Showing results 9101 to 9120 of 15973
Retrofitting the Partially Privileged Mode for TEE Communication Channel Protection Jang, Jinsoo; Kang, Brent Byunghoon, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.17, no.5, pp.1000 - 1014, 2018-05 |
Reusability Enhancement by Using Flexible Topology Architecture for Network Management System Lee, Heewon; Hwang, Chankyou; Yoo, Jaehyoung; Choi, Ho-Jin; Kang, Sungwon; Lee, Danhyung, Studies in Computational Intelligence, v.131, pp.131 - 145, 2008 |
Reusable Software Components for Database Management Systems Oh, S.H.; Lee, Yoon Joon; Kim, Myoung Ho, The Korea Database Society Conference, pp.167 - 179, The Korea Database Society, 1991-12 |
Revamping hardware persistency models: view-based and axiomatic persistency models for Intel-x86 and Armv8 Cho, Kyeongmin; Lee, Sung-Hwan; Raad, Azalea; Kang, Jeehoon, PLDI '21: 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, pp.16 - 31, ACM, 2021-06-19 |
Revamping the IEEE 802.11a PHY Simulation Models Ryu, Jiho; Lee, Jeongkeun; Lee, Sung-Ju; Kwon, Taekyoung, The 11th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2008), ACM, 2008-10-28 |
Revealing the Linkability of Popescue ID-based Group Signature Scheme Choi, H; Zhang, F; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.81 - 83, Korea Institute of Information Security & Cryptology, 2002-11-16 |
Reverse Nearest Neighbor Queries in Fixed Dimension Cheong, Otfried; Vigneron, Antoine; Yon, Juyoung, INTERNATIONAL JOURNAL OF COMPUTATIONAL GEOMETRY APPLICATIONS, v.21, no.2, pp.179 - 188, 2011-04 |
Reverse nearest neighbor search with a non-spatial aspect Park, Jeong Hoon; Chung, Chin-Wan; Kang, U, INFORMATION SYSTEMS, v.54, pp.92 - 112, 2015-12 |
Reversible data hiding exploiting spatial correlation between sub-sampled images Kim, Kyung-Soo; Lee, Min-Jeong; Lee, Hae-Yeoun; Lee, Heung-Kyu, PATTERN RECOGNITION, v.42, pp.3083 - 3096, 2009-11 |
Reversible data hiding giving priority to the use of edges and textures Hu, Y.; Lee, Heung-Kyu; Li, J., 5th International Conference on Visual Information Engineering, VIE 2008, no.543 CP, pp.643 - 647, IEEE, 2008-07-29 |
Reversible data hiding technique exploiting spatial redundancy and correlation between sub-sampled images = 부 표본 영상 간의 공간적인 유사성과 상관관계를 활용한 가역적 워터마킹 모델link Kim, Kyung-Su; 김경수; et al, 한국과학기술원, 2010 |
Reversible data hiding using prediction error values embedding Hu, Y.; Lee, Heung-Kyu; Li, J.; Chen, K., 6th International Workshop on Digital Watermarking, IWDW 2007, pp.244 - 253, Springer Verlag, 2007-12-03 |
Review of Mobile Social SNS Services 문수복, Samsung Electronics Digital Media Center, Samsung Electronics Digital Media Center, 2011-05-30 |
Review of machine learning methods in soft robotics Kim, Daekyum; Kim, Sang-Hun; Kim, Taekyoung; Kang, Brian Byunghyun; Lee, Minhyuk; Park, Wookeun; Ku, Subyeong; et al, PLOS ONE, v.16, no.2, pp.e0246102, 2021-02 |
ReviewAid: A Scaffolded Approach to Supporting Readers' Evaluation of Health News Ko, Eun-Young; Kim, Yeonsu; Kim, Juho, 16th International Conference of the Learning Sciences, ICLS 2022, pp.313 - 320, International Society of the Learning Sciences (ISLS), 2022-06 |
Revising Learner Misconceptions Without Feedback: Prompting for Reflection on Anomalous Facts Williams, Joseph Jay; Lombrozo, Tania; Hsu, Anne; Huber, Bernd; Kim, Juho, 34th Annual CHI Conference on Human Factors in Computing Systems, CHI 2016, pp.470 - 474, ACM Special Interest Group on Computer-Human Interaction (SIGCHI), 2016-05-11 |
Revisit Prediction by Deep Survival Analysis Kim, Sundong; Song, Hwanjun; Kim, Sejin; Kim, Beomyoung; Lee, Jae-Gil, 24th Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2020, pp.514 - 526, Springer, 2020-05-14 |
Revisiting Binary Code Similarity Analysis using Interpretable Feature Engineering and Lessons Learned Kim, Dongkwan; Kim, Eunsoo; Cha, Sang Kil; Son, Sooel; Kim, Yongdae, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, v.49, no.4, pp.1661 - 1682, 2023-04 |
Revisiting cache contentions in multi-cores : a hardware-software cooperative approach = 멀티코어 프로세서 환경에서의 캐시 성능 향상에 관한 연구link Pak, Eun-Ji; 박은지; et al, 한국과학기술원, 2013 |
Revisiting CK 17 Linearly Homomorphic Ring Signature based on SIS Choi, Rakyong; Kim, Kwangjo, 2018 Symposium on Cryptography and Information Security (SCIS 2018), IEICE Technical Committee on Information Security, 2018-01-24 |
Discover