Computer Science / Software Engineering

All posts under category "Computer Science / Software Engineering"

10 posts total
Sorted by date
Adaptive Hierarchical Evaluation of LLMs and SAST tools for CWE Prediction in Python

Adaptive Hierarchical Evaluation of LLMs and SAST tools for CWE Prediction in Python

๋ณธ ๋…ผ๋ฌธ์€ LLM๊ณผ ์ „ํ†ต์ ์ธ ์ •์  ๋ถ„์„ ๋„๊ตฌ(SAST)์˜ ์ทจ์•ฝ์  ํƒ์ง€ ๋Šฅ๋ ฅ์„ ๋น„๊ต ํ‰๊ฐ€ํ•˜๊ธฐ ์œ„ํ•ด ์ƒˆ๋กœ์šด ๋ฒค์น˜๋งˆํฌ ํ”„๋ ˆ์ž„์›Œํฌ์ธ ALPHA๋ฅผ ์„ค๊ณ„ํ•œ ์ ์—์„œ ํ•™์ˆ ์ ยท์‹ค๋ฌด์  ์˜์˜๊ฐ€ ํฌ๋‹ค. ๊ธฐ์กด์˜ ์ด์ง„ ๋ถ„๋ฅ˜ ๊ธฐ๋ฐ˜ ๋ฒค์น˜๋งˆํฌ๋Š” โ€œ์ทจ์•ฝ์  ์กด์žฌ ์—ฌ๋ถ€โ€๋งŒ์„ ํŒ๋‹จํ•˜๋„๋ก ์ œํ•œ๋ผ, ๊ฐœ๋ฐœ์ž๊ฐ€ ์‹ค์ œ ์ฝ”๋“œ ์ˆ˜์ •์— ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ๊ตฌ์ฒด์ ์ธ CWE(CWEโ€‘Common Weakness Enumeration) ์ •๋ณด๋ฅผ ์ œ๊ณตํ•˜์ง€ ๋ชปํ•œ๋‹ค๋Š” ํ•œ๊ณ„๊ฐ€ ์žˆ์—ˆ๋‹ค. ALPHA๋Š” ์ด๋Ÿฌํ•œ ํ•œ๊ณ„๋ฅผ ๊ทน๋ณตํ•˜๊ธฐ ์œ„ํ•ด ํ•จ์ˆ˜ ์ˆ˜์ค€์—์„œ CWE ๋ ˆ์ด๋ธ”์„ ๋ถ€์—ฌํ•˜๊ณ , ์˜ค๋ฅ˜ ์œ ํ˜•์„ ์„ธ ๊ฐ€์ง€ ๊ณ„์ธต์  ํŒจ๋„ํ‹ฐ(

Computer Science Software Engineering
No Image

DynaFix: Iterative Automated Program Repair Driven by Execution-Level Dynamic Information

DynaFix๊ฐ€ ์ œ์‹œํ•˜๋Š” ํ•ต์‹ฌ ์•„์ด๋””์–ด๋Š” โ€œ์‹คํ–‰โ€‘๋ ˆ๋ฒจ ๋™์  ์ •๋ณดโ€๋ฅผ ๋ฐ˜๋ณต์ ์ธ ํ”ผ๋“œ๋ฐฑ ๋ฃจํ”„์— ํ†ตํ•ฉํ•จ์œผ๋กœ์จ LLM ๊ธฐ๋ฐ˜ APR์˜ ํ•œ๊ณ„๋ฅผ ๊ทน๋ณตํ•œ๋‹ค๋Š” ์ ์ด๋‹ค. ๊ธฐ์กด LLMโ€‘APR ์—ฐ๊ตฌ๋Š” ์ฃผ๋กœ ์ •์  ์ฝ”๋“œ ๊ตฌ์กฐ์™€ ํ…Œ์ŠคํŠธ ์Šค์œ„ํŠธ ๊ฒฐ๊ณผ์— ์˜์กดํ–ˆ์œผ๋ฉฐ, ์ด๋Š” ํ”„๋กœ๊ทธ๋žจ์˜ ์‹ค์ œ ๋™์ž‘์„ ๋ฐ˜์˜ํ•˜์ง€ ๋ชปํ•œ๋‹ค. ์ •์  ์ •๋ณด๋งŒ์œผ๋กœ๋Š” ๋ณ€์ˆ˜ ๊ฐ’์˜ ๋ณ€๋™, ์กฐ๊ฑด๋ฌธ ๋ถ„๊ธฐ, ์˜ˆ์™ธ ๋ฐœ์ƒ ๊ฒฝ๋กœ ๋“ฑ ๋ณต์žกํ•œ ๋Ÿฐํƒ€์ž„ ์ƒํ™ฉ์„ ์ •ํ™•ํžˆ ํŒŒ์•…ํ•˜๊ธฐ ์–ด๋ ต๋‹ค. DynaFix๋Š” ์ด๋Ÿฌํ•œ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ๋งค ๋ผ์šด๋“œ๋งˆ๋‹ค ํ”„๋กœ๊ทธ๋žจ์„ ์‹ค์ œ๋กœ ์‹คํ–‰ํ•˜๊ณ , ๋ณ€์ˆ˜ ์Šค๋ƒ…์ƒท, ์ œ์–ด ํ๋ฆ„ ํŠธ๋ ˆ์ด์Šค, ํ˜ธ์ถœ ์Šคํƒ ๋“ฑ

