Showing results 5761 to 5780 of 7376
Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO Lee, Sangsup; Kim, Daejun; Kim, Dongkwan; Son, Sooel; Kim, Yongdae, Workshop on Offensive Technologies, USENIX, 2019-08-13 |
Why is the winner the best Matthias Eisenmann; Park, Jinah; Cho, Jihoon, 2023 Computer Vision and Pattern Recognition Conference (CVPR), pp.19955 - 19966, IEEE, 2023-06-22 |
Why Knowledge Distillation Amplifies Gender Bias and How to Mitigate from the Perspective of DistilBERT Ahn, Jaimeen; Lee, Hwaran; Kim, Jinhwa; Oh, Alice Haeyun, 2022 Annual Conference of the North American Chapter of the Association for Computational Linguistics, pp.266 - 272, The North American Chapter of the Association for Computational Linguistics, 2022-07-14 |
Why train-and-select when you can use them all? ensemble model for fault localisation Sohn, Jeongju; Yoo, Shin, the Genetic and Evolutionary Computation Conference, pp.1408 - 1416, ACM Press, 2019-07-15 |
Wi-Fi Fingerprint-based Approaches Following Log-Distance Path Loss Model for Indoor Positioning Jung, SH; Lee, CO; Han, Dong Soo, 2011 IEEE MTT-S International Microwave Workshop Series on Intelligent Radio for Future Personal Terminals (IMWS-IRFPT), pp.62 - 63, IEEE, 2011-08-24 |
Wi-Fi Intrusion Detection Using Weighted-Feature Selection for Neural Networks Classifier Muhamad Erza, Aminanto; Tanuwidjaja, Harry; Paul D Yoo; Kim, Kwangjo, International Workshop on Big Data and Information Security 2017 (IWBIS 2017), University of Indonesia, 2017-09-23 |
Wi-Fi 기반 실내 측위를 위한 QR코드를 활용한 라디오 맵 구성 한동수; 성락민; 이민규, 2012년 추계학술대회, ITS(교통.자동차.전자.정보의 융합), pp.76 - 78, (사)한국ITS학회, 2012-11-03 |
WIE: A Java Agent for Web Information Extraction Service Hyun, SoonJoo; Kim, Gyu-Baek, DWACOS99, pp.0 - 0, 1999-08-01 |
Will Punishing Robots Become Imperative in the Future? Lima, Gabriel; Jeon, Chihyung; Cha, Meeyoung; Park, Kyungsin, 2020 CHI Conference on Human Factors in Computing Systems, CHI 2020, ACM Conference on Human Factors in Computing Systems, 2020-04-26 |
Winder: Linking speech and visual objects to support communication in asynchronous collaboration Kim, Tae Soo; Kim, Seungsu; Choi, Yoonseo; Kim, Juho, 2021 CHI Conference on Human Factors in Computing Systems: Making Waves, Combining Strengths, CHI 2021, pp.1 - 17, Association for Computing Machinery, 2021-05 |
Window Capturing-based Application Sharing under Heterogeneous Window Systems Jung, JH; Park , HJ; Yang, Hyun-Seung, WebNet97, 1997 |
Window Class Virtual Terminal Service 전길남, Proc. of KISS, Seoul, 1985 |
Windows PE 파일의 임포트 테이블에 기반한 소프트웨어 버스마킹(Birthmarking)기법 박희완; 임현일; 최석우; 한태숙, 한국정보과학회 34회 추계학술발표대회, pp.546 - 551, 한국정보과학회, 2007 |
Wireless Authentication Protocol Preserving User Anonymity Go, J; Park, J; Kim, Kwangjo, WPMC'01, pp.1153 - 1158, WPMC, 2001-09 |
Wireless Authentication Protocols Preserving User Anonymity Park, J; Go, J; Kim, Kwangjo, SCIS2001, pp.159 - 164, 2001-01 |
Wireless sensor networks for cultural property protection Sung, J.; Ahn, S.; Park, T.; Jang, S.; Yun, D.; Kang, J.; Yoo, S.-E.; et al, 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008, pp.615 - 620, IEEE, 2008-03-25 |
Wireless Signal Strength-Aware TCP-Friendly Rate Control in Mobile Networks Kim, Moonjoo; Lee, Kyounghee; Kim, Myungchul; Bang, Jongho; Lee, Suwon, 2005 International Conference on Wireless Networks, ICWN'05, pp.63 - 69, ICWN, 2005-06-27 |
Wireless, Mobile Ad-Hoc Network Routing Gerla, Mario; Pei, Guangyu; Lee, Sung-Ju, The ACM/IEEE WINLAB/Berkeley FOCUS'99 on Radio Networks for Everything, ACM & IEEE, 1999-03-24 |
WLAN-based Location Monitoring System in Confined Workspaces Moon, Byeong-Cheol; Han, Dong-Soo, 2nd International Conference on Vision, Image and Signal Processing (ICVISP 2018), pp.48:1 - 48:5, ACM, 2018-08-30 |
WLAN-기반 측위 정확도 향상을 위한 손실 신호 대체 기법 한동수; 이상재, 2012년 추계학술대회, ITS(교통.자동차.전자.정보의 융합), pp.221 - 222, (사)한국ITS학회, 2012-11-03 |
Discover