Digital Library
Search: "[ keyword: ICA ]" (308)
-
161. A Hierarchical Network Architecture and Handoff framework for Integrating CDMA2000, WiBro and WLANDu-Kyung Kong, Jin-Sung Cho, Seung-Hee Kim, Dae-Sik Kim, Vol. 7, No. 5, pp. 43-58, Oct. 2006
Keywords: CDMA2000, WiBro, WLAN, Hierarchical integration architecture, Handoff framework -
Soon-Ja Hong, Yong-Wan Koo, Vol. 7, No. 5, pp. 33-42, Oct. 2006
Keywords: WPKI, Rooming Server, Pre-Authentication -
Jung Hye-Jung, Vol. 7, No. 4, pp. 1-10, Aug. 2006
Keywords: Software Quality Testing, International Standard Tendency, Application Plan, Software Measurement Primitive, ISO/IEC 25000, ISO/IEC 9126-2 -
Lee Jae-Moon, Vol. 7, No. 3, pp. 169-0, Jun. 2006
Keywords: Accuracy, Machine Learning, NaiveBayes, Document Classification, Large Item Sets -
Seo Hae-Sung, Choi Young-Soo, Choi Kyung-Hee, Jung Gi-Hyun, Noh Sang-Uk, Vol. 7, No. 3, pp. 155-168, Jun. 2006
Keywords: topic specific Web crawler (focused crawler), degree of relevance, Web page classification, Machine Learning, compiled rules -
Shin Kwang-Cheul, Cho Sung-Je, Vol. 7, No. 3, pp. 83-92, Jun. 2006
Keywords: PKI, Kerberos, authentication, PKINIT, Key Recovery -
167. Network Traffic Monitoring System Applied Load Shedder to Analyze Traffic at the Application LayerSon Sei-Il, Kim Heung-Jun, Lee Jin-Young, Vol. 7, No. 3, pp. 53-60, Jun. 2006
Keywords: Network traffic monitoring, identification of application layer traffic, load shedding, stratified random sampling -
Lee Seung-Yeon, Huh Eui-Nam, Vol. 7, No. 3, pp. 1-12, Jun. 2006
Keywords: Mobile IPv6, AAA, Fast Handoff, authentication, Assertion -
Hong Seng-Phil, Kim Jae-Hyoun, Vol. 7, No. 2, pp. 161-0, Apr. 2006
Keywords: authentication, smartcard, cryptography, Biopmetrics -
Kim Moon-Soo, Kim Ho, Vol. 7, No. 2, pp. 93-102, Apr. 2006
Keywords: Telecommunications, Diffusion, Critical Mass, Network Evolution, Circuit-based Service, Pocket-based Service