|
1 |
Vulnerability Analysis of 'A Remote User Authentication Scheme with Anonymity for Mobile Devices'
Park, Miog;
/
Korean Institute of Next Generation Computing
, v.10, no.6, pp.6-13,
|
|
2 |
A Selective Lifelog Management Scheme for Personalized Healthcare Services
Yi, Myung-Kyu;Whangbo, Taeg-Keun;
/
Korean Institute of Next Generation Computing
, v.10, no.6, pp.14-21,
|
|
3 |
Improved Tactical Data Link Operation Method based on Cluster Network
Yu, Tae-Jong;Cho, We-Duke;
/
Korean Institute of Next Generation Computing
, v.10, no.6, pp.22-35,
|
|
4 |
Optimized Construction of an IaaS Cloud Platform with Workflow Modeling
Park, Dal-Yong;Choi, Sang Hoon;Choi, Dong Hoon;Park, Ki-Woong;
/
Korean Institute of Next Generation Computing
, v.10, no.6, pp.36-45,
|
|
5 |
Analysis of Performance and Energy-efficiency for GPGPU Architecture according to Number of Cooperative Thread Arrays on GPU Cores
Choi, Hong Jun;Son, Dong Oh;Kim, Jong Myon;Kim, Cheol Hong;
/
Korean Institute of Next Generation Computing
, v.10, no.6, pp.46-58,
|
|
6 |
A study of positioning compensation by using 2 Kalman Filters in GPS signal unavailability area
Lee, Young-Kwon;Ha, Gil-Su;Cho, We-Duke;
/
Korean Institute of Next Generation Computing
, v.10, no.6, pp.59-68,
|
|
7 |
All Stack VIA Rule Based on Working Layer To Reduce Workload for Multi-Layer PCB Design
Jeon, Jin-Hwan;Yoon, Myungchul;Roh, Byeong-Hee;
/
Korean Institute of Next Generation Computing
, v.10, no.6, pp.69-77,
|
|
8 |
Testbed Implementation for Large-Scale BitTorrent Experiment and Performance Analysis
Oh, Seung-Yup;Park, Jeongbin;Roh, Byeong-Hee;
/
Korean Institute of Next Generation Computing
, v.10, no.6, pp.78-87,
|
|