The 4th International Conference on Ubiquitous Information Management and Communication


Thursday, Jan. 14, 2010


Session A

Session B

09:00 - 09:25

Opening Session

09:30 - 11:00

Session : Wireless LAN & Mesh Networks
(Session Chair: Sang-Hyo Kim)

A Sensor Data Collection Method for Rounding Sink

An Information Acquiring System with Privacy Protection on Distributed Communications Networks

Physical Cell Identity Reservation for 3GPP LTE Femtocell

Enhanced Detection Method for 3GPP LTE QO-SFBC system in frequency selective Rayleigh Fading Channel Environment

Dual Token Bucket Based HCCA Scheduler for IEEE 802.11e WLAN

Session : Sensor Networks
(Session Chair: Kangwoo Lee)

Community-Based Recipe Recommendation and Adaptation in Peer-to-Peer Networks (Invited Paper)

Public Key Cryptography - based Security Scheme for Wireless Sensor Networks in Healthcare

Reliable Transmission on Wireless Sensor Networks with Delegated Acknowledgement

Privacy Enhancement in Mobile Data Broadcasting Environments

MGR A Multicandidate Greedy Routing Scheme in Wireless Sensor Networks

11:00 - 11:15


11:15 - 12:30

Session : Telecommunication Networks
(Session Chair: Tae Hee Han)

Quality Analysis of CSMA/CA Communications in Inter-Vehicle Communication Services

Proposal and Evaluation of a Bloom Filter-Based User Search Method for Movement Records on P2P Network

A QoS Provisioning Mechanisms based on Effective Bandwidth for the Polling based WLAN System

OCDP : A WBAN MAC Protocol for Contention-based Medical and CE applications

Session : Multimedia Processing I
(Session Chair: Chin-Chen Chang)

A Technique of Embedding Digital Data in an Image Compression Code Reversibly (Invited Paper)

Reversible Data Hiding Scheme with High Payload for JPEG images

Enhance the Visual Quality of Shares and Recovered Secret on Meaningful Shares Visual Secret Sharing

A Novel Color Palette Image Authentication Scheme


12:30 - 2:00


2:00 - 3:45

Session : Systems and Applications I
(Session Chair: Qing Li)

Community-Based Recipe Recommendation and Adaptation in Peer-to-Peer Networks (Invited Paper)

Judgment of Web Pages Based on Information Value that Decays with Time

B2B E-Commerce Adoption and Implementation Constraints and Critical Success Factors in the Healthcare Organizations

A Model of Transiting Individual Efforts to the Outcomes of Virtual Team

In Situ Measurement of Geosensors in Low-rate Networks

A Constraint-based Tool for Data Integrity Management on the Web

Session : Web Technology
(Session Chair: Juryon Paik)

Evaluating Credibility of Web Information (Invited Paper)

Discovering Intermediate Entities from Two Examples by Using Web Search Engine Indices

ChronoSeeker: Search Engine for Future and Past Events

A Prediction Search Based on Changes of Queries and Search Results

Adaptive Ranking of Search Results by Considering User's Comprehension

Influence Maximization through Identifying Seed Nodes from Implicit Social Networks

3:45 - 4:00


4:00 - 5:45

Session : Information Management
(Session Chair: Jeng-Shyang Pan)

Bridging the Gap Between Web Service-based Context Suppliers and Ontology-based Context Consumers

Dimensionality Reduction Based on Nonparametric Discriminant Analysis with Kernels for Feature Extraction and Recognition

Methods to Utilizing Cloud Computing in Developing Mobile Internet Device (MID) Applications

Context Data Abstraction Framework using RDF

Game Behavior Pattern Modeling for Game BOT Detection in MMORPG

A Partitioning Method for High Dimensional Data

Session : Data and Web Mining
(Session Chair: Katsumi Tanaka)

Interactive Stream Mining of Maximal Frequent Itemsets Allowing Flexible Time Intervals and Support Thresholds

Discovery of User Behavior Patterns from Geo-tagged Micro-blogs

Using Compressed FP-tree for Incremental Data Mining

Detecting Splogs using Similarities of Splog HTML Structures

Diversity of Feature Selection Approaches combined with back-propagation neural network in Credit Scoring

