Showing results 8981 to 9000 of 16084
Reconsidering Ryu-Takagi RFID authentication protocol Duc, D.N.; Kim, Kwangjo; Yeun, C.Y., 2010 International Conference for Internet Technology and Secured Transactions, ICITST 2010, ICITST 2010, 2010-11-08 |
Reconsidering Ryu-Takagi RFID Authentication Protocol Duc, Dang Nguyen; Yeun, Chan Yeob; Kim, Kwang-Jo, International Journal of Intelligent Computing Research (IJICR), v.1, no.4, 2011 |
Reconstruction of dynamic 3D scene based on visual hull and view morphing Yang, Hyun-Seung; Han, TW; Lee, J, JOURNAL OF VISUALIZATION AND COMPUTER ANIMATION, v.14, pp.139 - 148, 2003-07 |
Reconstruction of execution architecture view using dependency relationships and execution traces Ahn, Hwi; Kang, Sungwon; Lee, Seonah, 33rd Annual ACM Symposium on Applied Computing, SAC 2018, pp.1417 - 1424, Association for Computing Machinery, 2018-04-10 |
Reconstruction of s2DES S-boxes and their Immunity to Differential Cryptanalysis Kim, Kwangjo; Park, S; Lee, S, Korea-Japan Joint Workshop on Informaion Security and Cryptology, v.0, no.0, pp.0 - 0, 1993-10 |
Recovering from failure in temporal planning Choi, Ho-Jin; Liatsos, Vassilis; El-kholy, Amin; Richards, Barry, ECAI-96 Workshop on Cross-fertilization in Planning, pp.31 - 35, European Coordinating Committee for AI (ECCAI), 1996-01-01 |
Recovering Software Product Line Architecture of Product Variants Developed with the Clone-and-Own Approach Lee, Jihyun; Kim, Taeyoung; Kang, Sungwon, 44th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2020, pp.985 - 990, Institute of Electrical and Electronics Engineers Inc., 2020-07 |
RecurFI: 윈도우 바이너리에 대한 효율적 제어흐름 무결성 검사 시스템 홍진아; Cha, Sang Kil; Kim, Kwangjo, 정보보호학회 동계학술대회, 한국정보보호학회, 2016-12-03 |
Recurrent Neural Network for Edge Linking and Enhancement Yang, Hyun-Seung; Kim, HJ, The Second Asian Conference on Vision, 2002-07-22 |
Recurrent Neural Networks With Missing Information Imputation For Medical Examination Data Prediction Kim, Hangyu; Jang, Gil-Jin; Choi, Ho-Jin; Kim, Minho; Kim, Young-Won; Choi, Jaehun, 2017 IEEE International Conference on Big Data and Smart Computing, BigComp 2017, pp.317 - 323, Institute of Electrical and Electronics Engineers Inc., 2017-02-15 |
Recursive Bayesian fire recognition using greedy margin-maximizing clustering Bae, Sujung; Hong, Sungeun; Choi, Yeongjae; Yang, Hyun-Seung, MACHINE VISION AND APPLICATIONS, v.24, no.8, pp.1605 - 1621, 2013-11 |
Recursive Circulant : A New Topology for Multicomputer Networks Chwa, Kyung Yong, International Symposium on Parallel Architecture, Algorithms and Networks, 1994-01-01 |
Recursive Circulant : A New Topology of Multicomputer Networks Chwa Kyung Yong, KISS Conf., pp.587 - 590, 1992-01-01 |
Recursive circulant 그래프의 고장시 분석과 메쉬 embedding = Fault analysis and mesh embedding of recursive circulant graphslink 김상범; Kim, Sang-Beom; et al, 한국과학기술원, 1992 |
Recursive circulants and their embeddings among hypercubes Chwa, Kyung Yong, THEORETICAL COMPUTER SCIENCE, v.244, no.1-2, pp.35 - 62, 2000-01 |
Recursive Markov Chain as a Stochastic Grammar Choi, Key-Sun; Han, YS; Park, YC, AAAI'92 Fall Symposium, pp.67 - 74, 1992 |
Recursive Path Planning Using Reduced States for Car-Like Vehicles on Grid Maps Yoon, Sang Yol; Yoon, Sung-Eui; Lee, Unghui; Shim, David Hyunchul, IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, v.16, no.5, pp.2797 - 2813, 2015-10 |
Recursive types in object-oriented languages = 객체 지향 언어에서 재귀 타입 지원link Na, Hyunik; 나현익; Choe, Kwang-Moo; 최광무; et al, 한국과학기술원, 2013 |
Redesigning hardware and software stacks for terabyte-scale memory systems = 테라바이트급 메모리 시스템 구축을 위한 하드웨어 및 소프트웨어 재설계 연구link Heo, Taekyung; Huh, Jaehyuk; et al, 한국과학기술원, 2022 |
Redesigning software-based defenses against privileged attackers on trusted computing = 신뢰 계산 시스템에서 특권을 가진 공격자들로부터의 소프트웨어적 방어 기법link Seo, Jaebaek; 서재백; et al, 한국과학기술원, 2017 |
Discover