Jong Hyuk Park

According to our database1, Jong Hyuk Park authored at least 389 papers between 2001 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Fusion algorithms and high-performance applications for vehicular cloud computing.
The Journal of Supercomputing, 2018

Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities.
IEEE Trans. Industrial Informatics, 2018

MTD-Spamguard: a moving target defense-based spammer detection system in social network.
Soft Comput., 2018

Advances in intelligence and internet of things for human-centric computing.
Soft Comput., 2018

An efficient approach to understanding social evolution of location-focused online communities in location-based services.
Soft Comput., 2018

Advanced algorithms and applications for IoT cloud computing convergence.
J. Parallel Distrib. Comput., 2018

A novel framework for internet of knowledge protection in social networking services.
J. Comput. Science, 2018

Development of A Textile Capacitive Proximity Sensor and Gait Monitoring System for Smart Healthcare.
J. Medical Systems, 2018

Analysis of a Third-Party Application for Mobile Forensic Investigation.
JIPS, 2018

Enhanced Integrated Algorithm & Software Architecture.
JIPS, 2018

Practical Approaches Based on Deep Learning and Social Computing.
JIPS, 2018

Algorithms, Processes, and Frameworks for User-oriented Applications.
JIPS, 2018

Novel Solutions and Approaches to Effective Data Processing.
JIPS, 2018

Advanced algorithms and applications based on IoT for the smart devices.
J. Ambient Intelligence and Humanized Computing, 2018

EH-HL: Effective Communication Model by Integrated EH-WSN and Hybrid LiFi/WiFi for IoT.
IEEE Internet of Things Journal, 2018

Human-intelligence workflow management for the big data of augmented reality on cloud infrastructure.
Neurocomputing, 2018

Blockchain based hybrid network architecture for the smart city.
Future Generation Comp. Syst., 2018

OpCloudSec: Open cloud software defined wireless network security for the Internet of Things.
Computer Communications, 2018

Traffic management in the mobile edge cloud to improve the quality of experience of mobile video.
Computer Communications, 2018

DistArch-SCNet: Blockchain-Based Distributed Architecture with Li-Fi Communication for a Scalable Smart City Network.
IEEE Consumer Electronics Magazine, 2018

IoT application protection against power analysis attack.
Computers & Electrical Engineering, 2018

SpamSpotter: An efficient spammer detection framework based on intelligent decision support system on Facebook.
Appl. Soft Comput., 2018

An effective handling of secure data stream in IoT.
Appl. Soft Comput., 2018

Job Allocation Mechanism for Battery Consumption Minimization of Cyber-Physical-Social Big Data Processing Based on Mobile Cloud Computing.
IEEE Access, 2018

A Software Defined Fog Node Based Distributed Blockchain Cloud Architecture for IoT.
IEEE Access, 2018

A Hesitant Fuzzy Based Security Approach for Fog and Mobile-Edge Computing.
IEEE Access, 2018

2017
Automatic Generation of Ortho-Photo Texture from Digital Elevation Model.
Signal Processing Systems, 2017

Energy-efficient cluster-based dynamic routes adjustment approach for wireless sensor networks with mobile sinks.
The Journal of Supercomputing, 2017

Novel assessment method for accessing private data in social network security services.
The Journal of Supercomputing, 2017

DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks.
The Journal of Supercomputing, 2017

A shortest path planning algorithm for cloud computing environment based on multi-access point topology analysis for complex indoor spaces.
The Journal of Supercomputing, 2017

CloudRPS: a cloud analysis based enhanced ransomware prevention system.
The Journal of Supercomputing, 2017

S-Detector: an enhanced security model for detecting Smishing attack for mobile computing.
Telecommunication Systems, 2017

Blockchain Security in Cloud Computing: Use Cases, Challenges, and Solutions.
Symmetry, 2017

Unmanned Aerial Vehicle Flight Point Classification Algorithm Based on Symmetric Big Data.
Symmetry, 2017

DIaaS: Resource Management System for the Intra-Cloud with On-Premise Desktops.
Symmetry, 2017

A light-weight secure information transmission and device control scheme in integration of CPS and cloud computing.
Microprocessors and Microsystems - Embedded Hardware Design, 2017

Adaptive power management scheme using many-core for maximizing network topology lifetime based on ubiquitous computing.
Journal of Systems Architecture - Embedded Systems Design, 2017

Adaptive data rate control in low power wide area networks for long range IoT services.
J. Comput. Science, 2017

Block-VN: A Distributed Blockchain Based Vehicular Network Architecture in Smart City.
JIPS, 2017

XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs.
JIPS, 2017

Efficient Approaches to Computer Vision and Pattern Recognition.
JIPS, 2017

Efficient Approaches to Computer Vision and Pattern Recognition.
JIPS, 2017

Novel Approaches for Applying Linguistic Processing Techniques Based on Pattern Recognition and Machine Learning.
JIPS, 2017

New Approaches to Advanced Network and Image Processing.
JIPS, 2017

Advances in Algorithm, Multimedia, and Network for Future IT.
JIPS, 2017

Advanced Communications and Artificial Intelligence, and Introduction of the JIPS AWARD 2016.
JIPS, 2017

