Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICISA
ICISA 2010
Generate Citations
2010 International Conference on Information Science and Applications
April 21 2010 to April 23 2010
Seoul
Table of Contents
[Copyright notice]
Freely available from IEEE.
pp. 2-2
Greetings General Chair
Freely available from IEEE.
pp. 3-3
Greetings General Co-Chair
Freely available from IEEE.
pp. 4-4
Organizing Committee
Freely available from IEEE.
pp. 3-7
Paper list
Freely available from IEEE.
pp. 8-13
3D CAPTCHA: A Next Generation of the CAPTCHA
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Montree Imsamai
,
Suphakant Phimoltares
A CRT-Based BCH Encoding and FPGA Implementation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Fengbo Liang
,
Liyang Pan
A Design of Embedding Rewiring into Routing for FPGA Improvement
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yuetling Wong
,
Qiang Zhou
,
Jinian Bian
A Financial Tool for Software Risk Measurement
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Masood Uzzafer
A Fingerprint-Based User Authentication Scheme Using Smart Cards in IPTV Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Eun-A Jun
,
Hyun Sook Rhee
,
Seok Won Jung
,
Dong Hoon Lee
A Forensic Model on Deleted-File Verification for Securing Digital Evidence
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yong-Ho Kim
,
Kunam J. Kim
A Goal-Oriented Approach for Modeling and Analyzing Attack Graph
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Xuejiao Liu
,
Chengfang Fang
,
Debao Xiao
,
Hui Xu
A Hybrid Method to Predict Angina Pectoris through Mining Emergency Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Sung Ho Ha
,
Zhen Yu Zhang
,
Eun Kyoung Kwon
A Modified Delay Strategy for Dynamic Load Balancing in Cluster and Grid Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hemant Kumar Mehta
,
Manohar Chandwani
,
Priyesh Kanungo
A New Discrete PSO for Data Classification
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Naveed Kazim Khan
,
A. Rauf Baig
,
Muhammad Amjad Iqbal
A New Group Key Management Protocol Using Code for Key Calculation: CKC
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Melisa Hajyvahabzadeh
,
Elina Eidkhani
,
Seyedeh Anahita Mortazavi
,
Alireza Nemaney Pour
A New Metric Model for Trustworthiness of Softwares
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hongwei Tao
,
Yixiang Chen
A Novel Image Retrieval Scheme Using DCT Filter-Bank of Weighted Color Components
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yong-Ho Kim
,
Seok-Han Lee
,
Sangkeun Lee
,
Tae-Eun Kim
,
Jong-Soo Choi
A Profile Approach to Using UML Models for Rich Form Generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Tomas Cerny
,
Eunjee Song
A Reproducible Performance Evaluation Method for Forged Fingerprint Detection Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yong-Nyuo Shin
,
Myung Geun Chun
,
Woochang Shin
A Study on Improving Web Cache Server Performance Using Delayed Caching
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Daesung Lee
,
Kuinam J. Kim
A Study on Risk Analysis and Assessment of Damages to Cyber Attack
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Won Hyung Park
A Study on the Enhanced Security Techniques of BGP for DRDoS Attack
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Jaehoon Sun
,
Yong-Bin Sun
A Time Series Data Prediction Scheme Using Bilinear Recurrent Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Dong-Chul Park
Adaptive Digital Watermarking of Images Using Genetic Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Bushra Sikander
,
Muhammad Ishtiaq
,
M. Arfan Jaffar
,
Muhammad Tariq
,
Anwar M. Mirza
Agent Attacks Using a TTL Transformation of Windows Registry
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Won Hyung Park
,
Kwang Cheol Park
,
Keon il Heo
,
Kwang Ho Kook
An Efficient Video Mosaic Panorama Algorithm
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Xin-bo Zhao
,
Xiao-chun Zou
,
Zhong Ma
,
Yan Feng
An Online Self-Optimizing QoS Control Framework in Middleware
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Dahai Li
,
David Levy
