


default search action
RACS 2013: Montreal, QC, Canada
- Ching Y. Suen, Amir G. Aghdam, Minyi Guo, Jiman Hong, Esmaeil S. Nadimi:

Research in Adaptive and Convergent Systems, RACS'13, Montreal, QC, Canada, October 1-4, 2013. ACM 2013, ISBN 978-1-4503-2348-2
Artificial intelligence & algorithm
- Jeongmin Kim, Ri Choe, Kwang Ryel Ryu:

Multi-objective optimization of dispatching strategies for situation-adaptive AGV operation in an automated container terminal. 1-6 - Nhauo Davuth, Sung-Ryul Kim:

A better edit distance measure allowing for block swaps. 7-11 - Michael Doherty, Chih-Cheng Hung:

Performance consequences of introducing an internal penalty function to a genetic algorithm for scheduling. 12-15 - Juan Mendivelso, Yoan J. Pinzón, Inbok Lee:

Finding overlaps within regular expressions with variable-length gaps. 16-21 - Ying Qiao, Chang Leng, Hongan Wang, Jian Liu:

Developing a real-time inference approach for rule-based reasoning systems. 22-27 - Anuj Sharma

, Shubhamoy Dey:
A boosted SVM based sentiment analysis approach for online opinionated text. 28-34 - Shrawan Kumar Trivedi

, Shubhamoy Dey:
Effect of feature selection methods on machine learning classifiers for detecting email spams. 35-40
Short papers (posters)
- Hamid Mcheick

, Karam Mustapha, Sehl Mellouli
:
Towards of complex natural disasters systems framework. 41-42 - Sung-il Oh, Min Sik Kim, Inbok Lee:

An efficient bit-parallel algorithm for IDS. 43-44 - Anand Paul

:
Graph based M2M optimization in an IoT environment. 45-46 - Adolfo Avila Barón

, Margareth Lorena Alfonso, Pedro Enrique Jimenez:
Electronic systems integration of a locomotion rehabilitation platform with ANFIS simulation. 47-50
Cloud computing & programming language
- Mikyung Kang, Dong-In Kang, Seungwon Lee, Jaedon Lee:

A system framework and API for run-time adaptable parallel software. 51-56 - Paul Tarau:

Two mechanisms for generating infinite families of pairing bijections. 57-62 - HyoYoung Kim, Sungtae Ryu, Hwansoo Han:

CUBIT: compact bitmap profiling for dynamic data dependence analysis. 63-68 - Fei Cao, Dabin Ding, Dunren Che, Mengxia Michelle Zhu, Wen-Chi Hou:

Scheduling data processing flows under budget constraint on the cloud. 69-74 - M. Newlin Rajkumar, V. Venkatesa Kumar, R. Sivaramakrishnan

:
Efficient integrity auditing services for cloud computing using raptor codes. 75-78
Short paper (poster)
- Sanghoon Choi, Jinman Jung:

A locality-aware home migration for software distributed shared memory. 79-81
Database & data mining
- Choukri Djellali:

Using hamming similarity to map ontology learning: a new data mining system. 82-87 - Choukri Djellali:

A new on-line digital conceptual model oriented corporate memory constructing: taking unstructured text as a case. 88-93 - Min-Hee Jang, Tae-Hwan Eom, Sang-Wook Kim, Young-Sup Hwang:

A semantic similarity measure in document databases: an earth mover's distance-based approach. 94-99 - Junping Sun, Jiman Hong:

Index selection: a query pattern mining based approach. 100-106 - Jeongin Kim, Eunji Lee, Junho Choi, Yonggeun Bae, Miah Ko, Pankoo Kim:

Monitoring social relationship among Twitter users by using NodeXL. 107-110 - Masoud Reyhani Hamedani

, Sang-Chul Lee, Sang-Wook Kim:
On combining text-based and link-based similarity measures for scientific papers. 111-115
Short papers (posters)
- Sang-Chul Lee, Sang-Wook Kim, Sunju Park:

Recommendation in online shopping malls: results and experiences. 116-117 - Markus Rickert, Maximilian Eibl:

Evaluation of media analysis and information retrieval solutions for audio-visual content through their integration in realistic workflows of the broadcast industry. 118-121
Image processing
- Sung-Il Joo, Sun-Hee Weon, Hyung Il Choi:

