Browse "CS-Conference Papers(학술회의논문)" by Author Lee, S

Showing results 1 to 29 of 29

1
A Join Algorithm Utilizing Multiple Path Indexes in Object-Oriented Database Systems

Cho, W; Lee, S; Yoon, Y; Whang, Kyu-Young, Engineering of Complex Computer Systems, pp.0 - 0, 1996-10

2
A Korean Part of Speech Tagging System with Handling Unknown Words

Lee, S; Seo, J; Oh, Yung-Hwan, International Conference on Computer Processing of Oriental Languages, pp.164 - 171, 1995

3
A Multimedia Information System Incorporating Hypermedia, Information Retrieval, and DBMS Technologies

Loh, W; Park, B; Lee, S; Whang, Kyu-Young, pp.128 - 133, 1996-03

4
A Probabilistic Active Attack on Server-aided Secret Computation Protocols

Lee, S; Hong, SM; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.24 - 33, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24

5
A Requirement Analysis on IPTV over Next Generation Networks

Lee, S; Lee, DongMan; Park, J; Kang, SG, 한국정보과학회 2006 추계학술대회, v.33, no.2, pp.106 - 111, 한국정보과학회, 2006-10-01

6
A Text Analyzer for Korean Text-to-Speech Systems

Lee, S; Oh, Yung-Hwan, International Conference on Spoken Language Processing, pp.1692 - 1685, ICSLP, 1996

7
An Attack on Tanaka`s Non Interactive Key Sharing Scheme

Park, S; Kim, Y; Lee, S; Kim, Kwangjo, IEEE International Symposium on Information Theory, v.0, no.0, pp.17 - 22, IEEE, 1995-09-17

8
An Efficient Method to Find the Linear Expressions for Linear Cryptanalysis

Lee, S; Sung, SH; Kim, Kwangjo, Japan-Korea Joint Workshop on Information Security and Cryptology (JW-ISC'95), 1995-01-24

9
CART-based modeling of Korean segmental duration

Lee, S; Oh, Yung-Hwan, , 1999

10
Challenges to P2P Live Video Streaming over Mobile Heterogeneous Networks

Lee, S; Lee, DongMan; Kang, S, 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), AICIT, 2011-11-29

11
Cross-Lingual Information Retrieval (CLIR) Task at the NTCIR Workshop 3

Kishida, K; Chen, K; Lee, S; Chen, HH; Kando, N; Kuriyama, K; Myaeng, Sung Hyon; et al, ACM SIGIR Forum, v.38, no.1, pp.17 - 20, ACM, 2004-07

12
DES can be Immune to Linear Cryptanalysis

Kim, Kwangjo; Lee, S; Park, S; Lee, D, Proceedings of the Workshop on Selected Areas in Cryptography SAC’94, pp.70 - 81, 1994

13
Efficient Quantization of LSF Parameters Based on Temporal Decomposition

Kim, SJ; Lee, S; Han, WJ; Oh, Yung-Hwan, International Conference on Spoken Langugage Processing, International Conference on Spoken Langugage Processing, 1998

14
Fast computational method for minimum square error transform

Lee, S; Kim, JinHyung; Groen, F.C.A., 9th International Conference on Pattern Recognition, pp.392 - 394, 9th International Conference on Pattern Recognition, 1998-11-14

15
Grapes: Topology-Based Hierarchical Virtual Network for Peer-to-Peer Lookup Services

Shin, K; Lee, S; Lim, G; Yoon, Hyunsoo; Ma, JS, ICPP International Workshop on Ad-Hoc Networking (IWAHN2002), IEEE, 2002-08-01

16
Haptic Xylophone

Lee, Joongyoun; Lee, S; Park, Jinah, IEEE World Haptics Conference 2013, IEEE Robotics and Automation Society, 2013-04-14

17
Hidden Markov Model Based Voice Conversion Using Dynamic Characteristics of Speaker

Kim, EK; Lee, S; Oh, Yung-Hwan, European Conference On Speech Communication And Technology, pp.2519 - 2522, Eurospeech, 1997

18
How to Strengthen DES against Two Robust Attacks

Kim, Kwangjo; Lee, S; Park, S; Lee, D, 1995 Korea-JapanJoint Workshop onInformation Security and Cryptology (JW-ISC'95), 1995-01-24

19
How to Use Exponent Permutations in Cryptography-classification and Applications

Park,SW; Lee, S; Kim, Kwangjo, Proc. of International Conference on Cryptology and Information Security, 1996-12-19

20
Inferring Domain Combination Pattern and Its Biological Meaning in Proteins via Association Rules

Jung, S; Han, Dongsoo; Lee, S, 17th International Conference on Genome Informatics, GIW, 2006

21
Integer Addition over GF(2) and its Cryptographic Properties

Chee, S; Lee, S; Kim, Kwangjo, Third International Conference on Finite Fields and Applications, pp.11 - 14, 1995-06-11

22
Link Stability and Route Lifetime in Ad-hoc Wireless Networks

Lim, G; Shin, K; Lee, S; Yoon, Hyunsoo; Ma, JS, ICPP Workshops 2002 (31st International Conference on Parallel Processing Workshops), IEEE, 2002-08-20

23
Optical flow rendering

Park, TJ; Lee, S; Shin, Sung-Yong, EUROGRAPHICS ’98, v.17, no.3, pp.75 - 85, Blackwell publishers, 1998

24
Overview of CLIR Task at the Fourth Workshop

Kishida, K; Chen, K. H; Lee, S; Kuriyama, K; Kando, N; Chen, H. H; Myaeng, Sung Hyon; et al, Working Notes of the Fourth NTCIR Workshop Meeting, pp.1 - 59, 2004-06

25
Query Optimization Techniques Utilizing Path Indexes in Object-Oriented Database Systems

Cho, W; Whang, Kyu-Young; Lee, S; Yoon, Y, DASFAA 1997, pp.21 - 29, 1997-04

26
Reconstruction of s2DES S-boxes and their Immunity to Differential Cryptanalysis

Kim, Kwangjo; Park, S; Lee, S, Korea-Japan Joint Workshop on Informaion Security and Cryptology, v.0, no.0, pp.0 - 0, 1993-10

27
RFID mutual Authentication Scheme based on Synchronized Secret Information

Lee, S; Asano, T; Kim, Kwangjo, SCIS 2006, pp.98 - 98, Institute of Electronics, Information and Communication Engineers, 2006-01

28
Text analyzer for Korean text-to-speech systems

Lee, S; Oh, Yung-Hwan, Proceedings of the 1996 International Conference on Spoken Language Processing, ICSLP. Part 1 (of 4), v.3, pp.1692 - 1695, 1996-10-03

29
Threshold Password-based Authenticated Key Exchange using Matrix

Park, C; Lee, S; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.39 - 43, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24

Discover

rss_1.0 rss_2.0 atom_1.0