Browse > Article List

논문
1 An Effective Technique for Detecting Vulnerabilities in Android Device Drivers
Chung, Youngki;Cho, Seong-je; / Korean Institute of Information Scientists and Engineers , v.43, no.11, pp.1179-1187,
2 Hybrid Recommendation System of Qualitative Information Based on Content Similarity and Social Affinity Analysis
Kim, Myeonghun;Kim, Sangwook; / Korean Institute of Information Scientists and Engineers , v.43, no.11, pp.1188-1200,
3 Analysis System for SNS Issues per Country based on Topic Model
Kim, Seong Hoon;Yoon, Ji Won; / Korean Institute of Information Scientists and Engineers , v.43, no.11, pp.1201-1209,
4 Feature Extraction to Detect Hoax Articles
Heo, Seong-Wan;Sohn, Kyung-Ah; / Korean Institute of Information Scientists and Engineers , v.43, no.11, pp.1210-1215,
5 An Analysis of the Overhead of Multiple Buffer Pool Scheme on InnoDB-based Database Management Systems
Song, Yongju;Lee, Minho;Eom, Young Ik; / Korean Institute of Information Scientists and Engineers , v.43, no.11, pp.1216-1222,
6 An SDN-based Bandwidth Control Scheme considering Traffic Variation in the Virtualized WLAN Environment
Moon, Jaewon;Chung, Sanghwa; / Korean Institute of Information Scientists and Engineers , v.43, no.11, pp.1223-1232,
7 A Route Repair Scheme for Reducing DIO Poisoning Overhead in RPL-based IoT Networks
Lee, Sung-Jun;Chung, Sang-Hwa; / Korean Institute of Information Scientists and Engineers , v.43, no.11, pp.1233-1244,
8 Analysis of Research Trend and Performance Comparison on Message Authentication Code
Kim, Minwoo;Kwon, Taekyoung; / Korean Institute of Information Scientists and Engineers , v.43, no.11, pp.1245-1258,
9 Continuous-authentication Method based on the Risk Profile associated with Context-awareness to Lock Smart Devices
Kim, Jihwan;Lee, Younho; / Korean Institute of Information Scientists and Engineers , v.43, no.11, pp.1259-1269,
10 Value Weighted Regularized Logistic Regression Model
Lee, Chang-Hwan;Jung, Mina; / Korean Institute of Information Scientists and Engineers , v.43, no.11, pp.1270-1274,
11 An Efficient String Similarity Search Technique based on Generating Inverted Lists of Variable-Length Grams
Kim, Jongik; / Korean Institute of Information Scientists and Engineers , v.43, no.11, pp.1275-1280,
12 A Personal Video Event Classification Method based on Multi-Modalities by DNN-Learning
Lee, Yu Jin;Nang, Jongho; / Korean Institute of Information Scientists and Engineers , v.43, no.11, pp.1281-1297,
13 Human Visual System-Aware and Low-Power Histogram Specification and Its Automation for TFT-LCDs
Jin, Jeong-Chan;Kim, Young-Jin; / Korean Institute of Information Scientists and Engineers , v.43, no.11, pp.1298-1306,
14 Finger-Touch based Hangul Input Interface for Usability Enhancement among Visually Impaired Individuals
Kang, Seung-Shik;Choi, Yoon-Seung; / Korean Institute of Information Scientists and Engineers , v.43, no.11, pp.1307-1314,