• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: EV ]" (180)
  1. 41. Robust Watermarking against Lossy Compression in Hadamard Domain
    Xue-Nan Cui, Jong-Weon Kim, De Li, Jong-Uk Choi, Vol. 8, No. 3, pp. 33-44, Jun. 2007
    Keywords: Hadamard, reversible, Watermarking, jpeg, shift
  2. 42. Context aware Modeling and Services Implementation With Event Driven in Ubiquitous Computing Environment
  3. 43. False Alarm Minimization Technology using SVM in Intrusion Prevention System
  4. 44. An Automated Topic Specific Web Crawler Calculating Degree of Relevance
  5. 45. Diffusion Patterns of Telecommunications Services with Network Evolution
  6. 46. On the Study of Software Reliability in Quality Testing Metrics
  7. 47. Analysis of Assortativity in the Keyword-based Patent Network Evolution
    Jinho Choi, Junguk Kim, Vol. 14, No. 6, pp. 107-116, Dec. 2013
    10.7472/jksii.2013.14.6.107
    Keywords: Keyword-based patent network, Network Evolution, assortativity, clustering coefficient
  8. 48. Normal and Malicious Application Pattern Analysis using System Call Event on Android Mobile Devices for Similarity Extraction
    You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 6, pp. 125-0, Dec. 2013
    10.7472/jksii.2013.14.6.125
    Keywords: Android, Normal and Malicious Application, System call events, pattern analysis, Similarity Analysis
  9. 49. Air Threat Evaluation System using Fuzzy-Bayesian Network based on Information Fusion
    Jongmin Yun, Bomin Choi, Myung-Mook Han, Su-Hyun Kim, Vol. 13, No. 5, pp. 21-32, Oct. 2012
    10.7472/jksii.2012.13.5.21
    Keywords: JDL, Threat Evaluation, Fuzzy, Bayesian Network, Fuzzy-Bayesian Network
  10. 50. Color Object Segmentation using Distance Regularized Level Set
    Nguyen Tran Lan Anh, Guee-Sang Lee, Vol. 13, No. 4, pp. 53-62, Aug. 2012
    10.7472/jksii.2012.13.4.53
    Keywords: Object segmentation, level set, active contour model