Showing results 2581 to 2640 of 7390
FLUCCS: Using Code and Change Metrics to Improve Fault Localization Sohn, Jeongju; Yoo, Shin, 26th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), pp.273 - 283, ACM Special Interest Group on Software Engineering (SIGSOFT), 2017-07-12 |
FLUID-XP: Flexible User Interface Distribution for Cross-Platform Experience Lee, Sunjae; Lee, Hayeon; Kim, Hoyoung; Lee, Sangmin; Choi, Jeong Woon; Lee, Yuseung; Lee, Seono; et al, The 27th Annual International Conference On Mobile Computing And Networking, ACMd, 2021-10-24 |
FLUID: Flexible User Interface Distribution for Ubiquitous Multi-device Interaction Oh, Sangeun; Kim, Ahyeon; Lee, Sunjae; Lee, Kilho; Jeong, Dae R.; Ko, Steven Y.; Shin, Insik, 25th Annual International Conference on Mobile Computing and Networking (MobiCom), ACM, 2019-10-22 |
FLUID: Multi-device Mobile Platform for Flexible User Interface Distribution Oh, Sangeun; Kim, Ahyeon; Lee, SunJae; Lee, Kilho; Jeong, Dae R; Ko, Steven Y; Shin, Insik, 25th Annual International Conference on Mobile Computing and Networking, MobiCom 2019, Association for Computing Machinery, 2019-10 |
FMBP (A methods to generate Feature Model from Business Process Model for business application) Bae, Jongsu; Kang, Sungwon, Proceedings of the IEEE 7th Int’l Conference on Computer and Information Technology, pp.879 - 884, IEEE, 2007-10-16 |
FMQ 오류보정 모델을 사용하는 오류보정 Yacc의 구현 정민수; 최광무, '93 프로그래밍 언어 연구회 학술 발표논문집, pp.28 - 35, 1993 |
Follow 분할을 이용한 변환파서의 결정적 동치문법생성 이은정; 최광무, 한국정보과학회 1994년 봄 학술발표회논문집, pp.363 - 366, 한국정보과학회, 1994-04-01 |
Fonte: Finding Bug Inducing Commits from Failures An, Gabin; Yoo, Shin; Hong, Jingun; Kim, Naryeong, 45th International Conference on Software Engineering, IEEE/ACM, 2023-05-17 |
Food hazard event extraction based on news and social media: A preliminary work Myaeng, Sung-Hyon; Kyoung-Rok Jang; Kangwook Lee; Gwan Jang; Seungyong Jung; Min-Gwan Seo, International Conference on Big Data and Smart Computing, BigComp 2016, pp.466 - 469, Institute of Electrical and Electronics Engineers Inc., 2016-01-20 |
Fooling a Neural Network in Military Environments: Random Untargeted Adversarial Example KWON, HYUN; Kim, Yongchul; Yoon, Hyunsoo; Choi, Daeseon, Military Communications Conference 2018 (MILCOM 2018), pp.456 - 461, IEEE(Communications Society), 2018-10-30 |
Force gestures: Augmented touch screen gestures using normal and tangential force Heo, Seongkook; Lee, Geehyuk, 29th Annual CHI Conference on Human Factors in Computing Systems, CHI 2011, pp.1909 - 1914, ACM Special Interest Group on Computer-Human Interaction (SIGCHI), 2011-05-07 |
Force gestures: augmenting touch screen gestures with normal and tangential forces Heo, Seongkook; Lee, Geehyuk, 24th annual ACM symposium adjunct on User interface software and technology (UIST '11), pp.621 - 626, ACM SIGCHI and SIGGRAPH, 2011-10-16 |
ForceDrag: using pressure as a touch input modifier Heo, Seongkook; Lee, Geehyuk, The Annual Meeting of the Australian Special Interest Group for Computer Human Interaction, pp.204 - 207, ACM SIGCHI, 2012-11-28 |
ForceTap: Extending the Input Vocabulary of Mobile Touch Screens by adding Tap Gestures Heo, Seongkook; Lee, Geehyuk, The 13th International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI 2011), pp.113 - 122, ACM, 2011-08-30 |
Forecasting Building Electricity Power Consumption Using Deep Learning Approach Lee, Young-Jun; Choi, Ho-Jin, 2020 IEEE International Conference on Big Data and Smart Computing, BigComp 2020, pp.542 - 544, IEEE,Korean Institute of Information Scientists and Engineers (KIISE), 2020-02-19 |
Foreign Word Identification Using a Statistical Method for Information Retrieval Kwon, YH; Jeong, KS; Myaeng, Sung Hyon, 17th International Conference on Computer Processing of Oriental Languages (ICCPOL 1997), pp.675 - 680, 1997-04 |
Forensic Analysis of Autonomous System Reachability Lee, DK; Moon, Sue Bok; Choi, Taesang; Jeong, Taesoo, ACM SIGCOMM 2006 - Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp.335 - 340, ACM Special Interest Group on Data Communication, 2006-09-11 |
Forensic tracking watermarking against in-theater piracy Lee, MJ; Kim, KS; Lee, Heung-Kyu, 11th International Workshop on Information Hiding, IH 2009, pp.117 - 131, Springer Verlag, 2009-06-08 |
Forged Region Detection for Scanned Images Choi, Chang-Hee; Lee, Min-Jeong; Hyun, Dai-Kyung; Lee, Heung-Kyu, 3rd Int. Conf. on Computer Science and Its Applications, Springer-Veralg, 2011-12-12 |
Forgery Detection for Surveillance Video Hyun, Dai-Kyung; Lee, Min-Jeong; Ryu, Seung-Jin; Lee, Hae-Yeoun; Lee, Heung-Kyu, Pacific-Rim Conference on Multimedia, Springer-Verlag, 2011-12-20 |
Formal Modeling and Analysis of Hybrid Systems: A Case Study in Multirobot Coordination Alur, Rajeev; Esposito, Joel M.; Kim, Moonzoo; Kumar, Vijay; Lee, Insup, World Congress on Formal Methods, pp.212 - 232, World Congress on Formal Methods, 1999-09-20 |
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances Kim, Moonzoo, International Symposium on Automated Technology for Verification and Analysis, pp.489 - 500, ATVA, 2007-10-24 |
Formal Representation of Guarded Logic Programs Using Petri Net Model 정인정; 이흥규, Proc. of the 20th Korea Information Science Society Fall Conf., v.20, no.2, pp.1081 - 1084, 한국정보과학회, 1993 |
Formal specification of a JavaScript module system Kang, Seonghoon; Ryu, Sukyoung, ACM international conference on Object oriented programming systems languages and applications, ACM SIGPLAN, 2012-10-26 |
Formal verification of a flash memory device driver - An experience report Kim, Moonzoo; Choi, Yunja; Kim, Yunho; Kim, Hotae, 15th International SPIN Workshop on Model Checking of Software, SPIN 2008, pp.144 - 159, SPIN, 2008-08-10 |
Formal verification of consistency between feature model and software architecture in software product line Satyananda T.K.; Lee, Danhyung; Kang S., 2nd International Conference on Software Engineering Advances - ICSEA 2007, v.0, no.0, pp.0 - 0, IEEE, 2007-08-25 |
Formal verification of consistency between feature model and software architecture in software product line Tonny, Kurniadi Satyananda; Lee, Danhyung; Kang, Sung-Won, International Conference on Software Engineering Advances(ICSEA 2007), IEEE, 2007-08-25 |
Formal Verification of Robot Movements - a Case Study on Home Service Robot SHR100 Kim, Moonzoo; Kang, Kyo Chul; Lee, Hyoungki, International Conference on Robotics and Automation, pp.4739 - 4744, IEEE, 2005-04-18 |
Formally Specified Monitoring of Temporal Properties Kim, Moonzoo; Viswanathan, Mahesh; Abdallah, Hanene Ben; Kannan, Sampath; Lee, Insup, European Conference on Real-Time Systems, pp.114 - 122, ECRTS, 1999-06-09 |
