KAIST - COMPUTER SCIENCE

  • korea
  • search
  • login

Directions

 
  • 2009

  • SSL-based Lightweight Security of IP-based Wireless Sensor Networks

    WooYoung Jung, SUNGMIN HONG, MINKEUN HA, 김영주, Daeyoung KIM
    The IEEE 23rd International Conference on Advanced Information Networking and Applications (AINA-09)
    2009

    [] []

  • Scene Text Extraction using Focus of Mobile Camera

    Egyul Kim, SeongHun Lee, Jin H. Kim
    2009 10th International Conference on Document Analysis and Recognition (ICDAR '09)
    2009

    []

  • Scene Text Extraction using Image Intensity and Color Information

    SeongHun Lee, Jae Hyun Seok, Kyungmin Min, Jin H. Kim
    The first CJK Joint Workshop on Pattern Recognition (CJKPR) 2009
    2009

    []

  • Scene Text Separation using Touch Screen Interface

    Jehyun Jung, Egyul Kim, SeongHun Lee, Jin H. Kim
    The first CJK Joint Workshop on Pattern Recognition (CJKPR) 2009
    2009

    []

  • Secure Many-to-many Multicast in Heterogenous Networks

    Jun Beom Hur, Dong Young Koo, Hyunsoo Yoon
    The 2009 FTRG International Workshop on Advances in Cryptography, Security and Applications for Future Computing (ACSA-09)
    2009

    []

  • Semantic Query-by-Example for RDF Data

    Inchul Song, Myoung Ho Kim
    The 1st International Conference on Emerging Databases (EDB '09)
    2009

    [] []

  • Service Oriented Wireless Sensor Network Toolbox for Consumer Applications

    Jongwoo Sung, Taehong Kim, Seong Hoon Kim, Kyubaek Kim, Janggwan Im, Daeyoung KIM
    IEEE Consumer Communications & Networking Conference
    2009

    []

  • Single Image Defocus Map Estimation Using Local Contrast Prior

    유윙타이, Michael S. Brown
    IEEE conference on Image Processing(ICIP)
    2009

    []

  • Software Architecture Evaluation Methods Based on Cost benefit Analysis and Quantitative Decision Making

    Lee, Jihyun, Sungwon Kang, Kim, Chang-Ki
    EMPIRICAL SOFTWARE ENGINEERING
    2009

    []

  • Software Reliability Assurance Using a Framework in Weapon System Development: A Case Study

    DalJu Lee, Jongmoon BAIK, 신주환
    8th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2009)
    2009

    []

  • Spatial Self-synchronizing Video Watermarking Technique

    Tae-Woo Oh, Min-Jeong Lee, Kyung-Su Kim, Heung-Kyu LEE, 윤영석
    2009 IEEE International Conference on Image Processing (ICIP 2009)
    2009

    []

  • Spectral-Based Group Formation Control

    Takahashi, Shigeo, Yoshida, Kenichi, Kwon, Tae-Soo, Lee, Kang-Hoon, Lee, Je-Hee, Joseph S. Shin
    COMPUTER GRAPHICS FORUM
    2009

    []

  • Statistical Investigation on Class Mutation Operators

    Yong-Rae Kwon, 마유승, Sang-Woon Kim
    ETRI JOURNAL
    2009

    []

  • Supplementary Loss Concealment Technique for Image Transmission through Data Hiding

    Kyung-Su Kim, Lee, Hae-Yeoun, Heung-Kyu LEE
    MULTIMEDIA TOOLS AND APPLICATIONS
    2009

    []

  • TEPS: Transient Error Protection Utilizing Sub-word Parallelism

    SeokIn Hong, Soontae Kim
    IEEE Computer Society Annual Symposium on VLSI
    2009

  • Tactics based approach for integrating non-functional requirements in object-oriented analysis and design

    Marew Zewdie Tegegne, Lee, JS, Doo-Hwan Bae, Lee, JS
    JOURNAL OF SYSTEMS AND SOFTWARE
    2009

    []

  • Temporal Issue Trend Identifications in Blogs

    문일철, Youngmin Kim, Hyun Jong Lee, Alice Oh
    2009 IEEE International Conference on Social Computing (SocialCom)
    2009

    []

  • The Partitioned-Layer Index: Answering Monotone Top-k Queries Using the Convex Skyline and Partitioning-Merging Technique

    Jun-Seok Heo, Kyu-Young Whang, Kim Min-Soo, Lee Run Kim, Song, Il-Yeol
    INFORMATION SCIENCES
    2009

    []

  • The Ubiquitous DBMS

    Kyu-Young Whang, Song, Il-Yeol, Taek Yoon Kim, Ki-Hoon Lee
    SIGMOD RECORD
    2009

    []

  • The ring authenticated encryption scheme - How to provide a clue wisely

    Lv, Jiqiang, Ren, Kui, Chen, Xiaofeng, Kwangjo Kim
    INFORMATION SCIENCES
    2009

    []