Kim, Kuinam J.
Proceedings of the International Conference on IT Convergence and Security 2011
1. A Secure Service Framework for Handling Security Critical Data on the Public Cloud
Gi-Hwan Cho, Seung-Ah Lee
2. The Understanding of Building Trust Model on Smartphone Application: Focusing on Users’ Motivation
Hun Choi, Yoo-Jung Choi, Ki-Mun Kim
3. Towards Understanding Deterrence: Information Security Managers’ Perspective
Sangseo Park, Anthonie B. Ruighaver, Sean B. Maynard, Atif Ahmad
4. Design of Attribute-Based Access Control in Cloud Computing Environment
ByungRae Cha, JaeHyun Seo, JongWon Kim
5. Realizing Security Requirements with Physical Properties: A Case Study on Paper Voting
André Cleeff, Trajce Dimkov, Wolter Pieters, Roel Wieringa
6. Controlling Decryption of Personal Health Records in the Cloud
Yi-Chang Hsu, Jing-Jang Hwang
7. Access Control Mechanism for XML Document
Sun-Moon Jo, Kyung-Yong Chung
8. A Collaborative Intrusion Detection System Framework for Cloud Computing
Nguyen Doan Man, Eui-Nam Huh
9. Criteria for Comparing Cyberwarfare Capability
Hyung-Jun Seo, Yoon-Cheol Choy
10. A RSSI-Based Approach for Localization of Wireless Sensor Network in Indoor
Hyochang Ahn, Yong-Hwan Lee, Han-Jin Cho, Sang-Burm Rhee, June-Hwan Lee
11. Semantic Search and Retrieval System for Learning Objects
M. Arshad Awan, A. Sattar, Cheong Ghil Kim, Chung Pyo Hong, Shin Dug Kim
12. Wear Leveling for PCM Using Hot Data Identification
Inhwan Choi, Dongkun Shin
13. Monitoring and Feedback Tools for Realtime Workloads for Xen Virtual Machine
Byung Ki Kim, Jae Hyeok Jang, Kyung Woo Hur, Jeong Gun Lee, Young Woong Ko
14. HARD: Host-Level Address Remapping Driver for Solid-State Disk
Young-Joon Jang, Dongkun Shin
15. Ubiquitous Based Personalized Hypertension Monitoring System
Jonghun Kim, Sihoon Ahn, Jaeyoung Soh, Daesung Lee, Kyung-Yong Chung
16. Customized IPTV Content Recommendation Service Model Based on Personal Preference
Si-Jung Kim, Do-Eun Cho, Bong-Han Kim
17. A Study on the Touch Process of Android Smartphone on Froyo and Gingerbread
Yeong-Gyu Lim, Cheong Ghil Kim, Shin Dug Kim
18. Case Study of QoS-Assured Convergence Service Overlay in Open Service Platform Environment
Nam-Kyung Lee, Hyun-Woo Lee, Won Ryu
19. Aspect Oriented Software Development Using Requirement Engineering
Seung-Hyung Lee, Young-Jae Song
20. A Review of Accelerometer-Based Physical Activity Measurement
Yao Meng, Hee-Cheol Kim
21. A Group Data Synchronization Protocol in Mobile Environments
Ju-Geon Pak, Kee-Hyun Park
22. Efficient Transmission Method for Mobile Data Synchronization Based on Data Characteristics
Kee-Hyun Park, Ju-Geon Pak
23. A Dynamic Buffer Management of Hybrid Solid State Disk for Media Applications
In-Pyo Cho, So-Hyang Ko, Hoon-Mo Yang, Cheong-Ghil Kim, Shin-Dug Kim
24. An Efficient Live Stream Community Management Scheme for the Mobile
Chung-Pyo Hong, Muhammad Arshad Awan, Cheong-Ghil Kim, Shin-Dug Kim
25. Development of Real-Time Gesture Recognition System Using Visual Interaction
Sung-Kwan Kang, Kyung-Yong Chung, Kee-Wook Rim, Jung-Hyun Lee
26. Architecture of Image Encryption Hardware Using Two Dimensional Cellular Automata
Abdul Raouf Khan
27. Simulation of 3D Information Visualization
Gui-Jung Kim, Jung-Soo Han
28. Group Based Vehicular Machine to Machine Communication Scheme in Cellular Networks
Kyu Chul Kim, Chan Jung Park, Ronny Yongho Kim
29. Development of Real-Time Location-Based Multimedia Style Slop Information Retrieval System
Sung-Ho Kim
30. Augmented Reality-Based Role-Playing Contents for Education
Sukhyun Lim, Hyung-Keun Jee, Jinyoung Youn, Junsuk Lee
31. Vertex Propagation for Fast Ray-Casting of Digital Elevation Model
Eun-Seok Lee, Jin-Hee Lee, Inwoo Jo, Byeong-Seok Shin
