Information Security and Assurance |
Fuzzy Based Threat Analysis in Total Hospital Information System / Nurzaini Mohamad Zain ; Ganthan Narayana Samy ; Rabiah Ahmad ; Zuraini Ismail ; Azizah Abdul Manaf |
An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model / Bo Zhang ; Qiuliang Xu |
A Supervised Locality Preserving Projections Based Local Matching Algorithm for Face Recognition / Yingqi Lu ; Cheng Lu ; Miao Qi ; Shuyan Wang |
Information Systems Security Criticality and Assurance Evaluation / Moussa Ouedraogo ; Haralambos Mouratidis ; Eric Dubois ; Djamel Khadraoui |
Security Analysis of 'Two-Factor User Authentication in Wireless Sensor Networks' / Muhammad Khurram Khan ; Khaled Alghathbar |
Directed Graph Pattern Synthesis in LSB Technique on Video Steganography / Debnath Bhattacharyya ; Arup Kumar Bhaumik ; Minkyu Choi ; Tai-hoon Kim |
Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-Based Improved K-Medoids Partitioning / Dakshina Ranjan Kisku ; Phalguni Gupta ; Jamuna Kanta Sing |
Post-quantum Cryptography: Code-Based Signatures / Pierre-Louis Cayrel ; Mohammed Meziani |
Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol / Danilo Valeros Bernardo ; Doan Hoang |
A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems / Bo Li ; Jianxin Li ; Tianyu Wo ; Xudong Wu ; Junaid Arshad ; Wantao Liu |
An Active Intrusion Detection System for LAN Specific Attacks / Neminath Hubballi ; S. Roopa ; Ritesh Ratti ; F.A. Barbhuiya ; Santosh Biswas ; Arijit Sur ; Sukumar Nandi ; Vivek Ramachandran |
Analysis on the Improved SVD-Based Watermarking Scheme / Huo-Chong Ling ; Raphael C-W. Phan ; Swee-Huay Heng |
Advanced Communication and Networking |
Applications of Adaptive Belief Propagation Decoding for Long Reed-Solomon Codes / Zhian Zheng ; Dang Hai Pham ; Tomohisa Wada |
Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks / Seong-Yong Choi ; Jin-Su Kim ; Seung-Jin Han ; Jun-Hyeog Choi ; Kee-Wook Rim ; Jung-Hyun Lee |
Grammar Encoding in DNA-Like Secret Sharing Infrastructure / Marek R. Ogiela ; Urszula Ogiela |
HATS: High Accuracy Timestamping System Based on NetFPGA / Zhiqiang Zhou ; Lin Cong ; Guohan Lu ; Beixing Deng ; Xing Li |
A Roadside Unit Placement Scheme for Vehicular Telematics Networks / Junghoon Lee ; Cheol Min Kim |
Concurrent Covert Communication Channels / Md Amiruzzaman ; Hassan Peyravi ; M. Abdullah-Al-Wadud ; Yoojin Chung |
Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks / Husnain Naqvi ; Stevan Berber ; Zoran Salcic |
High Performance MAC Architecture for 3GPP Modem / Sejin Park ; Yong Kim ; Inchul Song ; Kichul Han ; Jookwang Kim ; Kyungho Kim |
Modified Structures of Viterbi Alogrithm for Forced-State Method in Concatenated Coding System of ISDB-T / Yoshitomo Kaneda |
A New Cross-Layer Unstructured P2P File Sharing Protocol Over Mobile Ad Hoc Network / Nadir Shah ; Depei Qian |
A Model for Interference on Links in Inter-Working Multi-Hop Wireless Networks / Oladayo Salami ; Antoine Bagula ; H. Anthony Chan |
An Optimum ICA Based Multiuser Data Separation for Short Message Service / Mahdi Khosravy ; Mohammad Reza Alsharif ; Katsumi Yamashita |
Advanced Computer Science and Information Technology |
Multiple Asynchronous Requests on a Client-Based Mashup Page / Eunjung Lee ; Kyung-Jin Seo |
