Showing results 3061 to 3080 of 4037
Voronoi diagrams for a transportation network on the Euclidean plane Bae, Sang Won; Chwa, Kyung-Yong, INTERNATIONAL JOURNAL OF COMPUTATIONAL GEOMETRY & APPLICATIONS, v.16, no.2-3, pp.117 - 144, 2006-06 |
Voronoi diagrams on the sphere Na, HS; Lee, CN; Cheong, Otfried, COMPUTATIONAL GEOMETRY-THEORY AND APPLICATIONS, v.23, no.2, pp.183 - 194, 2002-09 |
Voronoi diagrams with a transportation network on the Euclidean plane Bae S.W.; Chwa, Kyung Yong, ALGORITHMS AND COMPUTATION, v.3341, pp.101 - 112, 2004 |
Voronoi Tessellation Based Interpolation Method for Wi-Fi Radio Map Construction Lee, Min-Kyu; Han, Dong-Soo, IEEE COMMUNICATIONS LETTERS, v.16, no.3, pp.404 - 407, 2012-03 |
Voxel-based haptic rendering using adaptive sampling of a local distance map Kim, Kimin; Park, Jinah, Journal of Computing Science and Engineering, v.13, no.2, pp.66 - 77, 2019-06 |
vPMM: A value based process maturity model Lee, J.; Lee, Danhyung; Kang, Sungwon, STUDIES IN COMPUTATIONAL INTELLIGENCE, v.208, no.0, pp.193 - 202, 2009 |
VPrimer: A Method of Designing and Updating Primer and Probe With High Variant Coverage for RNA Virus Detection Jeon, Hajin; Bae, Jeongmin; Kim, Hyerin; Kim, Min-Soo, IEEE-ACM TRANSACTIONS ON COMPUTATIONAL BIOLOGY AND BIOINFORMATICS, v.20, no.1, pp.775 - 784, 2023-01 |
Vulnerabilities of network OS and mitigation with state-based permission system Noh, Jiseong; Lee, Seunghyeon; Park, Jaehyun; Shin, Seungwon; Kang, Brent Byunghoon, SECURITY AND COMMUNICATION NETWORKS, v.9, no.13, pp.1971 - 1982, 2016-09 |
Vulnerability of an RFID authentication protocol proposed in at SecUbiq 2005 Kwon, Daesung; Han, Daewan; Lee, Jooyoung; Yeom, Yongjin, LECTURE NOTES IN COMPUTER SCIENCE, v.4097, pp.262 - 270, 2006 |
WALA와 Boa를 활용하여 대규모 소프트웨어 저장소를 정적으로 분석하는 도구 개발 박경희; 류석영, 정보과학회논문지, v.44, no.10, pp.1081 - 1086, 2017-10 |
Wapee: A fault-tolerant semantic middleware in ubiquitous computing environments Kim, Yoon-Hee; Kim, Eun-Kyung; Jeon, Beom-Jun; Ko, In-Young; Park, Sung-Yong, EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.4097, pp.173 - 182, 2006 |
WATERMARKING CURVES FOR FINGERPRINTING DIGITAL MAPS Im, Dong-Hyuck; Hu, Yongjian; Lee, Hae-Yeoun; Lee, Heung-Kyu, INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, v.6, pp.1257 - 1269, 2010-03 |
Wavelet transformation-based management of integrated summary data for distributed query processing Joe, MJ; Whang, Kyu-Young; Kim, SW, DATA KNOWLEDGE ENGINEERING, v.39, no.3, pp.293 - 312, 2001-12 |
Wavelet 변화을 이용한 우리별 수신영상 압축기법 이흥규; 김성환; 김경숙; 최순달, 우주과학회지, v.13, no.2, pp.199 - 210, 1996-12 |
Wavelet-based progressive fast recompression for large deformed mesh Kim, Yeonghun; Choi, Sunghee, COMPUTER-AIDED DESIGN, v.125, pp.102859, 2020-08 |
A Way of Constructing a Knowledge Base by Analyzing Korean Text Yang, Gi-Chul; Choi, Key-Sun, Korean Journal of Cognitive Science, Vol. 7, No. 4, pp. 203-216, 1996 |
Weak property of malleability in NTRUSign Min, S; Yamamoto, G; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3108, pp.379 - 390, 2004 |
Weakly sensitive analysis for JavaScript object-manipulating programs Ko, Yoon Seok; Rival, Xavier; Ryu, Sukyoung, SOFTWARE-PRACTICE & EXPERIENCE, v.49, no.5, pp.840 - 884, 2019-05 |
Weakly Supervised Learning with Deep Convolutional Neural Networks for Semantic Segmentation Understanding semantic layout of images with minimum human supervision Hong, Seunghoon; Kwak, Suha; Han, Bohyung, IEEE SIGNAL PROCESSING MAGAZINE, v.34, no.6, pp.39 - 49, 2017-11 |
Weakly supervised lesion localization for age-related macular degeneration detection using optical coherence tomography images Yang, Hyun-Lim; Kim, Jong Jin; Kim, Jong Ho; Kang, Yong Koo; Park, Dong Ho; Park, Han Sang; Kim, Hong Kyun; et al, PLOS ONE, v.14, no.4, 2019-04 |
Discover