Showing results 2441 to 2460 of 4025
Revisiting Shared Cache Contention Problems: A Practical Hardware-Software Cooperative Approach Pak, Eun-Ji; Kim, Sang-Hoon; Huh, Jae-Hyuk; Maeng, Seung-Ryoul, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E96D, no.7, pp.1457 - 1466, 2013-07 |
Reviving Delay-based TCP for Data Centers Lee, Chang-Hyun; Jang, Keon; Moon, Sue-Bok, COMPUTER COMMUNICATION REVIEW, v.42, no.4, pp.111 - 112, 2012-10 |
RFID Data Processing in Supply Chain Management Using a Path Encoding Scheme Lee, Chun-Hee; Chung, Chin-Wan, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, v.23, no.5, pp.742 - 758, 2011-05 |
RFID와 USN 통합 인프라스트럭처를 위한 EPC 센서 네트워크 성종우; 김대영, 한국통신학회논문지, v.23, no.12, pp.37 - 46, 2006-12 |
RGB-D 이미지를 활용한 CNN 기반 실시간 파지점 탐색 김수지; 최성희, 정보과학회 컴퓨팅의 실제 논문지, v.26, no.2, pp.116 - 121, 2020-02 |
Rhythmic-motion synthesis based on motion-beat analysis Kim, TH; Park, SI; Shin, Sung-Yong, ACM TRANSACTIONS ON GRAPHICS, v.22, no.3, pp.392 - 401, 2003-07 |
Rigorous Rental Memory Management for Embedded Systems Jeong, Jinkyu; Kim, Hwanju; Hwang, Jeaho; Lee, Joonwon; Maeng, SeungRyoul, ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, v.12, 2013-03 |
The ring authenticated encryption scheme – How to provide a clue wisely Lv, Jiqiang; Ren, Kui; Chen, Xiaofeng; Kim, Kwangjo, Information Sciences, Vol.179, pp.161-168, 2009 |
Ring embedding in faulty star graphs Chang, JH; Shin, CS; Chwa, Kyung Yong, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E82A, no.9, pp.1953 - 1964, 1999-09 |
RM-MAC: a reservation based multi-channel MAC protocol for wireless sensor networks Pyeon, Dohoo; Jang, Ingook; Yoon, Hyunsoo; Kim, Dongwook, WIRELESS NETWORKS, v.22, no.8, pp.2727 - 2739, 2016-11 |
RNN을 이용한 동작기록 마이닝 기반의 추천 방법 조희태; 이선아; 강성원, 정보처리학회논문지. 소프트웨어 및 데이터 공학, v.7, no.12, pp.461 - 468, 2018-12 |
Robust CAPTCHA Image Generation Enhanced with Adversarial Example Methods Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E103D, no.4, 2020-04 |
Robust DT-CWT Watermarking for DIBR 3D Images Kim, Hee-Dong; Lee, Ji-Won; Oh, Tae-Woo; Lee, Heung-Kyu, IEEE TRANSACTIONS ON BROADCASTING, v.58, no.4, pp.533 - 543, 2012-12 |
Robust estimation of discrete hidden Markov model parameters using the entropy-based feature-parameter weighting and source-quantization modeling Choi, HJ; Yun, SJ; Oh, Yung-Hwan, ARTIFICIAL INTELLIGENCE IN ENGINEERING, v.12, no.3, pp.243 - 252, 1998-07 |
Robust Estimation of Output Probabilities Based on the State-Dependent Source Modeling and the Feature Parameter Weighting in Discrete Hidden Markov Model Hwan-Jin Choi; Oh, Yung-Hwan, ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 1999-01 |
Robust high-definition video watermarking based on self-synchronizing signals against composite distortions Oh, Tae-Woo; Lee, Min-Jeong; Kim, Kyung-Su; Lee, Heung-Kyu; Lee, Hae-Yeoun, OPTICAL ENGINEERING, v.49, 2010-09 |
Robust Image Denoising Using a Virtual Flash Image for Monte Carlo Ray Tracing Moon, Bochang; Jun, Jong Yun; Lee, JongHyeob; Kim, Kunho; Hachisuka, T; Yoon, Sung-Eui, COMPUTER GRAPHICS FORUM, v.32, no.1, pp.139 - 151, 2013-02 |
Robust image segmentation using genetic algorithm with a fuzzy measure Chun, DN; Yang, Hyun-Seung, PATTERN RECOGNITION, v.29, no.7, pp.1195 - 1211, 1996-07 |
Robust image watermark using Radon transform and bispectrum invariants Kim, HS; Baek, Y; Lee, Heung-Kyu; Suh, YH, INFORMATION HIDING BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2578, pp.145 - 159, 2003 |
Robust image watermarking using local invariant features Lee, HY; Kim, H; Lee, Heung-Kyu, OPTICAL ENGINEERING, v.45, pp.90 - 96, 2006-03 |
Discover