2013
Á¦ 15ȸ Çѱ¹ ¼ÒÇÁÆ®¿þ¾î°øÇÐ Çмú´ëȸ ³í¹®Áý

Proceedings of the 15th Korea Conference on Software Engineering (KCSE 2013)

 


¡¡

 

 

 

¡¡

ÁÖÃÖ:   Çѱ¹Á¤º¸°úÇÐȸ, Çѱ¹Á¤º¸Ã³¸®ÇÐȸ
¡¡

ÁÖ°ü:   Çѱ¹Á¤º¸°úÇÐȸ ¼ÒÇÁÆ®¿þ¾î°øÇÐ ¼Ò»çÀ̾îƼ

Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ¼ÒÇÁÆ®¿þ¾î°øÇÐ ¿¬±¸È¸

Çѱ¹ÀüÀÚÅë½Å¿¬±¸¿ø
¡¡

ÈÄ¿ø:  Á¤º¸Åë½Å»ê¾÷ÁøÈï¿ø SW°øÇм¾ÅÍ, ¢ßÄÉÀÌƼ, ¢ßºñÆ®ÄÄÇ»ÅÍ, ¢ß´ÙÇÑÅ×Å©, ¢ß¼Ö·ç¼Ç¸µÅ©, ½´¾î¼ÒÇÁÆ®Å×Å©¢ß,
(ÁÖ)¾ÅÅ©Æ÷ºñ¿¤, STAÅ×½ºÆÃÄÁ¼³Æâß, LG CNS, ÀÌ¿¡½ºÁö¢ß, ¢ßÀÎÁö¼ÒÇÁÆ®, Çö´ë¿¥¿£¼ÒÇÁÆ®¢ß

¡¡

¡¡

¡¡


¡¡

ÃÊ´ëÀÇ ±Û

 

 

2013³âÀ» ¸ÂÀÌÇÏ¿© Çѱ¹ ¼ÒÇÁÆ®¿þ¾î°øÇÐ Çмú´ëȸ Âü°¡ÀÚ ¿©·¯ºÐÀÇ ¹«±ÃÇÑ ¹ßÀüÀ» ±â¿øÇÕ´Ï´Ù.

 

±â¾÷, ¿¬±¸¼Ò ¹× Çа迡¼­ È°µ¿ÇÏ°í °è½Å ¼ÒÇÁÆ®¿þ¾î°øÇÐ °ü·Ã Àü¹®°¡µéÀÇ ¸ðÀÓÀÎ Çѱ¹Á¤º¸°úÇÐȸÀÇ ¼ÒÇÁÆ®¿þ¾î°øÇÐ ¼Ò»çÀ̾îƼ¿Í Çѱ¹Á¤º¸Ã³¸®ÇÐȸÀÇ ¼ÒÇÁÆ®¿þ¾î°øÇבּ¸È¸¿¡¼­´Â ¿©·¯ »ê¾÷ºÐ¾ß¿¡¼­ ¼ÒÇÁÆ®¿þ¾î°øÇÐÀÇ Á߿伺ÀÌ ³¯·Î ºÎ°¢µÇ°í ¼ÒÇÁÆ®¿þ¾î ±â¼úÀÌ ¹Ì·¡ ±¹°¡ ¹ßÀü¿¡ Áß¿äÇÑ ºÎºÐÀ¸·Î ÀνĵǴ ½ÃÁ¡¿¡¼­ ¼ÒÇÁÆ®¿þ¾î°øÇÐ ±â¼úÀÇ ¹ßÀü°ú Àû¿ëÀÇ È®´ë¸¦ µµ¸ðÇÏ°íÀÚ »ê, ÇÐ, ¿¬À» Áß½ÉÀ¸·Î ÇÏ´Â Á¦ 15ȸ Çѱ¹ ¼ÒÇÁÆ®¿þ¾î°øÇÐ Çмú´ëȸ(KCSE 2013)¸¦ °³ÃÖÇÏ°Ô µÇ¾ú½À´Ï´Ù.

 

1¿ù 30ÀϺÎÅÍ 2¿ù 1ÀϱîÁö °­¿øµµ º¸±¤ÈִнºÆÄÅ©¿¡¼­ °³ÃֵǴ À̹ø Çмú´ëȸ¿¡¼­´Â ƯÈ÷ ¡°½º¸¶Æ® ½Ã´ëÀÇ ÁøÈ­¸¦ À§ÇÑ ¼ÒÇÁÆ®¿þ¾î°øÇÐ ¿ø¸®¡±À» ÁÖÁ¦·Î »ê, ÇÐ, ¿¬ °¢°è¿¡¼­ Á¦ÃâÇÑ ³í¹® 80¿©ÆíÀÌ ¹ßÇ¥µË´Ï´Ù.

 

¶ÇÇÑ ¼ÒÇÁÆ®¿þ¾î°øÇÐ ÀÌ·Ð, ±³À°, ½Å±â¼ú ¹× °ü·Ã »ê¾÷ü ±â¼ú ºÐ¾ß ¼Ò°³ µî ÃÑ 6°³ÀÇ À¯ÀÍÇÑ Æ©Å丮¾óÀÌ ÁغñµÇ¾î ÀÖ°í World Best Software(WBS)¿Í Software Visualization ¹× Áß¼Ò SW ±â¾÷ÇöÀå Àû¿ë ¿ì¼ö »ç·Ê ¼Ò°³, ±×¸®°í Cyber-Physical Systems(CPS) °ü·Ã ÃÊû ¼¼¼Çµµ ÁøÇàµË´Ï´Ù. ¾Æ¿ï·¯ ¼ÒÇÁÆ®¿þ¾î »ê¾÷ ¹ßÀüÀÇ ½Ç¹«¸¦ ´ã´çÇÏ°í °è½Å Àú¸íÀλç 2ºÐÀÇ ±âÁ¶¿¬¼³µµ ÀÖ½À´Ï´Ù. ³í¹® ¹ßÇ¥´Â ¸ðµ¨ ¹× Á¤Çü±â¹ý, SW Ç°Áú ¹× Å×½ºÆ®, °ü¸® ¹× ÇÁ·Î¼¼½º, ¿ä±¸°øÇÐ, SW ¾ÆÅ°ÅØó, SW Àç»ç¿ë ¹× SPLE, ÀûÀÀÇü SW, ¸ð¹ÙÀÏ SW, ÀÓº£µðµå SW, ¼­ºñ½º, ¿ÂÅç·ÎÁö, SW ÀÀ¿ë µî ´Ù¾çÇÑ ÁÖÁ¦ÀÇ ¼¼¼ÇÀ¸·Î ±¸¼ºµÇ¾î ÁøÇàµÇ¾î °ü·Ã ÁÖÁ¦¿¡ ´ëÇÑ È°¹ßÇÑ Á¤º¸±³È¯°ú Åä·ÐÀÇ ÀåÀÌ ¿­¸± °ÍÀÔ´Ï´Ù.

 

º» Çмú´ëȸ°¡ Çѱ¹ÀÇ ¼ÒÇÁÆ®¿þ¾î°øÇÐÀÇ Çй®Àû ¹ßÀü°ú ¼ÒÇÁÆ®¿þ¾î »ê¾÷±â¼ú ¹ßÀüÀÇ Å« ÀåÀÌ µÇ´Â ¸¸Å­, È°¹ßÇÑ Çмú ¹× ±â¼ú ±³·ù´Â ¹°·Ð °ÝÀÇ ¾ø´Â Åä·ÐÀÇ ÀåÀÌ µÉ ¼ö ÀÖµµ·Ï ¿©·¯ºÐÀÇ ¸¹Àº Âü¿©¸¦ ºÎŹ µå¸³´Ï´Ù. À̹ø Çà»ç¸¦ À§ÇØ ¼ö°íÇØ ÁֽŠ´ëȸ Áغñ À§¿øµé°ú ÈÄ¿øÇØ ÁֽŠ±â°ü ¿©·¯ºÐ²² Áø½ÉÀ¸·Î °¨»ç¸¦ µå¸³´Ï´Ù.

