¼¼ºÎÇÁ·Î±×·¥

 

137.   414

Warning: getimagesize() [function.getimagesize]: Read error! in /home/krnet/public_html/board/skin/board_photonews/list_main.php on line 22
Track>Session : Digital Contents & Game > Digital Right Management
¹ßÇ¥Á¦¸ñ : Illegal Contents Trace Technology
¹ßÇ¥ÀÚ : ¼­¿µÈ£ (ÆÀÀå/ETRI)
°­¿¬¿ä¾à : ÀÎÅͳݻ󿡴 ÀúÀÛ±ÇÀÚÀÇ µ¿ÀÇ°¡ ¾ø´Â ºÒ¹ý º¹Á¦ ÄÜÅÙÃ÷°¡ À¯Æ÷µÇ°í ÀÖ¾î ÀúÀÛ±ÇÀÚÀÇ ÇÇÇØ°¡ ½É°¢ÇÑ ¼öÁØ¿¡ À̸£°í ÀÖ´Ù. º» ¹ßÇ¥¿¡¼­´Â µðÁöÅÐ ÇΰÅÇÁ¸°Æà ±â¼úÀ» ÀÌ¿ëÇÑ À̹Ì...
Track>Session : Digital Contents & Game > Animation of Soft Things
¹ßÇ¥Á¦¸ñ : Animating Fluids
¹ßÇ¥ÀÚ : ¼Û¿À¿µ (±³¼ö/¼­¿ï´ë)
°­¿¬¿ä¾à : ÀÌ ¹ßÇ¥¿¡¼­´Â ¹°¸®Àû ¸ðµ¨ ±â¹ÝÀÇ ´Ù»óÀÇ À¯Ã¼ Çö»ó ¾Ö´Ï¸ÞÀÌ¼Ç ±â¹ýÀ» Á¦½ÃÇÑ´Ù. ÀÌ ±â¹ýÀº À¯Ã¼ÀÇ Áö¹è ¹æÁ¤½ÄÀÎ ³ªºñ¾î-½ºÅ彺 ¹æÁ¤½ÄÀ» ºü¸£°í ¾ÈÁ¤ÀûÀ¸·Î °è»êÇϸ鼭µµ ¼ö...
Track>Session : Digital Contents & Game > Animation of Soft Things
¹ßÇ¥Á¦¸ñ : Elastodynamic Deformation for Computer Animation
¹ßÇ¥ÀÚ : ÃÖ¹Î±Ô (±³¼ö/±¤¿î´ë)
°­¿¬¿ä¾à : º» °­¿¬¿¡¼­´Â ÀÚ¿¬°èÀÇ °ÅÀÇ ¸ðµç »ç¹°¿¡¼­ °üÂûµÇ´Â º¯Çü(deformation) Çö»óÀ» ¸ð¹æÇÏ¿© »ç½ÇÀûÀÎ ¾Ö´Ï¸ÞÀ̼ÇÀ» ¸¸µé±â À§ÇØ ³Î¸® »ç¿ëµÇ´Â ¿¬¼Óü ¿ªÇÐ(continuum mechanics)...
Track>Session : Digital Contents & Game > Mobile Game
¹ßÇ¥Á¦¸ñ : Collision Detection and Treatment for Game Development
¹ßÇ¥ÀÚ : ÇÑÁ¤Çö (±³¼ö/°í·Á´ë)
°­¿¬¿ä¾à : ¹°Ã¼ °£ ½Ç½Ã°£ Ã浹ŽÁö(collision detection)´Â °ÔÀÓ ÇÁ·Î±×·¡¹Ö¿¡¼­ÀÇ »ç½Ç¼º Á¦°í¸¦ À§ÇØ ³Î¸® ¾²ÀÌ´Â ±â¼ú Áß ÇϳªÀÌ´Ù. º» °­¿¬¿¡¼­´Â 3Â÷¿ø ±×·¡ÇȽº ºÐ¾ß¿¡¼­ °³¹ßµÈ Ãæ...
Track>Session : Digital Contents & Game > Mobile Game
¹ßÇ¥Á¦¸ñ : Case Study of Mobile 3D Game Development
¹ßÇ¥ÀÚ : Á¶Àº»ó (ÆÀÀå/ÁöÅ¥¼ÒÇÁÆ®)
