Showing results 4261 to 4320 of 7394
Practical schemes using logs for lightweight recoverable DSM Kim, Youngjae; Park, Soyeon; Maeng, SeungRyoul, Proceedings of the Fifteenth IASTED International Conference on Parallel and Distributed Computing and Systems, v.15, no.2, pp.688 - 693, ACTA Press, 2003-11-03 |
Practical Security Analysis for the Constrained Node Networks: Focusing on the DTLS Protocol Han, Jiyong; Ha, Minkeun; Kim, Daeyoung, The 5th International Conference on Internet of Things (IoT 2015), The 5th International Conference on Internet of Things (IoT 2015), 2015-10-26 |
Practical SVBRDF acquisition of 3D objects with unstructured flash photography Nam, Giljoo; Lee, Joo Ho; Gutierrez, Diego; Kim, Min Hyuk, International Conference on Computer Graphics and Interactive Techniques, SIGGRAPH Asia 2018, pp.1 - 12, Association for Computing Machinery (ACM), 2018-12 |
Practical threshold signatures without random oracles Li, J.; Yuen, T.H.; Kim, Kwangjo, 1st International Conference on Provable Security 2007, ProvSec 2007, v.4784, pp.198 - 207, 2007 |
Practically Tunable Static Analysis Framework for Large-Scale JavaScript Applications (T) Ko, Yoonseok; Lee, Hongki; Dolby, Julian; Ryu, Sukyoung, 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), pp.541 - 551, IEEE Computer Society and ACM SIGSFOT, 2015-11-13 |
Pre-authentication for Fast handoff in Wireless mesh networks including mobile APs Park, C; Hur, J; Kim, C; Shin, Y; Yoon, Hyunsoo, WISA 2006 (International Workshop on Information Security Applications) (LNCS), pp.679 - 693, 2006-08 |
Pre-testing Flash Device Driver through Model Checking Techniques Kim, Moonzoo; Kim, Yunho; Choi, Yunja; Kim, Hotae, IEEE International Conference on Software Testing, Verification and Validation, pp.475 - 484, IEEE, 2008-04-11 |
Pre-training a Neural Model to Overcome Data Scarcity in Relation Extraction from Text Jung, Seokwoo; Myaeng, Sung-Hyon, IEEE International Conference on Big Data and Smart Computing (BigComp), pp.176 - 180, IEEE, 2019-03 |
PreActo: Efficient Cross-Camera Object Tracking System in Video Analytic Edge Computing Nguyen, Thanh Tung; Lee, Dongman; Jang, Si Young; Kostadinov, Boyan, 2022 IEEE International Conference on Pervasive Computing and Communications (PerCom), IEEE, 2023-03-21 |
PreActo: Efficient Cross-Camera Object Tracking System in Video Analytic Edge Computing Nguyen, Thanh-Tung; Lee, Dongman; Jang, SiYoung; Kostadinov, Boyan, 21st IEEE International Conference on Pervasive Computing and Communications, PerCom 2023, pp.101 - 110, IEEE, 2023-03 |
Precise and scalable static analysis of jQuery using a regular expression domain Park, Changhee; Im, Hyeonseung; Ryu, Sukyoung, 12th Symposium on Dynamic Languages, DLS 2016, pp.25 - 36, Association for Computing Machinery, Inc, 2016-11-01 |
Precise Concolic Unit Testing of C Programs Using Extended Units and Symbolic Alarm Filtering Kim, Yunho; Choi, Yunja; Kim, Moonzoo, International Conference on Software Engineering (ICSE), pp.315 - 326, IEEE Computer Society and ACM SIGSOFT, 2018-05-30 |
Predicate-based Caching in Mobile Clients for Continuous Partial Match Queries Chung, Y.D.; Lee, J.Y.; Lee, Yoon Joon; Kim, Myoung Ho, Seventh Int'l Conference on Database Systems for Advanced Applications, pp.158 - 159, IEEE, 2001-04 |
Predicting Emerging Social Conventions in Online Social Networks Kooti, F; Mason, W.A.; Gummadi, K.P.; Cha, Meeyoung, ACM Conference on Information and Knowledge, 2012, ACM, 2012-10 |
