1 | Á¦¸ñ(Title) | Applying Token Tagging to Augment Dataset for Automatic Program Repair | |
---|---|---|---|
ÀúÀÚ(Author) | Huimin Hu Byungjeong Lee | ||
¼ö·ÏÀú³Î(Journal) | Journal of Information Processing Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 18 NO. 05 PP. 0628 ~ 0636 2022. 10 | ||
2 | Á¦¸ñ(Title) | A Novel Dynamic Optimization Technique for Finding Optimal Trust Weights in Cloud | |
ÀúÀÚ(Author) | Aluri V.H. Sai Prasad Ganapavarapu V.S. Rajkumar | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 16 NO. 06 PP. 2060 ~ 2073 2022. 06 | ||
3 | Á¦¸ñ(Title) | The Needs Analysis of Software Safety Education Program for Common Competency Area | |
ÀúÀÚ(Author) | Ji-Woon Kang Sung-Ryong Do | ||
¼ö·ÏÀú³Î(Journal) | Journal of Information Processing Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 17 NO. 05 PP. 0960 ~ 0971 2021. 10 | ||
4 | Á¦¸ñ(Title) | Research Trend Analysis for Sustainable QR code use - Focus on Big Data Analysis | |
ÀúÀÚ(Author) | Eunji Lee Jikyung Jang | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 15 NO. 09 PP. 3221 ~ 3242 2021. 09 | ||
5 | Á¦¸ñ(Title) | Malware Detection with Directed Cyclic Graph and Weight Merging | |
ÀúÀÚ(Author) | Eunji Lee Jikyung Jang Hyun Kwon Hyunsoo Yoon Daeseon Choi Shanxi Li Qingguo Zhou Wei Wei | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 15 NO. 09 PP. 3258 ~ 3273 2021. 09 | ||
6 | Á¦¸ñ(Title) | A Survey of Automatic Code Generation from Natural Language | |
ÀúÀÚ(Author) | Jiho Shin Jaechang Nam | ||
¼ö·ÏÀú³Î(Journal) | Journal of Information Processing Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 17 NO. 03 PP. 0537 ~ 0555 2021. 06 | ||
7 | Á¦¸ñ(Title) | Energy-efficient Power Allocation based on worst-case performance optimization under channel uncertainties | |
ÀúÀÚ(Author) | Xin Song Li Dong Xue Huang Lei Qin Xiuwei Han | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 14 NO. 11 PP. 4595 ~ 4610 2020. 11 | ||
8 | Á¦¸ñ(Title) | A Reusable SQL Injection Detection Method for Java Web Applications | |
ÀúÀÚ(Author) | Chengwan He Yue He | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 14 NO. 06 PP. 2576 ~ 2590 2020. 06 | ||
9 | Á¦¸ñ(Title) | Low-power Scheduling Framework for Heterogeneous Architecture under Performance Constraint | |
ÀúÀÚ(Author) | Junke Li Bing Guo Yan Shen Deguang Li | ||
¼ö·ÏÀú³Î(Journal) | KSII Transactions on Internet and Information Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 14 NO. 05 PP. 2003 ~ 2021 2020. 05 | ||
10 | Á¦¸ñ(Title) | Improvement of ITSM IT Service Efficiency in Military Electronic Service | |
ÀúÀÚ(Author) | Hanchul Woo Suk-Jae Jeong Jun-Ho Huh | ||
¼ö·ÏÀú³Î(Journal) | Journal of Information Processing Systems | ||
¿ø¹®¼ö·Ïó(Citation) | VOL 16 NO. 02 PP. 0246 ~ 0260 2020. 04 |
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.