Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2448556acmconferencesBook PagePublication PagesicuimcConference Proceedingsconference-collections
ICUIMC '13: Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
ACM2013 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
ICUIMC '13: The 7th International Conference on Ubiquitous Information Management and Communication Kota Kinabalu Malaysia January 17 - 19, 2013
ISBN:
978-1-4503-1958-4
Published:
17 January 2013
Sponsors:
SIGAPP, SKKU
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 05 Mar 2025Bibliometrics
Abstract

No abstract available.

Proceeding Downloads

research-article
Time series analysis of web server logs for an online newspaper
Article No.: 1, Pages 1–4https://doi.org/10.1145/2448556.2448557

In the last decade, online newspapers have become a viable alternative to conventional hardcopy papers. Many studies have shown that digital media have increased their share of Internet audience. In this study, we use time series analysis to investigate ...

research-article
Cloud computing in academic institutions
Article No.: 2, Pages 1–7https://doi.org/10.1145/2448556.2448558

IT plays important role in education. Cloud Computing is a new technology in the world of IT which emerged recently and began to spread rapidly. Cloud computing is an Internet-based computing services on-demand. The main goal of this paper is to ...

research-article
Applying Hadoop for log analysis toward distributed IDS
Article No.: 3, Pages 1–6https://doi.org/10.1145/2448556.2448559

In this paper, we apply Hadoop for large-scale log analysis. Our main objective is to efficiently detect an abnormal traffic from high volume data. Due to the high volume of data traffics, the size of traffic logs is usually exceed the capacity of a ...

research-article
SETMES: a scalable and efficient tree-based mechanical scheme for multi-channel wireless data broadcast
Article No.: 4, Pages 1–10https://doi.org/10.1145/2448556.2448560

Wireless data broadcast is a widely used approach to disseminate frequently requested data to a mass number of mobile clients. Indexing technology is a kernel strategy in wireless data broadcast systems to help clients reducing their information ...

research-article
Proposal for an optimal job allocation method for data-intensive applications based on multiple costs balancing in a hybrid cloud environment
Article No.: 5, Pages 1–8https://doi.org/10.1145/2448556.2448561

Due to the explosive increase in the amount of information in computer systems, we need a system that can process large amounts of data efficiently. Cloud computing system is an effective means to achieve this capacity and has spread throughout the ...

research-article
Genetic swarm based robust image watermarking
Article No.: 6, Pages 1–7https://doi.org/10.1145/2448556.2448562

This paper presents a new method for adaptive watermark strength optimization in Discrete Cosine Transform (DCT) domain. Watermarking is a method to embed secret information in the host medium. Optimal sub-band and strength selection for watermark is ...

research-article
Efficient evaluation of human-powered joins with crowdsourced join pre-filters
Article No.: 7, Pages 1–6https://doi.org/10.1145/2448556.2448563

There are an increasing number of crowdsourcing systems that exploit the power of the crowd to solve a wide variety of problems that cannot be solved only by computers. The human-powered join is one of the core operations that appear in many ...

research-article
Knowledge retrieval in lexical ontology-based semantic web search engine
Article No.: 8, Pages 1–8https://doi.org/10.1145/2448556.2448564

Discovery of World Wide Web data is slightly affected due to natural-language text presentation in the internet. Moreover, exponential growth of users' requirement and expectation makes the matter more critical. Coping with the overstated problem, ...

research-article
Proposal of automatic reporting system against unauthorized use of smart phone
Article No.: 9, Pages 1–6https://doi.org/10.1145/2448556.2448565

Nowadays, Smart phones become popular. They are used various ways, e.g. as a telephone or e-mail. Furthermore, they become essential for many people who use them in business or in private use. However, a great deal of information is stored in a smart ...

research-article
Features selection approaches for intrusion detection systems based on evolution algorithms
Article No.: 10, Pages 1–5https://doi.org/10.1145/2448556.2448566

Intrusion Detection Systems (IDSs) deal with large amount of data containing irrelevant and redundant features, which leads to slow training and testing processes, heavy computational resources and low detection accuracy. Therefore, the features ...

research-article
Implementation of relaxed ACID properties for distributed load management in the electrical power industry
Article No.: 11, Pages 1–7https://doi.org/10.1145/2448556.2448567

The consistency of data in central databases is normally implemented by using the ACID (Atomicity, Consistency, Isolation and Durability) properties of a DBMS (Data Base Management System).

Distributed databases with high performance and availability do ...

research-article
Towards realistic sampling: generating dependencies in a relational database
Article No.: 12, Pages 1–6https://doi.org/10.1145/2448556.2448568

Managing large amounts of information is one of the most expensive, time-consuming and non-trivial activities and it usually requires expert knowledge. In a wide range of application areas, such as data mining, histogram construction, approximate query ...

research-article
Improving information dissemination and collective data directory for focus group via web based system and SMS
Article No.: 13, Pages 1–5https://doi.org/10.1145/2448556.2448569

Mobile phone technology has a great impact on today society to be in circle of connectivity. It acts as one of the commonly used communication medium in acquiring information. This paper explores the adoption of web-based Short Messaging System (SMS) to ...

research-article
Improving classification accuracy of associative classifiers by using k-conflict-rule preservation
Article No.: 14, Pages 1–6https://doi.org/10.1145/2448556.2448570

Classification is one of the important issues in data mining. Past studies show that associative classification outperforms traditional classification techniques. The rule selection process, particularly the rule pruning mechanism, in an associative ...

research-article
Reducing computational costs of H.264/AVC for video codec in mobile devices
Article No.: 15, Pages 1–6https://doi.org/10.1145/2448556.2448571

