Digital Library
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 5, May. 2013
Performance Analysis of A Novel Inter-Networking Architecture for Cost-Effective Mobility Management Support
Jong Pil Jeong , Myoung Seok Song
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 5, pp. 181-190, May. 2013
10.3745/KTCCS.2013.2.5.181
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 5, pp. 181-190, May. 2013
10.3745/KTCCS.2013.2.5.181
A Multi-objective Ant Colony Optimization Algorithm for Real Time Intrusion Detection Routing in Sensor Network
Seung Ho Kang
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 5, pp. 191-198, May. 2013
10.3745/KTCCS.2013.2.5.191
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 5, pp. 191-198, May. 2013
10.3745/KTCCS.2013.2.5.191
A Dynamic Clustering Mechanism Considering Energy Efficiency in the Wireless Sensor Network
Sang Hyun Ahn , Hwan Kim
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 5, pp. 199-202, May. 2013
10.3745/KTCCS.2013.2.5.199
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 5, pp. 199-202, May. 2013
10.3745/KTCCS.2013.2.5.199
Computation Offloading Framework based on AOP
Doo San Cho , Yeong Pil Cho , Yun Heung Paek
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 5, pp. 203-208, May. 2013
10.3745/KTCCS.2013.2.5.203
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 5, pp. 203-208, May. 2013
10.3745/KTCCS.2013.2.5.203
Ubiquitous and Mobile Computing : Local Information-based Betweenness Centrality to Identify Important Nodes in Social Networks
Youn Hee Han , Jin Gon Shon , Yong Hwan Kim
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 5, pp. 209-216, May. 2013
10.3745/KTCCS.2013.2.5.209
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 5, pp. 209-216, May. 2013
10.3745/KTCCS.2013.2.5.209
Indirect Branch Target Address Verification for Defense against Return-Oriented Programming Attacks
Soohyun Park , Sunil Kim
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 5, pp. 217-222, May. 2013
10.3745/KTCCS.2013.2.5.217
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 5, pp. 217-222, May. 2013
10.3745/KTCCS.2013.2.5.217
A Study on Countermeasures against Messenger Phishing using ARIT Technique
Sung Kyu Cho , Jun Moon Seog
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 5, pp. 223-230, May. 2013
10.3745/KTCCS.2013.2.5.223
KIPS Transactions on Computer and Communication Systems, Vol. 2, No. 5, pp. 223-230, May. 2013
10.3745/KTCCS.2013.2.5.223