• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: CA ]" (565)
  1. 91. A Study on Grade Comparison Difference Analysis of the Gifted Children in IT
    Woochun Jun, Suk-Ki Hong, Vol. 15, No. 5, pp. 25-32, Oct. 2014
    10.7472/jksii.2014.15.5.25
    Keywords: Gifted Children in IT, Grade Difference, Programming Ability, Logical Thinking Ability
  2. 92. A Study on the Regulations and Market of Location Based Service(LBS)
    Sunmi Nam, Minsu Park, Kyungshin Kim, Seungjoo Kim, Vol. 15, No. 4, pp. 141-0, Aug. 2014
    10.7472/jksii.2014.15.4.141
    Keywords: LBS, location based service, Regulation of LBS
  3. 93. A Software Development Process for Mobile Applications
    Byeong Do Kang, SeungWeon Yang, Jong Seok Lee, Vol. 15, No. 4, pp. 135-140, Aug. 2014
    10.7472/jksii.2014.15.4.135
    Keywords: Mobile Application, Development Process Model, Design Method with Diagram
  4. 94. Bio-mimetic Recognition of Action Sequence using Unsupervised Learning
    Jin Ok Kim, Vol. 15, No. 4, pp. 9-20, Aug. 2014
    10.7472/jksii.2014.15.4.09
    Keywords: Action sequence detection, Categorical action classification, Bio-inspired Action perception, Unsupervised learning
  5. 95. A Study on Ontology Based Knowledge Representation Method with the Alzheimer Disease Related Articles
  6. 96. A Study on Introduction of Online Education to Provide Opportunities for Spreading University-level Program
    Oakyoung Han, Mihyun Chung, Jaehyoun Kim, Vol. 15, No. 3, pp. 117-124, Jun. 2014
    10.7472/jksii.2014.15.3.117
    Keywords: University-level Program, Online Education, Excellence Education
  7. 97. Analysis and Evaluation of Frequent Pattern Mining Technique based on Landmark Window
    Gwangbum Pyun, Unil Yun, Vol. 15, No. 3, pp. 101-108, Jun. 2014
    10.7472/jksii.2014.15.3.101
    Keywords: Landmark Window, Frequent pattern mining, Online mining, Performance Evaluation, scalability
  8. 98. A Framework for Making Decision on Optimal Security Investment to the Proactive and Reactive Security Solutions management
    Yoon-Ho Choi, Vol. 15, No. 3, pp. 91-100, Jun. 2014
    10.7472/jksii.2014.15.3.91
    Keywords: Decision Making, mathematical analysis, investment on security solutions, optimal security investment
  9. 99. Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives
    Hong Ryeol Ryu, Moses Hong, Taekyoung Kwon, Vol. 15, No. 3, pp. 79-90, Jun. 2014
    10.7472/jksii.2014.15.3.79
    Keywords: Phishing, Pharming, Password, authentication, Social Engineering, HCI
  10. 100. Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices
    You Joung Ham, Hyung-Woo Lee, Vol. 15, No. 3, pp. 31-44, Jun. 2014
    10.7472/jksii.2014.15.3.31
    Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism