The SCEAS System
Navigation Menu

Conferences in DBLP

Computational Science and Its Applications (iccsa)
2005 (conf/iccsa/2005-2)

  1. Hae Sool Yang, Jung-Hun Hong, Seok-Hyung Hwang, Haeng-Kon Kim
    Implementation of Short Message Service System to Be Based Mobile Wireless Internet. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1-9 [Conf]
  2. Ju-In Youn, He-Jue Eun, Yong-Sung Kim
    Fuzzy Clustering for Documents Based on Optimization of Classifier Using the Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:10-20 [Conf]
  3. Sun-Myung Hwang
    P2P Protocol Analysis and Blocking Algorithm. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:21-30 [Conf]
  4. Jin-Sung Kim, Chun-Sik Yoo, Mi-Kyung Lee, Yong-Sung Kim
    Object Modeling of RDF Schema for Converting UML Class Diagram. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:31-41 [Conf]
  5. Gu-Beom Jeong, Guk-Boh Kim
    A Framework for Security Assurance in Component Based Development. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:42-51 [Conf]
  6. Haeng-Kon Kim, Hae Sool Yang
    Security Framework to Verify the Low Level Implementation Codes. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:52-61 [Conf]
  7. Haeng-Kon Kim
    A Study on Evaluation of Component Metric Suites. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:62-70 [Conf]
  8. Bobby D. Gerardo, Jaewan Lee, Yeon-Sung Choi, Malrey Lee
    The K-Means Clustering Architecture in the Multi-stage Data Mining Process. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:71-81 [Conf]
  9. Hyang-Chang Choi, YongHoon Yi, Jae-Hyun Seo, BongNam Noh, HyungHyo Lee
    A Privacy Protection Model in ID Management Using Access Control. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:82-91 [Conf]
  10. In-Jung Kim, Yoon Jung Chung, YoungGyo Lee, Dongho Won
    A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:92-101 [Conf]
  11. Injoo Jang, Hyeong Seon Yoo
    Efficient Multi-bit Shifting Algorithm in Multiplicative Inversion Problems. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:102-110 [Conf]
  12. Joungho Lee, Injoo Jang, Hyeong Seon Yoo
    Modified Token-Update Scheme for Site Authentication. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:111-116 [Conf]
  13. Dae-Hee Seo, Im-Yeong Lee, Hee-Un Park
    A Study on Secure SDP of RFID Using Bluetooth Communication. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:117-126 [Conf]
  14. Jong Woo Kim, Ju-Yeon Kim, Hyun-Suk Hwang, Sung-Seok Park, Chang Soo Kim, Sung-gi Park
    The Semantic Web Approach in Location Based Services. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:127-136 [Conf]
  15. Haeng-Kon Kim, Oh-Hyun Kwon
    SCTE: Software Component Testing Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:137-146 [Conf]
  16. Jongwoo Chae, Jungkyu Kwon, Mokdong Chung
    Computer Security Management Model Using MAUT and SNMP. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:147-156 [Conf]
  17. Young-Tak Kim, Hae-Sun Kim, Hyun-Ho Shin
    Session and Connection Management for QoS-Guaranteed Multimedia Service Provisioning on IP/MPLS Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:157-168 [Conf]
  18. Ihn-Han Bae, Sun-Jin Oh
    A GQS-Based Adaptive Mobility Management Scheme Considering the Gravity of Locality in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:169-176 [Conf]
  19. Seo-Il Kang, Im-Yeong Lee
    A Study on the E-Cash System with Anonymity and Divisibility. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:177-186 [Conf]
  20. Yonghwan Lee, Eunmi Choi, Dugki Min
    An Authenticated Key Exchange Mechanism Using One-Time Shared Key. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:187-194 [Conf]
  21. Oh-Hyung Kang, Seong-Yoon Shin
    Creation of Soccer Video Highlight Using the Caption Information. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:195-204 [Conf]
  22. Jaeseon Ko, Bobby D. Gerardo, Jaewan Lee, Jae-Jeong Hwang
    The Information Search System Using Neural Network and Fuzzy Clustering Based on Mobile Agent. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:205-214 [Conf]
  23. Sung-Ja Choi, Yeon-hee Kang, Gang-Soo Lee
    A Security Evaluation and Testing Methodology for Open Source Software Embedded Information Security System. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:215-224 [Conf]
  24. Minsoo Kim, Jae-Hyun Seo, Seungyong Lee, BongNam Noh, Jung-Taek Seo, Eung Ki Park, Choon Sik Park
    An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:225-234 [Conf]
  25. Mi-Og Park, Dea-Woo Park
    A New Stream Cipher Using Two Nonlinear Functions. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:235-244 [Conf]
  26. Hwankoo Kim, Bongjoo Park, JaeCheol Ha, Byoungcheon Lee, DongGook Park
    New Key Management Systems for Multilevel Security. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:245-253 [Conf]
  27. ByungRae Cha, KyungWoo Park, JaeHyun Seo
    Neural Network Techniques for Host Anomaly Intrusion Detection Using Fixed Pattern Transformation. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:254-263 [Conf]
  28. Kyeongmo Park
    The Role of Secret Sharing in the Distributed MARE Protocols. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:264-273 [Conf]
  29. Yoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Lee, Hoh Peter In
    Security Risk Vector for Quantitative Asset Assessment. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:274-283 [Conf]
  30. Seong-Yoon Shin, Oh-Hyung Kang
    A Remote Video Study Evaluation System Using a User Profile. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:284-294 [Conf]
  31. Hae Geun Kim
    Performance Enhancement of Wireless LAN Based on Infrared Communications Using Multiple-Subcarrier Modulation. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:295-303 [Conf]
  32. Ha Jin Hwang
    Modeling Virtual Network Collaboration in Supply Chain Management. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:304-313 [Conf]
  33. Mun-Kyu Lee
    SPA-Resistant Simultaneous Scalar Multiplication. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:314-321 [Conf]
  34. Byung kwan Lee, Am Sok Oh, Eun-Hee Jeong
    HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:322-331 [Conf]
  35. Chang Dae Yoon, Seung-Yeon Lee, Myong-chul Shin, Ho-Sung Jung, Jae Sang Cha
    A Fault Distance Estimation Method Based on an Adaptive Data Window for Power Network Security. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:332-340 [Conf]
  36. Sang-Yule Choi, Myong-chul Shin, Nam-Young Hur, Jong-Boo Kim, Tai-Hoon Kim, Jae Sang Cha
    Distribution Data Security System Based on Web Based Active Database. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:341-352 [Conf]
  37. JaeYong Jeong, Yongsu Park, Yookun Cho
    Efficient DoS Resistant Multicast Authentication Schemes. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:353-362 [Conf]
  38. Eun-ser Lee, Malrey Lee
    Development System Security Process of ISO/IEC TR 15504 and Security Considerations for Software Process Improvement. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:363-372 [Conf]
  39. Jae Sang Cha, Kyungsup Kwak, Chang Dae Yoon, Chong Hyun Lee
    Flexible ZCD-UWB with High QoS or High Capacity Using Variable ZCD Factor Code Sets. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:373-380 [Conf]
  40. Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun
    Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:381-390 [Conf]
  41. Sung-Hyun Yun, Hyung-Woo Lee
    The Large Scale Electronic Voting Scheme Based on Undeniable Multi-signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:391-400 [Conf]
  42. Hyung-Woo Lee, Sung-Hyun Yun, Jae-Sung Kim, Nam-Ho Oh, Do-Hyung Kim
    IPv6/IPsec Conformance Test Management System with Formal Description Technique. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:401-410 [Conf]
  43. Chong Hyun Lee, Jae Sang Cha
    Interference Cancellation Algorithm Development and Implementation for Digital Television. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:411-419 [Conf]
  44. Malrey Lee, Dong-Ju Im, Young Keun Lee, Jae-deuk Lee, Suwon Lee, Keun Kwang Lee, HeeJo Kang
    Algorithm for ABR Traffic Control and Formation Feedback Information. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:420-428 [Conf]
  45. Jae Sang Cha, Kyungsup Kwak, Sang-Yule Choi, Tai-Hoon Kim, Chang Dae Yoon, Chong Hyun Lee
    Interference-Free ZCD-UWB for Wireless Home Network Applications. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:429-441 [Conf]
