Directions
Exploring Current Practices for Battery Use and Management of Smartwatches
CHULHONG MIN, 강승우, Chungkuk Yoo, Jeehoon Cha, Sangwon Choi, 오영한, Junehwa Song
International Joint Conference on Pervasive and Ubiquitous Computing(UbiComp)
2015
[]
Exploring current practices for battery use and management of smartwatches
CHULHONG MIN, Seungwoo Kang, Chungkuk Yoo, Jeehoon Cha, 최상원, 오영한, Junehwa Song
International Symposium on Wearable Computers (ISWC)
2015
[]
Fast Directional Handoff and lightweight retransmission protocol for enhancing multimedia quality in indoor WLANs
Sang Yup Han, Myungchul Kim, Lee, Ben, Sungwon Kang
COMPUTER NETWORKS
2015
[] []
Fast Two-level Address Translation for Virtualized Systems
Jeongseob Ahn, Seongwook Jin, Jaehyuk Huh
IEEE TRANSACTIONS ON COMPUTERS
2015
[]
Fast graph mining with HBase
Lee, Ho, Shao, Bin, U Kang
INFORMATION SCIENCES
2015
[]
Filter Data Cache: An Energy-Efficient Small L0 Data Cache Architecture Driven by Miss Cost Reduction
JONGMIN LEE, Soontae Kim
IEEE TRANSACTIONS ON COMPUTERS
2015
[] []
Five Centuries of Monarchy in Korea: Mining the Text of the Annals of the Joseon Dynasty
JinYeong Bak, Alice Oh
Association for Computational Linguistics(ACL)
2015
[] []
Formal Synthesis of Application and Platform Behaviors of Embedded Software Systems
Kim, Jinhyun, Kang, Inhye, Choi, Jin-Young, Lee, Insup, Sungwon Kang
SOFTWARE AND SYSTEMS MODELING
2015
[]
Fully Batch Processing Enabled Memory Integrity Verification Algorithm based on Merkle Tree
Kim, Se Hwan, Yonggon Kim, Ohmin Kwon, Hyunsoo Yoon
WISA 2015 - The 16th International Workshop on Information Security Applications
2015
[]
G-Index Model: A Generic Model of Index Schemes for Top-k Spatial-Keyword Queries
Hyuk Yoon Kwon, Wang, Haixun, Kyu-Young Whang
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS
2015
[]
GPU-accelerated Framework for Intracoronary Optical Coherence Tomography Imaging at the Push of a Button
Myounghee Han, Kim, Kyunghun, Jang, SJ, Cho, Han Saem, Bouma, Brett E., Oh, WY, Sukyoung Ryu
PLOS ONE
2015
[]
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack
Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyaman, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto
12th International Conference on Security and Cryptography
2015
[]
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack
Kobayashi, Yukou, Yanai, Naoto, Yoneyaman, Kazuki, Nishide, Takashi, Hanaoka, Goichiro, Kwangjo Kim, Okamoto, Eiji
12th International Conference on Security and Cryptography (SECRYPT2015)
2015
[]
Graphical Models via Univariate Exponential Family Distributions
Eunho Yang, Ravikumar, P, Allen, GI, Liu, ZD
JOURNAL OF MACHINE LEARNING RESEARCH
2015
[]
H-SVM: Hardware-assisted Secure Virtual Machines under a Vulnerable Hypervisor
Seongwook Jin, Jeongseob Ahn, Jinho Seol, Sanghoon Cha, Jaehyuk Huh, Seungryoul Maeng
IEEE TRANSACTIONS ON COMPUTERS
2015
[]
HaTen2: Billion-scale Tensor Decompositions
Inah, Jeon, Evangelos E. Papalexakis, U Kang, Christos Faloutsos
International Conference on Data Engineering(ICDE)
2015
[]
Hardware-Assisted Secure Resource Accounting under a Vulnerable Hypervisor
Seongwook Jin, Jinho Seol, Huh, Jaehyuk, Seungryoul Maeng
ACM SIGPLAN NOTICES
2015
[] []
Hardware-Assisted Secure Resource Accounting under a Vulnerable Hypervisor
Seongwook Jin, Jinho Seol, Jaehyuk Huh, Seungryoul Maeng
ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environment (VEE)
2015
[]
Hierarchical Bayesian Inverse Reinforcement Learning
Choi Jaedeug, Kee-Eung Kim
IEEE TRANSACTIONS ON CYBERNETICS
2015
[] []
Hierarchical soft clustering tree for fast approximate search of binary codes
SuGil Choi, Suwon Lee, Hyun S. Yang
ELECTRONICS LETTERS
2015
[]