Showing results 3001 to 3020 of 7390
Implementation of the Knowledge Portal Integrated with Biodatabase into Bioinformatics Research Gang, Kwang-Wook; Rho, Jae-Jeung; Hyun, SoonJoo; Lim, JaeHyung, Int'l Conf. on Industrial Engineering - Theory, Applications and Practice, pp.1199 - 1204, 2003-11-10 |
Implementation of tree-based dynamic group key exchange with NewHope Choi, Rakyong; Hong, Dongyeon; Kim, Kwangjo, 2020 Symposium on Cryptography and Information Security (SCIS 2020), IEICE Technical Committee on Information Security, 2020-01-28 |
Implementation X-WAM for the Parallel Execution of Logic Program 조정완, Proceedings of KISS Conference, pp.143 - 146, 1987 |
Implementing a dynamically reconfigurable wireless mesh network testbed for multi-faceted QoS Support Jang, SiYoung; Shin, Byoungheon; Lee, Dongman, 11th International Conference on Future Internet Technologies, CFI 2016, pp.95 - 98, Association for Computing Machinery, 2016-06-16 |
Implementing an OMEGA Query Processor Lee, YJ; Chung, Chin-Wan, The 4th International Conference on Computer Science and Informatics, v.3, pp.221 - 224, 1998-10-23 |
Implicit Ambiguity Resolution Using Incremental Clustering in Korean-to-English Cross-Language Information Retrieval Lee, KS; Kageura, K; Choi, Key-Sun, The 19th International Conference on Computational Linguistics, pp.537 - 543, 2002 |
Implicit LiDAR Network: LiDAR Super-Resolution via Interpolation Weight Prediction KWON, YOUNGSUN; Sung, Minhyuk; Yoon, Sung-Eui, 2022 IEEE International Conference on Robotics and Automation (ICRA 2022), pp.8424 - 8430, IEEE Robotics and Automation Society, 2022-05-26 |
Implied scenario analysis in UML 2.0 scenario specfication Song, In-Gwon; Jeon, Sang-Uk; Hong, Jang-Eui; Bae, Doo-Hwan, International Conference on System Integration and reliability Improvements, v.1, no.1, IEEE Computer Society, 2006-12 |
Implied scenario analysis in UML 2.0 scenario specification Song, In-Gwon; Jeon, Sang-Uk; Bae, Doo-Hwan; Hong, Jang-Eui, International Conference on System Integration and Reliability Improvement, SIRI, 2006-12 |
Importance-Based Streamline Seeding Method Using a Regression Model Lee, Joong-Youn; Park, Jinah, IEEE VIS 2019, IEEE, 2019-10-20 |
Improved 3D mesh steganalysis using homogeneous kernel map Kim, Dongkyu; Jang, Han-Ul; Choi, Hak-Yeol; Son, Jeongho; Yu, In-Jae; Lee, Heung-Kyu, 8th International Conference on Information Science and Applications, ICISA 2017, pp.358 - 365, Springer Verlag, 2017-03-20 |
Improved approximation algorithm for connected facility location problems Hasan M.K.; Jung H.; Chwa, Kyung Yong, 1st International Conference on Combinatorial Optimization and Applications, COCOA 2007, pp.311 - 322, COCOA, 2007-08-14 |
Improved chained and Cuckoo hashing methods for large-scale multi-core systems Kim, Euihyeok; Kim, Min-Soo, FTRA-AIM 2013 : FTRA International Conference on Advanced IT, engineering and Management, FTRA / KITCS, 2013-02-21 |
Improved Gossiping Algorithm in Rectangular Grids Chwa Kyung Yong, , 2003-01-01 |
Improved Gossipings by Short Messages in 2-D Meshes Chwa, Kyung Yong, , 2000-01-01 |
Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider Park, H; Asano, T; Kim, Kwangjo, 2009 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2009-01-20 |
Improved lexicon modeling for continuous speech recognition Yun, SJ; Oh, Yung-Hwan; Shin, GC, Proceedings of the 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP. Part 1 (of 5), pp.1827 - 1830, IEEE, 1997-04-21 |
Improved primal-dual approximation algorithm for the connected facility location problem Jung H.; Hasan M.K.; Chwa, Kyung Yong, 2nd International Conference on Combinatorial Optimization and Applications, COCOA 2008, pp.265 - 277, COCOA, 2008-08-21 |
Improved Security Analysis for Nonce-Based Enhanced Hash-then-Mask MACs Choi, Wonseok; Lee, Byeonghak; Lee, Yeongmin; Lee, Jooyoung, 26th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, pp.697 - 723, Springer Science and Business Media Deutschland GmbH, 2020-12-08 |
Improved Self-Encryption Scheme for Resource Limited Mobile Devices Shin, Yongjoo; Shin, Seungjae; Kim, Minsoo; Yoon, Hyunsoo, International Conference IT Convergence and Security (ICITC 2012), SPRINGER, 2012-12-05 |
Discover