|
1 |
The Research of the 2-Edge Labeling Methods on Binomial Trees
Kim, Yong Seok;
/
Korea Information Processing Society
, v.4, no.2, pp.37-40,
|
|
2 |
A Cache-based Reconfigurable Accelerator in Die-stacked DRAM
Kim, Yongjoo;
/
Korea Information Processing Society
, v.4, no.2, pp.41-46,
|
|
3 |
Prediction of Power Consumption for Improving QoS in an Energy Saving Server Cluster Environment
Cho, Sungchoul;Kang, Sanha;Moon, Hungsik;Kwak, Hukeun;Chung, Kyusik;
/
Korea Information Processing Society
, v.4, no.2, pp.47-56,
|
|
4 |
An Enhanced Step Detection Algorithm with Threshold Function under Low Sampling Rate
Kim, Boyeon;Chang, Yunseok;
/
Korea Information Processing Society
, v.4, no.2, pp.57-64,
|
|
5 |
Log Analysis Method of Separate Security Solution using Single Data Leakage Scenario
Park, Jang-Su;Lee, Im-Yeong;
/
Korea Information Processing Society
, v.4, no.2, pp.65-72,
|
|
6 |
Analysis of Padding Oracle Attack Possibility about Application Environment; SRTP, MIKEY, CMS, IPSec, TLS, IPTV
Hwang, Seongjin;Park, Myungseo;Moon, Dukjae;Kang, HyungChul;Kim, Jongsung;Lee, Changhoon;
/
Korea Information Processing Society
, v.4, no.2, pp.73-80,
|
|