Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Gi Hyun Jung"'
Publikováno v:
The KIPS Transactions:PartD. :41-52
A relation between generated test cases and an original requirement is important, but it becomes very complex because a relation between requirement models and requirements are m-to-n in automatic test case generation based on models. In this paper,
Publikováno v:
The KIPS Transactions:PartD. :649-656
Today, controller area network(CAN) is a field bus that is nowadays widespread in distributed embedded systems due to its electrical robustness, low price, and deterministic access delay. However, its use safety-critical applications has been controv
Publikováno v:
The KIPS Transactions:PartC. :765-772
In this paper, we propose E-mail sending-server authorization method using a distance estimation algorithm between W addresses to check whether the E-mail sending server is registered in the domain of mail sending server or belongs to the domain for
Publikováno v:
The KIPS Transactions:PartC. :725-732
Publikováno v:
The KIPS Transactions:PartC. :11-18
Publikováno v:
The KIPS Transactions:PartC. :711-718
Publikováno v:
The KIPS Transactions:PartB. :723-734
In this paper, we present an automated Web page classification system based upon ontology. As a first step, to identify the representative terms given a set of classes, we compute the product of term frequency and document frequency. Secondly, the in
Publikováno v:
The KIPS Transactions:PartC. :337-344
In this paper, we propose a thread scheduling algorithm for faster packet processing on the network processors with multithreaded multiprocessor architecture. To implement the proposed algorithm. we derived several basic parameters related to the thr
Publikováno v:
The KIPS Transactions:PartC. :253-264
This paper presents the analytic model of Distributed Denial-of-Service (DDoS) attacks in two settings: the normal Web server without any attack and the Web server with DDoS attacks. In these settings, we measure TCP flag rate, which is expressed in
Publikováno v:
The KIPS Transactions:PartC. :473-480
Although many researches on IDS (Intrusion Detection System) have been performed, the most of them are limited to the algorithm of detection software. However, even an IDS with superior algorithm can not detect intrusion, if it loses packets which na