Showing results 1941 to 1960 of 7394
Designing interactive distance cartograms to support urban travelers Hong, Sungsoo; Kocielnik, Rafal; Yoo, Min-Joon; Battersby, Sarah; Kim, Juho; Aragon, Cecilia, 10th IEEE Pacific Visualization Symposium, PacificVis 2017, pp.81 - 90, IEEE Computer Society, 2017-04-19 |
Designing logical architectures of software systems Kang, Sungwon; Choi Y., 6th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and 1st ACIS International Workshop on Self-Assembling Wireless Networks, SNPD/SAWN 2005, v.2005, pp.330 - 337, SNPD, 2005-05-23 |
Designing Mobile User Interfaces Using Hand Grip Recognition Chang, Wook; Kim, Kee-Eung; Lee, Hyunjeong; Cho, Joonki; Soh, Byeongsuk; Shim, Junghyun; Yang, Kyunghye; et al, 한국HCI학회, pp.0 - 0, 2006-01-01 |
Designing Rich Touch Interaction through Proximity and 2.5D Force Sensing Touchpad Heo, Seongkook; Han, Jaehyun; Lee, Geehyuk, The Annual Meeting of the Australian Special Interest Group for Computer Human Interaction, pp.401 - 404, ACM SIGCHI, 2013-11-28 |
Designing Touch Gestures Using the Space around the Smartwatch as Continuous Input Space Han, Jaehyun; Ahn, Sunggeun; Park, Keunwoo; Lee, Geehyuk, 12th ACM International Conference on Interactive Surfaces and Spaces (ACM ISS), pp.210 - 219, ACM, 2017-10-20 |
Desynchronization and Cloning resistant light weight RFID authentication protocol using integer arithmetic for low-cost tags Kwak, M; Kim, J; Kim, Kwangjo, 2009 Symposium on Cryptography and Information Security, Institute of Electronics, Information and Communication Engineers, 2009-12-20 |
Detecting Active Attacks in WiFi Network by Semi-supervised Deep Learning Aminanto, Erza; 김광조, 2016년 한국정보보호학회 동계학술대회 (CISC-W'16), 한국정보보호학회, 2016-12-03 |
Detecting and Blocking False Sentiment Propagation Min, Hye-Jin; Park, Jong Cheol, The 5th International Joint Conference on Natural Language Processing (IJCNLP), pp.354 - 362, International Joint Conference on Natural Language Processing, 2011-11-09 |
Detecting Arrivals and Departure of Subway Train Using Linear Acceleromete Shin, Hoon; Han, Dong-Soo, MobiSys '19: The 17th Annual International Conference on Mobile Systems, Applications, and Services, pp.580 - 581, ACM, 2019-06-12 |
Detecting code theft via a static instruction trace birthmark for java methods Park, Heewan; Choi, Seokwoo; Lim, Hyun-il; Han, Taisook, IEEE INDIN 2008: 6th IEEE International Conference on Industrial Informatics, pp.551 - 556, IEEE, 2008-07-13 |
Detecting composite image manipulation based on deep neural networks Choi, Hak-Yeol; Jang, Han-Ul; Kim, Dongkyu; Son, Jeongho; Mun, Seung-Min; Choi, Sunghee; Lee, Heung-Kyu, 24th International Conference on Systems, Signals and Image Processing, IWSSIP 2017, pp.1 - 5, IEEE Computer Society, 2017-05-22 |
Detecting Concurrency Errors in Client-side JavaScript Web Applications Hong, Shin; Park, Yongbae; Kim, Moonzoo, International Conference on Software Testing, Verification and Validation (ICST), IEEE Computer Society, 2014-04-01 |
Detecting Contextomized Quotes in News Headlines by Contrastive Learning Song, Seonyeong; Song, HyeonHo; Park, Kunwoo; Han, Jiyoung; Cha, Meeyoung, 17th Conference of the European Chapter of the Association for Computational Linguistics, EACL 2023 - Findings of EACL 2023, pp.685 - 692, Association for Computational Linguistics (ACL), 2023-05-06 |
Detecting Contract Cheaters in Online Programming Classes with Keystroke Dynamics Byun, Jeongmin; Park, Jungkook; Oh, Alice, 7th Annual ACM Conference on Learning at Scale, L@S 2020, pp.273 - 276, Association for Computing Machinery, 2020-08-14 |
Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach Muhamad Erza, Aminanto; Kim, Kwangjo, 17th World Conference on Information Security Applications (WISA 2016), pp.136 - 147, Korea Institute of Information Security and Cryptology (KIISC), 2016-08-25 |
Detecting Incongruity between News Headline and Body Text via a Deep Hierarchical Encoder Yoon, Seunghyeon; Park, Kunwoo; Shin, J; Lim, Hongjun; Won, S; Cha, Meeyoung; Jung, Kyomin, 33rd AAAI Conference on Artificial Intelligence / 31st Innovative Applications of Artificial Intelligence Conference / 9th AAAI Symposium on Educational Advances in Artificial Intelligence, pp.791 - 800, AAAI conference on Artificial Intelligence, 2019-01-28 |
Detecting Java theft based on static API trace birthmark Park, Heewan; Choi, Seokwoo; Lim, Hyun-il; Han, Taisook, 3rd International Workshop on Security, IWSEC 2008, pp.121 - 135, Springer Verlag (Germany), 2008-11-25 |
Detecting Multiclass Emotions from Labeled Movie Scripts Kim, Jaewoo; Ha, Yu-i; Kang, Seungche; Lim, Hongjun; Cha, Meeyoung, IEEE International Conference on Big Data and Smart Computing (BigComp), pp.590 - 594, IEEE, 2018-01-17 |
Detecting Online Game Chargeback Fraud Based on Transaction Sequence Modeling Using Recurrent Neural Network Lee, Namsup; Yoon, Hyunsoo; Choi, Daeseon, 18th World International Conference on Information Security and Application, WISA 2017, pp.297 - 309, Springer Verlag, 2018-08 |
Detecting personality unobtrusively from users’ online and offline workplace behaviors Kim, Seoyoung; Ha, Jiyoun; Kim, Juho, 2018 CHI Conference on Human Factors in Computing Systems, CHI EA 2018, Association for Computing Machinery, 2018-04-24 |
Discover