¿¬°£ ´©Àû¼øÀ§´Â ¿¬°£ ¸¹ÀÌ °Ë»öÇϽŠ³í¹®µéÀ» ¼øÀ§´ë·Î Á¤¸®ÇÑ °ÍÀ¸·Î,
Á¦¸ñÀ» Ŭ¸¯ÇϽøé ÇØ´ç³í¹® ÆäÀÌÁö·Î À̵¿ÇÕ´Ï´Ù.
¾ÆÆÄÄ¡ ½ºÆÄÅ© È°¿ë ±Ø´ëȸ¦ À§ÇÑ ¼º´É ÃÖÀûÈ ±â¹ý
Performance Optimization Strategies for Fully Utilizing Apache Spark
Á¤º¸Ã³¸®ÇÐȸ³í¹®Áö ÄÄÇ»ÅÍ ¹× Åë½Å ½Ã½ºÅÛ (2018³â 1¿ù)
»ç¹°ÀÎÅÍ³Ý ÀÀ¿ëÀ» À§ÇÑ ¿¡Áö-Æ÷±× Ŭ¶ó¿ìµå ±â¹Ý °èÃþÀû µ¥ÀÌÅÍ Àü´Þ ¹æ¹ýÀÇ ¼³°è ¹× Æò°¡
Design and Evaluation of an Edge-Fog Cloud-based Hierarchical Data Delivery Scheme for IoT Applications
Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ ³í¹®Áö (2018³â 2¿ù)
Á¤º¸Ã³¸®ÇÐȸÁö (2017³â 3¿ù)
ÀΰøÁö´ÉÀ» È°¿ëÇÑ µå·³ ¿¬½À ½Ã½ºÅÛ
A Study on Drum Training Using Artificial Intelligence System
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ 2017³â Ãß°èÇмú¹ßÇ¥´ëȸ (2017³â 11¿ù)
ÀΰøÁö´ÉÀ» È°¿ëÇÑ ºòµ¥ÀÌÅÍ »ç·ÊºÐ¼®
Case Study on Big Data by use of Artificial Intelligence
Çѱ¹Á¤º¸Åë½ÅÇÐȸ Á¦34ȸ 2013³â Ãß°èÁ¾ÇÕÇмú´ëȸ (2013³â 10¿ù)
´ëÀÀÈ¿À²¼ºÀ» ÅëÇÑ º¯È ŽÁö ¾Ë°í¸®ÁòÀÇ ¼º´É °³¼±
Improving Performance of Change Detection Algorithms through the Efficiency of Matching
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö D (2007³â 4¿ù)
¼ÒÇÁÆ®¿þ¾î ÅëÇÕÅ×½ºÆ®¸¦ À§ÇÑ °áÇÔ¿¹Ãø¸ðµ¨ ¼³°è
A Design of Fault Prediction Model for Software Integration Test
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ 2010³â Ãá°èÇмú´ëȸ (2010³â 4¿ù)
ÀΰøÁö´É ¿¬µ¿¼ºñ½º¿Í »ýüÀÎ½Ä È°¿ëºÐ¼®
Application Analysis of Biometrics inter-locked with Artificial Intelligence
ÀÎÅͳÝÁ¤º¸ÇÐȸÁö (2017³â 6¿ù)
ºòµ¥ÀÌÅÍ ±â¹ÝÀÇ Æ¯Ç㠺м® ½Ã½ºÅÛÀÇ ¼³°è ¹× ±¸Çö
µ¥ÀÌŸº£À̽º¿¬±¸È¸ ÇÐȸÁö (2017³â 4¿ù)
ÇÁ·¹ÀÓ µå·ÎÇÎÀ» ÀÌ¿ëÇÑ MPEG-4 ¹Ìµð¾î Àü¼Û ½ÃÀÇ µðÁöÅÐ ÀúÀÛ±Ç °ü¸®¸¦ À§ÇÑ ¾ÏÈ£È ±â¹ý ¿¬±¸
Encryption Scheme for Digital Right Management in MPEG-4 Media Transmission Exploiting Frame Dropping
Çѱ¹Á¤º¸°úÇÐȸ Çѱ¹ÄÄÇ»ÅÍÁ¾ÇÕÇмú´ëȸ 2008 (2008³â 6¿ù)
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.