Browse "CS-Conference Papers(학술회의논문)" by Type Conference

Showing results 4241 to 4260 of 7390

4241
POSTER: Zero-Day Evasion Attack Analysis on Race between Attack and Defense

KWON, HYUN; Yoon, Hyunsoo; Choi, Deaseon, 13th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2018, pp.805 - 807, Association for Computing Machinery, Inc, 2018-06-05

4242
Potential Security Concerns at the Physical Layer of 6G Cellular Systems

Kang, Min Suk, 13th International Conference on Information and Communication Technology Convergence, ICTC 2022, pp.981 - 984, IEEE Computer Society, 2022-10

4243
Power aware chain routing protocol for data gathering in sensor networks

Pham, M.-L.; Kim, Daeyoung; Doh, Y.; Yoo, S.-E., 2004 Intelligent Sensors, Sensor Networks and Information Processing Conference, ISSNIP '04, pp.107 - 112, 2004-12-14

4244
Power Control in Wireless Ad Hoc Networks for Energy Efficient Routing with Capacity Maximization

Bae, K; Lim, G; Kim, N; Yoon, Hyunsoo, WMSCI 2003, pp.329 - 334, 2003-07-27

4245
Power of Earned Advertising on SNS: A Case Study of Friend Tagging on Facebook

Park, Jaimie Y; Sohn, Yunkyu; Moon, Sue Bok, 10th International Conference on Web and Social Media, ICWSM 2016, Association for the Advancement of Artificial Intelligence (AAAI), 2016-05-18

4246
Power-aware Ad hoc On-Demand Distance Vector Routing for Prolonging Network Lifetime of MANETs

Hoang, XuanTung; Ahn, Soyeon; Lee, Young-Hee, 한국정보처리학회 2002년도 추계 학술발표대회, v.9, no.2, pp.1317 - 1320, 2002-11

4247
Power-aware Partitioned Cache Architectures

Kim, Soontae; Kandemir, M.; Sivasubramaniam, A.; Irwin, M.J.; Geethanjali, E., ACM/IEEE International Symposium on Low Power Electronics and Design, pp.64 - 67, 2001-08

4248
POWER: Program Option-Aware Fuzzer for High Bug Detection Ability

Lee, Ahcheong; Ariq, Irfan; Kim, Yunho; Kim, Moonzoo, IEEE International Conference on Software Testing, Verification and Validation (ICST), pp.220 - 231, Institute of Electrical and Electronics Engineers Inc., 2022-04-06

4249
PowerForecaster: Predicting Smartphone Power Impact of Continuous Sensing Applications at Pre-installation Time

Min, Chulhong; Lee, Youngki; Yoo, Chungkuk; Kang, Seungwoo; Choi, Sangwon; Park, Pill Soon; Hwang, Inseok; et al, 13th ACM Conference on Embedded Networked Sensor Systems, SenSys 2015, pp.31 - 44, Association for Computing Machinery, Inc, 2015-11-01

4250
PowerGesture: Browsing Slides Using Hand Gesture

Lee, H.K.; Kim, JinHyung, 2nd International Symposium on Intelligent Automation Control(ISIAC), pp.0 - 0, ISIAC, 1998-05

4251
PowerGesture: 제스쳐 Spotting기법을 이용한 표지원시스템

이현규; 김진형, HCI '97학술대회, pp.90 - 95, 1997

4252
PowMash: 프레젠테이션 작성 스킴 기반 최종 사용자 서비스 매쉬업

남상규; Noé Domínguez; 고인영, 2017 한국컴퓨터종합학술대회 (KCC2017), 한국정보과학회, 2017-06-19

4253
Practical delay monitoring for ISPs

Choi, Baek-Young; Moon, Sue Bok; Cruz, Rene; Zhang, Zhi-Li; Diot, Christophe, 1st International Conference on Emerging Networking Experiments and Technologies, CoNEXT'05, pp.83 - 92, Centre National de la Recherche Scientifique, CNRS, 2005-10-24

4254
Practical Human Resource Allocation in Software Projects Using Genetic Algorithm

Park, Jihun; Seo, Dongwon; Hong, Gwangui; Shin, Donghwan; Hwa, Jimin; Bae, Doo-Hwan, 26th International Conference on Software Engineering and Knowledge Engineering, pp.688 - 694, International Conference on Software Engineering and Knowledge Engineering, 2014-07

4255
Practical multiple scattering for rough surfaces

Lee, Joo Ho; Jarabo, Adrian; Jeon, Daniel; Gutierrez, Diego; Kim, Min Hyuk, International Conference on Computer Graphics and Interactive Techniques, SIGGRAPH Asia 2018, pp.1 - 12, Association for Computing Machinery (ACM), 2018-12

4256
Practical pay TV schemes

Narayanan, Arvind; Pandu Rangan C.; Kim, Kwangjo, 8th Australasian Conference on Information Security and Privacy, ACISP 2003, pp.192 - 203, Springer-Verlag, 2003-07-09

4257
Practical schemes using logs for lightweight recoverable DSM

Kim, Youngjae; Park, Soyeon; Maeng, SeungRyoul, Proceedings of the Fifteenth IASTED International Conference on Parallel and Distributed Computing and Systems, v.15, no.2, pp.688 - 693, ACTA Press, 2003-11-03

4258
Practical Security Analysis for the Constrained Node Networks: Focusing on the DTLS Protocol

Han, Jiyong; Ha, Minkeun; Kim, Daeyoung, The 5th International Conference on Internet of Things (IoT 2015), The 5th International Conference on Internet of Things (IoT 2015), 2015-10-26

4259
Practical SVBRDF acquisition of 3D objects with unstructured flash photography

Nam, Giljoo; Lee, Joo Ho; Gutierrez, Diego; Kim, Min Hyuk, International Conference on Computer Graphics and Interactive Techniques, SIGGRAPH Asia 2018, pp.1 - 12, Association for Computing Machinery (ACM), 2018-12

4260
Practical threshold signatures without random oracles

Li, J.; Yuen, T.H.; Kim, Kwangjo, 1st International Conference on Provable Security 2007, ProvSec 2007, v.4784, pp.198 - 207, 2007

Discover

rss_1.0 rss_2.0 atom_1.0