Browse > Article
http://dx.doi.org/10.3745/JIPS.00.0001

Advanced Technologies and Applications for Security and Multimedia Computing  

Park, Jong Hyuk (Dept. of Computer Science and Engineering, Seoul National University of Science & Technology (SeoulTech))
Publication Information
Journal of Information Processing Systems / v.12, no.3, 2016 , pp. 333-337 More about this Journal
Keywords
Citations & Related Records
Times Cited By KSCI : 14  (Citation Analysis)
연도 인용수 순위
1 M. Yu, J. Rexford, X. Sun, S. Rao, and N. Feamster, "A survey of virtual LAN usage in campus networks," IEEE Communications Magazine, vol. 49, no. 7, pp. 98-103, 2011.
2 V. G. Nguyen and Y. H. Kim, "SDN-based enterprise and campus networks: a case of VLAN management," Journal of Information Processing Systems, vol. 12, no. 3, pp. 511-524, 2016.   DOI
3 M. H. A. Al-Hooti, S. Djanali, and T. Ahmad, "Audio data hiding based on sample value modification using modulus function," Journal of Information Processing Systems, vol. 12, no. 3, pp. 525-537, 2016.   DOI
4 W. Zhu and C. Lee, "A security protection framework for cloud computing," Journal of Information Processing Systems, vol. 12, no. 3, pp. 538-547, 2016.   DOI
5 S. N. Srirama, P. Jakovits, and E. Vainikko, "Adapting scientific computing problems to clouds using MapReduce," Future Generation Computer Systems, vol. 28, no. 1, pp. 184-192, 2012.   DOI
6 A. Khatamian, R. Jafri, and H. R. Arabnia, "Survey on 3D surface reconstruction," Journal of Information Processing Systems, vol. 12, no. 3, pp. 338-357, 2016.   DOI
7 B. Mederos, N. Amenta, L. Velho, and L. H. de Figueiredo, "Surface reconstruction for noisy point clouds," in Proceedings of 3rd Eurographics Symposium on Geometry Processing, Vienna, Austria, 2005, pp. 53-62.
8 A. M. Azmi and R. S. Almajed, "A survey of automatic Arabic diacritization techniques," Natural Language Engineering, vol. 21, no. 3, pp. 477-495, 2015.   DOI
9 K. Z. Bousmaha, M. K. Rahmouni, B. Kouninef, and L. H. Belguith, "A hybrid approach of morpho-lexical disambiguation of Arabic," Journal of Information Processing Systems, vol. 12, no. 3, pp. 358-380, 2016.   DOI
10 R. Nelken and S. M. Shieber, "Arabic diacritization using weighted finite-state transducers," in Proceedings of the ACL Workshop on Computational Approaches to Semitic Languages, Ann Arbor, MI, 2005, pp. 79-86.
11 S. Han, I. Y. Lee, and J. H. Ahn, "Two-dimensional joint Bayesian method for face verification," Journal of Information Processing Systems, vol. 12, no. 3, pp. 381-391, 2016.   DOI
12 G. B. Huang, M. Ramesh, T. Berg, and E. Learned-Miller, "Labeled faces in the wild: a database for studying face recognition in unconstrained environments," University of Massachusetts, Amherst, Technical Report 07-49, 2007.
13 L. Boussaad, M. Benmohammed, and R. Benzid, "Age invariant face recognition based on DCT feature extraction and kernel Fisher analysis," Journal of Information Processing Systems, vol. 12, no. 3, pp. 392-409, 2016.   DOI
14 T. F. Cootes, G. J. Edwards, and C. J. Taylor, "Active appearance models," IEEE Transactions on pattern Analysis and Machine Intelligence, vol. 23, no. 6, pp. 681-685, 2001.   DOI
15 H. Chao and C. Song, "Landmark-guided segmental speech decoding for continuous mandarin speech recognition," Journal of Information Processing Systems, vol. 12, no. 3, pp. 410-421, 2016.   DOI
16 S. A. Liu, "Landmark detection for distinctive feature-based speech recognition," Journal of the Acoustical Society of America, vol. 100, no. 5, pp. 3417-3430, 1996.   DOI
17 H. W. Seo, H. Kwon, M. A. Cheon, and J. H. Kim, "Bilingual multiword expression alignment by constituentbased similarity score," Journal of Information Processing Systems, vol. 12, no. 3, pp. 455-467, 2016.   DOI
18 S. Y. Choi, D. Kim, and Y. M. Kim, "ELPA: emulation-based linked page map analysis for the detection of driveby download attacks," Journal of Information Processing Systems, vol. 12, no. 3, pp. 422-435, 2016.   DOI
19 C. Chantrapornchai and P. Nusawat, "Two machine learning models for mobile phone battery discharge rate prediction based on usage patterns," Journal of Information Processing Systems, vol. 12, no. 3, pp. 436-454, 2016.   DOI
20 N. Vallina-Rodriguez and J. Crowcroft, "Energy management techniques in modern mobile handsets," IEEE Communications Surveys & Tutorials, vol. 15, no. 1, pp. 179-198, 2013.   DOI
21 F. Smadja, K. McKeown, and V. Hatzivassiloglou, "Translating collocations for bilingual lexicons: a statistical approach," Computational Linguistics, vol. 22, no. 1, pp. 1-38, 1996.
22 C. Ammar, B. Mebarka, O. Abdelmalik, and B. Salah, "Evaluation of Histograms Local Features and Dimensionality Reduction for 3D Face Verification," Journal of Information Processing Systems, vol. 12, no. 3, pp. 468-488, 2016.   DOI
23 Y. Ming, "Rigid-area orthogonal spectral regression for efficient 3D face recognition," Neurocomputing, vol. 129, pp. 445-457, 2014.   DOI
24 J. K. Lee, S. Y. Moon, and J. H. Park, "HB-DIPM: human behavior analysis-based malware detection and intrusion prevention model in the future internet," Journal of Information Processing Systems, vol. 12, no. 3, pp. 489-501, 2016.   DOI
25 Y. Hou, X. Wang, and S. Liu, "A multiple features video copy detection algorithm based on a SURF descriptor," Journal of Information Processing Systems, vol. 12, no. 3, pp. 502-510, 2016.   DOI