Browse "School of Computing(전산학부)" by Author Lee, S

Showing results 1 to 50 of 50

1
A combined group/tree approach for scalable many-to-many reliable multicast

Yoon, W; Lee, DongMan; Youn, HY; Lee, S, COMPUTER COMMUNICATIONS, v.29, no.18, pp.3863 - 3876, 2006-11

2
A feedback based framework for semi-automic composition of web services

Han, Dongsoo; Lee, S; Ko, In-Young, FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3841, pp.414 - 424, 2006

3
A Join Algorithm Utilizing Multiple Path Indexes in Object-Oriented Database Systems

Cho, W; Lee, S; Yoon, Y; Whang, Kyu-Young, Engineering of Complex Computer Systems, pp.0 - 0, 1996-10

4
A Korean Part of Speech Tagging System with Handling Unknown Words

Lee, S; Seo, J; Oh, Yung-Hwan, International Conference on Computer Processing of Oriental Languages, pp.164 - 171, 1995

5
A Multimedia Information System Incorporating Hypermedia, Information Retrieval, and DBMS Technologies

Loh, W; Park, B; Lee, S; Whang, Kyu-Young, pp.128 - 133, 1996-03

6
A new MAC protocol for improving the end-to-end performance in multi-hop wireless ad hoc networks

Joo, J; Lee, S; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E87B, pp.2638 - 2640, 2004-09

7
A Probabilistic Active Attack on Server-aided Secret Computation Protocols

Lee, S; Hong, SM; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.24 - 33, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24

8
A proximity-based self-organizing hierarchical overlay framework for distributed hash tables

Shin, K; Lee, S; Lim, G; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E90B, pp.1651 - 1662, 2007-07

9
A Requirement Analysis on IPTV over Next Generation Networks

Lee, S; Lee, DongMan; Park, J; Kang, SG, 한국정보과학회 2006 추계학술대회, v.33, no.2, pp.106 - 111, 한국정보과학회, 2006-10-01

10
A simple and efficient one-to-many large file distribution method exploiting asynchronous joins

Lee, S; Kang, K; Lee, DongMan; Kim, JH, ETRI JOURNAL, v.28, pp.709 - 720, 2006-12

11
A Text Analyzer for Korean Text-to-Speech Systems

Lee, S; Oh, Yung-Hwan, International Conference on Spoken Language Processing, pp.1692 - 1685, ICSLP, 1996

12
A vector-regression tree for generating energy contours

Lee, S; Kim, YJ; Oh, Yung-Hwan, IEEE SIGNAL PROCESSING LETTERS, v.7, no.8, pp.216 - 218, 2000-08

13
Accelerating key establishment protocols for mobile communication

Lee, S; Hong, SM; Yoon, Hyunsoo; Cho, Y, INFORMATION SECURITY AND PRIVACY BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.1587, pp.51 - 63, 1999-04

14
An Attack on Tanaka`s Non Interactive Key Sharing Scheme

Park, S; Kim, Y; Lee, S; Kim, Kwangjo, IEEE International Symposium on Information Theory, v.0, no.0, pp.17 - 22, IEEE, 1995-09-17

15
An Efficient Method to Find the Linear Expressions for Linear Cryptanalysis

Lee, S; Sung, SH; Kim, Kwangjo, Japan-Korea Joint Workshop on Information Security and Cryptology (JW-ISC'95), 1995-01-24

16
CART-based modeling of Korean segmental duration

Lee, S; Oh, Yung-Hwan, , 1999

17
Challenges to P2P Live Video Streaming over Mobile Heterogeneous Networks

Lee, S; Lee, DongMan; Kang, S, 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), AICIT, 2011-11-29

18
Cross-Lingual Information Retrieval (CLIR) Task at the NTCIR Workshop 3

Kishida, K; Chen, K; Lee, S; Chen, HH; Kando, N; Kuriyama, K; Myaeng, Sung Hyon; et al, ACM SIGIR Forum, v.38, no.1, pp.17 - 20, ACM, 2004-07

19
DES can be Immune to Linear Cryptanalysis

Kim, Kwangjo; Lee, S; Park, S; Lee, D, Proceedings of the Workshop on Selected Areas in Cryptography SAC’94, pp.70 - 81, 1994

20
Efficient Quantization of LSF Parameters Based on Temporal Decomposition

Kim, SJ; Lee, S; Han, WJ; Oh, Yung-Hwan, International Conference on Spoken Langugage Processing, International Conference on Spoken Langugage Processing, 1998

21
Fast computational method for minimum square error transform

Lee, S; Kim, JinHyung; Groen, F.C.A., 9th International Conference on Pattern Recognition, pp.392 - 394, 9th International Conference on Pattern Recognition, 1998-11-14

22
Fast determination of textural periodicity using distance matching function

Oh, G; Lee, S; Shin, Sung-Yong, PATTERN RECOGNITION LETTERS, v.20, no.2, pp.191 - 197, 1999-02

23
Grapes: Topology-Based Hierarchical Virtual Network for Peer-to-Peer Lookup Services

Shin, K; Lee, S; Lim, G; Yoon, Hyunsoo; Ma, JS, ICPP International Workshop on Ad-Hoc Networking (IWAHN2002), IEEE, 2002-08-01

24
Haptic Xylophone

Lee, Joongyoun; Lee, S; Park, Jinah, IEEE World Haptics Conference 2013, IEEE Robotics and Automation Society, 2013-04-14

25
HiCon: A hierarchical context monitoring and composition framework for next-generation context-aware services

Cho, K; Hwang, I; Kang, S; Kim, B; Lee, J; Lee, S; Park, S; et al, IEEE NETWORK, v.22, pp.34 - 42, 2008-07

