Results 31-40 of 40 (Search time: 0.007 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
A method for consistent design of user interaction with multifunction devices Kim, D.S.; Yoon, Wan Chul, 1st International Conference on Human Centered Design, HCD 2009. Held as Part of HCI International 2009, pp.202 - 211, 123, 2009-07-19 | |
Equipment models for fab level proudction simulation: Practical features and computational tractability Morrison, James R, 2009 Winter Simulation Conference, WSC 2009, pp.1581 - 1591, 123, 2009-12-13 | |
Usser-viewing characteristics aware resource allocation for mobile IPTV in WMNs Lee, Chae Young; Oh, KJ, 2009 6th IEEE Consumer Communications and Networking Conference, CCNC 2009, 123, 2009-01-10 | |
HLA/RTI-based BPM middleware for collaborative business process management Choi, Byoung Kyu; Lee, Duckwoong; Kang, Dong Hun, Business Process Management Workshops - BPM 2009 International Workshops, pp.295 - 304, Business Process Management Workshops, 2009-09-07 | |
Regular flow line models for semiconductor cluster tools: A case of lot dependent process times Morrison, James R, 2009 IEEE International Conference on Automation Science and Engineering, CASE 2009, pp.561 - 566, 123, 2009-08-22 | |
Temporal issue trend identifications in blogs Moon, Il-Chul; Kim, Young-Min; Lee, Hyun-Jong; Oh, Alice H., 2009 IEEE International Conference on Social Computing, SocialCom 2009, pp.616 - 626, Symposium on Social Computing Applications, 2009-08-29 | |
Simulation Analysis on Destabilization of Complex Adaptive Organizations Moon, Il-Chul, IEEE Symposium on Computational Intelligence for Security and Defense Applications, CISDA 2009, CISDA, 2009-07-08 | |
Mining Social Networks for Personalized Email Prioritization Yoo, Shinjae; Yang, Yiming; Lin, Frank; Moon, Il-Chul, 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '09, pp.967 - 976, ACM Special Interest Group on Knowledge Discovery and Data Mining (SIGKDD), 2009-06-28 | |
Monitoring node selection algorithm for intrusion detection in congested sensor network Choi, J.; Lee, M.; Kim, G.; Kim, Sehun, SECRYPT 2009 - International Conference on Security and Cryptography, pp.117 - 120, SECURYPT, 2009-07-07 | |
A REAL-TIME INTRUTION DETECTION SYSTEM USING FEATURE SELECTION METHOD Lee, Sangjae; Kim, Gisung; Kim, Sehun, IADIS International Conference Information Systems 2009, IADIS press, 2009-02-24 |
Discover