Filter
Conference contribution

Search results

  • 2008

    Detection of hidden information in forensic tools

    Kim, Y., Bang, J., Lee, S. & Lim, J., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 248-252 5 p. 4511571. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Distributed backoff reservation and scheduling for collision mitigation in IEEE 802.11 WLANs

    Choi, E. & Lee, W., 2008, 2008 International Conference on Information Networking, ICOIN. 4472740. (2008 International Conference on Information Networking, ICOIN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • DSML: Dual signal metrics for localization in wireless sensor networks

    Kim, K., Lee, W. & Choi, C., 2008, WCNC 2008 - IEEE Wireless Communications and Networking Conference, Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 2355-2360 6 p. 4489446. (IEEE Wireless Communications and Networking Conference, WCNC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Efficient and secure communication between set-top box and smart card in IPTV broadcasting

    Lee, J. S., Rhee, H. S. & Lee, D. H., 2008, Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008. p. 307-310 4 p. 4622843. (Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Efficient and secure remote authenticated key agreement scheme for multi-server using mobile equipment

    Jun, H. L. & Dong, H. L., 2008, 2008 Digest of Technical Papers International Conference on Consumer Electronics, The Mobile Consumer, ICCE 2008. 4588089. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Efficient method of detecting globally blurry or sharp images

    Tsomko, E. & Kim, H. J., 2008, WIAMIS 2008 - Proceedings of the 9th International Workshop on Image Analysis for Multimedia Interactive Services. p. 171-174 4 p. 4556912. (WIAMIS 2008 - Proceedings of the 9th International Workshop on Image Analysis for Multimedia Interactive Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • Extended OCBP Scheme for MIPv6 over IEEE 802.16e Networks

    Park, H. S., Yun, S., Kim, B. H., Lee, D. C., Yi, O. & Lee, S., 2008, Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008. p. 732-738 7 p. 4622915. (Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Extraction of residual information in the microsoft powerpoint file from the viewpoint of digital forensics considering PerCom environment

    Park, J., Park, B., Lee, S., Hong, S. & Park, J. H., 2008, 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008. p. 584-589 6 p. 4517460. (6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Formal verification of cryptographic protocol for secure RFID system

    Kim, H. S., Oh, J. H., Kim, J. B., Jeong, Y. O. & Choi, J. Y., 2008, Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008. p. 470-477 8 p. 4624188. (Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • GENTLE: Reducing reader collision in mobile RFID networks

    Yu, J. & Lee, W., 2008, Proceedings - 4th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2008. p. 280-287 8 p. 4721283. (Proceedings - 4th International Conference on Mobile Ad-hoc and Sensor Networks, MSN 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Citations (Scopus)
  • Handover latency analysis of a network-based localized mobility management protocol

    Kong, K. S., Lee, W., Han, Y. H. & Shin, M. K., 2008, ICC 2008 - IEEE International Conference on Communications, Proceedings. p. 5838-5843 6 p. 4534128. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    69 Citations (Scopus)
  • Implementation and analysis of new lightweight cryptographic algorithm suitable for wireless sensor networks

    Koo, W. K., Lee, H., Kim, Y. H. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 73-76 4 p. 4511537. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    47 Citations (Scopus)
  • Live forensic analysis of a compromised linux system using LECT (Linux Evidence Collection Tool)

    Choi, J., Savoldi, A., Gubian, P., Lee, S. & Lee, S., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 231-236 6 p. 4511568. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Methodologies for detecting covert database

    Lee, K. G., Savoldi, A., Gubian, P., Lim, K. S., Lee, S. & Lee, S., 2008, Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008. p. 538-541 4 p. 4604115. (Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Practical security testing using file fuzzing

    Kim, H., Choi, Y., Lee, D. & Lee, D., 2008, 10th International Conference on Advanced Communication Technology, ICACT 2008 - Proceedings. p. 1304-1307 4 p. 4494003. (International Conference on Advanced Communication Technology, ICACT; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Privacy-aware access control through negotiation in daily life service

    Park, H. A., Zhan, J. & Lee, D. H., 2008, Intelligence and Security Informatics - IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Proceedings. p. 514-519 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5075 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Privacy preserving SQL queries

    Park, H. A., Zhan, J. & Lee, D. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 549-554 6 p. 4511626. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Recovery of damaged compressed files for digital forensic purposes

    Park, B., Savoldi, A., Gubian, P., Park, J., Lee, S. H. & Leer, S., 2008, Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008. p. 365-372 8 p. 4505751. (Proceedings - 2008 International Conference on Multimedia and Ubiquitous Engineering, MUE 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Related-key chosen IV attacks on grain-v1 and grain-128

