Browse "School of Computing(전산학부)" by Type Conference

Showing results 1921 to 1980 of 7394

1921
Design of state machine interface for building communicative environment with virtual reality avatar

Lee, Andrew; Kim, Taeho; Park, Jinah, BIEN 2017, The International Conference of Women Scientists and Engineers conference on BT, IT, ET and NT (BIEN), 2017-08-31

1922
Design of the Interconnection Network Monitoring System for Development of Large-scale Multiprocessor Systems

Song, H.; Kwon, B.S.; Kim, J.Y.; Yoo, D.H.; Yoon, Hyunsoo, Proceedings of KISS Computer System Society Conference, pp.57 - 61, KISS Computer System Society Conference, 1995

1923
Design of the Monitoring System for Interconnection Network of Large-scale Multiprocessor Systems : Support ofr Versatile Probing Environment

Song, H.; Kwon , B.S.; Kim, J.Y.; Yoo, D.H.; Yoon, Hyunsoo, Proceedings of KISS Conference, pp.891 - 894, 1995

1924
Design of the OSI-DTP Protocol System

Lim, S.C.; Yoo, H.D.; Kim, K.S.; Jung, I.Y.; Kim, Myoung Ho, KISS Conference, pp.35 - 38, KISS, 1994

1925
Design of Threshold Blind Signature Scheme

Vo, DL; Kim, Kwangjo, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.37 - 42, 한국정보보호학회, 2003-07-04

1926
Design Phase Analysis of Software Performance Using Aspect-Oriented Programming

Park, Daesung; Kang, Sungwon, 7th Int’l Conf. on UML Modeling Languages and Applications - Aspect oriented modeling workshop, pp.0 - 0, 2004-10-10

1927
Design phase analysis of software qualities using aspect-oriented programming

Park, Daesung; Kang, Sungwon; Lee, Jihyun, 7th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2006, including Second ACIS International Workshop on Self-Assembling Wireless Networks, SAWN 2006, v.2006, pp.29 - 34, SNPD, 2006-06-19

1928
Design practices for wholesale central bank digital currencies from the world

Edwin, Opare; Kim, Kwangjo, 2020 Symposium on Cryptography and Information Security (SCIS 2020), IEICE Technical Committee on Information Security, 2020-01-28

1929
Design the ANGLE(Active Network for GLobal Environments) System

Moon, Kyeongdeok; Lee, Joongsoo; Kim, Jinchul; Lee, Young-Hee, ISAS'99, pp.0 - 0, 1999-07-31

1930
Designing a Cognitive Case-Based Planning Framework for Home Service Robots

Myaeng, Sung Hyon; Jung, Y; Park, H; Choi, Y, Robot and Human interactive Communication, 2007. RO-MAN 2007. The 16th IEEE International Symposium on, pp.827 - 832, 2007-08

1931
Designing a Memory Disaggregation System for Cloud

Yoon, Wonsup; Ok, Jisu; Moon, Sue; Kwon, Youngjin, ACM SIGCOMM 2023 Conference, Association for Computing Machinery, Inc, 2023-09-12

1932
Designing a New ebXML Registry Information Model for Ontology Data

Roh, Y.H.; Kim, H.G.; Kim, H.S.; Yun, J.H.; Son, J.H.; Kim, Myoung Ho, 2006 KISS Fall Confeence, pp.291 - 296, KISS, 2006

1933
Designing a Non-contact Wearable Tactile Display Using Airflows

Lee, Jaeyeon; Lee, Geehyuk, ACM Symposium on User Interface Software and Technology (UIST 2016), pp.183 - 194, ACM SIGCHI and SIGGRAPH, 2016-10-16

1934
Designing a Reuasable Class Library in a Service Creation Environment

Kwon, Yong Rae, Proc. Joint Conference on Software Engineering, pp.41 -, 1992

1935
Designing a user interface for a painting application supporting real watercolor painting processes

Yeom, Jiho; Lee, Geehyuk, The 10th Asia Pacific Conference on Computer Human Interaction, pp.219 - 226, Human Centered Design Organization and ACM, 2012-08-30

1936
Designing an Architecture of SNS Platform by Applying a Product Line Engineering Approach

Ryu, Duksan; Lee, Dan; Baik, Jongmoon, 11th IEEE/ACIS International Conference on Computer and Information Science, IEEE, 2012-05

