본문 바로가기
  • Home

2005, Vol.10, No.2

Estimating Motion Information Using Multiple Features
SeokWoo Jang | 2005, 10(2) | pp.1~10 | number of Cited : 0
Analysis of Security Overhead in Secure Operating System
KO YOUNG WOONG | 2005, 10(2) | pp.11~19 | number of Cited : 2
An Adaptive M-estimators Robust Estimation Algorithm
SeokWoo Jang , Kim,Jin-Uk | 2005, 10(2) | pp.20~30 | number of Cited : 0
WBI Courseware Design and Implementation for Learning of Problem Solving on the Subject of Social Science in the Elementary School
서승희 , Lee,Young-Wook | 2005, 10(2) | pp.31~38 | number of Cited : 1
Security Analysis of MAC Algorithm using Block Cipher
Changho Seo , Yun Bo-Hyun , MAENG SEUNG RYOL | 2005, 10(2) | pp.39~48 | number of Cited : 0
CLB-Based CPLD Low Power Technology Mapping Algorithm for Trade-off
Jaejin Kim , Kwan Hyeong, Lee | 2005, 10(2) | pp.49~58 | number of Cited : 6
Realtime Object Extraction and Tracking System for Moving Object Monitoring
Hyun-Joong Kang , Lee Kwang Hyoung | 2005, 10(2) | pp.59~68 | number of Cited : 4
An Effective P2P Searching Algorithm Based on Leveled OK Mechanism
BoonHee Kim , Lee Jun Yeon | 2005, 10(2) | pp.69~78 | number of Cited : 0
a study of information system acquisition administration process modelling
Tae-Dal Kim | 2005, 10(2) | pp.79~86 | number of Cited : 1
Performance Evaluation of Value Predictor in High Performance Microprocessors
Byoung-Chan Jeon , Kim, Hyeock-Jin , Ryu Dae Hee | 2005, 10(2) | pp.87~96 | number of Cited : 0
An Effective Method for Replacing Caption in Video Images
Byung-Tae Chun , Sook-Yeon Kim | 2005, 10(2) | pp.97~104 | number of Cited : 1
Implementation of File Security Module Using on Windows
Sung Kyung , Yoon,Ho-Kun | 2005, 10(2) | pp.105~112 | number of Cited : 1
The Hybrid LVQ Learning Algorithm for EMG Pattern Recognition
Lee Yong Gu , CHOI , WOO SEUNG | 2005, 10(2) | pp.113~122 | number of Cited : 0
Analysis for Authentication waiting time in Hand-over using Queueing model
Seung-Soo Shin , DuckSool Kim | 2005, 10(2) | pp.123~132 | number of Cited : 0
A Simulation Method for Terminal Mobilities with Regularity in Mobile Networks
Hyunjoon Cho | 2005, 10(2) | pp.133~142 | number of Cited : 1
Design of A Spammail Control Model Based on Hierarchical Policy
Youngjin Lee , Lee, Sang-ho , 백승호 and 1 other persons | 2005, 10(2) | pp.143~152 | number of Cited : 0
A Study on the performance improvement of Multi-Path Gain in a MMSE Detector
유동관 | 2005, 10(2) | pp.153~158 | number of Cited : 0
A Study on Efficient Group Communication in the Integrated Multicasting Environment
김현주 , Seung-joo Kim , WON, DONGHO and 1 other persons | 2005, 10(2) | pp.159~168 | number of Cited : 2
A Study the Control of Conditional Access to Pay-TV in Satellite digital Multimedia Broadcasting
김현주 , Seung-joo Kim , WON, DONGHO and 1 other persons | 2005, 10(2) | pp.169~178 | number of Cited : 0
The Development of PDA_based Mapping System Using Survey Equipment
Lee, Young-Geol , Bae Sang-Ho , Han Woo Chul and 1 other persons | 2005, 10(2) | pp.179~186 | number of Cited : 1
A Low-Power Mutual Authentication Protocol in Ubiquitous Sensor Networks
조영복 , Jeong Yoon Su , Lee, Sang-ho and 1 other persons | 2005, 10(2) | pp.187~198 | number of Cited : 0
A Study on Purchasing Model of Internet Shopping Mall
Lee, Sungjin | 2005, 10(2) | pp.199~204 | number of Cited : 6
A Study on National Development & Balanced Development by Region
Nam Il Kim | 2005, 10(2) | pp.205~214 | number of Cited : 4
A K-Nearest Neighbor Algorithm for Categorical Sequence Data
Seung-Joon Oh | 2005, 10(2) | pp.215~222 | number of Cited : 4
Analysis of Disaster Recovery System in Bank Industry
Yong-Soo Kim , 백승문 | 2005, 10(2) | pp.223~229 | number of Cited : 7