• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ author: Lee ]" (552)
  1. 201. A Task Prioritizing Algorithm Optimized for Task Duplication Based Processor Allocation Method
    In-Seong Song, Wan-Oh Yoon, Chang-Ho Lee, Sang-Bang Choi, Vol. 12, No. 6, pp. 1-18, Dec. 2011
    Keywords: DHCS, task scheduling, task duplication, DAG
  2. 202. A Strong Anonymity Scheme for Wireless Sensor Networks
    Jung-Hyun Lee, Tae-Yeon Kim, Gi-Hwan Cho, Vol. 11, No. 3, pp. 139-0, Jun. 2010
    Keywords: Sensor network, Anonymity, hash chain, authentication
  3. 203. Design of a Context-aware System for Safety at Smart Home and Analysis of Network Traffics
    Yoon-Young Sung, Hyun-Je Woo, Mee-Jeong Lee, Vol. 11, No. 2, pp. 1-16, Apr. 2010
    Keywords: Context-aware, Safety management, IEEE 802.15.4
  4. 204. Reliable Data Transfer using Path-Reliability and Implicit ACK on Wireless Sensor Network
    Ga-Won Lee, Jun-Hyuk Lee, Eui-Nam Huh, Vol. 11, No. 2, pp. 17-30, Apr. 2010
    Keywords: Acknowledgement, Overhearing, QoS
  5. 205. Secure Knowledge Management for Prevent illegal data leakage by Internal users
  6. 206. Effects of Formal and Informal Control Combination on Information Systems Outsourcing Consequence: Based on IT Governance Perspectives
    Jong-Man Lee, Vol. 11, No. 2, pp. 155-164, Apr. 2010
    Keywords: IS Outsourcing, IT Governance, Contract, trust, Management Capability
  7. 207. Performance improvement for Streaming of High Capacity Panoramic Video
  8. 208. Symptom Pattern Classification using Neural Networks in the Ubiquitous Healthcare Environment with Missing Values
  9. 209. A Study on Blind Watermarking Technique of Digital Image using 2-Dimensional Empirical Mode Decomposition in Wavelet Domain
    Young-Seock Lee, Jong-Weon Kim, Vol. 11, No. 2, pp. 99-108, Apr. 2010
    Keywords: CDMA, BEMD, Blind watermarking, Wavelet domain
  10. 210. Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks
    Hyung-Woo Lee, Tae-Su Kim, Vol. 11, No. 2, pp. 85-98, Apr. 2010
    Keywords: Sinkhole Router, IP Traceback, Network Security, DDoS attack