 
¡¡

Çѱ¹Á¤º¸°úÇÐȸ ¼ÒÇÁÆ®¿þ¾î¼Ò»çÀ̾îƼ ȸÀå ÇÑÇõ¼ö
Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ¼ÒÇÁÆ®¿þ¾î°øÇבּ¸È¸ ¿î¿µÀ§À§¿øÀå ÀÌÀº¼®

¡¡


¡¡

¡¡

Çмú´ëȸ Áغñ À§¿øȸ

 

°øµ¿ ´ëȸÀå: ÇÑÇõ¼ö ±³¼ö(»ó¸í´ëÇб³), ÀÌÀº¼® ±³¼ö(¼º±Õ°ü´ëÇб³)

Á¶Á÷ À§¿øÀå: ±Ç±âÇö ±³¼ö(°æ±â´ëÇб³)

Á¶Á÷À§¿ø±è¿µÃ¶ ±³¼ö(È«ÀÍ´ë), ±èöÁø ±³¼ö(ÀÎÇÏ°øÀü), ±èÄ¡¼ö ±³¼ö(°øÁÖ´ë), ¹Ú»çõ ¹Ú»ç(ETRI), ¹éÁ¾¹® ±³¼ö(KAIST), ¼­ÁÖ¿µ ±³¼ö(¾ÆÁÖ´ë), À¯Áعü ±³¼ö(°Ç±¹´ë), À¯Ã¶Áß ±³¼ö(ÀüºÏ´ë),

À̺´°É ±³¼ö(¼­¿ï¿©´ë), À̺´Á¤ ±³¼ö(¼­¿ï½Ã¸³´ë), À̼¼¿µ ¹Ú»ç(NIPA SW°øÇм¾ÅÍ), ÀÌÁ¤¿ø ±³¼ö(¾ÆÁÖ´ë), ÀÌÂù±Ù ±³¼ö(Áß¾Ó´ë), Á¤È­¿µ ±³¼ö(°æÈñ´ë), Á¶Àº¼÷ ±³¼ö(¼­ÀÏ´ë),

Â÷¼º´ö ±³¼ö(°í·Á´ë), ÇÏ¾á ±³¼ö(°æÀο©ÀÚ´ëÇÐ), ÇÑÁ¤¶õ ±³¼ö(Çù¼º´ë), Ȳ¼®Çü ±³¼ö(¼±¹®´ë)


ÇмúÀ§¿øÀå: °íÀοµ(KAIST)

ÇмúÀ§¿ø°­¹®¼³ ±³¼ö(±¤ÁÖ´ë), °­¼º¿ø ±³¼ö(KAIST), ±è¹®ÁÖ ±³¼ö(KAIST), ±èÀ¯ÀÏ ¹Ú»ç(»ï¼ºÀüÀÚ), ±èÁ¤¾Æ ±³¼ö(°üµ¿´ë), ±èÅÂÈ£ ¹Ú»ç(ETRI), ³²¿µ±¤ ±³¼ö(¿¬¼¼´ë),

¹Î»óÀ± ¹Ú»ç(¼Ö·ç¼Ç¸µÅ©), ¹Ú¸íȯ ±³¼ö(°ø±º»ç°üÇб³), ¹Ú¼öÁø ±³¼ö(¼­°­´ë), ¹Ú¿ë¹ü ±³¼ö(´Ü±¹´ë), ¿°±ÙÇõ ±³¼ö(ºÎ»ê´ë), ¿ÀÀç¿ø ±³¼ö(Ä«Å縯´ë), À±È¸Áø ±³¼ö(Çù¼º´ë),

ÀÌ°ü¿ì ±³¼ö(ÇѼº´ë), À̱٠¹Ú»ç(»ï¼ºÀüÀÚ), ÀÌ¿ìÁø ±³¼ö(°æºÏ´ë), ÀÌÀº¼­ ±³¼ö(¾Èµ¿´ë), ÀÌÁöÇö ±³¼ö(´ëÀü´ë), ÀÎÈ£ ±³¼ö(°í·Á´ë), Á¤ÇýÁ¤ ±³¼ö(ÆòÅôë), Áø¿µÅà ±³¼ö(Çѹç´ë),

äÈï¼® ±³¼ö(ºÎ»ê´ë), È«ÀåÀÇ ±³¼ö(ÃæºÏ´ë)

¡¡

¡¡


¡¡

¸ñ  Â÷

¡¡

 

Æ©Å丮¾ó

T1: »ê¾÷ü Æ©Å丮¾ó 1

Architecture for Cloud, Ucloud for Architecture

¼Û¼ø¿ë ÆÀÀå(KT)

¡¡

Ucloud ¼­ºñ½º ¹× Academy Program ¼Ò°³

ÀÌÇöÁÖ ÆÀÀå(KT)

 

T2: ¼ÒÇÁÆ®¿þ¾î°øÇÐ ÀÌ·Ð Æ©Å丮¾ó

¼ÒÇÁÆ®¿þ¾î ¾ÆÅ°ÅØó ¼³°èÀÇ ±Ùº»¿ø¸®µé

°­¼º¿ø ±³¼ö(KAIST)

 

T3: ¼ÒÇÁÆ®¿þ¾î°øÇÐ ½Å±â¼ú Æ©Å丮¾ó 1

Combinatorial Test Design and Its Applications

À±ÀÏö ±³¼ö(SUNY Korea)

 

T4: »ê¾÷ü Æ©Å丮¾ó 2

Ŭ¶ó¿ìµå ±â¹ÝÀÇ ½º¸¶Æ®¿öÅ© (A journey to the Smart Working Era on the Cloud)

½ÅâÇö ÆÀÀå(LGCNS)

 

T5: ¼ÒÇÁÆ®¿þ¾î°øÇÐ ±³À° Æ©Å丮¾ó

¼ÒÇÁÆ®¿þ¾î °øÇÐ ±³À° ½Ç¹«Àû Á¢±Ù¹ý

ÃÖÀº¸¸ ±³¼ö(µ¿±¹´ë)

 

T6: ¼ÒÇÁÆ®¿þ¾î°øÇÐ ½Å±â¼ú Æ©Å丮¾ó 2

Towards Dependable and Secure Software: Requirements Engineering Approach

À̼®¿ø ±³¼ö(¾ÆÁÖ´ë)

 

°ü¸® ¹× ÇÁ·Î¼¼½º

CMMIÀÇ GP¿Í SP°£ ¿¬°ü¼º¿¡ °üÇÑ ½ÇÁõÀû¿¬±¸ [¹Ú»ç³í¹®]

À̹ÎÀç(¼þ½Ç´ë)

 

¼ÒÇÁÆ®¿þ¾î ÇÁ·ÎÁ§Æ® °èȹ¿¡¼­ÀÇ ±¸Ã¼Àû ½Ç¹«À̽´¸¦ ¹Ý¿µÇÑ ÀÚµ¿È­µÈ ÀηÂÇÒ´ç±â¹ý [ÃÖ¿ì¼ö³í¹®]

È­Áö¹Î, ¹ÚÁöÈÆ, ½Åµ¿È¯, È«±¤ÀÇ, ¼­¿µ¼®, ¹è±â°ï, ¹èµÎȯ(KAIST)

 

SW°øÇмöÁØ, Á¶Á÷º¯È­Àνİú ÇÁ·ÎÁ§Æ®¼º°ú [»ê¾÷ü³í¹®]

±è½Â±Ç(NIPA SW°øÇм¾ÅÍ)

 

SI°³¹ß ÇÁ·ÎÁ§Æ®¿¡ Àû¿ëµÈ Ç°Áú°ü¸®Ã¼°è [»ê¾÷ü³í¹®]

¹ÚÁ¾¸ð, ÀÌÀç´ö(NIPA SW°øÇм¾ÅÍ)

±¹³»±â¾÷ Àû¿ë»ç·Ê ¿¬±¸¿¡ ±â¹ÝÇÑ ¾ÖÀÚÀÏ SW °³¹ß 101 [»ê¾÷ü³í¹®]

À̼¼¿µ(NIPA SW°øÇм¾ÅÍ)

 

ÇÁ·Î±×·¡¸Ó ÇàÀ§ ¸ÞÆ®¸¯½º(PBM)

±è¹ÎÈ£, ¹Î»óÀ±(KAIST), ¹ÎÇö±â(SK C&C)

 

¼ÒÇÁÆ®¿þ¾î °³¹ß¿¡¼­ ½É¸®ÇÐÀÇ Á߿伺 [¿ì¼ö»ê¾÷ü³í¹®]

¼ÒÁ¤¿¬(»ï¼ºÀüÀÚ/KAIST), ÃÖâÁø(ÆÃÅ©¿þ¾î/KAIST), Çѽ¹ü(°í¿µÅ×Å©³î·¯Áö/KAIST), ¹Î»óÀ±(¼Ö·ç¼Ç¸µÅ©/KAIST)

 

¿ä±¸°øÇÐ

»ç¿ëÀÚ ÀÇ°ß¿¡¼­ ¿ä±¸»çÇ×À» ÃßÃâÇϱâ À§ÇÑ ÇÁ·Î¼¼½º ¹× ±â¹ý [¹Ú»ç³í¹®]

º¯Á¤¿ø(¼þ½Ç´ë)

 

À¯ÁîÄÉÀ̽º ½Ã³ª¸®¿À¿¡¼­ À¯ÁîÄÉÀ̽º ÆÐÅÏÀ» ÀÌ¿ëÇÑ ¿ä±¸»çÇ× ´ëü È帧 Ãßõ ±â¹ý [ÃÖ¿ì¼ö³í¹®]

±èÀ¯¸², °í´öÀ±, ¹Ú¼ö¿ë(¼­°­´ë), ±èÁøÅÂ(¼ÒÇÁÆ®¿þ¾î°øÇп¢½ºÆÛÆ®±×·ì)

 

