원문정보
보안공학연구지원센터(IJDTA)
International Journal of Database Theory and Application
Vol.8 No.2
2015.04
pp.223-234
목차
Abstract
1. Introduction
2. Related Works
3. Proposed Scheme
3.1 Jumping Emerging Patterns
3.2 Revealed the Most Effective Mode Hopping
4. Experimental Results
5. Conclusions
Acknowledgements
References
1. Introduction
2. Related Works
3. Proposed Scheme
3.1 Jumping Emerging Patterns
3.2 Revealed the Most Effective Mode Hopping
4. Experimental Results
5. Conclusions
Acknowledgements
References
저자정보
참고문헌
자료제공 : 네이버학술정보