Feasibility and Performance Analysis of RDMA Transfer through PCI Express.
JIPS, 2017

Social network security: Issues, challenges, threats, and solutions.
Inf. Sci., 2017

An improved recommendation algorithm for big data cloud service based on the trust in sociology.
Neurocomputing, 2017

A secure-coding and vulnerability check system based on smart-fuzzing and exploit.
Neurocomputing, 2017

Iceberg Clique queries in large graphs.
Neurocomputing, 2017

Magnetically-coupled boost-forward converter for high efficiency differential power processing systems.
IEICE Electronic Express, 2017

Crowdsensing Multimedia Data: Security and Privacy Issues.
IEEE MultiMedia, 2017

DistBlockNet: A Distributed Blockchains-Based Secure SDN Architecture for IoT Networks.
IEEE Communications Magazine, 2017

DFA-AD: a distributed framework architecture for the detection of advanced persistent threats.
Cluster Computing, 2017

Radio resource management for data transmission in low power wide area networks integrated with large scale cyber physical systems.
Cluster Computing, 2017

Bootstrapping Distantly Supervised IE Using Joint Learning and Small Well-Structured Corpora.
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
User Experience and Quality-of-Service in Internet of Things: Practice and Trends.
Wireless Personal Communications, 2016

Intelligent Security Model of Smart Phone Based on Human Behavior in Mobile Cloud Computing.
Wireless Personal Communications, 2016

Efficient Resource Management Scheme for Storage Processing in Cloud Infrastructure with Internet of Things.
Wireless Personal Communications, 2016

RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks.
The Journal of Supercomputing, 2016

Human-centric storage resource mechanism for big data on cloud service architecture.
The Journal of Supercomputing, 2016

Design of secure authentication scheme between devices based on zero-knowledge proofs in home automation service environments.
The Journal of Supercomputing, 2016

A rhythm-based access control system for secure wellness services.
The Journal of Supercomputing, 2016

Relative weight comparison between virtual key factors of cloud computing with analytic network process.
The Journal of Supercomputing, 2016

A service composition model based on user experience in Ubi-cloud comp.
Telecommunication Systems, 2016

Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World.
Symmetry, 2016

Scenario-Based Digital Forensics Challenges in Cloud Computing.
Symmetry, 2016

The Design and Analysis of a Secure Personal Healthcare System Based on Certificates.
Symmetry, 2016

Optional Frame Selection Algorithm for Adaptive Symmetric Service of Augmented Reality Big Data on Smart Devices.
Symmetry, 2016

Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments.
Sensors, 2016

A Reliable TTP-Based Infrastructure with Low Sensor Resource Consumption for the Smart Home Multi-Platform.
Sensors, 2016

Minimum Interference Channel Assignment Algorithm for Multicast in a Wireless Mesh Network.
Sensors, 2016

An enhanced security framework for reliable Android operating system.
Security and Communication Networks, 2016

Challenges and opportunities in next-generation cyberspace security.
Security and Communication Networks, 2016

Guest Editorial: Technologies and Applications for Interactive NUX/NUI.
Multimedia Tools Appl., 2016

All-in-focus and multi-focus color image reconstruction from a database of color and depth image pairs.
Multimedia Tools Appl., 2016

An effective locking scheme of smart multimedia devices with convenience and enhanced security.
Multimedia Tools Appl., 2016

The disclosure of evaporating digital trails respecting the combinations of Gmail and IE for pervasive multimedia.
Multimedia Tools Appl., 2016

An efficient route scheduling mechanism for WiMAX network - ERRATUM.
Knowledge Eng. Review, 2016

A survey on cloud computing security: Issues, threats, and solutions.
J. Network and Computer Applications, 2016

[EDITORIAL] Advances in Multimedia Computing and Security and the Introduction of New Senior Editors.
JIPS, 2016

[Editorial] Advanced Technologies and Applications for Security and Multimedia Computing.
JIPS, 2016

HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet.
JIPS, 2016

k-Cliques mining in dynamic social networks based on triadic formal concept analysis.
Neurocomputing, 2016

Location based authentication scheme using BLE for high performance digital content management system.
Neurocomputing, 2016

Special Issue on Entropy-Based Applied Cryptography and Enhanced Security for Ubiquitous Computing.
Entropy, 2016

Active Learning Algorithms for Graphical Model Selection.
CoRR, 2016

Bootstrapping Distantly Supervised IE using Joint Learning and Small Well-structured Corpora.
CoRR, 2016

Beacon-based active media control interface in indoor ubiquitous computing environment.
Cluster Computing, 2016

Introduction to the special section on parallel architectures, algorithms and programming.
Computers & Electrical Engineering, 2016

Energy-Efficient Distributed Topology Control Algorithm for Low-Power IoT Communication Networks.
IEEE Access, 2016

Memory ECC architecutre utilizing memory column spares.
Proceedings of the International SoC Design Conference, 2016

Active Learning Algorithms for Graphical Model Selection.
Proceedings of the 19th International Conference on Artificial Intelligence and Statistics, 2016

