Browse "CS-Conference Papers(학술회의논문)" by Type Conference

Showing results 4761 to 4780 of 7390

4761
Seamless QoS Guarantees in Mobile Internet Using NSIS with Advance Resource Reservation

Lee, Sooyong; Kim, Myungchul; Lee, Kyounghee; Seol, Soonuk; Lee, Gabsoo, 22nd International Conference on Advanced Information Networking and Applications, pp.464 - 471, IEEE, 2008

4762
Search based data sensitivity analysis applied to requirement engineering

Harman, Mark; Krinke, Jens; Ren, Jian; Yoo, Shin, 11th Annual Genetic and Evolutionary Computation Conference, GECCO-2009, pp.1681 - 1688, ACM SIGEVO, 2009-07-10

4763
Search Rays를 이용한 자동화된 3D 심장 세그멘테이션

김석열; 김재일; 박진아, 2008 한국컴퓨터그래픽스학회 하계학술대회, 한국컴퓨터그래픽스학회, 2008-07-07

4764
Searching a room by two guards

Park S.-M.; Lee J.-H.; Chwa, Kyung Yong, v.12, no.4, pp.339 - 352

4765
Searching Animation Models with a Lexical Ontology for Text Animation

Chang, Eunyoung; Park, Jong Cheol, Annual Meetings of the Human Computer Interaction, Human Computer Interaction, 2007-02

4766
Searching for Multi-fault Programs in Defects4J

An, Gabin; Yoon, Juyeon; Yoo, Shin, 13th International Symposium on Search Based Software Engineering, SSBSE 2021, pp.153 - 158, Springer International Publishing, 2021-10-11

4767
SeCGAN: Parallel Conditional Generative Adversarial Networks for Face Editing via Semantic Consistency

Sun, Justin; Bhattarai, Binod; Chen, Zhixiang; Kim, Tae-Kyun, IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), AI for Content Creation Workshop, IEEE, CVF, 2022-06-19

4768
Secondary User Games with Spectrum Leasing Market in Cooperative Cognitive Radio Networks

Roh, Heejun; Lee, Sinjae; Lee, Wonjun; Shao, Chenglong; Du, Ding-Zhu, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE Communications Society, 2013-04-14

4769
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment

Jang, Jin Soo; Kong, Sun June; Kim, Min Su; Kim, Dae Gyeong; Kang, Brent Byunghoon, Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS 2015), Internet Society, 2015-02-08

4770
Sector log: Fine-grained storage management for solid state drives

Jin, Seongwook; Kim, Jaehong; Kim, Jaegeuk; Huh, Jaehyuk; Maeng, SeungRyoul, 26th Annual ACM Symposium on Applied Computing, SAC 2011, pp.360 - 367, ACM, 2011-03-21

4771
Secure and efficient deduplication over encrypted data with dynamic updates in cloud storage

Koo, Dong-Young; Hur, Junbeom; Yoon, Hyunsoo, 2014 FTRA International Symposium on Frontier and Innovation in Future Computing and Communications, FCC 2014, pp.229 - 235, Springer Verlag, 2014-01

4772
Secure and Efficient Routing Protocol in Ad Hoc Network with ID-Based Aggregate Signature

Yoon, Hyunsoo; Song, J; Kim, H, The 4th Asia Pacific International Symposium on Information Technology (APIS 2005), pp.303 - 306, 2005

4773
Secure Approach to Deploy RFID-based Applications in Smart Home Environment

Konidala, D.M.; Kim, Z; Yoon, C; Li, Jin; Kim, Kwangjo, 한국정보보호학회 동계정보보호학술대회, v.17, no.2, pp.717 - 720, Korea Institute of Information Security & Cryptology, 2007-12

4774
Secure Consolidated Authorization Mechanism for Supply Chain Management

Hong, Seung-Phil; Ahn, Gail-Joon; Kim, Myungchul, International Journal of Computer and Information Science (IJCIS), 2001

4775
Secure group communication with multiplicative one-way functions

Kim, H.; Hong, SM; Yoon, Hyunsoo; Cho, JW, ITCC 2005 - International Conference on Information Technology: Coding and Computing, pp.685 - 690, ITCC '05, 2005-04-04

4776
Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye

Hou, Jong-Uk; Kim, Dongkyu; Song, Hyun-Ji; Lee, Heung-Kyu, 4th ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2016, pp.169 - 174, Association for Computing Machinery, Inc, 2016-06-20

4777
Secure In-memory Key-Value Storage with SGX

Kim, Taehoon; Park, Joongun; Woo, Jaewook; Jeon, Seungheun; Huh, Jaehyuk, ACM Symposium on Cloud Computing (SoCC), pp.507, ASSOC COMPUTING MACHINERY, 2018-10

4778
Secure Key Issuing in ID-based Cryptography

Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, AISW04, pp.0 - 0, Australian Computer Society Inc, 2004-01

4779
Secure Many-to-many Multicast in Heterogenous Networks

Hur, J; Koo, D; Yoon, Hyunsoo, 2009 Advances in Cryptography, Security, and Application for Future Computing, 2009-12-11

4780
Secure MMU: Architectural Support for Memory Isolation among Virtual Machines

Huh, Jaehyuk; Jin, Seongwook, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.217 - 222, IEEE COMPUTER SOC, 2011-06

Discover

rss_1.0 rss_2.0 atom_1.0