Computer Science Software Engineering
Cryptolysis v.0.0.1 - A Framework for Automated Cryptanalysis of   Classical Ciphers

Cryptolysis v.0.0.1 - A Framework for Automated Cryptanalysis of Classical Ciphers

๋ณธ ๋…ผ๋ฌธ์€ ๊ณ ์ „ ์•”ํ˜ธ ํ•ด๋…์„ ์ž๋™ํ™”ํ•˜๊ธฐ ์œ„ํ•ด ๊ฐœ๋ฐœ๋œ ํ”„๋ ˆ์ž„์›Œํฌ 'ํฌ๋ฆฝํ†จ๋ฆฌ์‹œ์Šค'์˜ ์„ค๊ณ„์™€ ๊ตฌํ˜„ ๋ฐฉ๋ฒ•์„ ์ƒ์„ธํžˆ ๋‹ค๋ฃจ๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ด ํ”„๋กœ์ ํŠธ๋Š” ์ž๋ฐ” ์–ธ์–ด๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•˜๋ฉฐ, ๋ฉ”๋ชจ๋ฆฌ ๊ด€๋ฆฌ์™€ ์ปฌ๋ ‰์…˜ ๊ด€๋ฆฌ์˜ ์šฉ์ด์„ฑ ๋•๋ถ„์— ํšจ์œจ์ ์ธ ๊ฐœ๋ฐœ ํ™˜๊ฒฝ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. ์‹œ์Šคํ…œ ์•„ํ‚คํ…์ฒ˜ ํฌ๋ฆฝํ†จ๋ฆฌ์‹œ์Šค์˜ ์‹œ์Šคํ…œ ์•„ํ‚คํ…์ฒ˜๋Š” ์•”ํ˜ธ ์ƒ์„ฑ ๋ฐ ํ…Œ์ŠคํŠธ๋ฅผ ์œ„ํ•œ ๋‚ด๋ถ€ ๋„๊ตฌ์™€ ๊ณต๊ฒฉ ๋ชจ๋“ˆ๋กœ ๊ตฌ์„ฑ๋˜์–ด ์žˆ์Šต๋‹ˆ๋‹ค. ๊ฐ ๊ตฌ์„ฑ ์š”์†Œ ๊ฐ„ ์ƒํ˜ธ ์ž‘์šฉ์€ ์ž์„ธํžˆ ์„ค๋ช…๋˜์–ด ์žˆ์œผ๋ฉฐ, ์ด๋ฅผ ํ†ตํ•ด ํ”„๋ ˆ์ž„์›Œํฌ์˜ ์ „์ฒด์ ์ธ ๊ตฌ์กฐ๋ฅผ ์ดํ•ดํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ํŒจํ‚ค์ง€ ๊ตฌ์กฐ : ์ž๋ฐ” ํŒจํ‚ค์ง€ ๊ตฌ์กฐ๋Š” ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ๋ชจ๋“ˆ

Framework Analysis Software Engineering Cryptography and Security Computer Science
Correctness isnt Efficiency: Runtime Memory Divergence in LLM-Generated Code