2015
Output Effect Evaluation Based on Input Features in Neural Incremental Attribute Learning for Better Classification Performance.
Symmetry, 2015

Live Mobile Distance Learning System for Smart Devices.
Symmetry, 2015

Design of a Distributed Personal Information Access Control Scheme for Secure Integrated Payment in NFC.
Symmetry, 2015

Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key.
Symmetry, 2015

The Digital Fingerprinting Analysis Concerning Google Calendar under Ubiquitous Mobile Computing Era.
Symmetry, 2015

Online Social Snapshots of a Generic Facebook Session Based on Digital Insight Data for a Secure Future IT Environment.
Symmetry, 2015

Social Media Services and Technologies Towards Web 3.0.
Multimedia Tools Appl., 2015

Intelligent state machine for social ad hoc data management and reuse.
Multimedia Tools Appl., 2015

User tailored cloud-learning system using SNS and learning resources.
Multimedia Tools Appl., 2015

Relative weight evaluation of the factors inducing social media service use.
Multimedia Tools Appl., 2015

Real-time smartphone sensing and recommendations towards context-awareness shopping.
Multimedia Syst., 2015

Service based AEHS for human centric learning environments.
JAISE, 2015

CIMS: A Context-Based Intelligent Multimedia System for Ubiquitous Cloud Computing.
Information, 2015

Multi-WSN Simulator with Log Data for Efficient Sensing on Internet of Things.
IJDSN, 2015

Attendance Check System and Implementation for Wi-Fi Networks Supporting Unlimited Number of Concurrent Connections.
IJDSN, 2015

An efficient authentication system of smart device using multi factors in mobile cloud service architecture.
Int. J. Communication Systems, 2015

An efficient character input scheme with a gyro sensor of smartphone on ubiquitous cluster computing.
Cluster Computing, 2015

Mining Social Media for Knowledge Discovery.
Comput. J., 2015

Parallel Processing Simulator for Separate Sensor of WSN Simulator with GPU.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Computational awareness towards green environments.
The Journal of Supercomputing, 2014

Cloud computing-based jam management for a manufacturing system in a Green IT environment.
The Journal of Supercomputing, 2014

An enhanced integrity of web contents through mobile cloud environments.
The Journal of Supercomputing, 2014

Posted price model based on GRS and its optimization for improving grid resource sharing efficiency.
Telecommunication Systems, 2014

Navigation-based self-optimization handover mechanism for mobile relay stations in WiMAX networks.
Telecommunication Systems, 2014

MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats.
Symmetry, 2014

An Interactive IPTV System With Community Participation in Cloud Computing Environments.
IEEE Systems Journal, 2014

An on-site digital investigation methodology for data leak case.
Security and Communication Networks, 2014

A smart assistant toward product-awareness shopping.
Personal and Ubiquitous Computing, 2014

Digital evidence discovery of networked multimedia smart devices based on social networking activities.
Multimedia Tools Appl., 2014

An efficient route scheduling mechanism for WiMAX network.
Knowledge Eng. Review, 2014

Smart devices and spaces for pervasive computing.
Journal of Systems Architecture - Embedded Systems Design, 2014

Multimedia contents adaptation by modality conversion with user preference in wireless network.
J. Network and Computer Applications, 2014

Test-driven forensic analysis of satellite automotive navigation systems.
J. Intelligent Manufacturing, 2014

IT convergence security.
J. Intelligent Manufacturing, 2014

REST-MapReduce: An Integrated Interface but Differentiated Service.
J. Applied Mathematics, 2014

An Efficient and Secure m-IPS Scheme of Mobile Devices for Human-Centric Computing.
J. Applied Mathematics, 2014

Introduction to the thematic issue on Ambient and Smart Component Technologies for Human Centric Computing.
JAISE, 2014

Personlized English reading sequencing based on learning portfolio analysis.
Inf. Sci., 2014

VBSM: VCC-Based Black Box Service Model with Enhanced Data Integrity.
Information, 2014

Pervasive Sensing Technologies and Emerging Trends.
IJDSN, 2014

An ANP-Based Practical Quality Model for a Secure Embedded System with Sensor Network.
IJDSN, 2014

Visual Scheme Monitoring of Sensors for Fault Tolerance on Wireless Body Area Networks with Cloud Service Infrastructure.
IJDSN, 2014

Ensuring Healthcare Services Provision: An Integrated Approach of Resident Contexts Extraction and Analysis via Smart Objects.
IJDSN, 2014

Visualization of dynamic fault tolerance rerouting for data traffic in wireless sensor network.
Int. J. Communication Systems, 2014

Content-oriented learning recommendation mechanism in MANETs.
IJAHUC, 2014

An enhanced smartphone security model based on information security management system (ISMS).
Electronic Commerce Research, 2014

A secure smart-work service model based OpenStack for Cloud computing.
Cluster Computing, 2014

A strengthening plan for enterprise information security based on cloud computing.
Cluster Computing, 2014

The Cloud Storage Model for Manufacturing System in Global Factory Automation.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

Faster Translated Binary Execution on Mobile System through Virtualization.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
ODSA: Chord-Based Object Discovery Service Architecture for the Internet of Things.
Wireless Personal Communications, 2013

