Search Word(s) in Title, Keywords, Authors, and Abstract: Management

CLB-ECC: Certificateless Blind Signature Using ECC
Sanjeet Kumar Nayak, Sujata Mohanty and Banshidhar Majhi
Page: 970~986, Vol. 13, No.4, 2017
10.3745/JIPS.03.0029

Keywords: Authentication, Blind Signature, Certificateless Cryptography, Elliptic Curve Cryptography, E-cash
Show / Hide Abstract

Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication
Ghazli Abdelkader, Hadj Said Naima and Ali Pacha Adda
Page: 152~173, Vol. 13, No.1, 2017
10.3745/JIPS.03.0064

Keywords: Authentication, GSM, Location Update, Mobility Management, Paging, Security
Show / Hide Abstract

Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City
Pradip Kumar Sharma, Seo Yeon Moon and Jong Hyuk Park
Page: 184~195, Vol. 13, No.1, 2017
10.3745/JIPS.03.0065

Keywords: Blockchain, Internet of Things, Security, Vehicular Network
Show / Hide Abstract

Mobility Scenarios into Future Wireless Access Network
Syed Mushhad Mustuzhar Gilani, Tang Hong, Qiqi Cai and Guofeng Zhao
Page: 236~255, Vol. 13, No.2, 2017
10.3745/JIPS.03.0069

Keywords: Access Point (AP), Internet Architecture, Network Function Virtualization (NFV), Seamless Handover, Software-Defined Network (SDN)
Show / Hide Abstract

NDynamic Framework for Secure VM Migration over Cloud Computing
Suresh B. Rathod and V. Krishna Reddy
Page: 476~490, Vol. 13, No.3, 2017
10.3745/JIPS.01.0015

Keywords: Cloud Computing, Datacenter (DC), Host Controller, Physical Host, Virtual Machine (VM)
Show / Hide Abstract

Traffic Information Service Model Considering Personal Driving Trajectories
Homin Han and Soyoung Park
Page: 951~969, Vol. 13, No.4, 2017
10.3745/JIPS.03.0078

Keywords: GPS-to-Road Mapping Strategy, Personal Trajectory, Traffic Information System, Trajectory Estimation
Show / Hide Abstract

The Effects of Industry Classification on a Successful ERP Implementation Model
Sangmin Lee and Dongho Kim
Page: 169~181, Vol. 12, No.1, 2016
10.3745/JIPS.03.0047

Keywords: Enterprise Applications, Enterprise Resource Planning, ERP Industry, ERP Succe
Show / Hide Abstract

Multiple Vehicle Detection and Tracking in Highway Traffic Surveillance Video Based on SIFT Feature Matching
Kenan Mu, Fei Hui and Xiangmo Zhao
Page: 183~195, Vol. 12, No.2, 2016
10.3745/JIPS.02.0040

Keywords: Computer Vision, Highway Traffic Surveillance, SIFT Feature Matching, Vehicle Detection, Vehicle Tracking
Show / Hide Abstract

Inter-Domain Mobility Management Based on the Proxy Mobile IP in Mobile Networks
Moneeb Gohar and Seok-Joo Koh
Page: 196~213, Vol. 12, No.2, 2016
10.3745/JIPS.03.0037

Keywords: Comparison, HIP, LTE, LISP, MIP, Mobility Management, PMIP, SAE
Show / Hide Abstract

Mitigating Threats and Security Metrics in Cloud Computing
Jayaprakash Kar and Manoj Ranjan Mishra
Page: 226~233, Vol. 12, No.2, 2016
10.3745/JIPS.03.0049

Keywords: Dynamic Access Control, Risk Assessment, Security Intelligence
Show / Hide Abstract

SDN-Based Enterprise and Campus Networks: A Case of VLAN Management
Van-Giang Nguyen and Young-Han Kim
Page: 511~524, Vol. 12, No.3, 2016
10.3745/JIPS.03.0039

Keywords: Campus Network, Enterprise Network, OpenFlow, Software Defined Networking (SDN), VLAN Management
Show / Hide Abstract

