Showing results 4641 to 4660 of 7479
Restricted Boltzmann Machine을 이용한 스마트폰 사용자 낙상 인지 정영섭; 오교중; 최호진, KIISE Symposium - Ubiquitous Computing and Web Information Technology, pp.109 - 113, UCWIT, 2012-12-07 |
Restructuring the Concurrent B+-tree with Non-blocked Search Lim, S.; Kim, Myoung Ho, Hisinchu,Taiwan, 1999-01-01 |
Result of the 1st Worldwide Internet Voting System Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.219 - 224, 한국정보보호학회, 2002-11-16 |
Resuscitating Privacy-Preserving Mobile Payment with Customer in Complete Control Konidala, Divyan M.; Dwijaksara, Made H; Kim, Kwangjo; Lee, Dongman; Lee, Byoungcheon; Kim, Daeyoung; Kim, Soontae, International Workshop on Smartphone Applications and Services, 2010-12-09 |
Rethinking Annotation: Can Language Learners Contribute? Yoo, Haneul; Rifki Afina Putri; Lee, Changyoon; Lee, Youngin; Ahn, So-Yeon; Kang, Dongyeop; Oh, Alice Haeyun, The 61st Annual Meeting of the Association for Computational Linguistics (ACL 2023), pp.14714 - 14733, Association for Computational Linguistics, 2023-07 |
Rethinking energy-performance trade-off in mobile web page loading Bui, Duc Hoang; Liu, Yunxin; Kim, Hyosu; Shin, Insik; Zhao, Feng, 21st Annual International Conference on Mobile Computing and Networking, MobiCom 2015, pp.14 - 26, ACM Special Interest Group on Mobility of Systems, Users, Data and Computing (SIGMOBILE), 2015-09 |
Rethinking File Mapping for Persistent Memory Neal, Ian; Zuo, Gefei; Shiple, Eric; Khan, Tanvir Ahmed; Kwon, Youngjin; Peter, Simon; Kasikci, Axis, 19th USENIX Conference on File and Storage Technologies (FAST), pp.97 - 111, USENIX ASSOC, 2021-02 |
RETracer: Triaging Crashes by Reverse Execution from Partial Memory Dumps Cui, Weidong; Peinado, Marcus; Cha, Sang Kil; Fratantonio, Yanick; Kemerlis, Vasileios P., International Conference on Software Engineering, IEEE Computer Society, 2016-05-19 |
Reusable Software Components for Database Management Systems Oh, S.H.; Lee, Yoon Joon; Kim, Myoung Ho, The Korea Database Society Conference, pp.167 - 179, The Korea Database Society, 1991-12 |
Revamping hardware persistency models: view-based and axiomatic persistency models for Intel-x86 and Armv8 Cho, Kyeongmin; Lee, Sung-Hwan; Raad, Azalea; Kang, Jeehoon, PLDI '21: 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, pp.16 - 31, ACM, 2021-06-19 |
Revamping the IEEE 802.11a PHY Simulation Models Ryu, Jiho; Lee, Jeongkeun; Lee, Sung-Ju; Kwon, Taekyoung, The 11th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2008), ACM, 2008-10-28 |
Revealing the Linkability of Popescue ID-based Group Signature Scheme Choi, H; Zhang, F; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.81 - 83, Korea Institute of Information Security & Cryptology, 2002-11-16 |
Reversible data hiding giving priority to the use of edges and textures Hu, Y.; Lee, Heung-Kyu; Li, J., 5th International Conference on Visual Information Engineering, VIE 2008, no.543 CP, pp.643 - 647, IEEE, 2008-07-29 |
Reversible data hiding using prediction error values embedding Hu, Y.; Lee, Heung-Kyu; Li, J.; Chen, K., 6th International Workshop on Digital Watermarking, IWDW 2007, pp.244 - 253, Springer Verlag, 2007-12-03 |
Review of Mobile Social SNS Services 문수복, Samsung Electronics Digital Media Center, Samsung Electronics Digital Media Center, 2011-05-30 |
ReviewAid: A Scaffolded Approach to Supporting Readers' Evaluation of Health News Ko, Eun-Young; Kim, Yeonsu; Kim, Juho, 16th International Conference of the Learning Sciences, ICLS 2022, pp.313 - 320, International Society of the Learning Sciences (ISLS), 2022-06 |
Revising Learner Misconceptions Without Feedback: Prompting for Reflection on Anomalous Facts Williams, Joseph Jay; Lombrozo, Tania; Hsu, Anne; Huber, Bernd; Kim, Juho, 34th Annual CHI Conference on Human Factors in Computing Systems, CHI 2016, pp.470 - 474, ACM Special Interest Group on Computer-Human Interaction (SIGCHI), 2016-05-11 |
Revisit Prediction by Deep Survival Analysis Kim, Sundong; Song, Hwanjun; Kim, Sejin; Kim, Beomyoung; Lee, Jae-Gil, 24th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2020, pp.514 - 526, Springer, 2020-05-14 |
Revisiting CK 17 Linearly Homomorphic Ring Signature based on SIS Choi, Rakyong; Kim, Kwangjo, 2018 Symposium on Cryptography and Information Security (SCIS 2018), IEICE Technical Committee on Information Security, 2018-01-24 |
Revisiting Concatenative Video Synthesis with Relaxed Constraints Gil, Sangyoung; Park, Jong Cheol, 2nd International Workshop on Sign Language Translation and Avatar Technology (SLTAT) in conjunction with 13th International ACM SIGACCESS Conference on Computers and Accessibility (ASSETS), 2nd International Workshop on Sign Language Translation and Avatar Technology (SLTAT) in conjunction with 13th International ACM SIGACCESS Conference on Computers and Accessibility (ASSETS), 2011-10-23 |
Discover