Showing results 3021 to 3040 of 4126
Twin-width I: Tractable FO Model Checking Bonnet, Edouard; Kim, Eunjung; Thomasse, Stephan; Watrigant, Remi, JOURNAL OF THE ACM, v.69, no.1, 2022-02 |
TwittsIn: 장소 인식을 이용한 모바일 트위터 친구 알림 서비스 장래영; 이민규; 조준희; 한동수, 정보과학회논문지 : 컴퓨팅의 실제 및 레터, v.16, no.7, pp.814 - 818, 2010-07 |
Two approaches for the resolution of word mismatch problem caused by english words and foreign words in korean information retrieval Byung-Ju Kang; Choi, Key-Sun, COMPUTER PROCESSING OF ORIENTAL LANGUAGES, v.14, no.2, pp.109 - 131, 2001-01 |
Two for the Price of One: Lifting Separation Logic Assertions Thamsborg, Jacob; Birkedal, Lars; Yang, Hongseok, LOGICAL METHODS IN COMPUTER SCIENCE, v.8, no.3, 2012 |
Two real-time flow controls in wormhole networks Song, H; Kwon, B; Kim, JY; Yoon, Hyunsoo, INTERNATIONAL JOURNAL OF HIGH SPEED COMPUTING, v.9, no.3, pp.237 - 255, 1997-09 |
Two-character motion analysis and synthesis Kwon, Taesoo; Cho, Young-Sang; Il Park, Sang; Shin, Sung-Yong, IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, v.14, no.3, pp.707 - 720, 2008-05 |
Two-dimensional indexing to provide one-integrated-memory view of distributed memory for a massively-parallel search engine Yun, Tae-Seob; Whang, Kyu-Young; Kwon, Hyuk-Yoon; Kim, Jun-Sung; Song, Il-Yeol, WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, v.22, no.6, pp.2437 - 2467, 2019-11 |
Two-Dimensional Projection-Based Wireless Intrusion Classification Using Lightweight EfficientNet Aminanto, Muhamad Erza; Purbomukti, Ibnu Rifqi; Chandra, Harry; Kim, Kwangjo, CMC-COMPUTERS MATERIALS & CONTINUA, v.72, no.3, pp.5301 - 5314, 2022 |
Two-Factor Authentication System Using P300 Response to a Sequence of Human Photographs Kaongoen, Netiwit; Yu, Moonwon; Jo, Sung-Ho, IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, v.50, no.3, pp.1178 - 1185, 2020-03 |
Two-level document ranking using mutual information in natural language information retrieval Kang, HK; Choi, Key-Sun, INFORMATION PROCESSING MANAGEMENT, v.33, no.3, pp.289 - 306, 1997-05 |
Two-Pass Authenticated Key Agreement Protocol with Key Confirmation Song, Boyeon; Kim, Kwangjo, LECTURE NOTES IN COMPUTER SCIENCE, v.1977, no.58, pp.237 - 249, 2000-12 |
A Two-Phase Scheduling Algorithm for Efficient Collective Communications of MPICH-G2 Lee, Junghee; Han, Dongsoo, Lecture Notes in Computer Science, Vol.3816, pp.217-228, 2005-12-09 |
Two-stream neural networks to detect manipulation of JPEG compressed images Kim, H. -G.; Park, J. -S.; Kim, D. -G.; Lee, Heung-Kyu, ELECTRONICS LETTERS, v.54, no.6, pp.354 - 355, 2018-03 |
TxFS: Leveraging File-system Crash Consistency to Provide ACID Transactions Hu, Yige; Zhu, Zhiting; Neal, Ian; Kwon, Youngjin; Cheng, Tianyu; Chidambaram, Vijay; Witchel, Emmett, ACM TRANSACTIONS ON STORAGE, v.15, no.2, 2019-06 |
Type Checking Modular Multiple Dispatch with Parametric Polymorphism and Multiple Inheritance Allen, Eric; Hilburn, Justin; Kilpatrick, Scott; Luchangco, Victor; Ryu, Sukyoung; Chase, David; Steele, Guy L., Jr., ACM SIGPLAN NOTICES, v.46, no.10, pp.973 - 992, 2011-10 |
Type-level access pattern view: Enhancing prefetching performance using the iterative and recursive patterns Han, Wook-Shin; Loh, Woong-Kee; Whang, Kyu-Young, INFORMATION SCIENCES, v.180, no.21, pp.4118 - 4135, 2010-11 |
Typing on a touch surface: Effect of feedback with horizontal touch keyboard and vertical display setup Kim, Sunjun; Lee, Geehyuk, ICIC EXPRESS LETTERS, v.6, no.12, pp.2973 - 2980, 2012 |
U-Health 서비스 구축을 위한 온톨로지 관리기 및 서비스 브로커의 설계 고인영; 전범준, 한국정보보호학회지, v.17, no.1, pp.22 - 32, 2007-02 |
UBC protocol testing environment, Protocol Test Systems S.T. Chanson; H. Dany; Kim, Myungchul, PROTOCOL TEST SYSTEMS VI, v.C-19, pp.215 - 230, 1993-01 |
Ubiquitous healthcare: Technology and service Kim, Y.B.; Yoo, S.K.; Kim, Daeyoung, STUDIES IN COMPUTATIONAL INTELLIGENCE, v.19, no.0, pp.1 - 35, 2006 |
Discover