Conferences in DBLP
Sang Yong Park , Hee Yong Youn Message Transport Interface for Efficient Communication Between Agent Framework and Event Service. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:1-10 [Conf ] Eunhoe Kim , Jaeyoung Choi An Ontology-Based Context Model in a Smart Home. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:11-20 [Conf ] Seungkeun Lee , Intae Kim , Kiwook Rim , Jeonghyun Lee Service Mobility Manager for OSGi Framework. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:21-29 [Conf ] Joohyun Han , Yongyun Cho , Eunhoe Kim , Jaeyoung Choi A Ubiquitous Workflow Service Framework. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:30-39 [Conf ] Kwangcheol Shin , Ajith Abraham , Sang-Yong Han Self Organizing Sensor Networks Using Intelligent Clustering. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:40-49 [Conf ] Olivia Graciela Fragoso Diaz , René Santaolaya Salgado , Ismael Solís Moreno , Guillermo Rodríguez-Ortiz Searching and Selecting Web Services Using Case Based Reasoning. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:50-57 [Conf ] Sang Hoon Chi , Tae Ho Cho Fuzzy Logic Based Propagation Limiting Method for Message Routing in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:58-67 [Conf ] Backhyun Kim , Iksoo Kim Content Delivery with Spatial Caching Scheme in Mobile Wireless Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:68-77 [Conf ] Carla Teixeira Lopes , Gabriel David Higher Education Web Information System Usage Analysis with a Data Webhouse. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:78-87 [Conf ] Fuyu Liu , Erdogan Dogdu A User Management System for Federated Databases Using Web Services. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:88-97 [Conf ] Anders Magnus Andersen , Torab Torabi A Dynamic Evaluation Framework for Mobile Applications. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:98-107 [Conf ] Juan Ignacio Vázquez , Diego López de Ipiña , Iñigo Sedano SOAM: An Environment Adaptation Model for the Pervasive Semantic Web. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:108-117 [Conf ] Marios C. Angelides , Anastasis A. Sofokleous , Christos Schizas Implementing the MPEG-21 Adaptation Quality of Service in Dynamic Environments. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:118-127 [Conf ] Kugsang Jeong , Deokjai Choi , Soo-Hyung Kim , Gueesang Lee A Middleware Architecture Determining Application Context Using Shared Ontology. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:128-137 [Conf ] Evi Syukur , Seng Wai Loke Context-Aware Regulation of Context-Aware Mobile Services in Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:138-147 [Conf ] Cecilia Challiol , Gustavo Rossi , Silvia E. Gordillo , Valeria De Cristófolo Designing and Implementing Physical Hypermedia Applications. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:148-157 [Conf ] Fernando Rosa Velardo , David de Frutos-Escrig , Olga Marroquín Alonso Replicated Ubiquitous Nets. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:158-168 [Conf ] Joaquín Pérez , Maricela Bravo , Rodolfo A. Pazos , Gerardo Reyes Salgado , Juan Frausto Solís , Víctor Jesús Sosa Sosa , Máximo López Design of a Shared Ontology Used for Translating Negotiation Primitives. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:169-178 [Conf ] Jun Lai , Ben Soh , Chai Fei A Web Page Ranking Method by Analyzing Hyperlink Structure and K-Elements. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:179-186 [Conf ] Eung Ju Lee , Hee Yong Youn Efficient Scheduling by Incorporating Bin Packing with Limited and Weighted Round Robin for Bluetooth. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:187-196 [Conf ] Dongwoo Lee , SeongHoon Lee , Yongjin Lee ECA Rule Component for Timely Collaboration of Web-Based Distributed Business Systems. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:197-206 [Conf ] D. Xuan Le , J. Wenny Rahayu , Eric Pardede Dynamic Approach for Integrating Web Data Warehouses. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:207-216 [Conf ] Saqib Ali , Torab Torabi , Hassan Ali Location Aware Business Process Deployment. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:217-225 [Conf ] Youngbong Kim , Mikyeong Moon , Keunhyuk Yeom A Framework for Rapid Development of RFID Applications. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:226-235 [Conf ] Jong Hyuk Park , Sangjin Lee , Byoung-Soo Koh A Flexible DRM System Considering Ubiquitous Environment. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:236-244 [Conf ] Jong Hyuk Park , Jungsuk Song , Sangjin Lee , Byoung-Soo Koh , In-Hwa Hong User Centric Intelligent IPMPS in Ubi-Home. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:245-254 [Conf ] Hangbae Chang , Kyung-kyu Kim , Hosin Lee , Jungduk Kim The Design and Development of a Secure Keystroke System for u Business. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:255-261 [Conf ] Jianhong Zhang , Tao Wei , Jianyu Zhang , Wei Zou Linkability of a Blind Signature Scheme and Its Improved Scheme. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:262-270 [Conf ] Minseong Ju , Seoksoo Kim , Yeong-Deok Kim , Sukhoon Kang A Noble Structural Model for e-Learning Services in Ubiquitous Environment. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:271-278 [Conf ] Wonjoon Choi , Byeong-hee Roh Backward Channel Protection Method for RFID Security Schemes Based on Tree-Walking Algorithms. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:279-287 [Conf ] Bo-Hee Lee , Kyu-Tae Seo , Jung-Shik Kong , Jin-Geol Kim Design of the Configurable Clothes Using Mobile Actuator-Sensor Network. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:288-295 [Conf ] Jia Zhai , Chang Mok Park , Gi-Nam Wang Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification Procedure. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:296-305 [Conf ] Oh-Heum Kwon , Ha-Joo Song Counting-Based Distance Estimations and Localizations in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:306-315 [Conf ] Jeong Su Park , Su-Mi Lee , Eun Young Choi , Dong Hoon Lee Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID System. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:316-325 [Conf ] Deok-Gyu Lee , Seo-Il Kang , Dae-Hee Seo , Im-Yeong Lee Authentication for Single/Multi Domain in Ubiquitous Computing Using Attribute Certification. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:326-335 [Conf ] Ilsun You Improving the CGA-OMIPv6 Protocol for Low-Power Mobile Nodes. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:336-343 [Conf ] Gwanghoon Kim , Soyeon Hwang , Deokgyu Lee Tracking Illegal System Access in a Ubiquitous Environment - Proposal for ATS, a Traceback System Using STOP. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:344-351 [Conf ] Bo Zhou , Qi Shi , Madjid Merabti Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:352-359 [Conf ] Jin-Bum Hwang , Jong-Wook Han A Security Model for Home Networks with Authority Delegation. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:360-369 [Conf ] Deok-Gyu Lee , Jang-Su Park , Im-Yeong Lee , Yong-Seok Park , Jung-Chul Ahn An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast Encryption. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:370-379 [Conf ] JiHyung Lim , DaeHun Nyang , Jeonil Kang , Kyunghee Lee , Hyotaek Lim Distributed Certificate Authority Under the GRID-Location Aided Routing Protocol. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:380-387 [Conf ] Sangjin Kim , Taewook Ahn , Heekuck Oh An Efficient Hierarchical Group Key Management Protocol for a Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:388-395 [Conf ] Wen-Shenq Juang Efficient User Authentication and Key Agreement in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:396-405 [Conf ] Yuen-Yan Chan , Sebastian Fleissner , Joseph K. Liu , Jin Li Single Sign-On and Key Establishment for Ubiquitous Smart Environments. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:406-415 [Conf ] Ilsun You , Eun-Sun Jung A Light Weight Authentication Protocol for Digital Home Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:416-423 [Conf ] Chee-Seng Leong , Bok-Min Goi Smart Home Microcontroller: Telephone Interfacing. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:424-431 [Conf ] Soo-Jin Park , Young-Shin Park , Yong-Rak Choi , Sukhoon Kang SPAD: A Session Pattern Anomaly Detector for Pre-alerting Intrusions in Home Network. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:432-439 [Conf ] Hayoung Oh , Jiyoung Lim , Kijoon Chae , Jungchan Nah Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:440-447 [Conf ] Chul-Yong Uhm , Su-Nam Kim , Kyeong-Hoon Jung , Dong Wook Kang , Ki-Doo Kim The Performance Analysis of UWB System for the HD Multimedia Communication in a Home Network. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:448-455 [Conf ] Juryon Paik , Hee Yong Youn , Ung-Mo Kim Extraction of Implicit Context Information in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:456-465 [Conf ] Jae Yeol Lee , Gue Won Rhee , Hyun Kim , Kang-Woo Lee , Young-Ho Suh , Kwangsoo Kim Convergence of Context-Awareness and Augmented Reality for Ubiquitous Services and Immersive Interactions. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:466-474 [Conf ] Eung-Nam Ko An Adaptive Fault Tolerance System for Ubiquitous Computing Environments: AFTS. