Korean | English

pISSN : 2092-8114 / eISSN : 2733-4384

2020 KCI Impact Factor : 0.41
Home > Explore Content > All Issues > Article List

2016, Vol.12, No.1

  • 1.

    An Introduction to POSAR Test and its Implications for Software Appraisal

    Kim, Si Yeol | 2016, 12(1) | pp.1~10 | number of Cited : 0
    Abstract PDF
    The 3-step test has recently come into the spotlight as a method for determining substantial similarity. The method, however, is still riddled with various issues. This study reflects on the current situation, and provides an overview of the POSAR Test recently proposed in the United States and its implications for software assessment in South Korea.
  • 2.

    Problem of SW Cost Estimation Guideline for the Appraisal of Software Development Cost

    Kwon, Ki Tae | 2016, 12(1) | pp.11~19 | number of Cited : 2
    Abstract PDF
    The development cost appraisal of the computer program has been assumed that the appraiser to determine such as development costs on the process from the software engineering aspects. “Completeness appraisal guidelines of a computer program” can be used as a guideline for complete appraisal business, is to provide the procedures and methods for the development costs and the degree of completion of computer programs. For more information about the software development costs calculation, we can refer to the "SW cost estimation guide". Although successful appraisal of a number of development costs based on the guide has been processed, but a number of cases requiring discussion of appraisal results have been discovered. In this paper, we try to analyze the problems that occur when you apply the “SW cost estimation guide".
  • 3.

    A detail item guideline for IT device evaluation

    LEE KYU TAE | 2016, 12(1) | pp.21~25 | number of Cited : 2
    Abstract PDF
    A copyright evaluation is a way to decide a illegal modification between the original product and the suspected product as modification. The evaluation expert do compare both product as the request list from the coptright association. Then he excludes the comparison item as detail to seeking objective result. This detailed comparison item should have a serious concentraion as it hss a sensitivity for the decision. In this study, it was analyzed and illustrated the detailed item as for actual evaluation materials.
  • 4.

    An Effective Classification Scheme for Microsoft Windows Executables using Frequency Information of Strings

    Cho Daehee | SEONG JE CHO | 2016, 12(1) | pp.27~36 | number of Cited : 0
    Abstract PDF
    In order to filter and block illegal software efficiently, software classification is employed. In this paper, we propose a new software classification scheme that effectively categorizes Microsoft Windows executable files using frequency information of strings. The proposed scheme first extracts strings from the .text, .data, .rdata, and .rsrc sections of each Windows executable, and then computes and maintains a score table of the strings by combining Local Document Frequency (LDF), Inverse Document Frequency (IDF), and Inverse Category Frequency (ICF). If a suspicious program (Windows executable) got useful string information, we calculate scores of the strings in the suspicious program based on the score table of strings of each category, sums up the scores, and obtains a total score per each category. Finally, we classify the suspicious program into a specific category which represents the highest total score. For verifying the effectiveness of the proposed scheme, we perform experiments with nine categories and 55 programs each category. The experimental results show that about 75% of the 495 executables are correctly classified.
  • 5.

    Development Procedure of Application Process in Riverbed Modeler

    Ki Jang Geun | 2016, 12(1) | pp.37~45 | number of Cited : 0
    Abstract PDF
    Technologies for mobile terminals and communication networks has been dramatically developed in a decade. In order to reduce the time and budget needed to develop the new technologies about telecommunication networks and terminals, computer simulation has been widely used as a development and verification tool. In this paper, the procedure is described for developing and verifying the new application process model in the Riverbed Modeler which is popularly used in a research on communication networks.