Digital Library
Search: "[ keyword: CA ]" (602)
-
Moon-Seong Kim, Young-Cheol Bang, Hyun-Seung Choo, Vol. 8, No. 1, pp. 25-32, Feb. 2007
Keywords: Unicost Routing, Delay Constrained Least Cost (DCLC) Path Problem, Delay Constrained Unicast Routing (DCUR) Algorithm -
Yong-Jin Park, Eun-Ha Song, Young-Sik Jeong, Vol. 9, No. 3, pp. 141-158, Jun. 2008
Keywords: GML, map visualization, hierarchical POI information management, tagging, dynamic map partition and caching -
Han-Kyu Joo, Vol. 9, No. 3, pp. 119-128, Jun. 2008
Keywords: Software Rental Service, electronic commerce, Charge Calculation, Non-Repudiation -
Kyoung-Hwan Kim, Vol. 9, No. 3, pp. 59-68, Jun. 2008
Keywords: Medical Services, The laboratory, Scheduling, Agent, Automated Negotiation -
Sung-Jin Kim, Seok-Cheon Park, Vol. 9, No. 3, pp. 43-50, Jun. 2008
Keywords: RFID, Elliptic Curves, Encryption, Security, ECNR, authentication -
Chang-Won Jeong, Chang-Sun Shin, Su-Chong Joo, Vol. 9, No. 3, pp. 25-42, Jun. 2008
Keywords: Mobile Collaboration Environment, Distributed Object Group Framework, Mobile Platform, u-Hospital application -
Moo-Hyun Park, Chang-Won Jeong, Su-Chong Joo, Vol. 9, No. 3, pp. 9-24, Jun. 2008
Keywords: Multi agent, Healthcare context information service, Distributed Object Group Framework, JADE -
Seok Han, Duk-Shin Oh, Jong-Wan Kim, Vol. 9, No. 3, pp. 1-8, Jun. 2008
Keywords: Nearest Neighbor, CNN(Continuous NN), Slab, Location-Based Services -
Mi-Jin Kim, Jung-Hyun Nam, Dong-Ho Won, Vol. 9, No. 2, pp. 83-88, Apr. 2008
Keywords: session initiation protocol, authentication, Key Exchange, Dictionary Attack, Forward Secrecy -
Dong-Joon Han, Hyuk-Soo Han, Vol. 9, No. 2, pp. 107-118, Apr. 2008
Keywords: CMMI(Capability Maturity Model Integration), XP(eXtreme Programming), Configuration Management




