¼¼ºÎÇÁ·Î±×·¥
137
.
4
14
---- ¼±Åà ----
1993
1994
1995
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
---- ¼±Åà ----
---- ¼±Åà ----
Track
>
Session :
Digital Contents & Game
>
Digital Right Management
¹ßÇ¥Á¦¸ñ :
Illegal Contents Trace Technology
¹ßÇ¥ÀÚ :
¼¿µÈ£ (ÆÀÀå/ETRI)
°¿¬¿ä¾à :
ÀÎÅͳݻ󿡴 ÀúÀÛ±ÇÀÚÀÇ µ¿ÀÇ°¡ ¾ø´Â ºÒ¹ý º¹Á¦ ÄÜÅÙÃ÷°¡ À¯Æ÷µÇ°í ÀÖ¾î ÀúÀÛ±ÇÀÚÀÇ ÇÇÇØ°¡ ½É°¢ÇÑ ¼öÁØ¿¡ À̸£°í ÀÖ´Ù. º» ¹ßÇ¥¿¡¼´Â µðÁöÅÐ ÇΰÅÇÁ¸°Æà ±â¼úÀ» ÀÌ¿ëÇÑ À̹ÌÁö, ¿Àµð¿À, ºñµð¿À ºÒ¹ý ÄÜÅÙÃ÷¿¡ ´ëÇÑ ÃßÀû ±â¼ú¿¡ ´ëÇÏ¿© ¹ßÇ¥ÇÏ°íÀÚ ÇÑ´Ù.more
Track
>
Session :
Digital Contents & Game
>
Animation of Soft Things
¹ßÇ¥Á¦¸ñ :
Animating Fluids
¹ßÇ¥ÀÚ :
¼Û¿À¿µ (±³¼ö/¼¿ï´ë)
°¿¬¿ä¾à :
ÀÌ ¹ßÇ¥¿¡¼´Â ¹°¸®Àû ¸ðµ¨ ±â¹ÝÀÇ ´Ù»óÀÇ À¯Ã¼ Çö»ó ¾Ö´Ï¸ÞÀÌ¼Ç ±â¹ýÀ» Á¦½ÃÇÑ´Ù. ÀÌ ±â¹ýÀº À¯Ã¼ÀÇ Áö¹è ¹æÁ¤½ÄÀÎ ³ªºñ¾î-½ºÅ彺 ¹æÁ¤½ÄÀ» ºü¸£°í ¾ÈÁ¤ÀûÀ¸·Î °è»êÇϸ鼵µ ¼öÄ¡Àû ¼Ò»ê ¹× ¼öÄ¡Àû È®»êÀ» ¾ïÁ¦Çϴ Ư¡ÀÌ ÀÖ´Ù. ÀÌ ±â¹ýÀ» ÀÌ¿ëÇÑ ½Ç½Ã°£ 2Â÷¿ø À¯Ã¼ ½Ã¹Ä·¹ÀÌÅÍ¿Í »ç½ÇÀûÀÎ 3Â÷¿ø À¯Ã¼ ¾Ö´Ï¸ÞÀ̼ÇÀ» Á¦½Ã...more
Track
>
Session :
Digital Contents & Game
>
Animation of Soft Things
¹ßÇ¥Á¦¸ñ :
Elastodynamic Deformation for Computer Animation
¹ßÇ¥ÀÚ :
ÃÖ¹Î±Ô (±³¼ö/±¤¿î´ë)
°¿¬¿ä¾à :
º» °¿¬¿¡¼´Â ÀÚ¿¬°èÀÇ °ÅÀÇ ¸ðµç »ç¹°¿¡¼ °üÂûµÇ´Â º¯Çü(deformation) Çö»óÀ» ¸ð¹æÇÏ¿© »ç½ÇÀûÀÎ ¾Ö´Ï¸ÞÀ̼ÇÀ» ¸¸µé±â À§ÇØ ³Î¸® »ç¿ëµÇ´Â ¿¬¼Óü ¿ªÇÐ(continuum mechanics)¿¡ ±â¹ÝÇÑ µ¿Àû ź¼º º¯Çü(elastodynamic deformation) ¹× À¯ÇÑ ¿ä¼Ò¹ý(finite element method)¿¡ ´ëÇÏ¿© °£·«ÇÏ°Ô »ìÆ캻 ÈÄ, À̸¦ ÄÄÇ»ÅÍ ¾Ö´Ï...more
Track
>
Session :
Digital Contents & Game
>
Mobile Game
¹ßÇ¥Á¦¸ñ :