A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm
Nawal Sad Houari and Noria Taghezout
Page: 688~710, Vol. 12, No.4, 2016
10.3745/JIPS.03.0056

Keywords: Business Rules (BR), Business Rules Management System (BRMS), Encryption Algorithms, Security Agent
Show / Hide Abstract

Energy Consumption Scheduling in a Smart Grid Including Renewable Energy
Nadia Boumkheld, Mounir Ghogho and Mohammed El Koutbi
Page: 116~124, Vol. 11, No.1, 2015
10.3745/JIPS.03.0022

Keywords: Demand Response, Energy Management, Energy Scheduling, Optimization
Show / Hide Abstract

Fast Device Discovery for Remote Device Management in Lighting Control Networks
Sang-Il Choi, Sanghun Lee, Seok-Joo Koh, Sang-Kyu Lim, Insu Kim and Tae-Gyu Kang
Page: 125~133, Vol. 11, No.1, 2015
10.3745/JIPS.03.0011

Keywords: Device Discovery, Partition-Based, RDM
Show / Hide Abstract

A Column-Aware Index Management Using Flash Memory for Read-Intensive Databases
Si-Woo Byun and Seok-Woo Jang
Page: 389~405, Vol. 11, No.3, 2015
10.3745/JIPS.04.0017

Keywords: Column-Aware Index Management, Column-Oriented Databases, Flash Memory Storage, Game Database, Network Database
Show / Hide Abstract

Rotational Wireless Video Sensor Networks with Obstacle Avoidance Capability for Improving Disaster Area Coverage
Nawel Bendimerad and Bouabdellah Kechar
Page: 509~527, Vol. 11, No.4, 2015
10.3745/JIPS.03.0034

Keywords: Coverage, Fault Tolerance, Field of View, Obstacles Avoidance, Scheduling, Simulation, Wireless Video Sensor Networks
Show / Hide Abstract

Uniform Fractional Band CAC Scheme for QoS Provisioning in Wireless Networks
Md. Asadur Rahman, Mostafa Zaman Chowdhury and Yeong Min Jang
Page: 583~600, Vol. 11, No.4, 2015
10.3745/JIPS.03.0043

Keywords: Acceptance Factor, Call Admission Control (CAC), Call Blocking Probability (CBP), Call Dropping Probability (CDP), Channel Utilization, Uniform Fractional Band (UFB), Quality of Service (QoS)
Show / Hide Abstract

How to Manage Cloud Risks Based on the BMIS Model
Youjin Song and Yasheng Pang
Page: 132~144, Vol. 10, No.1, 2014
10.3745/JIPS.2014.10.1.132
Keywords: Cloud Risk, Risk Control, Cloud Computing, BMIS, CSFs
Show / Hide Abstract

Leveraged BMIS Model for Cloud Risk Control
YouJin Song and Yasheng Pang
Page: 240~255, Vol. 10, No.2, 2014
10.3745/JIPS.03.0004
Keywords: Cloud risk, CSFs, BMIS, Risk control, Leverage point, Effective model
Show / Hide Abstract

Content Modeling Based on Social Network Community Activity
Kyung-Rog Kim and Nammee Moon
Page: 271~282, Vol. 10, No.2, 2014
10.3745/JIPS.04.0001
Keywords: Social network community activities, content model, learning objects, content granularity, content aggregation level
Show / Hide Abstract

Improving Database System Performance by Applying NoSQL
Yong-Lak Choi, Woo-Seong Jeon and Seok-Hwan Yoon
Page: 355~364, Vol. 10, No.3, 2014
10.3745/JIPS.04.0006
Keywords: Database System Performance, NoSQL, NoSQL Practical Use
Show / Hide Abstract

A Novel Framework for Defining and Submitting Workflows to Service-Oriented Systems
Hayat Bendoukha, Yahya Slimani and Abdelkader Benyettou
Page: 365~383, Vol. 10, No.3, 2014
10.3745/JIPS.02.0003
Keywords: Service Composition, Service-Oriented Computing, Service-Oriented Workflow, UML2BPEL, Workflow
Show / Hide Abstract

