default search action
FGCN 2008: Hainan Island, China
- The Second International Conference on Future Generation Communication and Networking, FGCN 2008, Volume 2, Workshops, Hainan Island, China, December 13-15, 2008. IEEE Computer Society 2008
FGCN 2008 Workshops NA 2008
- Hoon-Ju Chung, Sang-Bong Byun, Hyun-woong Ju, Yun Seon Do, Dae-Hwan Kim, Byeong-Dae Choi, Yong-Hwan Lee:
An LCoS Microdisplay for Video Conference on Wireless Network. 3-6 - Xun Li, Sang Bong Yoo:
Extended Role-Based Security System Using Context Information. 7-12 - Woochul Shin, Xun Li, Sang Bong Yoo:
Access Control of RFID Middleware Using Extended Usage Control Model. 13-18 - Yong-Tae Kim, Yoon-Su Jeong, Jung-Hwan Hwang, Kijeong Lee, Randy S. Tolentino, Sang Ho Lee, Gil-Cheol Park:
A Design and Implementation of USN-Based Mobile Web Services Framework. 19-23 - In-Sik Choi, Ill-Keun Rhee:
Performance Comparison of Time-Frequency Analysis Methods for Radar Signature Analysis. 24-27 - Daeho Lee, Young Jae Lee:
Sensing and Motion Control of Virtual Objects for Web Camera-Based Game. 28-33 - Woo-Jun Park:
Representation and Comparison of Fuseki Patterns of Go-Games. 34-37 - Hui Zhao, Kwangjai Lee, Seungjin Park, Jong-Hun Chun, Jong-An Park:
Region Based Features for Image Analysis and Retrieval Using Local Histogram Refinement. 38-45 - Youngeun An, Gwangwon Kang, Il-Jung Kim, Hyunsook Chung, Jong-An Park:
Shape from Focus through Laplacian Using 3D Window. 46-50 - Kwan-Houng Lee, Jin-Gu Kang, Nam-Seo Park, Choong-Mo Yun, Jae-Jin Kim:
A Low Power Communication Circuit Design Using Selective Glitch Removal Method. 51-56 - Jae-Jin Kim, Hyeon-Mi Yang, Keun Ho Ryu, Hi-Seok Kim:
FPGA Low Power Technology Mapping for Reuse Module Design under the Time Constraint. 57-61 - Chayoung Kim, Jinho Ahn:
Novel Gossip-Based Multicast Protocol with No Global View Information. 62-65 - Jong Ku Kim, Seung-Hoon Chae, Sung Jin Lim, Sung Bum Pan, Daesung Moon:
Performance Analysis of Hybrid Fingerprint Matching Methods. 66-69 - Sung Jin Lim, Hae-Min Moon, Seung-Hoon Chae, Sung Bum Pan, Yongwha Chung, Min Hyuk Chang:
Dual Watermarking Method for Integrity of Medical Images. 70-73 - Sangook Moon:
Design of a Scalable RSA Cryptoprocessor Embedded with an Efficient MAC Unit. 74-77 - Kyung-chul Cho, Young-Chang Kang, Sun-hyung Kim:
Performance Analysis of the pi/4-DQPSK-OFDM System with Equalizer for the Wireless Multimedia Communication. 78-81 - Hye-Youn Lim, Young-Do Lim, Dae-Seong Kang:
The Performance Improvement of License Plate Recognition System Using Composite Color and Artificial Hippocampus Algorithm. 82-85 - Jaeyong Han, Sunheum Lee, Sunhyung Kim, Sang-Min Han:
Development of Home Network Gateway Supporting both Wire and Wireless Communication. 86-89 - Changbok Jang, Jeongseok Kim, Hyokyung Chang, Eui-In Choi, Bong-hoi Kim, Gang-Soo Lee:
Method of Profile Storage for Improving Recommendation Accuracy on Ubiquitous Computing. 90-94 - Byung-Seok Park, Cheoul-Shin Kang, Young-Hoon Lee:
Performance Evaluation and Modeling for Korea Standard of PLC MAC. 95-98 - SungHeun Nam, YunHee Kang:
XML Schema Design for Web Service Quality Management. 99-102 - Dong-Hee Park, Yoonsik Kwak:
Design of Novel On-Chip Antennas with Multi-band for UWB Applications. 103-105 - Kab-Seung Kou, Gang-Soo Lee:
