Showing results 11441 to 11460 of 16112
What Mobile Ads Know About Mobile Users Son, Sooel; Kim, Daehyeok; Shmatikov, Vitaly, The Network and Distributed System Security Symposium, NDSS, Internet Society, 2016-02-23 |
What situational information would help developers when using a graphical code recommender? Lee, Seonah; Kang, Sungwon, JOURNAL OF SYSTEMS AND SOFTWARE, v.117, pp.199 - 217, 2016-07 |
What's Happening: Finding Events Nearby Using Twitter Kim, Taehyun; Gonzalo Huerta-Canepa; Park, Jongheon; Hyun, SoonJoo; Lee, DongMan, IEEE International Conference on Social Computing 2011 (SocialCom 2011), IEEE Computer Society, 2011-10-09 |
What's Happening: Finding Spontaneous User Clusters Nearby Using Twitter Kim, Taehyun; Huerta-Canepa, G; Park, Jongheon; Hyun, SoonJoo; Lee, Dongman, 2011 IEEE Third International Confernece on Social Computing (SocialCom), pp.806 - 809, IEEE, 2011-10-11 |
When Daily Deal Services Meet Twitter: Understanding Twitter as a Daily Deal Marketing Platform Park, Jaime Yejean; Chung, Chin-Wan, 3rd Annual ACM Web Science Conference (WebSci), pp.233 - 242, ACM WebSci 2012, 2012-06-22 |
When Does it Become Harassment?: An Investigation of Online Criticism and Calling Out in Twitter Kim, Haesoo; Kim, Hae Eun; Kim, Juho; Jang, Jeong-woo, Proceedings of the ACM on Human-Computer Interaction, v.6, no.CSCW2, pp.1 - 32, 2022-11 |
Who can survive in CAESAR competition at round zero? Kim, HakJu; Kim, Kwangjo, SCIS2014, v.31, The Institute of Electronics, Information and Communication Engineers (IEICE), 2014-01-21 |
Who Moderates on Twitch and What Do They Do? Seering, Joseph; Kairam, Sanjay R, The ACM international conference on Supporting Group Work, pp.1 - 18, Association for Computing Machinery (ACM), 2023-01-08 |
Who Should Pay When Machines Cause Harm? Laypeople’s Expectations of Legal Damages for Machine-Caused Harm Lima, Gabriel; Grgic-Hlaca, Nina; Jeong, Jin Keun; Cha, Meeyoung, 6th ACM Conference on Fairness, Accountability, and Transparency, FAccT 2023, Association for Computing Machinery, 2023-06-15 |
Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO Lee, Sangsup; Kim, Daejun; Kim, Dongkwan; Son, Sooel; Kim, Yongdae, Workshop on Offensive Technologies, USENIX, 2019-08-13 |
Why is the winner the best Matthias Eisenmann; Park, Jinah; Cho, Jihoon, 2023 Computer Vision and Pattern Recognition Conference (CVPR), pp.19955 - 19966, IEEE, 2023-06-22 |
Why Knowledge Distillation Amplifies Gender Bias and How to Mitigate from the Perspective of DistilBERT Ahn, Jaimeen; Lee, Hwaran; Kim, Jinhwa; Oh, Alice Haeyun, 2022 Annual Conference of the North American Chapter of the Association for Computational Linguistics, pp.266 - 272, The North American Chapter of the Association for Computational Linguistics, 2022-07-14 |
Why not to use zero imputation? correcting sparsity bias in training neural networks = 제로 임퓨테이션의 희소성 편향 보정을 통한 인공 신경망의 누락 데이터 처리link Yi, Joonyoung; Yang, Eunho; et al, 한국과학기술원, 2020 |
Why train-and-select when you can use them all? ensemble model for fault localisation Sohn, Jeongju; Yoo, Shin, the Genetic and Evolutionary Computation Conference, pp.1408 - 1416, ACM Press, 2019-07-15 |
Wi-Fi Fingerprint-based Approaches Following Log-Distance Path Loss Model for Indoor Positioning Jung, SH; Lee, CO; Han, Dong Soo, 2011 IEEE MTT-S International Microwave Workshop Series on Intelligent Radio for Future Personal Terminals (IMWS-IRFPT), pp.62 - 63, IEEE, 2011-08-24 |
Wi-Fi Intrusion Detection Using Weighted-Feature Selection for Neural Networks Classifier Muhamad Erza, Aminanto; Tanuwidjaja, Harry; Paul D Yoo; Kim, Kwangjo, International Workshop on Big Data and Information Security 2017 (IWBIS 2017), University of Indonesia, 2017-09-23 |
Wi-Fi 기반 실내 측위를 위한 QR코드를 활용한 라디오 맵 구성 한동수; 성락민; 이민규, 2012년 추계학술대회, ITS(교통.자동차.전자.정보의 융합), pp.76 - 78, (사)한국ITS학회, 2012-11-03 |
Wide dynamic range high-speed three-dimensional quantitative OCT angiography with a hybrid-beam scan Park, Tae Jin; Jang, Sun Joo; Han, Myounghee; Ryu, Sukyoung; Oh, Wang-Yuhl, OPTICS LETTERS, v.43, no.10, pp.2237 - 2240, 2018-05 |
Widening with thresholds via binary search Kim, Sol; Heo, Kihong; Oh, Hakjoo; Yi, Kwangkeun, SOFTWARE-PRACTICE & EXPERIENCE, v.46, no.10, pp.1317 - 1328, 2016-10 |
WIE: A Java Agent for Web Information Extraction Service Hyun, SoonJoo; Kim, Gyu-Baek, DWACOS99, pp.0 - 0, 1999-08-01 |
Discover