¿¬°£ ´©Àû¼øÀ§´Â ¿¬°£ ¸¹ÀÌ °Ë»öÇϽŠ³í¹®µéÀ» ¼øÀ§´ë·Î Á¤¸®ÇÑ °ÍÀ¸·Î,
Á¦¸ñÀ» Ŭ¸¯ÇϽøé ÇØ´ç³í¹® ÆäÀÌÁö·Î À̵¿ÇÕ´Ï´Ù.
¸ð¹ÙÀÏ ¼ÒÇÁÆ®¿þ¾î Ç°Áú Ư¼º Æò°¡ ¸ðµ¨
The Evaluation Model for Quality Characteristics of Mobile Software
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ 2008³â Ãß°èÇмú¹ßÇ¥´ëȸ (2008³â 11¿ù)
[ƯÁý¿ø°í I] Ŭ¶ó¿ìµå ÄÄÇ»Æà ±â¹ÝÀÇ ½º¸¶Æ® ¸ð¹ÙÀÏ ¿ÀÇǽº È°¼ºÈ Á¤Ã¥ ¹æ¾È
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2010³â 12¿ù)
Ŭ¶ó¿ìµå ÄÄÇ»Æà Ç÷§Æû°ú ¿ÀÇ Ç÷§Æû ±â¼ú
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ÇÐȸÁö (2009³â 3¿ù)
ÀÓº£µðµå ¿î¿µÃ¼Á¦¿¡¼ÀÇ Á¢±ÙÁ¦¾î±â¹ý
Access Control Techniques for Embedded Operating System
Çѱ¹Á¤º¸°úÇÐȸ Çѱ¹ÄÄÇ»ÅÍÁ¾ÇÕÇмú´ëȸ 2008 (2008³â 6¿ù)
Çѱ¹Á¤º¸°úÇÐȸ ÇÐȸÁö (2005³â 11¿ù)
½º¸¶Æ® Ä«µå¿Í Áö¹®À» ÀÌ¿ëÇÑ ÀÎÁõ ½Ã½ºÅÛ ¼³°è
The Design of an Authentication System using Smart Card and Fingerprint
Çѱ¹Á¤º¸°úÇÐȸ 2003³â Ãá°èÇмú´ëȸ (2003³â 4¿ù)
¿ä±¸ ÆäÀÌ¡ ±â¹Ý °¡»ó¸Þ¸ð¸® ÆäÀÌÁö ±³Ã¼ ¾Ë°í¸®ÁòÀÇ ±¸Çö ¹× ¼º´É ºÐ¼®
Implementation and Performance Analysis of Virtual Memory Page Replacement Algorithms
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ 2005³â Ãá°èÇмú´ëȸ (2005³â 5¿ù)
Ç¥ÁØ À̰ݵµ¸¦ ÀÌ¿ëÇÑ ¿É¼Ç ¸Å¸Å ºÐ¼®
The Analysis of Option Trade using Difference from Standard Option Price
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ 2010³â Ãß°èÇмú´ëȸ (2010³â 11¿ù)
¾ÈÀüÇÑ SCADA Åë½ÅÀ» À§ÇÑ Æ®¸® ±â¹ÝÀÇ È¿À²ÀûÀÎ Å° °ü¸® ±¸Á¶
Advanced Key Management Architecture Based on Tree Structure for Secure SCADA Communications
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö C (2009³â 2¿ù)
Ŭ¶ó¿ìµå ÄÄÇ»Æà º¸¾È±â¼ú µ¿Ç⠺м®
A Security Technology Trend Analyses in Cloud Computing
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ 2009³â Ãß°èÇмú´ëȸ (2009³â 11¿ù)
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.