Search > Reference Search
Search Result
학술지
No Reference Title /Author/Journal Title Citing Article
1 J. S. Park, "Load-aware cell selection method for efficient use of network resources," J. KICS, vol. 40, no. 12, pp. 2443-2449, Jan. 2016./ View Article
2 S. Han, H. Park, and T. Kwon, "Shelf-life time based cache replacement policy suitable for web environment," J. KICS, vol. 40, no. 6, pp. 1091-1101, Jun. 2016./ View Article
3 B. Ko, I. Byun, D. Rhee, K. Jeon, B, Kim, S. Lee, and K. Kim, "Distributed multi hop relay scheme to reduce delay constrained broadcast outage probability," J. KICS, vol. 38C, no. 02, pp. 219-226, Mar. 2016./ View Article
4 M. Kim, G. Lee, S. Choo, S. Pack, and Y. Kim, "Optimal flow distribution algorithm for efficient service function chaining," J. KICS, vol. 40, no. 6, pp. 1032-1039, Jun. 2016./ View Article
5 Hwan-Hee Kim, Mi-Jung Choi, "Android Malware Detection using Auto-regressive Moving-average Model", The Korean Institute of Communications and Information Sciences, 2015./ View Article
6 J. Lee, "Rain Attenuation Analysis for Designing UAV Data Link on Ku-band," The Journal of Korean Institute of Communication and Information Sciences, Vol. 40, No. 07, pp. 1248-1256, 2015./   DOI View Article
7 Hwang, S.I., J.M. Joo, and S.Y. Joo. 2015. ICT-based smart farm factory systems through the case of hydroponic ginseng plant factory. Journal of korean institute of communications and information sciences. 40(4):780-790. (in Korean)./   DOI View Article
8 Seo DJ, Kim TS. 2015. Influence of personal information security vulnerabilities and perceived usefulness on bank customers' willingness to stay. J Korean Inst Commun Inf Sci 40(8): 1577-1587/   DOI View Article
9 Seo DJ, Kim TS. 2015. Influence of personal information security vulnerabilities and perceived usefulness on bank customers' willingness to stay. J Korean Inst Commun Sci 40:1577-1587/ View Article
10 J. Kim, J. Park, M. Park and S. Jung, "IAM Clustering Architecture for Inter-Cloud Environment," The Journal of Korean Institute of Communications and Information Sciences, vol. 40, no. 5, pp. 860-862, May. 2015./   DOI View Article