Showing results 7941 to 7960 of 16112
On the number of edges of a fan-crossing free graph = 팬 교차가 없는 그래프에서의 엣지의 수의 범위link Kim, Heun-A; 김현아; et al, 한국과학기술원, 2013 |
On the Number of Edges of Fan-Crossing Free Graphs Cheong, Otfried; Har-Peled, Sariel; Kim, Heuna; Kim, Hyo-Sil, ALGORITHMICA, v.73, no.4, pp.673 - 695, 2015-12 |
On the Number of Edges of Fan-Crossing Free Graphs Cheong, Otfried; Har-Peled, Sariel; Kim, Heuna; Kim, Hyo-Sil, 24th International Symposium on Algorithms and Computation, pp.163 - 173, ISAAC Committee, 2013-12-16 |
ON THE NUMBER OF GUARD EDGES OF A POLYGON PARK, JH; Shin, Sung-Yong; Chwa, Kyung Yong; WOO, TC, DISCRETE COMPUTATIONAL GEOMETRY, v.10, no.4, pp.447 - 462, 1993 |
On the performance of spoken language translation in multimedia communication environment = 멀티미디어 통신 환경하에서의 음성언어번역 성능 연구link Yang, Jae-Woo; 양재우; et al, 한국과학기술원, 1997 |
On the Power of Computational Secret Sharing Kim, Kwangjo; Vinod, V.; Narayanan, A; Srinathan, K.; Rangan, C. P., Indocrypt2003, v.2904, no.0, pp.162 - 176, Springer-Verlag, 2003-12 |
On the power of security reduction in the quantum-accessible random oracle model Lee, Jeeun; Kim, Kwangjo, 2019 Symposium on Cryptography and Information Security (SCIS 2019), IEICE Technical Committee on Information Security, 2019-01-24 |
On the Protocol Validation and Verification B.M. Kim; H. Yoon, INFORMATION NETWORK REVIEW, KISS, v.4, no.2, pp.27 - 40, 1990-12 |
ON THE REDUCTION OF LR(K) PARSERS PARK, WJ; LEE, MJ; Choe, Kwang-Moo, INFORMATION PROCESSING LETTERS, v.47, no.5, pp.245 - 251, 1993-10 |
On the reduction of LR(k) parsers = LR(k)구문분석기의 축소에 관한 연구link Park, Woo-Jun; 박우전; et al, 한국과학기술원, 1993 |
On the routing-aware peering against network-eclipse attacks in Bitcoin Tran, Muoi; Shenoi, Akshaye; Kang, Min Suk, 30th USENIX Security Symposium, pp.1253 - 1270, USENIX Association, 2021-08-11 |
On the scalability of many-to-many reliable multicast sessions Yoon, WY; Lee, DongMan; Youn, HY, CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, v.16, no.13, pp.1353 - 1363, 2004-11 |
On the Security of NTRUSign signature scheme Kim, Kwangjo; Min, SJ; Yamamoto, G, SCIS04, pp.625 - 630, SCIS, 2004-01 |
On the Security of RFID Group Scanning Protocols Dang, DN; Kim, Kwangjo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E93D, pp.528 - 530, 2010-03 |
On the Security of Zhang-Wu-Wang's Forward-Secure Group Signature Scheme in ICICS'03 Wang, P; Chen, X; Kim, Kwangjo, 2004년도 한국정보보호학회 하계정보보호학술대회, pp.0 - 0, Korea Institute of Information Security & Cryptology, 2004-06 |
On the Semantic Constraints of Terms through Characteristic Predicates Selection in Domain-specific Corpus Bae, Hee-Sook; Paik, Haeseung; Seo, Chung-Won; Kim, Jae-Ho; Choi, Key-Sun, TKE, 2002-08 |
On the semantics of refinement calculi Yang, Hongseok; Reddy, US, FOUNDATIONS OF SOFTWARE SCIENCE AND COMPUTATION STRUCTURES, v.1784, pp.359 - 374, 2000 |
On the Social-Relational Moral Standing of Al: An Empirical Study Using Al-Generated Art Lima, Gabriel; Zhunis, Assem; Manovich, Lev; Cha, Meeyoung, FRONTIERS IN ROBOTICS AND AI, v.8, 2021-08 |
On the Sustainability of Bitcoin Partitioning Attacks Ha, jaehyun; Baek, Seungjin; Tran, Muoi; Kang, Min Suk, Financial Cryptography and Data Security 2023, International Financial Cryptography Association, 2023-05-03 |
On the Trade-off of Route Discovery Latency and Optimal Routes in Reactive Routing Protocols Nguyen, Duc-Dzung; Kim, Myungchul, IEEE International Conference on Advanced information Networking and Applications, pp.464 - 471, IEEE, 2008-03-25 |
Discover