Using an Integrated Ontology Database to Categorize Web Pages / Rujiang Bai ; Xiaoyue Wang ; Junhua Liao |
Topic Detection by Topic Model Induced Distance Using Biased Initiation / Yonghui Wu ; Yuxin Ding ; Xiaolong Wang ; Jun Xu |
Mining Significant Least Association Rules Using Fast SLP-Growth Algorithm / Zailani Abdullah ; Tutut Herawan ; Mustafa Mat Deris |
Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition / Massimo Tistarelli |
Agent Based Approach to Regression Testing / Praveen Ranjan Srivastava |
A Numerical Study on B&B Algorithms for Solving Sum-Of-Ratios Problem / Lianbo Gao ; Jianming Shi |
Development of a Digital Textbook Standard Format Based on XML / Mihye Kim ; Kwan-Hee Yoo ; Chan Park ; Jae-Soo Yoo |
A Pattern-Based Representation Approach for Online Discourses / Hao Xu |
A Fault Tolerant Architecture for Transportation Information Services of E-Government / Woonsuk Suh ; Boo-Mann Choung ; Eunseok Lee |
Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETS / Pavan Kumar Pandey ; G.P. Biswas |
Extract Semantic Information from WordNet to Improve Text Classification Performance |
Managing Ubiquitous Scientific Knowledge on Semantic Web |
A Semantic Pattern Approach to Managing Scientific Publications |
A Bootstrap Software Reliability Assessment Method to Squeeze Out Remaining Faults / Mitsuhiro Kimura ; Takaji Fujiwara |
Markov Chain Monte Carlo Random Testing / Bo Zhou ; Hiroyuki Okamura ; Tadashi Dohi |
An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics / Osamu Mizuno ; Hideaki Hata |
Ubiquitous Computing and Multimedia Applications |
An Effective Video Steganography Method for Biometric Identification |
A Video Coding Technique using Octagonal Motion Search and BTC-PF Method for Fast Reconstruction / Bibhas Chandra Dhara ; Sanjoy Kumar Saha ; Bhabatosh Chanda |
Rough Set Approach in Ultrasound Biomicroscopy Glaucoma Aalysis / Soumya Banerjee ; Hameed Al-Qaheri ; El-Sayed A. El-Dahshan ; Aboul Ella Hassanien |
Video Copy Detection: Sequence Matching Using Hypothesis Test / Debabrata Dutta |
An XML-Based Digital Textbook and Its Educational Effectiveness / Hoseung Byun ; Wanyoung Cho ; Jeeheon Ryu ; Namgyun Kim |
SIMACT: A 3D Open Source Smart Home Simulator for Activity Recognition / Kevin Bouchard ; Amir Ajroud ; Bruno Bouchard ; Abdenour Bouzouane |
Design of an Efficient Message Collecting Scheme for the Slot-Based wireless Mesh Network / Gyung-Leen Park |
A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by Humming / Xiaohong Yang ; Qingcai Chen |
Chinese Prosody Generation Based on C-ToBI Representation for Text-To-Speech / Byeongchang Kim |
CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculture / Yongyun Cho ; Hyun Yoe ; Haeng-Kon Kim |
A Power Control Scheme for an Energy-Efficient MAC Protocol / Ho-chul Lee ; Jeong-hwan Hwang ; Meong-hun Lee ; Haeng-kon Kim |
Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks / Iftikhar Ahmad ; Azween B Abdulah ; Abdullah S Alghamdi |
Author Index |
Information Security and Assurance |
Fuzzy Based Threat Analysis in Total Hospital Information System / Nurzaini Mohamad Zain ; Ganthan Narayana Samy ; Rabiah Ahmad ; Zuraini Ismail ; Azizah Abdul Manaf |
An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model / Bo Zhang ; Qiuliang Xu |