Search Word(s) in Title, Keywords, Authors, and Abstract: Target

Selective Encryption Algorithm Using Hybrid Transform for GIS Vector Map
Bang Nguyen Van, Suk-Hwan Lee and Ki-Ryong Kwon
Page: 68~82, Vol. 13, No.1, 2017

Keywords: Chaotic Map, GIS Vector Map, Selective Encryption, Vector Map Security
Show / Hide Abstract

Dorsal Hand Vein Identification Based on Binary Particle Swarm Optimization
Sarah Hachemi Benziane and Abdelkader Benyettou
Page: 268~283, Vol. 13, No.2, 2017

Keywords: Biometrics, BPSO, GPU, Hand Vein, Identification, OTSU
Show / Hide Abstract

Time-Delay and Amplitude Modified BP Imaging Algorithm of Multiple Targets for UWB Through-the-Wall Radar Imaging
Huamei Zhang, Dongdong Li, Jinlong Zhao and Haitao Wang
Page: 677~688, Vol. 13, No.4, 2017

Show / Hide Abstract

Bilingual Multiword Expression Alignment by Constituent-Based Similarity Score
Hyeong-Won Seo, Hongseok Kwon, Min-Ah Cheon and Jae-Hoon Kim
Page: 455~467, Vol. 12, No.3, 2016

Keywords: Bilingual Lexicon, Compositionality, Context Vector, Multiword Expression, MWE Alignment, Pivot Language
Show / Hide Abstract

Interactive Authoring Tool for Mobile Augmented Reality Content
Jiyoung Jeon, Min Hong, Manhui Yi, Jiyoon Chun, Ji Sim Kim and Yoo-Joo Cho
Page: 612~630, Vol. 12, No.4, 2016

Keywords: Augmented Reality, Authoring Tool, Interactive Mobile, Mobile App
Show / Hide Abstract

Personalizing Information Using Users’ Online Social Networks: A Case Study of CiteULike
Danielle Lee
Page: 1~21, Vol. 11, No.1, 2015

Keywords: CiteULike, Homophily, Information Personalization, Online Social Networks, Social Network-based Recommendations
Show / Hide Abstract

WebSHArk 1.0: A Benchmark Collection for Malicious Web Shell Detection
Jinsuk Kim, Dong-Hoon Yoo, Heejin Jang and Kimoon Jeong
Page: 229~238, Vol. 11, No.2, 2015

Keywords: Benchmark Test Collection, Malicious Web Application, Webshell, Web Shell Collection, Web Shell Detection
Show / Hide Abstract

Simple Pyramid RAM-Based Neural Network Architecture for Localization of Swarm Robots
Siti Nurmaini and Ahmad Zarkasi
Page: 370~388, Vol. 11, No.3, 2015

Keywords: Localization Process, RAM-Based Neural Network, Swarm Robots
Show / Hide Abstract

Efficient Greedy Algorithms for Influence Maximization in Social Networks
Jiaguo Lv, Jingfeng Guo and Huixiao Ren
Page: 471~482, Vol. 10, No.3, 2014
Keywords: Greedy Algorithm, Influence Maximization, Social Network
Show / Hide Abstract

Opinion Bias Detection Based on Social Opinions for Twitter
A-Rong Kwon and Kyung-Soon Lee
Page: 538~547, Vol. 9, No.4, 2013
Keywords: Social opinion, Personal opinion, Bias detection, Sentiment, Target
Show / Hide Abstract

Energy Efficient Architecture Using Hardware Acceleration for Software Defined Radio Components
Chen Liu, Omar Granados, Rolando Duarte and Jean Andrian
Page: 133~144, Vol. 8, No.1, 2012
Keywords: Software Communication Architecture, Software Defined Radio, Energy Efficiency, FPGA, Cognitive Radio
Show / Hide Abstract

An Adaptive Approach to Learning the Preferences of Users in a Social Network Using Weak Estimators
B. John Oommen, Anis Yazidi and Ole-Christoffer Granmo
Page: 191~212, Vol. 8, No.2, 2012
Keywords: Weak es timators, User's Profiling, Time Varying Preferences
Show / Hide Abstract

Expressive Exceptions for Safe Pervasive Spaces
Eun-Sun Cho and Sumi Helal
Page: 279~300, Vol. 8, No.2, 2012
Keywords: Exceptions, Safety, Programming models for Pervasive Systems, Pervasive Computing, Contexts, Situations
Show / Hide Abstract

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud
Eun-Ha Song, Hyun-Woo Kim and Young-Sik Jeong
Page: 347~358, Vol. 8, No.2, 2012
Keywords: Hardware Hardening, TPM, TPB, Mobile Cloud, System Behavior Monitoring, BiT Profiling
Show / Hide Abstract

A Single Mobile Target Tracking in Voronoi-based Clustered Wireless Sensor Network
Jiehui Chen, Mariam B.Salim and Mitsuji Matsumoto
Page: 17~28, Vol. 7, No.1, 2011
Keywords: Mobile Target Tracking, Sensor Network, Clustering, Voronoi Diagram
Show / Hide Abstract

Grobner Basis Attacks on Lightweight RFID Authentication Protocols
Daewan Han
Page: 691~706, Vol. 7, No.4, 2011
Keywords: RFID, Authentication Protocol, Algebraic Attack, Grobner Basis
Show / Hide Abstract

Utility-based Rate Allocation Scheme for Mobile Video Streaming over Femtocell Networks
Shan Guo Quan, Jian Xu and Young Yong Kim
Page: 151~158, Vol. 5, No.3, 2009
Keywords: Utility, femtocell network, backhaul, cross-talk, video streaming
Show / Hide Abstract

Automatic In-Text Keyword Tagging based on Information Retrieval
Jinsuk Kim, Du-Seok Jin, KwangYoung Kim and Ho-Seop Choe
Page: 159~166, Vol. 5, No.3, 2009
Keywords: Automatic In-Text Keyword Tagging, Information Retrieval, Pattern Matching, Boyer-Moore-Horspool Algorithm, Keyword Dictionary, Cross-Referencing, in-text content link
Show / Hide Abstract

A Feature Selection Technique based on Distributional Differences
Sung-Dong Kim
Page: 23~27, Vol. 2, No.1, 2006
Keywords: Feature Selection, Distributional Differences
Show / Hide Abstract

A Performance Analysis Model of PC-based Software Router Supporting IPv6-IPv4 Translation for Residential Gateway
Ssang-Hee Seo and In-Yeup Kong
Page: 62~69, Vol. 1, No.1, 2005
Keywords: Performance analysis model, Software PC router, IPv6-IPv4 translator, M/G/1/K, MMPP-2/G/1/K, residential gateway
Show / Hide Abstract

Image Restoration and Object Removal Using Prioritized Adaptive Patch-Based Inpainting in a Wavelet Domain
Rajesh P. Borole and Sanjiv V. Bonde
Page: 0~0, Vol. 0, No.0, 0
Keywords: Image Inpainting, Object Removal, Region Filling, Texture and Structure Propagation, Wavelet Inpainting
Show / Hide Abstract