Coverart for item
The Resource Future information technology, application, and service : FutureTech 2012, Volume 1, James J. (Jong Hyuk) Park...[et al.], editors, (electronic book)

Future information technology, application, and service : FutureTech 2012, Volume 1, James J. (Jong Hyuk) Park...[et al.], editors, (electronic book)

Label
Future information technology, application, and service : FutureTech 2012, Volume 1
Title
Future information technology, application, and service
Title remainder
FutureTech 2012
Title number
Volume 1
Statement of responsibility
James J. (Jong Hyuk) Park...[et al.], editors
Title variation
FutureTech 2012
Creator
Contributor
Subject
Genre
Language
eng
Member of
Cataloging source
GW5XE
Dewey number
004
Illustrations
illustrations
Index
index present
LC call number
T58.5
LC item number
.I58 2012
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2012
http://bibfra.me/vocab/lite/meetingName
International Conference on Future Information Technology
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Park, James J
Series statement
Lecture notes in electrical engineering,
Series volume
v.164
http://library.link/vocab/subjectName
Information technology
Label
Future information technology, application, and service : FutureTech 2012, Volume 1, James J. (Jong Hyuk) Park...[et al.], editors, (electronic book)
Instantiates
Publication
Note
International conference proceedings
Antecedent source
unknown
Bibliography note
Includes bibliographical references and author index
Color
multicolored
Contents
  • Education Embedded System for Remote Control
  • Kwan Sun Choi, SaeRon Han, Seongyong Lee, Jongsik Lim and Dongsik Kim, et al.
  • Novel Two Factor User Authentication Scheme over WSNs
  • Hyunsung Kim and Xin-Yi Chen
  • BAN Logic-Based Security Proof for Mobile OTP Authentication Scheme
  • Mohammed Saeed Alkatheiri, Mohamed Hamdy Eldefrawy and Muhammad Khurram Khan
  • VLSI Design of a Hardware Efficient FFT Processor
  • Dongpei Liu, Hengzhu Liu, Jianfeng Zhang, Botao Zhang and Li Zhou
  • Arithmetic P System Without Priority Rules
  • Ping Guo and Haizhu Chen
  • Part 1.
  • Multipath-Based Reliable Routing Protocol with Fast-Recovery of Failures on MANETs
  • Myung-Kyun Kim and Hoai Phong Ngo
  • Novel Hybrid Silicon/CNT 4T SRAM Cell Design
  • Wei Wang, Haiqing Nan and Ken Choi
  • Storage-Efficient Data Prefetching for High Performance Computing
  • Yong Chen, Huaiyu Zhu, Hui Jin and Xian-He Sun
  • A New Data Sieving Approach for High Performance I/O
  • Yin Lu, Yong Chen, Prathamesh Amritkar, Rajeev Thakur and Yu Zhuang
  • FutureTech 2012 - main conference.
  • A New Proxy Electronic Voting Scheme Based on Proxy Signatures
  • Cheng-Chi Lee, Te-Yu Chen, Shu-Chen Lin and Min-Shiang Hwang
  • Cellular Automata for Topology Control in Wireless Sensor Networks Using Matlab
  • Stavros Athanassopoulos, Christos Kaklamanis, Gerasimos Kalfountzos and Evi Papaioannou
  • Energy Efficient Complete Coverage Path Planning for Vacuum Cleaning Robots
  • Eunil Park, Ki Joon Kim and Angel P. del Pobil
  • HOTP-Based Key Agreement Protocol Over Home Network
  • Hyunsung Kim and Hyun Jung Kim
  • Smartcard-Based User Authentication Protocol over Home Network
  • Hyunsung Kim and Hyunhee Jung
  • QoE Management in a Video Conferencing Application
  • Ahmad Vakili and Jean-Charles Grégoire
  • Extended OTP Mechanism Based on Graphical Password Method
  • Yunlim Ku, Okkyung Choi, Kangseok Kim, Taeshik Shon and Manpyo Hong, et al.
