• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Digital Library


Search: " keyword: ARM" (7)
  1. 1. A Task Offloading Approach using Classification and Particle Swarm Optimization
    John Cristopher A. Mateo, Jaewan Lee, Vol. 18, No. 1, pp. 1-10, Feb. 2017
    10.7472/jksii.2017.18.1.01
    Keywords: Cloudlet, Classification, Particle Swarm Optimization, Mobile Cloud Computing
  2. 2. Ant Colony Hierarchical Cluster Analysis
    Mun-Su Kang, Young-Sik Choi, Vol. 15, No. 5, pp. 95-106, Oct. 2014
    10.7472/jksii.2014.15.5.95
    Keywords: Ant-based clustering, ant-based hierarchical clustering, clustering, swarm intelligence
  3. 3. Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives
    Hong Ryeol Ryu, Moses Hong, Taekyoung Kwon, Vol. 15, No. 3, pp. 79-90, Jun. 2014
    10.7472/jksii.2014.15.3.79
    Keywords: Phishing, Pharming, Password, authentication, Social Engineering, HCI
  4. 4. Saturated Performance Analysis of IEEE 802.11 DCF with Imperfect Channel Sensing
    Soo-Young Shin, Seog Chae, Vol. 13, No. 1, pp. 7-14, Feb. 2012
    10.7472/jksii.2012.13.1.7
    Keywords: IEEE 802.11, imperfect channel sensing, missed-detection, False Alarm, Performance
  5. 5. Digital Convergence Teaching Strategy System using Spearman Correlation Coefficients
    Byung-Wook Lee, Vol. 11, No. 6, pp. 111-122, Dec. 2010
    Keywords: Digital convergence, teaching strategy, Spearman correlation coefficients
  6. 6. The Implemention of RTD-l000A based on ARM Microcontroller
    Min-Ho Kim, In-Sik Hong, Vol. 9, No. 6, pp. 117-126, Dec. 2008
    Keywords: ARM, RTD-1000A, SoC, Controller
  7. 7. False Alarm Minimization Technology using SVM in Intrusion Prevention System