The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Young-Koo Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Maria Riaz, Saad Liaquat Kiani, Sungyoung Lee, Young-Koo Lee
    Incorporating Semantics-Based Search and Policy-Based Access Control Mechanism in Context Service Delivery. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:175-180 [Conf]
  2. Anjum Shehzad, Hung Quoc Ngo, Sungyoung Lee, Young-Koo Lee
    A Comprehensive Middleware Architecture for Context-Aware Ubiquitous Computing Systems. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:251-256 [Conf]
  3. Saad Liaquat Kiani, Maria Riaz, Sungyoung Lee, Young-Koo Lee
    Context Awareness in Large Scale Ubiquitous Environments with a Service Oriented Distributed Middleware Approach. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:513-518 [Conf]
  4. Binh An Truong, Young-Koo Lee, Sungyoung Lee
    Modeling Uncertainty in Context-Aware Computing. [Citation Graph (0, 0)][DBLP]
    ACIS-ICIS, 2005, pp:676-681 [Conf]
  5. Won-Young Kim, Kyu-Young Whang, Byung Suk Lee, Young-Koo Lee, Ji-Woong Chang
    Partial rollback in object-oriented/object-relational database management systems. [Citation Graph (0, 0)][DBLP]
    CIKM, 2002, pp:316-323 [Conf]
  6. Ju-Won Song, Kyu-Young Whang, Young-Koo Lee, Min-Jae Lee, Sang-Wook Kim
    Transformation-Based Spatial Join. [Citation Graph (0, 0)][DBLP]
    CIKM, 1999, pp:15-26 [Conf]
  7. Ju-Won Song, Kyu-Young Whang, Young-Koo Lee, Sang-Wook Kim
    The clustering Property of Corner Transformation for Spatial Database Applications. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1999, pp:28-35 [Conf]
  8. Young-Koo Lee, Woong-Kee Loh, Yang-Sae Moon, Kyu-Young Whang, Il-Yeol Song
    An Efficient Algorithm for Computing Range-Groupby Queries. [Citation Graph (0, 0)][DBLP]
    DASFAA, 2006, pp:483-497 [Conf]
  9. Nguyen Ngoc Diep, Le Xuan Hung, Yonil Zhung, Sungyoung Lee, Young-Koo Lee, Heejo Lee
    Enforcing Access Control Using Risk Assessment. [Citation Graph (0, 0)][DBLP]
    ECUMN, 2007, pp:419-424 [Conf]
  10. Wang Jin, Shu Lei, Jinsung Cho, Young-Koo Lee, Sungyoung Lee, Yonil Zhung
    A Load-Balancing and Energy-Aware Clustering Algorithm in Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1108-1117 [Conf]
  11. Kim Anh Pham Ngoc, Young-Koo Lee, Sungyoung Lee
    Middleware Architecture for Context Knowledge Discovery in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    EUC, 2005, pp:1177-1188 [Conf]
  12. Lenin Mehedy, Md. Kamrul Hasan, Young-Koo Lee, Sungyoung Lee, Sangman Han
    Hybrid Dissemination Based Scalable and Adaptive Context Delivery for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    EUC, 2006, pp:987-996 [Conf]
  13. Ali Sajjad, Hassan Jameel, Umar Kalim, Young-Koo Lee, Sungyoung Lee
    A Component-based Architecture for an Autonomic Middleware Enabling Mobile Access to Grid Infrastructure. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:1225-1234 [Conf]
  14. Binh An Truong, Young-Koo Lee, Sungyoung Lee
    A Unified Context Model: Bringing Probabilistic Models to Context Ontology. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:566-575 [Conf]
  15. Donghai Guan, Qing Li, Sungyoung Lee, Youngkoo Lee
    A Context-Aware Music Recommendation Agent in Smart Office. [Citation Graph (0, 0)][DBLP]
    FSKD, 2006, pp:1201-1204 [Conf]
  16. Weiwei Yuan, Donghai Guan, Sungyoung Lee, Youngkoo Lee
    A Dynamic Trust Model Based on Naive Bayes Classifier for Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    HPCC, 2006, pp:562-571 [Conf]
