Directions
Filter Data Cache: An Energy-Efficient Small L0 Data Cache Architecture Driven by Miss Cost Reduction
JONGMIN LEE, Soontae Kim
IEEE TRANSACTIONS ON COMPUTERS
2015
[] []
Five Centuries of Monarchy in Korea: Mining the Text of the Annals of the Joseon Dynasty
JinYeong Bak, Alice Oh
Association for Computational Linguistics(ACL)
2015
[] []
Formal Synthesis of Application and Platform Behaviors of Embedded Software Systems
Kim, Jinhyun, Kang, Inhye, Choi, Jin-Young, Lee, Insup, Sungwon Kang
SOFTWARE AND SYSTEMS MODELING
2015
[]
Fully Batch Processing Enabled Memory Integrity Verification Algorithm based on Merkle Tree
Kim, Se Hwan, Yonggon Kim, Ohmin Kwon, Hyunsoo Yoon
WISA 2015 - The 16th International Workshop on Information Security Applications
2015
[]
G-Index Model: A Generic Model of Index Schemes for Top-k Spatial-Keyword Queries
Hyuk Yoon Kwon, Wang, Haixun, Kyu-Young Whang
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS
2015
[]
GPU-accelerated Framework for Intracoronary Optical Coherence Tomography Imaging at the Push of a Button
Myounghee Han, Kim, Kyunghun, Jang, SJ, Cho, Han Saem, Bouma, Brett E., Oh, WY, Sukyoung Ryu
PLOS ONE
2015
[]
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack
Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyaman, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto
12th International Conference on Security and Cryptography
2015
[]
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack
Kobayashi, Yukou, Yanai, Naoto, Yoneyaman, Kazuki, Nishide, Takashi, Hanaoka, Goichiro, Kwangjo Kim, Okamoto, Eiji
12th International Conference on Security and Cryptography (SECRYPT2015)
2015
[]
Graphical Models via Univariate Exponential Family Distributions
Eunho Yang, Ravikumar, P, Allen, GI, Liu, ZD
JOURNAL OF MACHINE LEARNING RESEARCH
2015
[]
H-SVM: Hardware-assisted Secure Virtual Machines under a Vulnerable Hypervisor
Seongwook Jin, Jeongseob Ahn, Jinho Seol, Sanghoon Cha, Jaehyuk Huh, Seungryoul Maeng
IEEE TRANSACTIONS ON COMPUTERS
2015
[]
HaTen2: Billion-scale Tensor Decompositions
Inah, Jeon, Evangelos E. Papalexakis, U Kang, Christos Faloutsos
International Conference on Data Engineering(ICDE)
2015
[]
Hardware-Assisted Secure Resource Accounting under a Vulnerable Hypervisor
Seongwook Jin, Jinho Seol, Huh, Jaehyuk, Seungryoul Maeng
ACM SIGPLAN NOTICES
2015
[] []
Hardware-Assisted Secure Resource Accounting under a Vulnerable Hypervisor
Seongwook Jin, Jinho Seol, Jaehyuk Huh, Seungryoul Maeng
ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environment (VEE)
2015
[]
Hierarchical Bayesian Inverse Reinforcement Learning
Choi Jaedeug, Kee-Eung Kim
IEEE TRANSACTIONS ON CYBERNETICS
2015
[] []
Hierarchical soft clustering tree for fast approximate search of binary codes
SuGil Choi, Suwon Lee, Hyun S. Yang
ELECTRONICS LETTERS
2015
[]
High-Fidelity Color Reproduction Techniques for High-Dynamic-Range Imaging
김민혁
Telecommunications Review(Telecommunications Review)
2015
[]
Hippocampal structural differences in early versus late MCI
이재현, 류호진, 박진아, 정용
2015년도 대한뇌기능매핑학회 추계학술대회
2015
[]
Human Resource Allocation in Software Project with Practical Considerations
Jihun Park, Seo Dongwon, Gwangui Hong, Donghwan Shin, Jimin Hwa, Doo-Hwan Bae
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING
2015
[]
HybriDroid: Analysis Framework for Android Hybrid Applications
Sukyoung Ryu
European Conference on Object-Oriented Programming
2015
[]
Hybrid-BCI smart glasses for controlling electrical devices
Kim, Yongwon, Netiwit Kaongoen, Sungho Jo
The SICE Annual Conference 2015
2015
[]