°­¿¬¿ä¾à : 2005³â »ó¹Ý±âºÎÅÍ Çϵå¿þ¾î·Î 3D °¡¼ÓÀÌ °¡´ÉÇÑ ÈÞ´ëÆùÀÌ Ãâ½ÃµÇ°í ÀÖ´Ù. PC¿Í´Â ´Ù¸¥ ȯ°æÀ» °¡Áö´Â ÈÞ´ëÆù¿¡¼­ 3D °ÔÀÓÀ» °³¹ßÇϱâ À§Çؼ­´Â ±âȹ, ±â¼ú, ÃÖÀûÈ­ µîÀÇ ´Ù¾çÇÑ...
Track>Session : Security & Privacy > Tutorial : Bio Security
¹ßÇ¥Á¦¸ñ : Biometrics and Security : is it really secure?
¹ßÇ¥ÀÚ : ±èÀçÈñ (±³¼ö/¿¬¼¼´ë)
°­¿¬¿ä¾à : ÀÌ °­¿¬¿¡¼­´Â »ýüÀνĽýºÅÛÀÇ ±¸Á¶, ÇöȲ, ÀÀ¿ë µî¿¡ °üÇÑ ÀϹÝÀûÀÎ ¼Ò°³¿Í ÀÌ·¯ÇÑ »ýüÀÎ½Ä ½Ã½ºÅÛ¿¡¼­ ó¸® µÇ´Â »ýüÁ¤º¸ÀÇ È¹µæ, Àü¼Û, ÀúÀå Áß¿¡ °¡ÇÏ¿©Áú ¼ö ÀÖ´Â ´Ù¾ç...
Track>Session : Security & Privacy > Security & Privacy
¹ßÇ¥Á¦¸ñ : P2P Security
¹ßÇ¥ÀÚ : ³ªÀçÈÆ (ÆÀÀå/ETRI)
°­¿¬¿ä¾à : È¿À²ÀûÀÌ°í ¾ÈÀüÇÑ P2P ³×Æ®¿öÅ©¸¦ ±¸ÃàÇϱâ À§Çؼ­ »ç¿ëÀÚ´Â Hash TableÀ» ±¸¼ºÇÑ´Ù. ÀÌ °úÁ¤¿¡¼­ ¹ß»ýÇÒ ¼ö ÀÖ´Â ¶ó¿ìÆà ¹æÇØ, Data Lookup ¹æÇØ, ³×Æ®¿öÅ© °úºÎÇÏ µîÀ» ´ëó...
Track>Session : Security & Privacy > Security & Privacy
¹ßÇ¥Á¦¸ñ : Spam and Ham
¹ßÇ¥ÀÚ : ÃÖÇü±â (±³¼ö/¼º±Õ°ü´ë)
°­¿¬¿ä¾à : ÇöÀçÀÇ À̸ÞÀÏÀº ½¬¿î »ç¿ë ¹æ¹ý°ú ½Å¼ÓÇÑ ¹è´Þ·Î ¸¹Àº Æí¸®ÇÔÀ» Á¦°øÇÏ´Â ¹Ý¸é¿¡ ÇÁ·ÎÅäÄÝ ÀÚü³» ¿¡¼­ÀÇ º¸¾È¼º °á¿©·Î ÀÎÇÑ ½ºÆÔ ¸ÞÀÏ·Î »çȸ¹®Á¦·Î ¾ß±âÇÏ°í ÀÖ´Ù. ÀÌ·± ½º...
Track>Session : Security & Privacy > Security & Privacy
¹ßÇ¥Á¦¸ñ : Epidemiological Approach to Network Security
¹ßÇ¥ÀÚ : ¹®¼öº¹ (±³¼ö/KAIST)
°­¿¬¿ä¾à : In this tutorial, we review the history of the Internet worms and the evolution of their spreading behaviors. In medicinal epidemiology, the spreading behavior of in...
Track>Session : Security & Privacy > Security & Privacy 2
¹ßÇ¥Á¦¸ñ : Privacy Invading Technology
¹ßÇ¥ÀÚ : ÀÓäȣ (ÀÌ»ç/½ÃÅ¥¸®Æ¼¸Ê)
°­¿¬¿ä¾à : ÀÎÅÍ³Ý ¹ßÀü°ú ´õºÒ¾î °³ÀÎÀÇ ÇÁ¶óÀ̹ö½Ã¸¦ À§ÇùÇÏ´Â ±â¼úÀº Á¡Á¡ ¹ßÀüµÇ°í ÀÖ¾î ÀÌ¿¡ ´ëÇÑ ´ëÃ¥ÀÌ ÇÊ¿äÇÏ´Ù. ÇÁ¶óÀ̹ö½Ã°ø°Ý±â¼ú·Î¼­ ¿ú, Æ®·ÎÀ̸ñ¸¶, ½ºÆÄÀÌ¿þ¾î µîÀÇ »ç·Ê¸¦ ...
 01 02 03 04 05 06 07 08 09 10