¼¼ºÎÇÁ·Î±×·¥
137
.
4
14
---- ¼±Åà ----
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
---- ¼±Åà ----
---- ¼±Åà ----
Track>Session :
Digital Contents & Game > Digital Right Management
¹ßÇ¥Á¦¸ñ :
Illegal Contents Trace Technology
¹ßÇ¥ÀÚ :
¼¿µÈ£ (ÆÀÀå/ETRI)
°¿¬¿ä¾à :
ÀÎÅͳݻ󿡴 ÀúÀÛ±ÇÀÚÀÇ µ¿ÀÇ°¡ ¾ø´Â ºÒ¹ý º¹Á¦ ÄÜÅÙÃ÷°¡ À¯Æ÷µÇ°í ÀÖ¾î ÀúÀÛ±ÇÀÚÀÇ ÇÇÇØ°¡ ½É°¢ÇÑ ¼öÁØ¿¡ À̸£°í ÀÖ´Ù. º» ¹ßÇ¥¿¡¼´Â µðÁöÅÐ ÇΰÅÇÁ¸°Æà ±â¼úÀ» ÀÌ¿ëÇÑ À̹Ì...
Track>Session :
Digital Contents & Game > Animation of Soft Things
¹ßÇ¥Á¦¸ñ :
Animating Fluids
¹ßÇ¥ÀÚ :
¼Û¿À¿µ (±³¼ö/¼¿ï´ë)
°¿¬¿ä¾à :
ÀÌ ¹ßÇ¥¿¡¼´Â ¹°¸®Àû ¸ðµ¨ ±â¹ÝÀÇ ´Ù»óÀÇ À¯Ã¼ Çö»ó ¾Ö´Ï¸ÞÀÌ¼Ç ±â¹ýÀ» Á¦½ÃÇÑ´Ù. ÀÌ ±â¹ýÀº À¯Ã¼ÀÇ Áö¹è ¹æÁ¤½ÄÀÎ ³ªºñ¾î-½ºÅ彺 ¹æÁ¤½ÄÀ» ºü¸£°í ¾ÈÁ¤ÀûÀ¸·Î °è»êÇϸ鼵µ ¼ö...
Track>Session :
Digital Contents & Game > Animation of Soft Things
¹ßÇ¥Á¦¸ñ :
Elastodynamic Deformation for Computer Animation
¹ßÇ¥ÀÚ :
ÃÖ¹Î±Ô (±³¼ö/±¤¿î´ë)
°¿¬¿ä¾à :
º» °¿¬¿¡¼´Â ÀÚ¿¬°èÀÇ °ÅÀÇ ¸ðµç »ç¹°¿¡¼ °üÂûµÇ´Â º¯Çü(deformation) Çö»óÀ» ¸ð¹æÇÏ¿© »ç½ÇÀûÀÎ ¾Ö´Ï¸ÞÀ̼ÇÀ» ¸¸µé±â À§ÇØ ³Î¸® »ç¿ëµÇ´Â ¿¬¼Óü ¿ªÇÐ(continuum mechanics)...
Track>Session :
Digital Contents & Game > Mobile Game
¹ßÇ¥Á¦¸ñ :
Collision Detection and Treatment for Game Development
¹ßÇ¥ÀÚ :
ÇÑÁ¤Çö (±³¼ö/°í·Á´ë)
°¿¬¿ä¾à :
¹°Ã¼ °£ ½Ç½Ã°£ Ã浹ŽÁö(collision detection)´Â °ÔÀÓ ÇÁ·Î±×·¡¹Ö¿¡¼ÀÇ »ç½Ç¼º Á¦°í¸¦ À§ÇØ ³Î¸® ¾²ÀÌ´Â ±â¼ú Áß ÇϳªÀÌ´Ù. º» °¿¬¿¡¼´Â 3Â÷¿ø ±×·¡ÇȽº ºÐ¾ß¿¡¼ °³¹ßµÈ Ãæ...
Track>Session :
Digital Contents & Game > Mobile Game
¹ßÇ¥Á¦¸ñ :
Case Study of Mobile 3D Game Development
¹ßÇ¥ÀÚ :
Á¶Àº»ó (ÆÀÀå/ÁöÅ¥¼ÒÇÁÆ®)
°¿¬¿ä¾à :
2005³â »ó¹Ý±âºÎÅÍ Çϵå¿þ¾î·Î 3D °¡¼ÓÀÌ °¡´ÉÇÑ ÈÞ´ëÆùÀÌ Ãâ½ÃµÇ°í ÀÖ´Ù. PC¿Í´Â ´Ù¸¥ ȯ°æÀ» °¡Áö´Â ÈÞ´ëÆù¿¡¼ 3D °ÔÀÓÀ» °³¹ßÇϱâ À§Çؼ´Â ±âȹ, ±â¼ú, ÃÖÀûÈ µîÀÇ ´Ù¾çÇÑ...
