Hong, Jaemin; Shim, Sunghwan; Park, Sanguk; Kim, Tae Woo; Kim, Jungwoo; Lee, Junsoo; Ryu, Sukyoung; Kang, Jeehoon, SCIENCE OF COMPUTER PROGRAMMING, v.238, 2024-12
Jeong, Hoyong; Chung, Kiwon; Hwang, Sung Ju; Son, Sooel, COMPUTERS SECURITY, v.144, 2024-09
Jung, Gyuwon; Park, Sangjun; Ma, Eun-Yeol; Kim, Heeyoung; Lee, Uichin, ACM COMPUTING SURVEYS, v.56, no.9, 2024-09
Kim, Minsu; Hwang, Jinwoo; Heo, Guseul; Cho, Seiyeon; Mahajan, Divya; Park, Jongse, PROCEEDINGS OF THE VLDB ENDOWMENT, v.17, no.8, pp.1802 - 1815, 2024-08
HA, TAEWOOK; Kim, Myoung Ho, 정보과학회 컴퓨팅의 실제 논문지, v.30, no.8, pp.347 - 353, 2024-08
Yi, Shinyoung; Kim, Donggun; Na, Jiwoong; Tong, Xin; Kim, Min Hyuk, ACM Transactions on Graphics, v.43, no.4, 2024-07
Son, Sunmin; Jung, Jingun; Ham, Auejin; Lee, Geehyuk, INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, v.40, no.13, pp.3539 - 3551, 2024-07
Kim, Mincheul; Kwon, Youngsun; Lee, Sebin; Yoon, Sung-Eui, IEEE ROBOTICS AND AUTOMATION LETTERS, v.9, no.6, pp.5767 - 5774, 2024-06
Hwang, Soojin; Baek, Daehyeon; Park, Jongse; Huh, Jaehyuk, ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, v.21, no.2, 2024-06
Lee, Juho; Choi, Jin Woo; Jo, Sung-Ho, IEEE TRANSACTIONS ON COGNITIVE AND DEVELOPMENTAL SYSTEMS, v.16, no.3, pp.923 - 934, 2024-06
The ring authenticated encryption scheme – How to provide a clue wisely Lv, Jiqiang; Ren, Kui; Chen, Xiaofeng; Kim, Kwangjo, Information Sciences, Vol.179, pp.161-168, 2009 |
A unified handling of immiscible and miscible fluids Park, Jinho; Kim, Younghwi; Wi, Daehyeon; Kang, Nahyup; Shin, Sung-Yong; Noh, Junyong, COMPUTER ANIMATION AND VIRTUAL WORLDS, v.19, no.3-4, pp.455 - 467, 2008-08 |
Bounds on the Geometric Mean of Arc Lengths for Bounded-Degree Planar Graphs Hasan, Mohammad Khairul; Yoon, Sung-Eui; Chwa, Kyung-Yong, 2011-06-29 |
BACS: Split channel based overlay multicast for multimedia streaming Joongsoo, L.; Xuan, T.H.; Lee, Young-Hee, LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS), v.3961 LNCS, no.0, pp.965 - 974, 2006 |
HAIAN: Hash-based auto configuration by integrating addressing and naming resolution for mobile ad hoc networks Kim, N; Kang, S; Lee, Young-Hee, UNIVERSAL MULTISERVICE NETWORKS, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3262, pp.531 - 539, 2004 |
Interactive View-Dependent Rendering with Conservative Occlusion Culling in Complex Environments Yoon, Sung-Eui; Salomon, Brian; Manocha, Dinesh, 2011-05-30 |
Concolic testing of the multi-sector read operation for flash storage platform software Kim, Moon-Zoo; Kim, Yun-Ho; Choi, Yun-Ja, FORMAL ASPECTS OF COMPUTING, v.24, no.3, pp.355 - 374, 2012-05 |
Cache-efficient layouts of bounding volume hierarchies Yoon, Sung-Eui; Manocha, Dinesh, COMPUTER GRAPHICS FORUM, v.25, no.3, pp.507 - 516, 2006 |
Phase transition in a random NK landscape model Choi, SS; Jung, Kyomin; Kim, JH, ARTIFICIAL INTELLIGENCE, v.172, pp.179 - 203, 2008-02 |
Receipt-free Electronic Voting Scheme with A Tamper-Resistant Randomizer Lee, Byoungcheon; Kim, Kwangjo, ICISC, 2002 |
Providing Receipt-freeness in Mixnet-based Voting Protocols Lee, Byoungcheon; Boyd, Colin; Dawson, Ed; Kim, Kwangjo, 2011-05-04 |
Cache-Oblivious Ray Reordering Moon, Bochang; Byun, Y; Kim, Tae-Joon; Claudio, P; Kim, HS; Ban, YJ; Nam, SW; et al, ACM TRANSACTIONS ON GRAPHICS, v.29, 2010-06 |
Java-MaC: A run-time assurance approach for Java programs Kim, Moonzoo; Viswanathan, M; Kannan, S; Lee, I; Sokolsky, O, FORMAL METHODS IN SYSTEM DESIGN, v.24, pp.129 - 155, 2004-03 |
센서 네트워크 기술 김대영; 도윤미; 박노성; 이상수; Long, Pham Minh; Bach, Dui Buy; Ozturk, Faith, 정보처리학회지, v.10, no.4, pp.85 - 96, 2003-07 |
Performance analysis of the UPC/NPC algorithm for guaranteed QoS in ATM networks Kim, Y; Kim, JK; Lee, Young-Hee; Park, CH, ETRI JOURNAL, v.20, no.3, pp.251 - 271, 1998-09 |
Knowledge-based AOP framework for business rule aspects in business process Park, C; Choi, Ho-Jin; Lee, Danhyung; Kang, Sungwon; Cho, HK; Sohn, JC, ETRI JOURNAL, v.29, pp.477 - 488, 2007-08 |
A semantic service discovery network for large-scale ubiquitous computing environments Kang, S; Kim, D; Lee, Young-Hee; Hyun, SoonJoo; Lee, DongMan; Lee, B, ETRI JOURNAL, v.29, pp.545 - 558, 2007-10 |
Name-based autoconfiguration for mobile ad hoc networks Kim, N; Kang, S; Lee, Young-Hee; Lee, B; Odu, BO, ETRI JOURNAL, v.28, pp.243 - 246, 2006-04 |
Secure mobile agent using strong non-designated proxy signature Lee, Byoungcheon; Kim, Heesun; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2119, pp.474 - 486, 2001-07 |
Monitoring, checking, and steering of real-time systems Kim, Moonzoo; Lee, lnsup; Sammapun, Usa; Shin, Jangwoo; Sokolsky, Oleg, ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, v.70, no.4, pp.101 - 117, 2002-12 |
Discover