¿Ö âÀÇÀûÀÎ ¿ä±¸»çÇ×ÀÌ ³ª¿ÀÁö ¾ÊÀ»±î? [»ê¾÷ü³í¹®]

±èÁ¾¿í(»ï¼ºÀüÀÚ/KAIST)

 

À¯½ºÄÉÀ̽º±â¹ÝÀÇ »ç¿ëÁ᫐ ¿ä±¸»çÇ× ¸í¼¼ [´ÜÆí³í¹®]

±èÁ¤¹Î, ÇÑÇõ¼ö(»ó¸í´ë)

»ç¿ëÀÚ Needs ±â¹ÝÀÇ ¿ä±¸°øÇÐ ¿¬±¸

¹Úº¸°æ(È«ÀÍ´ë), ±è±âµÎ(TTA), ±è¿µÃ¶, ¹Úº´È£(È«ÀÍ´ë)

 

¸ð¹ÙÀÏ°ú Social Network Service(SNS)±â¼ú¿¡ ±â¹ÝÇÑ Çù¾÷Àû ¿ä±¸»çÇ× °ü¸® ¹æ¹ý [»ê¾÷ü³í¹®]

±è¹®¼ö(»ï¼ºÀüÀÚ/KAIST), À±»óö(VMS Solutions/KAIST), ±èÁ¾¿í(»ï¼ºÀüÀÚ/KAIST), Á¤ÀºÈ­(LGÀüÀÚ/KAIST), ¹Î»óÀ±(¼Ö·ç¼Ç¸µÅ©/KAIST)

 

A»çÀÇ ½º¸¶Æ®ÆùÀ» À§ÇÑ ¼ÒÇÁÆ®¿þ¾î ¿ä±¸»çÇ× ÇÁ·Î¼¼½º °³¼± [»ê¾÷ü³í¹®]

Â÷¿µÅÂ, À̼öÁø, ÀÓÁ¤¹¬(LGÀüÀÚ/KAIST)

 

AOP¸¦ ÀÌ¿ëÇÑ ISO/IEC 9126 ºñ±â´É ¿ä±¸»çÇ× ¶óÀ̺귯¸® [´ÜÆí³í¹®]

ÃÖÈñ¼º, ÃÖÀº¸¸(µ¿±¹´ë)

 

¸ðµ¨ ¹× Á¤Çü±â¹ý

Á¤Çü ±â¹ýÀ» ÀÌ¿ëÇÑ Å×½ºÆ® ¿À¶óŬ »ý¼º

±Ç·É±¸, ±Ç±âÇö(°æ±â´ë)

 

ÇÁ·ÎÁ§Æ®ÀÇ °í½Å·Ú¼º È®º¸¸¦ À§ÇÑ Á¤Çü ±â¹ý °¡À̵å¶óÀÎ

¹Ú»çõ, ±èÅÂÈ£, ÀÓä´ö(ETRI)

 

Development of Decommissioning Engineering System [»ê¾÷ü³í¹®]

¹Ú½Â±¹, ¹®Á¦±Ç(KAERI)

 

¾ÆÅ°ÅØó

À¯ºñÄõÅͽº ȯ°æ¿¡¼­ Àú¿ÂÀúÀå°í¸¦ Áö¿øÇϱâ À§ÇÑ ½º¸¶Æ® Àú¿ÂÀúÀå°í °ü¸®½Ã½ºÅÛ

¹é¼±Àç, ¹ÚÁؼ®, ³²Å¿ì, ÃÖ°æ¼®, ¿°±ÙÇõ(ºÎ»ê´ë)

 

ÅëÇÕ°³¹ß ȯ°æ ±â¹ÝÀÇ UML 2.0 ¸ðµ¨¸µ µµ±¸ÀÇ º¯È­ [»ê¾÷ü³í¹®]

Á¤¿¬´ë, ÀÓÁø¼ö(N3Soft)

 

ºÐ±âÁ¡ ±â¹Ý Æ®¸® ºÐ¼®À» ÅëÇÑ ¼ÒÇÁÆ®¿þ¾î Ŭ·¯½ºÅ͸µ °á°ú ºñ±³ [¿ì¼ö´ÜÆí³í¹®]

¾öÀçö, ÀÌÂù±Ù(Áß¾Ó´ë)

 

Ä¿¹Â´ÏƼ °ËÃâ±â¹ýÀ» ÀÌ¿ëÇÑ ¼ÒÇÁÆ®¿þ¾î ¾ÆÅ°ÅØÃÄ ¸ðµâ ºä º¹¿ø [¿ì¼ö´ÜÆí³í¹®]

±èÁ¤¹Î, ÀÌÂù±Ù(Áß¾Ó´ë)

 

SW Àç»ç¿ë ¹× SPLE

°³¹ßÀÚ Æ÷·³¿¡¼­ °æÇè Àç»ç¿ëÀ» À§ÇÑ ÅäÇÈ È帧 ºñ±³ ¹æ¹ý

ÀÌ¿øÁ¶, ¿À±³Áß, ÃÖÈ£Áø(KAIST)

 

¼ÒÇÁÆ®¿þ¾î Á¦Ç° ¶óÀο¡¼­ Çü»ó°ü¸®ÀÇ Çö½ÇÀûÀÎ À̽´¿Í ¹ßÀü ¹æÇâ [»ê¾÷ü³í¹®]

ÀÓÁØÇÐ(»ï¼ºÀüÀÚ/KAIST), ±èÀº¿µ, °­µ¿ÀÎ(LGÀüÀÚ/KAIST)

 

OSGi ÇÁ·¹ÀÓ¿öÅ©¿¡ ±â´í Á¦Ç°¶óÀÎ ¼ÒÇÁÆ®¿þ¾î °³¹ß Àû¿ë [´ÜÆí³í¹®]

¾çÁø¼®, °­±³Ã¶(Æ÷Ç×°ø´ë)

 

¼ÒÇÁÆ®¿þ¾î Á¦Ç°¶óÀÎ ¿ª°øÇÐ Áö¿øµµ±¸ [´ÜÆí³í¹®]

¸²Ã», ºóŸ¿À, ¾çÁø¼®, ÀÌÇý¼±, °­±³Ã¶(Æ÷Ç×°ø´ë)

 

Áö´ÉÇü ¼öÃâÅëÁ¦½Ã½ºÅÛÀÇ ÇÁ·¹ÀÓ¿öÅ© ¼³°è [´ÜÆí³í¹®]

±è»ê¼º, ±èÀÇÇö, ¼º¿ìö, À̹®¿ë(KAIST), ½Åµ¿ÈÆ(Çѱ¹¿øÀÚ·ÂÅëÁ¦±â¼ú¿ø)

 

SW Ç°Áú ¹× Å×½ºÆ®

A Bug Triage and Localization Technique based on Bug Reports Classification [¹Ú»ç³í¹®]

Tao Zhang, À̺´Á¤(¼­¿ï½Ã¸³´ë)

 

´ÜÀ§ Å×½ºÆ® ÄÉÀ̽º Àç»ç¿ë ±â¹ÝÀÇ ÇÔ¼ö »óÈ£ÀÛ¿ë Å×½ºÆà ±â¹ý [¹Ú»ç³í¹®]

½Å¿µ¼ú, ÀÌ¿ìÁø(°æºÏ´ë)

 

À¥ ±â¹ÝÀÇ °³ÀÎÁ¤º¸ À¯.³ëÃâ ´ëÀÀ ½Ã½ºÅÛ±¸Ãà ¹æ¾È: À̹ÌÁöÆÄÀÏ ´ë»óÀ¸·Î [»ê¾÷ü³í¹®]

±èÁ¾¹è(¼­¿ïµðÁöÅдë)

 

µ¿Àû ½½¶óÀ̰̽ú Á¤º¸°Ë»öÀ» ÀÌ¿ëÇÑ ¼­ºñ½º ÄÄÆ÷Áö¼ÇÀÇ Å×½ºÆ®ÄÉÀ̽º ¿ì¼±¼øÀ§±â¹ý [´ÜÆí³í¹®]

±ÇÁ¤Çö, °íÀοµ, Matt Staats, Gregg Rothermel(KAIST)

¹«±âü°è ³»ÀåÇü ¼ÒÇÁÆ®¿þ¾îÀÇ ½ÃÇè ¼º°ú ÁöÇ¥ ¼±Á¤ ¹× Àû¿ë ¹æ¾È¿¡ ´ëÇÑ ¿¬±¸ [»ê¾÷ü³í¹®]

±è»ó±â(LIG³Ø½º¿ø)

 

¹«±âü°è SW Ç°ÁúÃøÁ¤ ¹æ¾È ¿¬±¸ [»ê¾÷ü³í¹®]

±è¼¼ÀÏ, ±èÈ¿¼º(±¹¹æ±â¼úÇ°Áú¿ø)

 

¹«±âü°èÀÇ ¾ÈÀüÁ᫐ ¼ÒÇÁÆ®¿þ¾î¸¦ À§ÇÑ Æ÷°ýÀû ÇÁ·Î¼¼½º ÇÁ·¹ÀÓ¿öÅ© Á¦¾È [»ê¾÷ü³í¹®]