An anomaly-based detection in ubiquitous network using the equilibrium state of the catastrophe theory.
The Journal of Supercomputing, 2013

Multimedia technology for pervasive computing environment.
The Journal of Supercomputing, 2013

Advances in communication networks for pervasive and ubiquitous applications.
The Journal of Supercomputing, 2013

Data center selection based on neuro-fuzzy inference systems in cloud computing environments.
The Journal of Supercomputing, 2013

Revisiting reorder buffer architecture for next generation high performance computing.
The Journal of Supercomputing, 2013

Mobile cloud computing framework for a pervasive and ubiquitous environment.
The Journal of Supercomputing, 2013

Erratum to: Effective session key distribution for secure fast handover in mobile networks.
Telecommunication Systems, 2013

Advances in security and multimodality for pervasive computing environments - TS Special Issue.
Telecommunication Systems, 2013

Design and implementation of a wireless sensor network architecture using smart mobile devices.
Telecommunication Systems, 2013

Perceptual quality based error control for scalable on-demand streaming in next-generation wireless networks.
Telecommunication Systems, 2013

A RF4CE-based remote controller with interactive graphical user interface applied to home automation system.
ACM Trans. Embedded Comput. Syst., 2013

Efficient localization scheme with ring overlapping by utilizing mobile anchors in wireless sensor networks.
ACM Trans. Embedded Comput. Syst., 2013

Modeling user-generated contents: an intelligent state machine for user-centric search support.
Personal and Ubiquitous Computing, 2013

Theme issues on U-Business service and strategy, and U-Healthcare.
Personal and Ubiquitous Computing, 2013

Top-k entities query processing on uncertainly fused multi-sensory data.
Personal and Ubiquitous Computing, 2013

ALCA: agent learning-based clustering algorithm in vehicular ad hoc networks.
Personal and Ubiquitous Computing, 2013

Encoder design for healthcare signals.
Personal and Ubiquitous Computing, 2013

Inference topology of distributed camera networks with multiple cameras.
Multimedia Tools Appl., 2013

Extraction of enhanced evoked potentials using wavelet filtering.
Multimedia Tools Appl., 2013

Concurrent multipath transmission with forward error correction mechanism to overcome burst packet losses for delay-sensitive video streaming in wireless home networks.
Multimedia Tools Appl., 2013

An Efficient Dynamic Integration Middleware for Cyber-Physical Systems in Mobile Environments.
MONET, 2013

Context-aware service roaming for heterogeneous embedded devices over cloud.
Journal of Systems Architecture - Embedded Systems Design, 2013

Structure-free message aggregation and routing in traffic information system (SMART).
J. Network and Computer Applications, 2013

A QoS Model for a RFID Enabled Application with Next-Generation Sensors for Manufacturing Systems.
IJDSN, 2013

Visual Scheme for the Detection of Mobile Attack on WSN Simulator.
IJDSN, 2013

Maximizing Network Lifetime of Directional Sensor Networks Considering Coverage Reliability.
IJDSN, 2013

Improving Performance through REST Open API Grouping for Wireless Sensor Network.
IJDSN, 2013

Load balancing and adaptive scheduling for data intensive prioritised traffic in multi-radio multi-channel wireless mesh networks.
IJAHUC, 2013

Efficient model of Korean graphemes based on a smartphone keyboard.
Electronic Commerce Research, 2013

Adaptive network-based fuzzy inference model on CPS for large scale intelligent and cooperative surveillance.
Computing, 2013

Privacy-preserving max/min query in two-tiered wireless sensor networks.
Computers & Mathematics with Applications, 2013

Special Issue on Advanced Information Security for Secure and Trust Computing.
Computers & Mathematics with Applications, 2013

Research trends in cloud, cluster and grid computing.
Cluster Computing, 2013

Advanced Security Technologies and Services for Future Computing Environments.
Comput. J., 2013

High availability and efficient energy consumption for cloud computing service with grid infrastructure.
Computers & Electrical Engineering, 2013

A novel and efficient source-path discovery and maintenance method for application layer multicast.
Computers & Electrical Engineering, 2013

Application for Mobile Cloud Learning.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

Service Based User Oriented Adaptive Learning System.
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013

Design and Simulation of Access Router Discovery Process in Mobile Environments.
Proceedings of the Multimedia and Ubiquitous Engineering, 2013

Security Considerations in Cloud Computing Virtualization Environment.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

Network-Aware Multiway Join for MapReduce.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

CMMI Security Model for Cloud Manufacturing System's Network.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Petri-Net Based User Profile Data Ontology for SNS.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
The weighted shortest path search based on multi-agents in mobile GIS management services.
Wireless Communications and Mobile Computing, 2012

An interference-aware multichannel media access control protocol for wireless sensor networks.
The Journal of Supercomputing, 2012

An authentication protocol offering service anonymity of mobile device in ubiquitous environment.
The Journal of Supercomputing, 2012

Efficient scheme of verifying integrity of application binaries in embedded operating systems.
The Journal of Supercomputing, 2012

