


default search action
3rd ICITCS 2013: Macau, China
- 2013 International Conference on IT Convergence and Security, ICITCS 2013, Macau, China, December 16-18, 2013. IEEE Computer Society 2014, ISBN 978-1-4799-2845-3

- D. T. Long, D. T. Thu, D. N. Thuc:

A Bergman Ring Based Cryptosystem Analogue of RSA. 1-4 - Soojung Park:

A Case Study of Wellness IT: Therapeutic Horseback Riding. 1-3 - Young Chun Kwon, Nakhoon Baek

:
A Celestial Map Renderer Based on 3D Graphics System. 1-3 - Abdullah A. I. Alnajem, Ning Zhang

:
A Copula-Based Fraud Detection (CFD) Method for Detecting Evasive Fraud Patterns in a Corporate Mobile Banking Context. 1-4 - Jeong-Seok Jang, Min Soo Kang

, Kyounghak Lee:
A Development of Prediction Program for Electric Field Strength Using the ITU-R. P.1546 Recommendation with Geographic Information. 1-4 - Ahmad A. Al-Daraiseh

, Eyas El-Qawasmeh, Nazaraf Shah
:
A Framework for Energy Monitoring and Management System for Educational Institutions. 1-4 - Rize Jin, Hyung-Ju Cho, Tae-Sun Chung:

A Group Based In-Block Logging for Flash Based Systems. 1-3 - Jiangwei Wu, Daobing Zhou, Guoqiang Xiao:

A Hierarchical Bag-of-Words Model Based on Local Space-Time Features for Human Action Recognition. 1-4 - Almetwally M. Mostafa

, Ahmed E. Youssef
:
A Leader Replacement Protocol Based on Early Discovery of Battery Power Failure in MANETs. 1-4 - Minuk Kim, Jiman Mun, Souhwan Jung, Younghan Kim:

A Mobile Device-Based Mobile AP Detection Scheme Using NAT Behavior. 1-4 - Naruemon Wattanapongsakorn, E. Wonghirunsombat, Chalermpol Charnsripinyo, T. Assawaniwed, V. Hanchana, S. Srakaew:

A Network-Based Internet Worm Intrusion Detection and Prevention System. 1-4 - Hongxin Ma, Yingjue Fang, Xiaofeng Wang:

A New Key Exchange Protocol on Thompson Groups. 1-4 - Hwan-Seok Yang, Seung-Jae Yoo:

A Novel Security Model for Robust Web Services. 1-3 - Wigi Vei A. Oliveros, Cedric Angelo M. Festin, Roel M. Ocampo:

A P2P Network Booting Scheme Using a BitTorrent-Like Protocol. 1-4 - Sahar Bayoumi

, Elham AlSobky, Moneerah Al-Mohsin, Manahel Al-Twaim, Monira Alkaldi, Munera Alkahtani:
A Real-Time Fire Detection and Notification System Based on Computer Vision. 1-4 - Sumaia Mohammed Al-Ghuribi, Saleh Alshomrani:

A Simple Study of Webpage Text Classification Algorithms for Arabic and English Languages. 1-5 - Do-Heon Lee, Su-Kyoung Yoon, Cheong-Ghil Kim, Shin-Dug Kim, Jung-Geun Kim:

A Space Effective DRAM Adapter for PRAM-Based Main Memory System. 1-3 - Youngjoo Kim:

A Study of Wellness Core Technology and E-Sports. 1-3 - Sang-woo Chang, Sang-Sun Lee:

A Study on Distance-Based Multi-Hop Broadcast Scheme for Inter-Vehicle Communication. 1-4 - Young Ho Lee, Min Su Kim, Kuinam J. Kim:

A Study on Improvement Measures of Remote Diligence / Laziness Management Applying NFC. 1-3 - Byung Seok Kong, Min Su Kim, Kuinam J. Kim:

A Study on Improvement Measures of Unmanned Security System against Security Threats. 1-3 - Yun-Seok Lee, Eun Kim, Young-Sub Kim, Ha-Yong Jeon, Min-Soo Jung:

A Study on Secure Chip for Message Authentication between a Smart Meter and Home Appliances in Smart Grid. 1-3 - Eun Kim, Yun-Seok Lee, Seong-Yun Kim, Jung-Won Choi, Min-Soo Jung:

A Study on the Information Protection Modules for Secure Mobile Payments. 1-2 - Won Hyung Park, Dae Hyeob Kim, Myung-Soo Kim, Neo Park:

A Study on Trend and Detection Technology for Cyber Threats in Mobile Environment. 1-4 - Mohamed A. Hagal