1937
Designing an efficient apparel CAD system and its prototype implementation

Oh, GH; Lee, SY; Shin, Sung-Yong, Proc. KISS Annual Conference, pp.191 - 197, 1999

1938
Designing Attention-aware Peripheral Displays with Gaze-based Notification Control

박승순; 박성수; 임윤경; 이기혁; 한민수, HCI International 2009 (13th International Conference on Human-Computer Interaction), HCI, 2009-07-24

1939
Designing for AI-Powered Social Computing Systems

Lim, Gionnieve; Kim, Hyunwoo; Choi, Yoonseo; Li, Toby Jia-Jun; Kulkarni, Chinmay; Subramonyam, Hariharan; Seering, Joseph; et al, 26th ACM Conference on Computer-Supported Cooperative Work and Social Computing, CSCW 2023, pp.572 - 575, Association for Computing Machinery, 2023-10-14

1940
Designing for hover-and force-enriched touch interaction

Heo, Seongkook; Han, Jaehyun; Lee, Geehyuk, 25th Australian Computer-Human Interaction Conference, OzCHI 2013, pp.68 - 87, Springer Verlag, 2013-11

1941
Designing interactive distance cartograms to support urban travelers

Hong, Sungsoo; Kocielnik, Rafal; Yoo, Min-Joon; Battersby, Sarah; Kim, Juho; Aragon, Cecilia, 10th IEEE Pacific Visualization Symposium, PacificVis 2017, pp.81 - 90, IEEE Computer Society, 2017-04-19

1942
Designing logical architectures of software systems

Kang, Sungwon; Choi Y., 6th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and 1st ACIS International Workshop on Self-Assembling Wireless Networks, SNPD/SAWN 2005, v.2005, pp.330 - 337, SNPD, 2005-05-23

1943
Designing Mobile User Interfaces Using Hand Grip Recognition

Chang, Wook; Kim, Kee-Eung; Lee, Hyunjeong; Cho, Joonki; Soh, Byeongsuk; Shim, Junghyun; Yang, Kyunghye; et al, 한국HCI학회, pp.0 - 0, 2006-01-01

1944
Designing Rich Touch Interaction through Proximity and 2.5D Force Sensing Touchpad

Heo, Seongkook; Han, Jaehyun; Lee, Geehyuk, The Annual Meeting of the Australian Special Interest Group for Computer Human Interaction, pp.401 - 404, ACM SIGCHI, 2013-11-28

1945
Designing Touch Gestures Using the Space around the Smartwatch as Continuous Input Space

Han, Jaehyun; Ahn, Sunggeun; Park, Keunwoo; Lee, Geehyuk, 12th ACM International Conference on Interactive Surfaces and Spaces (ACM ISS), pp.210 - 219, ACM, 2017-10-20

1946
Desynchronization and Cloning resistant light weight RFID authentication protocol using integer arithmetic for low-cost tags

Kwak, M; Kim, J; Kim, Kwangjo, 2009 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2009-12-20

1947
Detecting Active Attacks in WiFi Network by Semi-supervised Deep Learning

Aminanto, Erza; 김광조, 2016년 한국정보보호학회 동계학술대회 (CISC-W'16), 한국정보보호학회, 2016-12-03

1948
Detecting and Blocking False Sentiment Propagation

Min, Hye-Jin; Park, Jong Cheol, The 5th International Joint Conference on Natural Language Processing (IJCNLP), pp.354 - 362, International Joint Conference on Natural Language Processing, 2011-11-09

1949
Detecting Arrivals and Departure of Subway Train Using Linear Acceleromete

Shin, Hoon; Han, Dong-Soo, MobiSys '19: The 17th Annual International Conference on Mobile Systems, Applications, and Services, pp.580 - 581, ACM, 2019-06-12

1950
Detecting code theft via a static instruction trace birthmark for java methods

Park, Heewan; Choi, Seokwoo; Lim, Hyun-il; Han, Taisook, IEEE INDIN 2008: 6th IEEE International Conference on Industrial Informatics, pp.551 - 556, IEEE, 2008-07-13

1951
Detecting composite image manipulation based on deep neural networks

Choi, Hak-Yeol; Jang, Han-Ul; Kim, Dongkyu; Son, Jeongho; Mun, Seung-Min; Choi, Sunghee; Lee, Heung-Kyu, 24th International Conference on Systems, Signals and Image Processing, IWSSIP 2017, pp.1 - 5, IEEE Computer Society, 2017-05-22