A self-adaptive K selection mechanism for re-authentication load balancing in large-scale systems.
The Journal of Supercomputing, 2012

Bio-inspired computing for hybrid information technology.
Soft Comput., 2012

Design and simulation of a hierarchical priority fairness scheduler in an uplink Worldwide Interoperability for Microwave Access system.
Simulation, 2012

Improved RF4CE key agreement approach involving two-phase key distribution for smart-convergence home device.
Security and Communication Networks, 2012

Security technologies and applications for convergence environments.
Security and Communication Networks, 2012

A VoIP system for mobility voice security support using the VPN.
Security and Communication Networks, 2012

A partially reconstructed previous Gmail session by live digital evidences investigation through volatile data acquisition.
Security and Communication Networks, 2012

Guest editorial: Theme issue on smartphone applications and services for pervasive computing.
Personal and Ubiquitous Computing, 2012

Secure and efficient public key management in next generation mobile networks.
Personal and Ubiquitous Computing, 2012

Recent advances and future directions in multimedia and mobile computing.
Multimedia Tools Appl., 2012

Intelligent video surveillance system: 3-tier context-aware surveillance system with metadata.
Multimedia Tools Appl., 2012

Image hash generation method using hierarchical histogram.
Multimedia Tools Appl., 2012

A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment.
Mathematical and Computer Modelling, 2012

Achieving reliable system performance by fast recovery of branch miss prediction.
J. Network and Computer Applications, 2012

A cache-based search algorithm in unstructured P2P networks.
J. Intelligent Manufacturing, 2012

Intelligent model design of cluster supply chain with horizontal cooperation.
J. Intelligent Manufacturing, 2012

Study on the common criteria methodology for secure ubiquitous environment construction.
J. Intelligent Manufacturing, 2012

Ubiquitous computing for communications and broadcasting.
Int. J. Communication Systems, 2012

Distributed Video Coding: an overview of basics, research issues and solutions.
IJAHUC, 2012

Adaptive power management system for mobile multimedia device.
IET Communications, 2012

MSNS: mobile sensor network simulator for area coverage and obstacle avoidance based on GML.
EURASIP J. Wireless Comm. and Networking, 2012

Chain-to-chain inventory transshipment model and robust switch control in CSC networks.
Concurrency and Computation: Practice and Experience, 2012

MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis.
Proceedings of the Network and Parallel Computing, 9th IFIP International Conference, 2012

An Efficient Cloud Storage Model for Cloud Computing Environment.
Proceedings of the Advances in Grid and Pervasive Computing - 7th International Conference, 2012

Design and Implementation of Improved Authentication System for Android Smartphone Users.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Design of QoS in Intelligent Communication Environments Based on Neural Network.
Wireless Personal Communications, 2011

Resilient Security Mechanism for Wireless Ad hoc Network.
Wireless Personal Communications, 2011

Energy Efficient Distributed Face Recognition in Wireless Sensor Network.
Wireless Personal Communications, 2011

Ontology Based Resource Usage Policy Matching in Computational Grid for Pervasive Computing Applications.
Wireless Personal Communications, 2011

Self-stabilizing flocking of a group of mobile robots with memory corruption.
Wireless Communications and Mobile Computing, 2011

Security analysis and improvements of IEEE standard 802.16 in next generation wireless metropolitan access network.
Wireless Communications and Mobile Computing, 2011

Network security and digital forensics in next generation communications.
Wireless Communications and Mobile Computing, 2011

Hybrid security protocol for wireless body area networks.
Wireless Communications and Mobile Computing, 2011

Admissible bilinear map-based key management protocol for HPCCS in heterogeneous network.
The Journal of Supercomputing, 2011

A portable UPnP-based high performance content sharing system for supporting multimedia devices.
The Journal of Supercomputing, 2011

Policy-Based Scheduling and Resource Allocation for Multimedia Communication on Grid Computing Environment.
IEEE Systems Journal, 2011

An Emergency-Adaptive Routing Scheme for Wireless Sensor Networks for Building Fire Hazard Monitoring.
Sensors, 2011

Throughput Fairness Enhancement Using Differentiated Channel Access in Heterogeneous Sensor Networks.
Sensors, 2011

M-MUSICS: an intelligent mobile music retrieval system.
Multimedia Syst., 2011

The effect and strategy research of the secure E-commerce by the application of P2P.
Mathematical and Computer Modelling, 2011

Live Data Mining Concerning Social Networking Forensics Based on a Facebook Session Through Aggregation of Social Data.
IEEE Journal on Selected Areas in Communications, 2011

Providing security vertical handoff in SARAH for heterogeneous networks.
J. Network and Computer Applications, 2011

Enhanced HCCA mechanism for multimedia traffics with QoS support in IEEE 802.11e networks.
J. Network and Computer Applications, 2011

An Environmental-Adaptive Fall Detection System on Mobile Device.
J. Medical Systems, 2011

Packet Scheduling with QoS and Fairness for Downlink Traffic in WiMAX Networks.
JIPS, 2011

A security management scheme for failure detector distributed systems based on self-tuning control theory.
J. Intelligent Manufacturing, 2011

