|
1 |
A Fingerprint Verification System Based on Fuzzy Vault and Steganography for Smartphone
Nam, Han-Sol;Kim, Ae-Young;Lee, Sang-Ho;
/
Korean Institute of Information Scientists and Engineers
, v.42, no.4, pp.419-426,
|
|
2 |
I/O Translation Layer Technology for High-performance and Compatibility Using New Memory
Song, Hyunsub;Moon, Young Je;Noh, Sam H.;
/
Korean Institute of Information Scientists and Engineers
, v.42, no.4, pp.427-433,
|
|
3 |
A Study of a Fast Booting Technique for a New memory+DRAM Hybrid Memory System
Song, Hyeon Ho;Moon, Young Je;Park, Jae Hyeong;Noh, Sam H.;
/
Korean Institute of Information Scientists and Engineers
, v.42, no.4, pp.434-441,
|
|
4 |
Using Cache Access History for Reducing False Conflicts in Signature-Based Eager Hardware Transactional Memory
Kang, Jinku;Lee, Inhwan;
/
Korean Institute of Information Scientists and Engineers
, v.42, no.4, pp.442-450,
|
|
5 |
Character-based Subtitle Generation by Learning of Multimodal Concept Hierarchy from Cartoon Videos
Kim, Kyung-Min;Ha, Jung-Woo;Lee, Beom-Jin;Zhang, Byoung-Tak;
/
Korean Institute of Information Scientists and Engineers
, v.42, no.4, pp.451-458,
|
|
6 |
ISO/IEC 9126 Quality Model-based Assessment Criteria for Measuring the Quality of Big Data Analysis Platform
Lee, Jong Yun;
/
Korean Institute of Information Scientists and Engineers
, v.42, no.4, pp.459-467,
|
|
7 |
Project Failure Main Factors Analysis using Text Mining in Audit Evaluation
Jang, Kyoungae;Jang, Seong Yong;Kim, Woo-Je;
/
Korean Institute of Information Scientists and Engineers
, v.42, no.4, pp.468-474,
|
|
8 |
Korean Semantic Role Labeling Using Domain Adaptation Technique
Lim, Soojong;Bae, Yongjin;Kim, Hyunki;Ra, Dongyul;
/
Korean Institute of Information Scientists and Engineers
, v.42, no.4, pp.475-482,
|
|
9 |
Video Based Face Spoofing Detection Using Fourier Transform and Dense-SIFT
Han, Hotaek;Park, Unsang;
/
Korean Institute of Information Scientists and Engineers
, v.42, no.4, pp.483-486,
|
|
10 |
A Design of a Korean Programming Language Ensuring Run-Time Safety through Categorizing C Secure Coding Rules
Kim, Yeoneo;Song, Jiwon;Woo, Gyun;
/
Korean Institute of Information Scientists and Engineers
, v.42, no.4, pp.487-495,
|
|
11 |
A Concise Korean Programming Language "Sprout"
Cheon, Junseok;Kang, Dohun;Kim, Gunwoo;Woo, Gyun;
/
Korean Institute of Information Scientists and Engineers
, v.42, no.4, pp.496-503,
|
|
12 |
A MapReduce-based kNN Join Query Processing Algorithm for Analyzing Large-scale Data
Lee, HyunJo;Kim, TaeHoon;Chang, JaeWoo;
/
Korean Institute of Information Scientists and Engineers
, v.42, no.4, pp.504-511,
|
|
13 |
Automatic Construction of a Negative/positive Corpus and Emotional Classification using the Internet Emotional Sign
Jang, Kyoungae;Park, Sanghyun;Kim, Woo-Je;
/
Korean Institute of Information Scientists and Engineers
, v.42, no.4, pp.512-521,
|
|
14 |
Parallel Range Query Processing with R-tree on Multi-GPUs
Ryu, Hongsu;Kim, Mincheol;Choi, Wonik;
/
Korean Institute of Information Scientists and Engineers
, v.42, no.4, pp.522-529,
|
|
15 |
An Improved Depth-Based TDMA Scheduling Algorithm for Industrial WSNs to Reduce End-to-end Delay
Lee, Hwakyung;Chung, Sang-Hwa;Jung, Ik-Joo;
/
Korean Institute of Information Scientists and Engineers
, v.42, no.4, pp.530-540,
|
|
16 |
Yet Another BGP Archive Forensic Analysis Tool Using Hadoop and Hive
Lee, Yeonhee;Lee, YoungSeok;
/
Korean Institute of Information Scientists and Engineers
, v.42, no.4, pp.541-549,
|
|