Showing results 721 to 780 of 7391
ADSR: Angle-based Multi-Hop Routing Strategy for Mobile Wireless Sensor Networks Kim Soontae; Shin Kwangcheol; Kim Kyungjun, Asia-Pacific Services Computing Conference, IEEE, 2011-12-14 |
Advances in knowledge discovery and data mining: 21st Pacific-Asia conference, PAKDD 2017 Jeju, South Korea, may 23–26, 2017 proceedings, part II Kim, Jinho; Shim, Kyuseok; Cao, Longbing; Lee, Jae-Gil; Lin, Xuemin; Moon, Yang-Sae, 21st Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2017, Springer Verlag, 2017-05 |
Adversarial defense via learning to generate diverse attacks Jang, Yunseok; Zhao, Tianchen; Hong, Seunghoon; Lee, Honglak, 17th IEEE/CVF International Conference on Computer Vision, ICCV 2019, pp.2740 - 2749, Institute of Electrical and Electronics Engineers Inc., 2019-10-29 |
Adversarial Imitation Learning with Trajectorial Augmentation and Correction Antotsiou, Dafni; Ciliberto, Carlo; Kim, Tae-Kyun, 2021 IEEE International Conference on Robotics and Automation (ICRA), IEEE Robotics & Automation Society, 2021-06-03 |
AEG: Automatic Exploit Generation Avgerinos, Thanassis; Cha, Sang Kil; Lim, Brent; Brumley, David, Network and Distributed System Security Symposium, Internet Society, 2011-02-06 |
AERIAL: Ad hoc Entity-Relationship Investigation and Learning Burns, L.M; Malhotra, A; Sockut, G; Whang, Kyu-Young, Int’l Conf. on Systems, Man, and Cybernetics, IEEE, 1991-10 |
AES에 대한 DPA 대응방안 개선 장화선; 김광조, 2003년도 한국정보보호학회 충청지부학술대회, pp.3 - 10, 한국정보보호학회, 2003-08-22 |
AES에 대한 오류기반 공격 장화선; 김광조, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.138 - 141, 한국정보보호학회, 2003-07-04 |
Affect-driven Robot Behavior Learning System using EEG Signals for Less Negative Feelings and More Positive Outcomes Kim, Byung Hyung; Kwak, Ji Ho; Kim, Minuk; Jo, Sung-Ho, IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), pp.4162 - 4167, IEEE RAS, 2021-09-30 |
Affective Communication System with Multimodality and Its Application to a Humanoid Robot, AMI Yang, Hyun-Seung; Seo, YH; Jeong, IW; Jung, HW, 10th International Conference on Virtual Systems and Multimedia, pp.889 - 898, 2004 |
Affective communication system with multimodality for a humanoid robot, AMI Jung, H.-W.; Seo, Y.-H.; Ryoo, M. S.; Yang, Hyun-Seung, 2004 4th IEEE-RAS International Conference on Humanoid Robots, v.2, pp.690 - 705, 2004-11-10 |
AffecTV : 생체신호 분석을 통한 TV시청자 선호도 추론 이승환; 최진혁; 이기혁; 이한규, 한국 HCI학회, pp.559 - 564, 2006-02-01 |
AFLOG- A New Computational Model for A Functional Logic Language 조정완, 인공지능 학술발표회, 1987 |
Agamotto: Accelerating kernel driver fuzzing with lightweight virtual machine checkpoints Song, Dokyung; Hetzelt, Felicitas; JONGHWAN, KIM; Kang, Brent Byunghoon; Seifert, Jean-Pierre; Franz, Michael, 29th USENIX Security Symposium, pp.2541 - 2557, USENIX Association, 2020-08-12 |
AGAMOTTO: How Persistent is your Persistent Memory Application? Neal, Ian; Reeves, Ben; Stoler, Ben; Quinn, Andrew; Kwon, Youngjin; Peter, Simon; Kasikci, Baris, 14th USENIX Symposium on Operating Systems Design and Implementation, USENIX OSDI 2020, pp.1047 - 1064, USENIX Association, 2020-11-06 |
Agenda Diversity in Social Media Discourse: A Study of the 2012 Korean General Election Park, Souneil; Ko, Minsam; Lee, Jaeung; Song, Junehwa, The 7th International AAAI Conference on Weblogs and Social Media, pp.486 - 495, Association for the Advancement of Artificial Intelligence, 2013-07-10 |
Agent-based flexible videoconference system with automatic QoS parameter tuning Lee, S.; Kang, S.; Han, Dongsoo, 9th Pacific Rim International Conference on Artificial Intelligence, pp.51 - 60, 2006-08-07 |
Aggregate proxy signature and verifiably encrypted proxy signature Li, J.; Kim, Kwangjo; Zhang, F.; Chen, X., 1st International Conference on Provable Security 2007, ProvSec 2007, pp.208 - 217, Springer Verlag (Germany), 2007-11-01 |