  • Multi-Dimensional Analysis of Political Language
  • Daniela Gîfu and Dan Cristea
  • Destination Guided Mobility Models for Mobile Ad Hoc Networks
  • Multiple Vehicle Speed Detection and Fusion Technology on the Road Network: A Case Study from Taiwan
  • Jui-Yen Chang, Tung-Wen Wang and Sheng-Hui Chen
  • WiMAX Application for E-Police Patrolling System
  • Wan-Yi Lin, Rui-Yen Chang, Yu-Cheng Chen and Chin-Lung Lee
  • Development of LED Irradiation System for Cell Proliferation of Medical Applications
  • Min-Woo Cheon, Tae-Gon Kim and Yang-Sun Lee
  • Alex Aravind and Viswanathan Manickam
  • Development of a Web-Based Educational Java Applet for Understanding Concepts and Principles of Digital Logic Circuits
  • Dongsik Kim, Jaeho Cha, Saeron Han, Seongyong Lee and Kwansun Choi, et al.
  • Detecting and Modeling the Structure of a Large-Scale Microblog
  • Zhengbiao Guo, Zhitang Li, Hao Tu and Da Xie
  • Research on the Query Subsystem for Large Information System Based on Decision-Making
  • Hui Liu, Xiang-Hui Zhao, Lin Liu, Lei Zhang and Yan-Zhao Liu
  • Graduation Project: Development of an Automation System for Filter Quality Test Using LabVIEW
  • Kwan Sun Choi, SaeRon Han, Seongyong Lee, Jongsik Lim and Dongsik Kim, et al.
  • Context-Awareness Middleware for Highly Reliable Application Services in Greenhouse
  • Myeong Bae Lee, Yong Woong Lee, Ingon G. Park, Chul Young Park and Jang Woo Park, et al.
  • A Distributed and Intelligent Power Control Scheme in LTE-Advanced Femtocell Networks
  • Byung-Bog Lee, Jaehak Yu and Se-Jin Kim
  • Cryptanalysis on An Efficient Anonymous Authentication Protocol for Mobile Pay-TV
  • Hyun Sung Kim
  • RFID Antenna: Performance Analysis for Multimedia Services
  • Ibrahim S. Alnomay and Jihad Y. Alhammad
  • The Study on the Mobile Diagnostic X-ray Device of Frequency Modulation Method by PI Controlled
  • Designing Medical Integra Interface with u-RPMS and HIS
  • Young-Hyuk Kim, Il-Kown Lim, Jae-Gwang Lee, Jae-Pil Lee and Jae-Kwang Lee
  • Minimizing Metadata Size for File Synchronization Using Variable-Length Chunking
  • Ho Min Jung, Jae Min Park, Chang Geun Song, Sun Jeong Kim and Se Hak Chun, et al
  • Young-Pyo Kim, Tae-Gon Kim, Yong-Pil Park, Min-Woo Cheon and Yang-Sun Lee
  • Trusted Routing in AODV Protocol Against Wormhole Attack
  • Swarnali Hazra and S. K. Setua
  • Algorithms Based on Finite Automata for Testing of Omega-Codes
  • Thang Dang Quyet, Han Nguyen Dinh and Huy Phan Trung
  • An Opinion Mining Technique For Chinese Blogs
  • Yi-Ching Zeng, Vitaly Klyuev and Shih-Hung Wu
  • NFC-LMS: Design and Implementation of Lost article Management System with NFC
  • Il Ho Park, June Gyoon Lee, Ji Soo Park, Sung Joo Kim and Jong Hyuk Park
  • Differential Fault Analysis on the Block Cipher HIGHT
  • Yuseop Lee, Jongsung Kim, Jong Hyuk Park and Seokhie Hong
  • Study on Development of Appraisal Business Performance Indicator
  • Yanghoon Kim, Jonggu Kang, Youngsub Na and Hangbae Chang
  • An Efficient Method of Extracting Strings from Unfixed-Form Data
  • Sangjun Jeon, Jungheum Park, Keun-gi Lee and Sangjin Lee
  • Forensic Analysis of Android Phone Using Ext4 File System Journal Log
  • Dohyun Kim, Jungheum Park, Keun-gi Lee and Sangjin Lee
  • Cryptanalysis of An Identity-Based Strong Designated Verifier Signature Scheme
  • Part 2.
  • Futuretech 2012 - ISCC 2012 workshop.
