본문 바로가기
  • Home

2012, Vol.8, No.2

A Study on Strengthening the Appraisal Effectiveness under the Copyright Law
Kim Si Yeol , Ye-Kyung, Shin | 2012, 8(2) | pp.1~11 | number of Cited : 0
CCR : Tree-pattern based Code-clone Detector
Hyo-Sub Lee , Doh, Kyung-Goo | 2012, 8(2) | pp.13~27 | number of Cited : 0
Predicting a combination of the key attributes using CfsSubsetEval attribute selector
Kim Youngok , Kwon, Ki Tae | 2012, 8(2) | pp.37~43 | number of Cited : 0
Model Based Vulnerability Analysis for SOA
Hyunha Kim , Yukyong Kim , Doh, Kyung-Goo | 2012, 8(2) | pp.45~51 | number of Cited : 1
Implementation of the Proxy Mobile IPv6 Simulator
Ki Jang Geun | 2012, 8(2) | pp.54~63 | number of Cited : 0
A comparative verification of the android application program on object code
LEE KYU TAE | 2012, 8(2) | pp.65~70 | number of Cited : 0