Browse "College of Engineering(공과대학)" by Type Conference

Showing results 37821 to 37840 of 90918

37821
Identifying traceability between feature model and software architecture in software product line using formal concept analysis

Satyananda, T.K.; Lee, Danhyung; Kang, Sungwon; Hashmi, S.I., 2007 International Conference on Computational Science and its Applications, ICCSA 2007, v.0, no.0, pp.380 - 386, IEEE, 2007-08-26

37822
Identifying urban block type for environmental uses

박의윤; 김영철, 제8회 도시환경 EDISON SW활용 경진대회, pp.166 - 173, 과학기술정보통신부, 2019-01-25

37823
Identifying User Interests from Online Social Networks by Using Semantic Clusters Generated from Linked Data

Ko, Han-Gyu; Ko, In-Young; Kim, Taehun; Lee, Dongman; Hyun, Soon J., In proceedings of the 1st Workshop on Semantic Social Networks (SSN 2013), Co-located with ICWE 2013, pp.302 - 309, ICWE, 2013-07-08

37824
Identifying Users with Application-Specific Command Streams

Masri, Alaa El; Wechsler, Harry; Likarish, Peter; Kang, Brent Byunghoon, Twelfth Annual International Conference on Privacy, Security and Trust (PST 2014), IEEE, 2014-07-23

37825
Identifying, organising and exploring problem space for interaction design

Yoon, Wan Chul, 8th IFAC/IFIP/IFORS/IEA symposium on Human-machine systems, pp.81 - 86, IFAC, 2001-09

37826
Identigram/Watermark removal using cross-channel correlation

Park Jaesik; Tai, Yu-Wing; Kweon, In-So, 2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2012), IEEE(Computer Society), 2012-06

37827
Identity Centric Management of Distributed User Created Content

Choi, D; Kim, S; Jin, S; Yeo, K; Yoon, Hyunsoo, International Ubiquitous Convergence Conference (IUC 2006), pp.263 - 267, 2006-12-07

37828
Identity-based chameleon hash scheme without key exposure

Chen, X.; Zhang, F.; Susilo, W.; Tian, H.; Li, J.; Kim, Kwangjo, 15th Australasian Conference on Information Security and Privacy, ACISP 2010, pp.200 - 215, ACISP 2010, 2010-07-05

37829
Identity-based secret signature scheme

LEE, B.; Li, J.; Kim, Kwangjo, 4th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2009, pp.1080 - 1085, 2009-11-24

37830
IDK-MRC: Unanswerable Questions for Indonesian Machine Reading Comprehension

PUTRI, RIFKI AFINA; Oh, Alice Haeyun, The 2022 Conference on Empirical Methods in Natural Language Processing, EMNLP 2022, EMNLP, 2022-12

37831
Idle Interaction을 활용한 인간-로봇 인터랙션의 의인화

이동규; 김명석, 2006년도 한국디자인학회 가을학술발표대회, pp.70 - 71, 한국디자인학회, 2006

37832
Idle Speed Control of Automotive Engine Using Fuzzy Logic

Kim, Byung Kook; Chang, Jae Ho, the 3rd Inter. Conf. on Fuzzy Logic Neural Nets, pp.407 - 408, 1994-08-01

37833
Idle Vehicle Rebalancing in Semiconductor Fabrication Using Factorized Graph Neural Network Reinforcement Learning

Ahn, Kyuree; Park, Jinkyoo, 58th IEEE Conference on Decision and Control, CDC 2019, pp.132 - 138, Institute of Electrical and Electronics Engineers Inc., 2019-12-12

37834
IDLE: Integrated Deep Learning Engine with Adaptive Task Scheduling on Heterogeneous GPUs

Kim, TaeWoo; Yang, Eunju; Bae, Soyoon; Youn, Chan-Hyun, 2018 IEEE Region 10 Conference (TENCON), pp.1430 - 1435, IEEE, 2018-10-30

37835
IDS와 허니팟을 연동한 관리 시스템 설계

박찬일; 이윤호; 이수진; 최혜은; 윤현수; 이광형; 임채호; et al, 한국정보과학회 춘계 학술대회, pp.72 - 73, 한국정보과학회, 2003-04

37836
IE-SASW Method for Nondestructive Evaluation of Concrete Structure

Kim, Dong-Soo; Seo, Won-Seok; Choi, Yong-Kyu, International Workshop on Advanced Smart Materials and Smart Structure Technology, pp.479 - 486, 2004-01

37837
IEEE 802.11 DCF 모드 기반 QoS를 지원하는다중채널 MAC 프로토콜

윤세영; 신경섭; 조동호, 한국통신학회 동계종합학술 발표회, pp.118 - 119, 한국통신학회, 2010-02

37838
IEEE 1394 등시성 전송을위한 선점적 우선순위를 이용한 버퍼 제어기법

강성일; 편기현; 이충훈; 이흥규, 한국통신학회, COMSW'98, 한국통신학회, 1998

37839
IEEE 1516 HLA 표준에 기반한 분산 시스템 개발 프로세스

김탁곤; 안정현, 대한전자공학회 하계종합학술대회, pp.1582 - 1585, 대한전자공학회, 2010-06

37840
IEEE 1516 HLA/RTI 기반 연동 Adaptor의 설계 및 구현

안정현; 홍정희; 성창호; 김탁곤, 한국군사과학기술학회 종합학술대회, pp.165 - 168, 한국군사과학기술학회, 2008-08

rss_1.0 rss_2.0 atom_1.0