¼¼ºÎÇÁ·Î±×·¥

 

83.   89
Track > Session : New Research Opportunities > Tactical Communications and Networks
¹ßÇ¥Á¦¸ñ : MAC for Tactical Communication Networks
¹ßÇ¥ÀÚ : ±èº´¼­ (±³¼ö/È«ÀÍ´ë)
°­¿¬¿ä¾à : ¿À´Ã³¯ÀÇ µ¥ÀÌÅÍ Åë½Å±â¼úÀÇ ¹ß´ÞÀº ÀüÀåȯ°æ¿¡¼­ÀÇ Åë½Å ¹æ½ÄÀÇ º¯È­¸¦ °¡Á®¿ÈÀ¸·Î½á ¹Ì·¡ÀÇ Àü Àå ȯ°æÀº ´Ù¾çÇÑ Á¤º¸ ¼öÁýü°èµé·ÎºÎÅÍ Á¤º¸¸¦ ¼öÁýÇÏ¿© ½Å¼ÓÇÏ°í Á¤È®ÇÑ Àü½ÃÀÇ ÀÇ»ç°áÁ¤À» ÀÌ·ê ¼ö ÀÖ´Â ³×Æ®¿öÅ© Áß½ÉÀüÀÏ µÉ °ÍÀ̸ç À̸¦ À§ÇÑ Àü¼úÅë½ÅÀÇ ÁøÈ­°¡ ÀÌ·ç¾îÁö°í ÀÖ´Ù. ÀÌ·¯ÇÑ Àü¼ú Åë ½Å ÇÏ¿¡¼­ Àü...more
Track > Session : New Research Opportunities > Tactical Communications and Networks
¹ßÇ¥Á¦¸ñ : Tactical Internet Overview
¹ßÇ¥ÀÚ : °­°æ¶õ (ºÎ±³¼ö/¾ÆÁÖ´ë)
°­¿¬¿ä¾à : Network Centric WarfareÀÇ ÇÙ½É ±¸¼º ¿ä¼Ò ÁßÀÇ ÇϳªÀÎ Tactical InternetÀÇ ±¸¼º ¿ä¼Ò¿Í ±â´É ¿ä±¸ »ç Ç× µîÀ» ¹Ì±º¿¡¼­ ÀÛ¼ºÇÑ Ç¥ÁØ ¹®¼­¸¦ ±â¹ÝÀ¸·Î ¼Ò°³ÇÑ´Ù. Tactical Internet »Ó¸¸ ¾Æ´Ï¶ó ±º ÅëÇÕ ³× Æ® ¿öÅ© »ó¿¡¼­ÀÇ ¸Þ½ÃÁö Àü´ÞÀ» È¿À²ÀûÀ¸·Î ¼öÇàÇϱâ À§ÇÑ ±â¼úµéÀ» ¼Ò°³ÇÑ´Ù. »ó¿ë ÀÎÅͳݿ¡¼­µµ S O ...more
Track > Session : New Research Opportunities > Tutorial: Performing Arts over Networks
¹ßÇ¥Á¦¸ñ : An Overview of Networked Performance
¹ßÇ¥ÀÚ : ¿©¿î½Â (Á¶±³¼ö/KAIST)
°­¿¬¿ä¾à : ³×Æ®¿öÅ© °ø¿¬Àº ´Ù¾çÇÑ Çü½ÄÀÇ µðÁöÅÐ ¾ÆÆ® Áß 21¼¼±â µé¾î °¡Àå ÁÖ¸ñ¹Þ°í ÀÖ´Â °ø¿¬¿¹¼úÀÇ Çϳª ·Î, ¹°¸®ÀûÀ¸·Î ¼­·Î ¶³¾îÁø Àå¼Ò¿¡ ÀÖ´Â »ç¶÷µéÀÌ ÃÊ°í¼Ó ³×Æ®¿öÅ©·Î À̾îÁø °¡»ó ¼¼°è¿¡¼­ ÇÔ²² °ø ¿¬ÇÏ°í Áñ±â¸ç, À̸¦ ÅëÇÏ¿© °ø°£ÀÇ Á¦¾àÀ» ÃÊ¿ùÇÏ´Â ¿¹¼ú ÇàÀ§ÀÇ °¡´É¼ºÀ» Á¦½ÃÇÏ°í ÀÖ´Ù. ¶ÇÇÑ, ´Ü ¼øÈ÷ ´Ü¹ßÀû...more
Track > Session : New Research Opportunities > Tutorial: Performing Arts over Networks
¹ßÇ¥Á¦¸ñ : Surround Sound for Networked Performance
