본문 바로가기
  • Home

2005, Vol.10, No.3

Concept and Attribute based Answer Retrieval
Yun Bo-Hyun , Changho Seo | 2005, 10(3) | pp.1~10 | number of Cited : 0
An Efficient CPLD Technology Mapping considering Area and the Time Constraint
Jaejin Kim , Kwan Hyeong, Lee | 2005, 10(3) | pp.11~18 | number of Cited : 6
A study of generic programming method for source code reuse in image processing algorithm implementation
Lee JUNG HUN , 이준형 | 2005, 10(3) | pp.19~34 | number of Cited : 1
An Implementation of the Report View Generator using Program Performance Log Information
Cho Yong Yun , Yoo,Jae-Woo | 2005, 10(3) | pp.35~44 | number of Cited : 1
Extended GTRBAG Model for Access Control Enforcement in Ubiquitous Environments
황유동 , Park Dong Gue | 2005, 10(3) | pp.45~54 | number of Cited : 3
A Generation Methodology of Facial Expressions for Avatar Communications
Kim,Jin-Yong , 유재휘 | 2005, 10(3) | pp.55~64 | number of Cited : 6
study of Game Development scenario using Web Based Thinking System
정승호 , kyungDon Han , 황영섭 | 2005, 10(3) | pp.65~74 | number of Cited : 3
Ensuring Securityllable Real-Time Systems by Static Program Analysis
Sung-Soo Lim , Kihwal Lee | 2005, 10(3) | pp.75~88 | number of Cited : 1
Design of Sotfware Testing Automation Framework sharing Test Information based on XML
정창신 , 이계임 , Soon Key Jung and 1 other persons | 2005, 10(3) | pp.89~100 | number of Cited : 2
Personalization Using Member Properties in the Physical Locator
이덕근 , CHOI IN SOO , Han-Ju Yoo | 2005, 10(3) | pp.101~110 | number of Cited : 1
Role based access control of healthcare information system for Mobile environments
이유리 , Park Dong Gue | 2005, 10(3) | pp.119~132 | number of Cited : 4
Key Exchang Protocol using Password on CDN
Seung-Soo Shin , HAN KUN-HEE | 2005, 10(3) | pp.133~142 | number of Cited : 0
A Method for Thresholding and Correction of Skew in Camera Document Images
장대근 , Byung-Tae Chun | 2005, 10(3) | pp.143~150 | number of Cited : 3
Asymmetric public-key watermarking based on correlation method
이 덕 , Kim, Jongweon , Choi Jong Uk | 2005, 10(3) | pp.151~160 | number of Cited : 0
Objsct Modeling for SMIL documents Editor Development
Chae,Won-Seok | 2005, 10(3) | pp.161~172 | number of Cited : 1
Landmark Recognition Method based on Geometric Invariant Vectors
Jeonghee Cha | 2005, 10(3) | pp.173~182 | number of Cited : 0
Design of modified Feistel structure for high-capacity and high speed achievement
Lee, Seon-Keun , 정우열 | 2005, 10(3) | pp.183~188 | number of Cited : 1
A User-based MicroPayment System Using Secret Key
백승호 , Jeong Yoon Su , Won,Jong-Kwon and 1 other persons | 2005, 10(3) | pp.189~200 | number of Cited : 0
Architecture and Performance Analysis of An Event Notification Service
Han, Young-Tae , Dugki Min | 2005, 10(3) | pp.201~208 | number of Cited : 0
Hierarchical Inter-Domain based QoS Routing in a Wide Area of Network
홍종준 | 2005, 10(3) | pp.209~218 | number of Cited : 1
An Improved Handoff Technique for Multimedia Services in mobile environment
Kim Jeong-won | 2005, 10(3) | pp.219~228 | number of Cited : 0
Ontology-Based Information Retrieval for Cultural Assets Information
SeungJae Baek , 천현재 , LEE, Hong Chul | 2005, 10(3) | pp.229~236 | number of Cited : 2
A Design of Lightweight Mutual Authentication Based on Trust Model
KimHongSeop , Cho Jin Ki , Lee, Sang-ho | 2005, 10(3) | pp.237~248 | number of Cited : 0
Automatic Attack Reaction Tool Based on IPv6
Hong Kyu Lee , Changsuk Oh , Koo Min Jeong and 2 other persons | 2005, 10(3) | pp.249~258 | number of Cited : 0
Detection of Internal IIIegal Query Using Packet Analysis
장경옥 , Changsuk Oh , Koo Min Jeong | 2005, 10(3) | pp.259~266 | number of Cited : 0
A Study on Critical Success Factors of Electronic Commerce
Kim,Jung-Yul | 2005, 10(3) | pp.267~274 | number of Cited : 7
Successful Business Model of Mobile Solution Company
Docsung Jang | 2005, 10(3) | pp.275~286 | number of Cited : 1
A Study on the Countermeasures against International Computer Crimes
오태곤 | 2005, 10(3) | pp.287~296 | number of Cited : 1
The characteristics of Pacioli's Bookkeeping
Yoon, Seok Gon | 2005, 10(3) | pp.297~306 | number of Cited : 1
A Study on the Countermeasures of Cyber Crimes Among Nations -Focusing on the Global Governance-
오태곤 | 2005, 10(3) | pp.307~318 | number of Cited : 3
A Study on the Selection IS Risk Elements under E-business
주상호 | 2005, 10(3) | pp.319~330 | number of Cited : 0
Conversion of Radiology Report into DICOM SR
Yong-Soo Kim , 신승용 | 2005, 10(3) | pp.331~338 | number of Cited : 2
The Credit Card Settlement System using the Switching Agent
안익수 , Hwang, Lak-hoon | 2005, 10(3) | pp.339~344 | number of Cited : 1
3D Game Rendering Engine using Empty space BSP tree
Hakran Kim , Hwa Jin Park | 2005, 10(3) | pp.345~352 | number of Cited : 0