Showing results 9021 to 9040 of 16142
Recommending peer reviewers in open source environments by using social-network centrality analyses = 오픈소스 환경에서 소셜 네트워크 중심성 분석을 통한 동료 검토자 추천 방법link Han, Dae-Hee; 한대희; et al, 한국과학기술원, 2013 |
Reconciling Time Slice Conflicts of Virtual Machines With Dual Time Slice for Clouds Kim, Taeklim; Park, Chang Hyun; Huh, Jaehyuk; Ahn, Jeongseob, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, v.31, no.10, pp.2453 - 2465, 2020-10 |
Reconfigurable DRAM cache architecture for hybrid memory systems = 이종 메모리 시스템을 위한 재구성 가능한 DRAM 캐시 구조 연구link Cha, Sanghoon; Huh, Jaehyuk; et al, 한국과학기술원, 2019 |
Reconsidering Ryu-Takagi RFID authentication protocol Duc, D.N.; Kim, Kwangjo; Yeun, C.Y., 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010, ICITST 2010, 2010-11-08 |
Reconsidering Ryu-Takagi RFID Authentication Protocol Duc, Dang Nguyen; Yeun, Chan Yeob; Kim, Kwang-Jo, International Journal of Intelligent Computing Research (IJICR), v.1, no.4, 2011 |
Reconstruction of dynamic 3D scene based on visual hull and view morphing Yang, Hyun-Seung; Han, TW; Lee, J, JOURNAL OF VISUALIZATION AND COMPUTER ANIMATION, v.14, pp.139 - 148, 2003-07 |
Reconstruction of execution architecture view using dependency relationships and execution traces Ahn, Hwi; Kang, Sungwon; Lee, Seonah, 33rd Annual ACM Symposium on Applied Computing, SAC 2018, pp.1417 - 1424, Association for Computing Machinery, 2018-04-10 |
Reconstruction of s2DES S-boxes and their Immunity to Differential Cryptanalysis Kim, Kwangjo; Park, S; Lee, S, Korea-Japan Joint Workshop on Informaion Security and Cryptology, v.0, no.0, pp.0 - 0, 1993-10 |
Recovering from failure in temporal planning Choi, Ho-Jin; Liatsos, Vassilis; El-kholy, Amin; Richards, Barry, ECAI-96 Workshop on Cross-fertilization in Planning, pp.31 - 35, European Coordinating Committee for AI (ECCAI), 1996-01-01 |
Recovering Software Product Line Architecture of Product Variants Developed with the Clone-and-Own Approach Lee, Jihyun; Kim, Taeyoung; Kang, Sungwon, 44th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2020, pp.985 - 990, Institute of Electrical and Electronics Engineers Inc., 2020-07 |
RecurFI: 윈도우 바이너리에 대한 효율적 제어흐름 무결성 검사 시스템 홍진아; Cha, Sang Kil; Kim, Kwangjo, 정보보호학회 동계학술대회, 한국정보보호학회, 2016-12-03 |
Recurrent Neural Network for Edge Linking and Enhancement Yang, Hyun-Seung; Kim, HJ, The Second Asian Conference on Vision, 2002-07-22 |
Recurrent Neural Networks With Missing Information Imputation For Medical Examination Data Prediction Kim, Hangyu; Jang, Gil-Jin; Choi, Ho-Jin; Kim, Minho; Kim, Young-Won; Choi, Jaehun, 2017 IEEE International Conference on Big Data and Smart Computing, BigComp 2017, pp.317 - 323, Institute of Electrical and Electronics Engineers Inc., 2017-02-15 |
Recursive Bayesian fire recognition using greedy margin-maximizing clustering Bae, Sujung; Hong, Sungeun; Choi, Yeongjae; Yang, Hyun-Seung, MACHINE VISION AND APPLICATIONS, v.24, no.8, pp.1605 - 1621, 2013-11 |
Recursive Circulant : A New Topology for Multicomputer Networks Chwa, Kyung Yong, International Symposium on Parallel Architecture, Algorithms and Networks, 1994-01-01 |
Recursive Circulant : A New Topology of Multicomputer Networks Chwa Kyung Yong, KISS Conf., pp.587 - 590, 1992-01-01 |
Recursive circulant 그래프의 고장시 분석과 메쉬 embedding = Fault analysis and mesh embedding of recursive circulant graphslink 김상범; Kim, Sang-Beom; et al, 한국과학기술원, 1992 |
Recursive circulants and their embeddings among hypercubes Chwa, Kyung Yong, THEORETICAL COMPUTER SCIENCE, v.244, no.1-2, pp.35 - 62, 2000-01 |
Recursive Markov Chain as a Stochastic Grammar Choi, Key-Sun; Han, YS; Park, YC, AAAI'92 Fall Symposium, pp.67 - 74, 1992 |
Recursive Path Planning Using Reduced States for Car-Like Vehicles on Grid Maps Yoon, Sang Yol; Yoon, Sung-Eui; Lee, Unghui; Shim, David Hyunchul, IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, v.16, no.5, pp.2797 - 2813, 2015-10 |
Discover