Showing results 5241 to 5260 of 7391
The AttNet Model : A Petri Net Based Language for Modeling Distributed Software Process Kwon, Yong Rae, Proc. InfoScience '93, pp.121 - 121, 1993 |
The balloon popping problem revisited: Lower and upper bounds Jung H.; Chwa, Kyung Yong, 2nd International Symposium on Algorithmic Game Theory, SAGT 2009, pp.147 - 158, 2009-10-18 |
The Beta-Bernoulli process and algebraic effects Staton, Sam; Stein, Dario; Yang, Hongseok; Ackerman, Nathanael L.; Freer, Cameron E.; Roy, Daniel M., The 45th International Colloquium on Automata, Languages, and Programming, ICALP 2018, pp.141:1 - 141:15, European Association for Theoretical Computer Science (EATCS), 2018-07-10 |
The Bifurcating Neuron Network 3 Choi, Jinhyuk; Lee, Geehyuk, International Joint Conference on Neural Networks, IJCNN 2005, v.4, pp.2184 - 2189, 2005-07-31 |
The Bifurcating Neuron Network 3 As Coloring Problem Solver and N-ary Associative Memory Choi, Jinhyuk; Lee, Geehyuk, International Conference of Neural Information Processing, pp.437 - 446, Springer, 2006-10-03 |
The ChatBot Feels You - A Counseling Service Using Emotional Response Generation Lee, Dongkeon; Oh, Kyo-Joong; Choi, Ho-Jin, IEEE International Conference on Big Data and Smart Computing (BigComp), pp.437 - 440, Institute of Electrical and Electronics Engineers Inc., 2017-02-13 |
The class-level mutants of MuJava Offutt J.; Ma Y.-S.; Kwon, Yong Rae, 1st International Workshop on Automation of Software Test, AST'06, Co-located with the 28th International Conference on Software Engineering, ICSE 2009, pp.78 - 84, 2006-05-20 |
The Clustering Property of Corner Transformation for Spatial Databases Song, J; Whang, Kyu-Young; Lee, Y; Kim, S, pp.0 - 0, 1999-10-25 |
The COCOMO II Suite Baik, Jongmoon, ISPA1999, ISPA, 1999-06 |
The collision security of tandem-DM in the ideal cipher model Lee, Jooyoung; Stam, Martijn; Steinberger, John, 31st Annual International Cryptology Conference, CRYPTO 2011, pp.561 - 577, International Association for Cryptologic Research (IACR), 2011-08-14 |
The Conflict Between Explainable and Accountable Decision-Making Algorithms Lima, Gabriel; Grgić-Hlača, Nina; Jeong, Jin Keun; Cha, Meeyoung, 5th ACM Conference on Fairness, Accountability, and Transparency, FAccT 2022, pp.2103 - 2113, Association for Computing Machinery, 2022-06-23 |
The Cost of Bounded Curvature Kim, Hyo-Sil; Cheong, Otfried, 18th Annual International Conference on Computing and Combinatorics (COCOON), pp.252 - 263, COCOON, 2012-08-20 |
The Cyclic Banyan Network : A Fault Toerlant Multistage Interconnection Network with the Fully-Adaptive Self-routing Park, J.; Yoon, Hyunsoo; Lee, H., Seventh IEEE Symposium on Parallel and Distributed Computing, pp.702 - 710, 1995 |
The Delaunay tetrahedralization from Delaunay triangulated surfaces. Choi, Sunghee, SCG '02 Proceedings of the eighteenth annual symposium on Computational geometry , pp.145 - 150, 2002-06-01 |
The Design of a Grid-enabled Information Integration System Based on Mediator/Wrapper Architectures Song, J; Yoo, S; Park, CS; Choi, DH; Lee, Yoon Joon, The 2006 International Conference on Grid Computing & Applications, pp.114 - 120, CSREA Press, 2006-06 |
The Design of a New Virtualization-based Server Cluster System Targeting for Ubiquitous Computing Applications Yoon, Hyunsoo; Lim, Jung Min, The 2nd FTRA International Conference on Ubiquitous Computing Application and Wireless Sensor Network (UCAWSN-14), FTRA, 2014-07-08 |
The Design of a Policy-based Attack-Resilient Intrusion Tolerant System Lim, Jungmin; Shin, Yongjoo; Doo, Seokjoo; Yoon, Hyunsoo, The 10th FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2013), pp.435 - 443, FTRA, 2013-07-08 |
The Design of a Robust Intrusion Tolerance System through Advanced Adaptive Cluster Transformation and Vulnerability-based VM Selection Lim, Jungmin; Doo, Seokjoo; Yoon, Hyunsoo, Military Communications Conference (MILCOM 2013), pp.1422 - 1428, IEEE(Communications Society), 2013-11-19 |
The Design of Adaptive Intrusion Tolerant System(ITS) based on Historical Data Kim, Yongki; Lim, Jungmin; Doo, Seokjuu; Yoon, Hyunsoo, The 7th International Conference for Internet Technology and Secured Transactions (ICITST-2012), IEEE, 2012-12-10 |
The Design Principles of Object-Oriented VRML Park, Sungwoo; Han, Taisook, Object-Orientation Workshop in VRML 98, 1998 |
Discover