Showing results 8581 to 8600 of 16144
Predictive Morphological Analysis of Korean Choi, Key-Sun, The 3rd Paci. Rim Int'l Conf. on Arti. Intelli., PRICAI 94, 1994 |
Predictive Morphological Analysis of Korean with Dynamic Programming deok-bong kim; key-sun choi; kang-hyuk lee, 인지과학, v.5, no.1, pp.145 - 180, 1994-12 |
Predictive Mutation Analysis via the Natural Language Channel in Source Code Kim, Jinhan; Jeon, Juyoung; Hong, Shin; Yoo, Shin, ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, v.31, no.4, pp.1 - 27, 2022-10 |
Predictive Power of Public Emotions Extracted from Daily News Articles on Movements of Stock Market Indices Wong, Chayanin; Ko, In Young, 2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI’16), pp.705 - 708, IEEE/WIC/ACM, 2016-10-15 |
Predictive Precharging for Bitline Leakage Energy Reduction Kim, Soontae; Vijaykrishnan, N.; Kandemir, M.; Irwin, M.J., 15th Annual IEEE International ASIC/SOC Conference, 2002. , pp.36 - 40, 2002-09 |
Predictive routing for mobile sinks in wireless sensor networks: a milestone-based approach Shin, Kwnagcheol; Kim, Soontae, JOURNAL OF SUPERCOMPUTING, v.62, no.3, pp.1519 - 1536, 2012-12 |
Predictive 관계를 이용한 LL 문법으로의 변환이 가능한 문법들의 특징화 이경옥; 최광무, '92 프로그래밍언어연구회 학술발표논문집 , 한국정보과학회 프로그래밍언어연구회 , 숭실대학교, pp.100 - 112, 1992 |
Preemptive Real-Time Scheduling Incorporating Security Constraint for Cyber Physical Systems Baek, Hyeongboo; Lee, Jaewoo; Lee, Yongjae; Yoon, Hyunsoo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E99D, no.8, pp.2121 - 2130, 2016-08 |
Preemptive real-time scheduling incorporating security constraint for cyber physical systems = 사이버 물리 시스템을 위한 보안 제약 사항을 통합한 실시간 스케줄링 기법 연구link Baek, Hyeongboo; 백형부; et al, 한국과학기술원, 2016 |
Preface to the special issue: Continuity, Computability, Constructivity: From Logic to Algorithms 2014 Bauer, Andrej; Berger, Ulrich; Fouche, Willem; Spreen, Dieter; Tsuiki, Hideki; Ziegler, Martin A., JOURNAL OF LOGIC AND ANALYSIS, v.9, 2017-04 |
Preference and Artifact Analysis for Video Transitions of Places Tompkin, James; Kim, Min-Hyuk; Kim, Kwang-In; Kautz, Jan; Theobalt, Christian, ACM TRANSACTIONS ON APPLIED PERCEPTION, v.10, no.3, 2013-08 |
Preferential packet drop for improving throughput in multi-hop ad hoc networks = 멀티홉 애드혹 네트워크에서 전송율을 높이기 위한 패킷 우선 드랍link Lee, Jin-Kyu; 이진규; et al, 한국과학기술원, 2006 |
Prefetch-aware on-chip networks for multi-core architecture = 프리페치를 고려한 온 칩 네트워크 디자인link Lee, Jung-Hoon; 이정훈; et al, 한국과학기술원, 2011 |
Prefetch-aware on-chip networks for multi-core architecture = 프리페치를 고려한 온 칩 네트워크 디자인link Lee, Jung-Hoon; 이정훈; et al, 한국과학기술원, 2011 |
PrefetchGuide: capturing navigational access patterns for prefetching in client/server object-oriented/object-relational DBMSs Han, WS; Moon, YS; Whang, Kyu-Young, INFORMATION SCIENCES, v.152, pp.47 - 61, 2003-06 |
Prefetching based on the type-level access pattern in object-relational DBMSs Han, W.-S.; Whang, Kyu-Young; Moon, Y.-S.; Song, I.-Y., 17th International Conference on Data Engineering, pp.651 - 660, International Conference on Data Engineering, 2001-04-02 |
Prefetching effect on software shared memory over VIA = VIA를 기반으로 하는 소프트웨어 분산공유 메모리 시스템에서의 선인출 효과link Azougagh, Driss; 드리스; et al, 한국과학기술원, 2002 |
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme Fan, JL; Xu, J; Ammar, MH; Moon, Sue Bok, COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, v.46, no.2, pp.253 - 272, 2004-10 |
Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme Xu, Jun (Jim); Fan, Jinliang; Ammar, Mostafa H; Moon, Sue Bok, 10th IEEE International Conference on Network Protocols (ICNP 2002), pp.280 - 289, IEEE Computer Society, 2002-11 |
Preimage resistance of LPmkr with r = m-1 Lee, Jooyoung; Park, Je Hong, INFORMATION PROCESSING LETTERS, v.110, no.14-15, pp.602 - 608, 2010-07 |
Discover