±è¸íÈ£(LIG³Ø½º¿ø)

ÀÚ¹Ù½ºÅ©¸³Æ® ±â¹Ý ½ÇÁ¦ À¥ ¾îÇø®ÄÉÀ̼ÇÀÇ ¿À·ù Á¶»ç

¾ÈÀç¹Î, ±è¹®ÁÖ(KAIST)

 

TMMi ±â¹ÝÀÇ ¹«±âü°è ¼ÒÇÁÆ®¿þ¾î ´ÜÀ§½ÃÇè ¼öÇà »ç·Ê ¹ßÇ¥ [»ê¾÷ü³í¹®]

ÀÌÁÖÇö, ÀÌÇýÁø, ÃÖ»óÅÃ(LIG³Ø½º¿ø)

 

Å×½ºÆ®ÄÉÀ̽ºÀÇ °áÇÔ½ÇÇàÈ®·üÀ» ÀÌ¿ëÇÑ Çâ»óµÈ °áÇÔ À§Ä¡ÃßÁ¤(fault localization) ±â¹ý [´ÜÆí³í¹®]

¹®¼®Çö, ±èÀ±È£, ±è¹®ÁÖ(KAIST)

 

»óÅÂ-ÀüÀÌ ´ÙÀ̾î±×·¥¿¡¼­ ºí·¢¹Ú½º ÆÛ¡À» Àû¿ëÇÑ ºñÀ¯È¿ Å×½ºÆ®ÄÉÀ̽º µµÃâ ¿¬±¸ [´ÜÆí³í¹®]

ÃÖ¼ö°æ, ¹Ú¿ë¹ü(´Ü±¹´ë)

Ŭ¶ó¿ìµå ¼­ºñ½ºÀÇ ¹ÂÅ×ÀÌ¼Ç Å×½ºÆÃÀ» À§ÇÑ BPEL ¹ÂÅÏÆ® »ý¼º ±ÔÄ¢ [ÃÖ¿ì¼ö³í¹®]

¹ÚÁø¼ö, È«ÀåÀÇ(ÃæºÏ´ë)

 

¼­ºñ½º ÁöÇâ ¾ÆÅ°ÅØó¿¡¼­ÀÇ ½Å·Ú¼º Æò°¡ ¿¬±¸ ºñ±³

¹ÚÁøÈñ, ¹éÁ¾¹®(KAIST)

 

È¿À²ÀûÀÎ ¾Èµå·ÎÀÌµå ¾ÖÇø®ÄÉÀÌ¼Ç Å×½ºÆ®¸¦ À§ÇÑ Å×½ºÆ®ÄÉÀ̽º ¼³°è ¹æ¾È [ÃÖ¿ì¼ö´ÜÆí³í¹®]

½Å¿ø, ¿Àö, ¹ÚµÎÈ£(°Ç±¹´ë), ±èÅ¿Ï(¸íÁö´ë), ÀåõÇö(°Ç±¹´ë)

 

Ŭ¶ó¿ìµå ÄÄÇ»Æà ȯ°æ¿¡ ÀûÇÕÇÑ ÅëÇÕ Á¢±ÙÁ¦¾î ¸ðµ¨ Á¦¾È [´ÜÆí³í¹®]

±èÀçÁø, Scott Uk-Jin Lee, Amna Al Dhaheri(ÇѾç´ë)

¼ÒÇÁÆ®¿þ¾î ¾ÈÀü¼º Çâ»óÀ» À§ÇÑ ÄÚµå ¸®ÆÑÅ丵 ±â¹ý

¹ÚÀçÁø, ±èµÎȯ, È«ÀåÀÇ(ÃæºÏ´ë)

 

¸®ÆÑÅ丵À» À§ÇÑ ¼º´É ±â¹ÝÀÇ ¹«ºê ¸Þ¼Òµå ¿µ¿ª ÃßÃâ ¹× ºÐ¼® ¿¬±¸

±Ç¿¹Áø(´Ü±¹´ë), ÀÌÁØÇÏ(¼­°­´ë), ¹Ú¿ë¹ü(´Ü±¹´ë)

 

¹ø¿ª±â, ÄÚµå »ý¼º±â ¹× ÄÄÆÄÀÏ·¯¸¦ À§ÇÑ °ËÁõ±â¹ý Á¶»ç

±èÀǼ·, À̵¿¾Æ, À¯Áعü(°Ç±¹´ë)

 

½ÃÅ¥¸®Æ¼ ÆÐÅÏÀ» Àû¿ëÇÑ ¼³°è ¸®ÆÑÅ丵 ¹æ¾È [´ÜÆí³í¹®]

¼Ûº´¼·, ÃÖÀº¸¸(µ¿±¹´ë)

°üÁ¡ÁöÇâ ÇÁ·Î±×·¡¹ÖÀÇ °üÁ¡ °£¼· ¹®Á¦ °³¼± ±â¹ý

±èÀº¼±, À̺´Á¤(¼­¿ï½Ã¸³´ë)

 

Specification By Example °ú Å°¿öµå±â¹Ý Å×½ºÆ® ÀÚµ¿È­¸¦ È°¿ëÇÑ ¾ÖÀÚÀÏ Å×½ºÆà [»ê¾÷ü³í¹®]

¿ÀÁ¤ÀÎ, ±è½Â¾Æ, ȲÁ¤¿ì(NTS)

 

»ç¿ëÀÚ »ý¼º ºÒº¯½ÄÀ» È°¿ëÇÑ À¥ ¾îÇø®ÄÉÀÌ¼Ç Å×½ºÆ® Ç°Áú Çâ»ó ¹æ¾È [´ÜÆí³í¹®]

¹Ú±Ôö, Matt Staats, °íÀοµ, Gregg Rothermel(KAIST)

 

¿ª°øÇÐÀ» À§ÇÑ È£Ãâ Æ®¸® ÅëÇÕ ±â¹ý [´ÜÆí³í¹®]

¹Î¼ºÇö, À±¼ºÇý, ¹Ú¼öÁø(¼­°­´ë)

 

ÀûÀÀÇü SW

¸ð¹ÙÀÏ »óȲÀÎ½Ä ¼­ºñ½ºÀÇ Ãß·Ð °á°ú ÀûÀÀÀ» À§ÇÑ Çǵå¹é ÇÁ·Î¼¼½º

½Å¼öÇý, °­ÅÂÁØ, ÃÖ°æ¼®, ¾È¿µ¹Î, ¹ÚÁؼ®, ¿°±ÙÇõ(ºÎ»ê´ë)

 

A Method for Semantically Distributing Information Across Multiple Displays

±èÀçÁ¤(KAIST ITÀ¶ÇÕ¿¬±¸¼Ò)

 

Hadoop »ó¿¡¼­ MapReduce ÀÀ¿ëÇÁ·Î±×·¥ Æò°¡ [¿ì¼ö´ÜÆí³í¹®]

±èÁؼö(´Ü±¹´ë), °­À±Èñ(¹é¼®´ë), ¹Ú¿ë¹ü(´Ü±¹´ë)

 

ÀÚ°¡ÀûÀÀ½Ã½ºÅÛÀ» À§ÇÑ Áý´ÜÁö¼º ¿ÂÅç·ÎÁö [´ÜÆí³í¹®]

¼­¿µ´ö, ±èÁ¤µ¿, ÀÎÈ£, ¹éµÎ±Ç(°í·Á´ë)

 

ÀÚÀ²ÄÄÇ»Æà ȯ°æ¿¡¼­ Áö½Ä°ü¸® ¹× °øÀ¯¸¦ À§ÇÑ ¿ÂÅç·ÎÁö ·¹Áö½ºÆ®¸® ¸ðµ¨ [´ÜÆí³í¹®]

À̼®ÈÆ(°í·Á´ë), Á¤µ¿¿ø(±º»ê´ë), ¹éµÎ±Ç(°í·Á´ë)

 

°Ô½ÃÀÚ µ¿¿µ»ó ±¤°í»ðÀԽýºÅÛ [´ÜÆí³í¹®]

±èÁ¤Çõ, ¹è¼±ºÀ, °­»ó±æ(ÀÎÇÏ´ë)

»ç¹° ÀÎÅÍ³Ý µð¹ÙÀ̽º Á¦¾î ¹× ÄÁÅؽºÆ® Ãß·ÐÀ» À§ÇÑ ÇÁ·¹ÀÓ¿öÅ© [¹Ú»ç³í¹®]

õµÎ¿Ï, ±è¼öµ¿{¼þ½Ç´ë}

 

ºñÁ¤»óÀû À̺¥Æ® ¿¹¹æÀ» À§ÇÑ ÀÚ°¡-ÀûÀÀ ½Ã½ºÅÛ

ÀÌÀÇÁ¾, ±èÁ¤µ¿, ÀÎÈ£, ¹éµÎ±Ç(°í·Á´ë)

 

