Digital Library
Search: "[ keyword: graph ]" (36)
-
21. A Weighted Frequent Graph Pattern Mining Approach considering Length-Decreasing Support ConstraintsUnil Yun, Gangin Lee, Vol. 15, No. 6, pp. 125-132, Dec. 2014
10.7472/jksii.2014.15.6.125
Keywords: Length-decreasing support constraint, weighted frequent pattern mining, graph pattern, Data Mining, Frequent pattern mining -
Cheong Hyeon Choi, Vol. 14, No. 5, pp. 11-26, Oct. 2013
10.7472/jksii.2013.14.5.11
Keywords: Mobile IPSec, Mobile IPv4, Elliptic Curve Cryptography, Identity Based Encryption -
Cheong-Hyeon Choi, Vol. 13, No. 2, pp. 59-72, Apr. 2012
10.7472/jksii.2012.13.2.59
Keywords: Network Security, Public Key Encryption, ECC-based cryptography, identity based, Weil pairing -
Seung-Hak Kuk, Yong-Jin Seo, Hyeon-Soo Kim, Vol. 13, No. 1, pp. 83-98, Feb. 2012
10.7472/jksii.2012.13.1.83
Keywords: Service Oriented Architecture, Web Services Composition, Choreography, Software Test -
Won-Hyuk Choi, Won-Young Kim, Vol. 12, No. 6, pp. 53-62, Dec. 2011
Keywords: Offloading computing, Graphic virtualization, Software virtualization -
26. Study of Document Distribution System Architecture for Digital Secret Document Leakage PreventionCheong-Hyeon Choi, Vol. 11, No. 4, pp. 143-158, Aug. 2010
Keywords: Network Security, Public Key Cryptography, Multicast Key Distribution -
Jung-Lan Hun, Vol. 10, No. 2, pp. 75-84, Apr. 2009
Keywords: incremental evaluation, Dependency Chart, incremental evaluation algorithm, dependency graph, object oriented programming languages -
Young-Mi Kim, Vol. 8, No. 5, pp. 141-150, Oct. 2007
Keywords: Steganography, Information Hiding, Low bit Encoding, Cover Data, Stego Data -
Jang-Mi Baek, In-Sik Hong, Vol. 8, No. 3, pp. 45-56, Jun. 2007
Keywords: Social Basic Infrastructure, Active RFID, Geographical Information System -
Eun-Bok Choi, Ju-Gi Park, Jae-Hoon Kim, Vol. 7, No. 5, pp. 109-122, Oct. 2006
Keywords: MAC, Lattice, RBAC, Role Graph, access control