Browse "School of Computing(전산학부)" byTitle

Showing results 7841 to 7860 of 14625

7841
Property-based theorem proving and template-based fault tree analysis of NuSCR requirements specification = NuSCR 요구 명세의 속성 기반 정리 증명과 템플릿 기반 고장 수목 분석link

Kim, Tae-Ho; 김태호; et al, 한국과학기술원, 2005

7842
Prosodic and linguistic analysis of semantic fluency data: A window into speech production and cognition

Wolters, Maria K.; Kim, Najoung; Kim, Jung-Ho; MacPherson, Sarah E.; Park, Jong-Cheolresearcher, 17th Annual Conference of the International Speech Communication Association, INTERSPEECH 2016, pp.2085 - 2089, International Speech and Communication Association, 2016-09

7843
Prosodic Phrasing In Korean; Determine Governor, and Then Split or Not

Kim, YJ; Byeon, HJ; Oh, Yung-Hwanresearcher, Eurospeech '99, pp.539 - 542, Eurospeech, 1999-09

7844
Prosody Control Based on Syntactic Information in Korean Text-to-Speech Conversion System

Kim, Y.J.; Oh, Yung-Hwanresearcher, Western Pacific Regional Acoustics Conference V, 1994-08

7845
Prosody control in a large corpus-based TTS system = 대규모 코퍼스 기반 TTS 시스템에서의 운율 제어link

Byeon, Heo-Jin; 변효진; et al, 한국과학기술원, 2004

7846
PROT: Productive Regions-Oriented Task space path planning for hyper-redundant manipulators

Yoon, Sung-Euiresearcher; Lee, Jung Hwan, IEEE International Conference on Robotics and Automations (ICRA), IEEE Robotics and Automation Society, 2014-06-02

7847
Protecting Mobile Devices from Adversarial User by Fine-Grained Analysis of User Behavior

Kim, Yonggon; Kwon, Ohmin; Kim, Sunwoo; Jeong, ByungJin; Yoon, Hyunsooresearcher, The 5th FTRA International Conference on Computer Science and its Applications (CSA-13), FTRA, 2013-12-19

7848
Protecting secret keys in networked devices with table encoding against power analysis attacks

Kim, Taesung; Lee, Seungkwang; Choi, Dooho; Yoon, Hyunsooresearcher, JOURNAL OF HIGH SPEED NETWORKS, v.22, no.4, pp.293 - 307, 2016

7849
Protecting secret keys with table encoding against power analysis attacks = 부채널 전력 분석 공격에 안전한 테이블 인코딩을 기반으로 하는 비밀키 보호 기법에 관한 연구link

Kim, Tae-Sung; 김태성; et al, 한국과학기술원, 2017

7850
Protego: Cloud-Scale Multitenant IPsec Gateway

Son, Jeongseok; Moon, Sue-Bokresearcher; Yongqiang Xiong; Paul Wang; Ze Gan; Kun Tan, USENIX Annual Technical Conference (USENIX ATC), pp.473 - 485, USENIX Association, 2017-07-13

7851
Protein Complex Prediction Based on Mutually Exclusive Interactions in Protein Interaction Network

Jung, SH; Jang, WH; Hur, HY; Hyun, B; Han, Dongsooresearcher, International Conference on Genome Informatics, v.21, pp.77 - 88, International Conference on Genome Informatics, 2008-12-18

7852
Protein complex prediction based on simultaneous protein interaction network

Jung, Suk-Hoon; Hyun, Bo-Ra; Jang, Woo-Hyuk; Hur, Hee-Young; Han, Dong-Sooresearcher, BIOINFORMATICS, v.26, no.3, pp.385 - 391, 2010-02

7853
ProtoChat: Supporting the conversation design process with crowd feedback

Choi, Yoonseo; Monserrat, Toni-Jan Keith; Park, Jeongeon; Shin, Hyungyu; Lee, Nyoungwoo; Kim, Juhoresearcher, 23rd ACM Conference on Computer-Supported Cooperative Work and Social Computing, CSCW 2020, pp.19 - 23, Association for Computing Machinery, 2020-10-19

7854
Protocol trace analysis based on formal specifications, Formal Description Techniques

Kim, Myungchulresearcher; Son T. Vuong; Samuel T. Chanson, FORMAL DESCRIPTION TECHNIQUES FOR DISTRIBUTED SYSTEMS AND COMMUNICATION PROTOCOLS, v.C-2, pp.393 - 408, 1992-01

7855
Prototype CHILL Compiler

전길남, Proc. of KISS, Seoul, 1985

7856
Prototype CHILL Compiler의 개발에 관한 연구

이동길; 윤용익; 최광무researcher; 전길남, 한국정보과학회 1985년 봄 학술발표대회, pp.298 - 305, 한국정보과학회, 1985-04

7857
Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks

Cogliati, Benoit; Dodis, Yevgeniy; Katz, Jonathan; Lee, Jooyoungresearcher; Steinberger, John; Thiruvengadam, Aishwarya; Zhang, Zhe, 38th Annual International Cryptology Conference (CRYPTO) 2018, pp.722 - 753, International Association for Cryptologic Research (IACR), 2018-08-22

7858
Provable Security of the Knudsen-Preneel Compression Functions

Lee, Jooyoungresearcher, Asiacrypt 2012, IACR, 2012-12

7859
Provably optimal and human-competitive results in SBSE for spectrum based fault localisation

Xie, Xiaoyuan; Kuo, Fei-Ching; Chen, Tsong Yueh; Yoo, Shinresearcher; Harman, Mark, 5th International Symposium on Search-Based Software Engineering, SSBSE 2013, pp.224 - 238, University of St. Petersburg, 2013-08-25

7860
Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack

Kobayashi, Yukou; Yanai, Naoto; Yoneyama, Kazuki; Nishide, Takashi; Hanaoka, Goichiro; Kim, Kwangjoresearcher; Okamoto, Eiji, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E100A, no.12, pp.2991 - 3006, 2017-12

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0