¿¬°£ ´©Àû¼øÀ§´Â ¿¬°£ ¸¹ÀÌ °Ë»öÇϽŠ³í¹®µéÀ» ¼øÀ§´ë·Î Á¤¸®ÇÑ °ÍÀ¸·Î,
Á¦¸ñÀ» Ŭ¸¯ÇϽøé ÇØ´ç³í¹® ÆäÀÌÁö·Î À̵¿ÇÕ´Ï´Ù.
Áö¹æÀÚÄ¡´Üü Áö¸®Á¤º¸½Ã½ºÅÛ¿¡¼ Àç»ç¿ëÀ» À§ÇÑ ÀÀ¿ë ¼ºñ½º ÄÄÆ÷³ÍÆ®ÀÇ ¼³°è ¹× ±¸Çö
Design and Implementation of Application Service Component for Reuse in ...
Çѱ¹°ø°£Á¤º¸½Ã½ºÅÛÇÐȸ ³í¹®Áö (2001³â 6¿ù)
¹«¼± ¼¾¼ ³×Æ®¿öÅ©¸¦ À§ÇÑ ¿¡³ÊÁö È¿À²ÀûÀΠŬ·¯½ºÅÍ ±â¹Ý Áö¿ª ¸ÖƼȩ ¶ó¿ìÆà ÇÁ·ÎÅäÄÝ
An Energy Efficient Cluster-Based Local Multi-hop Routing Protocol for Wireless Sensor Networks
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C (2009³â 8¿ù)
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ÇÐȸÁö (2009³â 1¿ù)
IT °Å¹ö³Í½º ÀÇ»ç°áÁ¤ ±¸Á¶ÀÇ Â÷ÀÌ ºÐ¼®: IT Àü·« ±×¸®µå ÇÁ·¹ÀÓ¿öÅ© Àû¿ë
Analyzing a Differentiation of IT Governance Decision Structure: Application of IT
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö D (2008³â 4¿ù)
IT °Å¹ö³Í½ºÀÇ °³³äÀû Á¤ÀÇ ¹× ÃøÁ¤µµ±¸ °³¹ß
The Conceptual Definition and the Measurement Development for IT Governance
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö D (2007³â 4¿ù)
¼ÒÇÁÆ®¿þ¾î»ç¾÷ ¿ä±¸»çÇ× ¸í¼¼È Ç¥ÁØÁöħ °³¹ß
Design and Development of a Standard Guidance for Software Requirement Specification
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö B - ¼ÒÇÁÆ®¿þ¾î ¹× ÀÀ¿ë (2009³â 7¿ù)
6LoWPAN »ó¿¡¼ÀÇ Botnet ºÐ¼® ¹× ŽÁö ¸ÞÄ¿´ÏÁò
Analysis and Detection Mechanism of Botnet on 6LoWPAN
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ 2009³â Ãá°èÇмú´ëȸ (2009³â 4¿ù)
»çÁø°ªÀ» ÀÌ¿ëÇÑ °æ·®ÀÇ Pair-wise Å° »ý¼º ±â¹ý
A Light-weight Pair-wise Key Generation Scheme using Time value
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ 2009³â Ãá°èÇмú´ëȸ (2009³â 4¿ù)
SMB ÇÁ·ÎÅäÄÝ ±â¹ÝÀÇ ÆÄÀÏ °øÀ¯ ȯ°æ¿¡¼ ¹®¼º¸¾ÈÀ» À§ÇÑ ÈÄÅ· Ŭ¶óÀ̾ðÆ® ¼³°è ¹× ±¸Çö
Design and Implementation of a Hooking Client for Document Security in File Sharing Environments based on SMB Protocol
Çѱ¹Á¤º¸°úÇÐȸ Çѱ¹ÄÄÇ»ÅÍÁ¾ÇÕÇмú´ëȸ 2009 (2009³â 7¿ù)
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2009³â 9¿ù)
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.