  • A Study on Performance Evaluation of 7-Step QRcode Authentication Framework
  • Dong-Sik Oh, Bong-Han Kim and Jae-Kwang Lee
  • ADL-Driven Simulator Generation for Energy Dissipation Tracing and Monitoring
  • Kwangman Ko
  • Mohamed Rasslan
  • User-Centric Identification Management for Cross Realm Cloud and Ubiquitous Computing
  • Reen-Cheng Wang
  • Z-CRS: A ZigBee Cluster Reformation Scheme for Connectivity Enhancement
  • Reen-Cheng Wang, Ruay-Shiung Chang and Pu-I Lee
  • A Lock Screen Scheme with Improved Security and Convenience Using 8-Way Points for Smartphones
  • Jae Yong Lee, Ji Soo Park, Ki Jung Yi and Jong Hyuk Park
  • Evaluation of University Online Classes Compared to Offline Classes: Perceived Satisfaction and Fidelity
  • Sang-Zo Nam
  • The Multi-object Tracking Based on Gradient and Depth Information in the Stereo Vision
  • Hye-Youn Lim, Young-Deuk Moon and Dae-Seong Kang
  • Prediction System of the Situation Using the Fast Object Detection and Profiling
  • Sang-June Park, Young-Deuk Moon and Dae-Seong Kang
  • PAPR Estimation of HC-OFDM in Dispersive Fading Environments
  • Sang-Soo Yeo and Heau-Jo Kang
  • Implementation of Extendable n-by-n FUA and Its Performance Analysis for Transform of H.264/AVC
  • Ki-Hong Park, Won-ki Ju and Yoon-Ho Kim
  • Public Key Infrastructure of Using the Fingerprint Information in Electronic Bidding System
  • A New Approach to Digital Assets Management System after Death of a User
  • Jin-Mook Kim, Hwa-Young Jeong and Sang-Soo Yeo
  • So-A Park, Yeon-Chil Oh, Young-Hyuk Kim, Il-Kown Lim and Jae-Kwang Lee
  • A Seamless Multimedia Service in Wireless Network
  • Seongyeol Lee, Iksoo Kim, Jeonghoon Park and Yoseop Woo
  • Efficient Soft-Output Demapping Method for MIMO-OFDM WLAN System
  • Chanho Yoon and Hoojin Lee
  • A Study on Creative Engineering Design for Convergence Education Using Rube Goldberg Device
  • Sang-Soo Yeo, An-Na Kang and Sang-Cho Chung
  • Management Server Architecture for REST Web Service Composition
  • Min Choi and Wonjae Lee
  • Part 4.
  • Futuretech 2012 - NAMP 2012 workshop.
  • Analysis of Irregular Penetration of Laser Weld
  • Jung-Ho Cho
  • Laser Beam Scattering Analysis Inside Porous Materials by FEM
  • Hae Woon Choi
  • Microstructure Predictability by Voronoi Diagram
  • Jung-Ho Cho
  • Part 3.
  • The Method to Measure Heart Motion Data of Animal for Medical Robotic Research
  • Myun Joong Hwang
  • Part 5.
  • Futuretech 2012 - SEE 2012 workshop.
  • Simulation Analysis on BER Patterns Based Maritime Ad-hoc Networks
  • Nam-Sik Yun, Yoon-Young Park, Kang-Hee Jung, Byung Tae Jang and Dong Sun Lim, et al.
  • A Study on Open Cloud Platform Based on Intelligent Application Development Studio
  • Jae-In Sin, Jaekyung Kang and Sun Myung Hwang
  • A Study on Maturity Level for Open Source Software
  • Eun-Ser Lee
  • Futuretech 2012 - MPCA 2012 workshop.