Modeling and Analysis of CC-Based Security Assurance for Composed Systems. 106-111 - Oliver C. Agustin, Byung-Joo Oh:
Automatic Milled Rice Quality Analysis. 112-115 - SeokJin Im, JinTak Choi, Seiseung Park, Jinsong Ouyang:
A Multi-level Grid-Based Air Indexing Scheme for Window Query Processing in Wireless Data Broadcast Environments. 116-119 - Anish Prasad Shrestha, Dong-You Choi, Joon Lee, Seung Jo Han, Soon-Suck Jarng:
Investigating Authentication Architecture Based on Mobility in Heterogeneous Network. 120-123 - Woo Sik Kim, Hyun Ah Kim, Jin-Ho Ahn, Byung In Moon:
System-Level Development and Verification of the FlexRay Communication Controller Model Based on SystemC. 124-127 - Woonkang Heo, Minseok Oh:
Performance of Expanding Ring Search Scheme in AODV Routing Algorithm. 128-132 - Yul Pyo Hong, Young-Jae Choi, Tae Goo Kim, Yunsik Kwak, Ki Hyung Joe, Hyung-Il Kang, Seok Il Song:
Energy Efficient Data Centric Storage for Sensor Networks Employing Multilevel Grid Techniques. 133-136 - Lunman Deng, Jeong-Young Song:
A Number Plate Recognition System for Abnormal Data. 137-140 - Bongeun Gu:
Revised Gaze Proximity as Context Information. 141-144 - Rosslin John Robles, Sang-Soo Yeo, Young-Deuk Moon, Gilcheol Park, Seoksoo Kim:
Online Games and Security Issues. 145-148 - Yingwei Li, Zhengtao Yu, Xiangyan Meng, Wen-Gang Che, Cunli Mao:
Question Classification Based on Incremental Modified Bayes. 149-152 - Zhengtao Yu, Bin Deng, Bo Hou, Lu Han, Jianyi Guo:
Word Sense Disambiguation Based on Bayes Model and Information Gain. 153-157 - Rudy Adipranata, Eddy, Cherry G. Ballangan, Ronald P. Ongkodjojo:
Fast Method for Multiple Human Face Segmentation in Color Image. 158-161 - Fufang Li, Deyu Qi:
Research on Grid Resource Allocation Algorithm Based on Fuzzy Clustering. 162-166 - Hye-Jin Jeong, Yong-Sung Kim:
Index Weight Decision Technique for Search Reliable Documents. 167-172 - Yongxin Feng, Yuntao Zhao, Chengsheng Pan:
The Research of Reconfiguration Technology in Mobile Ad Hoc Network. 173-177 - Chang-Yong Lee, Hwan-Kuk Kim, KyoungHee Ko, JeongWook Kim, Hyun-Cheol Jeong:
A Study on Structure for Monitoring and Detecting VoIP Abnormal Traffic. 178-182 - Xiaodong Liu, Xiang Gao:
Anonymous ID Signature Scheme with Provable Identity. 183-186 - Fei Ge, Yuan-ni Wang:
An Adaptive Energy Efficient Topology for Wireless Sensor Networks. 187-192 - Yinghua Lu, Yao Fu, Jinsong Li, Xiaolu Li, Jun Kong:
A Multi-modal Authentication Method Based on Human Face and Palmprint. 193-196 - Han-Cheng Hsiang, Hsiang-Chou Kuo, Wei-Kuan Shih:
Security Enhancement for a Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems. 197-200 - Abderrahim Ghadi, Driss Mammass, Maurice Mignotte, Alain Sartout:
Formalism of the Access Control Model Based on the Marqued Petri Nets. 201-204 - Zhefu Yu, Huibiao Lu, Chuanying Jia:
A New Weighted Association Rule Suitable for Causes and Effects Analysis. 205-208 - Ki-Hong Park, Yoon-Ho Kim, Joo-shin Lee:
Watermarking Using the Local Relation of Wavelet Coefficient. 209-212 - Tianzhou Chen, Jiangwei Huang, Liangxiang Xiang, Zhenwei Zheng:
A Practical Dynamic Frequency Scaling Scheduling Algorithm for General Purpose Embedded Operating System. 213-216 - Wei Song, Yunwei Dong:
On Designing and Verifying Smart Home Embedded Software Model Based on AADL. 217-221 - Lingxiang Xiang, Jiangwei Huang, Tianzhou Chen:
