Showing results 163261 to 163280 of 279398
Prototyping Business Models for IoT Service Ju, Jae Hyeon; Kim, Mi-Seon; Ahn, Jae-Hyeon, 4th International Conference on Information Technology and Quantitative Management, ITQM 2016, pp.882 - 890, Elsevier B.V., 2016-08 |
Prototyping DIME, a tightly coupled heterogeneous distributed database systemx Cho, Haengrae; Kim, Yoo Sung; Moon, Songchun, Euromicro Workshop on Parallel and Distributed Processing, pp.296 - 303, IEEE, 1995-01 |
Prototyping Tool-kit Based on the Natural Interface of Design Activities for Physical Interactive Product Chang Young Lim, International Association of Societies & Design Research, pp.87 -, 2005 |
Protruding interfacial OH groups and on-water heterogeneous catalysis Jung, Yousung; Marcus, RA, JOURNAL OF PHYSICS-CONDENSED MATTER, v.22, no.28, 2010-07 |
Protrusion and depression generation for concurrent engineering Suh, Hyo-Won; Ahluwalia, R.S; Miller, James E., Journal of Design and Manufacturing, pp.159 - 166, 1993 |
Protrusion and depression generation for concurrent engineering Suh, Hyo-Won; R L S Ahluwalia; J E Miller, JOURNAL OF DESIGN AND MANUFACTURING, v.1, no.3, pp.159 - 166, 1993-01 |
Prov-DFT: 정보흐름분석을 이용한 의존성 폭발 억제 방법에 관한 연구 = Prov-DFT: mitigating dependency explosion with information flow analysislink 신명근; 차상길; et al, 한국과학기술원, 2022 |
Provable Benefit of Mixup for Finding Optimal Decision Boundaries Oh, Junsoo; Yun, Chulhee, 40th International Conference on Machine Learning, ICML 2023, pp.26403 - 26450, International Conference on Machine Learning, 2023-07-26 |
Provable Memorization via Deep Neural Networks using Sub-linear Parameters Park, Sejun; Lee, Jaeho; Yun, Chulhee; Shin, Jinwoo, Conference on Learning Theory (COLT) 2021, JMLR JOURNAL MACHINE LEARNING RESEARCH, 2021-08 |
Provable Per-Link Delay-Optimal CSMA for General Wireless Network Topology Lee, Dongmyung; Yun, Donggyu; Shin, Jin woo; Yi, Yung; Yun, Se Young, IEEE INFOCOM 2014, pp.2535 - 2543, IEEE Communications Society, 2014-04-27 |
Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks Cogliati, Benoit; Dodis, Yevgeniy; Katz, Jonathan; Lee, Jooyoung; Steinberger, John; Thiruvengadam, Aishwarya; Zhang, Zhe, 38th Annual International Cryptology Conference (CRYPTO) 2018, pp.722 - 753, International Association for Cryptologic Research (IACR), 2018-08-22 |
Provable security of identity-based encryption-signature schemes = ID 기반 암호-서명기법 안전성 증명link Lee, Ji-Hyun; 이지현; et al, 한국정보통신대학교, 2006 |
Provable Security of the Knudsen-Preneel Compression Functions Lee, Jooyoung, Asiacrypt 2012, IACR, 2012-12 |
Provably optimal and human-competitive results in SBSE for spectrum based fault localisation Xie, Xiaoyuan; Kuo, Fei-Ching; Chen, Tsong Yueh; Yoo, Shin; Harman, Mark, 5th International Symposium on Search-Based Software Engineering, SSBSE 2013, pp.224 - 238, University of St. Petersburg, 2013-08-25 |
Provably secure anonymous authentication protocol based on hash chains = 해쉬 체인을 이용한 안전성 증명 가능한 익명성 인증 프로토콜link Kim, Jong-Seong; 김종승; et al, 한국정보통신대학교, 2003 |
Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack Kobayashi, Yukou; Yanai, Naoto; Yoneyama, Kazuki; Nishide, Takashi; Hanaoka, Goichiro; Kim, Kwangjo; Okamoto, Eiji, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E100A, no.12, pp.2991 - 3006, 2017-12 |
Provably secure identification protocol based on the bilinear diffie-hellman problem = 겹선형 디피-헬만 문제에 기반한 안전성 증명 가능 식별 프로토콜link Kim, Myung-Sun; 김명선; et al, 한국정보통신대학교, 2002 |
Provably secure length-saving public-key encryption scheme under the computational Diffie-Hellman assumption Baek, Joonsang; Lee, Byoungcheon; Kim, Kwangjo, ETRI JOURNAL, v.22, no.4, pp.25 - 31, 2000-12 |
Provably secure threshold blind signature scheme using pairingslink Vo Duc Liem; Kim, Kwang-Jo; et al, 한국정보통신대학교, 2003 |
Provably secure timed-release public key encryption Cheon, JH; Hopper, N; Kim, Yongdae; Osipkov, I, ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v.11, no.2, 2008-03 |
Discover