  46. Hoon Ko, Bangyong Sohn, Hayoung Park, Yongtae Shin
    Safe Authentication Method for Security Communication in Ubiquitous. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:442-448 [Conf]
  47. Chong Hyun Lee, Jae Sang Cha
    Pre/Post Rake Receiver Design for Maximum SINR in MIMO Communication System. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:449-457 [Conf]
  48. Sang-soo Choi, Soo-young Chae, Gang-Soo Lee
    SRS-Tool: A Security Functional Requirement Specification Development Tool for Application Information System of Organization. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:458-467 [Conf]
  49. Tai-Hoon Kim, Seung-youn Lee
    Design Procedure of IT Systems Security Countermeasures. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:468-473 [Conf]
  50. Dong-Ju Im, Malrey Lee, Young Keun Lee, Tae-eun Kim, Suwon Lee, Jaewan Lee, Keun Kwang Lee, Kyung Dal Cho
    Similarity Retrieval Based on Self-organizing Maps. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:474-482 [Conf]
  51. Malrey Lee, Eun-ser Lee, HeeJo Kang, Heesook Kim
    An Expert System Development for Operating Procedure Monitoring of PWR Plants. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:483-490 [Conf]
  52. Tai-Hoon Kim, Seung-youn Lee
    Security Evaluation Targets for Enhancement of IT Systems Assurance. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:491-498 [Conf]
  53. Seung-youn Lee, Myong-chul Shin
    Protection Profile for Software Development Site. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:499-507 [Conf]
  54. Xiangyang Luo, Bin Liu, Fenlin Liu
    Improved RS Method for Detection of LSB Steganography. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:508-516 [Conf]
  55. Ryszard Grzaslewicz, Jaroslaw Kutylowski, Miroslaw Kutylowski, Wojciech Pietkiewicz
    Robust Undetectable Interference Watermarks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:517-526 [Conf]
  56. Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau
    Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:527-536 [Conf]
  57. Kwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim
    Color Cube Analysis for Detection of LSB Steganography in RGB Color Images. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:537-546 [Conf]
  58. Sheng Tang, Jin-Tao Li, Yong-Dong Zhang
    Compact and Robust Image Hashing. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:547-556 [Conf]
  59. Suk Hwan Lee, Ki-Ryong Kwon
    Watermarking for 3D Mesh Model Using Patch CEGIs. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:557-566 [Conf]
  60. Jaemin Choi, Jongsung Kim, Jaechul Sung, Sangjin Lee, Jongin Lim
    Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:567-576 [Conf]
  61. Kai Wirt
    Fault Attack on the DVB Common Scrambling Algorithm. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:577-584 [Conf]
  62. Byung kwan Lee, Am Sok Oh, Eun-Hee Jeong
    HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:585-594 [Conf]
  63. Zhiping Wu, Jintai Ding, Jason E. Gower, Dingfeng Ye
    Perturbed Hidden Matrix Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:595-602 [Conf]
  64. Kaoru Kurosawa, Swee-Huay Heng
    Identity-Based Identification Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:603-613 [Conf]
  65. Joseph K. Liu, Duncan S. Wong
    Linkable Ring Signatures: Security Models and New Schemes. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:614-623 [Conf]
  66. Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau
    Practical Scenarios for the Van Trung-Martirosyan Codes. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:624-633 [Conf]
  67. Ammar Alkassar, Thomas Nicolay, Markus Rohe
    Obtaining True-Random Binary Numbers from a Weak Radioactive Source. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:634-646 [Conf]
  68. Dong Jin Yang, Chang Han Kim, Young-Ho Park, Yongtae Kim, Jongin Lim
    Modified Sequential Normal Basis Multipliers for Type II Optimal Normal Bases. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:647-656 [Conf]
  69. Shi Cui, Pu Duan, Choong Wah Chan
    A New Method of Building More Non-supersingular Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:657-664 [Conf]
  70. Stefan Tillich, Johann Großschädl
