Digital Library
Search: "[ keyword: SI ]" (564)
-
Young-Won Seo, Chang-soo Kim, Vol. 16, No. 6, pp. 23-30, Dec. 2015
10.7472/jksii.2015.16.6.23
Keywords: SData Mining, Frequent-Pattern tree, Clustering Algorithms, Distributed Processing System, Recommendation System, Map Reduce -
Suk-Ki Hong, Vol. 16, No. 5, pp. 93-98, Oct. 2015
10.7472/jksii.2015.16.5.93
Keywords: Internet of Things (IoT), Activity Trackers, Customer Needs, Wearable Devices, Variance of Analysis -
Mee-sun Kim, Kwang-hoon Kim, Vol. 16, No. 5, pp. 67-74, Oct. 2015
10.7472/jksii.2015.16.5.67
Keywords: Workflow Model, Workflow-supported Enterprise Social Network, Social Network Analysis -
Ilhwan Kim, Jaehyoun Kim, Vol. 16, No. 4, pp. 149-0, Aug. 2015
10.7472/jksii.2015.16.4.149
Keywords: Information Society, Privacy, Personal Information, Personal Information Protection Act, Personal Information Protection Commission -
In Kuk Song, Vol. 16, No. 4, pp. 131-140, Aug. 2015
10.7472/jksii.2015.16.4.131
Keywords: Public Data, Public Organization, Decision Making Tool, BOCR Model, ANP, Government 3.0 -
Do Young Kwon, Deepanjal Shrestha, Seung Ryul Jeong, Vol. 16, No. 4, pp. 71-82, Aug. 2015
10.7472/jksii.2015.16.4.71
Keywords: Text Mining, website evaluation, content analysis, Usefulness, Usability, Internet technologies, social sites, web resources, social & ethical issue, work productivity -
Hyun-Lock Choo, Jong-Hun Jung, Hwan-Kuk Kim, Vol. 16, No. 4, pp. 51-60, Aug. 2015
10.7472/jksii.2015.16.4.51
Keywords: Malicious JavaScript, Analysis Engine, Static Analysis, Dynamic Analysis, Script-Based Cyber Attack -
Jun Lee, YongJin KWON, Vol. 16, No. 4, pp. 39-50, Aug. 2015
10.7472/jksii.2015.16.4.39
Keywords: Temporal information, Termporal Extraction, Machine Learning, Similarity filtering, Historical information, Historical Object -
Sun-gil Yoo, Dongik Oh, Sedong Min, Wonhan Shin, Vol. 16, No. 4, pp. 13-24, Aug. 2015
10.7472/jksii.2015.16.4.13
Keywords: Telemedicine, Innovation diffusion theory, Survey -
Hexin Yu, Suaini Sura, Jong-chang Ahn, Vol. 16, No. 3, pp. 79-94, Jun. 2015
10.7472/jksii.2015.16.3.79
Keywords: Cloud service, Persistent usage intention, External variable, Brand influence, Perceived security