Â÷¼¼´ë¹æ¼Û¹Ìµð¾î±â¼ú¿¬±¸¼¾ÅÍ
 
Secure Scalar Multiplication Algorithms on Kobitz Curves
SeoulSearch 2.0: Exploring the Knowledge of Citizen over the Web
Unsupervised Anomaly Detection Based on Clustering and Multiple One-class SVM
°æ±â21¼­Ä¡ 2.0: ¼öÄ¡Áöµµ¿Í À¥ °ø°£À» À¶ÇÕÇÑ Áö¿ªÁö½Ä °Ë»ö½Ã½ºÅÛ
Àΰ£Á᫐ ¿¥ºñ¾ðÆ® ¼­ºñ½º¸¦ À§ÇÑ ½Ã½ºÅÛ ¼³°è ¹× ±¸Çö
ÈÞ´ë¿ë ´Ü¸»ÀÇ RFID¸¦ ÀÌ¿ëÇÑ Áöµµ±â¹ÝÀÇ ±¸¸Å Á¤º¸ °Ë»ö ¼­ºñ½º ¼³°è ¹× ±¸Çö
Áö¿ª»ýÈ°Á¤º¸¸¦ Á¦°øÇÏ´Â Áö¿ªÆ÷ÅÐ ±¸ÃàÀ» À§ÇÑ µðÁöÅÐ ÁöµµÁ¦°ø ¼­ºñ½º
½Ç¼¼°è °ü·Ã µðÁöÅÐ Á¤º¸¸¦ ¿¥ºñ¾ðÆ®ÀûÀ¸·Î Á¦°øÇÏ´Â ½Ã½ºÅÛÀÇ ¼³°è ¹× ±¸Çö
¼öÄ¡Áöµµ¸¦ ÀÌ¿ëÇÑ Çö½Ç°ø°£°ú µ¿ÀÏÇÑ °¡»ó°ø°£ ±¸Ãà ¹æ¾È
µðÁöÅÐ ¸Ê ±â¹Ý ½Ç½Ã°£ Áö¿ªÁ¤º¸ ¼öÁý ¹× Á¦°ø ½Ã½ºÅÛ ±¸Çö
¸ÖƼij½ºÆ® Àü¼ÛÀ» À§ÇÑ °ø¿ë Çǵå¹é ä³ÎÀÇ ¼º´É ºÐ¼® ¹× ÆĶó¹ÌÅÍ ÃÖÀûÈ­ ¼³°è ¹æ¹ý
¸ÖƼij½ºÆ® Àü¼ÛÀ» À§ÇÑ °ø¿ëÇǵå¹é ä³ÎÀÇ ¼º´É ºÐ¼®
À̵¿Åë½Å¸ÁÀ» ÀÌ¿ëÇÑ Áö¿¬ ¸ÖƼij½ºÆ® Àü¼Û ¹æ¹ý
Multi-Objective Test Case Prioritization for Real-Time Embedded Software Retesting Using Swarm Intelligence
Least Squares One-Class Support Vector Machine
Applying Particle Swarm Optimization to Prioritizing Test Cases for Embedded Real Time Software Retesting
Proactive Fault Management with Virtualization for Software Aging
Self-Organized Mobility in Nanosensor Network Based on Particle Swarm
Availability Modeling and Analysis on Virtualized Clustering with Rejuvenation
Obstacle Avoidance Algorithm for Collective Movement in Nanorobots
A Study of Distributed Privacy-sensitive Data Mining-Application in Wireless Sensor Network
Issues of Interoperability in E-Governance System
Detecting DDoS attacks Using Dispersible Traffic Matrix and Weighted Moving Average
ÆÐŶ ¼Õ½Ç¿¡ ´ëÇÑ ½ºÄÉÀÏ·¯ºí ºñµð¿À(SVC) ÀûÀÀ
Ȩ ³×Æ®¿öÅ©¸¦ À§ÇÑ ÀÌ´õ³Ý ±â¹Ý µðÁöÅÐ ¿Àµð¿À ¹æ¼Û ½Ã½ºÅÛÀÇ ¼º´É ºÐ¼®
Object recognition for marker less augumented reality
½ºÄÉÀÏ·¯ºí ºñµð¿À ºÎȣȭ¿Í AT-DMB
 
Home Contact Us Sitemap