¿¬°£ ´©Àû¼øÀ§´Â ¿¬°£ ¸¹ÀÌ °Ë»öÇϽŠ³í¹®µéÀ» ¼øÀ§´ë·Î Á¤¸®ÇÑ °ÍÀ¸·Î,
Á¦¸ñÀ» Ŭ¸¯ÇϽøé ÇØ´ç³í¹® ÆäÀÌÁö·Î À̵¿ÇÕ´Ï´Ù.
½Ã¸Çƽ ÅÙ¼°ø°£¸ðµ¨ ±â¹Ý ÅؽºÆ®µ¥ÀÌÅÍ Áõ½Ä±â¹ý
A Text Data Augmentation Technique based on Semantic Tensor Space Model
µ¥ÀÌŸº£À̽º¿¬±¸È¸ ÇÐȸÁö (2019³â 12¿ù)
[ÁÖÁ¦¿ø°í] ºí·ÏüÀÎÀÇ ½º¸¶Æ®¹ÌÅ͸µºÐ¾ß Àû¿ë ¹æ¾È
Çѱ¹Á¤º¸Åë½ÅÇÐȸÁö (2019³â 6¿ù)
½º¸¶Æ® ±â±â¸¦ ÀÌ¿ëÇÑ ¿À¸®¿£Æ¼¾î¸µ ¾ÛÀÇ °³¹ß
The Development of Orienteering App using Smart Devices
Çѱ¹Á¤º¸Åë½ÅÇÐȸ 2017³â Ãß°èÁ¾ÇÕÇмú´ëȸ (2017³â10¿ù)
µö·¯´×À» ÀÌ¿ëÇÑ ´Ùº¯·® ½Ã°è¿ µ¥ÀÌÅÍÀÇ °áÃøÄ¡ 󸮿¡ °üÇÑ ¿¬±¸ Á¶»ç
A Survey on Handling Missing Values in Multivariate Time Series Data Using Deep Learning
µ¥ÀÌŸº£À̽º¿¬±¸È¸ ÇÐȸÁö (2019³â 12¿ù)
CKANÀ» À§ÇÑ DCAT-AP ±â¹ÝÀÇ ÇÁ·¹ÀÓ¿öÅ©ÀÇ ¼³°è ¹× ±¸Çö
Design and Implementation of Framework based on DCAT-AP for CKAN
µ¥ÀÌŸº£À̽º¿¬±¸È¸ ÇÐȸÁö (2017³â 12¿ù)
´ëÇѹα¹¿¡¼ÀÇ ¹üÁË À¯Çü°ú »çȸÀû ¿äÀΰ£ÀÇ »ó°ü°ü°è ºÐ¼®
Relationship Analysis between Crime Types and Social Attributes in South Korea
µ¥ÀÌŸº£À̽º¿¬±¸È¸ ÇÐȸÁö (2013³â 8¿ù)
°¨¼ººÐ¼®À» À§ÇÑ ¹®¸Æ ±â¹Ý ÀÓº£µùÀ» ÀÌ¿ëÇÑ ¿Â¶óÀÎ µö·¯´× ±â¹ý
An Online Deep Learning Technique Using Contextual Embedding for Sentiment Analysis
µ¥ÀÌŸº£À̽º¿¬±¸È¸ ÇÐȸÁö (2019³â 4¿ù)
Æ®ÀÀ» ÀÌ¿ëÇÑ ±×·¡ÇÁ¿Í ½Ã°è¿ ±â¹Ý »çÀ̹ö °ø°Ý ¿¹Ãø
Predicting of Cyber Attacks based on Graphs and Time-Series Using Tweets
µ¥ÀÌŸº£À̽º¿¬±¸È¸ ÇÐȸÁö (2019³â 12¿ù)
Æ®À µ¥ÀÌÅÍ ÀúÀå ¹× Ã³¸®¸¦ À§ÇÑ Å°-°ª ÀúÀå¼ÒÀÇ ¼º´É Æò°¡
A Performance Evaluation of Key-Value Stores for Storing and Processing Tweet Data
µ¥ÀÌŸº£À̽º¿¬±¸È¸ ÇÐȸÁö (2019³â 4¿ù)
CPU »ç¿ë·®À» °í·ÁÇÑ °í¼º´É ÀúÀåÀåÄ¡ ±â¹Ý °¡»óÈ ½Ã½ºÅÛÀÇ I/O ¿Ï·á ó¸® ±â¹ý
I/O Completion Technique of Virtualized System Considering CPU Usage with High-Performance Storage Devices
Á¤º¸°úÇÐȸ³í¹®Áö (2019³â 7¿ù)
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.