Digital Library
Search: "[ keyword: ICA ]" (329)
-
Kim Moon-Soo, Kim Ho, Vol. 7, No. 2, pp. 93-102, Apr. 2006
Keywords: Telecommunications, Diffusion, Critical Mass, Network Evolution, Circuit-based Service, Pocket-based Service -
Eum Doo-Hun, Vol. 7, No. 2, pp. 81-92, Apr. 2006
Keywords: application generators, application frameworks, mobile applications, Observer/Observable pattern, MVC model -
Kim Hyun-Gon, Vol. 7, No. 1, pp. 121-130, Feb. 2006
Keywords: prepaid service, credit-control, Mobile IPv6, authentication, AAA -
Yang Hyung-Kyu, An Young-Hwa, Vol. 7, No. 1, pp. 59-64, Feb. 2006
Keywords: cryptanalysis, key recovery/escrow, certification authority, GKRS -
85. Realtime Facial Expression Recognition from Video Sequences Using Optical Flow and Expression HMMJun-Chul Chun, Gi-Han Shin, Vol. 10, No. 4, pp. 55-70, Aug. 2009
Keywords: HMM(Hidden Markov Model), optical flow, facial expression recognition, facial motion tracking -
Qian Zhang, Taeg-Keun WhangBo, Vol. 10, No. 4, pp. 25-34, Aug. 2009
Keywords: 3D reconstruction, Skin Wrinkle, Semi-dense matching, Image rectification, light compensation -
Hyung-Jin Lim, Jeong-Gun Lee, Moon-Seong Kim, Vol. 9, No. 6, pp. 73-80, Dec. 2008
Keywords: Secure Internet banking, One time password, Transaction verification -
Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho, Vol. 9, No. 6, pp. 63-72, Dec. 2008
Keywords: Ubiquitous Environment, Heterogeneous Network Security, Secure Network Management, User Authentication -
Hyung-Jong Kim, Vol. 9, No. 6, pp. 49-62, Dec. 2008
Keywords: Meaning-based Vulnerability Identification, Vulnerability Assessment, Atomic vulnerability, Vulnerability Description Analysis -
Dong-Hun Kang, Seung-Joon Seok, Vol. 9, No. 5, pp. 153-164, Oct. 2008
Keywords: DCF, IEEE 802.11, MAC, Jitter, Real-time applications




