KAIST - COMPUTER SCIENCE

  • korea
  • search
  • login

Directions

 
  • 2005

  • Dynamic histograms for future spatiotemporal range predicates

    Park, Hyun Kyoo, Son, Jin Hyun, Myoung Ho Kim
    INFORMATION SCIENCES
    2005

    []

  • Dynamic voltage scaling techniques for power efficient video decoding

    Lee, B, Nurvitadhi, E, Dixit, R, Yu, CS, Myungchul Kim
    JOURNAL OF SYSTEMS ARCHITECTURE
    2005

    []

  • Effective use of place information for event tracking

    Jin, Y, Sung-Hyon Myaeng, Lee, MH, Oh, HJ, Jang, MG
    INFORMATION RETRIEVAL TECHNOLOGY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE
    2005

    []

  • Efficient authenticated key agreement protocol for dynamic groups

    Ren, Kui, Lee, Hyunrok, Kwangjo Kim, Yoo, T
    INFORMATION SECURITY APPLICATIONS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE
    2005

  • Efficient collision detection among moving spheres with unknown trajectories

    Kim, HK, Guibas, LJ, Joseph S. Shin
    ALGORITHMICA
    2005

    []

  • Efficient packet distribution scheme in cluster-based active router

    Jang, Y, Seungryoul Maeng, Cho, Jung Wan
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
    2005

    []

  • Eigenvoice 병합을 이용한 연속 음성 인식 시스템의 고속 화자 적응

    최동진, 오영환
    말소리
    2005

  • Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning

    Duc Dang Nguyen
    SCIS 2006: The 2006 Symposium on Cryptography and Information Security
    2005

    []

  • Evaluation of feature extraction techniques for robust watermarking

    Lee, HY, Kang, IK, Heung-Kyu LEE, Suh, YH
    DIGITAL WATERMARKING, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE
    2005

  • Exploiting Temporal Loads for Low Latency and High Bandwidth Memory

    Soontae Kim, N. Vijaykrishnan, M. Kandemir , M. J. Irwin
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES
    2005

    []

  • Exploiting bandwidth temporal loads for low latency and high bandwidth memory

    Soontae Kim, Vijaykrishnan, N, Kandemir, M, Irwin, MJ
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES
    2005

  • Extracting partial parsing rules from tree-annotated corpus: Toward deterministic global parsing

    Choi, MS, Lee, KJ, Key-Sun CHOI, Kim, Gil Chang
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
    2005

    []

  • Extracting the workflow critical path from the extended well-formed workflow schema

    Son, Jin Hyun, Kim, Jung Sun, Myoung Ho Kim
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES
    2005

    []

  • Feature-based image watermarking method using scale-invariant keypoints

    Lee, HY, Lee, CH, Heung-Kyu LEE, Nam, J
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2005, PT 2 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE
    2005

  • Feature-oriented re-engineering of legacy systems into product line assets - a case study

    Kang, KC, Moonzoo Kim, Lee, J, Kim, B
    SOFTWARE PRODUCT LINES, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE
    2005

  • Formal construction and verification of home service robots: A case study

    Moonzoo Kim, Kang, KC
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE
    2005

  • From Text to Sign Language: Exploiting the Spatial and Motioning Dimension

    Jong C. Park
    Pacific Asia Conference on Language, Information, and Computation (PACLIC)
    2005

  • Genomic Anlaysis Workbench Based on Parallelized Computing

    선충현, 이관수, 박학수
    제 32회 추계학술발표회
    2005

    []

  • Geometric attack resistant watermarking in wavelet transform domain

    Lee, CH, Heung-Kyu LEE
    OPTICS EXPRESS
    2005

    [] []

  • Geometric permutations of disjoint unit spheres

    Otfried Cheong, Goaoc, X, Na, HS
    COMPUTATIONAL GEOMETRY-THEORY AND APPLICATIONS
    2005

    []