¿¬°£ ´©Àû¼øÀ§´Â ¿¬°£ ¸¹ÀÌ °Ë»öÇϽŠ³í¹®µéÀ» ¼øÀ§´ë·Î Á¤¸®ÇÑ °ÍÀ¸·Î,
Á¦¸ñÀ» Ŭ¸¯ÇϽøé ÇØ´ç³í¹® ÆäÀÌÁö·Î À̵¿ÇÕ´Ï´Ù.
[ƯÁý¿ø°í¥°] S/WÀÇ Ç°Áú°æÀï·ÂÀ» ÅëÇÑ S/W»ê¾÷ Àçµµ¾àÀ» ±â´ëÇϸç
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2010³â 11¿ù)
[ƯÁý¿ø°í¥°] IT ¾Æ¿ô¼Ò½Ì »ê¾÷ÀÇ ÇöȲ ¹× Àü¸Á
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2010³â 11¿ù)
[ƯÁý¿ø°í¥°] ±¹³» ÀÓº£µðµåS/W »ê¾÷ ÇöȲ ¹× ¹ßÀü ¹æ¾È Á¦¾È
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2010³â 11¿ù)
[ƯÁý¿ø°í¥±] ÃֽŠ¾Ç¼ºÄÚµå ±â¼úµ¿Çâ ¹× ºÐ¼® ¹æ¾È ¿¬±¸
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2010³â 11¿ù)
[±âȹĮ·³] Çѱ¹ÀÇ ÈÞ´ë¿ë ´Ü¸»±â Ç÷§Æû Àü·«
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2010³â 11¿ù)
[ƯÁý¿ø°í¥°] ¸ð¹ÙÀÏ ¼ÒÇÁÆ®¿þ¾î »ê¾÷ÇöȲ ¹× Àü¸Á
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2010³â 11¿ù)
Vulnerabilities Analysis of the OTP Implemented on a PC
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C (2010³â 8¿ù)
[ƯÁý¿ø°í¥°] Á¤º¸º¸¾È »ê¾÷ÇöȲ ¹× Àü¸Á
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2010³â 11¿ù)
À¥ Ãßõ ½Ã½ºÅÛÀ» À§ÇÑ À¯¿ëÇÑ ·ê ÃßÃâ ¹æ¹ý
An Approach for Mining Rules for Web Recommendation System
Çѱ¹Á¤º¸°úÇÐȸ 2009 Ãß°èÇмú´ëȸ (2009³â 11¿ù)
[ƯÁý¿ø°í I] »ç¹°Áö´ÉÅë½Å Á¤Ã¥ ¹× Ç¥ÁØÈ µ¿Çâ
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2010³â 9¿ù)
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.