ÀûÀÀÀû ¸ÅÇÎÁ¤º¸ ij½ÌÀ» ÅëÇÑ ´ë¿ë·® Ç÷¡½Ã ¸Þ¸ð¸® ÀúÀåÀåÄ¡ [´ÜÆí³í¹®]

Á¤»óÇõ(ÇѾç´ë), ±èÁö³ª,±èÁöÀº, ±è¼­¿¬(Çö´ë°í), ±èÈñÁ¤, ¼Û¿ëÈ£(ÇѾç´ë)

 

¼¾¼­ ³×Æ®¿öÅ©¿¡¼­ÀÇ ÀÚ°¡ À籸¼º ¹Ìµé¿þ¾î ¸ðµ¨ [´ÜÆí³í¹®]

Á¤ÇöÁØ, À̼®ÈÆ, ¹éµÎ±Ç(°í·Á´ë)

 

 

SW ÀÀ¿ë

¸Þ½ÃÁö º¯È¯À» À§ÇÑ ¸Þ½ÃÁö ÇÊµå ¸ÅÇÎ °ü°è ½Äº° ÀÚµ¿È­ ¹æ¹ý

±èÁø±Ô (KAIST)

 

»çÀ̹ö-¹°¸® ½Ã½ºÅÛÀÇ ECMLÀ» À§ÇÑ ½Ã¹Ä¸µÅ© XMI º¯È¯±â °³¹ß

¼ÕÇö½Â(È«ÀÍ´ë), ±è¿ì¿­(´ë±¸±³À°´ë), ÀüÀΰÉ, ÀüÀçÈ£(ETRI), ±è¿µÃ¶(È«ÀÍ´ë)

 

¿¬±¸¿µ¿ª¿¡¼­ °áÇմܾ¼­ Àü¹®¿ë¾î °ËÃâ ¹× ±¸¼Ó·Â°­ÇÑ ´Ü¾îƯ¼º ºÐ¼®¿¡ °üÇÑ ¿¬±¸

Á¤¿µ¼·, ÀÓä±Õ, ±è½Â¼®, ÃÖÈ£Áø(KAIST)

 

UAV Áß°è±â¹Ý MANETÀÇ ¾ßÀü¿î¿ë¼º´É ÃÖÀûÈ­ ¸ðµ¨°³¹ß [»ê¾÷ü³í¹®]

¹Ú¿µ±Ô, ±è¼¼ÀÏ(±¹¹æ±â¼úÇ°Áú¿ø)

 

½º¸¶Æ® TV ¿ë °í¼Ó IO ±â¹ý [´ÜÆí³í¹®]

Á¤Ã¢ÈÆ, ȲÅÂÈ£, ±è±ÔÀÏ, ¿øÀ¯Áý(ÇѾç´ë)

 

¸ð¹ÙÀÏ SW

µ¿Àû ¸ð¹ÙÀÏ ¿¡ÄڽýºÅÛÀÇ Ç°Áú°ü¸®¸¦ À§ÇÑ ÇÁ·¹ÀÓ¿öÅ© [¹Ú»ç³í¹®]

¿À»óÇå, ±è¼öµ¿(¼þ½Ç´ë)

 

MVCÆÐÅϱâ¹ÝÀÇ ¸ð¹ÙÀÏ ¾ÖÇø®ÄÉÀÌ¼Ç ¸ðµ¨

¼­¿ëÁø, ±èÇö¼ö(Ãæ³²´ë)

 

¾Èµå·ÎÀ̵å ÀÎÅÙÆ® ¸ÞÄ¿´ÏÁòÀÇ È®ÀåÀ» ÅëÇÑ µ¿Àû ÄÚµå Àç»ç¿ë [´ÜÆí³í¹®]

¾È¼öÁ¤, ±èº´È£, ±èÁøõ(°æ¼º´ë)

 

¼­ºñ½º

¼­ºñ½º ±â¹Ý ¾îÇø®ÄÉÀ̼ÇÀ» À§ÇÑ Á¤Àû ¹× µ¿Àû ÀûÀÀ ÇÁ·¹ÀÓ¿öÅ© [¹Ú»ç³í¹®]

¶óÇöÁ¤, ±è¼öµ¿(¼þ½Ç´ë)

 

À¯ºñÄõÅͽº ÄÄÇ»ÆÃÀ» À§ÇÑ ¿ÂÅç·ÎÁö ±â¹Ý ¼­ºñ½º ¸ðµ¨¸µ ¹× ÇÕ¼º ±â¹ý [¹Ú»ç³í¹®]

À̹̿¬, ÀÌÁ¤¿ø(¾ÆÁÖ´ë), ¹Ú½Â¼ö(ÀÌÈ­¿©´ë)

 

ÀÓ¹« »óȲ Áß½ÉÀÇ µ¿Àû ¼­ºñ½º Á¶ÇÕ ÇÁ·¹ÀÓ¿öÅ©

½Å»óº¹, ±¸Çü¹Î, °íÀοµ(KAIST)

 

ÀÓº£µðµå SW

ÀÌÁ¾ ¸ð¹ÙÀÏ ÀÓº£µðµå Ç÷§ÆûÀ» À§ÇÑ ¸ðµ¨ º¯È¯ ÇÁ·¹ÀÓ¿öÅ© ¿¬±¸ [¹Ú»ç³í¹®]

±è¿ì¿­(´ë±¸±³À°´ë), ±è¿µÃ¶(È«ÀÍ´ë)

 

¹«±âü°è ¼ÒÇÁÆ®¿þ¾î °³¹ß ¹× °ü¸® Áöħ Àû¿ë »ç·Ê: ±âµ¿¹«±â ³»ÀåÇü ½Ç½Ã°£ Á¦¾î ½Ã½ºÅÛ¿ë RTOS ±â¼ú °³¹ß [»ê¾÷ü³í¹®]

¸¶À¯½Â, ¿ì´ö±Õ, ¸¶Æò¼ö(ETRI)

 

½Ç½Ã°£ ÀÓº£µðµå ½Ã½ºÅÛ¿¡¼­ ÇÁ·Î¼¼¼­ ÁÖÆļö ÀÇÁ¸ ÄÚµå ºñÀ²À» °í·ÁÇÑ ÃÖ¼Ò ¿¡³ÊÁö ¼Ò¸ð ÁÖÆļö °áÁ¤ ¹æ¹ý [´ÜÆí³í¹®]

±è¿µ¹Î, ÀÌÂù±Ù(Áß¾Ó´ë)

 

CPSȯ°æÀ» °í·ÁÇÑ Áö´ÉÇü Ȩ ³×Æ®¿öÅ© ½Ã½ºÅÛ °³¹ß ¹æ¹ý [´ÜÆí³í¹®]

¹Úâ±Ô, ÀÌÁ¤¿ø(¾ÆÁÖ´ë)

 

¿ÂÅç·ÎÁö

ÇàÀ§ ¿ÂÅç·ÎÁö: º¸¾ÈÀ» À§ÇÑ °ø°Ý ÆÐÅÏ °¨Áö ÇÁ·¹ÀÓ¿÷

¿ÂÁøÈ£, ¿ì¼öÁ¤, À̹®±Ù(ÀüºÏ´ë)

 

ÅäÇÈ ¸ðµ¨¸µÀ» À§ÇÑ ½Ã¹Ä·¹ÀÌÅÍ µµ±¸°³¹ß

Á¤¿µ¼·, ÀÓä±Õ, ÃÖÈ£Áø(KAIST)

 

¿ÂÅç·ÎÁö Ŭ·¡½º »ó°ü°ü°è ºÐ¼®À» ÅëÇÑ »óÀ§ ¿ÂÅç·ÎÁö ÃßÃâ ±â¹ý

ÀÌÀÎȯ, ³²Å¿ì, ·ùÀÚÄ¡, ¿°±ÙÇõ(ºÎ»ê´ë)

 

µð¹ÙÀ̽º Çù¾÷ ȯ°æ¿¡¼­ »óȲ ÀÎÁö¸¦ À§ÇÑ ¿ÂÅç·ÎÁö Ãß·Ð ±â¹ý [´ÜÆí³í¹®]

¼³±¤¼ö, ±èÁ¤µ¿, ÀÎÈ£, ¹éµÎ±Ç(°í·Á´ë)

 

 


¡¡



KCSE 2013
»ó¼¼ ÇÁ·Î±×·¥

¡¡

¡¡

¡¡

¡¡

¡¡

¡¡

¡¡

¡¡



KCSE 2013
Æ©Å丮¾ó

 

Æ©Å丮¾ó T1: »ê¾÷ü Æ©Å丮¾ó 1

- ÀϽÃ: 1¿ù 30ÀÏ (¼ö) 14:30-15:45

- Àå¼Ò: ±×·£µåȦ2
¡¡

- Á¦¸ñ: 'Architecture for Cloud, Ucloud for Architecture'

- ¿¬»ç: ¼Û¼ø¿ë ÆÀÀå(KT Cloud¿£Áö´Ï¾î¸µ´ã´ç VPC¿£Áö´Ï¾î¸µÆÀÀå)

