¿¬°£ ´©Àû¼øÀ§´Â ¿¬°£ ¸¹ÀÌ °Ë»öÇϽŠ³í¹®µéÀ» ¼øÀ§´ë·Î Á¤¸®ÇÑ °ÍÀ¸·Î,
Á¦¸ñÀ» Ŭ¸¯ÇϽøé ÇØ´ç³í¹® ÆäÀÌÁö·Î À̵¿ÇÕ´Ï´Ù.
ÀÓº£µðµå Ç÷¡½Ã ÆÄÀϽýºÅÛÀ» À§ÇÑ ¼øÀ§º° Áö¿ò Á¤Ã¥
A Ranking Cleaning Policy for Embedded Flash File Systems
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö A (2002³â12¿ù)
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2003³â03¿ù)
XML View Indexing
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö D - µ¥ÀÌŸº£À̽º (2003³â06¿ù)
À¯ºñÄõÅͽº ÄÄÇ»Æà ȯ°æÀ» À§ÇÑ ¼¾½Ì ±â¼ú°ú ÄÁÅؽºÆ®-ÀÎ½Ä ±â¼úÀÇ ¿¬±¸ µ¿Çâ
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2003³â05¿ù)
ÄÄÆ÷³ÍÆ® ±â¹Ý ¼ÒÇÁÆ®¿þ¾î °³¹ßÀÇ È¿À²ÀûÀÎ Àç»ç¿ë¼ºÀ» Áö¿øÇϱâ À§ÇÑ µµ¸ÞÀÎ ¼³°è ¹æ¹ý
Domain Design Method to Support Effective Reuse in Component-Based Software new_Csericment
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö B - ¼ÒÇÁÆ®¿þ¾î ¹× ÀÀ¿ë (2003³â06¿ù)
´ÙÁßôµµ ¸ðµ¨ÀÇ °áÇÕÀ» ÀÌ¿ëÇÑ È¿°úÀûÀΠħÀÔŽÁö
Effective Intrusion Detection Integrating Multiple Measure Models
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö I - Á¤º¸Åë½Å (2003³â06¿ù)
¾Ó»óºí ±¸¼ºÀ» ÀÌ¿ëÇÑ SVM ºÐ·ù¼º´ÉÀÇ Çâ»ó
Improving SVM Classification by Constructing Ensemble
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö B - ¼ÒÇÁÆ®¿þ¾î ¹× ÀÀ¿ë (2003³â04¿ù)
»óÀÌÇÑ ±¸Á¶ÀÇ XML ¹®¼µé¿¡¼ °æ·Î ÁúÀÇ Ã³¸®¸¦ À§ÇÑ RDBMS ±â¹Ý ¿ª À妽º ±â¹ý
An RDBMS-based Inverted Index Technique for Path Queries Processing on XML Documents with Different Structures
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö D - µ¥ÀÌŸº£À̽º (2003³â08¿ù)
±âÇÏÇÐÀû Ư¡¿¡ ±â¹ÝÇÑ ¼ø¼ö ¾ó±¼¿µ¿ª °ËÃâ±â¹ý
Geometrical Feature-Based Detection of Pure Facial Regions
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö B - ¼ÒÇÁÆ®¿þ¾î ¹× ÀÀ¿ë (2003³â08¿ù)
Æ®¸®±â¹Ý À̵¿ ¸ÖƼij½ºÆ®¸¦ À§ÇÑ ÆÐŶ¼Õ½Çȸº¹ ¾Ë°í¸®Áò
A Packet Loss Recovery Algorithm for Tree-based Mobile Multicast
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö I - Á¤º¸Åë½Å (2003³â06¿ù)
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.