Correctness isnt Efficiency: Runtime Memory Divergence in LLM-Generated Code

์ด ๋…ผ๋ฌธ์€ ๋Œ€ํ˜• ์–ธ์–ด ๋ชจ๋ธ(LLM)์—์„œ ์ƒ์„ฑ๋œ ์ฝ”๋“œ์˜ ์‹คํ–‰ ์•ˆ์ •์„ฑ์— ์ค‘์ ์„ ๋‘๊ณ , ํŠนํžˆ ๋ฉ”๋ชจ๋ฆฌ ๋™์—ญํ•™ ์ธก๋ฉด์—์„œ ๊ทธ ์ค‘์š”์„ฑ์„ ๊ฐ•์กฐํ•œ๋‹ค. ๊ธฐ์กด ์—ฐ๊ตฌ์—์„œ๋Š” ์ฃผ๋กœ LLM์˜ ์ถœ๋ ฅ ์ •ํ™•๋„์™€ ๋‹ค์–‘์„ฑ์— ์ดˆ์ ์„ ๋งž์ถ”์—ˆ์ง€๋งŒ, ์ด ๋…ผ๋ฌธ์€ ์ด๋Ÿฌํ•œ ์ •ํ™•ํ•œ ๊ฒฐ๊ณผ๊ฐ€ ๋ฐ˜๋“œ์‹œ ์‹คํ–‰ ์‹œ๊ฐ„ ๋ฉ”๋ชจ๋ฆฌ ํ”„๋กœํŒŒ์ผ๋ง์—์„œ๋„ ์•ˆ์ •์ ์ธ ์„ฑ๋Šฅ์„ ๋ณด์žฅํ•˜์ง€ ์•Š๋Š”๋‹ค๋Š” ์ ์„ ์ง€์ ํ•œ๋‹ค. ๋…ผ๋ฌธ์—์„œ ์ œ์‹œ๋œ ์ฃผ์š” ๊ธฐ์—ฌ ์ค‘ ํ•˜๋‚˜๋Š” Monotonic Peak Profile (MPP) ์™€ Dynamic Time Warping (DTW) ๋ฅผ ํ™œ์šฉํ•œ ์‹คํ–‰ ์‹œ๊ฐ„ ๋ฉ”๋ชจ๋ฆฌ ํ”„๋กœํŒŒ์ผ๋ง ๋ฐฉ๋ฒ•์ด๋‹ค. ์ด ๋ฐฉ๋ฒ•์€ ์• ํ”Œ

Computer Science Software Engineering
RovoDev Code Reviewer: A Large-Scale Online Evaluation of LLM-based Code Review Automation at Atlassian

RovoDev Code Reviewer: A Large-Scale Online Evaluation of LLM-based Code Review Automation at Atlassian

RovoDev ์ฝ”๋“œ ๋ฆฌ๋ทฐ์–ด๋Š” LLM ๊ธฐ๋ฐ˜์˜ ์ฝ”๋“œ ๊ฒ€ํ†  ์ž๋™ํ™” ๋„๊ตฌ๋กœ์„œ, ํ˜„๋Œ€ ์†Œํ”„ํŠธ์›จ์–ด ๊ฐœ๋ฐœ ํ”„๋กœ์„ธ์Šค์—์„œ ์ค‘์š”ํ•œ ์—ญํ• ์„ ์ˆ˜ํ–‰ํ•œ๋‹ค. ์ด ๋…ผ๋ฌธ์€ RovoDev์ด ์–ด๋–ป๊ฒŒ ๋ฐ์ดํ„ฐ ํ”„๋ผ์ด๋ฒ„์‹œ์™€ ๋ณด์•ˆ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ณ , ๋ฆฌ๋ทฐ ๊ฐ€์ด๋“œ๋ผ์ธ์— ๋”ฐ๋ฅธ ์ •ํ™•ํ•œ ์ฝ”๋“œ ๊ฒ€ํ† ๋ฅผ ์ œ๊ณตํ•˜๋ฉฐ, ์ƒˆ๋กœ์šด ํ”„๋กœ์ ํŠธ์—์„œ๋„ ํšจ๊ณผ์ ์œผ๋กœ ์ž‘๋™ํ•˜๋Š”์ง€ ์„ค๋ช…ํ•œ๋‹ค. ๊ธฐ์ˆ ์  ํ˜์‹ ์„ฑ: RovoDev์˜ ํ•ต์‹ฌ ๊ธฐ์ˆ ์€ ์ œ๋กœ์ƒท ์ปจํ…์ŠคํŠธ ์ธ์‹ ๋ฆฌ๋ทฐ ๋Œ“๊ธ€ ์ƒ์„ฑ, ์‚ฌ์‹ค์  ์ •ํ™•์„ฑ ํ’ˆ์งˆ ๊ฒ€์‚ฌ, ๊ทธ๋ฆฌ๊ณ  ํ–‰๋™์„ฑ ํ’ˆ์งˆ ๊ฒ€์‚ฌ๋ฅผ ํ†ตํ•œ ์œ ํšจํ•˜๊ณ  ํ–‰๋™ ๊ฐ€๋Šฅํ•œ ๋ฆฌ๋ทฐ ๋Œ“๊ธ€ ์ถ”์ฒœ์ด๋‹ค. ์ด ์ค‘ ํŠนํžˆ ์ œ๋กœ์ƒท ์ ‘๊ทผ ๋ฐฉ์‹์€ ๊ณ ๊ฐ

