dblp: ICITCS 2011 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


ICITCS 2011: Suwon, Korea

jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as

Kuinam J. Kim, Seong-Jin Ahn:
Proceedings of the International Conference on IT Convergence and Security, ICITCS 2011, Suwon, Korea, December 14-16, 2011. Lecture Notes in Electrical Engineering 120, Springer 2012, ISBN 978-94-007-2910-0
Security Fundamentals

Gi-Hwan Cho, Seung-Ah Lee:
A Secure Service Framework for Handling Security Critical Data on the Public Cloud. 3-12

Hun Choi, Yoo-Jung Choi, Ki-Mun Kim:
The Understanding of Building Trust Model on Smartphone Application: Focusing on Users' Motivation. 13-20

Sangseo Park, Anthonie B. Ruighaver, Sean B. Maynard
, Atif Ahmad:
Towards Understanding Deterrence: Information Security Managers' Perspective. 21-37
Industrial & Business Information Security

ByungRae Cha, JaeHyun Seo, JongWon Kim:
Design of Attribute-Based Access Control in Cloud Computing Environment. 41-50

André van Cleeff, Trajce Dimkov, Wolter Pieters, Roel J. Wieringa:
Realizing Security Requirements with Physical Properties: A Case Study on Paper Voting. 51-67

Yi-Chang Hsu, Jing-Jang Hwang:
Controlling Decryption of Personal Health Records in the Cloud. 69-79

Sun-Moon Jo, Kyung-Yong Chung:
Access Control Mechanism for XML Document. 81-90

Man Doan Nguyen, Eui-Nam Huh:
A Collaborative Intrusion Detection System Framework for Cloud Computing. 91-109

Hyung-Jun Seo, Yoon-Cheol Choy:
Criteria for Comparing Cyberwarfare Capability. 111-120
Security Protocols and Applications

Hyochang Ahn, Yong-Hwan Lee, Han-Jin Cho, Sang-Burm Rhee, June-Hwan Lee:
A RSSI-Based Approach for Localization of Wireless Sensor Network in Indoor. 123-127

Muhammad Arshad Awan
, Abdul Sattar
, Cheong Ghil Kim, Chung-Pyo Hong, Shin-Dug Kim:
Semantic Search and Retrieval System for Learning Objects. 129-143

Inhwan Choi, Dongkun Shin:
Wear Leveling for PCM Using Hot Data Identification. 145-149

Byung Ki Kim, Jae Hyeok Jang, Kyung Woo Hur, Jeong-Gun Lee, Young Woong Ko:
Monitoring and Feedback Tools for Realtime Workloads for Xen Virtual Machine. 151-161

Young-Joon Jang, Dongkun Shin:
HARD: Host-Level Address Remapping Driver for Solid-State Disk. 163-168

Jong-Hun Kim, Sihoon Ahn, Jaeyoung Soh, Daesung Lee, Kyung-Yong Chung:
Ubiquitous Based Personalized Hypertension Monitoring System. 169-177

Si-Jung Kim, Do-Eun Cho, Bong-Han Kim:
Customized IPTV Content Recommendation Service Model Based on Personal Preference. 179-189

Yeong-Gyu Lim, Cheong Ghil Kim, Shin-Dug Kim:
A Study on the Touch Process of Android Smartphone on Froyo and Gingerbread. 191-204

Nam-Kyung Lee, Hyun-Woo Lee, Won Ryu:
Case Study of QoS-Assured Convergence Service Overlay in Open Service Platform Environment. 205-216

Seung-Hyung Lee, Young-Jae Song:
Aspect Oriented Software Development Using Requirement Engineering. 217-221

Yao Meng, Hee-Cheol Kim:
A Review of Accelerometer-Based Physical Activity Measurement. 223-237

Ju-Geon Pak, Kee-Hyun Park:
A Group Data Synchronization Protocol in Mobile Environments. 239-251

Kee-Hyun Park, Ju-Geon Pak:
Efficient Transmission Method for Mobile Data Synchronization Based on Data Characteristics. 253-263
Convergence Security

In-Pyo Cho, So-Hyang Ko, Hoon-Mo Yang, Cheong-Ghil Kim, Shin-Dug Kim:
A Dynamic Buffer Management of Hybrid Solid State Disk for Media Applications. 267-279

Chung-Pyo Hong, Muhammad Arshad Awan
, Cheong-Ghil Kim, Shin-Dug Kim:
An Efficient Live Stream Community Management Scheme for the Mobile. 281-293

Sung-Kwan Kang, Kyung-Yong Chung, Kee-Wook Rim, Jung-Hyun Lee:
Development of Real-Time Gesture Recognition System Using Visual Interaction. 295-306

Abdul Raouf Khan
:
Architecture of Image Encryption Hardware Using Two Dimensional Cellular Automata. 307-315

Gui-Jung Kim, Jung-Soo Han:
Simulation of 3D Information Visualization. 317-323

Kyu Chul Kim, Chan Jung Park, Ronny Yongho Kim:
Group Based Vehicular Machine to Machine Communication Scheme in Cellular Networks. 325-329

Sung-Ho Kim:
Development of Real-Time Location-Based Multimedia Style Slop Information Retrieval System. 331-335

