Showing results 2858 to 2877 of 4124
T-ReX: Interactive Global Illumination of Massive Models on Heterogeneous Computing Resources Kim, Tae-Joon; Sun, Xin; Yoon, Sung-Eui, IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, v.20, no.3, pp.481 - 494, 2014-03 |
Table Redundancy Method for Protecting Against Fault Attacks Lee, Seungkwang; Jho, Nam-su; Kim, Myung-Chul, IEEE ACCESS, v.9, pp.92214 - 92223, 2021-07 |
Tactics based approach for integrating non-functional requirements in object-oriented analysis and design Marew, T; Lee, JS; Bae, Doo-Hwan; Lee, JS, JOURNAL OF SYSTEMS AND SOFTWARE, v.82, no.10, pp.1642 - 1656, 2009-10 |
Tailoring a large-sized software process using process slicing and case-based reasoning technique Park, Seung-Hun; Bae, Doo-Hwan, IET SOFTWARE, v.7, no.1, pp.47 - 55, 2013-02 |
Tamper resistant software by integrity-based encryption Lee, J; Kim, H; Yoon, Hyunsoo, PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3320, pp.608 - 612, 2004 |
Tamper Resistant Software by Integrity-Based Encryption Lee, Jaewon; Kim, Heeyoul; Yoon, Hyunsoo, Lecture notes in computer science, v.3320, pp.608-612, 2004 |
Target Classification in Sparse Sampling Acoustic Sensor Networks Using IDDC Algorithm Kim, Youngsoo; Kim, Daeyoung; Kim, Taehong; Sung, Jongwoo; Yoo, Seongeun, Lecture Notes in Computer Science, Vol.4809, pp.568-578, 2007 |
TCP 상호운용성 시험스위트의 도출 설순욱; 김명철; 강성원; 진병문; 현순주, 한국정보과학회논문지(A), v.26, no.11, pp.1414 - 1428, 1999-11 |
TCP 상호운용성 시험스위트의 도출 설순욱; 김명철; 강성원; 진병문; 현순주, 정보과학회논문지(A), v.26, no.11, pp.1414 - 1428, 1999-11 |
TCP/IP를 이용한 이기종간의 분산 화일 시스템의 설계 및 구현 문수복; 김철기; 김영호; 김종상, 정보과학회논문지, v.16, no.3, pp.235 - 242, 1989-05 |
TCP와 UDP 프로토콜 상에서 ARF 기법에 따른 무선랜 성능 분석 주; 주; 주, 정보처리학회논문지C, v.12, no.3, pp.395 - 400, 2005-06 |
TDM: Enforcement of security management system for XML-centric electronic commerce Kim, MJ; Lee, Young-Hee, WEB AND COMMUNICATION TECHNOLOGIES AND INTERNET-RELATED SOCIAL ISSUES - HSI 2003 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2713, pp.751 - 756, 2003 |
TDM: Enforcement of Security Management System for XML-Centric Electronic Commerce Lee, Younghee, 2003 |
TECHNIQUES FOR DATABASE RECOVERY IN DISTRIBUTED ENVIRONMENTS SON, SH; Choe, Kwang-Moo, INFORMATION AND SOFTWARE TECHNOLOGY, v.30, no.5, pp.285 - 294, 1988-06 |
Techniques for Measuring Business Process Based on Business Values Lee, Jihyun; Kang, Sungwon, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E98D, no.4, pp.911 - 921, 2015-04 |
Technology Supported Behavior Restriction for Mitigating Self-Interruptions in Multi-device Environments Kim, Jaejeung; Cho, Chiwoo; Lee, Uichin, PACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, v.1, no.3, 2017-09 |
Template-based landmark and region mapping of bone Kim, Jaeil; Seo, Sang Gyo; Lee, Dong Yeon; Park, Jinah, JOURNAL OF FOOT AND ANKLE RESEARCH, v.7, no.Suppl 1, pp.A42, 2014-04 |
Temporal aggregation using a multidimensional index Woo, JH; Lee, BS; Lee, MJ; Loh, WK; Whang, Kyu-Young, JOURNAL OF DATABASE MANAGEMENT, v.18, pp.62 - 79, 2007-04 |
Temporal association algebra: A mathematical foundation for processing object-oriented temporal databases Su, S.Y.W.; Hyun, SoonJoo; Chen, H.-H.M., IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, v.10, no.3, pp.389 - 408, 1998-05 |
Temporal association between objectively measured smartphone usage, sleep quality and physical activity among Chinese adolescents and young adults Lee, Paul H.; Tse, Andy C. Y.; Wu, Cynthia S. T.; Mak, Yim Wah; Lee, Uichin, JOURNAL OF SLEEP RESEARCH, v.30, no.4, pp.e13213, 2021-08 |
Discover