Sciweavers

ITIIS
2010
190views more  ITIIS 2010»
13 years 6 months ago
An Efficient String Matching Algorithm Using Bidirectional and Parallel Processing Structure for Intrusion Detection System
Rapid growth of internet applications has increased the importance of intrusion detection system (IDS) performance. String matching is the most computation-consuming task in IDS. ...
Gwo-Ching Chang, Yue-Der Lin
ITIIS
2010
129views more  ITIIS 2010»
13 years 6 months ago
Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping
Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by fi...
Dongkyoo Shin, Dongil Shin, Jaewan Shin, Soohan Ki...
ITIIS
2010
115views more  ITIIS 2010»
13 years 6 months ago
A Border Line-Based Pruning Scheme for Shortest Path Computations
Jin-Kyu Park, Daejin Moon, Eenjun Hwang
ITIIS
2010
343views more  ITIIS 2010»
13 years 6 months ago
Dynamic Manipulation of a Virtual Object in Marker-less AR system Based on Both Human Hands
This paper presents a novel approach to control the augmented reality (AR) objects robustly in a marker-less AR system by fingertip tracking and hand pattern recognition. It is kn...
Junchul Chun, Byungsung Lee
ITIIS
2010
92views more  ITIIS 2010»
13 years 6 months ago
Performance Analysis of Selection Relaying Schemes over Different Fading Environments in Wireless Networks
In this paper, two selection relaying schemes are proposed and compared with each other in terms of packet error rate (PER) and diversity order. Moreover, the comparison is perfor...
Tran Thi Xuyen, Hyung Yun Kong
ITIIS
2010
79views more  ITIIS 2010»
13 years 10 months ago
HMM-based Adaptive Frequency-Hopping Cognitive Radio System to Reduce Interference Time and to Improve Throughput
Cognitive Radio is an advanced enabling technology for the efficient utilization of vacant spectrum due to its ability to sense the spectrum environment. It is important to determ...
Sung Hwan Shon, Sung Jeen Jang, Jae Moung Kim
ITIIS
2010
265views more  ITIIS 2010»
13 years 10 months ago
A Recommender System for Device Sharing Based on Context-Aware and Personalization
In ubiquitous computing, invisible devices and software are connected to one another to provide convenient services to users [1][2]. Users hope to obtain a personalized service wh...
Jong-Hyun Park
ITIIS
2010
94views more  ITIIS 2010»
13 years 10 months ago
AFSO: An Adaptative Frame Size Optimization Mechanism for 802.11 Networks
In this paper, we analyze the impact of different frame types on self-similarity and burstiness characteristics of the aggregated frame traffic from a real 802.11 wireless local a...
Xiaohu Ge, Cheng-Xiang Wang, Yang Yang, Lei Shu, C...
ITIIS
2010
128views more  ITIIS 2010»
13 years 10 months ago
Semi-trusted Collaborative Framework for Multi-party Computation
Data sharing is an essential process for collaborative works particularly in the banking, finance and healthcare industries. These industries require many collaborative works with...
Kok Seng Wong, Myung Ho Kim
ITIIS
2010
184views more  ITIIS 2010»
13 years 10 months ago
Class 4 Active RFID Multi-hop Relay System based on IEEE 802.15.4a Low-Rate UWB in Sensor Network
The low-rate (LR) UWB is a promising technology for the ubiquitous sensor network (USN) due to its extremely low power consumption and simple transceiver implementation. However t...
Hong Zhang, SungHyun Hong, KyungHi Chang