Sukhyun Lim, Hyung-Keun Jee, Jinyoung Youn, Junsuk Lee:
Augmented Reality-Based Role-Playing Contents for Education. 337-344

Eun-Seok Lee, Jin-Hee Lee, Inwoo Jo, Byeong-Seok Shin:
Vertex Propagation for Fast Ray-Casting of Digital Elevation Model. 345-356

Kyuho Lee, Seongjin Ahn:
A Study of a Network Capacity Planning by Analyzing Joint Probability of a Virtual Organization. 357-365

Jae-Young Lee, Kee-Baek Kim, Seok-Han Lee, Tae-eun Kim, Jong-Soo Choi:
Image Registration for Sub-Pixel Using Pyramid Edge Images. 367-371

Ahr-Hyun Lee, Seok-Han Lee, Jae-Young Lee, Tae-eun Kim, Jong-Soo Choi:
Real-Time Camera Tracking Using Planar Object Detection. 373-378

Reza Malekian
, Abdul Hanan Abdullah:
Bidirectional Propagation Method for Analysis of Reflection on Radio Networks. 379-388

Sang-Wook Park, Tae-eun Kim, Jong-Soo Choi:
Robust Estimation of Heights of Moving People Using a Single Camera. 389-405
IT Convergence Applications

Su-Jin Baek, Jong-Won Ko, Gui-Jung Kim, Jung-Soo Han, Young-Jae Song:
Goal-Heuristic Analysis Method for an Adaptive Process Mining. 409-418

Su-Jin Baek, Jung-Soo Han, Young-Jae Song:
Security Threat Modeling and Requirement Analysis Method Based on Goal-Scenario. 419-423

Sang-Jin Cha, Gahee Kim, Chol-Hee Jang, GeunSik Jo:
An Effective Learning Method in Art Using Virtual Reality and Ontology. 425-434

Hyun Yoo, Hoill Jung, Kyung-Yong Chung:
Development of Pain Prescription Decision Systems for Nursing Intervention. 435-444

Kyung-Yong Chung, Kee-Wook Rim, Jung-Hyun Lee:
Performance Sensibility Influence of Recommended Makeup Styles. 445-454

Hyun-Jun Kim:
Affective Social Network. 455-461

Sung-Ho Sim, Young-Jae Song:
A Study on the Metadata Extraction and Repository Based on Web Service Meta Broker. 463-467

Hyun-Jun Kim:
Discovering Knowledge Flow in Social Network. 469-477

Jong-Won Ko, Su-Jin Baek, Young-Jae Song:
Model Optimization with Graph Transformation and PSO Algorithm for Model Transformation Verification. 479-487

Jong-Won Ko, Jung-Soo Han, Young-Jae Song:
Pattern Based Model Transformation Using Mapping Patterns for Model Transformation Verification. 489-493

Eunsoon You
, Seung-Bo Park:
Improved Performance of Emotion Extraction Through Banned Words. 495-505

Seung-Bo Park, Eunsoon You
, Jason J. Jung
:
Potential Emotion Word in Movie Dialog. 507-516

Seung-Bo Park, Eunsoon You
:
Story Modeling for Green Light Decision Making. 517-521

Hamid Mcheick
, Mohamad Dbouk, Fady Dagher:
Reducing the Gap of Provided Services and Requires Services Based on Service Approach. 523-537

Tanakorn Wichaiwong, Chuleerat Jaruskulchai:
An Extended XML Compression Technique for XML Element Retrieval. 539-554
Mobile Computing and Future Networks

Sunhoe Kim:
Fuel Cell System Control Algorithm for Stable Operation of Residential Fuel Cell System. 557-560

Sunhoe Kim:
Types of Fuel Cells and Applications for Electricity and Heat Co-Generation. 561-565

Yoon-Sik Yoo
, Wan-Ki Park, Il-Woo Lee:
Integrated Energy Management System Framework for the Distributed Smart Meters in Smart Grid Environment. 567-572
Multimedia and Information Visualization

Mohamed Ahmed Mohamed Ali, Mohd Aizaini Maarof:
Malware Detection Techniques Using Artificial Immune System. 575-587

Kyoung-Soo Han, Eul Gyu Im
:
A Survey on P2P Botnet Detection. 589-593

Kyoung-Soo Han, Kyoung-Yong Chung, Eul Gyu Im
:
A Study on Instruction Substitution Analysis of Metamorphic Malware. 595-599

Eul Gyu Im
, Kyoung-Soo Han:
An Analysis of Malware Attached in Spam. 601-605

Kyoung-Soo Han, In-Kyoung Kim, Eul Gyu Im
:
Detection Methods for Malware Variant Using API Call Related Graphs. 607-611

Kyoung-Soo Han, In-Kyoung Kim, Eul Gyu Im
:
Malware Classification Methods Using API Sequence Characteristics. 613-626
Web Technology and Software Engineering

Ui-Hyong Kim, Jung-Min Kang, Jae-Sung Lee, Hyong-Shik Kim:
Practical Firewall Policy Inspection Using Anomaly Detection and Its Visualization. 629-639

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






