Korean | English

pISSN : 2092-8114 / eISSN : 2733-4384

2020 KCI Impact Factor : 0.41
Home > Explore Content > All Issues > Article List

2011, Vol.7, No.2

  • 1.

    A Standard of Judgement of Similarity to be considered Whether to apply Well-known Technology, and SW Appraisal

    Yun Young-Sun | 2011, 7(2) | pp.1~11 | number of Cited : 0
    Abstract PDF
    In this paper, I presented a standard of judgment to be considered including of well-known technologies and wrote the considerations on software appraisal. The well-known technologies are generally used to prove a invalidity in the patents. However, it is difficult to ignore their creativity or technical contributions in software programming, since the well-known technologies are not recognized as the advances in the patents. Therefore, I clearly wrote the concepts of well-known technologies in the patents, and suggested the standards of the similarity of software programming when they are found to be well known technologies in the copyrights. I also presented some examples to considered the similarities if the well-known technologies are included. Furthermore, I have been suggested the considerations for determining copyright infringement.
  • 2.

    A Method for Making Appraisal Report Based on Abstraction-Filtering-Comparison

    Byung Tae Chun | 2011, 7(2) | pp.13~21 | number of Cited : 0
    Abstract PDF
    Similarity appraisal accounts for a great part of appraisal area. Therefore, we need effective method for similarity appraisal. The judge, Learned Hand, suggested a theory called abstraction - filtration - comparison, we apply the theory to similarity appraisal. The abstraction step are analysis methods and criteria for analyzing source program. The filtration step to exclude contents and items in source programs. The comparison step analyze filtered source programs using analysis tool.
  • 3.

    Building a SW Cost Data Repository for OLAP Analysis

    Hyeja Park | Kwon, Ki Tae | 2011, 7(2) | pp.23~33 | number of Cited : 0
    Abstract PDF
    Now at the time in which software industry has become the core of national competitiveness, estimating the accurate budget at the initial phase of software business got recognized as one of the important factors in the success or failure of software business. This paper proposes building the software project information as repository in order to estimate more accurately by using similar project information in the past. It also derives data items of cost data repository and sets the priority between them by using SMART analysis and AHP method. Furthermore, it presents the framework for cost data repository to make multi-dimensional analysis using OLAP analysis method possible, which allow the effective management and use of repository.
  • 4.

    Blocking Pirated Android App Execution using Class Separation and Dynamic Loading

    Jaechan Moon | Dong-Jin Kim | SEONG JE CHO and 1other persons | 2011, 7(2) | pp.35~41 | number of Cited : 0
    Abstract PDF
    Smartphone app market is getting important socially and economically. As damage of app piracy increases, we require a technique to encourage purchase and use of legal apps. Digital Rights Management (DRM) for apps such as Google’s LVL and SKT's ARM is studied and used. They are techniques based on user authentication. But they are easy to circumvent because Smartphone apps are weak to reverse engineering and modification. In this paper, we propose a technique that enforces the existing techniques to solve the above problems. This technique use class separation and class dynamic loading. The technique separates a particular class when developing apps and servers must keep it. After user authentication on every run, the separated class is transferred from the server and dynamically loaded. Experimental results show the technique is feasible on Smartphone environment.
  • 5.

    A reference to the Open Intellectual property on the portable devices

    LEE KYU TAE | 2011, 7(2) | pp.43~51 | number of Cited : 0
    Abstract PDF
    IT device is a hardware system which has special processor and interface modules for it's own function and performance. For a brand new product development, programmer are looking for finding new interface modules to save time making driver algorithm. In that case, the program used for this modules are the same as others product one. So it can't be copyright on the software. On property right verification of these system, there could be a mis-result when they have open source and general known program code by a interface module company. We show the guideline to keep the property right of owner on the module interface and communication interface, IO interface whether it has open source or not.
  • 6.

  • 7.

    Simulation model for the multihomed node with SIP VoIP

    Ki Jang Geun | 2011, 7(2) | pp.59~64 | number of Cited : 0
    Abstract PDF
    In recent years, various multihomed nodes with different wireless interfaces has been developing with the rapid progress of wireless technologies. In this paper, the simulation model of the multihomed node for supporting SIP VoIP service in WiMAX and WLAN networks has developed. The SIP VoIP functionality and performance of the developed model has been verified by simulation in various environments of mobility between WiMAX and WLAN.
  • 8.

    Analysis of Benchmarking Methodology for Firewall Performance(RFC 3511)

    Younseo Jeong | 2011, 7(2) | pp.65~71 | number of Cited : 0
    Abstract PDF
    The Internet Engineering Task Force (IETF) develops and promotes Internet standards(a guideline, standards specification, etc). The IETF is organized into a large number of working groups and informal discussion groups (BoF)s, each dealing with a specific topic. The Benchmarking Methodology Working Group (BMWG) will continue to produce a series of recommendations concerning the key performance characteristics of internetworking technologies, or benchmarks for network devices, systems, and services. RFC 3511 discusses and defines a number of tests that may be used to describe the performance characteristics of firewalls. It covers ten items in four areas: forwarding, connection, latency and filtering. We can use this standard as a guideline to make an objective evaluation for the performance of firewalls. In this paper, we discussed testing methodologies of RFC 3511. And then examined the IP throughput and the concurrent connections for Firewall. We also tested TCP connection throughput.