Browse > Article List

논문
1 A Vulnerability Analysis of Intrusion Tolerance System using Self-healing Mechanism
Park, Bum-Joo;Park, Kie-Jin;Kim, Sung-Soo; / Korean Institute of Information Scientists and Engineers , v.32, no.7, pp.333-340,
2 Scalable Race Visualization for Debugging Message-Passing Programs
Park Mi-Young;Jun Yong-Kee; / Korean Institute of Information Scientists and Engineers , v.32, no.7, pp.341-348,
3 Call-Site Tracing-based Shared Memory Allocator for False Sharing Reduction in DSM Systems
Lee, Jong-Woo; / Korean Institute of Information Scientists and Engineers , v.32, no.7, pp.349-358,
4 Mobility Reduction Scheduling for High-Level Synthesis
Yoo, Hee-Jin;Yoo, Hee-Yong; / Korean Institute of Information Scientists and Engineers , v.32, no.7, pp.359-367,
5 Dominance and Performance of Real-time Scheduling Algorithms on Multiprocessors
Park, Min-Kyu;Han, Sang-Chul;Kim, Hee-Heon;Cho, Seong-Je;Cho, Yoo-Kun; / Korean Institute of Information Scientists and Engineers , v.32, no.7, pp.368-376,
6 Design of TMO Model based Dynamic Analysis Framework: Components and Metrics
Jeong, Yoon-Seok;Kim, Tae-Wan;Chang, Chun-Hyon; / Korean Institute of Information Scientists and Engineers , v.32, no.7, pp.377-392,