¿¬°£ ´©Àû¼øÀ§´Â ¿¬°£ ¸¹ÀÌ °Ë»öÇϽŠ³í¹®µéÀ» ¼øÀ§´ë·Î Á¤¸®ÇÑ °ÍÀ¸·Î,
Á¦¸ñÀ» Ŭ¸¯ÇϽøé ÇØ´ç³í¹® ÆäÀÌÁö·Î À̵¿ÇÕ´Ï´Ù.
MANET(Mobile Ad Hoc Network)¿¡¼ÀÇ Ç¥ÁØ TCP Àû¿ëÀÇ ¹®Á¦Á¡°ú ÇØ°á¹æ¾È
Á¤º¸Åë½Å±â¼ú (2003³â 12¿ù)
Çѱ¹ e-ScienceÀÇ ÇöÀç¿Í ¹ßÀü¹æÇâ
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ÇÐȸÁö (2008³â 3¿ù)
°³ÀÎÁ¤º¸ À̽´ ¹× ¸ÞÄ¿´ÏÁò- °³ÀÎÁ¤º¸ Á¤Ã¥ ¹× Á¢±ÙÁ¦¾î Áß½ÉÀ¸·Î -
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2007³â 5¿ù)
±¹¹æ CBD ¹æ¹ý·Ð¿¡¼ MND-AF »êÃâ¹° ÀçÈ°¿ë¼º Á¦°í
Reusability Enhancement of the MND-AF Artifacts in the Defense-CBD Methodology
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö D (2005³â 12¿ù)
¿À¹ö·¹ÀÌ ³×Æ®¿öÅ©¿¡¼ ²÷±è¾ø´Â À̵¿¼º Áö¿øÀ» À§ÇÑ ¼öÁ÷Àû ÇÚµå¿À¹ö ±â¹ý
Vertical Handover scheme for Seamless Mobility in Overlay Networks
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ 2005³â Ãá°èÇмú´ëȸ (2005³â 5¿ù)
³×Æ®¿öÅ© °ø°Ý ºÐ¼®À» À§ÇÑ ¸¶ÀÌ´× ÇÁ·ÎÅäŸÀÔ ½Ã½ºÅÛ ±¸Çö
An Implementation of Mining Prototype System for Network Attack Analysis
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C (2004³â 8¿ù)
¼¾¼³×Æ®¿öÅ©¿¡¼ Æò¸é ±×¸®µå ±â¹ÝÀÇ Å° ¼± ºÐ¹è ±â¹ý
Plat-Based Key Pre-Distribution Scheme in Sensor Network
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C (2008³â 2¿ù)
ÅÚ·¹¸Åƽ½º ±â¹Ý ÄÁ¹öÀü½º ¼ºñ½º ¹× ±â¼ú µ¿Çâ
Contextual Advertisement System based on Document Clustering
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2008³â 1¿ù)
¼ºñ½º ½Ã½ºÅÛ ±¸ÃàÀ» À§ÇÑ È¿À²Àû ¾ÆÅ°ÅØó ¼³°è
A Design of Effective Architecture for Constructing Services Systems
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö B - ¼ÒÇÁÆ®¿þ¾î ¹× ÀÀ¿ë (2008³â 3¿ù)
¼ºñ½º ÁöÇâ ¾ÆÅ°ÅØó¸¦ À§ÇÑ ÄÄÆ÷³ÍÆ®±â¹Ý ½Ã½ºÅÛÀÇ ¼ºñ½º ½Äº°
Service Identification of Component-Based System for Service-Oriented Architecture
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö B - ¼ÒÇÁÆ®¿þ¾î ¹× ÀÀ¿ë (2008³â 2¿ù)
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.