본문 바로가기
  • Home

2009, Vol.14, No.5

A Transformation Technique for Constraints-preserving of XML Data
조정길 , 금영욱 | 2009, 14(5) | pp.1~9 | number of Cited : 2
Emotion Classification System for Chatting Data
윤영미 , Youngho Lee | 2009, 14(5) | pp.11~17 | number of Cited : 1
Time-Series Data Prediction using Hidden Markov Model and Similarity Search for CRM
조영희 , 전진호 , Gye Sung Lee | 2009, 14(5) | pp.19~28 | number of Cited : 2
Searching Sequential Patterns by Approximation Algorithm
Sansarbold Garamragchaa , 황영섭 | 2009, 14(5) | pp.29~36 | number of Cited : 1
An Efficient Data Migration/Replication Scheme in a Large Scale Multimedia Server
Eunsam Kim | 2009, 14(5) | pp.37~44 | number of Cited : 3
Adult Image Detection Using an Intensity Filter and an Improved Hough Transform
장석우 , 김상희 , Gye-young Kim | 2009, 14(5) | pp.45~54 | number of Cited : 1
Development of Verification and Interface Application for Interactive Data Broadcasting Middleware
Won Joo Lee , 이주용 | 2009, 14(5) | pp.55~64 | number of Cited : 0
Efficient Attack Traffic Detection Method for Reducing False Alarms
최일준 , 추병균 , Changsuk Oh | 2009, 14(5) | pp.65~75 | number of Cited : 1
PFA (Persistence Factor Adaptive) Backoff Algorithm for performance improvement of IEEE 802.11e MAC
유동관 | 2009, 14(5) | pp.77~83 | number of Cited : 0
A New Conference Information Data Model in SIP based Distributed Conference Architecture
Jang,Choon-Seo , Lee,Ki-Su | 2009, 14(5) | pp.85~91 | number of Cited : 0
A MAC Protocol based on Hi.erarchical Virtual Clusters
백두성 , Kihyun Pyun | 2009, 14(5) | pp.93~102 | number of Cited : 0
A Secure Routing Protocol in MANET based on Malicious behavior Pattern of Node and Trust Level
박성승 , Gunwoo Park , Ryu, Keun Ho and 1 other persons | 2009, 14(5) | pp.103~117 | number of Cited : 2
Network Mobility Handoff Scheme to Support Fast Route Optimization in Nested Network Mobility
이일호 , Junho Lee | 2009, 14(5) | pp.119~131 | number of Cited : 1
Flow Holding Time based Link State Update Algorithm
조강홍 | 2009, 14(5) | pp.133~139 | number of Cited : 0
An Efficient Particle Sensor Algorithm
홍성화 , HoonKi Kim | 2009, 14(5) | pp.141~148 | number of Cited : 0
A Study of Forensic on Eavesdropping from VoIP and Messenger through WiBro Network
천우성 , 박대우 | 2009, 14(5) | pp.149~156 | number of Cited : 1
A Distributed Activity Recognition Algorithm based on the Hidden Markov Model for u-Lifecare Applications
HongSop Kim , GEOSU YIM | 2009, 14(5) | pp.157~165 | number of Cited : 0
Testing case analysis of Database Software
HaeSool Yang , 강배근 , 이하용 | 2009, 14(5) | pp.167~174 | number of Cited : 2
Simulation for Signaling Pathway of MAPK Hypotonic Shock
Cho Mi Kyung , Seo Jeong-Man , Hyun Seok Park | 2009, 14(5) | pp.175~182 | number of Cited : 0
Design of an Inference Control Process in OLAP Data Cubes
이덕성 , CHOI IN SOO | 2009, 14(5) | pp.183~193 | number of Cited : 2
A Study on the development of sponsors of social welfare facilities through marketing mix
조우홍 | 2009, 14(5) | pp.195~200 | number of Cited : 4
The effects of e-learning characteristics on e-learner's scholastic performance
이현철 , 구본희 | 2009, 14(5) | pp.201~209 | number of Cited : 31