In video delivery system, it is known that early detection of all-zero quantized discrete cosine transform (DCT) coefficients can be used to reduce the computational cost of H.264/AVC video encoding, which is critical for mobile applications. In this ...

research-article
Target modeling for tracking and handoff in a camera network
Article No.: 16, Pages 1–7https://doi.org/10.1145/2448556.2448572

Tracking moving objects such as human has become a major topic in video surveillance applications. Camera handoff is an important problem when using multiple cameras which have overlapping or non-overlapping field of views. However, most handoff ...

research-article
Towards a high-level trusted computing API for Android software stack
Article No.: 17, Pages 1–9https://doi.org/10.1145/2448556.2448573

Smartphone platforms are fast becoming the de-facto method of online communication. Android is one of the most promising smartphone platforms with backing of both the finances of industry leaders and the technical skills and expertise of the open source ...

research-article
Realization of dynamic behavior using remotely verifiable n-call slides in Unix process execution trace
Article No.: 18, Pages 1–9https://doi.org/10.1145/2448556.2448574

Trusted computing presents a technique called remote attestation which helps in verifying the trustworthiness of a client's system. Generally known and mostly used methods to verify a target system's integrity are mostly static in nature. For the ...

research-article
Real-time Korean traffic sign detection and recognition
Article No.: 19, Pages 1–5https://doi.org/10.1145/2448556.2448575

In this paper, we propose a real-time Korean traffic sign detection and recognition method based on color properties and shape geometries of images. The proposed method supports detecting and recognizing various shapes of traffic signs in real-time. Our ...

research-article
Real-time traffic sign detection with vehicle camera images
Article No.: 20, Pages 1–4https://doi.org/10.1145/2448556.2448576

This paper presents a real-time traffic sign detection method using color properties and shape-based features for real-world environment applications. The proposed method has two main steps: color-based region segmentation and shape-based verification ...

research-article
Multi-label image annotation based on multi-model
Article No.: 21, Pages 1–7https://doi.org/10.1145/2448556.2448577

Image automatic annotation is a promising and essential step for semantic image retrieval, and it's still a challenge because of the open problem of semantic gap. Recently, most of image annotation approaches paid more attention to detect single label ...

research-article
'What affects me?': a smart public alert system based on stream reasoning
Article No.: 22, Pages 1–10https://doi.org/10.1145/2448556.2448578

Public alert services is gradually becoming popular in smart cities because this enhances the awareness of the citizen about activities within the city. Such a service also ensures the safety and security of the citizens. However the state of the art ...

research-article
Hand detection and feature extraction for static Thai Sign Language recognition
Article No.: 23, Pages 1–6https://doi.org/10.1145/2448556.2448579

This paper proposes a method to detect and extract hand features from video sequences, where a person performs Thai Sign Language (TSL), for recognizing static TSL alphabets. First, the skin regions are segmented using trained skin color model ...

research-article
More reputable recommenders give more accurate recommendations?
Article No.: 24, Pages 1–8https://doi.org/10.1145/2448556.2448580

Existing models of the Trust-Aware Recommender System (TARS) build personalized trust networks for the active users to predict ratings. These models have reasonable rating prediction performances, while suffer from high computational complexity. One ...

research-article
Simplified swarm optimization with differential evolution mutation strategy for parameter search
Article No.: 25, Pages 1–5https://doi.org/10.1145/2448556.2448581

In practical applications, solving dynamic optimization problem is a challenging field. In recent decades, the optimization approach is not merely dealing with unimodal functions, but also multimodal functions. Even more, the performance of optimization ...

research-article
Multivector e-mail filtering with shape and color impression
Article No.: 26, Pages 1–6https://doi.org/10.1145/2448556.2448582

Nowadays, e-mail becomes popular. While, e-mail is a hotbed of crimes such as fraud, computer virus and phishing by SPAM etc. Function of filtering is one of the solutions which are avoided through those troubles. However, the filtering has a problem. E-...

research-article
Looking at the effects of various multimedia approach in student learning: a case study
Article No.: 27, Pages 1–5https://doi.org/10.1145/2448556.2448583

Who benefits from multimedia learning and under what conditions? This study examined the effects that animation and cognitive load have on student understanding of a particular chapter in operating systems as part of the syllabus of Computer Science and ...

research-article
Error-resilient packet reordering for compressed video transmission over error-prone networks
Article No.: 28, Pages 1–6https://doi.org/10.1145/2448556.2448584

In wireless video transmission, the bursty packet losses of the channel will severely impair the reconstructed video quality. This paper presents an error-resilient packet reordering scheme to improve the error robustness of the transmitted video. ...

research-article
New power saving algorithm considering associated STAs and consecutive traffics in WLAN AP
Article No.: 29, Pages 1–5https://doi.org/10.1145/2448556.2448585

Recently, as the use of wireless Internet increases, access point (AP) installation has increased rapidly, only to increase the total power consumed by AP in wireless local area network (WLAN). Because an AP always wakes up regardless of the real use, ...

research-article
A study of video performance analysis between Flash video and HTML 5 video
Article No.: 30, Pages 1–4https://doi.org/10.1145/2448556.2448586

Net book belongs in the category of small, legacy-free and inexpensive portable computer. Net books typically have less powerful hardware than other laptops. Net books are used to run simple task that doesn't utilize a lot of CPU power such as word ...

Index Terms

  1. Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Acceptance Rates

        Overall Acceptance Rate 251 of 941 submissions, 27%
        YearSubmittedAcceptedRate
        ICUIMC '1440711629%
        ICUIMC '1153413525%
        Overall94125127%