Digital Library
Search: "[ keyword: IT ]" (496)
-
Gyeong-Sic Jo, Yong-Guk Kim
Vol. 6, No. 2, pp. 261-268, Jun. 2010
10.3745/JIPS.2010.6.2.261
Keywords: Active Appearance Model, Facial Expression Recognition, Image Alignment Method -
Ui Jin Jang, Hyung-Min Lim, Yong-Tae Shin
Vol. 6, No. 2, pp. 253-260, Jun. 2010
10.3745/JIPS.2010.6.2.253
Keywords: digital forensic, DRM, IP-Based Network -
Ruchika Malhotra, Arvinder Kaur, Yogesh Singh
Vol. 6, No. 2, pp. 235-252, Jun. 2010
10.3745/JIPS.2010.6.2.235
Keywords: Regression Testing, Maintenance, Prioritization -
Pin Ng, Richard Y. K. Fung, Ray W. M. Kong
Vol. 6, No. 2, pp. 197-208, Jun. 2010
10.3745/JIPS.2010.6.2.197
Keywords: Test Suite Reduction, Model-Based Testing, State Machine Model, Formal Concept Analysis -
Kezhong Liu, Ji Xiong
Vol. 6, No. 2, pp. 147-162, Jun. 2010
10.3745/JIPS.2010.6.2.147
Keywords: localization algorithm, Mobile Beacon Node, Sensor Network, RS? -
Abdisalam Issa-Salwe, Munir Ahmed, Khalid Aloufi, Muhammad Kabir
Vol. 6, No. 1, pp. 121-128, Mar. 2010
10.3745/JIPS.2010.6.1.121
Keywords: information systems, Information Systems, Business Planning, Planning Strategy, IT/IS Alignment. -
Cheol-Soon Park, Jae-Cheol Ryou, Yong-Tae Park
Vol. 6, No. 1, pp. 107-120, Mar. 2010
10.3745/JIPS.2010.6.1.107
Keywords: IP Address Trading, Resource PKI, Routing Security, IP Address Management -
Abdulaziz Alkussayer, William H Allen
Vol. 6, No. 1, pp. 91-106, Mar. 2010
10.3745/JIPS.2010.6.1.091
Keywords: Security Patterns, Secure Development, Security Framework -
Younghee Kim, Wonyoung Kim, Ungmo Kim
Vol. 6, No. 1, pp. 79-90, Mar. 2010
10.3745/JIPS.2010.6.1.079
Keywords: Frequent Itemsets, Weighted Support, Window Sliding, Weighted Support FP-Tree, Data Stream, WSFI-Mine -
Feng Yu, Damalie Oyana, Wen-Chi Hou, Michael Wainer
Vol. 6, No. 1, pp. 67-78, Mar. 2010
10.3745/JIPS.2010.6.1.067
Keywords: Grid Density-Based Clustering, Approximate Cluster Analysis, Discrete Cosine Transform, Sampling, Data Reconstruction, Data Compression