http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
정충교 江原大學校 産業技術硏究所 2004 産業技術硏究 Vol.24 No.B
Quality services such as the integrated service and the differentiated service have been expected to be supported by public Internet as multimedia applications proliferate. Despite a lot of techniques for quality services have been devised, the prospect for the deployment of these techniques is not clear yet. In this research feasibility of real world quality service is investigated based on former experiments and recent trends in Internet applications. User network-based quality services are considered as the most feasible and economic short-term solution, which are also flexible in nature. Milestones and key technologies for some specific public network-based quality services are also described.
정충교 강원대학교 정보통신연구소 1997 정보통신논문지 Vol.1 No.-
Integration of ISDN and Internet service will promote networking of home PC's and change the PC networking architecture. In a new PC network architecture, the relationship between various network service elements will also change. In this paper, the direction of change in PC network configuration and protocol architecture is investigated, based on the closedness of existing PC network and open characteristics of Internet. Key requirements for the new network environment among general features of ISDN are also provided.
정충교 江原大學校 産業技術硏究所 2008 産業技術硏究 Vol.28 No.A
Wireless carrier sense multiple access (CSMA) systems are widely used but show extremely different transmission efficiency according to the operation environment. Simulation or prototype deployment is needed to see the transmission efficiency of a wireless CSMA system with the partial packet retransmission scheme. The lower bound for the transmission efficiency of such a system is found mathematically in this work. This shows how much the partial packet retransmission scheme improves the transmission efficiency quantitatively. It also shows that the maximum throughput is obtained at higher offered load compared to the conventional CSMA system without the partial packet transmission. The result of this work can be applied to IEEE 802.11 networks or wireless mesh networks.
대학 프로그래밍 입문 수업에서 짝 프로그래밍의 효과 : 학습성과와 학생 만족도 측면에서
정충교 한국정보교육학회 2017 정보교육학회논문지 Vol.21 No.5
대학교 프로그래밍 입문 수업에 짝 프로그래밍 방식의 실습을 도입하여 운영한 경험과 교훈을 소개한다. 짝 프로 그래밍을 적용하지 않은 반과 적용한 반의 수업 성과와 설문조사 데이터를 통해 짝 프로그래밍의 효과를 분석하였 다. 그 결과 상당 수준의 짝 프로그래밍 성과가 관찰되었지만 짝 프로그래밍 방식으로 실습한 학생 전반적으로 효과 가 있다고 보기는 어려웠다. 일부 학생들에게서는 뚜렷한 학습 성과가 있었고 일부 학생들은 그렇지 못하였다. 짝을 어떻게 지어 주는가가 수업 성과와 학생 만족도에 영향을 주는 매우 중요한 요소임이 설문조사를 통해 드러났다. 이 수업 운영 경험을 바탕으로 짝 짓는 방안을 포함하여 짝 프로그래밍을 수업에 적용하는 방법을 제시한다. This paper presents the results of adopting pair programming practices in an introductory university programming course. The effectiveness of pair programming is analyzed by comparing the performance and survey data gathered from the experimental class that adopted the practice to those from the control class that did not. An analysis of the performance data found that pair programming improved student performance; however, not all students in the pair programming class benefited from the practice as only some students showed clear improvements in learning outcomes. The survey showed that the specific method for matching students into pairs is a critical factor affecting their performance and satisfaction. Based on the lessons learned from this pair programming class, I propose some suggestions and guidelines for applying pair programming to programming classes including ‘pair matching’.
공격자의 자원소진특성을 이용한 분산서비스불능화 (DDoS) 공격에 대한 방어
정충교 江原大學校 産業技術硏究所 2007 産業技術硏究 Vol.27 No.B
A novel DDoS (Distributed Denial-of-Service) defense technique, Exaustiveness-Based Detection, is proposed in this work. It dispenses with the network congestion and the unfairness between users of the Defense-by-Offense technique by incorporating a kind of simple Detect-and-Block scheme (user identification), still improving the effectiveness of the defense in comparison to the original Defense-by-Offense technique, It uses SYN cookies to identify users in the granularity of ip address and to prevent ip address spoofing by the attacker. There can be, however, some probability of false negative (denying service to good clients), if the attacker wisely adapt to the new technique by saving some portion of its bandwidth resource and later mimicking good clients. Quandtadve analysis the requirement for the good clients to be safe from the false negative is provided and a procedure to design the server capacity is explained.
예약 알로하 방식 매체접속제어 프로토콜에서의 채널 할당
정충교 대한전자공학회 1999 電子工學會論文誌, S Vol.s36 No.3
일대다 형상을 갖는 통신시스템에서 많이 고려되는 예약 알로하 방식 매체접속제어 프로토콜의 성능은 예약 채널과 데이터 채널의 분배 양식에 의해 달라진다. 본 논문에서는 이 프로토콜을 직렬 2단 대기열 모델로 근사화하고, 데이터의 지연을 성능 척도로 하여 이를 줄이는 세가지 채널 할당 방식을 제시하였다. 그리고 이들에 대한 모의실험을 통해 그 동작 특성을 규명하고 성능을 평가하였다. 그 결과 이들의 성능은 트래픽의 특성, 특히 데이터 길이의 분산에 크게 의존하며, 일반적으로는 데이터에 우선권을 주는 방식이 우수하나, 데이터 길이의 분산이 큰 경우에는 비례배분 할당 방식이 우수한 것으로 평가되었다.
문덕수,정충교 강원대학교 정보통신연구소 1998 정보통신논문지 Vol.2 No.-
In this paper, we propose LCSN(Low-Coherent Separation Network) structure which is able to substitute for the NBGN(Nonblocking Binary Group Network) proposed by H.Saidi. Proposed structure uses a combinatorial logic to decide the output port in each stage instead of using the running adder which suffers from long propogation delay. This LCSN structure has some advantages over NBGN : First, it can be extended to a large scalce switch due to low coherence among input ports. Second, it has less gate delay and gate count.