scispace - formally typeset
Search or ask a question

Showing papers by "Naver Corporation published in 2008"


Patent
Jun-ho Hwang1, Byoung-Seok Yang1, Gun-Pyo Na1, DongHyun Kim1, Jong-Tae Kim1 
26 Mar 2008
TL;DR: In this paper, a browser controlling method and system using an image is described, which includes inputting an image; recognizing the image; and executing a command based on the recognized image.
Abstract: Browser controlling method and system using an image are provided. The method includes inputting an image; recognizing the image; and executing a command based on the recognized image. Accordingly, the command based on the user's input image can be executed in the browser. Also, since the browser does not need to display various function buttons, the screen can be utilized more efficiently.

139 citations


Journal ArticleDOI
TL;DR: One-step ethanol ablation is an effective and safe method of management of viscous cystic thyroid nodules and no major complications were encountered.
Abstract: OBJECTIVE. The purpose of this study was to evaluate the efficacy and safety of one-step ethanol ablation in the management of viscous cystic thyroid nodules.MATERIALS AND METHODS. Viscous cystic thyroid nodules are defined as nodules that cannot be aspirated with an 18-gauge needle. Nine euthyroid patients underwent one-step ethanol ablation of benign single compressive viscous cystic thyroid nodules (cystic portion > 90%). The thick content of the nodules was removed with either a 16-gauge needle (n = 8) or an 8.5-French pigtail catheter (n = 1) connected to a suction pump. An injection of 99% sterile ethanol then was administered. After 10 minutes, all of the injected ethanol was withdrawn. Additional treatment was prescribed if the cystic portion of the nodule remained larger than 1 mL. Follow-up sonography was performed 1 and 6 months after treatment. At each follow-up examination, nodule volume, symptom score (centimeter visual analog scale, 0–10), cosmetic grade (grade 1–4), and complications were ...

77 citations


Patent
29 Apr 2008
TL;DR: Disclosed as discussed by the authors is a data replication method in a Database Management System (DBMS) that includes generating a replication log through a transaction log of a master database, determining a slave host distributing the replication log to the corresponding slave host, and reflecting the replication in a slave database.
Abstract: Disclosed is a data replication method in a Database Management System (DBMS). The data replication method includes generating a replication log through a transaction log of a master database to thereby transmit the generated replication log to a distributor, determining a slave host distributing the replication log to thereby distribute the replication log to the corresponding slave host, and reflecting the replication log in a slave database.

55 citations


Journal Article
TL;DR: A Bahadur type representation of the coefficients is established under appropriate conditions, and their asymptotic normality and statistical variability are derived on the basis of the representation.
Abstract: The support vector machine has been successful in a variety of applications. Also on the theoretical front, statistical properties of the support vector machine have been studied quite extensively with a particular attention to its Bayes risk consistency under some conditions. In this paper, we study somewhat basic statistical properties of the support vector machine yet to be investigated, namely the asymptotic behavior of the coefficients of the linear support vector machine. A Bahadur type representation of the coefficients is established under appropriate conditions, and their asymptotic normality and statistical variability are derived on the basis of the representation. These asymptotic results do not only help further our understanding of the support vector machine, but also they can be useful for related statistical inferences.

50 citations


Patent
06 Aug 2008
TL;DR: Disclosed as discussed by the authors is a method of selectively displaying comments posted by users, which is based on the comparison of the reputation index of the second user with the threshold value of the first user.
Abstract: Disclosed is a method of selectively displaying comments posted by users. The method comprises setting, by a first user, a threshold value for use in determining whether to display comments posted by users of an Internet service; and sending, by the first user, a request for displaying a page of the Internet service. The requested page contains a comment or a title of a comment posted by a second user who is assigned a reputation index. The method further comprises displaying, on a screen associated with the first user, the requested page, wherein the comment or the title of the second user is selectively redacted based on comparison of the reputation index of the second user with the threshold value of the first user.