A novel method of artificial caption detection in videos using temporal and spatial information. 122-127 - Deqian Fu

, Shunbo Hu, Seong Tae Jhang:
Visual tracking with representative templates based on low-rank matrix. 128-133 - Zhenhai Wang, Kicheon Hong:

A new approach for adaptive background object tracking based on Kalman filter and mean shift. 134-139 - K. Bharanitharan:

Improved pre-processing algorithm in spatial scalability for scalable video coding. 140-145 - Ai Min Li, Pil Seong Park:

An association-based multi-target tracking method. 146-151 - Tuan-Anh Nguyen, Beomsu Kim, Min-Cheol Hong:

MRF-based adaptive detection approach: a framework for restoring image degraded by Gaussian noise. 152-156 - Jiayong Deng, Youngjoon Han:

A real-time system of lane detection and tracking based on optimized RANSAC B-spline fitting. 157-164 - Jong-Geun Oh, Min-Cheol Hong:

Adaptive retinex back-light compensation algorithm using skewness information of image. 165-170 - Min Woo Park

, Jung Pil Park, Soon Ki Jung
:
Real-time vehicle detection using equi-height mosaicking image. 171-176 - Zhe Li, Wei Wang, Sung Y. Shin, Hyung Do Choi:

Enhanced roughness index for breast cancer benign/malignant measurement using Gaussian mixture model. 177-181 - Byung K. Jung, Seong-Ho Son

, Jeong-Ki Pack:
Magnetic resonance image retrieval based on contour to centroid triangulation with shape feature similarity. 182-186 - Hyun I. Kim, Sung Y. Shin, Wei Wang, Soon-Ik Jeon:

SVM-based Harris corner detection for breast mammogram image normal/abnormal classification. 187-191
Short paper (poster)
- Myoung-Jin Kim, Beomsu Kim, Min-Cheol Hong:

Image enhancement and post-processing for low-resolution compressed video. 192-195
Network computing
- Hsueh-Wen Tseng

, Shiann-Tsong Sheu, Shiau-Yi Ou:
Node joining and grouping scheme for avoiding hidden node problem in IEEE 802.15.4 wireless sensor networks. 196-201 - Paul Moulema, Wei Yu

, Guobin Xu, David W. Griffith, Nada Golmie, Chao Lu, David H. Su:
On simulation study of mesh-based protocols for smart grid communication networks. 202-207 - Geumsan Jo, Hyun Jung Choe, Hyunseung Choo:

Predictive handover scheme using mobility history in PMIPv6. 208-213 - Yung-Feng Lu, Jun Wu

, Chin-Fu Kuo:
A path-generation framework for real-time query processing in wireless sensor networks. 214-219 - Wei-Te Wong, Ai-Chun Pang, Miao-Ru Hsu:

RAT selection for heterogeneous wireless networks using support vector machine. 220-225 - Esmaeil S. Nadimi

, Victoria Blanes-Vidal
, Per Michael Johansen:
Bayesian-based localization in inhomogeneous transmission media. 226-231 - Jekuk Yun, Beomseok Hong, Yanggon Kim:

The BGP monitoring and alarming system to detect and prevent anomaly IP prefix advertisement. 232-236 - Hongseok Yoo, Dongkyun Kim:

C2-CODER: coverage-controlled network CODEd repetition for vehicular ad-hoc networks. 237-241 - A. (Zizo) Farrag:

Fault-tolerant circulant digraphs networks. 242-247 - Jaesung Park, Yujin Lim:

An overlay network construction method using swarm intelligence for an application-level multicast service. 248-253 - Basit Manzoor, Nadeem Javaid

, Obaid Ur Rehman, Safdar Hussain Bouk, Syed Hassan Ahmed
, Se Hyun Park, Dongkyun Kim:
Energy aware error control in cooperative communication in wireless sensor networks. 254-260 - Jaeseok Shim, Yujin Lim, Jaesung Park:

Architectural design of cloud gateway in smart surveillance system. 261-266 - Danyang Zhang, Fan Li, Zhou Su:

A distortion estimation based packet scheduling strategy for H.264 video over wireless networks. 267-272 - Sungwon Lee, Dongkyun Kim:

Fast retransmit for flooding-based routing in underwater wireless sensor networks. 273-276 - Mohammad Mehdi Asadi

, Amir Ajorlou, Amir G. Aghdam, Stéphane Blouin:
Global network connectivity assessment via local data exchange for underwater acoustic sensor networks. 277-282 - Jalal Habibi, Amir G. Aghdam, Ali Ghrayeb

:
A framework for analyzing the performance of distributed lifetime-efficient routing schemes in wireless sensor networks. 283-288
Short papers (posters)
- Donghwa Kang, Daeshin Park, Yookun Cho:

A worm-containing strategy using a social network and PageRank. 289-292
Security
- Haokun Tang, Jun Huang, Wei Wang:

A novel passive worm defense model for multimedia sharing. 293-299 - Wei Yu

, Zhijiang Chen, Guobin Xu, Sixiao Wei, Nnanna Ekedebe:
A threat monitoring system for smart mobiles in enterprise networks. 300-305 - Younsik Jeong, Seong-je Cho, Moonju Park, Jeonguk Ko, Hyungjoon Shim, Joonmo Kim, Sangchul Han, Minkyu Park:

An efficient protection scheme of digital contents under mobile devices. 306-311 - Zhi-Guo Chen

, Sung-Ryul Kim:
Combining principal component analysis, decision tree and naïve Bayesian algorithm for adaptive intrusion detection. 312-316 - Kyoung-Soo Han, Jae Hyun Lim, Eul Gyu Im

:
Malware analysis method using visualization of binary files. 317-321 - Yeo Reum Lee, Boojoong Kang, Eul Gyu Im

:
Function matching-based binary-level software similarity calculation. 322-327 - Abdelwahab Hamou-Lhadj

, Syed Shariyar Murtaza, Waseem Fadel, Ali Mehrabian, Mario Couture, Raphaël Khoury:
Software behaviour correlation in a redundant and diverse environment using the concept of trace abstraction. 328-335 - Jeonguk Ko, Hyungjoon Shim, Dongjin Kim, Younsik Jeong, Seong-je Cho, Minkyu Park, Sangchul Han, Seong Baeg Kim:

Measuring similarity of android applications via reversing and K-gram birthmarking. 336-341 - Ho Kwon Lee, Hyung Soon Chung, Sung-Ryul Kim:

Memory hacking analysis in mobile devices for hybrid model of copyright protection for Android apps. 342-346
Short papers (posters)
- Phuong Do, Ho-Seok Kang, Sung-Ryul Kim:

Improved signature based intrusion detection using clustering rule for decision tree. 347-348 - Byeongho Kang, Boojoong Kang, Jungtae Kim, Eul Gyu Im

:
Android malware classification method: Dalvik bytecode frequency analysis. 349-350 - Sunwoo Kim, TaeGuen Kim, Eul Gyu Im

:
Real-time malware detection framework in intrusion detection systems. 351-352 - JaeKeun Lee, Boojoong Kang, Eul Gyu Im

:
Rule-based anti-anti-debugging system. 353-354 - Youngsu Park, Jiman Hong:

An effective API extraction scheme for dynamic binary similarity comparison. 355-356 - Minwoo Jang, Daeho Kim:

Filtering illegal Android application based on feature information. 357-358 - Bongjae Kim

, Jinman Jung:
Impact of multiple watermarks for protecting copyright of applications on smart mobile devices. 359-360 - Joonhyouk Jang, Bongjae Kim

, Yookun Cho:
Impact of software watermarking on smart devices. 361-362 - Hyunho Ji, Woochur Kim:

Design of a mobile inspector for detecting illegal Android applications using fingerprinting. 363-364
Software engineering
- Amrita Chaturvedi, Tadinada Vankata Prabhakar:

Ontology driven creational design patterns: creating objects on the fly. 365-372 - Tomás Cerný

, Michael J. Donahoo, Eunjee Song
:
Towards effective adaptive user interfaces design. 373-380 - Ajay Kumar Jha, Sooyong Jeong, Woo Jin Lee:

Value-deterministic search-based replay for android multithreaded applications. 381-386 - Sleiman Rabah, Serguei A. Mokhov

