Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Hyuk Jin Ko"'
Publikováno v:
Journal of Engineering Education Research. 18:3-7
Publikováno v:
Journal of the Korea Academia-Industrial cooperation Society. 13:2551-2557
This study analyses the relative importance of R&D business model of the small and medium manufacturing firm. We also compare samples by classifying by its properties, technology and market circumstance. The most important factor of the R&D business
Publikováno v:
Journal of Periodontal & Implant Science
Purpose: The purpose of this study was to evaluate the clinical effectiveness of and patient’s satisfaction with treatment of gingival melanin hyperpigmentation with a Nd:YAG laser and a high speed rotary instrument. Methods: Three patients with me
Publikováno v:
ICUIMC
Nowadays, remarkable development of information technologies makes information sharing and distributing possible in smooth water than ever. It enables to obtain information anytime and anywhere and provides technologies for superior services based on
Publikováno v:
2008 International Conference on Convergence and Hybrid Information Technology.
Pervasive environments consist of the heterogeneous network system. And these mean environment that can be the various Web service to sharing of mutual information. However, this requires not only advance security but also districted access control.
Publikováno v:
2008 International Conference on Convergence and Hybrid Information Technology.
As XML is de facto becoming a standard for information representation and exchange in IT world, XML release methods are receiving intense attentions. The crucial requirement of XML release is scalability that affords to manage efficiently large numbe
Publikováno v:
Advances in Databases: Concepts, Systems and Applications ISBN: 9783540717027
DASFAA
DASFAA
Ubiquitous environment that is omnipresent is existent everywhere or seems to be always present. Such an environment is a next generation paradigm in which many invisible computers are integrated into background of our lives. However, it requires mor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7eaa164f1e7a5da1f3f2af329908fad7
https://doi.org/10.1007/978-3-540-71703-4_108
https://doi.org/10.1007/978-3-540-71703-4_108
Publikováno v:
2006 International Conference on Hybrid Information Technology.
Publikováno v:
2006 International Conference on Hybrid Information Technology.
Publikováno v:
Computational Science and Its Applications-ICCSA 2006 ISBN: 9783540340720
ICCSA (2)
ICCSA (2)
Increasing trends in pervasive computing demonstrate a requirement for context awareness. The security problem has also become a key issue with context awareness. Access control should execute its decisions by capturing security-relevant context, suc
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d373a1d91d190c0011eb15383a1b5e23
https://doi.org/10.1007/11751588_18
https://doi.org/10.1007/11751588_18