Analyzing the Web Crawler as a Feed Forward Engine for an Efficient Solution to the Search Problem in the Minimum Amount of Time through a Distributed Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
M. Atif Qureshi
,
Arjumand Younus
,
Francisco Rojas
Application Coordination Model for Mobile Ubiquitous Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Seungkeun Lee
,
Daesung Lee
Architecture Based Ripple Effect Analysis: a Software Quality Maintenance Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Sajid Anwar
,
Fouzia Idris
,
Muhammad Ramzan
,
Arshad Ali Shahid
,
Abdul Rauf
Beyond Option Based Investment Decision: A Project Management Approach to System Valuation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jin-Young Han
,
Anat Hovav
BitApriori: An Apriori-Based Frequent Itemsets Mining Using Bit Streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Thi Thanh Nhan Le
,
Thi Thanh Thuy Nguyen
,
Tae Chong Chung
Classification of Audio Data Using a Centroid Neural Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Dong-Chul Park
Cleansing Noisy City Names in Spatial Data Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
SeungJin Lim
Clustering Music Recordings Based on Genres
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Wei-Ho Tsai
,
Duo-Fu Bao
Conceptualizing and Generalizing Access Control
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Sabah S. Al-Fedaghi
Cryptanalysis of Four-Rounded DES Using Ant Colony Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Salabat Khan
,
Waseem Shahzad
,
Farrukh Aslam Khan
CUDA-Based Linear Solvers for Stable Fluids
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
G. Amador
,
A. Gomes
Data Encryption Using ECG Signals with Chaotic Henon Map
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Ching-Kun Chen
,
Chun-Liang Lin
,
Yen-Ming Chiu
Design and Implementation of Scenario-Based Collaborative Framework: XCREAM
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Kyungeun Park
,
Jekuk Yun
,
Yanggon Kim
,
Juno Chang
Detecting Method on Illegal Use Using PCA under HER Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Donghwi Lee
,
Byong Hun Kim
,
Kuinam J Kim
Detection of Image Fragments Related by Affine Transforms: Matching Triangles and Ellipses
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Mariusz Paradowski
,
Andrzej Sluzek
Determination of Water Content in Automobile Lubricant Using Near-Infrared Spectroscopy Improved by Machine Learning Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yun Zhao
,
Xing Xu
,
Lu-lu Jiang
,
Yu Zhang
,
Li-hong Tan
,
Yong He
Development of a Wearable ECG Recorder for Measuring Daily Stress
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Yosiho Okada
,
Yi-Tsuyoshi Yoto
,
Taka-aki Suzuki
,
Toshifumi Sugiura
,
Satoshi Sakuragawa
Distributed Communication System Design Based on Can Bus for Parallel-Serial Hybrid Electrical Vehicles
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yi-He Zuo
,
Chang-Le Xiang
,
Qing-Dong Yan
,
Wei-Da Wang
,
Hui Liu
,
Hong-Cai Li
DLS: Dynamic Level Session Key Revocation Protocol for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Chul-Hyun Park
,
Yi-Ying Zhang
,
In-Tai Kim
,
Myong-Soon Park
Dynamic Thread Management for Scalable RFID Middleware
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Sungwoo Ahn
,
Wooseok Ryu
,
Bonghee Hong
,
Heungseok Chae
,
Junho Lee
Efficient Web Service Composition and Intelligent Search Based on Relational Database
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Cheng Zeng
,
weijie Ou
,
Yi Zheng
,
Dong Han
Enabling Lego Robots to Communicate Routing
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Daesung Lee
,
Kuinam J. Kim
Enhanced Selective Forwarding Scheme for Alert Message Propagation in VANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Do-hyeon Lee
,
Song-nan Bai
,
Tae-won Kim
,
Jae-il Jung
Evaluation Framework for Ontology Modularization Approaches
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Sunju Oh
,
Heon Y. Yeom
Extended Authorization Mechanism in OSGi
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Intae Kim
,
Daesung Lee
,