¹ßÇ¥ÀÚ : ±¸º»Ã¶ (Ãʺù±³¼ö/KAIST)
°­¿¬¿ä¾à : ¹«´ë°ø¿¬À» ±¸¼ºÇÏ´Â ¹«´ë, ¹è¿ì, °ü°´ÀÇ ¿ä¼Ò¿¡ ´Ù¾çÇÑ Ã·´Ü±â¼úÀÌ µµÀԵǸ鼭 µðÁöÅаø¿¬ÀÇ °ü ½É ÀÌ ³ô¾ÆÁö°í ÀÖ´Ù. ƯÈ÷ ¹«´ë°ø¿¬¿¡ ³×Æ®¿öÅ©±â¼úÀ» È°¿ëÇÏ¸é ¹°¸®Àû °ø°£ÀÇ ÇѰ踦 ±Øº¹ÇÒ ¼ö ÀÖ °í, °ø¿¬ÀÚ¿Í °ü¶÷ÀÚÀÇ Interactivity°¡ °¡´ÉÇØÁö±â ¶§¹®¿¡ Àü ¼¼°èÀÎÀÌ µ¿½Ã¿¡ Âü¿©ÇÒ ¼ö ÀÖ´Â ¹Ì·¡ °ø ¿¬±â¼ú·Î...more
Track > Session : Forensics and Security / e-Goverment > Digital Forensics
¹ßÇ¥Á¦¸ñ : Introduction to Digital Forensics
¹ßÇ¥ÀÚ : Àº¼º°æ (Ã¥ÀÓ¿¬±¸¿ø/ETRI)
°­¿¬¿ä¾à : Á¤º¸È­°¡ ÁøÀüµÊ¿¡ µû¶ó ÄÄÇ»ÅÍ °ü·Ã ¹üÁ˻Ӹ¸ ¾Æ´Ï¶ó ÀÏ¹Ý ¹üÁË¿¡¼­µµ Áß¿ä Áõ°Å ¶Ç´Â ´Ü¼­°¡ ÄÄÇ» Å͸¦ Æ÷ÇÔÇÑ ´Ù¾çÇÑ ÀüÀÚ ¸Åü ³»¿¡ º¸°üµÇ¾î ÀÖ´Â °æ¿ì°¡ Áõ°¡ÇÏ°í ÀÖ´Ù. ÀÌ·¯ÇÑ Çö½ÇÀº ÀüÀÚ ¸Åü ¸¦ ÀÌ¿ëÇÑ ¹üÁË ¼ö»çÀÇ °úÇÐÀûÀÌ°í ü°èÀûÀÎ °³¼±À» ¿ä±¸Çϸç, À̸¦ µÞ¹ÞħÇÒ ¼ö ÀÖ´Â ¼ö»ç±â¼úÀ» ÇÊ ¿ä·Î ÇÑ´Ù. ...more
Track > Session : Forensics and Security / e-Goverment > Digital Forensics
¹ßÇ¥Á¦¸ñ : Mobile Forensics : Current Status and its Vision
¹ßÇ¥ÀÚ : ÀÌ±Ô¾È (°èÀå/´ë°ËÂûû)
°­¿¬¿ä¾à : - ¸ñÀû : ¸ð¹ÙÀÏ Æ÷·»½Ä ¼Ò°³ - Çʿ伺 : ¸ð¹ÙÀÏ Æ÷·»½Ä°ú ÇöÀå ¼ö»ç»ç·Ê¸¦ ¼Ò°³ÇÔÀ¸·Î½á ¼ö»ç±â°ü, Çаè, ¾÷°èÀÇ ºñÁ¯ ¼³Á¤¿¡ µµ ¿ò ÀÌ µÇ´Âµ¥ ÀÖÀ½. - ¹üÀ§ : ¸ð¹ÙÀÏ Æ÷·»½ÄÀÇ ÇöȲ ¹× ÈÞ´ëÆù¿¡¼­ µðÁöÅÐÁõ°Å¸¦ ÃßÃâÇÏ°í ¹ýÁ¤¿¡ Á¦ÃâÇÏ´Â °úÁ¤ - ¼ö»çÇöÀå¿¡¼­ °æÇèÇÑ . µðÁöÅÐÆ÷·»½ÄÀÇ °³¿ä¿Í ¸ð¹ÙÀÏ Æ÷·»½ÄÀ» ...more
Track > Session : Forensics and Security / e-Goverment > Digital Forensics
¹ßÇ¥Á¦¸ñ : Forensics-related Laws and Legal Issues
¹ßÇ¥ÀÚ : ¼º¼±Á¦ (±³¼ö/Çѳ²´ë)
°­¿¬¿ä¾à : ¹Ì±¹Àº ÀÌ¹Ì 2006³â12¿ùºÎÅÍ µðÁöÅÐ Áõ°Å¿¡ ´ëÇÑ Á¦ÃâÀ» Á¤´çÈ­ÇÏ´Â e-discovery Á¦µµ¸¦ µµÀÔÇÑ ¹Ù ÀÖÀ¸¸ç, ÀÌ°ÍÀº ÀÌ¹Ì ±Û·Î¹ú ±â¾÷¿¡ ¿µÇâÀ» ¹ÌÄ¡°í ÀÖ´Ù. ¹Ì±¹ÀÇ e-discovery Á¦µµ´Â WTO, ISO µîÀ» Åë ÇÏ¿© ±¹Á¦È­ ºÐÀ§±â°¡ °íÁ¶µÇ°í ÀÖ´Ù. ÇÏÁö¸¸ ±¹³»ÀÇ µðÁöÅÐ Æ÷·»½Ä¿¡ °üÇÑ Ç¥ÁØ ¹× ¹ýÁ¦µµ´Â ¸Å¿ì ¹ÌºñÇÑ Æí...more
