Showing results 78461 to 78480 of 203333
How to Measure the Network Vulnerability of Cities to Wildfires: Cases in California, USA Yun, Jeongin; Lee, Jooyoung; Park, Jangseop; Chung, Koohong; Lee, Jinwoo, TRANSPORTATION RESEARCH RECORD, v.2676, no.12, pp.382 - 395, 2022-12 |
How to Measure the Vulnerability of Cities to Wildfires: Cases in California Yun, Jeongin; Lee, Jooyoung; Park, Jangseop; Chung, Koohong; Lee, Jinwoo, Transportation Research Board 101st Annual Meeting, Transportation Research Board, 2022-01-10 |
How to Protect ADS-B: Confidentiality Framework and Efficient Realization Based on Staged Identity-Based Encryption Baek, Junsang; Hableel, Eman; Byon, Youngji; Wong, Duncan; Jang, Kitae; Yeo, Hwasoo, IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, v.18, no.3, pp.690 - 700, 2017-03 |
How to Report App Feedback? Analyzing Feedback Reporting Behavior Oh, Jeungmin; Lee, Sang Jeong; Lee, Uichin, ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), ACM Special Interest Group on Computer-Human Interaction (SIGCHI), 2016-05-09 |
How to set up collaborations between academia and industrial biotech companies Pronk, Jack T.; Lee, Sang-Yup; Lievense, Jeff; Pierce, John; Palsson, Bernhard; Uhlen, Mathias; Nielsen, Jens, NATURE BIOTECHNOLOGY, v.33, no.3, pp.237 - 240, 2015-03 |
How to Strengthen DES against Two Robust Attacks Kim, Kwangjo; Lee, S; Park, S; Lee, D, 1995 Korea-JapanJoint Workshop onInformation Security and Cryptology (JW-ISC'95), 1995-01-24 |
How to Support Object-Oriented Programming in Many-Sorted Logic 조정완, Proceedings of KISS Conference, pp.341 - 344, 1991 |
How to synthesize an optimized genetic λ-switch system? A system-theoretic approach based on SQP Cho, Kwang-Hyun; Cha, JH; Wolkenhauer, O, 1st Int. Workshop on Computational Methods in Systems Biology (CMSB2003), pp.170 - 170, 2003-02 |
How to Trade off Aesthetics and Performance in Generative Design? Shin, Dongju; Yoo, Soyoung; Lee, Sunghee; Kim, Minyoung; Hwang, Kwang Hyeon; Park, Jong Ho; Kang, Namwoo, The 2021 World Congress on Advances in Structural Engineering and Mechanics (ASEM21), IASEM, KAIST, KTA, SNU DAAE, 2021-08-24 |
How to Use Exponent Permutations in Cryptography-classification and Applications Park,SW; Lee, S; Kim, Kwangjo, Proc. of International Conference on Cryptology and Information Security, 1996-12-19 |
How Transitive Are Real-World Group Interactions? - Measurement and Reproduction Kim, Sunwoo; Bu, Fanchen; Choe, Min Young; Yoo, Jaemin; Shin, Kijung, 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, KDD 2023, pp.1132 - 1143, Association for Computing Machinery, 2023-08-08 |
How transitive are real-world group interactions? - measurement and reproduction = 현실세계 그룹 상호작용의 추이성 - 측정과 재현을 중심으로link Kim, Sunwoo; 김선우; et al, 한국과학기술원, 2024 |
How useful is a single entanglement witness? (Conference Presentation) Bae, Joonwoo, Quantum Communications and Quantum Imaging XVI, SPIE, 2018-11-06 |
How users manipulate deformable displays as input devices Lee, Sang-Su; Kim, Sohyun; Jin, Bipil; Choi, Eunji; Kim, Boa; Jia, Xu; Kim, Daeeop; et al, 28th Annual CHI Conference on Human Factors in Computing Systems, pp.1647 - 1656, ACM Special Interest Group on Computer-Human Interaction (SIGCHI), 2010-04-10 |
How video production affects student engagement: An empirical study of MOOC videos Guo, Philip J.; Kim, Juho; Rubin, Rob, 1st ACM Conference on Learning at Scale, L@S 2014, pp.41 - 50, Association for Computing Machinery, 2014-03-04 |
How We Use Together: Coordinating Individual Preferences for Using Shared Devices at Home Lee, Yoomi; Lim, Youn-kyung, DIS '24: Designing Interactive Systems Conference, ACM, 2024-07-05 |
How WEIRD is HCI? Extending HCI principles to other countries and cultures Sturm, Christian; Oh, Alice Haeyun; Linxen, Sebastian; Abdelnour-Nocera, Jose; Dray, Susan; Reinecke, Katharina, 33rd Annual CHI Conference on Human Factors in Computing Systems, CHI EA 2015, pp.2425 - 2428, ACM Special Interest Group on Computer-Human Interaction (SIGCHI), 2015-04 |
How Will Be the Situation Awareness of Operating Team in an Advanced MCR? Seong, Poong-Hyun; Lee, Seung Woo; Kim, Ar Ryum; Kang, Hyun Gook; Park, Jin Kyun, 8th International Topical Meeting on Nuclear Plant Instrumentation, Control and Human-Machine Interface Technologies, ANS, 2012-07-25 |
How will Deep Learning Change Internet Video Delivery? Yeo, Hyunho; Do, Sunghyun; Han, Dongsu, 16th ACM Workshop on Hot Topics in Networks (HotNets), pp.57 - 64, ACM SIGCOMM, 2017-11-30 |
How'd Security Benefit Reverse Engineers? — The Implication of Intel CET on Function Identification Kim, Hyungseok; Lee, Junoh; Kim, Soomin; Jung, SeungIl; Cha, Sang Kil, The 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022, pp.559 - 566, IEEE/IFIP, 2022-06-27 |
Discover