Junghyun Lee
,
Keewook Rim
Extended k-dominant Skyline in High Dimensional Space
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Md. Anisuzzaman Siddique
,
Yasuhiko Morimoto
Factors Influencing the Implementation of Information Systems Security Strategies in Organizations
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Sangseo Park
,
Atif Ahmad
,
Anthonie B. Ruighaver
Food Recommendation System Using Clustering Analysis for Diabetic Patients
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Maiyaporn Phanich
,
Phathrajarin Pholkul
,
Suphakant Phimoltares
Gabor Feature Selection and Improved Radial Basis Function Networks for Facial Expression Recognition
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Chien-Cheng Lee
,
Cheng-Yuan Shih
Graphic Visualization of the Co-Occurrence Analysis Network of Lung Cancer In-Patient Nursing Record
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Muneo Kushima
,
Kenji Araki
,
Muneou Suzuki
,
Sanae Araki
,
Terue Nikama
Grid Resource Discovery over Distributed Routers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Taskin Kocak
,
Daniel Lacks
Hiding Frequent Patterns in the Updated Database
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Bi-Ru Dai
,
Li-Hsiang Chiang
Identifying Rootkit Infections Using Data Mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Desmond Lobo
,
Paul Watters
,
Xin-Wen Wu
Image Encryption Design Based on Multi-Dimensional Matrix Map and Partitioning Substitution and Diffusion-Integration Substitution Network Structure
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Liang Zhao
,
Di Xiao
,
Kouichi Sakurai
Improved Opposition-Based PSO for Feedforward Neural Network Training
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Muhammad Rashid
,
Abdul Rauf Baig
Improved Related-Key Boomerang Cryptanalysis of AES-256
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Hadi Soleimany
,
Alireza Sharifi
,
Mohammadreza Aref
Intensifying the Performance of Nonlinearity Approximation by an Optimal Fuzzy System
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Do-Thanh Sang
,
Ho-Hai Nguyen
,
Dong-Min Woo
,
Seung-Soo Han
,
Dong-Chul Park
Interactive Visual Data Mining of a Large Fire Detector Database
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
SeungJin Lim
Intuitive Fuzzy C-Means Algorithm for MRI Segmentation
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Dong-Chul Park
K-Neigh Backbone Tree Based Topology Control for Tactical Mobile Ad-Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Sung-Won Lee
,
Arun Ranjitkar
,
Young-Bae Ko
Line-Based Recognition Using 3D Lines and Occlusion Query
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Jae-Kyu Lee
,
Seongjin Ahn
,
Jin Wook Chung
Linguistic Aspects of Ubiquitous Computing: On "Ubiquitous" in Japanese and Korean Information Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Håkan Söderström
Load Distribution Algorithm Based on Transcoding Time Estimation for Distributed Transcoding Servers
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Dongmahn Seo
,
Jongwoo Kim
,
Inbum Jung
Location Privacy against Traffic Analysis Attacks in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Xi Luo
,
Xu Ji
,
Myong-Soon Park
Low-Complexity Heterogeneous Video Transcoding by Motion Vector Clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Yoonjeong Shin
,
Namrye Son
,
Nguyen Dinh Toan
,
Gueesang Lee
Masking Based Segmentation of Diseased MRI Images
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Arunava De
,
Rajib Lochan Das
,
Anup Kumar Bhattacharjee
,
Deepak Sharma
Mean-Variance Models for International Portfolio Selection with Uncertain Exchange Rates and Security Returns
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Xiaoxia Huang
Mobile Agent Based Framework for Mobile Ubiquitous Application Development
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Seungkeun Lee
Modeling UML Sequence Diagrams Using Extended Petri Nets
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Nianhua Yang
,
Huiqun Yu
,
Hua Sun
,
Zhilin Qian
Multi-Interface Multi-Channel Hybrid Channel Assignment with IEEE 802.11 in Using a Reactive Routing Protocol in MANET
