Showing results 1619 to 1638 of 4066
I Share, You Care: Private Status Sharing and Sender-Controlled Notifications in Mobile Instant Messaging Cho, Hyunsung; Oh, Jinyoung; Kim, Juho; Lee, Sung-Ju, Proceedings of the ACM on Human-Computer Interaction, v.4, no.1, 2020-05 |
I-Eng: an interactive toy for second-language learning Jeong, Hayeon; Saakes, Daniel Pieter; Lee, Uichin, INTERACTIONS, v.23, no.2, pp.14 - 15, 2016-03 |
I/O Efficient Structural Clustering and Maintenance of Clusters for Large-scale Graphs Seo, Junghyuk; Kim, Myoung Ho, EXPERT SYSTEMS WITH APPLICATIONS, v.168, pp.114221, 2021-04 |
I/O-Efficient Algorithms on Triangle Listing and Counting Hu, Xiaocheng; Tao, Yufei; Chung, Chin-Wan, ACM TRANSACTIONS ON DATABASE SYSTEMS, v.39, no.4, 2014-12 |
IAPS: Interference Aware Power Saving for High-Efficiency Wireless LANs in Dense Networks Lee, Il-Gu; Kim, Myungchul, IEEE COMMUNICATIONS LETTERS, v.19, no.12, pp.2238 - 2241, 2015-12 |
ICCD: Interactive Continuous Collision Detection between Deformable Models Using Connectivity-Based Culling Tang, Min; Curtis, Sean; Yoon, Sung-Eui; Manocha, Dinesh, IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, v.15, no.4, pp.544 - 557, 2009 |
ICU/COWS: A distributed transactional workflow system supporting multiple workflow types Han, Dongsoo; Shim, J; Yu, C, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E83D, no.7, pp.1514 - 1525, 2000-07 |
ID-Based Blind Signature and Ring Signature from Pairings Zhang, Fangguo; Kim, Kwangjo, Lecture Notes in Computer Science, Vol.2501, pp.629-637, 2002 |
ID-based distributed "magic ink" signature from pairings Xie, Yan; Zhang, Fangguo; Chen, Xiaofeng; Kim, Kwangjo, INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2836, pp.249 - 259, 2003 |
ID-based, blind signature and ring signature from pairings Zhang, Fangguo; Kim, Kwangjo, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2501, pp.533 - 547, 2002 |
Identification of Boundaries in Parallel Noun Phrases: A Probabilistic Swapping Model YONG-SEOK CHOI; JI-AE SHIN; Choi, Key-Sun, INTERNATIONAL JOURNAL OF COMPUTER PROCESSING OF ORIENTAL LANGUAGES, v.19, no.2-3, pp.109 - 132, 2006 |
Identification of quality improvement strategies using COPQ in software industry Seo, YeongSeok; Shin, Donghwan; Kim, Gookhyun; Baik, Jongmoon; Bae, Doo-Hwan, INTERNATIONAL JOURNAL OF PERFORMABILITY ENGINEERING, v.8, no.6, pp.679 - 688, 2012-11 |
Identifying Crime-prone Areas Based on Tweet Sentiments Kim, Jaewoo; Cha, Meeyoung; Lee, Won Jae; Sandholm, Thomas, TELECOMMUNICATIONS REVIEW, v.24, no.3, pp.339 - 347, 2014-06 |
Identifying helpful reviews based on customer's mentions about experiences Min, Hye-Jin; Park, Jong Cheol, EXPERT SYSTEMS WITH APPLICATIONS, v.39, no.15, pp.11830 - 11838, 2012-11 |
Identity-based chameleon hashing and signatures without key exposure Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Tian, Haibo; Li, Jin; Kim, Kwangjo, INFORMATION SCIENCES, v.265, pp.198 - 210, 2014-05 |
IEEE 802.11b WLAN performance with variable transmission rates: In view of high level throughput Kim, N; Choi, S; Yoon, Hyunsoo, NETWORKING - ICN 2005, PT 2 Book Series: LECTURE NOTES IN COMPUTER SCIENCE, v.3421, pp.1080 - 1087, 2005 |
IEEE-1394 버스의 가용 등시성 대역폭을 활용하기 위한 대역폭 훔치기와 ABR-1394 전송모드 강성일; 이윤직; 이흥규; 강성봉, 한국정보처리학회논문지, v.6, no.6, pp.1609 - 1621, 1999-06 |
IEEE-1394 직렬 버스를 이용한 화상 전화 시스템의 구현 강성일; 편기현; 이충훈; 이흥규; 강성봉, 정보과학회논문지 : 컴퓨팅의 실제 및 레터, v.5, no.3, pp.351 - 369, 1999-06 |
IEEE1394/UPnP software bridge Kim, D; Park, JH; Yevgen, P; Moon, K; Lee, Young-Hee, IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, v.51, no.1, pp.319 - 323, 2005-02 |
ILoA: Indoor Localization Using Augmented Vector of Geomagnetic Field Lee, Sangjae; Chae, SeungWoo; Han, Dong-Soo, IEEE ACCESS, v.8, pp.184242 - 184255, 2020-10 |
Discover