- Æ©Å丮¾ó ÃÊ·Ï:

¸¹Àº ±â¾÷µéÀÌ Å¬¶ó¿ìµå ±â¹ÝÀ¸·Î IT ÀÎÇÁ¶ó¸¦ ±¸ÃàÇÏ´Â ¹æ¾ÈÀ» °ËÅä, ½ÇÇàÇÏ°í ÀÖÁö¸¸, ÁÖ·Î ±âÁ¸ÀÇ ½Ã½ºÅÛ ±¸Á¶¸¦ 1:1 ¸¶À̱׷¹ÀÌ¼Ç ÇÏ´Â °ÍÀ» ÀüÁ¦·Î ºñ¿ë Àý°¨ È¿°ú¿¡¸¸ ÁýÁßÇÏ°í ÀÖ´Ù. ±×·¯³ª Ŭ¶ó¿ìµå°¡ Á¦°øÇÏ´Â ÄÄÇ»Æà ȯ°æÀº ºÐ¸íÈ÷ ±âÁ¸ÀÇ ¿£ÅÍÇÁ¶óÀÌÁî ȯ°æ°ú ´Ù¸¥ Ư¼ºµéÀÌ Àֱ⠶§¹®¿¡ ½Ã½ºÅÛ ±¸Á¶ ÀÚü¸¦ ¹ßÀü½ÃÅ°´Â ³ë·ÂÀÌ ÇÊ¿äÇÏ´Ù. º» ¼¼¼Ç¿¡¼­´Â Ŭ¶ó¿ìµå ȯ°æ¿¡ ÀûÇÕÇÑ ½Ã½ºÅÛ-¾îÇø®ÄÉÀÌ¼Ç ¾ÆÅ°ÅØÃÄ´Â ¾î¶°ÇØ¾ß ÇÏ´ÂÁö ¸î °¡ÁöÀÇ »ç·Ê¸¦ °çµé¿© ³íÀÇÇغ¸°íÀÚ ÇÑ´Ù. ¿ªÀ¸·Î Ŭ¶ó¿ìµå »ç¾÷ÀÚ´Â ±âÁ¸ÀÇ ½Ã½ºÅÛ ±¸Á¶¸¦ ¹«¸® ¾øÀÌ ¼ö¿ëÇÒ ¼ö ÀÖµµ·Ï ´Ù¾çÇÑ ¼­ºñ½º¸¦ Á¦°øÇÒ ÇÊ¿ä°¡ ÀÖ´Ù. ¾Æ¸¶Á¸ µîÀÇ ¼±Áø »ç¾÷ÀÚµéÀÌ 2012³âµµ¿¡ SSD±â¹ÝÀÇ °¡»ó¼­¹ö¸¦ Á¦°øÇϱ⠽ÃÀÛÇÑ °Íµµ ±×·¯ÇÑ ¸Æ¶ôÀ¸·Î º¼ ¼ö ÀÖ´Ù. º» ¼¼¼Ç¿¡¼­´Â KT À¯Å¬¶ó¿ìµå ¼­ºñ½ºÀÇ »ç·Ê¸¦ ÅëÇØ Å¬¶ó¿ìµå »ç¾÷ÀÚÀÇ ±×·¯ÇÑ ³ë·ÂÀ» »ìÆ캸°íÀÚ ÇÑ´Ù

- ¼Û¼ø¿ë ÆÀÀå ¾à·Â:

1993³â ¼­¿ï´ëÇб³ ´ëÇпø ÀüÀÚ°øÇаú Á¹¾÷ (¼®»ç)

1993³â~ÇöÀç KT ±Ù¹«

- HAN/B-ISDN ÇÁ·ÎÁ§Æ® Âü¿©

- ÃÊ°í¼Ó±¹°¡¸Á °ü¸®½Ã½ºÅÛ °³¹ß

- RFID/USN Ç÷§Æû °³¹ß

- BcN °ü¸®½Ã½ºÅÛ °³¹ß (BcN : Broadband Convergence Network)

- ¼­¿ï´ëÇб³ KT-MBA °úÁ¤ ¼ö·á

úÞ CloudÃßÁøº»ºÎ Cloud¿£Áö´Ï¾î¸µ´ã´ç VPC¿£Áö´Ï¾î¸µÆÀÀå

 

- Á¦¸ñ: 'Ucloud ¼­ºñ½º ¹× Academy Program ¼Ò°³'

- ¿¬»ç: ÀÌÇöÁÖ ÆÀÀå(KT Cloud»ç¾÷´ã´ç Cloud¸¶ÄÉÆÃÆÀÀå)

- Æ©Å丮¾ó ÃÊ·Ï:

±¸±Û°ú ÆäÀ̽ººÏÀÇ °øÅëÁ¡Àº ¼¼°è IT ½ÃÀåÀ» ¼±µµÇÏ´Â ±â¾÷À̶ó´Â Á¡, ÀþÀº °æ¿µÀÚ°¡ CEO¶ó´Â Á¡. ¸¶Áö¸·À¸·Î ´ëÇÐ(¿ø)»ýÀÌ Ã¢¾÷ÇÑ »ç·Ê¶ó´Â Á¡ÀÌ´Ù. ºñÁî´Ï½ºÀÇ ÁÖ±â´Â ª¾ÆÁö´Â ¹Ý¸é ¸ð¹ÙÀÏ µ¥ÀÌÅÍ ÆøÁõÀ¸·Î À̸¦ ¼ö¿ëÇÒ °ø°£Àº Àý´ëÀûÀ¸·Î ºÎÁ·ÇÏ´Ù. ÀÌ·± »óȲ¿¡¼­ ¡®Å¬¶ó¿ìµå¡¯°¡ Á¦°øÇÏ´Â ÄÄÇ»Æà ȯ°æÀº ±âÁ¸ ¸ÞÀÎÇÁ·¹ÀÓ ³»Áö´Â Ŭ¶óÀ̾ðÆ® ÄÄÇ»Æà ½Ã´ëÀÇ ÄÄÇ»Æðú´Â ´Ù¸¥ Çõ½ÅÀ» Áö¿øÇÏ°í ÀÖ´Ù. º» ¼¼¼ÇÀº ±¹³» ÃÖÃÊ·Î ÆÛºí¸¯ Ŭ¶ó¿ìµå¸¦ »ó¿ëÈ­ ÇßÀ¸¸ç, Ŭ¶ó¿ìµå ½ÃÀåÀ» ¼±µµÇÏ´Â ±â¾÷ kt°¡ Á¦°øÇϴ Ŭ¶ó¿ìµå »óÇ°°ú À̸¦ ÀÀ¿ëÇÑ »ç·Ê¸¦ ³íÀÇÇÏ°íÀÚ ÇÑ´Ù. ¾Æ¿ï·¯ kt°¡ ´ëÇб³¸¦ ÇâÇØ ´øÁö´Â È­µÎ ¡®ucloud academy¡¯¿¡ ´ëÇØ ¼Ò°³ÇÏ°íÀÚ ÇÑ´Ù.

- ÀÌÇöÁÖ ÆÀÀå ¾à·Â:

1996 University of Iowa, °æÁ¦ÇÐ Çлç

2006 IE Business School, MBA

1997³â~ÇöÀç KT ±Ù¹«

- ÀÎÅͳݻç¾÷ÆÀ, IRÆÀ, »ç¾÷Àü·«ÆÀ, ÃâÀڰ濵ÆÀ µî ±Ù¹«

úÞ CloudÃßÁøº»ºÎ Cloud»ç¾÷´ã´ç Cloud¸¶ÄÉÆÃÆÀÀå

 

¡¡

Æ©Å丮¾ó T2: ¼ÒÇÁÆ®¿þ¾î°øÇÐ ÀÌ·Ð Æ©Å丮¾ó

- ÀϽÃ: 1¿ù 30ÀÏ (¼ö) 14:30-15:45

- Àå¼Ò: ¼¼¹Ì³ª½Ç1

- Á¦¸ñ: ¡®¼ÒÇÁÆ®¿þ¾î ¾ÆÅ°ÅØó ¼³°èÀÇ ±Ùº»¿ø¸®µé¡¯

- ¿¬»ç: °­¼º¿ø ±³¼ö(KAIST)

- Æ©Å丮¾ó ÃÊ·Ï:

ÀÌ Æ©Å丮¾ó¿¡¼­´Â È¿°úÀûÀÎ ¼ÒÇÁÆ®¿þ¾î °³¹ßÀ» À§ÇÑ ÇʼöÀûÀÎ ±â¼ú·Î¼­ ¿­ µÎ °³ÀÇ ±Ùº»ÀûÀÎ ¼ÒÇÁÆ®¿þ¾î ¾ÆÅ°ÅØó ¼³°è¿ø¸®¸¦ ¼³¸íÇÑ´Ù. ¾ÆÅ°ÅØó ¼³°è´Ü°èµéÀ» ¹®Á¦ÀÇ ÆľÇ, ¾ÆÅ°ÅØó ¸ðµ¨¸µ ¹æ¹ýÀÇ °áÁ¤, ¾ÆÅ°ÅØó ¼³°èÀÇ ¼öÇà ±×¸®°í ¼³°èµÈ ¾ÆÅ°ÅØóÀÇ Æò°¡ÀÇ ³× °³ÀÇ ´Ü°è ±ºÀ¸·Î ³ª´©°í, ÀÌ ´Ü°è±º ¾È¿¡¼­ ±×¸®°í ´Ü°è±º °£¿¡ È°¿ëµÇ´Â ¾ÆÅ°ÅØó ¼³°èÀÇ ¿ø¸®µéÀ» ½Äº°ÇÏ°í ±× ¿ªÇÒÀ» ¼³¸íÇÑ´Ù.

