Digital Library
Search: "[ keyword: CC ]" (95)
-
Min-Goo Kang, Seung-Il Sonh, Vol. 12, No. 4, pp. 45-50, Aug. 2011
Keywords: Motion JPEG, Encoding delay time, Multiple Access, FH/TDD -
Young-Doo Lee, In-Soo Koo, Vol. 12, No. 3, pp. 77-88, Jun. 2011
Keywords: cognitive radio, channel access, spectrum sensing, Q-learning -
Yun-Kyung Kim, Sung-Mok Kim, Hyung-Suk Lho, We-Duke Cho, Vol. 12, No. 3, pp. 17-26, Jun. 2011
Keywords: step count, fri-axial accelerometer, Heuristic Algorithm, Adaptive Threshold Algorithm, Adaptive Locking Period Algorithm -
64. Proxy Server Providing Multi-level Privileges for Network Cameras on the Video Surveillance SystemKwang-Jin Bae, Kyung-Roul Lee, Kang-Bin Yim, Vol. 12, No. 2, pp. 123-134, Apr. 2011
Keywords: CCTV, proxy server, network camera, video surveillance, access control, key sharing -
Gwang-Su Lee, Seong-Jin Ahn, Vol. 12, No. 1, pp. 71-84, Feb. 2011
Keywords: Accounting System, Financing System, Double Entry, National University -
66. Multiple Access Scheme Using Modified Hermite Polynomial Pulse and Ternary code for Out-Body WBANJae-Joon Shim, Jae-Ho Hwang, Jae-Moung Kim, Vol. 12, No. 1, pp. 27-38, Feb. 2011
Keywords: WBAN, Multiple Access, UWB, MHP, Ternary code -
Bong-Gyou Lee, Sung-Joon Lee, Hyun-Sik Seoh, Jun-Ho Kim, Vol. 11, No. 3, pp. 105-120, Jun. 2010
Keywords: Adoption of IPTV Services, Socio-cultural Factor, Flow Experience, Perceived Behavioral Control, Extended Technology Acceptance Model, ETAM -
Yong-Seob Kim, Kun-Seok Oh, Vol. 11, No. 3, pp. 87-104, Jun. 2010
Keywords: Web Accessibility, Web Accessibility Guideline, Medical Center, Accessibility-based Criteria, Usability-based Criteria -
Won-Suk Ou, Myung-Sin Chae, Dae-Sung Yeum, Vol. 11, No. 2, pp. 109-128, Apr. 2010
Keywords: Network Centric Warfare(NCW), Future War, NCW Value Chain, Technology Acceptance Model, Shared Information, Partial Least Squares(PLS) -
Dae-Hee Seo, Jang-Mi Baek, Min-Kyung Lee, Mi-Yeon Yoon, Dong-Sub Cho, Vol. 11, No. 2, pp. 73-84, Apr. 2010
Keywords: Ubiquitous Computing, Knowledge Management System, Prevent illegal data leakage, access control, authentication