• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ author: Lee ]" (513)
  1. 51. An Estimated Closeness Centrality Ranking Algorithm for Large-Scale Workflow Affiliation Networks
    Do-kyong Lee, Hyun Ahn, Kwang-hoon Pio Kim, Vol. 17, No. 1, pp. 47-54, Feb. 2016
    10.7472/jksii.2016.17.1.47
    Keywords: Affiliation Network, Estimated Closeness Centrality, Ranking Algorithm
  2. 52. Development of Customized Trip Navigation System Using Open Government Data
    Beomsoo Shim, Hanjun Lee, Donghee Yoo, Vol. 17, No. 1, pp. 15-22, Feb. 2016
    10.7472/jksii.2016.17.1.15
    Keywords: open government data, Big data, application, Recommendation System, case-based reasoning(CBR), Data Mining
  3. 53. A Study on the Development Strategy of Smart Learning for Public Education
  4. 54. Segmenting Korean Millennial Consumers of Sharing Economy Services on Social Networking: A Psychographic-based Approach
  5. 55. A Study on Mission Critical Factors for Software Test Enhancement in Information Technologies Development of Public Sector
  6. 56. An Fuzzy-based Risk Reasoning Driving Strategy on VANET
  7. 57. Knowledge Structure Analysis System for Critical Learning Pathway
    Sanghoon Lee, Seung-jin Moon, Vol. 16, No. 6, pp. 39-46, Dec. 2015
    10.7472/jksii.2015.16.6.39
    Keywords: Knowledge space theory, Knowledge structure analysis, Education environment, Automatic analysis system
  8. 58. On Frequency Separation among Radio Access Technologies in Heterogeneous Networks
  9. 59. Effect Analysis of an Additional Edge on Centrality and Ranking of Graph Using Computational Experiments
    Chi-Geun Han, Sang-Hoon Lee, Vol. 16, No. 5, pp. 39-48, Oct. 2015
    10.7472/jksii.2015.16.5.39
    Keywords: centrality, ranking, graph, community
  10. 60. Adaptive Multi-Layer Security Approach for Cyber Defense
    Seong-kee Lee, Tae-in Kang, Vol. 16, No. 5, pp. 1-10, Oct. 2015
    10.7472/jksii.2015.16.5.01
    Keywords: Cyber Defense, Multi-Layer Security Model, Adaptive Security System