Femtocell Subband Selection Method for Managing Cross- and Co-tier Interference in a Femtocell Overlaid Cellular Network
Young Min Kwon, Hyunseung Choo, Tae-Jin Lee, Min Young Chung and Mihui Kim
Page: 384~394, Vol. 10, No.3, 2014
10.3745/JIPS.03.0008
Keywords: Clustering Method, Femtocell, Frequency Partition, Interference Management
Show / Hide Abstract

A Study of Wireless Sensor Network Routing Protocols for Maintenance Access Hatch Condition Surveillance
Hoo-Rock Lee, Kyung-Yul Chung and Kyoung-Son Jhang
Page: 237~246, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.237
Keywords: Maintenance Hatch, Underground Facilities, WSN, Routing Protocol, ns-2
Show / Hide Abstract

A Secure Index Management Scheme for Providing Data Sharing in Cloud Storage
Sun-Ho Lee and Im-Yeong Lee
Page: 287~300, Vol. 9, No.2, 2013
10.3745/JIPS.2013.9.2.287
Keywords: Searchable Encryption, Proxy Re-Encryption, Index Management, Cloud Computing, Cloud Storage
Show / Hide Abstract

A Simulation Model of Object Movement for Evaluating the Communication Load in Networked Virtual Environments
Mingyu Lim and Yunjin Lee
Page: 489~498, Vol. 9, No.3, 2013
10.3745/JIPS.2013.9.3.489
Keywords: Networked Virtual Environments, Simulation Model, Load Distribution, Interest Management
Show / Hide Abstract

Developing a Web-Based Knowledge Product Outsourcing System at a University
Mark B. Onte and Dave E. Marcial
Page: 548~566, Vol. 9, No.4, 2013
10.3745/JIPS.2013.9.4.548
Keywords: Knowledge Product Outsourcing, Management, Web 2.0, IT in Education
Show / Hide Abstract

Dynamic knowledge mapping guided by data mining: Application on Healthcare
Menaouer Brahami, Baghdad Atmani and Nada Matta
Page: 1~30, Vol. 9, No.1, 2013
10.3745/JIPS.2013.9.1.001
Keywords: Knowledge Management, Knowledge Mapping (Knowledge Cartography), Knowledge Representation, Boolean Modeling, Cellular Machine, Data Mining, Boolean Inference Engine
Show / Hide Abstract

Dynamic Replication Based on Availability and Popularity in the Presence of Failures
Bakhta Meroufel and Ghalem Belalem
Page: 263~278, Vol. 8, No.2, 2012
10.3745/JIPS.2012.8.2.263
Keywords: Data Grid, Dynamic Replication, Availability, Failures, Best Client, Best Responsible, Data Management
Show / Hide Abstract

Evaluation of an Abstract Component Model for Embedded Systems Development
Christian Bunse, Yunja Choi and Hans Gerhard Gross
Page: 539~554, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.539
Keywords: Software Development Management, Software Reusability, Modeling
Show / Hide Abstract

A Comparative Study of Estimation by Analogy using Data Mining Techniques
Geeta Nagpal, Moin Uddin and Arvinder Kaur
Page: 621~652, Vol. 8, No.4, 2012
10.3745/JIPS.2012.8.4.621
Keywords: Software Estimations, Estimation by Analogy, Grey Relational Analysis, Robust Regression, Data Mining Techniques
Show / Hide Abstract

Analysis of Business Attributes in Information Technology Environments
Hong Joo Lee
Page: 385~396, Vol. 7, No.2, 2011
10.3745/JIPS.2011.7.2.385
Keywords: Business Attributes, Information Technology, Value Chain, Business System
Show / Hide Abstract

The Principle of Justifiable Granularity and an Optimization of Information Granularity Allocation as Fundamentals of Granular Computing
Witold Pedrycz
Page: 397~412, Vol. 7, No.3, 2011
10.3745/JIPS.2011.7.3.397
Keywords: Information Granularity, Principle of Justifiable Granularity, Knowledge Management, Optimal Granularity Allocation
Show / Hide Abstract

