Showing results 5961 to 5980 of 16144
ICU 정보보호 석/박사 과정을 위한 교과과정 연구 천정희; 이철수; 김광조, 정보보호교육워크샵, pp.99 - 108, 한국정보보호학회, 2002-06-28 |
ICU-PFC: An Automatic Parallelizing Compiler Kim , HS; Yoon, YH; Na, SO; Han, Dongsoo, HPC-Asia 2000, pp.0, HPC-Asia 2000, 2000-05 |
ICU/COWS: A distributed transactional workflow system supporting multiple workflow types Han, Dongsoo; Shim, J; Yu, C, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E83D, no.7, pp.1514 - 1525, 2000-07 |
ID 기반 암호 기술을 이용한 VoIP 보안 서비스 설계 및 구현 한규석; 지성배; 김광조, 한국정보보호학회 동계정보보호학술대회, v.17, no.2, pp.540 - 543, Korea Institute of Information Security and Cryptology, 2007-12-01 |
ID 기반 암호 시스템을 이용한 이동 적응망에서의 안전한 라우팅 프로토콜 이윤호; 김희열; 정병천; 이재원; 윤현수, 한국정보과학회 춘계 학술대회, pp.503 - 507, 한국정보과학회, 2003-04-01 |
ID-Based Blind Signature and Ring Signature from Pairings Zhang, Fangguo; Kim, Kwangjo, Lecture Notes in Computer Science, Vol.2501, pp.629-637, 2002 |
ID-based distributed "magic ink" signature from pairings Xie, Yan; Zhang, Fangguo; Chen, Xiaofeng; Kim, Kwangjo, INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2836, pp.249 - 259, 2003 |
ID-Based Distributed 'Magic Ink' Signature Xie, Y; Zhang, F; Kim, Kwangjo, 2003년도 한국정보보호학회영남지부, pp.19 - 23, 한국정보보호학회영남지부, 2003-02-21 |
ID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings Chen, X; Zhang, F; Kim, Kwangjo, 2003년도 한국정보보호학회 충청지부학술대회, pp.11 - 19, 한국정보보호학회, 2003-08-22 |
ID-based, blind signature and ring signature from pairings Zhang, Fangguo; Kim, Kwangjo, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2501, pp.533 - 547, 2002 |
Identification and selection of refactorings for improving maintainability of object-oriented software = 객체지향 소프트웨어의 유지보수성 향상을 위한 리팩토링 식별 및 선택 방법에 대한 연구link Han, Ah-Rim; 한아림; et al, 한국과학기술원, 2013 |
Identification of Boundaries in Parallel Noun Phrases: A Probabilistic Swapping Model YONG-SEOK CHOI; JI-AE SHIN; Choi, Key-Sun, INTERNATIONAL JOURNAL OF COMPUTER PROCESSING OF ORIENTAL LANGUAGES, v.19, no.2-3, pp.109 - 132, 2006 |
Identification of conserved domain combinations in S.cerevisiae proteins Suk, H.J.; Hur, H.-Y.; Kim, D.; Han, Dongsoo, 7th IEEE International Conference on Bioinformatics and Bioengineering, BIBE, pp.14 - 20, IEEE, 2007-01-14 |
Identification of Depression-Gene Associations from Biomedical Literature You, Jinseon; Jin, Rize; Lee, Hee-Jin; Park, Jong-Cheol, 2015년도 한국정보과학회 KCC2015 (Korea Computer Congress 2015), Korea Computer Congress (KCC), 2015-06 |
Identification of quality improvement strategies using COPQ in software industry Seo, YeongSeok; Shin, Donghwan; Kim, Gookhyun; Baik, Jongmoon; Bae, Doo-Hwan, INTERNATIONAL JOURNAL OF PERFORMABILITY ENGINEERING, v.8, no.6, pp.679 - 688, 2012-11 |
Identifying and Quantifying Coordinated Manipulation of Upvotes and Downvotes in Naver News Comments Jeong, Jiwan; Jeong-han Kang; Moon, Sue, International AAAI Conference on Web and Social Media (ICWSM), pp.303 - 314, Association for the Advancement of Artificial Intelligence, 2019-06-08 |
Identifying and Quantifying Coordinated Manipulation of Upvotes and Downvotes in Naver News Comments Jeong, Jiwan; Jeong-han Kang; Moon, Sue, 14th International Conference on Web and Social Media (ICWSM), pp.303 - 314, Association for the Advancement of Artificial Intelligence, 2020-06-08 |
Identifying controversial issues and their sub-topics in news articles Choi, Y.; Jung, Y.; Myaeng, Sung Hyon, Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2010, pp.140 - 153, Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2010, 2010-06-21 |
Identifying Crime-prone Areas Based on Tweet Sentiments Kim, Jaewoo; Cha, Meeyoung; Lee, Won Jae; Sandholm, Thomas, TELECOMMUNICATIONS REVIEW, v.24, no.3, pp.339 - 347, 2014-06 |
Identifying Disease Definitions with a Correlation Kernel for Symptom Extractions from Text Ko, Minsu; Myaeng, Sung-Hyon, 2013 IEEE International Conference on Healthcare Informatics (ICHI), IEEE, 2014-09-16 |
Discover