Pub Date : 1900-01-01DOI: 10.1007/978-94-007-5860-5_92
Yeong-Joon Kim, Chul-Eui Hong
{"title":"A Multimedia Authoring and Virtual Collaboration System Supporting Multi-Conferences for E-Learning","authors":"Yeong-Joon Kim, Chul-Eui Hong","doi":"10.1007/978-94-007-5860-5_92","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_92","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"485 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134016810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-2911-7_17
Yeong-Gyu Lim, Cheong-Ghil Kim, Shin-Dug Kim
{"title":"A Study on the Touch Process of Android Smartphone on Froyo and Gingerbread","authors":"Yeong-Gyu Lim, Cheong-Ghil Kim, Shin-Dug Kim","doi":"10.1007/978-94-007-2911-7_17","DOIUrl":"https://doi.org/10.1007/978-94-007-2911-7_17","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117065448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-5860-5_66
Eunil Park, Ki Joon Kim, A. P. D. Pobil
{"title":"An Examination of Psychological Factors Affecting Drivers' Perceptions and Attitudes Toward Car Navigation Systems","authors":"Eunil Park, Ki Joon Kim, A. P. D. Pobil","doi":"10.1007/978-94-007-5860-5_66","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_66","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115117129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-5860-5_14
Hwa-Jin Park, Sang-Beom Kim
{"title":"Designing a Model for Context Awareness Based Reliable Auction-Recommending System (CARARS) by Utilizing Advanced Information","authors":"Hwa-Jin Park, Sang-Beom Kim","doi":"10.1007/978-94-007-5860-5_14","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_14","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123136289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-5860-5_24
Hyoseung Kim, Seunghwan Park, J. H. Park, Dong Hoon Lee
{"title":"Attribute-Based Encryption for Commercial Content Distribution","authors":"Hyoseung Kim, Seunghwan Park, J. H. Park, Dong Hoon Lee","doi":"10.1007/978-94-007-5860-5_24","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_24","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123328445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-5860-5_120
Zhen-Xing Zhang, Xue-Wei Tian, Sang-Hong Lee, J. Lim
{"title":"A Prototype Selection Algorithm Using Fuzzy k-Important Nearest Neighbor Method","authors":"Zhen-Xing Zhang, Xue-Wei Tian, Sang-Hong Lee, J. Lim","doi":"10.1007/978-94-007-5860-5_120","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_120","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123388778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-2911-7_51
T. Wichaiwong, C. Jaruskulchai
{"title":"An Extended XML Compression Technique for XML Element Retrieval","authors":"T. Wichaiwong, C. Jaruskulchai","doi":"10.1007/978-94-007-2911-7_51","DOIUrl":"https://doi.org/10.1007/978-94-007-2911-7_51","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122126978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-2911-7_41
Kyung-Yong Chung, K. Rim, Jung-Hyun Lee
{"title":"Performance Sensibility Influence of Recommended Makeup Styles","authors":"Kyung-Yong Chung, K. Rim, Jung-Hyun Lee","doi":"10.1007/978-94-007-2911-7_41","DOIUrl":"https://doi.org/10.1007/978-94-007-2911-7_41","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122170627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-2911-7_15
Jong-Hun Kim, Sihoon Ahn, Jaeyoung Soh, Daesung Lee, Kyung-Yong Chung
{"title":"Ubiquitous Based Personalized Hypertension Monitoring System","authors":"Jong-Hun Kim, Sihoon Ahn, Jaeyoung Soh, Daesung Lee, Kyung-Yong Chung","doi":"10.1007/978-94-007-2911-7_15","DOIUrl":"https://doi.org/10.1007/978-94-007-2911-7_15","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121475934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1007/978-94-007-5860-5_22
Jung-Tae Kim
{"title":"Comparison of Attacks and Security Analyses for Different RFID Protocols","authors":"Jung-Tae Kim","doi":"10.1007/978-94-007-5860-5_22","DOIUrl":"https://doi.org/10.1007/978-94-007-5860-5_22","url":null,"abstract":"","PeriodicalId":239663,"journal":{"name":"International Conference on IT Convergence and Security","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124086436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}