, Sohil F. Alshareef
:
A Systematic Approach to Generate and Clarify Consistent Requirements. 1-4 - Jonghyuk Park, Nakhoon Baek

:
A Text-Based User Interface Style Toolkit for Low-Tier Embedded Systems. 1-4 - Pham Phuoc Hung, Tuan-Anh Bui, Eui-Nam Huh:

A Thin-Thick Client Collaboration for Optimizing Task Scheduling in Mobile Cloud Computing. 1-4 - Wonhyuk Lee, Seunghae Kim, Minki Noh, Hyuncheol Kim:

A Virtualized Network Model for Wellness Information Technology Research. 1-3 - Sheng-Yuan Yang, Dong-Liang Lee, Lawrence Y. Deng:

A Web Services-Based Cloud Interface Agent for Intelligent YOHO Information Processing. 1-4 - Shwu-Huey Yen, Chun-Hui Wang:

Abnormal Event Detection Using HOSF. 1-4 - Chi-Hun Lim, Seok-Ho Yoon, Seung-Hwan Choi, Kwang-Hyung Lee, Choong-Ho Cho:

Adaptive Mobility Robustness Adjustment Scheme for LTE-Femto System. 1-4 - Gary Cheng, Juliana Chau:

An Approach to Identify Levels of Reflection Using Latent Semantic Analysis. 1-3 - Boon-Hock Lim, Syh-Yuan Tan, Wei-Chuen Yau:

An Enhanced Public Key Infrastructure. 1-4 - Min-Hooi Chuah

, Kee-Luen Wong:
An Enterprise Business Intelligence Maturity Model: Case Study Approach. 1-4 - Do-Young Chung, Sok-Joon Lee

, Sin-Hyo Kim:
An Implementation and Experiment of Wireless Attack Emulator on Windows Environment. 1-4 - Jongho Mun, Qiuyan Jin, Woongryul Jeon, Dongho Won:

An Improvement of Secure Remote User Authentication Scheme Using Smart Cards. 1-4 - Kabsu Han, Insick Son, Jeonghun Cho:

An In-Vehicle Data Management Framework for Interaction between IVI and Vehicular Networks. 1-4 - Xin Li, Nakhoon Baek

:
An LRU Approach for the Virtual Texture Management. 1-3 - Donggeun Lee, Sang-Sun Lee:

Analysis of Efficient Message Relay Methods in Intervehicle Networks. 1-4 - Sung-Hwan Kim, Nam-Uk Kim, Tai-Myoung Chung:

Attribute Relationship Evaluation Methodology for Big Data Security. 1-4 - Do Van Thanh, Tore E. Jønvik, Ivar Jørstad, Do van Thuan:

Better User Protection with Mobile Identity. 1-4 - Abdulrahman Azab

, Hein Meling:
Building Composite Grid Tasks Using STROLL File-System. 1-4 - Zameer Ahmed Adhoni, Husam Ahmed Al Hamad, Abdul Ahad Siddiqi, Zaheer Ahmed Adhoni:

CBQ-API: A Cloud-Based Programming Interface for Qur'anic Applications. 1-5 - Hanan Aljuaid

, Dzulkifli Mohamad:
Child's Body Part Tracking Simulates Babysitter Vision Robot. 1-4 - Siham Bacha, Nadjia Benblidia

:
Combining Context and Content for Automatic Image Annotation on Mobile Phones. 1-4 - Ivy Joy G. Mallare, Susan Pancho-Festin:

Combining Task- and Role-Based Access Control with Multi-Constraints for a Medical Workflow System. 1-4 - Pankaj Joshi, Divyanshu Joshi:

Comparative Study of Channel Codes for OFDM System and Judgement for Batter Peak to Average Power Ratio (PAPR). 1-4 - Mohsen Bafandehkar, Sharifah Md Yasin, Ramlan Mahmod

, Zurina Mohd Hanapi
:
Comparison of ECC and RSA Algorithm in Resource Constrained Devices. 1-3 - Kritsanapong Somsuk, Sumonta Kasemvilas

:
Comparison Performance of MFFV2 and MVFactor for Factoring the Modulus. 1-4 - Pierre Schnarz, Joachim Wietzke, Ingo Stengel:

Co-Processor Aided Attack on Embedded Multi-OS Environments. 1-4 - Ahmed Z. Emam

:
Critical Success Factors Model for Business Intelligent over ERP Cloud. 1-5 - Sang-Won Bang, Kyeong-Jin Park, Woo-Sung Kim, Geun-Duk Park, Dong-Hyuk Im:

Design and Implementation of NFC-Based Mobile Coupon for Small Traders and Enterprisers. 1-2 - Dae-Won Park, Jaeyang Park, Doowy Kwon, Hyuk-Chul Kwon, Suhyun Park:

Design of Data Structure for System ENC Kernel. 1-3 - Eunhoe Kim, Sungmin Kim, Jaeyoung Choi:

Detecting Illegally-Copied Apps on Android Devices. 1-4 - Nam-Woo Kim, HoonJae Lee:

Developing of Vision-Based Virtual Combat Simulator. 1-4 - Jung-Chul Lee, Jae-Young Kim, Seungho Lee:

Development of a Flute Self-Learning Tool Using an Electronic Flute and PC Software. 1-4 - Youzheng Chen, Baozhong Cheng, Xiaoyan Zhang, Yi Sun, Jin Xie, Kun Li:

Development of Doubango-Based IMS UE for Teaching Experiments. 1-4 - Min Soo Kang

, Jeong-Seok Jang, Kyounghak Lee:
Development of Robust Sensor Node for Internet of Things. 1-4 - Safia Shaik, Y. Padmasai, V. Naveen Kumar:

Development of Telugu Text to Speech System Using OMAP 3530. 1-5 - Mohamed Ahmed Mohamed Ali

, Mohd Aizaini Maarof:
Dynamic Innate Immune System Model for Malware Detection. 1-4 - James Shueyen Tai, Kin Fun Li, Haytham Elmiligi

:
Dynamic Time Warping Algorithm: A Hardware Realization in VHDL. 1-4 - Mitali Halder, Anant Dev Tyagi:

English-Hindi Transliteration by Applying Finite Rules to Data before Training Using Statistical Machine Translation. 1-4 - Khadidja Ameur, Nadjia Benblidia

, Saliha Oukid-Khouas:
Enhanced Visual Clustering by Reordering of Dimensions in Parallel Coordinates. 1-4 - Regin Cabacas

, In-ho Ra:
Evaluating Mobility Models in Delay Tolerant Network. 1-4 - Lawrence Y. Deng, Dong-Liang Lee, Yi-Jen Liu:

Face Recognition Lock. 1-2 - Abhinav S. Mansingka, Mohamed L. Barakat, Mohammed Affan Zidan

, Ahmed Gomaa Radwan
, Khaled N. Salama
:
Fibonacci-Based Hardware Post-Processing for Non-Autonomous Signum Hyperchaotic System. 1-4 - Sanjaa Bold

, Min A. Jeong, Seong Min Jeon, Seong-Ro Lee:
FPGA Based Real Time Embedded Color Tracking Mobile Robot. 1-4 - Anu Mary Chacko

, Suresh Kumar, Vinod Pathari
:
Generalized Architecture to Capture End to End Provenance in a System. 1-4 - Cheng-Da Huang, Acquah Hackman, Hsiu-Hsen Yao, Syuan-Yi Chen:

Generating a Road Situation Data Warehouse Using Detectives Car Approach. 1-4 - Hwei-Jen Lin, Yue Sheng Li:

Generation of Pencil Sketch Drawing. 1-4 - Wonho Suh:

Graphical Analysis of Mobile Computing Traffic Simulation Model. 1-4 - Suthasinee Iamsa-at, Punyaphol Horata:

Handwritten Character Recognition Using Histograms of Oriented Gradient Features in Deep Learning of Artificial Neural Network. 1-5 - Akihiko Maeta, Kenichi Takahashi, Takao Kawamura, Kazunori Sugahara:

Implementation of Logging for Information Tracking on Network. 1-4 - Byeong-Ju Kim, Yun-Hong Noh, Do-Un Jeong:

Implementation of Mobile Based Multi-Function Health Monitoring System. 1-4 - Byeong-Hoon Kim, Yun-Hong Noh, Do-Un Jeong:

Implementation of Template Matching Based ECG Compression Algorithm for Mobile Application. 1-4 - Yun-Hong Noh, Jiunn Huei Yap, Do-Un Jeong:

Implementation of the Abnormal ECG Monitoring System Using Heartbeat Check Map Technique. 1-4 - Anooj P. K.:

Implementing Decision Tree Fuzzy Rules in Clinical Decision Support System after Comparing with Fuzzy Based and Neural Network Based Systems. 1-6 - Ghassan N. Mohammed, Azman Yasin, Akram M. Zeki

:
Improvement of the Quality for Digital Image Watermarking Based on Dual ISB. 1-4 - Kien Nguyen

