Default Cover Image

2010 International Conference on Information Science and Applications

April 21 2010 to April 23 2010

Seoul

Table of Contents

[Copyright notice]Freely available from IEEE.pp. 2-2
Greetings General ChairFreely available from IEEE.pp. 3-3
Greetings General Co-ChairFreely available from IEEE.pp. 4-4
Organizing CommitteeFreely available from IEEE.pp. 3-7
Paper listFreely available from IEEE.pp. 8-13
3D CAPTCHA: A Next Generation of the CAPTCHAFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A CRT-Based BCH Encoding and FPGA ImplementationFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Design of Embedding Rewiring into Routing for FPGA ImprovementFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Financial Tool for Software Risk MeasurementFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Fingerprint-Based User Authentication Scheme Using Smart Cards in IPTV EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Forensic Model on Deleted-File Verification for Securing Digital EvidenceFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Goal-Oriented Approach for Modeling and Analyzing Attack GraphFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Hybrid Method to Predict Angina Pectoris through Mining Emergency DataFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Modified Delay Strategy for Dynamic Load Balancing in Cluster and Grid EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A New Discrete PSO for Data ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A New Metric Model for Trustworthiness of SoftwaresFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Novel Image Retrieval Scheme Using DCT Filter-Bank of Weighted Color ComponentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Profile Approach to Using UML Models for Rich Form GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Reproducible Performance Evaluation Method for Forged Fingerprint Detection AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
A Study on Improving Web Cache Server Performance Using Delayed CachingFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A Study on Risk Analysis and Assessment of Damages to Cyber AttackFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Study on the Enhanced Security Techniques of BGP for DRDoS AttackFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Time Series Data Prediction Scheme Using Bilinear Recurrent Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Adaptive Digital Watermarking of Images Using Genetic AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Agent Attacks Using a TTL Transformation of Windows RegistryFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
An Efficient Video Mosaic Panorama AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
An Online Self-Optimizing QoS Control Framework in MiddlewareFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Application Coordination Model for Mobile Ubiquitous EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Beyond Option Based Investment Decision: A Project Management Approach to System ValuationFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
BitApriori: An Apriori-Based Frequent Itemsets Mining Using Bit StreamsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Classification of Audio Data Using a Centroid Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Cleansing Noisy City Names in Spatial Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Clustering Music Recordings Based on GenresFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Conceptualizing and Generalizing Access ControlFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Cryptanalysis of Four-Rounded DES Using Ant Colony OptimizationFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
CUDA-Based Linear Solvers for Stable FluidsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Data Encryption Using ECG Signals with Chaotic Henon MapFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Design and Implementation of Scenario-Based Collaborative Framework: XCREAMFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Detecting Method on Illegal Use Using PCA under HER EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Detection of Image Fragments Related by Affine Transforms: Matching Triangles and EllipsesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Development of a Wearable ECG Recorder for Measuring Daily StressFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
DLS: Dynamic Level Session Key Revocation Protocol for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Dynamic Thread Management for Scalable RFID MiddlewareFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Efficient Web Service Composition and Intelligent Search Based on Relational DatabaseFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Enabling Lego Robots to Communicate RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Enhanced Selective Forwarding Scheme for Alert Message Propagation in VANETsFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Evaluation Framework for Ontology Modularization ApproachesFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Extended Authorization Mechanism in OSGiFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Extended k-dominant Skyline in High Dimensional SpaceFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Food Recommendation System Using Clustering Analysis for Diabetic PatientsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Gabor Feature Selection and Improved Radial Basis Function Networks for Facial Expression RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Grid Resource Discovery over Distributed RoutersFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Hiding Frequent Patterns in the Updated DatabaseFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Identifying Rootkit Infections Using Data MiningFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Improved Opposition-Based PSO for Feedforward Neural Network TrainingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Improved Related-Key Boomerang Cryptanalysis of AES-256Full-text access may be available. Sign in or learn about subscription options.pp. 1-7
Interactive Visual Data Mining of a Large Fire Detector DatabaseFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Intuitive Fuzzy C-Means Algorithm for MRI SegmentationFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
K-Neigh Backbone Tree Based Topology Control for Tactical Mobile Ad-Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Line-Based Recognition Using 3D Lines and Occlusion QueryFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Linguistic Aspects of Ubiquitous Computing: On "Ubiquitous" in Japanese and Korean Information TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Load Distribution Algorithm Based on Transcoding Time Estimation for Distributed Transcoding ServersFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Location Privacy against Traffic Analysis Attacks in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Low-Complexity Heterogeneous Video Transcoding by Motion Vector ClusteringFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Masking Based Segmentation of Diseased MRI ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Mean-Variance Models for International Portfolio Selection with Uncertain Exchange Rates and Security ReturnsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Mobile Agent Based Framework for Mobile Ubiquitous Application DevelopmentFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Modeling UML Sequence Diagrams Using Extended Petri NetsFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
New Classes of UBIAS and E-UBIAS Cognitive Vision SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Nutrition Counseling System and Food Menu PlanningFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
On the Evaluation of a Structural Information Metric for Syllabus SuitabilityFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
On the Validation of System Dynamics Type Simulation ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Parallelized Local Volatility Estimation Using GP-GPU Hardware AccelerationFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Performance of Machine Learning Techniques in Protein Fold Recognition ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Performance Study of Parallel Programming on Cloud Computing Environments Using MapReduceFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Privacy-Aware Role Based Access Control Model: Revisited for Multi-Policy Conflict DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Prototype Design of Drug Usage Information Retrieval SystemFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Real-Time Simulated Traffic Generation and Verification Methods Based on the Traffic Pattern AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Reliable Cooperative MAC Protocol in Ad Hoc Networks under Bad Wireless Channel EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Robust Hybrid Foreground Detection and Adaptive Background ModelFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Semantic Remote Attestation for Security PolicyFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
SERA: A Secure Energy and Reliability Aware Data Gathering for Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Software Maintenance Prediction Using Weighted Scenarios: An Architecture PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Study on Prevention of the Leaking of Industrial Secret Based on LDAPFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
The Deployment Algorithm Based on Cutting a Triangle for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Showing 100 out of 109