CS-Journal Papers(저널논문)

Recent Items

Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 3221

1

암호와 정보보호

김광조researcher대한민국학술원학문연구의 동향과 쟁점 - 전기공학, 전자공학, 정보통신공학, v.7, 2018-01

2

Methods and Tools to Construct a Global Indoor Positioning System

Jung, Suk-Hoon; Lee, Gunwoo; Han, Dong-SooresearcherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCIEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, v.48, no.6, pp.906 - 919, 2018-06

3

APS: adaptable prefetching scheme to different running environments for concurrent read streams in distributed file systems

Lee, Sangmin; Hyun, Soon-Jooresearcher; Kim, Hong-Yeon; Kim, Young-KyunSPRINGERJOURNAL OF SUPERCOMPUTING, v.74, no.6, pp.2870 - 2902, 2018-06

4

Wide dynamic range high-speed three-dimensional quantitative OCT angiography with a hybrid-beam scan

Park, Tae Jin; Jang, Sun Joo; Han, Myounghee; Ryu, Sukyoungresearcher; Oh, Wang-YuhlresearcherOPTICAL SOC AMEROPTICS LETTERS, v.43, no.10, pp.2237 - 2240, 2018-05

5

A Scalable and Efficient Metadata Framework Towards Internet of Things

Sung, Jong-Woo; Kim, Taehong; Kim, Young-Joo; Lopez, Tomas Sanchez; Kim, DaeyoungresearcherSPRINGERWIRELESS PERSONAL COMMUNICATIONS, v.100, no.3, pp.1129 - 1148, 2018-06

6

A SIFT features based blind watermarking for DIBR 3D images

Nam, Seung-Hun; Kim, Wook-Hyoung; Mun, Seung-Min; Hou, Jong-Uk; Choi, Sung-Heeresearcher; Lee, Heung-KyuresearcherSPRINGERMULTIMEDIA TOOLS AND APPLICATIONS, v.77, no.7, pp.7811 - 7850, 2018-04

7

Key alternating ciphers based on involutions

Lee, JooyoungresearcherSPRINGERDESIGNS CODES AND CRYPTOGRAPHY, v.86, no.5, pp.955 - 988, 2018-05

8

EMSA: Extensibility Metric for Software Architecture

Kim, Jungho; Kang, Sungwonresearcher; Ahn, Jongsun; Lee, SeonahWORLD SCIENTIFIC PUBL CO PTE LTDINTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, v.28, no.3, pp.371 - 405, 2018-03

9

Flower-Pop: Facilitating Casual Group Conversations With Multiple Mobile Devices

Lee, Moon Hwan; Row, Yeakyung; Son, Oo Sung; Lee, Uichinresearcher; Kim, JaeJeung; Jeong, Jungi; Maeng, Seungryoulresearcher; Nam, Tek-JinresearcherACMProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, v.1, no.4, 2017-12

10

Two-stream neural networks to detect manipulation of JPEG compressed images

Kim, H. -G.; Park, J. -S.; Kim, D. -G.; Lee, Heung-KyuresearcherINST ENGINEERING TECHNOLOGY-IETELECTRONICS LETTERS, v.54, no.6, pp.354 - 355, 2018-03

11

Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions

Manes, Valentin J. M.; Jang, Daehee; Ryu, Chanho; Kang, Brent ByunghoonresearcherELSEVIER ADVANCED TECHNOLOGYCOMPUTERS & SECURITY, v.74, pp.130 - 143, 2018-05

12

시스템 오브 시스템즈 수준의 목표 달성 검증을 위한 행동-이익-비용 모델과 통계적 모델 체킹 적용 연구

김준호; 신동환; 배두환researcher한국정보과학회정보과학회 컴퓨팅의 실제 논문지, v.23, no.4, pp.256 - 261, 2017

13

LSTM 모델 기반 주행 모드 인식을 통한 자율 주행에 관한 연구

김은희; 오혜연researcher한국ITS학회한국ITS학회 논문지, v.16, no.4, pp.153 - 163, 2017-08

14

Preventing Sate-led Cyberattacks using the Bright Internet and Internet Peace Principles

Shin, Young Yung; Lee, Jae Kyuresearcher; Kim, Myung-ChulresearcherASSOC INFORMATION SYSTEMSJOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, v.19, no.3, pp.152 - 181, 2018-03

15

Frame-rate conversion detection based on periodicity of motion artifact

Jung, Dae-Jin; Lee, Heung-KyuresearcherSPRINGERMULTIMEDIA TOOLS AND APPLICATIONS, v.77, no.5, pp.6095 - 6116, 2018-03

16

Cropping-resilient 3D mesh watermarking based on consistent segmentation and mesh steganalysis

Jang, Han-Ul; Choi, Hak-Yeol; Son, Jeongho; Kim, Dongkyu; Hou, Jong-Uk; Choi, Sungheeresearcher; Lee, Heung-KyuresearcherSPRINGERMULTIMEDIA TOOLS AND APPLICATIONS, v.77, no.5, pp.5685 - 5712, 2018-03

17

MC-Fluid: Multi-Core Fluid-Based Mixed-Criticality Scheduling

Lee, Jaewoo; Ramanathan, Saravanan; Kieu-My Phan; Easwaran, Arvind; Shin, Insikresearcher; Lee, InsupIEEE COMPUTER SOCIEEE TRANSACTIONS ON COMPUTERS, v.67, no.4, pp.469 - 483, 2018-04

18

신경망 기반 텍스트 모델링에 있어 순차적 결합 방법의 한계점과 이를 극복하기 위한 담화 기반의 결합 방법

이강욱; 한상규; 맹성현researcher한국정보과학회정보과학회 컴퓨팅의 실제 논문지, v.23, no.12, pp.698 - 702, 2017

19

추상 도달가능성 그래프 기반 소프트웨어 모델체킹에서의 탐색전략 고려방법

이낙원; 백종문researcher한국정보과학회정보과학회논문지, v.44, no.10, pp.1034 - 1044, 2017-10

20

WALA와 Boa를 활용하여 대규모 소프트웨어 저장소를 정적으로 분석하는 도구 개발

박경희; 류석영researcher한국정보과학회정보과학회논문지, v.44, no.10, pp.1081 - 1086, 2017-10

rss_1.0 rss_2.0 atom_1.0