Browse > Article List

논문
1 The Research of the 2-Edge Labeling Methods on Binomial Trees
Kim, Yong Seok; / Korea Information Processing Society , v.4, no.2, pp.37-40,
2 A Cache-based Reconfigurable Accelerator in Die-stacked DRAM
Kim, Yongjoo; / Korea Information Processing Society , v.4, no.2, pp.41-46,
3 Prediction of Power Consumption for Improving QoS in an Energy Saving Server Cluster Environment
Cho, Sungchoul;Kang, Sanha;Moon, Hungsik;Kwak, Hukeun;Chung, Kyusik; / Korea Information Processing Society , v.4, no.2, pp.47-56,
4 An Enhanced Step Detection Algorithm with Threshold Function under Low Sampling Rate
Kim, Boyeon;Chang, Yunseok; / Korea Information Processing Society , v.4, no.2, pp.57-64,
5 Log Analysis Method of Separate Security Solution using Single Data Leakage Scenario
Park, Jang-Su;Lee, Im-Yeong; / Korea Information Processing Society , v.4, no.2, pp.65-72,
6 Analysis of Padding Oracle Attack Possibility about Application Environment; SRTP, MIKEY, CMS, IPSec, TLS, IPTV
Hwang, Seongjin;Park, Myungseo;Moon, Dukjae;Kang, HyungChul;Kim, Jongsung;Lee, Changhoon; / Korea Information Processing Society , v.4, no.2, pp.73-80,