Collision Detection and Treatment for Game Development
¹ßÇ¥ÀÚ :
ÇÑÁ¤Çö (±³¼ö/°í·Á´ë)
°¿¬¿ä¾à :
¹°Ã¼ °£ ½Ç½Ã°£ Ã浹ŽÁö(collision detection)´Â °ÔÀÓ ÇÁ·Î±×·¡¹Ö¿¡¼ÀÇ »ç½Ç¼º Á¦°í¸¦ À§ÇØ ³Î¸® ¾²ÀÌ´Â ±â¼ú Áß ÇϳªÀÌ´Ù. º» °¿¬¿¡¼´Â 3Â÷¿ø ±×·¡ÇȽº ºÐ¾ß¿¡¼ °³¹ßµÈ Ã浹ŽÁö ±â¹ýµéÀ» ¼Ò°³ÇÏ°í, ½Ç½Ã°£ »óÈ£ÀÛ¿ëÀÌ ¿ä±¸µÇ´Â ½ÇÁ¦ °ÔÀÓ¿¡¼ À̵éÀÌ ¾î¶»°Ô °£·«ÈµÇ°í Àû¿ëµÇ´Â Áö »ìÆì º»´Ù.more
Track
>
Session :
Digital Contents & Game
>
Mobile Game
¹ßÇ¥Á¦¸ñ :
Case Study of Mobile 3D Game Development
¹ßÇ¥ÀÚ :
Á¶Àº»ó (ÆÀÀå/ÁöÅ¥¼ÒÇÁÆ®)
°¿¬¿ä¾à :
2005³â »ó¹Ý±âºÎÅÍ Çϵå¿þ¾î·Î 3D °¡¼ÓÀÌ °¡´ÉÇÑ ÈÞ´ëÆùÀÌ Ãâ½ÃµÇ°í ÀÖ´Ù. PC¿Í´Â ´Ù¸¥ ȯ°æÀ» °¡Áö´Â ÈÞ´ëÆù¿¡¼ 3D °ÔÀÓÀ» °³¹ßÇϱâ À§Çؼ´Â ±âȹ, ±â¼ú, ÃÖÀûÈ µîÀÇ ´Ù¾çÇÑ °úÁ¤¿¡¼ Â÷º°µÈ ±â¼ú°ú Á¢±Ù¹æ¹ýÀÌ ÇÊ¿äÇÏ´Ù. º» ¹ßÇ¥¿¡¼´Â ÀÌ·¯ÇÑ ÈÞ´ëÆù ȯ°æ¿¡¼ 3D °ÔÀÓÀ» Á¦ÀÛÇÏ´Â °úÁ¤À» ½º³ë¿ìº¸µå °ÔÀÓÀ̶ó´Â ½ÇÁ¦ ...more
Track
>
Session :
Security & Privacy
>
Tutorial : Bio Security
¹ßÇ¥Á¦¸ñ :
Biometrics and Security : is it really secure?
¹ßÇ¥ÀÚ :
±èÀçÈñ (±³¼ö/¿¬¼¼´ë)
°¿¬¿ä¾à :
ÀÌ °¿¬¿¡¼´Â »ýüÀνĽýºÅÛÀÇ ±¸Á¶, ÇöȲ, ÀÀ¿ë µî¿¡ °üÇÑ ÀϹÝÀûÀÎ ¼Ò°³¿Í ÀÌ·¯ÇÑ »ýüÀÎ½Ä ½Ã½ºÅÛ¿¡¼ ó¸® µÇ´Â »ýüÁ¤º¸ÀÇ È¹µæ, Àü¼Û, ÀúÀå Áß¿¡ °¡ÇÏ¿©Áú ¼ö ÀÖ´Â ´Ù¾çÇÑ ¿ÜºÎ °ø°Ý À¯Çü°ú ±× ´ëÃ¥¿¡ ´ëÇÏ¿© ¼³¸íÇÑ´Ù. Ưº°È÷ ¿ÜºÎ À¯Ãâ½Ã Æó±â³ª ±³Ã¼°¡ ºÒ°¡´ÉÇÑ »ýüÁ¤º¸ÀÇ Æ¯¼º»ó ½É°¢ÇÑ ¹®Á¦·Î ´ëµÎµÇ°í ÀÖ´Â ...more
Track
>
Session :
Security & Privacy
>
Security & Privacy
¹ßÇ¥Á¦¸ñ :
P2P Security
¹ßÇ¥ÀÚ :
³ªÀçÈÆ (ÆÀÀå/ETRI)
°¿¬¿ä¾à :