    Lee, Y., Jeong, K., Sung, J. & Hong, S., 2008, Information Security and Privacy - 13th Australasian Conference, ACISP 2008, Proceedings. Springer Verlag, p. 321-335 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5107 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    62 Citations (Scopus)
  • SARC: A street-based anonymous vehicular ad hoc routing protocol for city environments

    Kim, H., Paik, J., Lee, B. & Lee, D., 2008, Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. p. 324-329 6 p. 4755247. (Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Second preimage attack on 3-pass HAVAL and partial key-recovery attacks on HMAC/NMAC-3-pass HAVAL

    Lee, E., Chang, D., Kim, J., Sung, J. & Hong, S., 2008, Fast Software Encryption - 15th International Workshop, FSE 2008, Revised Selected Papers. p. 189-206 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5086 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Secure mutual authentication and fair billing for roaming service in wireless mobile networks

    Im, T. R., Lee, H., Cho, K. T. & Lee, D. H., 2008, Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008. p. 466-471 6 p. 4682285. (Proceedings - 3rd International Conference on Convergence and Hybrid Information Technology, ICCIT 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses

    Lee, C., Kim, J., Hong, S., Lee, S., Sung, J. & Lee, H. M., 2008, Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008. p. 199-206 8 p. 4654086. (Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Smart card-based three-party key exchange without server's assistance

    Kim, Y. H., Youn, T. G., Park, Y. H. & Hong, S. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 146-149 4 p. 4511552. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Strong authentication protocol for secure RFID tag search without help of central database

    Won, T. Y., Chun, J. Y. & Lee, D. H., 2008, Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008. p. 153-158 6 p. 4755222. (Proceedings of The 5th International Conference on Embedded and Ubiquitous Computing, EUC 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Citations (Scopus)
  • The design of framework for detecting an insider's leak of confidential information

    Baek, E., Kim, Y., Sung, J. & Lee, S., 2008 Jan 21, e-Forensics 2008 - Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop. Association for Computing Machinery, Inc, 1363236. (e-Forensics 2008 - Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • The evidence collection of DoS attack in WLAN by using WLAN forensic profiling system

    Yim, D., Lim, J. Y., Yun, S., Lim, S. H., Yi, O. & Lim, J., 2008, Proceedings of the International Conference on Information Science and Security, ICISS 2008. IEEE Computer Society, p. 197-204 8 p. 4438234. (Proceedings of the International Conference on Information Science and Security, ICISS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • USBPassOn: Secure USB Thumb Drive forensic toolkit

    Lee, K. G., Lee, H. W., Park, C. W., Bang, J. W., Kim, K. Y. & Lee, S., 2008, Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008. p. 279-282 4 p. 4734222. (Proceedings of the 2008 2nd International Conference on Future Generation Communication and Networking, FGCN 2008; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • User authentication mechanism using java card for personalized IPTV services

    Park, Y. K., Lim, S. H., Yi, O., Lee, S. & Kim, S. H., 2008, Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008. p. 618-626 9 p. 4622895. (Proceedings - 2008 International Conference on Convergence and Hybrid Information Technology, ICHIT 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Using cross-layer heuristic and network coding to improve throughput in multicast wireless mesh networks

    Do, T. M. V., Nguyen, H. C., Wonjun, L. & Ha, Q. T., 2008, 2008 International Conference on Information Networking, ICOIN. 4472771. (2008 International Conference on Information Networking, ICOIN).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Watermarking security incorporating natural scene statistics

    Ni, J., Zhang, R., Fang, C., Huang, J., Wang, C. & Kim, H. J., 2008, Information Hiding - 10th International Workshop, IH 2008, Revised Selected Papers. Springer Verlag, p. 132-146 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5284 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Weaknesses analysis and countermeasure of a verifier-based key agreement protocol

    Kim, H. S., Seo, S. & Choi, J. Y., 2008, Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008. p. 1015-1018 4 p. 4637818. (Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2007

    A digital ID purse mechanism using USIM in a mobile environment

    Song, D., Lim, S. H., Yi, O. & Lim, J., 2007, Innovations'07: 4th International Conference on Innovations in Information Technology, IIT. IEEE Computer Society, p. 670-674 5 p. 4430424. (Innovations'07: 4th International Conference on Innovations in Information Technology, IIT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • A field guide to hidden accounting information detection

    Kim, Y., Bang, J., Lee, G. T., Lee, S. J. & Lim, J., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 146-150 5 p. 4426220. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A light-weight security protocol for RFID system

    Oh, J. H., Kim, H. S. & Choi, J. Y., 2007, Personal Wireless Communications: The 12th IFIP International Conference on Personal Wireless Communications (PWC 2007), Prague, Czech Republic, September 2007. Bestak, R., Simak, B. & Kozlowska, E. (eds.). p. 384-395 12 p. (IFIP International Federation for Information Processing; vol. 245).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • An efficient password-based e-mail protocol for encrypted e-mail transmissions on mobile equipment

