Report for: Proceedings of the International Conference on IT Convergence and Security 2011 (original) (raw)
Overview of attention for book
Table of Contents
- Book Overview
- Chapter 1A Secure Service Framework for Handling Security Critical Data on the Public Cloud
- Chapter 2The Understanding of Building Trust Model on Smartphone Application: Focusing on Users’ Motivation
- Chapter 3Towards Understanding Deterrence: Information Security Managers’ Perspective
- Chapter 4Design of Attribute-Based Access Control in Cloud Computing Environment
- Chapter 5Realizing Security Requirements with Physical Properties: A Case Study on Paper Voting
- Chapter 6Controlling Decryption of Personal Health Records in the Cloud
- Chapter 7Access Control Mechanism for XML Document
- Chapter 8A Collaborative Intrusion Detection System Framework for Cloud Computing
- Chapter 9Criteria for Comparing Cyberwarfare Capability
- Chapter 10A RSSI-Based Approach for Localization of Wireless Sensor Network in Indoor
- Chapter 11Semantic Search and Retrieval System for Learning Objects
- Chapter 12Wear Leveling for PCM Using Hot Data Identification
- Chapter 13Monitoring and Feedback Tools for Realtime Workloads for Xen Virtual Machine
- Chapter 14HARD: Host-Level Address Remapping Driver for Solid-State Disk
- Chapter 15Ubiquitous Based Personalized Hypertension Monitoring System
- Chapter 16Customized IPTV Content Recommendation Service Model Based on Personal Preference
- Chapter 17A Study on the Touch Process of Android Smartphone on Froyo and Gingerbread
- Chapter 18Case Study of QoS-Assured Convergence Service Overlay in Open Service Platform Environment
- Chapter 19Aspect Oriented Software Development Using Requirement Engineering
- Chapter 20A Review of Accelerometer-Based Physical Activity Measurement
- Chapter 21A Group Data Synchronization Protocol in Mobile Environments
- Chapter 22Efficient Transmission Method for Mobile Data Synchronization Based on Data Characteristics
- Chapter 23A Dynamic Buffer Management of Hybrid Solid State Disk for Media Applications
- Chapter 24An Efficient Live Stream Community Management Scheme for the Mobile
- Chapter 25Development of Real-Time Gesture Recognition System Using Visual Interaction
- Chapter 26Architecture of Image Encryption Hardware Using Two Dimensional Cellular Automata
- Chapter 27Simulation of 3D Information Visualization
- Chapter 28Group Based Vehicular Machine to Machine Communication Scheme in Cellular Networks
- Chapter 29Development of Real-Time Location-Based Multimedia Style Slop Information Retrieval System
- Chapter 30Augmented Reality-Based Role-Playing Contents for Education
- Chapter 31Vertex Propagation for Fast Ray-Casting of Digital Elevation Model
- Chapter 32A Study of a Network Capacity Planning by Analyzing Joint Probability of a Virtual Organization
- Chapter 33Image Registration for Sub-Pixel Using Pyramid Edge Images
- Chapter 34Real-Time Camera Tracking Using Planar Object Detection
- Chapter 35Bidirectional Propagation Method for Analysis of Reflection on Radio Networks
- Chapter 36Robust Estimation of Heights of Moving People Using a Single Camera
- Chapter 37Goal-Heuristic Analysis Method for an Adaptive Process Mining
- Chapter 38Security Threat Modeling and Requirement Analysis Method Based on Goal-Scenario
- Chapter 39An Effective Learning Method in Art Using Virtual Reality and Ontology
- Chapter 40Development of Pain Prescription Decision Systems for Nursing Intervention
- Chapter 41Performance Sensibility Influence of Recommended Makeup Styles
- Chapter 42Affective Social Network
- Chapter 43A Study on the Metadata Extraction and Repository Based on Web Service Meta Broker
- Chapter 44Discovering Knowledge Flow in Social Network
- Chapter 45Model Optimization with Graph Transformation and PSO Algorithm for Model Transformation Verification
- Chapter 46Pattern Based Model Transformation Using Mapping Patterns for Model Transformation Verification
- Chapter 47Improved Performance of Emotion Extraction Through Banned Words
- Chapter 48Potential Emotion Word in Movie Dialog
- Chapter 49Story Modeling for Green Light Decision Making
- Chapter 50Reducing the Gap of Provided Services and Requires Services Based on Service Approach
- Chapter 51An Extended XML Compression Technique for XML Element Retrieval
- Chapter 52Fuel Cell System Control Algorithm for Stable Operation of Residential Fuel Cell System
- Chapter 53Types of Fuel Cells and Applications for Electricity and Heat Co-Generation
- Chapter 54Integrated Energy Management System Framework for the Distributed Smart Meters in Smart Grid Environment
- Chapter 55Malware Detection Techniques Using Artificial Immune System
- Chapter 56A Survey on P2P Botnet Detection
- Chapter 57A Study on Instruction Substitution Analysis of Metamorphic Malware
- Chapter 58An Analysis of Malware Attached in Spam
- Chapter 59Detection Methods for Malware Variant Using API Call Related Graphs
- Chapter 60Malware Classification Methods Using API Sequence Characteristics
- Chapter 61Practical Firewall Policy Inspection Using Anomaly Detection and Its Visualization
Attention for Chapter 7:Access Control Mechanism for XML Document