1952
Detecting Concurrency Errors in Client-side JavaScript Web Applications

Hong, Shin; Park, Yongbae; Kim, Moonzoo, International Conference on Software Testing, Verification and Validation (ICST), IEEE Computer Society, 2014-04-01

1953
Detecting Contextomized Quotes in News Headlines by Contrastive Learning

Song, Seonyeong; Song, HyeonHo; Park, Kunwoo; Han, Jiyoung; Cha, Meeyoung, 17th Conference of the European Chapter of the Association for Computational Linguistics, EACL 2023 - Findings of EACL 2023, pp.685 - 692, Association for Computational Linguistics (ACL), 2023-05-06

1954
Detecting Contract Cheaters in Online Programming Classes with Keystroke Dynamics

Byun, Jeongmin; Park, Jungkook; Oh, Alice, 7th Annual ACM Conference on Learning at Scale, L@S 2020, pp.273 - 276, Association for Computing Machinery, 2020-08-14

1955
Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach

Muhamad Erza, Aminanto; Kim, Kwangjo, 17th World Conference on Information Security Applications (WISA 2016), pp.136 - 147, Korea Institute of Information Security and Cryptology (KIISC), 2016-08-25

1956
Detecting Incongruity between News Headline and Body Text via a Deep Hierarchical Encoder

Yoon, Seunghyeon; Park, Kunwoo; Shin, J; Lim, Hongjun; Won, S; Cha, Meeyoung; Jung, Kyomin, 33rd AAAI Conference on Artificial Intelligence / 31st Innovative Applications of Artificial Intelligence Conference / 9th AAAI Symposium on Educational Advances in Artificial Intelligence, pp.791 - 800, AAAI conference on Artificial Intelligence, 2019-01-28

1957
Detecting Java theft based on static API trace birthmark

Park, Heewan; Choi, Seokwoo; Lim, Hyun-il; Han, Taisook, 3rd International Workshop on Security, IWSEC 2008, pp.121 - 135, Springer Verlag (Germany), 2008-11-25

1958
Detecting Multiclass Emotions from Labeled Movie Scripts

Kim, Jaewoo; Ha, Yu-i; Kang, Seungche; Lim, Hongjun; Cha, Meeyoung, IEEE International Conference on Big Data and Smart Computing (BigComp), pp.590 - 594, IEEE, 2018-01-17

1959
Detecting Online Game Chargeback Fraud Based on Transaction Sequence Modeling Using Recurrent Neural Network

Lee, Namsup; Yoon, Hyunsoo; Choi, Daeseon, 18th World International Conference on Information Security and Application, WISA 2017, pp.297 - 309, Springer Verlag, 2018-08

1960
Detecting personality unobtrusively from users’ online and offline workplace behaviors

Kim, Seoyoung; Ha, Jiyoun; Kim, Juho, 2018 CHI Conference on Human Factors in Computing Systems, CHI EA 2018, Association for Computing Machinery, 2018-04-24

1961
Detecting re-captured videos using shot-based photo response non-uniformity

Jung, Dae-Jin; Hyun, Dai-Kyung; Ryu, Seung-Jin; Lee, Ji-Won; Lee, Hae-Yeoun; Lee, Heung-Kyu, 10th Int. Workshop on Digital-Forensics and Watermarking, Springer-Verlag, 2011-10-23

1962
Detecting rumors from microblogs with recurrent neural networks

Ma, Jing; Gao, Wei; Mitra, Prasenjit; Kwon, Sejeong; Jansen, Bernard J.; Wong, Kam-Fai; Cha, Meeyoung, 25th International Joint Conference on Artificial Intelligence, IJCAI 2016, pp.3818 - 3824, International Joint Conferences on Artificial Intelligence Organization (IJCAI), 2016-07-13

1963
Detecting Vehicle License Plate in Images

Kim, JinHyung; Kim, K. I.; Kwon , TH, Proceeding of the First Tsinghua-KAIST Joint Workshop on Document Recognition, v.0, no.0, pp.1 - 6, Proceeding of the First Tsinghua-KAIST Joint Workshop on Document Recognition, 2002-03

1964
Detection and Analysis of Routing Loops in Packet Traces

Hengartner, Urs; Moon, Sue Bok; Mortier, Richard; Diot, Christophe, 2nd Internet Measurement Workshop (IMW 2002) , pp.107 - 112, ACM SIGCOMM and SIGMETRICS, 2002-11

