Browse "School of Computing(전산학부)" byTitle

Showing results 7841 to 7860 of 14625

Property-based theorem proving and template-based fault tree analysis of NuSCR requirements specification = NuSCR 요구 명세의 속성 기반 정리 증명과 템플릿 기반 고장 수목 분석link

Kim, Tae-Ho; 김태호; et al, 한국과학기술원, 2005

Prosodic and linguistic analysis of semantic fluency data: A window into speech production and cognition

Wolters, Maria K.; Kim, Najoung; Kim, Jung-Ho; MacPherson, Sarah E.; Park, Jong-Cheolresearcher, 17th Annual Conference of the International Speech Communication Association, INTERSPEECH 2016, pp.2085 - 2089, International Speech and Communication Association, 2016-09

Prosodic Phrasing In Korean; Determine Governor, and Then Split or Not

Kim, YJ; Byeon, HJ; Oh, Yung-Hwanresearcher, Eurospeech '99, pp.539 - 542, Eurospeech, 1999-09

Prosody Control Based on Syntactic Information in Korean Text-to-Speech Conversion System

Kim, Y.J.; Oh, Yung-Hwanresearcher, Western Pacific Regional Acoustics Conference V, 1994-08

Prosody control in a large corpus-based TTS system = 대규모 코퍼스 기반 TTS 시스템에서의 운율 제어link

Byeon, Heo-Jin; 변효진; et al, 한국과학기술원, 2004

PROT: Productive Regions-Oriented Task space path planning for hyper-redundant manipulators

Yoon, Sung-Euiresearcher; Lee, Jung Hwan, IEEE International Conference on Robotics and Automations (ICRA), IEEE Robotics and Automation Society, 2014-06-02

Protecting Mobile Devices from Adversarial User by Fine-Grained Analysis of User Behavior

Kim, Yonggon; Kwon, Ohmin; Kim, Sunwoo; Jeong, ByungJin; Yoon, Hyunsooresearcher, The 5th FTRA International Conference on Computer Science and its Applications (CSA-13), FTRA, 2013-12-19

Protecting secret keys in networked devices with table encoding against power analysis attacks

Kim, Taesung; Lee, Seungkwang; Choi, Dooho; Yoon, Hyunsooresearcher, JOURNAL OF HIGH SPEED NETWORKS, v.22, no.4, pp.293 - 307, 2016

Protecting secret keys with table encoding against power analysis attacks = 부채널 전력 분석 공격에 안전한 테이블 인코딩을 기반으로 하는 비밀키 보호 기법에 관한 연구link

Kim, Tae-Sung; 김태성; et al, 한국과학기술원, 2017

Protego: Cloud-Scale Multitenant IPsec Gateway

Son, Jeongseok; Moon, Sue-Bokresearcher; Yongqiang Xiong; Paul Wang; Ze Gan; Kun Tan, USENIX Annual Technical Conference (USENIX ATC), pp.473 - 485, USENIX Association, 2017-07-13

Protein Complex Prediction Based on Mutually Exclusive Interactions in Protein Interaction Network

Jung, SH; Jang, WH; Hur, HY; Hyun, B; Han, Dongsooresearcher, International Conference on Genome Informatics, v.21, pp.77 - 88, International Conference on Genome Informatics, 2008-12-18

Protein complex prediction based on simultaneous protein interaction network

Jung, Suk-Hoon; Hyun, Bo-Ra; Jang, Woo-Hyuk; Hur, Hee-Young; Han, Dong-Sooresearcher, BIOINFORMATICS, v.26, no.3, pp.385 - 391, 2010-02

ProtoChat: Supporting the conversation design process with crowd feedback

Choi, Yoonseo; Monserrat, Toni-Jan Keith; Park, Jeongeon; Shin, Hyungyu; Lee, Nyoungwoo; Kim, Juhoresearcher, 23rd ACM Conference on Computer-Supported Cooperative Work and Social Computing, CSCW 2020, pp.19 - 23, Association for Computing Machinery, 2020-10-19

Protocol trace analysis based on formal specifications, Formal Description Techniques

Kim, Myungchulresearcher; Son T. Vuong; Samuel T. Chanson, FORMAL DESCRIPTION TECHNIQUES FOR DISTRIBUTED SYSTEMS AND COMMUNICATION PROTOCOLS, v.C-2, pp.393 - 408, 1992-01

Prototype CHILL Compiler

전길남, Proc. of KISS, Seoul, 1985

Prototype CHILL Compiler의 개발에 관한 연구

이동길; 윤용익; 최광무researcher; 전길남, 한국정보과학회 1985년 봄 학술발표대회, pp.298 - 305, 한국정보과학회, 1985-04

Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks

Cogliati, Benoit; Dodis, Yevgeniy; Katz, Jonathan; Lee, Jooyoungresearcher; Steinberger, John; Thiruvengadam, Aishwarya; Zhang, Zhe, 38th Annual International Cryptology Conference (CRYPTO) 2018, pp.722 - 753, International Association for Cryptologic Research (IACR), 2018-08-22

Provable Security of the Knudsen-Preneel Compression Functions

Lee, Jooyoungresearcher, Asiacrypt 2012, IACR, 2012-12

Provably optimal and human-competitive results in SBSE for spectrum based fault localisation

Xie, Xiaoyuan; Kuo, Fei-Ching; Chen, Tsong Yueh; Yoo, Shinresearcher; Harman, Mark, 5th International Symposium on Search-Based Software Engineering, SSBSE 2013, pp.224 - 238, University of St. Petersburg, 2013-08-25

Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack

Kobayashi, Yukou; Yanai, Naoto; Yoneyama, Kazuki; Nishide, Takashi; Hanaoka, Goichiro; Kim, Kwangjoresearcher; Okamoto, Eiji, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E100A, no.12, pp.2991 - 3006, 2017-12



. next

Open Access

Date issued

. next


. next

rss_1.0 rss_2.0 atom_1.0