KAIST - COMPUTER SCIENCE

  • korea
  • search
  • login

Directions

 
  • 2018

  • Invasive Software Testing: Mutating Target Programs to Diversify Test Exploration for High Test Coverage

    김윤호, 홍신, Bongsuk Ko, Loc Phan Duy, Moonzoo Kim
    IEEE Conference on Software Testing, Validation and Verification (ICST)
    2018

    []

  • KBCNN: CNN을 활용한 지식베이스 완성 모델

    김지호, 한기종, 최기선
    제 30회 한글 및 한국어 정보처리 학술대회
    2018

    []

  • Key alternating ciphers based on involutions

    이주영
    DESIGNS CODES AND CRYPTOGRAPHY
    2018

    [] []

  • Kinodynamic Comfort Trajectory Planning for Car-like Robots

    Heechan Shin, Donghyuk Kim, Sung-Eui Yoon
    IEEE/RSJ International Conference on Intelligent Robots and Systems(IROS)
    2018

    [] []

  • Korean TimeBank Including Relative Temporal Information

    Chae-Gyun Lim, 정영섭, Ho-Jin Choi
    11th edition of the Language Resources and Evaluation Conference (LREC 2018)
    2018

    [] []

  • Korero: Facilitating Complex Referencing of Visual Materials in Asynchronous Discussion Interface

    Chua, Soon Hau, Monserrat, Toni-Jan Keith Palma, Yoon, Dongwook, Juho Kim, Zhao, Shengdong
    ACM Conference on Computer-Supported Cooperative Work(CSCW)
    2018

    []

  • LSTM-based Model for Extracting Temporal Relations from Korean Text

    Chae-Gyun Lim, Ho-Jin Choi
    2018 IEEE International Conference on Big Data and Smart Computing (BigComp)
    2018

    [] []

  • Layer Thickness Estimation of 3D Printed Model for Digital Multimedia Forensics

    Hou Jong-Uk, Heung-Kyu LEE
    ELECTRONICS LETTERS
    2018

  • Layered Behavior Modeling via Combining Descriptive and Prescriptive Approaches: a Case Study of Infantry Company Engagement

    배장원, 이준석, 김도형, 이광훈, Jongmin Lee, Kee-Eung Kim, 문일철
    IEEE Transactions on Systems, Man:CMA: and Cybernetics: Systems
    2018

    [] []

  • Learning Analysis Strategies for Octagon and Context Sensitivity from Labeled Data Generated by Static Analyses

    허기홍, 오학주, Hongseok Yang
    Formal Methods in System Design
    2018

    [] []

  • Learning fault localisation for both humans and machines using multi-objective GP

    Choi, Kabdo, Sohn, Jeongju, Shin Yoo
    The 10th International Symposium on Search-Based Software Engineering (SSBSE)
    2018

    []

  • Learning without peeking: Secure multi-party computation genetic programming

    Kim, Jinhan, Epitropakis, Michael G., Shin Yoo
    The 10th International Symposium on Search-Based Software Engineering (SSBSE)
    2018

    []

  • Leveraging the Crowd to Detect and Reduce the Spread of Fake News and Misinformation

    JOOYEON KIM, Tabibian, Behzad, Alice Oh, Scholkopf, Bernhard, Gomez-Rodrigues, Manuel
    ACM International Conference on Web Search and Data Mining(WSDM)
    2018

    [] []

  • Lifelong Learning with Dynamically Expandable Networks

    Jaehong Yoon, Eunho Yang, Lee, Jeongtae, Hwang Sung Ju
    International Conference on Learning Representations (ICLR)
    2018

    [] []

  • Live Migration of Virtual Machines and Containers over Wide Area Networks with Distributed Mobility Management

    Jaehee Ha, JAE HYUN PARK, Sang Yup Han, Myungchul Kim
    International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MobiQuitous)
    2018

    []

  • Location Digest: A placeness service to discover community experience using social media

    Gaurav Kalra, Hoang Minh Nguyen, Wondeuk Yoon, Dongman Lee, Daeyoung KIM
    The 4th IEEE International Smart Cities Conference (ISC2)
    2018

    []

  • Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86

    Hojoon Lee, CHIHYUN SONG, Kang, Brent Byunghoon
    Conference on Computer and Communications Security(CCS)
    2018

    [] []

  • MC-Fluid: Multi-Core Fluid-Based Mixed-Criticality Scheduling

    Lee, Jaewoo, Ramanathan, Saravanan, Kieu-My Phan, Easwaran, Arvind, Insik Shin, Lee, Insup
    IEEE TRANSACTIONS ON COMPUTERS
    2018

    []

  • MUSIC: Mutation Analysis Tool with High Configurability and Extensibility

    Loc Phan Duy, 김윤호, Moonzoo Kim
    2018 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)
    2018

    []

  • Malicious URL protection based on attackers' habitual behavioral analysis

    SUNGJIN KIM, Kim, Jinbok, Kang, Brent Byunghoon
    COMPUTERS & SECURITY
    2018

    [] []