• Journal of Internet Computing and Services
    ISSN 2287 - 1136(Online) / ISSN 1598 - 0170 (Print)
    http://jics.or.kr/

Digital Library


Vol. 5, No. 1, Feb. 2004

  1. Kim Cuk-Boh, Journal of Internet Computing and Services, Vol. 5, No. 1, pp. 1-14, Feb. 2004
    Keywords: Component Base Design (CBD) Component abstraction, Reengineering, Design patterns, Rebuilding of design patterns

  2. Kim Backhyun, Hwang Taejune, Kim Iksoo, Journal of Internet Computing and Services, Vol. 5, No. 1, pp. 15-24, Feb. 2004
    Keywords: Web caching, VOD, Streaming

  3. Kim Yong-Chul, Kim Yoon-jeong, Chung Min-Gyo, Lee Woong-Jae, Journal of Internet Computing and Services, Vol. 5, No. 1, pp. 25-32, Feb. 2004
    Keywords: mobile IP, domain foreign agent, load balancing

  4. Kim Tai-Dal, Journal of Internet Computing and Services, Vol. 5, No. 1, pp. 33-40, Feb. 2004
    Keywords: CMM, Quantitative Process Management, Software Quality Management, SI

  5. Mun Yongsong, Journal of Internet Computing and Services, Vol. 5, No. 1, pp. 41-50, Feb. 2004
    Keywords: Performance Evaluation, Multibuffer, Multistage Interconnection Networks

  6. Byun Si-Woo, Journal of Internet Computing and Services, Vol. 5, No. 1, pp. 51-58, Feb. 2004
    Keywords: Mobile Computing, Mobile Database, Replication Control, Proxy Quorum

  7. Rhee Sang-Brum, Choi Young-Kyoo, Journal of Internet Computing and Services, Vol. 5, No. 1, pp. 59-66, Feb. 2004
    Keywords: face region extraction, wavelet, symmetry

  8. Lee Seok-Jae, Park Sae-Mi, Kang Tae-ho, Yoo Jae-Soo, Journal of Internet Computing and Services, Vol. 5, No. 1, pp. 67-84, Feb. 2004
    Keywords: Real-time database, Real-time Concurrency control, Feasibility Test

  9. Lee Hyung-Woo, Journal of Internet Computing and Services, Vol. 5, No. 1, pp. 85-98, Feb. 2004
    Keywords: DDoS, Traceback, ICMP, ACC, Pushback

  10. Kim Byung-Gi, Hong Sang-Sun, Jouhn Young-Keel, Journal of Internet Computing and Services, Vol. 5, No. 1, pp. 99-0, Feb. 2004
    Keywords: Adhoc communication, Ubiquitous, Peer-to-Peer Security, Personal Mutual Authentication