Track>Session :
Security & Privacy > Tutorial : Bio Security
¹ßÇ¥Á¦¸ñ :
Biometrics and Security : is it really secure?
¹ßÇ¥ÀÚ :
±èÀçÈñ (±³¼ö/¿¬¼¼´ë)
°¿¬¿ä¾à :
ÀÌ °¿¬¿¡¼´Â »ýüÀνĽýºÅÛÀÇ ±¸Á¶, ÇöȲ, ÀÀ¿ë µî¿¡ °üÇÑ ÀϹÝÀûÀÎ ¼Ò°³¿Í ÀÌ·¯ÇÑ »ýüÀÎ½Ä ½Ã½ºÅÛ¿¡¼ ó¸® µÇ´Â »ýüÁ¤º¸ÀÇ È¹µæ, Àü¼Û, ÀúÀå Áß¿¡ °¡ÇÏ¿©Áú ¼ö ÀÖ´Â ´Ù¾ç...
Track>Session :
Security & Privacy > Security & Privacy
¹ßÇ¥Á¦¸ñ :
P2P Security
¹ßÇ¥ÀÚ :
³ªÀçÈÆ (ÆÀÀå/ETRI)
°¿¬¿ä¾à :
È¿À²ÀûÀÌ°í ¾ÈÀüÇÑ P2P ³×Æ®¿öÅ©¸¦ ±¸ÃàÇϱâ À§Çؼ »ç¿ëÀÚ´Â Hash TableÀ» ±¸¼ºÇÑ´Ù. ÀÌ °úÁ¤¿¡¼ ¹ß»ýÇÒ ¼ö ÀÖ´Â ¶ó¿ìÆà ¹æÇØ, Data Lookup ¹æÇØ, ³×Æ®¿öÅ© °úºÎÇÏ µîÀ» ´ëó...
Track>Session :
Security & Privacy > Security & Privacy
¹ßÇ¥Á¦¸ñ :
Spam and Ham
¹ßÇ¥ÀÚ :
ÃÖÇü±â (±³¼ö/¼º±Õ°ü´ë)
°¿¬¿ä¾à :
ÇöÀçÀÇ À̸ÞÀÏÀº ½¬¿î »ç¿ë ¹æ¹ý°ú ½Å¼ÓÇÑ ¹è´Þ·Î ¸¹Àº Æí¸®ÇÔÀ» Á¦°øÇÏ´Â ¹Ý¸é¿¡ ÇÁ·ÎÅäÄÝ ÀÚü³» ¿¡¼ÀÇ º¸¾È¼º °á¿©·Î ÀÎÇÑ ½ºÆÔ ¸ÞÀÏ·Î »çȸ¹®Á¦·Î ¾ß±âÇÏ°í ÀÖ´Ù. ÀÌ·± ½º...
Warning
: getimagesize() [
function.getimagesize
]: Read error! in
/home/krnet/public_html/board/skin/board_photonews/list_main.php
on line
22
Track>Session :
Security & Privacy > Security & Privacy
¹ßÇ¥Á¦¸ñ :
Epidemiological Approach to Network Security
¹ßÇ¥ÀÚ :
¹®¼öº¹ (±³¼ö/KAIST)
°¿¬¿ä¾à :
In this tutorial, we review the history of the Internet worms and the evolution of their spreading behaviors. In medicinal epidemiology, the spreading behavior of in...
Track>Session :
Security & Privacy > Security & Privacy 2
¹ßÇ¥Á¦¸ñ :
Privacy Invading Technology
¹ßÇ¥ÀÚ :
ÀÓäȣ (ÀÌ»ç/½ÃÅ¥¸®Æ¼¸Ê)
°¿¬¿ä¾à :
ÀÎÅÍ³Ý ¹ßÀü°ú ´õºÒ¾î °³ÀÎÀÇ ÇÁ¶óÀ̹ö½Ã¸¦ À§ÇùÇÏ´Â ±â¼úÀº Á¡Á¡ ¹ßÀüµÇ°í ÀÖ¾î ÀÌ¿¡ ´ëÇÑ ´ëÃ¥ÀÌ ÇÊ¿äÇÏ´Ù. ÇÁ¶óÀ̹ö½Ã°ø°Ý±â¼ú·Î¼ ¿ú, Æ®·ÎÀ̸ñ¸¶, ½ºÆÄÀÌ¿þ¾î µîÀÇ »ç·Ê¸¦ ...
01
02
03
04
05
06
07
08
09
10