Browse "CS-Conference Papers(학술회의논문)" by Title 

Showing results 2961 to 2980 of 7493

2961
I18n of semantic web applications

Auer, S.; Weidl, M.; Lehmann, J.; Zaveri, A.J.; Choi, Key-Sun, 9th International Semantic Web Conference, ISWC 2010, pp.1 - 16, 9th International Semantic Web Conference, ISWC 2010, 2010-11-07

2962
iBroker: An intelligent broker for ontology based publish/subscribe systems

Park, Myung-Jae; Chung, Chin-Wan, 25th IEEE International Conference on Data Engineering, ICDE 2009, pp.1255 - 1258, IEEE, 2009-03-29

2963
Iburg 상에서 효율적인 코드생성기의 생성에 관한 연구

강경우; 최광무; 정민수; 신흥철, 한국정보과학회 1997년 가을학술대회, pp.335 - 338, 한국정보과학회, 1997

2964
ICAO 규격 전자여권의 보안 문제 조사 분석

지성배; 김광조, CISC-W'07 , pp.449 - 452, Korea Institute of Information Security and Cryptology, 2007-12-01

2965
ICU 정보보호 석/박사 과정을 위한 교과과정 연구

천정희; 이철수; 김광조, 정보보호교육워크샵, pp.99 - 108, 한국정보보호학회, 2002-06-28

2966
ICU-PFC: An Automatic Parallelizing Compiler

Kim , HS; Yoon, YH; Na, SO; Han, Dongsoo, HPC-Asia 2000, pp.0, HPC-Asia 2000, 2000-05

2967
ID 기반 암호 기술을 이용한 VoIP 보안 서비스 설계 및 구현

한규석; 지성배; 김광조, 한국정보보호학회 동계정보보호학술대회, v.17, no.2, pp.540 - 543, Korea Institute of Information Security and Cryptology, 2007-12-01

2968
ID 기반 암호 시스템을 이용한 이동 적응망에서의 안전한 라우팅 프로토콜

이윤호; 김희열; 정병천; 이재원; 윤현수, 한국정보과학회 춘계 학술대회, pp.503 - 507, 한국정보과학회, 2003-04-01

2969
ID-Based Distributed 'Magic Ink' Signature

Xie, Y; Zhang, F; Kim, Kwangjo, 2003년도 한국정보보호학회영남지부, pp.19 - 23, 한국정보보호학회영남지부, 2003-02-21

2970
ID-Based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings

Chen, X; Zhang, F; Kim, Kwangjo, 2003년도 한국정보보호학회 충청지부학술대회, pp.11 - 19, 한국정보보호학회, 2003-08-22

2971
Identification of conserved domain combinations in S.cerevisiae proteins

Suk, H.J.; Hur, H.-Y.; Kim, D.; Han, Dongsoo, 7th IEEE International Conference on Bioinformatics and Bioengineering, BIBE, pp.14 - 20, IEEE, 2007-01-14

2972
Identification of Depression-Gene Associations from Biomedical Literature

You, Jinseon; Jin, Rize; Lee, Hee-Jin; Park, Jong-Cheol, 2015년도 한국정보과학회 KCC2015 (Korea Computer Congress 2015), Korea Computer Congress (KCC), 2015-06

2973
Identifying and Quantifying Coordinated Manipulation of Upvotes and Downvotes in Naver News Comments

Jeong, Jiwan; Jeong-han Kang; Moon, Sue, International AAAI Conference on Web and Social Media (ICWSM), pp.303 - 314, Association for the Advancement of Artificial Intelligence, 2019-06-08

2974
Identifying and Quantifying Coordinated Manipulation of Upvotes and Downvotes in Naver News Comments

Jeong, Jiwan; Jeong-han Kang; Moon, Sue, 14th International Conference on Web and Social Media (ICWSM), pp.303 - 314, Association for the Advancement of Artificial Intelligence, 2020-06-08

2975
Identifying controversial issues and their sub-topics in news articles

Choi, Y.; Jung, Y.; Myaeng, Sung Hyon, Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2010, pp.140 - 153, Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2010, 2010-06-21

2976
Identifying Disease Definitions with a Correlation Kernel for Symptom Extractions from Text

Ko, Minsu; Myaeng, Sung-Hyon, 2013 IEEE International Conference on Healthcare Informatics (ICHI), IEEE, 2014-09-16

2977
Identifying Emotional Cues in Dialogue Sentences According to Targets

Min, Hye-Jin; Park, Jong Cheol, Annual Meetings of the Human Computer Interaction, Human Computer Interaction, 2007-02

2978
Identifying Gene Expression Changes in Prostate Cancer Cells from the Literature

Lee, Hee-Jin; Lee, Hyunju; Park, Jong Cheol, 4th International Symposium on Languages in Biology and Medicine (LBM 2011), Nanyang Technological University, 2011-12-14

2979
Identifying Global Representative Classes of DBpedia Ontology through Multilingual Analysis: A Rank Aggregation Approach

Kim, Eun Kyung; Choi, Key-Sun, 1st Workshop on Knowledge Extraction and Knowledge Integration (KEKI), pp.57 - 65, First Workshop on Knowledge Extraction and Knowledge Integration, 2016-10-17

2980
Identifying Input-Dependent Jumps from Obfuscated Execution using Dynamic Data Flow Graphs

Hwang, Joonhyung; Han, Tai-Sook, Software Security, Protection, and Reverse Engineering Workshop, pp.3:1 - 3:12, Association for Computing Machinery, 2018-12-04

Discover

rss_1.0 rss_2.0 atom_1.0