Digital Library

KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 2, Feb. 2015


The Research of the 2-Edge Labeling Methods on Binomial Trees
Yong Seok Kim
KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 2, pp. 37-40, Feb. 2015
10.3745/KTCCS.2015.4.2.37

A Cache-based Reconfigurable Accelerator in Die-stacked DRAM
Yong Joo Kim
KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 2, pp. 41-46, Feb. 2015
10.3745/KTCCS.2015.4.2.41

Prediction of Power Consumption for Improving QoS in an Energy Saving Server Cluster Environment
Sung Choul Cho , San Ha Kang , Hung Sik Moon , Hu Keun Kwak , Kyu Sik Chung
KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 2, pp. 47-56, Feb. 2015
10.3745/KTCCS.2015.4.2.47

An Enhanced Step Detection Algorithm with Threshold Function under Low Sampling Rate
Bo Yeon Kim , Yun Seok Chang
KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 2, pp. 57-64, Feb. 2015
10.3745/KTCCS.2015.4.2.57

Log Analysis Method of Separate Security Solution using Single Data Leakage Scenario
Jang Su Park , Im Yeong Lee
KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 2, pp. 65-72, Feb. 2015
10.3745/KTCCS.2015.4.2.65

Analysis of Padding Oracle Attack Possibility about Application Environment; SRTP, MIKEY, CMS, IPSec, TLS, IPTV
Seong Jin Hwang , Myung Seo Park , Duk Jae Moon , Hyung Chul Kang , Jong Sung Kim , Chang Hoon Lee
KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 2, pp. 73-80, Feb. 2015
10.3745/KTCCS.2015.4.2.73