KAIST - COMPUTER SCIENCE

  • korea
  • search
  • login

Directions

 
  • 2013

  • Subspace Top-k Query Processing Using the Hybrid-Layer Index with a Tight Bound

    Heo, Jun-Seok, Cho, Jung-Hoo, Kyu-Young Whang
    DATA & KNOWLEDGE ENGINEERING
    2013

    []

  • Surface-Level Path Loss Modeling for Sensor Networks in Flat and Irregular Terrain

    Chong, Poh Kit, Daeyoung KIM
    ACM TRANSACTIONS ON SENSOR NETWORKS
    2013

    []

  • Survey on Software Testing Practices

    이지현, Sungwon Kang, Danhyung LEE
    IET SOFTWARE
    2013

    []

  • Swarm Intelligence를 이용한 침입 탐지 시스템의 방식 비교

    이동수, 김광조
    CISC-W'13
    2013

    []

  • TAMR: Traffic-Aware Multipath Routing for Fault Tolerance in 6LoWPAN

    Kwon, Kiwoong, Ha, Minkeun, Kim, SH, Daeyoung KIM
    2013 IEEE Global Communications Conference (GLOBECOM 2013)
    2013

    []

  • Ta-Tap: consecutive distant tap operations for one-handed touch screen use

    Heo, Seongkook, Geehyuk Lee
    User Interface Software and Technology (UIST)
    2013

    [] []

  • Tailoring a large-sized software process using process slicing and case-based reasoning technique

    Park, Seung-Hun, Doo-Hwan Bae
    IET SOFTWARE
    2013

    [] []

  • TapBoard: Making a touch screen keyboard more touchable

    Kim, Sunjun, Son, Jeongmin, Geehyuk Lee, Kim, Hwan, Lee, W
    Computer Human Interaction (CHI)
    2013

    [] []

  • The Design of a Policy-based Attack-Resilient Intrusion Tolerant System

    Lim, Jungmin, Shin, Yongjoo, Doo, Seokjoo, Hyunsoo Yoon
    The 10th FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2013)
    2013

    []

  • The Design of a Robust Intrusion Tolerance System through Advanced Adaptive Cluster Transformation and Vulnerability-based VM Selection

    JUNG MIN LIM, Doo, Seokjoo, Hyunsoo Yoon
    Military Communications Conference (MILCOM 2013)
    2013

    [] []

  • The Impact of Concurrent Coverage Metrics on Testing Effectiveness

    Shin Hong, Staats, Matthew, Ahn, Jaemin, Moonzoo Kim, Rothermel, Gregg
    IEEE International Conference on Software Testing, Verification and Validation (ICST 2013)
    2013

    [] []

  • The cost of bounded curvature

    Kim, Hyo-Sil, Otfried Cheong
    COMPUTATIONAL GEOMETRY-THEORY AND APPLICATIONS
    2013

    []

  • ThisJava: An Extension of Java with Recursive Types

    나현익, Sukyoung Ryu
    11th Asian Symposium on Programming Languages and Systems (APLAS 2013)
    2013

    []

  • Time-delayed Collaborative Routing and MAC protocol for Maximizing the Network Lifetime in MANETs

    Cho, Woncheol, Daeyoung KIM
    IEICE TRANSACTIONS ON COMMUNICATIONS
    2013

    [] []

  • Topic Masks for Image Segmentation

    Jeong, Young-Seob, Lim, Chae-Gyun, Jeong, Byeong-Soo, Ho-Jin Choi
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS
    2013

    [] []

  • TouchShield: a virtual control for stable grip of a smartphone using the thumb

    Hong, Jonggi, Geehyuk Lee
    Computer Human Interaction (CHI)
    2013

    [] []

  • Toward Advice Mining: Advanced Conditional Random Fields for Extracting Advice-revealing Text Unit

    ALFAN FARIZKI, Sung-Hyon Myaeng
    International Conference on Information and Knowledge Management (CIKM)
    2013

    [] []

  • Toward Brain-Actuated Humanoid Robots: Asynchronous Direct Control Using an EEG-Based BCI

    Yongwook Chae, Jeong, Jaeseung, Sungho Jo
    IEEE TRANSACTIONS ON ROBOTICS
    2013

    []

  • Toward Efficient Semantic Annotation: A Semantic Cloud Generation Scheme from Linked Data

    Han-Gyu Ko, In-Young Ko
    13th International Conference on Web Engineering (ICWE 2013)
    2013

    [] []

  • Towards Assurance of Availability in Virtualized Cloud System

    Seongwook Jin, Jinho Seol, Seungryoul Maeng
    International Symposium on Cluster, Cloud and Grid Computing (IEEE/ACM CCGrid 2013)
    2013

    [] []