Threshold jumping and wrap-around scan techniques toward efficient tag identification in high density RFID systems.
Information Systems Frontiers, 2011

Information fusion in future generation communication environments.
Information Fusion, 2011

Using Multi-Modal Semantic Association Rules to fuse keywords and visual features automatically for Web image retrieval.
Information Fusion, 2011

SPHINX: a scheduling middleware for data intensive applications on a grid.
IJIPT, 2011

A novel low-power RF4CE-based communication framework for multimedia system control.
Int. J. Communication Systems, 2011

A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication.
Int. J. Communication Systems, 2011

Quantum entanglement and non-locality based secure computation for future communication.
IET Information Security, 2011

Efficient sensor node authentication in third generation-wireless sensor networks integrated networks.
IET Communications, 2011

A Secure and Robust Connectivity Architecture for Smart Devices and Applications.
EURASIP J. Wireless Comm. and Networking, 2011

A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets.
EURASIP J. Wireless Comm. and Networking, 2011

Robust one-time password authentication scheme using smart card for home network environment.
Computer Communications, 2011

Special issue of computer communications on information and future communication security.
Computer Communications, 2011

DoS attacks exploiting signaling in UMTS and IMS.
Computer Communications, 2011

Spatial Network RNN Queries in GIS.
Comput. J., 2011

Preface to Special Section on Intelligent Multimedia Systems and Data Management for UBI-COM.
Computing and Informatics, 2011

A High-Capacity CDMA Watermarking Scheme Based on Orthogonal Pseudorandom Sequence Subspace Projection.
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011

A Study on the Performance of Wireless Localization System Based on AoA in WSN Environment.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

A Study on the Performance Improvement of Impulse-Radio System in Multiple Interference Environment.
Proceedings of the 2011 International Conference on Broadband, 2011

Design and Analysis of a MST-Based Topology Control Scheme with PSO for Wireless Sensor Networks.
Proceedings of the 2011 IEEE Asia-Pacific Services Computing Conference, 2011

2010
Authentication and ID-Based Key Management Protocol in Pervasive Environment.
Wireless Personal Communications, 2010

Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments.
Wireless Personal Communications, 2010

Connectivity and coverage maintenance in wireless sensor networks.
The Journal of Supercomputing, 2010

Privacy-enhanced Key Recovery in mobile communication environments.
The Journal of Supercomputing, 2010

Design and implementation of a framework for building distributed smart object systems.
The Journal of Supercomputing, 2010

Special issue on "security for multimedia and ubiquitous applications".
Telecommunication Systems, 2010

Effective session key distribution for secure fast handover in mobile networks.
Telecommunication Systems, 2010

Subscriber authentication technology of AAA mechanism for mobile IPTV service offer.
Telecommunication Systems, 2010

Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device.
Telecommunication Systems, 2010

An effective simulation method for search strategy in unstructured P2P network.
Simulation Modelling Practice and Theory, 2010

The Domain Decomposition Method for Maxwell's Equations in Time Domain Simulations with Dispersive Metallic Media.
SIAM J. Scientific Computing, 2010

An Emergency-Adaptive Routing Scheme for Wireless Sensor Networks for Building Fire Hazard Monitoring.
Sensors, 2010

Special issue on advanced intelligent multimedia applications for next generation environments.
Multimedia Tools Appl., 2010

A scalable and adaptive video streaming framework over multiple paths.
Multimedia Tools Appl., 2010

A portable toolkit for supporting end-user personalization and control in context-aware applications.
Multimedia Tools Appl., 2010

Spatial parameters for audio coding: MDCT domain analysis and synthesis.
Multimedia Tools Appl., 2010

ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Advanced Mobile Applications and Intelligent Multimedia systems for Ubi-Com".
MONET, 2010

On Prolonging the Lifetime for Wireless Video Sensor Networks.
MONET, 2010

A Framework for Engineering Pervasive Applications Applied to Intra-vehicular Sensor Network Applications.
MONET, 2010

Multimedia Services and Applications.
J. UCS, 2010

Editorial.
J. Intelligent Manufacturing, 2010

Power-Aware and Reliable Sensor Selection Based on Trust for Wireless Sensor Networks.
JCM, 2010

A sensing policy based on the statistical property of licensed channel in cognitive network.
IJIPT, 2010

User authentication schemes with pseudonymity for ubiquitous sensor network in NGN.
Int. J. Communication Systems, 2010

Multi-frame Beacon Management for constructing interference-avoided LR-WPAN.
IJAHUC, 2010

Multi-path transmission control scheme combining bandwidth aggregation and packet scheduling for real-time streaming in multi-path environment.
IET Communications, 2010

Fair incentive mechanism with pyramidal structure for peer-to-peer networks.
IET Communications, 2010

Predictive control for vehicular sensor networks based on round-trip time-delay prediction.
IET Communications, 2010

A Pervasive Secret Sharing Scheme For Embedded Visual Communication System.
Intelligent Automation & Soft Computing, 2010

Device Authentication In Wireless And Pervasive Environments.
Intelligent Automation & Soft Computing, 2010