37 citations


Patent
05 Jun 2008
TL;DR: In this article, a method for providing additional information related to content of an e-mail such that the user can obtain additional information without leaving the web page showing the email is presented.
Abstract: A method of providing additional information related to content of an e-mail is disclosed. The method includes receiving emails for a user: analyzing content of such a received email and identifying an information type of one or more strings in the content based, at least in part, upon predetermined information patterns; searching additional information related to basic information associated with a string in accordance with the identified information type; and displaying the additional information in response to receiving a user-initiated selection. The present invention is a method and system for providing additional information related to content of an e-mail such that the user can obtain additional information related to content of an e-mail without leaving the web page showing the email.

35 citations


Patent
20 Aug 2008
TL;DR: In this article, a method for authenticating a user by IP address check includes: receiving a URL and a session cookie from a client; determining whether or not an IP address of the client has been changed based on the session cookies; resetting the session cookie, if the IP address has been change, by adding the changed IP address as a temporary IP address to the user if the re-login is successful.
Abstract: A method for authenticating a user by IP address check includes: receiving a URL and a session cookie from a client; determining whether or not an IP address of the client has been changed based on the session cookie; resetting the session cookie, if the IP address has been changed, by adding the changed IP address as a temporary IP address thereto; determining whether or not the URL is required to perform IP address check; requesting a re-login to the client if it is determined that the URL is required to perform IP address check; and adding the temporary IP address to a valid IP address list for the user if the re-login is successful.

32 citations


Patent
Sung-Wone Choi1
18 Aug 2008
TL;DR: In this article, a P2P node managing system managing users connected to the system, and managing p2P file transmissions between the users; and a relay server relaying the file transmitted to the file receiver from the file sender.
Abstract: The present disclosure is related to a P2P file transmission system and method, the system according to the present disclosure may include a P2P node managing system managing users connected to the system, and managing P2P file transmissions between the users; and a relay server relaying the file transmitted to the file receiver from the file sender when the P2P file transmission by the direct connection between the file sender and the file receiver fails. According to an embodiment of the present disclosure, the present disclosure provides more stable file transmissions under an unstable environment for the P2P file transmission such as NAT and the P2P file transmission system may be applied to various network places.

29 citations


Journal ArticleDOI
안인옥, 이성식, 이장호1, 이미자, 조병구 
TL;DR: In this paper, a study was carried out to evaluate the basic information on ginsenoside contents and pattern similarity in five cultivars of Panax ginseng C.A. Meyer.

28 citations


Patent
Sang Hun Jeon1
09 Jun 2008
TL;DR: In this article, a method of determining vulnerability of web application comprises: selecting fixed parameters from parameters of URL link extracted from a website; determining whether a process of determining the selected fixed parameter is completed or not; inserting an attack pattern for each attack type to an input value for the selected parameter; and determining the vulnerability of a selected parameter by each attack types through an analysis of response to the input of a URL link with the attack pattern inserted thereinto.
Abstract: A method of determining vulnerability of web application comprises: selecting fixed parameters from parameters of URL link extracted from a website; determining whether a process of determining vulnerability for the selected fixed parameter is completed or not; inserting an attack pattern for each attack type to an input value for the selected fixed parameter, when the process of determining vulnerability for the selected fixed parameter is not completed; and determining vulnerability of the selected fixed parameter by each attack type through an analysis of response to an input of URL link with the attack pattern inserted thereinto.

28 citations


Patent
01 Apr 2008
TL;DR: In this paper, a method and apparatus for processing and uploading a video file is described, which includes an image editor comprising an integrated user interface, which comprises a preview monitor and an editing board.
Abstract: Disclosed are a method and apparatus for processing and uploading a video file The method of processing the video file comprises: providing an image editor comprising an integrated user interface, which comprises a preview monitor and an editing board, wherein a plurality of thumbnail images of a plurality of videos are displayed on the editing board; displaying a selected one of the plurality of videos or a still frame of the selected video on the preview monitor in response to a user's selection of the video and the user's command for playing the selected video; and editing the selected video so as to provide an edited version of the selected video in response to the user's editing command while or after displaying the selected video on the preview monitor.

Patent
07 Apr 2008
TL;DR: In this article, the authentication system includes a server configured to provide at least two security levels and configured to transmit one of the security modules corresponding to the security level of a user terminal, via communications network, to the user terminal based, at least in part, upon an environment of the user terminals.
Abstract: Authentication system and method are provided. The authentication system includes: a server configured to provide at least two security levels and configured to transmit one of at least two security modules corresponding to the security level of a user terminal, via communications network, to the user terminal based, at least in part, upon an environment of the user terminal; and an authentication server communicatively linked with the server and configured to perform a user authentication in response to a user authentication request from the user terminal. Accordingly, various hackings can be prevented and the user authentication can be accomplished with user's convenience and security.

Patent
28 Mar 2008
TL;DR: In this paper, a method and system for displaying a keyword advertisement through retrieval of an optimal landing page associated with a detailed keyword, and displaying the retrieved landing page for a user, instead of displaying a non-specific landing pages associated with the advertisement keyword included in the detailed keyword.
Abstract: A method and system for displaying a keyword advertisement through retrieval of an optimal landing page associated with a detailed keyword, and displaying the retrieved landing page for a user, instead of displaying a non-specific landing page associated with the advertisement keyword included in the detailed keyword. A method of displaying a keyword advertisement includes: receiving from a user a detailed keyword that includes one or more advertisement keywords purchased by an advertiser and character strings; dynamically retrieving a landing page according to the received detailed keyword; and displaying page information of the landing page for the user.

Patent
29 Aug 2008
TL;DR: In this paper, a system and method for providing a recommendation keyword having a high correlation with the content and reflecting the viewers' interests is provided, where a prospective viewer group of the content is generated by a broadcast time and a keyword of a specific broadcast content and the recommendation keyword for each play time period is stored.
Abstract: There is provided a system and method for providing a recommendation keyword having a high correlation with the content and reflecting the viewers' interests. A prospective viewer group of the content is generated by a broadcast time and a keyword of a specific broadcast content and a keyword set is generated by selecting keywords having a higher correlation with the content than a threshold value from among search words transmitted by the prospective viewer for a predetermined time period including a time before/after the broadcast time of the content. A keyword for each play time period is extracted from the keyword set by using the number of searches for each keyword therein for each play time period and the recommendation keyword for each play time period is stored, which is synchronized with play time of the content.

Patent
Ki Ho Song1
04 Sep 2008
TL;DR: In this paper, the authors proposed a method of running a keyword advertisement service, which comprises receiving, from a potential advertiser, a proposed cost-per-click (proposed CPC) for a first keyword advertisement using a first keywords, providing historical data of a count of search queries submitted to the search engine and comprising the first keyword, and providing historical Data of click-through-rates (CTRs) of keyword advertisement contents arranged in a first one of the plurality of groups of keyword advertisements.
Abstract: Disclosed is a method of running a keyword advertisement service. The method comprises receiving, from a potential advertiser, a proposed cost-per-click (proposed CPC) for a first keyword advertisement using a first keyword, providing historical data of a count of search queries submitted to the search engine and comprising the first keyword, and providing historical data of click-through-rates (CTRs) of keyword advertisement contents arranged in a first one of the plurality of groups of keyword advertisements. The method further comprises computing a first estimated cost for using the keyword advertisement service with regard to the first keyword advertisement for a future period of time, wherein computing uses the proposed CPC, historical data of a count of search queries and historical data of CTRs.

Proceedings ArticleDOI
11 Jun 2008
TL;DR: This paper investigates ontology and its description logic (OWLDL) and establishes it in the pre-planning stage of construction project and will also carry out a case study based on a real project in Korea.
Abstract: Pre-planning stage is a most important stage to determine the success of the project throughout the construction lifecycle. Therefore, all information generated from the pre-planning stage must be processed and retained in the format which all the project participants can share. Furthermore, using object-oriented attributes and meta-data in BIM (Building Information Modeling) for easy control of the space objects are actively being studied. This paper investigates ontology and its description logic (OWLDL) and establishes it in the pre-planning stage of construction project and will also carry out a case study based on a real project in Korea. The special objects will be created and the relationship of these special objects will be defined. An ontology diagram will be suggested that will control the special objects with the constraints applied.

