


default search action
RACS 2014: Towson, Maryland, USA
- Chao Lu, Esmaeil S. Nadimi, Sung-Ryul Kim, Wei Wang:

Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, RACS 2014, Towson, Maryland, USA, October 5-8, 2014. ACM 2014, ISBN 978-1-4503-3060-2
Artificial intelligence & algorithms
- Vinh Nguyen, Chih-Cheng Hung, Xiang Ma:

Face hallucination based on locally linear embedding and local correlation. 1-6 - Junghoon Lee, Gyung-Leen Park:

DC charger selection scheme for electric vehicle-based tours visiting multiple destinations. 7-11 - Wei Yu

, Dou An, David W. Griffith, Qingyu Yang, Guobin Xu:
On statistical modeling and forecasting of energy usage in smart grid. 12-17 - Won-Seok Hwang, Sang-Wook Kim:

Post ranking in a blogosphere. 18-22 - Xinkai Li, Chao Lu, Jon A. Sjogren:

Overflow detection in multiple P-adic parallel implementation. 23-28 - Eunji Lee, Jeongin Kim, Junho Choi, Chang Choi

, Byeong-Kyu Ko, Pankoo Kim:
A semantic weighting method for document classification based on Markov logic networks. 29-33 - Markus Rickert, Maximilian Eibl:

A proposal for a taxonomy of semantic editing devices to support semantic classification. 34-39 - Saad Sajid Hashmi

, Sang-Wook Kim:
Unsupervised detection of obfuscated diverse attacks in recommender systems. 40-45 - Shrawan Kumar Trivedi

, Shubhamoy Dey:
A study of ensemble based evolutionary classifiers for detecting unsolicited emails. 46-51 - Ju Hee Choi, Jong Wook Kwak, Seong Tae Jhang, Chu Shik Jhon:

Adaptive cache compression for non-volatile memories in embedded system. 52-57
Short papers (posters)
- Inbok Lee, Phuong Do, Phuoc-Hoang-Tuong-Lan Do, Sung-Ryul Kim:

Measuring similarities among intrusion detection rules on the MapReduce environment. 58-60
Database & data mining
- Yong Suk Choi:

Content type based adaptation in collaborative recommendation. 61-65 - Farzana Rahman, Ivor D. Addo, Sheikh Iqbal Ahamed:

PriSN: a privacy protection framework for healthcare social networking sites. 66-71 - Kyung Soo Kim, Jun Yeop Lee, Yong Suk Choi:

Metadata based combined approach for effective collaborative recommendation. 72-76 - Jiwoon Ha, Soon-Hyoung Kwon, Sang-Wook Kim, Dongwon Lee

:
Recommendation of newly published research papers using belief propagation. 77-81
Short paper (poster)
- He Li, Minje Ahn, Jongtae Lim, Kyoungsoo Bok, Han-Suk Choi, Jaesoo Yoo:

An efficient mobile social search method. 82-85 - Byung-Kun Park, Wone-Wung Jung, Joonhyouk Jang:

Integrated financial trading system based on distributed in-memory database. 86-87
Image processing & computer vision
- Marcel-Titus Marginean, Chao Lu:

A multi-paradigm object tracker for robot navigation assisted by external computer vision. 88-94 - Tuan-Anh Nguyen, Jong-Geun Oh, Min-Cheol Hong:

Fast image filtering via adaptive noise detection. 95-99 - Huu-Noi Doan, Tuan-Anh Nguyen, Beomsu Kim, Min-Cheol Hong:

Directional hole filling algorithm in new view synthesis for 3D video using local segmentation. 100-104 - Sajid Javed

, Seon Ho Oh, JunHyeok Heo, Soon Ki Jung
:
Robust background subtraction via online robust PCA using image decomposition. 105-110 - Samaneh Aminikhanghahi

