¿¬°£ ´©Àû¼øÀ§´Â ¿¬°£ ¸¹ÀÌ °Ë»öÇϽŠ³í¹®µéÀ» ¼øÀ§´ë·Î Á¤¸®ÇÑ °ÍÀ¸·Î,
Á¦¸ñÀ» Ŭ¸¯ÇϽøé ÇØ´ç³í¹® ÆäÀÌÁö·Î À̵¿ÇÕ´Ï´Ù.
´ë¿ë·® Ç÷¡½Ã ¸Þ¸ð¸®¸¦ À§ÇÑ È¿À²ÀûÀÎ Ç÷¡½Ã º¯È¯ °èÃþ ½Ã½ºÅÛ ¼ÒÇÁÆ®¿þ¾î
An Efficient System Software of Flash Translation Layer for Large Block Flash Memory
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö A (2005³â12¿ù)
ÇнÀ¹æ¹ý°³¼±°ú ÈÄó¸® ºÐ¼®À» ÀÌ¿ëÇÑ ÀÚµ¿¹®¼ºÐ·ùÀÇ ¼º´ÉÇâ»ó ¹æ¹ý
Reinforcement Method for Automated Text Classification using Post-processing and Training with Definition Criteria
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö B (2005³â12¿ù)
¸ð¹ÙÀÏ DRM ±â¼ú ºÐ¼® ¹× ½ÃÀå µ¿Çâ
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2005³â08¿ù)
´Ù´Ü°è ±¸Á¶¸¦ °¡Áø ħÀÔ Å½Áö ¹× ¹æ¾î ½Ã½ºÅÛÀÇ ±¸Çö
Implementation of an Intrusion Detection and Prevention System with Multi-level
Çѱ¹Á¤º¸°úÇÐȸ Çѱ¹ÄÄÇ»ÅÍÁ¾ÇÕÇмú´ëȸ 2005 (2005³â07¿ù)
RFID¸¦ ÀÌ¿ëÇÑ µðÁöÅÐ ¹®¼ÀÇ º¸¾È ¾ÆÅ°ÅØó
An Architecture for Securing Digital Documents Using Radio Frequency Identification(RFID)
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C (2005³â12¿ù)
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2005³â08¿ù)
»óȲ ÀÎ½Ä ÀÀ¿ëÀ» À§ÇÑ 2-·¹º§ »óȲ ÀûÀÀ ±â¹ý
Two-Level Context Adaptation Method for Context-Aware Applications
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö A (2005³â12¿ù)
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ÇÐȸÁö (2005³â09¿ù)
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2005³â09¿ù)
µ¿¿µ»ó ½ºÆ®¸² Å©±â ¹× Ç°Áú ¿¹Ãø¿¡ ±â¹ÝÇÑ µ¿Àû µ¿¿µ»ó ÀûÀÀº¯È¯ ¹æ¹ý
A Dynamic Video Adaptation Scheme based on Size and Quality Predictions
Çѱ¹Á¤º¸°úÇÐȸ ³í¹®Áö A - ½Ã½ºÅÛ ¹× ÀÌ·Ð (2005³â02¿ù)
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.