Patent
06 May 2008
TL;DR: In this paper, a ubiquitous notification method and system for managing a member list in a relay platform and providing events of each service provided by a service provider based on 3A (Anytime, Anywhere and Any device) by integrating and integrally managing the events through one route so that a subscriber can manage his event profile, and the service provider can provide subscription authorities of the event push service through a consistent interface.
Abstract: The present invention relates to a ubiquitous notification method and system for managing a member list in a relay platform and providing events of each service provided by a service provider based on 3A (Anytime, Anywhere and Any device) by integrating and integrally managing the events through one route so that a subscriber can integrally manage his event profile, and the service provider can provide subscription authorities of the event push service through a consistent interface. The method according to the present invention includes steps of being pushed an event linked with a service and transmitting an event message in response to the pushed event.

Patent
26 Feb 2008
TL;DR: In this article, a mash-up map advertisement system is presented, which includes an advertisement management unit for generating an advertisement layer and an identifier of the advertisement layer based on advertisement information including geographic location information received from an advertiser terminal.
Abstract: A map advertisement system and method by using a mash-up map advertisement is provided, which can operate various advertisement cost billing policies. The map advertisement system includes an advertisement management unit for generating an advertisement layer and an identifier of the advertisement layer based on advertisement information including geographic location information received from an advertiser terminal; a base map providing unit for providing a base map layer capable of providing geographical information through on-line; and a mash-up map advertisement unit for generating mash-up map data by mixing the advertisement layer with the base map layer based on the geographic location information, wherein the advertisement layer identifier includes at least one information element related to an advertisement exposure on the advertisement layer.

Patent
13 Aug 2008
TL;DR: In this article, a method of running a keyword advertisement service, which comprises providing a CTR at the rank of a first keyword advertisement using a keyword, providing an average CTR-at-rank of a plurality of keyword advertisements, and computing an adjusted CTR of the first keyword advertising using the CTR at-rank and the average CTR at rank, was proposed.
Abstract: Disclosed is a method of running a keyword advertisement service, which comprises providing a CTR-at-rank of a first keyword advertisement using a keyword, providing an average CTR-at-rank of a plurality of keyword advertisements, and computing an adjusted CTR of the first keyword advertisement using the CTR-at-rank and the average CTR-at-rank. The CTR-at-rank of the first keyword advertisement represents a click-through rate for the first keyword advertisement during a predetermined period. The average CTR-at-rank represents an average value of collective click-through rates of the plurality of keyword advertisements during a preselected period.

Patent
Jeong-Hun Moon1, Taeksoo Kim1, Sung Jae Jang1, Kyungyong Kim1, Sang-Yun O1 
20 Jun 2008
TL;DR: In this paper, a ubiquitous presence service method and system is disclosed, wherein the list of subscribers is managed in the replay platform, and the presence of each service from the application server is integrated through one route, and is then integrally managed so that they are provided based on 3A anytime, anywhere and regardless of the device.
Abstract: A ubiquitous presence service method and system is disclosed, wherein the list of subscribers is managed in the replay platform, and the presence of each service from the application server is integrated through one route, and is then integrally managed so that they are provided based on 3A anytime, anywhere and regardless of the device, whereby the subscriber who receives the information about the present status of the application services operated by the various application servers can integrally manage his(her) own presence profiles, and the application server can provide the subscription authorities of the presence service to the consistent interface. The ubiquitous presence service method comprises receiving presence information including a present or updated status of application service from one or more application servers; and transmitting the received presence information to at least one subscriber terminal.

Patent
26 Mar 2008
TL;DR: In this paper, a method for providing advertising content received from an advertiser comprises: receiving at least one advertising content associated with a target user group, and a search keyword associated with the advertising content, and displaying at least a portion of the retrieved advertising content to the user.
Abstract: A method for providing advertising content received from an advertiser comprises: receiving at least one advertising content associated with at least one target user group, and at least one search keyword associated with the at least one advertising content from an advertiser; associating the at least one target user group with at least one demographic category of users; storing the at least one advertising content in association with the at least one demographic category and the at least one search keyword in an advertisement database; detecting a search request from a user; obtaining user profile information associated with the user; retrieving advertising content from the advertisement database corresponding to demographic information contained in the obtained user profile information and the at least one search keyword received from the user; and displaying at least a portion of the retrieved advertising content to the user. The advertising contents include at least one search keyword and brief description, such as a title and/or description of the advertised subject matter.

