Showing results 10481 to 10500 of 15997
The power crust, unions of balls, and the medial axis transform Amenta, N; Choi, Sunghee; Kolluri, RK, COMPUTATIONAL GEOMETRY-THEORY AND APPLICATIONS, v.19, no.2-3, pp.127 - 153, 2001-07 |
The preimage security of double-block-length compression functions Armknecht, Frederik; Fleischmann, Ewan; Krause, Matthias; Lee, Jooyoung; Stam, Martijn; Steinberger, John, 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, pp.233 - 251, IACR, 2011-12-04 |
The presence of unexpected biases in online fact-checking Park, Sungkyu; Park, Jaimie Yejean; Kang, Jeong-han; Cha, Meeyoung, Harvard Kennedy School Misinformation Review, v.2, no.1, 2021-01 |
The Processing of Dictionary Definitions and Maintenance in Text and Dictionary Management System (TDMS) Choi, Byung-Jin; Lee, Jae Sung; Lee, Woon-Jae; Choi, Key-Sun, International Conference on Computer Processing of Oriental Languages, pp.443 - 447, 1997 |
The proficiency-congruency dilemma: Virtual team design and performance in multiplayer online games Kim, Jooyeon; Keegan, Brian C; Park, Sungjoon; Oh, Alice Haeyun, 34th Annual Conference on Human Factors in Computing Systems, CHI 2016, pp.4351 - 4365, ACM Special Interest Group on Computer-Human Interaction (SIGCHI), 2016-05 |
The RD-Tree: a structure for processing Partial-MAX/MIN queries in OLAP Yang, WS; Chung, YD; Kim, Myoung Ho, INFORMATION SCIENCES, v.146, no.1-4, pp.137 - 149, 2002-10 |
The real-time haptic simulation of a biomedical volumetric object with shape-retaining chain linked model Kim, SY; Park, Jinah; Kwon, DS, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E88D, pp.1012 - 1020, 2005-05 |
The Real-time Implementation for the Parking Line Departure Warning System Lee, Dongkyu; Lee, Jae-Seol; Lee, Sinjae; Kee, Seok-Cheol, 2018 2nd International Conference on Automotive and Vehicle Engineering, pp.236 - 240, IEEE, 2018-09-05 |
The reflex-free hull Ahn, HK; Cheng, SW; Cheong, Otfried; Snoeyink, J, INTERNATIONAL JOURNAL OF COMPUTATIONAL GEOMETRY & APPLICATIONS, v.14, pp.453 - 474, 2004-12 |
The reverse Kakeya problem Bae, Sang Won; Cabello, Sergio; Cheong, Otfried; Choi, Yoonsung; Stehn, Fabian; Yoon, Sang Duk, ADVANCES IN GEOMETRY, v.21, no.1, pp.75 - 84, 2021-01 |
The Reverse Kakeya Problem Cheong, Otfried; Bae, Sang Won; Cabello, Sergio; Choi, Yoonsung; Stehn, Fabian; Yoon, Sang Duk, 34th International Symposium on Computational Geometry, Renyi Institute of Math, 2018-06-14 |
The ring authenticated encryption scheme - How to provide a clue wisely Lv, Jiqiang; Ren, Kui; Chen, Xiaofeng; Kim, Kwangjo, INFORMATION SCIENCES, v.179, no.1-2, pp.161 - 168, 2009-01 |
The Ring-Banyan Network : A Fault Tolerant Multistage Interconnection Network for Multiprocessor Systems J. Park; Yoon, Hyunsoo; Lee, Heung-Kyu; S.B. Eun, INTERNATIONAL JOURNAL OF HIGH SPEED COMPUTING, v.6, no.4, pp.557 - 577, 1994-06 |
The Ring-Banyan Network: A Fault Tolerant Multistage Interconnection Networks with an Adaptive Self-Routing Park, J. H.; Yoon, Hyunsoo; Lee, Heung-Kyu; Eun, S.B., Proceedings of International Conference on Parallel and Distributed Systems (ICPADS'92), pp.196 - 203, 1992-12 |
The Riyadh Declaration: the role of digital health in fighting pandemics Al Knawy, Bandar; Adil, Mahmood; Crooks, George; Rhee, Kyu; Bates, David; Jokhdar, Hani; Klag, Michael; et al, LANCET, v.396, no.10262, pp.1537 - 1539, 2020-11 |
The role of word length in visual word recognition Nam, Kichun; Lee, Woonjae; Seo, Kwangjoon; Kang, Jungoo; Choi, Key-Sun, International Conference on Cognitive Science, pp.313 - 314, 1997 |
The SCED service discipline with O(1) complexity for deadline calculation Pyun, K; Lee, Heung-Kyu, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E85B, no.5, pp.1012 - 1019, 2002-05 |
The secret to successful evocative messages: Anger takes the lead in information sharing over anxiety Han, Jiyoung; Lee, Seungeon; Cha, Meeyoung, COMMUNICATION MONOGRAPHS, v.90, no.4, pp.545 - 565, 2023-10 |
The Security of Abreast-DM in the Ideal Cipher Model Lee, Jooyoung; Kwon, Daesung, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E94A, no.1, pp.104 - 109, 2011-01 |
The security of multiple encryption in the ideal cipher model Dai, Yuanxi; Lee, Jooyoung; Mennink, Bart; Steinberger, John, 34rd Annual International Cryptology Conference, CRYPTO 2014, pp.20 - 38, International Association for Cryptologic Research (IACR), 2014-08-17 |
Discover