CS-Journal Papers(저널논문)

Recent Items

Collection's Items (Sorted by Submit Date in Descending order): 3401 to 3420 of 4065

3401
The ring authenticated encryption scheme – How to provide a clue wisely

Lv, Jiqiang; Ren, Kui; Chen, Xiaofeng; Kim, Kwangjo, Information Sciences, Vol.179, pp.161-168, 2009

3402
A unified handling of immiscible and miscible fluids

Park, Jinho; Kim, Younghwi; Wi, Daehyeon; Kang, Nahyup; Shin, Sung-Yong; Noh, Junyong, COMPUTER ANIMATION AND VIRTUAL WORLDS, v.19, no.3-4, pp.455 - 467, 2008-08

3403
Bounds on the Geometric Mean of Arc Lengths for Bounded-Degree Planar Graphs

Hasan, Mohammad Khairul; Yoon, Sung-Eui; Chwa, Kyung-Yong, 2011-06-29

3404
BACS: Split channel based overlay multicast for multimedia streaming

Joongsoo, L.; Xuan, T.H.; Lee, Young-Hee, LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS), v.3961 LNCS, no.0, pp.965 - 974, 2006

3405
HAIAN: Hash-based auto configuration by integrating addressing and naming resolution for mobile ad hoc networks

Kim, N; Kang, S; Lee, Young-Hee, UNIVERSAL MULTISERVICE NETWORKS, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3262, pp.531 - 539, 2004

3406
Interactive View-Dependent Rendering with Conservative Occlusion Culling in Complex Environments

Yoon, Sung-Eui; Salomon, Brian; Manocha, Dinesh, 2011-05-30

3407
Concolic testing of the multi-sector read operation for flash storage platform software

Kim, Moon-Zoo; Kim, Yun-Ho; Choi, Yun-Ja, FORMAL ASPECTS OF COMPUTING, v.24, no.3, pp.355 - 374, 2012-05

3408
Cache-efficient layouts of bounding volume hierarchies

Yoon, Sung-Eui; Manocha, Dinesh, COMPUTER GRAPHICS FORUM, v.25, no.3, pp.507 - 516, 2006

3409
Phase transition in a random NK landscape model

Choi, SS; Jung, Kyomin; Kim, JH, ARTIFICIAL INTELLIGENCE, v.172, pp.179 - 203, 2008-02

3410
Receipt-free Electronic Voting Scheme with A Tamper-Resistant Randomizer

Lee, Byoungcheon; Kim, Kwangjo, ICISC, 2002

3411
Providing Receipt-freeness in Mixnet-based Voting Protocols

Lee, Byoungcheon; Boyd, Colin; Dawson, Ed; Kim, Kwangjo, 2011-05-04

3412
Cache-Oblivious Ray Reordering

Moon, Bochang; Byun, Y; Kim, Tae-Joon; Claudio, P; Kim, HS; Ban, YJ; Nam, SW; et al, ACM TRANSACTIONS ON GRAPHICS, v.29, 2010-06

3413
Java-MaC: A run-time assurance approach for Java programs

Kim, Moonzoo; Viswanathan, M; Kannan, S; Lee, I; Sokolsky, O, FORMAL METHODS IN SYSTEM DESIGN, v.24, pp.129 - 155, 2004-03

3414
센서 네트워크 기술

김대영; 도윤미; 박노성; 이상수; Long, Pham Minh; Bach, Dui Buy; Ozturk, Faith, 정보처리학회지, v.10, no.4, pp.85 - 96, 2003-07

3415
Performance analysis of the UPC/NPC algorithm for guaranteed QoS in ATM networks

Kim, Y; Kim, JK; Lee, Young-Hee; Park, CH, ETRI JOURNAL, v.20, no.3, pp.251 - 271, 1998-09

3416
Knowledge-based AOP framework for business rule aspects in business process

Park, C; Choi, Ho-Jin; Lee, Danhyung; Kang, Sungwon; Cho, HK; Sohn, JC, ETRI JOURNAL, v.29, pp.477 - 488, 2007-08

3417
A semantic service discovery network for large-scale ubiquitous computing environments

Kang, S; Kim, D; Lee, Young-Hee; Hyun, SoonJoo; Lee, DongMan; Lee, B, ETRI JOURNAL, v.29, pp.545 - 558, 2007-10

3418
Name-based autoconfiguration for mobile ad hoc networks

Kim, N; Kang, S; Lee, Young-Hee; Lee, B; Odu, BO, ETRI JOURNAL, v.28, pp.243 - 246, 2006-04

3419
Secure mobile agent using strong non-designated proxy signature

Lee, Byoungcheon; Kim, Heesun; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2119, pp.474 - 486, 2001-07

3420
Monitoring, checking, and steering of real-time systems

Kim, Moonzoo; Lee, lnsup; Sammapun, Usa; Shin, Jangwoo; Sokolsky, Oleg, ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, v.70, no.4, pp.101 - 117, 2002-12

Discover

Type

Open Access

Date issued

. next

rss_1.0 rss_2.0 atom_1.0