01 Jan 2008
TL;DR: According to this study, the traditional oriental medical remedy such as accupuncture, herb-medication is effective for the cure of insomnia and mindfullness fortifies the orientalmedical remedy.
Abstract: Insomnia is one of the highest frequency neuropsychosis of neuropsychiatry patients and is primarily caused by major depressive disorder. This case study is about a remedy for a 33 year-old woman who has insomnia and intense depressed mood caused by the continuous family jar. Also, she had the feeling of squeezing her body, pouring cold water into her body, anorexia and feeling cold and hot turn and turn. I operated mindfullness with accupuncture, herb-medication and aroma theraphy. Especially, mindfullness and Gagamguibi-tang were effective for relaxation and the sound sleep in quality and quantity. According to this study, the traditional oriental medical remedy such as accupuncture, herb-medication is effective for the cure of insomnia and mindfullness fortifies the oriental medical remedy.

Book ChapterDOI
17 Jun 2008
TL;DR: A new approach based on the WWL approach, which can quantitatively estimate the security risk of websites that is security risk degree representing the phishing websites, is proposed.
Abstract: As Internet technologies evolve, phishing and pharming attacks frequently occur and diversify. In order to protect the economic loss and privacy of Internet users against the phishing attacks, several researches such as website authentication and email authentication have been studied. Although, most of them use website black-list (WBL) or website white-list (WWL), there are several weak points, such as validity of WBL DB (database) and the short life-cycle of phishing websites. That is, it is impossible to discriminate between legitimate and forged websites until the phishing attacks are detected and recorded into WBL DB. Furthermore, the existing WBL and WWL approaches hardly counter the new generation of sophisticated malware pharming attacks. In this paper, in order to overcome the limitation of WBL and WWL approaches, new approach based on the WWL approach, which can quantitatively estimate the security risk of websites that is security risk degree representing the phishing websites, is proposed.

Journal ArticleDOI
TL;DR: This is the first documented case of the spontaneous rupture of the lateral thoracic artery in a patient with liver cirrhosis, and it is observed that the patient expired despite repeated transcatheter arterial embolization of the longitudinal artery and best supportive care.
Abstract: Bleeding in patients with liver cirrhosis is primarily caused by gastroesophageal varix in association with extensive collateral circulation, portal hypertensive gastropathy, a Mallory-Weiss tear and peptic ulcer disease. The spontaneous rupture of an artery, as a result of coagulopathy, is extremely rare in patients with liver cirrhosis; however, we recently observed a case of a spontaneous rupture of the lateral thoracic artery in a 47 year-old male patient with alcoholic liver cirrhosis. The patient expired despite repeated transcatheter arterial embolization of the lateral thoracic artery and best supportive care. This is, to our knowledge, the first documented case of the spontaneous rupture of the lateral thoracic artery in a patient with liver cirrhosis.

Journal ArticleDOI
TL;DR: Results indicate that KRG can induce infection-relevant immune responses much faster and higher than CRG, and functional activation of CD8+ T-cell may be activated by red ginsengs.

Patent
02 Jun 2008
TL;DR: In this paper, a method of providing dynamic services for web applications, such as e-mail, is disclosed, where a user selects text or an item, the selection is analyzed for the presence of various formats or patterns.
Abstract: A method of providing dynamic services for web applications, such as e-mail, is disclosed. When a user selects text or an item, the selection is analyzed for the presence of various formats or patterns. For example, the items selected or highlighted by the user may be identified as a name, an address, a date, a location, etc. Based on the formats or patterns, various connection functions may then be provided to the user. The connection functions may be provided in the form of various menus, such as a context menu, a right-click menu, a pop-up window, and the like. In addition, the entries of the menu may be dynamically maintained depending on the nature of the items' formats or patterns.

