http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Practical, Robust and Adaptive Sorting
Chen, J.-C. International Institute of Informatics and Systemics,; c2004.; Orlando, FI 2004 p.1-6
Protein NMR Peak Assignment: Algorithms and Complexity
Chen, Z.-Z. International Institute of Informatics and Systemics,; c2004.; Orlando, FI 2004 p.7-10
Building "Problem Solving Engines" for Combinatorial Optimization
Ibaraki, T. International Institute of Informatics and Systemics,; c2004.; Orlando, FI 2004 p.11-16
Joshi, T.; Chen, Y.; Becker, J.; Alexandrov, N.; Xu, D. International Institute of Informatics and Systemics,; c2004.; Orlando, FI 2004 p.17-22
Analysis of Hashing Performance Accounting for Modern Memory Hierarchies
Luo, W.; Heileman, G. L. International Institute of Informatics and Systemics,; c2004.; Orlando, FI 2004 p.23-28
Choi, M.; Choi, H.; Kim, C.-S.; Kim, S. International Institute of Informatics and Systemics,; c2004.; Orlando, FI 2004 p.29-32
An Efficient Delegation Model Using Role-Partition in Role Based Access Control
Jeon, J.-W.; Jeon, J.-C.; Kim, Y.-S.; Yoo, K.-Y. International Institute of Informatics and Systemics,; c2004.; Orlando, FI 2004 p.33-37
A Case Study on the Security Audit Methodologies in the Context of Information System's Life Cycle
Kim, J.; Hong, K. International Institute of Informatics and Systemics,; c2004.; Orlando, FI 2004 p.38-43
A Detection Scheme against Distributed Reflector Denial-Of-Service Attack
Kim, Y.-S.; Jeon, J.-C.; Jeon, J.-W.; Yoo, K.-Y. International Institute of Informatics and Systemics,; c2004.; Orlando, FI 2004 p.44-48
The Design and Implementation of Risk Analysis Tool and Suitable Countermeasure Choice Algorithm
Lee, N. H.; Jung, Y. J.; Kim, I. J.; Park, J. G. International Institute of Informatics and Systemics,; c2004.; Orlando, FI 2004 p.49-53