• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: Trace ]" (12)
  1. 1. A Visual Tracer of Process Instance Event Logs
    Dachan Jung, Dinh-Lam Pham, Kwanghoon Pio Kim, Vol. 26, No. 2, pp. 33-42, Apr. 2025
    10.7472/jksii.2025.26.2.33
    Keywords: XES, Process Mining, log visualization, trace animation
  2. 2. A Process Event-Trace-Log Pattern-Clustering and Preprocessing Framework
  3. 3. Visualization models for tracking software requirements and managing their changes
    YooRi Song, Hyeon Soo Kim, Vol. 22, No. 3, pp. 59-66, Jun. 2021
    10.7472/jksii.2021.22.3.59
    Keywords: Software Requirement, Traceability, Software Change Management, Visualization Model
  4. 4. Enhancing Model-based Fault Traceability by Using Similarity between Bug and Commit Information
    Dongju Jung, Kyeongsic Min, Jung-Won Lee, Byungjeong Lee, Vol. 20, No. 2, pp. 29-37, Apr. 2019
    10.7472/jksii.2019.20.2.29
    Keywords: Fault traceability, Bug Report, Commit Information
  5. 5. The Analysis of User Perception and Attitude Using SNS Data about Emergency Contraceptive Pills
    Sung Hyun Lee, Vol. 18, No. 1, pp. 143-152, Feb. 2017
    10.7472/jksii.2017.18.1.143
    Keywords: Healthcare, Big data, Text Mining, Data Mining, Emergency Contraceptive
  6. 6. A memory protection method for application programs on the Android operating system
  7. 7. Implementation of EPCIS Capturing Application for Finished Goods Trace History in EPC Network
    Jinsuk Kim, Yongtae Shin, Vol. 16, No. 2, pp. 19-26, Apr. 2015
    10.7472/jksii.2015.16.2.19
    Keywords: EPC, Capturing Application, Middleware, RFID, Trace
  8. 8. An automatic detection scheme of anti-debugging routines to the environment for analysis
    Jin-Woo Park, Yong-Su Park, Vol. 15, No. 6, pp. 47-54, Dec. 2014
    10.7472/jksii.2014.15.6.47
    Keywords: Anti-debugging, Malware, Instruction trace, API trace, Anti-reversing, Anti-reverse Engineering
  9. 9. Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks
    Hyung-Woo Lee, Tae-Su Kim, Vol. 11, No. 2, pp. 85-98, Apr. 2010
    Keywords: Sinkhole Router, IP Traceback, Network Security, DDoS attack
  10. 10. Advanced n based Packet Marking Mechanism for IP Traceback
    Lee Hyung-Woo, Vol. 6, No. 1, pp. 13-26, Feb. 2005
    Keywords: Packet Marking, DDoS attack, IP Traceback, Network Security