È¿À²ÀûÀÌ°í ¾ÈÀüÇÑ P2P ³×Æ®¿öÅ©¸¦ ±¸ÃàÇϱâ À§Çؼ »ç¿ëÀÚ´Â Hash TableÀ» ±¸¼ºÇÑ´Ù. ÀÌ °úÁ¤¿¡¼ ¹ß»ýÇÒ ¼ö ÀÖ´Â ¶ó¿ìÆà ¹æÇØ, Data Lookup ¹æÇØ, ³×Æ®¿öÅ© °úºÎÇÏ µîÀ» ´ëóÇϱâ À§ÇØ ¾ÈÀüÇÑ ¶ó¿ìÆà Á¤º¸ »ý¼º¹× Àü´Þ ÇÁ·ÎÅäÄÝÀÌ ÇÊ¿äÇÏ´Ù. P2P ¼ºñ½ºÀÇ º¸¾È Ãë¾àÁ¡À» ºÐ¼®ÇÏ°í À̸¦ ÇØ°áÇÒ ¼ö Á¤º¸º¸È£ ¿ä¼Ò±â¼úÀÎ DHT...more
Track
>
Session :
Security & Privacy
>
Security & Privacy
¹ßÇ¥Á¦¸ñ :
Spam and Ham
¹ßÇ¥ÀÚ :
ÃÖÇü±â (±³¼ö/¼º±Õ°ü´ë)
°¿¬¿ä¾à :
ÇöÀçÀÇ À̸ÞÀÏÀº ½¬¿î »ç¿ë ¹æ¹ý°ú ½Å¼ÓÇÑ ¹è´Þ·Î ¸¹Àº Æí¸®ÇÔÀ» Á¦°øÇÏ´Â ¹Ý¸é¿¡ ÇÁ·ÎÅäÄÝ ÀÚü³» ¿¡¼ÀÇ º¸¾È¼º °á¿©·Î ÀÎÇÑ ½ºÆÔ ¸ÞÀÏ·Î »çȸ¹®Á¦·Î ¾ß±âÇÏ°í ÀÖ´Ù. ÀÌ·± ½ºÆÔ ¸ÞÀÏ·Î ÀÎÇÑ ¹®Á¦Á¡µéÀ» ¸é¹ÐÈ÷ Áý¾îº¸°í ÀÌ ¹®Á¦Á¡µé¿¡ ´ëÇÑ ÇØ°áÃ¥µéÀ» »ìÆ캸°íÀÚ ÇÑ´Ù. ½ºÆÔ¸ÞÀÏÀ» ¾ïÁ¦ÇÏ·Á´Â ¹æ¾ÈµéÀÇ ¾ÕÀ¸·ÎÀÇ Ãß¼¼µµ ...more
Track
>
Session :
Security & Privacy
>
Security & Privacy
¹ßÇ¥Á¦¸ñ :
Epidemiological Approach to Network Security
¹ßÇ¥ÀÚ :
¹®¼öº¹ (±³¼ö/KAIST)
°¿¬¿ä¾à :
In this tutorial, we review the history of the Internet worms and the evolution of their spreading behaviors. In medicinal epidemiology, the spreading behavior of infectious diseases has long been studied, as well as the effectiveness of various countermeasures. We examine how those known models of ...more
Track
>
Session :
Security & Privacy
>
Security & Privacy 2
¹ßÇ¥Á¦¸ñ :
Privacy Invading Technology
¹ßÇ¥ÀÚ :
ÀÓäȣ (ÀÌ»ç/½ÃÅ¥¸®Æ¼¸Ê)
°¿¬¿ä¾à :
ÀÎÅÍ³Ý ¹ßÀü°ú ´õºÒ¾î °³ÀÎÀÇ ÇÁ¶óÀ̹ö½Ã¸¦ À§ÇùÇÏ´Â ±â¼úÀº Á¡Á¡ ¹ßÀüµÇ°í ÀÖ¾î ÀÌ¿¡ ´ëÇÑ ´ëÃ¥ÀÌ ÇÊ¿äÇÏ´Ù. ÇÁ¶óÀ̹ö½Ã°ø°Ý±â¼ú·Î¼ ¿ú, Æ®·ÎÀ̸ñ¸¶, ½ºÆÄÀÌ¿þ¾î µîÀÇ »ç·Ê¸¦ »ìÆ캸°í, RFID µî IT839 Á¤Ã¥°ú ±â¼ú¿¡¼ ¿¹°ßµÇ´Â ÇÁ¶óÀ̹ö½Ã °ø°Ý¿¡ ´ëÇÑ ¹®Á¦Á¡À» º»´Ù.more
01
02
03
04
05
06
07
08
09
10