Predicting new adopters via socially-aware neural graph collaborative filtering Tsai, Yu-Che; Guan, Muzhi; Li, Cheng-Te; Cha, Meeyoung; Li, Yong; Wang, Yue, 8th International Conference on Computational Data and Social Networks, CSoNet 2019, pp.155 - 162, Springer, 2019-11 |
Predicting Time-bounded Purchases During a Mega Shopping Festival Guan, Muzhi; Cha, Meeyoung; Li, Yong; Wang, Yue; Yu, Jiajie, IEEE International Conference on Big Data and Smart Computing (BigComp), pp.1 - 8, IEEE, 2019-03 |
Prediction Accuracy Evaluation of Domain and Domain Combination Based Prediction Methods for Protein-Protein Interaction Han, Dongsoo; Jang, WH, GIW 2006, v.1, no.2, pp.128 - 133, GIW 2006, 2006-12-18 |
Prediction of C-peptide Like Family Using Multiple Predictive Models and Feature Encodings Kim, Junbeom; Choi, Ho-Jin; Zhang, Yan; Chen, Luonen, 3rd Anuual Translational Bioinformatics Conference, ISCB, 2013-10-02 |
Prediction of prosodic phrase boundaries considering variable speaking rate Kim, Y; Oh, Yung-Hwan, Proceedings of the 1996 International Conference on Spoken Language Processing, ICSLP. Part 1 (of 4), pp.1505 - 1508, ICSLP, 1996-10-03 |
Prediction of RNA Secondary Structures in a Combinatory Categorial Grammar Framework Lee, Heejin; Park, Jong Cheol, International Symposium on Languages in Biology and Medicine, pp.59 - 62, International Symposium on Languages in Biology and Medicine (LBM), 2005-11 |
Prediction-based concurrency control for a large scale networked virtual environment supporting various navigation speeds Lee, Eunhee; Lee, DongMan; Han, Seunghyun; Hyun, SoonJoo, Proceedings of the ACM Symposium on Virtual Reality Software and Technology (VRST 2001), pp.127 - 134, 2001-11-15 |
Predictive Morphological Analysis of Korean Choi, Key-Sun, The 3rd Paci. Rim Int'l Conf. on Arti. Intelli., PRICAI 94, 1994 |
Predictive Power of Public Emotions Extracted from Daily News Articles on Movements of Stock Market Indices Wong, Chayanin; Ko, In Young, 2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI’16), pp.705 - 708, IEEE/WIC/ACM, 2016-10-15 |
Predictive Precharging for Bitline Leakage Energy Reduction Kim, Soontae; Vijaykrishnan, N.; Kandemir, M.; Irwin, M.J., 15th Annual IEEE International ASIC/SOC Conference, 2002. , pp.36 - 40, 2002-09 |
Predictive 관계를 이용한 LL 문법으로의 변환이 가능한 문법들의 특징화 이경옥; 최광무, '92 프로그래밍언어연구회 학술발표논문집 , 한국정보과학회 프로그래밍언어연구회 , 숭실대학교, pp.100 - 112, 1992 |
Prefetching based on the type-level access pattern in object-relational DBMSs Han, W.-S.; Whang, Kyu-Young; Moon, Y.-S.; Song, I.-Y., 17th International Conference on Data Engineering, pp.651 - 660, International Conference on Data Engineering, 2001-04-02 |
Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme Xu, Jun (Jim); Fan, Jinliang; Ammar, Mostafa H; Moon, Sue Bok, 10th IEEE International Conference on Network Protocols (ICNP 2002), pp.280 - 289, IEEE Computer Society, 2002-11 |
Preliminary Design of a Novel Lightweight Authenticated Encryption Scheme based on the Sponge Function Kim, HakJu; Kim, Kwangjo, 10th Asia Joint Conference on Information Security (ASIAJCIS 2015), Chinese Cryptology and Information Security Association, 2015-05-25 |
Preliminary Evaluation of Path-Aware Crossover Operators for Search-Based Test Data Generation for Autonomous Driving Han, Seunghee; Kim, Jaeuk; Kim, Geonmyeong; Cho, Jaemin; Kim, Jiin; Yoo,Shin, 14th IEEE/ACM International Workshop on Search-Based Software Testing, SBST 2021, pp.44 - 47, Institute of Electrical and Electronics Engineers Inc., 2021-05-31 |
