Zobrazeno 1 - 10
of 25
pro vyhledávání: '"Taek Yong Nam"'
Publikováno v:
KIISE Transactions on Computing Practices. 28:450-457
Publikováno v:
2022 IEEE International Conference on Big Data (Big Data).
Publikováno v:
2022 13th International Conference on Information and Communication Technology Convergence (ICTC).
Publikováno v:
The KIPS Transactions:PartC. :859-864
The openness of the Web allows any user to access almost any type of information easily at any time and anywhere. However, with function of easy access for useful information, internet has dysfunctions of providing users with harmful contents indiscr
Publikováno v:
Journal of Information Processing Systems. 1:22-26
In this paper, we classified the objectionable texts into four rates according to their harm- fulness and proposed the hierarchical text rating system for objectionable documents. Since the documents in the same category have similarities in used wor
Publikováno v:
The KIPS Transactions:PartC. :781-792
This study proposes an Architecture for user level End-to-end Quality of Service(QoS) using overlay In Next Generation Network(NGN). Inexisting NGNs, the IMS of a control plane provides user QoS through direct traffic control and resource-reservation
Publikováno v:
The KIPS Transactions:PartC. :875-882
The active packets unlike traditional IP packets should be executed at each active node along their path. To execute the active program at each active node, the active packets for an active program should go through the same active nodes and all pack
Publikováno v:
ICOIN
Encryption is a well established technology for protecting sensitive data. Unfortunately, the integration of existing encryption techniques with database systems causes undesirable performance degradation. We propose the bucket ID transformation that
Publikováno v:
2007 International Conference on Convergence Information Technology (ICCIT 2007).
Many researchers have developed frameworks capable of handling context information and able to be adapted and used by any Web service. However, no research has been conducted on the systematic analysis of existing frameworks. This paper analyses the
Publikováno v:
2007 International Conference on Convergence Information Technology (ICCIT 2007).
When the traditional encryption algorithms are applied to the database, efficiency degradation occurs because the orders of ciphertext and plaintext are not the same. Therefore, the encryption mechanisms suitable for database environment are required