  17. Ali Sajjad, Hassan Jameel, Umar Kalim, Sangman Han, Young-Koo Lee, Sungyoung Lee
    AutoMAGI - an Autonomic middleware for enabling Mobile Access to Grid Infrastructure. [Citation Graph (0, 0)][DBLP]
    ICAS/ICNS, 2005, pp:73- [Conf]
  18. Byeong-Soo Jeong, Young-Koo Lee
    Storing and Querying of XML Documents Without Redundant Path Information. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2006, pp:505-514 [Conf]
  19. Faraz Rasheed, Young-Koo Lee, Sungyoung Lee
    Context Summarization and Garbage Collecting Context. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:1115-1124 [Conf]
  20. Young-Koo Lee, Won-Young Kim, Y. Dora Cai, Jiawei Han
    CoMine: Efficient Mining of Correlated Patterns. [Citation Graph (0, 0)][DBLP]
    ICDM, 2003, pp:581-584 [Conf]
  21. Binh An Truong, Young-Koo Lee, Sungyoung Lee
    Modeling and Reasoning about Uncertainty in Context-Aware Systems. [Citation Graph (0, 0)][DBLP]
    ICEBE, 2005, pp:102-109 [Conf]
  22. Donghai Guan, Weiwei Yuan, Andrey Gavrilov, Sungyoung Lee, Young-Koo Lee, Sangman Han
    Using Fuzzy Decision Tree to Handle Uncertainty in Context Deduction. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2006, pp:63-72 [Conf]
  23. Md. Kamrul Hasan, Kim Anh Pham Ngoc, Lenin Mehedy, Young-Koo Lee, Sungyoung Lee
    Conflict Resolution and Preference Learning in Ubiquitous Environment. [Citation Graph (0, 0)][DBLP]
    ICIC (2), 2006, pp:355-366 [Conf]
  24. Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Koo Lee, Heejo Lee
    Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:357-360 [Conf]
  25. Tahir Rasheed, Myung Ho In, Young-Koo Lee, Sungyoung Lee, Soo Yeol Lee, Tae-Seong Kim
    Constrained ICA Based Ballistocardiogram and Electro-Oculogram Artifacts Removal from Visual Evoked Potential EEG Signals Measured Inside MRI. [Citation Graph (0, 0)][DBLP]
    ICONIP (1), 2006, pp:1088-1097 [Conf]
  26. Pho Duc Giang, Hung Le Xuan, Yonil Zhung, Sungyoung Lee, Young-Koo Lee
    A Home Firewall Solution for Securing Smart Spaces. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:760-761 [Conf]
  27. Tran Van Phuong, Hung Le Xuan, Seong Jin Cho, Young-Koo Lee, Sungyoung Lee
    An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:735-736 [Conf]
  28. Hung Le Xuan, Nguyen Ngoc Diep, Yonil Zhung, Sungyoung Lee, Young-Koo Lee
    A Flexible and Scalable Access Control for Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:688-689 [Conf]
  29. Hung Le Xuan, Pho Duc Giang, Yonil Zhung, Tran Van Phuong, Sungyoung Lee, Young-Koo Lee
    A Trust-Based Security Architecture for Ubiquitous Computing Systems. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:753-754 [Conf]
  30. Hung Le Xuan, Hassan Jameel, Seong Jin Cho, Weiwei Yuan, Young-Koo Lee, Sungyoung Lee
    A Trust Model for Uncertain Interactions in Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:755-757 [Conf]
  31. Hassan Jameel, Hung Le Xuan, Umar Kalim, Ali Sajjad, Sungyoung Lee, Young-Koo Lee
    A Trust Model for Ubiquitous Systems based on Vectors of Trust Values. [Citation Graph (0, 0)][DBLP]
    ISM, 2005, pp:674-679 [Conf]
  32. Andrey Gavrilov, Young-Koo Lee, Sungyoung Lee
    Hybrid Neural Network Model Based on Multi-layer Perceptron and Adaptive Resonance Theory. [Citation Graph (0, 0)][DBLP]
    ISNN (1), 2006, pp:707-713 [Conf]
  33. Ali Sajjad, Hassan Jameel, Umar Kalim, Young-Koo Lee, Sungyoung Lee
    MAGI - Mobile Access to Grid Infrastructure: Bringing the gifts of Grid to Mobile Computing. [Citation Graph (0, 0)][DBLP]
    NODe/GSEM, 2005, pp:311-322 [Conf]