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:475-482 [Conf ] Kyu Lee , Hyung-Jun Kim , Ho-Jin Shin , Dong Ryeol Shin Design and Implementation of Middleware for Context-Aware Service Discovery in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:483-490 [Conf ] SeongHoon Lee , Dongwoo Lee , Donghee Shim , Dongyoung Cho , Wankwon Lee A Dynamic Channel Allocation Mechanism in Cellular Mobile Networks for Ubiquitous Environments Based on Time Constraints. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:491-498 [Conf ] Sangho Yi , Hong Min , Junyoung Heo , Boncheol Gu , Yookun Cho , Jiman Hong , Jinwon Kim , Kwangyong Lee , Seungmin Park Performance Analysis of Task Schedulers in Operating Systems for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:499-508 [Conf ] Kee-Young Shin , Jin Won Kim , Ilgon Park , Pyeong Soo Mah Wireless Sensor Networks: A Scalable Time Synchronization. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:509-518 [Conf ] Hyung Su Lee , Kyung Tae Kim , Hee Yong Youn A New Cluster Head Selection Scheme for Long Lifetime of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:519-528 [Conf ] Pengliu Tan , Hai Jin , Minghu Zhang Two-Dimensional Priority Scheduling Scheme for Open Real-Time Systems. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:529-538 [Conf ] Feng Xia , Youxian Sun An Enhanced Dynamic Voltage Scaling Scheme for Energy-Efficient Embedded Real-Time Control Systems. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:539-548 [Conf ] Geunyoung Park , Boncheol Gu , Junyoung Heo , Sangho Yi , Jungkyu Han , Jaemin Park , Hong Min , Xuefeng Piao , Yookun Cho , Chang-Won Park , Ha Joong Chung , Bongkyu Lee , Sangjun Lee Adaptive Load Balancing Mechanism for Server Cluster. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:549-557 [Conf ] Junghoon Lee , Mikyung Kang , Eui-young Kang , Gyung-Leen Park , Hanil Kim , Cheolmin Kim , Seongbaeg Kim , Jiman Hong Design and Performance Analysis of a Message Scheduling Scheme for WLAN-Based Cluster Computing. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:558-566 [Conf ] SungSuk Kim , Chang Choi , Junho Choi , PanKoo Kim , Hanil Kim A Method for Efficient Malicious Code Detection Based on Conceptual Similarity. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:567-576 [Conf ] MoonJoon Kim , JeongMin Lee , WonGi Hong , Hoon Chang A Minimized Test Pattern Generation Method for Ground Bounce Effect and Delay Fault Detection. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:577-583 [Conf ] Mun-Kyu Lee , Howon Kim , Dowon Hong , Kyoil Chung Efficient Exponentiation in GF (p m ) Using the Frobenius Map. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:584-593 [Conf ] DoHyung Han , JeongWoo Jwa , Hanil Kim A Dual-Channel MAC Protocol Using Directional Antennas in Location Aware Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:594-602 [Conf ] Hyukjun Oh , Heejune Ahn , Jiman Hong A Power-Efficient Design Employing an Extreme Condition Detector for Embedded Systems. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:603-611 [Conf ] Ki-Young Kim , Seung-Yong Kim , Seok-Yoon Kim An Efficient Delay Metric on RC Interconnects Under Saturated Ramp Inputs. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:612-621 [Conf ] Seong-Won Lee , Neungsoo Park , Jean-Luc Gaudiot Low Power Microprocessor Design for Embedded Systems. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:622-630 [Conf ] Jong Wook Kwak , Seong Tae Jhang , Chu Shik Jhon History Length Adjustable gshare Predictor for High-Performance Embedded Processor. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:631-638 [Conf ] Sangkyun Kim , Hong Joo Lee Security Engineering Methodology Based on Problem Solving Theory. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:639-648 [Conf ] Guiyi Wei , Jun Yu , Yun Ling , Jun Liu Design and Implementation of an Ontology Algorithm for Web Documents Classification. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:649-658 [Conf ] Kyung Cheol Choi , Gun Ho Lee Automatic Test Approach of Web Application for Security (AutoInspect). [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:659-668 [Conf ] Min Chan Kim , Sung Jo Kim A Scenario-Based User-Oriented Integrated Architecture for Supporting Interoperability Among Heterogeneous Home Network Middlewares. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:669-678 [Conf ] Jeong-Mi Lim , Chang-Seop Park Session Key Agreement Protocol for End-to-End Security in MANET. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:679-686 [Conf ] Yongsik Kim , Taesoo Lim , Dongsoo Kim , Cheol Jung , Honggee Jin Process-Oriented DFM System for Ubiquitous Devices. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:687-696 [Conf ] Yong Gu Ji , Chiwoo Park , Minsoo Kim A Study on the Application of BPM Systems for Implementation of RosettaNet Based e-Logistics. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:697-706 [Conf ] Hangbae Chang , Jungduk Kim , Sungjun Lim Information Security Management System for SMB in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:707-715 [Conf ] Hong Joo Lee , Choon Seong Leem , Sangkyun Kim A Study on the Development of Usability Evaluation Framework (Focusing on Digital TV). [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:716-725 [Conf ] Rogelio N. Limón Cordero , Isidro Ramos Salavert , José Torres Jiménez Designing Aspectual Architecture Views in Aspect-Oriented Software Development. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:726-735 [Conf ] Hyun Gi Min , Soo Dong Kim Process and Techniques to Generate Components in MDA/CB-PIM for Automation. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:736-745 [Conf ] Yucong Duan , Xiaolan Fu , Qingwu Hu , Yuqing Gu An Ontology Definition Framework for Model Driven Development. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:746-755 [Conf ] Xiaoqin Xie , Kaiyun Chen An AHP-Based Evaluation Model for Service Composition. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:756-766 [Conf ] Ha-Yong Lee , Hae Sool Yang , Suk-hyung Hwang Construction of Quality Test and Certification System for Package Software. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:767-776 [Conf ] Yoon Jung Chung , In-Jung Kim , Chulsoo Lee , Eul-Gyu Im , Dongho Won Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:777-786 [Conf ] Daerae Cho , Changmin Kim , Moonwon Choo , Suk-Ho Kang , Wookey Lee Goal Programming Approach to Compose the Web Service Quality of Service. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:787-797 [Conf ] Chang-Sun Shin , Chung-Sub Lee , Su-Chong Joo Healthcare Home Service System Based on Distributed Object Group Framework. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:798-807 [Conf ] Byungdo Choi , Chonggun Kim A Learning Attitude Evaluation System for Learning Concentration on Distance Education. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:808-817 [Conf ] Mary Wu , Chonggun Kim A Calculation Method for Direction Based Handover Rate in Cell Based Mobile Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:818-827 [Conf ] Wan-Kyoo Choi , Sung-Joo Lee , Il-Yong Chung , Yong-Geun Bae The Classification of the Software Quality by Employing the Tolerence Class. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:828-834 [Conf ] Jea-Youn Park , Gui-Jung Kim , Young-Jae Song Components Searching System Using Component Identifiers and Request Specifics. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:835-843 [Conf ] Haeng-Kon Kim Software Architecture Generation on UML. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:844-852 [Conf ] Chang-Won Jeong , Dong-Seok Kim , Geon-Yeob Lee , Su-Chong Joo Distributed Programming Developing Tool Based on Distributed Object Group Framework. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:853-863 [Conf ] Young-Jun Seo , Young-Jae Song A Study on Automatic Code Generation Tool from Design Patterns Based on the XMI. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:864-872 [Conf ] Ki-Won Song , Haeng Kon Kim , Kyung-Whan Lee Design of Opportunity Tree for Organization's Process Strategy Decision-Making Based on SPICE Assessment Experience. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:873-882 [Conf ] Mi-Og Park , Dea-Woo Park SUALPPA Scheme: Enhanced Solution for User Authentication in the GSM System. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:883-892 [Conf ] Hye-Min Noh , Sa-Kyun Jeong , Cheol-Jung Yoo , Ok-Bae Chang , Eun Mi Kim , Jong-Ryeol Choi Design of Mobile Video Player Based on the WIPI Platform. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:893-898 [Conf ] Bobby D. Gerardo , Jaewan Lee , Su-Chong Joo Discovering Patterns Based on Fuzzy Logic Theory. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:899-908 [Conf ] Sun-Myung Hwang , Hee-Gyun Yeom Metrics Design for Software Process Assessment Based on ISO/IEC 15504. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:909-916 [Conf ] Kilsup Lee , Sung Jong Lee A Quantitative Evaluation Model Using the ISO/IEC 9126 Quality Model in the Component Based Development Process. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:917-926 [Conf ] Haeng-Kon Kim , Eun-Ju Park Component Specification Model for the Web Services. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:927-936 [Conf ] Suk-hyung Hwang , Hong-Gee Kim , Myeng-Ki Kim , Sung-Hee Choi , Hae Sool Yang A Data-Driven Approach to Constructing an Ontological Concept Hierarchy Based on the Formal Concept Analysis. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:937-946 [Conf ] Malrey Lee , Eun-Kwan Kang , Thomas M. Gatton Web-Document Filtering Using Concept Graph. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:947-954 [Conf ] Seong-Man Choi , Cheol-Jung Yoo , Ok-Bae Chang Development of Integrated DAO Pattern Applying Iterator Pattern. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:955-965 [Conf ] Misook Choi , Seojeong Lee A Coupling Metric Applying the Characteristics of Components. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:966-975 [Conf ] Haeng-Kon Kim , Hae Sool Yang Software Process Improvement Environment. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:976-984 [Conf ] Eun Sook Cho , So Yeon Min , Chul Jin Kim A Design Technique of CBD Meta-model Based on Graph Theory. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:985-993 [Conf ] J. H. Lee , Dan Lee Description Technique for Component Composition Focusing on Black-Box View. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:994-1002 [Conf ] Kwang Moon Cho XML Security Model for Secure Information Exchange in E-Commerce. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:1003-1011 [Conf ] Chang-Mog Lee Design and Implementation of B2Bi Collaboration Workflow Tool Based on J2EE. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:1012-1021 [Conf ] Sangjoon Jung , Mary Wu , Youngsuk Jung , Chonggun Kim Traffic-Predicting A Routing Algorithm Using Time Series Models. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:1022-1031 [Conf ] Gu-Beom Jeong , Guk-Boh Kim A Study on Software Architecture Evaluation. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:1032-1041 [Conf ] Jungkyu Kwon , Mokdong Chung RFID-Based ALE Application Framework Using Context-Based Security Service. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:1042-1051 [Conf ] Hye-Jung Jung , Won-Tae Jung , Hae Sool Yang A Study on the Standard of Software Quality Testing. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:1052-1059 [Conf ] Kyong-Cheol Ko , Oh-Hyung Kang , Chang-Woo Lee , Ki-Hong Park , Yang-Won Rhee Scene Change Detection Using the Weighted Chi-Test and Automatic Threshold Decision Algorithm. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:1060-1069 [Conf ] Eun-ser Lee , Sang Ho Lee Design Opportunity Tree for Schedule Management and Evaluation by COQUALMO. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:1070-1080 [Conf ] TaeHoon Lee , Gihwon Kwon , Hyuksoo Han CTL Model Checking for Boolean Program. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:1081-1089 [Conf ] Yincui Hu , Yong Xue , Guoyin Cai , Chaolin Wu , Jianping Guo , Ying Luo , Wei Wan , Lei Zheng Grid Service Implementation of Aerosol Optical Thickness Retrieval over Land from MODIS. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:1090-1097 [Conf ] M. Hinarejos , Jordi Forné Revocation Scheme for PMI Based Upon the Tracing of Certificates Chains. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:1098-1106 [Conf ] Kuan-Ching Li , Chiou-Nan Chen , Chia-Hsien Wen , Ching-Wen Yang , Joung-Liang Lan Nailfold Capillary Microscopy High-Resolution Image Analysis Framework for Connective Tissue Disease Diagnosis Using Grid Computing Technology. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:1107-1115 [Conf ] Sangdong Jang , Wu Woon Kim EFH: An Edge-Based Fast Handover for Mobile IPv6 in IEEE 802.11b WLAN. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:1116-1125 [Conf ] Yong-Il Jang , Ho Seok Kim , Soon-Young Park , Jae-dong Lee , Hae-Young Bae An Extendible Hashing Based Recovery Method in a Shared-Nothing Spatial Database Cluster. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:1126-1135 [Conf ] José Daniel García , Jesús Carretero , Félix García , Javier Fernández , Alejandro Calderón , David E. Singh A Quantitative Justification to Partial Replication of Web Contents. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:1136-1145 [Conf ] Backhyun Kim , Iksoo Kim Content Distribution Strategy Using Web-Cached Multicast Technique. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:1146-1155 [Conf ] Dongmahn Seo , Joahyoung Lee , Yoon Kim , Changyeol Choi , Hwangkyu Choi , Inbum Jung Load Distribution Strategies in Cluster-Based Transcoding Servers for Mobile Clients. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:1156-1165 [Conf ] Jerzy Brzezinski , Anna Kobusinska Safety of Recovery Protocol Preserving MW Session Guarantee in Mobile Systems. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:1166-1174 [Conf ]