  • Linux Based Real-Time Feature Supporting Method and Evaluation for Information Devices
  • YungJoon Jung, Donghyouk Lim, ChaeDeok Lim and Eun-Ser Lee
  • An Agricultural Expert Cloud for a Smart Farm
  • Yongyun Cho, Kyoungryong Cho, Changsun Shin, Jangwoo Park and Eun-Ser Lee
  • An Efficient Trust Evaluation Approach in Attacker Dominated Networks in Internet of Things
  • Wenmao Liu, Lihua Yin, Binxing Fang and Xiangzhan Yu
  • RESTful Web Service Composition
  • Min Choi
  • Implementation of Map Reduce Model for Disk Forensic Computing Analysis
  • Seung-Ho Lim
  • A Novel Opinion Analysis Scheme Using Social Relationships on Microblog
  • Meng-Hsuan Fu, Ling-Yu Chen, Kuan-Rong Lee and Yaw-Huang Kuo
  • Computing Event Relatedness Based on a Novel Evaluation of Social-Media Streams
  • Chung-Hong Lee, Chih-Hong Wu, Hsin-Chang Yang and Wei-Shiang Wen
  • A Requirements-Driven Approach Towards Decentralized Social Networks
  • Simon Thiel, Mohamed Bourimi, Rafael Giménez, Simon Scerri and Andreas Schuller, et al.
  • Part 7.
  • Futuretech 2012 - DFIS 2012 workshop.
  • Silhouette: Volume Shadow Copy Analyzer
  • Jewan Bang and Sangjin Lee
  • An Intelligent Service Architecture Based on Community Computing
  • New Approach to Anonymity of User Information on Social Networking Services
  • Hoang-Quoc Nguyen-Son, Quoc-Binh Nguyen, Minh-Triet Tran, Dinh-Thuc Nguyen and Hiroshi Yoshiura, et al.
  • Cloud Digital Investigations Based on a Virtual Machine Computer History Model
  • Sean Thorpe, Indrajit Ray, Tyrone Grandison and Abbie Barbir
  • Differential Fault Analysis on Block Cipher LED-64
  • Kitae Jeong and Changhoon Lee
  • Stimuli for Gaze Based Intrusion Detection
  • Ralf Biedert, Mario Frank, Ivan Martinovic and Dawn Song
  • Yongyun Cho, Kyoungryong Cho, Changsun Shin, Jangwoo Park and Eun-Ser Lee
  • Get-Me-Out Puzzle as One Player Reachability Game
  • Gihwon Kwon
  • Part 6.
  • Futuretech 2012 - SocialComnet 2012 workshop.
  • A Microscopic Study on Group Dynamics of the Tencent-Microblogs
  • Zhongying Zhao, Yong Zhang, Joshua Zhexue Huang, Shengzhong Feng and Jianping Fan
Control code
SPR795715534
Dimensions
unknown
Extent
1 online resource
File format
unknown
Form of item
online
Isbn
9789400745162
Level of compression
unknown
Other physical details
ill.
Quality assurance targets
not applicable
Reformatting quality
unknown
Reproduction note
Electronic resource.
Sound
unknown sound
Specific material designation
remote
Label
Future information technology, application, and service : FutureTech 2012, Volume 1, James J. (Jong Hyuk) Park...[et al.], editors, (electronic book)
Publication
Note
International conference proceedings
Antecedent source
unknown
Bibliography note
Includes bibliographical references and author index
Color
multicolored
Contents
  • Education Embedded System for Remote Control
  • Kwan Sun Choi, SaeRon Han, Seongyong Lee, Jongsik Lim and Dongsik Kim, et al.
  • Novel Two Factor User Authentication Scheme over WSNs
  • Hyunsung Kim and Xin-Yi Chen
  • BAN Logic-Based Security Proof for Mobile OTP Authentication Scheme
  • Mohammed Saeed Alkatheiri, Mohamed Hamdy Eldefrawy and Muhammad Khurram Khan
  • VLSI Design of a Hardware Efficient FFT Processor
  • Dongpei Liu, Hengzhu Liu, Jianfeng Zhang, Botao Zhang and Li Zhou
  • Arithmetic P System Without Priority Rules
  • Ping Guo and Haizhu Chen
  • Part 1.
  • Multipath-Based Reliable Routing Protocol with Fast-Recovery of Failures on MANETs
  • Myung-Kyun Kim and Hoai Phong Ngo
  • Novel Hybrid Silicon/CNT 4T SRAM Cell Design
  • Wei Wang, Haiqing Nan and Ken Choi
  • Storage-Efficient Data Prefetching for High Performance Computing
  • Yong Chen, Huaiyu Zhu, Hui Jin and Xian-He Sun
  • A New Data Sieving Approach for High Performance I/O
  • Yin Lu, Yong Chen, Prathamesh Amritkar, Rajeev Thakur and Yu Zhuang
  • FutureTech 2012 - main conference.
