Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 31-40 of 40 (Search time: 0.007 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
31
A method for consistent design of user interaction with multifunction devices

Kim, D.S.; Yoon, Wan Chul, 1st International Conference on Human Centered Design, HCD 2009. Held as Part of HCI International 2009, pp.202 - 211, 123, 2009-07-19

32
Equipment models for fab level proudction simulation: Practical features and computational tractability

Morrison, James R, 2009 Winter Simulation Conference, WSC 2009, pp.1581 - 1591, 123, 2009-12-13

33
Usser-viewing characteristics aware resource allocation for mobile IPTV in WMNs

Lee, Chae Young; Oh, KJ, 2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009, 123, 2009-01-10

34
HLA/RTI-based BPM middleware for collaborative business process management

Choi, Byoung Kyu; Lee, Duckwoong; Kang, Dong Hun, Business Process Management Workshops - BPM 2009 International Workshops, pp.295 - 304, Business Process Management Workshops, 2009-09-07

35
Regular flow line models for semiconductor cluster tools: A case of lot dependent process times

Morrison, James R, 2009 IEEE International Conference on Automation Science and Engineering, CASE 2009, pp.561 - 566, 123, 2009-08-22

36
Temporal issue trend identifications in blogs

Moon, Il-Chul; Kim, Young-Min; Lee, Hyun-Jong; Oh, Alice H., 2009 IEEE International Conference on Social Computing, SocialCom 2009, pp.616 - 626, Symposium on Social Computing Applications, 2009-08-29

37
Simulation Analysis on Destabilization of Complex Adaptive Organizations

Moon, Il-Chul, IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, CISDA, 2009-07-08

38
Mining Social Networks for Personalized Email Prioritization

Yoo, Shinjae; Yang, Yiming; Lin, Frank; Moon, Il-Chul, 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '09, pp.967 - 976, ACM Special Interest Group on Knowledge Discovery and Data Mining (SIGKDD), 2009-06-28

39
Monitoring node selection algorithm for intrusion detection in congested sensor network

Choi, J.; Lee, M.; Kim, G.; Kim, Sehun, SECRYPT 2009 - International Conference on Security and Cryptography, pp.117 - 120, SECURYPT, 2009-07-07

40
A REAL-TIME INTRUTION DETECTION SYSTEM USING FEATURE SELECTION METHOD

Lee, Sangjae; Kim, Gisung; Kim, Sehun, IADIS International Conference Information Systems 2009, IADIS press, 2009-02-24

rss_1.0 rss_2.0 atom_1.0