Link Analysis in Mind Maps: A New Approach to Determining Document Relatedness

Friday, Jan. 15, 2010


Session A

Session B

09:00 - 10:30

Session : Intelligent Systems I
(Session Chair: Jee-Hyong Lee)

Universal Rich Presence Framework for Intelligent Call Management

Intent Feature Discovery using Q&A Corpus and Web Data

Systematic Measurement of Human Map-Reading Ability with Street-View based Navigation Systems

Proposal of Electronic Commerce System with Cellular Phones for Digital Forensics

Cache Conscious Trees on Modern Microprocessors

Session : Multimedia Processing II
(Session Chair: Min Young Chung)

A Simple Image Encoding Method with Data Lossless Information Hiding

A Hierarchical Model Approach for Measuring Typicality of Images

Query by Example for Geographic Entity Search with Implicit Negative Feedback

Detailed-information Browsing to Form Centralized Mesh Structure in Region of Interest

Reversible Data Hiding Using Neighboring Block in VQ-Compressed Images

10:30 - 10:45


10:45 - 12:40

Session : Systems and Applications II
(Session Chair: Masato Oguchi)

Performance Improvement of iSCSI Remote Storage Access (Invited Paper)

A Proposal of Visualizing Reputation Using Evaluation Expression Dictionaries

The Open Source IPTV Service Development Environment -- IPTV Service Execution Environment

A TOTEM-based Approach for Scientific Workflow Management

A Reversible and Multiple-layer Embedding Strategy with High Capacity

Hiding Data in Parity Check Bit

Session : Intelligent Systems II
(Session Chair: Ok-Ran Jeong)

An interactive agent system for supporting knowledge-based recommendation£≠A case study on an e-novel recommender system

Smartcard-based Micro-Billing Scheme to Activate the Market for User-Generated Content

Actor Petri net Model for Scientific Workflows: Model, Design and System (Regluar)

A System for Supporting Dietary Habits: Planning Menus and Visualizing Nutritional Intake Balance

A Personalized Recommendation System Based on Product Attribute-specific Weights and Improved User Behavior Analysis

12:40 - 2:00


2:00 - 3:45

Session : Security, Privacy and Personalization
(Session Chair: Seungjoo Kim)

Query Log Perturbation Method for Privacy Preserving Query

Security Analysis on Commercial Online Music Streaming Service and Countermeasures

An Efficient Context-Aware Personalization Technique in Ubiquitous Environments

Automatic Query-based Personalized Summarization that uses Pseudo Relevance Feedback with NMF

Skin Surface Reconstruction from Stereo Images

RBAC-Based Access Control for Privacy Preserving in Semantic Web

Session : Communication Technologies
(Session Chair: Tae-Jin Lee)

A Scaffolding M-learning Framework with IMS Based IPTV PVR Service

A Minimum Mean-Squared Error Relay for Three-way Relay Channels with Network Coding

High throughput path selection for IEEE 802.11s based Wireless Mesh Networks

A Multi-Rate Routing Protocol with Connection Entropy for Mobile Ad Hoc Networks

An Improved DV-Hop Localization Algorithm in Ad Hoc Networks

3:45 - 4:00


4:00 - 6:00

Session : Intelligent Systems III
(Session Chair: Chang Wook Ahn)

A Self-Organizing Two-way DPWS Adaptor for Adaptive Interoperability of Multiple Heterogeneous Services

An Enhanced OLSR Protocol Based on Link Reliability

ARHMAM: an Activity Recognition System based on Hidden Markov minded Activity Model

A Comprehensive Architecture for Autonomic Service Management

Comparison of Feature Selection Methods in ECG Signal Classification

Session : Systems and Applications III
(Session Chair: Seokho Yoon)

Semantic Operation Composition according to User Tasks in Ubiquitous Environment

A SIP-TRW Algorithm for DDoS Attack Detection in SIP Environments

A 2.4-GHz IEEE 802.15.4 CMOS Single-Chip Transceiver for Wireless PAN Applications

High-Speed Architecture for Three-Parallel Reed-Solomon Decoder using S-DCME