Login / Signup
CIT (2)
2009
2009
2009
Keyphrases
Publications
2009
Mi-Young Park
,
Sang-Hwa Chung
,
Prasanthi Sreekumari
Comparison of End-to-End Loss Differentiation Algorithms in Multi-hop Wireless Networks.
CIT (2)
(2009)
Won-Ju Yoon
,
Sang-Hwa Chung
,
Shin-Jun Park
,
Su-Young Kang
An Efficient Tag Collision Detection Method for Active RFID Systems.
CIT (2)
(2009)
Xin He
,
Ke Yin
,
Xiaolin Gui
The Area Coverage Algorithm to Maintain Connectivity for WSN.
CIT (2)
(2009)
Xu An Wang
,
Xiaoyuan Yang
On DDos Attack against Proxy in Proxy Re-encryption and Proxy Re-signature.
CIT (2)
(2009)
Fei Xu
,
Jingsha He
,
Xu Wu
,
Jing Xu
A Method for Privacy Protection in Location Based Services.
CIT (2)
(2009)
Jungwook Song
,
Heemin Kim
,
Sunyoung Han
Route Optimization in PMIPv6 Environment.
CIT (2)
(2009)
Incheon Paik
,
Haruhiko Takada
Modeling and Transforming Abstract Constraints for Automatic Service Composition.
CIT (2)
(2009)
Uma Gunasilan
,
Thenesh Gunasilan
Operative Factors Contributing to the Selection of Fiber-Optic Techniques for Remote Measurement of Strain/Stress.
CIT (2)
(2009)
Yu-xi Zhu
,
Ling Zhou
DCADH: A Generating Algorithm of Delay-Constrained Multicast Routing Tree.
CIT (2)
(2009)
Tao Zhang
,
Byungjeong Lee
,
Sooyong Kang
,
Han-Joon Kim
,
Jinseog Kim
Collective Intelligence-Based Web Page Search: Combining Folksonomy and Link-Based Ranking Strategy.
CIT (2)
(2009)
Nan Hao
,
Hai-Hua Du
,
Sang-Jo Yoo
Iterative Wireless Sensor Network Positioning Based on Time Synchronization.
CIT (2)
(2009)
Yanli Liu
,
Dan Qi
,
Bolormaa Khurelbaatar
,
Book-Sung Park
,
Chul-Ju Kim
Internal Antenna Handset with Ni/Ag/Ni Hetero Structure.
CIT (2)
(2009)
Hyunduk Kim
,
Boseon Yu
,
Wonik Choi
,
Moonju Park
,
Jinseok Chae
Distance Based Pre-cluster Head Selection Scheme for a Chain-Based Protocol.
CIT (2)
(2009)
Navin Gautam
,
Won-Il Lee
,
Jae-Young Pyun
Track-Sector Clustering for Energy Efficient Routing in Wireless Sensor Networks.
CIT (2)
(2009)
Pranesh Sthapit
,
Yong Tae Park
,
Jae-Young Pyun
Medium Reservation Based MAC for Delay-Sensitive Wireless Sensor Network.
CIT (2)
(2009)
Yue Wu
,
Lei Xu
,
Hongbin Yang
Loop Selection to Boost Thread Level Speculation Parallelism in Chip Multiprocessor Systems.
CIT (2)
(2009)
Yuichi Yaguchi
,
Yusuke Sakai
,
Keisuke Yoshida
,
Ryuichi Oka
Web Video Data Clustering and Recognition Using Histograms of Phoneme Symbols.
CIT (2)
(2009)
Ning Hu
,
Peidong Zhu
,
Peng Zou
Reputation Mechanism for Inter-domain Routing Security Management.
CIT (2)
(2009)
Ju-Hyun Lee
,
Jae-Kark Choi
,
Sang-Jo Yoo
Group Node Contention Algorithm for Avoiding Continuous Collisions in LR-WPAN.
CIT (2)
(2009)
Yong Peng
,
Chunguang Peng
,
Jian Huang
,
Kedi Huang
An Ontology-Driven Paradigm for Component Representation and Retrieval.
CIT (2)
(2009)
Hirokazu Ozaki
,
Atsushi Kara
,
Zixue Cheng
User-Perceived Reliability of Shared Protection Systems with a Finite Number of Repairers.
CIT (2)
(2009)
Zhaobin Liu
,
Wenyu Qu
,
Keqiu Li
,
Ruoyu Fan
Object Oriented Property Attestation for Trusted Storage.
CIT (2)
(2009)
Rabindra Bista
,
Yong-Ki Kim
,
Jae-Woo Chang
A New Approach for Energy-Balanced Data Aggregation in Wireless Sensor Networks.
CIT (2)
(2009)
Mingjiang Ye
,
Ke Xu
,
Jianping Wu
,
Hu Po
AutoSig-Automatically Generating Signatures for Applications.
CIT (2)
(2009)
Jun Ma
,
Kenta Iseki
,
Yuichi Yaguchi
,
Ryuichi Oka
Segmentation-Free Object Recognition Using Full Pixel Matching.
