CS-Journal Papers(저널논문)

Recent Items

Collection's Items (Sorted by Submit Date in Descending order): 3661 to 3680 of 4062

3661
지그비의 계층적 라우팅 성능 향상 방안

김태홍; 김대영; 유성은; 성종우; 김영수, 대한임베디드공학회논문지, 2006-12

3662
Goal-directed Weakening of Abstract Interpretation Results

Seo, Sunae; Yang, Hongseok; Yi, Kwangkeun; Han, Taisook, ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, v.29, no.10, 2007-10

3663
A static API birthmark for Windows binary executables

Choi, Seok-Woo; Park, Hee-Wan; Lim, Hyun-Il; Han, Tai-Sook, JOURNAL OF SYSTEMS AND SOFTWARE, v.82, no.5, pp.862 - 873, 2009-05

3664
A method for detecting the theft of Java programs through analysis of the control flow information

Lim, Hyun-il; Park, Heewan; Choi, Seokwoo; Han, Taisook, INFORMATION AND SOFTWARE TECHNOLOGY, v.51, no.9, pp.1338 - 1350, 2009-09

3665
A static bug detector for uninitialized field references in Java programs

Seo, Sunae; Kim, Youil; Kang, Hyun-Goo; Han, Taisook, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E90D, no.10, pp.1663 - 1671, 2007-10

3666
A bottom-up pointer analysis using the update history

Kang, Hyun-Goo; Han, Taisook, INFORMATION AND SOFTWARE TECHNOLOGY, v.51, no.4, pp.691 - 707, 2009-04

3667
Detecting theft of Java applications via a static birthmark based on weighted stack patterns

Lim, Hyun-il; Park, Heewan; choi, Seokwoo; Han, Taisook, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E91D, no.9, pp.2323 - 2332, 2008-09

3668
MPSoC용 임베디드 소프트웨어의 PSM 모델링 및 시뮬레이션

오기영; 홍장의; 배두환; 송인권, 정보과학회논문지 : 소프트웨어 및 응용, v.34, no.8, pp.697 - 707, 2007-08

3669
Composition of aspects based on a relation model: Synergy of multiple paradigms

Han, Ikjoo; Bae, Doo-Hwan, INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, v.16, no.3, pp.379 - 402, 2006-06

3670
유즈케이스를 적용한 시스템 기능 분해

윤, 청; 김, 응모; 배, 두환; Yoon, Cheong; Kim, Ung Mo; Bae, Doo Hwan, 정보과학회논문지(B), Vol.26, No.2, pp.263-272, 1999-02

3671
텔래매틱스 데이터 관리

이현익; 이진원; 송준화, 한국자동차공학회 논문집, v.26, no.6, pp.6 - 10, 2004-12

3672
CONUGA: Constrained user-group assignment

Ahn, Gail-Joon; Kim, Kwangjo, JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, v.24, no.2, pp.87 - 100, 2001-04

3673
A new identification scheme based on the bilinear Diffle-Hellman problem

Kim, M; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2384, pp.362 - 378, 2002-07

3674
C&C 아키텍처 기반의 객체지향 설계

강성원; 최윤석; 이단형; 박형일, 정보과학회논문지 : 소프트웨어 및 응용, v.34, no.4, pp.317 - 327, 2007-04

3675
소프트웨어 상호운영성 시험 체계와 방법론

신재휘; 성종진; 홍경표; 강성원, 정보과학회논문지 : 소프트웨어 및 응용, v.31, no.4, pp.394 - 402, 2004-04

3676
예측 기반 동적 자원할당 구조를 이용한 실시간 VBR 비디오 트래픽의 QoS 제어방법

유상조; 홍성훈; 강성원; 홍경표, 한국통신학회논문지, v.27, no.1, pp.11 - 20, 2002-01

3677
Efficient authenticated key agreement protocol for dynamic groups

Ren, Kui; Lee, Hyunrok; Kim, Kwangjo; Yoo, T, INFORMATION SECURITY APPLICATIONS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3325, pp.144 - 159, 2005

3678
Threshold password-based authentication using bilinear pairings

Lee, Sangwon; Han, Kyusuk; Kang, Seok-kyu; Kim, Kwangjo; Ine, So Ran, PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3093, pp.350 - 363, 2004

3679
Yet another forward secure signature from bilinear pairings

Vo, Duc-Liem; Kim, Kwangjo, INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3935, pp.441 - 455, 2006-02

3680
Secure authenticated group key agreement protocol in the MANET environment

Yeun C.Y.; Han K.; Vo D.L.; Kim, Kwangjo, INFORMATION SECURITY TECHNICAL REPORT, v.13, no.3, pp.158 - 164, 2008-08

Discover

Type

Open Access

Date issued

. next

rss_1.0 rss_2.0 atom_1.0