KAIST - COMPUTER SCIENCE

  • korea
  • search
  • login

Directions

  • [9/3 (Fri.) Seminar] Activity Recognition with an Instrumented Walker

    Fri, Sep 3, 2010

  • [9/3 (Fri.) Seminar] A Safety­Assured Development Approach for Real­Time Software

    Fri, Sep 3, 2010

  • [Seminar (8/31)] Object Capturing based Testing and Crash Reproduction

    Tue, Aug 31, 2010

  • [Seminar] 8/27 (Fri.) Discovering the topics of conversations and detecting topic, author,..

    Fri, Aug 27, 2010

  • [8/16∼8/20] Prof.Junghoo Cho's Global Lecture: Searching the Web

    Mon, Aug 16, 2010

  • [Seminar ­8/6] A 2­poisson model for probabilistic coreference of named entities for impro..

    Fri, Aug 6, 2010

  • [8/3∼8/4] Prof.Philip S. Yu's Global Lecture: Mining Information Networks and Social Compu..

    Tue, Aug 3, 2010

  • [8/2∼8/6] Stefano Borgo's Global Lecture: Formal Ontology: construction and application

    Mon, Aug 2, 2010

  • [8/2∼8/6] Prof.Gregg Rothermel's Global Lecture: Software Testing: Research and Empirical ..

    Mon, Aug 2, 2010

  • [7/26∼7/29] Prof.Onur Mutlu's Global Lecture: Multi­core Architectures and Shared Resource..

    Mon, Jul 26, 2010

  • [Seminar] Fri, 7/9 2pm­K. Selcuk Candan (ASU) at Anyoungkyung Seminar Room

    Fri, Jul 9, 2010

  • [seminar] fri 7/9 11am­noon Dr. Yong­Yeol Ahn (Northeastern U) @Ahn Young­Kyoung

    Fri, Jul 9, 2010

  • [6/29∼6/30] Prof.David Root's Global Lecture : Essential State of the Practice Skills for ..

    Tue, Jun 29, 2010

  • [Seminar]Challenges in delivering Real­time Communication for Unified Communications by Ji..

    Tue, Jun 22, 2010

  • [6/21] Prof. Sven Dietrich's Global Lecture: A short course in botnets and related malware..

    Mon, Jun 21, 2010

  • [6/21] Dr. Seung Yup Lee, Computational Proteomics for Drug Discovery

    Mon, Jun 21, 2010

  • [6/9] Prof. Raj Reddy(CMU), The Invisible Computing Project

    Wed, Jun 9, 2010

  • [6/9] Mitiation of Decentralized Advanced Multi­tiered Botnets

    Wed, Jun 9, 2010

  • Prof. Junichi Tsujii's Global Lecture: NLP­based Text Mining Techniques and their Applicat..

    Mon, May 31, 2010

  • [5/20] Making Linux Protection Mechanisms Egalitarian with UserFS

    Thu, May 20, 2010

  • [5/19] Depersonalization of Location Traces

    Wed, May 19, 2010

  • [4/28] Type Classes as Objects and Implicits

    Wed, Apr 28, 2010

  • [4/28] EffectiveAdvice: Disciplined Advice with Explicit Effects

    Wed, Apr 28, 2010

  • [4/26] User­centric and Intelligent Service Composition in Ubiquitous Computing Environmen..

    Mon, Apr 26, 2010

  • [4/22] User Experience and Technology Acceptance Issues in Recommender Systems

    Thu, Apr 22, 2010

  • [4/20] Straight­Line Drawings of Planar Graph with Small Area

    Tue, Apr 20, 2010

  • [4/19] Prof. Chan­Mo Park (President, NRF) ­ Current Status of IT in DPRK and Collaboratio..

    Mon, Apr 19, 2010

  • [4/14­canceled] User Experience and Technology Acceptance Issues in Recommender Systems

    Wed, Apr 14, 2010

  • [4/12] Computational Photography

    Mon, Apr 12, 2010

  • [4/9] Relationship­Oriented Social­Centric Future Internet Design

    Fri, Apr 9, 2010