Browse "School of Computing(전산학부)" by Type Conference

Showing results 2581 to 2640 of 7390

2581
FLUCCS: Using Code and Change Metrics to Improve Fault Localization

Sohn, Jeongju; Yoo, Shin, 26th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), pp.273 - 283, ACM Special Interest Group on Software Engineering (SIGSOFT), 2017-07-12

2582
FLUID-XP: Flexible User Interface Distribution for Cross-Platform Experience

Lee, Sunjae; Lee, Hayeon; Kim, Hoyoung; Lee, Sangmin; Choi, Jeong Woon; Lee, Yuseung; Lee, Seono; et al, The 27th Annual International Conference On Mobile Computing And Networking, ACMd, 2021-10-24

2583
FLUID: Flexible User Interface Distribution for Ubiquitous Multi-device Interaction

Oh, Sangeun; Kim, Ahyeon; Lee, Sunjae; Lee, Kilho; Jeong, Dae R.; Ko, Steven Y.; Shin, Insik, 25th Annual International Conference on Mobile Computing and Networking (MobiCom), ACM, 2019-10-22

2584
FLUID: Multi-device Mobile Platform for Flexible User Interface Distribution

Oh, Sangeun; Kim, Ahyeon; Lee, SunJae; Lee, Kilho; Jeong, Dae R; Ko, Steven Y; Shin, Insik, 25th Annual International Conference on Mobile Computing and Networking, MobiCom 2019, Association for Computing Machinery, 2019-10

2585
FMBP (A methods to generate Feature Model from Business Process Model for business application)

Bae, Jongsu; Kang, Sungwon, Proceedings of the IEEE 7th Int’l Conference on Computer and Information Technology, pp.879 - 884, IEEE, 2007-10-16

2586
FMQ 오류보정 모델을 사용하는 오류보정 Yacc의 구현

정민수; 최광무, '93 프로그래밍 언어 연구회 학술 발표논문집, pp.28 - 35, 1993

2587
Follow 분할을 이용한 변환파서의 결정적 동치문법생성

이은정; 최광무, 한국정보과학회 1994년 봄 학술발표회논문집, pp.363 - 366, 한국정보과학회, 1994-04-01

2588
Fonte: Finding Bug Inducing Commits from Failures

An, Gabin; Yoo, Shin; Hong, Jingun; Kim, Naryeong, 45th International Conference on Software Engineering, IEEE/ACM, 2023-05-17

2589
Food hazard event extraction based on news and social media: A preliminary work

Myaeng, Sung-Hyon; Kyoung-Rok Jang; Kangwook Lee; Gwan Jang; Seungyong Jung; Min-Gwan Seo, International Conference on Big Data and Smart Computing, BigComp 2016, pp.466 - 469, Institute of Electrical and Electronics Engineers Inc., 2016-01-20

2590
Fooling a Neural Network in Military Environments: Random Untargeted Adversarial Example

KWON, HYUN; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, Military Communications Conference 2018 (MILCOM 2018), pp.456 - 461, IEEE(Communications Society), 2018-10-30

2591
Force gestures: Augmented touch screen gestures using normal and tangential force

Heo, Seongkook; Lee, Geehyuk, 29th Annual CHI Conference on Human Factors in Computing Systems, CHI 2011, pp.1909 - 1914, ACM Special Interest Group on Computer-Human Interaction (SIGCHI), 2011-05-07

2592
Force gestures: augmenting touch screen gestures with normal and tangential forces

Heo, Seongkook; Lee, Geehyuk, 24th annual ACM symposium adjunct on User interface software and technology (UIST '11), pp.621 - 626, ACM SIGCHI and SIGGRAPH, 2011-10-16

2593
ForceDrag: using pressure as a touch input modifier

Heo, Seongkook; Lee, Geehyuk, The Annual Meeting of the Australian Special Interest Group for Computer Human Interaction, pp.204 - 207, ACM SIGCHI, 2012-11-28

2594
ForceTap: Extending the Input Vocabulary of Mobile Touch Screens by adding Tap Gestures

Heo, Seongkook; Lee, Geehyuk, The 13th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI 2011), pp.113 - 122, ACM, 2011-08-30