Track > Session : Forensics and Security / e-Goverment > Privacy Issues
¹ßÇ¥Á¦¸ñ : Stealing User Account : A Serious Problem in Online Game Security Area
¹ßÇ¥ÀÚ : ÀÌÈ£¿õ (¼±ÀÓ/AnhLab)
°­¿¬¿ä¾à : ÃÖ±Ù »çȸÀûÀ¸·Î ¿Â¶óÀÎ »ó¿¡¼­ÀÇ »ç¿ëÀÚ °èÁ¤ ÇØÅ·ÀÌ Å« À̽´°¡ µÇ°í ÀÖÀ¸¸ç, ÀÌ·¯ÇÑ »ç¿ëÀÚ °èÁ¤ ÇØÅ·Àº ÇØÅ·À» ÅëÇØ ±ÝÀüÀû À̵æÀ» ¹Ù·Î ÃëÇÒ ¼ö ÀÖ´Â ¿Â¶óÀÎ °Å·¡³ª ¿Â¶óÀÎ °ÔÀÓ¿¡¼­ ¸¹ÀÌ ¹ß»ýÇÏ °í ÀÖ´Ù. ƯÈ÷, Å»ÃëµÈ °èÁ¤ Á¤º¸´Â ÇØÅ·À̳ª ¸íÀÇ µµ¿ë µî ºÒ¹ýÀûÀÎ ÇàÀ§¿¡ ¾Ç¿ëµÉ °¡´É¼ºÀÌ ³ô±â ¶§¹® ¿¡, 2Â÷ ...more
Track > Session : Forensics and Security / e-Goverment > Privacy Issues
¹ßÇ¥Á¦¸ñ : Digital Identity Management for Privacy Protection
¹ßÇ¥ÀÚ : Áø½ÂÇå (ÆÀÀå/ETRI)
°­¿¬¿ä¾à : ¸î ³âÀü ¸®´ÏÁö ¸íÀǵµ¿ë »ç°Ç°ú ´ëÅë·É°ú ±¹¹«ÃѸ®ÀÇ ÁֹιøÈ£°¡ µµ¿ëµÇ¾î °¢Á¾ °ÔÀÓ»çÀÌÆ®¿Í ¼º ÀλçÀÌÆ®¿¡ °¡ÀÔµÈ »ç½ÇÀÌ º¸µµµÇ¸é¼­, »çȸÀûÀ¸·Î °³ÀÎÁ¤º¸º¸È£¿¡ ´ëÇÑ À̽´°¡ Å©°Ô ºÎ°¢µÈ ÀûÀÌ ÀÖ¾ú´Ù. ±×·±µ¥ ±×·± ±â¾ïÀÌ Èñ¹ÌÇØÁú ¹«·ÆÀÎ ±Ý³â ÃÊ¿¡ ¿ì¸®³ª¶ó ÀÎÅÍ³Ý ÀÌ¿ëÀÚÀÇ 3ºÐÀÇ 1¿¡ ÇØ´ç ÇÏ ´Â õ ¸¸¸íÀÌ ...more
Track > Session : Forensics and Security / e-Goverment > Privacy Issues
¹ßÇ¥Á¦¸ñ : Emerging Healthcare Information Technologies and the Future of Privacy
¹ßÇ¥ÀÚ : ±èÀÏ°ï (±³¼ö/°æºÏ´ë)
°­¿¬¿ä¾à : À¯ºñÄõÅͽº ±â¼úÀÇ ÁÖ¿ä È°¿ë ¿µ¿ªÀÇ Çϳª·Î º¸°ÇÀǷḦ ¶°¿Ã¸° °ÍÀº ¹ú½á 3³âÀüÀÇ ÀÏÀÌÁö¸¸, ¿©Å ²¯ º°·Î ÀÌ·ç¾î ¿Â °Íµµ ¾ø´Ù. ¿Ö ÀÌ·± ÀÏÀÌ ÀϾ°í ÀÖ´ÂÁö¸¦ ¿µ¿ªÀÇ º¹Àâµµ¿Í ±â¼úÀÇ ÇѰ踦 °í·Á ÇØ º¸°íÀÚ ÇÑ´Ù. Àαǰú ¸ñ¼û µÑ Áß Çϳª¸¦ ¼±ÅÃÇ϶ó°í Çϸé ÀÌ°ßÀÌ ¾ø´Ù. Çѹߦ¸¸ ¹°·¯¼­ À־ »ç »ýÈ° ħÇØ¿¡ ...more
 01 02 03 04 05 06 07 08 09