FortressCheck: Automatic testing for generic properties Kang Seonghoon; Ryu, Sukyoung, 26th Annual ACM Symposium on Applied Computing, SAC 2011, pp.1290 - 1296, ACM Special Interest Group on Applied Computing (SIGAPP), 2011-03-21 |
Forward secure ID-based group key agreement protocol with anonymity Park, H; Kim, Z; Kim, Kwangjo, 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, pp.274 - 279, 123, 2009-06-18 |
Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption Duc, DN; Cheon, JH; Kim, Kwangjo, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.21 - 25, 한국정보보호학회, 2003-07-04 |
Foundations for the run-time monitoring of reactive systems: fundamentals of the MaC language Viswanathan, Mahesh; Kim, Moonzoo, First international conference on Theoretical Aspects of Computing , pp.543 - 556, ICTAC, 2005-10 |
FourierHandFlow: Neural 4D Hand Representation Using Fourier Query Flow Lee, Jihyun; Jang, Junbong; Kim, Dongwhan; Sung, Minhyuk; Kim, Tae-Kyun, Thirty-seventh Conference on Neural Information Processing Systems (NeurIPS), NeurIPS, 2023-12-12 |
FPL: White-box secure block cipher using parallel table look-ups Kwon, Jihoon; Lee, Byeonghak; Lee, Jooyoung; Moon, Dukjae, Cryptographers Track at the RSA Conference, CT-RSA 2020, pp.106 - 128, Springer, 2020-02-25 |
Fractal Moving Image Compression System using Wavelet Transform 조정완, Proc. KISS, pp.1051 - 1054, 1995 |
Fractionalized View Materialization in Data Cubes Chung, Y.D.; Kim, M.J.; Park, W.J.; Kim, Myoung Ho, Seventh Int'l Conf. on Database Systems for Advanced Applications, pp.156 - 157, IEEE, 2001-04 |
Fragile Online Relationship: A First Look at Unfollow Dynamics in 문수복, NHN Workshop, NHN Workshop, 2010-11-08 |
Fragile Online Relationship: A First Look at Unfollow Dynamics in Twitter 문수복, Workshop on Privacy and Security on Social Media, Workshop on Privacy and Security on Social Media, 2011-01-18 |
Fragile online relationship: a first look at unfollow dynamics in Twitter Moon, Sue Bok, Computational Aspects of Social and Information Networks(CASIN) 2011, pp.1091 - 1100, Computational Aspects of Social and Information Networks(CASIN) 2011, 2011-07-21 |
Fragile Online Relationship: A First Look at Unfollow Dynamics in Twitter Moon, Sue Bok, International School and Conference on Network Sience 2011, International School and Conference on Network Sience 2011, 2011-06-05 |
Fragile online relationship: A first look at unfollow dynamics in Twitter Kwak, Haewoon; Chun, Hyunwoo; Moon, Sue Bok, 29th Annual CHI Conference on Human Factors in Computing Systems, CHI 2011, pp.1091 - 1100, ACM Special Interest Group on Computer-Human Interaction (SIGCHI), 2011-05-07 |
Frame-semantic web: A case study for Korean Park, Jungyeul; Choi, Keysun; Nam, Sejin; Kim, Youngsik; Hahm, Younggyun; Hwang, Dosam, ISWC 2014 Posters and Demonstrations Track, ISWC-P and D 2014, 13th International Semantic Web Conference, ISWC 2014, pp.257 - 260, CEUR-WS, 2014-10-19 |
Framework for Third Party Testing of Component Software Kwon, Yong Rae, Joint Workshop on System Development (JWSD '01), 2001 |
Framework for Third Party Testing of Component Software Ma, Yu-Seung; Oh, Seung-Uk; Bae, Doo-Hwan; Kwon, Yong Rae, Asia-Pacific Software Engineering Conference (APSEC '01), pp.431 - 434, IEEE, 2001-12 |
