Directions
E3Miner: a text mining tool for ubiquitin-protein ligases
Lee, H, Gwan-Su Yi, Jong C. Park
NUCLEIC ACIDS RESEARCH
2008
[]
Early Reliability Prediction: An Approach to Software Reliability Assessment in Open Software Adoption Stage
Wangbong Lee, 정부금, Jongmoon BAIK
2008 Second International Conference on Secure System Integration and Reliability Improvement
2008
[]
Efficient Metadata Management for Flash File Systems
Jae Guek Kim, 조희승, Hyo Teck Shim, JinSoo Kim, Seungryoul Maeng
IEEE Symposium on Object Oriented Real-Time Distributed Computing
2008
[]
Efficient Storage Scheme and Query Processing for Supply Chain Management using RFID
Chin-Wan Chung, Chon hee Lee
2008 ACM SIGMOD international conference on Management of data
2008
[]
Efficient and Secure Self-organized Public Key Management for Mobile Ad Hoc Networks
Daeseon Choi, Younho Lee, Park, Yong-Su, Jin, Seung-Hun, Hyunsoo Yoon
IEICE TRANSACTIONS ON COMMUNICATIONS
2008
[]
Efficient generic on-line/off-line (threshold) signatures
Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyun Rok Lee, Kwangjo Kim
INFORMATION SCIENCES
2008
[]
Efficient service discovery mechanism for wireless sensor networks
Jaehoon Jung, Seung Hak Lee, Kim, Namgi, Hyunsoo Yoon
COMPUTER COMMUNICATIONS
2008
[]
Experiments on Building Ubiquitous Robotic Space for Mobile Robot Using Wireless Sensor Networks
Taehong Kim, 하영국, Jihoon Kang, Daeyoung KIM, Chong Poh Kit, 손주찬
2008 22nd IEEE International Conference on Advanced Information Networking and Applications (AINA)
2008
[]
Exploiting Temporal Locality for Energy Efficient Memory Management
Euiseong Seo, Seungryoul Maeng, Lim, D, Lee, Joonwon
JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS
2008
Extending ATAM to Asses Product Line Architecture
TaeHo Kim, In-Young Ko, Sungwon Kang, Danhyung LEE
The 2008 International Conference on Convergence and Hybrid Information Technology(ICCIT 2008)
2008
[]
Feature Vector Classification based on Likelihood Ratio
Jeong-sik Park, Sang Min Yoon, Yung-Hwan Oh
IEICE Technical Report 2008
2008
[]
Generic Security-Amplifying Methods of Ordinary Digital Signatures
Kwangjo Kim, Fangguo Zhang, Duncan S. Wong, Jin Li
International Conference on Applied Cryptography and Network Security
2008
[]
Helly-Type Theorems for Line Transversals to Disjoint Unit Balls.
Otfried Cheong, Goaoc, Xavier, Holmsen, Andreas F., Petitjean, Sylvain
DISCRETE & COMPUTATIONAL GEOMETRY
2008
HiCon: A Hierarchical Context Monitoring and Composition Framework for Next Generation Context-aware Services
KYUNGMIN CHO, INSEOK HWANG, Seungwoo Kang, Byoungjip Kim, Jinwon Lee, SangJeong Lee, Souneil Park, Junehwa Song, Yoon Seok Lee
IEEE NETWORK
2008
Histogram-Based Reversible Data Hiding Technique Using Subsampling
Kyung-Su Kim, Min-Jeong Lee, 서영호, Heung-Kyu LEE
10th ACM Workshop on Multimedia and Security (MM AND SEC 2008)
2008
[]
Historical Value-Based Approach for Cost-cognizant Test Case Prioritization to Improve the Effectiveness of Regression Testing
Hyuncheol Park, 류호연, Jongmoon BAIK
2008 Second International Conference on Secure System Integration and Reliability Improvement
2008
[]
Hybrid Visual Tracking for Augmented Books
Hyun S. Yang, Kyusung Cho, Jae min Soh, Jinki Jung, Lee, Junseok
7th International Conference on Entertainment Computing (ICEC 2008)
2008
[]
IP-based Wireless Sensor Networks Infrastructure for Smart Highway
SUNGMIN HONG, WooYoung Jung, Daeyoung KIM, 권영진, 정대교
IEEE International Conference on Embedded and Real-time Computing Systems and Applications (RTCSA)
2008
[]
Image/Video Deblurring using a Hybrid Camera
유윙타이, Hao Du, Michael S. Brown, Stephen Lin
IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
2008
[]
Imperfect Shadow Maps for Efficient Computation of Indirect Illumination
Ritschel, T., Grosch, T., Min H. Kim, Seidel, H. -P., Dachsbacher, C., Kautz, J.
ACM TRANSACTIONS ON GRAPHICS
2008
[]