Browse "School of Computing(전산학부)" by Type Conference

Showing results 2581 to 2600 of 7376

2581
FLUID: Flexible User Interface Distribution for Ubiquitous Multi-device Interaction

Oh, Sangeun; Kim, Ahyeon; Lee, Sunjae; Lee, Kilho; Jeong, Dae R.; Ko, Steven Y.; Shin, Insik, 25th Annual International Conference on Mobile Computing and Networking (MobiCom), ACM, 2019-10-22

2582
FLUID: Multi-device Mobile Platform for Flexible User Interface Distribution

Oh, Sangeun; Kim, Ahyeon; Lee, SunJae; Lee, Kilho; Jeong, Dae R; Ko, Steven Y; Shin, Insik, 25th Annual International Conference on Mobile Computing and Networking, MobiCom 2019, Association for Computing Machinery, 2019-10

2583
FMBP (A methods to generate Feature Model from Business Process Model for business application)

Bae, Jongsu; Kang, Sungwon, Proceedings of the IEEE 7th Int’l Conference on Computer and Information Technology, pp.879 - 884, IEEE, 2007-10-16

2584
FMQ 오류보정 모델을 사용하는 오류보정 Yacc의 구현

정민수; 최광무, '93 프로그래밍 언어 연구회 학술 발표논문집, pp.28 - 35, 1993

2585
Follow 분할을 이용한 변환파서의 결정적 동치문법생성

이은정; 최광무, 한국정보과학회 1994년 봄 학술발표회논문집, pp.363 - 366, 한국정보과학회, 1994-04-01

2586
Fonte: Finding Bug Inducing Commits from Failures

An, Gabin; Yoo, Shin; Hong, Jingun; Kim, Naryeong, 45th International Conference on Software Engineering, IEEE/ACM, 2023-05-17

2587
Food hazard event extraction based on news and social media: A preliminary work

Myaeng, Sung-Hyon; Kyoung-Rok Jang; Kangwook Lee; Gwan Jang; Seungyong Jung; Min-Gwan Seo, International Conference on Big Data and Smart Computing, BigComp 2016, pp.466 - 469, Institute of Electrical and Electronics Engineers Inc., 2016-01-20

2588
Fooling a Neural Network in Military Environments: Random Untargeted Adversarial Example

KWON, HYUN; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, Military Communications Conference 2018 (MILCOM 2018), pp.456 - 461, IEEE(Communications Society), 2018-10-30

2589
Force gestures: Augmented touch screen gestures using normal and tangential force

Heo, Seongkook; Lee, Geehyuk, 29th Annual CHI Conference on Human Factors in Computing Systems, CHI 2011, pp.1909 - 1914, ACM Special Interest Group on Computer-Human Interaction (SIGCHI), 2011-05-07

2590
Force gestures: augmenting touch screen gestures with normal and tangential forces

Heo, Seongkook; Lee, Geehyuk, 24th annual ACM symposium adjunct on User interface software and technology (UIST '11), pp.621 - 626, ACM SIGCHI and SIGGRAPH, 2011-10-16

2591
ForceDrag: using pressure as a touch input modifier

Heo, Seongkook; Lee, Geehyuk, The Annual Meeting of the Australian Special Interest Group for Computer Human Interaction, pp.204 - 207, ACM SIGCHI, 2012-11-28

2592
ForceTap: Extending the Input Vocabulary of Mobile Touch Screens by adding Tap Gestures

Heo, Seongkook; Lee, Geehyuk, The 13th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI 2011), pp.113 - 122, ACM, 2011-08-30

2593
Forecasting Building Electricity Power Consumption Using Deep Learning Approach

Lee, Young-Jun; Choi, Ho-Jin, 2020 IEEE International Conference on Big Data and Smart Computing, BigComp 2020, pp.542 - 544, IEEE,Korean Institute of Information Scientists and Engineers (KIISE), 2020-02-19

2594
Foreign Word Identification Using a Statistical Method for Information Retrieval

Kwon, YH; Jeong, KS; Myaeng, Sung Hyon, 17th International Conference on Computer Processing of Oriental Languages (ICCPOL 1997), pp.675 - 680, 1997-04

2595
Forensic Analysis of Autonomous System Reachability

Lee, DK; Moon, Sue Bok; Choi, Taesang; Jeong, Taesoo, ACM SIGCOMM 2006 - Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp.335 - 340, ACM Special Interest Group on Data Communication, 2006-09-11

2596
Forensic tracking watermarking against in-theater piracy

Lee, MJ; Kim, KS; Lee, Heung-Kyu, 11th International Workshop on Information Hiding, IH 2009, pp.117 - 131, Springer Verlag, 2009-06-08

2597
Forged Region Detection for Scanned Images

Choi, Chang-Hee; Lee, Min-Jeong; Hyun, Dai-Kyung; Lee, Heung-Kyu, 3rd Int. Conf. on Computer Science and Its Applications, Springer-Veralg, 2011-12-12

2598
Forgery Detection for Surveillance Video

Hyun, Dai-Kyung; Lee, Min-Jeong; Ryu, Seung-Jin; Lee, Hae-Yeoun; Lee, Heung-Kyu, Pacific-Rim Conference on Multimedia, Springer-Verlag, 2011-12-20

2599
Formal Modeling and Analysis of Hybrid Systems: A Case Study in Multirobot Coordination

Alur, Rajeev; Esposito, Joel M.; Kim, Moonzoo; Kumar, Vijay; Lee, Insup, World Congress on Formal Methods, pp.212 - 232, World Congress on Formal Methods, 1999-09-20

2600
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances

Kim, Moonzoo, International Symposium on Automated Technology for Verification and Analysis, pp.489 - 500, ATVA, 2007-10-24

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0