Computer Science Software Engineering
An Empirical Evaluation of LLM-Based Approaches for Code Vulnerability Detection: RAG, SFT, and Dual-Agent Systems

An Empirical Evaluation of LLM-Based Approaches for Code Vulnerability Detection: RAG, SFT, and Dual-Agent Systems

๋ณธ ์—ฐ๊ตฌ๋Š” LLM์„ ํ™œ์šฉํ•œ ์ฝ”๋“œ ์ทจ์•ฝ์  ํƒ์ง€์˜ ์‹ค์šฉ์„ฑ์„ ์ •๋Ÿ‰์ ์œผ๋กœ ํ‰๊ฐ€ํ•˜๊ธฐ ์œ„ํ•ด ์„ธ ๊ฐ€์ง€ ์ ‘๊ทผ๋ฒ•์„ ์ฒด๊ณ„์ ์œผ๋กœ ๋น„๊ตํ•˜์˜€๋‹ค. ์ฒซ ๋ฒˆ์งธ ์ ‘๊ทผ๋ฒ•์ธ Retrievalโ€‘Augmented Generation(RAG)์€ ์‚ฌ์ „ ํ•™์Šต๋œ LLM์— ์™ธ๋ถ€ ์ง€์‹ ๋ฒ ์ด์Šค๋ฅผ ๋™์ ์œผ๋กœ ์—ฐ๊ฒฐํ•œ๋‹ค. ๊ตฌ์ฒด์ ์œผ๋กœ, MITRE CWE ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค์™€ ์ตœ์‹  ์›น ๊ฒ€์ƒ‰ ๊ฒฐ๊ณผ๋ฅผ ์‹ค์‹œ๊ฐ„์œผ๋กœ ๊ฐ€์ ธ์™€ ํ”„๋กฌํ”„ํŠธ์— ์‚ฝ์ž…ํ•จ์œผ๋กœ์จ ๋ชจ๋ธ์ด ์ฝ”๋“œ ์กฐ๊ฐ์„ ํ•ด์„ํ•  ๋•Œ ์ตœ์‹  ๋ณด์•ˆ ํŒจํ„ด๊ณผ CWE ์ •์˜๋ฅผ ์ฐธ์กฐํ•˜๋„๋ก ์„ค๊ณ„๋˜์—ˆ๋‹ค. ์ด ๊ณผ์ •์€ ๋ฒกํ„ฐ ๊ฒ€์ƒ‰ ์—”์ง„(FAISS)๊ณผ ํ…์ŠคํŠธ ์ž„๋ฒ ๋”ฉ์„ ํ™œ์šฉํ•ด ๊ด€๋ จ ๋ฌธ์„œ๋ฅผ

System Computer Science Software Engineering Detection
A method to develop mission critical data processing systems for   satellite based instruments. The spinning mode case

A method to develop mission critical data processing systems for satellite based instruments. The spinning mode case

