|
1 |
Implementation of a Data Processing Method to Enhance the Quality and Support the What-If Analysis for Traffic History Data
Lee, Min-Soo;Cheong, Su-Jeong;Choi, Ok-Ju;Meang, Bo-Yeon;
/
Korea Information Processing Society
, v.17D, no.2, pp.87-102,
|
|
2 |
The Path Inverted Index Technique for XML Document Retrieval
Moon, Kyung-Won;Hwang, Byung-Yeon;
/
Korea Information Processing Society
, v.17D, no.2, pp.103-110,
|
|
3 |
Improvement of a Simulink Debugger Capacity for Model Verification
Kim, Seong-Jo;Lee, Hong-Seok;Choi, Kyung-Hee;Chung, Ki-Hyun;
/
Korea Information Processing Society
, v.17D, no.2, pp.111-118,
|
|
4 |
A Method of Selecting Open Source Software by IFCS
Jeon, Hye-Young;Jin, Jing-Shu;Rhew, Sung-Yul;
/
Korea Information Processing Society
, v.17D, no.2, pp.119-128,
|
|
5 |
Object Modeling for Mapping from XML Document and Query to UML Class Diagram based on XML-GDM
Park, Dae-Hyun;Kim, Yong-Sung;
/
Korea Information Processing Society
, v.17D, no.2, pp.129-146,
|
|
6 |
Conformance Test Scenario Extraction Techniques for Embedded Software using Test Execution Time
Park, In-Su;Shin, Young-Sul;Ahn, Sung-Ho;Kim, Jin-Sam;Kim, Jae-Young;Lee, Woo-Jin;
/
Korea Information Processing Society
, v.17D, no.2, pp.147-156,
|
|
7 |
A Tag Flow-Driven Deployment Simulator for Developing RFID Applications
Moon, Mi-Kyeong;
/
Korea Information Processing Society
, v.17D, no.2, pp.157-166,
|
|
8 |
Design and Implementation of Pinpad using Secure Technology from Shoulder Surfing Attack
Kang, Moon-Seol;Kim, Young-Il;
/
Korea Information Processing Society
, v.17D, no.2, pp.167-174,
|
|