Probabilistic Soft Error Detection Based on Anomaly Speculation
Joonhyuk Yoo
Page: 435~446, Vol. 7, No.3, 2011
10.3745/JIPS.2011.7.3.435
Keywords: Probabilistic Soft Error Detection, Reliability, Anomaly Speculation
Show / Hide Abstract

An Approach to Art Collections Management and Content-based Recovery
Concepcion Perez de Celis Herrero, Jaime Lara Alvarez, Gustavo Cossio Aguilar and Maria J. Somodevilla Garcia
Page: 447~458, Vol. 7, No.3, 2011
10.3745/JIPS.2011.7.3.447
Keywords: Search by Content, Faceted Classification, IT, Collections Management, Metadata, Information Retrieval
Show / Hide Abstract

A Study on the Business Strategy of Smart Devices for Multimedia Contents
Hong Joo Lee
Page: 543~548, Vol. 7, No.3, 2011
10.3745/JIPS.2011.7.3.543
Keywords: Smart Device, Business Strategy, Business Value Chain
Show / Hide Abstract

TOSS: Telecom Operations Support Systems for Broadband Services
Yuan-Kai Chen, Chang-Ping Hsu, Chung-Hua Hu, Rong-Syh Lin, Yi-Bing Lin, Jian-Zhi Lyu, Wudy Wu and Heychyi Young
Page: 1~20, Vol. 6, No.1, 2010
10.3745/JIPS.2010.6.1.001
Keywords: Operations Support System (OSS), New Generation Operations Systems and Software (NGOSS), enhanced Telecom Operations Map (eTOM), Internet Protocol Television (IPTV), IP-Virtual Private Network (IP-VPN)
Show / Hide Abstract

IPv4 Address Trading Using Resource Certificate
Cheol-Soon Park, Jae-Cheol Ryou and Yong-Tae Park
Page: 107~120, Vol. 6, No.1, 2010
10.3745/JIPS.2010.6.1.107
Keywords: IP Address Trading, Resource PKI, Routing Security, IP Address Management
Show / Hide Abstract

Strategic Information Systems Alignment: Alignment of IS/IT with Business Strategy
Abdisalam Issa-Salwe, Munir Ahmed, Khalid Aloufi and Muhammad Kabir
Page: 121~128, Vol. 6, No.1, 2010
10.3745/JIPS.2010.6.1.121
Keywords: Information Systems, Information Systems, Business Planning, Planning Strategy, IT/IS Alignment.
Show / Hide Abstract

Challenges to Next Generation Services in IP Multimedia Subsystem
Kai-Di Chang, Chi-Yuan Chen, Jiann-Liang Chen and Han-Chieh Chao
Page: 129~146, Vol. 6, No.2, 2010
10.3745/JIPS.2010.6.2.129
Keywords: IP Multimedia Subsystems, Peer-to-Peer, Web Services, SCIM
Show / Hide Abstract

A Classifiable Sub-Flow Selection Method for Traffic Classification in Mobile IP Networks
Akihiro Satoh, Toshiaki Osada, Toru Abe, Gen Kitagata, Norio Shiratori and Tetsuo Kinoshita
Page: 307~322, Vol. 6, No.3, 2010
10.3745/JIPS.2010.6.3.307
Keywords: Mobile IP Network, Traffic Classification, Network Management, Traffic Engineering, Machine Learning
Show / Hide Abstract

Access Control to Objects and their Description in the Future Network of Information
Eric Renault, Ahmad Ahmad and Mohamed Abid
Page: 359~374, Vol. 6, No.3, 2010
10.3745/JIPS.2010.6.3.359
Keywords: Future Internet, Network of Information, Security, Storage Space, Access Rights
Show / Hide Abstract