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Mun Gug Choi
,
Jung Soo Park
,
Hyoung Jim Kim
Multiobjective Evolutionary Optimization of Training and Topology of Recurrent Neural Networks for Time-Series Prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Hideki Katagiri
,
Ichiro Nishizaki
,
Tomohiro Hayashida
,
Takanori Kadoma
New Classes of UBIAS and E-UBIAS Cognitive Vision Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Marek R. Ogiela
,
Ryszard Tadeusiewicz
,
Lidia Ogiela
Nutrition Counseling System and Food Menu Planning
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Yanisa Usthasopha
,
Suphakant Phimoltares
,
Nagul Cooharojananone
Oblique Multi-Planar Reformation Using Viewport Translation Technique on Visualization Toolkit Library
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
K. Koonsanit
,
S. S. Thongvigitmanee
,
W. Narkbuakaew
,
P. Yampri
,
W. Sinthupinyo
On the Evaluation of a Structural Information Metric for Syllabus Suitability
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Anestis A. Toptsis
,
Jose Semidey
On the Validation of System Dynamics Type Simulation Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Hassan Qudrat-Ullah
Opposition Based Genetic Algorithm with Cauchy Mutation for Function Optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
M. Amjad Iqbal
,
Naveed Kazim Khan
,
M. Arfan Jaffar
,
M. Ramzan
,
A. Rauf Baig
Parallelized Local Volatility Estimation Using GP-GPU Hardware Acceleration
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Craig C. Douglas
,
Hyoseop Lee
,
Dongwoo Sheen
Performance of Machine Learning Techniques in Protein Fold Recognition Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Muhammad Asif Khan
,
Muhammad A. Khan
,
Zahoor Jan
,
Hamid Ali
,
Anwar M. Mirza
Performance Study of Parallel Programming on Cloud Computing Environments Using MapReduce
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Wen-Chung Shih
,
Shian-Shyong Tseng
,
Chao-Tung Yang
Privacy-Aware Role Based Access Control Model: Revisited for Multi-Policy Conflict Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Yoonjeong Kim
,
Eunjee Song
Project Scheduling Conflict Identification and Resolution Using Genetic Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
M. Ramzan
,
M. Amjad Iqbal
,
M. Arfan Jaffar
,
Abdul Rauf
,
Sajid Anwar
,
Arshad Ali Shahid
Prototype Design of Drug Usage Information Retrieval System
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
ByungRae Cha
,
HaGang Kim
,
JongWon Kim
Real-Time Simulated Traffic Generation and Verification Methods Based on the Traffic Pattern Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Hyuncheol Kim
,
Wonhyuk Lee
,
Jeom Goo Kim
Reliable Cooperative MAC Protocol in Ad Hoc Networks under Bad Wireless Channel Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-5
by
Jaeshin Jang
,
Sang Wu Kim
Robust Hybrid Foreground Detection and Adaptive Background Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Wessam R. Elhefnawy
,
Gamal Selim
,
Samy Ghoniemy
Scalable, Privacy-Preserving Remote Attestation in and through Federated Identity Management Frameworks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Tamleek Ali
,
Mohammad Nauman
,
Muhammad Amin
,
Masoom Alam
Semantic Remote Attestation for Security Policy
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-8
by
Qian Zhang
,
Yeping He
,
Ce Meng
SERA: A Secure Energy and Reliability Aware Data Gathering for Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Sang Guun Yoo
,
Seung-hoon Kang
,
Juho Kim
Software Maintenance Prediction Using Weighted Scenarios: An Architecture Perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-9
by
Sajid Anwar
,
Muhammad Ramzan
,
Abdul Rauf
,
Arshad Ali Shahid
Study on Prevention of the Leaking of Industrial Secret Based on LDAP
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-7
by
Do Hyeong Kim
The Deployment Algorithm Based on Cutting a Triangle for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-6
by
Liang Cheng Shiu
,
Chao Yang Lee
,
Chu Sing Yang
Showing 100 out of 109
Load More
Load All