yi Wang, Gang Hu:
End-to-end performance measurement model on DiffServ domain in IPv6 network. 203-206 - Ping-Feng Pai, Ming-Fu Hsu, Ming-Chieh Wang:
Computer-assisted audit techniques based on an enhanced rough set model. 207-212 - Panida Songram, Sasitorn Kaewman:
The most frequent closed sequence mining. 213-217 - Peter Salhofer, Bernd Stadlhofer:
Knowledge-first web services an E-Government example. 218-223 - Manirath Wongsim, Jing Gao:
Data Quality issues in Accounting Information Systems Adoption - Theory building. 224-230 - Yan-Jing Wu, Wei-Cheng Sung:
A dynamic navigation scheme for vehicular ad hoc networks. 231-235 - I-Long Lin, Yun-Sheng Yen, Bo-Lin Wu, Hsiang-Yu Wang:
VoIP network forensic analysis with digital evidence procedure. 236-241 - Robert C. Meurant:
Providing every student with an iPad as a means of helping develop Korean EFL Digital Literacy. 242-247 - Tien-Dung Nguyen, Aymen Abdullah Al-Saffar, Eui-nam Huh:
A dynamic ID-based authentication scheme. 248-253 - Rama Mohan Babu K. N, Prathima Mabel J, K. N. Balasubramanya Murthy, Mamatha:
Performance enhancement of tunneling protocol in mobile network with mobile router. 254-257 - Yang Shen, Huijuan Fu, Xiaodong Ren, Shangru Wu:
Open real-time tracking teaching approach for undergraduates in Chinese Mainland. 258-261 - Manuel Tupia:
Information security risks in a customer service call center infrastructure. Guidelines for security managers. 262-264 - Zhikun Zhang, Youping Geng, Jianguo Xiao:
Cardinality constraint analyse and implementation in access control model. 265-267 - Inwhee Joe, Juhyeon Han:
A soft handover approach using multiple network interfaces for QoS support. 268-271 - Inwhee Joe, Sang-Woo Kim:
Mobility management for mobile sinks using soft handover in large-scale sensor fields. 272-275 - Hyun-Jong Kim, Seong Gon Choi:
A method to support multiple interfaces a mobile node in next generation wireless network. 276-281 - Jangkeun Jeong, Hyuntai Kim, Sangtae Lee, Jitae Shin:
An analysis of hidden node problem in IEEE 802.11 multihop networks. 282-285 - Bo Sun, Zhiyi Fang, Lingxi Zhou, Binbin He:
A secure examination management system on Internet. 286-289 - Jia Liu, Weidong Zhong, Min-Qing Zhang, Xiaoyuan Yang:
Recognizing human actions using bag-of-features and Intersection Kernel Support Vector Machines. 290-293 - Feng Gao, Jingsha He, Xu Wu:
An approach for tracking privacy disclosure. 294-299 - Anping Zhao, Yu Yu, Yuhui Qiu:
Hierarchical structure based service semantic relationship discovery. 300-305 - Weihong Xie, Luan Jiang, Yongjian Wang, Guangyu Zhang:
IT capability, strategic flexibility and enterprise performance: The empirical evidence from the manufacturing enterprises in Pearl River Delta. 306-311 - Narongrit Waraporn, Tuul Triyason, Chinnapong Angsuchotmetee, Patchara Tilkanont:
Emergency service warning system using SIP for integrated media. 312-317 - Qingming Tang, Yingjie Wu, Shangbin Liao, Xiaodong Wang:
Utility-based k-anonymization. 318-323 - Xizhao Luo, Peide Qian, Yanqin Zhu, Shangping Wang:
Leakage-resilient identity-based encryption scheme. 324-329 - Jiaxin Liu, Shuting Yan, Jiadong Ren:
The design of storage structure for sequence in incremental sequential patterns mining. 330-334 - Mi-Young Choi, Chang-Joo Moon, Doo-Kwon Baik, Young-Jun Wie, Joong-Hee Park:
Interoperability between a relational data model and an RDF data model. 335-340 - Shadi Rasheed Masadeh, Shadi A. Aljawarneh, Nedal Turab, Aymen M. Abu-Errub:
A comparison of data encryption algorithms with the proposed algorithm: Wireless security. 341-345 - Jiayan Wu, Liwei Zhang, Jian Liang, Sheng Qu, Zhiqiang Ni:
A comparative study for fast-flux service networks detection. 346-350 - Ruo Ando, Youki Kadobayashi, Yoichi Shinoda:
Blink: Large-scale P2P network monitoring and visualization system using VM introspection. 351-358 - Sang C. Suh, Sri Ganesh Anaparthi, Gayatri Appana:
Design of conceptual search engine using hierarchy of attributes and concepts. 359-365 - Xuchu Dong, Haihong Yu, Dantong Ouyang, Yuxin Ye, Yonggang Zhang:
A diversity-guided heuristic-based genetic algorithm for triangulation of Bayesian networks. 366-369 - Huang Xiao Tao, Cai Liang, Wu Chi, Huang Li Qun:
The research of information security risk assessment method based on fault tree. 370-375 - Zukuan Wei, Jaehong Kim, JingRong Zhao:
Research of Flex-based WebGIS application. 376-380 - Jae Hyoung Cho, Jae-Oh Lee:
A deployment platform the SDP using enablers in presence service. 381-384 - Sabrina M. Shedid:
Modified SET protocol for mobile payment. 385-389 - Soo-Duek Kim, Seon-Ho Park, ChangSup Keum, Tai-Myoung Chung:
A study new challenge for billing system in converged service platform. 390-395 - Min-Hua Shao, Shu-Hui Wen:
A study on secure and fair escrow services for digital commerce. 396-401 - Md. Iftekhar Salam, Pardeep Kumar, Hoon-Jae Lee:
An efficient key pre-distribution scheme for wireless sensor network using public key cryptography. 402-407 - C. Y. Lee, S. W. Lin, K. C. Ying, M. R. Yang:
An advanced approach for vehicle routing problem with time windows. 408-411 - Sun Yongming, Han Houde:
Research of ship oil spill risk monitoring & evaluation system in Shanghai Yangshan Port water area. 412-416 - Jungyeop Kim:
Vector map digital watermarking using angles. 417-423 - Chuan-Kang Liu:
The Bound of bandwidth requirement in circuit-based switching optical ring networks. 424-427 - Jian Jiang, Wing Lon Ng:
Capturing order book dynamics with Kalman filters. 428-433 - Taehyun Kim, Dongho Won, Kwang-Woo Lee, Hogab Kang, Seungjoo Kim:
Automated DCI compliance test system for Digital Cinema Entities. 434-439 - Suresh Byanjankar, Pinata Winoto, Woojin Paik:
On the SaaS servers and their service-selection strategies. 440-445 - Nadia M. G. Al-Saidi, Mohamad Rushdan Md. Said:
Fractal attractor based digital signature. 446-449 - Joy Iong-Zong Chen, Kao-Ming Liu, Meng-Ta Lu, Yu-Ju Liu, Ching-Chuan Chiu:
Study on the random characteristics of joint FBC and CFO in an asynchronous MC-CDMA system. 450-454 - Chandrasekaran Subramaniam, Sankarbharathy Ponnusamy, Agilan Ravi, Hanumanth Praveen Ravindran:
Trusted business system model using context sensitiveness. 455-460 - Chong-Yen Lee, Hau-Dong Tsui, Ching-Bang Ya, Hsin-Ju Lin, Yuei-Dah Wang:
Cross referencing algorithm for identifying group completeness in RFID system. 461-465 - A. Kablan, W. L. Ng:
High frequency trading strategy using the Hilbert transform. 466-471 - Oh Il Oh, Kim Chang Shik, Park Jae Sun, Pyeon Mu Wook:
Unit technology integration scenario for the application in construction work sites. 472-477 - Chen I-Fei:
Evaluate the performance of cardholders' repayment behaviors using artificial neural networks and data envelopment analysis. 478-483 - Byung-Yup Lee, Kwang-Ki Ryoo:
An advanced H.264/AVC CAVLC decoding architecture for low power implementation. 484-487 - Tadashi Nakano, Tatsuya Suda:
Biological cell communications technology: An architecture overview. 488-490 - Pardeep Kumar, Young-Dong Lee, Hoon-Jae Lee:
Secure health monitoring using medical wireless sensor networks. 491-494 - Nai-Wen Kuo:
IT applications in Healthcare Information System - A case study of medical center in Taiwan. 495-500 - Fayu Wang, Hua Zhang, Guangping Xu:
Design and realization of mobile government information services platform based on SMS. 501-504 - Chung-Hsin Liu, Wu-Fan Hsu:
The study of video conference transmission security as an example on Windows Live. 505-508 - Chung-Hsin Liu, Po-Cheng Teng:
The safety design of the laboratory monitoring system. 509-513 - Chung-Hsin Liu, Sheng-Shiang Chang:
The analysis on the effectiveness for the handoff of WLAN and Bluetooth. 514-519 - Chung-Hsin Liu, Jian-Yun Lo:
The study for the WLAN with ZigBee positioning system. 520-525 - Yanping Wang, Bo Sun, Guannan Qu:
CSCW-based supply chain performance analysis system. 526-529 - Naiji Ren, Zhiyi Fang, Hongyu Sun, Bo Sun, Yang Zhao:
CSCW based customer relationship management system. 530-535 - Xindan Gao, Nihong Wang, Jun Li:
A system design of the Tahe's forest -fire -prevention management system. 536-539 - Shu Quan Lu, Shiyu Xie, Takao Ito:
Modeling Chinese stock markets' volatility. 540-541 - Shu Quan Lu, Takao Ito:
The outliers of Chinese stock markets. 542-546 - Jin-nyung Lee, Moo-uk Pyun, Byoung-kil Lee, Yang Dam Eo:
The earthwork plan application of 3D Geospatial data. 547-552 - Ki-Il Kim:
A novel scheduling for (m, k)-firm streams in wireless sensor networks. 553-556 - Toshiaki Miyazaki, Daiki Shitara:
Automatic damaged-function alternation among wireless sensor nodes. 557-562 - Mingyu Lim:
Internal forwarding scheme for consistent event transmission in distributed multi-user systems. 563-568 - Sun-Woong Kim, Shin Kim, Tae-Woong Jung, Mu-Wook Pyeon, Seong-Pil Kong, Yang Dam Eo:
Direction to support ubiquitous city input/output system with geospatial image. 569-574 - Santiago Otero, Francisco Poza, Miguel Angel Domínguez, Perfecto Mariño Espiñeira:
Development platform in the design of embedded automotive electronics. 575-580 - Tae-Woong Jung, Sang-Moo Lee, Mu-Wook Pyeon, Jee-Hee Koo:
U-forest based service model derived strategy. 581-585 - Jeong-Hyun Park, Hoyon Kim, Jong-Heung Park:
Maintenance system of mail sorting machine. 586-591 - Chi Yoon Jeong, Beom-Hwan Chang, Jung-Chan Na:
A hierarchical approach to traffic anomaly detection using image processing technique. 592-594 - Juan Wang, Zheng Qin, Jinxue Zhang:
Degree and resource-constrained routing algorithm for application layer multicast in ad hoc networks. 595-599 - Kyung Jun Gil, Radius Bhayu Prasetiyo, Hyun Ju Park, Sang Boem Lim, Yang Dam Eo:
Fire monitoring system based on Open Map API. 600-605 - Ping Wang, Tzu Chia Wang, Pu-Tsun Kuo, Chin Pin Wang:
An analysis model of botnet tracking based on ant colony optimization algorithm. 606-611 - So-Tsung Chou, Hann-Tzong Chern, Cheng-Mu Shiao:
AODV protocol with scheduling priority flow in MAC layer (AODV-SPF). 612-617 - C. Y. Lee, M. R. Yang, L. Y. Chang, Z. J. Lee:
A hybrid algorithm applied to classify unbalanced data. 618-621 - Chih-Jen Lee, Tzu-Yin Chen, Jenn-Dong Sun, Tai-Ning Yang, Allen Y. Chang:
Combining Gradientfaces, principal component analysis, and Fisher linear discriminant for face recognition. 622-625 - Chih-Jen Lee, Tai-Ning Yang, Chun-Jung Chen, Allen Y. Chang, Sheng-Hsuan Hsu:
Fingerprint identification using local Gabor filters. 626-631 - Chung-Hsin Liu, Chia-Hong Chou:
Two-dimensional bar code mobile commerce - Implementation and performance analysis. 632-635 - Chung-Hsin Liu, You-Sheng Li:
The study of Botnet attack on VoIP. 636-640 - Nai-Wen Kuo:
Towards a holistic customer experience. 641-644 - Chang-Lung Tsai, Uei-Chin Lin, Allen Y. Chang, Chun-Jung Chen:
Information security issue of enterprises adopting the application of cloud computing. 645-649 - Allen Y. Chang, Cheng-Hua Liu, Jenn-Dong Sun, Chang-Lung Tsai:
Technology Acceptance of videoconferencing. 650-652 - C. C. Wei, C. H. Wang, S. W. Huang:
Using threshold method to separate the edge, coating and body of tongue in automatic tongue diagnosis. 653-656 - Tzu-Liang Kung, Hsing-Chung Chen, Jimmy J. M. Tan:
On the faulty sensor identification algorithm of wireless sensor networks under the PMC diagnosis model. 657-661 - Shu-Hong Lee:
Novel dummy sequence generator for PAPR reduction by DSI in OFDM systems. 662-664 - Hsing-Chung Chen, Hsien-Yun Chuang, Tzu-Liang Kung, Yung-Fa Huang:
An enhanced Three-party Encrypted Key Exchange protocol using digital time-stamp. 665-670 - Yung-Fa Huang, You-Ting Jheng, Hsing-Chung Chen:
Performance of an MMSE based indoor localization with wireless sensor networks. 671-675 - Chen-Shu Wang, Chun-Yi Li:
Integrated baby-care recommender platform based on hybrid commonsense reasoning and case-based reasoning algorithms. 676-681 - Che-Yu Yang, Hua-Yi Lin:
An automated semantic annotation based-on Wordnet ontology. 682-687 - Shih Jung Wu:
An intelligent handover decision mechanism for heterogeneous wireless networks. 688-693 - Deng-Yiv Chiu, Shin-Yi Chian:
Exploring stock market dynamism in multi-nations with genetic algorithm, support vector regression, and optimal technical analysis. 694-699 - Yuan-Chu Hwang, Weng-Ting Lin:
A personalized healthcare service on aged stroke-precaution. 700-703 - Wen-Chih Chang, Yu-Min Chou, Kuen-Chi Chen:
Game-based digital learning system assists and motivates C programming language learners. 704-709 - Wen-Chih Chang, Hsiao-Wen Lin, Lai-Chi Wu:
Applied Social Network Anaysis to Project Curriculum. 710-715 - Wen-Chih Chang, Te-Hua Wang, Yen-Ching Huang:
Exploring the distribution and relationship between MSN and the physical world. 716-721 - D. T. Ku, Chiung-Sui Chang:
A framework of PBL strategy integrated in LMS and a ubiquitous learning environment. 722-726 - Ming-Hsiung Ying, Hao-Hsuan Huang:
Item selection strategic via social network analyze. 727-732 - Chen-Shu Wang, Yu-Chieh Li:
IT/IM academic network in Taiwan via social networks analyze of conference committees. 733-737 - Cesar D. Velandia-Brinez, S. Don, Na-Yun Cho, Eunmi Choi, Dugki Min:
Adaptive signal management using event processing networks. 738-745 - Saqib Nazir, Muhammad Tanvir Afzal, Muhammad Abdul Qadir, Hermann A. Maurer:
CAOWL-SAI: Context aware OWL based semantic association inference. 746-751 - Gwo-Ruey Lee, Chia-Hsin Cheng, Ho-Lung Hung:
Selected mapping applied scheme for PAPR reduction in OFDM communication systems. 752-755 - Ho-Lung Hung, Chien-Chi Chao, You-Hao Lin, Shih-Ping Huang, Chin-Hung Wu, Gwo-Ruey Lee:
An interference cancellation scheme-based carrier frequency offset estimation for OFDM uplink transmissions. 756-760
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.