  34. Kim Anh Pham Ngoc, Young-Koo Lee, Sungyoung Lee
    Context Knowledge Discovery in Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2005, pp:33-34 [Conf]
  35. Kim Anh Pham Ngoc, Young-Koo Lee, Sungyoung Lee
    OWL-Based User Preference and Behavior Routine Ontology for Ubiquitous System. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2005, pp:1615-1622 [Conf]
  36. Won-Young Kim, Young-Koo Lee, Jiawei Han
    CCMine: Efficient Mining of Confidence-Closed Correlated Patterns. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2004, pp:569-579 [Conf]
  37. Faraz Rasheed, Young-Koo Lee, Sungyoung Lee
    Towards Using Data Aggregation Techniques in Ubiquitous Computing Environments. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2006, pp:369-372 [Conf]
  38. Uzair Ahmad, Uzma Nasir, Mahrin Iqbal, Young-Koo Lee, Sungyoung Lee, Inook Hwang
    On Building a Reflective Middleware Service for Location-Awareness. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2005, pp:439-442 [Conf]
  39. Le Xuan Hung, Tran Van Phuong, Pho Duc Giang, Yonil Zhung, Sungyoung Lee, Young-Koo Lee
    Security for Ubiquitous Computing: Problems and Proposed Solutionl. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2006, pp:110-116 [Conf]
  40. Saad Liaquat Kiani, Maria Riaz, Yonil Zhung, Sungyoung Lee, Young-Koo Lee
    A Distributed Middleware Solution for Context Awareness in Ubiquitous Systems. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2005, pp:451-454 [Conf]
  41. Maria Riaz, Saad Liaquat Kiani, Sungyoung Lee, Sangman Han, Young-Koo Lee
    Service Delivery in Context Aware Environments: Lookup and Access Control Issues. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2005, pp:455-458 [Conf]
  42. Hung Le Xuan, Dae Hong Seo, Sungyoung Lee, Young-Koo Lee
    Minimum-Energy Data Dissemination in Coordination-Based Sensor Networks. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2005, pp:381-386 [Conf]
  43. Faraz Rasheed, Youngkoo Lee, Sungyoung Lee
    Towards Summarized Representation of Time Series Data in Pervasive Computing Systems. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:658-668 [Conf]
  44. Xiaoling Wu, Yu Niu, Lei Shu, Jinsung Cho, Youngkoo Lee, Sungyoung Lee
    Relay Shift Based Self-deployment for Mobility Limited Sensor Networks. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:556-564 [Conf]
  45. Jong-Hak Lee, Young-Koo Lee, Kyu-Young Whang, Il-Yeol Song
    A Region Splitting Strategy for Physical Database Design of Multidimensional File Organizations. [Citation Graph (0, 14)][DBLP]
    VLDB, 1997, pp:416-425 [Conf]
  46. Young-Koo Lee, Kyu-Young Whang, Yang-Sae Moon, Il-Yeol Song
    A One-Pass Aggregation Algorithm with the Optimal Buffer Size in Multidimensional OLAP. [Citation Graph (0, 0)][DBLP]
    VLDB, 2002, pp:790-801 [Conf]
  47. Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Koo Lee, Andrey Gavrilov
    Finding Reliable Recommendations for Trust Model. [Citation Graph (0, 0)][DBLP]
    WISE, 2006, pp:375-386 [Conf]
  48. Bilal Ahmed, Young-Koo Lee, Sungyoung Lee, Yonil Zhung
    Scenario Based Fault Detection in Context-Aware Ubiquitous Systems using Bayesian Networks. [Citation Graph (0, 0)][DBLP]
    CIMCA/IAWTIC, 2005, pp:414-420 [Conf]
  49. Pho Duc Giang, Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee
    A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous Systems. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:698-703 [Conf]
  50. Jin Wang, Brian J. d'Auriol, Young-Koo Lee, Sungyoung Lee
