Digital Library
Search: "[ keyword: 법 ]" (59)
-
Yong-ho Sim, Wun-gyu Gil, Seo-kyun Kim, Vol. 16, No. 4, pp. 121-130, Aug. 2015
10.7472/jksii.2015.16.4.121
Keywords: Start-up, Technology based startup, Regulation improvement, Policy Priority, Information and communications technology(ICT), Creative Economy, AHP(Analytic Hierarchy Process) -
Jun Lee, YongJin KWON, Vol. 16, No. 4, pp. 39-50, Aug. 2015
10.7472/jksii.2015.16.4.39
Keywords: Temporal information, Termporal Extraction, Machine Learning, Similarity filtering, Historical information, Historical Object -
Sang Woo Lee, Chang Youl Ko, Vol. 16, No. 4, pp. 1-12, Aug. 2015
10.7472/jksii.2015.16.4.01
Keywords: Contingent Valuation Method, Willingness To Switch, Switching Cost, MVNO -
Dueckyoun Cho, Jaeyoung Choi, Eunhoe Kim, Gi-Du Gang, Vol. 16, No. 2, pp. 67-76, Apr. 2015
10.7472/jksii.2015.16.2.67
Keywords: illegally-copied app, detector, android platform, execution hiding, odex file -
Kyoung-Jin Seo, Jin-Ha Hwang, Jang-Hun Jeung, Ki-Youn Kim, Vol. 15, No. 4, pp. 91-102, Aug. 2014
10.7472/jksii.2014.15.4.91
Keywords: New Media Advertising, Consumer Subjectivity, Q Methodology, Market Segmentation, Interpretative study, Convergence -
You Joung Ham, Hyung-Woo Lee, Vol. 15, No. 3, pp. 31-44, Jun. 2014
10.7472/jksii.2014.15.3.31
Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism -
Adila Firdaus Arbain, Imran Ghani, Seung Ryul Jeong, Vol. 15, No. 1, pp. 13-28, Feb. 2014
10.7472/jksii.2014.15.1.13
Keywords: Agile Methodology, Security, software engineering, Feature Driven Development -
Yoosin Kim, Seung Ryul Jeong, Vol. 14, No. 5, pp. 87-100, Oct. 2013
10.7472/jksii.2013.14.5.87
Keywords: Web Accessability, Web Accessability Compliance, Website Development Methodology -
Cheong Hyeon Choi, Vol. 14, No. 5, pp. 11-26, Oct. 2013
10.7472/jksii.2013.14.5.11
Keywords: Mobile IPSec, Mobile IPv4, Elliptic Curve Cryptography, Identity Based Encryption -
Gwangbum Pyun, Unil Yun, Vol. 14, No. 1, pp. 63-0, Feb. 2013
10.7472/jksii.2013.14.63
Keywords: approximate frequent pattern mining, Chernoff technique, probabilistic technique, Performance Evaluation, scalability