  • A New Proxy Electronic Voting Scheme Based on Proxy Signatures
  • Cheng-Chi Lee, Te-Yu Chen, Shu-Chen Lin and Min-Shiang Hwang
  • Cellular Automata for Topology Control in Wireless Sensor Networks Using Matlab
  • Stavros Athanassopoulos, Christos Kaklamanis, Gerasimos Kalfountzos and Evi Papaioannou
  • Energy Efficient Complete Coverage Path Planning for Vacuum Cleaning Robots
  • Eunil Park, Ki Joon Kim and Angel P. del Pobil
  • HOTP-Based Key Agreement Protocol Over Home Network
  • Hyunsung Kim and Hyun Jung Kim
  • Smartcard-Based User Authentication Protocol over Home Network
  • Hyunsung Kim and Hyunhee Jung
  • QoE Management in a Video Conferencing Application
  • Ahmad Vakili and Jean-Charles Grégoire
  • Extended OTP Mechanism Based on Graphical Password Method
  • Yunlim Ku, Okkyung Choi, Kangseok Kim, Taeshik Shon and Manpyo Hong, et al.
  • Multi-Dimensional Analysis of Political Language
  • Daniela Gîfu and Dan Cristea
  • Destination Guided Mobility Models for Mobile Ad Hoc Networks
  • Multiple Vehicle Speed Detection and Fusion Technology on the Road Network: A Case Study from Taiwan
  • Jui-Yen Chang, Tung-Wen Wang and Sheng-Hui Chen
  • WiMAX Application for E-Police Patrolling System
  • Wan-Yi Lin, Rui-Yen Chang, Yu-Cheng Chen and Chin-Lung Lee
  • Development of LED Irradiation System for Cell Proliferation of Medical Applications
  • Min-Woo Cheon, Tae-Gon Kim and Yang-Sun Lee
  • Alex Aravind and Viswanathan Manickam
  • Development of a Web-Based Educational Java Applet for Understanding Concepts and Principles of Digital Logic Circuits
  • Dongsik Kim, Jaeho Cha, Saeron Han, Seongyong Lee and Kwansun Choi, et al.
  • Detecting and Modeling the Structure of a Large-Scale Microblog
  • Zhengbiao Guo, Zhitang Li, Hao Tu and Da Xie
  • Research on the Query Subsystem for Large Information System Based on Decision-Making
  • Hui Liu, Xiang-Hui Zhao, Lin Liu, Lei Zhang and Yan-Zhao Liu
  • Graduation Project: Development of an Automation System for Filter Quality Test Using LabVIEW
  • Kwan Sun Choi, SaeRon Han, Seongyong Lee, Jongsik Lim and Dongsik Kim, et al.
  • Context-Awareness Middleware for Highly Reliable Application Services in Greenhouse
  • Myeong Bae Lee, Yong Woong Lee, Ingon G. Park, Chul Young Park and Jang Woo Park, et al.