CIT (2)
(2009)
Haosong Gou
,
Younghwan Yoo
,
Hongqing Zeng
A Partition-Based LEACH Algorithm for Wireless Sensor Networks.
CIT (2)
(2009)
Yubin Bao
,
Jie Song
,
Jingang Shi
,
Ge Yu
Case Study on Modeling Approaches and Framework of Scientific Data Cleaning.
CIT (2)
(2009)
Kun Yang
,
Zhongzhi Shi
Constructing a Facet-Based and Personalized Just-in-Time Web Information Recommendation Application in a Multi-agent Environment.
CIT (2)
(2009)
Meizhen Wang
,
Zhitang Li
,
Sheng Zhong
A Method for Spam Behavior Recognition Based on Fuzzy Decision Tree.
CIT (2)
(2009)
Jie Song
,
Yubin Bao
,
Jingang Shi
,
Ge Yu
Case Study on Multi-classifications Based Scientific Data Management and Analysis System.
CIT (2)
(2009)
Yun-Jung Lee
,
Min-Jung Bae
,
Gyun Woo
,
Hwan-Gue Cho
A Personalized Visualizing and Filtering System for a Large Set of Responding Messages on Internet Discussion Forums.
CIT (2)
(2009)
Zilei Wang
,
Hongsheng Xi
,
Guo Wei
Calculating Minimum Buffer Requirement of Constant Rate Transmission Scheme Based on SVM.
CIT (2)
(2009)
Zhongmin Zhang
,
Lili Guo
,
Yongzhi Yu
A New Design for Improving BER Performance for CI/MC-CDMA.
CIT (2)
(2009)
Lei Shi
,
Bai Sun
,
Liang Kong
,
Yan Zhang
Web Forum Sentiment Analysis Based on Topics.
CIT (2)
(2009)
Omid Bushehrian
A New Metric for Automatic Program Partitioning.
CIT (2)
(2009)
Guang Jin
,
Fei Zhang
,
Yuan Li
,
Honghao Zhang
,
Jiangbo Qian
A Hash-Based Path Identification Scheme for DDoS Attacks Defense.
CIT (2)
(2009)
Lan Liu
,
Xiaoping Xu
,
Yunli Qiu
A Kind of Fuzzy Constraint Correlation Algorithm Based on Prerequisites and Consequences of Security Event.
CIT (2)
(2009)
Sungjun Park
,
Longzhe Han
,
Hoh Peter In
,
Eun-Seok Ryu
A Prioritized Multi-queue Method for H.264/AVC Live Streaming in Wireless Networks.
CIT (2)
(2009)
Jianliang Gao
,
Jia Hu
,
Geyong Min
Performance Modelling of IEEE 802.15.4 MAC in LR-WPAN with Bursty ON-OFF Traffic.
CIT (2)
(2009)
Jin Tian
,
Shi Lin
Single DSP Hardware Design in Real-Time Multi-constellation Satellite Navigation Receiver.
CIT (2)
(2009)
G. G. Md. Nawaz Ali
,
Rajib Chakraborty
,
Md. Shihabul Alam
Performance Analysis of Different Routing Algorithms for Load Distribution in Multipath Packet Switched Network.
CIT (2)
(2009)
Takashi Wagatsuma
,
Yuichi Yaguchi
,
Ryuichi Oka
Cross-Media Data Mining Using Associated Keyword Space.
CIT (2)
(2009)
Kyung Su Hwang
,
Jian Feng Cui
,
Heung Seok Chae
An Automated Approach to Componentization of Java Source Code.
CIT (2)
(2009)
Qian You
,
Shiaofen Fang
,
Luoding Zhu
Visualizing Vortex Shedding of an Elastic Plate Interacting with a 3D Viscous Flow.
CIT (2)
(2009)
Bo Zhao
,
Huanguo Zhang
,
Zhede Li
A Trusted Start-Up Based on Embedded System.
CIT (2)
(2009)
Fei Yan
,
Huanguo Zhang
,
Bo Zhao
A Secure Multi-party Computing Model Based on Trusted Computing Platform.
CIT (2)
(2009)
Verayuth Lertnattee
,
Sinthop Chomya
,
Thanaruk Theeramunkong
,
Virach Sornlertlamvanich
Applying Collective Intelligence for Search Improvement on Thai Herbal Information.
CIT (2)
(2009)
Bai Sun
,
Lei Shi
,
Liang Kong
,
Yan Zhang
Describing Web Topics Meticulously through Word Graph Analysis.
CIT (2)
(2009)
Chao-Tung Yang
,
Hung-Yen Chen
,
Chih-Lin Huang
,
Shyh-Chang Tsaur
A Distributed File Storage with Replica Management in Peer-to-Peer Environments.
CIT (2)
(2009)
Songtao Zhang
,
Wenyu Liu
,
Zhenhua Tang
,
Jinhua Chen
,
Le Shu
,
Hongbo Jiang
Efficient Distributed Positioning Algorithms for Wireless Sensor Networks.
CIT (2)
(2009)