|
1 |
An Order-Preserving Pattern Matching Algorithm using Fingerprints of Two q-grams
Yoo, Gwangmo;Kim, Youngho;Sim, Jeong Seop;
/
Korean Institute of Information Scientists and Engineers
, v.45, no.11, pp.1111-1116,
|
|
2 |
Design and Implementation of a Log-structured Buffer Based on Non-volatile Memory
Son, Yongseok;
/
Korean Institute of Information Scientists and Engineers
, v.45, no.11, pp.1117-1123,
|
|
3 |
User Behavior Analysis for Predicting Churn of Loyal Customers in Online Games based on Social Relationships and Degree of Participation
Seo, Eunbi;Woo, Jiyoung;Kim, Huy Kang;
/
Korean Institute of Information Scientists and Engineers
, v.45, no.11, pp.1124-1134,
|
|
4 |
Design and Implementation of Mobile Application Speed Index Measuring Tool
Yoo, Hyunsik;Mun, Hyunsu;Lee, Youngseok;
/
Korean Institute of Information Scientists and Engineers
, v.45, no.11, pp.1135-1141,
|
|
5 |
Ontology-based Approach to Determine the Conflicts between Security and Usability Requirements in the Requirements Engineering Process
Roh, Woori;Lee, Seok-Won;
/
Korean Institute of Information Scientists and Engineers
, v.45, no.11, pp.1142-1155,
|
|
6 |
An Integrated Analysis Method Considering Security in ISO 26262 for Improving the Safety of the Vehicle
Jung, Jihyun;Min, Sangyoon;
/
Korean Institute of Information Scientists and Engineers
, v.45, no.11, pp.1156-1167,
|
|
7 |
Partial Embedding Approach for Knowledge Completion
Lee, Wan-Gon;Jagvaral, Batselem;Hong, Ji-Hun;Choi, Hyun-Young;Park, Young-Tack;
/
Korean Institute of Information Scientists and Engineers
, v.45, no.11, pp.1168-1175,
|
|
8 |
Implementing Structural Operational Semantics in Python
Ji, Suhwan;Im, Hyeonseung;
/
Korean Institute of Information Scientists and Engineers
, v.45, no.11, pp.1176-1184,
|
|
9 |
Semi-Supervised Learning for Detecting of Abusive Sentence on Twitter using Deep Neural Network with Fuzzy Category Representation
Park, Da-Sol;Cha, Jeong-Won;
/
Korean Institute of Information Scientists and Engineers
, v.45, no.11, pp.1185-1192,
|
|
10 |
A Persistent Log Buffer Technique using Non-volatile Memory for In-Memory Key-Value Databases
Kim, Doyoung;Choi, Won Gi;Sung, Hanseung;Lee, Jihwan;Park, Sanghyun;
/
Korean Institute of Information Scientists and Engineers
, v.45, no.11, pp.1193-1202,
|
|
11 |
Reverse Path Activation-based Reverse Influence Maximization in Social Networks
Talukder, Ashis;Bairagi, Anupam Kumar;Kim, Do Hyeon;Hong, Choong Seon;
/
Korean Institute of Information Scientists and Engineers
, v.45, no.11, pp.1203-1209,
|
|
12 |
Knowing the Cost of Synchronization Primitives on Modern Hardware
Park, SeongJae;Han, Hyuck;Yeom, Heon Y.;
/
Korean Institute of Information Scientists and Engineers
, v.45, no.11, pp.1210-1215,
|
|