KAIST - COMPUTER SCIENCE

  • korea
  • search
  • login

Directions

 
  • 2011

  • A multi-resolution scheme for distortion-minimizing mapping between human subcortical structures based on geodesic construction on Riemannian manifolds

    Cho, Youngsang, Seong, Joon-Kyung, Joseph S. Shin, Jeong, Y, Kim, Jong Hun, Qiu, Anqi, Im, Kiho, Lee, Jong Min, Na, Duk L.
    NEUROIMAGE
    2011

    [] []

  • A note on the perimeter of fat objects

    Bose, Prosenjit, Otfried Cheong, Dujmovic, Vida
    COMPUTATIONAL GEOMETRY-THEORY AND APPLICATIONS
    2011

    [] []

  • A novel approach to detect network attacks using g-HMM-based temporal relations between internet protocol packets

    Chang, HangBae, Shon, T., KyuSuk Han, Park, J.J.
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING
    2011

    []

  • A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication

    KyuSuk Han, Yeun, Chan Yeob, Shon, Taeshik, Park, Jonghyuk, Kwangjo Kim
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS
    2011

    []

  • A two-stage framework for UML specification matching

    Park, Wei-Jin, Doo-Hwan Bae
    INFORMATION AND SOFTWARE TECHNOLOGY
    2011

    []

  • ADSR: Angle-based Multi-Hop Routing Strategy for Mobile Wireless Sensor Networks

    신광철, 김경준, Soontae Kim
    2011 IEEE Asia-Pacific Services Computing Conference (APSCC)
    2011

    []

  • AQM for Weighted Fairness in Wireless LANs

    Kim, Do-Hyung, Kim, Jong-Hwan, Hyunsoo Yoon, Yeom, Ik-Jun
    IEEE COMMUNICATIONS LETTERS
    2011

    [] []

  • AR postcard: the augmented reality system with a postcard

    Hyunwoo Cho, Jinki Jung, 조규성, Yong-Ho Seo, Hyun S. Yang
    The 10th International Conference on Virtual Reality Continuum and Its Applications in Industry (VRCAI 2011)
    2011

    [] []

  • Access Control using Extended Role Graph Corresponding to Organizational Hierarchy

    이지현, Sungwon Kang, 허선진
    1st ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering (CNSI 2011)
    2011

    []

  • Accounting for Data Dependencies within a Hierarchical Dirichlet Process Mixture Model

    Dongwoo Kim, Alice Oh
    20th ACM international conference on Information and knowledge management (CIKM 2011)
    2011

    [] []

  • Aciom: Application Characteristics-aware Disk and Network I/O Management on Android Platform

    Hyosu Kim, 이민섭, Wookhyun Han, kilho Lee, Insik Shin
    9th ACM international conference on Embedded software (EMSOFT 2011)
    2011

    [] []

  • Active Queue Management for Flow Fairness and Stable Queue Length

    Kim, Jong-hwan, Hyunsoo Yoon, Yeom, Ikjun
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
    2011

    [] []

  • AdNext: A Visit-Pattern-Aware Mobile Advertising System for Urban Commercial Complexes

    Byoungjip Kim, 하진영, SangJeong Lee, Seungwoo Kang, Youngki Lee, 이윤석, Lama Nachman, Junehwa Song
    12th Workshop on Mobile Computing Systems and Applications (HOTMOBILE 2011)
    2011

    []

  • Adaptive Steganographic Method Using the Floor Function with Practical Message Formats

    Jeong Chun Joo, Tae-Woo Oh, Lee, Hae-Yeoun, Heung-Kyu LEE
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL
    2011

    [] []

  • Almost Tight Upper Bound for Finding Fourier Coefficients of Bounded Pseudo-Boolean Functions

    Choi, SS, Jung, Kyomin, Kim, JH
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES
    2011

    []

  • An Alternative Memory Access Scheduling in Manycore Accelerators

    Yonggon Kim, Hyunseok Lee, John Kim
    The 20th International Conference on Parallel Architectures and Compilation Techniques (PACT 2011)
    2011

    []

  • An Approximate Duplicate Elimination in RFID Data Streams

    Lee, Chun-Hee, Chin-Wan Chung
    DATA & KNOWLEDGE ENGINEERING
    2011

    [] []

  • An Efficient and Privacy Preserving Authentication Protocol for HAN

    Do Young Chung, MADE HARTA DWIJAKSARA, Yi Jae Park, Jang Seong Kim, Kwangjo Kim
    Symposium on Cryptography and Information Security 2011 (SCIS 2011)
    2011

    []

  • An Empirical Study on the Rewritability of the with Statement in JavaScript

    Chang Hee Park, HongKi Lee, Sukyoung Ryu
    2011 International Workshop on Foundations of Object-Oriented Languages (FOOL 2011)
    2011

    []

  • An Enhanced Security Policy Framework for Android

    Yi Jae Park, Do Young Chung, MADE HARTA DWIJAKSARA, Jang Seong Kim, Kwangjo Kim
    Symposium on Cryptography and Information Security 2011 (SCIS 2011)
    2011

    []