Adaptive Body Posture Analysis for Elderly-Falling Detection with Multisensors.
IEEE Intelligent Systems, 2010

Novel Approaches to Enhance Mobile WiMAX Security.
EURASIP J. Wireless Comm. and Networking, 2010

A proposal for automating investigations in live forensics.
Computer Standards & Interfaces, 2010

A secure model for controlling the hubs in P2P wireless network based on trust value.
Computer Communications, 2010

Special issue of computers and mathematics with applications on "Advances in cryptography, security and applications for future computer science".
Computers & Mathematics with Applications, 2010

The incentive secure mechanism based on quality of service in P2P network.
Computers & Mathematics with Applications, 2010

A Simulation Model Supporting Time and Non-time Metrics for Web Service Composition.
Comput. J., 2010

An Efficient Localization Scheme with Ring Overlapping by Utilizing Mobile Anchors in Wireless Sensor Networks.
Proceedings of the 4th International Conference on Multimedia and Ubiquitous Engineering, 2010

A Survey on Multimedia Communicating Technology Based on Spatial Audio Coding.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Global Top-k Aggregate Queries Based on X-tuple in Uncertain Database.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

2009
Performance Optimization with Efficient Polling Mechanism in IEEE 802.16 Networks with Cross-Layer Consideration.
Wireless Personal Communications, 2009

Towards a Performance-Based Resource Server Access Control in Future Grid Communication Environments.
Wireless Personal Communications, 2009

Editorial: Special Issue on "Information Security and Data Protection in Future Generation Communication and Networking".
Wireless Personal Communications, 2009

RHS-US: Real-Time Hash-Chain Scheme Decreasing Pre-Calculation Mechanism for Ubiquitous Services.
Wireless Personal Communications, 2009

Energy efficient virtual MIMO communication for wireless sensor networks.
Telecommunication Systems, 2009

Adaptive video-on-demand broadcasting in ubiquitous computing environment.
Personal and Ubiquitous Computing, 2009

Special issue on "Intelligent systems and services for ubiquitous computing".
Personal and Ubiquitous Computing, 2009

Alleviating reader collision problem in mobile RFID networks.
Personal and Ubiquitous Computing, 2009

On modeling and evaluating multicomputer transcoding architectures for live-video streams.
Multimedia Tools Appl., 2009

A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security.
J. UCS, 2009

USF-PAS : Study on Core Security Technologies for Ubiquitous Security Framework.
J. UCS, 2009

U-HMS: hybrid system for secure intelligent multimedia data services in Ubi-Home.
J. Intelligent Manufacturing, 2009

Ubiquitous software controller to prevent deadlocks for automated guided vehicle systems in a container port terminal environment.
J. Intelligent Manufacturing, 2009

Intelligent systems and smart homes.
Information Systems Frontiers, 2009

Monitoring user activities in smart home environments.
Information Systems Frontiers, 2009

Monitoring user activities in smart home environments.
Information Systems Frontiers, 2009

Privacy and fair information practices in ubiquitous environments: Research challenges and future directions.
Internet Research, 2009

An efficient collusion resistant security mechanism for heterogeneous sensor networks.
Internet Research, 2009

Secure ubiquitous connectivity in hybrid multipath wireless ad hoc network.
Int. J. Communication Systems, 2009

Security analysis of mCrypton proper to low-cost ubiquitous computing devices and applications.
Int. J. Communication Systems, 2009

Dynamic power management in new architecture of wireless sensor networks.
Int. J. Communication Systems, 2009

Secure communications and data management in ubiquitous services.
Int. J. Communication Systems, 2009

Special Section On Embedded System And Software For IPC Guest Editorial - Guest Editorial.
Intelligent Automation & Soft Computing, 2009

Intelligent Decision-Making System with Green Pervasive Computing for Renewable Energy Business in Electricity Markets on Smart Grid.
EURASIP J. Wireless Comm. and Networking, 2009

Design and implementation of light-weight mobile multicast for fast MIPv6.
Computer Communications, 2009

Design and analysis of a self-tuning feedback controller for the Internet.
Computer Networks, 2009

SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems.
Comput. J., 2009

HOTP-Based User Authentication Scheme in Home Networks.
Proceedings of the Advances in Information Security and Assurance, 2009

Signaling-Oriented DoS Attacks in UMTS Networks.
Proceedings of the Advances in Information Security and Assurance, 2009

Message from the Workshop Co-Organizers.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Analysis and Synthesis of Spatial Parameters Using MDCT.
Proceedings of the 2009 Third International Conference on Multimedia and Ubiquitous Engineering, 2009

Adaptive Multi-channel Utilization Scheme for Coexistence of IEEE802.15.4 LR-WPAN with Other Interfering Systems.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009

The Detection and Response Mechanism against Abnormal Traffic Attack in ATN Network.
Proceedings of the 2009 International Conference on Security & Management, 2009

Implementation of Rate Control in Distributed Wireless Multicast by Neural Network Prediction.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Cross-Layer Optimized Data Gathering in Wireless Multimedia Sensor Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Modeling and Analysis of the Execution Context in WS-BPEL.
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009