๋ณธ ๋…ผ๋ฌธ์€ ํ˜„๋Œ€ ์œ„์„ฑ ์‹คํ—˜์˜ ๋ณต์žก์„ฑ์„ ๊ณ ๋ คํ•œ ๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ ์‹œ์Šคํ…œ ๊ฐœ๋ฐœ ๋ฐฉ๋ฒ•๋ก ์— ์ดˆ์ ์„ ๋งž์ถ”๊ณ  ์žˆ๋‹ค. ํŠนํžˆ, ํšŒ์ „ ๋ชจ๋“œ์—์„œ์˜ ๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ๋ฅผ ์œ„ํ•œ SPIPI ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ œ์•ˆํ•˜๊ณ , ์ด๋ฅผ ํ†ตํ•ด ์œ„์„ฑ ๊ธฐ๋ฐ˜ ์‹คํ—˜์—์„œ ๋ฐœ์ƒํ•˜๋Š” ๋‹ค์–‘ํ•œ ์ž์› ๊ด€๋ จ ์ œ์•ฝ ์กฐ๊ฑด์„ ํ•ด๊ฒฐํ•˜๋ ค๋Š” ์˜๋„๊ฐ€ ๋ช…ํ™•ํžˆ ๋“œ๋Ÿฌ๋‚œ๋‹ค. 1. ์‹œ์Šคํ…œ ๊ฐœ์š” ๋ฐ ๋ฌธ์ œ ์ธ์‹ ํ˜„๋Œ€ ์œ„์„ฑ ์‹คํ—˜์€ ๋น„ํ–‰ ๋ฐ ์ง€์ƒ ์„ธ๊ทธ๋จผํŠธ๋กœ ๊ตฌ์„ฑ๋œ ๋ณต์žกํ•œ ์‹ค์‹œ๊ฐ„ ์‹œ์Šคํ…œ์œผ๋กœ, ํฌ๊ธฐ, ๋ฌด๊ฒŒ, ์ „๋ ฅ ์†Œ๋น„, ์‹ค์‹œ๊ฐ„ ์‘๋‹ต ์š”๊ตฌ์‚ฌํ•ญ, ๊ณ ์žฅ ๋‚ด์„ฑ ๋“ฑ์˜ ์ž์› ๊ด€๋ จ ์ œ์•ฝ ์กฐ๊ฑด์„ ๊ฐ€์ง„๋‹ค. ์ด๋Ÿฌํ•œ ์‹œ์Šคํ…œ์€ ๋†’์€ ์ˆ˜์ค€์˜ ๋ณด์ฆ์ด ํ•„์š”ํ•˜๋ฉฐ, ํ•˜

Software Engineering System Data Computer Science Astrophysics
A Formal Approach for Agent Based Large Concurrent Intelligent Systems

A Formal Approach for Agent Based Large Concurrent Intelligent Systems

: ๋ณธ ๋…ผ๋ฌธ์€ ์—์ด์ „ํŠธ ๊ธฐ๋ฐ˜ ๋ชจ๋ธ๋ง์„ ํ†ตํ•œ ๋ณต์žก ์ง€๋Šฅํ˜• ์‹œ์Šคํ…œ ์„ค๊ณ„์— ์ดˆ์ ์„ ๋งž์ถ”๊ณ  ์žˆ์œผ๋ฉฐ, ์ด๋Š” ํ˜„์žฌ์˜ ํ”„๋กœ์ ํŠธ ๊ด€๋ฆฌ์™€ ์‹œ์Šคํ…œ ๊ฐœ๋ฐœ์—์„œ ์ง๋ฉดํ•˜๋Š” ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ ์ƒˆ๋กœ์šด ์ ‘๊ทผ๋ฒ•์œผ๋กœ ์ œ์‹œ๋œ๋‹ค. ํŠนํžˆ, ์—์ด์ „ํŠธ ๊ธฐ๋ฐ˜ ๋ชจ๋ธ๋ง์€ ๋ณต์žกํ•œ ์‹œ์Šคํ…œ์„ ํšจ๊ณผ์ ์œผ๋กœ ์„ค๊ณ„ํ•˜๊ณ  ๊ตฌํ˜„ํ•  ์ˆ˜ ์žˆ๋Š” ๋ฐฉ๋ฒ•๋ก  ์ค‘ ํ•˜๋‚˜๋กœ ์ฃผ๋ชฉ๋ฐ›๊ณ  ์žˆ๋‹ค. 1. ์—์ด์ „ํŠธ์˜ ์ž์œจ์„ฑ๊ณผ ๋ฐ˜์‘์„ฑ ๋…ผ๋ฌธ์—์„œ๋Š” ์—์ด์ „ํŠธ์˜ ํ•ต์‹ฌ ํŠน์ง•์œผ๋กœ ์ž์œจ์„ฑ๊ณผ ๋ฐ˜์‘์„ฑ์„ ๊ฐ•์กฐํ•œ๋‹ค. ์ž์œจ์„ฑ์€ ์—์ด์ „ํŠธ๊ฐ€ ์Šค์Šค๋กœ ์ž‘๋™ํ•˜๊ณ , ์‹œ์Šคํ…œ ๋ชฉํ‘œ๋ฅผ ๋‹ฌ์„ฑํ•˜๊ธฐ ์œ„ํ•ด ๋‚ด๋ถ€ ํ•˜์œ„ ๋ชฉํ‘œ๋ฅผ ์„ค์ •ํ•˜๊ณ  ์ด๋ฅผ ์ˆ˜ํ–‰ํ•˜๋Š” ๋Šฅ๋ ฅ์„ ์˜๋ฏธํ•œ๋‹ค. ์ด