FreeFingers - 시계형 정보단말기를 위한 입력장치 유수림; 이기혁, 한국 HCI학회, pp.156 - 161, 2005 |
FreeMouse - 적외선 및 RF 송수신에 기반한 3차원 공간 마우스 정윤경; 최진혁; 손미숙; 이기혁, 한국정보과학회 HCI학술대회, 한국정보과학회, 2004-07 |
Frenzy: Collaborative data organization for creating conference sessions Chilton, Lydia B.; Kim, Juho; André, Paul; Cordeiro, Felicia; Landay, James A.; Weld, Daniel S.; Dow, Steven P.; et al, 32nd Annual ACM Conference on Human Factors in Computing Systems, CHI 2014, pp.1255 - 1264, ACM Special Interest Group on Computer-Human Interaction (SIGCHI), 2014-05-01 |
Friend Recommendation Using Offline and Online Social Information for Face-To-Face Interactions Kim, Kyung Min; Kim, Taehun; Hyun, Soon Joo, International Conference on Smart Computing, IEEE, 2016-05-18 |
Friend recommendation with a target user in social networking services Kim, Sundong; Lee, Jae-Gil, 2015 31st IEEE International Conference on Data Engineering Workshops, ICDEW 2015, pp.235 - 239, IEEE Computer Society, 2015-04 |
Friend-safe adversarial examples in an evasion attack on a deep neural network Kwon, Hyun; Yoon, Hyunsoo; Choi, Daeseon, 20th International Conference on International Conference on Information Security and Cryptology, ICISC 2017, pp.351 - 367, Springer Verlag, 2017-12-01 |
FriendNet Backdoor: Indentifying Backdoor Attack that is safe for Friendly Deep Neural Network Kwon, Hyun; Yoon, Hyunsoo; Park, Ki-Woong, The 3rd International Conference on Software Engineering and Information Management (ICSIM 2020), ACM’s International Conference Proceedings Series, 2020-01-13 |
FriSM: Malicious exploit kit detection via feature-based string-similarity matching Kim, Sungjin; Kang, Brent Byunghoon, 14th International EAI Conference on Security and Privacy in Communication Networks, SecureComm 2018, pp.416 - 432, Springer Verlag, 2018-08 |
From Crash Consistency to Transactions Hu, Yige; Kwon, Youngjin; Chidambaram, Vijay; Witchel, Emmett, 16th Workshop on Hot Topics in Operating Systems, HotOS 2017, pp.100 - 105, USENIX (THE ADVANCED COMPUTIONG SYSTEMS ASSOCIATION), 2017-05-08 |
From Tensors to FPGAs: Accelerating Deep Learning Sharma, Hardik; PARK, JONGSE; Samynathan, Balavinayagam; Robatmili, Behnam; Mirkhani, Shahrzad; Esmaeilzadeh, Hadi, Hot Chips: Symposium on High Performance Chips, IEEE/ACM, 2018-08-19 |
From Text to Sign Language: Exploiting Spatial and Motioning Dimension Choi, Ji-Won; Lee, Hee-Jin; Park, Jong Cheol, Association for Computational Linguistics and Chinese Language Processing, pp.61 - 69, Pacific Asia Conference on Language, Information and Computation, 2005-12-01 |
FS-Pad: Video Game Interactions with a Force Feedback Gamepad Shim, Youngbo; PARK, KEUNWOO; Lee, Sangyoon; Son, Jeongmin; Woo, Taeyun; Lee, Geehyuk, UIST `20: The 33rd Annual ACM Symposium on User Interface software and Technology, pp.938 - 950, ACM, 2020-10-22 |
FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking Kim, Hyuntae; Wi, Seongil; Lee, Hyunjoo; Son, Sooel, 20th World Conference on Information Security Applications, WISA 2019, pp.41 - 54, the Korea Institute of Information Security and Cryptology (KIISC), 2019-08-22 |
FSM에 기초한 다이나믹 테스트 시퀀스 선택 유상조; 김명철, 한국통신학회 하계종합 학술대회, 한국통신학회, 1996 |
FSP Model을 이용한 C&C View 아키텍처의 검증 김정호; 강성원, 한국IT서비스학회 추계학술대회, pp.0 - 0, 한국IT서비스학회, 2006-11-15 |
Discover