Preliminary Evaluation of SWAY in Permutation Decision Space via a Novel Euclidean Embedding Lee, Junghyun; Jung, Chani; Yoo, Shin; Lee, Dongmin; Yoon, Juyeon; Park, Yoo Hwa, 13th International Symposium on Search Based Software Engineering, pp.26 - 40, Springer International Publishing, 2021-10-12 |
Premature ventricular contraction beat detection with deep neural networks Jun, Tae Joon; Park, Hyun Ji; Minh, Nguyen Hoang; Kim, Daeyoung; Kim, Young-Hak, 15th IEEE International Conference on Machine Learning and Applications, ICMLA 2016, pp.859 - 864, Institute of Electrical and Electronics Engineers Inc., 2016-12 |
PREMERE: Meta-Reweighting via Self-Ensembling for Point-of-Interest Recommendation Kim, Minseok; Song, Hwanjun; Kim, Doyoung; Shin, Kijung; Lee, Jae-Gil, 35th AAAI Conference on Artificial Intelligence / 33rd Conference on Innovative Applications of Artificial Intelligence / 11th Symposium on Educational Advances in Artificial Intelligence, pp.4164 - 4171, ASSOC ADVANCEMENT ARTIFICIAL INTELLIGENCE, 2021-02-04 |
Present and Future Domesti Microcomputer Industry 전길남, Proc. of Symposium in Mini/Microcomputer Industry, Korea, pp.59 - 84, 1981 |
Presentation Semantics Split Application Model for Synchronous Collaboration in Ubiquitous Computing Environments Ko, In-Young; Han, Seunghyun; Lee, DongMan, Third Annual Conference on Collaboration Technologies 2007, pp.0 - 0, 2007-07-12 |
PreSPI: design and implementation of protein-protein interaction prediction service system. Han, Dongsoo; Kim, H.S.; Jang, W.H.; Lee, S.D.; Suh, J.K., Genome informatics series : proceedings of the ... Workshop on Genome Informatics. Workshop on Genome Informatics., v.15, no.2, pp.171 - 180, Genome Informatics, 2004 |
PreSPI: Prediction System for Protein Interaction Jang, WH; Lee, CO; Han, DS, GIW 2006, GIW, 2006-12-18 |
PreSPI: 단백질 상호작용 예측 서비스 시스템 설계 및 구현 한동수; 김홍숙; 장우혁; 이성독, 한국생물정보학회 2004년 연례학술대회, pp.0 - 0, 한국생물정보시스템생물학회, 2004-11 |
Pressure-Based Menu Selection on a Spherical Tangible Device KIM, SUNBUM; Kim, Youngin; Lee, Geehyuk, 2024 CHI Conference on Human Factors in Computing Sytems, CHI EA 2024, Association for Computing Machinery, 2024-05-11 |
Preventing Abuse of Cookies Stolen by XSS Takahashi, Hiroya; Yasunaga, Kenji; Mambo, Masahiro; Kim, Kwang-Jo; Youm, Heung Youl, AsiaJCIS, KIISC and KISA, 2013-07-25 |
Preventing SIM Box Fraud Using Device Fingerprinting Oh, BeomSeok; Ahn, Junho; Bae, Sangwook; Son, Mincheol; Lee, Yonghwa; Kang, Min Suk; Kim, Yongdae, 2023 Network and Distributed System Security Symposium (NDSS), Internet Society, 2023-03-01 |
Preventing social engineering in ubiquitous environment Nyamsuren, Enkhbold; Choi, Ho-Jin, 2007 International Conference on Future Generation Communication and Networking, FGCN 2007, v.2, pp.573 - 577, 2007-12-06 |
Prey on Lizard: Mining Secret Key on Lattice-based Cryptosystem Han, Seongho; Choi, Nakjun; An, Hyeongcheol; Choi, Rakyong; Kim, Kwangjo, 2018 Symposium on Cryptography and Information Security (SCIS 2018), IEICE Technical Committee on Information Security, 2018-01-25 |
Pride and Prejudice in Progressive Web Apps: Abusing Native App-like Features in Web Applications Lee, Jiyeon; Kim, Hayeon; Park,Junghwan; Shin, Insik; Son, Sooel, 25th ACM Conference on Computer and Communications Security, CCS 2018, pp.1731 - 1746, Association for Computing Machinery, 2018-10-18 |
