¿¬°£ ´©Àû¼øÀ§´Â ¿¬°£ ¸¹ÀÌ °Ë»öÇϽŠ³í¹®µéÀ» ¼øÀ§´ë·Î Á¤¸®ÇÑ °ÍÀ¸·Î,
Á¦¸ñÀ» Ŭ¸¯ÇϽøé ÇØ´ç³í¹® ÆäÀÌÁö·Î À̵¿ÇÕ´Ï´Ù.
ITSM ½Ã½ºÅÛ ±¸Ãà¿¡ µû¸¥ ±â´ëÈ¿°ú¿¡ °üÇÑ »ç·Ê¿¬±¸
A Case Study on the Expected Effect according to Implementation of ITSM System
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ 2008³â Ãß°èÇмú¹ßÇ¥´ëȸ (2008³â11¿ù)
µ¿È¸¦ À§ÇÑ »ðÈÀÇ ÀÚµ¿ »ý¼º¿¡ °üÇÑ ¿¬±¸
On the Automatic Generation of Illustrations for Events in Storybooks
Çѱ¹Á¤º¸°úÇÐȸ 2007 Ãß°èÇмú´ëȸ (2007³â10¿ù)
¾Èµå·ÎÀ̵忡¼ °³ÀÎÁ¤º¸ À¯ÃâÀ» ¹æÁöÇϱâ À§ÇÑ Á¢±ÙÁ¦¾î ¹× µð·ºÅ丮¸í »ç»ó ±â¹ý
Access Control and Directory Name Mapping Mechanisms to Prevent Personal Information Leakage on Android
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö A - ½Ã½ºÅÛ ¹× ÀÌ·Ð (2012³â12¿ù)
PMSS ½Ã½ºÅÛ¿¡¼ ¼¹ö/Ŭ¶óÀ̾ðÆ® °£ ¼ºñ½º ¸ðµ¨ÀÇ ¼º´ÉºÐ¼®
Performance Analysis of Service Model between server and client on PMSS System
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö A (2004³â06¿ù)
ƯÁ¤ µµ¸ÞÀÎ ¹®¼ ³» °ü°è Æ®¸®Çà ÃßÃâ
The Triple Relationship Extraction from Domain Article
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ 2010³â Ãá°èÇмú´ëȸ (2010³â04¿ù)
[ƯÁý] ¾ÈÀüÇÑ C ÇÁ·Î±×·¥À» À§ÇÑ ÄÚµù Ç¥ÁØ
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2010³â02¿ù)
[±ÇµÎ¾ð] ¡°Áַ»ê¾÷ ITÀ¶ÇÕ±â¼ú¡±Æ¯ÁýÀ» ³»¸é¼
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2013³â01¿ù)
°Ç¼³°ú IT ÄÁ¹öÀü½º - ±×¸°ºôµù, ³ì»ö±â¼ú°ú IT
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ÇÐȸÁö (2009³â07¿ù)
Çѱ¹°úÇбâ¼úÁ¤º¸¿¬±¸¿ø - ½´ÆÛÄÄÇ»Æü¾ÅÍ
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2006³â05¿ù)
ADA ¼ÒÇÁÆ®¿þ¾î Àç»ç¿ë¿¡ ´ëÇÑ ½ÇÁõÀû ¿¬±¸
An Empirical Study of Reuse Processes and Reusable Components with Special Attention to Ada
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ 1995³â Ãß°èÇмú´ëȸ (1995³â10¿ù)
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.