Digital Library
Search: "[ keyword: ICA ]" (329)
-
Youn-Gjin Ahn, Moon-Seong Kim, Hyun-Seung Choo, Vol. 8, No. 2, pp. 33-42, Apr. 2007
Keywords: Delay- and delay Variation-Bounded Multicast Tree Problem, delay variation, DDVCA(Delay and Delay Variation Constraint Algorithm -
Seng-Phil Hong, Jae-Hyoun Kim, Vol. 8, No. 1, pp. 99-114, Feb. 2007
Keywords: Authorization, authentication, access control, Security Policy, PKI, PMI, e-Business -
Moon-Seong Kim, Young-Cheol Bang, Hyun-Seung Choo, Vol. 8, No. 1, pp. 25-32, Feb. 2007
Keywords: Unicost Routing, Delay Constrained Least Cost (DCLC) Path Problem, Delay Constrained Unicast Routing (DCUR) Algorithm -
Jung Hye-Jung, Vol. 7, No. 4, pp. 1-10, Aug. 2006
Keywords: Software Quality Testing, International Standard Tendency, Application Plan, Software Measurement Primitive, ISO/IEC 25000, ISO/IEC 9126-2 -
Lee Jae-Moon, Vol. 7, No. 3, pp. 169-0, Jun. 2006
Keywords: Accuracy, Machine Learning, NaiveBayes, Document Classification, Large Item Sets -
Seo Hae-Sung, Choi Young-Soo, Choi Kyung-Hee, Jung Gi-Hyun, Noh Sang-Uk, Vol. 7, No. 3, pp. 155-168, Jun. 2006
Keywords: topic specific Web crawler (focused crawler), degree of relevance, Web page classification, Machine Learning, compiled rules -
Shin Kwang-Cheul, Cho Sung-Je, Vol. 7, No. 3, pp. 83-92, Jun. 2006
Keywords: PKI, Kerberos, authentication, PKINIT, Key Recovery -
78. Network Traffic Monitoring System Applied Load Shedder to Analyze Traffic at the Application LayerSon Sei-Il, Kim Heung-Jun, Lee Jin-Young, Vol. 7, No. 3, pp. 53-60, Jun. 2006
Keywords: Network traffic monitoring, identification of application layer traffic, load shedding, stratified random sampling -
Lee Seung-Yeon, Huh Eui-Nam, Vol. 7, No. 3, pp. 1-12, Jun. 2006
Keywords: Mobile IPv6, AAA, Fast Handoff, authentication, Assertion -
Hong Seng-Phil, Kim Jae-Hyoun, Vol. 7, No. 2, pp. 161-0, Apr. 2006
Keywords: authentication, smartcard, cryptography, Biopmetrics




