Browse "CS-Conference Papers(학술회의논문)" by Author Lee, J.

Showing results 1 to 16 of 16

1
A Region Splitting Strategy for Physical Database Design of Multidimensional File Organizations

Lee, J.; Lee, Y.; Whang, Kyu-Young; Song, IY, International Conf. on Very Large Data Bases, pp.416 - 425, Morgan Kaufmann Publishers, 1997-08

2
An objectified naming system for providing context transparency to context-aware applications

Lee, K.; Lee, DongMan; Ko ,Y.; Lee, J.; Chung, Y.C., 4th IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, SEUS 2006 andthe 2nd International Workshop on Collaborative Computing, Integration, and Assurance, WCCIA 2006, v.2006, pp.95 - 100, 2006-04-27

3
Clustering with domain value dissimilarity for categorical data

Lee, J.; Lee, Yoon Joon; Park, M., 9th Industrial Conference on Advances in Data Mining: Applications and Theoretical Aspects, ICDM 2009, pp.310 - 324, IEEE Computer Society, 2009-07-20

4
Digital rights management with right delegation for home networks

Kim, H.; Lee, Y.; Chung, B.; Yoon, Hyunsoo; Lee, J.; Jung, K., ICISC 2006: 9th International Conference on Information Security and Cryptology, pp.233 - 245, Springer Verlag (Germany), 2006-11-30

5
Dynamic context networks of wireless sensors and RFID tags

Lopez, T.S.; Kim, Daeyoung; Min, K.; Lee, J., 2007 2nd International Symposium on Wireless Pervasive Computing, pp.59 - 64, IEEE, 2007-02-05

6
Dynamic distributed authentication scheme for Wireless LAN-Based Mesh Networks

Lee, I.; Lee, J.; Arbaugh, W.; Kim, Daeyoung, 21st International Conference on Information Networking, ICOIN 2007, pp.649 - 658, 2007-01-23

7
Efficient distributed authentication method with local proxy for wireless mesh networks

Lee, I.; Lee, J.; Kim, Daeyoung, IEEE Wireless Communications and Networking Conference, WCNC 2007, pp.3556 - 3560, 2007-03-11

8
Fast Finite Field Division Operation in GF(2^m) for Efficient Elliptic Curve Cryptosystem

Lee, Y.H.; Kim, H.; Chung, B.C.; Lee, J.; Ha, Y.G.; Yoon, Hyunsoo, International Workshop on Cryptology abd Network Security (IWCNS'2001), pp.230 - 237, 2001

9
Ghost hunter: A handheld augmented reality game system with dynamic environment

Cho, K.; Kang, W.; Soh, J.; Lee, J.; Yang, Hyun-Seung, 6th International Conference of Entertainment Computing, ICEC 2007, pp.10 - 15, ICEC'07, 2007-09-15

10
Hybrid visual tracking for augmented books

Yang, Hyun-Seung; Cho, K.; Soh, J.; Jung, J.; Lee, J., 7th International Conference on Entertainment Computing, ICEC 2008, pp.161 - 166, Springer Verlag, 2008-09-25

11
Motion Fairing

Lee, J.; Shin, Sung-Yong, Proc. Computer Animation'96, pp.136 - 143, 1996-06

12
MPEG streaming over mobile Internet

Lee, M.; Lee, K.; Thang, T.C.; Thanh, N.N.; Kim, Myungchul; Ro, Y.M.; Lee, J., Sensors and Camera Systems for Scientific, Industrial, and Digital Photography Applications III, v.4669, pp.277 - 287, SPIE, 2002-01-21

13
On-demand Secure Routing Protocol for Ad Hoc Network using ID based Cryptosystem

Lee, YH; Kim, H.; Chung, B.; Lee, J.; Yoon, Hyunsoo, Parallel and Distributed Computing, Applications and Technologies, PDCAT 2003 Proceedings, pp.211 - 215, 2003-08-27

14
Robust Motion Watermarking based on Multiresolution Analysis

Kim, T.-H.; Lee, J.; Shin, Sung-Yong, EUROGRAPHICS 2000, v.19, no.3, pp.189 - 198, 2000-08

15
Securing mobile agents by integrity-based encryption

Lee, J.; Hong, SM; Yoon, Hyunsoo, 7th International Conference on Advanced Communication Technology, ICACT 2005, v.1, pp.508 - 513, 2005-02-21

16
Spectral-Based Group Formation Control

Takahashi, S.; Yoshida, K.; Kwon, T.; Lee, K.H.; Lee, J.; Shin, Sung-Yong, Eurographics 2009, 2009

Discover

rss_1.0 rss_2.0 atom_1.0