Showing results 5981 to 6000 of 16139
Identifying Input-Dependent Jumps from Obfuscated Execution using Dynamic Data Flow Graphs Hwang, Joonhyung; Han, Tai-Sook, Software Security, Protection, and Reverse Engineering Workshop, pp.3:1 - 3:12, Association for Computing Machinery, 2018-12-04 |
Identifying mentions about long-term experiences and sentiment change on a specific target based on linguistic analysis: application to a product review domain = 언어학적 분석에 기반한 특정 대상에 대한 장기 경험 및 감정 변화 파악: 상품리뷰에의 응용link Min, Hye-Jin; 민혜진; et al, 한국과학기술원, 2012 |
Identifying opinion holders in opinion text from online newspapers Kim, Y.; Jung, Y.; Myaeng, Sung Hyon, 2007 IEEE International Conference on Granular Computing, GrC 2007, pp.699 - 702, IEEE, 2007-11-02 |
Identifying Photorealistic Computer Graphics using Convolutional Neural Networks Yu, In-Jae; Kim, Do-Guk; Park, Jin-Seok; Hou, Jong-Uk; Choi, Sunghee; Lee, Heung-Kyu, 24th IEEE International Conference on Image Processing (ICIP), pp.4093 - 4097, IEEE Signal Processing Society, 2017-09-17 |
Identifying properties of UML state machine diagrams that affect data and control dependence Kim, Hyun Jeong; Debroy, Vidroha; Bae, Doo-Hwan, 26th Annual ACM Symposium on Applied Computing, SAC 2011, pp.1464 - 1469, ACM, 2011-03-21 |
Identifying traceability between feature model and software architecture in software product line using formal concept analysis Satyananda, T.K.; Lee, Danhyung; Kang, Sungwon; Hashmi, S.I., 2007 International Conference on Computational Science and its Applications, ICCSA 2007, v.0, no.0, pp.380 - 386, IEEE, 2007-08-26 |
Identifying User Interests from Online Social Networks by Using Semantic Clusters Generated from Linked Data Ko, Han-Gyu; Ko, In-Young; Kim, Taehun; Lee, Dongman; Hyun, Soon J., In proceedings of the 1st Workshop on Semantic Social Networks (SSN 2013), Co-located with ICWE 2013, pp.302 - 309, ICWE, 2013-07-08 |
Identifying Users with Application-Specific Command Streams Masri, Alaa El; Wechsler, Harry; Likarish, Peter; Kang, Brent Byunghoon, Twelfth Annual International Conference on Privacy, Security and Trust (PST 2014), IEEE, 2014-07-23 |
Identity Centric Management of Distributed User Created Content Choi, D; Kim, S; Jin, S; Yeo, K; Yoon, Hyunsoo, International Ubiquitous Convergence Conference (IUC 2006), pp.263 - 267, 2006-12-07 |
Identity-based chameleon hash scheme without key exposure Chen, X.; Zhang, F.; Susilo, W.; Tian, H.; Li, J.; Kim, Kwangjo, 15th Australasian Conference on Information Security and Privacy, ACISP 2010, pp.200 - 215, ACISP 2010, 2010-07-05 |
Identity-based chameleon hashing and signatures without key exposure Chen, Xiaofeng; Zhang, Fangguo; Susilo, Willy; Tian, Haibo; Li, Jin; Kim, Kwangjo, INFORMATION SCIENCES, v.265, pp.198 - 210, 2014-05 |
Identity-based secret signature scheme LEE, B.; Li, J.; Kim, Kwangjo, 4th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2009, pp.1080 - 1085, 2009-11-24 |
IDK-MRC: Unanswerable Questions for Indonesian Machine Reading Comprehension PUTRI, RIFKI AFINA; Oh, Alice Haeyun, The 2022 Conference on Empirical Methods in Natural Language Processing, EMNLP 2022, EMNLP, 2022-12 |
IDS와 허니팟을 연동한 관리 시스템 설계 박찬일; 이윤호; 이수진; 최혜은; 윤현수; 이광형; 임채호; et al, 한국정보과학회 춘계 학술대회, pp.72 - 73, 한국정보과학회, 2003-04 |
IEEE 1394 등시성 전송을위한 선점적 우선순위를 이용한 버퍼 제어기법 강성일; 편기현; 이충훈; 이흥규, 한국통신학회, COMSW'98, 한국통신학회, 1998 |
IEEE 1633 및 IEC 61508 기반 국방 소프트웨어 신뢰성 향상 방안 구태환; 복영일; 염재명; 백종문; 신주환, 한국 소프트웨어공학 학술대회, 한국정보과학회, 한국정보처리학회, 2009-02-10 |
IEEE 7th International Conference on Computer and Infomation Technology (CIT 2007) Moon, S; Ko, Y; Lee, DongMan, A Fast Path Recovery Publish/Subscribe Scheme for Mobile Ad-hoc Environments, pp.435 - 440, 2007-10-19 |
IEEE 802.11 무선 네트워크에서 지자기 센서를 사용한 빠른 핸드오프 기법 = Directional handoff using a geomagnetic sensor in ieee 802.11 wireless networkslink 한상엽; Han, Sang-Yup; et al, 한국과학기술원, 2011 |
IEEE 802.11b WLAN performance with variable transmission rates: In view of high level throughput Kim, N; Choi, S; Yoon, Hyunsoo, NETWORKING - ICN 2005, PT 2 Book Series: LECTURE NOTES IN COMPUTER SCIENCE, v.3421, pp.1080 - 1087, 2005 |
IEEE 802.11b WLAN Performance with Variable Transmission Rates: In View of High Level Throughput Kim, Namgi; Choi, Sunwoong; Yoon, Hyunsoo, Lecture Notes in Computer Science, Volume 3421/2005, 1080-1087, 2005-04 |
Discover