¿¬°£ ´©Àû¼øÀ§´Â ¿¬°£ ¸¹ÀÌ °Ë»öÇϽŠ³í¹®µéÀ» ¼øÀ§´ë·Î Á¤¸®ÇÑ °ÍÀ¸·Î,
Á¦¸ñÀ» Ŭ¸¯ÇϽøé ÇØ´ç³í¹® ÆäÀÌÁö·Î À̵¿ÇÕ´Ï´Ù.
DTG µ¥ÀÌÅ͸¦ ÀÌ¿ëÇÑ À§Çè ¿îÀü ÇൿÀÇ ½Ã°ø°£ Ư¼º ºÐ¼®
Spatial and Temporal Analysis of Dangerous Driving Behavior Using DTG Data
µ¥ÀÌŸº£À̽º¿¬±¸È¸ ÇÐȸÁö (2019³â 12¿ù)
¸¶À̵¥ÀÌÅÍ ¹é¼ - ¸¶À̵¥ÀÌÅÍ ÇöȲ ¹× ¹ßÀü¹æÇâ -
¿¬±¸Á¤º¸¼¾ÅÍ ¹é¼ (2020³â 1¿ù)
Cloud Computing ºÐ¾ß ¿¬±¸µ¿Ç⠺м® º¸°í¼
¿¬±¸Á¤º¸¼¾ÅÍ ¹é¼ (2014³â 2¿ù)
½Ã¸Çƽ ÅÙ¼°ø°£¸ðµ¨ ±â¹Ý ÅؽºÆ®µ¥ÀÌÅÍ Áõ½Ä±â¹ý
A Text Data Augmentation Technique based on Semantic Tensor Space Model
µ¥ÀÌŸº£À̽º¿¬±¸È¸ ÇÐȸÁö (2019³â 12¿ù)
°¡¼Ó ȸ·Î¿¡ ÀûÇÕÇÑ CNNÀÇ Conv-XP °¡ÁöÄ¡±â
Conv-XP Pruning of CNN Suitable for Accelerator
Çѱ¹Á¤º¸Åë½ÅÇÐȸ³í¹®Áö (2019³â 1¿ù)
ISO/IEC 25023À» È°¿ëÇÑ ¼ÒÇÁÆ®¿þ¾î Á¤·®Àû Æò°¡ÁöÇ¥ ºÐ¼®
Analysis of software quantitative evaluation index using ISO/IEC 25023
Çѱ¹Á¤º¸Åë½ÅÇÐȸ³í¹®Áö (2019³â 1¿ù)
Æ®ÀÀ» ÀÌ¿ëÇÑ ±×·¡ÇÁ¿Í ½Ã°è¿ ±â¹Ý »çÀ̹ö °ø°Ý ¿¹Ãø
Predicting of Cyber Attacks based on Graphs and Time-Series Using Tweets
µ¥ÀÌŸº£À̽º¿¬±¸È¸ ÇÐȸÁö (2019³â 12¿ù)
¿Â¶óÀÎ ´º½º¿Í ±â¼úÀû ÁöÇ¥¸¦ ÀÌ¿ëÇÑ Å׸¶ÁÖ µî¶ô ¿¹Ãø
Price Fluctuation Prediction for Theme Stocks Using Online News and Technical Indicators
µ¥ÀÌŸº£À̽º¿¬±¸È¸ ÇÐȸÁö (2019³â 12¿ù)
´ëÇѹα¹¿¡¼ÀÇ ¹üÁË À¯Çü°ú »çȸÀû ¿äÀΰ£ÀÇ »ó°ü°ü°è ºÐ¼®
Relationship Analysis between Crime Types and Social Attributes in South Korea
µ¥ÀÌŸº£À̽º¿¬±¸È¸ ÇÐȸÁö (2013³â 8¿ù)
»ç¹°ÀÎÅͳÝ(IoT)±â¹ÝÀÇ Ä«Æä Á¼® È®ÀÎ ½Ã½ºÅÛ ±¸Çö
Internet of Things based cafe seat confirmation system of implementation
Çѱ¹Á¤º¸Åë½ÅÇÐȸ 2016³â Ãß°èÁ¾ÇÕÇмú´ëȸ (2016³â 10¿ù)
Copyright(c) Computer Science Engineering Research Information Center. All rights reserved.