Browse "School of Computing(전산학부)" by Type Article

Showing results 2361 to 2380 of 4162

2361
Privacy Aware Affective State Recognition From Visual Data

Zitouni, M. Sami; Lee, Peter; Lee, Uichin; Hadjileontiadis, Leontios J.; Khandoker, Ahsan, IEEE ACCESS, v.10, pp.40620 - 40628, 2022

2362
Privacy preserving mining maximal frequent patterns in transactional databases.

Md. Rezaul Karim; Md. Mamunur Rashid; Byeong-Soo Jeong; Choi, Ho-Jin, Lecture Notes in Computer Science 7238 , v.7238, no.0, pp.303 - 319, 2012-04

2363
Privacy-Preserving Deep Learning on Machine Learning as a Service-a Comprehensive Survey

Tanuwidjaja, Harry Chandra; Choi, Rakyong; Baek, Seunggeun; Kim, Kwangjo, IEEE ACCESS, v.8, pp.167425 - 167447, 2020-09

2364
PrivacyShield: A Mobile System for Supporting Subtle Just-in-time Privacy Provisioning through Off-Screen-based Touch Gestures

Pushp, Saumay; Liu, Yunxin; Xu, Mengwei; Koh, Changyoung; Song, Junehwa, Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, v.2, no.2, pp.1 - 38, 2018-07

2365
PrivateZone: Providing a Private Execution Environment using ARM TrustZone

Jang, Jinsoo; Choi, Changho; Lee, Jae Hyuk; Kwak, Nohyun; Lee, Seongman; Choi, Yeseul; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.15, no.5, pp.797 - 810, 2018-09

2366
Proactive context-aware sensor networks

Ahn, S; Kim, Daeyoung, WIRELESS SENSOR NETWORKS, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3868, pp.38 - 53, 2006

2367
Proactive Context-Aware Sensor Networks

Ahn, Sungjin; Kim, Daeyoung, Wireless Sensor Networks, Vol.3868, pp.38-53, 2006

2368
Proactive Web caching with cumulative prefetching for large multimedia data

Jung, J; Lee, DongMan; Chon, Kil Nam, COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, v.33, no.1-6, pp.645 - 655, 2000-06

2369
Probabilistic cost model for nearest neighbor search in image retrieval

Kim, Kun-Ho; Hasan, Mohammad K.; Heo, Jae-Pil; Tai, Yu-Wing; Yoon, Sung-Eui, COMPUTER VISION AND IMAGE UNDERSTANDING, v.116, no.9, pp.991 - 998, 2012-09

2370
Probabilistic Programming Interfaces for Random Graphs: Markov Categories, Graphons, and Nominal Sets

Ackerman, Nate; Freer, Cameron E.; Kaddar, Younesse; Karwowski, Jacek; Moss, Sean; Roy, Daniel; Staton, Sam; et al, PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, v.8, no.POPL, pp.1819 - 1849, 2024-01

2371
Probabilistic retrieval incorporating the relationships of descriptors incrementally

Kim, WY; Kim, Myoung Ho; Lee, Yoon Joon, INFORMATION PROCESSING MANAGEMENT, v.34, no.4, pp.417 - 430, 1998-07

2372
Probabilistic Synthesis of Personal-Style Handwriting

Choi, H; Kim, JinHyung, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E92D, no.4, pp.653 - 661, 2009-04

2373
Progressive Acquisition of SVBRDF and Shape in Motion

Ha, Hyunho; Baek, Seung-Hwan; Nam, Giljoo; Kim, Min H., COMPUTER GRAPHICS FORUM, v.39, no.6, pp.480 - 495, 2020-09

2374
Progressive Processing of Continuous Range Queries in Hierarchical Wireless Sensor Networks

Lee, Jeong-Hoon; Whang, Kyu-Young; Lim, Hyo-Sang; Lee, Byung-Suk; Heo, Jun-Seok, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E93D, pp.1832 - 1847, 2010-07

2375
PROOF - A PARALLEL OBJECT-ORIENTED FUNCTIONAL COMPUTATION MODEL

YAU, SS; JIA, XO; Bae, Doo-Hwan, JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, v.12, no.3, pp.202 - 212, 1991-07

2376
PROPERTY OF SEPARABILITY IN PHYSICAL DESIGN OF NETWORK MODEL DATABASES

Whang, Kyu-Young, INFORMATION SYSTEMS, v.10, no.1, pp.57 - 63, 1985

2377
Protecting secret keys in networked devices with table encoding against power analysis attacks

Kim, Taesung; Lee, Seungkwang; Choi, Dooho; Yoon, Hyunsoo, JOURNAL OF HIGH SPEED NETWORKS, v.22, no.4, pp.293 - 307, 2016

2378
Protein complex prediction based on simultaneous protein interaction network

Jung, Suk-Hoon; Hyun, Bo-Ra; Jang, Woo-Hyuk; Hur, Hee-Young; Han, Dong-Soo, BIOINFORMATICS, v.26, no.3, pp.385 - 391, 2010-02

2379
Protocol trace analysis based on formal specifications, Formal Description Techniques

Kim, Myungchul; Son T. Vuong; Samuel T. Chanson, FORMAL DESCRIPTION TECHNIQUES FOR DISTRIBUTED SYSTEMS AND COMMUNICATION PROTOCOLS, v.C-2, pp.393 - 408, 1992-01

2380
Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack

Kobayashi, Yukou; Yanai, Naoto; Yoneyama, Kazuki; Nishide, Takashi; Hanaoka, Goichiro; Kim, Kwangjo; Okamoto, Eiji, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E100A, no.12, pp.2991 - 3006, 2017-12

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0