Directions
Chaining the Secret: Lightweight Authentication for Security in Pervasive Computing
Jiyong Han
2016 IEEE International Conference on Pervasive Computing and Communications (PerCom)
2016
[]
Channel-quality-aware multihop broadcast for asynchronous multi-channel wireless sensor networks
WIRELESS NETWORKS
2016
[] []
Characterizing non-deadlock concurrency bug fixes in open-source Java programs
Yu, Misun, Ma, Yu-Seung, Doo-Hwan Bae
ACM Symposium on Applied Computing 2016 (SAC 2016)
2016
[]
Classifying Travel-related Intents in Textual Data
Kim Zae Myung, 영섭 정, Jonghwan Hyeon, Oh, Hyngrai, Ho-Jin Choi
the 2016 2nd International Conference on Data Mining, Electronics and Information Technology (DMEIT 16)
2016
[]
Classifying Travel-related Intents in Textual Data
Kim Zae Myung, 영섭 정, Jonghwan Hyeon, Oh, Hyngrai, Ho-Jin Choi
International Journal of Computing, Communication and Instrumentation Engineering
2016
[] []
CoMon plus : A Cooperative Context Monitoring System for Multi-Device Personal Sensing Environments
Lee, Youngki, Kang, Seungwoo, CHULHONG MIN, Ju, Younghyun, Hwang, Inseok, Junehwa Song
IEEE TRANSACTIONS ON MOBILE COMPUTING
2016
[]
Comparative Study of Sensor Fusion Methods for Hybrid Positioning Systems
Jung, Suk Hoon, Moon, Byungchul, Ahn, Jeonghee, Dongsoo Han
2016 URSI Asia-Pacific Radio Science Conference
2016
[]
Comparison of Three QWERTY Keyboards for a Smartwatch
Hong, Joggi, Seongkook Heo, Isokoski, Poika, Geehyuk Lee
INTERACTING WITH COMPUTERS
2016
[]
Complexity Theory of (Functions on) Compact Metric Spaces
Ziegler Martin A.
2016 31st Annual ACM/IEEE Symposium on Logic in Computer Science (LICS)
2016
[] []
Computational Complexity of Quantum Satisfiability
Herrmann, Christian, Ziegler Martin A.
JOURNAL OF THE ACM
2016
[] []
Constructing an Initial Knowledge Base for Medical Domain Expert System using Induct RDR
Jonghwan Hyeon, KyoJoong Oh, youjin kim, Chung, Hyunsuk, Kang, Byeong Ho, Ho-Jin Choi
The 3rd International Conference on Big Data and Smart Computing (BigComp2016)
2016
[]
Contention-based Congestion Management in Large-Scale Networks
GWANGSUN KIM, Changhyun Kim, Jiyun Jeong, Mike Parker, John Kim
2016 49th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)
2016
[]
Data Randomization and Cluster-Based Partitioning for Botnet Intrusion Detection
Omar Y. Al-Jarrah, Omar Alhussein, Paul D. Yoo, Sami Muhaidat, Taha, K., Kwangjo Kim
IEEE TRANSACTIONS ON CYBERNETICS
2016
[] []
Dedicated Workflow Management for OKBQA Framework
Jiseong Kim, GyuHyeon Choi, Key-Sun CHOI
Internationcal Conference on Computational Linguistics(COLING)
2016
[]
Deep Learning in Intrusion Detection System: An Overview
Aminanto Muhamad Erza, Kwangjo Kim
2016 International Research Conference on Engineering and Technology (2016 IRCET)
2016
[]
Deep Learning-based Feature Selection for Intrusion Detection System in Transport Layer
Aminanto Muham, 김광조
2016년 한국정보보호학회 하계학술대회 (CISC-S'16)
2016
[]
Demand-Aware Centralized Traffic Scheduling in Wireless LANs
Sang Yup Han, Lee, Myung Jin, Myungchul Kim
2016 IFIP Networking Conference (IFIP Networking) and Workshops
2016
[]
Demo: Mobile Plus: Mobile platform for Transparent Sharing of Functionalities Across Devices
Sangeun Oh, HYUCK YOO, Daelyong Jeong, Soo Young Park, Hoang Duc Bui, Sungsoo Moon, Insik Shin
The ACM International Conference on Mobile Systems, Applications and Services (MobiSys)
2016
[] []
Design and Analysis of Hybrid Flow Control for Hierarchical Ring Network-on-Chip
Hanjoon Kim, GWANGSUN KIM, Yeo, Hwasoo, John Kim, Seungryoul Maeng
IEEE TRANSACTIONS ON COMPUTERS
2016
[]
Designing A Resilient L1 Cache Architecture to Process Variation-induced Access-time Failures
Hong, Seokin, Soontae Kim
IEEE TRANSACTIONS ON COMPUTERS
2016
[] []