Directions
Dynamic histograms for future spatiotemporal range predicates
Park, Hyun Kyoo, Son, Jin Hyun, Myoung Ho Kim
INFORMATION SCIENCES
2005
[]
Dynamic voltage scaling techniques for power efficient video decoding
Lee, B, Nurvitadhi, E, Dixit, R, Yu, CS, Myungchul Kim
JOURNAL OF SYSTEMS ARCHITECTURE
2005
[]
Effective use of place information for event tracking
Jin, Y, Sung-Hyon Myaeng, Lee, MH, Oh, HJ, Jang, MG
INFORMATION RETRIEVAL TECHNOLOGY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE
2005
[]
Efficient authenticated key agreement protocol for dynamic groups
Ren, Kui, Lee, Hyunrok, Kwangjo Kim, Yoo, T
INFORMATION SECURITY APPLICATIONS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE
2005
Efficient collision detection among moving spheres with unknown trajectories
Kim, HK, Guibas, LJ, Joseph S. Shin
ALGORITHMICA
2005
[]
Efficient packet distribution scheme in cluster-based active router
Jang, Y, Seungryoul Maeng, Cho, Jung Wan
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
2005
[]
Eigenvoice 병합을 이용한 연속 음성 인식 시스템의 고속 화자 적응
최동진, 오영환
말소리
2005
Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning
Duc Dang Nguyen
SCIS 2006: The 2006 Symposium on Cryptography and Information Security
2005
[]
Evaluation of feature extraction techniques for robust watermarking
Lee, HY, Kang, IK, Heung-Kyu LEE, Suh, YH
DIGITAL WATERMARKING, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE
2005
Exploiting Temporal Loads for Low Latency and High Bandwidth Memory
Soontae Kim, N. Vijaykrishnan, M. Kandemir , M. J. Irwin
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES
2005
[]
Exploiting bandwidth temporal loads for low latency and high bandwidth memory
Soontae Kim, Vijaykrishnan, N, Kandemir, M, Irwin, MJ
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES
2005
Extracting partial parsing rules from tree-annotated corpus: Toward deterministic global parsing
Choi, MS, Lee, KJ, Key-Sun CHOI, Kim, Gil Chang
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
2005
[]
Extracting the workflow critical path from the extended well-formed workflow schema
Son, Jin Hyun, Kim, Jung Sun, Myoung Ho Kim
JOURNAL OF COMPUTER AND SYSTEM SCIENCES
2005
[]
Feature-based image watermarking method using scale-invariant keypoints
Lee, HY, Lee, CH, Heung-Kyu LEE, Nam, J
ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2005, PT 2 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE
2005
Feature-oriented re-engineering of legacy systems into product line assets - a case study
Kang, KC, Moonzoo Kim, Lee, J, Kim, B
SOFTWARE PRODUCT LINES, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE
2005
Formal construction and verification of home service robots: A case study
Moonzoo Kim, Kang, KC
AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE
2005
From Text to Sign Language: Exploiting the Spatial and Motioning Dimension
Jong C. Park
Pacific Asia Conference on Language, Information, and Computation (PACLIC)
2005
Genomic Anlaysis Workbench Based on Parallelized Computing
선충현, 이관수, 박학수
제 32회 추계학술발표회
2005
[]
Geometric attack resistant watermarking in wavelet transform domain
Lee, CH, Heung-Kyu LEE
OPTICS EXPRESS
2005
[] []
Geometric permutations of disjoint unit spheres
Otfried Cheong, Goaoc, X, Na, HS
COMPUTATIONAL GEOMETRY-THEORY AND APPLICATIONS
2005
[]