En-Route Trajectory calculation using Flight Plan Information for Effective Air Traffic Management
Yong-Kyun Kim, Yun-Hyun Jo, Jin-Won Yun, Taeck-Keun Oh, Hee-Chang Roh, Sang-Bang Choi and Hyo-Dal Park
Page: 375~384, Vol. 6, No.3, 2010
10.3745/JIPS.2010.6.3.375
Keywords: ATC, ATM, Trajectory Prediction, ATFM
Show / Hide Abstract

Efficient Server Virtualization using Grid Service Infrastructure
Sung-Jin Baek, Sun-Mi Park, Su-Hyun Yang, Eun-Ha Song and Young-Sik Jeong
Page: 553~562, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.553
Keywords: Server Virtualization, Grid Service, Grid Infrastructure, Power Efficiency, Cloud Computing
Show / Hide Abstract

A Study on Design and Implementation of the Ubiquitous Computing Environment-based Dynamic Smart On/Off-line Learner Tracking System
Hyung-Min Lim, Kun-Won Jang and Byung-Gi Kim
Page: 609~620, Vol. 6, No.4, 2010
10.3745/JIPS.2010.6.4.609
Keywords: u-Learning, e-Learning, Event Hooking, Content packing
Show / Hide Abstract

An Efficient Web Ontology Storage Considering Hierarchical Knowledge for Jena-based Applications
Dongwon Jeong, Heeyoung Shin, Doo-Kwon Baik and Young-Sik Jeong
Page: 11~18, Vol. 5, No.1, 2009
10.3745/JIPS.2009.5.1.011
Keywords: Ontology, Jena, OWL, Ontology, Storage, Hierarchical Structure
Show / Hide Abstract

Privacy-Aware Adaptable Web Services Using Petri Nets
You-Jin Song and Jae-Geol Yim
Page: 19~24, Vol. 5, No.1, 2009
10.3745/JIPS.2009.5.1.019
Keywords: Privacy, Web Service, Petri Net, Context Framework
Show / Hide Abstract

Autonomic Self Healing-Based Load Assessment for Load Division in OKKAM Backbone Cluster
Junaid Ahsenali Chaudhry
Page: 69~76, Vol. 5, No.2, 2009
10.3745/JIPS.2009.5.2.069
Keywords: Self Healing Systems, Load Estimation and Balancing, OKKAM, Entity Naming System
Show / Hide Abstract

On Effective Slack Reclamation in Task Scheduling for Energy Reduction
Young Choon Lee and Albert Y Zomaya
Page: 175~186, Vol. 5, No.4, 2009
10.3745/JIPS.2009.5.4.175
Keywords: Scheduling, Energy Awareness, Green Computing, Dynamic Voltage and Frequency Scaling, Data Centers
Show / Hide Abstract

A Security Metrics Taxonomization Model for Software-Intensive Systems
Reijo M Savola
Page: 197~206, Vol. 5, No.4, 2009
10.3745/JIPS.2009.5.4.197
Keywords: Security Metrics, Security Objectives, Taxonomy, Correctness, Effectiveness, Efficiency
Show / Hide Abstract

Two-Tier Storage DBMS for High-Performance Query Processing
Sang-Hun Eo, Yan Li, Ho-Seok Kim and Hae-Young Bae
Page: 9~16, Vol. 4, No.1, 2008
10.3745/JIPS.2008.4.1.009
Keywords: DBMS, Storage Management, Query Processing
Show / Hide Abstract

Policy Adjuster-driven Grid Workflow Management for Collaborative Heart Disease Identification System
Shengzhong Deng, Chan-Hyun Youn, Qi Liu, Hoe Young Kim, Taoran Yu and Young Hun Kim
Page: 103~112, Vol. 4, No.3, 2008
10.3745/JIPS.2008.4.3.103
Keywords: Grid Worfklow, Collaborative Healthcare Platform, SLA, Policy Adjuster
Show / Hide Abstract

Mobility Management Survey for Home-eNB Based 3GPP LTE Systems
Hyoungwon Kwak, Poongup Lee, Yohan Kim, Navrati Saxena and Jitae Shin
Page: 145~152, Vol. 4, No.4, 2008
10.3745/JIPS.2008.4.4.145
Keywords: Home-eNB, 3GPP LTE (Long Term Evolution), Mobility Management
Show / Hide Abstract

