Browse > Article List

논문
1 Vulnerability Analysis of 'A Remote User Authentication Scheme with Anonymity for Mobile Devices'
Park, Miog; / Korean Institute of Next Generation Computing , v.10, no.6, pp.6-13,
2 A Selective Lifelog Management Scheme for Personalized Healthcare Services
Yi, Myung-Kyu;Whangbo, Taeg-Keun; / Korean Institute of Next Generation Computing , v.10, no.6, pp.14-21,
3 Improved Tactical Data Link Operation Method based on Cluster Network
Yu, Tae-Jong;Cho, We-Duke; / Korean Institute of Next Generation Computing , v.10, no.6, pp.22-35,
4 Optimized Construction of an IaaS Cloud Platform with Workflow Modeling
Park, Dal-Yong;Choi, Sang Hoon;Choi, Dong Hoon;Park, Ki-Woong; / Korean Institute of Next Generation Computing , v.10, no.6, pp.36-45,
5 Analysis of Performance and Energy-efficiency for GPGPU Architecture according to Number of Cooperative Thread Arrays on GPU Cores
Choi, Hong Jun;Son, Dong Oh;Kim, Jong Myon;Kim, Cheol Hong; / Korean Institute of Next Generation Computing , v.10, no.6, pp.46-58,
6 A study of positioning compensation by using 2 Kalman Filters in GPS signal unavailability area
Lee, Young-Kwon;Ha, Gil-Su;Cho, We-Duke; / Korean Institute of Next Generation Computing , v.10, no.6, pp.59-68,
7 All Stack VIA Rule Based on Working Layer To Reduce Workload for Multi-Layer PCB Design
Jeon, Jin-Hwan;Yoon, Myungchul;Roh, Byeong-Hee; / Korean Institute of Next Generation Computing , v.10, no.6, pp.69-77,
8 Testbed Implementation for Large-Scale BitTorrent Experiment and Performance Analysis
Oh, Seung-Yup;Park, Jeongbin;Roh, Byeong-Hee; / Korean Institute of Next Generation Computing , v.10, no.6, pp.78-87,