Digital Library
Search: "[ keyword: Function ]" (92)
A Study on the Recurrence for the Transition Functions of Finite Cellular Automata
Hyen YeaI Lee , Geon Seon Lee The KIPS Transactions:PartA,
Vol. 14, No. 4, pp. 245-248,
Aug.
2007
10.3745/KIPSTA.2007.14.4.245
10.3745/KIPSTA.2007.14.4.245
Development of Standardized Software Platform for Telematics Terminal
Jae Hun Choi , Kyong Ho Kim , Wan Sik Choi The KIPS Transactions:PartA,
Vol. 13, No. 7, pp. 581-588,
Dec.
2006
10.3745/KIPSTA.2006.13.7.581
10.3745/KIPSTA.2006.13.7.581
Real-time Functional Reactive Program Translator for Embedded Systems
Dong Ju Lee , Gyun Woo The KIPS Transactions:PartA,
Vol. 13, No. 6, pp. 481-488,
Dec.
2006
10.3745/KIPSTA.2006.13.6.481
10.3745/KIPSTA.2006.13.6.481
A Study on the Native Function Connection Technique for the Virtual Machines
Kwang Man Ko The KIPS Transactions:PartA,
Vol. 12, No. 5, pp. 333-340,
Oct.
2005
10.3745/KIPSTA.2005.12.5.333
10.3745/KIPSTA.2005.12.5.333
Formal Semantics for Lambda Expression of Java
Han Jung Lan KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 5, pp. 157-164,
May.
2023
https://doi.org/10.3745/KTCCS.2023.12.5.157
Keywords: Formal Semantics, Action Equation 3.0, Functional Interface, Specification of Semantics, Lambda Expression
https://doi.org/10.3745/KTCCS.2023.12.5.157
Keywords: Formal Semantics, Action Equation 3.0, Functional Interface, Specification of Semantics, Lambda Expression
On Flexibility Analysis of Real-Time Control System Using Processor Utilization Function
Jung Wha Chae , Cheol Jung Yoo The KIPS Transactions:PartA,
Vol. 12, No. 1, pp. 53-58,
Feb.
2005
10.3745/KIPSTA.2005.12.1.53
10.3745/KIPSTA.2005.12.1.53
Derivation of Security Requirements for Cloud Managing SecurityServices System by Threat Modeling Analysis
Jang Hwan KIPS Transactions on Computer and Communication Systems,
Vol. 10, No. 5, pp. 145-154,
May.
2021
https://doi.org/10.3745/KTCCS.2021.10.5.145
Keywords: Cloud Managing Security Services System, Threat Modeling Analysis, Security Function Requirements
https://doi.org/10.3745/KTCCS.2021.10.5.145
Keywords: Cloud Managing Security Services System, Threat Modeling Analysis, Security Function Requirements
Size-Variable Block Matching for Extracting Motion Information
Seok Woo Jang , Bong Keun Kim , Gye Young Kim , Hyung Il Choi The KIPS Transactions:PartB ,
Vol. 10, No. 3, pp. 321-328,
Jun.
2003
10.3745/KIPSTB.2003.10.3.321
10.3745/KIPSTB.2003.10.3.321
The Study on Improvement of Cohesion of Clustering in Incremental Concept Learning
Hey Jung Baek , Young Tack Park The KIPS Transactions:PartB ,
Vol. 10, No. 3, pp. 297-304,
Jun.
2003
10.3745/KIPSTB.2003.10.3.297
10.3745/KIPSTB.2003.10.3.297
Research about feature selection that use heuristic function
Seok Mi Hong , Kyung Sook Jung , Tae Choong Chung The KIPS Transactions:PartB ,
Vol. 10, No. 3, pp. 281-286,
Jun.
2003
10.3745/KIPSTB.2003.10.3.281
10.3745/KIPSTB.2003.10.3.281