Voronoi Diagram and Microstructure of Weldment; J. Cho, M. Choi.
High-SNR Approximate Closed-Form Formulas for the Average Error Probability of M-ary Modulation Schemes over Nakagami-q Fading Channels; H. Lee.
Performance Evaluation of IEEE 802.15.6 MAC with User Priorities for Medical Applications; L.Yang, et al.
Using Dead Reckoning, GPS and Fingerprinting for Ubiquitous Positioning; H.-H. Chiu, et al.
Multi-core Scheduling Scheme for Wireless Sensor Nodes with NVRAM-based hybrid memory; S. Oh, Y. Ryu.
Security Scheme for LTE Initial Attach; U. Jang, et al.
ASiPEC: An Application Specific Instruction-Set Processor for High Performance Entropy Coding; S.-H. Choi, et al.
An Enhanced Cooperative Spectrum Sensing Scheme based on New Rule of Combining Evidences in Cognitive Radio; M. Sajjad Khan, I.Koo.
A Design of an Intrusion-Tolerant System based on Effective Resource Conversion; S. Heo, et al.
An Adaptive Mobile Service Execution Framework in the Cloud Computing Environment; X. Yin, et al.
Trajectory Prediction for using real Data and real meteorological data; Y. Kim, et al.
The ADS-B Protection Method for Next-Generation Air Traffic Management System; S.-H. Lee, et al.
Interactive drawing Based on Hand Gesture; T.-E. Kim.
Nullifying Malicious Users for Cooperative Spectrum Sensing in Cognitive Radio Networks Using Outlier Detection Methods; P. Prasain, et al.
A Study on Electronic-Money Technology using Near Field Communication; M.-S. Jung.
A Novel Android Memory Management Policy Focused on Periodic Habits of a User; J. H. Kim, et al.
Care Record Summary Validation Tool with Social Network Service; J. W. Sin, et al.
Performance Study of an Adaptive Trickle Scheme for Wireless Sensor Networks; Y.-W. Lin, P.-H. Wang.
A New Distributed Grid Scheme utilizing Node-based Preprocessing Technique for Supporting k-NN Queries; H. Lee, et al.
A Cooperative GPS Approach for Improving Positioning Accuracy in a Location Based System; R. Islam, J. Kim.
Intelligent Evaluation Models based on Different Routing Protocols in Wireless Sensor Networks; N. Cao, et al.
Implementation of Personalized Wellness Service; M. Kim, et al.
SOM Clustering Method using user's features to classify profitable customer for Recommender Service in u-Commerce; C. Y. Sung, et al.
A Performance Improvement Scheme for Discovery Service; P. Liu, et al.
A Cross Cloud Authorization Mechanism Using NFC and RBAC Technology; H.-S. Jan, et al.
A Study on High Security Authentication Mechanism for 3G/WLAN Networks; W.-C. Wu, H.-T. Liaw.
A Simple Authentication Scheme and Access Control Protocol for VANETs; W.-C.Wu, Y.-M. Chen.
Decision Tree Approach to Predict lung Cancer the Data Mining Technology; J.-H. Kao, et al.
Study of Customer Value and Supplier Dependence with the RFM Model; J.-H. Kao, et al.
An assistance mechanism bsed on active RFID and RSSI tracking technology for monitoring rehabilitation patients; C.-S. Wang, et al.
Feature Selection for Support Vector Machines base on Modified Artificial Fish Swarm Algorithm; K.-C. Lin, et al.
A new Remote Desktop Approach with Mobile Devices: Design and Implementation; T.-Y. Huang, et al.
Mitigating DoS Attacks based on Recovery-based ITS in Cloud; B. Jang, et al.
A Databases Strategy in Redundant Web Servers with Fault-Resilience for a Computing Grid; M.-h. Ok.
Implementation of Low Power LED Display Controller using Adiabatic Operation; K.-R. Lee, et al.
Hand Gesture Recognition using 8-Directional Vector Chains in Quantization Space; S. Lee, et al.
Forensic