KAIST - COMPUTER SCIENCE

  • korea
  • search
  • login

Directions

 
  • 2014

  • Unsupervised Hadoop-based P2P Botnet Detection with Threshold Setting

    Huseynov, Khalid, 김광조
    CISC-W'14
    2014

    [] []

  • Untraceable Blind Packet Forwarding using Centralized path control

    Lee, Youngmi, Younggi Kim, Younghee LEE
    International Conference for Military Communications (MILCOM 2014)
    2014

    [] []

  • User Profile Extraction form Twitter for Personalized News Recommendation

    Lee, Won-Jo, Oh, KyoJoong, Lim, Chae-Gyun, Ho-Jin Choi
    International Conference on Advanced Communication Technology (ICACT)
    2014

    []

  • Utilizing Global and Path Information with Language Modelling for Hierarchical Text Classification

    Heung-Seon Oh, Sung-Hyon Myaeng
    JOURNAL OF INFORMATION SCIENCE
    2014

    []

  • Utilizing similarity relationships among existing data for high accuracy processing of content-based image retrieval

    Hai Thanh Mai, Myoung Ho Kim
    MULTIMEDIA TOOLS AND APPLICATIONS
    2014

    []

  • Victory: Versatile Internet of Things Application on Mobile Dynamic Service Composition Framework

    우성필, Sehyeon Heo, JANGGWAN IM, Daeyoung KIM
    The 4th International Conference on Internet of Things (IoT 2014)
    2014

    []

  • VoG: Summarizing and Understanding Large Graphs

    Danai Koutra, U Kang, Jilles Vreeken, Christos Faloutsos
    SIAM International Conference on Data Mining (SDM) 2014
    2014

    []

  • Wearable wireless interface based on brain activity and eye movement

    Kim, Yongwon, Sungho Jo
    14th International Conference on Control, Automation and Systems
    2014

  • Weight Balancing on Boundaries and Skeletons

    Barba, Luis, Otfried Cheong, De Carufel, Jean-Lou, Dobbins, Michael Gene, Fleischer, Rudolf, Kawamura, Akitoshi, Korman, Matias, Okamoto, Yoshio, Pach, Janos, Tang, Yuan, Tokuyama, Takeshi, Verdonschot, Sander, Wang, Tianhao
    The 30th Annual Symposium on Computational Geometry (SOCG 2014)
    2014

    [] []

  • Who can survive in CAESAR competition at round zero?

    Kim, HakJu, Kwangjo Kim
    SCIS2014
    2014

    [] []

  • Wikipedia-based query phrase expansion in patent class search

    Al-Shboul, Bashar, Sung-Hyon Myaeng
    INFORMATION RETRIEVAL
    2014

    []

  • escar 회의 등을 통한 각국의 자동차 보안 기술 동향 연구

    김광조, 이동수
    한국정보보호학회지
    2014

    []

  • vCache: Providing a Transparent View of the LLC in Virtualized Environments

    Daehoon Kim, Hwanju Kim, Jaehyuk Huh
    IEEE COMPUTER ARCHITECTURE LETTERS
    2014

    []

  • 가상 머신 기반으로 난독화된 실행파일의 구조 및 원본의미 추출 동적 방법

    이성호, 한태숙
    정보과학회논문지
    2014

    []

  • 가상화 기법으로 난독화된 실행 파일의 동적 분석을 통한 핸들러 간략화

    원지혜, 한태숙
    Korea Computer Congress 2014
    2014

    []

  • 가상화를 이용하여 난독화된 바이너리의 제어 흐름 재건

    황준형, 한태숙
    Korea Computer Congress 2014
    2014

    []

  • 경량 암호를 이용한 IoT Secure SNAIL 플랫폼 구성(Ⅰ)

    정제성, 김경민, 김학주, 박준정, 안수현, 이동수, 최락용, 김광조, 김대영
    CISC-W'14
    2014

    [] []

  • 관심지점 탐지를 위한 모호성 해소 방법 (A Disambiguation Method for Point of Interest Detection)

    김경민
    관광연구저널
    2014

    []

  • 군사기밀 유출자에 대한 손해배상 제도 적용 방안

    박준정, 김광조
    CISC-W'14
    2014

    [] []

  • 규칙 기반 한국어 시간 정보 추출

    정영섭, 도효진, 임준호, 최호진
    한글 및 한국어 정보처리 학술대회
    2014

    []