• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Digital Library


Search: "[ keyword: EV ]" (158)
  1. 71. Analysis and Performance Evaluation of Pattern Condensing Techniques used in Representative Pattern Mining
  2. 72. Performance analysis of Frequent Itemset Mining Technique based on Transaction Weight Constraints
    Unil Yun, Gwangbum Pyun, Vol. 16, No. 1, pp. 67-74, Feb. 2015
    10.7472/jksii.2015.16.1.67
    Keywords: Transaction weight, Data Mining, Frequent Itemset mining, Performance Evaluation, scalability
  3. 73. An automatic detection scheme of anti-debugging routines to the environment for analysis
    Jin-Woo Park, Yong-Su Park, Vol. 15, No. 6, pp. 47-54, Dec. 2014
    10.7472/jksii.2014.15.6.47
    Keywords: Anti-debugging, Malware, Instruction trace, API trace, Anti-reversing, Anti-reverse Engineering
  4. 74. Development of The Korean Trust Index for Social Network Services
    Yukyong Kim, Eun-Wha Jhee, Yongtae Shin, Vol. 15, No. 6, pp. 35-46, Dec. 2014
    10.7472/jksii.2014.15.6.35
    Keywords: Social Network Service (SNS), trustworthiness, trust evaluation
  5. 75. The Loss Prevention System of Smart Device Using by iBeacon
    ChoonSung Nam, HyunHee Jung, DongRyeol Shin, Vol. 15, No. 6, pp. 27-34, Dec. 2014
    10.7472/jksii.2014.15.6.27
    Keywords: Smart Device, Loss Prevention, iBeacon, Android
  6. 76. A Software Development Process for Mobile Applications
    Byeong Do Kang, SeungWeon Yang, Jong Seok Lee, Vol. 15, No. 4, pp. 135-140, Aug. 2014
    10.7472/jksii.2014.15.4.135
    Keywords: Mobile Application, Development Process Model, Design Method with Diagram
  7. 77. A Study on Introduction of Online Education to Provide Opportunities for Spreading University-level Program
    Oakyoung Han, Mihyun Chung, Jaehyoun Kim, Vol. 15, No. 3, pp. 117-124, Jun. 2014
    10.7472/jksii.2014.15.3.117
    Keywords: University-level Program, Online Education, Excellence Education
  8. 78. Analysis and Evaluation of Frequent Pattern Mining Technique based on Landmark Window
    Gwangbum Pyun, Unil Yun, Vol. 15, No. 3, pp. 101-108, Jun. 2014
    10.7472/jksii.2014.15.3.101
    Keywords: Landmark Window, Frequent pattern mining, Online mining, Performance Evaluation, scalability
  9. 79. Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices
    You Joung Ham, Hyung-Woo Lee, Vol. 15, No. 3, pp. 31-44, Jun. 2014
    10.7472/jksii.2014.15.3.31
    Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism
  10. 80. Implementation of Service Model to Exchange of Biosignal Information based on HL7 Fast Health Interoperability Resources for the hypertensive management
    Hune Cho, Ju Ok Won, Hae Sook Hong, Hwa Sun Kim, Vol. 15, No. 3, pp. 21-30, Jun. 2014
    10.7472/jksii.2014.15.3.21
    Keywords: Bluetooth Health Device Profile, HL7 FHIR, Hypertension, Personal Health Device, mobile Healthcare