Directions
Optimizing Leakage Energy Consumption in Cache Bitlines
Soontae Kim, N. Vijaykrishnan, M. Kandemir, M. J. Irwin
DESIGN AUTOMATION FOR EMBEDDED SYSTEMS
2005
[] []
PROC: Process ReOrdering-based coscheduling on workstation clusters
Junglok Yu, Driss Azougagh, JIN SOO KIM, Seungryoul Maeng
19th IEEE International Parallel and Distributed Processing Symposium (IPDPS 2005)
2005
[] []
Positioning Relay Nodes in ISP Networks
Meeyoung Cha, Sue Moon, C. D. Park, Anees Shaikh
24th Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM 2005)
2005
[] []
Power Control in Wireless Ad Hoc Networks for Energy Efficient Routing with Capacity Maximization
Kichan Bae, Geunhwi Lim, Namgi Kim, Hyunsoo Yoon
Journal of Systemics, Cybernetics and Informatics
2005
[]
Power aware chain routing protocol for data gathering in sensor networks
Pham, ML, Daeyoung KIM, Yoo, SE, Doh, Y
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS
2005
[] []
Power-aware Position Vector Routing for Wireless Sensor Networks
Lee, S, Daeyoung KIM, Ahn, S, Park, N
EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE
2005
Practical convertible authenticated encryption schemes using self-certified public keys
Lv, Jiqiang, Wang, Xinmei, Kwangjo Kim
APPLIED MATHEMATICS AND COMPUTATION
2005
Practical delay monitoring for ISPs
Baek-Young Choi, Sue Moon, Rene Cruz, Zhi-Li Zhang, Christophe Diot
1st International Conference on Emerging Networking Experiments and Technologies (CoNEXT 05)
2005
[] []
Proactive Context-aware Sensor Networks
Ahn, S, Daeyoung KIM
WIRELESS SENSOR NETWORKS, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE
2005
[]
QWERTY'형 모바일 자판 배열
황선유, 이기혁
HCI 2005 학술대회
2005
[]
Re-ranking Algorithm using Post-Retrieval Clustering for Content-based Image Retrieval
Gunhan Park, Yunju Baek, Heung-Kyu LEE
INFORMATION PROCESSING & MANAGEMENT
2005
[]
Relevance Feedback Using Adaptive Clustering for Image Similarity Retrieval
Kim, DH, Chin-Wan Chung, Barnard, K
JOURNAL OF SYSTEMS AND SOFTWARE
2005
[]
Resource co-allocation : A complementary technique that enhances performance in grid computing environment
Driss Azougagh, Junglok Yu, Seungryoul Maeng
11th International Conference on Parallel and Distributed Systems Workshops(ICPADS 2005)
2005
[] []
Securing Mobile Agents by Integrity-Based Encryption
Lee, JW, Hong, SM, Hyunsoo Yoon
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
2005
[]
Security of a multisignature scheme for specified group of verifiers
Lv, Jiquing, Wang, Xinmei, Kwangjo Kim
APPLIED MATHEMATICS AND COMPUTATION
2005
Set-based Analysis of Structured Workflow Definition
Dongsoo Han, Lee, S, Lee, M, Shim, J
INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS
2005
Sharing I/O in Strongly Partitioned Real-Time Systems
Shah, R, Lee, YH, Daeyoung KIM
EMBEDDED SOFTWARE AND SYSTEMS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE
2005
Small-Time Scaling Behavior of Internet Backbone Traffic
Ribeiro, VJ, Zhang, ZL, Sue Moon, Diot, C
COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING
2005
Smooth Pursuit Eye Movement System using Artificial Retina Chip and Shape Memory Alloy Actuator
Kim, WC, Kim, JH, Lee, M, Shin, JK, Hyun S. Yang, Yonezu, H
IEEE SENSORS JOURNAL
2005
Split-n-Save: Path Multiplexing in Wireless Ad Hoc Routing
Meeyoung Cha, Lee, DK, Sue Moon
IEEE Conference on Computer Communications and Networking (INFOCOMM) Student Workshop 2005
2005
[]