Browse > Article List

논문
1 An Order-Preserving Pattern Matching Algorithm using Fingerprints of Two q-grams
Yoo, Gwangmo;Kim, Youngho;Sim, Jeong Seop; / Korean Institute of Information Scientists and Engineers , v.45, no.11, pp.1111-1116,
2 Design and Implementation of a Log-structured Buffer Based on Non-volatile Memory
Son, Yongseok; / Korean Institute of Information Scientists and Engineers , v.45, no.11, pp.1117-1123,
3 User Behavior Analysis for Predicting Churn of Loyal Customers in Online Games based on Social Relationships and Degree of Participation
Seo, Eunbi;Woo, Jiyoung;Kim, Huy Kang; / Korean Institute of Information Scientists and Engineers , v.45, no.11, pp.1124-1134,
4 Design and Implementation of Mobile Application Speed Index Measuring Tool
Yoo, Hyunsik;Mun, Hyunsu;Lee, Youngseok; / Korean Institute of Information Scientists and Engineers , v.45, no.11, pp.1135-1141,
5 Ontology-based Approach to Determine the Conflicts between Security and Usability Requirements in the Requirements Engineering Process
Roh, Woori;Lee, Seok-Won; / Korean Institute of Information Scientists and Engineers , v.45, no.11, pp.1142-1155,
6 An Integrated Analysis Method Considering Security in ISO 26262 for Improving the Safety of the Vehicle
Jung, Jihyun;Min, Sangyoon; / Korean Institute of Information Scientists and Engineers , v.45, no.11, pp.1156-1167,
7 Partial Embedding Approach for Knowledge Completion
Lee, Wan-Gon;Jagvaral, Batselem;Hong, Ji-Hun;Choi, Hyun-Young;Park, Young-Tack; / Korean Institute of Information Scientists and Engineers , v.45, no.11, pp.1168-1175,
8 Implementing Structural Operational Semantics in Python
Ji, Suhwan;Im, Hyeonseung; / Korean Institute of Information Scientists and Engineers , v.45, no.11, pp.1176-1184,
9 Semi-Supervised Learning for Detecting of Abusive Sentence on Twitter using Deep Neural Network with Fuzzy Category Representation
Park, Da-Sol;Cha, Jeong-Won; / Korean Institute of Information Scientists and Engineers , v.45, no.11, pp.1185-1192,
10 A Persistent Log Buffer Technique using Non-volatile Memory for In-Memory Key-Value Databases
Kim, Doyoung;Choi, Won Gi;Sung, Hanseung;Lee, Jihwan;Park, Sanghyun; / Korean Institute of Information Scientists and Engineers , v.45, no.11, pp.1193-1202,
11 Reverse Path Activation-based Reverse Influence Maximization in Social Networks
Talukder, Ashis;Bairagi, Anupam Kumar;Kim, Do Hyeon;Hong, Choong Seon; / Korean Institute of Information Scientists and Engineers , v.45, no.11, pp.1203-1209,
12 Knowing the Cost of Synchronization Primitives on Modern Hardware
Park, SeongJae;Han, Hyuck;Yeom, Heon Y.; / Korean Institute of Information Scientists and Engineers , v.45, no.11, pp.1210-1215,