32. A Study of a Network Capacity Planning by Analyzing Joint Probability of a Virtual Organization
Kyuho Lee, Seongjin Ahn
33. Image Registration for Sub-Pixel Using Pyramid Edge Images
Jae-Young Lee, Kee-Baek Kim, Seok-Han Lee, Tae-Eun Kim, Jong-Soo Choi
34. Real-Time Camera Tracking Using Planar Object Detection
Ahr-Hyun Lee, Seok-Han Lee, Jae-Young Lee, Tae-Eun Kim, Jong-Soo Choi
35. Bidirectional Propagation Method for Analysis of Reflection on Radio Networks
Reza Malekian, Abdul Hanan Abdullah
36. Robust Estimation of Heights of Moving People Using a Single Camera
Sang-Wook Park, Tae-Eun Kim, Jong-Soo Choi
37. Goal-Heuristic Analysis Method for an Adaptive Process Mining
Su-Jin Baek, Jong-Won Ko, Gui-Jung Kim, Jung-Soo Han, Young-Jae Song
38. Security Threat Modeling and Requirement Analysis Method Based on Goal-Scenario
Su-Jin Baek, Jung-Soo Han, Young-Jae Song
39. An Effective Learning Method in Art Using Virtual Reality and Ontology
Sang-Jin Cha, Gahee Kim, Chol-Hee Jang, Geun-Sik Jo
40. Development of Pain Prescription Decision Systems for Nursing Intervention
Yoo Hyun, Ho-Il Jung, Kyung-Yong Chung
41. Performance Sensibility Influence of Recommended Makeup Styles
Kyung-Yong Chung, Kee-Wook Rim, Jung-Hyun Lee
42. Affective Social Network
Hyun-Jun Kim
43. A Study on the Metadata Extraction and Repository Based on Web Service Meta Broker
Sung-Ho Sim, Young-Jae Song
44. Discovering Knowledge Flow in Social Network
Hyun-Jun Kim
45. Model Optimization with Graph Transformation and PSO Algorithm for Model Transformation Verification
Jong-Won Ko, Su-Jin Beak, Young-Jae Song
46. Pattern Based Model Transformation Using Mapping Patterns for Model Transformation Verification
Jong-Won Ko, Jung-Soo Han, Young-Jae Song
47. Improved Performance of Emotion Extraction Through Banned Words
Eunsoon You, Seung-Bo Park
48. Potential Emotion Word in Movie Dialog
Seung-Bo Park, Eunsoon You, Jason J. Jung
49. Story Modeling for Green Light Decision Making
Seung-Bo Park, Eunsoon You
50. Reducing the Gap of Provided Services and Requires Services Based on Service Approach
Hamid Mcheick, Mohamad Dbouk, Fady Dagher
51. An Extended XML Compression Technique for XML Element Retrieval
Tanakorn Wichaiwong, Chuleerat Jaruskulchai
52. Fuel Cell System Control Algorithm for Stable Operation of Residential Fuel Cell System
Sunhoe Kim
53. Types of Fuel Cells and Applications for Electricity and Heat Co-Generation
Sunhoe Kim
54. Integrated Energy Management System Framework for the Distributed Smart Meters in Smart Grid Environment
Yoon-Sik Yoo, Wan-Ki Park, Il-Woo Lee
55. Malware Detection Techniques Using Artificial Immune System
Mohamed Ahmed Mohamed Ali, Mohd Aizaini Maarof
56. A Survey on P2P Botnet Detection
Kyoung-Soo Han, Eul Gyu Im
57. A Study on Instruction Substitution Analysis of Metamorphic Malware
Kyoung-Soo Han, Kyoung-Yong Chung, Eul Gyu Im
58. An Analysis of Malware Attached in Spam
Eul Gyu Im, Kyoung-Soo Han
59. Detection Methods for Malware Variant Using API Call Related Graphs
Kyoung-Soo Han, In-Kyoung Kim, Eul Gyu Im
60. Malware Classification Methods Using API Sequence Characteristics
Kyoung-Soo Han, In-Kyoung Kim, Eul Gyu Im
61. Practical Firewall Policy Inspection Using Anomaly Detection and Its Visualization
Ui-Hyong Kim, Jung-Min Kang, Jae-Sung Lee, Hyong-Shik Kim
Keywords: Engineering, Communications Engineering, Networks, Systems and Data Security, Software Engineering, Data Mining and Knowledge Discovery, Artificial Intelligence (incl. Robotics)
- Author(s)
- Kim, Kuinam J.
- Ahn, Seong Jin
- Publisher
- Springer
- Publication year
- 2012
- Language
- en
- Edition
- 1
- Imprint
- Springer Netherlands - Dordrecht
- Series
- Lecture Notes in Electrical Engineering
- Page amount
- 13 pages
- Category
- Technology, Energy, Traffic
- Format
- Ebook
- eISBN (PDF)
- 9789400729117