Digital Library
Search: "[ keyword: ICA ]" (308)
-
Chi-Hyung Lee, Bong-Gyou Lee, Vol. 12, No. 4, pp. 51-60, Aug. 2011
Keywords: Market Concentration, Market Performance, Media Regulation, Market Inefficiency, Media Penetration, Empirical Study -
Jang-Ho Park, Bong-Gyou Lee, Vol. 12, No. 3, pp. 139-0, Jun. 2011
Keywords: Energy-IT Convergence, Future Industry, Critical Priority Factors, Policy Priority, ANP(Analytic Network Process) -
Jun-Sang Park, Sung-Ho Yoon, Myung-Sup Kim, Vol. 12, No. 3, pp. 89-100, Jun. 2011
Keywords: Application-Level Traffic Classification, Payload-Signature, Real-time classification -
Chul-Woo Moon, Jae-Hyoun Kim, Vol. 12, No. 3, pp. 57-68, Jun. 2011
Keywords: e-Government Service, interactivity, words-of-mouth, trust, political efficacy, Partial Least Square -
95. Development of Education Courseware for Clinical Care Classification System based PC and SmartphoneHae-Sook Hong, In-Keun Lee, Hune Cho, Hwa-Sun Kim, Vol. 12, No. 3, pp. 49-56, Jun. 2011
Keywords: Education Program, Smartphone, Clinical Core Classification System, Guideline -
Ji-Hye Song, Kwang-Hoon Kim, Vol. 12, No. 1, pp. 55-70, Feb. 2011
Keywords: rXPDL, A Policy-driven RFID Data Management, RFID Application Interface, SSI Part 4 Application Interface 24791-4 -
Cheong-Hyeon Choi, Vol. 11, No. 6, pp. 87-110, Dec. 2010
Keywords: Multicast Security, Group Key Management, Network Security -
In-Hwa Choi, Jun Hwang, Vol. 11, No. 6, pp. 51-60, Dec. 2010
Keywords: DMB, DMB Service, program list, Fast Information Channel, User Application Information -
99. Study of Document Distribution System Architecture for Digital Secret Document Leakage PreventionCheong-Hyeon Choi, Vol. 11, No. 4, pp. 143-158, Aug. 2010
Keywords: Network Security, Public Key Cryptography, Multicast Key Distribution -
Eun-Gyeom Jang, Vol. 11, No. 4, pp. 129-142, Aug. 2010
Keywords: Computer Forensics, integrity, authentication, Security Model