Digital Library

KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 8, Aug. 2013


An Effective Method for Comparing Control Flow Graphs through Edge Extension
Hyun Il Lim
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 8, pp. 317-326, Aug. 2013
10.3745/KTCCS.2013.2.8.317

Web Application Awareness using HTTP Host
Ji Hyeok Choi , Myung Sup Kim
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 8, pp. 327-334, Aug. 2013
10.3745/KTCCS.2013.2.8.327

Performance Improvement of the Statistical Information based Traffic Identification System
Hyun Min An , Jae Hyun Ham , Myung Sup Kim
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 8, pp. 335-342, Aug. 2013
10.3745/KTCCS.2013.2.8.335

Power-Aware Real-Time Scheduling based on Multi-Granularity Resource Reservation
Joo Hyung Sun , Hyeon Joong Cho
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 8, pp. 343-348, Aug. 2013
10.3745/KTCCS.2013.2.8.343

Analysis Scheme on Backup Files of Samsung Smartphone available
Gyu Won Lee , Hyun Uk Hwang , Ki Bom Kim , Tae Joo Chang
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 8, pp. 349-356, Aug. 2013
10.3745/KTCCS.2013.2.8.349

Strategies Building Knowledge_Base to Respond Effectively to Advanced Cyber Threats
Tae Young Lee , Dong Gue Park
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 8, pp. 357-368, Aug. 2013
10.3745/KTCCS.2013.2.8.357