Showing results 2641 to 2660 of 7497
Formal Modeling and Analysis of Hybrid Systems: A Case Study in Multirobot Coordination Alur, Rajeev; Esposito, Joel M.; Kim, Moonzoo; Kumar, Vijay; Lee, Insup, World Congress on Formal Methods, pp.212 - 232, World Congress on Formal Methods, 1999-09-20 |
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances Kim, Moonzoo, ATVA, 2007 |
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances Kim, Moonzoo, International Symposium on Automated Technology for Verification and Analysis, pp.489 - 500, ATVA, 2007-10-24 |
Formal Representation of Guarded Logic Programs Using Petri Net Model 정인정; 이흥규, Proc. of the 20th Korea Information Science Society Fall Conf., v.20, no.2, pp.1081 - 1084, 한국정보과학회, 1993 |
Formal specification of a JavaScript module system Kang, Seonghoon; Ryu, Sukyoung, ACM international conference on Object oriented programming systems languages and applications, ACM SIGPLAN, 2012-10-26 |
Formal verification of a flash memory device driver - An experience report Kim, Moonzoo; Choi, Yunja; Kim, Yunho; Kim, Hotae, 15th International SPIN Workshop on Model Checking of Software, SPIN 2008, pp.144 - 159, SPIN, 2008-08-10 |
Formal verification of consistency between feature model and software architecture in software product line Satyananda T.K.; Lee, Danhyung; Kang S., 2nd International Conference on Software Engineering Advances - ICSEA 2007, v.0, no.0, pp.0 - 0, IEEE, 2007-08-25 |
Formal verification of consistency between feature model and software architecture in software product line Tonny, Kurniadi Satyananda; Lee, Danhyung; Kang, Sung-Won, International Conference on Software Engineering Advances(ICSEA 2007), IEEE, 2007-08-25 |
Formal Verification of Robot Movements - a Case Study on Home Service Robot SHR100 Kim, Moonzoo; Kang, Kyo Chul; Lee, Hyoungki, International Conference on Robotics and Automation, pp.4739 - 4744, IEEE, 2005-04-18 |
Formally Specified Monitoring of Temporal Properties Kim, Moonzoo; Viswanathan, Mahesh; Abdallah, Hanene Ben; Kannan, Sampath; Lee, Insup, European Conference on Real-Time Systems, pp.114 - 122, ECRTS, 1999-06-09 |
FortressCheck: Automatic testing for generic properties Kang Seonghoon; Ryu, Sukyoung, 26th Annual ACM Symposium on Applied Computing, SAC 2011, pp.1290 - 1296, ACM Special Interest Group on Applied Computing (SIGAPP), 2011-03-21 |
Forward secure ID-based group key agreement protocol with anonymity Park, H; Kim, Z; Kim, Kwangjo, 2009 3rd International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, pp.274 - 279, 123, 2009-06-18 |
Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption Duc, DN; Cheon, JH; Kim, Kwangjo, 2003년도 한국정보보호학회 하계정보보호학술대회, pp.21 - 25, 한국정보보호학회, 2003-07-04 |
Foundations for the run-time monitoring of reactive systems: fundamentals of the MaC language Viswanathan, Mahesh; Kim, Moonzoo, First international conference on Theoretical Aspects of Computing , pp.543 - 556, ICTAC, 2005-10 |
FourierHandFlow: Neural 4D Hand Representation Using Fourier Query Flow Lee, Jihyun; Jang, Junbong; Kim, Dongwhan; Sung, Minhyuk; Kim, Tae-Kyun, Thirty-seventh Conference on Neural Information Processing Systems (NeurIPS), NeurIPS, 2023-12-12 |
FPL: White-box secure block cipher using parallel table look-ups Kwon, Jihoon; Lee, Byeonghak; Lee, Jooyoung; Moon, Dukjae, Cryptographers Track at the RSA Conference, CT-RSA 2020, pp.106 - 128, Springer, 2020-02-25 |
Fractal Moving Image Compression System using Wavelet Transform 조정완, Proc. KISS, pp.1051 - 1054, 1995 |
Fractionalized View Materialization in Data Cubes Chung, Y.D.; Kim, M.J.; Park, W.J.; Kim, Myoung Ho, Seventh Int'l Conf. on Database Systems for Advanced Applications, pp.156 - 157, IEEE, 2001-04 |
Fragile Online Relationship: A First Look at Unfollow Dynamics in 문수복, NHN Workshop, NHN Workshop, 2010-11-08 |
Fragile Online Relationship: A First Look at Unfollow Dynamics in Twitter 문수복, Workshop on Privacy and Security on Social Media, Workshop on Privacy and Security on Social Media, 2011-01-18 |
Discover