Showing results 801 to 820 of 4162
Chameleon hashing without key exposure Chen, Xiaofeng; Zhang, Fangguo; Kim, Kwangjo, INFORMATION SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3225, pp.87 - 98, 2004 |
Channel-quality-aware multihop broadcast for asynchronous multi-channel wireless sensor networks Jang, Ingook; Pyeon, Dohoo; Yoon, Hyunsoo; Kim, Dongwook, WIRELESS NETWORKS, v.22, no.7, pp.2143 - 2158, 2016-10 |
Chaotic time series prediction using a novel Echo State Network model with Inputs Reconstruction, Bayesian Ridge Regression, and Independent Component Analysis Nguyen, Hoang Min; Kalra, Gaurav; Jun, Taejoon; Kim, Daeyoung, INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, v.34, no.6, pp.1 - 19, 2020-06 |
Characterization for high dynamic range imaging Kim, Min Hyuk; Kautz, Jan, COMPUTER GRAPHICS FORUM, v.27, no.2, pp.691 - 697, 2008-04 |
Characterization of unknown values with implicit predicate Yang, Jae Dong; Lee, Yoon Joon, DECISION SUPPORT SYSTEMS, v.7, no.2, pp.133 - 144, 1991-05 |
CHARACTERIZING AND RECOGNIZING THE VISIBILITY GRAPH OF A FUNNEL-SHAPED POLYGON CHOI, SH; Shin, Sung-Yong; Chwa, Kyung Yong, ALGORITHMICA, v.14, no.1, pp.27 - 51, 1995-07 |
CHARACTERIZING AND RECOGNIZING VISIBILITY GRAPHS OF FUNNEL-SHAPED POLYGONS Chwa, Kyung-Yong; CHOI, SH; SHIN, SY, LECTURE NOTES IN COMPUTER SCIENCE, v.650, pp.219 - 228, 1992 |
Characterizing user navigation and interactions in online social networks Benevenuto, Fabricio; Rodrigues, Tiago; Cha, Meeyoung; Almeida, Virgilio, INFORMATION SCIENCES, v.195, pp.1 - 24, 2012-07 |
Chosen ciphertext secure authenticated group communication using identity-based signcryption Hur, Jun-Beom; Park, Chan-Il; Yoon, Hyun-Soo, COMPUTERS & MATHEMATICS WITH APPLICATIONS, v.60, pp.362 - 375, 2010-07 |
Chosen ciphertext secure authenticated group communication using identity-based signcryption Hur, Junbeom; Park, Chanil; Yoon, Hyunsoo, Computers & Mathematics with Applications, 2010-01-01 |
ChronoGraph: Enabling Temporal Graph Traversals for Efficient Information Diffusion Analysis over Time Byun, Jaewook; Woo, Sungpil; Kim, Daeyoung, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, v.32, no.3, pp.424 - 437, 2020-03 |
CID: Co-Architecting Instruction Cache and Decompression System for Embedded Systems Kim, Jinkwon; Hong, Seokin; Hong, Jeongkyu; Kim, Soontae, IEEE TRANSACTIONS ON COMPUTERS, v.70, no.7, pp.1132 - 1145, 2021-07 |
CIGMA : aCtive Inventory service in Global e-Market 김수면; 강승우; 이흥규; 송준화, 한국정보과학회지, v.20, no.9, pp.46 - 54, 2002-09 |
CIGMA: Active inventory service in global E-market based on efficient catalog management Kim, SM; Kang, SW; Lee, Heung-Kyu; Song, Junehwa, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E88D, no.12, pp.2651 - 2663, 2005-12 |
CIGMA: aCtive Inventory service in Global e-MArket based on High Performance Catalog DB Caching Kim, Myeon Su; Kang, Seung Woo; Lee, Heung Kyu; Song, June Hwa, 8th Annual ACM Sym. On Applied Computing, pp. 653-658, 2003-03 |
CIGMA: aCtive Inventory service in Global e-MArket for enabling one-stop shopping over Internet shopping sites Kim, Su Myeon; Kang, Seungwoo; Lee, Heung-Kyu; Song, Junehwa, Third International Symposium on Electronic Commerce, pp.65-73, 2002 |
CIH바이러스 분석 및 대책 황규범; 김광조; 안철수, 통신정보보호학회논문지, v.9, no.4, pp.49 - 59, 1999-12 |
Ciphertext Secure Authenticated Group Communication Using Identity-based Signcryption Hur, Junbeom; Park, Chanil; Yoon, Hyunsoo, Computers & Mathematics with Applications, Vol.60, pp.362-375, 2010-07 |
CISS: An efficient object clustering framework for DHT-based peer-to-peer applications Lee, Jinwon; Lee, Hyonik; Kang, Seungwoo; Kim, Su Myeon; Song, J, COMPUTER NETWORKS, v.51, no.4, pp.1072 - 1094, 2007-03 |
City Radio Map Construction for Wi-Fi-Based Citywide Indoor Positioning Han, Dongsoo; Sahar, Ayesha; Berkner, Joseph; Lee, Gunwoo, IEEE ACCESS, v.7, pp.99867 - 99877, 2019-07 |
Discover