Digital Library


Search: "[ keyword: evaluation ]" (94)
    Fault Localization for Self-Managing Based on Bayesian Network
    Shun Shan Piao , Jeong Min Park , Eun Seok Lee The KIPS Transactions:PartB , Vol. 15, No. 2, pp. 137-146, Apr. 2008
    10.3745/KIPSTB.2008.15.2.137


    Performance Evaluation of Embedded Garbage Collectors in CVM Environment
    Chang Il Cha , Sang Wook Kim , Ji Woong Chang The KIPS Transactions:PartA, Vol. 14, No. 3, pp. 173-184, Jun. 2007
    10.3745/KIPSTA.2007.14.3.173


    Color Contrast Evaluation Algorithm Considering Color Temperature Feeling
    Young Gun Jang The KIPS Transactions:PartB , Vol. 13, No. 4, pp. 471-478, Aug. 2006
    10.3745/KIPSTB.2006.13.4.471


    Modeling and Performance Analysis on the Response Capacity against Alert Information in an Intrusion Detection System
    Yong Hee Jeon , Jung Sook Jang , Jong Soo Jang The KIPS Transactions:PartC, Vol. 12, No. 6, pp. 855-864, Oct. 2005
    10.3745/KIPSTC.2005.12.6.855


    Multi-Domain Security Management Framework and Its Performance Evaluation for Protecting BcN Infrastructure
    Jung Sook Jang , Yong Hee Jeon , Jong Soo Jang The KIPS Transactions:PartC, Vol. 12, No. 6, pp. 817-826, Oct. 2005
    10.3745/KIPSTC.2005.12.6.817


    The Development of Mobile Grid System and Performance Evaluation
    Tae Kyung Kim , Hee Seung Kim , Hyun Joo Lee , Tai Myung Chung The KIPS Transactions:PartC, Vol. 12, No. 4, pp. 581-588, Aug. 2005
    10.3745/KIPSTC.2005.12.4.581


    A Study on the Tree based Memoryless Anti-Collision Algorithm for RFID Systems
    Cheng Hao Quan , Won Kee Hong , Yong Doo Lee , Hie Cheol Kim The KIPS Transactions:PartC, Vol. 11, No. 6, pp. 851-862, Dec. 2004
    10.3745/KIPSTC.2004.11.6.851


    A Design of SERDL (Security Evaluation Rule Description Language) and Rule Execution Engine for Evaluating Security of Ipv6 Network
    Hyeok Chan Kwon , Sang Choon Kim The KIPS Transactions:PartC, Vol. 11, No. 4, pp. 471-484, Aug. 2004
    10.3745/KIPSTC.2004.11.4.471


    Communication Models and Performance Evaluation for the Delivery of Data and Policy in a Hybrid-Type Intrusion Detection System
    Jang Jeong Sug , Jeon Yong Hui , Jang Jong Su , Son Seung Won The KIPS Transactions:PartC, Vol. 10, No. 6, pp. 727-738, Oct. 2003
    10.3745/KIPSTC.2003.10.6.727


    A Study on Business Process Based Asset Evaluation Model and Methodology for Efficient Security Management over Telecommunication Networks
    U Byeong Gu , Lee Gang Su , Jeong Tae Myeong The KIPS Transactions:PartC, Vol. 10, No. 4, pp. 423-432, Aug. 2003
    10.3745/KIPSTC.2003.10.4.423