Browse "School of Computing(전산학부)" by Title 

Showing results 4901 to 4920 of 15971

4901
Exploiting bandwidth temporal loads for low latency and high bandwidth memory

Kim, Soontae; Vijaykrishnan, N; Kandemir, M; Irwin, MJ, IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, v.152, no.4, pp.457 - 466, 2005-07

4902
Exploiting external data for training a cancer clause classifier

Nam, Sangsu; Myaeng, Sung Hyon, 2013 IEEE International Conference on Healthcare Informatics (ICHI), pp.439 - 446, IEEE, 2013-09-11

4903
Exploiting ILP, TLP, and DLP with the Polymorphous TRIPS Architecture

Sankaralingam, Karthikeyan; Nagarajan, Ramadass; Liu, Haiming; Kim, Changkyu; Huh, Jaehyuk; Burger, Doug; Keckler, Stephen W.; et al, Computer Architecture, 2003. Proceedings. 30th Annual International Symposium on, pp.422 - 433, 2003-06

4904
Exploiting Inter-block Entropy to Enhance the Compressibility of Blocks with Diverse Data

kim, Jinkwon; Kang, Mincheol; Hong, Jeongkyu; Kim, Soontae, 28th Annual IEEE International Symposium on High-Performance Computer Architecture (HPCA), pp.1100 - 1114, IEEE COMPUTER SOC, 2022-04

4905
Exploiting Internal Parallelism of Flash-based SSDs

Park, Seon-yeong; Seo, Euiseong; Shin, Ji-Yong; Maeng, SeungRyoul; Lee, Joonwon, IEEE COMPUTER ARCHITECTURE LETTERS, v.9, no.1, pp.9 - 12, 2010

4906
Exploiting Missing Value Patterns for a Backdoor Attack on Machine Learning Models of Electronic Health Records: Development and Validation Study

Joe, Byunggill; Park, Yonghyeon; Hamm, Jihun; Shin, Insik; Lee, Jiyeon, JMIR MEDICAL INFORMATICS, v.10, no.8, 2022-08

4907
Exploiting mutant’s relationship with code, faults, and patches for higher efficacy of mutation analysis = 뮤테이션 기법의 효용성 향상을 위한 뮤턴트와 코드, 결함, 패치 사이의 관계 분석link

Kim, Jinhan; Yoo, Shin; et al, 한국과학기술원, 2023

4908
Exploiting Mutual Awareness between Prefetchers and On-chip Networks in Multi-cores

Lee, Junghoon; Shin, Minjeong; Kim, Hanjoon; Kim, John; Huh, Jaehyuk, Parallel Architectures and Compilation Techniques - Conference Proceedings, PACT, pp.177 - 178, Institute of Electrical and Electronics Engineers, 2011-10

4909
Exploiting Numerical-Contextual Knowledge to Improve Numerical Reasoning in Question Answering

Kim, Jeonghwan; Kang, Junmo; Kim, Kyung-Min; Hong, Giwon; Myaeng, Sung-Hyon, The 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, pp.1811 - 1821, Association for Computational Linguistics (ACL), 2022-07

4910
Exploiting numerical-contextual knowledge to improve numerical reasoning over text in question answering = 수치-문맥 정보를 활용한 질의응답 환경 내에서의 수치 추론 능력 개선link

Kim, Jeonghwan; Myaeng, Sung Hyon; et al, 한국과학기술원, 2022

4911
Exploiting Same Tag Bits to Improve the Reliability of the Cache Memories

Hong, Jeongkyu; Kim, Jesung; Kim, Soon-Tae, IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, v.23, no.2, pp.254 - 265, 2015-02

4912
Exploiting Scene Depth for Object Detection with Multimodal Transformers

Song, Hwanjun; Kim, Eunyoung; Jampan, Varun; Sun, Deqing; Lee, Jae-Gil; Yang, Ming-Hsuan, 32nd British Machine Vision Conference, pp.1 - 14, British Machine Vision Association (BMVA), 2021-11-24

4913
Exploiting symmetries in POMDPs for point-based algorithms

Kim, Kee-Eung, 23rd AAAI Conference on Artificial Intelligence and the 20th Innovative Applications of Artificial Intelligence Conference, AAAI-08/IAAI-08, pp.1043 - 1048, 2008-07-13

4914
EXPLOITING TEMPORAL LOCALITY FOR ENERGY EFFICIENT MEMORY MANAGEMENT

Seo, E; Maeng, SeungRyoul; Lim, D; Lee, Joonwon, JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, v.17, no.5, pp.929 - 941, 2008-10

4915
Exploiting the Inherent Parallelisms of Back-Propagation Neural Networks to Design a Systolic Array

Chung, Jai-Hoon; Yoon, Hyunsoo; Maeng, Seung Ryooul, Neural Networks, 1991. 1991 IEEE International Joint Conference on, pp.2204-2209, 1991-11

4916
Exploiting the inherent parallelisms of back-propagation neural networks to design a systolic array

Chung, Jai-Hoon; Yoon, Hyunsoo; Maeng, SeungRyoul, Proceedings of International Joint Conference on Neural Networks, IJCNN'91, 1991-11-18

4917
Exploiting the Unicast Functionality of the On-Demand Multicast Routing Protocol

Lee, Sung-Ju; Su, William; Gerla, Mario, The IEEE Wireless Communications & Networking Conference (WCNC 2000), IEEE, 2000-09-23

4918
Exploiting Triangle Patterns for Heterogeneous Graph Attention Network

Yi, Eunjeong; Kim, Min-Soo, 21st International Conference on Web Engineering, ICWE 2021, pp.71 - 81, Springer Science and Business Media Deutschland GmbH, 2021-05

4919
Exploiting trustors as well as trustees in trust-based recommendation

Hwang, Won-Seok; Li, Shaoyu; Kim, Sang-Wook; Choi, Ho-Jin, 22nd ACM International Conference on Conference on information & knowledge management, pp.1893 - 1896, ACM, 2013-10-29

4920
Exploiting underutilized runtime bad blocks for improving solid state drive performance = SSD 성능 개선을 위한 저활용된 런타임 배드 블록 이용 기법link

Moon, Junoh; Kim, Soontae; et al, 한국과학기술원, 2022

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0