  • A Distributed and Intelligent Power Control Scheme in LTE-Advanced Femtocell Networks
  • Byung-Bog Lee, Jaehak Yu and Se-Jin Kim
  • Cryptanalysis on An Efficient Anonymous Authentication Protocol for Mobile Pay-TV
  • Hyun Sung Kim
  • RFID Antenna: Performance Analysis for Multimedia Services
  • Ibrahim S. Alnomay and Jihad Y. Alhammad
  • The Study on the Mobile Diagnostic X-ray Device of Frequency Modulation Method by PI Controlled
  • Designing Medical Integra Interface with u-RPMS and HIS
  • Young-Hyuk Kim, Il-Kown Lim, Jae-Gwang Lee, Jae-Pil Lee and Jae-Kwang Lee
  • Minimizing Metadata Size for File Synchronization Using Variable-Length Chunking
  • Ho Min Jung, Jae Min Park, Chang Geun Song, Sun Jeong Kim and Se Hak Chun, et al
  • Young-Pyo Kim, Tae-Gon Kim, Yong-Pil Park, Min-Woo Cheon and Yang-Sun Lee
  • Trusted Routing in AODV Protocol Against Wormhole Attack
  • Swarnali Hazra and S. K. Setua
  • Algorithms Based on Finite Automata for Testing of Omega-Codes
  • Thang Dang Quyet, Han Nguyen Dinh and Huy Phan Trung
  • An Opinion Mining Technique For Chinese Blogs
  • Yi-Ching Zeng, Vitaly Klyuev and Shih-Hung Wu
  • NFC-LMS: Design and Implementation of Lost article Management System with NFC
  • Il Ho Park, June Gyoon Lee, Ji Soo Park, Sung Joo Kim and Jong Hyuk Park
  • Differential Fault Analysis on the Block Cipher HIGHT
  • Yuseop Lee, Jongsung Kim, Jong Hyuk Park and Seokhie Hong
  • Study on Development of Appraisal Business Performance Indicator
  • Yanghoon Kim, Jonggu Kang, Youngsub Na and Hangbae Chang
  • An Efficient Method of Extracting Strings from Unfixed-Form Data
  • Sangjun Jeon, Jungheum Park, Keun-gi Lee and Sangjin Lee
  • Forensic Analysis of Android Phone Using Ext4 File System Journal Log
  • Dohyun Kim, Jungheum Park, Keun-gi Lee and Sangjin Lee
  • Cryptanalysis of An Identity-Based Strong Designated Verifier Signature Scheme
  • Part 2.
  • Futuretech 2012 - ISCC 2012 workshop.
  • A Study on Performance Evaluation of 7-Step QRcode Authentication Framework
  • Dong-Sik Oh, Bong-Han Kim and Jae-Kwang Lee
  • ADL-Driven Simulator Generation for Energy Dissipation Tracing and Monitoring
  • Kwangman Ko
  • Mohamed Rasslan
  • User-Centric Identification Management for Cross Realm Cloud and Ubiquitous Computing
  • Reen-Cheng Wang
  • Z-CRS: A ZigBee Cluster Reformation Scheme for Connectivity Enhancement
  • Reen-Cheng Wang, Ruay-Shiung Chang and Pu-I Lee
  • A Lock Screen Scheme with Improved Security and Convenience Using 8-Way Points for Smartphones
  • Jae Yong Lee, Ji Soo Park, Ki Jung Yi and Jong Hyuk Park
  • Evaluation of University Online Classes Compared to Offline Classes: Perceived Satisfaction and Fidelity
  • Sang-Zo Nam
  • The Multi-object Tracking Based on Gradient and Depth Information in the Stereo Vision
  • Hye-Youn Lim, Young-Deuk Moon and Dae-Seong Kang
  • Prediction System of the Situation Using the Fast Object Detection and Profiling
  • Sang-June Park, Young-Deuk Moon and Dae-Seong Kang
  • PAPR Estimation of HC-OFDM in Dispersive Fading Environments
  • Sang-Soo Yeo and Heau-Jo Kang
  • Implementation of Extendable n-by-n FUA and Its Performance Analysis for Transform of H.264/AVC
  • Ki-Hong Park, Won-ki Ju and Yoon-Ho Kim
  • Public Key Infrastructure of Using the Fingerprint Information in Electronic Bidding System
  • A New Approach to Digital Assets Management System after Death of a User
  • Jin-Mook Kim, Hwa-Young Jeong and Sang-Soo Yeo
  • So-A Park, Yeon-Chil Oh, Young-Hyuk Kim, Il-Kown Lim and Jae-Kwang Lee
  • A Seamless Multimedia Service in Wireless Network
  • Seongyeol Lee, Iksoo Kim, Jeonghoon Park and Yoseop Woo
  • Efficient Soft-Output Demapping Method for MIMO-OFDM WLAN System
  • Chanho Yoon and Hoojin Lee
  • A Study on Creative Engineering Design for Convergence Education Using Rube Goldberg Device
  • Sang-Soo Yeo, An-Na Kang and Sang-Cho Chung
  • Management Server Architecture for REST Web Service Composition
  • Min Choi and Wonjae Lee
  • Part 4.
  • Futuretech 2012 - NAMP 2012 workshop.
