​
Login / Signup
AST/UCMA/ISA/ACN
2010
2010
2010
Keyphrases
Publications
2010
Junghoon Lee
,
Gyung-Leen Park
Design of an Efficient Message Collecting Scheme for the Slot-Based Wireless Mesh Network.
AST/UCMA/ISA/ACN
(2010)
Rujiang Bai
,
Xiaoyue Wang
,
Junhua Liao
Extract Semantic Information from WordNet to Improve Text Classification Performance.
AST/UCMA/ISA/ACN
(2010)
Bo Zhou
,
Hiroyuki Okamura
,
Tadashi Dohi
Markov Chain Monte Carlo Random Testing.
AST/UCMA/ISA/ACN
(2010)
Byeongchang Kim
Chinese Prosody Generation Based on C-ToBI Representation for Text-To-Speech.
AST/UCMA/ISA/ACN
(2010)
Pavan Kumar Pandey
,
G. P. Biswas
Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS.
AST/UCMA/ISA/ACN
(2010)
Praveen Ranjan Srivastava
,
Tai-Hoon Kim
Agent Based Approach to Regression Testing.
AST/UCMA/ISA/ACN
(2010)
Zhiqiang Zhou
,
Lin Cong
,
Guohan Lu
,
Beixing Deng
,
Xing Li
HATS: High Accuracy Timestamping System Based on NetFPGA.
AST/UCMA/ISA/ACN
(2010)
Hao Xu
Managing Ubiquitous Scientific Knowledge on Semantic Web.
AST/UCMA/ISA/ACN
(2010)
Mitsuhiro Kimura
,
Takaji Fujiwara
A Bootstrap Software Reliability Assessment Method to Squeeze Out Remaining Faults.
AST/UCMA/ISA/ACN
(2010)
Pierre-Louis Cayrel
,
Mohammed Meziani
Post-quantum Cryptography: Code-Based Signatures.
AST/UCMA/ISA/ACN
(2010)
Yongyun Cho
,
Hyun Yoe
,
Haeng-Kon Kim
CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculture.
AST/UCMA/ISA/ACN
(2010)
Yingqi Lu
,
Cheng Lu
,
Miao Qi
,
Shuyan Wang
A Supervised Locality Preserving Projections Based Local Matching Algorithm for Face Recognition.
AST/UCMA/ISA/ACN
(2010)
Hao Xu
A Pattern-Based Representation Approach for Online Discourses.
AST/UCMA/ISA/ACN
(2010)
Debabrata Dutta
,
Sanjoy Kumar Saha
,
Bhabatosh Chanda
Video Copy Detection: Sequence Matching Using Hypothesis Test.
AST/UCMA/ISA/ACN
(2010)
Mihye Kim
,
Kwan-Hee Yoo
,
Chan Park
,
Jae-Soo Yoo
Development of a Digital Textbook Standard Format Based on XML.
AST/UCMA/ISA/ACN
(2010)
Junghoon Lee
,
Cheolmin Kim
A Roadside Unit Placement Scheme for Vehicular Telematics Networks.
AST/UCMA/ISA/ACN
(2010)
Seong-Yong Choi
,
Jinsu Kim
,
Seung-Jin Han
,
Jun Hyeog Choi
,
Kee-Wook Rim
,
Jung-Hyun Lee
Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks.
AST/UCMA/ISA/ACN
(2010)
Md. Amiruzzaman
,
Hassan Peyravi
,
Mohammad Abdullah-Al-Wadud
,
Yoojin Chung
Concurrent Covert Communication Channels.
AST/UCMA/ISA/ACN
(2010)
Lianbo Gao
,
Jianming Shi
A Numerical Study on B&B Algorithms for Solving Sum-Of-Ratios Problem.
AST/UCMA/ISA/ACN
(2010)
Zhian Zheng
,
Yoshitomo Kaneda
,
Dang Hai Pham
,
Tomohisa Wada
Modified Structures of Viterbi Alogrithm for Forced-State Method in Concatenated Coding System of ISDB-T.
AST/UCMA/ISA/ACN
(2010)
Dakshina Ranjan Kisku
,
Phalguni Gupta
,
Jamuna Kanta Sing
Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-Based Improved K-Medoids Partitioning.
AST/UCMA/ISA/ACN
(2010)
Eunjung Lee
,
Kyong-Jin Seo
Multiple Asynchronous Requests on a Client-Based Mashup Page.
AST/UCMA/ISA/ACN
(2010)
Muhammad Khurram Khan
,
Khaled Alghathbar
Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks'.
AST/UCMA/ISA/ACN
(2010)
Zailani Abdullah
,
Tutut Herawan
,
Mustafa Mat Deris
Mining Significant Least Association Rules Using Fast SLP-Growth Algorithm.
AST/UCMA/ISA/ACN
(2010)
Neminath Hubballi
,
S. Roopa
,
Ritesh Ratti
,
Ferdous A. Barbhuiya
,
Santosh Biswas
,
Arijit Sur
,
Sukumar Nandi
,
Vivek Ramachandran
An Active Intrusion Detection System for LAN Specific Attacks.
