Conferences in DBLP
Hae Sool Yang , Jung-Hun Hong , Seok-Hyung Hwang , Haeng-Kon Kim Implementation of Short Message Service System to Be Based Mobile Wireless Internet. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1-9 [Conf ] Ju-In Youn , He-Jue Eun , Yong-Sung Kim Fuzzy Clustering for Documents Based on Optimization of Classifier Using the Genetic Algorithm. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:10-20 [Conf ] Sun-Myung Hwang P2P Protocol Analysis and Blocking Algorithm. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:21-30 [Conf ] Jin-Sung Kim , Chun-Sik Yoo , Mi-Kyung Lee , Yong-Sung Kim Object Modeling of RDF Schema for Converting UML Class Diagram. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:31-41 [Conf ] Gu-Beom Jeong , Guk-Boh Kim A Framework for Security Assurance in Component Based Development. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:42-51 [Conf ] Haeng-Kon Kim , Hae Sool Yang Security Framework to Verify the Low Level Implementation Codes. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:52-61 [Conf ] Haeng-Kon Kim A Study on Evaluation of Component Metric Suites. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:62-70 [Conf ] Bobby D. Gerardo , Jaewan Lee , Yeon-Sung Choi , Malrey Lee The K-Means Clustering Architecture in the Multi-stage Data Mining Process. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:71-81 [Conf ] Hyang-Chang Choi , YongHoon Yi , Jae-Hyun Seo , BongNam Noh , HyungHyo Lee A Privacy Protection Model in ID Management Using Access Control. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:82-91 [Conf ] In-Jung Kim , Yoon Jung Chung , YoungGyo Lee , Dongho Won A Time-Variant Risk Analysis and Damage Estimation for Large-Scale Network Systems. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:92-101 [Conf ] Injoo Jang , Hyeong Seon Yoo Efficient Multi-bit Shifting Algorithm in Multiplicative Inversion Problems. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:102-110 [Conf ] Joungho Lee , Injoo Jang , Hyeong Seon Yoo Modified Token-Update Scheme for Site Authentication. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:111-116 [Conf ] Dae-Hee Seo , Im-Yeong Lee , Hee-Un Park A Study on Secure SDP of RFID Using Bluetooth Communication. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:117-126 [Conf ] Jong Woo Kim , Ju-Yeon Kim , Hyun-Suk Hwang , Sung-Seok Park , Chang Soo Kim , Sung-gi Park The Semantic Web Approach in Location Based Services. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:127-136 [Conf ] Haeng-Kon Kim , Oh-Hyun Kwon SCTE: Software Component Testing Environments. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:137-146 [Conf ] Jongwoo Chae , Jungkyu Kwon , Mokdong Chung Computer Security Management Model Using MAUT and SNMP. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:147-156 [Conf ] Young-Tak Kim , Hae-Sun Kim , Hyun-Ho Shin Session and Connection Management for QoS-Guaranteed Multimedia Service Provisioning on IP/MPLS Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:157-168 [Conf ] Ihn-Han Bae , Sun-Jin Oh A GQS-Based Adaptive Mobility Management Scheme Considering the Gravity of Locality in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:169-176 [Conf ] Seo-Il Kang , Im-Yeong Lee A Study on the E-Cash System with Anonymity and Divisibility. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:177-186 [Conf ] Yonghwan Lee , Eunmi Choi , Dugki Min An Authenticated Key Exchange Mechanism Using One-Time Shared Key. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:187-194 [Conf ] Oh-Hyung Kang , Seong-Yoon Shin Creation of Soccer Video Highlight Using the Caption Information. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:195-204 [Conf ] Jaeseon Ko , Bobby D. Gerardo , Jaewan Lee , Jae-Jeong Hwang The Information Search System Using Neural Network and Fuzzy Clustering Based on Mobile Agent. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:205-214 [Conf ] Sung-Ja Choi , Yeon-hee Kang , Gang-Soo Lee A Security Evaluation and Testing Methodology for Open Source Software Embedded Information Security System. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:215-224 [Conf ] Minsoo Kim , Jae-Hyun Seo , Seungyong Lee , BongNam Noh , Jung-Taek Seo , Eung Ki Park , Choon Sik Park An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:225-234 [Conf ] Mi-Og Park , Dea-Woo Park A New Stream Cipher Using Two Nonlinear Functions. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:235-244 [Conf ] Hwankoo Kim , Bongjoo Park , JaeCheol Ha , Byoungcheon Lee , DongGook Park New Key Management Systems for Multilevel Security. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:245-253 [Conf ] ByungRae Cha , KyungWoo Park , JaeHyun Seo Neural Network Techniques for Host Anomaly Intrusion Detection Using Fixed Pattern Transformation. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:254-263 [Conf ] Kyeongmo Park The Role of Secret Sharing in the Distributed MARE Protocols. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:264-273 [Conf ] Yoon Jung Chung , In-Jung Kim , Namhoon Lee , Taek Lee , Hoh Peter In Security Risk Vector for Quantitative Asset Assessment. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:274-283 [Conf ] Seong-Yoon Shin , Oh-Hyung Kang A Remote Video Study Evaluation System Using a User Profile. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:284-294 [Conf ] Hae Geun Kim Performance Enhancement of Wireless LAN Based on Infrared Communications Using Multiple-Subcarrier Modulation. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:295-303 [Conf ] Ha Jin Hwang Modeling Virtual Network Collaboration in Supply Chain Management. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:304-313 [Conf ] Mun-Kyu Lee SPA-Resistant Simultaneous Scalar Multiplication. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:314-321 [Conf ] Byung kwan Lee , Am Sok Oh , Eun-Hee Jeong HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:322-331 [Conf ] Chang Dae Yoon , Seung-Yeon Lee , Myong-chul Shin , Ho-Sung Jung , Jae Sang Cha A Fault Distance Estimation Method Based on an Adaptive Data Window for Power Network Security. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:332-340 [Conf ] Sang-Yule Choi , Myong-chul Shin , Nam-Young Hur , Jong-Boo Kim , Tai-Hoon Kim , Jae Sang Cha Distribution Data Security System Based on Web Based Active Database. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:341-352 [Conf ] JaeYong Jeong , Yongsu Park , Yookun Cho Efficient DoS Resistant Multicast Authentication Schemes. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:353-362 [Conf ] Eun-ser Lee , Malrey Lee Development System Security Process of ISO/IEC TR 15504 and Security Considerations for Software Process Improvement. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:363-372 [Conf ] Jae Sang Cha , Kyungsup Kwak , Chang Dae Yoon , Chong Hyun Lee Flexible ZCD-UWB with High QoS or High Capacity Using Variable ZCD Factor Code Sets. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:373-380 [Conf ] Hak Soo Ju , Dae Youb Kim , Dong Hoon Lee , Jongin Lim , Kilsoo Chun Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:381-390 [Conf ] Sung-Hyun Yun , Hyung-Woo Lee The Large Scale Electronic Voting Scheme Based on Undeniable Multi-signature Scheme. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:391-400 [Conf ] Hyung-Woo Lee , Sung-Hyun Yun , Jae-Sung Kim , Nam-Ho Oh , Do-Hyung Kim IPv6/IPsec Conformance Test Management System with Formal Description Technique. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:401-410 [Conf ] Chong Hyun Lee , Jae Sang Cha Interference Cancellation Algorithm Development and Implementation for Digital Television. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:411-419 [Conf ] Malrey Lee , Dong-Ju Im , Young Keun Lee , Jae-deuk Lee , Suwon Lee , Keun Kwang Lee , HeeJo Kang Algorithm for ABR Traffic Control and Formation Feedback Information. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:420-428 [Conf ] Jae Sang Cha , Kyungsup Kwak , Sang-Yule Choi , Tai-Hoon Kim , Chang Dae Yoon , Chong Hyun Lee Interference-Free ZCD-UWB for Wireless Home Network Applications. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:429-441 [Conf ] Hoon Ko , Bangyong Sohn , Hayoung Park , Yongtae Shin Safe Authentication Method for Security Communication in Ubiquitous. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:442-448 [Conf ] Chong Hyun Lee , Jae Sang Cha Pre/Post Rake Receiver Design for Maximum SINR in MIMO Communication System. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:449-457 [Conf ] Sang-soo Choi , Soo-young Chae , Gang-Soo Lee SRS-Tool: A Security Functional Requirement Specification Development Tool for Application Information System of Organization. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:458-467 [Conf ] Tai-Hoon Kim , Seung-youn Lee Design Procedure of IT Systems Security Countermeasures. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:468-473 [Conf ] Dong-Ju Im , Malrey Lee , Young Keun Lee , Tae-eun Kim , Suwon Lee , Jaewan Lee , Keun Kwang Lee , Kyung Dal Cho Similarity Retrieval Based on Self-organizing Maps. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:474-482 [Conf ] Malrey Lee , Eun-ser Lee , HeeJo Kang , Heesook Kim An Expert System Development for Operating Procedure Monitoring of PWR Plants. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:483-490 [Conf ] Tai-Hoon Kim , Seung-youn Lee Security Evaluation Targets for Enhancement of IT Systems Assurance. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:491-498 [Conf ] Seung-youn Lee , Myong-chul Shin Protection Profile for Software Development Site. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:499-507 [Conf ] Xiangyang Luo , Bin Liu , Fenlin Liu Improved RS Method for Detection of LSB Steganography. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:508-516 [Conf ] Ryszard Grzaslewicz , Jaroslaw Kutylowski , Miroslaw Kutylowski , Wojciech Pietkiewicz Robust Undetectable Interference Watermarks. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:517-526 [Conf ] Marcel Fernandez , Miguel Soriano , Josep Cotrina Navau Equidistant Binary Fingerprinting Codes Existence and Identification Algorithms. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:527-536 [Conf ] Kwangsoo Lee , Changho Jung , Sangjin Lee , Jongin Lim Color Cube Analysis for Detection of LSB Steganography in RGB Color Images. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:537-546 [Conf ] Sheng Tang , Jin-Tao Li , Yong-Dong Zhang Compact and Robust Image Hashing. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:547-556 [Conf ] Suk Hwan Lee , Ki-Ryong Kwon Watermarking for 3D Mesh Model Using Patch CEGIs. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:557-566 [Conf ] Jaemin Choi , Jongsung Kim , Jaechul Sung , Sangjin Lee , Jongin Lim Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:567-576 [Conf ] Kai Wirt Fault Attack on the DVB Common Scrambling Algorithm. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:577-584 [Conf ] Byung kwan Lee , Am Sok Oh , Eun-Hee Jeong HSEP Design Using F2m HECC and ThreeB Symmetric Key Under e-Commerce Environment. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:585-594 [Conf ] Zhiping Wu , Jintai Ding , Jason E. Gower , Dingfeng Ye Perturbed Hidden Matrix Cryptosystems. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:595-602 [Conf ] Kaoru Kurosawa , Swee-Huay Heng Identity-Based Identification Without Random Oracles. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:603-613 [Conf ] Joseph K. Liu , Duncan S. Wong Linkable Ring Signatures: Security Models and New Schemes. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:614-623 [Conf ] Marcel Fernandez , Miguel Soriano , Josep Cotrina Navau Practical Scenarios for the Van Trung-Martirosyan Codes. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:624-633 [Conf ] Ammar Alkassar , Thomas Nicolay , Markus Rohe Obtaining True-Random Binary Numbers from a Weak Radioactive Source. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:634-646 [Conf ] Dong Jin Yang , Chang Han Kim , Young-Ho Park , Yongtae Kim , Jongin Lim Modified Sequential Normal Basis Multipliers for Type II Optimal Normal Bases. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:647-656 [Conf ] Shi Cui , Pu Duan , Choong Wah Chan A New Method of Building More Non-supersingular Elliptic Curves. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:657-664 [Conf ] Stefan Tillich , Johann Großschädl Accelerating AES Using Instruction Set Extensions for Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:665-675 [Conf ] Hyuncheol Kim , Seong-Jin Ahn , Younghwan Lim , Youngsong Mun Access Control Capable Integrated Network Management System for TCP/IP Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:676-685 [Conf ] Shen Zhang , Amitava Datta A Directional-Antenna Based MAC Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:686-695 [Conf ] Jahwan Koo , Seong-Jin Ahn An Extended Framework for Proportional Differentiation: Performance Metrics and Evaluation Considerations. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:696-703 [Conf ] Zheng Wan , Xuezeng Pan , Lingdi Ping QoS Provisioning in an Enhanced FMIPv6 Architecture. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:704-713 [Conf ] Sun Hur , Jeong Kee Kim , Dong Chun Lee Delay of the Slotted ALOHA Protocol with Binary Exponential Backoff Algorithm. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:714-722 [Conf ] Kwang Ho Chun , Seung-hyun Min , Myoung-ho Seong , Myoung Seob Lim Design and Implementation of Frequency Offset Estimation, Symbol Timing and Sampling Clock Offset Control for an IEEE 802.11a Physical Layer. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:723-731 [Conf ] Yonghak Ahn , Oksam Chae Automatic Subtraction Radiography Algorithm for Detection of Periodontal Disease in Internet Environment. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:732-740 [Conf ] Dong Chun Lee , Hyo Young Shin , Joung Chul Ahn , Jae-Young Koh Improved Authentication Scheme in W-CDMA Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:741-748 [Conf ] Gi Yean Hwang , Jia Hou , Kwang Ho Chun , Moon Ho Lee Memory Reused Multiplication Implementation for Cryptography System. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:749-753 [Conf ] Jin Soh , Sung Man Jang , Geuk Lee Scheme for the Information Sharing Between IDSs Using JXTA. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:754-761 [Conf ] Sang-Young Lee , Yung-Hyeon Lee , Jeom Goo Kim , Dong Chun Lee Workflow System Modeling in the Mobile Healthcare B2B Using Semantic Information. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:762-770 [Conf ] Hong-Gyoo Sohn , Yeong-Sun Song , Gi-Hong Kim Detecting Water Area During Flood Event from SAR Image. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:771-780 [Conf ] Jongchan Lee , Sok-Pal Cho , Hong-Jin Kim Position Based Handover Control Method. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:781-788 [Conf ] Hyung Jin Kim , Bongsoo Son , Soobeom Lee , Joowon Park Improving Yellow Time Method of Left-Turning Traffic Flow at Signalized Intersection Networks by ITS. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:789-797 [Conf ] Kwang-Hyoung Lee , Heesook Kim , Keun-Wang Lee A Multimedia Database System Using Dependence Weight Values for a Mobile Environment. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:798-805 [Conf ] Wen Chen , Feiyu Lei , Weinong Wang A General Framework for Analyzing the Optimal Call Admission Control in DS-CDMA Cellular Network. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:806-815 [Conf ] Sangsoo Lee , Sei-Chang Oh , Bongsoo Son Heuristic Algorithm for Traffic Condition Classification with Loop Detector Data. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:816-821 [Conf ] Yingwei Luo , Guomin Xiong , Xiaolin Wang , Zhuoqun Xu Spatial Data Channel in a Mobile Navigation System. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:822-831 [Conf ] Hyeon-Seob Cho , Keun-Wang Lee A Video Retrieval System for Electrical Safety Education Based on a Mobile Agent. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:832-838 [Conf ] Gi-sung Lee Fuzzy Multi-criteria Decision Making-Based Mobile Tracking. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:839-847 [Conf ] Jahwan Koo , Seong-Jin Ahn , Younghwan Lim , Youngsong Mun Evaluation of Network Blocking Algorithm Based on ARP Spoofing and Its Application. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:848-855 [Conf ] Keun-Wang Lee , Jong-Hee Lee Design and Implementation of Mobile-Learning System for Environment Education. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:856-862 [Conf ] Bongsoo Son , Taewan Kim , Yongjae Lee A Simulation Model of Congested Traffic in the Waiting Line. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:863-869 [Conf ] Seung-Jae Yoo Core Technology Analysis and Development for the Virus and Hacking Prevention. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:870-879 [Conf ] Soobeom Lee , TaiSik Lee , Hyung Jin Kim , YoungKyun Lee Development of Traffic Accidents Prediction Model with Intelligent System Theory. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:880-888 [Conf ] Jin Ah Yoo , In Seon Choi , Dong Chun Lee Prefetching Scheme Considering Mobile User's Preference in Mobile Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:889-895 [Conf ] Byoung-Muk Min , Sok-Pal Cho , Hong-Jin Kim , Dong Chun Lee System Development of Security Vulnerability Diagnosis in Wireless Internet Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:896-903 [Conf ] Jin-Mook Kim , In-sung Han , Hwang-bin Ryou An Active Node Management System for Secure Active Networks. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:904-913 [Conf ] Vicky Nassis , Rajagopal Rajugan , Tharam S. Dillon , J. Wenny Rahayu A Systematic Design Approach for XML-View Driven Web Document Warehouses. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:914-924 [Conf ] Jeong Hee Hwang , Keun Ho Ryu Clustering and Retrieval of XML Documents by Structure. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:925-935 [Conf ] Juryon Paik , Hee Yong Youn , Ung-Mo Kim A New Method for Mining Association Rules from a Collection of XML Documents. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:936-945 [Conf ] Bing Xu , Mingmin Zhang , Zhigeng Pan , Hongwei Yang Content-Based Recommendation in E-Commerce. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:946-955 [Conf ] Rowena Chau , Chung-Hsing Yeh , Kate A. Smith A Personalized Multilingual Web Content Miner: PMWeb Miner. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:956-965 [Conf ] Jeong Hee Hwang , Mi Sug Gu , Keun Ho Ryu Context-Based Recommendation Service in Ubiquitous Commerce. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:966-976 [Conf ] Jeong Hee Chi , Sang Ho Kim , Keun Ho Ryu A New Continuous Nearest Neighbor Technique for Query Processing on Mobile Environments. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:977-987 [Conf ] Robert Baumgartner , Christian Enzi , Nicola Henze , Marc Herrlich , Marcus Herzog , Matthias Kriesell , Kai Tomaschewski Semantic Web Enabled Information Systems: Personalized Views on Web Data. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:988-997 [Conf ] Eung-Jae Lee , Keun Ho Ryu Design of Vehicle Information Management System for Effective Retrieving of Vehicle Location. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:998-1007 [Conf ] Joohyun Han , Yongyun Cho , Jaeyoung Choi Context-Aware Workflow Language Based on Web Services for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1008-1017 [Conf ] Tacha Serif , George Ghinea , Andrew O. Frank A Ubiquitous Approach for Visualizing Back Pain Data. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1018-1027 [Conf ] Sun K. Yoo , S. M. Jung , B. S. Kim , H. Y. Yun , Sung Rim Kim , Dong Keun Kim Prototype Design of Mobile Emergency Telemedicine System. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1028-1034 [Conf ] Daegeun Kim , MinHwan Ok , Myong-Soon Park An Intermediate Target for Quick-Relay of Remote Storage to Mobile Devices. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1035-1044 [Conf ] Uzair Ahmad , S. Y. Lee , Mahrin Iqbal , Uzma Nasir , Arshad Ali , Mudeem Iqbal Reflective Middleware for Location-Aware Application Adaptation. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1045-1054 [Conf ] Yue-Shi Lee , Min-Chi Hsieh , Show-Jane Yen Efficient Approach for Interactively Mining Web Traversal Patterns. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1055-1065 [Conf ] Le Thi Thu Thuy , Doan Dai Duong Query Decomposition Using the XML Declarative Description Language. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1066-1075 [Conf ] Sang Ho Lee , Sung Jin Kim , Seok-Hoo Hong On URL Normalization. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1076-1085 [Conf ] Hui Song , Fanyuan Ma , Chen Wang Clustering-Based Schema Matching of Web Data for Constructing Digital Library. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1086-1095 [Conf ] Maria Riaz , Saad Liaquat Kiani , Anjum Shehzad , Sungyoung Lee Bringing Handhelds to the Grid Resourcefully: A Surrogate Middleware Approach. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1096-1105 [Conf ] Simon Fong , Edison Lai Mobile Mini-payment Scheme Using SMS-Credit. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1106-1114 [Conf ] Faraz Rasheed , Young-Koo Lee , Sungyoung Lee Context Summarization and Garbage Collecting Context. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1115-1124 [Conf ] Rajagopal Rajugan , William Gardner , Elizabeth Chang , Tharam S. Dillon EXtensible Web (xWeb ): An XML-View Based Web Engineering Methodology. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1125-1135 [Conf ] Eunkyu Lee , Minsoo Kim , Mijeong Kim , Inhak Joo A Web Services Framework for Integrated Geospatial Coverage Data. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1136-1145 [Conf ] Namje Park , Howon Kim , Seungjoo Kim , Dongho Won Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1146-1155 [Conf ] David de Frutos-Escrig , Olga Marroquín Alonso , Fernando Rosa Velardo Ubiquitous Systems and Petri Nets. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1156-1166 [Conf ] Xiaoming Bao , See-Kiong Ng , Eng-Huat Chua , Wei-Khing For Virtual Lab Dashboard: Ubiquitous Monitoring and Control in a Smart Bio-laboratory. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1167-1176 [Conf ] Ming Yin , Dion Hoe-Lian Goh , Ee-Peng Lim On Discovering Concept Entities from Web Sites. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1177-1186 [Conf ] Mingzhe Liu , Ruili Wang , Ray H. Kemp Towards a Realistic Microscopic Traffic Simulation at an Unsignalised Intersection. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1187-1196 [Conf ] R. B. Pandey Complex Systems: Particles, Chains, and Sheets. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1197-1206 [Conf ] Zhang Yuanliang , Hyung Jo Choi , Kil To Chong Discretization of Delayed Multi-input Nonlinear System via Taylor Series and Scaling and Squaring Technique. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1207-1216 [Conf ] Xin Yao , Changshui Zhang , Jinwen Chen , Yanda Li On the Scale-Free Intersection Graphs. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1217-1224 [Conf ] MoonBae Song , KwangJin Park , Ki-Sik Kong , SangKeun Lee A Stochastic Viewpoint on the Generation of Spatiotemporal Datasets. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1225-1234 [Conf ] Jane Zhao A Formal Approach to the Design of Distributed Data Warehouses. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1235-1244 [Conf ] Tianhai Tian , Kevin Burrage A Mathematical Model for Genetic Regulation of the Lactose Operon. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1245-1253 [Conf ] Heather J. Ruskin , John Burns Network Emergence in Immune System Shape Space. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1254-1263 [Conf ] Flavio Corradini , Emanuela Merelli , Marco Vita A Multi-agent System for Modelling Carbohydrate Oxidation in Cell. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1264-1273 [Conf ] Bingcheng Hu , Jiming Liu Characterizing Complex Behavior in (Self-organizing) Multi-agent Systems. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1274-1283 [Conf ] Sung-Hee Park , Chan Yong Park , Dae-Hee Kim , Seon Hee Park , Jeong Seop Sim Protein Structure Abstractionand Automatic Clustering Using Secondary Structure Element Sequences. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1284-1292 [Conf ] Hua Su , Kil To Chong , Alexander G. Parlos A Neural Network Method for Induction Machine Fault Detection with Vibration Signal. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:1293-1302 [Conf ]