, Sung Y. Shin, Wei Wang, Seong-Ho Son
, Soon-Ik Jeon:
An optimized support vector machine classifier to extract abnormal features from breast microwave tomography data. 111-115 - Kwang Hee Won

, Joonwoo Son, Soon Ki Jung
:
Stixels estimation through stereo matching of road scenes. 116-120 - Byung K. Jung, Sung Y. Shin, Seong-Ho Son

, Jeong-Ki Pack:
Shape based medical image retrieval method using irregularity chain code similarity. 121-125 - Dae-Soo Kim, Gil-Je Lee, Kee-Young Yoo:

A reversible data hiding scheme based on histogram shifting using edge direction predictor. 126-131 - Zhenhai Wang, Kicheon Hong:

An online multi-object tracking by detection approach based on particle filtering framework. 132-137 - Deqian Fu

, Seong Tae Jhang:
Visual tracking with multiple representative models based on sparse prototypes. 138-143 - Sisay Shimelis Gurmu, Min Woo Park

, Soon Ki Jung
:
Pedestrian detection of road scenes using depth and intensity features. 144-148
Network Computing
- Jun Huang, Xiang Li, Yin Ying, Yi Sun, Qiang Duan, Cong-Cong Xing:

FAMOUS: a novel fast multi-constrained multicast routing algorithm. 149-154 - Kaijian Liu, Haibo Zhang, Jiaoyang Peng, Fangwei Li:

Energy-aware resource allocation based on margin adaptive principle for OFDMA systems. 155-160 - Syed Hassan Ahmed

, Safdar Hussain Bouk, Dongkyun Kim:
Reducing scanning latency in WiMAX enabled VANETs. 161-165 - Chi-Sheng Shih

, Guan-Fan Wu:
Meta-routing over heterogeneous networks in M2M systems. 166-173 - Yanxiao Zhao, Jems Pradhan, Jun Huang, Hui Sun:

Experimental approach: energy-and-bandwidth spectrum sensing using GNU radio and USRP. 174-179 - Syed M. Raza

, Dongsoo S. Kim, Hyunseung Choo:
The proposal for SDN supported future 5G networks. 180-185 - Haibo Zhang, Kaijian Liu, Lixiong Mu, Fangwei Li:

Chunks and power allocation in OFDMA systems based on transient chaotic neural network. 186-191 - Md Nashid Anjum, Jun Huang, Yanxiao Zhao, Wei Wang:

Fairness-oriented spectrum sharing for ODFC-based WRAN. 192-197 - Kyoungha Kim, Ik-hyeon Jang, Yanggon Kim:

Evaluating the performance impact of RTR-BIRD in origin validation. 198-203 - Kun Hua

, Yuenong Zhu, Wei Wang, Honggang Wang
:
Cross-layer design for optimal throughput of wireless networks. 204-208 - Awais Ahmad, J. Alfred Daniel

, Anand Paul
:
Optimized data transmission using cooperative devices in clustered D2D communication. 209-214
Short paper (poster)
- Daeho Kim, Taegyu Hwang, Sanghoon Choi, Ikhyun Cho, Jiman Hong:

HILF: hybrid indoor locating framework. 215-217
Security
- Reddy A. Goutham, Dae-Soo Kim, Kee-Young Yoo:

Implicit graphical password mutual authentication using mirror-image encryption. 218-223 - Seongsoo Park, Hyunjun Kim

, Jaeju Kim, Hwansoo Han:
Detecting binary theft via static major-path birthmarks. 224-229 - Lakshmidevi Sreeramareddy, Sheng Miao

, Jinjuan Heidi Feng
:
Investigating gesture-based password: usability and vulnerability to shoulder-surfing attacks. 230-235 - TaeGuen Kim, Jung Bin Park, In Gyeom Cho, Boojoong Kang, Eul Gyu Im, Sooyong Kang:

Similarity calculation method for user-define functions to detect malware variants. 236-241 - Phuc-Tran Ho, Hee Sun Kim, Sung-Ryul Kim:

Application of sim-hash algorithm and big data analysis in spam email detection system. 242-246 - Wen-Chieh Wu, Shih-Hao Hung

:
DroidDolphin: a dynamic Android malware detection framework using big data and machine learning. 247-252 - SeongWook Kang, Hyungjoon Shim, Seong-je Cho, Minkyu Park, Sangchul Han:

A robust and efficient birthmark-based android application filtering system. 253-257 - Edward Jung, Chih-Cheng Hung, Seonho Choi:

FSM watermarks based on ordering of flip flops. 258-262
Short paper (poster)
- Daeshin Park, Youngsu Park, John Kim, Jiman Hong:

The optimized grouping value for precise similarity comparison of dynamic birthmark. 263-265
Software engineering
- Fabian Sobiech, Beate Eilermann, Andreas Rauch

:
On iteration optimization for non-cross-functional teams in Scrum. 266-271 - Byeongho Kang, TaeGuen Kim, Boojoong Kang, Eul Gyu Im, Minsoo Ryu:

TASEL: dynamic taint analysis with selective control dependency. 272-277 - Michael Smith, Josh Dehlinger:

Enabling static security vulnerability analysis in PHP applications for novice developers with SSVChecker. 278-283
System software
- Manar Qamhieh, Serge Midonnet:

An experimental analysis of DAG scheduling methods in hard real-time multiprocessor systems. 284-290 - Xing Chen, Wei Yu

, David W. Griffith, Nada Golmie, Guobin Xu:
On cascading failures and countermeasures based on energy storage in the smart grid. 291-296 - Hyunmin Yoon, Minsoo Ryu:

Real-time priority assignment for autosar-based systems with time-driven synchronization. 297-302 - Chunqiu Wang, Wei Wang, Sung Y. Shin, Soon-Ik Jeon:

Comparative study of microwave tomography segmentation techniques based on GMM and KNN in breast cancer detection. 303-308 - Yong-Yeon Jo, Sang-Wook Kim, Duck-Ho Bae:

GPU-based matrix multiplication methods for social networks analysis. 309-313 - Chin-Fu Kuo, Yung-Feng Lu:

Energy-efficient assignment for tasks on non-dvs heterogeneous multiprocessor system. 314-319 - Hsueh-Wen Tseng

, Ruei-Yu Wu, Tien-Shih Chang:
An effective VM migration scheme for reducing resource fragments in cloud data centers. 320-325 - Myunghoon Oh, Seungjae Baek, Dongwoo Kang, Jongmoo Choi:

D3: discarding dispensable data for efficient live migration of virtual machines. 326-331 - Chien-Chung Ho, Yu-Ming Chang, Yuan-Hao Chang

, Sheng-Yen Hong, Che-Wei Chang, Tei-Wei Kuo
:
A classification-based prefetching scheme for hibernation of embedded computing systems. 332-337 - Shuichi Oikawa:

Adapting byte addressable memory storage to user-level file system services. 338-343 - Yeongho Choi, Yujin Lim:

A cost-efficient mechanism for dynamic VM provisioning in cloud computing. 344-349 - Kuan-Chung Huang, Yu-Chen Wu, Che-Wei Chang, Tei-Wei Kuo

, Chi-Sheng Shih
, Qingxu Deng:
Real-time process synchronization for systems with accelerators. 350-355
Short papers (posters)
- Joonhyouk Jang, Yookun Cho, Jinman Jung, Sanghee Yoon:

Concurrency control scheme for key-value stores based on InfiniBand. 356-358 - Woochur Kim, Ikhyun Cho, Donghee Min, Chris Sung:

Design of data backup on distributed memory system based on key-value store using hot/cold data management. 359-361 - Woochur Kim, Jungmee Yun, Hyedong Jung:

Evaluation of high-frequency financial transaction processing in distributed memory systems. 362-364

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