    Accelerating AES Using Instruction Set Extensions for Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:665-675 [Conf]
  71. Hyuncheol Kim, Seong-Jin Ahn, Younghwan Lim, Youngsong Mun
    Access Control Capable Integrated Network Management System for TCP/IP Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:676-685 [Conf]
  72. Shen Zhang, Amitava Datta
    A Directional-Antenna Based MAC Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:686-695 [Conf]
  73. Jahwan Koo, Seong-Jin Ahn
    An Extended Framework for Proportional Differentiation: Performance Metrics and Evaluation Considerations. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:696-703 [Conf]
  74. Zheng Wan, Xuezeng Pan, Lingdi Ping
    QoS Provisioning in an Enhanced FMIPv6 Architecture. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:704-713 [Conf]
  75. Sun Hur, Jeong Kee Kim, Dong Chun Lee
    Delay of the Slotted ALOHA Protocol with Binary Exponential Backoff Algorithm. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:714-722 [Conf]
  76. Kwang Ho Chun, Seung-hyun Min, Myoung-ho Seong, Myoung Seob Lim
    Design and Implementation of Frequency Offset Estimation, Symbol Timing and Sampling Clock Offset Control for an IEEE 802.11a Physical Layer. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:723-731 [Conf]
  77. Yonghak Ahn, Oksam Chae
    Automatic Subtraction Radiography Algorithm for Detection of Periodontal Disease in Internet Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:732-740 [Conf]
  78. Dong Chun Lee, Hyo Young Shin, Joung Chul Ahn, Jae-Young Koh
    Improved Authentication Scheme in W-CDMA Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:741-748 [Conf]
  79. Gi Yean Hwang, Jia Hou, Kwang Ho Chun, Moon Ho Lee
    Memory Reused Multiplication Implementation for Cryptography System. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:749-753 [Conf]
  80. Jin Soh, Sung Man Jang, Geuk Lee
    Scheme for the Information Sharing Between IDSs Using JXTA. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:754-761 [Conf]
  81. Sang-Young Lee, Yung-Hyeon Lee, Jeom Goo Kim, Dong Chun Lee
    Workflow System Modeling in the Mobile Healthcare B2B Using Semantic Information. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:762-770 [Conf]
  82. Hong-Gyoo Sohn, Yeong-Sun Song, Gi-Hong Kim
    Detecting Water Area During Flood Event from SAR Image. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:771-780 [Conf]
  83. Jongchan Lee, Sok-Pal Cho, Hong-Jin Kim
    Position Based Handover Control Method. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:781-788 [Conf]
  84. Hyung Jin Kim, Bongsoo Son, Soobeom Lee, Joowon Park
    Improving Yellow Time Method of Left-Turning Traffic Flow at Signalized Intersection Networks by ITS. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:789-797 [Conf]
  85. Kwang-Hyoung Lee, Heesook Kim, Keun-Wang Lee
    A Multimedia Database System Using Dependence Weight Values for a Mobile Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:798-805 [Conf]
  86. Wen Chen, Feiyu Lei, Weinong Wang
    A General Framework for Analyzing the Optimal Call Admission Control in DS-CDMA Cellular Network. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:806-815 [Conf]
  87. Sangsoo Lee, Sei-Chang Oh, Bongsoo Son
    Heuristic Algorithm for Traffic Condition Classification with Loop Detector Data. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:816-821 [Conf]
  88. Yingwei Luo, Guomin Xiong, Xiaolin Wang, Zhuoqun Xu
    Spatial Data Channel in a Mobile Navigation System. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:822-831 [Conf]
  89. Hyeon-Seob Cho, Keun-Wang Lee
    A Video Retrieval System for Electrical Safety Education Based on a Mobile Agent. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:832-838 [Conf]
  90. Gi-sung Lee
    Fuzzy Multi-criteria Decision Making-Based Mobile Tracking. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:839-847 [Conf]
  91. Jahwan Koo, Seong-Jin Ahn, Younghwan Lim, Youngsong Mun
    Evaluation of Network Blocking Algorithm Based on ARP Spoofing and Its Application. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:848-855 [Conf]
  92. Keun-Wang Lee, Jong-Hee Lee
    Design and Implementation of Mobile-Learning System for Environment Education. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:856-862 [Conf]
