Recently, Biometrics-based personal identification is regarded as an effective method of person's identity with recognition automation and high performance. In this paper, th...
This paper introduces a strategy and its theory proof to transform non-linear concept graph: Directed Acyclic Concept Graph (DACG) into a linear concept tree. The transformation i...
This paper describes the experimental analysis of SCTP handover for the dual-homing and singlehoming mobile terminals based on Linux platform. From the experiments, it is shown th...
Dong Phil Kim, Jong-Shik Ha, Sang-Tae Kim, Seok Jo...
Uncertainty always exists as an unavoidable factor in any pervasive context-aware applications. This is mostly caused by the imperfectness and incompleteness of data. In this pape...
This paper presents the feasibility of using an ad-hoc network as an infrastructure for a small group of inter-vehicle communication network. Mobile ad-hoc networking with wireles...
Jaehyun Kim, Woojin Han, Woohyuk Choi, Yunil Hwang...