Showing results 5421 to 5440 of 7497
Thin-Cap Fibroatheroma Detection with Deep Neural Networks Jun, Tae Joon; Kang, Soo-Jin; Lee, June-Goo; Kweon, Jihoon; Na, Wonjun; Kang, Daeyoun; Kim, Dohyeun; et al, 24th International Conference on Neural Information Processing, ICONIP 2017, pp.759 - 768, Springer Verlag, 2017-11 |
ThisJava: An Extension of Java with Exact Types Na, Hyunik; Ryu, Sukyoung, Asian Symposium on Programming Languages and Systems, Asian Association for Foundation of Software, 2013-12-10 |
Thor's hammer: An ungrounded force feedback device utilizing propeller-induced propulsive force Heo, Seongkook; Chung, Christina; Lee, Geehyuk; Wigdor, Daniel, 2018 CHI Conference on Human Factors in Computing Systems, CHI 2018, pp.525:1 - 525:11, ACM Special Interest Group on Computer-Human Interaction (SIGCHI), 2018-04-25 |
Three Types of Chunking in Korean and Dependency Analysis Based on Lexical Association Yoon, J; Choi, Key-Sun; Song, M, International Conference on Computer Processing of Oriental Languages, pp.59 - 65, 1999 |
Three-dimenstional Metamorphasis between Sweeping Objects Kim, HK; Lee, SY; Shin, Sung-Yong, Proc. KCGS Annual Conference, pp.129 - 136, 1994 |
Threshold Password-based Authenticated Key Exchange using Matrix Park, C; Lee, S; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.39 - 43, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24 |
Threshold Password-Based Authentication Using Bilinear Pairings Lee, Songwon; Yang, Jeongkyu; Kim, Kwangjo, CSS2003, pp.19-24, 2003-10 |
Threshold Signature에 관한 연구 홍성민; 윤현수, KIMICS(Korea Institute Maritime Information & Communication Science) Conference, pp.315 - 320, 한국해양정보통신학회, 1998 |
Throttle and preempt: A new flow control for real-time communications in wormhole networks Song, H; Kwon, B; Yoon, Hyunsoo, Proceedings of the 1997 International Conference on Parallel Processing, pp.198 - 202, IEEE, 1997-09-11 |
Throughhand: 2d tactile interaction to simultaneously recognize and touch multiple objects Jung, Jingun; Son, Sunmin; Lee, Sangyoon; Kim, Yeonsu; Lee, Geehyuk, 2021 CHI Conference on Human Factors in Computing Systems: Making Waves, Combining Strengths, CHI 2021, pp.1 - 13, Association for Computing Machinery, 2021-05-08 |
Throughput Analysis of Tree-based Protocols for Many-to-many Reliable Multicast Yoon, W; Lee, DongMan; Youn, HY; Koh, SJ, ICC 2002, pp.2523 - 2527, 2002-04 |
Tight Security Bounds for Double-Block Hash-then-Sum MACs Kim, Seongkwang; Lee, Byeonghak; Lee, Jooyoung, 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, pp.435 - 465, Springer International Publishing, 2020-05-13 |
Time Complexity Analysis of S-chain Model for Volume Haptic Rendering Kim, SY; Park, Jinah; Kwon, DS, Conf. On Human - Computer Interaction, pp.0 - 0, 2003 |
Time Delay On-demand Multipath Routing Protocol in Mobile Ad-hoc Networks Cho, Woncheol; Kim, Daeyoung; Kim, Taehong; Kim, Seonghoon, International Conference on Ubiquitous and Future Network, pp.55 - 60, IEEE, 2011-06-15 |
Time synchronization for SHCS-MAC based multi-hop cognitive radio networks Ahn, Jaeho; Kwon, Kiwoong; Hoh, Mi-Jeong; Kim, Daeyoung, 14th IEEE Annual Consumer Communications and Networking Conference, CCNC 2017, pp.1018 - 1019, Institute of Electrical and Electronics Engineers Inc., 2017-01 |
Time-Aware Representation Learning for Time-Sensitive Question Answering Son, Jungbin; Oh, Alice Haeyun, The 2023 Conference on Empirical Methods in Natural Language Processing, Association for Computational Linguistics, 2023-12 |
Timeline Scheduling for Out-of-Core Ray Batching Son, Myungbae; Yoon, Sung-Eui, 9th Conference on High Performance Graphics, HPG 2017, pp.1 - 10, Association for Computing Machinery, Inc, 2017-07-28 |
Timing and fault attacks on lattice-based cryptographic libraries An, Hyeongcheol; Kim, Sungsook; Lee, Jeeun; Choi, Rakyong; Kim, Kwangjo, 2017 Symposium on Cryptography and Information Security (SCIS 2017), IEICE Technical Committee on Information Security, 2017-01-25 |
Tipping Point of Information Spreading in Random Clustered Networks with Heterogeneous Contact Rates Lim Sungsu; Jung Kyomin, The 3rd Workshop on Complex Networks, CompleNet, 2012-03 |
TLB Index-based Tagging for Cache Energy Reduction Lee, Jongmin; Hong, Seokin; Kim, Soontae, ACM/IEEE International Symposium on Low Power Electronics and Design, pp.85 - 90, IEEE-CAS and ACM-SIGDA, 2011-08-01 |
Discover