Showing results 5421 to 5440 of 7494
Three Types of Chunking in Korean and Dependency Analysis Based on Lexical Association Yoon, J; Choi, Key-Sun; Song, M, International Conference on Computer Processing of Oriental Languages, pp.59 - 65, 1999 |
Three-dimenstional Metamorphasis between Sweeping Objects Kim, HK; Lee, SY; Shin, Sung-Yong, Proc. KCGS Annual Conference, pp.129 - 136, 1994 |
Threshold Password-based Authenticated Key Exchange using Matrix Park, C; Lee, S; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.39 - 43, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24 |
Threshold Password-Based Authentication Using Bilinear Pairings Lee, Songwon; Yang, Jeongkyu; Kim, Kwangjo, CSS2003, pp.19-24, 2003-10 |
Threshold Signature에 관한 연구 홍성민; 윤현수, KIMICS(Korea Institute Maritime Information & Communication Science) Conference, pp.315 - 320, 한국해양정보통신학회, 1998 |
Throttle and preempt: A new flow control for real-time communications in wormhole networks Song, H; Kwon, B; Yoon, Hyunsoo, Proceedings of the 1997 International Conference on Parallel Processing, pp.198 - 202, IEEE, 1997-09-11 |
Throughhand: 2d tactile interaction to simultaneously recognize and touch multiple objects Jung, Jingun; Son, Sunmin; Lee, Sangyoon; Kim, Yeonsu; Lee, Geehyuk, 2021 CHI Conference on Human Factors in Computing Systems: Making Waves, Combining Strengths, CHI 2021, pp.1 - 13, Association for Computing Machinery, 2021-05-08 |
Throughput Analysis of Tree-based Protocols for Many-to-many Reliable Multicast Yoon, W; Lee, DongMan; Youn, HY; Koh, SJ, ICC 2002, pp.2523 - 2527, 2002-04 |
Tight Security Bounds for Double-Block Hash-then-Sum MACs Kim, Seongkwang; Lee, Byeonghak; Lee, Jooyoung, 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, pp.435 - 465, Springer International Publishing, 2020-05-13 |
Time Complexity Analysis of S-chain Model for Volume Haptic Rendering Kim, SY; Park, Jinah; Kwon, DS, Conf. On Human - Computer Interaction, pp.0 - 0, 2003 |
Time Delay On-demand Multipath Routing Protocol in Mobile Ad-hoc Networks Cho, Woncheol; Kim, Daeyoung; Kim, Taehong; Kim, Seonghoon, International Conference on Ubiquitous and Future Network, pp.55 - 60, IEEE, 2011-06-15 |
Time synchronization for SHCS-MAC based multi-hop cognitive radio networks Ahn, Jaeho; Kwon, Kiwoong; Hoh, Mi-Jeong; Kim, Daeyoung, 14th IEEE Annual Consumer Communications and Networking Conference, CCNC 2017, pp.1018 - 1019, Institute of Electrical and Electronics Engineers Inc., 2017-01 |
Time-Aware Representation Learning for Time-Sensitive Question Answering Son, Jungbin; Oh, Alice Haeyun, The 2023 Conference on Empirical Methods in Natural Language Processing, Association for Computational Linguistics, 2023-12 |
Timeline Scheduling for Out-of-Core Ray Batching Son, Myungbae; Yoon, Sung-Eui, 9th Conference on High Performance Graphics, HPG 2017, pp.1 - 10, Association for Computing Machinery, Inc, 2017-07-28 |
Timing and fault attacks on lattice-based cryptographic libraries An, Hyeongcheol; Kim, Sungsook; Lee, Jeeun; Choi, Rakyong; Kim, Kwangjo, 2017 Symposium on Cryptography and Information Security (SCIS 2017), IEICE Technical Committee on Information Security, 2017-01-25 |
Tipping Point of Information Spreading in Random Clustered Networks with Heterogeneous Contact Rates Lim Sungsu; Jung Kyomin, The 3rd Workshop on Complex Networks, CompleNet, 2012-03 |
TLB Index-based Tagging for Cache Energy Reduction Lee, Jongmin; Hong, Seokin; Kim, Soontae, ACM/IEEE International Symposium on Low Power Electronics and Design, pp.85 - 90, IEEE-CAS and ACM-SIGDA, 2011-08-01 |
TM-Coin: Trustworthy management of TCB measurements in IoT Park, Jaemin; Kim, Kwangjo, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), IEEE Computer Society, 2017-03 |
TMRCC: A Congestion Control Mechanism for Tree-based Many-to-many Reliable Multicast Protocols Lee, DongMan; Yu, JY; Kang, K, IEEE IPCCC 2003, pp.41 - 48, 2003-04 |
TNPU: Supporting Trusted Execution with Tree-less Integrity Protection for Neural Processing Unit Lee, Sunho; Kim, Jungwoo; Na, Seonjin; Park, Jongse; Huh, Jaehyuk, 28th Annual IEEE International Symposium on High-Performance Computer Architecture (HPCA), pp.229 - 243, IEEE COMPUTER SOC, 2022-04-04 |
Discover