Directions
Color Laser Printer Identification Using Halftone Texture Fingerprint
Doguk Kim, Heung-Kyu LEE
ELECTRONICS LETTERS
2015
[]
Comparative study of muscle stiffness sensor and electromyography and mechanomyography in fatigue conditions
한효녕, Sungho Jo, 김정
MEDICAL & BIOLOGICAL ENGINEERING & COMPUTING
2015
[]
Composition of Schedulability Analysis for Real-Time Multiprocessor Systems
이진규, 신강근, Insik Shin, Arvind Easwaran
IEEE TRANSACTIONS ON COMPUTERS
2015
[]
Computational benefit of smoothness:Parameterized bit-complexity of numerical operators on analytic functions and Gevrey’s hierarchy
Akitoshi Kawamura, Norbert M?ller, Carsten R?snick, Ziegler Martin A.
JOURNAL OF COMPLEXITY
2015
[] []
Corpus Annotation with a Linguistic Analysis of the Associations between Event Mentions and Spatial Expressions
Jin-Woo Chung, Jinseon You, Jong C. Park
The 29th Pacific Asia Conference on Language, Information and Computation (PACLIC 29)
2015
[]
Cuckoo Sandbox를 회피하는 악성코드 탐지 방안 연구
정제성, 김광조
CISC-S'15
2015
[] []
DB-IR integration using tight-coupling in the Odysseus DBMS
Kyu-Young Whang, Lee Jae-Gil, Lee, Min-Jae, Han, Wook-Shin, Kim Min-Soo, Jun Sung Kim
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS
2015
[]
DRACO: A Deduplicating FTL for Tangible Extra Capacity
Bon Keun Seo, Seungryoul Maeng, Lee, Joonwon, Seo, Euiseong
IEEE COMPUTER ARCHITECTURE LETTERS
2015
[]
Design and Implementation of Spatial Operators and Energy-efficient Query Processing Strategy in Wireless Sensor Network Database System
CHONGSOK LIM, Lee, Jeong-Hoon, Park, Minjee, Soon J. Hyun
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS
2015
[] []
Design and Implementation of an Evaluator for Building a Good Knowledge Base in Question Answering
Nam, Sangha, Key-Sun CHOI, Hahm, Younggyun, Nam, Sejin
The 14th International Semantic Web Conference
2015
Design and microfabrication of an artificial compound eye inspired by vision mechanism of Xenos peckii
Keum, DM, INCHANG CHOI, Min H. Kim, Jeong, KH
SPIE Photonics West
2015
[]
Design of an Intrusion Detection System for Unknown-attacks based on Bio-inspired Algorithms
Kim, Kyung Min, Kim, Hak Ju, Kwangjo Kim
Computer Security Symposium 2015 (CSS 2015)
2015
[]
Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping
Moon, Hyungon, Hojoon Lee, Heo, Ingoo, Kihwan Kim, Paek, Yunheung, Kang, Brent Byunghoon
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
2015
[]
Detecting malicious activities with user-agent-based profiles
Mekky, H, Zhang, ZL, Torres, R, Zhang, Y, Lee, Sung-Ju, Tongaonkar, A, Mellia, M
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT
2015
[]
Differences in hippocampal surface and white matter structure in early and Late MCA: ADNI Study
Lee, Peter Jaehyun, Ryoo, Ho Jin, 박진아, Jeong, Y
2015년도 대한신경과학회 추계학술대회
2015
[]
Differentially private client-side data deduplication protocol for cloud storage services
Youngjoo Shin, Kwangjo Kim
SECURITY AND COMMUNICATION NETWORKS
2015
[] []
Directed Test Suite Augmentation: An Empirical Investigation
Xu, Zhihong, Yunho Kim, Moonzoo Kim, Cohen, Myra B., Rothermel, Gregg
SOFTWARE TESTING VERIFICATION & RELIABILITY
2015
[] []
Discovering FAmily Photo using Discriminative Frequent Subgraph
이윤석, 윤성의, 최창민
영상처리 및 이해에 관한 워크샵(IPIU)
2015
[]
Discovering Large Subsets with High Quality Bisections in Real World Graphs
Lim, Yongsub, Lee, Won-Jo, Ho-Jin Choi, Kang, U
International Conference on Big Data and Smart Computing
2015
[]
Distributed Formation of Degree Constrained Minimum Routing Cost Tree in Wireless Ad-hoc Networks
Kim, Taehong, Seo, Seog Chung, Daeyoung KIM
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
2015
[]