|
1 |
The Comparative Study for NHPP Software Reliability Growth Model Based on Non-linear Intensity Function
Kim, Hee-Cheul;
/
Korea convergence Security Association
, v.7, no.2, pp.1-8,
|
|
2 |
Design and Implementation of Multimedia CAI Program for Learning about Electricity in the Mechanics Curriculum
Lee, Hyae-Joung;Shin, Hyun-Cheul;Joung, Suck-Tae;
/
Korea convergence Security Association
, v.7, no.2, pp.9-16,
|
|
3 |
Adaptive Input Traffic Prediction Scheme for Proportional Delay Differentiation in Next-Generation Networks
Paik, Jung-Hoon;
/
Korea convergence Security Association
, v.7, no.2, pp.17-25,
|
|
4 |
Strategic Business Process Based on Business Intelligence by Connected with BPM & 6 Sigma
Park, Sang-Min;Nam, Ho-Ki;Shin, Seung-Ho;Kim, Qui-Nam;
/
Korea convergence Security Association
, v.7, no.2, pp.27-37,
|
|
5 |
Scheduling Algorithms for QoS Provision in Broadband Convergence Network
Jang, Hee-Seon;Cho, Ki-Sung;Shin, Hyun-Chul;Lee, Jang-Hee;
/
Korea convergence Security Association
, v.7, no.2, pp.39-47,
|
|
6 |
The Study for Process Capability Analysis of Software Failure Interval Time
Kim, Hee-Cheul;Shin, Hyun-Cheul;
/
Korea convergence Security Association
, v.7, no.2, pp.49-55,
|
|
7 |
A Study on Selective Encryption of Huffman Codes
Park, Sang-Ho;
/
Korea convergence Security Association
, v.7, no.2, pp.57-63,
|
|
8 |
Secure Electronic Financial Services using End-to-End Encryption
Kim, In-Seok;Lee, Su-Mi;Lim, Jong-In;
/
Korea convergence Security Association
, v.7, no.2, pp.65-71,
|
|
9 |
The Service Log Analyser for Blocking Unused Account on Internet Services
Jung, Kyu-Cheol;Lee, Jin-Kwan;Lee, Dae-Hyung;Jang, Hae-Suk;Lee, Jong-Chan;Park, Ki-Hong;
/
Korea convergence Security Association
, v.7, no.2, pp.73-80,
|
|
10 |
Development of Mobile Camera Vision System and Build of Wire.Wireless Integration ERP System
Lee, Hyae-Jung;Shin, Hyun-Cheol;Joung, Suck-Tae;
/
Korea convergence Security Association
, v.7, no.2, pp.81-89,
|
|
11 |
Design and Implementation of Forensic Tool on Window Live System
Baek, Eun-Ju;Sung, Jin-Won;Lim, Kyoung-Su;Lee, Sang-Jin;
/
Korea convergence Security Association
, v.7, no.2, pp.91-100,
|
|
12 |
Design of Security Agent System to Provide Ubiquitous Service
Kim, Seok-Soo;Park, Gil-Cheol;Song, Jae-Gu;
/
Korea convergence Security Association
, v.7, no.2, pp.101-106,
|
|
13 |
A Cluster-Header Selecting Method for more Secure and Energy-Efficient in Wireless Sensor Network
Kim, Jin-Mook;Lee, Pung-Ho;Ryou, Hwang-Bin;
/
Korea convergence Security Association
, v.7, no.2, pp.107-118,
|
|
14 |
Internet Banking Service Vulnerability Analysis and Security Solution
Lee, Sang-Jin;Hwang, So-Yeon;Kim, Kyung-Kon;Ryeo, Sung-Koo;
/
Korea convergence Security Association
, v.7, no.2, pp.119-128,
|
|
15 |
Error Detection and Correction of Prefix Codes using Bidirectionally Decodable bit Streams
Park, Sang-Ho;
/
Korea convergence Security Association
, v.7, no.2, pp.129-134,
|
|
16 |
A DRM System for Streaming Services in Mobile Environment
Han, Myung-Mook;Ahn, Yong-Hak;
/
Korea convergence Security Association
, v.7, no.2, pp.135-143,
|
|
17 |
A Study on the Actuating Device Technology in Guided Weapon System
Lee, Young-Uk;
/
Korea convergence Security Association
, v.7, no.2, pp.145-154,
|
|
18 |
Mobility Scheme of the Handoff in 3G Networks
Lee, Dong-Chun;
/
Korea convergence Security Association
, v.7, no.2, pp.155-162,
|
|