Directions
Speaker-TTS Voice Mapping towards Natural and Characteristic Robot Storytelling
Hye-Jin Min, Kim, Sang-Chae, Kim, Joon-Yeob, Jong C. Park
22nd IEEE International Symposium on Robot and Human Interactive Communication (IEEE RO-MAN 2013)
2013
[] []
Stereotype-based Semantic Expansion for Image Retrieval
Lee, Jungin, Kwon, OSung, Lee, Youngwoon, Sung-Eui Yoon
2013 IEEE International Conference on Multimedia and Expo (ICME)
2013
[]
Subspace Top-k Query Processing Using the Hybrid-Layer Index with a Tight Bound
Heo, Jun-Seok, Cho, Jung-Hoo, Kyu-Young Whang
DATA & KNOWLEDGE ENGINEERING
2013
[]
Surface-Level Path Loss Modeling for Sensor Networks in Flat and Irregular Terrain
Chong, Poh Kit, Daeyoung KIM
ACM TRANSACTIONS ON SENSOR NETWORKS
2013
[]
Survey on Software Testing Practices
이지현, Sungwon Kang, Danhyung LEE
IET SOFTWARE
2013
[]
TAMR: Traffic-Aware Multipath Routing for Fault Tolerance in 6LoWPAN
Kwon, Kiwoong, Ha, Minkeun, Kim, SH, Daeyoung KIM
2013 IEEE Global Communications Conference (GLOBECOM 2013)
2013
[]
Ta-Tap: consecutive distant tap operations for one-handed touch screen use
Heo, Seongkook, Geehyuk Lee
User Interface Software and Technology (UIST)
2013
[] []
Tailoring a large-sized software process using process slicing and case-based reasoning technique
Park, Seung-Hun, Doo-Hwan Bae
IET SOFTWARE
2013
[] []
TapBoard: Making a touch screen keyboard more touchable
Kim, Sunjun, Son, Jeongmin, Geehyuk Lee, Kim, Hwan, Lee, W
Computer Human Interaction (CHI)
2013
[] []
The Design of a Policy-based Attack-Resilient Intrusion Tolerant System
Lim, Jungmin, Shin, Yongjoo, Doo, Seokjoo, Hyunsoo Yoon
The 10th FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2013)
2013
[]
The Design of a Robust Intrusion Tolerance System through Advanced Adaptive Cluster Transformation and Vulnerability-based VM Selection
JUNG MIN LIM, Doo, Seokjoo, Hyunsoo Yoon
Military Communications Conference (MILCOM 2013)
2013
[] []
The Impact of Concurrent Coverage Metrics on Testing Effectiveness
Shin Hong, Staats, Matthew, Ahn, Jaemin, Moonzoo Kim, Rothermel, Gregg
IEEE International Conference on Software Testing, Verification and Validation (ICST 2013)
2013
[] []
The cost of bounded curvature
Kim, Hyo-Sil, Otfried Cheong
COMPUTATIONAL GEOMETRY-THEORY AND APPLICATIONS
2013
[]
ThisJava: An Extension of Java with Recursive Types
나현익, Sukyoung Ryu
11th Asian Symposium on Programming Languages and Systems (APLAS 2013)
2013
[]
Time-delayed Collaborative Routing and MAC protocol for Maximizing the Network Lifetime in MANETs
Cho, Woncheol, Daeyoung KIM
IEICE TRANSACTIONS ON COMMUNICATIONS
2013
[] []
Topic Masks for Image Segmentation
Jeong, Young-Seob, Lim, Chae-Gyun, Jeong, Byeong-Soo, Ho-Jin Choi
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS
2013
[] []
TouchShield: a virtual control for stable grip of a smartphone using the thumb
Hong, Jonggi, Geehyuk Lee
Computer Human Interaction (CHI)
2013
[] []
Toward Advice Mining: Advanced Conditional Random Fields for Extracting Advice-revealing Text Unit
ALFAN FARIZKI, Sung-Hyon Myaeng
International Conference on Information and Knowledge Management (CIKM)
2013
[] []
Toward Brain-Actuated Humanoid Robots: Asynchronous Direct Control Using an EEG-Based BCI
Yongwook Chae, Jeong, Jaeseung, Sungho Jo
IEEE TRANSACTIONS ON ROBOTICS
2013
[]
Toward Efficient Semantic Annotation: A Semantic Cloud Generation Scheme from Linked Data
Han-Gyu Ko, In-Young Ko
13th International Conference on Web Engineering (ICWE 2013)
2013
[] []