26
Hidden Markov Model Based Voice Conversion Using Dynamic Characteristics of Speaker

Kim, EK; Lee, S; Oh, Yung-Hwan, European Conference On Speech Communication And Technology, pp.2519 - 2522, Eurospeech, 1997

27
How to Strengthen DES against Two Robust Attacks

Kim, Kwangjo; Lee, S; Park, S; Lee, D, 1995 Korea-JapanJoint Workshop onInformation Security and Cryptology (JW-ISC'95), 1995-01-24

28
How to Use Exponent Permutations in Cryptography-classification and Applications

Park,SW; Lee, S; Kim, Kwangjo, Proc. of International Conference on Cryptology and Information Security, 1996-12-19

29
Improving bounds for the number of correlation immune Boolean functions

Park, SM; Lee, S; Sung, SH; Kim, Kwangjo, INFORMATION PROCESSING LETTERS, v.61, no.4, pp.209 - 212, 1997-02

30
Inferring Domain Combination Pattern and Its Biological Meaning in Proteins via Association Rules

Jung, S; Han, Dongsoo; Lee, S, 17th International Conference on Genome Informatics, GIW, 2006

31
Integer Addition over GF(2) and its Cryptographic Properties

Chee, S; Lee, S; Kim, Kwangjo, Third International Conference on Finite Fields and Applications, pp.11 - 14, 1995-06-11

32
Link Stability and Route Lifetime in Ad-hoc Wireless Networks

Lim, G; Shin, K; Lee, S; Yoon, Hyunsoo; Ma, JS, ICPP Workshops 2002 (31st International Conference on Parallel Processing Workshops), IEEE, 2002-08-20

33
On the construction of a powerful distributed authentication server without additional key management

Hong, SM; Lee, S; Park, Y; Cho, Y; Yoon, Hyunsoo, COMPUTER COMMUNICATIONS, v.23, no.17, pp.1638 - 1644, 2000-11

34
Optical flow rendering

Park, TJ; Lee, S; Shin, Sung-Yong, EUROGRAPHICS ’98, v.17, no.3, pp.75 - 85, Blackwell publishers, 1998

35
Optical flow rendering

Park, TJ; Lee, S; Shin, Sung-Yong, COMPUTER GRAPHICS FORUM, v.17, no.3, pp.75 - 75, 1998

36
Overview of CLIR Task at the Fourth Workshop

Kishida, K; Chen, K. H; Lee, S; Kuriyama, K; Kando, N; Chen, H. H; Myaeng, Sung Hyon; et al, Working Notes of the Fourth NTCIR Workshop Meeting, pp.1 - 59, 2004-06

37
Polymorph: Morphing among multiple images

Lee, S; Wolberg, G; Shin, Sung-Yong, IEEE COMPUTER GRAPHICS AND APPLICATIONS, v.18, no.1, pp.58 - 71, 1998

38
Power-aware position vector routing for wireless sensor networks

Lee, S; Kim, Daeyoung; Ahn, S; Park, N, EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3823, pp.1148 - 1156, 2005

39
Query Optimization Techniques Utilizing Path Indexes in Object-Oriented Database Systems

Cho, W; Whang, Kyu-Young; Lee, S; Yoon, Y, DASFAA 1997, pp.21 - 29, 1997-04

40
Realization of a scalable and reliable multicast transport protocol for many-to-many sessions

Lee, S; Ko, Y; Lee, DongMan, ETRI JOURNAL, v.29, pp.745 - 754, 2007-12

41
Reconstruction of s2DES S-boxes and their Immunity to Differential Cryptanalysis

Kim, Kwangjo; Park, S; Lee, S, Korea-Japan Joint Workshop on Informaion Security and Cryptology, v.0, no.0, pp.0 - 0, 1993-10

42
RFID mutual Authentication Scheme based on Synchronized Secret Information

Lee, S; Asano, T; Kim, Kwangjo, SCIS 2006, pp.98 - 98, Institute of Electronics, Information and Communication Engineers, 2006-01

43
Scattered data interpolation with multilevel B-splines

Lee, S; Wolberg, G; Shin, Sung-Yong, IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, v.3, no.3, pp.228 - 244, 1997

44
Set-based analysis of structured workflow definition

Han, Dongsoo; Lee, S; Lee, M; Shim, J, INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, v.14, no.4, pp.503 - 527, 2005-12

45
TESTVAL, a tool for protocol test validation and the validation of a LAPB test suite as an example

Vuong, ST; Lee, S; Kim, Myungchul, COMPUTER COMMUNICATIONS, v.19, no.9-10, pp.804 - 812, 1996-08

46
Text analyzer for Korean text-to-speech systems

Lee, S; Oh, Yung-Hwan, Proceedings of the 1996 International Conference on Spoken Language Processing, ICSLP. Part 1 (of 4), v.3, pp.1692 - 1695, 1996-10-03

47
Threshold Password-based Authenticated Key Exchange using Matrix

Park, C; Lee, S; Yoon, Hyunsoo, 3rd International Conference on Computing, Communications and Control Technologies (CCCT'05), pp.39 - 43, CCCT'05 (International Conference on Computing, Communications and Control Technologies), 2005-07-24

48
Tree-based modeling of intonation

Lee, S; Oh, Yung-Hwan, COMPUTER SPEECH AND LANGUAGE, v.15, no.1, pp.75 - 98, 2001-01

49
Tree-based modeling of prosodic phrasing and segmental duration for Korean TTS systems

Lee, S; Oh, Yung-Hwan, SPEECH COMMUNICATION, v.28, no.4, pp.283 - 300, 1999-08

50(Undefined)

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0