AGILE Rate Control for IEEE 802.11 Networks Verma, Lochan; Kim, Seongkwan; Choi, Sunghyun; Lee, Sung-Ju, The Annual International Conference on Future Generation Communication and Networking (FGCN 2009), IEEE, 2009-12-10 |
Ahead of Time Mutation Based Fault Localisation using Statistical Inference Kim, Jinhan; An, Gabin; Feldt, Robert; Yoo, Shin, 2021 IEEE 32nd International Symposium on Software Reliability Engineering, ISSRE 2021, pp.253 - 263, IEEE, 2021-10-28 |
AHPL 하드웨어 시뮬레이터 조정완, KISS Conference, 1984 |
AI as Cognitive Science 김진형, Korean Cognitive Science Conference, 1988 |
AI Net 전길남, Proc. of KISS, 1985 |
Aiding the Earth System Models with Super Resolution Deep Learning Mai, Tung-Duong; 박성원; Singh, Karandeep; Nellikkattil, Arjun Babu; Lee, Sun-Seon; Timmermann, Axel; 차미영, 2021 한국소프트웨어종합학술대회, 한국정보과학회, 2021-12-22 |
AIM: Symmetric Primitive for Shorter Signatures with Stronger Security Kim, Seongkwang; Ha, Jincheol; Lee, Jooyoung, ACM CCS 2023 : ACM Conference on Computer and Communications Security, ACM (Association for Computing Machinery), 2023-11-27 |
AIMS: Rule기반 지식관리 시스템 박인석; 김영승; 조은석; 현순주, KDBC 2001, v.17, no.2, pp.39 - 47, 2001-06-01 |
AIS 데이터를 활용한 선박 궤적의 주기적 패턴 마이닝 나지혜; 강준혁; 배민영; 남영은; 이재길, 2021년 한국소프트웨어종합학술대회, pp.111 - 113, 한국정보과학회, 2021-12-21 |
AlertVision: Visualizing Security Alerts Hong, Jina; Lee, JinKi; Lee, HyunKyu; Chang, YoonHa; Choi, KwangHo; Cha, Sang Kil, 19th World International Conference on Information Security and Applications (WISA), pp.173 - 184, Korea Institute of Information Security and Cryptology, 2018-08-24 |
ALFReD: 재귀적 설계를 위한 구조기술언어 최윤석; 강성원, 제 6회 한국소프트웨어공학 학술대회, pp.0 - 0, 2009-09-21 |
Algebraic Specification-based Testing Kwon, Yong Rae, Proc. Joint Conference on Software Engineering '92, pp.293 -, 1992 |
AlgoPlan: Supporting Planning in Algorithmic Problem-Solving with Subgoal Diagrams Choi, Kabdo; Chen, Sally; Shin, Hyungyu; Son, Jinho; Kim, Juho, 7th Annual ACM Conference on Learning at Scale, L@S 2020, pp.389 - 392, Association for Computing Machinery, 2020-08-13 |
Algorithm Recognition using Flow Graph Transformation Kim, S. K.; Hahn , S. H.; Kim, JinHyung, the 3rd Pacific Rim International Conference on Artificial Intelligence, v.0, no.0, pp.0 - 0, Proceedings of the 3rd Pacific Rim International Conference on Artificial Intelligence, 1994-08 |
Algorithm-driven news outcomes on political knowledge and MeToo-related rumor beliefs. Chin, Hyojin; Bae, Suyeong; Cha, Meeyoung, BIEN 2021, The Association of Korean Woman Scientists and Engineers (KWSE), 2021-08-20 |
Algorithms for Intersections of Simple Polygons 좌경룡, In Proc. of KISS Conf., pp.13 - 26, 1983 |
Algorithms for Locating Two Lights to Illuminate the Interior of a Convex Polygon Chwa Kyung Yong, Proc.KISS Conf., pp.532 - 534, 1997-01-01 |
Algortihms for Drawing Binary Trees in the Plane 좌경룡, In Proc. of KISS Conf., pp.699 - 702, 1997 |
AlgoSolve: Supporting Subgoal Learning in Algorithmic Problem-Solving with Learnersourced Microtasks Choi, Kabdo; Shin, Hyungyu; Xia, Meng; Kim, Juho, 2022 CHI Conference on Human Factors in Computing Systems, CHI 2022, Association for Computing Machinery, 2022-05-04 |
Alias Analysis of Pointer References of Block Structured Languages : Practical Interprocedural Analysis Han, Dongsoo, 정보 과학회 병렬시스템 연구회, 정보과학회, 1998-04 |
Aligning a Parallel Korean-English Corpus at the Word and Phrase Level Choi, Key-Sun; Shin, JH, Natural Language Proc. Pacific Rim Symposium, pp.223 - 227, 1995 |
Aligning Open IE Relations and KB Relations using a Siamese Network Based on Word Embedding Putri, Rifki Afina; Hong, Giwon; Myaeng, Sung-Hyon, IWCS 2019 : 13th International Conference on Computational Semantics (IWCS), pp.142 - 153, Association for Computational Linguistics, 2019-05 |
All about activity injection: Threats, semantics, and detection Lee, Sungho; Hwang, Sungjae; Ryu, Sukyoung, 32nd IEEE/ACM International Conference on Automated Software Engineering, ASE 2017, pp.252 - 262, Institute of Electrical and Electronics Engineers Inc., 2017-11-03 |