2008
IEEE 802.11 handoff latency improvement using Fuzzy Logic.
Wireless Communications and Mobile Computing, 2008

U-multimedia framework: a secure and intelligent multimedia service framework based on context information in U-home.
The Journal of Supercomputing, 2008

On improving resource utilization and system throughput of master slave job scheduling in heterogeneous systems.
The Journal of Supercomputing, 2008

Secure multimedia communication.
Security and Communication Networks, 2008

Trusted virtual machine monitor-based group signature architecture.
IET Communications, 2008

Intelligent Systems for Future Generation Wireless Networks.
EURASIP J. Wireless Comm. and Networking, 2008

iMuseum: A scalable context-aware intelligent museum system.
Computer Communications, 2008

A genetic algorithm for energy-efficient based multicast routing on MANETs.
Computer Communications, 2008

Secure multi-mode systems and their applications for pervasive computing.
Computer Communications, 2008

A compensation scheme of fingerprint distortion using combined radial basis function model for ubiquitous services.
Computer Communications, 2008

Predictive handoff mechanism with real-time mobility tracking in a campus wide wireless network considering ITS.
Computer Communications, 2008

A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Time Stamp Protocol for Smart Environment Services.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Extraction of Residual Information in the Microsoft PowerPoint file from the Viewpoint of Digital Forensics considering PerCom Environment.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

IS 2008 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

Investigating Wireless Sensor Network Lifetime Using a Realistic Radio Communication Model.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

ACE: Active Emergence Call Service System for u-Lifecare.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

A study on authentication/authorization/accounting and roaming mechanism in pervasive environment.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008

Fast and efficient formation flocking for a group of autonomous mobile robots.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

A Document Based Framework for Smart Object Systems.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

Large-Scale USN Middleware Based on Context-Aware.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Adaptive Scheduling Mechanisms toward Intelligent Services in Mobile and Wireless RFID Environments.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

The Security System Design in Online Game for u Entertainment.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Performance Evaluations of the FTOG Framework for Effective Object Management and Load Distribution.
Proceedings of the 15th Euromicro International Conference on Parallel, 2007

Service, Security and Its Data Management for Ubiquitous Computing - Overview.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Intelligent Home Network Authentication: Home Device Authentication Using Device Certification.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

IS 2007 PC Co-chairs' Message.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

PIS-CC RBAC: Patient Information Service based on CC-RBAC in Next Generation Hospital considering Ubiquitous Intelligent Environment.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

User Authentication for Multi Domain in Home Network Environments.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks.
Proceedings of the Mobile Ad-Hoc and Sensor Networks, Third International Conference, 2007

Asymmetric Link Dynamic Routing Algorithm for Ubiquitous Multimedia Services.
Proceedings of the Advances in Multimedia Modeling, 2007

A Centralized-Abstraction and Replicated-View Architecture Running on Ubiquitous Networks for Collaborative Multimedia Distance Education Services.
Proceedings of the Advances in Multimedia Modeling, 2007

Relay OFDMA System for Wireless Multimedia Services in Home Area Networks.
Proceedings of the Third International Conference on Natural Computation, 2007

Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems.
Proceedings of the Future Generation Communication and Networking, 2007

Dynamic Call Admission Control for QoS Provisioning in Multimedia Wireless Networks.
Proceedings of the Future Generation Communication and Networking, 2007

A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Intelligent Monitoring Using Wireless Sensor Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

Key Establishment Scheme for Sensor Networks with Low Communication Cost.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Performance Analysis of Location Estimation Algorithm in ZigBee Networks Using Received Signal Strength.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
DRBAC Model Using a WSNM for Services in i-Home.
IEICE Transactions, 2006

A DRBAC Model Based on Context for Smart and Secure Services in Intelligent Ubiquitous Home.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

uiH-PMAC Model Suitable for Ubi-Home Gateway in Ubiquitous Intelligent Environment.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

A Hybrid Intelligent Multimedia Service Framework in Next Generation Home Network Environment.
Proceedings of the Advances in Hybrid Information Technology, 2006

On Scheduling Transmissions for Hidden Terminal Problems in Dynamic RFID Systems.
Proceedings of the Advances in Hybrid Information Technology, 2006

User Centric Intelligent IPMPS in Ubi-Home.
Proceedings of the Computational Science and Its Applications, 2006

A Flexible DRM System Considering Ubiquitous Environment.
Proceedings of the Computational Science and Its Applications, 2006

Authentication for Ubiquitous Multi Domain in Pervasive Computing Using PMI.
Proceedings of the High Performance Computing and Communications, 2006

C-iUMS: Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous Home.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
Intelligent Multimedia Service System Based on Context Awareness in Smart Home.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

Design and Implementation of the IMS-IPMP System in Convergence Home-Network Environment.
Proceedings of the Digital Libraries: Implementing Strategies and Sharing Experiences, 2005

User-Oriented Multimedia Service Using Smart Sensor Agent Module in the Intelligent Home.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2001
Linear Time Hierarchical Capacitance Extraction without Multipole Expansion.
Proceedings of the 19th International Conference on Computer Design (ICCD 2001), 2001


  Loading...