Showing results 3041 to 3060 of 4139
Two-Factor Authentication System Using P300 Response to a Sequence of Human Photographs Kaongoen, Netiwit; Yu, Moonwon; Jo, Sung-Ho, IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, v.50, no.3, pp.1178 - 1185, 2020-03 |
Two-level document ranking using mutual information in natural language information retrieval Kang, HK; Choi, Key-Sun, INFORMATION PROCESSING MANAGEMENT, v.33, no.3, pp.289 - 306, 1997-05 |
Two-Pass Authenticated Key Agreement Protocol with Key Confirmation Song, Boyeon; Kim, Kwangjo, LECTURE NOTES IN COMPUTER SCIENCE, v.1977, no.58, pp.237 - 249, 2000-12 |
A Two-Phase Scheduling Algorithm for Efficient Collective Communications of MPICH-G2 Lee, Junghee; Han, Dongsoo, Lecture Notes in Computer Science, Vol.3816, pp.217-228, 2005-12-09 |
Two-stream neural networks to detect manipulation of JPEG compressed images Kim, H. -G.; Park, J. -S.; Kim, D. -G.; Lee, Heung-Kyu, ELECTRONICS LETTERS, v.54, no.6, pp.354 - 355, 2018-03 |
TxFS: Leveraging File-system Crash Consistency to Provide ACID Transactions Hu, Yige; Zhu, Zhiting; Neal, Ian; Kwon, Youngjin; Cheng, Tianyu; Chidambaram, Vijay; Witchel, Emmett, ACM TRANSACTIONS ON STORAGE, v.15, no.2, 2019-06 |
Type Checking Modular Multiple Dispatch with Parametric Polymorphism and Multiple Inheritance Allen, Eric; Hilburn, Justin; Kilpatrick, Scott; Luchangco, Victor; Ryu, Sukyoung; Chase, David; Steele, Guy L., Jr., ACM SIGPLAN NOTICES, v.46, no.10, pp.973 - 992, 2011-10 |
Type-level access pattern view: Enhancing prefetching performance using the iterative and recursive patterns Han, Wook-Shin; Loh, Woong-Kee; Whang, Kyu-Young, INFORMATION SCIENCES, v.180, no.21, pp.4118 - 4135, 2010-11 |
Typing on a touch surface: Effect of feedback with horizontal touch keyboard and vertical display setup Kim, Sunjun; Lee, Geehyuk, ICIC EXPRESS LETTERS, v.6, no.12, pp.2973 - 2980, 2012 |
U-Health 서비스 구축을 위한 온톨로지 관리기 및 서비스 브로커의 설계 고인영; 전범준, 한국정보보호학회지, v.17, no.1, pp.22 - 32, 2007-02 |
UBC protocol testing environment, Protocol Test Systems S.T. Chanson; H. Dany; Kim, Myungchul, PROTOCOL TEST SYSTEMS VI, v.C-19, pp.215 - 230, 1993-01 |
Ubiquitous healthcare: Technology and service Kim, Y.B.; Yoo, S.K.; Kim, Daeyoung, STUDIES IN COMPUTATIONAL INTELLIGENCE, v.19, no.0, pp.1 - 35, 2006 |
Ubiquitous Robots with Emotion for Smart Home Environments MaríaJosé Acosta; 최호진, 소프트웨어공학회지, v.20, no.3, pp.27 - 35, 2007-09 |
Ubiscript: A Script Language for Ubiquitous Environment Lee, Minkyu; Han, Dong-Soo, Journal of Computing Science and Engineering, v.5, no.2, pp.141 - 149, 2011-06 |
UML / OCL을 이용한 기업형 컴포넌트의 자동화 시험 환경 김, 상운; 마, 유승; 강, 제성; 배, 두환; 권, 용래; Kim, Sang-Woon; Ma, Yu-Seung; et al, 한국정보과학회 학술발표논문집, Vol.28, No.2, pp.553-555, 2001-10 |
UML 객체지향 분석모델의 완전성 및 일관성 진단을 위한 시나리오기반 검증기법 조진형; 배두환, 정보과학회논문지 : 소프트웨어 및 응용, v.28, no.3, pp.211 - 223, 2001-03 |
UML 클래스 다이어그램 기반의 효율적인 C++코드 생성기의 설계와 구현 조형주; 정진완; 김형주, 정보과학회논문지 : 컴퓨팅의 실제, v.6, no.4, pp.393 - 402, 2000-08 |
UMTS 시스템에서 기지국 버퍼에 대한 실험 및 분석 김남기; 박인용; 정혜영; 윤현수, 정보처리학회논문지A, v.9, no.3, pp.317 - 326, 2002-09 |
UMTS 시스템에서 동적 무선 환경 변화에 따른 TCP 성능 향상 기법 김남기; 박인용; 윤현수, 정보처리학회논문지C, v.10, no.7, pp.943 - 954, 2003-12 |
Uncomputability below the real halting problem Meer, Klaus; Ziegler, Martin, LOGICAL APPROACHES TO COMPTATIONAL BARRIERS, PROCEEDINGS, v.3988, pp.368 - 377, 2006 |
Discover