• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: 인터넷 ]" (44)
  1. 31. A Method for Dynamic Clustering-based Efficient Management in Large-Scale IoT Environment
    Dae Young Kim, Hyun Jung La, Vol. 15, No. 6, pp. 85-98, Dec. 2014
    10.7472/jksii.2014.15.6.85
    Keywords: IoT, Dynamic Clustering, Hierarchical Algorithm, Optimization, IoT Computing Environment
  2. 32. Internet Interconnection settlement model under Asymmetric Network Value Environment
    Sang Woo Lee, Chang Youl Ko, Sun Me Choi, Vol. 15, No. 5, pp. 123-132, Oct. 2014
    10.7472/jksii.2014.15.5.123
    Keywords: Internet, Interconnection, Settlement model, Market Concentration
  3. 33. A Process-driven IoT-object Collaboration Model
    Hyun Ahn, Yongjoon Lee, Kwanghoon Pio Kim, Vol. 15, No. 5, pp. 9-16, Oct. 2014
    10.7472/jksii.2014.15.5.09
    Keywords: Internet of Things, Process-driven IoT Service, IoT-object Collaboration, Information Control Net
  4. 34. Propagation Models for Structural Parameters in Online Social Networks
    Jong-Hwan Kong, Ik Kyun Kim, Myung-Mook Han, Vol. 15, No. 1, pp. 125-134, Feb. 2014
    10.7472/jksii.2014.15.1.125
    Keywords: Malicious data, Propagation Model, Social Network, Internet Worm
  5. 35. The Implementation of Remote Machine Health Monitoring System using Internet
    Woong-Sik Kim, Jong-Ki Kim, Vol. 14, No. 6, pp. 19-24, Dec. 2013
    10.7472/jksii.2013.14.6.19
    Keywords: Remote Monitoring, Internet Monitoring, Machine's condition, Machine health
  6. 36. An Analysis of the Economic Effects for the IoT Industry
    Woo-Soo Jeong, Sa-Hyuk Kim, Kyoung-Sik Min, Vol. 14, No. 5, pp. 119-0, Oct. 2013
    10.7472/jksii.2013.14.5.119
    Keywords: M2M, IoT, RAS, Classification, economic effects
  7. 37. Security Framework for Improving the Performance of the Malicious Process Control System
    Iksu Kim, Jongmyung Choi, Vol. 14, No. 2, pp. 61-72, Apr. 2013
    10.7472/jksii.2013.14.2.61
    Keywords: Internet Worm, Intrusion Detection, Intrusion Prevention, Malicious Process
  8. 38. The effect of auction frequency and transaction volume on auction performance in internet auction
  9. 39. Power-Laws Exponents of the Domestic AS-level Internet Topology based on the Valley-free BGP Routing Policy
    Koo-Hong Kang, Vol. 11, No. 4, pp. 41-50, Aug. 2010
    Keywords: AS-level Internet Topology, Power-law Exponent, BGP
  10. 40. Design and Implementation of Automatic Script Generator for Mobile Database Applications