PRIMO: A Full-Stack Processing-in-DRAM Emulation Framework for Machine Learning Workloads Heo, Jaehoon; Shin, Yongwon; Choi, Sangjin; Yune, Sungwoong; Kim, Jung-Hoon; Sung, Hyojin; Kwon, Youngjin; et al, IEEE/ACM International Conference on Computer-Aided Design (ICCAD), IEEE/ACM, 2023-11-01 |
Principal elements for visualizing event sequence data applied to 3D cascading diagrams Oh, Youngju; Kim, Seok-Yeol; Park, Jinah, 2017 IEEE International Conference on Big Data and Smart Computing, BigComp 2017, pp.59 - 63, Institute of Electrical and Electronics Engineers Inc., 2017-02-14 |
Prioritizing Browser Environments for Web Application Test Execution Kwon, Jung-Hyun; Ko, In-Young; Rothermel, Gregg, International Conference on Software Engineering, pp.468 - 479, IEEE/ACM, 2018-06-01 |
Priority Adversarial Example in Evasion Attack on Multiple Deep Neural Networks Kwon, Hyun; Yoon, Hyunsoo; Choi, Daeseon, The First International Conference on Artificial Intelligence in information and communication (ICAIIC 2019), pp.399 - 404, The Korean Institute of Communications and Information Sciences, 2019-02-13 |
Priority-based View Synchronization for Group Editing over Wired and Wireless Networks Cho, E; Choi, M; Kang, K; Lee, DongMan, ICOIN 2003, pp.707 - 716, 2003-02 |
PRISM: A System for Weighted Multi-Color Browsing of Fashion Products Yoon, Sung-Eui; Kweon, In-So; Yoo, Donggeun; Paeng, Kyunghyun; Park, Sunggyun; Lee, Jungin; Paek, Seungwook, International World Wide Web, International World Wide Web Conference Committee, 2014-04-08 |
Prison Yard 문제의 NP - completeness 증명 최승학; 좌경룡; 신성용, Proc. KISS Annual Conferene, pp.763 - 766, 한국정보과학회, 1991-01-01 |
Privacy Challenges in Online Social Network Lin, Jia-Hua; Kim, Kwangjo, CISC-W'13, v.0, 한국정보보호학회, 2013-12-06 |
Privacy Concerns of Digital Phenotyping for Older Adults with Mental Health Issues Lee, Hyunsoo; Lee, Uichin, ACM CHI Workshop, Association for Computing Machinery (ACM), 2020-04-25 |
Privacy of DNS-over-HTTPS: Requiem for a Dream? Csikor, Levente; Singh, Himanshu; Kang, Min Suk; Divakaran, Dinil Mon, IEEE European Symposium on Security and Privacy (EuroS&P), pp.252 - 271, IEEE European Symposium on Security and Privacy, 2021-09-06 |
Privacy Preserving Mutual Authentication Protocol for Low-cost RFID 양정규; Ren, K; 최수길; 김광조, 2004년도 한국정보보호학회 충청지부학술대회, pp.0 - 0, Korea Institute of Information Security & Cryptology, 2004-10 |
Private PlanetLab Korea 운영 및 발전 방안 박천종; 장건; 문수복, 2009 한국정보과학회 추계 학술대회, v.36, no.2, 한국정보과학회, 2009 |
Proactive Web Caching with Cumulative Prefetching for Large Multimedia Data Jung, J.; Lee, DongMan; Chon, Kil Nam, 9th International world wide web conference, 2000-05 |
Probabilistic framework for combining multiple classifiers at abstract level Kang, HJ; Kim, JinHyung, Proceedings of the 1997 4th International Conference on Document Analysis and Recognition, ICDAR. Part 2 (of 2), pp.870 - 874, ICDAR, 1997-08-18 |
Probabilistic Language Model for Analyzing Korean Sentences Kim, Gil Chang, Proceedings of International Conference on Computer Processing of Oriental Languages, pp.392 - 395, 1997 |
Probabilistic Parsing of Korean Sentences using Collocational Information Kim, Gil Chang, Proceedings of Natural Language Processing Pacific Rim Symposium(NLPRS), 1997 |
Probabilistic Programs with Stochastic Conditioning Tolpin, David; Zhou, Yuan; Rainforth, Tom; 양홍석, The 38th International Conference on Machine Learning (ICML 2021), pp.10312 - 10323, ICML Organisation, 2021-07-21 |
Discover