Showing results 4761 to 4780 of 7390
Seamless QoS Guarantees in Mobile Internet Using NSIS with Advance Resource Reservation Lee, Sooyong; Kim, Myungchul; Lee, Kyounghee; Seol, Soonuk; Lee, Gabsoo, 22nd International Conference on Advanced Information Networking and Applications, pp.464 - 471, IEEE, 2008 |
Search based data sensitivity analysis applied to requirement engineering Harman, Mark; Krinke, Jens; Ren, Jian; Yoo, Shin, 11th Annual Genetic and Evolutionary Computation Conference, GECCO-2009, pp.1681 - 1688, ACM SIGEVO, 2009-07-10 |
Search Rays를 이용한 자동화된 3D 심장 세그멘테이션 김석열; 김재일; 박진아, 2008 한국컴퓨터그래픽스학회 하계학술대회, 한국컴퓨터그래픽스학회, 2008-07-07 |
Searching a room by two guards Park S.-M.; Lee J.-H.; Chwa, Kyung Yong, v.12, no.4, pp.339 - 352 |
Searching Animation Models with a Lexical Ontology for Text Animation Chang, Eunyoung; Park, Jong Cheol, Annual Meetings of the Human Computer Interaction, Human Computer Interaction, 2007-02 |
Searching for Multi-fault Programs in Defects4J An, Gabin; Yoon, Juyeon; Yoo, Shin, 13th International Symposium on Search Based Software Engineering, SSBSE 2021, pp.153 - 158, Springer International Publishing, 2021-10-11 |
SeCGAN: Parallel Conditional Generative Adversarial Networks for Face Editing via Semantic Consistency Sun, Justin; Bhattarai, Binod; Chen, Zhixiang; Kim, Tae-Kyun, IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), AI for Content Creation Workshop, IEEE, CVF, 2022-06-19 |
Secondary User Games with Spectrum Leasing Market in Cooperative Cognitive Radio Networks Roh, Heejun; Lee, Sinjae; Lee, Wonjun; Shao, Chenglong; Du, Ding-Zhu, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE Communications Society, 2013-04-14 |
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment Jang, Jin Soo; Kong, Sun June; Kim, Min Su; Kim, Dae Gyeong; Kang, Brent Byunghoon, Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS 2015), Internet Society, 2015-02-08 |
Sector log: Fine-grained storage management for solid state drives Jin, Seongwook; Kim, Jaehong; Kim, Jaegeuk; Huh, Jaehyuk; Maeng, SeungRyoul, 26th Annual ACM Symposium on Applied Computing, SAC 2011, pp.360 - 367, ACM, 2011-03-21 |
Secure and efficient deduplication over encrypted data with dynamic updates in cloud storage Koo, Dong-Young; Hur, Junbeom; Yoon, Hyunsoo, 2014 FTRA International Symposium on Frontier and Innovation in Future Computing and Communications, FCC 2014, pp.229 - 235, Springer Verlag, 2014-01 |
Secure and Efficient Routing Protocol in Ad Hoc Network with ID-Based Aggregate Signature Yoon, Hyunsoo; Song, J; Kim, H, The 4th Asia Pacific International Symposium on Information Technology (APIS 2005), pp.303 - 306, 2005 |
Secure Approach to Deploy RFID-based Applications in Smart Home Environment Konidala, D.M.; Kim, Z; Yoon, C; Li, Jin; Kim, Kwangjo, 한국정보보호학회 동계정보보호학술대회, v.17, no.2, pp.717 - 720, Korea Institute of Information Security & Cryptology, 2007-12 |
Secure Consolidated Authorization Mechanism for Supply Chain Management Hong, Seung-Phil; Ahn, Gail-Joon; Kim, Myungchul, International Journal of Computer and Information Science (IJCIS), 2001 |
Secure group communication with multiplicative one-way functions Kim, H.; Hong, SM; Yoon, Hyunsoo; Cho, JW, ITCC 2005 - International Conference on Information Technology: Coding and Computing, pp.685 - 690, ITCC '05, 2005-04-04 |
Secure Image Display through Visual Cryptography: Exploiting Temporal Responsibilities of the Human Eye Hou, Jong-Uk; Kim, Dongkyu; Song, Hyun-Ji; Lee, Heung-Kyu, 4th ACM Information Hiding and Multimedia Security Workshop, IH and MMSec 2016, pp.169 - 174, Association for Computing Machinery, Inc, 2016-06-20 |
Secure In-memory Key-Value Storage with SGX Kim, Taehoon; Park, Joongun; Woo, Jaewook; Jeon, Seungheun; Huh, Jaehyuk, ACM Symposium on Cloud Computing (SoCC), pp.507, ASSOC COMPUTING MACHINERY, 2018-10 |
Secure Key Issuing in ID-based Cryptography Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, AISW04, pp.0 - 0, Australian Computer Society Inc, 2004-01 |
Secure Many-to-many Multicast in Heterogenous Networks Hur, J; Koo, D; Yoon, Hyunsoo, 2009 Advances in Cryptography, Security, and Application for Future Computing, 2009-12-11 |
Secure MMU: Architectural Support for Memory Isolation among Virtual Machines Huh, Jaehyuk; Jin, Seongwook, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.217 - 222, IEEE COMPUTER SOC, 2011-06 |
Discover