¿¬°£ ´©Àû¼øÀ§´Â ¿¬°£ ¸¹ÀÌ °Ë»öÇϽŠ³í¹®µéÀ» ¼øÀ§´ë·Î Á¤¸®ÇÑ °ÍÀ¸·Î,
Á¦¸ñÀ» Ŭ¸¯ÇϽøé ÇØ´ç³í¹® ÆäÀÌÁö·Î À̵¿ÇÕ´Ï´Ù.
[ƯÁý¿ø°í] µö ·¯´× ±â¼ú¿¡¼ÀÇ Àû´ëÀû ÇнÀ ±â¼ú µ¿Çâ
Á¤º¸°úÇÐȸÁö (2018³â 2¿ù)
IoT ȯ°æ¿¡¼ µ¥ÀÌÅÍ ºÐ»ê 󸮸¦ À§ÇÑ CEP Rule ¹èÆ÷ ¾Ë°í¸®Áò
CEP Rule Distribution Algorithm for In-network Processing in an IoT Network Environment
Á¤º¸°úÇÐȸ³í¹®Áö (2018³â 7¿ù)
¿ø°ÝÁ¦¾î°¡ °¡´ÉÇÑ LED ÀÜ»ó µð½ºÇ÷¹ÀÌ
Afterimage LED display remote control available
Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ 2016³â Ãß°èÇмú¹ßÇ¥´ëȸ (2016³â 11¿ù)
±¹Á¦ ¹°Ç°¸Å¸Å°è¾à¿¡¼ INCOTERMS 2010ÀÇ »ç¿ë ÇöȲ°ú ½Ç¹«Àû Àû¿ëÀÇ ¹®Á¦Á¡
The problems for the usage and practical application of INCOTERMS 2010 in international trade contracts
Çѱ¹Á¤º¸Åë½ÅÇÐȸ³í¹®Áö (2015³â 12¿ù)
´ÙÁß Å°³ØÆ® ¼¾¼ ±â¹ÝÀÇ ¿îµ¿ ÀÚ¼¼ ÃßÁ¤ ½Ã½ºÅÛ ¼³°è ¹× ±¸Çö
Design and Development of the Multiple Kinect Sensor-based Exercise Pose Estimation System
Çѱ¹Á¤º¸Åë½ÅÇÐȸ³í¹®Áö (2017³â 3¿ù)
Á¶¸í¿¡ °ÀÎÇÑ ¸Ó¸®Ä«¶ôÀ» Æ÷ÇÔÇÑ ¾ó±¼ ¿µ¿ª ÃßÃâ ¹æ¹ý
Illumination Robust Extraction of Facial Region including Hair Method
Çѱ¹Á¤º¸°úÇÐȸ 2007 Ãß°èÇмú´ëȸ (2007³â 10¿ù)
CKANÀ» À§ÇÑ DCAT-AP ±â¹ÝÀÇ ÇÁ·¹ÀÓ¿öÅ©ÀÇ ¼³°è ¹× ±¸Çö
Design and Implementation of Framework based on DCAT-AP for CKAN
µ¥ÀÌŸº£À̽º¿¬±¸È¸ ÇÐȸÁö (2017³â 12¿ù)
³×Æ®¿öÅ© ÆÐŶ µ¥ÀÌÅͺ£À̽º ºÐ¼®À» ÅëÇÑ Ãë¾à¼º ÅäÆú·ÎÁö ¸Ê »ý¼º ¹æ¾È
Vulnerability Topology Map Generation through Network Packet Database Analysis
µ¥ÀÌŸº£À̽º¿¬±¸È¸ ÇÐȸÁö (2017³â 12¿ù)
µö ·¯´× ±â¹Ý ºÐ·ù ¸ðµ¨À» ÀÌ¿ëÇÑ ¾Ç¼ºÄÚµå Á¦ÀÛÀÚ ±×·ì ºÐ·ù
Malware Author Group Classification using Deep Learning Classifier
µ¥ÀÌŸº£À̽º¿¬±¸È¸ ÇÐȸÁö (2018³â 8¿ù)
½Ç³» ÃßÀû µ¥ÀÌÅÍ¿¡¼ÀÇ °í°´ Àç¹æ¹® ÆÐÅÏ Å½»ö ¿¬±¸
Study on Detecting Guest Revisit Patterns in Indoor Tracking Data
µ¥ÀÌŸº£À̽º¿¬±¸È¸ ÇÐȸÁö (2018³â 8¿ù)
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.