2595
Forecasting Building Electricity Power Consumption Using Deep Learning Approach

Lee, Young-Jun; Choi, Ho-Jin, 2020 IEEE International Conference on Big Data and Smart Computing, BigComp 2020, pp.542 - 544, IEEE,Korean Institute of Information Scientists and Engineers (KIISE), 2020-02-19

2596
Foreign Word Identification Using a Statistical Method for Information Retrieval

Kwon, YH; Jeong, KS; Myaeng, Sung Hyon, 17th International Conference on Computer Processing of Oriental Languages (ICCPOL 1997), pp.675 - 680, 1997-04

2597
Forensic Analysis of Autonomous System Reachability

Lee, DK; Moon, Sue Bok; Choi, Taesang; Jeong, Taesoo, ACM SIGCOMM 2006 - Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp.335 - 340, ACM Special Interest Group on Data Communication, 2006-09-11

2598
Forensic tracking watermarking against in-theater piracy

Lee, MJ; Kim, KS; Lee, Heung-Kyu, 11th International Workshop on Information Hiding, IH 2009, pp.117 - 131, Springer Verlag, 2009-06-08

2599
Forged Region Detection for Scanned Images

Choi, Chang-Hee; Lee, Min-Jeong; Hyun, Dai-Kyung; Lee, Heung-Kyu, 3rd Int. Conf. on Computer Science and Its Applications, Springer-Veralg, 2011-12-12

2600
Forgery Detection for Surveillance Video

Hyun, Dai-Kyung; Lee, Min-Jeong; Ryu, Seung-Jin; Lee, Hae-Yeoun; Lee, Heung-Kyu, Pacific-Rim Conference on Multimedia, Springer-Verlag, 2011-12-20

2601
Formal Modeling and Analysis of Hybrid Systems: A Case Study in Multirobot Coordination

Alur, Rajeev; Esposito, Joel M.; Kim, Moonzoo; Kumar, Vijay; Lee, Insup, World Congress on Formal Methods, pp.212 - 232, World Congress on Formal Methods, 1999-09-20

2602
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances

Kim, Moonzoo, International Symposium on Automated Technology for Verification and Analysis, pp.489 - 500, ATVA, 2007-10-24

2603
Formal Representation of Guarded Logic Programs Using Petri Net Model

정인정; 이흥규, Proc. of the 20th Korea Information Science Society Fall Conf., v.20, no.2, pp.1081 - 1084, 한국정보과학회, 1993

2604
Formal specification of a JavaScript module system

Kang, Seonghoon; Ryu, Sukyoung, ACM international conference on Object oriented programming systems languages and applications, ACM SIGPLAN, 2012-10-26

2605
Formal verification of a flash memory device driver - An experience report

Kim, Moonzoo; Choi, Yunja; Kim, Yunho; Kim, Hotae, 15th International SPIN Workshop on Model Checking of Software, SPIN 2008, pp.144 - 159, SPIN, 2008-08-10

2606
Formal verification of consistency between feature model and software architecture in software product line

Satyananda T.K.; Lee, Danhyung; Kang S., 2nd International Conference on Software Engineering Advances - ICSEA 2007, v.0, no.0, pp.0 - 0, IEEE, 2007-08-25

2607
Formal verification of consistency between feature model and software architecture in software product line

Tonny, Kurniadi Satyananda; Lee, Danhyung; Kang, Sung-Won, International Conference on Software Engineering Advances(ICSEA 2007), IEEE, 2007-08-25

2608
Formal Verification of Robot Movements - a Case Study on Home Service Robot SHR100

Kim, Moonzoo; Kang, Kyo Chul; Lee, Hyoungki, International Conference on Robotics and Automation, pp.4739 - 4744, IEEE, 2005-04-18

2609
Formally Specified Monitoring of Temporal Properties

Kim, Moonzoo; Viswanathan, Mahesh; Abdallah, Hanene Ben; Kannan, Sampath; Lee, Insup, European Conference on Real-Time Systems, pp.114 - 122, ECRTS, 1999-06-09

