Digital Library
Search: "[ keyword: CA ]" (565)
-
Woochun Jun, Suk-Ki Hong, Vol. 15, No. 5, pp. 25-32, Oct. 2014
10.7472/jksii.2014.15.5.25
Keywords: Gifted Children in IT, Grade Difference, Programming Ability, Logical Thinking Ability -
Sunmi Nam, Minsu Park, Kyungshin Kim, Seungjoo Kim, Vol. 15, No. 4, pp. 141-0, Aug. 2014
10.7472/jksii.2014.15.4.141
Keywords: LBS, location based service, Regulation of LBS -
Byeong Do Kang, SeungWeon Yang, Jong Seok Lee, Vol. 15, No. 4, pp. 135-140, Aug. 2014
10.7472/jksii.2014.15.4.135
Keywords: Mobile Application, Development Process Model, Design Method with Diagram -
Jin Ok Kim, Vol. 15, No. 4, pp. 9-20, Aug. 2014
10.7472/jksii.2014.15.4.09
Keywords: Action sequence detection, Categorical action classification, Bio-inspired Action perception, Unsupervised learning -
Jaeho Lee, Younhee Kim, Hyunkyung Shin, Kibong Song, Vol. 15, No. 3, pp. 125-0, Jun. 2014
10.7472/jksii.2014.15.3.125
Keywords: Alzheimer disease, Ontology, knowledge representation, database of domestic academic papers, inference based query -
Oakyoung Han, Mihyun Chung, Jaehyoun Kim, Vol. 15, No. 3, pp. 117-124, Jun. 2014
10.7472/jksii.2014.15.3.117
Keywords: University-level Program, Online Education, Excellence Education -
Gwangbum Pyun, Unil Yun, Vol. 15, No. 3, pp. 101-108, Jun. 2014
10.7472/jksii.2014.15.3.101
Keywords: Landmark Window, Frequent pattern mining, Online mining, Performance Evaluation, scalability -
Yoon-Ho Choi, Vol. 15, No. 3, pp. 91-100, Jun. 2014
10.7472/jksii.2014.15.3.91
Keywords: Decision Making, mathematical analysis, investment on security solutions, optimal security investment -
Hong Ryeol Ryu, Moses Hong, Taekyoung Kwon, Vol. 15, No. 3, pp. 79-90, Jun. 2014
10.7472/jksii.2014.15.3.79
Keywords: Phishing, Pharming, Password, authentication, Social Engineering, HCI -
You Joung Ham, Hyung-Woo Lee, Vol. 15, No. 3, pp. 31-44, Jun. 2014
10.7472/jksii.2014.15.3.31
Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism