Directions
Reward Shaping for Model-Based Bayesian Reinforcement Learning
Kim, Hyeoneun, Kee-Eung Kim, Woosang Lim, Kang Hoon Lee, Noh, Yung Kyun
Association for the Advancement of Artificial Intelligence(AAAI)
2015
[] []
Robust Imperceptible Video Watermarking for MPEG Compression and DA-AD Conversion Using Visual Masking
SANGKEUN JI, Wookhyung Kim, HANUL JANG, Mun, Seung Min, Heung-Kyu LEE
Springer-Verlag, Int. Workshop on Digital-Forensics and Watermarking(IWDW’2015)
2015
[]
S-RAY : Yen 알고리즘을 응용한 보안 네트워크 라우팅
정제성, 신승원, 김광조
2015년 한국정보보호학회 동계학술대회 (CISC-W'15)
2015
[]
SPIRIT: A Framework for Profiling SDN
Heedo Kang, Seungsoo Lee, CHANHEE LEE, Changhoon Yoon, Shin, Seungwon
2015 IEEE 23rd International Conference on Network Protocols (ICNP)
2015
[]
SPIRO: Turning Elephants into Mice with Efficient RF Transport
Eugene Chai, Kang G. Shin, Lee, Sung-Ju, Jeongkeun Lee, Raul Etkin
International Conference on Computer Communications(INFOCOM)
2015
[] []
SRDF: Korean Open Information Extraction using Singleton Property
Nam, Sangha, Key-Sun CHOI, Hahm, Younggyun, Nam, Sejin
The 14th International Semantic Web Conference
2015
[]
Sandra Helps You Learn: the More You Walk, the More Battery Your Phone Drains
CHULHONG MIN, Chungkuk Yoo, Hwang, Inseok, Kang, Seungwoo, Lee, Youngki, Seungchul Lee, Park, Pillsoon, CHANGHUN LEE, Choi, Seungpyo, Junehwa Song
International Joint Conference on Pervasive and Ubiquitous Computing(UbiComp)
2015
[]
Sandra Helps You Learn: the More You Walk, the More Battery Your Phone Drains
CHULHONG MIN, Chungkuk Yoo, 황인석, 강승우, Youngki Lee, Seungchul Lee, Pillsoon Park, CHANGHUN LEE, SeungPyo Choi, 송준화
International Joint Conference on Pervasive and Ubiquitous Computing(UbiComp)
2015
[]
Scalable P2P Botnet Detection with Threshold Setting in Hadoop Framework
Huseynov, Khalid, Yoo, Paul D., 김광조
정보보호학회논문지
2015
[]
Scalable and Precise Static Analysis of JavaScript Applications via Loop-Sensitivity
Changhee Park, Sukyoung Ryu
European Conference on Object-Oriented Programming
2015
[]
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment
Jang Jinsoo, Kong, Sun June, MINSU KIM, Daegyeong Kim, Kang, Brent Byunghoon
Network and Distributed System Security (NDSS)
2015
[]
Security Challenges of Sensor Network Query Processor in Wireless Sensor Network
Aminanto Muham, 김광조
CISC-S'15
2015
[] []
Sentiment Analysis of Real-Life Situations Using Location, People and Time as Contextual Features
Do, Hyo Jin, Ho-Jin Choi
International Conference on Big Data and Smart Computing
2015
[]
Sherlock-SD: A Light-Weight Universal Service Discovery for Web of Things (WoT) Services
Heesuk Son, Byoungoh Kim, Taehun Kim, Dongman Lee, Soon J. Hyun
the Proceedings of 11th Annual IEEE Consumer Communications & Networking Conference (CCNC 2014)
2015
[] []
Smarter push notifications in a multi-device world
Morse, 조성호
Telecommunications Review(Telecommunications Review)
2015
[]
Social Media Dynamics of Global Co-presence During the 2014 FIFA World Cup
JAEWON KIM, Dongwoo Kim, Brian Keegan, Kim Joon Hee, Suin Kim, Alice Oh
SIGCHI Confereence on Human Factors in Computing System(CHI)
2015
[] []
Software Defined Network의 보안 취약성
정제성, 김광조
2015 정보보호학회학술발표회 영남지부
2015
[]
Solving Sensor Void Problem in Uncontrolled Mobile Sensor Networks Development of Mobile Sensor Database Systems
Park, Soo Seok, Lim, Chong Sok, Soon J. Hyun
The 4th International Conference on Sensor Networks
2015
[] []
Sorted Consecutive Local Binary Pattern for Texture Classification
JongBin Ryu, Hong, Sungeun, Hyun S. Yang
IEEE TRANSACTIONS ON IMAGE PROCESSING
2015
[] []
SounDroid: Supporting Real-Time Sound Applications on Commodity Mobile Devices
Hyosu Kim, 이상정, Wookhyun Han, 김대혁, Insik Shin
2015 IEEE Real-Time Systems Symposium (RTSS)
2015
[]