- °­¼º¿ø ±³¼ö ¾à·Â:

2011.8.10~12: ±¹Á¦ÄÁÆÛ·±½º ÇÁ·Î±×·¥ °øµ¿ÀÇÀå, SERA 2011 (Software Engineering Research, Management and Applications)

2009.3 ~ ÇöÀç: KAIST Àü»êÇаú ºÎ±³¼ö

2003 ~ ÇöÀç: ¹Ì±¹ Ä«³×±â¸á·Ð ´ëÇб³ MSE ÇÁ·Î±×·¥ °âÀÓ±³¼ö

2001.10 ~ 2009.2: Çѱ¹Á¤º¸Åë½Å´ëÇб³ Á¶±³¼ö, ºÎ±³¼ö

2001.8.28 ~ 31: ±¹Á¦ÄÁÆÛ·±½º °øµ¿ÀÇÀå, FORTE 2001 (Formal Techniques for Networked and Distributed Systems)

1995.9 ~1996.9: ¹Ì±¹ ±¹¸³Ç¥Áرâ¼ú¿¬±¸¼Ò(NIST) °´¿ø¿¬±¸¿ø

1993.12 ~ 2001.10: Çѱ¹Åë½Å(KT) ¼±ÀÓ¿¬±¸¿ø

Àú¼­: ¼ÒÇÁÆ®¿þ¾î ¾ÆÅ°ÅØó·ÎÀÇ ÃÊ´ë, 2012.

 

¡¡

Æ©Å丮¾ó T3: ¼ÒÇÁÆ®¿þ¾î°øÇÐ ½Å±â¼ú Æ©Å丮¾ó 1

- ÀϽÃ: 1¿ù 30ÀÏ (¼ö) 14:30-15:45

- Àå¼Ò: ¼¼¹Ì³ª½Ç2

- Á¦¸ñ: ¡®Combinatorial Test Design and Its Applications¡¯

- ¿¬»ç: À±ÀÏö ±³¼ö(SUNY Korea)

- Æ©Å丮¾ó ÃÊ·Ï:

Combinatorial test design is a test-case selection technique where each test case (called configuration) is a value combination of test input parameters. The main rationale behind this design is that software faults are often caused by unintended or unexpected interactions between test input values. Since its rebirth as a software black-box testing technique, combinatorial test design has been applied to various problems in the Software Engineering discipline and the cost-effectiveness of the technique has been empirically proven by a large stack of studies carried out over the last two decades.

In this tutorial, I will introduce a number of combinatorial test design techniques that use different strategies or coverage criteria for the value selection process, with the special focus given to the t-wise interaction coverage design. Two natural extensions to the base design will then be presented. The extensions are to improve test effectiveness by prioritizing test cases generated or to reduce the size of test suites while preserving test strength. Researches on the application of the techniques to address various problems in Software Engineering will also be presented to raise understanding of actual use-cases. The application areas may include fault characterization, software performance enhancement, web application testing, and GUI testing.

- À±ÀÏö ±³¼ö ¾à·Â:

Professor Ilchul Yoon received B.S. in Computer Science at Sogang University, M.S. in Computer Science at Korea Advanced Institute of Science and Technology, and Ph.D. in Computer Science at University of Maryland, College Park. As an assistant professor in the department of Computer Science, he is working for State University of New York, Korea, which is the first foreign university established on Korean soil. His research interests lie in the fields of software compatibility testing, interaction test design, and software process. He also has interests in distributed high-performance computing researches, and participated in the peer-review processes of major conferences in the discipline.

 

¡¡

Æ©Å丮¾ó T4: »ê¾÷ü Æ©Å丮¾ó 2

- ÀϽÃ: 1¿ù 31ÀÏ (¸ñ) 09:00-10:15

- Àå¼Ò: ±×·£µåȦ2

- Á¦¸ñ: ¡®Å¬¶ó¿ìµå ±â¹ÝÀÇ ½º¸¶Æ®¿öÅ© (A journey to the Smart Working Era on the Cloud)¡¯

- ¿¬»ç: ½ÅâÇö ÆÀÀå(LG CNS Ŭ¶ó¿ìµå»ç¾÷ÆÀÀå)

- Æ©Å丮¾ó ÃÊ·Ï:

¡®12³â °¡Æ®³Ê ½ÉÆ÷Áö¿ò¿¡¼­ ¹ßÇ¥µÇ±â·Î Ŭ¶ó¿ìµå´Â Àû¾îµµ ¹Ì±¹ ½ÃÀå¿¡¼­´Â ChasmÀ» 
³Ñ¾î¼¹´Ù°í ÇÑ´Ù. ´õÀÌ»ó Ŭ¶ó¿ìµå´Â ½Å±â¼ú/½Å»ç¾÷ ¿µ¿ªÀÌ ¾Æ´Ñ CommodityÈ­
µÇ¾î°¡´Â Ãß¼¼ÀÌ°í ±¹³» ½ÃÀåÀº ±Û·Î¹ú ´ëºñ ¼Óµµ°¡ ´À¸®³ª Àü »ê¾÷¿µ¿ª¿¡ °ÉÃÄ ±×
È°¿ëµµ°¡ Áõ´ëµÇ¾î °¡°í ÀÖ´Ù.
¿ì¸®°¡ ÈçÈ÷ »ý°¢Çϴ Ŭ¶ó¿ìµå´Â ¼­¹ö, ½ºÅ丮Áö µî ÀÎÇÁ¶ó¸¦ Á¦°øÇÏ´Â IaaS¿Í SW¸¦ 
¼­ºñ½º·Î Á¦°øÇÏ´Â SaaS ¿µ¿ª ¿Ü¿¡ ÃÖ±Ù¿¡´Â »ç¿ëÀÚ Å¬¶óÀ̾ðÆ® ¿µ¿ª(PC)±îÁöµµ
Ŭ¶ó¿ìµå·Î Á¦°øÇÏ´Â ¼­ºñ½º°¡ ¿£ÅÍÇÁ¶óÀÌÁî ½ÃÀå¿¡¼­ ÁÖ¸ñÀ» ¹Þ°í ÀÖ´Ù.
º» ¼¼¼ÇÀº ±â¾÷ º¸¾ÈÀ» ³Ñ¾î ½º¸¶Æ®¿öÅ© °üÁ¡¿¡¼­ µ¥½ºÅ©Å¾ Ŭ¶ó¿ìµå
ȯ°æÀÌ ¾î¶»°Ô ±â¾÷¿¡¼­ ¾î¶»°Ô È°¿ëµÇ°í ÀÖ´ÂÁö¸¦ »ç·Ê¿Í ´õºÒ¾î ¼Ò°³ÇÏ°íÀÚ ÇÑ´Ù.

- ½ÅâÇö ÆÀÀå ¾à·Â:

¡¯97 ~ ¡¯02 : LG-EDS(úÞ LG CNS) ÀÔ»ç. ÀÀ¿ë½Ã½ºÅÛ SI / SM 

¡¯03 ~ ¡¯05 : LG CNS ½Å±Ô»ç¾÷ °³¹ß ¾÷¹«Àü¹®°¡

¡¯05 ~ ¡¯09 : LG CNS °¡»óÈ­ ±â¼ú ±â¹Ý »ç¾÷ °³¹ß ¹× ÀÌÇà

¡¯10 ~ ÇöÀç : LG CNS Ŭ¶ó¿ìµåÄÄÇ»Æà »ç¾÷

°­ÀÇÀÌ·Â : ÅëÇÕÀü»ê¼¾ÅÍ, ƯÇãû, °ü¼¼Ã» µî °ø°ø±â°ü ¹× ´Ù¼ö ¹Î°£ ÄÁÆÛ·±½º ¹ßÇ¥


úÞLG CNS Ŭ¶ó¿ìµå»ç¾÷ÆÀÀå

 

¡¡

Æ©Å丮¾ó T5: ¼ÒÇÁÆ®¿þ¾î°øÇÐ ±³À° Æ©Å丮¾ó

- ÀϽÃ: 1¿ù 31ÀÏ (¸ñ) 09:00-10:15

- Àå¼Ò: ¼¼¹Ì³ª½Ç1

- Á¦¸ñ: ¡®¼ÒÇÁÆ®¿þ¾î °øÇÐ ±³À°½Ç¹«Àû Á¢±Ù¹ý¡¯

- ¿¬»ç: ÃÖÀº¸¸ ±³¼ö(µ¿±¹´ë)