    A Swarm Intelligence inspired Autonomic Routing Scenario in Ubiquitous Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:745-750 [Conf]
  51. Jin Wang, Brian J. d'Auriol, Xiaoling Wu, Young-Koo Lee, Sungyoung Lee
    Energy Consumption of Swarm Intelligence inspired Routing Algorithms in MANETs. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:803-806 [Conf]
  52. Ju-Won Song, Kyu-Young Whang, Young-Koo Lee, Min-Jae Lee, Wook-Shin Han, Byung-Kwon Park
    The clustering property of corner transformation for spatial database applications. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2002, v:44, n:7, pp:419-429 [Journal]
  53. Ji-Woong Chang, Young-Koo Lee, Kyu-Young Whang
    Global lock escalation in database management systems. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2002, v:82, n:4, pp:179-186 [Journal]
  54. Ji-Woong Chang, Kyu-Young Whang, Young-Koo Lee, Jae-Heon Yang, Yong-Chul Oh
    A formal approach to lock escalation. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 2005, v:30, n:2, pp:151-166 [Journal]
  55. Won-Young Kim, Kyu-Young Whang, Young-Koo Lee, Sang-Wook Kim
    A Recovery Method Supporting User-Interactive Undo in Database Management Systems. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1999, v:114, n:1-4, pp:237-253 [Journal]
  56. Jong-Hak Lee, Young-Koo Lee, Kyu-Young Whang, Il-Yeol Song
    A Physical Database Design Method for Multidimensional File Organizations. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1997, v:102, n:1-4, pp:31-65 [Journal]
  57. Young-Koo Lee, Kyu-Young Whang, Yang-Sae Moon, Il-Yeol Song
    An aggregation algorithm using a multidimensional file in multidimensional OLAP. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2003, v:152, n:, pp:121-138 [Journal]
  58. Jun-Wong Song, Kyu-Young Whang, Young-Koo Lee, Min-Jae Lee, Sang-Wook Kim
    Spatial Join Processing Using Corner Transformation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1999, v:11, n:4, pp:688-695 [Journal]
  59. Nomica Imran, Imran Rao, Young-Koo Lee, Sungyoung Lee
    A proxy-based uncoordinated checkpointing scheme with pessimistic message logging for mobile grid systems. [Citation Graph (0, 0)][DBLP]
    HPDC, 2007, pp:237-238 [Conf]
  60. Brian J. d'Auriol, John Kim, Sungyoung Lee, Young-Koo Lee
    Orthogonal Organized Finite State Machine Application to Sensor Acquired Information. [Citation Graph (0, 0)][DBLP]
    PaCT, 2007, pp:111-118 [Conf]
  61. Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee
    Activity-based Access Control Model to Hospital Information. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2007, pp:488-496 [Conf]
  62. Donghai Guan, Weiwei Yuan, Young-Koo Lee, Andrey Gavrilov, Sungyoung Lee
    Activity Recognition Based on Semi-supervised Learning. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2007, pp:469-475 [Conf]
  63. Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, Heejo Lee
    A Privacy Preserving Access Control Scheme using Anonymous Identification for Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    RTCSA, 2007, pp:482-487 [Conf]
  64. Donghai Guan, Weiwei Yuan, Seong Jin Cho, Andrey Gavrilov, Young-Koo Lee, Sungyoung Lee
    Devising a Context Selection-Based Reasoning Engine for Context-Aware Ubiquitous Computing Middleware. [Citation Graph (0, 0)][DBLP]
    UIC, 2007, pp:849-857 [Conf]
  65. Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Koo Lee
    A reputation system based on computing with words. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2007, pp:132-137 [Conf]

