Showing results 481 to 500 of 7497
A Seamless Integration in Object-Oriented Database Systems Whang, Kyu-Young, pp.675 - 676, 1989-02 |
A Seamless Java Relational Binding through ODMG ODL Parser Embedding Object-Relational Wrapper Kim, Gyu Back; Park, In Suk; Hyun, SoonJoo, ICIS' 01, pp.0 - 0, 2001-10-01 |
A Secure and Privacy Enhanced Location-based Service Transaction Protocol in Ubiquitous Computing Environment Kim, Kwangjo; Divyan, K.M.; Deng, R.H.; Zhou, J, SCIS04, pp.931 - 936, SCIS, 2004-01 |
A secure and privacy enhanced protocol for location-based services in ubiquitous society Konidala, D.M.; Yeun, C.Y.; Kim, Kwangjo, GLOBECOM'04 - IEEE Global Telecommunications Conference, v.4, pp.2164 - 2168, 2004-11-29 |
A Secure Clustering Scheme over an Energy aware Routing Protocol for Monitoring Critical Conditions Yoo, M; Kim, J; Kim, Kwangjo, Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2009-01 |
A Secure Location-Based Service Reservation Protocol in Pervasive Computing Environment Divyan, K.M.; Kim, Kwangjo, 2003년도 한국정보보호학회 동계학술대회, pp.669 - 685, 한국정보보호학회, 2003-12-06 |
A Secure On-line Lottery using Bank as a notary Ham, W; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.121 - 124, 한국정보보호학회, 2002-11-16 |
A Secure RFID Reader Protocol based on SLRRP Lee, H; Kim, Kwangjo, Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2007-01-23 |
A Secure Strong Proxy Signature Scheme with Proxy Signer Privacy Protection Yoon, Hyunsoo; Lee, Y; Hong, SM, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.33 - 38, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24 |
A Secure Testament Revealing Protocol Han, K; Zhang, F; Kim, J; Kim, Kwangjo, SCIS2003, pp.399 - 404, SCIS, 2003-01 |
A Securely Transferable Ebooks using Public-Key Infrastructure 김명선; 김종승; 이정연; 김광조, 2001년도 한국정보보호학회 종합학술 발표대회, pp.371 - 374, 한국정보보호학회, 2001-11-24 |
A security framework with trust management for sensor networks Yao, Z.; Kim, Daeyoung; Lee, I.; Kim, K.; Jang, J., Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005, pp.184 - 192, 2005-09-05 |
A Segmental HMM Based On the Parametric Trajectory Feature Yun, Y; Oh, Yung-Hwan, , 1999-12 |
A segmental-Feature HMM using Parametric Trajectory Model Yun, YS; Oh, Yung-Hwan, ICASSP2000, pp.1249 - 1252, ICASSP, 2000-06 |
A semantic approach for more robust and efficient service discovery Kadel, Prakash; Shin, Ji-Ae; Choi, Ho-Jin, 2008 IEEE 8th International Conference on Computer and Information Technology, CIT 2008, pp.503 - 508, IEEE Computer Society, 2008-07-08 |
A Semantic Approach for Service Discovery Kadel, Prakash; Shin, Ji-Ae; Choi, Ho-Jin, The 7th International Conference on Applications and Principles of Information Science (APIS-2008), pp.339 - 342, 2008-01-29 |
A semantic fragrance trail based scalable service discovery in MANET Kim, Dohyun; Kang, Saehoon; Lee, Young-Hee; Lee, DongMan; Kim, Jeong Seon, 9th International Conference on Advanced Communication Technology, ICACT 2007, v.1, pp.489 - 494, 2007-02-12 |
A semantically-based task model and selection mechanism in ubiquitous computing environments Jimenez-Molina Angel; Kim, Jun-Sung; Koo, Hyung-Min; Kang, Byung-Seok; Ko, In-Young, 13th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, KES 2009, pp.829 - 837, KES, 2009-09-28 |
A semijoin strategy for distributed query optimization Chung, Chin-Wan; Irani, K, 4th International Conference on Distributed Computing Systems, pp.368 - 377, 1984-05 |
A Sensor Network Query Processing System for Healthcare Data Acquisition for Dr. M Lee, Chan Hee; Kim, Taehun; Hyun, Soon Joo, International Conference on Data Engineering (ICDE) 2016, IEEE Computer Society, 2016-05-16 |
Discover