All about the with Statement in JavaScript: Removing with Statements in JavaScript Applications Park, Changhee; Lee, Hongki; Ryu, Sukyoung, Dynamic Language Symposium, pp.73 - 84, ACM, 2013-10-28 |
Almost Tight Upper Bound for Finding Fourier Coefficients of Bounded Pseudo-Boolean Functions Choi, Sung-soon; Jung, Kyomin; Kim, Jeong Han, 21st Annual Conference on Learning Theory - COLT 2008, 2008 , pp.123 - 134, COLT, 2008-07 |
Alpha-Partitioning Algorithm: Vertical Partitioning Based on Fuzzy Graph Son, J.H.; Kim, Myoung Ho, The Twelfth Int'l Conference on Database and Expert Systems Applications, pp.538 - 546, DEXA, 2001-09 |
Alternative Modeling Scheme for Interactive Volume Deformation Park, Jinah; Hong, K.W., The Korea-Germany Joint Workshop on Advanced Medical Image Processing, 2002 |
AMONET: A Method for Detecting and Mitigating the Data Rate Degradation Due to Interference Over Wireless Networks Lan, Guohao; Han, Sang Yup; Lee, Il Gu; Kim, Myung Chul, IFIP Networking 2016, IFIP Technical Committee on Communication Systems (TC6), 2016-05-18 |
Amortised deep parameter optimisation of GPGPU work group size for OpenCV Sohn, Jeong Ju; Lee, Seongmin; Yoo, Shin, 8th International Symposium on Search Based Software Engineering, SSBSE 2016, pp.211 - 217, Springer Verlag, 2016-10 |
Amortised Optimisation of Non-functional Properties in Production Environments Sohn, Jeongju; Yoo, Shin, International Symposium on Search Based Software Engineering, University of Michigan, 2016-08-09 |
AMOS-메뉴 방식에 의거한 객체지향 데이타베이스 스키마 디자이너 우균; 박종목; 심재균; 황규영, 한국정보과학회 추계학술대회, pp.211 - 213, 한국정보과학회, 1993-10 |
An Abstract Machine for the Parallel Execution of Logic Program 조정완, Proceedings of KISS Conference, pp.135 - 138, 1987 |
An Abstraction Mechanism of Component Constraints in Dynamic Software Architecture Bang, Jeong Wook; Ko, In-Young; Baik, Jongmoon; Choi, Ho-Jin, Proceedings of the First International Workshop on Evaluation of Novel Approaches to Software Engineering (ENASE'06), pp.111 - 118, ENASE, 2006-09-01 |
An Accelerated Learning Method with Backpropagation Cho, S. B.; Kim, JinHyung, IEEE International Joint Conference on Neural Networks, Washington, D.C, pp.605 - 608, 1990-01 |
An Access Control Method for XML Data Based on Relational Model Jeon, J.M.; Kim, Myoung Ho; Lee, Yoon Joon, KDBC, pp.71 - 78, KDBC, 2003-05 |
An Accurate Lecture Video Segmentation Method by Using SIFT and Adaptive Threshold Jung, Hyun Ji; Kim, Tak-Eun; Kim, Myoung Ho, MoMM 2012, The 10th International Conference on Advances in Mobile Computing & Multimedia, pp.285 - 288, ACM, 2012-12 |
An Activity-Embedding Approach for Next-Activity Prediction in a Multi-User Smart Space Kim, Younggi; An, Ji Hoon; Lee, Minseok; Lee, Young-Hee, 2017 IEEE International Conference on Smart Computing, SMARTCOMP 2017, Institute of Electrical and Electronics Engineers Inc., 2017-05 |
An adaptable application offloading scheme based on application behavior Canepa, H.G.; Lee, DongMan, 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008, pp.387 - 392, 2008-03-25 |
An Adaptable Question-Answer System Using Match of Multi-Sphere Knowledge Kim, Su-Kyoung; Ahn, Ki-Hong; Choi, Ho-Jin, 11th International Conference on Advanced Communication Technology (ICACT2009), v.3, pp.2219 - 2224, ICACT, 2009-02-15 |
An adapter chaining scheme for service continuity in ubiquitous environments with adapter evaluation Kim, B.; Lee, K.; Lee, DongMan, 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008, pp.537 - 542, 2008-03-17 |
An Adaptive and Fault-Tolerant Gateway Assignment in Sensor Networks Su, William W.; Lee, Sung-Ju, The First IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2004), IEEE, 2004-10-26 |
An Adaptive Augmented Reality Interface for Hand based on Probabilistic Approach Jung, Jin Ki; Lee, Hyeop Woo; Yang, Hyun Seung, The 14th IEEE International Symposium on Mixed and Augmented Reality, IEEE Computer Society Visualization and Graphics Technical Committee, 2015-09-30 |
Discover