• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: CAL ]" (138)
  1. 51. The Threshold Based Cluster Head Replacement Strategy in Sensor Network Environment
  2. 52. Hybrid Buffer Structured Optical Packet Switch with the Limited Numbers of Tunable Wavelength Converters and Internal Wavelengths
  3. 53. Priority-based Message Scheduling for Multi-agent System in Ubiquitous Environment
    Yang-Seok Yoon, Hee-Yong Youn, Vol. 9, No. 1, pp. 137-144, Feb. 2008
    Keywords: Agent, Communication Language, CAL
  4. 54. A Study on Scalable Bluetooth Network for Secure Ubiquitous Environment
  5. 55. A Method for Dynamic Clustering-based Efficient Management in Large-Scale IoT Environment
    Dae Young Kim, Hyun Jung La, Vol. 15, No. 6, pp. 85-98, Dec. 2014
    10.7472/jksii.2014.15.6.85
    Keywords: IoT, Dynamic Clustering, Hierarchical Algorithm, Optimization, IoT Computing Environment
  6. 56. Ant Colony Hierarchical Cluster Analysis
    Mun-Su Kang, Young-Sik Choi, Vol. 15, No. 5, pp. 95-106, Oct. 2014
    10.7472/jksii.2014.15.5.95
    Keywords: Ant-based clustering, ant-based hierarchical clustering, clustering, swarm intelligence
  7. 57. Performance Analysis of Frequent Pattern Mining with Multiple Minimum Supports
    Heungmo Ryang, Unil Yun, Vol. 14, No. 6, pp. 1-8, Dec. 2013
    10.7472/jksii.2013.14.6.01
    Keywords: Multiple minimum supports, Frequent pattern mining, Rare frequent patterns, Performance Evaluation, scalability
  8. 58. A Hybrid Approach of Efficient Facial Feature Detection and Tracking for Real-time Face Direction Estimation
    Woonggi Kim, Junchul Chun, Vol. 14, No. 6, pp. 117-124, Dec. 2013
    10.7472/jksii.2013.14.6.117
    Keywords: Face Detection, Skin Color, Haar-like feature, Adaboost, optical flow, Template matching, Face pose estimation
  9. 59. Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction
    You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 6, pp. 125-0, Dec. 2013
    10.7472/jksii.2013.14.6.125
    Keywords: Android, Normal and Malicious Application, System call events, pattern analysis, Similarity Analysis
  10. 60. Implementation of integrated monitoring system for trace and path prediction of infectious disease
    Eungyeong Kim, Seok Lee, Young Tae Byun, Hyuk-Jae Lee, Taikjin Lee, Vol. 14, No. 5, pp. 69-76, Oct. 2013
    10.7472/jksii.2013.14.5.69
    Keywords: infectious disease, mathematical model, SIR model, influenza A, path prediction