Digital Library


Search: "[ keyword: Engineering ]" (34)
    Analysis of the Bandwidth Consumed by Restoration Paths for Service Guarantee in the Protection Switching Scheme
    Hwang Kyu Lee , Sug Won Hong The KIPS Transactions:PartC, Vol. 10, No. 2, pp. 155-162, Apr. 2003
    10.3745/KIPSTC.2003.10.2.155

    Warning Classification Method Based On Artificial Neural Network Using Topics of Source Code
    Jung-Been Lee KIPS Transactions on Computer and Communication Systems, Vol. 9, No. 11, pp. 273-280, Nov. 2020
    https://doi.org/10.3745/KTCCS.2020.9.11.273
    Keywords: software engineering, Static Analysis, Warning Classification, Artificial neural network, topic modeling

    Transformation from Legacy Application Class to JavaBeans for Component Based Development
    Byung Jun Kim, Ji Young Kim, Haeng Kon Kim The KIPS Transactions:PartD, Vol. 9, No. 4, pp. 619-628, Aug. 2002
    10.3745/KIPSTD.2002.9.4.619

    The Value - Added Brokerage Concept for Steering the CBSD Environments
    Woo Gon Shim, In Sup Paik, Jung Tae Lee, Ki Yeol Ryu The KIPS Transactions:PartD, Vol. 8, No. 6, pp. 681-690, Dec. 2001
    10.3745/KIPSTD.2001.8.6.681

    Blockchain Based Financial Portfolio Management Using A3C
    Ju-Bong Kim, Joo-Seong Heo, Hyun-Kyo Lim, Do-Hyung Kwon, Youn-Hee Han KIPS Transactions on Computer and Communication Systems, Vol. 8, No. 1, pp. 17-28, Jan. 2019
    https://doi.org/10.3745/KTCCS.2019.8.1.17  
    Keywords: Reinforcement Learning, Financial Portfolio Management, A3C, Cryptocurrency, Investment Engineering

    Development of Professor's Guidance for Female Students of Engineering College
    Ji-Sim Kim, MiSoon Park, Kyong Ah Kim, Nammee Moon, Jung-Won Lee, Yoo-Joo Choi KIPS Transactions on Computer and Communication Systems, Vol. 7, No. 10, pp. 243-250, Oct. 2018
    10.3745/KTCCS.2018.7.10.243
    Keywords: Female Students in Engineering College, Education on Computer Engineering, Guideline for Career Guidance

    Improved Original Entry Point Detection Method Based on PinDemonium
    Kim Gyeong Min, Park Yong Su KIPS Transactions on Computer and Communication Systems, Vol. 7, No. 6, pp. 155-164, Jun. 2018
    10.3745/KTCCS.2018.7.6.155
    Keywords: computer security, Malicious Code Analysis, Unpacking, Reverse engineering, Dynamic Analysis, code obfuscation

    Managing and Modeling Variability of UML Based FORM Architectures Through Feature-Architecture Mapping
    Kwan Woo Lee The KIPS Transactions:PartD, Vol. 19, No. 1, pp. 81-94, Feb. 2012
    10.3745/KIPSTD.2012.19.1.81

    Development of Analysis and Visualization Tool for Java Source Code Changes using Reverse Engineering Technique
    Jin Wook Kwon , Yun Ja Choi , Woo Jin Lee The KIPS Transactions:PartD, Vol. 19, No. 1, pp. 39-48, Feb. 2012
    10.3745/KIPSTD.2012.19.1.39

    A Requirement Priority Process of Embedded Systems based on the Dependency and Aspect
    Wi Yong Hwang , Dong Su Kang , Chee Yang Song , Jae Seok Seong , Doo Kwon Baik The KIPS Transactions:PartD, Vol. 16, No. 5, pp. 767-790, Oct. 2009
    10.3745/KIPSTD.2009.16.5.767