Digital Library
Search: "[ keyword: IT ]" (496)
-
Jung-Hee Seo, Hung-Bog Park
Vol. 2, No. 2, pp. 82-87, Jun. 2006
Keywords: digital watermark, Scalable, wavelet, Public Multimedia Network -
Ji-Hye Bae, Hee-Kuk Kang, Yoon-Young Park, Jung-Ho Park
Vol. 2, No. 1, pp. 58-66, Mar. 2006
Keywords: Ubiquitous Computing, Monitoring System, Sensor Network -
Wook-Sun Shin, Doo-Heon Song, Chang-Hun Lee
Vol. 2, No. 1, pp. 52-57, Mar. 2006
Keywords: Vehicle Type classification, Road Lane Detection, Model fitting, Vanishing point, Machine Learning -
Yixin Jing, Jinhyung Kim, Dongwon Jeong
Vol. 2, No. 1, pp. 28-33, Mar. 2006
Keywords: access control, Ubiquitous Computing, Task computing, Context-Awareness -
Ji-Seung Nam, Hui Gao, Mi-Young Kang, Kyoung-Tae Kim, Seung-Chul Son, Chung-Ung Pom, Kwon Heo
Vol. 2, No. 1, pp. 18-22, Mar. 2006
Keywords: 3D Editing, 3D Synthesizing, 3D Object Reuse -
Dae-Hee Seo, Im-Yeong Lee
Vol. 1, No. 1, pp. 96-101, Dec. 2005
Keywords: RFID, Service Availability, Secure Communication, Network Management Ubiquitous Computing -
Kiyoung Moon, Namje Park, Kyoil Chung, Sungwon Sohn, Jaecheol Ryou
Vol. 1, No. 1, pp. 86-95, Dec. 2005
Keywords: Location-based service, Open LBS security, XKMS, XML Security, XML web services -
Jung-Ho Eom, Seon-Ho Park, Tae-Kyung Kim, Tai-Myoung Chung
Vol. 1, No. 1, pp. 79-85, Dec. 2005
Keywords: risk management, Risk Analysis, Asset analysis, 2-dimensional qualitative analysis -
Injung Kim, Younggyo Lee, Dongho Won
Vol. 1, No. 1, pp. 75-78, Dec. 2005
Keywords: Risk Analysis, Vulnerability, Asset, Threat -
Giljae Lee, Jonguk Kong, Minsun Lee, Okhwan Byeon
Vol. 1, No. 1, pp. 49-54, Dec. 2005
Keywords: Wireless Sensor Networks, Ubiquitous Sensor Networks, cluster-based routing protocol, energy-efficient routing