Digital Library
KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 3, Mar. 2015
Resource Prediction Technique based on Expected Value in Cloud Computing
Yeong Ho Cho , Yu Jin Lim
KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 3, pp. 81-84, Mar. 2015
10.3745/KTCCS.2015.4.3.81
KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 3, pp. 81-84, Mar. 2015
10.3745/KTCCS.2015.4.3.81
A New Prediction-Based Parallel Event-Driven Logic Simulation
Sei Yang Yang
KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 3, pp. 85-90, Mar. 2015
10.3745/KTCCS.2015.4.3.85
KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 3, pp. 85-90, Mar. 2015
10.3745/KTCCS.2015.4.3.85
Mobility Process Orchestration for Multi-Device Environment
Svetlana Kim , Man Soo Chung , Yong Ik Yoon
KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 3, pp. 91-96, Mar. 2015
10.3745/KTCCS.2015.4.3.91
KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 3, pp. 91-96, Mar. 2015
10.3745/KTCCS.2015.4.3.91
Design of the MS-SQL Password Vulnerability Checking Function Using OLE Remote Connection
Seung Ju Jang
KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 3, pp. 97-104, Mar. 2015
10.3745/KTCCS.2015.4.3.97
KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 3, pp. 97-104, Mar. 2015
10.3745/KTCCS.2015.4.3.97
Differential Fault Analysis on Symmetric SPN Block Cipher with Bitslice Involution S-box
Hyung Chul Kang , Chang Hoon Lee
KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 3, pp. 105-108, Mar. 2015
10.3745/KTCCS.2015.4.3.105
KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 3, pp. 105-108, Mar. 2015
10.3745/KTCCS.2015.4.3.105