System Computer Science Software Engineering
X-ray view on a Class using Conceptual Analysis in Java Environment

X-ray view on a Class using Conceptual Analysis in Java Environment

์ด ๋…ผ๋ฌธ์€ ๊ฐœ๋… ๋ถ„์„(Conceptual Analysis, CA)์„ ํ™œ์šฉํ•˜์—ฌ ์†Œํ”„ํŠธ์›จ์–ด ์žฌ๊ณตํ•™์—์„œ์˜ ๋ชจ๋“ˆํ™”์™€ ํด๋ž˜์Šค ๋‚ด๋ถ€ ๊ตฌ์กฐ๋ฅผ ๋ถ„์„ํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์ œ์‹œํ•˜๊ณ  ์žˆ๋‹ค. ํŠนํžˆ ์ž๋ฐ” ํ™˜๊ฒฝ์—์„œ ์ด๋Ÿฌํ•œ ์ ‘๊ทผ๋ฒ•์„ ์ ์šฉํ•จ์œผ๋กœ์จ, ๊ฐœ๋ฐœ์ž๋“ค์ด ์ฝ”๋“œ์˜ ๋ณต์žก์„ฑ์„ ์ค„์ด๊ณ  ์œ ์ง€๋ณด์ˆ˜์„ฑ์„ ํ–ฅ์ƒ์‹œํ‚ค๋Š” ๋ฐ ๋„์›€์ด ๋˜๋„๋ก ์„ค๊ณ„๋˜์—ˆ๋‹ค. ๊ฐœ๋… ๋ถ„์„๊ณผ X Ray ๋ทฐ ๊ฐœ๋… ๋ถ„์„์€ ์š”์†Œ๋“ค ๊ฐ„์˜ ๊ณตํ†ต ์†์„ฑ์— ๊ธฐ๋ฐ˜ํ•˜์—ฌ ์˜๋ฏธ ์žˆ๋Š” ์ง‘๋‹จ์„ ์‹๋ณ„ํ•˜๋Š” ์ด๋ก ์  ์ ‘๊ทผ๋ฒ•์ด๋‹ค. ์ด๋Ÿฌํ•œ ์ง‘๋‹จ์€ '๊ฐœ๋…'์œผ๋กœ ๋ถˆ๋ฆฌ๋ฉฐ, ๊ฐ๊ฐ์˜ ๊ฐœ๋…์€ ํŠน์ • ์†์„ฑ์„ ๊ณต์œ ํ•œ๋‹ค. ๋…ผ๋ฌธ์—์„œ๋Š” X Ray ๋ทฐ๋ผ๋Š” ๊ธฐ๋ฒ•์„ ์†Œ๊ฐœํ•˜๋Š”๋ฐ

Analysis Software Engineering Computer Science

< Category Statistics (Total: 702) >

Electrical Engineering and Systems Science
7
General
253
General Relativity
7
HEP-EX
5
HEP-PH
12
HEP-TH
5
MATH-PH
3
NUCL-TH
1
Quantum Physics
9

Start searching

Enter keywords to search articles

โ†‘โ†“
โ†ต
ESC
โŒ˜K Shortcut