  93. Bongsoo Son, Taewan Kim, Yongjae Lee
    A Simulation Model of Congested Traffic in the Waiting Line. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:863-869 [Conf]
  94. Seung-Jae Yoo
    Core Technology Analysis and Development for the Virus and Hacking Prevention. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:870-879 [Conf]
  95. Soobeom Lee, TaiSik Lee, Hyung Jin Kim, YoungKyun Lee
    Development of Traffic Accidents Prediction Model with Intelligent System Theory. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:880-888 [Conf]
  96. Jin Ah Yoo, In Seon Choi, Dong Chun Lee
    Prefetching Scheme Considering Mobile User's Preference in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:889-895 [Conf]
  97. Byoung-Muk Min, Sok-Pal Cho, Hong-Jin Kim, Dong Chun Lee
    System Development of Security Vulnerability Diagnosis in Wireless Internet Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:896-903 [Conf]
  98. Jin-Mook Kim, In-sung Han, Hwang-bin Ryou
    An Active Node Management System for Secure Active Networks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:904-913 [Conf]
  99. Vicky Nassis, Rajagopal Rajugan, Tharam S. Dillon, J. Wenny Rahayu
    A Systematic Design Approach for XML-View Driven Web Document Warehouses. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:914-924 [Conf]
  100. Jeong Hee Hwang, Keun Ho Ryu
    Clustering and Retrieval of XML Documents by Structure. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:925-935 [Conf]
  101. Juryon Paik, Hee Yong Youn, Ung-Mo Kim
    A New Method for Mining Association Rules from a Collection of XML Documents. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:936-945 [Conf]
  102. Bing Xu, Mingmin Zhang, Zhigeng Pan, Hongwei Yang
    Content-Based Recommendation in E-Commerce. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:946-955 [Conf]
  103. Rowena Chau, Chung-Hsing Yeh, Kate A. Smith
    A Personalized Multilingual Web Content Miner: PMWeb Miner. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:956-965 [Conf]
  104. Jeong Hee Hwang, Mi Sug Gu, Keun Ho Ryu
    Context-Based Recommendation Service in Ubiquitous Commerce. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:966-976 [Conf]
  105. Jeong Hee Chi, Sang Ho Kim, Keun Ho Ryu
    A New Continuous Nearest Neighbor Technique for Query Processing on Mobile Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:977-987 [Conf]
  106. Robert Baumgartner, Christian Enzi, Nicola Henze, Marc Herrlich, Marcus Herzog, Matthias Kriesell, Kai Tomaschewski
    Semantic Web Enabled Information Systems: Personalized Views on Web Data. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:988-997 [Conf]
  107. Eung-Jae Lee, Keun Ho Ryu
    Design of Vehicle Information Management System for Effective Retrieving of Vehicle Location. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:998-1007 [Conf]
  108. Joohyun Han, Yongyun Cho, Jaeyoung Choi
    Context-Aware Workflow Language Based on Web Services for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1008-1017 [Conf]
  109. Tacha Serif, George Ghinea, Andrew O. Frank
    A Ubiquitous Approach for Visualizing Back Pain Data. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1018-1027 [Conf]
  110. Sun K. Yoo, S. M. Jung, B. S. Kim, H. Y. Yun, Sung Rim Kim, Dong Keun Kim
    Prototype Design of Mobile Emergency Telemedicine System. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1028-1034 [Conf]
  111. Daegeun Kim, MinHwan Ok, Myong-Soon Park
    An Intermediate Target for Quick-Relay of Remote Storage to Mobile Devices. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1035-1044 [Conf]
  112. Uzair Ahmad, S. Y. Lee, Mahrin Iqbal, Uzma Nasir, Arshad Ali, Mudeem Iqbal
    Reflective Middleware for Location-Aware Application Adaptation. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1045-1054 [Conf]
  113. Yue-Shi Lee, Min-Chi Hsieh, Show-Jane Yen
    Efficient Approach for Interactively Mining Web Traversal Patterns. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1055-1065 [Conf]
  114. Le Thi Thu Thuy, Doan Dai Duong
    Query Decomposition Using the XML Declarative Description Language. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1066-1075 [Conf]