Coordinating System Software for Power Savings. 222-225 - Jian Chen, Degui Feng, Wei Hu, Tianzhou Chen:
A Java Development Platform in Mobile System for Smart Home. 226-229 - Jianhua Dai, Xiaochun Liu, Yu Yi, Huaijian Zhang, Jingjing Wang, Shaomin Zhang, Xiaoxiang Zheng:
Experimental Study on Neuronal Spike Sorting Methods. 230-233
FGCN 2008 Workshops CNM 2008
- Yoon Ho Kim, Young Park:
e-Gov Net Based Emergency Management Service. 237-240 - Hwang-Bin Yim, Nam-gyu Ko:
A Study of the Effect of Very High Voltage 345kV T/L on Broadcasting Radio Wave and Human Body. 241-244 - Woon-Yong Kim, Jae-Pil Chung:
An Open Software Approach for Multimedia Services System Based on RFID. 245-248 - Wei He, Chunhe Xia, Cheng Zhang, Yi Ji, Xinyi Ma:
A Network Security Risk Assessment Framework Based on Game Theory. 249-253 - Youn-Gyou Kook, Woon-Yong Kim, Jae-Oh Lee:
Agent-Based Data Gathering System for Simulation in APC. 254-257 - Se-Kab Oh, Jae-Myeong Choi, Nam-Sung Kim, Heau-Jo Kang:
The Proposed UMA Mode in DMB CAS Authentication Process. 258-262 - Jae-Myeong Choi, Heau-Jo Kang, Yong-Seok Choi:
A Study on the Wireless Body Area Network Applications and Channel Models. 263-266 - Long Bora, Heau-Jo Kang:
A Study on the Performance of OFDM Transmission Scheme for QAM Data Symbol. 267-270
FGCN 2008 Workshops F2GC 2008
- Gérard Wagener, Alexandre Dulaunoy, Thomas Engel:
Towards an Estimation of the Accuracy of TCP Reassembly in Network Forensics. 273-278 - Keun-Gi Lee, Hyewon Lee, Chang-Wook Park, Jewan Bang, Kwon-youp Kim, Sangjin Lee:
USB PassOn: Secure USB Thumb Drive Forensic Toolkit. 279-282 - Kyung-Soo Lim, Sangjin Lee:
A Methodology for Forensic Analysis of Embedded Systems. 283-286
FGCN 2008 Workshops STAS 2008
- Hao Wang, Furong Wang, Xu Xie, Laurence Tianruo Yang:
An Auxiliary Ground Station Based Traffic Load Balancing Scheme for LEO Satellite Systems. 289-292 - Sanghoon Kim, Sangmu Lee, Seungjong Kim:
Object Tracking of Mobile Robot Using Moving Color and Shape Information for the Aged Walking. 293-297 - Kanghun Jeong, Dongil Han, Yong-Guk Kim, Hyeonjoon Moon:
Optimization of Face Recognition Algorithms for Ubiquitous Computing Environment. 298-301 - Yu-Jin Hong, Ig-Jae Kim, Sang Chul Ahn, Hyoung-Gon Kim:
Activity Recognition Using Wearable Sensors for Elder Care. 302-305 - Seong-Ho Choi, Hyung-Kun Park, Nam Ho Kim, Sang-Hoon Kim, YunSeop Yu:
Design of A Power-, Delay-, and Emergency-Efficient Protocol of Ubiquitous Sensor Network Systems for Silver Town Applications. 306-309
FGCN 2008 Workshops SNA 2008
- Henry Y. K. Lau, Tommy W. C. Lai:
Object Tracking Using a Bio-inspired Wireless Sensor Network. 313-318 - Tongsen Wang, Lei Wang, Zhijun Xie, Ronghua Yang:
Data Compression Algorithm Based on Hierarchical Cluster Model for Sensor Networks. 319-323 - Kyoungbok Ji, Changhwa Kim, Sangkyung Kim:
Implementation of Energy-Efficient Node Management in Wireless Sensor Networks. 324-327 - Albert Ko, Henry Y. K. Lau, Rex P. S. Sham:
Application of Distributed Wireless Sensor Network on Humanitarian Search and Rescue Systems. 328-333 - Haejung Kim, Sangkyung Kim, Changhwa Kim, Chanjung Park:
Directional Antennas Based MAC Mechanism for Spatial Reuse. 334-337 - Xin Zhao, Xiaodong Wang:
Design and Implementation of Hybrid Broadcast Authentication Protocols in Wireless Sensor Networks. 338-342 - Young-Kwang Nam, Kwang-Yong Lee, Byoung-Dai Lee:
Query Optimization with Metadata Routing Tables on Nano-Q+ Sensor Network with Heterogeneous Sensors. 343-347 - Jeong-Dong Kim, Dongwon Jeong, Doo-Kwon Baik:
Extending the UbiMDR Supporting Situation-Aware Access Control. 348-351 - Dongwon Jeong, Hyejin Jeong, Young-Sik Jeong:
SS-RBAC: Secure Query Processing Model for Semantic Sensor Networks. 352-355 - Jinhyung Kim, Dongwon Jeong, Doo-Kwon Baik:
A Vision: RDB-Based XML Security Models Considering Data Levels. 356-361
FGCN 2008 Workshops WITS 2008
- Karyn Wei-Ju Khoo, K. Daniel Wong:
Transportation Telematics Using Mobile Phone Position Information. 365-368 - Kaveh Shafiee, Victor C. M. Leung:
A Reliable Robust Fully Ad Hoc Data Dissemination Mechanism for Vehicular Networks. 369-373 - Jinhai Chen, Qinyou Hu, Renyu Zhao, Peng Guojun, Chun Yang:
Tracking a Vessel by Combining Video and AIS Reports. 374-378
FGCN 2008 Workshops WAMSNet 2008
- Hai Hu, Yutang Min, Xianzhong Xie, Furong Wang, Jun Yuan:
Distributed Cooperative Dynamic Spectrum Management Schemes for Industrial Wireless Sensor Networks. 381-386 - Yutang Min, Laurence Tianruo Yang, Furong Wang, Wenqing Wang:
Dynamic Sleeping Algorithm Based on AHP for Wireless Sensor Networks. 387-392 - Qingyun Dai, Hong Bao, Yihong Liu, Zexi Liu, Ke Zhou, Jin Wang:
433MHz Wireless Network Technology for Wireless Manufacturing. 393-397 - Xu Xie, Furong Wang, Hao Wang, Kewei Li:
Adaptive Multi-channel MAC Protocol for Dense VANET Using Directional Antennas. 398-401
FGCN 2008 Workshops SH 2008
- Shiuh-Jeng Wang, Yuh-Ren Tsai, Jian-Jhih Shen:
Dynamic Threshold Multi-secret Sharing Scheme Using Elliptic Curve and Bilinear Maps. 405-410 - Rachid Kadouche, Mounir Mokhtari, Sylvain Giroux, Bessam Abdulrazak:
Personalization in Smart Homes for Disabled People. 411-415 - Kejun Du, Daqing Zhang, Muzaaliff W. Musa, Mounir Mokhtari, Xingshe Zhou:
Handling Activity Conflicts in Reminding System for Elders with Dementia. 416-421 - Frode Eika Sandnes, Yo-Ping Huang, Yueh-Min Huang:
Browsing of Large Video Collections on Personal Video Recorders with Remote Control Navigation Keys. 422-427 - Ben Yan, Masahide Nakamura, Ken-ichi Matsumoto:
Deriving Safety Properties for Home Network System Based on Goal-Oriented Hazard Analysis Model. 428-436 - John Herbert, John O'Donoghue, Xiang Chen:
A Context-Sensitive Rule-Based Architecture for a Smart Building Environment. 437-440 - Hiroshi Miki, Atsuhiro Kojima, Koichi Kise:
Environment Recognition Based on Human Actions Using Probability Networks. 441-446 - Pierre Busnel, Paul El Khoury, Sylvain Giroux, Keqin Li:
Achieving Socio-technical Confidentiality Using Security Pattern in Smart Homes. 447-452 - Hongbo Ni, Xingshe Zhou, Daqing Zhang, Kejian Miao:
Discovering Inhabitant. 453-456 - Howard D. Wactlar, Robert Walters, John Bertoty, Alexander G. Hauptmann:
The Aware Community. 457-462 - Charles Gouin-Vallerand, Sylvain Giroux, Bessam Abdulrazak, Mounir Mokhtari:
Toward a Self-Configuration Middleware for Smart Spaces. 463-468 - Haipeng Wang, Xingshe Zhou, Tao Zhang:
Unobtrusive Assistant for Elders with Memory Decline. 469-472 - Dan Jiang, Mo Li:
Quality of Service in the Home Network. 473-476
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.