KAIST - COMPUTER SCIENCE

  • korea
  • search
  • login

Directions

 
  • 2012

  • Smartphone as an Augmented Reality Authoring Tool via Multi-touch based 3D Interaction Method

    Jinki Jung, Jihye Hong, SUNGHEON PARK, Hyun S. Yang
    11th International Conference on Virtual Reality Continuum and Its Applications in Industry (VRCAI 2012)
    2012

    [] []

  • Source 3D Camera Identification based on Synthesized PRNU

    Junhee Lee, Daikyung Hyun, DAEJIN JUNG, Heung-Kyu LEE
    The 4th International Conference on 3D Systems and Applications (3DSA2012)
    2012

    []

  • Source camcorder identification with cropped and scaled videos

    Daikyung Hyun, Seung Jin Ryu, Min-Jeong Lee, Junhee Lee, Hae-Yeoun Lee, Heung-Kyu LEE
    IS&T/SPIE,Electroic Imaging : Media Watermarking, Security, and Forensics XIV
    2012

    [] []

  • Speaker-Characterized Emotion Recognition using Online and Iterative Speaker Adaptation

    Kim, Jae-Bok, Park, Jeong-Sik, Yung-Hwan Oh
    COGNITIVE COMPUTATION
    2012

    []

  • Speech Segregation based on Pitch Track Correction and Music-Speech Classification

    Han-Gyu Kim, Jang, Gil-Jin, Park, Jeong-Sik, Kim, Ji-Hwan, Yung-Hwan Oh
    ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING
    2012

    [] []

  • Spherical Hashing

    JaePil Heo, Youngwoon Lee, Junfeng He, Shih-Fu Chang, Sung-Eui Yoon
    2012 IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2012)
    2012

    [] []

  • Stability of the Max-Weight Protocol in Adversarial Wireless Networks

    임성수, Jung, Kyomin, Matthew Andrews
    IEEE International Conference on Computer Communications (INFOCOM)
    2012

    [] []

  • Statistical Model Checking for Safety Critical Hybrid Systems: An Empirical Evaluation

    Youngjoo Kim, Moonzoo Kim, 김태효
    Haifa Verification Conference (HVC 2012)
    2012

    [] []

  • Steganalysis Method Defeating the Modified Pixel-Value Differencing Steganography

    Cong Nguyen Bui, Lee, Hae-Yeoun, Jeong Chun Joo, Heung-Kyu LEE
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL
    2012

    [] []

  • Stereoscopic Watermarking by Horizontal Noise Mean Shifting

    Lee, Ji-Won, Kim, Hee-Dong, Choi, Hak-Yeol, Choi, Sung-Hee, Heung-Kyu LEE
    IS&T/SPIE,Electroic Imaging : Media Watermarking, Security, and Forensics XIV
    2012

    [] []

  • Subspace Snooping: Exploiting Temporal Sharing Stability for Snoop Reduction

    Jeongseob Ahn, Daehoon Kim, Jaehong Kim, Jaehyuk Huh
    IEEE TRANSACTIONS ON COMPUTERS
    2012

    [] []

  • SymPhoney: A Coordinated Sensing Flow Execution Engine for Concurrent Mobile Sensing Applications

    Young Hyun Ju, Youngki Lee, Jihyun Yu, CHULHONG MIN, Insik Shin, Junehwa Song
    The 10th ACM Conference on Embedded Networked Sensor Systems (SenSys 2012)
    2012

    []

  • TRANSITIVE-CLOSURE SPANNERS

    Bhattacharyya, Arnab, Grigorescu, Elena, Jung, Kyomin, Raskhodnikova, Sofya, Woodruff, DP
    SIAM JOURNAL ON COMPUTING
    2012

    [] []

  • Tame: Time Window Scheduling of Wireless Access Points for Maximum Energy Efficiency and High Throughput

    Jin Ma, Seong Hoon Kim, Daeyoung KIM
    2012 IEEE 18th International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2012)
    2012

    []

  • Terminological Paraphrase Extraction from Scientific Literature based on Predicate Argument Tuples

    Choi, Sung-Pil, Sung-Hyon Myaeng
    JOURNAL OF INFORMATION SCIENCE
    2012

    []

  • Test Data Regeneration: Generating New Test Data from Existing Test Data

    Shin Yoo, Harman, M.
    SOFTWARE TESTING VERIFICATION & RELIABILITY
    2012

    []

  • Testing Concurrent Programs to Achieve High Synchronization Coverage

    Shin Hong, Jaemin Ahn, 박상민, Moonzoo Kim, Mary Jean Harrold
    International Symposium on Software Testing and Analysis (ISSTA 2012)
    2012

    [] []

  • The Cost of Bounded Curvature

    김효실, Otfried Cheong
    18th Annual International Computing and Combinatorics Conference (COCOON 2012)
    2012

    [] []

  • The Design of Adaptive Intrusion Tolerant System(ITS) based on Historical Data

    Yong Ki Kim, JUNG MIN LIM, Seokjoo Doo, Hyunsoo Yoon
    2012 7th International Conference for Internet Technology and Secured Transactions (ICITST)
    2012

    []

  • The Power of Batching in the Click Modular Router

    Joongi Kim, 허성구, 장건, 박경수, Sue Moon
    Asia-Pacific Workshop on Systems (APSYS 2012)
    2012

    [] []