  66. Exploiting XML Schema for Interpreting XML Documents as RDF. [Citation Graph (, )][DBLP]


  67. Efficient Single-Pass Mining of Weighted Interesting Patterns. [Citation Graph (, )][DBLP]


  68. ShrFP-Tree: An Efficient Tree Structure for Mining Share-Frequent Patterns. [Citation Graph (, )][DBLP]


  69. Efficient frequent pattern mining over data streams. [Citation Graph (, )][DBLP]


  70. BARI: A Distributed Key Management Approach for Wireless Body Area Networks. [Citation Graph (, )][DBLP]


  71. HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge. [Citation Graph (, )][DBLP]


  72. Embedded Processor Security. [Citation Graph (, )][DBLP]


  73. Contextual Risk-Based Access Control. [Citation Graph (, )][DBLP]


  74. Mapping of Activity Recognition as a Distributed Inference Problem in Sensor Network. [Citation Graph (, )][DBLP]


  75. Determination of the Optimal Hop Number for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  76. Localization in Sensor Networks with Fading Channels Based on Nonmetric Distance Models. [Citation Graph (, )][DBLP]


  77. Combining Multi-layer Perceptron and K-Means for Data Clustering with Background Knowledge. [Citation Graph (, )][DBLP]


  78. CompoNet: Programmatically Embedding Neural Networks into AI Applications as Software Components. [Citation Graph (, )][DBLP]


  79. Facial Image Retrieval through Compound Queries Using Constrained Independent Component Analysis. [Citation Graph (, )][DBLP]


  80. Change Tracer: Tracking Changes in Web Ontologies. [Citation Graph (, )][DBLP]


  81. A Research Framework Model to Guide Both Broad and Focused Research into Ubiquitous Sensor Networks. [Citation Graph (, )][DBLP]


  82. Mining Weighted Frequent Patterns Using Adaptive Weights. [Citation Graph (, )][DBLP]


  83. RP-Tree: A Tree Structure to Discover Regular Patterns in Transactional Database. [Citation Graph (, )][DBLP]


  84. Context-Aware Fuzzy ArtMap for Received Signal Strength Based Location Systems. [Citation Graph (, )][DBLP]


  85. Modular Multilayer Perceptron for WLAN Based Localization. [Citation Graph (, )][DBLP]


  86. Semi-supervised nearest neighbor editing. [Citation Graph (, )][DBLP]


  87. A Distributed and Parallel Sampling System for Efficient Development of Radio Map. [Citation Graph (, )][DBLP]


  88. Application of Support Vector Machines on Signal Strength Based Localization in Wireless Networks. [Citation Graph (, )][DBLP]


  89. A Novel Hybrid Neural Network for Data Clustering. [Citation Graph (, )][DBLP]


  90. Viewer Perception of Superellipsoid-based Accelerometer Visualization Techniques. [Citation Graph (, )][DBLP]


  91. CP-Tree: A Tree Structure for Single-Pass Frequent Pattern Mining. [Citation Graph (, )][DBLP]


  92. Discovering Periodic-Frequent Patterns in Transactional Databases. [Citation Graph (, )][DBLP]


  93. An Efficient Candidate Pruning Technique for High Utility Pattern Mining. [Citation Graph (, )][DBLP]


  94. Mining Weighted Frequent Patterns in Incremental Databases. [Citation Graph (, )][DBLP]


  95. Modeling an Ontology for Managing Contexts in Smart Meeting Space. [Citation Graph (, )][DBLP]


  96. The election algorithm for semantically meaningful location-awareness. [Citation Graph (, )][DBLP]


  97. Query responsive awareness software: inventory control case study. [Citation Graph (, )][DBLP]


  98. Enhanced 1-NN time series classification using badness of records. [Citation Graph (, )][DBLP]


  99. Activity recognition with the aid of unlabeled samples. [Citation Graph (, )][DBLP]


  100. Mining high utility patterns in incremental databases. [Citation Graph (, )][DBLP]


  101. Energy consumption analysis of reputation-based trust management schemes of wireless sensor networks. [Citation Graph (, )][DBLP]


  102. The plasma free space optical model for ubiquitous systems. [Citation Graph (, )][DBLP]


  103. Bayesian memory-based reputation system. [Citation Graph (, )][DBLP]


  104. TIMAR: an efficient key management scheme for ubiquitous health care environments. [Citation Graph (, )][DBLP]


  105. A Location-aware Key Predistribution Scheme for Distributed Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  106. Transmission Time-Based Mechanism to Detect Wormhole Attacks. [Citation Graph (, )][DBLP]


  107. A Rapid Development Approach for Signal Strength Based Location Systems. [Citation Graph (, )][DBLP]


  108. Context Selection and Reasoning in Ubiquitous Computing. [Citation Graph (, )][DBLP]


  109. DTD2OWL: automatic transforming XML documents into OWL ontology. [Citation Graph (, )][DBLP]


  110. Averaging approach for distributed event detection in wireless sensor networks. [Citation Graph (, )][DBLP]


  111. Visualizations of human activities in sensor-enabled ubiquitous environments. [Citation Graph (, )][DBLP]


  112. A Novel Architecture for Efficient Key Management in Humanware Applications. [Citation Graph (, )][DBLP]


  113. MUQAMI+: a scalable and locally distributed key management scheme for clustered sensor networks. [Citation Graph (, )][DBLP]


  114. Vessel enhancement filter using directional filter bank. [Citation Graph (, )][DBLP]


Search in 0.066secs, Finished in 0.071secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002