Showing results 3701 to 3720 of 16020
Dempster-Shafer이론을 이용한 징후 결합 방법 이, 종만; 김, 진형; Lee, Jong Man; Kim, Jin Hyung, 정보과학회논문지, Vol.15, No.1, pp.48-56, 1988-02 |
Demystifying DDoS as a Service Zand, Ali; Modelo-Howard, Gaspar; Tongaonkar, Alok; Lee, Sung-Ju; Kruegel, Christopher; Vigna, Giovanni, IEEE COMMUNICATIONS MAGAZINE, v.55, no.7, pp.14 - 21, 2017-07 |
Denoise autoencoder and tensor decomposition for the robustness against adversarial attacks = 잡음제거 오토인코더와 텐서 분해를 통해 적대적 공격에 대응한 방어 모델에 관한 연구link Cho, Seungju; Kim, Daeyoung; et al, 한국과학기술원, 2020 |
Denoising Recurrent Neural Networks for Classifying Crash-Related Events![]() Park, Sungjoon; Seonwoo, Yeon; Kim, Jiseon; Kim, Jooyeon; Oh, Alice, IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, v.21, no.7, pp.2906 - 2917, 2020-07 |
Denotational Validation of Higher-order Bayesian Inference Scibior, Adam; Kammar, Ohad; Vakar, Matthijs; Staton, Sam; Yang, Hongseok; Cai, Yufei; Ostermann, Klaus; et al, Proceedings of the ACM on Programming Languages, v.2, 2018-01 |
Deobfuscation of machine code using dynamic flow graphs = 동적 흐름 그래프를 이용한 기계 코드의 난독화 해제 기법link Hwang, Joonhyung; Bae, Doo-Hwan; 배두환; Han, Taisook; et al, 한국과학기술원, 2020 |
Dependable Software 관련 국제표준 동향 및 통합 프레임워크 제언 백종문; 최옥주, 정보처리학회지, v.21, no.4, pp.4 - 11, 2014-10 |
Dependency Relationship based Decision Combination in Multiple Classifier Systems Kang, H.J.; Kim, JinHyung, Preceedings of 11th International Joint Conference on Artificial Intelligence, Montreal, Canada, v.0, no.0, pp.0 - 0, Preceedings of 11th International Joint Conference on Artificial Intelligence, Montreal, Canada, 1995-08 |
Depressive Moods Captured in Twitter, an Online Social Network Park, Minsu; Cha, Chiyoung; Cha, Meeyoung, Global Congress for Qualitative Health Research, 2011-06 |
Depth Consistency Evaluation for Error-Pose Detection Jin, Sou-Young; Iraqi, Youssef; Choi, Ho-Jin, International Conference on Machine Vision, SCIEI, 2013-11-15 |
Depth estimation using sequential information for online 3D reconstruction = 온라인 3차원 복원을 위한 순차적 정보 기반의 깊이 추정link Khang, Truong Giang; Jo, Sungho; et al, 한국과학기술원, 2021 |
Depth-Aided Color Background Subtraction for Kinect depth segmentation Park, Youngmin; Choi, Yeong Jae; Yang, Hyun Seung, ICCC 2015, Malaysia, Korean Contents Association, 2015-12-12 |
Deriving software process simulation model from spem-based software process model Park, Seunghun; Choi, Keung Sik; Yoon, Kyung-A; Bae, Doo-Hwan, 14th Asia Pacific Software Engineering Conference, ASPCE 2007, pp.382 - 389, IEEE, 2007-12-04 |
DES can be Immune to Linear Cryptanalysis Kim, Kwangjo; Lee, S; Park, S; Lee, D, Proceedings of the Workshop on Selected Areas in Cryptography SAC’94, pp.70 - 81, 1994 |
DESA: Decentralized Self-Adaptive Horizontal Autoscaling for Bursts of Load in Fog Computing Park, Eunchan; BAEK, KYEONGDEOK; Cho, Eunho; Ko, In-Young, 3rd International Workshop on Big data driven Edge Cloud Services (BECS 2023) Co-located with the 23rd International Conference on Web Engineering (ICWE 2023), International Conference on Web Engineering, 2023-06-06 |
Description lookup based UPnP extension for wireless sensor networks Sung, J.; Kim, S.H.; Kim, Y.-J.; Kim, Daeyoung, 6th Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MobiQuitous 2009, ICST, 2009-07-13 |
Description technique for component composition focusing on black-box view Lee, JH; Lee, Danhyung, COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3983, pp.994 - 1002, 2006 |
Design alternatives for a scalable web server accelerator Song, Junehwa; Lcvy-Abegnoli, Eric; Iycngar, Awn; Dias, Daniel, Performance Analysis of Systems and Software, 2000. ISPASS. 2000 IEEE International Symposium on , pp.0 - 0, IEEE, 2000-04-01 |
Design and analysis of a fair scheduling algorithm for QoS guarantees in high-speed packet-switched networks Cho, KH; Yoon, Hyunsoo, Proceedings of the 1998 IEEE International Conference on Communications, ICC. Part 3 (of 3), pp.1520 - 1525, IEEE, 1998-06-07 |
Design and analysis of authenticated encryption scheme based on the sponge function = Sponge 함수에 기반한 인증암호화 기법 설계 및 분석link Kim, HakJu; 김학주; et al, 한국과학기술원, 2015 |
Discover