, Joey Paquet:
An interactive graph-based automation assistant: a case study to manage the GIPSY's distributed multi-tier run-time system. 387-394
Short papers (posters)
- Hamid Mcheick

, Youcef Baghdadi
, Naoufel Kraïem:
Towards of service-oriented design architecture method. 395-396 - Anupama Surendran, Philip Samuel:

Fault localization using forward slicing spectrum. 397-398
System software
- Junghoon Lee, Gyung-Leen Park, Il-Woo Lee, Wan-Ki Park:

Evaluation of prediction error effects in wind energy-based electric vehicle charging. 399-403 - Shuo-Hung Chen, Hsiao-Mei Lin, Kuo-Yi Chen, Yuan-Hao Chang

, Pen-Chung Yew
, Chien-Chung Ho:
A systematic methodology for OS benchmark characterization. 404-409 - Chin-Fu Kuo, Lieng-Cheng Chien, Yung-Feng Lu:

Scheduling algorithm with energy-response trade-off considerations for mixed task sets. 410-415 - Maw-Yi Chou, Chin-Hsien Wu:

PMCD: a parallel multi-controller design for solid-state drives. 416-421 - Ju Hee Choi, Jong Wook Kwak, Seong Tae Jhang, Chu Shik Jhon:

Data filter cache with word selection cache for low power embedded processor. 422-427 - Yuanfeng Wen, Chaitanya Belwal, Albert M. K. Cheng

:
Towards optimal priority assignments for the transactional event handlers of P-FRP. 428-433 - A. K. M. Jahangir Alam Majumder, Ishmat Zerin, Md. Miftah Uddin, Sheikh Iqbal Ahamed, Roger O. Smith:

smartPrediction: a real-time smartphone-based fall risk prediction and prevention system. 434-439 - Chaitanya Belwal, Albert M. K. Cheng

, Jim Ras, Yuanfeng Wen:
Variable voltage scheduling with the priority-based functional reactive programming language. 440-445 - Chi-Sheng Shih

, Trang-Khon Trieu:
Shadow phone: context aware device replication for disaster management. 446-453 - Mohammad Adibuzzaman

, Niharika Jain, Nicholas Steinhafel, Munirul M. Haque, Ferdaus Ahmed Kawsar, Sheikh Iqbal Ahamed, Richard Love:
Towards in situ affect detection in mobile devices: a multimodal approach. 454-460 - Po-Chun Huang, Yuan-Hao Chang

, Tei-Wei Kuo
, Chien-Chung Ho, Hyunseung Choo:
Joint management of performance-predictable virtualized storage devices with hard disk and flash memory. 461-466 - Dongwoo Kang, Heekwon Park, Jongmoo Choi:

Effect of page frame allocation pattern on bank conflicts in multi-core systems. 467-472 - Yan-Ru Chen, Yien-Chang Liao, Pi-Chen Chiu, Ai-Chun Pang:

Buddy2GuessWho: a smartphone application in on-line social network platform. 473-478 - Hyunjun Kim

, Joonwook Ahn, Sungtae Ryu, Jungsik Choi
, Hwansoo Han:
In-memory file system for non-volatile memory. 479-484
Short papers (posters)
- JeeHyun Yang, Kyujung Kim, George Legrady:

Viewer generated audio-visual communication system using Braille metaphor. 485-486 - Joonhyouk Jang, Yookun Cho, Jinman Jung, Gwangil Jeon:

Enhancing lookup performance of key-value stores using cuckoo hashing. 487-489 - Jae-Hoon An, Younghwan Kim, Kiman Jeon:

Design and implementation of the fusion simulator based on multi-shader GPU. 490-491 - Byung-Kun Park, Sang-Hee Yoon, Kyung-Seop Kim, Woon-Mook Kim:

XpeedQ: a reliable and efficient application level message queue. 492-494 - Min-Yu Tsai, Shih-Hao Hung

:
Hardware acceleration for proton beam Monte Carlo simulation. 495-496 - Eunseok Choi, Minwoo Jang:

A service-control framework based on digital watermarks for music streaming on smart devices. 497-498 - Bong-Joo Kim, Pankoo Kim, Hong Min, Chang Oan Sung, Jung-Yeop Kim, Eunseok Choi:

An efficient patient monitoring system. 499-500

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