, Quang Tran Minh, Shigeki Yamada:
Increasing Resilience of OpenFlow WANs Using Multipath Communication. 1-2 - Chee Een Yap, Myung Ho Kim

:
Instance-Based Ontology Matching with Rough Set Features Selection. 1-4 - Young-Min Kang, Do-Hoon Lee, Hwan-Gue Cho:

Iridescent Surface Rendering with Per-Channel Rotation of Anisotropic Microfacet Distribution. 1-4 - Kondwani Makanda, Jun-Cheol Jeon:

Key Distribution Protocol on Quantum Cryptography. 1-2 - Tomoyuki Mishima, Kenichi Takahashi, Takao Kawamura, Kazunori Sugahara:

Meeting Scheduling System Using Unpleasant Notification. 1-4 - Youngjun Jang, Jaeook Kwon, Sung Won Ahn, Chuck Yoo:

Memory Compaction Performance Improvement by Separating a Dirty Page Allocation. 1-3 - Hyeok-Joon Kwon, Jae Woo Yoon, Hong Cho, Seung-Jae Ryu, Byeong-Woo Kim:

Method of Noise Reduction for High-Voltage Systems Applied in Subsea Plants. 1-4 - Insu Song, John Vong

:
Mobile Collaborative Experiential Learning (MCEL): Personalized Formative Assessment. 1-4 - Wonho Suh:

Mobile Computing Traffic Simulation Data Process. 1-4 - Wonho Suh:

Mobile Computing Traffic Simulation Framework. 1-3 - Insu Song, John Vong

:
Mobile Core-Banking Server: Cashless, Branchless and Wireless Retail Banking for the Mass Market. 1-4 - D. Nikhitha, J. N. Chandra Sekhar:

Modeling and Simulation of IM Drive Performance Using PI, ANN and FLC. 1-4 - Kazuaki Aihara, Terumasa Aoki:

Motion Dense Sampling for Video Classification. 1-4 - Minseok Pyo, Sangwook Bae, Sunyoung Han:

Multicast Based Service Orchestration Protocol. 1-3 - Seokwon Yeom

, Dong-Su Lee:
Multi-Level Segmentation for Concealed Object Detection with Multi-Channel Passive Millimeter Wave Imaging. 1-4 - JaeHyun Lee, Soonseok Kim, V. Scott Gordon:

National Standardization Strategy in Health Information Security Environment. 1-3 - Rouzbeh Behnia, Swee-Huay Heng

:
Notes on Two Flawed Attacks on Undeniable Signature Schemes. 1-4 - Bee Bee Chua, Danilo Valeros Bernardo:

Open Source Developer Download Tiers: A Survival Framework. 1-5 - Manasarani Mandala, C. P. Gupta:

Optimal Placement of TCSC for Transmission Congestion Management Using Hybrid Optimization Approach. 1-5 - D. M. D. S. S. Dassanayake, R. A. D. D. Yasara, H. S. R. Fonseka, E. A. HeshanSandeepa, L. Seneviratne:

Panhinda - Offline Character Recognition System for Handwritten Articles. 1-4 - Min-Woo Jung, Jeonghun Cho:

Performance Evaluation for Cloud Computing in u-Health Environment. 1-4 - Min-Woo Jung, Jeonghun Cho:

Performance Evaluation of Wireless Body Area Network in u-Health Environment. 1-4 - Ilhoon Yoo, Taehyung Lee, Byeongwoo Kim, Jin Hur

, Kyubong Yeon, Gyeonggeun Kim:
Performance Interpretation Method for Electrical Tractor Based on Model-Based Design. 1-4 - Ee Hung Chang, Kang-Leng Chiew

, San-Nah Sze
, Wei King Tiong
:
Phishing Detection via Identification of Website Identity. 1-4 - Bongsup Park:

Physical Interactive Contents for the Converged Wellness Education. 1-2 - Byoungcheon Lee

:
Practical Secret Signature Scheme with No Randomness Saving. 1-3 - Hiroshi Yamaguchi, Masahito Gotaishi, Phillip C.-Y. Sheu

, Shigeo Tsujii:
Privacy Preserving Problem Solving Scheme. 1-4 - Mee Hong Ling, Kok-Lim Alvin Yau:

Reinforcement Learning-Based Trust and Reputation Model for Spectrum Leasing in Cognitive Radio Networks. 1-6 - Jeong Seok Kang, Young Gyu Kim, Hong Seong Park:

Remote Data Transmission Middleware for Telerobotics. 1-4 - Abel Avitesh Chandra, Yeonwoo Lee, Beom Mu Kim, Se Yeong Maeng, Sang Hyeok Park, Seong Ro Lee:

Review on Sensor Cloud and Its Integration with Arduino Based Sensor Network. 1-4 - Sang-min Lee, Haesung Tak, Kiejung Park, Hwan-Gue Cho, Do-Hoon Lee:

RNA-Seq Read Simulator Using SAM Template. 1-4 - Kuo-Hui Yeh, Kuo-Yu Tsai, Ren-Zong Kuo, Tzong-Chen Wu:

Robust Certificateless Signature Scheme without Bilinear Pairings. 1-4 - Dae-Hwan Kim, Hyeon-Sub Jung, Chung-Pyo Hong, Cheong-Ghil Kim, Shin-Dug Kim:

Rotated Object Recognition Based on Corner Feature Points for Mobile Augmented Reality Applications. 1-3 - Hyunwoo Lim, Jongbin Ko, Seokjun Lee, Jongwan Kim, Mijoo Kim, Taeshik Shon:

Security Architecture Model for Smart Grid Communication Systems. 1-4 - Feng Cheng, Amir Azodi, David Jaeger

, Christoph Meinel:
Security Event Correlation Supported by Multi-Core Architecture. 1-5 - Ibrahim Patel

, D. Aarti, S. Alekhya, Raghavender Kulkarni:
Sensible Heat Storage for Power Generation. 1-4 - Sanghyun Park, Tran Thi Thu Ha, Jadhav Yogiraj Shivajirao, Minsoo Hahn, Jaehyung Park, Jinsul Kim:

Smart Wheelchair Control System Using Cloud-Based Mobile Device. 1-3 - Salwa Elramly, Saeed Ashry, Abdulatief Elkouny, Ahmed Elsherbini, Hesham M. El-Badawy

:
SMSHM: Secure Mesh Mode Protocol to Enhance Security of 4G Networks. 1-5 - Jaybie A. de Guzman

, Roel M. Ocampo, Cedric Angelo M. Festin:
Social Graph-Based Partitioning and Distribution for OSN Content Caching and Proactive Delivery. 1-4 - Insu Cho, Heejun Park:

Spatial Information Service Model and Considerations in u-City. 1-3 - Sun-Min Hwang, Bok-Hee Song, Han-Hyung Yun:

Speaker Dependent Real-Time Vowel Recognition Algorithm for Lip Sync in Digital Contents. 1-4 - Jaemyoun Lee, Sanghwa Han, Junhee Ryu, Kyungtae Kang:

Strategy to Reduce I/O Access Time of Applications in Virtual Machines. 1-2 - Hyun-Joo Yoo, Seong-jeen Kim, Min-soo Jung:

Study of Garbage Collection Performance on Dalvik VM Heap Considering Real-Time Response. 1-3 - Radoslaw Nielek, Bogdan Ksiezopolski

, Adam Wierzbicki
, Lukasz Anwajler:
Surprising Consequences of Simple Privacy Protection Method. 1-5 - Jae Hoon Yoon, Jeong Seok Kang, Hong Seong Park:

Test Data Combination Strategy for Effective Test Suite Generation. 1-4 - Ji Woong Kim, Min Su Kim, Seung-Jae Yoo, Kuinam J. Kim:

The Efficient Security Management Measures Using K2-SMS in Case of Security Transport. 1-2 - Jeong-Myeong Kim, Geun-Duk Park:

The Experiment Results of Webcam Broadcasting Systems. 1-4 - Nik Ahmad Akram, Niusha Shafiabady

, Dino Isa:
Using Neural Networks as Pipeline Defect Classifiers. 1-4 - Azeddien M. Sllame

, Mohamed Jafaray:
Using Simulation and Modeling Tools in Teaching Computer Network Courses. 1-4 - Zdenek Silar, Martin Dobrovolny:

Utilization of Directional Properties of Optical Flow for Railway Crossing Occupancy Monitoring. 1-4 - Sunyoung Kang, Seungae Kang:

Virtual Private Network for Wellness Sports Information. 1-3 - Dong-Liang Lee, Lawrence Y. Deng, Yi-Jen Liu:

Visualization for Interest in Music Based on Plurk Social Network. 1-4 - Youngsuk Kim, Yoan Shin, Myungsik Yoo:

VLC-TDOA Using Sinusoidal Pilot Signal. 1-3 - Seungae Kang:

Wellness Contents for Disabled People's Rehabilitation. 1-3 - Anusha Bandari, D. Aarti, S. Alekhya, Ashok Shigli

, Ibrahim Patel
:
Wireless Radio Frequency Transmission for Bladder Pressure. 1-4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