2610
FortressCheck: Automatic testing for generic properties

Kang Seonghoon; Ryu, Sukyoung, 26th Annual ACM Symposium on Applied Computing, SAC 2011, pp.1290 - 1296, ACM Special Interest Group on Applied Computing (SIGAPP), 2011-03-21

2611
Forward secure ID-based group key agreement protocol with anonymity

Park, H; Kim, Z; Kim, Kwangjo, 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, pp.274 - 279, 123, 2009-06-18

2612
Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption

Duc, DN; Cheon, JH; Kim, Kwangjo, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.21 - 25, 한국정보보호학회, 2003-07-04

2613
Foundations for the run-time monitoring of reactive systems: fundamentals of the MaC language

Viswanathan, Mahesh; Kim, Moonzoo, First international conference on Theoretical Aspects of Computing , pp.543 - 556, ICTAC, 2005-10

2614
FourierHandFlow: Neural 4D Hand Representation Using Fourier Query Flow

Lee, Jihyun; Jang, Junbong; Kim, Dongwhan; Sung, Minhyuk; Kim, Tae-Kyun, Thirty-seventh Conference on Neural Information Processing Systems (NeurIPS), NeurIPS, 2023-12-12

2615
FPL: White-box secure block cipher using parallel table look-ups

Kwon, Jihoon; Lee, Byeonghak; Lee, Jooyoung; Moon, Dukjae, Cryptographers Track at the RSA Conference, CT-RSA 2020, pp.106 - 128, Springer, 2020-02-25

2616
Fractal Moving Image Compression System using Wavelet Transform

조정완, Proc. KISS, pp.1051 - 1054, 1995

2617
Fractionalized View Materialization in Data Cubes

Chung, Y.D.; Kim, M.J.; Park, W.J.; Kim, Myoung Ho, Seventh Int'l Conf. on Database Systems for Advanced Applications, pp.156 - 157, IEEE, 2001-04

2618
Fragile Online Relationship: A First Look at Unfollow Dynamics in

문수복, NHN Workshop, NHN Workshop, 2010-11-08

2619
Fragile Online Relationship: A First Look at Unfollow Dynamics in Twitter

문수복, Workshop on Privacy and Security on Social Media, Workshop on Privacy and Security on Social Media, 2011-01-18

2620
Fragile online relationship: a first look at unfollow dynamics in Twitter

Moon, Sue Bok, Computational Aspects of Social and Information Networks(CASIN) 2011, pp.1091 - 1100, Computational Aspects of Social and Information Networks(CASIN) 2011, 2011-07-21

2621
Fragile Online Relationship: A First Look at Unfollow Dynamics in Twitter

Moon, Sue Bok, International School and Conference on Network Sience 2011, International School and Conference on Network Sience 2011, 2011-06-05

2622
Fragile online relationship: A first look at unfollow dynamics in Twitter

Kwak, Haewoon; Chun, Hyunwoo; Moon, Sue Bok, 29th Annual CHI Conference on Human Factors in Computing Systems, CHI 2011, pp.1091 - 1100, ACM Special Interest Group on Computer-Human Interaction (SIGCHI), 2011-05-07

2623
Frame-semantic web: A case study for Korean

Park, Jungyeul; Choi, Keysun; Nam, Sejin; Kim, Youngsik; Hahm, Younggyun; Hwang, Dosam, ISWC 2014 Posters and Demonstrations Track, ISWC-P and D 2014, 13th International Semantic Web Conference, ISWC 2014, pp.257 - 260, CEUR-WS, 2014-10-19

2624
Framework for Third Party Testing of Component Software

Kwon, Yong Rae, Joint Workshop on System Development (JWSD '01), 2001

2625
Framework for Third Party Testing of Component Software

Ma, Yu-Seung; Oh, Seung-Uk; Bae, Doo-Hwan; Kwon, Yong Rae, Asia-Pacific Software Engineering Conference (APSEC '01), pp.431 - 434, IEEE, 2001-12

2626
FreeFingers - 시계형 정보단말기를 위한 입력장치

유수림; 이기혁, 한국 HCI학회, pp.156 - 161, 2005

2627
FreeMouse - 적외선 및 RF 송수신에 기반한 3차원 공간 마우스

정윤경; 최진혁; 손미숙; 이기혁, 한국정보과학회 HCI학술대회, 한국정보과학회, 2004-07

2628
Frenzy: Collaborative data organization for creating conference sessions

Chilton, Lydia B.; Kim, Juho; André, Paul; Cordeiro, Felicia; Landay, James A.; Weld, Daniel S.; Dow, Steven P.; et al, 32nd Annual ACM Conference on Human Factors in Computing Systems, CHI 2014, pp.1255 - 1264, ACM Special Interest Group on Computer-Human Interaction (SIGCHI), 2014-05-01

2629
Friend Recommendation Using Offline and Online Social Information for Face-To-Face Interactions

Kim, Kyung Min; Kim, Taehun; Hyun, Soon Joo, International Conference on Smart Computing, IEEE, 2016-05-18

2630
Friend recommendation with a target user in social networking services

Kim, Sundong; Lee, Jae-Gil, 2015 31st IEEE International Conference on Data Engineering Workshops, ICDEW 2015, pp.235 - 239, IEEE Computer Society, 2015-04

2631
Friend-safe adversarial examples in an evasion attack on a deep neural network

Kwon, Hyun; Yoon, Hyunsoo; Choi, Daeseon, 20th International Conference on International Conference on Information Security and Cryptology, ICISC 2017, pp.351 - 367, Springer Verlag, 2017-12-01

2632
FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network

Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, The 3rd International Conference on Software Engineering and Information Management (ICSIM 2020), ACM’s International Conference Proceedings Series, 2020-01-13

2633
FriSM: Malicious exploit kit detection via feature-based string-similarity matching

Kim, Sungjin; Kang, Brent Byunghoon, 14th International EAI Conference on Security and Privacy in Communication Networks, SecureComm 2018, pp.416 - 432, Springer Verlag, 2018-08

2634
From Crash Consistency to Transactions

Hu, Yige; Kwon, Youngjin; Chidambaram, Vijay; Witchel, Emmett, 16th Workshop on Hot Topics in Operating Systems, HotOS 2017, pp.100 - 105, USENIX (THE ADVANCED COMPUTIONG SYSTEMS ASSOCIATION), 2017-05-08

2635
From Tensors to FPGAs: Accelerating Deep Learning

Sharma, Hardik; PARK, JONGSE; Samynathan, Balavinayagam; Robatmili, Behnam; Mirkhani, Shahrzad; Esmaeilzadeh, Hadi, Hot Chips: Symposium on High Performance Chips, IEEE/ACM, 2018-08-19

2636
From Text to Sign Language: Exploiting Spatial and Motioning Dimension

Choi, Ji-Won; Lee, Hee-Jin; Park, Jong Cheol, Association for Computational Linguistics and Chinese Language Processing, pp.61 - 69, Pacific Asia Conference on Language, Information and Computation, 2005-12-01

2637
FS-Pad: Video Game Interactions with a Force Feedback Gamepad

Shim, Youngbo; PARK, KEUNWOO; Lee, Sangyoon; Son, Jeongmin; Woo, Taeyun; Lee, Geehyuk, UIST `20: The 33rd Annual ACM Symposium on User Interface software and Technology, pp.938 - 950, ACM, 2020-10-22

2638
FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking

Kim, Hyuntae; Wi, Seongil; Lee, Hyunjoo; Son, Sooel, 20th World Conference on Information Security Applications, WISA 2019, pp.41 - 54, the Korea Institute of Information Security and Cryptology (KIISC), 2019-08-22

2639
FSM에 기초한 다이나믹 테스트 시퀀스 선택

유상조; 김명철, 한국통신학회 하계종합 학술대회, 한국통신학회, 1996

2640
FSP Model을 이용한 C&C View 아키텍처의 검증

김정호; 강성원, 한국IT서비스학회 추계학술대회, pp.0 - 0, 한국IT서비스학회, 2006-11-15

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0