- Æ©Å丮¾ó ÃÊ·Ï:

¼ÒÇÁÆ®¿þ¾î ¿£Áö´Ï¾î¸¦ Å°¿ì±â À§Çؼ­´Â ¼ÒÇÁÆ®¿þ¾î °øÇÐÀÇ ¹æ¹ý·Ð°ú À̷и¸ÀÌ ¾Æ´Ï¶ó ½ÇÁ¦ °³¹ßÀ» À§ÇÑ ½Ç¹«Àû ÈÆ·ÃÀÌ ÇÊ¿äÇÏ´Ù. ÇÏÁö¸¸ ´ëÇÐ ÇкΠ°úÁ¤ÀÇ ¼ÒÇÁÆ®¿þ¾î ±³À°Àº Ä¥ÆÇÀ̳ª ÇÁ·ÎÁ§Å͸¦ ÀÌ¿ëÇÏ¿© ±× ¹æ¹ýÀ» ¼Ò°³Çϴµ¥ ÁßÁ¡À» µÎ°í ÀÖ´Ù. ¶ÇÇÑ »ê¾÷ ÇöÀå¿¡¼­ »ç¿ëµÇ´Â IT ±â¼úÀº ºü¸£°Ô ¹ßÀüÇÏ°í ´Ù¾çÇØÁ® ¾î¶² °ÍÀ» ¾î´À Á¤µµ·Î ´Ù·ç¾î¾ß ÇÒÁö ±âÁØÀÌ ¼­Áö ¾Ê´Â´Ù. ÀÌ Æ©Å丮¾ó¿¡¼­´Â »ê¾÷ ÇöÀå¿¡ ¹Ù·Î ÅõÀ﵃ ¼ö ÀÖ´Â ¼ÒÇÁÆ®¿þ¾î ¿£Áö´Ï¾î¸¦ ±³À°Çϱâ À§ÇÏ¿© ÇÊ¿äÇÑ ±³À° ³»¿ë, ¹Ù¶÷Á÷ÇÑ ±³À° ¹æ¹ý, ÃֽŠ½ÃµµµÇ°í ÀÖ´Â ½Ç¹«Àû ±³À° ¹æ¹ý¿¡ ´ëÇÏ¿© ¾Ë¾Æº»´Ù.

- ÃÖÀº¸¸ ±³¼ö ¾à·Â:

1982. µ¿±¹´ëÇб³ Àü»êÇаú Á¹¾÷(Çлç)

1985. Çѱ¹°úÇбâ¼ú¿ø Àü»êÇаú Á¹¾÷(°øÇм®»ç)

1993. ¹Ì±¹ Illinois Institute of Technology Àü»êÇаú Á¹¾÷(Àü»êÇйڻç)

1985. Çѱ¹Ç¥ÁØ¿¬±¸¼Ò ¿¬±¸¿ø

1986~1988 Ãæ³²´ë, ¸ñ¿ø´ë ´ëÀü »ê¾÷´ë °­»ç

1988. Çѱ¹µ¥ÀÌŸÅë½Å(ÁÖ) ÁÖÀÓ¿¬±¸¿ø

1992. ½ÃÄ«°í ÁÖ¸³´ë Àü»êÇаú °­»ç

1997¢¦2004, Çѱ¹Á¤º¸°úÇÐȸ ¼ÒÇÁÆ®¿þ¾î °øÇÐ ¿¬±¸È¸ ¿î¿µÀ§¿ø

2001~2005. Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ÇÐȸÁö ÆíÁýÀ§¿ø

2000. 2007 ÄÝ·Î¶óµµ ÁÖ¸³´ë(Æ÷Æ®Äݸ°½º) Àü»êÇаú ¹æ¹®±³¼ö

2002. Ä«³×±â ¸á·Ð ´ëÇÐ ¼ÒÇÁÆ®¿þ¾î °øÇÐ ´Ü±â °úÁ¤ ¿¬¼ö

1993¢¦ÇöÀç, µ¿±¹´ëÇб³ ÄÄÇ»ÅÍ °øÇаú ±³¼ö

 

¡¡

Æ©Å丮¾ó T6: ¼ÒÇÁÆ®¿þ¾î°øÇÐ ½Å±â¼ú Æ©Å丮¾ó 2

- ÀϽÃ: 1¿ù 31ÀÏ (¸ñ) 09:00-10:15

- Àå¼Ò: ¼¼¹Ì³ª½Ç2

- Á¦¸ñ: ¡®Towards Dependable and Secure Software: Requirements Engineering Approach¡¯

- ¿¬»ç: À̼®¿ø ±³¼ö(¾ÆÁÖ´ë)

- Æ©Å丮¾ó ÃÊ·Ï:

Engineering a dependable software system that meets our needs is a challenging task and requires a variety of analysis and development techniques. Dependability has to be engineered into a system in its early stage of design and development task to build comprehensive understanding of its nature and purposeful behavior within the context of people, technology and the process. Among many dependability attributes, we focus on the security attribute and its certification and accreditation process that aggregates evidences for multi-dimensional analysis to assure its level of acceptance. Security breaches most often occur due to a cascading effect of failure among security constraints that collectively contribute to overall secure system behavior in a socio-technical environment. Therefore, during security certification activities, analysts must systematically take into account the nexus of causal chains that exist among security constraints imposed by regulatory requirements. Numerous regulatory requirements specified in natural language documents or listed in spreadsheets/databases do not facilitate such analysis. We present a step-wise methodology to discover and understand the multi-dimensional correlations among regulatory requirements for the purpose of understanding the potential for risk due to non-compliance during system operation. Our lattice algebraic computational model helps estimate the collective adequacy of diverse security constraints imposed by regulatory requirements and their interdependencies with each other in a bounded scenario of investigation. Abstractions and visual metaphors combine human intuition with metrics available from the methodology to improve the understanding of risk based on the level of compliance with regulatory requirements. In addition, a problem domain ontology that classifies and categorizes regulatory requirements from multiple dimensions of a socio-technical environment promotes a common understanding among stakeholders during certification and accreditation activities. A preliminary empirical investigation of our theoretical propositions has been conducted in the domain of The United States Department of Defense Information Technology Security Certification and Accreditation Process (DITSCAP). This work contributes a novel approach to understand the level of compliance with regulatory requirements in terms of the potential for risk during system operation. This work has been partially supported by the grants from Space and Naval Warfare Systems Center (SPAWAR) US Department of Navy, Department of Defense, and National Science Foundation.

- À̼®¿ø ±³¼ö ¾à·Â:

Dr. Seok-Won Lee is currently the Head of Graduate School of Software and Associate Professor of Information & Computer Engineering at Ajou University since 2012. He has been an Assistant Professor of Information Security at the University of Texas at San Antonio, a Visiting Professor at the University of Nebraska – Lincoln and an Assistant Professor of Software Engineering and a Director of Knowledge-intensive Software Engineering (NiSE) research group at the Univ. of North Carolina at Charlotte (2003- 2010). Prior to joining to the UNC Charlotte, he was affiliated with Science Applications International Corporation (SAIC) and IBM T.J. Watson Research Center as senior research scientists. He received his M.Sc. in Computer Science from University of Pittsburgh, and Ph.D. in Information Technology from George Mason University. His areas of specialization include software engineering with specific expertise in ontological requirements engineering and domain modeling, and knowledge engineering with specific expertise in knowledge acquisition, machine learning and knowledge-based systems. He serves as chairs, organizers, editors and the program committee members for numerous journals, conferences, and workshops in software requirements engineering, secure software engineering and other related areas such as information security and assurance, critical infrastructure protection, service-oriented computing, visual analytics and self-adaptive software systems. He has published more than 100 refereed articles. He is a professional member of IEEE, ACM and AAAI.

¡¡

¼¼¼Ç ¹ßÇ¥ »çÁø

ÀÓä±Õ (KAIST)
±èÀǼ· (°Ç±¹´ë)
±è¿øÅ ¹Ú»ç (ETRI)

¸¸Âù »çÁø

½Ã»ó ¹× °¨»çÆÐ Àü´Þ »çÁø

Æ©Å丮¾ó ¹× ±âŸ »çÁø

Æ©Å丮¾ó - À̼®¿ø ±³¼ö (¾ÆÁÖ´ë) ±âÁ¶¿¬¼³ - ¹Ú¼ö¿ë ¿øÀå (NIPA)
Æ©Å丮¾ó - ¼Û¼ø¿ë ÆÀÀå (KT) Æ©Å丮¾ó - ½ÅâÇö ÆÀÀå (LGCNS) ±âÁ¶¿¬¼³ - ÀÌ»óÀº ¼¾ÅÍÀå (NIPA SW°øÇм¾ÅÍ)