Digital Library


Search: "[ keyword: similarity ]" (56)
    Efficient Inverted List Search Technique using Bitmap Filters
    In Teak Kwon , Jong Ik Kim The KIPS Transactions:PartD, Vol. 18, No. 6, pp. 415-422, Dec. 2011
    10.3745/KIPSTD.2011.18.6.415


    Spanning Tree Aggregation Using Attribute of Service Boundary Line
    So Ra Kwon , Chang Ho Jeon The KIPS Transactions:PartC, Vol. 18, No. 6, pp. 441-444, Dec. 2011
    10.3745/KIPSTC.2011.18.6.441


    A Text-based Similarity Measure for Scientific Literature
    Seok Ho Yoon , Sang Wook Kim The KIPS Transactions:PartD, Vol. 18, No. 5, pp. 317-322, Oct. 2011
    10.3745/KIPSTD.2011.18.5.317


    Discovery Methods of Similar Web Service Operations by Learning Ontologies
    Yong Ju Lee The KIPS Transactions:PartD, Vol. 18, No. 2, pp. 133-142, Apr. 2011
    10.3745/KIPSTD.2011.18.2.133


    Personalized and Social Search by Finding User Similarity based on Social Networks
    Gun Woo Park , Jung Woon Oh , Sang Hoon Lee The KIPS Transactions:PartD, Vol. 16, No. 5, pp. 683-690, Oct. 2009
    10.3745/KIPSTD.2009.16.5.683


    Design of Efficient storage Exploiting Structural Similarity in Microarray Data
    Jong Han Yun , Dong Kyu Shin , Dong Il Shin The KIPS Transactions:PartD, Vol. 16, No. 5, pp. 643-650, Oct. 2009
    10.3745/KIPSTD.2009.16.5.643


    Trajectory Clustering in Road Network Environment
    Ji Haeng Bak , Jung Im Won , Sang Wook Kim The KIPS Transactions:PartD, Vol. 16, No. 3, pp. 317-326, Jun. 2009
    10.3745/KIPSTD.2009.16.3.317


    Efficient Similarity Search in Multi-attribute Time Series Databases
    Sang Jun Lee The KIPS Transactions:PartD, Vol. 14, No. 7, pp. 727-732, Dec. 2007
    10.3745/KIPSTD.2007.14.7.727


    Detection of Personal Information Leakage using the Network Traffic Characteristics
    Jung Min Park , Eun Kyung Kim , Yu Kyung Jung , Ki Joon Chae , Jung Chan Na The KIPS Transactions:PartC, Vol. 14, No. 3, pp. 199-208, Jun. 2007
    10.3745/KIPSTC.2007.14.3.199


    Program Plagiarism Detection through Memory Access Log Analysis
    Park Sung-Yun, Han Sang-Yong The KIPS Transactions:PartD, Vol. 13, No. 6, pp. 833-838, Oct. 2006
    http://dx.doi.org/10.3745/KIPSTD.2006.13D.6.833
    Keywords: program plagiarism, Algorithm Similarity Memory Access Log