DOI QR코드

DOI QR Code

Advanced Technologies and Applications for Security and Multimedia Computing

  • Park, Jong Hyuk (Dept. of Computer Science and Engineering, Seoul National University of Science & Technology (SeoulTech))
  • Received : 2016.09.02
  • Accepted : 2016.09.12
  • Published : 2016.09.30

Abstract

Keywords

References

  1. A. Khatamian, R. Jafri, and H. R. Arabnia, "Survey on 3D surface reconstruction," Journal of Information Processing Systems, vol. 12, no. 3, pp. 338-357, 2016. https://doi.org/10.3745/JIPS.01.0010
  2. B. Mederos, N. Amenta, L. Velho, and L. H. de Figueiredo, "Surface reconstruction for noisy point clouds," in Proceedings of 3rd Eurographics Symposium on Geometry Processing, Vienna, Austria, 2005, pp. 53-62.
  3. K. Z. Bousmaha, M. K. Rahmouni, B. Kouninef, and L. H. Belguith, "A hybrid approach of morpho-lexical disambiguation of Arabic," Journal of Information Processing Systems, vol. 12, no. 3, pp. 358-380, 2016. https://doi.org/10.3745/JIPS.02.0041
  4. R. Nelken and S. M. Shieber, "Arabic diacritization using weighted finite-state transducers," in Proceedings of the ACL Workshop on Computational Approaches to Semitic Languages, Ann Arbor, MI, 2005, pp. 79-86.
  5. A. M. Azmi and R. S. Almajed, "A survey of automatic Arabic diacritization techniques," Natural Language Engineering, vol. 21, no. 3, pp. 477-495, 2015. https://doi.org/10.1017/S1351324913000284
  6. S. Han, I. Y. Lee, and J. H. Ahn, "Two-dimensional joint Bayesian method for face verification," Journal of Information Processing Systems, vol. 12, no. 3, pp. 381-391, 2016. https://doi.org/10.3745/JIPS.02.0036
  7. G. B. Huang, M. Ramesh, T. Berg, and E. Learned-Miller, "Labeled faces in the wild: a database for studying face recognition in unconstrained environments," University of Massachusetts, Amherst, Technical Report 07-49, 2007.
  8. L. Boussaad, M. Benmohammed, and R. Benzid, "Age invariant face recognition based on DCT feature extraction and kernel Fisher analysis," Journal of Information Processing Systems, vol. 12, no. 3, pp. 392-409, 2016. https://doi.org/10.3745/JIPS.02.0043
  9. T. F. Cootes, G. J. Edwards, and C. J. Taylor, "Active appearance models," IEEE Transactions on pattern Analysis and Machine Intelligence, vol. 23, no. 6, pp. 681-685, 2001. https://doi.org/10.1109/34.927467
  10. H. Chao and C. Song, "Landmark-guided segmental speech decoding for continuous mandarin speech recognition," Journal of Information Processing Systems, vol. 12, no. 3, pp. 410-421, 2016. https://doi.org/10.3745/JIPS.03.0052
  11. S. A. Liu, "Landmark detection for distinctive feature-based speech recognition," Journal of the Acoustical Society of America, vol. 100, no. 5, pp. 3417-3430, 1996. https://doi.org/10.1121/1.416983
  12. S. Y. Choi, D. Kim, and Y. M. Kim, "ELPA: emulation-based linked page map analysis for the detection of driveby download attacks," Journal of Information Processing Systems, vol. 12, no. 3, pp. 422-435, 2016. https://doi.org/10.3745/JIPS.03.0045
  13. C. Chantrapornchai and P. Nusawat, "Two machine learning models for mobile phone battery discharge rate prediction based on usage patterns," Journal of Information Processing Systems, vol. 12, no. 3, pp. 436-454, 2016. https://doi.org/10.3745/JIPS.03.0048
  14. N. Vallina-Rodriguez and J. Crowcroft, "Energy management techniques in modern mobile handsets," IEEE Communications Surveys & Tutorials, vol. 15, no. 1, pp. 179-198, 2013. https://doi.org/10.1109/SURV.2012.021312.00045
  15. H. W. Seo, H. Kwon, M. A. Cheon, and J. H. Kim, "Bilingual multiword expression alignment by constituentbased similarity score," Journal of Information Processing Systems, vol. 12, no. 3, pp. 455-467, 2016. https://doi.org/10.3745/JIPS.02.0044
  16. F. Smadja, K. McKeown, and V. Hatzivassiloglou, "Translating collocations for bilingual lexicons: a statistical approach," Computational Linguistics, vol. 22, no. 1, pp. 1-38, 1996.
  17. C. Ammar, B. Mebarka, O. Abdelmalik, and B. Salah, "Evaluation of Histograms Local Features and Dimensionality Reduction for 3D Face Verification," Journal of Information Processing Systems, vol. 12, no. 3, pp. 468-488, 2016. https://doi.org/10.3745/JIPS.02.0037
  18. Y. Ming, "Rigid-area orthogonal spectral regression for efficient 3D face recognition," Neurocomputing, vol. 129, pp. 445-457, 2014. https://doi.org/10.1016/j.neucom.2013.09.014
  19. J. K. Lee, S. Y. Moon, and J. H. Park, "HB-DIPM: human behavior analysis-based malware detection and intrusion prevention model in the future internet," Journal of Information Processing Systems, vol. 12, no. 3, pp. 489-501, 2016. https://doi.org/10.3745/JIPS.01.0009
  20. Y. Hou, X. Wang, and S. Liu, "A multiple features video copy detection algorithm based on a SURF descriptor," Journal of Information Processing Systems, vol. 12, no. 3, pp. 502-510, 2016. https://doi.org/10.3745/JIPS.02.0042
  21. M. Yu, J. Rexford, X. Sun, S. Rao, and N. Feamster, "A survey of virtual LAN usage in campus networks," IEEE Communications Magazine, vol. 49, no. 7, pp. 98-103, 2011.
  22. V. G. Nguyen and Y. H. Kim, "SDN-based enterprise and campus networks: a case of VLAN management," Journal of Information Processing Systems, vol. 12, no. 3, pp. 511-524, 2016. https://doi.org/10.3745/JIPS.03.0039
  23. M. H. A. Al-Hooti, S. Djanali, and T. Ahmad, "Audio data hiding based on sample value modification using modulus function," Journal of Information Processing Systems, vol. 12, no. 3, pp. 525-537, 2016. https://doi.org/10.3745/JIPS.03.0054
  24. W. Zhu and C. Lee, "A security protection framework for cloud computing," Journal of Information Processing Systems, vol. 12, no. 3, pp. 538-547, 2016. https://doi.org/10.3745/JIPS.03.0053
  25. S. N. Srirama, P. Jakovits, and E. Vainikko, "Adapting scientific computing problems to clouds using MapReduce," Future Generation Computer Systems, vol. 28, no. 1, pp. 184-192, 2012. https://doi.org/10.1016/j.future.2011.05.025