  • Analysis of Irregular Penetration of Laser Weld
  • Jung-Ho Cho
  • Laser Beam Scattering Analysis Inside Porous Materials by FEM
  • Hae Woon Choi
  • Microstructure Predictability by Voronoi Diagram
  • Jung-Ho Cho
  • Part 3.
  • The Method to Measure Heart Motion Data of Animal for Medical Robotic Research
  • Myun Joong Hwang
  • Part 5.
  • Futuretech 2012 - SEE 2012 workshop.
  • Simulation Analysis on BER Patterns Based Maritime Ad-hoc Networks
  • Nam-Sik Yun, Yoon-Young Park, Kang-Hee Jung, Byung Tae Jang and Dong Sun Lim, et al.
  • A Study on Open Cloud Platform Based on Intelligent Application Development Studio
  • Jae-In Sin, Jaekyung Kang and Sun Myung Hwang
  • A Study on Maturity Level for Open Source Software
  • Eun-Ser Lee
  • Futuretech 2012 - MPCA 2012 workshop.
  • Linux Based Real-Time Feature Supporting Method and Evaluation for Information Devices
  • YungJoon Jung, Donghyouk Lim, ChaeDeok Lim and Eun-Ser Lee
  • An Agricultural Expert Cloud for a Smart Farm
  • Yongyun Cho, Kyoungryong Cho, Changsun Shin, Jangwoo Park and Eun-Ser Lee
  • An Efficient Trust Evaluation Approach in Attacker Dominated Networks in Internet of Things
  • Wenmao Liu, Lihua Yin, Binxing Fang and Xiangzhan Yu
  • RESTful Web Service Composition
  • Min Choi
  • Implementation of Map Reduce Model for Disk Forensic Computing Analysis
  • Seung-Ho Lim
  • A Novel Opinion Analysis Scheme Using Social Relationships on Microblog
  • Meng-Hsuan Fu, Ling-Yu Chen, Kuan-Rong Lee and Yaw-Huang Kuo
  • Computing Event Relatedness Based on a Novel Evaluation of Social-Media Streams
  • Chung-Hong Lee, Chih-Hong Wu, Hsin-Chang Yang and Wei-Shiang Wen
  • A Requirements-Driven Approach Towards Decentralized Social Networks
  • Simon Thiel, Mohamed Bourimi, Rafael Giménez, Simon Scerri and Andreas Schuller, et al.
  • Part 7.
  • Futuretech 2012 - DFIS 2012 workshop.
  • Silhouette: Volume Shadow Copy Analyzer
  • Jewan Bang and Sangjin Lee
  • An Intelligent Service Architecture Based on Community Computing
  • New Approach to Anonymity of User Information on Social Networking Services
  • Hoang-Quoc Nguyen-Son, Quoc-Binh Nguyen, Minh-Triet Tran, Dinh-Thuc Nguyen and Hiroshi Yoshiura, et al.
  • Cloud Digital Investigations Based on a Virtual Machine Computer History Model
  • Sean Thorpe, Indrajit Ray, Tyrone Grandison and Abbie Barbir
  • Differential Fault Analysis on Block Cipher LED-64
  • Kitae Jeong and Changhoon Lee
  • Stimuli for Gaze Based Intrusion Detection
  • Ralf Biedert, Mario Frank, Ivan Martinovic and Dawn Song
  • Yongyun Cho, Kyoungryong Cho, Changsun Shin, Jangwoo Park and Eun-Ser Lee
  • Get-Me-Out Puzzle as One Player Reachability Game
  • Gihwon Kwon
  • Part 6.
  • Futuretech 2012 - SocialComnet 2012 workshop.
  • A Microscopic Study on Group Dynamics of the Tencent-Microblogs
  • Zhongying Zhao, Yong Zhang, Joshua Zhexue Huang, Shengzhong Feng and Jianping Fan
Control code
SPR795715534
Dimensions
unknown
Extent
1 online resource
File format
unknown
Form of item
online
Isbn
9789400745162
Level of compression
unknown
Other physical details
ill.
Quality assurance targets
not applicable
Reformatting quality
unknown
Reproduction note
Electronic resource.
Sound
unknown sound
Specific material designation
remote

Library Locations

Processing Feedback ...