Showing results 2301 to 2320 of 4037
PROOF - A PARALLEL OBJECT-ORIENTED FUNCTIONAL COMPUTATION MODEL YAU, SS; JIA, XO; Bae, Doo-Hwan, JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, v.12, no.3, pp.202 - 212, 1991-07 |
PROPERTY OF SEPARABILITY IN PHYSICAL DESIGN OF NETWORK MODEL DATABASES Whang, Kyu-Young, INFORMATION SYSTEMS, v.10, no.1, pp.57 - 63, 1985 |
Protecting secret keys in networked devices with table encoding against power analysis attacks Kim, Taesung; Lee, Seungkwang; Choi, Dooho; Yoon, Hyunsoo, JOURNAL OF HIGH SPEED NETWORKS, v.22, no.4, pp.293 - 307, 2016 |
Protein complex prediction based on simultaneous protein interaction network Jung, Suk-Hoon; Hyun, Bo-Ra; Jang, Woo-Hyuk; Hur, Hee-Young; Han, Dong-Soo, BIOINFORMATICS, v.26, no.3, pp.385 - 391, 2010-02 |
Protocol trace analysis based on formal specifications, Formal Description Techniques Kim, Myungchul; Son T. Vuong; Samuel T. Chanson, FORMAL DESCRIPTION TECHNIQUES FOR DISTRIBUTED SYSTEMS AND COMMUNICATION PROTOCOLS, v.C-2, pp.393 - 408, 1992-01 |
Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack Kobayashi, Yukou; Yanai, Naoto; Yoneyama, Kazuki; Nishide, Takashi; Hanaoka, Goichiro; Kim, Kwangjo; Okamoto, Eiji, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E100A, no.12, pp.2991 - 3006, 2017-12 |
Provably secure length-saving public-key encryption scheme under the computational Diffie-Hellman assumption Baek, Joonsang; Lee, Byoungcheon; Kim, Kwangjo, ETRI JOURNAL, v.22, no.4, pp.25 - 31, 2000-12 |
Providing forwarding assurance in multi-hop wireless networks Han, Sungwon; Ko, Euiyul; Yoon, Hyunsoo; Yeom, Ikjun, Computer Communications, Vol.33, pp.293-301, 2010-02 |
Providing forwarding assurance in multi-hop wireless networks Han, Sung-Won; Ko, Eui-Yul; Yoon, Hyun-Soo; Yeom, Ik-Jun, COMPUTER COMMUNICATIONS, v.33, no.3, pp.293 - 301, 2010-02 |
Providing receipt-freeness in mixnet-based voting protocols Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2971, pp.245 - 258, 2004 |
PSP/TSP와 Six Sigma의 활용을 통한 정량적 소프트웨어 프로세스 개선 방안의 수립 및 연관 지원도구의 개발에 대한 연구 송일선; 박현철; 정경학; 최호진, 한국멀티미디어학회지, v.11, no.2, pp.23 - 36, 2007-06 |
PTEM: A POPULARITY-BASED TOPICAL EXPERTISE MODEL FOR COMMUNITY QUESTION ANSWERING Jung, Hohyun; Lee, Jae-Gil; Lee, Namgil; Kim, Sung-Ho, ANNALS OF APPLIED STATISTICS, v.14, no.3, pp.1304 - 1325, 2020-09 |
Punctuated Equilibria in Simple Genetic Algorithms for Functions of Unitation Sangyeop Oh; Yoon, Hyunsoo, COMPLEX SYSTEMS, v.12, 2000-01 |
QAnon shifts into the mainstream, remains a far-right ally Zihiri, Saifeldeen; Lima, Gabriel; Han, Jiyoung; Cha, Meeyoung; Lee, Wonjae, HELIYON, v.8, no.2, 2022-02 |
QoS Broker-Based Trust Model for Effective Web Service Selection Baik, Jongmoon; Pan, Zhedan, IASTED SEA 2007, 2007-11 |
QoS NSIS Signaling Layer Protocol for Mobility Support with a Cross-Layer Approach Lee, Soo-Yong; Kim, Myung-Chul; Kang, Sung-Won; Lee, Ben; Lee, Kyung-Hee; Seol, Soon-Uk, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E94B, no.10, pp.2796 - 2804, 2011-10 |
Quadcopter flight control using a low-cost hybrid interface with EEG-based classification and eye tracking Kim, Byung Hyung; Kim, Minho; Jo, Sungho, COMPUTERS IN BIOLOGY AND MEDICINE, v.51, pp.82 - 92, 2014-08 |
Quadra-embedding: Binary code embedding with low quantization error Lee, Youngwoon; Heo, Jaepil; Yoon, Sung-Eui, COMPUTER VISION AND IMAGE UNDERSTANDING, v.125, pp.214 - 222, 2014-08 |
Quality of Private Information (QoPI) model for effective representation and prediction of privacy controls in mobile computing Kim, Seung Hyun; Ko, In-Young; Kim, Soo-Hyung, COMPUTERS & SECURITY, v.66, pp.1 - 19, 2017-05 |
Quantile sampling for practical delay monitoring in Internet backbone networks Choi, Baek-Young; Moon, Sue Bok; Cruz, Rene; Zhang, Zhi-Li; Diot, Christophe, COMPUTER NETWORKS, v.51, no.10, pp.2701 - 2716, 2007-07 |
Discover