Journal Article
TL;DR: Triploids were characterized by a lower concentration of circulating blood cells, and aquaculture practice should consider the need for a lower surface to volume ratio.
Abstract: Haematological features pertaining to aerobic capability were compared between diploid and triploid specimens of the Far Eastern catfish, Silurus asotus. No significant differences between diploids and triploids were found for the haematocrit value, total haemoglobin, and mean corpuscular haemoglobin concentration, while the mean corpuscular volume, mean corpuscular haemoglobin, and plasma glucose concentration were significantly higher in triploids than in diploids, and the number of red blood cells was significantly lower in triploids than in diploids. The oxygen consumption rate did not differ significantly between diploid and triploid fish ( P>0.05). Nevertheless, the respiratory frequency was higher in triploids than in diploids ( P< 0.05). Triploids were characterized by a lower concentration of circulating blood cells, and aquaculture practice should consider the need for a lower surface to volume ratio.

Patent
Woosung Lee1
30 May 2008
TL;DR: In this article, a method and system for providing an advertisement, and a method for providing training data with respect to providing of an advertisement are provided, where the advertisement providing method includes verifying a document displayed on a web page; providing a user with a recommendation advertisement list associated with the document; verifying an advertisement that is selected by the user from the recommendation advertisements list; and providing the advertisement via the web page.
Abstract: A method and system for providing an advertisement, and a method and system for providing training data with respect to providing of an advertisement are provided. The advertisement providing method includes: verifying a document displayed on a web page; providing a user with a recommendation advertisement list associated with the document; verifying an advertisement that is selected by the user from the recommendation advertisement list; and providing the advertisement via the web page. The method may further include: selecting, from the recommendation advertisement list, a system advertisement that is different from a selected advertisement, wherein the selected advertisement is the advertisement selected by the user. The providing of the advertisement may include providing the first advertisement and the system advertisement via the web page.

Journal ArticleDOI
TL;DR: Correct pad placement and shock delivery can be performed using an AED when instructions are provided via video telephone because a dispatcher can monitor every step and provide correct information.
Abstract: Aim: To evaluate the hypothesis that using an automated external defibrillator (AED) with video telephony-directed cellular phone instructions for untrained laypersons would increase the probability of successful performance of AEDs. Real-time communication with visual images can provide critical information and appropriate instructions to both laypersons and dispatchers. Methods: A prospective observational study was undertaken. 52 public officers with no previous experience in the use of a defibrillator were presented with a scenario in which they were asked to use an AED on a manikin according to the instructions given to them by cellular phones with video telephony. The proportion who successfully delivered a shock and the time interval from cardiac arrest to delivery of the shock were recorded. Results: Placement of the electrode pads was performed correctly by all 52 participants and 51 (98%) delivered an accurate shock. The mean (SD) time to correct shock delivery was 131.8 (20.6) s (range 101–202). Conclusion: Correct pad placement and shock delivery can be performed using an AED when instructions are provided via video telephone because a dispatcher can monitor every step and provide correct information.

Patent
Gun-Pyo Na1
08 Oct 2008
TL;DR: Disclosed as mentioned in this paper is a method of editing text using a web-based text editor, in which a first user input is received for selecting a block of text in the document; in reply to this user input, inserting, into a source code of the document, a first temporary node before the selected block and a second temporary node after the chosen block; receiving a second user input for applying an attribute to the selected blocks, adding an attribute node between the first and second temporary nodes of the source code so as to apply the attribute to at least part of the block of the
Abstract: Disclosed is a method of editing text using a web-based text editor. The method comprises opening a document using a web-based text editor; receiving a first user input for selecting a block of text in the document; in reply to the first user input, inserting, into a source code of the document, a first temporary node before the selected block and a second temporary node after the selected block; receiving a second user input for applying an attribute to the selected block; and in reply to the second user input, adding an attribute node between the first and second temporary nodes of the source code so as to apply the attribute to at least part of the block of the document.