Pub Date : 1900-01-01DOI: 10.1007/978-94-007-2911-7_28
Kyu Chul Kim, Chan Jung Park, R. Kim
{"title":"Group Based Vehicular Machine to Machine Communication Scheme in Cellular Networks","authors":"Kyu Chul Kim, Chan Jung Park, R. Kim","doi":"10.1007/978-94-007-2911-7_28","DOIUrl":"https://doi.org/10.1007/978-94-007-2911-7_28","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124766367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-5860-5_121
Yunsick Sung, E. Ahn, Kyungeun Cho
{"title":"Enhanced Reinforcement Learning by Recursive Updating of Q-values for Reward Propagation","authors":"Yunsick Sung, E. Ahn, Kyungeun Cho","doi":"10.1007/978-94-007-5860-5_121","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_121","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130637121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-5860-5_28
Yong-Yoon Shin, B. Lee
{"title":"A Study for Car Insurance Service Using Vehicle Real Time Information","authors":"Yong-Yoon Shin, B. Lee","doi":"10.1007/978-94-007-5860-5_28","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_28","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132854863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-5860-5_61
Hye-young Kim
{"title":"User-Oriented Load Balancing Scheme for MMORPG","authors":"Hye-young Kim","doi":"10.1007/978-94-007-5860-5_61","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_61","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130925019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-5860-5_59
Jinsul Kim, Juhye Yook
{"title":"The Development of Korea: Computer Access Assessment System (K-CAAS) for Persons with Physical Disabilities","authors":"Jinsul Kim, Juhye Yook","doi":"10.1007/978-94-007-5860-5_59","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_59","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130488400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-2911-7_34
A. Lee, Seok-Han Lee, Jae-Young Lee, Tae-eun Kim, Jongsoo Choi
{"title":"Real-Time Camera Tracking Using Planar Object Detection","authors":"A. Lee, Seok-Han Lee, Jae-Young Lee, Tae-eun Kim, Jongsoo Choi","doi":"10.1007/978-94-007-2911-7_34","DOIUrl":"https://doi.org/10.1007/978-94-007-2911-7_34","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128853598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-2911-7_45
Jong-Won Ko, Su-Jin Baek, Young-Jae Song
{"title":"Model Optimization with Graph Transformation and PSO Algorithm for Model Transformation Verification","authors":"Jong-Won Ko, Su-Jin Baek, Young-Jae Song","doi":"10.1007/978-94-007-2911-7_45","DOIUrl":"https://doi.org/10.1007/978-94-007-2911-7_45","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121320458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-2911-7_57
Kyoung-Soo Han, Kyoung-Yong Chung, E. Im
{"title":"A Study on Instruction Substitution Analysis of Metamorphic Malware","authors":"Kyoung-Soo Han, Kyoung-Yong Chung, E. Im","doi":"10.1007/978-94-007-2911-7_57","DOIUrl":"https://doi.org/10.1007/978-94-007-2911-7_57","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121662959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-5860-5_56
K. Ragab, M. Yahia
{"title":"Addressing the Out-of-date Problem for Efficient Load Balancing Algorithm in P2P Systems","authors":"K. Ragab, M. Yahia","doi":"10.1007/978-94-007-5860-5_56","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_56","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122718389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-5860-5_85
Tae-Gyu Lee, G. Chung
{"title":"R2TP: Remote-to-Remote Transfer Protocols and Methods","authors":"Tae-Gyu Lee, G. Chung","doi":"10.1007/978-94-007-5860-5_85","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_85","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128145998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}