본문 바로가기
  • Home

2009, Vol.14, No.6

An Embedded Text Index System for Mass Flash Memory
윤상훈 , Haengrae Cho | 2009, 14(6) | pp.1~10 | number of Cited : 2
Agile Performance Simulation Model for a Closed Multi-class System
Yong-Soo Kim | 2009, 14(6) | pp.11~16 | number of Cited : 1
Extraction of Military Ontology Using Six-Step Bottom-up Approach
나민영 , 양경용 | 2009, 14(6) | pp.17~26 | number of Cited : 6
3-Factor Authentication Using HMAC-based One-Time Password
Seiwoong Oh , Kin JiHong | 2009, 14(6) | pp.27~32 | number of Cited : 1
Software Development Process for Project Complexity and Size
윤석민 , 김인식 | 2009, 14(6) | pp.33~40 | number of Cited : 1
Multi-camera Calibration Method for Optical Motion Capture System
Kiyoung Shin , Joung Hwan Mun | 2009, 14(6) | pp.41~50 | number of Cited : 3
A Key distribution Scheme for Information Security at Wireless Sensor Networks
김회복 , 신정훈 , Kim Hyoung Jin | 2009, 14(6) | pp.51~58 | number of Cited : 2
Improvement of Edge Detection Using Mean Shift Algorithm
SeongYoon Shin , Chang Woo Lee , Rhee Yang Weon | 2009, 14(6) | pp.59~64 | number of Cited : 0
Using Radon Transform for Image Retrieval
Seo Jeong-Man | 2009, 14(6) | pp.65~72 | number of Cited : 0
An Efficient TCP Algorithm in Mobile ADHOC Networks
홍성화 , HoonKi Kim | 2009, 14(6) | pp.73~82 | number of Cited : 1
A Stochastic Serving MPP Selection Method for Increasing the Efficiency of a Wireless Mesh Network
Jaesung Park , Lim, Yujin | 2009, 14(6) | pp.83~90 | number of Cited : 1
A Lattice-Based Role Graph Security Model ensuring Confidentiality and Integrity
Choi Eun-Bok | 2009, 14(6) | pp.91~98 | number of Cited : 1
Design and Implementation of a Concept Map Assessment System Using the Semantic Web Technologies
Park Ung Kyu | 2009, 14(6) | pp.99~106 | number of Cited : 0
The Influence of IT Investment on Process Maturity and User Satisfaction
김원섭 , HaeSool Yang | 2009, 14(6) | pp.107~116 | number of Cited : 1
Convert 2D Video Frames into 3D Video Frames
Heeman Lee | 2009, 14(6) | pp.117~124 | number of Cited : 3
A Study of Query Processing Model to applied Meta Rule in 4-Level Layer based on Hybrid Databases
Oh, Ryum-duck | 2009, 14(6) | pp.125~134 | number of Cited : 0
Development of Automatic Rule Extraction Method in Data Mining : An Approach based on Hierarchical Clustering Algorithm and Rough Set Theory
Seung-Joon Oh , park chan woong | 2009, 14(6) | pp.135~142 | number of Cited : 4
Influence Factors on the IT Governance from ITA/EA Functions
Yeon S. Ahn , Hee Wan Kim | 2009, 14(6) | pp.143~152 | number of Cited : 2
A study of the highway advisory radio system implementation for traffic information service
정성학 | 2009, 14(6) | pp.153~164 | number of Cited : 4
heoretical Implication on Establishing the National Countermeasure System against Cyber Crime - Focusing on a Pattern of Cyber Terror -
Young Hwan Kim | 2009, 14(6) | pp.165~171 | number of Cited : 11