Membership Management based on a Hierarchical Ring for Large Grid Environments
Tae-Wan Gu, Seong-Jun Hong, Saangyong Uhmn and Kwang-Mo Lee
Page: 8~15, Vol. 3, No.1, 2007
None
Keywords: P2P, Membership Overlay, Membership Management, Hierarchical Ring
Show / Hide Abstract

Actual Condition and Issues for Mobile Security System
Kouichi Sakurai and Kazuhide Fukushima
Page: 54~63, Vol. 3, No.2, 2007
None
Keywords: Mobile Security, Mobile Malware, Mobile DRM System, Mobile WiMAX Security, Group Key Management
Show / Hide Abstract

A Delegation Model based on Agent in Distributed Systems
Kyu Il Kim, Joo Chang Lee, Won Gil Choi, Eun Ju Lee and Ung Mo Kim
Page: 82~88, Vol. 3, No.2, 2007
None
Keywords: XACML, SAML, Agent
Show / Hide Abstract

Secure Key Management Protocol in the Wireless Sensor Network
Yoon-Su Jeong and Sang-Ho Lee
Page: 48~51, Vol. 2, No.1, 2006
None
Keywords: Cluster, Key Management Protocol, WSN
Show / Hide Abstract

A Practical Security Risk Analysis Process and Tool for Information System
YoonJung Chung, InJung Kim and DoHoon Lee
Page: 95~100, Vol. 2, No.2, 2006
None
Keywords: Risk Management, Asset, Threats, Vulnerability, Countermeasure
Show / Hide Abstract

A Quality Assurance Process Model on Fault Management
Hyo-Soo Kim and Cheong Ho Baek
Page: 163~169, Vol. 2, No.3, 2006
None
Keywords: TMN, fault management, ERP, UML, RUP
Show / Hide Abstract

Design and Implementation of an RFID-based Enterprise Application Framework based on Abstract BP and Kerberos
Kyuhee An, Kiyeal Lee and Mokdong Chung
Page: 170~177, Vol. 2, No.3, 2006
None
Keywords: RFID, EPCglobal Network, Framework, Business Process, Computer Security
Show / Hide Abstract

A Light-weight and Dynamically Reconfigurable RMON Agent System
Jun-Hyung Lee, Zin-Won Park and Myung-Kyun Kim
Page: 183~188, Vol. 2, No.3, 2006
None
Keywords: Network management, RMON agent system, Dynamic reconfiguration.
Show / Hide Abstract

Performance Analysis of the Distributed Location Management Scheme in Large Mobile Networks
Dong Chun Lee, Hong-Jin Kim, Jong Chan Lee and Yi Bing Lin
Page: 55~61, Vol. 1, No.1, 2005
None
Keywords: Distributed Location Management, LMN, Performance Analysis, IMT-2000
Show / Hide Abstract

Two-Dimensional Qualitative Asset Analysis Method based on Business Process-Oriented Asset Evaluation
Jung-Ho Eom, Seon-Ho Park, Tae-Kyung Kim and Tai-Myoung Chung
Page: 79~85, Vol. 1, No.1, 2005
None
Keywords: Risk management, Risk Analysis, Asset analysis, 2-dimensional qualitative analysis
Show / Hide Abstract

Trusted Certificate Validation Scheme for Open LBS Application Based on XML Web Services
Kiyoung Moon, Namje Park, Kyoil Chung, Sungwon Sohn and Jaecheol Ryou
Page: 86~95, Vol. 1, No.1, 2005
None
Keywords: Location-based service, Open LBS security, XKMS, XML security, XML web services
Show / Hide Abstract

A Study on RFID System with Secure Service Availability for Ubiquitous Computing
Dae-Hee Seo and Im-Yeong Lee
Page: 96~101, Vol. 1, No.1, 2005
None
Keywords: RFID, Service Availability, Secure Communication, Network Management Ubiquitous Computing
Show / Hide Abstract