Browse "School of Computing(전산학부)" by Type Article

Showing results 1661 to 1680 of 4139

1661
Identifying Crime-prone Areas Based on Tweet Sentiments

Kim, Jaewoo; Cha, Meeyoung; Lee, Won Jae; Sandholm, Thomas, TELECOMMUNICATIONS REVIEW, v.24, no.3, pp.339 - 347, 2014-06

1662
Identifying helpful reviews based on customer's mentions about experiences

Min, Hye-Jin; Park, Jong Cheol, EXPERT SYSTEMS WITH APPLICATIONS, v.39, no.15, pp.11830 - 11838, 2012-11

1663
Identity-based chameleon hashing and signatures without key exposure

Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Tian, Haibo; Li, Jin; Kim, Kwangjo, INFORMATION SCIENCES, v.265, pp.198 - 210, 2014-05

1664
IEEE 802.11b WLAN performance with variable transmission rates: In view of high level throughput

Kim, N; Choi, S; Yoon, Hyunsoo, NETWORKING - ICN 2005, PT 2 Book Series: LECTURE NOTES IN COMPUTER SCIENCE, v.3421, pp.1080 - 1087, 2005

1665
IEEE 802.11b WLAN Performance with Variable Transmission Rates: In View of High Level Throughput

Kim, Namgi; Choi, Sunwoong; Yoon, Hyunsoo, Lecture Notes in Computer Science, Volume 3421/2005, 1080-1087, 2005-04

1666
IEEE-1394 버스의 가용 등시성 대역폭을 활용하기 위한 대역폭 훔치기와 ABR-1394 전송모드

강성일; 이윤직; 이흥규; 강성봉, 한국정보처리학회논문지, v.6, no.6, pp.1609 - 1621, 1999-06

1667
IEEE-1394 직렬 버스를 이용한 화상 전화 시스템의 구현

강성일; 편기현; 이충훈; 이흥규; 강성봉, 정보과학회논문지 : 컴퓨팅의 실제 및 레터, v.5, no.3, pp.351 - 369, 1999-06

1668
IEEE1394/UPnP software bridge

Kim, D; Park, JH; Yevgen, P; Moon, K; Lee, Young-Hee, IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, v.51, no.1, pp.319 - 323, 2005-02

1669
ILoA: Indoor Localization Using Augmented Vector of Geomagnetic Field

Lee, Sangjae; Chae, SeungWoo; Han, Dong-Soo, IEEE ACCESS, v.8, pp.184242 - 184255, 2020-10

1670
IMAGE ENCODING SCHEME IN AN EDGE FIELD WITH THE LAPLACIAN OPERATOR

Lee, Geehyuk; KIM, DW; HAN, SB; Kim, Soo Yong, OPTICAL ENGINEERING, v.34, no.1, pp.90 - 101, 1995-01

1671
IMAGE GENERATION BY BLASCHKE PRODUCTS IN THE UNIT DISK

KIM, HS; Kim, Hong Oh; Shin, Sung-Yong, COMPUTERS GRAPHICS, v.17, no.4, pp.489 - 494, 1993

1672
Image Metamorphosis With Scattered Feature Constraints

Chwa, Kyung Yong, IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, v.2, no.4, pp.337 - 354, 1996-12

1673
Image Morphing

S.Y.Shin; H.K.Kim; S.Y.Lee, MAGAZINE OF THE KITE, v.23, no.6, pp.648 - 658, 1996

1674
Image morphing using deformation techniques

Lee, SY; Chwa, Kyung Yong; Hahn, J; Shin, Sung-Yong, JOURNAL OF VISUALIZATION AND COMPUTER ANIMATION, v.7, no.1, pp.3 - 23, 1996

1675
Image Recapture Prevention Using Secure Display Schemes on Polarized 3D System

Ji, Sang-Keun; Lee, Heung-Kyu, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, v.29, no.8, pp.2296 - 2309, 2019-08

1676
Image Watermarking Resistant to Geometric Attack Combined with Removal Attack

Lee, Choong-Hoon; Lee, Heung-Kyu; Suh, Youngho, INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, v.5, no.1, pp.37 - 65, 2005-01

1677
Image watermarking scheme using visual model and BN distribution

Kim, SW; Suthaharan, S; Lee, Heung-Kyu; Rao, KR, ELECTRONICS LETTERS, v.35, no.3, pp.212 - 214, 1999-02

1678
Image-based acquisition and modeling of polarimetric reflectance

Baek, Seung-Hwan; Zeltner, Tizian; Ku, Hyun Jin; Hwang, Inseung; Tong, Xin; Jakob, Wenzel; Kim, Min Hyuk, ACM TRANSACTIONS ON GRAPHICS, v.39, no.4, 2020-07

1679
Image-Based Lifelogging: User Emotion Perspective

Bum, Junghyun; Choo, Hyunseung; Whang, Joyce Jiyoung, CMC-COMPUTERS MATERIALS & CONTINUA, v.67, no.2, pp.1963 - 1977, 2021-02

1680
Impact of Emerging Hardware on Security and Privacy

Jaeger, Trent; Kang, Brent ByungHoon; Mentens, Nele; Sturton, Cynthia, IEEE SECURITY & PRIVACY, v.21, no.3, pp.6 - 7, 2023-05

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0