  115. Sang Ho Lee, Sung Jin Kim, Seok-Hoo Hong
    On URL Normalization. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1076-1085 [Conf]
  116. Hui Song, Fanyuan Ma, Chen Wang
    Clustering-Based Schema Matching of Web Data for Constructing Digital Library. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1086-1095 [Conf]
  117. Maria Riaz, Saad Liaquat Kiani, Anjum Shehzad, Sungyoung Lee
    Bringing Handhelds to the Grid Resourcefully: A Surrogate Middleware Approach. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1096-1105 [Conf]
  118. Simon Fong, Edison Lai
    Mobile Mini-payment Scheme Using SMS-Credit. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1106-1114 [Conf]
  119. Faraz Rasheed, Young-Koo Lee, Sungyoung Lee
    Context Summarization and Garbage Collecting Context. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1115-1124 [Conf]
  120. Rajagopal Rajugan, William Gardner, Elizabeth Chang, Tharam S. Dillon
    EXtensible Web (xWeb): An XML-View Based Web Engineering Methodology. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1125-1135 [Conf]
  121. Eunkyu Lee, Minsoo Kim, Mijeong Kim, Inhak Joo
    A Web Services Framework for Integrated Geospatial Coverage Data. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1136-1145 [Conf]
  122. Namje Park, Howon Kim, Seungjoo Kim, Dongho Won
    Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1146-1155 [Conf]
  123. David de Frutos-Escrig, Olga Marroquín Alonso, Fernando Rosa Velardo
    Ubiquitous Systems and Petri Nets. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1156-1166 [Conf]
  124. Xiaoming Bao, See-Kiong Ng, Eng-Huat Chua, Wei-Khing For
    Virtual Lab Dashboard: Ubiquitous Monitoring and Control in a Smart Bio-laboratory. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1167-1176 [Conf]
  125. Ming Yin, Dion Hoe-Lian Goh, Ee-Peng Lim
    On Discovering Concept Entities from Web Sites. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1177-1186 [Conf]
  126. Mingzhe Liu, Ruili Wang, Ray H. Kemp
    Towards a Realistic Microscopic Traffic Simulation at an Unsignalised Intersection. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1187-1196 [Conf]
  127. R. B. Pandey
    Complex Systems: Particles, Chains, and Sheets. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1197-1206 [Conf]
  128. Zhang Yuanliang, Hyung Jo Choi, Kil To Chong
    Discretization of Delayed Multi-input Nonlinear System via Taylor Series and Scaling and Squaring Technique. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1207-1216 [Conf]
  129. Xin Yao, Changshui Zhang, Jinwen Chen, Yanda Li
    On the Scale-Free Intersection Graphs. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1217-1224 [Conf]
  130. MoonBae Song, KwangJin Park, Ki-Sik Kong, SangKeun Lee
    A Stochastic Viewpoint on the Generation of Spatiotemporal Datasets. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1225-1234 [Conf]
  131. Jane Zhao
    A Formal Approach to the Design of Distributed Data Warehouses. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1235-1244 [Conf]
  132. Tianhai Tian, Kevin Burrage
    A Mathematical Model for Genetic Regulation of the Lactose Operon. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1245-1253 [Conf]
  133. Heather J. Ruskin, John Burns
    Network Emergence in Immune System Shape Space. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1254-1263 [Conf]
  134. Flavio Corradini, Emanuela Merelli, Marco Vita
    A Multi-agent System for Modelling Carbohydrate Oxidation in Cell. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1264-1273 [Conf]
  135. Bingcheng Hu, Jiming Liu
    Characterizing Complex Behavior in (Self-organizing) Multi-agent Systems. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1274-1283 [Conf]
  136. Sung-Hee Park, Chan Yong Park, Dae-Hee Kim, Seon Hee Park, Jeong Seop Sim
    Protein Structure Abstractionand Automatic Clustering Using Secondary Structure Element Sequences. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1284-1292 [Conf]
  137. Hua Su, Kil To Chong, Alexander G. Parlos
    A Neural Network Method for Induction Machine Fault Detection with Vibration Signal. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1293-1302 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002