    Kwon, J. O., Jeong, I. R., Sakurai, K. & Lee, D. H., 2007, Digest of Technical Papers - 2007 International Conference on Consumer Electronics, ICCE 2007. 4146128. (Digest of Technical Papers - IEEE International Conference on Consumer Electronics).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • An innocuous visual cryptography scheme

    Kim, H. J., Sachnev, V., Choi, S. J. & Xiang, S., 2007, 8th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2007. 4279173. (8th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Anonymous and traceable communication using tamper-proof device for vehicular Ad hoc Networks

    Kim, B. H., Choi, K. Y., Lee, J. H. & Lee, D. H., 2007, 2007 International Conference on Convergence Information Technology, ICCIT 2007. p. 681-686 6 p. 4420338. (2007 International Conference on Convergence Information Technology, ICCIT 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Ant colony optimization for satellite customer assignment

    Kim, S. S., Kim, H. J., Mani, V. & Kim, C. H., 2007, Ubiquitous Convergence Technology - First International Conference, ICUCT 2006, Revised Selected Papers. p. 170-179 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4412 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Approach of the secure communication mechanism in aero-wireless environment

    Kim, K., Hong, J. & Lim, J., 2007, Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007. p. 1070-1075 6 p. 4197419. (Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • A practical inter-sensor broadcast authentication scheme

    Kim, J. W., Kim, Y. H., Lee, H. & Lee, D. H., 2007, Universal Access in Human-Computer Interaction: Coping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.. PART 1 ed. Springer Verlag, p. 399-405 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4554 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Citations (Scopus)
  • A secure and efficient key management scheme for wireless sensor networks

    Kim, Y. H., Lee, H. & Lee, D. H., 2007, Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm. p. 162-167 6 p. 4550324. (Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, SecureComm).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A secure communication protocol for low-cost RFID system

    Oh, J. H., Kim, H. S. & Choi, J. Y., 2007, CIT 2007: 7th IEEE International Conference on Computer and Information Technology. p. 949-954 6 p. 4385207. (CIT 2007: 7th IEEE International Conference on Computer and Information Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • A secure handover protocol design in wireless networks with formal verification

    Lim, S. H., Bang, K. S., Yi, O. & Lim, J., 2007, Wired/Wireless Internet Communications - 5th International Conference, WWIC 2007, Proceedings. Springer Verlag, p. 67-78 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4517 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Automated grocery ordering systems for smart home

    Hong, K. S., Kim, H. J. & Lee, C., 2007, Proceedings of Future Generation Communication and Networking, FGCN 2007. Institute of Electrical and Electronics Engineers Inc., p. 87-92 6 p. 4426209. (Proceedings of Future Generation Communication and Networking, FGCN 2007; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Bogus data filtering in sensor networks

    Kim, Y. H., Park, J. H., Lee, D. H. & Lim, J., 2007, Emerging Technologies in Knowledge Discovery and Data Mining - PAKDD 2007 International Workshops, Revised Selected Papers. Springer Verlag, p. 629-635 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4819 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Bridging OSGi islands through SLP protocol

    Lee, C., Yi, J. & Lee, W., 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. Springer Verlag, p. 787-797 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4611 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Certificateless public key encryption in the selective-ID security model (without random oracles)

    Park, J. H., Choi, K. Y., Hwang, J. Y. & Lee, D. H., 2007, Pairing-Based Cryptography - Pairing 2007 - First International Conference, Proceedings. p. 60-82 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4575 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • Classification of key management schemes for wireless sensor networks

    Lee, H., Kim, Y. H., Lee, D. H. & Lim, J., 2007, Advances in Web and Network Technologies, and Information Management - APWeb/WAIM 2007 International Workshops DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Proceedings. Springer Verlag, p. 664-673 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4537 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Comparative evaluation of probabilistic and deterministic tag anti-collision protocols for RFID networks

    Choi, J. & Lee, W., 2007, Emerging Direction in Embedded and Ubiquitous Computing - EUC 2007 Workshops: TRUST, WSOC NCUS, UUWSN, USN, ESO, and SECUBIQ, Proceedings. Denko, M. K., Denko, M. K., Denko, M. K., Shih, C.-S., Shih, C.-S., Shih, C.-S., Li, K.-C., Li, K.-C., Li, K.-C., Tsao, S.-L., Tsao, S.-L., Tsao, S.-L., Zeng, Q.-A., Zeng, Q.-A., Zeng, Q.-A., Park, S.-H., Park, S.-H., Park, S.-H., Ko, Y.-B., Ko, Y.-B., Ko, Y.-B., Hung, S.-H., Hung, S.-H., Hung, S.-H., Park, J. H., Park, J. H. & Park, J. H. (eds.). Springer Verlag, p. 538-549 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4809 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    8 Citations (Scopus)