AST/UCMA/ISA/ACN
(2010)
Zhian Zheng
,
Dang Hai Pham
,
Tomohisa Wada
Applications of Adaptive Belief Propagation Decoding for Long Reed-Solomon Codes.
AST/UCMA/ISA/ACN
(2010)
Nurzaini Mohamad Zain
,
Ganthan Narayana Samy
,
Rabiah Ahmad
,
Zuraini Ismail
,
Azizah Bt Abdul Manaf
Fuzzy Based Threat Analysis in Total Hospital Information System.
AST/UCMA/ISA/ACN
(2010)
Oladayo Salami
,
Antoine B. Bagula
,
H. Anthony Chan
A Model for Interference on Links in Inter-working Multi-hop Wireless Networks.
AST/UCMA/ISA/ACN
(2010)
Soumya Banerjee
,
Hameed Al-Qaheri
,
El-Sayed A. El-Dahshan
,
Aboul Ella Hassanien
Rough Set Approach in Ultrasound Biomicroscopy Glaucoma Analysis.
AST/UCMA/ISA/ACN
(2010)
Huo-Chong Ling
,
Raphael C.-W. Phan
,
Swee-Huay Heng
Analysis on the Improved SVD-Based Watermarking Scheme.
AST/UCMA/ISA/ACN
(2010)
Osamu Mizuno
,
Hideaki Hata
An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics.
AST/UCMA/ISA/ACN
(2010)
Mihye Kim
,
Kwan-Hee Yoo
,
Chan Park
,
Jae-Soo Yoo
,
Hoseung Byun
,
Wanyoung Cho
,
Jeeheon Ryu
,
Namgyun Kim
An XML-Based Digital Textbook and Its Educational Effectiveness.
AST/UCMA/ISA/ACN
(2010)
Bo Li
,
Jianxin Li
,
Tianyu Wo
,
Xudong Wu
,
Junaid Arshad
,
Wantao Liu
A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems.
AST/UCMA/ISA/ACN
(2010)
Husnain Naqvi
,
Stevan M. Berber
,
Zoran A. Salcic
Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks.
AST/UCMA/ISA/ACN
(2010)
Woonsuk Suh
,
Boo-Mann Choung
,
Eunseok Lee
A Fault Tolerant Architecture for Transportation Information Services of E-Government.
AST/UCMA/ISA/ACN
(2010)
Rujiang Bai
,
Xiaoyue Wang
,
Junhua Liao
Using an Integrated Ontology Database to Categorize Web Pages.
AST/UCMA/ISA/ACN
(2010)
Iftikhar Ahmad
,
Azween B. Abdullah
,
Abdullah Sharaf Alghamdi
Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks.
AST/UCMA/ISA/ACN
(2010)
Hao Xu
A Semantic Pattern Approach to Managing Scientific Publications.
AST/UCMA/ISA/ACN
(2010)
Yingqi Lu
,
Cheng Lu
,
Miao Qi
An Effective Video Steganography Method for Biometric Identification.
AST/UCMA/ISA/ACN
(2010)
Mahdi Khosravy
,
Mohammad Reza Alsharif
,
Katsumi Yamashita
An Optimum ICA Based Multiuser Data Separation for Short Message Service.
AST/UCMA/ISA/ACN
(2010)
Moussa Ouedraogo
,
Haralambos Mouratidis
,
Eric Dubois
,
Djamel Khadraoui
Information Systems Security Criticality and Assurance Evaluation.
AST/UCMA/ISA/ACN
(2010)
Sejin Park
,
Yong Kim
,
Inchul Song
,
Kichul Han
,
Jookwang Kim
,
Kyungho Kim
High Performance MAC Architecture for 3GPP Modem.
AST/UCMA/ISA/ACN
(2010)
Kevin Bouchard
,
Amir Ajroud
,
Bruno Bouchard
,
Abdenour Bouzouane
SIMACT: A 3D Open Source Smart Home Simulator for Activity Recognition.
AST/UCMA/ISA/ACN
(2010)
Xiaohong Yang
,
Qingcai Chen
,
Xiaolong Wang
A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by Humming.
AST/UCMA/ISA/ACN
(2010)
Bo Zhang
,
Qiuliang Xu
An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model.
AST/UCMA/ISA/ACN
(2010)
Danilo Valeros Bernardo
,
Doan B. Hoang
Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol.
AST/UCMA/ISA/ACN
(2010)
Yonghui Wu
,
Yuxin Ding
,
Xiaolong Wang
,
Jun Xu
Topic Detection by Topic Model Induced Distance Using Biased Initiation.
AST/UCMA/ISA/ACN
(2010)
Phalguni Gupta
,
Dakshina Ranjan Kisku
,
Jamuna Kanta Sing
,
Massimo Tistarelli
Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition.
AST/UCMA/ISA/ACN
(2010)
Nadir Shah
,
Depei Qian
A New Cross-Layer Unstructured P2P File Sharing Protocol over Mobile Ad Hoc Network.
AST/UCMA/ISA/ACN
(2010)
volume 6059, 2010
Advances in Computer Science and Information Technology, AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings
AST/UCMA/ISA/ACN
6059 (2010)