Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-10 of 5457 (Search time: 0.004 seconds).

1

Exact algorithms for the bottleneck steiner tree problem

Bae, SangWon; Choi, Sungheeresearcher; Lee, Chunseok; Tanigawa, Shin-ichiSpringer Verlag20th International Symposium on Algorithms and Computation, ISAAC 2009, pp.24 - 33, 2009-12-16

2

snapPVFS: Snapshot-able parallel virtual file system

Cha, Kwangho; Kim, Jin-Soo; Maeng, SeungRyoulresearcherIEEE2008 14th IEEE International Conference on Parallel and Distributed Systems, ICPADS'08, pp.221 - 228, 2008-12-08 View PDF (398kb)

3

On Next-Generation Telco-Managed P2P TV Architectures

Cha, Meeyoungresearcher; Rodriguez, Pablo; Moon, Sue; Crowcroft, JonIPTPS'08 Proceedings of the 7th international conference on Peer-to-peer systems , 2011-07 View PDF (413kb)

4

Deriving software process simulation model from spem-based software process model

Park, Seunghun; Choi, Keung Sik; Yoon, Kyung-A; Bae, Doo-HwanresearcherIEEE14th Asia Pacific Software Engineering Conference, ASPCE 2007 v. no.1530-1362 pp.382 - 389, 2007-12-04 View PDF (558kb)

5

DEVS-based Software Process Simulation Modeling

Kim, Tag-Gonresearcher; Bae, Doo-Hwanresearcher6th International Workshop on Software Process Simulation and modeling (ProSim2005), 2005-05

6

UML-based modeling and simulation method for mission-critical real-time embedded system development

Choi, Keung Sik; Jung, Sung-Chul; Kim, Hyun-Jung; Bae, Doo-Hwanresearcher; Lee, Dong-HunIASTEDIASTED International Conference on Software Engineering, as part of the 24th IASTED International Multi-Conference on APPLIED INFORMATICS, pp.160 - 165, 2006-02-14

7

이상치 제거 기법을 이용한 소프트웨어 공수 예측 모델의 경험적 분석

서영석; 윤경아; 배두환researcherKCSE한국정보과학회 소프트웨어공학 학술대회, v.10, no.1, pp.354 - 355, 2008-02

8

대학 무선 랜에 적용되는 새로운 확장 가능 인증 프로토콜

지성배; 이현록; 김광조researcher한국정보보호학회한국정보보호학회 영남지부 학술발표회, pp.149 - 156, 2007-02-23 View PDF (292kb)

9

상호인증을 통한 RFID 프라이버시 보호 기법

이상신; Asano, T; 김광조researcher한국정보보호학회2005년 한국정보보호학회 동계정보보호학술대회, pp.241 - 245, 2005-12-03

10

감시정찰 센서네트워크 및 주요 시설물 관리에서의 키 관리 기법 비교

김장성; 권미영; 김이형; 곽민혜; 한규석; 김광조researcher한국정보보호학회한국정보보호학회 충청지부 학술발표회, pp.75 - 83, 2008-10-17 View PDF (4876kb)

rss_1.0 rss_2.0 atom_1.0