1965
Detection of Content-Aware Image Resizing Using Seam Properties

Ryu, Seung-Jin; Lee, Hae-Yeoun; Lee, Heung-Kyu, Int. Conf. on Engineering and Technology Innovation(ICETI’2012), ICETI, 2012-11-04

1966
Detection of copy-rotate-move forgery using zernike moments

Ryu, SJ; Lee, MJ; Lee, Heung-Kyu, 12th International Conference on Information Hiding, IH 2010, pp.51 - 65, Springer Verlag, 2010-06-28

1967
Detection of the Single Image from DIBR based on 3D Warping Trace and Edge Matching

Jung, Dae-Jin; Lee, Heung-Kyu, Int. Sym. on Information Hiding and Protection(SIHP’2014), pp.43 - 50, EII(Engineering Information Institute), 2014-03-10

1968
Detection of the Single Image Leaked from DIBR System based on the Horizontal Neighboring Pixels

Choi, Chang-Hee; Lee, Heung-Kyu, Int. Conf. on 3D Systems and Applications(3DSA’2012), pp.506 - 510, 3DIDA/URCF/ARMI, 2012-06-25

1969
Determination of Identity, Position and Orientation of the Topmost Object in a Pile

Yang, Hyun-Seung; Kak, A.C., IEEE 3rd Workshop on Computer Vision, pp.38 - 47, 1985

1970
Determination of the Identity, Position and Orientation of the Topmost Object in a Pile

Yang, Hyun-Seung; Kak, A.C., Proceedings of the IEEE International Conference on Robotics and Automation, pp.293 - 297, 1986-04

1971
Determining mood for a blog by combining multiple sources of evidence

Jung, Y.; Choi, Y.; Myaeng, Sung Hyon, IEEE/WIC/ACM International Conference on Web Intelligence, WI 2007, pp.271 - 274, 2007-11-02

1972
Determining the Specificity of Terms based on Information Theoretic Measures

Ryu, PM; Choi, Key-Sun, COMPUTERM, pp.0 - 0, 2004-08-01

1973
Determining the Specificity of Terms using Compositional and Contextual Information

Choi, Key-Sun, ACL 2004 workshop on Student research, pp.7 - 12, Association for Computational Linguistics, 2004-08-26

1974
Deterministic Fault-Tolerant Routing in Two Dimensional Meshes

Kim, J; Kim, J; Yoon, Hyunsoo; Maeng, S.; Cho, J., Proceedings of KISS Computer System Society Conference, pp.66 - 71, 1996

1975
Developing a Common Operating Environment for Military Application

Kim, Jungyoon; Lee, Joon-Sang; Bae, Doo-Hwan; Ryu, Dong-Kuk; Lee, Sang-Il, Future Trends on Distributed Computing Systems, pp.367 - 373, IEEE, 2003-05

1976
Developing a Mobile Wellness Management System for Healthy Lifestyle by Analyzing Daily Living Activities

Lim, Chae-Gyun; Kim, Zae Myung; Choi, Ho-Jin, The 16th World Congress on Medical and Health Informatics (Medinfo 2017), pp.1 - 5, China Medical Informatics Association (CMIA), 2017-08-23

1977
Developing a simulation model using a spem-based process model and analytical models

Park, Seunghun; Kim, HyeonJeong; Kang, Dongwon; Bae, Doo-Hwan, 4th International Workshop CIAO, and 4th International Workshop EOMAS, held at CAiSE 2008, pp.164 - 178, CAiSE, 2008-06-16

1978
Developing Component Architecture for Telecommunication Systems

Kim, Hyung Ho; Bae, Doo-Hwan; Keum, Chang-Sup; Lee, Byung-Sun, Software Enginering, Artificial Intelligence, Networking & Paralle/Distributed Computing, pp.791 - 798, 2001

1979
Developing Distributed Software Systems by Incorporating Meta-Object Protocol(diMOP) with Unified Modeling Language(UML)

Lee, Joon-Sang; Kim, Tae-Ho; Yoon, Gwang Sik; Hong, Jang-Eui; Cha, Sungdeok; Bae, Doo-Hwan, Fourth International Symposium on Autonomous Decentralized Systems, pp.65 - 72, IEEE, 1999-03

1980
Developing Hypergraph Query System Considering Hyperedge Information Using Subgraph Isomorphism

유충모; 서정혁; 김명호, 2017 한국컴퓨터종합학술대회, pp.307 - 309, 한국정보과학회, 2017-06-19

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0